Add files using upload-large-folder tool
Browse filesThis view is limited to 50 files because it contains too many changes.
See raw diff
- -9AyT4oBgHgl3EQfqfj3/content/tmp_files/2301.00546v1.pdf.txt +1349 -0
- -9AyT4oBgHgl3EQfqfj3/content/tmp_files/load_file.txt +0 -0
- -tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf +3 -0
- -tFLT4oBgHgl3EQfDC7x/content/tmp_files/2301.11978v1.pdf.txt +1301 -0
- -tFLT4oBgHgl3EQfDC7x/content/tmp_files/load_file.txt +0 -0
- .gitattributes +74 -0
- 09E2T4oBgHgl3EQf5AgM/content/tmp_files/2301.04185v1.pdf.txt +931 -0
- 09E2T4oBgHgl3EQf5AgM/content/tmp_files/load_file.txt +0 -0
- 0NFQT4oBgHgl3EQfDTUM/vector_store/index.faiss +3 -0
- 1dE0T4oBgHgl3EQfuQGc/content/tmp_files/2301.02603v1.pdf.txt +790 -0
- 1dE0T4oBgHgl3EQfuQGc/content/tmp_files/load_file.txt +472 -0
- 29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf +3 -0
- 29AzT4oBgHgl3EQfDvqc/vector_store/index.pkl +3 -0
- 2NE2T4oBgHgl3EQfNgYt/content/2301.03737v1.pdf +3 -0
- 2NE2T4oBgHgl3EQfNgYt/vector_store/index.pkl +3 -0
- 2dAzT4oBgHgl3EQfRvud/vector_store/index.faiss +3 -0
- 2tE2T4oBgHgl3EQfNgbv/content/tmp_files/2301.03739v1.pdf.txt +850 -0
- 2tE2T4oBgHgl3EQfNgbv/content/tmp_files/load_file.txt +0 -0
- 3tFAT4oBgHgl3EQfERy2/vector_store/index.pkl +3 -0
- 4NE2T4oBgHgl3EQfjwdR/content/tmp_files/2301.03971v1.pdf.txt +1291 -0
- 4NE2T4oBgHgl3EQfjwdR/content/tmp_files/load_file.txt +0 -0
- 4tAyT4oBgHgl3EQf2Plc/content/tmp_files/2301.00747v1.pdf.txt +1476 -0
- 4tAyT4oBgHgl3EQf2Plc/content/tmp_files/load_file.txt +0 -0
- 5dAyT4oBgHgl3EQfpfgA/vector_store/index.pkl +3 -0
- 5dFKT4oBgHgl3EQfSi3T/vector_store/index.faiss +3 -0
- 69E1T4oBgHgl3EQf7AXC/vector_store/index.pkl +3 -0
- 6NE1T4oBgHgl3EQfBQJe/content/2301.02849v1.pdf +3 -0
- 6NE1T4oBgHgl3EQfBQJe/vector_store/index.faiss +3 -0
- 6dAyT4oBgHgl3EQfQfZh/content/tmp_files/2301.00046v1.pdf.txt +783 -0
- 6dAyT4oBgHgl3EQfQfZh/content/tmp_files/load_file.txt +0 -0
- 6dAzT4oBgHgl3EQfvP2u/content/tmp_files/2301.01704v1.pdf.txt +965 -0
- 6dAzT4oBgHgl3EQfvP2u/content/tmp_files/load_file.txt +0 -0
- 8dFRT4oBgHgl3EQfpTfl/content/tmp_files/2301.13613v1.pdf.txt +1377 -0
- 8dFRT4oBgHgl3EQfpTfl/content/tmp_files/load_file.txt +0 -0
- 99FLT4oBgHgl3EQfCS7y/vector_store/index.faiss +3 -0
- ANAyT4oBgHgl3EQfRffl/content/tmp_files/2301.00069v1.pdf.txt +1428 -0
- ANAyT4oBgHgl3EQfRffl/content/tmp_files/load_file.txt +0 -0
- AdAzT4oBgHgl3EQfhf3-/content/tmp_files/2301.01487v1.pdf.txt +1594 -0
- AdAzT4oBgHgl3EQfhf3-/content/tmp_files/load_file.txt +0 -0
- AtE0T4oBgHgl3EQfPgDv/content/2301.02181v1.pdf +3 -0
- AtE0T4oBgHgl3EQfPgDv/vector_store/index.faiss +3 -0
- AtE0T4oBgHgl3EQfPgDv/vector_store/index.pkl +3 -0
- AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf +3 -0
- AtE4T4oBgHgl3EQf5A4w/vector_store/index.faiss +3 -0
- AtE4T4oBgHgl3EQf5A4w/vector_store/index.pkl +3 -0
- BNFQT4oBgHgl3EQf9jeh/content/tmp_files/2301.13451v1.pdf.txt +701 -0
- BNFQT4oBgHgl3EQf9jeh/content/tmp_files/load_file.txt +483 -0
- BdE1T4oBgHgl3EQfVgTd/content/2301.03104v1.pdf +3 -0
- BdE1T4oBgHgl3EQfVgTd/vector_store/index.pkl +3 -0
- BdE3T4oBgHgl3EQfUAoU/content/2301.04446v1.pdf +3 -0
-9AyT4oBgHgl3EQfqfj3/content/tmp_files/2301.00546v1.pdf.txt
ADDED
@@ -0,0 +1,1349 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
arXiv:2301.00546v1 [cond-mat.mes-hall] 2 Jan 2023
|
2 |
+
Tunable caging of excitation in decorated Lieb-ladder geometry with long range
|
3 |
+
connectivity
|
4 |
+
Atanu Nandy∗
|
5 |
+
Department of Physics, Acharya Prafulla Chandra College,
|
6 |
+
New Barrackpore, Kolkata West Bengal-700 131, India
|
7 |
+
Controlled Aharonov-Bohm caging of wave train is reported in a quasi-one dimensional version
|
8 |
+
of Lieb geometry with next nearest neighbor hopping integral within the tight-binding framework.
|
9 |
+
This longer wavelength fluctuation is considered by incorporating periodic, quasi-periodic or fractal
|
10 |
+
kind of geometry inside the skeleton of the original network.
|
11 |
+
This invites exotic eigenspectrum
|
12 |
+
displaying a distribution of flat band states. Also a subtle modulation of external magnetic flux
|
13 |
+
leads to a comprehensive control over those non-resonant modes. Real space renormalization group
|
14 |
+
method provides us an exact analytical prescription for the study of such tunable imprisonment of
|
15 |
+
excitation. The non-trivial tunability of external agent is important as well as challenging in the
|
16 |
+
context of experimental perspective.
|
17 |
+
Keywords: Caging, flat band, interferometer, renormalization.
|
18 |
+
I.
|
19 |
+
INTRODUCTION
|
20 |
+
Recent exciting headway in experimental condensed
|
21 |
+
matter physics helps us to emulate several quantum
|
22 |
+
mechanical phenomena in a quite tunable environment.
|
23 |
+
This unprecedented advancement in fabrication tech-
|
24 |
+
nique provides a scope for direct visualization of different
|
25 |
+
theoretically proposed phenomena like localization of ex-
|
26 |
+
citation in low dimensional networks [1, 2]. That is why
|
27 |
+
creation of so called artificial systems for the simulation
|
28 |
+
of complex many-body systems containing additional de-
|
29 |
+
gree of freedom has grabbed considerable scientific im-
|
30 |
+
pact [3]. Moreover, scientific communities have already
|
31 |
+
addressed the celebration of sixty years of the pioneer-
|
32 |
+
ing work of Anderson [4].
|
33 |
+
The absence of diffusion of
|
34 |
+
wave packet in the random disorder environment is well
|
35 |
+
known. In fact this now becomes a general prescription
|
36 |
+
in diverse topics of condensed matter physics starting
|
37 |
+
from optical lattice of ultra cold atoms [5] to the acous-
|
38 |
+
tics, wave guide arrays [6] or in micro cavities having
|
39 |
+
exciton-polaritons [7]. Unlike the case of Anderson lo-
|
40 |
+
calization (AL), the concept of compact localized states
|
41 |
+
(CLS) [8]-[15] in several one or two dimensional periodic
|
42 |
+
or non-periodic structures has attracted the spot light of
|
43 |
+
fundamental research. The journey started nearly thirty
|
44 |
+
years ago approximately from Sutherland [16].
|
45 |
+
This unconventional non-diffusive progress of wave has
|
46 |
+
generated significant attention because of its contribu-
|
47 |
+
tion to various novel physical phenomena in strongly
|
48 |
+
correlated system, such as unconventional Anderson
|
49 |
+
localization [17, 18],
|
50 |
+
Hall ferromagnetism [19, 20],
|
51 |
+
high-temperature superconductivity [21], and superflu-
|
52 |
+
idity [22], to name a few. Moreover, this study has kept
|
53 |
+
scientists intrigued since it offers a suitable platform to
|
54 |
+
investigate several phenomena that are linked with the
|
55 |
+
information of quantum physics together with the topo-
|
56 |
+
∗Electronic address: [email protected]
|
57 |
+
logical effect including fractional quantum hall effect [23]
|
58 |
+
and flat band ferromagnetism [24]. For these CLS, the
|
59 |
+
diminishing envelope of the wave train beyond finite size
|
60 |
+
characteristics trapping cell implies extremely low group
|
61 |
+
velocity due to the divergent effective mass tensor. This
|
62 |
+
means that the particle behaves like a super heavy such
|
63 |
+
that it cannot move. The vanishing curvature of the E−k
|
64 |
+
plot corresponding to such momentum independent self-
|
65 |
+
localized states are generally caused by the destructive
|
66 |
+
nature of the quantum interference occurred by multiple
|
67 |
+
quantum dots and the local spatial symmetries involved
|
68 |
+
with the underlying structure. Hence these are also called
|
69 |
+
as flat band states.
|
70 |
+
In general, occurrence of dispersionless flat band can
|
71 |
+
be classified into two categories depending on their sta-
|
72 |
+
bility with respect to the application of magnetic pertur-
|
73 |
+
bation. In particular, the type of geometries discussed
|
74 |
+
by Mielke [25] and Tasaki [19] cannot contain flat bands
|
75 |
+
for finite magnetic flux. Whereas, the other type of lat-
|
76 |
+
tices e.g., Lieb lattice [26], there exists macroscopically
|
77 |
+
degenerate flat band even in the presence of flux. In fact,
|
78 |
+
the non dispersive band is completely insensitive to the
|
79 |
+
applied external perturbation. As it is well known that
|
80 |
+
the inherent topology of the line-centered square lattice
|
81 |
+
(also known as the Lieb lattice) induces interesting spec-
|
82 |
+
tral properties such as the macroscopically degenerated
|
83 |
+
zero-energy flat band, the Dirac cone in the low- energy
|
84 |
+
spectrum, and the typical Hofstadter-type spectrum in
|
85 |
+
a magnetic field. Moreover, Lieb geometry is one of the
|
86 |
+
most prominent candidate useful for magnetism.
|
87 |
+
The
|
88 |
+
spectral divergence of the zero-energy flat band provides
|
89 |
+
that platform.
|
90 |
+
In this manuscript, inspired by all the experimental re-
|
91 |
+
alizations of Aharaonov-Bohm caging, we study a quasi-
|
92 |
+
one dimensional Lieb-ladder network within the tight-
|
93 |
+
binding formalism.
|
94 |
+
The phenomenon of imprisonment
|
95 |
+
of wave train is studied when the next nearest neighbor
|
96 |
+
(NNN) connection term is added to the Hamiltonian. In-
|
97 |
+
teresting modulation of self-trapping of excitation is also
|
98 |
+
studied in details when the NNN connectivity is ‘dec-
|
99 |
+
|
100 |
+
2
|
101 |
+
orated’ by either magnetic flux or some quasi-periodic,
|
102 |
+
fractal kind of objects.
|
103 |
+
As a second motivation we have analyzed an Aharonov-
|
104 |
+
Bohm interferometer model made in the form of a quasi-
|
105 |
+
one dimensional Lieb geometry to study the flux con-
|
106 |
+
trolled localization aspects.
|
107 |
+
It is needless to mention
|
108 |
+
that this flux controlled caging is a subset of widely
|
109 |
+
used phenomena Aharonov-Bohm caging [27] and this
|
110 |
+
has been experimentally verified in recent times [1, 2].
|
111 |
+
However, when an electron traverses a closed loop that
|
112 |
+
traps a finite magnetic flux Φ, its wave function picks
|
113 |
+
up a phase factor.
|
114 |
+
This simple sentence is at the the
|
115 |
+
core of the pioneering Aharonov-Bohm (AB) effect [28]-
|
116 |
+
[32] which has led to a substantial research in the stan-
|
117 |
+
dard AB interferometry that dominated the fundamental
|
118 |
+
physics, both theoretical and experimental perspective,
|
119 |
+
in the mesoscopic scale over the past few decades [33]-
|
120 |
+
[35]. It is to be noted that the current experiments by
|
121 |
+
Yamamoto et al. [36] has stimulated more experiments on
|
122 |
+
quantum transmission in AB interferometers [37]. Also
|
123 |
+
the previously mentioned theoretical model studies have
|
124 |
+
also played an important part in studying the elemen-
|
125 |
+
tary characteristics of the electronic states and coherent
|
126 |
+
conductance in quantum networks in the mesoscopic di-
|
127 |
+
mensions [35]. The recent advancement in the fabrication
|
128 |
+
and lithography processes have opened up the possibility
|
129 |
+
to make a tailor-made geometry with the aid of quan-
|
130 |
+
tum dots (QD) or Bose–Einstein condensates (BEC). It is
|
131 |
+
needless to mention that this has provoked a substantial
|
132 |
+
content of theoretical research even in model quantum
|
133 |
+
networks with a complex topological character [38, 39].
|
134 |
+
In this article, highly motivated by the ongoing sce-
|
135 |
+
nario of theory and experiments in AB interferometry,
|
136 |
+
we investigate the spectral and the transmission prop-
|
137 |
+
erties of a model quantum network in which diamond
|
138 |
+
shaped Aharonov-Bohm interferometers are arranged in
|
139 |
+
the form of a quasi-one dimensional Lieb ladder geom-
|
140 |
+
etry.
|
141 |
+
Such diamond-based interferometer models have
|
142 |
+
previously been analyzed as the minimal prototypes of
|
143 |
+
bipartite networks having nodes with different coordi-
|
144 |
+
nation numbers, and representing a family of itinerant
|
145 |
+
geometrically frustrated electronic systems [40]. There
|
146 |
+
are other studies which include the problem of imprison-
|
147 |
+
ment of excitation under the influence of spin-orbit inter-
|
148 |
+
action [41], a flux-induced semiconducting behavior [42],
|
149 |
+
quantum level engineering for AB cages [43] or, as models
|
150 |
+
of spin filters [44].
|
151 |
+
In what follows we demonstrate our findings. Sec. II
|
152 |
+
discusses the basic quasi-one dimensional Lieb ladder net-
|
153 |
+
work in respect of energy band and transmittivity. In
|
154 |
+
Sec. III we have incorporated a next nearest neighbor
|
155 |
+
connectivity by inserting a rhombic loop inside the unit
|
156 |
+
cell and discussed the flux sensitive localization.
|
157 |
+
Af-
|
158 |
+
ter that in Sec. IV the NNN hopping is decorated by
|
159 |
+
a quasiperiodic Fibonacci geometry and the distribution
|
160 |
+
of self-localized states has been studied. Sec. V demon-
|
161 |
+
strates the self-similar pattern of compact localized states
|
162 |
+
as a function of magnetic flux. In Sec. VI we have stud-
|
163 |
+
ied the Lieb Aharonov-Bohm interferometer model in re-
|
164 |
+
spect of its electronic eigenspectrum. Finally in Sec. VII
|
165 |
+
we draw our conclusions.
|
166 |
+
II.
|
167 |
+
MODEL SYSTEM AND HAMILTONIAN
|
168 |
+
We start our demonstration from the Fig. 1(a) where
|
169 |
+
a quasi-one dimensional version of the Lieb geometry is
|
170 |
+
shown. We make a distinction between the sites (blue col-
|
171 |
+
ored dots marked as A site and red colored dots marked
|
172 |
+
as B sites) based on their coordination numbers. The
|
173 |
+
(a)
|
174 |
+
A
|
175 |
+
B
|
176 |
+
x
|
177 |
+
y
|
178 |
+
(b)
|
179 |
+
ε
|
180 |
+
τ
|
181 |
+
γ
|
182 |
+
ξ
|
183 |
+
FIG. 1: (Color online) (a) A quasi-one dimensional Lieb lad-
|
184 |
+
der network with endless axial span and (b) the effective two-
|
185 |
+
arm ladder with renormalized parameters.
|
186 |
+
array is modeled by the standard tight-binding Hamilto-
|
187 |
+
nian written in the Wannier basis, viz.,
|
188 |
+
H =
|
189 |
+
�
|
190 |
+
j
|
191 |
+
ǫjc†
|
192 |
+
jcj +
|
193 |
+
�
|
194 |
+
⟨jk⟩
|
195 |
+
[tjkc†
|
196 |
+
jck + h.c.]
|
197 |
+
(1)
|
198 |
+
where the first term bears the potential information of
|
199 |
+
the respective quantum dot location and the second one
|
200 |
+
indicates the kinetic signature between two neighboring
|
201 |
+
lattice sites. The on-site potential of the respective sites
|
202 |
+
are marked as ǫA and ǫB and the nearest neighbor overlap
|
203 |
+
parameter can be assigned as t.
|
204 |
+
Without any loss of
|
205 |
+
generality, numerically the site potentials are taken as
|
206 |
+
uniform (equal to zero) and the nearest neighbor hopping
|
207 |
+
is also same (equal to unity) everywhere. By virtue of real
|
208 |
+
space renormalization group (RSRG) technique one can
|
209 |
+
easily eliminate the amplitude of an appropriate subset
|
210 |
+
of nodes to caste the original system into an effective
|
211 |
+
two-strand ladder system with renormalized parameters
|
212 |
+
as cited in the Fig. 1(b). The decimation method can be
|
213 |
+
easily implemented with the help of difference equation,
|
214 |
+
the discretized form of the Schr¨odinger’s equation, viz.,
|
215 |
+
(E − ǫj)ψj =
|
216 |
+
�
|
217 |
+
k
|
218 |
+
tjkψk
|
219 |
+
(2)
|
220 |
+
This decimation provides the renormalized uniform two-
|
221 |
+
leg ladder network with different parameters. After this
|
222 |
+
renormalization procedure, all the atomic sites carry
|
223 |
+
identical on-site energy ¯ǫ and the intra-arm hopping τ.
|
224 |
+
The inter-arm vertical connectivity is marked as γ as
|
225 |
+
cited in the Fig. 1(b). This decimation produces a next
|
226 |
+
nearest neighbor hopping, denoted by ξ, which generates
|
227 |
+
overlap between the wave functions of the two diagonally
|
228 |
+
|
229 |
+
3
|
230 |
+
opposite atomic sites. The detailed forms of those pa-
|
231 |
+
rameters are given by,
|
232 |
+
¯ǫ = ǫ + 2t2(E − ǫ1)
|
233 |
+
δ
|
234 |
+
τ = t2(E − ǫ1)
|
235 |
+
δ
|
236 |
+
γ = 2t2t1
|
237 |
+
δ
|
238 |
+
ξ = t2t1
|
239 |
+
δ
|
240 |
+
(3)
|
241 |
+
where ǫ1 = ǫ + t2/(E − ǫ), t1 = t2/(E − ǫ) and δ = [(E −
|
242 |
+
ǫ1)2 − t2
|
243 |
+
1]. With the above renormalized parameters and
|
244 |
+
by virtue of RSRG approach, one can trivially compute
|
245 |
+
the electronic density of states (DOS) ρ(E) for this quasi-
|
246 |
+
one dimensional Lieb strip as a function of the energy of
|
247 |
+
the incoming projectile by using the standard expression,
|
248 |
+
viz.,
|
249 |
+
ρ(E) = −
|
250 |
+
� 1
|
251 |
+
Nπ
|
252 |
+
�
|
253 |
+
Im[T rG(E)]
|
254 |
+
(4)
|
255 |
+
Here G(E) = [E−H +i∆]−1 is the usual green’s function
|
256 |
+
and ∆ is the imaginary part of the energy, reasonably
|
257 |
+
small enough, added for the numerical evaluation of DOS.
|
258 |
+
N denotes the total number of atomic sites present in the
|
259 |
+
system and ‘Tr’ is the trace of the green’s function.
|
260 |
+
A.
|
261 |
+
Density of eigenstates and transport
|
262 |
+
In Fig. 2(a) the variation of DOS is presented as a func-
|
263 |
+
tion of energy where we see the presence of the absolutely
|
264 |
+
continuous Bloch bands populated by extended eigen-
|
265 |
+
functions. We have checked that for any energy belong-
|
266 |
+
ing to the resonant band, the overlap parameter keeps
|
267 |
+
on non-decaying behavior and that is a signature of the
|
268 |
+
state being delocalized. At the band center (E = 0), the
|
269 |
+
central spike confirms the existence of momentum inde-
|
270 |
+
pendent flat band state which is an inherent signature of
|
271 |
+
the Lieb geometry. The spectral divergence correspond-
|
272 |
+
ing to the zero energy mode comes from the vanishing
|
273 |
+
group velocity of the wave packet as ρ ∝
|
274 |
+
�
|
275 |
+
v−1
|
276 |
+
g dk. With
|
277 |
+
the aid of difference equation one can obtain the distribu-
|
278 |
+
tion of amplitude for such self-localized eigenstate. The
|
279 |
+
non-vanishing amplitudes are pinned at the intermediate
|
280 |
+
sites as shown in Fig. 2(b) and one such characteristic
|
281 |
+
trapping island is isolated from the other by a distinct
|
282 |
+
physical boundary formed by the sites with zero ampli-
|
283 |
+
tude as a result of destructive quantum interference. The
|
284 |
+
dispersionless nature of the central band is responsible for
|
285 |
+
anomalous behavior in the transport and optical prop-
|
286 |
+
erties. The construction of this state definitely resem-
|
287 |
+
bles the essence of a molecular state which is spatially
|
288 |
+
quenched within a finite size cluster of atomic sites. The
|
289 |
+
analogous wave function does not present any evolution
|
290 |
+
(a)
|
291 |
+
(b)
|
292 |
+
0
|
293 |
+
0
|
294 |
+
0
|
295 |
+
0
|
296 |
+
+1
|
297 |
+
−1
|
298 |
+
0
|
299 |
+
0
|
300 |
+
0
|
301 |
+
0
|
302 |
+
−1
|
303 |
+
+1
|
304 |
+
−1
|
305 |
+
+1
|
306 |
+
0
|
307 |
+
0
|
308 |
+
0
|
309 |
+
0
|
310 |
+
(c)
|
311 |
+
�4
|
312 |
+
�2
|
313 |
+
0
|
314 |
+
2
|
315 |
+
4
|
316 |
+
0.0
|
317 |
+
0.1
|
318 |
+
0.2
|
319 |
+
0.3
|
320 |
+
0.4
|
321 |
+
E
|
322 |
+
T �E�
|
323 |
+
FIG. 2: (Color online) (a) Plot of density of eigenstates as
|
324 |
+
a function of energy E for quasi-one dimensional Lieb-ladder
|
325 |
+
geometry, (b) denotes the amplitude distribution profile for
|
326 |
+
E = 0 and (c)variation of transmittance with energy.
|
327 |
+
dynamics beyond the trapping cell. Extremely low mo-
|
328 |
+
bility of the wave train is the key factor for the disper-
|
329 |
+
sionless signature of the state. But here we should point
|
330 |
+
out that since the compact localized state, thus formed,
|
331 |
+
lies inside the continuum zone of extended states, here
|
332 |
+
the hopping integral never dies out for E = 0. Hence,
|
333 |
+
one should observe non-zero transport for that particu-
|
334 |
+
lar mode. The localization character can be prominently
|
335 |
+
viewed in presence of any perturbation when the spec-
|
336 |
+
trum shows central gap around E = 0, if any.
|
337 |
+
To corroborate the above findings related to the spec-
|
338 |
+
tral landscape we now present a precise discussion to
|
339 |
+
elucidate the electronic transmission characteristics for
|
340 |
+
this quasi-one dimensional system. For this analysis we
|
341 |
+
have considered a finite-sized underlying network. Now
|
342 |
+
the ladder-like system needs to be clamped in between
|
343 |
+
two pairs of semi-infinite periodic leads with the corre-
|
344 |
+
sponding parameters. One can then adopt the standard
|
345 |
+
green’s function approach [45, 46] and compute the same
|
346 |
+
for the composite system (lead-system-lead). The trans-
|
347 |
+
mission probability [47]-[51] can be written in terms of
|
348 |
+
this green’s function including the self-energy term as,
|
349 |
+
τij = T r[ΓiGr
|
350 |
+
i ΓjGa
|
351 |
+
i ]
|
352 |
+
(5)
|
353 |
+
|
354 |
+
1.0
|
355 |
+
0.8
|
356 |
+
0.6
|
357 |
+
Q
|
358 |
+
0.4
|
359 |
+
0.2
|
360 |
+
0.0
|
361 |
+
-2
|
362 |
+
-3
|
363 |
+
-1
|
364 |
+
0
|
365 |
+
2
|
366 |
+
3
|
367 |
+
1
|
368 |
+
E4
|
369 |
+
Here the terms Γi and Γj respectively denote the con-
|
370 |
+
nection of the network with the i-th and j-th leads and
|
371 |
+
G’s are the retarded and advanced Green’s functions of
|
372 |
+
the system. The result is demonstrated in the Fig. 2(c).
|
373 |
+
It describes a wide resonant window for which we have
|
374 |
+
obtained ballistic transport.
|
375 |
+
The existence of Bloch-
|
376 |
+
like eigenfunctions for this wide range of Fermi energy
|
377 |
+
is solely responsible for this high transmission behavior.
|
378 |
+
The conducting nature of the spectral density is basically
|
379 |
+
reflected in this transmission plot.
|
380 |
+
B.
|
381 |
+
Band dispersion
|
382 |
+
To study the energy-momentum relation of this peri-
|
383 |
+
odic system we will cast the original Hamiltonian in terms
|
384 |
+
of wave vector k by virtue of the following expression,
|
385 |
+
H =
|
386 |
+
�
|
387 |
+
k
|
388 |
+
ψ†
|
389 |
+
kH(k)ψk
|
390 |
+
(6)
|
391 |
+
Using this relation, the Hamiltonian matrix in k-space
|
392 |
+
reads as,
|
393 |
+
H(k) =
|
394 |
+
|
395 |
+
|
396 |
+
ǫ
|
397 |
+
t
|
398 |
+
0
|
399 |
+
t(1 + e−ika)
|
400 |
+
0
|
401 |
+
t
|
402 |
+
ǫ
|
403 |
+
t
|
404 |
+
0
|
405 |
+
0
|
406 |
+
0
|
407 |
+
t
|
408 |
+
ǫ
|
409 |
+
0
|
410 |
+
t(1 + e−ika)
|
411 |
+
t(1 + eika) 0
|
412 |
+
0
|
413 |
+
ǫ
|
414 |
+
0
|
415 |
+
0
|
416 |
+
0 t(1 + eika)
|
417 |
+
0
|
418 |
+
ǫ
|
419 |
+
|
420 |
+
|
421 |
+
(7)
|
422 |
+
The straightforward diagonalization of the above matrix
|
423 |
+
�Π
|
424 |
+
� Π
|
425 |
+
2
|
426 |
+
0
|
427 |
+
Π
|
428 |
+
2
|
429 |
+
Π
|
430 |
+
�2
|
431 |
+
�3
|
432 |
+
�1
|
433 |
+
0
|
434 |
+
1
|
435 |
+
2
|
436 |
+
3
|
437 |
+
ka
|
438 |
+
E
|
439 |
+
FIG. 3: (Color online) Band dispersion diagram of a quasi-
|
440 |
+
one dimensional Lieb-ladder network showing the central flat
|
441 |
+
band and other two pairs of dispersive bands.
|
442 |
+
reveals the entire band picture of the Lieb-ladder network
|
443 |
+
as presented in Fig. 3. It clearly shows one momentum
|
444 |
+
insensitive non-dispersive band at E = 0 with absolutely
|
445 |
+
zero curvature and two pairs of Bloch bands carrying
|
446 |
+
dispersive signature at E = ±
|
447 |
+
�
|
448 |
+
2(1 + cos ka) and E =
|
449 |
+
±
|
450 |
+
�
|
451 |
+
2(2 + cos ka). The central flat band state confirms
|
452 |
+
the existence of robust type of molecular state.
|
453 |
+
Φ
|
454 |
+
Φ
|
455 |
+
Φ
|
456 |
+
Φ
|
457 |
+
Φ
|
458 |
+
Φ
|
459 |
+
Φ
|
460 |
+
FIG. 4: (Color online) A quasi-one dimensional array of Lieb-
|
461 |
+
ladder geometry with next nearest neighbor (NNN) hopping
|
462 |
+
term incorporated by a diamond loop threaded by uniform
|
463 |
+
magnetic flux Φ.
|
464 |
+
III.
|
465 |
+
DIAMOND-LIEB NETWORK
|
466 |
+
In the previous description presented so far, the off-
|
467 |
+
diagonal element, i.e., the hopping parameter is taken to
|
468 |
+
be restricted within the nearest neighboring atomic sites
|
469 |
+
only within the tight-binding formulation. We now con-
|
470 |
+
sider the same quasi-one dimensional Lieb-ladder geom-
|
471 |
+
etry with next nearest neighbor (NNN) hopping integral
|
472 |
+
taken into consideration between the A types of sites as
|
473 |
+
cited in the Fig. 4. With the inclusion of longer range
|
474 |
+
connectivity the entire periodic geometry turns out to
|
475 |
+
be quasi-one dimensional Lieb ladder with a rhombic ge-
|
476 |
+
ometry embedded inside the skeleton.
|
477 |
+
This additional
|
478 |
+
overlap parameter introduces another closed loop within
|
479 |
+
each unit cell where the impact of application of magnetic
|
480 |
+
perturbation may be examined in details.
|
481 |
+
(a)
|
482 |
+
�2
|
483 |
+
�1
|
484 |
+
0
|
485 |
+
1
|
486 |
+
2
|
487 |
+
�4
|
488 |
+
�2
|
489 |
+
0
|
490 |
+
2
|
491 |
+
4
|
492 |
+
���0
|
493 |
+
E
|
494 |
+
(b)
|
495 |
+
0
|
496 |
+
0
|
497 |
+
0
|
498 |
+
0
|
499 |
+
0
|
500 |
+
0
|
501 |
+
−1
|
502 |
+
−1
|
503 |
+
+1
|
504 |
+
+1
|
505 |
+
0
|
506 |
+
0
|
507 |
+
0
|
508 |
+
0
|
509 |
+
+1
|
510 |
+
+1
|
511 |
+
−1
|
512 |
+
−1
|
513 |
+
Φ
|
514 |
+
Φ
|
515 |
+
Φ
|
516 |
+
FIG. 5: (Color online) (a) Presentation of allowed eigenspec-
|
517 |
+
trum as a function of magnetic flux for diamond-Lieb net-
|
518 |
+
work and (b) amplitude profile corresponding to the energy
|
519 |
+
E = ǫ − 2t cos Θ.
|
520 |
+
Before presenting the numerical results and discussion
|
521 |
+
it is necessary to mention that uniform magnetic pertur-
|
522 |
+
bation may also be applied within each rhombic plaque-
|
523 |
+
tte. This can be feasible by an appropriate choice of the
|
524 |
+
gauge. This can introduce additional externally tunable
|
525 |
+
parameter which may lead to interesting band engineer-
|
526 |
+
ing. This flux tunable localization of excitation will be
|
527 |
+
discussed in the subsequent subsection.
|
528 |
+
|
529 |
+
5
|
530 |
+
A.
|
531 |
+
Allowed eigenspectrum as a function of flux
|
532 |
+
Now we analyze the impact of uniform magnetic per-
|
533 |
+
turbation on the sustainability of the self-localized states.
|
534 |
+
The magnetic flux is applied inside each embedded rhom-
|
535 |
+
bic plaquette. As a result of this application of magnetic
|
536 |
+
flux, the time reversal symmetry is broken (at least lo-
|
537 |
+
cally) along the arm of the rhombic plaquette. This is
|
538 |
+
considered by introducing a Peierls’ phase factor associ-
|
539 |
+
ated with the hopping integral, viz., t → teiΘ, where,
|
540 |
+
Θ = 2πΦ/4Φ0 and Φ0 = hc/e is termed as funda-
|
541 |
+
mental flux quantum.
|
542 |
+
The resultant nature of quan-
|
543 |
+
tum interference happened due to multiple quantum dots
|
544 |
+
is the ultimate determining factor for the sustainability
|
545 |
+
of the self-localized modes after applying the perturba-
|
546 |
+
tion. Here we have evaluated the allowed eigenspectrum
|
547 |
+
(Fig. 5(a)) with respect to the applied flux for this flux
|
548 |
+
included quasi-one dimensional diamond-Lieb geometry.
|
549 |
+
The spectrum is inevitably flux periodic. Multiple band
|
550 |
+
crossings, formation of several minibands and thus merg-
|
551 |
+
ing of each other are seen in this quasi-continuous pat-
|
552 |
+
tern.
|
553 |
+
Here we should give emphasis on a pertinent issue.
|
554 |
+
Fig. 5(b) shows a consistent demonstration of ampli-
|
555 |
+
tude profile (satisfying the difference equation) for en-
|
556 |
+
ergy E = ǫ − 2t cos Θ, ǫ being the uniform potential
|
557 |
+
energy everywhere. One non-vanishing cluster is again
|
558 |
+
isolated from the other by a physical barrier formed by
|
559 |
+
the sites with zero amplitude as a direct consequence of
|
560 |
+
phase cancellation at those nodes. This immediately tells
|
561 |
+
us that the incoming electron coming with this particu-
|
562 |
+
lar value of energy will be localized inside the trapping
|
563 |
+
island. But now the energy eigenvalue is sensible to the
|
564 |
+
applied flux which is an external agency. The central mo-
|
565 |
+
tivation behind the application of this external parameter
|
566 |
+
is that if possible, we may invite a comprehensive tun-
|
567 |
+
ability of such bound states solely by manipulating the
|
568 |
+
applied flux. We do not need to disturb any internal pa-
|
569 |
+
rameter of the system, instead one can, in principle, con-
|
570 |
+
trol the band engineering externally by a suitable choice
|
571 |
+
of flux. The external perturbation can be tuned contin-
|
572 |
+
uously satisfying the eigenvalue equation to control the
|
573 |
+
position of the caged state.
|
574 |
+
B.
|
575 |
+
Density of states profile
|
576 |
+
For the completeness of the analysis, we have com-
|
577 |
+
puted the variation of density of states profile as a func-
|
578 |
+
tion of energy of the incoming projectile for this quasi-one
|
579 |
+
dimensional lattice with longer wavelength fluctuation
|
580 |
+
using the standard green’s function technique both in
|
581 |
+
the absence and presence of external perturbation. The
|
582 |
+
variation with respect to the energy of the incoming pro-
|
583 |
+
jectile for different values of magnetic flux is shown in the
|
584 |
+
Fig. 6. The applied flux values are respectively Φ = 0,
|
585 |
+
Φ = Φ0/4 and Φ = Φ0/2. All the variations are plot-
|
586 |
+
ted for system size N = 753. As it is evident from the
|
587 |
+
plots that there are different absolutely continuous sub-
|
588 |
+
bands populated by extended kind of eigenfunctions. The
|
589 |
+
existence of such dispersive modes is expected because
|
590 |
+
of the inherent translational periodicity of the geometry.
|
591 |
+
We have examined that for any mode belonging to the
|
592 |
+
continuum zones the hopping integral shows oscillatory
|
593 |
+
behavior which confirms the signature of the resonant
|
594 |
+
modes. It is needless to say that the intricate nature of
|
595 |
+
the DOS is highly sensitive on the external perturbation.
|
596 |
+
Also the density of states plots as well as the allowed
|
597 |
+
eigenspectrum support the existence of flux dependent
|
598 |
+
caged state as discussed in the previous section.
|
599 |
+
C.
|
600 |
+
Band engineering
|
601 |
+
In presence of uniform magnetic flux one can easily ex-
|
602 |
+
press the Hamiltonian in the k-space language. The di-
|
603 |
+
agonalization of this matrix will give the band dispersion
|
604 |
+
as a function of flux. In this quasi-one dimensional dia-
|
605 |
+
mond Lieb geometry we have got that, there are two flux
|
606 |
+
independent dispersive bands E = ±
|
607 |
+
�
|
608 |
+
2(1 + cos ka) and
|
609 |
+
three other flux sensible resonant bands. Therefore we
|
610 |
+
should highlight a very pertinent issue here. For the last
|
611 |
+
three flux dependent bands, one can easily control the
|
612 |
+
group velocity of the wave train as well as the effective
|
613 |
+
mass (equivalently the mobility) of the particle by tuning
|
614 |
+
the external source of perturbation. This non-trivial ma-
|
615 |
+
nipulation of the internal parameters of the system with
|
616 |
+
the aid of flux makes this aspect of band engineering more
|
617 |
+
challenging as well as interesting indeed.
|
618 |
+
Before going to detailed discussion, it is important to
|
619 |
+
be noted that, when an electron moves around a closed
|
620 |
+
loop that traps a magnetic flux, the wave function picks
|
621 |
+
up a phase related to the magnetic vector potential, viz.,
|
622 |
+
ψ = ψ0ei
|
623 |
+
�
|
624 |
+
A.dr. The magnetic flux here plays an equiva-
|
625 |
+
lent role as the wave vector [55]. One can thus think of a
|
626 |
+
k−Φ/Φ0 diagram which is equivalent to a typical kx−ky
|
627 |
+
diagram for electrons traveling in a two-dimensional pe-
|
628 |
+
riodic lattice. The “Brillouin zone” equivalents are ex-
|
629 |
+
pected to show up, across which variations of the group
|
630 |
+
velocity will take place. This is precisely shown in the
|
631 |
+
Fig. 7. In this plot, every contour presented corresponds
|
632 |
+
to a definite value (positive or negative) of the group
|
633 |
+
velocity of the wave packet. The red lines are the con-
|
634 |
+
tours with zero mobility. Hence they are the equivalents
|
635 |
+
of the boundaries of the Brillouin zone across which the
|
636 |
+
group velocity reverts its sign if one moves parallel to
|
637 |
+
the Φ-axis at any fixed value of the wave vector k, or vice
|
638 |
+
versa. This essentially signifies that, we can, in principle,
|
639 |
+
make an electron accelerate (or retard) without manipu-
|
640 |
+
lating its energy by changing the applied magnetic flux
|
641 |
+
only. The vanishing group velocity contours (marked by
|
642 |
+
red) indicate that the associated wavefunctions are self-
|
643 |
+
localized around finite size islands of atomic sites, making
|
644 |
+
the eigenmode a non-dispersive one. As the curvature of
|
645 |
+
the band is related to the mobility of the wave packet one
|
646 |
+
can conclude from the Fig. 7 that tuning of the curva-
|
647 |
+
|
648 |
+
6
|
649 |
+
(a)
|
650 |
+
�4
|
651 |
+
�2
|
652 |
+
0
|
653 |
+
2
|
654 |
+
4
|
655 |
+
0.0
|
656 |
+
0.2
|
657 |
+
0.4
|
658 |
+
0.6
|
659 |
+
0.8
|
660 |
+
1.0
|
661 |
+
E
|
662 |
+
Ρ
|
663 |
+
(b)
|
664 |
+
�4
|
665 |
+
�2
|
666 |
+
0
|
667 |
+
2
|
668 |
+
4
|
669 |
+
0.0
|
670 |
+
0.2
|
671 |
+
0.4
|
672 |
+
0.6
|
673 |
+
0.8
|
674 |
+
1.0
|
675 |
+
E
|
676 |
+
Ρ
|
677 |
+
(c)
|
678 |
+
�4
|
679 |
+
�2
|
680 |
+
0
|
681 |
+
2
|
682 |
+
4
|
683 |
+
0.0
|
684 |
+
0.2
|
685 |
+
0.4
|
686 |
+
0.6
|
687 |
+
0.8
|
688 |
+
1.0
|
689 |
+
E
|
690 |
+
Ρ
|
691 |
+
FIG. 6: (Color online) Variation of density of states ρ(E) as a function of energy E of the excitation. The external magnetic
|
692 |
+
flux values are respectively (a) Φ = 0, (b) Φ = Φ0/4 and (c) Φ = Φ0/2.
|
693 |
+
�2
|
694 |
+
�1
|
695 |
+
0
|
696 |
+
1
|
697 |
+
2
|
698 |
+
�Π
|
699 |
+
� Π
|
700 |
+
2
|
701 |
+
0
|
702 |
+
Π
|
703 |
+
2
|
704 |
+
Π
|
705 |
+
���0
|
706 |
+
�
|
707 |
+
FIG. 7: (Color online) k − Φ diagram showing different group
|
708 |
+
velocity contours for electron moving in diamond embedded
|
709 |
+
Lieb geometry. The red lines mark the zero group velocity
|
710 |
+
of the wave packet. These red contours act as border lines
|
711 |
+
showing a continuous change of vg with respect to flux.
|
712 |
+
ture of the dispersive band is also possible with the help
|
713 |
+
of external perturbation.
|
714 |
+
IV.
|
715 |
+
LIEB LADDER WITH QUASIPERIODIC
|
716 |
+
NEXT NEAREST NEIGHBOR INTERACTION
|
717 |
+
In the previous case the amplitude for E = 0 will be
|
718 |
+
pinned at the top and down vertices of the diamond em-
|
719 |
+
bedded. From this standpoint we now decorate each arm
|
720 |
+
of the rhombic plaquette by a finite generation quasiperi-
|
721 |
+
oidic fibonacci kind of geometry with two different hop-
|
722 |
+
pings tx and ty respectively. The generation sequence for
|
723 |
+
this quasiperiodic structure follows the standard inflation
|
724 |
+
rule X → XY and Y → X. Based on this prescription
|
725 |
+
regarding the anisotropy in off-diagonal term, there ex-
|
726 |
+
ists three different types of atomic sites α (flanked by
|
727 |
+
two X-bonds), β (in between X − Y pair) and γ (in be-
|
728 |
+
tween Y − X pair).
|
729 |
+
Here we should mention that we
|
730 |
+
consider the generations with X type of bond at their
|
731 |
+
extremities, i.e., G2n+1, (n being integer). This is only
|
732 |
+
for convenience and does not alter the result Physics-wise
|
733 |
+
as we go for thermodynamic limit.
|
734 |
+
FIG. 8: (Color online) Distribution of self-localized modes
|
735 |
+
showing a typical three-subband pattern for large enough gen-
|
736 |
+
eration.
|
737 |
+
Hence if we start with a odd generation Fibonacci seg-
|
738 |
+
ment that decorates each arm of the diamond, then one
|
739 |
+
can decimate the chain n-times by employing the RSRG
|
740 |
+
method to get back the original diamond structure with
|
741 |
+
renormalized parameters. The recursive flows of the pa-
|
742 |
+
rameters are governed by the following equations, viz.,
|
743 |
+
ǫα(n + 1) = ǫα(n) + t2
|
744 |
+
x(n)
|
745 |
+
∆(n)[2E − (ǫβ(n) + ǫγ(n))]
|
746 |
+
ǫβ(n + 1) = ǫα(n) + (E − ǫβ(n))t2
|
747 |
+
x(n)
|
748 |
+
∆(n)
|
749 |
+
+
|
750 |
+
t2
|
751 |
+
x(n)
|
752 |
+
(E − ǫβ(n))
|
753 |
+
ǫγ(n + 1) = ǫγ(n) + (E − ǫγ(n))t2
|
754 |
+
x(n)
|
755 |
+
∆(n)
|
756 |
+
+
|
757 |
+
t2
|
758 |
+
y(n)
|
759 |
+
(E − ǫβ(n))
|
760 |
+
ǫC(n + 1) = ǫα(n) + 2t2
|
761 |
+
x(n)
|
762 |
+
∆(n) [2E − (ǫβ(n) + ǫγ(n))]
|
763 |
+
tx(n + 1) = t2
|
764 |
+
x(n)ty(n)
|
765 |
+
∆(n)
|
766 |
+
ty(n + 1) =
|
767 |
+
tx(n)ty(n)
|
768 |
+
(E − ǫβ(n))
|
769 |
+
(8)
|
770 |
+
where ∆(n) = [(E − ǫβ(n))(E − ǫγ(n))] − t2
|
771 |
+
y(n)
|
772 |
+
Obviously after decimation if we want to explore the
|
773 |
+
same compact localized state (at E = ǫ) in this renor-
|
774 |
+
malized lattice, then due to the iterative procedure, on-
|
775 |
+
site potential is now a complicated function of energy.
|
776 |
+
|
777 |
+
4
|
778 |
+
***
|
779 |
+
***
|
780 |
+
3
|
781 |
+
+
|
782 |
+
+
|
783 |
+
n
|
784 |
+
2
|
785 |
+
1
|
786 |
+
0
|
787 |
+
1
|
788 |
+
1
|
789 |
+
1
|
790 |
+
1
|
791 |
+
1
|
792 |
+
1
|
793 |
+
-3
|
794 |
+
-2
|
795 |
+
-1
|
796 |
+
0
|
797 |
+
2
|
798 |
+
3
|
799 |
+
1
|
800 |
+
E7
|
801 |
+
And if we now extract roots from the eigenvalue equa-
|
802 |
+
tion (E−ǫα) = 0, all the roots will produce a multifractal
|
803 |
+
distribution of the set of compact localized states. Obvi-
|
804 |
+
ously as we increase the generation of the fibonacci struc-
|
805 |
+
ture, in the thermodynamic limit, all the self-localized
|
806 |
+
modes exhibit a global three subband structure. The pat-
|
807 |
+
tern is already prominent in Fig. 8. Each subband can be
|
808 |
+
fine scanned in the energy scale to bring out the inherent
|
809 |
+
self-similarity and multifractality, the hallmark of the Fi-
|
810 |
+
bonacci quasicrystals [56]. The self-similarity of the spec-
|
811 |
+
trum have been checked by going over to higher enough
|
812 |
+
generations, though we refrain from showing these data
|
813 |
+
to save space here.
|
814 |
+
V.
|
815 |
+
LIEB LADDER WITH FRACTAL TYPE OF
|
816 |
+
LONG RANGE CONNECTION
|
817 |
+
FIG. 9: (Color online) An infinite array of Lieb strip with
|
818 |
+
long range connectivity decorated by fractal object.
|
819 |
+
We start this demonstration from the Fig. 9 where a fi-
|
820 |
+
nite generation of self-similar Vicsek geometry [57, 58] is
|
821 |
+
grafted inside the basic Lieb motif. The longer range con-
|
822 |
+
nection is here established through the aperiodic object.
|
823 |
+
Also a uniform magnetic flux Φ may be applied in each
|
824 |
+
small plaquette of the fractal structure. It should be ap-
|
825 |
+
preciated that while a Lieb geometry in its basic skeleton
|
826 |
+
is known to support a robust type of central self-localized
|
827 |
+
state, the inclusion of fractal structure of a finite genera-
|
828 |
+
tion in each unit cell disturbs the translational ordering
|
829 |
+
locally (though it is maintained on a global scale in the
|
830 |
+
horizontal direction) in the transverse direction.
|
831 |
+
This
|
832 |
+
non-trivial competitive scenario makes the conventional
|
833 |
+
methods of obtaining the self-localized states impossi-
|
834 |
+
ble to be implemented, especially in the thermodynamic
|
835 |
+
limit. We take the help of RSRG technique to bypass this
|
836 |
+
issue and present an analytical formalism from which one
|
837 |
+
can exactly determine the localized modes as a function
|
838 |
+
of external flux. Starting from a finite generation of scale
|
839 |
+
invariant fractal network, after suitable steps of decima-
|
840 |
+
tion [57, 58] one can produce a Lieb ladder geometry
|
841 |
+
with a diamond plaquette embedded into it (as discussed
|
842 |
+
in the previous discussion). The renormalized potential
|
843 |
+
of the top vertex of the diamond is now a complicated
|
844 |
+
function of energy and flux. Therefore straightforward
|
845 |
+
solving of the equation [E − ǫA(E, Φ)] = 0 gives us a in-
|
846 |
+
teresting distribution of compact localized states in the
|
847 |
+
E − Φ space.
|
848 |
+
This non-trivial distribution of eigenvalues as a func-
|
849 |
+
tion of flux may be considered an equivalent dispersion
|
850 |
+
relation since for an electron moving round a closed path,
|
851 |
+
FIG. 10: (Color online) Distribution of self-localized states
|
852 |
+
with applied flux.
|
853 |
+
the magnetic flux behaves the similar physical role as
|
854 |
+
that of the wave vector [55]. The distribution of eigen-
|
855 |
+
modes compose an interesting miniband-like structure as
|
856 |
+
a function of external perturbation. The competition be-
|
857 |
+
tween the global periodicity and the local fractal entity
|
858 |
+
has a crucial impact on this spectrum. We can continu-
|
859 |
+
ously engineer the magnetic flux to engineer the impris-
|
860 |
+
onment of wave train with high selectivity.
|
861 |
+
Moreover,
|
862 |
+
there are a number of inter-twined band overlap, and a
|
863 |
+
quite densely packed distribution of allowed modes, form-
|
864 |
+
ing quasi-continuous E − Φ band structure. Close obser-
|
865 |
+
vation of this eigenspectrum reveals the formation of in-
|
866 |
+
teresting variants of the Hofstadter butterflies [59]. The
|
867 |
+
spectral landscape is a quantum fractal, and encoding
|
868 |
+
the gaps with appropriate topological quantum numbers
|
869 |
+
remains an open problem for such deterministic fractals.
|
870 |
+
Before ending this section we should put emphasis on
|
871 |
+
a very pertinent point.
|
872 |
+
An aperiodic fractal object is
|
873 |
+
inserted in the unit cell of the periodic geometry. The
|
874 |
+
self-similar pattern of the fractal entity will have the in-
|
875 |
+
fluence on the spectrum. All such self-localized modes
|
876 |
+
are the consequences of destructive quantum interfer-
|
877 |
+
ence and the geometrical configuration of the underly-
|
878 |
+
ing system. For this class of energy eigenvalue, the spa-
|
879 |
+
tial span of the cluster of atomic sites containing non-
|
880 |
+
vanishing amplitudes increases with the generation of the
|
881 |
+
fractal geometry incorporated. Hence with an appropri-
|
882 |
+
ate choice of the RSRG index n, the onset of localization
|
883 |
+
and hence the spread of trapping island can be staggered,
|
884 |
+
in space. This tunable delay of the extent of localization
|
885 |
+
has already been studied for a wide varieties of fractal
|
886 |
+
geometries [57, 58, 60, 61]. This comprehensive discus-
|
887 |
+
sion regarding the manipulation of the geometry-induced
|
888 |
+
localization makes the phenomenon of Aharonov-Bohm
|
889 |
+
caging more interesting as well as challenging from the
|
890 |
+
experimental point of view.
|
891 |
+
|
892 |
+
-1.00
|
893 |
+
0.75
|
894 |
+
-0.50
|
895 |
+
-0.25
|
896 |
+
0.25
|
897 |
+
0.50
|
898 |
+
0.75
|
899 |
+
0.00
|
900 |
+
1.00
|
901 |
+
Φ/Φ
|
902 |
+
08
|
903 |
+
(a)
|
904 |
+
(b)
|
905 |
+
1
|
906 |
+
2
|
907 |
+
N
|
908 |
+
1
|
909 |
+
2
|
910 |
+
N
|
911 |
+
Φ
|
912 |
+
FIG. 11: (Color online) (a) Schematic diagram of elementary
|
913 |
+
diamond-Lieb interferometer and (b) demonstrates the deco-
|
914 |
+
ration of basic unit.
|
915 |
+
VI.
|
916 |
+
DIAMOND-LIEB INTERFEROMETER
|
917 |
+
In this section we investigate the spectral character-
|
918 |
+
istics of a quantum network in which each arm of the
|
919 |
+
Lieb-ladder geometry is ‘decorated’ by diamond-shaped
|
920 |
+
Aharonov-Bohm (AB) interferometer [37]. Each elemen-
|
921 |
+
tary interferometer is pierced by a invariable magnetic
|
922 |
+
perturbation applied perpendicular to the plane of the in-
|
923 |
+
terferometer, and traps a flux Φ (in unit of Φ0 = hc/e).
|
924 |
+
This type of diamond based interferometers have been
|
925 |
+
formerly studied as the minimal prototypes of bipartite
|
926 |
+
structures having nodes with different coordination num-
|
927 |
+
bers, and representing a family of itinerant geometri-
|
928 |
+
cally frustrated electronic systems [52]-[54]. We refer to
|
929 |
+
Fig. 11(a). A standard diamond-Lieb AB interferome-
|
930 |
+
ter is shown pictorially there whereas Fig. 11(b) demon-
|
931 |
+
strates that each diamond loop can take a shape of a
|
932 |
+
quantum ring consisting of multiple lattice points. Each
|
933 |
+
arm of the diamond may be decorated by N number of
|
934 |
+
atomic scatterers between the vertices, such that the to-
|
935 |
+
tal number of single level quantum dots contained in a
|
936 |
+
single interferometer is 4(N + 1). An uniform magnetic
|
937 |
+
flux Φ may be allocated within each loop, and the elec-
|
938 |
+
tron hopping is restricted to take the non-vanishing value
|
939 |
+
for the nearest neighboring nodes only.
|
940 |
+
To study the systematic spectral analysis we take the
|
941 |
+
help of RSRG approach. Each elementary loop of the
|
942 |
+
interferometer is properly renormalized to transform it
|
943 |
+
into a simple diamond having just four sites.
|
944 |
+
Due to
|
945 |
+
this decimation process we will get three types of sites
|
946 |
+
A, B and C (respectively marked by black, red and blue
|
947 |
+
colored atomic sites in the Fig. 11(a)) with corresponding
|
948 |
+
parameters given by
|
949 |
+
˜ǫA = ǫ + 6tUN−1(x)
|
950 |
+
UN(x)
|
951 |
+
˜ǫB = ǫ + 4tUN−1(x)
|
952 |
+
UN(x)
|
953 |
+
˜ǫC = ǫ + 2tUN−1(x)
|
954 |
+
UN(x)
|
955 |
+
tF (B) = te±i(N+1)θ/UN(x)
|
956 |
+
(9)
|
957 |
+
Here, UN(x) is the N-th order Chebyshev polynomial of
|
958 |
+
second kind, and x = (E −ǫ)/2t. The ‘effective’ diamond
|
959 |
+
loops are then renormalized in a proper way (C types of
|
960 |
+
sites are being decimated out) such that we will get back
|
961 |
+
the Lieb ladder with renormalized on-site potential and
|
962 |
+
overlap integral respectively given by
|
963 |
+
˜ǫ4 =
|
964 |
+
˜ǫB +
|
965 |
+
4tFtB
|
966 |
+
(E − ǫC)
|
967 |
+
˜ǫ6 =
|
968 |
+
˜ǫA +
|
969 |
+
6tFtB
|
970 |
+
(E − ǫC)
|
971 |
+
˜t =
|
972 |
+
2tF tB
|
973 |
+
(E − ǫC)
|
974 |
+
(10)
|
975 |
+
We will now exploit all the above equations to extract the
|
976 |
+
detailed information about the electronic spectrum and
|
977 |
+
the nature of the eigenstates provided by such a model
|
978 |
+
interferometer.
|
979 |
+
A.
|
980 |
+
Spectral landscape and inverse participation
|
981 |
+
ratio
|
982 |
+
To analyze we first put N = 0 here so that the quan-
|
983 |
+
tum ring of elementary interferometer takes the form of a
|
984 |
+
diamond (Fig. 11(a)). The density of states with energy
|
985 |
+
for different values of magnetic flux enclosed within each
|
986 |
+
elementary interferometer is shown in the upper panel of
|
987 |
+
the Fig. 12. From the plot, we see that in absence of
|
988 |
+
magnetic flux the density of states reflects the periodic
|
989 |
+
nature of the geometry. It consists of absolutely contin-
|
990 |
+
uous zones populated by resonant eigenstates with sharp
|
991 |
+
spikes at E = 0 and ±2.
|
992 |
+
But here it is to be noted
|
993 |
+
that the localized character of those modes cannot be
|
994 |
+
distinctly revealed because of its position within the con-
|
995 |
+
tinuum of extended modes. But when we apply quarter
|
996 |
+
flux quantum the central localized mode becomes iso-
|
997 |
+
lated and prominent. It is also seen from the plots that
|
998 |
+
with the gradual increment of flux value the window of
|
999 |
+
resonant modes in the DOS profile shrinks along the en-
|
1000 |
+
ergy scale and ultimately leads to extreme localization of
|
1001 |
+
eigenstates for half flux quantum.
|
1002 |
+
Actually, the effec-
|
1003 |
+
tive overlap parameter between the two axial extremities
|
1004 |
+
of the interferometer vanishes for this special flux value
|
1005 |
+
and this makes the complete absence of resonant modes
|
1006 |
+
to be possible. This is the basic physical background of
|
1007 |
+
extreme localization of excitation. We should appreciate
|
1008 |
+
that this typical flux induced localization of wave train
|
1009 |
+
inside a charateristic trapping island is a subset of the
|
1010 |
+
usual Aharonov-Bohm caging [27]
|
1011 |
+
For the sake of completeness of the discussion related
|
1012 |
+
to the spectral property of such quantum interferometer
|
1013 |
+
model, we have also calculated the inverse participation
|
1014 |
+
ratio (IPR) to certify the above density of states plots.
|
1015 |
+
To formulate the localization of a normalized eigenstate
|
1016 |
+
the inverse participation ratio is defined as
|
1017 |
+
I =
|
1018 |
+
L
|
1019 |
+
�
|
1020 |
+
i=1
|
1021 |
+
|ψi|4
|
1022 |
+
(11)
|
1023 |
+
|
1024 |
+
9
|
1025 |
+
(a)
|
1026 |
+
�4
|
1027 |
+
�2
|
1028 |
+
0
|
1029 |
+
2
|
1030 |
+
4
|
1031 |
+
0
|
1032 |
+
0.2
|
1033 |
+
0.4
|
1034 |
+
0.6
|
1035 |
+
0.8
|
1036 |
+
1
|
1037 |
+
E
|
1038 |
+
Ρ
|
1039 |
+
(b)
|
1040 |
+
�4
|
1041 |
+
�2
|
1042 |
+
0
|
1043 |
+
2
|
1044 |
+
4
|
1045 |
+
0
|
1046 |
+
0.2
|
1047 |
+
0.4
|
1048 |
+
0.6
|
1049 |
+
0.8
|
1050 |
+
1
|
1051 |
+
E
|
1052 |
+
Ρ
|
1053 |
+
(c)
|
1054 |
+
�4
|
1055 |
+
�2
|
1056 |
+
0
|
1057 |
+
2
|
1058 |
+
4
|
1059 |
+
0
|
1060 |
+
0.2
|
1061 |
+
0.4
|
1062 |
+
0.6
|
1063 |
+
0.8
|
1064 |
+
1
|
1065 |
+
E
|
1066 |
+
Ρ
|
1067 |
+
(d)
|
1068 |
+
�4
|
1069 |
+
�2
|
1070 |
+
0
|
1071 |
+
2
|
1072 |
+
4
|
1073 |
+
0.005
|
1074 |
+
0.010
|
1075 |
+
0.015
|
1076 |
+
0.020
|
1077 |
+
0.025
|
1078 |
+
0.030
|
1079 |
+
0.035
|
1080 |
+
0.040
|
1081 |
+
E
|
1082 |
+
IPR
|
1083 |
+
(e)
|
1084 |
+
�4
|
1085 |
+
�2
|
1086 |
+
0
|
1087 |
+
2
|
1088 |
+
4
|
1089 |
+
0.01
|
1090 |
+
0.02
|
1091 |
+
0.03
|
1092 |
+
0.04
|
1093 |
+
0.05
|
1094 |
+
0.06
|
1095 |
+
E
|
1096 |
+
IPR
|
1097 |
+
(f)
|
1098 |
+
�4
|
1099 |
+
�2
|
1100 |
+
0
|
1101 |
+
2
|
1102 |
+
4
|
1103 |
+
0.1
|
1104 |
+
0.2
|
1105 |
+
0.3
|
1106 |
+
0.4
|
1107 |
+
0.5
|
1108 |
+
E
|
1109 |
+
IPR
|
1110 |
+
FIG. 12: (Color online) (Upper panel) Variation of density of states ρ(E) as a function of energy E of the excitation and
|
1111 |
+
(lower panel) indicates the variation of inversion participation ratio (IPR) wth energy. The external magnetic flux values are
|
1112 |
+
respectively (a) Φ = 0, (b) Φ = Φ0/4 and (c) Φ = Φ0/2.
|
1113 |
+
It is known that for an extended mode IPR goes as 1/L,
|
1114 |
+
but it approaches to unity for a localized state. The lower
|
1115 |
+
panel of Fig. 12 describes the variation of IPR with the
|
1116 |
+
energy of the injected projectile for different flux values.
|
1117 |
+
It is evident from the plots that the IPR supports the
|
1118 |
+
spectral profile cited in the upper panel of Fig. 12. As
|
1119 |
+
we see that with nominal strength of perturbation the
|
1120 |
+
central gap opens up around E = 0, clearly indicating
|
1121 |
+
the central localized mode.
|
1122 |
+
The shrinking of resonant
|
1123 |
+
window with the gradual increment of flux is also ap-
|
1124 |
+
parent from the IPR plots. It is also interesting to ap-
|
1125 |
+
preciate that for half flux quantum IPR plot (Fig. 12f)
|
1126 |
+
also demonstrates the AB-caging leading to the extreme
|
1127 |
+
localization of eigenstates.
|
1128 |
+
B.
|
1129 |
+
Flux dependent eigenspectrum
|
1130 |
+
�2
|
1131 |
+
�1
|
1132 |
+
0
|
1133 |
+
1
|
1134 |
+
2
|
1135 |
+
�3
|
1136 |
+
�2
|
1137 |
+
�1
|
1138 |
+
0
|
1139 |
+
1
|
1140 |
+
2
|
1141 |
+
3
|
1142 |
+
���0
|
1143 |
+
E
|
1144 |
+
FIG. 13: (Color online) Flux dependent allowed eigenspec-
|
1145 |
+
trum for the diamond-Lieb AB-interferometer model.
|
1146 |
+
The
|
1147 |
+
pattern is flux periodic.
|
1148 |
+
Fig. 13 represents the essential graphical variation of
|
1149 |
+
allowed eigenspectrum for a diamond-Lieb AB interfer-
|
1150 |
+
ometer with N = 0 with respect to the external magnetic
|
1151 |
+
flux. With the increment of N, the number of scatterers
|
1152 |
+
in each elementary interferometer, the spectrum will be
|
1153 |
+
densely packed with several band crossings. The present
|
1154 |
+
variation is seen to be flux periodic of periodicity equal
|
1155 |
+
to one flux quantum. It is needless to say that the eigen-
|
1156 |
+
spectrum is inevitably sensitive to the numerical values
|
1157 |
+
of the parameters of the Hamiltonian. However, the pe-
|
1158 |
+
riodicity retains for such spectrum after every single flux
|
1159 |
+
quantum change of the external perturbation.
|
1160 |
+
It is observed that there is a tendency of clustering of
|
1161 |
+
the allowed eigenvalues towards the edges of the eigen-
|
1162 |
+
spectrum as is clear from the above-mentioned diagram.
|
1163 |
+
A number of band crossings are noticed and the spec-
|
1164 |
+
trum cites kind of a zero band gap semiconductor like
|
1165 |
+
behavior, mimicking Dirac point as observed in case of
|
1166 |
+
graphene, at Φ/Φ0 = ±i, i being an integer including
|
1167 |
+
zero. As we increase the complexity in each interferom-
|
1168 |
+
eter by increasing N, the central gap gets consequently
|
1169 |
+
filled up by more eigenstates, and the E −Φ contours get
|
1170 |
+
more flattened up forming a quasi-continuous spectrum,
|
1171 |
+
exotic in nature. The central eigenstate corresponding to
|
1172 |
+
eigenvalue E = 0 is a robust kind of mode irrespective of
|
1173 |
+
the application of perturbation, i.e., the existence of that
|
1174 |
+
state is insensitive to the value of the external flux. More-
|
1175 |
+
over, when the magnetic flux is set as Φ = (i+1/2)Φ0, we
|
1176 |
+
observe a spectral collapse. In that case one can easily
|
1177 |
+
identify the localization character of the central state.
|
1178 |
+
Most importantly, it is evident from the spectral land-
|
1179 |
+
scape that the it consists of a set of discrete points (eigen-
|
1180 |
+
values) for half flux quantum. This is the canonical case
|
1181 |
+
of extreme localization. For such special flux value the
|
1182 |
+
vanishing overlap parameter makes the geometry equiv-
|
1183 |
+
alent to discrete set of lattice points with zero connectiv-
|
1184 |
+
ity between them. This makes the excitation to be caged
|
1185 |
+
|
1186 |
+
10
|
1187 |
+
within the trapping island. Further it is to be noted that
|
1188 |
+
this AB-caging [27] may happen for any value of N, the
|
1189 |
+
number of eigenvalues in the discrete set depends on the
|
1190 |
+
choice of N.
|
1191 |
+
VII.
|
1192 |
+
CLOSING REMARKS
|
1193 |
+
A methodical analysis of the flux induced tunable
|
1194 |
+
caging of excitation in a quasi-one dimensional Lieb net-
|
1195 |
+
work with long range connectivity is reported in this
|
1196 |
+
manuscript within the tight-binding framework.
|
1197 |
+
With
|
1198 |
+
the inclusion of second neighbor overlap integral in a dec-
|
1199 |
+
orated way, external source of perturbation can act as an
|
1200 |
+
important role for the selective caging of wave packet.
|
1201 |
+
Flux dependent band engineering and hence the com-
|
1202 |
+
prehensive control over the group velocity of the wave
|
1203 |
+
train as well as the band curvature are studied in de-
|
1204 |
+
tails. Decoration of the next nearest neighbor hopping
|
1205 |
+
in certain quasiperiodic fashion or by some determinis-
|
1206 |
+
tic fractal object is also demonstrated analytically. Real
|
1207 |
+
space renormalization group approach provides us a suit-
|
1208 |
+
able platform to obtain an exact prescription for the de-
|
1209 |
+
termination of self-localized modes induced by destruc-
|
1210 |
+
tive quantum interference effect. As we have seen that
|
1211 |
+
in the quasiperiodic Fibonacci variation the distribution
|
1212 |
+
of eigenstates shows a standard three-subband pattern
|
1213 |
+
while in case of fractal entity countably infinite number
|
1214 |
+
of localized modes cite an interesting quasi-continuous
|
1215 |
+
distribution against flux. We have also critically studied
|
1216 |
+
the spectral properties of a diamond Lieb interferome-
|
1217 |
+
ter. The energy spectrum shows an exotic feature com-
|
1218 |
+
prising extended, staggered and edge-localized eigenfunc-
|
1219 |
+
tions. The number of such states depend on the number
|
1220 |
+
of quantum dots present in each arm of the elementary
|
1221 |
+
diamond interferometer, and can populate the spectral
|
1222 |
+
landscape as densely as desired by the experimentalists.
|
1223 |
+
A constant magnetic perturbation can be utilized to con-
|
1224 |
+
trol the positions of all such states. Moreover at special
|
1225 |
+
flux value the spectrum describes the Aharonov-Bohm
|
1226 |
+
caging of eigenstates leading to an interesting spectral
|
1227 |
+
collapse.
|
1228 |
+
Acknowledgments
|
1229 |
+
The author is thankful for the stimulating discussions
|
1230 |
+
regarding the results with Dr. Amrita Mukherjee. The
|
1231 |
+
author also gratefully acknowledges the fruitful discus-
|
1232 |
+
sion made with Prof. A. Chakrabarti.
|
1233 |
+
[1] S. Mukherjee, A. Spracklen, D. Choudhury, N. Goldman,
|
1234 |
+
P. ¨Ohberg, E. Andersson, and R. R. Thomson, Phys. Rev.
|
1235 |
+
Lett. 114, 245504 (2015).
|
1236 |
+
[2] S. Mukherjee and R. R. Thomson, Opt. Lett. 40, 5443
|
1237 |
+
(2015).
|
1238 |
+
[3] R. A. Vicencio, C. Cantillano, L. Morales-Inostroza, B.
|
1239 |
+
Real, C. Mej´ıa-Cort`es, S. Weimann, A. Szameit, and M.
|
1240 |
+
I. Molina Phys. Rev. Lett. textbf114 245503 (2015).
|
1241 |
+
[4] P. W. Anderson, Phys. Rev. 109, 1492 (1958).
|
1242 |
+
[5] I. Bloch, J. Dalibard, and W. Zwerger, Rev. Mod. Phys.
|
1243 |
+
80, 885 (2008).
|
1244 |
+
[6] D. N. Christodoulides, F. Lederer, and Y. Silberberg,
|
1245 |
+
Nature, 424, 817 (2003).
|
1246 |
+
[7] N. Masumoto, N. Y. Kim, T. Byrnes, K. Kusudo, A.
|
1247 |
+
L¨offler, S. H¨ofling, A. Forchel, and Y. Yamamoto, New.
|
1248 |
+
J. Phys. 14, 065002 (2012).
|
1249 |
+
[8] R.G. Dias, J.D. Gouveia, Sci. Rep. 5 16852 (2015).
|
1250 |
+
[9] M. Hyrk¨as, V. Apaja, M. Manninen, Phys. Rev. A 87,
|
1251 |
+
023614 (2013).
|
1252 |
+
[10] L. Morales-Inostroza, R.A. Vicencio, Phys. Rev. A 94,
|
1253 |
+
043831 (2016).
|
1254 |
+
[11] A. Ramachandran, A. Andreanov, S. Flach, Phys. Rev.
|
1255 |
+
B 96, 161104(R) (2017).
|
1256 |
+
[12] S. Flach, D. Leykam, J. D. Bodyfelt, P. Matthies, A. S.
|
1257 |
+
Desyatnikov, Europhys. Lett. 105, 30001 (2014).
|
1258 |
+
[13] J. D. Bodyfelt, D. Leykam, C. Danieli, X. Yu, S. Flach,
|
1259 |
+
Phys. Rev. Lett. 113, 236403 (2014).
|
1260 |
+
[14] W. Maimaiti, A. Andreanov, H. C. Park, O. Gendelman,
|
1261 |
+
S. Flach, Phys. Rev. B 95, 115135 (2017).
|
1262 |
+
[15] D. Leykam, A. Andreanov, S. Flach, Adv. Phys. X 3,
|
1263 |
+
1473052 (2018).
|
1264 |
+
[16] B. Sutherland, Phys. Rev. B 34, 5208 (1986).
|
1265 |
+
[17] M. Goda, S. Nishino, and H. Matsuda, Phys. Rev. Lett.
|
1266 |
+
96, 126401 (2006).
|
1267 |
+
[18] J. T. Chalker, T. S. Pickles, and P. Shukla, Phys. Rev.
|
1268 |
+
B 82, 104209 (2010).
|
1269 |
+
[19] H. Tasaki, Phys. Rev. Lett. 69, 1608 (1992).
|
1270 |
+
[20] M. Maksymenko, A. Honecker, R. Moessner, J. Richter,
|
1271 |
+
and O. Derzhko, Phys. Rev. Lett. 109, 096404 (2012).
|
1272 |
+
[21] V. J. Kauppila, F. Aikebaier, and T. T. Heikkil¨a, Phys.
|
1273 |
+
Rev. B 93, 214505 (2016).
|
1274 |
+
[22] S. Peotta and P. T¨orm¨a, Nat. Comm. 6, 8944 (2015).
|
1275 |
+
[23] Y.-F. Wang, Z.-C. Gu, C.-D. Gong, and D. N. Sheng,
|
1276 |
+
Phys. Rev. Lett. 107, 146803 (2011).
|
1277 |
+
[24] K. Kusakabe and H. Aoki, Phys. Rev. Lett. 72, 144
|
1278 |
+
(1994).
|
1279 |
+
[25] A. Mielke J. Phys. A-Math. Gen. 25, 4335 (1992).
|
1280 |
+
[26] E. H. Lieb, Phys. Rev. Lett. 62, 1201 (1989).
|
1281 |
+
[27] J. Vidal, R. Mosseri, and B. Doucot, Phys. Rev. Lett.
|
1282 |
+
81, 5888 (1998).
|
1283 |
+
[28] Y. Aharonov and D. Bohm, Phys. Rev. B 115, 485
|
1284 |
+
(1959).
|
1285 |
+
[29] S. Washburn and R. A. Webb, Adv. Phys. 35, 375 (1986).
|
1286 |
+
[30] M. B¨uttiker, Y. Imry, and M. Ya. Azbel, Phys. Rev. A
|
1287 |
+
30, 1982 (1984).
|
1288 |
+
[31] R. Landauer and M. B¨uttiker, Phys. Rev. Lett. 54, 2049
|
1289 |
+
(1985).
|
1290 |
+
[32] A. Levy Yeyati and M. B¨uttiker, Phys. Rev. B 52,
|
1291 |
+
R14360 (1995).
|
1292 |
+
[33] A. Yacoby, M. Heiblum, V. Umansky, H. Shtrikman, and
|
1293 |
+
D. Mahalu, Phys. Rev. Lett. 73, 3149 (1994).
|
1294 |
+
[34] A. Aharony, O. Entin-Wohlman, and Y. Imry, Phys. Rev.
|
1295 |
+
Lett. 90, 156802 (2003).
|
1296 |
+
[35] T. Kubo, Y. Tokusain, and S. Tarucha, J. Phys. A: Math.
|
1297 |
+
|
1298 |
+
11
|
1299 |
+
Theo. 43, 354020 (2010).
|
1300 |
+
[36] M. Yamamoto, S. Takada, C. B¨auerle, K. Watanabe,
|
1301 |
+
A. D. Wieck, and S. Tarucha, Nature Nanotech. 7, 247
|
1302 |
+
(2012).
|
1303 |
+
[37] A. Aharony, S. Takada, O. Entin-Wohlman, M. Ya-
|
1304 |
+
mamoto, and S. Tarucha, New J. Phys. 16, 083015
|
1305 |
+
(2014).
|
1306 |
+
[38] J.S. Andrade Jr., H.J. Herrmann, R.F.S. Andrade, L.R.
|
1307 |
+
da Silva, Phys. Rev. Lett. 94, 018702 (2005).
|
1308 |
+
[39] A.L. Cardoso, R.F.S. Andrade, A.M.C. Souza, Phys.
|
1309 |
+
Rev. B 78, 214202 (2008).
|
1310 |
+
[40] A.A. Lopes, R.G. Dias, Phys. Rev. B 84, 085124 (2011).
|
1311 |
+
[41] D. Bercioux, M. Governale, V. Cataudella, V.M. Ra-
|
1312 |
+
maglia, Phys. Rev. Lett. 93, 056802 (2004).
|
1313 |
+
[42] S. Sil, S.K. Maiti, A. Chakrabarti, Phys. Rev. B 79,
|
1314 |
+
193309 (2009).
|
1315 |
+
[43] J.L. Movilla, J. Planelles, Phys. Rev. B 84 195110 (2011).
|
1316 |
+
[44] A. Aharony, Y. Tokura, G.Z. Cohen, O. Entin-Wohlman,
|
1317 |
+
S. Katsumoto, Phys. Rev. B 84 035323 (2011).
|
1318 |
+
[45] P.O. Lowdin, J. Mol. Spectrosc. 10, 12 (1963).
|
1319 |
+
[46] P.O. Lowdin, J. Math. Phys. 3, 969 (1962).
|
1320 |
+
[47] S. Datta, Electronic Transport in Mesoscopic Systems,
|
1321 |
+
Cambridge University Press, Cambridge, 1997.
|
1322 |
+
[48] S. Datta, Quantum Transport:
|
1323 |
+
Atom to Transistor,
|
1324 |
+
Cambridge University Press, Cambridge, 2005.
|
1325 |
+
[49] P. Dutta, S.K. Maiti, S.N. Karmakar, AIP Adv. 4,
|
1326 |
+
097126 (2014).
|
1327 |
+
[50] P. Dutta, S.K. Maiti, S.N. Karmakar, Org. Electron. 11
|
1328 |
+
1120 (2010).
|
1329 |
+
[51] P. Dutta, S.K. Maiti, S.N. Karmakar, J. Appl. Phys. 114
|
1330 |
+
034306 (2013).
|
1331 |
+
[52] Z. Gul´acsi, A. Kampf, and D. Vollhardt, Phys. Rev. Lett.
|
1332 |
+
99, 026404 (2007).
|
1333 |
+
[53] A. A. Lopes and R. G. Dias, Phys. Rev. B 84, 085124
|
1334 |
+
(2011).
|
1335 |
+
[54] A. A. Lopes, B. A. Z. Ant´onio, and R. G. Dias, Phys.
|
1336 |
+
Rev. B 89, 235418 (2014).
|
1337 |
+
[55] H.-F. Cheung, Y. Gefen, E. K. Riedel, W.-H. Shih, Phys.
|
1338 |
+
Rev. B 37, 6050 (1988).
|
1339 |
+
[56] M. Kohmoto, B. Sutherland, C. Tang, Phys. Rev. B 35,
|
1340 |
+
1020 (1987).
|
1341 |
+
[57] B. Pal, P. Patra, J. P. Saha, and A. Chakrabarti, Phys.
|
1342 |
+
Rev. A 87, 023814 (2013).
|
1343 |
+
[58] B. Pal and A. Chakrabarti, Phys. Rev. B 85, 214203
|
1344 |
+
(2012).
|
1345 |
+
[59] D. R. Hofstadter, Phys. Rev. B 14, 2239 (1976).
|
1346 |
+
[60] A. Nandy, B. Pal, and A. Chakrabarti, J. Phys.: Con-
|
1347 |
+
dens. Matt. 27, 125501 (2015).
|
1348 |
+
[61] A. Nandy, Phys. Scr. 96, 045802 (2021).
|
1349 |
+
|
-9AyT4oBgHgl3EQfqfj3/content/tmp_files/load_file.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:9510ff3a3a859b907240308b08aee5eaa1838fd2c95853ae0a0b50f391788905
|
3 |
+
size 745398
|
-tFLT4oBgHgl3EQfDC7x/content/tmp_files/2301.11978v1.pdf.txt
ADDED
@@ -0,0 +1,1301 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
MNRAS 000, 1–11 (2022)
|
2 |
+
Preprint 31 January 2023
|
3 |
+
Compiled using MNRAS LATEX style file v3.0
|
4 |
+
Analytical marginalisation over photometric redshift uncertainties in
|
5 |
+
cosmic shear analyses
|
6 |
+
Jaime Ruiz-Zapatero1 ★, Boryana Hadzhiyska2,3, David Alonso1, Pedro G. Ferreira1, Carlos García-García1
|
7 |
+
and Arrykrishna Mootoovaloo1
|
8 |
+
1Department of Physics, University of Oxford, Denys Wilkinson Building, Keble Road, Oxford OX1 3RH, UK
|
9 |
+
2Miller Institute for Basic Research in Science, University of California, Berkeley, CA, 94720, USA.
|
10 |
+
3Physics Division, Lawrence Berkeley National Laboratory, Berkeley, CA 94720.
|
11 |
+
Accepted XXX. Received YYY; in original form ZZZ
|
12 |
+
ABSTRACT
|
13 |
+
As the statistical power of imaging surveys grows, it is crucial to account for all systematic uncertainties. This is normally
|
14 |
+
done by constructing a model of these uncertainties and then marginalizing over the additional model parameters. The resulting
|
15 |
+
high dimensionality of the total parameter spaces makes inferring the cosmological parameters significantly more costly using
|
16 |
+
traditional Monte-Carlo sampling methods. A particularly relevant example is the redshift distribution, 𝑝(𝑧), of the source
|
17 |
+
samples, which may require tens of parameters to describe fully. However, relatively tight priors can be usually placed on these
|
18 |
+
parameters through calibration of the associated systematics. In this paper we show, quantitatively, that a linearisation of the
|
19 |
+
theoretical prediction with respect to these calibratable systematic parameters allows us to analytically marginalise over these
|
20 |
+
extra parameters, leading to a factor ∼ 30 reduction in the time needed for parameter inference, while accurately recovering the
|
21 |
+
same posterior distributions for the cosmological parameters that would be obtained through a full numerical marginalisation
|
22 |
+
over 160 𝑝(𝑧) parameters. We demonstrate that this is feasible not only with current data and current achievable calibration
|
23 |
+
priors but also for future Stage-IV datasets.
|
24 |
+
Key words: cosmology: large-scale structure of Universe – gravitational lensing: weak – methods: data analysis
|
25 |
+
1 INTRODUCTION
|
26 |
+
In recent years unprecedentedly precise observations in cosmology
|
27 |
+
have uncovered a number of tensions between datasets that may
|
28 |
+
constitute both tantalising hints of new physics or a manifestation of
|
29 |
+
a lack of control over theoretical systematics (Heymans et al. 2021;
|
30 |
+
Riess et al. 2022).
|
31 |
+
At its simplest, the current cosmological paradigm, the Λ (denoting
|
32 |
+
the cosmological constant) cold dark matter model (ΛCDM), can be
|
33 |
+
described by only five parameters: Ω𝑚, Ω𝑏, 𝐴𝑠, 𝑛𝑠 and ℎ (see e.g.
|
34 |
+
Scott (2018) for a detailed review). However, in order to relate the
|
35 |
+
theoretical predictions of this model to actual physical observables,
|
36 |
+
it is necessary to extend it. Phenomenological models that describe
|
37 |
+
the astrophysical systems that form the basis of our observations,
|
38 |
+
as well as observational sources of systematic uncertainty, are then
|
39 |
+
appended to the core ΛCDM model. In the presence of large statistical
|
40 |
+
uncertainties, these models may consist of simple relationships in
|
41 |
+
terms of a handful of parameters. However, more precise data requires
|
42 |
+
an equally precise characterisation of these relationships, which leads
|
43 |
+
to an increase in the complexity of the model. Thus, the number
|
44 |
+
of parameters associated with these bridging models, colloquially
|
45 |
+
referred to as “nuisance” parameters, has steadily grown over the
|
46 |
+
years.
|
47 |
+
The term “nuisance” is accurate when describing these parameters.
|
48 |
+
★ E-mail: [email protected]
|
49 |
+
Not only are they generally uninteresting by comparison with the
|
50 |
+
fundamental cosmological parameters we aim to constraint, but the
|
51 |
+
increase in parameter dimensionality of the model makes exploring
|
52 |
+
their posterior distribution significantly more computationally costly.
|
53 |
+
Standard Markov Chain Monte-Carlo (MCMC), and other rejection-
|
54 |
+
based sampling methods (Metropolis et al. 1953; Foreman-Mackey
|
55 |
+
et al. 2013; Alsing & Handley 2021, among others) suffer from the
|
56 |
+
so-called “curse of dimensionality”, whereby the acceptance rate
|
57 |
+
of new samples decreases sharply with the number of parameters
|
58 |
+
(exponentially in the worst cases).
|
59 |
+
Nuisance parameters can be divided into two groups based on their
|
60 |
+
prior distributions: calibratable and non-calibratable parameters. The
|
61 |
+
non-calibratable parameters can only be constrained by the data and,
|
62 |
+
as such, typically have largely non-constraining priors. On the other
|
63 |
+
hand, we can place tighter priors on the calibratable parameters,
|
64 |
+
either by accurately characterising the instrument measurements or
|
65 |
+
by using independent external observations. In the case of cosmic
|
66 |
+
shear analyses, the impact of galaxy intrinsic alignments (Hirata &
|
67 |
+
Seljak 2004) is a standard example of a non-calibratable systematic.
|
68 |
+
On the calibratable side, the two best examples are multiplicative
|
69 |
+
shape measurement systematics, and the uncertainties in the redshift
|
70 |
+
distribution of the target source galaxies (Hoyle et al. 2018; Sánchez
|
71 |
+
& Bernstein 2019; Hildebrandt et al. 2020a; Stölzner et al. 2021;
|
72 |
+
Zhang et al. 2023).
|
73 |
+
Of these calibratable systematics the dominant source of uncer-
|
74 |
+
tainty in photometric surveys is the accuracy of redshift distributions,
|
75 |
+
© 2022 The Authors
|
76 |
+
arXiv:2301.11978v1 [astro-ph.CO] 27 Jan 2023
|
77 |
+
|
78 |
+
2
|
79 |
+
Ruiz-Zapatero et al.
|
80 |
+
which are known to strongly affect the accuracy of cosmological con-
|
81 |
+
straints. The vital quantity to determine is the redshift distribution
|
82 |
+
of each tomographic sample of galaxies, 𝑝(𝑧). The fact that the un-
|
83 |
+
certainties in 𝑝(𝑧) can be calibrated with external spectroscopic data
|
84 |
+
(e.g. via direct calibration, (Lima et al. 2008; Wright et al. 2020),
|
85 |
+
clustering redshifts (Schneider et al. 2006; Newman 2008; Matthews
|
86 |
+
& Newman 2010; Schmidt et al. 2013), and shear ratios (Prat et al.
|
87 |
+
2018; Sánchez et al. 2022)), enables us to place relatively strong
|
88 |
+
priors on the redshift distribution, which in turn makes it possible to
|
89 |
+
use approximate methods to efficiently marginalise over these uncer-
|
90 |
+
tainties.
|
91 |
+
Analytical marginalisation schemes for photometric redshift un-
|
92 |
+
certainties have already been proposed in the literature. In Stölzner
|
93 |
+
et al. (2021) an analytic marginalisation scheme for photometric red-
|
94 |
+
shift uncertainties was proposed based on Gaussian mixture mod-
|
95 |
+
els and applied to the analysis of KV450 data (Hildebrandt et al.
|
96 |
+
2020b). Alternatively, in Zhang et al. (2023) a resampling approach
|
97 |
+
to marginalize over these uncertainties was proposed and applied to
|
98 |
+
the analysis HSC data. Here, we will explore the method initially pro-
|
99 |
+
posed in Hadzhiyska et al. (2020), further exploited in García-García
|
100 |
+
et al. (2023), and recently characterised in the context of the Laplace
|
101 |
+
approximation in Hadzhiyska et al. (2023). The method is based on
|
102 |
+
linearising the dependence of the theoretical prediction with respect
|
103 |
+
to the parameters defining the redshift distribution around their cali-
|
104 |
+
bration priors. This then allows one to analytically marginalise over
|
105 |
+
these parameters by modifying the covariance matrix of the data,
|
106 |
+
effectively assigning higher variance (as allowed by the calibration
|
107 |
+
prior) to the data modes most sensitive to variations in the 𝑝(𝑧).
|
108 |
+
The goal of this paper is to exhaustively validate this approximate
|
109 |
+
marginalisation scheme in the context of cosmic shear analyses. We
|
110 |
+
will do so by proving that we are able to obtain the same constraints
|
111 |
+
on cosmological parameters using this scheme, as well as employing
|
112 |
+
brute-force methods that sample the full parameter space exactly. We
|
113 |
+
will show this for both simple parametrisations of the 𝑝(𝑧) uncertain-
|
114 |
+
ties, in terms of shifts to the mean of the distribution, as well as using
|
115 |
+
completely general “non-parametric” models that treat the amplitude
|
116 |
+
of the 𝑝(𝑧) in narrowly-spaced intervals of 𝑧 as calibratable variables,
|
117 |
+
leading to a model with more than ∼ 100 nuisance parameters. In or-
|
118 |
+
der to numerically marginalize over such large parameter spaces we
|
119 |
+
develop an auto-differentiable code to obtain theoretical predictions
|
120 |
+
for the cosmic shear observables. This allows us to employ gradi-
|
121 |
+
ent based sampling algorithms, such as Hamiltonian Monte Carlo,
|
122 |
+
to beat the aforementioned curse of dimensionality. Finally, we will
|
123 |
+
show that the method is valid not only for current data, but also for
|
124 |
+
futuristic Stage-IV surveys, where photometric redshift uncertainties
|
125 |
+
will likely make up a large fraction of the total error budget. Inter-
|
126 |
+
estingly, our analysis will show that, in the context of cosmic shear
|
127 |
+
data, relatively inexpensive parametrisations of photometric redshift
|
128 |
+
uncertainties based on one free parameter per redshift bin (e.g. mean
|
129 |
+
shifts, or ranked discrete realisations (Cordero et al. 2022)), return ef-
|
130 |
+
fectively the same posterior distribution on cosmological parameters
|
131 |
+
as the most general non-parametric models.
|
132 |
+
This paper is structured as follows. In Section 2 we describe the
|
133 |
+
methods used in this work including the theory behind weak lens-
|
134 |
+
ing observables, the calibration of redshift distributions, and the
|
135 |
+
mathematics of analytical marginalisation via first-order expansion.
|
136 |
+
Section 3 presents the Dark Energy Survey data used to produce real-
|
137 |
+
istic source redshift distributions and their associated uncertainties,
|
138 |
+
as well as the models used to simulate future datasets. In Section
|
139 |
+
4 we describe the likelihood used to analyse these data, as well as
|
140 |
+
the different parametrisations used to describe 𝑝(𝑧) uncertainties.
|
141 |
+
Section 5 presents our results, quantifying the performance of ana-
|
142 |
+
lytical marginalisation methods. Finally, we present our conclusions
|
143 |
+
in Section 6.
|
144 |
+
2 METHODS
|
145 |
+
2.1 Cosmic shear power spectra
|
146 |
+
It is now commonplace to carry out the analysis of galaxy weak
|
147 |
+
lensing data tomographically. The full sample is split into redshift
|
148 |
+
bins and the two-point correlation functions of all pairs of bins are
|
149 |
+
measured and compared with their theoretical prediction. Let 𝛾𝛼( ˆn)
|
150 |
+
be a map of the spin-2 lensing shear field inferred from the sources in
|
151 |
+
the ���-th redshift bin. Its relation with the three-dimensional matter
|
152 |
+
overdensity 𝛿𝑚(x) is (Bartelmann & Schneider 2001; Krause et al.
|
153 |
+
2017)
|
154 |
+
𝛾𝛼( ˆn) =
|
155 |
+
∫ 𝜒𝐻
|
156 |
+
0
|
157 |
+
𝑑𝜒 𝑞𝛼(𝜒)
|
158 |
+
�
|
159 |
+
−𝜒−2ðð∇−2𝛿𝑚(𝜒ˆn, 𝑧)
|
160 |
+
�
|
161 |
+
,
|
162 |
+
(1)
|
163 |
+
where ˆn is the sky direction, 𝜒 is the comoving radial distance at
|
164 |
+
redshift 𝑧, 𝜒𝐻 is the distance to the horizon, 𝑞𝛼(𝜒) is the weak
|
165 |
+
lensing radial kernel, and ð is the spin-raising differential operator,
|
166 |
+
acting on a spin-𝑠 quantity as (Newman & Penrose 1966):
|
167 |
+
ð 𝑠 𝑓 (𝜃, 𝜑) = −(sin 𝜃)𝑠
|
168 |
+
� 𝜕
|
169 |
+
𝜕𝜃 +
|
170 |
+
𝑖
|
171 |
+
sin 𝜃
|
172 |
+
𝜕
|
173 |
+
𝜕𝜑
|
174 |
+
�
|
175 |
+
(sin 𝜃)−𝑠 𝑠 𝑓
|
176 |
+
(2)
|
177 |
+
and turning it into a spin-(𝑠 + 1) quantity. The weak lensing kernel
|
178 |
+
is1
|
179 |
+
𝑞𝛼(𝜒) ≡ 3
|
180 |
+
2 𝐻2
|
181 |
+
0Ω𝑚
|
182 |
+
𝜒
|
183 |
+
𝑎(𝜒)
|
184 |
+
∫ ∞
|
185 |
+
𝑧(𝜒)
|
186 |
+
𝑑𝑧′𝑝𝛼(𝑧′) 𝜒(𝑧′) − 𝜒
|
187 |
+
𝜒(𝑧′)
|
188 |
+
,
|
189 |
+
(3)
|
190 |
+
where 𝐻0 ≡ 𝐻(𝑧 = 0) is the Hubble expansion rate today, Ω𝑚 is
|
191 |
+
the current matter density parameter and, most importantly for our
|
192 |
+
discussion, 𝑝𝛼(𝑧) is the redshift distribution in bin 𝛼,
|
193 |
+
The angular power spectrum of the 𝐸-mode components of two
|
194 |
+
maps 𝛼 and 𝛽, 𝐶 𝛼𝛽
|
195 |
+
ℓ
|
196 |
+
can be related to the three-dimensional matter
|
197 |
+
power spectrum 𝑃(𝑘, 𝑧) via:
|
198 |
+
𝐶 𝛼𝛽
|
199 |
+
ℓ
|
200 |
+
= 𝐺2
|
201 |
+
ℓ
|
202 |
+
∫
|
203 |
+
𝑑𝜒
|
204 |
+
𝜒2 𝑞𝛼(𝜒) 𝑞𝛽(𝜒) 𝑃
|
205 |
+
�
|
206 |
+
𝑘 = ℓ + 1/2
|
207 |
+
𝜒
|
208 |
+
, 𝑧(𝜒)
|
209 |
+
�
|
210 |
+
,
|
211 |
+
(4)
|
212 |
+
where we have assumed the Limber approximation (Limber 1953;
|
213 |
+
Afshordi et al. 2004), which is valid for the broad weak lensing ker-
|
214 |
+
nels considered in this work. The scale-dependent lensing prefactor,
|
215 |
+
𝐺ℓ ≡
|
216 |
+
√︄
|
217 |
+
(ℓ + 2)!
|
218 |
+
(ℓ − 2)!
|
219 |
+
1
|
220 |
+
(ℓ + 1/2)2 ,
|
221 |
+
(5)
|
222 |
+
accounts for the difference between angular and three-dimensional
|
223 |
+
derivatives in Eq. 1 (i.e. 𝜒2ð2∇−2 � 1). This prefactor leads to
|
224 |
+
sub-percent differences for ℓ > 11 and can therefore be neglected
|
225 |
+
on small scales (Kilbinger et al. 2017). In this work we will use
|
226 |
+
the Halofit fitting function of Smith et al. (2003); Takahashi et al.
|
227 |
+
(2012) to describe the matter power spectrum.
|
228 |
+
The intrinsic alignment (IA) of galaxies due to local interactions
|
229 |
+
(gravitational or otherwise), is an important contaminant for cosmic
|
230 |
+
shear data that must be taken into account (Brown et al. 2002). For
|
231 |
+
simplicity, however, and since the focus of this work is the impact of
|
232 |
+
the marginalisation over redshift distribution uncertainties, we will
|
233 |
+
ignore the contribution from intrinsic alignments in this analysis.
|
234 |
+
1 Note that this is only strictly valid in ΛCDM (Ferreira 2019).
|
235 |
+
MNRAS 000, 1–11 (2022)
|
236 |
+
|
237 |
+
Analytical marginalisation over photo-𝑧 uncertainties
|
238 |
+
3
|
239 |
+
2.2 Redshift distribution uncertainties
|
240 |
+
The sub-samples that make up the redshift bins used in the tomo-
|
241 |
+
graphic cosmic shear analysis of an imaging survey are selected
|
242 |
+
based on the source photometry, either by simple cuts in the in-
|
243 |
+
ferred photometric redshifts (photo-𝑧), or by selecting directly in the
|
244 |
+
magnitude-color space of the sample, bypassing photo-𝑧 estimation
|
245 |
+
altogether. Regardless of the method used to select the sub-samples,
|
246 |
+
their true redshift distributions are inevitably subject to some level
|
247 |
+
of uncertainty, due to the lack of precise redshift measurements.
|
248 |
+
The 𝑝(𝑧) can however be calibrated through various methods, e.g.:
|
249 |
+
weighted direct calibration with a sufficiently complete spectroscopic
|
250 |
+
sample (Lima et al. 2008; Wright et al. 2020), clustering redshifts
|
251 |
+
(Schneider et al. 2006; Newman 2008; Matthews & Newman 2010;
|
252 |
+
Schmidt et al. 2013), and shear ratios (Prat et al. 2018; Sánchez et al.
|
253 |
+
2022). This typically leads to relatively tight priors on the 𝑝(𝑧), but
|
254 |
+
the residual uncertainties in this prior must be propagated into the
|
255 |
+
final parameter constraints.
|
256 |
+
To characterise these uncertainties, we will make use of two dif-
|
257 |
+
ferent methods, which encompass the range of model complexity we
|
258 |
+
may reasonably expect from current and future data.
|
259 |
+
• Method 1: 𝑧 shifts. Most cosmic shear analyses to date
|
260 |
+
(Miyazaki et al. 2012; Hildebrandt et al. 2020b; Heymans et al.
|
261 |
+
2021; Abbott et al. 2018a, 2022, among others) have summarised
|
262 |
+
the uncertainty in the calibrated 𝑝𝛼(𝑧) into a single parameter Δ𝑧𝛼
|
263 |
+
that shifts the mean of the redshift distribution. I.e. let ˆ𝑝𝛼(𝑧) be the
|
264 |
+
best-guess redshift distribution. The true redshift distribution is then
|
265 |
+
𝑝𝛼(𝑧) = ˆ𝑝𝛼(𝑧 + Δ𝑧𝛼).
|
266 |
+
(6)
|
267 |
+
A prior on Δ𝑧𝛼 can be derived using the calibration methods listed
|
268 |
+
above. We will refer to this method as parametric.
|
269 |
+
This simple model turns out to be relatively well suited to describe
|
270 |
+
the impact of 𝑝(𝑧) uncertainties in the case of cosmic shear data.
|
271 |
+
Since weak lensing is a radially cumulative effect, the amplitude
|
272 |
+
of the weak lensing kernel (Eq. 3) is mostly sensitive to the mean
|
273 |
+
redshift of the sample, and thus much of the effect on cosmic shear
|
274 |
+
observables is well described by this parameter (Bonnett et al. 2016).
|
275 |
+
Other modes of 𝑝(𝑧) uncertainty, such as the distribution width,
|
276 |
+
may be more relevant for galaxy clustering observables, or for the
|
277 |
+
intrinsic alignment contribution to cosmic shear. Near-future cosmic
|
278 |
+
shear samples may indeed require a more sophisticated description
|
279 |
+
of the 𝑝(𝑧) uncertainty, and thus we turn to a more general method.
|
280 |
+
• Method 2: 𝑝(𝑧) bin heights. Most 𝑝(𝑧) calibration methods
|
281 |
+
(e.g. direct calibration or clustering redshifts) will produce a binned
|
282 |
+
measurement of the 𝑝(𝑧) with deterministic redshift bin ranges, and
|
283 |
+
uncertain bin heights. The most general method to propagate these
|
284 |
+
uncertainties is therefore to treat each bin height 𝑝𝑖 ≡ 𝑝(𝑧𝑖) as
|
285 |
+
a free parameter in the model, with a prior given by the calibration
|
286 |
+
uncertainties. The latter may be in the form of individual 1𝜎 errors for
|
287 |
+
each bin height, if the uncertainties are approximately uncorrelated,
|
288 |
+
or a full covariance matrix covering all bin heights.
|
289 |
+
The resulting parametrisation thus sidesteps any attempt at sum-
|
290 |
+
marising the uncertainty into effective parameters, and thus we will
|
291 |
+
refer to this method as non-parametric. The method therefore fully
|
292 |
+
propagates all calibration uncertainties into the final constraints with
|
293 |
+
minimal approximations.
|
294 |
+
The key practical difference between both methods, in the context
|
295 |
+
of error propagation, is the additional complexity they incur. The
|
296 |
+
parametric approach (Method 1) introduces one free parameter per
|
297 |
+
redshift bin. For 𝑂(5) bins, this is already enough to significantly
|
298 |
+
impact the performance of standard MCMC algorithms. In turn, the
|
299 |
+
non-parametric approach (Method 2) introduces tens or hundreds of
|
300 |
+
parameters per redshift bin, and one must resort to advanced sam-
|
301 |
+
pling methods in order to fully explore the resulting model without
|
302 |
+
assumptions.
|
303 |
+
2.3 Linearisation and analytical marginalisation
|
304 |
+
Let 𝛀 be the set of non-calibratable parameters of a model (in our
|
305 |
+
case this is the set of cosmological and non-calibratable nuisance
|
306 |
+
parameters) and 𝝂 the set of calibratable parameter such that the total
|
307 |
+
set of parameters is given by 𝜽 = 𝛀 ∪ 𝝂. Now consider the general
|
308 |
+
case of a Gaussian posterior distribution of the form
|
309 |
+
−2 log 𝑃(𝛀, 𝝂|d) =(d − t)𝑇 C−1(d − t) + (𝝂 − ¯𝝂)𝑇 P−1(𝝂 − ¯𝝂)
|
310 |
+
− 2 log 𝑃(𝛀) + const.,
|
311 |
+
(7)
|
312 |
+
where d is the data. We assume a Gaussian calibration prior with
|
313 |
+
mean ¯𝝂 and covariance P, while 𝑃(𝛀) is the prior on 𝛀 (which is, as
|
314 |
+
per our assumption, broad). t(𝛀, 𝝂) is the theoretical prediction for
|
315 |
+
the data d which implicitly depends on both calibratable and non-
|
316 |
+
calibratable parameters. C is the covariance matrix of d, which is
|
317 |
+
parameter-independent.
|
318 |
+
Assuming a tight prior on 𝝂, we start by expanding the theory
|
319 |
+
prediction around ¯𝝂
|
320 |
+
t ≃ ¯t + T(𝝂 − ¯𝝂),
|
321 |
+
where ¯t ≡ t(𝛀, ¯𝝂),
|
322 |
+
T ≡ 𝑑t
|
323 |
+
𝑑𝝂
|
324 |
+
����𝝂=¯𝝂
|
325 |
+
.
|
326 |
+
(8)
|
327 |
+
Substituting this approximation in Eq. 7, the posterior becomes Gaus-
|
328 |
+
sian in 𝝂, and thus the calibratable parameters can be marginalised
|
329 |
+
analytically. As shown in Hadzhiyska et al. (2020), the resulting
|
330 |
+
marginalised posterior is
|
331 |
+
−2 log 𝑃(𝛀|d) ≃(d − ¯t)𝑇 ˜C−1(d − ¯t) − 2 log 𝑃(𝛀)
|
332 |
+
+ log
|
333 |
+
�
|
334 |
+
det
|
335 |
+
�
|
336 |
+
T𝑇 C−1T + P−1��
|
337 |
+
+ const.,
|
338 |
+
(9)
|
339 |
+
where the modified covariance is
|
340 |
+
˜C ≡ C + TPT𝑇 .
|
341 |
+
(10)
|
342 |
+
Note that, strictly speaking, both the modified covariance and the
|
343 |
+
term in the second line of Eq. 9 depend on𝛀, which would in principle
|
344 |
+
complicate the evaluation of the likelihood. In practice, thisparameter
|
345 |
+
dependence can be neglected such that the value of 𝛀 at which these
|
346 |
+
terms are evaluated can be fixed during exploration of the posterior.
|
347 |
+
However, fixing 𝛀 at values with a bad fit to the data will result
|
348 |
+
in a mischaracterisation of the response of the theory vector to the
|
349 |
+
nuisance parameters leading to inaccurate marginalised posteriors.
|
350 |
+
Ideally, 𝛀 is fixed to its maximum a posteriori (MAP) value. However,
|
351 |
+
as shown in Hadzhiyska et al. (2020) and in preliminary results, no
|
352 |
+
appreciable differences are found in the marginalised posteriors for
|
353 |
+
𝛀 within 2𝜎 of the MAP. Note that the size of the 2𝜎 region will
|
354 |
+
depend on how constraining the data is.
|
355 |
+
This result is intuitively simple to understand if we think of T as
|
356 |
+
the response of the data to variations in the nuisance parameters.
|
357 |
+
After marginalising over the calibratable parameters, the resulting
|
358 |
+
distribution is a multi-variate Gaussian where the data covariance
|
359 |
+
has been updated in Eq. 10 by increasing the uncertainty in the data
|
360 |
+
modes that most prominently respond to variations in the nuisance
|
361 |
+
parameters.
|
362 |
+
In this work, 𝝂 corresponds to the parameters describing the red-
|
363 |
+
shift distribution uncertainties, i.e. one shift parameter per redshift
|
364 |
+
bin when using the parametric approach, or a set of 𝑝(𝑧) bin heights in
|
365 |
+
the non-parametric scheme. The method described above, however,
|
366 |
+
MNRAS 000, 1–11 (2022)
|
367 |
+
|
368 |
+
4
|
369 |
+
Ruiz-Zapatero et al.
|
370 |
+
0.00
|
371 |
+
0.05
|
372 |
+
0.10
|
373 |
+
0.15
|
374 |
+
0.20
|
375 |
+
p(z)0
|
376 |
+
p(z)1
|
377 |
+
p(z)2
|
378 |
+
p(z)3
|
379 |
+
0.5
|
380 |
+
1.0
|
381 |
+
1.5
|
382 |
+
z
|
383 |
+
0.25
|
384 |
+
0.50
|
385 |
+
0.75
|
386 |
+
1.00
|
387 |
+
1.25
|
388 |
+
1.50
|
389 |
+
z
|
390 |
+
0.5
|
391 |
+
1.0
|
392 |
+
1.5
|
393 |
+
z
|
394 |
+
0.5
|
395 |
+
1.0
|
396 |
+
1.5
|
397 |
+
z
|
398 |
+
0.5
|
399 |
+
1.0
|
400 |
+
1.5
|
401 |
+
z
|
402 |
+
10
|
403 |
+
3
|
404 |
+
10
|
405 |
+
2
|
406 |
+
10
|
407 |
+
1
|
408 |
+
100
|
409 |
+
Figure 1. Top row: normalized galaxies’s redshift distributions for each of the 4 redshift bins. Bottom row: correlation matrix obtained using the DIR algorithm
|
410 |
+
for each of the 4 galaxies’ redshift distributions. Note that for visualization purposes we display the absolute values of the each correlation matrix in logarithmic
|
411 |
+
scale. In this plot we can see that the covariance matrices obtained through the DIR algorithm are mostly diagonal.
|
412 |
+
is fully general and has in the past been applied to marginalise over
|
413 |
+
other types of nuisance parameters, including multiplicative shape
|
414 |
+
measurement biases (Hildebrandt et al. 2020b), as well as truly linear
|
415 |
+
parameters such as shot-noise (García-García et al. 2021) or system-
|
416 |
+
atic template amplitudes (Koukoufilippas et al. 2020). The aim of
|
417 |
+
this paper is thus to determine the applicability of this method to the
|
418 |
+
case of redshift distribution uncertainties.
|
419 |
+
3 DATA
|
420 |
+
In order to evaluate the performance of the analytical marginalisation
|
421 |
+
approach described in the previous section in the context of current
|
422 |
+
and future surveys, we make use of data from the first-year cosmic
|
423 |
+
shear analysis of the Dark Energy Survey (DES-Y1, Abbott et al.
|
424 |
+
(2018b)). The aim of this is twofold: first, to demonstrate that the
|
425 |
+
method can be successfully implemented in real data, with real-life
|
426 |
+
complications (e.g. noisy 𝑝(𝑧)s, numerical covariances, astrophysi-
|
427 |
+
cal and observational systematics) and, second, to demonstrate this
|
428 |
+
validity for future Stage-IV datasets in the presence of 𝑝(𝑧) cali-
|
429 |
+
bration uncertainties already achieved on current data. This section
|
430 |
+
describes the DES-Y1 data used, and the models used to generate
|
431 |
+
simulated future Stage-IV data.
|
432 |
+
3.1 DES-Y1 data and redshift distributions
|
433 |
+
The Dark Energy Survey is a photometric, 5-year survey, that has
|
434 |
+
observed 5000 deg2 of the sky using five different filter bands (grizY).
|
435 |
+
The observations were made with the 4m Blanco Telescope, provided
|
436 |
+
with the 570-Mpix Dark Energy Camera (DECam), from the Cerro
|
437 |
+
Tololo Inter-American Observatory (CTIO), in Chile. In this paper
|
438 |
+
we use cosmic shear data from the first data release (Abbott et al.
|
439 |
+
2018b), which covers 1786 deg2 before masking. In particular, we
|
440 |
+
use the public Metacalibration source catalog2, which is divided
|
441 |
+
in four redshift bins covering the range 𝑧 ≲ 1.6 (Hoyle et al. 2018).
|
442 |
+
We use the calibrated redshift distributions of the Metacalibra-
|
443 |
+
tion sample provided by García-García et al. (2023). The 𝑝(𝑧)s were
|
444 |
+
estimated via direct calibration (DIR Lima et al. (2008)), using the
|
445 |
+
COSMOS 30-band catalog (Laigle et al. 2016) as a calibrating sam-
|
446 |
+
ple. The uncertainties of the measured redshift distributions were
|
447 |
+
estimated analytically, as described in García-García et al. (2023),
|
448 |
+
accounting for both shot noise and sample variance, and represent
|
449 |
+
a realistic level of 𝑝(𝑧) uncertainty achieved by current existing
|
450 |
+
datasets. The redshift distributions were sampled on 40 bins of width
|
451 |
+
𝛿𝑧 = 0.04 covering the range 0 ≤ 𝑧 ≤ 1.6. Fig. 1 shows, in the first
|
452 |
+
row, the redshift distributions of the four Metacalibration samples
|
453 |
+
and their statistical uncertainties. Note that we estimated the full co-
|
454 |
+
variance matrix of the 𝑝(𝑧) bin heights. The covariance is dominated
|
455 |
+
by the diagonal, as can be seen in the bottom panels of Fig. 1.
|
456 |
+
We will also use the cosmic shear angular power spectra provided
|
457 |
+
by Nicola et al. (2021). A full description of the methods used to
|
458 |
+
estimate these power spectra, and their associated covariance matrix,
|
459 |
+
from the DES-Y1 data is provided by the authors.
|
460 |
+
3.2 Future Stage-IV data
|
461 |
+
We generate a simulated data vector corresponding to a Stage-IV
|
462 |
+
cosmic shear survey, such as the Legacy Survey of Space Time, at
|
463 |
+
the Rubin Observatory (LSST Dark Energy Science Collaboration
|
464 |
+
2012), or the Euclid survey (Spergel et al. 2015). Our aim is to ef-
|
465 |
+
fectively test the analytical marginalisation method in the low-noise
|
466 |
+
regime, where the inferred posterior is likely more sensitive to resid-
|
467 |
+
ual 𝑝(𝑧) uncertainties, and the error budget may become dominated
|
468 |
+
by these, rather than the statistical errors in the data themselves.
|
469 |
+
2 https://desdr-server.ncsa.illinois.edu/despublic/y1a1_
|
470 |
+
files/
|
471 |
+
MNRAS 000, 1–11 (2022)
|
472 |
+
|
473 |
+
Analytical marginalisation over photo-𝑧 uncertainties
|
474 |
+
5
|
475 |
+
For simplicity, we simulate the Stage-IV survey as having the
|
476 |
+
same redshift distributions as the DES-Y1 sample. This includes
|
477 |
+
both the 𝑝(𝑧)s themselves, and their calibration uncertainties. While
|
478 |
+
it is possible that techniques for inferring redshifts from photometry,
|
479 |
+
or the size and quality of calibrating spectroscopic samples, will
|
480 |
+
improve substantially by the time Stage-IV data are available, we
|
481 |
+
prefer to err on the side of caution and assume the same performance
|
482 |
+
as currently achieved. For instance it is possible that redshift estimates
|
483 |
+
will suffer commensurately with the increase in survey depth. The
|
484 |
+
results presented here are therefore conservative, and their validity
|
485 |
+
will only be reinforced if better 𝑝(𝑧) calibration samples are used in
|
486 |
+
the future.
|
487 |
+
We generate cosmic shear power spectra using CCL (Chisari et al.
|
488 |
+
2019) for the best-fit Planck 2018 cosmological parameters (Planck
|
489 |
+
Collaboration et al. 2020): Ω𝑏ℎ2 = 0.02237, Ω𝑐ℎ2 = 0.12, ℎ =
|
490 |
+
0.6736, 109𝐴𝑠 = 2.0830, 𝑛𝑠 = 0.9649, 𝑤0 = −1, 𝑤𝑎 = 0. We use
|
491 |
+
the same sampling in ℓ used for the DES-Y1 power spectra, and use
|
492 |
+
only scales in the range ℓ ∈ [30, 2000].
|
493 |
+
We compute the covariance matrix of these power spectra an-
|
494 |
+
alytically, including a disconnected “Gaussian” component, and a
|
495 |
+
connected super-sample covariance contribution (SSC).
|
496 |
+
Cov
|
497 |
+
�
|
498 |
+
𝐶 𝛼
|
499 |
+
ℓ , 𝐶𝜌𝜎
|
500 |
+
ℓ′
|
501 |
+
�
|
502 |
+
= Cov𝐺
|
503 |
+
�
|
504 |
+
𝐶 𝛼𝛽
|
505 |
+
ℓ
|
506 |
+
, 𝐶𝜌𝜎
|
507 |
+
ℓ′
|
508 |
+
�
|
509 |
+
+ CovSSC
|
510 |
+
�
|
511 |
+
𝐶 𝛼𝛽
|
512 |
+
ℓ
|
513 |
+
, 𝐶 𝜎𝜌
|
514 |
+
ℓ′
|
515 |
+
�
|
516 |
+
.
|
517 |
+
(11)
|
518 |
+
We estimate the Gaussian covariance using a simple mode-counting
|
519 |
+
approximation (Efstathiou 2004) as
|
520 |
+
Cov𝐺
|
521 |
+
�
|
522 |
+
𝐶 𝛼𝛽
|
523 |
+
ℓ
|
524 |
+
, 𝐶𝜌𝜎
|
525 |
+
ℓ′
|
526 |
+
�
|
527 |
+
= 𝛿ℓℓ′
|
528 |
+
𝐶 𝛼𝜌
|
529 |
+
ℓ
|
530 |
+
𝐶𝛽𝜎
|
531 |
+
ℓ
|
532 |
+
+ 𝐶 𝛼𝜎
|
533 |
+
ℓ
|
534 |
+
𝐶𝛽𝜌
|
535 |
+
ℓ
|
536 |
+
(2ℓ + 1) Δℓ 𝑓sky
|
537 |
+
,
|
538 |
+
(12)
|
539 |
+
where 𝑓sky is the fraction of the sky covered by the experiment. We
|
540 |
+
assume 𝑓sky = 0.4, as in the case of LSST (LSST Dark Energy Sci-
|
541 |
+
ence Collaboration 2012). The angular power spectra above contain
|
542 |
+
the contribution from shape noise in the auto-correlation, of the form
|
543 |
+
𝑁 𝛼𝛼
|
544 |
+
ℓ
|
545 |
+
=
|
546 |
+
𝜎2𝛾
|
547 |
+
¯𝑛𝛼
|
548 |
+
.
|
549 |
+
(13)
|
550 |
+
Here 𝜎𝛾 = 0.28 is the per-component ellipticity dispersion in each
|
551 |
+
source, and ¯𝑛𝛼 is the angular number density of sources in the 𝛼-th
|
552 |
+
redshift bin. We assume 𝑛𝛼 = 4 arcmin−2 in each redshift bin.
|
553 |
+
We compute the super-sample covariance contribution following:
|
554 |
+
CovSSC(𝐶 𝛼𝛽
|
555 |
+
ℓ
|
556 |
+
, 𝐶𝜌𝜎
|
557 |
+
ℓ′ ) =
|
558 |
+
∫
|
559 |
+
d𝜒 𝑞𝛼(𝜒)𝑞𝛽(𝜒)𝑞𝜌(𝜒)𝑞𝜎(𝜒)
|
560 |
+
𝜒4
|
561 |
+
×
|
562 |
+
(14)
|
563 |
+
𝜕𝑃(ℓ/𝜒, 𝑧)
|
564 |
+
𝜕𝛿LS
|
565 |
+
𝜕𝑃(ℓ′/𝜒, 𝑧)
|
566 |
+
𝜕𝛿LS
|
567 |
+
𝜎2
|
568 |
+
LS(𝑧),
|
569 |
+
(15)
|
570 |
+
as in Nicola et al. (2021). 𝜕𝑃(𝑘, 𝑧)/𝜕𝛿LS is the response of the matter
|
571 |
+
power spectrum to a large-scale density fluctuation 𝛿LS, and the
|
572 |
+
quantity 𝜎2
|
573 |
+
𝑏(𝑧) is the variance of the long wavelength mode over the
|
574 |
+
survey footprint. We estimate the latter as in Krause & Eifler (2017),
|
575 |
+
modelling the footprint simply as a circular cap of area 4𝜋 𝑓sky. We
|
576 |
+
estimate the response function using perturbation theory and the halo
|
577 |
+
model, as described in Krause & Eifler (2017), and as implemented
|
578 |
+
in CCL.
|
579 |
+
4 LIKELIHOOD
|
580 |
+
We extract cosmological parameter constraints using a Gaussian like-
|
581 |
+
lihood as described in Section 2.3. In order to validate the analytical
|
582 |
+
Parameter priors
|
583 |
+
Parameter
|
584 |
+
Prior
|
585 |
+
Parameter
|
586 |
+
Prior
|
587 |
+
Cosmology
|
588 |
+
Redshift calibration
|
589 |
+
Ωm
|
590 |
+
𝑈 (0.1, 0.9)
|
591 |
+
Δ𝑧1
|
592 |
+
N0.0, 0.016)
|
593 |
+
Ωb
|
594 |
+
𝑈 (0.03, 0.07)
|
595 |
+
Δ𝑧2
|
596 |
+
N(0.0, 0.017)
|
597 |
+
ℎ
|
598 |
+
𝑈 (0.55, 0.91)
|
599 |
+
Δ𝑧3
|
600 |
+
N(0.0, 0.013)
|
601 |
+
𝑛s
|
602 |
+
𝑈 (0.87, 1.07)
|
603 |
+
Δ𝑧4
|
604 |
+
N(0.0, 0.015)
|
605 |
+
𝜎8
|
606 |
+
𝑈 (0.6, 0.9)
|
607 |
+
𝑝i
|
608 |
+
N( ¯𝑝𝑖, C)
|
609 |
+
Shear multiplicative bias
|
610 |
+
𝑚𝑖
|
611 |
+
0.012
|
612 |
+
Table 1. Prior distributions for the parameters considered in this work. Note
|
613 |
+
that the redshift calibration section contains the priors for both the Δ𝑧 and
|
614 |
+
𝑝𝛼 (𝑧) models which are not sampled simultaneously.
|
615 |
+
marginalisation approach, we will either use the full posterior dis-
|
616 |
+
tribution in Eq. 7, or the analytically marginalised version in Eq.
|
617 |
+
93. In the first case, 𝝂 includes all nuisance parameters describing
|
618 |
+
the redshift distribution uncertainties, and in both cases 𝛀 includes
|
619 |
+
all other model parameters. Specifically, 𝛀 contains the five ΛCDM
|
620 |
+
cosmological parameters (Ωm, Ωb, 𝜎8, 𝑛𝑠, ℎ).
|
621 |
+
When marginalising over redshift distribution uncertainties, 𝝂 will
|
622 |
+
contain either one redshift shift parameter Δ𝑧𝛼 for each redshift bin,
|
623 |
+
when employing the parametric description of 𝑝(𝑧) uncertainties
|
624 |
+
(Method 1), or a set of bin heights for each redshift bin determining
|
625 |
+
𝑝𝛼(𝑧), when using the non-parametric approach (Method 2). The
|
626 |
+
first case will introduce 4 new parameters to the model, while the
|
627 |
+
latter will introduce 4 × 40 = 160 new amplitude parameters, as
|
628 |
+
described in Section 3.1.
|
629 |
+
Table 1 shows the parameter priors used in this work. All cosmo-
|
630 |
+
logical parameters take uniform, largely uninformative priors. For
|
631 |
+
simplicity, the multiplicative bias parameters were fixed at the center
|
632 |
+
of the Gaussian priors from the official analysis of DES-Y1 (Ab-
|
633 |
+
bott et al. 2018a). When using Method 1 to numerically marginalise
|
634 |
+
over the 𝑝(𝑧) uncertainties, we used Gaussian priors on each of the
|
635 |
+
shift parameters Δ𝑧𝛼, following those used by DES-Y1 (Abbott et al.
|
636 |
+
2018a). When using Method 2 (marginalisation over 𝑝(𝑧) bin am-
|
637 |
+
plitudes), we assume a multi-variate Gaussian prior, with the 𝑝(𝑧)
|
638 |
+
covariance described in Sect. 3.1 and shown in Fig. 1.
|
639 |
+
For both 𝑝(𝑧) uncertainty models, when using analytical marginal-
|
640 |
+
isation, we use Eq. 9 and modify the covariance as in Eq. 10, with P
|
641 |
+
given by the priors described above. When using numerical marginal-
|
642 |
+
isation, we simply explore the posterior distribution of the full model,
|
643 |
+
including all the 𝑝(𝑧), 𝑝𝑖, parameters. In the case of Method 2, this
|
644 |
+
involves sampling a distribution with 165 parameters, of which the
|
645 |
+
bulk (160 parameters) describe the 𝑝(𝑧) uncertainty. This is not fea-
|
646 |
+
sible for standard Metropolis-Hastings MCMC methods Metropolis
|
647 |
+
et al. (1953); Hastings (1970) due to the curse of dimensionality, and
|
648 |
+
therefore we resort to a Hamiltonian Monte Carlo (HMC) approach.
|
649 |
+
HMC (MacKay 2002; Betancourt 2017) uses notions of Hamil-
|
650 |
+
tonian dynamics to draw trajectories on the parameter space along
|
651 |
+
which the sampler moves. This results in a much greater accep-
|
652 |
+
tance rate, and allows HMC to beat the dimensionality curse. HMC
|
653 |
+
can thus efficiently explore parameter spaces with large numbers of
|
654 |
+
dimensions in far less time than Metropolis-Hastings or nested sam-
|
655 |
+
pling techniques (Alsing & Handley 2021). The main difficulty of
|
656 |
+
3 Recall that we treat the term in the second line of Eq. 9 as a constant.
|
657 |
+
MNRAS 000, 1–11 (2022)
|
658 |
+
|
659 |
+
6
|
660 |
+
Ruiz-Zapatero et al.
|
661 |
+
0.2
|
662 |
+
0.3
|
663 |
+
0.4
|
664 |
+
m
|
665 |
+
0.70
|
666 |
+
0.75
|
667 |
+
0.80
|
668 |
+
S8
|
669 |
+
0.6
|
670 |
+
0.7
|
671 |
+
0.8
|
672 |
+
0.9
|
673 |
+
8
|
674 |
+
0.6 0.7 0.8 0.9
|
675 |
+
8
|
676 |
+
0.71 0.75 0.79
|
677 |
+
S8
|
678 |
+
z - Analytical marg. - DESY1
|
679 |
+
z - Numerical marg. - DESY1
|
680 |
+
z - No marg. - DESY1
|
681 |
+
Figure 2. Marginalised posterior distributions for the combination of parame-
|
682 |
+
ters Ωm, 𝜎8 and 𝑆8 obtained when considering the Δ𝑧 model for photometric
|
683 |
+
uncertainties for DES-Y1 data. The blue contours correspond to the case
|
684 |
+
where the Δ𝑧 parameter are fixed. The magenta contours are obtained when
|
685 |
+
numerically marginalizing over the Δ𝑧 parameters. Finally, the black dashed
|
686 |
+
contours are obtained when analytically marginalizing over the Δ𝑧 parame-
|
687 |
+
ters. We can observe that the analytical and numerical marginalisation return
|
688 |
+
nearly identical posteriors.
|
689 |
+
using HMC is the need to calculate gradients of the log-posterior
|
690 |
+
to calculate the Hamiltonian equations of motion. The additional
|
691 |
+
computational cost of obtaining these derivatives numerically (e.g.
|
692 |
+
via adaptive finite differences) may outweigh the gains caused by the
|
693 |
+
higher acceptance rates of HMC. To overcome this problem we make
|
694 |
+
use of automatic differentiation (AD). To take advantage of AD, we
|
695 |
+
have developed a cosmological theoretical prediction code natively
|
696 |
+
written in the Julia programming language (Ruiz-Zapatero et al.
|
697 |
+
2023). Julia is a just-in-time (JIT) compiled language with C-like
|
698 |
+
performance and seamless AD integration, which can thus be used
|
699 |
+
to efficiently sample complex cosmological posteriors using HMC.
|
700 |
+
To sample the posterior distribution we use the No-U-Turns Sampler
|
701 |
+
(NUTS Hoffman & Gelman (2011)) implementation of HMC within
|
702 |
+
the Turing.jl package (Ge et al. 2018).
|
703 |
+
5 RESULTS
|
704 |
+
5.1 Linearising Δ𝑧
|
705 |
+
Let us begin the discussion of our results by considering the simplest
|
706 |
+
of the two models of the photometric uncertainties studied in this
|
707 |
+
work, the Δ𝑧 model (called Method 1 above). As discussed in Section
|
708 |
+
4, this model introduces 4 new shift parameters Δ𝑧 (one per redshift
|
709 |
+
bin) in addition to the 5 ΛCDM parameters. All other nuisance
|
710 |
+
parameters are kept fixed. For the DES-Y1 and LSST-like datasets,
|
711 |
+
we will compare the result of analytically marginalizing over the Δ𝑧
|
712 |
+
parameters against performing the full numerical marginalisation on
|
713 |
+
the corresponding cosmological constraints. In order to quantify the
|
714 |
+
contribution of redshift uncertainties to the total error budget, we will
|
715 |
+
also present results for the case when the Δ𝑧 parameters are fixed (i.e.
|
716 |
+
assuming perfect knowledge of the redshift distributions).
|
717 |
+
0.30 0.35
|
718 |
+
m
|
719 |
+
0.82
|
720 |
+
0.83
|
721 |
+
0.84
|
722 |
+
0.85
|
723 |
+
S8
|
724 |
+
0.75
|
725 |
+
0.80
|
726 |
+
0.85
|
727 |
+
8
|
728 |
+
0.75
|
729 |
+
0.85
|
730 |
+
8
|
731 |
+
0.83
|
732 |
+
0.85
|
733 |
+
S8
|
734 |
+
z - Analytical marg. - LSST
|
735 |
+
z - Numerical marg. - LSST
|
736 |
+
z - No marg. - LSST
|
737 |
+
Figure 3. Marginalised posterior distributions for the combination of parame-
|
738 |
+
ters Ωm, 𝜎8 and 𝑆8 obtained when considering the Δ𝑧 model for photometric
|
739 |
+
uncertainties for futuristic LSST-like data. The green contours correspond to
|
740 |
+
the case where the Δ𝑧 parameter are fixed. The orange contours are obtained
|
741 |
+
when numerically marginalizing over the Δ𝑧 parameters. Finally, the black
|
742 |
+
dashed contours are obtained when analytically marginalizing over the Δ𝑧 pa-
|
743 |
+
rameters. We can observe that the analytical and numerical marginalisations
|
744 |
+
return nearly identical posteriors.
|
745 |
+
Our results for DES-Y1 data are shown in Fig. 2, with the er-
|
746 |
+
rors on all parameters listed in Table 2. On the one hand, we find
|
747 |
+
that marginalizing analytically or numerically over the Δ𝑧 parame-
|
748 |
+
ters leads to the same marginalised posterior for the cosmological
|
749 |
+
parameters. On the other hand, fixing the Δ𝑧 parameters returns a
|
750 |
+
posterior distribution that is only mildly narrower than the marginal
|
751 |
+
distribution. For the DES-Y1 data, the impact of redshift uncertain-
|
752 |
+
ties in the final cosmological errors is relatively small (although not
|
753 |
+
negligible). Thus, if we truly wish to study the effect of marginal-
|
754 |
+
izing analytically as opposed to numerically over the Δ𝑧 parameters
|
755 |
+
we will have to consider futuristic LSST-like data, where the impact
|
756 |
+
of these uncertainties will likely be higher.
|
757 |
+
We show results for futuristic LSST-like data on Fig. 3, with the
|
758 |
+
parameter constraints listed in Table 2. First of all, in the case LSST-
|
759 |
+
like data we observe that not marginalising over the Δ𝑧 parameters
|
760 |
+
in the model results in significantly narrower posteriors, with the
|
761 |
+
final uncertainties shrinking by a factor ∼ 2. The impact of redshift
|
762 |
+
distribution uncertainties in this case is thus much more relevant,
|
763 |
+
and the accuracy of the analytical marginalisation scheme becomes
|
764 |
+
paramount. However, comparing the contours obtained by numerical
|
765 |
+
and analytical marginalisation, we observe that both methods return
|
766 |
+
largely equivalent posterior distributions, with the final uncertainties
|
767 |
+
changing by much less than 10%. This holds even in the case the
|
768 |
+
Δ𝑧 prior worsen by a factor 4 as seen in Figure A1, in Appendix A.
|
769 |
+
Therefore, linearizing the likelihood around the Δ𝑧 parameters will be
|
770 |
+
a good enough approximation for LSST-data, at least for relatively
|
771 |
+
simple parametrisations of the 𝑝(𝑧) uncertainty, which will allow
|
772 |
+
us to reduce the dimensionality of the model and make parameter
|
773 |
+
inference more efficient.
|
774 |
+
It is worth emphasizing that the results in this section are not
|
775 |
+
meant to be interpreted as forecasts on the constraining power of
|
776 |
+
MNRAS 000, 1–11 (2022)
|
777 |
+
|
778 |
+
Analytical marginalisation over photo-𝑧 uncertainties
|
779 |
+
7
|
780 |
+
Δ𝑧 model
|
781 |
+
Fixed
|
782 |
+
Numerical
|
783 |
+
Analytical
|
784 |
+
Ωm
|
785 |
+
DES-Y1
|
786 |
+
0.333 ± 0.055
|
787 |
+
0.3 ± 0.056
|
788 |
+
0.306 ± 0.055
|
789 |
+
LSST
|
790 |
+
0.311 ± 0.011
|
791 |
+
0.317 ± 0.02
|
792 |
+
0.317 ± 0.02
|
793 |
+
𝜎8
|
794 |
+
DES-Y1
|
795 |
+
0.724 ± 0.072
|
796 |
+
0.765 ± 0.077
|
797 |
+
0.758 ± 0.076
|
798 |
+
LSST
|
799 |
+
0.82 ± 0.015
|
800 |
+
0.821 ± 0.027
|
801 |
+
0.823 ± 0.027
|
802 |
+
𝑆8
|
803 |
+
DES-Y1
|
804 |
+
0.753 ± 0.015
|
805 |
+
0.756 ± 0.015
|
806 |
+
0.756 ± 0.015
|
807 |
+
LSST
|
808 |
+
0.833 ± 0.002
|
809 |
+
0.833 ± 0.005
|
810 |
+
0.833 ± 0.006
|
811 |
+
Table 2. Numerical values for the mean and 1𝜎 confidence intervals for
|
812 |
+
the 1D marginalised posterior distributions of the cosmological parameters
|
813 |
+
Ωm, 𝜎8 and 𝑆8 obtained when considering the first method (𝑧 shifts) to
|
814 |
+
characterise the photometric redshift uncertainties. The first column shows
|
815 |
+
the values obtained when the Δ𝑧 parameters were kept fixed, the second
|
816 |
+
column when they were marginalised numerically and the third column when
|
817 |
+
they were marginalised analytically. In each row we display the constraints
|
818 |
+
obtained when using DES-Y1 or LSST-like data to constrain the models.
|
819 |
+
LSST on cosmological parameters, but only on our ability to ana-
|
820 |
+
lytically marginalize over photometric uncertainties in inferring the
|
821 |
+
underlying cosmology. The recovered constraints depend strongly on
|
822 |
+
assumptions such as the redshift calibration that LSST will be able to
|
823 |
+
achieve for the different samples involved. As such, the results pre-
|
824 |
+
sented here are only a conservative estimate of the effect of analytic
|
825 |
+
marginalisation on cosmological constraints.
|
826 |
+
5.2 Linearising 𝑝𝛼(𝑧)
|
827 |
+
In the previous section we have shown that, even for futuristic LSST-
|
828 |
+
like data, it is possible to marginalize over redshift uncertainties
|
829 |
+
analytically, assuming a relatively simple parametrisation of these
|
830 |
+
uncertainties. We now turn to more complex models to characterise
|
831 |
+
these uncertainties.
|
832 |
+
In order to do so we consider the previously discussed 𝑝𝛼(𝑧)
|
833 |
+
model (called Method 2 above), which turns the height of each bin
|
834 |
+
in the redshift distribution histograms into a free parameter. This
|
835 |
+
results in 40 new free parameters per redshift bin with a total of 160
|
836 |
+
parameters for the data considered in this work.
|
837 |
+
We start by revisiting the DES-Y1 data analysis, presenting our
|
838 |
+
results in Fig. 4. As we observed in the previous section, we find that
|
839 |
+
even for the far more general 𝑝𝛼(𝑧) model there is no significant
|
840 |
+
difference between numerically marginalizing over the 𝑝𝛼(𝑧), or
|
841 |
+
doing so through our approximate analytical approach. Furthermore,
|
842 |
+
as before, fixing the shape of the redshift distribution leads to only
|
843 |
+
mildly tighter constraints. On the one hand, this means that the result
|
844 |
+
found for the Δ𝑧 model is not reliant on the simplicity of the model,
|
845 |
+
but instead inherent to the sensitivity of DES-Y1 data. On the other
|
846 |
+
hand, this also means that we must turn once again to futuristic LSST-
|
847 |
+
like data to study the impact of a more general parametrisation of
|
848 |
+
photometric uncertainties.
|
849 |
+
The results for futuristic LSST-like data are shown in Fig. 5. As in
|
850 |
+
the case of the Δ𝑧 parametrisation, we find that, in the case LSST-
|
851 |
+
like data, not including the 𝑝𝛼(𝑧) parameters in the model results
|
852 |
+
in significantly narrower posteriors. By looking at the corresponding
|
853 |
+
numerical values in Tab. 3, we see that the 𝑆8 constraints become
|
854 |
+
twice as tight when the 𝑝𝛼(𝑧) parameters are fixed. Most importantly,
|
855 |
+
we find that marginalizing over the 𝑝���(𝑧) parameters analytically
|
856 |
+
or numerically yields almost indistinguishable posteriors. Thus, the
|
857 |
+
results found in Sect. 5.1 for the simple Δ𝑧 parametrisation, in fact
|
858 |
+
hold for significantly more general models of the uncertainty in the
|
859 |
+
galaxy redshift distributions.
|
860 |
+
Finally, in Fig. 6 we present the constraints obtained for the 160
|
861 |
+
0.2
|
862 |
+
0.3
|
863 |
+
0.4
|
864 |
+
m
|
865 |
+
0.70
|
866 |
+
0.74
|
867 |
+
0.78
|
868 |
+
S8
|
869 |
+
0.6
|
870 |
+
0.7
|
871 |
+
0.8
|
872 |
+
0.9
|
873 |
+
8
|
874 |
+
0.6 0.7 0.8 0.9
|
875 |
+
8
|
876 |
+
0.71 0.75 0.79
|
877 |
+
S8
|
878 |
+
p (z) - Analytical marg. - DESY1
|
879 |
+
p (z) - Numerical marg. - DESY1
|
880 |
+
p (z) - No marg. - DESY1
|
881 |
+
Figure 4. Marginalised posterior distributions for the combination of pa-
|
882 |
+
rameters Ωm, 𝜎8 and 𝑆8 obtained when considering the 𝑝𝛼 (𝑧) model for
|
883 |
+
photometric uncertainties for DES-Y1 data. The blue contours correspond to
|
884 |
+
the case where the 𝑝𝛼 (𝑧) parameter are fixed. The magenta contours are ob-
|
885 |
+
tained when numerically marginalising over the 𝑝𝛼 (𝑧) parameters. Finally,
|
886 |
+
the black dashed contours are obtained when analytically marginalizing over
|
887 |
+
the 𝑝𝛼 (𝑧) parameters. We can observe that the analytical and numerical
|
888 |
+
marginalisation return nearly identical posteriors.
|
889 |
+
0.30 0.35
|
890 |
+
m
|
891 |
+
0.82
|
892 |
+
0.83
|
893 |
+
0.84
|
894 |
+
0.85
|
895 |
+
S8
|
896 |
+
0.75
|
897 |
+
0.80
|
898 |
+
0.85
|
899 |
+
0.90
|
900 |
+
8
|
901 |
+
0.75
|
902 |
+
0.85
|
903 |
+
8
|
904 |
+
0.83
|
905 |
+
0.85
|
906 |
+
S8
|
907 |
+
p (z) - Analytical marg. - LSST
|
908 |
+
p (z) - Numerical marg. - LSST
|
909 |
+
p (z) - No marg. - LSST
|
910 |
+
Figure 5. Marginalised posterior distributions for the combination of pa-
|
911 |
+
rameters Ωm, 𝜎8 and 𝑆8 obtained when considering the 𝑝𝛼 (𝑧) model for
|
912 |
+
photometric uncertainties for LSST-like futuristic data. The green contours
|
913 |
+
correspond to the case where the 𝑝𝛼 (𝑧) parameter are fixed. The orange
|
914 |
+
contours were obtained when numerically marginalizing over the 𝑝𝛼 (𝑧) pa-
|
915 |
+
rameters. Finally, the black dashed contours were obtained when analytically
|
916 |
+
marginalizing over the 𝑝𝛼 (𝑧) parameters. We can observe that the analytical
|
917 |
+
and numerical marginalization return nearly identical posteriors.
|
918 |
+
MNRAS 000, 1–11 (2022)
|
919 |
+
|
920 |
+
8
|
921 |
+
Ruiz-Zapatero et al.
|
922 |
+
𝑝𝛼 (𝑧) model
|
923 |
+
Fixed
|
924 |
+
Numerical
|
925 |
+
Analytical
|
926 |
+
Ωm
|
927 |
+
DES-Y1
|
928 |
+
0.333 ± 0.056
|
929 |
+
0.308 ± 0.055
|
930 |
+
0.312 ± 0.057
|
931 |
+
LSST
|
932 |
+
0.311 ± 0.011
|
933 |
+
0.317 ± 0.02
|
934 |
+
0.317 ± 0.021
|
935 |
+
𝜎8
|
936 |
+
DES-Y1
|
937 |
+
0.723 ± 0.073
|
938 |
+
0.755 ± 0.075
|
939 |
+
0.75 ± 0.077
|
940 |
+
LSST
|
941 |
+
0.824 ± 0.015
|
942 |
+
0.816 ± 0.026
|
943 |
+
0.815 ± 0.027
|
944 |
+
𝑆8
|
945 |
+
DES-Y1
|
946 |
+
0.753 ± 0.015
|
947 |
+
0.755 ± 0.015
|
948 |
+
0.755 ± 0.015
|
949 |
+
LSST
|
950 |
+
0.838 ± 0.002
|
951 |
+
0.837 ± 0.006
|
952 |
+
0.837 ± 0.006
|
953 |
+
Table 3. Numerical values for the mean and 1𝜎 confidence intervals for the
|
954 |
+
1D marginalised posterior distributions of the cosmological parameters Ωm,
|
955 |
+
𝜎8 and 𝑆8 obtained when considering the second method (𝑝(𝑧) bin heights)
|
956 |
+
to characterise the photometric redshift uncertainties. The first column shows
|
957 |
+
the values obtained when the 𝑝𝛼 (𝑧) parameters are kept fixed, the second
|
958 |
+
column when they are marginalised numerically, and the third column when
|
959 |
+
they are marginalised analytically. In each row we display the constraints
|
960 |
+
obtained when using DES-Y1 or LSST-like data to constrain the models.
|
961 |
+
𝑝𝛼(𝑧) parameters for both the DES-Y1 (top panel) and LSST-like
|
962 |
+
data (bottom panel) in color bands. We observe that the posterior
|
963 |
+
distributions are largely dominated by the prior (shown in dashed
|
964 |
+
black line with error bars) and, thus, the redshift distribution is not
|
965 |
+
significantly self-calibrated by the data in either case.
|
966 |
+
Before moving to the next Section, it is worth stressing that con-
|
967 |
+
straining such a large parameter space has only been possible thanks
|
968 |
+
to the auto-differentiable nature of the code used to obtain theoret-
|
969 |
+
ical predictions, allowing us to use gradient-based samplers, much
|
970 |
+
more efficient that standard samplers. The development of such auto-
|
971 |
+
differentiable codes will therefore become imperative in the near fu-
|
972 |
+
ture given the increasing complexity of models used in cosmological
|
973 |
+
analyses.
|
974 |
+
5.3 Δ𝑧 vs 𝑝𝛼(𝑧)
|
975 |
+
In the previous sections we have focused in the impact of how we
|
976 |
+
marginalize over the different parametrisations of photometric red-
|
977 |
+
shift uncertainties. In this section we will focus instead on what we
|
978 |
+
marginalize over, i.e. the impact of the choice of parametrisation.
|
979 |
+
The question is then: Can a one-parameter-per-bin model (Δ𝑧 model)
|
980 |
+
capture all the meaningful modifications to photometric redshift dis-
|
981 |
+
tributions?
|
982 |
+
In order to answer this question, we constrain the cosmological
|
983 |
+
parameters for the Δ𝑧 and 𝑝𝛼(𝑧) models in the case with futuristic
|
984 |
+
LSST-like data. In both cases, we marginalize numerically over their
|
985 |
+
respective nuisance parameters. As shown in Fig. 7 and Tables 2
|
986 |
+
and 3, both methods recover the same posterior distributions with
|
987 |
+
small differences. Thus, it is in principle possible that even Stage-IV
|
988 |
+
surveys will be able to use relatively simple models to describe the
|
989 |
+
redshift distribution of cosmic shear samples4.
|
990 |
+
6 CONCLUSIONS
|
991 |
+
One of the most significant obstacles to overcome in photometric
|
992 |
+
weak lensing surveys is the accurate modeling of redshift distribu-
|
993 |
+
tions, 𝑝(𝑧). Not only are our measurements prone to error, which can
|
994 |
+
bias the inferred cosmological parameters, but accounting for these
|
995 |
+
4 Note, however, this is likely not the case for photometric galaxy clustering
|
996 |
+
studies where other properties of the redshift distribution (e.g. its width) have
|
997 |
+
a stronger impact on the theoretical prediction (Nicola et al. 2020).
|
998 |
+
0.00
|
999 |
+
0.05
|
1000 |
+
0.10
|
1001 |
+
0.15
|
1002 |
+
0.20
|
1003 |
+
p (z)
|
1004 |
+
DESY1
|
1005 |
+
0.0
|
1006 |
+
0.5
|
1007 |
+
1.0
|
1008 |
+
1.5
|
1009 |
+
z
|
1010 |
+
0.00
|
1011 |
+
0.05
|
1012 |
+
0.10
|
1013 |
+
0.15
|
1014 |
+
0.20
|
1015 |
+
p (z)
|
1016 |
+
LSST
|
1017 |
+
Figure 6. Posterior distributions for the 𝑝𝛼 (𝑧) parameters when considering
|
1018 |
+
DES-Y1 data (top row) and futuristic LSST-like data (bottom row). The black
|
1019 |
+
dashed line shows the mean of the Gaussian prior of the 𝑝𝛼 (𝑧) parameters.
|
1020 |
+
The error bars show their corresponding error.
|
1021 |
+
uncertainties is also a major inhibitor of efficient parameter inference.
|
1022 |
+
In this paper, we investigate the impact of analytically marginalizing
|
1023 |
+
over the uncertainties in the redshift distribution of galaxies in weak
|
1024 |
+
lensing surveys, as initially proposed in Hadzhiyska et al. (2020).
|
1025 |
+
In particular, we thoroughly quantify the validity of this approach
|
1026 |
+
for a current weak lensing survey, DES, as well as for a futuristic
|
1027 |
+
LSST-like survey, testing whether a fast analytic method proposed
|
1028 |
+
in this work is capable of reproducing the posterior distributions and
|
1029 |
+
constraints one arrives at when adopting the traditional method of
|
1030 |
+
diligently varying tens or hundreds of nuisance parameters.
|
1031 |
+
Our results show that, for present surveys, marginalizing over the
|
1032 |
+
uncertainty in the redshift distribution of galaxies has only a mild
|
1033 |
+
impact on the constraints on cosmological parameters, although one
|
1034 |
+
that our analytical approximation is able to reproduce accurately. This
|
1035 |
+
is true for the two parametrisations of the uncertainties considered
|
1036 |
+
in this work, in terms of mean redshift shifts or redshift distribution
|
1037 |
+
histogram heights. However, the impact of redshift distribution un-
|
1038 |
+
certainties changes dramatically for future LSST-like surveys. In this
|
1039 |
+
case, redshift uncertainties commensurate with current calibration
|
1040 |
+
samples lead to an degradation in the final constraints on cosmo-
|
1041 |
+
logical parameters of up to a factor ∼ 2. Capturing this effect for
|
1042 |
+
an arbitrarily complex parametrisation of the redshift distribution
|
1043 |
+
uncertainties is an a priori difficult task without resorting to a full
|
1044 |
+
exploration of the parameter space. Nevertheless, we find that the
|
1045 |
+
analytical approximate scheme explored here is still able to recover
|
1046 |
+
the marginalised constraints on cosmological parameters to high
|
1047 |
+
fidelity, even after marginalising over more than 100 nuisance pa-
|
1048 |
+
MNRAS 000, 1–11 (2022)
|
1049 |
+
|
1050 |
+
Analytical marginalisation over photo-𝑧 uncertainties
|
1051 |
+
9
|
1052 |
+
0.30 0.35
|
1053 |
+
m
|
1054 |
+
0.82
|
1055 |
+
0.83
|
1056 |
+
0.84
|
1057 |
+
0.85
|
1058 |
+
S8
|
1059 |
+
0.75
|
1060 |
+
0.80
|
1061 |
+
0.85
|
1062 |
+
0.90
|
1063 |
+
8
|
1064 |
+
0.6
|
1065 |
+
0.7
|
1066 |
+
0.8
|
1067 |
+
0.9
|
1068 |
+
h
|
1069 |
+
0.95
|
1070 |
+
1.00
|
1071 |
+
ns
|
1072 |
+
0.025
|
1073 |
+
0.050
|
1074 |
+
0.075
|
1075 |
+
b
|
1076 |
+
0.04 0.06
|
1077 |
+
b
|
1078 |
+
0.95
|
1079 |
+
1.00
|
1080 |
+
ns
|
1081 |
+
0.6 0.7 0.8 0.9
|
1082 |
+
h
|
1083 |
+
0.74 0.80 0.86
|
1084 |
+
8
|
1085 |
+
0.82
|
1086 |
+
0.84
|
1087 |
+
S8
|
1088 |
+
z - Numerical marg. - LSST
|
1089 |
+
p (z) - Numerical marg. - LSST
|
1090 |
+
Figure 7. Comparison between the obtained marginalised posterior distributions of the cosmological parameters when numerically marginalizing over the Δ𝑧
|
1091 |
+
(black dash-dotted) and 𝑝𝛼 (𝑧) (orange) photometric uncertainties models when applied to LSST-like futuristic data. We can observe that both prametrizations
|
1092 |
+
of the photometric redshift uncertainties return identical posteriors for the cosmological parameters.
|
1093 |
+
rameters. This means that, while future surveys will certainly have
|
1094 |
+
to account for these uncertainties, they will be able to do so using
|
1095 |
+
fast marginalisation methods without increasing the dimensionality
|
1096 |
+
of their astrophysical and cosmological models.
|
1097 |
+
Our results have also shown that simple parametrisations of the
|
1098 |
+
redshift distribution for cosmic shear samples, in terms of shifts in
|
1099 |
+
the mean redshift, are, surprisingly, able to reproduce the impact of
|
1100 |
+
the full uncertainty on 𝑝(𝑧) on the final constraints to high precision.
|
1101 |
+
Although this result will likely not hold for other probes (e.g. tomo-
|
1102 |
+
graphic galaxy clustering), it should certainly simplify the analysis
|
1103 |
+
of future cosmic shear data.
|
1104 |
+
It is worth emphasizing that our work has focused exclusively on
|
1105 |
+
the case of cosmic shear data, and that our conclusions only apply in
|
1106 |
+
this context. The validity of the analytical approximation employed
|
1107 |
+
here for general tomographic tracers of structure with uncertain ra-
|
1108 |
+
dial kernels is not guaranteed, and future work should quantify its
|
1109 |
+
performance on photometric clustering data – the other key probe
|
1110 |
+
of the flagship “3×2pt” analysis of imaging surveys – and its cross
|
1111 |
+
correlation with cosmic shear and CMB lensing data (Heymans et al.
|
1112 |
+
2021; Abbott et al. 2022; García-García et al. 2021; White et al.
|
1113 |
+
2022).
|
1114 |
+
MNRAS 000, 1–11 (2022)
|
1115 |
+
|
1116 |
+
10
|
1117 |
+
Ruiz-Zapatero et al.
|
1118 |
+
ACKNOWLEDGEMENTS
|
1119 |
+
We would like to thank Aně Slosar and Marius Millea for useful dis-
|
1120 |
+
cussions. DA is supported by the Science and Technology Facilities
|
1121 |
+
Council through an Ernest Rutherford Fellowship, grant reference
|
1122 |
+
ST/P004474. PGF, CGG and AM are supported by European Re-
|
1123 |
+
search Council Grant No: 693024 and the Beecroft Trust. JRZ is
|
1124 |
+
supported by an STFC doctoral studentship. We made extensive use
|
1125 |
+
of computational resources at the University of Oxford Department
|
1126 |
+
of Physics, funded by the John Fell Oxford University Press Research
|
1127 |
+
Fund.
|
1128 |
+
We made extensive use of the numpy (Oliphant 2006; Van Der Walt
|
1129 |
+
et al. 2011), scipy (Virtanen et al. 2020), astropy (Astropy Col-
|
1130 |
+
laboration et al. 2013, 2018), healpy (Zonca et al. 2019), GetDist
|
1131 |
+
Lewis (2019), and matplotlib (Hunter 2007) python packages. We
|
1132 |
+
also make use of the Julia packages ForwardDiff.jl (Revels et al.
|
1133 |
+
2016) and Turing.jl (Ge et al. 2018).
|
1134 |
+
DATA AVAILABILITY
|
1135 |
+
The code developed for this work as well as the derived datasets
|
1136 |
+
produced (power spectra and covariances) are available upon request.
|
1137 |
+
The catalogues and maps used were made publicly available by the
|
1138 |
+
authors of the relevant papers, as described in the text.
|
1139 |
+
REFERENCES
|
1140 |
+
Abbott T. M. C., et al., 2018a, Phys. Rev. D, 98, 043526
|
1141 |
+
Abbott T. M. C., et al., 2018b, ApJS, 239, 18
|
1142 |
+
Abbott T. M. C., et al., 2022, Phys. Rev. D, 105, 023520
|
1143 |
+
Afshordi N., Loh Y.-S., Strauss M. A., 2004, Phys. Rev. D, 69, 083524
|
1144 |
+
Alsing J., Handley W., 2021, MNRAS, 505, L95
|
1145 |
+
Astropy Collaboration et al., 2013, A&A, 558, A33
|
1146 |
+
Astropy Collaboration et al., 2018, AJ, 156, 123
|
1147 |
+
Bartelmann M., Schneider P., 2001, Phys. Rep., 340, 291
|
1148 |
+
Betancourt M., 2017, arXiv e-prints, p. arXiv:1701.02434
|
1149 |
+
Bonnett C., et al., 2016, Phys. Rev. D, 94, 042005
|
1150 |
+
Brown M. L., Taylor A. N., Hambly N. C., Dye S., 2002, MNRAS, 333, 501
|
1151 |
+
Chisari N. E., et al., 2019, ApJS, 242, 2
|
1152 |
+
Cordero J. P., et al., 2022, MNRAS, 511, 2170
|
1153 |
+
Efstathiou G., 2004, MNRAS, 349, 603
|
1154 |
+
Ferreira P. G., 2019, ARA&A, 57, 335
|
1155 |
+
Foreman-Mackey D., Hogg D. W., Lang D., Goodman J., 2013, PASP, 125,
|
1156 |
+
306
|
1157 |
+
García-García C., Ruiz-Zapatero J., Alonso D., Bellini E., Ferreira P. G.,
|
1158 |
+
Mueller E.-M., Nicola A., Ruiz-Lapuente P., 2021, J. Cosmology As-
|
1159 |
+
tropart. Phys., 2021, 030
|
1160 |
+
García-García C., Alonso D., Ferreira P. G., Hadzhiyska B., Nicola A.,
|
1161 |
+
Sánchez C., Slosar A., 2023, J. Cosmology Astropart. Phys., 2023, 025
|
1162 |
+
Ge H., Xu K., Ghahramani Z., 2018, in International Conference on Ar-
|
1163 |
+
tificial Intelligence and Statistics, AISTATS 2018, 9-11 April 2018,
|
1164 |
+
Playa Blanca, Lanzarote, Canary Islands, Spain. pp 1682–1690, http:
|
1165 |
+
//proceedings.mlr.press/v84/ge18b.html
|
1166 |
+
Hadzhiyska B., Alonso D., Nicola A., Slosar A., 2020, J. Cosmology As-
|
1167 |
+
tropart. Phys., 2020, 056
|
1168 |
+
Hadzhiyska B., et al., 2023, In prep,
|
1169 |
+
Hastings W. K., 1970, Biometrika, 57, 97
|
1170 |
+
Heymans C., et al., 2021, A&A, 646, A140
|
1171 |
+
Hildebrandt H., et al., 2020a, A&A, 633, A69
|
1172 |
+
Hildebrandt H., et al., 2020b, A&A, 633, A69
|
1173 |
+
Hirata C. M., Seljak U., 2004, Phys. Rev. D, 70, 063526
|
1174 |
+
Hoffman M. D., Gelman A., 2011, arXiv e-prints, p. arXiv:1111.4246
|
1175 |
+
Hoyle B., et al., 2018, MNRAS, 478, 592
|
1176 |
+
Hunter J. D., 2007, Computing in Science & Engineering, 9, 90
|
1177 |
+
Kilbinger M., et al., 2017, MNRAS, 472, 2126
|
1178 |
+
Koukoufilippas N., Alonso D., Bilicki M., Peacock J. A., 2020, MNRAS,
|
1179 |
+
491, 5464
|
1180 |
+
Krause E., Eifler T., 2017, MNRAS, 470, 2100
|
1181 |
+
Krause E., et al., 2017, arXiv e-prints, p. arXiv:1706.09359
|
1182 |
+
LSST Dark Energy Science Collaboration 2012, arXiv e-prints, p.
|
1183 |
+
arXiv:1211.0310
|
1184 |
+
Laigle C., et al., 2016, ApJS, 224, 24
|
1185 |
+
Lewis A., 2019, arXiv e-prints, p. arXiv:1910.13970
|
1186 |
+
Lima M., Cunha C. E., Oyaizu H., Frieman J., Lin H., Sheldon E. S., 2008,
|
1187 |
+
MNRAS, 390, 118
|
1188 |
+
Limber D. N., 1953, ApJ, 117, 134
|
1189 |
+
MacKay D. J. C., 2002, Information Theory, Inference & Learning Al-
|
1190 |
+
gorithms. Cambridge University Press, Cambridge University Press,
|
1191 |
+
Shaftesbury Road Cambridge, CB2 8BS, United Kingdom
|
1192 |
+
Matthews D. J., Newman J. A., 2010, ApJ, 721, 456
|
1193 |
+
Metropolis N., Rosenbluth A. W., Rosenbluth M. N., Teller A. H., Teller E.,
|
1194 |
+
1953, J. Chem. Phys., 21, 1087
|
1195 |
+
Miyazaki S., et al., 2012, in McLean I. S., Ramsay S. K., Takami H., eds,
|
1196 |
+
Vol. 8446, Ground-based and Airborne Instrumentation for Astronomy
|
1197 |
+
IV. SPIE, p. 84460Z, doi:10.1117/12.926844, https://doi.org/10.
|
1198 |
+
1117/12.926844
|
1199 |
+
Newman J. A., 2008, ApJ, 684, 88
|
1200 |
+
Newman E. T., Penrose R., 1966, Journal of Mathematical Physics, 7, 863
|
1201 |
+
Nicola A., et al., 2020, J. Cosmology Astropart. Phys., 2020, 044
|
1202 |
+
Nicola A., García-García C., Alonso D., Dunkley J., Ferreira P. G., Slosar A.,
|
1203 |
+
Spergel D. N., 2021, J. Cosmology Astropart. Phys., 2021, 067
|
1204 |
+
Oliphant T. E., 2006, A guide to NumPy. Vol. 1, Trelgol Publishing USA
|
1205 |
+
Planck Collaboration et al., 2020, A&A, 641, A6
|
1206 |
+
Prat J., et al., 2018, Phys. Rev. D, 98, 042005
|
1207 |
+
Revels J., Lubin M., Papamarkou T., 2016, arXiv:1607.07892 [cs.MS]
|
1208 |
+
Riess A. G., et al., 2022, ApJ, 934, L7
|
1209 |
+
Ruiz-Zapatero J., et al., 2023, In prep,
|
1210 |
+
Sánchez C., Bernstein G. M., 2019, MNRAS, 483, 2801
|
1211 |
+
Sánchez C., et al., 2022, Phys. Rev. D, 105, 083529
|
1212 |
+
Schmidt S. J., Ménard B., Scranton R., Morrison C., McBride C. K., 2013,
|
1213 |
+
MNRAS, 431, 3307
|
1214 |
+
Schneider M., Knox L., Zhan H., Connolly A., 2006, ApJ, 651, 14
|
1215 |
+
Scott D., 2018, arXiv e-prints, p. arXiv:1804.01318
|
1216 |
+
Smith R. E., et al., 2003, MNRAS, 341, 1311
|
1217 |
+
Spergel D., et al., 2015, arXiv e-prints, p. arXiv:1503.03757
|
1218 |
+
Stölzner B., Joachimi B., Korn A., Hildebrandt H., Wright A. H., 2021, A&A,
|
1219 |
+
650, A148
|
1220 |
+
Takahashi R., Sato M., Nishimichi T., Taruya A., Oguri M., 2012, ApJ, 761,
|
1221 |
+
152
|
1222 |
+
Van Der Walt S., Colbert S. C., Varoquaux G., 2011, Computing in Science
|
1223 |
+
& Engineering, 13, 22
|
1224 |
+
Virtanen P., et al., 2020, Nature Methods, 17, 261
|
1225 |
+
White M., et al., 2022, J. Cosmology Astropart. Phys., 2022, 007
|
1226 |
+
Wright A. H., Hildebrandt H., van den Busch J. L., Heymans C., 2020, A&A,
|
1227 |
+
637, A100
|
1228 |
+
Zhang T., Rau M. M., Mandelbaum R., Li X., Moews B., 2023, MNRAS,
|
1229 |
+
518, 709
|
1230 |
+
Zonca A., Singer L., Lenz D., Reinecke M., Rosset C., Hivon E., Gorski K.,
|
1231 |
+
2019, Journal of Open Source Software, 4, 1298
|
1232 |
+
APPENDIX A: STRESS-TESTING THE APPROXIMATION
|
1233 |
+
As described in Sect. 2, the approximation used here to analytically
|
1234 |
+
marginalise over the redshift calibration parameters assumes a suffi-
|
1235 |
+
ciently tight prior on these parameters, such that the dependence of
|
1236 |
+
the theory prediction on them can be linearised. Testing whether this
|
1237 |
+
assumption might break in a realistic scenario, is therefore essential.
|
1238 |
+
This is important in the context of Stage-IV since, even though it is
|
1239 |
+
expected that spectroscopic samples and the associated calibration
|
1240 |
+
MNRAS 000, 1–11 (2022)
|
1241 |
+
|
1242 |
+
Analytical marginalisation over photo-𝑧 uncertainties
|
1243 |
+
11
|
1244 |
+
0.3
|
1245 |
+
0.4
|
1246 |
+
m
|
1247 |
+
0.80
|
1248 |
+
0.85
|
1249 |
+
S8
|
1250 |
+
0.8
|
1251 |
+
0.9
|
1252 |
+
8
|
1253 |
+
0.6
|
1254 |
+
0.7
|
1255 |
+
0.8
|
1256 |
+
0.9
|
1257 |
+
h
|
1258 |
+
0.95
|
1259 |
+
1.00
|
1260 |
+
ns
|
1261 |
+
0.04
|
1262 |
+
0.06
|
1263 |
+
b
|
1264 |
+
0.04
|
1265 |
+
0.06
|
1266 |
+
b
|
1267 |
+
0.95 1.00
|
1268 |
+
ns
|
1269 |
+
0.6 0.7 0.8 0.9
|
1270 |
+
h
|
1271 |
+
0.8
|
1272 |
+
0.9
|
1273 |
+
8
|
1274 |
+
0.80
|
1275 |
+
0.85
|
1276 |
+
S8
|
1277 |
+
z - Analytical marg. - LSST - 4
|
1278 |
+
z - Numerical marg. - LSST- 4
|
1279 |
+
Figure A1. Shows a comparison between the obtained marginalised posterior distributions of the cosmological parameters when analytically marginalizing over
|
1280 |
+
the Δ𝑧 (black dashed) and when performing the full numerical marginalisation (orange) when analyzing LSST-like data. In both cases the Δ𝑧 prior distributions
|
1281 |
+
where made 4 times wider. We can observe that despite significantly broadening the prior distributions the analytical marginalisation returns virtually identical
|
1282 |
+
posteriors for the cosmological parameters.
|
1283 |
+
techniques will improve over time, the increase in depth that LSST-
|
1284 |
+
like surveys will represent may make the calibration of the faintest
|
1285 |
+
samples in the survey particularly challenging.
|
1286 |
+
To further stress-test our approximate method, we repeat our anal-
|
1287 |
+
ysis of the LSST-like futuristic data using the Δ𝑧 model for redshift
|
1288 |
+
uncertainties with priors 4 times larger than used in our fiducial
|
1289 |
+
analysis (which themselves were based on existing calibration sam-
|
1290 |
+
ples). The result of this test is shown in Fig. A1. Reassuringly, the
|
1291 |
+
results show that, despite quadrupling the uncertainty in the redshift
|
1292 |
+
nuisance parameters, the analytic marginalisation method yields vir-
|
1293 |
+
tually the same constraints on the cosmological parameters as the
|
1294 |
+
brute-force marginalisation, in spite of the significantly broader pos-
|
1295 |
+
terior contours. This implicit validates the approximation that a first-
|
1296 |
+
order expansion of the theory data vector with respect to a change
|
1297 |
+
in redshift distribution is sufficient over a conservative range of cali-
|
1298 |
+
bration priors.
|
1299 |
+
This paper has been typeset from a TEX/LATEX file prepared by the author.
|
1300 |
+
MNRAS 000, 1–11 (2022)
|
1301 |
+
|
-tFLT4oBgHgl3EQfDC7x/content/tmp_files/load_file.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
.gitattributes
CHANGED
@@ -9125,3 +9125,77 @@ B9AyT4oBgHgl3EQfePhg/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -tex
|
|
9125 |
8dE3T4oBgHgl3EQfRwni/content/2301.04426v1.pdf filter=lfs diff=lfs merge=lfs -text
|
9126 |
a9AzT4oBgHgl3EQf2v6K/content/2301.01819v1.pdf filter=lfs diff=lfs merge=lfs -text
|
9127 |
8dE3T4oBgHgl3EQfRwni/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
9125 |
8dE3T4oBgHgl3EQfRwni/content/2301.04426v1.pdf filter=lfs diff=lfs merge=lfs -text
|
9126 |
a9AzT4oBgHgl3EQf2v6K/content/2301.01819v1.pdf filter=lfs diff=lfs merge=lfs -text
|
9127 |
8dE3T4oBgHgl3EQfRwni/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
9128 |
+
0NFQT4oBgHgl3EQfDTUM/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
9129 |
+
qtFQT4oBgHgl3EQftTaK/content/2301.13391v1.pdf filter=lfs diff=lfs merge=lfs -text
|
9130 |
+
edAyT4oBgHgl3EQfw_kw/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
9131 |
+
mtA0T4oBgHgl3EQfJf_Z/content/2301.02092v1.pdf filter=lfs diff=lfs merge=lfs -text
|
9132 |
+
CNE1T4oBgHgl3EQf9wYh/content/2301.03559v1.pdf filter=lfs diff=lfs merge=lfs -text
|
9133 |
+
rdFKT4oBgHgl3EQf0i6X/content/2301.11916v1.pdf filter=lfs diff=lfs merge=lfs -text
|
9134 |
+
AtE0T4oBgHgl3EQfPgDv/content/2301.02181v1.pdf filter=lfs diff=lfs merge=lfs -text
|
9135 |
+
6NE1T4oBgHgl3EQfBQJe/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
9136 |
+
RdE0T4oBgHgl3EQfkgGS/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
9137 |
+
qNFST4oBgHgl3EQfOTiK/content/2301.13751v1.pdf filter=lfs diff=lfs merge=lfs -text
|
9138 |
+
tNE2T4oBgHgl3EQf1wiA/content/2301.04154v1.pdf filter=lfs diff=lfs merge=lfs -text
|
9139 |
+
a9FST4oBgHgl3EQfCDgc/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
9140 |
+
_dE1T4oBgHgl3EQfogTY/content/2301.03322v1.pdf filter=lfs diff=lfs merge=lfs -text
|
9141 |
+
AtE0T4oBgHgl3EQfPgDv/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
9142 |
+
TtE0T4oBgHgl3EQfVAA3/content/2301.02257v1.pdf filter=lfs diff=lfs merge=lfs -text
|
9143 |
+
qNFST4oBgHgl3EQfOTiK/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
9144 |
+
2NE2T4oBgHgl3EQfNgYt/content/2301.03737v1.pdf filter=lfs diff=lfs merge=lfs -text
|
9145 |
+
BdE1T4oBgHgl3EQfVgTd/content/2301.03104v1.pdf filter=lfs diff=lfs merge=lfs -text
|
9146 |
+
i9FAT4oBgHgl3EQfaB2u/content/2301.08549v1.pdf filter=lfs diff=lfs merge=lfs -text
|
9147 |
+
I9E0T4oBgHgl3EQfiAGs/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
9148 |
+
z9FRT4oBgHgl3EQfkDeO/content/2301.13594v1.pdf filter=lfs diff=lfs merge=lfs -text
|
9149 |
+
GNE3T4oBgHgl3EQfWAqd/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
9150 |
+
BdE3T4oBgHgl3EQfUAoU/content/2301.04446v1.pdf filter=lfs diff=lfs merge=lfs -text
|
9151 |
+
5dFKT4oBgHgl3EQfSi3T/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
9152 |
+
f9E0T4oBgHgl3EQfXQDJ/content/2301.02291v1.pdf filter=lfs diff=lfs merge=lfs -text
|
9153 |
+
a9AzT4oBgHgl3EQf2v6K/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
9154 |
+
R9FRT4oBgHgl3EQf8jhZ/content/2301.13684v1.pdf filter=lfs diff=lfs merge=lfs -text
|
9155 |
+
I9E0T4oBgHgl3EQfiAGs/content/2301.02440v1.pdf filter=lfs diff=lfs merge=lfs -text
|
9156 |
+
CNE1T4oBgHgl3EQf9wYh/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
9157 |
+
hNA0T4oBgHgl3EQfH__c/content/2301.02070v1.pdf filter=lfs diff=lfs merge=lfs -text
|
9158 |
+
u9FPT4oBgHgl3EQfNzRd/content/2301.13031v1.pdf filter=lfs diff=lfs merge=lfs -text
|
9159 |
+
CNE5T4oBgHgl3EQfTg-d/content/2301.05537v1.pdf filter=lfs diff=lfs merge=lfs -text
|
9160 |
+
WNFPT4oBgHgl3EQfqzXF/content/2301.13143v1.pdf filter=lfs diff=lfs merge=lfs -text
|
9161 |
+
GNE3T4oBgHgl3EQftgtb/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
9162 |
+
z9FRT4oBgHgl3EQfkDeO/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
9163 |
+
BdE3T4oBgHgl3EQfUAoU/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
9164 |
+
u9FPT4oBgHgl3EQfNzRd/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
9165 |
+
WNFPT4oBgHgl3EQfqzXF/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
9166 |
+
OtFRT4oBgHgl3EQf5Dhx/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
9167 |
+
CNE5T4oBgHgl3EQfTg-d/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
9168 |
+
R9FRT4oBgHgl3EQf8jhZ/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
9169 |
+
2dAzT4oBgHgl3EQfRvud/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
9170 |
+
odE5T4oBgHgl3EQfkA-1/content/2301.05660v1.pdf filter=lfs diff=lfs merge=lfs -text
|
9171 |
+
AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf filter=lfs diff=lfs merge=lfs -text
|
9172 |
+
6NE1T4oBgHgl3EQfBQJe/content/2301.02849v1.pdf filter=lfs diff=lfs merge=lfs -text
|
9173 |
+
c9FST4oBgHgl3EQfEDj7/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
9174 |
+
-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf filter=lfs diff=lfs merge=lfs -text
|
9175 |
+
ztAyT4oBgHgl3EQfn_j3/content/2301.00501v1.pdf filter=lfs diff=lfs merge=lfs -text
|
9176 |
+
GdA0T4oBgHgl3EQfBf_u/content/2301.01978v1.pdf filter=lfs diff=lfs merge=lfs -text
|
9177 |
+
99FLT4oBgHgl3EQfCS7y/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
9178 |
+
sNFIT4oBgHgl3EQfyiuq/content/2301.11361v1.pdf filter=lfs diff=lfs merge=lfs -text
|
9179 |
+
AtE4T4oBgHgl3EQf5A4w/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
9180 |
+
qtFQT4oBgHgl3EQftTaK/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
9181 |
+
_tE5T4oBgHgl3EQfSQ5r/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
9182 |
+
odE5T4oBgHgl3EQfkA-1/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
9183 |
+
rdFKT4oBgHgl3EQf0i6X/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
9184 |
+
29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf filter=lfs diff=lfs merge=lfs -text
|
9185 |
+
D9E0T4oBgHgl3EQfQgCE/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
9186 |
+
LtFRT4oBgHgl3EQfFDdF/content/2301.13478v1.pdf filter=lfs diff=lfs merge=lfs -text
|
9187 |
+
ONFJT4oBgHgl3EQfHix_/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
9188 |
+
DtAzT4oBgHgl3EQfwv4v/content/2301.01726v1.pdf filter=lfs diff=lfs merge=lfs -text
|
9189 |
+
DNE2T4oBgHgl3EQf9Qm6/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
9190 |
+
GNE3T4oBgHgl3EQftgtb/content/2301.04676v1.pdf filter=lfs diff=lfs merge=lfs -text
|
9191 |
+
cdAzT4oBgHgl3EQf3P4R/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
9192 |
+
OtE4T4oBgHgl3EQfkA1f/content/2301.05147v1.pdf filter=lfs diff=lfs merge=lfs -text
|
9193 |
+
UNE5T4oBgHgl3EQfbQ8x/content/2301.05594v1.pdf filter=lfs diff=lfs merge=lfs -text
|
9194 |
+
GNAyT4oBgHgl3EQfrfkX/content/2301.00560v1.pdf filter=lfs diff=lfs merge=lfs -text
|
9195 |
+
jNFKT4oBgHgl3EQfBC3b/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
9196 |
+
LtE0T4oBgHgl3EQfiwHh/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
9197 |
+
jNFKT4oBgHgl3EQfBC3b/content/2301.11702v1.pdf filter=lfs diff=lfs merge=lfs -text
|
9198 |
+
ONFJT4oBgHgl3EQfHix_/content/2301.11452v1.pdf filter=lfs diff=lfs merge=lfs -text
|
9199 |
+
K9E1T4oBgHgl3EQfswUE/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
9200 |
+
zdAyT4oBgHgl3EQfO_bl/content/2301.00018v1.pdf filter=lfs diff=lfs merge=lfs -text
|
9201 |
+
ytFQT4oBgHgl3EQfBjWV/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
09E2T4oBgHgl3EQf5AgM/content/tmp_files/2301.04185v1.pdf.txt
ADDED
@@ -0,0 +1,931 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
Synthesis and processing of lithium-loaded plastic
|
2 |
+
scintillators on the kilogram scale
|
3 |
+
Michael J. Forda*, Elisabeth Aigeldingera, Felicia Sutantoa, Natalia P. Zaitsevaa,
|
4 |
+
Viacheslav A. Lia, M. Leslie Carmana, Andrew Glenna, Cristian R. Catalaa, Steven A.
|
5 |
+
Dazeleya, Nathaniel Bowdena*1
|
6 |
+
|
7 |
+
aLawrence Livermore National Laboratory
|
8 |
+
7000 East Avenue, Livermore, CA 94550
|
9 |
+
|
10 |
+
Abstract
|
11 |
+
Plastic scintillators that can discriminate between gamma rays, fast neutrons, and
|
12 |
+
thermal neutrons were synthesized and characterized while considering the balance
|
13 |
+
between processing and performance at the kilogram scale. These trade-offs were
|
14 |
+
necessitated by the inclusion of 0.1 wt. % lithium-6 to enable detection of thermal
|
15 |
+
neutrons. The synthesis and processing of these plastic scintillators on the kilogram
|
16 |
+
scale required consideration of many factors. First, a comonomer (methacrylic acid)
|
17 |
+
was used to solubilize salts of lithium-6, which allow for a thermal-neutron capture
|
18 |
+
reaction that produces scintillation light following energy transfer. Second, scintillation
|
19 |
+
performance and processability were considered because the increasing content of the
|
20 |
+
comonomer resulted in a sharp decrease in the light output. The use of small amounts
|
21 |
+
of comonomer (≤3 wt. %) resulted in better performance but required high processing
|
22 |
+
temperatures. At large scales, these high temperatures could initiate an exothermic
|
23 |
+
polymerization that results in premature curing and/or defects. The deleterious effects
|
24 |
+
of the comonomer may be mitigated by using m-terphenyl as a primary dye rather than
|
25 |
+
2,5-diphenyloxazole (PPO), which has been traditionally used in organic scintillators.
|
26 |
+
Finally, the curing environment was controlled to avoid defects like cracking and
|
27 |
+
discoloration while maintaining solubility of dopants during curing. For scintillators
|
28 |
+
that were produced from kilogram-scale batches of precursors, the effective attenuation
|
29 |
+
of scintillation light was characterized.
|
30 |
+
|
31 |
+
* This is to indicate the corresponding author.
|
32 |
+
Email address: [email protected]; [email protected]
|
33 |
+
|
34 |
+
|
35 |
+
Keywords: pulse-shape discrimination, plastic scintillators, inverse beta decay, neutron
|
36 |
+
detection, large-scale detectors
|
37 |
+
|
38 |
+
1. Introduction
|
39 |
+
The rising cost of fossil fuels and concerns about greenhouse gas emissions
|
40 |
+
motivate a revival of nuclear power generation.[1] However, the expansion of nuclear
|
41 |
+
power throughout the world and the construction of novel reactor types may challenge
|
42 |
+
the resources available for implementing conventional safeguards. Direct and
|
43 |
+
nonintrusive measurements of reactor operation using offer one approach to address
|
44 |
+
this concern.
|
45 |
+
These measurements can be facilitated by the development of novel detectors
|
46 |
+
to enable near-field (ca. 10-100 m) monitoring of antineutrinos produced by a
|
47 |
+
reactor.[2–10] Previous reports highlight the ability of organic scintillators to monitor
|
48 |
+
this antineutrino flux. For example, the Precision Reactor Oscillation and Spectrum
|
49 |
+
Experiment (PROSPECT)[11] recently demonstrated the measurement of the
|
50 |
+
antineutrino spectrum from 235U at the High Flux Isotope Reactor at Oak Ridge
|
51 |
+
National Laboratory. Like in many experiments that use organic scintillators to monitor
|
52 |
+
antineutrino flux, PROSPECT utilized about 4 tons of a liquid scintillator loaded with
|
53 |
+
a neutron capture agent (6Li in this case), which can detect signatures of inverse beta
|
54 |
+
decay. In this experiment, the scintillation light is associated with signatures of inverse
|
55 |
+
beta decay using a measurement scheme called pulse-shape discrimination (PSD).[12]
|
56 |
+
After monitoring a scintillation pulse over time, a prompt signal of scintillation light
|
57 |
+
can be associated with the antineutrino energy, and the delayed signal of scintillation
|
58 |
+
light can be associated with neutron capture by 6Li. Detectors like PROSPECT contain
|
59 |
+
scintillator with this capability of PSD, making them useful for uniquely identifying
|
60 |
+
capture reactions and rejecting fast-neutron background events.
|
61 |
+
For continued development of novel detectors, the phase of the detector
|
62 |
+
material as it relates to the mobility of the detector may be considered. Liquid
|
63 |
+
scintillators are relatively inexpensive, are easy to manufacture, and have good
|
64 |
+
|
65 |
+
performance. However, liquid scintillators may require consideration of potential
|
66 |
+
hazards (e.g., flammability), handling, and storage when used in mobile detectors.
|
67 |
+
Conversely, plastic scintillators are less hazardous than liquid scintillators since they
|
68 |
+
are in the solid state, and plastic scintillators are self-supporting, which is useful for
|
69 |
+
mobility. However, plastic scintillators have not been widely available as materials
|
70 |
+
capable of PSD until recently[13,14]. Additionally, the PSD performance of plastic
|
71 |
+
scintillators worsens as the length of the scintillator increases due to light attenuation;
|
72 |
+
this attenuation is detrimental to the performance of large-volume (ton-scale)
|
73 |
+
detectors.[15] Thus, a mobile detector may require further consideration of these trade-
|
74 |
+
offs and further development of detector materials like plastic scintillators.
|
75 |
+
One development that is important for plastic scintillators is the capability of
|
76 |
+
these materials to discriminate between gamma rays, fast neutrons, and thermal
|
77 |
+
neutrons (Figure 1a). This capability necessitates the inclusion of a neutron capture
|
78 |
+
agent like 155Gd, 157Gd, 10B, or 6Li, and various reports describe attempts to incorporate
|
79 |
+
neutron capture agents into plastic scintillators. In particular, the doping of scintillators
|
80 |
+
with 6Li may be preferable since the 6Li(n,t) capture reaction produces a localized,
|
81 |
+
mono-energetic energy deposition that can be efficiently identified via PSD and energy
|
82 |
+
selections.[16,17]
|
83 |
+
Carboxylate salts of 6Li have been previously used to incorporate 6Li into
|
84 |
+
plastic scintillators while obtaining materials that are transparent. In one example, a 6Li
|
85 |
+
salt of methacrylic acid (MAA) was copolymerized with styrene. The 6Li salt of MAA
|
86 |
+
was not soluble in the plastic scintillator precursors at appreciable amounts; additional
|
87 |
+
MAA was needed to dissolve the 6Li salt of MAA and increase the 6Li content. This
|
88 |
+
necessity of additional MAA highlights how solubility of the polar 6Li compounds in
|
89 |
+
the nonpolar matrix must be considered to produce plastic scintillators. Despite the need
|
90 |
+
for additional MAA, these scintillators were promising for thermal-neutron detection.
|
91 |
+
At a small scale (≈ 1 cm), the plastic scintillator was responsive to an incident beam of
|
92 |
+
thermal neutrons from a research reactor.[18] However, the optical attenuation
|
93 |
+
properties were not assessed for this material but become important for large-volume
|
94 |
+
detectors, where the longest side of a single scintillator may be on the order of 10-100
|
95 |
+
cm.
|
96 |
+
|
97 |
+
Other developments of these scintillators that contain 6Li focused on
|
98 |
+
exploration of additional carboxylates.[19–22] One report described an investigation of
|
99 |
+
16 different 6Li salts. These 6Li salts were dissolved in a comonomer mixture of styrene
|
100 |
+
and methacrylic acid (90:10 styrene:MAA) to determine the maximum solubility of 6Li
|
101 |
+
at 60 oC. Additional 6Li could be dissolved as the MAA content increased, but the
|
102 |
+
scintillation light output and figure of merit (FoM) for PSD decreased as MAA and 6Li
|
103 |
+
content increased.[22] Thus, improvements in scintillation performance should
|
104 |
+
consider the balance between processing and performance. This consideration is
|
105 |
+
especially important in large plastic scintillators where thermal runaway[23] becomes
|
106 |
+
a concern for processing, and attenuation becomes a concern for performance.
|
107 |
+
In this report, we describe the synthesis and processing of lithium-loaded
|
108 |
+
plastic scintillators on the kilogram scale. We considered aspects related to the
|
109 |
+
composition of the plastic scintillator like the primary dye, secondary dye, monomers,
|
110 |
+
and lithium salts (Figure 1b) as well as aspects related to processing and curing like
|
111 |
+
dissolution and temperature of cure (Figure 1c). We first synthesized various 6Li salts
|
112 |
+
and characterized their solubility at different temperatures and with various
|
113 |
+
concentrations of comonomers. Then, we considered trade-offs in processing and
|
114 |
+
performance at the 10 g scale by evaluating the scintillation performance upon addition
|
115 |
+
of comonomer and 6Li salt in plastic scintillators that contained 2,5-diphenyloxazole
|
116 |
+
(PPO) as the primary dye. The light output of scintillation was reduced as the content
|
117 |
+
of the comonomer MAA increased in these scintillators.
|
118 |
+
We then compared the performance of plastic scintillators that contain PPO
|
119 |
+
vs. m-terphenyl (mTP) as the primary dye. The performance of plastic scintillators that
|
120 |
+
contain mTP as the primary dye is less sensitive to the addition of MAA. When scaling
|
121 |
+
our synthesis to 1 kg (Figure 1d), we targeted compositions that were available at scale
|
122 |
+
and allowed for lower temperatures of processing to avoid thermally initiated
|
123 |
+
polymerization and thermal runaway. All of these measures considered the potential for
|
124 |
+
production of large-scale plastic scintillators, which will be useful for applications like
|
125 |
+
mobile antineutrino detectors.
|
126 |
+
|
127 |
+
|
128 |
+
2. Materials and methods
|
129 |
+
Styrene (99%, Sigma), vinyl toluene (99%, Sigma), divinyl benzene (Sigma,
|
130 |
+
technical grade), and methyl methacrylate (99%, VWR) were passed through an
|
131 |
+
alumina column to remove inhibitor. Methacrylic acid (99%, Sigma) was dried over
|
132 |
+
sodium chloride and distilled under vacuum to remove inhibitor. All monomers were
|
133 |
+
sparged with nitrogen for > 30 min before being stored in a nitrogen-filled glovebox.
|
134 |
+
Figure 1. a) Plastic scintillators that are capable of PSD and contain lithium-6 distinguish between gamma rays, fast
|
135 |
+
neutrons, and thermal neutrons, as shown in this PSD plot. The gradient scale bar represents a relative population of data
|
136 |
+
points. b) The synthesis of plastic scintillators requires consideration of many components, as shown in this schematic.
|
137 |
+
The chemical structures, starting from the bottom left and going clockwise, are those of m-terphenyl, 2,5-diphenyloxazole,
|
138 |
+
Exalite 404, styrene, methacrylic acid, divinylbenzene, and three 6Li salts of carboxylic acids. c) The processing of the
|
139 |
+
precursors requires control of dissolution and curing conditions. d) Control of synthesis and processing has enabled the
|
140 |
+
production of large plastic scintillators, scaling to rectangular prisms like the ones in this photograph. The large
|
141 |
+
scintillators are about 0.41 m in length (total mass of about 1.5 kg).
|
142 |
+
|
143 |
+
|
144 |
+
0.8
|
145 |
+
.0
|
146 |
+
0.0
|
147 |
+
0.5
|
148 |
+
0.8
|
149 |
+
Thermal neutrons
|
150 |
+
0.7
|
151 |
+
Fas, neurone
|
152 |
+
0.3
|
153 |
+
0.4
|
154 |
+
Gamma raye
|
155 |
+
0.2
|
156 |
+
0.2
|
157 |
+
0.1
|
158 |
+
100 200
|
159 |
+
300
|
160 |
+
4010
|
161 |
+
Approt, enengy
|
162 |
+
e!All monomers except methacrylic acid were stored in an inert atmosphere at −20 oC.
|
163 |
+
Methacrylic acid was stored at room temperature. m-terphenyl (mTP, Smolecule) was
|
164 |
+
purified by recrystallization from toluene. L-231 (Luperox, 1,1-di(t-butylperoxy)-3,3,5-
|
165 |
+
trimethylcyclohexane) was used as a radical initiator after sparging for > 30 min with
|
166 |
+
dry nitrogen and kept at −20 °C until needed. 2,5-diphenyloxazole (PPO, scintillation
|
167 |
+
grade from Sigma), 1,4-bis(2-methylstyryl)benzene (bisMSB, Luxottica/Exciton), and
|
168 |
+
1,4-bis(9,9-diethyl-7-(tert-pentyl)-9H-fluoren-2-yl)benzene (E404, Luxottica/Exciton)
|
169 |
+
were used as received without further purification.
|
170 |
+
6Li carboxylate salts were synthesized by first suspending 6Li2CO3 (National
|
171 |
+
Isotope Development Center) in a 1:1 mixture of water (deionized) and methanol
|
172 |
+
(99.8%, Sigma). Excess carboxylic acid (1.02 equivalent excess) was mixed into a 1:1
|
173 |
+
mixture of water and methanol. The basic suspension was slowly added to the acid
|
174 |
+
solution, and this mixture was heated to reflux for > 4 hours. The solution was filtered,
|
175 |
+
and the 6Li salt was precipitated by adding excess volume of cold acetone. The 6Li salt
|
176 |
+
was collected by vacuum filtration and washed with acetone, followed by drying under
|
177 |
+
vacuum at 80 oC. This procedure was used for carboxylate salts of pentanoic acid,
|
178 |
+
hexanoic acid, octanoic acid, 2-methylpropanoic acid, 2-methylbutanoic acid, 3-
|
179 |
+
methylbutanoic acid, and 2-ethylhexanoic acid. All acids were purchased from Sigma
|
180 |
+
or VWR and used as received.
|
181 |
+
Plastics were synthesized in a dry nitrogen environment. For initial evaluation,
|
182 |
+
plastics were synthesized using 10 g of precursor materials. For the production of large
|
183 |
+
plastic scintillators, the amount of precursors used was up to 2.7 kg. All materials that
|
184 |
+
were not stored in a dry nitrogen environment were dried under vacuum. 6Li salts were
|
185 |
+
easiest to process when they were first dissolved in a 1:1 mixture by weight of
|
186 |
+
styrene:MAA at elevated temperatures (about 60-80 oC) before adding the remainder
|
187 |
+
of the plastic composition. A typical synthesis would involve dissolving the primary
|
188 |
+
dye (e.g., PPO) and the secondary dye (e.g., bis-MSB or E404) in styrene or vinyl
|
189 |
+
toluene (VT). The monomer VT was used as the polymer matrix for plastics that used
|
190 |
+
mTP as the primary dye. VT was used for these plastics as we observed less consistency
|
191 |
+
in solubility for mTP-based plastics that used styrene. The performance of plastic
|
192 |
+
scintillators that used styrene and VT were compared, and we observed no meaningful
|
193 |
+
|
194 |
+
difference in performance for these plastics. This precursor solution was heated to about
|
195 |
+
60-80 oC and mixed with a solution of the 6Li salt in 1:1 mixture by weight of
|
196 |
+
styrene:MAA. DVB (typically 5 wt. %) and initiator (0.08 wt. % for 10 g plastics; 0.01
|
197 |
+
wt. % for plastics batches greater than 400 g) were added. This mixture that contains
|
198 |
+
the precursor solution mentioned earlier and the solution that contains 6Li was poured
|
199 |
+
into a mould and sealed. The mould was placed in a nitrogen-filled oven and cured at
|
200 |
+
elevated temperatures. In one experiment, the viscosity of the precursor solution was
|
201 |
+
monitored using a rotary viscometer (Brookfield DV2T).
|
202 |
+
A typical curing profile would consist of heating for 7 days at 60 oC, followed
|
203 |
+
by a temperature ramp to 75 oC over one day. The scintillators were cured in convection
|
204 |
+
ovens (Cascade TEK) that were fitted with gas lines. Dry nitrogen flowed into solvent-
|
205 |
+
resistance plastic bags that contained the mould inside the oven. The bags maintained
|
206 |
+
a positive pressure of nitrogen. The plastic would stay at 75 oC for four days and then
|
207 |
+
cool to room temperature over the course of one day. Following curing, the scintillators
|
208 |
+
were removed from the moulds, then machined and polished. All photographs of
|
209 |
+
samples were taken using a Nikon D750 and were globally edited in Adobe Lightroom
|
210 |
+
for colour and exposure corrections.
|
211 |
+
For initial scintillator characterization, samples of mass equal to 10 g were
|
212 |
+
measured. The outer edge and one face of the scintillators were wrapped and covered
|
213 |
+
with Teflon tape. The exposed face was coupled with optical grease to a Hamamatsu
|
214 |
+
R6231-100-SEL photomultiplier tube (PMT). Signals from the PMT were recorded at
|
215 |
+
a sampling rate of 200 MS/s using a 14-bit CompuScope 14200 waveform digitizer. A
|
216 |
+
relative quantification of light output (LO) was measured using ionizing radiation from
|
217 |
+
137Cs incident upon the plastic scintillator. The values of LO that we report in this
|
218 |
+
manuscript are specific to our measurement system and thus should only be used for
|
219 |
+
relative comparison. We normalized the value of LO to measurements of the
|
220 |
+
commercial scintillator EJ-200. The location of 500 keVee was defined by the value of
|
221 |
+
the pulse integral at 50% of the height of the 137Cs Compton edge. For many
|
222 |
+
measurements, duplicate samples were synthesized, and averages are reported. For one
|
223 |
+
condition, 9 samples were replicated in multiple batches and were measured. The
|
224 |
+
standard deviation of these measurements was within 7% of the average value, which
|
225 |
+
|
226 |
+
could be representative of the standard deviation related to contributions from
|
227 |
+
measurement and synthesis. Where standard deviation is not reported, a conservative
|
228 |
+
value of 10% of the value given could be assumed.
|
229 |
+
The measurement of effective attenuation length was performed with a longer
|
230 |
+
scintillator bar (1″ x 1″ x 16″). This measurement employed a setup that was identical
|
231 |
+
to the setup used to characterize scintillator bars in an antineutrino detector called
|
232 |
+
SANDD (Segmented AntiNeutrino Directional Detector).[24] This bar was wrapped
|
233 |
+
with polytetrafluoroethylene tape (POLY-TEMP PN-16050), and a pair of 1"
|
234 |
+
Hamamatsu R1924A-100 PMTs were mounted at either end of the scintillator bar using
|
235 |
+
EJ-550 silicone optical grease. The PMT operating voltage was set at -1100 V, and
|
236 |
+
signals were digitized using a Struck SIS3316 digitizer module (250 MS/s, 14 bit, 5 V
|
237 |
+
dynamic range). The energy threshold was set at approximately 0.1 MeVee, and 1600
|
238 |
+
ns-long waveforms were sent to disk and stored in ROOT data format. The charge
|
239 |
+
response difference between the two PMTs due to gain and optical coupling variation
|
240 |
+
was corrected using a collimated 137Cs gamma-ray source directed at the center of the
|
241 |
+
plastic bar. Here, lead bricks were used for shaping the gamma-ray source into a fan
|
242 |
+
beam of about 0.5 cm width.
|
243 |
+
To obtain the effective attenuation length of the scintillator bar, we performed
|
244 |
+
a series of collimated 22Na measurements at regular intervals along the length of the
|
245 |
+
bar. In each measurement, we identified the location of the Compton continuum
|
246 |
+
maximum of the 1.275 MeV gamma-ray by fitting the energy response with a Gaussian
|
247 |
+
profile while varying the range of the fit to find the minimum χ2 (best fit). The Compton
|
248 |
+
continuum maximum position was identified as the mean of the Gaussian profile that
|
249 |
+
yielded the minimum χ2. The associated uncertainty was estimated by varying the range
|
250 |
+
of the fit until the χ2 value exceeded the 68% confidence level (CL) of the minimum χ2;
|
251 |
+
the uncertainty was the corresponding range of the mean of the Gaussian profile.
|
252 |
+
To measure PSD in smaller plastics, plastic scintillators were exposed to a
|
253 |
+
252Cf source. The source was shielded behind 5.1 cm of lead to reduce the gamma-ray
|
254 |
+
flux. To obtain a flux of thermal neutrons, high density polyethylene was also used as
|
255 |
+
a moderator for 252Cf. The measurements of scintillation from plastic scintillators
|
256 |
+
|
257 |
+
exposed to 252Cf were integrated over time to determine the total charge (Qtotal). The
|
258 |
+
charge of the delayed component of the signal (Qtail) was determined from a delayed
|
259 |
+
fraction of the scintillation pulse. Scintillation pulses due to interactions of the
|
260 |
+
scintillator with neutrons have a larger fraction of Qtail relative to Qtotal; therefore, a
|
261 |
+
comparison of Qtail relative to Qtotal can be used to distinguish between scintillation due
|
262 |
+
to neutrons vs. gamma rays. The PSD was quantified using a figure of merit (FoM) that
|
263 |
+
is determined from histograms of the ratio of the charge of the delayed component
|
264 |
+
relative to the total charge, as described in previous reports[15,25]. Briefly, the FoM is:
|
265 |
+
𝐹𝑜𝑀 =
|
266 |
+
〈𝑛,𝑡〉−〈𝛾〉
|
267 |
+
𝐹𝑊𝐻𝑀𝑛,𝑡+𝐹𝑊𝐻𝑀𝛾
|
268 |
+
|
269 |
+
|
270 |
+
(2)
|
271 |
+
In this equation, 〈n,t〉-〈γ〉 represents the difference between the average value of the
|
272 |
+
neutron and gamma-ray signals, and FWHMn,t +FWHMγ represents the sum of the full-
|
273 |
+
width at half of the maximum value of the distributions of the thermal-neutron and
|
274 |
+
gamma-ray signals at the electron-equivalent energy of the thermal-neutron spot. For
|
275 |
+
plastics that don’t contain 6Li, the same equation was used for FoM, but the position
|
276 |
+
and FWHM of the neutron peak is used at an electron-equivalent energy near the 137Cs
|
277 |
+
Compton edge.
|
278 |
+
For PSD of the larger scintillator bar (1″ × 1″ × 16″), an identical setup as the
|
279 |
+
measurement of effective attenuation length was used. The bar was irradiated with an
|
280 |
+
uncollimated 252Cf source, and lead bricks with a total thickness of 6″ were placed
|
281 |
+
between the detector and the 252Cf source to reduce the gamma-ray flux. The charge
|
282 |
+
integration limits were optimized, and the best parameters were found to be [tL-20 ns ≤
|
283 |
+
Qtotal ≤ tL+1300 ns] and [tL+24 ns ≤ Qtail ≤ tL+1300 ns], where tL is the leading edge of
|
284 |
+
the waveform. Assuming light transport behaves exponentially along the length of the
|
285 |
+
scintillator bar, we can eliminate the dependence of energy on event position by
|
286 |
+
reconstructing the energy as 𝐸 = √𝐸𝐴𝐸𝐵 , where EA and EB are the charges collected
|
287 |
+
by the two PMTs.
|
288 |
+
|
289 |
+
3. Results and discussion
|
290 |
+
3a. Selection of lithium-6 salt based on solubility at moderate
|
291 |
+
temperatures
|
292 |
+
|
293 |
+
To make large-scale production of plastic scintillators easier, our selection of
|
294 |
+
materials focused on those materials that had simple processing requirements (e.g.,
|
295 |
+
temperatures below 80 oC). This requirement is necessary since high processing
|
296 |
+
temperatures for large plastic scintillators could thermally initiate the polymerization.
|
297 |
+
After dissolution of all dopants, we monitored the viscosity over time of liquid
|
298 |
+
precursors with and without the crosslinker divinylbenzene (DVB) at a temperature of
|
299 |
+
50 oC (Figure 2). The liquid precursors did not contain a radical initiator that initiates
|
300 |
+
polymerization; thus, any increase in viscosity is due to thermally initiated
|
301 |
+
polymerization. For precursor liquids that contained DVB, the viscosity began to
|
302 |
+
increase to measurable values above 0.1 Pa s after about 15600 s (4.3 hours) at 50 oC.
|
303 |
+
The viscosity further increased, reaching values greater than 40 Pa s after about 37400
|
304 |
+
s (10.4 hours) at 50 oC. While these timescales may be appropriate to process plastic
|
305 |
+
Figure 2. The viscosity of liquid precursors containing 30 wt. % PPO and 0.2 wt. %
|
306 |
+
bis-MSB can increase over time as polymerization occurs, and this increase in viscosity
|
307 |
+
prevents processing of the liquid into a mould. In this case, precursors with 8 wt. %
|
308 |
+
DVB and without DVB are compared while held at a temperature of 50 oC.
|
309 |
+
|
310 |
+
scintillators with industrial equipment, we observed that complete dissolution of all
|
311 |
+
components often required > 12 hours of stirring at elevated temperatures.
|
312 |
+
The premature onset of polymerization caused this increase in viscosity, which
|
313 |
+
could prevent trapped air bubbles from escaping or even prohibit transfer of the liquid
|
314 |
+
precursor to a mould. For precursor liquids that did not contain DVB, the viscosity
|
315 |
+
began to increase to measurable values above 0.1 Pa s after about 175000 s (48.6 hours)
|
316 |
+
at 50 oC. As before, the viscosity further increased and reached values greater than 40
|
317 |
+
Pa s after 275000 s (76.4 hours) 50 oC. Without DVB, the working time of the liquid
|
318 |
+
precursors can be increased. Still, the limited working time of these materials highlights
|
319 |
+
the need for simple processing requirements like low temperatures.
|
320 |
+
Table 1. Summary of solubility tests. Note that some salts that formed a gel phase
|
321 |
+
were initially soluble. For solubility tests at 23 oC, the solubility was observed after 20
|
322 |
+
hours of mixing. For solubility tests at 65 oC, the solubility was observed after 30
|
323 |
+
minutes at 65 oC following 2 hours at 50 oC.
|
324 |
+
Acid used for 6Li salt
|
325 |
+
Solubility, 23 oC, 85:15 styrene:MAA
|
326 |
+
Solubility, 65 oC, 85:15 styrene:MAA
|
327 |
+
Pentanoic acid
|
328 |
+
Insoluble
|
329 |
+
Soluble
|
330 |
+
Hexanoic acid
|
331 |
+
Insoluble
|
332 |
+
Soluble
|
333 |
+
Octanoic acid
|
334 |
+
Insoluble
|
335 |
+
Soluble
|
336 |
+
2-methylpropanoic acid
|
337 |
+
Formed gel
|
338 |
+
Soluble
|
339 |
+
2-methylbutanoic acid
|
340 |
+
Formed gel
|
341 |
+
Soluble
|
342 |
+
3-methylbutanoic acid
|
343 |
+
Soluble
|
344 |
+
Soluble
|
345 |
+
2-ethylhexanoic acid
|
346 |
+
Formed gel
|
347 |
+
Soluble
|
348 |
+
|
349 |
+
Another requirement for simple processing relates to the relative solubility of
|
350 |
+
the 6Li salts. Thus, we evaluated the solubility of various carboxylate salts of 6Li while
|
351 |
+
|
352 |
+
considering the need for simple processing requirements. We synthesized 6Li salts of
|
353 |
+
pentanoic acid, hexanoic acid, octanoic acid, 2-methylpropanoic acid, 2-
|
354 |
+
methylbutanoic acid, 3-methylbutanoic acid, and 2-ethylhexanoic acid (Figure 3a).
|
355 |
+
The synthesis and solubility of these salts have been described previously[22], but our
|
356 |
+
focus is on solubility for synthesis of large plastics, which requires further
|
357 |
+
considerations related to processing that have not been reported. We added the 6Li salts
|
358 |
+
to liquid precursors that contained all monomers and dopants. The composition of the
|
359 |
+
liquid precursor was as follows: 30 wt. % 2,5-diphenyloxazole (PPO); 0.2 wt. % 1,4-
|
360 |
+
bis(2-methylstyryl)benzene (bisMSB); 5 wt. % DVB; an equivalent amount of 6Li salt
|
361 |
+
to obtain 0.1 wt. % 6Li; and the remainder was a mixture of 85 wt. % styrene and 15
|
362 |
+
wt. % methacrylic acid (MAA). The MAA is necessary to dissolve the 6Li salt; other
|
363 |
+
monomers like methyl methacrylate and methyl acrylate do not dissolve the 6Li salt.
|
364 |
+
All precursors were mixed into a single vial and allowed to equilibrate for 20
|
365 |
+
hours at room temperature (23 oC). Lithium-6 2-methylbutanoate was readily soluble
|
366 |
+
in the mixture initially. However, an opaque gel formed within 2 hours and persisted
|
367 |
+
after 20 hours (Figure 3b). Lithium-6 2-ethylhexanoate also formed a gel after initial
|
368 |
+
dissolution. For lithium-6 2-methylpropanoate, an opaque gel was observed after 20
|
369 |
+
hours, but this mixture never fully dissolved, suggesting low solubility of this 6Li salt.
|
370 |
+
Similarly, 6Li salts of the linear alkyl carboxylic acids (pentanoic acid, hexanoic acid,
|
371 |
+
and octanoic acid) never fully dissolved at 23 oC. For lithium-6 3-methylbutanoate, the
|
372 |
+
liquid precursor remained clear after 20 hours at 23 oC.
|
373 |
+
The opaque gels that we observed could be destabilized after heating to
|
374 |
+
elevated temperatures. All vials were heated to 50 oC for 2 hours, which improved
|
375 |
+
dissolution of all components that were insoluble at room temperature. For example,
|
376 |
+
the liquids that contained 6Li salts of 2-methylbutanoic acid and 2-ethylhexanoic acid
|
377 |
+
became transparent. Further heating to 65 oC for 30 minutes improved dissolution; all
|
378 |
+
|
379 |
+
liquid precursors with different 6Li salts were transparent after this heating step except
|
380 |
+
for the precursor that contained lithium-6 2-methylpropanoate (Figure 3c).
|
381 |
+
Based on this analysis, we selected the 6Li salt of 3-methylbutanoic acid for
|
382 |
+
the synthesis of large plastics; however, other 6Li salts like lithium-6 pentanoate and
|
383 |
+
lithium-6 2-methylbutanoate may also be suitable given that they form transparent
|
384 |
+
precursors after dissolution at 65 oC. Furthermore, we sometimes observed the
|
385 |
+
formation of a gel phase for precursors that contained lithium-6 3-methylbutanoate
|
386 |
+
when using less MAA, which highlights how plastic scintillators that contain this 6Li
|
387 |
+
salt are not immune to this processing challenge.
|
388 |
+
To avoid the formation of this gel phase, the 6Li salt could be dissolved
|
389 |
+
separately from the rest of the dopants. A 1:1 mixture of styrene and MAA was
|
390 |
+
sufficient to avoid thermally initiated homopolymerization of MAA during dissolution;
|
391 |
+
homopolymerization of MAA results in an opaque material. The remainder of the
|
392 |
+
styrene needed to form the final plastic was used to dissolve the primary and secondary
|
393 |
+
Figure 3. a) Chemical structures of 6Li salts that were studied; from left to right the structures correspond to
|
394 |
+
6Li salts of pentanoic acid, hexanoic acid, octanoic acid, 2-methylpropanoic acid, 2-methylbutanoic acid, 3-
|
395 |
+
methylbutanoic acid, and 2-ethylhexanoic acid. b) Photographs of liquid precursors in vials following
|
396 |
+
equilibration for 20 hours at 23 oC. c) Photographs of liquid precursors in vials following equilibration at an
|
397 |
+
additional 2 hours at 50 oC plus 30 minutes at 65 oC. All liquid precursors contain all components of a plastic
|
398 |
+
scintillator except the radical initiator. The precursors differ in the 6Li salt that was added; from left to right, the
|
399 |
+
vials contain 6Li salts of pentanoic acid, hexanoic acid, octanoic acid, 2-methylpropanoic acid, 3-methylbutanoic
|
400 |
+
acid, 2-methylbutanoic acid, and 2-ethylhexanoic acid. The vials are 28 mm in diameter.
|
401 |
+
|
402 |
+
b)23 °C; 85:15 styrene:MAA
|
403 |
+
c)65C:85:15styrene:MAAdye in a separate container. Then, the two separate mixtures could be heated to 60-80
|
404 |
+
oC and mixed at elevated temperatures before adding DVB and the radical initiator and
|
405 |
+
casting in a mould.
|
406 |
+
3b. Effect of comonomer on scintillation performance
|
407 |
+
Importantly, the effect of the comonomer that solubilizes the 6Li salts on
|
408 |
+
scintillation performance should be evaluated. The addition of non-aromatic
|
409 |
+
comonomers like methyl methacrylate (MMA) or methacrylic acid (MAA) can reduce
|
410 |
+
scintillation performance.[22,26] When 26 wt. % of MMA was used in a plastic
|
411 |
+
scintillator, the light yield reduced by 5% when compared to a plastic scintillator that
|
412 |
+
contained only polystyrene as the matrix. When 58 wt. % of MMA was used in a plastic
|
413 |
+
scintillator, the light yield reduced by 18%.[26] The total amount of the comonomer
|
414 |
+
Figure 4. a) A detrimental effect of MAA and 6Li salts reduce light output (LO) of scintillators that contain PPO
|
415 |
+
as a primary dye. 6Li salt may also influence light output. b) The LO decreases as the content of MAA increases,
|
416 |
+
which can be observed in the histograms that show the 137Cs Compton edge. c) The photograph of these vials highlights
|
417 |
+
the solubility threshold of lithium-6 3-methylbutanoate at 65 oC. The vials are 28 mm in diameter. d) Less substantial
|
418 |
+
effect on LO by MAA and 6Li salt for scintillators that contain mTP instead of PPO. The 6Li salt used for all samples
|
419 |
+
referenced in this figure was lithium-6 3-methylbutanoate. For a) and b), the average (dashed line) and standard
|
420 |
+
deviation (grey shaded region) of scintillators that do not contain any comonomer are shown for reference.
|
421 |
+
|
422 |
+
65°C:6LitO
|
423 |
+
MAA weight content:
|
424 |
+
6.3%
|
425 |
+
6.9%
|
426 |
+
7.6%
|
427 |
+
8.2%
|
428 |
+
9.5%
|
429 |
+
Precipitate still
|
430 |
+
presentMAA added for dissolution of 6Li salts is typically less than 20 wt. % of the total
|
431 |
+
material, so we instead focused on comonomer addition at these lower concentrations.
|
432 |
+
Table 2. Summary of effect of composition on light output.
|
433 |
+
Primary dye
|
434 |
+
Co-monomer
|
435 |
+
Co-monomer content
|
436 |
+
Lithium salt content
|
437 |
+
Light output
|
438 |
+
PPO
|
439 |
+
N/A
|
440 |
+
0
|
441 |
+
0
|
442 |
+
1.05
|
443 |
+
mTP
|
444 |
+
N/A
|
445 |
+
0
|
446 |
+
0
|
447 |
+
1.12
|
448 |
+
|
449 |
+
|
450 |
+
|
451 |
+
|
452 |
+
|
453 |
+
PPO
|
454 |
+
MMA
|
455 |
+
0.6
|
456 |
+
0
|
457 |
+
1.03
|
458 |
+
PPO
|
459 |
+
MMA
|
460 |
+
3
|
461 |
+
0
|
462 |
+
1.07
|
463 |
+
PPO
|
464 |
+
MMA
|
465 |
+
6
|
466 |
+
0
|
467 |
+
1.05
|
468 |
+
PPO
|
469 |
+
MMA
|
470 |
+
13
|
471 |
+
0
|
472 |
+
1.09
|
473 |
+
|
474 |
+
|
475 |
+
|
476 |
+
|
477 |
+
|
478 |
+
PPO
|
479 |
+
MAA
|
480 |
+
0.6
|
481 |
+
0
|
482 |
+
0.96
|
483 |
+
PPO
|
484 |
+
MAA
|
485 |
+
2
|
486 |
+
0
|
487 |
+
0.81
|
488 |
+
PPO
|
489 |
+
MAA
|
490 |
+
3
|
491 |
+
0
|
492 |
+
0.78
|
493 |
+
PPO
|
494 |
+
MAA
|
495 |
+
5
|
496 |
+
0
|
497 |
+
0.77
|
498 |
+
PPO
|
499 |
+
MAA
|
500 |
+
6
|
501 |
+
0
|
502 |
+
0.73
|
503 |
+
PPO
|
504 |
+
MAA
|
505 |
+
13
|
506 |
+
0
|
507 |
+
0.64
|
508 |
+
|
509 |
+
|
510 |
+
|
511 |
+
|
512 |
+
|
513 |
+
PPO
|
514 |
+
MAA
|
515 |
+
3
|
516 |
+
1.7
|
517 |
+
0.61
|
518 |
+
PPO
|
519 |
+
MAA
|
520 |
+
5
|
521 |
+
1.7
|
522 |
+
0.57
|
523 |
+
PPO
|
524 |
+
MAA
|
525 |
+
6
|
526 |
+
1.7
|
527 |
+
0.56
|
528 |
+
PPO
|
529 |
+
MAA
|
530 |
+
13
|
531 |
+
1.7
|
532 |
+
0.51
|
533 |
+
|
534 |
+
|
535 |
+
|
536 |
+
|
537 |
+
|
538 |
+
mTP
|
539 |
+
MAA
|
540 |
+
3
|
541 |
+
1.7
|
542 |
+
0.93
|
543 |
+
mTP
|
544 |
+
MAA
|
545 |
+
5
|
546 |
+
1.7
|
547 |
+
0.95
|
548 |
+
mTP
|
549 |
+
MAA
|
550 |
+
6
|
551 |
+
1.7
|
552 |
+
0.93
|
553 |
+
mTP
|
554 |
+
MAA
|
555 |
+
13
|
556 |
+
1.7
|
557 |
+
0.92
|
558 |
+
|
559 |
+
Even though MMA does not solubilize 6Li salts that we studied, we used this
|
560 |
+
comonomer as a non-aromatic additive to compare its effect on performance to
|
561 |
+
scintillators that contain the solubilizing comonomer, MAA. We also compared the
|
562 |
+
performance of plastic scintillators that did not contain any comonomer. The average
|
563 |
+
light output (LO) of three separate samples that did not contain any comonomer was
|
564 |
+
1.05 with a standard deviation of 0.07 (Figure 4a, Table 2). With 0.6 wt. % MMA
|
565 |
+
added, the LO was 1.03. As the amount of MMA increased, there was no clear trend in
|
566 |
+
|
567 |
+
the LO. At 13 wt. % MMA, the LO was 1.09, and all measured values of LO were
|
568 |
+
within a standard deviation of the average value of plastic scintillators that did not
|
569 |
+
contain a comonomer. Thus, at these concentrations of MMA comonomer, the energy
|
570 |
+
transfer and light emission do not appear to be affected.
|
571 |
+
The same trend did not persist when using MAA. At 0.6 wt. % MAA, the LO
|
572 |
+
was 0.96, which corresponds to a 9% reduction in LO when compared to plastic
|
573 |
+
scintillators without this comonomer. At 1.6% MAA, the LO was further reduced to
|
574 |
+
0.81, which is a 23% reduction. The LO continues to decrease as MAA content
|
575 |
+
increases (Figure 4b, Table 2), but the magnitude of reduction appears to taper as the
|
576 |
+
MAA content exceeds 3 wt. %. At 13 wt. % MAA, the LO was reduced to 0.64, which
|
577 |
+
corresponds to a 40% reduction. The discrepancy between the effects of MMA and
|
578 |
+
MAA on LO indicates that the decrease in LO upon addition of MAA does not result
|
579 |
+
from simple dilution by a non-aromatic material. Rather, this decrease in LO suggests
|
580 |
+
that MAA may be detrimental to processes that affect scintillation like energy transfer
|
581 |
+
or emission. Although the exact mechanism is not fully elucidated, it is possible that
|
582 |
+
the heteroatoms on PPO (N, O) may interact with the polar acid functional group on
|
583 |
+
MAA.
|
584 |
+
Notably, the LO further decreases upon addition of 6Li salts to plastics that
|
585 |
+
contain PPO as the primary dye along with MAA as a comonomer when compared to
|
586 |
+
Figure 5. PSD distributions used to calculate FoM for comparison of plastics that contain PPO (a) and mTP (b).
|
587 |
+
Note that the FoMs for 6Li-plastics are given for discrimination between thermal neutrons and gamma rays whereas
|
588 |
+
FoMs for plastics without 6Li correspond to discrimination between fast neutrons and gamma rays.
|
589 |
+
|
590 |
+
the addition of MAA alone. At 13 wt. % MAA, the LO decreased from 0.64 to 0.52
|
591 |
+
when adding the 6Li salt. The reduction in LO with increasing MAA content and
|
592 |
+
addition of 6Li salt poses a challenge related to processing: higher content of MAA
|
593 |
+
allows for processing of the plastic scintillator at lower temperatures but reduces LO.
|
594 |
+
Plastic scintillators with lower content of MAA are more difficult to process due to poor
|
595 |
+
solubility of the 6Li salt. For example, lithium-6 3-methylbutanoate is not fully soluble
|
596 |
+
at 65 oC when the MAA content is equal to or less than 8 wt. % (Figure 4c). The cause
|
597 |
+
of the reduction in performance upon addition of 6Li salt may be similar to the reduction
|
598 |
+
in performance upon addition of MAA; PPO may have unfavourable interactions and/or
|
599 |
+
reactivity with these polar molecules.
|
600 |
+
To test this idea, we compared the scintillation performance when using 30 wt.
|
601 |
+
% m-terphenyl (mTP) as a primary dye instead of PPO. The chemical structure of mTP
|
602 |
+
(Figure 1b) does not contain any heteroatoms (i.e., only contains C, H). Plastics that
|
603 |
+
used mTP as the primary dye but did not contain MAA or a 6Li salt had an average LO
|
604 |
+
of 1.12 (Figure 4d, Table 2). Plastics that contained MAA and 6Li had a slight
|
605 |
+
reduction in LO with values of 0.93, 0.95, 0.93, and 0.92 at 3 wt. %, 5 wt. %, 6 wt. %,
|
606 |
+
and 13 wt. % MAA. At 13 wt. % MAA, the LO of a plastic that contains 6Li was reduced
|
607 |
+
by 18% when compared to a plastic that contained no MAA or 6Li. This value of LO is
|
608 |
+
nearly double the LO of an equivalent plastic that contained PPO instead of mTP as the
|
609 |
+
primary dye.
|
610 |
+
We also compared the FoM for PSD. For plastics that contain PPO but no 6Li,
|
611 |
+
the FoM is 3.05, which provides a baseline for comparison after addition of MAA and
|
612 |
+
6Li. Note that this FoM compares discrimination between gamma rays and fast neutrons
|
613 |
+
whereas the FoM for plastics that contain 6Li compares discrimination between gamma
|
614 |
+
rays and thermal neutrons. The energy range used to determine FoM was 450-550
|
615 |
+
keVee, but that range was adjusted to capture the thermal neutron peak. Upon addition
|
616 |
+
of 13 wt. % MAA and 6Li, the FoM decreases to 2.24 and decreases for all plastics that
|
617 |
+
were measured that contained MAA (Figure 5a).
|
618 |
+
These PSD results can also be compared to plastics that contain mTP instead
|
619 |
+
of PPO (Figure 5b). For plastics that contain mTP but no 6Li, the FoM is 2.73. Upon
|
620 |
+
|
621 |
+
addition of MAA and 6Li, the FoM is between 2.95 and 3.24. This increase is mostly
|
622 |
+
attributed to the high value of Qtail/Qtotal for the thermal-neutron capture spot along with
|
623 |
+
the observation that plastics that contain mTP are less sensitive to the addition of the
|
624 |
+
polar compounds that enable thermal-neutron capture. The FoM for plastics that
|
625 |
+
contained PPO decreased when MAA and 6Li were added whereas the FoM for plastics
|
626 |
+
that contained mTP increased when MAA and 6Li were added.
|
627 |
+
3c. Production of large plastic scintillators
|
628 |
+
As shown above, mTP may be promising for high performance scintillators
|
629 |
+
that contain 6Li; however, the inconsistencies with solubility and the current availability
|
630 |
+
at large scales in sufficient purity from commercial suppliers make mTP less suitable
|
631 |
+
Figure 6. a,b) Conditions that are not optimized for the production of large plastics produce defects like cracks and
|
632 |
+
bubbles (a) and discoloration (b). The left-most scintillator in (a) does not contain defects and serves as a reference.
|
633 |
+
These scintillators in (a) have a diameter of about 5.5 cm. The plastic scintillator in (b) is 40 cm in length. c) When the
|
634 |
+
curing conditions and environment are controlled, plastics scintillators can be produced in large scale, as shown in this
|
635 |
+
photograph of a scintillator that is 5 cm in width atop a sheet of paper. d) The effective attenuation length was measured
|
636 |
+
by placing a collimated gamma-ray source at set distances away from two PMTs and measuring the PMT response
|
637 |
+
(black). The data were fitted with an exponential profile to estimate the effective attenuation length (19-21cm). e) Large
|
638 |
+
plastic scintillators are capable of PSD, as shown in this distribution that demonstrates an ability to separate signals from
|
639 |
+
thermal neutrons and gamma rays.
|
640 |
+
|
641 |
+
b)for the production of large plastic scintillators. For these large plastic scintillators, we
|
642 |
+
selected PPO despite its lower LO and lower FoM at smaller scales.
|
643 |
+
Similarly, other secondary dyes like Exalite 404 (E404) may have the best
|
644 |
+
performance in the plastic scintillators that we evaluated[27], but the cost of E404 might
|
645 |
+
be prohibitive when compared to a secondary dye like 1,4-bis(2-methylstyryl)benzene
|
646 |
+
(bisMSB).
|
647 |
+
When processing the plastics, all precursors except DVB and the radical
|
648 |
+
initiator are slowly heated to temperatures between 60 and 80 oC until full dissolution.
|
649 |
+
The plastics are cured in glass or aluminium moulds. To control the rate of
|
650 |
+
polymerization, the radical initiator is added at concentrations of 0.01 wt. %, and
|
651 |
+
plastics are cured at an initial temperature of 60 oC. Various times of curing were used,
|
652 |
+
and a typical recipe would involve curing for 7 days at 60 oC followed by an additional
|
653 |
+
4 days of curing at 75 oC. Excessive radical concentration and/or heating during
|
654 |
+
processing and curing could lead to defects like cracks and bubbles (Figure 6a).
|
655 |
+
Precipitation of precursors that have lower solubility may occur if temperatures are too
|
656 |
+
low. When curing the plastics, oxygen is displaced by a steady flow of nitrogen; without
|
657 |
+
nitrogen flow, discoloration can occur (Figure 6b). These precautionary measures
|
658 |
+
allow us to produce plastic scintillators without defects and with minimal
|
659 |
+
discoloration (Figure 6c). The effective attenuation of a plastic scintillator that was 16”
|
660 |
+
long was measured by placing a collimated gamma-ray source near the scintillator and
|
661 |
+
measuring the total light detected by PMTs that are mounted on each end of the plastic
|
662 |
+
scintillator (Figure 6d). The effective attenuation was determined to be about 19-21
|
663 |
+
cm, which is comparable to the value obtained in previous experiments.[24] This plastic
|
664 |
+
also had PSD capability; a thermal-neutron spot is clearly separated from the gamma
|
665 |
+
signal (Figure 6e). After we optimized our process for synthesis of these large plastics,
|
666 |
+
we outsourced production to Eljen Technologies who is currently producing 6Li-loaded
|
667 |
+
prototypes with dimensions exceeding 0.5 m; full characterization of scintillator
|
668 |
+
performance at these large scales will be the subject of a future publication.
|
669 |
+
|
670 |
+
4. Conclusion
|
671 |
+
By careful control of composition and processing, plastic scintillators that can
|
672 |
+
discriminate between gamma rays, fast neutrons, and thermal neutrons can be produced
|
673 |
+
at a scale of 1 kg or greater. The solubility of dopants that enable scintillation
|
674 |
+
functionality and solubilizing additives like methacrylic acid (MAA) that may
|
675 |
+
negatively affect performance were considered. Synthesis and processing procedures
|
676 |
+
were developed for large plastic scintillators containing 0.1 wt. % 6Li and high
|
677 |
+
concentration (30 wt. %) of PPO used as a primary dye. These scintillators were capable
|
678 |
+
of PSD. In these studies, various 6Li salts of aliphatic carboxylic acids were evaluated,
|
679 |
+
and many were found to be suitable for the production of large plastic scintillators with
|
680 |
+
the addition of MAA. The amount of MAA that was added to solubilize 6Li salts
|
681 |
+
affected the scintillation performance but also determined the temperature that plastic
|
682 |
+
scintillators could be produced at. An alternative way to avoid the deleterious effects of
|
683 |
+
MAA was discovered; use of m-terphenyl instead of PPO improved plastic scintillators.
|
684 |
+
However, m-terphenyl may have limitations like availability at large volumes.
|
685 |
+
With these considerations in mind, methods for the preparation of plastic
|
686 |
+
scintillators loaded with 6Li were established and demonstrated. Large-volume pieces
|
687 |
+
that could be used for large detectors were produced.[24,28] Such detectors will be
|
688 |
+
important for future safeguards related to nuclear power production and for unravelling
|
689 |
+
unknown aspects of particle physics.
|
690 |
+
Acknowledgements
|
691 |
+
This work was performed under the auspices of the U.S. Department of Energy by
|
692 |
+
Lawrence Livermore National Laboratory under Contract DE-AC52-07NA27344 and
|
693 |
+
was supported by the LLNL-LDRD Program under Project No. 20-SI-003, release
|
694 |
+
number LLNL-JRNL-839909. We would like to thank Jacob Kim for careful reading
|
695 |
+
and discussion of this manuscript.
|
696 |
+
|
697 |
+
The authors declare no competing interests.
|
698 |
+
|
699 |
+
References
|
700 |
+
[1]
|
701 |
+
W.J. Nuttall, Nuclear Renaissance: Technologies and Policies for the Future of
|
702 |
+
Nuclear Power, CRC Press, 2022.
|
703 |
+
[2]
|
704 |
+
J.F. Cavaignac, A. Hoummada, D.H. Koang, B. Vignon, Y. Declais, H. de Kerret,
|
705 |
+
H. Pessard, J.M. Thenard, Indication for neutrino oscillation from a high statistics
|
706 |
+
experiment at the bugey reactor, Phys. Lett. B. 148 (1984) 387–394.
|
707 |
+
https://doi.org/10.1016/0370-2693(84)90109-6.
|
708 |
+
[3]
|
709 |
+
B. Achkar, R. Aleksan, M. Avenier, G. Bagieu, J. Bouchez, R. Brissot, J.-F.
|
710 |
+
Cavaignac, J. Collot, M.-C. Cousinou, J.P. Cussonneau, Y. Declais, Y. Dufour,
|
711 |
+
J. Favier, F. Garciaz, E. Kajfasz, H. de Kerret, D.H. Koang, B. Lefièvre, E.
|
712 |
+
Lesquoy, J. Mallet, A. Metref, E. Nagy, H. Pessard, F. Pierre, M. Obolensky, A.
|
713 |
+
Stutz, J.P. Wuthrick, Search for neutrino oscillations at 15, 40 and 95 meters from
|
714 |
+
a nuclear power reactor at Bugey, Nucl. Phys. B. 434 (1995) 503–532.
|
715 |
+
https://doi.org/10.1016/0550-3213(94)00513-E.
|
716 |
+
[4]
|
717 |
+
M. Abbes, B. Achkar, S. Ait-Boubker, R. Aleksan, M. Avenier, G. Bagieu, J.
|
718 |
+
Ballansat, C. Barnoux, R. Bazzoli, J. Berger, M. Bermond, P. Besson, M.
|
719 |
+
Billault, J. Boucher, J. Bouchez, M. Bouriant, R. Brissot, B. Camberlin, J.F.
|
720 |
+
Cavaignac, P. Charvin, J. Collot, A. Commerçon, M.-C. Cousinou, J.P.
|
721 |
+
Cussonneau, G. Daguin-Moynot, Y. Declais, T. Desanlis, J.-M. Dubois, Y.
|
722 |
+
Dufour, G. Farrache, J. Favier, Y. Gally, F. Garciaz, L. Giacobone, B. Guerre-
|
723 |
+
Chaley, J.-P. Jobez, D. Jourde, E. Kajfasz, H. de Kerret, D.H. Koang, B. Lefièvre,
|
724 |
+
F. Léon, E. Lesquoy, J. Mallet, A. Menthe, A. Metref, J. Mullié, E. Nagy, M.
|
725 |
+
Obolensky, P. Ollive, A. Oriboni, H. Pessard, F. Pierre, J. Poinsignon, R.
|
726 |
+
Potheau, R. Provasi, A. Stutz, J. Thion, J.-F. Thomas, J.P. Wuthrick, The Bugey
|
727 |
+
3 neutrino detector, Nucl. Instrum. Methods Phys. Res. Sect. Accel.
|
728 |
+
Spectrometers
|
729 |
+
Detect.
|
730 |
+
Assoc.
|
731 |
+
Equip.
|
732 |
+
374
|
733 |
+
(1996)
|
734 |
+
164–187.
|
735 |
+
https://doi.org/10.1016/0168-9002(96)00220-3.
|
736 |
+
[5]
|
737 |
+
Daya Bay Collaboration, A Precision Measurement of the Neutrino Mixing
|
738 |
+
Angle theta_13 using Reactor Antineutrinos at Daya Bay, arXiv, 2007.
|
739 |
+
https://doi.org/10.48550/arXiv.hep-ex/0701029.
|
740 |
+
[6]
|
741 |
+
A. Bernstein, N. Bowden, B.L. Goldblum, P. Huber, I. Jovanovic, J. Mattingly,
|
742 |
+
Colloquium: Neutrino detectors as tools for nuclear security, Rev. Mod. Phys. 92
|
743 |
+
(2020) 011003. https://doi.org/10.1103/RevModPhys.92.011003.
|
744 |
+
[7]
|
745 |
+
N.S. Bowden, A. Bernstein, M. Allen, J.S. Brennan, M. Cunningham, J.K.
|
746 |
+
Estrada, C.M.R. Greaves, C. Hagmann, J. Lund, W. Mengesha, T.D. Weinbeck,
|
747 |
+
C.D. Winant, Experimental results from an antineutrino detector for cooperative
|
748 |
+
monitoring of nuclear reactors, Nucl. Instrum. Methods Phys. Res. Sect. Accel.
|
749 |
+
Spectrometers
|
750 |
+
Detect.
|
751 |
+
Assoc.
|
752 |
+
Equip.
|
753 |
+
572
|
754 |
+
(2007)
|
755 |
+
985–998.
|
756 |
+
https://doi.org/10.1016/j.nima.2006.12.015.
|
757 |
+
[8]
|
758 |
+
Y. Kuroda, S. Oguri, Y. Kato, R. Nakata, Y. Inoue, C. Ito, M. Minowa, A mobile
|
759 |
+
antineutrino detector with plastic scintillators, Nucl. Instrum. Methods Phys. Res.
|
760 |
+
Sect. Accel. Spectrometers Detect. Assoc. Equip. 690 (2012) 41–47.
|
761 |
+
https://doi.org/10.1016/j.nima.2012.06.040.
|
762 |
+
[9]
|
763 |
+
Nucifer Collaboration, G. Boireau, L. Bouvet, A.P. Collin, G. Coulloux, M.
|
764 |
+
Cribier, H. Deschamp, V. Durand, M. Fechner, V. Fischer, J. Gaffiot, N. Gérard
|
765 |
+
Castaing, R. Granelli, Y. Kato, T. Lasserre, L. Latron, P. Legou, A. Letourneau,
|
766 |
+
|
767 |
+
D. Lhuillier, G. Mention, Th.A. Mueller, T.-A. Nghiem, N. Pedrol, J. Pelzer, M.
|
768 |
+
Pequignot, Y. Piret, G. Prono, L. Scola, P. Starzinski, M. Vivier, E. Dumonteil,
|
769 |
+
D. Mancusi, C. Varignon, C. Buck, M. Lindner, J. Bazoma, S. Bouvier, V.M.
|
770 |
+
Bui, V. Communeau, A. Cucoanes, M. Fallot, M. Gautier, L. Giot, G. Guilloux,
|
771 |
+
M. Lenoir, J. Martino, G. Mercier, T. Milleto, N. Peuvrel, A. Porta, N. Le Quéré,
|
772 |
+
C. Renard, L.M. Rigalleau, D. Roy, T. Vilajosana, F. Yermia, Online monitoring
|
773 |
+
of the Osiris reactor with the Nucifer neutrino detector, Phys. Rev. D. 93 (2016)
|
774 |
+
112006. https://doi.org/10.1103/PhysRevD.93.112006.
|
775 |
+
[10] A. Haghighat, P. Huber, S. Li, J.M. Link, C. Mariani, J. Park, T. Subedi,
|
776 |
+
Observation of Reactor Antineutrinos with a Rapidly Deployable Surface-Level
|
777 |
+
Detector,
|
778 |
+
Phys.
|
779 |
+
Rev.
|
780 |
+
Appl.
|
781 |
+
13
|
782 |
+
(2020)
|
783 |
+
034028.
|
784 |
+
https://doi.org/10.1103/PhysRevApplied.13.034028.
|
785 |
+
[11] J. Ashenfelter, B. Balantekin, H.R. Band, G. Barclay, C.D. Bass, D. Berish, N.S.
|
786 |
+
Bowden, A. Bowes, C.D. Bryan, J.P. Brodsky, J.J. Cherwinka, R. Chu, T.
|
787 |
+
Classen, K. Commeford, D. Davee, D. Dean, G. Deichert, M.V. Diwan, M.J.
|
788 |
+
Dolinski, J. Dolph, J.K. Gaison, A. Galindo-Uribarri, K. Gilje, A. Glenn, B.W.
|
789 |
+
Goddard, M. Green, K. Han, S. Hans, K.M. Heeger, B. Heffron, D.E. Jaffe, D.
|
790 |
+
Jones, T.J. Langford, B.R. Littlejohn, D.A.M. Caicedo, R.D. McKeown, M.P.
|
791 |
+
Mendenhall, P. Mueller, H.P. Mumm, J. Napolitano, R. Neilson, D. Norcini, D.
|
792 |
+
Pushin, X. Qian, E. Romero, R. Rosero, B.S. Seilhan, R. Sharma, S. Sheets, P.T.
|
793 |
+
Surukuchi, R.L. Varner, B. Viren, W. Wang, B. White, C. White, J. Wilhelmi, C.
|
794 |
+
Williams, T. Wise, H. Yao, M. Yeh, Y.-R. Yen, G. Zangakis, C. Zhang, X.
|
795 |
+
Zhang, The PROSPECT Physics Program, J. Phys. G Nucl. Part. Phys. 43 (2016)
|
796 |
+
113001. https://doi.org/10.1088/0954-3899/43/11/113001.
|
797 |
+
[12] PROSPECT Collaboration, J. Ashenfelter, A.B. Balantekin, H.R. Band, C.D.
|
798 |
+
Bass, D.E. Bergeron, D. Berish, N.S. Bowden, J.P. Brodsky, C.D. Bryan, J.J.
|
799 |
+
Cherwinka, T. Classen, A.J. Conant, A.A. Cox, D. Davee, D. Dean, G. Deichert,
|
800 |
+
M.V. Diwan, M.J. Dolinski, A. Erickson, M. Febbraro, B.T. Foust, J.K. Gaison,
|
801 |
+
A. Galindo-Uribarri, C.E. Gilbert, K.E. Gilje, B.T. Hackett, S. Hans, A.B.
|
802 |
+
Hansell, K.M. Heeger, J. Insler, D.E. Jaffe, X. Ji, D.C. Jones, O. Kyzylova, C.E.
|
803 |
+
Lane, T.J. Langford, J. LaRosa, B.R. Littlejohn, X. Lu, D.A.M. Caicedo, J.T.
|
804 |
+
Matta, R.D. McKeown, M.P. Mendenhall, J.M. Minock, P.E. Mueller, H.P.
|
805 |
+
Mumm, J. Napolitano, R. Neilson, J.A. Nikkel, D. Norcini, S. Nour, D.A. Pushin,
|
806 |
+
X. Qian, E. Romero-Romero, R. Rosero, D. Sarenac, P.T. Surukuchi, A.B.
|
807 |
+
Telles, M.A. Tyra, R.L. Varner, B. Viren, C. White, J. Wilhelmi, T. Wise, M.
|
808 |
+
Yeh, Y.-R. Yen, A. Zhang, C. Zhang, X. Zhang, Measurement of the
|
809 |
+
Antineutrino Spectrum from $^{235}$U Fission at HFIR with PROSPECT,
|
810 |
+
Phys.
|
811 |
+
Rev.
|
812 |
+
Lett.
|
813 |
+
122
|
814 |
+
(2019)
|
815 |
+
251801.
|
816 |
+
https://doi.org/10.1103/PhysRevLett.122.251801.
|
817 |
+
[13] F.D. Brooks, R.W. Pringle, B.L. Funt, Pulse Shape Discrimination in a Plastic
|
818 |
+
Scintillator,
|
819 |
+
IRE
|
820 |
+
Trans.
|
821 |
+
Nucl.
|
822 |
+
Sci.
|
823 |
+
7
|
824 |
+
(1960)
|
825 |
+
35–38.
|
826 |
+
https://doi.org/10.1109/TNS2.1960.4315733.
|
827 |
+
[14] N. Zaitseva, B.L. Rupert, I. PaweŁczak, A. Glenn, H.P. Martinez, L. Carman, M.
|
828 |
+
Faust, N. Cherepy, S. Payne, Plastic scintillators with efficient neutron/gamma
|
829 |
+
pulse shape discrimination, Nucl. Instrum. Methods Phys. Res. Sect. Accel.
|
830 |
+
Spectrometers
|
831 |
+
Detect.
|
832 |
+
Assoc.
|
833 |
+
Equip.
|
834 |
+
668
|
835 |
+
(2012)
|
836 |
+
88–93.
|
837 |
+
https://doi.org/10.1016/j.nima.2011.11.071.
|
838 |
+
|
839 |
+
[15] N.P. Zaitseva, A.M. Glenn, A.N. Mabe, M.L. Carman, C.R. Hurlbut, J.W. Inman,
|
840 |
+
S.A. Payne, Recent developments in plastic scintillators with pulse shape
|
841 |
+
discrimination, Nucl. Instrum. Methods Phys. Res. Sect. Accel. Spectrometers
|
842 |
+
Detect.
|
843 |
+
Assoc.
|
844 |
+
Equip.
|
845 |
+
889
|
846 |
+
(2018)
|
847 |
+
97–104.
|
848 |
+
https://doi.org/10.1016/j.nima.2018.01.093.
|
849 |
+
[16] G.H.V. Bertrand, M. Hamel, S. Normand, F. Sguerra, Pulse shape discrimination
|
850 |
+
between (fast or thermal) neutrons and gamma rays with plastic scintillators:
|
851 |
+
State of the art, Nucl. Instrum. Methods Phys. Res. Sect. Accel. Spectrometers
|
852 |
+
Detect.
|
853 |
+
Assoc.
|
854 |
+
Equip.
|
855 |
+
776
|
856 |
+
(2015)
|
857 |
+
114–128.
|
858 |
+
https://doi.org/10.1016/j.nima.2014.12.024.
|
859 |
+
[17] I.A. Pawełczak, A.M. Glenn, H.P. Martinez, M.L. Carman, N.P. Zaitseva, S.A.
|
860 |
+
Payne, Boron-loaded plastic scintillator with neutron-γ pulse shape
|
861 |
+
discrimination capability, Nucl. Instrum. Methods Phys. Res. Sect. Accel.
|
862 |
+
Spectrometers
|
863 |
+
Detect.
|
864 |
+
Assoc.
|
865 |
+
Equip.
|
866 |
+
751
|
867 |
+
(2014)
|
868 |
+
62–69.
|
869 |
+
https://doi.org/10.1016/j.nima.2014.03.027.
|
870 |
+
[18] R.D. Breukers, C.M. Bartle, A. Edgar, Transparent lithium loaded plastic
|
871 |
+
scintillators for thermal neutron detection, Nucl. Instrum. Methods Phys. Res.
|
872 |
+
Sect. Accel. Spectrometers Detect. Assoc. Equip. 701 (2013) 58–61.
|
873 |
+
https://doi.org/10.1016/j.nima.2012.10.080.
|
874 |
+
[19] N. Zaitseva, A. Glenn, H. Paul Martinez, L. Carman, I. Pawełczak, M. Faust, S.
|
875 |
+
Payne, Pulse shape discrimination with lithium-containing organic scintillators,
|
876 |
+
Nucl. Instrum. Methods Phys. Res. Sect. Accel. Spectrometers Detect. Assoc.
|
877 |
+
Equip. 729 (2013) 747–754. https://doi.org/10.1016/j.nima.2013.08.048.
|
878 |
+
[20] N.J. Cherepy, R.D. Sanner, P.R. Beck, E.L. Swanberg, T.M. Tillotson, S.A.
|
879 |
+
Payne, C.R. Hurlbut, Bismuth- and lithium-loaded plastic scintillators for gamma
|
880 |
+
and neutron detection, Nucl. Instrum. Methods Phys. Res. Sect. Accel.
|
881 |
+
Spectrometers
|
882 |
+
Detect.
|
883 |
+
Assoc.
|
884 |
+
Equip.
|
885 |
+
778
|
886 |
+
(2015)
|
887 |
+
126–132.
|
888 |
+
https://doi.org/10.1016/j.nima.2015.01.008.
|
889 |
+
[21] A.N. Mabe, A.M. Glenn, M.L. Carman, N.P. Zaitseva, S.A. Payne, Transparent
|
890 |
+
plastic scintillators for neutron detection based on lithium salicylate, Nucl.
|
891 |
+
Instrum. Methods Phys. Res. Sect. Accel. Spectrometers Detect. Assoc. Equip.
|
892 |
+
806 (2016) 80–86. https://doi.org/10.1016/j.nima.2015.09.111.
|
893 |
+
[22] C. Frangville, M. Hamel, G.H. V. Bertrand, E. Montbarbon, A. Grabowski, C.
|
894 |
+
Lynde, Large solubility of lithium carboxylates reaching high rates of 6 Li
|
895 |
+
incorporation in polystyrene-based plastic scintillators for fast/thermal neutron
|
896 |
+
and gamma ray detection, Mater. Chem. Front. 3 (2019) 1626–1631.
|
897 |
+
https://doi.org/10.1039/C9QM00153K.
|
898 |
+
[23] A. Husain, A.E. Hamielec, Thermal polymerization of styrene, J. Appl. Polym.
|
899 |
+
Sci. 22 (1978) 1207–1223. https://doi.org/10.1002/app.1978.070220505.
|
900 |
+
[24] F. Sutanto, T.M. Classen, S.A. Dazeley, M.J. Duvall, I. Jovanovic, V.A. Li, A.N.
|
901 |
+
Mabe, E.T.E. Reedy, T. Wu, SANDD: A directional antineutrino detector with
|
902 |
+
segmented 6Li-doped pulse-shape-sensitive plastic scintillator, Nucl. Instrum.
|
903 |
+
Methods Phys. Res. Sect. Accel. Spectrometers Detect. Assoc. Equip. 1006
|
904 |
+
(2021) 165409. https://doi.org/10.1016/j.nima.2021.165409.
|
905 |
+
[25] A.N. Mabe, A.M. Glenn, M.L. Carman, N.P. Zaitseva, S.A. Payne, Transparent
|
906 |
+
plastic scintillators for neutron detection based on lithium salicylate, Nucl.
|
907 |
+
|
908 |
+
Instrum. Methods Phys. Res. Sect. Accel. Spectrometers Detect. Assoc. Equip.
|
909 |
+
806 (2016) 80–86. https://doi.org/10.1016/j.nima.2015.09.111.
|
910 |
+
[26] H. Paul Martinez, I. Pawelczak, A.M. Glenn, M. Leslie Carman, N. Zaitseva, S.
|
911 |
+
Payne, Pulse shape discrimination in non-aromatic plastics, Nucl. Instrum.
|
912 |
+
Methods Phys. Res. Sect. Accel. Spectrometers Detect. Assoc. Equip. 771 (2015)
|
913 |
+
28–31. https://doi.org/10.1016/j.nima.2014.10.023.
|
914 |
+
[27] N.P. Zaitseva, A.M. Glenn, M.L. Carman, A.N. Mabe, S.A. Payne, N. Marom,
|
915 |
+
X. Wang, Multiple dye interactions in plastic scintillators: Effects on pulse shape
|
916 |
+
discrimination, Nucl. Instrum. Methods Phys. Res. Sect. Accel. Spectrometers
|
917 |
+
Detect.
|
918 |
+
Assoc.
|
919 |
+
Equip.
|
920 |
+
978
|
921 |
+
(2020)
|
922 |
+
164455.
|
923 |
+
https://doi.org/10.1016/j.nima.2020.164455.
|
924 |
+
[28] V.A. Li, T.M. Classen, S.A. Dazeley, M.J. Duvall, I. Jovanovic, A.N. Mabe,
|
925 |
+
E.T.E. Reedy, F. Sutanto, A prototype for SANDD: A highly-segmented pulse-
|
926 |
+
shape-sensitive plastic scintillator detector incorporating silicon photomultiplier
|
927 |
+
arrays, Nucl. Instrum. Methods Phys. Res. Sect. Accel. Spectrometers Detect.
|
928 |
+
Assoc. Equip. 942 (2019) 162334. https://doi.org/10.1016/j.nima.2019.162334.
|
929 |
+
|
930 |
+
|
931 |
+
|
09E2T4oBgHgl3EQf5AgM/content/tmp_files/load_file.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
0NFQT4oBgHgl3EQfDTUM/vector_store/index.faiss
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:679baa2b66b51f430412223eec24c31ed36cd8834154f4696776efa2f3086a05
|
3 |
+
size 6029357
|
1dE0T4oBgHgl3EQfuQGc/content/tmp_files/2301.02603v1.pdf.txt
ADDED
@@ -0,0 +1,790 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
Contextual Autonomy Evaluation of Unmanned
|
2 |
+
Aerial Vehicles in Subterranean Environments
|
3 |
+
Ryan Donald
|
4 |
+
Peter Gavriel
|
5 |
+
Adam Norton
|
6 |
+
S. Reza Ahmadzadeh
|
7 |
+
PeARL lab and NERVE Center
|
8 |
+
University of Massachusetts Lowell
|
9 |
+
Lowell, USA
|
10 |
+
Ryan [email protected]
|
11 |
+
Peter [email protected]
|
12 |
+
Adam [email protected]
|
13 |
+
Reza [email protected]
|
14 |
+
Abstract—In this paper we focus on the evaluation of con-
|
15 |
+
textual autonomy for robots. More specifically, we propose a
|
16 |
+
fuzzy framework for calculating the autonomy score for a
|
17 |
+
small Unmanned Aerial Systems (sUAS) for performing a task
|
18 |
+
while considering task complexity and environmental factors.
|
19 |
+
Our framework is a cascaded Fuzzy Inference System (cFIS)
|
20 |
+
composed of combination of three FIS which represent dif-
|
21 |
+
ferent contextual autonomy capabilities. We performed several
|
22 |
+
experiments to test our framework in various contexts, such as
|
23 |
+
endurance time, navigation, take off/land, and room clearing,
|
24 |
+
with seven different sUAS. We introduce a predictive measure
|
25 |
+
which improves upon previous predictive measures, allowing for
|
26 |
+
previous real-world task performance to be used in predicting
|
27 |
+
future mission performance.
|
28 |
+
Index Terms—Contextual Autonomy, Unmanned Aerial Vehi-
|
29 |
+
cles, Fuzzy Systems
|
30 |
+
I. INTRODUCTION
|
31 |
+
In today’s world, robots are expected to become increasingly
|
32 |
+
present by assisting humans in performing various tasks in
|
33 |
+
different environments. While some robots have been designed
|
34 |
+
for a single purpose, others can accomplish a variety of tasks
|
35 |
+
with different levels of autonomy. Measuring robot autonomy
|
36 |
+
is an important and ever evolving concept and existing meth-
|
37 |
+
ods for evaluating robot autonomy can be categorized into
|
38 |
+
two main families: contextual and non-contextual. While the
|
39 |
+
former methods consider mission and task-specific measures
|
40 |
+
(e.g., ALFUS [1], ACL [2]), the latter only rely on implicit
|
41 |
+
system capabilities and do not consider the mission and
|
42 |
+
environment features (e.g., NCAP [3], [4]).
|
43 |
+
Our study in this paper focuses on evaluating the contextual
|
44 |
+
autonomy for small Unmanned Aerial Systems (sUAS). Exist-
|
45 |
+
ing methods such as ALFUS [1] and MPP [5] share a similar
|
46 |
+
shortcoming in that neither provides a simple implementation
|
47 |
+
for use with real-world systems. Another drawback of existing
|
48 |
+
methods that our approach addresses is the lack of a consistent
|
49 |
+
process for breaking down tasks into sub-tasks and combining
|
50 |
+
scores calculated for sub-tasks into a unified score for the given
|
51 |
+
task. In this paper we propose a method for evaluating the
|
52 |
+
contextual autonomy of sUAS based on a fuzzy interface that
|
53 |
+
allows the operator to design and modify the evaluation system
|
54 |
+
using linguistic reasoning. We designed four indoor tasks
|
55 |
+
(endurance time, navigation, takeoff/land, and room clearing)
|
56 |
+
and tested our interface in various experiments with seven
|
57 |
+
different sUAS. Our results show that the proposed approach
|
58 |
+
calculates a contextual autonomy score that can be used to
|
59 |
+
rank the systems for each context.
|
60 |
+
II. RELATED WORK
|
61 |
+
Some of the first and more simplistic methods of categoriz-
|
62 |
+
ing autonomous systems are the Levels of Automation (LOA)
|
63 |
+
proposed by Sheridan [6] and its later expansion [7]. LOA
|
64 |
+
defines automation as “the full or partial replacement of a
|
65 |
+
function previously carried out by the human operator” in a 1
|
66 |
+
to 10 range; 1 being full control by the human and 10 being
|
67 |
+
full control by the computer. LOA does not accurately describe
|
68 |
+
how outside factors can affect the autonomous capability of a
|
69 |
+
system. While it could theoretically be applied to a robot, it
|
70 |
+
would not be accurate as it fails to accommodate for differing
|
71 |
+
degrees of difficulty in tasks, and environmental factors.
|
72 |
+
Another evaluation method is known as the Autonomy
|
73 |
+
Control Levels (ACL) [2]. ACL is designed for Unmanned
|
74 |
+
Aerial Vehicles (UAV), and operates on a similar basis of uti-
|
75 |
+
lizing autonomy levels from 0-10, with 0 being fully remotely
|
76 |
+
controlled by a pilot, and 10 being a human-like system.
|
77 |
+
These levels closely resemble the 10 LOA, following the same
|
78 |
+
concept. The ACL characterizes each system according to
|
79 |
+
four metrics, which attempt to categorize different areas of
|
80 |
+
autonomous behaviors for the system. In each of these, an
|
81 |
+
autonomy level from 0-10 is given based upon these behaviors.
|
82 |
+
This system has a similar drawback, in that it does not account
|
83 |
+
for difficulties in the mission itself.
|
84 |
+
Another method is the Autonomy and Technological Readi-
|
85 |
+
ness Assessment (ATRA) [8]. ATRA attempts to combine both
|
86 |
+
the basic theory behind the Autonomy Level, and the Tech-
|
87 |
+
nology Readiness Level (TRL) metric into one framework [8].
|
88 |
+
TRL utilizes these two metrics in an attempt to evaluate the
|
89 |
+
autonomy level provided by different technologies onboard the
|
90 |
+
UAS. This is emphasized as a solution for the gap between
|
91 |
+
existing theoretical work and technological advances in the
|
92 |
+
UAS autonomy space.
|
93 |
+
Autonomy Levels for Unmanned Systems (ALFUS) is a
|
94 |
+
method for defining the autonomy of a system in terms of
|
95 |
+
three different axes [9]. ALFUS has a strong theoretical basis,
|
96 |
+
but somewhat impractical in the real-world implementation
|
97 |
+
due to the lack of maturity in some of these systems, as well
|
98 |
+
arXiv:2301.02603v1 [cs.RO] 6 Jan 2023
|
99 |
+
|
100 |
+
as the inability of most, if not all, available systems to reach
|
101 |
+
the upper levels of the three axes.
|
102 |
+
The three axes mentioned are known as the Mission Com-
|
103 |
+
plexity (MC), Environmental Complexity (EC), and Human
|
104 |
+
Independence (HI) axes. Each one of these axes pertains itself
|
105 |
+
to a different aspect of the contextual autonomy of a system.
|
106 |
+
The MC axis pertains mostly towards the difficulty of the tasks
|
107 |
+
and movements required of the system to complete the task
|
108 |
+
(e.g. maneuvers, speed, searching). Alternatively, the EC axis
|
109 |
+
concerns itself with the difficulty in the performance of the
|
110 |
+
task caused by environmental factors (e.g. Lighting, Obstacles,
|
111 |
+
Enclosed Spaces). Lastly, the HI axis is representative of the
|
112 |
+
level of independence between the user and the system (e.g.
|
113 |
+
task planning, task execution).
|
114 |
+
Due to the ability to split the representation of a system’s
|
115 |
+
autonomy into these three axes, it allows for the character-
|
116 |
+
ization and evaluation of system’s autonomy in real world
|
117 |
+
tests, including the impact that both the environment and the
|
118 |
+
mission profile can have on the system’s autonomy. Our work
|
119 |
+
in this paper is based off many of the ideas put forward
|
120 |
+
through ALFUS, and we utilize it as a foundational part of
|
121 |
+
our contextual autonomy evaluation.
|
122 |
+
The Mission Performance Potential is proposed as a method
|
123 |
+
for the evaluation of a unmanned system’s autonomous per-
|
124 |
+
formance, as well as a predictor for future missions [5].
|
125 |
+
This method provides a metric which represents the max-
|
126 |
+
imum performance of a system in a given mission at a
|
127 |
+
given autonomy level. Uniquely, this method includes both
|
128 |
+
non-contextual autonomy metrics, and contextual autonomy
|
129 |
+
metrics, and provides a single output prediction based on both
|
130 |
+
types of data.
|
131 |
+
One of the drawbacks of MPP is that it only provides
|
132 |
+
a prediction of the performance of a system at a specified
|
133 |
+
autonomy level for a specified mission. In other words, this
|
134 |
+
does not evaluate how a real system performs, but rather the
|
135 |
+
maximum potential for a system to perform. Our approach
|
136 |
+
instead calculated the actual autonomy of a system based on
|
137 |
+
actual data from real-world experiments.
|
138 |
+
Fig. 1: Our cascaded Fuzzy Inference System used for calcu-
|
139 |
+
lating a contextual autonomy score for a performed task.
|
140 |
+
III. FRAMEWORK
|
141 |
+
ALFUS’ summary model works with a set of metrics for
|
142 |
+
each of its three axes, as well as a system of levels from
|
143 |
+
0 to 10. These levels are based upon possible answers from
|
144 |
+
those metrics, to provide a level evaluation of a system. As
|
145 |
+
a generic framework, ALFUS tends to have a very broad,
|
146 |
+
and somewhat open to interpretation, definition of metrics.
|
147 |
+
For instance, in the case of the EC axis, it ranges from a
|
148 |
+
“simple environment,” to an “extreme environment.” However,
|
149 |
+
the summary model describes the system in terms of an
|
150 |
+
autonomy level for each axis, while the Contextual Autonomy
|
151 |
+
Capability within ALFUS provides an actual score for each
|
152 |
+
axis. Due to the autonomy level evaluation, there is some
|
153 |
+
ambiguity when characterizing systems. This is one of the
|
154 |
+
main concerns with ALFUS, in that while it does provide a
|
155 |
+
strong theoretical background, the actual implementation of
|
156 |
+
the ideas with real-world systems is not as clear.
|
157 |
+
We utilize Takagi-Sugeno Fuzzy Inference Systems (FIS)
|
158 |
+
as a means to combine different metrics in an evaluation of
|
159 |
+
an sUAS which is both easy to use, and allows us to use
|
160 |
+
some data which is either not easily defined numerically, or
|
161 |
+
inherently qualitative about the environment, combined with
|
162 |
+
standard quantitative metrics. Fuzzy inferences also allow for
|
163 |
+
slight deviations in a metric to not cause a drastic change
|
164 |
+
in the evaluation of that sUAS. We designed a set of tests
|
165 |
+
with various mission and environment complexity levels (see
|
166 |
+
Section V), and defined a fuzzy inference system for each test.
|
167 |
+
Unlike MPP [5], our fuzzy inference systems are based on the
|
168 |
+
three-axis model used in ALFUS, by creating an individual FIS
|
169 |
+
for metrics associated with each axis (i.e., MC, EC, HI), and
|
170 |
+
an additional FIS which combines these three outputs into a
|
171 |
+
single score. This structure representing a cascaded FIS (cFIS)
|
172 |
+
is illustrated in Fig. 1. For each test, the outcome of the FIS
|
173 |
+
for all three axis is fed into a combining FIS that produces a
|
174 |
+
final autonomy score. Each FIS in our cFIS is a Sugeno-type
|
175 |
+
FIS with multiple inputs and one output. For each input of an
|
176 |
+
FIS, we consider three membership functions (MFs) labeled
|
177 |
+
as low, medium, and high. Without loss of generality, we used
|
178 |
+
triangular MFs, however, other types of MF can be used. The
|
179 |
+
input variables used in different tests and their corresponding
|
180 |
+
MF parameters have been reported in Table II. The output of
|
181 |
+
each Sugeno-type FIS has five singleton MFs (i.e., constant):
|
182 |
+
very bad, bad, medium, good, very good. Our FIS’ use a
|
183 |
+
triangular fuzzifier and a Sugeno defuzzifier (i.e., weighted
|
184 |
+
average output). For each FIS, we defined a rule base (i.e., a
|
185 |
+
set of linguistic rules).
|
186 |
+
In the cFIS structure in Fig. 1, the defuzzified output of
|
187 |
+
each FIS is a value in the range of [0, 1]. For the initial three
|
188 |
+
FIS, 0 and 1 represent the lowest and highest complexity,
|
189 |
+
respectively. In the case of the final FIS, 0 and 1 represent the
|
190 |
+
lowest and the highest autonomy, respectively. If we define the
|
191 |
+
singleton value of each output function as zi, and the degree
|
192 |
+
to which each output is weighted based upon the ruleset as
|
193 |
+
wi, then the output final score can be calculated as follows:
|
194 |
+
s =
|
195 |
+
�N
|
196 |
+
i=1 wizi
|
197 |
+
�N
|
198 |
+
i=1 wi
|
199 |
+
(1)
|
200 |
+
where N represents the number of rules in the rule base.
|
201 |
+
Table I reports an example of the fuzzy ruleset we used. The
|
202 |
+
advantage of this system is that we can utilize many different
|
203 |
+
|
204 |
+
Human
|
205 |
+
Independence
|
206 |
+
FIS
|
207 |
+
Environmental
|
208 |
+
Output
|
209 |
+
Input Data
|
210 |
+
Complexity
|
211 |
+
TestFIS
|
212 |
+
Score
|
213 |
+
FIS
|
214 |
+
Mission
|
215 |
+
Complexity
|
216 |
+
FISFig. 2: From left to right, top to bottom: Cleo Robotics Dronut,
|
217 |
+
Flyability Elios 2, Lumenier Nighthawk 3, Parrot ANAFI USA GOV,
|
218 |
+
Skydio X2D, Teal Drones Golden Eagle, Vantage Robotics Vesper
|
219 |
+
types of data, and clearly define the ranges for each value,
|
220 |
+
allowing the pilots performing the tests to provide feedback
|
221 |
+
on the membership functions and rulesets.
|
222 |
+
Mission Complexity Axis
|
223 |
+
Low
|
224 |
+
Medium
|
225 |
+
High
|
226 |
+
Environment
|
227 |
+
Complexity
|
228 |
+
Axis
|
229 |
+
Low
|
230 |
+
Very Bad
|
231 |
+
Bad
|
232 |
+
Medium
|
233 |
+
Medium
|
234 |
+
Bad
|
235 |
+
Medium
|
236 |
+
Good
|
237 |
+
High
|
238 |
+
Medium
|
239 |
+
Good
|
240 |
+
Very good
|
241 |
+
TABLE I: Fuzzy Ruleset utilized in our final combinational FIS
|
242 |
+
IV. UAS PLATFORMS
|
243 |
+
Fig. 2 illustrates seven sUAS platforms evaluated in our ex-
|
244 |
+
periments. The platforms include: the Cleo Robotics Dronut1,
|
245 |
+
Flyability Elios 22, Lumenier Nighthawk 33, Parrot ANAFI
|
246 |
+
USA GOV4, Skydio X2D5, Teal Drones Golden Eagle6, and
|
247 |
+
Vantage Robotics Vesper7. These platforms provide a wide
|
248 |
+
ranging set of capabilities and use cases. For instance, Parrot,
|
249 |
+
Skydio X2D, Golden Eagle, and Vesper were developed for
|
250 |
+
outdoor reconnaissance, whereas the Dronut and Elios 2 were
|
251 |
+
developed for indoor reconnaissance and inspection, specif-
|
252 |
+
ically in urban and industrial environments. Previously, we
|
253 |
+
have used the same set of sUAS for a non-contextual bench-
|
254 |
+
marking [4], [10]. In our evaluations, we have anonymized the
|
255 |
+
data by assigning the platforms labels A through G without
|
256 |
+
any specific ordering or correlation.
|
257 |
+
V. TEST DESIGN
|
258 |
+
To evaluate the contextual autonomy of our platforms, we
|
259 |
+
have designed several tests across a spectrum of areas. The
|
260 |
+
variables for which we collected data for each test is reported
|
261 |
+
in Table II. In this section, we describe each test briefly.
|
262 |
+
As shown in Fig. 3 all tests have been designed for indoor
|
263 |
+
environments.
|
264 |
+
1https://cleorobotics.com/
|
265 |
+
2https://www.flyability.com/elios-2
|
266 |
+
3https://www.lumenier.com/
|
267 |
+
4https://www.parrot.com/us/drones/anafi
|
268 |
+
5https://www.skydio.com/skydio-x2
|
269 |
+
6https://tealdrones.com/suas-golden-eagle/
|
270 |
+
7https://vantagerobotics.com/vesper/
|
271 |
+
A. Runtime Endurance
|
272 |
+
This family of tests focuses on the battery life of the
|
273 |
+
system in various operational profiles. As shown in Fig. 3a,
|
274 |
+
the specific test we use from this group focuses on the
|
275 |
+
system flying continuously in a figure-8 pattern. The main
|
276 |
+
performance metric for the test is the test duration.
|
277 |
+
B. Navigation
|
278 |
+
We have designed two main types of navigation tests, each
|
279 |
+
with several profiles defined based on the type of movement
|
280 |
+
(horizontal, vertical, or both) and the type of confinement
|
281 |
+
(horizontal, vertical, or both). As shown in Fig. 3b, navigation
|
282 |
+
through confined spaces involves traversal into and out of a
|
283 |
+
continuously confined space, with tests for hallway, tunnel,
|
284 |
+
stairwell, and shaft. Navigation through apertures involves
|
285 |
+
transient traversal through an opening, with tests for doorway
|
286 |
+
and window. Each navigation environment is characterized
|
287 |
+
according to the dimensions of the confined space or aperture,
|
288 |
+
lighting, surface textures, and the presence of obstructions on
|
289 |
+
either side of the confined space or aperture. The main metrics
|
290 |
+
of performance are efficacy and average navigation time.
|
291 |
+
C. Room Clearing
|
292 |
+
In this test method, the system performs a visual inspection
|
293 |
+
of an example room whose walls, floor, and ceiling are out-
|
294 |
+
fitted with visual acuity targets which contain nested Landolt
|
295 |
+
C symbols of decreasing size. As shown in Fig. 3c, the test
|
296 |
+
was performed under two conditions: with and without using
|
297 |
+
camera zoom. The main performance metrics are duration,
|
298 |
+
coverage, and average acuity.
|
299 |
+
D. Takeoff and Land/Perch
|
300 |
+
As illustrated in Fig. 3d, these tests evaluate the system’s
|
301 |
+
ability to takeoff and land or perch in various environments
|
302 |
+
that may be affected by stabilization issues or preventative
|
303 |
+
safety checks from the system. The conditions tested vary the
|
304 |
+
angle of the ground plane (flat, 5° and 10° pitch and roll)
|
305 |
+
and the presence of obstructions (1.2-2.4m overhead, 0.6-1.2m
|
306 |
+
lateral). The main performance metric is efficacy.
|
307 |
+
VI. RESULTS
|
308 |
+
Utilizing our framework outlined in Section III, we calculate
|
309 |
+
a performance score for each sUAS based upon the conditions
|
310 |
+
and performance metrics detailed below. As mentioned above,
|
311 |
+
our system provides a single score for each of the three
|
312 |
+
attributes, the EC, MC and HI axes, and utilizes those scores
|
313 |
+
to provide a single score for the entire test. It should be noted
|
314 |
+
that although we consider all three axes in our cFIS structure,
|
315 |
+
due to lack of data, we consider the lowest level (i.e., full
|
316 |
+
tele-operation) for the HI axis across all tests. The test-specific
|
317 |
+
details of the structure is discussed in corresponding sections.
|
318 |
+
Another factor to note is that for some of these experiments,
|
319 |
+
some sUAS were not available at the time of testing, due to the
|
320 |
+
sUAS being repaired, or other circumstances. In this case, we
|
321 |
+
attempt to remedy this by calculating a partial point achieved
|
322 |
+
by the sUAS. For situations where data for an entire test is
|
323 |
+
|
324 |
+
(a) Runtime Endurance test showing a system performing a specified
|
325 |
+
movement
|
326 |
+
(b) Navigation tests (left to right, top to bottom): hallway, tunnel,
|
327 |
+
stairwell, shaft, door, window.
|
328 |
+
(c) Room clearing test showing a system inspecting surfaces for
|
329 |
+
visual acuity targets.
|
330 |
+
(d) Takeoff and land/perch tests showing variations in ground plane
|
331 |
+
angle (top row) and nearby obstructions (bottom row).
|
332 |
+
Fig. 3: Tests designed for the evaluation of sUAS contextual autonomy.
|
333 |
+
missing, we cannot fully evaluate the sUAS. However, we have
|
334 |
+
evaluated sUAS for individual tests for which the data was
|
335 |
+
recorded. Despite these edge cases, most sUAS had available
|
336 |
+
data, which was used in our evaluations.
|
337 |
+
As mentioned before, the proposed structure in Fig. 1,
|
338 |
+
was adapted to each specific test. The resulting cascaded FIS
|
339 |
+
are depicted in Fig. 6 each of which represents a cFIS for
|
340 |
+
a specific test. More specifically, each sub-figure shows the
|
341 |
+
inputs and outputs of each cFIS, as well as how the FIS
|
342 |
+
modules are connected. This is meant to provide a visual
|
343 |
+
aid, which can be useful to keep track of each FIS, as we
|
344 |
+
discuss the results. Associated membership functions for each
|
345 |
+
input, and the outputs, can be found in Table II. Some of
|
346 |
+
the FIS surfaces, which show the relationship between two
|
347 |
+
input values in an FIS, and the corresponding output value, are
|
348 |
+
shown in Fig. 4. Additionally, numerical results are reported
|
349 |
+
in Fig.5 and Table III.
|
350 |
+
A. Test Results
|
351 |
+
Runtime Endurance: The runtime endurance test is likely
|
352 |
+
the simplest of the tests performed, however, it is still a useful
|
353 |
+
test in gauging how a sUAS might perform in a real mission.
|
354 |
+
Fig. 3a illustrates the runtime endurance test design including
|
355 |
+
the navigation path and two stands. The adapted cFIS for
|
356 |
+
this test is shown in Fig. 6a with four inputs: number of
|
357 |
+
obstructions, number of crashes, light level and speed.
|
358 |
+
Despite the simplicity of this test, some sUAS did not
|
359 |
+
performed well largely due to slow speed. Our results indicate
|
360 |
+
that some sUAS may have trouble in portions of this real-
|
361 |
+
world mission which requires both speed and maneuverability.
|
362 |
+
(a) Final FIS Surface
|
363 |
+
(b) Through Aperture test EC
|
364 |
+
(c) Takeoff and Land/Perch EC
|
365 |
+
(d) Through Corridor MC
|
366 |
+
Fig. 4: FIS surfaces for different tests.
|
367 |
+
In should be noted that during this test only four sUAS were
|
368 |
+
available.
|
369 |
+
Navigation: In the navigation tests, due to the differences
|
370 |
+
between the through corridor and through apertures tests, two
|
371 |
+
slightly different cascaded FIS were designed. These can be
|
372 |
+
found in Fig. 6b and Fig. 6d. The input to the through corri-
|
373 |
+
dors cFIS includes area (cross section), light level, verticality,
|
374 |
+
coverage, number of crashes, and duration. The inputs to the
|
375 |
+
through apertures cFIS include area, light level, number of
|
376 |
+
|
377 |
+
10 degrees
|
378 |
+
10 degrees
|
379 |
+
5 degrees
|
380 |
+
5degree
|
381 |
+
1.2 mCutput_Score
|
382 |
+
10.5
|
383 |
+
0
|
384 |
+
0.5
|
385 |
+
0.5
|
386 |
+
MC
|
387 |
+
0
|
388 |
+
ECOutput_Score
|
389 |
+
0.6
|
390 |
+
0.4
|
391 |
+
0.2
|
392 |
+
0:
|
393 |
+
0
|
394 |
+
2
|
395 |
+
200
|
396 |
+
400
|
397 |
+
4
|
398 |
+
600
|
399 |
+
Area
|
400 |
+
Light0.7
|
401 |
+
10.5
|
402 |
+
0.3
|
403 |
+
10
|
404 |
+
10
|
405 |
+
5
|
406 |
+
5
|
407 |
+
Pitch
|
408 |
+
0
|
409 |
+
RollOutput_Score
|
410 |
+
0.5
|
411 |
+
00
|
412 |
+
2
|
413 |
+
0.5
|
414 |
+
Crashes
|
415 |
+
3
|
416 |
+
CompletionXVariables
|
417 |
+
Description
|
418 |
+
MFs: Triangular{Low, Medium, High}
|
419 |
+
Area
|
420 |
+
Aperture/Hallway Cross-Section (m2)
|
421 |
+
[0, 0, 2.7]
|
422 |
+
[0.6, 3, 5.4]
|
423 |
+
[3.3, 6, 6]
|
424 |
+
Light
|
425 |
+
Ambient Light Level (Lux)
|
426 |
+
[0, 0, 337.5]
|
427 |
+
[75, 375, 675]
|
428 |
+
[412.5, 750, 750]
|
429 |
+
Vert
|
430 |
+
Verticality (°)
|
431 |
+
[0, 0, 37.5]
|
432 |
+
[7.5, 45, 82.5]
|
433 |
+
[52.5, 90, 90]
|
434 |
+
Crash
|
435 |
+
Number of Crashes
|
436 |
+
[0, 0, 1.25]
|
437 |
+
[0.5, 1.5, 2.5]
|
438 |
+
[1.75, 3, 3]
|
439 |
+
Rollovers
|
440 |
+
Number of Rollovers
|
441 |
+
[0, 0, 1.25]
|
442 |
+
[0.5, 1.5, 2.5]
|
443 |
+
[1.75, 3, 3]
|
444 |
+
Comp. %
|
445 |
+
Completion Percentage
|
446 |
+
[0, 0, 0.55]
|
447 |
+
[0.15, 0.6, 0.92]
|
448 |
+
[0.7, 1, 1]
|
449 |
+
Yaw/Pitch
|
450 |
+
Static Yaw/Pitch Angle (°)
|
451 |
+
[0, 0, 4.17]
|
452 |
+
[0.83, 5, 9.12]
|
453 |
+
[5.83, 10, 10]
|
454 |
+
VR
|
455 |
+
Static Vertical Obstruction (m)
|
456 |
+
[0.6, 0.6, 1.1]
|
457 |
+
[0.7, 1.2, 1.7]
|
458 |
+
[1.3, 1.8, 1.8]
|
459 |
+
LR
|
460 |
+
Static Lateral Obstruction (m)
|
461 |
+
[1.2, 1.2, 2.2]
|
462 |
+
[1.4, 2.4, 3.4]
|
463 |
+
[2.6, 3.6, 3.6]
|
464 |
+
Coverage
|
465 |
+
Coverage Percentage
|
466 |
+
[0, 0, 0.55]
|
467 |
+
[0.15, 0.6, 0.92]
|
468 |
+
[0.7, 1, 1]
|
469 |
+
Cs Detected
|
470 |
+
Landolt C Depth Detected
|
471 |
+
[0, 0, 50]
|
472 |
+
[10, 50, 90]
|
473 |
+
[50, 100, 100]
|
474 |
+
Duration
|
475 |
+
Duration of Test (Minutes)
|
476 |
+
[2.5, 2.5, 5.25]
|
477 |
+
[3.05, 5.25, 7.45]
|
478 |
+
[5.25, 8, 8]
|
479 |
+
Obs.
|
480 |
+
Number of Obstructions
|
481 |
+
[0, 0, 2.5]
|
482 |
+
[1, 3, 5]
|
483 |
+
[3.5, 6, 6]
|
484 |
+
Output Variable
|
485 |
+
Description
|
486 |
+
Sugeno MFs: Constant {Very Low to Very High}
|
487 |
+
Score
|
488 |
+
Combined Defuzzified Score
|
489 |
+
[0, 0.25, 0.5, 0.75, 1]
|
490 |
+
TABLE II: Membership Functions (MFs) for each input and output variable used in an FIS in the evaluation of these sUAS.
|
491 |
+
Fig. 5: Scores for each sUAS as a percentage of the maximum score
|
492 |
+
possible on the y-axis, with each test on the x-axis
|
493 |
+
crashes, and completion percentage. As shown above in Fig. 5,
|
494 |
+
each sUAS that performed the through apertures test, achieved
|
495 |
+
a maximum score, besides sUAS G, which performed slightly
|
496 |
+
worse, due to both issues in correctly traversing the aperture,
|
497 |
+
as well as being the only sUAS to suffer a crash during the test.
|
498 |
+
Next, for the through corridors test, As shown in Fig. 5, there
|
499 |
+
is more variance in the performance between each sUAS, with
|
500 |
+
UAS A performing the best, and UAS E performing the worst,
|
501 |
+
even though sUAS E tied for best in through apertures. This
|
502 |
+
is important, as there is more room for error while traversing
|
503 |
+
corridors, than there is traversing an aperture.
|
504 |
+
Takeoff and Land/Perch: For the takeoff and land/perch
|
505 |
+
test, the cFIS diagram can be found in Fig. 6e. The inputs
|
506 |
+
include pitch, yaw, number of crashes, completion percentage,
|
507 |
+
vertical and lateral obstruction, and number of rollovers. As
|
508 |
+
can be seen in Fig. 5 and Table III, sUAS A and sUAS G
|
509 |
+
perform best across both sections of the test and thus provide
|
510 |
+
the highest level of autonomy. Likewise, sUAS B performs the
|
511 |
+
worst in both portions of the test, showcasing a lower level of
|
512 |
+
autonomy, compared to the other sUAS. This evaluation allows
|
513 |
+
for the characterization of how an sUAS may perform during
|
514 |
+
portions of a mission which requires the system to takeoff or
|
515 |
+
land in a specified spot, of varying difficulty.
|
516 |
+
Room Clearing: Since the room clearing test is done in
|
517 |
+
a static environment, we included a time constraint in our
|
518 |
+
testing making the evaluation to focus on the performance
|
519 |
+
of the sUAS in regards to the Mission Complexity axis. The
|
520 |
+
designed cFIS can be seen in Fig. 6c. Inputs include light level,
|
521 |
+
number of obstructions, number of crashes, duration, coverage,
|
522 |
+
and landolt C depth detected. Results are found in Fig. 5, and
|
523 |
+
Table III. In this test, the strongest performer was UAS E;
|
524 |
+
however, most of the UAS performed closely to each other.
|
525 |
+
Surprisingly, a strong performance in the runtime endurance
|
526 |
+
test did not necessarily correlate to a strong performance in
|
527 |
+
this test. Both of these tests require a system with good maneu-
|
528 |
+
verability capabilities, but this test also requires a controller
|
529 |
+
which allows the user to visually identify different landmarks.
|
530 |
+
B. Final Results
|
531 |
+
UAS
|
532 |
+
T.C.
|
533 |
+
T.A.
|
534 |
+
Takeoff
|
535 |
+
Land
|
536 |
+
R.E.
|
537 |
+
R.C.
|
538 |
+
Predictive
|
539 |
+
Score
|
540 |
+
A
|
541 |
+
1.0
|
542 |
+
1.0
|
543 |
+
1.0
|
544 |
+
1.0
|
545 |
+
0.5
|
546 |
+
0.76
|
547 |
+
0.85
|
548 |
+
B
|
549 |
+
0.90
|
550 |
+
1.0
|
551 |
+
0.71
|
552 |
+
0.87
|
553 |
+
0.76
|
554 |
+
0.73
|
555 |
+
0.82
|
556 |
+
C
|
557 |
+
0.84
|
558 |
+
1.0
|
559 |
+
1.0
|
560 |
+
0.87
|
561 |
+
-
|
562 |
+
-
|
563 |
+
0.92
|
564 |
+
D
|
565 |
+
-
|
566 |
+
-
|
567 |
+
0.75
|
568 |
+
0.97
|
569 |
+
0.65
|
570 |
+
0.75
|
571 |
+
0.77
|
572 |
+
E
|
573 |
+
0.80
|
574 |
+
1.0
|
575 |
+
0.82
|
576 |
+
0.89
|
577 |
+
-
|
578 |
+
0.85
|
579 |
+
0.87
|
580 |
+
F
|
581 |
+
-
|
582 |
+
-
|
583 |
+
0.99
|
584 |
+
0.91
|
585 |
+
-
|
586 |
+
-
|
587 |
+
0.95
|
588 |
+
G
|
589 |
+
0.83
|
590 |
+
0.83
|
591 |
+
1.0
|
592 |
+
1.0
|
593 |
+
0.5
|
594 |
+
0.79
|
595 |
+
0.80
|
596 |
+
TABLE III: Scores of each sUAS for each test, as well as a weighted
|
597 |
+
multiple which allows for an overall evaluation of each sUAS
|
598 |
+
Contextual autonomy evaluations are concerned with the
|
599 |
+
performance of a system within an environment while per-
|
600 |
+
forming a specific task with a known level of complexity.
|
601 |
+
However, calculating an overall score that represents an av-
|
602 |
+
erage autonomy for a given system in a spectrum of tests
|
603 |
+
and environment is desirable. To combine the test scores into
|
604 |
+
a single score, we utilize a weighted product, with equal
|
605 |
+
weightings for each test, as we did previously in our non-
|
606 |
+
contextual evaluation [4]. The weighted product represented
|
607 |
+
as
|
608 |
+
P =
|
609 |
+
M
|
610 |
+
�
|
611 |
+
i
|
612 |
+
φwi
|
613 |
+
i ,
|
614 |
+
(2)
|
615 |
+
where M is the number of individual tests, φi represents an
|
616 |
+
individual test score, and wi the weight assigned to that test.
|
617 |
+
|
618 |
+
1.0
|
619 |
+
T
|
620 |
+
T
|
621 |
+
0.9
|
622 |
+
UASA
|
623 |
+
0.8 -
|
624 |
+
UAS B
|
625 |
+
UAS C
|
626 |
+
0.7 -
|
627 |
+
UAS D
|
628 |
+
UAS E
|
629 |
+
0.6
|
630 |
+
UAS F
|
631 |
+
UAS G
|
632 |
+
0.5
|
633 |
+
T.C.
|
634 |
+
T.A.
|
635 |
+
R.E.
|
636 |
+
R.C.
|
637 |
+
Takeoff
|
638 |
+
Land(a) Runtime Endurance (R.E.) test FIS
|
639 |
+
(b) Through Apertures (T.A.) test FIS
|
640 |
+
(c) Room Clearing (R.C.) test FIS
|
641 |
+
(d) Through Corridors (T.C.) test FIS
|
642 |
+
(e) Takeoff and Land/Perch test FIS
|
643 |
+
Fig. 6: Diagrams of each system of cascaded FIS utilized to
|
644 |
+
calculate scores for each test
|
645 |
+
has several benefits including that different test results can
|
646 |
+
be combined without requiring normalization or scaling. The
|
647 |
+
results for each sUAS are shown in Table III. It is important to
|
648 |
+
note that many of the sUAS perform better than the others in
|
649 |
+
some tests, but worse in others. One example of this is UAS
|
650 |
+
A, which has the fourth highest weighted multiple (overall
|
651 |
+
score), while performing the best in four out of six tests. This
|
652 |
+
is due to the sUAS’s relatively poor performance in both the
|
653 |
+
runtime endurance test, as well as in the room clearing test.
|
654 |
+
The use case of a singular score like this presents itself when
|
655 |
+
a user would like to know which sUAS is likely to provide
|
656 |
+
the most overall autonomy, across multiple tests and different
|
657 |
+
environment.
|
658 |
+
VII. CONCLUSIONS AND DISCUSSIONS
|
659 |
+
In this paper, we proposed a framework for evaluation of
|
660 |
+
contextual autonomy for robotic systems. Our framework con-
|
661 |
+
sists of a cascaded Fuzzy Inference System (cFIS) that com-
|
662 |
+
bines test results over three axes of evaluation (mission com-
|
663 |
+
plexity, environment complexity and human independence)
|
664 |
+
introduced by the ALFUS framework. We have designed
|
665 |
+
four tests with different mission complexity and environment
|
666 |
+
complexity levels and performed several experiments with
|
667 |
+
several sUAS, and we have shown that our modular framework
|
668 |
+
is adaptable to different tests. For future work, we plan to
|
669 |
+
extend our framework for performance evaluation.
|
670 |
+
To achieve this, a desired mission can be decomposed into
|
671 |
+
base tasks, such as takeoff/landing, traversing through environ-
|
672 |
+
ments/apertures, clearing rooms, and general maneuverability.
|
673 |
+
The user then can define a set of weights and calculate a
|
674 |
+
potential performance score of a sUAS for the target mission.
|
675 |
+
Unlike MPP [5], however, we suggest a method which is based
|
676 |
+
upon performance in set tasks, rather than a combination of
|
677 |
+
non-contextual attributes, and environmental factors.
|
678 |
+
ACKNOWLEDGMENT
|
679 |
+
This work is sponsored by the Department of the Army, U.S.
|
680 |
+
Army Combat Capabilities Development Command Soldier
|
681 |
+
Center, award number W911QY-18-2-0006. Approved for
|
682 |
+
public release #PR2022 88282
|
683 |
+
REFERENCES
|
684 |
+
[1] P. J. Durst and W. Gray, “Levels of autonomy and autonomous system
|
685 |
+
performance assessment for intelligent unmanned systems,” Engineer-
|
686 |
+
ing research and development center Vicksburg Ms Geotechnical and
|
687 |
+
Structures lab, Tech. Rep., 2014.
|
688 |
+
[2] B. T. Clought, “Metrics, schmetrics! how the heck do you determine
|
689 |
+
a uav’s autonomy anyway?” Air Force Research Laboratory, Wright-
|
690 |
+
Pattterson Air Force Base, OH, Tech. Rep., August 2002.
|
691 |
+
[3] P. J. Durst, W. Gray, and M. Trentini, “A non-contextual model for
|
692 |
+
evaluating the autonomy level of intelligent unmanned ground vehicles,”
|
693 |
+
in Proceedings of the 2011 Ground Vehicle Systems Engineering and
|
694 |
+
Technology Symposium, 2011.
|
695 |
+
[4] B. Hertel, R. Donald, C. Dumas, and S. R. Ahmadzadeh, “Methods
|
696 |
+
for combining and representing non-contextual autonomy scores for
|
697 |
+
unmanned aerial systems,” International Conference on Automation,
|
698 |
+
Robotics, and Applications (ICARA), vol. 8th, pp. 145–149, 2022.
|
699 |
+
[5] P. Durst, W. Gray, A. Nikitenko, J. Caetano, M. Trentini, and R. King,
|
700 |
+
“A framework for predicting the mission-specific performance of au-
|
701 |
+
tonomous unmanned systems,” International Conference on Intelligent
|
702 |
+
Robots and Systems, pp. 1962–1969, 2014.
|
703 |
+
[6] T. B. Sheridan, “Automation, authority, and angst – revisited,” vol. 35,
|
704 |
+
September 1991, pp. 2–6.
|
705 |
+
[7] R. Parasuraman, T. B. Sheridan, and C. D. Wickens, “A model for types
|
706 |
+
and levels of human interaction with automation,” IEEE Transactions on
|
707 |
+
Systems, Man, and Cybernetics–Part A: Systems and Humans, vol. 30,
|
708 |
+
pp. 286–297, May 2000.
|
709 |
+
[8] F. Kendoul, “Towards a unified framework for uas autonomy and
|
710 |
+
technology readiness assessment (ATRA),” pp. 55–71, 2 2013.
|
711 |
+
[9] H.-M. Huang, “Autonomy levels for unmanned systems framework;
|
712 |
+
volume II: Framework models,” NIST Special Publication: Gaithersburg,
|
713 |
+
MD, USA, p. 30, 2007.
|
714 |
+
[10] A. Norton, R. Ahmadzadeh, K. Jerath, P. Robinette, J. Weitzen, T. Wick-
|
715 |
+
ramarathne, H. Yanco, M. Choi, R. Donald, B. Donoghue et al.,
|
716 |
+
“Decisive test methods handbook: Test methods for evaluating suas in
|
717 |
+
subterranean and constrained indoor environments, version 1.1,” arXiv
|
718 |
+
preprint arXiv:2211.01801, 2022.
|
719 |
+
|
720 |
+
Obs.
|
721 |
+
Crashes
|
722 |
+
Environmental
|
723 |
+
Mission
|
724 |
+
Complexity
|
725 |
+
Complexity
|
726 |
+
Light
|
727 |
+
FIS
|
728 |
+
FIS
|
729 |
+
Level
|
730 |
+
Speed
|
731 |
+
Output
|
732 |
+
Test FIS
|
733 |
+
ScoreArea
|
734 |
+
Crashes
|
735 |
+
Environmental
|
736 |
+
Mission
|
737 |
+
Complexity
|
738 |
+
Complexity
|
739 |
+
Light
|
740 |
+
FIS
|
741 |
+
FIS
|
742 |
+
Level
|
743 |
+
Comp. %
|
744 |
+
Output
|
745 |
+
Test FIS
|
746 |
+
ScoreCoverage
|
747 |
+
Cs
|
748 |
+
Detected
|
749 |
+
Crashes
|
750 |
+
Light
|
751 |
+
Environmental
|
752 |
+
Mission
|
753 |
+
Complexity
|
754 |
+
Complexity
|
755 |
+
Duration
|
756 |
+
FIS
|
757 |
+
FIS
|
758 |
+
Ohs.
|
759 |
+
Output
|
760 |
+
Test FIS
|
761 |
+
ScoreArea
|
762 |
+
Crashes
|
763 |
+
Environmental
|
764 |
+
Mission
|
765 |
+
Complexity
|
766 |
+
Complexity
|
767 |
+
Light
|
768 |
+
FIS
|
769 |
+
FIS
|
770 |
+
Level
|
771 |
+
Comp. %
|
772 |
+
Vert.
|
773 |
+
Output
|
774 |
+
Test FIS
|
775 |
+
ScoreCrashes
|
776 |
+
Pitch
|
777 |
+
Rollovers
|
778 |
+
Yaw
|
779 |
+
Environmental
|
780 |
+
Mission
|
781 |
+
Complexity
|
782 |
+
Complexity
|
783 |
+
Comp. %
|
784 |
+
LR
|
785 |
+
FIS
|
786 |
+
FIS
|
787 |
+
VR
|
788 |
+
Output
|
789 |
+
Test FIS
|
790 |
+
Score
|
1dE0T4oBgHgl3EQfuQGc/content/tmp_files/load_file.txt
ADDED
@@ -0,0 +1,472 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
filepath=/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf,len=471
|
2 |
+
page_content='Contextual Autonomy Evaluation of Unmanned Aerial Vehicles in Subterranean Environments Ryan Donald Peter Gavriel Adam Norton S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
3 |
+
page_content=' Reza Ahmadzadeh PeARL lab and NERVE Center University of Massachusetts Lowell Lowell, USA Ryan Donald@student.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
4 |
+
page_content='uml.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
5 |
+
page_content='edu Peter Gavriel@uml.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
6 |
+
page_content='edu Adam Norton@uml.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
7 |
+
page_content='edu Reza Ahmadzadeh@uml.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
8 |
+
page_content='edu Abstract—In this paper we focus on the evaluation of con- textual autonomy for robots.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
9 |
+
page_content=' More specifically, we propose a fuzzy framework for calculating the autonomy score for a small Unmanned Aerial Systems (sUAS) for performing a task while considering task complexity and environmental factors.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
10 |
+
page_content=' Our framework is a cascaded Fuzzy Inference System (cFIS) composed of combination of three FIS which represent dif- ferent contextual autonomy capabilities.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
11 |
+
page_content=' We performed several experiments to test our framework in various contexts, such as endurance time, navigation, take off/land, and room clearing, with seven different sUAS.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
12 |
+
page_content=' We introduce a predictive measure which improves upon previous predictive measures, allowing for previous real-world task performance to be used in predicting future mission performance.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
13 |
+
page_content=' Index Terms—Contextual Autonomy, Unmanned Aerial Vehi- cles, Fuzzy Systems I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
14 |
+
page_content=' INTRODUCTION In today’s world, robots are expected to become increasingly present by assisting humans in performing various tasks in different environments.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
15 |
+
page_content=' While some robots have been designed for a single purpose, others can accomplish a variety of tasks with different levels of autonomy.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
16 |
+
page_content=' Measuring robot autonomy is an important and ever evolving concept and existing meth- ods for evaluating robot autonomy can be categorized into two main families: contextual and non-contextual.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
17 |
+
page_content=' While the former methods consider mission and task-specific measures (e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
18 |
+
page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
19 |
+
page_content=', ALFUS [1], ACL [2]), the latter only rely on implicit system capabilities and do not consider the mission and environment features (e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
20 |
+
page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
21 |
+
page_content=', NCAP [3], [4]).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
22 |
+
page_content=' Our study in this paper focuses on evaluating the contextual autonomy for small Unmanned Aerial Systems (sUAS).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
23 |
+
page_content=' Exist- ing methods such as ALFUS [1] and MPP [5] share a similar shortcoming in that neither provides a simple implementation for use with real-world systems.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
24 |
+
page_content=' Another drawback of existing methods that our approach addresses is the lack of a consistent process for breaking down tasks into sub-tasks and combining scores calculated for sub-tasks into a unified score for the given task.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
25 |
+
page_content=' In this paper we propose a method for evaluating the contextual autonomy of sUAS based on a fuzzy interface that allows the operator to design and modify the evaluation system using linguistic reasoning.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
26 |
+
page_content=' We designed four indoor tasks (endurance time, navigation, takeoff/land, and room clearing) and tested our interface in various experiments with seven different sUAS.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
27 |
+
page_content=' Our results show that the proposed approach calculates a contextual autonomy score that can be used to rank the systems for each context.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
28 |
+
page_content=' II.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
29 |
+
page_content=' RELATED WORK Some of the first and more simplistic methods of categoriz- ing autonomous systems are the Levels of Automation (LOA) proposed by Sheridan [6] and its later expansion [7].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
30 |
+
page_content=' LOA defines automation as “the full or partial replacement of a function previously carried out by the human operator” in a 1 to 10 range;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
31 |
+
page_content=' 1 being full control by the human and 10 being full control by the computer.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
32 |
+
page_content=' LOA does not accurately describe how outside factors can affect the autonomous capability of a system.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
33 |
+
page_content=' While it could theoretically be applied to a robot, it would not be accurate as it fails to accommodate for differing degrees of difficulty in tasks, and environmental factors.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
34 |
+
page_content=' Another evaluation method is known as the Autonomy Control Levels (ACL) [2].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
35 |
+
page_content=' ACL is designed for Unmanned Aerial Vehicles (UAV), and operates on a similar basis of uti- lizing autonomy levels from 0-10, with 0 being fully remotely controlled by a pilot, and 10 being a human-like system.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
36 |
+
page_content=' These levels closely resemble the 10 LOA, following the same concept.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
37 |
+
page_content=' The ACL characterizes each system according to four metrics, which attempt to categorize different areas of autonomous behaviors for the system.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
38 |
+
page_content=' In each of these, an autonomy level from 0-10 is given based upon these behaviors.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
39 |
+
page_content=' This system has a similar drawback, in that it does not account for difficulties in the mission itself.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
40 |
+
page_content=' Another method is the Autonomy and Technological Readi- ness Assessment (ATRA) [8].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
41 |
+
page_content=' ATRA attempts to combine both the basic theory behind the Autonomy Level, and the Tech- nology Readiness Level (TRL) metric into one framework [8].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
42 |
+
page_content=' TRL utilizes these two metrics in an attempt to evaluate the autonomy level provided by different technologies onboard the UAS.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
43 |
+
page_content=' This is emphasized as a solution for the gap between existing theoretical work and technological advances in the UAS autonomy space.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
44 |
+
page_content=' Autonomy Levels for Unmanned Systems (ALFUS) is a method for defining the autonomy of a system in terms of three different axes [9].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
45 |
+
page_content=' ALFUS has a strong theoretical basis, but somewhat impractical in the real-world implementation due to the lack of maturity in some of these systems, as well arXiv:2301.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
46 |
+
page_content='02603v1 [cs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
47 |
+
page_content='RO] 6 Jan 2023 as the inability of most, if not all, available systems to reach the upper levels of the three axes.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
48 |
+
page_content=' The three axes mentioned are known as the Mission Com- plexity (MC), Environmental Complexity (EC), and Human Independence (HI) axes.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
49 |
+
page_content=' Each one of these axes pertains itself to a different aspect of the contextual autonomy of a system.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
50 |
+
page_content=' The MC axis pertains mostly towards the difficulty of the tasks and movements required of the system to complete the task (e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
51 |
+
page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
52 |
+
page_content=' maneuvers, speed, searching).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
53 |
+
page_content=' Alternatively, the EC axis concerns itself with the difficulty in the performance of the task caused by environmental factors (e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
54 |
+
page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
55 |
+
page_content=' Lighting, Obstacles, Enclosed Spaces).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
56 |
+
page_content=' Lastly, the HI axis is representative of the level of independence between the user and the system (e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
57 |
+
page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
58 |
+
page_content=' task planning, task execution).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
59 |
+
page_content=' Due to the ability to split the representation of a system’s autonomy into these three axes, it allows for the character- ization and evaluation of system’s autonomy in real world tests, including the impact that both the environment and the mission profile can have on the system’s autonomy.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
60 |
+
page_content=' Our work in this paper is based off many of the ideas put forward through ALFUS, and we utilize it as a foundational part of our contextual autonomy evaluation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
61 |
+
page_content=' The Mission Performance Potential is proposed as a method for the evaluation of a unmanned system’s autonomous per- formance, as well as a predictor for future missions [5].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
62 |
+
page_content=' This method provides a metric which represents the max- imum performance of a system in a given mission at a given autonomy level.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
63 |
+
page_content=' Uniquely, this method includes both non-contextual autonomy metrics, and contextual autonomy metrics, and provides a single output prediction based on both types of data.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
64 |
+
page_content=' One of the drawbacks of MPP is that it only provides a prediction of the performance of a system at a specified autonomy level for a specified mission.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
65 |
+
page_content=' In other words, this does not evaluate how a real system performs, but rather the maximum potential for a system to perform.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
66 |
+
page_content=' Our approach instead calculated the actual autonomy of a system based on actual data from real-world experiments.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
67 |
+
page_content=' Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
68 |
+
page_content=' 1: Our cascaded Fuzzy Inference System used for calcu- lating a contextual autonomy score for a performed task.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
69 |
+
page_content=' III.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
70 |
+
page_content=' FRAMEWORK ALFUS’ summary model works with a set of metrics for each of its three axes, as well as a system of levels from 0 to 10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
71 |
+
page_content=' These levels are based upon possible answers from those metrics, to provide a level evaluation of a system.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
72 |
+
page_content=' As a generic framework, ALFUS tends to have a very broad, and somewhat open to interpretation, definition of metrics.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
73 |
+
page_content=' For instance, in the case of the EC axis, it ranges from a “simple environment,” to an “extreme environment.” However, the summary model describes the system in terms of an autonomy level for each axis, while the Contextual Autonomy Capability within ALFUS provides an actual score for each axis.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
74 |
+
page_content=' Due to the autonomy level evaluation, there is some ambiguity when characterizing systems.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
75 |
+
page_content=' This is one of the main concerns with ALFUS, in that while it does provide a strong theoretical background, the actual implementation of the ideas with real-world systems is not as clear.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
76 |
+
page_content=' We utilize Takagi-Sugeno Fuzzy Inference Systems (FIS) as a means to combine different metrics in an evaluation of an sUAS which is both easy to use, and allows us to use some data which is either not easily defined numerically, or inherently qualitative about the environment, combined with standard quantitative metrics.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
77 |
+
page_content=' Fuzzy inferences also allow for slight deviations in a metric to not cause a drastic change in the evaluation of that sUAS.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
78 |
+
page_content=' We designed a set of tests with various mission and environment complexity levels (see Section V), and defined a fuzzy inference system for each test.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
79 |
+
page_content=' Unlike MPP [5], our fuzzy inference systems are based on the three-axis model used in ALFUS, by creating an individual FIS for metrics associated with each axis (i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
80 |
+
page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
81 |
+
page_content=', MC, EC, HI), and an additional FIS which combines these three outputs into a single score.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
82 |
+
page_content=' This structure representing a cascaded FIS (cFIS) is illustrated in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
83 |
+
page_content=' 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
84 |
+
page_content=' For each test, the outcome of the FIS for all three axis is fed into a combining FIS that produces a final autonomy score.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
85 |
+
page_content=' Each FIS in our cFIS is a Sugeno-type FIS with multiple inputs and one output.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
86 |
+
page_content=' For each input of an FIS, we consider three membership functions (MFs) labeled as low, medium, and high.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
87 |
+
page_content=' Without loss of generality, we used triangular MFs, however, other types of MF can be used.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
88 |
+
page_content=' The input variables used in different tests and their corresponding MF parameters have been reported in Table II.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
89 |
+
page_content=' The output of each Sugeno-type FIS has five singleton MFs (i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
90 |
+
page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
91 |
+
page_content=', constant): very bad, bad, medium, good, very good.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
92 |
+
page_content=' Our FIS’ use a triangular fuzzifier and a Sugeno defuzzifier (i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
93 |
+
page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
94 |
+
page_content=', weighted average output).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
95 |
+
page_content=' For each FIS, we defined a rule base (i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
96 |
+
page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
97 |
+
page_content=', a set of linguistic rules).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
98 |
+
page_content=' In the cFIS structure in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
99 |
+
page_content=' 1, the defuzzified output of each FIS is a value in the range of [0, 1].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
100 |
+
page_content=' For the initial three FIS, 0 and 1 represent the lowest and highest complexity, respectively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
101 |
+
page_content=' In the case of the final FIS, 0 and 1 represent the lowest and the highest autonomy, respectively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
102 |
+
page_content=' If we define the singleton value of each output function as zi, and the degree to which each output is weighted based upon the ruleset as wi, then the output final score can be calculated as follows: s = �N i=1 wizi �N i=1 wi (1) where N represents the number of rules in the rule base.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
103 |
+
page_content=' Table I reports an example of the fuzzy ruleset we used.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
104 |
+
page_content=' The advantage of this system is that we can utilize many different Human Independence FIS Environmental Output Input Data Complexity TestFIS Score FIS Mission Complexity FISFig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
105 |
+
page_content=' 2: From left to right, top to bottom: Cleo Robotics Dronut, Flyability Elios 2, Lumenier Nighthawk 3, Parrot ANAFI USA GOV, Skydio X2D, Teal Drones Golden Eagle, Vantage Robotics Vesper types of data, and clearly define the ranges for each value, allowing the pilots performing the tests to provide feedback on the membership functions and rulesets.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
106 |
+
page_content=' Mission Complexity Axis Low Medium High Environment Complexity Axis Low Very Bad Bad Medium Medium Bad Medium Good High Medium Good Very good TABLE I: Fuzzy Ruleset utilized in our final combinational FIS IV.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
107 |
+
page_content=' UAS PLATFORMS Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
108 |
+
page_content=' 2 illustrates seven sUAS platforms evaluated in our ex- periments.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
109 |
+
page_content=' The platforms include: the Cleo Robotics Dronut1, Flyability Elios 22, Lumenier Nighthawk 33, Parrot ANAFI USA GOV4, Skydio X2D5, Teal Drones Golden Eagle6, and Vantage Robotics Vesper7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
110 |
+
page_content=' These platforms provide a wide ranging set of capabilities and use cases.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
111 |
+
page_content=' For instance, Parrot, Skydio X2D, Golden Eagle, and Vesper were developed for outdoor reconnaissance, whereas the Dronut and Elios 2 were developed for indoor reconnaissance and inspection, specif- ically in urban and industrial environments.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
112 |
+
page_content=' Previously, we have used the same set of sUAS for a non-contextual bench- marking [4], [10].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
113 |
+
page_content=' In our evaluations, we have anonymized the data by assigning the platforms labels A through G without any specific ordering or correlation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
114 |
+
page_content=' V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
115 |
+
page_content=' TEST DESIGN To evaluate the contextual autonomy of our platforms, we have designed several tests across a spectrum of areas.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
116 |
+
page_content=' The variables for which we collected data for each test is reported in Table II.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
117 |
+
page_content=' In this section, we describe each test briefly.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
118 |
+
page_content=' As shown in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
119 |
+
page_content=' 3 all tests have been designed for indoor environments.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
120 |
+
page_content=' 1https://cleorobotics.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
121 |
+
page_content='com/ 2https://www.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
122 |
+
page_content='flyability.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
123 |
+
page_content='com/elios-2 3https://www.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
124 |
+
page_content='lumenier.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
125 |
+
page_content='com/ 4https://www.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
126 |
+
page_content='parrot.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
127 |
+
page_content='com/us/drones/anafi 5https://www.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
128 |
+
page_content='skydio.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
129 |
+
page_content='com/skydio-x2 6https://tealdrones.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
130 |
+
page_content='com/suas-golden-eagle/ 7https://vantagerobotics.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
131 |
+
page_content='com/vesper/ A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
132 |
+
page_content=' Runtime Endurance This family of tests focuses on the battery life of the system in various operational profiles.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
133 |
+
page_content=' As shown in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
134 |
+
page_content=' 3a, the specific test we use from this group focuses on the system flying continuously in a figure-8 pattern.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
135 |
+
page_content=' The main performance metric for the test is the test duration.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
136 |
+
page_content=' B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
137 |
+
page_content=' Navigation We have designed two main types of navigation tests, each with several profiles defined based on the type of movement (horizontal, vertical, or both) and the type of confinement (horizontal, vertical, or both).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
138 |
+
page_content=' As shown in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
139 |
+
page_content=' 3b, navigation through confined spaces involves traversal into and out of a continuously confined space, with tests for hallway, tunnel, stairwell, and shaft.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
140 |
+
page_content=' Navigation through apertures involves transient traversal through an opening, with tests for doorway and window.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
141 |
+
page_content=' Each navigation environment is characterized according to the dimensions of the confined space or aperture, lighting, surface textures, and the presence of obstructions on either side of the confined space or aperture.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
142 |
+
page_content=' The main metrics of performance are efficacy and average navigation time.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
143 |
+
page_content=' C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
144 |
+
page_content=' Room Clearing In this test method, the system performs a visual inspection of an example room whose walls, floor, and ceiling are out- fitted with visual acuity targets which contain nested Landolt C symbols of decreasing size.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
145 |
+
page_content=' As shown in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
146 |
+
page_content=' 3c, the test was performed under two conditions: with and without using camera zoom.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
147 |
+
page_content=' The main performance metrics are duration, coverage, and average acuity.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
148 |
+
page_content=' D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
149 |
+
page_content=' Takeoff and Land/Perch As illustrated in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
150 |
+
page_content=' 3d, these tests evaluate the system’s ability to takeoff and land or perch in various environments that may be affected by stabilization issues or preventative safety checks from the system.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
151 |
+
page_content=' The conditions tested vary the angle of the ground plane (flat, 5° and 10° pitch and roll) and the presence of obstructions (1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
152 |
+
page_content='2-2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
153 |
+
page_content='4m overhead, 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
154 |
+
page_content='6-1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
155 |
+
page_content='2m lateral).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
156 |
+
page_content=' The main performance metric is efficacy.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
157 |
+
page_content=' VI.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
158 |
+
page_content=' RESULTS Utilizing our framework outlined in Section III, we calculate a performance score for each sUAS based upon the conditions and performance metrics detailed below.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
159 |
+
page_content=' As mentioned above, our system provides a single score for each of the three attributes, the EC, MC and HI axes, and utilizes those scores to provide a single score for the entire test.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
160 |
+
page_content=' It should be noted that although we consider all three axes in our cFIS structure, due to lack of data, we consider the lowest level (i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
161 |
+
page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
162 |
+
page_content=', full tele-operation) for the HI axis across all tests.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
163 |
+
page_content=' The test-specific details of the structure is discussed in corresponding sections.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
164 |
+
page_content=' Another factor to note is that for some of these experiments, some sUAS were not available at the time of testing, due to the sUAS being repaired, or other circumstances.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
165 |
+
page_content=' In this case, we attempt to remedy this by calculating a partial point achieved by the sUAS.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
166 |
+
page_content=' For situations where data for an entire test is (a) Runtime Endurance test showing a system performing a specified movement (b) Navigation tests (left to right, top to bottom): hallway, tunnel, stairwell, shaft, door, window.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
167 |
+
page_content=' (c) Room clearing test showing a system inspecting surfaces for visual acuity targets.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
168 |
+
page_content=' (d) Takeoff and land/perch tests showing variations in ground plane angle (top row) and nearby obstructions (bottom row).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
169 |
+
page_content=' Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
170 |
+
page_content=' 3: Tests designed for the evaluation of sUAS contextual autonomy.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
171 |
+
page_content=' missing, we cannot fully evaluate the sUAS.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
172 |
+
page_content=' However, we have evaluated sUAS for individual tests for which the data was recorded.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
173 |
+
page_content=' Despite these edge cases, most sUAS had available data, which was used in our evaluations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
174 |
+
page_content=' As mentioned before, the proposed structure in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
175 |
+
page_content=' 1, was adapted to each specific test.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
176 |
+
page_content=' The resulting cascaded FIS are depicted in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
177 |
+
page_content=' 6 each of which represents a cFIS for a specific test.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
178 |
+
page_content=' More specifically, each sub-figure shows the inputs and outputs of each cFIS, as well as how the FIS modules are connected.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
179 |
+
page_content=' This is meant to provide a visual aid, which can be useful to keep track of each FIS, as we discuss the results.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
180 |
+
page_content=' Associated membership functions for each input, and the outputs, can be found in Table II.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
181 |
+
page_content=' Some of the FIS surfaces, which show the relationship between two input values in an FIS, and the corresponding output value, are shown in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
182 |
+
page_content=' 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
183 |
+
page_content=' Additionally, numerical results are reported in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
184 |
+
page_content='5 and Table III.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
185 |
+
page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
186 |
+
page_content=' Test Results Runtime Endurance: The runtime endurance test is likely the simplest of the tests performed, however, it is still a useful test in gauging how a sUAS might perform in a real mission.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
187 |
+
page_content=' Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
188 |
+
page_content=' 3a illustrates the runtime endurance test design including the navigation path and two stands.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
189 |
+
page_content=' The adapted cFIS for this test is shown in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
190 |
+
page_content=' 6a with four inputs: number of obstructions, number of crashes, light level and speed.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
191 |
+
page_content=' Despite the simplicity of this test, some sUAS did not performed well largely due to slow speed.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
192 |
+
page_content=' Our results indicate that some sUAS may have trouble in portions of this real- world mission which requires both speed and maneuverability.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
193 |
+
page_content=' (a) Final FIS Surface (b) Through Aperture test EC (c) Takeoff and Land/Perch EC (d) Through Corridor MC Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
194 |
+
page_content=' 4: FIS surfaces for different tests.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
195 |
+
page_content=' In should be noted that during this test only four sUAS were available.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
196 |
+
page_content=' Navigation: In the navigation tests, due to the differences between the through corridor and through apertures tests, two slightly different cascaded FIS were designed.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
197 |
+
page_content=' These can be found in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
198 |
+
page_content=' 6b and Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
199 |
+
page_content=' 6d.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
200 |
+
page_content=' The input to the through corri- dors cFIS includes area (cross section), light level, verticality, coverage, number of crashes, and duration.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
201 |
+
page_content=' The inputs to the through apertures cFIS include area, light level, number of 10 degrees 10 degrees 5 degrees 5degree 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
202 |
+
page_content='2 mCutput_Score 10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
203 |
+
page_content='5 0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
204 |
+
page_content='5 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
205 |
+
page_content='5 MC 0 ECOutput_Score 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
206 |
+
page_content='6 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
207 |
+
page_content='4 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
208 |
+
page_content='2 0: 0 2 200 400 4 600 Area Light0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
209 |
+
page_content='7 10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
210 |
+
page_content='5 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
211 |
+
page_content='3 10 10 5 5 Pitch 0 RollOutput_Score 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
212 |
+
page_content='5 00 2 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
213 |
+
page_content='5 Crashes 3 CompletionXVariables Description MFs: Triangular{Low, Medium, High} Area Aperture/Hallway Cross-Section (m2) [0, 0, 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
214 |
+
page_content='7] [0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
215 |
+
page_content='6, 3, 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
216 |
+
page_content='4] [3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
217 |
+
page_content='3, 6, 6] Light Ambient Light Level (Lux) [0, 0, 337.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
218 |
+
page_content='5] [75, 375, 675] [412.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
219 |
+
page_content='5, 750, 750] Vert Verticality (°) [0, 0, 37.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
220 |
+
page_content='5] [7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
221 |
+
page_content='5, 45, 82.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
222 |
+
page_content='5] [52.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
223 |
+
page_content='5, 90, 90] Crash Number of Crashes [0, 0, 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
224 |
+
page_content='25] [0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
225 |
+
page_content='5, 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
226 |
+
page_content='5, 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
227 |
+
page_content='5] [1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
228 |
+
page_content='75, 3, 3] Rollovers Number of Rollovers [0, 0, 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
229 |
+
page_content='25] [0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
230 |
+
page_content='5, 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
231 |
+
page_content='5, 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
232 |
+
page_content='5] [1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
233 |
+
page_content='75, 3, 3] Comp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
234 |
+
page_content=' % Completion Percentage [0, 0, 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
235 |
+
page_content='55] [0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
236 |
+
page_content='15, 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
237 |
+
page_content='6, 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
238 |
+
page_content='92] [0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
239 |
+
page_content='7, 1, 1] Yaw/Pitch Static Yaw/Pitch Angle (°) [0, 0, 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
240 |
+
page_content='17] [0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
241 |
+
page_content='83, 5, 9.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
242 |
+
page_content='12] [5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
243 |
+
page_content='83, 10, 10] VR Static Vertical Obstruction (m) [0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
244 |
+
page_content='6, 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
245 |
+
page_content='6, 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
246 |
+
page_content='1] [0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
247 |
+
page_content='7, 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
248 |
+
page_content='2, 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
249 |
+
page_content='7] [1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
250 |
+
page_content='3, 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
251 |
+
page_content='8, 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
252 |
+
page_content='8] LR Static Lateral Obstruction (m) [1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
253 |
+
page_content='2, 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
254 |
+
page_content='2, 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
255 |
+
page_content='2] [1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
256 |
+
page_content='4, 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
257 |
+
page_content='4, 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
258 |
+
page_content='4] [2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
259 |
+
page_content='6, 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
260 |
+
page_content='6, 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
261 |
+
page_content='6] Coverage Coverage Percentage [0, 0, 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
262 |
+
page_content='55] [0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
263 |
+
page_content='15, 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
264 |
+
page_content='6, 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
265 |
+
page_content='92] [0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
266 |
+
page_content='7, 1, 1] Cs Detected Landolt C Depth Detected [0, 0, 50] [10, 50, 90] [50, 100, 100] Duration Duration of Test (Minutes) [2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
267 |
+
page_content='5, 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
268 |
+
page_content='5, 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
269 |
+
page_content='25] [3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
270 |
+
page_content='05, 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
271 |
+
page_content='25, 7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
272 |
+
page_content='45] [5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
273 |
+
page_content='25, 8, 8] Obs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
274 |
+
page_content=' Number of Obstructions [0, 0, 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
275 |
+
page_content='5] [1, 3, 5] [3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
276 |
+
page_content='5, 6, 6] Output Variable Description Sugeno MFs: Constant {Very Low to Very High} Score Combined Defuzzified Score [0, 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
277 |
+
page_content='25, 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
278 |
+
page_content='5, 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
279 |
+
page_content='75, 1] TABLE II: Membership Functions (MFs) for each input and output variable used in an FIS in the evaluation of these sUAS.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
280 |
+
page_content=' Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
281 |
+
page_content=' 5: Scores for each sUAS as a percentage of the maximum score possible on the y-axis, with each test on the x-axis crashes, and completion percentage.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
282 |
+
page_content=' As shown above in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
283 |
+
page_content=' 5, each sUAS that performed the through apertures test, achieved a maximum score, besides sUAS G, which performed slightly worse, due to both issues in correctly traversing the aperture, as well as being the only sUAS to suffer a crash during the test.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
284 |
+
page_content=' Next, for the through corridors test, As shown in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
285 |
+
page_content=' 5, there is more variance in the performance between each sUAS, with UAS A performing the best, and UAS E performing the worst, even though sUAS E tied for best in through apertures.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
286 |
+
page_content=' This is important, as there is more room for error while traversing corridors, than there is traversing an aperture.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
287 |
+
page_content=' Takeoff and Land/Perch: For the takeoff and land/perch test, the cFIS diagram can be found in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
288 |
+
page_content=' 6e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
289 |
+
page_content=' The inputs include pitch, yaw, number of crashes, completion percentage, vertical and lateral obstruction, and number of rollovers.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
290 |
+
page_content=' As can be seen in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
291 |
+
page_content=' 5 and Table III, sUAS A and sUAS G perform best across both sections of the test and thus provide the highest level of autonomy.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
292 |
+
page_content=' Likewise, sUAS B performs the worst in both portions of the test, showcasing a lower level of autonomy, compared to the other sUAS.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
293 |
+
page_content=' This evaluation allows for the characterization of how an sUAS may perform during portions of a mission which requires the system to takeoff or land in a specified spot, of varying difficulty.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
294 |
+
page_content=' Room Clearing: Since the room clearing test is done in a static environment, we included a time constraint in our testing making the evaluation to focus on the performance of the sUAS in regards to the Mission Complexity axis.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
295 |
+
page_content=' The designed cFIS can be seen in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
296 |
+
page_content=' 6c.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
297 |
+
page_content=' Inputs include light level, number of obstructions, number of crashes, duration, coverage, and landolt C depth detected.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
298 |
+
page_content=' Results are found in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
299 |
+
page_content=' 5, and Table III.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
300 |
+
page_content=' In this test, the strongest performer was UAS E;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
301 |
+
page_content=' however, most of the UAS performed closely to each other.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
302 |
+
page_content=' Surprisingly, a strong performance in the runtime endurance test did not necessarily correlate to a strong performance in this test.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
303 |
+
page_content=' Both of these tests require a system with good maneu- verability capabilities, but this test also requires a controller which allows the user to visually identify different landmarks.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
304 |
+
page_content=' B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
305 |
+
page_content=' Final Results UAS T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
306 |
+
page_content='C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
307 |
+
page_content=' T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
308 |
+
page_content='A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
309 |
+
page_content=' Takeoff Land R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
310 |
+
page_content='E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
311 |
+
page_content=' R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
312 |
+
page_content='C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
313 |
+
page_content=' Predictive Score A 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
314 |
+
page_content='0 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
315 |
+
page_content='0 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
316 |
+
page_content='0 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
317 |
+
page_content='0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
318 |
+
page_content='5 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
319 |
+
page_content='76 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
320 |
+
page_content='85 B 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
321 |
+
page_content='90 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
322 |
+
page_content='0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
323 |
+
page_content='71 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
324 |
+
page_content='87 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
325 |
+
page_content='76 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
326 |
+
page_content='73 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
327 |
+
page_content='82 C 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
328 |
+
page_content='84 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
329 |
+
page_content='0 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
330 |
+
page_content='0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
331 |
+
page_content='87 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
332 |
+
page_content='92 D 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
333 |
+
page_content='75 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
334 |
+
page_content='97 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
335 |
+
page_content='65 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
336 |
+
page_content='75 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
337 |
+
page_content='77 E 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
338 |
+
page_content='80 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
339 |
+
page_content='0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
340 |
+
page_content='82 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
341 |
+
page_content='89 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
342 |
+
page_content='85 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
343 |
+
page_content='87 F 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
344 |
+
page_content='99 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
345 |
+
page_content='91 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
346 |
+
page_content='95 G 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
347 |
+
page_content='83 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
348 |
+
page_content='83 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
349 |
+
page_content='0 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
350 |
+
page_content='0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
351 |
+
page_content='5 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
352 |
+
page_content='79 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
353 |
+
page_content='80 TABLE III: Scores of each sUAS for each test, as well as a weighted multiple which allows for an overall evaluation of each sUAS Contextual autonomy evaluations are concerned with the performance of a system within an environment while per- forming a specific task with a known level of complexity.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
354 |
+
page_content=' However, calculating an overall score that represents an av- erage autonomy for a given system in a spectrum of tests and environment is desirable.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
355 |
+
page_content=' To combine the test scores into a single score, we utilize a weighted product, with equal weightings for each test, as we did previously in our non- contextual evaluation [4].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
356 |
+
page_content=' The weighted product represented as P = M � i φwi i , (2) where M is the number of individual tests, φi represents an individual test score, and wi the weight assigned to that test.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
357 |
+
page_content=' 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
358 |
+
page_content='0 T T 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
359 |
+
page_content='9 UASA 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
360 |
+
page_content='8 - UAS B UAS C 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
361 |
+
page_content='7 - UAS D UAS E 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
362 |
+
page_content='6 UAS F UAS G 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
363 |
+
page_content='5 T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
364 |
+
page_content='C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
365 |
+
page_content=' T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
366 |
+
page_content='A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
367 |
+
page_content=' R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
368 |
+
page_content='E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
369 |
+
page_content=' R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
370 |
+
page_content='C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
371 |
+
page_content=' Takeoff Land(a) Runtime Endurance (R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
372 |
+
page_content='E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
373 |
+
page_content=') test FIS (b) Through Apertures (T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
374 |
+
page_content='A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
375 |
+
page_content=') test FIS (c) Room Clearing (R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
376 |
+
page_content='C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
377 |
+
page_content=') test FIS (d) Through Corridors (T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
378 |
+
page_content='C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
379 |
+
page_content=') test FIS (e) Takeoff and Land/Perch test FIS Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
380 |
+
page_content=' 6: Diagrams of each system of cascaded FIS utilized to calculate scores for each test has several benefits including that different test results can be combined without requiring normalization or scaling.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
381 |
+
page_content=' The results for each sUAS are shown in Table III.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
382 |
+
page_content=' It is important to note that many of the sUAS perform better than the others in some tests, but worse in others.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
383 |
+
page_content=' One example of this is UAS A, which has the fourth highest weighted multiple (overall score), while performing the best in four out of six tests.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
384 |
+
page_content=' This is due to the sUAS’s relatively poor performance in both the runtime endurance test, as well as in the room clearing test.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
385 |
+
page_content=' The use case of a singular score like this presents itself when a user would like to know which sUAS is likely to provide the most overall autonomy, across multiple tests and different environment.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
386 |
+
page_content=' VII.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
387 |
+
page_content=' CONCLUSIONS AND DISCUSSIONS In this paper, we proposed a framework for evaluation of contextual autonomy for robotic systems.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
388 |
+
page_content=' Our framework con- sists of a cascaded Fuzzy Inference System (cFIS) that com- bines test results over three axes of evaluation (mission com- plexity, environment complexity and human independence) introduced by the ALFUS framework.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
389 |
+
page_content=' We have designed four tests with different mission complexity and environment complexity levels and performed several experiments with several sUAS, and we have shown that our modular framework is adaptable to different tests.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
390 |
+
page_content=' For future work, we plan to extend our framework for performance evaluation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
391 |
+
page_content=' To achieve this, a desired mission can be decomposed into base tasks, such as takeoff/landing, traversing through environ- ments/apertures, clearing rooms, and general maneuverability.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
392 |
+
page_content=' The user then can define a set of weights and calculate a potential performance score of a sUAS for the target mission.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
393 |
+
page_content=' Unlike MPP [5], however, we suggest a method which is based upon performance in set tasks, rather than a combination of non-contextual attributes, and environmental factors.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
394 |
+
page_content=' ACKNOWLEDGMENT This work is sponsored by the Department of the Army, U.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
395 |
+
page_content='S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
396 |
+
page_content=' Army Combat Capabilities Development Command Soldier Center, award number W911QY-18-2-0006.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
397 |
+
page_content=' Approved for public release #PR2022 88282 REFERENCES [1] P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
398 |
+
page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
399 |
+
page_content=' Durst and W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
400 |
+
page_content=' Gray, “Levels of autonomy and autonomous system performance assessment for intelligent unmanned systems,” Engineer- ing research and development center Vicksburg Ms Geotechnical and Structures lab, Tech.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
401 |
+
page_content=' Rep.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
402 |
+
page_content=', 2014.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
403 |
+
page_content=' [2] B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
404 |
+
page_content=' T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
405 |
+
page_content=' Clought, “Metrics, schmetrics!' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
406 |
+
page_content=' how the heck do you determine a uav’s autonomy anyway?”' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
407 |
+
page_content=' Air Force Research Laboratory, Wright- Pattterson Air Force Base, OH, Tech.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
408 |
+
page_content=' Rep.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
409 |
+
page_content=', August 2002.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
410 |
+
page_content=' [3] P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
411 |
+
page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
412 |
+
page_content=' Durst, W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
413 |
+
page_content=' Gray, and M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
414 |
+
page_content=' Trentini, “A non-contextual model for evaluating the autonomy level of intelligent unmanned ground vehicles,” in Proceedings of the 2011 Ground Vehicle Systems Engineering and Technology Symposium, 2011.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
415 |
+
page_content=' [4] B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
416 |
+
page_content=' Hertel, R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
417 |
+
page_content=' Donald, C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
418 |
+
page_content=' Dumas, and S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
419 |
+
page_content=' R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
420 |
+
page_content=' Ahmadzadeh, “Methods for combining and representing non-contextual autonomy scores for unmanned aerial systems,” International Conference on Automation, Robotics, and Applications (ICARA), vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
421 |
+
page_content=' 8th, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
422 |
+
page_content=' 145–149, 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
423 |
+
page_content=' [5] P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
424 |
+
page_content=' Durst, W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
425 |
+
page_content=' Gray, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
426 |
+
page_content=' Nikitenko, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
427 |
+
page_content=' Caetano, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
428 |
+
page_content=' Trentini, and R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
429 |
+
page_content=' King, “A framework for predicting the mission-specific performance of au- tonomous unmanned systems,” International Conference on Intelligent Robots and Systems, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
430 |
+
page_content=' 1962–1969, 2014.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
431 |
+
page_content=' [6] T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
432 |
+
page_content=' B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
433 |
+
page_content=' Sheridan, “Automation, authority, and angst – revisited,” vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
434 |
+
page_content=' 35, September 1991, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
435 |
+
page_content=' 2–6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
436 |
+
page_content=' [7] R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
437 |
+
page_content=' Parasuraman, T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
438 |
+
page_content=' B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
439 |
+
page_content=' Sheridan, and C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
440 |
+
page_content=' D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
441 |
+
page_content=' Wickens, “A model for types and levels of human interaction with automation,” IEEE Transactions on Systems, Man, and Cybernetics–Part A: Systems and Humans, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
442 |
+
page_content=' 30, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
443 |
+
page_content=' 286–297, May 2000.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
444 |
+
page_content=' [8] F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
445 |
+
page_content=' Kendoul, “Towards a unified framework for uas autonomy and technology readiness assessment (ATRA),” pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
446 |
+
page_content=' 55–71, 2 2013.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
447 |
+
page_content=' [9] H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
448 |
+
page_content='-M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
449 |
+
page_content=' Huang, “Autonomy levels for unmanned systems framework;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
450 |
+
page_content=' volume II: Framework models,” NIST Special Publication: Gaithersburg, MD, USA, p.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
451 |
+
page_content=' 30, 2007.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
452 |
+
page_content=' [10] A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
453 |
+
page_content=' Norton, R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
454 |
+
page_content=' Ahmadzadeh, K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
455 |
+
page_content=' Jerath, P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
456 |
+
page_content=' Robinette, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
457 |
+
page_content=' Weitzen, T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
458 |
+
page_content=' Wick- ramarathne, H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
459 |
+
page_content=' Yanco, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
460 |
+
page_content=' Choi, R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
461 |
+
page_content=' Donald, B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
462 |
+
page_content=' Donoghue et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
463 |
+
page_content=', “Decisive test methods handbook: Test methods for evaluating suas in subterranean and constrained indoor environments, version 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
464 |
+
page_content='1,” arXiv preprint arXiv:2211.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
465 |
+
page_content='01801, 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
466 |
+
page_content=' Obs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
467 |
+
page_content=' Crashes Environmental Mission Complexity Complexity Light FIS FIS Level Speed Output Test FIS ScoreArea Crashes Environmental Mission Complexity Complexity Light FIS FIS Level Comp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
468 |
+
page_content=' % Output Test FIS ScoreCoverage Cs Detected Crashes Light Environmental Mission Complexity Complexity Duration FIS FIS Ohs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
469 |
+
page_content=' Output Test FIS ScoreArea Crashes Environmental Mission Complexity Complexity Light FIS FIS Level Comp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
470 |
+
page_content=' % Vert.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
471 |
+
page_content=' Output Test FIS ScoreCrashes Pitch Rollovers Yaw Environmental Mission Complexity Complexity Comp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
472 |
+
page_content=' % LR FIS FIS VR Output Test FIS Score' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
|
29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:238c05bb2c4b5485a5f500f588390d0817b53181b533408dbfcb13c9e1d04508
|
3 |
+
size 527104
|
29AzT4oBgHgl3EQfDvqc/vector_store/index.pkl
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:8ecd74529d870b2367ff9a5aa8df7c2a57912aa5bca73da56692521e7e2dd52c
|
3 |
+
size 143232
|
2NE2T4oBgHgl3EQfNgYt/content/2301.03737v1.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:4103581a037c7825836bea52df9fbccfd229c6fbdbcf089bbb1a8caaa267586c
|
3 |
+
size 270782
|
2NE2T4oBgHgl3EQfNgYt/vector_store/index.pkl
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:b28febea000be515d180a54ee7212f77a65c87eebc4836b4e9189689c14af45e
|
3 |
+
size 213808
|
2dAzT4oBgHgl3EQfRvud/vector_store/index.faiss
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:3df5c19b0a455eb3d58af2620d196e255a176c2a521091c1f251d36d6e469671
|
3 |
+
size 8388653
|
2tE2T4oBgHgl3EQfNgbv/content/tmp_files/2301.03739v1.pdf.txt
ADDED
@@ -0,0 +1,850 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
Dowker Complexes and filtrations on self-relations
|
2 |
+
Dominic Desjardins Côté
|
3 |
+
January 11, 2023
|
4 |
+
Abstract
|
5 |
+
Given a relation on X × Y , we can construct two abstract simplicial complexes
|
6 |
+
called Dowker complexes.
|
7 |
+
The geometric realizations of these simplicial complexes
|
8 |
+
are homotopically equivalent. We show that if two relations are conjugate, then they
|
9 |
+
have homotopically equivalent Dowker complexes. From a self-relation on X, this is a
|
10 |
+
directed graph, and we use the Dowker complexes to study their properties. We show
|
11 |
+
that if two relations are shift equivalent, then, at some power of the relation, their
|
12 |
+
Dowker complexes are homotopically equivalent. Finally, we define a new filtration
|
13 |
+
based on Dowker complexes with different powers of a relation.
|
14 |
+
Keywords :
|
15 |
+
Dowker complex, relation, filtration, graph theory, shift equivalence
|
16 |
+
1
|
17 |
+
Introduction
|
18 |
+
We can use multivalued maps to study dynamical systems [17]. The idea is to use Conley index [7]
|
19 |
+
on upper semi-continuous multivalued maps. In applications, it can be hard to study a dynamical
|
20 |
+
system. We can use a model that seems to fit data, but it can be a challenge to find it. Another way
|
21 |
+
is to discretize the continuous space and use to multivalued maps to approximate the underlying
|
22 |
+
dynamical system [8] [30]. Another approach is to use combinatorial structures. To name a few,
|
23 |
+
we can use combinatorial vector fields from Forman [13] [18] [9]. Moreover, a generalization was
|
24 |
+
proposed by Mrozek called combinatorial multivector fields [23] [25]. Finally, others proposed to
|
25 |
+
use the distributive lattices to compute attractors on finite data [19] [20] [21].
|
26 |
+
Multivalued maps can be restrictive. In [18], authors generalize them to partial multivalued
|
27 |
+
maps. But a partial multivalued map is equivalent to a relation. Some advancements were done
|
28 |
+
in [26] by using the Scymczak category of finite sets where objects are sets and morphisms are
|
29 |
+
relations. The Szymczak category [29] captures the essence of index pairs and index maps [7] which
|
30 |
+
is the core of the theory of Conley index. So one motivation of this paper is to continue to develop
|
31 |
+
the theory of relations, and it can be used to study dynamical system with finite data.
|
32 |
+
Our main object is a relation which is a subset of the cartesian product of two sets X and
|
33 |
+
Y . We can define two different abstract simplicial complexes on a relation. For the first simplicial
|
34 |
+
complex, we fixed a value y ∈ Y . For all elements in X, that they are related to y, they will span a
|
35 |
+
1
|
36 |
+
arXiv:2301.03739v1 [math.CO] 10 Jan 2023
|
37 |
+
|
38 |
+
simplex together. For the second one, we reverse the role. We fixed a value x ∈ X. For all elements
|
39 |
+
in Y , that they are in relation with x, they will span a simplex together. They are called Dowker
|
40 |
+
complexes [10]. An important result is the Dowker’s Theorem. It says that the geometric realization
|
41 |
+
of these Dowker complexes are homotopically equivalent. The Dowker’s Theorem is quite useful in
|
42 |
+
applications. To name a few examples, we can use Dowker complexes to study signal coverage [14],
|
43 |
+
to find errors in relation of programs and files [1], to study the privacy of information [12] and in
|
44 |
+
social studies [3]. For the last one, this method is called Q-analysis which is developed by Atkins
|
45 |
+
[2]. The idea of Q-analysis is to study the q-connectivity and the q-tunnel of the Dowker complexes.
|
46 |
+
Our two main inspirations for definitions come from these articles [24] and [26].
|
47 |
+
They are many contributions in this article.
|
48 |
+
First, conjugate relations have homotopically
|
49 |
+
equivalent Dowker complex. If two relations are shift equivalent with lag l, then at a certain power
|
50 |
+
their Dowker complexes are homotopically equivalent. We can define a filtration on relation based
|
51 |
+
on the Dowker complex at different powers of a finite self-relation. Moreover, this can be computed
|
52 |
+
in finite time. We can also compute the 0th homology of a high enough power with the connected
|
53 |
+
components of the graph induced by the relation.
|
54 |
+
This article goes as follows. In section 2, we remind some concepts and definitions on finite
|
55 |
+
relation, graph, simplicial complex, Dowker complexes and finally the famous Dowker’s Theorem.
|
56 |
+
In section 3, we define right morphism and left morphism. If there exists a right or left morphism
|
57 |
+
between two relations, then there is an inclusion from one of the Dowker complexes. Moreover,
|
58 |
+
we show that if there exists a conjugacy between two relations, then their Dowker complexes are
|
59 |
+
homotopically equivalent. In section 4, we generalize the idea of right and left morphism for mul-
|
60 |
+
tivalued right and multivalued left morphism. We show two important properties needed for the
|
61 |
+
definition of a filtration. The Dowker complex of a certain power of a relation is include in the
|
62 |
+
Dowker complex of the same relation with a higher power. For some finite relations at certain a
|
63 |
+
power j, every other Dowker complexes of the same relation at power higher than j are the same.
|
64 |
+
We call it the stabilization of the Dowker complex. We show that shift equivalence between rela-
|
65 |
+
tions have homotopically equivalent Dowker complex at some power. In section 5, we can define a
|
66 |
+
filtration on the Dowker complexes of different powers of a relation under some simple conditions by
|
67 |
+
using the two properties in section 4. We can use persistent homology on these filtration to extract
|
68 |
+
topological features of the Dowker complex. If a relation is acyclic, then we have that the number
|
69 |
+
of connected components of the graph associated to the relation up to a certain power is equal to
|
70 |
+
the dimension of the 0th homology. It can be generalized to the class of simple relations. We also
|
71 |
+
have a similar result for strongly connected relations.
|
72 |
+
2
|
73 |
+
Preliminaries
|
74 |
+
2.1
|
75 |
+
Finite Relations
|
76 |
+
Let X and Y be finite sets. We define a relation as a subset of X × Y . Let (x, y) ∈ R ⊂ X × Y , we
|
77 |
+
denote by xRy or by y ∈ R(x). We define the composition of relations as follows. Let R1 ⊂ X × Y
|
78 |
+
and R2 ⊂ Y × Z.
|
79 |
+
2
|
80 |
+
|
81 |
+
R2 ◦ R1 := {(x, z) ∈ R2 ◦ R1 | ∃y such that xR1y and yR2z}.
|
82 |
+
(1)
|
83 |
+
We define the inverse relation by swapping the sets of a relation.
|
84 |
+
R−1 := {(y, x) ∈ Y × X | y ∈ R(x)}
|
85 |
+
(2)
|
86 |
+
If a relation is a subset of X × X, then we say it’s a self-relation on X. We define the power of
|
87 |
+
a self-relation as follows :
|
88 |
+
Rn :=
|
89 |
+
�
|
90 |
+
�
|
91 |
+
�
|
92 |
+
�
|
93 |
+
�
|
94 |
+
R ◦ Rn−1
|
95 |
+
n > 0
|
96 |
+
IdX
|
97 |
+
n = 0
|
98 |
+
R−1 ◦ Rn+1
|
99 |
+
n < 0
|
100 |
+
The domain and the image for a relation R ⊂ X × Y are :
|
101 |
+
Dom R := {x ∈ X | ∃y such that (x, y) ∈ R}
|
102 |
+
(3)
|
103 |
+
Im R := {y ∈ Y | ∃x such that (x, y) ∈ R}.
|
104 |
+
(4)
|
105 |
+
We can see relations as partial multivalued maps. If Dom R = X, then we say that the relation
|
106 |
+
is a multivalued map. A relation is injective, if for all x1, x2 ∈ X, R(x1) = R(x2) implies that
|
107 |
+
x1 = x2. A relation is surjective if Im R = Y . Moreover, a map f : X → Y induces a relation
|
108 |
+
where (x, f(x)) ∈ R. Without ambiguity, we can compose maps and relations together to obtain a
|
109 |
+
new relation.
|
110 |
+
Definition 2.1. Let R be a self-relation on X. Let j be the least positive integer such that :
|
111 |
+
Rj = Rj+p for some p > 0.
|
112 |
+
We say that j is the index and the least p > 0 is the period. If j = 1, then R is periodic. A pair
|
113 |
+
(j, p) is the eventual period of R with index j and period p.
|
114 |
+
In other words, the period p will eventually be a period for R.
|
115 |
+
We sometimes use matrices with values in {0, 1} to represent relations. Let R ⊂ X × Y be a
|
116 |
+
relation with card(X) = m and card(Y ) = n. The matrix Mm×n have a value 1 at Mi,j if xiRyj
|
117 |
+
otherwise the value is 0. It can be called relation matrix, Boolean relation matrix, binary relation
|
118 |
+
matrix, binary Boolean matrix, (0, 1)-Boolean matrix and (0, 1)-matrix. For more information on
|
119 |
+
Boolean matrix theory, we refer to the book [22].
|
120 |
+
We say that a self-relation R on X has a cycle at x if and only if there exists an n ∈ N such
|
121 |
+
that xRnx. We say R as a fixed point at x, if n = 1. If a relation has no cycle at x for all x with
|
122 |
+
period n > 1, then the relation is acyclic. A cycle is a sequence x1, x2, . . . , xn such that x1 = xn
|
123 |
+
and xiRxi+1. A self-relation R on X is simple if for any two cycles are either disjoints or equals.
|
124 |
+
3
|
125 |
+
|
126 |
+
2.2
|
127 |
+
Graphs
|
128 |
+
In this subsection, we remind the definition of a graph and some notations.
|
129 |
+
Definition 2.2. A directed graph G is a pair (E, V ) where V is the set of vertices V and E is the
|
130 |
+
subset V × V the set of edges.
|
131 |
+
A relation can also be seen as a directed graph. If R is a self-relation on X, then X is the set
|
132 |
+
of vertices and the set of edges E = R. This graph has at most one directed edge from the vertex
|
133 |
+
A to the vertex B, and we also allow a self-loop on vertices. We note GR the graph induced by a
|
134 |
+
self-relation R.
|
135 |
+
Let x, y ∈ V . There is a (x, y)-path, if there exists a sequence of edges e1, e2, . . . , en ∈ E that
|
136 |
+
connect x to y without following the direction of edges. We can define an equivalence relation
|
137 |
+
on vertices of G. If there is a path between two vertices x and y, then x and y are in the same
|
138 |
+
class of equivalence. For a graph G, we say the number of connected components is the number of
|
139 |
+
class equivalences of the relation of paths. We say G is connected if there is only one connected
|
140 |
+
component.
|
141 |
+
If the sequence of edges of a (x, y)-path follows the direction of edges of the graph, then we
|
142 |
+
say it’s a (x, y)-walk. We can also define an equivalence relation with a walk between vertices. If
|
143 |
+
there is a walk from x to y and a walk from y to x, then x and y are in the same equivalence class.
|
144 |
+
This is the class of strongly connected components. For a graph G, we say the number of strongly
|
145 |
+
connected components is the number of class equivalence of the relation of walks. We say G is
|
146 |
+
strongly connected if there is only one strongly connected component.
|
147 |
+
2.3
|
148 |
+
Simplicial Complexes and Dowker Complexes
|
149 |
+
In this subsection, we will discuss simplicial complex, Dowker complex and the Dowker’s Theorem.
|
150 |
+
For more information about simplicial complex, we suggest to read [27]. We do not present filtration
|
151 |
+
and persistent homology, but we refer to [11].
|
152 |
+
An abstract simplicial complex is a set K that contains finite non-empty sets such as if A ∈ K,
|
153 |
+
then for all subsets of A are also in K. For further examples, we use geometric simplex. A geometric
|
154 |
+
n-simplex is the convex hull of a geometrically independent sets of vertices {v0, v1, . . . , vn} ∈ RN.
|
155 |
+
This is the set of x ∈ RN such as x = �n
|
156 |
+
i=0 tixi and 1 = �n
|
157 |
+
i=0 ti where ti ≥ 0 for all i. We denote
|
158 |
+
an n-simplex by [v0, v1, . . . , vn] is the simplex spanned by the vertices v0, v1, . . . , vn. Any simplex
|
159 |
+
spanned by the subsets of {v0, v1, . . . , vn} are called faces and denote by the symbol ≤. A simplicial
|
160 |
+
complex is a collection of simplices for all σ ∈ K, if τ ≤ σ then τ ∈ K and if σ1 ∩ σ2 = τ, then τ
|
161 |
+
is either the empty set or τ is a face of σ1 and σ2. We say that L ≤ K if L is a sub-complex of
|
162 |
+
K. A simplicial complex is contractible if its homology is equivalent to a point. Given an abstract
|
163 |
+
simplicial K, we can define a geometric simplicial complex and |K| call the geometric realization of
|
164 |
+
K. We call 0-simplices vertices and 1-simplices edges. The closure of a simplex σ is the set of all
|
165 |
+
the faces of the simplex. We denote it by cl(σ). We need one more definition related to simplicial
|
166 |
+
complexes. It will be useful in some proofs.
|
167 |
+
4
|
168 |
+
|
169 |
+
Definition 2.3. A simplicial complex K is edge-connected, if for any two vertices x and y there
|
170 |
+
is a sequence of edges e1, e2, . . . , en such that x ∈ e1, y ∈ en and cl(ei) ∩ cl(ei+1) ̸= ∅ for all
|
171 |
+
i = 1, 2, . . . , n − 1.
|
172 |
+
We have that the simplicial complex is connected if and only if it is edge-connected if and only
|
173 |
+
if H0 is dimension 1 [16].
|
174 |
+
Now we explain how to construct abstract simplicial complexes from a relation which are called
|
175 |
+
Dowker complexes. Let R ⊂ X × Y be a relation and X, Y be two finite sets. There are two ways
|
176 |
+
to construct the Dowker complex from a relation.
|
177 |
+
Definition 2.4. Let R ⊂ X × Y be a finite relation and KR be the Dowker complex. A simplex
|
178 |
+
[x1, x2, . . . , xn] ∈ KR if and only if ∃y ∈ Y such as xiRy for all i = 1, 2, . . . , n.
|
179 |
+
We have an analogous construction.
|
180 |
+
Definition 2.5. Let R ⊂ X × Y be a finite relation and LR be the Dowker complex. A simplex
|
181 |
+
[y1, y2, . . . , ym] ∈ LR if and only if ∃x ∈ X such as xRyi for all i = 1, 2, . . . , n.
|
182 |
+
We denote [x1, x2, . . . xn] = σy ∈ KR if and only if xiRy for all i = 1, 2, . . . , n. We use y as an
|
183 |
+
index for σy to note that all vertices of σy are in R−1(y). We use the same notation for σx ∈ LR
|
184 |
+
but the vertices are in R(x).
|
185 |
+
By using the matrix notation, we can use rows and columns to build the simplices. The columns
|
186 |
+
are for KR and the rows are for LR.
|
187 |
+
Example 2.6. Let R ⊂ X × Y be a finite relation.
|
188 |
+
R :=
|
189 |
+
�
|
190 |
+
���
|
191 |
+
1
|
192 |
+
0
|
193 |
+
0
|
194 |
+
0
|
195 |
+
1
|
196 |
+
0
|
197 |
+
0
|
198 |
+
1
|
199 |
+
1
|
200 |
+
0
|
201 |
+
1
|
202 |
+
0
|
203 |
+
0
|
204 |
+
0
|
205 |
+
1
|
206 |
+
1
|
207 |
+
1
|
208 |
+
0
|
209 |
+
0
|
210 |
+
0
|
211 |
+
�
|
212 |
+
���
|
213 |
+
(5)
|
214 |
+
The first column gives the 2-simplex [x1, x3, x4]. The third and the fourth column give the 0-
|
215 |
+
simplex [x2]. The second and the fifth column do not add new simplices. We obtain the simplicial
|
216 |
+
complex KR := {[x1, x3, x4], [x2]}.
|
217 |
+
The first row adds a 1-simplex [y1, y5] to LR. The second row gives a 1-simplex [y3, y4]. The
|
218 |
+
final row adds a 1-simplex [y1, y5]. We obtain the simplicial complex LR = {[y1, y5], [y3, y4], [y1, y2]}.
|
219 |
+
We obtain that |KR| and |LR| have two connected components and no higher dimension cycle.
|
220 |
+
The next theorem links to the homotopy between |KR| and |LR|.
|
221 |
+
Theorem 2.7 (Dowker’s Theorem). Let R ⊂ X × Y be a relation and let KR and LR be the
|
222 |
+
associated Dowker complexes. Then, the polyhedra |KR| and |LR| are homotopy equivalent.
|
223 |
+
5
|
224 |
+
|
225 |
+
(a) Geometric realization of
|
226 |
+
the Dowker complex KR.
|
227 |
+
(b) Geometric realization of
|
228 |
+
the Dowker complex LR.
|
229 |
+
Figure 1: These are geometric realizations of the Dowker complexe in Example 2.6. They
|
230 |
+
are homotopically equivalent.
|
231 |
+
In 1952, Dowker [10] has shown that KR and LR have isomorphic homology groups. In 1995,
|
232 |
+
Björner [4] has shown that |KR| and |LR| are homotopically equivalent, which is the more com-
|
233 |
+
monly use in the literature. In recent years, Dowker complexes were regained in popularity in the
|
234 |
+
community of topology data analysis. We can use them to do a filtration on weighted networks [6].
|
235 |
+
In our cases, our filtration will be different and based on different powers of a self-relation.
|
236 |
+
3
|
237 |
+
Left and Right Morphism
|
238 |
+
Let start with the definition of the graph homomorphism and next we define left and right morphisms
|
239 |
+
between relations.
|
240 |
+
Definition 3.1. Let R be a self-relation on X and R′ be a self-relation on Y . A map f : X → Y
|
241 |
+
is a graph homomorphism if the following condition is satisfied :
|
242 |
+
For every x1, x2 ∈ X such as x1Rx2 =⇒ f(x1)R′f(x2).
|
243 |
+
If f is bijective and its inverse is also a graph homomorphism, then f is a graph isomorphism.
|
244 |
+
We obtain that graph homomorphism keeps some information of the Dowker complex coming
|
245 |
+
from the first relation.
|
246 |
+
Lemma 3.2. Let f : X → Y be a graph homomorphism between R and R′. If f is injective, then
|
247 |
+
there exist a map p : KR �→ KR′.
|
248 |
+
6
|
249 |
+
|
250 |
+
Proof. Consider a n-simplex [x0, x1, . . . , xn] ∈ KR. Then, there exists α ∈ X such as xiRα for
|
251 |
+
all i = 0, 1, 2, . . . n. We have that f is a graph homomorphism. This implies that f(xi)R′f(α)
|
252 |
+
for all i = 0, 1, 2, . . . , n. Indeed, f is injective implies that [f(x0), f(x1), . . . , f(xn)] is also a n-
|
253 |
+
simplex in KR′. So we can construct a map p : KR �→ KR′ by sending a simplex [x0, x1, . . . , xn] to
|
254 |
+
[f(x0), f(x1), . . . , f(xn)]. By the previous argument, p is well defined and injective.
|
255 |
+
If we have a graph isomorphism between two relations, then the Dowker complexes remain
|
256 |
+
unchanged. This holds because graph isomorphisms are relabelling on the vertices of a graph.
|
257 |
+
Proposition 3.3. Let R1 be a self-relation on X and R2 be a self-relation on Y . If there exists a
|
258 |
+
graph isomorphism f between R1 and R2, then they have the same Dowker complexes up to the label
|
259 |
+
of vertices.
|
260 |
+
Proof. Graph homomorphisms f and f−1 are injective. By the Lemma 3.2, there exist two injective
|
261 |
+
maps p : KR �→ KR′ and p′ : KR′ �→ KR. So we have that KR and KR′ are the same up to the
|
262 |
+
label of vertices.
|
263 |
+
By similar arguments, we can show it for LR and LR′.
|
264 |
+
Graph homomorphisms are nice, but they can drastically change the Dowker complexes. So,
|
265 |
+
we defined a left morphism which it changes the source of an edge and a right morphism which it
|
266 |
+
changes the target of an edge. In this way, only one of the Dowker complexes will change from the
|
267 |
+
right morphism or the left morphism.
|
268 |
+
Definition 3.4. A right morphism f : (X, Y, R) → (X, Z, R′) is a map f : Y → Z such that for
|
269 |
+
every x ∈ X and y ∈ Y :
|
270 |
+
xRy =⇒ xR′f(y).
|
271 |
+
We obtain this simple Lemma which is very useful for later proofs.
|
272 |
+
Lemma 3.5. If there exists a right morphism f : (X, Y, R) → (X, Z, R′), then KR ≤ KR′. We
|
273 |
+
obtain the equality if f is a bijective map.
|
274 |
+
Proof. Let f : (X, Y, R) → (X, Z, R′) be a right morphism and [x1, x2, . . . , xn] ∈ KR. This implies
|
275 |
+
there exists a y ∈ Y such as xiRy for all i = 1, 2, . . . , n. We obtain that xiR′f(y) for all i. Finally,
|
276 |
+
we have [x1, x2, . . . , xn] ∈ KR′.
|
277 |
+
Now, we suppose that f is bijective. Let [x1, x2, . . . , xn] ∈ KR′. Then, there exists a z ∈ Z such
|
278 |
+
that xiR′z for all i = 1, 2, . . . , n. We have f−1(z) ∈ Y and f−1 is well defined because f is bijective.
|
279 |
+
Then, xiRf−1(z) for all i = 1, 2, . . . , n. We obtain that [x1, x2, . . . , xn] ∈ KR.
|
280 |
+
The idea of right morphism comes from the article [24]. The author only considered the right
|
281 |
+
morphism. But, in our case, we are also interesting of modifying the first set in the cartesian product
|
282 |
+
of a relation.
|
283 |
+
7
|
284 |
+
|
285 |
+
Definition 3.6. A left morphism g : (X, Z, R) → (Y, Z, R′) is a map g : X → Y such that for every
|
286 |
+
x ∈ X and z ∈ Z :
|
287 |
+
xRz =⇒ g(x)R′z.
|
288 |
+
We have an analogous Lemma for left morphism as the Lemma 3.5 for right morphism.
|
289 |
+
Lemma 3.7. If there exists a left morphism g : (X, Z, R) → (Y, Z, R), then LR ≤ LR′. We obtain
|
290 |
+
the equality if g is a bijective map.
|
291 |
+
With the definition of right and left morphism, we can easily show that if two relations are
|
292 |
+
conjugate, then there Dowker complexes are homotopically equivalent. We remind the definition of
|
293 |
+
conjugacy between relations before showing the proof.
|
294 |
+
Definition 3.8. Let R1 be a self-relation on X and R2 be a self-relation on Y . We say that R1 and
|
295 |
+
R2 are conjugate if there exists a bijective map ϕ : X → Y such as ϕ ◦ R1 = R2 ◦ ϕ.
|
296 |
+
Corollary 3.9. Let R be a self-relation on X and R′ be a self-relation on Y which are conjugate
|
297 |
+
by a bijective map ϕ : X → Y . Then, |KR|, |LR|, |LR′| and |KR′| are homotopy equivalent.
|
298 |
+
Proof. The map ϕ is bijective. It implies that KR = Kϕ◦R by Lemma 3.5 and LR′ = LR′◦ϕ by
|
299 |
+
Lemma 3.7.
|
300 |
+
By Dowker’s Theorem, we obtain that |KR| is homotopic equivalent to |LR′|, because Kϕ◦R =
|
301 |
+
KR′◦ϕ.
|
302 |
+
In [28], the author decides to combine the right and left morphism together. Let R ⊂ X × Y
|
303 |
+
and R′ ⊂ X′ × Y ′ be relations and f : X → X′ and g : Y → Y ′ be two maps. A pair (f, g) is
|
304 |
+
a morphism between relation R1 and R2 if for all x ∈ X, y ∈ Y such that xR1y it implies that
|
305 |
+
f(x)R2g(y). In [28], it is shown that the Dowker complex and (co)sheaf representation have nice
|
306 |
+
functoriality properties. In our case, it won’t be useful because we only need right or left morphism.
|
307 |
+
But we can see them as a pair (idX, f) where f is a right morphism and idX is the identity function
|
308 |
+
on X.
|
309 |
+
4
|
310 |
+
Multi-right morphism and multi-left morphism
|
311 |
+
We want to work with multivalued maps. We generalize left and right morphism to multi-left and
|
312 |
+
multi-right morphism.
|
313 |
+
Definition 4.1. A multi-right morphism F : (X, Y, R) ⊸ (X, Z, R′) is a multivalued map F : Y ⊸
|
314 |
+
Z such as for all x ∈ X, y ∈ Y :
|
315 |
+
xRy =⇒ xR′a for all a ∈ F(y).
|
316 |
+
8
|
317 |
+
|
318 |
+
We also obtain the same Lemma as before.
|
319 |
+
Lemma 4.2. Let R ⊂ X × Y and R′ ⊂ X × Z be relations. If there exist a multi-right morphism
|
320 |
+
F : (X, Y, R) ⊸ (X, Z, R′), then KR ≤ KR′. We obtain the equality if F is a bijective multivalued
|
321 |
+
map.
|
322 |
+
Proof. The proof is the same as Lemma 3.5.
|
323 |
+
Definition 4.3. A multi-left morphism G : (X, Z, R) ⊸ (Y, Z, R′) is a multivalued map G : X → Y
|
324 |
+
such for all x ∈ X, z ∈ Z :
|
325 |
+
xRz =⇒ aR′z for all a ∈ G(x).
|
326 |
+
Lemma 4.4. Let R ⊂ X × Z and R′ ⊂ Y × Z be relations. If there exist a multi-left morphism
|
327 |
+
G : (X, Z, R) ⊸ (Y, Z, R′), then LR ≤ LR′. We obtain the equality if G is a bijective multivalued
|
328 |
+
map.
|
329 |
+
We denote a multi-right morphism by mr-morphism and a multi-left morphism by ml-morphism.
|
330 |
+
Remarks 4.5. We remind that if a relation S ⊂ X×Y satisfies Dom S = X, then S is a well-defined
|
331 |
+
multivalued map. Moreover, for any relation R ⊂ Z ×X, we have that S : (Z, X, R) ⊸ (Z, Y, S ◦R)
|
332 |
+
is a well-defined mr-morphism. It is also true for ml-morphism.
|
333 |
+
The next corollary will be useful to define our filtrations.
|
334 |
+
Corollary 4.6. Let R be a self-relation on X. If Dom R = X, then KRn ≤ KRn+1. If Im R = X,
|
335 |
+
then LRn ≤ LRn+1.
|
336 |
+
Proof. Dom R = X implies that R is a multivalued map. Moreover, R : (X, X, Rn) ⊸ (X, X, Rn+1)
|
337 |
+
is well-defined mr-morphism. By Lemma 3.5, we have that KRn ≤ KRn+1.
|
338 |
+
In the same way, Im R = X implies that R−1 is a multivalued map.
|
339 |
+
We have that R−1 :
|
340 |
+
(X, X, Rn) ⊸ (X, X, Rn+1) is well-defined ml-morphism. By Lemma 3.7, we have that LRn ≤
|
341 |
+
LRn+1.
|
342 |
+
Remark 4.7. The hypothesis Dom R = X in the previous corollary is important. Let us show that
|
343 |
+
by an example. If R is a self-relation on X, define by this matrix such as :
|
344 |
+
�
|
345 |
+
�
|
346 |
+
0
|
347 |
+
1
|
348 |
+
1
|
349 |
+
0
|
350 |
+
0
|
351 |
+
1
|
352 |
+
0
|
353 |
+
0
|
354 |
+
0
|
355 |
+
�
|
356 |
+
�
|
357 |
+
(6)
|
358 |
+
Then, we obtain KR = {[x2, x3], [x2], [x3]}, KR2 = {[x3]} and KRn = ∅ for n > 2.
|
359 |
+
We don’t have KRn ⊂ KRn+1 for all n ∈ N>0. If the matrix is nilpotent, then KRn is an empty
|
360 |
+
set for an n ∈ N>0.
|
361 |
+
9
|
362 |
+
|
363 |
+
Using Corollary 4.6, we can show that the Dowker complexes of a relation stabilize at some
|
364 |
+
power n.
|
365 |
+
Corollary 4.8. Let R be a finite self-relation on X with an eventual period (j, p). If Dom R = X,
|
366 |
+
then, we have KRj = KRj+i for i ∈ N. If Im R = X, then LRj = LRj+i for i ∈ N.
|
367 |
+
Proof. By Corollary 4.6, we have the sequence :
|
368 |
+
KRj ≤ KRj+1 ≤ . . . ≤ KRj+p−1 ≤ KRj+p.
|
369 |
+
(7)
|
370 |
+
But p is the period of R, hence Rj = Rj+p implies that KRj = KRj+p. By (7), we obtain
|
371 |
+
KRj = KRj+i for i ∈ N. A similar proof can be done for LRj = LRj+i for i ∈ N.
|
372 |
+
We remind the definition of shift equivalence between two relations and we show the assump-
|
373 |
+
tion that relations are shift equivalences implies that theirs Dowker complexes are homotopically
|
374 |
+
equivalent at some power for each relation.
|
375 |
+
Definition 4.9. Let R1 be finite self-relation on X and R2 be finite self-relation on Y . R1 and R2
|
376 |
+
are shift equivalent with a lag l, if there exists two relations S ⊂ X × Y and T ⊂ Y × X such as :
|
377 |
+
R1 ◦ T = T ◦ R2
|
378 |
+
S ◦ R1 = R2 ◦ S
|
379 |
+
T ◦ S = Rl
|
380 |
+
1
|
381 |
+
S ◦ T = Rl
|
382 |
+
2
|
383 |
+
We say it is a strong shift equivalence if l = 1.
|
384 |
+
Corollary 4.10. Let R1 be finite self-relation on X with Dom R1 = X = Im R1 and R2 be finite
|
385 |
+
self-relation on Y with Dom R2 = Y = Im R2. Let (jp, p) be an eventual period of R1 and (jq, q)
|
386 |
+
be an eventual period of R2. Without loss of generality, we suppose that jp ≥ jq. If R1 and R2 are
|
387 |
+
shift equivalent with lag l, then |KR
|
388 |
+
jp
|
389 |
+
1 |, |KR
|
390 |
+
jq
|
391 |
+
2 |, |LR
|
392 |
+
jp
|
393 |
+
1 | and |LR
|
394 |
+
jq
|
395 |
+
2 | are homotopy equivalent.
|
396 |
+
Proof. If R1◦T = T ◦R2 then Rn
|
397 |
+
1 ◦T = T ◦Rn
|
398 |
+
2 is also true for n ∈ N. Moreover, we have Dom S = X
|
399 |
+
and Dom T = Y , because Dom R1 = X, Dom R2 = Y , T ◦ S = Rl
|
400 |
+
1 and S ◦ T = Rl
|
401 |
+
2. So we have
|
402 |
+
that S and R are well defined multivalued maps.
|
403 |
+
We want to show that KR
|
404 |
+
jp
|
405 |
+
1
|
406 |
+
= KS◦R
|
407 |
+
jp
|
408 |
+
1
|
409 |
+
and LR
|
410 |
+
jq
|
411 |
+
2
|
412 |
+
= LR
|
413 |
+
jq
|
414 |
+
2 ◦S. We are going to use T and S as
|
415 |
+
mr-morphism with R1 and ml-morphism with R2.
|
416 |
+
We have that S : (X, X, Rjp
|
417 |
+
1 ) ⊸ (X, Y, S ◦ Rjp
|
418 |
+
1 ) and T : (X, Y, S ◦ Rjp
|
419 |
+
1 ) ⊸ (X, X, T ◦ S ◦ Rjp
|
420 |
+
1 )
|
421 |
+
are well-defined mr-morphisms. We have T ◦ S = Rl
|
422 |
+
1. It implies that T ◦ S ◦ Rjp
|
423 |
+
1 = Rl+jp
|
424 |
+
1
|
425 |
+
. We
|
426 |
+
obtain KR
|
427 |
+
jp
|
428 |
+
1 ≤ KS◦R
|
429 |
+
jp
|
430 |
+
1 ≤ KT◦S◦R
|
431 |
+
jp
|
432 |
+
1 = KR
|
433 |
+
l+jp
|
434 |
+
1
|
435 |
+
. The eventual period of R1 is (jp, p). It implies that
|
436 |
+
KR
|
437 |
+
jp
|
438 |
+
1 = KR
|
439 |
+
jp+l
|
440 |
+
1
|
441 |
+
. We obtain that KR
|
442 |
+
jp
|
443 |
+
1 = KS◦R
|
444 |
+
jp
|
445 |
+
1 .
|
446 |
+
We can see that S : (Y, Y, Rjp
|
447 |
+
2 ) ⊸ (X, Y, Rjp
|
448 |
+
2 ◦ S) and T : (X, Y, Rjp
|
449 |
+
2 ◦ S) ⊸ (Y, Y, Rjp
|
450 |
+
2 ◦ S ◦ T)
|
451 |
+
are well-defined ml-morphisms. We have S ◦ T = Rl
|
452 |
+
2. It implies that Rjp
|
453 |
+
2 ◦ S ◦ T = Rjp+l
|
454 |
+
2
|
455 |
+
. We
|
456 |
+
10
|
457 |
+
|
458 |
+
(a) The graph GR1.
|
459 |
+
(b) The graph GR2.
|
460 |
+
Figure 2: Theses are the graphs from Example 4.11.
|
461 |
+
obtain LR
|
462 |
+
jp
|
463 |
+
2 ≤ LR
|
464 |
+
jp
|
465 |
+
2 ◦S ≤ LR
|
466 |
+
jp
|
467 |
+
2 ◦S◦T = LR
|
468 |
+
jp+l
|
469 |
+
2
|
470 |
+
. We have LR
|
471 |
+
jq
|
472 |
+
2 = LR
|
473 |
+
jp+l
|
474 |
+
2
|
475 |
+
because jp ≥ jq. We obtain
|
476 |
+
LR
|
477 |
+
jp
|
478 |
+
2 = LR
|
479 |
+
jp
|
480 |
+
2 ◦S.
|
481 |
+
Finally, we have KR
|
482 |
+
jp
|
483 |
+
1 = KS◦R
|
484 |
+
jp
|
485 |
+
1 = KR
|
486 |
+
jp
|
487 |
+
2 ◦S and LR
|
488 |
+
jp
|
489 |
+
2 = LR
|
490 |
+
jp
|
491 |
+
2 ◦S = LS◦R
|
492 |
+
jp
|
493 |
+
1 . By Dowker’s Theorem,
|
494 |
+
we obtain that |KR
|
495 |
+
jp
|
496 |
+
1 |, |KR
|
497 |
+
jq
|
498 |
+
2 |, |LR
|
499 |
+
jp
|
500 |
+
1 | and |LR
|
501 |
+
jq
|
502 |
+
2 | are homotopy equivalent.
|
503 |
+
Example 4.11. Let X be a finite set with 8 points and Y be a finite set with 3 points. Let R1 be
|
504 |
+
a self-relation on X and R2 be a self-relation on X defined by those graphs in Figure 2. R1 has an
|
505 |
+
eventual period (3, 3) and R2 has an eventual period (1, 3). We see in Figures 3(a), (b) and (d) that
|
506 |
+
the Dowker complexes are not homotopically equivalent. But, in Figures 3 (c) and (d), the Dowker
|
507 |
+
complexes with relations at power 3 are homotopically equivalent.
|
508 |
+
There is an interesting proposition from [15] that we can use for strongly connected relations.
|
509 |
+
We remind that an indecomposable Boolean matrix is a relation which is strongly connected and J
|
510 |
+
is a square matrix where all the entries are equals to 1.
|
511 |
+
Proposition 4.12 (Proposition 4.3 in [15] ). Every indecomposable Boolean matrix with positive
|
512 |
+
trace is strong shift equivalent to J.
|
513 |
+
We can easily compute the Dowker complexes of J. It is a (n−1)-simplex where n is the number
|
514 |
+
of rows of J for both Dowker complexes. Finally, we obtain that the Dowker complexes of a strongly
|
515 |
+
connected self-relation at a power high enough are contractible if the trace is strictly positive.
|
516 |
+
11
|
517 |
+
|
518 |
+
Y3(a) Dowker complex of |KR1|.
|
519 |
+
(b) Dowker complex of |LR1|.
|
520 |
+
(c) Dowker complexes of |KR3
|
521 |
+
1| and
|
522 |
+
|LR3
|
523 |
+
1|.
|
524 |
+
(d)
|
525 |
+
Dowker
|
526 |
+
complexes
|
527 |
+
|KR2|, |LR2|, |KR3
|
528 |
+
2| and |LR3
|
529 |
+
2|.
|
530 |
+
Figure 3: Theses are the different Dowker complexes from Example 4.11.
|
531 |
+
12
|
532 |
+
|
533 |
+
5
|
534 |
+
Filtrations of Dowker complexes
|
535 |
+
For this section, we suppose that a R is a finite self-relation on X. From Corollary 4.6, if Dom R =
|
536 |
+
X, then we have KRi ≤ KRi+1 for all i ≥ 0. We have an inclusion and we get this filtration :
|
537 |
+
KR �→ KR2 �→ . . . �→ KRi �→ KRi+1 �→ . . .
|
538 |
+
(8)
|
539 |
+
In the same way with Im R = X, we have LRi ≤ LRi+1. We obtain another filtration :
|
540 |
+
LR �→ LR2 �→ . . . �→ LRi �→ LRi+1 �→ . . .
|
541 |
+
(9)
|
542 |
+
From Corollary 4.8, the Dowker complexes stabilize at a certain power. This means we can
|
543 |
+
compute the filtration (8) and (9) in finite time. For our filtrations, we start at i = 1, but we could
|
544 |
+
also start with the i = 0. We have that R0 = idX and R : (X, X, idX) ⊸ (X, X, R) is a well-defined
|
545 |
+
mr-morphism, if Dom R = X. Then, the filtration (8) becomes :
|
546 |
+
KidX = KR0 �→ KR �→ KR2 �→ . . . �→ KRi �→ KRi+1 �→ . . .
|
547 |
+
(10)
|
548 |
+
And for the filtration (9) by applying similar arguments, we obtain :
|
549 |
+
LidX = LR0 �→ LR �→ LR2 �→ . . . �→ LRi �→ LRi+1 �→ . . .
|
550 |
+
(11)
|
551 |
+
The homology of KidX and Lidx is the homology of n = card(X) points. In some cases, we
|
552 |
+
might want to start the filtration at i = 0 or i = 1.
|
553 |
+
We remind that, by Dowker’s Theorem, |KRi| and |LRi| are homotopically equivalent for all
|
554 |
+
i ∈ N. We obtain the same bar code representation for filtrations (8) and (9).
|
555 |
+
Example 5.1. Let R1 be a self-relation on X given by the graph in the Figure 4(a). R1 has 9 nodes
|
556 |
+
and is acyclic. The eventual period is (3, 1). We obtain the bar code at Figure 4(b). It has one
|
557 |
+
generator of H1 with the interval [1, 2] and we had 3 generators of H0 that die early and 1 generator
|
558 |
+
of H0 that survive to infinity.
|
559 |
+
Example 5.2. Let R2 be a self-relation on X given by the graph in the Figure 4(c). R2 has 10
|
560 |
+
nodes and is simple. The eventual period is (3, 4). We obtain the bar code at the Figure 4(d). It has
|
561 |
+
4 generators of H0 that die at time 2 and 2 other generators that survive to infinity.
|
562 |
+
For the next results, we compute the 0th homology of the Dowker complexes for different types
|
563 |
+
of relation.
|
564 |
+
If R is a finite acyclic self-relation, then it has an eventual period p = 1 and j ∈ N>0 such as
|
565 |
+
Rj = Ri for all i ≥ j. So we denote this relation Rj by R∞, because it converges to a relation when
|
566 |
+
i → ∞.
|
567 |
+
13
|
568 |
+
|
569 |
+
(a) The graph of the acyclic rela-
|
570 |
+
tion from Example 5.1.
|
571 |
+
(b) The associated bar code of the rela-
|
572 |
+
tion from Example 5.1. We use the fil-
|
573 |
+
tration with KRi
|
574 |
+
1. The first bar in orange
|
575 |
+
is a generator in H1 and the others four
|
576 |
+
bars in blue are generators in H0.
|
577 |
+
(c) The graph of the relation with
|
578 |
+
multiple cycles from Example 5.2.
|
579 |
+
(d) The associated bar code of the rela-
|
580 |
+
tion from Example 5.2. We use the fil-
|
581 |
+
tration with KRi
|
582 |
+
2. The six bars in blue
|
583 |
+
are generators in H0.
|
584 |
+
Figure 4: In these figures, we have the graph on the left and the associated bar code diagram
|
585 |
+
on the right for Examples 5.1 and 5.2. Dashed lines in bar code mean it goes to infinity.
|
586 |
+
14
|
587 |
+
|
588 |
+
4.0
|
589 |
+
T
|
590 |
+
3.5
|
591 |
+
-
|
592 |
+
3.0
|
593 |
+
T
|
594 |
+
2.5
|
595 |
+
2.0
|
596 |
+
1.5
|
597 |
+
1.0
|
598 |
+
-
|
599 |
+
0.5
|
600 |
+
0.0
|
601 |
+
1.0
|
602 |
+
1.5
|
603 |
+
2.0
|
604 |
+
2.5
|
605 |
+
0'E
|
606 |
+
3.5
|
607 |
+
4.0
|
608 |
+
4.5
|
609 |
+
5.0X5
|
610 |
+
X105 .
|
611 |
+
4
|
612 |
+
3 -
|
613 |
+
1
|
614 |
+
1.0
|
615 |
+
1.5
|
616 |
+
2.0
|
617 |
+
2.5
|
618 |
+
3.0
|
619 |
+
3.5
|
620 |
+
4.0
|
621 |
+
4.5
|
622 |
+
5.0X3Definition 5.3. We say that x ∈ X is a minimum for a self-relation R, if there exists no y ∈ X
|
623 |
+
such as x ̸= y and xR∞y. We denote the set Ux := {y ∈ X | yR∞x}.
|
624 |
+
We say that x ∈ X is a maximum for a self-relation R, if there exists no y ∈ X such as x ̸= y
|
625 |
+
and yR∞x. We denote the set Dx := {y ∈ X | xR∞y}.
|
626 |
+
The maximums and minimums of an acyclic relation are important, because they are responsible
|
627 |
+
for the maximal simplices of KR∞ and LR∞.
|
628 |
+
Lemma 5.4. Let R be a finite acyclic self-relation on X with Dom R = X. Then, the maximal
|
629 |
+
simplices of KR∞ are given by the minimums of R∞.
|
630 |
+
Proof. We have that Dom R = X it implies that Dom R∞ = X. Then, for all x ∈ X there exists
|
631 |
+
z ∈ X such that xR∞z and z is a minimum. Let σy = [x1, x2, . . . , xn] ∈ KR∞ be an arbitrary
|
632 |
+
simplex. We have an y ∈ X such as xiR∞y for all i = 1, 2, . . . , n. By the first argument, there
|
633 |
+
exists a minimum z ∈ X such as yR∞z. Therefore, we have xiR∞yR∞z. Then, σy ⊂ σz.
|
634 |
+
We can do a similar result with LR∞ by using the maximums of R∞, if Im R = X.
|
635 |
+
Theorem 5.5. Let R an acyclic finite self-relation on X with Dom R = X.
|
636 |
+
number of connected components of GR = dim H0(KR∞) = dim H0(LR∞)
|
637 |
+
(12)
|
638 |
+
Proof. First, by Dowker’s Theorem, we have dim H0(KR∞) = dim H0(LR∞). We suppose that GR is
|
639 |
+
connected and show that dim H0(KR∞) = 1. More precisely, we show that KR∞ is edge-connected.
|
640 |
+
We have that Dom R = X implies that for all x ∈ X,[x] ∈ KR∞.
|
641 |
+
Let x, x′ ∈ X. There exists y1 ∈ X a minimum such as xR∞y1 and y1R∞y1. This implies
|
642 |
+
that e1 = [x, y1] ∈ KR∞. We also have that there exists yn ∈ X a minimum such as x′R∞yn and
|
643 |
+
ynR∞yn. This implies that en = [x′, yn] ∈ KR∞.
|
644 |
+
Since GR is connected, there exists a (y1, yn)-path of finite length. We denote this sequence by
|
645 |
+
y1, z1, z2, z3, . . . , zm, yn. Without loss of generality, we take the shortest path. There exist a i such
|
646 |
+
as zi ∈ Uy1 and zi+1 /∈ Uy1. First, we have e2 = [y1, zi] ∈ KR∞ and ziRzi+1. There exists y2 ̸= y1 a
|
647 |
+
minimum such as zi+1R∞y2. This implies that ziR∞y2 and we have the edge e3 = [zi, y2] ∈ KR∞.
|
648 |
+
We can repeat this process with the (y2, yn)-path until we obtain a sequence of edges that connect
|
649 |
+
the vertex [x] and [x′]. We obtain that KR∞ is edge-connected.
|
650 |
+
Now suppose that GR is not connected. Let H be a connected component of GR. Then, for all
|
651 |
+
x ∈ H and for all y /∈ H, we have that x /∈ R(y) and y /∈ R(x). It implies that for each connected
|
652 |
+
component gives a single generator for H0(KR∞).
|
653 |
+
We can construct a map j : cc(GR) → H0(KR∞) that sends the connected components of GR to
|
654 |
+
the generators of H0(KR∞). By the previous argument, we can make this map j injective . For any
|
655 |
+
generator g in H0(KR∞), there exists a x ∈ X such as g is homologous to [x] because Dom R = X.
|
656 |
+
This implies there exists a H ∈ cc(GR) such as x ∈ H. We obtain that the map j is bijective and
|
657 |
+
the equality (12).
|
658 |
+
15
|
659 |
+
|
660 |
+
Figure 5: The graph of R4
|
661 |
+
2 from Example 5.2. GR4
|
662 |
+
2 has 2 connected components.
|
663 |
+
We can show a similar proof for simple relations.
|
664 |
+
Theorem 5.6. Let R be a finite simple self-relation on X with Dom R = X and (j, p) be an eventual
|
665 |
+
period. Assume that GR is connected. There exists a r ∈ N such that :
|
666 |
+
dim H0(KRj) = dim H0(LRj) = number of connected components of GRr.
|
667 |
+
(13)
|
668 |
+
Proof. We can find q big enough so that Rq is acyclic, because R is a simple relation. We choose a i ∈
|
669 |
+
N such as iq > j. We fix r = iq. We also have that Rr is also acyclic. By Corollary 4.8, we have that
|
670 |
+
KRj = KRr. By Theorem 5.5, we know that dim H0(KRj) = number of connected components of Rr.
|
671 |
+
If GR has more than one connected component, we apply this theorem for each connected
|
672 |
+
component of GR by using similar arguments as the proof of Theorem 5.5. From preceding results,
|
673 |
+
if Dom R ̸= X but Im R = X, we can redo the proofs with LRj. Another approach is to use R−1,
|
674 |
+
because Dom R−1 = X.
|
675 |
+
Remark 5.7. In Example 5.2, it is a simple relation. We have R4
|
676 |
+
2 is acyclic. The graph of R4
|
677 |
+
2 is
|
678 |
+
shown in Figure 5. It has two connected components and the bar code from Figure 4(b) has 2 bars
|
679 |
+
goes to infinity. It is expected from Theorem 5.6.
|
680 |
+
We have shown earlier in Corollary 4.10 and Proposition 4.12 that a strongly connected self-
|
681 |
+
relation R is shift equivalent to a matrix J, if tr(R) > 0. But we will like to have a result for any
|
682 |
+
strongly connected relations. But, first we need some definition and other results from other papers.
|
683 |
+
Let gcd(a, b) be the great common divisor of a and b. We define :
|
684 |
+
q = gcd(n1, n2, n3, . . .)
|
685 |
+
(14)
|
686 |
+
where ni is the length of a cycle and i ∈ I is the set of all different cycles from R.
|
687 |
+
We obtain this proposition :
|
688 |
+
Proposition 5.8 (Proposition 6.12 in [26]). Let R be a strongly connected self-relation on X, (j, p)
|
689 |
+
be the eventual period and q defined by (14). We have q|j.
|
690 |
+
16
|
691 |
+
|
692 |
+
Let’s define a new equivalence relation ∼q for a strongly connected self-relation R. We say that
|
693 |
+
x ∼q y, if for each (x, y)-walk has length equal to 0 modulo q. It is an equivalence relation.
|
694 |
+
Proposition 5.9 (Proposition 6.16 in [26]). Let R be a strongly connected self-relation on X. Let q
|
695 |
+
defined as (14). Then, ∼q is an equivalence relation in X with exactly q distinct equivalence classes.
|
696 |
+
We need one more Lemma before showing our final result.
|
697 |
+
Lemma 5.10 (Lemma 6.25 in [26]). Let R be a strongly connected self-relation on X and (j, p) an
|
698 |
+
eventual period. Then,
|
699 |
+
x ∼q x′ =⇒ Rj(x) = Rj(x′).
|
700 |
+
(15)
|
701 |
+
We are going to show that the number of class equivalence of ∼q is equal to dim(H0(KRj)) for
|
702 |
+
a strongly connected self-relation with eventual period (j, p).
|
703 |
+
Theorem 5.11. Let R be a finite self-relation on X with an eventual period (j, p), R is strongly
|
704 |
+
connected, q defined by (14). Then, we have :
|
705 |
+
number of [x]∼q = q = dim(H0(KRj)) = dim(H0(LRj)).
|
706 |
+
(16)
|
707 |
+
Proof. We show that for any x, y ∈ X, if x ∼q y, then x and y are edge-connected and if x ̸∼q y,
|
708 |
+
then x and y are not edge-connected.
|
709 |
+
First, we suppose that x ∼q y. By Lemma 5.10, we have that Rj(x) = Rj(y) ̸= ∅. There exists
|
710 |
+
a z ∈ Rj(x). It implies that [x, z] and [y, z] are in KRj. So, each vertex in the same equivalence
|
711 |
+
class is edge-connected.
|
712 |
+
Now, we suppose that, x ̸∼q y. There exists a (x, y)-walk of length n modulo q where n ̸= 0.
|
713 |
+
Let show that Rj(x) ∩ Rj(y) = ∅ . Let’s suppose there exists a z ∈ Rj(x) ∩ Rj(y). This implies
|
714 |
+
there exists a (x, z)-walk of length j and a (y, z)-walk of length j. But, from Proposition 5.8, q|j.
|
715 |
+
This implies x ∼q z and y ∼q z. But ∼q is an equivalence relation. We obtain that x ∼q y which is
|
716 |
+
a contradiction. We obtain that x ̸∼q y implies Rj(x) ∩ Rj(y) = ∅. We obtain that if x ∼q y then
|
717 |
+
they are edge-connected. But, if x ̸∼q y, then they are not edge-connected. There is q different
|
718 |
+
equivalence classes. The proof is complete.
|
719 |
+
For the case of R is an arbitrary relation, it is harder to find its homology H0. Also, for higher
|
720 |
+
dimensions of the homology groups, it’s hard to tell what happens. Further investigations are needed
|
721 |
+
for both cases.
|
722 |
+
Now, we return to the filtrations defined earlier. There are two other types of filtrations that we
|
723 |
+
can use. If R is a self-relation on X with Dom R = X = Im R, then we can use both filtrations. But
|
724 |
+
we obtain the same bar codes for both. That holds because, for each i ∈ N, |KRi| is homotopically
|
725 |
+
equivalent to |LRi| for any self-relation. We might need to come with other types of filtration. We
|
726 |
+
suggest two other types of filtration.
|
727 |
+
It will be interesting to use a zigzag filtration [5] with KRi and LRi by alternating them. It will
|
728 |
+
probably depend on the relation. Further investigations are needed.
|
729 |
+
17
|
730 |
+
|
731 |
+
We will present an interesting bi-filtration with KRm and LRn. We have that, if KRm ⊂ KRm+1
|
732 |
+
and LRn ⊂ LRn+1, then KRm ∩LRn ⊂ KRm+1 ∩LRn and KRm ∩LRn ⊂ KRm ∩LRn+1 for all m, n ∈ N.
|
733 |
+
We obtain this bi-filtration :
|
734 |
+
...
|
735 |
+
...
|
736 |
+
. . .
|
737 |
+
KRm ∩ LRn
|
738 |
+
KRm+1 ∩ LRn
|
739 |
+
. . .
|
740 |
+
. . .
|
741 |
+
KRm ∩ LRn+1
|
742 |
+
KRm+1 ∩ LRn+1
|
743 |
+
. . .
|
744 |
+
...
|
745 |
+
...
|
746 |
+
The computation of the bi-filtration is also finite. Because the relation R is finite and Dom R =
|
747 |
+
X = Im R. We obtain an eventual period (j, p). In the bi-filtration, there are, at maximum, j2
|
748 |
+
different simplicial complexes to compute.
|
749 |
+
One may ask why the intersection is a good idea to consider. Let’s explain it in more details.
|
750 |
+
Let R be a self-relation on X with Dom R = X = Im R and m, n ∈ N. Let σ ∈ KRm ∩ LRn where
|
751 |
+
σ = [x1, x2, . . . , xd]. Then, there exists xω ∈ X such that xiRmxω and there exists xα ∈ X such
|
752 |
+
that xαRnxi for all i. Another way to see this is, for each xi ∈ σ, there exists a (xω, xα)-walk of
|
753 |
+
length m+n passing through xi. We can subdivide this (xω, xα)-walk into a (xω, xi)-walk of length
|
754 |
+
m and a (xi, xα)-walk of length n. So, by only the existence of a simplex σ in KRm ∩ LRn, each
|
755 |
+
vertex of σ, it has a walk with a common starting point and a common ending point of same length
|
756 |
+
going through the vertex. It will be interesting to study these Dowker complexes when m tends to
|
757 |
+
infinity, n tends to infinity or both.
|
758 |
+
6
|
759 |
+
Conclusion
|
760 |
+
In summary, we used the Dowker complexes to study some properties of self-relation. First, we
|
761 |
+
defined the right morphism and left morphism. We also generalized it to the case of multivalued
|
762 |
+
maps called multi-right morphism and multi-left morphism. The existence of a right or multi-right
|
763 |
+
morphism between R1 and R2 implies that the KR1 is included in KR2. Similarly, the existence of a
|
764 |
+
left or a multi-left morphism between R1 and R2 implies that LR1 is included in LR2. We have shown
|
765 |
+
that two relations are conjugate implies that they have homotopically equivalent Dowker complexes.
|
766 |
+
We have also shown that if two relations are shift equivalent, then their Dowker complexes are
|
767 |
+
homotopically equivalent at some power of the relations. We were interested in self-relation which
|
768 |
+
is equivalent of a type of directed graph. We have obtained two nice properties. If R is finite and
|
769 |
+
Dom R = X = Im R, then we have that KRi ≤ KRi+1 and LRi ≤ LRi+1 for all i ∈ N. Moreover,
|
770 |
+
there exists a j ∈ N such as KRj = KRi+j and LRj = LRi+j for all i ∈ N. With these two properties,
|
771 |
+
we defined two filtrations with KRi �→ KRi+1 and LRi �→ LRi+1. Also, the filtration ends at some
|
772 |
+
finite time. Finally, we proved some results about the 0th homology for some types of self-relation
|
773 |
+
at some power. We also proposed the intersection filtration and the zigzag filtration.
|
774 |
+
18
|
775 |
+
|
776 |
+
We have put some foundations to study directed graph using Dowker complexes. Moreover, we
|
777 |
+
think it might be a useful tool to study the dynamics of finite data define by a directed graph of
|
778 |
+
Dowker complexes. Let R be a self-relation with an eventual period (j, p). The positive or forward
|
779 |
+
invariant is given by the existence of a simplex in KRj when j converges to infinity. The negative
|
780 |
+
or backward invariant is given by the existence of a simplex in Lj
|
781 |
+
R when j converges to infinity.
|
782 |
+
But, by the stabilization of Dowker complexes, we can compute it in finite time. Finally, if we want
|
783 |
+
to study the invariant of R, this is given by the existence of a simplex in KRj ∩ LRj which is the
|
784 |
+
intersection of the forward and the backward invariant. But further investigations are needed. The
|
785 |
+
idea is to use the structure of the Dowker complexes to encode the dynamics of finite data.
|
786 |
+
19
|
787 |
+
|
788 |
+
References
|
789 |
+
[1] K. Ambrose, S. Huntsman, M. Robinson, and M. Yutin. Topological differential testing. CoRR,
|
790 |
+
abs/2003.00976, 2020.
|
791 |
+
[2] R. Atkin. Mathematical Structure in Human Affairs. London, Heinemann, 1974.
|
792 |
+
[3] R. Atkin. Q-analysis: A hard language for the soft sciences. Futures, Heinemann, 10(6), 1978.
|
793 |
+
[4] A. Björner. Topological methods. Handb. Comb., 2:1819–1872, 1995.
|
794 |
+
[5] G. Carlsson and V. de Silva. Zigzag persistence. Found Comput Math, 10, 2010.
|
795 |
+
[6] S. Chowdhurry and F. Mémoli.
|
796 |
+
A functorial Dowker theorem and persistent homology of
|
797 |
+
asymmetric networks. Journal of Applied and Computational Topology, 2:115–175, 2018.
|
798 |
+
[7] C. Conley. Isolated Invariant Sets and the Morse Index. American Mathematical Society, 1978.
|
799 |
+
[8] S. Day, O. Junge, and K. Mischaikow. A rigorous numerical method for the global analy-
|
800 |
+
sis of infinite-dimensional discrete dynamical systems. SIAM J. Applied Dynamical Systems,
|
801 |
+
3(2):117–160, 2004.
|
802 |
+
[9] D. Desjardins Côté. From finite vector field data to combinatorial dynamical systems in the
|
803 |
+
sense of forman. arXiv, 2021.
|
804 |
+
[10] C. Dowker. Homology groups of relations. Annals of Mathematics, pages 84–95, 1952.
|
805 |
+
[11] H. Edelsbrunner and J. L. Harer.
|
806 |
+
Computational Topology : An Introduction.
|
807 |
+
American
|
808 |
+
Mathematical Society, 2010.
|
809 |
+
[12] M. Erdmann. Topology of privacy: Lattice structures and information bubbles for inference
|
810 |
+
and obfuscation. arXiv, 2017.
|
811 |
+
[13] R. Forman. Combinatorial vector fields and dynamical systems. Mathematische Zeitschrift,
|
812 |
+
228:629–681, 1998.
|
813 |
+
[14] R. Ghrist, D. Lipsky, J. Derenick, and A. Speranzon. Topological landmark-based navigation
|
814 |
+
and mapping.
|
815 |
+
https://www2.math.upenn.edu/~ghrist/preprints/landmarkvisibility.
|
816 |
+
pdf. 2012.
|
817 |
+
[15] K. Hang Kim and F. W. Roush. On strong shift equivalence over a boolean semiring. Ergod.
|
818 |
+
Th. and Dynam. Sys., 6:81–97, 1986.
|
819 |
+
[16] T. Kaczynski, K. Mischaikow, and M. Mrozek. Computational Homology. Springer, 2004.
|
820 |
+
[17] T. Kaczynski and M. Mrozek. Conley index for discrete multivalued dynamical systems. Topol-
|
821 |
+
ogy and Its Appl., 65:83–96, 1995.
|
822 |
+
[18] T. Kaczynski, M. Mrozek, and T. Wanner. Towards a formal tie between combinatorial and
|
823 |
+
classical vector field dynamics. Journal of Computational Dynamics, 3(1):17–50, 2016.
|
824 |
+
[19] W. D. Kalies, K. Mischaukow, and R. C.A.M Vandervorst. Lattice structures for attractors i.
|
825 |
+
Journal of Computational Dynamics, 1(2):307–338, 2014.
|
826 |
+
20
|
827 |
+
|
828 |
+
[20] W. D. Kalies, K. Mischaukow, and R. C.A.M Vandervorst. Lattice structures for attractors ii.
|
829 |
+
Foundations of Computational Mathematics, 16:1151–1191, 2016.
|
830 |
+
[21] W. D. Kalies, K. Mischaukow, and R. C.A.M Vandervorst. Lattice structures for attractors iii.
|
831 |
+
Journal of Dynamics and Differential Equations, 34:1729–1768, 2022.
|
832 |
+
[22] K. H. Kim. Boolean Matrix Theory and Applications, volume (Monographs and textbooks in
|
833 |
+
pure and applied mathematics, v. 70). New York:Dekker, 1982.
|
834 |
+
[23] M. Lipiński, J. Kubica, M. Mrozek, and T. Wanner. Conley-Morse-Forman theory for general-
|
835 |
+
ized combinatorial multivector fields on finite topological spaces. arXiv:1911.12698 [math.DS],
|
836 |
+
pages 1–44, 2020.
|
837 |
+
[24] G. Minian Elias. The geometry of relations. Order, 27:213–224, 2010.
|
838 |
+
[25] M. Mrozek, R. Srzednicki, Thorpe J., and Th. Wanner. Combinatorial vs classical dynamics :
|
839 |
+
Recurrence. Commun. Nonlinear Sci. Numer. Simul., 108(106226):1–30, 2022.
|
840 |
+
[26] Marian Mrozek and Mateusz Przybylski. The szymczak functor on the category of finite sets
|
841 |
+
and finite relations. arXiv, 2022.
|
842 |
+
[27] J. R. Munkres. Elements of Algebraic Topology. Addison-Weslay, Cambridge, 1984.
|
843 |
+
[28] M. Robinson. Cosheaf representations of relations and Dowker complexes. Journal of Applied
|
844 |
+
and Computational Topology, 6:27–63, 2022.
|
845 |
+
[29] A. Szymczak. The Conley index for disccrete dynamical system. Topology Appl., 66:215–240,
|
846 |
+
1995.
|
847 |
+
[30] A. Szymczak. Index Pairs : From Dynamics to Combinatorics and Back. Ph.D. thesis, Georgia
|
848 |
+
Inst. Tech., 1999.
|
849 |
+
21
|
850 |
+
|
2tE2T4oBgHgl3EQfNgbv/content/tmp_files/load_file.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
3tFAT4oBgHgl3EQfERy2/vector_store/index.pkl
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:bef6153b8b6aacc6e9f04a30d478798323b02d2c9e31cb7f18182a3a29b9f73e
|
3 |
+
size 181842
|
4NE2T4oBgHgl3EQfjwdR/content/tmp_files/2301.03971v1.pdf.txt
ADDED
@@ -0,0 +1,1291 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
Unsupervised Mandarin-Cantonese Machine Translation
|
2 |
+
Megan Dare, Valentina Fajardo Diaz, Averie Ho Zoen So, Yifan Wang, Shibingfeng Zhang
|
3 |
+
Summer Semester Software Project 2022
|
4 |
+
Language Science and Technology, Saarland University
|
5 |
+
{mdare,valenfd,averieso,yifwang,[email protected]}
|
6 |
+
Abstract
|
7 |
+
Advancements in unsupervised machine trans-
|
8 |
+
lation have enabled the development of ma-
|
9 |
+
chine translation systems that can translate be-
|
10 |
+
tween languages for which there is not an
|
11 |
+
abundance of parallel data available. We ex-
|
12 |
+
plored unsupervised machine translation be-
|
13 |
+
tween Mandarin Chinese and Cantonese. De-
|
14 |
+
spite the vast number of native speakers of
|
15 |
+
Cantonese, there is still no large-scale corpus
|
16 |
+
for the language, due to the fact that Can-
|
17 |
+
tonese is primarily used for oral communica-
|
18 |
+
tion.
|
19 |
+
The key contributions of our project
|
20 |
+
include: 1.
|
21 |
+
The creation of a new corpus
|
22 |
+
containing approximately 1 million Cantonese
|
23 |
+
sentences, and 2.
|
24 |
+
A large-scale compari-
|
25 |
+
son across different model architectures, tok-
|
26 |
+
enization schemes, and embedding structures.
|
27 |
+
Our best model trained with character-based
|
28 |
+
tokenization and a Transformer architecture
|
29 |
+
achieved a character-level BLEU of 25.1 when
|
30 |
+
translating from Mandarin to Cantonese and of
|
31 |
+
24.4 when translating from Cantonese to Man-
|
32 |
+
darin. In this paper we discuss our research
|
33 |
+
process, experiments, and results.
|
34 |
+
1
|
35 |
+
Introduction
|
36 |
+
In recent years, neural machine translation has
|
37 |
+
gained massive research interests. Most of these
|
38 |
+
studies (e.g. Bahdanau et al. 2014; Luong et al.
|
39 |
+
2015; Wu et al. 2016; Vaswani et al. 2017) focus
|
40 |
+
on the construction of neural machine translation
|
41 |
+
systems leveraging parallel bilingual corpora. Nev-
|
42 |
+
ertheless, such an approach is not feasible for many
|
43 |
+
language pairs due to the scarcity of resources for
|
44 |
+
such pairs, as is the case for Cantonese and Man-
|
45 |
+
darin. The study of automatic translation between
|
46 |
+
these two languages faces the same problem: to
|
47 |
+
the best of our knowledge, despite the vast number
|
48 |
+
of native speakers of both languages, there is still
|
49 |
+
no large-scale Mandarin-Cantonese parallel corpus.
|
50 |
+
In addition, monolingual corpora for Cantonese are
|
51 |
+
hard to collect as it is a low-resource language that
|
52 |
+
is mainly used for only oral communication.
|
53 |
+
Currently, only a few studies have been done
|
54 |
+
on Cantonese-Mandarin translation, among which
|
55 |
+
some compare various low-resource models for
|
56 |
+
this language pair. However, these studies nor-
|
57 |
+
mally focus on a comparison between one or two
|
58 |
+
model types. Based on our motivation of imple-
|
59 |
+
menting and training a Cantonese-Mandarin trans-
|
60 |
+
lation model and current state of research, we set
|
61 |
+
our goal as building a robust model trained on
|
62 |
+
a more diverse dataset, which can help improve
|
63 |
+
communication between Cantonese and Mandarin
|
64 |
+
speakers. Additionally, we seek to compare vari-
|
65 |
+
ous model architectures, tokenization schemes, and
|
66 |
+
embedding structures to conduct a comprehensive
|
67 |
+
understanding on which settings may lead to the
|
68 |
+
best performance for the Cantonese-Mandarin lan-
|
69 |
+
guage pair.
|
70 |
+
After a close analysis of the current state of re-
|
71 |
+
search and the available resources, we propose to
|
72 |
+
develop a Cantonese-Mandarin machine translation
|
73 |
+
system that is capable of conducting translation in
|
74 |
+
both directions. The training of the system involves
|
75 |
+
only Mandarin and Cantonese monolingual corpora
|
76 |
+
collected from Wikipedia and various websites.
|
77 |
+
Our work also makes contributions to the Can-
|
78 |
+
tonese language NLP field by collecting Cantonese
|
79 |
+
textual data and building a public large-scale mono-
|
80 |
+
lingual corpus, which did not exist until now.
|
81 |
+
In addition, considering the similarity between
|
82 |
+
Cantonese and Mandarin, our translation system
|
83 |
+
will provide a foundation for further development
|
84 |
+
regarding machine translation tasks that center
|
85 |
+
around language pairs composed of two similar
|
86 |
+
languages.
|
87 |
+
2
|
88 |
+
Background
|
89 |
+
2.1
|
90 |
+
Cantonese and Chinese: an overview
|
91 |
+
Cantonese is one of the most widely spoken va-
|
92 |
+
rieties of Chinese other than Mandarin Chinese
|
93 |
+
(Matthews and Yip, 2013). It is estimated to have
|
94 |
+
arXiv:2301.03971v1 [cs.CL] 10 Jan 2023
|
95 |
+
|
96 |
+
more than 55 million native speakers, with large
|
97 |
+
populations found in southern China provinces
|
98 |
+
Guangdong and Guangxi, as well as regions includ-
|
99 |
+
ing Hong Kong and Macau, it is also commonly
|
100 |
+
spoken in overseas Cantonese communities in Sin-
|
101 |
+
gapore, Malaysia, North America and Australia as
|
102 |
+
a result of emigration (Matthews and Yip, 2013).
|
103 |
+
While numerous NLP applications have been
|
104 |
+
developed for Mandarin Chinese, little has been
|
105 |
+
developed for Cantonese. One reason for this is the
|
106 |
+
limited linguistic resources that have been collected
|
107 |
+
for Cantonese. Primarily a spoken language and a
|
108 |
+
non-standard variety, written Cantonese is not tra-
|
109 |
+
ditionally used or taught in schools. Instead, Can-
|
110 |
+
tonese speakers typically learn to read and write
|
111 |
+
in standard Chinese through education, so there is
|
112 |
+
no language barrier for Cantonese speakers when
|
113 |
+
interacting with computer applications designed in
|
114 |
+
standard Chinese.
|
115 |
+
On the other hand, with the availability of the
|
116 |
+
internet and the rise of social media, Cantonese is
|
117 |
+
much more commonly used and written online in
|
118 |
+
recent years, which can be seen as an indicator for
|
119 |
+
a market in Cantonese NLP applications.
|
120 |
+
It is important to note that this phenomenon
|
121 |
+
might only be applicable to Hong Kong Cantonese,
|
122 |
+
and not other variants such as the one in Guang-
|
123 |
+
dong province. More recent discussions about Can-
|
124 |
+
tonese, such as Bauer (2018), make a point to dis-
|
125 |
+
tinguish between the Hong Kong Cantonese variant
|
126 |
+
and the others, since the use of Cantonese is on the
|
127 |
+
rise in Hong Kong, while declining in provinces
|
128 |
+
within mainland China. Not only has this led to
|
129 |
+
Hong Kong being named “the Cantonese-speaking
|
130 |
+
capital of the world" (Bolton, 2011, p.64), but also
|
131 |
+
the rise of written Cantonese locally and subse-
|
132 |
+
quently, the Cantonese text data that are available
|
133 |
+
online, which are of the Hong Kong variant of Can-
|
134 |
+
tonese.
|
135 |
+
2.2
|
136 |
+
Linguistic Differences between Cantonese
|
137 |
+
and Mandarin
|
138 |
+
Despite the common misconception that Chinese
|
139 |
+
dialects share the same grammar, Cantonese and
|
140 |
+
Mandarin are different at phonological, lexical and
|
141 |
+
syntactic levels, and are not mutually intelligible
|
142 |
+
(Matthews and Yip, 2013). Some suggests it is
|
143 |
+
more accurate describe Cantonese as a distinct
|
144 |
+
language of the Chinese language family (Snow,
|
145 |
+
2004). For the rest of this section, we describe
|
146 |
+
some features that differ between Mandarin and
|
147 |
+
Hong Kong Cantonese.
|
148 |
+
2.2.1
|
149 |
+
Writing Systems
|
150 |
+
To anyone who can read Chinese, the most notable
|
151 |
+
visual variation in written Chinese is the writing
|
152 |
+
system - Traditional or Simplified Chinese. The
|
153 |
+
two systems are equivalent to each other, and have
|
154 |
+
one-to-one correspondence for each character. The
|
155 |
+
following is some examples of traditional / sim-
|
156 |
+
plified characters: “open" 開/开, “talk" 話/话 and
|
157 |
+
“book" 書/书. The usage of either system is primar-
|
158 |
+
ily due to regional difference, with mainland China
|
159 |
+
using the simplified system, while Hong Kong and
|
160 |
+
Taiwan use the traditional system.
|
161 |
+
2.2.2
|
162 |
+
Lexical and Syntactic comparisons
|
163 |
+
Vocabulary difference is the main barrier which
|
164 |
+
prevents Mandarin speakers from understanding
|
165 |
+
Cantonese (Snow, 2004), it is also the aspect which
|
166 |
+
is the most distinguishable between Cantonese and
|
167 |
+
Mandarin.
|
168 |
+
According to Snow (2004), written
|
169 |
+
Cantonese in formal domains can contain around
|
170 |
+
10-15% Cantonese-only characters, while this per-
|
171 |
+
centage in informal domains can go up to 25-40%.
|
172 |
+
Notably, the vocabulary that differ are some of
|
173 |
+
the most frequent words, including many func-
|
174 |
+
tion words, as seen in Table 1.
|
175 |
+
Syntactically,
|
176 |
+
Meaning
|
177 |
+
Cantonese
|
178 |
+
Mandarin
|
179 |
+
possessive marker
|
180 |
+
ge3
|
181 |
+
的de
|
182 |
+
perfective marker
|
183 |
+
zo2
|
184 |
+
了le
|
185 |
+
pronoun pluralizer
|
186 |
+
dei6
|
187 |
+
們mén
|
188 |
+
negator
|
189 |
+
唔m4
|
190 |
+
不bù
|
191 |
+
is (copula)
|
192 |
+
係hai6
|
193 |
+
是shì
|
194 |
+
this
|
195 |
+
呢ne1
|
196 |
+
這zhè
|
197 |
+
Table 1: Examples of lexical difference between Can-
|
198 |
+
tonese and Mandarin from Snow (2004, p.49). Can-
|
199 |
+
tonese romanizations follow the Jyutping system.
|
200 |
+
Cantonese and Mandarin are broadly similar but
|
201 |
+
with some differences that are often overlooked
|
202 |
+
(Matthews and Yip, 2013). Some common differ-
|
203 |
+
ences are in terms of word order, including indi-
|
204 |
+
rect object and comparative constructions (Snow,
|
205 |
+
2004):
|
206 |
+
Indirect object construction:
|
207 |
+
Cantonese:
|
208 |
+
我俾錢佢ngo5 bei2 cin4 keoi5
|
209 |
+
(I + give + money + he)
|
210 |
+
Mandarin:
|
211 |
+
我給他錢wó gˇei t¯a qían
|
212 |
+
2
|
213 |
+
|
214 |
+
(I + give + he + money)
|
215 |
+
‘I give him money’
|
216 |
+
Comparative construction:
|
217 |
+
Cantonese:
|
218 |
+
我高過佢ngo5 gou1 gwo3 keoi5
|
219 |
+
(I + tall + more than + he)
|
220 |
+
Mandarin:
|
221 |
+
我比他高wó bˇı t¯a g¯ao
|
222 |
+
(I + compared to + he + tall)
|
223 |
+
‘I’m taller than him.’
|
224 |
+
2.2.3
|
225 |
+
Challenges Unique to Cantonese NLP
|
226 |
+
Firstly, there exists a certain degree of variabil-
|
227 |
+
ity in written Cantonese since it was never stan-
|
228 |
+
dardised. As such, some words can be written
|
229 |
+
with completely different characters yet have the
|
230 |
+
same meanings and pronunciations. For example,
|
231 |
+
“like" can be written as 中意or 鍾意(read: zung1
|
232 |
+
ji31), “still" can be written as 仲or 重(read: zung6)
|
233 |
+
(Matthews and Yip, 2013). Additionally, when
|
234 |
+
some Cantonese words cannot be represented by
|
235 |
+
existing Chinese characters, they could be written
|
236 |
+
in a romanized form, such as the comparative (eg.
|
237 |
+
“-er" in “cheaper") can be written with “D", as well
|
238 |
+
as a non-romanized form (read: di1) (Snow, 2004;
|
239 |
+
Matthews and Yip, 2013).
|
240 |
+
Secondly, code-switching to English is a com-
|
241 |
+
mon phenomena in Cantonese, which is not a
|
242 |
+
feature in standard Chinese or Mandarin. Code-
|
243 |
+
switching in Hong Kong Cantonese is mostly in-
|
244 |
+
trasentential (below clause level) (Li, 2000), for
|
245 |
+
example:
|
246 |
+
我今朝9點有個meeting。
|
247 |
+
ngo5 dei6 gam1 ziu1 gau2 dim2 jau5 go3
|
248 |
+
MEETING
|
249 |
+
‘We have a meeting at 9am today.’
|
250 |
+
3
|
251 |
+
Related Work
|
252 |
+
3.1
|
253 |
+
Unsupervised Machine Translation
|
254 |
+
Unsupervised machine translation with no parallel
|
255 |
+
data is a challenging task that has attracted many
|
256 |
+
interests. The presence of cross-lingual embed-
|
257 |
+
dings (Mikolov et al., 2013; Artetxe et al., 2016,
|
258 |
+
2017a, 2018a,b; Conneau et al., 2017) provides
|
259 |
+
prior knowledge for machine translation systems
|
260 |
+
and makes it possible to train a machine transla-
|
261 |
+
tion model in an unsupervised way. Artetxe et al.
|
262 |
+
(2017b) and Lample et al. (2017) are the first at-
|
263 |
+
tempts to explore the possibility of constructing
|
264 |
+
1romanizations according to the Jyutping system.
|
265 |
+
a neural machine translation system using only
|
266 |
+
monolingual corpora from both source and target
|
267 |
+
languages. The proposed system is based on an
|
268 |
+
encoder-decoder architecture with attention mecha-
|
269 |
+
nism (Bahdanau et al., 2014), trained with a denois-
|
270 |
+
ing auto-encoding task (Vincent et al., 2008) and a
|
271 |
+
back-translation task (Sennrich et al., 2015). The
|
272 |
+
encoder is shared by both the source and target lan-
|
273 |
+
guages, so that sentences from both languages can
|
274 |
+
be mapped to a common latent space, while each
|
275 |
+
language has its own decoder to reconstruct en-
|
276 |
+
coded sentences back into its own language space.
|
277 |
+
Cross-lingual embeddings are leveraged as an ini-
|
278 |
+
tialization for the system, providing additional lex-
|
279 |
+
ical level information. Such a structural property
|
280 |
+
allows the translation model to be bi-directional,
|
281 |
+
that is, the same model can be employed in both the
|
282 |
+
L1-to-L2 translation task and the L2-to-L1 transla-
|
283 |
+
tion task.
|
284 |
+
This approach is extended in Lample et al. (2018)
|
285 |
+
by applying a transformer model and using sub-
|
286 |
+
word level tokenization methods. Attention-only
|
287 |
+
structures provide higher model capacity, and sub-
|
288 |
+
word level tokenization method Byte Pair Encod-
|
289 |
+
ing (BPE) reduce the size of vocabulary and helps
|
290 |
+
solving <UNK> problems in translation. Addition-
|
291 |
+
ally, they re-exploited the potential of statistical
|
292 |
+
approaches in unsupervised machine translation
|
293 |
+
tasks. A phrase-based machine translation model
|
294 |
+
initialized with an automatically populated phrase
|
295 |
+
table and language model is trained by iterative
|
296 |
+
back-translation. Results of the experiment show
|
297 |
+
that a statistical approach can reach similar perfor-
|
298 |
+
mance or even outperform neural systems when the
|
299 |
+
data is scarce, as the neural model tends to over-
|
300 |
+
fit the corpora, and thus does not generalize well.
|
301 |
+
Together with Singh and Singh (2020), they show
|
302 |
+
that unsupervised approaches can be used to con-
|
303 |
+
struct machine translation systems for low-source
|
304 |
+
languages (e.g., Urdu, Romanian, Manipuri).
|
305 |
+
In recent years, pre-trained language models
|
306 |
+
have become popular due to their competitive
|
307 |
+
ability of representing and generating natural lan-
|
308 |
+
guages learned from transfer learning on large-
|
309 |
+
scale self-supervised datasets. Lample and Con-
|
310 |
+
neau Lample and Conneau (2019) take their work
|
311 |
+
one step further by pre-training both the encoder
|
312 |
+
and decoder in their model using a cross-lingual
|
313 |
+
language model (XLM). They then fine-tune the
|
314 |
+
pre-trained model to an unsupervised neural ma-
|
315 |
+
chine translation model following the training pro-
|
316 |
+
3
|
317 |
+
|
318 |
+
cess described in Lample et al. (2018). The pre-
|
319 |
+
training stage results in a sharp BLEU score in-
|
320 |
+
crease over previous benchmarks for unsupervised
|
321 |
+
machine translation.
|
322 |
+
Unsupervised machine translation methods are
|
323 |
+
also applied in dialectal machine translation tasks,
|
324 |
+
where the similarity and commonality between lan-
|
325 |
+
guages can be leveraged. Farhan et al. (2020) uses
|
326 |
+
common words between Arabic dialects as anchor
|
327 |
+
points to steer projections of surrounding words be-
|
328 |
+
tween two dialects, creating a more accurate map-
|
329 |
+
ping between source and target words. In this way,
|
330 |
+
they construct an unsupervised machine translation
|
331 |
+
system with a BLEU score of 32.14, which is re-
|
332 |
+
markably high compared with the highest BLEU
|
333 |
+
score obtained in the supervised setting (48.25).
|
334 |
+
3.2
|
335 |
+
Mandarin-Cantonese Machine
|
336 |
+
Translation
|
337 |
+
Due to the scarcity of available datasets, Cantonese
|
338 |
+
language is always under-researched in NLP tasks.
|
339 |
+
This issue is even more severe in machine trans-
|
340 |
+
lation tasks, which usually requires large amount
|
341 |
+
of parallel data. For this reason, many researches
|
342 |
+
on Cantonese-Mandarin machine translation are
|
343 |
+
intended to collect more data or to fully exploit the
|
344 |
+
limited data in a semi-supervised or unsupervised
|
345 |
+
way.
|
346 |
+
Hei Yi Mak and Tan Lee (2021) construct a
|
347 |
+
large-scale Cantonese-Mandarin parallel dataset
|
348 |
+
by mining parallel sentences from Mandarin and
|
349 |
+
Cantonese Wikipedia. They apply a similarity-
|
350 |
+
based sentence alignment approach and use sen-
|
351 |
+
tence pairs with high confidence score as parallel
|
352 |
+
sentences. In this way, they end up with a paral-
|
353 |
+
lel corpus of about 100,000 sentences. They also
|
354 |
+
fine-tune a pre-trained language model using the
|
355 |
+
collected data and obtain a competitive translation
|
356 |
+
system that outperforms Baidu Fanyi, a commonly
|
357 |
+
used translator in China.
|
358 |
+
Concurrently, some efforts have been made to
|
359 |
+
create unsupervised Cantonese-Mandarin transla-
|
360 |
+
tion systems. (Wan et al., 2020) handles Cantonese-
|
361 |
+
Mandarin translation as a dialect translation prob-
|
362 |
+
lem. which attempts to exploit the commonality
|
363 |
+
between two language dialects. On the basis of
|
364 |
+
(Lample et al., 2018)’s transformer model, they
|
365 |
+
make use of pivot-private embeddings and layer
|
366 |
+
coordination to better utilize the similarity and dif-
|
367 |
+
ference between the two languages. Trained on
|
368 |
+
two large monolingual datasets of 20 million collo-
|
369 |
+
quial sentences for each Mandarin and Cantonese,
|
370 |
+
their model reaches an improvement of up to 12
|
371 |
+
BLEU score for Cantonese to Mandarin, and 5
|
372 |
+
BLEU from Mandarin to Cantonese compared to
|
373 |
+
their baseline transformer model.
|
374 |
+
There have been other works relying on pre-
|
375 |
+
trained cross-lingual language models (XLM). In
|
376 |
+
Wong and Tsai (2022), the authors initialize the
|
377 |
+
encoder and decoder with XLM as described in
|
378 |
+
(Lample and Conneau, 2019), while using pivot-
|
379 |
+
private embeddings rather than cross-lingual em-
|
380 |
+
beddings. Using this enriched structure, they are
|
381 |
+
able to achieve slight BLEU score improvements
|
382 |
+
over previous XLM models.
|
383 |
+
4
|
384 |
+
Corpus Construction
|
385 |
+
While existing Cantonese corpora are scarce, and
|
386 |
+
usually collected for linguistic purposes which is
|
387 |
+
smaller in scale and of a specific demographic (eg.
|
388 |
+
Wong et al. 2017; Luke and Wong 2015), text data
|
389 |
+
is available on the internet due to Cantonese being
|
390 |
+
the common language used on social media. This
|
391 |
+
also led to a rise in Cantonese writing in tradition-
|
392 |
+
ally more formal domains such as advertisements,
|
393 |
+
online news and subtitles.
|
394 |
+
Therefore, we aim for the corpus to span across
|
395 |
+
various domains for a comprehensive collection of
|
396 |
+
modern Cantonese usage. Secondly, since standard
|
397 |
+
Chinese is also commonly used among Cantonese
|
398 |
+
speakers in online settings, in the data selection pro-
|
399 |
+
cess, we aim to avoid sources which use standard
|
400 |
+
Chinese. Lastly, in our pre-processing, we preserve
|
401 |
+
some unique features in Cantonese such as code-
|
402 |
+
switching in English. Detailed data statistics of the
|
403 |
+
corpus is available on the Github repository.
|
404 |
+
As we focus on collecting data for Cantonese,
|
405 |
+
note that we simply use the Chinese Wikipedia
|
406 |
+
for Mandarin data, since there is already a large
|
407 |
+
amount of data available just from one source.
|
408 |
+
4.1
|
409 |
+
Data Collection
|
410 |
+
The Cantonese data available from various sources
|
411 |
+
on the internet are either readily downloadable (for
|
412 |
+
Wikipedia, corpus and dictionary) or are scraped
|
413 |
+
by us (for Instagram, subtitles and articles). Due to
|
414 |
+
structural differences in the various websites, scrap-
|
415 |
+
ing functions are individually written for each of
|
416 |
+
the three classes of sources. In general, the script
|
417 |
+
moves recursively over the website domain and
|
418 |
+
extracts any text in each web page. The scraping
|
419 |
+
script is available on our GitHub repository. Fig-
|
420 |
+
4
|
421 |
+
|
422 |
+
ure 1 shows the distribution in data domain of the
|
423 |
+
Cantonese training dataset, which contains only
|
424 |
+
monolingual data sources.
|
425 |
+
4.1.1
|
426 |
+
Monolingual Data
|
427 |
+
Cantonese Wikipedia
|
428 |
+
The largest source of data
|
429 |
+
available was Cantonese Wikipedia, which was
|
430 |
+
downloaded from Wikimedia dump2, then pure
|
431 |
+
text data is obtained with WikiExtractor (Attardi,
|
432 |
+
2015). Cantonese Wikipedia amounts to 690k lines
|
433 |
+
of text, making up 70% of the Cantonese corpus
|
434 |
+
overall.
|
435 |
+
Corpus
|
436 |
+
As mentioned, there is a small number
|
437 |
+
of open source Cantonese corpora collected for aca-
|
438 |
+
demic purposes, mainly transcribed from spoken
|
439 |
+
Cantonese. Additionally, there is another corpus
|
440 |
+
which contains scraped text data. Existing corpora
|
441 |
+
add up to 95k lines of Cantonese text, with the ma-
|
442 |
+
jority coming from Openrice restraurant reviews
|
443 |
+
(78k).
|
444 |
+
• openrice-senti3: scraped restaurant reviews
|
445 |
+
from popular Hong Kong website OpenRice
|
446 |
+
(https://www.openrice.com/zh/
|
447 |
+
hongkong).
|
448 |
+
• HK Cantonese Corpus4 (Wong et al., 2017):
|
449 |
+
manually
|
450 |
+
transcribed
|
451 |
+
oral
|
452 |
+
conversations
|
453 |
+
recorded between 1997-1998, includes spon-
|
454 |
+
taneous speech as well as radio programmes.
|
455 |
+
• tatoeba5: a website which contains crowd-
|
456 |
+
sourced sentences and their translations in
|
457 |
+
many languages, including Cantonese.
|
458 |
+
Instagram
|
459 |
+
Due to its popularity in Hong Kong,
|
460 |
+
the domains from Instagram can be varied, ranging
|
461 |
+
from blogs, advertisements, news and governmen-
|
462 |
+
tal organisations. We scrape posts and comments
|
463 |
+
via imginn.org from 14 accounts, 5 of which
|
464 |
+
are categorised as news, the others are categorised
|
465 |
+
as non-news. Instagram comments make up the
|
466 |
+
second largest source of Cantonese data with 108k
|
467 |
+
lines (11%), while Instagram news are 58k lines
|
468 |
+
and Instagram non-news 30k lines.
|
469 |
+
Subtitles
|
470 |
+
Cantonese YouTube6
|
471 |
+
is a crowd-
|
472 |
+
sourced compilation of youtube videos with spo-
|
473 |
+
ken Cantonese subtitles. It is a voluntary effort
|
474 |
+
2https://dumps.wikimedia.org/zh_yuewiki/20220601
|
475 |
+
3https://github.com/toastynews/openrice-senti
|
476 |
+
4https://github.com/fcbond/hkcancor
|
477 |
+
5https://tatoeba.org/en
|
478 |
+
6https://docs.google.com/spreadsheets/d/1CmN8GPalrb4
|
479 |
+
5YFIPrWgh7GRYyoUhnizEOImY6kAW82w
|
480 |
+
Figure 1: Distribution of data domain in the Cantonese
|
481 |
+
training set (monolingual data only).
|
482 |
+
from Cantonese learners, and each video is manu-
|
483 |
+
ally tagged with “Written Cantonese" or “Standard
|
484 |
+
Written Chinese", which allows us to filter for only
|
485 |
+
Cantonese videos. We are able to scrape directly
|
486 |
+
from Youtube with the help of the Youtube Tran-
|
487 |
+
script API7. There are 1,620 lines.
|
488 |
+
Articles
|
489 |
+
We scrape blog articles written by vari-
|
490 |
+
ous authors in Cantonese from the freelancer plat-
|
491 |
+
form https://handstopmouthstop.com.
|
492 |
+
There are 6,531 lines from the website.
|
493 |
+
4.1.2
|
494 |
+
Parallel Data
|
495 |
+
As the experiments described in the future sections
|
496 |
+
are unsupervised, parallel data is not included in
|
497 |
+
the training set. They are only used for the test set.
|
498 |
+
Corpus
|
499 |
+
Cantonese-HK and Chinese-HK Uni-
|
500 |
+
versal Dependencies Treebank8(Luke and Wong,
|
501 |
+
2015): manually transcribed and annotated film
|
502 |
+
subtitles and legislative proceedings of Hong Kong,
|
503 |
+
in both Cantonese and Mandarin. There are 1,004
|
504 |
+
parallel sentences from this corpus.
|
505 |
+
Dictionary
|
506 |
+
Kaifangcidian9
|
507 |
+
is
|
508 |
+
an
|
509 |
+
online
|
510 |
+
Cantonese-Chinese dictionary which comes with
|
511 |
+
parallel sentences for each lexical entry. There are
|
512 |
+
13,004 parallel sentences from the dictionary.
|
513 |
+
Subtitles
|
514 |
+
Kongjisubtitles 10 is a Cantonese sub-
|
515 |
+
title team that specialises in “kongji"(meaning
|
516 |
+
“Hong Kong words" in romanized Cantonese) and
|
517 |
+
focuses on subtitling Thai online series. Since
|
518 |
+
7https://github.com/jdepoix/youtube-transcript-api
|
519 |
+
8https://github.com/UniversalDependencies/UD_Cantonese-
|
520 |
+
HK
|
521 |
+
9https://kaifangcidian.com/han/yue/
|
522 |
+
10https://sites.google.com/view/lihkg-kongjisubtitles
|
523 |
+
5
|
524 |
+
|
525 |
+
instagram comments
|
526 |
+
restaurantreviews
|
527 |
+
11%
|
528 |
+
8%
|
529 |
+
instagram news
|
530 |
+
6%
|
531 |
+
instagram non-news
|
532 |
+
3%
|
533 |
+
2%
|
534 |
+
corpus
|
535 |
+
1%
|
536 |
+
subtitles & articles
|
537 |
+
70%
|
538 |
+
wikipediasome of the same videos also have Mandarin subti-
|
539 |
+
tles, we align them based on the timestamps of the
|
540 |
+
videos. This amounts to 77,479 lines of parallel
|
541 |
+
data.
|
542 |
+
4.2
|
543 |
+
Pre-processing
|
544 |
+
Our data is scraped from different resources and
|
545 |
+
inevitably contains noise. The following tools are
|
546 |
+
leveraged for the pre-processing of collected data:
|
547 |
+
Sentence Cutter
|
548 |
+
Sentence cutter cuts each text
|
549 |
+
into sentences. The cutting points are punctuation
|
550 |
+
marks such as 。.!? that defines the end of a sen-
|
551 |
+
tence.
|
552 |
+
Mandarin-Cantonese Filter
|
553 |
+
Due to the fact that
|
554 |
+
most Cantonese speakers are also native in Man-
|
555 |
+
darin, Mandarin text is normally present in Can-
|
556 |
+
tonese data scraped from social media. Mandarin-
|
557 |
+
Cantonese Filter aims to determine whether a sen-
|
558 |
+
tence is written in Mandarin or Cantonese by calcu-
|
559 |
+
lating the number of language-specific characters.
|
560 |
+
This tool is involved only in the pre-processing of
|
561 |
+
Cantonese data.
|
562 |
+
Cantonese-specific characters are: , 唔, 係, , 啦,
|
563 |
+
, 既, 咁, 佢, , 冇, 仲, , 乜, 噉, 咪, 咩, 俾, 呢, , 黎, ,
|
564 |
+
喂, 喇, 喎, 睇
|
565 |
+
Mandarin-specific characters are: 是, 的, 他, 她,
|
566 |
+
沒, 也, 看, 說, 在,说
|
567 |
+
Foreign Text Filter
|
568 |
+
Text written in foreign lan-
|
569 |
+
guages such as Russian, Japanese and Korean
|
570 |
+
abounds in collected data.
|
571 |
+
Foreign Text Filter
|
572 |
+
serves to filter out all sentences that are not writ-
|
573 |
+
ten in Chinese characters. If the Chinese charac-
|
574 |
+
ters contributes to less than 5% of sentence’s total
|
575 |
+
length, the sentence is removed.
|
576 |
+
url, emoji, hashtag Remover
|
577 |
+
This tool serves
|
578 |
+
to remove url, emoji, and hashtag from sentence
|
579 |
+
using regular expression.
|
580 |
+
Jieba Tokenizer
|
581 |
+
Jieba 11 is a Mandarin NLP li-
|
582 |
+
brary. In our project, we used Jieba tokenizer to
|
583 |
+
pre-process our Mandarin data.
|
584 |
+
PyCantonese Tokenizer
|
585 |
+
PyCantonese 12 is a
|
586 |
+
Cantonese NLP library. In our project, we used Py-
|
587 |
+
Cantonese tokenizer to pre-process our Cantonese
|
588 |
+
data.
|
589 |
+
We did not include any Mandarin data from so-
|
590 |
+
cial media in our dataset, considering that data
|
591 |
+
11https://github.com/fxsjy/jieba
|
592 |
+
12https://pycantonese.org/
|
593 |
+
(a) Mandarin corpus
|
594 |
+
(b) Cantonese corpus
|
595 |
+
Figure 2: Distribution of sentence length.
|
596 |
+
scraped from social media is always full of noises
|
597 |
+
and Mandarin data from Wikipedia is already abun-
|
598 |
+
dant for our task. We included Cantonese data
|
599 |
+
scraped from social media since Cantonese data
|
600 |
+
from Wikipedia is not sufficient.
|
601 |
+
4.2.1
|
602 |
+
Overall Data Statistics
|
603 |
+
After pre-processing, there are 912,258 lines of
|
604 |
+
monolingual Cantonese data and 16M lines of
|
605 |
+
monolingual Mandarin data. In terms of domains,
|
606 |
+
the Cantonese corpus has 70% data from Wikipedia
|
607 |
+
while the Mandarin corpus is 100% Wikipedia. Fig-
|
608 |
+
ure 2 shows that the distribution of sentence length
|
609 |
+
in Cantonese and Mandarin are broadly similar af-
|
610 |
+
ter pre-processing.
|
611 |
+
5
|
612 |
+
Methodology
|
613 |
+
As shown in Figure 3, we follow a standard un-
|
614 |
+
supervised machine translation architecture with
|
615 |
+
a shared encoder and language-specific decoders
|
616 |
+
in our experiment. Models are trained on a de-
|
617 |
+
6
|
618 |
+
|
619 |
+
1e6
|
620 |
+
1.4
|
621 |
+
1.2
|
622 |
+
1.0
|
623 |
+
frequency
|
624 |
+
0.8
|
625 |
+
0.6
|
626 |
+
0.4
|
627 |
+
0.2
|
628 |
+
0.0
|
629 |
+
0
|
630 |
+
5
|
631 |
+
10
|
632 |
+
15
|
633 |
+
20
|
634 |
+
25
|
635 |
+
30
|
636 |
+
sentencelength(punctuationincluded)60000
|
637 |
+
50000
|
638 |
+
40000
|
639 |
+
frequency
|
640 |
+
30000
|
641 |
+
20000
|
642 |
+
10000
|
643 |
+
0
|
644 |
+
0
|
645 |
+
5
|
646 |
+
10
|
647 |
+
15
|
648 |
+
20
|
649 |
+
25
|
650 |
+
30
|
651 |
+
sentencelength(punctuationincluded)Figure 3: General architecture of the unsupervised machine translation systems in this experiment. A shared
|
652 |
+
encoder maps sentences from L1/L2 to a common latent space, then a language-specific decoder reconstructs the
|
653 |
+
encoded sentence back into its own language space. The model is trained by a denoising auto-encoding task and a
|
654 |
+
back-translation task.
|
655 |
+
noising auto-encoding task and an on-the-fly back-
|
656 |
+
translation task. To have an overall study of how
|
657 |
+
different setups affect the model performance, we
|
658 |
+
make three sets of comparisons:
|
659 |
+
1. Model architectures.
|
660 |
+
2. Cross-lingual embeddings.
|
661 |
+
3. Tokenization methods.
|
662 |
+
5.1
|
663 |
+
Model Architectures
|
664 |
+
In this experiment, we compare an RNN-based
|
665 |
+
attention model and a transformer model.
|
666 |
+
• RNN-based model: We adopt the architecture
|
667 |
+
from (Artetxe et al., 2017b): Both encoder
|
668 |
+
and decoder have 2-layer bidirectional GRU
|
669 |
+
(Cho et al., 2014), Luong’s attention (Luong
|
670 |
+
et al., 2015) is applied to align the source sen-
|
671 |
+
tence and translation. Input sentences are con-
|
672 |
+
verted to 512-dimensional cross-lingual em-
|
673 |
+
beddings. Considering the relatively lower ca-
|
674 |
+
pacity, the cross-lingual embeddings are fixed
|
675 |
+
during training.
|
676 |
+
• Transformer model: Following (Lample et al.,
|
677 |
+
2018), we use 4-layer encoder and decoder
|
678 |
+
with 3-layer sharing parameters for both Can-
|
679 |
+
tonese and Mandarin sides.
|
680 |
+
When gener-
|
681 |
+
ating translations, the decoder starts with a
|
682 |
+
language-specific <BOS> token, specifying
|
683 |
+
the language it is operating with. The embed-
|
684 |
+
ding matrices are trainable during the training
|
685 |
+
process.
|
686 |
+
5.2
|
687 |
+
Cross-lingual Embeddings
|
688 |
+
Cross-lingual embeddings can be learned in various
|
689 |
+
different ways. In our experiments we compare the
|
690 |
+
following three approaches:
|
691 |
+
• Mapping: It has been extensively studied how
|
692 |
+
to map monolingual word embeddings into
|
693 |
+
a cross-lingual space.(Mikolov et al., 2013;
|
694 |
+
Artetxe et al., 2016, 2017a, 2018a,b; Conneau
|
695 |
+
et al., 2017) In this project, we use Vecmap
|
696 |
+
13 by Artexte to obtain cross-lingual embed-
|
697 |
+
dings from monolingual ones. In particular,
|
698 |
+
we adopt the “identical” setting, where the
|
699 |
+
shared vocabulary in two languages can be
|
700 |
+
used as anchors to learn the mapping. This
|
701 |
+
approach is applied to RNN-based models.
|
702 |
+
• Learning from concatenated data: Another
|
703 |
+
setup is to learn embeddings on the concatena-
|
704 |
+
tion of source and target corpora in a monolin-
|
705 |
+
gual way. As embeddings are learned in the
|
706 |
+
context of both languages, the resultant em-
|
707 |
+
beddings can be seen as cross-lingual. This
|
708 |
+
approach is applied on both RNN-based mod-
|
709 |
+
els and transformer models.
|
710 |
+
• Pivot-private embeddings: We also experi-
|
711 |
+
ment with 512-dimensional pivot-private em-
|
712 |
+
beddings which consists of a 256-dimensional
|
713 |
+
cross-lingual embedding learned on the con-
|
714 |
+
catenated dataset and a 256-dimensional pri-
|
715 |
+
vate embedding, which is learned on two
|
716 |
+
monolingual datasets separately.
|
717 |
+
This ap-
|
718 |
+
proach is assumed to be able to capture the
|
719 |
+
commonality between both languages and pre-
|
720 |
+
serve language-specific characteristics as well
|
721 |
+
(Wan et al., 2020). We adopt this approach on
|
722 |
+
transformer models.
|
723 |
+
5.3
|
724 |
+
Tokenization Methods
|
725 |
+
We are also interested whether byte-pair encod-
|
726 |
+
ing helps training Cantonese-Mandarin translation
|
727 |
+
systems, so we compare it to a character-level tok-
|
728 |
+
enization method.
|
729 |
+
13https://github.com/artetxem/vecmap
|
730 |
+
7
|
731 |
+
|
732 |
+
L1 decoder
|
733 |
+
L1output
|
734 |
+
Sharedencoder(L1/L2)
|
735 |
+
L2 decoder
|
736 |
+
L2output
|
737 |
+
Cross-lingual
|
738 |
+
embeddings
|
739 |
+
L1/L2 input• Word-level tokenization: As a baseline, we do
|
740 |
+
no further tokenization on the collected data
|
741 |
+
which is separated by words using Jieba and
|
742 |
+
PyCantonese. In this setting, a total number
|
743 |
+
of 80K/1M unique words are present in the
|
744 |
+
Cantonese/Mandarin corpora respectively.
|
745 |
+
• Character-level tokenization: Since Mandarin
|
746 |
+
and Cantonese are both analytic languages,
|
747 |
+
character-level tokenization is a valid option
|
748 |
+
to tokenize sentences. This results in 8K/14K
|
749 |
+
unique tokens in Cantonese/Mandarin training
|
750 |
+
data respectively.
|
751 |
+
• Byte-pair encoding: We also use byte-pair
|
752 |
+
encoding to obtain a vocabulary of 50K sub-
|
753 |
+
words on word-tokenized datasets. The em-
|
754 |
+
beddings of sub-words are learned using meth-
|
755 |
+
ods described above.
|
756 |
+
6
|
757 |
+
Experiments and Results
|
758 |
+
In this section, we describe the experiments we
|
759 |
+
conducted and the results of both automatic and hu-
|
760 |
+
man evaluation. Our code and relevant repositories
|
761 |
+
are publicly available online 14.
|
762 |
+
6.1
|
763 |
+
Task Setup
|
764 |
+
6.1.1
|
765 |
+
Baseline Model
|
766 |
+
Due to the large overlap in vocabulary between
|
767 |
+
Mandarin and Cantonese and the lack of compli-
|
768 |
+
cated morphology in both languages, for our base-
|
769 |
+
line model we take advantage of these character-
|
770 |
+
istics by evaluating Mandarin sentences as if they
|
771 |
+
were a translation into Cantonese, and visa-versa.
|
772 |
+
This method is carried out by simply converting
|
773 |
+
both Mandarin and Cantonese evaluation datasets
|
774 |
+
to the same character set using OpenCC 15 (our
|
775 |
+
experiments used the Traditional Chinese (Hong
|
776 |
+
Kong variant) character set) and evaluating the
|
777 |
+
BLEU score directly.
|
778 |
+
6.1.2
|
779 |
+
RNN-based Experiments
|
780 |
+
In order to improve upon the baseline model perfor-
|
781 |
+
mance, we train several models using Artetxe’s
|
782 |
+
RNN+Attention-based architecture for unsuper-
|
783 |
+
vised machine translation 16. The primary objec-
|
784 |
+
tive, aside from improving BLEU scores over the
|
785 |
+
baseline, is to identify which settings (e.g. tok-
|
786 |
+
enization scheme and embedding training method)
|
787 |
+
14https://github.com/meganndare/cantonese-nlp
|
788 |
+
15https://github.com/BYVoid/OpenCC
|
789 |
+
16https://github.com/artetxem/undreamt
|
790 |
+
lead to the best model performance. As detailed in
|
791 |
+
the methodology section we experiment with word,
|
792 |
+
character, and byte-pair encoding (BPE) tokeniza-
|
793 |
+
tion, as well as cross-lingual embeddings obtained
|
794 |
+
by learning a mapping into cross-lingual space, and
|
795 |
+
by concatenation and training a skip-gram model.
|
796 |
+
Additionally, for the BPE-tokenized models we
|
797 |
+
have experimented with learning the BPE tokens
|
798 |
+
separately for each language, or jointly.
|
799 |
+
6.1.3
|
800 |
+
Balanced Dataset Experiments
|
801 |
+
One characteristic of our full training dataset is that
|
802 |
+
it is imbalanced (1 million Cantonese sentences
|
803 |
+
versus 16 million Mandarin sentences). This is
|
804 |
+
due to the abundance of Mandarin text data and
|
805 |
+
the scarcity of Cantonese text data available. As
|
806 |
+
a result, we were curious to understand whether
|
807 |
+
having an imbalanced dataset negatively affects
|
808 |
+
our training results. To this end we conducted an
|
809 |
+
experiment using what we refer to as our ’Balanced
|
810 |
+
Dataset’. To create the set, Mandarin sentences are
|
811 |
+
chosen at random to be removed from the training
|
812 |
+
set until a downsampled version of approximately
|
813 |
+
the same size as the Cantonese training set was ob-
|
814 |
+
tained, that also preserves the sentence length dis-
|
815 |
+
tribution of the original Mandarin training set. We
|
816 |
+
then compare the performance of models trained
|
817 |
+
using the balanced dataset to those trained using the
|
818 |
+
full set, utilizing some simple baseline settings for
|
819 |
+
comparison, namely word and character-tokenized
|
820 |
+
models.
|
821 |
+
6.1.4
|
822 |
+
Transformer Experiments
|
823 |
+
Guided by advancements in neural network model
|
824 |
+
architectures over the past several years, we are
|
825 |
+
interested in how using a transformer architecture
|
826 |
+
would impact our results. For the transformer ex-
|
827 |
+
periments we leveraged Facebook Research’s Un-
|
828 |
+
supervised Neural Machine Translation Model 17
|
829 |
+
for training. Using the results from our RNN-based
|
830 |
+
models, we primarily focused on character and
|
831 |
+
BPE tokenization schemes, and have also experi-
|
832 |
+
mented with a more complex cross-lingual embed-
|
833 |
+
ding type called pivot-private embeddings. Due to
|
834 |
+
differences in implementation between the RNN
|
835 |
+
and Transformer-based models, we were unable
|
836 |
+
to train Vecmap embeddings for this set of experi-
|
837 |
+
ments.
|
838 |
+
17https://github.com/facebookresearch/UnsupervisedMT
|
839 |
+
8
|
840 |
+
|
841 |
+
Model Name
|
842 |
+
Can>Man Char BLEU
|
843 |
+
Man>Can Char BLEU
|
844 |
+
Baseline (Character Conversion) Model
|
845 |
+
13.3
|
846 |
+
13.2
|
847 |
+
RNN (Word Tok + Vecmap Embed)
|
848 |
+
13.1
|
849 |
+
14.9
|
850 |
+
RNN (Char Tok + Vecmap Embed)
|
851 |
+
19.8
|
852 |
+
22.5
|
853 |
+
RNN (Char Tok + Concat Embed)
|
854 |
+
19.4
|
855 |
+
20.3
|
856 |
+
RNN (BPE Tok learned separately + Vecmap Embed)
|
857 |
+
18.0
|
858 |
+
18.8
|
859 |
+
RNN (BPE Tok learned jointly + Vecmap Embed)
|
860 |
+
19.3
|
861 |
+
19.5
|
862 |
+
RNN (Balanced Dataset + Word Tok + Vecmap Embed)
|
863 |
+
6.2
|
864 |
+
11.5
|
865 |
+
RNN (Balanced Dataset + Char Tok + Vecmap Embed)
|
866 |
+
17.1
|
867 |
+
20.4
|
868 |
+
Transformer (Char Tok + Concat Embed)**
|
869 |
+
24.4
|
870 |
+
25.1
|
871 |
+
Transformer (Char Tok + Pivot-Private Embed)
|
872 |
+
21.2
|
873 |
+
20.5
|
874 |
+
Transformer (BPE Tok learned jointly + Concat Embed)
|
875 |
+
20.2
|
876 |
+
17.4
|
877 |
+
Table 2: Overview of all automatic evaluation results. All BLEU (Bilingual Evaluation Understudy) metric
|
878 |
+
scores are calculated at the character-level. Best-performing model indicated by **.
|
879 |
+
6.2
|
880 |
+
Results
|
881 |
+
6.2.1
|
882 |
+
Automatic Evaluation
|
883 |
+
Model Architectures
|
884 |
+
The first metric that our
|
885 |
+
study sought to investigate was the varying per-
|
886 |
+
formances of Mandarin-Cantonese unsupervised
|
887 |
+
machine translation based on the underlying neu-
|
888 |
+
ral network architecture, namely an RNN-based
|
889 |
+
architecture versus a Transformer architecture. We
|
890 |
+
observed that the transformer model led to higher
|
891 |
+
BLEU scores when other factors are constant. This
|
892 |
+
can be observed in the RNN (Char Tok + Con-
|
893 |
+
cat Embed) versus Transformer (Char Tok + Con-
|
894 |
+
cat Embed) models, where Cantonese-to-Mandarin
|
895 |
+
translation yielded 19.4 versus 24.4, respectively;
|
896 |
+
and Mandarin-to-Cantonese yielded 20.3 versus
|
897 |
+
25.1, respectively. In fact, our highest performing
|
898 |
+
model from the study was trained on a Transformer
|
899 |
+
architecture.
|
900 |
+
Cross-lingual
|
901 |
+
Embeddings
|
902 |
+
The
|
903 |
+
study
|
904 |
+
also
|
905 |
+
makes comparisons between different types of
|
906 |
+
cross-lingual embeddings.
|
907 |
+
Of primary interest
|
908 |
+
are training monolingual embeddings and map-
|
909 |
+
ping them to a shared cross-lingual space using
|
910 |
+
Vecmap (as detailed in the Methodology section),
|
911 |
+
and learning embeddings from the concatenated
|
912 |
+
data. In a comparison between RNN (Char Tok
|
913 |
+
+ Vecmap Embed) and RNN (Char Tok + Con-
|
914 |
+
cat Embed) models, we can see that the mapping-
|
915 |
+
based cross-lingual embeddings have outperformed
|
916 |
+
the concatenation-based technique, yielding a
|
917 |
+
Cantonese-to-Mandarin BLEU of 19.8 and 19.4,
|
918 |
+
respectively; and a Mandarin-to-Cantonese BLEU
|
919 |
+
of 22.5 and 20.3, respectively.
|
920 |
+
In addition to mapping-based and concatenation-
|
921 |
+
based cross-lingual embeddings, we also had time
|
922 |
+
to run one experiment on pivot-private embeddings
|
923 |
+
(as detailed in the Methodology section). By com-
|
924 |
+
paring the Transformer (Char Tok + Concat Em-
|
925 |
+
bed) and Transformer (Char Tok + Pivot-Private
|
926 |
+
Embed) models, we observe that concatenation-
|
927 |
+
based embeddings outperform pivot-private em-
|
928 |
+
beddings, with a Cantonese-to-Mandarin BLEU
|
929 |
+
of 24.4 versus 21.2, and a Mandarin-to-Cantonese
|
930 |
+
BLEU of 25.1 to 20.5, respectively.
|
931 |
+
Tokenization Methods
|
932 |
+
Our study additionally
|
933 |
+
makes a comparison between different types of
|
934 |
+
tokenization methods: word, character, and BPE-
|
935 |
+
tokenized models. Word-tokenization always per-
|
936 |
+
forms the worst, in all cases aside from one (see
|
937 |
+
RNN (Word Tok + Vecmap Embed) Mandarin-to-
|
938 |
+
Cantonese results in Table 2), models trained with
|
939 |
+
word-tokenized training data did not outperform
|
940 |
+
even the Baseline (Character Conversion) Model
|
941 |
+
in which no neural network was trained.
|
942 |
+
While BPE-tokenized data tends to perform very
|
943 |
+
well for languages with an alphabet system, such
|
944 |
+
as French or English, we did not observe a such
|
945 |
+
a strong result in the models trained using BPE-
|
946 |
+
tokenized data for the Mandarin-Cantonese lan-
|
947 |
+
guage pair. We experimented by learning BPE
|
948 |
+
token vocabularies both separately and jointly, ob-
|
949 |
+
serving a slight performance improvement when
|
950 |
+
learned jointly. However, neither BPE setting could
|
951 |
+
outperform our character-tokenized models (see Ta-
|
952 |
+
ble 2 for two results that lead to this conclusion:
|
953 |
+
RNN (Char Tok + Vecmap Embed) versus RNN
|
954 |
+
9
|
955 |
+
|
956 |
+
(BPE Tok learned jointly + Vecmap Embed), as well
|
957 |
+
as Transformer (Char Tok + Concat Embed) versus
|
958 |
+
Transformer (BPE Tok learned jointly + Concat
|
959 |
+
Embed)).
|
960 |
+
Balanced Dataset
|
961 |
+
We conclude that neither
|
962 |
+
word nor character-tokenized models trained on
|
963 |
+
the balanced dataset outperformed models trained
|
964 |
+
using the full training dataset. Thus, it is advanta-
|
965 |
+
geous to use as much data as possible for model
|
966 |
+
training, even if the two languages have an uneven
|
967 |
+
amount of sentences.
|
968 |
+
6.2.2
|
969 |
+
Human Evaluation
|
970 |
+
We conduct human evaluation on the Transformer
|
971 |
+
(Char Tok + Concat Embed) model output in order
|
972 |
+
to assess the extent to which our translation system
|
973 |
+
would be useful to Cantonese and Mandarin speak-
|
974 |
+
ers respectively. Considering that Cantonese speak-
|
975 |
+
ers can understand Standard Chinese, a translation
|
976 |
+
system from Mandarin to Cantonese should aim
|
977 |
+
for localisation and fluency in Cantonese, while not
|
978 |
+
losing the original meaning of the sentence. On the
|
979 |
+
other hand, the primary purpose of a Cantonese-
|
980 |
+
to-Mandarin translation system is to facilitate Can-
|
981 |
+
tonese comprehension for Mandarin speakers. For
|
982 |
+
these diverging purposes in our translation direc-
|
983 |
+
tions, we manually evaluate each translation direc-
|
984 |
+
tion with separate criteria, which is explained in
|
985 |
+
the following sections.
|
986 |
+
Procedure
|
987 |
+
100 lines from the test set are selected
|
988 |
+
for evaluation, identical for both translation di-
|
989 |
+
rections. One native speaker of each target lan-
|
990 |
+
guage evaluates for that direction only (i.e. Can-
|
991 |
+
tonese speaker evaluates Mandarin to Cantonese
|
992 |
+
sentences, and visa-versa). During evaluation, the
|
993 |
+
evaluator has access to the original input and the
|
994 |
+
target output. The evaluation decision is binary for
|
995 |
+
both criteria, the evaluator can only choose either
|
996 |
+
YES or NO. In the example sentences below, Man-
|
997 |
+
darin features are highlighted in orange, Cantonese
|
998 |
+
features are highlighted in teal and ungrammatical
|
999 |
+
features are highlighted in red.
|
1000 |
+
Cantonese to Mandarin
|
1001 |
+
System outputs are
|
1002 |
+
evaluated against the criteria concerning whether
|
1003 |
+
the output helps Mandarin speakers understand
|
1004 |
+
Cantonese text. 34% were found helpful for un-
|
1005 |
+
derstanding Cantonese text, 61% were found not
|
1006 |
+
helpful, 5% sentences are discarded because the
|
1007 |
+
original text in Cantonese is already perfectly com-
|
1008 |
+
prehensible for Mandarin speaker.
|
1009 |
+
Mandarin to Cantonese
|
1010 |
+
System outputs are
|
1011 |
+
evaluated against the criteria “Does the system out-
|
1012 |
+
put contribute to Cantonese fluency / localisation?".
|
1013 |
+
It is found to be the case for 47% of the sentences,
|
1014 |
+
false for 52% of the sentences with 1%sentences
|
1015 |
+
discarded since the input and target were identical.
|
1016 |
+
(1)-(4) are examples of the system output for the
|
1017 |
+
Mandarin to Cantonese direction. In (1), the out-
|
1018 |
+
put is evaluated as helpful even though it has not
|
1019 |
+
completely transformed all Mandarin features into
|
1020 |
+
Cantonese ones, however, the components with the
|
1021 |
+
highest semantic value (拍拖dating and 散break
|
1022 |
+
up) are in Cantonese where it was originally in
|
1023 |
+
Mandarin. Compared to (3), where the output still
|
1024 |
+
retains mostly Mandarin and has no Cantonese fea-
|
1025 |
+
tures. Comparing (2) and (4), they both have some
|
1026 |
+
grammatical errors (in red), but the impact of such
|
1027 |
+
error in (2) is less significant to the overall meaning
|
1028 |
+
of the sentence, while in (4) the overall sentence is
|
1029 |
+
incomprehensible.
|
1030 |
+
Examples of output that is helpful:
|
1031 |
+
(1)
|
1032 |
+
Mandarin reference (source):
|
1033 |
+
身邊有兩位好朋友,交往了三年,
|
1034 |
+
就那樣分手了。
|
1035 |
+
Cantonese reference (target):
|
1036 |
+
身邊有兩位好友,拍三年拖,就噉散
|
1037 |
+
。
|
1038 |
+
System output:
|
1039 |
+
身邊有兩位好友,拍了三年拖,就這
|
1040 |
+
樣散了。
|
1041 |
+
Sentence meaning: I have two friends
|
1042 |
+
who had been dating for three years,
|
1043 |
+
and they broke up just like that.
|
1044 |
+
(2)
|
1045 |
+
Mandarin reference (source):
|
1046 |
+
別這麼犟,快點向媽認錯。
|
1047 |
+
Cantonese reference (target):
|
1048 |
+
咪咁硬頸,快同亞媽認錯。
|
1049 |
+
System output:
|
1050 |
+
否“硬頸,快些和亞媽認錯。
|
1051 |
+
Sentence meaning: Don’t be so stubborn,
|
1052 |
+
apologize to your mother at once.
|
1053 |
+
Examples of output that is not helpful:
|
1054 |
+
(3)
|
1055 |
+
Mandarin reference (source):
|
1056 |
+
別小看他,他已經有了三項發明。
|
1057 |
+
Cantonese reference (target):
|
1058 |
+
10
|
1059 |
+
|
1060 |
+
咪睇小佢,佢已經有三項發明。
|
1061 |
+
System output:
|
1062 |
+
否看小她,她已經有了三項發明。
|
1063 |
+
Sentence meaning: Don’t underestimate
|
1064 |
+
him, he already has three inventions.
|
1065 |
+
(4)
|
1066 |
+
Mandarin reference (source):
|
1067 |
+
���海關沒收了那些東西。
|
1068 |
+
Cantonese reference (target):
|
1069 |
+
畀海關執。
|
1070 |
+
System output:
|
1071 |
+
給海關執了那麼。
|
1072 |
+
Sentence meaning: The things that were
|
1073 |
+
confiscated by customs.
|
1074 |
+
7
|
1075 |
+
Discussion
|
1076 |
+
Our Mandarin-Cantonese machine translation
|
1077 |
+
project displays the differences between two to-
|
1078 |
+
kenization methods (character-level and byte pair
|
1079 |
+
encoding), with an outcome different than expected
|
1080 |
+
regarding byte pair encoding. A possible reason
|
1081 |
+
for this may be that such a big vocabulary size can
|
1082 |
+
lead to worse embeddings, taking into account the
|
1083 |
+
size of our corpus.
|
1084 |
+
One of our approaches was down-sampling the
|
1085 |
+
full dataset into a balanced one, from which we
|
1086 |
+
expected a higher BLEU score compared to when
|
1087 |
+
using the full dataset. However, this had the op-
|
1088 |
+
posite effect on the BLEU score and it ended up
|
1089 |
+
being lower than in the previous occasions. This
|
1090 |
+
is perhaps due to the fact that 1 million sentences
|
1091 |
+
is just simply not enough data for a machine to
|
1092 |
+
become ’fluent’ in a language.
|
1093 |
+
As further work, we propose that this project
|
1094 |
+
can be extended by combining out best architec-
|
1095 |
+
ture, best tokenization and best embedding training
|
1096 |
+
method (transformer + character + mapping), by de-
|
1097 |
+
veloping a cross-lingual mapping for embeddings
|
1098 |
+
that is compatible with a transformer network in
|
1099 |
+
order to confirm whether it does lead to higher
|
1100 |
+
results.
|
1101 |
+
In addition, other options worth exploring would
|
1102 |
+
be the grammatical similarity between Cantonese
|
1103 |
+
and Mandarin and developing an statistical ma-
|
1104 |
+
chine translation model.
|
1105 |
+
8
|
1106 |
+
Summary and conclusion
|
1107 |
+
The aim of implementing a Cantonese-Mandarin
|
1108 |
+
MT-model was accomplished by:
|
1109 |
+
• Creating a large-scale corpus out of several
|
1110 |
+
online sources such as Wikipedia, scraped
|
1111 |
+
Instagram comments, YouTube subtitles and
|
1112 |
+
restaurant reviews.
|
1113 |
+
• Implementing and training several Cantonese-
|
1114 |
+
Mandarin translation models while studying
|
1115 |
+
the effects of different tokenization strategies,
|
1116 |
+
such as character-level and byte-pair encod-
|
1117 |
+
ing. While BPE was expected to outperform
|
1118 |
+
character-level tokenization, this was not the
|
1119 |
+
case in our experiments.
|
1120 |
+
The outcomes of this project showed that overall,
|
1121 |
+
in 61% of the cases, the outcome translation was
|
1122 |
+
not useful to help Mandarin speakers understand
|
1123 |
+
Cantonese text. As far as what fluency concerns,
|
1124 |
+
in 52 out of 100 cases, the system’s output did not
|
1125 |
+
show any contribution.
|
1126 |
+
Further work and research is essential in order to
|
1127 |
+
reach good percentages of performance and fluency
|
1128 |
+
in such a machine translation model. This project
|
1129 |
+
has contributed a large Cantonese dataset that was
|
1130 |
+
not available before as it is now.
|
1131 |
+
We hope that with this project we moved one
|
1132 |
+
step forward into a direction that has been studied
|
1133 |
+
for some years now, contributing to further devel-
|
1134 |
+
opments and advancement.
|
1135 |
+
References
|
1136 |
+
Mikel Artetxe, Gorka Labaka, and Eneko Agirre. 2016.
|
1137 |
+
Learning principled bilingual mappings of word em-
|
1138 |
+
beddings while preserving monolingual invariance.
|
1139 |
+
In Proceedings of the 2016 conference on empiri-
|
1140 |
+
cal methods in natural language processing, pages
|
1141 |
+
2289–2294.
|
1142 |
+
Mikel Artetxe, Gorka Labaka, and Eneko Agirre.
|
1143 |
+
2017a. Learning bilingual word embeddings with
|
1144 |
+
(almost) no bilingual data.
|
1145 |
+
In Proceedings of the
|
1146 |
+
55th Annual Meeting of the Association for Compu-
|
1147 |
+
tational Linguistics (Volume 1: Long Papers), pages
|
1148 |
+
451–462.
|
1149 |
+
Mikel Artetxe, Gorka Labaka, and Eneko Agirre.
|
1150 |
+
2018a. Generalizing and improving bilingual word
|
1151 |
+
embedding mappings with a multi-step framework
|
1152 |
+
of linear transformations.
|
1153 |
+
In Proceedings of the
|
1154 |
+
AAAI Conference on Artificial Intelligence, vol-
|
1155 |
+
ume 32.
|
1156 |
+
Mikel Artetxe, Gorka Labaka, and Eneko Agirre.
|
1157 |
+
2018b. A robust self-learning method for fully un-
|
1158 |
+
supervised cross-lingual mappings of word embed-
|
1159 |
+
dings. arXiv preprint arXiv:1805.06297.
|
1160 |
+
11
|
1161 |
+
|
1162 |
+
Mikel Artetxe, Gorka Labaka, Eneko Agirre, and
|
1163 |
+
Kyunghyun Cho. 2017b. Unsupervised neural ma-
|
1164 |
+
chine translation. arXiv preprint arXiv:1710.11041.
|
1165 |
+
Giusepppe Attardi. 2015. Wikiextractor. https://
|
1166 |
+
github.com/attardi/wikiextractor.
|
1167 |
+
Dzmitry Bahdanau, Kyunghyun Cho, and Yoshua Ben-
|
1168 |
+
gio. 2014.
|
1169 |
+
Neural machine translation by jointly
|
1170 |
+
learning to align and translate.
|
1171 |
+
arXiv preprint
|
1172 |
+
arXiv:1409.0473.
|
1173 |
+
Robert S Bauer. 2018. Cantonese as written language
|
1174 |
+
in hong kong. Global Chinese, 4(1):103–142.
|
1175 |
+
Kingsley Bolton. 2011. Language policy and planning
|
1176 |
+
in hong kong: Colonial and post-colonial perspec-
|
1177 |
+
tives. Applied linguistics review, 2(1):51–71.
|
1178 |
+
Kyunghyun Cho, Bart Van Merriënboer, Dzmitry Bah-
|
1179 |
+
danau, and Yoshua Bengio. 2014. On the properties
|
1180 |
+
of neural machine translation: Encoder-decoder ap-
|
1181 |
+
proaches. arXiv preprint arXiv:1409.1259.
|
1182 |
+
Alexis Conneau, Guillaume Lample, Marc’Aurelio
|
1183 |
+
Ranzato, Ludovic Denoyer, and Hervé Jégou. 2017.
|
1184 |
+
Word translation without parallel data.
|
1185 |
+
arXiv
|
1186 |
+
preprint arXiv:1710.04087.
|
1187 |
+
Wael Farhan, Bashar Talafha, Analle Abuammar,
|
1188 |
+
Ruba Jaikat, Mahmoud Al-Ayyoub, Ahmad Bisher
|
1189 |
+
Tarakji, and Anas Toma. 2020. Unsupervised dialec-
|
1190 |
+
tal neural machine translation. Information Process-
|
1191 |
+
ing & Management, 57(3):102181.
|
1192 |
+
Guillaume Lample and Alexis Conneau. 2019. Cross-
|
1193 |
+
lingual language model pretraining. arXiv preprint
|
1194 |
+
arXiv:1901.07291.
|
1195 |
+
Guillaume Lample, Alexis Conneau, Ludovic Denoyer,
|
1196 |
+
and Marc’Aurelio Ranzato. 2017. Unsupervised ma-
|
1197 |
+
chine translation using monolingual corpora only.
|
1198 |
+
arXiv preprint arXiv:1711.00043.
|
1199 |
+
Guillaume Lample, Myle Ott, Alexis Conneau, Lu-
|
1200 |
+
dovic Denoyer, and Marc’Aurelio Ranzato. 2018.
|
1201 |
+
Phrase-based & neural unsupervised machine trans-
|
1202 |
+
lation. arXiv preprint arXiv:1804.07755.
|
1203 |
+
David CS Li. 2000. Cantonese-english code-switching
|
1204 |
+
research in hong kong: A y2k review. World En-
|
1205 |
+
glishes, 19(3):305–322.
|
1206 |
+
Kang Kwong Luke and May LY Wong. 2015.
|
1207 |
+
The
|
1208 |
+
hong kong cantonese corpus: design and uses. Jour-
|
1209 |
+
nal of Chinese Linguistics Monograph Series, pages
|
1210 |
+
312–333.
|
1211 |
+
Minh-Thang Luong, Hieu Pham, and Christopher D
|
1212 |
+
Manning. 2015. Effective approaches to attention-
|
1213 |
+
based neural machine translation.
|
1214 |
+
arXiv preprint
|
1215 |
+
arXiv:1508.04025.
|
1216 |
+
Stephen Matthews and Virginia Yip. 2013. Cantonese:
|
1217 |
+
A comprehensive grammar. Routledge.
|
1218 |
+
Tomas Mikolov, Quoc V Le, and Ilya Sutskever. 2013.
|
1219 |
+
Exploiting similarities among languages for ma-
|
1220 |
+
chine translation. arXiv preprint arXiv:1309.4168.
|
1221 |
+
Rico Sennrich, Barry Haddow, and Alexandra Birch.
|
1222 |
+
2015.
|
1223 |
+
Improving neural machine translation
|
1224 |
+
models with monolingual data.
|
1225 |
+
arXiv preprint
|
1226 |
+
arXiv:1511.06709.
|
1227 |
+
Salam Michael Singh and Thoudam Doren Singh. 2020.
|
1228 |
+
Unsupervised neural machine translation for english
|
1229 |
+
and manipuri. In Proceedings of the 3rd Workshop
|
1230 |
+
on Technologies for MT of Low Resource Languages,
|
1231 |
+
pages 69–78.
|
1232 |
+
Don Snow. 2004. Cantonese as written language: The
|
1233 |
+
growth of a written Chinese vernacular, volume 1.
|
1234 |
+
Hong Kong University Press.
|
1235 |
+
Ashish Vaswani, Noam Shazeer, Niki Parmar, Jakob
|
1236 |
+
Uszkoreit, Llion Jones, Aidan N Gomez, Łukasz
|
1237 |
+
Kaiser, and Illia Polosukhin. 2017. Attention is all
|
1238 |
+
you need. Advances in neural information process-
|
1239 |
+
ing systems, 30.
|
1240 |
+
Pascal Vincent, Hugo Larochelle, Yoshua Bengio, and
|
1241 |
+
Pierre-Antoine Manzagol. 2008.
|
1242 |
+
Extracting and
|
1243 |
+
composing robust features with denoising autoen-
|
1244 |
+
coders. In Proceedings of the 25th international con-
|
1245 |
+
ference on Machine learning, pages 1096–1103.
|
1246 |
+
Yu Wan, Baosong Yang, Derek F Wong, Lidia S Chao,
|
1247 |
+
Haihua Du, and Ben CH Ao. 2020. Unsupervised
|
1248 |
+
neural dialect translation with commonality and di-
|
1249 |
+
versity modeling. In Proceedings of the AAAI Con-
|
1250 |
+
ference on Artificial Intelligence, volume 34, pages
|
1251 |
+
9130–9137.
|
1252 |
+
Ka
|
1253 |
+
Ming
|
1254 |
+
Wong
|
1255 |
+
and
|
1256 |
+
Richard
|
1257 |
+
Tzong-Han
|
1258 |
+
Tsai.
|
1259 |
+
2022. Mixed embedding of xlm for unsupervised
|
1260 |
+
cantonese-chinese neural machine translation (stu-
|
1261 |
+
dent abstract).
|
1262 |
+
Tak-sum Wong, Kim Gerdes, Herman Leung, and
|
1263 |
+
John SY Lee. 2017.
|
1264 |
+
Quantitative comparative
|
1265 |
+
syntax on the cantonese-mandarin parallel depen-
|
1266 |
+
dency treebank.
|
1267 |
+
In Proceedings of the fourth in-
|
1268 |
+
ternational conference on Dependency Linguistics
|
1269 |
+
(Depling 2017), pages 266–275.
|
1270 |
+
Yonghui Wu, Mike Schuster, Zhifeng Chen, Quoc V
|
1271 |
+
Le,
|
1272 |
+
Mohammad Norouzi,
|
1273 |
+
Wolfgang Macherey,
|
1274 |
+
Maxim Krikun,
|
1275 |
+
Yuan Cao,
|
1276 |
+
Qin Gao,
|
1277 |
+
Klaus
|
1278 |
+
Macherey, et al. 2016.
|
1279 |
+
Google’s neural machine
|
1280 |
+
translation system: Bridging the gap between hu-
|
1281 |
+
man and machine translation.
|
1282 |
+
arXiv preprint
|
1283 |
+
arXiv:1609.08144.
|
1284 |
+
Hei Yi Mak and Tan Lee. 2021.
|
1285 |
+
Low-resource nmt:
|
1286 |
+
A case study on the written and spoken languages in
|
1287 |
+
hong kong. In 2021 5th International Conference on
|
1288 |
+
Natural Language Processing and Information Re-
|
1289 |
+
trieval (NLPIR), pages 81–87.
|
1290 |
+
12
|
1291 |
+
|
4NE2T4oBgHgl3EQfjwdR/content/tmp_files/load_file.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
4tAyT4oBgHgl3EQf2Plc/content/tmp_files/2301.00747v1.pdf.txt
ADDED
@@ -0,0 +1,1476 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
Time-domain observation of ballistic orbital-angular-momentum currents with giant relaxation
|
2 |
+
length in tungsten
|
3 |
+
Tom S. Seifert1,2, Dongwook Go3, Hiroki Hayashi4, Reza Rouzegar1,2,
|
4 |
+
Frank Freimuth3,5, Kazuya Ando4,6-7, Yuriy Mokrousov3,5, Tobias Kampfrath1,2
|
5 |
+
1Freie Universität Berlin, 14195 Berlin, Germany
|
6 |
+
2Fritz Haber Institut der Max-Planck-Gesellschaft, 14195 Berlin, Germany
|
7 |
+
3Forschungszentrum Jülich, 52425 Jülich, Germany
|
8 |
+
4Department of Applied Physics and Physico-Informatics, Keio University, Yokohama 223-8522, Japan
|
9 |
+
5Johannes Gutenberg-Universität Mainz, 55099 Mainz, Germany
|
10 |
+
6Keio Institute of Pure and Applied Sciences, Keio University, Yokohama 223-8522, Japan
|
11 |
+
7Center for Spintronics Research Network, Keio University, Yokohama 223-8522, Japan
|
12 |
+
|
13 |
+
Abstract
|
14 |
+
The emerging field of orbitronics exploits the electron orbital momentum 𝐿, which may allow magnetic-
|
15 |
+
information transfer with significantly higher density over longer distances in more materials than possible
|
16 |
+
with spin-polarized electrons. However, direct experimental observation of 𝐿 currents, their extended
|
17 |
+
propagation lengths and their conversion into charge currents has remained challenging. Here, we optically
|
18 |
+
trigger ultrafast angular-momentum transport in Ni|W|SiO2 thin-film stacks. The resulting terahertz charge-
|
19 |
+
current bursts exhibit a marked delay and width that grow linearly with W thickness. We consistently ascribe
|
20 |
+
these observations to a ballistic 𝐿 current from Ni through W with giant decay length (∼ 80 nm) and slow
|
21 |
+
velocity (∼ 0.1 nm/fs). At the W/SiO2 interface, the 𝐿 flow is converted into a charge current by the inverse
|
22 |
+
orbital Rashba-Edelstein effect. Our findings establish orbitronic materials with long-distance ballistic 𝐿
|
23 |
+
transport as possible candidates for future ultrafast devices and an approach to discriminate Hall- and
|
24 |
+
Rashba-Edelstein-like conversion processes.
|
25 |
+
|
26 |
+
Introduction
|
27 |
+
Spintronics research aims at utilizing the flow of spin angular momentum carried by electrons to transport
|
28 |
+
information and eventually manipulate magnetic order [1]. Actually, electrons have two distinct channels of
|
29 |
+
angular momentum: the electron spin 𝑆 and orbital angular momentum 𝐿. While 𝑆 is successfully exploited
|
30 |
+
in the field of spintronics to transport information by spin currents and to convert the latter into detectable
|
31 |
+
charge currents by spin-to-charge conversion (S2C) [2], 𝐿 has only recently gained attention in the field of
|
32 |
+
orbitronics. To make this fascinating concept compatible and competitive with conventional electronics [3,
|
33 |
+
4], the speed of spin-orbitronic functionalities needs to be scalable to terahertz (THz) rates [5].
|
34 |
+
A first key advantage of 𝐿 over 𝑆 is that it can assume arbitrarily high values for one electron, which is
|
35 |
+
interesting for efficient manipulation of future orbitronic devices [1, 6, 7]. Second, 𝐿-to-charge conversion
|
36 |
+
(L2C) does not rely on spin-orbit interaction (SOI), which opens the orbitronic workbench to abundant light
|
37 |
+
metals [8]. Third, 𝐿-currents are predicted to propagate over increased lengths reaching almost 100 nm [9].
|
38 |
+
Finally, 𝐿-induced torques should have a starkly different behavior compared to 𝑆-induced torques [10-14].
|
39 |
+
Recent studies provided strong indications of 𝐿 transport and charge-to-𝐿-current conversion by the orbital
|
40 |
+
Hall effect (OHE) in a thin layer of a paramagnetic material (PM). The 𝑆 or 𝐿 accumulation resulting from an
|
41 |
+
in-plane charge current was interrogated by magnetooptic imaging [8] or by measuring the torque it exerted
|
42 |
+
on the magnetization of an adjacent thin-film ferromagnetic material (FM) [1, 9-24]. The FM was chosen to
|
43 |
+
be either susceptible to 𝑆 (e.g., Ni81Fe19, CoFeB) or 𝐿 accumulation (e.g., Ni).
|
44 |
+
|
45 |
+
Unfortunately, it remains experimentally challenging to measure 𝐿 curents by L2C. First, it is difficult to
|
46 |
+
distinguish L2C by the OHE from L2C by an orbital Rashba-Edelstein effect (OREE) because both phenomena
|
47 |
+
obey identical macroscopic symmetries. Second and for the same reason, OHE and OREE are difficult to
|
48 |
+
separate from their S2C counterparts, i.e., from the spin Hall effect (SHE) and the spin-based Rashba-
|
49 |
+
Edelstein effect (SREE) [25]. Previous work, however, indicates different spatial propagation and relaxation
|
50 |
+
dynamics of 𝑆 and 𝐿 currents [9-11]. Therefore, an experimental approach such as THz emission
|
51 |
+
spectroscopy [26, 27], which monitors currents with femtosecond resolution, is perfectly suited to access the
|
52 |
+
possibly different ultrafast 𝐿/𝑆 propagation and conversion dynamics.
|
53 |
+
Here, we study ultrafast signatures of 𝑆 and 𝐿 transport from a FM into a PM that is launched by exciting
|
54 |
+
FM|PM stacks with a femtosecond laser pulse. L2C and S2C in the PM is measured by monitoring the emitted
|
55 |
+
THz pulse. Upon changing the FM from Ni to Ni81Fe19 (Py) and interfacing them with the PMs Pt, Ti and W,
|
56 |
+
we find the same characteristic sign changes in the emitted THz pulse as in previous magnetotransport
|
57 |
+
studies [11]. Consequently, we interpret our observations as signatures of ultrafast L2C and S2C. Remarkably,
|
58 |
+
the emitted THz field from Ni|W is strongly time-delayed and low-pass-filtered compared to that from Ni|Pt.
|
59 |
+
The bandwidth and amplitude of the underlying charge-current burst decreases with W thickness, whereas
|
60 |
+
its delay increases linearly. We assign this observation to long-distance ballistic 𝐿 transport in W, which has
|
61 |
+
a more than 10 times larger relaxation length than 𝑆 transport. Specifically, our data suggest a dominant
|
62 |
+
contribution to L2C through the inverse OREE (IOREE) at the W/SiO2. Interestingly, this effect is absent in
|
63 |
+
Ni|Ti and attributed to a dominant bulk L2C by the inverse OHE (IOHE). Our results may help establish an
|
64 |
+
ultrafast experimental and theoretical methodology to extract the propagation dynamics of 𝐿 currents.
|
65 |
+
|
66 |
+
|
67 |
+
FIGURE 1: Launching and detecting terahertz 𝑺 and 𝑳 currents. Upon ultrafast laser excitation of the FM,
|
68 |
+
the FM magnetization 𝐌 is quenched, leading to 𝑆 accumulation 𝜇�, 𝐿 accumulation 𝜇� and the injection of
|
69 |
+
spin and orbital currents 𝑗� and 𝑗�, respectively, into the PM. Various bulk and interfacial L2C and S2C
|
70 |
+
processes generate an ultrafast in-plane charge current 𝑗� that radiates a THz pulse with electric field 𝐸 vs
|
71 |
+
time 𝑡 directly behind the sample.
|
72 |
+
Conceptual background. Our approach is guided by the idea that 𝐿 currents obey the same phenomenology
|
73 |
+
as 𝑆 currents, whereas 𝐿 transport is expected to have comparatively different spatiotemporal dynamics on
|
74 |
+
ultrashort time and length scales [1, 9-11]. As schematically depicted in Fig. 1, a femtosecond optical pump
|
75 |
+
pulse excites a FM|PM stack and triggers ultrafast 𝑆 and 𝐿 currents with density 𝑗� and 𝑗�, respectively, from
|
76 |
+
FM to PM. S2C and L2C result in ultrafast in-plane charge currents acting as a sources of a THz
|
77 |
+
electromagnetic pulse [28]. The resulting THz electric-field amplitude 𝐸(𝑡) directly behind the sample is
|
78 |
+
proportional to the sheet charge current 𝐼�(𝑡), which reads
|
79 |
+
|
80 |
+
Femtosecond
|
81 |
+
THz pulse
|
82 |
+
heating pulse
|
83 |
+
js
|
84 |
+
E
|
85 |
+
S2C
|
86 |
+
us
|
87 |
+
ee
|
88 |
+
UL
|
89 |
+
L2C
|
90 |
+
iL
|
91 |
+
M
|
92 |
+
jc
|
93 |
+
FM
|
94 |
+
PM
|
95 |
+
Z𝐸(𝑡) ∝ 𝐼�(𝑡) =
|
96 |
+
�
|
97 |
+
d𝑧 [θ���(𝑧)𝑗�(𝑧, 𝑡) + θ���(𝑧)𝑗�(𝑧, 𝑡)]
|
98 |
+
�������
|
99 |
+
�
|
100 |
+
.
|
101 |
+
(1)
|
102 |
+
Here, θ���(𝑧) and θ���(𝑧) describe the local efficiency of instantaneous L2C and S2C, respectively. They
|
103 |
+
include microscopic mechanisms like the inverse SHE (ISHE) or IOHE [27, 29], which occur in the bulk, or the
|
104 |
+
inverse SREE and IOREE, which require regions of broken inversion symmetry such as interfaces [30, 31].
|
105 |
+
To understand the emergence of 𝑗� and 𝑗�, we note that sudden laser heating of the FM induces 𝑆 and 𝐿
|
106 |
+
accumulations, 𝜇� and 𝜇� , respectively. The spin accumulation 𝜇� is proportional to the excess
|
107 |
+
magnetization, i.e., the difference between the instantaneous magnetization and the equilibrium
|
108 |
+
magnetization that would be attained at the instantaneous electron temperature [32-35]. Consequently, the
|
109 |
+
FM releases 𝑆 at a rate proportional to 𝜇�, by transferring 𝑆 to both the crystal lattice and the PM.
|
110 |
+
Recent studies on single-element FMs showed that the 𝑆- and 𝐿-type magnetizations exhibit very similar
|
111 |
+
ultrafast time evolution following laser excitation [36-38]. Therefore, we expect a very similar time evolution
|
112 |
+
of 𝜇� and 𝜇�, i.e., 𝜇�(𝑡) ∝ 𝜇�(𝑡), where their amplitudes depend on details of the electronic structure [14].
|
113 |
+
Despite this common origin of 𝑆 and 𝐿 currents, the relation between 𝑗�(𝑧, 𝑡) and 𝑗�(𝑧, 𝑡) (Fig. 1) can be
|
114 |
+
highly nontrivial as 𝑆 and 𝐿 may propagate differently through the FM/NM interface and the NM bulk.
|
115 |
+
Eq. ( 1 ) does not account for contributions due to magnetic dipole radiation of the time-dependent
|
116 |
+
magnetization and of photocurrents even in magnetic order, because both components can be discriminated
|
117 |
+
experimentally [32, 39].
|
118 |
+
Experiment details. We study thin film FM|PM samples, where the two FMs Py and Ni are chosen for their
|
119 |
+
high efficiency in generating 𝑆 and 𝐿 currents, respectively [11]. The PMs are chosen to have a strong ISHE
|
120 |
+
(Pt, W) and IOHE (W, Ti) response. The reported signs for the ISHE are opposite for Pt vs W with a vanishing
|
121 |
+
ISHE in Ti, but the expected IOHE signs are the same for all three PMs [40]. The studied FM|PM stacks have
|
122 |
+
thicknesses of a few nanometers deposited onto 500 μm thick glass substrates or 625 μm thick thermally
|
123 |
+
oxidized Si substrates (see Fig. S1 and Methods). The samples are characterized by optical and THz
|
124 |
+
transmission spectroscopy [41], yielding the pump absorptance, DC conductivity and Drude relaxation rate
|
125 |
+
(Fig. S2).
|
126 |
+
In our experiment (Fig. 1), ultrashort laser pulses (15 fs duration, 800 nm center wavelength, 80 MHz
|
127 |
+
repetition rate, 1.9 nJ pulse energy, 0.2 mJ/cm2 incident fluence) derived from a Ti:sapphire oscillator excite
|
128 |
+
the FM|PM samples. We record the emitted THz radiation by electrooptic sampling in a 1 mm or 10 µm thick
|
129 |
+
ZnTe(110) or a 250 μm thick GaP(110) electro-optic crystal [42]. The resulting THz emission signal 𝑆(𝐌, 𝑡) vs
|
130 |
+
time 𝑡 is proportional to the THz electric-field waveform 𝐸 (Fig. 1) convoluted with a setup-response function
|
131 |
+
[43]. The presented data is low-pass filtered by convolution with a Gaussian function with a full width at half
|
132 |
+
maximum of about 80 fs for better visibility unless noted otherwise.
|
133 |
+
All experiments are performed under ambient conditions unless stated otherwise. We apply an in-plane
|
134 |
+
magnetic field of about 10 mT to the sample and monitor the THz field component perpendicular to the
|
135 |
+
sample magnetization 𝐌. The component parallel to 𝐌 is found to be minor (Fig. S3). Measurements with
|
136 |
+
linearly and circularly polarized pump pulses reveal a negligible impact of the pump polarization on the THz
|
137 |
+
emission (Fig. S4).
|
138 |
+
To isolate magnetic signals, we reverse 𝐌 and focus on the odd-in- 𝐌 THz signal 𝑆(𝑡) =
|
139 |
+
[𝑆(+𝐌, t) − 𝑆(−𝐌, t)] 2
|
140 |
+
⁄ . Even-in-𝐌 signal components are minor. As expected from a transport scenario,
|
141 |
+
further experiments, in which the samples are reversed, reveal a dominant structural-inversion-asymmetry
|
142 |
+
(SIA) character of the emitted THz signals compared to minor contributions unrelated to SIA, which most
|
143 |
+
likely arise from magnetic-dipole radiation due to ultrafast demagnetization (Fig. S5) [32].
|
144 |
+
|
145 |
+
|
146 |
+
|
147 |
+
FIGURE 2: Terahertz raw data. THz
|
148 |
+
emission signals 𝑆(𝑡) from FM|PM stacks
|
149 |
+
with a FM=Py and b FM=Ni capped with
|
150 |
+
PM=Pt, W or Ti. Note the rescaling of the
|
151 |
+
Pt-based sample signals. Film thicknesses
|
152 |
+
in nanometers are given as numerals in
|
153 |
+
parenthesis. As THz detector, a 1 mm
|
154 |
+
ZnTe(110) crystal was used.
|
155 |
+
Results
|
156 |
+
FM=Py. Figure 2a shows THz emission signals 𝑆 from Py|PM samples with PM=Pt, W, Ti, where the time-axis
|
157 |
+
origin is the same for all signals. All three waveforms have identical shapes. Minor differences in the shape
|
158 |
+
of 𝑆��|�� vs 𝑆��|�� are attributed to contributions unrelated to SIA (see above and Fig. S6).
|
159 |
+
The relative signal magnitudes as well as the opposite polarities for PM=Pt and W are consistent with
|
160 |
+
previous reports of ISHE-dominated THz emitters [28]. The polarity of the signal from Py|Ti is the same as
|
161 |
+
from Py|Pt and consistent with the calculations and measurements that found the same sign of the ISHE in
|
162 |
+
Pt and the IOHE in Ti [8, 27, 40]. However, the Py|Ti signal has a significantly smaller amplitude than the
|
163 |
+
Py|Pt signal even though Ti has a sizeable L2C efficiency. We ascribe this observation to a small amplitude of
|
164 |
+
the 𝐿 current injected into Ti, consistent with the small 𝐿 component of the Py magnetization [11].
|
165 |
+
To summarize, for Py|PM, our THz signals are consistent with the notion that we predominantly observe
|
166 |
+
transport of 𝑆 and 𝐿 into the PM bulk and its conversion into a charge current through the ISHE and the IOHE.
|
167 |
+
A possible Rashba-type L2C or S2C, or skew-scattering at the FM/PM interface [44] may make an additional
|
168 |
+
yet relatively small contribution.
|
169 |
+
FM=Ni. When the FM=Py is replaced by Ni, the signal polarity remains the same for Pt and Ti, and the two
|
170 |
+
waveforms exhibit identical dynamics (Fig. 2b and Fig. S7). In stark contrast, however, the signal polarity for
|
171 |
+
Ni|W reverses, the waveform is less symmetric, and its maximum is time-shifted relative to Py|W. This
|
172 |
+
striking observation indicates that Py|W and Ni|W show competing THz-generation mechanisms, the
|
173 |
+
a
|
174 |
+
b
|
175 |
+
|
176 |
+
X10-6
|
177 |
+
3
|
178 |
+
Ni(5)IPt(3) /3
|
179 |
+
Ni(5)ITi(3)
|
180 |
+
2
|
181 |
+
Ni(5)/W(3)
|
182 |
+
Terahertz signal
|
183 |
+
-2
|
184 |
+
-3
|
185 |
+
0
|
186 |
+
1
|
187 |
+
2
|
188 |
+
Time (ps)3
|
189 |
+
Py(5)/Pt(3) /3
|
190 |
+
Py(5)/Ti(3)
|
191 |
+
2
|
192 |
+
Py(5)/W(3)
|
193 |
+
Terahertz signal
|
194 |
+
-2
|
195 |
+
.3
|
196 |
+
0
|
197 |
+
2
|
198 |
+
1
|
199 |
+
Time (ps)dominance of which depends sensitively on the FM material. To gain more insight into the different dynamics
|
200 |
+
in Ni|W, we next vary the W thickness.
|
201 |
+
|
202 |
+
|
203 |
+
FIGURE 3: Impact of W thickness in
|
204 |
+
Ni|W. THz emission signals for Ni|W
|
205 |
+
samples with varying W thickness
|
206 |
+
normalized to the absorbed pump-
|
207 |
+
pulse fraction in the Ni layer and to the
|
208 |
+
sample impedance (see Methods and
|
209 |
+
Table S1). Note the rescaling of the
|
210 |
+
reference signal from Ni|Pt. Film
|
211 |
+
thicknesses in nanometers are given as
|
212 |
+
numerals in parenthesis. A 250 µm
|
213 |
+
GaP(110) crystal was used as THz
|
214 |
+
detector.
|
215 |
+
Impact of W thickness. Figure 3 shows THz emission signals from Ni|W(𝑑�) for various 𝑑� and from a Ni|Pt
|
216 |
+
reference sample. Consistent with Fig. 2b, we see a clear trend with increasing W thickness relative to Ni|Pt:
|
217 |
+
The THz signal amplitude has a reversed sign, reduces with increasing 𝑑� and undergoes a significant
|
218 |
+
reshaping from asymmetric (Ni|Pt) to more symmetric (Ni|W) around the signal maximum. Interestingly,
|
219 |
+
𝑑� = 2 nm is already sufficient to induce a shift of the maximum of the THz signal by about 100 fs.
|
220 |
+
We emphasize that the changes in THz-signal dynamics solely originate from changing the PM thickness.
|
221 |
+
Therefore, the FM is not primarily responsible for the signal-dynamics changes and, thus, considered as an
|
222 |
+
PM-independent 𝑆 and 𝐿 injector in the following.
|
223 |
+
|
224 |
+
FIGURE 4: Ultrafast charge currents in Ni|W. a Charge sheet currents in Ni|W for various W thicknesses 𝑑�
|
225 |
+
as extracted from the data of Fig. 3. The feature at 0.9 ps is a remainder of a THz-field reflection echo in the
|
226 |
+
10 µm ZnTe electro-optic detection crystal (see Methods). Film thicknesses in nanometers are given as
|
227 |
+
numerals in parenthesis. Note the rescaling of the Pt-based sample signal. The apparent signal delays and
|
228 |
+
amplitudes are highlighted by a circular marker. b Extracted time delay with a straight line as a guide to the
|
229 |
+
eye, c relative amplitude at the delay marked in panel a, d temporal width at half maximum, and e integrated
|
230 |
+
charge current between 0.2 to 0.9 ps vs 𝑑� from the data in panel a. Error bars are estimated for panels c
|
231 |
+
a
|
232 |
+
b
|
233 |
+
c
|
234 |
+
d
|
235 |
+
e
|
236 |
+
|
237 |
+
X10-9
|
238 |
+
5
|
239 |
+
Ni(5)/Pt(3) /6
|
240 |
+
Ni(5)/W(2)
|
241 |
+
4
|
242 |
+
Norm. terahertz signal
|
243 |
+
Ni(5)/W(3)
|
244 |
+
Ni(5)/W(5)
|
245 |
+
3
|
246 |
+
Ni(5)/W(10)
|
247 |
+
Ni(5)/W(15)
|
248 |
+
2
|
249 |
+
Ni(5)/W(20)
|
250 |
+
0
|
251 |
+
7
|
252 |
+
-2
|
253 |
+
-3
|
254 |
+
-0.5
|
255 |
+
0
|
256 |
+
0.5
|
257 |
+
Time (ps)Ni(5)/Pt(3) /6
|
258 |
+
14
|
259 |
+
Ni(5)/W(2)
|
260 |
+
12
|
261 |
+
Ni(5)/W(3)
|
262 |
+
Ni(5)/W(5)
|
263 |
+
2
|
264 |
+
per abs. fluence in Ni (J/m
|
265 |
+
10
|
266 |
+
Ni(5)/W(10)
|
267 |
+
Ni(5)/W(15)
|
268 |
+
8
|
269 |
+
Ni(5)IW(20)
|
270 |
+
delay
|
271 |
+
6
|
272 |
+
4
|
273 |
+
2
|
274 |
+
0
|
275 |
+
-2
|
276 |
+
-4
|
277 |
+
-6
|
278 |
+
0
|
279 |
+
0.5
|
280 |
+
Time (ps)80
|
281 |
+
Ampl. (norm.
|
282 |
+
Delay (fs)
|
283 |
+
60
|
284 |
+
40
|
285 |
+
0.5
|
286 |
+
20
|
287 |
+
0
|
288 |
+
0
|
289 |
+
0
|
290 |
+
10
|
291 |
+
20
|
292 |
+
10
|
293 |
+
20
|
294 |
+
0
|
295 |
+
340
|
296 |
+
320
|
297 |
+
Area (norm.)
|
298 |
+
(fs)
|
299 |
+
300
|
300 |
+
280
|
301 |
+
Width
|
302 |
+
260
|
303 |
+
0.5
|
304 |
+
240
|
305 |
+
220
|
306 |
+
0
|
307 |
+
0
|
308 |
+
10
|
309 |
+
20
|
310 |
+
10
|
311 |
+
20
|
312 |
+
0
|
313 |
+
d... (nm)
|
314 |
+
d... (nm)and e from the signal-to-noise ratio in panel a, for panels b and d as 10% of the delay and width, respectively,
|
315 |
+
and in all panels b-e as ± 1 nm for 𝑑�.
|
316 |
+
Current dynamics in Ni|W. To obtain a sample-intrinsic measurement of the L2C dynamics, we extract the
|
317 |
+
sheet charge current 𝐼�(𝑡) flowing in Ni|W (Eq. (1)) normalized to the absorbed laser fluence in the Ni layer
|
318 |
+
(see Methods). This procedure eliminates any impact of sample exchange on pump-pulse absorption
|
319 |
+
efficiency, sample impedance or setup response function (see Methods).
|
320 |
+
Figure 4a presents 𝐼�(𝑡) in Ni|W with a resolution of 50 fs for various W thicknesses 𝑑�. The 𝐼�(𝑡) traces
|
321 |
+
have striking features. (i) They have opposite polarity relative to Py|W. (ii) Their maximum shifts by delays
|
322 |
+
Δ𝑡��� ∝ 𝑑� at a rate Δ𝑡��� 𝑑�
|
323 |
+
⁄
|
324 |
+
≈ 4 fs/nm (Fig. 4b), implying a velocity of 0.25 nm/fs. (iii) The 𝐼� peak
|
325 |
+
value decreases approximately linearly with 𝑑� to about 50% after 20 nm (Fig. 4c), indicating attenuation
|
326 |
+
and dispersion upon propagation. (iv) The 𝐼� width increases linearly at a rate of ≈ 8 fs/nm (Fig. 4d). (v) The
|
327 |
+
time-integrated current ∫ d𝑡 𝐼�(𝑡) is only weakly dependent on 𝑑� with a decreasing trend, thereby
|
328 |
+
indicating an extremely large relaxation length >20 nm (Fig. 4e).
|
329 |
+
Features (i) and (iii) imply that 𝐼�(𝑡) cannot arise from 𝑆 transport. Otherwise, an opposite signal polarity
|
330 |
+
would result because S2C in W is dominated by the ISHE [28]. In addition, 𝑆 currents in W relax over distances
|
331 |
+
much smaller than 20 nm [41]. Our data, therefore, strongly indicate that 𝐿 transport plus L2C is the
|
332 |
+
dominant origin of the THz charge current in Ni|W. Second, features (ii) and (iv) are a hallmark of a signal
|
333 |
+
arising from ballistic transport of a pulse that is detected in an arrival layer. In this picture, the increase of
|
334 |
+
the 𝐼�(𝑡) width with 𝑑� arises from velocity dispersion along the 𝑧-direction of the particles that make up
|
335 |
+
the pulse (Fig. 5a). Feature (v) implies a minor L2C in the W bulk because it would otherwise result in an
|
336 |
+
integrated charge current ∫ d𝑡 𝐼�(𝑡) that increases monotonically with 𝑑�.
|
337 |
+
Model: 𝑳 current and IOREE in Ni|W. The preceding discussion suggests the following transport scenario in
|
338 |
+
Ni|W. Upon excitation of the Ni layer, a transient 𝑆 and 𝐿 accumulation is induced (Fig. 1). Their dynamics
|
339 |
+
are expected to be very similar (see above) [36-38] and monitored well by the ISHE charge current in Ni|Pt
|
340 |
+
(Fig. 4a). Finally, L2C is dominated in regions close to the W/SiO2 interface (Fig. 5a). Such interfacial L2C can
|
341 |
+
be very efficient, as argued in previous works [7, 24, 45-49], which, however, lacked the required
|
342 |
+
femtosecond resolution.
|
343 |
+
This scenario can explain all charge-current features (i)-(v) (Fig. 4) and is consistent the above experimental
|
344 |
+
findings. As the 𝑗� pulse propagates predominantly ballistically, its arrival in the W/SiO2 L2C region is delayed
|
345 |
+
by a time Δ𝑡��� ∝ 𝑑�. The velocity of the 𝑗�-pulse peak (∼ 0.1 nm/fs) is consistent with that of 𝐿-carrying
|
346 |
+
d-band states of W [50]. During propagation through PM=W, the 𝑗� pulse disperses due to different electron
|
347 |
+
velocities along the surface normal (Fig. 5a) and attenuation with a typical relaxation length >20 nm.
|
348 |
+
To quantitatively model the charge-current dynamics in Ni|W (Fig. 3), we assume ballistic 𝐿 transport with a
|
349 |
+
characteristic decay length 𝜆� in W. The ��� arriving at the W/SiO2 interface is obtained by summing over all
|
350 |
+
Fermi-surface states with positive group velocity along the 𝑧-axis (see Fig. 5a and Methods). The resulting 𝑗�
|
351 |
+
at the W/SiO2 interface induced by a fictitious 𝛿(𝑡)-like 𝐿 accumulation in Ni reads
|
352 |
+
𝑟(𝑡) ∝ 𝑑�
|
353 |
+
𝑡� Θ(𝑣�𝑡 − 𝑑�)e���� ��
|
354 |
+
⁄
|
355 |
+
,
|
356 |
+
(2)
|
357 |
+
where Θ is the Heaviside step function, and 𝑣� is the Fermi velocity of the 𝐿-polarized electrons in W. We
|
358 |
+
convolute 𝑟(𝑡) with 𝜇�(𝑡) ∝ 𝜇�(𝑡), which is given by the charge current measured in Ni|Pt (Fig. 4a). Our
|
359 |
+
modeled 𝐼�(𝑡) curves (Fig. 5c) reproduce the measured charge currents in Ni|W (Fig. 4a) semiquantitatively
|
360 |
+
for the choice 𝜆� = 80 nm and 𝑣� = 0.14 nm/fs. These values are in good agreement with the estimates
|
361 |
+
obtained above (Figs. 4b-e).
|
362 |
+
|
363 |
+
|
364 |
+
|
365 |
+
|
366 |
+
FIGURE 5: Simulated ultrafast inverse
|
367 |
+
orbital Rashba-Edelstein effect in W.
|
368 |
+
a Schematic of the suggested scenario for
|
369 |
+
𝐿 transport and L2C by the IOREE in Ni|W
|
370 |
+
showing the different wave vector
|
371 |
+
contributions of the 𝐿 currents inside the
|
372 |
+
W layer driven by the magnetization
|
373 |
+
quenching in the Ni layer. Upon reaching
|
374 |
+
the W back surface, the orbital currents 𝐣�
|
375 |
+
are converted into a transverse charge
|
376 |
+
current 𝐣� by the inverse orbital Rashba-
|
377 |
+
Edelstein
|
378 |
+
effect
|
379 |
+
(IOREE).
|
380 |
+
In
|
381 |
+
the
|
382 |
+
experiment, many of the point-like
|
383 |
+
sources
|
384 |
+
of
|
385 |
+
orbital
|
386 |
+
currents
|
387 |
+
are
|
388 |
+
superimposed
|
389 |
+
along
|
390 |
+
the
|
391 |
+
FM/PM
|
392 |
+
interface.
|
393 |
+
b Qualitative
|
394 |
+
response
|
395 |
+
functions 𝑟(𝑡) to a fictitious delta-like 𝑗�
|
396 |
+
pulse injected at the Ni/W interface for
|
397 |
+
different W layer thicknesses 𝑑�, where
|
398 |
+
𝑑�� < 𝑑�� < 𝑑�� . c Simulated IOREE
|
399 |
+
charge
|
400 |
+
currents 𝐼�(𝑡) obtained
|
401 |
+
by
|
402 |
+
convoluting 𝑟(𝑡) [Eq. (2), panel b] with
|
403 |
+
the 𝐼�(𝑡) of the Ni|Pt reference sample.
|
404 |
+
Inputs for the simulation are a ballistic 𝐿
|
405 |
+
velocity of 0.14 fs/nm, an 𝐿 decay length
|
406 |
+
of 𝜆� = 80 nm and a global scaling factor.
|
407 |
+
To summarize, the THz charge currents in Ni|W (Fig. 4) can be considered as signatures of 𝐿 currents injected
|
408 |
+
into W. The charge-current generation [see Eq. (1)] is dominated by an extremely long-range 𝑗� and L2C at
|
409 |
+
the W/SiO2 interface, i.e., by θ��� at 𝑧 = 𝑑�� + 𝑑��. Such long-range 𝐿 transport is a unique feature of
|
410 |
+
orbitronic materials, and first indications for it were found previously in Ti [10, 11]. Note that within our
|
411 |
+
interpretation, the sign of 𝑆��|� agrees coincidentally with the calculated sign of θ��� for the IOHE in W [40].
|
412 |
+
Discussion
|
413 |
+
Our interpretation neglects other possible contributions to the THz charge current. First, the inverse Faraday
|
414 |
+
effect as a source of 𝑆 and 𝐿 currents can be ruled out by the pump-polarization independence (see Fig. S4).
|
415 |
+
Second, for the 𝑆 channel, a dominant Seebeck-type contribution due to an electronic temperature
|
416 |
+
difference Δ𝑇��/�� across the Ni/PM interface is neglected as found in previous studies [32]. For the 𝐿
|
417 |
+
channel, we estimate Δ𝑇��/�� right after pump pulse absorption (see Methods) and find Δ𝑇��/�� ∼ +400 K
|
418 |
+
and Δ𝑇��/�� ∼ −100 K in Ni|Ti and Ni|W. The observed THz-emission signals, in contrast, show the same
|
419 |
+
sign from all three samples (Fig. 2b). Therefore, interfacial electronic temperature differences are a minor
|
420 |
+
a
|
421 |
+
b
|
422 |
+
c
|
423 |
+
|
424 |
+
14
|
425 |
+
Ni(5)/Pt(3) /6
|
426 |
+
12
|
427 |
+
Ni(5)/W(2)
|
428 |
+
Ni(5)/W(3)
|
429 |
+
10
|
430 |
+
Ni(5)/W(5)
|
431 |
+
Ni(5)/W(10)
|
432 |
+
8
|
433 |
+
Ni(5)/W(15)
|
434 |
+
Ni(5)/W(20)
|
435 |
+
6
|
436 |
+
4
|
437 |
+
2
|
438 |
+
per abs.
|
439 |
+
0
|
440 |
+
-2
|
441 |
+
4
|
442 |
+
-6
|
443 |
+
0
|
444 |
+
0.5
|
445 |
+
1
|
446 |
+
Time (ps)W
|
447 |
+
Ni
|
448 |
+
eee
|
449 |
+
μL
|
450 |
+
IOREE
|
451 |
+
GG
|
452 |
+
jL
|
453 |
+
dw
|
454 |
+
Z
|
455 |
+
r(t)
|
456 |
+
r (0)
|
457 |
+
0
|
458 |
+
t
|
459 |
+
t(dw1) t(dw2) t(dw3driving force. Additional pump-propagation simulations show that, even for the thickest samples, pump-
|
460 |
+
intensity gradients in the FM and PM bulk are relatively small (Fig. S8).
|
461 |
+
Third, regarding transport in W, we consider dominant angular-momentum transport by magnons unlikely
|
462 |
+
because W is not magnetically ordered. An outstandingly long propagation of 𝑆 transport is ruled out, too,
|
463 |
+
because the Drude scattering times for all studied samples are substantially shorter (<50 fs, Figs. S2) than the
|
464 |
+
peak delays of 𝐼�(𝑡) (Fig. 4a).
|
465 |
+
Fourth, even though our data imply a dominant IOREE contribution to charge-current generation (see above),
|
466 |
+
the positive shoulder-like feature at around 0.1 ps for 𝑑� ≤ 3 nm in Fig. 4a may indicate a small contribution
|
467 |
+
of bulk L2C, i.e., the IOHE. A 𝐿-to-𝑆 conversion plus ISHE in the PM [23] might contribute but is considered
|
468 |
+
negligible here given the good agreement of our experimental data (Fig. 4) and the IOREE scenario (Fig. 5).
|
469 |
+
The dominance of an 𝐿-type angular momentum current in Ni|W highlights the role of Ni as an 𝐿 source and
|
470 |
+
indicates that the Ni/W interface may transmit 𝐿 currents more efficiently than 𝑆 currents.
|
471 |
+
We finally turn to other interesting aspects of our study. A more detailed comparison of Fig. 2a and 2b reveals
|
472 |
+
further changes in amplitude between Ni- and Py-based samples. The pronounced amplitude changes for
|
473 |
+
PM=W or Pt when changing FM=Py to Ni are related to the intricate interplay of all parameters in Eq. (1) in
|
474 |
+
addition to changes in the relative amplitudes of 𝜇� and 𝜇� and interface transmission coefficients for 𝑗� and
|
475 |
+
𝑗�. Therefore, further experiments for a robust separation of 𝑆 and 𝐿 transport are needed.
|
476 |
+
We further find that the THz signals from the Ni-based samples increase linearly with pump fluence. Slight
|
477 |
+
sublinearities at the highest fluences do not alter the THz emission dynamics (Fig. S9). We emphasize that
|
478 |
+
samples deposited on Si rather than glass substrates show very similar THz emission characteristics (Fig. S1).
|
479 |
+
These observations demonstrate the robustness of the observed effects.
|
480 |
+
When adding a Cu layer on top of the Ni|W sample, we find almost no change in the THz emission signal
|
481 |
+
(Fig. S10). Future studies are needed to elaborate the exact character of the IOREE for different interfaces.
|
482 |
+
Interestingly, a Cu intermediate layer in Ni|Cu|W slightly modifies the amplitude and dynamics of the THz
|
483 |
+
signal, suggesting that Cu does not block 𝐿 transport strongly.
|
484 |
+
Regarding earlier reports of different THz emission dynamics in Fe|Au and Fe|Ru samples [29], we note that
|
485 |
+
a possible IOREE in Ru can, in hindsight, not be excluded. A dominant IOREE might also explain the seemingly
|
486 |
+
strong dependence of the Fe|Ru THz emission dynamics on the exact growth details [29, 51, 52].
|
487 |
+
In conclusion, we observe THz-emission signals from optically excited Ni|W stacks that are consistent with
|
488 |
+
an ultrafast injection of 𝐿 currents into W and long-distance ballistic transport through W. Remarkably, we
|
489 |
+
find strong indications for the occurrence of the IOREE. This result can be considered as time-domain
|
490 |
+
evidence of the long-range nature of orbital currents and IOREE in typical metals such as W.
|
491 |
+
Our study highlights the power of broadband THz emission spectroscopy in disentangling of spin and orbital
|
492 |
+
transport and Hall- and Rashba-Edelstein-like angular-momentum conversion processes through ultrafast
|
493 |
+
time-of-flight experiments. Future studies may aim at exploiting L2C physics in materials with nontrivial
|
494 |
+
topology, in which the OHE is predicted to be drastically enhanced close to Weyl points [53]. Our study opens
|
495 |
+
the field of THz orbitronics whose distinct dynamical features allow for tailoring ultrafast spin and orbital
|
496 |
+
currents on femtosecond time scales by a targeted material, thickness and interface engineering of
|
497 |
+
multilayers.
|
498 |
+
|
499 |
+
|
500 |
+
|
501 |
+
Methods
|
502 |
+
Current extraction. To extract the in-plane sheet current flowing inside the sample from the measured THz
|
503 |
+
signal 𝑆, we first measure our setup response function ℎ by having a reference electro-optic emitter (50 μm
|
504 |
+
GaP on a 500 μm glass substrate) at the same position as the sample, which yields a reference THz signal 𝑆���.
|
505 |
+
By calculating the emitted THz electric field from that reference emitter 𝐸���, ℎ is determined by solving the
|
506 |
+
convolution 𝑆��� = (ℎ ∗ 𝐸���)(𝑡) for ℎ [43]. Further measured inputs for this calculation are the excitation
|
507 |
+
spot size with a full width at half maximum of 22 μm, the excitation pulse energy of 1.9 nJ and a transform
|
508 |
+
limited pump pulse with a spectrum centered at 800 nm and 110 nm full width at half maximum. We perform
|
509 |
+
the deconvolution directly in the time domain by recasting it as a matrix equation [54].
|
510 |
+
Next, the electric field 𝐸 directly behind the sample is obtained from the recorded THz signal 𝑆 with the help
|
511 |
+
of the derived function ℎ by solving again the similar equation 𝑆 = (ℎ ∗ 𝐸)(𝑡) for 𝐸. Finally, the sheet charge
|
512 |
+
current (see Table S1) as shown in Fig. 3 is derived from a generalized Ohm’s law [28] that reads 𝐸(𝜔) =
|
513 |
+
𝑒𝑍(𝜔)𝐼�(𝜔) , where −𝑒 is the electron charge and the sample impedance is given by 𝑍(𝜔) =
|
514 |
+
𝑍� [1 + 𝑛��� + 𝑍�𝑑𝜎(𝜔)]
|
515 |
+
⁄
|
516 |
+
with the free space impedance 𝑍�, the metal-stack thickness 𝑑 and the measured
|
517 |
+
mean sample conductivity 𝜎 (see Table S1) that we assume to be frequency independent due to the large
|
518 |
+
Drude scattering rate (see Fig. S2). To enable comparison of THz currents from different samples, we
|
519 |
+
normalize 𝐼� by the absorbed fluence in the FM layer. The data shown in Fig. 3 was obtained in a dry-air
|
520 |
+
atmosphere.
|
521 |
+
Sample preparation. The FM|PM samples (FM = Ni and Py, PM = Pt, Ti, Cu and W) were fabricated on glass
|
522 |
+
substrates of 500 μm thickness or thermally oxidized Si substrates of 625 μm thickness by radio frequency
|
523 |
+
(RF) magnetron sputtering under 6N-purity-Ar atmosphere. The sample structure and thickness are described
|
524 |
+
in Table S1. For the sputtering, the base pressure in the chamber was better than 5.0 × 10-7 Pa. To avoid
|
525 |
+
oxidation, 4-nm-thick SiO2 was sputtered on the surface of the films. All sputtering processes were performed
|
526 |
+
at room temperature.
|
527 |
+
Estimate of electronic temperatures. We calculate the electronic temperatures increase upon pump-pulse
|
528 |
+
absorption by
|
529 |
+
Δ𝑇� = �𝑇�
|
530 |
+
� + 2𝑓
|
531 |
+
𝑑𝛾 − 𝑇�.
|
532 |
+
(3)
|
533 |
+
Here, 𝑇� = 300 K is the ambient temperature, 𝑓 is the absorbed fluence in the respective layer (see
|
534 |
+
Table S1), 𝑑 is the layer thickness and 𝛾 is the specific electronic heat capacity that is 300 J/m3 K2 for W, 320
|
535 |
+
J/m3 K2 for Ni, 330 J/m3 K2 for Ti and 90 J/m3 K2 for Pt [55]. To obtain the absorbed fluences in each layer, we
|
536 |
+
note that the pump electric field is almost constant throughout the sample (see Fig S8). Therefore, local pump
|
537 |
+
absorption scales solely with the imaginary part of the dielectric function at a wavelength of 800 nm, which
|
538 |
+
equals 22.07 for Ni, 9.31 for Pt, 19.41 for Ti and 19.71 for W [56]. Consequently, the absorbed fluence is
|
539 |
+
determined by
|
540 |
+
𝑓��/�� = 𝑓���
|
541 |
+
𝑑��/�� Im𝜀��/��
|
542 |
+
𝑑�� Im𝜀�� + 𝑑�� Im𝜀��
|
543 |
+
|
544 |
+
(4)
|
545 |
+
with the total absorbed fluence 𝑓��� that is obtained from the absorbed pump power (see Table S1) and the
|
546 |
+
beam size on the sample (see above).
|
547 |
+
Model of orbital transport. To model the ballistic current in the PM, we assume that a 𝛿(𝑡)-like transient
|
548 |
+
spin accumulation in the FM causes a change Δ𝑛𝐤� in the occupation of each electronic wavepacket in the
|
549 |
+
PM with mean wavevector 𝐤 right behind the FM/PM interface at 𝑧 = 0� (Fig. 5a). Subsequently, this
|
550 |
+
occupation change propagates into the PM bulk according to Δ𝑛𝐤(𝑧, 𝑡) = Δ𝑛𝐤�𝛿(𝑧 − 𝑣𝐤𝑡), where 𝑣𝐤 is the
|
551 |
+
𝑧 component of the group velocity of the electronic wavepacket. Note that we here restrict ourselves to 𝐤
|
552 |
+
|
553 |
+
with nonnegative 𝑣𝐤. The occupation change Δ𝑛𝐤(𝑧, 𝑡) is accompanied by a particle current density Δ𝑗𝐤 =
|
554 |
+
𝑣𝐤Δ𝑛𝐤. The total pump-induced current density flowing into the depth of the PM layer is given by the sum
|
555 |
+
Δ𝑗(𝑧, 𝑡) =
|
556 |
+
�
|
557 |
+
Δ𝑛𝐤�𝑣𝐤𝛿(𝑧 − 𝑣𝐤𝑡)
|
558 |
+
𝐤, �𝐤��
|
559 |
+
.
|
560 |
+
(5)
|
561 |
+
Because Δ𝑛𝐤� predominantly affects states close to the Fermi energy, the summation of Eq. ( 5 ) is
|
562 |
+
approximately proportional to an integration over the Fermi-surface parts with 𝑣𝐤 ≥ 0. One obtains
|
563 |
+
Δ𝑗(𝑧, 𝑡) = � d𝑣 𝑤(𝑣)𝑣
|
564 |
+
�
|
565 |
+
�
|
566 |
+
𝛿(𝑧 − 𝑣𝑡),
|
567 |
+
(6)
|
568 |
+
where 𝑤(𝑣) is the weight of the group velocity 𝑣 along the 𝑧 axis. We assume that the Fermi surface is a
|
569 |
+
sphere with isotropic occupation change Δ𝑛𝐤� and radius 𝑘�. Consequently, the integrand Δ𝑛𝐤�𝑣𝐤 d�𝐤
|
570 |
+
becomes Δ𝑛𝐤�𝑣� cos 𝜃 𝑘�d𝑘d𝜑d cos𝜃 ∝ 𝑣 d𝑣d𝑘d𝜑, where 𝑣� is the Fermi velocity. In other words, all
|
571 |
+
velocities from 0 to the Fermi velocity 𝑣� have equal weight, and we find
|
572 |
+
Δ𝑗(𝑧, 𝑡) ∝ �
|
573 |
+
d𝑣 𝑣
|
574 |
+
��
|
575 |
+
�
|
576 |
+
𝛿(𝑧 − 𝑣𝑡) = 𝑧
|
577 |
+
𝑡� Θ(𝑣�𝑡 − 𝑧),
|
578 |
+
(7)
|
579 |
+
for 𝑧 > 0. Finally, we phenomenologically account for relaxation of the ballistic current with time constant 𝜏
|
580 |
+
by multiplying Δ𝑗(𝑧, 𝑡) with e��/�, which directly takes us to Eq. (2).
|
581 |
+
|
582 |
+
Acknowledgements
|
583 |
+
We thank G. Sala for fruitful discussions. TSS, RR and TK acknowledge funding by the German Research
|
584 |
+
Foundation (DFG) through the collaborative research center SFB TRR 227 “Ultrafast spin dynamics” (project
|
585 |
+
ID 328545488, projects A05 and B02) and financial support from the Horizon 2020 Framework Programme
|
586 |
+
of the European Commission under FET-Open Grant No. 863155 (s-Nebula). FF and YM acknowledge DFG
|
587 |
+
collaborative research center SFB TRR 173/2 “Spin+X”(project ID 268565370, project A11). KA and HH
|
588 |
+
acknowledge funding by JSPS (Grant Number 22H04964 and 20J20663) and Spintronics Research Network of
|
589 |
+
Japan.
|
590 |
+
|
591 |
+
|
592 |
+
References
|
593 |
+
[1] Go, D., D. Jo, H.-W. Lee, M. Kläui, and Y. Mokrousov Orbitronics: orbital currents in solids. EPL (Europhysics
|
594 |
+
Letters), 2021. 135: p. 37001.
|
595 |
+
[2] Miron, I.M., K. Garello, G. Gaudin, P.-J. Zermatten, M.V. Costache, S. Auffret, S. Bandiera, B. Rodmacq, A.
|
596 |
+
Schuhl, and P. Gambardella Perpendicular switching of a single ferromagnetic layer induced by in-plane
|
597 |
+
current injection. Nature, 2011. 476: p. 189.
|
598 |
+
[3] Ji, B., Y. Han, S. Liu, F. Tao, G. Zhang, Z. Fu, and C. Li Several Key Technologies for 6G: Challenges and
|
599 |
+
Opportunities. IEEE Communications Standards Magazine, 2021. 5: p. 44.
|
600 |
+
[4] Schwierz, F. and J.J. Liou RF transistors: Recent developments and roadmap toward terahertz applications.
|
601 |
+
Solid-State Electronics, 2007. 51: p. 1079.
|
602 |
+
[5] Vedmedenko, E.Y., R.K. Kawakami, D.D. Sheka, P. Gambardella, A. Kirilyuk, A. Hirohata, C. Binek, O.
|
603 |
+
Chubykalo-Fesenko, S. Sanvito, and B.J. Kirby The 2020 magnetism roadmap. Journal of Physics D: Applied
|
604 |
+
Physics, 2020. 53: p. 453001.
|
605 |
+
[6] Salemi, L., M. Berritta, A.K. Nandy, and P.M. Oppeneer Orbitally dominated Rashba-Edelstein effect in
|
606 |
+
noncentrosymmetric antiferromagnets. Nature communications, 2019. 10: p. 1.
|
607 |
+
[7] Johansson, A., B. Göbel, J. Henk, M. Bibes, and I. Mertig Spin and orbital Edelstein effects in a two-
|
608 |
+
dimensional electron gas: Theory and application to SrTiO 3 interfaces. Physical Review Research, 2021. 3: p.
|
609 |
+
013275.
|
610 |
+
[8] Choi, Y.-G., D. Jo, K.-H. Ko, D. Go, K.-H. Kim, H.G. Park, C. Kim, B.-C. Min, G.-M. Choi, and H.-W. Lee
|
611 |
+
Observation of the orbital Hall effect in a light metal Ti. arXiv preprint arXiv:2109.14847, 2021.
|
612 |
+
[9] Go, D., D. Jo, K.-W. Kim, S. Lee, M.-G. Kang, B.-G. Park, S. Blügel, H.-W. Lee, and Y. Mokrousov Long-Range
|
613 |
+
Orbital Transport in Ferromagnets. arXiv preprint arXiv:2106.07928, 2021.
|
614 |
+
[10] Bose, A., F. Kammerbauer, D. Go, Y. Mokrousov, G. Jakob, and M. Klaeui Detection of long-range orbital-
|
615 |
+
Hall torques. arXiv preprint arXiv:2210.02283, 2022.
|
616 |
+
[11] Hayashi, H., D. Jo, D. Go, Y. Mokrousov, H.-W. Lee, and K. Ando Observation of long-range orbital
|
617 |
+
transport and giant orbital torque. arXiv preprint arXiv:2202.13896, 2022.
|
618 |
+
[12] Zheng, Z., Q. Guo, D. Jo, D. Go, L. Wang, H. Chen, W. Yin, X. Wang, G. Yu, and W. He Magnetization
|
619 |
+
switching driven by current-induced torque from weakly spin-orbit coupled Zr. Physical Review Research,
|
620 |
+
2020. 2: p. 013127.
|
621 |
+
[13] Kim, J., D. Go, H. Tsai, D. Jo, K. Kondou, H.-W. Lee, and Y. Otani Nontrivial torque generation by orbital
|
622 |
+
angular momentum injection in ferromagnetic-metal/Cu/Al 2 O 3 trilayers. Physical Review B, 2021. 103: p.
|
623 |
+
L020407.
|
624 |
+
[14] Lee, D., D. Go, H.-J. Park, W. Jeong, H.-W. Ko, D. Yun, D. Jo, S. Lee, G. Go, and J.H. Oh Orbital torque in
|
625 |
+
magnetic bilayers. Nature communications, 2021. 12: p. 1.
|
626 |
+
[15] An, H., Y. Kageyama, Y. Kanno, N. Enishi, and K. Ando Spin–torque generator engineered by natural
|
627 |
+
oxidation of Cu. Nature communications, 2016. 7: p. 1.
|
628 |
+
[16] Go, D., D. Jo, C. Kim, and H.-W. Lee Intrinsic spin and orbital Hall effects from orbital texture. Physical
|
629 |
+
Review Letters, 2018. 121: p. 086602.
|
630 |
+
[17] Go, D., F. Freimuth, J.-P. Hanke, F. Xue, O. Gomonay, K.-J. Lee, S. Blügel, P.M. Haney, H.-W. Lee, and Y.
|
631 |
+
Mokrousov Theory of current-induced angular momentum transfer dynamics in spin-orbit coupled systems.
|
632 |
+
Physical review research, 2020. 2: p. 033401.
|
633 |
+
[18] Go, D. and H.-W. Lee Orbital torque: Torque generation by orbital current injection. Physical review
|
634 |
+
research, 2020. 2: p. 013177.
|
635 |
+
[19] Tazaki, Y., Y. Kageyama, H. Hayashi, T. Harumoto, T. Gao, J. Shi, and K. Ando Current-induced torque
|
636 |
+
originating from orbital current. arXiv preprint arXiv:2004.09165, 2020.
|
637 |
+
[20] Lee, S., M.-G. Kang, D. Go, D. Kim, J.-H. Kang, T. Lee, G.-H. Lee, J. Kang, N.J. Lee, and Y. Mokrousov Efficient
|
638 |
+
conversion of orbital Hall current to spin current for spin-orbit torque switching. Communications Physics,
|
639 |
+
2021. 4: p. 1.
|
640 |
+
[21] Liao, L., F. Xue, L. Han, J. Kim, R. Zhang, L. Li, J. Liu, X. Kou, C. Song, and F. Pan Efficient orbital torque in
|
641 |
+
polycrystalline ferromagnetic− metal/Ru/Al 2 O 3 stacks: Theory and experiment. Physical Review B, 2022.
|
642 |
+
105: p. 104434.
|
643 |
+
|
644 |
+
[22] Xiao, Z.-Y., Y.-J. Li, W. Zhang, Y.-J. Han, D. Li, Q. Chen, Z.-M. Zeng, Z.-Y. Quan, and X.-H. Xu Enhancement
|
645 |
+
of torque efficiency and spin Hall angle driven collaboratively by orbital torque and spin–orbit torque. Applied
|
646 |
+
Physics Letters, 2022. 121: p. 072404.
|
647 |
+
[23] Sala, G. and P. Gambardella Giant orbital Hall effect and orbital-to-spin conversion in 3 d, 5 d, and 4 f
|
648 |
+
metallic heterostructures. Physical Review Research, 2022. 4: p. 033037.
|
649 |
+
[24] Ding, S., A. Ross, D. Go, L. Baldrati, Z. Ren, F. Freimuth, S. Becker, F. Kammerbauer, J. Yang, and G. Jakob
|
650 |
+
Harnessing orbital-to-spin conversion of interfacial orbital currents for efficient spin-orbit torques. Physical
|
651 |
+
review letters, 2020. 125: p. 177201.
|
652 |
+
[25] Manchon, A., J. Železný, I.M. Miron, T. Jungwirth, J. Sinova, A. Thiaville, K. Garello, and P. Gambardella
|
653 |
+
Current-induced spin-orbit torques in ferromagnetic and antiferromagnetic systems. Reviews of Modern
|
654 |
+
Physics, 2019. 91: p. 035004.
|
655 |
+
[26] Seifert, T.S., L. Cheng, Z. Wei, T. Kampfrath, and J. Qi, Spintronic sources of ultrashort terahertz
|
656 |
+
electromagnetic pulses. 2022, AIP Publishing LLC. p. 180401.
|
657 |
+
[27] Xu, Y., F. Zhang, Y. Liu, R. Xu, Y. Jiang, H. Cheng, A. Fert, and W. Zhao Inverse Orbital Hall Effect Discovered
|
658 |
+
from Light-Induced Terahertz Emission. arXiv preprint arXiv:2208.01866, 2022.
|
659 |
+
[28] Seifert, T., S. Jaiswal, U. Martens, J. Hannegan, L. Braun, P. Maldonado, F. Freimuth, A. Kronenberg, J.
|
660 |
+
Henrizi, I. Radu, E. Beaurepaire, Y. Mokrousov, P.M. Oppeneer, M. Jourdan, G. Jakob, D. Turchinovich, L.M.
|
661 |
+
Hayden, M. Wolf, M. Munzenberg, M. Klaui, and T. Kampfrath Efficient metallic spintronic emitters of
|
662 |
+
ultrabroadband terahertz radiation. Nature Photonics, 2016. 10: p. 483.
|
663 |
+
[29] Kampfrath, T., M. Battiato, P. Maldonado, G. Eilers, J. Notzold, S. Mahrlein, V. Zbarsky, F. Freimuth, Y.
|
664 |
+
Mokrousov, S. Blugel, M. Wolf, I. Radu, P.M. Oppeneer, and M. Munzenberg Terahertz spin current pulses
|
665 |
+
controlled by magnetic heterostructures. Nat Nanotechnol, 2013. 8: p. 256.
|
666 |
+
[30] Jungfleisch, M.B., Q. Zhang, W. Zhang, J.E. Pearson, R.D. Schaller, H. Wen, and A. Hoffmann Control of
|
667 |
+
Terahertz Emission by Ultrafast Spin-Charge Current Conversion at Rashba Interfaces. Phys Rev Lett, 2018.
|
668 |
+
120: p. 207207.
|
669 |
+
[31] Zhou, C., Y.P. Liu, Z. Wang, S.J. Ma, M.W. Jia, R.Q. Wu, L. Zhou, W. Zhang, M.K. Liu, Y.Z. Wu, and J. Qi
|
670 |
+
Broadband Terahertz Generation via the Interface Inverse Rashba-Edelstein Effect. Phys Rev Lett, 2018. 121:
|
671 |
+
p. 086801.
|
672 |
+
[32] Rouzegar, R., L. Brandt, L. Nádvorník, D.A. Reiss, A.L. Chekhov, O. Gueckstock, C. In, M. Wolf, T.S. Seifert,
|
673 |
+
and P.W. Brouwer Laser-induced terahertz spin transport in magnetic nanostructures arises from the same
|
674 |
+
force as ultrafast demagnetization. Physical Review B, 2022. 106: p. 144427.
|
675 |
+
[33] Lichtenberg, T., M. Beens, M.H. Jansen, B. Koopmans, and R.A. Duine Probing optically induced spin
|
676 |
+
currents using terahertz spin waves in noncollinear magnetic bilayers. Physical Review B, 2022. 105: p.
|
677 |
+
144416.
|
678 |
+
[34] Mueller, B.Y. and B. Rethfeld ThermodynamicμTmodel of ultrafast magnetization dynamics. Physical
|
679 |
+
Review B, 2014. 90: p. 144420.
|
680 |
+
[35] Choi, G.M., B.C. Min, K.J. Lee, and D.G. Cahill Spin current generated by thermally driven ultrafast
|
681 |
+
demagnetization. Nat Commun, 2014. 5: p. 4334.
|
682 |
+
[36] Boeglin, C., E. Beaurepaire, V. Halté, V. López-Flores, C. Stamm, N. Pontius, H. Dürr, and J.-Y. Bigot
|
683 |
+
Distinguishing the ultrafast dynamics of spin and orbital moments in solids. Nature, 2010. 465: p. 458.
|
684 |
+
[37] Stamm, C., N. Pontius, T. Kachel, M. Wietstruk, and H. Dürr Femtosecond x-ray absorption spectroscopy
|
685 |
+
of spin and orbital angular momentum in photoexcited Ni films during ultrafast demagnetization. Physical
|
686 |
+
Review B, 2010. 81: p. 104425.
|
687 |
+
[38] Hennecke, M., I. Radu, R. Abrudan, T. Kachel, K. Holldack, R. Mitzner, A. Tsukamoto, and S. Eisebitt
|
688 |
+
Angular Momentum Flow During Ultrafast Demagnetization of a Ferrimagnet. Physical Review Letters, 2019.
|
689 |
+
122: p. 157202.
|
690 |
+
[39] Zhang, W., P. Maldonado, Z. Jin, T.S. Seifert, J. Arabski, G. Schmerber, E. Beaurepaire, M. Bonn, T.
|
691 |
+
Kampfrath, P.M. Oppeneer, and D. Turchinovich Ultrafast terahertz magnetometry. Nat Commun, 2020. 11:
|
692 |
+
p. 4247.
|
693 |
+
[40] Salemi, L. and P.M. Oppeneer First-principles theory of intrinsic spin and orbital Hall and Nernst effects
|
694 |
+
in metallic monoatomic crystals. Physical Review Materials, 2022. 6: p. 095001.
|
695 |
+
[41] Seifert, T.S., N.M. Tran, O. Gueckstock, S.M. Rouzegar, L. Nadvornik, S. Jaiswal, G. Jakob, V.V. Temnov,
|
696 |
+
M. Münzenberg, M. Wolf, M. Kläui, and T. Kampfrath Terahertz spectroscopy for all-optical spintronic
|
697 |
+
|
698 |
+
characterization of the spin-Hall-effect metals Pt, W and Cu80Ir20. Journal of Physics D: Applied Physics,
|
699 |
+
2018. 51: p. 364003.
|
700 |
+
[42] Huber, R., A. Brodschelm, F. Tauser, and A. Leitenstorfer Generation and field-resolved detection of
|
701 |
+
femtosecond electromagnetic pulses tunable up to 41 THz. Applied Physics Letters, 2000. 76: p. 3191.
|
702 |
+
[43] Braun, L., G. Mussler, A. Hruban, M. Konczykowski, T. Schumann, M. Wolf, M. Münzenberg, L. Perfetti,
|
703 |
+
and T. Kampfrath Ultrafast photocurrents at the surface of the three-dimensional topological insulator Bi 2
|
704 |
+
Se 3. Nature communications, 2016. 7: p. 1.
|
705 |
+
[44] Gueckstock, O., L. Nadvornik, M. Gradhand, T.S. Seifert, G. Bierhance, R. Rouzegar, M. Wolf, M. Vafaee,
|
706 |
+
J. Cramer, M.A. Syskaki, G. Woltersdorf, I. Mertig, G. Jakob, M. Klaui, and T. Kampfrath Terahertz Spin-to-
|
707 |
+
Charge Conversion by Interfacial Skew Scattering in Metallic Bilayers. Adv Mater, 2021. 33: p. e2006281.
|
708 |
+
[45] Ding, S., Z. Liang, D. Go, C. Yun, M. Xue, Z. Liu, S. Becker, W. Yang, H. Du, and C. Wang Observation of the
|
709 |
+
orbital Rashba-Edelstein magnetoresistance. Physical review letters, 2022. 128: p. 067201.
|
710 |
+
[46] Santos, E., J. Abrão, D. Go, L. de Assis, Y. Mokrousov, J. Mendes, and A. Azevedo Inverse Orbital Torque
|
711 |
+
via Spin-Orbital Entangled States. arXiv preprint arXiv:2204.01825, 2022.
|
712 |
+
[47] Okano, G., M. Matsuo, Y. Ohnuma, S. Maekawa, and Y. Nozaki Nonreciprocal spin current generation in
|
713 |
+
surface-oxidized copper films. Physical review letters, 2019. 122: p. 217701.
|
714 |
+
[48] Yoda, T., T. Yokoyama, and S. Murakami Orbital Edelstein effect as a condensed-matter analog of
|
715 |
+
solenoids. Nano letters, 2018. 18: p. 916.
|
716 |
+
[49] Go, D., J.-P. Hanke, P.M. Buhl, F. Freimuth, G. Bihlmayer, H.-W. Lee, Y. Mokrousov, and S. Blügel Toward
|
717 |
+
surface orbitronics: giant orbital magnetism from the orbital Rashba effect at the surface of sp-metals.
|
718 |
+
Scientific reports, 2017. 7: p. 1.
|
719 |
+
[50] Chattaraj, A., S. Joulie, V. Serin, A. Claverie, V. Kumar, and A. Kanjilal Crucial role of oxygen on the bulk
|
720 |
+
and surface electronic properties of stable β phase of tungsten. Scientific reports, 2022. 12: p. 1.
|
721 |
+
[51] Wu, Y., M. Elyasi, X. Qiu, M. Chen, Y. Liu, L. Ke, and H. Yang High-Performance THz Emitters Based on
|
722 |
+
Ferromagnetic/Nonmagnetic Heterostructures. Adv Mater, 2017. 29: p. 1603031.
|
723 |
+
[52] Zhang, S., Z. Jin, Z. Zhu, W. Zhu, Z. Zhang, G. Ma, and J. Yao Bursts of efficient terahertz radiation with
|
724 |
+
saturation effect from metal-based ferromagnetic heterostructures. Journal of Physics D: Applied Physics,
|
725 |
+
2017. 51: p. 034001.
|
726 |
+
[53] Niu, C., J.-P. Hanke, P.M. Buhl, H. Zhang, L. Plucinski, D. Wortmann, S. Blügel, G. Bihlmayer, and Y.
|
727 |
+
Mokrousov Mixed topological semimetals driven by orbital complexity in two-dimensional ferromagnets.
|
728 |
+
Nature communications, 2019. 10: p. 1.
|
729 |
+
[54] Seifert, T.S., S. Jaiswal, J. Barker, S.T. Weber, I. Razdolski, J. Cramer, O. Gueckstock, S.F. Maehrlein, L.
|
730 |
+
Nadvornik, S. Watanabe, C. Ciccarelli, A. Melnikov, G. Jakob, M. Munzenberg, S.T.B. Goennenwein, G.
|
731 |
+
Woltersdorf, B. Rethfeld, P.W. Brouwer, M. Wolf, M. Klaui, and T. Kampfrath Femtosecond formation
|
732 |
+
dynamics of the spin Seebeck effect revealed by terahertz spectroscopy. Nat Commun, 2018. 9: p. 2899.
|
733 |
+
[55] Lin, Z., L.V. Zhigilei, and V. Celli Electron-phonon coupling and electron heat capacity of metals under
|
734 |
+
conditions of strong electron-phonon nonequilibrium. Physical Review B, 2008. 77: p. 075133.
|
735 |
+
[56] Ordal, M.A., L.L. Long, R.J. Bell, S.E. Bell, R.R. Bell, R.W. Alexander, and C.A. Ward Optical properties of
|
736 |
+
the metals Al, Co, Cu, Au, Fe, Pb, Ni, Pd, Pt, Ag, Ti, and W in the infrared and far infrared. Applied Optics, 1983.
|
737 |
+
22: p. 1099.
|
738 |
+
[57] Zak, J., E. Moog, C. Liu, and S. Bader Universal approach to magneto-optics. Journal of Magnetism and
|
739 |
+
Magnetic Materials, 1990. 89: p. 107.
|
740 |
+
|
741 |
+
|
742 |
+
|
743 |
+
|
744 |
+
Supplementary Materials
|
745 |
+
First, we summarize briefly the content of the Supplementary Materials before showing the
|
746 |
+
corresponding data:
|
747 |
+
|
748 |
+
|
749 |
+
Samples on Si show qualitatively the same THz emission waveforms for Ni with Pt, W and Ti.
|
750 |
+
Most importantly, the strong change in W dynamics is also observed on Si (Fig. S1). However, the
|
751 |
+
THz waveforms of Si vs glass differ in the details, which might be related to slightly changed
|
752 |
+
transport times.
|
753 |
+
|
754 |
+
Drude scattering times are estimated to be <50 fs for all studied samples (Figs. S2). None of the
|
755 |
+
samples showed any indication of a drastically different Drude scattering time compared to all
|
756 |
+
other samples.
|
757 |
+
|
758 |
+
Emitted THz signals are found to be linearly polarized and perpendicular to the sample
|
759 |
+
magnetization (Fig. S3).
|
760 |
+
|
761 |
+
Pump-polarization dependent studies (pump helicity and linear polarization direction) show a
|
762 |
+
minor impact on the measured THz emission signal (Figs. S4).
|
763 |
+
|
764 |
+
We perform THz emission measurements upon reversing the sample. Only the pure Ni film shows
|
765 |
+
a dominant contribution even in sample rotation, which we ascribe to SIA or magnetic dipole
|
766 |
+
radiation (Fig. S5) [32, 39].
|
767 |
+
|
768 |
+
For all Py-based bilayer samples, we find almost identical THz emission waveform shapes even
|
769 |
+
for PM thicknesses of 20 nm (Fig. S6).
|
770 |
+
|
771 |
+
For Ni|Ti samples, we find almost identical THz emission dynamics to Ni|Pt (Fig. S7).
|
772 |
+
|
773 |
+
Currents driven by pump light gradients in thick films of Ni|W and Ni|Ti can be neglected (Fig.
|
774 |
+
S8).
|
775 |
+
|
776 |
+
All fluence dependencies are to a good approximation linear (Fig S9) with minor sublinearities
|
777 |
+
overserved for Ni|Ti and Ni|W samples. Related to that, only minor changes in the THz waveform
|
778 |
+
dynamics can be observed for different pumping fluences (Fig S9)
|
779 |
+
|
780 |
+
Cu has only minor impact on the emitted THz waveforms (Fig. S10), either as a spacer layer or as
|
781 |
+
a capping layer as confirmed by comparison to the same sample without Cu.
|
782 |
+
|
783 |
+
All data in the Supplementary Materials was measured with a 1 mm ZnTe(110) detection crystal.
|
784 |
+
|
785 |
+
|
786 |
+
|
787 |
+
|
788 |
+
|
789 |
+
FIGURE S1: Si vs glass substrate. a Terahertz-emission waveforms from Ni|PM stacks on Si substrates. THz
|
790 |
+
waveforms for Si based samples are multiplied by -1 to account for the reversed sample orientation due
|
791 |
+
to the intransparency of the Si substrate for the pump pulse. a Terahertz-emission waveforms from Ni|PM
|
792 |
+
stacks on glass substrates. Film thicknesses in nanometers are given as numerals in parenthesis. Note the
|
793 |
+
rescaling of the Ni|Pt sample THz waveforms.
|
794 |
+
|
795 |
+
|
796 |
+
|
797 |
+
b
|
798 |
+
a
|
799 |
+
|
800 |
+
Glass substrate
|
801 |
+
X10-7
|
802 |
+
5
|
803 |
+
4
|
804 |
+
3
|
805 |
+
Terahertz signal
|
806 |
+
2
|
807 |
+
-2
|
808 |
+
-3
|
809 |
+
-1.5
|
810 |
+
-1
|
811 |
+
-0.5
|
812 |
+
0
|
813 |
+
0.5
|
814 |
+
Time
|
815 |
+
e (ps)Si substrate
|
816 |
+
X10-7
|
817 |
+
2.5
|
818 |
+
Ni(5)/Pt(3)/4
|
819 |
+
2
|
820 |
+
Ni(5)ITi(3)
|
821 |
+
Ni(5)/Ti(20)
|
822 |
+
1.5
|
823 |
+
Ni(5)IW(3)
|
824 |
+
Terahertz signal
|
825 |
+
Ni(5)/W(20)
|
826 |
+
1
|
827 |
+
0.5
|
828 |
+
O
|
829 |
+
-0.5
|
830 |
+
-1
|
831 |
+
-1.5
|
832 |
+
-2
|
833 |
+
-0.5
|
834 |
+
0
|
835 |
+
0.5
|
836 |
+
1
|
837 |
+
1
|
838 |
+
Time
|
839 |
+
(ps)FIGURE S2: Terahertz conductivities for samples on glass. Mean complex-valued terahertz conductivities
|
840 |
+
obtained from terahertz transmission measurements for a Ni, b Ni|Ti, c Ni|Pt and d Ni|W samples. For the
|
841 |
+
extraction, a thin film formula is applied [41] and a terahertz refractive index of 2.1 for glass is assumed.
|
842 |
+
Film thicknesses in nanometers are given as numerals in parenthesis.
|
843 |
+
|
844 |
+
|
845 |
+
|
846 |
+
c
|
847 |
+
d
|
848 |
+
a
|
849 |
+
b
|
850 |
+
|
851 |
+
Ni(5)
|
852 |
+
X106
|
853 |
+
7
|
854 |
+
6
|
855 |
+
real
|
856 |
+
imag
|
857 |
+
5
|
858 |
+
Conductivity (S/m)
|
859 |
+
4
|
860 |
+
3
|
861 |
+
2
|
862 |
+
1
|
863 |
+
0
|
864 |
+
-1
|
865 |
+
1.5
|
866 |
+
2
|
867 |
+
1
|
868 |
+
2.5
|
869 |
+
3
|
870 |
+
3.5
|
871 |
+
Freguency (THz)Ni(5)[Pt(3)
|
872 |
+
X106
|
873 |
+
7
|
874 |
+
real
|
875 |
+
6
|
876 |
+
imag
|
877 |
+
5
|
878 |
+
Conductivity (S/m)
|
879 |
+
4
|
880 |
+
3
|
881 |
+
2
|
882 |
+
1
|
883 |
+
0
|
884 |
+
-1
|
885 |
+
1
|
886 |
+
1.5
|
887 |
+
2
|
888 |
+
2.5
|
889 |
+
3
|
890 |
+
3.5
|
891 |
+
Freguency (THz)Ni(5)/W(3)
|
892 |
+
X106
|
893 |
+
7
|
894 |
+
real
|
895 |
+
6
|
896 |
+
imag
|
897 |
+
5
|
898 |
+
Conductivity (S/m)
|
899 |
+
4
|
900 |
+
3
|
901 |
+
2
|
902 |
+
1
|
903 |
+
0
|
904 |
+
-1
|
905 |
+
1
|
906 |
+
1.5
|
907 |
+
2
|
908 |
+
2.5
|
909 |
+
3
|
910 |
+
3.5
|
911 |
+
Freguency (THz)Ni(5)/Ti(3)
|
912 |
+
X106
|
913 |
+
7
|
914 |
+
real
|
915 |
+
6
|
916 |
+
imag
|
917 |
+
5
|
918 |
+
Conductivity (S/m)
|
919 |
+
4
|
920 |
+
3
|
921 |
+
2
|
922 |
+
1
|
923 |
+
0
|
924 |
+
-1
|
925 |
+
1
|
926 |
+
1.5
|
927 |
+
2
|
928 |
+
2.5
|
929 |
+
3
|
930 |
+
3.5
|
931 |
+
Freguency (THz)
|
932 |
+
FIGURE S3: Polarization state of the THz emission signal. Samples are magnetized along the s-direction
|
933 |
+
and pump pulses are polarized along the p-direction. Film thicknesses in nanometers are given as numerals
|
934 |
+
in parenthesis.
|
935 |
+
|
936 |
+
-2
|
937 |
+
-1
|
938 |
+
0
|
939 |
+
1
|
940 |
+
2
|
941 |
+
Time (ps)
|
942 |
+
-2
|
943 |
+
0
|
944 |
+
2
|
945 |
+
4
|
946 |
+
6
|
947 |
+
8
|
948 |
+
10
|
949 |
+
Terahertz signal
|
950 |
+
10-7
|
951 |
+
Ni(5)|Pt(3),p-pol
|
952 |
+
Ni(5)|Ti(3),p-pol
|
953 |
+
Ni(5)|W(3),p-pol
|
954 |
+
Ni(5)|Pt(3),s-pol
|
955 |
+
Ni(5)|Ti(3),s-pol
|
956 |
+
Ni(5)|W(3),s-pol
|
957 |
+
|
958 |
+
|
959 |
+
FIGURE S4: Impact of pump polarization. a and b: Circular pump polarization. Terahertz emission signals
|
960 |
+
even and odd in change of pump helicity for terahertz emission polarized along the p-direction (a) and s-
|
961 |
+
direction (b). c and d: Linear pump polarization. Terahertz emission signals even and odd in change of
|
962 |
+
pump polarization from s to p polarized for terahertz emission polarized along the p-direction (c) and s-
|
963 |
+
direction (d). Samples are magnetized along the s-direction. Film thicknesses in nanometers are given as
|
964 |
+
numerals in parenthesis.
|
965 |
+
|
966 |
+
-2
|
967 |
+
-1
|
968 |
+
0
|
969 |
+
1
|
970 |
+
2
|
971 |
+
Time (ps)
|
972 |
+
0
|
973 |
+
2
|
974 |
+
4
|
975 |
+
6
|
976 |
+
8
|
977 |
+
10
|
978 |
+
12
|
979 |
+
14
|
980 |
+
16
|
981 |
+
18
|
982 |
+
Terahertz signal
|
983 |
+
10-7
|
984 |
+
helicity,THz p-pol
|
985 |
+
Ni(5)|Pt(3),even
|
986 |
+
Ni(5)|Ti(3),even
|
987 |
+
Ni(5)|W(3),even
|
988 |
+
Ni(5)|Pt(3),odd
|
989 |
+
Ni(5)|Ti(3),odd
|
990 |
+
Ni(5)|W(3),odd
|
991 |
+
-2
|
992 |
+
-1
|
993 |
+
0
|
994 |
+
1
|
995 |
+
2
|
996 |
+
Time (ps)
|
997 |
+
0
|
998 |
+
2
|
999 |
+
4
|
1000 |
+
6
|
1001 |
+
8
|
1002 |
+
10
|
1003 |
+
12
|
1004 |
+
14
|
1005 |
+
16
|
1006 |
+
18
|
1007 |
+
Terahertz signal
|
1008 |
+
10-7
|
1009 |
+
helicity,THzs-pol
|
1010 |
+
-2
|
1011 |
+
-1
|
1012 |
+
0
|
1013 |
+
1
|
1014 |
+
2
|
1015 |
+
Time (ps)
|
1016 |
+
0
|
1017 |
+
2
|
1018 |
+
4
|
1019 |
+
6
|
1020 |
+
8
|
1021 |
+
10
|
1022 |
+
12
|
1023 |
+
14
|
1024 |
+
16
|
1025 |
+
18
|
1026 |
+
Terahertz signal
|
1027 |
+
10-7s vs p pump,THz p-pol
|
1028 |
+
Ni(5)|Pt(3),even
|
1029 |
+
Ni(5)|Ti(3),even
|
1030 |
+
Ni(5)|W(3),even
|
1031 |
+
Ni(5)|Pt(3),odd
|
1032 |
+
Ni(5)|Ti(3),odd
|
1033 |
+
Ni(5)|W(3),odd
|
1034 |
+
-2
|
1035 |
+
-1
|
1036 |
+
0
|
1037 |
+
1
|
1038 |
+
2
|
1039 |
+
Time (ps)
|
1040 |
+
0
|
1041 |
+
2
|
1042 |
+
4
|
1043 |
+
6
|
1044 |
+
8
|
1045 |
+
10
|
1046 |
+
12
|
1047 |
+
14
|
1048 |
+
16
|
1049 |
+
18
|
1050 |
+
Terahertz signal
|
1051 |
+
10-7 s vs p pump,THz s-pol
|
1052 |
+
a
|
1053 |
+
b
|
1054 |
+
c
|
1055 |
+
d
|
1056 |
+
|
1057 |
+
|
1058 |
+
FIGURE S5: Front-side vs back-side pump geometry. a Samples pumped from the front side. b Samples
|
1059 |
+
pumped from the back side. The back-side pumping is defined as the direction where the pump pulse first
|
1060 |
+
traverses the substrate before exciting the sample and is the standard direction used for all measurements
|
1061 |
+
throughout this work. Film thicknesses in nanometers are given as numerals in parenthesis.
|
1062 |
+
|
1063 |
+
|
1064 |
+
FIGURE S6: Terahertz emission signals for Py based samples as shown in Fig. 2a in addition to terahertz
|
1065 |
+
emission signals from thicker Ti and W layers on Py. Film thicknesses in nanometers are given as numerals
|
1066 |
+
in parenthesis.
|
1067 |
+
|
1068 |
+
|
1069 |
+
b
|
1070 |
+
a
|
1071 |
+
b
|
1072 |
+
a
|
1073 |
+
|
1074 |
+
front-side
|
1075 |
+
back-side
|
1076 |
+
X10-6
|
1077 |
+
X10-6
|
1078 |
+
Ni(5)
|
1079 |
+
6
|
1080 |
+
6
|
1081 |
+
Ni(5)/Pt(3)/5
|
1082 |
+
5
|
1083 |
+
5
|
1084 |
+
Ni(5)/Ti(3)
|
1085 |
+
4
|
1086 |
+
4
|
1087 |
+
Ni(5)IPt(3)/5
|
1088 |
+
Terahertz signal
|
1089 |
+
3
|
1090 |
+
Y
|
1091 |
+
erahertz
|
1092 |
+
2
|
1093 |
+
Ni(5)/W(3)
|
1094 |
+
Ni(5)IPt(3)/5
|
1095 |
+
0
|
1096 |
+
0
|
1097 |
+
-2
|
1098 |
+
.1
|
1099 |
+
0
|
1100 |
+
2
|
1101 |
+
-2
|
1102 |
+
-1
|
1103 |
+
0
|
1104 |
+
1
|
1105 |
+
2
|
1106 |
+
Time (ps)
|
1107 |
+
Time (ps)X10-6
|
1108 |
+
3
|
1109 |
+
Py(5)/Pt(3) /3
|
1110 |
+
Py(5)/Ti(3)
|
1111 |
+
2
|
1112 |
+
Py(5)/W(3)
|
1113 |
+
Py(5)ITi(20)
|
1114 |
+
Terahertz signal
|
1115 |
+
Py(5)IW(20)
|
1116 |
+
0
|
1117 |
+
-2
|
1118 |
+
-3
|
1119 |
+
0
|
1120 |
+
2
|
1121 |
+
1
|
1122 |
+
Time (ps)Py(5)IPt(3)
|
1123 |
+
Py(5)/Ti(3)
|
1124 |
+
Norm. terahertz signal
|
1125 |
+
Py(5)/W(3)
|
1126 |
+
0.5
|
1127 |
+
-0.5
|
1128 |
+
0
|
1129 |
+
2
|
1130 |
+
1
|
1131 |
+
Time
|
1132 |
+
(ps)
|
1133 |
+
FIGURE S7: Ni|Pt vs Ni|Ti. Film thicknesses in nanometers are given as numerals in parenthesis. Note the
|
1134 |
+
rescaling of the Ni|Pt sample waveform.
|
1135 |
+
|
1136 |
+
|
1137 |
+
FIGURE S8: Calculated pump-light gradient in Ni for Ni(5)|Ti(20) and Ni(5)|W(20) samples, which are the
|
1138 |
+
thickest samples measured. However, even in these thickest samples, the pump-light gradient is minor.
|
1139 |
+
The calculation is based on a transfer matrix formalism [57]. Film thicknesses in nanometers are given as
|
1140 |
+
numerals in parenthesis.
|
1141 |
+
|
1142 |
+
0
|
1143 |
+
1
|
1144 |
+
2
|
1145 |
+
3
|
1146 |
+
4
|
1147 |
+
Time (ps)
|
1148 |
+
-3
|
1149 |
+
-2
|
1150 |
+
-1
|
1151 |
+
0
|
1152 |
+
1
|
1153 |
+
2
|
1154 |
+
3
|
1155 |
+
4
|
1156 |
+
Terahertz signal
|
1157 |
+
10-7
|
1158 |
+
Ni(5)|Pt(3)/5
|
1159 |
+
Ni(5)|Ti(3)
|
1160 |
+
Ni(5)|Ti(20)
|
1161 |
+
0
|
1162 |
+
2
|
1163 |
+
4
|
1164 |
+
Thickness (nm)
|
1165 |
+
0
|
1166 |
+
0.05
|
1167 |
+
0.1
|
1168 |
+
0.15
|
1169 |
+
0.2
|
1170 |
+
0.25
|
1171 |
+
Rel. pump light intensity
|
1172 |
+
Ni(5)|Ti(20)
|
1173 |
+
Ni(5)|W(20)
|
1174 |
+
|
1175 |
+
|
1176 |
+
FIGURE S9: Pump fluence dependencies. a Fluence dependencies of Ni capped with Pt, W or Ti. The data
|
1177 |
+
was contracted by taking the root mean square (RMS) of the time-domain traces. b-f Normalized THz
|
1178 |
+
emission signals for different pump fluences. Film thicknesses in nanometers are given as numerals in
|
1179 |
+
parenthesis.
|
1180 |
+
|
1181 |
+
|
1182 |
+
b
|
1183 |
+
a
|
1184 |
+
d
|
1185 |
+
c
|
1186 |
+
f
|
1187 |
+
e
|
1188 |
+
|
1189 |
+
X10-6
|
1190 |
+
10
|
1191 |
+
RMS of terahertz signal
|
1192 |
+
Ni(5)IPt(3)/3
|
1193 |
+
Ni(5)ITi(3)
|
1194 |
+
8
|
1195 |
+
Ni(5)IW(3)
|
1196 |
+
6
|
1197 |
+
4
|
1198 |
+
2
|
1199 |
+
0
|
1200 |
+
0.05
|
1201 |
+
0.1
|
1202 |
+
Incident fluence
|
1203 |
+
(mJ/cm²Ni(5)[Pt(3)
|
1204 |
+
0.25
|
1205 |
+
0.5
|
1206 |
+
0.75
|
1207 |
+
Norm. terahertz signal
|
1208 |
+
0.5
|
1209 |
+
1
|
1210 |
+
-0.5
|
1211 |
+
-0.5
|
1212 |
+
0
|
1213 |
+
0.5
|
1214 |
+
Time
|
1215 |
+
(psNi(5)/Ti(3)
|
1216 |
+
Norm. terahertz signal
|
1217 |
+
0.5
|
1218 |
+
0
|
1219 |
+
-0.5
|
1220 |
+
-1.5
|
1221 |
+
-0.5
|
1222 |
+
0
|
1223 |
+
0.5
|
1224 |
+
7
|
1225 |
+
Time
|
1226 |
+
(psNi(5)/Ti(20)
|
1227 |
+
0.5
|
1228 |
+
terahertz signal
|
1229 |
+
-0.5
|
1230 |
+
Norm. t
|
1231 |
+
-1.5
|
1232 |
+
-0.5
|
1233 |
+
0
|
1234 |
+
0.5
|
1235 |
+
Time
|
1236 |
+
e (ps)Ni(5)/W(3)
|
1237 |
+
0.5
|
1238 |
+
Norm. terahertz signal
|
1239 |
+
-0.5
|
1240 |
+
-1.5
|
1241 |
+
-0.5
|
1242 |
+
0
|
1243 |
+
0.5
|
1244 |
+
Time
|
1245 |
+
(psNi(5)/W(20)
|
1246 |
+
0.5
|
1247 |
+
Norm. terahertz signal
|
1248 |
+
-0.5
|
1249 |
+
-1.5
|
1250 |
+
-0.5
|
1251 |
+
0
|
1252 |
+
0.5
|
1253 |
+
Time
|
1254 |
+
e (ps)FIGURE S10: Impact of cupper inter- and capping layers. a Reference samples without Cu b Samples with
|
1255 |
+
Cu intermediate layer c Samples with Cu capping layer. Film thicknesses in nanometers are given as
|
1256 |
+
numerals in parenthesis.
|
1257 |
+
|
1258 |
+
|
1259 |
+
|
1260 |
+
a
|
1261 |
+
b
|
1262 |
+
c
|
1263 |
+
|
1264 |
+
X10-6
|
1265 |
+
2
|
1266 |
+
Ni(5)/W(3)/Cu(2
|
1267 |
+
Ni(5)IPt(3)ICu(2)
|
1268 |
+
1.5
|
1269 |
+
Ni(5)/Ti(3)ICu(2)
|
1270 |
+
Ni(5)ICu(2)
|
1271 |
+
Terahertz signal
|
1272 |
+
0.5
|
1273 |
+
0
|
1274 |
+
-0.5
|
1275 |
+
-2
|
1276 |
+
0
|
1277 |
+
2
|
1278 |
+
Time (ps)X10-6
|
1279 |
+
1.5
|
1280 |
+
Ni(5)/Cu(2)W(3)
|
1281 |
+
Ni(5)ICu(2)IPt(3)
|
1282 |
+
Ni(5)ICu(2)/Ti(3)
|
1283 |
+
Ni(5)ICu(2)
|
1284 |
+
Terahertz signal
|
1285 |
+
0.5
|
1286 |
+
0
|
1287 |
+
-0.5
|
1288 |
+
-2
|
1289 |
+
0
|
1290 |
+
2
|
1291 |
+
Time (ps)X10-6
|
1292 |
+
Ni(5)/W(3)
|
1293 |
+
Ni(5)IPt(3)
|
1294 |
+
3
|
1295 |
+
Ni(5)ITi(3)
|
1296 |
+
Terahertz signal
|
1297 |
+
2
|
1298 |
+
-2
|
1299 |
+
-2
|
1300 |
+
-1
|
1301 |
+
0
|
1302 |
+
2
|
1303 |
+
Time (ps)
|
1304 |
+
Sample
|
1305 |
+
Absorptance
|
1306 |
+
Absorbed fluence
|
1307 |
+
in the FM layer
|
1308 |
+
(mJ/cm2)
|
1309 |
+
Absorbed
|
1310 |
+
fluence in the
|
1311 |
+
PM layer
|
1312 |
+
(mJ/cm2)
|
1313 |
+
Conductivity (1e6
|
1314 |
+
S/m)
|
1315 |
+
Glass| Ti(50)
|
1316 |
+
-
|
1317 |
+
-
|
1318 |
+
-
|
1319 |
+
1.6
|
1320 |
+
Glass| Ni(5)|W(20)
|
1321 |
+
0.52
|
1322 |
+
0.06
|
1323 |
+
0.20
|
1324 |
+
5.1
|
1325 |
+
Glass| Ni(5)|Pt(3)
|
1326 |
+
0.63
|
1327 |
+
0.25
|
1328 |
+
0.06
|
1329 |
+
3.6
|
1330 |
+
Glass| Ni(5)|Ti(3)
|
1331 |
+
0.58
|
1332 |
+
0.19
|
1333 |
+
0.10
|
1334 |
+
2.2
|
1335 |
+
Glass| Ni(5)|W(3)
|
1336 |
+
0.58
|
1337 |
+
0.19
|
1338 |
+
0.10
|
1339 |
+
2.1
|
1340 |
+
Glass| Ni(5)|Ti(20)
|
1341 |
+
0.51
|
1342 |
+
0.06
|
1343 |
+
0.20
|
1344 |
+
1.6
|
1345 |
+
Glass| Ni(5)
|
1346 |
+
0.51
|
1347 |
+
0.25
|
1348 |
+
-
|
1349 |
+
1.7
|
1350 |
+
Glass| Py(5)|W(3)
|
1351 |
+
-
|
1352 |
+
-
|
1353 |
+
-
|
1354 |
+
2.2
|
1355 |
+
Glass| Py(5)|Ti(3)
|
1356 |
+
-
|
1357 |
+
-
|
1358 |
+
-
|
1359 |
+
1.5
|
1360 |
+
Glass| Py(5)|Pt(3)
|
1361 |
+
-
|
1362 |
+
-
|
1363 |
+
-
|
1364 |
+
2.5
|
1365 |
+
Glass| Py(5)|W(20)
|
1366 |
+
-
|
1367 |
+
-
|
1368 |
+
-
|
1369 |
+
5.3
|
1370 |
+
Glass| Py(5)
|
1371 |
+
-
|
1372 |
+
-
|
1373 |
+
-
|
1374 |
+
2.4
|
1375 |
+
Glass| Py(5)|Ti(20)
|
1376 |
+
-
|
1377 |
+
-
|
1378 |
+
-
|
1379 |
+
1.2
|
1380 |
+
Glass| Ni(5)|Ti(3)|Cu(2)
|
1381 |
+
0.53
|
1382 |
+
-
|
1383 |
+
-
|
1384 |
+
3.1
|
1385 |
+
Glass| Ni(5)|Pt(3)|Cu(2)
|
1386 |
+
0.54
|
1387 |
+
-
|
1388 |
+
-
|
1389 |
+
4.2
|
1390 |
+
Glass| Ni(5)|W(3)|Cu(2)
|
1391 |
+
0.58
|
1392 |
+
-
|
1393 |
+
-
|
1394 |
+
4.0
|
1395 |
+
Glass| Ni(5)|Cu(2)
|
1396 |
+
0.52
|
1397 |
+
-
|
1398 |
+
-
|
1399 |
+
4.5
|
1400 |
+
Glass| Ni(5)|Cu(2)|Ti(3)
|
1401 |
+
0.56
|
1402 |
+
-
|
1403 |
+
-
|
1404 |
+
3.4
|
1405 |
+
Glass| Ni(5)|Cu(2)|Pt(3)
|
1406 |
+
0.54
|
1407 |
+
-
|
1408 |
+
-
|
1409 |
+
3.7
|
1410 |
+
Glass| Ni(5)|Cu(2)|W(3)
|
1411 |
+
0.57
|
1412 |
+
-
|
1413 |
+
-
|
1414 |
+
3.4
|
1415 |
+
Glass| Ni(5)|W(15)
|
1416 |
+
0.54
|
1417 |
+
0.07
|
1418 |
+
0.19
|
1419 |
+
4.7
|
1420 |
+
Glass| Ni(5)|W(10)
|
1421 |
+
0.57
|
1422 |
+
0.10
|
1423 |
+
0.18
|
1424 |
+
4.2
|
1425 |
+
Glass| Ni(5)|W(5)
|
1426 |
+
0.63
|
1427 |
+
0.16
|
1428 |
+
0.15
|
1429 |
+
3.6
|
1430 |
+
Glass| Ni(5)|W(2)
|
1431 |
+
0.60
|
1432 |
+
0.22
|
1433 |
+
0.08
|
1434 |
+
2.9
|
1435 |
+
Si| Ni(5)|W(3)
|
1436 |
+
-
|
1437 |
+
-
|
1438 |
+
-
|
1439 |
+
2.9
|
1440 |
+
Si| Ni(5)|Ti(20)
|
1441 |
+
-
|
1442 |
+
-
|
1443 |
+
-
|
1444 |
+
1.6
|
1445 |
+
Si| Ti(50)
|
1446 |
+
-
|
1447 |
+
-
|
1448 |
+
-
|
1449 |
+
1.5
|
1450 |
+
Si| Ni(5)|Pt(3)
|
1451 |
+
-
|
1452 |
+
-
|
1453 |
+
-
|
1454 |
+
3.4
|
1455 |
+
Si| Ni(5)|W(20)
|
1456 |
+
-
|
1457 |
+
-
|
1458 |
+
-
|
1459 |
+
4.3
|
1460 |
+
Si| Ni(5)
|
1461 |
+
-
|
1462 |
+
-
|
1463 |
+
-
|
1464 |
+
3.3
|
1465 |
+
Si| Ni(5)|Ti(3)
|
1466 |
+
-
|
1467 |
+
-
|
1468 |
+
-
|
1469 |
+
2.3
|
1470 |
+
Table S1. Optical properties of all studied samples. To obtain the absorbed fluence in the FM and PM layer, we
|
1471 |
+
assume imaginary parts of the dielectric constants at 800 nm of 22.07 for Ni, 9.31 for Pt, 19.41 for Ti and 19.71 for W
|
1472 |
+
[56]. Note that all films are additionally capped with 4 nm SiO2.
|
1473 |
+
|
1474 |
+
|
1475 |
+
|
1476 |
+
|
4tAyT4oBgHgl3EQf2Plc/content/tmp_files/load_file.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
5dAyT4oBgHgl3EQfpfgA/vector_store/index.pkl
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:c53eff9701cf0bfb139f46a88c0a5cf57c16c4ba1c1c4d9e61b6e392bc8a2f50
|
3 |
+
size 234736
|
5dFKT4oBgHgl3EQfSi3T/vector_store/index.faiss
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:75b25e88d67cd7190c7b8258ec0d407b6cba625959a883c0e6965f831137a5a7
|
3 |
+
size 7274541
|
69E1T4oBgHgl3EQf7AXC/vector_store/index.pkl
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:e4f530223f40749f312681dc4e7bcd16628913a5f15b3ab9e7072379e20ba858
|
3 |
+
size 135999
|
6NE1T4oBgHgl3EQfBQJe/content/2301.02849v1.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:8e34609f92c1adb64b5d04b764145ee85b6d1ee9b86d923566e1bea7976986c7
|
3 |
+
size 1460529
|
6NE1T4oBgHgl3EQfBQJe/vector_store/index.faiss
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:308b3d572855fb79da60d658f18b203064991c8ae570a4e049ebc37053cad345
|
3 |
+
size 3801133
|
6dAyT4oBgHgl3EQfQfZh/content/tmp_files/2301.00046v1.pdf.txt
ADDED
@@ -0,0 +1,783 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
A Bayesian treatment of the German tank problem
|
2 |
+
Cory M. Simon
|
3 |
+
School of Chemical, Biological, and Environmental Engineering. Oregon State
|
4 |
+
University. Corvallis, OR. USA.
|
5 | |
6 |
+
Abstract
|
7 |
+
The German tank problem has an interesting historical background and is an engaging
|
8 |
+
problem in statistical estimation for the classroom. The objective is to estimate the size
|
9 |
+
of a population of tanks inscribed with sequential serial numbers, from a random sample.
|
10 |
+
In this tutorial article, we outline the Bayesian approach to the German tank problem,
|
11 |
+
(i) whose solution assigns a probability to each tank population size, thereby quantifying
|
12 |
+
uncertainty, and (ii) which provides an opportunity to incorporate prior information and/or
|
13 |
+
beliefs about the tank population size into the solution. We illustrate with an example.
|
14 |
+
Finally, we survey other research problems that bear resemblance to the German tank
|
15 |
+
problem.
|
16 |
+
s1=15
|
17 |
+
s2=14
|
18 |
+
s3=3
|
19 |
+
serial numbers
|
20 |
+
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20
|
21 |
+
size of tank population, n
|
22 |
+
0
|
23 |
+
10
|
24 |
+
20
|
25 |
+
30
|
26 |
+
40
|
27 |
+
probability
|
28 |
+
0.00
|
29 |
+
0.05
|
30 |
+
0.10
|
31 |
+
0.15
|
32 |
+
0.20
|
33 |
+
prior
|
34 |
+
likelihood
|
35 |
+
posterior
|
36 |
+
1
|
37 |
+
arXiv:2301.00046v1 [stat.OT] 30 Dec 2022
|
38 |
+
|
39 |
+
1
|
40 |
+
Background
|
41 |
+
1.1
|
42 |
+
History
|
43 |
+
To inform their military strategy during World War II (1939-1945), the Allies sought to es-
|
44 |
+
timate the rate of production of various military equipment (tanks, tires, rockets, etc.) by
|
45 |
+
Germany. Conventional methods to estimate armament production—including (i) extrapo-
|
46 |
+
lating data on prewar manufacturing capabilities, (ii) obtaining reports from secret sources,
|
47 |
+
and (iii) interrogating prisoners of war—were unreliable and/or contradictory.
|
48 |
+
In 1943, British and American economic intelligence agencies exploited a German man-
|
49 |
+
ufacturing practice in order to statistically estimate their armament production. Germany
|
50 |
+
marked their military equipment with serial numbers and codes for the date and/or place of
|
51 |
+
manufacture to handle spare parts and trace faulty/defective equipment/parts back to the
|
52 |
+
manufacturer for quality control. However, these markings on a captured sample of German
|
53 |
+
equipment provided the Allies information about Germany’s production of it.
|
54 |
+
To estimate Germany’s production of tanks, the Allies collected serial numbers on the
|
55 |
+
chassis, engines, gearboxes, and bogie wheels of samples of tanks by inspecting captured
|
56 |
+
tanks and examining captured records1. Despite lacking an exhaustive sample, the sequential
|
57 |
+
nature of2 and patterns in these samples of serial numbers enabled the Allies to estimate
|
58 |
+
Germany’s tank production—postwar, we know, much more accurately than conventional
|
59 |
+
American and British intelligence (Tab. 1).
|
60 |
+
See Ruggles and Brodie [1] for the detailed historical account of serial number analysis to
|
61 |
+
estimate German armament production during World War II.
|
62 |
+
Table 1: Monthly production of tanks by Germany. [1]
|
63 |
+
estimates
|
64 |
+
date
|
65 |
+
conventional
|
66 |
+
American
|
67 |
+
& British Intelligence
|
68 |
+
serial number analysis
|
69 |
+
German
|
70 |
+
records
|
71 |
+
June, 1940
|
72 |
+
1000
|
73 |
+
169
|
74 |
+
122
|
75 |
+
June, 1941
|
76 |
+
1550
|
77 |
+
244
|
78 |
+
271
|
79 |
+
August, 1942
|
80 |
+
1550
|
81 |
+
327
|
82 |
+
342
|
83 |
+
1Eg., captured records from tank repair depots listed serial numbers of the chassis and engine of repaired
|
84 |
+
tanks, and records from divisional headquarters listed chassis serial numbers of tanks held by a specific unit.
|
85 |
+
2Gearboxes on captured tanks, for example, were inscribed with serial numbers belonging to an unbroken
|
86 |
+
sequence. Chassis serial numbers, on the other hand, were broken into blocks to distinguish models/designs,
|
87 |
+
leaving gaps between the serial numbers assigned to them.
|
88 |
+
2
|
89 |
+
|
90 |
+
1.2
|
91 |
+
The German tank problem
|
92 |
+
Simplification of the historical context to estimate German tank production via serial number
|
93 |
+
analysis [1] motivated the formulation of the textbook-friendly German tank problem [2]:
|
94 |
+
Problem statement
|
95 |
+
In the backdrop of World War II, the German military has n tanks.
|
96 |
+
Each tank is
|
97 |
+
inscribed with a unique serial number in {1, ..., n}.
|
98 |
+
As the Allies, we do not know n, but we captured (without replacement, of course) a
|
99 |
+
sample of k German tanks with inscribed serial numbers (s1, ..., sk).
|
100 |
+
s1
|
101 |
+
s2
|
102 |
+
· · ·
|
103 |
+
sk
|
104 |
+
Assuming all tanks in the population were equally likely to be captured, our objective
|
105 |
+
is to estimate n in consideration of the data (s1, ..., sk).
|
106 |
+
In 1942, Alan Turing and Andrew Gleason discussed a variant of the German tank prob-
|
107 |
+
lem, “how to best to estimate the total number of taxicabs in a town, having seen a random
|
108 |
+
selection of their license numbers”, in a crowded restaurant in Washington DC [3,4]. Today,
|
109 |
+
with its interesting historical background [1], the German tank problem is still a suitable con-
|
110 |
+
versation topic for dinners and serves as an intellectually engaging, challenging, and enjoyable
|
111 |
+
problem to illustrate combinatorics and statistical estimation in the classroom [5–8].
|
112 |
+
Uncertainty quantification.
|
113 |
+
Any estimate of the tank population size n from the data
|
114 |
+
(s1, ..., sk) is subject to uncertainty, since we (presumably) have not captured all of the tanks
|
115 |
+
(ie., k ̸= n, probably). Quantifying uncertainty in our estimate of the tank population size n
|
116 |
+
is important because high-stakes military decisions may be made on its basis.
|
117 |
+
Our contribution.
|
118 |
+
In this pedagogical article, we outline the Bayesian approach to the
|
119 |
+
German tank problem, (i) whose solution assigns a probability to each tank population size,
|
120 |
+
thereby quantifying uncertainty, and (ii) which provides an opportunity to incorporate prior
|
121 |
+
information and/or beliefs about the tank population size into the solution.
|
122 |
+
1.3
|
123 |
+
Survey of previous work on the German tank problem
|
124 |
+
The frequentist approach.
|
125 |
+
Border [9] calls the German tank problem a ”weird case” in
|
126 |
+
frequentist estimation. The maximum likelihood estimator of the tank population size n is
|
127 |
+
3
|
128 |
+
|
129 |
+
the maximum serial number observed among the k captured tanks, m(k) := maxi∈{1,...,k} si.
|
130 |
+
This is a biased estimator, as certainly m(k) ≤ n.
|
131 |
+
Goodman [2, 10] derives the minimum-variance, unbiased point estimator of the tank
|
132 |
+
population size
|
133 |
+
ˆn = m(k) +
|
134 |
+
�
|
135 |
+
m(k)
|
136 |
+
k
|
137 |
+
− 1
|
138 |
+
�
|
139 |
+
.
|
140 |
+
(1)
|
141 |
+
To intuit this estimator, note (i) n must be greater than or equal to m(k) and (ii) if we observe
|
142 |
+
large (small) gaps between the serial numbers (s1, ..., sk) after sorting them (incl. the gap
|
143 |
+
preceding the smallest serial number), then n is likely (unlikely) to be much greater than m(k).
|
144 |
+
The estimator of n in eqn. 1 quantifies how far beyond m(k) we should estimate the tank
|
145 |
+
population size, based on the gaps; m(k)/k − 1 is the average size of the gaps. Goodman
|
146 |
+
also derives a frequentist confidence interval for n.
|
147 |
+
Clark, Gonye, and Miller explore using simulations and linear regression to discover the
|
148 |
+
estimator in eqn. 1 [11].
|
149 |
+
For pedagogy.
|
150 |
+
Champkin highlights the historical context of the German tank problem
|
151 |
+
as a ”great moment in statistics” [12]. Johnson lists and evaluates several intuitive point
|
152 |
+
estimators for the size of the tank population [5]. Scheaffer, Watkins, Gnanadesikan, and
|
153 |
+
Witmer [13] propose a hands-on learning activity to illustrate the German tank problem by
|
154 |
+
sampling chips, labeled with numbers from 1 to n, from a bowl. Berg [6] uses the German
|
155 |
+
tank problem as a competition in the classroom.
|
156 |
+
The Bayesian approach.
|
157 |
+
Closely related to our paper, Roberts [14], H¨ohle and Held [15],
|
158 |
+
and Linden, Dose, and Toussaint [16], and Cocco, Monasson, and Zamponi [17] provide a
|
159 |
+
Bayesian analysis of the German tank problem. They derive an analytical formula for the
|
160 |
+
mean of the posterior distribution of the tank population size under an improper, uniform
|
161 |
+
prior distribution. Andrews [18] outlines the Bayesian approach to the German tank problem
|
162 |
+
in a blog post containing code in the R language.
|
163 |
+
Generalizations/variants.
|
164 |
+
Goodman [2, 10] poses a variant of the German tank problem
|
165 |
+
where the initial serial number is not known; ie., where the n tanks are inscribed with serial
|
166 |
+
numbers {b + 1, ..., n + b} with b and n unknown. Lee and Miller generalize the German
|
167 |
+
tank problem to the settings where the serial numbers are continuous and/or lie in two
|
168 |
+
dimensions [19].
|
169 |
+
1.4
|
170 |
+
Overview of the Bayesian approach to the German tank problem
|
171 |
+
Under a Bayesian perspective [8,20,21], we treat the (unknown) total number of tanks as a
|
172 |
+
discrete random variable N (hence, capitalization) to model our uncertainty in it. A proba-
|
173 |
+
4
|
174 |
+
|
175 |
+
bility mass function of N assigns a probability to each possible tank population size n. This
|
176 |
+
probability is a measure of our degree of belief, perhaps with some basis in knowledge/data,
|
177 |
+
that the tank population size is n [22].
|
178 |
+
Because the observed serial numbers (s1, ..., sk) provide information about the tank pop-
|
179 |
+
ulation size, the probability mass function of N differs before and after they are collected and
|
180 |
+
considered. Hence, N has a prior and posterior probability mass function.
|
181 |
+
The three inputs to a Bayesian treatment of the German tank problem are:
|
182 |
+
• the prior mass function of N, which expresses a combination of our subjective beliefs
|
183 |
+
and objective knowledge about the tank population size before we collect and consider
|
184 |
+
the sample of serial numbers.
|
185 |
+
• the data, the observed serial numbers (s1, ..., sk), viewed as realizations of random
|
186 |
+
variables owing to the stochasticity of tank-capturing.
|
187 |
+
• the likelihood function, giving the probability of the data (s1, ..., sk) under each tank
|
188 |
+
population size N = n, based on a probabilistic model of the tank-capturing process.
|
189 |
+
The output of a Bayesian treatment of the German tank problem is the posterior mass
|
190 |
+
function of the tank population size N, conditioned on the data (s1, ..., sk). The posterior
|
191 |
+
follows from Bayes’ theorem and can be viewed as an update to the prior in light of the
|
192 |
+
data. The posterior mass function of N assigns each possible tank population size n with a
|
193 |
+
probability according to a compromise between its (i) likelihood, which quantifies the support
|
194 |
+
the observed serial numbers (s1, ..., sk) lend to the tank population size being n according to
|
195 |
+
our probabilistic tank-capturing model, and (ii) prior probability, which quantifies how likely
|
196 |
+
we thought the tank population size might be n before the serial numbers (s1, ..., sk) were
|
197 |
+
collected and considered. [21]
|
198 |
+
The posterior mass function of N is the raw, uncertainty-quantifying, Bayesian solution
|
199 |
+
to the German tank problem. We may summarize the posterior by reporting its median and
|
200 |
+
the high-mass subset of the natural numbers that credibly contains the tank population size.
|
201 |
+
Also, we can use the posterior to answer questions such as, what is the probability that N
|
202 |
+
exceeds some threshold quantity n′ that would alter military strategy?
|
203 |
+
2
|
204 |
+
A Bayesian approach to the German tank problem
|
205 |
+
We now tackle the German tank problem from a Bayesian standpoint.
|
206 |
+
For reference, the variables are listed in Tab. 2. We use upper- and lower-case letters to
|
207 |
+
represent random variables and realizations of them, respectively. Throughout, we employ
|
208 |
+
the indicator function IA(x) which maps its input x to 1 if x belongs to the set A and to 0
|
209 |
+
otherwise (if x /∈ A).
|
210 |
+
5
|
211 |
+
|
212 |
+
Table 2: List of parameters/variables.
|
213 |
+
parameter/variable
|
214 |
+
∈
|
215 |
+
description
|
216 |
+
n
|
217 |
+
N≥0
|
218 |
+
size of population of tanks
|
219 |
+
k
|
220 |
+
N>0
|
221 |
+
number of captured tanks
|
222 |
+
si
|
223 |
+
N>0
|
224 |
+
serial number on captured tank i
|
225 |
+
s(k)
|
226 |
+
Nk
|
227 |
+
>0
|
228 |
+
vector listing the serial numbers on the k captured tanks
|
229 |
+
m(k)
|
230 |
+
N>0
|
231 |
+
maximum serial number among the k captured tanks
|
232 |
+
2.1
|
233 |
+
The data, data-generating process, and likelihood function
|
234 |
+
The data.
|
235 |
+
The data we obtain in the German tank problem is the vector of serial numbers
|
236 |
+
inscribed on the k captured tanks
|
237 |
+
s(k) := (s1, ..., sk).
|
238 |
+
(2)
|
239 |
+
We view the data s(k) as a realization of the discrete random vector S(k) := (S1, ..., Sk).
|
240 |
+
Note, at this point, we are entertaining the possibility that the order in which tanks are
|
241 |
+
captured matters.
|
242 |
+
The data-generating process.
|
243 |
+
The stochastic data-generating process constitutes sequen-
|
244 |
+
tial capture of k tanks from a population of n tanks, without replacement, then inspecting
|
245 |
+
their serial numbers to construct s(k). We assume that each tank in the population is equally
|
246 |
+
likely to be captured at each step. Then, mathematically, the stochastic data-generating
|
247 |
+
process is sequential, uniform random selection of k integers, without replacement, from the
|
248 |
+
set {1, ..., n}.
|
249 |
+
The likelihood function.
|
250 |
+
The likelihood function specifies the probability of the data S(k) =
|
251 |
+
s(k) given each tank population size N = n. Each outcome s(k) in the sample space Ω(k)
|
252 |
+
n
|
253 |
+
is
|
254 |
+
equally likely, where
|
255 |
+
Ω(k)
|
256 |
+
n
|
257 |
+
:= {(s1, ..., sk)̸= : si ∈ {1, ..., n} for all i ∈ {1, ..., k}},
|
258 |
+
(3)
|
259 |
+
with (· · · )̸= meaning the elements of the vector (· · · ) are unique. The number of outcomes in
|
260 |
+
the sample space, |Ω(k)
|
261 |
+
n |, is the number of distinct ordered arrangements of k distinct integers
|
262 |
+
from the set {1, ..., n}, given by the falling factorial:
|
263 |
+
(n)k := n(n − 1) · · · (n − k + 1) = n!/(n − k)!.
|
264 |
+
(4)
|
265 |
+
Under the data-generating process, then, the probability of observing data S(k) = s(k) given
|
266 |
+
the tank population size N = n is the uniform distribution:
|
267 |
+
πlikelihood(S(k) = s(k) | N = n) =
|
268 |
+
1
|
269 |
+
(n)k
|
270 |
+
IΩ(k)
|
271 |
+
n
|
272 |
+
�
|
273 |
+
s(k)�
|
274 |
+
.
|
275 |
+
(5)
|
276 |
+
6
|
277 |
+
|
278 |
+
Interpretation.
|
279 |
+
We view πlikelihood(S(k) = s(k) | N = n) as a function of n, since in
|
280 |
+
practice we possess the data s(k) but not n. The likelihood quantifies the support the serial
|
281 |
+
numbers on the k captured tanks in s(k) lend for any particular tank population size n [21].
|
282 |
+
The likelihood as a sequence of events.
|
283 |
+
Alternatively, we may arrive at eqn. 5 from
|
284 |
+
a perspective of sequential events S1 = s1, S2 = s2, ..., Sk = sk. First, the probability of a
|
285 |
+
given serial number on the ith captured tank, conditioned on the tank population size and
|
286 |
+
the outcomes of the previous serial numbers, is the uniform distribution
|
287 |
+
π(Si = si | N = n, S1 = s1, ..., Si−1 = si−1) =
|
288 |
+
1
|
289 |
+
n − i + 1I{1,...,n}\{s1,...,si−1}(si)
|
290 |
+
(6)
|
291 |
+
since there are n − i + 1 tanks to choose from at uniform random. By the chain rule, the
|
292 |
+
joint probability
|
293 |
+
πlikelihood(S1 = s1, ..., Sk = sk | N = n) =
|
294 |
+
k�
|
295 |
+
i=1
|
296 |
+
π(Si = si | N = n, S1 = s1, ..., Si−1 = si−1)
|
297 |
+
(7)
|
298 |
+
giving eqn. 5 after simplifying the product of indicator functions.
|
299 |
+
The likelihood function in terms of the maximum observed serial number.
|
300 |
+
We will
|
301 |
+
find in Sec. 2.3 that only two independent features of the data (s1, ..., sk) provide information
|
302 |
+
about the tank population size, N: its (i) size, k, and (ii) maximum observed serial number
|
303 |
+
m(k) =
|
304 |
+
max
|
305 |
+
i∈{1,...,k} si.
|
306 |
+
(8)
|
307 |
+
Thus, we also write a different likelihood: the probability of observing a maximum serial
|
308 |
+
number m(k) given the tank population size N = n, πlikelihood(M(k) = m(k) | N = n).
|
309 |
+
Because each outcome s(k) ∈ Ω(k)
|
310 |
+
n
|
311 |
+
is equally likely, πlikelihood(M(k) = m(k) | N = n) is the
|
312 |
+
fraction of sample space under population size n where the maximum serial number is m(k).
|
313 |
+
To count the outcomes (s1, ..., sk) ∈ Ω(k)
|
314 |
+
n
|
315 |
+
where the maximum serial number is m(k), consider
|
316 |
+
(i) one of the k captured tanks has serial number m(k) and (ii) the remaining k −1 tanks have
|
317 |
+
a serial number in {1, ..., m(k) − 1}. For each of the k possible positions of the maximum
|
318 |
+
serial number in the vector s(k), there are (m(k) − 1)k−1 distinct outcomes specifying the
|
319 |
+
other k − 1 entries. Thus:
|
320 |
+
πlikelihood(M(k) = m(k) | N = n) = k(m(k) − 1)k−1
|
321 |
+
(n)k
|
322 |
+
I{k,...,n}(m(k)).
|
323 |
+
(9)
|
324 |
+
2.2
|
325 |
+
The prior distribution
|
326 |
+
The prior probability mass function πprior(N = n) expresses a combination of our subjective
|
327 |
+
beliefs and objective knowledge about the total number of tanks N before the data (s1, ..., sk)
|
328 |
+
7
|
329 |
+
|
330 |
+
are collected and considered. Context-dependent, the prior mass function we impose on N
|
331 |
+
can vary in the amount of uncertainty it admits about the tank population size (measured by
|
332 |
+
eg. entropy [23]).
|
333 |
+
Prior distributions can be loosely classified as informative, weakly informative, or diffuse
|
334 |
+
[21]. If we do not possess prior information about the tank population size, we adopt the
|
335 |
+
principle of indifference and impose a diffuse prior to ”let the data speak for itself” [8], eg.
|
336 |
+
a uniform distribution over a set of feasible tank population sizes. On the other hand, an
|
337 |
+
informative prior might concentrate its mass around some estimate of the total number of
|
338 |
+
tanks obtained through other means. An informative prior will have a larger impact on the
|
339 |
+
posterior mass function of N than a diffuse one [21].
|
340 |
+
Generally, as the number of captured tanks k increases (decreases), we expect the prior
|
341 |
+
mass function we impose to have a lesser (greater) influence on the posterior distribution [8].
|
342 |
+
2.3
|
343 |
+
The posterior distribution
|
344 |
+
The posterior probability mass function of N assigns a probability to each possible tank
|
345 |
+
population size n in consideration of its consistency with (1) the data (s1, ..., sk), according
|
346 |
+
to the likelihood in eqn. 5, and (2) our prior beliefs/knowledge encoded in πprior(N = n).
|
347 |
+
The posterior distribution is a conditional distribution related to the likelihood and prior
|
348 |
+
mass functions by Bayes’ theorem:
|
349 |
+
πposterior(N = n | S(k) = s(k)) = πlikelihood(S(k) = s(k) | N = n)πprior(N = n)
|
350 |
+
πdata(S(k) = s(k))
|
351 |
+
,
|
352 |
+
(10)
|
353 |
+
where the denominator is the probability of the data s(k):
|
354 |
+
πdata(S(k) = s(k)) =
|
355 |
+
∞
|
356 |
+
�
|
357 |
+
n′=0
|
358 |
+
πlikelihood(S(k) = s(k) | N = n′)πprior(N = n′).
|
359 |
+
(11)
|
360 |
+
We view πposterior(N = n | S(k) = s(k)) as a probability mass function of N, since in practice
|
361 |
+
we have s(k). Then, πdata(S(k) = s(k)) is just a normalizing factor for the numerator in
|
362 |
+
eqn. 10.
|
363 |
+
Interpreting eqn. 10, the prior mass function of N is updated, in light of the data
|
364 |
+
(s1, ..., sk), to yield the posterior mass function of N. The posterior probability of N = n is
|
365 |
+
proportional to the product of the likelihood at and prior probability of N = n—a compromise
|
366 |
+
between the likelihood and prior.
|
367 |
+
We simplify the posterior mass function of N in eqn. 10 by (i) substituting eqn. 5, (ii)
|
368 |
+
restricting the sum in eqn. 11 to tank population sizes where the likelihood is nonzero, and
|
369 |
+
(iii) noting the only two features of the data (s1, ..., sk) that appear are (a) its size k and (b)
|
370 |
+
8
|
371 |
+
|
372 |
+
the maximum serial number m(k):
|
373 |
+
πposterior(N = n | M(k) = m(k)) =
|
374 |
+
(n)−1
|
375 |
+
k πprior(N = n)
|
376 |
+
∞
|
377 |
+
�
|
378 |
+
n′=m(k)
|
379 |
+
(n′)−1
|
380 |
+
k πprior(N = n′)
|
381 |
+
I{m(k),m(k)+1,...}(n)
|
382 |
+
(12)
|
383 |
+
Note, we may arrive at eqn. 12 through eqn. 9 as well.
|
384 |
+
Interpretation.
|
385 |
+
The posterior probability mass function of N in eqn. 12 is our raw, uncertainty-
|
386 |
+
quantifying solution to the German tank problem. It assigns a probability to each tank popula-
|
387 |
+
tion size n in consideration of the serial numbers (s1, ..., sk) observed on the captured tanks,
|
388 |
+
our probabilistic model of the tank-capturing process, and our prior beliefs and knowledge
|
389 |
+
about the tank population size expressed in the prior mass function.
|
390 |
+
A remark on ”uncertainty”.
|
391 |
+
The spread of the posterior mass function of N in eqn. 12
|
392 |
+
reflects epistemic [24] uncertainty about the tank population size, attributed to a lack of
|
393 |
+
complete data. Accounting for the data (s1, ..., sk) (probably) does not eliminate uncertainty
|
394 |
+
about the tank population size because we (presumably) have not captured all of the tanks
|
395 |
+
(ie. k < n) and observed their serial numbers. In practice, posterior uncertainty about the
|
396 |
+
tank population size also has a contribution from the possible inadequacy of the model of the
|
397 |
+
tank-capturing process (uniform sampling) in eqn. 5, which our analysis here neglects.
|
398 |
+
Summarizing the posterior mass function of N.
|
399 |
+
We may summarize the posterior mass
|
400 |
+
function of N with a point estimate of the tank population size and a credible subset of the
|
401 |
+
natural numbers that likely3 contains it. A suitable point estimate of the tank population
|
402 |
+
size is a median of the posterior mass function of N; by definition, the posterior probability
|
403 |
+
that the tank population size is greater (less) than or equal to a median is at least 0.5. A
|
404 |
+
suitable credible subset, which entertains multiple tank population sizes, is the α-high-mass
|
405 |
+
subset [25]
|
406 |
+
Hα := {n′ : πposterior(N = n′ | M(k) = m(k)) ≥ πα}
|
407 |
+
(13)
|
408 |
+
where πα is the largest mass to satisfy
|
409 |
+
πposterior(N ∈ Hα | M(k) = m(k)) ≥ 1 − α.
|
410 |
+
(14)
|
411 |
+
In words, the α-high-mass subset Hα is the smallest to (i) contain at least a fraction 1 − α
|
412 |
+
of the posterior mass of N and (ii) ensure every tank population size belonging to the subset
|
413 |
+
is more probable than all outside of it.
|
414 |
+
3Well, ”likely”, under our assumptions embedded in the likelihood and prior mass functions.
|
415 |
+
9
|
416 |
+
|
417 |
+
Querying the posterior distribution.
|
418 |
+
We may find the posterior probability that the tank
|
419 |
+
population size belongs to any set of interest by summing the posterior mass over it. Eg.,
|
420 |
+
the probability the tank population size exceeds some number n′ is:
|
421 |
+
πposterior(N > n′ | M(k) = m(k)) =
|
422 |
+
∞
|
423 |
+
�
|
424 |
+
n=n′+1
|
425 |
+
πposterior(N = n | M(k) = m(k)).
|
426 |
+
(15)
|
427 |
+
2.3.1
|
428 |
+
Posterior predictive checking
|
429 |
+
We may check the consistency of the data s(k) with the posterior mass function of N.
|
430 |
+
Conceptually, we can simulate new data ˜s(k) using the model of the tank-capturing process
|
431 |
+
under a sample of the tank population size from the posterior, then compare the simulated
|
432 |
+
data ˜s(k) to the real data s(k) [21,26]. More appropriately, we can compare the serial numbers
|
433 |
+
in the real data (s1, ..., sk) with the mass function giving the probability that the tank with
|
434 |
+
serial number ˜s would be captured under this process:
|
435 |
+
π(˜s ∈ ˜S(k)) =
|
436 |
+
∞
|
437 |
+
�
|
438 |
+
n′=0
|
439 |
+
k
|
440 |
+
n′ πposterior(N = n′ | S(k) = s(k))I{1,...,n′}(˜s),
|
441 |
+
(16)
|
442 |
+
since k/n′ is the probability any given viable serial number ˜s will be observed given the tank
|
443 |
+
population size N = n′.
|
444 |
+
3
|
445 |
+
Example
|
446 |
+
We illustrate the Bayesian approach to the German tank problem through an example.
|
447 |
+
The prior probability mass function of N.
|
448 |
+
Suppose we have an upper bound nmax for the
|
449 |
+
possible number of tanks but no other information. Then, we may impose a diffuse prior, a
|
450 |
+
uniform prior probability mass function:
|
451 |
+
πprior(N = n) =
|
452 |
+
1
|
453 |
+
nmax + 1I{0,...,nmax}(n).
|
454 |
+
(17)
|
455 |
+
This prior mass function expresses: in the absence of any data (s1, ..., sk) (ie., no serial
|
456 |
+
numbers, not k either), we believe the total number of tanks N is equally likely to be a value
|
457 |
+
in {0, ..., nmax}. Particularly, suppose nmax = 35. Fig. 1a visualizes πprior(N = n).
|
458 |
+
The data (s1, ..., sk).
|
459 |
+
Now suppose we capture k = 3 tanks, with serial numbers s(3) =
|
460 |
+
(15, 14, 3). See Fig. 1b. So, the maximum observed serial number is m(3) = 15.
|
461 |
+
10
|
462 |
+
|
463 |
+
size of tank population, n
|
464 |
+
0
|
465 |
+
10
|
466 |
+
20
|
467 |
+
30
|
468 |
+
40
|
469 |
+
πprior(N=n)
|
470 |
+
0.00
|
471 |
+
0.01
|
472 |
+
0.02
|
473 |
+
(a) prior mass function of N
|
474 |
+
s1=15
|
475 |
+
s2=14
|
476 |
+
s3=3
|
477 |
+
serial numbers
|
478 |
+
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20
|
479 |
+
(b) the data s(k=3)
|
480 |
+
tank population size, n
|
481 |
+
0
|
482 |
+
10
|
483 |
+
20
|
484 |
+
30
|
485 |
+
40
|
486 |
+
πlikelihood(M(k=3)=15 | N=n)
|
487 |
+
0.00
|
488 |
+
0.05
|
489 |
+
0.10
|
490 |
+
0.15
|
491 |
+
0.20
|
492 |
+
(c) the likelihood function
|
493 |
+
size of tank population, n
|
494 |
+
0
|
495 |
+
10
|
496 |
+
20
|
497 |
+
30
|
498 |
+
40
|
499 |
+
πposterior(N=n | M(k = 3)=15)
|
500 |
+
0.00
|
501 |
+
0.05
|
502 |
+
0.10
|
503 |
+
0.15
|
504 |
+
nmax=35
|
505 |
+
(d) posterior mass function of N
|
506 |
+
Figure 1: A Bayesian approach to the German tank problem.
|
507 |
+
(a, prior) The prior mass
|
508 |
+
function. (b, data) The data s(3), with maximum observed serial number m(3) = 15. (c,
|
509 |
+
likelihood) The likelihood function associated with the data s(3). (d, posterior) The posterior
|
510 |
+
mass function of N. H0.2 highlighted; median marked with vertical, dashed line.
|
511 |
+
11
|
512 |
+
|
513 |
+
The posterior probability mass function of N.
|
514 |
+
Under the uniform prior in eqn. 17, the
|
515 |
+
posterior probability mass function of N in eqn. 12 becomes:
|
516 |
+
πposterior(N = n | M(k) = m(k)) =
|
517 |
+
(n)−1
|
518 |
+
k
|
519 |
+
nmax
|
520 |
+
�
|
521 |
+
n′=m(k)
|
522 |
+
(n′)−1
|
523 |
+
k
|
524 |
+
I{m(k),m(k)+1,...,nmax}(n).
|
525 |
+
(18)
|
526 |
+
Fig. 1d visualizes the posterior probability mass function of N for the data s(3) in Fig. 1b and
|
527 |
+
the prior in eqn. 17 (nmax = 35).
|
528 |
+
Summarizing the posterior.
|
529 |
+
Summarizing the posterior mass function of N, its median
|
530 |
+
is 19 and its high-mass credible subset H0.2 = {15, ..., 25} (highlighted in Fig. 1d). For what
|
531 |
+
it’s worth, the data in Fig. 1b was generated from a tank population size of n = 20 (explaining
|
532 |
+
the choice of scale in Fig. 1b).
|
533 |
+
Querying the posterior.
|
534 |
+
Suppose our military strategy would change if the size of the
|
535 |
+
tank population exceeds 30. From the posterior distribution of N, we calculate πposterior(N >
|
536 |
+
30 | M(3) = 15) ≈ 0.066.
|
537 |
+
Posterior predictive checking.
|
538 |
+
As a posterior predictive check, Fig. 2a shows how the
|
539 |
+
observed serial numbers in the data s(3) compare with the probability of observing each serial
|
540 |
+
number under the posterior mass function of N, according to eqn. 16.
|
541 |
+
Sensitivity of the posterior to the prior.
|
542 |
+
Because of the subjectivity involved in construct-
|
543 |
+
ing the prior, checking the sensitivity of the posterior to the prior is good practice [21]. Fig. 2b
|
544 |
+
shows how the posterior mass function of N changes as we increase the upper-bound on the
|
545 |
+
tank population nmax we impose via the prior mass function of N in eqn. 17. The median of
|
546 |
+
the posterior under nmax ∈ {60, 70} is 20 (an increase of one compared to nmax = 35). The
|
547 |
+
maximum of the high-mass subset H0.2 increases to 29 for nmax = 70.
|
548 |
+
Capturing more tanks.
|
549 |
+
Suppose we capture an additional 9 tanks and re-run the Bayesian
|
550 |
+
analysis. Fig. 3 shows the updated posterior mass function of N. The high-mass credible
|
551 |
+
subset H0.2 shrinks considerably, to {19, 20}. This shows how more data—increasing the
|
552 |
+
number of tanks captured, k—generally reduces our uncertainty about the tank population
|
553 |
+
size.
|
554 |
+
4
|
555 |
+
Discussion
|
556 |
+
Selection bias.
|
557 |
+
A strict assumption in the textbook-friendly German tank problem, which
|
558 |
+
enables us to estimate the size of the population of tanks from a random sample of their
|
559 |
+
12
|
560 |
+
|
561 |
+
serial number, s̃
|
562 |
+
0
|
563 |
+
10
|
564 |
+
20
|
565 |
+
30
|
566 |
+
40
|
567 |
+
probability
|
568 |
+
0.00
|
569 |
+
0.05
|
570 |
+
0.10
|
571 |
+
0.15
|
572 |
+
nmax=35
|
573 |
+
data, s(k=3)
|
574 |
+
(a) posterior predictive check
|
575 |
+
size of tank population, n
|
576 |
+
0
|
577 |
+
20
|
578 |
+
40
|
579 |
+
60
|
580 |
+
πposterior(N=n | M(k = 3)=15)
|
581 |
+
0.00
|
582 |
+
0.05
|
583 |
+
0.10
|
584 |
+
0.15
|
585 |
+
nmax=50
|
586 |
+
size of tank population, n
|
587 |
+
0
|
588 |
+
20
|
589 |
+
40
|
590 |
+
60
|
591 |
+
nmax=60
|
592 |
+
size of tank population, n
|
593 |
+
0
|
594 |
+
20
|
595 |
+
40
|
596 |
+
60
|
597 |
+
nmax=70
|
598 |
+
prior
|
599 |
+
posterior
|
600 |
+
(b) sensitivity of the posterior to the prior
|
601 |
+
Figure 2: Checking (a) the consistency of the data s(3) with the probability of the serial
|
602 |
+
numbers under the posterior mass function of N and (b) the sensitivity of the posterior mass
|
603 |
+
function of N to the upper bound nmax imposed by the prior mass function of N.
|
604 |
+
(sequential) serial numbers, is that sampling is uniform. To check consistency of the sample
|
605 |
+
with this assumption, Goodman [10] demonstrates a test of the hypothesis that the sample of
|
606 |
+
serial numbers is from a uniform distribution. Interesting extensions of the textbook German
|
607 |
+
tank problem could involve modeling selection bias in the tank-capturing process. Such bias
|
608 |
+
could arise eg. hypothetically, if older tanks with smaller serial numbers were more likely to be
|
609 |
+
deployed in the fronts opened earlier in the war, where capturing tanks is more difficult than
|
610 |
+
at less fortified fronts opened more recently.
|
611 |
+
The German tank problem in other contexts.
|
612 |
+
The Bayesian probability theory to solve
|
613 |
+
the German tank problem applies (perhaps, with modification) to many other contexts where
|
614 |
+
we wish to estimate the size of some finite, hidden set [27], eg.: the number of taxicabs in a
|
615 |
+
city [12], the number of accounts at a bank [15], the number of furniture pieces purchased
|
616 |
+
13
|
617 |
+
|
618 |
+
s1=15
|
619 |
+
s2=14
|
620 |
+
s3=3
|
621 |
+
s4=6
|
622 |
+
s5=2
|
623 |
+
s6=10
|
624 |
+
s7=5
|
625 |
+
s8=16
|
626 |
+
s9=8
|
627 |
+
s10=1
|
628 |
+
s11=4
|
629 |
+
s12=19
|
630 |
+
serial numbers
|
631 |
+
1
|
632 |
+
2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20
|
633 |
+
(a) the updated data s(k=12)
|
634 |
+
size of tank population, n
|
635 |
+
0
|
636 |
+
10
|
637 |
+
20
|
638 |
+
30
|
639 |
+
40
|
640 |
+
πposterior(N=n | M(k = 12)=19)
|
641 |
+
0.0
|
642 |
+
0.1
|
643 |
+
0.2
|
644 |
+
0.3
|
645 |
+
0.4
|
646 |
+
0.5
|
647 |
+
0.6
|
648 |
+
nmax=35
|
649 |
+
(b) the updated posterior mass function of N
|
650 |
+
Figure 3: The updated posterior mass function of N (b) after we capture an additional 9
|
651 |
+
tanks with serial numbers in (a).
|
652 |
+
by a university [10], the number of aircraft operations at an airport [28], the extent of leaked
|
653 |
+
classified government communications [29], the time needed to complete a project deadline
|
654 |
+
[30], the time-coverage of historical records of extreme events like floods [31], the length of
|
655 |
+
a short-tandem repeat allele [32], the size of a social network [33], the number of cases in
|
656 |
+
14
|
657 |
+
|
658 |
+
court [34], the lifetime of a flower of a plant [35], or the duration of existence of a species [36].
|
659 |
+
Mark and recapture methods in ecology to estimate the size of an animal population [37,38]
|
660 |
+
are tangentially related to the German tank problem.
|
661 |
+
The practice of inscribing sequential serial numbers on military equipment.
|
662 |
+
Germany
|
663 |
+
adopted the practice of marking their military equipment with serial numbers and codes to
|
664 |
+
trace the equipment/parts/components back to the manufacturer. However, the sequential
|
665 |
+
nature of these serial numbers was exploited by the Allies to estimate their armament pro-
|
666 |
+
duction. To reduce vulnerability to serial number analysis for estimating production while
|
667 |
+
maintaining advantages of tracing equipment back to the manufacturer, serial numbers and
|
668 |
+
codes could instead be obfuscated by eg. chaffing [39].
|
669 |
+
Data and code availability
|
670 |
+
The Julia [40] code to reproduce all of our visualizations drawn using Makie.jl [41] is available
|
671 |
+
on Github at github.com/SimonEnsemble/the˙German˙tank˙problem.
|
672 |
+
Acknowledgements
|
673 |
+
Thanks to Bernhard Konrad for providing detailed feedback on the first draft and to my
|
674 |
+
students Gbenga Fabusola, Adrian Henle, and Paul Morris for feedback on the introduction.
|
675 |
+
References
|
676 |
+
[1] Richard Ruggles and Henry Brodie. An empirical approach to economic intelligence in
|
677 |
+
World War II. Journal of the American Statistical Association, 42(237):72–91, 1947.
|
678 |
+
[2] Leo A Goodman. Serial number analysis. Journal of the American Statistical Association,
|
679 |
+
47(260):622–634, 1952.
|
680 |
+
[3] Andrew Hodges. Alan Turing: the enigma. In Alan Turing: The Enigma. Princeton
|
681 |
+
University Press, 2014.
|
682 |
+
[4] Marshall Hall. Alan Turing, Marshall Hall, and the Alignment of WW2 Japanese Naval
|
683 |
+
Intercepts. Notices of the AMS, 61(3), 2014.
|
684 |
+
[5] Roger W Johnson. Estimating the size of a population. Teaching Statistics, 16(2):50–52,
|
685 |
+
1994.
|
686 |
+
[6] Arthur Berg. Bayesian modeling competitions for the classroom. Revista Colombiana
|
687 |
+
de Estad´ıstica, 44(2):243–252, 2021.
|
688 |
+
15
|
689 |
+
|
690 |
+
[7] Frederick Mosteller. Fifty challenging problems in probability with solutions. Courier
|
691 |
+
Corporation, 1987.
|
692 |
+
[8] Allen B Downey. Think Bayes 2. https://allendowney.github.io/ThinkBayes2/
|
693 |
+
index.html, 2021.
|
694 |
+
[9] Kim. C Border. Lecture 18: Estimation. https://healy.econ.ohio-state.edu/kcb/
|
695 |
+
Ma103/ (2021 version), 2017.
|
696 |
+
[10] Leo A Goodman. Some practical techniques in serial number analysis. Journal of the
|
697 |
+
American Statistical Association, 49(265):97–112, 1954.
|
698 |
+
[11] George Clark, Alex Gonye, and Steven J Miller. Lessons from the german tank problem.
|
699 |
+
The Mathematical Intelligencer, 43(4):19–28, 2021.
|
700 |
+
[12] Carlos G´omez Grajalez, Eileen Magnello, Robert Woods, and Julian Champkin. Great
|
701 |
+
moments in statistics. Significance, 10(6):21–28, 2013.
|
702 |
+
[13] Richard L Scheaffer, Ann Watkins, Mrudulla Gnanadesikan, and Jeffrey Witmer. Activity-
|
703 |
+
based statistics: student guide. Springer Science & Business Media, 2013.
|
704 |
+
[14] Harry V Roberts. Informative stopping rules and inferences about population size. Journal
|
705 |
+
of the American Statistical Association, 62(319):763–775, 1967.
|
706 |
+
[15] Michael H¨ohle and Leonhard Held.
|
707 |
+
Bayesian estimation of the size of a population.
|
708 |
+
Technical Report 499, LMU Munich, Discussion Paper, 2006.
|
709 |
+
[16] Wolfgang Von der Linden, Volker Dose, and Udo Von Toussaint. Bayesian probability
|
710 |
+
theory: applications in the physical sciences. Cambridge University Press, 2014.
|
711 |
+
[17] Simona Cocco, R´emi Monasson, and Francesco Zamponi. From Statistical Physics to
|
712 |
+
Data-Driven Modelling: with Applications to Quantitative Biology. Oxford University
|
713 |
+
Press, 2022.
|
714 |
+
[18] Mark Andrews. German tank problem: A bayesian analysis. https://www.mjandrews.
|
715 |
+
org/blog/germantank. Accessed: 2022-12-03.
|
716 |
+
[19] Anthony Lee and Steven J Miller. Generalizing the german tank problem. arXiv preprint
|
717 |
+
arXiv:2210.15339, 2022.
|
718 |
+
[20] William M Bolstad and James M Curran. Introduction to Bayesian statistics. John Wiley
|
719 |
+
& Sons, 2016.
|
720 |
+
[21] Rens van de Schoot, Sarah Depaoli, Ruth King, Bianca Kramer, Kaspar M¨artens,
|
721 |
+
Mahlet G Tadesse, Marina Vannucci, Andrew Gelman, Duco Veen, Joukje Willem-
|
722 |
+
sen, and Christopher Yau. Bayesian statistics and modelling. Nature Reviews Methods
|
723 |
+
Primers, 1(1):1–26, 2021.
|
724 |
+
16
|
725 |
+
|
726 |
+
[22] Jayanta K Ghosh, Mohan Delampady, and Tapas Samanta. An introduction to Bayesian
|
727 |
+
analysis: theory and methods, volume 725. Springer, 2006.
|
728 |
+
[23] Kevin P Murphy. Probabilistic machine learning: an introduction. MIT press, 2022.
|
729 |
+
[24] Craig R Fox and G¨ulden ¨Ulk¨umen. Chapter 1: Distinguishing two dimensions of uncer-
|
730 |
+
tainty. Perspectives on Thinking, Judging, and Decision Making, 2011.
|
731 |
+
[25] Rob J Hyndman.
|
732 |
+
Computing and graphing highest density regions.
|
733 |
+
The American
|
734 |
+
Statistician, 50(2):120–126, 1996.
|
735 |
+
[26] Jonah Gabry, Daniel Simpson, Aki Vehtari, Michael Betancourt, and Andrew Gelman.
|
736 |
+
Visualization in Bayesian workflow. Journal of the Royal Statistical Society: Series A
|
737 |
+
(Statistics in Society), 182(2):389–402, 2019.
|
738 |
+
[27] Si Cheng, Daniel J Eck, and Forrest W Crawford. Estimating the size of a hidden finite
|
739 |
+
set: Large-sample behavior of estimators. Statistics Surveys, 14:1–31, 2020.
|
740 |
+
[28] John H Mott, Margaret L McNamara, and Darcy M Bullock. Estimation of aircraft op-
|
741 |
+
erations at airports using nontraditional statistical approaches. In 2016 IEEE Aerospace
|
742 |
+
Conference, pages 1–11. IEEE, 2016.
|
743 |
+
[29] Michael Gill and Arthur Spirling. Estimating the severity of the WikiLeaks US diplomatic
|
744 |
+
cables disclosure. Political Analysis, 23(2):299–305, 2015.
|
745 |
+
[30] Thomas M Fehlmann and Eberhard Kranich. A new approach for continuously monitoring
|
746 |
+
project deadlines in software development.
|
747 |
+
In Proceedings of the 27th International
|
748 |
+
Workshop on Software Measurement and 12th International Conference on Software
|
749 |
+
Process and Product Measurement, pages 161–169, 2017.
|
750 |
+
[31] Ilaria Prosdocimi. German tanks and historical records: the estimation of the time cover-
|
751 |
+
age of ungauged extreme events. Stochastic environmental research and risk assessment,
|
752 |
+
32(3):607–622, 2018.
|
753 |
+
[32] Haibao Tang, Ewen F Kirkness, Christoph Lippert, William H Biggs, Martin Fabani,
|
754 |
+
Ernesto Guzman, Smriti Ramakrishnan, Victor Lavrenko, Boyko Kakaradov, Claire Hou,
|
755 |
+
Barry Hicks, David Heckerman, Franz J. Och, C. Thomas Caskey, J. Craig Venter, and
|
756 |
+
Amalio Telenti. Profiling of short-tandem-repeat disease alleles in 12,632 human whole
|
757 |
+
genomes. The American Journal of Human Genetics, 101(5):700–715, 2017.
|
758 |
+
[33] Liran Katzir, Edo Liberty, and Oren Somekh. Estimating sizes of social networks via
|
759 |
+
biased sampling. In Proceedings of the 20th international conference on World wide
|
760 |
+
web, pages 597–606, 2011.
|
761 |
+
17
|
762 |
+
|
763 |
+
[34] Xiaohan Wu, Margaret E Roberts, Rachel E Stern, Benjamin L Liebman, Amarnath
|
764 |
+
Gupta, and Luke Sanford.
|
765 |
+
Augmenting Serialized Bureaucratic Data: The Case of
|
766 |
+
Chinese Courts. 21st Century China Center Research, (11), 2022.
|
767 |
+
[35] William D Pearse, Charles C Davis, David W Inouye, Richard B Primack, and T Jonathan
|
768 |
+
Davies. A statistical estimator for determining the limits of contemporary and historic
|
769 |
+
phenology. Nature Ecology & Evolution, 1(12):1876–1882, 2017.
|
770 |
+
[36] David L Roberts and Andrew R Solow. When did the dodo become extinct? Nature,
|
771 |
+
426(6964):245–245, 2003.
|
772 |
+
[37] James D Nichols. Capture-recapture models. BioScience, 42(2):94–102, 1992.
|
773 |
+
[38] Anne Chao. An overview of closed capture-recapture models. Journal of Agricultural,
|
774 |
+
Biological, and Environmental Statistics, 6(2):158–175, 2001.
|
775 |
+
[39] Ronald L Rivest et al.
|
776 |
+
Chaffing and winnowing: Confidentiality without encryption.
|
777 |
+
CryptoBytes (RSA laboratories), 4(1):12–17, 1998.
|
778 |
+
[40] Jeff Bezanson, Stefan Karpinski, Viral B Shah, and Alan Edelman. Julia: A fast dynamic
|
779 |
+
language for technical computing. arXiv preprint arXiv:1209.5145, 2012.
|
780 |
+
[41] Simon Danisch and Julius Krumbiegel. Makie.jl: Flexible high-performance data visual-
|
781 |
+
ization for julia. Journal of Open Source Software, 6(65):3349, 2021.
|
782 |
+
18
|
783 |
+
|
6dAyT4oBgHgl3EQfQfZh/content/tmp_files/load_file.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
6dAzT4oBgHgl3EQfvP2u/content/tmp_files/2301.01704v1.pdf.txt
ADDED
@@ -0,0 +1,965 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
Error Tolerant Multi-Robot System for Roadside
|
2 |
+
Trash Collection
|
3 |
+
1st Lee Milburn
|
4 |
+
College of Engineering
|
5 |
+
Northeastern University
|
6 |
+
Boston, Massachusetts
|
7 | |
8 |
+
2nd John Chiaramonte
|
9 |
+
College of Engineering
|
10 |
+
Northeastern University
|
11 |
+
Boston, Massachusetts
|
12 | |
13 |
+
3rd Jack Fenton
|
14 |
+
College of Engineering
|
15 |
+
Northeastern University
|
16 |
+
Boston, Massachusetts
|
17 | |
18 |
+
Abstract—In this paper, we present the first iteration of an
|
19 |
+
error-tolerant, autonomous, multi-robot system that monitors
|
20 |
+
highway road verges and identifies and collects roadside litter. It
|
21 |
+
is designed to use an aerial vehicle that can rapidly cover a vast
|
22 |
+
area and collect data on the road verge. This data is then passed
|
23 |
+
to a ground vehicle that constructs a map of the road verge and
|
24 |
+
uses a trained Convolutional Neural Network (CNN) to identify
|
25 |
+
pieces of litter. After the pieces of litter are identified on the
|
26 |
+
map of the road verge, the ground robot navigates to each piece
|
27 |
+
of trash, re-evaluates the area, and performs a ”greedy pickup”
|
28 |
+
procedure. This final stage accounts for any error in the map’s
|
29 |
+
construction or the identified trash’s location. We found that
|
30 |
+
ending the robotic system’s control flow with a greedy pickup
|
31 |
+
procedure can retroactively account for processing errors of the
|
32 |
+
system as it runs. This increases the system’s fault tolerance and
|
33 |
+
allows for the use of cheaper equipment since pinpoint accuracy
|
34 |
+
is not always necessary. In this paper, we present the feasibility of
|
35 |
+
this system by testing in simulation and later using real robotic
|
36 |
+
hardware. We show that the system is effective enough to iterate
|
37 |
+
on its design principles to create a more sophisticated system.
|
38 |
+
Index Terms—Autonomous trash collection, Environmental
|
39 |
+
monitoring, Error tolerance, Multi-robot system
|
40 |
+
I. INTRODUCTION
|
41 |
+
Roadside trash is a massive issue currently managed by
|
42 |
+
manual labor - a woefully inadequate solution [7]. Despite
|
43 |
+
being a nationwide issue, the task of waste management is
|
44 |
+
mostly under the jurisdiction of municipalities and it garners
|
45 |
+
little to no attention or investment.
|
46 |
+
To estimate the amount of litter along roadways, a research
|
47 |
+
team selected a random sample of 240 roadway segments,
|
48 |
+
stratified by type and by rural/urban areas [2]. The results
|
49 |
+
indicate that there are 51.2 billion pieces of litter on roadways
|
50 |
+
nationwide. Of this, the majority (91%, or 46.6 billion pieces)
|
51 |
+
is less than four inches.
|
52 |
+
In Monterey City, California, complaints about trash have
|
53 |
+
increased since the start of the COVID-19 pandemic. Officials
|
54 |
+
say this is not due to increased littering, but rather due to
|
55 |
+
the inability to clean it up. Monterey County Public Works
|
56 |
+
Maintenance Manager Shawn Atkins stated that his cleanup
|
57 |
+
crew was so busy cleaning up from illegal dumpsites that they
|
58 |
+
did not have time to walk the shoulders of their roads to pick
|
59 |
+
up loose trash [14]. Caltrans, California’s public transportation
|
60 |
+
department, has been faced with the same problem. Kevin
|
61 |
+
Drabinski, public information officer for Caltrans District 5,
|
62 |
+
said it’s important to Caltrans that they manage litter because
|
63 |
+
of safety and environmental concerns. Caltrans spends $50
|
64 |
+
million annually on litter cleanup [14].
|
65 |
+
To address this issue, our multi-robot system uses a three-
|
66 |
+
stage approach to autonomously map, identify, and pick up
|
67 |
+
trash. The three modes are Mapping, Navigation, and Greedy
|
68 |
+
Pickup. We would first have a lightweight drone fly over a
|
69 |
+
specified area on the road and stream its visuals to a ground
|
70 |
+
robot. That robot would generate a map using the drone’s
|
71 |
+
input and identify trash pieces on that map. The ground robot
|
72 |
+
would then navigate near each piece of identified trash and
|
73 |
+
then switch to the greedy pickup mode where it scans the
|
74 |
+
area for the suspected piece of trash. After a piece of trash
|
75 |
+
is re-identified locally, the robot moves and collects it. Once
|
76 |
+
either collected or not found, the ground robot then moves to
|
77 |
+
the next piece on its map.
|
78 |
+
Fig. 1. System Design Overview
|
79 |
+
Our approach allows for accurate pickup without the need
|
80 |
+
for massive processing power or overly expensive sensors.
|
81 |
+
The system’s configuration used the open-source convolutional
|
82 |
+
neural network You Only Look Once (YoLOv4) for image
|
83 |
+
identification [24], the open-source visual SLAM solution
|
84 |
+
ORBSLAM-2 for map-building [19], and open-source ROS
|
85 |
+
navigation software for path planning and navigation. We
|
86 |
+
simulated this system using Gazebo [13] and after receiving
|
87 |
+
consistent results, tested it in a real-world environment. Our
|
88 |
+
arXiv:2301.01704v1 [cs.RO] 4 Jan 2023
|
89 |
+
|
90 |
+
Step 1: Mapping Robot identifies trash and maps
|
91 |
+
Step 2: Mapping Robot transfers map data to UGV
|
92 |
+
the surrounding area
|
93 |
+
over Wi-Fi
|
94 |
+
Step 3: UGV takes most efficient path to pick up
|
95 |
+
Step 4: Human operator removes storage bin and
|
96 |
+
trash and clear area.
|
97 |
+
dumps trash into larger containerreal-world results, with a relatively low-powered system, in-
|
98 |
+
dicate that our approach is a proof-of-concept for a scalable
|
99 |
+
and viable solution to the growing worldwide litter problem.
|
100 |
+
II. RELATED WORK
|
101 |
+
There has been research into multi-robot systems used
|
102 |
+
for environmental monitoring. The research for these sys-
|
103 |
+
tems finds that multi-robot systems pose a more effective
|
104 |
+
solution to surveying an environment than static monitoring
|
105 |
+
[6]. There is also research into multi-robot systems that do
|
106 |
+
autonomous trash collection [16]. This research concludes
|
107 |
+
that for maximum efficiency, robots should be aware of their
|
108 |
+
environment when trying to collect trash as opposed to making
|
109 |
+
decisions based solely on their field of view (FOV). Therefore,
|
110 |
+
these two systems, monitoring an environment, and using a
|
111 |
+
collection algorithm to pick up trash in a dynamically changing
|
112 |
+
environment could be combined to create the most effective
|
113 |
+
version of an autonomous collection system. A version of this
|
114 |
+
system has been created to autonomously collect and monitor
|
115 |
+
plastics in rivers [9]. The system includes a central processor
|
116 |
+
that takes in the necessary tasks of the environment and assigns
|
117 |
+
those tasks to underwater autonomous vehicles that then pick
|
118 |
+
up the plastics. This system concluded that a Multi-robot task
|
119 |
+
allocation architecture [11] with a controlling center increased
|
120 |
+
the efficiency of the system, but the hardware for working
|
121 |
+
effectively in that environment would have to be improved for
|
122 |
+
more effective use. Our research team structured our multi-
|
123 |
+
robot system design to have a robot monitor the environment
|
124 |
+
and wirelessly transmit its environmental depiction to a UGV
|
125 |
+
that would collect the trash.
|
126 |
+
For our system to be cheap and lightweight, existing soft-
|
127 |
+
ware was needed that works in real-time on standard CPUs
|
128 |
+
in a wide variety of environments. The Robotic Operating
|
129 |
+
System (ROS) [17] is an open-source robotics framework that
|
130 |
+
allowed each of our hardware and software components to
|
131 |
+
communicate freely in real-time, and each software component
|
132 |
+
used was compatible with this framework. ORB-SLAM2 was
|
133 |
+
the ideal solution for mapping [18][15]. It uses differing
|
134 |
+
angles of static environmental features to create a map and a
|
135 |
+
keyframe-based SLAM approach that reduces the overall data
|
136 |
+
size of the SLAM map considerably [1]. Since the system is
|
137 |
+
designed with visual sensors, a software to visually identify
|
138 |
+
trash was necessary. YoLOv4 is a CNN model trained from
|
139 |
+
annotated images to place bounding boxes around specified
|
140 |
+
objects in RBG images. Adaptive Monte Carlo Localization
|
141 |
+
(AMCL) is the method of navigation used as well as the
|
142 |
+
name of a compatible software stack used for navigation
|
143 |
+
provided by ROS [8]. AMCL takes in odometry feedback
|
144 |
+
from the robot’s wheels and scan data derived from the RGB-
|
145 |
+
D Camera to navigate. After some static conversions from
|
146 |
+
ORB-SLAM2’s native map format to a 2D occupancy grid,
|
147 |
+
AMCL can autonomously navigate around an environment.
|
148 |
+
These existing software stacks served as the framework for
|
149 |
+
the multi-robot system to be built.
|
150 |
+
III. SYSTEM DESIGN
|
151 |
+
A. System Overview
|
152 |
+
Fig. 2. Systems’ Communication Flow
|
153 |
+
After initialization by a human operator, the mapping robot
|
154 |
+
will scan an area with a visual sensor. This sensor data will be
|
155 |
+
compiled using Simultaneous Location and Mapping (SLAM)
|
156 |
+
technology to create a continuous digital map of the target area
|
157 |
+
which will then be wirelessly transmitted to the unmanned
|
158 |
+
ground vehicle (UGV). The UGV will identify pieces of
|
159 |
+
trash in the environment using computer vision algorithms
|
160 |
+
and construct a two-dimensional map populated with target
|
161 |
+
coordinates of identified trash. The UGV will then create an
|
162 |
+
efficient path between the target coordinates in the map. Once
|
163 |
+
the UGV sets off on the calculated path, it will confirm the
|
164 |
+
trash location using an onboard visual sensor and proceed to
|
165 |
+
pick it up. Once the UGV has completed its rounds or the bin
|
166 |
+
is detected as full, it will return home, and a human operator
|
167 |
+
will empty the bin.
|
168 |
+
B. Mode Controller
|
169 |
+
Fig. 3. Mode Controller Flow
|
170 |
+
The “Mode Controller” was created to switch between the
|
171 |
+
three separate software components of the system: Mapping,
|
172 |
+
Navigation, and Greedy Pickup. The Mode Controller is a
|
173 |
+
ROS node that communicates with the Mapping, Navigation,
|
174 |
+
and Greedy Pickup nodes, turning them on or off as needed.
|
175 |
+
The Mode Controller starts in idle before putting the system
|
176 |
+
into the Mapping mode. Once mapping finishes, the mode
|
177 |
+
controller turns off Mapping mode. The map is then passed on
|
178 |
+
|
179 |
+
Stage 1
|
180 |
+
Mapping With
|
181 |
+
ORBslam
|
182 |
+
Realsense
|
183 |
+
map
|
184 |
+
Stage 2
|
185 |
+
General
|
186 |
+
RGB + depth camera feed
|
187 |
+
Mode Control
|
188 |
+
Navigation
|
189 |
+
Stage 3
|
190 |
+
Throughput
|
191 |
+
Greedy Pickup
|
192 |
+
YOLO
|
193 |
+
Control1.Mapping &
|
194 |
+
2. Navigation
|
195 |
+
TrashID
|
196 |
+
3. Greedy
|
197 |
+
Idle
|
198 |
+
Pickupto the Navigation mode alongside the coordinates of identified
|
199 |
+
trash. The Mode Controller then turns on Navigation mode.
|
200 |
+
Once a trash coordinate has been reached by the Navigation
|
201 |
+
mode, the Mode Controller next turns Navigation off and
|
202 |
+
Greedy Pickup on, picking up the trash. Navigation mode is
|
203 |
+
once again activated. Navigation and Greedy Pickup modes
|
204 |
+
will alternate until all trash is removed from the environment.
|
205 |
+
Once all the trash is picked up and no marked coordinates
|
206 |
+
remain on the map, the Mode Controller turns back to idle
|
207 |
+
and awaits further instruction.
|
208 |
+
C. Mapping
|
209 |
+
The system navigates the surrounding area and maps its
|
210 |
+
environment using ORB-SLAM2. This repository is designed
|
211 |
+
to be used within ROS as a ROS node. In our default RGB-D
|
212 |
+
configuration, the node subscribes to 2 topics (RGB and depth
|
213 |
+
image topics) and in turn, publishes all necessary data built
|
214 |
+
by the ORB-SLAM2 system. This includes a point cloud of
|
215 |
+
all map key points, the current camera pose, the full camera
|
216 |
+
path trajectory, and a morphologically transformed version of
|
217 |
+
the projected occupancy grid [21]. In experimentation, the
|
218 |
+
maps were initially filled with noise that led to an inability
|
219 |
+
to navigate the space, figure 4. Morphological operations
|
220 |
+
are commonly used tools in image processing to clean up
|
221 |
+
an image. By “eroding” and “opening” the space, errant
|
222 |
+
data points that were being misidentified as occupied were
|
223 |
+
removed. By “closing” the space gaps caused by the sparse
|
224 |
+
data, holes in our map were closed, and smooth, continuous
|
225 |
+
maps were generated, figure 5. The product was an occupancy
|
226 |
+
grid very close to real-world surroundings with a real-time,
|
227 |
+
lightweight mapping solution.
|
228 |
+
D. Trash Identification
|
229 |
+
Simultaneously, as an area is being mapped, the system also
|
230 |
+
detects trash. To recognize where on the map a piece of trash
|
231 |
+
is, the mapping robot first finds the location of a piece of
|
232 |
+
trash relative to itself. The system to locate trash was devised
|
233 |
+
using multiple components: YOLOv4, the odometry data of
|
234 |
+
the robot, and the depth camera feed provided by the Realsense
|
235 |
+
RGB-D camera, figure 7.
|
236 |
+
The first step in the trash identification pipeline is image
|
237 |
+
identification using YOLOv4. YOLOv4 is a convolutional
|
238 |
+
neural network that we trained with a custom dataset of
|
239 |
+
over 1000 images, each taken of varying pieces of trash
|
240 |
+
from the perspective of the robot. Each image was hand-
|
241 |
+
labeled and fed into the machine learning model using an
|
242 |
+
80-15-5 split between training, validation, and testing sets.
|
243 |
+
The model was trained and runs in our software stack using
|
244 |
+
a customized open-source ROS wrapper for YOLOv4 [24].
|
245 |
+
The image identification model runs simultaneously while the
|
246 |
+
environment is being mapped using the RGB camera feed and
|
247 |
+
returns “bounding boxes” around identified trash pieces in the
|
248 |
+
image, providing coordinates relative to the camera’s image
|
249 |
+
frame, figure 6.
|
250 |
+
These bounding boxes provide 2D pixel locations for the
|
251 |
+
trash in the image but do not contain any information about
|
252 |
+
Fig. 4. Raw Occupancy Grid
|
253 |
+
Fig. 5. Morphologically Transformed Occupancy Grid
|
254 |
+
where the trash lies in the environment. Therefore, the next
|
255 |
+
step is to identify the angle of the closest piece of trash relative
|
256 |
+
to the camera. This is accomplished by using the center pixel
|
257 |
+
x-coordinate of an identified piece of trash. Using the field of
|
258 |
+
view of the camera, an imaginary triangle can be created to
|
259 |
+
discover the angle of the trash relative to the camera in the
|
260 |
+
real world by using pixels as the coordinate system.
|
261 |
+
The FOV angle is 69.4 degrees, its opposite side is 640
|
262 |
+
pixels, and it is known to be an isosceles triangle, the re-
|
263 |
+
maining side lengths and angles can be extrapolated as this
|
264 |
+
is considered a trigonometrically “solved” triangle. Using this
|
265 |
+
triangle the angle of the identified trash piece is calculated
|
266 |
+
using the inverse tangent function, as shown in the following
|
267 |
+
equation and in figure 9.
|
268 |
+
θ = tan−1 trashx − 320
|
269 |
+
462.139
|
270 |
+
(1)
|
271 |
+
The next step in the localization process is to determine the
|
272 |
+
distance between the camera and the piece of trash. This is
|
273 |
+
accomplished using the depth camera feed provided by the
|
274 |
+
RGB-D camera. This camera outputs a grayscale image in
|
275 |
+
which each pixel is a 16-bit value representing the distance to
|
276 |
+
that pixel in millimeters directly from the center of the camera.
|
277 |
+
The depth picture can be indexed as a matrix using the 2D
|
278 |
+
coordinates given by YOLO’s bounding box to determine the
|
279 |
+
exact distance between the camera and any piece of trash.
|
280 |
+
Once the distance between the camera and the trash has been
|
281 |
+
calculated, all information necessary to localize the piece of
|
282 |
+
|
283 |
+
Fig. 6. Trash Bounding Boxes
|
284 |
+
Fig. 7. Depth Feed
|
285 |
+
trash relative to the robot has been acquired. Using a second
|
286 |
+
triangle with coordinates in meters, both the angle of the trash
|
287 |
+
relative to the robot as well as the distance between the trash
|
288 |
+
and the robot can be extrapolated.
|
289 |
+
The first unknown variable encountered is the distance
|
290 |
+
between the trash and the center of the robot base, d. Using the
|
291 |
+
distance between the camera and the center of the robot base
|
292 |
+
s, as well as the distance between the trash and the camera
|
293 |
+
taken from the depth camera feed (depth), d can be solved
|
294 |
+
using the Law of Cosines as shown below.
|
295 |
+
c2& = a2 + b2 + 2ab cos(c)
|
296 |
+
(2)
|
297 |
+
c& =
|
298 |
+
�
|
299 |
+
a2 + b2 + 2ab cos(c)
|
300 |
+
(3)
|
301 |
+
d& =
|
302 |
+
�
|
303 |
+
(depth2 + r2 + 2(depth)(s)(cos(180◦ − θ))
|
304 |
+
(4)
|
305 |
+
Once d is known, the final variable which needs solving is
|
306 |
+
β. This can be solved using the Law of Sines.
|
307 |
+
sin X
|
308 |
+
x
|
309 |
+
& = sin Y
|
310 |
+
y
|
311 |
+
(5)
|
312 |
+
sin(β)
|
313 |
+
depth & = sin(180◦ − θ)
|
314 |
+
d
|
315 |
+
(6)
|
316 |
+
β& = sin−1
|
317 |
+
�depth sin(180◦ − θ)
|
318 |
+
d
|
319 |
+
�
|
320 |
+
(7)
|
321 |
+
Once the angle to the piece of trash relative to the robot and
|
322 |
+
the distance between these two points became known, these
|
323 |
+
values were added to the robot’s current position to realize the
|
324 |
+
piece of trash on the map. However, some difficulties arose
|
325 |
+
when the computer did not process the images fast enough.
|
326 |
+
Algorithm 1 Mapping Trash to a Map
|
327 |
+
Input: Robot’s path r in the map m, YOLO Bounding
|
328 |
+
Box b
|
329 |
+
Output: Pose of piece of trash in the map p, orientation
|
330 |
+
o of robot relative to p
|
331 |
+
confident pieces cp ← empty
|
332 |
+
▷ init array to hold all
|
333 |
+
confident pieces
|
334 |
+
for every item in b do
|
335 |
+
if items i’s trash confidence is greater than ct then
|
336 |
+
cp ← i
|
337 |
+
end if
|
338 |
+
end for
|
339 |
+
yolotimestamp yt ← b[0].timestamp
|
340 |
+
for pose pr in r do
|
341 |
+
time difference td ← abs(yt − pr)
|
342 |
+
if you don’t have a closest pose timestamp cpr to the
|
343 |
+
yolo timestamp yt then
|
344 |
+
cpr ← pr
|
345 |
+
smallest time difference std ← td
|
346 |
+
else
|
347 |
+
if td < std then
|
348 |
+
std ← td
|
349 |
+
end if
|
350 |
+
end if
|
351 |
+
end for
|
352 |
+
for each timestamp, image in depth camera history do
|
353 |
+
Find the closest depthimage di taken to b
|
354 |
+
end for
|
355 |
+
Set robots orientation o from when the picture was
|
356 |
+
taken
|
357 |
+
for trashpiece tp in cp do
|
358 |
+
get distance d of tp from di
|
359 |
+
get tp’s angle theta from robot base
|
360 |
+
trash x distance tdx ← o + (d ∗ cos θ)
|
361 |
+
trash y distance tdy ← o + (d ∗ sin θ)
|
362 |
+
p ← tdx, tdy
|
363 |
+
end for
|
364 |
+
YOLOv4, when run on the Intel NUC, processed images at a
|
365 |
+
throughput of 0.5-0.8 FPS with about 4-5 seconds of latency
|
366 |
+
from when the image was originally taken. This created a
|
367 |
+
large gap between the time when the image was taken and the
|
368 |
+
current position of the robot. To account for the processing
|
369 |
+
latency, the path of the robot as it was mapping is logged
|
370 |
+
with timestamps for every position in its path from ORB-
|
371 |
+
SLAM2. Once the mapping robot received a successful trash
|
372 |
+
detection, the ROS timestamp given from YOLOv4 from when
|
373 |
+
that image was taken was passed to the path, and a Pose is
|
374 |
+
output. It is from this Pose that distance d and angle β are
|
375 |
+
added to localize the piece of trash relative to the map itself.
|
376 |
+
In the figure 11, the thin blue line is the path of the robot
|
377 |
+
as it maps the area. The red arrow is the current position of
|
378 |
+
the robot in the map. The cyan arrow is the Pose where the
|
379 |
+
robot was when the YOLOv4 image was taken. From this cyan
|
380 |
+
Pose, a red trash detection is then finally placed on the map.
|
381 |
+
|
382 |
+
rubbish:0.99Fig. 8. FOV Diagram
|
383 |
+
Fig. 9. FOV Trignometric Calculations
|
384 |
+
Fig. 10. Robot-Trash Trignometric Calculations
|
385 |
+
Every trash detection is plotted, and a separate anti-clustering
|
386 |
+
node averages these together, getting an approximate location
|
387 |
+
of the piece of trash.
|
388 |
+
E. Anti-clustering
|
389 |
+
Initially, we found consistency issues with the trash identifi-
|
390 |
+
cation. Either images of the same piece of trash were processed
|
391 |
+
more than once, or the trash’s estimated position became
|
392 |
+
inaccurate as the SLAM map updated. This problem led to
|
393 |
+
a large amount of noise, causing up to and exceeding thirty
|
394 |
+
detections for two pieces of trash in one single trial. In some
|
395 |
+
limited cases, our YoLOv4 model would also erroneously
|
396 |
+
classify a random background object as trash. To sort through
|
397 |
+
the noisy detections, each new trash detection was run through
|
398 |
+
Fig. 11. Robot Trajectory in the map
|
399 |
+
a filter. Every time a piece of trash was detected, a ROS
|
400 |
+
subscriber would listen to the detection and determine if it was
|
401 |
+
a new piece or detection of a piece of trash already found. A
|
402 |
+
clustered piece of trash is denoted by the green mark in figure
|
403 |
+
11.
|
404 |
+
To accomplish this, all the detected pieces of trash were
|
405 |
+
stored at their initial positions. If any new trash detection
|
406 |
+
was within a set radius of a previously detected piece of
|
407 |
+
trash, the new trash detection became combined with the
|
408 |
+
established piece by taking a rolling average of the detections.
|
409 |
+
The calculations are seen in the equation 8, where p1x/y is the
|
410 |
+
existing trash detection’s respective x and y coordinate, p2x/2y
|
411 |
+
is the new trash detection’s x and y coordinates, and a is the
|
412 |
+
amount of times p1 has been averaged to that point.
|
413 |
+
p1x = p1xa + p2x
|
414 |
+
a + 1
|
415 |
+
p1y = p1ya + p2y
|
416 |
+
a + 1
|
417 |
+
(8)
|
418 |
+
This anti-clustering algorithm decreased the total amount of
|
419 |
+
detections to accurately reflect the number of trash pieces seen
|
420 |
+
in the environment. To avoid erroneous trash detections, aver-
|
421 |
+
age trash locations without enough detections were determined
|
422 |
+
as “noisy” and filtered out. Trash points were only published to
|
423 |
+
the navigation stack if it had three or more detections averaged
|
424 |
+
to one point.
|
425 |
+
F. General Navigation and Path Planning
|
426 |
+
General navigation consists of two parts: localization and
|
427 |
+
path planning. The Robot first receives the 2D occupancy
|
428 |
+
grid from our mapping software, alongside the trash detection
|
429 |
+
coordinates. Once these data are received, the robot then
|
430 |
+
navigates to within two meters of the nearest detected trash
|
431 |
+
point. Navigation only needs to navigate near a trash location
|
432 |
+
since greedy pickup is routinely effective within a two meter
|
433 |
+
distance, and the anti-clustering algorithm accounts for noise
|
434 |
+
in our trash detections.
|
435 |
+
To get the goal pose g you need it’s orientation, and x/y
|
436 |
+
coordinates. The equation 9 describes how to get the angle
|
437 |
+
for the pose where p1 is the starting robot pose and p2 the
|
438 |
+
trash pose. In equation 10 the distance the goal pose is from
|
439 |
+
the robot is calculated to have it within Greedy Pickup range,
|
440 |
+
|
441 |
+
-ldentifiedTrashPiece
|
442 |
+
trash_depth (m)
|
443 |
+
180°-0
|
444 |
+
0.6096m
|
445 |
+
KobukiRobot--ldentifiedTrashPiece
|
446 |
+
640Pixels
|
447 |
+
RGBCameraFrame
|
448 |
+
CameraFOV-
|
449 |
+
69.4°
|
450 |
+
RealsenseD435
|
451 |
+
RGB-DCamera-ldentifiedTrashPiece
|
452 |
+
trash x
|
453 |
+
320-(640-trash_x)-
|
454 |
+
462.139 PixelsAlgorithm 2 Anti-Clustering Algorithm
|
455 |
+
Input: Trash Pose tp
|
456 |
+
Output: Poses of clustered trash pieces ctp
|
457 |
+
averaged Trash poses atp tupled with times averaged ta
|
458 |
+
(atp, ta) ← empty
|
459 |
+
if atp = 0 then
|
460 |
+
atp ← tp
|
461 |
+
ta ← 1
|
462 |
+
else
|
463 |
+
for every pose tuple pt in atpt do
|
464 |
+
get x and y bottom and top around the trash’s
|
465 |
+
location
|
466 |
+
xb, xt, yb, yt
|
467 |
+
if xb ≤ tpx ≤ xt & yx ≤ tpy ≤ yt then
|
468 |
+
pose tuple x ptx = (ptx * ta + tpx) / (ta + 1.0)
|
469 |
+
pose tuple y pty = (pty * ta + tpy) / (ta + 1.0)
|
470 |
+
ta + 1
|
471 |
+
end if
|
472 |
+
end for
|
473 |
+
if tp is not in atp then
|
474 |
+
atp ← tp
|
475 |
+
end if
|
476 |
+
ctp ← all trash poses tp in atp where tpi’s tai > 2
|
477 |
+
times
|
478 |
+
end if
|
479 |
+
where d3 is the goal distance, d1 is the distance between
|
480 |
+
the trash and the robot, and d3 is Greedy Pickup’s range. In
|
481 |
+
equation 11 the coordinates of the goal pose is found where
|
482 |
+
gx/y is represents the coordinates respectively.
|
483 |
+
θ = arctan(p1y − p2y
|
484 |
+
p1x − p2x
|
485 |
+
)
|
486 |
+
(9)
|
487 |
+
d3 = d1 − d2
|
488 |
+
(10)
|
489 |
+
gx = d3 + p1x cos(θ)gy = d3 + p2x sin(θ)
|
490 |
+
(11)
|
491 |
+
Fig. 12. Robot Path Planning in Rviz
|
492 |
+
The Navigation and path planning stack was based on the
|
493 |
+
ROS-provided open-source AMCL software stack. This soft-
|
494 |
+
ware loads and localizes the robot in a mapped environment
|
495 |
+
and its DWA planner creates a path between the identified
|
496 |
+
points of trash. We created another software module that feeds
|
497 |
+
our target coordinates from our trash detection phase into
|
498 |
+
AMCL’s path planner to follow the most efficient path between
|
499 |
+
the robot’s current location and the nearest possible trash point,
|
500 |
+
figure 12.
|
501 |
+
G. Greedy Pickup
|
502 |
+
Once the Navigation portion of the software stack places
|
503 |
+
the robot within 2 meters of the piece of trash, Greedy Pickup
|
504 |
+
is activated. Greedy Pickup is an asynchronous algorithm that
|
505 |
+
ignores all navigation and map factors and solely focuses on
|
506 |
+
seeking out the nearby trash directly.
|
507 |
+
When the greedy pickup is activated, it rotates in a given
|
508 |
+
direction to look for trash using YoLOv4. Once it receives a
|
509 |
+
trash detection, it calculates the position of the trash using the
|
510 |
+
same algorithm explained in the Trash Identification section.
|
511 |
+
After the robot localizes the trash, it turns back towards the
|
512 |
+
trash at its precise angle, turns on the collection mechanism’s
|
513 |
+
motor, and moves exactly 0.2m past the trash’s location to
|
514 |
+
ensure proper collection. Once this occurs, the motor turns off
|
515 |
+
and navigation resumes.
|
516 |
+
Algorithm 3 Greedy Pickup
|
517 |
+
Input: Detected Trash pose list tpl
|
518 |
+
set timeout time to
|
519 |
+
set confidence threshold ct
|
520 |
+
for Trash pose tp in tpl do
|
521 |
+
Determine whether tp is to the left or right of the robot
|
522 |
+
in the Map
|
523 |
+
Spin in direction of tp, scanning for confirmation
|
524 |
+
if Robot gets tp ≥ ct then
|
525 |
+
Robot Stop spinning
|
526 |
+
Use III-D algorithm to find relevant Robot orienta-
|
527 |
+
tion and trash pose
|
528 |
+
Get destination angle
|
529 |
+
Robot turns to destination angle
|
530 |
+
Robot Turn on collection mechanism and drive over
|
531 |
+
detected piece of trash
|
532 |
+
else
|
533 |
+
Robot exceeded to looking for trash
|
534 |
+
end if
|
535 |
+
end for
|
536 |
+
Output: Poses of clustered trash pieces ctp
|
537 |
+
For the collection mechanism to turn on or off, the NUC
|
538 |
+
sends a serial packet to the connected Arduino with only three
|
539 |
+
bytes in sequence, either [0x59, 0x59, 0x59] to start the motor
|
540 |
+
or [0x4E, 0x4E, 0x4E] to stop the motor. Once the Arduino
|
541 |
+
receives a start packet, it then outputs a PWM signal to two
|
542 |
+
of its GPIO pins which control the L928N motor controller.
|
543 |
+
The PWM signal gradually increases from a low duty cycle to
|
544 |
+
a higher duty cycle to control the current spikes on the 12V
|
545 |
+
line from the Robot base to the Motor. In the initial design on
|
546 |
+
bench power, starting the motor from 0 to full power produced
|
547 |
+
an initial current spike of approximately 1.9A before settling
|
548 |
+
around 0.9-1.1A when in normal motion or picking up an
|
549 |
+
|
550 |
+
object. The initial spike was over the 1.5A limit provided by
|
551 |
+
the 12V port accessible on the robot base. To eliminate this
|
552 |
+
spike, a slow ramp-up of the duty cycle of the PWM signal
|
553 |
+
was introduced from 20% duty cycle to a maximum of 80%
|
554 |
+
linearly over the course of 5 seconds. This removes the initial
|
555 |
+
current spike and ensures that the motor can both properly
|
556 |
+
power the collection mechanism and does not exceed the 1.5A
|
557 |
+
current limit.
|
558 |
+
H. ROS Middleware
|
559 |
+
ROS was used to connect all the functions of this system.
|
560 |
+
Every design block in figure 2 functions as a node, or multiple
|
561 |
+
nodes, which subscribe and publish information to the other
|
562 |
+
nodes. ROS would also be used to network between the
|
563 |
+
different robots in the multi-robot system over WiFi or other
|
564 |
+
wireless protocols.
|
565 |
+
IV. EXPERIMENT
|
566 |
+
A. Goal
|
567 |
+
The purpose of this experiment is to assert the feasibility
|
568 |
+
of this system design before iterating on the hardware used to
|
569 |
+
make it scalable and adaptable. The robot was evaluated on
|
570 |
+
its ability to accurately map the enclosure, identify, and mark
|
571 |
+
the pieces of trash, choose an efficient path, and pick the trash
|
572 |
+
up.
|
573 |
+
The robotic system is meant to clear trash as large and heavy
|
574 |
+
as an average 600mL Spring Valley Water bottle weighing ap-
|
575 |
+
proximately 0.64 kg. The system’s robotic base, the TurtleBot
|
576 |
+
2, has a load limitation of approximately 5 kilograms [20],
|
577 |
+
which presents an upper weight limit on the total load. Since
|
578 |
+
the robot’s additional components (external frame, storage
|
579 |
+
container, etc.) are estimated to weigh approximately 3 kg,
|
580 |
+
the trash load must weigh at most 2 kg.
|
581 |
+
The UGV operates in narrow environmental parameters. The
|
582 |
+
weather must be clear with no rain since the electronic systems
|
583 |
+
onboard the UGV are non-weatherproofed. In addition, due to
|
584 |
+
the wheels that come default with the robotic base (Kobuki
|
585 |
+
Mobile Base), our prototype can only operate on relatively flat,
|
586 |
+
smooth, evenly colored surfaces, with no extreme movement
|
587 |
+
in the background.
|
588 |
+
B. Testing In Simulation
|
589 |
+
Simulated testing was done in the Gazebo Robotics simu-
|
590 |
+
lator, 13. This simulator was included in the base Turtlebot
|
591 |
+
SDK and includes a near true-to-life recreation of the entire
|
592 |
+
turtlebot system. The use of ROS allows for the navigation
|
593 |
+
stack and greedy pickup to be run against the simulator and
|
594 |
+
behave exactly identically to reality. This simulator was instru-
|
595 |
+
mental in the initial testing of movement and navigation as it
|
596 |
+
allowed our team to test many different speed parameters and
|
597 |
+
movement algorithms without risking any physical damage to
|
598 |
+
the robot. All data associated with movement and mapping
|
599 |
+
were recorded and played back in a simulated environment to
|
600 |
+
recreate and reevaluate our physical testing. This allowed for
|
601 |
+
useful visualizations and assessments of what the robot was
|
602 |
+
processing at any given time.
|
603 |
+
Fig. 13. Simulation Testing Still
|
604 |
+
C. Testing the Hardware
|
605 |
+
1) Experiment System: The system’s design is meant to
|
606 |
+
function with a mapping robot and a ground vehicle. To
|
607 |
+
simulate the mapping vehicle in this experiment the UGV
|
608 |
+
plays both roles. The UGV first passed through the area to
|
609 |
+
get a map and identify trash. Then taking that information to
|
610 |
+
navigate and pick up the trash.
|
611 |
+
2) The Robot:
|
612 |
+
The hardware design uses a modified
|
613 |
+
Turtlebot-2 as a base design, figure 15, that has four main
|
614 |
+
components: the depth camera (480p RGB-D Intel Realsense
|
615 |
+
D435) [10], the computer (7-year-old Intel NUC with 8GB
|
616 |
+
of RAM) which runs a GNU-Linux OS along with ROS to
|
617 |
+
manage sensor data collection and real-time processing, the
|
618 |
+
mobile robotic base (Kobuki Mobile Base) [12], and a custom-
|
619 |
+
designed collection mechanism. The camera relays RGB and
|
620 |
+
depth images which are processed to identify and target trash.
|
621 |
+
The Kobuki’s motor and wheels relay odometric feedback
|
622 |
+
that helps confirm the UGV’s current location. The collection
|
623 |
+
mechanism attaches to the front of the Kobuki Mobile base,
|
624 |
+
plugs into power and data ports on the robot, and uses a rotary
|
625 |
+
brush to pick up the trash.
|
626 |
+
3) The Collection Mechanism: The collection mechanism
|
627 |
+
is a custom-designed addition to the Turtlebot Robot. Its
|
628 |
+
mechanical construction consists of 20-20 aluminum bars
|
629 |
+
connected by 90-degree brackets. To allow free range of
|
630 |
+
motion, caster wheels were affixed to the bottom of the frame.
|
631 |
+
When the collection mechanism motor is activated, it sweeps
|
632 |
+
trash up a ramp into a plastic storage container. A camera
|
633 |
+
mount was printed so the Realsense could be attached to the
|
634 |
+
front of mechanism [23]. A funnel was added to the front of
|
635 |
+
the collection mechanism to rein in the trash that may have
|
636 |
+
been missed slightly, figure 18.
|
637 |
+
The design of the electronics system for the collection
|
638 |
+
mechanism is an Arduino Mega that is connected to the NUC
|
639 |
+
using a USB cable, figure 17. The Arduino is then connected
|
640 |
+
to an L982N Motor driver breakout board over PWM-enabled
|
641 |
+
GPIO pins (5V). This motor driver breakout board is supplied
|
642 |
+
with 12V by the Kobuki base from a 12V, 1.5A Max port. The
|
643 |
+
output of the L982N is the DC motor which drives the chain
|
644 |
+
and the brush.
|
645 |
+
|
646 |
+
Fig. 14. Hardware Overview Diagram
|
647 |
+
Fig. 15. Turtlebot2 Base System
|
648 |
+
The brush itself was hand-designed and fabricated since
|
649 |
+
there is no commercial brush model that fit the design speci-
|
650 |
+
fications for the mobile robot, figure 16.
|
651 |
+
D. The Environment
|
652 |
+
The environment where the robot was tested was a room
|
653 |
+
with a random configuration of chairs and obstacles put around
|
654 |
+
an open space. Therefore, the map would be created each
|
655 |
+
time in a dynamic environment and the system would have
|
656 |
+
to account for a new configuration. In that space, trash was
|
657 |
+
put in different locations for all tests. We tested up to four
|
658 |
+
pieces of trash in the environment at a time.
|
659 |
+
E. Tests
|
660 |
+
1) Testing Mapping/ Image Identification accuracy/ Ac-
|
661 |
+
counting for Latency: To test the trash detection and how
|
662 |
+
well the processing latency was accounted for, expected maps
|
663 |
+
with the approximate trash locations were checked against the
|
664 |
+
created ones.
|
665 |
+
2) Testing the Greedy Pickup Algorithm: To test Greedy
|
666 |
+
Pickup, the mode was enabled with varying pieces of trash
|
667 |
+
within two meters of the robot. The piece of trash would start
|
668 |
+
out of the UGV’s perception range. The UGV would have to
|
669 |
+
scan for the trash, identify it and then collect it. This trial was
|
670 |
+
Fig. 16. Custom Designed Brush
|
671 |
+
Fig. 17. Motor Circuitry
|
672 |
+
Fig. 18. Final Construction
|
673 |
+
run with trash at 2 meters, 1 meter, and half a meter distance
|
674 |
+
from the UGV.
|
675 |
+
3) Full System Trials: Full system trials were then con-
|
676 |
+
ducted, starting with the mapping of an environment and
|
677 |
+
labeling trash points in that environment. Then to navigating
|
678 |
+
to the labeled pieces of trash in the environment and collecting
|
679 |
+
the pieces of trash using Greedy Pickup.
|
680 |
+
V. RESULTS
|
681 |
+
A. Accounting for Processing Latency
|
682 |
+
The map creation and the image identification, figure 23,
|
683 |
+
were shown to be an accurate, figure 19, fast and lightweight
|
684 |
+
way of monitoring an area and identifying pieces of trash.
|
685 |
+
B. Greedy Pickup Results
|
686 |
+
Greedy pickup is shown to be accurate to an extent with
|
687 |
+
a success rate of 77.78%, figure 20. There were multiple
|
688 |
+
failures in these trials that were caused by the design of
|
689 |
+
the collection mechanism. The collection mechanism was not
|
690 |
+
equipped with odometric wheels that could relay its’ location
|
691 |
+
so, at times it would overturn, and the caster wheels introduced
|
692 |
+
an error the system was not aware of and could not account
|
693 |
+
|
694 |
+
Intel Realsense
|
695 |
+
Camera
|
696 |
+
RGB + depth images
|
697 |
+
collection
|
698 |
+
Intel NUC
|
699 |
+
mechanism
|
700 |
+
motor feedback + control
|
701 |
+
Kobuki
|
702 |
+
Mobile Base12VDCMotor
|
703 |
+
CURRENT SENSING A
|
704 |
+
CURRENT SENSING
|
705 |
+
OUTPUT
|
706 |
+
OUTPUT 2
|
707 |
+
OUTPUT
|
708 |
+
GNT
|
709 |
+
SUPPLY VOLTAGE VS
|
710 |
+
INPUT
|
711 |
+
ENABLE
|
712 |
+
INPUT
|
713 |
+
ENABLEA
|
714 |
+
LOGIC SUPPLY VOLTAGE VSS
|
715 |
+
INPUT
|
716 |
+
INPUT 2
|
717 |
+
GND
|
718 |
+
OME
|
719 |
+
L928N Motor Driver
|
720 |
+
TXO
|
721 |
+
8
|
722 |
+
12V
|
723 |
+
REOET
|
724 |
+
RX3
|
725 |
+
TX3
|
726 |
+
MEGA
|
727 |
+
91
|
728 |
+
ROTAFig. 19. Accurate Map Creation with Identified Trash Points Result
|
729 |
+
Fig. 20. Greedy Pickup Results
|
730 |
+
Fig. 21. Full System Run-through Results
|
731 |
+
Fig. 22. Real Time Trash Identification and Map Creation
|
732 |
+
for. This caused the UGV to over or under turn occasionally
|
733 |
+
and not successfully collect the trash. The Greedy Pickup
|
734 |
+
algorithm has shown the ability to increase the error tolerance
|
735 |
+
of the system, however, there are more improvements to the
|
736 |
+
algorithm that could be made to make it more error-tolerant.
|
737 |
+
For example, an added “lock on” mechanism that when a piece
|
738 |
+
of trash is in sight it would keep the piece of trash in the center
|
739 |
+
of its FOV as it moves forward to collect the piece of trash.
|
740 |
+
Ensuring that the failure-causing edge cases are accounted for.
|
741 |
+
Fig. 23. Still of UGV Picking up Water Bottle in System Test
|
742 |
+
C. Full System Results
|
743 |
+
These results, with a 68% success rate, figure 21, show
|
744 |
+
that there are possible errors that can be introduced to this
|
745 |
+
system and that they compound on themselves as the task gets
|
746 |
+
more complex. During these trials, the collection mechanism
|
747 |
+
introduced errors during navigation and greedy pickup. The
|
748 |
+
collection mechanism introduced errors by being slightly out
|
749 |
+
of position. Since the Collection mechanism did not have
|
750 |
+
sensor feedback to tell the UGV it was not in the correct
|
751 |
+
position the little errors compounded into failures to collect
|
752 |
+
trash.
|
753 |
+
VI. CONCLUSION
|
754 |
+
Our contribution is a multi-robot system design applied
|
755 |
+
to monitoring and managing roadside litter. We developed a
|
756 |
+
system that can map, identify, and pick up pieces of trash. The
|
757 |
+
system is designed to be relatively cheap and scalable which
|
758 |
+
could be done because we introduced different algorithms that
|
759 |
+
account for errors in a system that has less precise sensors.
|
760 |
+
Our Greedy Pickup algorithm accounts for errors in trash iden-
|
761 |
+
tification, and trash can be accurately identified in a system
|
762 |
+
with low processing power. Our custom-designed collection
|
763 |
+
mechanism, designed to pick up the main offending types of
|
764 |
+
trash found on the side of the road, was also introduced.
|
765 |
+
This system builds off previously known algorithms: AMCL
|
766 |
+
and DWA for navigation, Orbslam-2 for map creation, and
|
767 |
+
YOLO.v4 for trash identification. It also build off multi-robot
|
768 |
+
systems to monitor a dynamic environment and combines that
|
769 |
+
with information with a dynamic collection algorithm, Greedy
|
770 |
+
Pickup, to create an efficient collection process.
|
771 |
+
The next steps for this system would to be refine the
|
772 |
+
mechanical design of the UGV, such as adding odometry
|
773 |
+
sensors onto the collection mechanism’s wheels and improving
|
774 |
+
the wheels to be able to drive over more difficult terrains.
|
775 |
+
There are also improvements to be made to the Greedy Pickup
|
776 |
+
algorithm such as adding a “Lock on” capability. Better logic
|
777 |
+
could be applied to the navigation, for example, a future
|
778 |
+
iteration of this system could use a graph search algorithm
|
779 |
+
|
780 |
+
Mapping and Trash Identification Results
|
781 |
+
8%
|
782 |
+
92%
|
783 |
+
Successful Maps
|
784 |
+
■ Failed MapsGreedy Pickup Success
|
785 |
+
16
|
786 |
+
14
|
787 |
+
12
|
788 |
+
10
|
789 |
+
8
|
790 |
+
6
|
791 |
+
4
|
792 |
+
2
|
793 |
+
0
|
794 |
+
2 meter
|
795 |
+
1 meter
|
796 |
+
0.5 meter
|
797 |
+
Robot's Distance from Trash
|
798 |
+
Total Trials
|
799 |
+
Successful trialsFull System Tests
|
800 |
+
Aount of Trash in the Environment
|
801 |
+
0
|
802 |
+
0.5
|
803 |
+
1
|
804 |
+
1.5
|
805 |
+
2
|
806 |
+
2.5
|
807 |
+
3
|
808 |
+
3.5
|
809 |
+
4
|
810 |
+
4.5
|
811 |
+
Successful Trials
|
812 |
+
Total Trials[ Interact Move Camera
|
813 |
+
Select
|
814 |
+
Focus CameraMeasure2D Pose Estimate2DNavGoalPublishPoint
|
815 |
+
Q
|
816 |
+
RGBImage
|
817 |
+
RGB View
|
818 |
+
ORB-SLAM2Ima
|
819 |
+
RViz
|
820 |
+
SLAMView
|
821 |
+
OOYOLOV4
|
822 |
+
Map View
|
823 |
+
YOLOView
|
824 |
+
199.22
|
825 |
+
Wall Elapsed:416.55
|
826 |
+
Experimentalto find the most efficient path between every piece of trash.
|
827 |
+
An aerial robot can also be introduced as the mapping robot in
|
828 |
+
the next iteration of this system for testing, to more accurately
|
829 |
+
represent the issues that would arise from changes in the
|
830 |
+
perspective of the system. More replicas of the UGV could be
|
831 |
+
added into the system as well, so there would be multiple trash
|
832 |
+
collectors in one environment at the same time. The system
|
833 |
+
could also have mapping and trash collection happening in
|
834 |
+
parallel instead of the modes being sequential.
|
835 |
+
VII. ACKNOWLEDGMENTS
|
836 |
+
This is a video of a full run-through our system did with
|
837 |
+
two pieces of trash in the environment [5]. This is the central
|
838 |
+
repository in our organization that sets up the system [4].
|
839 |
+
This is the Greedy Pickup repository which holds all the
|
840 |
+
functions laid out in this paper [3]. We would like to thank
|
841 |
+
the contributions of Divya Venkatraman, Jared Raines and
|
842 |
+
Catherine Ellingham for their work on gathering data, editing
|
843 |
+
the paper and system networking. We’d also like to thank Dr.
|
844 |
+
Taskin Padir and his Robotics and Intelligent Ground Vehicle
|
845 |
+
Research Laboratory (RIVeR) [22] for allowing us to use their
|
846 |
+
hardware to test our design.
|
847 |
+
REFERENCES
|
848 |
+
[1]
|
849 |
+
Yong-bao Ai et al. “Visual SLAM in dynamic environ-
|
850 |
+
ments based on object detection”. In: Defence Technol-
|
851 |
+
ogy (2020). ISSN: 2214-9147. DOI: https://doi.org/10.
|
852 |
+
1016/j.dt.2020.09.012. URL: https://www.sciencedirect.
|
853 |
+
com/science/article/pii/S2214914720304402.
|
854 |
+
[2]
|
855 |
+
Keep Louisiana Beautiful. Executive Summary: Litter in
|
856 |
+
America. URL: https://keeplouisianabeautiful.org/wp-
|
857 |
+
content/uploads/2015/09/Litter-in-America-Executive
|
858 |
+
Summary - FINAL.pdf. (Accessed: 10-June-2021).
|
859 |
+
[3]
|
860 |
+
John Chiaramonte, Jack Fenton, and Lee Milburn. cave-
|
861 |
+
man mode. URL: https://github.com/Capstone- W3/
|
862 |
+
caveman mode. (Accessed: 20-April-2021).
|
863 |
+
[4]
|
864 |
+
John Chiaramonte et al. Capstone-W3. URL: https://
|
865 |
+
github.com/Capstone-W3. (Accessed: 11-June-2021).
|
866 |
+
[5]
|
867 |
+
John Chiaramonte et al. T.R.A.S.H. Demonstration.
|
868 |
+
URL: https : / / www . youtube . com / watch ? v =
|
869 |
+
cIwk0Kh9k7E. (Accessed: 5-July-2021).
|
870 |
+
[6]
|
871 |
+
Maria Valera Espina et al. “Multi-robot Teams for
|
872 |
+
Environmental Monitoring”. In: Innovations in Defence
|
873 |
+
Support Systems – 3: Intelligent Paradigms in Secu-
|
874 |
+
rity. Ed. by Paolo Remagnino, Dorothy N. Monekosso,
|
875 |
+
and Lakhmi C. Jain. Berlin, Heidelberg: Springer
|
876 |
+
Berlin Heidelberg, 2011, pp. 183–209. ISBN: 978-3-
|
877 |
+
642-18278-5. DOI: 10.1007/978- 3- 642- 18278- 5 8.
|
878 |
+
URL: https://doi.org/10.1007/978-3-642-18278-5 8.
|
879 |
+
[7]
|
880 |
+
Conserve Energy Future. The Catastrophic Effects of
|
881 |
+
Littering on Humans. URL: https : / / www. conserve -
|
882 |
+
energy-future.com/littering-effects-humans-animals-
|
883 |
+
environment.php. (Accessed: 14-June-2021).
|
884 |
+
[8]
|
885 |
+
Brian Gerkey. AMCL Package Summary. URL: https:
|
886 |
+
//wiki.ros.org/amcl?distro=melodic. (Accessed: 10-
|
887 |
+
March-2022).
|
888 |
+
[9]
|
889 |
+
Le Hong, Weicheng Cui, and Hao Chen. “A Novel
|
890 |
+
Multi-Robot Task Allocation Model in Marine Plastics
|
891 |
+
Cleaning Based on Replicator Dynamics”. In: Journal
|
892 |
+
of Marine Science and Engineering 9.8 (2021). ISSN:
|
893 |
+
2077-1312. DOI: 10.3390/jmse9080879. URL: https:
|
894 |
+
//www.mdpi.com/2077-1312/9/8/879.
|
895 |
+
[10]
|
896 |
+
Intel. Intel® RealSense™ Depth Camera D435. URL:
|
897 |
+
https://ark.intel.com/content/www/us/en/ark/products/
|
898 |
+
128255 / intel - realsense - depth - camera - d435 . html.
|
899 |
+
(Accessed: 5-July-2021).
|
900 |
+
[11]
|
901 |
+
Alaa Khamis, Ahmed Hussein, and Ahmed Elmogy.
|
902 |
+
“Multi-robot Task Allocation: A Review of the State-
|
903 |
+
of-the-Art”. In: vol. 604. May 2015, pp. 31–51. ISBN:
|
904 |
+
978-3-319-18299-5. DOI: 10.1007/978-3-319-18299-
|
905 |
+
5 2.
|
906 |
+
[12]
|
907 |
+
Iclebo Kobuki. Kobuki User Guide. URL: http://kobuki.
|
908 |
+
yujinrobot . com / wiki / online - user- guide/. (Accessed:
|
909 |
+
11-June-2021).
|
910 |
+
[13]
|
911 |
+
Nathan Koenig and Andrew Howard. “Design and Use
|
912 |
+
Paradigms for Gazebo, An Open-Source Multi-Robot
|
913 |
+
Simulator”. In: ().
|
914 |
+
[14]
|
915 |
+
Stephanie Melchor. Roadside Trash A Growing Prob-
|
916 |
+
lem. URL: https://www.montereyherald.com/2021/01/
|
917 |
+
23/roadside-trash-a-growing-problem/. (Accessed: 10-
|
918 |
+
June-2021).
|
919 |
+
[15]
|
920 |
+
Ra´ul Mur-Artal, J. M. M. Montiel, and Juan D. Tard´os.
|
921 |
+
“ORB-SLAM: A Versatile and Accurate Monocular
|
922 |
+
SLAM System”. In: IEEE Transactions on Robotics
|
923 |
+
31.5 (2015), pp. 1147–1163. DOI: 10.1109/TRO.2015.
|
924 |
+
2463671.
|
925 |
+
[16]
|
926 |
+
Shinkyu Park, Yaofeng Desmond Zhong, and Naomi
|
927 |
+
Ehrich Leonard. “Multi-Robot Task Allocation Games
|
928 |
+
in Dynamically Changing Environments”. In: 2021
|
929 |
+
IEEE International Conference on Robotics and Au-
|
930 |
+
tomation (ICRA). 2021, pp. 8678–8684. DOI: 10.1109/
|
931 |
+
ICRA48506.2021.9561809.
|
932 |
+
[17]
|
933 |
+
Morgan Quigley et al. “ROS: an open-source Robot
|
934 |
+
Operating System”. In: Proc. of the IEEE Intl. Conf.
|
935 |
+
on Robotics and Automation (ICRA) Workshop on Open
|
936 |
+
Source Robotics. Kobe, Japan, May 2009.
|
937 |
+
[18]
|
938 |
+
raulmur. ORB SLAM2. URL: https : / / github . com /
|
939 |
+
raulmur/ORB SLAM2. (Accessed: 11-June-2021).
|
940 |
+
[19]
|
941 |
+
rayvburn. ORBSLAM2 ROS. URL: https://github.com/
|
942 |
+
rayvburn / ORB - SLAM2 ROS. (Accessed: 11-June-
|
943 |
+
2021).
|
944 |
+
[20]
|
945 |
+
Clearpath Robotics. TurtleBot 2 - Open Source Personal
|
946 |
+
Research Robot. URL: https://clearpathrobotics.com/
|
947 |
+
turtlebot - 2 - open - source - robot. (Accessed: 10-June-
|
948 |
+
2021).
|
949 |
+
[21]
|
950 |
+
Adrian Rosebrock. OpenCV Morphological Operations.
|
951 |
+
URL: https://pyimagesearch.com/2021/04/28/opencv-
|
952 |
+
morphological-operations/. (Accessed: 11-June-2021).
|
953 |
+
[22]
|
954 |
+
Padir Taskin. RIVeR. URL: https : / / robot . neu . edu/.
|
955 |
+
(Accessed: 7-July-2021).
|
956 |
+
|
957 |
+
[23]
|
958 |
+
Makerbot Thingiverse. Intel RealSense D435 Camera
|
959 |
+
Mount for OpenBuilds 20x20mm Extrusion. URL: https:
|
960 |
+
//www.thingiverse.com/thing:2965905.
|
961 |
+
[24]
|
962 |
+
Tossy0423. darknet ros. URL: https : / / github . com /
|
963 |
+
Tossy0423 / darknet ros / tree / master/. (Accessed: 11-
|
964 |
+
June-2021).
|
965 |
+
|
6dAzT4oBgHgl3EQfvP2u/content/tmp_files/load_file.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
8dFRT4oBgHgl3EQfpTfl/content/tmp_files/2301.13613v1.pdf.txt
ADDED
@@ -0,0 +1,1377 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
Geometry-based approximation of waves propagating
|
2 |
+
through complex domains∗
|
3 |
+
Davide Pradovera†
|
4 |
+
Monica Nonino†
|
5 |
+
Ilaria Perugia†
|
6 |
+
February 1, 2023
|
7 |
+
Abstract
|
8 |
+
We consider wave propagation problems over 2-dimensional domains with piecewise-linear bound-
|
9 |
+
aries, possibly including scatterers. Under the assumption that the initial conditions and forcing terms
|
10 |
+
are radially symmetric and compactly supported (which is common in applications), we propose an ap-
|
11 |
+
proximation of the propagating wave as the sum of some special nonlinear space-time functions: each
|
12 |
+
term in this sum identifies a particular ray, modeling the result of a single reflection or diffraction ef-
|
13 |
+
fect. We describe an algorithm for identifying such rays automatically, based on the domain geometry.
|
14 |
+
To showcase our proposed method, we present several numerical examples, such as waves scattering off
|
15 |
+
wedges and waves propagating through a room in presence of obstacles.
|
16 |
+
Keywords: wave propagation, model reduction, scattering, geometrical optics, diffraction
|
17 |
+
AMS subject classifications: 35L05, 35Q60, 65M25, 78A45, 78M34
|
18 |
+
1
|
19 |
+
Introduction
|
20 |
+
The discretization of numerical models for the simulation of complex phenomena results in high-dimensional
|
21 |
+
systems to be solved, usually at an extremely high cost in terms of computational time and storage memory.
|
22 |
+
Among these models, wave propagation problems represent an extremely interesting topic: relevant applica-
|
23 |
+
tions can be found, e.g., in the field of array imaging, where acoustic, electromagnetic, and elastic waves in
|
24 |
+
scattering media are modeled by the reflectivity coefficient, which is often unknown. Some examples in this
|
25 |
+
direction can be found in [5, 6, 7, 30], where inverse scattering problems are used to infer the reflectivity of
|
26 |
+
one or more scatterers embedded either in a known and smooth medium, or in a randomly inhomogeneous
|
27 |
+
medium. Another example of application of wave propagation problems is numerical acoustics, where the
|
28 |
+
goal is to simulate the propagation of sound in a room, in presence of obstacles and walls with different
|
29 |
+
absorbing and/or reflecting properties, see [28].
|
30 |
+
Wave propagation problems in the time-harmonic setting (the Helmholtz problem, cast in the frequency
|
31 |
+
domain) have been widely studied. See, e.g., [4, 13, 19, 24, 25, 27, 28]. However, our focus here are problems
|
32 |
+
in the time domain, whose numerical simulation is expensive, mainly because one needs to use both a fine
|
33 |
+
spatial mesh and a carefully chosen time step in order to satisfy the CFL condition [11, 16]. In the interest
|
34 |
+
of making these simulations feasible, model order reduction (MOR) [3, 9, 14, 17] represents a promising
|
35 |
+
framework, whose goal is to reduce the computational cost of solving the problem of interest.
|
36 |
+
In this context, it is well known [12, 15] that wave propagation problems are characterized by a slowly
|
37 |
+
decaying Kolmogorov n-width.
|
38 |
+
Because of this, classical linear-subspace MOR methods are not able to
|
39 |
+
reproduce the behavior of the wave propagation without relying on a very high-dimensional linear manifold.
|
40 |
+
This makes linear surrogate models unappealing, since they do not yield significant speed-ups. In recent
|
41 |
+
years, many approaches have been proposed to overcome the intrinsic “difficulty” of problems with slowly
|
42 |
+
∗M. Nonino and I. Perugia have been funded by the Austrian Science Fund (FWF) through project F 65 “Taming Complexity
|
43 |
+
in Partial Differential Systems” and project P 33477.
|
44 |
+
†Faculty
|
45 |
+
of
|
46 |
+
Mathematics,
|
47 |
+
University
|
48 |
+
of
|
49 |
+
Vienna,
|
50 |
+
Oskar-Morgenstern-Platz
|
51 |
+
1,
|
52 |
+
1090
|
53 |
+
Vienna,
|
54 |
+
Austria
|
55 |
+
(da-
|
56 | |
57 |
+
1
|
58 |
+
arXiv:2301.13613v1 [math.NA] 31 Jan 2023
|
59 |
+
|
60 |
+
D. Pradovera, M. Nonino, and I. Perugia
|
61 |
+
Geometry-based approximation of waves in complex domains
|
62 |
+
decaying Kolmogorov n-width, with the target of making MOR more efficient. To this end, such methods
|
63 |
+
rely on nonlinear and/or hybrid space-time approaches. For more details, we refer to [8, 10, 18, 21, 26, 29, 31].
|
64 |
+
In this work, we focus on wave propagation over 2-dimensional spatial domains, possibly including ob-
|
65 |
+
stacles. We limit our investigation to domains with piecewise-linear boundaries and a constant wave speed.
|
66 |
+
The initial conditions and forcing terms are assumed to be compactly supported and radially symmetric
|
67 |
+
around a “source point”. This situation arises in many of the above-mentioned applications. Under these
|
68 |
+
assumptions, we propose to approximate the solution of the problem of interest with the sum of some special
|
69 |
+
nonlinear space-time functions, which we call “rays”. Each ray models a reflection or diffraction effect, and
|
70 |
+
is composed of different parts:
|
71 |
+
• the free-space radially symmetric solution of the wave equation, modeling the space-time propagation
|
72 |
+
of the ray;
|
73 |
+
• a spatial indicator function, determining the light cone of each ray;
|
74 |
+
• a nonlinear spatial term encoding the angular modulation of the ray, which is crucial when modeling
|
75 |
+
diffraction effects.
|
76 |
+
The number of terms appearing in the sum is determined by the number of reflection and diffraction effects
|
77 |
+
that are required to faithfully approximate the target wave, which ultimately depends on the geometry of
|
78 |
+
the physical domain.
|
79 |
+
Among the advantages of the proposed approach, we mention the fact that each ray is separable into
|
80 |
+
time-radial and angular components (in the “polar coordinates” sense). As we will see, we can leverage this
|
81 |
+
to reduce drastically the computational cost and the storage memory that are required by our approximation,
|
82 |
+
with respect to competitor methods.
|
83 |
+
The rest of the paper is structured as follows. In Section 1.1 we present the problem of interest. In
|
84 |
+
Section 2 we introduce the main ingredients of our method, and we describe the “training phase” of the
|
85 |
+
algorithm, i.e., the construction of the approximated wave. In Sections 3 and 4 we detail how we model
|
86 |
+
reflection and diffraction effects, respectively. The latter section is rather extensive, since diffraction is much
|
87 |
+
harder to model than reflection, and requires special care. In Section 5 we present some numerical results to
|
88 |
+
showcase our method. Both simple benchmarks (wedges) and more complicated tests (2D room model with
|
89 |
+
scatterers) are considered. Some final considerations follow in Section 6.
|
90 |
+
1.1
|
91 |
+
Target problem
|
92 |
+
We are interested in the numerical approximation of the solution of the wave equation in complex domains.
|
93 |
+
In this work, we consider 2-dimensional domains only. However, most of our discussion generalizes to 3D.
|
94 |
+
We defer a discussion on this till Section 6.
|
95 |
+
We denote by Ω ⊂ R2 the physical domain in which the wave equation is considered. We assume that
|
96 |
+
Ω is either a closed polygon or a set-subtraction of polygons (to allow for multiply connected domains).
|
97 |
+
We denote by ne and nv the number of edges and vertices of ∂Ω, respectively. We study the propagation
|
98 |
+
of waves in Ω over a given time interval of interest [0, T]. The model problem is the wave equation with
|
99 |
+
constant (unit) wave speed:
|
100 |
+
�
|
101 |
+
�
|
102 |
+
�
|
103 |
+
�
|
104 |
+
�
|
105 |
+
�
|
106 |
+
�
|
107 |
+
�
|
108 |
+
�
|
109 |
+
∂ttu(x, t) = ∆u(x, t) + f(x, t)
|
110 |
+
for (x, t) ∈ Ω × (0, T),
|
111 |
+
u(x, 0) = u0(x)
|
112 |
+
for x ∈ Ω,
|
113 |
+
∂tu(x, 0) = u1(x)
|
114 |
+
for x ∈ Ω,
|
115 |
+
∂νu(x, t) = 0
|
116 |
+
for (x, t) ∈ ∂Ω × (0, T],
|
117 |
+
(1)
|
118 |
+
with ∆ the Laplacian operator, defined, in 2 dimensions, as ∆ = �2
|
119 |
+
j=1 ∂xjxj. The homogeneous Neumann
|
120 |
+
condition (i.e., the last equation above) models the whole boundary ∂Ω as sound-hard [11]. More generally,
|
121 |
+
all or parts of ∂Ω may be modeled as sound-soft via a Dirichlet-type condition: u(x, t) = 0.
|
122 |
+
We assume that the initial conditions u0 and u1, as well as the forcing term f, have radial symmetry
|
123 |
+
around a given point. Without loss of generality, we will take such point to be the origin of R2:
|
124 |
+
u0(x) = η0(∥x∥), u1(x) = η1(∥x∥), f(x, t) = η2(∥x∥ , t)
|
125 |
+
∀(x, t) ∈ Ω × (0, T),
|
126 |
+
(2)
|
127 |
+
2
|
128 |
+
|
129 |
+
D. Pradovera, M. Nonino, and I. Perugia
|
130 |
+
Geometry-based approximation of waves in complex domains
|
131 |
+
with ∥x∥2 = �2
|
132 |
+
j=1 x2
|
133 |
+
j. We further assume that the functions ηj have compact support, namely, that there
|
134 |
+
exist R > 0 such that ηj(ρ) = 0 for all ρ > R and j = 0, 1, 2. Moreover, to avoid incompatibilities with the
|
135 |
+
boundary conditions, for simplicity we will only consider the situation where the supports of the functions
|
136 |
+
ηj are fully contained in Ω.
|
137 |
+
2
|
138 |
+
Approximation framework
|
139 |
+
Before we can model boundary effects (reflection and diffraction), we need to understand how the solution
|
140 |
+
u would behave if no boundary were present. To this aim, we consider the wave equation in free space
|
141 |
+
�
|
142 |
+
�
|
143 |
+
�
|
144 |
+
�
|
145 |
+
�
|
146 |
+
∂ttU(x, t) = ∆U(x, t) + f(x, t)
|
147 |
+
for (x, t) ∈ R2 × (0, ∞),
|
148 |
+
U(x, 0) = u0(x)
|
149 |
+
for x ∈ R2,
|
150 |
+
∂tU(x, 0) = u1(x)
|
151 |
+
for x ∈ R2,
|
152 |
+
(3)
|
153 |
+
which we have obtained from (1) by replacing Ω with the whole plane.
|
154 |
+
Due to radial symmetry (of the initial conditions and of the forcing term), we can recast the problem in
|
155 |
+
polar coordinates. This allows us to define the free-space solution in the radial coordinate Ψ, as the solution
|
156 |
+
of
|
157 |
+
�
|
158 |
+
�
|
159 |
+
�
|
160 |
+
�
|
161 |
+
�
|
162 |
+
�
|
163 |
+
�
|
164 |
+
�
|
165 |
+
�
|
166 |
+
∂ttΨ(ρ, t) = �∆Ψ(ρ, t) + η2(ρ, t)
|
167 |
+
for (ρ, t) ∈ (0, ∞) × (0, ∞),
|
168 |
+
Ψ(ρ, 0) = η0(ρ)
|
169 |
+
for ρ ∈ [0, ∞),
|
170 |
+
∂tΨ(ρ, 0) = η1(ρ)
|
171 |
+
for ρ ∈ [0, ∞),
|
172 |
+
∂ρΨ(0, t) = 0
|
173 |
+
for t ∈ (0, ∞),
|
174 |
+
(4)
|
175 |
+
where �∆ is the Laplace operator in polar coordinates (under radial symmetry), i.e.
|
176 |
+
�∆ = ∂ρρ + 1
|
177 |
+
ρ∂ρ, and
|
178 |
+
U(x, t) = Ψ(∥x∥ , t) for all x ∈ R2. Note that, by the compact support of the initial conditions and of
|
179 |
+
the forcing term, and by the finite (unit) speed of propagation of the wave equation, we have Ψ(ρ, t) = 0
|
180 |
+
whenever ρ > t + R.
|
181 |
+
Remark 2.1. Generally, the free-space solution Ψ is not available analytically, except for very simple choices
|
182 |
+
of initial conditions and forcing term. Accordingly, in most applications, the function Ψ will need to be
|
183 |
+
replaced with a suitable approximation. To this effect, one could discretize (4), e.g., with a finite element
|
184 |
+
approximation (in space) and some timestepping scheme (in time). See Section 5 for more details on how
|
185 |
+
this can be carried out.
|
186 |
+
Our goal is to approximate, for all (x, t) ∈ Ω × [0, T], the solution u(x, t) of the wave equation problem
|
187 |
+
(1) with the following sum of special functions:
|
188 |
+
u(x, t) ≈ �u(x, t) =
|
189 |
+
N
|
190 |
+
�
|
191 |
+
n=1
|
192 |
+
Ψ(∥x − ξn∥ + rn, t)1Ωn(x)ζn(x − ξn)
|
193 |
+
�
|
194 |
+
��
|
195 |
+
�
|
196 |
+
�un(x,t)
|
197 |
+
.
|
198 |
+
(5)
|
199 |
+
Each term �un is what we will call a “ray”. Therein, Ψ is the above-mentioned free-space radially symmetric
|
200 |
+
solution of (4), and 1A denotes the indicator function with support A, i.e.,
|
201 |
+
1A(y) =
|
202 |
+
�
|
203 |
+
1
|
204 |
+
if y ∈ A,
|
205 |
+
0
|
206 |
+
if y /∈ A.
|
207 |
+
(6)
|
208 |
+
Moreover, in (5), we have introduced the following quantities:
|
209 |
+
• N is the number of rays used in the approximation.
|
210 |
+
• ξn is the location of the new source.
|
211 |
+
• rn ≥ 0 is a spatial delay, which will be used for the synchronization of diffraction effects.
|
212 |
+
• Ωn ⊂ Ω is the light cone (the spatial support) of a term of the sum.
|
213 |
+
3
|
214 |
+
|
215 |
+
D. Pradovera, M. Nonino, and I. Perugia
|
216 |
+
Geometry-based approximation of waves in complex domains
|
217 |
+
• ζn : R2 \ {0} → R is a weight function describing the angular modulation. We require that ζn be a
|
218 |
+
positive-homogeneous functions, i.e., ζn(y) = ζn(τy) for all τ > 0 and y ∈ R2.
|
219 |
+
Note that, due to the finite speed of propagation of the free-space solution Ψ, we have that a generic
|
220 |
+
term �un(x, t) is zero whenever t < ∥x − ξn∥ + rn − R, i.e., for t small enough, depending on x.
|
221 |
+
The number of rays N in the sum (5) will be determined based on how many boundary effects (reflections
|
222 |
+
and diffractions) need to be included in �u in order to have a good approximation of the target wave u. We
|
223 |
+
describe a strategy for automatically identifying a good N in the next section. See, e.g., Remark 2.2.
|
224 |
+
2.1
|
225 |
+
Building the low-rank skeleton
|
226 |
+
Recalling that u solves the wave equation (1) in the domain Ω, we use the first term in (5), namely, �u1, to
|
227 |
+
approximate the outgoing component of u, ignoring any effect due to the boundary ∂Ω, except for shadows.
|
228 |
+
Then, given such �u1, we use the other terms �u2, . . . , �uN to correct this first approximation. Each extra term
|
229 |
+
models a single effect due to a certain portion of the boundary, specifically, an edge (reflection off that edge)
|
230 |
+
or a vertex (diffraction about that vertex).
|
231 |
+
Going back to the first ray �u1, let us define it, by providing its “ingredients” ξ1, r1, Ω1, and ζ1, cf. (5).
|
232 |
+
We set ξ1 = 0, the center of the initial condition, as well as r1 = 0, since no delay is necessary for this first
|
233 |
+
term. Then, leveraging symmetry, we set ζ1 ≡ 1, which corresponds to the (physical) assumption that the
|
234 |
+
propagation of �u1 is purely radial. Finally, we set Ω1 (the light cone around 0) as the set of points that can
|
235 |
+
be reached from 0 via a straight line without going outside ∂Ω, i.e.,
|
236 |
+
Ω1 = {x ∈ Ω : τx ∈ Ω ∀0 ≤ τ ≤ 1} .
|
237 |
+
(7)
|
238 |
+
In summary, the first term of �u is
|
239 |
+
�u1(x, t) = Ψ(∥x∥ , t)1Ω1(x).
|
240 |
+
(8)
|
241 |
+
Then we can move to the subsequent terms �un, n ≥ 2.
|
242 |
+
Their expressions depend on our choice of
|
243 |
+
reflection and diffraction modeling, and will be provided in the upcoming sections. Instead, in the rest of
|
244 |
+
the present section we focus on understanding how large N should be, in order for �u to provide a faithful
|
245 |
+
approximation of u. Equivalently, we want to count the number of times the wave gets reflected or diffracted
|
246 |
+
at the boundary ∂Ω. This is done incrementally, starting from the initial value N = 1 (no boundary effects)
|
247 |
+
and then updating this guess as more and more boundary effects get “discovered”.
|
248 |
+
To help us in this endeavor, we employ what we call a timetable, which, in this work, is simply a list of
|
249 |
+
vectors, each with size ne + nv. The timetable is built incrementally starting from an empty list, appending
|
250 |
+
one new vector every time a new term is added in the sum (5), starting from �u1. The entries of the n-th
|
251 |
+
timetable vector are the waiting times before �un comes in contact with an edge or a vertex of ∂Ω. If it is
|
252 |
+
impossible for �un to “cast light” (along a straight path) onto a certain edge or vertex, then the corresponding
|
253 |
+
entry in the timetable is set to ∞. After this, it suffices to look for the smallest not-yet-explored entry of the
|
254 |
+
timetable to identify what the next term of the approximation �u should be. Once the entry in the timetable
|
255 |
+
has been explored, its value is set to ∞.
|
256 |
+
We start by describing how the first vector a1 ∈ Rne+nv of the timetable (corresponding to �u1) is
|
257 |
+
computed, and how a1 allows us to identify the (geometric) features of �u2. The vector a1 can be partitioned
|
258 |
+
into edges-related part (the first ne entries) and vertices-related part (the last nv entries).
|
259 |
+
• Edge times. Given a generic edge γj ⊂ ∂Ω (j = 1, . . . , ne) belonging to the domain boundary, we
|
260 |
+
define the corresponding entry of a1 as
|
261 |
+
(a1)j =
|
262 |
+
�
|
263 |
+
r1 + inf
|
264 |
+
�
|
265 |
+
∥x − ξ1∥ : x ∈ γj ∩ Ω1
|
266 |
+
�
|
267 |
+
if the set is non-empty,
|
268 |
+
∞
|
269 |
+
otherwise.
|
270 |
+
(9)
|
271 |
+
Note that we have taken the shortest path from ��1 to γj, and that we have denoted the closure of the
|
272 |
+
light cone Ω1 as Ω1.
|
273 |
+
• Vertex times. Given a generic vertex yj ⊂ ∂Ω (j = 1, . . . , nv) of the domain boundary, we set
|
274 |
+
(a1)ne+j =
|
275 |
+
�
|
276 |
+
r1 + ∥yj − ξ1∥
|
277 |
+
if yj ∈ Ω1,
|
278 |
+
∞
|
279 |
+
otherwise.
|
280 |
+
(10)
|
281 |
+
4
|
282 |
+
|
283 |
+
D. Pradovera, M. Nonino, and I. Perugia
|
284 |
+
Geometry-based approximation of waves in complex domains
|
285 |
+
Note that we have included the delay r1 (which is actually zero here) as a way to streamline Eqs. (9) and (10)
|
286 |
+
for the upcoming section. See Fig. 1 for a diagram showcasing these formulas.
|
287 |
+
(a1)1
|
288 |
+
(a1)2
|
289 |
+
(a1)5
|
290 |
+
(a1)17
|
291 |
+
Ω1
|
292 |
+
Ω \ Ω1
|
293 |
+
γ1
|
294 |
+
γ2
|
295 |
+
γ3
|
296 |
+
γ4
|
297 |
+
γ5
|
298 |
+
y3
|
299 |
+
y4
|
300 |
+
y6
|
301 |
+
ξ1
|
302 |
+
(a1)3 = ∞
|
303 |
+
(a1)4 = ∞
|
304 |
+
(a1)14 = ∞
|
305 |
+
(a1)15 = ∞
|
306 |
+
...
|
307 |
+
Figure 1: Computation of some timetable entries. The boundary ∂Ω has 11 sides, so that, e.g., (a1)14 is
|
308 |
+
related to y3 and (a1)17 is related to y6. The shadowed area Ω \ Ω1 is in darker grey.
|
309 |
+
The smallest entry of a1 is the time at which the first “boundary event” (reflection or diffraction) can
|
310 |
+
happen1. The index of the smallest entry tells us whether the event is a reflection (index 1 ≤ j ≤ ne) or a
|
311 |
+
diffraction (index ne + 1 ≤ j ≤ ne + nv), and also what edge/vertex causes the event. From here, we use the
|
312 |
+
models described in Sections 3 and 4 to build �u2, by computing ξ2, r2, Ω2, and ζ2.
|
313 |
+
Then, the second timetable vector a2 can be computed by replacing all subscripts “1” by “2” in Eqs. (9)
|
314 |
+
and (10). This is followed by the construction of �u3, and so on. The process continues until all not-yet-
|
315 |
+
explored entries of the timetable are larger than T +R. Indeed, starting from this time instant, the would-be
|
316 |
+
next terms of �u do not affect the approximation anymore, since, due to the finite speed of wave propagation,
|
317 |
+
they only act (on Ω) after the end of the time horizon, i.e., for t > T. The total number of rays N is simply
|
318 |
+
the number of vectors in the timetable.
|
319 |
+
We summarize the overall procedure for the construction of the rays �un in Algorithm 1. For ease of
|
320 |
+
presentation, once an entry of the timetable has been explored, it is set to ∞ as a way for the algorithm to
|
321 |
+
ignore it from that point forward.
|
322 |
+
Algorithm 1 Step-by-step construction of the surrogate model
|
323 |
+
Set N ← 1, find Ω1 as in (7), and define �u1 as in (8)
|
324 |
+
Define a1 ∈ Rne+nv using Eqs. (9) and (10)
|
325 |
+
Set i ← 1 and j ← arg minj=1,...,ne+nv (a1)j
|
326 |
+
while (ai)j ≤ T + R do
|
327 |
+
Set (ai)j ← ∞ and N ← N + 1
|
328 |
+
if j ≤ ne then
|
329 |
+
Find ξN, rN, ΩN, and ζN as in Section 3
|
330 |
+
← Reflection from edge j
|
331 |
+
else
|
332 |
+
Find vertex index j′ ← j − ne
|
333 |
+
Find ξN, rN, ΩN, and ζN as in Section 4
|
334 |
+
← Diffraction from vertex j′
|
335 |
+
end if
|
336 |
+
Define �uN from ξN, rN, ΩN, and ζN, as in (5)
|
337 |
+
Define aN ∈ Rne+nv using Eqs. (9) and (10), with “N” replacing “1” in subscripts
|
338 |
+
Set (i, j) ← arg mini=1,...,N,j=1,...,ne+nv (ai)j
|
339 |
+
end while
|
340 |
+
1We say “can happen” since not all vertices can cause diffraction, when hit from a certain point source.
|
341 |
+
This issue is
|
342 |
+
discussed in Section 4, cf. Assumption 4.3.
|
343 |
+
5
|
344 |
+
|
345 |
+
D. Pradovera, M. Nonino, and I. Perugia
|
346 |
+
Geometry-based approximation of waves in complex domains
|
347 |
+
γ
|
348 |
+
ξi
|
349 |
+
ξn
|
350 |
+
y(x)
|
351 |
+
x
|
352 |
+
θr
|
353 |
+
θi
|
354 |
+
φi(y(x))
|
355 |
+
φn(x)
|
356 |
+
βγ
|
357 |
+
ξn
|
358 |
+
ξi
|
359 |
+
y(x)
|
360 |
+
x
|
361 |
+
Figure 2: Graphical representation of a reflection off edge γ. On the left, the law of reflection prescribes
|
362 |
+
θr = θi. We show the straight line �γ supporting γ with a dotted stroke. For a given observation point x,
|
363 |
+
y(x) denotes the point of incidence of the reflected ray. On the right, computation of the light cone Ωn
|
364 |
+
(light-grey area) and its complementary shadow zone Ω \ Ωn (dark-grey area) for the reflected ray, in the
|
365 |
+
presence of a rectangular obstacle. The dashed portion of edge γ denotes the shadow γ \ γ(i). The shadow
|
366 |
+
zone consists of two connected components.
|
367 |
+
Remark 2.2. In trapping domains, see, e.g., Section 5.2, the number of terms N might be rather large
|
368 |
+
due to waves repeatedly “bouncing back and forth” between two or more edges/vertices. A large N, although
|
369 |
+
necessary for a good approximation of all wavefronts, is undesirable since it increases the computational cost
|
370 |
+
of both the construction of the surrogate �u and its evaluation.
|
371 |
+
As a compromise, one could remove all terms �un that are smaller than a certain tolerance tol, uniformly
|
372 |
+
over x and t. This can be done as a post-processing step (thus speeding up the evaluation of �u but not
|
373 |
+
its construction) or while building the surrogate itself. This can be achieved with a simple modification of
|
374 |
+
Algorithm 1, by introducing a test on the magnitude of each soon-to-be-added wave contribution �un, discarding
|
375 |
+
terms that are too small.
|
376 |
+
3
|
377 |
+
Modeling reflection
|
378 |
+
We now present the strategy for modeling reflection due to an edge γ of the domain boundary ∂Ω. We
|
379 |
+
rely on the well-known geometrical optics model, which describes wave propagation in terms of rays, not
|
380 |
+
accounting for any diffraction [23]. We assume that we are adding a new ray �un to the surrogate model (5),
|
381 |
+
due to a reflection phenomenon caused by ray �ui. Specifically, we assume that a ray coming from source
|
382 |
+
point ξi hits the edge γ ⊂ ∂Ω, i.e., that γ ∩ Ωi ̸= ∅. We need to prescribe several ingredients.
|
383 |
+
Spatial correction rn.
|
384 |
+
We just transfer rn over from the incoming wave: rn = ri. Indeed, as we will see
|
385 |
+
in Section 4, we require the term rn only when modeling diffraction.
|
386 |
+
Source point ξn.
|
387 |
+
We use the method of images, which gives the position of ξn as the reflection of ξi with
|
388 |
+
respect to the edge γ:
|
389 |
+
ξn = 2 arg min
|
390 |
+
z∈�γ
|
391 |
+
∥z − ξi∥ − ξi,
|
392 |
+
(11)
|
393 |
+
where �γ ⊂ R2 is the straight line on which edge γ lies. See Fig. 2 (left).
|
394 |
+
Weight function ζn.
|
395 |
+
Let x − ξn be a generic point where we wish to evaluate the weight function ζn.
|
396 |
+
We define the incidence point y(x) as the intersection (if any) between edge γ and the segment from ξn to
|
397 |
+
x. See Fig. 2 (left). According to the method of images, the amplitude of the reflected wave is equal (up to
|
398 |
+
sign) to the amplitude of the incoming wave:
|
399 |
+
ζn(x − ξn) = (2σγ − 1)ζi(y(x) − ξi).
|
400 |
+
(12)
|
401 |
+
6
|
402 |
+
|
403 |
+
D. Pradovera, M. Nonino, and I. Perugia
|
404 |
+
Geometry-based approximation of waves in complex domains
|
405 |
+
+
|
406 |
+
=
|
407 |
+
Figure 3: Example of reflection off an edge in the presence of an obstacle, from Fig. 2. Neumann conditions
|
408 |
+
are imposed on all edges. Source wave (left), reflected wave (middle), and superimposition of the two (right).
|
409 |
+
Note how the obstacle creates a shadow zone for source and reflected waves. For simplicity, in this plot we
|
410 |
+
are not showing any reflection or diffraction effects due to the rectangular obstacle, since they would be
|
411 |
+
modeled at different stages of the algorithm.
|
412 |
+
In the equation above, the quantity σγ is related to the kind of boundary conditions that are imposed on γ:
|
413 |
+
if γ is an edge with Neumann boundary conditions, we set σγ = 1 (ζn and ζi have the same sign), whereas
|
414 |
+
we set σγ = 0 if we have Dirichlet boundary conditions on γ (ζn and ζi have opposite signs).
|
415 |
+
Now, recall that we are assuming all weight functions to be positive-homogeneous: ζi(x − ξi) = ζi(τ(x −
|
416 |
+
ξi)), for all τ > 0. Accordingly, as we are in 2D, ζi(x − ξi) is only a function of the direction (with sign)
|
417 |
+
υi(x) = (x − ξi)/ ∥x − ξi∥, or, equivalently, of the angle φi(x) between υi(x) and the positive x1-axis. See
|
418 |
+
Fig. 2 (left) for a graphical depiction. Specifically, with an abuse of notation, let ζi(x − ξi) = ζi(φi(x)) and
|
419 |
+
ζn(x − ξn) = ζn(φn(x)), where the “new” angle-dependent functions ζi and ζn are 2π-periodic. By (12), we
|
420 |
+
deduce the property
|
421 |
+
ζn(φn(x)) = (2σγ − 1)ζi(φi(y(x))) = (2σγ − 1)ζi(2βγ − φn(y(x))) = (2σγ − 1)ζi(2βγ − φn(x)),
|
422 |
+
(13)
|
423 |
+
where βγ is the angle between edge γ and the positive x1-axis. This uniquely identifies ζn given ζi and βγ.
|
424 |
+
Light cone Ωn.
|
425 |
+
We first identify what portion of γ is actually “lit” by �ui: γ(i) = γ ∩ Ωi. Note that we
|
426 |
+
may have γ ̸= γ(i), for instance when obstacles are present between ξi and γ. See Fig. 2 (right) for an
|
427 |
+
illustration. Then, roughly speaking, we define the new light cone Ωn as the union of all rays from ξn that
|
428 |
+
pass through γ(i). To be more precise, given x ∈ Ω, let y(x) be the intersection (if any) between γ and the
|
429 |
+
line segment from ξn to x. Also, if y(x) exists, we define τ0(x) = ∥y(x) − ξn∥ / ∥x − ξn∥ ∈ (0, 1), which
|
430 |
+
satisfies y(x) = ξn + τ0(x)(x − ξn). The new light cone is defined as
|
431 |
+
Ωn =
|
432 |
+
�
|
433 |
+
x ∈ Ω : y(x) ∈ γ(i) and ξn + τ(x − ξn) ∈ Ω ∀τ0(x) < τ ≤ 1
|
434 |
+
�
|
435 |
+
.
|
436 |
+
(14)
|
437 |
+
Figure 3 represents a possible output of the numerical algorithm. In this case, we simulate only the
|
438 |
+
reflections, thus discarding, for the time being, any effect due to diffraction. It is clear that, by modeling
|
439 |
+
reflection effects only, we may obtain a discontinuous approximation of the solution of our target problem,
|
440 |
+
where the discontinuity happens exactly at the shadow boundaries (the boundaries of light cones). As we
|
441 |
+
will see in the next section, introducing diffraction in our approximation will allow us to obtain a continuous
|
442 |
+
approximation �u.
|
443 |
+
4
|
444 |
+
Modeling diffraction
|
445 |
+
Here, we describe a strategy for modeling waves diffracted by a vertex of the domain boundary ∂Ω. This is
|
446 |
+
required in building a new ray �un whenever the smallest unexplored entry of the timetable is related to a
|
447 |
+
vertex, i.e., j > ne in Algorithm 1, cf. Section 2. We need to identify several ingredients.
|
448 |
+
Source point ξn.
|
449 |
+
We employ the (standard, see, e.g., [23]) assumption that diffraction emerges as a wave
|
450 |
+
outgoing from a point source located at the diffraction point yj′ = yj−ne (we are employing the notation of
|
451 |
+
Algorithm 1). This motivates the choice of the center ξn = yj′.
|
452 |
+
7
|
453 |
+
|
454 |
+
D. Pradovera, M. Nonino, and I. Perugia
|
455 |
+
Geometry-based approximation of waves in complex domains
|
456 |
+
∂Ω
|
457 |
+
γ′
|
458 |
+
γ
|
459 |
+
ξ
|
460 |
+
α
|
461 |
+
φ
|
462 |
+
π − θ
|
463 |
+
θ
|
464 |
+
3π − 2α − θ
|
465 |
+
∂Ω
|
466 |
+
γ′
|
467 |
+
γ
|
468 |
+
ξ
|
469 |
+
α
|
470 |
+
θ − π
|
471 |
+
3π − 2α − θ
|
472 |
+
θ
|
473 |
+
Figure 4: Diagrams for the two cases of scattering for concave corners (0 < α < π): without (left plot) and
|
474 |
+
with shadow zone (right plot). The dashed lines are reflection boundaries. The dash-dotted line is a shadow
|
475 |
+
boundary. Shadow regions are absent if and only if π − α ≤ θ ≤ π. The angular coordinate 0 < φ < 2π − α
|
476 |
+
is measured starting from one of the two adjacent edges of ∂Ω.
|
477 |
+
∂Ω
|
478 |
+
γ′
|
479 |
+
γ
|
480 |
+
ξ
|
481 |
+
α
|
482 |
+
φ
|
483 |
+
π + θ − α
|
484 |
+
θ
|
485 |
+
Figure 5: Diagrams for the scattering at convex corners (π < α < 2π). The source point ξ is virtual, being
|
486 |
+
used to model reflection off of edge γ. The dash-dotted line is the shadow boundary due to edge γ′. The
|
487 |
+
shadow region is present if and only if α − π < θ < π. The angular coordinate 0 < φ < 2π − α is measured
|
488 |
+
starting from one of the two adjacent edges of ∂Ω.
|
489 |
+
Light cone Ωn.
|
490 |
+
Since the diffracted wave propagates in all geometrically allowed directions, we define the
|
491 |
+
support Ωn as the set of all points that are visible (along straight-line paths) from ξn, i.e.,
|
492 |
+
Ωn = {x ∈ Ω : ξn + τ(x − ξn) ∈ Ω ∀0 < τ ≤ 1} .
|
493 |
+
(15)
|
494 |
+
Modeling diffraction is substantially more complicated than modeling reflection. For this reason, before
|
495 |
+
we can describe how the remaining unknown quantities rn and ζn are defined, cf. (5), we need to introduce
|
496 |
+
several assumptions.
|
497 |
+
Assumption 4.1 (Separability). Diffracted waves are separable into radial-temporal and angular compo-
|
498 |
+
nents around the diffraction point ξn.
|
499 |
+
Otherwise stated, �un(x, t) can be expressed (at least locally) as
|
500 |
+
ψn(∥x − ξn∥ , t)ζn(x − ξn), where ζn is positive-homogeneous, i.e., ζn(z) is independent of ∥z∥ (as long
|
501 |
+
as z ̸= 0). Using an abuse of notation, we will express ζn as a function of φ only, with φ defined as the
|
502 |
+
angular coordinate around ξn. See Figs. 4 and 5.
|
503 |
+
This, together with the following assumption on the angular component ζn, will allow us to recover the
|
504 |
+
approximation structure presented in Section 2.
|
505 |
+
Assumption 4.2 (Piecewise-linear angular component). The angular component ζn is a piecewise-linear
|
506 |
+
function of the angular coordinate φ, with discontinuities at all reflection and shadow boundaries. Using the
|
507 |
+
geometrical optics approximation, we can explicitly compute the locations of such discontinuities:
|
508 |
+
• at concave corners (see, e.g., Fig. 4), φ1 = |π − θ| = max{π−θ, θ−π} and φ2 = 2π−α−|π − α − θ| =
|
509 |
+
min {θ + π, 3π − 2α − θ};
|
510 |
+
• at convex corners (see, e.g., Fig. 5), φ3 = π + θ − α.
|
511 |
+
Now we are ready to describe our full diffraction model, which satisfies Assumptions 4.1 and 4.2, as well
|
512 |
+
as the following three standard requirements.
|
513 |
+
8
|
514 |
+
|
515 |
+
D. Pradovera, M. Nonino, and I. Perugia
|
516 |
+
Geometry-based approximation of waves in complex domains
|
517 |
+
Assumption 4.3 (Characterization of diffracting vertices). A vertex ξn emits a diffraction wave in “re-
|
518 |
+
sponse” to �ui only if both following conditions are met:
|
519 |
+
• ξn is visible from ξi, i.e., ξn ∈ Ωi;
|
520 |
+
• one of the following is true:
|
521 |
+
– the domain Ω is locally concave near ξn, with ξi being located on the “concave side” of ξn, i.e.,
|
522 |
+
0 < α < π and 0 ≤ θ ≤ 2π − α in Fig. 4;
|
523 |
+
or
|
524 |
+
– the domain Ω is locally convex near ξn and a “shadow zone” is present, i.e., π < α < 2π and
|
525 |
+
π − α < θ < π in Fig. 5.
|
526 |
+
Assumption 4.4 (Continuity of the full approximation). The full wave approximation �u is continuous, in
|
527 |
+
particular across reflection and shadow boundaries.
|
528 |
+
Assumption 4.5 (Conservation of mass). Diffracted waves have zero “net mass”, i.e.,
|
529 |
+
�
|
530 |
+
R2 �un(x, t)dx = 0,
|
531 |
+
leading to mass conservation of the full wave approximation �u. (Note that we are stating mass conservation
|
532 |
+
in free space to ignore further reflections and diffractions of �un, which are also assumed to conserve mass.)
|
533 |
+
Spatial correction rn.
|
534 |
+
As in Algorithm 1, let i be the index of the term �ui that causes the diffraction
|
535 |
+
�un. With the objective of satisfying (5) and Assumption 4.4, we define the radial component ψn as
|
536 |
+
ψn(∥x − ξn∥ , t) = Ψ(∥x − ξn∥ + ∥ξn − ξi∥ + ri
|
537 |
+
�
|
538 |
+
��
|
539 |
+
�
|
540 |
+
=:rn
|
541 |
+
, t).
|
542 |
+
(16)
|
543 |
+
By direct inspection of this definition, we can see that, by our choice of rn, we are “aligning” the wavefronts
|
544 |
+
of the diffracted waves with the wavefronts of the reflected wave at the reflection boundaries (the shadow
|
545 |
+
boundary of the reflected waves, if any) and with the wavefronts of the incoming wave �ui at its shadow
|
546 |
+
boundary (if any). For instance, it is easy to see that, using (16), a point close to the diffraction point
|
547 |
+
(x ≈ ξn) is within the support of the diffracted wave �un only for t ≥ rn − R, i.e., only when the wave �ui has
|
548 |
+
crossed the distance from ξi to ξn.
|
549 |
+
Weight function ζn.
|
550 |
+
According to Assumption 4.2, we define the discontinuous piecewise-linear function
|
551 |
+
ζn : [0, 2π − α] → R as
|
552 |
+
ζn(φ) =
|
553 |
+
�
|
554 |
+
�
|
555 |
+
�
|
556 |
+
�
|
557 |
+
�
|
558 |
+
z1(φ1−φ)+z2φ
|
559 |
+
φ1
|
560 |
+
for 0 < φ < φ1 := |π − θ| ,
|
561 |
+
z3(φ2−φ)+z4(φ−φ1)
|
562 |
+
φ2−φ1
|
563 |
+
for φ1 < φ < φ2 := 2π − α − |π − α − θ| ,
|
564 |
+
z5(2π−α−φ)+z6(φ−φ2)
|
565 |
+
2π−α−φ2
|
566 |
+
for φ2 < φ < 2π − α,
|
567 |
+
(17)
|
568 |
+
for concave corners, and
|
569 |
+
ζn(φ) =
|
570 |
+
� z1(φ3−φ)+z7φ
|
571 |
+
φ3
|
572 |
+
for 0 < φ < φ3 := π + θ − α,
|
573 |
+
z8(2π−α−φ)+z6(φ−φ3)
|
574 |
+
2π−α−φ3
|
575 |
+
for φ3 < φ < 2π − α,
|
576 |
+
(18)
|
577 |
+
for convex corners. The scalars z1, . . . , z8 are nodal values of ζn: ζn(0) = z1, ζn(φ+
|
578 |
+
1 ) = z3 for concave corners,
|
579 |
+
ζn(φ−
|
580 |
+
3 ) = z7 for convex corners, etc. These values are chosen so as to satisfy:
|
581 |
+
• The boundary conditions at the edges ending at ξn, i.e., γ and γ′.
|
582 |
+
• Assumption 4.4 at the discontinuity angles φ1, φ2, and φ3. To this aim, we prescribe values for the
|
583 |
+
jumps (z3 − z2), (z5 − z4), and (z8 − z7).
|
584 |
+
• Assumption 4.5. Given the radial-angular decomposition of �un from Assumption 4.1, this is equivalent
|
585 |
+
to the condition
|
586 |
+
� 2π−α
|
587 |
+
0
|
588 |
+
ζn(φ)dφ = 0.
|
589 |
+
9
|
590 |
+
|
591 |
+
D. Pradovera, M. Nonino, and I. Perugia
|
592 |
+
Geometry-based approximation of waves in complex domains
|
593 |
+
+
|
594 |
+
=
|
595 |
+
+
|
596 |
+
=
|
597 |
+
Figure 6: Examples of diffraction at the concave (top) and convex (bottom) corners from Fig. 4 (right) and
|
598 |
+
Fig. 5. Neumann conditions are imposed on all edges. In each row of plots, we have: discontinuous wave
|
599 |
+
without diffraction (left), diffraction wave (middle), and continuous wave with diffraction (right). Note that,
|
600 |
+
in the convex case, we are not showing the wave �ui that causes the reflection off edge γ nor the reflection
|
601 |
+
and scattering of �ui off edge γ′.
|
602 |
+
In the case of a convex corner, this set of condition uniquely identifies the four degrees of freedom. See
|
603 |
+
Section 4.1 for the formulas and for their derivation.
|
604 |
+
However, in the case concave case, an additional
|
605 |
+
condition is required. In this work, we set this last condition as described in Section 4.2. We show in Fig. 6
|
606 |
+
the results obtained with our diffraction modeling in two simple illustrative cases.
|
607 |
+
Before proceeding further, we deem it important to make the following remark.
|
608 |
+
Remark 4.6. Our proposed strategy is able to deliver only a fairly crude approximation of diffraction effects.
|
609 |
+
(We refer to Section 5.1 for a validation of our model.) However, it has the great advantage of being extremely
|
610 |
+
simple to build and to evaluate. Thanks to the modularity of our approach, it would be surely possible to
|
611 |
+
replace our diffraction model with more sophisticated ones (e.g., removing Assumptions 4.1 and 4.2), in the
|
612 |
+
interest of achieving a better approximation of the exact solution. To this aim, we mention that a wide body
|
613 |
+
of works has been dedicated to the modeling of diffraction in the time-harmonic (Helmholtz) setting: among
|
614 |
+
others, we name the geometrical [20] and uniform [23] theories of diffraction. However, the authors have
|
615 |
+
not been able to find any satisfactory all-purpose time-domain diffraction modeling in the literature.
|
616 |
+
4.1
|
617 |
+
Convex diffraction coefficients
|
618 |
+
Consider the situation depicted in Fig. 5 and the notation introduced therein. Also, we rely on the quantities
|
619 |
+
ξn, rn, Ωn, and i introduced in Section 4. For diffraction to happen, cf. Assumption 4.3, �ui must be a wave
|
620 |
+
reflected off either edge γ or γ′. Indeed, a convex vertex ξn cannot be “hit” from outside the domain Ω by
|
621 |
+
the source wave �u1, nor by any wave reflected off a different edge, nor by any diffracted wave centered at
|
622 |
+
some vertex of ∂Ω.
|
623 |
+
For this reason, the shadow boundary {φ = φ3} must belong to ∂Ωi (the boundary of the light cone Ωi),
|
624 |
+
at least locally around ξn. Without loss of generality, we assume that �ui is a wave reflected off edge γ, so
|
625 |
+
that Ωi consists (locally) of point whose angular coordinate is 0 < φ < φ3. This means that φ3 < φ < 2π −α
|
626 |
+
is a shadow zone. The alternative case (of reflection off edge γ′) can be obtained by symmetry.
|
627 |
+
Let σγ = 0 if γ is a Dirichlet edge and σγ = 1 if it is a Neumann edge. Define σγ′ similarly for edge γ′.
|
628 |
+
To satisfy the conditions described in Section 4, the quantities z1, z7, z8, z6 appearing in the angular weight
|
629 |
+
ζn, cf. (18), must satisfy the conditions:
|
630 |
+
• Boundary condition at γ: z1 = σγz7.
|
631 |
+
• Boundary condition at γ′: z6 = σγ′z8.
|
632 |
+
• For �u to be continuous at φ = φ3, there must be a jump to account for the fact that �ui is nonzero for
|
633 |
+
φ → φ−
|
634 |
+
3 but zero for φ → φ+
|
635 |
+
3 : given the angular component of �ui at the shadow boundary, namely,
|
636 |
+
10
|
637 |
+
|
638 |
+
D. Pradovera, M. Nonino, and I. Perugia
|
639 |
+
Geometry-based approximation of waves in complex domains
|
640 |
+
hi := ζi(ξn − ξi), we impose z8 − z7 = hi.
|
641 |
+
• Conservation of mass: for all t > 0,
|
642 |
+
0 =
|
643 |
+
�
|
644 |
+
R2 �un(x, t)dx =
|
645 |
+
� ∞
|
646 |
+
0
|
647 |
+
� 2π−α
|
648 |
+
0
|
649 |
+
ψn(ρ, t)ζn(φ)ρdφdρ
|
650 |
+
=
|
651 |
+
�� 2π−α
|
652 |
+
0
|
653 |
+
ζn(φ)dφ
|
654 |
+
� �� ∞
|
655 |
+
0
|
656 |
+
ψn(ρ, t)ρdρ
|
657 |
+
�
|
658 |
+
=
|
659 |
+
�z1 + z7
|
660 |
+
2
|
661 |
+
φ3 + z8 + z6
|
662 |
+
2
|
663 |
+
(2π − α − φ3)
|
664 |
+
� �� ∞
|
665 |
+
0
|
666 |
+
ψn(ρ, t)ρdρ
|
667 |
+
�
|
668 |
+
,
|
669 |
+
which leads to the condition z1+z7
|
670 |
+
2
|
671 |
+
φ3 + z8+z6
|
672 |
+
2
|
673 |
+
(2π − α − φ3) = 0.
|
674 |
+
With simple algebra, we now obtain
|
675 |
+
z7 =
|
676 |
+
(σγ′ + 1)hi(φ3 + α − 2π)
|
677 |
+
(σγ′ + 1)(2π − α) + (σγ − σγ′)φ3
|
678 |
+
,
|
679 |
+
z8 =
|
680 |
+
(σγ + 1)hiφ3
|
681 |
+
(σγ′ + 1)(2π − α) + (σγ − σγ′)φ3
|
682 |
+
,
|
683 |
+
(19)
|
684 |
+
as well as z1 = σγz7 and z6 = σγ′z8. See Fig. 6 (bottom) for an example of the resulting diffraction wave.
|
685 |
+
4.2
|
686 |
+
Concave diffraction coefficients
|
687 |
+
Consider the setup depicted in Fig. 4 and the notation introduced therein. Also, we rely on the quantities
|
688 |
+
ξn, rn, Ωn, and i introduced in Section 4. Let σγ = 0 if γ is a Dirichlet edge and σγ = 1 if it is a Neumann
|
689 |
+
edge. Define σγ′ similarly for edge γ′. Without loss of generality, we assume that 0 < θ ≤ π − α
|
690 |
+
2 , since the
|
691 |
+
other case can be easily obtained by symmetry. In this setting, γ is in the light cone of �ui (at least locally
|
692 |
+
around ξn). Accordingly, let �ui′ be the wave component obtained by reflection of �ui off edge γ.
|
693 |
+
If 0 < θ ≤ π − α, γ′ is not in the light cone of �ui, so that:
|
694 |
+
• for 0 < φ < φ1 = π − θ, both �ui and �ui′ are present;
|
695 |
+
• for φ1 < φ < φ2 = π + θ, only �ui is present, since the light cone Ωi′ ends at {φ = φ1};
|
696 |
+
• for φ2 < φ < 2π − α, neither �ui nor �ui′ is present, i.e., we have a shadow zone, since the light cone Ωi
|
697 |
+
ends at {φ = φ2}.
|
698 |
+
Otherwise, assume that π − α < θ ≤ π − α
|
699 |
+
2 . In this case, γ′ is also in the light cone of �ui (at least locally
|
700 |
+
around ξn). We denote the wave component obtained by reflection of �ui off edge γ′ by �ui′′. Then:
|
701 |
+
• for 0 < φ < φ1 = π − θ, both �ui and �ui′ are present;
|
702 |
+
• for φ1 < φ < φ2 = 3π − 2α − θ, only �ui is present, since the light cones Ωi′ and Ωi′′ end at {φ = φ1}
|
703 |
+
and at {φ = φ2}, respectively;
|
704 |
+
• for φ2 < φ < 2π − α, both �ui and �ui′′ are present.
|
705 |
+
To satisfy the conditions described in Section 4, the quantities z1, . . . , z6 appearing in the angular weight
|
706 |
+
ζn, cf. (17), must satisfy the conditions:
|
707 |
+
• Boundary condition at γ: z1 = σγz2.
|
708 |
+
• Boundary condition at γ′: z6 = σγ′z5.
|
709 |
+
• For �u to be continuous at φ = φ1, there must be a jump whose height is the angular component of �ui′
|
710 |
+
at φ = φ1, i.e., hi′ := ζi′(ξn −ξi′); we impose z3 −z2 = hi′. Note that, by the law of reflection, cf. (11),
|
711 |
+
hi′ = τhi, with τ = 2σγ − 1 and hi := ζi(ξn − ξi).
|
712 |
+
• For �u to be continuous at φ = φ2, there must be a jump whose height depends on whether θ ≤ π − α
|
713 |
+
or not:
|
714 |
+
11
|
715 |
+
|
716 |
+
D. Pradovera, M. Nonino, and I. Perugia
|
717 |
+
Geometry-based approximation of waves in complex domains
|
718 |
+
– If 0 < θ ≤ π − α, the jump equals the angular component of �ui at φ = φ2, i.e., hi := ζi(ξn − ξi);
|
719 |
+
we impose z5 − z4 = hi.
|
720 |
+
– If π − α < θ ≤ π − α
|
721 |
+
2 , the jump equals minus the angular component of �ui′′ at φ = φ2, i.e.,
|
722 |
+
hi′′ := ζi′′(ξn − ξi′′); we impose z5 − z4 = −hi′′. Note that, by the law of reflection, cf. (11),
|
723 |
+
hi′′ = (2σγ′ − 1)hi, with hi := ζi(ξn − ξi).
|
724 |
+
In summary, z5 − z4 = τ ′hi, with τ ′ = 1 if 0 < θ ≤ π − α and τ ′ = 1 − 2σγ′ if π − α < θ ≤ π − α
|
725 |
+
2 .
|
726 |
+
• Conservation of mass: for all t > 0,
|
727 |
+
0 =
|
728 |
+
�
|
729 |
+
R2 �un(x, t)dx =
|
730 |
+
� ∞
|
731 |
+
0
|
732 |
+
� 2π−α
|
733 |
+
0
|
734 |
+
ψn(ρ, t)ζn(φ)ρdφdρ
|
735 |
+
=
|
736 |
+
�� 2π−α
|
737 |
+
0
|
738 |
+
ζn(φ)dφ
|
739 |
+
� �� ∞
|
740 |
+
0
|
741 |
+
ψn(ρ, t)ρdρ
|
742 |
+
�
|
743 |
+
�
|
744 |
+
��
|
745 |
+
�
|
746 |
+
=:C(t)
|
747 |
+
=
|
748 |
+
�z1 + z2
|
749 |
+
2
|
750 |
+
φ1 + z3 + z4
|
751 |
+
2
|
752 |
+
(φ2 − φ1) + z5 + z6
|
753 |
+
2
|
754 |
+
(2π − α − φ2)
|
755 |
+
�
|
756 |
+
C(t),
|
757 |
+
which leads to the condition z1+z2
|
758 |
+
2
|
759 |
+
φ1 + z3+z4
|
760 |
+
2
|
761 |
+
(φ2 − φ1) + z5+z6
|
762 |
+
2
|
763 |
+
(2π − α − φ2) = 0.
|
764 |
+
One constraint is missing for the values z1, . . . , z6 to be uniquely determined. Specifically, some simple
|
765 |
+
algebra shows that, for any δ ∈ R, the following set of values satisfies all the above conditions:
|
766 |
+
z2 =
|
767 |
+
τhi + δ
|
768 |
+
(σγφ1 + φ2)/(φ1 − φ2),
|
769 |
+
z5 =
|
770 |
+
τ ′hi + δ
|
771 |
+
(φ1 + σγ′φ2 − (σγ′ + 1)(2π − α))/(φ1 − φ2),
|
772 |
+
(20)
|
773 |
+
together with z1 = σγz2, z3 = z2 + τhi, z4 = z5 − τ ′hi, and z6 = σγ′z5. Note that the jump heights τhi and
|
774 |
+
τ ′hi appear in the numerators of z2 and z5, respectively.
|
775 |
+
Our diffraction model is simply the one given by δ = 0. Intuitively, this corresponds to a “balanced”
|
776 |
+
partitioning of the mass of the diffracted wave into the components related to the two (reflection and/or
|
777 |
+
shadow) boundaries φ1 and φ2. See Fig. 6 (top) for an example of the resulting diffraction wave.
|
778 |
+
To further highlight the (mostly beneficial) effects of the choice δ = 0, we note that:
|
779 |
+
• in the symmetric case θ = π − α
|
780 |
+
2 , δ = 0 leads to a symmetric ζn: (1 − 2σγ′)z2 = (1 − 2σγ)z5;
|
781 |
+
• in the case θ = π − α, the second transition happens at γ′, i.e., φ2 = 2π − α, and the choice δ = 0
|
782 |
+
yields z4 = 0, so that the diffraction wave vanishes at γ′ (which is physically sound);
|
783 |
+
• in the “grazing incidence” case θ = 0, the two transition coalesce into one, i.e., φ1 = φ2, and the choice
|
784 |
+
δ = 0 leads to ζn(φ) = 0 for all φ, which is unphysical; see the following remark for a possible solution.
|
785 |
+
Remark 4.7. In the “grazing incidence” case θ = 0 (which corresponds to φ1 = φ2 = π), the diffraction
|
786 |
+
wave �un does not cure the discontinuity of �u at the boundary {φ = π}. This is because, in some sense, the
|
787 |
+
two discontinuities of �un at φ1 and φ2 cancel each other out. For a similar reason, a small θ ≈ 0 will result
|
788 |
+
in a continuous total wave, but a sharp gradient will be present for φ1 < φ < φ2.
|
789 |
+
By tweaking the value of δ, we can obtain an alternative diffraction model, which guarantees Assump-
|
790 |
+
tion 4.4 even in the case of grazing incidence. To this aim, we can set
|
791 |
+
δ =
|
792 |
+
�
|
793 |
+
(σγ + 1) σγφ1 + φ2 − (σγ′ + 1)(2π − α)
|
794 |
+
(σγ − σγ′)φ1 + (σγ′ + 1)(2π − α)φ1τ+
|
795 |
+
+(σγ′ + 1)
|
796 |
+
φ1 + σγφ2
|
797 |
+
(σγ − σγ′)φ2 + (σγ′ + 1)(2π − α)(φ2 − 2π + α)τ ′
|
798 |
+
�
|
799 |
+
hi
|
800 |
+
φ1 − φ2
|
801 |
+
.
|
802 |
+
(21)
|
803 |
+
Roughly speaking, this corresponds to a different “balancing” of the mass of the diffracted wave into the
|
804 |
+
components related to the two boundaries φ1 and φ2.
|
805 |
+
This being said, in our numerical tests, such alternative model, albeit recovering a continuous total wave,
|
806 |
+
resulted in a reduced accuracy of approximation. Specifically, using the value of δ above, we have observed
|
807 |
+
an exaggerated magnitude of the diffraction wave, especially in the shadow zone.
|
808 |
+
12
|
809 |
+
|
810 |
+
D. Pradovera, M. Nonino, and I. Perugia
|
811 |
+
Geometry-based approximation of waves in complex domains
|
812 |
+
Example
|
813 |
+
exterior
|
814 |
+
incidence
|
815 |
+
∥�u(·, T)∥L2(Ω)
|
816 |
+
∥�u(·, T) − uFEM(·, T)∥L2(Ω)
|
817 |
+
index
|
818 |
+
angle α
|
819 |
+
angle ω
|
820 |
+
#1
|
821 |
+
4.712
|
822 |
+
0.984
|
823 |
+
2.50 · 10−1
|
824 |
+
3.65 · 10−4
|
825 |
+
#2
|
826 |
+
5.093
|
827 |
+
0.603
|
828 |
+
2.02 · 10−3
|
829 |
+
#3
|
830 |
+
2.761
|
831 |
+
1.363
|
832 |
+
1.05 · 10−2
|
833 |
+
#4
|
834 |
+
2.761
|
835 |
+
3.277
|
836 |
+
2.00 · 10−2
|
837 |
+
Table 1: Setup for the four wedge examples. The angle ω is as in Fig. 7.
|
838 |
+
ω
|
839 |
+
ω
|
840 |
+
ω
|
841 |
+
ω
|
842 |
+
−1
|
843 |
+
0
|
844 |
+
1
|
845 |
+
Figure 7: Initial conditions for the wedge examples, indexed #1 through #4 from left to right. The (dashed)
|
846 |
+
distance between the center of the Gaussian and the boundary vertex is 4 units in all cases.
|
847 |
+
5
|
848 |
+
Numerical results
|
849 |
+
In our experiments, we require a “reference” solution of (1) to validate our results. To this effect, we use the
|
850 |
+
solution uFEM obtained by discretizing (1) with:
|
851 |
+
• the P1-finite element method (P1-FEM) with mass-lumping, over a regular triangulation (mesh) of the
|
852 |
+
physical domain Ω;
|
853 |
+
• explicit leapfrog timestepping with a uniform time step that satisfies the CFL condition on the chosen
|
854 |
+
mesh.
|
855 |
+
See [11, 16] for more details on this discretization strategy.
|
856 |
+
If the domain Ω is unbounded, we first need to truncate it in such a way that reflections from the non-
|
857 |
+
physical truncation boundary do not affect the solution in the region of interest for t < T. Recalling that
|
858 |
+
the problem data are supported in a ball of radius R and center 0, this can be done, e.g., by truncating Ω
|
859 |
+
at the sphere with radius R + T and center 0. In our tests, we rely on FEniCS [1] to carry out the P1-FEM
|
860 |
+
discretization on 2-dimensional domains Ω.
|
861 |
+
Instead, note that with our proposed approach, modeling unbounded domains is straightforward. Indeed,
|
862 |
+
we can simply ignore any reflection or diffraction from its “infinitely far” vertices/edges.
|
863 |
+
All our tests are performed in Python 3.8 on a machine with an 8-core 3.60 GHz Intel® processor
|
864 |
+
and 64 GB of RAM. For reproducibility, our code is made available at https://github.com/pradovera/
|
865 |
+
ray-wave-2d.
|
866 |
+
5.1
|
867 |
+
Some simple wedges
|
868 |
+
As a way to assess our proposed method in simple settings, we consider four different “wedge” domains.
|
869 |
+
Similarly to the diagrams in Figs. 4 and 5, we define Ω to be one of the portions of the plane R2 delimited by
|
870 |
+
straight lines intersecting at a point. Locally around such point, Ω “looks” like either Fig. 4 or Fig. 5, with
|
871 |
+
α being the outer angle. The specific choices of wedge angles α are reported in Table 1 for the four cases.
|
872 |
+
We set up a problem of the form (1), with u0 an isotropic Gaussian with standard deviation 0.2. The
|
873 |
+
center of u0 is at a point located at a 4-unit distance from the wedge vertex, in the direction determined by
|
874 |
+
the “incidence angle” ω. See Fig. 7 for a representation of the initial conditions in the four cases. We set
|
875 |
+
u1 = f = 0, we enforce Neumann boundary conditions on the whole ∂Ω, and we seek the solution at the
|
876 |
+
final time T = 5, i.e., 1 time unit after the wave crest has reached the wedge vertex.
|
877 |
+
13
|
878 |
+
|
879 |
+
D. Pradovera, M. Nonino, and I. Perugia
|
880 |
+
Geometry-based approximation of waves in complex domains
|
881 |
+
0
|
882 |
+
1
|
883 |
+
2
|
884 |
+
3
|
885 |
+
4
|
886 |
+
5
|
887 |
+
0
|
888 |
+
2
|
889 |
+
4
|
890 |
+
6
|
891 |
+
t
|
892 |
+
ρ
|
893 |
+
−1
|
894 |
+
−0.5
|
895 |
+
0
|
896 |
+
0.5
|
897 |
+
1
|
898 |
+
Figure 8: Free-space solution Ψ. The dashed line denotes the upper bound of the “causality cone” of Ψ, i.e.,
|
899 |
+
ρ = t + R, with R = 1.
|
900 |
+
�u
|
901 |
+
uFEM
|
902 |
+
�u − uFEM
|
903 |
+
Example #1
|
904 |
+
Example #2
|
905 |
+
Example #3
|
906 |
+
Example #4
|
907 |
+
−0.1
|
908 |
+
0
|
909 |
+
0.1
|
910 |
+
−2 · 10−4
|
911 |
+
0
|
912 |
+
2 · 10−4
|
913 |
+
−0.1
|
914 |
+
0
|
915 |
+
0.1
|
916 |
+
−5 · 10−3
|
917 |
+
0
|
918 |
+
5 · 10−3
|
919 |
+
−0.1
|
920 |
+
0
|
921 |
+
0.1
|
922 |
+
−1 · 10−2
|
923 |
+
0
|
924 |
+
1 · 10−2
|
925 |
+
−0.1
|
926 |
+
0
|
927 |
+
0.1
|
928 |
+
−5 · 10−2
|
929 |
+
0
|
930 |
+
5 · 10−2
|
931 |
+
Figure 9: Results for the four wedge examples. Each row pertains to a different example. In each row, from
|
932 |
+
left to right: surrogate solution, FE solution, and error. The color scales for the first two columns are the
|
933 |
+
same. All results are shown at the final time t = T.
|
934 |
+
14
|
935 |
+
|
936 |
+
AD. Pradovera, M. Nonino, and I. Perugia
|
937 |
+
Geometry-based approximation of waves in complex domains
|
938 |
+
To this aim, we employ our proposed approach, see Section 2. First, we compute an approximation of
|
939 |
+
the free-space solution Ψ, which solves (4), by employing P1-FEM with explicit leapfrog timestepping. Note
|
940 |
+
that, since (4) is cast in polar coordinates, we only need to discretize a 1D interval with P1-FEM. Since the
|
941 |
+
initial condition u0 is supported within the unit disk, we have R = 1, and it suffices to approximate Ψ(ρ, t)
|
942 |
+
for (ρ, t) ∈ [0, T + R] × [0, T]. Since this space-time domain is only 2-dimensional, we can afford even a very
|
943 |
+
fine discretization. In our experiments, we employ a 1001 × 2001 uniform Cartesian space-time grid, i.e.,
|
944 |
+
the mesh size is δx = T +R
|
945 |
+
1000 and the time step is δt =
|
946 |
+
T
|
947 |
+
2000. This satisfies the CFL condition. We show the
|
948 |
+
resulting Ψ (which, in fact, we should denote by ΨFEM) in Fig. 8.
|
949 |
+
After this preliminary step, we use the timetable-based strategy from Section 2 to identify reflection
|
950 |
+
and scattering effects, which are then added up to give the final approximation �u. We show the resulting
|
951 |
+
�u(·, T) in Fig. 9. In this figure, we also display a reference solution uFEM(·, T), which we obtain by direct
|
952 |
+
discretization of (1) by P1-FEM and leapfrog timestepping, as described at the beginning of Section 5.
|
953 |
+
In all four examples, we see that �u and the reference uFEM seem qualitatively close. Notably, we can
|
954 |
+
observe a good representation of the most prominent wavefronts, which are due to propagation of either the
|
955 |
+
main “free-space” wave or to its reflections. Indeed, those wave contributions are reconstructed exactly: the
|
956 |
+
only errors are the ones due to FE approximation and timestepping, which affect both uFEM and �u (the
|
957 |
+
latter through the approximation of Ψ). Instead, some differences are present when comparing diffraction
|
958 |
+
effects, which arise as circular waves about the wedge vertex. We can quantitatively observe this in the last
|
959 |
+
column of both Table 1 and Fig. 9.
|
960 |
+
In example #1, we observe a very small error, which, in fact, is simply the (FEM and timestepping)
|
961 |
+
discretization error. This is related to the fact that the wedge has exterior angle α =
|
962 |
+
3
|
963 |
+
2π, which makes
|
964 |
+
diffraction unnecessary in approximating the wave u: reflections are enough2.
|
965 |
+
In the other examples, diffraction effects are necessary to correctly identify u. While a good qualitative
|
966 |
+
behavior can be observed in Fig. 9, we can see in Table 1 that a modest error is present. Specifically, we
|
967 |
+
report the L2(Ω)-norm of �u and of the error �u − uFEM at the final time t = T, defined as
|
968 |
+
∥v∥L2(Ω) =
|
969 |
+
��
|
970 |
+
Ω
|
971 |
+
v(x)2dx
|
972 |
+
�1/2
|
973 |
+
.
|
974 |
+
(22)
|
975 |
+
We see the largest error in example #4, where the relative L2(Ω)-approximation error amounts to 8%.
|
976 |
+
This was to be expected, since this last example is rather close to the setting of grazing incidence (α+ω ≈ 2π),
|
977 |
+
which, as discussed in Section 4.2, is approximated rather poorly by our diffraction model. Qualitatively,
|
978 |
+
the bad approximation quality is apparent in the form of a rather sharp gradient in the corresponding plot
|
979 |
+
of �u in Fig. 9 (bottom left).
|
980 |
+
5.1.1
|
981 |
+
Building a cavity out of wedges
|
982 |
+
As a slightly more complicated example, we now combine the four wedges from the previous section to obtain
|
983 |
+
the open cavity represented in Fig. 10. In this case, more reflection and diffraction effects will arise, due
|
984 |
+
to the trapping nature of the domain. Our initial conditions and forcing term are the same as before, but
|
985 |
+
now all edges are sound-soft. Accordingly, we model them using Dirichlet boundary conditions. The time
|
986 |
+
horizon is T = 9.
|
987 |
+
Using our strategy from Section 2, we build the approximation �u, which contains 47 wave terms (1 source
|
988 |
+
wave, 32 reflected waves, and 14 diffraction waves). We compare the approximation �u with the reference
|
989 |
+
solution uFEM, obtained as described at the beginning of Section 5.
|
990 |
+
We show the results of the comparison in Fig. 10, at 4 time instants t ∈ {0, 3, 6, 9}. Once more, we see
|
991 |
+
a good qualitative agreement between �u and uFEM, with the most important features of u being identified
|
992 |
+
well.
|
993 |
+
Up to t = 3, only reflections have happened, so that the error �u − uFEM consists only of FEM
|
994 |
+
and timestepping errors. On the other hand, for larger times, we see “error waves” of small-to-moderate
|
995 |
+
amplitude propagating from the 3 vertices of Ω that generate diffraction effects. These correspond to errors
|
996 |
+
in diffraction modeling.
|
997 |
+
2To intuitively understand why, let γ1 and γ2 be the two sides forming ∂Ω. The domain Ω is partitioned exactly into (i)
|
998 |
+
the light cone of the reflection off γ1 and then off γ2 and (ii) the light cone of the reflection off γ2 and then off γ1. For this
|
999 |
+
reason, the diffraction effects due to these two rays cancel out. Incidentally, the same phenomenon can be expected whenever
|
1000 |
+
the interior angle 2π ��� α is of the form π
|
1001 |
+
n , with n ∈ {2, 3, . . .}.
|
1002 |
+
15
|
1003 |
+
|
1004 |
+
D. Pradovera, M. Nonino, and I. Perugia
|
1005 |
+
Geometry-based approximation of waves in complex domains
|
1006 |
+
�u
|
1007 |
+
uFEM
|
1008 |
+
�u − uFEM
|
1009 |
+
t = 0
|
1010 |
+
t = 3
|
1011 |
+
t = 6
|
1012 |
+
t = 9
|
1013 |
+
−1
|
1014 |
+
−0.5
|
1015 |
+
0
|
1016 |
+
0.5
|
1017 |
+
1
|
1018 |
+
−0.1
|
1019 |
+
0
|
1020 |
+
0.1
|
1021 |
+
−5
|
1022 |
+
0
|
1023 |
+
5
|
1024 |
+
·10−4
|
1025 |
+
−0.1
|
1026 |
+
0
|
1027 |
+
0.1
|
1028 |
+
−5
|
1029 |
+
0
|
1030 |
+
5
|
1031 |
+
·10−2
|
1032 |
+
−0.1
|
1033 |
+
0
|
1034 |
+
0.1
|
1035 |
+
−5
|
1036 |
+
0
|
1037 |
+
5
|
1038 |
+
·10−2
|
1039 |
+
Figure 10: Results for the cavity domain. Each row corresponds to a different time instant t ∈ {0, 3, 6, 9},
|
1040 |
+
from top to bottom. In each row, from left to right: surrogate solution �u(·, t), FE solution uFEM(·, t), and
|
1041 |
+
error �u(·, t) − uFEM(·, t). The color scales for the first two columns are the same.
|
1042 |
+
16
|
1043 |
+
|
1044 |
+
D. Pradovera, M. Nonino, and I. Perugia
|
1045 |
+
Geometry-based approximation of waves in complex domains
|
1046 |
+
5.2
|
1047 |
+
A tall room
|
1048 |
+
We consider a simplified sound propagation problem in a room. For simplicity, we consider a 2-dimensional
|
1049 |
+
problem, thus assuming an infinitely tall room, and modeling line sources (in the z-direction) as point sources.
|
1050 |
+
The complicated domain Ω ⊂ R2 is depicted in Fig. 11. It is composed of two communicating “rooms”
|
1051 |
+
with sound-hard walls, as well as of a third large room (above), which is modeled as infinitely large. In the
|
1052 |
+
main room, three sound-soft triangular obstacles are also present.
|
1053 |
+
Setting once more u1 = f = 0, we are interested in modeling the propagation of an initial condition
|
1054 |
+
u0 modeled as a Ricker wavelet centered at 0, see Fig. 11 (top left), over the time horizon t ∈ [0, T], with
|
1055 |
+
T = 20. To this aim, we employ our proposed method from Section 2.
|
1056 |
+
As in the previous example, we start by computing an approximation of the free-space solution Ψ = Ψ(ρ, t)
|
1057 |
+
for (ρ, t) ∈ [0, T + R] × [0, T], see (4), with R being the radius of the support of the initial condition u0.
|
1058 |
+
Again, we use P1-FEM with leapfrog timestepping for this.
|
1059 |
+
Since many reflective surfaces face each other, the domain Ω is trapping. Accordingly, we expect the
|
1060 |
+
number N of waves in the approximation �u to be rather large. In the interest of reducing the number of
|
1061 |
+
such terms, we can employ the on-the-fly parsimonious strategy described in Remark 2.2, removing all wave
|
1062 |
+
terms �un whose magnitude is smaller than tol = 10−2. After this, N ≈ 1.4 · 103 terms are left. Although
|
1063 |
+
this value of N may seem large, the evaluation of the corresponding surrogate �u is rather quick, due to the
|
1064 |
+
explicit nature of each wave contribution (and to the fact that their supports are smaller than the whole Ω).
|
1065 |
+
We show the resulting u(·, t) for the four times t ∈ {0, 7.5, 15, 20} in Fig. 11. There, we can see why so
|
1066 |
+
many terms are necessary for the approximation of u: we must model many reflection and diffraction effects.
|
1067 |
+
Since energy escapes the system only through the top “door”, the wave will persist for quite a long time.
|
1068 |
+
Accordingly, a larger T will make a larger N necessary.
|
1069 |
+
In order to better inspect this effect, we show the trace of the solution at the arbitrarily chosen point
|
1070 |
+
xtrace = (−1, −2) in Fig. 12. We notice that oscillations persist for t > 10. We use this last plot also to
|
1071 |
+
validate our results. To this aim, we compare three results:
|
1072 |
+
• The surrogate �u obtained as described above, with tol = 10−2.
|
1073 |
+
• The surrogate �u obtained with our strategy, but with tol = 10−3. This leads to an increased number
|
1074 |
+
of rays N ≈ 7.3 · 103.
|
1075 |
+
• The reference solution uFEM obtained by the P1-FEM with leapfrog timestepping, as described at the
|
1076 |
+
beginning of Section 5. The mesh size must be chosen small enough to resolve both the initial condition
|
1077 |
+
and the domain Ω well. In our case, we have a mesh with approximately 1.4 · 106 elements. To satisfy
|
1078 |
+
the CFL condition on this mesh, we choose a time step ∆t ≈ 7 · 10−3.
|
1079 |
+
We can observe that the two surrogates obtained with our approach give very similar results. Indeed,
|
1080 |
+
the cutoff tolerance tol affects the results only for large t > 15, due to the accumulation of “small” waves
|
1081 |
+
that are excluded from the coarser surrogate but included in the finer one.
|
1082 |
+
Moreover, taking the FE solution as reference, we see that most of the peaks of the surrogates are
|
1083 |
+
aligned with the FE ones (i.e., the “phase” of the wave is well approximated), but there are some noticeable
|
1084 |
+
discrepancies in their amplitudes. This is due to the fact that, in our approach, reflection is modeled exactly,
|
1085 |
+
whereas the magnitudes of the diffraction waves are only roughly approximated. For this reason, we should
|
1086 |
+
not expect the amplitude error to get smaller if we reduce tol.
|
1087 |
+
The only “real” way of improving the
|
1088 |
+
approximation is using a better diffraction modeling.
|
1089 |
+
As a final result, we also report:
|
1090 |
+
• The so-called “offline” time, i.e., the time required to compute the numerical solution. For �u, this
|
1091 |
+
means executing Algorithm 1. For uFEM, this means building the mesh, assembling the FE stiffness
|
1092 |
+
and (lumped) mass matrices, and carrying out the timestepping.
|
1093 |
+
• The so-called “online” time, i.e., the time required to evaluate the numerical solution (�u or uFEM) at
|
1094 |
+
a single (x, t)-point.
|
1095 |
+
They can be found in Table 2.
|
1096 |
+
17
|
1097 |
+
|
1098 |
+
D. Pradovera, M. Nonino, and I. Perugia
|
1099 |
+
Geometry-based approximation of waves in complex domains
|
1100 |
+
−1
|
1101 |
+
0
|
1102 |
+
1
|
1103 |
+
t = 0
|
1104 |
+
−0.1
|
1105 |
+
0
|
1106 |
+
0.1
|
1107 |
+
t = 7.5
|
1108 |
+
−0.1
|
1109 |
+
0
|
1110 |
+
0.1
|
1111 |
+
t = 15
|
1112 |
+
−0.1
|
1113 |
+
0
|
1114 |
+
0.1
|
1115 |
+
t = 20
|
1116 |
+
Figure 11: 2-dimensional domain Ω modeling a room. Top left plot: initial condition �u(·, 0) = u(·, 0) = u0,
|
1117 |
+
a Ricker wavelet; we also show the point xtrace as a cross. Top right plot: intermediate solution �u(·, 7.5).
|
1118 |
+
Bottom left plot: intermediate solution �u(·, 15). Bottom right plot: final solution �u(·, 20).
|
1119 |
+
0
|
1120 |
+
2
|
1121 |
+
4
|
1122 |
+
6
|
1123 |
+
8
|
1124 |
+
10
|
1125 |
+
12
|
1126 |
+
14
|
1127 |
+
16
|
1128 |
+
18
|
1129 |
+
20
|
1130 |
+
−0.1
|
1131 |
+
0
|
1132 |
+
0.1
|
1133 |
+
t
|
1134 |
+
u(xtrace, t)
|
1135 |
+
�u (tol = 10−2)
|
1136 |
+
�u (tol = 10−3)
|
1137 |
+
uFEM
|
1138 |
+
Figure 12: Value of solution at point xtrace = (−1, −2).
|
1139 |
+
Method
|
1140 |
+
�u (tol = 10−2)
|
1141 |
+
�u (tol = 10−3)
|
1142 |
+
uFEM
|
1143 |
+
Offline
|
1144 |
+
46.66 [s]
|
1145 |
+
252.9 [s]
|
1146 |
+
188.9 [s]
|
1147 |
+
Online
|
1148 |
+
2.04 [ms]
|
1149 |
+
8.48 [ms]
|
1150 |
+
27.67 [µs]
|
1151 |
+
Table 2: Timings for the room test case. To obtain more statistically significant results, each displayed time
|
1152 |
+
is the average over 3 (resp. 103) runs of the offline (resp. online) phase with identical parameters.
|
1153 |
+
18
|
1154 |
+
|
1155 |
+
D. Pradovera, M. Nonino, and I. Perugia
|
1156 |
+
Geometry-based approximation of waves in complex domains
|
1157 |
+
We can observe the increased training and evaluation time that results from decreasing tol. Moreover, we
|
1158 |
+
see that, in this example, our proposed approach is more competitive offline, but less so online. Somewhat
|
1159 |
+
surprisingly, we have observed that the most expensive step in evaluating �u (taking about half of the online
|
1160 |
+
time) is determining whether an evaluation point is in the light cones Ωn. The reason for this is that they
|
1161 |
+
can have rather complicated shapes, cf. Section 3.
|
1162 |
+
Evaluating the FE solution at a space-time point is an extremely cheap operation (essentially corre-
|
1163 |
+
sponding to a vector dot product) while evaluating �u is more expensive, requiring the evaluation of O(N)
|
1164 |
+
nonlinear functions. However, the FE solution comes with the serious drawback of memory usage. Indeed, in
|
1165 |
+
our example, storing uFEM as a (∼ 1.5 · 106) × (∼ 2.9 · 103) array of double-precision floating-point numbers
|
1166 |
+
requires approximately 34 GB.
|
1167 |
+
Concerning the timing results, we also wish to mention that the online times in Table 2 should be
|
1168 |
+
interpreted carefully. Indeed, the online time for the FE solution is artificially deflated by the fact that
|
1169 |
+
xtrace is a vertex of the FE mesh: each evaluation of uFEM corresponds to extracting a vector entry. If xtrace
|
1170 |
+
had not been a vertex of the mesh, the online time could have been larger by at least one order of magnitude,
|
1171 |
+
if not more, depending on the FE implementation. Moreover, we note that accessing point-evaluations of
|
1172 |
+
uFEM at arbitrary times a posteriori, namely, after the timestepping has been carried out, is feasible only if
|
1173 |
+
enough memory is available to store the whole “timestepping history”. Considering the numbers mentioned
|
1174 |
+
in the previous paragraph, this might not be possible in practice, especially for more complex and/or larger
|
1175 |
+
domains.
|
1176 |
+
5.2.1
|
1177 |
+
A time-harmonic source
|
1178 |
+
One of the advantages of our approach is that it allows changing the source terms of the problem in a
|
1179 |
+
seamless way. Notably, under minor technical constraints (e.g., the support of the new source term should
|
1180 |
+
not be larger than the old one), this kind of change does not require training a new surrogate.
|
1181 |
+
To showcase this, we approximate the wave propagating from a time-harmonic point source at x = 0
|
1182 |
+
with angular frequency ω > 0. In our tests, we pick ω ∈ {2π, 10π}. To this aim, we define u as the solution
|
1183 |
+
of the following (ω-dependent) problem:
|
1184 |
+
�
|
1185 |
+
�
|
1186 |
+
�
|
1187 |
+
�
|
1188 |
+
�
|
1189 |
+
�
|
1190 |
+
�
|
1191 |
+
�
|
1192 |
+
�
|
1193 |
+
∂ttu(x, t) = ∆u(x, t) − ω2 sin(ωt)δ0(x)
|
1194 |
+
for (x, t) ∈ Ω × (0, T),
|
1195 |
+
u(x, 0) = 0
|
1196 |
+
for x ∈ Ω,
|
1197 |
+
∂tu(x, 0) = 0
|
1198 |
+
for x ∈ Ω,
|
1199 |
+
∂νu(x, t) = 0
|
1200 |
+
for (x, t) ∈ ∂Ω × (0, T],
|
1201 |
+
(23)
|
1202 |
+
where δ0 denotes the usual 2-dimensional “delta function” centered at x = 0.
|
1203 |
+
As usual, we define Ψ = Ψ(ρ, t) as the (ω-dependent) solution of the free-space version of (23) in radial-
|
1204 |
+
temporal coordinates. Note that, in free space, i.e., without boundary effects3, the forcing term in (23) is
|
1205 |
+
equivalent to the following non-homogeneous Dirichlet-like condition at ρ = 0:
|
1206 |
+
U(0, t) = Ψ(0, t) =
|
1207 |
+
� t
|
1208 |
+
0
|
1209 |
+
� t′
|
1210 |
+
0
|
1211 |
+
−ω2 sin(ωt′′)dt′′dt′ = sin(ωt)
|
1212 |
+
∀t > 0.
|
1213 |
+
(24)
|
1214 |
+
Accordingly, the free-space solution Ψ has space-time support {(ρ, t) ∈ [0, ∞)2, ρ ≤ t}, which is a subset of
|
1215 |
+
the free-space solution Ψ from the previous section, namely, {(ρ, t) ∈ [0, ∞)2, ρ ≤ t + R}. As such, to obtain
|
1216 |
+
an approximation for the wave u generated by the time-harmonic source for an arbitrary ω, it suffices to
|
1217 |
+
plug the corresponding Ψ in each term of the surrogate �u from the previous section! We show the results of
|
1218 |
+
our approximation in Figs. 13 and 14.
|
1219 |
+
We note that, if we had chosen to apply the FEM to approximate the wave u generated by the time-
|
1220 |
+
harmonic source, we would have been forced to carry out a new simulation from scratch for every frequency
|
1221 |
+
to be studied. To this end, we would have needed to choose a mesh with ω-dependent resolution: the mesh
|
1222 |
+
size should be small enough for the well-known pollution effect (see, e.g., [22, 2]) to be absent.
|
1223 |
+
3If Ω is bounded, reflected or diffracted waves will generally bounce back to x = 0. As such, the value of u(0, t), u being
|
1224 |
+
the solution of (23), will be different from the source signal sin(ωt). For this reason, we cannot turn the forcing term in (23)
|
1225 |
+
into a condition like (24), except in free space.
|
1226 |
+
19
|
1227 |
+
|
1228 |
+
D. Pradovera, M. Nonino, and I. Perugia
|
1229 |
+
Geometry-based approximation of waves in complex domains
|
1230 |
+
−0.4
|
1231 |
+
−0.2
|
1232 |
+
0
|
1233 |
+
0.2
|
1234 |
+
0.4
|
1235 |
+
−0.2
|
1236 |
+
0
|
1237 |
+
0.2
|
1238 |
+
Figure 13: Surrogate solution found with the proposed approach. Left plot: ω = 2π. Right plot: ω = 10π.
|
1239 |
+
0
|
1240 |
+
2
|
1241 |
+
4
|
1242 |
+
6
|
1243 |
+
8
|
1244 |
+
10
|
1245 |
+
12
|
1246 |
+
14
|
1247 |
+
16
|
1248 |
+
18
|
1249 |
+
20
|
1250 |
+
−0.2
|
1251 |
+
−0.1
|
1252 |
+
0
|
1253 |
+
0.1
|
1254 |
+
0.2
|
1255 |
+
t
|
1256 |
+
u(xtrace, t)
|
1257 |
+
ω = 2π
|
1258 |
+
ω = 10π
|
1259 |
+
Figure 14: Value of solution at point xtrace = (−1, −2) for different excitation frequencies.
|
1260 |
+
In our proposed approach, we also have a constraint on the mesh resolution. However, it only applies
|
1261 |
+
to the problem defining the free-space solution Ψ, which is 1-dimensional in space. Hence, having to refine
|
1262 |
+
the mesh represents a much smaller obstacle to efficiency. In particular, for a fixed time horizon T, the
|
1263 |
+
computation of �u becomes more and more efficient, when compared to the computation of uFEM, as the
|
1264 |
+
frequency ω increases.
|
1265 |
+
6
|
1266 |
+
Conclusions
|
1267 |
+
We have presented a method for approximating waves propagating through complex 2-dimensional domains
|
1268 |
+
with polygonal boundaries. Our method relies on the automatic identification of reflection and diffraction
|
1269 |
+
effects caused by the domain geometry. Each effect is modeled through a relatively simple nonlinear expres-
|
1270 |
+
sion. In our numerical tests, we have observed rather a good approximation quality, with the main features
|
1271 |
+
of the target wave being well identified. As a way to improve the approximation accuracy, we recall that any
|
1272 |
+
diffraction model could replace the current one.
|
1273 |
+
In terms of complexity, our method requires the solution of a simplified 1D-in-space problem, much
|
1274 |
+
simpler than the original 2D-in-space one. We expect such improved accuracy to increase even further if
|
1275 |
+
one were to consider 3D instead of 2D problems. However, in order to generalize our method to 3 space
|
1276 |
+
dimensions, a suitable diffraction model would be necessary. This is one of our ongoing research directions.
|
1277 |
+
Another favorable aspect of our algorithm is its potential to be run on parallel architectures, since
|
1278 |
+
the computation of different rays can be carried out independently.
|
1279 |
+
This is not the case for standard
|
1280 |
+
timestepping-based discretizations, due to their intrinsically sequential nature.
|
1281 |
+
Other envisioned extensions of our technique involve the cases of domains with curvilinear boundaries
|
1282 |
+
and of propagation media with non-uniform properties (e.g., density and refraction index). Specifically, this
|
1283 |
+
latter case would effectively result in a non-uniform wave speed, with reflections and diffractions happening
|
1284 |
+
20
|
1285 |
+
|
1286 |
+
D. Pradovera, M. Nonino, and I. Perugia
|
1287 |
+
Geometry-based approximation of waves in complex domains
|
1288 |
+
also within the domain Ω.
|
1289 |
+
Finally, we recall that, in many applications, the ultimate target is understanding how the wave u solving
|
1290 |
+
(1) depends on underlying parameters µ, e.g., the forcing term f, the shape of the domain Ω, etc. In this
|
1291 |
+
setting, MOR methods try to construct a surrogate model of the form �u = �u(x, t; µ), providing a good
|
1292 |
+
approximation of u over a whole range of parameter values. Even though our technique was presented here
|
1293 |
+
in the non-parametric setting, we believe that it potentially allows incorporating the parameter dependence
|
1294 |
+
in a natural and efficient way. In our opinion, this might be achievable by leveraging the simple and in-
|
1295 |
+
terpretable structure of the rays (free-space solution, light cone, and angular modulation). As a simple
|
1296 |
+
preliminary example, we showcased this in Section 5.2.1 for a parametric source term, with the parame-
|
1297 |
+
ter being the frequency. We are currently investigating how to extend our method to more complicated
|
1298 |
+
parametric problems.
|
1299 |
+
References
|
1300 |
+
[1] M. S. Alnæs, J. Blechta, J. Hake, and Others. The FEniCS Project version 1.5. Archive of Numerical
|
1301 |
+
Software, 3(100), 2015.
|
1302 |
+
[2] I. M. Babuˇska and S. A. Sauter. Is the pollution effect of the fem avoidable for the helmholtz equation
|
1303 |
+
considering high wave numbers? SIAM Journal on Numerical Analysis, 34(6):2392–2423, 1997.
|
1304 |
+
[3] P. Benner, M. Ohlberger, A. Cohen, and K. Willcox. Model reduction and approximation: theory and
|
1305 |
+
algorithms. SIAM, 2017.
|
1306 |
+
[4] F. Bonizzoni, F. Nobile, I. Perugia, and D. Pradovera. Least-Squares Pad´e approximation of parametric
|
1307 |
+
and stochastic Helmholtz maps. Advances in Computational Mathematics, 46(3):46, 2020.
|
1308 |
+
[5] L. Borcea, V. Druskin, A. V. Mamonov, and M. Zaslavsky.
|
1309 |
+
Robust nonlinear processing of active
|
1310 |
+
array data in inverse scattering via truncated reduced order models. Journal of Computational Physics,
|
1311 |
+
381:1–26, 2019.
|
1312 |
+
[6] L. Borcea, V. Druskin, A. V. Mamonov, M. Zaslavsky, and J. Zimmerling.
|
1313 |
+
Reduced order model
|
1314 |
+
approach to inverse scattering. SIAM Journal on Imaging Sciences, 13(2):685–723, 2020.
|
1315 |
+
[7] L. Borcea, G. Papanicolaou, C. Tsogka, and J. Berryman. Imaging and time reversal in random media.
|
1316 |
+
Inverse Problems, 18(5), 2002.
|
1317 |
+
[8] P. Buchfink, S. Glas, and B. Haasdonk.
|
1318 |
+
Symplectic Model Reduction of Hamiltonian Systems on
|
1319 |
+
Nonlinear Manifolds. arXiv preprint arXiv:2112.10815, 2021.
|
1320 |
+
[9] P. Buchfink, B. Haasdonk, and S. Rave. PSD-Greedy Basis Generation for Structure-Preserving Model
|
1321 |
+
Order Reduction of Hamiltonian Systems. In Proceedings of ALGORITMY, pages 151–160, 2020.
|
1322 |
+
[10] N. Cagniart, Y. Maday, and B. Stamm. Model Order Reduction for Problems with Large Convection
|
1323 |
+
Effects, pages 131–150. Springer International Publishing, Cham, 2019.
|
1324 |
+
[11] G. Cohen, A. Hauck, M. Kaltenbacher, and T. Otsuru. Different Types of Finite Elements. In S. Marburg
|
1325 |
+
and B. Nolte, editors, Computational Acoustics of Noise Propagation in Fluids - Finite and Boundary
|
1326 |
+
Element Methods, pages 57–88. Springer Berlin Heidelberg, Berlin, Heidelberg, 2008.
|
1327 |
+
[12] R. A. DeVore. The theoretical foundation of reduced basis methods. Model reduction and approximation:
|
1328 |
+
theory and algorithms, 15:137, 2017.
|
1329 |
+
[13] S. Esterhazy and J. M. Melenk. On stability of discretizations of the Helmholtz equation. In Numerical
|
1330 |
+
analysis of multiscale problems, pages 285–324. Springer, 2012.
|
1331 |
+
[14] S. Glas, A. T. Patera, and K. Urban. A reduced basis method for the wave equation. International
|
1332 |
+
Journal of Computational Fluid Dynamics, 34(2):139–146, 2020.
|
1333 |
+
21
|
1334 |
+
|
1335 |
+
D. Pradovera, M. Nonino, and I. Perugia
|
1336 |
+
Geometry-based approximation of waves in complex domains
|
1337 |
+
[15] C. Greif and K. Urban. Decay of the Kolmogorov N-width for wave problems. Applied Mathematics
|
1338 |
+
Letters, 96:216–222, 2019.
|
1339 |
+
[16] E. Hairer, G. Wanner, and C. Lubich. Geometric Numerical Integration, volume 31 of Springer Series
|
1340 |
+
in Computational Mathematics. Springer Berlin Heidelberg, Berlin, Heidelberg, 2002.
|
1341 |
+
[17] J. S. Hesthaven and C. Pagliantini. Structure-preserving reduced basis methods for Poisson systems.
|
1342 |
+
Mathematics of Computation, 90(330):1701–1740, 2021.
|
1343 |
+
[18] J. S. Hesthaven, C. Pagliantini, and N. Ripamonti. Rank-adaptive structure-preserving reduced basis
|
1344 |
+
methods for Hamiltonian systems. arXiv preprint arXiv:2007.13153, 2020.
|
1345 |
+
[19] R. Hiptmair, A. Moiola, and I. Perugia. Trefftz discontinuous Galerkin methods for acoustic scattering
|
1346 |
+
on locally refined meshes. Applied numerical mathematics, 79:79–91, 2014.
|
1347 |
+
[20] J. B. Keller. Geometrical theory of diffraction. J. Opt. Soc. Am., 52(2):116–130, 1962.
|
1348 |
+
[21] K. Lee and K. T. Carlberg. Deep conservation: A latent-dynamics model for exact satisfaction of physical
|
1349 |
+
conservation laws. Proceedings of the AAAI Conference on Artificial Intelligence, 35(1):277–285, 2021.
|
1350 |
+
[22] S. Marburg.
|
1351 |
+
A Unified Approach to Finite and Boundary Element Discretization in Linear Time–
|
1352 |
+
Harmonic Acoustics. In S. Marburg and B. Nolte, editors, Computational Acoustics of Noise Propagation
|
1353 |
+
in Fluids - Finite and Boundary Element Methods, pages 1–34. Springer Berlin Heidelberg, Berlin,
|
1354 |
+
Heidelberg, 2008.
|
1355 |
+
[23] D. A. McNamara, C. W. I. Pistorius, and J. A. G. Malherbe. Introduction to the uniform geometrical
|
1356 |
+
theory of diffraction. Artech House Norwood, MA, 1990.
|
1357 |
+
[24] J. M. Melenk and S. Sauter. Wavenumber explicit convergence analysis for Galerkin discretizations of
|
1358 |
+
the Helmholtz equation. SIAM Journal on Numerical Analysis, 49(3):1210–1243, 2011.
|
1359 |
+
[25] A. Moiola, R. Hiptmair, and I. Perugia. Plane wave approximation of homogeneous Helmholtz solutions.
|
1360 |
+
Zeitschrift f¨ur angewandte Mathematik und Physik, 62(5):809–837, 2011.
|
1361 |
+
[26] C. Pagliantini. Dynamical reduced basis methods for Hamiltonian systems. Numerische Mathematik,
|
1362 |
+
148(2):409–448, 2021.
|
1363 |
+
[27] S. F. Potter and M. K. Cameron. Jet marching methods for solving the eikonal equation. SIAM Journal
|
1364 |
+
on Scientific Computing, 43(6):A4121–A4146, 2021.
|
1365 |
+
[28] S. F. Potter, M. K. Cameron, and R. Duraiswami. Numerical geometric acoustics: an eikonal-based
|
1366 |
+
approach for modeling sound propagation in 3D environments. arXiv preprint arXiv:2208.13002, 2022.
|
1367 |
+
[29] J. Reiss, P. Schulze, J. Sesterhenn, and V. Mehrmann. The shifted proper orthogonal decomposition:
|
1368 |
+
A mode decomposition for multiple transport phenomena.
|
1369 |
+
SIAM Journal on Scientific Computing,
|
1370 |
+
40(3):A1322–A1344, 2018.
|
1371 |
+
[30] P. H. Tournier, I. Aliferis, M. Bonazzoli, M. de Buhan, M. Darbas, V. Dolean, F. Hecht, P. Jolivet,
|
1372 |
+
I. El Kanfoud, C. Migliaccio, F. Nataf, C. Pichot, and S. Semenov. Microwave tomographic imaging of
|
1373 |
+
cerebrovascular accidents by using high-performance computing. Parallel Computing, 85:88–97, 2019.
|
1374 |
+
[31] G. Welper. Interpolation of functions with parameter dependent jumps by transformed snapshots. SIAM
|
1375 |
+
Journal on Scientific Computing, 39(4):A1225–A1250, 2017.
|
1376 |
+
22
|
1377 |
+
|
8dFRT4oBgHgl3EQfpTfl/content/tmp_files/load_file.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
99FLT4oBgHgl3EQfCS7y/vector_store/index.faiss
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:94adb9f0e34d1c67981455a5b9d85e8cc81ea82d83851e76e5d6d3ac3c5e3265
|
3 |
+
size 10813485
|
ANAyT4oBgHgl3EQfRffl/content/tmp_files/2301.00069v1.pdf.txt
ADDED
@@ -0,0 +1,1428 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
A stabilized local integral method using RBFs
|
2 |
+
for the Helmholtz equation with applications
|
3 |
+
to wave chaos and dielectric microresonators
|
4 |
+
L. Ponzellini Marinelli[1,2]
|
5 | |
6 |
+
L. Raviola[1]
|
7 | |
8 |
+
[1] Faculty of Exact Sciences, Engineering and Surveying,
|
9 |
+
National University of Rosario, Rosario, Argentina.
|
10 |
+
[2] Rosario Physics Institute, UNR-CONICET,
|
11 |
+
Rosario, Argentina.
|
12 |
+
January 3, 2023
|
13 |
+
Abstract
|
14 |
+
Most problems in electrodynamics do not have an analytical so-
|
15 |
+
lution so much effort has been put in the development of numerical
|
16 |
+
schemes, such as the finite-difference method, volume element meth-
|
17 |
+
ods, boundary element methods, and related methods based on bound-
|
18 |
+
ary integral equations.
|
19 |
+
In this paper we introduce a local integral
|
20 |
+
boundary domain method with a stable calculation based on Radial
|
21 |
+
Basis Functions (RBF) approximations, in the context of wave chaos
|
22 |
+
in acoustics and dielectric microresonator problems. RBFs have been
|
23 |
+
gaining popularity recently for solving partial differential equations
|
24 |
+
numerically, becoming an extremely effective tool for interpolation on
|
25 |
+
scattered node sets in several dimensions with high-order accuracy
|
26 |
+
and flexibility for nontrivial geometries. One key issue with infinitely
|
27 |
+
1
|
28 |
+
arXiv:2301.00069v1 [math.NA] 30 Dec 2022
|
29 |
+
|
30 |
+
smooth RBFs is the choice of a suitable value for the shape param-
|
31 |
+
eter which controls the flatness of the function. It is observed that
|
32 |
+
best accuracy is often achieved when the shape parameter tends to
|
33 |
+
zero. However, the system of discrete equations obtained from the
|
34 |
+
interpolation matrices becomes ill-conditioned, which imposes severe
|
35 |
+
limits to the attainable accuracy. A few numerical algorithms have
|
36 |
+
been presented that are able to stably compute an interpolant, even
|
37 |
+
in the increasingly flat basis function limit. We present the recently
|
38 |
+
developed Stabilized Local Boundary Domain Integral Method in the
|
39 |
+
context of boundary integral methods that improves the solution of
|
40 |
+
the Helmholtz equation with RBFs. Numerical results for small shape
|
41 |
+
parameters that stabilize the error are shown. Accuracy and compar-
|
42 |
+
ison with other methods are also discussed for various case studies.
|
43 |
+
Applications in wave chaos, acoustics and dielectric microresonators
|
44 |
+
are discussed to showcase the virtues of the method, which is com-
|
45 |
+
putationally efficient and well suited to the kind of geometries with
|
46 |
+
arbitrary shape domains.
|
47 |
+
1
|
48 |
+
Introduction and motivation
|
49 |
+
Dielectric microresonators, also known as dielectric microcavities, have at-
|
50 |
+
tracted interest in the last decades due to technological applications like
|
51 |
+
microlasers and and as systems with intrinsic theoretical interest for its con-
|
52 |
+
nections with quantum billiards and wave chaos [2, 9, 20].
|
53 |
+
A quantum billiard is a system in which a free particle is confined within
|
54 |
+
a 2D domain and whose dynamics is governed by the Schr¨odinger equation
|
55 |
+
iψt(x, t) = −∆ψ(x, t),
|
56 |
+
x ∈ Ω ⊂ R2, t > 0.
|
57 |
+
(1)
|
58 |
+
where ψ(x, t) = 0 for x ∈ Γ being Γ the boundary of the domain Ω.
|
59 |
+
When searching the time harmonic solutions of this system in the form
|
60 |
+
ψ(x, t) = ˜ψ(x)eikt, the spatial dependence, ˜ψ(x), satisfies the well-known
|
61 |
+
Helmholtz Equation (HE)
|
62 |
+
�
|
63 |
+
∆ + k2� ˜ψ(x) = 0,
|
64 |
+
x ∈ Ω ⊂ R2, t > 0.
|
65 |
+
(2)
|
66 |
+
In this case, the eigenvalues to equation (2) are related to the energy of the
|
67 |
+
particle.
|
68 |
+
On the other hand, a similar situation arises when trying to solve the
|
69 |
+
problem of light waves propagating inside a dielectric medium satisfying the
|
70 |
+
2
|
71 |
+
|
72 |
+
Maxwell equations. Also in this case, the search for time harmonic solutions
|
73 |
+
leads to the Helmholtz equation for the spatial dependence of the electro-
|
74 |
+
magnetic field [2].
|
75 |
+
For generic domains, the equation (2) cannot be solved analytically to find
|
76 |
+
stationary states. So we must resort to finding efficient and reliable numerical
|
77 |
+
methods to solve this equation. There are many numerical techniques to
|
78 |
+
address this equation such as the finite element method (FEM), the finite
|
79 |
+
volume method (FVM), the Boundary Element Method (BEM) or spectral
|
80 |
+
methods (PS) [19]. However, several of these require the construction of a
|
81 |
+
specific mesh or refinement to efficiently address certain numerical problems
|
82 |
+
on non-trivial geometries.
|
83 |
+
The BEM transforms the formulated Partial Differential Equations (PDE)
|
84 |
+
into integral equations, that is, into an integral form over the boundary
|
85 |
+
[1, 13]. In BEM the PDE that describes the physical problem is transformed
|
86 |
+
into a Boundary Integral Equation (BIE), which is achieved by using Green’s
|
87 |
+
identities to then apply this integral formulation over points distributed in
|
88 |
+
the domain. Many local integral methods are based on an integral formula-
|
89 |
+
tion on small, strongly overlapping stencils with local interpolations.
|
90 |
+
In recent decades, methods involving the Radial Basis Functions (RBF)
|
91 |
+
have become an extremely effective tool in non-trivial geometries for inter-
|
92 |
+
polation in sets of scattered nodes and for numerically approximating PDE.
|
93 |
+
There are many modern books dealing with theory, implementations and ap-
|
94 |
+
plications [3, 4, 6]. One advantage is that when the distribution nodes are
|
95 |
+
created, it is possible to achieve local refinement in critical areas depending
|
96 |
+
on the specific problem [5]. Particularly, this is interesting to resolve local-
|
97 |
+
ized structures like the scarred states observed in quantum chaos phenomena
|
98 |
+
[18].
|
99 |
+
Using infinitely differential RBFs like Gaussians, exponential convergence
|
100 |
+
can be shown. A practical obstacle is the ill-conditioning of the interpolation
|
101 |
+
matrix when the shape parameter ε that defines the Gaussian RBF tends
|
102 |
+
to zero. It is known that when this parameter is reduced, the interpolation
|
103 |
+
accuracy of the method improves considerably but the numerical conditioning
|
104 |
+
of the problem worsens if it is solved with a direct type numerical method.
|
105 |
+
That is, there is a conflict between accuracy and the constraint known as the
|
106 |
+
uncertainty principle [17].
|
107 |
+
In this paper we present the Stabilized Localized Boundary-Domain Inte-
|
108 |
+
gral Method (SLBDIM) [16] in the context of Helmholtz type equations. This
|
109 |
+
is a new stable integral local numerical method for approximating elliptic-
|
110 |
+
3
|
111 |
+
|
112 |
+
type PDE solutions to solve Boundary Value Problems (BVP) in 2D that
|
113 |
+
uses local interpolations with RBF for low values ε > 0. This technique is
|
114 |
+
a combination of meshless methods, local integral formulations and bound-
|
115 |
+
ary elements in multi-domains independent of a structured mesh and that
|
116 |
+
only requires an unstructured distribution of nodes of the domain Ω and its
|
117 |
+
boundary Γ = ∂Ω that allows to deal with complex geometries. For local
|
118 |
+
interpolations, the Gaussian RBFs ϕ(r) = e−(εr)2 are used when ε → 0 in
|
119 |
+
local interpolations in stable form.
|
120 |
+
Numerical results are shown for a small shape parameter that stabilizes
|
121 |
+
the error. Comparisons with other methods in several cases are also dis-
|
122 |
+
cussed. It is shown that the method is computationally efficient and suit-
|
123 |
+
able for geometries that come from applications of wave chaos and dielectric
|
124 |
+
microresonators. In particular, we solve differential problems with Dirichlet-
|
125 |
+
type boundary conditions over square domains with quasi-uniform point dis-
|
126 |
+
tributions.
|
127 |
+
2
|
128 |
+
The Stabilized Localized Boundary Domain
|
129 |
+
Integral Method for Helmholtz equations
|
130 |
+
2.1
|
131 |
+
Problem description and local integral method
|
132 |
+
We consider the following Boundary Value Problem (BVP) on an open,
|
133 |
+
bounded and simply connected domain Ω ⊂ R2
|
134 |
+
(BV P)
|
135 |
+
� L [u] (x) = f(x),
|
136 |
+
x ∈ Ω,
|
137 |
+
(3a)
|
138 |
+
B [u] (x) = g(x),
|
139 |
+
x ∈ Γ = ∂Ω,
|
140 |
+
(3b)
|
141 |
+
where L[ . ] = ∆ + λ is an elliptic differential Helmholtz-type operator,
|
142 |
+
∆ =
|
143 |
+
∂
|
144 |
+
∂x2 +
|
145 |
+
∂
|
146 |
+
∂y2 is tha Laplacian, λ ∈ R (when λ = k2 > 0, k is the wave-
|
147 |
+
number) and f(x) is the smooth source term. B[ . ] is the boundary operator
|
148 |
+
with the boundary conditions (BC).
|
149 |
+
The BC are Dirichlet, Neumann or mixed over Γ = Γ1∪Γ2 and Γ1∩Γ2 = ∅
|
150 |
+
�
|
151 |
+
�
|
152 |
+
�
|
153 |
+
u(x) = g1(x),
|
154 |
+
x ∈ Γ1,
|
155 |
+
(4a)
|
156 |
+
∂u(x)
|
157 |
+
∂n
|
158 |
+
= g2(x),
|
159 |
+
x ∈ Γ2,
|
160 |
+
(4b)
|
161 |
+
with g1 and g2 known data, and ∂u(x)
|
162 |
+
∂n
|
163 |
+
the outward normal derivative of the
|
164 |
+
unknown field u.
|
165 |
+
4
|
166 |
+
|
167 |
+
We propose that PDE (3a) can be written as
|
168 |
+
∆u (x) = f(x) − λu (x) = b (x, u (x)) ,
|
169 |
+
(5)
|
170 |
+
where u (x) is the potential in the point x ∈ Ω.
|
171 |
+
We consider x ∈ Ω ⊂ R2
|
172 |
+
∆u∗ = δ(x − ξ),
|
173 |
+
(6)
|
174 |
+
where δ(x − ξ) is Delta’s delta centered at ξ ∈ Ω with fundamental solution
|
175 |
+
u∗(x, ξ) = 1
|
176 |
+
2πln(r),
|
177 |
+
r = ∥x − ξ∥.
|
178 |
+
(7)
|
179 |
+
From equation (5)
|
180 |
+
∆u (x) = b ⇔
|
181 |
+
�
|
182 |
+
Ω
|
183 |
+
u∗ (x, ξ) ∆u (x) dΩx =
|
184 |
+
�
|
185 |
+
Ω
|
186 |
+
u∗(x, ξ)b dΩx.
|
187 |
+
(8)
|
188 |
+
Applying Green’s second identity for u that satisfies (5) and u∗ that
|
189 |
+
satisfies (6)
|
190 |
+
�
|
191 |
+
Ω
|
192 |
+
(u∗∆u − u∆u∗) dΩx =
|
193 |
+
�
|
194 |
+
Γ
|
195 |
+
�
|
196 |
+
u∗ ∂u
|
197 |
+
∂n − u∂u∗
|
198 |
+
∂n
|
199 |
+
�
|
200 |
+
dΓx,
|
201 |
+
(9)
|
202 |
+
we obtain
|
203 |
+
u(ξ) =
|
204 |
+
�
|
205 |
+
Ω
|
206 |
+
u∗ (x, ξ) b dΩx −
|
207 |
+
�
|
208 |
+
Γ
|
209 |
+
�
|
210 |
+
u∗ (x, ξ) ∂u(x)
|
211 |
+
∂n
|
212 |
+
− u(x)u∗(x, ξ)
|
213 |
+
∂n
|
214 |
+
�
|
215 |
+
dΓx.
|
216 |
+
(10)
|
217 |
+
From equation (10) we have a formula for the integral representation of
|
218 |
+
the PDE over a subregion Ωi with boundary Γi. The interior collocation
|
219 |
+
point xi is obtained as before from the fundamental solution and Green’s
|
220 |
+
second identity
|
221 |
+
u(ξ) =
|
222 |
+
�
|
223 |
+
Γi
|
224 |
+
q∗ (x, ξ) u (x) dΓx −
|
225 |
+
�
|
226 |
+
Γi
|
227 |
+
u∗ (x, ξ) q (x) dΓx +
|
228 |
+
�
|
229 |
+
Ωi
|
230 |
+
b u∗ (x, ξ) dΩx,
|
231 |
+
(11)
|
232 |
+
where q = ∂u
|
233 |
+
∂n is the normal derivative of the unknown field, u∗ is the fun-
|
234 |
+
damental Laplacian solution and q∗ =
|
235 |
+
∂u∗
|
236 |
+
∂n is the normal derivative of the
|
237 |
+
fundamental solution.
|
238 |
+
5
|
239 |
+
|
240 |
+
Using the well-known Green-Dirichlet function (FGD), G (x, ξ), and its
|
241 |
+
normal derivative Q (x, ξ) [8] in (11) we obtain a new integral formulation of
|
242 |
+
the form
|
243 |
+
u(ξ) =
|
244 |
+
�
|
245 |
+
Γi
|
246 |
+
Q (x, ξ) u (x) dΓx +
|
247 |
+
�
|
248 |
+
Ωi
|
249 |
+
b G (x, ξ) dΩx.
|
250 |
+
(12)
|
251 |
+
since the integral over Γi involving G in (11) vanishes since its value is zero.
|
252 |
+
In addition, if the non-homogeneous term b of the PDE can be split
|
253 |
+
b (x, u (x)) = f (x) − λu (x) ,
|
254 |
+
(13)
|
255 |
+
where the funcion source f is data.
|
256 |
+
The integral representation (12) in each subregion of integration Ωi is
|
257 |
+
u(ξ) =
|
258 |
+
�
|
259 |
+
Γi
|
260 |
+
Q(x, ξ)u(x) dΓx+
|
261 |
+
�
|
262 |
+
Ωi
|
263 |
+
G(x, ξ)f(x) dΩx+
|
264 |
+
�
|
265 |
+
Ωi
|
266 |
+
���λu (x) G(x, ξ) dΩx,
|
267 |
+
(14)
|
268 |
+
where ξ is the interior source point. The collocation technique is done only
|
269 |
+
at interior points of the domain.
|
270 |
+
2.2
|
271 |
+
Local interpolations with RBF
|
272 |
+
A function ϕ : Rd → R is an RBF if there exists φ : [0, ∞) → R such that
|
273 |
+
ϕ (x) = φ(r),
|
274 |
+
r = ∥x − xj∥,
|
275 |
+
(15)
|
276 |
+
where ∥.∥ is the Euclidean norm on Rd and depends on the distance to a
|
277 |
+
center xj ∈ Rd. If it depends on the shape parameter ε > 0, then ϕε
|
278 |
+
j (x) =
|
279 |
+
φ(r, ε) is often noted.
|
280 |
+
In the LBDIM the field u is locally interpolated with RBF {ϕj}n
|
281 |
+
j=1 with
|
282 |
+
centers of the stencil Θx = {xj}n
|
283 |
+
j=1
|
284 |
+
u (x) ≈
|
285 |
+
n
|
286 |
+
�
|
287 |
+
j=1
|
288 |
+
αjϕj(x),
|
289 |
+
(16)
|
290 |
+
where the interpolation matrix Ai is such that
|
291 |
+
(Ai)jk = ϕk(xj) = φ(∥xj − xk∥),
|
292 |
+
j, k = 1, . . . , n
|
293 |
+
(17)
|
294 |
+
6
|
295 |
+
|
296 |
+
The term b of (13) is interpolated with RBF {χj}m
|
297 |
+
j=1 with centers of the
|
298 |
+
stencil Θy = {yj}m
|
299 |
+
j=1
|
300 |
+
�b (u (x) , ∇u (x)) ≈
|
301 |
+
m
|
302 |
+
�
|
303 |
+
j=1
|
304 |
+
βjχj (x) ,
|
305 |
+
(18)
|
306 |
+
where the interpolation matrix �Ai is such that
|
307 |
+
(�Ai)jk = χk(yj) = χ(∥yj − yk∥), j, k = 1, . . . , m
|
308 |
+
(19)
|
309 |
+
The RBFs are eventually of the same type and with the same centers. If
|
310 |
+
we take the same RBF bases with the same centers, the result is {ϕj}n
|
311 |
+
j=1
|
312 |
+
and {χj}m
|
313 |
+
j=1 for m = n although they could be different depending on the
|
314 |
+
application problem or numerical experience.
|
315 |
+
The local integral formulation of (14) is of the form
|
316 |
+
u(ξ)
|
317 |
+
≈
|
318 |
+
n
|
319 |
+
�
|
320 |
+
j=1
|
321 |
+
αj
|
322 |
+
��
|
323 |
+
Γi
|
324 |
+
Q(x, ξ)ϕj(x) dΓx
|
325 |
+
�
|
326 |
+
+
|
327 |
+
m
|
328 |
+
�
|
329 |
+
j=1
|
330 |
+
βj
|
331 |
+
��
|
332 |
+
Ωi
|
333 |
+
G(x, ξ)χj (x) dΩx
|
334 |
+
�
|
335 |
+
+
|
336 |
+
�
|
337 |
+
Ωi
|
338 |
+
G(x, ξ)f(x) dΩx.
|
339 |
+
(20)
|
340 |
+
If Θ = {x1, . . . , xN} is the discretization of domain Ω and ξ = xi ∈ Θ is
|
341 |
+
the collocation point, the discretized formulae of the unknown field is
|
342 |
+
ui = u (xi) =
|
343 |
+
n
|
344 |
+
�
|
345 |
+
j=1
|
346 |
+
αj�hij +
|
347 |
+
m
|
348 |
+
�
|
349 |
+
j=1
|
350 |
+
βj�gij + �fi,
|
351 |
+
(21)
|
352 |
+
where αj and βj come from equations (16) and (18). The coefficients �hij, �gij
|
353 |
+
and �fi are of the form
|
354 |
+
�
|
355 |
+
�
|
356 |
+
�
|
357 |
+
�
|
358 |
+
�
|
359 |
+
�
|
360 |
+
�
|
361 |
+
�
|
362 |
+
�
|
363 |
+
�
|
364 |
+
�
|
365 |
+
�
|
366 |
+
�
|
367 |
+
�
|
368 |
+
�
|
369 |
+
�
|
370 |
+
�
|
371 |
+
�hij =
|
372 |
+
�
|
373 |
+
Γi
|
374 |
+
Q (x, xi) ϕj (x) dΓx,
|
375 |
+
(22a)
|
376 |
+
�gij =
|
377 |
+
�
|
378 |
+
Ωi
|
379 |
+
G (x, xi) χj (x) dΩx,
|
380 |
+
(22b)
|
381 |
+
�fi =
|
382 |
+
�
|
383 |
+
Ωi
|
384 |
+
G (x, xi) f (x) dΩx,
|
385 |
+
(22c)
|
386 |
+
which are calculated by Gauss-Legendre quadratures.
|
387 |
+
7
|
388 |
+
|
389 |
+
Defining the vectors α = [α1, . . . , αn]T and β = [β1, . . . , βm]T as interpo-
|
390 |
+
lation coefficients, the discretized form (21) of u can be expressed as
|
391 |
+
ui = �hT
|
392 |
+
i α + �gT
|
393 |
+
i β + �fi,
|
394 |
+
(23)
|
395 |
+
where �hi = [�hi1, . . . ,�hin]T and �gi = [�gi1, . . . , �gim]T are the influence coeffi-
|
396 |
+
cients, and �fi ∈ R is data.
|
397 |
+
The vector α arises from the local system by interpolating with the RBF
|
398 |
+
basis {ϕj}n
|
399 |
+
j=1
|
400 |
+
Aiα = di ⇔ α = A−1
|
401 |
+
i di
|
402 |
+
(24)
|
403 |
+
and the vector β arises from the local system by interpolating with the RBF
|
404 |
+
basis {χj}m
|
405 |
+
j=1
|
406 |
+
�Aiβ = �bi ⇔ β = �A−1
|
407 |
+
i �bi = �A−1
|
408 |
+
i
|
409 |
+
�
|
410 |
+
A�biα
|
411 |
+
�
|
412 |
+
= �A−1
|
413 |
+
i
|
414 |
+
�
|
415 |
+
A�biA−1
|
416 |
+
i di
|
417 |
+
�
|
418 |
+
,
|
419 |
+
(25)
|
420 |
+
where A�bi is the calculation matrix of the vector �bi with known coefficients
|
421 |
+
(A�bi)jk = �b (ϕk (yj) , ∇ϕk (yj)) ,
|
422 |
+
j = 1, . . . , m, k = 1, . . . , n.
|
423 |
+
(26)
|
424 |
+
Substituting (24) and (25) in the discretized form (23), we obtain the
|
425 |
+
discretized matrix form for ui in terms of di
|
426 |
+
ui =
|
427 |
+
�
|
428 |
+
�hT
|
429 |
+
i A−1
|
430 |
+
i
|
431 |
+
+ �gT
|
432 |
+
i �A−1
|
433 |
+
i A�biA−1
|
434 |
+
i
|
435 |
+
�
|
436 |
+
di + ˜fi.
|
437 |
+
(27)
|
438 |
+
Rewriting (27) we obtain an algorithmic procedure to avoid the compu-
|
439 |
+
tation of inverses A−1
|
440 |
+
i
|
441 |
+
and �A−1
|
442 |
+
i
|
443 |
+
(see [14])
|
444 |
+
ui = zTdi + �fi
|
445 |
+
donde zT = �hT
|
446 |
+
i A−1
|
447 |
+
i
|
448 |
+
+ �gT
|
449 |
+
i �A−1
|
450 |
+
i A�biA−1
|
451 |
+
i
|
452 |
+
(28)
|
453 |
+
which are assembled into a global sparse-like system and numerically resolved
|
454 |
+
with Generalized Minimal Residual (GMRES).
|
455 |
+
2.3
|
456 |
+
Stability with Gaussian RBFs
|
457 |
+
Convergence in global interpolations with ε-dependent RBFs can be studied
|
458 |
+
in a stationary way (n = cte. and ε → 0) or non-stationary (ε = cte. and
|
459 |
+
increasesn). In the case of Gaussian RBFs, they produce convergence of
|
460 |
+
order O(e
|
461 |
+
− const
|
462 |
+
(εh)2 ) (superspectral).
|
463 |
+
8
|
464 |
+
|
465 |
+
The RBF interpolation matrix is
|
466 |
+
A(ε) =
|
467 |
+
�
|
468 |
+
����
|
469 |
+
φ(∥x1 − x1∥, ε)
|
470 |
+
φ(∥x1 − x2∥, ε)
|
471 |
+
. . .
|
472 |
+
φ(∥x1 − xn∥, ε)
|
473 |
+
φ(∥x2 − x1∥, ε)
|
474 |
+
φ(∥x2 − x2∥, ε)
|
475 |
+
. . .
|
476 |
+
φ(∥x2 − xn∥, ε)
|
477 |
+
...
|
478 |
+
...
|
479 |
+
...
|
480 |
+
...
|
481 |
+
φ(∥xn − x1∥, ε)
|
482 |
+
φ(∥xn − x2∥, ε)
|
483 |
+
. . .
|
484 |
+
φ(∥xn − xn∥, ε)
|
485 |
+
�
|
486 |
+
���� .
|
487 |
+
When ε is small, the RBFs become almost linearly dependent (’flat’)
|
488 |
+
forming a bad basis of functions and generating ill-conditioned interpolation
|
489 |
+
matrices A(ε) in a good interpolation space. To avoid this problem in [7, 10]
|
490 |
+
numerical techniques were developed that stabilize the solutions of linear
|
491 |
+
systems where the RBFs that form the matrix of the system take arbitrarily
|
492 |
+
small shape parameters. The RBF-QR method developed for global inter-
|
493 |
+
polations of scattered nodes using Gaussian RBFs is numerically stable for
|
494 |
+
nearly zero parameters. The idea of the RBF-QR algorithm is to change
|
495 |
+
the base {φj} to a new base {ψj} using combinations of polynomial powers,
|
496 |
+
Chebyshev polynomials and trigonometric functions.
|
497 |
+
3
|
498 |
+
Implementation of the SLBDIM
|
499 |
+
The new matrix form for u of (27) at each node is
|
500 |
+
ui =
|
501 |
+
�
|
502 |
+
lT
|
503 |
+
i Bi
|
504 |
+
−1 + �l
|
505 |
+
T
|
506 |
+
i �
|
507 |
+
Bi
|
508 |
+
−1B˜biBi
|
509 |
+
−1�
|
510 |
+
di + ˜fi,
|
511 |
+
(29)
|
512 |
+
where li = [. . . , lik, . . .]T and �li = [. . . ,�lik, . . .]T are the column vectors.
|
513 |
+
For internal stencils, the local interpolation matrix is
|
514 |
+
Bi
|
515 |
+
ψ = V
|
516 |
+
�
|
517 |
+
In
|
518 |
+
�
|
519 |
+
R
|
520 |
+
T
|
521 |
+
�
|
522 |
+
,
|
523 |
+
(30)
|
524 |
+
where (Bi
|
525 |
+
ψ)jk = ψk(xj) and Vjk = Vk(xj) for j, k = 1, . . . , n ([7] for details).
|
526 |
+
For boundary stencils, the local matrix interpolation matrix is Bi has
|
527 |
+
two blocks,
|
528 |
+
Bi =
|
529 |
+
� Bi
|
530 |
+
ψ
|
531 |
+
Bi
|
532 |
+
Bψ
|
533 |
+
�
|
534 |
+
,
|
535 |
+
(31)
|
536 |
+
where the first matrix block is
|
537 |
+
(Bi
|
538 |
+
ψ)jk = ψk(xj),
|
539 |
+
(32)
|
540 |
+
9
|
541 |
+
|
542 |
+
for j = 1, . . . , nint (interior nodes) and k = 1, . . . , n (boundary nodes), and
|
543 |
+
the second matrix block is
|
544 |
+
(Bi
|
545 |
+
Bψ)jk = Bψk(xj)
|
546 |
+
(33)
|
547 |
+
for j = nint + 1, . . . , n and k = 1, . . . , n.
|
548 |
+
To avoid calculating Bi
|
549 |
+
−1 and �
|
550 |
+
Bi
|
551 |
+
−1 when ε → 0 we follow an algorithmic
|
552 |
+
procedure. The inclusion of this technique in the local integral method allows
|
553 |
+
to stabilize the numerical error of the approximation of the Helmholtz-type
|
554 |
+
equations.
|
555 |
+
This Stabilized Domain and Boundary Local Integral Method
|
556 |
+
(SLBDIM) was presented at [16] for Poisson problems, convection-diffusion
|
557 |
+
equations and elliptic PDEs. Another strategy of stability technique for local
|
558 |
+
integral methods that uses RBF interpolation functions was presented in [15].
|
559 |
+
4
|
560 |
+
Numerical examples on several billiars
|
561 |
+
In this section we report two numerical experiments to show the accuracy and
|
562 |
+
efficiency of the proposed numerical scheme to solve Helmholtz-type equa-
|
563 |
+
tions in two dimensions. Implementations and numerical experiments were
|
564 |
+
performed using MATLAB version R2017a numerical calculation software on
|
565 |
+
a PC with 7.5 GB of RAM and an Intel Core i7-7500U 7th Generation CPU.
|
566 |
+
running at 2.70GHz.
|
567 |
+
The reported errors are the standard error L2 (L2-Error)
|
568 |
+
L2-Error
|
569 |
+
=
|
570 |
+
�
|
571 |
+
�N
|
572 |
+
i=1(uexac
|
573 |
+
i
|
574 |
+
−uapprox
|
575 |
+
i
|
576 |
+
)
|
577 |
+
2
|
578 |
+
�N
|
579 |
+
i=1(uexac
|
580 |
+
i
|
581 |
+
)
|
582 |
+
2
|
583 |
+
(34)
|
584 |
+
and the root mean square error (RMS):
|
585 |
+
RMS
|
586 |
+
=
|
587 |
+
�
|
588 |
+
�N
|
589 |
+
i=1(uexac
|
590 |
+
i
|
591 |
+
−uapprox
|
592 |
+
i
|
593 |
+
)
|
594 |
+
2
|
595 |
+
N
|
596 |
+
.
|
597 |
+
(35)
|
598 |
+
4.1
|
599 |
+
Polygonal billiars: case 1
|
600 |
+
This Helmholtz-type PDE is given over the rectangular domain Ω = [−1, 1]×
|
601 |
+
[−1, 1]
|
602 |
+
� ∆u(x) − k2u(x)
|
603 |
+
=
|
604 |
+
f(x),
|
605 |
+
x = (x, y) ∈ Ω,
|
606 |
+
u(x)
|
607 |
+
=
|
608 |
+
g(x),
|
609 |
+
(x, y) ∈ Γ = ∂Ω,
|
610 |
+
(36)
|
611 |
+
10
|
612 |
+
|
613 |
+
where f(x, y) = 2 cos(x2 + y) − (4x2 + 1 + k2)sin(x2 + y) and the parameter
|
614 |
+
k = 9. The BCs of this BVP are of the Dirichlet type, the analytical solution
|
615 |
+
being u(x, y) = sin(x2+y). In our case, we will use the local integral method
|
616 |
+
presented in its original form with Gaussian RBF kernels φ(r) = e−(εr)2 (we
|
617 |
+
will call it LBDIM) and in its stabilized form (SLBDIM).
|
618 |
+
There are several ways to discretize the Ω domain with distributions of
|
619 |
+
nodes. In our case we will use the algorithm for generating quasi-uniform
|
620 |
+
distributions developed in [5] for 2D. These distributions were created with
|
621 |
+
a fast-forward method that generates a set of nodes from a density function
|
622 |
+
starting from the Γ boundary towards the interior of the domain.
|
623 |
+
-1
|
624 |
+
-0.5
|
625 |
+
0
|
626 |
+
0.5
|
627 |
+
1
|
628 |
+
-1
|
629 |
+
-0.8
|
630 |
+
-0.6
|
631 |
+
-0.4
|
632 |
+
-0.2
|
633 |
+
0
|
634 |
+
0.2
|
635 |
+
0.4
|
636 |
+
0.6
|
637 |
+
0.8
|
638 |
+
1
|
639 |
+
-1
|
640 |
+
1
|
641 |
+
-0.5
|
642 |
+
0.5
|
643 |
+
1
|
644 |
+
0
|
645 |
+
0.5
|
646 |
+
0.5
|
647 |
+
0
|
648 |
+
1
|
649 |
+
0
|
650 |
+
-0.5
|
651 |
+
-0.5
|
652 |
+
-1
|
653 |
+
-1
|
654 |
+
Figure 1: Quasi-uniform 2D node distribution for Nint = 916 internal col-
|
655 |
+
location points and Ncol = 124 boundary points with Dirichlet BC (left).
|
656 |
+
Analytical solution of BVP (right).
|
657 |
+
We compare the L2-Error of the formulation of the LBDIM and the SLB-
|
658 |
+
DIM using the Gaussian RBFs in the local interpolations varying the pa-
|
659 |
+
rameter in the form ε ∈ [1, 10].
|
660 |
+
Figure 2 shows that as ε decreases, the
|
661 |
+
accuracy increases but the LBDIM is destabilized and the convergence is
|
662 |
+
interrupted all for cases N = 400, 916, 1610, 3604 quasi-uniform nodes. In
|
663 |
+
turn, we observe that as we increase the number of nodes on the domain
|
664 |
+
and the boundary, the errors decrease. This plot shows that for local in-
|
665 |
+
terpolation with Gaussian RBF lead to a loss in accuracy for small shape
|
666 |
+
parameters.
|
667 |
+
However, the best performance is obtained by the stabilized
|
668 |
+
local integral method to address this Helmholtz-type equation with known
|
669 |
+
analytical solutions. The error for N = 916, 1610, 3604 is of order 1 × 10−8.
|
670 |
+
The application of the RBF-QR kernel makes the system well-posed to solve
|
671 |
+
11
|
672 |
+
|
673 |
+
them with a direct method in the LBDIM. In this numerical experiment the
|
674 |
+
size of the stencil is n = 50.
|
675 |
+
1
|
676 |
+
2
|
677 |
+
3
|
678 |
+
4
|
679 |
+
5
|
680 |
+
6
|
681 |
+
7
|
682 |
+
8
|
683 |
+
9
|
684 |
+
10
|
685 |
+
10 -8
|
686 |
+
10 -6
|
687 |
+
10 -4
|
688 |
+
10 -2
|
689 |
+
10 0
|
690 |
+
LBDIM (N=400)
|
691 |
+
SLBDIM (N=400)
|
692 |
+
LBDIM (N=916)
|
693 |
+
SLBDIM (N=916)
|
694 |
+
LBDIM (N=1610)
|
695 |
+
SLBDIM (N=1610)
|
696 |
+
LBDIM (N=3604)
|
697 |
+
SLBDIM (N=3604)
|
698 |
+
Figure 2: Comparison of the L2-Error between LBDIM and SLBDIM versus
|
699 |
+
the shape parameter ε.
|
700 |
+
In Figure 3 we show the isolines of the error log10(L2-Error) for the range
|
701 |
+
of the shape parameter [1, 10] and for different sizes of stencils n=10:10:100.
|
702 |
+
As n increases, the linear systems increase, worsening the conditioning of
|
703 |
+
the interpolation matrices. To understand the importance of local stability
|
704 |
+
technique, both graphs of this figure must be observed simultaneously. The
|
705 |
+
yellow region at the top left shows the region of error instability due to poor
|
706 |
+
numerical conditioning while in the isolines of the graphs on the right, the
|
707 |
+
region dark blue shows how 1 × 10−8 could be kept in order. As N increases
|
708 |
+
from 916 to 3604 this numerical behaviour is similar reading the figure row-
|
709 |
+
wise.
|
710 |
+
12
|
711 |
+
|
712 |
+
-6
|
713 |
+
-6
|
714 |
+
-6
|
715 |
+
-5
|
716 |
+
-5
|
717 |
+
-5
|
718 |
+
-5
|
719 |
+
-4
|
720 |
+
-4
|
721 |
+
-4
|
722 |
+
-4
|
723 |
+
-3
|
724 |
+
-3
|
725 |
+
-3
|
726 |
+
-3
|
727 |
+
-3
|
728 |
+
-2
|
729 |
+
-2
|
730 |
+
-2
|
731 |
+
-2
|
732 |
+
-2
|
733 |
+
-1
|
734 |
+
-1
|
735 |
+
-1
|
736 |
+
0
|
737 |
+
0
|
738 |
+
2
|
739 |
+
4
|
740 |
+
6
|
741 |
+
8
|
742 |
+
10
|
743 |
+
10
|
744 |
+
20
|
745 |
+
30
|
746 |
+
40
|
747 |
+
50
|
748 |
+
60
|
749 |
+
70
|
750 |
+
80
|
751 |
+
90
|
752 |
+
100
|
753 |
+
-6
|
754 |
+
-5
|
755 |
+
-4
|
756 |
+
-3
|
757 |
+
-2
|
758 |
+
-1
|
759 |
+
0
|
760 |
+
-7
|
761 |
+
-7
|
762 |
+
-6
|
763 |
+
-6
|
764 |
+
-5
|
765 |
+
-5
|
766 |
+
-4
|
767 |
+
-4
|
768 |
+
-3
|
769 |
+
-3
|
770 |
+
-3
|
771 |
+
-2
|
772 |
+
-2
|
773 |
+
-2
|
774 |
+
-1
|
775 |
+
2
|
776 |
+
4
|
777 |
+
6
|
778 |
+
8
|
779 |
+
10
|
780 |
+
10
|
781 |
+
20
|
782 |
+
30
|
783 |
+
40
|
784 |
+
50
|
785 |
+
60
|
786 |
+
70
|
787 |
+
80
|
788 |
+
90
|
789 |
+
100
|
790 |
+
-7
|
791 |
+
-6
|
792 |
+
-5
|
793 |
+
-4
|
794 |
+
-3
|
795 |
+
-2
|
796 |
+
-1
|
797 |
+
-6
|
798 |
+
-6
|
799 |
+
-6
|
800 |
+
-5
|
801 |
+
-5
|
802 |
+
-5
|
803 |
+
-5
|
804 |
+
-4
|
805 |
+
-4
|
806 |
+
-4
|
807 |
+
-4
|
808 |
+
-4
|
809 |
+
-3
|
810 |
+
-3
|
811 |
+
-3
|
812 |
+
-3
|
813 |
+
-3
|
814 |
+
-2
|
815 |
+
-2
|
816 |
+
-2
|
817 |
+
-2
|
818 |
+
-1
|
819 |
+
-1
|
820 |
+
-1
|
821 |
+
0
|
822 |
+
0
|
823 |
+
2
|
824 |
+
4
|
825 |
+
6
|
826 |
+
8
|
827 |
+
10
|
828 |
+
10
|
829 |
+
20
|
830 |
+
30
|
831 |
+
40
|
832 |
+
50
|
833 |
+
60
|
834 |
+
70
|
835 |
+
80
|
836 |
+
90
|
837 |
+
100
|
838 |
+
-6
|
839 |
+
-5
|
840 |
+
-4
|
841 |
+
-3
|
842 |
+
-2
|
843 |
+
-1
|
844 |
+
0
|
845 |
+
-7
|
846 |
+
-7
|
847 |
+
-6
|
848 |
+
-6
|
849 |
+
-5
|
850 |
+
-5
|
851 |
+
-4
|
852 |
+
-4
|
853 |
+
-4
|
854 |
+
-3
|
855 |
+
-3
|
856 |
+
-3
|
857 |
+
-2
|
858 |
+
-2
|
859 |
+
-1
|
860 |
+
2
|
861 |
+
4
|
862 |
+
6
|
863 |
+
8
|
864 |
+
10
|
865 |
+
10
|
866 |
+
20
|
867 |
+
30
|
868 |
+
40
|
869 |
+
50
|
870 |
+
60
|
871 |
+
70
|
872 |
+
80
|
873 |
+
90
|
874 |
+
100
|
875 |
+
-7
|
876 |
+
-6
|
877 |
+
-5
|
878 |
+
-4
|
879 |
+
-3
|
880 |
+
-2
|
881 |
+
-1
|
882 |
+
-6
|
883 |
+
-5
|
884 |
+
-5
|
885 |
+
-5
|
886 |
+
-5
|
887 |
+
-5
|
888 |
+
-4
|
889 |
+
-4
|
890 |
+
-4
|
891 |
+
-4
|
892 |
+
-4
|
893 |
+
-3
|
894 |
+
-3
|
895 |
+
-3
|
896 |
+
-3
|
897 |
+
-2
|
898 |
+
-2
|
899 |
+
-2
|
900 |
+
-1
|
901 |
+
-1
|
902 |
+
0
|
903 |
+
0
|
904 |
+
2
|
905 |
+
4
|
906 |
+
6
|
907 |
+
8
|
908 |
+
10
|
909 |
+
10
|
910 |
+
20
|
911 |
+
30
|
912 |
+
40
|
913 |
+
50
|
914 |
+
60
|
915 |
+
70
|
916 |
+
80
|
917 |
+
90
|
918 |
+
100
|
919 |
+
-6
|
920 |
+
-5
|
921 |
+
-4
|
922 |
+
-3
|
923 |
+
-2
|
924 |
+
-1
|
925 |
+
0
|
926 |
+
-7
|
927 |
+
-7
|
928 |
+
-6
|
929 |
+
-6
|
930 |
+
-5
|
931 |
+
-5
|
932 |
+
-5
|
933 |
+
-4
|
934 |
+
-4
|
935 |
+
-4
|
936 |
+
-3
|
937 |
+
-3
|
938 |
+
-2
|
939 |
+
2
|
940 |
+
4
|
941 |
+
6
|
942 |
+
8
|
943 |
+
10
|
944 |
+
10
|
945 |
+
20
|
946 |
+
30
|
947 |
+
40
|
948 |
+
50
|
949 |
+
60
|
950 |
+
70
|
951 |
+
80
|
952 |
+
90
|
953 |
+
100
|
954 |
+
-7
|
955 |
+
-6
|
956 |
+
-5
|
957 |
+
-4
|
958 |
+
-3
|
959 |
+
-2
|
960 |
+
-1
|
961 |
+
Figure 3: Accuracy isolines (log10(L2-Error)) with Nint = 916, 1610, 3604
|
962 |
+
interior points varying the shape parameter ε and the stencil size n.
|
963 |
+
In [12] this same Helmholtz type PDE is worked with mixed type BC.
|
964 |
+
In said work it can be seen that for N = 900 nodes the L2-Error 1 × 10−5
|
965 |
+
is reached using the Radial Basis Function - Finite Difference (RBF-FD)
|
966 |
+
technique using a kernel hybrid of the Gaussian of type φ(r) = αe−(εr)2 +βr3.
|
967 |
+
13
|
968 |
+
|
969 |
+
4
|
970 |
+
6
|
971 |
+
6
|
972 |
+
8
|
973 |
+
8
|
974 |
+
10
|
975 |
+
10
|
976 |
+
12
|
977 |
+
12
|
978 |
+
14
|
979 |
+
14
|
980 |
+
16
|
981 |
+
16
|
982 |
+
18
|
983 |
+
18
|
984 |
+
20
|
985 |
+
1
|
986 |
+
2
|
987 |
+
3
|
988 |
+
4
|
989 |
+
5
|
990 |
+
6
|
991 |
+
7
|
992 |
+
8
|
993 |
+
9
|
994 |
+
10
|
995 |
+
10
|
996 |
+
20
|
997 |
+
30
|
998 |
+
40
|
999 |
+
50
|
1000 |
+
60
|
1001 |
+
70
|
1002 |
+
80
|
1003 |
+
90
|
1004 |
+
4
|
1005 |
+
6
|
1006 |
+
8
|
1007 |
+
10
|
1008 |
+
12
|
1009 |
+
14
|
1010 |
+
16
|
1011 |
+
18
|
1012 |
+
20
|
1013 |
+
4
|
1014 |
+
4
|
1015 |
+
6
|
1016 |
+
6
|
1017 |
+
8
|
1018 |
+
8
|
1019 |
+
8
|
1020 |
+
10
|
1021 |
+
1
|
1022 |
+
2
|
1023 |
+
3
|
1024 |
+
4
|
1025 |
+
5
|
1026 |
+
6
|
1027 |
+
7
|
1028 |
+
8
|
1029 |
+
9
|
1030 |
+
10
|
1031 |
+
10
|
1032 |
+
20
|
1033 |
+
30
|
1034 |
+
40
|
1035 |
+
50
|
1036 |
+
60
|
1037 |
+
70
|
1038 |
+
80
|
1039 |
+
90
|
1040 |
+
3
|
1041 |
+
4
|
1042 |
+
5
|
1043 |
+
6
|
1044 |
+
7
|
1045 |
+
8
|
1046 |
+
9
|
1047 |
+
10
|
1048 |
+
6
|
1049 |
+
6
|
1050 |
+
8
|
1051 |
+
8
|
1052 |
+
8
|
1053 |
+
10
|
1054 |
+
10
|
1055 |
+
12
|
1056 |
+
12
|
1057 |
+
14
|
1058 |
+
14
|
1059 |
+
16
|
1060 |
+
16
|
1061 |
+
18
|
1062 |
+
18
|
1063 |
+
20
|
1064 |
+
20
|
1065 |
+
1
|
1066 |
+
2
|
1067 |
+
3
|
1068 |
+
4
|
1069 |
+
5
|
1070 |
+
6
|
1071 |
+
7
|
1072 |
+
8
|
1073 |
+
9
|
1074 |
+
10
|
1075 |
+
10
|
1076 |
+
20
|
1077 |
+
30
|
1078 |
+
40
|
1079 |
+
50
|
1080 |
+
60
|
1081 |
+
70
|
1082 |
+
80
|
1083 |
+
90
|
1084 |
+
4
|
1085 |
+
6
|
1086 |
+
8
|
1087 |
+
10
|
1088 |
+
12
|
1089 |
+
14
|
1090 |
+
16
|
1091 |
+
18
|
1092 |
+
20
|
1093 |
+
4
|
1094 |
+
4
|
1095 |
+
6
|
1096 |
+
6
|
1097 |
+
6
|
1098 |
+
8
|
1099 |
+
8
|
1100 |
+
8
|
1101 |
+
10
|
1102 |
+
1
|
1103 |
+
2
|
1104 |
+
3
|
1105 |
+
4
|
1106 |
+
5
|
1107 |
+
6
|
1108 |
+
7
|
1109 |
+
8
|
1110 |
+
9
|
1111 |
+
10
|
1112 |
+
10
|
1113 |
+
20
|
1114 |
+
30
|
1115 |
+
40
|
1116 |
+
50
|
1117 |
+
60
|
1118 |
+
70
|
1119 |
+
80
|
1120 |
+
90
|
1121 |
+
3
|
1122 |
+
4
|
1123 |
+
5
|
1124 |
+
6
|
1125 |
+
7
|
1126 |
+
8
|
1127 |
+
9
|
1128 |
+
10
|
1129 |
+
11
|
1130 |
+
12
|
1131 |
+
6
|
1132 |
+
8
|
1133 |
+
10
|
1134 |
+
10
|
1135 |
+
12
|
1136 |
+
12
|
1137 |
+
12
|
1138 |
+
14
|
1139 |
+
14
|
1140 |
+
16
|
1141 |
+
16
|
1142 |
+
18
|
1143 |
+
18
|
1144 |
+
20
|
1145 |
+
20
|
1146 |
+
1
|
1147 |
+
2
|
1148 |
+
3
|
1149 |
+
4
|
1150 |
+
5
|
1151 |
+
6
|
1152 |
+
7
|
1153 |
+
8
|
1154 |
+
9
|
1155 |
+
10
|
1156 |
+
10
|
1157 |
+
20
|
1158 |
+
30
|
1159 |
+
40
|
1160 |
+
50
|
1161 |
+
60
|
1162 |
+
70
|
1163 |
+
80
|
1164 |
+
90
|
1165 |
+
6
|
1166 |
+
8
|
1167 |
+
10
|
1168 |
+
12
|
1169 |
+
14
|
1170 |
+
16
|
1171 |
+
18
|
1172 |
+
20
|
1173 |
+
4
|
1174 |
+
4
|
1175 |
+
6
|
1176 |
+
6
|
1177 |
+
8
|
1178 |
+
8
|
1179 |
+
10
|
1180 |
+
10
|
1181 |
+
1
|
1182 |
+
2
|
1183 |
+
3
|
1184 |
+
4
|
1185 |
+
5
|
1186 |
+
6
|
1187 |
+
7
|
1188 |
+
8
|
1189 |
+
9
|
1190 |
+
10
|
1191 |
+
10
|
1192 |
+
20
|
1193 |
+
30
|
1194 |
+
40
|
1195 |
+
50
|
1196 |
+
60
|
1197 |
+
70
|
1198 |
+
80
|
1199 |
+
90
|
1200 |
+
3
|
1201 |
+
4
|
1202 |
+
5
|
1203 |
+
6
|
1204 |
+
7
|
1205 |
+
8
|
1206 |
+
9
|
1207 |
+
10
|
1208 |
+
Figure 4: Condition number isolines (log10(κ(Ai)) with Nint=916,1610,3604
|
1209 |
+
interior points varying the shape parameter ε and the stencil size n.
|
1210 |
+
In Figure 4 the isolines condition number log10(κ(Ai) is shown.
|
1211 |
+
The
|
1212 |
+
range of the shape parameter is [1, 10] and the for different sizes of stencils
|
1213 |
+
are n=10:10:100. As n increases, the conditioning of the local interpolation
|
1214 |
+
matrices increases. The yellow region at the top left shows the region of
|
1215 |
+
the condition number up to 1 × 1020. In the isolines of the graphs on the
|
1216 |
+
right column, the region dark blue shows better conditioning up to 1 × 1010.
|
1217 |
+
This ten order of magnitude are significant when when using linear solvers
|
1218 |
+
14
|
1219 |
+
|
1220 |
+
numerically. Also we can observe thar as N increases from 916 to 3604 the
|
1221 |
+
conditioning behaviour is similar reading the figure row-wise.
|
1222 |
+
In Figure 3 it was observed that the error plots suggest smaller values
|
1223 |
+
of ε0 for better accuracy, whereas in this figure the condition isolines plots
|
1224 |
+
suggest the larger values of ε for better stability. This numerical results are
|
1225 |
+
interpreted as the well-known uncertainty principle in RBF local interpola-
|
1226 |
+
tions [17]. The idea behind this principle is that one cannot simultaneously
|
1227 |
+
achieve good conditioning and high accuracy using RBF basis. The relation
|
1228 |
+
between numerical stability and accuracy may be reviewed from different
|
1229 |
+
perspectives as in our case to obtain a stable formulation our option was to
|
1230 |
+
find a better basis in the same space of approximation using RBF-QR [7] in
|
1231 |
+
the local boundary domain integral method.
|
1232 |
+
4.2
|
1233 |
+
Polygonal billiars: case 2
|
1234 |
+
Consider the following two-dimensional Helmholtz equation
|
1235 |
+
� ∆u(x, y) + k2u(x, y)
|
1236 |
+
=
|
1237 |
+
f(x, y),
|
1238 |
+
Ω = [0, 1] × [0, 1],
|
1239 |
+
u(x, y)
|
1240 |
+
=
|
1241 |
+
g(x, y),
|
1242 |
+
Γ = ∂Ω,
|
1243 |
+
(37)
|
1244 |
+
where k2 = 2, f(x, y) = 2x − 4y and the exact solution is given by u(x, y) =
|
1245 |
+
sin(
|
1246 |
+
√
|
1247 |
+
3x)sinh(y) + cos(
|
1248 |
+
√
|
1249 |
+
2y) + x − 2y, and g(x, y) is chosen to match the
|
1250 |
+
exact one, thus giving BC of type Dirichlet. We use quasi-uniform nodes
|
1251 |
+
within the domain and stencils of size n = 25 counting the collocation center
|
1252 |
+
as shown in Figure 5.
|
1253 |
+
0
|
1254 |
+
0.2
|
1255 |
+
0.4
|
1256 |
+
0.6
|
1257 |
+
0.8
|
1258 |
+
1
|
1259 |
+
0
|
1260 |
+
0.1
|
1261 |
+
0.2
|
1262 |
+
0.3
|
1263 |
+
0.4
|
1264 |
+
0.5
|
1265 |
+
0.6
|
1266 |
+
0.7
|
1267 |
+
0.8
|
1268 |
+
0.9
|
1269 |
+
1
|
1270 |
+
0
|
1271 |
+
0.2
|
1272 |
+
0.4
|
1273 |
+
0.6
|
1274 |
+
0.8
|
1275 |
+
1
|
1276 |
+
0
|
1277 |
+
0.1
|
1278 |
+
0.2
|
1279 |
+
0.3
|
1280 |
+
0.4
|
1281 |
+
0.5
|
1282 |
+
0.6
|
1283 |
+
0.7
|
1284 |
+
0.8
|
1285 |
+
0.9
|
1286 |
+
1
|
1287 |
+
Figure 5: Quasi-uniform node distribution with N = 900 interior nodes (left).
|
1288 |
+
Stencil node sets with n = 25 (right).
|
1289 |
+
15
|
1290 |
+
|
1291 |
+
In Table 1 we show the accuracy of the SLBDIM for the shape parameter
|
1292 |
+
ε = 1 and for a range of low values, ε ∈ {1 × 100, 1 × 10−1, 1 × 10−2, 1 ×
|
1293 |
+
10−3, 1 × 10−4, 1 × 10−5}. The number of quasi-uniform interior points of
|
1294 |
+
the domain, N, varies from 121 to 900. It can be seen that for fixed ε = 1,
|
1295 |
+
the ´orders of magnitude decrease from 1 × 10−6 to 1 × 10−8 starting at 441
|
1296 |
+
nodes. In turn, the convergence of the method is observed for low values of
|
1297 |
+
the shape parameter, reaching RMS of the order 1 × 10−8 from 225 nodes.
|
1298 |
+
The ε shown is where the best error is reached in that range.
|
1299 |
+
N
|
1300 |
+
SLBDIM
|
1301 |
+
SLBDIM
|
1302 |
+
ϵ
|
1303 |
+
RMS
|
1304 |
+
low ϵ
|
1305 |
+
RMS
|
1306 |
+
121
|
1307 |
+
1.0
|
1308 |
+
1.2028E-06
|
1309 |
+
0.1
|
1310 |
+
2.1405E-07
|
1311 |
+
225
|
1312 |
+
1.0
|
1313 |
+
5.8570E-07
|
1314 |
+
0.1
|
1315 |
+
5.0834E-08
|
1316 |
+
361
|
1317 |
+
1.0
|
1318 |
+
3.9338E-07
|
1319 |
+
0.01
|
1320 |
+
3.3821E-08
|
1321 |
+
441
|
1322 |
+
1.0
|
1323 |
+
7.8581e-08
|
1324 |
+
0.1
|
1325 |
+
3.3866E-08
|
1326 |
+
530
|
1327 |
+
1.0
|
1328 |
+
5.2907E-08
|
1329 |
+
0.00001
|
1330 |
+
3.5984E-08
|
1331 |
+
628
|
1332 |
+
1.0
|
1333 |
+
4.3843E-08
|
1334 |
+
0.00001
|
1335 |
+
3.6887E-08
|
1336 |
+
Table 1: RMS for low shape parameters ε ∈ {1 × 10−1, . . . , 1 × 10−5}.
|
1337 |
+
In [11] this differential problem with mixed BC over the same domain
|
1338 |
+
is investigated using Multiquadric RBF kernels ϕ(r, ε) =
|
1339 |
+
�
|
1340 |
+
1 + (εr)2 and a
|
1341 |
+
new RBF with N ∈ [50, 350] placement points. The results obtained in said
|
1342 |
+
reference reach errors of the order of 1 × 10−5 for ε ∈ [0.4].
|
1343 |
+
5
|
1344 |
+
Summary
|
1345 |
+
In this work we have introduced a new local integral method to compute reso-
|
1346 |
+
nances in dielectric cavities with different shapes. We have discussed numer-
|
1347 |
+
ical solutions, the node quasi-uniform node distributions over the domains
|
1348 |
+
and cavities with corners. Numerical results for Helmholtz-type equations
|
1349 |
+
were obtained using a stabilized local integral method that uses interpola-
|
1350 |
+
tions with RBF Gaussians. This method does not depend on a mesh, so it
|
1351 |
+
can be easily adapted to problems with complex geometries from . The good
|
1352 |
+
performance of the method has been shown with good results as shown in
|
1353 |
+
numerical tests 1 and 2 comparing with other results in the literature. Test 1
|
1354 |
+
shows the advantage of using the SLBDIM to find regions of convergence of
|
1355 |
+
the L2-Error of the order 1×10−8 when the shape parameter approaches zero.
|
1356 |
+
16
|
1357 |
+
|
1358 |
+
In test 2, a low shape parameter range is studied reaching the same order of
|
1359 |
+
the RMS. Having investigated the computational efficiency of the method,
|
1360 |
+
the future work consists of approaching some applications in wave chaos and
|
1361 |
+
dielectric microresonators, which is adequate to deal with geometries that
|
1362 |
+
come from arbitrary domains without analytical solutions.
|
1363 |
+
References
|
1364 |
+
[1] C. Brebbia and D. Dominguez. Boundary Elements. An Introductory
|
1365 |
+
Course. 2nd Ed. WIT Press, Computational Mechanics Publications,
|
1366 |
+
Southampton and Boston, 1998.
|
1367 |
+
[2] H. Cao and J. Wiersig. Dielectric microcavities: Model systems for wave
|
1368 |
+
chaos and non-hermitian physics. Reviews of Modern Physics, 87:61–111,
|
1369 |
+
2015.
|
1370 |
+
[3] G. Fasshauer. Meshfree Approximation Methods with MATLAB. World
|
1371 |
+
Scientific Publishing Co., Hackensack, NJ, USA, 2007.
|
1372 |
+
[4] G. Fasshauer and M. McCourt. Kernel-based Approximation Methods
|
1373 |
+
using MATLAB. World Scientific Publishing Co., Hackensack, NJ, USA,
|
1374 |
+
2015.
|
1375 |
+
[5] B. Fornberg and N. Flyer. Fast generation of 2-D node distributions
|
1376 |
+
for mesh-free PDE discretizations. Computers and Mathematics with
|
1377 |
+
Applications, 69:531–544, 2015.
|
1378 |
+
[6] B. Fornberg and N. Flyer. A Primer on Radial Basis Functions with Ap-
|
1379 |
+
plications to the Geosciences. Society for Industrial and Applied Math-
|
1380 |
+
ematics, Philadelphia, PA, USA, 2015.
|
1381 |
+
[7] B. Fornberg, E. Larsson, and N. Flyer. Stable Computations with Gaus-
|
1382 |
+
sian Radial Basis Functions. SIAM Journal of Scientific Computing,
|
1383 |
+
33:869–892, 2011.
|
1384 |
+
[8] M. Greenberg. Applications of Green’s Functions in Science and Engi-
|
1385 |
+
neering. Dover Publications, Mineola, New York, 2015.
|
1386 |
+
17
|
1387 |
+
|
1388 |
+
[9] D. Kaufman, I. Kosztin, and K. Schulten. Expansion method for station-
|
1389 |
+
ary states of quantum billiards. American Journal of Physics, 67:133–
|
1390 |
+
141, 1999.
|
1391 |
+
[10] E. Larsson, E. Lehto, A. Heryudono, and B. Fornberg. Stable Compu-
|
1392 |
+
tation of Differentiation Matrices and Scattered Node Stencils on Gaus-
|
1393 |
+
sian Radial Basis Functions. SIAM Journal of Scientific Computating,
|
1394 |
+
35:A2096–A2119, 2013.
|
1395 |
+
[11] J. Lin, W. Chen, and K. Sze. A new radial basis function for helmholtz
|
1396 |
+
problems. Engineering Analysis with Boundary Elements, 36(12):1923–
|
1397 |
+
1930, 2012.
|
1398 |
+
[12] P. Mishra, G. Fasshauer, M. Sen, and L. Ling. A stabilized radial basis-
|
1399 |
+
finite difference (RBF-FD) method with hybrid kernels. Computers &
|
1400 |
+
Mathematics with Applications, 77(9):2354–2368, 2019.
|
1401 |
+
[13] P. Partridge and C. B. andL.C. Wrobel. The Dual Reciprocity Boundary
|
1402 |
+
Element Method. Computational Mechanics Publications co-published
|
1403 |
+
with Elsevier Applied Science, Southampton Boston, 1992.
|
1404 |
+
[14] L. Ponzellini Marinelli. Estabilidad num´erica de un m´etodo local inte-
|
1405 |
+
gral basado en funciones de base radial para problemas de valores de
|
1406 |
+
contorno. Universidad Nacional de Rosario, 2021:164 p´aginas, 2021.
|
1407 |
+
[15] L. Ponzellini Marinelli. Stabilizing radial basis functions techniques for
|
1408 |
+
a local boundary integral method.
|
1409 |
+
Revista de la Uni´on Matem´atica
|
1410 |
+
Argentina, 64:in press, 2021.
|
1411 |
+
[16] L. Ponzellini Marinelli, N. Caruso, and M. Portapila. A stable com-
|
1412 |
+
putation on local boundary-domain integral method for elliptic PDE.
|
1413 |
+
Mathematics and Computers in Simulation, 180:379–400, 2021.
|
1414 |
+
[17] R. Schaback. Error estimates and condition numbers for Radial Basis
|
1415 |
+
Function interpolants. Advances in Computational Mathematics, 3:251–
|
1416 |
+
264, 1995.
|
1417 |
+
[18] H.-J. St¨ockmann. Quantum Chaos: An Introduction. Cambridge Uni-
|
1418 |
+
versity Press, Cambridge, UK, 1999.
|
1419 |
+
18
|
1420 |
+
|
1421 |
+
[19] L. Trefethen. Spectral Methods in Matlab. Society for Industrial and
|
1422 |
+
Applied Mathematics, Philadelphia, PA, USA, 2000.
|
1423 |
+
[20] J. Wiersig. Boundary element method for resonances in dielectric mi-
|
1424 |
+
crocavities.
|
1425 |
+
Journal of Optics A: Pure and Applied Optics, 5:53–60,
|
1426 |
+
2003.
|
1427 |
+
19
|
1428 |
+
|
ANAyT4oBgHgl3EQfRffl/content/tmp_files/load_file.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
AdAzT4oBgHgl3EQfhf3-/content/tmp_files/2301.01487v1.pdf.txt
ADDED
@@ -0,0 +1,1594 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
Automated Misconfiguration Repair of Configurable
|
2 |
+
Cyber-Physical Systems with Search: an Industrial
|
3 |
+
Case Study on Elevator Dispatching Algorithms
|
4 |
+
Pablo Valle
|
5 |
+
Mondragon University
|
6 |
+
Mondragon, Spain
|
7 | |
8 |
+
Aitor Arrieta
|
9 |
+
Mondragon University
|
10 |
+
Mondragon, Spain
|
11 | |
12 |
+
Maite Arratibel
|
13 |
+
Orona
|
14 |
+
Hernani, Spain
|
15 | |
16 |
+
Abstract—Real-world Cyber-Physical Systems (CPSs) are usu-
|
17 |
+
ally configurable. Through parameters, it is possible to configure,
|
18 |
+
select or unselect different system functionalities. While this
|
19 |
+
provides high flexibility, it also becomes a source for failures
|
20 |
+
due to misconfigurations. The large number of parameters these
|
21 |
+
systems have and the long test execution time in this context
|
22 |
+
due to the use of simulation-based testing make the manual
|
23 |
+
repair process a cumbersome activity. Subsequently, in this
|
24 |
+
context, automated repairing methods are paramount. In this
|
25 |
+
paper, we propose an approach to automatically repair CPSs’
|
26 |
+
misconfigurations. Our approach is evaluated with an industrial
|
27 |
+
CPS case study from the elevation domain. Experiments with a
|
28 |
+
real building and data obtained from operation suggests that our
|
29 |
+
approach outperforms a baseline algorithm as well as the state of
|
30 |
+
the practice (i.e., manual repair carried out by domain experts).
|
31 |
+
Index Terms—Cyber-Physical Systems, Repair, Debugging,
|
32 |
+
Configurable Systems.
|
33 |
+
I. INTRODUCTION
|
34 |
+
Cyber-Physical Systems combine digital cyber computa-
|
35 |
+
tions with parallel physical processes [1]–[3]. In such sys-
|
36 |
+
tems, digital technologies, such as computational units, low
|
37 |
+
and high-level software and communication protocols interact
|
38 |
+
among them to control a physical process through sensors and
|
39 |
+
actuators [1]. In practice, most CPSs deal with parameters.
|
40 |
+
For instance, a heavy duty lifting system involved more than
|
41 |
+
2,000 configuration parameters [4]. The behavior of CPSs can
|
42 |
+
significantly change depending on these parameters. This often
|
43 |
+
causes misconfigurations, even when selecting parameters that
|
44 |
+
are within the ranges provided by the manufacturer [5]. A
|
45 |
+
recent study showed that 19.6% of UAV-specific bugs were
|
46 |
+
caused by parameters [6]. Garcia et al. [7] found that 27.25%
|
47 |
+
of autonomous vehicle bugs were caused by incorrect con-
|
48 |
+
figurations. In our industrial case study, which involves the
|
49 |
+
traffic dispatching algorithm of a system of elevators, around
|
50 |
+
55% of the issues assigned to the traffic team are solved
|
51 |
+
through configuration changes. Therefore, it is paramount to
|
52 |
+
leverage automated and scalable techniques to automatically
|
53 |
+
repair CPS misconfigurations. However, this involves four core
|
54 |
+
challenges:
|
55 |
+
1) Challenge 1 – Expensive execution of the tests: It
|
56 |
+
is well-known that executing CPS tests is highly time-
|
57 |
+
consuming [8]–[15]. This is because, as the execution
|
58 |
+
of tests is carried out at system level, CPSs involve
|
59 |
+
compute-intensive models to simulate the physical part of
|
60 |
+
the system (e.g., models of electrical engines, dynamics
|
61 |
+
of a system). This makes the computation of the fitness
|
62 |
+
to assess how close the algorithm is from repairing the
|
63 |
+
misconfiguration expensive. For instance, in our industrial
|
64 |
+
case study, executing a test case takes around 5 minutes.
|
65 |
+
2) Challenge 2 – Large configuration space: Since con-
|
66 |
+
figurable CPSs involve many parameters, the amount of
|
67 |
+
possible configurations that a CPS can have is huge.
|
68 |
+
Subsequently, testing all of these configurations is compu-
|
69 |
+
tationally unfeasible [16]–[21]. Furthermore, it is usually
|
70 |
+
unknown which the reason (i.e., the parameters) that
|
71 |
+
causes the misconfiguration is.
|
72 |
+
3) Challenge 3 – Multiple requirements: Multiple fail-
|
73 |
+
ing requirements may exist. Some of them might be
|
74 |
+
independent from one-another [15], while others may be
|
75 |
+
conflicting (e.g., in our case study, better energy con-
|
76 |
+
sumption could lead to passengers needing to wait more).
|
77 |
+
Therefore, the repair algorithm shall be approached as a
|
78 |
+
many-objective optimization problem.
|
79 |
+
4) Challenge 4 – Prioritize severe failures: The repair
|
80 |
+
technique needs to resolve failures in their order of sever-
|
81 |
+
ity [15]. For instance a test case that shows a passengers’
|
82 |
+
average waiting time (AWT) of 55 seconds is more
|
83 |
+
critical than one showing 35 seconds. Therefore, similar
|
84 |
+
to other CPS repairing techniques [15], our algorithm
|
85 |
+
shall give priority to more critical test cases over the less
|
86 |
+
critical ones.
|
87 |
+
On the one hand, there are approaches that target the prob-
|
88 |
+
lem of repairing misconfigurations [22], [23] of configurable
|
89 |
+
software. However, such approaches only cover the second
|
90 |
+
aforementioned challenge. On the other hand, Swarmbug [24]
|
91 |
+
focuses on repairing misconfigurations of swarm robots, which
|
92 |
+
can be considered CPSs. However, Swarmbug [24] solely
|
93 |
+
focuses on one specific objective (e.g., not crashing), therefore,
|
94 |
+
not tackling the third and fourth challenges that our industrial
|
95 |
+
case study requires.
|
96 |
+
arXiv:2301.01487v1 [cs.SE] 4 Jan 2023
|
97 |
+
|
98 |
+
In this paper we propose an automated repairing approach
|
99 |
+
specifically targeting CPSs’ misconfigurations. Specifically,
|
100 |
+
we tackle this by recasting the misconfiguration repair problem
|
101 |
+
to that of a many-objective search problem. To deal with
|
102 |
+
the aforementioned first challenge, we propose an algorithm
|
103 |
+
that follows a single population-based approach. Multiple
|
104 |
+
population-based algorithms, such as genetic algorithms, are
|
105 |
+
not appropriate for this context because the repair process
|
106 |
+
requires interaction with the simulator for executing test cases.
|
107 |
+
Such algorithms require a large population, and the large test
|
108 |
+
execution time would lead the algorithm to require too much
|
109 |
+
time to converge. This could eventually lead to scalability is-
|
110 |
+
sues in the context of CPSs. To deal with the second challenge,
|
111 |
+
our repairing approach implements a strategy that permits
|
112 |
+
measuring the suspiciousness of each parameter. This permits,
|
113 |
+
as the search process evolves, increasing the probability of
|
114 |
+
selecting suspicious parameters to provide a new patch. As a
|
115 |
+
result, in the beginning of the search, our approach focuses
|
116 |
+
on exploring which the critical parameters can be. As the
|
117 |
+
search evolves, the algorithm starts to focus on the exploitation
|
118 |
+
by targeting suspicious parameters. To deal with the third
|
119 |
+
challenge, our approach includes a Pareto-optimal archive-
|
120 |
+
based strategy to select and evolve potential misconfiguration
|
121 |
+
patches. This permits focusing on more than one requirement
|
122 |
+
at the same time when repairing the misconfiguration. To deal
|
123 |
+
with the last challenge, search objectives are prioritized based
|
124 |
+
on their severity level.
|
125 |
+
Our main contributions can be highlighted as follows:
|
126 |
+
1) We propose a scalable and automated approach to repair
|
127 |
+
misconfigurations in CPSs.
|
128 |
+
2) We integrate the approach with an industrial case study
|
129 |
+
from Orona, one of the largest elevator companies in
|
130 |
+
Europe. The case study involves the traffic dispatching
|
131 |
+
algorithm, a highly configurable software system.
|
132 |
+
3) We empirically evaluate our approach by using a real
|
133 |
+
scenario in which Orona’s engineers had to manually
|
134 |
+
intervene in the misconfiguration repair process. Our
|
135 |
+
repairing technique not only outperforms a baseline al-
|
136 |
+
gorithm, but also the manually derived repairing patches
|
137 |
+
by Orona’s domain experts.
|
138 |
+
4) We extract key lessons learned from the application of
|
139 |
+
our approach in an industrial case study, and provide ap-
|
140 |
+
plicability guidelines in order our approach to be adopted
|
141 |
+
by other CPS developers.
|
142 |
+
The rest of the paper is structured as follows: Section II
|
143 |
+
explains our industrial case study, how the testing is carried out
|
144 |
+
and why misconfigurations occur. In Section III we present our
|
145 |
+
approach to repair misconfigurations in our industrial context.
|
146 |
+
Section IV presents how we evaluated our approach. We ex-
|
147 |
+
tract key lessons learned and we explain the required changes
|
148 |
+
in our approach to be applied in other CPSs in Section V.
|
149 |
+
We position our work with relevant studies in Section VI. We
|
150 |
+
conclude and present future work in Section VII.
|
151 |
+
II. INDUSTRIAL CASE STUDY
|
152 |
+
Our repair algorithm is applied in an industrial case study
|
153 |
+
from the elevation domain. This section explains the different
|
154 |
+
details of the case study.
|
155 |
+
The Cyber-Physical System: Figure 1 shows an overview
|
156 |
+
of the CPS. A system of elevators is a complex CPS, whose
|
157 |
+
goal is to transport passengers from one floor to another safely
|
158 |
+
while trying to provide the highest comfort as possible. In this
|
159 |
+
system, a passenger registers a call in a floor by pushing a call
|
160 |
+
button. This information is transferred to the traffic master
|
161 |
+
through a Controller Area Network (CAN) bus. The traffic
|
162 |
+
master, after collecting other CPS information (e.g., position of
|
163 |
+
each elevator, elevator occupancy), assigns one of the available
|
164 |
+
elevators to each active call. This assignation can be carried
|
165 |
+
out through different objectives (e.g., reducing the passengers’
|
166 |
+
waiting times, reducing energy consumption). When the call
|
167 |
+
is assigned, the elevator attends the passenger.
|
168 |
+
Elevator 1
|
169 |
+
Elevator 2
|
170 |
+
Elevator 3
|
171 |
+
Floor 1
|
172 |
+
Floor 2
|
173 |
+
Floor N
|
174 |
+
Controller Area Network
|
175 |
+
Controller 1
|
176 |
+
Controller 2
|
177 |
+
Controller 3
|
178 |
+
Traffic Master (SUT)
|
179 |
+
Fig. 1: Overview of our industrial case study
|
180 |
+
The System Under Test (SUT): Our SUT is the traffic
|
181 |
+
dispatching algorithm (i.e., dispatcher), which is an important
|
182 |
+
module inside the traffic master. To deal with different func-
|
183 |
+
tionalities and priorities, the dispatcher is highly configurable
|
184 |
+
through parameters. Different traffic dispatching algorithms
|
185 |
+
exist in Orona, and each of them encompasses one config-
|
186 |
+
uration file. The number of potential configurations of each
|
187 |
+
dispatcher is over trillions.
|
188 |
+
Test Executions: Three different phases are undertaken
|
189 |
+
when testing the dispatching algorithm [25], [26]: the
|
190 |
+
Software-in-the-Loop (SiL), the Hardware-in-the-Loop (HiL)
|
191 |
+
and Operation. Our algorithm is designed for the first phase,
|
192 |
+
i.e., the SiL test level. At this stage, a domain-specific
|
193 |
+
simulator, i.e., Elevate1, takes as input (1) the dispatching
|
194 |
+
algorithm’s executable, (2) the building installation, (3) the
|
195 |
+
configuration ��le and (4) the passenger file. The passenger
|
196 |
+
file is considered the test input, and it involves a set of
|
197 |
+
1https://peters-research.com/index.php/elevate/
|
198 |
+
|
199 |
+
passengers traveling through different floors in a building.
|
200 |
+
Each passenger has different attributes, such as, its arrival
|
201 |
+
time (i.e., time at which the passenger arrives to the floor
|
202 |
+
and pushes the button), arrival floor (i.e., floor at which the
|
203 |
+
passenger arrives), destination floor (i.e., floor at which the
|
204 |
+
passenger is traveling to), passenger weight, etc. When a test
|
205 |
+
is executed, Elevate returns a file with the results of the
|
206 |
+
simulation (e.g., waiting time required by each passenger, their
|
207 |
+
traveling time, energy consumption, distance traveled by each
|
208 |
+
elevator). This information is parsed and the necessary test
|
209 |
+
oracles are employed to assess the quality of the execution of
|
210 |
+
the test.
|
211 |
+
Functional performance requirements: When executing
|
212 |
+
test cases, besides considering certain functional require-
|
213 |
+
ments, we focus on “functional performance requirements”.
|
214 |
+
Functional performance is defined as “the properties derived
|
215 |
+
indirectly from the output of the system, rather than the
|
216 |
+
system’s efficient usage of the computational resources” [26].
|
217 |
+
These properties are directly employed for evaluating the
|
218 |
+
functional performance requirements of Orona’s dispatching
|
219 |
+
algorithms. The properties involve metrics from the elevator
|
220 |
+
traffic domain, such as the Average Waiting Time (AWT) of
|
221 |
+
passengers, the Average Transit Time (ATT) of passengers,
|
222 |
+
Longest Waiting Time (LWT), Longest Transit Time (LTT),
|
223 |
+
number of engine starts, traveled distance by each elevator
|
224 |
+
or consumed energy. Note that configuration changes affect
|
225 |
+
functional performance requirements, whereas functional re-
|
226 |
+
quirements (e.g., ensuring that reverse journeys do not take
|
227 |
+
place) are, in principle, not affected by such changes.
|
228 |
+
Why misconfigurations occur and how they are handled:
|
229 |
+
The dispatcher has different parameters to accommodate dif-
|
230 |
+
ferent functionalities that have a direct impact on the CPS per-
|
231 |
+
formance. However, it is noteworthy that a configuration may
|
232 |
+
perform well in one installation of elevators, while not well
|
233 |
+
in another one, causing a misconfiguration. This is because
|
234 |
+
the performance of a system of elevators largely depends on
|
235 |
+
(1) the type of building and its composition and (2) how its
|
236 |
+
traffic flow is. Regarding the former, the performance can vary
|
237 |
+
depending on aspects like number of elevators in a building,
|
238 |
+
the number of floors the building has, whether all elevators
|
239 |
+
attend all floors or not, etc. For some types of buildings, some
|
240 |
+
configurations are more appropriate than others. As for the
|
241 |
+
latter, the traffic is also different depending on the type of
|
242 |
+
buildings. For instance, the traffic flow is completely different
|
243 |
+
in a hospital and in a residential building. While in a hospital
|
244 |
+
inter-floor travels are common, in a residential building most
|
245 |
+
of the calls are from the base floor to the floor where the
|
246 |
+
apartment is and vice-versa. When a system of elevators shows
|
247 |
+
a poor performance, its traffic flow is reproduced at the SiL
|
248 |
+
test level to debug and try to improve its performance through
|
249 |
+
changing parameters. If a new set of parameters improves
|
250 |
+
the system performance, then, the original configuration is
|
251 |
+
considered a misconfiguration. It is important to note that
|
252 |
+
in our industrial case study, a misconfiguration might not be
|
253 |
+
detected nor foreseen before the system is in operation due to
|
254 |
+
the CPS exposition to uncertainty [27], [28].
|
255 |
+
III. CPS MISCONFIGURATION REPAIR METHOD
|
256 |
+
Algorithm 1 shows an overview of our repairing algo-
|
257 |
+
rithm. The algorithm takes as input (1) a faulty configu-
|
258 |
+
ration file C, composed of N number of parameters, i.e.,
|
259 |
+
C = {p1, p2, ..., pN}; and (2) a test suite, composed of M
|
260 |
+
failing test cases, i.e., TS = {tc1, tc2, ..., tcM}. The first step
|
261 |
+
of the algorithm consists on assessing the failing configuration
|
262 |
+
file, where all the parameter values are parsed (Line 1) and
|
263 |
+
all test cases are executed (Line 2). When the failing test
|
264 |
+
suite is executed, the values returned by the oracle are used to
|
265 |
+
initialize the Archive (Line 3) and the suspiciousness scores
|
266 |
+
of parameters initialized (Line 4). After that, the algorithm
|
267 |
+
enters into a while loop (Lines 5-11) that ends when the
|
268 |
+
termination criteria are met. These criteria involve (1) fixing
|
269 |
+
the misconfiguration or (2) exceeding the running time.
|
270 |
+
Algorithm 1: Overview of our search-based repairing
|
271 |
+
algorithm
|
272 |
+
Input: C //Faulty Configuration file
|
273 |
+
TS //Test Suite
|
274 |
+
Output: Archive //Archive containing improved
|
275 |
+
configurations
|
276 |
+
1 Patch0 ← getValues(C);
|
277 |
+
2 InitialScore← executeTestSuite(Patch0, TS);
|
278 |
+
3 Archive ← saveToArchive(Patch0, InitialScore);
|
279 |
+
4 Susp ← initSusp();
|
280 |
+
5 while terminationCriteriaNotMet do
|
281 |
+
6
|
282 |
+
Parent ← selectAParentArchive(Archive);
|
283 |
+
7
|
284 |
+
Patch1 ← generatePatch(Parent,Susp);
|
285 |
+
8
|
286 |
+
Score ← executeTestSuite(Patch1, TS);
|
287 |
+
9
|
288 |
+
Susp ← updateSusp(Patch1, Parent, Score,
|
289 |
+
ScoreParent);
|
290 |
+
10
|
291 |
+
Archive ← saveToArchive(Patch1, Score);
|
292 |
+
11 end
|
293 |
+
12 return Archive;
|
294 |
+
Inside this while loop, the first step consists in selecting a
|
295 |
+
solution from the Archive (Line 6), which will be the parent.
|
296 |
+
The solution is selected pure randomly. With the selected
|
297 |
+
solution, a potential patch is proposed (Line 7), which consists
|
298 |
+
of changing one or more parameters from the parent solution
|
299 |
+
(Section III-A). This patch is assessed by executing the failing
|
300 |
+
test suite (Line 8), and the test execution results are obtained
|
301 |
+
and stored as Scores (Section III-B). In a fourth step, the
|
302 |
+
suspiciousness score of each parameter is recalculated (Line
|
303 |
+
9, Section III-C). Lastly, the Archive is updated (Line 10,
|
304 |
+
Section III-D).
|
305 |
+
A. Patch generation
|
306 |
+
A patch in our context refers to a mutation of at least one
|
307 |
+
parameter. Algorithm 2 shows our algorithm for proposing a
|
308 |
+
potential patch. As input, it receives (1) a parent configuration,
|
309 |
+
which corresponds to one configuration in the archive of the
|
310 |
+
algorithm and (2) the suspiciousness ranking of all parameters.
|
311 |
+
First, a parameter to be mutated is selected (Line 4) based on
|
312 |
+
|
313 |
+
the suspiciousness of each parameter (see Section
|
314 |
+
III-C for
|
315 |
+
more details on how to compute the suspiciousness score).
|
316 |
+
The higher the suspiciousness, the higher the probability of
|
317 |
+
being selected. The parameter to be mutated is obtained by
|
318 |
+
employing Algorithm 3. The selected parameter is mutated
|
319 |
+
(Line 5) by giving a random value within its ranges. After
|
320 |
+
this, it is decided whether a new parameter is mutated (Line
|
321 |
+
8). The probability of mutating a new parameter decreases as
|
322 |
+
the number of mutated parameters in the new patch increases.
|
323 |
+
We ensure that one parameter is not mutated more than once.
|
324 |
+
Algorithm 2: Patch generation algorithm
|
325 |
+
Input: Parent //Faulty Configuration
|
326 |
+
SuspRanking //Suspiciousness Ranking
|
327 |
+
Output: Patch //Mutated Configuration
|
328 |
+
1 numOfMutParams ← 0;
|
329 |
+
2 Patch ← Parent;
|
330 |
+
3 do
|
331 |
+
4
|
332 |
+
varToMutate ← selectParam(SuspRanking);
|
333 |
+
5
|
334 |
+
Patch ← mutate(Patch,varToMutate);
|
335 |
+
6
|
336 |
+
numOfMutParams ← numOfMutParams +1;
|
337 |
+
7
|
338 |
+
p ← rand(); //returns random value 0 to 1
|
339 |
+
8 while p < 0.5numOfMutatedP arams;
|
340 |
+
9 return Patch;
|
341 |
+
Algorithm 3: Suspiciousness-based parameter selec-
|
342 |
+
tion algorithm
|
343 |
+
Input: SuspScore = {ss1, ss2, ..., ssN}
|
344 |
+
Output: selected //Index of the selected parameter
|
345 |
+
1 total ← �N
|
346 |
+
i=1(ssi);
|
347 |
+
2 iterativeSum←0;
|
348 |
+
3 prob ← [];
|
349 |
+
4 for i ← 1 to nPop do
|
350 |
+
5
|
351 |
+
prob[i] ← iterativeSum + SuspScore[i]/total;
|
352 |
+
6
|
353 |
+
iterativeSum←prob[i];
|
354 |
+
7 end
|
355 |
+
8 prob←orderAscending(prob);
|
356 |
+
9 r←rand();//Returns random number 0 to 1
|
357 |
+
10 j←0;
|
358 |
+
11 selected=N;
|
359 |
+
12 while j<N and selected==N do
|
360 |
+
13
|
361 |
+
if r<prob[j] then
|
362 |
+
14
|
363 |
+
selected←j;
|
364 |
+
15
|
365 |
+
j←j+1;
|
366 |
+
16 end
|
367 |
+
17 return parameter(selected); //translates index of
|
368 |
+
selected to parameter ID
|
369 |
+
B. Test suite execution
|
370 |
+
After the patch is generated, this needs to be assessed. We
|
371 |
+
assess each patch by re-executing all test cases in the test
|
372 |
+
suite that have failed. We do not execute the passing test cases
|
373 |
+
because executing such test cases would significantly increase
|
374 |
+
the computational time of our approach. Furthermore, for the
|
375 |
+
sake of increasing the efficiency of our repair algorithm, the
|
376 |
+
process of executing test cases is parallelized. When executing
|
377 |
+
the test suite, test oracles assess the performance of the system.
|
378 |
+
In our context, similar to other approaches [8]–[11], [14], [15],
|
379 |
+
[29], test oracles not only provide a boolean verdict (i.e., Pass
|
380 |
+
or Fail), but also a confidence value. The lower the value, the
|
381 |
+
lower the performance of the CPS in terms of the assessed
|
382 |
+
property by such test oracle.
|
383 |
+
These oracles’ confidence values are used as search objec-
|
384 |
+
tives to guide the repair algorithm towards finding effective
|
385 |
+
patches. For repairing a CPS, a total of k test oracles may exist.
|
386 |
+
Each of these k oracles acts as an individual objective function
|
387 |
+
in the repair algorithm. For each test case (tc) in the failing
|
388 |
+
test suite (TS), each of these k oracles returns its confidence
|
389 |
+
value, i.e., Conf(tc, oi) ∈ [−1, 0], where oi is the i-th
|
390 |
+
oracle. -1 means that the severity of the failure is the highest
|
391 |
+
contemplated one, whereas 0 means that the oracle has passed.
|
392 |
+
The repair algorithm aims at maximizing that confidence
|
393 |
+
value. Therefore, after executing all test cases in TS, similar
|
394 |
+
to Abdessalemm et al., [15], we obtain the minimum value for
|
395 |
+
each of the test oracles (i.e., the most severe value), converting
|
396 |
+
the repair problem in a many-objective optimization problem
|
397 |
+
that gives priority to the most severe failures, such that:
|
398 |
+
�
|
399 |
+
�
|
400 |
+
�
|
401 |
+
�
|
402 |
+
�
|
403 |
+
max Oracle1(Patch) = min
|
404 |
+
tc∈T S{Conf(tc, o1)}
|
405 |
+
...
|
406 |
+
max Oraclek(Patch) = min
|
407 |
+
tc∈T S{Conf(tc, ok)}
|
408 |
+
(1)
|
409 |
+
As previously explained, executing a test in the context
|
410 |
+
of CPSs is time consuming. Previous studies using compute-
|
411 |
+
intensive CPSs have leveraged surrogate models to accelerate
|
412 |
+
the generation of test cases [8], [10], [13], [14]. That is,
|
413 |
+
after a set of test executions, a model is trained with test
|
414 |
+
results, and this model is employed as a substitute of the
|
415 |
+
simulation-based test execution. This permits accelerating the
|
416 |
+
generation of test cases. While we considered to use surrogate
|
417 |
+
models to accelerate the repair process, we noticed that too
|
418 |
+
many simulations were required to obtain a reliable surrogate
|
419 |
+
model. Unlike previous approaches [8], [10], [13], [14], which
|
420 |
+
only use the dimension of the test input, configurable CPSs
|
421 |
+
also need to consider the dimension of parameters, which
|
422 |
+
makes it harder to train a surrogate model. After carrying out
|
423 |
+
a preliminary evaluation with our industrial case study, we
|
424 |
+
noticed that the required time to obtain data for building a
|
425 |
+
reliable surrogate model was similar or even higher than the
|
426 |
+
time required by our repair algorithm to converge. Therefore,
|
427 |
+
the option of using a surrogate model to accelerate the repair
|
428 |
+
process was discarded.
|
429 |
+
C. Measuring parameter suspiciousness
|
430 |
+
Based on analyzing the behavior of our industrial case
|
431 |
+
study, and by interviewing domain experts, we noticed that
|
432 |
+
some parameters have a higher influence than others on the
|
433 |
+
system performance. Therefore, we implement a mechanism
|
434 |
+
to measure the suspiciousness of each parameter in C. The
|
435 |
+
|
436 |
+
suspiciousness provides a score between 0 and 1, where the
|
437 |
+
higher the suspiciousness, the higher the likelihood of the
|
438 |
+
parameter having an influence in the system performance. The
|
439 |
+
ultimate goal of this strategy is to give a higher probability of
|
440 |
+
being mutated to those parameters having an influence in the
|
441 |
+
system performance.
|
442 |
+
All configurable parameters start with the same suspicious-
|
443 |
+
ness score, which is 0.5. This suspiciousness remains un-
|
444 |
+
changed until the parameter is mutated by the Patch generation
|
445 |
+
algorithm for Nsusp times (we employed Nsusp = 5 in our
|
446 |
+
experiments). This permits the algorithm to focus on the
|
447 |
+
exploration phase at the beginning of the search process, while
|
448 |
+
focusing on the exploitation as the search process evolves.
|
449 |
+
Every time a parameter is mutated by the Patch generation
|
450 |
+
algorithm, after assessing the patch, we extract whether the
|
451 |
+
parameter had (1) a positive impact on the performance of the
|
452 |
+
system, (2) a negative impact on the performance of the system
|
453 |
+
or (3) no impact at all. A positive impact of a parameter pi
|
454 |
+
is considered when the patch is non-dominated by any other
|
455 |
+
patch in the system based on the test results. A negative impact
|
456 |
+
of a parameter pi is considered when the patch is dominated
|
457 |
+
by the solutions in the archive (i.e., including its original
|
458 |
+
parent). The patch does not have any impact for a parameter
|
459 |
+
pi when the result of the test shows the same performance
|
460 |
+
as its original parent. After a parameter pi is selected Nsusp
|
461 |
+
times, its suspiciousness starts to be computed as follows:
|
462 |
+
susp(pi) =
|
463 |
+
Ppi + Npi
|
464 |
+
Ppi + Npi + Spi
|
465 |
+
(2)
|
466 |
+
where Ppi is the number of times that parameter pi had a
|
467 |
+
positive impact, Npi is the number of times that the parameter
|
468 |
+
pi had a negative impact and Spi is the number of times that
|
469 |
+
the parameter pi had no impact at all.
|
470 |
+
Notice that either the positive or the negative impact in-
|
471 |
+
crease the suspiciousness of a particular parameter. This is
|
472 |
+
because the patch is proposed by mutating the value of a pa-
|
473 |
+
rameter by another random value within its ranges. Therefore,
|
474 |
+
another value in a parameter that previously had a negative
|
475 |
+
impact may have a positive impact on the CPS performance.
|
476 |
+
Based on our analysis, the suspiciousness of the parameters
|
477 |
+
in the context of CPSs is, in principle, unknown, even with
|
478 |
+
domain expertise. This is, to a large extent, because CPSs
|
479 |
+
highly depend on the context at which they operate. For
|
480 |
+
instance, in the case of our industrial case study, a parameter
|
481 |
+
can have a large impact on the performance of the CPS
|
482 |
+
depending on the type of building (e.g., parameters may
|
483 |
+
behave differently in a residential building with 2 elevators
|
484 |
+
or in a hospital building with 4 elevators). For this reason, we
|
485 |
+
assume there is no prior knowledge of the impact a parameter
|
486 |
+
may have in the context of a CPS. However, our approach
|
487 |
+
for measuring the suspiciousness of parameters can easily be
|
488 |
+
extended to other strategies (e.g., providing the algorithm with
|
489 |
+
an initial suspiciousness score for each of the parameters in
|
490 |
+
the configuration).
|
491 |
+
D. Updating the Archive
|
492 |
+
Our algorithm uses an archive encompassing non-dominated
|
493 |
+
solutions that are generated by including patches. The first
|
494 |
+
configuration file being updated in the archive is the misconfig-
|
495 |
+
uration provoking the failure. After assessing a patch (Patch1)
|
496 |
+
by executing the failing test suite, the archive needs to be
|
497 |
+
updated. Such patch is compared with the rest of solutions
|
498 |
+
in the archive. The comparison is based on the notion of
|
499 |
+
dominance, and similar to other studies [15], the archive is
|
500 |
+
updated as follows:
|
501 |
+
1) If Patch1 dominates at least one solution in the archive,
|
502 |
+
Patch1 is included in the archive, and the dominated
|
503 |
+
solutions are removed.
|
504 |
+
2) If no element in the archive dominates Patch1, but
|
505 |
+
Patch1 is neither dominated by any solution in the
|
506 |
+
archive, Patch1 is included in the archive.
|
507 |
+
3) The archive remains unchanged if Patch1 is dominated
|
508 |
+
by at least one solution in the archive.
|
509 |
+
By following this strategy, there is some risk that the archive
|
510 |
+
increases in size. This would lead the algorithm to need much
|
511 |
+
more time to converge. To overcome this problem, if the
|
512 |
+
archive exceeds certain size, we remove solutions from it.
|
513 |
+
Same as Abdessalem et al., [15], the maximum size of our
|
514 |
+
archive is limited to 2 × k, k being the number of oracles.
|
515 |
+
However, unlike [15], instead of randomly removing the
|
516 |
+
solution from the archive, we removed the solution which had
|
517 |
+
the longest Average Waiting Time (AWT). This decision was
|
518 |
+
taken because in the elevation domain, this is the main metric
|
519 |
+
used to assess the performance of a dispatching algorithm [30].
|
520 |
+
If two or more solutions encompassed the same highest AWT,
|
521 |
+
the choice is random among those two solutions.
|
522 |
+
E. Stopping criteria
|
523 |
+
The repair process stops given two criteria: (1) all test cases
|
524 |
+
in TS pass, i.e., all oracles in all test cases return the 0
|
525 |
+
value; or (2) the search budget is exceeded (i.e., repairing
|
526 |
+
time was exceeded). If the latter happens, it might be the case
|
527 |
+
where the test cases are too demanding. Therefore, the repair
|
528 |
+
process would be converted into a parameter optimization
|
529 |
+
problem. For instance, by analyzing our industrial case study
|
530 |
+
with the elevator dispatching algorithm, we noticed that some
|
531 |
+
test inputs may encompass too many passenger calls in a short
|
532 |
+
time window. In such cases, the CPS may enter in a saturation
|
533 |
+
state, where the only solution would be to include additional
|
534 |
+
elevators to better attend calls, something that is out of the
|
535 |
+
scope of the dispatching algorithm’s competence.
|
536 |
+
F. Decision maker
|
537 |
+
When the repairing algorithm stops due to the search budget
|
538 |
+
being exceeded, there might be a high probability that more
|
539 |
+
than one solution exists in the Archive. In such a case,
|
540 |
+
a decision maker (DM) with certain rules would need to
|
541 |
+
select one of the solutions and propose it as a patch. This
|
542 |
+
decision maker is, in our case, domain-specific. The DM
|
543 |
+
was a rule-based algorithm that was designed by involving
|
544 |
+
domain experts in the process. The specified thresholds are
|
545 |
+
|
546 |
+
configurable because some thresholds may be valid in certain
|
547 |
+
buildings but not in others. The algorithm follows the next
|
548 |
+
procedure to decide which patch to propose:
|
549 |
+
1) It first selects all patches where the AWT is less than
|
550 |
+
25 seconds. This is the threshold that an international
|
551 |
+
standard considers as a good performance of a system
|
552 |
+
of elevators [31]. Since the AWT is the most widely
|
553 |
+
employed metric to assess the quality of a system of
|
554 |
+
elevators [30], we gave first priority to this metric. If
|
555 |
+
there is no solution meeting that requirement, we select
|
556 |
+
the patch that exhibits the lowest AWT.
|
557 |
+
2) If more than one patch remains, the DM prioritizes
|
558 |
+
patches whose test execution showed a lower number
|
559 |
+
of passengers waiting above 55 seconds. That threshold
|
560 |
+
is specified to be below 10%, which was considered
|
561 |
+
an affordable number. Domain experts considered that
|
562 |
+
waiting nearly a minute is an anti-pattern, therefore, they
|
563 |
+
decided to give priority to those solutions that exhibited a
|
564 |
+
low number of passengers waiting more than 55 seconds.
|
565 |
+
3) In a third stage, if more than one patch exists in the set of
|
566 |
+
candidate solutions, priority is given to the ATT metric.
|
567 |
+
The DM selects those solutions that have a lower ATT
|
568 |
+
than 45 seconds. If there are no solution meeting that
|
569 |
+
requirement, we select the patch that exhibits the lowest
|
570 |
+
ATT.
|
571 |
+
4) If multiple patch candidates keep existing, the DM selects
|
572 |
+
those solution whose test execution showed a lower
|
573 |
+
number of passengers having a transit time above 70
|
574 |
+
seconds. That threshold was specified to be below 10%,
|
575 |
+
as it was considered an affordable number.
|
576 |
+
5) After that, in the event that more than one candidate
|
577 |
+
patch existed, the DM selected the patch with lowest
|
578 |
+
LWT, which was considered of higher importance than
|
579 |
+
the LTT. If more than a patch existed, the patch with
|
580 |
+
lowest LTT was chosen. Although the possibilities are
|
581 |
+
remote, it is still possible to have more than one solution.
|
582 |
+
In such a case, the similarity of the configuration files of
|
583 |
+
the candidate patches is compared with the original con-
|
584 |
+
figuration file through the well-known hamming distance
|
585 |
+
metric. The one which has more similarity is chosen. The
|
586 |
+
reasons are two-fold. On the one hand, engineers are
|
587 |
+
not usually eager to change too many parameters from
|
588 |
+
the original configuration file. This is because, what it is
|
589 |
+
good for certain passenger flows, it may not be good for
|
590 |
+
others. On the other hand, we conjecture that the higher
|
591 |
+
the number of parameters that have been changed, the
|
592 |
+
higher the probability that the solution is overfitted to the
|
593 |
+
failing test suite. Therefore, by means of this mechanism,
|
594 |
+
we aim at reducing the probability for our plausible patch
|
595 |
+
to be overfitted.
|
596 |
+
G. Patch confirmation
|
597 |
+
Since we only use a failing test suite to repair the mis-
|
598 |
+
configuration, the patch needs to be retested. This way, we
|
599 |
+
ensure that the patch is not overfitted to the failing test suite,
|
600 |
+
which is a core problem of automated program repair [32]–
|
601 |
+
[35]. This can be carried out following any kind of state-of-the-
|
602 |
+
art technique. In our case, we use a regression test oracle [26]
|
603 |
+
and execute synthetic test inputs (i.e., test inputs based on
|
604 |
+
templates for full-day theoretical passenger profiles [36] and
|
605 |
+
up and down-peak profiles suggested by international elevator
|
606 |
+
standards [31]). We ensure that the new patch does not perform
|
607 |
+
worse than the original patch. Besides, we test its functionality
|
608 |
+
by employing metamorphic testing with shorter test cases, as
|
609 |
+
proposed by Ayerdi et al. [37], [38].
|
610 |
+
IV. EVALUATION
|
611 |
+
In our evaluation, we aimed at answering the following two
|
612 |
+
research questions (RQs):
|
613 |
+
• RQ1 – Sanity check: How does our approach compare
|
614 |
+
to the baseline? To assess whether the problem to solve
|
615 |
+
is trivial, the first RQ is a sanity check. To do so,
|
616 |
+
we implemented an unguided version of our repairing
|
617 |
+
algorithm.
|
618 |
+
• RQ2 – Comparison with state of the practice: How
|
619 |
+
does our approach compare to manual repair carried
|
620 |
+
out by domain experts? The current practice at Orona
|
621 |
+
is to manually repair the misconfigurations. This RQ
|
622 |
+
aims at comparing whether our algorithm is competent
|
623 |
+
when compared to a manual repair process carried out
|
624 |
+
by domain experts in the company.
|
625 |
+
A. Experimental Setup
|
626 |
+
1) System Under Test and Building: We used Orona’s
|
627 |
+
Conventional Group Control (CGC) traffic dispatching algo-
|
628 |
+
rithm [30], which has also been used in other studies [27],
|
629 |
+
[28], [37]–[39]. Furthermore, we used a real installation to
|
630 |
+
assess our approach. The installation involved a total of three
|
631 |
+
elevators and 12 floors. We used this installation because it was
|
632 |
+
a real case where Orona had to manually intervene to resolve
|
633 |
+
the misconfiguration. Furthermore, the manual misconfigura-
|
634 |
+
tion process taken by the engineers was well documented. In
|
635 |
+
addition, we also had access to the operational data obtained
|
636 |
+
from the conflicting installation to be used as failing test
|
637 |
+
inputs. In total, we used three failure-inducing test inputs,
|
638 |
+
involving 16 hours of passenger flow each, and between 3,105
|
639 |
+
and 3,769 passengers in total.
|
640 |
+
The version of the algorithm we used involved a total of
|
641 |
+
43 parameters. The total number of potential configurations
|
642 |
+
ascends to over 9.3 × 1092, which makes the search space too
|
643 |
+
large to employ brute force.
|
644 |
+
2) Test oracles: By carefully analyzing the internal docu-
|
645 |
+
ment Orona used to give solution to the conflicting installa-
|
646 |
+
tion, we defined six oracles based on the metrics they were
|
647 |
+
aiming to optimize. Below we explain the selected functional
|
648 |
+
performance metrics:
|
649 |
+
• Average Waiting Time (AWT): It measures the average
|
650 |
+
waiting time of all passengers. The waiting time refers to
|
651 |
+
the time since a passenger registers a call until an elevator
|
652 |
+
arrives to attend her.
|
653 |
+
|
654 |
+
• Longest Waiting Time (LWT): It measures the longest
|
655 |
+
waiting time experienced by the passengers.
|
656 |
+
• % of passengers with Waiting Time (WT) above 55
|
657 |
+
seconds: It measures the percentage of passengers who
|
658 |
+
had to wait more than 55 seconds.
|
659 |
+
• Average Transit Time (ATT): It measures the average
|
660 |
+
transit time of all passengers. The transit time refers to
|
661 |
+
the time since a passenger enters a lift until it arrives to
|
662 |
+
its destination.
|
663 |
+
• Longest Transit Time (LTT): It measures the longest
|
664 |
+
transit time of all passengers.
|
665 |
+
• % of passengers with Transit Time (TT) above 70 sec-
|
666 |
+
onds: It measures the percentage of passengers who had
|
667 |
+
a transit time above 70 seconds.
|
668 |
+
When repairing this misconfiguration, the domain experts
|
669 |
+
aimed at improving as much as possible the functional per-
|
670 |
+
formance metrics listed above. Therefore, in the context of
|
671 |
+
this study, we opted for being aggressive with the thresholds.
|
672 |
+
Therefore, all thresholds were set to 0. We acknowledge that
|
673 |
+
these values are unfeasible to obtain. However, this way the
|
674 |
+
comparison with the manual approach is fairer. Furthermore,
|
675 |
+
we also wanted to assess the patch that the DM selected.
|
676 |
+
3) Execution platform: Elevate version 8.19 was used as
|
677 |
+
simulator for executing the tests. The experiments were carried
|
678 |
+
out using a PC with a Windows 10 operating system, with a
|
679 |
+
CPU Intel Core i5 7th generation, and a 16 Gb RAM.
|
680 |
+
4) Baseline algorithm and state of the practice comparison:
|
681 |
+
As baseline algorithm, we developed an unguided version of
|
682 |
+
our repairing algorithm. Two core differences exists between
|
683 |
+
the unguided version and the repair algorithm proposed in this
|
684 |
+
paper: (1) the unguided version saves all configurations in the
|
685 |
+
archive and (2) the parameters to be mutated are considered all
|
686 |
+
to have the same suspiciousness score (i.e., the suspiciousness
|
687 |
+
is not measured in this version). It is noteworthy that this
|
688 |
+
baseline is stronger than a pure Random Search (RS), which
|
689 |
+
is the usual baseline algorithm used to assess search-based
|
690 |
+
software engineering problems [17], [19], [40]–[43]. This is
|
691 |
+
because, RS would take the initial failing configuration and
|
692 |
+
propose some patches based on our patch generation approach
|
693 |
+
(Algorithm 2). However, with RS, these generated patches
|
694 |
+
would not evolve anymore. Conversely, with our unguided
|
695 |
+
approach, we give the option of evolving patches in the
|
696 |
+
archive, leading to higher probabilities of finding a patch.
|
697 |
+
As for the comparison with the state of the practice, for
|
698 |
+
the building installation used, we had data from engineers
|
699 |
+
from Orona. Specifically, when the issue was raised, engineers
|
700 |
+
from Orona proposed different potential patches (i.e., different
|
701 |
+
configurations of the dispatcher). We compared the results
|
702 |
+
obtained by our algorithm with the patches proposed by
|
703 |
+
the domain experts. Six different patches were provided by
|
704 |
+
Orona’s engineers.
|
705 |
+
5) Evaluation
|
706 |
+
Metrics:
|
707 |
+
As
|
708 |
+
our
|
709 |
+
algorithm
|
710 |
+
is
|
711 |
+
Pareto-
|
712 |
+
compliant, we had to assess all the solutions in the archive as a
|
713 |
+
whole. Because of this, and based on related guidelines [44],
|
714 |
+
[45], we used the Hypervolume (HV) quality indicator. The
|
715 |
+
HV is one of the most widely employed metrics to assess
|
716 |
+
Pareto-based search algorithms [44]–[46]. The HV measures
|
717 |
+
the volume in the objective space of a search algorithm, and
|
718 |
+
has many advantages [46], such as, (1) being Pareto compliant,
|
719 |
+
(2) being able to evaluate convergence and the diversity of
|
720 |
+
a solution set simultaneously and (3) only requiring one
|
721 |
+
reference point.
|
722 |
+
Besides the HV quality indicator, as we designed a DM,
|
723 |
+
we also compared each of the six objective functions used
|
724 |
+
as performance metrics in the test oracles for the solutions
|
725 |
+
proposed by the DM after the search budget was exceeded.
|
726 |
+
6) Statistical tests: Since the employed algorithms are non-
|
727 |
+
deterministic, we run each algorithm 10 times. We could not
|
728 |
+
afford more runs given that the search budget was selected to
|
729 |
+
be 12 hours. Therefore, in total we employed 10 (runs) × 12
|
730 |
+
(hours) × 2 (baseline and repair algorithms) = 240 hours for
|
731 |
+
executing the experiments.
|
732 |
+
To assess the statistical significance, we employed the
|
733 |
+
Wilcoxon rank sum test. We considered that there was statis-
|
734 |
+
tical significance between both algorithms when the p-value
|
735 |
+
was lower than 0.05. In addition, we employed the Vargha
|
736 |
+
and Delaney ˆA12 value, which measures the probability of a
|
737 |
+
technique being better than the other one.
|
738 |
+
7) Algorithm configuration: We gave 12 hours of time
|
739 |
+
budget to both, our algorithm and the baseline algorithm.
|
740 |
+
Similar to [15], the maximum number of solutions in the
|
741 |
+
archive was set to 12 (i.e., 6 objective function × 2). We
|
742 |
+
also set the parameter Nsusp = 5, which means that the
|
743 |
+
suspiciousness of a parameter is neutral (i.e., suspiciousness
|
744 |
+
score of 0.5) until it is mutated 5 times.
|
745 |
+
B. Analysis and Discussion of the Results
|
746 |
+
1) RQ1 – Sanity check: Figure 2 shows the average HV
|
747 |
+
score of the 10 runs for both, the repair algorithm proposed in
|
748 |
+
this paper and the baseline algorithm, which is the unguided
|
749 |
+
version of the repair algorithm. As it can be appreciated,
|
750 |
+
the repair approach showed a higher average HV than the
|
751 |
+
baseline after the second execution hour. By the time the
|
752 |
+
search budget was expired, the repair algorithm showed a 29%
|
753 |
+
average improvement over the baseline in terms of the HV
|
754 |
+
quality indicator. It is noteworthy that the HV values are quite
|
755 |
+
low. The reasons for this is that the HV favors knee points of
|
756 |
+
a solution set in a Pareto-frontier [45]. As explained before,
|
757 |
+
in our case, the specified threshold values were 0 (i.e., the
|
758 |
+
repair algorithm aims at optimizing as much as possible all the
|
759 |
+
functional performance metrics). Achieving such value was not
|
760 |
+
realistic, and therefore we did not have knee values. Besides,
|
761 |
+
6 different oracles (i.e., fitness functions) were employed to
|
762 |
+
guide the search towards providing patches. Nevertheless, a
|
763 |
+
low HV value makes not unfair the comparison between both
|
764 |
+
techniques, which is the goal of the first RQ.
|
765 |
+
These results were further corroborated by means of statisti-
|
766 |
+
cal tests. Table I shows the ˆA12 as well as p-values (computed
|
767 |
+
by employing the Wilcoxon rank sum test) for each of the 12
|
768 |
+
hours when comparing the repair algorithm with the baseline.
|
769 |
+
The ˆA12 shows the probability of the repair algorithm being
|
770 |
+
better than its unguided version. As suggested by Romano et
|
771 |
+
|
772 |
+
Fig. 2: Average value of the 10 runs for the hypervolume
|
773 |
+
quality indicator when comparing the repair and unguided
|
774 |
+
algorithms
|
775 |
+
al. [47], we categorized the difference existing between the
|
776 |
+
repair algorithm and its baseline as negligible if d < 0.147,
|
777 |
+
as small if d < 0.33, as medium if d < 0.474 and as large
|
778 |
+
if d >= 0.474, where d = 2| ˆA12 − 0.5|. According to this
|
779 |
+
categorization, the difference was negligible during the first
|
780 |
+
execution hour, small between the second and third execution
|
781 |
+
hours and medium during the fourth execution hour. In these
|
782 |
+
first four execution hours, there was no statistical significance
|
783 |
+
between the repair algorithm and the baseline. Conversely,
|
784 |
+
after the fifth hour, there was statistical significance (i.e., p-
|
785 |
+
value < 0.05) with large effect sizes based on the related
|
786 |
+
categorization [47], all of them in favor of our approach.
|
787 |
+
TABLE I: RQ1 – Summary of the statistical tests when
|
788 |
+
comparing the repair algorithm with its unguided version for
|
789 |
+
the HV quality indicator over the execution of 12 hours. An
|
790 |
+
ˆA12 value higher than 0.5 means that the results are in favor
|
791 |
+
of the repair algorithm. Statistical significance is set as p-
|
792 |
+
val<0.05
|
793 |
+
Hour
|
794 |
+
ˆA12
|
795 |
+
p-val
|
796 |
+
1
|
797 |
+
0.51
|
798 |
+
0.9698
|
799 |
+
2
|
800 |
+
0.61
|
801 |
+
0.4273
|
802 |
+
3
|
803 |
+
0.65
|
804 |
+
0.2730
|
805 |
+
4
|
806 |
+
0.71
|
807 |
+
0.1212
|
808 |
+
5
|
809 |
+
0.80
|
810 |
+
0.0256
|
811 |
+
6
|
812 |
+
0.86
|
813 |
+
0.0081
|
814 |
+
7
|
815 |
+
0.89
|
816 |
+
0.0040
|
817 |
+
8
|
818 |
+
0.82
|
819 |
+
0.0172
|
820 |
+
9
|
821 |
+
0.85
|
822 |
+
0.0090
|
823 |
+
10
|
824 |
+
0.85
|
825 |
+
0.0090
|
826 |
+
11
|
827 |
+
0.90
|
828 |
+
0.0028
|
829 |
+
12
|
830 |
+
0.92
|
831 |
+
0.0017
|
832 |
+
Besides the HV, we also analyzed the individual patches
|
833 |
+
provided by the decision maker (DM). In this case, the aim
|
834 |
+
of the algorithm was to reduce such metrics. Therefore, an
|
835 |
+
ˆA12 lower than 0.5 means that the repair algorithm performed
|
836 |
+
better. Table II summarizes the statistical tests for the ten runs
|
837 |
+
and each individual objective function. There was statistical
|
838 |
+
significance in half of the objective functions (i.e., LWT, ATT
|
839 |
+
and LTT). For such cases, the effect sizes were large (i.e.,
|
840 |
+
ˆA12 between 0.18 to 0.2). For the remaining objectives, where
|
841 |
+
there was no statistical significance, in the case of the AWT
|
842 |
+
and %WT>55, the effect sizes showed a negligible difference,
|
843 |
+
whereas for the case of %TT>70, the difference was small.
|
844 |
+
TABLE II: Summary of the statistical test results when com-
|
845 |
+
paring the patches provided by the DM when employing repair
|
846 |
+
algorithm against the baseline and manual repair approaches
|
847 |
+
vs. Baseline
|
848 |
+
vs. Manual
|
849 |
+
ˆA12
|
850 |
+
p-val
|
851 |
+
ˆA12
|
852 |
+
p-val
|
853 |
+
AWT
|
854 |
+
0.52
|
855 |
+
0.9097
|
856 |
+
0.10
|
857 |
+
0.0014
|
858 |
+
LWT
|
859 |
+
0.18
|
860 |
+
0.0165
|
861 |
+
0.20
|
862 |
+
0.0161
|
863 |
+
%WT>55s
|
864 |
+
0.47
|
865 |
+
0.8788
|
866 |
+
0.00
|
867 |
+
<0.0001
|
868 |
+
ATT
|
869 |
+
0.20
|
870 |
+
0.0312
|
871 |
+
0.40
|
872 |
+
0.4429
|
873 |
+
LTT
|
874 |
+
0.20
|
875 |
+
0.010
|
876 |
+
0.00
|
877 |
+
<0.0001
|
878 |
+
%TT>70s
|
879 |
+
0.37
|
880 |
+
0.3438
|
881 |
+
0.00
|
882 |
+
<0.0001
|
883 |
+
Table III show the average value of each of the functional
|
884 |
+
performance metrics used by the oracles for the 10 runs and
|
885 |
+
the patches provided by the DMs. These results were somehow
|
886 |
+
consistent with those from Table II. As it can be appreciated,
|
887 |
+
the most striking difference relates to the LWT and the LTT
|
888 |
+
functional performance metrics. On the contrary, for the AWT,
|
889 |
+
%WT>55, ATT and %TT>70, the differences were not that
|
890 |
+
large. This could be due to the nature of the DM. Note
|
891 |
+
that for those metrics, the DM accepts values that are below
|
892 |
+
certain thresholds (e.g., AWT < 25 seconds), whereas for LWT
|
893 |
+
and LTT, the DM selects those patches with lowest values.
|
894 |
+
However, in all metrics except the AWT, our algorithm showed
|
895 |
+
lower average values.
|
896 |
+
TABLE III: Comparison between the misconfigured configu-
|
897 |
+
ration file, the patch provided by the DM with the manual
|
898 |
+
repair, the average values of the patches returned by the DM
|
899 |
+
for the baseline algorithm and the average values of the patches
|
900 |
+
returned by the DM for the repair algorithm
|
901 |
+
Misconf
|
902 |
+
Manual
|
903 |
+
Baseline DM
|
904 |
+
Repair DM
|
905 |
+
AWT
|
906 |
+
25.99
|
907 |
+
23.10
|
908 |
+
22.66
|
909 |
+
22.77
|
910 |
+
LWT
|
911 |
+
435.70
|
912 |
+
223.00
|
913 |
+
241.55
|
914 |
+
213.72
|
915 |
+
%WT >55s
|
916 |
+
12.78
|
917 |
+
11.99
|
918 |
+
9.93
|
919 |
+
9.92
|
920 |
+
ATT
|
921 |
+
42.01
|
922 |
+
41.60
|
923 |
+
41.77
|
924 |
+
41.58
|
925 |
+
LTT
|
926 |
+
209.80
|
927 |
+
220.60
|
928 |
+
206.24
|
929 |
+
195.56
|
930 |
+
%TT>70s
|
931 |
+
10.24
|
932 |
+
10.02
|
933 |
+
9.64
|
934 |
+
9.45
|
935 |
+
In conclusion, the first RQ can be answered as follows:
|
936 |
+
Answer to the first RQ: The repair algorithm outper-
|
937 |
+
formed the baseline algorithm. The average improvement
|
938 |
+
extent of the repair algorithm with respect to the baseline
|
939 |
+
was around 29% when considering the HV quality indi-
|
940 |
+
cator. Furthermore, there was statistical significance with
|
941 |
+
large effect sizes when comparing individual patches pro-
|
942 |
+
posed by the DM for half of the objective functions, all
|
943 |
+
of them in favor of the repair algorithm. All this suggests
|
944 |
+
that the problem of repairing CPSs misconfigurations is
|
945 |
+
non-trivial, and therefore, automated and scalable repair
|
946 |
+
techniques are necessary.
|
947 |
+
2) RQ2 – Comparison with manual repair: With the second
|
948 |
+
RQ, we aimed at comparing the proposed repairing algorithm
|
949 |
+
|
950 |
+
Hypervolume
|
951 |
+
0.014
|
952 |
+
0.012
|
953 |
+
0.01
|
954 |
+
C
|
955 |
+
0.008
|
956 |
+
o- Repair
|
957 |
+
0.006
|
958 |
+
Unguided
|
959 |
+
-- Manual
|
960 |
+
0.004
|
961 |
+
-0
|
962 |
+
G中
|
963 |
+
0.002
|
964 |
+
0d
|
965 |
+
2
|
966 |
+
4
|
967 |
+
6
|
968 |
+
8
|
969 |
+
10
|
970 |
+
0
|
971 |
+
12
|
972 |
+
Execution hourswith the manual process of repairing the misconfiguration by
|
973 |
+
domain experts. Specifically, these domain experts provided a
|
974 |
+
total of 6 patches. With those patches, and by applying the six
|
975 |
+
oracles in our algorithm, we derived the HV metric. As can
|
976 |
+
be seen in Figure 2, the HV was quite low. This was because
|
977 |
+
only four patches were non-dominated, whereas our archive is
|
978 |
+
capable of handling up to twelve patches. Therefore, those four
|
979 |
+
patches were not able to cover a large volume in the objective
|
980 |
+
space. Furthermore, it is important to note that the time was not
|
981 |
+
considered here, because we do not have such information. In
|
982 |
+
terms of the HV, the average improvement extent of our repair
|
983 |
+
algorithm over the manually derived patches was up to 77.5%.
|
984 |
+
For this case, we also employed the DM to select one of
|
985 |
+
the non-dominated patches. Table II shows the statistical tests
|
986 |
+
carried out when comparing the patches provided by the DM
|
987 |
+
after executing the repair algorithm with the patch proposed
|
988 |
+
by the DM after processing the four non-dominated solutions.
|
989 |
+
As it can be appreciated, in five out of six metrics there
|
990 |
+
was statistical significance, where the effect size showed a
|
991 |
+
large difference according to the categorization proposed by
|
992 |
+
Romano et al. [47]. All these effect sizes were in favor of the
|
993 |
+
repair algorithm. On the other hand, for the case where there
|
994 |
+
was no statistical significance, i.e., for the case of the ATT
|
995 |
+
metric, the difference was small in terms of the ˆA12 value,
|
996 |
+
but in favor of the repair algorithm.
|
997 |
+
The improvement extent for each functional performance
|
998 |
+
metric obtained by the patches provided by the DM (over 10
|
999 |
+
runs) with respect to the manual approach can be appreciated
|
1000 |
+
in Table III. These results are consistent with the statistical
|
1001 |
+
tests, where it can be appreciated a similar average value in the
|
1002 |
+
case of the ATT. In this case, the improvement extent is higher
|
1003 |
+
in the cases of the AWT, % WT > 55, LTT and %WT>70
|
1004 |
+
when compared to the baseline algorithm. However, in relation
|
1005 |
+
to the LWT, the improvement was only of 10 seconds on
|
1006 |
+
average, unlike with the baseline, where the improvement was
|
1007 |
+
of nearly 29 seconds on average.
|
1008 |
+
In summary, the second RQ can be answered as follows:
|
1009 |
+
Answer to the second RQ: The repair algorithm
|
1010 |
+
outperformed the manual repair process. The average
|
1011 |
+
improvement extent of the repair algorithm with re-
|
1012 |
+
spect to the patches provided by the domain experts
|
1013 |
+
was around 77.5% when considering the HV quality
|
1014 |
+
indicator. Furthermore, there was statistical significance
|
1015 |
+
with large effect sizes when comparing individual patches
|
1016 |
+
proposed by the DM in five out of six objective functions.
|
1017 |
+
In addition, our approach provides a fully automated
|
1018 |
+
approach, which can therefore increase the productivity
|
1019 |
+
of engineers from Orona when dealing with misconfigu-
|
1020 |
+
rations of the traffic dispatching algorithm.
|
1021 |
+
C. Threats to Validity
|
1022 |
+
We now summarize the threats to validity of our study and
|
1023 |
+
the measures taken to mitigate them.
|
1024 |
+
An internal validity threat in our evaluation could be related
|
1025 |
+
to the parameters used in the algorithms, which were not
|
1026 |
+
changed. Three main parameters need to be configured (1)
|
1027 |
+
the time budget, which was set to 12 hours; (2) the number of
|
1028 |
+
time a parameter needs to be selected to start computing its
|
1029 |
+
suspiciousness score (i.e., Nsusp), which is set to 5; and (3) the
|
1030 |
+
number of solutions in the archive. The first two parameters
|
1031 |
+
were selected based on preliminary evaluations. Coversely, the
|
1032 |
+
maximum number of solutions in the archive was the same as
|
1033 |
+
other repair approaches targeting CPSs [15].
|
1034 |
+
As in any search-based software engineering problem, a
|
1035 |
+
conclusion validity threat involves the stochastic nature of the
|
1036 |
+
algorithms used. To mitigate such issue, we run each algorithm
|
1037 |
+
10 times. It is important to note that our technique needs a long
|
1038 |
+
time to converge because the simulations employed to assess
|
1039 |
+
potential patches are exhaustive, therefore, we could not afford
|
1040 |
+
a large number of runs. Furthermore, we applied statistical
|
1041 |
+
tests to analyze the results, as recommended by Arcuri and
|
1042 |
+
Briand [48].
|
1043 |
+
As in any study involving humans, our evaluation is also
|
1044 |
+
subject to external validity threats. One such threats refers
|
1045 |
+
to the patches proposed by engineers from Orona. It is note-
|
1046 |
+
worthy, however, that these engineers have broad experience
|
1047 |
+
and domain expertise, and that the patches they proposed
|
1048 |
+
were the ones that were later deployed in the real CPS. The
|
1049 |
+
generalizability of the results is also another external validity
|
1050 |
+
threat of our study; note, however, that we used an industrial
|
1051 |
+
case study with a real installation and data obtained from
|
1052 |
+
operation. We plan to mitigate such threat in the future by
|
1053 |
+
(1) using other case studies from a different domain and (2)
|
1054 |
+
using other real installations where misconfigurations occured.
|
1055 |
+
Lastly, construct validity threats arise when the measures
|
1056 |
+
used are not comparable across algorithms. This was mitigated
|
1057 |
+
by giving the same search budget to both algorithms (i.e., the
|
1058 |
+
repair and the unguided algorithm).
|
1059 |
+
V. LESSONS LEARNED AND APPLICABILITY
|
1060 |
+
In this section, we describe the lessons we have learned
|
1061 |
+
thorough the whole process of developing and evaluating the
|
1062 |
+
repairing algorithm. In addition, we explain the main changes
|
1063 |
+
our method would require when applying it to other CPS
|
1064 |
+
domains.
|
1065 |
+
A. Lessons Learned
|
1066 |
+
Lesson 1 – Reduction of personnel cost: The current
|
1067 |
+
state of the practice when repairing misconfigurations is purely
|
1068 |
+
manual. This requires significant personnel cost since domain
|
1069 |
+
experts are required in the process. Our fully automated
|
1070 |
+
repairing approach not only outperforms the state of the
|
1071 |
+
practice in terms of providing a better patch to repair the
|
1072 |
+
misconfiguration, but also reduces significantly the personnel
|
1073 |
+
costs that are required behind a manual repair process.
|
1074 |
+
Lesson 2 – Scalable technique: Scalability is one of the
|
1075 |
+
main concerns when testing and debugging CPSs, mainly
|
1076 |
+
due to the need of considering properties involving physical
|
1077 |
+
devices with continuous dynamics and complex concurrent
|
1078 |
+
interactions between the system and its environment (e.g.,
|
1079 |
+
people) [49]. We saw that our search-based repair algorithm
|
1080 |
+
|
1081 |
+
converges after around 10 hours, which is affordable for
|
1082 |
+
our industrial partner as engineers can launch the automated
|
1083 |
+
misconfiguration repair tool nightly.
|
1084 |
+
Lesson 3 – Surrogate models are, in principle, not
|
1085 |
+
appropriate: Despite we did not carefully assess this, while
|
1086 |
+
we developed the algorithm, we intended to integrate surrogate
|
1087 |
+
models to accelerate the repair process. However, we saw
|
1088 |
+
that this technique required too much time to build reliable
|
1089 |
+
surrogate models. This time was similar to the time budget
|
1090 |
+
that our repair algorithm required to converge. Although we
|
1091 |
+
assessed different types of surrogate models, we still need to
|
1092 |
+
more carefully analyze this, which remains a future work.
|
1093 |
+
Lesson 4 – Challenging conflicting installation: After
|
1094 |
+
applying our experiments and showing the results to Orona’s
|
1095 |
+
engineers, we noted that the conflicting installation we selected
|
1096 |
+
was challenging. Indeed, the traffic was abnormal, with many
|
1097 |
+
unforeseen situations (e.g., having too many calls in a short
|
1098 |
+
time window) and therefore, repairing the misconfiguration
|
1099 |
+
in such installation was, according to domain experts, more
|
1100 |
+
difficult than other installations.
|
1101 |
+
B. Applicability
|
1102 |
+
The context at which we have applied our repairing ap-
|
1103 |
+
proach is the elevator dispatching algorithm of Orona. How-
|
1104 |
+
ever, we believe that the three key challenges that we tackle
|
1105 |
+
(i.e., expensive execution of tests, large configuration space
|
1106 |
+
and multiple functional performance requirements) are com-
|
1107 |
+
mon in all types of configurable CPSs. As we involved domain
|
1108 |
+
experts when developing the repair approach, several domain-
|
1109 |
+
specific design choices were considered, which would require
|
1110 |
+
adaptions when applying our approach in another domain. Be-
|
1111 |
+
low we explain different alternatives and the changes required
|
1112 |
+
for the adoption of our method in another domain.
|
1113 |
+
Test execution process: One of the first changes our method
|
1114 |
+
would require is the test execution. As explained in Section
|
1115 |
+
III-B, we use a domain-specific simulator to execute test cases
|
1116 |
+
and measure how close the algorithm is from repairing the
|
1117 |
+
misconfiguration. This process would need to be substituted
|
1118 |
+
by the simulator being used to execute the tests within
|
1119 |
+
other CPSs. In addition, we employ a parallel test execution,
|
1120 |
+
which was possible in our context. However, other simulators
|
1121 |
+
(e.g., autonomous vehicles) could require more computing
|
1122 |
+
resources. For instance, testing autonomous vehicles often
|
1123 |
+
requires rendering driving scenes in virtual scenarios using
|
1124 |
+
high-fidelity simulators [13], which may require the execution
|
1125 |
+
of test cases to be sequential. Lastly, test oracles would need
|
1126 |
+
to be defined. When using Simulink models to execute the
|
1127 |
+
tests, which is a predominant CPS testing tool [50], an option
|
1128 |
+
could be to use SOCRaTEs [11], a DSL-based test oracle
|
1129 |
+
specification and generation tool for Simulink. Specifically,
|
1130 |
+
SOCRaTEs [11] provides a quantitative measure of the degree
|
1131 |
+
of violation of a requirement, similar to what we need in our
|
1132 |
+
algorithm to guide the misconfiguration repair process.
|
1133 |
+
Removing solutions from the archive: As explained in
|
1134 |
+
Section III-D, the archive may increase in size, which may
|
1135 |
+
have a direct implication in the convergence of the repairing
|
1136 |
+
algorithm. Therefore, when the archive exceeds a predefined
|
1137 |
+
number of solutions, one of the solutions needs to be removed.
|
1138 |
+
Our algorithm removes the solution with longest AWT, given
|
1139 |
+
that this is the most widely employed metric when testing dis-
|
1140 |
+
patching algorithms [30]. In another domain, two alternatives
|
1141 |
+
can be considered. The first one, employing one of the most
|
1142 |
+
important metrics. If all metrics have a similar importance,
|
1143 |
+
the second alternative could be to randomly remove one of
|
1144 |
+
the solutions from the archive or use a crowding distance to
|
1145 |
+
remove solutions that are too close from each other.
|
1146 |
+
Decision maker: The decision maker is another component
|
1147 |
+
that we developed ad-hoc for the traffic dispatching algorithm
|
1148 |
+
by following the advise of domain experts. We recommend
|
1149 |
+
to analyze priorities of the specific CPS to make a decision.
|
1150 |
+
In case there are no clear priorities, a solution could be to
|
1151 |
+
employ a weighted approach giving the same importance to
|
1152 |
+
all objectives.
|
1153 |
+
Patch confirmation: We only employed a failing test suite
|
1154 |
+
to guide the repair process. The core reason was the high test
|
1155 |
+
execution time. Eventually, it could happen that a proposed
|
1156 |
+
patch makes a test case from the passing test suite fail. Because
|
1157 |
+
of this, we implemented a patch confirmation process by
|
1158 |
+
following a traditionally employed regression test method [26]
|
1159 |
+
combined with a newly incorporated metamorphic testing
|
1160 |
+
approach by Orona [37], [38]. The patch confirmation module
|
1161 |
+
should follow the internally standardized testing approach,
|
1162 |
+
which can vary from a company to another.
|
1163 |
+
VI. RELATED WORK
|
1164 |
+
The related work in automated program repair is huge.
|
1165 |
+
Monperrus mantains a living review on such techniques [51].
|
1166 |
+
Table IV shows a summarized classification of the related work
|
1167 |
+
analyzing four key characteristics covered by our approach.
|
1168 |
+
The first characteristic (C1) analyzes the possibility of repair-
|
1169 |
+
ing computationally expensive systems. The second one (C2),
|
1170 |
+
whether the approach is intended to repair misconfigurations.
|
1171 |
+
The third one (C3), analyzes if the approach is able to deal
|
1172 |
+
with many requirements (i.e., more than 3). And the last one
|
1173 |
+
(C4), whether the approach prioritizes critical faults over the
|
1174 |
+
less critical ones.
|
1175 |
+
TABLE IV: Related work comparison with different charac-
|
1176 |
+
teristics required by our repairing technique
|
1177 |
+
C1
|
1178 |
+
C2
|
1179 |
+
C3
|
1180 |
+
C4
|
1181 |
+
[15]
|
1182 |
+
+
|
1183 |
+
-
|
1184 |
+
+
|
1185 |
+
+
|
1186 |
+
[22], [23]
|
1187 |
+
-
|
1188 |
+
+
|
1189 |
+
-
|
1190 |
+
-
|
1191 |
+
[24]
|
1192 |
+
+
|
1193 |
+
+
|
1194 |
+
-
|
1195 |
+
-
|
1196 |
+
[52]–[56]
|
1197 |
+
-
|
1198 |
+
-
|
1199 |
+
-
|
1200 |
+
-
|
1201 |
+
[57]–[64]
|
1202 |
+
+
|
1203 |
+
-
|
1204 |
+
-
|
1205 |
+
-
|
1206 |
+
We found that, in the field of CPSs, repairing approaches
|
1207 |
+
are still in their infancy. Indeed, to the best of our knowledge,
|
1208 |
+
only two approaches tackle the problem of repairing CPSs.
|
1209 |
+
On the one hand, Swarmbug [24] focuses on repairing mis-
|
1210 |
+
configurations of swarm robotics. Specifically, they make use
|
1211 |
+
of a mechanism called the “degree of causal contribution”
|
1212 |
+
to abstract impacts of configurations to the swarm drones
|
1213 |
+
|
1214 |
+
via behavior causal analysis. The evaluation is carried out
|
1215 |
+
in four swarm algorithms, and the repair objectives are in-
|
1216 |
+
dividual for each of them. These involve aspects like avoiding
|
1217 |
+
obstacles or unsafe zones in order the drones not to crash.
|
1218 |
+
The approach, however, does not cover C3 and C4. On the
|
1219 |
+
other hand, Ariel [15] focuses on repairing feature interaction
|
1220 |
+
failures in automated driving systems. Similar to our approach,
|
1221 |
+
ARIEL [15] uses a many-objective and a single population-
|
1222 |
+
based approach, and also employs an archive to keep track of
|
1223 |
+
partially repaired solutions. However, unlike this paper, which
|
1224 |
+
focuses on repairing misconfigurations, ARIEL [15] repairs
|
1225 |
+
feature interaction bugs by applying modify and swift mutation
|
1226 |
+
operators to integration rules that resolve conflicts between
|
1227 |
+
automated driving system features. Therefore, ARIEL does not
|
1228 |
+
cover C2.
|
1229 |
+
CADET [22] does cover C2 as it is intended to debug
|
1230 |
+
and fix misconfigurations that cause non-functional faults.
|
1231 |
+
Xiong et al. [23] focus on repairing misconfigurations in
|
1232 |
+
software product lines by generating a list of range fixes
|
1233 |
+
to help satisfy a constraint. However, both approaches do
|
1234 |
+
not consider systems that take high computation resources to
|
1235 |
+
execute the tests. In addition, CADET [22] only covers two
|
1236 |
+
non-functional properties (i.e., latency and energy), whereas
|
1237 |
+
Xiong et al. [23] focus on satisfying individual constraints.
|
1238 |
+
Lastly, the approaches do not prioritize fixing more critical
|
1239 |
+
faults over the less critical ones. Subsequently, both techniques
|
1240 |
+
do not cover C1, C3 and C4.
|
1241 |
+
Besides these three studies, which are the most closely
|
1242 |
+
related to our approach, other studies exist in the field
|
1243 |
+
of automated program repair [52]–[64]. Similar to this ap-
|
1244 |
+
proach, some consider search techniques, such as genetic
|
1245 |
+
programming [55], [56]. GenProg [55] is one of the first
|
1246 |
+
approaches that proposed the use of meta-heuristic search to
|
1247 |
+
repair software programs. Specifically they leveraged genetic
|
1248 |
+
programming to repair C programs. However, all these ap-
|
1249 |
+
proaches focus on repairing bugs in the code. Conversely, our
|
1250 |
+
approach focuses on repairing misconfigurations in the field
|
1251 |
+
of configurable CPSs.
|
1252 |
+
Another line of research related to our approach is that
|
1253 |
+
of unified debugging [65], [66]. Such technique uses patch
|
1254 |
+
execution results to improve localizing the fault [65], [66].
|
1255 |
+
Therefore, even if the repair process is unable to repair the bug,
|
1256 |
+
unified debugging helps improving the fault localization for
|
1257 |
+
latter manual repair. Our approach follows a similar strategy,
|
1258 |
+
where we aim at localizing suspicious parameters that will
|
1259 |
+
eventually help repair the misconfiguration. However, besides
|
1260 |
+
the fact that unified debugging [65], [66] is not aimed at
|
1261 |
+
debugging misconfigurations, but bugs at the code level, it
|
1262 |
+
assumes that there is an initial suspiciousness score (i.e., at
|
1263 |
+
statement level). Conversely, our approach begins with all
|
1264 |
+
parameters having the same suspiciousness because there is
|
1265 |
+
no information about which parameters have influence in the
|
1266 |
+
system performance.
|
1267 |
+
VII. CONCLUSION AND FUTURE WORK
|
1268 |
+
Real-world CPSs, such as elevators, involve many param-
|
1269 |
+
eters. The performance of CPSs is tightly linked to such
|
1270 |
+
parameters, and therefore, misconfigurations may occur. On
|
1271 |
+
the one hand, manually dealing with such misconfigurations
|
1272 |
+
might not always be feasible. On the other hand, automated
|
1273 |
+
solutions require dealing with certain challenges, such as,
|
1274 |
+
expensive simulations to execute test cases. In this paper we
|
1275 |
+
propose an automated and scalable solution based on meta-
|
1276 |
+
heuristic search to repair misconfigurations in CPSs. Our
|
1277 |
+
approach was integrated with an industrial case study provided
|
1278 |
+
by Orona, one of the largest elevator manufacturers in Europe.
|
1279 |
+
The evaluation was carried out with a real installation in which
|
1280 |
+
domain experts from Orona had to manually intervene in
|
1281 |
+
repairing a misconfiguration. The results suggest that, besides
|
1282 |
+
automating a process that before was purely manual, our algo-
|
1283 |
+
rithm provides better patches than those provided by domain
|
1284 |
+
experts. Specifically, in five out of the six quality indicators
|
1285 |
+
employed by domain experts to assess the quality of a patch,
|
1286 |
+
our algorithm outperformed with statistical significance the
|
1287 |
+
patch provided by domain experts.
|
1288 |
+
In the future, we would like to extend our approach
|
1289 |
+
from different perspectives. In terms of the applicability, we
|
1290 |
+
would like to integrate our algorithm with other CPSs in
|
1291 |
+
which configurations have been found to be problematic (e.g.,
|
1292 |
+
unmanned aerial vehicles [5]). Furthermore, we would like
|
1293 |
+
to explore solutions to prevent potential overfitting issues
|
1294 |
+
before proposing a plausible patch. This has been one of the
|
1295 |
+
core challenges identified in automated program repair [32]–
|
1296 |
+
[35], and therefore, we should be aware of it. In terms of
|
1297 |
+
internal applicability within Orona, we would like to evaluate
|
1298 |
+
our approach in other installations where misconfigurations
|
1299 |
+
occurred. Furthermore, we would also like to transfer the
|
1300 |
+
repair algorithm beyond the traffic team and within other
|
1301 |
+
departments. Lastly, we would like to further study whether
|
1302 |
+
other strategies exist to better train and integrate surrogate
|
1303 |
+
models in the repair process.
|
1304 |
+
ACKNOWLEDGMENT
|
1305 |
+
Project supported by a 2021 Leonardo Grant for Researchers
|
1306 |
+
and Cultural Creators, BBVA Foundation. The BBVA Founda-
|
1307 |
+
tion is not responsible for the opinions, comments and contents
|
1308 |
+
included in the project and/or the results derived from it,
|
1309 |
+
which are the total and absolute responsibility of their authors.
|
1310 |
+
Aitor Arrieta is part of the Software and Systems Engineer-
|
1311 |
+
ing research group of Mondragon Unibertsitatea (IT1519-22),
|
1312 |
+
supported by the Department of Education, Universities and
|
1313 |
+
Research of the Basque Country.
|
1314 |
+
REFERENCES
|
1315 |
+
[1] P. Derler, E. A. Lee, and A. S. Vincentelli, “Modeling cyber–physical
|
1316 |
+
systems,” Proceedings of the IEEE, vol. 100, no. 1, pp. 13–28, 2011.
|
1317 |
+
[2] R. Baheti and H. Gill, “Cyber-physical systems,” The impact of control
|
1318 |
+
technology, vol. 12, no. 1, pp. 161–166, 2011.
|
1319 |
+
[3] R. Alur, Principles of cyber-physical systems.
|
1320 |
+
MIT press, 2015.
|
1321 |
+
|
1322 |
+
[4] S. Fischer, R. Ramler, C. Klammer, and R. Rabiser, “Testing of highly
|
1323 |
+
configurable cyber-physical systems–a multiple case study,” in 15th
|
1324 |
+
International Working Conference on Variability Modelling of Software-
|
1325 |
+
Intensive Systems, 2021, pp. 1–10.
|
1326 |
+
[5] R. Han, C. Yang, S. Ma, J. Ma, C. Sun, J. Li, and E. Bertino, “Control
|
1327 |
+
parameters considered harmful: Detecting range specification bugs in
|
1328 |
+
drone configuration modules via learning-guided search,” in Proceedings
|
1329 |
+
of the 44th International Conference on Software Engineering, 2022, pp.
|
1330 |
+
462–473.
|
1331 |
+
[6] D. Wang, S. Li, G. Xiao, Y. Liu, and Y. Sui, “An exploratory study of
|
1332 |
+
autopilot software bugs in unmanned aerial vehicles,” in Proceedings
|
1333 |
+
of the 29th ACM Joint Meeting on European Software Engineering
|
1334 |
+
Conference and Symposium on the Foundations of Software Engineering,
|
1335 |
+
2021, pp. 20–31.
|
1336 |
+
[7] Garcia, Joshua and Feng, Yang and Shen, Junjie and Almanee, Sumaya
|
1337 |
+
and Xia, Yuan and Chen, and Qi Alfred, “A comprehensive study
|
1338 |
+
of autonomous vehicle bugs,” in Proceedings of the ACM/IEEE 42nd
|
1339 |
+
International Conference on Software Engineering, 2020, pp. 385–396.
|
1340 |
+
[8] R. B. Abdessalem, A. Panichella, S. Nejati, L. C. Briand, and T. Stifter,
|
1341 |
+
“Testing autonomous cars for feature interaction failures using many-
|
1342 |
+
objective search,” in 2018 33rd IEEE/ACM International Conference on
|
1343 |
+
Automated Software Engineering (ASE).
|
1344 |
+
IEEE, 2018, pp. 143–154.
|
1345 |
+
[9] R. B. Abdessalem, S. Nejati, L. C. Briand, and T. Stifter, “Testing vision-
|
1346 |
+
based control systems using learnable evolutionary algorithms,” in 2018
|
1347 |
+
IEEE/ACM 40th International Conference on Software Engineering
|
1348 |
+
(ICSE).
|
1349 |
+
IEEE, 2018, pp. 1016–1026.
|
1350 |
+
[10] C. Menghi, S. Nejati, L. Briand, and Y. I. Parache, “Approximation-
|
1351 |
+
refinement testing of compute-intensive cyber-physical models: An
|
1352 |
+
approach based on system identification,” in 2020 IEEE/ACM 42nd
|
1353 |
+
International Conference on Software Engineering (ICSE). IEEE, 2020,
|
1354 |
+
pp. 372–384.
|
1355 |
+
[11] C. Menghi, S. Nejati, K. Gaaloul, and L. C. Briand, “Generating
|
1356 |
+
automated and online test oracles for simulink models with continuous
|
1357 |
+
and uncertain behaviors,” in Proceedings of the 2019 27th acm joint
|
1358 |
+
meeting on european software engineering conference and symposium
|
1359 |
+
on the foundations of software engineering, 2019, pp. 27–38.
|
1360 |
+
[12] S. Nejati, K. Gaaloul, C. Menghi, L. C. Briand, S. Foster, and D. Wolfe,
|
1361 |
+
“Evaluating model testing and model checking for finding requirements
|
1362 |
+
violations in simulink models,” in Proceedings of the 2019 27th acm
|
1363 |
+
joint meeting on european software engineering conference and sympo-
|
1364 |
+
sium on the foundations of software engineering, 2019, pp. 1015–1025.
|
1365 |
+
[13] F. U. Haq, D. Shin, and L. Briand, “Efficient online testing for dnn-
|
1366 |
+
enabled systems using surrogate-assisted and many-objective optimiza-
|
1367 |
+
tion,” in Proceedings of the 44th International Conference on Software
|
1368 |
+
Engineering, 2022, pp. 811–822.
|
1369 |
+
[14] D. Humeniuk, F. Khomh, and G. Antoniol, “A search-based framework
|
1370 |
+
for automatic generation of testing environments for cyber-physical
|
1371 |
+
systems,” Information and Software Technology, p. 106936, 2022.
|
1372 |
+
[15] R. B. Abdessalem, A. Panichella, S. Nejati, L. C. Briand, and T. Stifter,
|
1373 |
+
“Automated repair of feature interaction failures in automated driving
|
1374 |
+
systems,” in Proceedings of the 29th ACM SIGSOFT International
|
1375 |
+
Symposium on Software Testing and Analysis, 2020, pp. 88–100.
|
1376 |
+
[16] G. Perrouin, S. Sen, J. Klein, B. Baudry, and Y. Le Traon, “Automated
|
1377 |
+
and scalable t-wise test case generation strategies for software product
|
1378 |
+
lines,” in 2010 Third international conference on software testing,
|
1379 |
+
verification and validation.
|
1380 |
+
IEEE, 2010, pp. 459–468.
|
1381 |
+
[17] A. Arrieta, S. Wang, G. Sagardui, and L. Etxeberria, “Search-based test
|
1382 |
+
case prioritization for simulation-based testing of cyber-physical system
|
1383 |
+
product lines,” Journal of Systems and Software, vol. 149, pp. 1–34,
|
1384 |
+
2019.
|
1385 |
+
[18] C. Henard, M. Papadakis, G. Perrouin, J. Klein, P. Heymans, and
|
1386 |
+
Y. Le Traon, “Bypassing the combinatorial explosion: Using similarity
|
1387 |
+
to generate and prioritize t-wise test configurations for software product
|
1388 |
+
lines,” IEEE Transactions on Software Engineering, vol. 40, no. 7, pp.
|
1389 |
+
650–670, 2014.
|
1390 |
+
[19] S. Wang, S. Ali, and A. Gotlieb, “Cost-effective test suite minimization
|
1391 |
+
in product lines using search techniques,” Journal of Systems and
|
1392 |
+
Software, vol. 103, pp. 370–391, 2015.
|
1393 |
+
[20] D. Marijan, A. Gotlieb, S. Sen, and A. Hervieu, “Practical pairwise test-
|
1394 |
+
ing for software product lines,” in Proceedings of the 17th international
|
1395 |
+
software product line conference, 2013, pp. 227–235.
|
1396 |
+
[21] A. Hervieu, D. Marijan, A. Gotlieb, and B. Baudry, “Practical mini-
|
1397 |
+
mization of pairwise-covering test configurations using constraint pro-
|
1398 |
+
gramming,” Information and Software Technology, vol. 71, pp. 129–146,
|
1399 |
+
2016.
|
1400 |
+
[22] R. Krishna, M. S. Iqbal, M. A. Javidian, B. Ray, and P. Jamshidi, “Cadet:
|
1401 |
+
Debugging and fixing misconfigurations using counterfactual reasoning,”
|
1402 |
+
arXiv preprint arXiv:2010.06061, 2020.
|
1403 |
+
[23] Y. Xiong, H. Zhang, A. Hubaux, S. She, J. Wang, and K. Czarnecki,
|
1404 |
+
“Range fixes: Interactive error resolution for software configuration,”
|
1405 |
+
Ieee transactions on software engineering, vol. 41, no. 6, pp. 603–619,
|
1406 |
+
2014.
|
1407 |
+
[24] C. Jung, A. Ahad, J. Jung, S. Elbaum, and Y. Kwon, “Swarmbug:
|
1408 |
+
debugging configuration bugs in swarm robotics,” in Proceedings of the
|
1409 |
+
29th ACM Joint Meeting on European Software Engineering Conference
|
1410 |
+
and Symposium on the Foundations of Software Engineering, 2021, pp.
|
1411 |
+
868–880.
|
1412 |
+
[25] J. Ayerdi, A. Garciandia, A. Arrieta, W. Afzal, E. Enoiu, A. Agirre,
|
1413 |
+
G. Sagardui, M. Arratibel, and O. Sellin, “Towards a taxonomy for
|
1414 |
+
eliciting design-operation continuum requirements of cyber-physical
|
1415 |
+
systems,” in 2020 IEEE 28th International Requirements Engineering
|
1416 |
+
Conference (RE).
|
1417 |
+
IEEE, 2020, pp. 280–290.
|
1418 |
+
[26] A. Gartziandia, A. Arrieta, J. Ayerdi, M. Illarramendi, A. Agirre,
|
1419 |
+
G. Sagardui, and M. Arratibel, “Machine learning-based test oracles for
|
1420 |
+
performance testing of cyber-physical systems: An industrial case study
|
1421 |
+
on elevators dispatching algorithms,” Journal of Software: Evolution and
|
1422 |
+
Process, p. e2465, 2022.
|
1423 |
+
[27] L. Han, S. Ali, T. Yue, A. Arrieta, and M. Arratibel, “Uncertainty-aware
|
1424 |
+
robustness assessment of industrial elevator systems,” ACM Transactions
|
1425 |
+
on Software Engineering and Methodology, 2022.
|
1426 |
+
[28] L. Han, T. Yue, S. Ali, A. Arrieta, and M. Arratibel, “Are elevator
|
1427 |
+
software robust against uncertainties? results and experiences from an
|
1428 |
+
industrial case study,” in Proceedings of the 30th ACM Joint European
|
1429 |
+
Software Engineering Conference and Symposium on the Foundations
|
1430 |
+
of Software Engineering, 2022, pp. 1331–1342.
|
1431 |
+
[29] A. Arrieta, M. Otaegi, L. Han, G. Sagardui, S. Ali, and M. Arratibel,
|
1432 |
+
“Automating test oracle generation in devops for industrial elevators,”
|
1433 |
+
in 2022 IEEE International Conference on Software Analysis, Evolution
|
1434 |
+
and Reengineering (SANER).
|
1435 |
+
IEEE, 2022, pp. 284–288.
|
1436 |
+
[30] G. Barney and L. Al-Sharif, Elevator traffic handbook: theory and
|
1437 |
+
practice.
|
1438 |
+
Routledge, 2015.
|
1439 |
+
[31] G. Barney, Transportation systems in buildings : CIBSE Guide
|
1440 |
+
D:
|
1441 |
+
2010.
|
1442 |
+
London:
|
1443 |
+
Chartered
|
1444 |
+
Institution
|
1445 |
+
of
|
1446 |
+
Building
|
1447 |
+
Services
|
1448 |
+
Engineers,
|
1449 |
+
2010.
|
1450 |
+
[Online].
|
1451 |
+
Available:
|
1452 |
+
https://www.worldcat.org/
|
1453 |
+
title/transportation-systems-in-buildings-cibse-guide-d-2010/oclc/
|
1454 |
+
880899711
|
1455 |
+
[32] C. L. Goues, M. Pradel, and A. Roychoudhury, “Automated program
|
1456 |
+
repair,” Communications of the ACM, vol. 62, no. 12, pp. 56–65, 2019.
|
1457 |
+
[33] M. Martinez, T. Durieux, R. Sommerard, J. Xuan, and M. Monperrus,
|
1458 |
+
“Automatic repair of real bugs in java: A large-scale experiment on the
|
1459 |
+
defects4j dataset,” Empirical Software Engineering, vol. 22, no. 4, pp.
|
1460 |
+
1936–1964, 2017.
|
1461 |
+
[34] A. Nilizadeh, G. T. Leavens, X.-B. D. Le, C. S. P˘as˘areanu, and D. R.
|
1462 |
+
Cok, “Exploring true test overfitting in dynamic automated program
|
1463 |
+
repair using formal methods,” in 2021 14th IEEE Conference on
|
1464 |
+
Software Testing, Verification and Validation (ICST).
|
1465 |
+
IEEE, 2021, pp.
|
1466 |
+
229–240.
|
1467 |
+
[35] E. K. Smith, E. T. Barr, C. Le Goues, and Y. Brun, “Is the cure
|
1468 |
+
worse than the disease? overfitting in automated program repair,” in
|
1469 |
+
Proceedings of the 2015 10th Joint Meeting on Foundations of Software
|
1470 |
+
Engineering, 2015, pp. 532–543.
|
1471 |
+
[36] M.-L. Siikonen, T. Susi, and H. Hakonen, “Passenger traffic flow
|
1472 |
+
simulation in tall buildings,” Elevator world, vol. 49, no. 8, pp. 117–123,
|
1473 |
+
2001.
|
1474 |
+
[37] J. Ayerdi, S. Segura, A. Arrieta, G. Sagardui, and M. Arratibel, “Qos-
|
1475 |
+
aware metamorphic testing: An elevation case study,” in 2020 IEEE 31st
|
1476 |
+
International Symposium on Software Reliability Engineering (ISSRE).
|
1477 |
+
IEEE, 2020, pp. 104–114.
|
1478 |
+
[38] J. Ayerdi, P. Valle, S. Segura, A. Arrieta, G. Sagardui, and M. Arratibel,
|
1479 |
+
“Performance-driven metamorphic testing of cyber-physical systems,”
|
1480 |
+
IEEE Transactions on Reliability, 2022.
|
1481 |
+
[39] J. Ayerdi, V. Terragni, A. Arrieta, P. Tonella, G. Sagardui, and M. Arrat-
|
1482 |
+
ibel, “Generating metamorphic relations for cyber-physical systems with
|
1483 |
+
genetic programming: an industrial case study,” in Proceedings of the
|
1484 |
+
29th ACM Joint Meeting on European Software Engineering Conference
|
1485 |
+
and Symposium on the Foundations of Software Engineering, 2021, pp.
|
1486 |
+
1264–1274.
|
1487 |
+
|
1488 |
+
[40] A. Arrieta, S. Wang, U. Markiegi, A. Arruabarrena, L. Etxeberria, and
|
1489 |
+
G. Sagardui, “Pareto efficient multi-objective black-box test case selec-
|
1490 |
+
tion for simulation-based testing,” Information and Software Technology,
|
1491 |
+
vol. 114, pp. 137–154, 2019.
|
1492 |
+
[41] A. Arrieta, S. Wang, U. Markiegi, G. Sagardui, and L. Etxeberria, “Em-
|
1493 |
+
ploying multi-objective search to enhance reactive test case generation
|
1494 |
+
and prioritization for testing industrial cyber-physical systems,” IEEE
|
1495 |
+
Transactions on Industrial Informatics, vol. 14, no. 3, pp. 1055–1066,
|
1496 |
+
2017.
|
1497 |
+
[42] P. McMinn, “Search-based software testing: Past, present and future,”
|
1498 |
+
in 2011 IEEE Fourth International Conference on Software Testing,
|
1499 |
+
Verification and Validation Workshops.
|
1500 |
+
IEEE, 2011, pp. 153–163.
|
1501 |
+
[43] M. Di Penta, G. Canfora, G. Esposito, V. Mazza, and M. Bruno, “Search-
|
1502 |
+
based testing of service level agreements,” in Proceedings of the 9th
|
1503 |
+
annual conference on Genetic and evolutionary computation, 2007, pp.
|
1504 |
+
1090–1097.
|
1505 |
+
[44] S. Wang, S. Ali, T. Yue, Y. Li, and M. Liaaen, “A practical guide to select
|
1506 |
+
quality indicators for assessing pareto-based search algorithms in search-
|
1507 |
+
based software engineering,” in Proceedings of the 38th International
|
1508 |
+
Conference on Software Engineering, 2016, pp. 631–642.
|
1509 |
+
[45] M. Li, T. Chen, and X. Yao, “How to evaluate solutions in pareto-based
|
1510 |
+
search-based software engineering: A critical review and methodological
|
1511 |
+
guidance,” IEEE Transactions on Software Engineering, vol. 48, no. 05,
|
1512 |
+
pp. 1771–1799, 2022.
|
1513 |
+
[46] K. Shang, H. Ishibuchi, L. He, and L. M. Pang, “A survey on the
|
1514 |
+
hypervolume indicator in evolutionary multiobjective optimization,”
|
1515 |
+
IEEE Transactions on Evolutionary Computation, vol. 25, no. 1, pp.
|
1516 |
+
1–20, 2020.
|
1517 |
+
[47] J. Romano, J. D. Kromrey, J. Coraggio, J. Skowronek, and L. Devine,
|
1518 |
+
“Exploring methods for evaluating group differences on the nsse and
|
1519 |
+
other surveys: Are the t-test and cohen’sd indices the most appropriate
|
1520 |
+
choices,” in annual meeting of the Southern Association for Institutional
|
1521 |
+
Research.
|
1522 |
+
Citeseer, 2006, pp. 1–51.
|
1523 |
+
[48] A. Arcuri and L. Briand, “A practical guide for using statistical tests
|
1524 |
+
to assess randomized algorithms in software engineering,” in 2011 33rd
|
1525 |
+
International Conference on Software Engineering (ICSE). IEEE, 2011,
|
1526 |
+
pp. 1–10.
|
1527 |
+
[49] L. Briand, S. Nejati, M. Sabetzadeh, and D. Bianculli, “Testing the
|
1528 |
+
untestable: model testing of complex software-intensive systems,” in
|
1529 |
+
Proceedings of the 38th international conference on software engineer-
|
1530 |
+
ing companion, 2016, pp. 789–792.
|
1531 |
+
[50] R. Matinnejad, S. Nejati, L. C. Briand, and T. Bruckmann, “Test
|
1532 |
+
generation and test prioritization for simulink models with dynamic
|
1533 |
+
behavior,” IEEE Transactions on Software Engineering, vol. 45, no. 9,
|
1534 |
+
pp. 919–944, 2018.
|
1535 |
+
[51] M. Monperrus, “The living review on automated program repair,” Ph.D.
|
1536 |
+
dissertation, HAL Archives Ouvertes, 2018.
|
1537 |
+
[59] F. DeMarco, J. Xuan, D. Le Berre, and M. Monperrus, “Automatic
|
1538 |
+
repair of buggy if conditions and missing preconditions with smt,” in
|
1539 |
+
Proceedings of the 6th international workshop on constraints in software
|
1540 |
+
testing, verification, and analysis, 2014, pp. 30–39.
|
1541 |
+
[52] T. Ackling, B. Alexander, and I. Grunert, “Evolving patches for software
|
1542 |
+
repair,” in Proceedings of the 13th annual conference on Genetic and
|
1543 |
+
evolutionary computation, 2011, pp. 1427–1434.
|
1544 |
+
[53] D. Kim, J. Nam, J. Song, and S. Kim, “Automatic patch generation
|
1545 |
+
learned from human-written patches,” in 2013 35th International Con-
|
1546 |
+
ference on Software Engineering (ICSE).
|
1547 |
+
IEEE, 2013, pp. 802–811.
|
1548 |
+
[54] J. D. Knowles, R. A. Watson, and D. W. Corne, “Reducing local optima
|
1549 |
+
in single-objective problems by multi-objectivization,” in International
|
1550 |
+
conference on evolutionary multi-criterion optimization. Springer, 2001,
|
1551 |
+
pp. 269–283.
|
1552 |
+
[55] C. Le Goues, T. Nguyen, S. Forrest, and W. Weimer, “Genprog: A
|
1553 |
+
generic method for automatic software repair,” IEEE Transactions on
|
1554 |
+
Software Engineering, vol. 38, no. 1, pp. 54–72, 2011.
|
1555 |
+
[56] M. P. Gissurarson, L. Applis, A. Panichella, A. van Deursen, and
|
1556 |
+
D. Sands, “Propr: property-based automatic program repair,” in Pro-
|
1557 |
+
ceedings of the 44th International Conference on Software Engineering,
|
1558 |
+
2022, pp. 1768–1780.
|
1559 |
+
[57] A. Arcuri, “On the automation of fixing software bugs,” in Companion
|
1560 |
+
of the 30th International Conference on Software Engineering, 2008,
|
1561 |
+
pp. 1003–1006.
|
1562 |
+
[58] V. Dallmeier, A. Zeller, and B. Meyer, “Generating fixes from object
|
1563 |
+
behavior anomalies,” in 2009 IEEE/ACM International Conference on
|
1564 |
+
Automated Software Engineering.
|
1565 |
+
IEEE, 2009, pp. 550–554.
|
1566 |
+
[60] T. Ji, L. Chen, X. Mao, and X. Yi, “Automated program repair by using
|
1567 |
+
similar code containing fix ingredients,” in 2016 IEEE 40th Annual
|
1568 |
+
Computer Software and Applications Conference (COMPSAC), vol. 1.
|
1569 |
+
IEEE, 2016, pp. 197–202.
|
1570 |
+
[61] H. D. T. Nguyen, D. Qi, A. Roychoudhury, and S. Chandra, “Semfix:
|
1571 |
+
Program repair via semantic analysis,” in 2013 35th International
|
1572 |
+
Conference on Software Engineering (ICSE).
|
1573 |
+
IEEE, 2013, pp. 772–
|
1574 |
+
781.
|
1575 |
+
[62] Y. Qi, X. Mao, Y. Lei, Z. Dai, and C. Wang, “The strength of
|
1576 |
+
random search on automated program repair,” in Proceedings of the 36th
|
1577 |
+
International Conference on Software Engineering, 2014, pp. 254–265.
|
1578 |
+
[63] Z. Qi, F. Long, S. Achour, and M. Rinard, “An analysis of patch
|
1579 |
+
plausibility and correctness for generate-and-validate patch generation
|
1580 |
+
systems,” in Proceedings of the 2015 International Symposium on
|
1581 |
+
Software Testing and Analysis, 2015, pp. 24–36.
|
1582 |
+
[64] W. Weimer, Z. P. Fry, and S. Forrest, “Leveraging program equivalence
|
1583 |
+
for adaptive program repair: Models and first results,” in 2013 28th
|
1584 |
+
IEEE/ACM International Conference on Automated Software Engineer-
|
1585 |
+
ing (ASE).
|
1586 |
+
IEEE, 2013, pp. 356–366.
|
1587 |
+
[65] Y. Lou, A. Ghanbari, X. Li, L. Zhang, H. Zhang, D. Hao, and
|
1588 |
+
L. Zhang, “Can automated program repair refine fault localization? a
|
1589 |
+
unified debugging approach,” in Proceedings of the 29th ACM SIGSOFT
|
1590 |
+
International Symposium on Software Testing and Analysis, 2020, pp.
|
1591 |
+
75–87.
|
1592 |
+
[66] S. Benton, X. Li, Y. Lou, and L. Zhang, “Evaluating and improving
|
1593 |
+
unified debugging,” IEEE Transactions on Software Engineering, 2021.
|
1594 |
+
|
AdAzT4oBgHgl3EQfhf3-/content/tmp_files/load_file.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
AtE0T4oBgHgl3EQfPgDv/content/2301.02181v1.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:fdaecd866020d90609e8f74fc03c619090f0edf486a84977f84eeeb21e5a9bdb
|
3 |
+
size 184398
|
AtE0T4oBgHgl3EQfPgDv/vector_store/index.faiss
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:fb4c8b18b88512e0970f5bb85275dde8605c4746fce0310964635f29c5a1d116
|
3 |
+
size 458797
|
AtE0T4oBgHgl3EQfPgDv/vector_store/index.pkl
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:4f03db254bdc1386e64fc1df0f1b63752578ebca23b3aef51942898ace1d20a8
|
3 |
+
size 15884
|
AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:499241cf87fd04260ec6528cac052ececabd1417248e35074daf17b0dfb59c36
|
3 |
+
size 306441
|
AtE4T4oBgHgl3EQf5A4w/vector_store/index.faiss
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:5607fd200ebeec443e2ca66eccfd951669c8e33ad8074fb6fd96d842d4c7eb20
|
3 |
+
size 2031661
|
AtE4T4oBgHgl3EQf5A4w/vector_store/index.pkl
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:e3849866216a04451920dceb60adaa980dc3ba0962367f1c775d3aecd0c50b79
|
3 |
+
size 68089
|
BNFQT4oBgHgl3EQf9jeh/content/tmp_files/2301.13451v1.pdf.txt
ADDED
@@ -0,0 +1,701 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
MNRAS 000, 1–6 (2022)
|
2 |
+
Preprint 1 February 2023
|
3 |
+
Compiled using MNRAS LATEX style file v3.0
|
4 |
+
Supernova connection of unidentified ultra high energy gamma-ray source
|
5 |
+
LHAASO J2108+5157
|
6 |
+
Agnibha De Sarkar,1★
|
7 |
+
1Astronomy & Astrophysics group, Raman Research Institute
|
8 |
+
C. V. Raman Avenue, 5th Cross Road, Sadashivanagar, Bengaluru 560080, Karnataka, India
|
9 |
+
Accepted XXX. Received YYY; in original form ZZZ
|
10 |
+
ABSTRACT
|
11 |
+
We present a simple phenomenological model of hadronic interaction between protons accelerated in an old supernova remnant
|
12 |
+
(SNR) and cold protons situated within the associated molecular clouds (MCs). The accelerated protons from the old SNR
|
13 |
+
escaped the SNR shock front, and got injected into the MCs at an earlier time, producing ultra high energy gamma-rays and
|
14 |
+
neutrinos through inelastic proton-proton interaction. We also take into account the acceleration and subsequent escape of
|
15 |
+
electrons from the SNR shock front. The escaped electrons produce gamma-rays through various radiative cooling mechanisms,
|
16 |
+
after getting injected into the MCs. We use the model discussed in this letter to explain the multiwavelength (MWL) spectral
|
17 |
+
energy distribution (SED) of unidentified Galactic ultra high energy gamma-ray source LHAASO J2108+5157. We also discuss
|
18 |
+
the feasibility of applying this model in other cases as well. Future observations can test the viability of the model discussed in
|
19 |
+
this letter, which will in turn confirm that the SNRs can, in fact, accelerate particles up to PeV energies.
|
20 |
+
Key words: radiation mechanisms: non-thermal – ISM: individual objects: LHAASO J2108+5157 – gamma-rays: ISM – ISM:
|
21 |
+
supernova remnants
|
22 |
+
1 INTRODUCTION
|
23 |
+
Observations by the Large High Altitude Air Shower Observatory
|
24 |
+
(LHAASO), located in China, have opened a new era of gamma-
|
25 |
+
ray astrophysics (Cao 2010). Since it has become operational on
|
26 |
+
2020 April, LHAASO has detected more than a dozen ultra high
|
27 |
+
energy (UHE; E𝛾 ≥ 100 TeV) gamma-ray sources, most of which are
|
28 |
+
unidentified (Cao et al. 2021a). The detection of these UHE gamma-
|
29 |
+
ray sources indicates the presence of cosmic ray (CR) accelerators in
|
30 |
+
our Milky Way Galaxy, which can accelerate particles up to PeV (=
|
31 |
+
1015 eV) energies, more commonly known as “PeVatrons”. Several
|
32 |
+
classes of Galactic sources such as supernova remnants (SNRs), pul-
|
33 |
+
sar wind nebulae (PWNe), young stellar clusters have been posited to
|
34 |
+
be potential PeVatron candidates. Although it is still an open question
|
35 |
+
as to what class of source is responsible for accelerating particles up
|
36 |
+
to PeV energies, most of the UHE gamma-ray sources detected by
|
37 |
+
LHAASO, along with their high energy (HE; E𝛾 < 100 GeV) and
|
38 |
+
very high energy (VHE; 100 GeV ≤ E𝛾 < 100 TeV) gamma-ray
|
39 |
+
counterparts, have been associated with PWNe in previous studies,
|
40 |
+
due to their close proximity with an energetic pulsar, and their typ-
|
41 |
+
ically extended spatial morphology (Abdalla et al. 2018). This idea
|
42 |
+
gained steam after it was confirmed that Crab pulsar wind nebula
|
43 |
+
is indeed a PeVatron source (Cao et al. 2021a). However, in spite
|
44 |
+
of the notion that energetic pulsars with high spin-down luminosity
|
45 |
+
( �𝐸 > 1036 erg s−1) coinciding or remaining in a very close spatial
|
46 |
+
proximity of UHE gamma-ray sources, may be a universal feature
|
47 |
+
★ E-mail: [email protected]
|
48 |
+
(Albert et al. 2021), further theoretical analyses of these LHAASO
|
49 |
+
detected UHE gamma-ray sources seem to tell a different story.
|
50 |
+
Recent studies have modeled a few of the significantly detected
|
51 |
+
LHAASO sources in detail. For example, De Sarkar & Gupta (2022)
|
52 |
+
found that the UHE gamma-ray emission observed from LHAASO
|
53 |
+
J1908+0621 is most likely hadronic in origin, emanated from the
|
54 |
+
interaction between SNR G40.5-0.5 and the associated MCs. On the
|
55 |
+
other hand, in De Sarkar et al. (2022), another significantly detected
|
56 |
+
source, LHAASO J2226+6057, was extensively modeled assuming
|
57 |
+
that the UHE gamma-ray emission is coming from the PWN associ-
|
58 |
+
ated with PSR J2229+6114. As caveats of the model, it was found
|
59 |
+
that the PWN interpretation of LHAASO J2226+6057 leads to a very
|
60 |
+
high radius of PWN, as well as a very small value of magnetic field.
|
61 |
+
Naturally, these results are in contrast with the observational results
|
62 |
+
(Ge et al. 2021; Liang et al. 2022), thus indicating that the PWN may
|
63 |
+
not be the contributing source to power the UHE gamma-ray source
|
64 |
+
detected. This indicates interaction between SNRs and associated
|
65 |
+
MCs may be the primary reason behind particle acceleration to PeV
|
66 |
+
energies in Galactic sources.
|
67 |
+
With this factors in mind, we focus on the emission of the recent
|
68 |
+
LHAASO detected unidentified UHE gamma-ray sources: LHAASO
|
69 |
+
J2108+5157 (Cao et al. 2021c) and LHAASO J0341+5258 (Cao
|
70 |
+
et al. 2021b). Both of these sources were found to be associated with
|
71 |
+
MCs, but no apparent association with energetic pulsars or SNRs
|
72 |
+
were established. Scenarios including leptonic emission from TeV
|
73 |
+
halo (Abe et al. 2022), injection of particles from past explosions
|
74 |
+
(Kar & Gupta 2022), hadronic interaction between SNR and MCs
|
75 |
+
(Cao et al. 2021c) were discussed in previous literatures. But most of
|
76 |
+
these models do not explain the HE-VHE-UHE gamma-ray spectral
|
77 |
+
© 2022 The Authors
|
78 |
+
arXiv:2301.13451v1 [astro-ph.HE] 31 Jan 2023
|
79 |
+
|
80 |
+
2
|
81 |
+
A. De Sarkar
|
82 |
+
features entirely. Moreover, recent reveal of VHE gamma-ray upper
|
83 |
+
limits observed by the Large-Sized Telescope - Cherenkov Telescope
|
84 |
+
Array (LST-CTA) (Abe et al. 2022) has overruled some of these
|
85 |
+
models for the case of LHAASO J2108+5157. The absence of a
|
86 |
+
powerful pulsar or supernova remnant adds to the mystery as well,
|
87 |
+
leaving one asking what is the possible emission mechanism at play
|
88 |
+
in case of these unidentified UHE gamma-ray sources.
|
89 |
+
To that end, in this letter, we discuss and apply a phenomeno-
|
90 |
+
logical model, in which accelerated particles, escaped from an old,
|
91 |
+
shell-type SNR (now invisible), interact with the associated MCs to
|
92 |
+
produce the observed HE-VHE-UHE gamma-ray data for the case
|
93 |
+
of LHAASO J2108+5157. We also provide the possible age of the
|
94 |
+
old SNR, and account for the disappearance of the SNR in question.
|
95 |
+
Our simple model is also consistent with the X-ray 2𝜎 upper limits
|
96 |
+
given by Abe et al. (2022). We also discuss the applicability of the
|
97 |
+
model in other unidentified Galactic UHE gamma-ray source such
|
98 |
+
as LHAASO J0341+5258. Furthermore, we report that the neutrino
|
99 |
+
flux produced from the hadronic interaction considered in this model,
|
100 |
+
will be non-detectable, even by the next generation observatory such
|
101 |
+
as ICECUBE-Gen2 (Aartsen et al. 2021).
|
102 |
+
2 THE MODEL
|
103 |
+
In this section, we discuss the essentials of the model used to calculate
|
104 |
+
the hadronic and leptonic components produced from the interaction
|
105 |
+
between an old, now invisible SNR and the associated MCs. A more
|
106 |
+
detailed discussion of the model can be found in De Sarkar & Gupta
|
107 |
+
(2022), where we developed and applied our model to explain the
|
108 |
+
peculiar HE-VHE-UHE gamma-ray SED of LHAASO J1908+0621.
|
109 |
+
Our simple model assumes that the supernova had exploded at the
|
110 |
+
center of the cavity of a shell-like structure, which is surrounded by
|
111 |
+
dense MCs. After this explosion, the SNR shock front expands inside
|
112 |
+
the shell cavity, and finally hits the surrounding MCs. During the
|
113 |
+
collision between the shock front and associated MCs, the accelerated
|
114 |
+
particles get injected into the MCs to produce further emissions.
|
115 |
+
After the explosion, the supernova (SN) shock front expands freely
|
116 |
+
during its free expansion phase. When the amount of swept-up inter-
|
117 |
+
stellar medium (ISM) material becomes equal to that of the ejected
|
118 |
+
material at t = t𝑆𝑒𝑑𝑜𝑣, the SN enters the adiabatic Sedov phase. Fi-
|
119 |
+
nally after t = t𝑟𝑎𝑑, the SN enters the radiative phase, in which the
|
120 |
+
cooling timescales is less than the dynamic timescales. During its
|
121 |
+
evolution, the time dependence of the shock velocity and radius can
|
122 |
+
be given by the following simple relations (Fujita et al. 2009; Ohira
|
123 |
+
et al. 2012; De Sarkar & Gupta 2022),
|
124 |
+
𝑣𝑠ℎ(𝑡) =
|
125 |
+
�
|
126 |
+
𝑣𝑖
|
127 |
+
(𝑡 < 𝑡𝑆𝑒𝑑𝑜𝑣)
|
128 |
+
𝑣𝑖(𝑡/𝑡𝑆𝑒𝑑𝑜𝑣)−3/5
|
129 |
+
(𝑡𝑆𝑒𝑑𝑜𝑣 < 𝑡)
|
130 |
+
(1)
|
131 |
+
and,
|
132 |
+
𝑅𝑠ℎ(𝑡) ∝
|
133 |
+
�
|
134 |
+
(𝑡/𝑡𝑆𝑒𝑑𝑜𝑣)
|
135 |
+
(𝑡 < 𝑡𝑆𝑒𝑑𝑜𝑣)
|
136 |
+
(𝑡/𝑡𝑆𝑒𝑑𝑜𝑣)2/5
|
137 |
+
(𝑡𝑆𝑒𝑑𝑜𝑣 < 𝑡)
|
138 |
+
(2)
|
139 |
+
We note that for the entirety of this work, we have assumed the
|
140 |
+
following values: initial velocity of the shock v𝑖 = 109 cm s−1 (Fujita
|
141 |
+
et al. 2009), radius of the shock and time at the beginning of the Sedov
|
142 |
+
phase, R𝑆𝑒𝑑𝑜𝑣 and t𝑆𝑒𝑑𝑜𝑣, to be 2.1 pc and 210 yr, respectively
|
143 |
+
(Ohira et al. 2011; Makino et al. 2019).
|
144 |
+
The CR protons are accelerated through Diffusive Shock Acceler-
|
145 |
+
ation (DSA) mechanism when the SN is in the Sedov phase, where
|
146 |
+
the CR protons accelerate by scattering back and forth across the
|
147 |
+
shock front, while the shock is expanding towards the surround-
|
148 |
+
ing MCs. We assume an escape-limited acceleration scenario (Ohira
|
149 |
+
et al. 2010), in which the CR protons need to escape a geometrical
|
150 |
+
confinement region around the SN shock front produced by strong
|
151 |
+
magnetic turbulence, in order to get injected into the MCs and take
|
152 |
+
part in further interactions. The radius of the outermost boundary
|
153 |
+
of this confinement region (i.e., the escape boundary) is called the
|
154 |
+
escape radius, and it can be denoted by,
|
155 |
+
𝑅𝑒𝑠𝑐(𝑡) = (1 + 𝜅)𝑅𝑠ℎ(𝑡),
|
156 |
+
(3)
|
157 |
+
where 𝜅 ≈ 0.04 (Ohira et al. 2010; Makino et al. 2019), and is
|
158 |
+
defined by the geometrical confinement condition D𝑠ℎ/v𝑠ℎ ∼ l𝑒𝑠𝑐 =
|
159 |
+
𝜅R𝑠ℎ, where l𝑒𝑠𝑐 is the distance of the escape boundary from the
|
160 |
+
shock front and D𝑠ℎ is the diffusion coefficient around the shock
|
161 |
+
(Ohira et al. 2010).
|
162 |
+
After the explosion, the escape boundary in front of the shock
|
163 |
+
front eventually hits the surrounding MCs after traversing a distance
|
164 |
+
of R𝑀𝐶, the distance of MC surface from the cavity center. This
|
165 |
+
essentially means that at the time of collision t𝑐𝑜𝑙𝑙, the escape ra-
|
166 |
+
dius is equal to the MC surface distance, i.e. R𝑒𝑠𝑐 (t𝑐𝑜𝑙𝑙) = R𝑀𝐶
|
167 |
+
≈ R𝑠ℎ (t𝑐𝑜𝑙𝑙), and at the time of collision, the velocity of the shock
|
168 |
+
is denoted by v𝑠ℎ(t𝑐𝑜𝑙𝑙). We assume that the particle acceleration
|
169 |
+
stops at t = t𝑐𝑜𝑙𝑙 (Fujita et al. 2009). Consequently, protons accel-
|
170 |
+
erated at t ≤ t𝑐𝑜𝑙𝑙 take part in further interactions inside the MCs.
|
171 |
+
Moreover, only the protons with sufficiently high energies will es-
|
172 |
+
cape the confinement region around the SNR shock front, whereas
|
173 |
+
the low energy protons will remain confined around the SNR. So a
|
174 |
+
suppression of fluxes in the lower energies, as well as a dominant con-
|
175 |
+
tribution of fluxes in the highest energies should be expected in this
|
176 |
+
scenario. The confinement condition invoked in this model changes
|
177 |
+
the spectral shape of the injected proton population by constraining
|
178 |
+
the minimum energy limit.
|
179 |
+
We estimate the minimum energy limit of the injected proton pop-
|
180 |
+
ulation by assuming that the escape energy is a decreasing function
|
181 |
+
of the shock radius (Makino et al. 2019). This approach is based
|
182 |
+
on the assumption that the maximum energy of CR protons, E𝑝
|
183 |
+
𝑚𝑎𝑥
|
184 |
+
is expected to increase up to knee energy (≈ 1015.5 eV) until the
|
185 |
+
beginning of the Sedov phase, and then decrease from that epoch
|
186 |
+
(Gabici et al. 2009; Ohira et al. 2012). The minimum energy re-
|
187 |
+
quired by protons to escape the confinement region can be given by
|
188 |
+
the phenomenological relation,
|
189 |
+
𝐸 𝑝
|
190 |
+
𝑒𝑠𝑐 = 𝐸 𝑝
|
191 |
+
𝑚𝑎𝑥
|
192 |
+
�
|
193 |
+
𝑅𝑠ℎ
|
194 |
+
𝑅𝑆𝑒𝑑𝑜𝑣
|
195 |
+
�−𝛼
|
196 |
+
,
|
197 |
+
(4)
|
198 |
+
where 𝛼 signifies the evolution of the maximum energy during the
|
199 |
+
Sedov phase (Makino et al. 2019). We treat 𝛼 as a free parameter in
|
200 |
+
this work. After putting R𝑠ℎ ≈ R𝑒𝑠𝑐 = R𝑀𝐶 at the time of collision,
|
201 |
+
we find the minimum energy required to escape the confinement
|
202 |
+
zone, which also gives us the minimum energy threshold for the
|
203 |
+
proton population that gets injected inside the surrounding MCs, i.e.,
|
204 |
+
E𝑝
|
205 |
+
𝑒𝑠𝑐 = E𝑝
|
206 |
+
𝑚𝑖𝑛. Since protons are accelerated by DSA mechanism, we
|
207 |
+
can expect the CR proton spectrum at the shock front ∝ E−𝑠. Then,
|
208 |
+
in an escape-limited particle acceleration scenario, the protons with
|
209 |
+
energies greater than 𝐸 𝑝
|
210 |
+
𝑒𝑠𝑐 have a spectrum (Ohira et al. 2010),
|
211 |
+
𝑁 𝑝
|
212 |
+
𝑒𝑠𝑐(𝐸) ∝ 𝐸−[𝑠+(𝛽/𝛼)],
|
213 |
+
(5)
|
214 |
+
where 𝛽 represents a thermal leakage model of CR injection and
|
215 |
+
is given by 𝛽 = 3(3–s)/2 (Makino et al. 2019). For a typical value of
|
216 |
+
s = 2, we get the value of 𝛽 = 1.5. Note that the spectral shape as
|
217 |
+
MNRAS 000, 1–6 (2022)
|
218 |
+
|
219 |
+
Supernova connection of LHAASO J2108+5157
|
220 |
+
3
|
221 |
+
well as the minimum energy of the proton population are calculated
|
222 |
+
at the time when the escape boundary hits the surrounding MCs at t
|
223 |
+
= t𝑐𝑜𝑙𝑙.
|
224 |
+
At t > t𝑐𝑜𝑙𝑙, the shock enters the momentum conserving “snow-
|
225 |
+
plow” phase. The time evolution of the radius of the shocked shell
|
226 |
+
R𝑠ℎ𝑒𝑙𝑙 (t) inside the MCs can be found using momentum conserva-
|
227 |
+
tion equation (Fujita et al. 2009; De Sarkar & Gupta 2022),
|
228 |
+
4𝜋
|
229 |
+
3
|
230 |
+
�
|
231 |
+
𝑛𝑀𝐶 (𝑅𝑠ℎ𝑒𝑙𝑙(𝑡)3 − 𝑅𝑠ℎ(𝑡𝑐𝑜𝑙𝑙)3) + 𝑛𝑐𝑎𝑣 𝑅𝑠ℎ(𝑡𝑐𝑜𝑙𝑙)3�
|
232 |
+
�𝑅𝑠ℎ𝑒𝑙𝑙(𝑡)
|
233 |
+
= 4𝜋
|
234 |
+
3 𝑛𝑐𝑎𝑣 𝑅𝑠ℎ(𝑡𝑐𝑜𝑙𝑙)3𝑣𝑠ℎ(𝑡𝑐𝑜𝑙𝑙),
|
235 |
+
(6)
|
236 |
+
with R𝑠ℎ𝑒𝑙𝑙 = R𝑀𝐶 at t = t𝑐𝑜𝑙𝑙, n𝑀𝐶 is the number density of
|
237 |
+
the MCs, and n𝑐𝑎𝑣 (≈ 1 cm−3) is the number density inside the
|
238 |
+
cavity of the shell. We solve equation 6 numerically for t > t𝑐𝑜𝑙𝑙,
|
239 |
+
to estimate the current age of the SNR. We estimate the current
|
240 |
+
age by considering the fact that the velocity of the shocked shell
|
241 |
+
at the current age must be similar or even smaller than the internal
|
242 |
+
gas velocity of the MCs. This approach takes into account the non-
|
243 |
+
detection of any SNR shell in unidentified UHE gamma-ray sources
|
244 |
+
discussed above, as the shell of the SNR becomes invisible owing to
|
245 |
+
the higher internal gas velocity of the MCs as compared to that of the
|
246 |
+
shocked shell. We consider the above discussed proton population
|
247 |
+
and total number density of the cold protons inside the surrounding
|
248 |
+
MCs (n𝑀𝐶) to calculate total gamma-ray flux produced through
|
249 |
+
hadronic interaction (Kafexhiu et al. 2014).
|
250 |
+
Similar to protons, electrons can also get accelerated in the SNR
|
251 |
+
shock front and subsequently escape the confinement region to get
|
252 |
+
injected in the associated MCs. Moreover, electrons also lose energy
|
253 |
+
through radiative cooling very efficiently. Hence, the injected electron
|
254 |
+
population was considered to be escape-limited, as well as loss-
|
255 |
+
limited (Yamazaki et al. 2006). We consider the spectral index of
|
256 |
+
the escaped electron population to be same as that of protons (Ohira
|
257 |
+
et al. 2012; De Sarkar & Gupta 2022). To take into accout loss-limited
|
258 |
+
nature of injected electron population, we consider a power law with
|
259 |
+
exponential cutoff as the spectral shape of the escaped electrons,
|
260 |
+
𝑁𝑒
|
261 |
+
𝑒𝑠𝑐(���) ∝ 𝐸−[𝑠+(𝛽/𝛼)]𝑒𝑥𝑝(−𝐸/𝐸𝑒
|
262 |
+
𝑚𝑎𝑥),
|
263 |
+
(7)
|
264 |
+
where, maximum energy of the electron population has been de-
|
265 |
+
termined by synchrotron cooling (Yamazaki et al. 2006; Fujita et al.
|
266 |
+
2009),
|
267 |
+
𝐸𝑒
|
268 |
+
𝑚𝑎𝑥 = 14ℎ−1/2
|
269 |
+
�
|
270 |
+
𝑣𝑠ℎ
|
271 |
+
108 cm/s
|
272 |
+
� �
|
273 |
+
𝐵
|
274 |
+
10 𝜇G
|
275 |
+
�−1/2
|
276 |
+
TeV,
|
277 |
+
(8)
|
278 |
+
where, v𝑠ℎ is the velocity of the shock front and B is the down-
|
279 |
+
stream magnetic field. The parameter h (= 0.05𝑟 ( 𝑓 +𝑟𝑔)
|
280 |
+
𝑟−1
|
281 |
+
, where r is
|
282 |
+
the density compression ratio, f and g are functions of shock angle
|
283 |
+
and gyro-factors) is used as a factor to calculate the acceleration time
|
284 |
+
scale of DSA. We take h ∼ 1, considering the SNR in Sedov phase
|
285 |
+
and neglecting non-linear effects, similar to Yamazaki et al. (2006).
|
286 |
+
We consider v𝑠ℎ = v𝑠ℎ (t𝑐𝑜𝑙𝑙) since we calculate the maximum en-
|
287 |
+
ergy of the lepton population at the collision time and B = B𝑀𝐶,
|
288 |
+
the magnetic field inside the MCs. The minimum energy of the elec-
|
289 |
+
tron population was considered to be E𝑒
|
290 |
+
𝑚𝑖𝑛 ≈ 500 MeV (De Sarkar
|
291 |
+
& Gupta 2022). Furthermore, we consider bremsstrahlung, Inverse-
|
292 |
+
Compton (IC) and synchrotron cooling (Blumenthal & Gould 1970;
|
293 |
+
Ghisellini et al. 1988; Baring et al. 1999) of the injected lepton
|
294 |
+
population to calculate the gamma-ray flux produced. For IC inter-
|
295 |
+
action, we consider interstellar radiation field (ISRF) from Popescu
|
296 |
+
et al. (2017) at the source position, and the Cosmic Microwave Back-
|
297 |
+
ground (temperature T𝐶𝑀 𝐵 = 2.7 K, energy density U𝐶𝑀 𝐵 = 0.25
|
298 |
+
eV cm−3) contribution as well. The number density was considered
|
299 |
+
to be same as that of the MCs.
|
300 |
+
Finally we note that in this particular model, we have neglected
|
301 |
+
the effect of diffusion of particles inside the MCs and assumed that
|
302 |
+
the CR particles, both protons and electrons, lose energy through
|
303 |
+
rapid cooling before escaping the cloud. This assumption can be
|
304 |
+
realized by considering the idea that inside MCs, the diffusion is
|
305 |
+
considerably suppressed (D ≈ 1025−26 cm2 s−1) as compared to that
|
306 |
+
observed in the ISM (D ≈ 1028 cm2 s−1) (Gabici et al. 2007, 2009;
|
307 |
+
Fujita et al. 2009; De Sarkar et al. 2021). Generation of plasma waves
|
308 |
+
by CR streaming can be the reason behind the slow diffusion inside
|
309 |
+
the MCs (Wentzel 1974). On the other hand, if the trapping of CR
|
310 |
+
particles occurs due to some particular orientation of the magnetic
|
311 |
+
field inside the MCs, then also the escape of the particles from the
|
312 |
+
MCs will not be effective and can be neglected (Makino et al. 2019).
|
313 |
+
Consequently, we have considered a steady-state proton and electron
|
314 |
+
population to explain the SED of LHAASO J2108+5157, details of
|
315 |
+
which are given in the next section.
|
316 |
+
3 APPLICATION OF THE MODEL: LHAASO J2108+5157
|
317 |
+
LHAASO J2108+5157 is an UHE gamma-ray source detected by
|
318 |
+
LHAASO at R.A. = 317.22◦ ± 0.07◦
|
319 |
+
𝑠𝑡𝑎𝑡 and decl. = 51.95◦ ± 0.05◦
|
320 |
+
𝑠𝑡𝑎𝑡
|
321 |
+
(Cao et al. 2021c) with a significance of 6.4𝜎 above 100 TeV. The
|
322 |
+
source is reported to have a 95% confidence level extension upper
|
323 |
+
limit of 0.26◦ with a 2D symmetrical Gaussian template, and its
|
324 |
+
spectrum above 25 TeV can be well described by a power law with a
|
325 |
+
photon index of 2.83 ± 0.18 (Cao et al. 2021c). Although no X-ray
|
326 |
+
counterpart within 0.26◦ radius of the source was found, a spatially
|
327 |
+
extended, HE counterpart 4FGL J2108.0+5155e (extension ∼ 0.48◦)
|
328 |
+
(Abdollahi et al. 2020) was observed to be situated at an angular
|
329 |
+
distance of 0.13◦ (Cao et al. 2021c). A new hard spectrum GeV
|
330 |
+
source was also found at l = 92.35◦ and b = 2.56◦ by Fermi-LAT
|
331 |
+
data analysis (Abe et al. 2022), but its large angular separation (∼
|
332 |
+
0.27◦) from the LHAASO source indicates that this new source can
|
333 |
+
hardly be a counterpart. Although no VHE component within 0.5◦
|
334 |
+
radius was confirmed previously, recent observations by LST-CTA
|
335 |
+
has hinted towards an existence of a source with 3.67𝜎 detection
|
336 |
+
significance in the energy range of 3 - 100 TeV (Abe et al. 2022).
|
337 |
+
Future observations may confirm an existence of a VHE counterpart
|
338 |
+
with hard spectral index. The UHE source is located near the center
|
339 |
+
of a GMC labeled [MML2017]4607 (Miville-Deschênes et al. 2017),
|
340 |
+
which has an average angular radius and mass of 0.236◦ and 8469
|
341 |
+
M⊙, respectively, and is situated at a distance of 3.28 kpc from
|
342 |
+
Earth. The average number density of the GMC was estimated to
|
343 |
+
be n𝑀𝐶 ≈ 30 cm−3 (Cao et al. 2021c). The presence of the GMC,
|
344 |
+
spatially coincident with the UHE gamma-ray source points towards
|
345 |
+
the hadronic origin, but leptonic origin can not be neglected. The
|
346 |
+
absence of any energetic pulsar, its wind nebula or SNR warrants a
|
347 |
+
cautious approach in unveiling the true nature of emission regarding
|
348 |
+
this UHE source.
|
349 |
+
Two young open stellar clusters Kronberger 80 and Kronberger 82
|
350 |
+
are in the vicinity of the LHAASO source (with angular distances of
|
351 |
+
0.62◦ and 0.45◦, respectively) (Cao et al. 2021c). But large angular
|
352 |
+
separation between these clusters and LHAASO source centroid, as
|
353 |
+
well as absence of proper distance estimation hint that the contri-
|
354 |
+
bution of these clusters are unlikely (Cao et al. 2021c; Abe et al.
|
355 |
+
MNRAS 000, 1–6 (2022)
|
356 |
+
|
357 |
+
4
|
358 |
+
A. De Sarkar
|
359 |
+
2022). Cao et al. (2021c) suggested that UHE gamma-ray emission
|
360 |
+
is due to an interaction of escaping CRs with MCs, whereas the GeV
|
361 |
+
counterpart maybe due to an old SNR. However, Abe et al. (2022)
|
362 |
+
pointed out that photon index of GeV counterpart spectrum is too
|
363 |
+
soft compared to the observations of old SNRs interacting with MCs
|
364 |
+
(Yuan et al. 2012), and to produce UHE gamma-ray spectrum, the
|
365 |
+
required spectral index of the proton population has to be very hard
|
366 |
+
as compared to the standard DSA theory. Instead, Abe et al. (2022)
|
367 |
+
proposed an alternate leptonic scenario, in which UHE gamma-ray
|
368 |
+
emission is due to TeV halo emission, and the GeV counterpart is due
|
369 |
+
to a tentative, previously undetected pulsar. But a very low associated
|
370 |
+
magnetic field (even lower than the average Galactic magnetic field),
|
371 |
+
and non-detection of a pulsar make the TeV halo interpretation ques-
|
372 |
+
tionable, and open the source up for further exploration. To that end,
|
373 |
+
we apply the model discussed in Section 2 to explain the gamma-ray
|
374 |
+
data from HE to UHE energy range, while being consistent with the
|
375 |
+
X-ray 2𝜎 upper limits. We note that these 2𝜎 X-ray upper limits
|
376 |
+
correspond to a uniform, circular source with a radius of 6′ centered
|
377 |
+
on the position of the LHAASO source (Abe et al. 2022). We explain
|
378 |
+
the VHE-UHE gamma-ray data with hadronic component produced
|
379 |
+
from the interaction between protons, accelerated and escaped at an
|
380 |
+
early time from a now old SNR shock front, with protons inside
|
381 |
+
the surrounding MCs, whereas the HE gamma-ray data is explained
|
382 |
+
using bremsstrahlung cooling of accelerated and escaped electrons
|
383 |
+
inside the medium of the MCs. Our model also shows that the main
|
384 |
+
contribution in X-ray range comes from the synchrotron cooling of
|
385 |
+
the same accelerated and escaped electrons.
|
386 |
+
In this work, we have considered the free parameter 𝛼 = 1.875, and
|
387 |
+
then let the total energy budgets of proton and electron populations
|
388 |
+
vary to explain the MWL SED. Considering the value of 𝛼, and the
|
389 |
+
values of s and 𝛽 discussed in Section 2, we get the spectral indices
|
390 |
+
of the escaped electron and proton populations as p = [s + (𝛽/𝛼)]
|
391 |
+
= 2.8. The distance of the source was taken to be d ∼ 3 kpc. The
|
392 |
+
model spectrum components, as well as the considered MWL SED
|
393 |
+
are shown in Figure 1. Also, we calculate the time evolution of SNR
|
394 |
+
shocked shell inside the associated MCs using equation 6, and find
|
395 |
+
that the SNR, with a final radius of ∼ 30 pc, has to be ∼ 4.4 × 105
|
396 |
+
years old, for the shock velocity to be lower than the internal gas
|
397 |
+
velocity of MC [MML2017]4607 (∼ 13 km s−1) (Cao et al. 2021c),
|
398 |
+
and the SNR shell to disappear. The time evolution of the shocked
|
399 |
+
shell is shown in Figure 2. Finally, the model parameters required to
|
400 |
+
explain the gamma-ray data are shown in Table 1. We have used open
|
401 |
+
source code GAMERA (Hahn 2016) to calculate the model spectrum
|
402 |
+
of different components.
|
403 |
+
4 DISCUSSION AND CONCLUSION
|
404 |
+
In this letter, we have discussed and applied a simple, analytical and
|
405 |
+
phenomenological model to explain the HE-VHE-UHE gamma-ray
|
406 |
+
data observed from the direction of LHAASO J2108+5157. By only
|
407 |
+
adjusting the index 𝛼, not only we show that the model components
|
408 |
+
are consistent with gamma-ray and X-ray observations, the results
|
409 |
+
also naturally explain the observed morphology of the source re-
|
410 |
+
gion, e.g., the disappearance of the SNR at current age. As expected,
|
411 |
+
the SNR was found be old (> 105 years). This also explains why
|
412 |
+
no pulsar has been seen in the source region, as the pulsar is ex-
|
413 |
+
pected to leave the source region due to its natal kick velocity (∼
|
414 |
+
400-500 km s−1) (Gaensler & Slane 2006). Similar nature and emis-
|
415 |
+
sion were also found in another UHE gamma-ray source, LHAASO
|
416 |
+
J1908+0621, details of which were explained by this model in De
|
417 |
+
Sarkar & Gupta (2022). The fact that the emission of multiple UHE
|
418 |
+
10
|
419 |
+
12
|
420 |
+
10
|
421 |
+
10
|
422 |
+
10
|
423 |
+
8
|
424 |
+
10
|
425 |
+
6
|
426 |
+
10
|
427 |
+
4
|
428 |
+
10
|
429 |
+
2
|
430 |
+
100
|
431 |
+
102
|
432 |
+
Energy (TeV)
|
433 |
+
10
|
434 |
+
16
|
435 |
+
10
|
436 |
+
15
|
437 |
+
10
|
438 |
+
14
|
439 |
+
10
|
440 |
+
13
|
441 |
+
10
|
442 |
+
12
|
443 |
+
10
|
444 |
+
11
|
445 |
+
E2 J(E)[erg cm
|
446 |
+
2 s
|
447 |
+
1]
|
448 |
+
pp
|
449 |
+
synchrotron
|
450 |
+
bremsstrahlung
|
451 |
+
inverse-compton
|
452 |
+
Fermi-LAT (Abe et al. 2022)
|
453 |
+
Fermi-LAT (Cao et al. 2021)
|
454 |
+
LHAASO
|
455 |
+
LST-CTA
|
456 |
+
XMM-Newton
|
457 |
+
Figure 1. MWL SED of LHAASO J2108+5157. Gamma-ray data points and
|
458 |
+
upper limits obtained from different observatories such as Fermi-LAT (red
|
459 |
+
(Abe et al. 2022), purple (Cao et al. 2021c)), LHAASO (blue (Cao et al.
|
460 |
+
2021c)), and LST-CTA (green (Abe et al. 2022)) are shown in the figure. The
|
461 |
+
XMM-Newton X-ray 2𝜎 upper limits (Abe et al. 2022) are given in teal. The
|
462 |
+
model p-p interaction (solid line), bremsstrahlung (dashed), IC (dotted), and
|
463 |
+
synchrotron (dot-dashed) components are also shown in the figure.
|
464 |
+
103
|
465 |
+
104
|
466 |
+
105
|
467 |
+
106
|
468 |
+
Time (years)
|
469 |
+
16
|
470 |
+
18
|
471 |
+
20
|
472 |
+
22
|
473 |
+
24
|
474 |
+
26
|
475 |
+
28
|
476 |
+
30
|
477 |
+
32
|
478 |
+
Shock radius (pc)
|
479 |
+
LHAASO J2108+5157
|
480 |
+
Figure 2. Time evolution of the shocked shell associated with the old SNR,
|
481 |
+
inside the surrounding MCs.
|
482 |
+
gamma-ray sources were explained by the same model hints towards
|
483 |
+
its validity in a larger context. Interestingly, another unidentified
|
484 |
+
UHE gamma-ray source, LHAASO J0341+5258, also shows similar
|
485 |
+
characteristics shown by LHAASO J2108+5157 (Cao et al. 2021b).
|
486 |
+
It is very likely that this model is applicable in that case as well.
|
487 |
+
However, in that case, the VHE counterpart has not been properly
|
488 |
+
constrained, and the High Altitude Water Cherenkov (HAWC) upper
|
489 |
+
limit provided in Cao et al. (2021b) corresponds to only a 2𝜎 detec-
|
490 |
+
tion significance. Further observations by CTA and detailed analysis
|
491 |
+
by Fermi-LAT will be necessary to properly constrain the emission
|
492 |
+
of LHAASO J0341+5258.
|
493 |
+
From Figure 1, we can see that the hadronic component adequately
|
494 |
+
explain the VHE-UHE gamma-ray data, whereas the bremsstrahlung
|
495 |
+
component, originated from the cooling of the electron population,
|
496 |
+
explains the gamma-ray data in the HE range. The bremsstrahlung
|
497 |
+
MNRAS 000, 1–6 (2022)
|
498 |
+
|
499 |
+
Supernova connection of LHAASO J2108+5157
|
500 |
+
5
|
501 |
+
Table 1. Parameters Used in The Model.
|
502 |
+
Definition
|
503 |
+
Parameter
|
504 |
+
Value
|
505 |
+
SNR/MC structure and evolution:
|
506 |
+
Initial shock velocity
|
507 |
+
v𝑖 (cm/s)
|
508 |
+
109
|
509 |
+
Time at the start of Sedov phase
|
510 |
+
t𝑆𝑒𝑑𝑜𝑣 (years)
|
511 |
+
210
|
512 |
+
Shock radius at the start of Sedov phase R𝑆𝑒𝑑𝑜𝑣 (pc)
|
513 |
+
2.1
|
514 |
+
Time of collision
|
515 |
+
t𝑐𝑜𝑙𝑙 (years)
|
516 |
+
3.83 × 103
|
517 |
+
Shock radius at time of collision
|
518 |
+
R𝑠ℎ (t𝑐𝑜𝑙𝑙) (pc)
|
519 |
+
16.77 (= R𝑀𝐶)
|
520 |
+
Shock velocity at time of collision
|
521 |
+
v𝑠ℎ (t𝑐𝑜𝑙𝑙) (cm/s) 1.75 × 108
|
522 |
+
Current age of SNR
|
523 |
+
t𝑎𝑔𝑒 (years)
|
524 |
+
4.4 × 105
|
525 |
+
Final radius of shock
|
526 |
+
R𝑠ℎ (t𝑎𝑔𝑒) (pc)
|
527 |
+
30
|
528 |
+
Final velocity of shock
|
529 |
+
v𝑠ℎ (t𝑎𝑔𝑒) (cm/s) 1.2 × 106
|
530 |
+
Distance
|
531 |
+
d (kpc)
|
532 |
+
3
|
533 |
+
MC number density
|
534 |
+
n𝑀𝐶 (cm−3)
|
535 |
+
30
|
536 |
+
MC magnetic field
|
537 |
+
B𝑀𝐶 (𝜇G)
|
538 |
+
25
|
539 |
+
Cavity number density
|
540 |
+
n𝑐𝑎𝑣 (cm−3)
|
541 |
+
1
|
542 |
+
Hadronic component:
|
543 |
+
Minimum energy
|
544 |
+
E𝑝
|
545 |
+
𝑚𝑖𝑛 (TeV)
|
546 |
+
63
|
547 |
+
Maximum energy
|
548 |
+
E𝑝
|
549 |
+
𝑚𝑎𝑥 (TeV)
|
550 |
+
3.1 × 103
|
551 |
+
Spectral index
|
552 |
+
p
|
553 |
+
2.8
|
554 |
+
Energy budget
|
555 |
+
W𝑝 (erg)
|
556 |
+
3.6 × 1047
|
557 |
+
Leptonic component:
|
558 |
+
Minimum energy
|
559 |
+
E𝑒
|
560 |
+
𝑚𝑖𝑛 (TeV)
|
561 |
+
5 × 10−4
|
562 |
+
Maximum energy
|
563 |
+
E𝑒𝑚𝑎𝑥 (TeV)
|
564 |
+
15.5
|
565 |
+
Spectral index
|
566 |
+
p
|
567 |
+
2.8
|
568 |
+
Energy budget
|
569 |
+
W𝑒 (erg)
|
570 |
+
3.6 × 1047
|
571 |
+
component is expected to dominate the IC component, as the in-
|
572 |
+
teraction is taking place inside MCs with a high number density
|
573 |
+
of cold protons. Moreover, the synchrotron component does not
|
574 |
+
violate the X-ray 2𝜎 upper limits. We note that no proper radio
|
575 |
+
counterpart has been associated with the LHAASO J2108+5157 yet.
|
576 |
+
An extended radio source associated with nearby star-forming re-
|
577 |
+
gion (Cao et al. 2021c), as well as point-like radio source NVSS
|
578 |
+
210803+515255 or WENSS B2106.4+5140 (Abe et al. 2022) were
|
579 |
+
found within 95% extension upper limit of LHAASO J2108+5157
|
580 |
+
and 4FGL J2108.0+5155e. Since no proper association was estab-
|
581 |
+
lished between these sources and the gamma-ray source, we refrain
|
582 |
+
from including their radio data in this study to further constrain the
|
583 |
+
model, and we follow the MWL SED discussed in (Abe et al. 2022)
|
584 |
+
to ascertain the feasibility of the model discussed in this letter.
|
585 |
+
As discussed earlier, we have neglected the effect of particle diffu-
|
586 |
+
sion in this model. We note that such an assumption may likely lead
|
587 |
+
to an overestimation, and the aspect of suppressed diffusion inside
|
588 |
+
the MCs is highly uncertain (Xu et al. 2016; Dogiel et al. 2015). In-
|
589 |
+
troducing an energy-independent diffusion coefficient, as discussed
|
590 |
+
in Dogiel et al. (2015), will lead to higher energy budgets required
|
591 |
+
by the electron and proton populations to explain the data. The sup-
|
592 |
+
pressed diffusion coefficient introduced by Gabici et al. (2009) has
|
593 |
+
similar energy dependence as to that observed in ISM, but the exact
|
594 |
+
energy dependence of diffusion coefficient inside clouds is not well
|
595 |
+
constrained. So, to avoid further complications, we have neglected
|
596 |
+
the effect of diffusion in this model, similar to Fujita et al. (2009);
|
597 |
+
Makino et al. (2019), and assumed that the injected particles quickly
|
598 |
+
cool down before escaping the MC medium.
|
599 |
+
We further note that we do not consider the contribution of accel-
|
600 |
+
erated and escaped particles, when the shock front is within the MC
|
601 |
+
medium, in calculating the total gamma-ray SED. Even if the SNR
|
602 |
+
is still in the Sedov phase when the shock is within the MCs, the
|
603 |
+
corresponding contribution was found to be negligible. Moreover,
|
604 |
+
the acceleration and subsequent escape of particles, in that case, will
|
605 |
+
depend on the evolution of the confinement region within the high-
|
606 |
+
density, turbulent medium of the MCs, details of which is beyond the
|
607 |
+
scope of the simple model discussed in this letter. Furthermore, as
|
608 |
+
the SNR enters its radiative phase at t𝑟𝑎𝑑 ∼ 4 × 104 years (Blondin
|
609 |
+
et al. 1998), the particle acceleration becomes ineffective as the small
|
610 |
+
shock velocity at that age, as obtained from equation 6 (< 1.1 × 107
|
611 |
+
cm/s), prevents full ionization of the pre-shock gas (Shull & McKee
|
612 |
+
1979). So no significant contribution to the total gamma-ray SED is
|
613 |
+
expected in the radiative phase of the SNR as well.
|
614 |
+
Since hadronic component primarily dominates in the VHE-UHE
|
615 |
+
gamma-ray range, neutrinos can be produced from the hadronic in-
|
616 |
+
teraction as well. This neutrino flux can be a smoking gun evidence
|
617 |
+
for the dominant hadronic interaction. We have calculated the neu-
|
618 |
+
trino flux resulting from the hadronic interaction discussed above,
|
619 |
+
and found that the corresponding neutrino flux is too low to be de-
|
620 |
+
tected by current generation neutrino telescope such as ICECUBE.
|
621 |
+
Furthermore, we have found that the model neutrino flux does not
|
622 |
+
exceed the 5𝜎 discovery potential after 10 years of observation by
|
623 |
+
next generation neutrino observatory ICECUBE-Gen2 for two de-
|
624 |
+
clinations, 𝛿 = 0◦ and 30◦ (Aartsen et al. 2021), which indicates
|
625 |
+
that it is unlikely to confirm the hadronic nature of UHE gamma-ray
|
626 |
+
emission through neutrino observations, even in the near future, for
|
627 |
+
this source.
|
628 |
+
In conclusion, in this letter, we have shown that by essentially
|
629 |
+
tuning the 𝛼 index, the emission of the LHAASO source can be
|
630 |
+
explained. We note that we do not intend to “fit” the MWL SED,
|
631 |
+
as the SED, in various energy ranges (VHE, X-ray, radio), is poorly
|
632 |
+
constrained and in need of further observations. In this work, we
|
633 |
+
have only applied a simple phenomenological model, while also
|
634 |
+
minimizing the free parameters, which naturally explains the spec-
|
635 |
+
tral features and spatial morphology of LHAASO J2108+5157. Fu-
|
636 |
+
ture observations can confirm the viability of this model to ex-
|
637 |
+
plain LHAASO J2108+5157, or other unidentified UHE gamma-ray
|
638 |
+
source LHAASO 0341+5258, and sources detected in future as well,
|
639 |
+
which show similar nature and emission signatures. If confirmed,
|
640 |
+
then it can be posited that SNRs as a source class, similar to PWNe,
|
641 |
+
can likely be a strong candidate for being the Galactic PeVatrons.
|
642 |
+
ACKNOWLEDGEMENTS
|
643 |
+
I thank the anonymous reviewer for helpful comments and construc-
|
644 |
+
tive criticism. I thank Nayantara Gupta for encouragement.
|
645 |
+
DATA AVAILABILITY
|
646 |
+
The simulated data underlying this paper will be shared on reasonable
|
647 |
+
request to the corresponding author.
|
648 |
+
REFERENCES
|
649 |
+
Aartsen M. G., et al., 2021, Journal of Physics G Nuclear Physics, 48, 060501
|
650 |
+
Abdalla H., et al., 2018, A&A, 612, A1
|
651 |
+
Abdollahi S., et al., 2020, ApJS, 247, 33
|
652 |
+
Abe S., et al., 2022, arXiv e-prints, p. arXiv:2210.00775
|
653 |
+
Albert A., et al., 2021, ApJ, 911, L27
|
654 |
+
Baring M. G., Ellison D. C., Reynolds S. P., Grenier I. A., Goret P., 1999,
|
655 |
+
ApJ, 513, 311
|
656 |
+
Blondin J. M., Wright E. B., Borkowski K. J., Reynolds S. P., 1998, ApJ, 500,
|
657 |
+
342
|
658 |
+
Blumenthal G. R., Gould R. J., 1970, Reviews of Modern Physics, 42, 237
|
659 |
+
Cao Z., 2010, Chinese Physics C, 34, 249
|
660 |
+
Cao Z., et al., 2021a, Nature, 594, 33
|
661 |
+
Cao Z., et al., 2021b, ApJ, 917, L4
|
662 |
+
MNRAS 000, 1–6 (2022)
|
663 |
+
|
664 |
+
6
|
665 |
+
A. De Sarkar
|
666 |
+
Cao Z., et al., 2021c, ApJ, 919, L22
|
667 |
+
De Sarkar A., Gupta N., 2022, ApJ, 934, 118
|
668 |
+
De Sarkar A., Biswas S., Gupta N., 2021, Journal of High Energy Astro-
|
669 |
+
physics, 29, 1
|
670 |
+
De Sarkar A., Zhang W., Martín J., Torres D. F., Li J., Hou X., 2022, A&A,
|
671 |
+
668, A23
|
672 |
+
Dogiel V. A., et al., 2015, ApJ, 809, 48
|
673 |
+
Fujita Y., Ohira Y., Tanaka S. J., Takahara F., 2009, ApJ, 707, L179
|
674 |
+
Gabici S., Aharonian F. A., Blasi P., 2007, Ap&SS, 309, 365
|
675 |
+
Gabici S., Aharonian F. A., Casanova S., 2009, MNRAS, 396, 1629
|
676 |
+
Gaensler B. M., Slane P. O., 2006, ARA&A, 44, 17
|
677 |
+
Ge C., Liu R.-Y., Niu S., Chen Y., Wang X.-Y., 2021, The Innovation, 2,
|
678 |
+
100118
|
679 |
+
Ghisellini G., Guilbert P. W., Svensson R., 1988, ApJ, 334, L5
|
680 |
+
Hahn J., 2016, PoS, ICRC2015, 917
|
681 |
+
Kafexhiu E., Aharonian F., Taylor A. M., Vila G. S., 2014, Phys. Rev. D, 90,
|
682 |
+
123014
|
683 |
+
Kar A., Gupta N., 2022, ApJ, 926, 110
|
684 |
+
Liang X.-H., Li C.-M., Wu Q.-Z., Pan J.-S., Liu R.-Y., 2022, Universe, 8, 547
|
685 |
+
Makino K., Fujita Y., Nobukawa K. K., Matsumoto H., Ohira Y., 2019, PASJ,
|
686 |
+
71, 78
|
687 |
+
Miville-Deschênes M.-A., Murray N., Lee E. J., 2017, ApJ, 834, 57
|
688 |
+
Ohira Y., Murase K., Yamazaki R., 2010, A&A, 513, A17
|
689 |
+
Ohira Y., Murase K., Yamazaki R., 2011, MNRAS, 410, 1577
|
690 |
+
Ohira Y., Yamazaki R., Kawanaka N., Ioka K., 2012, MNRAS, 427, 91
|
691 |
+
Popescu C. C., Yang R., Tuffs R. J., Natale G., Rushton M., Aharonian F.,
|
692 |
+
2017, MNRAS, 470, 2539
|
693 |
+
Shull J. M., McKee C. F., 1979, ApJ, 227, 131
|
694 |
+
Wentzel D. G., 1974, ARA&A, 12, 71
|
695 |
+
Xu S., Yan H., Lazarian A., 2016, ApJ, 826, 166
|
696 |
+
Yamazaki R., Kohri K., Bamba A., Yoshida T., Tsuribe T., Takahara F., 2006,
|
697 |
+
MNRAS, 371, 1975
|
698 |
+
Yuan Q., Liu S., Bi X., 2012, ApJ, 761, 133
|
699 |
+
This paper has been typeset from a TEX/LATEX file prepared by the author.
|
700 |
+
MNRAS 000, 1–6 (2022)
|
701 |
+
|
BNFQT4oBgHgl3EQf9jeh/content/tmp_files/load_file.txt
ADDED
@@ -0,0 +1,483 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
filepath=/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf,len=482
|
2 |
+
page_content='MNRAS 000, 1–6 (2022) Preprint 1 February 2023 Compiled using MNRAS LATEX style file v3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
3 |
+
page_content='0 Supernova connection of unidentified ultra high energy gamma-ray source LHAASO J2108+5157 Agnibha De Sarkar,1★ 1Astronomy & Astrophysics group, Raman Research Institute C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
4 |
+
page_content=' V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
5 |
+
page_content=' Raman Avenue, 5th Cross Road, Sadashivanagar, Bengaluru 560080, Karnataka, India Accepted XXX.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
6 |
+
page_content=' Received YYY;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
7 |
+
page_content=' in original form ZZZ ABSTRACT We present a simple phenomenological model of hadronic interaction between protons accelerated in an old supernova remnant (SNR) and cold protons situated within the associated molecular clouds (MCs).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
8 |
+
page_content=' The accelerated protons from the old SNR escaped the SNR shock front, and got injected into the MCs at an earlier time, producing ultra high energy gamma-rays and neutrinos through inelastic proton-proton interaction.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
9 |
+
page_content=' We also take into account the acceleration and subsequent escape of electrons from the SNR shock front.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
10 |
+
page_content=' The escaped electrons produce gamma-rays through various radiative cooling mechanisms, after getting injected into the MCs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
11 |
+
page_content=' We use the model discussed in this letter to explain the multiwavelength (MWL) spectral energy distribution (SED) of unidentified Galactic ultra high energy gamma-ray source LHAASO J2108+5157.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
12 |
+
page_content=' We also discuss the feasibility of applying this model in other cases as well.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
13 |
+
page_content=' Future observations can test the viability of the model discussed in this letter, which will in turn confirm that the SNRs can, in fact, accelerate particles up to PeV energies.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
14 |
+
page_content=' Key words: radiation mechanisms: non-thermal – ISM: individual objects: LHAASO J2108+5157 – gamma-rays: ISM – ISM: supernova remnants 1 INTRODUCTION Observations by the Large High Altitude Air Shower Observatory (LHAASO), located in China, have opened a new era of gamma- ray astrophysics (Cao 2010).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
15 |
+
page_content=' Since it has become operational on 2020 April, LHAASO has detected more than a dozen ultra high energy (UHE;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
16 |
+
page_content=' E𝛾 ≥ 100 TeV) gamma-ray sources, most of which are unidentified (Cao et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
17 |
+
page_content=' 2021a).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
18 |
+
page_content=' The detection of these UHE gamma- ray sources indicates the presence of cosmic ray (CR) accelerators in our Milky Way Galaxy, which can accelerate particles up to PeV (= 1015 eV) energies, more commonly known as “PeVatrons”.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
19 |
+
page_content=' Several classes of Galactic sources such as supernova remnants (SNRs), pul- sar wind nebulae (PWNe), young stellar clusters have been posited to be potential PeVatron candidates.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
20 |
+
page_content=' Although it is still an open question as to what class of source is responsible for accelerating particles up to PeV energies, most of the UHE gamma-ray sources detected by LHAASO, along with their high energy (HE;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
21 |
+
page_content=' E𝛾 < 100 GeV) and very high energy (VHE;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
22 |
+
page_content=' 100 GeV ≤ E𝛾 < 100 TeV) gamma-ray counterparts, have been associated with PWNe in previous studies, due to their close proximity with an energetic pulsar, and their typ- ically extended spatial morphology (Abdalla et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
23 |
+
page_content=' 2018).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
24 |
+
page_content=' This idea gained steam after it was confirmed that Crab pulsar wind nebula is indeed a PeVatron source (Cao et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
25 |
+
page_content=' 2021a).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
26 |
+
page_content=' However, in spite of the notion that energetic pulsars with high spin-down luminosity ( �𝐸 > 1036 erg s−1) coinciding or remaining in a very close spatial proximity of UHE gamma-ray sources, may be a universal feature ★ E-mail: agnibha@rri.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
27 |
+
page_content='res.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
28 |
+
page_content='in (Albert et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
29 |
+
page_content=' 2021), further theoretical analyses of these LHAASO detected UHE gamma-ray sources seem to tell a different story.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
30 |
+
page_content=' Recent studies have modeled a few of the significantly detected LHAASO sources in detail.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
31 |
+
page_content=' For example, De Sarkar & Gupta (2022) found that the UHE gamma-ray emission observed from LHAASO J1908+0621 is most likely hadronic in origin, emanated from the interaction between SNR G40.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
32 |
+
page_content='5-0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
33 |
+
page_content='5 and the associated MCs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
34 |
+
page_content=' On the other hand, in De Sarkar et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
35 |
+
page_content=' (2022), another significantly detected source, LHAASO J2226+6057, was extensively modeled assuming that the UHE gamma-ray emission is coming from the PWN associ- ated with PSR J2229+6114.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
36 |
+
page_content=' As caveats of the model, it was found that the PWN interpretation of LHAASO J2226+6057 leads to a very high radius of PWN, as well as a very small value of magnetic field.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
37 |
+
page_content=' Naturally, these results are in contrast with the observational results (Ge et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
38 |
+
page_content=' 2021;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
39 |
+
page_content=' Liang et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
40 |
+
page_content=' 2022), thus indicating that the PWN may not be the contributing source to power the UHE gamma-ray source detected.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
41 |
+
page_content=' This indicates interaction between SNRs and associated MCs may be the primary reason behind particle acceleration to PeV energies in Galactic sources.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
42 |
+
page_content=' With this factors in mind, we focus on the emission of the recent LHAASO detected unidentified UHE gamma-ray sources: LHAASO J2108+5157 (Cao et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
43 |
+
page_content=' 2021c) and LHAASO J0341+5258 (Cao et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
44 |
+
page_content=' 2021b).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
45 |
+
page_content=' Both of these sources were found to be associated with MCs, but no apparent association with energetic pulsars or SNRs were established.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
46 |
+
page_content=' Scenarios including leptonic emission from TeV halo (Abe et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
47 |
+
page_content=' 2022), injection of particles from past explosions (Kar & Gupta 2022), hadronic interaction between SNR and MCs (Cao et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
48 |
+
page_content=' 2021c) were discussed in previous literatures.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
49 |
+
page_content=' But most of these models do not explain the HE-VHE-UHE gamma-ray spectral © 2022 The Authors arXiv:2301.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
50 |
+
page_content='13451v1 [astro-ph.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
51 |
+
page_content='HE] 31 Jan 2023 2 A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
52 |
+
page_content=' De Sarkar features entirely.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
53 |
+
page_content=' Moreover, recent reveal of VHE gamma-ray upper limits observed by the Large-Sized Telescope - Cherenkov Telescope Array (LST-CTA) (Abe et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
54 |
+
page_content=' 2022) has overruled some of these models for the case of LHAASO J2108+5157.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
55 |
+
page_content=' The absence of a powerful pulsar or supernova remnant adds to the mystery as well, leaving one asking what is the possible emission mechanism at play in case of these unidentified UHE gamma-ray sources.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
56 |
+
page_content=' To that end, in this letter, we discuss and apply a phenomeno- logical model, in which accelerated particles, escaped from an old, shell-type SNR (now invisible), interact with the associated MCs to produce the observed HE-VHE-UHE gamma-ray data for the case of LHAASO J2108+5157.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
57 |
+
page_content=' We also provide the possible age of the old SNR, and account for the disappearance of the SNR in question.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
58 |
+
page_content=' Our simple model is also consistent with the X-ray 2𝜎 upper limits given by Abe et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
59 |
+
page_content=' (2022).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
60 |
+
page_content=' We also discuss the applicability of the model in other unidentified Galactic UHE gamma-ray source such as LHAASO J0341+5258.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
61 |
+
page_content=' Furthermore, we report that the neutrino flux produced from the hadronic interaction considered in this model, will be non-detectable, even by the next generation observatory such as ICECUBE-Gen2 (Aartsen et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
62 |
+
page_content=' 2021).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
63 |
+
page_content=' 2 THE MODEL In this section, we discuss the essentials of the model used to calculate the hadronic and leptonic components produced from the interaction between an old, now invisible SNR and the associated MCs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
64 |
+
page_content=' A more detailed discussion of the model can be found in De Sarkar & Gupta (2022), where we developed and applied our model to explain the peculiar HE-VHE-UHE gamma-ray SED of LHAASO J1908+0621.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
65 |
+
page_content=' Our simple model assumes that the supernova had exploded at the center of the cavity of a shell-like structure, which is surrounded by dense MCs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
66 |
+
page_content=' After this explosion, the SNR shock front expands inside the shell cavity, and finally hits the surrounding MCs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
67 |
+
page_content=' During the collision between the shock front and associated MCs, the accelerated particles get injected into the MCs to produce further emissions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
68 |
+
page_content=' After the explosion, the supernova (SN) shock front expands freely during its free expansion phase.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
69 |
+
page_content=' When the amount of swept-up inter- stellar medium (ISM) material becomes equal to that of the ejected material at t = t𝑆𝑒𝑑𝑜𝑣, the SN enters the adiabatic Sedov phase.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
70 |
+
page_content=' Fi- nally after t = t𝑟𝑎𝑑, the SN enters the radiative phase, in which the cooling timescales is less than the dynamic timescales.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
71 |
+
page_content=' During its evolution, the time dependence of the shock velocity and radius can be given by the following simple relations (Fujita et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
72 |
+
page_content=' 2009;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
73 |
+
page_content=' Ohira et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
74 |
+
page_content=' 2012;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
75 |
+
page_content=' De Sarkar & Gupta 2022), 𝑣𝑠ℎ(𝑡) = � 𝑣𝑖 (𝑡 < 𝑡𝑆𝑒𝑑𝑜𝑣) 𝑣𝑖(𝑡/𝑡𝑆𝑒𝑑𝑜𝑣)−3/5 (𝑡𝑆𝑒𝑑𝑜𝑣 < 𝑡) (1) and, 𝑅𝑠ℎ(𝑡) ∝ � (𝑡/𝑡𝑆𝑒𝑑𝑜𝑣) (𝑡 < 𝑡𝑆𝑒𝑑𝑜𝑣) (𝑡/𝑡𝑆𝑒𝑑𝑜𝑣)2/5 (𝑡𝑆𝑒𝑑𝑜𝑣 < 𝑡) (2) We note that for the entirety of this work, we have assumed the following values: initial velocity of the shock v𝑖 = 109 cm s−1 (Fujita et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
76 |
+
page_content=' 2009), radius of the shock and time at the beginning of the Sedov phase, R𝑆𝑒𝑑𝑜𝑣 and t𝑆𝑒𝑑𝑜𝑣, to be 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
77 |
+
page_content='1 pc and 210 yr, respectively (Ohira et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
78 |
+
page_content=' 2011;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
79 |
+
page_content=' Makino et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
80 |
+
page_content=' 2019).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
81 |
+
page_content=' The CR protons are accelerated through Diffusive Shock Acceler- ation (DSA) mechanism when the SN is in the Sedov phase, where the CR protons accelerate by scattering back and forth across the shock front, while the shock is expanding towards the surround- ing MCs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
82 |
+
page_content=' We assume an escape-limited acceleration scenario (Ohira et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
83 |
+
page_content=' 2010), in which the CR protons need to escape a geometrical confinement region around the SN shock front produced by strong magnetic turbulence, in order to get injected into the MCs and take part in further interactions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
84 |
+
page_content=' The radius of the outermost boundary of this confinement region (i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
85 |
+
page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
86 |
+
page_content=', the escape boundary) is called the escape radius, and it can be denoted by, 𝑅𝑒𝑠𝑐(𝑡) = (1 + 𝜅)𝑅𝑠ℎ(𝑡), (3) where 𝜅 ≈ 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
87 |
+
page_content='04 (Ohira et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
88 |
+
page_content=' 2010;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
89 |
+
page_content=' Makino et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
90 |
+
page_content=' 2019), and is defined by the geometrical confinement condition D𝑠ℎ/v𝑠ℎ ∼ l𝑒𝑠𝑐 = 𝜅R𝑠ℎ, where l𝑒𝑠𝑐 is the distance of the escape boundary from the shock front and D𝑠ℎ is the diffusion coefficient around the shock (Ohira et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
91 |
+
page_content=' 2010).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
92 |
+
page_content=' After the explosion, the escape boundary in front of the shock front eventually hits the surrounding MCs after traversing a distance of R𝑀𝐶, the distance of MC surface from the cavity center.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
93 |
+
page_content=' This essentially means that at the time of collision t𝑐𝑜𝑙𝑙, the escape ra- dius is equal to the MC surface distance, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
94 |
+
page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
95 |
+
page_content=' R𝑒𝑠𝑐 (t𝑐𝑜𝑙𝑙) = R𝑀𝐶 ≈ R𝑠ℎ (t𝑐𝑜𝑙𝑙), and at the time of collision, the velocity of the shock is denoted by v𝑠ℎ(t𝑐𝑜𝑙𝑙).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
96 |
+
page_content=' We assume that the particle acceleration stops at t = t𝑐𝑜𝑙𝑙 (Fujita et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
97 |
+
page_content=' 2009).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
98 |
+
page_content=' Consequently, protons accel- erated at t ≤ t𝑐𝑜𝑙𝑙 take part in further interactions inside the MCs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
99 |
+
page_content=' Moreover, only the protons with sufficiently high energies will es- cape the confinement region around the SNR shock front, whereas the low energy protons will remain confined around the SNR.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
100 |
+
page_content=' So a suppression of fluxes in the lower energies, as well as a dominant con- tribution of fluxes in the highest energies should be expected in this scenario.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
101 |
+
page_content=' The confinement condition invoked in this model changes the spectral shape of the injected proton population by constraining the minimum energy limit.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
102 |
+
page_content=' We estimate the minimum energy limit of the injected proton pop- ulation by assuming that the escape energy is a decreasing function of the shock radius (Makino et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
103 |
+
page_content=' 2019).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
104 |
+
page_content=' This approach is based on the assumption that the maximum energy of CR protons, E𝑝 𝑚𝑎𝑥 is expected to increase up to knee energy (≈ 1015.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
105 |
+
page_content='5 eV) until the beginning of the Sedov phase, and then decrease from that epoch (Gabici et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
106 |
+
page_content=' 2009;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
107 |
+
page_content=' Ohira et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
108 |
+
page_content=' 2012).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
109 |
+
page_content=' The minimum energy re- quired by protons to escape the confinement region can be given by the phenomenological relation, 𝐸 𝑝 𝑒𝑠𝑐 = 𝐸 𝑝 𝑚𝑎𝑥 � 𝑅𝑠ℎ 𝑅𝑆𝑒𝑑𝑜𝑣 �−𝛼 , (4) where 𝛼 signifies the evolution of the maximum energy during the Sedov phase (Makino et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
110 |
+
page_content=' 2019).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
111 |
+
page_content=' We treat 𝛼 as a free parameter in this work.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
112 |
+
page_content=' After putting R𝑠ℎ ≈ R𝑒𝑠𝑐 = R𝑀𝐶 at the time of collision, we find the minimum energy required to escape the confinement zone, which also gives us the minimum energy threshold for the proton population that gets injected inside the surrounding MCs, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
113 |
+
page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
114 |
+
page_content=', E𝑝 𝑒𝑠𝑐 = E𝑝 𝑚𝑖𝑛.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
115 |
+
page_content=' Since protons are accelerated by DSA mechanism, we can expect the CR proton spectrum at the shock front ∝ E−𝑠.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
116 |
+
page_content=' Then, in an escape-limited particle acceleration scenario, the protons with energies greater than 𝐸 𝑝 𝑒𝑠𝑐 have a spectrum (Ohira et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
117 |
+
page_content=' 2010), 𝑁 𝑝 𝑒𝑠𝑐(𝐸) ∝ 𝐸−[𝑠+(𝛽/𝛼)], (5) where 𝛽 represents a thermal leakage model of CR injection and is given by 𝛽 = 3(3–s)/2 (Makino et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
118 |
+
page_content=' 2019).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
119 |
+
page_content=' For a typical value of s = 2, we get the value of 𝛽 = 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
120 |
+
page_content='5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
121 |
+
page_content=' Note that the spectral shape as MNRAS 000, 1–6 (2022) Supernova connection of LHAASO J2108+5157 3 well as the minimum energy of the proton population are calculated at the time when the escape boundary hits the surrounding MCs at t = t𝑐𝑜𝑙𝑙.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
122 |
+
page_content=' At t > t𝑐𝑜𝑙𝑙, the shock enters the momentum conserving “snow- plow” phase.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
123 |
+
page_content=' The time evolution of the radius of the shocked shell R𝑠ℎ𝑒𝑙𝑙 (t) inside the MCs can be found using momentum conserva- tion equation (Fujita et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
124 |
+
page_content=' 2009;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
125 |
+
page_content=' De Sarkar & Gupta 2022), 4𝜋 3 � 𝑛𝑀𝐶 (𝑅𝑠ℎ𝑒𝑙𝑙(𝑡)3 − 𝑅𝑠ℎ(𝑡𝑐𝑜𝑙𝑙)3) + 𝑛𝑐𝑎𝑣 𝑅𝑠ℎ(𝑡𝑐𝑜𝑙𝑙)3� �𝑅𝑠ℎ𝑒𝑙𝑙(𝑡) = 4𝜋 3 𝑛𝑐𝑎𝑣 𝑅𝑠ℎ(𝑡𝑐𝑜𝑙𝑙)3𝑣𝑠ℎ(𝑡𝑐𝑜𝑙𝑙), (6) with R𝑠ℎ𝑒𝑙𝑙 = R𝑀𝐶 at t = t𝑐𝑜𝑙𝑙, n𝑀𝐶 is the number density of the MCs, and n𝑐𝑎𝑣 (≈ 1 cm−3) is the number density inside the cavity of the shell.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
126 |
+
page_content=' We solve equation 6 numerically for t > t𝑐𝑜𝑙𝑙, to estimate the current age of the SNR.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
127 |
+
page_content=' We estimate the current age by considering the fact that the velocity of the shocked shell at the current age must be similar or even smaller than the internal gas velocity of the MCs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
128 |
+
page_content=' This approach takes into account the non- detection of any SNR shell in unidentified UHE gamma-ray sources discussed above, as the shell of the SNR becomes invisible owing to the higher internal gas velocity of the MCs as compared to that of the shocked shell.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
129 |
+
page_content=' We consider the above discussed proton population and total number density of the cold protons inside the surrounding MCs (n𝑀𝐶) to calculate total gamma-ray flux produced through hadronic interaction (Kafexhiu et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
130 |
+
page_content=' 2014).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
131 |
+
page_content=' Similar to protons, electrons can also get accelerated in the SNR shock front and subsequently escape the confinement region to get injected in the associated MCs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
132 |
+
page_content=' Moreover, electrons also lose energy through radiative cooling very efficiently.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
133 |
+
page_content=' Hence, the injected electron population was considered to be escape-limited, as well as loss- limited (Yamazaki et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
134 |
+
page_content=' 2006).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
135 |
+
page_content=' We consider the spectral index of the escaped electron population to be same as that of protons (Ohira et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
136 |
+
page_content=' 2012;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
137 |
+
page_content=' De Sarkar & Gupta 2022).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
138 |
+
page_content=' To take into accout loss-limited nature of injected electron population, we consider a power law with exponential cutoff as the spectral shape of the escaped electrons, 𝑁𝑒 𝑒𝑠𝑐(𝐸) ∝ 𝐸−[𝑠+(𝛽/𝛼)]𝑒𝑥𝑝(−𝐸/𝐸𝑒 𝑚𝑎𝑥), (7) where, maximum energy of the electron population has been de- termined by synchrotron cooling (Yamazaki et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
139 |
+
page_content=' 2006;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
140 |
+
page_content=' Fujita et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
141 |
+
page_content=' 2009), 𝐸𝑒 𝑚𝑎𝑥 = 14ℎ−1/2 � 𝑣𝑠ℎ 108 cm/s � � 𝐵 10 𝜇G �−1/2 TeV, (8) where, v𝑠ℎ is the velocity of the shock front and B is the down- stream magnetic field.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
142 |
+
page_content=' The parameter h (= 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
143 |
+
page_content='05𝑟 ( 𝑓 +𝑟𝑔) 𝑟−1 , where r is the density compression ratio, f and g are functions of shock angle and gyro-factors) is used as a factor to calculate the acceleration time scale of DSA.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
144 |
+
page_content=' We take h ∼ 1, considering the SNR in Sedov phase and neglecting non-linear effects, similar to Yamazaki et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
145 |
+
page_content=' (2006).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
146 |
+
page_content=' We consider v𝑠ℎ = v𝑠ℎ (t𝑐𝑜𝑙𝑙) since we calculate the maximum en- ergy of the lepton population at the collision time and B = B𝑀𝐶, the magnetic field inside the MCs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
147 |
+
page_content=' The minimum energy of the elec- tron population was considered to be E𝑒 𝑚𝑖𝑛 ≈ 500 MeV (De Sarkar & Gupta 2022).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
148 |
+
page_content=' Furthermore, we consider bremsstrahlung, Inverse- Compton (IC) and synchrotron cooling (Blumenthal & Gould 1970;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
149 |
+
page_content=' Ghisellini et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
150 |
+
page_content=' 1988;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
151 |
+
page_content=' Baring et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
152 |
+
page_content=' 1999) of the injected lepton population to calculate the gamma-ray flux produced.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
153 |
+
page_content=' For IC inter- action, we consider interstellar radiation field (ISRF) from Popescu et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
154 |
+
page_content=' (2017) at the source position, and the Cosmic Microwave Back- ground (temperature T𝐶𝑀 𝐵 = 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
155 |
+
page_content='7 K, energy density U𝐶𝑀 𝐵 = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
156 |
+
page_content='25 eV cm−3) contribution as well.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
157 |
+
page_content=' The number density was considered to be same as that of the MCs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
158 |
+
page_content=' Finally we note that in this particular model, we have neglected the effect of diffusion of particles inside the MCs and assumed that the CR particles, both protons and electrons, lose energy through rapid cooling before escaping the cloud.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
159 |
+
page_content=' This assumption can be realized by considering the idea that inside MCs, the diffusion is considerably suppressed (D ≈ 1025−26 cm2 s−1) as compared to that observed in the ISM (D ≈ 1028 cm2 s−1) (Gabici et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
160 |
+
page_content=' 2007, 2009;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
161 |
+
page_content=' Fujita et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
162 |
+
page_content=' 2009;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
163 |
+
page_content=' De Sarkar et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
164 |
+
page_content=' 2021).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
165 |
+
page_content=' Generation of plasma waves by CR streaming can be the reason behind the slow diffusion inside the MCs (Wentzel 1974).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
166 |
+
page_content=' On the other hand, if the trapping of CR particles occurs due to some particular orientation of the magnetic field inside the MCs, then also the escape of the particles from the MCs will not be effective and can be neglected (Makino et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
167 |
+
page_content=' 2019).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
168 |
+
page_content=' Consequently, we have considered a steady-state proton and electron population to explain the SED of LHAASO J2108+5157, details of which are given in the next section.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
169 |
+
page_content=' 3 APPLICATION OF THE MODEL: LHAASO J2108+5157 LHAASO J2108+5157 is an UHE gamma-ray source detected by LHAASO at R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
170 |
+
page_content='A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
171 |
+
page_content=' = 317.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
172 |
+
page_content='22◦ ± 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
173 |
+
page_content='07◦ 𝑠𝑡𝑎𝑡 and decl.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
174 |
+
page_content=' = 51.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
175 |
+
page_content='95◦ ± 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
176 |
+
page_content='05◦ 𝑠𝑡𝑎𝑡 (Cao et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
177 |
+
page_content=' 2021c) with a significance of 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
178 |
+
page_content='4𝜎 above 100 TeV.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
179 |
+
page_content=' The source is reported to have a 95% confidence level extension upper limit of 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
180 |
+
page_content='26◦ with a 2D symmetrical Gaussian template, and its spectrum above 25 TeV can be well described by a power law with a photon index of 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
181 |
+
page_content='83 ± 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
182 |
+
page_content='18 (Cao et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
183 |
+
page_content=' 2021c).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
184 |
+
page_content=' Although no X-ray counterpart within 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
185 |
+
page_content='26◦ radius of the source was found, a spatially extended, HE counterpart 4FGL J2108.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
186 |
+
page_content='0+5155e (extension ∼ 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
187 |
+
page_content='48◦) (Abdollahi et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
188 |
+
page_content=' 2020) was observed to be situated at an angular distance of 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
189 |
+
page_content='13◦ (Cao et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
190 |
+
page_content=' 2021c).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
191 |
+
page_content=' A new hard spectrum GeV source was also found at l = 92.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
192 |
+
page_content='35◦ and b = 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
193 |
+
page_content='56◦ by Fermi-LAT data analysis (Abe et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
194 |
+
page_content=' 2022), but its large angular separation (∼ 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
195 |
+
page_content='27◦) from the LHAASO source indicates that this new source can hardly be a counterpart.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
196 |
+
page_content=' Although no VHE component within 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
197 |
+
page_content='5◦ radius was confirmed previously, recent observations by LST-CTA has hinted towards an existence of a source with 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
198 |
+
page_content='67𝜎 detection significance in the energy range of 3 - 100 TeV (Abe et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
199 |
+
page_content=' 2022).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
200 |
+
page_content=' Future observations may confirm an existence of a VHE counterpart with hard spectral index.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
201 |
+
page_content=' The UHE source is located near the center of a GMC labeled [MML2017]4607 (Miville-Deschênes et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
202 |
+
page_content=' 2017), which has an average angular radius and mass of 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
203 |
+
page_content='236◦ and 8469 M⊙, respectively, and is situated at a distance of 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
204 |
+
page_content='28 kpc from Earth.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
205 |
+
page_content=' The average number density of the GMC was estimated to be n𝑀𝐶 ≈ 30 cm−3 (Cao et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
206 |
+
page_content=' 2021c).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
207 |
+
page_content=' The presence of the GMC, spatially coincident with the UHE gamma-ray source points towards the hadronic origin, but leptonic origin can not be neglected.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
208 |
+
page_content=' The absence of any energetic pulsar, its wind nebula or SNR warrants a cautious approach in unveiling the true nature of emission regarding this UHE source.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
209 |
+
page_content=' Two young open stellar clusters Kronberger 80 and Kronberger 82 are in the vicinity of the LHAASO source (with angular distances of 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
210 |
+
page_content='62◦ and 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
211 |
+
page_content='45◦, respectively) (Cao et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
212 |
+
page_content=' 2021c).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
213 |
+
page_content=' But large angular separation between these clusters and LHAASO source centroid, as well as absence of proper distance estimation hint that the contri- bution of these clusters are unlikely (Cao et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
214 |
+
page_content=' 2021c;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
215 |
+
page_content=' Abe et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
216 |
+
page_content=' MNRAS 000, 1–6 (2022) 4 A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
217 |
+
page_content=' De Sarkar 2022).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
218 |
+
page_content=' Cao et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
219 |
+
page_content=' (2021c) suggested that UHE gamma-ray emission is due to an interaction of escaping CRs with MCs, whereas the GeV counterpart maybe due to an old SNR.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
220 |
+
page_content=' However, Abe et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
221 |
+
page_content=' (2022) pointed out that photon index of GeV counterpart spectrum is too soft compared to the observations of old SNRs interacting with MCs (Yuan et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
222 |
+
page_content=' 2012), and to produce UHE gamma-ray spectrum, the required spectral index of the proton population has to be very hard as compared to the standard DSA theory.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
223 |
+
page_content=' Instead, Abe et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
224 |
+
page_content=' (2022) proposed an alternate leptonic scenario, in which UHE gamma-ray emission is due to TeV halo emission, and the GeV counterpart is due to a tentative, previously undetected pulsar.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
225 |
+
page_content=' But a very low associated magnetic field (even lower than the average Galactic magnetic field), and non-detection of a pulsar make the TeV halo interpretation ques- tionable, and open the source up for further exploration.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
226 |
+
page_content=' To that end, we apply the model discussed in Section 2 to explain the gamma-ray data from HE to UHE energy range, while being consistent with the X-ray 2𝜎 upper limits.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
227 |
+
page_content=' We note that these 2𝜎 X-ray upper limits correspond to a uniform, circular source with a radius of 6′ centered on the position of the LHAASO source (Abe et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
228 |
+
page_content=' 2022).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
229 |
+
page_content=' We explain the VHE-UHE gamma-ray data with hadronic component produced from the interaction between protons, accelerated and escaped at an early time from a now old SNR shock front, with protons inside the surrounding MCs, whereas the HE gamma-ray data is explained using bremsstrahlung cooling of accelerated and escaped electrons inside the medium of the MCs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
230 |
+
page_content=' Our model also shows that the main contribution in X-ray range comes from the synchrotron cooling of the same accelerated and escaped electrons.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
231 |
+
page_content=' In this work, we have considered the free parameter 𝛼 = 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
232 |
+
page_content='875, and then let the total energy budgets of proton and electron populations vary to explain the MWL SED.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
233 |
+
page_content=' Considering the value of 𝛼, and the values of s and 𝛽 discussed in Section 2, we get the spectral indices of the escaped electron and proton populations as p = [s + (𝛽/𝛼)] = 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
234 |
+
page_content='8.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
235 |
+
page_content=' The distance of the source was taken to be d ∼ 3 kpc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
236 |
+
page_content=' The model spectrum components, as well as the considered MWL SED are shown in Figure 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
237 |
+
page_content=' Also, we calculate the time evolution of SNR shocked shell inside the associated MCs using equation 6, and find that the SNR, with a final radius of ∼ 30 pc, has to be ∼ 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
238 |
+
page_content='4 × 105 years old, for the shock velocity to be lower than the internal gas velocity of MC [MML2017]4607 (∼ 13 km s−1) (Cao et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
239 |
+
page_content=' 2021c), and the SNR shell to disappear.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
240 |
+
page_content=' The time evolution of the shocked shell is shown in Figure 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
241 |
+
page_content=' Finally, the model parameters required to explain the gamma-ray data are shown in Table 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
242 |
+
page_content=' We have used open source code GAMERA (Hahn 2016) to calculate the model spectrum of different components.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
243 |
+
page_content=' 4 DISCUSSION AND CONCLUSION In this letter, we have discussed and applied a simple, analytical and phenomenological model to explain the HE-VHE-UHE gamma-ray data observed from the direction of LHAASO J2108+5157.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
244 |
+
page_content=' By only adjusting the index 𝛼, not only we show that the model components are consistent with gamma-ray and X-ray observations, the results also naturally explain the observed morphology of the source re- gion, e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
245 |
+
page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
246 |
+
page_content=', the disappearance of the SNR at current age.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
247 |
+
page_content=' As expected, the SNR was found be old (> 105 years).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
248 |
+
page_content=' This also explains why no pulsar has been seen in the source region, as the pulsar is ex- pected to leave the source region due to its natal kick velocity (∼ 400-500 km s−1) (Gaensler & Slane 2006).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
249 |
+
page_content=' Similar nature and emis- sion were also found in another UHE gamma-ray source, LHAASO J1908+0621, details of which were explained by this model in De Sarkar & Gupta (2022).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
250 |
+
page_content=' The fact that the emission of multiple UHE 10 12 10 10 10 8 10 6 10 4 10 2 100 102 Energy (TeV) 10 16 10 15 10 14 10 13 10 12 10 11 E2 J(E)[erg cm 2 s 1] pp synchrotron bremsstrahlung inverse-compton Fermi-LAT (Abe et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
251 |
+
page_content=' 2022) Fermi-LAT (Cao et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
252 |
+
page_content=' 2021) LHAASO LST-CTA XMM-Newton Figure 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
253 |
+
page_content=' MWL SED of LHAASO J2108+5157.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
254 |
+
page_content=' Gamma-ray data points and upper limits obtained from different observatories such as Fermi-LAT (red (Abe et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
255 |
+
page_content=' 2022), purple (Cao et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
256 |
+
page_content=' 2021c)), LHAASO (blue (Cao et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
257 |
+
page_content=' 2021c)), and LST-CTA (green (Abe et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
258 |
+
page_content=' 2022)) are shown in the figure.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
259 |
+
page_content=' The XMM-Newton X-ray 2𝜎 upper limits (Abe et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
260 |
+
page_content=' 2022) are given in teal.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
261 |
+
page_content=' The model p-p interaction (solid line), bremsstrahlung (dashed), IC (dotted), and synchrotron (dot-dashed) components are also shown in the figure.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
262 |
+
page_content=' 103 104 105 106 Time (years) 16 18 20 22 24 26 28 30 32 Shock radius (pc) LHAASO J2108+5157 Figure 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
263 |
+
page_content=' Time evolution of the shocked shell associated with the old SNR, inside the surrounding MCs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
264 |
+
page_content=' gamma-ray sources were explained by the same model hints towards its validity in a larger context.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
265 |
+
page_content=' Interestingly, another unidentified UHE gamma-ray source, LHAASO J0341+5258, also shows similar characteristics shown by LHAASO J2108+5157 (Cao et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
266 |
+
page_content=' 2021b).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
267 |
+
page_content=' It is very likely that this model is applicable in that case as well.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
268 |
+
page_content=' However, in that case, the VHE counterpart has not been properly constrained, and the High Altitude Water Cherenkov (HAWC) upper limit provided in Cao et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
269 |
+
page_content=' (2021b) corresponds to only a 2𝜎 detec- tion significance.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
270 |
+
page_content=' Further observations by CTA and detailed analysis by Fermi-LAT will be necessary to properly constrain the emission of LHAASO J0341+5258.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
271 |
+
page_content=' From Figure 1, we can see that the hadronic component adequately explain the VHE-UHE gamma-ray data, whereas the bremsstrahlung component, originated from the cooling of the electron population, explains the gamma-ray data in the HE range.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
272 |
+
page_content=' The bremsstrahlung MNRAS 000, 1–6 (2022) Supernova connection of LHAASO J2108+5157 5 Table 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
273 |
+
page_content=' Parameters Used in The Model.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
274 |
+
page_content=' Definition Parameter Value SNR/MC structure and evolution: Initial shock velocity v𝑖 (cm/s) 109 Time at the start of Sedov phase t𝑆𝑒𝑑𝑜𝑣 (years) 210 Shock radius at the start of Sedov phase R𝑆𝑒𝑑𝑜𝑣 (pc) 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
275 |
+
page_content='1 Time of collision t𝑐𝑜𝑙𝑙 (years) 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
276 |
+
page_content='83 × 103 Shock radius at time of collision R𝑠ℎ (t𝑐𝑜𝑙𝑙) (pc) 16.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
277 |
+
page_content='77 (= R𝑀𝐶) Shock velocity at time of collision v𝑠ℎ (t𝑐𝑜𝑙𝑙) (cm/s) 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
278 |
+
page_content='75 × 108 Current age of SNR t𝑎𝑔𝑒 (years) 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
279 |
+
page_content='4 × 105 Final radius of shock R𝑠ℎ (t𝑎𝑔𝑒) (pc) 30 Final velocity of shock v𝑠ℎ (t𝑎𝑔𝑒) (cm/s) 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
280 |
+
page_content='2 × 106 Distance d (kpc) 3 MC number density n𝑀𝐶 (cm−3) 30 MC magnetic field B𝑀𝐶 (𝜇G) 25 Cavity number density n𝑐𝑎𝑣 (cm−3) 1 Hadronic component: Minimum energy E𝑝 𝑚𝑖𝑛 (TeV) 63 Maximum energy E𝑝 𝑚𝑎𝑥 (TeV) 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
281 |
+
page_content='1 × 103 Spectral index p 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
282 |
+
page_content='8 Energy budget W𝑝 (erg) 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
283 |
+
page_content='6 × 1047 Leptonic component: Minimum energy E𝑒 𝑚𝑖𝑛 (TeV) 5 × 10−4 Maximum energy E𝑒𝑚𝑎𝑥 (TeV) 15.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
284 |
+
page_content='5 Spectral index p 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
285 |
+
page_content='8 Energy budget W𝑒 (erg) 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
286 |
+
page_content='6 × 1047 component is expected to dominate the IC component, as the in- teraction is taking place inside MCs with a high number density of cold protons.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
287 |
+
page_content=' Moreover, the synchrotron component does not violate the X-ray 2𝜎 upper limits.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
288 |
+
page_content=' We note that no proper radio counterpart has been associated with the LHAASO J2108+5157 yet.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
289 |
+
page_content=' An extended radio source associated with nearby star-forming re- gion (Cao et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
290 |
+
page_content=' 2021c), as well as point-like radio source NVSS 210803+515255 or WENSS B2106.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
291 |
+
page_content='4+5140 (Abe et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
292 |
+
page_content=' 2022) were found within 95% extension upper limit of LHAASO J2108+5157 and 4FGL J2108.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
293 |
+
page_content='0+5155e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
294 |
+
page_content=' Since no proper association was estab- lished between these sources and the gamma-ray source, we refrain from including their radio data in this study to further constrain the model, and we follow the MWL SED discussed in (Abe et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
295 |
+
page_content=' 2022) to ascertain the feasibility of the model discussed in this letter.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
296 |
+
page_content=' As discussed earlier, we have neglected the effect of particle diffu- sion in this model.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
297 |
+
page_content=' We note that such an assumption may likely lead to an overestimation, and the aspect of suppressed diffusion inside the MCs is highly uncertain (Xu et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
298 |
+
page_content=' 2016;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
299 |
+
page_content=' Dogiel et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
300 |
+
page_content=' 2015).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
301 |
+
page_content=' In- troducing an energy-independent diffusion coefficient, as discussed in Dogiel et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
302 |
+
page_content=' (2015), will lead to higher energy budgets required by the electron and proton populations to explain the data.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
303 |
+
page_content=' The sup- pressed diffusion coefficient introduced by Gabici et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
304 |
+
page_content=' (2009) has similar energy dependence as to that observed in ISM, but the exact energy dependence of diffusion coefficient inside clouds is not well constrained.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
305 |
+
page_content=' So, to avoid further complications, we have neglected the effect of diffusion in this model, similar to Fujita et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
306 |
+
page_content=' (2009);' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
307 |
+
page_content=' Makino et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
308 |
+
page_content=' (2019), and assumed that the injected particles quickly cool down before escaping the MC medium.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
309 |
+
page_content=' We further note that we do not consider the contribution of accel- erated and escaped particles, when the shock front is within the MC medium, in calculating the total gamma-ray SED.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
310 |
+
page_content=' Even if the SNR is still in the Sedov phase when the shock is within the MCs, the corresponding contribution was found to be negligible.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
311 |
+
page_content=' Moreover, the acceleration and subsequent escape of particles, in that case, will depend on the evolution of the confinement region within the high- density, turbulent medium of the MCs, details of which is beyond the scope of the simple model discussed in this letter.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
312 |
+
page_content=' Furthermore, as the SNR enters its radiative phase at t𝑟𝑎𝑑 ∼ 4 × 104 years (Blondin et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
313 |
+
page_content=' 1998), the particle acceleration becomes ineffective as the small shock velocity at that age, as obtained from equation 6 (< 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
314 |
+
page_content='1 × 107 cm/s), prevents full ionization of the pre-shock gas (Shull & McKee 1979).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
315 |
+
page_content=' So no significant contribution to the total gamma-ray SED is expected in the radiative phase of the SNR as well.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
316 |
+
page_content=' Since hadronic component primarily dominates in the VHE-UHE gamma-ray range, neutrinos can be produced from the hadronic in- teraction as well.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
317 |
+
page_content=' This neutrino flux can be a smoking gun evidence for the dominant hadronic interaction.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
318 |
+
page_content=' We have calculated the neu- trino flux resulting from the hadronic interaction discussed above, and found that the corresponding neutrino flux is too low to be de- tected by current generation neutrino telescope such as ICECUBE.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
319 |
+
page_content=' Furthermore, we have found that the model neutrino flux does not exceed the 5𝜎 discovery potential after 10 years of observation by next generation neutrino observatory ICECUBE-Gen2 for two de- clinations, 𝛿 = 0◦ and 30◦ (Aartsen et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
320 |
+
page_content=' 2021), which indicates that it is unlikely to confirm the hadronic nature of UHE gamma-ray emission through neutrino observations, even in the near future, for this source.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
321 |
+
page_content=' In conclusion, in this letter, we have shown that by essentially tuning the 𝛼 index, the emission of the LHAASO source can be explained.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
322 |
+
page_content=' We note that we do not intend to “fit” the MWL SED, as the SED, in various energy ranges (VHE, X-ray, radio), is poorly constrained and in need of further observations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
323 |
+
page_content=' In this work, we have only applied a simple phenomenological model, while also minimizing the free parameters, which naturally explains the spec- tral features and spatial morphology of LHAASO J2108+5157.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
324 |
+
page_content=' Fu- ture observations can confirm the viability of this model to ex- plain LHAASO J2108+5157, or other unidentified UHE gamma-ray source LHAASO 0341+5258, and sources detected in future as well, which show similar nature and emission signatures.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
325 |
+
page_content=' If confirmed, then it can be posited that SNRs as a source class, similar to PWNe, can likely be a strong candidate for being the Galactic PeVatrons.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
326 |
+
page_content=' ACKNOWLEDGEMENTS I thank the anonymous reviewer for helpful comments and construc- tive criticism.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
327 |
+
page_content=' I thank Nayantara Gupta for encouragement.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
328 |
+
page_content=' DATA AVAILABILITY The simulated data underlying this paper will be shared on reasonable request to the corresponding author.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
329 |
+
page_content=' REFERENCES Aartsen M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
330 |
+
page_content=' G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
331 |
+
page_content=', et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
332 |
+
page_content=', 2021, Journal of Physics G Nuclear Physics, 48, 060501 Abdalla H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
333 |
+
page_content=', et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
334 |
+
page_content=', 2018, A&A, 612, A1 Abdollahi S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
335 |
+
page_content=', et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
336 |
+
page_content=', 2020, ApJS, 247, 33 Abe S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
337 |
+
page_content=', et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
338 |
+
page_content=', 2022, arXiv e-prints, p.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
339 |
+
page_content=' arXiv:2210.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
340 |
+
page_content='00775 Albert A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
341 |
+
page_content=', et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
342 |
+
page_content=', 2021, ApJ, 911, L27 Baring M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
343 |
+
page_content=' G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
344 |
+
page_content=', Ellison D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
345 |
+
page_content=' C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
346 |
+
page_content=', Reynolds S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
347 |
+
page_content=' P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
348 |
+
page_content=', Grenier I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
349 |
+
page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
350 |
+
page_content=', Goret P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
351 |
+
page_content=', 1999, ApJ, 513, 311 Blondin J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
352 |
+
page_content=' M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
353 |
+
page_content=', Wright E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
354 |
+
page_content=' B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
355 |
+
page_content=', Borkowski K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
356 |
+
page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
357 |
+
page_content=', Reynolds S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
358 |
+
page_content=' P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
359 |
+
page_content=', 1998, ApJ, 500, 342 Blumenthal G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
360 |
+
page_content=' R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
361 |
+
page_content=', Gould R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
362 |
+
page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
363 |
+
page_content=', 1970, Reviews of Modern Physics, 42, 237 Cao Z.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
364 |
+
page_content=', 2010, Chinese Physics C, 34, 249 Cao Z.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
365 |
+
page_content=', et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
366 |
+
page_content=', 2021a, Nature, 594, 33 Cao Z.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
367 |
+
page_content=', et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
368 |
+
page_content=', 2021b, ApJ, 917, L4 MNRAS 000, 1–6 (2022) 6 A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
369 |
+
page_content=' De Sarkar Cao Z.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
370 |
+
page_content=', et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
371 |
+
page_content=', 2021c, ApJ, 919, L22 De Sarkar A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
372 |
+
page_content=', Gupta N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
373 |
+
page_content=', 2022, ApJ, 934, 118 De Sarkar A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
374 |
+
page_content=', Biswas S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
375 |
+
page_content=', Gupta N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
376 |
+
page_content=', 2021, Journal of High Energy Astro- physics, 29, 1 De Sarkar A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
377 |
+
page_content=', Zhang W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
378 |
+
page_content=', Martín J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
379 |
+
page_content=', Torres D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
380 |
+
page_content=' F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
381 |
+
page_content=', Li J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
382 |
+
page_content=', Hou X.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
383 |
+
page_content=', 2022, A&A, 668, A23 Dogiel V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
384 |
+
page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
385 |
+
page_content=', et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
386 |
+
page_content=', 2015, ApJ, 809, 48 Fujita Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
387 |
+
page_content=', Ohira Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
388 |
+
page_content=', Tanaka S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
389 |
+
page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
390 |
+
page_content=', Takahara F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
391 |
+
page_content=', 2009, ApJ, 707, L179 Gabici S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
392 |
+
page_content=', Aharonian F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
393 |
+
page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
394 |
+
page_content=', Blasi P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
395 |
+
page_content=', 2007, Ap&SS, 309, 365 Gabici S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
396 |
+
page_content=', Aharonian F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
397 |
+
page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
398 |
+
page_content=', Casanova S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
399 |
+
page_content=', 2009, MNRAS, 396, 1629 Gaensler B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
400 |
+
page_content=' M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
401 |
+
page_content=', Slane P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
402 |
+
page_content=' O.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
403 |
+
page_content=', 2006, ARA&A, 44, 17 Ge C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
404 |
+
page_content=', Liu R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
405 |
+
page_content='-Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
406 |
+
page_content=', Niu S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
407 |
+
page_content=', Chen Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
408 |
+
page_content=', Wang X.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
409 |
+
page_content='-Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
410 |
+
page_content=', 2021, The Innovation, 2, 100118 Ghisellini G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
411 |
+
page_content=', Guilbert P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
412 |
+
page_content=' W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
413 |
+
page_content=', Svensson R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
414 |
+
page_content=', 1988, ApJ, 334, L5 Hahn J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
415 |
+
page_content=', 2016, PoS, ICRC2015, 917 Kafexhiu E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
416 |
+
page_content=', Aharonian F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
417 |
+
page_content=', Taylor A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
418 |
+
page_content=' M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
419 |
+
page_content=', Vila G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
420 |
+
page_content=' S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
421 |
+
page_content=', 2014, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
422 |
+
page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
423 |
+
page_content=' D, 90, 123014 Kar A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
424 |
+
page_content=', Gupta N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
425 |
+
page_content=', 2022, ApJ, 926, 110 Liang X.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
426 |
+
page_content='-H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
427 |
+
page_content=', Li C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
428 |
+
page_content='-M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
429 |
+
page_content=', Wu Q.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
430 |
+
page_content='-Z.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
431 |
+
page_content=', Pan J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
432 |
+
page_content='-S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
433 |
+
page_content=', Liu R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
434 |
+
page_content='-Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
435 |
+
page_content=', 2022, Universe, 8, 547 Makino K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
436 |
+
page_content=', Fujita Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
437 |
+
page_content=', Nobukawa K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
438 |
+
page_content=' K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
439 |
+
page_content=', Matsumoto H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
440 |
+
page_content=', Ohira Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
441 |
+
page_content=', 2019, PASJ, 71, 78 Miville-Deschênes M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
442 |
+
page_content='-A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
443 |
+
page_content=', Murray N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
444 |
+
page_content=', Lee E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
445 |
+
page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
446 |
+
page_content=', 2017, ApJ, 834, 57 Ohira Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
447 |
+
page_content=', Murase K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
448 |
+
page_content=', Yamazaki R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
449 |
+
page_content=', 2010, A&A, 513, A17 Ohira Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
450 |
+
page_content=', Murase K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
451 |
+
page_content=', Yamazaki R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
452 |
+
page_content=', 2011, MNRAS, 410, 1577 Ohira Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
453 |
+
page_content=', Yamazaki R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
454 |
+
page_content=', Kawanaka N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
455 |
+
page_content=', Ioka K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
456 |
+
page_content=', 2012, MNRAS, 427, 91 Popescu C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
457 |
+
page_content=' C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
458 |
+
page_content=', Yang R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
459 |
+
page_content=', Tuffs R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
460 |
+
page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
461 |
+
page_content=', Natale G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
462 |
+
page_content=', Rushton M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
463 |
+
page_content=', Aharonian F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
464 |
+
page_content=', 2017, MNRAS, 470, 2539 Shull J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
465 |
+
page_content=' M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
466 |
+
page_content=', McKee C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
467 |
+
page_content=' F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
468 |
+
page_content=', 1979, ApJ, 227, 131 Wentzel D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
469 |
+
page_content=' G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
470 |
+
page_content=', 1974, ARA&A, 12, 71 Xu S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
471 |
+
page_content=', Yan H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
472 |
+
page_content=', Lazarian A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
473 |
+
page_content=', 2016, ApJ, 826, 166 Yamazaki R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
474 |
+
page_content=', Kohri K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
475 |
+
page_content=', Bamba A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
476 |
+
page_content=', Yoshida T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
477 |
+
page_content=', Tsuribe T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
478 |
+
page_content=', Takahara F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
479 |
+
page_content=', 2006, MNRAS, 371, 1975 Yuan Q.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
480 |
+
page_content=', Liu S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
481 |
+
page_content=', Bi X.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
482 |
+
page_content=', 2012, ApJ, 761, 133 This paper has been typeset from a TEX/LATEX file prepared by the author.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
483 |
+
page_content=' MNRAS 000, 1–6 (2022)' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
|
BdE1T4oBgHgl3EQfVgTd/content/2301.03104v1.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:00ad15d2d898be0ae9f163fd769db50ccdbe4028322496a691d20fd6618623bb
|
3 |
+
size 383264
|
BdE1T4oBgHgl3EQfVgTd/vector_store/index.pkl
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:313b57c63ffd8a233483bb8c2e989513c5ade40f72b87afe4e0f7cff3b7b638b
|
3 |
+
size 269730
|
BdE3T4oBgHgl3EQfUAoU/content/2301.04446v1.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:2a400fda4bb24e9770c4b1048ef130fce8c870e0c148a00ce3c58c5cadcdd9dd
|
3 |
+
size 1522537
|