jackkuo commited on
Commit
2c15dc2
·
verified ·
1 Parent(s): cc6597a

Add files using upload-large-folder tool

Browse files
This view is limited to 50 files because it contains too many changes.   See raw diff
Files changed (50) hide show
  1. 0NAzT4oBgHgl3EQf8f6B/content/tmp_files/2301.01905v1.pdf.txt +1911 -0
  2. 0NAzT4oBgHgl3EQf8f6B/content/tmp_files/load_file.txt +0 -0
  3. 29A0T4oBgHgl3EQfNP8E/content/tmp_files/2301.02142v1.pdf.txt +1364 -0
  4. 29A0T4oBgHgl3EQfNP8E/content/tmp_files/load_file.txt +0 -0
  5. 2dFIT4oBgHgl3EQf5Cs5/content/tmp_files/2301.11387v1.pdf.txt +2504 -0
  6. 2dFIT4oBgHgl3EQf5Cs5/content/tmp_files/load_file.txt +0 -0
  7. 4NFAT4oBgHgl3EQflx07/content/tmp_files/2301.08619v1.pdf.txt +655 -0
  8. 4NFAT4oBgHgl3EQflx07/content/tmp_files/load_file.txt +0 -0
  9. 6dA0T4oBgHgl3EQfN__p/content/tmp_files/2301.02156v1.pdf.txt +1382 -0
  10. 6dA0T4oBgHgl3EQfN__p/content/tmp_files/load_file.txt +0 -0
  11. 7dAzT4oBgHgl3EQfgPzo/content/tmp_files/load_file.txt +0 -0
  12. 8NE4T4oBgHgl3EQf2w06/content/tmp_files/load_file.txt +0 -0
  13. 8tE3T4oBgHgl3EQfqgri/content/tmp_files/2301.04653v1.pdf.txt +2529 -0
  14. 8tE3T4oBgHgl3EQfqgri/content/tmp_files/load_file.txt +0 -0
  15. BdAzT4oBgHgl3EQfGPtU/content/tmp_files/2301.01024v1.pdf.txt +1039 -0
  16. BdAzT4oBgHgl3EQfGPtU/content/tmp_files/load_file.txt +0 -0
  17. BtE0T4oBgHgl3EQfyAJM/content/tmp_files/2301.02653v1.pdf.txt +2025 -0
  18. BtE0T4oBgHgl3EQfyAJM/content/tmp_files/load_file.txt +0 -0
  19. DdE2T4oBgHgl3EQfoQiw/content/tmp_files/2301.04017v1.pdf.txt +1975 -0
  20. DdE2T4oBgHgl3EQfoQiw/content/tmp_files/load_file.txt +0 -0
  21. FNE4T4oBgHgl3EQffg3m/content/tmp_files/2301.05109v1.pdf.txt +1168 -0
  22. FNE4T4oBgHgl3EQffg3m/content/tmp_files/load_file.txt +0 -0
  23. HNAyT4oBgHgl3EQfrvkK/content/tmp_files/2301.00564v1.pdf.txt +1618 -0
  24. HNAyT4oBgHgl3EQfrvkK/content/tmp_files/load_file.txt +0 -0
  25. KtAyT4oBgHgl3EQfsfmL/content/tmp_files/2301.00578v1.pdf.txt +1121 -0
  26. KtAyT4oBgHgl3EQfsfmL/content/tmp_files/load_file.txt +0 -0
  27. M9FJT4oBgHgl3EQfzi0X/content/tmp_files/2301.11643v1.pdf.txt +959 -0
  28. M9FJT4oBgHgl3EQfzi0X/content/tmp_files/load_file.txt +0 -0
  29. O9AyT4oBgHgl3EQfg_h-/content/tmp_files/2301.00369v1.pdf.txt +1996 -0
  30. O9AyT4oBgHgl3EQfg_h-/content/tmp_files/load_file.txt +0 -0
  31. S9E1T4oBgHgl3EQfuQUV/content/tmp_files/2301.03385v1.pdf.txt +0 -0
  32. S9E1T4oBgHgl3EQfuQUV/content/tmp_files/load_file.txt +0 -0
  33. TdE0T4oBgHgl3EQflQEG/content/tmp_files/2301.02482v1.pdf.txt +2395 -0
  34. TdE0T4oBgHgl3EQflQEG/content/tmp_files/load_file.txt +0 -0
  35. UNFKT4oBgHgl3EQflS6S/content/tmp_files/2301.11853v1.pdf.txt +1599 -0
  36. UNFKT4oBgHgl3EQflS6S/content/tmp_files/load_file.txt +543 -0
  37. VtE1T4oBgHgl3EQfIwPB/content/tmp_files/load_file.txt +0 -0
  38. WdAzT4oBgHgl3EQfmP2O/content/tmp_files/2301.01560v1.pdf.txt +0 -0
  39. WdAzT4oBgHgl3EQfmP2O/content/tmp_files/load_file.txt +0 -0
  40. c9E3T4oBgHgl3EQfeQoX/content/tmp_files/load_file.txt +424 -0
  41. ctFAT4oBgHgl3EQf6B4X/content/tmp_files/2301.08736v1.pdf.txt +1134 -0
  42. ctFAT4oBgHgl3EQf6B4X/content/tmp_files/load_file.txt +0 -0
  43. eNAyT4oBgHgl3EQfwvnx/content/tmp_files/2301.00656v1.pdf.txt +548 -0
  44. eNAyT4oBgHgl3EQfwvnx/content/tmp_files/load_file.txt +413 -0
  45. etAzT4oBgHgl3EQfaPzl/content/tmp_files/2301.01367v1.pdf.txt +2266 -0
  46. etAzT4oBgHgl3EQfaPzl/content/tmp_files/load_file.txt +0 -0
  47. etE2T4oBgHgl3EQfGgZ8/content/tmp_files/load_file.txt +257 -0
  48. f9AzT4oBgHgl3EQfof2V/content/tmp_files/2301.01598v1.pdf.txt +2668 -0
  49. f9AzT4oBgHgl3EQfof2V/content/tmp_files/load_file.txt +0 -0
  50. jtE5T4oBgHgl3EQfGQ7H/content/tmp_files/2301.05430v1.pdf.txt +2611 -0
0NAzT4oBgHgl3EQf8f6B/content/tmp_files/2301.01905v1.pdf.txt ADDED
@@ -0,0 +1,1911 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ 1
2
+ FireFly: A High-Throughput and Reconfigurable
3
+ Hardware Accelerator for Spiking Neural Networks
4
+ Jindong Li
5
+ , Guobin Shen
6
+ , Dongcheng Zhao
7
+ , Qian Zhang
8
+ , Zeng Yi
9
+ Abstract—Spiking neural networks (SNNs) have been widely
10
+ used due to their strong biological interpretability and high
11
+ energy efficiency. With the introduction of the backpropagation
12
+ algorithm and surrogate gradient, the structure of spiking neural
13
+ networks has become more complex, and the performance gap
14
+ with artificial neural networks has gradually decreased. However,
15
+ most SNN hardware implementations for field-programmable
16
+ gate arrays (FPGAs) cannot meet arithmetic or memory effi-
17
+ ciency requirements, which significantly restricts the development
18
+ of SNNs. They do not delve into the arithmetic operations
19
+ between the binary spikes and synaptic weights or assume un-
20
+ limited on-chip RAM resources by using overly expensive devices
21
+ on small tasks. To improve arithmetic efficiency, we analyze
22
+ the neural dynamics of spiking neurons, generalize the SNN
23
+ arithmetic operation to the multiplex-accumulate operation, and
24
+ propose a high-performance implementation of such operation by
25
+ utilizing the DSP48E2 hard block in Xilinx Ultrascale FPGAs.
26
+ To improve memory efficiency, we design a memory system to
27
+ enable efficient synaptic weights and membrane voltage memory
28
+ access with reasonable on-chip RAM consumption. Combining
29
+ the above two improvements, we propose an FPGA accelerator
30
+ that can process spikes generated by the firing neuron on-the-fly
31
+ (FireFly). FireFly is implemented on several FPGA edge devices
32
+ with limited resources but still guarantees a peak performance
33
+ of 5.53TSOP/s at 300MHz. As a lightweight accelerator, FireFly
34
+ achieves the highest computational density efficiency compared
35
+ with existing research using large FPGA devices.
36
+ Index Terms—Spiking Neural Networks, Field-programmable
37
+ gate array, Hardware Accelerator
38
+ I. INTRODUCTION
39
+ S
40
+ PIKING neural networks (SNNs) are considered the third
41
+ generation of artificial neural networks (ANNs) [1]. They
42
+ were developed to mimic the operational mechanism in the
43
+ Manuscript created January 1, 2023. This work was supported by the
44
+ Strategic Priority Research Program of the Chinese Academy of Sciences
45
+ (Grant No. XDB32070100). (Corresponding authors: Qian Zhang; Yi Zeng.)
46
+ Jindong Li and Qian Zhang are with the Research Center for Brain-
47
+ Inspired Intelligence, Institute of Automation, Chinese Academy of Sciences,
48
+ Beijing 100190, China, and also with the School of Artificial Intelligence,
49
+ University of Chinese Academy of Sciences, Beijing 100049, China (e-mail:
50
51
+ Guobin Shen is with the Research Center for Brain-Inspired Intelli-
52
+ gence, Institute of Automation, Chinese Academy of Sciences, Beijing
53
+ 100190, China, and also with the School of Future Technology, University
54
+ of Chinese Academy of Sciences, Beijing 100049, China (e-mail: shen-
55
56
+ Dongcheng Zhao is with the Research Center for Brain-inspired Intel-
57
+ ligence, Institute of Automation, Chinese Academy of Sciences, Beijing
58
+ 100190, China (e-mail: [email protected]).
59
+ Yi Zeng is with the Research Center for Brain-inspired Intelligence, the
60
+ National Laboratory of Pattern Recognition, at the Institute of Automation,
61
+ Chinese Academy of Sciences, Beijing 100190, China, and University of
62
+ Chinese Academy of Sciences, Beijing 100049, China, and Center for
63
+ Excellence in Brain Science and Intelligence Technology, Chinese Academy
64
+ of Sciences, Shanghai 200031, China (e-mail: [email protected]).
65
+ human brain, where information is communicated via spikes
66
+ among neurons. Surrogate gradient algorithms have been
67
+ introduced for SNNs tackling nondifferentiable problems to
68
+ enhance the learning capability of SNNs. [2], [3]. Recent
69
+ advances in SNNs have demonstrated comparable performance
70
+ to non-spiking ANNs [4]–[8]. However, compared to the
71
+ extensive work on ANN accelerators [9]–[11], the existing
72
+ SNN hardware accelerator still lags, limiting the practical
73
+ applications of SNNs.
74
+ Most research ignores the importance of efficiently imple-
75
+ menting arithmetic operations in SNN accelerators. In Field-
76
+ programmable gate array (FPGA) design, using the built-
77
+ in dedicated hard block to implement arithmetic operations
78
+ can achieve considerably higher performance than its general
79
+ logic fabric counterparts. Fabric-only implementations in an
80
+ arithmetic-extensive application can lead to a compromised
81
+ clock frequency and even routing failures when the fabric
82
+ consumption is high. However, in the SNN accelerator design,
83
+ the register transfer level (RTL) description of the SNN
84
+ arithmetic operation cannot be automatically synthesized into
85
+ the dedicated arithmetic hard block. Therefore, most SNN
86
+ accelerators adopt the fabric-only implementation without
87
+ further optimizations. Although a single arithmetic operation
88
+ unit in an SNN accelerator consumes considerably fewer
89
+ resources than a multiply-accumulate (MAC) unit in an ANN
90
+ accelerator design, hardware optimization of such operation
91
+ can still significantly impact the system’s performance when
92
+ the unit is instantiated hundreds or even thousands of times.
93
+ In the Xilinx Ultrascale FPGA, the dedicated arithmetic hard
94
+ block, or the DSP48E2, enhances the speed and efficiency of
95
+ many operations, including multiplication, addition, wide bus
96
+ multiplexing, pattern detection, and single instruction multiple
97
+ data (SIMD) operations. It is possible to generalize the SNN
98
+ computation to the arithmetic operations that the DSP48E2
99
+ can provide.
100
+ Another important aspect of the SNN accelerator design
101
+ is the memory system. When scaling the parallelism, the
102
+ memory bandwidth imbalance between the binary input-output
103
+ spikes, the multi-bit synaptic weights, and the multi-bit mem-
104
+ brane voltage becomes problematic. While the computational
105
+ complexity and the memory footprint of the binary spikes
106
+ decrease, the memory access requirements of synaptic weights
107
+ and membrane voltage do not. The off-chip memory access
108
+ bandwidth needed by the weights and membrane voltage
109
+ cannot fully support the increased parallelism brought by
110
+ the hardware-friendly synaptic operations and storage-friendly
111
+ binary spikes without further exploration of the reuse mecha-
112
+ nism. Most hardware accelerators assume large on-chip mem-
113
+ arXiv:2301.01905v1 [cs.NE] 5 Jan 2023
114
+
115
+ ID2
116
+ ory, store all the synaptic weights, and accumulate membrane
117
+ voltage on-chip to ease the harsh bandwidth requirement. This
118
+ method is not scalable, especially when the model gets larger
119
+ and targets edge FPGA devices. A scalable memory system
120
+ for synaptic weights and membrane voltage balancing, as well
121
+ as off-chip data access and on-chip data buffering, should be
122
+ developed.
123
+ At present, most existing neuromorphic hardware or accel-
124
+ erators focus on brain simulation tasks. While these hard-
125
+ ware designs claim to support event-driven processing, they
126
+ are inefficient in terms of resource utilization, computational
127
+ density, and scalability. In real-world SNN applications, it is
128
+ not feasible to use overly expensive and large FPGA devices.
129
+ A lightweight and high-performance SNN accelerator targeting
130
+ resource-constrained edge scenarios should be developed.
131
+ Focusing on these aspects, we propose FireFly, a high
132
+ throughput and reconfigurable FPGA accelerator that can
133
+ achieve both arithmetic and memory efficiency. Our contri-
134
+ butions can be summarized as follows.
135
+ 1) We generalize the SNN arithmetic operation to the
136
+ multiplex-accumulate operation and propose a high-
137
+ performance implementation of such an operation by
138
+ utilizing the DSP48E2 hard block in Xilinx Ultrascale
139
+ FPGAs.
140
+ 2) We design a synaptic weight delivery hierarchy and
141
+ a partial sum and membrane voltage (Psum-Vmem)
142
+ unified buffer to balance the off-chip memory access
143
+ bandwidth and on-chip RAM consumption.
144
+ 3) We evaluate multiple deep SNN models on various
145
+ datasets and achieve faster inference speed and higher
146
+ classification accuracy than the existing research. We
147
+ implement FireFly on several commercial off-the-shelf
148
+ FPGA edge devices with limited resources, bringing
149
+ hope for real-world SNN applications in edge scenarios.
150
+ II. RELATED WORK
151
+ The existing dedicated neuromorphic hardware designed for
152
+ SNN can be categorized into three types.
153
+ The majority of neuromorphic hardware constructs its hard-
154
+ ware substrates in a Network on Chip fashion. Loihi [12],
155
+ Tianji Chip [13], Spinnaker [14] and TrueNorth [15] fall into
156
+ this category. In these hardware designs, neurons are grouped
157
+ into multiple neurocores, which communicate via spikes
158
+ through the Network-on-Chip (NoC), and spike messages are
159
+ scheduled by dedicated routers. These hardware architectures
160
+ are compatible with the event-driven nature of SNNs, as spike
161
+ events are generated, transferred, and processed only if the
162
+ neuron fires. However, these neuromorphic hardware designs
163
+ place rigid restrictions on the network. The SNN networks
164
+ are distributed among the neurocores, and the total number of
165
+ neurons in the model cannot exceed the maximum capacity
166
+ of the hardware, not to mention the harsh fan-in and fan-out
167
+ hardware limitations of the network.
168
+ The second type of neuromorphic hardware explores emerg-
169
+ ing devices. The BrainScale [16] developed by Heidelberg
170
+ University emulated spiking neural networks on analog neu-
171
+ romorphic hardware and achieved several advantages over
172
+ conventional computers. Some research explores new materials
173
+ like mem-resistors and optics [17]–[19]. However, the low
174
+ precision and uncertain nature of the hardware prevent them
175
+ from being used in practice.
176
+ The third type of neuromorphic hardware follows the
177
+ scheme of the ANN accelerator design except for construct-
178
+ ing dedicated hardware for synaptic operations and explores
179
+ optimal dataflow for SNNs specifically [20]–[26]. These types
180
+ of work require less area cost and achieve higher computing
181
+ resource utilization. Fine-grained parallelism of the accelerator
182
+ can enable high-performance computing of the SNN compared
183
+ with the sequential spike processing mechanism of the NoC
184
+ counterparts. This type of hardware has the fewest restrictions
185
+ on the network models and can quickly adapt to emerging
186
+ neuromorphic research. FPGA platforms are the ideal choice
187
+ for this type of hardware due to their flexibility and reconfig-
188
+ urability.
189
+ While FireFly belongs to this category, its contributions of
190
+ FireFly are largely complementary to the existing work.
191
+ SyncNN [21] proposed a novel synchronous event-driven
192
+ SNN reconfigurable inference engine and evaluated multiple
193
+ SNN models on multiple FPGA devices. Fang et al. [27]
194
+ proposed a holistic optimization framework for the encoder,
195
+ model, and architecture design of FPGA-based neuromorphic
196
+ hardware. However, these designs are based on high-level
197
+ synthesis, thus inducing large resource redundancy.
198
+ Lee et al. [28], [29] and Chen et al. [30] explored spatial-
199
+ temporal parallelism by unrolling the computations in both the
200
+ spatial and time dimensions and achieved significant accel-
201
+ eration. However, parallelization across multiple time points
202
+ violates the time-related sequential nature of the membrane
203
+ voltage update behavior.
204
+ SpinalFlow [25] achieved significant sparsity acceleration
205
+ by adopting a different input/output spike representation to
206
+ skip the non-spike computations. SATO [31] achieved high-
207
+ speed inference by incorporating a temporal-oriented dataflow
208
+ and a bucket-sort-based dispatcher to balance the workload.
209
+ However, these techniques only work for temporal coding
210
+ SNNs, limiting the accuracy of the SNN models.
211
+ DeepFire [23] was the first research migrating DSP48E2s
212
+ into neuron core design. However, they did not delve into the
213
+ function of DSP48E2 and still induce large fabric overhead.
214
+ We argue that with careful register transfer level (RTL)
215
+ design, focusing on optimizing spatial parallelism on FPGA,
216
+ adopting regular and simple time-step CNN-like processing,
217
+ and fully utilizing the multi-function DSP48E2, we can still
218
+ achieve impressive inference throughput on small FPGA edge
219
+ devices. FireFly is more applicable in real-world applications
220
+ where design space exploration is constrained by limited
221
+ resources.
222
+ III. SNN BASICS
223
+ A. Spiking Neuron Model
224
+ Spiking neurons are the basic units of SNNs, which are con-
225
+ nected through weighted synapses and transmit information
226
+ through binary spikes. Although more complex and detailed
227
+ neuron models such as Izhikevich [32] and Hodgkin–Huxley
228
+
229
+ 3
230
+ [33] can accurately model a biological neuron’s behavior,
231
+ simpler models such as Integrate and Fire (IF) [34] and Leaky
232
+ Integrate and Fire (LIF) [35] are used more often in current
233
+ SNN applications.
234
+ An IF neuron integrates its inputs over multiple timesteps
235
+ and generates a spike whenever the integrated membrane
236
+ voltage surpasses a firing threshold. A LIF neuron acts the
237
+ same except for the leaky behavior of the membrane voltage.
238
+ The neural dynamics of a LIF neuron membrane potential u
239
+ can be described as:
240
+ τm
241
+ du
242
+ dt = −u + R · I(t),
243
+ u < Vth
244
+ (1)
245
+ where Vth denotes the threshold, I denotes the input current,
246
+ R denotes the resistance, and τm is the membrane time
247
+ constant. A spike is generated when u reaches Vth and u is
248
+ reset to resting potential urest, which is set to 0 in this work.
249
+ The membrane potential’s neural dynamics can be divided into
250
+ three phases, and each phase can be described in a discrete
251
+ computational form::
252
+ Input current integration phase. All the presynaptic currents
253
+ generated by the presynaptic spikes are integrated at each
254
+ discrete timestep.
255
+ I[t] =
256
+
257
+ j
258
+ wijsj[t] + bi
259
+ (2)
260
+ where the subscript i represents the ith neuron, wij is the
261
+ synaptic weight from neuron j to neuron i, and bi is a bias.
262
+ Membrane potential update phase. The membrane potential
263
+ of each neuron is updated by the integrated presynaptic
264
+ currents at each timestep.
265
+ vi[t] = (1 − 1
266
+ τm
267
+ )ui[t] + I[t]
268
+ (3)
269
+ where (1 −
270
+ 1
271
+ τm ) < 1 denotes the leaky term, which is ignored
272
+ when using the IF model.
273
+ Output spike generation phase. Whenever the membrane
274
+ potential reaches the firing threshold, the neuron generates an
275
+ output spike and resets its membrane potential.
276
+ (ui[t + 1], si[t + 1]) =
277
+ � (vi[t], 0), vi[t] < Vth
278
+ (0, 1),
279
+ vi[t] ≥ Vth
280
+ (4)
281
+ In these three phases, we have two key observations. The
282
+ input current integration phase completely dominates the total
283
+ computational cost due to the high degree of synaptic connec-
284
+ tivity and a large number of neurons. The membrane potential
285
+ update phase has the harshest storage requirement because the
286
+ membrane potential is read and written back and forth in every
287
+ timestep. We will focus on these two aspects in the following
288
+ sections.
289
+ B. Dataflow and Parallelism Scheme for SCNN
290
+ Similar to convolutional neural networks (CNNs), convolu-
291
+ tional layers dominate the total computational cost in spiking
292
+ convolutional neural networks (SCNNs). We mainly focus on
293
+ the dataflow optimizations of the convolutional layers and
294
+ show that the dataflow can be migrated to fully connected
295
+ layers.
296
+ Algorithm 1: Pseudo Code of FireFly Architecture.
297
+ Input: Given the binary spike map size (H, W),
298
+ input-output channels (Cin, Cout), kernel size
299
+ (Kh, Kw), total timestep T, leaky factor λ,
300
+ threshold Vth and parallelism factor P. Divide
301
+ the input output channels into
302
+ (ci = ⌈ Cin
303
+ P ⌉, co = ⌈ Cout
304
+ P ⌉) groups.
305
+ Input: T × ci fragments of I[P][H × W] streams,
306
+ each stream passes the hardware for co times.
307
+ Output: co × T fragments of O[P][H × W] streams.
308
+ 1 Create buffer for synaptic weights:
309
+ W[P][Cin][Kh][Kw];
310
+ 2 Create buffer for Psum/Vmem: V [P][H × W];
311
+ 3 for po ← 0 to co do
312
+ 4
313
+ Load Weights: W[P][Cin][Kh][Kw];
314
+ 5
315
+ for t ← 0 to T do
316
+ 6
317
+ for pi ← 0 to ci do
318
+ 7
319
+ for s ← 0 to H × W do
320
+ 8
321
+ Unroll and pipeline;
322
+ 9
323
+ for o ← 0 to P do
324
+ 10
325
+ for i ← 0 to P do
326
+ 11
327
+ w = W[o][pi × P + i][0 →
328
+ Kh][0 → Kw];
329
+ 12
330
+ i = neighbour (I[i][s]);
331
+ 13
332
+ V [o][s]+ = w · i;
333
+ 14
334
+ end
335
+ 15
336
+ end
337
+ 16
338
+ if pi = ci − 1 then
339
+ 17
340
+ V [o][s]× = (1 − λ);
341
+ 18
342
+ if V [o][s] > Vth then
343
+ 19
344
+ V [o][s] = 0, O[o][s] = 1;
345
+ 20
346
+ else
347
+ 21
348
+ O[o][s] = 0;
349
+ 22
350
+ end
351
+ 23
352
+ if t = T − 1 then
353
+ 24
354
+ V [o][s] = 0;
355
+ 25
356
+ end
357
+ 26
358
+ end
359
+ 27
360
+ end
361
+ 28 end
362
+ Input/Output spike representation varies in different neu-
363
+ romorphic hardware. Most SNN hardware implementations
364
+ adopt the Address-Event-Representation (AER) data format to
365
+ transmit spikes between neurons. The standard AER package
366
+ for one spike includes the spiking neuron’s input location
367
+ and the spike’s timestamp. Although the AER data format is
368
+ compatible with the event-driven nature of SNNs, multiple bits
369
+ are needed to express the original single-bit spike event. The
370
+ logic and storage overhead may not be worth it.
371
+ This paper adopts the original single-bit format to represent
372
+ the binary spikes. At any discrete timestep t in the digitalized
373
+ SCNN, the output spikes of all the neurons in one channel of
374
+ the convolutional layer can be considered a timestep snapshot
375
+ in the form of a binary map [36]. In this case, the input-
376
+ current integration phase computation process of the SNNs is
377
+
378
+ 4
379
+ AXI DataMover
380
+ Read Addr
381
+ InSpike Stream
382
+ PE
383
+ PE
384
+ PE
385
+ PE
386
+ PE
387
+ PE
388
+ PE
389
+ PE
390
+ PE
391
+ PE
392
+ PE
393
+ PE
394
+ PE
395
+ PE
396
+ PE
397
+ PE
398
+ W
399
+ W
400
+ W
401
+ W
402
+ W
403
+ W
404
+ W
405
+ W
406
+ FIFO
407
+ FIFO
408
+ FIFO
409
+ FIFO
410
+ CONV or MLP
411
+ AXI DataMover
412
+ Write Addr
413
+ OutSpike Stream
414
+ AXI DataMover
415
+ Read Addr
416
+ Weight Stream
417
+ Maxpool En?
418
+ FIFO
419
+ MAX
420
+ BRAM
421
+ ...
422
+ ...
423
+ ...
424
+ LineBuffer for Conv
425
+ Shift Reg for MLP
426
+ CONV or MLP
427
+ Maxpool En?
428
+ Bypass
429
+ Lv1
430
+ Lv2
431
+ Lv3
432
+ Lv4
433
+ Weight Delivery Hierchy
434
+ ...
435
+ BRAM
436
+ BRAM
437
+ BRAM
438
+ Update Engine
439
+ Psum-Vmem
440
+ Unified Buffer
441
+ 8
442
+ ...
443
+ DSP48E2 Chain
444
+ PS
445
+ PL
446
+ ARM
447
+ CPU
448
+ DDR4
449
+ AXI
450
+ Interconnect
451
+ DDR
452
+ Controller
453
+ Mem
454
+ Fabric(LUT)
455
+ Register(FF)
456
+ DSP48E2
457
+ Fig. 1. FireFly Architecture.
458
+ almost the same as that of the traditional ANNs except for
459
+ the additional time dimension and the changed operation. The
460
+ set of computations for the complete SNN convolutional layer
461
+ that receives a single batch of input can be formulated as a
462
+ loop nest over these 7 variables. All permutations of these
463
+ 6 loop variables, except for the timestep variable, are legal.
464
+ Permutations of the loop variables open up the possibility of
465
+ different dataflow choices. The tiling of the loop variables
466
+ opens up the possibility of different parallelism schemes.
467
+ Different permutations of the loop variables adopt different
468
+ kinds of dataflow. Different dataflow schemes for convolution
469
+ have been extensively studied by Eyeriss [9]. The key con-
470
+ sideration is how to minimize data movement and maximize
471
+ data reuse. In SCNN, synaptic connection weights need to
472
+ be fetched and membrane voltage needs to be updated at
473
+ every time timestep, due to the unique time dimension in SNN
474
+ computation. Therefore, output and weight stationary dataflow
475
+ can minimize the data movement of the multi-bit membrane
476
+ voltage and synaptic weight data between on-chip logic and
477
+ off-chip memory.
478
+ Different tiling strategies for the loop variables enable
479
+ different parallelism schemes. The tiling of the loop variables
480
+ can induce data reordering or data segmentation. We argue that
481
+ it is important to keep the input and output spike arrangements
482
+ the same to enable spikes to be processed in an on-the-fly
483
+ fashion without complicated data reaarangement. We chose
484
+ the spatial tiling of the input and output channel dimensions
485
+ rather than tiling within the same spike feature map to avoid
486
+ data rearranging or irregular off-chip data access.
487
+ Adopting the dataflow and parallelism scheme above, the
488
+ pseudo-code of the FireFly is described in Algorithm 1.
489
+ IV. HARDWARE ARCHITECTURE
490
+ A. Architecture Overview
491
+ In this section, the digital design of SNNs is discussed in
492
+ detail. Fig.1 shows the overall system design of FireFly.
493
+ FireFly targets heterogeneous Zynq Ultrascale devices. The
494
+ central processing unit (CPU) of the processing system (PS)
495
+ acts as the controller for system state control and external
496
+ memory access. The programmable logic (PL) accelerates the
497
+ SNN inference.
498
+ AXI DataMover IP, instead of AXI DMA IP, enables high-
499
+ throughput and low-latency data transactions between the off-
500
+ chip DRAM and on-chip memory storage. The unique store
501
+ and forward feature of AXI DataMover is enabled to allow
502
+ multiple outstanding requests.
503
+ The weight-stationary systolic array is responsible for the
504
+ acceleration of SNN arithmetic operations. The systolic array
505
+ consists of several DSP48E2 chains and multiple adder trees.
506
+ A weight matrix delivery hierarchy is proposed to enable
507
+ efficient weight loading to the systolic array. Two separate
508
+ datapaths for convolutional and fully connected layers are de-
509
+ signed to generate binary spike vectors for the systolic array. A
510
+ Psum-Vmem unified buffer and update engine is constructed to
511
+ support back-and-forth membrane potential update and IF/LIF
512
+ neuron dynamics. An optional MaxPooling unit is placed on
513
+ the output spike datapath to support on-the-fly pooling.
514
+ The designs of the systolic array, the spike vector generation
515
+ unit, the synaptic weight delivery hierarchy, and the Psum-
516
+ Vmem unified buffer are elaborated in detail below.
517
+ B. Synaptic Operations Featured by DSP48E2
518
+ As shown in Fig.2A, DSP48E2 is the dedicated digital
519
+ signal processing logic block in the Xilinx Ultrascale series
520
+ FPGA. Most FPGA neuromorphic hardware simply treats
521
+ them as multipliers and leaves them underutilized. However,
522
+ they enhance the speed and efficiency of many applications
523
+ far beyond multiplication-based digital signal processing [37].
524
+ Considering customizing arithmetic operations for the SNN
525
+ model, the mathematical dot product operation between the
526
+ binary spike and the synaptic weight can be modeled as a
527
+ multiplex-accumulate operation which in this paper, we call
528
+ the synaptic operation. The spike acts like the control signal of
529
+
530
+ 5
531
+ =
532
+ Y
533
+ Z
534
+ X
535
+ W
536
+ 18
537
+ 18
538
+ 18
539
+ 30
540
+ 30
541
+ 27
542
+ 5
543
+ 4
544
+ 2
545
+ 30
546
+ 18
547
+ 18
548
+ 30
549
+ 48
550
+ 48
551
+ 9
552
+ 48
553
+ 48
554
+ 48
555
+ 4
556
+ 27
557
+ 3
558
+ 4
559
+ 8
560
+ 0
561
+ 0
562
+ 0
563
+ 1
564
+ 0
565
+ B
566
+ A
567
+ D
568
+ C
569
+ INMODE
570
+ CARRYIN
571
+ OPMODE
572
+ CARRYINSEL
573
+ BCIN*
574
+ ACIN*
575
+ BCOUT*
576
+ ACOUT*
577
+ A:B
578
+ RND
579
+ U
580
+ V
581
+ 17Bit Shift
582
+ 17Bit Shift
583
+ ALUMODE
584
+ CARRYOUT
585
+ PATTERNDETECT
586
+ PATTERNBDETECT
587
+ PCIN*
588
+ CARRYCASCIN*
589
+ MULTSIGNIN*
590
+ CREG/C Bypass/Mask
591
+ MULTSIGNOUT*
592
+ PCOUT*
593
+ XOR OUT
594
+ CARRYCASCOUT*
595
+ P
596
+ Dual B Register
597
+ Dual A D
598
+ and Pre-Adder
599
+ MULT
600
+ 27x18
601
+ =
602
+ Y
603
+ Z
604
+ X
605
+ W
606
+ 18
607
+ 18
608
+ 18
609
+ 30
610
+ 30
611
+ 27
612
+ 5
613
+ 4
614
+ 2
615
+ 30
616
+ 18
617
+ 18
618
+ 30
619
+ 48
620
+ 48
621
+ 9
622
+ 48
623
+ 48
624
+ 48
625
+ 4
626
+ 27
627
+ 3
628
+ 4
629
+ 8
630
+ 0
631
+ 0
632
+ 0
633
+ 1
634
+ 0
635
+ B
636
+ A
637
+ D
638
+ C
639
+ INMODE
640
+ CARRYIN
641
+ OPMODE
642
+ CARRYINSEL
643
+ BCIN*
644
+ ACIN*
645
+ BCOUT*
646
+ ACOUT*
647
+ A:B
648
+ RND
649
+ U
650
+ V
651
+ 17Bit Shift
652
+ 17Bit Shift
653
+ ALUMODE
654
+ CARRYOUT
655
+ PATTERNDETECT
656
+ PATTERNBDETECT
657
+ PCIN*
658
+ CARRYCASCIN*
659
+ MULTSIGNIN*
660
+ CREG/C Bypass/Mask
661
+ MULTSIGNOUT*
662
+ PCOUT*
663
+ XOR OUT
664
+ CARRYCASCOUT*
665
+ P
666
+ Dual B Register
667
+ Dual A D
668
+ and Pre-Adder
669
+ MULT
670
+ 27x18
671
+ A1
672
+ A1
673
+ A2
674
+ A2
675
+ B2
676
+ B2
677
+ B1
678
+ B1
679
+ C
680
+ SIMD
681
+ Add
682
+ P
683
+ OP
684
+ W
685
+ X
686
+ Y
687
+ Z
688
+ PCIN
689
+ PCOUT
690
+ OPMODE
691
+ 9
692
+ 48
693
+ 30
694
+ 18
695
+ 48
696
+ 0
697
+ 0
698
+ 0
699
+ 0
700
+ A1
701
+ A2
702
+ B2
703
+ B1
704
+ C
705
+ SIMD
706
+ Add
707
+ P
708
+ OP
709
+ W
710
+ X
711
+ Y
712
+ Z
713
+ PCIN
714
+ PCOUT
715
+ OPMODE
716
+ 9
717
+ 48
718
+ 30
719
+ 18
720
+ 48
721
+ 0
722
+ 0
723
+ 0
724
+ 0
725
+ Shared
726
+ OPMODE
727
+ SIMD=4
728
+ 4x4=16
729
+ Spike
730
+ Operations
731
+ C)
732
+ A)
733
+ B)
734
+ Fig. 2. Implementing Synaptic operations Using DSP48E2. A) The functional
735
+ circuit diagram of a single DSP48E2 slice [37]. B) A simplified functional
736
+ circuit diagram of the DSP48E2 performing spike-based computations. C) An
737
+ equivalent circuits of the DSP48E2 when SIMD mode is enabled.
738
+ the multiplexer, switching the synaptic weight on or off when
739
+ the neuron is firing or resting. The following adder sums up
740
+ all the synaptic weights coming from the firing neuron.
741
+ In traditional ANNs, one operation usually refers to one
742
+ two-operand multiplication or two-operand addition. In SNNs,
743
+ we define one synaptic operation as one 2:1 multiplexing or
744
+ two-operand addition. We show that the dedicated DSP48E2
745
+ unit can provide up to 16 synaptic operations at high speed.
746
+ This technique is described in detail below.
747
+ When the first stage multiplier in DSP48E2 is disabled,
748
+ ALUMODE control bits are all cleared and carry inputs are
749
+ ignored, the simplified DSP slice operation shown in Fig. 2B
750
+ in the ALU stage can be expressed as:
751
+ Post Adder Out = W + X + Y + Z.
752
+ where W, X, Y and Z are four built-in 48-bit wide bus
753
+ multiplexers. Moreover, the post-adder can be statically con-
754
+ figured into SIMD mode, supporting a single 48-bit adder, dual
755
+ independent 24-bit adders, or quad independent 12-bit adders.
756
+ The outputs of the four multiplexers are always added
757
+ together by the post-adder. There are dozens of combinations
758
+ of inputs to these multiplexers: one of them can be: either C
759
+ or all 0s on the X multiplexer; either A:B or all 0s on the X
760
+ multiplexer; all 0s on the Y multiplexer; either P, PCIN, or
761
+ all 0s on the Z multiplexer. The 30-bit A and 18-bit B data
762
+ inputs can optionally be registered once or twice to construct a
763
+ pipeline stage, while the 48-bit C data inputs can be optionally
764
+ staged once. The post-adder’s output can be staged into the P
765
+ register, and the PCIN is the cascade input from a lower DSP
766
+ slice. A nine-bit control input named OPMODE contains fields
767
+ TABLE I
768
+ RESOURCE UTILIZATION COMPARISON.
769
+ DSP48E2
770
+ LUT
771
+ FF
772
+ CARRY8
773
+ DSP
774
+ 1
775
+ 0
776
+ 0
777
+ 0
778
+ Fabric
779
+ 0
780
+ 86
781
+ 114
782
+ 8
783
+ for W, X, Y, and Z multiplexer selects and can be dynamically
784
+ changed.
785
+ Utilizing the wide bus multiplexer, the cascade datapath,
786
+ and the SIMD mode of the post-adder in DSP48E2, we can
787
+ pack up to 16 sets of synaptic operations into a single DSP
788
+ slice.
789
+ In this work, the synaptic connection weights are quantized
790
+ into INT8 by the well-established post-training quantization or
791
+ quantization-aware training methods developed in traditional
792
+ neural networks (NNs).
793
+ Four sets of INT8 weights are resized to INT12 and concate-
794
+ nated into 48-bit. The upper 30 bits are assigned to the input
795
+ port A while the lower 18 bits are assigned to input port B. A
796
+ and B get concatenated and multiplexed by the X multiplexer.
797
+ In NNs, the input activations are shared by different sets of
798
+ weights to generate different channels. In this case, one spike
799
+ is fetched to dynamically switch the X multiplexer between
800
+ the four sets of weights (A:B) and all 0s, performing four 2:1
801
+ multiplex operations simultaneously.
802
+ Similarly, another four sets of INT8 weights are resized,
803
+ concatenated, and directly assigned to the C data input. another
804
+ spike is fetched to dynamically switch the W multiplexer
805
+ between C and all 0s, performing another four 2:1 multiplex
806
+ operations.
807
+ The Z multiplexer selects the PCIN inputs and the partial
808
+ sum from the lower DSP slice. The Y multiplexer outputs
809
+ are set to all 0s. The post-adder is set to SIMD mode and
810
+ acts as four independent 12-bit adders, summing the four
811
+ multiplexers, and performing an equivalent number of eight
812
+ addition operations. Therefore, as shown in Fig.2C, a single
813
+ slice of DSP48E2 can contribute 16 synaptic operations in
814
+ total without general fabric logic overhead.
815
+ Direct access to the specific features in DSP48 is achieved
816
+ by directly instantiating the DSP48E2 primitive. The straight-
817
+ forward implementation of the synaptic operations described
818
+ above will consume 86 Look-up-tables, 114 Flip-flops and
819
+ 8 Carry chains. Though it might not seem expensive on a
820
+ small scale, it is considerably less efficient than the proposed
821
+ approach and will lead to a compromised clock frequency.
822
+ C. Systolic Array for Synaptic Operations
823
+ The systolic array is a specialized mesh of homogeneous
824
+ PEs designed to process massive parallel computations. It has
825
+ the potential to run at a high frequency due to its regular
826
+ and adjacent interconnections. However, designing systolic
827
+ arrays is not trivial. Previous neuromorphic hardware adopting
828
+ a systolic array architecture failed to achieve satisfactory
829
+ performance, either in resource efficiency or clock frequency.
830
+ Most systolic arrays targeting FPGA devices are implemented
831
+ in low-speed general fabrics. In this paper, we design a
832
+
833
+ 6
834
+ high-performance systolic array featured by the DSP48E2 for
835
+ SNNs.
836
+ A more straightforward representation of the aforemen-
837
+ tioned synaptic operations featured by a single DSP48E2 slice
838
+ can be expressed as follow:
839
+ pi = si · Wi + pi−1, p−1 = 0.
840
+ where si is the 1 × 2 binary spike vector, and wi is the
841
+ 2 × 4 INT8 synaptic weights matrix, pi is the 1 × 4 partial
842
+ sum vector, and the pi−1 is the partial sum vector contributed
843
+ by the lower DSP slice with the same shape as pi. · represents
844
+ the spikes-weights vector-matrix multiplication.
845
+ The 12-bit representation of each channel in pi allows
846
+ up to eight DSP48E2 slices to cascade in a row without
847
+ possible numeric overflow. In this way, the extended synaptic
848
+ operations featured by a cascaded DSP48E2 chain can be
849
+ expressed as follows:
850
+ p =
851
+ 7
852
+
853
+ i=0
854
+ si · Wi = s · W .
855
+ Where s is the 1 × 16 binary spike vector, and W is the
856
+ 16 × 4 8-bit-integer (INT8) synaptic weights matrix, p is the
857
+ 1 × 4 partial sum vector.
858
+ The cascaded DSP48E2 chain is the basic processing ele-
859
+ ment (PE) in our systolic array design. A PE consists of eight
860
+ cascaded DSP48E2 slices. A M × N systolic array consists
861
+ of M
862
+ 4 columns of PE, with each column consisting of N
863
+ 16 PEs
864
+ and an adder tree. Each column in the systolic array computes
865
+ N
866
+ 16 1 × 16 binary spike vector and 16 × 4 weight matrix
867
+ multiplication, while the adder tree sums up the results from
868
+ N
869
+ 16 PEs, generating four output channels. With M
870
+ 4 columns,
871
+ the systolic array generates M outputs channels in total.
872
+ Each PE in the systolic array contains different sets
873
+ of synaptic weights. Adopting a weight-stationary scheme,
874
+ synaptic weights remain cached in a PE until they are no
875
+ longer needed. The same 1 × N binary spike vector is shared
876
+ across columns horizontally, and M partial sums flow out of
877
+ the systolic array vertically.
878
+ D. Spike Vector Generation for Convolution by Line Buffer
879
+ Similar to ANN, 2-D convolution is the basic operation in
880
+ a digitalized SCNN. We incorporate the traditional line buffer
881
+ design [38] to generate the spike window needed for the spike-
882
+ map convolution. The line buffer is commonly seen in CNN
883
+ accelerator design because it can efficiently achieve kernel-
884
+ level parallelism and ensure good reuse of image data.
885
+ When FireFly is configured to SCNN mode, Cin channels of
886
+ binary spike map are bundled together and stream into the line
887
+ buffer. The Kh×Kw spikes-bundle window is then flattened to
888
+ a Kh×Kw ×Cin vector and sent to the systolic array. In most
889
+ of the established CNN architectures, 3 × 3 convolution with
890
+ stride 1 and the same padding is the most common configu-
891
+ ration. The SCNN architecture follows this scheme. Ideally,
892
+ general neuromorphic hardware for SNN should support all
893
+ types of convolutional layers with different configurations.
894
+ But the hardware would not work efficiently for all types
895
+ of convolution configuration and such design would cause
896
+ hardware overhead, thus might not be feasible. Therefore, we
897
+ design specialized line buffer logic for 3 × 3 convolution.
898
+ Nevertheless, the methods discussed here are compatible with
899
+ other kernel sizes. Using the Dynamic Function Exchange
900
+ features in FPGA, hardware supporting different types of
901
+ convolutional layers can be dynamically deployed in FPGA
902
+ during runtime.
903
+ When FireFly is configured for multi-layer perception
904
+ (MLP) topology mode, the line buffer datapath for SCNN is
905
+ left idle and the shift register datapath for MLP is switched
906
+ on. The shift register forms a serial-to-parallel stream width
907
+ adapter by combining the Cin input spikes of Kh × Kw input
908
+ transactions into one. The length of the binary spike vector in
909
+ SCNN and MLP datapaths is the same, compatible with the
910
+ height of the systolic array.
911
+ E. Synaptic Weight Delivery in a Multi-level Hierachy
912
+ An M × N systolic array configured in weight stationary
913
+ mode needs M × N sets of weights. Switching the current
914
+ set of stationary synaptic weights with the next set of weights
915
+ can be problematic. The instantaneous switching bandwidth is
916
+ extremely high but switching occurs when weights expire.
917
+ The main idea of our solution is that the instantaneous
918
+ bandwidth needed when switching to the next set of weights
919
+ needs to be amortized over an idle period when the weights
920
+ are kept stationary.
921
+ As shown in Fig.3D, we propose a 4-level synaptic weight
922
+ memory hierarchy to enable on-the-fly delivery of weights
923
+ with minimum resource consumption. First, the synaptic
924
+ weight stream coming from the AXI DataMover is adapted
925
+ by the Lv1 stream width adapter. The adapted weight stream
926
+ flows into the Lv2 Partial Reuse FIFO and is reused T times.
927
+ The weight stream from the Partial Reuse FIFO stage its way
928
+ through the Lv3 width adapter and then gets cached in the Lv4
929
+ skid buffer. The systolic array holds the current set of weights
930
+ stationary by applying back pressure to the skid buffer and
931
+ releasing the pressure when the current set of weights is no
932
+ longer needed.
933
+ A stream width adapter converts the N-bit input stream to
934
+ a N × M-bit output stream by allocating M elements of the
935
+ input stream and firing them all at once. A skid buffer is the
936
+ smallest Pipeline FIFO Buffer. It decouples two sides of a
937
+ ready/valid handshake to allow back-to-back transfers without
938
+ a combinational path between input and output, thus pipelining
939
+ the path.
940
+ The Partial Reuse FIFO is the key component in this 4-level
941
+ synaptic weight delivery hierarchy.
942
+ Most designs utilize the dual-port RAM to build a ping-
943
+ pong buffer (shown in Fig. 3A) or a FIFO, to hide the latency
944
+ of the data transfer process. However, the traditional ping-
945
+ pong buffer mechanism can be problematic and the FIFO
946
+ mechanism does not support data reuse.
947
+ The switching of the ping-pong buffer may complicate the
948
+ controller design. Ping-pong buffers are costly and inefficient.
949
+ The depth of the buffer must be large enough to support
950
+ the most storage-expensive cases, not to mention the buffer
951
+
952
+ 7
953
+ In Stream
954
+ Out Stream
955
+ PushPtr
956
+ PopPtr
957
+ when(Overflow)
958
+ Start=End
959
+ PushPtr
960
+ PopPtr
961
+ In Stream
962
+ Out Reused Stream
963
+ Available
964
+ Reusing
965
+ To be Reused
966
+ Active
967
+ Current
968
+ Write
969
+ Next
970
+ Read
971
+ Current
972
+ Read
973
+ Next
974
+ Write
975
+ A)
976
+ B)
977
+ Lv3 Serial to
978
+ Parallel
979
+ Lv4 Skid
980
+ Buffer
981
+ To Systolic
982
+ Array
983
+ From DDR
984
+ when(last step)
985
+ Start=End
986
+ Batch 1
987
+ Batch 2
988
+ Batch 1
989
+ Lv2 Partial
990
+ Reuse FIFO
991
+ 1 8 7 2 9 3 -7 -5 ...
992
+ -1 -2 … 4 -7 9 7 1
993
+ -7 -1 … 7 -5 3 2 8
994
+ … 4 -7 9 7 1
995
+ … 7 -5 3 2 8
996
+ Batch 1
997
+ 1 8 7 2
998
+ 9 3 -5 -7
999
+ 1 7 9 -7 4 … -2 -1
1000
+ 8 2 3 -5 7 … -1 -7
1001
+ 2 4 6 1 ...
1002
+ 9 3 1 7 ...
1003
+ +
1004
+ =
1005
+ C)
1006
+ D)
1007
+ Lv1 Serial to
1008
+ Parallel
1009
+ Fig. 3. Different Approaches for Hiding Data Transfer Latency to Improve Throughput. A) Ping-pong buffer. B) Synchronous FIFO. C) The Proposed Patrial
1010
+ Reuse FIFO. D) A four-level synaptic weights delivery hierarchy to enable synaptic weights reuse, reduce off-chip memory bandwidth and hide the weight
1011
+ loading latency to the systolic array.
1012
+ size has to be doubled for ping-pong operation. However, the
1013
+ worst-case scenario will not occur in most cases. Only a small
1014
+ portion of the ping-pong buffer is occupied most of the time.
1015
+ While the aforementioned problems are negligible in ANN
1016
+ accelerator design, we cannot afford to “double the size”
1017
+ in SNN neuromorphic hardware design because the memory
1018
+ bandwidth needed has already increased multiple times.
1019
+ Ideally, the on-chip buffer that stores the synaptic weights
1020
+ in SNN should have the following properties:
1021
+ 1) We do not need to double the buffer size and split the
1022
+ buffer into two regions for ping-pong operation just
1023
+ to guarantee no read-write collision will happen. No
1024
+ manual switching of the split buffers is needed.
1025
+ 2) In SNN, the same synaptic weights need to be accessed
1026
+ at every timestep. We expect the data in the buffer can
1027
+ be read several times before they expire and are replaced
1028
+ by new data.
1029
+ 3) The depth of the buffer is set to support the most storage-
1030
+ expensive cases, but multiple batches of data can be
1031
+ preloaded into the available large RAM spaces when
1032
+ the storage requirements are less expensive.
1033
+ We propose Partial Reuse FIFO, to address the above
1034
+ requirements and enable data reuse and space exploration
1035
+ without complex control logic.
1036
+ As shown in Fig. 3B, traditional synchronous FIFO can
1037
+ be described using a ring. The circumference of the ring
1038
+ represents the depth of the FIFO. The width of the ring
1039
+ represents the data width of the FIFO. A push pointer is used
1040
+ to mark the write address of the incoming data. A pop pointer
1041
+ is used to mark the read address of the output data. When the
1042
+ push pointer and the pop pointer point to the same address,
1043
+ the FIFO is either full or empty, depending on whether the
1044
+ occupancy of the FIFO is rising or falling. When the FIFO is
1045
+ full, the ready signal to the inputs AXI-Stream is clear. When
1046
+ the FIFO is empty, the valid signal to the outputs AXI-Stream
1047
+ is clear.
1048
+ As shown in Fig.3C, the mechanism of the Partial Reuse
1049
+ FIFO is the same as the traditional synchronous FIFO, except
1050
+ that a partial region in the FIFO ring cannot be flushed by
1051
+ incoming data until it is reused T times, where T is a control
1052
+ register of the Partial Reuse FIFO.
1053
+ The reuse region of the FIFO is labeled by Start and End.
1054
+ The pop pointer jumps back to the Start position whenever it
1055
+ reaches the end. The reuse counter increases whenever the
1056
+ pop pointer jumps back to Start. The Start label stays the
1057
+ same when the region is still being reused. When the counter
1058
+ reaches T, the counter is reset, label End becomes the next
1059
+ label Start and the next label End is set by Start+L-1, where
1060
+ L is another control register of the partial reuse FIFO. Unlike
1061
+ the traditional synchronous FIFO, when the push pointer meets
1062
+ the label Start, the Partial Reuse FIFO is full and the ready
1063
+ signal to the inputs AXI-Stream is clear. When label End is
1064
+ ahead of the push pointer, the Partial Reuse FIFO is considered
1065
+ empty until the reuse sector of the FIFO is filled by the input
1066
+ stream.
1067
+ The partial reuse FIFO satisfies the aforementioned prop-
1068
+ erties. Using the valid-ready handshake protocol of the AXI-
1069
+ Stream, the function of the partial reuse FIFO is self-contained,
1070
+ with only two control registers exposed. The partial reuse
1071
+ FIFO contains only a monolithic RAM and does not need
1072
+ to be split. The push-pop pointer in the FIFO control logic
1073
+ ensures no read-write collision. The reuse sector protected by
1074
+ the Start-End label enables data reuse. New data from multiple
1075
+ batches can be pushed to the partial reuse FIFO sequentially
1076
+ as long as the FIFO is not full.
1077
+ F. Psum-Vmem Unified Buffer and Spike Generation Logic
1078
+ A classic systolic array consumes data from the inputs and
1079
+ weights data domain and feeds data to the outputs data domain.
1080
+ If one data domain stays stationary, the other two must flow
1081
+ through the computing logic. This metric holds for the three
1082
+ classic input, weight and output stationary dataflows.
1083
+ Our architecture adopts the weight stationary dataflow. In
1084
+ this case, synaptic weights remain stationary in the systolic
1085
+ array, and the input binary spikes and the output flow in and
1086
+ out of the systolic array. The flowing spike vector is generated
1087
+ by the line buffer mechanism, and the outputs are stored in
1088
+ the proposed Psum-Vmem Unified Buffer.
1089
+ In our architecture, the synaptic operations in SNN are
1090
+ spatially parallelized. However, it is unlikely to flatten a
1091
+ whole layer spatially onto the area-power-restricted hardware
1092
+ substrates. Therefore, certain tiling strategies need to be imple-
1093
+ mented. We adopt the channel tiling strategy to accommodate
1094
+ layers with a large number of channels to the same systolic
1095
+ array. Input spike map channels are split into multiple tiles
1096
+ to fit into the height of the systolic array. Output spike map
1097
+
1098
+ 8
1099
+ Acc
1100
+ Phase
1101
+ Thresh
1102
+ Phase
1103
+ Last
1104
+ Step
1105
+ Last
1106
+ Tile
1107
+ Finish
1108
+ Finish
1109
+ Clear
1110
+ Phase
1111
+ Psum-Vmem
1112
+ Unified
1113
+ Buffer
1114
+ Stored
1115
+ Psum/Vmem
1116
+ Read Addr
1117
+ Psum-Vmem
1118
+ Update
1119
+ Engine
1120
+ Updated
1121
+ Psum/Vmem
1122
+ Updated
1123
+ Psum/Vmem
1124
+ New Psum
1125
+ Acc
1126
+ Unit
1127
+ New Psum
1128
+ Stored
1129
+ Threshold
1130
+ Leak Coeff
1131
+ Leak En
1132
+ Reset En
1133
+ Updated
1134
+ Spike
1135
+ Leak
1136
+ Unit
1137
+ Threshold
1138
+ Unit
1139
+ C)
1140
+ Psum/Vmem
1141
+ Psum/Vmem
1142
+ B)
1143
+ A)
1144
+ Write Addr
1145
+ Spikes
1146
+ Fig. 4.
1147
+ Psum-Vmem Update Mechanism. A) The finite-state-machine per-
1148
+ forming the Psum-Vmem update. B) The proposed Psum-Vmem unified buffer
1149
+ and Psum-Vmem update engine. C) The hardware implementation details of
1150
+ the Psum-Vmem update engine.
1151
+ channels are calculated N at a time according to the width of
1152
+ the systolic array.
1153
+ In each single timestep, the partial sums of the N output
1154
+ spike map channels are stored on-chip and are not fully
1155
+ accumulated until all tiles of the input spike map channels
1156
+ are calculated. In each layer, the membrane voltage of the N
1157
+ output spike map channels are also needed to be stored on-
1158
+ chip until all timesteps are iterated. Instead of instantiating
1159
+ a separate buffer for partial sum and membrane voltage, we
1160
+ propose the Psum-Vmem Unified Buffer to reduce RAM
1161
+ consumption.
1162
+ Since tiles of input spike map channels in a single timestep
1163
+ are sent to the computing array one by one and the temporal
1164
+ dimension of SNN is kept in its natural way of executing in a
1165
+ sequential manner, the partial sum accumulating process and
1166
+ the membrane voltage update process can be scheduled using
1167
+ a finite state machine. There are three states specified in the
1168
+ FSM: accumulating phase, thresholding Phase, and clearing
1169
+ phase.
1170
+ During the accumulating phase, Psum extracted from the
1171
+ Psum-Vmem unified buffer is accumulated by the computing
1172
+ results from the systolic array. When the last tile of the input
1173
+ spike map channel in the current timestep arrives and the
1174
+ current timestep is not the last, the FSM switches to the
1175
+ thresholding phase. The extracted Psum is first accumulated,
1176
+ then processed by the optional leaky unit and the thresholding
1177
+ unit, and eventually written back to the unified buffer. The
1178
+ accumulated Vmem will be subtracted from a fixed portion of
1179
+ its value by the optional leaky unit to support the LIF neuron
1180
+ dynamics. The thresholding unit will compare the Vmem with
1181
+ the threshold, generate a spike, and reset the Vmem if it
1182
+ exceeds the threshold. All of the computations are pipelined to
1183
+ improve timing. The FSM switches back to the accumulating
1184
+ phase when this phase finishes. When the last tile of the
1185
+ input spike map channel in the last timestep arrives, the FSM
1186
+ switches to the Clearing Phase. The computation process is the
1187
+ same as the thresholding phase, except that the Vmem value
1188
+ will be cleared to reset the unified buffer for the next SNN
1189
+ layer.
1190
+ V. IMPLEMENTATION AND EXPERIMENTS
1191
+ A. Experiments Setup
1192
+ Most neuromorphic hardware uses expensive large FPGA
1193
+ devices, ignoring the feasibility of deploying such hardware
1194
+ in the real world. FireFly is mapped onto several off-the-shelf
1195
+ commercially available Xilinx Zynq Ultrascale FPGAs, in-
1196
+ cluding the Ultra96v2, KV260 and ZCU104 FPGA evaluation
1197
+ boards, bringing hope of SNN real-world applications in an
1198
+ edge scenario. The FPGA chips of the three evaluation boards
1199
+ are xczu3eg, xczu5ev, and xczu7ev, respectively.
1200
+ Our proposed FireFly is designed using SpinalHDL, a
1201
+ hardware description language equipped with object-oriented
1202
+ programming and functional programming. Compared with
1203
+ an HLS-based code template, parameterized Verilog, or Sys-
1204
+ temVerilog, SpinalHDL can offer a higher level of abstraction
1205
+ and reconfigurability. The Verilog codes generated by the
1206
+ SpinalHDL compiler are synthesized and implemented in the
1207
+ Xilinx Vivado 2021.1 with ML-Based design optimization to
1208
+ achieve a higher clock rate and faster timing closure. Power
1209
+ consumption estimates and timing results are obtained after
1210
+ place-and-route using the power analysis and timing summary
1211
+ tools in the Vivado Design Suite, which provides detailed
1212
+ analysis and accurate estimation. Throughput performance is
1213
+ obtained by recording the timer value on the PS side of Zynq
1214
+ while the PL runs the benchmark tasks.
1215
+ B. Bridging the Gap between Peak and Avg. GSOP/s
1216
+ The theoretical peak GSOP/s of an SNN accelerator is given
1217
+ as:
1218
+ Peak GSOP/s = 2 × f × M × N.
1219
+ (5)
1220
+ where f is the system clock frequency, and M ×N denotes
1221
+ the size of the systolic array. The peak GSOP/s calculation is
1222
+ the same as [20] and [24]. In FireFly, M denotes the number
1223
+ of columns in the systolic array, while N denotes the rows.
1224
+ The peak performance should be proportional to the systolic
1225
+ array size. However, the actual throughput, or average GSOP/s,
1226
+ can be degraded due to insufficient bandwidth and inefficient
1227
+ controller design.
1228
+ In our design, the line buffer mechanism enables binary
1229
+ spike map reuse, the partial reuse FIFO enables synaptic
1230
+ weight reuse, and the Psum-Vmem buffer is used to avoid
1231
+ back-and-forth fetch and store. The memory bandwidth needed
1232
+ for off-chip data transfer is minimized, and thus not a bottle-
1233
+ neck of the system’s average performance.
1234
+ We argue that the communication between the controller
1235
+ and the accelerator significantly impact the system’s actual
1236
+
1237
+ 9
1238
+ TABLE II
1239
+ COMPARISON WITH OTHER WORKS IN RESOURCE UTILIZATION.
1240
+ Work
1241
+ Device
1242
+ Slice LUTs
1243
+ Slice Registers
1244
+ BRAM/URAM
1245
+ DSP48
1246
+ Frequency
1247
+ Peak GSOP/s
1248
+ Used
1249
+ Utilization
1250
+ Used
1251
+ Utilization
1252
+ Used
1253
+ Utilization
1254
+ Used
1255
+ Utilization
1256
+ [39]
1257
+ xc7vx690t
1258
+ 53k
1259
+ 12.20%
1260
+ 100k
1261
+ 11.50%
1262
+ 65
1263
+ 4.40%
1264
+ 0
1265
+ 0%
1266
+ 100
1267
+ /
1268
+ [22]
1269
+ xc7k325t
1270
+ 170k
1271
+ 83.70%
1272
+ 113k
1273
+ 27.70%
1274
+ 254
1275
+ 57.10%
1276
+ 0
1277
+ 0%
1278
+ 135
1279
+ 3.2
1280
+ [24]
1281
+ xcvu440
1282
+ 302k
1283
+ 11.90%
1284
+ 421k
1285
+ 8.30%
1286
+ 192
1287
+ 7.60%
1288
+ 0
1289
+ 0%
1290
+ 200
1291
+ 1562.5
1292
+ [40]
1293
+ xcku115
1294
+ 585k
1295
+ 88.20%
1296
+ 232k
1297
+ 17.40%
1298
+ 432
1299
+ 20%
1300
+ 0
1301
+ 0%
1302
+ 140
1303
+ 253
1304
+ [25]
1305
+ 28nm ASIC
1306
+ /
1307
+ /
1308
+ /
1309
+ /
1310
+ /
1311
+ /
1312
+ /
1313
+ /
1314
+ 200
1315
+ 684.5
1316
+ [31]
1317
+ 28nm ASIC
1318
+ /
1319
+ /
1320
+ /
1321
+ /
1322
+ /
1323
+ /
1324
+ /
1325
+ /
1326
+ 200
1327
+ 3970.1
1328
+ ours1
1329
+ xczu3eg
1330
+ 15k
1331
+ 21.40%
1332
+ 53k
1333
+ 37.50%
1334
+ 162
1335
+ 75%
1336
+ 288
1337
+ 80%
1338
+ 300
1339
+ 1382.4
1340
+ ours2
1341
+ xczu7ev
1342
+ 42k
1343
+ 18.20%
1344
+ 196k
1345
+ 42.60%
1346
+ 25/40
1347
+ 11.5/41.6%
1348
+ 1152
1349
+ 66.60%
1350
+ 300
1351
+ 5529.6
1352
+ ours3
1353
+ xczu5ev
1354
+ 32k
1355
+ 27.35%
1356
+ 112k
1357
+ 47.86%
1358
+ 16/24
1359
+ 11.1%/37.5%
1360
+ 576
1361
+ 46.20%
1362
+ 300
1363
+ 1382.4×2
1364
+ 1 FireFly with a 16 × 144 systolic array implemented on Ultra96v2.
1365
+ 2 FireFly with a 32 × 228 systolic array implemented on ZCU104.
1366
+ 3 FireFly with two 16 × 144 systolic arrays implemented on KV260.
1367
+ throughput. Note that we choose the Zynq devices as the
1368
+ system platforms. The built-in host CPU controller enables
1369
+ fast deployment of different SNN networks without the need
1370
+ to change the PL logic. In most Zynq-based SNN acceler-
1371
+ ators such as Cerebron [20], the host program in the Zynq
1372
+ processing system sends synaptic weights and binary input
1373
+ spike maps into the Zynq programmable logic and collects
1374
+ the output spike maps in different SNN layers. However,
1375
+ the control command sequence traveling between PS and PL
1376
+ through the low-performance AXI-Lite protocol induces non-
1377
+ negligible latency, leaving the systolic array idle and reducing
1378
+ the average throughput. In FireFly, the host program generates
1379
+ a command sequence in advance and sends the commands to
1380
+ PL through a high-performance AXI-Stream to the internal
1381
+ command queue of the AXI DataMover. In this way, the req-
1382
+ ack waiting clock cycles between commands are eliminated.
1383
+ The average throughput can go a step further.
1384
+ C. Performance Analysis
1385
+ The size of the systolic can be statically reconfigured
1386
+ in FireFly according to the on-chip resources on different
1387
+ evaluation boards. A M ×N systolic array in FireFly receives
1388
+ N presynaptic inputs and produces partial sum for M neurons,
1389
+ where M = P and N = Kh × Kw × P. The resource con-
1390
+ sumption, memory bandwidth and acceleration performance is
1391
+ linearly proportional to the parallelism factor P. P can be any
1392
+ value as long as the systolic array can fit in the target device.
1393
+ As P is also the tiling factor of the input and output channels
1394
+ in a convolutional layer, it is preferable to set P to a power of
1395
+ 2 because the number of channels in most convolutional layers
1396
+ is a power of two. Therefore, we evaluate two representative
1397
+ configurations, 16 × 144 and 32 × 288 to demonstrate the
1398
+ reconfigurability of FireFly.
1399
+ The usage of DSP48 to implement synaptic operations sig-
1400
+ nificantly reduces the fabric overhead and achieves significant
1401
+ GSOP/s improvements compared with most existing hardware.
1402
+ The performance of FireFly is still impressive. FireFly with
1403
+ a 16 × 144 systolic array can achieve a peak performance of
1404
+ 1382.4GSOP/s, and FireFly with a 32×288 systolic array can
1405
+ achieve a peak performance of 5529.6GSOP/s, as shown in
1406
+ Table II.
1407
+ To the best of our knowledge, SIES [24] achieves the
1408
+ highest GSOP/s among all the existing FPGA-based acceler-
1409
+ ators. Compared with SIES [24], FireFly mapped on xczu3eg
1410
+ consumes only
1411
+ 1
1412
+ 20 LUTs and 1
1413
+ 8 FFs but still achieve similar
1414
+ GSOP/s, whereas FireFly mapped on xczu7ev consumes only
1415
+ 1
1416
+ 7 LUTs and
1417
+ 1
1418
+ 2 LUTs FFs and achieves a ×3.5 speed up.
1419
+ Additionally, we map two heterogeneous FireFly cores onto
1420
+ xczu5ev to support the concurrent inference of two indepen-
1421
+ dent SNNs.
1422
+ We can still achieve higher throughput when compared
1423
+ with SpinalFlow and SATO, which are state-of-the-art SNN
1424
+ hardware accelerators built in 28nm ASIC. We are well aware
1425
+ that it is difficult to make an apples-to-apples comparison
1426
+ with the hardware adopting different design methodologies,
1427
+ supporting different types of neurons, using different synaptic
1428
+ weight precisions or implementing on different platforms,
1429
+ FireFly can still be called a high-performance SNN accelerator
1430
+ due to its excellent GSOP/s performance.
1431
+ D. Benchmark Evaluations
1432
+ We deploy several state-of-the-art SNN networks trained by
1433
+ backpropagation algorithms [4] on FireFly to test the inference
1434
+ performance. We evaluate not only the static datasets such as
1435
+ MNIST, CIFAR10 and CIFAR100 but also the neuromorphic
1436
+ datasets such as DVS-CIFAR10 and DVS-Gesture.
1437
+ The models are trained using surrogate functions like
1438
+ quadratic gate and arctangent gradient. Direct coding and
1439
+ backpropagation through time algorithm significantly reduce
1440
+ the total timesteps of the SNNs. In our experiment, the
1441
+ timesteps are scaled down to four without a significant ac-
1442
+ curacy drop.
1443
+ We first apply batchnorm fusion to merge the batch normal-
1444
+ ization layer with the preceding convolutional layer to deploy
1445
+ the Pytorch-Trained SNN model to FireFly. Then we adopt
1446
+ post-training quantization techniques to convert the Float32
1447
+ synaptic weights to INT8 and the Float32 threshold to INT18.
1448
+ Note that the performance drop of post-training quantization
1449
+ without further retraining or fine-tuning is negligible in SNN
1450
+ because no scaling errors of multiplications are introduced.
1451
+ FireFly shows reconfigurability on different SNN models for
1452
+ different image classification tasks. We evaluate four different
1453
+ SNN model structures with 5, 7, 9, and 11 convolutional
1454
+
1455
+ 10
1456
+ TABLE III
1457
+ COMPARISON WITH RELATED WORK FOR MULTIPLE IMAGE CLASSIFICATION TASKS USING SNNS FOR MULTIPLE DATASET.
1458
+ Work
1459
+ Network
1460
+ Dataset
1461
+ Latency
1462
+ Accuracy
1463
+ GSOP/s
1464
+ Device
1465
+ Frequency
1466
+ power
1467
+ TVLSI’14
1468
+ [41]
1469
+ 784-500-500-10
1470
+ MNIST
1471
+ 9.25ms
1472
+ 94.2
1473
+ /
1474
+ xc6slx150t
1475
+ 75MHz
1476
+ 1.5W
1477
+ ICCAD’20
1478
+ [27]
1479
+ 28x28-32c3-p2-32c3-p2-256-10
1480
+ MNIST
1481
+ 7.53ms
1482
+ 99.42
1483
+ /
1484
+ xczu9eg
1485
+ 125MHz
1486
+ 4.5W
1487
+ TCAD’22
1488
+ [30]
1489
+ 28x28-16c-32c-8c-10
1490
+ MNIST
1491
+ 45us
1492
+ 98.5
1493
+ 22.6
1494
+ xc7z045
1495
+ 200MHz
1496
+ 0.96W
1497
+ TCAS-I’21
1498
+ [42]
1499
+ 784-200-100-10
1500
+ MNIST
1501
+ 3.15ms
1502
+ 92.93
1503
+ xc7vx485t
1504
+ 100MHz
1505
+ /
1506
+ JCST’20
1507
+ [24]
1508
+ 28x28-12c5-p2-64c5-p2-10
1509
+ MNIST
1510
+ /
1511
+ 99.16
1512
+ 1562.5
1513
+ xcvu440
1514
+ 200MHz
1515
+ /
1516
+ TCAD’21
1517
+ [22]
1518
+ 32x32-32c3-p2-32c3-p2-256-10
1519
+ SVHN
1520
+ 1.21 ms
1521
+ 82.15
1522
+ 3.2
1523
+ xc7k325t
1524
+ 100MHz
1525
+ 0.699W
1526
+ 784-512-256-128-64-10
1527
+ FMNIST
1528
+ 0.14 ms
1529
+ 89.01
1530
+ 200MHz
1531
+ 0.982W
1532
+ TRETS’22
1533
+ [43]
1534
+ 28x28-32c3-p2-32c3-p2-256-10
1535
+ MNIST
1536
+ 77us
1537
+ 99.17
1538
+ /
1539
+ xczu9eg
1540
+ 200MHz
1541
+ 24.5W
1542
+ 32x32-(192c5-192c1-192c1-p3)*2-
1543
+ 192c5-192c1-10c1-AP-10
1544
+ CIFAR10
1545
+ 6.8ms
1546
+ 88.19
1547
+ DATE’22
1548
+ [26]
1549
+ 144x144-p4-32c-p2-
1550
+ 32c-p2-512-512-11
1551
+ NMNIST
1552
+ 3.83ms
1553
+ 97.81
1554
+ 51.2
1555
+ 22nm
1556
+ ASIC
1557
+ 400MHz
1558
+ 0.11W
1559
+ DVS-Gesture
1560
+ 7.1ms
1561
+ 92.4
1562
+ ours
1563
+ SCNN-51
1564
+ MNIST
1565
+ 0.491ms
1566
+ 98.12%
1567
+ 91%5
1568
+ xczu3eg
1569
+ 300MHz
1570
+ 2.55W
1571
+ SCNN-72
1572
+ CIFAR10
1573
+ 1.035ms
1574
+ 91.36%
1575
+ 89%5
1576
+ SCNN-113
1577
+ CIFAR100
1578
+ 2.125ms
1579
+ 64.28%
1580
+ 86%5
1581
+ SCNN-94
1582
+ DVS-CIFAR10
1583
+ 3.541ms
1584
+ 72.40%
1585
+ 87%5
1586
+ SCNN-94
1587
+ DVS-Gesture
1588
+ 3.541ms
1589
+ 89.29%
1590
+ 87%5
1591
+ 1 SCNN-5: 28x28-16c3-64c3-p2-128c3-p2-256c3-256c3-10
1592
+ 2 SCNN-7: 32x32-16c3-64c3-p2-128c3-128c3-p2-256c3-256c3-p2-512c3-10
1593
+ 3 SCNN-9: 48x48-16c3-64c3-64c3-p2-128c3-128c3-p2-256c3-256c3-p2-512c3-512c3-10
1594
+ 4 SCNN-11: 32x32-16c3-64c3-64c3-p2-128c3-128c3-128c3-p2-256c3-256c3-256c3-p2-512c3-512c3-100
1595
+ 5 The GSOP/s utilization ratio: Actual measured GSOP/s divided by the peak GSOP/s. The peak GSOP/s is 1382.4 on xczu3eg.
1596
+ layers on five different datasets, shown in Table III. Note
1597
+ that our chosen device, xczu3eg, is an edge device having the
1598
+ fewest resources among all the listed hardware, but still, Fire-
1599
+ Fly shows significant improvement in all these benchmarks.
1600
+ Compared with [27], FireFly achieves a ×15 speed up and
1601
+ similar accuracy on the MNIST dataset. Compared with [21],
1602
+ FireFly achieves higher accuracy and a ×6 inference speed
1603
+ up on CIFAR10 dataset. Compared with ASIC design [26],
1604
+ FireFly achieves a ×2 speed up and similar accuracy on DVS-
1605
+ Gesture dataset. Note that our SNN models are considerably
1606
+ bigger and deeper than the listed benchmarks.
1607
+ When using a larger xczu7ev device, all the inference per-
1608
+ formances listed above are improved by ×4 because xczu7ev
1609
+ supports higher parallelism and has a peak performance of
1610
+ 5.523TSOP/s. Our system also supports multiple heteroge-
1611
+ neous cores running different SNN models concurrently. When
1612
+ targeting xczu5ev, two FireFly cores can be deployed indepen-
1613
+ dently to support multiple real-world tasks.
1614
+ E. Discussion
1615
+ We argue that for FPGA-based SNN accelerator design,
1616
+ the benefits of designing complicated hardware supporting
1617
+ spike sparsity may not make up for the losses of irregular
1618
+ interconnect and underutilization of the dedicated hard block.
1619
+ The system clock frequency can have a significant impact
1620
+ on inference performance. Compared with ASICs, routing in
1621
+ FPGAs contributes more delay time since logic elements are
1622
+ connected through a series of switching matrices instead of
1623
+ direct physical wires. A complex digital design with irregular
1624
+ interconnect can easily violate the timing requirements even
1625
+ in the most state-of-the-art FPGA devices. Most existing
1626
+ FPGA-based SNN accelerators can only satisfy the timing
1627
+ requirement of at most 200MHz even on the expensive Virtex
1628
+ Ultrascale+ device.
1629
+ An important aspect of FPGA low-power system design is
1630
+ to utilize the existing dedicated hard block rather than build
1631
+ one from scratch. Implementing the same function using the
1632
+ dedicated hard block in FPGAs usually consumes less energy
1633
+ than using the general fabric counterparts. However, most
1634
+ existing FPGA-based SNN accelerators fail to delve into the
1635
+ features provided by the existing dedicated hard block and
1636
+ adopt a no-brainer implementation of spike computation using
1637
+ low-speed fabric.
1638
+ In this paper, FireFly provides a different perspective on
1639
+ designing dedicated neuromorphic hardware for spiking neural
1640
+ networks targeting FPGA devices. We are well aware that
1641
+ it is important to design hardware that supports sparsity
1642
+ acceleration. However, to our best knowledge, only few studies
1643
+ [25] [31] targeting ASICs can show significant speed-ups
1644
+ considering this inherent nature of SNNs, not to mention
1645
+ the large majority of FPGA-based designs. Instead of design-
1646
+ ing complicated circuits to support the sparsity acceleration,
1647
+ FireFly consists of a monolithic systolic array and adopts a
1648
+ straightforward weight stationary dataflow. The acceleration
1649
+ comes from the clock frequency improvement brought by
1650
+ the regular and simple interconnect of the systolic array, the
1651
+ pipelined arithmetic computations, and, most importantly, the
1652
+ flexible use of the multi-function DSP48E2s.
1653
+ In fact, the potential of the DSP48E2 is still far from being
1654
+ fully realized. Wu et al. [11] proposed a high-throughput pro-
1655
+ cessing array for matrix multiplication based on DSP supertile
1656
+ and achieved peak DSP clock rates on Xilinx UltraScale (741
1657
+ MHz) and UltraScale+ (891 MHz) devices. SNN accelerators
1658
+ can incorporate the DSP supertile design and achieve even
1659
+ higher performance.
1660
+ The potential of other dedicated hard blocks on FPGA
1661
+ is also yet to be exploited. Scaling the Cascades [10] fully
1662
+ utilized the dedicated cascade interconnect of the DSP48E2,
1663
+ BRAM36K, and URAM288K and achieved nearly 100 %
1664
+ usage of these hard blocks, delivering incredible inference
1665
+ speed on MLPerf benchmarks. It is necessary to migrate the
1666
+ existing hardware optimization techniques of ANN accelerator
1667
+
1668
+ 11
1669
+ design to SNN neuromorphic hardware research.
1670
+ Nevertheless, we agree that ideally, the main advantage of
1671
+ new SNN accelerators compared to ANNs on digital hard-
1672
+ ware comes primarily from exploiting the sparsity of spikes
1673
+ and not from the replacement of MAC operations with AC
1674
+ operations [44]. Future neuromorphic hardware design should
1675
+ exploit spike sparsity and migrate existing FPGA optimization
1676
+ techniques simultaneously.
1677
+ VI. CONCLUSIONS
1678
+ In this work, we introduced a high-throughput and recon-
1679
+ figurable hardware accelerator for spiking neural networks.
1680
+ To achieve high-performance inference of SNN, we fully
1681
+ exploited the features of the dedicated DSP48E2 embedded in
1682
+ the FPGA and achieved the highest GSOP/s compared with the
1683
+ existing accelerator designs. To improve memory efficiency,
1684
+ we designed a synaptic weight delivery hierarchy and a Psum-
1685
+ Vmem unified buffer to support the high parallelism. To
1686
+ demonstrate FireFly’s reconfigurability, we evaluated multiple
1687
+ deep SNN models on various datasets. To make SNN appli-
1688
+ cations more convenient, we used off-the-shelf commercially
1689
+ available FPGA edge devices, offering a more feasible solution
1690
+ than any other existing hardware. In the future, we will try to
1691
+ migrate more optimization techniques targeting FPGAs while
1692
+ exploring sparsity acceleration to enable more energy-efficient
1693
+ SNN software and hardware co-design.
1694
+ REFERENCES
1695
+ [1] W. Maass, “Networks of spiking neurons: the third generation of neural
1696
+ network models,” Neural networks, vol. 10, no. 9, pp. 1659–1671, 1997.
1697
+ [2] Y. Wu, L. Deng, G. Li, J. Zhu, and L. Shi, “Spatio-temporal backpropa-
1698
+ gation for training high-performance spiking neural networks,” Frontiers
1699
+ in neuroscience, vol. 12, p. 331, 2018.
1700
+ [3] W. Zhang and P. Li, “Temporal spike sequence learning via backpropaga-
1701
+ tion for deep spiking neural networks,” Advances in Neural Information
1702
+ Processing Systems, vol. 33, pp. 12 022–12 033, 2020.
1703
+ [4] G. Shen, D. Zhao, and Y. Zeng, “Backpropagation with biologically
1704
+ plausible spatiotemporal adjustment for training deep spiking neural
1705
+ networks,” vol. 3, no. 6, p. 100522. [Online]. Available: https:
1706
+ //www.sciencedirect.com/science/article/pii/S2666389922001192
1707
+ [5] Y. Kim and P. Panda, “Revisiting batch normalization for training
1708
+ low-latency deep spiking neural networks from scratch,” Frontiers in
1709
+ neuroscience, p. 1638, 2020.
1710
+ [6] H. Zheng, Y. Wu, L. Deng, Y. Hu, and G. Li, “Going deeper with
1711
+ directly-trained larger spiking neural networks,” in Proceedings of the
1712
+ AAAI Conference on Artificial Intelligence, vol. 35, no. 12, 2021, pp.
1713
+ 11 062–11 070.
1714
+ [7] Y. Wu, L. Deng, G. Li, J. Zhu, Y. Xie, and L. Shi, “Direct training for
1715
+ spiking neural networks: Faster, larger, better,” in Proceedings of the
1716
+ AAAI Conference on Artificial Intelligence, vol. 33, no. 01, 2019, pp.
1717
+ 1311–1318.
1718
+ [8] M. Xu, Y. Wu, L. Deng, F. Liu, G. Li, and J. Pei, “Exploiting spiking
1719
+ dynamics with spatial-temporal feature normalization in graph learning,”
1720
+ arXiv preprint arXiv:2107.06865, 2021.
1721
+ [9] Y.-H. Chen, T. Krishna, J. S. Emer, and V. Sze, “Eyeriss: An energy-
1722
+ efficient reconfigurable accelerator for deep convolutional neural net-
1723
+ works,” vol. 52, no. 1, pp. 127–138, conference Name: IEEE Journal of
1724
+ Solid-State Circuits.
1725
+ [10] A. Samajdar, T. Garg, T. Krishna, and N. Kapre, “Scaling the cascades:
1726
+ Interconnect-aware FPGA implementation of machine learning prob-
1727
+ lems,” in 2019 29th International Conference on Field Programmable
1728
+ Logic and Applications (FPL), pp. 342–349, ISSN: 1946-1488.
1729
+ [11] E. Wu, X. Zhang, D. Berman, and I. Cho, “A high-throughput reconfig-
1730
+ urable processing array for neural networks,” in 2017 27th International
1731
+ Conference on Field Programmable Logic and Applications (FPL), pp.
1732
+ 1–4, ISSN: 1946-1488.
1733
+ [12] M. Davies, N. Srinivasa, T.-H. Lin, G. Chinya, Y. Cao, S. H. Choday,
1734
+ G. Dimou, P. Joshi, N. Imam, S. Jain, Y. Liao, C.-K. Lin, A. Lines,
1735
+ R. Liu, D. Mathaikutty, S. McCoy, A. Paul, J. Tse, G. Venkataramanan,
1736
+ Y.-H. Weng, A. Wild, Y. Yang, and H. Wang, “Loihi: A neuromorphic
1737
+ manycore processor with on-chip learning,” vol. 38, no. 1, pp. 82–99,
1738
+ conference Name: IEEE Micro.
1739
+ [13] J. Pei, L. Deng, S. Song, M. Zhao, Y. Zhang, S. Wu, G. Wang,
1740
+ Z. Zou, Z. Wu, W. He, F. Chen, N. Deng, S. Wu, Y. Wang,
1741
+ Y. Wu, Z. Yang, C. Ma, G. Li, W. Han, H. Li, H. Wu, R. Zhao,
1742
+ Y. Xie, and L. Shi, “Towards artificial general intelligence with
1743
+ hybrid tianjic chip architecture,” vol. 572, no. 7767, pp. 106–111,
1744
+ number: 7767 Publisher: Nature Publishing Group. [Online]. Available:
1745
+ https://www.nature.com/articles/s41586-019-1424-8
1746
+ [14] E. Painkras, L. A. Plana, J. Garside, S. Temple, F. Galluppi, C. Patterson,
1747
+ D. R. Lester, A. D. Brown, and S. B. Furber, “SpiNNaker: A 1-w 18-
1748
+ core system-on-chip for massively-parallel neural network simulation,”
1749
+ vol. 48, no. 8, pp. 1943–1953, conference Name: IEEE Journal of Solid-
1750
+ State Circuits.
1751
+ [15] F. Akopyan, J. Sawada, A. Cassidy, R. Alvarez-Icaza, J. Arthur,
1752
+ P. Merolla, N. Imam, Y. Nakamura, P. Datta, G.-J. Nam, B. Taba,
1753
+ M. Beakes, B. Brezzo, J. B. Kuang, R. Manohar, W. P. Risk, B. Jackson,
1754
+ and D. S. Modha, “TrueNorth: Design and tool flow of a 65 mW 1
1755
+ million neuron programmable neurosynaptic chip,” vol. 34, no. 10, pp.
1756
+ 1537–1557, conference Name: IEEE Transactions on Computer-Aided
1757
+ Design of Integrated Circuits and Systems.
1758
+ [16] J. Schemmel, D. Br¨uderle, A. Gr¨ubl, M. Hock, K. Meier, and S. Millner,
1759
+ “A wafer-scale neuromorphic hardware system for large-scale neural
1760
+ modeling,” in 2010 IEEE International Symposium on Circuits and
1761
+ Systems (ISCAS), pp. 1947–1950, ISSN: 2158-1525.
1762
+ [17] J. Feldmann, N. Youngblood, C. D. Wright, H. Bhaskaran, and
1763
+ W.
1764
+ H.
1765
+ P.
1766
+ Pernice,
1767
+ “All-optical
1768
+ spiking
1769
+ neurosynaptic
1770
+ networks
1771
+ with self-learning capabilities,” vol. 569, no. 7755, pp. 208–214,
1772
+ number: 7755 Publisher: Nature Publishing Group. [Online]. Available:
1773
+ https://www.nature.com/articles/s41586-019-1157-8
1774
+ [18] T. Zhou, X. Lin, J. Wu, Y. Chen, H. Xie, Y. Li, J. Fan, H. Wu, L. Fang,
1775
+ and Q. Dai, “Large-scale neuromorphic optoelectronic computing with
1776
+ a reconfigurable diffractive processing unit,” vol. 15, no. 5, pp.
1777
+ 367–373, number: 5 Publisher: Nature Publishing Group. [Online].
1778
+ Available: https://www.nature.com/articles/s41566-021-00796-w
1779
+ [19] J.-Q. Yang, R. Wang, Z.-P. Wang, Q.-Y. Ma, J.-Y. Mao, Y. Ren,
1780
+ X. Yang, Y. Zhou, and S.-T. Han, “Leaky integrate-and-fire neurons
1781
+ based on perovskite memristor for spiking neural networks,” vol. 74,
1782
+ p. 104828. [Online]. Available: https://www.sciencedirect.com/science/
1783
+ article/pii/S2211285520303852
1784
+ [20] Q. Chen, C. Gao, and Y. Fu, “Cerebron: A reconfigurable architecture
1785
+ for spatiotemporal sparse spiking neural networks,” vol. 30, no. 10, pp.
1786
+ 1425–1437, conference Name: IEEE Transactions on Very Large Scale
1787
+ Integration (VLSI) Systems.
1788
+ [21] S. Panchapakesan, Z. Fang, and J. Li, “SyncNN: Evaluating and accel-
1789
+ erating spiking neural networks on FPGAs,” in 2021 31st International
1790
+ Conference on Field-Programmable Logic and Applications (FPL), pp.
1791
+ 286–293, ISSN: 1946-1488.
1792
+ [22] W. Ye, Y. Chen, and Y. Liu, “The implementation and optimization
1793
+ of neuromorphic hardware for supporting spiking neural networks with
1794
+ MLP and CNN topologies,” pp. 1–1, conference Name: IEEE Transac-
1795
+ tions on Computer-Aided Design of Integrated Circuits and Systems.
1796
+ [23] M. T. L. Aung, C. Qu, L. Yang, T. Luo, R. S. M. Goh, and W.-F.
1797
+ Wong, “DeepFire: Acceleration of convolutional spiking neural network
1798
+ on modern field programmable gate arrays,” in 2021 31st International
1799
+ Conference on Field-Programmable Logic and Applications (FPL), pp.
1800
+ 28–32, ISSN: 1946-1488.
1801
+ [24] S.-Q. Wang, L. Wang, Y. Deng, Z.-J. Yang, S.-S. Guo, Z.-Y. Kang,
1802
+ Y.-F. Guo, and W.-X. Xu, “SIES: A novel implementation of spiking
1803
+ convolutional neural network inference engine on field-programmable
1804
+ gate
1805
+ array,”
1806
+ vol.
1807
+ 35,
1808
+ no.
1809
+ 2,
1810
+ pp.
1811
+ 475–489.
1812
+ [Online].
1813
+ Available:
1814
+ https://doi.org/10.1007/s11390-020-9686-z
1815
+ [25] S. Narayanan, K. Taht, R. Balasubramonian, E. Giacomin, and P.-
1816
+ E. Gaillardon, “SpinalFlow: An architecture and dataflow tailored for
1817
+ spiking neural networks,” in 2020 ACM/IEEE 47th Annual International
1818
+ Symposium on Computer Architecture (ISCA), pp. 349–362.
1819
+ [26] A. Di Mauro, A. S. Prasad, Z. Huang, M. Spallanzani, F. Conti, and
1820
+ L. Benini, “SNE: an energy-proportional digital accelerator for sparse
1821
+ event-based convolutions,” in 2022 Design, Automation & Test in Europe
1822
+ Conference & Exhibition (DATE), pp. 825–830, ISSN: 1558-1101.
1823
+ [27] H. Fang, Z. Mei, A. Shrestha, Z. Zhao, Y. Li, and Q. Qiu, “Encoding,
1824
+ model, and architecture: Systematic optimization for spiking neural
1825
+
1826
+ 12
1827
+ network in FPGAs,” in 2020 IEEE/ACM International Conference On
1828
+ Computer Aided Design (ICCAD), pp. 1–9, ISSN: 1558-2434.
1829
+ [28] J.-J. Lee and P. Li, “Reconfigurable dataflow optimization for spatiotem-
1830
+ poral spiking neural computation on systolic array accelerators,” in 2020
1831
+ IEEE 38th International Conference on Computer Design (ICCD), pp.
1832
+ 57–64, ISSN: 2576-6996.
1833
+ [29] J.-J. Lee, W. Zhang, and P. Li, “Parallel time batching: Systolic-
1834
+ array acceleration of sparse spiking neural computation,” in 2022 IEEE
1835
+ International Symposium on High-Performance Computer Architecture
1836
+ (HPCA), pp. 317–330, ISSN: 2378-203X.
1837
+ [30] Q. Chen, C. Gao, X. Fang, and H. Luan, “Skydiver: A spiking neural
1838
+ network accelerator exploiting spatio-temporal workload balance,” pp.
1839
+ 1–1, conference Name: IEEE Transactions on Computer-Aided Design
1840
+ of Integrated Circuits and Systems.
1841
+ [31] F. Liu, W. Zhao, Z. Wang, Y. Chen, T. Yang, Z. He, X. Yang,
1842
+ and
1843
+ L.
1844
+ Jiang,
1845
+ “SATO:
1846
+ spiking
1847
+ neural
1848
+ network
1849
+ acceleration
1850
+ via
1851
+ temporal-oriented dataflow and architecture,” in Proceedings of the
1852
+ 59th
1853
+ ACM/IEEE
1854
+ Design
1855
+ Automation
1856
+ Conference,
1857
+ ser.
1858
+ DAC
1859
+ ’22.
1860
+ Association for Computing Machinery, pp. 1105–1110. [Online].
1861
+ Available: https://doi.org/10.1145/3489517.3530592
1862
+ [32] E. M. Izhikevich, “Which model to use for cortical spiking neurons?”
1863
+ IEEE transactions on neural networks, vol. 15, no. 5, pp. 1063–1070,
1864
+ 2004.
1865
+ [33] A. L. Hodgkin and A. F. Huxley, “A quantitative description of mem-
1866
+ brane current and its application to conduction and excitation in nerve,”
1867
+ The Journal of physiology, vol. 117, no. 4, p. 500, 1952.
1868
+ [34] L. F. Abbott, “Lapicque’s introduction of the integrate-and-fire model
1869
+ neuron (1907),” Brain research bulletin, vol. 50, no. 5-6, pp. 303–304,
1870
+ 1999.
1871
+ [35] P. Dayan, L. F. Abbott et al., “Theoretical neuroscience: computational
1872
+ and mathematical modeling of neural systems,” Journal of Cognitive
1873
+ Neuroscience, vol. 15, no. 1, pp. 154–155, 2003.
1874
+ [36] L. Zhang, J. Yang, C. Shi, Y. Lin, W. He, X. Zhou, X. Yang,
1875
+ L. Liu, and N. Wu, “A cost-efficient high-speed VLSI architecture
1876
+ for spiking convolutional neural network inference using time-step
1877
+ binary spike maps,” vol. 21, no. 18, p. 6006, number: 18 Publisher:
1878
+ Multidisciplinary Digital Publishing Institute. [Online]. Available:
1879
+ https://www.mdpi.com/1424-8220/21/18/6006
1880
+ [37] X. Inc., “Ultrascale architecture dsp slice user guide,” 2021.
1881
+ [38] B. Bosi, G. Bois, and Y. Savaria, “Reconfigurable pipelined 2-d con-
1882
+ volvers for fast digital signal processing,” vol. 7, no. 3, pp. 299–308,
1883
+ conference Name: IEEE Transactions on Very Large Scale Integration
1884
+ (VLSI) Systems.
1885
+ [39] S. Guo, L. Wang, S. Wang, Y. Deng, Z. Yang, S. Li, Z. Xie, and Q. Dou,
1886
+ “A systolic SNN inference accelerator and its co-optimized software
1887
+ framework,” in Proceedings of the 2019 on Great Lakes Symposium on
1888
+ VLSI, ser. GLSVLSI ’19.
1889
+ Association for Computing Machinery, pp.
1890
+ 63–68. [Online]. Available: https://doi.org/10.1145/3299874.3317966
1891
+ [40] Y. Kuang, X. Cui, Z. Wang, C. Zou, Y. Zhong, K. Liu, Z. Dai, D. Yu,
1892
+ Y. Wang, and R. Huang, “ESSA: Design of a programmable efficient
1893
+ sparse spiking neural network accelerator,” pp. 1–11, conference Name:
1894
+ IEEE Transactions on Very Large Scale Integration (VLSI) Systems.
1895
+ [41] D. Neil and S.-C. Liu, “Minitaur, an event-driven FPGA-based spiking
1896
+ network accelerator,” vol. 22, no. 12, pp. 2621–2628, conference Name:
1897
+ IEEE Transactions on Very Large Scale Integration (VLSI) Systems.
1898
+ [42] S. Li, Z. Zhang, R. Mao, J. Xiao, L. Chang, and J. Zhou, “A fast
1899
+ and energy-efficient SNN processor with adaptive clock/event-driven
1900
+ computation scheme and online learning,” vol. 68, no. 4, pp. 1543–
1901
+ 1552, conference Name: IEEE Transactions on Circuits and Systems I:
1902
+ Regular Papers.
1903
+ [43] S. Panchapakesan, Z. Fang, and J. Li, “SyncNN: Evaluating and
1904
+ Accelerating Spiking Neural Networks on FPGAs,” ACM Transactions
1905
+ on Reconfigurable Technology and Systems, vol. 15, no. 4, pp. 48:1–
1906
+ 48:27, Dec. 2022. [Online]. Available: https://doi.org/10.1145/3514253
1907
+ [44] M. Dampfhoffer, T. Mesquida, A. Valentian, and L. Anghel, “Are SNNs
1908
+ really more energy-efficient than ANNs? an in-depth hardware-aware
1909
+ study,” pp. 1–11, conference Name: IEEE Transactions on Emerging
1910
+ Topics in Computational Intelligence.
1911
+
0NAzT4oBgHgl3EQf8f6B/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
29A0T4oBgHgl3EQfNP8E/content/tmp_files/2301.02142v1.pdf.txt ADDED
@@ -0,0 +1,1364 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ TRANSPORTATION SCIENCE
2
+ Vol. 00, No. 0, Xxxxx 0000, pp. 000–000
3
+ issn 0041-1655|eissn 1526-5447|00|0000|0001
4
+ INFORMS
5
+ doi 10.1287/xxxx.0000.0000
6
+ © 0000 INFORMS
7
+ Authors are encouraged to submit new papers to INFORMS journals by means of
8
+ a style file template, which includes the journal title. However, use of a template
9
+ does not certify that the paper has been accepted for publication in the named jour-
10
+ nal. INFORMS journal templates are for the exclusive purpose of submitting to an
11
+ INFORMS journal and should not be used to distribute the papers in print or online
12
+ or to submit the papers to another publication.
13
+ Playing hide and seek: tackling in-store picking
14
+ operations while improving customer experience
15
+ F´abio Neves-Moreira, Pedro Amorim
16
17
+ INESC TEC, Faculty of Engineering, University of Porto, Porto 4200–465, Portugal
18
+ The evolution of the retail business presents new challenges and raises pivotal questions on how to reinvent
19
+ stores and supply chains to meet the growing demand of the online channel. One of the recent measures
20
+ adopted by omnichannel retailers is to address the growth of online sales using in-store picking, which allows
21
+ serving online orders using existing assets. However, it comes with the downside of harming the offline
22
+ customer experience. To achieve picking policies adapted to the dynamic customer flows of a retail store, we
23
+ formalize a new problem called Dynamic In-store Picker Routing Problem (diPRP). In this relevant problem
24
+ – diPRP – a picker tries to pick online orders while minimizing customer encounters. We model the problem
25
+ as a Markov Decision Process (MDP) and solve it using a hybrid solution approach comprising mathematical
26
+ programming and reinforcement learning components. Computational experiments on synthetic instances
27
+ suggest that the algorithm converges to efficient policies. Furthermore, we apply our approach in the context
28
+ of a large European retailer to assess the results of the proposed policies regarding the number of orders picked
29
+ and customers encountered. Our work suggests that retailers should be able to scale the in-store picking
30
+ of online orders without jeopardizing the experience of offline customers. The policies learned using the
31
+ proposed solution approach reduced the number of customer encounters by more than 50% when compared
32
+ to policies solely focused on picking orders. Thus, to pursue omnichannel strategies that adequately trade-off
33
+ operational efficiency and customer experience, retailers cannot rely on actual simplistic picking strategies,
34
+ such as choosing the shortest possible route.
35
+ Key words :
36
+ omnichannel retail; in-store picking; Markov decision process; reinforcement learning;
37
+ real-world application
38
+ 1
39
+ arXiv:2301.02142v1 [cs.LG] 5 Jan 2023
40
+
41
+ Author: Article Short Title
42
+ 2
43
+ Transportation Science 00(0), pp. 000–000, © 0000 INFORMS
44
+ 1.
45
+ Introduction
46
+ The future of retail is very uncertain. This uncertainty is strongly connected to the pace at which
47
+ customer consumption patterns, channel shifts, and expectations around speed and convenience
48
+ are changing. The Covid-19 pandemic fuelled this unpredictable behavior, but these changes are
49
+ here to stay. At the moment, several pivotal questions posed by investors, entrepreneurs, business
50
+ professionals, and academics connected to retail remain unanswered (Caro et al. 2020).
51
+ One of the most critical challenges faced by large retailers is related to the future of physical
52
+ retail stores (Adhi et al. 2022). While some believe that physical retail may be “dead”, others
53
+ have many reasons to defend their existence as a way to differentiate from competition, offering
54
+ remarkable experiential shopping based on good customer service, exuberant stores, and online-to-
55
+ physical channels harmonization (Dennis 2018). Nowadays, many retailers recognize that focusing
56
+ on omnichannel retailing is the way to go as a means for enriching customer value proposition
57
+ and improving operational efficiency (Gao and Su 2017a). In particular, the physical channel still
58
+ remains important for a substantial part of grocery retail customers, who find it convenient to
59
+ place an order online and have their groceries picked up at a nearby retail location (Glaeser et al.
60
+ 2019, Vyt et al. 2022). However, many challenges emerge from this offline-online dichotomy. For
61
+ example, it is not clear how to provide the online level of information to offline customers (Gao
62
+ and Su 2017b), to which channel should the most stock be committed (Jia et al. 2021), and which
63
+ assortment decisions should be made in the offline and online channels (Chen et al. 2021).
64
+ What is clear is that physical retail stores offer tremendous value in terms of convenience and
65
+ speed, particularly in food retail (Barbee et al. 2021). For example, these assets support the recent
66
+ trend in omnichannel retailing to shift from e-commerce to quick commerce (Q-Commerce), where
67
+ the focus is on providing small quantities of goods ranging from groceries, stationeries to over-
68
+ the-counter medicines in short delivery times of 10 to 30 minutes. This type of service, sometimes
69
+
70
+ Author: Article Short Title
71
+ Transportation Science 00(0), pp. 000–000, © 0000 INFORMS
72
+ 3
73
+ called on-demand delivery, requires faster fulfillment strategies that require a shift from traditional
74
+ warehouses located on the outskirts to micro-warehouses or physical retail stores located near the
75
+ delivery locations. This means that the number of in-house and third-party pickers inside retail
76
+ stores should increase considerably in the upcoming times, so that retailers can face the growth
77
+ in the number of online and pick-in-store orders that need to be delivered in short delivery times.
78
+ These omnichannel fulfillment strategies should be further propelled when fully digitized stores are
79
+ deployed, allowing retailers to profit from recent technologies, such as Internet of Things (IoT),
80
+ advanced robotics, and digital twins (Olsen and Tomlin 2020).
81
+ Motivated by the real case of a European retailer, this paper will focus on the satisfaction of
82
+ online orders that have to be picked by in-store pickers. These orders are posted on the website
83
+ of the retailer and can be delivered at home or picked in-store by the customer. This context is a
84
+ very challenging one, and aiding pickers during their picking routes is becoming more and more
85
+ important due to four main reasons. First, the online business is drastically increasing in recent
86
+ times, as customers have been almost forced to experiment online shopping (Richter 2021). Second,
87
+ most physical stores do not have sufficient backroom space to settle a warehouse optimized for
88
+ picking all products that can appear in online orders (Pires et al. 2021). Third, since more and
89
+ more third-party pickers (i.e., Uber, Glovo, and Delivery Hero) are now shopping in the stores due
90
+ to the recent interest in Q-Commerce (Nierynck 2020), it is important to provide a service that
91
+ can aid them to navigate through retail stores when they are not properly aware of the locations of
92
+ every product. Fourth, and more importantly, with the referred influx of internal and third-party
93
+ pickers, the in-store customer experience is at risk, conflicting with online-offline strategies followed
94
+ by grocery retailers.
95
+ In this paper, to achieve picking policies that can be adapted to the dynamic customer flows of a
96
+ retail store and help to mitigate the aforementioned challenges, we introduce a new problem called
97
+ Dynamic In-store Picker Routing Problem (diPRP). This dynamic problem considers a dynamic
98
+ retail store environment and consists in making decisions so that a picker maximizes the number of
99
+
100
+ Author: Article Short Title
101
+ 4
102
+ Transportation Science 00(0), pp. 000–000, © 0000 INFORMS
103
+ orders picked while minimizing the number of customer encounters. Note that modeling uncertain
104
+ customer flows inside a store is a core element of this challenge. Traditional methods for aiding
105
+ pickers based on stochastic mathematical programming are likely to result in intractable Mixed
106
+ Integer Programming (MIP) models and are not suited to capture the dynamics of a sequential
107
+ decision problem. Therefore, the diPRP is modeled as a Markov Decision Process (MDP) and
108
+ solved through a well-known reinforcement learning technique. The picking policies are obtained
109
+ employing a hybrid Q-learning algorithm that maximizes immediate and future rewards (i.e., a
110
+ positive reward is received when a product is picked and a negative reward one is received when
111
+ a customer is encountered) by providing the best actions (i.e., picker movements) to be performed
112
+ by the picker. The objective is to pick the largest number of orders (operational efficiency) while
113
+ avoiding customer encounters (shopping experience).
114
+ We provide evidence on how one can profit from real-world data and orchestrate mathematical
115
+ programming, simulation, and machine learning techniques to solve a relevant practical problem
116
+ in omnichannel retail - the diPRP. The scientific contributions of this work are threefold:
117
+ 1. We formalize a new and relevant problem in retail where a picker picks online and pick-in-store
118
+ orders inside a retail store, while avoiding physical customer encounters - the diPRP.
119
+ 2. We solve the dynamic problem using a hybrid Q-learning algorithm, which includes MIP and
120
+ MDP components to determine a picking policy that is adapted to the dynamic environment
121
+ of an in-store picking operation.
122
+ 3. We provide computational experiments on the algorithm convergence using synthetic instances
123
+ and derive managerial insights on four different picking policies that were validated on a real-
124
+ world application partnered with a large European retailer. These insights aim at helping
125
+ retailers to make better decisions related to their omnichannel strategies. Namely, proving a
126
+ solid ground to scale new fulfillment options.
127
+ The remainder of this paper is organized as follows. Section 2 reviews the relevant literature related
128
+ to in-store picker routing problems. In Section 3 we describe the problem and present the inherent
129
+
130
+ Author: Article Short Title
131
+ Transportation Science 00(0), pp. 000–000, © 0000 INFORMS
132
+ 5
133
+ retail store simulation environment to be used in our study. Section 4 details the proposed solution
134
+ approach based on a Q-learning algorithm. Section 5 presents the computational experiments
135
+ performed on synthetic instances, which showcases the algorithm convergence. Section 6 exposes
136
+ a real-world application in a European retail store. Finally, in Section 7, we present the main
137
+ conclusions of this work and suggest future research directions.
138
+ 2.
139
+ Literature Review
140
+ In the following subsections, we review recent approaches dealing with picker routing problems
141
+ (Section 2.1), dynamic routing problems Section 2.2, and dynamic picker routing problems Section
142
+ 2.3. We consider that these topics cover the modeling and solution approach techniques needed to
143
+ tackle our problem - diPRP -, which consists of picking products in a dynamic store environment,
144
+ a new type of picking operation.
145
+ 2.1.
146
+ Picker routing problems
147
+ The picker or order routing problem was introduced by Ratliff and Rosenthal (1983) and is typi-
148
+ cally modeled as a Traveling Salesman Problem (TSP) on a Steiner graph (Letchford et al. 2013,
149
+ Cambazard and Catusse 2018, Rodr´ıguez-Pereira et al. 2019). Several problem extensions have
150
+ been proposed in the literature to adapt the standard model to real-world cases with specific busi-
151
+ ness constraints (Chabot et al. 2017, Quader and Castillo-Villar 2018, Ardjmand et al. 2018) and
152
+ to combine subsequent problems, such as storage and batching (van Gils et al. 2018). In terms of
153
+ solution methods, this problem is usually tackled with heuristics (Theys et al. 2010), but important
154
+ problem properties were discovered to increase the efficiency of exact methods based on mathemati-
155
+ cal formulations (Cornu´ejols et al. 1985, Pansart et al. 2018). Recently, new formulations have been
156
+ proposed to increase the size of the instances solved exactly (Scholz et al. 2016) and to integrate the
157
+ order picking problem with other activities in the supply chain (Roodbergen et al. 2015), as this
158
+ remains to be a relevant problem in warehouse operations management. Picker routing problems
159
+ are typically solved within narrow aisle warehouses (Roodbergen and de Koster 2001, Roodbergen
160
+ and Koster 2001, de Koster et al. 2007, Chabot et al. 2018, Masae et al. 2020) and not inside
161
+
162
+ Author: Article Short Title
163
+ 6
164
+ Transportation Science 00(0), pp. 000–000, © 0000 INFORMS
165
+ stores. Considering layouts that are not optimized for picking operations and can be crowded with
166
+ customers lead to a new context that has never been studied in the order picking literature. In a
167
+ store, product layouts may be very irregular and most graph properties assumed in order picking
168
+ literature are not applicable. Furthermore, customer shopping paths can be very chaotic and are
169
+ not known apriori, meaning that picking problems are more stochastic and dynamic.
170
+ 2.2.
171
+ Dynamic routing problems
172
+ Although stochastic dynamic routing has a 30-year history, the majority of the papers published
173
+ in this field are recent. More than half of the papers in the literature review of Ulmer et al. (2020)
174
+ have been published after 2010. Other literature reviews on this topic have been published by
175
+ Berbeglia et al. (2010), Pillac et al. (2013), Ritzinger et al. (2016), Psaraftis et al. (2016), and Ojeda
176
+ Rios et al. (2021). It is worth mentioning that multiple trends (e.g., e-commerce growth, sharing
177
+ economies, and sustainability) and technological advances (e.g., digital connectivity, big data, and
178
+ automation) are fostering the development of new approaches to tackle dynamic routing problems
179
+ (Savelsbergh and Van Woensel 2016). To solve these problems, the unified framework for stochastic
180
+ programming proposed by Powell (2019) has been determinant, as researchers have been adapting
181
+ it to tackle dynamic problems modeled as MDPs. To turn dynamic programming applicable to
182
+ large real-world problems, the approximate dynamic programming approaches presented in Powell
183
+ (2007) have also been a preponderant reference in this field.
184
+ More recently, several attempts have also been tried to solve routing problems modeled as MDPs
185
+ through Reinforcement Learning techniques (Nazari et al. (2018), Li et al. (2021), Kullman et al.
186
+ (2022)). However, despite their potential to be used in new contexts, these methods are still seen
187
+ as unexplored by the routing community, as suggested by Hildebrandt et al. (2021).
188
+ 2.3.
189
+ Dynamic picker routing problem
190
+ In some business contexts, it is interesting to consider a dynamic variant of the picker routing
191
+ problem. These problems arise when new information allows for better planning or execution of the
192
+ picking operations (i.e. a new order arrived). With respect to dynamic picker routing problems, the
193
+
194
+ Author: Article Short Title
195
+ Transportation Science 00(0), pp. 000–000, © 0000 INFORMS
196
+ 7
197
+ literature is very scarce. Gong and Koster (2008) consider picking operations where picking infor-
198
+ mation can dynamically change in a picking cycle. Based on a stochastic polling theory approach,
199
+ the authors suggest that shorter order throughput times and higher on-time service completion
200
+ ratios can be achieved. Lu et al. (2016) consider dynamic order-picking strategies that allow for
201
+ changes in the picking lists during a picking route. The authors allow for the re-optimization of
202
+ the optimal route during the picking operation and achieve better solution quality when compared
203
+ to the static version of the problem.
204
+ Note that these authors consider that dynamic information arriving is only related to customer
205
+ arrivals. However, in a store, there can be two types of entities performing picking, the offline
206
+ customers and the online order pickers. Pickers can gather information on the location of the
207
+ customers as they perform their picking paths. This maps into a new dynamic picking routing
208
+ problem. However, the interactions between in-store pickers and in-store customers have not been
209
+ considered yet, that is, no approach has been proposed for solving the dynamic in-store picker
210
+ routing problem.
211
+ Despite the considerable number of articles dealing with picker routing problems, no publication
212
+ has considered the new environment that is faced by in-store picking teams. Indeed, the pandemic
213
+ context of 2020 brought new operations to be managed and new challenges to be tackled while
214
+ pursuing different objectives. For instance, constraints imposed on the number of customers inside
215
+ of a store may turn retailers interested in guiding customers through their shopping paths to
216
+ accelerate customers’ shopping process, as opposed to making them stay for longer inside the store
217
+ (Hui et al. 2013, Boros et al. 2015, Hirpara and Parikh 2021). Each customer in-store is also solving
218
+ its picker routing problem to define its shopping path. The fact that customers do not know the
219
+ exact position of the products and that some customers may have picking sequence preferences
220
+ (Larson et al. 2005) can induce chaotic flows of customers through the aisles of a store (Chen
221
+ et al. 2015, Li et al. 2017). This means that the state of the store is not known apriori when the
222
+ picking route of each picker is being defined, it is stochastic. Therefore, in case we are interested in
223
+
224
+ Author: Article Short Title
225
+ 8
226
+ Transportation Science 00(0), pp. 000–000, © 0000 INFORMS
227
+ considering picking paths that do not disturb customers’ shopping experience, the picker routing
228
+ problem proposed approaches fall short on tackling this issue. This is a gap that we address in this
229
+ work.
230
+ 3.
231
+ Problem description
232
+ In this section, we formalize the diPRP by describing all the relevant elements included in the
233
+ considered retail store environment, the picker agents that will make decisions inside the store, and
234
+ the MDP that is proposed to model the associated dynamic problem. Hence, Section 3.1 details the
235
+ retail store environment, including the store graph, the models for simulating the shopping paths
236
+ of physical customers, and the online order arrivals composed of a set of picking positions. Section
237
+ 3.2 clarifies the behavior of a picker considering the information that is available in each step (e.g.,
238
+ next product to be picked and physical customers nearby). Section 3.3 describes the MDP that
239
+ models the dynamic problem we aim to solve, including decision epochs, states, actions, transition
240
+ function, rewards, and objective function.
241
+ 3.1.
242
+ Retail Store Environment
243
+ To model a realistic retail store environment, we resort to a simulation environment considering
244
+ physical customer arrivals and online order arrivals. The store is modeled as a sparse graph G =
245
+ (V,E) where the set of vertices (locations in-store) is partitioned into vertex 0, which is the entrance
246
+ of the store where the shopping paths start, vertices {1,...,v}, corresponding to v positions inside
247
+ the store, and vertex v + 1, which is the position where the shopping paths end (i.e., a cashier or
248
+ an order preparation zone). Physical customers arrive at the store following a Poisson distribution
249
+ with a mean value of λStore customers per time period. Each physical customer c ∈ C moves through
250
+ the aisles of the store navigating through the graph G at a speed speedCustomer and according to
251
+ a given shopping path θc containing a sequence of locations in-store. A physical customer takes
252
+ service timeCustomer time periods to pick a product located at a certain node. The maximum
253
+ number of customers inside the store can never surpass the capacity of the store |C| and the
254
+
255
+ Author: Article Short Title
256
+ Transportation Science 00(0), pp. 000–000, © 0000 INFORMS
257
+ 9
258
+ maximum number of customers in the same store node is m. The arrival rate of online orders is
259
+ also a random variable, which follows a Poisson distribution with a mean value of λOnline orders
260
+ per time period. Each online order o ∈ O is composed of a set of picking positions Lo ⊂ V that need
261
+ to be visited to pick the ordered products.
262
+ 3.2.
263
+ Picker agents
264
+ Whenever an online order o arrives it needs to be allocated to an idle picker. At that moment,
265
+ a picking sequence θo is defined according to a business decision rule (e.g., shortest route, heavy
266
+ items first, and frozen products at the end). In this work, we start by assuming that these pick-
267
+ ing sequences are minimizing the traveled distance, i.e., shortest route, - maximizing operational
268
+ efficiency, which is the common case in practice. The picker follows a given picking sequence, yet
269
+ he is interested in avoiding customer encounters not to disturb their shopping experience. There-
270
+ fore, between every pair of products to be picked, the picker solves a shortest path problem, while
271
+ avoiding customers currently in the store. The dynamic component of this problem corresponds to
272
+ solving a series of dynamic shortest path problems. The fundamental trade-off that is inherent to
273
+ this problem comes from the fact that the picker follows a predefined sequence of picking positions
274
+ that is provided by a decision rule adopted by the retail store (e.g., shortest routes), but he/she
275
+ needs to avoid customer encounters in the path between two picking positions. The position of the
276
+ customers in-store is not known in advance and it is only revealed when the picker looks through
277
+ the aisle. Throughout the day, each picker receives several online orders, and thus, several picking
278
+ sequences to execute.
279
+ 3.3.
280
+ Dynamic picker routing problem as a Markov decision process
281
+ To formulate the diPRP as finite horizon MDP with T time periods, consider a decision epoch
282
+ k ∈ 0,1,..,T at which a decision for the next position node to visit inside the store should be made.
283
+ A new decision epoch k is triggered whenever the picker arrives at a new position. Each decision
284
+ epoch k is associated with a decision state sk. At the initial state s0 and initial decision epoch
285
+ k = 0, the picker is located at the starting depot node 0. At the terminal decision epoch k = T,
286
+
287
+ Author: Article Short Title
288
+ 10
289
+ Transportation Science 00(0), pp. 000–000, © 0000 INFORMS
290
+ the picker returns to the finishing depot node v + 1 after picking the order that is currently being
291
+ picked. At a state sk, the system receives updated information on the number of customers at the
292
+ same position of the picker and adjacent positions (connected by an arc). Based on the system
293
+ information about current online orders, an action ak (i.e., the next position to visit in targeting a
294
+ product or the depot) needs to be decided. Each position that is visited increases the total travel
295
+ time and, potentially, the number of customer encounters. The goal of the picker is to find optimal
296
+ paths, short and quick to traverse while minimizing the number of customer encounters. The picker
297
+ is positively rewarded for each product picked. Overall, the problem faced by the in-store picker
298
+ can be modeled as a MDP composed of four components, namely, (1) a set of states S; (2) a set
299
+ of actions A; (3) a reward function R; and the transition probabilities P.
300
+ 3.3.1.
301
+ Decision epochs A decision epoch k begins when a picker arrives at a new location
302
+ in-store.
303
+ 3.3.2.
304
+ States The state of the system at decision epoch k is defined by the tuple sk =
305
+ (nk,zk,tk), where nk ∈ V is the picker’s current location, zk = (zk(1),zk(2),...,zk(|Lo|)) is a vector
306
+ containing the status of each picking location of an online order o at decision epoch k, and tk ∈ [0,T]
307
+ is the arrival time at location nk. For each picking location of an online order, zk(.) takes on a
308
+ value in the set {0,1}:
309
+ zk(.) =
310
+
311
+
312
+
313
+
314
+
315
+
316
+
317
+
318
+
319
+ 0,
320
+ if picking location has not been visited by time tk
321
+ 1,
322
+ if picking location has been visited by time tk
323
+ (1)
324
+ In the initial state s0 = (0,z0,0), the picker is located at the order preparation zone and z0(n) is
325
+ 0 or 1 for each picking location n ∈ V \ {0}. The final decision epoch is attained when the picker
326
+ reaches the terminal state sK in the set {(0,zk,tk) : tk ∈ [0,T],zk ∈ {0,1}|Lo|}, where the picker has
327
+ returned to the preparation zone by time T and the status of the picking locations of the online
328
+ order being served is 0 or 1. The state space is the set S = V × [0,T] × {0,1}|Lo|.
329
+
330
+ Author: Article Short Title
331
+ Transportation Science 00(0), pp. 000–000, © 0000 INFORMS
332
+ 11
333
+ 3.3.3.
334
+ Actions An action at decision epoch k is an assignment of the picker to an in-store
335
+ location belonging to V. When the picker is at state sk, the set of feasible actions, corresponding
336
+ to the possible arcs leaving nk is given by
337
+ A(sk) = {ak ∈ {n ∈ V : (sk,n) ∈ E}} :
338
+ (2)
339
+ 3.3.4.
340
+ Transition Following the selection of action ak from state sk, the process transitions
341
+ to a new state sk+1 in decision epoch k +1. There is no uncertainty regarding the position in which
342
+ the picker will be in the next decision epoch. However, the unknown information regarding the
343
+ number of customers encounter is revealed. This information is a realization of Ωk+1 and is given
344
+ by ωk+1. Let �Rk+1(sk,ak,ωk+1) be the random negative reward accrued at decision epoch k when
345
+ selecting action ak from state sk and observing random information ωk+1.
346
+ 3.3.5.
347
+ Rewards When the picker occupies state sk and performs an action ak ∈ A, a reward
348
+ is accrued depending on the conditions of the in-store location to which the picker moves. The
349
+ reward is composed of four components, (1) fixed negative reward for each picker step, (2) number
350
+ of in-store customers in the same location of the picker, (3) number of in-store customers in the
351
+ locations reachable from the picker location, and (4) a positive reward for a picked product. The
352
+ number of steps given from the last decision epoch is given by φ1, the number of customers in
353
+ the same location is given by φ2, the number of customers nearby is given by φ3, and the number
354
+ products picked is given by φ4. These four components can be adjusted using weights w1 to w4,
355
+ respectively. The reward Rk(sk,ak,ωk+1), which is a stochastic variable depending on the store
356
+ environment, is defined as
357
+ Rk(sk,ak,ωk+1) = −w1 φ1(ωk+1) − w2 φ2(ωk+1) − w3 φ3(ωk+1) + w4 φ4(ωk+1)
358
+ (3)
359
+ 3.3.6.
360
+ Objective The objective is to maximize the expected sum of rewards across decision
361
+ epochs, that is, if weights are properly set, trying to pick as much orders as possible while mini-
362
+ mizing in-store customer encounters. Let π be a sequence of actions a0,a1,...,aT for every decision
363
+
364
+ Author: Article Short Title
365
+ 12
366
+ Transportation Science 00(0), pp. 000–000, © 0000 INFORMS
367
+ epoch k = 0,...,T. The aim is to find an optimal policy π to maximize the total expected reward.
368
+ The objective function, conditional on initial state s0, is the following
369
+ min
370
+ π E
371
+
372
+ T
373
+
374
+ k=0
375
+ Rk|s0
376
+
377
+ (4)
378
+ 4.
379
+ Solution approach
380
+ The diPRP defined in Section 3 demands solution techniques with different scopes and purposes:
381
+ (1) whenever an online order arrives, a Shopping Routing Problem (SRP) model, an MIP, needs
382
+ to be solved to obtain a picking sequence according to predefined decision rules; and (2) for each
383
+ picking sequence and for every pair of products on that sequence, a sequential decision problem is
384
+ solved and recursively updates the policy via a Q-learning algorithm. Figure 1 presents an overview
385
+ of the devised approach, showing where each technique is needed and how the picker agent interacts
386
+ with the store environment.
387
+ In Section 4.1, we describe the problem, the mathematical formulation and the solution approach
388
+ that are used to obtain the picking sequences to feed the picker agent related procedures. In Section
389
+ 4.2, we describe the proposed Q-learning approach to learn an optimal policy for efficiently picking
390
+ orders while avoiding in-store customer encounters. Section 4.3 provides an example of picking
391
+ paths obtained with different policies and an example of what a policy obtained with Q-Learning
392
+ looks like.
393
+ 4.1.
394
+ SRP definition
395
+ To introduce the standard SRP, consider the retail store environment described in Section 3.1.
396
+ Each edge (i,j) ∈ E is a pair of positions associated with a sequence of grid steps corresponding to
397
+ the shortest path between picking position i and j. Edges are weighted by a factor wij, typically
398
+ representing the distance or the duration of the arc. Again, let Lo ⊂ V be a subset of vertices
399
+ corresponding to the picking positions that have to be visited to pick a given shopping list o. The
400
+ main objective of the picker is to pick all the products in the shopping list while minimizing the
401
+ distance (or duration) of its shopping path.
402
+
403
+ Author: Article Short Title
404
+ Transportation Science 00(0), pp. 000–000, © 0000 INFORMS
405
+ 13
406
+ Picker Agent
407
+ SRP
408
+ Solver
409
+ Q-Learning
410
+ Algorithm
411
+ Store
412
+ Environment
413
+ New
414
+ online
415
+ order?
416
+ Observation
417
+ Action
418
+ Reward
419
+ Routing
420
+ Policy
421
+ Update
422
+ Policy
423
+ Yes
424
+ No
425
+ Figure 1
426
+ Approach overview including a detailed breakdown of the picker agent.
427
+ 4.1.1.
428
+ SRP Mathematical formulation To model the SRP we use binary decision variables
429
+ xij for defining routing decisions. Let xij be the binary variables indicating whether an edge (i,j)
430
+ is traversed. The proposed formulation reads as follows:
431
+ SRP:
432
+ minimize
433
+
434
+ (i,j)∈E
435
+ wij xij
436
+ (5)
437
+ s.t.
438
+
439
+ i∈V
440
+ xji = 1
441
+ ∀j ∈ Lo ∪ {0}
442
+ (6)
443
+
444
+ i∈V
445
+ xij = 1
446
+ ∀j ∈ Lo ∪ {v + 1}
447
+ (7)
448
+
449
+ i∈O
450
+
451
+ j∈O
452
+ xij ≤ |O| − 1
453
+ ∀O ⊂ V,i ̸= j
454
+ (8)
455
+ x ∈ {0,1}.
456
+ (9)
457
+ Objective function (5) minimizes the total distance (or duration) of the shopping path. The flow
458
+ conservation at the starting position, product picking positions, and finishing position are ensured
459
+ by constraints (6) and (7). Constraints (8) are added to eliminate sub-tours. Finally, constraints
460
+ (9) define the type and bounds of each variable.
461
+
462
+ Author: Article Short Title
463
+ 14
464
+ Transportation Science 00(0), pp. 000–000, © 0000 INFORMS
465
+ 4.1.2.
466
+ SRP Solution approach In the context of diPRPs, each SRP needs to be solved
467
+ in fractions of a second. Furthermore, in a simulation procedure (later used for optimizing the
468
+ picking policies), we need to solve hundreds if not thousands of SRP instances. Relying solely on a
469
+ mathematical solver is not sufficient when the picking lists comprise a considerably large number
470
+ of products. For that reason, we tackle this problem with an efficient exact solution approach that
471
+ can quickly solve the mathematical formulation presented in the previous section. We employ a
472
+ cutting planes algorithm where cuts are added to remove fractional solutions from the admissible
473
+ region of the linear relaxation (Algorithm 1).
474
+ Algorithm 1 Cutting Planes
475
+ 1: procedure CuttingPlanes(V, Lo)
476
+ 2:
477
+ CutsAdded ← True;X ← ∅;Y ← ∅;Z ← 0;
478
+ 3:
479
+ while CutsAdded do
480
+ 4:
481
+ X ← Solve assignment model (5)-(7) considering sets V and Lo;
482
+ 5:
483
+ Y ← Separate arcs in sets of connected components;
484
+ 6:
485
+ Z ← Count the number of connected component sets in Y;
486
+ 7:
487
+ if Z = 1 then
488
+ 8:
489
+ CutsAdded ← False;
490
+ 9:
491
+ else
492
+ 10:
493
+ Add cuts (8) to eliminate sub-tours;
494
+ 11:
495
+ CutsAdded ← True;
496
+ 12:
497
+ if CutsAdded then
498
+ 13:
499
+ X ← Convert positive variables to integer;
500
+ 14:
501
+ else
502
+ 15:
503
+ if All edges in the solution are integer then
504
+ 16:
505
+ θo ← The picking sequence is obtained from the model solution X;
506
+ 17:
507
+ return θo.
508
+ The algorithm starts by solving a relaxed assignment model (Algorithm 1, line 4) and separating
509
+ connected component sets (Algorithm 1, line 5). If there are more than one connected component
510
+
511
+ Author: Article Short Title
512
+ Transportation Science 00(0), pp. 000–000, © 0000 INFORMS
513
+ 15
514
+ set, the solution has sub-tours (Algorithm 1, line 10) and cuts are added to eliminate these sub-
515
+ tours (Algorithm 1, line 11). When cuts are added, the edge variables with a positive value are
516
+ converted to an integer. This process is repeated until no cuts are added after solving the relaxed
517
+ assignment model and all the edge variables are integer, meaning that the optimal solution is found
518
+ (Algorithm 1, line 17).
519
+ 4.2.
520
+ Q-Learning
521
+ The cutting plane approach presented in Section 4.1.2 provides a sequence θo for picking the list of
522
+ products of online order o. However, an in-store picker has multiple options to go from one picking
523
+ position to another. In the SRP formulation we assume shortest paths, that is, the steps to perform
524
+ when traversing an arc (i,j) are the ones leading to the shortest distance between i and j (again,
525
+ note that other decision rules can be used). Therefore, in order not to disturb in-store customers,
526
+ it may be beneficial to perform different steps or detours while traveling from i to j, depending on
527
+ the unknown patterns related to the movement of the customers in-store.
528
+ To obtain a routing policy that follows a given picking sequence but tries to avoid customers, we
529
+ devise a Q-Learning (Watkins 1989) approach to solve the MDP previously presented in Section
530
+ 3.3. This technique belongs to reinforcement learning, which is a branch of approximate dynamic
531
+ programming. In simple terms, it is a value-based method which searches for action-value functions
532
+ Q(sk,a) representing the future expected reward of taking action a from state sk.
533
+ Let us denote Vπ(sk) as the value function that gives the total expected reward if we start from
534
+ a state sk and follow policy π. This value includes the immediate reward received at decision epoch
535
+ k+1 and the expected rewards to obtain in the future until the final decision epoch T. Our objective
536
+ is to find the action array that maximizes the total reward obtained through the entire process.
537
+ Considering the Bellman Equation (Powell 2007), V ∗(sk) =
538
+ max
539
+ ak∈A(ak){Rk+1 + E[V (sk+1)|sk,a]}, an
540
+ optimal action ak is implemented by solving the following expression,
541
+ ak = arg max
542
+ ak∈A(sk)
543
+ {Rk+1 + E[V (sk+1)|sk,a]}
544
+ (10)
545
+
546
+ Author: Article Short Title
547
+ 16
548
+ Transportation Science 00(0), pp. 000–000, © 0000 INFORMS
549
+ In the problem we are considering, agents do not control the characteristics of the state they will
550
+ end up in due to the uncertain customer shopping paths. Therefore, they only have limited influence
551
+ in the next state that they will visit, depending on their current state sk and a performed action
552
+ ak. Let Qπ(sk,ak) be a function (Q-function) representing the quality of action ak when the agent
553
+ is at a given state sk and follows policy π. We can define the optimal Q-function as Q∗(sk,ak). The
554
+ relation between V ∗(sk) and Q∗(sk,ak) is given by the following expression,
555
+ V ∗(sk) = max
556
+ a∈A(sk)Q∗(sk,a)
557
+ (11)
558
+ Therefore, an optimal policy π∗ for the problem we aim to solve can be derived through the
559
+ following expression,
560
+ π∗(sk) = arg max
561
+ a∈A(sk)
562
+ Q∗(sk,a)
563
+ (12)
564
+ If we can identify Q∗, we have an optimal policy to control the actions of the picker agent in the
565
+ store environment in which he was trained. This policy can be determined using the referred Q-
566
+ Learning approach, using the Bellman equation to approximate Q∗. The Bellman equation based
567
+ on a Q-function can be expressed recursively by
568
+ Q(s,a) = R + γ max
569
+ a′ Q(s′,a′)
570
+ (13)
571
+ The Q-learning equation to iteratively approximate Q∗ is given by
572
+ Qnew(s,a) = Q(s,a) + α
573
+
574
+ R + γ max
575
+ a
576
+ Q(s′,a) − Q(s,a)
577
+
578
+ (14)
579
+ Where the learning rate α adjusts how different previous and new Q values are from each other.
580
+ As the agent explores more and more the environment, the approximated Qnew values will converge
581
+ to Q∗. To extract an optimal picking policy for a store environment, we propose Algorithm 2.
582
+ The algorithm starts by initializing the Q-function with random optimistic values (Algorithm 2,
583
+ line 2). These optimistic values promote the exploration of new states. Then, a cyclic procedure
584
+ is repeated for a certain number of episodes (Algorithm 2, line 3). First, the store environment
585
+ initializes at the initial state s0 (Algorithm 2, line 4) and, while it does not reach the final state
586
+
587
+ Author: Article Short Title
588
+ Transportation Science 00(0), pp. 000–000, © 0000 INFORMS
589
+ 17
590
+ Algorithm 2 Q-Learning procedure
591
+ 1: procedure QLearning(MDP, α, γ, ϵ)
592
+ 2:
593
+ Initialize Q(s,a) using random optimistic values;
594
+ 3:
595
+ for each episode do
596
+ 4:
597
+ Initialize the environment with the initial state s0 (picker at the depot);
598
+ 5:
599
+ while sk is not the final state (the store is not closed) do
600
+ 6:
601
+ Choose an action ak available from the current state sk following an ϵ-greedy strategy;
602
+ 7:
603
+ Execute action ak, receive a reward Rk, and observe a new state sk+1;
604
+ 8:
605
+ Update Q-function by doing Q(sk,ak) ← Q(sk,ak) + α
606
+
607
+ Rk + γ arg max
608
+ a
609
+ Q(sk+1,a) − Q(sk,ak)
610
+
611
+ 9:
612
+ if Q converges then
613
+ 10:
614
+ Break;
615
+ 11:
616
+ return Q
617
+ sT (Algorithm 2, line 5), it chooses an action, executes it, and updates the Q-function (Algorithm
618
+ 2, lines 6 to 8). The choice of the action is performed using an ϵ-greedy, meaning that a random
619
+ action is chosen with probability ϵ, and the action with the best Q value is chosen with probability
620
+ 1 − ϵ. After finishing an episode, the algorithm verifies if the Q-function converged (i.e., check if
621
+ the maximum difference between old and new q-values is lower than a convergence threshold). If
622
+ it did converge, the algorithm returns the Q-function, otherwise, it continues to the next episode.
623
+ 4.3.
624
+ Illustrative example
625
+ The solution approach developed in this work converges to optimal policies that are substantially
626
+ different from a shortest path-based policy, depending on the reward shape assumed. Figure 2
627
+ illustrates a comparison between two paths with similar origin and destination locations. In this
628
+ figure, the size of the nodes measures the average number of customers that have been present at
629
+ each location. We observe that the central aisle and the product positions in the top middle aisles
630
+ were more crowded during the simulated episode. The SP policy (shortest path-based), in red,
631
+ results in a shorter distance but it encounters more customers. On the other hand, the QL policy
632
+ (Q-Learning-based), in blue, results in a large detour that, on average, encounters fewer customers.
633
+
634
+ Author: Article Short Title
635
+ 18
636
+ Transportation Science 00(0), pp. 000–000, © 0000 INFORMS
637
+ Figure 2
638
+ Illustrative example of a SP (red) and a QL path (blue).
639
+ The blue path is obtained by simply following a policy extracted from the Q values. Figure 3
640
+ presents an example of three steps performed using a Q-table (lookup table).
641
+ States
642
+ https://www.baeldung.com/cs/epsilon-greedy-q-learning
643
+ Available Actions
644
+ S1
645
+ (85, 123)
646
+
647
+
648
+ A1
649
+ A2
650
+ A3
651
+ S2
652
+ (77, 123)
653
+ S3
654
+ (62, 123)
655
+ Q((85, 123), 77)
656
+ Q((85, 123), 93)
657
+ -
658
+
659
+ Q((77, 123), 62)
660
+ Q((77, 123), 85)
661
+ Q((62, 123), 54)
662
+ Q((62, 123), 63)
663
+ -
664
+
665
+ Q((62, 123), 77)
666
+
667
+
668
+
669
+
670
+ 1st step
671
+ 2nd step
672
+ 3rd step
673
+ Figure 3
674
+ An example with three steps obtained from the Q-table that was used to obtain the Q-learning path
675
+ in the illustrative example.
676
+ Each row represents a state that is a tuple containing the current position (node 85) and the
677
+ target position (node 123). Each column corresponds to a possible action considering the current
678
+ positions of the picker. For instance, in the first step, the picker could walk to node 77 or node 93.
679
+ Since the Q value of node 77 is larger, the picker moves to position 77.
680
+ 5.
681
+ Algorithm convergence
682
+ In this section, we present the computational experiments to explore the efficacy and efficiency of
683
+ the proposed approach on synthetic instances. Firstly, we describe the process that was used to
684
+ generate the synthetic instance set. Secondly, we perform a search on the training parameters to find
685
+
686
+ Author: Article Short Title
687
+ Transportation Science 00(0), pp. 000–000, © 0000 INFORMS
688
+ 19
689
+ good combinations of learning rate, discount rate, and ϵ-greediness and validate the convergence
690
+ of the proposed approach on different problem sizes.
691
+ 5.1.
692
+ Synthetic instances
693
+ To validate the proposed approach, synthetic instances were generated by considering different
694
+ simulation parameter combinations. We tested combinations of four store layouts with different
695
+ sizes and with three different customer concentrations inside the store. As such, store environments
696
+ can be tiny, small, medium, and large, and the products of customers’ shopping lists can be more
697
+ concentrated near the entrance, the middle, or the back of the store. The number of products in
698
+ customers’ shopping lists follows a uniform distribution with a minimum of 1 and maximum of 10
699
+ products. These products and their picking sequence are randomly chosen and customers follow
700
+ the shortest path when moving from one product position to another product position. The arrival
701
+ rate of physical customers is set to 2 and the arrival rate of online orders is set to 0.2. In each
702
+ episode, the store is open for 8 hours, and the maximum number of customers inside the store |C| is
703
+ set to 50. The maximum number of customers per node m is 5 and each customer takes 30 seconds
704
+ to pick a product. The walking speed is set to 1 m/s. Figure 1 summarizes the sets of parameters
705
+ that were used to build 12 synthetic instances. Regarding rewards and penalties in the synthetic
706
+ instances, when a picker is in the same node where a customer is, it is penalized by 3 points. If a
707
+ picker is seen by a customer (i.e., the customer is in the nodes accessible by the picker), the picker
708
+ is penalized by 1 point. Picker steps are penalized by 1 point and products picked are rewarded
709
+ with an amount of 100 points.
710
+ 5.2.
711
+ Q-learning training and results
712
+ Despite the potential of reinforcement learning approaches, tuning them is often a non-trivial and
713
+ time-consuming task. This is essentially because testing parameter combinations can be an expen-
714
+ sive and noisy process. To overcome these difficulties, we tested several parameter configurations
715
+ to determine policies for each synthetic instance. Each configuration was run for 5000 episodes
716
+ using a single thread. All computations were run on Intel Xeon @ 2.5 GHz processing units and the
717
+
718
+ Author: Article Short Title
719
+ 20
720
+ Transportation Science 00(0), pp. 000–000, © 0000 INFORMS
721
+ Table 1
722
+ Sets of parameters used to build the generated instances.
723
+ Store layout {Tiny,Small,Medium,Large}
724
+ Customer concentration {Entrance,Middle,Back}
725
+ Physical customer arrival rate {2}
726
+ Online order arrival rate {0.2}
727
+ Open time (h) {8}
728
+ Maximum number of customers inside {50}
729
+ Maximum number of customers in a location {5}
730
+ Product picking time (s) {30}
731
+ Walking speed (m/s) {1}
732
+ Customer encounter penalty (p1) {3}
733
+ Customer visible penalty (p2) {1}
734
+ Step penalty (p3) {1}
735
+ Picking reward (p4) {100}
736
+ Table 2
737
+ Sets of reinforcement learning parameters used to build training configurations.
738
+ Learning rate (α) {0.95,0.97,0.99}
739
+ Discount rate (γ) {0.50,0.70,0.90}
740
+ ϵ-greediness (ϵ) {0.01}
741
+ mathematical solver adopted to compute picking sequences of the pickers was Gurobi 9.5. Table 2
742
+ presents the parameter sets that were used to build each training configuration.
743
+ The cumulative rewards obtained for the training episodes are presented in Table 3. The first two
744
+ columns, “Layout” and “Paths”, indicate the layout of the store and the type of shopping paths
745
+ performed by the customers. The third column, “Best Parameters”, indicates the combination of
746
+ parameters (α|γ|ϵ) that obtained the values presented in the respective row. Columns four to six
747
+ present the minimum, average, and maximum cumulative rewards obtained across all the tested
748
+ parameter configurations. The last column presents the coefficient of variation over the last 50
749
+ observations.
750
+ We observe that for the larger store layouts the difference between the minimum and maximum
751
+ cumulative rewards obtained increases. As the problem size increases, the importance of choosing
752
+
753
+ Author: Article Short Title
754
+ Transportation Science 00(0), pp. 000–000, © 0000 INFORMS
755
+ 21
756
+ Table 3
757
+ Cumulative rewards obtained in the training procedure (5000 episodes).
758
+ Cumulative rewards
759
+ Layout
760
+ Paths
761
+ Best Parameters
762
+ (α|γ|ϵ)
763
+ Min.
764
+ Avg.
765
+ Max.
766
+ CV
767
+ (last 50 obs.)
768
+ tiny
769
+ far
770
+ 0.97|0.9|0.01
771
+ 28989.54
772
+ 29262.92 29440.60
773
+ 0.11
774
+ tiny
775
+ middle
776
+ 0.99|0.7|0.01
777
+ 27240.37
778
+ 28563.90 29262.10
779
+ 0.11
780
+ tiny
781
+ near
782
+ 0.95|0.9|0.01
783
+ 28325.40
784
+ 28810.05 29073.35
785
+ 0.10
786
+ small
787
+ far
788
+ 0.97|0.9|0.01
789
+ 23471.06
790
+ 26828.68 28569.88
791
+ 0.11
792
+ small
793
+ middle
794
+ 0.97|0.9|0.01
795
+ 8571.05
796
+ 21363.16 28362.71
797
+ 0.10
798
+ small
799
+ near
800
+ 0.97|0.9|0.01
801
+ 11729.02
802
+ 22830.18 28236.43
803
+ 0.10
804
+ medium far
805
+ 0.99|0.9|0.01
806
+ -249624.48
807
+ -74201.81 26741.11
808
+ 0.11
809
+ medium middle
810
+ 0.99|0.9|0.01
811
+ -280708.50 -136167.61 26352.44
812
+ 0.12
813
+ medium near
814
+ 0.97|0.9|0.01
815
+ -275092.86 -144711.93 25733.31
816
+ 0.08
817
+ large
818
+ far
819
+ 0.95|0.9|0.01
820
+ -282733.08 -172079.58 22584.38
821
+ 0.10
822
+ large
823
+ middle
824
+ 0.95|0.9|0.01
825
+ -286259.32 -152702.76 17371.42
826
+ 0.18
827
+ large
828
+ near
829
+ 0.97|0.9|0.01
830
+ -285686.24 -180264.63 21524.09
831
+ 0.13
832
+ a good combination of parameters also increases. As expected, the cumulative reward obtained in
833
+ larger stores is smaller, as the picker spends more time traveling through a larger number of nodes
834
+ particularly when he/she needs to return to the preparation zone. Moreover, we observe that for
835
+ the last 50 observations the coefficient of variation of the rewards is low for all instances sizes,
836
+ enforcing the idea that the algorithm converged in all of them. At this point, to better understand
837
+ the algorithm convergence, we present Figure 4.
838
+ Figure 4
839
+ Cumulative rewards obtained by the best parameter configurations used in synthetic instances (first
840
+ 500 episodes of the training session).
841
+
842
+ Author: Article Short Title
843
+ 22
844
+ Transportation Science 00(0), pp. 000–000, © 0000 INFORMS
845
+ The cumulative rewards suggest that the algorithms converge in a few episodes. As expected,
846
+ the size of the store considered in each instance is connected to the time it takes for the cumulative
847
+ rewards to converge. While in instances with a medium layout we observe the algorithm converging
848
+ after a few episodes, in instances with a large layout the cumulative rewards stabilize after more
849
+ than 200 episodes. Nonetheless, the proposed approach is successful in achieving picking policies
850
+ that do not demand substantial computational power.
851
+ 6.
852
+ Real-world application
853
+ This section details a real application in the context of a large European retailer. The devised
854
+ approach was applied using the layout of a real-world store considering real shopping paths collected
855
+ from customers using a mobile app that allows them to keep track of products they pick in-store
856
+ as they are shopping.
857
+ A very important aspect of the devised approach is that it does not require substantial compu-
858
+ tational power. The output of the Q-learning approach is a policy in the form of a Q-table (lookup
859
+ table) that can be used in simple mobile devices (i.e., phones and PDAs). Moreover, this can be
860
+ improved over time in an offline or in an online fashion, using new data collected from customer
861
+ and picker shopping paths to update Q-tables. It is even possible to compute Q-tables tailored for
862
+ different parts of the day or of the week, suited to the customer flows that are more likely to occur
863
+ during these periods.
864
+ 6.1.
865
+ Real-world instance
866
+ The first step to applying the devised approach to the considered real context was to represent the
867
+ retail store with substantial detail. This is a particularly challenging process due to the lack of data
868
+ regarding product positions, which occurs in practice. Large retailers are now digitizing physical
869
+ stores as the opportunities provided by the new data collected are remarkable. However, in the
870
+ retailer considered in this study, this process is still in its infancy. In the retail business, several
871
+ products are likely to be relocated daily for a multitude of reasons (i.e., promotional activities,
872
+ new products introduced in the assortment), which increases the difficulties of maintaining reliable
873
+
874
+ Author: Article Short Title
875
+ Transportation Science 00(0), pp. 000–000, © 0000 INFORMS
876
+ 23
877
+ information on product positions. Nonetheless, we mapped products to aisles, achieving a realistic
878
+ representation of the real store. Figure 5 presents the store layout and graph considered in the
879
+ real-world application.
880
+ Figure 5
881
+ Representation of the store layout and graph considered in the real-world application.
882
+ In this figure, the nodes represented in red are aisle intersections and the nodes represented in
883
+ blue are product positions. We opted for considering at most two product nodes inside each aisle
884
+ as it already provides a good indication of the position of each product. In the considered graph,
885
+ customers are allowed to enter the store by the node represented in green and, after traversing their
886
+ shopping path, they randomly choose one of the exit nodes represented in orange. The sequence of
887
+ products picked by the physical customers is based on real-world data collected using the mobile
888
+ app provided by the retailer. To compute the shortest path between each pair of products in the
889
+ customer shopping path we resorted to an implementation of a Dijkstra algorithm. The remaining
890
+ parameters were set according to discussions with the retail store managers. The arrival rate of
891
+ physical customers λStore is set to 10 and the arrival rate of online orders λOnline is set to 0.3. The
892
+ maximum number of customers allowed in the store is set to 300 and we did not set a maximum
893
+ number of customers per node in the real application. Each customer takes 30 seconds to pick a
894
+ product and walks at a speed of 1 m/s. The store is open for 8 hours. The picker agent is awarded
895
+ with 50 points for each product picked, it is penalized by 3 points for each customer encountered
896
+ in the same node, and it is penalized by 1 for each customer seen in adjacent nodes.
897
+
898
+ DMSAMOE
899
+ COULIUEULE
900
+ YBEDEAENDNJ003SSAuthor: Article Short Title
901
+ 24
902
+ Transportation Science 00(0), pp. 000–000, © 0000 INFORMS
903
+ (a) Shopping times histogram.
904
+ (b) Most crowded nodes.
905
+ 2,frozen
906
+ 3,dairy
907
+ 2,salty grocery store
908
+ 3,wine and spirits
909
+ 2,candy grocery store
910
+ 3,take away
911
+ 3,salty grocery store
912
+ 2,essentials
913
+ 3,house cleaning
914
+ 1,dairy
915
+ 2,house cleaning
916
+ 2,the bakery
917
+ 3,essentials
918
+ 1,beauty
919
+ 2,hygiene
920
+ 3,candy grocery store
921
+ 2,fruits and vegetables
922
+ 3,fruits and vegetables
923
+ 1,hygiene
924
+ 3,breakfast
925
+ 2,beauty
926
+ 2,dairy
927
+ 3,charcuterie
928
+ 2,butchery
929
+ 3,frozen
930
+ 2,breakfast
931
+ 2,culture
932
+ 3,juices, beers and water
933
+ 2,juices, beers and water
934
+ 3,the bakery
935
+ 2,charcuterie
936
+ 2,wine and spirits
937
+ 2,take away
938
+ 3,butchery
939
+ 3,hygiene
940
+ 3,pet food and care
941
+ 3,bio and healthy
942
+ 2,fishmonger
943
+ 3,beauty
944
+ 2,bio and healthy
945
+ 3,house - textiles and decoration
946
+ 3,fishmonger
947
+ 2,pet food and care
948
+ 3,soft drinks
949
+ (c) Categories visited by customers picking 3 products starting from hygiene, dairy, and beauty.
950
+ Figure 6
951
+ Real-world store simulation environment metrics.
952
+ To further describe the real-world store simulation environment that was used to train the
953
+ picker agents, we present Figure 6 containing the distribution of the customer shopping times,
954
+ a representation of the most crowded areas inside the store (average number of customers per
955
+ decision epoch), and examples of category paths performed by customers picking only 3 products
956
+ (for better visualization) and starting from the categories hygiene, beauty, and dairy.
957
+ We observe that most customers stay in-store for a period of 5 to 15 minutes. The most crowded
958
+ nodes are the ones on the left side of the image, mostly corresponding to food products, and at
959
+ the bottom of the image corresponding to the front aisle of the store near the cashiers. The order
960
+ preparation zone from which the pickers depart is located at the top right of the picture. This area
961
+ is usually less crowded as it includes work tools and various materials for DIY activities. We also
962
+ observe that customers follow very distinct shopping paths even if they share a few nodes/products
963
+ in their shopping lists.
964
+
965
+ BOMEWC
966
+ COULIUEULE
967
+ ACVEV 30 ARA
968
+ J003WS
969
+ S
970
+ NAuthor: Article Short Title
971
+ Transportation Science 00(0), pp. 000–000, © 0000 INFORMS
972
+ 25
973
+ 6.2.
974
+ Training in a real-world context
975
+ The training process that was used in the real-world case was similar to the one presented in Section
976
+ 5.2. First, we set up several training sessions considering different combinations of reinforcement
977
+ learning parameters, namely, learning rates α, discount rates γ, and exploration probabilities ϵ.
978
+ The reinforcement learning parameter sets that were used are presented in Figure 4.
979
+ Table 4
980
+ Sets of reinforcement learning parameters to build training configurations for the real-world instances.
981
+ Learning rate (α) {0.1,0.5,0.9,0.95,0.97,0.99}
982
+ Discount rate (γ) {0.1,0.5,0.9,0.95,0.97,0.99}
983
+ ϵ-greediness (ϵ) {0.01,0.03,0.05,0.07,0.09}
984
+ A total of 30000 episodes were run for each configuration. Policies and the average cumulative
985
+ rewards were saved every 1000 episodes. The 10 best policies (in terms of average rewards) obtained
986
+ in the training results related to the real retail store environment are presented in Figure 7. Every
987
+ Figure 7
988
+ Average cumulative rewards for the top 10 policies among all parameter configurations in the real-world
989
+ store environment.
990
+ 1000 episodes we restarted the computation of the average cumulative rewards. Note that after the
991
+ first 1000 episodes some policies were already performing better but had not converged. In general
992
+ terms, the best policies converged after 20000 episodes in the training procedure. A few policies
993
+ could not match the performance of the best policies even after 30000 episodes.
994
+
995
+ Author: Article Short Title
996
+ 26
997
+ Transportation Science 00(0), pp. 000–000, © 0000 INFORMS
998
+ In some reinforcement learning problems, average cumulative rewards obtained during the train-
999
+ ing phase (considering random actions) can be different from the ones obtained during the testing
1000
+ phase (constantly choosing the optimal action according to the Q-table). There is a large debate
1001
+ on how to evaluate these approaches and whether the ϵ-greedy exploration should be kept during
1002
+ production or testing phase where no updates will be made to the picking policy. In some problems,
1003
+ it may make sense to keep this exploration feature as the agent may get stuck in the presence of
1004
+ unseen states. This is done successfully in Mnih et al. (2015) while playing Atari games. When
1005
+ solving path problems, non-optimal policies can be affected by cycles in case there is no randomness
1006
+ considered. For this reason, we consider that the ϵ parameter is to be maintained when the policy
1007
+ is used in practice.
1008
+ 6.3.
1009
+ Managerial insights
1010
+ The results shown in the previous sections suggest that the method can learn picking policies to
1011
+ be applied in real retail store environments. Indeed, we can observe the picker learning as he/she
1012
+ achieves higher and higher cumulative rewards. Nonetheless, one may ask whether we need all this
1013
+ work to pick a set of products or if it would be sufficient to just follow simpler policies as it is the
1014
+ case of a shortest path policy uniquely based on distance metrics.
1015
+ The main questions that motivated us to solve this problem still remain. Can we improve cus-
1016
+ tomer experience? What is the impact on the number of picked orders?
1017
+ To answer these questions, we measure the performance of four different picking policies regarding
1018
+ business-related indicators such as the number of orders/products picked and customer encounters.
1019
+ Q-learning (QL) Policy trained using the devised Q-learning that aims at finding a good com-
1020
+ promise for picking orders while avoiding customer encounters.
1021
+ Shortest Path (SP) Policy based on a shortest path policy (employing a Dijkstra algorithm)
1022
+ aiming at picking the most orders and ignoring customer encounters. Each step is obtained by
1023
+ solving a shortest path problem considering arcs weighted by their length.
1024
+ Myopic Policy (MP) Policy based on a myopic behavior, which aims at following the nodes
1025
+ with least customers, without getting farther from the target picking position.
1026
+
1027
+ Author: Article Short Title
1028
+ Transportation Science 00(0), pp. 000–000, © 0000 INFORMS
1029
+ 27
1030
+ Crowded Nodes (CN) Policy that minimizes the number of customer encounters based on a
1031
+ static measure of the average of customers in each node. Each step is obtained by solving a shortest
1032
+ path problem considering arcs weighted by the average number of customers traversing them.
1033
+ Additionally, for each policy, we considered two types of routing costs to sequence the picking
1034
+ order of the products of an order. Therefore, whenever an online order arrives, the SRP can be
1035
+ solved using a cost matrix considering distances or a crowdedness measure (average number of
1036
+ customers between the origin and destination nodes). These two routing basis are called Arc
1037
+ Distance and Arc Crowdedness, respectively. This will affect the sequence in which the products
1038
+ of an order are picked.
1039
+ Table 5 presents the indicators obtained for the four policies using each of the routing basis
1040
+ considered.
1041
+ Table 5
1042
+ Average indicators obtained for 500 episodes of the
1043
+ Shortest Path (SP), Crowded Node (CN), Myopic Policy (MP), and Q-learning (QL) policies.
1044
+ Routing Basis Policy
1045
+ Avg.
1046
+ Rewards
1047
+ Avg.
1048
+ #Orders
1049
+ Avg.
1050
+ #Products
1051
+ Avg.
1052
+ #Encounters
1053
+ Arc Distance
1054
+ QL 16582.12
1055
+ 41.03
1056
+ 487.01
1057
+ 1025.39
1058
+ Arc Distance
1059
+ SP 15388.14
1060
+ 46.56
1061
+ 553.79
1062
+ 2072.22
1063
+ Arc Distance
1064
+ CN 16085.83
1065
+ 38.51
1066
+ 456.64
1067
+ 745.71
1068
+ Arc Distance
1069
+ MP 15294.34
1070
+ 47.65
1071
+ 564.76
1072
+ 2134.58
1073
+ Avg. 15838.69
1074
+ 43.45
1075
+ 515.55
1076
+ 1494.40
1077
+ Arc Crowdedness
1078
+ QL 16997.61
1079
+ 41.49
1080
+ 491.58
1081
+ 1018.92
1082
+ Arc Crowdedness
1083
+ SP 14991.66
1084
+ 44.45
1085
+ 527.50
1086
+ 1868.61
1087
+ Arc Crowdedness
1088
+ CN 16845.25
1089
+ 39.84
1090
+ 470.69
1091
+ 768.99
1092
+ Arc Crowdedness
1093
+ MP 15244.25
1094
+ 45.66
1095
+ 542.28
1096
+ 1891.15
1097
+ Avg. 16019.69
1098
+ 42.86
1099
+ 508.01
1100
+ 1386.92
1101
+
1102
+ Author: Article Short Title
1103
+ 28
1104
+ Transportation Science 00(0), pp. 000–000, © 0000 INFORMS
1105
+ Analyzing the case where route sequences are obtained using arc distances, we observe that SP
1106
+ and MP are the most operationally efficient policies, picking an average of 46.56 and 47.65 orders,
1107
+ respectively. Policies QL and CN are not so efficient in terms of number of orders picked, picking
1108
+ 41.03 and 38.51 orders, respectively. These policies are clearly focused on improving customer
1109
+ experience, lowering the average number of customer encounters by more than 50% compared to
1110
+ policies SP and MP. Policy CN achieves the lowest number of customer encounters, yet it could
1111
+ pick the lowest number of orders among all policies. Policy QL drastically reduced the number of
1112
+ customer encounters without heavily compromising the number of orders picked.
1113
+ Observing the results obtained when route sequences are obtained using the arc crowdedness
1114
+ measure, we observe a similar behavior of the policies, in relative terms, regarding operational
1115
+ efficiency and customer experience. However, the route sequences obtained suffer from a reduction
1116
+ in the average number of orders picked, reducing by 1.35%, from an average 43.45 orders to 42.86.
1117
+ The number of customer encounters slightly improved, reducing by 7.19%, from an average of
1118
+ 1494.40 encounters to 1386.92. Therefore, using arc crowdedness as a routing basis helped to find
1119
+ small improvements in customer experience for all policies at a cost of a small reduction in the
1120
+ number of orders picked.
1121
+ We observe the most operationally efficient policies are the policies based on following shortest
1122
+ distance paths (SP and MP). In terms of providing the best customer experience, the CN policy
1123
+ achieves the lowest average number of customer encounters. However, these policies are totally
1124
+ focused on one objective only. While the SP and MP policies cannot avoid customers, the CN
1125
+ policy is not aware that the ultimate objective is to pick orders. The QL policy achieves a good
1126
+ compromise in picking a large average number of orders of and encountering a low average number
1127
+ of customers.
1128
+ An interesting detail on these results is that the QL had to be re-trained when the routing
1129
+ basis was changed from distance to crowdedness. Note that we are dealing with a problem that
1130
+ suffers from the “curse of dimensionality” in the number of states. Given that the route sequences
1131
+
1132
+ Author: Article Short Title
1133
+ Transportation Science 00(0), pp. 000–000, © 0000 INFORMS
1134
+ 29
1135
+ were changed, different pairs of current position and target position (state) started to appear more
1136
+ frequently. Since the QL policy trained with arc distances had not visited these states sufficiently,
1137
+ the policy had to be trained in an environment where the route sequences considered the arc
1138
+ crowdedness.
1139
+ The interesting behavior learned by the picker agent can be observed in several origin-destination
1140
+ pairs obtained in the policy. In Figure 8 we present an illustrative example of the paths followed
1141
+ by the SP, the CN and the QL policies.
1142
+ Figure 8
1143
+ Illustrative example of a SP path (red), a CN path (orange), and a QL path (blue).
1144
+ Although the SP policy performs fewer steps (traveling a shorter distance), it ends up visiting
1145
+ the most crowded nodes. On the other hand, the QL policy follows a longer path but it tries not to
1146
+ visit crowded nodes, resulting in fewer customer encounters. The CN policy performs the longest
1147
+ path as it is trying to avoid customers at all cost.
1148
+ 7.
1149
+ Conclusion
1150
+ This paper proposes a new problem in online retail, the diPRP, and solves it through a reinforce-
1151
+ ment learning approach. This problem has gained particular relevance during the pandemic context
1152
+ of 2020, in which most retailers offering online shopping services resorted to new picking operations
1153
+ in-store. These new picking operations will not be ephemeral, they will prevail as an important
1154
+ fulfillment method among omnichannel retail players.
1155
+
1156
+ BOMEWC
1157
+ COULIUEULE
1158
+ Wr1Conrte
1159
+ ACV3V 30 A3RA
1160
+ J003SSAuthor: Article Short Title
1161
+ 30
1162
+ Transportation Science 00(0), pp. 000–000, © 0000 INFORMS
1163
+ Our solution approach encompasses several techniques, integrating the fields of mathematical
1164
+ programming, simulation, and machine learning, to obtain an in-store picking policy that is com-
1165
+ petitive in terms of the number of picked products while minimizing the number of customer
1166
+ encounters. Our study provides evidence that reinforcement learning can be an important method
1167
+ for effectively solving new management problems.
1168
+ The devised solution approach trains picker agents to perform shopping paths that reduce the
1169
+ disturbance of in-store customers during their shopping experience. Computational experiments
1170
+ performed both on synthetic instances and a real-world instance from a large European retailer
1171
+ show that the picker agents can learn efficient picking policies in a reasonable number of episodes.
1172
+ An important characteristic inherent to our approach is the low computational power demanded
1173
+ and the very short computational time required to obtain a decision.
1174
+ In addition, based on the real-world case study, we provide interesting numeric results and
1175
+ solution visualizations to support a few managerial insights. As expected, the shopping sequences
1176
+ followed by the customers often result in crowded store areas. Due to the dynamic and unpredictable
1177
+ movement of customers in-store, these crowded store areas are difficult to predict. However, we
1178
+ observe that the devised picking policies avoid these areas to reduce the number of customer
1179
+ encounters. This is not the behavior of the shortest path-based policies, which, logically, can pick
1180
+ a few more products, but nearly double the number of customers disturbed in our simulations.
1181
+ Our approach, based on reinforcement learning, allows better control over the trade-off between
1182
+ operational efficiency and customer experience. Such result may empower retailers to further pursue
1183
+ their omnichannel fulfillment strategy.
1184
+ Many developments can be further introduced in this problem. For instance, developing col-
1185
+ laborative picking policies to coordinate picking teams in this problem would be an interesting
1186
+ exercise, particularly if the customer perception regarding the number of picker encounters can be
1187
+ assessed. Additionally, improvements to the simulation environment can be introduced to consider,
1188
+ for example, shopping cart capacities and slowdowns experienced in crowded aisles. Furthermore,
1189
+
1190
+ Author: Article Short Title
1191
+ Transportation Science 00(0), pp. 000–000, © 0000 INFORMS
1192
+ 31
1193
+ exploring richer state variables may improve the quality of the picking policies. For instance, the
1194
+ number of customers encountered in each aisle can further influence the decision of the picker in an
1195
+ online fashion (probably, the state space would suffer from the so-called “curse of dimensionality”
1196
+ more severely in this case). Lastly, we would like to stress that there are multiple applications
1197
+ for the approach proposed in this paper. The future reserves the automation of several activities,
1198
+ such as robots for cleaning public spaces, robots for picking products at warehouses and stores,
1199
+ and autonomous vehicles. These technologies will likely be placed in narrow spaces that are shared
1200
+ with humans. Since these automations are typically not pleasant to the eye, our approach can be
1201
+ an interesting alternative in the future.
1202
+ Acknowledgments
1203
+ The research leading to these results has received funding from the European Union’s Horizon 2020 - The
1204
+ EU Framework Programme for Research and Innovation 2014-2020, under grant agreement 952060.
1205
+ References
1206
+ Adhi P, Hough G, Calais S, Lange T, Lenzen C (2022) Reimagining the role of physical stores in an omnichan-
1207
+ nel
1208
+ distribution
1209
+ network.
1210
+ URL
1211
+ https://www.mckinsey.com/industries/retail/our-insights/
1212
+ reimagining-the-role-of-physical-stores-in-an-omnichannel-distribution-network.
1213
+ Ardjmand E, Shakeri H, Singh M, Sanei Bajgiran O (2018) Minimizing order picking makespan with multiple
1214
+ pickers in a wave picking warehouse. International Journal of Production Economics 206:169–183, ISSN
1215
+ 0925-5273.
1216
+ Barbee
1217
+ J,
1218
+ Jayakumar
1219
+ J,
1220
+ Touse
1221
+ S,
1222
+ Venkataraman
1223
+ K
1224
+ (2021)
1225
+ Retail’s
1226
+ need
1227
+ for
1228
+ speed:
1229
+ Unlocking
1230
+ value in omnichannel delivery. URL https://www.mckinsey.com/industries/retail/our-insights/
1231
+ retails-need-for-speed-unlocking-value-in-omnichannel-delivery.
1232
+ Berbeglia G, Cordeau JF, Laporte G (2010) Dynamic pickup and delivery problems. European Journal of
1233
+ Operational Research 202(1):8–15.
1234
+ Boros P, Feh´er O, Lakner Z, Niroomand S, Vizv´ari B (2015) Modeling supermarket re-layout from the
1235
+ owner’s perspective. Annals of Operations Research 238(1-2):27–40.
1236
+
1237
+ Author: Article Short Title
1238
+ 32
1239
+ Transportation Science 00(0), pp. 000–000, © 0000 INFORMS
1240
+ Cambazard H, Catusse N (2018) Fixed-parameter algorithms for rectilinear steiner tree and rectilinear trav-
1241
+ eling salesman problem in the plane. European Journal of Operational Research 270(2):419–429, ISSN
1242
+ 0377-2217.
1243
+ Caro F, K¨ok AG, Mart´ınez-de Alb´eniz V (2020) The future of retail operations. Manufacturing & Service
1244
+ Operations Management 22(1):47–58.
1245
+ Chabot T, Coelho LC, Renaud J, Cˆot´e JF (2018) Mathematical model, heuristics and exact method for
1246
+ order picking in narrow aisles. Journal of the Operational Research Society 69(8):1242–1253.
1247
+ Chabot T, Lahyani R, Coelho LC, Renaud J (2017) Order picking problems under weight, fragility and
1248
+ category constraints. International Journal of Production Research 55(21):6361–6379.
1249
+ Chen J, Liang Y, Shen H, Shen ZJM, Xue M (2021) Offline-channel planning in smart omnichannel retailing.
1250
+ Manufacturing & Service Operations Management .
1251
+ Chen X, Li Y, Hu T (2015) Solving the supermarket shopping route planning problem based on genetic
1252
+ algorithm. 2015 IEEE/ACIS 14th International Conference on Computer and Information Science
1253
+ (ICIS), 529–533.
1254
+ Cornu´ejols G, Fonlupt J, Naddef D (1985) The traveling salesman problem on a graph and some related
1255
+ integer polyhedra. Mathematical Programming 33:1–27.
1256
+ de Koster R, Le-Duc T, Roodbergen KJ (2007) Design and control of warehouse order picking: A literature
1257
+ review. European Journal of Operational Research 182(2):481 – 501.
1258
+ Dennis S (2018) Physical retail isn’t dead. boring retail is. URL https://www.forbes.com/sites/
1259
+ stevendennis/2018/03/19/physical-retail-is-not-dead-boring-retail-is-understanding-
1260
+ retails-great-bifurcation.
1261
+ Gao F, Su X (2017a) Omnichannel retail operations with buy-online-and-pick-up-in-store. Management Sci-
1262
+ ence 63(8):2478–2492.
1263
+ Gao F, Su X (2017b) Online and offline information for omnichannel retailing. Manufacturing & Service
1264
+ Operations Management 19(1):84–98.
1265
+ Glaeser CK, Fisher M, Su X (2019) Optimal retail location: Empirical methodology and application to
1266
+ practice. Manufacturing & Service Operations Management 21(1):86–102.
1267
+
1268
+ Author: Article Short Title
1269
+ Transportation Science 00(0), pp. 000–000, © 0000 INFORMS
1270
+ 33
1271
+ Gong Y, Koster RD (2008) A polling-based dynamic order picking system for online retailers. IIE Transac-
1272
+ tions 40(11):1070–1082.
1273
+ Hildebrandt FD, Thomas B, Ulmer MW (2021) Where the action is: Let’s make reinforcement learning for
1274
+ stochastic dynamic vehicle routing problems work!
1275
+ Hirpara S, Parikh PJ (2021) Retail facility layout considering shopper path. Computers & Industrial Engi-
1276
+ neering 154:106919.
1277
+ Hui SK, Inman JJ, Huang Y, Suher J (2013) The effect of in-store travel distance on unplanned spending:
1278
+ Applications to mobile promotion strategies. Journal of Marketing 77(2):1–16.
1279
+ Jia S, Karp J, Ravi R, Tayur S (2021) Effective online order acceptance policies for omnichannel fulfillment.
1280
+ Manufacturing & Service Operations Management .
1281
+ Kullman ND, Cousineau M, Goodson JC, Mendoza JE (2022) Dynamic ride-hailing with electric vehicles.
1282
+ Transportation Science 56(3):775–794.
1283
+ Larson JS, Bradlow ET, Fader PS (2005) An exploratory look at supermarket shopping paths. International
1284
+ Journal of Research in Marketing 22(4):395–414, ISSN 0167-8116.
1285
+ Letchford AN, Nasiri SD, Theis DO (2013) Compact formulations of the steiner traveling salesman problem
1286
+ and related problems. European Journal of Operational Research 228(1):83–92, ISSN 0377-2217.
1287
+ Li J, Ma Y, Gao R, Cao Z, Lim A, Song W, Zhang J (2021) Deep reinforcement learning for solving the
1288
+ heterogeneous capacitated vehicle routing problem. IEEE Transactions on Cybernetics 1–14, ISSN
1289
+ 2168-2275.
1290
+ Li YM, Lin LF, Ho CC (2017) A social route recommender mechanism for store shopping support. Decision
1291
+ Support Systems 94:97–108, ISSN 0167-9236.
1292
+ Lu W, McFarlane D, Giannikas V, Zhang Q (2016) An algorithm for dynamic order-picking in warehouse
1293
+ operations. European Journal of Operational Research 248(1):107–122, ISSN 0377-2217.
1294
+ Masae M, Glock CH, Grosse EH (2020) Order picker routing in warehouses: A systematic literature review.
1295
+ International Journal of Production Economics 224:107564.
1296
+ Mnih V, Kavukcuoglu K, Silver D, Rusu AA, Veness J, Bellemare MG, Graves A, Riedmiller M, Fidjeland
1297
+ AK, Ostrovski G, Petersen S, Beattie C, Sadik A, Antonoglou I, King H, Kumaran D, Wierstra D, Legg
1298
+
1299
+ Author: Article Short Title
1300
+ 34
1301
+ Transportation Science 00(0), pp. 000–000, © 0000 INFORMS
1302
+ S, Hassabis D (2015) Human-level control through deep reinforcement learning. Nature 518(7540):529–
1303
+ 533, ISSN 00280836.
1304
+ Nazari M, Oroojlooy A, Snyder LV, Tak´ac M (2018) Reinforcement learning for solving the vehicle routing
1305
+ problem. NeurIPS.
1306
+ Nierynck R (2020) Quick commerce: Pioneering the next generation of delivery: Delivery hero. URL https:
1307
+ //www.deliveryhero.com/blog/quick-commerce/.
1308
+ Ojeda Rios BH, Xavier EC, Miyazawa FK, Amorim P, Curcio E, Santos MJ (2021) Recent dynamic vehicle
1309
+ routing problems: A survey. Computers & Industrial Engineering 160:107604, ISSN 0360-8352.
1310
+ Olsen TL, Tomlin B (2020) Industry 4.0: Opportunities and challenges for operations management. Manu-
1311
+ facturing & Service Operations Management 22(1):113–122.
1312
+ Pansart L, Catusse N, Cambazard H (2018) Exact algorithms for the order picking problem. Computers &
1313
+ Operations Research 100:117–127, ISSN 0305-0548.
1314
+ Pillac V, Gendreau M, Gu´eret C, Medaglia AL (2013) A review of dynamic vehicle routing problems. Euro-
1315
+ pean Journal of Operational Research 225(1):1–11.
1316
+ Pires M, Silva E, Amorim P (2021) Solving the grocery backroom layout problem. International Journal of
1317
+ Production Research 59(3):772–797.
1318
+ Powell WB (2007) Approximate Dynamic Programming: Solving the Curses of Dimensionality (Wiley Series
1319
+ in Probability and Statistics) (USA: Wiley-Interscience), ISBN 0470171553.
1320
+ Powell WB (2019) A unified framework for stochastic optimization. European Journal of Operational Research
1321
+ 275(3):795–821.
1322
+ Psaraftis HN, Wen M, Kontovas CA (2016) Dynamic vehicle routing problems: Three decades and counting.
1323
+ Networks 67(1):3–31.
1324
+ Quader S, Castillo-Villar KK (2018) Design of an enhanced multi-aisle order-picking system considering
1325
+ storage assignments and routing heuristics. Robotics and Computer-Integrated Manufacturing 50:13–29.
1326
+ Ratliff HD, Rosenthal AS (1983) Order-picking in a rectangular warehouse: A solvable case of the traveling
1327
+ salesman problem. Operations Research 31(3):507–521.
1328
+
1329
+ Author: Article Short Title
1330
+ Transportation Science 00(0), pp. 000–000, © 0000 INFORMS
1331
+ 35
1332
+ Richter F (2021) Pandemic accelerates shift to online retail. URL https://www.statista.com/chart/14011/
1333
+ e-commerce-share-of-total-retail-sales/.
1334
+ Ritzinger U, Puchinger J, Hartl RF (2016) A survey on dynamic and stochastic vehicle routing problems.
1335
+ International Journal of Production Research 54(1):215–231.
1336
+ Rodr´ıguez-Pereira J, Fern´andez E, Laporte G, Benavent E, Mart´ınez-Sykora A (2019) The steiner traveling
1337
+ salesman problem and its extensions. European Journal of Operational Research 278(2):615–628, ISSN
1338
+ 0377-2217.
1339
+ Roodbergen KJ, de Koster R (2001) Routing order pickers in a warehouse with a middle aisle. European
1340
+ Journal of Operational Research 133(1):32–43.
1341
+ Roodbergen KJ, Koster R (2001) Routing methods for warehouses with multiple cross aisles. International
1342
+ Journal of Production Research 39(9):1865–1883.
1343
+ Roodbergen KJ, Vis IF, Jr GDT (2015) Simultaneous determination of warehouse layout and control policies.
1344
+ International Journal of Production Research 53(11):3306–3326.
1345
+ Savelsbergh M, Van Woensel T (2016) 50th anniversary invited article—city logistics: Challenges and oppor-
1346
+ tunities. Transportation Science 50(2):579–590.
1347
+ Scholz A, Henn S, Stuhlmann M, W¨ascher G (2016) A new mathematical programming formulation for the
1348
+ single-picker routing problem. European Journal of Operational Research 253(1):68–84, ISSN 0377-2217.
1349
+ Theys C, Br¨aysy O, Dullaert W, Raa B (2010) Using a tsp heuristic for routing order pickers in warehouses.
1350
+ European Journal of Operational Research 200(3):755–763, ISSN 0377-2217.
1351
+ Ulmer MW, Goodson JC, Mattfeld DC, Thomas BW (2020) On modeling stochastic dynamic vehicle routing
1352
+ problems. EURO Journal on Transportation and Logistics 9(2):100008.
1353
+ van Gils T, Ramaekers K, Braekers K, Depaire B, Caris A (2018) Increasing order picking efficiency by
1354
+ integrating storage, batching, zone picking, and routing policy decisions. International Journal of Pro-
1355
+ duction Economics 197:243–261, ISSN 0925-5273.
1356
+ Vyt D, Jara M, Mevel O, Morvan T, Morvan N (2022) The impact of convenience in a click and collect retail
1357
+ setting: A consumer-based approach. International Journal of Production Economics 248:108491, ISSN
1358
+ 0925-5273.
1359
+
1360
+ Author: Article Short Title
1361
+ 36
1362
+ Transportation Science 00(0), pp. 000–000, © 0000 INFORMS
1363
+ Watkins CJCH (1989) Learning from Delayed Rewards. Ph.D. thesis, King’s College, Oxford.
1364
+
29A0T4oBgHgl3EQfNP8E/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
2dFIT4oBgHgl3EQf5Cs5/content/tmp_files/2301.11387v1.pdf.txt ADDED
@@ -0,0 +1,2504 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ IEEE TRANSACTIONS ON GEOSCIENCE AND REMOTE SENSING
2
+ 1
3
+ Universal Domain Adaptation for Remote Sensing
4
+ Image Scene Classification
5
+ Qingsong Xu, Yilei Shi, Member, IEEE, Xin Yuan, Senior Member, IEEE, and Xiao Xiang Zhu, Fellow, IEEE
6
+ Abstract—This work has been accepted by IEEE TGRS for
7
+ publication. The domain adaptation (DA) approaches available
8
+ to date are usually not well suited for practical DA scenarios
9
+ of remote sensing image classification, since these methods (such
10
+ as unsupervised DA) rely on rich prior knowledge about the
11
+ relationship between label sets of source and target domains, and
12
+ source data are often not accessible due to privacy or confiden-
13
+ tiality issues. To this end, we propose a practical universal domain
14
+ adaptation setting for remote sensing image scene classification
15
+ that requires no prior knowledge on the label sets. Furthermore,
16
+ a novel universal domain adaptation method without source data
17
+ is proposed for cases when the source data is unavailable. The
18
+ architecture of the model is divided into two parts: the source
19
+ data generation stage and the model adaptation stage. The first
20
+ stage estimates the conditional distribution of source data from
21
+ the pre-trained model using the knowledge of class-separability
22
+ in the source domain and then synthesizes the source data. With
23
+ this synthetic source data in hand, it becomes a universal DA task
24
+ to classify a target sample correctly if it belongs to any category
25
+ in the source label set, or mark it as “unknown” otherwise. In
26
+ the second stage, a novel transferable weight that distinguishes
27
+ the shared and private label sets in each domain promotes the
28
+ adaptation in the automatically discovered shared label set and
29
+ recognizes the “unknown” samples successfully. Empirical results
30
+ show that the proposed model is effective and practical for
31
+ remote sensing image scene classification, regardless of whether
32
+ the source data is available or not. The code is available at
33
+ https://github.com/zhu-xlab/UniDA.
34
+ Index Terms—Remote sensing image classification, source data
35
+ generation, transferable weight, universal domain adaptation.
36
+ This work is jointly supported by the German Research Foundation
37
+ (DFG GZ: ZH 498/18-1; Project number: 519016653), by the European
38
+ Research Council (ERC) under the European Union’s Horizon 2020 research
39
+ and innovation programme (grant agreement No. [ERC-2016-StG-714087],
40
+ Acronym: So2Sat), by the Helmholtz Association under the Framework of
41
+ the Helmholtz Excellent Professorship “Data Science in Earth Observation
42
+ - Big Data Fusion for Urban Research”(grant number: W2-W3-100), by
43
+ the German Federal Ministry of Education and Research (BMBF) in the
44
+ framework of the international future AI lab ”AI4EO – Artificial Intelligence
45
+ for Earth Observation: Reasoning, Uncertainties, Ethics and Beyond” (grant
46
+ number: 01DD20001) and by German Federal Ministry for Economic Affairs
47
+ and Climate Action in the framework of the ”national center of excellence
48
+ ML4Earth” (grant number: 50EE2201C). The work of X. Yuan is supported by
49
+ the National Natural Science Foundation of China (grant number: 62271414),
50
+ Zhejiang Provincial Natural Science Foundation of China (grant number:
51
+ LR23F010001), Westlake Foundation (grant number: 2021B1 501-2) and the
52
+ Research Center for Industries of the Future (RCIF) at Westlake University.
53
+ (Qingsong Xu and Yilei Shi contributed equally.) (Corresponding author: Xiao
54
+ Xiang Zhu.)
55
+ Q. Xu, and X. X. Zhu are with the Chair of Data Science in Earth Ob-
56
+ servation, Technical University of Munich (TUM), 80333 Munich, Germany.
57
58
+ Y. Shi is with the Chair of Remote Sensing Technology, Technical Univer-
59
+ sity of Munich (TUM), 80333 Munich, Germany. (e-mail: [email protected]).
60
+ X. Yuan is with the School of Engineering, Westlake University, Hangzhou,
61
+ Zhejiang 310030, China (e-mail: [email protected]).
62
+ NOMENCLATURE
63
+ M
64
+ Pre-trained model on real source domain.
65
+ F
66
+ Feature extractor. θf denotes parameters of F.
67
+ C
68
+ Classifier. θc denotes parameters of C.
69
+ D′
70
+ Non-adversarial domain discriminator. θd′ de-
71
+ notes parameters of D′.
72
+ D
73
+ Adversarial domain discriminator. θd denotes
74
+ parameters of D.
75
+ p(x)
76
+ Real source domain distribution.
77
+ q(x)
78
+ Target domain distribution.
79
+ p(ys)
80
+ True labeled distribution of the source domain.
81
+ y
82
+ One-hot vector that represents a label.
83
+ py(y)
84
+ Estimated categorical distribution of the true
85
+ labeled distribution p(ys).
86
+ z
87
+ Standard normal vector of a low-dimensional
88
+ noise.
89
+ pz(z)
90
+ Multivariate Gaussian distribution describing
91
+ the source data points.
92
+ p(x | y, z)
93
+ Conditional distribution of source data.
94
+ G
95
+ Generator that obtains the empirical distribu-
96
+ tion p(x | y, z). θg denotes parameters of G.
97
+ xs
98
+ Source image.
99
+ xf
100
+ Synthetic source image.
101
+ xt
102
+ Target image.
103
+ Ds
104
+ Real source domain.
105
+ Df
106
+ Synthetic source domain. |Df| denotes the size
107
+ of synthetic source domain.
108
+ Dt
109
+ Target domain.
110
+ Yf
111
+ Label set of the synthetic source domain.
112
+ Yt
113
+ Label set of the target domain.
114
+ Yf
115
+ Private label set of the synthetic source domain.
116
+ Yt
117
+ Private label set of the target domain.
118
+ ξ
119
+ Jaccard index.
120
+ ¯y
121
+ Probability vector predicted by the classifier C.
122
+ φj(x)
123
+ Activation at the jth layer of the style loss
124
+ network.
125
+
126
+ j (x)
127
+ Gram matrix.
128
+ wf(x)
129
+ Sample-level transferable weight for synthetic
130
+ source data (scalar).
131
+ wt(x)
132
+ Sample-level transferable weight for target data
133
+ (scalar).
134
+ w0
135
+ Decision threshold (scalar).
136
+ d(x)
137
+ Domain similarity of target domain samples to
138
+ the synthetic source domain samples (scalar).
139
+ max ¯y(x)
140
+ Confidence of predicted probabilities (scalar).
141
+ ℓcls
142
+ Classifier loss.
143
+ ℓstyle
144
+ Style loss.
145
+ arXiv:2301.11387v1 [cs.CV] 26 Jan 2023
146
+
147
+ IEEE TRANSACTIONS ON GEOSCIENCE AND REMOTE SENSING
148
+ 2
149
+ ℓadv
150
+ Adversarial loss function for adaptation.
151
+ ℓf
152
+ ce
153
+ Cross-entropy loss on the synthetic source do-
154
+ main.
155
+ ℓsimi
156
+ Binary cross-entropy loss for non-adversarial
157
+ domain discriminator.
158
+ I. INTRODUCTION
159
+ R
160
+ EMOTE sensing image scene classification is a pro-
161
+ cedure for assigning semantic labels according to the
162
+ content of remote sensing scenes [1], which is beneficial
163
+ to traffic analysis, urban area monitoring and planning [2],
164
+ [3], land-use and land-cover [4], and hazard detection and
165
+ avoidance [5], among other applications. In recent years,
166
+ many deep learning approaches have been proposed for scene
167
+ classification of remote sensing images [6], [7], such as
168
+ autoencoder [8], convolutional neural networks (CNNs) [9],
169
+ generative adversarial networks (GANs) [10], prototype-based
170
+ memory networks [11], and transformer [12]. These methods
171
+ usually assume that the training and testing data share the
172
+ same distribution. However, in a real application, due to the
173
+ influence of sensors, geographic locations, imaging conditions,
174
+ and other factors, the distribution of training and testing data
175
+ may be different. This phenomenon is referred to as the
176
+ domain gap [13]. To address the domain gap problem among
177
+ different datasets, domain adaptation (DA) algorithms have
178
+ been proposed. DA aims to leverage a source domain to learn
179
+ a model that performs well on a different but related target
180
+ domain [14].
181
+ In remote sensing scene classification, most existing DA
182
+ approaches [15], [16] are proposed to tackle the domain gap
183
+ between different domains by learning a domain invariant
184
+ feature representation. Based on the knowledge of the rela-
185
+ tionship between the source and target label space (category-
186
+ gap), DA can be divided into closed-set DA, partial DA, and
187
+ open-set DA. Specifically, closed-set DA usually addresses
188
+ the domain adaptation problem by leveraging the adversarial
189
+ learning behaviors of GANs to perform distribution alignment
190
+ in the pixel, feature, and output spaces [5], [15], [17], [18],
191
+ which assumes a shared label set between the source and
192
+ target domains, as shown in Fig. 1(a). In order to relax
193
+ this assumption, two alternatives have been proposed: partial
194
+ DA [19], in which the target label space is considered a subset
195
+ of the source label space, as shown in Fig. 1(b), and open-set
196
+ DA [20], in which the source label space is considered a subset
197
+ of the target label space, as shown in Fig. 1(c). For example,
198
+ an open-set domain adaptation algorithm [21] is proposed
199
+ in which transferability and discriminability are explored for
200
+ the purpose of remote sensing image scene classification.
201
+ However, these DA methods have two major bottlenecks in
202
+ the domain adaptation of remote sensing scene classification
203
+ in the wild.
204
+ • In a general scenario, we cannot select the proper domain
205
+ adaptation methods (closed-set DA, partial DA, or open-set
206
+ DA) because no prior knowledge about the target domain
207
+ label set is given.
208
+ • The source dataset is not available in many practical ap-
209
+ plication scenarios of remote sensing. For example, many
210
+ satellite companies and users will only provide pre-trained
211
+ models instead of their source data due to data privacy and
212
+ security issues. In addition, the source datasets, like high-
213
+ resolution remote sensing images, may be so large that it
214
+ is not practical or convenient to transfer or retain them to
215
+ different platforms.
216
+ To address the first challenge, a novel scenario of univer-
217
+ sal domain adaptation (UniDA) is proposed. As shown in
218
+ Fig. 1(d), UniDA removes all constraints and includes all the
219
+ above adaptation settings [22]. UniDA may contain a shared
220
+ label set and hold a private label set for a given source label set
221
+ and a target label set. Two challenges are exposed in a UniDA
222
+ setting. (1) If we naively match the entire source domain
223
+ with the entire target domain, the mismatch of different label
224
+ sets will deteriorate the model. Thus, the samples coming
225
+ from the shared label set between the source and target
226
+ domains should be automatically detected and matched. (2)
227
+ The target samples from private label sets should be marked
228
+ as “unknown” since there are no labeled training data for
229
+ these classes. Currently, different transferability criteria (such
230
+ as entropy in
231
+ [22], pseudo-margin vector in [23], and the
232
+ mixture of entropy, confidence, and consistency in [24]) have
233
+ been proposed to distinguish samples from shared label sets
234
+ and those in private label sets in the field of computer vision.
235
+ To address the second challenge, in computer vision, source-
236
+ free domain adaptation is under continuous exploration [25]–
237
+ [28]. For example,
238
+ [29] proposes the universal source-free
239
+ domain adaptation setting for natural image classification.
240
+ However, existing UniDA methods [22]–[24], [29] in computer
241
+ vision normally assume that the source data set is available
242
+ when building the classifier platform. This assumption is not
243
+ valid and practical for the second challenge. Thus, developing
244
+ a universal domain adaptation method without source data
245
+ (Fig. 1(e)) has a practical value and is thus desired in real
246
+ application scenarios of remote sensing image classification.
247
+ In UniDA without source data, pre-trained models can be
248
+ available. Pre-trained models not only serve as strong baselines
249
+ for the original dataset, but also contain knowledge of the
250
+ original dataset. Therefore, generating synthetic source domain
251
+ data from the pre-trained model is the first problem to be
252
+ solved. There are recent works for distilling a network’s
253
+ knowledge by a small dataset [30] or no observable data [31].
254
+ It is worth noting that we cannot use generative adversarial
255
+ networks to directly generate artificial data (similar to [32]),
256
+ because the core of UniDA without source data is to restore
257
+ the category distribution (including the shared label set and
258
+ the private label set) from the pre-trained model.
259
+ Bearing these concerns in mind, we propose the UniDA
260
+ without source data in order to introduce the UniDA setting
261
+ into remote sensing datasets. In this case, we merely have
262
+ access to the pre-trained model from the source domain. We
263
+ have no information about the source data distribution that
264
+ was used to train. UniDA without source data poses two major
265
+ technical challenges for designing the corresponding models
266
+ in the wild. (1) Distilling the knowledge of source data from
267
+ the pre-trained model. The knowledge is consistent with the
268
+ source in the category distribution (including the shared label
269
+
270
+ IEEE TRANSACTIONS ON GEOSCIENCE AND REMOTE SENSING
271
+ 3
272
+ Fig. 1. Different domain adaptation scenarios. (a) Closed-set DA, which assumes that the source domain and the target domain have shared label sets. (b)
273
+ Partial DA, which assumes that target label sets are considered a subset of source label sets. (c) Open-set DA, which assumes that source label sets are
274
+ considered a subset of target label sets. (d) Universal DA, which imposes no prior knowledge on the label sets. Label sets are divided into shared and private
275
+ label sets in each domain. (e) Universal DA without source data. The source dataset is not available in the practical universal DA scenarios of remote sensing.
276
+ Fig. 2. Overview of the proposed UniDA without source data (SDG-MA). The model consists of a source data generation stage and a model adaptation stage.
277
+ set and the private label set), and is as close as possible to
278
+ the target in style. (2) Domain adaptation should be applied
279
+ to align distributions of the synthetic source and target data in
280
+ the technical challenges of UniDA.
281
+ To address these two challenges, our proposed UniDA with-
282
+ out source data for remote sensing images consists of a source
283
+ data generation (SDG) stage and a model adaptation (MA)
284
+ stage. In the SDG stage, we reformulate the goal as estimating
285
+ the conditional distribution rather than the distribution of the
286
+ source data, since the source data space is exponential with
287
+ the dimensionality of data. After the conditional distribution
288
+ of the source data is obtained, a well-defined criterion can be
289
+ used to distinguish different degrees of uncertainty in order
290
+ to separate the target samples from the shared label set and
291
+ those from the private label. However, uncertainty is usually
292
+ measured by entropy [22], [33], which lacks discriminability
293
+ for uncertainty when the categorical distributions are relatively
294
+ uniform [24]. Thus, a novel transferable weight is defined by
295
+ considering confidence and domain similarity.
296
+ In a nutshell, our contributions are as follows:
297
+ • We introduce a more practical and challenging UniDA
298
+ setting for remote sensing image scene classification.
299
+ • We propose a new UniDA model (SDG-MA), which is
300
+ composed of a source data generation stage and a model
301
+ adaptation stage.
302
+ • In order to generate reliable source domain samples, a
303
+ novel conditional probability recovery method of the source
304
+
305
+ Closed set DA
306
+ Partial DA
307
+ Open set DA
308
+ (a)
309
+ (b)
310
+ (c)
311
+ Resident
312
+ Industry
313
+ Farmland
314
+ Resident
315
+ Industry
316
+ Farmland
317
+ Resident
318
+ Industry
319
+ Source
320
+ Source
321
+ Source
322
+ Domain
323
+ Domain
324
+ Domain
325
+ Resident
326
+ Industry
327
+ Industry
328
+ Farmland
329
+ Resident
330
+ Resident
331
+ Industry
332
+ Farmland
333
+ Target
334
+ Target
335
+ Target
336
+ Domain
337
+ Domain
338
+ Domain
339
+ Universal DA
340
+ Universal DA without Source Data
341
+ (d)
342
+ (e)
343
+ Resident
344
+ Industry
345
+ Grass
346
+ River Lake
347
+ Source
348
+ Source
349
+ Domain
350
+ Domain
351
+ Industry
352
+ Resident
353
+ Airplane
354
+ Beach
355
+ Resident
356
+ Airplane
357
+ Beach
358
+ Industry
359
+ Target
360
+ Target
361
+ Domain
362
+ Domain
363
+ Private label sets
364
+ Shared label sets
365
+ Private label sets
366
+ Shared label setsSource Data Generation
367
+ P,(y)
368
+ Label y
369
+ Feature Extractor F
370
+ Classifier C
371
+ (Fixed)
372
+ (Fixed)
373
+ Concat
374
+ Generator G
375
+ Noise z
376
+ p(xly,z)
377
+ sampling
378
+ Style Loss Network
379
+ t style
380
+ pz(z)
381
+ Xt
382
+ Model Adaptation: Testing
383
+ Model Adaptation: Training
384
+ Classifier C
385
+ ef
386
+ xt
387
+ Wf, Wt
388
+ Xt
389
+ argmax y
390
+ Feature Extractor
391
+ TYes
392
+ Discriminator D'
393
+ F
394
+ siml
395
+ F
396
+ >Unknown
397
+ +M
398
+ W+
399
+ Xf
400
+ No
401
+ D'
402
+ Discriminator D
403
+ advIEEE TRANSACTIONS ON GEOSCIENCE AND REMOTE SENSING
404
+ 4
405
+ domain is designed to distill category knowledge.
406
+ • A novel transferable weight is utilized to distinguish the
407
+ shared label sets and the private label sets in each domain.
408
+ • Experimental results on four UniDA settings for remote
409
+ sensing image scene classification demonstrate that the
410
+ proposed model is effective and practical, regardless of
411
+ whether the source domain is available or not.
412
+ II. RELATED WORK
413
+ Most existing DA settings for remote sensing image scene
414
+ classification can be summarized as closed-set, partial, and
415
+ open-set DA based on the label set relationship. Closed-set
416
+ DA is a scenario where the source and target domains share
417
+ the same label set. The main challenge in this scenario is
418
+ to overcome the domain gap that comes as a result of the
419
+ samples being taken from different distributions. Among the
420
+ recent work on closed-set DA for remote sensing, adversarial
421
+ learning frameworks have attracted significant interest because
422
+ of the improved quality of alignment between distributions
423
+ by adapting representations of different domains. GANs are
424
+ commonly used at feature maps generated from CNNs where
425
+ a domain discriminator is trained to correctly classify the
426
+ domain of each input feature. For example, domain-adversarial
427
+ neural networks (DANN) [34], Siamese GAN [35], Atten-
428
+ tion GAN [10], and domain adaptation via a task-specific
429
+ classifier (DATSNET) framework [36] are presented for the
430
+ classification of remote sensing images, by learning an in-
431
+ variant representation. Recently, a multitude of closed-set DA
432
+ algorithms for remote sensing image scene classification [37]–
433
+ [43] is designed to reduce the global or local distribution
434
+ differences between domains. In addition, closed-set DA with
435
+ multiple source domains [44] is proposed for remote sensing
436
+ image classification. However, it is difficult to ensure that the
437
+ source domain and the target domain have common classes.
438
+ Thus, partial DA and open-set DA are proposed to relax
439
+ this limitation. Partial DA handles the case where the target
440
+ classes are a subset of source classes. This task is solved by
441
+ performing importance-weighting on source examples that are
442
+ similar to samples in the target [19], [45], [46]. Open set DA
443
+ is a more realistic version, where the new classes will appear
444
+ in the target domain. In the open set DA setting, the target
445
+ domain contains unknown classes that do not present in the
446
+ source domain. In remote sensing image scene classification,
447
+ an open set DA algorithm via exploring transferability and
448
+ discriminability (OSDA-ETD) [21] is proposed to reduce
449
+ the distribution discrepancy of the same classes in different
450
+ domains and enlarge the distribution discrepancy of different
451
+ classes in different domains. In addition, some open set DA
452
+ networks based on adversarial learning [47]–[50] and graph
453
+ convolutional networks [51], [52] are presented for remote
454
+ sensing image scene classification. However, almost all these
455
+ methods rely on prior knowledge about the relationship be-
456
+ tween label sets of source and target domains and assume
457
+ the co-existence of source and target data. Thus, in order
458
+ to promote the development of DA methods, we propose
459
+ a general setting (UniDA) for remote sensing image scene
460
+ classification.
461
+ III. METHODOLOGY
462
+ In this section, we elaborate the problem of the UniDA
463
+ setting without source data and address it by a novel dual-
464
+ stage framework (SDG-MA), shown in Fig. 2.
465
+ A. Problem Setting
466
+ For UniDA setting without source data (SDG-MA), we
467
+ merely have access to the pre-trained model M, including
468
+ feature extractor F and classifier C. We have no information
469
+ about the source data distribution p(x) that is used to train
470
+ M. Thus, considering the MA in the second stage, our first
471
+ goal is to generate reliable source data xf from the pre-
472
+ trained model M. The synthetic distribution is consistent with
473
+ the source data distribution p(x) in the category distribution
474
+ (including the shared label set and the private label set), and
475
+ is as close as possible to the target domain in style. However,
476
+ it is impracticable to estimate p(x) directly since the source
477
+ data space is exponential with the dimensionality of data.
478
+ Thus, as shown in the source data generation stage of Fig. 2,
479
+ we generate the set by modeling a conditional probability
480
+ of x given two random vectors y and z. y (y ∼ py(y)) is
481
+ a probability vector that represents a label, where py(y) is
482
+ an estimation of the true labeled distribution p(ys) of the
483
+ source domain. z (z ∼ pz(z)) is a low-dimensional noise,
484
+ where pz(z) is a random distribution describing the source
485
+ data points. Thus, we reformulate the goal as to estimate the
486
+ conditional distribution of source data p(x | y, z) instead of
487
+ the distribution p(x).
488
+ After obtaining the conditional distribution of source data
489
+ p(x | y, z) from SDG stage, it becomes a UniDA task but
490
+ now with synthetic source domain. Our second goal is to align
491
+ distributions of the synthetic source domain and target domain
492
+ in the technical challenges of domain gap and category gap. A
493
+ synthetic source domain and a target domain are represented
494
+ by Df =
495
+ ��
496
+ xi
497
+ f, yi
498
+ f
499
+
500
+ ∼ p(x | y, z)
501
+ �nf
502
+ i=1 sampled from condi-
503
+ tional distribution p(x | y, z) and Dt =
504
+ ��
505
+ xi
506
+ t
507
+
508
+ ∼ q(x)
509
+ �nt
510
+ i=1
511
+ sampled from target distribution q(x), respectively. We denote
512
+ by Yf (Yt) the label set of the synthetic source (target) domain.
513
+ The shared label set is denoted by Y = Yf ∩ Yt. The private
514
+ label sets of the source and target domain are represented by
515
+ Yf = Yf\Y and Yt = Yt\Y , respectively. The Jaccard index
516
+ of the label sets of the two domains, ξ =
517
+ |Y |
518
+ |Yf ∪Yt|, is used to
519
+ measure the overlap in classes.
520
+ For UniDA setting with source data (MA), the real source
521
+ domain Ds =
522
+ ��
523
+ xi
524
+ s, yi
525
+ s
526
+
527
+ ∼ p(x)
528
+ �ns
529
+ i=1 is available. Thus, only
530
+ the MA stage is used to align distributions of the real source
531
+ domain and target domain in the technical challenges of
532
+ UniDA.
533
+ B. Source Data Generation
534
+ Source data generation includes two modules, conditional
535
+ probability generation module and data diversity module.
536
+ Specifically, firstly, conditional probability generation module
537
+ is presented to prove that the conditional distribution of source
538
+ data p(x | y, z) can be estimated by estimating the categorical
539
+ likelihood p(y | x) and the property likelihood p(z | x).
540
+
541
+ IEEE TRANSACTIONS ON GEOSCIENCE AND REMOTE SENSING
542
+ 5
543
+ Secondly, in order to generate a reliable source domain for
544
+ UniDA, the generated data xf must meet two conditions: 1) in
545
+ data content, all category distributions in the pre-trained model
546
+ M can be restored, including source-share and source-private
547
+ category distributions, and 2) in data style, the generated data
548
+ can remain similar to the target domain style distribution.
549
+ Thus, to meet these two conditions, a data diversity module
550
+ is proposed to ensure the data diversity of the generated
551
+ source domain. In addition, different schemes of data diversity
552
+ generation are compared in Section IV-C.
553
+ 1) Conditional Probability Generation Module: Recall that
554
+ y (y ∼ py(y)) and z (z ∼ pz(z)) are a probability vector of a
555
+ source distribution and a low-dimensional noise, respectively.
556
+ The variables y and z are conditionally independent of each
557
+ other given source data x, since they both depend on x but
558
+ have no direct interactions. In order to generate a reliable and
559
+ balanced source domain Df, the probability of each sampled
560
+ point x is 1/|Df|, and the probability at any other point is
561
+ zero. Thus, Df = {arg maxxp(x | y, z)}. Based on Bayesian
562
+ theory [31], [53], the arg maxxp(x | y, z) can be expressed as
563
+ follows:
564
+ arg max
565
+ x
566
+ p(x | y, z)
567
+ = arg max
568
+ x (log p(y | x, z) + log p(x | z) − log p(y | z))
569
+ = arg max
570
+ x (log p(y | x) + log p(y | z)
571
+ + log p(x | z) − log p(y | z))
572
+ = arg max
573
+ x (log p(y | x) + log p(x | z))
574
+ = arg max
575
+ x (log p(y | x) + log p(z | x)
576
+ + log p(x) − log p(z))
577
+ ≈ arg max
578
+ x (log p(y | x) + log p(z | x)).
579
+ (1)
580
+ In this way, the distribution p(x | y, z) can be estimated by
581
+ estimating the categorical likelihood p(y | x) of the variable
582
+ y given x and the property likelihood p(z | x) of the variable
583
+ z given x. Thus, as shown in the ‘Source Data Generation’
584
+ module in Fig. 2, a generator G is designed to obtain the
585
+ empirical distribution p(x | y, z) by combining y and z
586
+ randomly sampling from the distributions py(y) and pz(z).
587
+ In our experiments, we set py(y) to the random categorical
588
+ distribution of source domain that produces one-hot vectors
589
+ as y, and pz(z) to the multivariate Gaussian distribution that
590
+ produces standard normal vectors as z.
591
+ 2) Data Diversity Module: First, in order to recover the
592
+ data content from the pre-trained model M, a classifier loss
593
+ ℓcls is designed. Specifically, given a sampled class vector y
594
+ and a sampled noise vector z as inputs, G is trained to produce
595
+ a synthetic source domain sample that M is likely to classify
596
+ as ¯y. The classifier loss can force the generated data to follow
597
+ the similar class distribution from model M, by minimizing
598
+ the distance between y and ¯y, which can be formulated as
599
+ follows:
600
+ ℓcls(y, ¯y) = −
601
+
602
+ i∈Yf
603
+ yi log M(G(y, z))i.
604
+ (2)
605
+ Notably, y and ¯y are not scalars but probability vectors of
606
+ length Yf. Thus, the cross-entropy between two probability
607
+ distributions is utilized to measure the distance between y and
608
+ ¯y.
609
+ However, the classifier loss ℓcls easily leads to generate
610
+ similar data points for each class in the synthetic source
611
+ domain. Furthermore, it is necessary for domain adaptation
612
+ to transfer synthetic source images to the target style. A
613
+ style loss ℓstyle is presented to measure differences in style
614
+ between a synthetic source image xf and a target image xt.
615
+ The style of remote sensing images represents colors, textures,
616
+ edges, common patterns, and other image style descriptions.
617
+ Concretely, we make use of a 16-layer VGG network pre-
618
+ trained on the ImageNet [54] to measure multi-scale feature
619
+ style differences between images, which can be described as:
620
+ ℓstyle(xf, xt) =
621
+ 4
622
+
623
+ j=1
624
+ ���Gφ
625
+ j (xf) − Gφ
626
+ j (xt)
627
+ ���
628
+ 2
629
+ F ,
630
+ (3)
631
+
632
+ j (x) =
633
+ 1
634
+ CjHjWj
635
+ Hj
636
+
637
+ h=1
638
+ Wj
639
+
640
+ w=1
641
+ φj(x)c,h,wφT
642
+ j (x)c,h,w,
643
+ (4)
644
+ where φj(x) is the activation at the jth layer of the style loss
645
+ network, and is a feature map of shape Cj ×Hj ×Wj. Gφ
646
+ j (x)
647
+ denotes a Gram matrix that is equal to the average value of the
648
+ product of the feature and the transposition of the feature. The
649
+ Gram matrix can grasp the general style of the entire image.
650
+ The style loss ℓstyle(xf, xt) is the squared Frobenius norm of
651
+ the difference between the Gram matrices of synthetic source
652
+ image xf and target image xt. In addition, different layers
653
+ have different feature styles in the VGG network. Therefore,
654
+ we sum the Gram matrices difference for each of the four
655
+ activation layers in the VGG-16.
656
+ C. Model Adaptation
657
+ The objective of MA is to update the pre-trained model M,
658
+ which distinguishes samples from the target shared label set
659
+ Y and those in the target private label set Yt. One important
660
+ challenge for UniDA is detecting transferable samples. In
661
+ order to address this challenge, the sample transferable weight
662
+ wf(xf) or wt(xt) is utilized during the training stage to
663
+ estimate the confidence that xf or xt is from the shared
664
+ label set. Furthermore, during the testing stage, we use the
665
+ transferable weight as a decision threshold w0 to decide
666
+ whether we should predict a class or mark the sample as
667
+ “Unknown,” a designation that represents all labels unseen
668
+ during training. This is expressed as:
669
+ y(xt) =
670
+ � Class
671
+ wt(xt) > w0
672
+ Unknown
673
+ otherwise.
674
+ (5)
675
+ 1) The Transferable Weight: The transferable weight is de-
676
+ rived from uncertainty and domain similarity. Similar to [22],
677
+ [55], the domain similarity d(x) is obtained by the non-
678
+ adversarial domain discriminator D′. The d(x) term can be
679
+ seen as the quantification of the similarity of target domain
680
+ samples to the synthetic source domain samples. In particular,
681
+ a smaller d(xf) for a synthetic source sample and a larger
682
+ d(xt) for a target sample mean that they are more likely to be
683
+ in the shared label set.
684
+
685
+ IEEE TRANSACTIONS ON GEOSCIENCE AND REMOTE SENSING
686
+ 6
687
+ On the other hand, we adopt the assumption that the target
688
+ data in Y have a lower uncertainty than target data in Yt.
689
+ Thus, in order to further separate target samples from the
690
+ shared label set and those from the private label, a well-
691
+ defined criterion can be used to distinguish different degrees
692
+ of uncertainty. However, uncertainty is usually measured by
693
+ entropy [22], [33], which lacks discriminability for uncertainty
694
+ when the categorical distributions are relatively uniform [24].
695
+ The confidence of predicted probabilities ¯y(x) is a better
696
+ measure when the generated categories of source samples are
697
+ relatively uniform. Digging the confidence further, as private
698
+ label sets of synthetic source Y f have no intersection with
699
+ shared label sets Y , samples from p(xf, yf | yf ∈ Y f) are not
700
+ influenced by the target data and keeps the highest certainty.
701
+ In addition, the target samples that are more similar to the
702
+ source domain samples are more likely to be in the shared label
703
+ set. Different schemes of the transferable weight are further
704
+ compared and analyzed in Section IV-C.
705
+ With the above analysis, it is reasonable to expect that:
706
+ E(xf ,yf )∈p|yf ∈Y f d(xf) > E(xf ,yf )∈p|yf ∈Y d(xf)
707
+ > E(xt,yt)∈q|yt∈Y d(xt) > E(xt,yt)∈q|yt∈Y td(xt),
708
+ (6)
709
+ E(xf ,yf )∈p|yf ∈Y f max ¯y(xf) > E(xf ,yf )∈p|yf ∈Y max y(xf)
710
+ > E(xt,yt)∈q|yt∈Y max ¯y(xt) > E(xt,yt)∈q|yt∈Y t max ¯y(xt).
711
+ (7)
712
+ Thus, the sample-level transferable weight for synthetic source
713
+ data points and target data points can be respectively defined
714
+ as:
715
+ wf(x) = −d(x) − max ¯y(x),
716
+ (8)
717
+ wt(x) = d(x) + max ¯y(x).
718
+ (9)
719
+ Note that d(x) ∈ [0, 1] and max ¯y(x) ∈ [0, 1] by the max-min
720
+ normalization. The weights are also normalized into interval
721
+ [0, 1] during training.
722
+ 2) Domain Adaptation: To perform domain adaptation dur-
723
+ ing the training stage, the objective function aims to move the
724
+ target samples with higher transferable weight towards positive
725
+ source categories Y . To achieve this, input x from either do-
726
+ main is fed into the feature extractor F, as shown in Fig. 2. The
727
+ extracted features F(x) is forwarded into the label classifier C
728
+ and the non-adversarial domain discriminator D′, to obtain the
729
+ transferable weights wf and wt. The extracted feature F(x)
730
+ is forwarded into the adversarial domain discriminator D to
731
+ adversarially align the feature distributions of the generated
732
+ source and target data falling in the shared label set. Thus, the
733
+ adversarial loss function for adaptation is defined as:
734
+ ℓadv = − Ex∼pwf(x) log D(F(x))
735
+ − Ex∼qwt(x) log(1 − D(F(x))).
736
+ (10)
737
+ Adversarially, the feature extractor F strives to confuse D.
738
+ Thus, domain-invariant features in the shared label set are ob-
739
+ tained. In order to train the classifier C on the synthetic source
740
+ domain with labels, the cross-entropy loss is the following:
741
+ ℓf
742
+ ce = E(xf ,yf )∼pL(yf, C(F(xf))),
743
+ (11)
744
+ where L is the standard cross-entropy loss. Furthermore, to
745
+ better reflect domain similarity, we predict samples from the
746
+ synthetic source domain as 1 and samples from the target
747
+ domain as 0. Thus, similar to [22], [55], a binary cross-entropy
748
+ loss is used to train non-adversarial domain discriminator D′.
749
+ ℓsimi = − E(xf ,yf )∼pL(1, D′(F(xf)))
750
+ − E(xt,yt)∼qL(0, D′(F(xt))).
751
+ (12)
752
+ Algorithm 1 Optimization of UniDA without source data
753
+ Require: Pre-trained model M on the source domain, unla-
754
+ beled data Xt in the target domain, batch size B;
755
+ Ensure: Classification model M of the shared classes Y and
756
+ the unknown class in target domain;
757
+ I. Source data generation stage:
758
+ 1: for epochSDG = 1 to epochSDG,max do
759
+ 2:
760
+ Fix the pre-trained model M and the style loss network
761
+ (VGG-16); Randomly sample xt of size B from Xt;
762
+ 3:
763
+ for each mini-batch do
764
+ 4:
765
+ Generate source data xf by G, which combines
766
+ categorical vectors y (y
767
+ ∼ py(y)) and standard
768
+ normal vectors z (z ∼ pz(z));
769
+ 5:
770
+ Train G by minθg(ℓcls(y, M(xf)) + ℓstyle(xf, xt));
771
+ 6:
772
+ end for
773
+ 7: end for
774
+ II. Model adaptation stage:
775
+ 8: if starting adaptation then
776
+ 9:
777
+ for epochMA = 1 to epochMA,max do
778
+ 10:
779
+ Randomly sample xt of size B from Xt and generate
780
+ xf of size B by G;
781
+ 11:
782
+ for each mini-batch do
783
+ 12:
784
+ wf
785
+ and
786
+ wt
787
+ are
788
+ obtained
789
+ by
790
+ C(F(x))
791
+ and
792
+ D′(F(x));
793
+ 13:
794
+ Train D by maxθd(−ℓadv);
795
+ 14:
796
+ Train F and C by minθf ,θc(ℓf
797
+ ce − ℓadv);
798
+ 15:
799
+ Train D′ by minθd′ (ℓsimi);
800
+ 16:
801
+ end for
802
+ 17:
803
+ end for
804
+ 18: end if
805
+ D. Optimization
806
+ Algorithm 1 depicts the optimization flow of UniDA with-
807
+ out source data procedure, which consists of two independent
808
+ stages. θg, θf, θc, θd, and θd′ are parameters of G, F, C,
809
+ D, and D′, respectively. First, the SDG stage estimates the
810
+ conditional distribution p(x | y, z) of source data from the
811
+ pre-trained model M. Thus, we train generator G via the
812
+ data diversity module, and combine them as a single objective
813
+ function:
814
+ ℓ(θg) = min
815
+ θg (ℓcls(y, M(xf)) + ℓstyle(xf, xt)).
816
+ (13)
817
+ Second, the training of the MA stage can be written as a
818
+ minimax game:
819
+ ℓ(θd, θf, θc) = max
820
+ θd
821
+ min
822
+ θf ,θc(ℓf
823
+ ce − ℓadv),
824
+ (14)
825
+ ℓ(θd′) = minθd′ (ℓsimi).
826
+ (15)
827
+ The gradient reversal layer [56] is used to reverse the gradient
828
+ between F and D to optimize the MA stage in an end-to-end
829
+ training framework.
830
+
831
+ IEEE TRANSACTIONS ON GEOSCIENCE AND REMOTE SENSING
832
+ 7
833
+ IV. EXPERIMENTS
834
+ A. Experimental setup
835
+ 1) Datasets:
836
+ To verify our algorithm, we select the
837
+ RSSCN7, UC Merced, AID, and NWPU-RESISC45 to build
838
+ the cross-domain remote sensing image scene datasets. Specif-
839
+ ically, the RSSCN7 dataset [57] contains 2800 remote sensing
840
+ scene images, which are from seven typical scene categories.
841
+ There are 400 images in each scene type, and each image has
842
+ a size of 400×400 pixels. The UC Merced dataset [58] is
843
+ widely used for remote sensing image scene classification. It
844
+ consists of 2100 remote sensing images from 21 scene classes.
845
+ Each scene class contains 100 RGB images with an image size
846
+ of 256×256 pixels. The AID dataset [59] is a large-scale
847
+ aerial image dataset acquired from Google Earth. It contains
848
+ 10,000 images with a size of 600×600 pixels, which are
849
+ divided into 30 classes. The NWPU-RESISC45 dataset [60]
850
+ consists of 31,500 remote sensing images divided into 45 scene
851
+ classes. Each class includes 700 images with a size of 256×256
852
+ pixels. The spatial resolution varies from about 30 m to 0.2
853
+ m for most of the scene classes.
854
+ As shown in Table I, four UniDA tasks for remote sensing
855
+ scene classification are established. Specifically, the RSSCN7
856
+ dataset is suitable as the source domain because of its small
857
+ number of categories. Thus, three cross-domain scenarios
858
+ are conducted: RSSCN7 → UCM, RSSCN7 → AID, and
859
+ RSSCN7 → NWPU. For RSSCN7 → UCM, we use the five
860
+ public categories as the shared label set—namely farmland,
861
+ forests, dense residential areas, rivers, and parking lot—the
862
+ remaining two as the private source label set, and the re-
863
+ maining sixteen of UC Merced as the private target label
864
+ set. For RSSCN7 → AID and RSSCN7 → NWPU, we use
865
+ the six public categories as the shared label set (the five
866
+ previously enumerated plus industries). In addition, a fourth,
867
+ more complex UniDA task with a higher Jaccard index, AID
868
+ → NWPU, is carried out. In this setting, we use the twenty
869
+ public categories as the shared label set, and the rest of the
870
+ AID and NWPU datasets as the private target label sets. Some
871
+ sample images of shared label sets from these four datasets
872
+ are shown in Fig. 3.
873
+ 2) Evaluation Protocol: The model is tested only on sam-
874
+ ples from the target domain; all the target-private classes are
875
+ grouped into a single “Unknown” class. Specifically, during
876
+ the testing stage of MA, if the target sample’s transferable
877
+ weight is lower than a predetermined threshold w0, the input
878
+ image is classified as “Unknown.” Thus, the average of per-
879
+ class accuracy for all classes, including the shared classes and
880
+ the “Unknown” class, is the final result. Note that we run each
881
+ experiment three times and report the average results.
882
+ 3) Implementation Details:
883
+ All experiments are imple-
884
+ mented in Pytorch [61]. In the setting of the SDG stage, we use
885
+ the standard normal vector z of length 10 in all experiments.
886
+ The generator G is similar to that of ACGAN [62], which
887
+ consists of two fully connected layers followed by seven trans-
888
+ posed convolutional layers (the number of convolution kernels
889
+ is all four) with batch normalization after each layer. The size
890
+ of the generated image xf is 3×256×256. Adam [63] with a
891
+ learning rate of 0.001 is used for the generator. In addition, we
892
+ Fig. 3.
893
+ Some sample images of five shared categories extracted from four
894
+ datasets. Top row to the bottom row are RSSCN7 dataset, UC Merced dataset,
895
+ AID dataset, and NWPU-RESISC45 dataset, respectively.
896
+ compute style reconstruction loss at layers relu1 2, relu2 2,
897
+ relu3 3, and relu4 3 of the VGG-16 style loss network. For
898
+ the model pre-trained on source data, it consists of a feature
899
+ extractor F and a classifier network C. A ResNet-50 model
900
+ with initial weights trained on ImageNet [64] is used as the
901
+ backbone of the feature extractor. The classifier network is a
902
+ fully connected network with a single layer. The cross-entropy
903
+ loss is utilized to pre-train the model on source data. The
904
+ stochastic gradient descent (SGD) with a learning rate of 0.001
905
+ and momentum of 0.9 is used for the model pre-trained on
906
+ source data. Furthermore, the classification accuracy between
907
+ the predictions of the generated data xf and the given label
908
+ y is used to compute the recoverability of the categories in
909
+ the pre-trained model. After the SDG stage, the generator G
910
+ with the highest classification accuracy is utilized for the MA
911
+ stage.
912
+ In the setting of the MA stage, the pre-trained model from
913
+ source data is used to initialize the feature extractor F and the
914
+ classifier network C. In addition, The discriminators D and D′
915
+ consist of three fully connected layers with ReLU between
916
+ the first two. We train F, C, D, and D′ for 40000 iterations
917
+ with Nesterov momentum SGD. The initial learning rate is set
918
+ to 0.001, which is decayed using the same schedule as [56].
919
+ During the testing stage, when the Jaccard index ξ ≥ 0.2 (AID
920
+ → NWPU), the decision threshold w0 = 0.6. Otherwise, w0
921
+ is set to 0.8.
922
+ 4) Methods to Be Compared: We compare the performance
923
+ of the proposed UniDA (with and without source data) with
924
+ the following methods.
925
+ • Source-only: source-only is only trained on the real source
926
+ data, and directly tested on the target domain based on the
927
+ trained model and the target transferable weight.
928
+ • UDA [22]: UDA is proposed to first introduce the universal
929
+ DA setting in computer vision, which is a method with
930
+ using source data. To discover the shared label sets and the
931
+ private label sets to each domain, the transferable weights
932
+
933
+ RSSCN7
934
+ UCM
935
+ AID
936
+ NWPU
937
+ Dense residential
938
+ Parking lot
939
+ Farmland
940
+ Forests
941
+ RiversIEEE TRANSACTIONS ON GEOSCIENCE AND REMOTE SENSING
942
+ 8
943
+ TABLE I
944
+ FOUR UNIDA TASKS FOR REMOTE SENSING SCENE CLASSIFICATION
945
+ RSSCN7 → UCM
946
+ Total label sets
947
+ Shared label sets
948
+ Private label sets
949
+ ξ
950
+ Source domain: RSSCN7 dataset
951
+ 7
952
+ 5
953
+ 2
954
+ 0.18
955
+ Target domain: UC Merced dataset
956
+ 21
957
+ 5
958
+ 16
959
+ RSSCN7 → AID
960
+ Total label sets
961
+ Shared label sets
962
+ Private label sets
963
+ ξ
964
+ Source domain: RSSCN7 dataset
965
+ 7
966
+ 6
967
+ 1
968
+ 0.16
969
+ Target domain: AID dataset
970
+ 30
971
+ 6
972
+ 24
973
+ RSSCN7 → NWPU
974
+ Total label sets
975
+ Shared label sets
976
+ Private label sets
977
+ ξ
978
+ Source domain: RSSCN7 dataset
979
+ 7
980
+ 6
981
+ 1
982
+ 0.12
983
+ Target domain: NWPU-RESISC45 dataset
984
+ 45
985
+ 6
986
+ 39
987
+ AID → NWPU
988
+ Total label sets
989
+ Shared label sets
990
+ Private label sets
991
+ ξ
992
+ Source domain: AID dataset
993
+ 30
994
+ 20
995
+ 10
996
+ 0.27
997
+ Target domain: NWPU-RESISC45 dataset
998
+ 45
999
+ 20
1000
+ 25
1001
+ TABLE II
1002
+ CLASSIFICATION ACCURACY OF DIFFERENT METHODS ON RSSCN7 → UC MERCED (%).
1003
+ UniDA with source data
1004
+ RSSCN7 → UCM
1005
+ Category
1006
+ Methods
1007
+ Farmland
1008
+ Forests
1009
+ Dense residential
1010
+ Rivers
1011
+ Parking
1012
+ Unknown
1013
+ Avg Shared
1014
+ Avg
1015
+ Source-only
1016
+ 93.00
1017
+ 98.00
1018
+ 42.00
1019
+ 60.00
1020
+ 67.00
1021
+ 1.63
1022
+ 72.00
1023
+ 60.27
1024
+ I-UAN [23]
1025
+ 92.00
1026
+ 97.00
1027
+ 72.00
1028
+ 70.00
1029
+ 30.00
1030
+ 11.63
1031
+ 72.20
1032
+ 62.10
1033
+ UDA [22]
1034
+ 87.00
1035
+ 98.00
1036
+ 83.00
1037
+ 84.00
1038
+ 68.00
1039
+ 1.13
1040
+ 84.00
1041
+ 70.19
1042
+ CMU [24]
1043
+ 89.00
1044
+ 99.00
1045
+ 68.00
1046
+ 78.00
1047
+ 100.00
1048
+ 12.25
1049
+ 86.80
1050
+ 74.38
1051
+ MA
1052
+ 85.00
1053
+ 98.00
1054
+ 74.00
1055
+ 79.00
1056
+ 100.00
1057
+ 14.63
1058
+ 87.20
1059
+ 75.11
1060
+ UniDA without source data
1061
+ MA-only
1062
+ 77.00
1063
+ 13.00
1064
+ 55.00
1065
+ 69.00
1066
+ 77.00
1067
+ 0.44
1068
+ 58.20
1069
+ 48.57
1070
+ SDG-MA w/o d
1071
+ 60.00
1072
+ 55.00
1073
+ 31.00
1074
+ 86.00
1075
+ 86.00
1076
+ 4.38
1077
+ 63.60
1078
+ 53.73
1079
+ SDG-MA w/o y
1080
+ 90.00
1081
+ 56.00
1082
+ 28.00
1083
+ 70.00
1084
+ 100.00
1085
+ 0.19
1086
+ 68.80
1087
+ 57.36
1088
+ SDG-MA
1089
+ 92.00
1090
+ 64.00
1091
+ 63.00
1092
+ 76.00
1093
+ 93.00
1094
+ 17.13
1095
+ 77.60
1096
+ 67.52
1097
+ are defined based on domain similarity and entropy.
1098
+ • I-UAN [23]: an improved universal adaptation network (I-
1099
+ UAN) is a UniDA method with source data. In I-UAN, the
1100
+ transferable weight of the source domain is defined based
1101
+ on a pseudo-margin vector (maximum predicted probability
1102
+ minus second highest predicted probability) to distinguish
1103
+ the shared label set. The sample-wise transferable weight of
1104
+ the target domain is proposed based on the confidence to
1105
+ distinguish the shared and private label sets in target domain.
1106
+ • CMU [24]: calibrated multiple uncertainties (CMU) is pro-
1107
+ posed, with a novel approach in which transferable weights
1108
+ are estimated by a mixture of complementary uncertainty
1109
+ quantities: entropy, confidence, and consistency. CMU is a
1110
+ UniDA method with real source data.
1111
+ • MA-only: MA-only uses the initialized generator G to
1112
+ generate source data. The generator is initialized randomly.
1113
+ Then, MA is performed between the synthetic source data
1114
+ and the target data.
1115
+ B. Experimental Results
1116
+ 1) Results on RSSCN7 → UCM: Our first experiment is
1117
+ conducted on RSSCN7 → UCM, including two cases using
1118
+ UniDA with source data and UniDA without source data. The
1119
+ results are listed in Table II. From Table II, in the UniDA
1120
+ setting with source data, it can be seen that the accuracy of all
1121
+ methods improves compared to source-only. This phenomenon
1122
+ illustrates that a domain shift appears in RSSCN7 and UCM
1123
+ datasets. Furthermore, in the UniDA with source data setting,
1124
+ our proposed MA achieves much better performance than
1125
+ all the other baselines, with an average accuracy of 75.11%.
1126
+ In particular, the average accuracy of shared label sets and
1127
+ all label sets improves by 0.4% and 0.73%, respectively,
1128
+ compared with the best baseline CMU [24]. These findings
1129
+ demonstrate that the proposed sample-level transferable weight
1130
+ in MA, including confidence and domain similarity, is more
1131
+ efficient than entropy in UDA [22], pseudo-margin vector
1132
+ in I-UAN [23], and the mixture of entropy, confidence, and
1133
+ consistency in CMU [24] for remote sensing image scene
1134
+ classification.
1135
+ In the second case of UniDA without source data, we
1136
+ observe that our proposed SDG-MA framework significantly
1137
+ outperforms the MA-only method by 18.95% on the average
1138
+ accuracy of all label sets. It is obvious that the proposed
1139
+ source data generation is effective and practical in the UniDA
1140
+ setting without source data of remote sensing images. Notably,
1141
+ compared with the MA, our SDG-MA maintains a more
1142
+ prominent performance in the “Unknown” class. It has been
1143
+ demonstrated that data points generated by the SDG effectively
1144
+ cover the distribution of the source data.
1145
+ 2) Results on RSSCN7 → AID: Our second experiment is
1146
+ conducted on RSSCN7 → AID; results are shown in Table III.
1147
+
1148
+ IEEE TRANSACTIONS ON GEOSCIENCE AND REMOTE SENSING
1149
+ 9
1150
+ Fig. 4.
1151
+ Feature visualization on RSSCN7 → UC Merced. For domain, blue and green represents the real source domain and synthetic source domain,
1152
+ respectively. Red refers to the target domain. For category, yellow plots are “unknown” samples, others are “known” samples.
1153
+ Fig. 5. Feature visualization on AID → NWPU. For domain, blue and green represents the real source domain and synthetic source domain, respectively.
1154
+ Red refers to the target domain. For category, yellow plots are “unknown” samples, others are “known” samples.
1155
+ (a) Threshold parameter w0 on RSSCN7 → UC
1156
+ Merced
1157
+ (b) Threshold parameter w0 on AID → NWPU (c) Size of shared label sets on AID →
1158
+ NWPU
1159
+ Fig. 6. Decision threshold analysis for the parameters w0 and varying size of shared label sets Y .
1160
+
1161
+ 40
1162
+ 40 -
1163
+ 40 -
1164
+ 30
1165
+ 20-
1166
+ 20.
1167
+ 20
1168
+ 10.
1169
+ 0
1170
+ Domain
1171
+ -10
1172
+ -20
1173
+ -20
1174
+ 30
1175
+ -40
1176
+ 40
1177
+ -40
1178
+ -20
1179
+ 20
1180
+ 40
1181
+ 40
1182
+ -20
1183
+ 20
1184
+ -40
1185
+ -20
1186
+ 20
1187
+ 30
1188
+ 30
1189
+ 30
1190
+ 20
1191
+ 20
1192
+ 20
1193
+ 10
1194
+ 10-
1195
+ 10 -
1196
+ Category
1197
+ F 0
1198
+ 10
1199
+ -10
1200
+ -20
1201
+ 20
1202
+ -30
1203
+ 20
1204
+ -30
1205
+ 30
1206
+ -20
1207
+ -10
1208
+ 10
1209
+ 20
1210
+ 30
1211
+ 0
1212
+ 10
1213
+ 20
1214
+ 30
1215
+ -30
1216
+ -20
1217
+ -10
1218
+ 10
1219
+ 30
1220
+ (a) Source only
1221
+ (b) UniDA with source data
1222
+ (c) UniDA without source data
1223
+ (MA)
1224
+ (SDG-MA)60
1225
+ 40
1226
+ 20
1227
+ Domain
1228
+ 20
1229
+ -20
1230
+ 20
1231
+ 40
1232
+ 30
1233
+ 20
1234
+ 20
1235
+ Category
1236
+ -10
1237
+ 20
1238
+ -60
1239
+ 20
1240
+ 20
1241
+ (a) Source only
1242
+ (b) UniDA with source data
1243
+ (c) UniDA without source data
1244
+ (MA)
1245
+ (SDG-MA)100
1246
+ Target domain
1247
+ 90
1248
+ - Target-unkonwn
1249
+ 80
1250
+ 70
1251
+ (%)
1252
+ 60
1253
+ Accuracy
1254
+ 50
1255
+ 40
1256
+ 30
1257
+ 20
1258
+ 10
1259
+ 0
1260
+ 0.2
1261
+ 0.4
1262
+ 0.6
1263
+ 0.8
1264
+ 1.2
1265
+ 0
1266
+ 1
1267
+ 1.4
1268
+ 1.6
1269
+ 1.8
1270
+ 2100
1271
+ -Target domain
1272
+ 90
1273
+ -Target-unkonwn
1274
+ 80
1275
+ 70
1276
+ (%)
1277
+ 60
1278
+ Accuracy (
1279
+ 50
1280
+ 40
1281
+ 30
1282
+ 20
1283
+ 10
1284
+ 0
1285
+ 0.2
1286
+ 0.4
1287
+ 0.6
1288
+ 0.8
1289
+ 1.2
1290
+ 0
1291
+ 1
1292
+ 1.4
1293
+ 1.6
1294
+ 1.8
1295
+ 2100
1296
+ 90
1297
+ Target domain
1298
+ -Target-unkonwn
1299
+ 80
1300
+ 70
1301
+ 60
1302
+ 50
1303
+ 40
1304
+ 30
1305
+ 20
1306
+ 10
1307
+ 0
1308
+ 0
1309
+ 5
1310
+ 10
1311
+ 15
1312
+ 20IEEE TRANSACTIONS ON GEOSCIENCE AND REMOTE SENSING
1313
+ 10
1314
+ TABLE III
1315
+ CLASSIFICATION ACCURACY OF DIFFERENT METHODS ON RSSCN7 → AID (%).
1316
+ UniDA with source data
1317
+ RSSCN7 → AID
1318
+ Category
1319
+ Avg Shared
1320
+ Avg
1321
+ Mehods
1322
+ Farmland
1323
+ Forests
1324
+ Dense residential
1325
+ Rivers
1326
+ Parking
1327
+ Industries
1328
+ Unknown
1329
+ Source-only
1330
+ 79.19
1331
+ 100.00
1332
+ 90.73
1333
+ 63.41
1334
+ 80.00
1335
+ 68.46
1336
+ 0.12
1337
+ 80.30
1338
+ 68.84
1339
+ I-UAN [23]
1340
+ 93.24
1341
+ 99.60
1342
+ 94.63
1343
+ 59.27
1344
+ 81.79
1345
+ 61.79
1346
+ 10.84
1347
+ 81.72
1348
+ 71.60
1349
+ UDA [22]
1350
+ 92.16
1351
+ 99.60
1352
+ 97.56
1353
+ 47.56
1354
+ 93.33
1355
+ 68.21
1356
+ 2.52
1357
+ 83.07
1358
+ 71.56
1359
+ CMU [24]
1360
+ 83.51
1361
+ 98.00
1362
+ 89.51
1363
+ 59.51
1364
+ 91.79
1365
+ 80.77
1366
+ 10.51
1367
+ 83.85
1368
+ 73.37
1369
+ MA
1370
+ 92.70
1371
+ 100.00
1372
+ 94.63
1373
+ 58.78
1374
+ 94.36
1375
+ 70.51
1376
+ 13.48
1377
+ 85.16
1378
+ 74.92
1379
+ UniDA without source data
1380
+ MA-only
1381
+ 91.89
1382
+ 16.00
1383
+ 55.37
1384
+ 73.41
1385
+ 56.67
1386
+ 59.49
1387
+ 0.36
1388
+ 58.81
1389
+ 50.46
1390
+ SDG-MA w/o d
1391
+ 92.70
1392
+ 93.60
1393
+ 61.22
1394
+ 47.32
1395
+ 99.49
1396
+ 56.92
1397
+ 2.92
1398
+ 75.21
1399
+ 64.88
1400
+ SDG-MA w/o y
1401
+ 90.00
1402
+ 67.20
1403
+ 71.22
1404
+ 77.56
1405
+ 92.31
1406
+ 35.38
1407
+ 6.11
1408
+ 72.28
1409
+ 62.83
1410
+ SDG-MA
1411
+ 97.84
1412
+ 69.20
1413
+ 78.78
1414
+ 37.32
1415
+ 96.92
1416
+ 62.05
1417
+ 17.93
1418
+ 73.69
1419
+ 65.72
1420
+ TABLE IV
1421
+ CLASSIFICATION ACCURACY OF DIFFERENT METHODS ON RSSCN7 → NWPU-RESISC45 (%).
1422
+ UniDA with source data
1423
+ RSSCN7 → NWPU
1424
+ Category
1425
+ Avg Shared
1426
+ Avg
1427
+ Methods
1428
+ Farmland
1429
+ Forests
1430
+ Dense residential
1431
+ Rivers
1432
+ Parking
1433
+ Industries
1434
+ Unknown
1435
+ Source-only
1436
+ 70.14
1437
+ 97.71
1438
+ 67.71
1439
+ 34.14
1440
+ 74.00
1441
+ 74.00
1442
+ 0.23
1443
+ 69.62
1444
+ 59.71
1445
+ I-UAN [23]
1446
+ 85.71
1447
+ 98.14
1448
+ 96.43
1449
+ 35.57
1450
+ 28.43
1451
+ 89.00
1452
+ 5.52
1453
+ 72.21
1454
+ 62.69
1455
+ UDA [22]
1456
+ 77.29
1457
+ 97.29
1458
+ 88.14
1459
+ 40.86
1460
+ 90.86
1461
+ 76.71
1462
+ 2.93
1463
+ 78.52
1464
+ 67.72
1465
+ CMU [24]
1466
+ 80.00
1467
+ 95.57
1468
+ 72.86
1469
+ 47.71
1470
+ 84.14
1471
+ 80.43
1472
+ 12.18
1473
+ 76.79
1474
+ 67.56
1475
+ MA
1476
+ 84.57
1477
+ 94.29
1478
+ 88.43
1479
+ 40.00
1480
+ 92.00
1481
+ 80.14
1482
+ 14.36
1483
+ 79.90
1484
+ 70.54
1485
+ UniDA without source data
1486
+ MA-only
1487
+ 83.29
1488
+ 0.00
1489
+ 10.00
1490
+ 0.00
1491
+ 36.57
1492
+ 24.00
1493
+ 22.04
1494
+ 25.64
1495
+ 25.13
1496
+ SDG-MA w/o d
1497
+ 91.43
1498
+ 37.29
1499
+ 78.57
1500
+ 59.71
1501
+ 76.14
1502
+ 76.57
1503
+ 1.21
1504
+ 69.95
1505
+ 60.13
1506
+ SDG-MA w/o y
1507
+ 93.14
1508
+ 52.14
1509
+ 39.43
1510
+ 37.86
1511
+ 81.86
1512
+ 42.43
1513
+ 12.94
1514
+ 57.81
1515
+ 51.40
1516
+ SDG-MA
1517
+ 91.86
1518
+ 88.00
1519
+ 86.57
1520
+ 28.00
1521
+ 84.86
1522
+ 65.86
1523
+ 25.20
1524
+ 74.19
1525
+ 67.19
1526
+ TABLE V
1527
+ CLASSIFICATION ACCURACY OF DIFFERENT METHODS ON AID→NWPU (%). FA.: FARMLAND, FO.: FOREST, DR: DENSE RESIDENTIAL, RI.: RIVER,
1528
+ PA.: PARKING, IN.: INDUSTRIAL, BE.: BEACH, MR: MEDIUM RESIDENTIAL, SR: SPARSE RESIDENTIAL, AI.: AIRPORT, BR.: BRIDGE, BA.:
1529
+ BASEBALLFIELD, CH.: CHURCH, DE.: DESERT, ME.: MEADOW, MO.: MOUNTAIN, RS: RAILWAY STATION, ST.: STADIUM, ST: STORAGE TANKS, CO.:
1530
+ COMMERCIAL.
1531
+ UniDA with source data
1532
+ AID→NWPU
1533
+ Category
1534
+ Avg Shared
1535
+ Avg
1536
+ Methods
1537
+ Fa.
1538
+ Fo.
1539
+ DR
1540
+ Ri.
1541
+ Pa.
1542
+ In.
1543
+ Be.
1544
+ MR
1545
+ SR
1546
+ Ai.
1547
+ Br.
1548
+ Ba.
1549
+ Ch.
1550
+ De.
1551
+ Me.
1552
+ Mo.
1553
+ RS
1554
+ St.
1555
+ ST
1556
+ Co.
1557
+ Unknown
1558
+ Source-only
1559
+ 89.00
1560
+ 86.00
1561
+ 50.71
1562
+ 66.00
1563
+ 78.14
1564
+ 16.57
1565
+ 0.00
1566
+ 66.71
1567
+ 78.86
1568
+ 62.43
1569
+ 0.00
1570
+ 0.00
1571
+ 78.43
1572
+ 89.86
1573
+ 75.43
1574
+ 93.43
1575
+ 0.00
1576
+ 0.00
1577
+ 93.57
1578
+ 54.57
1579
+ 0.01
1580
+ 53.99
1581
+ 51.42
1582
+ I-UAN [23]
1583
+ 96.00
1584
+ 96.29
1585
+ 78.86
1586
+ 74.86
1587
+ 86.29
1588
+ 75.86
1589
+ 94.86
1590
+ 83.00
1591
+ 86.57
1592
+ 51.00
1593
+ 90.29
1594
+ 78.71
1595
+ 83.43
1596
+ 80.71
1597
+ 88.43
1598
+ 81.71
1599
+ 84.14
1600
+ 81.00
1601
+ 95.29
1602
+ 57.00
1603
+ 10.52
1604
+ 82.21
1605
+ 78.80
1606
+ UDA [22]
1607
+ 91.71
1608
+ 92.57
1609
+ 78.29
1610
+ 71.29
1611
+ 81.14
1612
+ 77.29
1613
+ 91.57
1614
+ 70.00
1615
+ 83.00
1616
+ 45.14
1617
+ 81.29
1618
+ 74.57
1619
+ 73.29
1620
+ 78.71
1621
+ 80.14
1622
+ 85.43
1623
+ 82.14
1624
+ 50.00
1625
+ 88.43
1626
+ 37.43
1627
+ 2.57
1628
+ 75.67
1629
+ 72.19
1630
+ CMU [24]
1631
+ 89.57
1632
+ 83.86
1633
+ 80.43
1634
+ 76.43
1635
+ 84.00
1636
+ 71.00
1637
+ 88.57
1638
+ 79.29
1639
+ 87.00
1640
+ 39.00
1641
+ 86.71
1642
+ 73.29
1643
+ 74.00
1644
+ 72.00
1645
+ 75.57
1646
+ 89.71
1647
+ 87.43
1648
+ 60.43
1649
+ 94.00
1650
+ 54.14
1651
+ 13.81
1652
+ 77.32
1653
+ 74.30
1654
+ MA
1655
+ 93.86
1656
+ 87.43
1657
+ 64.14
1658
+ 78.57
1659
+ 89.00
1660
+ 83.43
1661
+ 95.43
1662
+ 82.57
1663
+ 88.00
1664
+ 58.00
1665
+ 94.71
1666
+ 79.00
1667
+ 76.29
1668
+ 79.86
1669
+ 91.57
1670
+ 70.71
1671
+ 84.86
1672
+ 46.00
1673
+ 92.86
1674
+ 60.14
1675
+ 14.11
1676
+ 79.82
1677
+ 76.69
1678
+ UniDA without source data
1679
+ MA-only
1680
+ 0.29
1681
+ 0.00
1682
+ 0.00
1683
+ 0.14
1684
+ 6.29
1685
+ 0.00
1686
+ 6.71
1687
+ 0.00
1688
+ 0.00
1689
+ 14.86
1690
+ 4.14
1691
+ 0.00
1692
+ 0.00
1693
+ 0.00
1694
+ 0.00
1695
+ 0.00
1696
+ 1.86
1697
+ 0.00
1698
+ 85.14
1699
+ 0.00
1700
+ 30.83
1701
+ 5.97
1702
+ 7.16
1703
+ SDG-MA w/o d
1704
+ 70.71
1705
+ 63.29
1706
+ 51.71
1707
+ 62.57
1708
+ 85.57
1709
+ 81.29
1710
+ 79.71
1711
+ 22.57
1712
+ 81.29
1713
+ 22.14
1714
+ 86.71
1715
+ 83.29
1716
+ 36.29
1717
+ 88.86
1718
+ 89.43
1719
+ 3.43
1720
+ 78.43
1721
+ 80.86
1722
+ 80.86
1723
+ 39.43
1724
+ 4.03
1725
+ 64.42
1726
+ 61.55
1727
+ SDG-MA w/o y
1728
+ 82.57
1729
+ 2.57
1730
+ 29.86
1731
+ 70.43
1732
+ 84.57
1733
+ 24.71
1734
+ 95.71
1735
+ 44.43
1736
+ 76.14
1737
+ 64.57
1738
+ 92.71
1739
+ 75.57
1740
+ 62.71
1741
+ 83.29
1742
+ 76.43
1743
+ 20.71
1744
+ 82.14
1745
+ 69.86
1746
+ 90.29
1747
+ 31.29
1748
+ 8.07
1749
+ 63.03
1750
+ 60.41
1751
+ SDG-MA
1752
+ 80.57
1753
+ 79.43
1754
+ 29.57
1755
+ 77.00
1756
+ 83.71
1757
+ 82.29
1758
+ 79.57
1759
+ 20.57
1760
+ 90.43
1761
+ 44.86
1762
+ 94.00
1763
+ 81.00
1764
+ 52.86
1765
+ 91.71
1766
+ 88.57
1767
+ 12.00
1768
+ 73.00
1769
+ 62.71
1770
+ 78.71
1771
+ 41.57
1772
+ 20.22
1773
+ 67.21
1774
+ 64.97
1775
+ A similar tendency is observed in the UniDA with source
1776
+ data setting for remote sensing images. The proposed MA
1777
+ outperforms all the compared methods. Again, the experi-
1778
+ ment demonstrates that the proposed sample-level transferable
1779
+ weight filters out data coming from shared and private label
1780
+ sets on feature alignment and provides a better criterion
1781
+ for “unknown” class detection than the existing methods.
1782
+ In addition, the MA achieves the best accuracy outcomes
1783
+ compared with the baselines, for some shared categories (such
1784
+ as “Farmland,” “Forests,” and “Parking”).
1785
+ In the UniDA setting without source data, our proposed
1786
+ method has improved by 15.26% compared with the MA-only
1787
+ method. This phenomenon once again verifies the reliability of
1788
+ the proposed SDG. For identifying unknown classes, the SDG-
1789
+ MA yields excellent performance. However, the average ac-
1790
+ curacy of all categories is lower than the source-only method.
1791
+ The reason for this finding is that the difference between
1792
+ RSSCN7 and AID in the shared label sets is relatively smaller
1793
+ than other UniDA tasks.
1794
+ 3) Results on RSSCN7 → NWPU: Our third experiment
1795
+ is conducted on the RSSCN7 → NWPU, and the results
1796
+ are provided in Table IV. In the UniDA setting with source
1797
+ data for remote sensing images, our proposed source-base
1798
+ UniDA is 10.83 percentage points greater than the source-only
1799
+ method and achieves the highest average accuracy among all
1800
+ methods for recognizing all target samples, which verifies the
1801
+ effectiveness of our proposed MA.
1802
+ In the UniDA setting without source data, our proposal
1803
+
1804
+ IEEE TRANSACTIONS ON GEOSCIENCE AND REMOTE SENSING
1805
+ 11
1806
+ improves by 42.06%, compared with the MA-only method.
1807
+ Notably, the SDG-MA method exhibits a huge performance
1808
+ for “Unknown” category.
1809
+ 4) Results on AID → NWPU: The experimental results on
1810
+ AID → NWPU are reported in Table V. In the UniDA setting
1811
+ with source data, the proposed MA improves by 25.27%
1812
+ compared with the source-only method, which confirms the
1813
+ effectiveness and practicality of the proposed MA in a complex
1814
+ UniDA task with a higher Jaccard index. In addition, our
1815
+ proposed method achieves superior performance among all
1816
+ methods on most shared categories and can achieve the highest
1817
+ classification accuracy among all methods for recognizing
1818
+ private label sets in target samples (the “Unknown” category).
1819
+ However, I-UAN [23] is better than MA in identifying shared
1820
+ categories, because the proposed MA has a significant drop in
1821
+ the accuracy of some shared categories, such as “Stadium.”
1822
+ In the UniDA setting without source data, the MA-only
1823
+ method achieves poor results (only 7.16%) due to a lack of
1824
+ reliable source domain data. Conversely, SDG-MA achieves
1825
+ superior performance (64.97%) because reliable source data
1826
+ is generated by SDG. Furthermore, SDG-MA achieves the
1827
+ highest accuracy for identifying the “Unknown” category,
1828
+ which further proves that the proposed SDG module can
1829
+ generate a uniform distribution that approximates the real
1830
+ source domain.
1831
+ C. Model Analysis
1832
+ 1) Feature Distribution Analysis: To fully understand the
1833
+ proposed UniDA with source data and UniDA without source
1834
+ data, we provide the feature distributions of RSSCN7 → UCM
1835
+ and AID → NWPU in Figs. 4 and 5, respectively. The t-
1836
+ SNE [65] is used to visualize the learned source and target fea-
1837
+ tures with corresponding domain labels and category labels. As
1838
+ shown in Fig. 4(a), before adaptation (source only), there are
1839
+ domain shifts between the real source domain (blue) and the
1840
+ target domain (red) according to the domain distribution. From
1841
+ the category labels, the distributions of the shared categories
1842
+ are fragmented and most target private samples are attached
1843
+ near the shared samples. After applying MA (Fig. 4(b)) and
1844
+ SDG-MA (Fig. 4(c)), domain shifts are effectively alleviated.
1845
+ In addition, separability between shared categories is increased
1846
+ and most target private samples are separated from the shared
1847
+ samples. These phenomena demonstrate that our proposed
1848
+ MA strategy is effective for feature alignment. Furthermore,
1849
+ comparing MA (Fig. 4(b)) and SDG-MA (Fig. 4(c)), we can
1850
+ observe that the synthetic source data distribution (green) and
1851
+ the real source data distribution (blue) show a high degree of
1852
+ consistency in class distribution and data diversity. It has been
1853
+ demonstrated that the synthetic source data generated by SDG
1854
+ is effective and reliable.
1855
+ In Fig. 5(a), we can observe that the real source domain
1856
+ and the target domain have larger data shifts in the UniDA
1857
+ task AID → NWPU than the task RSSCN7 → UCM. After
1858
+ applying MA (Fig. 5(b)), it is clear that MA alleviates the
1859
+ distribution discrepancy in domain labels. Again, this finding
1860
+ demonstrates that the proposed MA is practical and effective.
1861
+ After applying SDG-MA (Fig. 5(c)), intra-class compactness
1862
+ and inter-class separability are significantly improved com-
1863
+ pared with source only. In addition, the intra-class compact-
1864
+ ness of the “Unknown” category (Fig. 5(c)) is improved
1865
+ compared with MA (Fig. 5(b)). This phenomenon further
1866
+ verifies the validity of the generated source data.
1867
+ 2) Ablation Study of Model Adaptation: In order to ver-
1868
+ ify the efficacy of the proposed sample-level transferability
1869
+ weight, we perform ablation studies that evaluate variants of
1870
+ SDG-MA, which are listed in Tables II, III, IV, and V. SDG-
1871
+ MA w/o d is the variant that does not integrate the domain
1872
+ similarity into the sample-level transferability weight. SDG-
1873
+ MA w/o y is the variant that does not integrate confidence
1874
+ into the sample-level transferability criterion. As shown in
1875
+ Tables II, III, IV, and V, SDG-MA outperforms SDG-MA w/o
1876
+ d and SDG-MA w/o y, which indicates that both the domain
1877
+ similarity and the confidence in the transferability weight are
1878
+ necessary and important for UniDA tasks.
1879
+ 3) Decision Threshold Analysis: The hyperparameter w0 is
1880
+ used to decide whether the model would label a sample as
1881
+ “Unknown” or use the predicted label. We analyze two cases
1882
+ of ξ < 0.2 (RSSCN7 → UCM) and ξ > 0.2 (AID → NWPU),
1883
+ which are described in Fig. 6(a) and Fig. 6(b), respectively.
1884
+ As shown in Fig. 6, “Target domain” represents the average
1885
+ accuracy of all classes, which measures the generation ability
1886
+ of the source domain space and the domain adaptation ability
1887
+ of the model. “Target-unknown” is the target accuracy of the
1888
+ “Unknown” class, which is a crucial metric for evaluating the
1889
+ vulnerability and robustness of the model. Note that there are
1890
+ large differences in the results for a threshold in a wide range
1891
+ between 0 and 2.0. When ξ is less than 0.2 (Fig. 6(a)), the
1892
+ average accuracy of the target domain maintains a high and
1893
+ stable accuracy between 0 and 0.8, and target-unknown rises
1894
+ significantly after 0.4. Thus, w0 can be set to 0.8 for the
1895
+ case of ξ < 0.2. Furthermore, when ξ is greater than 0.2
1896
+ (Fig. 6(b)), the average accuracy of the target domain exhibits
1897
+ little variance at higher values in a wide range between 0
1898
+ and 1. However, the accuracy of target-unknown increases
1899
+ significantly after exceeding 0.8. Thus, in order to ensure a
1900
+ positive comprehensive accuracy when the case of ξ > 0.2,
1901
+ w0 can be set to 1.
1902
+ 4) Varying Size of Shared Label Sets: We explore the effect
1903
+ of the percentages of shared and private label sets on SDG-
1904
+ MA by varying the size of Y . This is done on AID → NWPU.
1905
+ Fig. 6(c) shows the accuracy of SGD-MA with different Y .
1906
+ When Y = 0, the source domain and target domain have no
1907
+ overlap on label sets, i.e. Yf ∩ Yt = ∅. It is observed that
1908
+ SDG-MA classifies all categories into “Unknown”. Further-
1909
+ more, when Y keeps increasing, the performance of SDG-MA
1910
+ remains stable and has high precision. It has demonstrated that
1911
+ SDG-MA is robust for different percentages of shared and
1912
+ private label sets.
1913
+ 5) Ablation Study of Source Data Generation: We go
1914
+ deeper into the efficacy of the proposed SDG by performing
1915
+ an ablation study that evaluates the data diversity module.
1916
+ The results on RSSCN7 → UCM and AID→ NWPU are
1917
+ shown in Tables VI and VII, respectively. Our proposed
1918
+ SDG-MA performs better than SDG-MA without classifier
1919
+ loss and SDG-MA without style loss, indicating both the
1920
+
1921
+ IEEE TRANSACTIONS ON GEOSCIENCE AND REMOTE SENSING
1922
+ 12
1923
+ TABLE VI
1924
+ ANALYSIS OF SOURCE DATA GENERATION ON RSSCN7 → UC MERCED.
1925
+ Stages
1926
+ Methods
1927
+ RSSCN7 → UC Merced
1928
+ Farmland
1929
+ Forests
1930
+ Dense residential
1931
+ Rivers
1932
+ Parking
1933
+ Unknown
1934
+ Avg Shared
1935
+ Avg
1936
+ SDG
1937
+ SDG-MA w/o classifier loss
1938
+ 2.00
1939
+ 2.00
1940
+ 19.00
1941
+ 4.00
1942
+ 17.00
1943
+ 10.38
1944
+ 8.80
1945
+ 9.06
1946
+ SDG-MA w/o style loss
1947
+ 85.00
1948
+ 0.00
1949
+ 0.00
1950
+ 7.00
1951
+ 81.00
1952
+ 16.00
1953
+ 34.60
1954
+ 31.50
1955
+ Different Data Diversity
1956
+ Generation Schemes
1957
+ 3C-GAN [32]
1958
+ 91.00
1959
+ 1.00
1960
+ 1.00
1961
+ 9.00
1962
+ 87.00
1963
+ 15.31
1964
+ 37.80
1965
+ 34.05
1966
+ KEGNET [31]
1967
+ 31.00
1968
+ 12.00
1969
+ 21.00
1970
+ 82.00
1971
+ 72.00
1972
+ 23.13
1973
+ 43.60
1974
+ 40.19
1975
+ Ours
1976
+ 92.00
1977
+ 64.00
1978
+ 63.00
1979
+ 76.00
1980
+ 93.00
1981
+ 17.13
1982
+ 77.60
1983
+ 67.52
1984
+ TABLE VII
1985
+ ANALYSIS OF SOURCE DATA GENERATION ON AID→NWPU. FA.: FARMLAND, FO.: FOREST, DR: DENSE RESIDENTIAL, RI.: RIVER, PA.: PARKING, IN.:
1986
+ INDUSTRIAL, BE.: BEACH, MR: MEDIUM RESIDENTIAL, SR: SPARSE RESIDENTIAL, AI.: AIRPORT, BR.: BRIDGE, BA.: BASEBALLFIELD, CH.: CHURCH,
1987
+ DE.: DESERT, ME.: MEADOW, MO.: MOUNTAIN, RS: RAILWAY STATION, ST.: STADIUM, ST: STORAGE TANKS, CO.: COMMERCIAL.
1988
+ Stages
1989
+ Methods
1990
+ AID→NWPU
1991
+ Fa.
1992
+ Fo.
1993
+ DR
1994
+ Ri.
1995
+ Pa.
1996
+ In.
1997
+ Be.
1998
+ MR
1999
+ SR
2000
+ Ai.
2001
+ Br.
2002
+ Ba.
2003
+ Ch.
2004
+ De.
2005
+ Me.
2006
+ Mo.
2007
+ RS
2008
+ St.
2009
+ ST
2010
+ Co.
2011
+ Unknown
2012
+ Avg Shared
2013
+ Avg
2014
+ SDG
2015
+ SDG-MA w/o classifier loss
2016
+ 0.00
2017
+ 0.00
2018
+ 11.71
2019
+ 0.00
2020
+ 0.00
2021
+ 7.71
2022
+ 0.00
2023
+ 19.43
2024
+ 0.00
2025
+ 20.00
2026
+ 0.00
2027
+ 1.43
2028
+ 8.71
2029
+ 0.00
2030
+ 0.00
2031
+ 0.00
2032
+ 1.14
2033
+ 0.00
2034
+ 5.14
2035
+ 1.29
2036
+ 39.93
2037
+ 3.83
2038
+ 5.55
2039
+ SDG-MA w/o style loss
2040
+ 65.57
2041
+ 35.71
2042
+ 7.14
2043
+ 36.57
2044
+ 76.14
2045
+ 63.29
2046
+ 55.57
2047
+ 46.57
2048
+ 71.14
2049
+ 25.57
2050
+ 93.57
2051
+ 78.86
2052
+ 47.14
2053
+ 87.43
2054
+ 82.71
2055
+ 0.14
2056
+ 75.86
2057
+ 6.71
2058
+ 53.43
2059
+ 50.43
2060
+ 15.81
2061
+ 52.98
2062
+ 51.21
2063
+ Different Data Diversity
2064
+ Generation Schemes
2065
+ 3C-GAN [32]
2066
+ 69.43
2067
+ 71.00
2068
+ 19.43
2069
+ 57.43
2070
+ 82.86
2071
+ 71.00
2072
+ 78.00
2073
+ 45.14
2074
+ 80.71
2075
+ 30.43
2076
+ 90.57
2077
+ 82.14
2078
+ 42.86
2079
+ 93.43
2080
+ 76.71
2081
+ 0.00
2082
+ 73.43
2083
+ 61.29
2084
+ 84.71
2085
+ 50.57
2086
+ 22.77
2087
+ 63.06
2088
+ 61.14
2089
+ KEGNET [31]
2090
+ 53.29
2091
+ 16.57
2092
+ 16.57
2093
+ 35.57
2094
+ 87.00
2095
+ 64.43
2096
+ 29.86
2097
+ 25.00
2098
+ 35.29
2099
+ 14.14
2100
+ 75.29
2101
+ 83.00
2102
+ 39.86
2103
+ 87.43
2104
+ 65.43
2105
+ 0.00
2106
+ 16.43
2107
+ 18.43
2108
+ 43.71
2109
+ 38.57
2110
+ 19.30
2111
+ 42.29
2112
+ 41.20
2113
+ Ours
2114
+ 80.57
2115
+ 79.43
2116
+ 29.57
2117
+ 77.00
2118
+ 83.71
2119
+ 82.29
2120
+ 79.57
2121
+ 20.57
2122
+ 90.43
2123
+ 44.86
2124
+ 94.00
2125
+ 81.00
2126
+ 52.86
2127
+ 91.71
2128
+ 88.57
2129
+ 12.00
2130
+ 73.00
2131
+ 62.71
2132
+ 78.71
2133
+ 41.57
2134
+ 20.22
2135
+ 67.21
2136
+ 64.97
2137
+ TABLE VIII
2138
+ ANALYSIS OF DIFFERENT PRE-TRAINED MODELS ON RSSCN7 → UC MERCED
2139
+ Methods
2140
+ RSSCN7 → UC Merced
2141
+ Farmland
2142
+ Forests
2143
+ Dense residential
2144
+ Rivers
2145
+ Parking
2146
+ Unknown
2147
+ Avg Shared
2148
+ Avg
2149
+ SDG-MA (Pre-trained model on ImageNet)
2150
+ 92.00
2151
+ 37.00
2152
+ 51.00
2153
+ 69.00
2154
+ 79.00
2155
+ 21.56
2156
+ 65.60
2157
+ 58.26
2158
+ SDG-MA (Pre-trained model on RSSCN7 without initial weights trained on ImageNet)
2159
+ 46.00
2160
+ 23.00
2161
+ 6.00
2162
+ 2.00
2163
+ 13.00
2164
+ 7.63
2165
+ 18.00
2166
+ 16.27
2167
+ Ours (Pre-trained model on RSSCN7 with initial weights trained on ImageNet)
2168
+ 92.00
2169
+ 64.00
2170
+ 63.00
2171
+ 76.00
2172
+ 93.00
2173
+ 17.13
2174
+ 77.60
2175
+ 67.52
2176
+ classifier loss and the style loss in the data diversity module
2177
+ are crucial and necessary for synthetic source data generation.
2178
+ More specifically, when the classifier loss and the style loss
2179
+ are not considered for SDG-MA, both category and overall
2180
+ accuracy are relatively poor. This phenomenon indicates that
2181
+ the restoration of data content and ensuring data diversity
2182
+ are paramount to the generation of reliable data. In addition,
2183
+ SDG-MA without style loss outperforms SDG-MA without
2184
+ classifier loss, meaning that the classifier loss (recovering the
2185
+ data content) is even more crucial.
2186
+ 6) Comparison of Different Data Diversity Generation
2187
+ Schemes: In the SDG stage, data diversity is the key to the
2188
+ successful generation of source data distributions. Recently,
2189
+ two mainstream methods have been applied to ensure the
2190
+ diversity of data generation. The first, GAN-based methods
2191
+ (such as 3C-GAN [32]), are used to produce target-style
2192
+ training samples. Specifically, a discriminator is introduced
2193
+ to match the distributions between the target samples and
2194
+ the generated source samples through the use of adversar-
2195
+ ial training. The second, a decoder loss in KEGNET [31],
2196
+ produces similar data points for each class and increases the
2197
+ pairwise distance between sampled data points. We compare
2198
+ our proposed style loss in data diversity module with these
2199
+ two methods on RSSCN7 → UCM and AID→NWPU. The
2200
+ results are presented in Tables VI and VII, respectively. It
2201
+ can be seen that the generating ability of our proposed style
2202
+ loss is significantly better than that of 3C-GAN [32] and
2203
+ KEGNET [31], with respect to solving the problem of source
2204
+ domain generation in UniDA without source data. In addition,
2205
+ our style loss maintains a more prominent and uniform per-
2206
+ formance in per-class accuracy. It has been demonstrated that
2207
+ data points generated by the style loss have better intra-class
2208
+ and inter-class diversity.
2209
+ 7) Ablation study of the pre-trained model in SGD: An
2210
+ ablation study of the pre-trained model is conducted to in-
2211
+ vestigate the effect of the pre-training models with different
2212
+ datasets and different initializations on the source data gener-
2213
+ ation. The results on RSSCN7 → UC Merced are presented
2214
+ in Table VIII. It is worth noting that for the pre-trained model
2215
+ on ImageNet [64], the feature extractor comes from the pre-
2216
+ trained ResNet-50 on ImageNet, and the classifier is from the
2217
+ pre-trained ResNet-50 on RSSCN7, in order to ensure the
2218
+ condition of the UniDA setting. Compared with our proposed
2219
+ SGD-MA (pre-trained model on RSSCN7 with initial weights
2220
+ trained on ImageNet), it is obvious that the overall average of
2221
+ SDG-MA by using the source data generated from the pre-
2222
+ trained model on RSSCN7 is better than that of SDG-MA by
2223
+ using the pre-trained model on ImageNet. Furthermore, we can
2224
+ observe that initial weights trained on ImageNet have a rela-
2225
+ tively large impact on the proposed source domain generation
2226
+ module, by comparing the pre-trained model without initial
2227
+ weights trained on ImageNet and the pre-trained model with
2228
+ initial weights trained on ImageNet. Thus, we can conclude
2229
+ that both the pre-trained model based on ImageNet (natural
2230
+ images) and the pre-trained model based on RSSCN7 (remote
2231
+ sensing images) have an impact on the proposed source data
2232
+ generation. The pre-trained model based on ImageNet is used
2233
+ to provide reasonable initial weights of the feature extractor,
2234
+ and the pre-trained model based on RSSCN7 provides an
2235
+ effective category distribution of remote sensing images for
2236
+ the proposed SGD.
2237
+ V. CONCLUSIONS
2238
+ We have introduced a novel Universal Domain Adaptation
2239
+ setting for remote sensing image scene classification, including
2240
+ UniDA with source data (MA) and UniDA without source data
2241
+ (SDG-MA). UniDA removes all constraints on the relationship
2242
+
2243
+ IEEE TRANSACTIONS ON GEOSCIENCE AND REMOTE SENSING
2244
+ 13
2245
+ between label sets of the source and target domains, which has
2246
+ a high practical value and promotes the development of DA in
2247
+ remote sensing. To realize universal domain adaptation with
2248
+ or without source data, a dual-stage framework is proposed,
2249
+ consisting of a source data generation stage and the purpose
2250
+ of the model adaptation stage. The source data generation
2251
+ stage is to estimate the conditional distribution of the source
2252
+ data and generate reliable synthetic source images from both
2253
+ data content and data style, when the source data is not
2254
+ available. Furthermore, the model adaptation stage aims to
2255
+ detect samples from the target shared label sets and those
2256
+ in target private label sets utilizing the proposed transferable
2257
+ weight. This work can serve as a starting point in a challenging
2258
+ UniDA setting for remote sensing images. However, it is
2259
+ difficult for the transferable weight in model adaptation to
2260
+ tune an optimal threshold to apply it to all UniDA tasks of
2261
+ remote sensing images. Thus, in the future, we will focus on
2262
+ adaptively learning the threshold through the use of an open-
2263
+ set classifier.
2264
+ REFERENCES
2265
+ [1] D. Tuia, C. Persello, and L. Bruzzone, “Recent advances in domain
2266
+ adaptation for the classification of remote sensing data,” arXiv preprint
2267
+ arXiv:2104.07778, 2021.
2268
+ [2] X. Liu, J. He, Y. Yao, J. Zhang, H. Liang, H. Wang, and Y. Hong,
2269
+ “Classifying urban land use by integrating remote sensing and social
2270
+ media data,” International Journal of Geographical Information Science,
2271
+ vol. 31, no. 8, pp. 1675–1696, 2017.
2272
+ [3] Q. Zhu, Y. Lei, X. Sun, Q. Guan, Y. Zhong, L. Zhang, and D. Li,
2273
+ “Knowledge-guided land pattern depiction for urban land use mapping:
2274
+ A case study of chinese cities,” Remote Sensing of Environment, vol.
2275
+ 272, p. 112916, 2022.
2276
+ [4] Q. Zhu, X. Guo, W. Deng, Q. Guan, Y. Zhong, L. Zhang, and
2277
+ D. Li, “Land-use/land-cover change detection based on a siamese global
2278
+ learning framework for high spatial resolution remote sensing imagery,”
2279
+ ISPRS Journal of Photogrammetry and Remote Sensing, vol. 184, pp.
2280
+ 63–78, 2022.
2281
+ [5] Q. Xu, C. Ouyang, T. Jiang, X. Yuan, X. Fan, and D. Cheng, “Mffenet
2282
+ and adanet: a robust deep transfer learning method and its application
2283
+ in high precision and fast cross-scene recognition of earthquake-induced
2284
+ landslides,” Landslides, pp. 1–31, 2022.
2285
+ [6] G. Cheng, X. Xie, J. Han, L. Guo, and G.-S. Xia, “Remote sensing
2286
+ image scene classification meets deep learning: Challenges, methods,
2287
+ benchmarks, and opportunities,” IEEE Journal of Selected Topics in
2288
+ Applied Earth Observations and Remote Sensing, vol. 13, pp. 3735–
2289
+ 3756, 2020.
2290
+ [7] Q. Zhu, W. Deng, Z. Zheng, Y. Zhong, Q. Guan, W. Lin, L. Zhang,
2291
+ and D. Li, “A spectral-spatial-dependent global learning framework for
2292
+ insufficient and imbalanced hyperspectral image classification,” IEEE
2293
+ Transactions on Cybernetics, vol. 52, no. 11, pp. 11 709–11 723, 2022.
2294
+ [8] X. Yao, J. Han, G. Cheng, X. Qian, and L. Guo, “Semantic annotation of
2295
+ high-resolution satellite images via weakly supervised learning,” IEEE
2296
+ Transactions on Geoscience and Remote Sensing, vol. 54, no. 6, pp.
2297
+ 3660–3671, 2016.
2298
+ [9] J. Xie, N. He, L. Fang, and A. Plaza, “Scale-free convolutional neural
2299
+ network for remote sensing scene classification,” IEEE Transactions on
2300
+ Geoscience and Remote Sensing, vol. 57, no. 9, pp. 6916–6928, 2019.
2301
+ [10] Y. Yu, X. Li, and F. Liu, “Attention gans: Unsupervised deep feature
2302
+ learning for aerial scene classification,” IEEE Transactions on Geo-
2303
+ science and Remote Sensing, vol. 58, no. 1, pp. 519–531, 2020.
2304
+ [11] Y. Hua, L. Mou, J. Lin, K. Heidler, and X. X. Zhu, “Aerial scene
2305
+ understanding in the wild: Multi-scene recognition via prototype-based
2306
+ memory networks,” ISPRS Journal of Photogrammetry and Remote
2307
+ Sensing, vol. 177, pp. 89–102, 2021.
2308
+ [12] X. Tan, Z. Xiao, J. Zhu, Q. Wan, K. Wang, and D. Li, “Transformer-
2309
+ driven semantic relation inference for multilabel classification of high-
2310
+ resolution remote sensing images,” IEEE Journal of Selected Topics in
2311
+ Applied Earth Observations and Remote Sensing, vol. 15, pp. 1884–
2312
+ 1901, 2022.
2313
+ [13] S. Ben-David, J. Blitzer, K. Crammer, A. Kulesza, F. Pereira, and
2314
+ J. W. Vaughan, “A theory of learning from different domains,” Machine
2315
+ learning, vol. 79, no. 1, pp. 151–175, 2010.
2316
+ [14] K. Saenko, B. Kulis, M. Fritz, and T. Darrell, “Adapting visual category
2317
+ models to new domains,” in European conference on computer vision.
2318
+ Springer, 2010, pp. 213–226.
2319
+ [15] Q. Xu, X. Yuan, and C. Ouyang, “Class-aware domain adaptation for
2320
+ semantic segmentation of remote sensing images,” IEEE Transactions
2321
+ on Geoscience and Remote Sensing, 2020.
2322
+ [16] D. Wittich and F. Rottensteiner, “Appearance based deep domain
2323
+ adaptation for the classification of aerial images,” ISPRS Journal of
2324
+ Photogrammetry and Remote Sensing, vol. 180, pp. 82–102, 2021.
2325
+ [17] O. Tasar, Y. Tarabalka, A. Giros, P. Alliez, and S. Clerc, “Standardgan:
2326
+ Multi-source domain adaptation for semantic segmentation of very high
2327
+ resolution satellite images by data standardization,” in Proceedings of
2328
+ the IEEE/CVF Conference on Computer Vision and Pattern Recognition
2329
+ Workshops, 2020, pp. 192–193.
2330
+ [18] J. Guo, J. Yang, H. Yue, X. Liu, and K. Li, “Unsupervised domain-
2331
+ invariant feature learning for cloud detection of remote sensing images,”
2332
+ IEEE Transactions on Geoscience and Remote Sensing, vol. 60, pp. 1–
2333
+ 15, 2021.
2334
+ [19] Z. Cao, L. Ma, M. Long, and J. Wang, “Partial adversarial domain
2335
+ adaptation,” in Proceedings of the European Conference on Computer
2336
+ Vision (ECCV), 2018, pp. 135–150.
2337
+ [20] K. Saito, S. Yamamoto, Y. Ushiku, and T. Harada, “Open set domain
2338
+ adaptation by backpropagation,” in Proceedings of the European Con-
2339
+ ference on Computer Vision (ECCV), 2018, pp. 153–168.
2340
+ [21] J. Zhang, J. Liu, B. Pan, Z. Chen, X. Xu, and Z. Shi, “An open
2341
+ set domain adaptation algorithm via exploring transferability and dis-
2342
+ criminability for remote sensing image scene classification,” IEEE
2343
+ Transactions on Geoscience and Remote Sensing, vol. 60, pp. 1–12,
2344
+ 2021.
2345
+ [22] K. You, M. Long, Z. Cao, J. Wang, and M. I. Jordan, “Universal domain
2346
+ adaptation,” in Proceedings of the IEEE/CVF Conference on Computer
2347
+ Vision and Pattern Recognition, 2019, pp. 2720–2729.
2348
+ [23] Y. Yin, Z. Yang, X. Wu, and H. Hu, “Pseudo-margin-based universal
2349
+ domain adaptation,” Knowledge-Based Systems, vol. 229, p. 107315,
2350
+ 2021.
2351
+ [24] B. Fu, Z. Cao, M. Long, and J. Wang, “Learning to detect open classes
2352
+ for universal domain adaptation,” in European Conference on Computer
2353
+ Vision.
2354
+ Springer, 2020, pp. 567–583.
2355
+ [25] J. N. Kundu, N. Venkat, A. Revanur, R. V. Babu et al., “Towards
2356
+ inheritable models for open-set domain adaptation,” in Proceedings of
2357
+ the IEEE/CVF Conference on Computer Vision and Pattern Recognition,
2358
+ 2020, pp. 12 376–12 385.
2359
+ [26] J. Liang, D. Hu, and J. Feng, “Do we really need to access the source
2360
+ data? source hypothesis transfer for unsupervised domain adaptation,”
2361
+ in International Conference on Machine Learning.
2362
+ PMLR, 2020, pp.
2363
+ 6028–6039.
2364
+ [27] N. Ding, Y. Xu, Y. Tang, C. Xu, Y. Wang, and D. Tao, “Source-free
2365
+ domain adaptation via distribution estimation,” in Proceedings of the
2366
+ IEEE/CVF Conference on Computer Vision and Pattern Recognition,
2367
+ 2022, pp. 7212–7222.
2368
+ [28] Q. Xu, Y. Shi, and X. Zhu, “Universal domain adaptation without source
2369
+ data for remote sensing image scene classification,” in IGARSS 2022-
2370
+ 2022 IEEE International Geoscience and Remote Sensing Symposium.
2371
+ IEEE, 2022, pp. 5341–5344.
2372
+ [29] J. N. Kundu, N. Venkat, R. V. Babu et al., “Universal source-free domain
2373
+ adaptation,” in Proceedings of the IEEE/CVF Conference on Computer
2374
+ Vision and Pattern Recognition, 2020, pp. 4544–4553.
2375
+ [30] T. Li, J. Li, Z. Liu, and C. Zhang, “Few sample knowledge distillation
2376
+ for efficient network compression,” in 2020 IEEE/CVF Conference on
2377
+ Computer Vision and Pattern Recognition (CVPR), 2020, pp. 14 627–
2378
+ 14 635.
2379
+ [31] J. Yoo, M. Cho, T. Kim, and U. Kang, “Knowledge extraction with no
2380
+ observable data,” 2019.
2381
+ [32] R. Li, Q. Jiao, W. Cao, H.-S. Wong, and S. Wu, “Model adaptation:
2382
+ Unsupervised domain adaptation without source data,” in Proceedings of
2383
+ the IEEE/CVF Conference on Computer Vision and Pattern Recognition,
2384
+ 2020, pp. 9641–9650.
2385
+ [33] K. Saito, D. Kim, S. Sclaroff, and K. Saenko, “Universal domain
2386
+ adaptation through self supervision,” arXiv preprint arXiv:2002.07953,
2387
+ 2020.
2388
+ [34] A. Elshamli, G. W. Taylor, A. Berg, and S. Areibi, “Domain adaptation
2389
+ using representation learning for the classification of remote sensing
2390
+ images,” IEEE Journal of Selected Topics in Applied Earth Observations
2391
+ and Remote Sensing, vol. 10, no. 9, pp. 4198–4209, 2017.
2392
+
2393
+ IEEE TRANSACTIONS ON GEOSCIENCE AND REMOTE SENSING
2394
+ 14
2395
+ [35] L. Bashmal, Y. Bazi, H. AlHichri, M. M. AlRahhal, N. Ammour, and
2396
+ N. Alajlan, “Siamese-gan: Learning invariant representations for aerial
2397
+ vehicle image categorization,” Remote Sensing, vol. 10, no. 2, 2018.
2398
+ [Online]. Available: https://www.mdpi.com/2072-4292/10/2/351
2399
+ [36] Z. Zheng, Y. Zhong, Y. Su, and A. Ma, “Domain adaptation via a task-
2400
+ specific classifier framework for remote sensing cross-scene classifica-
2401
+ tion,” IEEE Transactions on Geoscience and Remote Sensing, vol. 60,
2402
+ pp. 1–13, 2022.
2403
+ [37] E. Othman, Y. Bazi, F. Melgani, H. Alhichri, N. Alajlan, and M. Zuair,
2404
+ “Domain adaptation network for cross-scene classification,” IEEE Trans-
2405
+ actions on Geoscience and Remote Sensing, vol. 55, no. 8, pp. 4441–
2406
+ 4456, 2017.
2407
+ [38] N. Ammour, L. Bashmal, Y. Bazi, M. M. Al Rahhal, and M. Zuair,
2408
+ “Asymmetric adaptation of deep features for cross-domain classification
2409
+ in remote sensing imagery,” IEEE Geoscience and Remote Sensing
2410
+ Letters, vol. 15, no. 4, pp. 597–601, 2018.
2411
+ [39] W. Teng, N. Wang, H. Shi, Y. Liu, and J. Wang, “Classifier-constrained
2412
+ deep adversarial domain adaptation for cross-domain semisupervised
2413
+ classification in remote sensing images,” IEEE Geoscience and Remote
2414
+ Sensing Letters, vol. 17, no. 5, pp. 789–793, 2020.
2415
+ [40] S. Song, H. Yu, Z. Miao, Q. Zhang, Y. Lin, and S. Wang, “Domain
2416
+ adaptation for convolutional neural networks-based remote sensing scene
2417
+ classification,” IEEE Geoscience and Remote Sensing Letters, vol. 16,
2418
+ no. 8, pp. 1324–1328, 2019.
2419
+ [41] J. Zhang, J. Liu, B. Pan, and Z. Shi, “Domain adaptation based on
2420
+ correlation subspace dynamic distribution alignment for remote sensing
2421
+ image scene classification,” IEEE Transactions on Geoscience and
2422
+ Remote Sensing, vol. 58, no. 11, pp. 7920–7930, 2020.
2423
+ [42] J. Guo, Q. Xu, Y. Zeng, Z. Liu, and X. Zhu, “Semi-supervised cloud
2424
+ detection in satellite images by considering the domain shift problem,”
2425
+ Remote Sensing, vol. 14, no. 11, p. 2641, 2022.
2426
+ [43] W. Huang, Y. Shi, Z. Xiong, Q. Wang, and X. X. Zhu, “Semi-supervised
2427
+ bidirectional alignment for remote sensing cross-domain scene classifi-
2428
+ cation,” ISPRS Journal of Photogrammetry and Remote Sensing, vol.
2429
+ 195, pp. 192–203, 2023.
2430
+ [44] X. Lu, T. Gong, and X. Zheng, “Multisource compensation network for
2431
+ remote sensing cross-domain scene classification,” IEEE Transactions on
2432
+ Geoscience and Remote Sensing, vol. 58, no. 4, pp. 2504–2515, 2019.
2433
+ [45] Z. Cao, K. You, M. Long, J. Wang, and Q. Yang, “Learning to
2434
+ transfer examples for partial domain adaptation,” in Proceedings of the
2435
+ IEEE/CVF Conference on Computer Vision and Pattern Recognition,
2436
+ 2019, pp. 2985–2994.
2437
+ [46] J. Liang, Y. Wang, D. Hu, R. He, and J. Feng, “A balanced
2438
+ and uncertainty-aware approach for partial domain adaptation,” arXiv
2439
+ preprint arXiv:2003.02541, 2020.
2440
+ [47] J. Zhang, J. Liu, L. Shi, B. Pan, and X. Xu, “An open set domain
2441
+ adaptation network based on adversarial learning for remote sensing
2442
+ image scene classification,” in IGARSS 2020 - 2020 IEEE International
2443
+ Geoscience and Remote Sensing Symposium, 2020, pp. 1365–1368.
2444
+ [48] R. Adayel, Y. Bazi, H. Alhichri, and N. Alajlan, “Deep open-set domain
2445
+ adaptation for cross-scene classification based on adversarial learning
2446
+ and pareto ranking,” remote sensing, vol. 12, no. 11, p. 1716, 2020.
2447
+ [49] S. Nirmal, V. Sowmya, and K. Soman, “Open set domain adaptation for
2448
+ hyperspectral image classification using generative adversarial network,”
2449
+ in Inventive Communication and Computational Technologies. Springer,
2450
+ 2020, pp. 819–827.
2451
+ [50] X. Tang, Y. Peng, C. Li, and T. Zhou, “Open set domain adaptation
2452
+ based on multi-classifier adversarial network for hyperspectral image
2453
+ classification,” Journal of Applied Remote Sensing, vol. 15, no. 4, p.
2454
+ 044514, 2021.
2455
+ [51] J. Chen and X. Wang, “Open set few-shot remote sensing scene classifi-
2456
+ cation based on a multi-order graph convolutional network and domain
2457
+ adaptation,” IEEE Transactions on Geoscience and Remote Sensing, pp.
2458
+ 1–1, 2022.
2459
+ [52] S. Zhao, S. Saha, and X. X. Zhu, “Graph neural network based open-
2460
+ set domain adaptation,” The International Archives of Photogrammetry,
2461
+ Remote Sensing and Spatial Information Sciences, vol. 43, pp. 1407–
2462
+ 1413, 2022.
2463
+ [53] J. M. Bernardo and A. F. Smith, Bayesian theory.
2464
+ John Wiley & Sons,
2465
+ 2009, vol. 405.
2466
+ [54] K. Simonyan and A. Zisserman, “Very deep convolutional networks for
2467
+ large-scale image recognition,” arXiv preprint arXiv:1409.1556, 2014.
2468
+ [55] O. Lifshitz and L. Wolf, “A sample selection approach for universal
2469
+ domain adaptation,” arXiv preprint arXiv:2001.05071, 2020.
2470
+ [56] Y. Ganin, E. Ustinova, H. Ajakan, P. Germain, H. Larochelle, F. Lavi-
2471
+ olette, M. Marchand, and V. Lempitsky, “Domain-adversarial training
2472
+ of neural networks,” The journal of machine learning research, vol. 17,
2473
+ no. 1, pp. 2096–2030, 2016.
2474
+ [57] Q. Zou, L. Ni, T. Zhang, and Q. Wang, “Deep learning based feature
2475
+ selection for remote sensing scene classification,” IEEE Geoscience and
2476
+ Remote Sensing Letters, vol. 12, no. 11, pp. 2321–2325, 2015.
2477
+ [58] Y. Yang and S. Newsam, “Bag-of-visual-words and spatial extensions
2478
+ for land-use classification,” in Proceedings of the 18th SIGSPATIAL in-
2479
+ ternational conference on advances in geographic information systems,
2480
+ 2010, pp. 270–279.
2481
+ [59] G.-S. Xia, J. Hu, F. Hu, B. Shi, X. Bai, Y. Zhong, L. Zhang, and X. Lu,
2482
+ “Aid: A benchmark data set for performance evaluation of aerial scene
2483
+ classification,” IEEE Transactions on Geoscience and Remote Sensing,
2484
+ vol. 55, no. 7, pp. 3965–3981, 2017.
2485
+ [60] G. Cheng, J. Han, and X. Lu, “Remote sensing image scene classifi-
2486
+ cation: Benchmark and state of the art,” Proceedings of the IEEE, vol.
2487
+ 105, no. 10, pp. 1865–1883, 2017.
2488
+ [61] A. Paszke, S. Gross, S. Chintala, G. Chanan, E. Yang, Z. DeVito, Z. Lin,
2489
+ A. Desmaison, L. Antiga, and A. Lerer, “Automatic differentiation in
2490
+ pytorch,” in 31st Conference on Neural Information Processing Systems
2491
+ (NIPS), 2017.
2492
+ [62] A. Odena, C. Olah, and J. Shlens, “Conditional image synthesis with
2493
+ auxiliary classifier gans,” in International conference on machine learn-
2494
+ ing.
2495
+ PMLR, 2017, pp. 2642–2651.
2496
+ [63] D. P. Kingma and J. Ba, “Adam: A method for stochastic optimization,”
2497
+ arXiv preprint arXiv:1412.6980, 2014.
2498
+ [64] O. Russakovsky, J. Deng, H. Su, J. Krause, S. Satheesh, S. Ma,
2499
+ Z. Huang, A. Karpathy, A. Khosla, M. Bernstein et al., “Imagenet large
2500
+ scale visual recognition challenge,” International journal of computer
2501
+ vision, vol. 115, no. 3, pp. 211–252, 2015.
2502
+ [65] L. Van der Maaten and G. Hinton, “Visualizing data using t-sne.” Journal
2503
+ of machine learning research, vol. 9, no. 11, 2008.
2504
+
2dFIT4oBgHgl3EQf5Cs5/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
4NFAT4oBgHgl3EQflx07/content/tmp_files/2301.08619v1.pdf.txt ADDED
@@ -0,0 +1,655 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ FULL SOLUTION OF THE FACTORIALITY QUESTION FOR
2
+ q-ARAKI-WOODS VON NEUMANN ALGEBRAS VIA CONJUGATE
3
+ VARIABLES
4
+ MANISH KUMAR, ADAM SKALSKI, AND MATEUSZ WASILEWSKI
5
+ Abstract. We establish factoriality of q-Araki-Woods von Neumann algebras (with the
6
+ number of generators at least two) in full generality, exploiting the approach via conjugate
7
+ variables developed recently in the tracial case by Akihiro Miyagawa and Roland Speicher,
8
+ and abstract results of Brent Nelson. We also establish non-injectivity and determine the
9
+ type of the factors in question. The factors are solid and full when the number of generators
10
+ is finite.
11
+ The history of q-deformations in the context of (Gaussian) von Neumann algebras started
12
+ with the paper [BKS], where the authors defined the so-called q-von Neumann algebras
13
+ Γq(HR), with q ∈ (−1, 1), acting on the q-deformed Fock space associated with the com-
14
+ plexification of a real Hilbert space HR. These algebras are tracial, and could be seen as
15
+ natural deformations of the free group factors. Thus from the beginning it was a natural
16
+ question whether they also have trivial centres (i.e. are factors) – naturally excluding the case
17
+ of dim(HR) = 1, when Γq(HR) is generated by a single self-adjoint operator. The original
18
+ paper showed that this is indeed true for infinite-dimensional HR. It took almost ten years
19
+ to establish factoriality in full generality, that is for dim(HR) ≥ 2. This was achieved by ´E.
20
+ Ricard in [Ric], after earlier partial results obtained in [Sni] and [Kro].
21
+ Meanwhile in [Hia] another von Neumann algebraic q-deformation was constructed by
22
+ F. Hiai, who combined the construction of [BKS] with the quasi-free (Araki-Woods) deforma-
23
+ tion of D. Shlyakhtenko ([Sh1]). This time the initial data involves not only the real Hilbert
24
+ space HR, but also a group (Ut)t∈R of orthogonal transformations of HR, and the resulting von
25
+ Neumann algebras Γq(HR, Ut) are in general non-tracial. Also here the factoriality question
26
+ has attracted a lot of interest, starting from the original article [Hia], and later continued
27
+ in [BM], [SW] and [BMRW]. In the last of these P. Bikram, K. Mukherjee, ´E. Ricard and
28
+ S. Wang establish factoriality whenever dim(HR) ≥ 3 and also for dim(HR) = 2, but only
29
+ when the deformation generated by (Ut)t∈R is sufficiently small. It should be also noted that
30
+ [Ne1] shows that for q small enough Γq(HR, Ut) is isomorphic to Γ0(HR, Ut), so in that case
31
+ already the results of [Sh1] yield factoriality.
32
+ Here we resolve the matter in full, showing that for arbitrary q ∈ (−1, 1) the algebra
33
+ Γq(HR, Ut) is a factor if and only if dim(HR) ≥ 2. We take a very different approach to that
34
+ taken in [BM] and [BMRW], and instead of studying ‘mixing subspaces’ of Γq(HR, Ut) we
35
+ adopt a very recent approach to ‘dual’ or ‘conjugate variables’ developed in the tracial case of
36
+ Γq(HR) in [MS] by A. Miyagawa and R. Speicher. It turns out that the construction of [MS]
37
+ can be also extended to the non-tracial case, which in conjunction with the general study
38
+ of consequences of the existence of suitable generators with finite free Fisher information
39
+ 2010 Mathematics Subject Classification. Primary: 46L36; Secondary 46L10, 46L53, 46L65.
40
+ Key words and phrases. q-Araki-Woods von Neumann algebra, factoriality; conjugate variables; full factors.
41
+ 1
42
+ arXiv:2301.08619v1 [math.OA] 20 Jan 2023
43
+
44
+ conducted in [Ne2] allows us not only to settle completely the factoriality question, but also
45
+ establish the non-injectivity and determine the type of the associated factor. Thus we obtain
46
+ the following theorem, which is the main result of this paper.
47
+ Theorem. Let q ∈ (−1, 1), let HR be a real Hilbert space of dimension at least 2, and let
48
+ (Ut)t∈R be a group of orthogonal transformations of HR. Then the q-Araki-Woods von Neu-
49
+ mann algebra Γq(HR, Ut) is a non-injective factor of type
50
+
51
+
52
+
53
+ III1
54
+ if G = R×
55
+ ∗ ,
56
+ IIIλ
57
+ if G = λZ, 0 < λ < 1,
58
+ II1
59
+ if G = {1},
60
+ where G < R×
61
+ ∗ is the closed subgroup generated by the eigenvalues of the generator of (Ut)t∈R.
62
+ If dim(HR) < ∞ then these factors are solid and full.
63
+ The plan of the paper is as follows: in the remainder of the introduction we set some
64
+ notation. In Section 1, treating solely the case of finite-dimensional initial space, we introduce
65
+ the notions of dual/conjugate variables and establish their existence for q-Gaussian systems
66
+ inside q-Araki-Woods algebras. Then in Section 2 we establish the main results of the paper;
67
+ in particular Theorem above is a combination of Theorems 2.4, 2.5 and 2.6.
68
+ Throughout the paper we fix q ∈ (−1, 1). All scalar products are linear on the right. Given
69
+ a real Hilbert space HR and (Ut)t∈R, a group of orthogonal transformations of HR, we denote
70
+ the associated q-Araki-Woods von Neumann algebra by Γq(HR, Ut). For a full description of
71
+ the construction of Γq(HR, Ut) we refer to the original article [Hia].
72
+ 1. Dual and conjugate variables for q-Araki-Woods von Neumann algebras in
73
+ finite dimensions
74
+ In this section we will consider only the case of finite-dimensional HR. Fix then d ∈ N and
75
+ write H for the complexification of HR = Rd. We assume that we are also given (Ut)t∈R, a
76
+ group of orthogonal transformations of Rd, whose generator (both on HR and on H) will be
77
+ denoted by A. The space H is thus equipped both with the standard scalar product and with
78
+ the deformed scalar product ⟨ξ, η⟩U := ⟨ξ, 2A
79
+ 1+Aη⟩; if we want to stress the difference we will
80
+ sometimes use the notation HU. Further we write Fq(HU) for the associated q-Fock space,
81
+ with Fq(HU)alg as the subspace spanned by finite tensors, and e0 = Ω the vacuum vector. We
82
+ denote the associated q-Araki-Woods von Neumann algebra Γq(HR, Ut) simply by M and the
83
+ canonical q-quasi free state ⟨Ω, ·Ω⟩Fq(HU) by ϕ. Finally for each ξ ∈ Fq(HU)alg, we denote by
84
+ W(ξ) the unique element in M which satisfies W(ξ)Ω = ξ.
85
+ Let {e1, . . . , ed} be a linearly independent set of vectors in H, and for i ∈ {1, . . . , d} let Ai =
86
+ W(ei), i.e. Ai ∈ M and AiΩ = ei. We say that a tuple (D1, . . . , Dd) of unbounded operators
87
+ on Fq(HU) with Fq(HU)alg contained in their domains and 1 contained in the domains of
88
+ their adjoints is a (normalized) dual system for (A1, . . . , Ad) if for all i, j ∈ {1, . . . , d}
89
+ [Di, Aj] = ⟨¯ej, ei⟩UPCΩ = ϕ(AjAi)PCΩ
90
+ and DiΩ = 0.
91
+ Here ¯ξ denotes the usual conjugate of a vector ξ in Cd and PCΩ denotes the projection onto
92
+ the one-dimensional subspace CΩ. Before we proceed any further, let us note that existence
93
+ of dual variables implies existence of conjugate variables. We will actually show directly that
94
+ the existence of dual variables implies existence of the conjugate variables with respect to the
95
+ quasi-free difference quotients (see [Ne2, Definition 3.11]), which in turn implies existence of
96
+ the usual conjugate variables (see [Ne2, Remark 3.13]).
97
+ 2
98
+
99
+ Recall that the quasi-free difference quotients ∂i are defined as unique derivations from
100
+ C[Ai, . . . , Ad] into M⊗Mop such that ∂i(Aj) := ϕ(AjAi)1 ⊗ 1 for all i, j ∈ {1, . . . , d}. The
101
+ conjugate variable for ∂i will be a vector ξi ∈ L2(M, ϕ) such that
102
+ ⟨ξ, x1⟩ = ⟨1 ⊗ 1, ∂i(x)(1 ⊗ 1)⟩
103
+ for all x ∈ dom(∂i).
104
+ Proposition 1.1 (See [MS, Theorem 2.5]). Suppose that (D1, . . . , Dd) is a normalized dual
105
+ system for (A1, . . . , Ad). Then (D∗
106
+ 11, . . . , D∗
107
+ d1) are conjugate variables for (A1, . . . , Ad).
108
+ Proof. It suffices to check that for all i ∈ {1, . . . , d}, n ∈ N and j1, . . . , jn ∈ {1, . . . , d} we
109
+ have ⟨D∗
110
+ i 1, Aj1 . . . Ajn1⟩ = ⟨1 ⊗ 1, ∂i(Aj1 . . . Ajn)(1 ⊗ 1)⟩.
111
+ The left-hand side is equal to
112
+ ⟨1, DiAj1 . . . Ajn1⟩. The defining property of Di says that DiAj1 = Aj1Di + ϕ(Aj1Ai)PΩ. It
113
+ follows that
114
+ ⟨1, DiAj1 . . . Ajn1⟩ = ⟨1, Aj1Di . . . Ajn1⟩ + ϕ(Aj1Ai)⟨1, Aj2 . . . Ajn1⟩
115
+ = ⟨1, Aj1Di . . . Ajn1⟩ + ϕ(Aj1Ai)ϕ(Aj2 . . . Ajn)
116
+ Continuing in this way we will obtain the final formula:
117
+ ⟨1, DiAj1 . . . Ajn1⟩ =
118
+ n
119
+
120
+ k=1
121
+ ϕ(AjkAi)ϕ(Aj1 . . . Ajk−1)ϕ(Ajk+1 . . . Ajn) + ⟨1, Aj1 . . . AjnDi1⟩,
122
+ where the last term vanishes as Di1 = 0. This is equal to ⟨1 ⊗ 1, ∂i(Aj1 . . . Ajn)(1 ⊗ 1)⟩,
123
+ because the value ∂i(Aj1 . . . Ajn) can be computed exactly as for free difference quotients,
124
+ merely replacing Kronecker deltas δijk with the covariance ϕ(AjkAi).
125
+
126
+ Lemma 1.2. Let {ei}1≤i≤d and {fi}1≤i≤d be two linearly independent sets in H such that
127
+ for every j ∈ {1, . . . , d} we have fj = �d
128
+ k=1 xjkek for some xjk ∈ C. If Ai = W(ei) and
129
+ Ci = W(fi), i ∈ {1, . . . , d}, then a dual system for {Ai}1≤i≤d exists if and only if one for
130
+ {Ci}1≤i≤d does.
131
+ Proof. Note that the definition of Wick operators assures that Cj = �d
132
+ k=1 xjkAk, j ∈
133
+ {1, . . . , d}. If {Di}1≤i≤d denotes the dual system for {Ai}1≤i≤d, then {Ei}1≤i≤d is the dual
134
+ system for {Ci}1≤i≤d, where for each i ∈ {1, . . . , d} we set Ei = �d
135
+ k=1 xikDk. Indeed, let us
136
+ check:
137
+ [Ei, Cj] =
138
+ d
139
+
140
+ k=1
141
+ d
142
+
143
+ l=1
144
+ xikxjl[Dk, Al] =
145
+ d
146
+
147
+ k=1
148
+ d
149
+
150
+ l=1
151
+ xikxjl⟨¯el, ek⟩UPCΩ
152
+ = ⟨
153
+ d
154
+
155
+ l=1
156
+ xjlel,
157
+ d
158
+
159
+ k=1
160
+ xikek⟩UPCΩ = ⟨ ¯fj, fi⟩UPCΩ.
161
+
162
+ Dual variables. Fix then {e1, . . . , ed}, an orthonormal set in H with respect to the unde-
163
+ formed scalar product and as before let Ai = W(ei). For i, j ∈ {1, . . . , d} set Bij = ⟨ei, ej⟩U.
164
+ Denote by [d]∗ the set of words in letters from the alphabet {1, . . . , d} and for any word
165
+ w = jn . . . j1 ∈ [d]∗, define ejn...j1 = ejn ⊗ · · · ⊗ ej1.
166
+ One notes that W(ξ) = l¯ξ + l∗
167
+ ξ
168
+ for any ξ ∈ H where l∗
169
+ ξ is the creation operator; this is a very easy instance of the gen-
170
+ eral Wick product formula (see for example [ABW, Proposition 2.12]).
171
+ Hence we have
172
+ Ai(ejn...j1) = eijn...j1 + �n
173
+ k=1 qn−kBijkejn...ˆjk...j1, where ˆjk means to omit jk.
174
+ 3
175
+
176
+ The aim is to exploit the results of [Ne2]; to that end we want to first define for each
177
+ i ∈ {1, . . . , d} operators Di : Fq(HU)alg → Fq(HU)alg such that
178
+ DiΩ = 0,
179
+ [Di, Aj] = BjiPCΩ,
180
+ j ∈ {1, . . . , d}.
181
+ We use below the notation of [MS, Section 4], both in the formulation and in the proofs; in
182
+ particular B(n+1) appearing the following lemma denotes a collection of partitions introduced
183
+ after [MS, Example 4.3]. We will just note the places where the arguments need to be extended
184
+ or modified.
185
+ Lemma 1.3. The algebraic formula for the dual variables is given as follows (i ∈ {1, . . . , d},
186
+ n ∈ N, j1, . . . , jn ∈ {1, . . . , d}):
187
+ Di(ejn . . . ej1) =
188
+
189
+ π∈B(n+1)
190
+ (−1)π(0)−1qcross(π)δB
191
+ p(π)es(π),
192
+ where δB
193
+ p(π) := �
194
+ (l,m)
195
+ l>m
196
+ ∈π Bjl,jm.
197
+ Proof. Check first that
198
+ [Di, Aj]Ω = Diej =
199
+
200
+ π∈B(2)
201
+ (−1)π(0)−1qcross(π)δB
202
+ p(π)es(π) = BjiΩ.
203
+ Then we compute
204
+ DiAjn+1(ejn . . . ej1) =Di
205
+
206
+ ejn+1...j1 +
207
+ n
208
+
209
+ l=1
210
+ qn−lBjn+1,jlejn...ˆjl...j1
211
+
212
+ = Diejn+1...j1 +
213
+ n
214
+
215
+ l=1
216
+
217
+ σ∈B(n)
218
+ (−1)σ(0)−1qcross(σ)+n−lδB
219
+ p(σ)Bjn+1,jles(σ)
220
+ and
221
+ Ajn+1Di(ejn . . . ej1) =
222
+
223
+ π∈B(n+1)
224
+ (−1)π(0)−1qcross(π)δB
225
+ p(π)ejn+1s(π)
226
+ +
227
+
228
+ π∈B(n+1)
229
+ |s(π)|
230
+
231
+ k=1
232
+ (−1)π(0)−1qcross(π)+|s(π)|−kδB
233
+ p(π)Bjn+1,js(π)kes(π)\s(π)k.
234
+ In the first step of the proof of [MS, Proposition 4.5] all terms in the last factor of the second
235
+ sum are identified with some terms in the last factor of the first sum, by taking a pair (π, k)
236
+ and setting σ ∈ B(n) by removing the singleton s(π)k and putting l = s(π)k. Then we just
237
+ have to observe that
238
+ δB
239
+ p(σ)Bjn+1,jles(σ) = δB
240
+ p(π)Bjn+1,js(π)kes(π)\s(π)k
241
+ (and compute the crossings exactly as in [MS]).
242
+ After the subtracting one is left in the first sum with the following terms:
243
+ Diejn+1...j1 +
244
+ n
245
+
246
+ l=1
247
+
248
+ σ∈B(n):σ(0)≥l
249
+ (−1)σ(0)−1qcross(σ)+n−lδB
250
+ p(σ)Bjn+1,jles(σ)
251
+ 4
252
+
253
+ Now to each pair (σ, l) as above we associate σ′ ∈ B(n + 2) by inserting a ‘new point’ at l
254
+ and pairing it with n + 1. Thus the last expression simplifies to (after counting the crossings
255
+ as in [MS])
256
+ Diejn+1...j1 −
257
+
258
+ σ′∈B(n+2):σ′(n+1) not a singleton
259
+ (−1)σ′(0)−1qcross(σ′)δB
260
+ p(σ′)es(σ′);
261
+ note that singletons do not change under this procedure, and δB
262
+ p(σ)Bjn+1,jl = δB
263
+ p(σ′).
264
+ The rest of the argument is just collecting the terms.
265
+
266
+ The following is the main result of this Section.
267
+ Proposition 1.4. For each i ∈ {1, . . . , d} we have e0 := Ω ∈ Dom D∗
268
+ i . Thus (D∗
269
+ 1e0, . . . , D∗
270
+ de0)
271
+ forms a set of conjugate variables for (A1, . . . , Ad).
272
+ Proof. As in [MS, Theorem 4.6] the proof amounts to studying the expression of the form
273
+ ⟨e0, Di(
274
+
275
+ w∈[d]∗
276
+ αwew)⟩Fq(HU),
277
+ where the sum is finite (but arbitrary). It is easy to see that it coincides with
278
+ (∗) :=
279
+
280
+
281
+ m=1
282
+
283
+ π∈B(2m),π(0)=m
284
+
285
+ |w|=2m−1
286
+ αw(−1)m−1qcross(π)δB
287
+ p(π),w
288
+ where δB
289
+ p(π),w is written for δB
290
+ p(π) in order to make the dependency on w explicit. Fix for the
291
+ moment m ≥ 1 and do two things at once: first rewrite each word w of length 2m − 1 as vjw′
292
+ with v, w′ words of length m − 1 and j ∈ {1, . . . , d}, and second identify each π ∈ B(2m),
293
+ π(0) = m with a permutation π′ ∈ Sm−1 (exactly as in [MS, Theorem 4.6]). We then have
294
+
295
+ π∈B(2m),π(0)=m
296
+
297
+ |w|=2m−1
298
+ αw(−1)m−1qcross(π)δB
299
+ p(π),w
300
+ = (−1)m−1q
301
+ m(m−1)
302
+ 2
303
+
304
+ π′∈Sm−1
305
+
306
+ |v|=m−1
307
+ d
308
+
309
+ j=1
310
+
311
+ |w′|=m−1
312
+ αvjw′qinv(π′)BjiδB
313
+ π′(v),w,
314
+ where δB
315
+ ρ(v),w = �m−1
316
+ l=1 Bvρ(l)wl = ⟨eρ(v), ew⟩H⊗|w|
317
+ U
318
+ and inv(π′) denotes the number of inversions
319
+ of the permutation π′ ∈ Sm−1. Further
320
+ (−1)m−1q
321
+ m(m−1)
322
+ 2
323
+
324
+ π′∈Sm−1
325
+
326
+ |v|=m−1
327
+ d
328
+
329
+ j=1
330
+
331
+ |w′|=m−1
332
+ αvjw′qinv(π′)BjiδB
333
+ π′(v),w
334
+ = (−1)m−1q
335
+ m(m−1)
336
+ 2
337
+
338
+ |w′|=m−1
339
+
340
+ |v|=m−1
341
+ d
342
+
343
+ j=1
344
+ Bjiαvjw′⟨ev, ew′⟩Fq(HU)
345
+ = (−1)m−1q
346
+ m(m−1)
347
+ 2
348
+
349
+ |v|=m−1
350
+ ⟨ev,
351
+
352
+ |w′|=m−1
353
+ d
354
+
355
+ j=1
356
+ Bjiαvjw′ew′⟩Fq(HU).
357
+ So now we fix v of length m − 1 and look at the vector �
358
+ |w′|=m−1
359
+ �d
360
+ j=1 Bijαvjw′ew′. We
361
+ note that this is nothing but �d
362
+ j=1 Bij ˜Lvj
363
+ ��
364
+ |w′|=m−1 αvjw′evjw′
365
+
366
+ , where ˜Lvj denotes the
367
+ 5
368
+
369
+ composition of the m relevant undeformed free annihilation operators (acting on Fq(HU)alg)
370
+ of the form ˜Lek for k ∈ {1, . . . , d}, whose action on Fq(HU)alg is given simply by
371
+ ˜Lek(ξ1 ⊗ · · · ⊗ ξn) = ⟨ek, ξ1⟩ξ2 ⊗ · · · ⊗ ξn.
372
+ Naturally we also have
373
+ d
374
+
375
+ j=1
376
+ Bij ˜Lvj
377
+
378
+
379
+
380
+ |w′|=m−1
381
+ αvjw′evjw′
382
+
383
+ � =
384
+ d
385
+
386
+ j=1
387
+ Bij ˜Lvj
388
+
389
+
390
+
391
+ |w′′|=2m−1
392
+ αw′′ew′′
393
+
394
+
395
+ where we have used the fact that the set {e1, . . . , ed} in H is orthonormal in the undeformed
396
+ scalar product. Set Ti,v : Fq(HU)alg → Fq(HU)alg, Ti,v := �d
397
+ j=1 Bij ˜Lvj. We need to argue that
398
+ Ti,v is bounded (and estimate its norm). Consider then a free left ‘undeformed’ annihilation
399
+ operator ˜L(ξ) for ξ ∈ H. Then for any η ∈ H we have
400
+ ⟨ξ, η⟩ =
401
+
402
+ 2A
403
+ 1 + A
404
+ � 2A
405
+ 1 + A
406
+ �−1
407
+ ξ, η
408
+
409
+ =
410
+ �� 2A
411
+ 1 + A
412
+ �−1
413
+ ξ, η
414
+
415
+ U
416
+ ,
417
+ so that setting ˜ξ = ( 2A
418
+ 1+A)−1ξ we see that ˜Lξ = L˜ξ, where L˜ξ denotes the free left annihilation
419
+ operator on Fq(HU)alg i.e. L˜ξ(ξ1 ⊗ · · · ⊗ ξn) = ⟨˜ξ, ξ1⟩Uξ2 ⊗ · · · ⊗ ξn. By [MS, Lemma 2.2] (and
420
+ linearity) we have ∥L˜ξ∥B(Fq(HU)) ≤ C∥˜ξ∥HU (where C > 0 depends only on q). But
421
+ ∥˜ξ∥2
422
+ HU = ⟨˜ξ, ˜ξ⟩U = ⟨ξ, ( 2A
423
+ 1 + A)−1ξ⟩ ≤ D2∥ξ∥2
424
+ H,
425
+ where D := ∥( 2A
426
+ 1+A)−1∥
427
+ 1
428
+ 2 . Thus finally for each j ∈ {1, . . . , d} we have ∥˜Lej∥B(Fq(HU)) ≤ CD,
429
+ and setting B := maxi,j∈{1,...,d} |Bij|, we obtain for each v ∈ [d]∗, |v| = m − 1,
430
+ ∥Ti,v∥B(Fq(HU)) ≤ dB(CD)m.
431
+ Then we obtain the following:
432
+ (∗) ≤
433
+
434
+
435
+ m=1
436
+ q
437
+ m(m−1)
438
+ 2
439
+
440
+ |v|=m−1
441
+ ∥ev∥Fq(HU)∥Ti,v∥∥
442
+
443
+ w∈[d]∗
444
+ αwew∥Fq(HU).
445
+ It is easy to check (as in [MS]) that if we set E = maxi,j∈{1,...,d} |⟨ei, ej⟩U| then we have for
446
+ each v ∈ [d]∗ of length k the estimate
447
+ ∥ev∥2
448
+ Fq(HU) ≤ Ek[k]|q|!.
449
+ The rest is just gathering the estimates:
450
+ (∗) ≤
451
+ � ∞
452
+
453
+ m=1
454
+ q
455
+ m(m−1)
456
+ 2
457
+ dm−1E
458
+ m−1
459
+ 2
460
+
461
+ [m − 1]|q|!dB(CD)m
462
+
463
+
464
+
465
+ w∈[d]∗
466
+ αwew∥Fq(HU),
467
+ and noting that the series inside the brackets converges.
468
+
469
+ In terminology of [Ne2] the last proposition can be rephrased as saying that the set
470
+ {A1, . . . , Ad}, which generates M, has finite free Fisher information. Together with Lemma
471
+ 1.2 this yields the following corollary.
472
+ 6
473
+
474
+ Corollary 1.5. Let HR be a finite-dimensional real Hilbert space equipped with an orthogo-
475
+ nal group (Ut)t∈R. The algebra Γq(HR, Ut) equipped with the canonical state ϕ is generated
476
+ by a finite set G = G∗ of eigenoperators of the modular group of ϕ with finite free Fisher
477
+ information.
478
+ Proof. By [Hia, Proof of Theorem 2.2] we can choose a set of linearly independent vectors
479
+ (ξ1, . . . , ξd) in H such that W(ξ1), . . . , W(ξd) form a self-adjoint set of eigenoperators of the
480
+ modular group of ϕ. Lemma 1.2 and Proposition 1.4 imply that {W(ξ1), . . . , W(ξd)} has
481
+ finite free Fisher information (see [Ne2, Remark 3.13]).
482
+
483
+ 2. Consequences for structure of q-Araki-Woods von Neumann algebras
484
+ We begin by quoting the main results of [Ne2] and some facts established in [SW] (see also
485
+ [BM]).
486
+ Theorem 2.1 ([Ne2], Theorem A). Let M be a von Neumann algebra with a faithful normal
487
+ state ϕ. Suppose M is generated by a finite set G = G∗, |G| ⩾ 2 of eigenoperators of the
488
+ modular group σϕ with finite free Fisher information. Then (Mϕ)′ ∩ M = C. In particular,
489
+ Mϕ is a II1 factor and if H < R×
490
+ ∗ is the closed subgroup generated by the eigenvalues of G
491
+ then M is a factor of type
492
+
493
+
494
+
495
+ III1
496
+ if H = R×
497
+
498
+ IIIλ
499
+ if H = λZ, 0 < λ < 1
500
+ II1
501
+ if H = {1}.
502
+ Theorem 2.2 ([Ne2], Theorem B). Let M be a von Neumann algebra with a faithful normal
503
+ state ϕ. Suppose M is generated by a finite set G = G∗, |G| ⩾ 2 of eigenoperators of the
504
+ modular group σϕ with finite free Fisher information. Then Mϕ does not have property Γ.
505
+ Furthermore, if M is a type IIIλ factor, 0 < λ < 1, then M is full.
506
+ Theorem 2.3 ([SW], Lemma 5(2) with its proof, and Theorem 7(1)). Let (HR, Ut) =
507
+ (KR, U′
508
+ t) ⊕ (LR, U′′
509
+ t ) be the decomposition into, respectively, the almost periodic and the weakly
510
+ mixing part.
511
+ Denote M := Γq(HR, Ut) and write M1 and M2 for the expected subalgebras
512
+ corresponding to, respectively, the almost periodic and the weakly mixing parts. Then
513
+ (i) Mϕ ⊂ M1, hence if x ∈ M ∩ M′ then x ∈ M1;
514
+ (ii) if (Ut)t∈R admits a non-zero fixed vector then M is a factor.
515
+ With Corollary 1.5 and these tools in hand we can completely characterize factoriality of
516
+ q-Araki-Woods algebras and establish all the other results listed in the introduction.
517
+ Theorem 2.4. Let (HR, Ut) be given, with dim(HR) ⩾ 2. Then M := Γq(HR, Ut) is a factor.
518
+ Moreover, if G < R×
519
+ ∗ is the closed subgroup generated by the eigenvalues of A then M is a
520
+ factor of type
521
+
522
+
523
+
524
+ III1
525
+ if G = R×
526
+
527
+ IIIλ
528
+ if G = λZ, 0 < λ < 1
529
+ II1
530
+ if G = {1}.
531
+ Proof. By Theorem 2.3 the center of M is contained in the almost periodic part, so we may
532
+ assume it is nontrivial. If it is one dimensional, then it necessarily contains a non-zero Ut-
533
+ invariant vector, so this case is covered by Theorem 2.3 as well. We can therefore assume
534
+ that we are in the almost periodic case with dim(HR) ⩾ 2. If HR is infinite dimensional then
535
+ 7
536
+
537
+ factoriality has been obtained by Hiai ([Hia, Theorem 3.2]). In the finite dimensional case we
538
+ can use Corollary 1.5 and Theorem 2.1.
539
+ If (Ut)t∈R is almost periodic then the centralizer Mϕ is irreducible in M (as follows from
540
+ Corollary 1.5 and Theorem 2.1 in finite dimensions and [Hia, Theorem 3.2] in the infinite
541
+ dimensional case). Therefore in this case the type classification can be simply obtained from
542
+ the spectral data of A as in the statement (see [Hia, Section 1]). On the other hand, if there
543
+ is a non-trivial weakly mixing part, [BM, Theorem 8.1] implies that M is a III1 factor (see
544
+ also [Hia, Theorem 3.4] for an earlier result in the purely weakly mixing case).
545
+
546
+ Theorem 2.5. The factor Γq(HR, Ut) is not injective as soon as dim(HR) ⩾ 2.
547
+ Proof. To prove non-injectivity, we will find an expected non-injective subalgebra; note that
548
+ the case where the weakly mixing part is non-trivial has already been covered in [Hia, Theorem
549
+ 3.4], where it was proved that in the purely weakly mixing case Γq(HR, Ut) is a non-injective
550
+ factor.
551
+ We therefore assume that we are in the almost periodic case. It means that either we will
552
+ find a two dimensional subspace on which (Ut)t∈R is trivial, or a two dimensional subspace
553
+ on which (Ut)t∈R is ergodic. In both cases the corresponding q-Araki-Woods algebra will be
554
+ non-injective and with expectation, from which we will be able to conclude. In the former
555
+ we are just dealing with a q-Gaussian algebra, which was covered in [Nou, Theorem 2]. In
556
+ the latter we can conclude from Corollary 1.5 and Theorem 2.2 that we have a type IIIλ full
557
+ subfactor, and fullness implies non-injectivity.
558
+
559
+ We saw above that the q-Araki Woods factor is full when it is of type IIIλ, 0 < λ < 1
560
+ and dimension of HR is finite. We now establish fullness in the remaining type III1 finite-
561
+ dimensional case as well. We also establish solidity of such factors (see [Oza] for the original
562
+ definition for finite von Neumann algebras and [HR] for the modification needed in the general
563
+ case).
564
+ Theorem 2.6. Let (HR, Ut) be given with 2 ≤ dim HR < ∞. Then M := Γq(HR, Ut) is solid
565
+ and full.
566
+ Proof. If (Ut)t∈R is trivial, then M is a q-Gaussian algebra and its fullness is proved in [MS].
567
+ If M is of type IIIλ, 0 < λ < 1, the statement about fullness follows from Corollary 1.5 and
568
+ Theorem 2.2.
569
+ It follows from [Kuz] that the Cuntz-Toeplitz algebra Tq(H) ⊂ B(Fq(HU)), i.e. the C∗-
570
+ algebra generated by the left creation operators {l∗
571
+ ξ : ξ ∈ H}, is nuclear, as an extension of
572
+ the Cuntz algebra by compacts. Arguing exactly as in [Sh2, Section4] we can thus deduce
573
+ that M satisfies the Akemann-Ostrand (AO) property. This further implies by [HR, Theorem
574
+ A] that M is ω-solid, where ω denotes a fixed non-principal ultrafilter and hence is solid (see
575
+ the definition of ω-solidity in [HR, Section 1]). Theorems 2.1 and 2.2 together with Corollary
576
+ 1.5 imply that the centralizer of M with respect to the canonical state is a non-injective II1
577
+ factor. We can thus invoke [HR, Proposition 3.10] to conclude fullness when M is a type III1
578
+ factor.
579
+
580
+ Remark 2.7. By [HI, Theorem 6.2] q-Araki-Woods factors are full if (Ut)t∈R has a weakly
581
+ mixing part. The same theorem also covers some almost periodic examples, but if the eigen-
582
+ values of the generator of (Ut)t∈R grow sufficiently fast then fullness remains an open problem.
583
+ Acknowledgments.
584
+ A.S. was partially supported by the National Science Center (NCN)
585
+ grant no.
586
+ 2020/39/I/ST1/01566.
587
+ M.W. was partially supported by the National Science
588
+ 8
589
+
590
+ Center (NCN) grant no. 2021/43/D/ST1/01446. The project is co-financed by the Polish
591
+ National Agency for Academic Exchange within Polish Returns Programme.
592
+ References
593
+ [ABW]
594
+ S. Avsec, M. Brannan and M. Wasilewski, Complete metric approximation property for q-Araki-
595
+ Woods algebras, J. Funct. Anal. 274 (2018), no. 2, 544–572.
596
+ [BKS]
597
+ M. Bo˙zejko, B. K¨ummerer, and R. Speicher, q-Gaussian processes: noncommutative and classical
598
+ aspects, Comm. Math. Phys. 185 (1997), no. 1, 129–154.
599
+ [BM]
600
+ P. Bikram and K. Mukherjee, Generator masas in q-deformed Araki-Woods von Neumann algebras
601
+ and factoriality, J. Funct. Anal. 273 (2017), no. 4, 1443–1478.
602
+ [BMRW]
603
+ P. Bikram, K. Mukherjee, ´E. Ricard and S. Wang, On the factoriality of q-deformed Araki-Woods
604
+ von Neumann algebras, Comm. Math. Phys., to appear, available at arXiv:2203.06366.
605
+ [Hia]
606
+ F. Hiai, q-deformed Araki-Woods algebras, in “Operator algebras and mathematical physics (Con-
607
+ stanta, 2001),” Theta, Bucharest, 2003, pp. 169–202.
608
+ [HR]
609
+ C. Houdayer and S. Raum, Asymptotic structure of free Araki-Woods factors, Math. Ann. 363
610
+ (2015), no. 1-2, 237–267.
611
+ [HI]
612
+ C. Houdayer and Y. Isono, Connes’ bicentralizer problem for q-deformed Araki-Woods algebras,
613
+ Bull. Lond. Math. Soc. 52 (2020). no. 6, 1010–1023.
614
+ [Kro]
615
+ I. Kr´olak, Factoriality of von Neumann algebras connected with general commutation relations –
616
+ finite dimensional case, in “Quantum probability”, Banach Center Publ. 73 (2006), pp. 277–284.
617
+ [Kuz]
618
+ A. Kuzmin, CCR and CAR Algebras are Connected Via a Path of Cuntz–Toeplitz Algebras,
619
+ Comm. Math. Phys., to appear, https://doi.org/10.1007/s00220-022-04580-x.
620
+ [MS]
621
+ A. Miyagawa and R. Speicher, A dual and conjugate system for q-Gaussians for all q, Adv. Math.
622
+ 413 (2023), 108834.
623
+ [Ne1]
624
+ B. Nelson, Free monotone transport without a trace, Comm. Math. Phys. 334 (2015), no. 3, 1245–
625
+ 1298.
626
+ [Ne2]
627
+ B. Nelson, On finite free Fisher information for eigenvectors of a modular operator, J. Funct. Anal.
628
+ 273 (2017), no. 7, 2292–2352.
629
+ [Nou]
630
+ A. Nou,
631
+ Asymptotic matricial models and QWEP property for q-Araki–Woods algebras,
632
+ J. Funct. Anal. 232 (2006), no. 2, 295–327.
633
+ [Oza]
634
+ N. Ozawa, Solid von Neumann algebras, Acta Math. 192 (2004), no. 1, 111–117.
635
+ [Ric]
636
+ ´E. Ricard, Factoriality of q-Gaussian von Neumann algebras, Comm. Math. Phys. 257 (2005), no.
637
+ 3, 659–665.
638
+ [Sh1]
639
+ D. Shlyakhtenko, Free quasi-free states, Pacific J. Math. 177 (2) (1997), 329–368.
640
+ [Sh2]
641
+ D. Shlyakhtenko, Some estimates for non-microstates free entropy dimension with applications to
642
+ q-semicircular families, Int. Math. Res. Not. 51 (2004), 2757–2772.
643
+ [SW]
644
+ A. Skalski and S. Wang, Remarks on factoriality and q-deformations, Proc. Amer. Math. Soc. 146
645
+ (2018), no. 9, 3813–3823.
646
+ [Sni]
647
+ P. ´Sniady, Factoriality of Bo˙zejko-Speicher von Neumann algebras, Comm. Math. Phys. 246 (2004),
648
+ no. 3, 561–567.
649
+ Institute of Mathematics of the Polish Academy of Sciences, ul. ´Sniadeckich 8, 00–656
650
+ Warszawa, Poland
651
+ Email address: [email protected]
652
+ Email address: [email protected]
653
+ Email address: [email protected]
654
+ 9
655
+
4NFAT4oBgHgl3EQflx07/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
6dA0T4oBgHgl3EQfN__p/content/tmp_files/2301.02156v1.pdf.txt ADDED
@@ -0,0 +1,1382 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ SciPost Physics
2
+ Submission
3
+ Spin polarization induced by decoherence in a tunneling
4
+ one-dimensional Rashba model
5
+ S. Varela1, M. Peralta1, V. Mujica2, B. Berche3, E. Medina4*
6
+ 1 Institute of Materials Science and Nanotechnology, Technische Universit¨at Dresden,
7
+ Dresden, Germany
8
+ 2 School of Molecular Sciences, Arizona State University, Tempe, AZ 85281, United States
9
+ 3 Laboratoire de Physique et Chimie Th´eoriques, Universit´e de Lorraine, Nancy, France
10
+ 4 Departamento de F´ısica, Colegio de Ciencias e Ingenier´ıa, Universidad San Francisco de
11
+ Quito, Quito, Ecuador
12
13
+ January 6, 2023
14
+ Abstract
15
+ Basic questions on the nature of spin polarization in two terminal systems and the
16
+ way in which decoherence breaks Time-Reversal Symmetry (TRS) are analyzed.
17
+ We exactly solve several one-dimensional models of tunneling electrons and show
18
+ the interplay of spin precession and decay of the wavefunction in either a U(1)
19
+ magnetic field or an effective Spin-Orbit (SO) magnetic field. Spin polarization is
20
+ clearly identified as the emergence of a spin component parallel to either magnetic
21
+ field. We show that Onsager’s reciprocity is fulfilled when time reversal symmetry
22
+ is present and no spin polarization arises, no matter the barrier parameters or
23
+ the SO strength.
24
+ Introducing a B¨uttiker’s decoherence probe, that preserves
25
+ unitarity of time evolution, we show that breaking of TRS results in a strong spin
26
+ polarization for realistic SO, and barrier strengths. We discuss the significance of
27
+ these results as a very general scenario for the onset of the Chiral-Induced Spin
28
+ Selectivity effect (CISS), now possibly matching experiments in a quantitative
29
+ manner.
30
+ Contents
31
+ 1
32
+ Introduction
33
+ 2
34
+ 2
35
+ Barrier model with a magnetic field
36
+ 3
37
+ 2.1
38
+ Spectrum, eigenfunctions, and wavevectors
39
+ 3
40
+ 2.2
41
+ Spin precession under the barrier with magnetic field
42
+ 5
43
+ 3
44
+ Barrier model with a Rashba term
45
+ 7
46
+ 3.1
47
+ Spectrum, eigenfunctions, and wavevectors
48
+ 7
49
+ 3.2
50
+ Spin precession under the barrier for Rashba
51
+ 10
52
+ 4
53
+ Other helicity Hamiltonians
54
+ 11
55
+ 1
56
+ arXiv:2301.02156v1 [cond-mat.mes-hall] 5 Jan 2023
57
+
58
+ SciPost Physics
59
+ Submission
60
+ 5
61
+ Decoherence with B¨uttiker’s probe
62
+ 12
63
+ 6
64
+ Summary and Discussion
65
+ 16
66
+ References
67
+ 18
68
+ 1
69
+ Introduction
70
+ The Spin-Orbit (SO) coupling is many times neglected in electron transport because of the
71
+ energy scale of the coupling, meV for C, N, O in chiral molecules and e.g. Si, Ga, and Ge
72
+ semiconductors in the bulk. Although the source of SO coupling in many technologically rel-
73
+ evant materials is atomic, how this coupling translates to transport depends on the geometry
74
+ of the connection between spin active atoms. This way in flat graphene, while atomic SO
75
+ coupling is meV, the effective transport SO coupling is µeV. The SO coupling cancels from
76
+ the nearest neighbour contribution due to interference effects and it is only when the second
77
+ neighbours coupling is introduced one gets a meV interaction. On the other hand, bending
78
+ the graphene sheet and producing e.g. nanotubes, increases the SO coupling by three orders
79
+ of magnitude, as it becomes a first neighbours interaction[1]. The same enhancement is seen
80
+ in silicene which has a corrugated surface structure that breaks the orthogonality of π orbitals
81
+ and the σ structure in graphene[2].
82
+ In the case of electron transport in molecules, the SO coupling has been largely disregarded
83
+ but has come into light due to large spin activity reported as Chiral-Induced Spin Selectivity
84
+ (CISS) effect[3]. CISS effect is observed for both point chiral[4] in amino acids, helical chirality
85
+ such as DNA[5], and helicene[6, 7]. Biological molecules generally combine both as in e.g.
86
+ oligopeptides[8, 9].
87
+ There exists an enormous gap in understanding between the size of the SO coupling
88
+ in molecules, in the meV range, and the magnitude of the spin polarization effect in CISS
89
+ effect experiments, above 40%[5]. This percentage exceeds the polarization strength produced
90
+ by transmission through ferromagnets. The SO coupling is almost universally regarded as
91
+ the spin active ingredient in CISS effect and theoretical estimates have yielded the correct
92
+ qualitative behavior i.e. helicity states with the propagation axis as the quantization axis of
93
+ the electron spin. On the other hand, the prediction for the magnitude of the spin polarization
94
+ is at least ten times smaller, when correct atomic SO coupling strengths are contemplated
95
+ [10, 11, 12, 13].
96
+ An important issue on the symmetries involved in electron transmission with two terminals
97
+ with SO coupling was pointed out by Yang, van der Wal and van Wees [14, 15]. As was clearly
98
+ argued, Onsager’s reciprocity precludes the possibility of spin polarization in the two terminal
99
+ setting in the linear regime, in contrast with the results of many works in the literature, both
100
+ experimentally and numerically. It is then important to observe how symmetry arguments
101
+ play out in specific calculations as reference results[14, 16]. Symmetry arguments alone cannot
102
+ say how sensitive these results will be in the face of weak symmetry-breaking perturbations,
103
+ in this case, of Time-Reversal Symmetry (TRS).
104
+ In this work we will discuss the simplest transmission model through a SO active barrier,
105
+ 2
106
+
107
+ SciPost Physics
108
+ Submission
109
+ as tunneling is a very common electron transfer mechanism in large molecules [17]. We will
110
+ explore the possibilities of spin-polarized electron transmission in a one-dimensional two-probe
111
+ setting for an exactly solved model. The action of a U(1) field on tunneling electrons[18] will
112
+ be contrasted with the effective momentum-dependent magnetic field arising from the SO
113
+ coupling. A very important issue in the latter case is the velocity operator’s non-diagonal
114
+ nature that secures the flux’s continuity through boundaries[19]. The strong result is that
115
+ while a U(1) magnetic field polarizes spin along its direction, under the action of the barrier,
116
+ no spin polarization results under the action of a spin-orbit magnetic field. Following, we
117
+ solve the model for the spin-orbit magnetic field under the effects of weak TRS breaking
118
+ decoherence effects, enacted through B¨uttiker’s probe. Large spin polarization highlights a
119
+ high sensitivity to TRS breaking with realistic SO couplings. These findings address the core
120
+ issue of CISS effect.
121
+ 2
122
+ Barrier model with a magnetic field
123
+ 2.1
124
+ Spectrum, eigenfunctions, and wavevectors
125
+ We will first fully solve analytically for the emblematic problem of a magnetic field under
126
+ a barrier for spinful particles[18]. The correct solution to this problem allowed for properly
127
+ addressing the tunneling time problem. B¨uttiker realised that spin precession in the field is
128
+ modulated by the spin-dependent decay of the wavefunctions under the barrier, generating
129
+ polarization in the direction of the magnetic field. The Hamiltonian in this case is given by
130
+ H =
131
+
132
+ ( p2
133
+ x
134
+ 2m + V0)1σ − Γσz,
135
+ if 0 < x < a
136
+ ( p2
137
+ x
138
+ 2m)1σ,
139
+ otherwise,
140
+ (1)
141
+ where 1σ is the unit matrix in spin space and σi are the Pauli spin matrices, with i = x, y, z.
142
+ Γ = ℏωL/2 where ωL is the Larmor frequency, and V0 is the barrier height. This Hamiltonian
143
+ has the dispersion relation depicted in Fig. 1. The choice of coordinates is slightly different
144
+ from that of B¨uttiker so we can discuss all one-dimensional models with the same notation.
145
+ The input wavefunction we choose to be
146
+ ψ =
147
+ 1
148
+
149
+ 1 + |s|2
150
+ � 1
151
+ is
152
+
153
+ .
154
+ (2)
155
+ The values of s = ±1 correspond to the two eigenfunctions of the σy matrix, and s =
156
+ ±i correspond to the two eigenfunctions of the σx matrix, appropriately normalized. The
157
+ eigenvalues of the Hamiltonian are
158
+ E = p2
159
+ x
160
+ 2m − σΓ + V0,
161
+ (3)
162
+ where σ = ±1 is the spin degree of freedom. Using E = ℏ2k2/2m, we define the wavevector
163
+ outside the barrier k. This Hamiltonian is not time-reversal invariant since inverting time
164
+ flips px and σ, and these flips change the energy. From the eigenvalue equation, one can then
165
+ distinguish between the different wavevectors under the barrier
166
+ κλ
167
+ σ = λ
168
+
169
+ k2 − k2
170
+ 0 + σk2
171
+ B
172
+ �1/2 ,
173
+ (4)
174
+ 3
175
+
176
+ SciPost Physics
177
+ Submission
178
+ Figure 1: The dispersion relation for the barrier with a magnetic field. The figure depicts the
179
+ degenerate κλ
180
+ σ vectors that occur in the barrier range.
181
+ where k2
182
+ B = 2mΓ/ℏ2 and k2
183
+ 0 = 2mV0/ℏ2. As can be seen, κλ
184
+ σ can only be real or imaginary.
185
+ Thus we have either exponentially decaying solutions for k2 < k2
186
+ 0 − σk2
187
+ B or plane waves
188
+ otherwise. As the Hamiltonian commutes with σz in the barrier region we can superpose
189
+ eigenfunctions of σz as
190
+ ψ1
191
+ =
192
+ 1
193
+
194
+ 1 + |s|2
195
+ � 1
196
+ is
197
+
198
+ eikx +
199
+ �A+
200
+ A−
201
+
202
+ e−ikx,
203
+ (5)
204
+ ψ2
205
+ =
206
+ ϵ
207
+ �1
208
+ 0
209
+
210
+ eiκ+
211
+ +x + ζ
212
+ �0
213
+ 1
214
+
215
+ eiκ+
216
+ −x + η
217
+ �1
218
+ 0
219
+
220
+ eiκ−
221
+ +x + θ
222
+ �0
223
+ 1
224
+
225
+ eiκ−
226
+ −x,
227
+ (6)
228
+ ψ3
229
+ =
230
+ �D+
231
+ D−
232
+
233
+ eikx.
234
+ (7)
235
+ The boundary conditions are
236
+ ψi(xb)
237
+ =
238
+ ψi+1(xb),
239
+ (8)
240
+ ˆvxψi(xb)
241
+ =
242
+ ˆvxψi+1(xb),
243
+ (9)
244
+ where ˆvx = (∂H/∂x)/m is the velocity operator and xb the boundary between the different
245
+ space regions. We match the wavefunction and the amplitude flux. This latter boundary
246
+ condition is very important to realize and has often been confused in the literature. Any
247
+ dependence of the mass on position (effective mass) should be carefully considered to yield
248
+ the appropriate hermitian velocity operator[20]. If the mass is a constant, then the boundary
249
+ conditions amount to matching the wavefunctions and the first derivatives thereof. Although
250
+ this problem can be separated into two spinless tunneling problems with different barrier
251
+ heights[18], we have decided to phrase somewhat more cumbersomely to make a few important
252
+ points when considering spin-orbit coupling.
253
+ 4
254
+
255
+ E
256
+ K_
257
+ +
258
+ 21
259
+ kSciPost Physics
260
+ Submission
261
+ The system of equations above can be solved to yield
262
+ D+ =
263
+ t+
264
+
265
+ 1 + |s|2
266
+ =
267
+ 2k(κ−
268
+ + − κ+
269
+ +)e−ia(−κ−
270
+ +−κ+
271
+ ++k)
272
+
273
+ |s|2 + 1
274
+
275
+ eiaκ−
276
+ +(κ−
277
+ + − k)(κ+
278
+ + + k) − eiaκ+
279
+ +(κ−
280
+ + + k)(κ+
281
+ + − k)
282
+ �,
283
+ D− =
284
+ ist−
285
+
286
+ 1 + |s|2
287
+ =
288
+ 2iks(κ−
289
+ − − ��+
290
+ −)e−ia(−κ−
291
+ −−κ+
292
+ −+k)
293
+
294
+ |s|2 + 1
295
+
296
+ eiaκ−
297
+ −(κ−
298
+ − − k)(κ+
299
+ − + k) − eiaκ+
300
+ −(κ−
301
+ − + k)(κ+
302
+ − − k)
303
+ �,
304
+ A+ =
305
+ r+
306
+
307
+ 1 + |s|2
308
+ =
309
+ (κ−
310
+ + − k)(k − κ+
311
+ +)
312
+
313
+ eiaκ−
314
+ + − eiaκ+
315
+ +
316
+
317
+
318
+ |s|2 + 1
319
+
320
+ eiaκ−
321
+ +(κ−
322
+ + − k)(κ+
323
+ + + k) − eiaκ+
324
+ +(κ−
325
+ + + k)(κ+
326
+ + − k)
327
+ �,
328
+ A− =
329
+ isr−
330
+
331
+ 1 + |s|2
332
+ =
333
+ is(κ−
334
+ − − k)(k − κ+
335
+ −)
336
+
337
+ eiaκ−
338
+ − − eiaκ+
339
+
340
+
341
+
342
+ |s|2 + 1
343
+
344
+ eiaκ−
345
+ −(κ−
346
+ − − k)(κ+
347
+ − + k) − eiaκ+
348
+ −(κ−
349
+ − + k)(κ+
350
+ − − k)
351
+ �. (10)
352
+ where the t± and r± denote the transmission and reflection amplitudes.
353
+ We recall κλ
354
+ σ =
355
+ λ
356
+ ��
357
+ k2 − k2
358
+ 0 + σk2
359
+ B
360
+
361
+ . In the next section, we obtain the behavior of the spin as a function
362
+ of the magnetic field strength consistent with tunneling and we see both regular Larmor
363
+ precession with V0 = 0, and precession combined with spin alignment in the field direction
364
+ when tunneling occurs.
365
+ 2.2
366
+ Spin precession under the barrier with magnetic field
367
+ One readily verifies the differential decay of the transmission with the length of the barrier as
368
+ T+ ∼ e−2κ+
369
+ +a, and T− ∼ e−2κ+
370
+ −a as long as E < V0 ∓ ℏωL/2. The following relations quantify
371
+ the polarization of the electron, the transmitted (T) wave is
372
+ ψT =
373
+ 1
374
+
375
+ |D+|2 + |D−|2
376
+ �D+
377
+ D−
378
+
379
+ eikx,
380
+ (11)
381
+ and the spin averages are defined by
382
+ ⟨sz⟩
383
+ =
384
+
385
+ 2⟨ψT |σz|ψT ⟩ = ℏ
386
+ 2
387
+ |D+|2 − |D−|2
388
+ |D+|2 + |D−|2 ,
389
+ ⟨sy⟩
390
+ =
391
+
392
+ 2⟨ψT |σy|ψT ⟩ = iℏ
393
+ 2
394
+ D+D∗
395
+ − − D∗
396
+ +D−
397
+ |D+|2 + |D−|2 ,
398
+ ⟨sx⟩
399
+ =
400
+
401
+ 2⟨ψT |σx|ψT ⟩ = ℏ
402
+ 2
403
+ D+D∗
404
+ − + D∗
405
+ +D−
406
+ |D+|2 + |D−|2 .
407
+ (12)
408
+ Analogous relations can be written for the reflected wave. A spin oriented in the y direction
409
+ (corresponding to s = −1, see Eq. (2) will Larmor precess around the magnetic field (in z
410
+ direction) when V0 = 0 as shown in Fig. 2.
411
+ On the other hand, for V0 > E ± ℏωL/2, spin precession around the magnetic field is only
412
+ part of the average spin motion, since each spin component decays at a different rate under
413
+ the barrier. This gives rise to a z-component that aligns with the direction of the field[18].
414
+ Figure 3 depicts the qualitative motion for the latter case. For V0 < E ± ℏωL/2 only Larmor
415
+ precession follows.
416
+ 5
417
+
418
+ SciPost Physics
419
+ Submission
420
+ Figure 2: Precession of the spin as it goes through an increasing barrier length a starting from
421
+ the 1/
422
+
423
+ 2 (1
424
+ − i) state, for V0 = 0. This is the simple Larmor precession initially surmised
425
+ for tunneling times[18].
426
+ Figure 3: Relaxation of spin toward magnetic field direction due to tunneling when k2 <
427
+ k2
428
+ 0 ∓ k2
429
+ B[18]. For long enough barriers the spin becomes completely polarized in the direction
430
+ of the field. The reference values taken for the plot are k = 2/a, k0 = 3/a, and kB = 1/a,
431
+ where a is the barrier length.
432
+ 6
433
+
434
+ 1.0
435
+ 0.5
436
+ 0.0
437
+ <Sx)
438
+ 2
439
+ -0.5
440
+ B
441
+ 0
442
+ a
443
+ -1.0
444
+ 0
445
+ 2
446
+ 4
447
+ 6
448
+ 8
449
+ 10
450
+ a1.0
451
+ 2
452
+ (Sz)
453
+ 0.5
454
+ B
455
+ a
456
+ 0.0
457
+ <sx)
458
+ -0.5
459
+ -1.0
460
+ 0
461
+ 2
462
+ 4
463
+ 6
464
+ 8
465
+ 10
466
+ aSciPost Physics
467
+ Submission
468
+ Finally, Fig. 4 shows the transmitted probability in z quantization axis. The input spin
469
+ orientation is along the negative y axis and the transmitted wave selects the up spin orientation
470
+ due to the slower decay of the lower energy state under the barrier.
471
+ This produces spin
472
+ alignment with the magnetic field.
473
+ Figure 4: Transmission contrast between spin components for a magnetic field under the
474
+ barrier. One can see the preferred spin polarization due to the slower decay of the lower
475
+ energy spin configuration under the barrier, leading to an alignment of the entering spin to
476
+ the magnetic field.
477
+ A very important relationship to check is that of the conservation of angular momentum.
478
+ As proven in reference [18], the conservation can be stated exactly as
479
+ (R+ + R−)⟨sz⟩R = −⟨sz⟩(T+ + T−),
480
+ (13)
481
+ where T+ = |t+|2 and R+ = |r+|2 and ⟨sz⟩R is the reflected (R) spin component in the z
482
+ direction.
483
+ Such a relationship is verified in Fig. 5 where the changed angular momentum transmitted
484
+ is compensated by the opposite angular momentum reflected. We have thus verified B¨uttiker’s
485
+ scenario for tunneling with a magnetic field under the barrier. Before addressing the case of
486
+ the SO coupling in one dimension, some useful gauge concepts will be introduced.
487
+ 3
488
+ Barrier model with a Rashba term
489
+ 3.1
490
+ Spectrum, eigenfunctions, and wavevectors
491
+ We solve the scattering problem for the following model
492
+ H =
493
+
494
+ ( p2
495
+ x
496
+ 2m + V0)1σ + Λpxσy,
497
+ if 0 < x < a
498
+ ( p2
499
+ x
500
+ 2m)1σ,
501
+ otherwise,
502
+ (14)
503
+ where 1σ is the unit matrix in spin space and σi are the Pauli spin matrices. H acts on the
504
+ spinors ψ = (ψ+(x) ψ−(x)) where |ψ±|2dx is the probability of find a particle between x and
505
+ x + dx with spin ±ℏ/2. This Hamiltonian can be obtained from a helical model of a molecule
506
+ 7
507
+
508
+ 1.0
509
+ 1
510
+ x 10-4
511
+ V2
512
+ (-i
513
+ (0)
514
+ 0.8
515
+ 2
516
+ 0.6
517
+ T+
518
+ B
519
+ 0.4
520
+ 0
521
+ a
522
+ (0)
523
+ 0.2
524
+ T
525
+ (i)
526
+ 0.0
527
+ 0.0
528
+ 0.5
529
+ 1.0
530
+ 1.5
531
+ 2.0
532
+ 2.5
533
+ 3.0
534
+ kBSciPost Physics
535
+ Submission
536
+ Figure 5: Angular momentum conservation balancing transmitted spin up (z-component)
537
+ and reflected spin down. As there is no incident spin-up current the two previous components
538
+ (Eq. (13)) must balance.
539
+ with p wave overlaps and SO active Carbon/Nitrogen atoms[21, 22, 23]. The magnitude of
540
+ the SO coupling considered is in fact derived from the overlaps that are only feasible for the
541
+ chiral structure considered in those models.
542
+ We take the incident beam to have an amplitude
543
+ ψ =
544
+
545
+ 2
546
+
547
+ 1 + s2
548
+ � 1+s
549
+ 2
550
+ 1−s
551
+ 2
552
+
553
+ ,
554
+ (15)
555
+ where s = 1 corresponds to the up-spin normalized eigenstate of the σz matrix and s = −1 to
556
+ the down-spin state. The normalization also allows access to all spin states in the x−z plane of
557
+ the Bloch sphere. Here we will illustrate how the SU(2) gauge vector for the one-dimensional
558
+ Rashba Hamiltonian becomes crucial in the barrier boundary conditions[19] which has been
559
+ missed in previous treatments.
560
+ We can faithfully rewrite the Hamiltonian in the following form
561
+ H =
562
+ 1
563
+ 2m (ˆpx1σ + mΛ(x)σy)2 + V0 − mΛ2
564
+ 2
565
+ ,
566
+ (16)
567
+ where we can identify the SU(2) gauge field Ax = Ay
568
+ xσy = mΛ(x)σy. The velocity opera-
569
+ tor defined by vx = ∂H/∂px = ((px/m)1σ + Λσy), where no effective mass differences are
570
+ considered[20] for the different scattering regions. Solving for the eigenvalues of this Hamil-
571
+ tonian, we arrive at
572
+ E =
573
+ 1
574
+ 2m (px + mσΛ)2 − mΛ2
575
+ 2
576
+ + V0,
577
+ (17)
578
+ where σ = ±1 is the spin quantum number (eigenvalue label of SU(2) Hamiltonian). Equating
579
+ E = ℏ2k2/2m we define the wavevector outside the barrier region as k. Starting from the
580
+ eigenvalue, we can solve for the possible values of px = ℏq. A new quantum number arises that
581
+ distinguishes right and left propagating waves. The resulting possible values of the wavevector
582
+ under the barrier are
583
+
584
+ σ = λ
585
+
586
+ k2 + k2so − k2
587
+ 0 − σkso,
588
+ (18)
589
+ 8
590
+
591
+ 1.5
592
+ X 10-2
593
+ 4
594
+ 1.0
595
+ 2
596
+ 0
597
+ (T++T-)<sz)
598
+ -2
599
+ 0.5
600
+ -4
601
+ 0.0
602
+ 0.5
603
+ 1.0
604
+ 1.5
605
+ 2.0
606
+ 0.0
607
+ -0.5
608
+ (R++ R_)<sz)R
609
+ -1.0
610
+ 0
611
+ 2
612
+ 4
613
+ 6
614
+ 8
615
+ 10
616
+ kSciPost Physics
617
+ Submission
618
+ where kso = mΛ/ℏ and k2
619
+ 0 = 2mV0/ℏ2. The meaning of the quantum numbers is depicted in
620
+ Fig. 6, where the degeneracy of two Kramer’s pairs is evident. Note that for each direction of
621
+ propagation, there are two distinct wavevectors with opposite spin labels and that the previous
622
+ wave vector can be real or complex depending on the values of the incoming wavevector (with
623
+ energy E = ℏ2k2/2m) and the height of the potential barrier.
624
+ As is easily derived from
625
+ Figure 6: Dispersion for Hamiltonian in Eq. (14) The labels correspond to the wavevectors in
626
+ the barrier region with qλ
627
+ σ
628
+ Eq. (14), the Hamiltonian commutes with σy, and ˆpx so it has common eigenstates with
629
+ σy and the ˆpx eigenstates.
630
+ In the σz basis the wavefunctions in the different regions are
631
+ parameterized as follows
632
+ ψ1
633
+ =
634
+ � 1+s
635
+ 2
636
+ 1−s
637
+ 2
638
+
639
+ eikx +
640
+ �A+
641
+ A−
642
+
643
+ e−ikx,
644
+ ψ2
645
+ =
646
+ α
647
+
648
+ 2
649
+ �1
650
+ i
651
+
652
+ eiq+
653
+ +x + β
654
+
655
+ 2
656
+ � 1
657
+ −i
658
+
659
+ eiq+
660
+ −x + γ
661
+
662
+ 2
663
+ �1
664
+ i
665
+
666
+ eiq−
667
+ +x + δ
668
+
669
+ 2
670
+ � 1
671
+ −i
672
+
673
+ eiq−
674
+ −x,
675
+ (19)
676
+ ψ3
677
+ =
678
+ �D+
679
+ D−
680
+
681
+ eikx,
682
+ (20)
683
+ where the coupling between the direction of propagation and spin orientation has been im-
684
+ plemented by the appropriate qλ
685
+ σ wavevectors. The boundary conditions at the barriers limits
686
+ xb are
687
+ ψi(xb)
688
+ =
689
+ ψi+1(xb),
690
+ ˆvxψi(xb)
691
+ =
692
+ ˆvxψi+1(xb),
693
+ (21)
694
+ where i = 1, 2, the index of the regions, and ˆvx = (ˆpx + mΛσy) /m. The second condition guar-
695
+ antees the continuity of the probability flux and not just the derivative of the wavefunction[19].
696
+ The linear system of eight unknowns can be explicitly solved for the transmission and reflec-
697
+ 9
698
+
699
+ E
700
+ qt
701
+ q+
702
+ 9.
703
+ bSciPost Physics
704
+ Submission
705
+ tion amplitudes
706
+ t+
707
+ =
708
+ (1 + i)∆ke−iak �
709
+ (1 − is)eiksoa + (s − 1)e−iksoa�
710
+ (e−ia∆(∆ + k)2 − eia∆(k − ∆)2)
711
+ ,
712
+ t−
713
+ =
714
+ −(1 + i)∆ke−iak �
715
+ (s + i)eiksoa − (1 + is)e−iksoa�
716
+ (e−ia∆(∆ + k)2 − eia∆(k − ∆)2)
717
+ ,
718
+ r+
719
+ =
720
+ (k − ∆)(∆ + k)(s + 1)
721
+
722
+ (k − ∆)2e2ia∆ + (∆ + k)2e−2ia∆ − 2(k2 + ∆2)
723
+
724
+ 2 (e−ia∆(∆ + k)2 − eia∆(k − ∆)2)2
725
+ ,
726
+ r−
727
+ =
728
+ −(k − ∆)(∆ + k)(s − 1)
729
+
730
+ (k − ∆)2e2ia∆ + (∆ + k)2e−2ia∆ − 2
731
+
732
+ k2 + ∆2��
733
+ 2 (e−ia∆(∆ + k)2 − eia∆(k − ∆)2)2
734
+ , (22)
735
+ where ∆ =
736
+
737
+ k2 + k2so − k2
738
+ 0.
739
+ Such amplitudes will be very important to understand how
740
+ decoherence effects generate spin polarization. The barrier region amplitudes are
741
+ α
742
+ =
743
+ (−1)1/4eiaq−
744
+ +k(s − i)(k + ∆)
745
+ −eiaq+
746
+ +(k − ∆)2 + eiaq−
747
+ +(k + ∆)2 ,
748
+ β
749
+ =
750
+ (−1)1/4k(1 − is)eiaq−
751
+ −(∆ + k)
752
+ eiaq−
753
+ −(∆ + k)2 − eiaq+
754
+ −(k − ∆)2 ,
755
+ (23)
756
+ and
757
+ γ
758
+ =
759
+ (−1)1/4k(s − i)eiaq+
760
+ +(k − ∆)
761
+ eiaq+
762
+ +(k − ∆)2 − eiaq−
763
+ +(∆ + k)2 ,
764
+ δ
765
+ =
766
+ (−1)1/4k(1 − is)eiaq+
767
+ −(k − ∆)
768
+ eiaq+
769
+ −(k − ∆)2 − eiaq−
770
+ −(∆ + k)2 .
771
+ (24)
772
+ We recall that qλ
773
+ σ = λ
774
+
775
+ k2 + k2so − k2
776
+ 0 − σkso.
777
+ 3.2
778
+ Spin precession under the barrier for Rashba
779
+ The transmission of up-spin as a function of the entry spin polarization is
780
+ |t+|2
781
+ =
782
+ 8|∆|2k2[1 + s cos(2ksoa)]
783
+ |e−ia∆(∆ + k)2 − eia∆(k − ∆)2|2 ,
784
+ |t−|2
785
+ =
786
+ 8|∆|2k2[1 − s cos(2ksoa)]
787
+ |e−ia∆(∆ + k)2 − eia∆(k − ∆)2|2
788
+ (25)
789
+ from where we can see that |ttotal|2 = |t+|2 + |t−|2 so the total conductance is
790
+ Gtotal
791
+ =
792
+ G+ + G−
793
+ =
794
+ e2
795
+ h |ttotal|2 =
796
+ 16e2|∆|2k2
797
+ h |e−ia∆(∆ + k)2 − eia∆(k − ∆)2|2 ,
798
+ (26)
799
+ where G± = (e2/h)|t±|2, which is spin independent[19, 24] even in the presence of a barrier
800
+ and an open system at either end of the barrier.
801
+ 10
802
+
803
+ SciPost Physics
804
+ Submission
805
+ Figure 7: Precession of spin around the spin-orbit magnetic field. Note that as the k vector
806
+ inside the barrier has always a real part, we have pure precession with no tilting toward the
807
+ magnetic field as with the magnetic field in the previous section. This happens below and
808
+ above the barrier.
809
+ Following the definitions for average spin components in Eq. (.12), we can now see the
810
+ behavior of the injected spin into the spin-orbit active barrier. Fig. 7 shows how the average
811
+ spin traverses the spin-active barrier region with SO coupling. In analogy with B¨uttiker’s
812
+ U(1) magnetic field, we can define a new momentum-dependent magnetic field BSO given
813
+ the mapping λpxσy = −γBSO · σ that results in BSO = −(Λ/γ)pxuy. BSO lies in the nega-
814
+ tive y direction for the model Hamiltonian. Precession follows correctly the torque equation
815
+ d⟨s⟩/dt = γ⟨s⟩×BSO. Note that, as even under the barrier, the wavevector is complex, unlike
816
+ the magnetic field case, precession proceeds with no generation of a spin component along the
817
+ BSO direction. Also, both spin components suffer the same decay within the barrier (although
818
+ dependent on SO) independent of their spin orientation (see Eq. (18)).
819
+ We can see from comparing the two cases (magnetic field and SO) that one superposes
820
+ different k vectors corresponding with the same energy when traversing the spin active region.
821
+ The two wavevectors, having different real parts, cause precession due to a torque around the
822
+ direction of BSO. In the case of a real magnetic field, under the barrier, the k vector is purely
823
+ imaginary, and only a spin-dependent decay ensues (see Eq. (4)), producing an alignment of
824
+ the spin in the magnetic field direction. In the case of the SO, there is always a real part to the
825
+ k vector (even under the barrier) so that precession occurs for energies above and below the
826
+ barrier. No spin polarization along BSO follows from this scenario in tune with time-reversal
827
+ symmetry.
828
+ 4
829
+ Other helicity Hamiltonians
830
+ Varying the Hamiltonian under the barrier to the case where the eigenstates are projected
831
+ along the direction of propagation (helicity states), can be interpreted directly from the pre-
832
+ 11
833
+
834
+ 1.0
835
+ (Sx)
836
+ 0.5
837
+ 0.0
838
+ (Sz)
839
+ 2
840
+ -0.5
841
+ 0
842
+ y
843
+ 0
844
+ a
845
+ -1.0
846
+ Bso
847
+ 0.0
848
+ 0.5
849
+ 1.0
850
+ 1.5
851
+ 2.0
852
+ 2.5
853
+ 3.0
854
+ aSciPost Physics
855
+ Submission
856
+ vious results. The Hamiltonian in this case is
857
+ H =
858
+
859
+ ( p2
860
+ x
861
+ 2m + V0)1σ + Λpxσx,
862
+ if 0 < x < a
863
+ ( p2
864
+ x
865
+ 2m)1σ,
866
+ otherwise.
867
+ (27)
868
+ The SO magnetic field is now in the x direction as BSO = −Λpx/γ ux. Working out the
869
+ eigenstates in the SO active region, the eigenstates will be those of σx matrix, and the possible
870
+ k vectors will be κλ
871
+ σ = λ
872
+
873
+ k2 + k2so − k2
874
+ 0−σkso as before. The k-vector under the barrier always
875
+ has a real part that results in a spin precession. If we start from a spin orientation in the
876
+ z-axis, then the spin will precess around the x axis without generating a spin component in
877
+ the x direction. So no changes from the conclusion in the previous section follow in this case.
878
+ 5
879
+ Decoherence with B¨uttiker’s probe
880
+ The spin-orbit coupling does not contrast between spin species, so it cannot, alone, account
881
+ for polarised spin polarization as expected in CISS effect. Nevertheless, the perfect conditions
882
+ under which these results are valid i.e., no coupling to a TRS breaking probe beyond the
883
+ two terminals, are not met, especially at room temperature conditions.
884
+ A thermalization
885
+ of electron transport to the environment through the electron-phonon or electron-electron
886
+ interactions is inevitable. This environment can be modeled as a lumped probe that disrupts
887
+ the delicate coherences that yield Bardarson’s theorem that translates into transport as the
888
+ Onsager reciprocity relations in the linear regime. This turns our attention to a tunneling
889
+ molecular system to a three-probe scenario.
890
+ Figure 8: B¨uttiker’s probe under the spin-orbit active barrier. The probe absorbs each eigen-
891
+ state spin species under the barrier with the same scattering matrix, so no spurious spin
892
+ selection is induced. Flux conditions are imposed on building the S matrix for a wideband
893
+ B¨uttiker probe.
894
+ The B¨uttiker’s voltage probe[25] is an ingenious way to introduce decoherence processes
895
+ through the scattering matrix for an exactly solved model. Here we introduce a generalization
896
+ of the probe used previously in the context of persistent currents[26, 27, 28] (see Fig.
897
+ 8).
898
+ The probe is spin insensitive, so we do not introduce extraneous sources of spin selection.
899
+ This is achieved by introducing two probes, one for each spin species at the same point
900
+ connected to a third reservoir thermalized to a Fermi distribution at temperature T. The
901
+ probe is wide-band, supporting the wavevectors injected by the barrier channels. The probe
902
+ scattering matrix returns an amplitude consistent with a simple electron reservoir unrelated
903
+ 12
904
+
905
+ (1)
906
+ ikx
907
+ ikx
908
+ 0
909
+ D
910
+ I(α, β, , )
911
+ T(α',β', Y', S"
912
+ S
913
+ A.
914
+ (.
915
+ a+Kma
916
+ N(C_eiky +e-ixy)SciPost Physics
917
+ Submission
918
+ Figure 9: Precession when the decoherence probe couples to a particular point under the
919
+ barrier. A noticeable disruption of spin precession is observed, generating a spin polarization
920
+ analogous to an actual magnetic field (see Fig. 3, realizing broken time-reversal symmetry).
921
+ to the input amplitude (while preserving unitarity) so that a disruption to the interferences
922
+ occurs according to the local fluxes of each spin orientation. Such a probe introduces TRS
923
+ breaking that generates the B¨uttiker tilting of the spin in the BSO direction producing net
924
+ spin polarization.
925
+ The behavior of the B¨uttiker probe follows the combination of an ideal lead with v = ℏκ/m
926
+ that supports a current dI = ev(dN/dE)f(E)dE in the energy interval dE, where f(E) is the
927
+ Fermi distribution, dN/dE = 1/2πℏv is the density of states. This model can then induce
928
+ level broadening[26, 27], ([28] for Hamiltonian version) and level shifts under the barrier, and
929
+ also depends on where the decoherence event occurs. Besides the coupling of the probe to the
930
+ barrier, we can also control the temperature through the Fermi distribution of the attached
931
+ reservoir. A somewhat different model is discussed in [29], where they consider inelastic events
932
+ and thus probability leakage. Here S†S = 1 so that only decoherence is contemplated.
933
+ Figure 8 shows the four regions that must be matched for continuity and flux. Under
934
+ the barrier, the matching occurs at position (x0, y0) = (x0, 0) where y describes the coordi-
935
+ nate of the third probe. The Scattering (S) matrix can then emulate a generic dephasing
936
+ process[26]. Matching flux conditions at x0 yields the following S matrix between input and
937
+ output amplitudes for each spin species (spin eigenstates under the barrier).
938
+ Ψout =
939
+
940
+
941
+
942
+ Nζ−
943
+ β′
944
+ δ
945
+
946
+ � = S−Ψin =
947
+
948
+
949
+
950
+ −(A + B)
951
+ −√εeiq−
952
+ −x0
953
+ √εeiq+
954
+ −x0
955
+ √εe−iq+
956
+ −x0
957
+ −Ae−2i∆x0
958
+ B
959
+ −√εe−iq−
960
+ −x0
961
+ B
962
+ Ae2i∆x0
963
+
964
+
965
+
966
+
967
+
968
+
969
+ N
970
+ δ′
971
+ β
972
+
973
+ � ,
974
+ (28)
975
+ where Ψin,out represent the input/output amplitudes to the junction and S− is the scatter-
976
+ ing matrix for the spin-down label. The labels follow the usage previously introduced where
977
+
978
+ σ, with σ the spin label and λ the sense of propagation label. A = (√1 − 2ε − 1)/2 and
979
+ B = (√1 − 2ε + 1)/2, while N = ef(E)dE/2πℏv with f(E) the Fermi distribution, e the
980
+ electron charge, E the energy and v the velocity of the carriers in the lead[25]. 0 < ε < 0.5
981
+ describes the coupling of the probe to the barrier from uncoupled to fully coupled.
982
+ 13
983
+
984
+ 1.0
985
+ 0.5
986
+ 0.0
987
+ 2
988
+ <Sz)
989
+ -0.5
990
+ 0
991
+ a
992
+ Bso
993
+ -1.0
994
+ 0.0
995
+ 0.5
996
+ 1.0
997
+ 1.5
998
+ 2.0
999
+ 2.5
1000
+ 3.0
1001
+ a(nmSciPost Physics
1002
+ Submission
1003
+ The results regarding the influence of decoherence, barrier length, and SO coupling is
1004
+ depicted in Figs. 9 and 11. In Fig. 9, one can see that the SO coupled to the third probe
1005
+ produces a smooth disruption of the spin precession which is no longer in the (x, z) plane but
1006
+ achieves a large polarization in the direction of the SO magnetic field (see inset). Thus, the
1007
+ BSO acts as a regular symmetry-breaking interaction such as a real magnetic field in Fig. 3.
1008
+ Figure 10: Transmission contrast of spin orientations along the y quantization axis (BSO field
1009
+ orientation). The input spin wavefunction in the (1 0) orientation, which has equal amplitudes
1010
+ in the latter basis, acquires a preferred orientation aligned with the BSO field analogously to
1011
+ the U(1) magnetic field case.
1012
+ Figure 11: Spin polarization generated by decoherence analogous to that caused by a real
1013
+ external magnetic field. The contour plot shows the effect of a spin-orbit and decoherence
1014
+ coupling, consistent with estimates of ref.[21] for tunneling. The appearance of alignment of
1015
+ the spin to the BSO is very sensitive to the coupling to the B¨uttiker probe, producing up to
1016
+ 16% polarization with realistic values of SO coupling.
1017
+ 14
1018
+
1019
+ 5
1020
+ X 10~4
1021
+ 4
1022
+ 1-
1023
+ 3
1024
+ T
1025
+ 2
1026
+ 1
1027
+ 0
1028
+ 0.00
1029
+ 0.05
1030
+ 0.10
1031
+ 0.15
1032
+ 0.200.20
1033
+ 0.15
1034
+ 0
1035
+ -0.05
1036
+ -0.10
1037
+ -0.15
1038
+ 0.10
1039
+ -0.20
1040
+ -0.25
1041
+ -0.30
1042
+ -0.35
1043
+ 0.05
1044
+ -0.40
1045
+ 0.00
1046
+ 0.00
1047
+ 0.02
1048
+ 0.04
1049
+ 0.06
1050
+ 0.08
1051
+ 0.10
1052
+ kso(nm-1)SciPost Physics
1053
+ Submission
1054
+ Figure 10 depicts the transmission contrast between spin components along the y axis in
1055
+ which the BSO field is oriented. As can be seen, the spin acquires a preferred direction along
1056
+ the −y direction aligning with the SO magnetic field. This is analogous to the case of the TRS
1057
+ breaking U(1) magnetic field considered at the outset. When the SO strength is zero, the two
1058
+ components merge, showing no spin activity, and only express the transmission through the
1059
+ barrier.
1060
+ Figure 11 shows the dependence of the new polarization as a function kso, and the coupling
1061
+ to the reservoir. In contrast to previous figures depicting qualitative precession features, here
1062
+ we have set the parameters to realistic ranges for spin-orbit strength, barrier height, and
1063
+ barrier-probe coupling[21]. It is evident that even for weak coupling (ε) and ESO ∼ 10 meV,
1064
+ one can achieve polarizations of 40%. The polarization effects can yield positive and negative
1065
+ polarizations depending on the length of the barrier a and exhibit a non-trivial temperature
1066
+ dependence. No spin polarization is produced without the SO interaction, no matter the
1067
+ coupling to the third probe.
1068
+ Figure 12: Spin polarised component for k = 0.6 nm−1, k0 = 2 nm−1, a = 4 nm, x0 = 1.5 nm.
1069
+ Manifest interference effects in the spin polarization through the coupling to the third probe.
1070
+ Small couplings to the probe can produce large polarizations while larger couplings degrade
1071
+ the polarization. Note the high sensitivity to the probe coupling that cannot be surmised
1072
+ solely based on symmetry arguments.
1073
+ Figure 12 shows the non-monotone/interference effects of coupling to the third probe and
1074
+ the sensitivity to the coupling to the third probe. Sufficiently large values of SO wavevec-
1075
+ tor kso, can produce a large polarization at low coupling, while large couplings degrade the
1076
+ polarization. Figure 13 depicts the temperature dependence of the polarization as a func-
1077
+ tion of the barrier length. The temperature dependence is expressed through the parameter
1078
+ N = ef(E)dE/2πℏv proportional to the thermal occupation of the probe. As temperature
1079
+ rises N is reduced so that as the temperature is increased, the polarization increases for fixed
1080
+ barrier length. Non-monotone effects with the probe coupling can change this temperature
1081
+ dependence. They will be determined by the specific nature of how the electron spin current
1082
+ 15
1083
+
1084
+ 0.10
1085
+ 0.08
1086
+ 0
1087
+ -0.1
1088
+ 0.06
1089
+ -0.2
1090
+ -0.3
1091
+ 0.04
1092
+ -0.4
1093
+ -0.5
1094
+ -0.6
1095
+ 0.02
1096
+ 0.00
1097
+ 0.00
1098
+ 0.05
1099
+ 0.10
1100
+ 0.15
1101
+ 0.20
1102
+ kso(nm-1)SciPost Physics
1103
+ Submission
1104
+ Figure 13: Temperature dependence of spin polarization as a function of the barrier length
1105
+ and occupation of the B¨uttiker probe for k = 0.4 nm−1, kso = 0.1 nm−1, k0 = 4 nm−1,
1106
+ x0 = 0.8 nm and ε = 0.2.
1107
+ The polarization increases with temperature for the range of
1108
+ parameters chosen.
1109
+ thermalizes to the environment e.g., electron-phonon, electron-electron interactions.
1110
+ 6
1111
+ Summary and Discussion
1112
+ We have discussed a one-dimensional system with SO interaction which can be derived from
1113
+ a three-dimensional model ignoring the orbital degree of freedom[21, 22].
1114
+ The spin-orbit
1115
+ coupling arises from the geometrical arrangement of the p orbitals of the helical model’s
1116
+ chiral structure. Without it, the SO coupling would be orders of magnitude smaller[22], as
1117
+ happens comparing SO coupling of planar graphene and carbon nanotubes[1]. Due to the
1118
+ atomic origin of the SO coupling in this model, the helix’s spin and orbital degrees of freedom
1119
+ are uncoupled at the lowest order and in the half-filling model[22, 23]. Thus the orbital degree
1120
+ of freedom only modulates the kinetic energy and adds orbital angular momentum, which can
1121
+ also enhance spin-orbit effects, as shown in ref.[30]. So chirality has a role in the present CISS
1122
+ model in generating its ∼10 meV strength.
1123
+ In the succession of models presented for transmission through a spin-active barrier, we
1124
+ have expressed spin polarization as the manifestation of a lack of TRS that selects a spin
1125
+ orientation. We first discussed B¨uttiker’s model of a U(1) magnetic field under a barrier.
1126
+ The differential decay of the amplitudes for spin-up and spin-down produces a reorientation
1127
+ of the spin along the magnetic field.
1128
+ It serves as the trademark of TRS breaking in the
1129
+ spin polarization.
1130
+ In the following model we assessed the SO coupling where an effective
1131
+ magnetic field can also be identified BSO, mapping the SO coupling to a Zeeman-like term.
1132
+ Nevertheless, this effective field depends on the propagation direction and does not break TRS.
1133
+ The exact solution of the tunneling problem, which has not been satisfactorily solved before
1134
+ in the literature in this form, yields nevertheless the expected result, implied by Onsager’s
1135
+ reciprocity for two terminal devices, i.e. no spin polarization independent of the magnitude
1136
+ of the SO coupling. Spin precession around BSO with no differential decay of different spin
1137
+ components is shown. Thus, in the two terminal setup, at T = 0, the chiral structure and
1138
+ 16
1139
+
1140
+ 0.0
1141
+ N= 0.1
1142
+ -0.1
1143
+ N= 0.01
1144
+ -0.2
1145
+ N= 0.001
1146
+ 0.3
1147
+ -0.4
1148
+ E= 0.2
1149
+ 1
1150
+ 2
1151
+ 3
1152
+ 4
1153
+ 5
1154
+ a(nm)SciPost Physics
1155
+ Submission
1156
+ SO will then not be enough for spin selectivity since, as we have shown above, the spin-orbit
1157
+ coupling only makes for spin precession due to the spin torque of the SO magnetic field BSO
1158
+ with no asymmetric treatment of both spin species.
1159
+ One of the most emblematic features of the CISS effect is that it is measured at room tem-
1160
+ perature (although see[31, 32]) in molecular systems that are strongly coupled to the thermal
1161
+ environment. Strictly coherent quantum models can only be part of the story. The final model
1162
+ addresses minimal coupling to the environment through a third probe, making for decoher-
1163
+ ent/dephasing albeit unitary processes. Symmetry arguments cannot assess beforehand, how
1164
+ sensitive the system will be to weak-TRS-breaking events. These events are incorporated in
1165
+ the last model as a time reversal symmetric interaction (SO coupling) under a barrier coupled
1166
+ to a B¨uttiker probe. Our exact results show a high sensitivity of spin polarization, where the
1167
+ combination of SO coupling and decoherence acts analogously to a U(1) magnetic field. The
1168
+ input spin reorients to the effective magnetic field producing a net spin polarization. This is a
1169
+ very different mechanism from the first model considered, where differential decay of each spin
1170
+ orientation gives polarization. Here delicate interferences that guarantee time-reversal sym-
1171
+ metry are disrupted, producing a large effect of even 40% for small couplings to the B¨uttiker
1172
+ probe.
1173
+ The proposed scenario, in the context of an exactly solved model, addresses many issues
1174
+ that have related to the CISS effect: i) The size of the SO coupling is set to realistic values
1175
+ in agreement with theoretical estimates in the meV range[22]; ii) The models reproduce the
1176
+ Onsager relations for two terminal devices for TRS interactions; iii) Coupling weakly to the
1177
+ environment through a third probe (other than terminals) produces highly sensitive effects of
1178
+ the polarization capacity of chiral molecules, that can match the order of magnitude found in
1179
+ experiments. Additionally we note that other interactions such as electron- and spin-phonon
1180
+ have been modeled[33] in order to investigate their effect on electron transport and spin
1181
+ polarization through chiral molecules. These works show that non-zero coupling to a thermal
1182
+ reservoir is necessary to have spin selectivity[34, 35, 36].
1183
+ Of course, this is the bare-bones model for the spintronics of chiral molecules. The nature
1184
+ of the environment coupling to electron transport should be developed in much more detail to
1185
+ assess its quantitative correctness. The incorporation of the interplay between orbital and spin
1186
+ degrees of freedom, not yet addressed to our knowledge, should enrich further the possibilities
1187
+ of the theory to describe, more completely, the CISS effect.
1188
+ In summary, one of our main conclusions in that decoherence effects, even those associated
1189
+ with small coupling constants, can translate into significant changes in the spin polarization.
1190
+ This important result allows for a B¨uttiker-probe representation of several mechanisms, in-
1191
+ cluding electron-electron and electron-phonon interactions, that can be related to the CISS
1192
+ effect. There is an important connection between our treatment and a Liouville equation
1193
+ description of electron transfer in molecules [37], that we will explore extensively in a forth-
1194
+ coming article.
1195
+ Acknowledgements
1196
+ Author contributions
1197
+ 17
1198
+
1199
+ SciPost Physics
1200
+ Submission
1201
+ Funding information
1202
+ E.M. acknowledges support from Project 17617 Spin Active Molec-
1203
+ ular electronics by the Universidad San Francisco de Quito. M.P. and S.V. acknowledge the
1204
+ support given by the Dresden Junior Fellow by the Chair of Materials Science and Nanotech-
1205
+ nology at the Technische Universit¨at Dresden. V.M acknowledges the support of Ikerbasque,
1206
+ the Basque Foundation for Science, and the W.M. Keck Foundation through the grant ”Chi-
1207
+ rality, spin coherence and entanglement in quantum biology”.
1208
+ References
1209
+ [1] D. Huertas-Hernando, F. Guinea, and A. Brataas. Spin-Orbit in curved graphene,
1210
+ fullerenes,
1211
+ nanotubes,
1212
+ and
1213
+ nanotube
1214
+ caps.
1215
+ Phys.
1216
+ Rev.
1217
+ B.
1218
+ 74,
1219
+ 155426
1220
+ (2006)
1221
+ doi:10.1103/PhysRevB.74.155426
1222
+ [2] M. Kurpas,
1223
+ P. E. Faria Junior,
1224
+ M. Gmitra,
1225
+ and F. Janoslav. Spin-Orbit cou-
1226
+ pling in elemental two-dimensional materials Phys. Rev. B 100,
1227
+ 125422 (2019)
1228
+ doi:10.1103/PhysRevB.100.125422
1229
+ [3] Clarice D. Aiello et al. A Chirality-Based Quantum Leap ACS Nano, 16, 4, 4989-5035
1230
+ (2022) doi:10.1021/acsnano.1c01347
1231
+ [4] K. Ray, S. P. Ananthavel, D. H. Waldeck, and R. Naaman. Asymmetric scattering of
1232
+ polarized electrons by organized organic films of chiral molecules Science 283, 5403 (1999)
1233
+ doi:10.1126/science.283.5403.814
1234
+ [5] Z. Xie, T. Z. Markus, S. Cohen, Z. Vager, R. Gutierrez, and R. Naaman. Spin Spe-
1235
+ cific Electron Conduction through DNA Oligomers. Nano Lett. 11, 4652-4655 (2011)
1236
+ doi:10.1021/nl2021637
1237
+ [6] V. Kiran, S. P. Mathew, S. R. Cohen, I. Hern´andez, J. Lacour, and R. Naaman. He-
1238
+ licenes - A New Class of Organic Spin Filter. Advanced Materials 28, 1957-1962 (2016)
1239
+ doi:10.1002/adma.201504725
1240
+ [7] M. Kettner, V. Maslyuk, D. N¨urenberg, J. Seibel, R. Gutierrez, G. Cuniberti, K. H. Ernst,
1241
+ and H. Zacharias. Chirality-Dependent electron spin filtering by molecular monolayers of
1242
+ helicenes J. Phys. Chem. Lett. 9, 8, 2025-2030 (2018) doi:10.1021/acs.jpclett.8b00208
1243
+ [8] V. Kiran, S. R. Cohen, and R. Naaman. Structure dependent spin selectivity in electron
1244
+ transport through oligopepides. J. Chem. Phys. 146, 092302 (2017) doi:10.1063/1.4966237
1245
+ [9] S. Mishra, A. Kumar Mondal; S. Pal, T. Kumar Das, E. Z. B. Smolinsky, G. Siligardi,
1246
+ and R. Naaman. Length-Dependent electron spin polarization in oligopeptides and DNA
1247
+ J. Phys. Chem. C 124, 10776-10782 (2020) doi:10.1021/acs.jpcc.0c02291
1248
+ [10] S. Yeganeh, M. Ratner, E. Medina, and V. Mujica. Chiral electron transport: Scattering
1249
+ through helical potentials. J. Chem. Phys. 131, 014707 (2009) doi:10.1063/1.3167404
1250
+ [11] E. Medina, F. L´opez, M. Ratner,and V. Mujica. Chiral molecular films as electron polariz-
1251
+ ers and polarization modulators. EPL 99, 17006 (2012) doi:10.1209/0295-5075/99/17006
1252
+ 18
1253
+
1254
+ SciPost Physics
1255
+ Submission
1256
+ [12] R.
1257
+ Gutierrez,
1258
+ E.
1259
+ D´ıaz,
1260
+ R.
1261
+ Naaman,
1262
+ and
1263
+ G.
1264
+ Cuniberti.
1265
+ Spin-selective
1266
+ trans-
1267
+ port
1268
+ through
1269
+ helical
1270
+ molecular
1271
+ systems
1272
+ Phys.
1273
+ Rev.
1274
+ B
1275
+ 85,
1276
+ 081494(R)
1277
+ (2012)
1278
+ doi:10.1103/PhysRevB.85.081404
1279
+ [13] A-M. Guo, and Q-F Sun. Spin-dependent electron transport in protein-like single-helical
1280
+ molecules PNAS 32 , 11658-11662 (2014) doi:10.1073/pnas.1407716111
1281
+ [14] X. Yang, C. H. van der Wal, and B. J. van Wees. Spin-dependent electron transmission
1282
+ model for chiral molecules in mesoscopic devices. J. Phys. Rev. B. 99, 024418 (2019)
1283
+ doi:10.1103/PhysRevB.99.024418
1284
+ [15] J. H. Bardarson. A proof of the Kramers degeneracy f transmission eigenvalues from
1285
+ antisymmetry of the scattering matrix. J. Phys. A: Math. Theor. 41, 405203 (2008)
1286
+ doi:10.1088/1751-8113/41/40/405203
1287
+ [16] X. Yang, C. H. van der Wal, and B. J. van Wees. Detecting chirality in two-terminal
1288
+ electronic nanodevices. Nano Lett. 20, 6148-6154 (2020) doi:10.1021/acs.nanolett.0c02417
1289
+ [17] A. Nitzan Electron transmission through molecules and molecular interfaces Annual Rev.
1290
+ of Phys. Chem. 52, 681-750 (2001) doi:10.1146/annurev.physchem.52.1.681
1291
+ [18] M. B¨uttiker. Larmor precession and the traversal time for tunneling, Phys. Rev. B 27,
1292
+ 6178 (1983) doi:10.1103/PhysRevB.27.6178
1293
+ [19] L. W. Molenkamp, G. Schmidt, and G. E. W. Bauer. Rashba Hamiltonian and electron
1294
+ transport, Phys. Rev. B 64, 121202R (2001) doi:10.1103/PhysRevB.64.121202
1295
+ [20] F. Mireles, and G. Kirczenow. From classical to quantum spintronics: Theory of co-
1296
+ herent spin injection and spin valve phenomena, Europhys. Lett., 59 (1), 107 (2002)
1297
+ doi:10.1209/epl/i2002-00165-4
1298
+ [21] S. Varela, I. Zambrano, B. Berche, V. Mujica, and E. Medina. Spin-Orbit Interaction and
1299
+ Spin Selectivity for Tunneling Electron Transfer in DNA, Phys. Rev. B 101, 241410(R)
1300
+ (2020) doi:10.1103/PhysRevB.101.241410
1301
+ [22] S. Varela, V. Mujica, and E. Medina. Effective Spin-Orbit Couplings in an Analytical
1302
+ Tight-Binding Model of DNA: Spin Filtering and Chiral Spin Transport, Phys. Rev. B
1303
+ 93, 155436 ( 2016) doi:10.1103/PhysRevB.93.155436
1304
+ [23] J. D. Torres, R. Hidalgo-Sacoto, S. Varela, and E. Medina. Mechanically mod-
1305
+ ulated spin-orbit coupling in oligopeptides,
1306
+ it Phys. Rev. B 102,
1307
+ 035426 (2020)
1308
+ doi:10.1103/PhysRevB.102.035426
1309
+ [24] O. Entin-Wohlman, A. Aharony, and Y. Utsumi. Comment on “Spin-orbit interaction
1310
+ and spin selectivity for tunneling electron transfer in DNA”, Physical Review B 103,
1311
+ 077401 (2021) doi:10.1103/PhysRevB.103.077401
1312
+ [25] M. B¨uttiker. Small normal-metal loop coupled to an electron reservoir Phys. Rev. B
1313
+ 32, 1846(R) (1985) doi:10.1103/PhysRevB.32.1846; Coherent and sequencial tunneling
1314
+ in series barriers, IBM J. Res. Dev. 32, 63 (1988) doi:10.1147/rd.321.0063
1315
+ 19
1316
+
1317
+ SciPost Physics
1318
+ Submission
1319
+ [26] M. Ellner, N. Bolivar, B. Berche, and E. Medina. Charge- and spin-polarized currents
1320
+ in mesoscopic rings with Rashba spin-orbit interactions coupled to an electron reservoir,
1321
+ Phys. Rev. B 90, 085305 (2014) doi:10.1103/PhysRevB.90.085305
1322
+ [27] L. E. F. Foa Torres, H. M. Pastawski, and E. Medina. Antiresonances as Precursors of
1323
+ Decoherence, Eurphys. Lett. 73, 164 (2005) doi:10.1209/epl/i2005-10374-9
1324
+ [28] J. L. D’Amato, and H. M. Pastawski. Conductance of a disordered linear chain including
1325
+ inelastic scattering events, Phys. Rev. B 41, 7411 (1990) doi:10.1103/PhysRevB.41.7411
1326
+ [29] K. H. Huisman, and J. M. Thijssen. CISS Effect: A Magnetoresistance Through Inelastic
1327
+ Scattering, J. Phys. Chem. C 125(42), 23364 (2021) doi:10.1021/acs.jpcc.1c06193
1328
+ [30] A. L´opez, S. Varela, and E. Medina. Radiation Modulated Spin Coupling in a Double-
1329
+ Stranded DNA Model, J. Phys.: Condens. Matter, 34, 135301 (2022) doi:10.1088/1361-
1330
+ 648X/ac48c1
1331
+ [31] V. Kiran,
1332
+ S. P. Mathew,
1333
+ S. Cohen,
1334
+ I. Delgado,
1335
+ J. Lacour,
1336
+ and R. Naaman.
1337
+ Helicenes-A New Class of Organic Spin Filter,
1338
+ Adv.
1339
+ Mater.
1340
+ 28,
1341
+ 1957
1342
+ (2016)
1343
+ doi:10.1002/adma.201504725
1344
+ [32] Q. Qian, H. Ren, J. Zhou, et al. Chiral Molecular Intercalation Superlattices, Nature,
1345
+ 606, 902 (2022) doi:10.1038/s41586-022-04846-3
1346
+ [33] M. Peralta, S. Feijoo , S. Varela , V. Mujica , and E. Medina. Coherence preservation
1347
+ and electron-phonon interaction in electron transfer in DNA, J. Chem. Phys. 153, 165102
1348
+ (2020) doi:10.1021/acs.jpcc.1c10550
1349
+ [34] T. K. Das, F. Tassinari, R. Naaman, and J. Fransson. Temperature-Dependent Chiral-
1350
+ Induced Spin Selectivity Effect: Experiments and Theory, J. Phys. Chem. C, 126, 3257
1351
+ (2022) doi:10.1021/acs.jpcc.1c10550
1352
+ [35] G.
1353
+ Du,
1354
+ H.-H.
1355
+ Fu,
1356
+ and
1357
+ R.
1358
+ Wu.
1359
+ Vibration-enhanced
1360
+ spin-selective
1361
+ transport
1362
+ of
1363
+ electrons
1364
+ in
1365
+ the
1366
+ DNA
1367
+ double
1368
+ helix,
1369
+ Phys.
1370
+ Rev.
1371
+ B,
1372
+ 102,
1373
+ 035431
1374
+ (2020)
1375
+ doi:10.1103/PhysRevB.102.035431
1376
+ [36] J. Fransson. Vibrational origin of exchange splitting and chiral-induced spin selectivity,
1377
+ Phys. Rev. B, 102, 235416 (2020) doi:10.1103/PhysRevB.102.235416
1378
+ [37] W. B. Davis, M. R. Wasielewski, M. A. Ratner, V. Mujica, and A. Nitzan. Electron
1379
+ transfer rates in bridged molecular systems: A phenomenological approach to relaxation,
1380
+ J. Phys. Chem. A, 101, 6158, (1997) doi:10.1021/jp970909c.
1381
+ 20
1382
+
6dA0T4oBgHgl3EQfN__p/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
7dAzT4oBgHgl3EQfgPzo/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
8NE4T4oBgHgl3EQf2w06/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
8tE3T4oBgHgl3EQfqgri/content/tmp_files/2301.04653v1.pdf.txt ADDED
@@ -0,0 +1,2529 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Optirank: classification for RNA-Seq data with optimal ranking
2
+ reference genes
3
+ Paola Malsot1,∗, Filipe Martins1, Didier Trono1, Guillaume Obozinski2,†
4
+ 1Ecole Polytechnique Fédérale de Lausanne
5
+ 2Swiss Data Science Center, EPFL & ETH Zürich
6
+ January 13, 2023
7
+ Abstract
8
+ Classification algorithms using RNA-Sequencing (RNA-Seq) data as input are used in a variety of
9
+ biological applications. By nature, RNA-Seq data is subject to uncontrolled fluctuations both within and
10
+ especially across datasets, which presents a major difficulty for a trained classifier to generalize to an
11
+ external dataset.
12
+ Replacing raw gene counts with the rank of gene counts inside an observation has proven effective to
13
+ mitigate this problem. However, the rank of a feature is by definition relative to all other features,
14
+ including highly variable features that introduce noise in the ranking.
15
+ To address this problem and obtain more robust ranks, we propose a logistic regression model, optirank,
16
+ which learns simultaneously the parameters of the model and the genes to use as a reference set in the
17
+ ranking.
18
+ We show the effectiveness of this method on simulated data. We also consider real classification tasks,
19
+ which present different kinds of distribution shifts between train and test data. Those tasks concern
20
+ a variety of applications, such as cancer of unknown primary classification, identification of specific
21
+ gene signatures, and determination of cell type in single-cell RNA-Seq datasets. On those real tasks,
22
+ optirank performs at least as well as the vanilla logistic regression on classical ranks, while producing
23
+ sparser solutions.
24
+ In addition, to increase the robustness against dataset shifts, we propose a multi-source learning scheme
25
+ and demonstrate its effectiveness when used in combination with rank-based classifiers.
26
+ 1
27
+ Introduction
28
+ RNA-Sequencing provides a way to probe the state of cells and tissues, by measuring the level of expression
29
+ of thousands of genes. Since its introduction, RNA-Seq data has been used in differential expression analysis
30
+ to highlight genes that are differentially expressed in two contrasting conditions (stereotypically healthy
31
+ versus diseased), pointing towards potentially actionable drug targets and molecular mechanisms. In this
32
+ context, normalization of RNA-Seq data has been extensively studied: we provide in the subsequent section
33
+ an overview of common methods. However there is still a lack of consensus on normalization for classification
34
+ tasks, which is crucial given the recent emergence of machine-learning assisted diagnosis based on RNA-Seq
35
+ data (for instance Cascianelli et al., 2020; Shen et al., 2020; Tan and Cahan, 2019).
36
+ In practice, among other normalization techniques also used in differential expression analysis, ranking
37
+ normalization seems to have had particular success in combination with classification algorithms (Shen et al.,
38
+ 2020; Scialdone et al., 2015). Ranking normalization consists simply in replacing the raw read count of genes
39
40
41
+ 1
42
+ arXiv:2301.04653v1 [q-bio.GN] 11 Jan 2023
43
+
44
+ by their ranks amongst the read count of other genes for the same observation. Lausser et al. (2016) show a
45
+ consistent improvement of score when ranking normalization is used.
46
+ A potential weakness of ranking normalization is that the rank of an otherwise informative gene could
47
+ be perturbed by genes whose expression fluctuate independently from the variable of interest. An obvious
48
+ solution is to rank gene expressions only relative to a set of stable genes, which we call reference set. The
49
+ difficulty is, however, in choosing this set. With this motivation, and to solve binary classification problems
50
+ based on robust and adaptive ranks, we propose optirank, a logistic regression model based on ranks relative
51
+ to a reference set, where the latter is learned at the same time as the weights of the logistic model.
52
+ 1.1
53
+ Overview of Normalization Techniques
54
+ Multiple factors alter the number of reads obtained for a gene beyond the number of corresponding RNA
55
+ molecules in the biological sample, the quantity of interest. For instance, the preservation technique of
56
+ a biological sample and its temperature influence the natural degradation process of RNA; the length
57
+ and the GC-content of an RNA molecule will affect its reading rate. Normalization aims at obtaining a
58
+ representation of the data invariant to those aforementioned nuisance factors. Ideally, the remaining variation
59
+ after normalization should be attributable solely to the phenomenon of interest (stereotypically, disease versus
60
+ normal). In this way, the analyst avoids the risk of confounding the effect of the variable of interest with the
61
+ effect of the nuisance variables, and the learned model is applicable to an external dataset obtained with a
62
+ different configuration of nuisance factors.
63
+ The simplest normalization, total count normalization, divides the raw read count on each gene by the total
64
+ number of reads in the corresponding observation. However, highly expressed genes can induce a misleadingly
65
+ low proportion of reads on other genes which are normally expressed. More refined techniques, such as TMM
66
+ and DESeq counteract this artifact by using a more robust normalization factor. Quantile normalization
67
+ matches the distribution of gene expressions to a reference distribution. Other methods correct the expression
68
+ thanks to controls, such as housekeeping genes hypothesized to be constant across conditions or RNA spike-ins
69
+ whose quantities are controlled during library preparation.
70
+ For the interested reader, Dillies et al. (2012) and Evans et al. (2016) evaluate these methods in differential
71
+ expression analysis with real and simulated data. To our knowledge, there is no similar review on the use of
72
+ RNA-Seq normalization as a pre-processing step prior to classification.
73
+ 2
74
+ Learning from ranks
75
+ 2.1
76
+ Ranking with respect to a reference set
77
+ Given a vector of gene expression levels x ∈ Rd, the rank of gene j, as understood in the common sense, can
78
+ be obtained by counting the number of genes k (among all d genes) that are less expressed than gene j (i.e.
79
+ xk < xj).
80
+ We introduce a more general notion of rank, the rank rΓ
81
+ j of xj relative to a reference set Γ, by:
82
+
83
+ j =
84
+ d
85
+
86
+ k=1
87
+ 1[k ∈ Γ] 1[xj > xk]
88
+ (1)
89
+ Note that we clearly recover the classical rank in the particular case where Γ = {1, . . . , d}.
90
+ In this paper, we will encode the set Γ by a vector γγγ ∈ {0, 1}d with γj = 1[j ∈ Γ] . We can thus express
91
+
92
+ j as rΓ
93
+ j = �d
94
+ k=1 γk 1[xj > xk]. To simplify notations we will also drop the exponent Γ, which will be defined
95
+ from the context.
96
+ Now, to define simultaneously all the ranks associated with the elements of a vector xi we introduce the
97
+ matrix of binary comparisons Ci ∈ Rd×d, with Ci
98
+ jk = 1[xij > xik] . The vector of ranks ri associated with a
99
+ reference set encoded by the indicator vector γγγ is computed as ri = Ciγγγ.
100
+ 2
101
+
102
+ gene A
103
+ 1.7
104
+ gene B
105
+ 7.3
106
+ gene C
107
+ 10.0
108
+ gene D
109
+ 5.1
110
+ gene E
111
+ 3.4
112
+ Expression
113
+ Data
114
+ gene A
115
+ 1.7
116
+ gene E
117
+ 3.4
118
+ gene D
119
+ 5.1
120
+ gene B
121
+ 7.3
122
+ gene C
123
+ 10.0
124
+ Ordered
125
+ Expression Data
126
+ gene A
127
+ 0
128
+ gene E
129
+ 1
130
+ gene D
131
+ 2
132
+ gene B
133
+ 3
134
+ gene C
135
+ 4
136
+ Usual
137
+ Ranks
138
+ gene A
139
+ 0
140
+ gene E
141
+ 1
142
+ gene D
143
+ 1
144
+ gene B
145
+ 1
146
+ gene C
147
+ 2
148
+ Ranks
149
+ with respect to
150
+ reference set
151
+ (A, B)
152
+ gene A
153
+ 0
154
+ gene E
155
+ 1
156
+ gene D
157
+ 2
158
+ gene B
159
+ 2
160
+ gene C
161
+ 3
162
+ Ranks
163
+ with respect to
164
+ reference set
165
+ (A, B, E)
166
+ Figure 1: Example of ranking gene expression data with respect to a reference set.
167
+ We will use the index i ∈ {1, . . . , n} to index the n observations in the data.1
168
+ 2.2
169
+ Classification: learning the reference set along with a linear model on adap-
170
+ tive ranks
171
+ We consider a classical supervised learning problem in which input data is encoded as ranks ri of the form
172
+ above, and the output data is a label yi ∈ Y. For a loss function ℓ : Y × R → R, we consider a regularized
173
+ empirical risk minimization of the form
174
+ min
175
+ w∈Rd, b∈R
176
+ 1
177
+ n
178
+ n
179
+
180
+ i=1
181
+ ℓ(yi, w⊤ri + b) + Ω(w),
182
+ (2)
183
+ where Ω is a (typically convex) regularizer. By expressing ri as a function of γγγ and of Ci and minimizing the
184
+ empirical risk with respect to γγγ as well, we propose to learn the reference set Γ.
185
+ This leads to the following optimization problem:
186
+ min
187
+ γγγ∈{0,1}d, w∈Rd, b∈R
188
+ 1
189
+ n
190
+ n
191
+
192
+ i=1
193
+ ℓ(yi, w⊤Ciγγγ + b) + Ω(w).
194
+ (3)
195
+ Given that the integrality constraint on γγγ makes the optimization problem combinatorial, we propose to
196
+ relax the constraint γγγ ∈ {0, 1}d to γγγ ∈ [0, 1]d. We empirically found that adding a cardinality constraint on
197
+ the reference set, γγγ⊤1 = s instead of penalizing with a sparsity inducing regularization, such as the ℓ1-norm,
198
+ was useful to obtain fast convergence. We suppose that this constraint removes an indeterminacy of scale
199
+ between w and γγγ which appears once the integrality constraint is removed, given that (α w, 1
200
+ α γγγ) yields
201
+ identical losses values for any scaling factor α; it would be implicitely removed as well by regularizers on w
202
+ and γγγ but only at convergence.
203
+ Given the relaxed constraint γγγ ∈ [0, 1]d, and in order to nonetheless obtain solutions with γγγ ∈ {0, 1}d, we
204
+ propose to solve a sequence of problems of the form
205
+ min
206
+ γγγ∈[0,1]d, w∈Rd, b∈R
207
+ 1
208
+ n
209
+ n
210
+
211
+ i=1
212
+ ℓ(yi, w⊤Ciγγγ + b) + Ω(w) + λp ρ(γγγ)
213
+ s.t.
214
+ γγγ⊤1 = s,
215
+ (4)
216
+ 1Note that the introduced notations adopt the convention of using a strict inequality in the definition of the rank. It is
217
+ possible to obtain two other similar definitions of ranks by replacing 1[xj > xk] by 1[xj ≥ xk] or by 1[xj > xk] + 0.5 1[xj = xk] .
218
+ All definitions are obviously equivalent when there are no ties and when Γ = {1, . . . , d}. The case where there are ties and where
219
+ these other notions of ranks become relevant is discussed in Appendix A.
220
+ 3
221
+
222
+ for an increasing sequence of regularization coefficients λp, where ρ is the concave “push” penalty defined by
223
+ ρ(γγγ) =
224
+ d
225
+
226
+ j=1
227
+ γj(1 − γj),
228
+ (5)
229
+ which effectively “pushes” the entries of γγγ towards the extreme points of the hypercube [0, 1]d. More precisely,
230
+ starting from λp = 0, the solution of each problem in the sequence is used as initialization to warm-start the
231
+ next one, and the sequence is terminated when the solution satisfies the constraint γγγ ∈ {0, 1}d.
232
+ It is obviously possible to only solve the above problem for λp = 0 and renounce the integrality constraints.
233
+ Actually, the presence of the capped-simplex constraints γγγ ∈ [0, 1]d and γγγ⊤1 = s are themselves sufficient
234
+ to obtain that, at the optimum, γγγ∗ tends to lie on a lower dimensional face of the capped-simplex, so that
235
+ a significant fraction of its entries are exactly equal to 0 or 1. In preliminary experiments, we also did
236
+ not observe significant differences whether integrality constraints are strictly enforced or not. The main
237
+ motivations to nonetheless enforce them, are that (a) the additional computational effort is small compared
238
+ to the cost of solving the problem with λp = 0, (b) the interpretability of the obtained ranks is otherwise lost,
239
+ and (c) that it tends to produce slightly sparser solutions.
240
+ 3
241
+ Optimization procedure
242
+ Block proximal coordinate descent.
243
+ When λp = 0, problem (4) is bi-convex. More precisely, the
244
+ objective function to minimize, which we denote by O(λp;γγγ, w, b), is convex w.r.t. (w, b) when γγγ is fixed
245
+ and convex w.r.t. (γγγ, b) when w is fixed. This suggests that a form of alternating descent algorithm can be
246
+ used, such as block coordinate descent, in which blocks of variables, here (γγγ, b) and (w, b), are alternatively
247
+ updated (see for example Tseng and Yun, 2009; Xu and Yin, 2013).
248
+ In addition, since the regularizer Ω is convex and potentially non-differentiable (e.g., elastic net regularization),
249
+ descent w.r.t. w can be suitably realized with proximal gradient steps, provided that the proximal operator
250
+ for Ω can be computed efficiently. For γ, the optimization step satisfying the constraint γγγ ∈ [0, 1]d | γγγ⊤1 = s
251
+ also involves a proximal operator: the projection on this constraint set called capped-simplex. We derive this
252
+ proximal operator in Appendix B.1.
253
+ Therefore, to solve each instance of problem (4), we use a block proximal coordinate descent algorithm
254
+ (BPCD). Shi et al. (2014) propose a BPCD algorithm to solve bilinear logistic regression problems with
255
+ convex regularizers. Our implementation is similar to theirs, except that we use different blocks and a simpler
256
+ stopping criterion, which is better suited to the non-convexity of the push-penalty and to the implementation
257
+ of the path-following algorithm described next. We detail our implementation in Appendix B.3.
258
+ Initialization.
259
+ Given that the optimization problem is non-convex, the initialization matters: for reasons
260
+ of symmetry we set w = 0 and γγγ = s
261
+ d1, i.e., the center of the capped-simplex.
262
+ Path-following algorithm.
263
+ Concerning the sequence of values of λp used for the problems of the form (4),
264
+ given that the term λpρ eventually creates local minima at all vertices of the capped-simplex, it is important
265
+ not to increase λp too quickly, which could produce suboptimal solutions. We use the approach proposed
266
+ by Zaslavskiy et al. (2009). In essence, we adjust the next λp to ensure a sufficiently small increase of the
267
+ objective value O for the previously found solution. The strategy is detailed in Appendix B.4.
268
+ To summarize, we propose to solve each instance of problem (4) with a block proximal coordinate descent
269
+ algorithm (BPCD), and to increase λp according to a rule inspired by the path-following algorithm in
270
+ Zaslavskiy et al. (2009). This scheme is summarized in Algorithm 1.
271
+ 4
272
+
273
+ Algorithm 1 Optimization Procedure
274
+ γ ← s
275
+ d1, w ← 0,
276
+ λp = 0
277
+ ▷ Initialization
278
+ while γγγ /∈ {0, 1}d do
279
+ ▷ Iterating on λp
280
+ (γγγ, w, b) ← argminγγγ∈[0,1]d,γγγ⊤1=s, w∈Rd, b∈R O(λp;γγγ, w, b)
281
+ ▷ solved with BPCD
282
+ λp ← λ′
283
+ p , with O(λ′
284
+ p;γγγ, w, b) − O(λp;γγγ, w, b) = ϵ.
285
+ end while
286
+ return γγγ, w, b
287
+ Note.
288
+ When λp > 0, although ρ is non-convex, problem (4) can still be formulated as a multi-convex
289
+ problem, suitable to the block coordinate descent (see Appendix B.2 for a derivation).
290
+ 3.1
291
+ Computing the product Ciγγγ with complexity O(d).
292
+ A priori, the computation of the matrix vector product Ciγγγ involves d2 multiplications. But it is clear that
293
+ to compute classical ranks it is sufficient to sort the data, which can be done with a complexity of O(d log d).
294
+ Since Ciγγγ is none else than the vector of ranks with respect to the reference set Γ, it seems reasonable to
295
+ think that the same complexity can be achieved, and this is indeed the case. Assuming that there are no ties,
296
+ and if σi is a permutation sorting the entries of xi, i.e. such that xi,σi(1) < · · · < xi,σi(d), the inner-sum can
297
+ be calculated recursively by applying the same permutation to γγγ and applying, from j = 1 to d,
298
+ ri,σi(j) ← ri,σi(j−1) + γσi(j−1),
299
+ (6)
300
+ with, by convention, ri,σi(0) = 0.
301
+ The complexity is therefore dominated by the sorting operation and is thus O(d log d). Moreover, sorting
302
+ the data needs to be done only once at the beginning of the optimization, so that effectively the number of
303
+ operation needed to compute Ciγγγ each time γγγ is updated is O(d). The exact same reasoning applies to the
304
+ computation of w⊤Ci which is therefore also O(d), once the inverse of σi is computed. With the alternative
305
+ definitions of rank and in the presence of ties, the calculations are more subtle, but the same complexity can
306
+ be obtained. They are detailed in Appendix A.2.
307
+ 4
308
+ Benchmark: competing classification algorithms
309
+ We will apply the proposed methodology to solve a number of binary classification problems on first synthetic
310
+ and then real RNA-Seq data. To serve as a basis of comparison, we choose standard logistic regression or
311
+ random forest classifiers that rely either on a rank representation or not.
312
+ Optirank: a sparse rank-based logistic regression with learnable reference set.
313
+ To solve binary
314
+ classification tasks, we propose optirank, a logistic regression model on rank-transformed data, with ranks
315
+ computed with respect to a learnable reference set. Our model optirank is fitted within the framework
316
+ introduced in section 2.2, by solving the optimization problem (3) with a logistic loss ℓ(y, a) = −y log (S(a))−
317
+ (1 − y) log (1 − S(a)), where S(x) denotes the sigmoid function S(x) = 1/(1 + e−x), y ∈ Y = {0, 1} being the
318
+ binary label, and with an elastic net regularization
319
+ Ω(w) = λ1 ∥w∥1 + λ2 ∥w∥2
320
+ 2 ,
321
+ to induce sparsity in the set of features whose rank is relevant to the classification task. In fact, given that
322
+ we consider RNA-Seq data, and that there are potentially significant correlations between genes, the use of
323
+ the elastic net, with a Euclidean regularization on top of the Lasso terms, aims at stabilizing feature selection
324
+ (see Zou and Hastie, 2005).
325
+ 5
326
+
327
+ Competing algorithms.
328
+ We will compare our optirank
329
+ algorithm with classical logistic regression
330
+ (lr) equipped with the same elastic net regularization Ω, and logistic regression on rank-transformed data
331
+ (rank-lr), still with the same regularization. In addition, in tasks involving real data, we will also compare
332
+ our method to the random forest (rf) and to the SingleCellNet algorithm (SCN) proposed by Tan and Cahan
333
+ (2019) for cell-typing tasks that we consider in our benchmark (see Section 6). The SCN algorithm consists of a
334
+ pre-processing pipeline which identifies gene pairs with informative differential expression and transforms the
335
+ RNA-Seq data into a binary matrix indicating the order of gene pairs followed by a random forest classifier.
336
+ Implementation details.
337
+ The stopping criterion in the scikit-learn (Pedregosa et al., 2011) implementation
338
+ of logistic regression being different from the one in optirank, to ensure that this discrepancy does not
339
+ affect the comparison on real datasets, we re-optimize the weights w learned by optirank with the logistic
340
+ regression of scikit-learn. Additional details about the classifiers can be found in Appendix C.
341
+ 5
342
+ A synthetic data distribution model with unstable ranks
343
+ In order to illustrate the potential and limitations of optirank, we present in the following a synthetic
344
+ example in which the robustness of the rank normalization is challenged. We test whether optirank is
345
+ effectively able to overcome the difficulty of the task.
346
+ 5.1
347
+ Model
348
+ As mentioned in Lausser et al. (2016), the strength of rank-normalization can be linked to the fact that ranks
349
+ are invariant to observation-wise monotone perturbations of the gene expressions. Those perturbations can be
350
+ easily envisioned, for example by considering that counts depend in a quadratic (and observation-dependent)
351
+ fashion on the RNA content in the observation. By contrast, the following example focuses on a weakness of
352
+ rank normalization that arises in the presence of a non-monotone, nonetheless simple, perturbation. Those
353
+ perturbations occur in real data; for instance, Leek et al. (2010) report a case in which a group of genes shifts
354
+ between different batches of samples. In our example, we consider a similar perturbation: we suppose that
355
+ there is a group of perturbed genes, uninformative for the classification task at hand, that introduces noise in
356
+ the ranks of relevant features by fluctuating in a coordinated and observation-wise manner.
357
+ More precisely, the expression levels of the genes in this group, called P, are all assumed to shift by an
358
+ additive amount close to ∆i (unique to the observation i). This introduces noise in the ranking of the other
359
+ stable genes: indeed, since the perturbed genes in P shift in a coordinated fashion, the rank of a stable gene
360
+ is increased or decreased by an amount proportional to the number of genes in P that cross it.
361
+ We propose the following synthetic model: the non-perturbed expression of a gene j in observation i, �
362
+ Xij,
363
+ follows a Gaussian distribution centered on the typical expression value of gene j, µj:
364
+
365
+ Xij ∼ N(µj, σ2) ,
366
+ (7)
367
+ where σ defines the magnitude of the baseline noise in the data. We generate values for µj by sampling
368
+ uniformly on the expression interval, which we set to [0, 1].
369
+ The expression of a perturbed gene in P is generated by adding to the unperturbed expression �
370
+ Xij an
371
+ observation-wise shift ∆i that we sample from a centered Gaussian distribution N(0, τ 2), with τ defining the
372
+ typical magnitude of the perturbation. Summing all contributions, the expression of a gene j in observation i,
373
+ Xij, is generated as:
374
+ Xij =
375
+ � �
376
+ Xij + ∆i
377
+ if j ∈ P
378
+
379
+ Xij
380
+ otherwise.
381
+ (8)
382
+ 6
383
+
384
+ Finally, we assign to each observation i a label generated from a simple logistic model on the ranks within
385
+ the stable (non-perturbed) genes (forming the set S):
386
+ P(Y = 1|X = x) = σ(w⊤rΓ + b),
387
+ with
388
+ wj = 0, ∀j /∈ S
389
+ and
390
+ Γ = S.
391
+ (9)
392
+ The generation of the parameters w, γγγ, and b is detailed in Appendix D.
393
+ 5.2
394
+ Results
395
+ We benchmarked on this synthetic data three different classifiers based on logistic regression: the simple
396
+ logistic regression (lr), the logistic regression on ranked data (rank-lr), and optirank, which can produce
397
+ the rank-lr model as a particular case but offers the additional flexibility of restraining the reference set.
398
+ Concerning the choice of regularization hyperparameters, note that we tuned only the ridge regularization
399
+ coefficient λ2 (and s for optirank), setting the lasso penalty λ1 to zero for all three classifiers, given that we
400
+ consider sample sizes n that are large compared to the number of variables d.
401
+ With default simulation parameters, optirank outperforms both rank-lr and lr (see Table 1). Moreover,
402
+ optirank is empirically able to recover the true reference set. Indeed, the cosine similarity SC between the
403
+ vector γγγ used to generate the data (see equation 9) and the one found by optirank is high: SC = 0.95 ± 0.03.
404
+ Test Balanced Accuracy (%)
405
+ Logistic Regression (lr)
406
+ 78 ± 2
407
+ Logistic Regression on Full Ranks (rank-lr)
408
+ 80 ± 3
409
+ optirank (our model)
410
+ 96 ± 0.4
411
+ Table 1: Test balanced accuracy (in %) for classifiers on the synthetic example of Section 5. Default simulation
412
+ parameters were set to d = 50, dP = 40, n = 1000, τ = 0.2, and σ = 0.05.
413
+ We investigated how this comparison evolves when we change the number of perturbed genes dP or the
414
+ dimension of the gene expression profile d, while maintaining the ratio between the number of observations
415
+ and the dimension (n/d) fixed. Not surprisingly, the superiority of optirank over lr and rank-lr fades
416
+ when the number of perturbed genes dP becomes small relative to the dimension of the gene expression
417
+ profile. Indeed, Figure 2 shows that when d increases while keeping the number of perturbed genes, dP ,
418
+ equal to 40 , rank-lr and lr scores rise to the level of optirank (whose performance degrades slightly).
419
+ In accordance, when the number of perturbed genes is increased while keeping the dimension of the gene
420
+ expression to 50, the performance of rank-lr and lr degrades, while the score of optirank remains high.
421
+ This outlines the fact that the perturbation on the usual ranks of informative genes becomes smaller as the
422
+ ratio dP /d decreases.
423
+ Concerning the cosine similarity between the ground truth reference set and the reference set found by
424
+ optirank, its dependence on the simulation parameters dP and d is small: Figure 4 in Appendix D.3 shows
425
+ that the overlap remains high.
426
+ For the dependence of scores on τ, which defines the magnitude of the observation-wise shift ∆i, see
427
+ Figure 3 in Appendix D.3.
428
+ In summary, this synthetic task exemplifies (a) how a non-monotone perturbation can effectively degrade
429
+ the performance of the rank normalization, and (b) that optirank is robust to the kind of perturbation
430
+ introduced thanks to its learnable ranking reference set.
431
+ 6
432
+ Experiments on real RNA-Seq data
433
+ In this section, we benchmark optirank on multiple biologically relevant classification tasks with real
434
+ RNA-Seq data. These tasks present qualitatively different dataset shifts between train and test data. In
435
+ Subsection 6.1, we evaluate how robust different algorithms are to these dataset shifts. To enhance robustness,
436
+ 7
437
+
438
+ 50
439
+ 75
440
+ 100
441
+ 125
442
+ 150
443
+ 175
444
+ 200
445
+ d
446
+ 0.75
447
+ 0.80
448
+ 0.85
449
+ 0.90
450
+ 0.95
451
+ test balanced accuracy (%)
452
+ lr
453
+ rank-lr
454
+ optirank
455
+ 0
456
+ 10
457
+ 20
458
+ 30
459
+ 40
460
+ dP
461
+ 0.75
462
+ 0.80
463
+ 0.85
464
+ 0.90
465
+ 0.95
466
+ test balanced accuracy (%)
467
+ lr
468
+ rank-lr
469
+ optirank
470
+ Figure 2: Dependence of the test-accuracy with respect to the dimension of the gene expression profile d
471
+ when dP = 40, and with respect to the number of perturbed genes dP for d = 50. The shaded area shows the
472
+ standard error across runs.
473
+ we then investigate in Subsection 6.2, an alternative learning scenario in which multiple source datasets are
474
+ merged in the training data. In this manner, we hope that the algorithm learns better to be robust to the
475
+ kind of perturbation it will encounter in the test data.
476
+ 6.1
477
+ Classification with different dataset shifts
478
+ 6.1.1
479
+ Classification tasks
480
+ CUP-related tasks.
481
+ Cancer of unknown primary (CUP) occurs when a patient has a metastatic tumor
482
+ whose organ of origin (where the primary tumor was located) cannot be determined. A lot of effort has
483
+ been dedicated to develop classifiers to predict the organ of the primary tumor based on RNA-Seq data
484
+ of the metastatic tissue, in the hope of personalizing and enhancing the treatment given to CUP patients
485
+ (Laprovitera et al., 2021). However, an obstacle in building efficiently such classifiers is the scarsity of
486
+ RNA-Seq data of metastatic tumors. As a result, classifiers are often trained and tuned on datasets of
487
+ primary tumors, which are biologically different from metastasis, and metastatic samples are reserved to
488
+ the external classifier validation. This is precisely what we do in the three tasks TCGA, PCAWG, met500.
489
+ In the task TCGA, classifiers are trained on the TCGA dataset comprising primary tumors (The Cancer
490
+ Genome Atlas Research Network et al., 2008), and tested on a held out portion of the same dataset. In the
491
+ task PCAWG, those same classifiers trained on TCGA were tested on an external dataset PCAWG also with
492
+ primary tumors (The ICGC/TCGA Pan-Cancer Analysis of Whole Genomes Consortium, 2020). Finally, the
493
+ task met500 evaluates those classifiers on the met500 dataset (published by Leiserson et al., 2015), which
494
+ comprises metastatic tumors of various origins. The two latter tasks represent different challenges in terms
495
+ of dataset-shift between train and test. The task PCAWG is subject to technical variation between two
496
+ separately obtained datasets, which we call batch-effect. An additional difficulty in the met500 task is that a
497
+ metastasis differs biologically from its primary tumor, resulting in a so-called biologically induced dataset shift.
498
+ Cell-typing single-cell data.
499
+ Single-cell RNA-Seq (scRNA-Seq) provides a way to probe gene expression
500
+ at the cell-level resolution. A preliminary step in single cell data analysis resides in the cell-type identification
501
+ of each observation/cell, i.e. cell typing. To achieve this automatically, Tan and Cahan (2019) propose to
502
+ train a classifier on a labeled dataset comprising many cell types —commonly known as a cell-atlas, and use
503
+ it to infer the cell-types in an unlabelled dataset. One difficulty is that the train and test scRNA-Seq data
504
+ 8
505
+
506
+ are potentially generated by different sequencing platforms. Tan and Cahan (2019) evaluate the robustness
507
+ of their classifier SCN for various cross-platform train and test data combinations (Tasks Baron-Murano,
508
+ Baron-Segerstolpe, MWS-TM10x, MWS-TMfacs, TM10x-MWS, TM10x-TMfacs and TMfacs-MWS). We use
509
+ the same tasks to investigate the usefulness of optirank in counteracting dataset shifts induced by different
510
+ sequencing platforms and compare with the original method SCN.
511
+ BRCA task.
512
+ The task BRCA consists in predicting the presence of the BRCA mutation from the RNA-Seq
513
+ data in breast primary tumors from the TCGA dataset. This task does not directly answer a real-life
514
+ classification problem. However, the classifier coefficients could be used to obtain a (sparse) transcriptional
515
+ signature for BRCA cancer.
516
+ We list all tasks while grouping them by type of dataset shift (if any) between the train and test data in
517
+ Table 2.
518
+ Dataset-shift
519
+ Tasks
520
+ None (same distribution)
521
+ BRCA, TCGA
522
+ Batch-effects
523
+ PCAWG
524
+ Technical dataset-shift (Different
525
+ sequencing platforms)
526
+ Baron-Murano, Baron-Segerstolpe, MWS-TM10x,
527
+ MWS-TMfacs, TM10x-MWS, TM10x-TMfacs and
528
+ TMfacs-MWS
529
+ Biologically induced dataset-shift
530
+ met500
531
+ Table 2: Classification tasks by type of dataset-shift between train and test set.
532
+ Additional details about the data sources are in Appendix E.1.
533
+ 6.1.2
534
+ Data pre-processing
535
+ For fairness of comparison and as first step of dimensionality reduction, the data was reduced to include the
536
+ 1000 genes occuring in informative pairs identified by SCN. Logged raw-cpm values were used as input for
537
+ each classifier (see Appendix E.2 for additional details).
538
+ 6.1.3
539
+ Hyperparameter selection
540
+ The ℓ1 and ℓ2 regularization coefficients of optirank, lr and rank-lr , and the s/d ratio for optirank were
541
+ tuned via internal cross-validation (i.e., using held out data from the same source as the training data; see
542
+ Appendix E.3.1, E.3.2 and E.4 for details). SingleCellNet was used with parameters suggested by Tan and
543
+ Cahan (2019), and random forest (rf) was trained with 300 trees. Optimal hyperparameters were chosen
544
+ with the one-standard error rule (Hastie et al., 2015) which selects the sparsest model with a score within one
545
+ standard error of the best one.
546
+ 6.1.4
547
+ Results and discussion
548
+ The performance in terms of balanced accuracy of all classifiers on the different classification tasks presented
549
+ in Section 6.1.1 are summarized in the following table (Table 6.1.4). We highlighted in bold the scores of
550
+ classifiers that did not score significantly worse than the winning method, according to a paired Student’s
551
+ t-test.
552
+ Interestingly, the advantage of logistic regression-based classifiers relying on a rank-representation
553
+ (optirank, rank-lr) over their non-ranked counterpart (lr) is not consistent, but rather depends on
554
+ the task considered. Indeed, on the tasks TM10x-MWS and TMfacs-MWS, lr clearly surpasses its ranked
555
+ counterparts, while on the tasks met500, Baron-Murano and TM10x-TMfacs we notice the opposite trend.
556
+ 9
557
+
558
+ SCN
559
+ lr
560
+ optirank
561
+ rank-lr
562
+ rf
563
+ BRCA
564
+ 50.1 ± 0.3 (4)
565
+ 58 ± 2 (1)
566
+ 52 ± 2 (3)
567
+ 53 ± 1 (2)
568
+ 50.0 ± 0 (5)
569
+ TCGA
570
+ 92 ± 1 (5)
571
+ 99.14 ± 0.23 (2) 99.06 ± 0.26 (3) 99.3 ± 0.3 (1)
572
+ 95.7 ± 0.5 (4)
573
+ PCAWG
574
+ 76.0 ± 4.5 (2)
575
+ 76.2 ± 5.4 (1)
576
+ 74.3 ± 5.4 (4)
577
+ 74.4 ± 5.8 (3)
578
+ 60 ± 4 (5)
579
+ met-500
580
+ 67 ± 4 (4)
581
+ 71 ± 4 (3)
582
+ 77 ± 4 (1)
583
+ 75 ± 4 (2)
584
+ 60 ± 4 (5)
585
+ Baron-Murano
586
+ 89 ± 2 (3)
587
+ 87 ± 3 (4)
588
+ 93.0 ± 1.9 (2)
589
+ 93.2 ± 1.9 (1)
590
+ 62 ± 3 (5)
591
+ Baron-Segerstolpe 93.5 ± 1.6 (3)
592
+ 93.4 ± 2.2 (4)
593
+ 93.6 ± 2.2 (2)
594
+ 94.0 ± 1.8 (1)
595
+ 60 ± 3 (5)
596
+ MWS-TM10x
597
+ 72 ± 2 (4)
598
+ 86 ± 2 (1)
599
+ 84 ± 2 (3)
600
+ 85 ± 2 (2)
601
+ 53 ± 1 (5)
602
+ MWS-TMfacs
603
+ 70 ± 2 (4)
604
+ 86 ± 1 (3)
605
+ 87.3 ± 1.6 (2)
606
+ 87.4 ± 1.7 (1) 50.01 ± 0.01 (5)
607
+ TM10x-MWS
608
+ 51.5 ± 0.3 (4)
609
+ 72 ± 2 (1)
610
+ 65 ± 2 (2)
611
+ 63 ± 2 (3)
612
+ 51.0 ± 0.2 (5)
613
+ TM10x-TMfacs
614
+ 80 ± 1 (4)
615
+ 91 ± 1 (3)
616
+ 92.3 ± 0.9 (2)
617
+ 92.7 ± 0.9 (1)
618
+ 58 ± 1 (5)
619
+ TMfacs-MWS
620
+ 51.0 ± 0.2 (4)
621
+ 71 ± 2 (1)
622
+ 64 ± 1 (3)
623
+ 66 ± 2 (2)
624
+ 50.2 ± 0.1 (5)
625
+ Table 3: Average balanced accuracies in % (across folds and classes) of competing classifiers on the different
626
+ tasks detailed in Section 4. Horizontal lines separate tasks with different types of dataset shift, from top to
627
+ bottom: generalization to the same distribution, robustness to batch-effects, robustness to biologically-induced
628
+ dataset shifts and robustness across sequencing platforms. The integer in parenthesis denotes the rank of the
629
+ classifiers in terms of average balanced accuracy (lower is better). Classifiers which did not score significantly
630
+ worse than the best classifier according to a paired Student’s t-test (with a level of 5 %) are highlighted in
631
+ bold (see Appendix E.5 for additional details).
632
+ This indicates that the rank representation confers additional robustness against dataset shifts only in some
633
+ instances.
634
+ A burning question is whether there is an advantage of ranking relative to a subset of genes compared
635
+ to ranking among all. At first sight, this doesn’t seem to be the case: the performances of optirank and
636
+ rank-lr are similar. In a more thorough analysis in which we carried paired Student’s t-tests for every task
637
+ and every pair of classifiers (see Appendix E.5), only the task TM10x-MWS showed a significant difference
638
+ between rank-lr and optirank, in favor of optirank.
639
+ In summary, in these tasks, the ranking reference set found by optirank is not more robust than the
640
+ classical full reference set.
641
+ A possible explanation is that an optimal restricted reference set does not
642
+ necessarily exist. Contrarily to the synthetic example in Section 5 and to certain observations made on real
643
+ data (see Leek et al., 2010), where a group of genes shift in one direction and perturb the ranking, in the
644
+ tasks we consider, the dataset-shift could either be a monotone transformation or could shift genes in opposite
645
+ directions. In both these scenarios, the ranks of certain stable genes would not be affected by the dataset
646
+ shift. Alternatively, one could argue that even if such an optimal restricted reference set existed, the only way
647
+ to discover it would be by inspecting the test dataset. We address this question in an additional experiment
648
+ presented in the next section.
649
+ Aside from the performance aspect, it is important to note that by definition, the classical ranking
650
+ normalization is computed with the measurement of all (reference) genes. In contrast, optirank can find
651
+ models that require only a small number of genes to be sequenced, which can be a decisive advantage in some
652
+ medical applications. In the tasks we consider, solutions found by optirank require around 500 genes, half of
653
+ the thousand used by rank-lr. However, it is worth noting that when the logistic regression performs well,
654
+ there is no advantage of using optirank, as the latter tends to produce less sparse solutions (see Appendix
655
+ E.5.6).
656
+ It is worth noting that in general, the random forest rf performs worse than other classifiers, and that
657
+ SCN does not provide a competitive advantage on single-cell typing tasks.
658
+ 10
659
+
660
+ 6.2
661
+ Enhancing robustness with a multi-source learning scenario
662
+ In this experiment, we investigate whether in the presence of dataset shifts, merging two source datasets in
663
+ the training set increases the classification accuracy on the third external target dataset. The rationale is that
664
+ the algorithm could learn to be robust to the kind of perturbation it will encounter in the target dataset2.
665
+ To achieve this, we constructed three tasks: TCGA-PCAWG-met500, Baron-Segerstolpe-Murano and MWS-
666
+ TMfacs-TM10x. The tasks are named after the datasets that compose them: the first is the main source
667
+ dataset, the second the auxiliary source dataset and the third is the target dataset. We compare the
668
+ performance in the multi-source scenario (where the main and auxiliary source datasets are merged into a
669
+ training set) to a baseline scenario in which the auxiliary source dataset is not used (single-source scenario).
670
+ Appendix E.3.2 provides additional details about the construction of those tasks.
671
+ ANrank-lr.
672
+ One could ask if, with the help of the auxiliary source dataset, robust ranking reference genes
673
+ can be identified in a simpler manner than in optirank, in particular, with a selection step decoupled from
674
+ the fitting process. To answer this question, we constructed an additional logistic regression classifier based
675
+ on adaptive ranks, ANrank-lr, that selects the ranking reference genes based on a simple ANOVA test.
676
+ For each gene, the vulnerability to dataset-shift is assessed with a two-way ANOVA which determines the
677
+ effect of label and dataset jointly. The s most robust genes are selected as ranking reference (See Appendix
678
+ C.6 for additional details). For completeness, we evaluate ANrank-lr both in the multi-source and in the
679
+ single-source scenario. In the single-source setting, ANrank-lr uses the auxiliary source dataset only for the
680
+ ANOVA test (and not during fitting nor validation).
681
+ Data preprocessing and hyperparameter selection.
682
+ Data preprocessing was done as described in
683
+ the previous section. Appendix E.3.2 details the procedure to obtain the cross-validation splits: special
684
+ care was taken to have similar training dataset sizes in the multi-source and single-source scenarios. The
685
+ hyperparameter grids used for cross-validation are the same as in the previous experiment. Concerning
686
+ ANrank-lr, the number of ranking reference genes s and the elastic net regularization coefficients are tuned
687
+ over the same grid as for optirank.
688
+ 6.2.1
689
+ Results and Discussion.
690
+ There is a clear benefit brought by merging two source datasets in the training phase (multi-source scenario).
691
+ Indeed, for nearly all classifiers and tasks, the average balanced accuracy is greatly increased in the multi-
692
+ source scenario (Table 6.2.1) compared to the single-source scenario in which the auxiliary source dataset is
693
+ not used (see Table E.5.8 in Appendix E.5.8). Accordingly, for both single-cell typing tasks, the leading score
694
+ is greater in the multi-source scenario than in the single-source scenario. Moreover, the regression classifiers
695
+ based on ranks (optirank, ANrank-lr, and rank-lr) outperform the simple logistic regression (lr).
696
+ However, as in the previous section, the performances of optirank and rank-lr seem comparable: in the
697
+ single-cell tasks, the paired t-tests do not reveal any significant difference between the two classifiers (see
698
+ Appendix E.5).
699
+ It is worth noting that despite the simplicity of its method for restricting the reference set, ANrank-lr reaches
700
+ a level of performance comparable with the other ranked-based algorithms, in particular optirank, and likewise
701
+ outperforms the simple logistic regression. This is particularly interesting since, by definition, ANrank-lr can
702
+ produce sparse solutions. Indeed, in Appendix E.5.7, we note that optirank and ANrank-lr find solutions
703
+ involving a similar number of genes. In accordance with the results of the previous section, the simple logistic
704
+ regression produces substantially sparser solutions.
705
+ Runtime comparison.
706
+ The runtime for competing classifiers was measured in the previous single-source
707
+ scenario. Table 26 in Appendix E.5.9 attests that the fitting time of both optirank and ANrank-lr are
708
+ reasonable and in some instances lower than the one of their competitors.
709
+ 2The art of combining multiple labeled source datasets in order to classify a target dataset under a dataset-shift is referred as
710
+ multi-source domain adaptation in the literature (See for example the review by Sun et al. (2015)).
711
+ 11
712
+
713
+ ANrank-lr
714
+ SCN
715
+ lr
716
+ optirank
717
+ rank-lr
718
+ rf
719
+ TCGA-PCAWG-met500
720
+ 81 ± 4 (1)
721
+ 69 ± 5 (4)
722
+ 80 ± 4 (2)
723
+ 68 ± 4 (5)
724
+ 71 ± 4 (3)
725
+ 65 ± 4 (6)
726
+ Baron-Segerstolpe-Murano
727
+ 98.0 ± 0.3 (3)
728
+ 93.2 ± 0.8 (5) 97.2 ± 0.4 (4)
729
+ 98.1 ± 0.3 (2)
730
+ 98.2 ± 0.3 (1) 67 ± 3 (6)
731
+ MWS-TMfacs-TM10x
732
+ 95.63 ± 0.40 (3)
733
+ 83 ± 1 (5)
734
+ 92.5 ± 0.9 (4) 95.64 ± 0.41 (2) 95.9 ± 0.4 (1) 72 ± 2 (6)
735
+ Table 4: Multi-source scenario. Average balanced accuracies in % (across folds and classes) of competing
736
+ classifiers on the tasks detailed in section 6.2 in the case in which the first two source datasets are merged in
737
+ the training phase. The integer in parenthesis denotes the rank of the classifiers in terms of average balanced
738
+ accuracy (lower is better). Classifiers which did not score significantly worse than the best classifier according
739
+ to a paired Student’s t-test are highlighted in bold (see App. E.5 for additional details).
740
+ Conclusion
741
+ According to the literature, rank normalization confers increased robustness against distribution shifts that
742
+ occur in RNA-Seq data. This success is linked to the fact that rank normalization is invariant to all perturbing
743
+ monotone transformations that occur between different datasets and/or samples. However, a potential
744
+ weakness of using rank normalization is that the rank of genes that might be biologically relevant can be
745
+ perturbed by fluctuations of irrelevant ones.
746
+ To counteract this problem, we proposed optirank, an algorithm that learns a ranking relative to an optimal
747
+ reference genes set while learning a classification or regression model. We showed on a synthetic example,
748
+ inspired by observations on real data, how rank-normalization can suffer from collective fluctuations of an
749
+ ensemble of genes that perturb the ranks, and demonstrated the ability of optirank to eliminate those genes
750
+ from the ranking reference set, thereby allowing it to solve successfully the classification task.
751
+ We then assessed the performance of optirank on 11 real classification tasks, presenting different challenges
752
+ in terms of distribution shifts occurring between train and test data. Indeed, we hypothesize that our model
753
+ is able in some instances to remove from the ranking reference set genes that have the propensity to shift in
754
+ the test distribution, thereby perturbing the ranks learned on the training data. Firstly, we observed that the
755
+ advantage of the rank transformation is not systematic. Moreover, contrary to our hypothesis, restricting the
756
+ reference set, as is done by optirank, does not seem to provide increased robustness compared to ranking
757
+ relative to the full set of genes.
758
+ As an additional way to tackle distribution shifts occurring between train and test data, we propose a
759
+ multi-source learning scheme. In this scheme, we train a classifier on a union of two different datasets in
760
+ which a dataset shift occurs, hoping to make it more robust and efficient on a third external dataset. We
761
+ show that this scenario is particularly useful in the cell-typing tasks, in particular when used in synergy with
762
+ rank-based classifiers. We also explored an alternative way of restricting the reference set, with a simple
763
+ ANOVA test that exploits the multiple sources in the training data. Despite its simplicity, the resulting
764
+ classifier, which we call ANrank-lr, achieves a level of performance similar to optirank.
765
+ Finally, it is important to mention that restricting the reference set reduces the number of genes needed to
766
+ be sequenced, while maintaining the level of robustness and accuracy of the rank normalization. Therefore, in
767
+ certain medical applications where sparsity is desired, it can be worth considering the classifiers optirank and
768
+ ANrank-lr.
769
+ Acknowledgements
770
+ This work was funded under the Swiss Data Science Center collaborative project grant C19-02.
771
+ 12
772
+
773
+ References
774
+ Amerise, I. L. and Tarsitano, A. (2015). Correction methods for ties in rank correlations. Journal of Applied
775
+ Statistics, 42(12):2584–2596.
776
+ Cascianelli, S., Molineris, I., Isella, C., Masseroli, M., and Medico, E. (2020). Machine learning for RNA
777
+ sequencing-based intrinsic subtyping of breast cancer. Scientific Reports, 10:14071.
778
+ Csiba, D. and Richtárik, P. (2017). Global convergence of arbitrary-block gradient methods for generalized
779
+ Polyak-Łojasiewicz functions. arXiv preprint arXiv:1709.03014.
780
+ Defazio, A., Bach, F., and Lacoste-Julien, S. (2014). SAGA: A fast incremental gradient method with support
781
+ for non-strongly convex composite objectives.
782
+ Dillies, M.-A., Rau, A., Aubert, J., Hennequet-Antier, C., Jeanmougin, M., Servant, N., Keime, C., Marot,
783
+ G., Castel, D., Estelle, J., Guernec, G., Jagla, B., Jouneau, L., Laloë, D., Gall, C., Schaëffer, B., Le Crom,
784
+ S., Guedj, M., and Jaffrézic, F. (2012). A comprehensive evaluation of normalization methods for illumina
785
+ high-throughput RNA sequencing data analysis. Briefings in bioinformatics, 14.
786
+ Duchi, J., Shalev-Shwartz, S., Singer, Y., and Chandra, T. (2008). Efficient projections onto the l1-ball for
787
+ learning in high dimensions. In ICML ’08: Proceedings of the 25th international conference on Machine
788
+ learning, pages 272–279.
789
+ Evans, C., Hardin, J., and Stoebel, D. (2016). Selecting between-sample RNA-seq normalization methods
790
+ from the perspective of their assumptions. Briefings in bioinformatics, 19.
791
+ Hastie, T., Tibshirani, R., and Wainwright, M. (2015). Statistical Learning with Sparsity: The Lasso and
792
+ Generalizations. Chapman and Hall/CRC.
793
+ Kendall, M. G. (1945). The treatment of ties in ranking problems. Biometrika, 33(3):239–251.
794
+ Laprovitera, N., Riefolo, M., Ambrosini, E., Klec, C., Pichler, M., and Ferracin, M. (2021). Cancer of
795
+ unknown primary: Challenges and progress in clinical management. Cancers, 13:451.
796
+ Lausser, L., Schmid, F., Schirra, L.-R., Wilhelm, A., and Kestler, H. (2016). Rank-based classifiers for
797
+ extremely high-dimensional gene expression data. Advances in Data Analysis and Classification, 12:1–20.
798
+ Leek, J. T., Scharpf, R. B., Bravo, H. C., Simcha, D., Langmead, B., Johnson, W. E., Geman, D., Baggerly, K.,
799
+ and Irizarry, R. A. (2010). Tackling the widespread and critical impact of batch effects in high-throughput
800
+ data. Nature Reviews Genetics, 11(10):733–739.
801
+ Leiserson, M. D. M., Gramazio, C. C., Hu, J., Wu, H.-T., Laidlaw, D. H., and Raphael, B. J. (2015). MAGI:
802
+ visualization and collaborative annotation of genomic aberrations. Nature Methods, 12(6):483–484.
803
+ Pedregosa, F., Varoquaux, G., Gramfort, A., Michel, V., Thirion, B., Grisel, O., Blondel, M., Prettenhofer,
804
+ P., Weiss, R., Dubourg, V., Vanderplas, J., Passos, A., Cournapeau, D., Brucher, M., Perrot, M., and
805
+ Duchesnay, E. (2011). Scikit-learn: Machine learning in Python. Journal of Machine Learning Research,
806
+ 12:2825–2830.
807
+ Razaviyayn, M., Hong, M., and Luo, Z.-Q. (2013). A unified convergence analysis of block successive
808
+ minimization methods for nonsmooth optimization. SIAM Journal on Optimization, 23(2):1126–1153.
809
+ Scialdone, A., Natarajan, K. N., Saraiva, L. R., Proserpio, V., Teichmann, S. A., Stegle, O., Marioni, J. C.,
810
+ and Buettner, F. (2015). Computational assignment of cell-cycle stage from single-cell transcriptome data.
811
+ Methods, 85:54–61.
812
+ 13
813
+
814
+ Shen, Y., Chu, Q., Yin, X., He, Y., Bai, P., Wang, Y., Fang, W., Timko, M., Fan, L., and Jiang, W. (2020).
815
+ Tod-cup: a gene expression rank-based majority vote algorithm for tissue origin diagnosis of cancers of
816
+ unknown primary. Briefings in bioinformatics, 22.
817
+ Shi, J. V., Xu, Y., and Baraniuk, R. G. (2014).
818
+ Sparse bilinear logistic regression.
819
+ arXiv preprint
820
+ arXiv:1404.4104.
821
+ Sun, S., Shi, H., and Wu, Y. (2015). A survey of multi-source domain adaptation. Information Fusion,
822
+ 24:84–92.
823
+ Tan, Y. and Cahan, P. (2019). SingleCellNet: A computational tool to classify single cell RNA-seq data
824
+ across platforms and across species. Cell Systems, 9(2):207–213.e2.
825
+ The Cancer Genome Atlas Research Network et al. (2008). Comprehensive genomic characterization defines
826
+ human glioblastoma genes and core pathways. Nature, 455(7216):1061–1068.
827
+ The ICGC/TCGA Pan-Cancer Analysis of Whole Genomes Consortium (2020). Pan-cancer analysis of whole
828
+ genomes. Nature, 578(7793):82–93.
829
+ Tseng, P. and Yun, S. (2009). A coordinate gradient descent method for nonsmooth separable minimization.
830
+ Mathematical Programming, 117(1):387–423.
831
+ Xu, Y. and Yin, W. (2013). A block coordinate descent method for regularized multiconvex optimization
832
+ with applications to nonnegative tensor factorization and completion. SIAM Journal on imaging sciences,
833
+ 6(3):1758–1789.
834
+ Zaslavskiy, M., Bach, F., and Vert, J.-P. (2009). A path following algorithm for the graph matching problem.
835
+ IEEE Transactions on Pattern Analysis and Machine Intelligence, 31(12):2227–2242.
836
+ Zou, H. and Hastie, T. (2005). Regularization and variable selection via the elastic net. Journal of the Royal
837
+ Statistical Society: Series B (Statistical Methodology), 67(2):301–320.
838
+ 7
839
+ Code and Data Availability
840
+ The code and the data necessary to reproduce the results are available on the Github repository https:
841
+ //github.com/paolamalsot/optirank.
842
+ 14
843
+
844
+ A
845
+ Notions of rank in the presence of ties
846
+ For the RNA-Seq data we consider in several experiments, the read count of a few genes are equal to 0. This
847
+ leads to ties between these genes, which motivated us to extend the formulation proposed to that case.
848
+ A.1
849
+ Different rank definitions
850
+ Ever since ranks were introduced in statistics, there have been discussions on how to correctly treat
851
+ ties (Kendall, 1945).
852
+ For more references and discussion on recent related work, we refer the reader
853
+ to Amerise and Tarsitano (2015).
854
+ The three simplest approaches, and the ones which could be relevant in our setting, consist in assigning
855
+ to a group of tied genes whose ties are initially broken arbitrarily, respectively their minimum, maximum, or
856
+ average rank.
857
+ For simplicity, and given that the problem of ties is not central to the set of ideas that we are presenting
858
+ and might be irrelevant in many cases, the generalization of classical ranks to ranks with respect to reference
859
+ set that we introduce in the paper stems from the minimum rank definition. However, our implementation of
860
+ the optirank algorithm uses the better behaved average rank.
861
+ We propose in the following generalizations of these different ranks to the case where ranks are defined
862
+ with respect to a reference set Γ.
863
+ Minimum rank.
864
+ In Section 2.1 we introduced the following definition of rank rΓ
865
+ j of xj relative to a reference
866
+ set Γ:
867
+
868
+ j =
869
+ d
870
+
871
+ k=1
872
+ 1[k ∈ Γ] 1[xj > xk] .
873
+ (10)
874
+ The above definition of ranks assigns to tied values the minimum rank they would have if they were arbitrarily
875
+ ordered, hence the name of minimum rank. This rank is also referred to as the standard competition rank for
876
+ obvious reasons. Note that with the mathematical definition above, the smallest rank equals 0; to obtain
877
+ ranks that starts at 1 it suffices to add 1 to all rank values.
878
+ Average rank.
879
+ A way of handling ties which has better properties, in particular which keeps constant the
880
+ sum of the ranks, is to assign to them the average value of these ranks, hence the name average ranking. In
881
+ mathematical terms, this is:
882
+
883
+ i =
884
+ d
885
+
886
+ j=1
887
+ 1[j ∈ Γ] (1[xi > xj] + 0.5 1[xi = xj]) − 0.5
888
+ (11)
889
+ =
890
+ d
891
+
892
+ j=1
893
+ γj (1[xi > xj] + 0.5 1[xi = xj]) − 0.5 ,
894
+ (12)
895
+ where the offset of 0.5 sets again the lowest rank to the value of 0. (The fact that this offset appears here
896
+ while it did not appear for the minimum rank could seem surprising, but it is necessary because we sum over
897
+ all values of j including j = i.) Again to obtain ranks that starts at 1 we can add 1 to all ranks. The average
898
+ rank is also sometimes called the fractional rank.
899
+ Maximum rank.
900
+ Yet another possible definition, which is symmetric with the minimum rank, consists
901
+ in replacing the strict inequality in (10) by an inclusive inequality and adding an offset of 1 (to keep our
902
+ convention that the ranks start at 0). This results in:
903
+ 15
904
+
905
+
906
+ j =
907
+ d
908
+
909
+ k=1
910
+ 1[k ∈ Γ] 1[xj ≥ xk] − 1 .
911
+ (13)
912
+ The maximum rank is also called modified competition rank.
913
+ In our implementations and experiments, we systematically used the average rank for two main reasons.
914
+ First, if two variables (i.e. genes in our case) have systematically close values (i.e. that are either equal or
915
+ tend to be very close and in arbitrary order), we would expect the coefficients wj associated with their ranks
916
+ in a classification model to be close. In that case, it is natural to request that the linear score does not change
917
+ much whether they are exactly equal or not. Given that the sum of the ranks of tied values is constant for
918
+ the average rank, it satisfies this property, which fails for the min and the max rank. Second, for a non-trivial
919
+ reference set, and when there are no numerical ties, the average rank only assigns integer valued ranks for the
920
+ elements of the reference set Γ, and any element falling exactly in-between two consecutive reference elements
921
+ has a half-integer value, which is a nice property to have.
922
+ A.2
923
+ Recursion to compute average/maximum/minimum ranks in O(d) from
924
+ sorted data
925
+ In this section, we derive the recursion used to compute the rank with respect to a reference gene set in the
926
+ presence of ties for all definitions of ranking mentioned previously.
927
+ Let x ∈ Rd represent the vector of gene expressions and Π = (A1, . . . , AK) its ordered partition, such that
928
+
929
+ ∀k ∈ {1, . . . , K}, ∀i, i′ ∈ Ak,
930
+ xi = xi′,
931
+ ∀j < k, ∀i ∈ Aj, i′ ∈ Ak,
932
+ xi < xi′.
933
+ (14)
934
+ A.2.1
935
+ Recursion for the average rank
936
+ The recursive relationship for the rank of gene i ∈ Aki is derived as follows, from the definition in Eq. (12):
937
+ ri =
938
+ d
939
+
940
+ j=1
941
+ γj (1[xi > xj] + 0.5 1[xi = xj]) − 0.5 =
942
+ K
943
+
944
+ k=1
945
+
946
+ j∈Ak
947
+ γj
948
+
949
+ 1[ki > k] + 0.5 1[ki = k]
950
+
951
+ − 0.5
952
+ (15)
953
+ =
954
+ ki
955
+
956
+ k=1
957
+ |Γ ∩ Ak|
958
+
959
+ 1[ki > k] + 0.5 1[ki = k]
960
+
961
+ − 0.5,
962
+ (16)
963
+ where ki denotes the index of the partition such that i ∈ Aki.
964
+ Obviously, ri = ri′ if ki = ki′. If we call �rki this common value, with a little work, we obtain the following
965
+ recursive relationship:
966
+ �rk = �rk−1 + 1
967
+ 2
968
+
969
+ |Γ ∩ Ak−1| + |Γ ∩ Ak|
970
+
971
+ + 0.5.
972
+ (17)
973
+ A.2.2
974
+ Recursion for the maximum rank
975
+ The recursion for the maximum rank strategy defined by Eq. (13) can be obtained similarly. With the same
976
+ notations, we have
977
+ �rk = �rk−1 + |Γ ∩ Ak| .
978
+ (18)
979
+ 16
980
+
981
+ A.2.3
982
+ Recursion for minimum rank
983
+ The recursive relation for the minimum rank accounting for the presence of ties can be obtained similarly.
984
+ With the same notations, we have:
985
+ �rk = �rk−1 + |Γ ∩ Ak−1| .
986
+ (19)
987
+ B
988
+ Optimization algorithms
989
+ B.1
990
+ Projection on the capped-simplex
991
+ To be self-contained, we rederive in this section an efficient algorithm to compute the projection on the
992
+ capped-simplex. Note that it is a classical result that this projection can be calculated in O(dlogd) operations,
993
+ as demonstrated in Duchi et al. (2008).
994
+ Suppose that for a given x in Rd, we wish to solve:
995
+ min
996
+ z∈Rd
997
+ 1
998
+ 2 ∥z − x∥2
999
+ 2 ,
1000
+ such that
1001
+ 0 ≤ zi ≤ 1
1002
+ and
1003
+ d
1004
+
1005
+ i=1
1006
+ zi = k.
1007
+ (20)
1008
+ Because of the convexity of Problem (20), any point satisfying the KKT conditions is primal optimal (and
1009
+ vice versa).
1010
+ The Lagrangian is:
1011
+ L (z, λ, ν, µ) = 1
1012
+ 2 ∥z − x∥2
1013
+ 2 + λ
1014
+
1015
+ d
1016
+
1017
+ i=1
1018
+ zi − k
1019
+
1020
+
1021
+ d
1022
+
1023
+ i=1
1024
+ νizi +
1025
+ d
1026
+
1027
+ i=1
1028
+ µi(zi − 1).
1029
+ (21)
1030
+ We enforce the KKT conditions, namely complementary slackness (CS), primal feasibility (PF), dual
1031
+ feasibility (DF), and primal stationarity (PS), to get
1032
+ ∀i ∈ {1, . . . d},
1033
+
1034
+ νizi = 0,
1035
+ µi(zi − 1) = 0,
1036
+ (CS)
1037
+ d
1038
+
1039
+ i=0
1040
+ zi = k,
1041
+ (PF)
1042
+ ∀i ∈ {1, . . . d},
1043
+ νi, µi > 0,
1044
+ (DF)
1045
+ ∇zL = 0.
1046
+ (PS)
1047
+ With a little work, we get that:
1048
+ zi = clip(xi − λ, 0, 1),
1049
+ (22)
1050
+ with clip(x, a, b) = max(a, min(x, b)) (provided a < b) and where λ is found by solving ψ(λ) = k, with:
1051
+ ψ(λ) =
1052
+ d
1053
+
1054
+ i=0
1055
+ clip(xi − λ, 0, 1).
1056
+ (23)
1057
+ In order to find the solution of (23), one can follow this procedure:
1058
+ 1. Order xi and xi − 1 values (yielding 2d ordered values or knots). As a result, there are 2d − 1 intervals
1059
+ between subsequent knots.
1060
+ 2. Calculate the slope of ψ(λ) on each interval.
1061
+ 17
1062
+
1063
+ 3. Calculate iteratively the value of ψ(λ) at each knot, starting from the greatest xi where ψ(λ) = 0. One
1064
+ can stop when ψ(λ) > k.
1065
+ 4. Determine the interval on which ψ(λ) = k.
1066
+ 5. Solve the linear equation on this interval to find λ.
1067
+ B.2
1068
+ Adaptive step sizes and a multi-convex formulation
1069
+ In this section, we detail the exact problem formulation to which a block proximal coordinate descent
1070
+ algorithm (BPCD, Xu and Yin, 2013) can be applied. Our formulation and algorithm is in particular very
1071
+ close to the ones considered in Shi et al. (2014).
1072
+ As stated in Section 3, the goal is to find the solution of a minimization problem of the form:
1073
+ min
1074
+ γγγ∈[0,1]d, w∈Rd, b∈R
1075
+ 1
1076
+ n
1077
+ n
1078
+
1079
+ i=1
1080
+ ℓ(yi, w⊤Ciγγγ + b) + Ω(w) + λp ρ(γγγ)
1081
+ s.t.
1082
+ γγγ⊤1 = s,
1083
+ (24)
1084
+ for an increasing sequence of coefficients λp ≥ 0, where a �→ ℓ(y, a) is assumed to be a convex and differentiable
1085
+ loss function, with Lipschitz gradients, where Ω(w) is a convex regularizer, and where ρ is the concave “push”
1086
+ penalty defined by
1087
+ ρ(γγγ) =
1088
+ d
1089
+
1090
+ j=1
1091
+ γj(1 − γj).
1092
+ (25)
1093
+ When λp > 0, the previous problem is clearly non convex w.r.t. γγγ. It is obviously possible to use block-
1094
+ coordinate proximal coordinate descent on functions that are not even convex with respects to each of the
1095
+ individual blocks considered (Razaviyayn et al., 2013; Csiba and Richtárik, 2017). But, with among others
1096
+ the motivation of being able to use adaptive step-sizes that can be defined in a principled way, we propose
1097
+ to exploit the fact that the optimization problem can be reformulated as another bi-convex problem, by
1098
+ introducing a variational form for the concave penalty ρ.
1099
+ Indeed, thanks to the Fenchel-Legendre transform it is possible to express the concave push-penalty as an
1100
+ infimum over a set of linear functions parameterized by the dual variable υυυ, as follows
1101
+ ρ(γγγ) = inf
1102
+ υυυ∈Rd
1103
+
1104
+ ρ∗(υυυ) − γγγ⊤υυυ
1105
+
1106
+ ,
1107
+ with
1108
+ ρ∗(υυυ) =
1109
+ d
1110
+
1111
+ j=1
1112
+ 1
1113
+ 4(1 + υj)2.
1114
+ (26)
1115
+ Therefore, the minimization problem (24) can be written in a multi-convex form:
1116
+ min
1117
+ γγγ∈[0,1]d, b∈R,
1118
+ w∈Rd,υυυ∈Rd
1119
+ 1
1120
+ n
1121
+ n
1122
+
1123
+ i=1
1124
+ ℓ(yi, w⊤Ciγγγ + b) + Ω(w) + λp ρ∗(υυυ) − λpγγγ⊤υυυ
1125
+ s.t.
1126
+ γγγ⊤1 = s.
1127
+ (27)
1128
+ Problem (27) is convex w.r.t. (w,b, υυυ) with γγγ fixed, and with respect to (γγγ, b) with (w, υυυ) fixed. We
1129
+ therefore apply a BPCD scheme to minimize problem (27), except that, for the variable υυυ, the exact
1130
+ minimization is immediate, which we therefore use instead of a gradient update. Note that the minimization
1131
+ with respect to υj yields υj = 2γj −1 = ∂ρ
1132
+ γj (γγγ) so that effectively the update on υ amounts to replacing ρ by its
1133
+ tangent, as typically done in convex-concave optimization algorithms. The advantage of using a multi-convex
1134
+ formulation is that we can use Armijo type adaptive stepsizes for each variable (In particular, the proofs of
1135
+ convergence in Csiba and Richtárik (2017) generalize immediately to the case where Armijo-type linesearches
1136
+ are used). Intuitively, using the tangent approximation to ρ when performing a step on γ prevents from
1137
+ increasing the step-size too quickly, which might help to prevent that γ is projected “too early” on vertices of
1138
+ the capped-simplex that are suboptimal local minima.
1139
+ The algorithm that we obtain is similar to the algorithm proposed by Shi et al. (2014).
1140
+ 18
1141
+
1142
+ B.3
1143
+ BPCD algorithm with adaptive step sizes
1144
+ In this section, we detail the BPCD algorithm (Xu and Yin, 2013; Shi et al., 2014) that we use to solve the
1145
+ minimization problem in equation (4).
1146
+ Note:
1147
+ The objective function to minimize in problem (27), which we call O, can be decomposed in two
1148
+ parts, a differentiable part h and a potentially non-differentiable part ψ whose proximal operator can be
1149
+ computed efficiently:
1150
+ h(w,γγγ, b,υυυ) = ℓ(yi, w⊤Ciγγγ + b) − λpγγγ⊤υυυ
1151
+ (28)
1152
+ ψ(w,γγγ, b,υυυ) = Ω(w) + λpρ∗(υυυ) + ι{γγγ∈∆s},
1153
+ (29)
1154
+ with ∆s = {γγγ ∈ [0, 1]d | γγγ⊤1 = s} the capped-simplex and ι{γγγ∈∆s} = 0 if γγγ ∈ ∆s and ι{γγγ∈∆s} = +∞ else.
1155
+ The main part of the BPCD algorithm is detailed in Algorithm 2. It consists of a main loop that involves
1156
+ alternative updates in w, γγγ, b and υυυ. We refer the reader to the previous section for an explanation on the
1157
+ dual variable υυυ. The loop is terminated when a convergence criterion is met.
1158
+ Note.
1159
+ In the following, we denote by p a set of variables (w,γγγ,υυυ, b). We adopt the convention that the
1160
+ same index k indexes the set and the enclosed variables, such that: pk = (wk,γγγk,υυυk, bk).
1161
+ Algorithm 2 Block Proximal Coordinate Descent
1162
+ Input: {xi, yi} for i = 1 . . . n
1163
+ k ← 0
1164
+ p0 ← Initialization() a
1165
+ Lw, Lγγγ, Lb ← InitializationStepsize(p0)
1166
+ p ← p0
1167
+ k ← 0
1168
+ repeat
1169
+ k ← k + 1
1170
+ (w, Lw) ← ProxStep_w(p, Lw)
1171
+ ▷ Updating w
1172
+ (b, Lb) ← ProxStep_b(p, Lb)
1173
+ ▷ Updating b
1174
+ (γγγ, Lγγγ) ← ProxStep_γ(p, Lγγγ)
1175
+ ▷ Updating γγγ
1176
+ υυυ ← 2γγγ − 1
1177
+ pk ← p
1178
+ ▷ Storing solution
1179
+ until ConvCrit(pk, pk−1) or k > max_iter
1180
+ return pk
1181
+ aNote that when λp > 0, (w0, γγγ0, υυυ0, b0) are initialized from the previous solution.
1182
+ Algorithm 3 details the proximal update step with adaptive stepsizes for the variable w. It consists of a
1183
+ loop that searches over logarithmic decreasing stepsizes until a criterion that ensures a sufficient decrease in
1184
+ the objective is met. For each stepsize, the next step proposed is computed with a proximal operator.
1185
+ The updates for the variables γγγ and b are conceptually identical and can be obtained by permuting
1186
+ appropriately the role of the different variables.
1187
+ 19
1188
+
1189
+ Algorithm 3 Proximal update step for w
1190
+ function ProxStep_w(p−, Linit)
1191
+ m ← −1
1192
+ L ← Linit
1193
+ repeat
1194
+ L ← max(Lmin, L ηm) a
1195
+ w∗ ← argmin
1196
+ w∈Rd ⟨∇wh(p−), w − w−⟩ + L
1197
+ 2 ∥w − w−∥2
1198
+ 2 + ψ(w,γγγ−, b−, υ−)
1199
+ p ← (w∗,γγγ−, b−, υ−)
1200
+ m ← m + 1
1201
+ until CritProx_w(p, p−, L)
1202
+ return w∗, L
1203
+ end function
1204
+ aLmin was set to 10−10, and η to 1.5.
1205
+ The criterion for accepting the inverse stepsize L is:
1206
+ Algorithm 4 Criterion stepsize for w
1207
+ function CritProx_w(p, p−, L)
1208
+ return
1209
+
1210
+ h(p) < h(p−) + ⟨∇wh(p−), w − w−⟩ + L
1211
+ 2 ∥w − w−∥2
1212
+ 2
1213
+
1214
+ end function
1215
+ The BPCD algorithm terminates either when progress in the objective becomes inappreciable, or when
1216
+ the update in the variables are very small. The convergence criterion is formulated as:
1217
+ Algorithm 5 Convergence Criterion
1218
+ function ConvCrit(pk, pk−1)
1219
+ ϵ ← 10−5, ϵ2 ← 10−10
1220
+ if O(pk−1) − O(pk) < ϵD then
1221
+ return true
1222
+ else if max(
1223
+ ��wk − wk−1��2 , (bk − bk−1)2,
1224
+ ��γγγk − γγγk−1��2) < ϵ2 then
1225
+ return true
1226
+ else
1227
+ return false
1228
+ end if
1229
+ end function
1230
+ In practice, we set the denominator D to O(p2) at the first relaxation iteration with λp = 0.
1231
+ Algorithm 6 Initialization
1232
+ function Initialization( )
1233
+ b0 ← 0
1234
+ w0 ← 0
1235
+ γγγ0 ← s
1236
+ d1
1237
+ υυυ0 ← 2γγγ − 1
1238
+ return p0
1239
+ end function
1240
+ 20
1241
+
1242
+ The initial stepsizes are calculated with the projection of the derivative of h on the Hessian.
1243
+ Algorithm 7 Initialization of stepsize
1244
+ function InitializationStepsize(p0)
1245
+ Lw ← ∇wh(p0)T ∇2
1246
+ wh(p0)∇wh(p0)
1247
+ ∥∇wh(p0)∥2
1248
+ Lγγγ ← ∇γγγh(p0)T ∇2
1249
+ γγγh(p0)∇γγγh(p0)
1250
+ ∥∇γγγh(p0)∥2
1251
+ Lb ← ∇bh(p0)T ∇2
1252
+ bh(p0)∇bh(p0)
1253
+ ∥∇bh(p0)∥2
1254
+ return (L0
1255
+ w, L0
1256
+ γγγ, L0
1257
+ b)
1258
+ end function
1259
+ B.4
1260
+ Path following algorithm and stopping criteria
1261
+ Motivation.
1262
+ The objective function in (4) must be solved for an increasing sequence of λp > 0, until
1263
+ γγγ∗ ∈ {0, 1}d. As we noted in Section 3, one must be careful not to increase λp too quickly. In the following,
1264
+ we detail the path-following algorithm used to determine the sequence of λp.
1265
+ Rationale.
1266
+ The general procedure of the path following algorithm consists in increasing λp "progressively",
1267
+ each time solving problem (4) starting from the previous solution. The criterion used to determine the next
1268
+ λp is based on the increase in the objective O at the current solution. The detailed algorithm is laid out in
1269
+ the following paragraph.
1270
+ Path-following algorithm.
1271
+ First, problem (4) is solved without push-penalty (λp = 0), yielding a solution
1272
+ p(0) = {w, b,γγγ}. Then, λ(1)
1273
+ p
1274
+ is chosen with the procedure detailed below (see equation (30)) and the BPCD
1275
+ algorithm is run again starting from p(0) to minimize the objective with λ(1)
1276
+ p , yielding the solution p(1). This
1277
+ procedure is repeated until γγγ is very close to the vertices of the capped-simplex (see criterion (31) below), or
1278
+ after reaching the maximum number of so-called relaxation iterations (10000).
1279
+ Chosing the next λp.
1280
+ The rule for choosing λ(i+1)
1281
+ p
1282
+ , starting from a solution p(i) is:
1283
+ O(p(i), λ(i+1)
1284
+ p
1285
+ ) − O(p(i), λ(i)
1286
+ p ) = Mϵ
1287
+ (30)
1288
+ M controls the tradeoff between speed and accuracy and was set to 100. ϵ is the tolerance on the objective
1289
+ value decrease used in the stopping criterion of the BPCD algorithm (see Alg. 5).
1290
+ Stopping criterion.
1291
+ The algorithm is stopped when the solution is sufficiently close to the vertices of the
1292
+ capped-simplex, more precisely, when:
1293
+
1294
+ j
1295
+ |γj − ˜γj| < δ,
1296
+ (31)
1297
+ with ˜γj = sign(γj − 0.5) the rounded version of γj, and where δ was set to 10−10.
1298
+ Note.
1299
+ For a better coordination with the path following algorithm, the stopping criterion presented in the
1300
+ BPCD algorithm Shi et al. (2014) was changed to an absolute criterion on the loss change at the last iteration
1301
+ (see Algorithm 5).
1302
+ 21
1303
+
1304
+ References.
1305
+ The above path-following algorithm was developed in Zaslavskiy et al. (2009) to solve a
1306
+ graph-matching problem. Here we have used a slightly simpler version than the one detailed in the paper.
1307
+ B.5
1308
+ Normalization
1309
+ To limit the scaling of the inverse stepsize Lw with s (in algorithms 2 and 3), it is useful to normalize the
1310
+ bilinear product w⊤Ciγγγ by an appropriately chosen constant κ which we set to s for reasons now explained.
1311
+ It is a classical result that a proximal step with any constant L larger than the Lipschitz constant of the
1312
+ gradient of the function produces a valid update. In other words, any step-size of the form 1
1313
+ L where L is
1314
+ larger than the Lipschitz constant is a valid stepsize. To obtain stepsizes that have a reasonable scaling with
1315
+ respect to different hyperparameters such as s or d, it can be useful to normalize the data or the loss function
1316
+ such that the Lipschitz constant of the gradient is controlled.
1317
+ In this section, we thus bound
1318
+ �����
1319
+ ∂2h
1320
+ ∂w2
1321
+ j
1322
+ �����
1323
+ 2
1324
+ and use the fact that any continuous function with bounded
1325
+ derivative is also Lipschitz continuous. More precisely, the Lipschitz constant equals 2M, M being the bound
1326
+ on the derivative.
1327
+ The bound on
1328
+ �����
1329
+ ∂2h
1330
+ ∂w2
1331
+ j
1332
+ �����
1333
+ 2
1334
+ , where we introduce the normalization factor κ to determine, is calculated as
1335
+ follows:
1336
+ ∂2h
1337
+ ∂w2
1338
+ j
1339
+ = 1
1340
+ n
1341
+ n
1342
+
1343
+ i=1
1344
+ ∂2σ
1345
+ ∂z2
1346
+ i
1347
+
1348
+ ∂zi
1349
+ ∂wj
1350
+ �2
1351
+ , with zi = w⊤Ciγγγ
1352
+ κ
1353
+ + b .
1354
+ (32)
1355
+ Using the fact that γγγ lies in [0, 1]d, that |Ci
1356
+ jk| ≤ 1, ∀i, j, k and that �
1357
+ j γj = s, we get:
1358
+
1359
+ ∂zi
1360
+ ∂wj
1361
+ �2
1362
+ =
1363
+ � �
1364
+ k Ci
1365
+ jkγk
1366
+ κ
1367
+ �2
1368
+
1369
+
1370
+ ∥γγγ∥1
1371
+ κ
1372
+ �2
1373
+
1374
+
1375
+ s
1376
+ κ
1377
+ �2
1378
+ .
1379
+ (33)
1380
+ For reasons now obvious, if we set κ to s, and combine the previous equations, using the fact that the
1381
+ second derivative of the sigmoid function is bounded by Msig =
1382
+ 1
1383
+ 6
1384
+
1385
+ 3 we get:
1386
+ �����
1387
+ ∂2h
1388
+ ∂w2
1389
+ j
1390
+ �����
1391
+ 2
1392
+ < Msig.
1393
+ (34)
1394
+ C
1395
+ Classifiers
1396
+ In this section, we describe the implementation of all classifiers used in the results section. Each classifier
1397
+ implemented the "balanced" class-weight setting: each observation is re-weighted, such that the weight of
1398
+ each class is equal in the objective.
1399
+ C.1
1400
+ SingleCellNet
1401
+ The code for SingleCellNet was downloaded from the repository at https://github.com/pcahan1/singleCellNet.
1402
+ In our code for the comparison of classifiers, we wrapped the original code into a scikit-learn compatible
1403
+ classifier. In the first section, we detail the steps of the pipeline of SingleCellNet to select informative genes.
1404
+ In the second, we detail the classification algorithm, in the case where the output variable is binary (which is
1405
+ our case).
1406
+ 22
1407
+
1408
+ C.1.1
1409
+ Gene selection
1410
+ The first step of the pipeline consists in down-sampling the expression values to 1500 counts per observation
1411
+ and scaling it up such that the total expression per observation is 10000. Secondly, a log-transformation is
1412
+ applied to the expression data, and each gene is scaled to unit variance and zero mean.
1413
+ Then, a first skimming step is applied: it retains genes which are expressed in more than α1 observations, or
1414
+ for which the average expression among observations where it is expressed (at least α2) is above a threshold
1415
+ µ. After this, the correlation coefficient between the gene expression and the output variable is calculated for
1416
+ each gene, and the nnTopGenes with lowest and highest (signed) correlation coefficients are retained.
1417
+ We use the default values of SingleCellNet, namely α1 = .05, α2 = .001, µ = 2 and nTopGenes = 100.
1418
+ C.1.2
1419
+ Classification algorithm
1420
+ The expression matrix is transformed into a binary nobs × n2
1421
+ TopGenes matrix, where each column encodes
1422
+ the orientation of the corresponding gene pair. The correlation coefficients between each column and the
1423
+ output are calculated and the nTopPairs top columns are retained. We use the default value of nTopPairs = 100.
1424
+ The resulting matrix, supplemented by 100 random observations obtained by shuffling, is used as input to a
1425
+ random forest (implemented with scikit-learn) consisting of 1000 trees, trained to optimized the balanced
1426
+ accuracy. The other parameters of the random forest are set to default values (see Appendix C.2 for a
1427
+ description of the default values).
1428
+ C.2
1429
+ Random Forest
1430
+ The classifier rf was implemented with the scikit-learn library, setting the number of trees to 300 and the
1431
+ class-weight to "balanced". We set the number of trees to 300 after verifying empirically that a larger number
1432
+ of trees wouldn’t produce better solutions. The other hyperparameters were set to default values. Namely,
1433
+ each split minimizes the "Gini" impurity of resulting leaves, each leaf is split until it is pure,
1434
+
1435
+ d randomly
1436
+ chosen variables are considered at each split, and nobs observations are drawn (with repetition) to train each
1437
+ tree.
1438
+ C.3
1439
+ Logistic Regression
1440
+ The classifier lr was implemented with the scikit-learn library, specifying the maximum number of iterations
1441
+ to 10 000, the tolerance to 10−3, choosing the saga solver (Defazio et al., 2014), and setting the class-weight
1442
+ to "balanced". Regularization was not applied if not specified (Note that to achieve zero ℓ2-regularization,
1443
+ one must set the C parameter to a high value).
1444
+ C.4
1445
+ Logistic Regression on ranks
1446
+ A rank-transformation (with average ranking, see Appendix A) was applied to the data prior to the logistic
1447
+ regression classifier detailed above in Appendix C.3.
1448
+ C.5
1449
+ Optirank
1450
+ Implementation. The source code of our implementation of optirank
1451
+ is available on the repository
1452
+ https://github.com/paolamalsot/optirank. The algorithm is detailed in Appendices B.3 and B.4.
1453
+ Note.
1454
+ For the classification tasks on real datasets (in Section 6), lr was used to refit w and b with frozen
1455
+ γγγ. The goal is to prevent the incompatible stopping criteria between lr and optirank to interfere with the
1456
+ comparison between both classifiers.
1457
+ Balanced setting. As all the other classifiers, optirank
1458
+ was trained with data points reweighted
1459
+ inversely proportionally to the size of each class, to balance the classes.
1460
+ 23
1461
+
1462
+ C.6
1463
+ ANrank-lr
1464
+ The classifier is similar to rank-lr (detailed previously in app. C.4), except that the ranking transformation
1465
+ is applied with a previously chosen ranking reference set. The ranking reference set is chosen with a simple
1466
+ ANOVA that eliminates from the reference set genes whose expression is subject to dataset shift. Note that
1467
+ ANrank-lr uses the auxiliary source dataset only for the ranking reference set selection. For each gene, a
1468
+ two-way ANOVA with factors label and dataset is carried out. We then select as ranking reference the genes
1469
+ which have the smallest F-value corresponding to the marginal effect of dataset - in other words, the ones less
1470
+ susceptible to dataset-shift.
1471
+ D
1472
+ Synthetic example: Supplementals
1473
+ D.1
1474
+ Generation of w, γγγ and b
1475
+ In this section, we describe the generation of parameters w, γγγ and b for the simulation of the task described
1476
+ in Section 5.
1477
+ Let us first recall from equation 9 that the label of each sample follows a simple logistic model on the
1478
+ ranks within the stable genes:
1479
+ P(Y = 1|X = xi) = σ(w⊤ri + b)
1480
+ with
1481
+ wj = 0 ∀j /∈ S, Γ = S.
1482
+ (35)
1483
+ = σ(w⊤Ciγγγ + b).
1484
+ (36)
1485
+ In practice, once w, γγγ and b are generated, it suffices to draw the label from a Bernoulli distribution
1486
+ whose probability of success is given by the above equation.
1487
+ Simulation procedure.
1488
+ First, the design matrix X is generated following the model detailed in Section 5.
1489
+ From the synthetic model, γγγ is fixed to γγγi = 1 ∀i ∈ S, 0 otherwise. A non-scaled version of w is sampled as:
1490
+ wi ∼ (−1)sgn(N(0, 1) + 1), with sgn ∼ B(0.5). b is then adjusted to ensure that the labels generated are
1491
+ balanced (i.e. that the average of the probability of generating a positive class is 0.5 across observations).
1492
+ Next, w and b are scaled by the same factor to control the noise of the generated data. The noise is such
1493
+ that in expectation, the balanced accuracy between the most probable label and the label drawn is 98 %.
1494
+ D.2
1495
+ Classifiers comparison
1496
+ Simulation parameters.
1497
+ The default parameters for the simulation task were set to: d = 50, dP = 40,
1498
+ n = 1000, τ = 0.2, and σ = 0.05. Figures 2 and 3 indicate the score for varying values of simulation
1499
+ parameters (d ∈ {50, 100, 150, 200}, dP ∈ {0, 10, 20, 30, 35, 40}, and τ ∈ {0, 0.125, 0.25, 0.375, 0.5}). Each
1500
+ simulation experiment was repeated 4 times, resulting in the error-bars displayed on the figures.
1501
+ Note.
1502
+ In the experiment with increasing values for d, we also increased the size of the training set n to
1503
+ keep the ratio n/d constant.
1504
+ Cross-validation.
1505
+ The generated dataset was split in a stratified fashion, keeping 30% for the test. Each
1506
+ classifier was trained and tuned with 5-fold internal cross-validation on the train set.
1507
+ Hyperparameter selection.
1508
+ The parameter grid for classifiers lr and rank-lr consisted in 5 log-spaced
1509
+ values for the ℓ2 regularization (0, 0.0001, 0.001, 0.01, 0.1), corresponding to the parameter λ2 in Ω(w) (see
1510
+ section 4). In addition, the grid for optirank included 5 values for the hyperparameter s/d (0.2, 0.4, 0.6, 0.8, 1).
1511
+ The hyperparameter λ1 was set to 0. For each classifier, we selected the model with highest validation
1512
+ balanced accuracy.
1513
+ 24
1514
+
1515
+ D.3
1516
+ Supplementary figures
1517
+ D.3.1
1518
+ Simulation results for varying τ
1519
+ Motivation.
1520
+ We investigated how the outcome of the comparison between the competing classifiers (lr,
1521
+ rank-lr and optirank) is affected by the simulation parameter τ. τ defines the magnitude of the coordinated
1522
+ shift of the perturbed genes in P from one observation to the other.
1523
+ Results.
1524
+ Figure 3 shows that the superiority of optirank over rank-lr and lr is maintained throughout
1525
+ the simulation parameter range that we explored.
1526
+ 0.0
1527
+ 0.1
1528
+ 0.2
1529
+ 0.3
1530
+ 0.4
1531
+ 0.5
1532
+ 0.75
1533
+ 0.80
1534
+ 0.85
1535
+ 0.90
1536
+ 0.95
1537
+ test balanced accuracy (%)
1538
+ lr
1539
+ rank-lr
1540
+ optirank
1541
+ Figure 3: Dependence of test-accuracy with respect to the simulation parameter τ. Default simulation
1542
+ parameters were set to d = 50, dP = 40, n = 1000, and σ = 0.05.
1543
+ D.3.2
1544
+ Overlap between the true γ and the one fitted by optirank
1545
+ 25
1546
+
1547
+ 50
1548
+ 75
1549
+ 100
1550
+ 125
1551
+ 150
1552
+ 175
1553
+ 200
1554
+ d
1555
+ 0.0
1556
+ 0.2
1557
+ 0.4
1558
+ 0.6
1559
+ 0.8
1560
+ 1.0
1561
+ overlap
1562
+ 0
1563
+ 10
1564
+ 20
1565
+ 30
1566
+ 40
1567
+ dP
1568
+ 0.0
1569
+ 0.2
1570
+ 0.4
1571
+ 0.6
1572
+ 0.8
1573
+ 1.0
1574
+ overlap
1575
+ Figure 4: Cosine similarity CS between the true γ and the one fitted by optirank, as a function of the
1576
+ dimension d and the number of perturbed genes dP . The shaded area shows the standard error across runs.
1577
+ Default simulation parameters were set to d = 50, dP = 40, n = 1000, τ = 0.2, and σ = 0.05.
1578
+ 26
1579
+
1580
+ E
1581
+ Results on real data
1582
+ E.1
1583
+ Datasets
1584
+ In this section we detail the data sources and the selection of examples used for each of the classification
1585
+ tasks.
1586
+ TCGA.
1587
+ The public count-table for the RNA-Seq data (with dbGab accession number phs000178.v10.p8) and
1588
+ the metadata was downloaded from the GDC data portal (https://portal.gdc.cancer.gov). We selected
1589
+ primary tumors with RNA-Seq data, with disease type in (’Adenomas and Adenocarcinomas’, ’Squamous
1590
+ Cell Neoplasms’, ’Cystic, Mucinous and Serous Neoplasms’, ’Ductal and Lobular Neoplasms’) and tissue
1591
+ of primary in (’Breast’,’Bronchus and lung’,’Esophagus’,’Stomach’,’Colon’,’Stomach’,’Pancreas’,’Rectum’,
1592
+ ’Rectosigmoid junction’, ’Prostate’). The label for the classification task was taken from the tissue of primary,
1593
+ by agglomerating "Colon", "Rectum" and "Rectosigmoid junction" in one class called "Colorectal".
1594
+ Note.
1595
+ In the task TCGA-PCAWG-met500, we ensured the binary problems One-vs-Rest involved a positive
1596
+ class present in the auxiliary source dataset PCAWG. For this reason, we had to remove the binary problems
1597
+ "Bronchus and lung" VS Rest and "Prostate" VS Rest.
1598
+ PCAWG.
1599
+ The PCAWG dataset comprises among other the TCGA dataset. Care was taken to exclude
1600
+ instances from the PCAWG that belong to the TCGA dataset during the selection of examples. The RNA-
1601
+ Seq data was downloaded from https://dcc.icgc.org/releases/PCAWG/transcriptome/transcript_
1602
+ expression and the metadata from https://dcc.icgc.org/releases/PCAWG/transcriptome/metadata.
1603
+ The same disease types and tissues of primary as in TCGA were selected, the class labels were processed in
1604
+ the same way.
1605
+ BRCA.
1606
+ The mutation status of the BRCA1 and BRCA2 genes for the examples selected in the TCGA
1607
+ was obtained on the GDC data portal, and aggregated into one binary class label indicating the presence of
1608
+ at least one mutation among BRCA1 and BRCA2. We selected instances whose tissue of primary was the
1609
+ Breast. The expression data is the same as the one in the TCGA.
1610
+ met-500.
1611
+ The expression data and the metadata was downloaded from https://xenabrowser.net/
1612
+ datapages/?cohort=MET500%20(expression%20centric). Only metastatic tumors were selected, of the
1613
+ same primary tissue as in the TCGA. The class-label was generated with the tissue of primary.
1614
+ Single-Cell datasets: Baron, Murano, Segerstolpe, MWS, TM10x, TMfacs
1615
+ The datasets were
1616
+ downloaded from https://github.com/pcahan1/singleCellNet#trainsets. For each task consisting of a
1617
+ pair/triplet of datasets, only common genes and common cell types were selected. Here is a short description
1618
+ per dataset:
1619
+ Murano. Adult human pancreatic cells, sequenced with CEL-Seq2 (2120 cells)
1620
+ Baron. Adult human pancreatic cells, sequenced with inDrop (8596 cells)
1621
+ Segerstolpe. Adult human pancreatic cells, sequenced with Smart-Seq2 (2209 cells)
1622
+ MWS. Adult mouse cells, across 125 cell types, sequenced with Microwell-seq (6477 cells)
1623
+ TM10x. Adult mouse cells, across 32 cell types, sequenced by 10x (1599 cells)
1624
+ TMfacs. Adult mouse cells across 69 cell types, sequenced by smartseq2 (3182 cells)
1625
+ 27
1626
+
1627
+ E.2
1628
+ Pre-processing
1629
+ All datasets were pre-processed with the pre-processing pipeline of SingleCellNet, detailed in Appendix C.1.1.
1630
+ E.3
1631
+ Cross-validation splits
1632
+ In this appendix, we detail, per experiment and for each classification task, which dataset(s) and which
1633
+ training-testing scheme were used. All splits were realized in a stratified fashion.
1634
+ E.3.1
1635
+ Cross-validation splits for the tasks of section 6.1.
1636
+ TCGA.
1637
+ 10% of the TCGA dataset was held out as a test set. The remaining 90% was used for 5-fold
1638
+ internal cross-validation.
1639
+ PCAWG.
1640
+ The same training set and cross-validation splits as in TCGA were used. The PCAWG dataset
1641
+ was used as a test set.
1642
+ met-500.
1643
+ The same training set and cross-validation splits as in TCGA were used. The met-500 dataset
1644
+ was used as a test set.
1645
+ BRCA.
1646
+ The dataset was split in four equal parts (each containing the same percentage of BRCA1 and
1647
+ BRCA2 mutated instances). A nested-cross validation scheme was applied in which for every possible
1648
+ combination, 2 parts are used for training, the third for validation, and the fourth for testing.
1649
+ Cell-typing single-cell data.
1650
+ For each task called X-Y (for instance Baron-Murano), dataset X was used
1651
+ as a training set and dataset Y as a test set. The training data was generated by randomly picking (maximum)
1652
+ 100 cells for each cell type. The rest of the training data is used for validation. This process is done 5 times.
1653
+ The test dataset is used as a whole.
1654
+ E.3.2
1655
+ Cross-validation splits for the tasks of section 6.2 in the multi-source and single-source
1656
+ scenario
1657
+ We now describe the cross-validation splits in the tasks involving three datasets: one main source dataset,
1658
+ a auxiliary source dataset and a target dataset. These tasks are named with the pattern X-Y-Z, where X
1659
+ is the main source dataset, Y the auxiliary source dataset and Z the target dataset (for instance TCGA-
1660
+ PCAWG-met500). we distinguish two training scenarios: the multi-source and single-source scenarios. In the
1661
+ multi-source scenario, datasets X and Y are merged, both in the train and validation splits.
1662
+ In the single-source scenario dataset Y is not used (except by ANrank-lr which uses dataset Y in its entirety,
1663
+ for the sole purpose of selecting the reference genes during the training phase). Indeed, in the single-source
1664
+ scenario, ANrank-lr does not use dataset Y for fitting the coefficients of the logistic regression nor for
1665
+ validation.
1666
+ TCGA-PCAWG-met500.
1667
+ We used 5-fold cross-validation to divide the TCGA and PCAWG datasets
1668
+ into train/validation splits, for each dataset separately. In the single-source scenario, only the TCGA is
1669
+ used. In the multi-source scenario, we compose each train and validation split by doing the union of the
1670
+ corresponding splits in the TCGA and PCAWG cross-validation splits.
1671
+ Cell-typing single-cell data.
1672
+ In the single-source setting, we pick randomly from dataset X 100 cells
1673
+ for each cell-type, the rest of dataset X goes in the validation split. We repeat this 5 times to generate 5
1674
+ validation folds. ANrank-lr uses a small(er) version of dataset Y, which comprise 100 cells for each cell-type.
1675
+ In the multi-source scenario, we took care not to augment the size of the training set. To achieve this, we
1676
+ used the same CV splits as in the single-source setting, except that we downsampled to 50 the number of
1677
+ 28
1678
+
1679
+ examples from dataset X for each cell-type, to which we added 50 examples of dataset Y for each cell-type.
1680
+ We added to the validation splits generated in the single-source setting the portion of dataset Y which was
1681
+ not used in the training set.
1682
+ E.4
1683
+ Hyperparameter grid
1684
+ In table 5, we list the hyperparameters tuned for each classifier, and the corresponding values which were
1685
+ tried in the parameter grid.
1686
+ Classifier
1687
+ Parameter Name
1688
+ Values
1689
+ optirank
1690
+ λ1
1691
+ {0, 0.0001, 0.001, 0.01, 0.1}
1692
+ λ2
1693
+ {0, 0.0001, 0.001, 0.01, 0.1}
1694
+ s/d
1695
+ {0.005, 0.01, 0.02, 0.05, 0.1, 0.2, 0.4, 0.6, 0.8, 1.0}
1696
+ ANrank-lr
1697
+ λ1
1698
+ {0, 0.0001, 0.001, 0.01, 0.1}
1699
+ λ2
1700
+ {0, 0.0001, 0.001, 0.01, 0.1}
1701
+ s/d
1702
+ {0.005, 0.01, 0.02, 0.05, 0.1, 0.2, 0.4, 0.6, 0.8, 1.0}
1703
+ lr
1704
+ λ1
1705
+ {0, 0.0001, 0.001, 0.01, 0.1)
1706
+ λ2
1707
+ {0, 0.0001, 0.001, 0.01, 0.1}
1708
+ rank-lr
1709
+ λ1
1710
+ {0, 0.0001, 0.001, 0.01, 0.1}
1711
+ λ2
1712
+ {0, 0.0001, 0.001, 0.01, 0.1}
1713
+ rf
1714
+ -
1715
+ -
1716
+ SCN
1717
+ -
1718
+ -
1719
+ Table 5: Hyperparameters for classifiers in Section 6.1.4. Note that the dimension d is 1000 for all classifiers.
1720
+ Note that in the scikit-learn implementation of the logistic regression, the elastic net regularization is
1721
+ prescribed by the parameters C and ℓ1_ratio. Therefore, these parameters were set according to the values
1722
+ of λ1 and λ2.
1723
+ E.5
1724
+ Comparison between classifiers
1725
+ Scoring function: Balanced Accuracy.
1726
+ The balanced accuracy scoring function was used as a a scoring
1727
+ metric both for hyperparameter selection and for model evaluation.
1728
+ The balanced accuracy equals the average of sensitivity (true positive rate) and specificity (true negative
1729
+ rate), and is defined as such:
1730
+ balanced accuracy = 1/2
1731
+
1732
+ TP
1733
+ TP + FN +
1734
+ TN
1735
+ TN + FP
1736
+
1737
+ ,
1738
+ (37)
1739
+ where TP stands for the number of true positives, FN for the false negatives, etc..
1740
+ Note that in a balanced setting, the above formula reduces to the conventional accuracy. By contrast, in
1741
+ an unbalanced setting, a classifier which predicts all the time the predominant class will achieve a score of 1/2.
1742
+ E.5.1
1743
+ Hyperparameter selection and model evaluation
1744
+ In this subsection, we describe how hyperparameters were chosen and how the resulting model was evaluated
1745
+ and compared to its competitors.
1746
+ Each multi-class classification task was separated in nclasses One-VS-Rest binary classification tasks, the
1747
+ binary classification tasks were left as is. Each classifier was trained for each parameter combination, in
1748
+ each binary problem, for each (internal) training split, and tested in the corresponding validation set and
1749
+ on the test set. In each binary task, for every test set (there is a unique one apart in the task BRCA), we
1750
+ 29
1751
+
1752
+ selected the hyperparameters with the one-standard-error rule applied to the balanced accuracy averaged
1753
+ over validation splits. More precisely, we selected the sparsest model whose averaged balanced accuracy was
1754
+ within one standard error of the highest averaged balanced accuracy. We did not refit each classifier with the
1755
+ optimal hyper-parameter combination on the whole training set. Instead, for computational reasons, we kept
1756
+ as many models as the number of validation splits, and, as a result, the test-score, as displayed in table 6.1.4,
1757
+ was calculated with the average test score among those classifiers.
1758
+ E.5.2
1759
+ Pairwise comparisons
1760
+ The following section details how each pair of classifier was compared, in order to determine if one performs
1761
+ significantly better than the other. In order to do so, we performed the comparison per dataset. We computed
1762
+ the difference in balanced accuracy between the two classifiers for each validation fold and each binary
1763
+ classification task (in such a way that no average is involved). Every one of those differences was accumulated
1764
+ as an independent observation, and a paired Student’s t-test was used to determine, based on the differences,
1765
+ if one classifier outperformed the other on the dataset at hand. (We used a two-sided test with a significance
1766
+ level of 5 %).
1767
+ Table 6 through 19 show the result of the pairwise comparisons in each task. On the lower left part of
1768
+ each table, the sign at position (i,j) indicates if the classifier corresponding to row i is significantly better (+)
1769
+ or worse (-) than the classifier in column j. The percentages in the upper-right part indicate the fraction
1770
+ of instances where classifier i performed better than classifier j. In addition, whenever this percentage is
1771
+ associated with the algorithm on line i significantly outperforming the algorithm in column j the number is
1772
+ highlighted in bold green, and conversely, if this number correspond to a case where the algorithm on row i
1773
+ performs significantly worse then algorithm in column j, it is highlighted in red italic.
1774
+ E.5.3
1775
+ Pairwise comparisons for the classification tasks of section 6.1
1776
+ Table 6: Pairwise comparisons for the task BRCA
1777
+ optirank
1778
+ SCN
1779
+ rank-lr
1780
+ lr
1781
+ rf
1782
+ optirank
1783
+ 50
1784
+ 83
1785
+ 67
1786
+ 50
1787
+ SCN
1788
+ 75
1789
+ 92
1790
+ 58
1791
+ rank-lr
1792
+ +
1793
+ 75
1794
+ 17
1795
+ lr
1796
+ +
1797
+ +
1798
+ 8
1799
+ rf
1800
+ -
1801
+ -
1802
+ Table 7: Pairwise comparisons for the task TCGA
1803
+ optirank
1804
+ SCN
1805
+ rank-lr
1806
+ lr
1807
+ rf
1808
+ optirank
1809
+ 0
1810
+ 40
1811
+ 44
1812
+ 0
1813
+ SCN
1814
+ -
1815
+ 96
1816
+ 96
1817
+ 72
1818
+ rank-lr
1819
+ +
1820
+ 24
1821
+ 0
1822
+ lr
1823
+ +
1824
+ 0
1825
+ rf
1826
+ -
1827
+ +
1828
+ -
1829
+ -
1830
+ 30
1831
+
1832
+ Table 8: Pairwise comparisons for the task PCAWG
1833
+ optirank
1834
+ SCN
1835
+ rank-lr
1836
+ lr
1837
+ rf
1838
+ optirank
1839
+ 44
1840
+ 40
1841
+ 32
1842
+ 20
1843
+ SCN
1844
+ 52
1845
+ 40
1846
+ 0
1847
+ rank-lr
1848
+ 36
1849
+ 20
1850
+ lr
1851
+ 16
1852
+ rf
1853
+ -
1854
+ -
1855
+ -
1856
+ -
1857
+ Table 9: Pairwise comparisons for the task met-500
1858
+ optirank
1859
+ SCN
1860
+ rank-lr
1861
+ lr
1862
+ rf
1863
+ optirank
1864
+ 24
1865
+ 40
1866
+ 36
1867
+ 24
1868
+ SCN
1869
+ -
1870
+ 72
1871
+ 56
1872
+ 12
1873
+ rank-lr
1874
+ +
1875
+ 24
1876
+ 4
1877
+ lr
1878
+ -
1879
+ +
1880
+ 20
1881
+ rf
1882
+ -
1883
+ -
1884
+ -
1885
+ -
1886
+ Table 10: Pairwise comparisons for the task Baron-Murano
1887
+ optirank
1888
+ SCN
1889
+ rank-lr
1890
+ lr
1891
+ rf
1892
+ optirank
1893
+ 15
1894
+ 62
1895
+ 18
1896
+ 25
1897
+ SCN
1898
+ -
1899
+ 85
1900
+ 62
1901
+ 25
1902
+ rank-lr
1903
+ +
1904
+ 12
1905
+ 25
1906
+ lr
1907
+ -
1908
+ -
1909
+ 22
1910
+ rf
1911
+ -
1912
+ -
1913
+ -
1914
+ -
1915
+ Table 11: Pairwise comparisons for the task Baron-Segerstolpe
1916
+ optirank
1917
+ SCN
1918
+ rank-lr
1919
+ lr
1920
+ rf
1921
+ optirank
1922
+ 29
1923
+ 49
1924
+ 24
1925
+ 0
1926
+ SCN
1927
+ 62
1928
+ 58
1929
+ 7
1930
+ rank-lr
1931
+ 27
1932
+ 2
1933
+ lr
1934
+ 0
1935
+ rf
1936
+ -
1937
+ -
1938
+ -
1939
+ -
1940
+ Table 12: Pairwise comparisons for the task MWS-TM10x
1941
+ optirank
1942
+ SCN
1943
+ rank-lr
1944
+ lr
1945
+ rf
1946
+ optirank
1947
+ 19
1948
+ 49
1949
+ 60
1950
+ 7
1951
+ SCN
1952
+ -
1953
+ 76
1954
+ 84
1955
+ 7
1956
+ rank-lr
1957
+ +
1958
+ 56
1959
+ 7
1960
+ lr
1961
+ +
1962
+ 0
1963
+ rf
1964
+ -
1965
+ -
1966
+ -
1967
+ -
1968
+ 31
1969
+
1970
+ Table 13: Pairwise comparisons for the task MWS-TMfacs
1971
+ optirank
1972
+ SCN
1973
+ rank-lr
1974
+ lr
1975
+ rf
1976
+ optirank
1977
+ 14
1978
+ 39
1979
+ 32
1980
+ 8
1981
+ SCN
1982
+ -
1983
+ 84
1984
+ 88
1985
+ 7
1986
+ rank-lr
1987
+ +
1988
+ 33
1989
+ 6
1990
+ lr
1991
+ +
1992
+ 5
1993
+ rf
1994
+ -
1995
+ -
1996
+ -
1997
+ -
1998
+ Table 14: Pairwise comparisons for the task TM10x-MWS
1999
+ optirank
2000
+ SCN
2001
+ rank-lr
2002
+ lr
2003
+ rf
2004
+ optirank
2005
+ 20
2006
+ 47
2007
+ 77
2008
+ 16
2009
+ SCN
2010
+ -
2011
+ 81
2012
+ 86
2013
+ 30
2014
+ rank-lr
2015
+ -
2016
+ +
2017
+ 70
2018
+ 13
2019
+ lr
2020
+ +
2021
+ +
2022
+ +
2023
+ 14
2024
+ rf
2025
+ -
2026
+ -
2027
+ -
2028
+ -
2029
+ Table 15: Pairwise comparisons for the task TM10x-TMfacs
2030
+ optirank
2031
+ SCN
2032
+ rank-lr
2033
+ lr
2034
+ rf
2035
+ optirank
2036
+ 7
2037
+ 53
2038
+ 50
2039
+ 4
2040
+ SCN
2041
+ -
2042
+ 96
2043
+ 89
2044
+ 10
2045
+ rank-lr
2046
+ +
2047
+ 45
2048
+ 1
2049
+ lr
2050
+ -
2051
+ +
2052
+ -
2053
+ 7
2054
+ rf
2055
+ -
2056
+ -
2057
+ -
2058
+ -
2059
+ Table 16: Pairwise comparisons for the task TMfacs-MWS
2060
+ optirank
2061
+ SCN
2062
+ rank-lr
2063
+ lr
2064
+ rf
2065
+ optirank
2066
+ 18
2067
+ 55
2068
+ 78
2069
+ 19
2070
+ SCN
2071
+ -
2072
+ 80
2073
+ 88
2074
+ 29
2075
+ rank-lr
2076
+ +
2077
+ +
2078
+ 71
2079
+ 11
2080
+ lr
2081
+ +
2082
+ +
2083
+ +
2084
+ 12
2085
+ rf
2086
+ -
2087
+ -
2088
+ -
2089
+ -
2090
+ 32
2091
+
2092
+ E.5.4
2093
+ Pairwise comparisons for the classification tasks of section 6.2, in the single-source
2094
+ scenario
2095
+ Table 17: Pairwise comparisons for the task Baron-Segerstolpe-Murano
2096
+ optirank
2097
+ ANrank-lr
2098
+ SCN
2099
+ rank-lr
2100
+ lr
2101
+ rf
2102
+ optirank
2103
+ 28
2104
+ 12
2105
+ 50
2106
+ 15
2107
+ 22
2108
+ ANrank-lr
2109
+ 38
2110
+ 78
2111
+ 50
2112
+ 25
2113
+ SCN
2114
+ -
2115
+ -
2116
+ 90
2117
+ 60
2118
+ 25
2119
+ rank-lr
2120
+ +
2121
+ 2
2122
+ 22
2123
+ lr
2124
+ -
2125
+ -
2126
+ -
2127
+ 20
2128
+ rf
2129
+ -
2130
+ -
2131
+ -
2132
+ -
2133
+ -
2134
+ Table 18: Pairwise comparisons for the task MWS-TMfacs-TM10x
2135
+ optirank
2136
+ ANrank-lr
2137
+ SCN
2138
+ rank-lr
2139
+ lr
2140
+ rf
2141
+ optirank
2142
+ 33
2143
+ 20
2144
+ 32
2145
+ 47
2146
+ 8
2147
+ ANrank-lr
2148
+ 32
2149
+ 63
2150
+ 53
2151
+ 8
2152
+ SCN
2153
+ -
2154
+ -
2155
+ 73
2156
+ 72
2157
+ 8
2158
+ rank-lr
2159
+ -
2160
+ +
2161
+ 50
2162
+ 8
2163
+ lr
2164
+ +
2165
+ 10
2166
+ rf
2167
+ -
2168
+ -
2169
+ -
2170
+ -
2171
+ -
2172
+ Table 19: Pairwise comparisons for the task TCGA-PCAWG-met500
2173
+ optirank
2174
+ ANrank-lr
2175
+ SCN
2176
+ rank-lr
2177
+ lr
2178
+ rf
2179
+ optirank
2180
+ 52
2181
+ 12
2182
+ 40
2183
+ 24
2184
+ 12
2185
+ ANrank-lr
2186
+ 4
2187
+ 12
2188
+ 8
2189
+ 8
2190
+ SCN
2191
+ -
2192
+ -
2193
+ 72
2194
+ 68
2195
+ 16
2196
+ rank-lr
2197
+ +
2198
+ 32
2199
+ 12
2200
+ lr
2201
+ -
2202
+ -
2203
+ +
2204
+ 16
2205
+ rf
2206
+ -
2207
+ -
2208
+ -
2209
+ -
2210
+ -
2211
+ 33
2212
+
2213
+ E.5.5
2214
+ Pairwise comparisons for the classification tasks of section 6.2, in the multi-source
2215
+ scenario
2216
+ Table 20: Pairwise comparisons for the task Baron-Segerstolpe-Murano
2217
+ optirank
2218
+ ANrank-lr
2219
+ SCN
2220
+ rank-lr
2221
+ lr
2222
+ rf
2223
+ optirank
2224
+ 28
2225
+ 0
2226
+ 45
2227
+ 10
2228
+ 10
2229
+ ANrank-lr
2230
+ 5
2231
+ 62
2232
+ 38
2233
+ 10
2234
+ SCN
2235
+ -
2236
+ -
2237
+ 98
2238
+ 78
2239
+ 20
2240
+ rank-lr
2241
+ +
2242
+ +
2243
+ 22
2244
+ 12
2245
+ lr
2246
+ -
2247
+ -
2248
+ +
2249
+ -
2250
+ 12
2251
+ rf
2252
+ -
2253
+ -
2254
+ -
2255
+ -
2256
+ -
2257
+ Table 21: Pairwise comparisons for the task MWS-TMfacs-TM10x
2258
+ optirank
2259
+ ANrank-lr
2260
+ SCN
2261
+ rank-lr
2262
+ lr
2263
+ rf
2264
+ optirank
2265
+ 43
2266
+ 18
2267
+ 55
2268
+ 22
2269
+ 5
2270
+ ANrank-lr
2271
+ 15
2272
+ 58
2273
+ 27
2274
+ 7
2275
+ SCN
2276
+ -
2277
+ -
2278
+ 83
2279
+ 85
2280
+ 15
2281
+ rank-lr
2282
+ +
2283
+ 20
2284
+ 3
2285
+ lr
2286
+ -
2287
+ -
2288
+ +
2289
+ -
2290
+ 8
2291
+ rf
2292
+ -
2293
+ -
2294
+ -
2295
+ -
2296
+ -
2297
+ Table 22: Pairwise comparisons for the task TCGA-PCAWG-met500
2298
+ optirank
2299
+ ANrank-lr
2300
+ SCN
2301
+ rank-lr
2302
+ lr
2303
+ rf
2304
+ optirank
2305
+ 68
2306
+ 36
2307
+ 56
2308
+ 80
2309
+ 48
2310
+ ANrank-lr
2311
+ +
2312
+ 20
2313
+ 36
2314
+ 28
2315
+ 12
2316
+ SCN
2317
+ -
2318
+ 56
2319
+ 56
2320
+ 16
2321
+ rank-lr
2322
+ +
2323
+ -
2324
+ 56
2325
+ 20
2326
+ lr
2327
+ +
2328
+ +
2329
+ +
2330
+ 20
2331
+ rf
2332
+ -
2333
+ -
2334
+ -
2335
+ -
2336
+ 34
2337
+
2338
+ E.5.6
2339
+ Comparisons in terms of sparsity
2340
+ In Section 6.1.4, we highlighted the fact that optirank, compared to rank-lr has the added beneficial
2341
+ potential to produce sparse solutions. In fact, by definition, rank-lr necessitates to know the value of all
2342
+ genes to perform the ranking.
2343
+ However, it was mentioned that on instances where lr performed well, there was no advantage in using
2344
+ optirank, as the solutions of lr are usually sparser than the ones produced by optirank. In the following,
2345
+ we support this claim.
2346
+ As a first investigation, we computed per dataset the average number of genes of the solution found
2347
+ by optirank and lr. Note that for optirank, the effective number of genes is the number of genes which
2348
+ are either in the reference set indicated by γγγ or whose corresponding coefficient wj is non-zero. Table 23
2349
+ summarizes the results and it is clear that lr produces sparser solutions than optirank.
2350
+ sor
2351
+ slr
2352
+ 100 ˆP(sor ≤slr)
2353
+ 100 ˆP(slr ≤sor)
2354
+ BRCA
2355
+ 454
2356
+ 43
2357
+ 8
2358
+ 92
2359
+ TCGA
2360
+ 598
2361
+ 588
2362
+ 24
2363
+ 76
2364
+ PCAWG
2365
+ 598
2366
+ 588
2367
+ 24
2368
+ 76
2369
+ met-500
2370
+ 598
2371
+ 588
2372
+ 24
2373
+ 76
2374
+ Baron-Murano
2375
+ 462
2376
+ 406
2377
+ 57
2378
+ 42
2379
+ Baron-Segerstolpe
2380
+ 511
2381
+ 451
2382
+ 44
2383
+ 67
2384
+ MWS-TM10x
2385
+ 629
2386
+ 365
2387
+ 21
2388
+ 79
2389
+ MWS-TMfacs
2390
+ 666
2391
+ 226
2392
+ 9
2393
+ 91
2394
+ TM10x-MWS
2395
+ 514
2396
+ 242
2397
+ 27
2398
+ 73
2399
+ TM10x-TMfacs
2400
+ 616
2401
+ 305
2402
+ 36
2403
+ 64
2404
+ TMfacs-MWS
2405
+ 530
2406
+ 204
2407
+ 25
2408
+ 75
2409
+ Table 23: Number of genes sor and slr in the solutions produced by optirank and lr (2 outermost left
2410
+ columns), averaged across folds and classes. The third column shows the percentage 100 ˆP(sor ≤ slr) of
2411
+ instances where the solution of optirank is sparser than the solution found by lr. The last column shows
2412
+ the percentage 100 ˆP(slr ≤sor) of instances with the opposite case, i.e where the solution of optirank is less
2413
+ sparse than the solution found by lr.
2414
+ In fact, in the task BRCA, optirank rarely produces a sparser solution, and on other tasks, apart from
2415
+ the task Baron-Murano and TMfacs-MWS, lr produces sparser solutions in a majority of cases. It should
2416
+ be clear however that in all cases where some robustness can be obtained by using a rank representation,
2417
+ the classical rank representation requires to measure all genes and has thus no sparsity whatsoever, while
2418
+ optirank attempts by construction to use a reduced set of genes, and so, even if the level of sparsity obtained
2419
+ is not comparable to that of an lr model the gain in performance might be worth it.
2420
+ E.5.7
2421
+ Comparisons in terms of sparsity in the multi-source scenario
2422
+ We carried the same analysis than in the previous section for the tasks in the multi-source scenario (see Section
2423
+ 6.2). As in previous section, lr produces sparser solutions than optirank and ANrank-lr in a majority of
2424
+ cases. It is worth noting that solutions found by ANrank-lr and optirank require a similar number of genes,
2425
+ with optirank producing slightly sparser solutions.
2426
+ 35
2427
+
2428
+ sor
2429
+ sAr
2430
+ slr
2431
+ 100 ˆP(sor ≤sothers)
2432
+ 100 ˆP(sAr ≤sothers)
2433
+ 100 ˆP(slr ≤sothers)
2434
+ TCGA-PCAWG-met500
2435
+ 844
2436
+ 849
2437
+ 273
2438
+ 20
2439
+ 0
2440
+ 80
2441
+ Baron-Segerstolpe-Murano
2442
+ 606
2443
+ 658
2444
+ 364
2445
+ 12
2446
+ 12
2447
+ 75
2448
+ MWS-TMfacs-TM10x
2449
+ 604
2450
+ 796
2451
+ 300
2452
+ 15
2453
+ 2
2454
+ 83
2455
+ Table 24: Number of genes sor, sAr, and slr in the solutions produced by optirank, ANrank-lr and lr (3
2456
+ outermost left columns), averaged across folds and classes. The last three columns shows the percentage of
2457
+ instances where the solution of the indicated classifier is sparser than the ones found by the other classifiers.
2458
+ E.5.8
2459
+ Supplementary table for single-source scenario
2460
+ ANrank-lr
2461
+ SCN
2462
+ lr
2463
+ optirank
2464
+ rank-lr
2465
+ rf
2466
+ TCGA-PCAWG-met500
2467
+ 80 ± 3 (2)
2468
+ 66 ± 4 (5)
2469
+ 74 ± 4 (4)
2470
+ 81 ± 4 (1)
2471
+ 76 ± 3 (3)
2472
+ 61 ± 4 (6)
2473
+ Baron-Segerstolpe-Murano 93 ± 1 (3) 89.4 ± 1.5 (5) 89.5 ± 2.4 (4) 93.7 ± 1.5 (2) 93.8 ± 1.7 (1) 62 ± 3 (6)
2474
+ MWS-TMfacs-TM10x
2475
+ 82 ± 2 (4)
2476
+ 72 ± 2 (5)
2477
+ 83.3 ± 2.2 (2)
2478
+ 84 ± 2 (1)
2479
+ 83.0 ± 2.4 (3) 53 ± 1 (6)
2480
+ Table 25: Single-source scenario. Average balanced accuracies in % (across folds and classes) of competing
2481
+ classifiers on the tasks detailed in section 6.2 in the case in which the auxiliary source dataset is not used
2482
+ (except for ANrank-lr which uses it for ranking reference genes selection). The integer in parenthesis denotes
2483
+ the rank of the classifiers in terms of average balanced accuracy (lower is better). Classifiers which did not
2484
+ score significantly worse than the best classifier according to a paired Student’s t-test (with a 5% significance
2485
+ level) are highlighted in bold (see Appendix E.5 for additional details).
2486
+ E.5.9
2487
+ Runtime comparisons
2488
+ Table 26 shows the average runtime (in seconds) across validation splits and binary problems of competing
2489
+ classifiers with the hyperparameters set to their optimal values according to the one-standard-error-rule. We
2490
+ applied our comparison on the tasks detailed in 6.2, with classifiers trained in the single-source scenario. The
2491
+ results attest that the fitting time of optirank is reasonable, and on some tasks, it is even lower than the
2492
+ fitting time of its competitors using rank features such as ANrank-lr and rank-lr.
2493
+ ANrank-lr
2494
+ SCN
2495
+ lr
2496
+ optirank
2497
+ rank-lr
2498
+ rf
2499
+ TCGA-PCAWG-met500
2500
+ 135 ± 38
2501
+ 205.6 ± 0.8
2502
+ 140 ± 47
2503
+ 70 ± 4
2504
+ 150 ± 46
2505
+ 8.6 ± 0.5
2506
+ Baron-Segerstolpe-Murano
2507
+ 10 ± 1
2508
+ 50.8 ± 0.1
2509
+ 2.0 ± 0.3
2510
+ 7.7 ± 0.7
2511
+ 3.6 ± 0.3
2512
+ 0.75 ± 0.01
2513
+ MWS-TMfacs-TM10x
2514
+ 8.8 ± 0.5
2515
+ 33.82 ± 0.09
2516
+ 2.5 ± 0.2
2517
+ 16 ± 2
2518
+ 36 ± 9
2519
+ 0.92 ± 0.02
2520
+ Table 26: Runtime estimates. Average runtime (in seconds) across validation splits and binary problems of
2521
+ competing classifiers for the hyperparameter set which was selected as optimal according to the one-standard-
2522
+ error-rule. All classifiers were trained in the single-source scenario.
2523
+ F
2524
+ Computational resources
2525
+ The computational results in this work were produced with an internal computing cluster, in a batched
2526
+ fashion, amounting to a total of 2500 CPU hours. Per batch, the maximal capacity used was 30 GB of RAM
2527
+ with 2 CPUs.
2528
+ 36
2529
+
8tE3T4oBgHgl3EQfqgri/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
BdAzT4oBgHgl3EQfGPtU/content/tmp_files/2301.01024v1.pdf.txt ADDED
@@ -0,0 +1,1039 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ On the homogeneity of SnIa absolute magnitude in the Pantheon+ sample
2
+ Leandros Perivolaropoulos1, ∗ and Foteini Skara1, †
3
+ 1Department of Physics, University of Ioannina, GR-45110, Ioannina, Greece
4
+ (Dated: January 4, 2023)
5
+ We test the homogeneity of the Pantheon+ sample with respect to the intrinsic absolute luminos-
6
+ ity M = mBi − µi of the type Ia supernovae (SnIa) in Cepheid hosts and in the Hubble flow. Here,
7
+ mBi is the corrected/standardized SnIa apparent magnitude and µi is the ith SnIa distance modulus
8
+ obtained either from Cepheids (for SnIa in Cepheid hosts) or from the parametrized Hubble expan-
9
+ sion rate H(z) (for the rest of the SnIa). When M is allowed to take a single value in the context of
10
+ flat ΛCDM cosmological background H(z), we find the expected best fit values M = −19.25 ± 0.03,
11
+ Ω0m = 0.33 ± 0.02, H0 = (73.4 ± 1) km s−1 Mpc−1 consistent with the original analysis of Brout et.
12
+ al. When we introduce a new degree of freedom allowing M to take two values, one (M<) for nearby
13
+ SnIa (distance di < dcrit, µi < 5 log10(dcrit/Mpc)+25) and one (M>) for more distant SnIa, we find
14
+ a 2 − 3σ tension between the two best fit values of M> = −19.215 ± 0.03 and M< = −19.362 ± 0.05
15
+ for dcrit ≃ 20Mpc. However, in contrast to the pure SH0ES data, this degree of freedom does not
16
+ affect significantly the best fit values for the cosmological parameters H0 and Ω0m obtained from
17
+ Pantheon+, for any value of dcrit, due to the dominant effects of the covariance matrix. When M is
18
+ allowed to take distinct values Mi for each SnIa in Cepheid hosts we find using a KS test, that the
19
+ Mi of nearby SnIa (di < 20Mpc) have less than 2.5% probability to have been drawn from the same
20
+ probability distribution as the Mi of more distant SnIa (d > 20Mpc). These results constitute hints
21
+ of inhomogeneities in the Pantheon+ sample which could be due to large statistical fluctuations,
22
+ unaccounted systematic effects or new physics.
23
+ I.
24
+ INTRODUCTION
25
+ The value of the Hubble constant H0 measured by di-
26
+ rect local measurements based mainly on Type Ia super-
27
+ novae (SnIa) standard candles calibrated using distance
28
+ ladder methods is at 5σ tension with the corresponding
29
+ value of H0 measured indirectly using the sound horizon
30
+ at last scattering as a standard ruler. This discrepancy
31
+ constitutes one of the main challenges for the standard
32
+ cosmological model ΛCDM known as the Hubble tension.
33
+ The most precise direct method for measuring the
34
+ Hubble constant is based on observations of SnIa cali-
35
+ brated with Cepheid variable stars in galaxies that host
36
+ both Cepheid variable stars and SnIa. Cepheids in turn
37
+ are calibrated using geometric methods (e.g. parallax) in
38
+ the Milky Way and other nearby anchor galaxies. This is
39
+ the distance ladder method for the direct measurement
40
+ of H0.
41
+ Such a distance ladder approach has been implemented
42
+ recently by the SH0ES team (Supernovae and H0 for
43
+ the Equation of State of dark energy) and has lead to
44
+ a best fit value HR21
45
+ 0
46
+ = 73.04 ± 1.04 km s−1 Mpc−1 [1].
47
+ The corresponding indirect measurement of H0 using the
48
+ sound horizon at recombination as a standard ruler mea-
49
+ sured by the CMB perturbations angular power spec-
50
+ trum under the assumption of the validity of the stan-
51
+ dard cosmological model ΛCDM (inverse distance lad-
52
+ der approach) has lead to an even more precise value of
53
+ HP 18
54
+ 0
55
+ = 67.36 ± 0.54 km s−1 Mpc−1 [2] (see also Refs.
56
+ [3–12] for relevant recent reviews). The 5σ discrepancy
57
58
59
+ (tension) between these two very precise measurements
60
+ of H0 indicates that most probably at least one of them
61
+ is not accurate because the assumptions on which it is
62
+ based are not valid.
63
+ The local direct measurement of SH0ES is consistent
64
+ with a wide range of other less precise local measure-
65
+ ments of H0 using alternative SnIa calibrators [13–16],
66
+ gravitational lensing [17–20], gravitational waves [21–
67
+ 25], gamma-ray bursts as standardizable candles [26–30],
68
+ quasars as distant standard candles [31], type II super-
69
+ novae [32, 33], γ−ray attenuation [34] etc. (for recent
70
+ reviews see Refs. [3, 5]).
71
+ The SH0ES measurement relies on the following as-
72
+ sumptions:
73
+ • The measurements of the properties (period, metal-
74
+ licity) and luminosities of Cepheid calibrators and
75
+ SnIa are accurate and free of unaccounted system-
76
+ atic errors.
77
+ • The modeling and physical laws involved in the cal-
78
+ ibration of Cepheids and SnIa in the three rungs of
79
+ the distance ladder are accurate and well under-
80
+ stood.
81
+ A recent analysis by the authors [35] has indicated
82
+ that a simple variation of the Cepheid/SnIa modeling
83
+ in the SH0ES analysis introducing a single new degree
84
+ of freedom can potentially modify the best fit value of
85
+ H0 in such a way that it may become consistent with
86
+ the corresponding inverse distance ladder measurement.
87
+ This new degree of freedom allows for a transition of the
88
+ SnIa calibrated and corrected intrinsic luminosity (ab-
89
+ solute magnitude M) at some distance or redshift.
90
+ It
91
+ would therefore be interesting to introduce this new de-
92
+ gree of freedom in the new extended Pantheon+ sample
93
+ arXiv:2301.01024v1 [astro-ph.CO] 3 Jan 2023
94
+
95
+ 2
96
+ [36–38] which includes many more SnIa than the local
97
+ SH0ES Cepheid+SnIa sample, to investigate if this de-
98
+ gree of freedom is excited by the data.
99
+ The Pantheon+ SnIa luminosity sample [36–38] pro-
100
+ vides distance moduli derived from 1701 light curves of
101
+ 1550 SnIa in a redshift range z ∈ [0.001, 2.26] compiled
102
+ across 18 different surveys. This sample is significantly
103
+ improved over the first Pantheon sample of 1048 SnIa,
104
+ especially at low redshift (z).
105
+ During the past few months when the Pantheon+ sam-
106
+ ple has been publicly available, a wide range of studies
107
+ have investigated various aspects of it. In particular, the
108
+ following aspects of Pantheon+ have been investigated:
109
+ its consistency with the cosmological principle [39, 40],
110
+ the self-consistency level of its covariance [41], its consis-
111
+ tency with standard electromagnetism and gravity [42],
112
+ the constraints it can provide on modified gravity and
113
+ generalized dark energy [36, 43–46], the constraints it
114
+ can provide on early dark energy [47, 48], the constraints
115
+ it can provide on the start of cosmic acceleration [49],
116
+ the constraints on possible modification of physics at re-
117
+ combination (e.g. electron mass variation) [50], the iden-
118
+ tification of possible change of the best fit value of H0
119
+ when different redshift bins are considered [51, 52], the
120
+ effects of binning on its data [53, 54], its consistency with
121
+ BAO+BBN data [55], the constraints it implies on gen-
122
+ eralization of the Hubble law [56] etc.
123
+ One novel feature of Pantheon+ is that it may be used
124
+ to infer H0 in addition to cosmological parameters. This
125
+ is due to the fact that it includes the distance moduli
126
+ of SnIa in Cepheid hosts as obtained directly from the
127
+ distance ladder analysis of the SH0ES. It also includes
128
+ the covariance of these SnIa with the SnIa in the Hubble
129
+ flow. The estimate of H0 was not possible in the first
130
+ Pantheon sample because of the degeneracy between H0
131
+ and SnIa absolute magnitude M. The inclusion of both
132
+ the apparent magnitude mB and the distance modulus
133
+ from Cepheids µCeph for SnIa in Cepheid hosts allows
134
+ the independent determination of the absolute magnitude
135
+ M = mB − µCeph which breaks the degeneracy between
136
+ M and H0 thus allowing the independent determination
137
+ of H0 through the Pantheon+ sample.
138
+ Due to the new features and data included in the Pan-
139
+ theon+ sample the following questions may be addressed:
140
+ • Is the best fit value of the SnIa absolute magnitude
141
+ M consistent among various subsamples of the Pan-
142
+ theon+ sample?
143
+ • What is the effect of the introduction of new de-
144
+ grees of freedom (e.g. allowing for a change of M)
145
+ on the quality of fit and on the best fit values of H0
146
+ and cosmological parameters (e.g. matter density
147
+ Ω0m)?
148
+ The goal of the present analysis is to address these
149
+ questions focusing on the possible inhomogeneities of
150
+ the standardized/corrected intrinsic luminosity (absolute
151
+ magnitude) of the SnIa of the Pantheon+ sample. Inves-
152
+ tigations of possible inhomogeneities of other properties
153
+ of the SnIa (e.g.
154
+ color or stretch parameters [57]) are
155
+ also interesting but are beyond the scope of the present
156
+ study.
157
+ The structure of this paper is the following: In the
158
+ next section II we describe the data of the Pantheon+
159
+ sample that are relevant for our analysis and describe
160
+ the method used for the fit of the cosmological param-
161
+ eters, the Hubble parameter H0 and the SnIa absolute
162
+ magnitude M. We then implement this method and ob-
163
+ tain the corresponding best fit parameter values for Ω0m,
164
+ H0 and M in the context of a ΛCDM background thus
165
+ confirming the results of the original analysis of Brout et.
166
+ al. [36] and verifying our implementation of the method
167
+ described there. In section III, we generalize the model
168
+ and the fitting method by allowing for a transition of
169
+ the SnIa intrinsic luminosity M at some distance dcrit
170
+ from a value M< at distances d < dcrit to a value M>
171
+ at distances d > dcrit. We find the best fit parameter
172
+ values for Ω0m, H0 M< and M> with their uncertain-
173
+ ties and test the consistency between the best fit values
174
+ of M< and M>. In section IV we discuss the statisti-
175
+ cal properties of the intrinsic luminosities Mi of SnIa in
176
+ Cepheid hosts as obtained from the SnIa apparent mag-
177
+ nitudes mBi and the Cepheid distance moduli µCeph
178
+ i
179
+ . We
180
+ check in particular the consistency of the statistical prop-
181
+ erties of the luminosities among different subsamples of
182
+ the Pantheon+ sample. Finally in Section V we review
183
+ our main results, discuss their implications and point out
184
+ possible future extensions of our analysis.
185
+ II.
186
+ THE STANDARD ANALYSIS OF THE
187
+ PANTHEON+ SAMPLE FOR ΛCDM
188
+ The Pantheon+ sample is presented through a table
189
+ (Pantheon+SH0ES.dat) with 1701 rows (plus a header)
190
+ which includes the data relevant to 1701 SnIa light curves
191
+ in 47 columns which are described at this url. It also con-
192
+ sists of a 1701 × 1701 covariance matrix Cstat+syst which
193
+ represents the covariance between SnIa due to systematic
194
+ and statistical distance moluli uncertainties as described
195
+ below.
196
+ The relevant columns for our analysis are the
197
+ following:
198
+ • Column 3: Hubble Diagram Redshift (with CMB
199
+ and peculiar velocity corrections).
200
+ • Columns 9-10: mB corrected/standardized SnIa
201
+ apparent magnitude and its uncertainty as ob-
202
+ tained from the diagonal of the covariance matrix.
203
+ • Columns
204
+ 11-12:
205
+ µ
206
+ =
207
+ mB − MCeph
208
+ cor-
209
+ rected/standardized distance moduli where the ab-
210
+ solute SnIa magnitude MCeph = −19.253 has been
211
+ determined from SH0ES 2021 Cepheid host dis-
212
+ tances.
213
+ Its uncertainty as obtained from the di-
214
+ agonal of the covariance matrix is included in col-
215
+ umn 12. Column 11 is superfluous as it is trivially
216
+ obtained from column 9 by subtracting MCeph.
217
+
218
+ 3
219
+ • Column 13:
220
+ µCeph corrected/standardized dis-
221
+ tance moduli of the SnIa host as obtained from the
222
+ SH0ES distance ladder analysis [1] in the context of
223
+ the H0 distance ladder measurement. The uncer-
224
+ tainty of µCeph is not included in this Table but it
225
+ is incorporated in the covariance matrix. This col-
226
+ umn has entries only in the rows which correspond
227
+ to SnIa in Cepheid hosts. The rest of the rows have
228
+ an entry ’-9’ in this column.
229
+ • Column 14: Takes the value 1 if the SnIa of the
230
+ row is in Cepheid host and 0 otherwise.
231
+ In this section we follow [36] and use the above de-
232
+ scribed Pantheon+ data to constrain the Hubble param-
233
+ eter H0 = 100 h km s−1 Mpc−1, the SnIa absolute mag-
234
+ nitude M and the matter density parameter Ω0m by min-
235
+ imizing a χ2 likelihood:
236
+ χ2 = ⃗QT · (Cstat+syst)−1 · ⃗Q,
237
+ (2.1)
238
+ where ⃗Q is a vector with dimension 1701 and components
239
+ which are usually defined as
240
+ Qi = mBi − M − µmodel(zi),
241
+ (2.2)
242
+ where mBi − M = µi is the distance molulus of the ith
243
+ SnIa and µmodel(zi) is the corresponding distance modu-
244
+ lus as predicted by the assumed background cosmologi-
245
+ cal model parametrization which in the present analysis
246
+ is assumed to be ΛCDM . Thus we have
247
+ µmodel(zi) = 5 log(dL(zi)/Mpc) + 25,
248
+ (2.3)
249
+ where the luminosity distance dL(z) is
250
+ dL(z) = (1 + z)c
251
+ � z
252
+ 0
253
+ dz′
254
+ H(z′),
255
+ (2.4)
256
+ where c is the speed of light and in a ΛCDM background
257
+ H(z) = H0
258
+
259
+ ΩM(1 + z)3 + ΩΛ.
260
+ (2.5)
261
+ The parameters M and H0 appear in Eqs. (2.1), (2.2)
262
+ only through the combination M ≡ M−5log(H0·Mpc/c)
263
+ and therefore they are degenerate and can not be es-
264
+ timated separately. In order to break this degeneracy,
265
+ M can be estimated separately using the distance lad-
266
+ der approach by calibrating SnIa using Cepheids as was
267
+ done with previous Pantheon sample. In the Pantheon+
268
+ sample this degeneracy is broken within the analysis by
269
+ modifying the definition of (2.2) to include the distance
270
+ moduli of SnIa in Cepheid hosts which can constrain M
271
+ independently. Thus the vector ⃗Q in the likelihood defi-
272
+ nition (2.2) is modified as follows [36]
273
+ Q′
274
+ i =
275
+
276
+ mBi − M − µCeph
277
+ i
278
+ i ∈ Cepheid hosts
279
+ mBi − M − µmodel(zi)
280
+ otherwise,
281
+ (2.6)
282
+ where µCeph
283
+ i
284
+ is the distance modulus of the Cepheid host
285
+ of the ith SnIa which is measured independently in the
286
+ context of the distance ladder with Cepheid calibrators
287
+ [1]. The novel feature of Pantheon+ is that the compo-
288
+ nents Q′
289
+ i that correspond to SnIa in Cepheid hosts are
290
+ now fully incorporated in the sample and correlated with
291
+ the rest of the SnIa though the provided covariance ma-
292
+ trix. Thus, the degeneracy between M and H0 is broken
293
+ and the three parameters M, H0 and Ω0m can be fit in
294
+ the context of a ΛCDM background by minimizing
295
+ χ′2(M, H0, Ω0m) = ⃗Q′T · (Cstat+syst)−1 · ⃗Q′,
296
+ (2.7)
297
+ where Cstat+syst denotes the covariance matrix provided
298
+ with the Pantheon+ data including both statistical and
299
+ systematic uncertainties. We have obtained the best fit
300
+ parameter values for M, H0 and Ω0m and constructed the
301
+ 1σ−3σ likelihood contours by minimizing χ′2 of Eq. (2.7)
302
+ using a simple Mathematica v12 code which is publicly
303
+ available.
304
+ The uncertainties for each one of the three best fit pa-
305
+ rameters were obtained using the square roots of the diag-
306
+ onal elements of the parameter covariance matrix which
307
+ is the inverse of the Fisher matrix defined as
308
+ Fij = 1
309
+ 2
310
+ ∂2χ′2(p1, p2, p3)
311
+ ∂pi∂pj
312
+ ,
313
+ (2.8)
314
+ where i, j = 1, 2, 3 and the parameters p1, p2, p3 corre-
315
+ spond to M, h and Ω0m. We thus find
316
+ M = − 19.25 ± 0.03,
317
+ (2.9)
318
+ h = 0.734 ± 0.01,
319
+ (2.10)
320
+ Ω0m = 0.333 ± 0.018,
321
+ (2.11)
322
+ which is in excellent agreement with the best fit values
323
+ for h and Ω0m reported in [36]. The corresponding pa-
324
+ rameter likelihood contours are the blue contours shown
325
+ in Fig. 1.
326
+ At the minimum we also find χ′2
327
+ min = 1522.98 which
328
+ corresponds to a χ′2 per degree of freedom of about 0.9.
329
+ This is less than 1 and may indicate a possible overesti-
330
+ mation of the uncertainties in the covariance matrix as
331
+ pointed out recently in Ref. [41].
332
+ III.
333
+ GENERALIZED ANALYSIS ALLOWING
334
+ TRANSITION OF SNIA LUMINOSITY.
335
+ In order to test the homogeneity of the calibrated SnIa
336
+ intrinsic luminosity, we now generalize the model of the
337
+ previous section not by allowing more cosmological pa-
338
+ rameters but by allowing a change of the absolute mag-
339
+ nitude at a distance dcrit such that the SnIa absolute
340
+ magnitude is of the form
341
+ M =
342
+
343
+ M<
344
+ d < dcrit
345
+ M>
346
+ d > dcrit,
347
+ (3.1)
348
+
349
+ 4
350
+ M>
351
+ M<
352
+ Mtot
353
+ 0.25
354
+ 0.30
355
+ 0.35
356
+ 0.40
357
+ -19.5
358
+ -19.4
359
+ -19.3
360
+ -19.2
361
+ -19.1
362
+ Ω0 m
363
+ M
364
+ M>
365
+ M<
366
+ Mtot
367
+ 0.70
368
+ 0.72
369
+ 0.74
370
+ 0.76
371
+ 0.78
372
+ 0.80
373
+ h
374
+ Figure 1. Blue contours: The 1−3σ likelihood contours for the parameters M, h and Ω0m in the context of a ΛCDM background.
375
+ Red contours: The 1 − 3σ likelihood contours for the parameters M<, M>, h and Ω0m in the context of a ΛCDM background
376
+ in a model that allows for a transition of the SnIa absolute magnitude from a value M< at distances d < 20Mpc to a value M>
377
+ at distances d > 20Mpc.
378
+ The magnitude transition critical distance dcrit may be
379
+ associated with a critical distance modulus through the
380
+ relation µcrit = 5log(dcrit/Mpc) + 25. By introducing
381
+ this degree of freedom in χ′2 we obtain a generalized
382
+ χ′′2(M<, M>, h, Ω0m) defined by using a vector ⃗Q′′ of
383
+ the form
384
+ Q′′
385
+ i =
386
+
387
+
388
+
389
+
390
+
391
+
392
+
393
+
394
+
395
+ mBi − M< − µCepheid
396
+ i
397
+ iff µCepheid
398
+ i
399
+ < µcrit, and i ∈ Cepheid hosts
400
+ mBi − M> − µCepheid
401
+ i
402
+ iff µCepheid
403
+ i
404
+ > µcrit, and i ∈ Cepheid hosts
405
+ mBi − M< − µmodel(zi)
406
+ iff µCepheid
407
+ i
408
+ < µcrit, and i /∈ Cepheid hosts
409
+ mBi − M> − µmodel(zi)
410
+ iff µCepheid
411
+ i
412
+ > µcrit, and i /∈ Cepheid hosts,
413
+ (3.2)
414
+ in the expression (2.1) for χ2.
415
+ Previous studies [35, 58–60] have found hints of in-
416
+ homogeneities of astrophysical properties including the
417
+ parameters of the Tully-Fisher relation at a distance of
418
+ about 20Mpc.
419
+ In Ref. [35] it was also pointed out that if the SH0ES
420
+ data are reanalyzed by allowing for a change of the SnIa
421
+ absolute magnitude at dcrit = 50Mpc then the best fit
422
+ value of the Hubble parameter shifts to a value almost
423
+ identical with the inverse distance ladder best fit value al-
424
+ beit with significantly increased uncertainties. Motivated
425
+ by these studies we first set dcrit = 50Mpc (µcrit = 31.5)
426
+ and minimize the generalized χ′′2(M<, M>, h, Ω0m). We
427
+ thus find the following best fit parameter values with the
428
+ corresponding 1σ uncertainties
429
+ M< = − 19.25 ± 0.03,
430
+ (3.3)
431
+ M< = − 19.23 ± 0.05,
432
+ (3.4)
433
+ h = 0.742 ± 0.02,
434
+ (3.5)
435
+ Ω0m = 0.332 ± 0.018,
436
+ (3.6)
437
+ with no change of the quality of fit since χ′′2
438
+ min = 1522.61
439
+ (∆χ′′2
440
+ min = −0.3). Thus for dcrit = 50Mpc we find no
441
+ hint of discrepancy between M< and M> and thus no
442
+ inhomogeneity with respect to the SnIa intrinsic lumi-
443
+ nosities. In addition no significant change is observed in
444
+ the best fit value of h in contrast to the corresponding re-
445
+ sult for the SH0ES data analysis where the same degree
446
+
447
+ 5
448
+ d=20Mpc
449
+ M=MCeph=-19.253
450
+ 29
451
+ 30
452
+ 31
453
+ 32
454
+ 33
455
+ 34
456
+ 35
457
+ -20.5
458
+ -20.0
459
+ -19.5
460
+ -19.0
461
+ -18.5
462
+ -18.0
463
+ Distance Modulus μPanth+=mB-MCeph=mB+19.253
464
+ M=mB-μCeph
465
+ Figure 2. The absolute magnitudes of SnIa residing in Cepheid hosts. The best fit SnIa standardized and corrected absolute
466
+ magnitude based on the SH0ES analysis is also shown (blue dashed line).
467
+ of freedom induced a shift in the best fit value of h to
468
+ h = 0.67±0.04. This may be due to the small number of
469
+ SnIa in Cepheid hosts for the M> bin (4 SnIa) combined
470
+ with the much larger number of SnIa in the Hubble flow
471
+ bin for the Pantheon+ sample and the much more exten-
472
+ sive covariance matrix. Similarly, for other values of dcrit
473
+ no significant change is found for the best fit values of the
474
+ parameters h and Ω0m. However, for dcrit ≃ 20Mpc we
475
+ find a mild discrepancy between the best fit values of M<
476
+ and M>.
477
+ In particular, for dcrit = 20Mpc we find the follow-
478
+ ing best fit parameter values with the corresponding 1σ
479
+ uncertainties
480
+ M< = − 19.362 ± 0.05,
481
+ (3.7)
482
+ M< = − 19.215 ± 0.03,
483
+ (3.8)
484
+ h =
485
+ 0.745 ± 0.01,
486
+ (3.9)
487
+ Ω0m = 0.331 ± 0.018,
488
+ (3.10)
489
+ with a significant improvement of the quality of fit since
490
+ χ′′
491
+ min
492
+ 2 = 1513.3 (∆χ′′
493
+ min
494
+ 2 = −9.7) corresponding to re-
495
+ duction of the Akaike Information Criterion (AIC) by
496
+ ∆AIC = −7.7 (for a single additional parameter). The
497
+ corresponding likelihood contours for these parameters
498
+ are shown in Fig. 2 (red contours for M< and M>).
499
+ Thus for dcrit = 20Mpc we find hints of discrepancy
500
+ between M< and M> at a 2 − 3σ level and thus inhomo-
501
+ geneity with respect to the SnIa intrinsic luminosities.
502
+ However, no significant change is observed in the best fit
503
+ value of h. This was also the case for the SH0ES data
504
+ analysis for the same value of dcrit, where the same de-
505
+ gree of freedom induced no significant shift in the best fit
506
+ value of h [35] even though hints of discrepancy between
507
+ M< and M> were observed at similar dcrit albeit at lower
508
+ statistical significance (see e.g. Figs. 8, 9 of Ref. [35]).
509
+ IV.
510
+ STATISTICAL PROPERTIES OF SNIA
511
+ INTRINSIC LUMINOSITIES.
512
+ In this section we further investigate the hints for in-
513
+ homogeneity derived in the previous section from the full
514
+ Pantheon+ sample. We thus focus on the particular sub-
515
+ set of the Pantheon+ sample that corresponds to SnIa in
516
+ Cepheid hosts and investigate the statistical properties of
517
+ their individual absolute magnitudes. The measured ab-
518
+ solute magnitude Mi of individual SnIa in Cepheid hosts
519
+ can be directly obtained from the Pantheon+ data as
520
+ Mi = mBi − µCeph
521
+ i
522
+ (4.1)
523
+
524
+ 6
525
+ -19.6
526
+ -19.4
527
+ -19.2
528
+ -19.0
529
+ 0.00
530
+ 0.05
531
+ 0.10
532
+ 0.15
533
+ 0.20
534
+ 0.25
535
+ 0.30
536
+ SnIa Absolute Magnitude
537
+ Probability
538
+ d<20Mpc
539
+ d>20Mpc
540
+ All
541
+ Figure 3. The probability distribution histogram of the ab-
542
+ solute magnitudes each SnIa subsample (Nearby subsam-
543
+ ple M <
544
+ s : dark blue columns, Distant subsample M >
545
+ s : red
546
+ columns, Full sample of SnIa in Cepheid hosts:
547
+ green
548
+ columns)
549
+ i.e. by subtracting column 13 from column 9 for those
550
+ entries where column 14 is 1 1. In Fig. 2 we show a plot
551
+ of the measured Mi for SnIa in Cepheid hosts vs the SnIa
552
+ distance moduli µP anth+,i = mBi −MCeph (column 9) as
553
+ obtained from the measured apparent magnitudes and
554
+ the best fit value of M from SH0ES (MCeph = −19.253,
555
+ blue dashed line). As shown in Fig. 2, SnIa at distances
556
+ d < 20Mpc appear to be systematically more luminus
557
+ (lower Mi) than the rest of the SnIa since almost all are
558
+ below the blue dashed line corresponding to MCeph2.
559
+ In order to compare the statistical properties of the Mi
560
+ subsample with d < 20Mpc (M <
561
+ s ) with the correspond-
562
+ ing distant subsample with d > 20Mpc (M >
563
+ s ) we show
564
+ in Fig. 3 the probability distribution histogram of each
565
+ subsample (M <
566
+ s : dark blue columns, M >
567
+ s : red columns,
568
+ Full sample: green columns). As expected from Fig. 2
569
+ the probability distributions for the two subsamples differ
570
+ significantly with M <
571
+ s being significantly skewed towards
572
+ lower M values (brighter SnIa).
573
+ The statistical difference between the two subsam-
574
+ ples may be quantified using a Kolmogorov-Smirnov test.
575
+ Based on this test, the null hypothesis that the two sub-
576
+ samples have been drawn from the same probability dis-
577
+ tribution is rejected at the 2.5% level. In fact the prob-
578
+ ability that the two subsamples have been drawn from
579
+ the same probability distribution is 2.2%.
580
+ This result
581
+ further amplifies the evidence for inhomogeneities in the
582
+ SnIa corrected intrinsic luminosities of the Pantheon+
583
+ sample.
584
+ This inhomogeneity could be due to either a
585
+ large statistical fluctuation in the context of the stan-
586
+ dard model, or to an unaccounted systematic effect or to
587
+ 1 The uncertainty of each Mi is obtained from the corresponding
588
+ entries of columns 10 and 13 only for plotting purposes as it will
589
+ not be used in the statistical analysis of this section.
590
+ 2 A similar trend appears for the four furthest SnIa with d >
591
+ 50Mpc even though this is much less significant statistically. This
592
+ is the origin of the effects observed in [35].
593
+ a physics transition that has occurred at a distance of
594
+ about 20Mpc (about 70Myrs ago) [61, 62].
595
+ V.
596
+ CONCLUSION-DISCUSSION
597
+ We have tested the internal consistency of the Pan-
598
+ theon+ sample with respect to the SnIa standardized
599
+ and corrected intrinsic luminosity. We have allowed for a
600
+ change of the SnIa absolute magnitude at dcrit = 20Mpc
601
+ from M< at low distances (late times) to M> at high
602
+ distances (early times).
603
+ We found that such a change
604
+ is favored by the Pantheon+ data leading to an reduc-
605
+ tion of χ2 by ∆χ2
606
+ min = −9.7. This corresponds to re-
607
+ duction of the Akaike Information Criterion (AIC) by
608
+ ∆AIC = −7.7 (for a single additional parameter). Such
609
+ a reduction provides strong evidence that the model
610
+ where a change of M is preferred by the Pantheon+
611
+ data over the baseline model with a single value for M.
612
+ This conclusion is further amplified by the fact that the
613
+ best fit value of M< is in discrepancy with the best fit
614
+ value of M> at a level of more than 2σ. In addition, a
615
+ Kolmogorov-Smirnov test has indicated that the proba-
616
+ bility that the absolute magnitudes Mi of SnIa in Cepheid
617
+ hosts at distances d < 20Mpc are drawn from the same
618
+ distribution as the Mi of SnIa at hosts with d > 20Mpc
619
+ is less than 2.5%. These results constitute evidence for a
620
+ possible inhomogeneity of the SnIa intrinsic luminosities
621
+ of Pantheon+ sample with probability more than 95%.
622
+ However, even if this inhomogeneity manifests itself by
623
+ the introduction of a new degree of freedom in the anal-
624
+ ysis (replacing M by M< and M>), the best fit values of
625
+ the cosmological parameters Ω0m and H0 are not signif-
626
+ icantly affected. Notice however, that the best fit value
627
+ M< = −19.362 ± 0.05 of low the distance SnIa absolute
628
+ magnitude is fully consistent with the inverse distance
629
+ ladder best fit value M = −19.4 ± 0.027 [61].
630
+ The
631
+ demonstrated
632
+ presence
633
+ of
634
+ possible
635
+ inhomo-
636
+ geneities in the Pantheon+ sample may have implica-
637
+ tions for other calibration parameters like the color and
638
+ stretch parameters. It would therefore be of interest to
639
+ extend the present analysis in such directions by testing
640
+ the homogeneity of the Pantheon+ sample with respect
641
+ to possible differences of the best fit values of such pa-
642
+ rameters when these are allowed to change among dif-
643
+ ferent subsamples of the full Pantheon+ sample. Hints
644
+ for such inhomogeneities from the first Pantheon sam-
645
+ ple have been already reported [57]. The corresponding
646
+ effect on the best fit values of cosmological parameters
647
+ when such new degrees of freedom are allowed would also
648
+ be an interesting extension of the present analysis.
649
+ NUMERICAL ANALYSIS FILES
650
+ The numerical files for the reproduction of the figures
651
+ can be found this Github repository under the MIT
652
+
653
+ 7
654
+ license.
655
+ ACKNOWLEDGMENTS
656
+ This project was supported by the Hellenic Foundation
657
+ for Research and Innovation (H.F.R.I.), under the "First
658
+ call for H.F.R.I. Research Projects to support Faculty
659
+ members and Researchers and the procurement of
660
+ high-cost research equipment Grant" (Project Number:
661
+ 789).
662
+ [1] Adam G. Riess et al., “A Comprehensive Measurement
663
+ of the Local Value of the Hubble Constant with 1 km s−1
664
+ Mpc−1 Uncertainty from the Hubble Space Telescope and
665
+ the SH0ES Team,” Astrophys. J. Lett. 934, L7 (2022),
666
+ arXiv:2112.04510 [astro-ph.CO].
667
+ [2] N. Aghanim et al. (Planck), “Planck 2018 results. VI.
668
+ Cosmological parameters,” Astron. Astrophys. 641, A6
669
+ (2020), [Erratum:
670
+ Astron.Astrophys. 652, C4 (2021)],
671
+ arXiv:1807.06209 [astro-ph.CO].
672
+ [3] Leandros Perivolaropoulos and Foteini Skara, “Chal-
673
+ lenges for ΛCDM: An update,” New Astron. Rev. 95
674
+ (2022), 10.1016/j.newar.2022.101659, arXiv:2105.05208
675
+ [astro-ph.CO].
676
+ [4] Elcio Abdalla et al., “Cosmology intertwined:
677
+ A re-
678
+ view of the particle physics, astrophysics, and cosmology
679
+ associated with the cosmological tensions and anoma-
680
+ lies,” JHEAp 34, 49–211 (2022), arXiv:2203.06142 [astro-
681
+ ph.CO].
682
+ [5] Eleonora
683
+ Di
684
+ Valentino,
685
+ Olga
686
+ Mena,
687
+ Supriya
688
+ Pan,
689
+ Luca Visinelli, Weiqiang Yang, Alessandro Melchiorri,
690
+ David F. Mota, Adam G. Riess,
691
+ and Joseph Silk, “In
692
+ the realm of the Hubble tension—a review of solutions,”
693
+ Class. Quant. Grav. 38, 153001 (2021), arXiv:2103.01183
694
+ [astro-ph.CO].
695
+ [6] Paul Shah, Pablo Lemos,
696
+ and Ofer Lahav, “A buyer’s
697
+ guide to the Hubble constant,” Astron. Astrophys. Rev.
698
+ 29, 9 (2021), arXiv:2109.01161 [astro-ph.CO].
699
+ [7] Lloyd Knox and Marius Millea, “The Hubble Hunter’s
700
+ Guide,” (2019), arXiv:1908.03663 [astro-ph.CO].
701
+ [8] Sunny Vagnozzi, “New physics in light of the H0 tension:
702
+ an alternative view,” Phys. Rev. D 102, 023518 (2020),
703
+ arXiv:1907.07569 [astro-ph.CO].
704
+ [9] Mustapha Ishak, “Testing General Relativity in Cosmol-
705
+ ogy,” Living Rev. Rel. 22, 1 (2019), arXiv:1806.10122
706
+ [astro-ph.CO].
707
+ [10] Edvard Mörtsell and Suhail Dhawan, “Does the Hubble
708
+ constant tension call for new physics?” JCAP 1809, 025
709
+ (2018), arXiv:1801.07260 [astro-ph.CO].
710
+ [11] Dragan Huterer and Daniel L Shafer, “Dark energy two
711
+ decades after: Observables, probes, consistency tests,”
712
+ Rept. Prog. Phys. 81, 016901 (2018), arXiv:1709.01091
713
+ [astro-ph.CO].
714
+ [12] Jose Luis Bernal, Licia Verde,
715
+ and Adam G. Riess,
716
+ “The
717
+ trouble
718
+ with
719
+ H0,”
720
+ JCAP
721
+ 1610,
722
+ 019
723
+ (2016),
724
+ arXiv:1607.05617 [astro-ph.CO].
725
+ [13] Wendy
726
+ L.
727
+ Freedman,
728
+ “Measurements
729
+ of
730
+ the
731
+ Hub-
732
+ ble
733
+ Constant:
734
+ Tensions
735
+ in
736
+ Perspective,”
737
+ (2021),
738
+ arXiv:2106.15656 [astro-ph.CO].
739
+ [14] Adrià Gómez-Valent and Luca Amendola, “H0 from
740
+ cosmic chronometers and Type Ia supernovae, with
741
+ Gaussian
742
+ Processes
743
+ and
744
+ the
745
+ novel
746
+ Weighted
747
+ Poly-
748
+ nomial Regression method,” JCAP 04, 051 (2018),
749
+ arXiv:1802.01505 [astro-ph.CO].
750
+ [15] D.W. Pesce et al., “The Megamaser Cosmology Project.
751
+ XIII. Combined Hubble constant constraints,” Astro-
752
+ phys. J. Lett. 891, L1 (2020), arXiv:2001.09213 [astro-
753
+ ph.CO].
754
+ [16] Wendy L. Freedman, Barry F. Madore, Taylor Hoyt,
755
+ In Sung Jang, Rachael Beaton, Myung Gyoon Lee, An-
756
+ drew Monson, Jill Neeley, and Jeffrey Rich, “Calibration
757
+ of the Tip of the Red Giant Branch (TRGB),” (2020),
758
+ arXiv:2002.01550 [astro-ph.GA].
759
+ [17] Kenneth C. Wong et al., “H0LiCOW – XIII. A 2.4
760
+ per cent measurement of H0 from lensed quasars:
761
+ 5.3σ tension between early- and late-Universe probes,”
762
+ Mon. Not. Roy. Astron. Soc. 498, 1420–1439 (2020),
763
+ arXiv:1907.04869 [astro-ph.CO].
764
+ [18] Geoff C. F. Chen et al., “A SHARP view of H0LiCOW:
765
+ H0 from three time-delay gravitational lens systems with
766
+ adaptive optics imaging,” Mon. Not. Roy. Astron. Soc.
767
+ 490, 1743–1773 (2019), arXiv:1907.02533 [astro-ph.CO].
768
+ [19] S. Birrer et al., “TDCOSMO - IV. Hierarchical time-delay
769
+ cosmography – joint inference of the Hubble constant and
770
+ galaxy density profiles,” Astron. Astrophys. 643, A165
771
+ (2020), arXiv:2007.02941 [astro-ph.CO].
772
+ [20] S. Birrer et al., “H0LiCOW - IX. Cosmographic analysis
773
+ of the doubly imaged quasar SDSS 1206+4332 and a new
774
+ measurement of the Hubble constant,” Mon. Not. Roy.
775
+ Astron. Soc. 484, 4726 (2019), arXiv:1809.01274 [astro-
776
+ ph.CO].
777
+ [21] M. Fishbach et al. (LIGO Scientific, Virgo), “A Stan-
778
+ dard Siren Measurement of the Hubble Constant from
779
+ GW170817 without the Electromagnetic Counterpart,”
780
+ Astrophys. J. Lett. 871, L13 (2019), arXiv:1807.05667
781
+ [astro-ph.CO].
782
+ [22] Kenta Hotokezaka, Ehud Nakar, Ore Gottlieb, Samaya
783
+ Nissanke, Kento Masuda, Gregg Hallinan, Kunal P. Moo-
784
+ ley, and Adam. T. Deller, “A Hubble constant measure-
785
+ ment from superluminal motion of the jet in GW170817,”
786
+ Nature Astron. 3, 940–944 (2019), arXiv:1806.10596
787
+ [astro-ph.CO].
788
+ [23] B. P. Abbott et al. (LIGO Scientific, Virgo, 1M2H, Dark
789
+ Energy Camera GW-E, DES, DLT40, Las Cumbres Ob-
790
+ servatory, VINROUGE, MASTER), “A gravitational-
791
+ wave standard siren measurement of the Hubble con-
792
+ stant,” Nature 551, 85–88 (2017), arXiv:1710.05835
793
+ [astro-ph.CO].
794
+ [24] A.
795
+ Palmese
796
+ et
797
+ al.
798
+ (DES),
799
+ “A
800
+ statistical
801
+ standard
802
+ siren measurement of the Hubble constant from the
803
+ LIGO/Virgo gravitational wave compact object merger
804
+
805
+ 8
806
+ GW190814 and Dark Energy Survey galaxies,” Astro-
807
+ phys. J. Lett. 900, L33 (2020), arXiv:2006.14961 [astro-
808
+ ph.CO].
809
+ [25] M. Soares-Santos et al. (DES, LIGO Scientific, Virgo),
810
+ “First Measurement of the Hubble Constant from a
811
+ Dark Standard Siren using the Dark Energy Sur-
812
+ vey Galaxies and the LIGO/Virgo Binary–Black-hole
813
+ Merger GW170814,” Astrophys. J. Lett. 876, L7 (2019),
814
+ arXiv:1901.01540 [astro-ph.CO].
815
+ [26] Shulei
816
+ Cao,
817
+ Maria
818
+ Dainotti,
819
+ and
820
+ Bharat
821
+ Ratra,
822
+ “Standardizing Platinum Dainotti-correlated gamma-
823
+ ray bursts, and using them with standardized Amati-
824
+ correlated gamma-ray bursts to constrain cosmological
825
+ model parameters,” Mon. Not. Roy. Astron. Soc. 512,
826
+ 439–454 (2022), arXiv:2201.05245 [astro-ph.CO].
827
+ [27] Shulei
828
+ Cao,
829
+ Maria
830
+ Dainotti,
831
+ and
832
+ Bharat
833
+ Ratra,
834
+ “Gamma-ray
835
+ burst
836
+ data
837
+ strongly
838
+ favor
839
+ the
840
+ three-
841
+ parameter fundamental plane (Dainotti) correlation rela-
842
+ tion over the two-parameter one,” (2022), 10.1093/mn-
843
+ ras/stac2170, arXiv:2204.08710 [astro-ph.CO].
844
+ [28] Maria Giovanna Dainotti, Giuseppe Sarracino,
845
+ and
846
+ Salvatore
847
+ Capozziello,
848
+ “Gamma-Ray
849
+ Bursts,
850
+ Super-
851
+ novae Ia and Baryon Acoustic Oscillations:
852
+ a binned
853
+ cosmological analysis,”
854
+ (2022), 10.1093/pasj/psac057,
855
+ arXiv:2206.07479 [astro-ph.CO].
856
+ [29] Maria Giovanna Dainotti, Via Nielson, Giuseppe Sar-
857
+ racino, Enrico Rinaldi, Shigehiro Nagataki, Salvatore
858
+ Capozziello, Oleg Y. Gnedin,
859
+ and Giada Bargiacchi,
860
+ “Optical and X-ray GRB Fundamental Planes as cosmo-
861
+ logical distance indicators,” Mon. Not. Roy. Astron. Soc.
862
+ 514, 1828–1856 (2022), arXiv:2203.15538 [astro-ph.CO].
863
+ [30] Maria Giovanna Dainotti, Vincenzo Fabrizio Cardone,
864
+ Ester Piedipalumbo, and Salvatore Capozziello, “Slope
865
+ evolution of GRB correlations and cosmology,” Mon. Not.
866
+ Roy. Astron. Soc. 436, 82 (2013), arXiv:1308.1918 [astro-
867
+ ph.HE].
868
+ [31] Guido
869
+ Risaliti
870
+ and
871
+ Elisabeta
872
+ Lusso,
873
+ “Cosmological
874
+ constraints from the Hubble diagram of quasars at
875
+ high redshifts,” Nature Astron. 3, 272–277 (2019),
876
+ arXiv:1811.02590 [astro-ph.CO].
877
+ [32] T. de Jaeger, L. Galbany, A. G. Riess, B. E. Stahl,
878
+ B. J. Shappee, A. V. Filippenko,
879
+ and W. Zheng,
880
+ “A 5% measurement of the Hubble constant from
881
+ Type II supernovae,”
882
+ (2022), 10.1093/mnras/stac1661,
883
+ arXiv:2203.08974 [astro-ph.CO].
884
+ [33] T. de Jaeger,
885
+ B.E. Stahl,
886
+ W. Zheng,
887
+ A.V. Filip-
888
+ penko, A.G. Riess,
889
+ and L. Galbany, “A measure-
890
+ ment of the Hubble constant from Type II supernovae,”
891
+ (2020),
892
+ 10.1093/mnras/staa1801,
893
+ arXiv:2006.03412
894
+ [astro-ph.CO].
895
+ [34] Alberto Domínguez, Radoslaw Wojtak, Justin Finke,
896
+ Marco Ajello, Kari Helgason, Francisco Prada, Abhishek
897
+ Desai, Vaidehi Paliya, Lea Marcotulli, and Dieter Hart-
898
+ mann, “A new measurement of the Hubble constant and
899
+ matter content of the Universe using extragalactic back-
900
+ ground light γ-ray attenuation,”
901
+ (2019), 10.3847/1538-
902
+ 4357/ab4a0e, arXiv:1903.12097 [astro-ph.CO].
903
+ [35] Leandros Perivolaropoulos and Foteini Skara, “A Reanal-
904
+ ysis of the Latest SH0ES Data for H0: Effects of New
905
+ Degrees of Freedom on the Hubble Tension,” Universe 8,
906
+ 502 (2022), arXiv:2208.11169 [astro-ph.CO].
907
+ [36] Dillon Brout et al., “The Pantheon+ Analysis:
908
+ Cos-
909
+ mological Constraints,” Astrophys. J. 938, 110 (2022),
910
+ arXiv:2202.04077 [astro-ph.CO].
911
+ [37] Dan Scolnic et al., “The Pantheon+ Analysis: The Full
912
+ Data Set and Light-curve Release,” Astrophys. J. 938,
913
+ 113 (2022), arXiv:2112.03863 [astro-ph.CO].
914
+ [38] Dillon Brout et al., “The Pantheon+ Analysis: SuperCal-
915
+ fragilistic Cross Calibration, Retrained SALT2 Light-
916
+ curve Model, and Calibration Systematic Uncertainty,”
917
+ Astrophys. J. 938, 111 (2022), arXiv:2112.03864 [astro-
918
+ ph.CO].
919
+ [39] Jessica A. Cowell, Suhail Dhawan,
920
+ and Hayley J.
921
+ Macpherson, “Potential signature of a quadrupolar Hub-
922
+ ble expansion in Pantheon+ supernovae,”
923
+ (2022),
924
+ arXiv:2212.13569 [astro-ph.CO].
925
+ [40] Francesco Sorrenti, Ruth Durrer,
926
+ and Martin Kunz,
927
+ “The Dipole of the Pantheon+SH0ES Data,”
928
+ (2022),
929
+ arXiv:2212.10328 [astro-ph.CO].
930
+ [41] Ryan Keeley, Arman Shafieloo, and Benjamin L’Huillier,
931
+ “An Analysis of Variance of the Pantheon+ Dataset:
932
+ Systematics
933
+ in
934
+ the
935
+ Covariance
936
+ Matrix?”
937
+ (2022),
938
+ arXiv:2212.07917 [astro-ph.CO].
939
+ [42] Giuseppe Sarracino, Alessandro D. A. M. Spallicci, and
940
+ Salvatore Capozziello, “Investigating dark energy by elec-
941
+ tromagnetic frequency shifts II: the Pantheon+ sample,”
942
+ Eur. Phys. J. Plus 137, 1386 (2022), arXiv:2211.11438
943
+ [astro-ph.CO].
944
+ [43] Vivian Poulin, José Luis Bernal, Ely Kovetz, and Marc
945
+ Kamionkowski, “The Sigma-8 Tension is a Drag,” (2022),
946
+ arXiv:2209.06217 [astro-ph.CO].
947
+ [44] Deng Wang, “Pantheon+ constraints on dark energy and
948
+ modified gravity: An evidence of dynamical dark energy,”
949
+ Phys. Rev. D 106, 063515 (2022), arXiv:2207.07164
950
+ [astro-ph.CO].
951
+ [45] S. A. Narawade and B. Mishra, “Phantom cosmological
952
+ model with observational constraints in f(Q) gravity,”
953
+ (2022), arXiv:2211.09701 [gr-qc].
954
+ [46] Reginald Christian Bernardo, Daniela Grandón, Jackson
955
+ Levi Said, and Víctor H. Cárdenas, “Dark energy by nat-
956
+ ural evolution: Constraining dark energy using Approxi-
957
+ mate Bayesian Computation,” (2022), arXiv:2211.05482
958
+ [astro-ph.CO].
959
+ [47] Marc Kamionkowski and Adam G. Riess, “The Hub-
960
+ ble
961
+ Tension
962
+ and
963
+ Early
964
+ Dark
965
+ Energy,”
966
+ (2022),
967
+ arXiv:2211.04492 [astro-ph.CO].
968
+ [48] Théo Simon, Pierre Zhang, Vivian Poulin,
969
+ and Tris-
970
+ tan L. Smith, “Updated constraints from the effective
971
+ field theory analysis of BOSS power spectrum on Early
972
+ Dark Energy,” (2022), arXiv:2208.05930 [astro-ph.CO].
973
+ [49] David Dahiya and Deepak Jain, “Revisiting the epoch of
974
+ cosmic acceleration,”
975
+ (2022), arXiv:2212.04751 [astro-
976
+ ph.CO].
977
+ [50] Nanoom Lee, Yacine Ali-Haïmoud, Nils Schöneberg, and
978
+ Vivian Poulin, “What it takes to solve the Hubble ten-
979
+ sion through modifications of cosmological recombina-
980
+ tion,” (2022), arXiv:2212.04494 [astro-ph.CO].
981
+ [51] X. D. Jia, J. P. Hu,
982
+ and F. Y. Wang, “The evidence
983
+ for a decreasing trend of Hubble constant,”
984
+ (2022),
985
+ arXiv:2212.00238 [astro-ph.CO].
986
+ [52] Wang-Wei Yu, Li Li, and Shao-Jiang Wang, “First de-
987
+ tection of the Hubble variation correlation and its scale
988
+ dependence,” (2022), arXiv:2209.14732 [astro-ph.CO].
989
+ [53] Eoin Ó. Colgáin, M. M. Sheikh-Jabbari,
990
+ and Rance
991
+ Solomon, “High Redshift ΛCDM Cosmology: To Bin or
992
+ not to Bin?” (2022), arXiv:2211.02129 [astro-ph.CO].
993
+
994
+ 9
995
+ [54] Deng Wang, “Pantheon+ tomography and Hubble ten-
996
+ sion,” (2022), arXiv:2207.10927 [astro-ph.CO].
997
+ [55] Nils Schöneberg, Licia Verde, Héctor Gil-Marín,
998
+ and
999
+ Samuel Brieden, “BAO+BBN revisited — growing the
1000
+ Hubble tension with a 0.7 km/s/Mpc constraint,” JCAP
1001
+ 11, 039 (2022), arXiv:2209.14330 [astro-ph.CO].
1002
+ [56] Deng Wang, “Testing the Hubble law with Pantheon+,”
1003
+ (2022), arXiv:2208.07271 [astro-ph.CO].
1004
+ [57] Radosław Wojtak and Jens Hjorth, “Intrinsic tension in
1005
+ the supernova sector of the local Hubble constant mea-
1006
+ surement and its implications,”
1007
+ (2022), 10.1093/mn-
1008
+ ras/stac1878, arXiv:2206.08160 [astro-ph.CO].
1009
+ [58] George
1010
+ Alestas,
1011
+ Ioannis
1012
+ Antoniou,
1013
+ and
1014
+ Lean-
1015
+ dros Perivolaropoulos, “Hints for a gravitational con-
1016
+ stant
1017
+ transition
1018
+ in
1019
+ Tully-Fisher
1020
+ data,”
1021
+ (2021),
1022
+ arXiv:2104.14481 [astro-ph.CO].
1023
+ [59] Leandros Perivolaropoulos and Foteini Skara, “Hubble
1024
+ tension or a transition of the Cepheid SnIa calibra-
1025
+ tor parameters?” Phys. Rev. D 104, 123511 (2021),
1026
+ arXiv:2109.04406 [astro-ph.CO].
1027
+ [60] Leandros Perivolaropoulos, “Is the Hubble Crisis Con-
1028
+ nected with the Extinction of Dinosaurs?” Universe 8,
1029
+ 263 (2022), arXiv:2201.08997 [astro-ph.EP].
1030
+ [61] Valerio Marra and Leandros Perivolaropoulos, “A rapid
1031
+ transition of Geff at zt ≃ 0.01 as a possible solution of
1032
+ the Hubble and growth tensions,” Phys. Rev. D 104,
1033
+ L021303 (2021), arXiv:2102.06012 [astro-ph.CO].
1034
+ [62] George Alestas, Lavrentios Kazantzidis,
1035
+ and Leandros
1036
+ Perivolaropoulos, “w − M phantom transition at zt <0.1
1037
+ as a resolution of the Hubble tension,” Phys. Rev. D 103,
1038
+ 083517 (2021), arXiv:2012.13932 [astro-ph.CO].
1039
+
BdAzT4oBgHgl3EQfGPtU/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
BtE0T4oBgHgl3EQfyAJM/content/tmp_files/2301.02653v1.pdf.txt ADDED
@@ -0,0 +1,2025 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Single electron-spin-resonance detection by microwave photon counting
2
+ Z. Wang1,2,∗, L. Balembois1,∗, M. Rancic1, E. Billaud1, M. Le Dantec1, A. Ferrier3, P.
3
+ Goldner3, S. Bertaina4, T. Chaneliere5, D. Esteve1, D. Vion1, P. Bertet1, E. Flurin1,†
4
+ 1Quantronics group, Université Paris-Saclay, CEA,
5
+ CNRS, SPEC, 91191 Gif-sur-Yvette Cedex, France
6
+ 2Département de Physique et Institut Quantique,
7
+ Université de Sherbrooke, Sherbrooke, Québec, Canada
8
+ 3Chimie ParisTech, PSL University, CNRS,
9
+ Institut de Recherche de Chimie Paris, 75005 Paris, France
10
+ 4CNRS, Aix-Marseille Université, IM2NP (UMR 7334),
11
+ Institut Matériaux Microélectronique et Nanosciences de Provence, Marseille, France
12
+ 5Univ.
13
+ Grenoble Alpes, CNRS, Grenoble INP,
14
+ Institut Néel, 38000 Grenoble, France
15
+ (Dated: January 9, 2023)
16
+ Electron spin resonance (ESR) spectroscopy is
17
+ the method of choice for characterizing para-
18
+ magnetic
19
+ impurities,
20
+ with
21
+ applications
22
+ rang-
23
+ ing from chemistry to quantum computing [1],
24
+ but it gives access only to ensemble-averaged
25
+ quantities due to its limited signal-to-noise ra-
26
+ tio.
27
+ Single-electron-spin sensitivity has how-
28
+ ever been reached using spin-dependent photo-
29
+ luminescence [2–4], transport measurements [5–
30
+ 8], and scanning-probe techniques [9–11]. These
31
+ methods are system-specific or sensitive only in
32
+ a small detection volume, so that practical single
33
+ spin detection remains an open challenge. Here,
34
+ we demonstrate single electron magnetic reso-
35
+ nance by spin fluorescence detection [12], using
36
+ a microwave photon counter at cryogenic tem-
37
+ peratures [13].
38
+ We detect individual paramag-
39
+ netic erbium ions in a scheelite crystal coupled
40
+ to a high-quality factor planar superconducting
41
+ resonator to enhance their radiative decay rate,
42
+ with a signal-to-noise ratio of 1.9 in one second
43
+ integration time.
44
+ The fluorescence signal shows
45
+ anti-bunching, proving that it comes from indi-
46
+ vidual emitters. Coherence times up to 3 ms are
47
+ measured, limited by the spin radiative lifetime.
48
+ The method has the potential to apply to ar-
49
+ bitrary paramagnetic species with long enough
50
+ non-radiative relaxation time, and allows single-
51
+ spin detection in a volume as large as the res-
52
+ onator magnetic mode volume (∼ 10µm3 in the
53
+ present experiment), orders of magnitude larger
54
+ than other single-spin detection techniques.
55
+ As
56
+ such, it may find applications in magnetic reso-
57
+ nance and quantum computing.
58
+ ∗these authors contributed equally
59
+ †corresponding author: emmanuel.fl[email protected]
60
+ In ESR spectroscopy, the linewidth of an ensemble of
61
+ paramagnetic centers is usually dominated by the fre-
62
+ quency shifts that each center undergoes under the action
63
+ of its local environment. This inhomogeneous broadening
64
+ can reach large values (up to several GHz) and imposes a
65
+ limitation to the achievable spectral resolution [1]. One
66
+ radical way to overcome the inhomogeneous broadening
67
+ is to perform ESR spectroscopy on individual paramag-
68
+ netic centers, thus gaining several orders of magnitude in
69
+ spectral resolution since single spin linewidths are typ-
70
+ ically in the kHz-MHz range [3, 7, 14]. Besides the in-
71
+ terest for magnetic resonance spectroscopy, single spin
72
+ addressing is also a necessity for most spin-based quan-
73
+ tum computing applications.
74
+ Practical single-electron-spin-resonance should enable
75
+ the detection and spectroscopy of a wide range of para-
76
+ magnetic centers buried in an insulating matrix, with
77
+ a sufficiently large detection volume and signal-to-noise
78
+ ratio. So far, none of the approaches that achieve single-
79
+ spin detection satisfy all of these requirements. Optically
80
+ Detected Magnetic Resonance (ODMR) can detect indi-
81
+ vidual paramagnetic centers only when suitable energy
82
+ levels and cycling optical transitions are present [2–4].
83
+ ODMR-detected individual NV centers can be used to
84
+ measure the spectrum of neighboring single electron spins
85
+ in ambient conditions [11, 15, 16], but the detection vol-
86
+ ume is limited to ∼ 103−104nm3 by the 1/r3 dependence
87
+ of the dipolar interaction, which makes the detection of
88
+ spins far outside of the diamond host challenging. Spin-
89
+ dependent transport can detect individual spins when a
90
+ spin-to-charge conversion pathway is present [5–8, 10],
91
+ but this is lacking in most paramagnetic centers. Single
92
+ electron-spin imaging was also achieved using Magnetic
93
+ Resonance Force Microscopy [9], but spectroscopy has
94
+ not yet been demonstrated with this platform.
95
+ Here, we perform single electron spin resonance spec-
96
+ troscopy by transposing fluorescence detection, a well-
97
+ established method to detect individual emitters in the
98
+ arXiv:2301.02653v1 [quant-ph] 6 Jan 2023
99
+
100
+ 2
101
+ Figure 1.
102
+ Principle of single spin spectroscopy by
103
+ microwave photon counting. An individual electron spin
104
+ (red arrow) embedded in a crystal is excited by a microwave
105
+ pulse (in black); it then relaxes back to its ground state by
106
+ emitting a microwave photon (green arrow), which is routed
107
+ via a circulator towards a microwave photon counter based
108
+ on a superconducting transmon qubit. To enhance its radia-
109
+ tive rate ΓR, the spin is coupled magnetically to the mode of
110
+ a high-quality-factor superconducting planar microwave LC
111
+ resonator (in orange). The spin frequency is tuned to the res-
112
+ onator by application of a magnetic field B0 parallel to the
113
+ resonator plane.
114
+ optical domain at room-temperature, to microwave fre-
115
+ quencies and millikelvin temperatures. In optical fluo-
116
+ rescence, an emitter is excited by a short light pulse,
117
+ and detected by counting the emitted photons during
118
+ the radiative relaxation [3, 17].
119
+ Similarly, we excite a
120
+ spin by a short microwave pulse, and detect it by count-
121
+ ing the microwave photons it emits when returning to its
122
+ ground state. Spin relaxation by spontaneous emission
123
+ of microwave photons is exceedingly slow in free space;
124
+ we thus enhance its rate ΓR resonantly by coupling the
125
+ spin to a high-quality-factor superconducting microwave
126
+ resonator of frequency ω0 [18], and we detect the fluo-
127
+ rescence photon with a single-microwave-photon detector
128
+ (SMPD) based on a superconducting qubit (see Fig. 1 for
129
+ a schematic description). The maximum signal-to-noise
130
+ ratio (SNR) reached by this method with a one second in-
131
+ tegration time scales as ∼ ηΓR/
132
+
133
+ α + η(1 − η)ΓR, where
134
+ 0 ≤ η ≤ 1 is the average number of counts generated
135
+ by the radiative decay of one spin, and α the SMPD
136
+ dark count rate (see Methods). It is noteworthy that this
137
+ SNR is only limited by technical imperfections and has
138
+ no upper bound for an ideal experiment where α = 0 and
139
+ η = 1, in contrast with earlier proposals and experiments
140
+ of circuit-QED-enhanced magnetic resonance where the
141
+ SNR is ultimately limited by vacuum microwave fluctu-
142
+ ations
143
+ [19–25]. In a recent experiment demonstrating
144
+ the detection of ∼ 104 impurity spins by microwave flu-
145
+ orescence, this single-spin SNR was ∼ 5 · 10−4 [12], thus
146
+ insufficient for single-spin detection.
147
+ Here, we reach a
148
+ single-spin SNR of ∼ 1 by improving the resonator de-
149
+ sign, the SMPD performance, and by using spins with
150
+ a larger gyromagnetic ratio. Our method could be ap-
151
+ plicable to a broad class of paramagnetic impurities and
152
+ offers a detection volume that can be large (∼ 10 µm3
153
+ in the present experiment). It is therefore promising for
154
+ operational single electron spin resonance at cryogenic
155
+ temperatures.
156
+ We demonstrate this method with rare-earth ions in
157
+ a crystal, specifically Er3+ ions in a scheelite crystal of
158
+ CaWO4, which has tetragonal symmetry around its c-
159
+ axis. The crystal used in the experiment was grown un-
160
+ doped, but has a residual erbium concentration 3.1 ± 0.2
161
+ ppb (see Methods), which corresponds to a ∼ 300 nm av-
162
+ erage distance between neighboring Er3+ ions. At low
163
+ temperatures, only the ground state Kramers doublet
164
+ of Er3+ : CaWO4 is populated; it behaves as an effec-
165
+ tive spin S = 1/2 with frequency ωs = γ · B0, where
166
+ B0 is the applied magnetic field and γ the ion gyromag-
167
+ netic tensor. The ensemble-averaged gyromagnetic ten-
168
+ sor γ0 determines the center of the ensemble resonance
169
+ line ωs0; it is diagonal in the (a, b, c) tetragonal frame,
170
+ with elements γa = γb ≡ γ⊥ = 2π × 117.3 GHz/T, and
171
+ γc ≡ γ|| = 2π×17.45 GHz/T [26]. Due to inhomogeneous
172
+ broadening however, each individual ion has a gyromag-
173
+ netic tensor γ = γ0 + δγ (with |δγ| ≪ |γ0|) that slightly
174
+ deviates from γ0 [27].
175
+ The planar resonator is patterned on top of the crystal,
176
+ out of a superconducting niobium thin-film. The heart
177
+ of the device is a 600 nm-wide, 100µm-long wire, which
178
+ acts as a lumped inductance, shunted by a finger capac-
179
+ itor (see Fig. 1 and Methods) that sets the resonance
180
+ frequency ω0/2π = 7.335 GHz.
181
+ The wire (z direction)
182
+ is oriented approximately along the crystal c-axis, and
183
+ the magnetic field B0 is applied along the sample surface
184
+ (z − y plane), at a small adjustable angle θ with respect
185
+ to z (see Methods). The resonator is coupled to a trans-
186
+ mission line for exciting the spins and collecting their
187
+ fluorescence, at a rate κc, whereas the total resonator
188
+ damping rate κ = κc + κi also includes internal losses κi.
189
+ A circulator routes the excitation pulses from the input
190
+ line towards the sample, and the reflected pulses together
191
+ with the subsequent spin fluorescence signal towards the
192
+ input of a transmon-qubit-based SMPD. This detector is
193
+ similar to the ones described in [12, 13], but has a much
194
+ lower dark count rate α = 102 s−1 (see Methods).
195
+ By coupling to the resonator, a spin at frequency ωs
196
+ and position r demonstrates a Purcell-enhanced radia-
197
+ tive relaxation rate ΓR = κg2
198
+ 0/(δ2 + κ2/4) that depends
199
+ on its detuning to the resonator δ ≡ ωs − ω0 and on
200
+
201
+ click3
202
+ 414
203
+ 416
204
+ 418
205
+ 420
206
+ 422
207
+ 424
208
+ 426
209
+ 0.2
210
+ 0.4
211
+ 0.6
212
+ 30
213
+ 60
214
+ 90
215
+ -20
216
+ -10
217
+ 0
218
+ 7.334
219
+ 7.336
220
+ 〈C〉(counts)
221
+
222
+ B0 (mT)
223
+ 0.0
224
+ 0.5
225
+ 1.00
226
+ 100
227
+ 200
228
+ time td (ms)
229
+ 〈C〉(counts / ms)
230
+ 0
231
+ 2
232
+ 4
233
+ 6
234
+ 8
235
+ 0.0
236
+ 0.1
237
+ 0.2
238
+ time td (ms)
239
+ 〈C〉(counts / ms)
240
+
241
+ 〈C〉(counts)
242
+ frequency (GHz)
243
+
244
+ reflection (dB)
245
+ s0
246
+ s1
247
+ s2 s3 s4
248
+ s5
249
+ s6
250
+ .
251
+ c
252
+ f
253
+ b
254
+ e
255
+ a
256
+ d
257
+ .
258
+ -600
259
+ -300
260
+ 0
261
+ x (nm)
262
+ y (nm)
263
+ 0
264
+ -300
265
+ -600
266
+ 600
267
+ 300
268
+ �R= 125 s-1
269
+ 250
270
+ 500
271
+ 1000
272
+ 6
273
+ 5
274
+ 4
275
+ 3
276
+ 2
277
+ 1
278
+ g0/2� (kHz)
279
+ td
280
+ Figure 2.
281
+ Spin spectroscopy. (a) Simulation of the spin-resonator coupling constant g0(x, y) and relaxation rate ΓR(x, y)
282
+ as a function of the spin position (x, y) with respect to the wire (shown as a green rectangle). (b) Magnitude of resonator
283
+ reflection (green dots) as a function of probe frequency at single-photon level input power. A fit yields the total resonator
284
+ linewidth κ/2π = 470 kHz, with a coupling rate κc = 1.7 · 106 s−1 and an internal loss rate κi = 1.3 · 106 s−1 (c-d) Microwave
285
+ fluorescence spectroscopy (c) at high excitation power (∼ −97 dBm at sample input) and typical fluorescence signal (d). At
286
+ each magnetic field B0, the average number of counts ⟨C⟩ is integrated over a ∼ 200 ms duration following the excitation pulse
287
+ (light blue window in panel d). Blue open circles are data, red line is a Lorentzian fit with FWHM 0.45 mT. Note that the
288
+ angle θ varies linearly between −0.006◦ and 0.006◦ over the scan. Fluorescence histograms are shown at the center (red) and
289
+ tail (grey) of the spin ensemble line (see stars in panel c). (e) Spin spectroscopy at low power (∼ −107 dBm at sample input),
290
+ with an integration window of 2 ms. Blue line is measured data, red line is a Lorentzian fit. The inset shows an expanded view
291
+ of 7 peaks (labelled s0 to s6). Note that the angle θ varies linearly between −0.016◦ and 0.016◦ over the scan. (f) Fluorescence
292
+ histograms of spin s0 (red) and background (grey) averaged over the range of B0 shown in the inset of panel e. The light blue
293
+ window is the integration window for the data in e).
294
+ the magnetic field vacuum fluctuations δB1(r) through
295
+ the spin-resonator coupling strength g0(r) = ⟨↓ |S| ↑
296
+ ⟩ · γ · δB1(r) [18]. To a good approximation, δB1(r) does
297
+ not depend on the position z along the wire and is orthog-
298
+ onal to the latter, so that the coupling strength can be
299
+ re-written as g0(x, y) = (1/2)γ⊥|δB1(x, y)|. The g0(x, y)
300
+ map is shown in Fig. 2a for our resonator design, and
301
+ shows that g0/2π is larger than 3 kHz, and thus ΓR is
302
+ larger than ∼ 500s−1, for spins located below the wire at
303
+ a depth smaller than ∼ 150 nm, corresponding to a vol-
304
+ ume of ∼ 10 µm3. This implies that ΓR/√α ≥ 50/
305
+
306
+ Hz,
307
+ and therefore suggests that single-spin sensitivity may be
308
+ reached over this whole volume.
309
+ The properties of the fluorescence signal, which is the
310
+ sum of the contributions of all the spins excited by the
311
+ pulse, strongly depend on the excitation power. We first
312
+ record the spectrum of the Er3+ : CaWO4 resonance with
313
+ a high input power (∼ −97 dBm), thus exciting many
314
+ weakly coupled ions that have low ΓR. The average count
315
+ rate as a function of time following the pulse shows an
316
+ excess compared to the dark count level (see Fig. 2d) and
317
+ decays non-exponentially over a time scale of ∼ 100 ms.
318
+ We plot the average number of counts integrated over
319
+ 200 ms ⟨C⟩ as a function of magnetic field B0 applied
320
+ along the z direction in Fig. 2c.
321
+ A smooth, approxi-
322
+ mately Lorentzian, peak is observed at B0 = 419.5 mT,
323
+ close to ω0/γ||, proving it is the Er3+ spin resonance.
324
+ Its inhomogeneous Full-Width-Half-Maximum linewidth
325
+ 0.5 mT corresponds to a ∼ 8 MHz-wide distribution.
326
+ We then record the line with ∼ 20 dB lower excita-
327
+ tion power while simultaneously reducing the integra-
328
+ tion time to 2 ms, thus exciting and detecting only the
329
+ most strongly coupled and fastest relaxing spins.
330
+ The
331
+ integrated count ⟨C⟩(B0) now shows qualitatively differ-
332
+ ent behavior and appears as a sum of narrow, unevenly
333
+ distributed peaks, with typical amplitude ∼ 0.1 excess
334
+ count over the noise floor (see Fig.2e). The fluorescence
335
+ curve when tuned to one of these peaks shows an ex-
336
+ ponential decay (see Fig. 2f), with a time constant of
337
+ ∼ 2 ms.
338
+ These features suggest that each peak corre-
339
+ sponds to the microwave fluorescence signal originating
340
+ from a single Er3+ ion spin; analogous to the optical fluo-
341
+ rescence spectrum of a collection of individual solid-state
342
+ emitters [17, 28, 29]. Note that while we observe a large
343
+ fluorescence signal at the centre of the inhomogeneous
344
+ absorption line, some individual peaks are still found far
345
+ from the centre; a common observation in low-density
346
+ spectra of optical emitters, and a natural consequence of
347
+
348
+ 4
349
+ −0.2
350
+ −0.1
351
+ 0.0
352
+ 0.1
353
+ 0.2
354
+ 0.3
355
+ θ (deg)
356
+ 421
357
+ 422
358
+ B0 (mT)
359
+ 0.0
360
+ 0.1
361
+ 〈C〉(counts)
362
+ s0
363
+ s1
364
+ s2
365
+ s3
366
+ s4
367
+ s5
368
+ s6
369
+
370
+ Figure 3.
371
+ Single-spin-resolved rotation pattern Average
372
+ number of excess count ⟨ �C⟩ as a function of the magnetic field
373
+ amplitude B0 and its angle θ with respect to the projection
374
+ of the crystal c axis on the sample surface. The range is the
375
+ same as in the inset of Fig. 2, and the same labeling of the spin
376
+ lines is used. The data acquisition time was approximately
377
+ one week.
378
+ the random nature of inhomogeneous broadening. This
379
+ is also possibly supplemented in our particular device by
380
+ the strain imparted by the thermal contractions of the
381
+ metallic wire on the substrate just below [30, 31].
382
+ To demonstrate the stability and reproducibility of the
383
+ peaks, we perform a two-dimensional magnetic field scan
384
+ by recording a background-corrected average number of
385
+ counts (see Methods), named ⟨ ˜C⟩ hereafter, as a func-
386
+ tion of B0 and θ (see Fig. 3). Eight different spin peaks
387
+ are resolved, and their spectrum is readily followed in
388
+ magnetic field. It appears that each ion has its own gy-
389
+ romagnetic tensor γ, close to γ0 but with different values
390
+ for the principal axes and also a symmetry axis that can
391
+ slightly deviate from the c-axis, vividly illustrating the
392
+ concept of inhomogeneous broadening. The lines are so
393
+ narrow that each ion γ could, in principle, be determined
394
+ to better than 10−6 accuracy (using a suitably calibrated
395
+ magnetic field). Because the deviation δγ of the gyro-
396
+ magnetic tensor from the ensemble-averaged γ0 is due to
397
+ the local electrostatic and strain environment, its accu-
398
+ rate measurement can also be turned into a sensitive way
399
+ to probe it (as done with NV centers in diamond in par-
400
+ ticular [32]). Note that our measurements also call for a
401
+ better modeling of the response of rare-earth ion spins to
402
+ applied electric or strain fields.
403
+ We now select one of the peaks (s0) and bring fur-
404
+ ther proof of its single-spin nature. We first measure the
405
+ excess counts ⟨ ˜C⟩ as a function of the microwave pulse
406
+ duration, and observe sinusoidal oscillations with a fre-
407
+ 0
408
+ 5
409
+ 10
410
+ Pulse duration (µs)
411
+ T
412
+ 0.0
413
+ 0.1
414
+ 0.2
415
+ 〈C〉(counts)
416
+ a
417
+ 0
418
+ 1
419
+ A (arb. unit)
420
+ 0.0
421
+ 0.2
422
+ 0.4
423
+ 0.6
424
+ Rabi frequency (MHz)
425
+ b
426
+ −20
427
+ −10
428
+ 0
429
+ 10
430
+ 20
431
+ Offset (# excitation pulses)
432
+ k
433
+ 0.0
434
+ 0.5
435
+ 1.0
436
+ Corrected g(2)
437
+ c
438
+ 0
439
+ 50
440
+ C (counts)
441
+ 0.00
442
+ 0.02
443
+ 0.04
444
+ 0.06
445
+ p C
446
+ ( )
447
+ d
448
+ 0
449
+ 20
450
+ 40
451
+ measurement time
452
+ (s)
453
+ tm
454
+ 0
455
+ 5
456
+ 10
457
+ SNR
458
+ e
459
+ no
460
+ pulse
461
+ � pulse
462
+ tm = 1 s
463
+ A
464
+ T
465
+ ~
466
+ Figure 4.
467
+ Characterization of spin s0. (a) Rabi oscil-
468
+ lation: measured average excess count ⟨ �C⟩ (red dots) as a
469
+ function of excitation pulse duration T (see inset), and cor-
470
+ responding fit (solid line) by a sine function with linearly in-
471
+ creasing offset. (b) Extracted Rabi frequency (magenta dots)
472
+ as a function of excitation pulse amplitude A, and correspond-
473
+ ing linear fit through origin (solid line).
474
+ (c) Background-
475
+ corrected auto-correlation function g(2) (blue columns) and
476
+ corresponding ±1-standard deviation error bars (red) mea-
477
+ sured as a function of the offset k between excitation pulses.
478
+ (d) Measured probability distribution p(C) of the total count
479
+ C integrated over the first 2 ms of 7.5 ms-long sequences, ei-
480
+ ther with no excitation pulse applied (grey) or with a π ex-
481
+ citation pulse (red). Sequences are repeated and counts are
482
+ summed during a measurement time tm = 1 s. Solid lines are
483
+ Poissonian fits, yielding the spin signal Cspin = 12.4 (differ-
484
+ ence between the mean values of the two distributions) and
485
+ the standard deviations δC0 = 5.5 and δCπ = 6.5. (e) Mea-
486
+ sured signal-to noise ratio Cspin/δCπ (magenta dots) as a
487
+ function of the measurement time tm, and fit with the func-
488
+ tion A√tm (solid line). Data taken at B0 = 421.042 mT and
489
+ θ = −0.024◦.
490
+ quency that depends linearly on the pulse amplitude (see
491
+ Fig. 4a and b), as expected for the Rabi oscillation of a
492
+ single spin. Superposed on these oscillations is a grad-
493
+ ual increase in counts, which we attribute to heating of
494
+ the bath of defects that are responsible for the resonator
495
+ internal losses upon microwave excitation, as observed
496
+
497
+ 5
498
+ in [12] (see Methods). We then use the SMPD to measure
499
+ the photon statistics of the fluorescence signal and reveal
500
+ its single emitter nature. For this task, we acquire a large
501
+ number of fluorescence traces following a π pulse, label
502
+ them by index j, and compute the dark-count-corrected
503
+ intensity-intensity correlation function g(2)(k) between
504
+ traces whose index differs by k (see Methods). For N
505
+ emitters, g(2)(0) should be equal to (N − 1)/N; in par-
506
+ ticular, g(2)(0) should be equal to 0 for a single-emitter
507
+ since it can emit only one photon in each sequence. We
508
+ measure g(2)(0) = 0.23 ± 0.06, and g(2)(k) = 1 ± 0.04
509
+ for k ̸= 0 (see Fig. 4c), thus showing clear anti-bunching
510
+ in each sequence, whereas the emission from different se-
511
+ quences is uncorrelated. The non-zero value of g(2)(0)
512
+ may be due to heating; in any case, the fact that its
513
+ value is well below 0.5 further suggests that the spectral
514
+ peak under study is a single microwave photon emitter,
515
+ in the form of an individual Er3+ electron-spin.
516
+ We use the same dataset to quantify the single-spin
517
+ SNR for a certain measurement time tm. For that, we
518
+ sum the counts obtained over sequences played during a
519
+ tm time window, integrated over the first 2 ms following
520
+ the excitation pulse, yielding the number of counts C.
521
+ Figure 4d shows the count probability histogram p(C)
522
+ for tm = 1 s, with and without π pulses applied. Both his-
523
+ tograms are well reproduced by a Poissonian distribution
524
+ (see Fig. 4d). The single-spin SNR defined as Cspin/δCπ
525
+ has a value of 1.91. Here, Cspin is the difference between
526
+ the mean number of counts and δCπ the half-width of the
527
+ distribution with π pulse applied. A comparison with the
528
+ expected SNR requires measuring the overall efficiency η,
529
+ which we find to be equal to η = 0.12±0.01 by integrating
530
+ the fluorescence signal after the π pulse with subtracted
531
+ background. This value of η results from the SMPD finite
532
+ efficiency, resonator internal losses, and microwave losses
533
+ in-between the spin resonator and the SMPD (see Meth-
534
+ ods). We deduce an optimal theoretical SNR of ∼ 2.5
535
+ (see Methods), close to our measured value.
536
+ We also
537
+ verify that the SNR scales as the square root of the mea-
538
+ surement time tm up to at least 1 minute (see Fig. 4e),
539
+ indicative of good measurement stability.
540
+ The ability to address individual spins with microwaves
541
+ opens the way to using them as spin qubits for quan-
542
+ tum computing, and it is thus interesting to characterize
543
+ their coherence properties. The longitudinal relaxation
544
+ time T1 is obtained simply from the fluorescence curve
545
+ decay; we select a spin (s6) with T1 = 1.46 ± 0.05 ms
546
+ (see Fig. 5a) at resonance (δ = 0).
547
+ We then measure
548
+ the free-induction-decay time using a Ramsey sequence
549
+ π/2X − τ − π/2Φ, with the relative inter-pulse phase
550
+ Φ = 2π∆τ, where ∆ = 0.025 MHz.
551
+ The excess count
552
+ ⟨ ˜C⟩ shows oscillations at frequency ∆ + δ, damped with
553
+ an approximately Gaussian shape and a characteristic
554
+ relaxation time T ∗
555
+ 2 = 170 ± 33 µs, corresponding to a
556
+ ∼ 2 kHz single-spin linewidth (see Fig. 5c). We use the
557
+ Ramsey sequence to accurately measure δ, making it pos-
558
+ 0
559
+ 2
560
+ 4
561
+ 6
562
+ 0.12
563
+ 0.14
564
+ 0.16
565
+ 0.18
566
+ 0.0
567
+ 0.1
568
+ 0.2
569
+ 0.0
570
+ 0.1
571
+ 0.2
572
+ 0
573
+ 1
574
+ 2
575
+ 3
576
+ 4
577
+ 0.0
578
+ 0.1
579
+ 0
580
+ 1
581
+ 2
582
+ 3
583
+ 4
584
+ 5
585
+ 6
586
+ 0.0
587
+ 0.1
588
+ -500
589
+ 0
590
+ 500
591
+ 0
592
+ 1
593
+ 2
594
+ 3
595
+ 4
596
+ 5
597
+ 6
598
+ 〈C〉(counts / ms)
599
+ .
600
+ .
601
+ td (ms)
602
+ 〈C〉(counts)
603
+ � (ms)
604
+ 〈C〉(counts)
605
+ 2 � (ms)
606
+ 〈C〉(counts)
607
+ 4 � (ms)
608
+ T1 (ms)
609
+ � / 2� (kHz)
610
+ .
611
+ T2
612
+ PDD = 2.99 ± 0.33 ms
613
+ T2 = 2.47 ± 0.31 ms
614
+ T2* = 0.17 ± 0.03 ms
615
+ a
616
+ b
617
+ T1=1.42±0.07 ms
618
+ c
619
+ d
620
+ e
621
+
622
+ td
623
+
624
+ 2X
625
+
626
+
627
+ 2����
628
+
629
+
630
+ 2X
631
+
632
+ 2����
633
+ �X
634
+
635
+
636
+ 2X
637
+
638
+ 2����
639
+ �Y �Y �Y
640
+
641
+
642
+
643
+ Figure 5.
644
+ Coherence time measurements of spin
645
+ s6.
646
+ (a) Energy relaxation:
647
+ measured average count rate
648
+ ⟨ ˙C⟩ (blue dots) as a function of delay td after a resonant
649
+ π excitation pulse. Exponential fit (solid orange line) yields
650
+ the energy relaxation time T1. (b) Purcell effect: measured
651
+ T1 as a function of spin-resonator frequency detuning δ (or-
652
+ ange dots). A fit to Γ−1
653
+ R (δ) (solid black line) yields the spin-
654
+ resonator coupling constant g0/2π = 3.54 ± 0.15 kHz.
655
+ (c)
656
+ Ramsey sequence (see inset):
657
+ measured excess counts ⟨ �C⟩
658
+ versus delay time τ between two resonant π/2 pulses with
659
+ relative phase ϕ(τ) = 2π∆τ and ∆ = 0.025 MHz (dots).
660
+ The corresponding fit (solid line) by a sine function with a
661
+ Gaussian-decaying envelope (dash lines) yields a coherence
662
+ time T ∗
663
+ 2 = 0.17 ± 0.03 ms. (d) Hahn-echo sequence (see in-
664
+ set): measured excess counts ⟨ �C⟩ versus delay τ between sub-
665
+ sequent pulses with a linearly increasing phase ϕ(τ) = 2π∆τ
666
+ with ∆ = 0.001 MHz on the last pulse (red dots). The cor-
667
+ responding fit and its envelope (solid and dash lines) yield a
668
+ coherence time T2 = 2.47 ± 0.31 ms. (e) Periodic Dynami-
669
+ cal Decoupling sequence (see inset): measured excess counts
670
+ ⟨ �C⟩ versus inter-pulse delay time τ (red dots).
671
+ A linearly
672
+ increasing phase ϕ(τ) = 2π∆τ with ∆ = 0.001 MHz is im-
673
+ parted on the last pulse. Corresponding fit and its envelope
674
+ (solid and dash lines) are shown, yielding the coherence time
675
+ T P DD
676
+ 2
677
+ = 2.99±0.03 ms. Data taken at B0 = 422.085 mT and
678
+ θ = −0.003◦.
679
+
680
+ 6
681
+ sible to determine the dependence of the spin longitu-
682
+ dinal relaxation time T1 on δ (Fig. 5b).
683
+ It is seen to
684
+ increase with δ quadratically, in agreement with the ex-
685
+ pected Γ−1
686
+ R
687
+ dependence [18]; a fit yields a coupling con-
688
+ stant g0/2π = 3.56 kHz (see Fig. 5b).
689
+ This confirms
690
+ that non-radiative relaxation is negligible in our mea-
691
+ surements (see Methods), and that T1 ≃ Γ−1
692
+ R
693
+ for the
694
+ most strongly coupled spins.
695
+ The Hahn echo coherence time is measured by apply-
696
+ ing the sequence π/2X − τ − πY − τ − π/2Φ [33], with
697
+ Φ = 2π∆τ. An oscillation at frequency ∆ is observed
698
+ in ⟨ ˜C⟩, exponentially relaxing with a characteristic time
699
+ T2 = 2.47 ± 0.31 ms. This is close to the radiative de-
700
+ cay limit 2T1, indicating that the pure dephasing echo
701
+ contribution is ∼ 16 ± 5 ms, in line with measurements
702
+ on ensembles of Er3+ : CaWO4 electron spins [34]. This
703
+ dephasing can be suppressed further by a 3-π-pulse Pe-
704
+ riodic Dynamical Decoupling sequence, yielding a trans-
705
+ verse relaxation time T P DD
706
+ 2
707
+ = 2.99 ± 0.33 ms, which is
708
+ equal to 2T1 to the accuracy of the measurement. These
709
+ coherence times were also measured on a set of five Er3+
710
+ electron spins; T ∗
711
+ 2 varies strongly among these ions (be-
712
+ tween 5µs and 300µs), whereas T2 and T P DD
713
+ 2
714
+ are consis-
715
+ tently close to 2T1 (see Methods). The variation of co-
716
+ herence time among different spins can be explained by
717
+ the varying nuclear spin or paramagnetic environment of
718
+ each ion, and also possibly their degree of exposure to
719
+ surface magnetic noise given their approximate depth of
720
+ ∼ 100 − 150 nm according to Fig. 2 [31, 35]. It is also
721
+ noteworthy that the coherence times measured here are
722
+ on par with the longest reported for individual electron
723
+ spins in solid-state [14], in a platform which gives access
724
+ to several tens of these spin qubits by simply tuning the
725
+ magnetic field.
726
+ We now discuss the significance of our results for prac-
727
+ tical single electron spin resonance spectroscopy.
728
+ One
729
+ particularly interesting aspect of our method is its appli-
730
+ cability to a broad range of paramagnetic species, pro-
731
+ vided their radiative relaxation rate ΓR can be enhanced
732
+ up to ∼ 103s−1 or higher by the Purcell effect, and their
733
+ non-radiative relaxation rate is smaller than ΓR. Note
734
+ that no requirement on the coherence time applies, as
735
+ the fluorescence signal is entirely incoherent.
736
+ Indeed,
737
+ many paramagnetic impurities have non-radiative relax-
738
+ ation rates in the range of 10−3−103 s−1 at ∼ 1−4 K [36–
739
+ 38], and thus also likely at millikelvin temperatures.
740
+ Although reaching the desired radiative relaxation rate
741
+ of ΓR > 103s−1 was made easier in this work by the
742
+ large transverse g-factor of 8.3 in Er3+ : CaWO4, this
743
+ large relaxation rate was also demonstrated for donor
744
+ spins in silicon with g-factors of only 2, using a simi-
745
+ lar resonator geometry but with a narrower and shorter
746
+ wire [25]. Whereas in our experiment the spins are lo-
747
+ cated in the sample supporting the resonator, it is also
748
+ possible to deposit a small volume of a spin-containing
749
+ insulating material, such as a powder or micro-crystal,
750
+ onto a pre-fabricated resonator device.
751
+ Such an ap-
752
+ proach could be suitable for measuring individual rare-
753
+ earth-ion-containing molecules [6], nanocrystals [39], or
754
+ proteins whose active center contains a transition-metal-
755
+ ion [40, 41].
756
+ Based on the
757
+ 10 µm3 detection volume
758
+ demonstrated here using Er3+ : CaWO4, we extrapolate
759
+ that a 0.5 µm3 detection volume would be achievable for
760
+ an electron-spin with a g-factor of two, under the same
761
+ experimental conditions. All these metrics could be im-
762
+ proved with better SMPD performance, in particular re-
763
+ duced dark count rates, highlighting a strong motivation
764
+ for the continued development of SMPD devices.
765
+ In conclusion, we report spectroscopic measurements
766
+ of single rare-earth-ion electron spins by detecting their
767
+ microwave fluorescence, gaining four orders of magnitude
768
+ in spectral resolution by resolving the ensemble inhomo-
769
+ geneous linewidth. In our experiment, tens of individ-
770
+ ual spins with coherence times in excess of 1 millisecond
771
+ are interfaced with the same microwave resonator, which
772
+ opens new perspectives for hybrid quantum computing.
773
+ Because of its broad applicability, large detection vol-
774
+ ume, and spectroscopic capability, our detection method
775
+ comes close to practical single electron spin resonance at
776
+ cryogenic temperatures, and may thus open new appli-
777
+ cations in ESR spectroscopy.
778
+ Acknowledgements
779
+ We acknowledge technical support from P. Sénat, D.
780
+ Duet, P.-F. Orfila and S. Delprat, and are grateful for
781
+ fruitful discussions within the Quantronics group.
782
+ We
783
+ acknowledge support from the Agence Nationale de la
784
+ Recherche (ANR) through the Chaire Industrielle NAS-
785
+ NIQ under contract ANR-17-CHIN-0001 cofunded by
786
+ Atos, and through the MIRESPIN (ANR-19-CE47-0011)
787
+ and DARKWADOR (ANR-19-CE47-0004) projects. We
788
+ acknowledge support of the Région Ile-de-France through
789
+ the DIM SIRTEQ (REIMIC project), from CEA through
790
+ the DRF-Impulsion porgram (grant RPENANO), from
791
+ the AIDAS virtual joint laboratory, and from the France
792
+ 2030 plan under the ANR-22-PETQ-0003 grant.
793
+ This
794
+ project has received funding from the European Union
795
+ Horizon 2020 research and innovation program under
796
+ ERC-2021-STG grant agreement no. 101042315 (INGE-
797
+ NIOUS) and Marie Sklodowska-Curie grant agreement
798
+ no. 792727 (SMERC). Z.W. acknowledges financial sup-
799
+ port from the Sherbrooke Quantum Institute, from the
800
+ International Doctoral Action of Paris-Saclay IDEX, and
801
+ from the IRL-Quantum Frontiers Lab. We acknowledge
802
+ IARPA and Lincoln Labs for providing the Josephson
803
+ Traveling-Wave Parametric Amplifier.
804
+
805
+ 7
806
+ Author contributions
807
+ A.F. and P.G. grew the crystal, which M.L.D., Z.W.
808
+ and S.B. characterized through CW and pulse EPR mea-
809
+ surements. Z.W., D.V., P.B., E.F. designed the spin res-
810
+ onator. Z.W. fabricated the spin resonator. L.B., E.F.
811
+ designed the SMPD. L.B. fabricated the SMPD. M.R.
812
+ designed and installed the magnetic field stabilization.
813
+ Z.W., L.B., E.F. took the measurements.
814
+ Z.W., P.B.,
815
+ E.F. analyzed the data. Z.W., P.B., D.V., E.F. wrote
816
+ the article, with contributions from all the authors. P.B.
817
+ and E.F. supervised the project.
818
+ [1] Schweiger, A. & Jeschke, G. Principles of pulse electron
819
+ paramagnetic resonance (Oxford University Press, 2001).
820
+ [2] Wrachtrup, J., Von Borczyskowski, C., Bernard, J., Or-
821
+ ritt, M. & Brown, R. Optical detection of magnetic reso-
822
+ nance in a single molecule. Nature 363, 244–245 (1993).
823
+ [3] Gruber, A. et al. Scanning Confocal Optical Microscopy
824
+ and Magnetic Resonance on Single Defect Centers. Sci-
825
+ ence 276, 2012–2014 (1997).
826
+ [4] Raha, M. et al. Optical quantum nondemolition measure-
827
+ ment of a single rare earth ion qubit. Nature Commu-
828
+ nications 11, 1605 (2020). URL https://www.nature.
829
+ com/articles/s41467-020-15138-7.
830
+ [5] Elzerman, J. M. et al. Single-shot read-out of an indi-
831
+ vidual electron spin in a quantum dot. Nature 430, 431–
832
+ 435 (2004). URL https://www.nature.com/articles/
833
+ nature02693.
834
+ [6] Vincent, R., Klyatskaya, S., Ruben, M., Wernsdorfer, W.
835
+ & Balestro, F.
836
+ Electronic read-out of a single nuclear
837
+ spin using a molecular spin transistor. Nature 488, 357–
838
+ 360 (2012). URL https://www.nature.com/articles/
839
+ nature11341. Number: 7411 Publisher: Nature Publish-
840
+ ing Group.
841
+ [7] Pla, J. J. et al.
842
+ A single-atom electron spin qubit in
843
+ silicon.
844
+ Nature 489, 541–545 (2012).
845
+ URL https://
846
+ www.nature.com/articles/nature11449.
847
+ [8] Thiele, S. et al. Electrically driven nuclear spin resonance
848
+ in single-molecule magnets.
849
+ Science 344, 1135–1138
850
+ (2014). URL https://www.science.org/doi/full/10.
851
+ 1126/science.1249802. Publisher: American Associa-
852
+ tion for the Advancement of Science.
853
+ [9] Rugar, D., Budakian, R., Mamin, H. & Chui, B. Single
854
+ spin detection by magnetic resonance force microscopy.
855
+ Nature 430, 329–332 (2004).
856
+ [10] Baumann, S. et al. Electron paramagnetic resonance of
857
+ individual atoms on a surface.
858
+ Science 350, 417–420
859
+ (2015).
860
+ [11] Grinolds, M. et al.
861
+ Subnanometre resolution in three-
862
+ dimensional magnetic resonance imaging of individual
863
+ dark spins. Nature nanotechnology 9, 279–284 (2014).
864
+ [12] Albertinale, E. et al. Detecting spins by their fluorescence
865
+ with a microwave photon counter.
866
+ Nature 600, 434–
867
+ 438 (2021). URL https://www.nature.com/articles/
868
+ s41586-021-04076-z.
869
+ [13] Lescanne, R. et al. Irreversible Qubit-Photon Coupling
870
+ for the Detection of Itinerant Microwave Photons. Phys-
871
+ ical Review X 10, 021038 (2020). URL https://link.
872
+ aps.org/doi/10.1103/PhysRevX.10.021038.
873
+ [14] Muhonen, J. T. et al. Storing quantum information for 30
874
+ seconds in a nanoelectronic device. Nature Nanotechnol-
875
+ ogy 9, 986–991 (2014). URL http://www.nature.com/
876
+ doifinder/10.1038/nnano.2014.211.
877
+ [15] Shi, F. et al. Single-protein spin resonance spectroscopy
878
+ under ambient conditions.
879
+ Science 347, 1135–1138
880
+ (2015). URL https://www.science.org/doi/full/10.
881
+ 1126/science.aaa2253.
882
+ [16] Shi, F. et al. Single-DNA electron spin resonance spec-
883
+ troscopy in aqueous solutions. Nature Methods 15, 697–
884
+ 699 (2018). URL https://www.nature.com/articles/
885
+ s41592-018-0084-1.
886
+ [17] Orrit, M. & Bernard, J.
887
+ Single pentacene molecules
888
+ detected by fluorescence excitation in a p-terphenyl
889
+ crystal.
890
+ Physical
891
+ Review
892
+ Letters
893
+ 65,
894
+ 2716–2719
895
+ (1990).
896
+ URL
897
+ https://link.aps.org/doi/10.1103/
898
+ PhysRevLett.65.2716.
899
+ [18] Bienfait, A. et al.
900
+ Controlling Spin Relaxation with a
901
+ Cavity. Nature 531, 74 – 77 (2016).
902
+ [19] Kubo, Y. et al. Electron spin resonance detected by a
903
+ superconducting qubit. Phys. Rev. B 86, 064514 (2012).
904
+ [20] Bienfait, A. et al. Reaching the quantum limit of sen-
905
+ sitivity in electron spin resonance. Nature Nanotechnol-
906
+ ogy 11, 253–257 (2016). URL https://www.nature.com/
907
+ articles/nnano.2015.282.
908
+ [21] Haikka, P., Kubo, Y., Bienfait, A., Bertet, P. & Moelmer,
909
+ K. Proposal for detecting a single electron spin in a mi-
910
+ crowave resonator. Phys. Rev. A 95, 022306 (2017).
911
+ [22] Eichler, C., Sigillito, A., Lyon, S. & Petta, J. Electron
912
+ Spin Resonance at the Level of 10^4 Spins Using Low
913
+ Impedance Superconducting Resonators.
914
+ Physical Re-
915
+ view Letters 118, 037701 (2017). URL https://link.
916
+ aps.org/doi/10.1103/PhysRevLett.118.037701.
917
+ [23] Budoyo, R. P. et al.
918
+ Electron paramagnetic reso-
919
+ nance spectroscopy of Er3+:YSO using a Josephson
920
+ bifurcation amplifier:
921
+ Observation of hyperfine and
922
+ quadrupole structures.
923
+ Physical Review Materials 2,
924
+ 011403 (2018).
925
+ URL https://link.aps.org/doi/10.
926
+ 1103/PhysRevMaterials.2.011403.
927
+ [24] Budoyo, R. P., Kakuyanagi, K., Toida, H., Matsuzaki, Y.
928
+ & Saito, S. Electron spin resonance with up to 20 spin
929
+ sensitivity measured using a superconducting flux qubit.
930
+ Applied Physics Letters 116, 194001 (2020). URL https:
931
+ //aip.scitation.org/doi/10.1063/1.5144722.
932
+ Pub-
933
+ lisher: American Institute of Physics.
934
+ [25] Ranjan, V. et al. Electron spin resonance spectroscopy
935
+ with femtoliter detection volume. Applied Physics Letters
936
+ 116, 184002 (2020). URL https://aip.scitation.org/
937
+ doi/10.1063/5.0004322. Publisher: American Institute
938
+ of Physics.
939
+ [26] Antipin, A., Katyshev, A., Kurkin, I. & Shekun, L. Para-
940
+ magnetic resonance and spin-lattice relaxation of Er3+
941
+ and Tb3+ ions in CaWO4 crystal lattice.
942
+ Sov. Phys.
943
+ Solid State 10, 468 (1968).
944
+ [27] Mims, W. B. & Gillen, R. Broadening of Paramagnetic-
945
+ Resonance Lines by Internal Electric Fields. Physical Re-
946
+ view 148, 438–443 (1966). URL https://link.aps.org/
947
+ doi/10.1103/PhysRev.148.438.
948
+ [28] Kindem, J. M. et al.
949
+ Control and single-shot readout
950
+ of an ion embedded in a nanophotonic cavity.
951
+ Nature
952
+ 580, 201–204 (2020).
953
+ URL https://www.nature.com/
954
+ articles/s41586-020-2160-9.
955
+
956
+ 8
957
+ [29] Dibos,
958
+ A.,
959
+ Raha,
960
+ M.,
961
+ Phenicie,
962
+ C. & Thompson,
963
+ J.
964
+ Atomic Source of Single Photons in the Tele-
965
+ com Band.
966
+ Physical Review Letters
967
+ 120,
968
+ 243601
969
+ (2018).
970
+ URL
971
+ https://link.aps.org/doi/10.1103/
972
+ PhysRevLett.120.243601.
973
+ [30] Pla, J. et al.
974
+ Strain-Induced Spin-Resonance Shifts in
975
+ Silicon Devices.
976
+ Physical Review Applied 9, 044014
977
+ (2018).
978
+ URL
979
+ https://link.aps.org/doi/10.1103/
980
+ PhysRevApplied.9.044014.
981
+ [31] Ranjan, V. et al.
982
+ Spatially-resolved decoherence of
983
+ donor spins in silicon strained by a metallic elec-
984
+ trode.
985
+ arXiv:2101.04391
986
+ [cond-mat,
987
+ physics:quant-
988
+ ph] (2021).
989
+ URL http://arxiv.org/abs/2101.04391.
990
+ ArXiv: 2101.04391.
991
+ [32] Broadway, D. A. et al.
992
+ Microscopic Imaging of the
993
+ Stress Tensor in Diamond Using in Situ Quantum Sen-
994
+ sors. Nano Letters 19, 4543–4550 (2019). URL https:
995
+ //doi.org/10.1021/acs.nanolett.9b01402.
996
+ [33] Billaud, E. et al.
997
+ Microwave fluorescence detection of
998
+ spin echoes (2022). URL https://arxiv.org/abs/2208.
999
+ 13586. Publisher: arXiv Version Number: 1.
1000
+ [34] Le Dantec, M. et al. Twenty-three-millisecond electron
1001
+ spin coherence of erbium ions in a natural-abundance
1002
+ crystal.
1003
+ Science Advances 7, eabj9786.
1004
+ URL https:
1005
+ //www.science.org/doi/10.1126/sciadv.abj9786.
1006
+ [35] Myers, B. et al.
1007
+ Probing Surface Noise with Depth-
1008
+ Calibrated Spins in Diamond. Physical Review Letters
1009
+ 113, 027602 (2014). URL https://link.aps.org/doi/
1010
+ 10.1103/PhysRevLett.113.027602.
1011
+ [36] Castle, J. G. & Feldman, D. W. Resonance Modes at
1012
+ Defects in Crystalline Quartz.
1013
+ Physical Review 137,
1014
+ A671–A673 (1965).
1015
+ URL https://link.aps.org/doi/
1016
+ 10.1103/PhysRev.137.A671.
1017
+ [37] Gayda, J.-P. et al.
1018
+ Temperature dependence of the
1019
+ electronic
1020
+ spin-lattice
1021
+ relaxation
1022
+ time
1023
+ in
1024
+ a
1025
+ 2-iron-
1026
+ 2-sulfur
1027
+ protein.
1028
+ Biochimica
1029
+ et
1030
+ Biophysica
1031
+ Acta
1032
+ (BBA) - Protein Structure 581, 15–26 (1979).
1033
+ URL
1034
+ http://www.sciencedirect.com/science/article/
1035
+ pii/0005279579902162.
1036
+ [38] Zhou, Y., Bowler, B. E., Eaton, G. R. & Eaton,
1037
+ S. S.
1038
+ Electron Spin Lattice Relaxation Rates for S
1039
+ = 12 Molecular Species in Glassy Matrices or Magnet-
1040
+ ically Dilute Solids at Temperatures between 10 and
1041
+ 300 K.
1042
+ Journal of Magnetic Resonance 139, 165–174
1043
+ (1999). URL http://www.sciencedirect.com/science/
1044
+ article/pii/S1090780799917639.
1045
+ [39] Casabone, B. et al.
1046
+ Dynamic control of Purcell en-
1047
+ hanced emission of erbium ions in nanoparticles.
1048
+ Na-
1049
+ ture Communications 12, 3570 (2021).
1050
+ URL https:
1051
+ //www.nature.com/articles/s41467-021-23632-9.
1052
+ [40] Coremans,
1053
+ J. W. A. et al.
1054
+ A W-Band Electron
1055
+ Paramagnetic Resonance Study of a Single Crystal of
1056
+ Azurin. Journal of the American Chemical Society 116,
1057
+ 3097–3101 (1994).
1058
+ URL https://doi.org/10.1021/
1059
+ ja00086a044.
1060
+ [41] Doorslaer, S. V. & Vinck, E.
1061
+ The strength of EPR
1062
+ and ENDOR techniques in revealing structure-function
1063
+ relationships
1064
+ in
1065
+ metalloproteins.
1066
+ Physical
1067
+ Chem-
1068
+ istry Chemical Physics 9, 4620–4638 (2007).
1069
+ URL
1070
+ https://pubs.rsc.org/en/content/articlelanding/
1071
+ 2007/cp/b701568b.
1072
+
1073
+ Method
1074
+ (Dated: January 9, 2023)
1075
+ Sample
1076
+ The CaWO4 crystal used in this experiment origi-
1077
+ nates from a boule grown by the Czochralski method
1078
+ from CaCO3 (99.95% purity) and WO3 (99.9 % pu-
1079
+ rity).
1080
+ A sample was cut in a rectangular slab shape
1081
+ (7 mm × 4 mm × 0.5 mm), with the surface approx-
1082
+ imately in the (ac) crystallographic plane, and the c-
1083
+ axis parallel to its short edge. The crystal structure is
1084
+ tetragonal with unit cell constants a = b = 0.524 nm
1085
+ and c = 1.137 nm, as shown in Extended Data Fig. 1.
1086
+ The erbium ions Er3+ substitute to the calcium ions
1087
+ Ca2+ (with long-range charge compensation in the crys-
1088
+ tal). These sites have a S4 symmetry, leading to a gy-
1089
+ romagnetic tensor with only diagonal elements in the
1090
+ (a, b, c) plane γa = γb ≡ γ⊥ = 2π × 117.3 GHz/T, and
1091
+ γc ≡ γ|| = 2π × 17.45 GHz/T [1]. The residual doping
1092
+ concentration of erbium is 3.1 ± 0.2 ppb, measured from
1093
+ continuous-wave EPR spectroscopy [2].
1094
+ Extended
1095
+ Data
1096
+ Fig.
1097
+ 1:
1098
+ Crystal
1099
+ structure
1100
+ of
1101
+ Er3+ : CaWO4 (oxygen is not shown for clarity).
1102
+ On top of this sample, a lumped-element LC resonator
1103
+ was fabricated by sputtering 50nm of niobium and pat-
1104
+ terning the thin film by electron-beam lithography and
1105
+ reactive ion etching. The sample is placed in a 3D cop-
1106
+ per cavity with a single microwave antena and SMA port
1107
+ used both for the excitation and the readout in reflec-
1108
+ tion. As shown in Extended Data Fig.2, the "bow-tie"
1109
+ shaped resonator consists of an interdigitated capacitor
1110
+ shunted by a 94 µm × 600 nm inductive wire in the mid-
1111
+ dle. From finite-element microwave simulations, we de-
1112
+ duce an impedance of 17.5 Ω. The geometric inductance
1113
+ of the inductance wire contributes 33% of the total res-
1114
+ onator inductance. The top and bottom capacitor pads
1115
+ are shaped as parallel fingers in an effort to improve the
1116
+ resonator resilience to an applied residual magnetic field
1117
+ perpendicular to the metallic film (along x).
1118
+ 20 μm
1119
+ 10 μm
1120
+ 0.85 mm
1121
+ 1.44 mm
1122
+ Inductive wire:
1123
+ - Length: 94 μm
1124
+ - Width: 600 nm
1125
+ Extended Data Fig. 2: Resonator design.
1126
+ Experimental setup
1127
+ The complete setup schematic is shown in Extended
1128
+ Data Fig. 9
1129
+ Room-temperature setup
1130
+ Its room-temperature part uses five microwave sources
1131
+ and one FPGA-based instrument (OPX platform from
1132
+ Quantum Machine) for arbitrary waveform generation,
1133
+ digitization, and real time feedback. The OPX instru-
1134
+ ment contains 10 channels of analog outputs (AO), 10
1135
+ digital outputs (DO) and 2 analog inputs (AI).
1136
+ The pulses used to drive the spins are generated by I/Q
1137
+ mixing a pair of in-phase (I) and quadrature (Q) signals
1138
+ from the OPX with a local oscillator (LO - orange) at the
1139
+ spin resonator frequency ω0. The upconverted microwave
1140
+ signal is then split over 2 branches, one of them including
1141
+ an about 40 dB amplifier, which are then recombined.
1142
+ Only one of the branch is chosen to propagate the signal,
1143
+ with two fast switches controlled by digital lines from
1144
+ the OPX. The spin excitation pulses enters the dilution
1145
+ refrigerator through line 2.
1146
+ The SMPD operation (see [3] for details) involves one
1147
+ dc-current and three microwave sources, the role of which
1148
+ are as follows: (1) A Yokogawa current source (red) pro-
1149
+ vides the necessary flux bias to bring the SQUID-tunable
1150
+ buffer resonator of the SMPD at ωb in resonance with
1151
+ arXiv:2301.02653v1 [quant-ph] 6 Jan 2023
1152
+
1153
+ b
1154
+ WO4
1155
+ Ca2+
1156
+ Er3+
1157
+ a
1158
+ 0.524 nm
1159
+ 1.137 nm2
1160
+ the spin resonator at ω0, so that the fluorescence pho-
1161
+ tons emitted by the spins are at the center of the SMPD
1162
+ detection bandwidth. (2) A pump drive (purple) at fre-
1163
+ quency ωp enables a four-wave mixing process convert-
1164
+ ing an incoming photon in the buffer into an excitation
1165
+ of a superconducting transmon qubit at ωq and a pho-
1166
+ ton in a readout (waste) resonator at ωw, according to
1167
+ ωp + ωb = ωq + ωw. (3) The readout of the qubit is per-
1168
+ formed by probing by homodyne detection (green) the
1169
+ qubit-state dependent dispersive shift of the readout res-
1170
+ onator.
1171
+ (4) Control pulses of the qubit are generated
1172
+ with a sideband mixer from one OPX IF output and the
1173
+ blue LO source. They are combined with the pump pulse
1174
+ and are sent to line 7.
1175
+ A Rohde & Schwarz microwave source (yellow) at the
1176
+ input of line 5 provides the pump power for a traveling
1177
+ wave parametric amplifier (TWPA) placed at 10 mK.
1178
+ Low-temperature setup
1179
+ The spin excitation pulses (line 2) are heavily atten-
1180
+ uated (∼ 110 dB) to minimize the thermal excitation of
1181
+ the qubit and dark counts. They are directed, through a
1182
+ double- and a single-junction circulator, to the antenna
1183
+ of the cavity containing the spin resonator. The reflected
1184
+ and output signals on this antenna are routed to the in-
1185
+ put of the SMPD through a single-junction circulator. To
1186
+ pre-characterize the spin resonator as well as the SMPD,
1187
+ the signal reflected on the SMPD input is routed to room-
1188
+ temperature via the same single- and double-junction cir-
1189
+ culators and output line 1 with a first HEMT amplifier;
1190
+ isolation of the experiment from this HEMT is provided
1191
+ by a double circulator and an extra 10dB attenuation.
1192
+ Note that during all measurements reported in the main
1193
+ text, this line 1 was left open and its HEMT switched off.
1194
+ SMPD qubit readout pulses are sent via the attenu-
1195
+ ated line 4 and a double circulator. The reflected sig-
1196
+ nal is routed to a Josephson Traveling Wave Parametric
1197
+ Amplifier (TWPA) pumped from line 5 via a directional
1198
+ coupler and to a second HEMT at the 4 K stage.
1199
+ A
1200
+ double-circulator isolates the TWPA from this HEMT.
1201
+ The SMPD pump tone and qubit reset pulses are ap-
1202
+ plied via line 7 and its 20dB directional coupler. The
1203
+ other 2 ports of the coupler are connected to a 50Ω load
1204
+ at 800 mK and a 50Ω-loaded circulator at 10mK, in order
1205
+ to minimize the noise induced by the dissipation of these
1206
+ signals.
1207
+ Single microwave photon detector
1208
+ The SMPD is operated in cycles of 12.8 µs on average.
1209
+ Each cycle is composed of three steps: (i) the pumped
1210
+ conversion of an incoming photon into a qubit excitation
1211
+ during 10 µs, (ii) the qubit dispersive readout lasting
1212
+ 2 µs, and (iii) the conditional reset of the qubit to its
1213
+ ground state if it was detected excited. This reset consists
1214
+ of one or several π-pulse(s) applied to the qubit until it is
1215
+ measured in its ground state. The conditional reset time
1216
+ is thus non-deterministic, and lasts from 0.7 µs (feedback
1217
+ time with the OPX) to 0.7 + (2 + 0.7)k µs, with k the
1218
+ number of π pulses applied.
1219
+ At each cycle, a count C = 1 is detected if the qubit
1220
+ is found in its excited state (before the reset), and the
1221
+ count time is recorded with sub-microsecond accuracy.
1222
+ The SMPD is characterized independently, in absence
1223
+ of spin signal, by measuring its key figures of merit in
1224
+ terms of dark count rate, efficiency, and bandwidth.
1225
+ Dark count rate. - We define dark counts as the counts
1226
+ that are not due to the spins, that is those originating
1227
+ from spurious excitation of the transmon qubit in absence
1228
+ of incoming photons, and those due to unwanted photons
1229
+ present at the SMPD input [3]. For this detector, a dark
1230
+ count rate of 106 ± 3 s−1 has been measured over 24
1231
+ hours (data from Extended Data Fig. 7). We observed
1232
+ slow darkcount rate fluctuations over week time scales
1233
+ ranging typically from 130 s−1 to 90 s−1 mainly due to
1234
+ variation in qubit T1 and a slow cooling down of the line
1235
+ and of the qubit. We can discriminate dark count contri-
1236
+ butions from the microwave line thermal occupancy, from
1237
+ the pump heating and from the qubit thermal occupancy
1238
+ by switching off and detuning the pump tone from the
1239
+ four wave mixing frequency. By detuning the pump by
1240
+ 10 MHz, the detection efficiency is set close to zero but
1241
+ the pump heating load persists, we measure count rates
1242
+ of 11 s−1. When the pump is turned off, the dark count
1243
+ rate is 9 s−1, indicating that the pump heating is negligi-
1244
+ ble. From these measurement, we conclude that 92% of
1245
+ the dark counts come from thermal microwave photons
1246
+ reaching the SMPD via its input line. This corresponds
1247
+ to a thermal population of ∼ 2.4 × 10−4 photons in the
1248
+ line, and to an effective temperature of ∼ 42 mK, to be
1249
+ compared to the measured 10 mK base temperature of
1250
+ the refrigerator.
1251
+ Efficiency.
1252
+ - The detector efficiency is measured by
1253
+ shining a microwave tone of known power at the detector
1254
+ input. The average input photon flux for a given applied
1255
+ power is calibrated in-situ by measuring the transmon
1256
+ qubit a.c. Stark shift and dephasing [4]. The SMPD ef-
1257
+ ficiency is then simply taken as the ratio between the
1258
+ counts detected over 1s and the photon flux (in pho-
1259
+ ton/s). It was measured for different input powers, as
1260
+ shown in Extended Data Fig.3a: At hundreds of input
1261
+ photons per second, a value close to the fluorescence sig-
1262
+ nal obtained at high excitation power, the efficiency is
1263
+ ηSMP D = 0.32. The detector saturates and the efficiency
1264
+ drops at input fluxes above 104 photons/s. Further opti-
1265
+ mizing the lifetime of the transmon qubit as well as the
1266
+ readout and pump power for four-wave mixing, would
1267
+ probably yield a better efficiency.
1268
+ Bandwidth. - The detector bandwidth is extracted by
1269
+
1270
+ 3
1271
+ 0
1272
+ 50
1273
+ 100
1274
+ 150
1275
+ 200
1276
+ Incoming photon rate (
1277
+
1278
+ )
1279
+ ×103
1280
+ −1
1281
+ s
1282
+ 0
1283
+ 10
1284
+ 20
1285
+ 30
1286
+ Efficiency (%)
1287
+ 7.331 7.332 7.333 7.334 7.335 7.336
1288
+ Microwave frequency (GHz)
1289
+ 10
1290
+ −4
1291
+ 10
1292
+ −3
1293
+ 10
1294
+ −2
1295
+ 10
1296
+ −1
1297
+ ⟨ ⟩
1298
+ C (counts)
1299
+ 0.9 MHz
1300
+ b
1301
+ MW on
1302
+ MW off
1303
+ 0
1304
+ 20
1305
+ 40
1306
+ Count rate (
1307
+
1308
+ )
1309
+ ×103
1310
+ −1
1311
+ s
1312
+ a
1313
+ Extended Data Fig. 3: SMPD characteristics.
1314
+ (a)
1315
+ SMPD efficiency. Detected click rate (red) and efficiency
1316
+ (blue) as a function of input photon flux.
1317
+ Below 104
1318
+ s−1 (linear regime), an efficiency of 32% is obtained. (b)
1319
+ SMPD bandwidth. Average number of detected counts as
1320
+ a function of photon frequency when the input microwave
1321
+ tone is switched on (red dots) or off (gray dots). The solid
1322
+ line is a Lorentzian fit to the data yielding a FWHM
1323
+ bandwidth of 0.9 MHz.
1324
+ measuring the average detected counts ⟨C⟩ as a func-
1325
+ tion of the microwave frequency. Each ∼ 10µs-long pulse
1326
+ contains 0.5 photon on average to mimic single spin de-
1327
+ tection. The full width at half maximum (FWHM) of
1328
+ a Lorentzian fit gives a bandwidth of 0.9 MHz for the
1329
+ detector, as shown in Extended Data Fig. 3b.
1330
+ Average number of counts
1331
+ In the case of Fig 2, We calculate the average number
1332
+ of counts
1333
+ ⟨C⟩ = 1
1334
+ N
1335
+ N
1336
+
1337
+ n=1
1338
+ T
1339
+
1340
+ 0
1341
+ cn(td)
1342
+ (1)
1343
+ by summing the counts from td = 0 to T, with N the
1344
+ number of repetitions of the experiment and cn(td) the 0
1345
+ or 1 SMPD outcome at time td.
1346
+ For the other figures (Figs. 3, 4 and 5) involving single
1347
+ spins, the fluorescence signal is measured as a function
1348
+ of time up to ∼ 5T1 after the excitation pulse, and its
1349
+ second half (close to the background level) is subtracted
1350
+ from the first part, leading to a background-corrected
1351
+ average number of counts
1352
+ ⟨ ˜C⟩ = 1
1353
+ N
1354
+ N
1355
+
1356
+ n=1
1357
+
1358
+
1359
+ T/2
1360
+
1361
+ 0
1362
+ cn(td) −
1363
+ T
1364
+
1365
+ T/2
1366
+ cn(td)
1367
+
1368
+ � .
1369
+ (2)
1370
+ Magnetic field alignment and stabilization
1371
+ The magnetic field B0 is generated by a 1T/1T/1T
1372
+ 3-axis superconducting vector magnet.
1373
+ Magnetic field
1374
+ alignment proceeds in two steps. We first align the field
1375
+ in the sample plane (y − z) by applying a small field
1376
+ of 50 mT, and minimizing the resonator losses and fre-
1377
+ quency shift with respect to the zero-field values [2]. We
1378
+ then determine the direction of the projection of the crys-
1379
+ tallographic c-axis on the sample plane, defined as θ = 0◦,
1380
+ by measuring the erbium ensemble line (as shown in Fig.2
1381
+ of the main text) for various angles in the (y − z) plane.
1382
+ Due to the anisotropy of the gyromagnetic tensor γ0, B0
1383
+ can be expressed with angle θ and β as
1384
+ Bpeak
1385
+ 0
1386
+ = ℏω0/
1387
+
1388
+ γ2
1389
+ ∥cos2θcos2β + γ2
1390
+ ⊥(1 − cos2θcos2β),
1391
+ (3)
1392
+ where θ = 0◦ corresponds to the maximum of B0 and
1393
+ β is the angle between the c-axis and sample plane. As
1394
+ shown in Extended Data Fig. 4, the fitting (solid line)
1395
+ with eq. 3 to the data (dots) yields β = 0.5◦.
1396
+ 1.00
1397
+ 0.75
1398
+ 0.50
1399
+ 0.25
1400
+ 0.00
1401
+ 0.25
1402
+ 0.50
1403
+ (deg)
1404
+ 417.0
1405
+ 417.5
1406
+ 418.0
1407
+ 418.5
1408
+ 419.0
1409
+ 419.5
1410
+ Bpeak
1411
+ 0
1412
+ (mT)
1413
+ Extended Data Fig. 4: Magnetic field alignement.
1414
+ Measured (dots) magnetic field Bpeak
1415
+ 0
1416
+ at which the center
1417
+ of the spin ensemble line is found, as a function of the
1418
+ angle θ that the field makes with the c axis projection.
1419
+ The fit with eq. 3 (line) to the data yields the θ = 0
1420
+ origin (see text), as well as the angle between the c axis
1421
+ and the sample plane, β = 0.5◦.
1422
+ Note that this procedure does not guarantee that the
1423
+ resonator nanowire exactly coincides with the θ = 0◦ di-
1424
+ rection determined by our alignment procedure. In fact,
1425
+ a small residual angle (possibly of order 1◦) likely ex-
1426
+ ists between the two directions. Since we have no way
1427
+
1428
+ 4
1429
+ to determine this angle, and since its non-zero value has
1430
+ negligible impact on any of the results found in the arti-
1431
+ cle, we used a zero value by simplicity for plotting Fig.
1432
+ 2a.
1433
+ The stability of the magnetic field is determined by
1434
+ the mode of operation (current supplied mode or per-
1435
+ sistent mode) of the three superconducting coils of the
1436
+ vector magnet and by their current sources. For the spec-
1437
+ troscopy data of the main text (Figs 2 and 3), the current
1438
+ supplied mode is used with a commercial current source
1439
+ (Four-Quadrant Power Supply Model 4Q06125PS from
1440
+ AMI). On the contrary, the data of Figs. 4 and 5 re-
1441
+ quire to tune the spin-resonator frequency difference δ
1442
+ and to keep it stable (less than 10kHz variation) over
1443
+ long periods of time. To achieve this goal, we use the
1444
+ fact that one of our coils is nearly aligned with the z-
1445
+ axis and thus provides the largest component of the B0
1446
+ field; we thus minimize the noise by placing it in persis-
1447
+ tent mode. Then, the coil closest to the y axis is used
1448
+ to fine-tune δ. The (much smaller) current through that
1449
+ coil is moreover further stabilized using a custom-made
1450
+ feedback loop based on a current meter (Keithley 2700
1451
+ model).
1452
+ Microwave induced heating and corresponding
1453
+ spurious signal
1454
+ We now discuss heating effects observed (as in [3]) af-
1455
+ ter a microwave pulse is applied to the spin resonator. To
1456
+ evidence and clarify this point, we first measure in three
1457
+ different cases the transcient signal recorded after an ex-
1458
+ citation pulse resonant with the SMPD buffer resonator:
1459
+ 1. Normal operation on a single spin: single spin, spin
1460
+ resonator and SMPD buffer are all in resonance.
1461
+ 2. Normal operation in absence of spins: All spins are
1462
+ far off-resonance, and spin resonator and SMPD
1463
+ buffer are on resonance.
1464
+ 3. Complementary diagnosis: All spins, spin resonator
1465
+ and SMPD buffer are detuned from one another.
1466
+ A 6µs-long excitation pulse is applied at time t = 0; the
1467
+ photon counting sequence starts 1 ms before the pulse,
1468
+ is interrupted (SMPD switched off) during the pulse du-
1469
+ ration, and is restarded during several ms.
1470
+ In normal operation (case 1 and 2 - red and blue in
1471
+ Fig. 5), a count rate spike is observed in the bin imme-
1472
+ diately following the excitation pulse; it corresponds to
1473
+ the decay (at rate κ−1) of the microwave energy stored
1474
+ by the pulse in the spin resonator.
1475
+ This spike disap-
1476
+ pears when the spin resonator is detuned from the signal
1477
+ (case 3), as expected.
1478
+ After the spike, even when no
1479
+ spin signal is present (case 2 - blue), extra counts above
1480
+ the background (grey) are however observed over a time
1481
+ window of about 0.3 ms after the pulse, with a decay
1482
+ time of ∼ 100µs. This extra signal is reminiscent of the
1483
+ one observed over ∼ 10 ms in [3], possibly shorter in the
1484
+ present work due to lower excitation pulse powers. For
1485
+ comparison, when detuning the spin resonator from the
1486
+ excitation (case 3 - orange in Fig. 5), the extra count rate
1487
+ is lower and reaches the background steady-state much
1488
+ faster.
1489
+ All these measurements with no spins indicate
1490
+ that the spurious extra counts decaying over ∼ 100µs in
1491
+ normal operation originate from the excitation and sub-
1492
+ sequent radiative decay of systems that are resonantly
1493
+ coupled to the spin resonator. It is tempting to identify
1494
+ them with the two-level-system bath that causes field de-
1495
+ cay and phase noise in superconducting circuits. In nor-
1496
+ mal operation with a spin (case1 - red in Fig. 5), these
1497
+ spurious extra counts of course adds to the relevant signal
1498
+ coming from the spin. To lower the impact of this tran-
1499
+ sient heating effect, the results of Fig. 4c (resp. Figs. 5a
1500
+ and b) were obtained by discarding the counts detected
1501
+ in the first 100µs (resp. 50µs) time window following the
1502
+ excitation.
1503
+ 0
1504
+ 2
1505
+ 4
1506
+ 6
1507
+ Time (ms)
1508
+ 0
1509
+ 1
1510
+ 2
1511
+ 3
1512
+ 4
1513
+ 5
1514
+ ⟨ ̇⟩
1515
+ C (counts / ms)
1516
+ 0.0
1517
+ 0.2
1518
+ 0.0
1519
+ 0.1
1520
+ 0.2
1521
+ 0.3
1522
+ 0.4
1523
+ 0.5
1524
+ t
1525
+ 0
1526
+ 6µs
1527
+ Detection
1528
+ cycle13µs
1529
+ Extended Data Fig. 5: Transient response of the sys-
1530
+ tem after microwave excitation. Measured average
1531
+ click rate versus time before and after a 6 µs-long mi-
1532
+ crowave excitation pulse is applied at time 0, for cases
1533
+ 1 (red), 2 (blue) and 3 (orange) - see text.
1534
+ SMPD is
1535
+ switched off during excitation. Dark count background
1536
+ is indicated in grey. Inset is a zoomed-in view around
1537
+ time 0.
1538
+ We finally study the dependence of this heating effect
1539
+ in absence of resonant spins on the excitation pulse du-
1540
+ ration and amplitude. For that we integrate over 8 ms
1541
+ the number of counts ⟨C⟩ after an excitation pulse, and
1542
+ repeat the sequence every 8 ms. The results in Extended
1543
+
1544
+ 5
1545
+ Fig.4 show an increase of ⟨C⟩ as a function of pulse du-
1546
+ ration and amplitude, as well as a characteristic time for
1547
+ this increase with pulse duration that decreases as ex-
1548
+ citation amplitude increases. We also verified that this
1549
+ increase of ⟨C⟩ is not due to microwave heating of the
1550
+ line attenuators, by repeating the same measurements
1551
+ with the spin resonator detuned from the SMPD buffer:
1552
+ a much smaller effect is observed, indicating that the ex-
1553
+ cess counts do come from the spin resonator.
1554
+ 0
1555
+ 5
1556
+ 10
1557
+ 15
1558
+ 20
1559
+ 25
1560
+ Pulse duration (�s)
1561
+ 1.0
1562
+ 1.5
1563
+ 2.0
1564
+ 2.5
1565
+ C (counts)
1566
+ × 1
1567
+ × 2
1568
+ × 4
1569
+ × 7
1570
+ Pulse
1571
+ amplitude
1572
+ SMPD in resonance
1573
+ SMPD detuned
1574
+ Extended Data Fig. 6:
1575
+ Heating versus spin exci-
1576
+ tation duration and amplitude. Measured average
1577
+ counts integrated over a 8ms-long window after an exci-
1578
+ tation pulse as a function of pulse duration and ampli-
1579
+ tude A, obtained when the spin resonator is detuned from
1580
+ (dash line) or in resonance with (solid line) the SMPD
1581
+ buffer. The excitation pulse frequency is always tuned to
1582
+ the SMPD buffer one.
1583
+ Intensity-intensity correlation measurements
1584
+ We now provide more details on the intensity-intensity
1585
+ correlation measurements used to prove the single spin
1586
+ character of our experiment.
1587
+ The dataset to be analyzed corresponds to two series
1588
+ of 4363635 sequences labelled from i=0 to i=4363634 re-
1589
+ peated every tr = 7.5 ms, where one serie includes a π
1590
+ pulse at time t = 0 and the other has no excitation pulse.
1591
+ Time t = 0 is followed by 600 SMPD cycles. As explained
1592
+ in the Heating section, the first 100µs window after the
1593
+ excitation pulse is excluded from the analysis in order to
1594
+ minimize the impact of the heating effect. The count data
1595
+ in the rest of the sequence are then grouped in subsequent
1596
+ 350µs-long timebins indexed by j (with j running from 0
1597
+ to 20), and centered at time τj = 100+(2j+1)×350/2 µs.
1598
+ The corresponding number of counts in the bin j of se-
1599
+ quence i is denoted as n(i)
1600
+ j .
1601
+ We first provide in Extended Data Fig. 7a a direct vi-
1602
+ sualization of the anti-bunching found on a single-spin
1603
+ peak.
1604
+ The count rate ⟨ ˙C⟩(t) is plotted as a function
1605
+ of time, first, averaged over all recorded sequences, and
1606
+ second, averaged over sequences with a count 1 in the
1607
+ first bin (conditioned curve).
1608
+ When measured on the
1609
+ background signal, the two curves are identical, whereas
1610
+ when measured on the single-spin peak (s0), the condi-
1611
+ tioned fluorescence rate is reduced at short times after
1612
+ the first count, compared to the average unconditioned
1613
+ one.
1614
+ In order to quantify this anti-bunching, we then com-
1615
+ pute the intensity-intensity correlation functions inside a
1616
+ sequence,
1617
+ g(2)(τ = τj)
1618
+ ⟨n(i)
1619
+ 0 n(i)
1620
+ j ⟩i
1621
+ ⟨n(i)
1622
+ 0 ⟩i⟨n(i)
1623
+ j ⟩i
1624
+ ,
1625
+ (4)
1626
+ as well as between two sequences separated by k excita-
1627
+ tion pulses,
1628
+ g(2)(k) = ⟨n(i)
1629
+ 0 n(i+k)
1630
+ 1
1631
+ + n(i)
1632
+ 1 n(i+k)
1633
+ 0
1634
+ ⟩i/2
1635
+ ⟨n(i)
1636
+ 0 ⟩i⟨n(i+k)
1637
+ 1
1638
+ ⟩i
1639
+ ,
1640
+ (5)
1641
+ where we keep only the first and second bin of the two
1642
+ sequences, symmetrize the function about k=0, and av-
1643
+ erage over all pairs of sequences with same separation
1644
+ k ∈ Z.
1645
+ The intra-sequence g(2)(τ) and inter-sequence g(2)(k)
1646
+ are shown in Extended Data Fig. 7c and d. The latter
1647
+ is then corrected from the background counts (leading to
1648
+ Fig. 4c in the main text) as explained below.
1649
+ Background correction
1650
+ We now describe how we subtract from g(2) the dark
1651
+ count rate contribution, in order to obtain a background-
1652
+ corrected correlation function.
1653
+ We assume that the clicks from the detector have two
1654
+ independent origins: emission sj from the spins, and Poi-
1655
+ sonnian background noise dj due to independent dark
1656
+ count events, such that nj = sj + dj, ⟨nj⟩ = ⟨sj⟩ + ⟨dj⟩,
1657
+ and ⟨sjdj⟩ = ⟨sj⟩⟨dj⟩.
1658
+ In addition, we assume that
1659
+ the instruments during the measurement time are sta-
1660
+ ble enough so that the dark count rate is time-invariant:
1661
+ ⟨dj⟩ = ⟨d⟩.
1662
+ We thus define the background-corrected autocorrela-
1663
+ tion function
1664
+ g(2)
1665
+ corr(k) = ⟨s(i)
1666
+ 0 s(i+k)
1667
+ 1
1668
+ + s(i)
1669
+ 1 s(i+k)
1670
+ 0
1671
+ ⟩i/2
1672
+ ⟨s(i)
1673
+ 0 ⟩i⟨s(i+k)
1674
+ 1
1675
+ ⟩i
1676
+ (6)
1677
+
1678
+ 6
1679
+ 0
1680
+ 5
1681
+ time (ms)
1682
+ 0.00
1683
+ 0.05
1684
+ 0.10
1685
+ 0.15
1686
+ C (clicks / ms)
1687
+ a
1688
+ 0
1689
+ 5
1690
+ time (ms)
1691
+ b
1692
+ 2.5
1693
+ 5.0
1694
+ 7.5
1695
+ (ms)
1696
+ 0.90
1697
+ 0.95
1698
+ 1.00
1699
+ 1.05
1700
+ g(2)( )
1701
+ c
1702
+ Background
1703
+ pulse on spins
1704
+ Dark count
1705
+ Single emitter
1706
+ with background
1707
+ Extended Data Fig. 7:
1708
+ Photon
1709
+ intensity
1710
+ auto-
1711
+ correlation function g(2) within one sequence. (a)
1712
+ Average count rate ⟨ ˙C⟩ as a function of delay time after
1713
+ a π excitation pulse, for all recorded sequences (red) and
1714
+ for sequences with a first click detected before 0.45ms
1715
+ (dark red). The reduction of ⟨ ˙C⟩ in the second case in-
1716
+ dicates the anti-bunching of spin fluorescence photons.
1717
+ (b) Average count rate ⟨ ˙C⟩ as a function of delay time,
1718
+ for all recorded background traces (gray) and for traces
1719
+ with a first click detected before 0.45ms (dark gray). The
1720
+ unchanged ⟨ ˙C⟩ in the second case indicates a Poissonian
1721
+ background made of independent dark count events. (c)
1722
+ Extracted g(2) fucntion for dark counts (gray dots) and
1723
+ spin fluorescence signal (red dots) as a function of delay
1724
+ time τ. Expected g(2) functions for the Poissonnian back-
1725
+ ground (black solid line) and for an ideal single emitter
1726
+ in presence of the same background (g(2)
1727
+ se - red solid line)
1728
+ fit well the experimental data. (d) Uncorrected g(2)(k)
1729
+ (blue columns) and corresponding ±1-standard deviation
1730
+ error bars (red) as a function of inter-sequence offset k.
1731
+ and express it explicitly as a function of the uncorrected
1732
+ g(2)(k) of Eq. 5 and of the measurement outcomes Aj ≡
1733
+ (⟨n(i)
1734
+ j ⟩i − ⟨d⟩)/⟨d⟩:
1735
+ g(2)
1736
+ corr(k) = (1 + A0)(1 + A1)g(2)(k) − A0 − A1 − 1
1737
+ A0A1
1738
+ . (7)
1739
+ In addition, it is interesting to compare the measured
1740
+ g(2)(τ) inside a sequence with the expected g(2)
1741
+ se (τ) that
1742
+ an ideal single emitter would give in presence of back-
1743
+ ground noise. In this case, all terms s(i)
1744
+ 0 s(i)
1745
+ j
1746
+ are 0 due to
1747
+ the single emitter character, and
1748
+ g(2)
1749
+ se (τ = τj) =
1750
+ ⟨n(i)
1751
+ 0 ⟩i⟨d⟩ + ⟨n(i)
1752
+ j ⟩i⟨d⟩ − ⟨d⟩2
1753
+ ⟨n(i)
1754
+ 0 ⟩i⟨n(i)
1755
+ j ⟩i
1756
+ .
1757
+ (8)
1758
+ This function is plotted as a red solid line in Extended
1759
+ Data Fig. 7(c) and shows a good match with the mea-
1760
+ sured g(2)(τ).
1761
+ Single-spin signal-to-noise ratio
1762
+ We derive in this section the theoretical single-spin
1763
+ signal-to-noise ratio of our fluorescence-detection proto-
1764
+ col. This protocol involves identical sequences repeated
1765
+ every tr times during a total measurement time tm. In
1766
+ each sequence, a π pulse is applied at the beginning, and
1767
+ the number of counts is measured during a time td fol-
1768
+ lowing the pulse. The spin relaxation rate is ΓR.
1769
+ In our model, it is readily shown that the steady-
1770
+ state spin polarization at the beginning of each se-
1771
+ quence is Sz0 = − 1
1772
+ 2 tanh(ΓRtr/2), yielding an average
1773
+ number of counts per sequence −2ηSz0(1 − exp−ΓRtd),
1774
+ and an average total number of counts Cspin
1775
+ =
1776
+ η(tm/tr) tanh(ΓRtr/2)(1 − exp−ΓRtd).
1777
+ The noise has two contributions: one from the dark
1778
+ count fluctuations, whose variance is αtdtm/tr, and one
1779
+ from the partition noise of the detected photons, with
1780
+ variance (1 − η)Cspin. Therefore, the width of the his-
1781
+ togram with π pulse is δCπ =
1782
+
1783
+ αtdtm/tr + (1 − η)Cspin.
1784
+ The
1785
+ signal-to-noise
1786
+ ratio
1787
+ is
1788
+ defined
1789
+ as
1790
+ SNR
1791
+ =
1792
+ Cspin/δCπ = Cspin/
1793
+
1794
+ αtdtm/tr + (1 − η)Cspin.
1795
+ For the parameters of our experiment (ΓR = 700s−1,
1796
+ α = 102s−1, η = 0.12), numerical optimization indicates
1797
+ a maximum SNR of 2.5 is obtained for td = 2 ms and
1798
+ tr = 3 ms. In the experiment, we use a larger repetition
1799
+ time to minimize the effect of heating; for the parameters
1800
+ used (td = 2 ms and tr = 7.5 ms), the formula yields a
1801
+ SNR of 1.95, in agreement with the measured value of
1802
+ 1.91.
1803
+ A simpler approximate scaling formula is obtained
1804
+ considering that the repetition time is tr ∼ Γ−1
1805
+ R , and
1806
+ that the spin polarization Sz0 ∼ −1/2.
1807
+ Taking more-
1808
+ over td = tr, one obtains the scaling formula provided
1809
+ in the introduction for the tm = 1 s integration time,
1810
+ SNR ∼ ηΓR/
1811
+
1812
+ α + (1 − η)ηΓR.
1813
+ Non-radiative relaxation
1814
+ The spin-lattice relaxation time of Er3+: CaWO4 with
1815
+ B0 oriented along the c axis was measured using the tra-
1816
+ ditional inductive detection, using a spin-echo-detected
1817
+ inversion-recovery sequence.
1818
+ A relaxation time T1 =
1819
+ 210 ms was found at a frequency of 7.853 GHz [2] (see
1820
+ Fig. 8). At 10 mK, the relaxation is dominated by the
1821
+
1822
+ 7
1823
+ direct phonon process, with a non-radiative relaxation
1824
+ rate ΓNR scaling as B2
1825
+ 0ω3
1826
+ 0 [5].
1827
+ Therefore, we estimate
1828
+ that in our conditions (ω0/2π = 7.335 GHz, and B0 ap-
1829
+ plied along the c axis), the non-radiative relaxation rate
1830
+ should be ΓNR ≃ 3.3 s−1.
1831
+ T
1832
+ T(s)
1833
+ 0
1834
+ 2
1835
+ 4
1836
+ 0.0
1837
+ -0.1
1838
+ Echo amplitude (a.u.)
1839
+ A
1840
+ A
1841
+ A/2
1842
+ echo
1843
+ T1 = 213 ± 1 ms
1844
+ Extended Data Fig. 8: Spin-Lattice relaxation time mea-
1845
+ sured with inversion-recovery sequence at 10 mK, with
1846
+ B0 along the c axis, and ω0/2π = 7.853 GHz. Green dots
1847
+ are data, solid line is a fit yielding T1 = 0.213 ± 0.001 s.
1848
+ Efficiency
1849
+ We now discuss the value measured for the overall ef-
1850
+ ficiency η = 0.12.
1851
+ Losses of counts can occur due to
1852
+ non-radiative spin relaxation, internal losses of the spin
1853
+ resonator, microwave losses between the spin device and
1854
+ the SMPD ηloss, and finite SMPD efficiency, so that η =
1855
+ [ΓR/(ΓR +ΓNR)][κc/κ]ηlossηSMP D. Given the measured
1856
+ ηSMP D = 0.32, κc/κ = 0.57, and ΓR/(ΓR+ΓNR) = 0.995
1857
+ we deduce ηloss = 0.66, which is a reasonable value for the
1858
+ microwave losses encountered upon propagation along a
1859
+ 50-cm-long coaxial cable, a circulator, and the filters at
1860
+ the SMPD input.
1861
+ Summary of different spins
1862
+ Apart from the spins discussed in the main text, we
1863
+ have also measured other single spin peaks found in the
1864
+ spectroscopy measurement.
1865
+ s0 and s6 are the labelled
1866
+ spins while s7 and s8 are not indicated in the spectrum
1867
+ in Fig. 2. Here we summarize their measured coherence
1868
+ time in the table below.
1869
+ Spin T1(ms) T∗
1870
+ 2(µs) Techo
1871
+ 2
1872
+ (ms)
1873
+ s0
1874
+ 1.26
1875
+ 79
1876
+ 1.38
1877
+ s6
1878
+ 1.42
1879
+ 170
1880
+ 2.47
1881
+ s7
1882
+ 2.21
1883
+ 7.5
1884
+ 2.1
1885
+ s8
1886
+ 1.36
1887
+ 315
1888
+ 1.53
1889
+ [1] Antipin, A., Katyshev, A., Kurkin, I. & Shekun, L. Para-
1890
+ magnetic resonance and spin-lattice relaxation of Er3+
1891
+ and Tb3+ ions in CaWO4 crystal lattice. Sov. Phys. Solid
1892
+ State 10, 468 (1968).
1893
+ [2] Le Dantec, M. Electron spin dynamics of erbium ions in
1894
+ scheelite crystals, probed with superconducting resonators
1895
+ at millikelvin temperatures.
1896
+ PhD Thesis, Univ. Paris-
1897
+ Saclay (2022).
1898
+ URL https://tel.archives-ouvertes.
1899
+ fr/tel-03579857.
1900
+ [3] Albertinale, E. et al.
1901
+ Detecting spins by their fluores-
1902
+ cence with a microwave photon counter. Nature 600, 434–
1903
+ 438 (2021).
1904
+ URL https://www.nature.com/articles/
1905
+ s41586-021-04076-z.
1906
+ [4] Gambetta, J. et al. Qubit-photon interactions in a cav-
1907
+ ity: Measurement-induced dephasing and number split-
1908
+ ting. Physical Review A 74, 042318 (2006). URL https:
1909
+ //link.aps.org/doi/10.1103/PhysRevA.74.042318.
1910
+ [5] Larson, G. H. & Jeffries, C. D.
1911
+ Spin-Lattice Relax-
1912
+ ation in Some Rare-Earth Salts. I. Temperature Depen-
1913
+ dence. Physical Review 141, 461–478 (1966). URL https:
1914
+ //link.aps.org/doi/10.1103/PhysRev.141.461.
1915
+ Pub-
1916
+ lisher: American Physical Society.
1917
+
1918
+ 8
1919
+ 4K
1920
+ 50K
1921
+ 100 mK
1922
+ 10 mK
1923
+ spin resonator
1924
+ SMPD
1925
+ 50 Ohm
1926
+ (800mK)
1927
+ -10
1928
+ IR
1929
+ -20 -20
1930
+ TWPA
1931
+ IR
1932
+ HEMT
1933
+ IF
1934
+ LO
1935
+ RF
1936
+ LO
1937
+ 1 2 3 4 5 6 7
1938
+ 4. qubit reset
1939
+ 2. Photon
1940
+ Detection
1941
+ 3. Readout
1942
+ 1. Spin pulse
1943
+ A1: MiniCirc ZVE8G+
1944
+ A2: HVA-500M-20-B
1945
+ A-tekH60 circulator
1946
+ Marki I/Q mixer
1947
+ or SSB mixer
1948
+ Clear Mw splitter
1949
+ 50 Ohm load
1950
+ Waveline S11330
1951
+ fast switch
1952
+ 3
1953
+ 1
1954
+ -20
1955
+ -20
1956
+ IR
1957
+ HEMT
1958
+ -10
1959
+ -20
1960
+ -10
1961
+ IR
1962
+ -20 -20
1963
+ IR
1964
+ IR
1965
+ -10
1966
+ -20
1967
+ -10
1968
+ -10
1969
+ -20
1970
+ -20
1971
+ RF
1972
+ I
1973
+ AnaPico MWG
1974
+ Q
1975
+ +
1976
+ I
1977
+ Q
1978
+ LO
1979
+ RF
1980
+ I
1981
+ Q
1982
+ LO
1983
+ RF
1984
+ I
1985
+ Q
1986
+ A1
1987
+ A1
1988
+ A2
1989
+ AnaPico MWG
1990
+ AnaPico MWG
1991
+ AnaPico MWG
1992
+ R&S MWG
1993
+ -
1994
+ 910 Ohm
1995
+ 230 uF
1996
+ A2
1997
+ DC block
1998
+ +
1999
+ -
2000
+ Yokogawa
2001
+ Directional coupler
2002
+ Bandpass filter
2003
+ AO
2004
+ AI
2005
+ AO
2006
+ DO
2007
+ Quantum Machine
2008
+ OPX
2009
+ AO
2010
+ 2
2011
+ 4
2012
+ �����
2013
+ ��������
2014
+ ����
2015
+ ��
2016
+ �����
2017
+ ����
2018
+ DO
2019
+ �������� ���������
2020
+ ��������
2021
+ IR
2022
+ IR
2023
+ Extended Data Fig. 9: Schematic of the setup. Wiring and all the components used in this experiment at room
2024
+ temperature and cryogenic temperature are shown.
2025
+
BtE0T4oBgHgl3EQfyAJM/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
DdE2T4oBgHgl3EQfoQiw/content/tmp_files/2301.04017v1.pdf.txt ADDED
@@ -0,0 +1,1975 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Is Federated Learning a Practical PET Yet?
2
+ Franziska Boenisch∗, Adam Dziedzic∗†§, Roei Schuster∗§,
3
+ Ali Shahin Shamsabadi∗‡§, Ilia Shumailov∗§, and Nicolas Papernot∗†
4
+ ∗ Vector Institute
5
+ † University of Toronto
6
+ ‡ The Alan Turing Institute
7
+ Abstract—Federated learning (FL) is a framework for users
8
+ to jointly train a machine learning model. FL is promoted
9
+ as a privacy-enhancing technology (PET) that provides data
10
+ minimization: data never “leaves” personal devices and users
11
+ share only model updates with a server (e.g., a company)
12
+ coordinating the distributed training. We assess the realistic
13
+ (i.e., worst-case) privacy guarantees that are provided to
14
+ users who are unable to trust the server. To this end, we
15
+ propose an attack against FL protected with distributed
16
+ differential privacy (DDP) and secure aggregation (SA).
17
+ The attack method is based on the introduction of Sybil
18
+ devices that deviate from the protocol to expose individual
19
+ users’ data for reconstruction by the server. The underlying
20
+ root cause for the vulnerability to our attack is the power
21
+ imbalance. The server orchestrates the whole protocol and
22
+ users are given little guarantees about the selection of other
23
+ users participating in the protocol. Moving forward, we
24
+ discuss requirements for an FL protocol to guarantee DDP
25
+ without asking users to trust the server. We conclude that
26
+ such systems are not yet practical.
27
+ 1. Introduction
28
+ Federated Learning (FL) [30] is a widely deployed
29
+ protocol for collaborative machine learning (ML). It al-
30
+ lows a server to train an ML model on data of different
31
+ users without requiring direct access to that data. For this
32
+ reason, FL is often promoted as data minimizing [31]:
33
+ instead of sharing their data, users calculate model up-
34
+ dates, usually gradients, on a shared model obtained from
35
+ the server. These model updates are then aggregated and
36
+ applied iteratively to train this shared model.
37
+ Prior work has demonstrated that the model updates
38
+ leak sensitive information on the users’ local training
39
+ data [24], [39]. This is to be expected since nothing in
40
+ the design of FL prevents information leakage. Indeed,
41
+ the root cause of why FL is inherently vulnerable to data
42
+ reconstruction attacks is that it is designed to provide
43
+ confidentiality (data does not leave user devices) rather
44
+ than privacy (outputs of the computation do not leak sen-
45
+ sitive attributes from the users’ input). Without additional
46
+ privacy measures, FL cannot protect users from the server
47
+ reconstructing their data.
48
+ Fortunately, if the server is trusted to follow the pro-
49
+ tocol as prescribed, a relatively cost-effective mitigation
50
+ exists: the server can add noise to the model updates and,
51
+ §. Equal contribution.
52
+ thereby, implement differential privacy (DP) [12] during
53
+ the aggregation [32]. This degrades the performance of
54
+ learned models [50], but adds strong privacy guarantees.
55
+ Unfortunately, the server cannot always be trusted. Worse
56
+ yet, by observing local users’ model updates, an untrusted
57
+ server can mount powerful attacks to reconstruct users’
58
+ training data points [7], [14], [16], [49], [54], [56], [57].
59
+ Contemporary attacks exploit the fact that neurons com-
60
+ pute a weighted sum of their input; thus the corresponding
61
+ gradients contain rescaled versions of the input.
62
+ In this vein, this work raises a simple pragmatic ques-
63
+ tion that has far-reaching consequences: can modern FL
64
+ deployments offer meaningful privacy guarantees while ef-
65
+ ficiently and effectively learning from thousands of users’
66
+ data, if the server is not trusted?
67
+ We investigate this by mounting an attack (see Fig-
68
+ ure 1) that exerts the capabilities of an untrusted server
69
+ in FL to extract individual user data points. We show
70
+ that the attack is even successful when FL is combined
71
+ with secure aggregation (SA) [9] and distributed differ-
72
+ ential privacy (DDP) [46]. In SA, gradient aggregation
73
+ is performed via a decentralized multiparty computation
74
+ protocol. In DDP, each user adds a small amount of noise
75
+ to their gradient updates. Through the aggregation of user
76
+ updates, the cumulative noise of DDP provides sufficiently
77
+ high privacy guarantees to protect user data from leaking
78
+ sensitive information. The two techniques were designed
79
+ to decrease the amount of trust placed by users in the
80
+ central party in FL [2], [17], [27].
81
+ To be clear, we are, of course, not claiming that
82
+ the cryptographic primitives behind SA and DDP are
83
+ broken. We merely notice that the trust model that they
84
+ assume, where in each round enough honest users con-
85
+ tribute noised gradient updates, is not necessarily realized
86
+ in practice within FL. In reality, the server is entrusted
87
+ with provisioning users and sampling them in each round,
88
+ and can easily inject an arbitrary number of malicious
89
+ sybils under their control into any round, as demonstrated
90
+ by industry actors actively deploying FL [40].
91
+ By sampling a target user together with a group of
92
+ sybils that act maliciously, the server can acquire direct
93
+ access to the target user’s non-aggregated update. This
94
+ allows the server to eliminate any effect of SA, and
95
+ effectively reduces the protection of DDP to a minimum
96
+ because the noise added by a single user is not designed
97
+ to offer the claimed privacy guarantees.
98
+ Next, we observe that the server is also typically en-
99
+ trusted with controlling the shared model. Prior work [7],
100
+ [14], [51] has shown that this ability enables the server
101
+ 1
102
+ arXiv:2301.04017v1 [cs.CR] 9 Jan 2023
103
+
104
+ 𝐺𝑡𝑎𝑟𝑔𝑒𝑡
105
+ [𝑡]
106
+ Sybil
107
+ Users
108
+ Target
109
+ User
110
+ M Selected
111
+ Users at 𝑡
112
+ Legitimate
113
+ Users
114
+ 𝑓𝑤
115
+ 𝑓𝑤
116
+ [𝑡]
117
+ Server
118
+ 0
119
+ 0
120
+ Secure
121
+ Aggregation
122
+ ҧ𝐺𝑡𝑎𝑟𝑔𝑒𝑡
123
+ [𝑡]
124
+ 0
125
+ 0
126
+ ҧ𝐺𝑡𝑎𝑟𝑔𝑒𝑡
127
+ [𝑡]
128
+ Noise
129
+ Addition
130
+ ҧ𝐺𝑡𝑎𝑟𝑔𝑒𝑡
131
+ [𝑡]
132
+ Figure 1: Course of our attack against FL protected by SA and DDP. 1 The server introduces a small fraction of
133
+ sybil users into the FL application. 2 The server selects M users for participation in training round t: one target user
134
+ and M − 1 sybils. 3 The server manipulates the shared model with trap weights [7] and sends it out to the selected
135
+ users. 4 The target user locally calculates its gradients on the manipulated model while the sybil users return zero or
136
+ constant value gradients that are known by the server. 5 Only the target user locally applies a small amount of noise to
137
+ its gradients to implement DDP. 6 The target user’s local noised gradients are aggregated with the sybil users’ values.
138
+ 7 The resulting aggregate which effectively contains solely the target user’s gradients is sent to the server. 8 The
139
+ server extracts the target user’s training data from the received gradients.
140
+ to extract large amounts of the users’ individual training
141
+ data points from gradients in vanilla FL. By integrating
142
+ the trap weight approach from [7] into our attack, we
143
+ show that an untrusted server can extract high-fidelity user
144
+ data points for common learning tasks despite DDP and
145
+ SA. This highlights that even elaborate combinations of
146
+ techniques like DDP and SA with FL fail to prevent data
147
+ reconstruction when the server’s real-world capabilities
148
+ are taken into account.
149
+ While exploring data reconstruction under DP, we
150
+ make another observation that advances our understanding
151
+ of which users are more vulnerable to data reconstruc-
152
+ tion attacks: the noise addition does not guarantee equal
153
+ protection over all model gradients. As we visualize in
154
+ Figure 3, some data points can be extracted with higher
155
+ fidelity than others. This is despite the fact that all corre-
156
+ sponding gradients were protected with the same clipping
157
+ and noising operations. We identify the gradient norm as
158
+ the reason behind disparate protection. For small-norm
159
+ gradients, noise dominates the signal of the extracted data
160
+ more than for gradients with a large norm. In principle,
161
+ clipping in DP for ML is supposed to bound the gradient
162
+ norm to control for this. However, the gradient norm is
163
+ calculated globally whereas data is extracted locally from
164
+ the components of the gradient that correspond to the
165
+ weighted input of a single neuron. When the gradient
166
+ corresponding to a neuron is large but all other neurons
167
+ in that layer have small gradients, the overall gradient can
168
+ still be below the clipping norm. Therefore, no clipping is
169
+ performed, the same amount of noise is added to neurons
170
+ with large and small gradients, and data from the neurons
171
+ with larger gradients can be extracted with higher fidelity.
172
+ We also sketch a construction that amplifies this effect
173
+ and makes a few individual data points nearly perfectly
174
+ extractable, even under noise addition.
175
+ We then discuss the centralization and resulting power
176
+ imbalance between the server and users as the root cause
177
+ of FL’s vulnerability against attacks like the one proposed
178
+ in this work. This motivates us to explore the requirements
179
+ for building a variant of FL that practically prevents at-
180
+ tacks by a malicious server. We consider three approaches
181
+ based on (1) decentralization, (2) user verification, and
182
+ (3) the support of specialized hardware. We find that one
183
+ promising direction is to add adequate amounts of noise
184
+ to users’ gradients via a cryptographic protocol such as
185
+ secure multiparty computation (SMCP). However as of
186
+ yet, due to the gradients’ high dimensionality, known
187
+ constructions’ communication costs are prohibitive.
188
+ As an alternative direction, users in FL can take re-
189
+ sponsibility for implementing their full privacy protection
190
+ locally, for example, by adding enough noise to individu-
191
+ ally implement strong privacy guarantees. This approach is
192
+ commonly referred to as local DP (LDP). As a last resort,
193
+ users can decide not to participate in FL protocols if they
194
+ do not trust the server. However, the last two options are
195
+ only available if users have the required control over their
196
+ participation in the protocol, which is not always the case.
197
+ In summary, we make the following contributions:
198
+
199
+ We design an attack that enables a malicious server
200
+ to reconstruct individual training data points from
201
+ users when FL is protected by SA and DDP. See
202
+ Figure 1 for an illustration of our attack flow.
203
+
204
+ We experimentally validate the attack’s ability to
205
+ reconstruct image and textual data with high fi-
206
+ delity in different DDP setups. We show how to
207
+ increase the fidelity of the reconstruction of users’
208
+ data points by reducing the effect of additive noise
209
+ at the level of individual neurons. We thus observe
210
+ disparate leakage over gradients under DDP.
211
+
212
+ We discuss centralization in FL and its resulting
213
+ power-imbalance between the server and the users
214
+ as the root cause of FL’s vulnerability and analyze
215
+ potential mitigations.
216
+ 2. Background
217
+ This section provides background on FL, describes
218
+ user-data extraction from gradients in the vanilla version
219
+ 2
220
+
221
+ 6x046678of the protocol and introduces SA and DP—extensions
222
+ implementing dedicated defenses against privacy leakage.
223
+ 2.1. Federated Learning
224
+ FL [30] is a communication protocol that allows a
225
+ group of N users to jointly train an ML model f, such
226
+ that data never leaves the respective users’ devices. FL in-
227
+ volves a server, who coordinates the training in an iterative
228
+ process, as follows: at round t = 0, the server initializes
229
+ the shared model W[0] at random, typically following
230
+ common weight-initialization practice [19], [20], [23]. At
231
+ every round t, the server chooses a subset of M ≤ N
232
+ users to contribute to the learning round. The server then
233
+ sends each of these users the model fW[t]. Each user
234
+ chooses a subsample of their training data termed a mini-
235
+ batch, computes the gradients of an objective function
236
+ over fW[t] for each of these samples, and returns these
237
+ gradients, which we call a (local) update, to the server. To
238
+ conclude the round, the server updates the shared model
239
+ by aggregating the received gradients, multiplying them
240
+ by a learning-rate parameter and applying the change to
241
+ the shared model.1
242
+ It follows from the description above that users’ train-
243
+ ing data significantly affects the values of local updates.
244
+ This enables a variety of privacy attacks that extract indi-
245
+ vidual user-data points directly from the model updates,
246
+ as highlighted in the following section.
247
+ 2.2. Data Extraction from Vanilla FL
248
+ Prior work [7], [14], [51] has shown that an untrusted
249
+ server can directly extract user-data from the model gradi-
250
+ ents. In these attacks, the server leverages its control over
251
+ the shared model.2 In [14], the server exploits this ability
252
+ to insert a fully-connected model layer as an extraction
253
+ module where individual data points can be directly ex-
254
+ tracted. [7] manipulates the model weights with an attack
255
+ they call trap weights. This attack increases natural data
256
+ leakage from fully-connected model layers. In [51], the
257
+ server instead modifies model parameters to extract single
258
+ data points by increasing their gradient contribution. The
259
+ attack operates in several iterations of the protocol to
260
+ collect multiple gradient updates from the same user.
261
+ The presence of such data extraction attacks highlights
262
+ the vulnerability of vanilla FL to privacy-leakage. To pre-
263
+ vent training data from leaking onto updates and straight
264
+ to the hands of the server, various extensions have been
265
+ proposed, as we now briefly describe.
266
+ 2.3. Secure Aggregation
267
+ In SA, due to Bonawitz et al. [9], users do not send
268
+ their individual updates to the server. Instead, they per-
269
+ form, along with the server, a multiparty computation
270
+ 1. For readers unfamiliar with gradient optimization: such gradient-
271
+ based weight updates are intended to prescribe which direction W[t]
272
+ needs to move towards, for the objective to be minimized. Typically,
273
+ the objective is a value measuring the model’s level of prediction error
274
+ across a given mini-batch.
275
+ 2. There also exist optimization-based data reconstruction attacks
276
+ operating on model updates. These attacks can be conducted by a
277
+ passive attacker solely observing the gradients. However, computation is
278
+ expensive and the reconstructed data is not necessarily of high-fidelity.
279
+ We provide a brief overview of this type of attack in Section 7.
280
+ (MPC) protocol that ensures the server only receives the
281
+ average of all updates in the round. Various improvements
282
+ of the original protocol were suggested, for example, to
283
+ allow the server to prove the correctness of the aggregate
284
+ computation [52], increase robustness against malicious
285
+ users’ manipulated gradients [10], or improve communi-
286
+ cation efficiency [5], [22].
287
+ 2.4. Differential Privacy in FL
288
+ Nothing in the design of FL prevents information
289
+ leakage: FL is designed to provide confidentiality (data
290
+ does not leave user devices) rather than privacy (outputs
291
+ of the computation do not leak sensitive attributes from
292
+ the users’ input). As discussed in Section 2.2, this leaves
293
+ vanilla FL vulnerable to data reconstruction attacks. To
294
+ ensure the privacy of users’ sensitive training data, it is
295
+ natural to consider DP approaches that work by adding
296
+ noise to user updates. DP is a gold standard in privacy
297
+ technology because proper application of it comes with
298
+ a theoretical bound on the probability of an adversary
299
+ being able to distinguish adjacent datasets, i.e. datasets
300
+ that differ solely in one data point. This implies a bound
301
+ on the probability of data point extraction. In other words,
302
+ a DP approach properly applied to FL updates could,
303
+ in principle, ensure that individual user data points are
304
+ not revealed to whoever observes the noised updates.
305
+ See Appendix A for more background on DP and its
306
+ integration to ML.
307
+ One possible approach to integrate DP into FL is
308
+ centralized DP (CDP) [4], [28], [40], where the server
309
+ adds noise to the mini-batch gradients received by users.
310
+ CDP assumes that the server is trusted to add noise, which
311
+ is not true in the threat model of this work, see Section 3.
312
+ To address this, local DP (LDP) [47] was proposed, where
313
+ each user adds noise to its local update before sending
314
+ it out for aggregation, in a way that ensures the user’s
315
+ own dataset is protected from extraction. Unfortunately,
316
+ LDP generally results in degraded model utility due to
317
+ the addition of large amounts of noise to every user’s
318
+ update [50]. Distributed DP (DDP) was proposed as a
319
+ popular middle ground between CDP and LDP, where
320
+ multiple users independently add noise to their update,
321
+ that is sufficient to ensure their datasets are protected
322
+ from an extraction adversary, but only as long as their
323
+ updates are aggregated before the adversary observes
324
+ them. Through combination with SA [2], [11], [27] or
325
+ similar aggregation methods [6], where the server can
326
+ only view aggregated updates, DDP ostensibly ensures
327
+ that the server cannot extract individual data points. But,
328
+ importantly, this assumes that a large fraction of users
329
+ participating in the FL round are honest and add their
330
+ share of the noise. We challenge the applicability of this
331
+ assumption in the real world.
332
+ 3. Threat Model and Assumptions
333
+ We characterize our threat model and assumptions in
334
+ terms of our adversary and the considered FL setup.
335
+ 3.1. Adversary
336
+ Our adversary is the server, and their goal is to infer
337
+ individual users’ local sensitive data points. Note that the
338
+ 3
339
+
340
+ background in Section 2.1 implies that the server can—
341
+ whenever they choose to—(1) control the weights of the
342
+ shared model, (2) select which of the N users participate
343
+ in each round, and (3) provision new users into the pool
344
+ (including sybils controlled by the server).3 We assume
345
+ that the total fraction of sybils out of the N users is small.
346
+ We, furthermore, assume the server is occasionally
347
+ malicious (OM), meaning they behave maliciously in only
348
+ a few rounds of the protocol. When this happens, they can
349
+ exert the above capabilities (1-3) adversarially. Do note
350
+ that the server here does not deviate from the protocol and
351
+ restricts themselves to only use valid operations (1-3) in
352
+ the FL protocol. An OM server ensures the attack remains
353
+ stealthy, and also allows the server to train a model that
354
+ has high utility over the non-malicious rounds, which is
355
+ an expected product of FL.
356
+ 3.2. FL Setup
357
+ Our departure point are FL protocols deployed in real-
358
+ world applications, such as the one described in [8]. These
359
+ protocols initially focused on data minimization only. We
360
+ extend them with SA and DDP, two defenses dedicated
361
+ to additionally providing privacy protection for the FL
362
+ protocol. We note that we chose to study an instantiation
363
+ of FL with SA and DDP because it is the combination of
364
+ published techniques that holds the strongest promise in
365
+ the presence of an untrusted server.4 Our goal in studying
366
+ FL with SA and DDP is to show that, even if servers
367
+ (e.g., companies) adopted currently available best prac-
368
+ tices from the academic community, end users might not
369
+ get the promised privacy protection from FL. In addition
370
+ to these challenges, we note that FL with SA and DDP
371
+ is not as widely deployed as vanilla FL is. This is mainly
372
+ due to some increased communication costs [5] and the
373
+ computational overhead of adapted mechanisms [2], [27].
374
+ Thus, our work conservatively characterizes the risk of
375
+ privacy leakage from many instantiations of FL.
376
+ 4. Attacking FL under SA and DDP
377
+ In this section, we study FL extended by DDP and
378
+ SA—considered as a strongly privacy-protective instanti-
379
+ ation of the protocol—and show that the server can still
380
+ reconstruct sensitive information about the users’ training
381
+ data. We also forge an intuition of what factors contribute
382
+ most to the leakage. Based on our findings, in Section 8,
383
+ we discuss future research and implementation towards
384
+ private FL.
385
+ For successful data reconstruction under DDP and
386
+ SA, the server has to make use of the following three
387
+ capabilities which it naturally holds in FL:
388
+ 1)
389
+ Introducing sybil devices: The server needs to
390
+ be able to introduce a fraction of manipulated
391
+ devices in the FL protocol. These devices can
392
+ 3. Capabilities (2) and (3) have been demonstrated in the real world
393
+ as Google researchers introduced 189 sybils devices into the Gboard
394
+ FL system and made them participate in the protocol along with real
395
+ users [40].
396
+ 4. Indeed, the key alternative to FL with SA and DDP would be FL
397
+ with LDP (local DP guarantees) but this alternative is not appealing
398
+ because it comes at a significant utility cost for the server.
399
+ return arbitrary gradients, chosen by the server.
400
+ In particular, they can contribute zero gradients
401
+ to the SA.
402
+ 2)
403
+ Controlling the user sampling: To ensure that the
404
+ sybil devices are sampled for SA together with a
405
+ target user, the server needs to control the user
406
+ sampling.
407
+ 3)
408
+ Manipulating the model weights: For improved
409
+ data reconstruction performance, the server can
410
+ manipulate the shared model’s weights, for ex-
411
+ ample, relying on one of the methods discussed
412
+ in Section 2.2.
413
+ While the first two capabilities enable the server to
414
+ circumvent SA and to leave the gradients of a target user
415
+ with insufficient amount of noise for privacy protection
416
+ under DDP, the third capability increases the amount of
417
+ individual training data that can be reconstructed and
418
+ extends the attack to other model architecture types.
419
+ Attack flow. Our attack aims at reconstructing the private
420
+ data of one target user per malicious round in the FL
421
+ training. To do so, the attack needs to circumvent the SA
422
+ (Section 4.1), then exploit the weak privacy guarantees of
423
+ DDP from a user’s perspective (Section 4.2), and finally
424
+ reconstruct the target user’s individual training data points
425
+ (Section 4.3). See Figure 1 for the course of our attack.
426
+ 4.1. Circumventing SA
427
+ In our attack, the server circumvents SA by sampling
428
+ the target user together with maliciously controlled sybil
429
+ devices for the given training round. Since for each round,
430
+ M users are sampled for participation, the server needs to
431
+ control at least M − 1 sybil devices. It has been shown in
432
+ previous work [40] that inserting an arbitrary number of
433
+ sybil devices into real-world FL deployments is practically
434
+ feasible. Moreover, the assumption that the server controls
435
+ all-but-one participants in a specific protocol round is not
436
+ a strong one. The fraction of controlled sybil devices
437
+ (thousands) in comparison to the number of total users
438
+ (millions to billions) is negligibly small.
439
+ Since SA-protocols provide their guarantees under the
440
+ assumption that a certain fraction of users is honest [5],
441
+ [9], it follows naturally that in the presence of the sybil
442
+ devices, no guarantees can be provided to the target user.
443
+ This is because when the gradients are aggregated over
444
+ multiple users, and all but the target user contribute arbi-
445
+ trary gradients, known to the server, the server can extract
446
+ the target user’s gradients perfectly. In the easiest case,
447
+ the sybil devices contribute all zero-gradients, such that
448
+ the final aggregate directly only contains the target user’s
449
+ gradients.
450
+ Note that we do not claim that the SA or any of
451
+ the underlying cryptographic primitives are broken. We
452
+ solely observe that SA relies on the assumption that the
453
+ clients participating in the execution are real clients and
454
+ not maliciously controlled by the server [5]. However,
455
+ in FL with an untrusted server, the users cannot verify
456
+ this assumption. We show through our attack that this has
457
+ severe implications on their privacy guarantees.
458
+ Pasquini et al. [37] describe a different way to cir-
459
+ cumvent SA based on the server sending out different
460
+ 4
461
+
462
+ models to different users. While the models for non-
463
+ target users produce zero-gradients, the target user’s model
464
+ produces non-zero gradients which can be exploited for
465
+ data reconstruction. An advantage of this method is that
466
+ it does not require the server to control the user sampling,
467
+ or to manipulate a fraction of users. Note however that
468
+ in their scenario, DDP can still be efficiently applied if
469
+ every user adds some noise to their (potentially zero)
470
+ gradients. As a consequence, the total amount of noise
471
+ can be sufficient to protect the gradients of the target user.
472
+ Therefore, in our attack, we rely on the controlled sybil
473
+ devices to circumvent the SA.
474
+ Note that also alternative mechanisms to implement
475
+ DDP, such as shuffling [6], [13] which can be put into
476
+ place instead of SA, can be circumvented by our approach
477
+ of inserting sybil devices with server-controlled gradients
478
+ into the protocol.
479
+ 4.2. Exploiting DDP Guarantees
480
+ If DDP is in place, the gradients of the target user will
481
+ be slightly noisy—even with successful circumvention of
482
+ SA. However, by design of DDP, the amount of noise
483
+ added by each user is typically insufficient to provide
484
+ a meaningful privacy guarantee from the user’s perspec-
485
+ tive [27]. By meaningful privacy guarantees we mean,
486
+ guarantees equivalent to what one would obtain in the
487
+ LDP definition. This is in fact how DDP obtains a utility
488
+ gain over LDP, which would have inserted sufficient noise
489
+ to obtain per-user privacy guarantees that are independent
490
+ of other users: DDP assumes all users will add enough
491
+ noise so that the aggregate is sufficiently noised whereas
492
+ LDP assumes each user adds enough noise to obtain
493
+ privacy in isolation. As a consequence, in DDP, each user
494
+ can add less noise locally than required for the desired
495
+ total privacy level, resulting in more utility. In contrast,
496
+ the guarantee provided by LDP allows the user to not
497
+ trust the server or other users.
498
+ Concretely, in an LDP version of FL, the noise added
499
+ by each user depends solely on the noise scale σ and the
500
+ clipping parameter c of the application. As a consequence,
501
+ the local noise is sampled from a Gaussian distribution
502
+ according to
503
+ N(0, σ2c2).
504
+ (1)
505
+ In contrast, in DDP, the amount of noise added by each
506
+ individual user additionally takes the number of users who
507
+ participate in the round into account [46]. Assuming that
508
+ M users are sampled for participation, this results in a
509
+ local addition of Gaussian noise sampled from
510
+ N
511
+
512
+ 0,
513
+ σ2
514
+ M − 1c2
515
+
516
+ [46].
517
+ (2)
518
+ In Figure 2, we present the privacy-utility trade-offs re-
519
+ sulting from training models on the CIFAR10 [29] dataset
520
+ as a function of the total noise scale σ and the resulting
521
+ models’ accuracy on a test set. We train the private
522
+ models with a state-of-the-art framework for DP-training5
523
+ 5. https://github.com/ftramer/Handcrafted-DP. Note, however, that our
524
+ reported accuracy and achieved privacy levels ϵ cannot directly be
525
+ compared with the values reported in the repository. This is because
526
+ we use different noise scales than they do and train the model for 100
527
+ epochs while they only train for 30 epochs.
528
+ in which all hyperparameters and model architecture are
529
+ tuned for the task.
530
+ Figure 2 provides two main insights. First, unsurpris-
531
+ ingly, given the privacy-utility trade-offs mentioned above,
532
+ the model utility decreases when the total noise scale σ
533
+ increases. Second, the figure shows that the more users
534
+ participate in a given training round, the less noise each
535
+ user needs to add locally. This results from Equation (2)
536
+ which relies on the total noise being aggregated over all
537
+ participating users before sharing the aggregated gradients
538
+ with the server.
539
+ DDP assumes that each user is honest and adds the
540
+ required noise to their gradients. However, if even one of
541
+ the users adds less than the amount of noise it should add,
542
+ the desired total privacy guarantees cannot be reached.
543
+ Even worse, if, as described in Section 4, a target user in
544
+ FL is sampled for participation solely with controlled sybil
545
+ devices that do not provide any noise for aggregation, the
546
+ local noise added by the target user represents the only
547
+ protection for its gradients.
548
+ These results mean that there is a tension between (1)
549
+ the guarantee claimed by the server (and other users) in
550
+ DDP and (2) the guarantee that a user who does not trust
551
+ this server can rely on. This will lead the server optimizing
552
+ for model utility to request that users add less noise to
553
+ their gradients than what is needed for individual users to
554
+ protect their data from leaking to an untrusted server.
555
+ 4.3. Reconstructing Data
556
+ In Section 2.2, we presented different attacks that rely
557
+ on manipulations of the shared model to extract individual
558
+ users’ training data points. In principle, each of these
559
+ attacks can be included to perform data reconstruction
560
+ in our FL+SA+DDP setup. However, the attack by [51]
561
+ extracts individual data points over several rounds of
562
+ the FL protocol. In our setup, due to the server’s OM
563
+ nature, single-round attacks are preferable. These allow
564
+ the adversary to stay more inconspicuous and to train
565
+ a more meaningful shared model throughout the benign
566
+ rounds. The attack by [14] relies on manipulations of the
567
+ model architecture, which are more detectable than manip-
568
+ ulations of model parameters, such as in [7]. Finally, our
569
+ experimental evaluation highlighted a significant advan-
570
+ tage of [7] in comparison to [14] for data reconstruction
571
+ under noise. [7]’s trap weights yield redundancy in the
572
+ extracted data, i.e. the same data point can be extracted
573
+ multiple times from gradients of different weight rows.
574
+ We thoroughly investigate this effect in Section 5.3. The
575
+ redundancy of extracted noisy data can be exploited to
576
+ average out the effect of the noise and yield higher-fidelity
577
+ data reconstruction, as we will show in Section 5.4. In
578
+ contrast, due to the nature of their attack, in [14], each
579
+ data point is only extractable once.
580
+ 5. Evaluation of the Attack against SA+DDP
581
+ In this section, we present a practical evaluation of
582
+ our attack against FL protected with SA and DDP. We
583
+ first present our experimental setup. Then, we evaluate
584
+ direct extraction of noisy gradients under DDP. We move
585
+ on to experimentally evaluate the redundancy of extracted
586
+ data with [7]’s trap weight approach, and discover how
587
+ 5
588
+
589
+ Figure 2: Privacy vs. utility trade-offs under DDP/LDP. Each point on the blue line corresponds to a model trained on
590
+ CIFAR10 with a clipping parameter c = 1, and the total noise scale σ indicated on the x-axis. Training was conducted
591
+ over 100 epochs, the resulting privacy guarantees ϵ are reported. For the non-private baseline ϵ = ∞ (red line). We
592
+ report accuracy loss with respect to this non-private baseline. The images depicted below the line plot display the
593
+ rescaled noisy gradients of one data point of an individual user with noise calculated according to Equation (2) as a
594
+ function of σ, c, and M in the training round. The more users participate, the less noise every user needs to add because,
595
+ during aggregation, the total noise is determined by the sum of the individual noises. If, however, other users do not
596
+ add noise, the locally added noise is the only privacy protection every individual user has (DDP reduces to LDP with
597
+ weak privacy guarantees). As a consequence, there is a discrepancy between the privacy the user believes to get and
598
+ the privacy they actually get: The images above the black line visualize the user’s belief on what the server can extract
599
+ from their gradient, the images below the black line visualize what the server can actually extract under our attack.
600
+ this redundancy can be exploited for higher-fidelity data
601
+ reconstruction under noise. We illustrate this with empir-
602
+ ical results reconstructing image and text data.
603
+ 5.1. Experimental Setup
604
+ We operate in a cross-device FL setup and perform
605
+ training on the CIFAR10 [29] dataset. We evaluate extrac-
606
+ tion on different mini-batch sizes B ∈ {10, 20, 100}. We
607
+ split the CIFAR10 training data at random and iid between
608
+ the users. [7] shows that their trap weights’ extraction
609
+ success is equal for iid and non-iid distribution, even for
610
+ the most extreme scenario where every data point in a
611
+ given mini-batch stems from same class. Following [7],
612
+ we also experiment with the IMDB dataset for sentiment
613
+ analysis and distribute data the same way.
614
+ To evaluate different setups for DDP, we select
615
+ {10, 100, 1000} users for participation in a given round
616
+ of the FL protocol. To circumvent the SA, as described in
617
+ the previous section, we sample one target user together
618
+ with sybil devices which all return zero gradients. Other
619
+ than that, we follow [7]’s experimental setup, use their
620
+ six-layer fully-connected neural network and embedding
621
+ architecture (their Table 7 and 8), initialize the first fully-
622
+ connected layer with their trap weights for individual data
623
+ point extractability. To project received gradients of the
624
+ first fully-connected layer’s weight matrix back to their
625
+ input domain, we rely on [7]’s Equation (5) which shows
626
+ that it is sufficient to rescale the gradient of the weights
627
+ with the inverse of the gradient of the bias for perfect
628
+ data extraction. Note that in our case, due to DDP, noise
629
+ is added not only to the gradient of the weights but also to
630
+ the gradient of the bias. Therefore, not only the extracted
631
+ Figure 3: Directly Extracted Data under DDP. Rescaled
632
+ clipped and noised gradients from a mini-batch with 20
633
+ data points from CIFAR10 dataset. DDP setup: c = 1,
634
+ σ = 0.1, and M = 100.
635
+ gradients but also our scaling factor are noisy, resulting in
636
+ the rescaled gradients not being a perfect reconstruction
637
+ of the original input data.
638
+ We report the DDP-setup per-round through three
639
+ parameters required to determine the noise magnitude
640
+ according to Equation (2), namely the DP clip norm c, the
641
+ DP noise multiplier σ, and the number of selected users in
642
+ this round M. This enables us to understand how sensitive
643
+ the attack is to choices for these hyperparameters without
644
+ making any assumptions about other hyperparameters of
645
+ the training run (e.g., the number of training steps).
646
+ 5.2. Noisy Data Extraction
647
+ We first perform direct extraction from noisy gra-
648
+ dients. The extraction of data points works exactly the
649
+ same way as for vanilla FL [7], by initializing the model
650
+ with trap weights before sending it to the target user, and
651
+ then projecting their received gradients back to the input
652
+ domain. Figure 3 shows the full resulting extracted data
653
+ in a setup with a mini-batch of 20 data points, c = 1,
654
+ σ = 0.1, and M = 100. While some noisy reconstructed
655
+ 6
656
+
657
+ ε = inf
658
+ = 592
659
+ = 33.97
660
+ = 5.41
661
+ DP Models
662
+ ε = 2.39
663
+ Non-Private BaselineNumber of
664
+ % Individually
665
+ Reconstruction
666
+ Benign Users
667
+ Reconstructable Data
668
+ SNRs
669
+ 1
670
+ 0.95
671
+ 0.014
672
+ 5
673
+ 0.75
674
+ 0.011
675
+ 19
676
+ 0.15
677
+ 0.010
678
+ 49
679
+ 0.0
680
+ 0.010
681
+ TABLE 1: Influence of Fraction of Sybil Devices. Re-
682
+ sults for FL+SSA+DDP setup with 50 participants, each
683
+ holding B = 20 data points. We replaced a varying
684
+ fraction of users by sybil devices and measured number
685
+ of individually extractable data points from the target user
686
+ and average SNRs over all their reconstructions. The more
687
+ benign users participate in the round, the less effective
688
+ data reconstruction becomes.
689
+ data points resemble the original training data, other are
690
+ less recognizable because their are an overlay of multiple
691
+ data points, or dominated by the added noise. DDP setup:
692
+ c = 1, σ = 0.1.
693
+ Effect of Fraction of Sybils. We, furthermore, conducted
694
+ experiments to quantify the effect of not replacing all other
695
+ M − 1 users by sybil devices, but only a fraction of the
696
+ other users. Therefore, we conducted experiments with
697
+ extracting data from one round of the FL protocol with 50
698
+ participants, each holding a mini-batch of 20 data points.
699
+ Our goal was to study what privacy gain the presence of
700
+ other benign users incurs on the target user. We visualize
701
+ our results in Table 1. They suggest that when the target
702
+ user is sampled solely with sybil devices (row 1), the
703
+ server is able to extract 95% of their individual training
704
+ data points individually, protected solely by the noise
705
+ added locally according to DDP. The more benign users
706
+ participate in the protocol round, the lower SNRs of the
707
+ reconstructed data from the target user, and the fewer of
708
+ the target user’s individual data points can be individually
709
+ extracted. This effect stems from the aggregation within
710
+ the SA, which overlays gradients from all users before
711
+ sharing them with the server. Our results are aligned with
712
+ findings by [7] who showed that averaging over several
713
+ mini-batches (which is precisely the effect of the SA)
714
+ degrades extraction success.
715
+ Sufficiently Protective Noise. Deciding at which point,
716
+ i.e., under the influence of how much noise, the recon-
717
+ struction of a data point is sufficiently close to the original
718
+ data point is orthogonal to this work. In particular, it will
719
+ depend on the specific domain, task, and user-preference.
720
+ However, users in FL should assume that the server can
721
+ extract individual data points such as the ones depicted in
722
+ Figure 3 from their gradients.
723
+ In the following, we will show how the server can
724
+ improve the fidelity of extraction by leveraging the re-
725
+ dundancy of extractable data due to the trap weights.
726
+ 5.3. Redundancy in Extracted Data
727
+ This section studies redundancy in extracted data of
728
+ the trap weights method and their effect on the fidelity of
729
+ reconstructed data.
730
+ Redundancy in Extractable Data Points. We first study
731
+ direct redundancy by analyzing how often each data point
732
+ in a mini-batch with B = 100 is individually extractable
733
+ 0
734
+ 2
735
+ 4
736
+ 6
737
+ 8
738
+ 10
739
+ # individual activations for data points
740
+ 0
741
+ 10
742
+ 20
743
+ 30
744
+ 40
745
+ 50
746
+ 60
747
+ 70
748
+ 80
749
+ # occurances
750
+ (a) Random weights.
751
+ 0
752
+ 5
753
+ 10
754
+ 15
755
+ 20
756
+ 25
757
+ 30
758
+ 35
759
+ 40
760
+ # individual activations for data points
761
+ 0
762
+ 10
763
+ 20
764
+ 30
765
+ 40
766
+ 50
767
+ 60
768
+ 70
769
+ # occurances
770
+ (b) Trap weights.
771
+ Figure 4: Number of Activations per Data Point. The
772
+ number of times each of the 100 data points is individu-
773
+ ally extractable from the model gradients. The same data
774
+ points are individually extractable from many more dif-
775
+ ferent gradients when using trap weights which enable us
776
+ to use redundancy for better data reconstruction. Results
777
+ are averaged over five different random and trap weight
778
+ model initializations.
779
+ 0
780
+ 20
781
+ 40
782
+ 60
783
+ 80
784
+ 100
785
+ # neuron activated by number of datapoints
786
+ 0
787
+ 50
788
+ 100
789
+ 150
790
+ 200
791
+ 250
792
+ # occurances
793
+ (a) Random weights.
794
+ 0
795
+ 5
796
+ 10
797
+ 15
798
+ 20
799
+ # neuron activated by number of datapoints
800
+ 0
801
+ 100
802
+ 200
803
+ 300
804
+ 400
805
+ 500
806
+ # occurances
807
+ (b) Trap weights.
808
+ Figure 5: Number of Activations per Neuron. Number
809
+ of data points that activate each one of the 1000 neurons.
810
+ Individual neurons are activated by fewer data points (less
811
+ overlay) when using trap weights which enable better data
812
+ reconstruction. Results are averaged over five different
813
+ random and trap weight model initializations.
814
+ from the rescaled gradients. The results depicted in Fig-
815
+ ure 4 suggest that the trap weights, first of all, make more
816
+ data points individually extractable in contrast to random
817
+ model initializations, but also cause the same data points
818
+ to be individually extractable from many more different
819
+ weight rows’ gradients (up to 70 times over the 1000
820
+ neurons and their respective weight rows).
821
+ Sparsity in Extractability. We, furthermore, evaluate by
822
+ how many data points each neuron gets activated. This
823
+ is equivalent to the question how many data points cause
824
+ a positive input to each neuron. Figure 5 highlights that
825
+ with randomly initialized weights, neurons are activated
826
+ by many more data points than with the trap weights,
827
+ which causes that many data points overlay in a single
828
+ gradient and we cannot extract them individually.
829
+ To improve fidelity of reconstruction, we can leverage
830
+ both the redundancy of extractable data and the sparsity
831
+ in the extracted data. By averaging redundant noisy data
832
+ points, the signal-to-noise ratio (SNR) of reconstructed
833
+ data increases as noise averages out. We visualize this
834
+ effect in Figure 6. Also sparsity can be exploited. The
835
+ fewer data points activate a neuron, the fewer data points
836
+ contained in the overlay of the rescaled gradient. Hence,
837
+ each individual data point’s signal is more clearly present
838
+ and identifiable in the rescaled gradients. In the following
839
+ section, we will show how this can be used to yield
840
+ higher-fidelity reconstruction in the image domain through
841
+ clustering.
842
+ 7
843
+
844
+ 0
845
+ 10
846
+ 20
847
+ 30
848
+ 40
849
+ 50
850
+ # averaged noisy samples
851
+ 1.46
852
+ 1.48
853
+ 1.50
854
+ 1.52
855
+ 1.54
856
+ 1.56
857
+ 1.58
858
+ 1.60
859
+ 1.62
860
+ SNR
861
+ #=1
862
+ #=5
863
+ #=10
864
+ #=50
865
+ Figure 6: Averaging out Noise. Mean value over #-many
866
+ noisy reconstructions of the same data point (bottom); cor-
867
+ responding mean image’s SNR (top). DDP setup: c = 1,
868
+ σ = 0.1, and M = 100. Over an increasing number
869
+ of reconstructions, the local noise averages out, yielding
870
+ higher-fidelity images and increased SNR.
871
+ 5.4. Improving Noisy Data Reconstruction
872
+ The previous sections highlight that DDP reduces to
873
+ LDP with weak privacy guarantees from an individual
874
+ user’s perspective when other users are untrusted with
875
+ their noise addition. In this section, we show how we
876
+ can even improve data reconstruction in this setup, further
877
+ amplifying the small signal in the extracted gradients. We
878
+ evaluate improvements for data reconstruction from noisy
879
+ gradients computed under DDP on image and textual data.
880
+ All improvements solely rely on post-processing steps to
881
+ reduce the effect of the noise.
882
+ Image Data. Due to the local clipping and noise addition
883
+ by the users, the data points extracted from the gradients
884
+ are not perfect reconstructions of the original data points.
885
+ We can still improve reconstruction quality by leveraging
886
+ redundancy and sparsity in the gradients to average out the
887
+ added noise, as highlighted in the previous section. How-
888
+ ever, without knowledge of the users data, the server has
889
+ no means of determining which data points activate which
890
+ neurons a priori. Therefore, it is unclear which rescaled
891
+ gradients need to be averaged to improve reconstruction
892
+ fidelity.
893
+ To overcome this limitation, we employ similarity
894
+ clustering. In this approach, the server first filters out ex-
895
+ tracted data points with a SNR below 1. This prevents too
896
+ noisy instances from degrading performance. In the fol-
897
+ lowing Section 6, we will discuss why different extracted
898
+ data points have different SNRs. Then, the server runs
899
+ a simple k-means clustering on the extracted data, and
900
+ finally averages all per-cluster data points. Thereby, we
901
+ do not only leverage redundancy in individually extracted
902
+ data points, but also the sparsity. The signal from gradients
903
+ that represent an overlay of very few data points can mean-
904
+ ingfully contribute to the improved signal. We evaluate
905
+ this approach with different noise scales and mini-batch
906
+ sizes B. Note that the number k of clusters has to be
907
+ chosen in accordance with the mini-batch size if we want
908
+ to be able to reconstruct every data point. Our evaluation
909
+ suggests that clustering works best when k ≥ 2B.
910
+ In Figure 7, we depict the results of our clustering on
911
+ data points from the CIFAR10 dataset with a DDP setup
912
+ with c = 1, σ = 0.1 and M = 100. The top row depicts
913
+ 10 original data points, the mid and bottom rows show
914
+ the closest averaged clusters for mini-batches of size 10,
915
+ and 20 respectively. The more instances are available for
916
+ averaging, the better the resulting per-cluster averages.
917
+ Textual Data.
918
+ For the text classifier on IMDB, we
919
+ initialize the weights of the embedding layer with a ran-
920
+ dom uniform distribution (minimum=0.0,maximum=1.0)
921
+ to
922
+ create
923
+ the
924
+ inputs
925
+ for
926
+ the
927
+ fully-connected
928
+ layer,
929
+ following
930
+ [7].
931
+ We
932
+ then
933
+ adversarially
934
+ initialize
935
+ this
936
+ fully-connected-layer’s weights with the trap weights
937
+ to perform extraction of the embeddings and invert the
938
+ embeddings back to tokens using a lookup dictionary. In
939
+ the presence of noise introduced for DDP, the extracted
940
+ embeddings are slightly noisy. To overcome this, in
941
+ presence of noise we perform the lookup by searching for
942
+ the token with the closest embedding measured through
943
+ the ℓ2 distance. Figure 8 shows performance of a single
944
+ mini-batch language extraction in presence of DP. Just as
945
+ with image data, here an attacker is capable of extracting
946
+ the original sentence of the users, despite the applied
947
+ noise. We do observe however that there is stochasticity
948
+ involved—when parametrization does well on the data
949
+ point by default, extraction gets low performance since
950
+ the received gradient has an extremely low magnitude
951
+ and the corresponding signal gets dominated by the
952
+ noise. We turn to this phenomena in the next section.
953
+ To summarize the results on image and textual data, we
954
+ find that:
955
+
956
+ The trap weights [7] cause input data-diversity and
957
+ redundancy in resulting gradients, which can be
958
+ used to cancel out some of the applied noise.
959
+
960
+ NLP is not safe from attacks described in
961
+ this paper, despite a more sophisticated input-
962
+ embeddings mapping.
963
+
964
+ Despite using DDP, an attacker often can recon-
965
+ struct semantic information on the individual user
966
+ data points. This is because in the presence of
967
+ untrusted other users, DDP reduces to LDP with
968
+ weak privacy guarantees from the perspective of
969
+ an individual user.
970
+
971
+ As shown in Figure 2, having users add more noise
972
+ locally, without additional improvements of the
973
+ protocol [44] comes with a significant decrease
974
+ in utility which makes the solution less practical.
975
+ 6. Disparate Leakage over Model Gradients
976
+ Throughout our experiments, we observe that with the
977
+ exact same scale of noise added to all gradients, some
978
+ extracted data points have a significantly higher SNR
979
+ than others. This effect translates into different levels of
980
+ semantic similarity in the extracted data with respect to
981
+ the original data as we show in Figure 3. In this section,
982
+ we explain this observation and sketch how it can be
983
+ leveraged by the adversary to better extract data in the
984
+ presence of noise.
985
+ 8
986
+
987
+ Figure 7: Similarity Clustering to improve noisy data extraction. Original data points and average clusters obtained
988
+ from the rescaled gradients depicted in Figure 3. First 10 original training data points from the CIFAR10 dataset (top
989
+ row). Averaged clusters of 10 data points reconstructed from the gradients for mini-batch size B = 10 (mid row), and
990
+ B = 20 with the first 10 examples depicted (bottom row). The numbers above the images indicate how many noisy
991
+ reconstructions were averaged to obtain that image.
992
+ 0.0000
993
+ 0.0002
994
+ 0.0004
995
+ 0.0006
996
+ 0.0008
997
+ 0.0010
998
+ Noise scale
999
+ 0.0
1000
+ 0.2
1001
+ 0.4
1002
+ 0.6
1003
+ 0.8
1004
+ 1.0
1005
+ 1.2
1006
+ Proportion of
1007
+ recovered tokens
1008
+ Figure 8: Textual Data Extraction under Noise. Ex-
1009
+ traction performance under noise for DDP from language
1010
+ model on the IMDB dataset. Extraction remains success-
1011
+ ful, even in presence of noise. Occasional drops in perfor-
1012
+ mance occur because of near-zero gradients resulted from
1013
+ correct data classification, i.e. data points with very low
1014
+ original loss. Error bars correspond to a single standard
1015
+ deviation.
1016
+ 6.1. Impact of Gradient Norm
1017
+ We find that the SNR of an extracted data point is
1018
+ tightly bound to the magnitude, i.e. the norm, of the
1019
+ respective gradients. In Figure 9, we depict the SNR
1020
+ in the rescaled clipped and noised gradients, i.e., the
1021
+ extracted data points, against their respective gradient
1022
+ norms. The figure shows that with higher magnitude
1023
+ gradients, the same amount of noise has less impact on
1024
+ the signal, whereas, with smaller magnitude gradients,
1025
+ the same amount of noise largely dominates the signal.
1026
+ Therefore, increased magnitude of model gradients results
1027
+ in an increased data leakage.
1028
+ The norm of a weight row’s gradients in the model
1029
+ depends on the model’s loss. In general, higher loss re-
1030
+ sults in higher magnitude gradients, in particular for the
1031
+ weight rows that most contribute to the loss. Intuitively,
1032
+ 0.00
1033
+ 0.02
1034
+ 0.04
1035
+ 0.06
1036
+ 0.08
1037
+ 0.10
1038
+ 0.12
1039
+ 0.14
1040
+ norm of clipped and noised gradient
1041
+ 0
1042
+ 2
1043
+ 4
1044
+ 6
1045
+ SNR
1046
+ Figure 9: Gradient Norm vs. SNR. Norm of the clipped
1047
+ and noised gradients of 1000 weight rows against SNR
1048
+ in corresponding extracted data point, i.e. the rescaled
1049
+ gradients. With higher gradient norms, the SNR in the
1050
+ extracted data increases. DDP setup: c = 1, σ = 0.1, and
1051
+ M = 100.
1052
+ to increase data leakage from noisy gradients, the server
1053
+ could, therefore, manipulate the shared model to produce
1054
+ higher loss. In the best case, the loss would be caused
1055
+ by all weight rows in the fully-connected layer used
1056
+ for extraction with the trap weights. This ensures high-
1057
+ magnitude gradients at all the weight rows’ gradients and,
1058
+ thereby, enables enhanced extraction at all of them.
1059
+ 6.2. Global vs. Local Effect of Clipping
1060
+ However, in DDP, before noise addition, users perform
1061
+ a clipping step, bounding the maximum per-layer gradient
1062
+ norm, and hence the extractable signal from a gradient
1063
+ update. More precisely, clipping bounds the total norm
1064
+ of a model layer’s gradients to the clipping parameter
1065
+ c. If all weight rows have high gradients, their joint
1066
+ norm will exceed c, and therefore, all of them will have
1067
+ to be scaled down to reduce the total norm to c. The
1068
+ effect is visualized in the middle row of Figure 10. It
1069
+ 9
1070
+
1071
+ Figure 10: Extraction Success with Additional Model
1072
+ Manipulations. Row 1 (top): Under trap weights only
1073
+ (baseline), gradients at different weight rows have varying
1074
+ SNRs under the same amount of added noise, depending
1075
+ on their magnitudes. Row 2 (middle): When the shared
1076
+ model is further manipulated (Section 6.3) and all weight
1077
+ rows contribute equally to a high loss, their gradients will
1078
+ be clipped, which results in equal information loss for all
1079
+ of them. Row 3 (bottom): When only a few weight rows
1080
+ contribute to a high loss, their gradients preserve a high
1081
+ magnitude over clipping, which allows for higher fidelity
1082
+ extraction. DDP setup: c = 1, σ = 0.1, and M = 10.
1083
+ Trap Weight Row 1
1084
+ Trap Weight Row 2
1085
+ Trap Weight Row n
1086
+
1087
+
1088
+ Class 1
1089
+ Class m
1090
+ Added Class
1091
+ 1
1092
+ 0
1093
+ 0
1094
+ Figure 11: Amplification of Gradient Magnitudes. The
1095
+ misclassification of an example to the added class in-
1096
+ creases the magnitude of its gradient for weight rows that
1097
+ contribute to the loss.
1098
+ shows that in this scenario, the extracted data over all
1099
+ gradients has a relatively low signal, which yields low-
1100
+ fidelity reconstruction.
1101
+ Even though with DP and clipping, it is not possible
1102
+ to have high magnitude gradients over all weight rows,
1103
+ we note that the clipping is performed globally per-model
1104
+ layer. Hence, if only a few weight rows locally have a
1105
+ high magnitude gradient but all other weight rows have
1106
+ a low magnitude gradient, then their joint norm can be
1107
+ below c. As a consequence, no clipping will be performed.
1108
+ The effect of this scenario is visualized in the bottom
1109
+ row of Figure 10. It highlights that while most gradients
1110
+ yield pure-noise reconstruction, a few gradients contain a
1111
+ very high-fidelity reconstruction of the input data. These
1112
+ gradients correspond to individual neurons whose gra-
1113
+ dients were less affected by the clipping operation due
1114
+ to the local vs. global effect we described. This higher
1115
+ vulnerability of certain neurons is desirable for improved
1116
+ data reconstruction under DDP.
1117
+ 6.3. Exploiting Global Clipping for Increased Ex-
1118
+ tractability
1119
+ The previous section highlights that the global per-
1120
+ layer clipping in DP still allows local parts of the gradients
1121
+ to be large. This can be exploited for higher-fidelity data
1122
+ extraction from neurons corresponding to these gradients.
1123
+ In this section, we sketch the idea for a possible model
1124
+ manipulation that gives an attacker the control on local
1125
+ gradient magnitudes to amplify this effect.
1126
+ We base our manipulation on a fully-connected neural
1127
+ network with two layers. The first layer is initialized with
1128
+ the trap weights for extraction and has a ReLU activation
1129
+ function. The second classification layer is modified to
1130
+ yield high loss (without knowledge of the user data).
1131
+ Therefore, we add an additional neuron to the classifi-
1132
+ cation layer, i.e., an additional class that does not occur
1133
+ in the data distribution. Then, we set most of the weights
1134
+ connecting the output of the previous layers’ neurons to
1135
+ this additional class to very small values, e.g. zero, and the
1136
+ weights for a few neurons’ output to high values, e.g. one.
1137
+ Due to the ReLU activation of the first layer, this
1138
+ layer’s outputs are positive. High weights, connecting
1139
+ neurons to the added class in the second layer, ”attribute”
1140
+ the loss of the misclassification to a few trap weight rows.
1141
+ As a consequence, only the gradients of these few trap
1142
+ weight rows obtain a high magnitude (as illustrated in Fig-
1143
+ ure 11 for the Trap Weight Row 2). All other trap weight
1144
+ rows (row 1 and n in Figure 11) have low-magnitude
1145
+ gradients. The overall norm of the layer’s gradients will
1146
+ stay below the clipping parameter c, hence no clipping will
1147
+ be applied, enabling high-fidelity data extraction from the
1148
+ Trap Weight Row 2.
1149
+ We instantiated the above construction with a fully-
1150
+ connected neural network consisting of 1000 neurons in
1151
+ the first layer and eleven neurons in the second layer for
1152
+ experimental evaluation. The first layer’s weights were
1153
+ initialized with trap weights, while the second layer was
1154
+ initialized with a Glorot uniform distribution. We then ma-
1155
+ nipulated the weights connecting to the eleventh (added)
1156
+ class and set varying fractions (10%, 30%, 50%, and
1157
+ 100%) of them to one and the rest to zero. Using the
1158
+ CIFAR10 dataset, we performed data reconstruction.
1159
+ In Figure 10, we visualize the extracted data. For the
1160
+ top row, all weights of the second layer are initialized
1161
+ at random. In the middle row, 100% of the weights
1162
+ connecting to the added class are set to one, and in the
1163
+ bottom row, 10% of these weights are set to one and the
1164
+ rest to zero.
1165
+ We furthermore measured the SNRs of the extracted
1166
+ data and depict the results in Figure 12. The results are
1167
+ consistent to the observations from Figure 10: When few
1168
+ weight rows contribute to the high loss, their respective
1169
+ rescaled gradients, i.e. the extracted data points, have a
1170
+ higher SNR. This allows for higher-fidelity extraction. In
1171
+ contrast, when all weight rows contribute equally to the
1172
+ high loss, all their rescaled gradients have a similar (lower)
1173
+ SNR. This is because of all their gradients being (equally)
1174
+ affected by the clipping. In general, the more weight rows
1175
+ contribute to a high loss, the lower their individual SNRs.
1176
+ Our two-layer construction naturally integrates with
1177
+ other architectures starting with convolutional and embed-
1178
+ 10
1179
+
1180
+ 0.00
1181
+ 0.25
1182
+ 0.50
1183
+ 0.75
1184
+ 1.00
1185
+ 1.25
1186
+ 1.50
1187
+ 1.75
1188
+ 2.00
1189
+ SNR
1190
+ 0
1191
+ 20
1192
+ 40
1193
+ 60
1194
+ 80
1195
+ 100
1196
+ 120
1197
+ 140
1198
+ 160
1199
+ count
1200
+ modified
1201
+ original
1202
+ (a) 100
1203
+ 0.00
1204
+ 0.25
1205
+ 0.50
1206
+ 0.75
1207
+ 1.00
1208
+ 1.25
1209
+ 1.50
1210
+ 1.75
1211
+ 2.00
1212
+ SNR
1213
+ 0
1214
+ 20
1215
+ 40
1216
+ 60
1217
+ 80
1218
+ 100
1219
+ 120
1220
+ 140
1221
+ 160
1222
+ count
1223
+ modified
1224
+ original
1225
+ (b) 300
1226
+ 0.00
1227
+ 0.25
1228
+ 0.50
1229
+ 0.75
1230
+ 1.00
1231
+ 1.25
1232
+ 1.50
1233
+ 1.75
1234
+ 2.00
1235
+ SNR
1236
+ 0
1237
+ 20
1238
+ 40
1239
+ 60
1240
+ 80
1241
+ 100
1242
+ 120
1243
+ 140
1244
+ 160
1245
+ count
1246
+ modified
1247
+ original
1248
+ (c) 500
1249
+ 0.00
1250
+ 0.25
1251
+ 0.50
1252
+ 0.75
1253
+ 1.00
1254
+ 1.25
1255
+ 1.50
1256
+ 1.75
1257
+ 2.00
1258
+ SNR
1259
+ 0
1260
+ 20
1261
+ 40
1262
+ 60
1263
+ 80
1264
+ 100
1265
+ 120
1266
+ 140
1267
+ 160
1268
+ count
1269
+ modified
1270
+ original
1271
+ (d) 1000
1272
+ Figure 12: SNRs of Rescaled Clipped and Noised
1273
+ Gradients, i.e. the extracted data points. The first fully-
1274
+ connected layer used for extraction consists of 1000 neu-
1275
+ rons. The respective weight rows are initialized with our
1276
+ trap weights. The second layer is manipulated by adding
1277
+ an additional class neuron, and setting {100, 300, 500,
1278
+ 1000} of the 1000 weights that are connected to this neu-
1279
+ ron to one. The remaining weights that go to this neuron
1280
+ are set to zero. The original baseline consists in randomly
1281
+ initialized weights for second fully-connected model layer.
1282
+ Noise with scale 0.001 is added to all gradients; clipping
1283
+ parameter c = 1. When fewer weight rows (in this case
1284
+ 100) contribute to the high loss, the data points extracted
1285
+ from the respective rescaled gradients have the highest
1286
+ SNR (> 1.5), which allows for higher fidelity extraction
1287
+ (compare to Row 3 (bottom) in Figure 10).
1288
+ ding layers described in this work. We leave fine-tuning
1289
+ and the extension of our construction to architectures that
1290
+ end with more than two fully-connected layers for future
1291
+ work. However, the approach highlights that even when
1292
+ DDP is in place, the server can initialize a model to
1293
+ increase the likelihood of reconstructing points with high
1294
+ fidelity.
1295
+ 7. Related Work
1296
+ We survey related work on privacy attacks against
1297
+ model gradients, in particular in the setup of FL.
1298
+ Passive Attacks against Vanilla FL. Phong et al. [39]
1299
+ were the first to show how gradients leak information that
1300
+ can be used to recover training data at single neurons or
1301
+ linear layers. Recent work [16], [39], [49], [54], [56], [57]
1302
+ proposed exploiting this leakage for data reconstruction,
1303
+ for example, through Generative Adversarial Networks
1304
+ [21] (GANs), or by solving a second order optimization
1305
+ problem.
1306
+ Active Attacks against Vanilla FL. Melis et al. [33] pro-
1307
+ posed membership [42] and property inference [3] attacks
1308
+ based on periodically analyzing the model updates in an
1309
+ FL setup. They consider both passive and active attackers
1310
+ in vanilla FL. Nasr et al. [35] assume active attackers (both
1311
+ users and server) for membership inference. Similarly to
1312
+ Melis et al., their attackers do not directly alter the shared
1313
+ model, but rather manipulate it through model updates
1314
+ (users through gradients, and the server by modifying the
1315
+ aggregated model update). Recent work [7], [14], [51],
1316
+ have shown that manipulating the shared model allows
1317
+ a malicious server to extract user data perfectly from
1318
+ the model gradients. In contrast to all these attacks that
1319
+ consider vanilla FL, our work attacks FL with additional
1320
+ extension for dedicated privacy protection through DDP
1321
+ and SA. As we discussed in Section 4.3, the extraction
1322
+ attacks for vanilla FL can be integrated into our attack
1323
+ flow for improved data extraction. We show this using
1324
+ [7]’s trap weights.
1325
+ Attacks against Hardened FL. To our knowledge, the
1326
+ only prior work in this vein is due to Pasquini et al. [37].
1327
+ This work noticed that in SA the server has the ability to
1328
+ dispatch inconsistent models to different users, and used
1329
+ this to circumvent SA entirely. As we note in Section 4.1,
1330
+ their attack against SA is not able to circumvent DDP
1331
+ since even when all users’s models but the target user’s
1332
+ model produce zero gradients, benign users would still add
1333
+ their share of noise. Thereby, privacy guarantees through
1334
+ DDP can still be achieved. Finally, while Pasquini et al.
1335
+ focuses on leveraging a specific capability of the server
1336
+ to circumvent a specific mechanism, we systematically
1337
+ study the server’s capabilities arising from FL’s pervasive
1338
+ centralization, and consequently offer a rich breadth of
1339
+ contributions over this work. We suggest a simpler and
1340
+ more powerful attack that relies on sybils introduced
1341
+ by the server to circumvent SA, compose this attack
1342
+ with other attacks relying on other capabilities to extract
1343
+ individual data points (the attack by [37] only extracts
1344
+ updates, not individual user data points) and attack a
1345
+ variant that also includes DDP.
1346
+ 8. Discussion: Privacy-Preserving FL
1347
+ In this section, we discuss the following three main
1348
+ questions:
1349
+
1350
+ Q1: What is the core reason behind FL’s vulner-
1351
+ ability to privacy attacks as the one of this work?
1352
+
1353
+ Q2: How can the vulnerability be fixed?
1354
+
1355
+ Q3: What privacy guarantees can, as of now, be
1356
+ provided to FL users?
1357
+ 8.1. Q1: What is the Root Cause of Vulnerability?
1358
+ We posit that the root cause of FL’s vulnerability to
1359
+ attacks, like the one introduced in this work, is the power
1360
+ imbalance in the centralized design of FL. At its core, FL
1361
+ is a highly centralized protocol where the server makes
1362
+ the final decisions. For example, DDP+SA is commonly
1363
+ regarded as a privacy-enhancing solution in modern FL,
1364
+ adding local noise and decentralizing the aggregation step
1365
+ of the original design, however, the server can circumvent
1366
+ the defense by controlling users and manipulating the
1367
+ shared model. In this paper, we demonstrate that even
1368
+ though the protocols behind DDP+SA and their funda-
1369
+ mental cryptographic primitives are correct, the underly-
1370
+ ing assumptions are not met when the server is malicious.
1371
+ We detail the factors enabling the different aspects of
1372
+ the attack presented in this work:
1373
+ 11
1374
+
1375
+ 1)
1376
+ The server is able to control a fraction of users.
1377
+ 2)
1378
+ The server provisions users for participation in
1379
+ each protocol-round.
1380
+ 3)
1381
+ The server holds the power to manipulate the
1382
+ shared model.
1383
+ 4)
1384
+ The users have no inherent way of verifying each
1385
+ other’s correctness.
1386
+ 5)
1387
+ The users cannot meaningfully validate model
1388
+ updates.
1389
+ Decentralization can indeed help balance the power
1390
+ disparity, but it should be introduced very carefully and
1391
+ consider the system as a whole [38]. Next, we elaborate
1392
+ more on decentralization and other methods that can ad-
1393
+ dress the vulnerability.
1394
+ 8.2. Q2: How to Fix the Vulnerability?
1395
+ We analyze how to fix the vulnerability by considering
1396
+ the following three approaches: (1) decentralization, (2)
1397
+ verification on the user-side to decrease trust assumptions
1398
+ made about the server, and (3) application of external
1399
+ hardware and (cryptographic) protocols that implement
1400
+ guarantees under the presence of an untrusted server.
1401
+ Decentralizing FL. Several approaches were introduced
1402
+ to decentralize parts of FL, or the entire protocol. We
1403
+ survey them and discuss their practical applicability.
1404
+ Decentralized methods for selecting a protocol round’s
1405
+ participants are available [4], [18], [41], [53]. For example,
1406
+ mechanisms where the users perform a self-sampling,
1407
+ such as [18], have been put forward. These allow users to
1408
+ decide about their participation and, thereby, reduce the
1409
+ power of the server. Anarchic FL [53] goes even further
1410
+ and lets users choose an arbitrary point in time to update
1411
+ the shared model with fully-individualized training pa-
1412
+ rameterization; the server observes user updates directly,
1413
+ but each user can individually determine their required
1414
+ privacy level and act accordingly (for example, train on a
1415
+ lot of data, or add a lot of noise). This does not only
1416
+ mitigate the attack vector where the server samples a
1417
+ target user along with sybil devices. If the users implement
1418
+ enough protection locally, the server cannot extract their
1419
+ private data. Yet, such mechanisms come with a significant
1420
+ increase in operational complexity and are faced with the
1421
+ major challenge of motivating users to provide truthful
1422
+ private data, compromising overall system utility.
1423
+ An interesting decentralized-FL attempt, Biscotti [41],
1424
+ addresses the issue of sybil attacks by offering a block-
1425
+ chain based protocol that selects users in a decentralized
1426
+ fashion based on past behavior that appears to demonstrate
1427
+ honesty. This is called Proof-of-Federation (PoF), and
1428
+ honesty is indicated by contributing updates to the model
1429
+ that appear close to many other updates (and are thus
1430
+ assumed to be of high quality). However, users can try
1431
+ to appear honest and yet act maliciously in ways that
1432
+ will not affect the update-quality metric, for example,
1433
+ by not performing their role when they are supposed to
1434
+ noise or verify updates (roles for round participants in
1435
+ the Biscotti protocol which have no performance quality
1436
+ metric). Biscotti would have to be extensively audited for
1437
+ vulnerabilities to this and other attacks before it can be
1438
+ safely and widely deployed. Ultimately, the designs of
1439
+ these decentralized FL systems are very different from
1440
+ FL’s original design, and usually from each other’s de-
1441
+ signs. At the time of writing, we are not aware of any
1442
+ prominent real-world FL deployments that adopt such
1443
+ decentralization.
1444
+ User-Side Verification. Alternatively to decentralization,
1445
+ or in addition to it, we can try to reduce the trust that users
1446
+ have to place in the server by performing verification on
1447
+ the user side.
1448
+ First, we discuss the verification of the shared model.
1449
+ Giving users the ability to verify the shared model’s
1450
+ integrity can prevent malicious manipulations against it,
1451
+ such as the ones of the trap weights that we integrated
1452
+ into our attack flow. Unfortunately, without any changes
1453
+ to FL, there is no full-proof way to distinguish weight
1454
+ manipulation from model weights resulting from legit-
1455
+ imate previous training. Users have no insights on the
1456
+ data of other users, updates are affected by stochasticity
1457
+ including sampling [43], non-deterministic hardware ele-
1458
+ ments [26], and large-scale FL applications with control
1459
+ flow mechanisms [8] that do not sample every user in
1460
+ every round [40]. Ultimately, this makes it impossible to
1461
+ track how the model evolves over time since a user gets
1462
+ only intermittent views of the shared model. Given these
1463
+ difficulties, we might consider solutions that modify FL
1464
+ to make manipulation-detection easier.
1465
+ Second, we discuss the option of users verifying other
1466
+ users. Privacy guarantees in DDP result from all users
1467
+ adding their share of noise to protect the aggregate of all
1468
+ gradients. If only one user does not add their share of
1469
+ noise, the claimed theoretical overall privacy guarantees
1470
+ cannot be reached. Our attack exploits this effect and
1471
+ exposes the gradients of a target user by omitting noise
1472
+ addition of all other users sampled in the protocol round.
1473
+ To prevent this attack vector, users have to verify
1474
+ that other users calculate their gradients correctly and
1475
+ add the correct amount of noise. However, due to the
1476
+ centralization in standard FL protocols, users do not have
1477
+ direct communication channels with each other. The cen-
1478
+ tral party acts as an intermediary in their interactions. As
1479
+ an alternative, FL could be deployed within a Public Key
1480
+ Infrastructure (PKI) [5]. However, a server that behaves
1481
+ semi-honestly is required during the key collection phase
1482
+ of PKI. Hence, users rely again on their trust in the server
1483
+ while nothing in the protocol prevents this server from
1484
+ acting maliciously and registering their introduced sybil
1485
+ devices to the PKI prior to training.
1486
+ In fact, protocols like SA rely on the assumption that
1487
+ users participating in the protocol are actual users and no
1488
+ sybil devices controlled by the server [5]. Yet, nothing in
1489
+ the integration of the protocol into FL verifies or enforces
1490
+ this assumption. As a consequence, users who do not trust
1491
+ the server will have to verify that other users participat-
1492
+ ing with them in a protocol round follow the protocol,
1493
+ correctly calculate their gradients, and add their share
1494
+ of noise. Verifying correct gradient calculations without
1495
+ users having to reveal their private data to each other,
1496
+ can, in principle, be implemented through zero knowledge
1497
+ proofs (ZKPs) where users commit to their private data
1498
+ and prove correct gradient calculation. However, in our
1499
+ attack, the sybil devices are controlled by the server. As a
1500
+ consequence, even when they compute correct gradients,
1501
+ the server will be able to subtract these from the aggregate
1502
+ 12
1503
+
1504
+ gradient to obtain the target user’s gradients and conduct
1505
+ extraction as described in this work. The same argument
1506
+ can be applied to correct noise addition.
1507
+ This motivates the need for users to verify that other
1508
+ users are no sybil devices. Prior sybil device detection in
1509
+ FL relies on analyzing gradients [15] under the assumption
1510
+ of a non-malicious server. This approach fails to prevent
1511
+ our attack where sybils are controlled by the server and
1512
+ can, as mentioned above contribute meaningful gradients,
1513
+ as long as the server can subtract these from the aggregate.
1514
+ Yet, if users in FL have a way to confidently determine if
1515
+ other users are sybil devices, and if users have a chance
1516
+ to refrain from contributing to the protocol under their
1517
+ presence, our attack can be mitigated.
1518
+ Finally, it is desirable to enable users to verify the
1519
+ whole FL application and its local execution. This allows
1520
+ them to make sure that their local client handles their data
1521
+ correctly, adds enough local noise, and is not manipulated
1522
+ by the server. However, in modern FL ecosystems the FL
1523
+ client applications are proprietary software encapsulated
1524
+ in dedicated partitions [48] largely inaccessible to users.
1525
+ Additionally, the developers of verification software are
1526
+ usually the same entity acting as the server, bestowing
1527
+ it with even more power. Therefore, we recommend that
1528
+ applications of purportedly privacy-preserving protocols
1529
+ should be open-source so that they are available for audits
1530
+ and verification by the community.
1531
+ Hardware and Protocol Support. As the last approach
1532
+ to fixing the vulnerability of FL, we discuss the support
1533
+ of dedicated hardware and (cryptographic) protocols to
1534
+ implement guarantees for the users.
1535
+ By relying on protocols that are based on trusted
1536
+ execution environments (TEE), e.g. [34] the server can be
1537
+ prevented from manipulating the shared model. This re-
1538
+ duces the success of data extraction as the one underlying
1539
+ our attack. Additionally, to make sure that users always
1540
+ receive a well-controlled and no a manipulated model, we
1541
+ suggest releasing the shared model publicly, for example,
1542
+ in a block-chain. This makes it impossible to manipulate
1543
+ and change a shared model after release.
1544
+ A drawback of this solution is that it offers outside
1545
+ attackers access to several intermediate model states. We
1546
+ argue that this is not too restricting, though, since the
1547
+ shared model is also sent out to a few hundreds or
1548
+ thousands of users during each round. Hence, there exists
1549
+ the possibility of the internal model states being leaked,
1550
+ anyways. Yet, [7] has shown that even non-manipulated
1551
+ ML models, under certain conditions, leak their private
1552
+ training data. Moreover, when it comes to TEEs, they
1553
+ are prone to side-channel attacks, e.g. [25]. Hence, we
1554
+ conclude that even under such hardware protection some
1555
+ privacy risk for users remains.
1556
+ Homomorphic encryption (HE) is a candidate solu-
1557
+ tion to protect user gradients against leakage to a ma-
1558
+ licious server. However, existing instantiations [55] do
1559
+ not prevent our attack since, for efficiency in training,
1560
+ users decrypt the aggregated gradients and apply them
1561
+ to their (unencrypted) local model. In our attack, the
1562
+ server controls sybil devices, hence, it obtains access to
1563
+ the decrypted aggregate and can extract the target user’s
1564
+ gradient by subtracting the sybil devices’ contributions.
1565
+ Finally, a cryptographic protocol that always adds
1566
+ enough noise to user gradients in an aggregation step
1567
+ would mitigate the privacy leakage of the attack presented
1568
+ in this work. The protocol should offer DP, but without
1569
+ making any questionable trust assumptions on other users.
1570
+ We envision a secure multiparty computation (SMPC)
1571
+ protocol that performs update aggregation, much like SA,
1572
+ but also ensures that the output is added with a sufficient
1573
+ amount of noise to implement DP before it is dispatched
1574
+ to the server. As long as within this protocol users do
1575
+ not learn about each others’ inputs, and the server only
1576
+ learns the aggregated (and noised) output, the protocol
1577
+ may be able to offer a comparatively favorable privacy-
1578
+ utility trade-off. To the best of our knowledge, so far, no
1579
+ protocol for jointly adding sufficient amounts of noise to
1580
+ user gradients in SMPC exists and given the gradients’
1581
+ high dimensionality, the costs of any such approach will
1582
+ most likely not be practical, yet.
1583
+ 8.3. Q3: What Users Can Do Today?
1584
+ Let us assume that a user wishes to attain DP guar-
1585
+ antees, and with good reason, as DP is the most viable
1586
+ and protective form of privacy guarantee in use today. Our
1587
+ study of FL and its extensions demonstrates that the mere
1588
+ inclusion of a DP mechanism does not necessarily provide
1589
+ protection if this mechanism makes assumptions that are
1590
+ inaccurate in the context of the given system.
1591
+ We currently see two promising directions for users to
1592
+ attain strong privacy guarantees.
1593
+ Local Differential Privacy. The first one consists of
1594
+ implementing their full privacy protection locally, without
1595
+ trusting any other participant of the protocol, neither the
1596
+ server nor other users to contribute to their protection. One
1597
+ way to implement such protection is LDP with conserva-
1598
+ tive parameterization, and while ensuring that data point
1599
+ reuse is accounted for and prevented when needed [45].
1600
+ While LDP comes at cost of the utility of the shared
1601
+ models, approaches to successfully improve the trade-offs
1602
+ exist for FL deployments with large numbers of partic-
1603
+ ipants [44]. We think that improving LDP to desirable
1604
+ privacy-utility trade-offs is a promising direction.
1605
+ FL Protocols with Trusted Servers. The second option
1606
+ for users to obtain privacy guarantees is to opt-out of FL
1607
+ altogether, if they do not trust the server, potentially while
1608
+ trying to hide this, for example, by providing randomized
1609
+ “garbage” updates to the server. However, this approach
1610
+ comes with a corresponding utility cost and undermines
1611
+ the purpose of collaborative learning to produce a perfor-
1612
+ mant model that fits many diverse individuals.
1613
+ Finally, these options are only available if users can
1614
+ control the local FL application software, which is usually
1615
+ not the case (unless an opt-out option is provided).
1616
+ 9. Conclusion
1617
+ Truly privacy-preserving ML must defend itself from
1618
+ attackers that are malicious and hence do not follow
1619
+ protocol. In this work, we presented a highly efficient
1620
+ data extraction attack against FL in a strongly protected
1621
+ deployment, namely with SA and DDP. Based on the
1622
+ attack’s success, we analyzed the question of the mini-
1623
+ mum trust model that is required to obtain meaningful
1624
+ 13
1625
+
1626
+ privacy guarantees for the users. We showed that FL can
1627
+ provide privacy guarantees if the users trust the server, or
1628
+ if they rely on adequate cryptographic protocols, and if
1629
+ adequate additional protection methods are in place. Most
1630
+ of the methods for protection aim at shifting power from
1631
+ the server to the conglomerate of users and come with
1632
+ significant costs or overhead. Therefore, such systems are
1633
+ not yet practically in place. As a consequence, as of yet,
1634
+ we recommend that users only participate in FL protocols
1635
+ that are orchestrated by a trusted server.
1636
+ Acknowledgments
1637
+ We would like to acknowledge our sponsors, who
1638
+ support our research with financial and in-kind contri-
1639
+ butions: Alfred P. Sloan Foundation, Amazon, Apple,
1640
+ Canada Foundation for Innovation, CIFAR through the
1641
+ Canada CIFAR AI Chair program, DARPA through the
1642
+ GARD program, Intel, Meta, NFRF through an Explo-
1643
+ ration grant, and NSERC through the Discovery Grant and
1644
+ COHESA Strategic Alliance, and the Ontario Early Re-
1645
+ searcher Award. Resources used in preparing this research
1646
+ were provided, in part, by the Province of Ontario, the
1647
+ Government of Canada through CIFAR, and companies
1648
+ sponsoring the Vector Institute. We would like to thank
1649
+ members of the CleverHans Lab for their feedback.
1650
+ References
1651
+ [1]
1652
+ Martin Abadi, Andy Chu, Ian Goodfellow, H. Brendan McMahan,
1653
+ Ilya Mironov, Kunal Talwar, and Li Zhang. Deep learning with
1654
+ differential privacy. In Edgar Weippl, editor, Proceedings of the
1655
+ 2016 ACM SIGSAC Conference on Computer and Communications
1656
+ Security. ACM, 2016.
1657
+ [2]
1658
+ Naman Agarwal, Peter Kairouz, and Ziyu Liu.
1659
+ The skellam
1660
+ mechanism for differentially private federated learning. Advances
1661
+ in Neural Information Processing Systems, 34, 2021.
1662
+ [3]
1663
+ Giuseppe Ateniese, Luigi V Mancini, Angelo Spognardi, Antonio
1664
+ Villani, Domenico Vitali, and Giovanni Felici.
1665
+ Hacking smart
1666
+ machines with smarter ones: How to extract meaningful data from
1667
+ machine learning classifiers. International Journal of Security and
1668
+ Networks, 10(3):137–150, 2015.
1669
+ [4]
1670
+ Borja Balle, Peter Kairouz, Brendan McMahan, Om Thakkar, and
1671
+ Abhradeep Guha Thakurta.
1672
+ Privacy amplification via random
1673
+ check-ins. Advances in Neural Information Processing Systems,
1674
+ 33:4623–4634, 2020.
1675
+ [5]
1676
+ James Henry Bell, Kallista A Bonawitz, Adri`a Gasc´on, Tancr`ede
1677
+ Lepoint, and Mariana Raykova. Secure single-server aggregation
1678
+ with (poly) logarithmic overhead. In Proceedings of the 2020 ACM
1679
+ SIGSAC Conference on Computer and Communications Security,
1680
+ pages 1253–1269, 2020.
1681
+ [6]
1682
+ Andrea Bittau, ´Ulfar Erlingsson, Petros Maniatis, Ilya Mironov,
1683
+ Ananth Raghunathan, David Lie, Mitch Rudominer, Ushasree
1684
+ Kode, Julien Tinnes, and Bernhard Seefeld. Prochlo: Strong privacy
1685
+ for analytics in the crowd. In Proceedings of the 26th Symposium
1686
+ on Operating Systems Principles, pages 441–459, 2017.
1687
+ [7]
1688
+ Franziska Boenisch, Adam Dziedzic, Roei Schuster, Ali Shahin
1689
+ Shamsabadi, Ilia Shumailov, and Nicolas Papernot.
1690
+ When the
1691
+ curious abandon honesty: Federated learning is not private. arXiv
1692
+ preprint arXiv:2112.02918, 2021.
1693
+ [8]
1694
+ Keith Bonawitz, Hubert Eichner, Wolfgang Grieskamp, Dzmitry
1695
+ Huba, Alex Ingerman, Vladimir Ivanov, Chloe Kiddon, Jakub
1696
+ Koneˇcn`y, Stefano Mazzocchi, Brendan McMahan, et al. Towards
1697
+ federated learning at scale: System design. Proceedings of Machine
1698
+ Learning and Systems, 1:374–388, 2019.
1699
+ [9]
1700
+ Keith Bonawitz, Vladimir Ivanov, Ben Kreuter, Antonio Marce-
1701
+ done, H Brendan McMahan, Sarvar Patel, Daniel Ramage, Aaron
1702
+ Segal, and Karn Seth. Practical secure aggregation for privacy-
1703
+ preserving machine learning.
1704
+ In proceedings of the 2017 ACM
1705
+ SIGSAC Conference on Computer and Communications Security,
1706
+ pages 1175–1191, 2017.
1707
+ [10] Lukas Burkhalter, Hidde Lycklama, Alexander Viand, Nicolas
1708
+ K¨uchler, and Anwar Hithnawi.
1709
+ Rofl: Attestable robustness for
1710
+ secure federated learning. arXiv preprint arXiv:2107.03311, 2021.
1711
+ [11] Wei-Ning Chen, Christopher A Choquette-Choo, Peter Kairouz,
1712
+ and Ananda Theertha Suresh.
1713
+ The fundamental price of secure
1714
+ aggregation in differentially private federated learning.
1715
+ arXiv
1716
+ preprint arXiv:2203.03761, 2022.
1717
+ [12] C Dwork. Differential privacy in the 40th international colloquium
1718
+ on automata. Languages and Programming, 2006.
1719
+ [13]
1720
+ ´Ulfar Erlingsson, Vitaly Feldman, Ilya Mironov, Ananth Raghu-
1721
+ nathan, Kunal Talwar, and Abhradeep Thakurta. Amplification by
1722
+ shuffling: From local to central differential privacy via anonymity.
1723
+ In Proceedings of the Thirtieth Annual ACM-SIAM Symposium on
1724
+ Discrete Algorithms, pages 2468–2479. SIAM, 2019.
1725
+ [14] Liam H Fowl, Jonas Geiping, Wojciech Czaja, Micah Goldblum,
1726
+ and Tom Goldstein. Robbing the fed: Directly obtaining private
1727
+ data in federated learning with modified models. In International
1728
+ Conference on Learning Representations, 2021.
1729
+ [15] Clement Fung, Chris JM Yoon, and Ivan Beschastnikh. The limi-
1730
+ tations of federated learning in sybil settings. In 23rd International
1731
+ Symposium on Research in Attacks, Intrusions and Defenses (RAID
1732
+ 2020), pages 301–316, 2020.
1733
+ [16] Jonas Geiping, Hartmut Bauermeister, Hannah Dr¨oge, and Michael
1734
+ Moeller. Inverting Gradients – How easy is it to break privacy in
1735
+ federated learning? 2020. 23 pages, 20 figures. The first three
1736
+ authors contributed equally.
1737
+ [17] Antonious Girgis, Deepesh Data, Suhas Diggavi, Peter Kairouz,
1738
+ and Ananda Theertha Suresh. Shuffled model of differential privacy
1739
+ in federated learning.
1740
+ In International Conference on Artificial
1741
+ Intelligence and Statistics, pages 2521–2529. PMLR, 2021.
1742
+ [18] Antonious M Girgis, Deepesh Data, and Suhas Diggavi. Differ-
1743
+ entially private federated learning with shuffling and client self-
1744
+ sampling. In 2021 IEEE International Symposium on Information
1745
+ Theory (ISIT), pages 338–343. IEEE, 2021.
1746
+ [19] Raja Giryes, Guillermo Sapiro, and Alex M Bronstein. Deep neural
1747
+ networks with random gaussian weights: A universal classification
1748
+ strategy? IEEE Transactions on Signal Processing, 64(13):3444–
1749
+ 3457, 2016.
1750
+ [20] Xavier Glorot, Antoine Bordes, and Yoshua Bengio. Deep sparse
1751
+ rectifier neural networks. In Proceedings of the fourteenth inter-
1752
+ national conference on artificial intelligence and statistics, pages
1753
+ 315–323. JMLR Workshop and Conference Proceedings, 2011.
1754
+ [21] Ian Goodfellow, Jean Pouget-Abadie, Mehdi Mirza, Bing Xu,
1755
+ David Warde-Farley, Sherjil Ozair, Aaron Courville, and Yoshua
1756
+ Bengio.
1757
+ Generative adversarial nets.
1758
+ In Proceedings of the
1759
+ Advances in Neural Information Processing Systems (NeurIPS),
1760
+ Montreal, Canada, December 2014.
1761
+ [22] Xiaojie Guo, Zheli Liu, Jin Li, Jiqiang Gao, Boyu Hou, Changyu
1762
+ Dong, and Thar Baker. Verifl: Communication-efficient and fast
1763
+ verifiable aggregation for federated learning. IEEE Transactions
1764
+ on Information Forensics and Security, 16:1736–1751, 2020.
1765
+ [23] Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun. Delv-
1766
+ ing deep into rectifiers: Surpassing human-level performance on
1767
+ imagenet classification. In 2015 IEEE International Conference
1768
+ on Computer Vision (ICCV). IEEE, 2015.
1769
+ [24] Briland Hitaj, Giuseppe Ateniese, and Fernando Perez-Cruz. Deep
1770
+ models under the gan: information leakage from collaborative deep
1771
+ learning. 2017.
1772
+ [25] Patrick Jauernig, Ahmad-Reza Sadeghi, and Emmanuel Stapf.
1773
+ Trusted execution environments: properties, applications, and chal-
1774
+ lenges. IEEE Security & Privacy, 18(2):56–60, 2020.
1775
+ [26] Hengrui Jia, Mohammad Yaghini, Christopher A Choquette-Choo,
1776
+ Natalie Dullerud, Anvith Thudi, Varun Chandrasekaran, and Nico-
1777
+ las Papernot. Proof-of-learning: Definitions and practice. In 2021
1778
+ IEEE Symposium on Security and Privacy (SP), pages 1039–1056.
1779
+ IEEE, 2021.
1780
+ [27] Peter Kairouz, Ziyu Liu, and Thomas Steinke.
1781
+ The distributed
1782
+ discrete gaussian mechanism for federated learning with secure
1783
+ aggregation. In International Conference on Machine Learning,
1784
+ pages 5201–5212. PMLR, 2021.
1785
+ [28] Peter Kairouz, Brendan McMahan, Shuang Song, Om Thakkar,
1786
+ Abhradeep Thakurta, and Zheng Xu. Practical and private (deep)
1787
+ learning without sampling or shuffling. In International Conference
1788
+ on Machine Learning, pages 5213–5225. PMLR, 2021.
1789
+ [29] Alex Krizhevsky, Geoffrey Hinton, et al. Learning multiple layers
1790
+ of features from tiny images. 2009.
1791
+ [30] Brendan McMahan, Eider Moore, Daniel Ramage, Seth Hampson,
1792
+ and Blaise Aguera y Arcas. Communication-efficient learning of
1793
+ deep networks from decentralized data. pages 1273–1282, 2017.
1794
+ 14
1795
+
1796
+ [31] Brendan McMahan and Abhradeep Thakurta. Federated learning
1797
+ with formal differential privacy guarantees. https://ai.googleblog.
1798
+ com/2022/02/federated-learning-with-formal.html?m=1,
1799
+ 2022.
1800
+ Last Acccessed: March 25, 2022.
1801
+ [32] H Brendan McMahan, Daniel Ramage, Kunal Talwar, and
1802
+ Li Zhang. Learning differentially private recurrent language mod-
1803
+ els.
1804
+ In International Conference on Learning Representations,
1805
+ 2018.
1806
+ [33] Luca Melis, Congzheng Song, Emiliano de Cristofaro, and Vitaly
1807
+ Shmatikov. Exploiting unintended feature leakage in collaborative
1808
+ learning. In 2019 IEEE Symposium on Security and Privacy (SP),
1809
+ pages 691–706. IEEE, 19/05/2019 - 23/05/2019.
1810
+ [34] Fan Mo, Hamed Haddadi, Kleomenis Katevas, Eduard Marin,
1811
+ Diego Perino, and Nicolas Kourtellis.
1812
+ Ppfl: privacy-preserving
1813
+ federated learning with trusted execution environments. In Pro-
1814
+ ceedings of the 19th Annual International Conference on Mobile
1815
+ Systems, Applications, and Services, pages 94–108, 2021.
1816
+ [35] Milad Nasr, Reza Shokri, and Amir Houmansadr. Comprehensive
1817
+ privacy analysis of deep learning: Passive and active white-box
1818
+ inference attacks against centralized and federated learning.
1819
+ In
1820
+ 2019 IEEE symposium on security and privacy (SP), pages 739–
1821
+ 753. IEEE, 2019.
1822
+ [36] Nicolas Papernot, Mart´ın Abadi, ´Ulfar Erlingsson, Ian Goodfellow,
1823
+ and Kunal Talwar. Semi-supervised knowledge transfer for deep
1824
+ learning from private training data, 18/10/2016. Accepted to ICLR
1825
+ 17 as an oral.
1826
+ [37] Dario Pasquini, Danilo Francati, and Giuseppe Ateniese. Eluding
1827
+ secure aggregation in federated learning via model inconsistency.
1828
+ arXiv preprint arXiv:2111.07380, 2021.
1829
+ [38] Dario Pasquini, Mathilde Raynal, and Carmela Troncoso.
1830
+ On
1831
+ the privacy of decentralized machine learning.
1832
+ arXiv preprint
1833
+ arXiv:2205.08443, 2022.
1834
+ [39] Le Trieu Phong, Yoshinori Aono, Takuya Hayashi, Lihua Wang,
1835
+ and Shiho Moriai. Privacy-preserving deep learning: Revisited and
1836
+ enhanced. In International Conference on Applications and Tech-
1837
+ niques in Information Security, pages 100–110. Springer, 2017.
1838
+ [40] Swaroop Ramaswamy, Om Thakkar, Rajiv Mathews, Galen An-
1839
+ drew, H Brendan McMahan, and Franc¸oise Beaufays.
1840
+ Training
1841
+ production language models without memorizing user data. arXiv
1842
+ preprint arXiv:2009.10031, 2020.
1843
+ [41] Muhammad Shayan, Clement Fung, Chris J. M. Yoon, and Ivan
1844
+ Beschastnikh. Biscotti: A blockchain system for private and secure
1845
+ federated learning. IEEE Transactions on Parallel and Distributed
1846
+ Systems, 32(7):1513–1525, 2021.
1847
+ [42] Reza Shokri, Marco Stronati, Congzheng Song, and Vitaly
1848
+ Shmatikov. Membership inference attacks against machine learning
1849
+ models.
1850
+ In IEEE Symposium on Security and Privacy, editor,
1851
+ 2017 IEEE Symposium on Security and Privacy - SP 2017. IEEE
1852
+ Symposium on Security and Privacy and SP and Symposium on
1853
+ Security & Privacy and S & P and IEEE S & P, IEEE, 2017.
1854
+ [43] Ilia Shumailov, Zakhar Shumaylov, Dmitry Kazhdan, Yiren Zhao,
1855
+ Nicolas Papernot, Murat A. Erdogdu, and Ross Anderson. Manip-
1856
+ ulating SGD with Data Ordering Attacks. 2021.
1857
+ [44] Lichao Sun, Jianwei Qian, and Xun Chen. Ldp-fl: Practical private
1858
+ aggregation in federated learning with local differential privacy.
1859
+ arXiv preprint arXiv:2007.15789, 2020.
1860
+ [45] Anvith Thudi, Ilia Shumailov, Franziska Boenisch, and Nicolas
1861
+ Papernot. Bounding membership inference, 2022.
1862
+ [46] Stacey Truex, Nathalie Baracaldo, Ali Anwar, Thomas Steinke,
1863
+ Heiko Ludwig, Rui Zhang, and Yi Zhou. A hybrid approach to
1864
+ privacy-preserving federated learning. In Proceedings of the 12th
1865
+ ACM workshop on artificial intelligence and security, pages 1–11,
1866
+ 2019.
1867
+ [47] Stacey Truex, Ling Liu, Ka-Ho Chow, Mehmet Emre Gursoy, and
1868
+ Wenqi Wei.
1869
+ Ldp-fed: Federated learning with local differential
1870
+ privacy. In Proceedings of the Third ACM International Workshop
1871
+ on Edge Systems, Analytics and Networking, pages 61–66, 2020.
1872
+ [48] Jack
1873
+ Wallen.
1874
+ Android
1875
+ 12
1876
+ adds
1877
+ ai
1878
+ and
1879
+ machine
1880
+ learning
1881
+ with
1882
+ private
1883
+ compute
1884
+ core
1885
+ but
1886
+ keeps
1887
+ your
1888
+ data
1889
+ secure.
1890
+ https://www.techrepublic.com/article/
1891
+ android-12-adds-ai-and-machine-learning-with-private-compute\
1892
+ protect\discretionary{\char\hyphenchar\font}
1893
+ {}{}core-but-keeps-your-data-secure/, 2021.
1894
+ Last Acccessed:
1895
+ October 17, 2022.
1896
+ [49] Zhibo Wang, Mengkai Song, Zhifei Zhang, Yang Song, Qian Wang,
1897
+ and Hairong Qi. Beyond inferring class representatives: User-level
1898
+ privacy leakage from federated learning. In IEEE INFOCOM 2019
1899
+ - IEEE Conference on Computer Communications. IEEE, 2019.
1900
+ [50] Kang Wei, Jun Li, Ming Ding, Chuan Ma, Howard H Yang, Farhad
1901
+ Farokhi, Shi Jin, Tony QS Quek, and H Vincent Poor. Federated
1902
+ learning with differential privacy: Algorithms and performance
1903
+ analysis.
1904
+ IEEE Transactions on Information Forensics and Se-
1905
+ curity, 15:3454–3469, 2020.
1906
+ [51] Yuxin Wen, Jonas A. Geiping, Liam Fowl, Micah Goldblum, and
1907
+ Tom Goldstein.
1908
+ Fishing for user data in large-batch federated
1909
+ learning via gradient magnification. In Kamalika Chaudhuri, Ste-
1910
+ fanie Jegelka, Le Song, Csaba Szepesvari, Gang Niu, and Sivan
1911
+ Sabato, editors, Proceedings of the 39th International Conference
1912
+ on Machine Learning, volume 162 of Proceedings of Machine
1913
+ Learning Research, pages 23668–23684. PMLR, 17–23 Jul 2022.
1914
+ [52] Guowen Xu, Hongwei Li, Sen Liu, Kan Yang, and Xiaodong
1915
+ Lin.
1916
+ Verifynet: Secure and verifiable federated learning.
1917
+ IEEE
1918
+ Transactions on Information Forensics and Security, 15:911–926,
1919
+ 2019.
1920
+ [53] Haibo Yang, Xin Zhang, Prashant Khanduri, and Jia Liu. Anarchic
1921
+ federated learning. arXiv preprint arXiv:2108.09875, 2021.
1922
+ [54] Hongxu Yin, Arun Mallya, Arash Vahdat, Jose M Alvarez, Jan
1923
+ Kautz, and Pavlo Molchanov. See through gradients: Image batch
1924
+ recovery via gradinversion.
1925
+ In Proceedings of the IEEE/CVF
1926
+ Conference on Computer Vision and Pattern Recognition, pages
1927
+ 16337–16346, 2021.
1928
+ [55] Chengliang Zhang, Suyi Li, Junzhe Xia, Wei Wang, Feng Yan, and
1929
+ Yang Liu. {BatchCrypt}: Efficient homomorphic encryption for
1930
+ {Cross-Silo} federated learning. In 2020 USENIX annual technical
1931
+ conference (USENIX ATC 20), pages 493–506, 2020.
1932
+ [56] Bo Zhao, Konda Reddy Mopuri, and Hakan Bilen. idlg: Improved
1933
+ deep leakage from gradients.
1934
+ arXiv preprint arXiv:2001.02610,
1935
+ 2020.
1936
+ [57] Ligeng Zhu, Zhijian Liu, and Song Han.
1937
+ Deep leakage from
1938
+ gradients. Advances in neural information processing systems, 32,
1939
+ 2019.
1940
+ A. Differential Privacy and DPSGD
1941
+ DP [12] formalizes the idea that no data point should
1942
+ significantly influence the results of an analysis conducted
1943
+ on a whole dataset. Therefore, the analysis should yield
1944
+ roughly the same results whether or not any particular
1945
+ dataset is included in the dataset or not. Formally, this is
1946
+ expressed by the following definition.
1947
+ Definition 1 ((ε, δ)-Differential Privacy). Let A: D∗ →
1948
+ R a randomized algorithm. A satisfies (ε, δ)-DP with ε ∈
1949
+ R+ and δ ∈ [0, 1] if for all neighboring datasets D ∼ D′,
1950
+ i.e. datasets that differ on only one element, and for all
1951
+ possible subsets R ⊆ R
1952
+ P [A(D) ∈ R] ≤ eε · P [M(D′) ∈ R] + δ .
1953
+ (3)
1954
+ In ML, DP formalizes the idea that any possible
1955
+ training data point in a training dataset cannot significantly
1956
+ impact the resulting ML model [1], [36]. One notable ap-
1957
+ proach to achieve this is Differentially Private Stochastic
1958
+ Gradient Descent (DPSGD) [1]. DPSGD alters the train-
1959
+ ing process to introduce DP guarantees for weight update
1960
+ operations, and thereby protects underlying individual data
1961
+ points. Particularly, the gradient computed for each data
1962
+ point or a mini-batch of data points is first clipped in
1963
+ their ℓ2-norm to bound influence. Clipping of the gradient
1964
+ g({xi}b) for mini-batch b of data {xi}b is performed
1965
+ according to a clipping parameter c, by replacing g({xi}b)
1966
+ with g({xi}b)/ max(1, ||g({xi}b)||2
1967
+ c
1968
+ ). This ensures that if
1969
+ the ℓ2-norm of the gradients is ≤ c, the gradients stays
1970
+ unaltered, and if the norm is > c, the gradient get scaled
1971
+ down to be in norm of c. After the clipping, Gaussian
1972
+ noise with scale σ is applied to the gradients of each mini-
1973
+ batch before performing the model updates.
1974
+ 15
1975
+
DdE2T4oBgHgl3EQfoQiw/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
FNE4T4oBgHgl3EQffg3m/content/tmp_files/2301.05109v1.pdf.txt ADDED
@@ -0,0 +1,1168 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Counterfactual Explanations for Concepts in ELH
2
+ Leonie Nora Sieger
3
+ Paderborn University
4
+ Paderborn, Germany
5
+ Stefan Heindorf
6
+ Paderborn University
7
+ Paderborn, Germany
8
+ Lukas Blübaum
9
+ Paderborn University
10
+ Paderborn, Germany
11
+ Axel-Cyrille Ngonga Ngomo
12
+ Paderborn University
13
+ Paderborn, Germany
14
+ ABSTRACT
15
+ Knowledge bases are widely used for information management on
16
+ the web, enabling high-impact applications such as web search,
17
+ question answering, and natural language processing. They also
18
+ serve as the backbone for automatic decision systems, e.g. for medi-
19
+ cal diagnostics and credit scoring. As stakeholders affected by these
20
+ decisions would like to understand their situation and verify fair
21
+ decisions, a number of explanation approaches have been proposed
22
+ using concepts in description logics. However, the learned concepts
23
+ can become long and difficult to fathom for non-experts, even when
24
+ verbalized. Moreover, long concepts do not immediately provide
25
+ a clear path of action to change one’s situation. Counterfactuals
26
+ answering the question “How must feature values be changed to ob-
27
+ tain a different classification?” have been proposed as short, human-
28
+ friendly explanations for tabular data. In this paper, we transfer
29
+ the notion of counterfactuals to description logics and propose the
30
+ first algorithm for generating counterfactual explanations in the
31
+ description logic ELH. Counterfactual candidates are generated
32
+ from concepts and the candidates with fewest feature changes are
33
+ selected as counterfactuals. In case of multiple counterfactuals, we
34
+ rank them according to the likeliness of their feature combinations.
35
+ For evaluation, we conduct a user survey to investigate which of the
36
+ generated counterfactual candidates are preferred for explanation
37
+ by participants. In a second study, we explore possible use cases
38
+ for counterfactual explanations.
39
+ CCS CONCEPTS
40
+ • Information systems → Semantic web description languages; •
41
+ Computing methodologies → Description logics; • Human-
42
+ centered computing → Empirical studies in HCI.
43
+ KEYWORDS
44
+ Description Logic, Knowledge Graphs, Machine Reasoning, XAI,
45
+ Semantic Web
46
+ 1
47
+ INTRODUCTION
48
+ Knowledge bases are commonly used in web applications, includ-
49
+ ing information retrieval [30], information generation [27], web
50
+ search [5] and question answering [12]. A great share of work is
51
+ concerned with securing correctness and completeness of knowl-
52
+ edge bases [9, 20, 28] which often involve machine learning-based
53
+ classification. Concepts in description logics (DLs) can serve as
54
+ transparent, white-box models for binary classification. Many ap-
55
+ proaches to learn concepts from positive and negative examples
56
+ have been proposed [7, 11, 14, 17, 18, 31]. Such DL concepts can
57
+ Person 1
58
+ Female
59
+ Person 2
60
+ hasChild
61
+ Male
62
+ Person 3
63
+ married
64
+ Female
65
+ Person 1
66
+ Female
67
+ Person 2
68
+ Male
69
+ Person 3
70
+ married
71
+ Female
72
+ Person 1
73
+ Female
74
+ Person 2
75
+ Male
76
+ hasChild
77
+ Person 3
78
+ married
79
+ Female
80
+ Figure 1: The concept Female⊓∃hasChild.⊤ classifies Person 1 as a mother in KB 1 (green), while its corresponding counterfactuals
81
+ in KBs 2 and 3 (red) are not classified as such.
82
+ 1
83
+ Figure 1: The concept Female ⊓ ∃hasChild.⊤ classifies Per-
84
+ son 1 as a mother in KB 1 (green), while its corresponding
85
+ counterfactuals in KBs 2 and 3 (red) are not classified as
86
+ such.
87
+ directly be mapped to expressions in the Web Ontology Language
88
+ (OWL) used in the Semantic Web [16, 24]. This makes DL concept
89
+ learning a convenient machine learning tool to apply on webbased
90
+ knowledge graphs like DBpedia [3], Wikidata [35], or YAGO [34],
91
+ or semantic website data, as proposed by schema.org [15].
92
+ Explaining algorithmic decisions of machine learning models
93
+ to stakeholders has become increasingly important [1, 2, 13, 25]:
94
+ subjects affected by model decisions would like to understand their
95
+ situation and verify fair decisions; data scientists would like to
96
+ debug and improve the model; regulatory entities would like to
97
+ check the compliance with laws and regulations.
98
+ However, as concepts increase in length and complexity, their
99
+ practical utility decreases, making it increasingly difficult for stake-
100
+ holders to understand, contest or alter decisions [36]. To increase
101
+ acceptance and trust of stakeholders, counterfactual explanations
102
+ have been proposed as a form of short, actionable explanations [26].
103
+ Counterfactual explanations focus on an antecedent that would
104
+ have caused a different outcome (classification) had it been the
105
+ case [32]. Given a set of features 𝐴 and a classification 𝐵, a counter-
106
+ factual statement takes on the form “If 𝐴 had not been true, then
107
+ the classification would not have been 𝐵”, where in the current
108
+ classification to be explained, both 𝐴 and 𝐵 are true.
109
+ In this paper, we transfer the notion of counterfactuals to DLs and
110
+ propose the first algorithm for generating counterfactual explana-
111
+ tions in the DL ELH. ELH as it is an important description logic
112
+ for many applications including the medical ontology Snomed [6]
113
+ arXiv:2301.05109v1 [cs.AI] 12 Jan 2023
114
+
115
+ Sieger et al.
116
+ Table 1: ELH description logic constructs. For further de-
117
+ tails, we refer to Lehmann and Turhan [23].
118
+ Syntax Semantics
119
+ Construct
120
+
121
+ ΔI
122
+ top concept
123
+ 𝐶, 𝐷
124
+ 𝐶I, 𝐷 I ⊆ ΔI
125
+ atomic concepts
126
+ 𝑟,𝑠
127
+ 𝑟 I,𝑠I ⊆ ΔI × ΔI
128
+ atomic roles
129
+ 𝐶 ⊓ 𝐷
130
+ 𝐶I ∩ 𝐷 I
131
+ intersection
132
+ ∃𝑟.𝐶
133
+ {𝑥 ∈ ΔI|∃𝑦 ∈ ΔI
134
+ existential restriction
135
+ Concepts
136
+ with (𝑥,𝑦) ∈ 𝑟 I ∧ 𝑦 ∈ 𝐶I}
137
+ 𝐶(𝑥)
138
+ 𝑥 I ∈ 𝐶I
139
+ concept assertion
140
+ ABox
141
+ 𝑟 (𝑥,𝑦)
142
+ (𝑥 I,𝑦I) ∈ 𝑟 I
143
+ role assertion
144
+ 𝐶 ⊑ 𝐷
145
+ 𝐶I ⊆ 𝐷 I
146
+ concept subsumption
147
+ TBox
148
+ 𝑟 ⊑ 𝑠
149
+ 𝑟𝐼 ⊆ 𝑠I
150
+ role subsumption
151
+ and protein-protein interaction networks [19]. Given an individual
152
+ 𝑥 with concise bounded description CBD(𝑥) and a concept 𝐶 that
153
+ holds for 𝑥, we generate counterfactual candidates 𝑥 ′ with concise
154
+ bounded descriptions CBD(𝑥 ′) for which the concept does not hold.
155
+ Figure 1 shows an example. In line with Wachter et al. [36], we
156
+ define counterfactuals as those candidates that are most similar
157
+ to the original individual. Next, we rank them according to the
158
+ plausibility that they appear in the real world, i.e., their “likeliness
159
+ of the combination of their features.” We conduct a user survey
160
+ to investigate if the selected counterfactuals are indeed preferred
161
+ by users. Finally, we conduct a study to explore possible uses of
162
+ counterfactual explanations.
163
+ In what follows, Section 2 introduces preliminares, Sec-
164
+ tion 3 describes related work, Section 4 introduces our al-
165
+ gorithm to generate counterfactuals, and Sections 5 and 6
166
+ conduct user studies to investigate user preferences and
167
+ use cases. Finally, Section 7 discusses limitations. All data,
168
+ code and materials needed for reproducing this work can
169
+ be found at https://anonymous.4open.science/r/Counterfactual-
170
+ Explanations-ELH-EBDA/.
171
+ 2
172
+ PRELIMINARIES
173
+ We give a brief overview of the description logic ELH, knowledge
174
+ bases, their triple representation, the concise bounded description
175
+ of entities, and the closed-world assumption. For further details,
176
+ we refer the reader to Baader et al. [4], Brandt [6], Lehmann and
177
+ Turhan [23].
178
+ 2.0.1
179
+ The Description Logic ELH. In DLs [4], knowledge is repre-
180
+ sented by concept descriptions built from atomic concepts 𝐶, 𝐷 ∈
181
+ 𝑁𝐶 and roles 𝑟,𝑠 ∈ 𝑁𝑅, where 𝑁𝐶 and 𝑁𝑅 are finite sets of concept
182
+ and role names. As shown in Table 1, a concept in the description
183
+ logic ELH [6, 23] can consist of the the top-concept (⊤), inter-
184
+ sections (𝐶 ⊓ 𝐷), and existential restrictions (∃𝑟.𝐶). Their seman-
185
+ tics is defined in terms of the interpretation I = (ΔI, ·I) which
186
+ consists of the non-empty set ΔI, called interpretation domain,
187
+ and the function ·I, called interpretation function, that assigns
188
+ each 𝐴 ∈ 𝑁𝐶 a set 𝐴I ⊆ ΔI and each 𝑟 ∈ 𝑁𝑅 a binary relation
189
+ 𝑟 I ⊆ ΔI × I [22, 23]. Following Lehmann and Hitzler [22], we
190
+ extend the definition to also assigns each individual name 𝑥 ∈ 𝑁𝐼
191
+ an element 𝑥 I ∈ ΔI.
192
+ 2.0.2
193
+ Knowledge Base. A Knowledge Base (KB) K consists of a
194
+ TBox T and ABox A where the TBox defines concepts by means
195
+ of concept inclusion (𝐶 ⊑ 𝐷) and role inclusion axioms (𝑟 ⊑ 𝑠)
196
+ and the ABox defines individuals 𝑥 ∈ 𝑁𝐼 and their relations. An
197
+ interpretation I is a model of the knowledge base K iff it satisfies
198
+ all axioms in the TBox and ABox. An individual 𝑥 ∈ 𝑁𝐼 is an
199
+ instance of a concept 𝐶 with respect to K, written K |= 𝐶(𝑥) iff in
200
+ all models I of K, we have that 𝑎I ∈ 𝐶I. We say 𝐶 holds for 𝑥 in
201
+ K. Otherwise, we write K ̸|= 𝐶(𝑥) and say that 𝑥 does not hold for
202
+ C.1
203
+ 2.0.3
204
+ Triple Representation. The ABox can be represented in the
205
+ form of subject-predicate-object triples as follows: For each individ-
206
+ ual 𝑥 ∈ 𝑁𝐼 , we obtain all atomic concepts 𝐶 ∈ 𝑁𝐶 and all relations
207
+ 𝑟 ∈ 𝑁𝑅 such that K |= 𝐶(𝑥) or K |= 𝑟 (𝑥,𝑥 ′) for an individual 𝑥 ′
208
+ holds, respectively. Then each role assertion 𝑟 (𝑥,𝑥 ′) corresponds
209
+ to a triple (𝑥,𝑟,𝑥 ′) and each concept assertion 𝐶(𝑥) to a triple
210
+ (𝑥, rdf:type,𝐶).
211
+ 2.0.4
212
+ Concise Bounded Description. We define the concise bounded
213
+ description2 CBD(𝑥) of an individual 𝑥 as the set of all triples that
214
+ contain 𝑥 as a subject (both of the form (𝑥,𝑟,𝑥 ′) and (𝑥, rdf:type,𝐶)).
215
+ 2.0.5
216
+ Closed-world assumption. As is common practise for con-
217
+ cept learning, we employ closed-world semantics [7, 14, 22]: For
218
+ each individual 𝑥 ∈ 𝑁𝐼 and concept 𝐶 ∈ 𝑁𝐶, either K |= 𝐶(𝑥) or
219
+ K ̸|= 𝐶(𝑥) holds. In the latter case, we say that 𝐶(𝑥) does not hold.
220
+ This approach allows to handle ontologies as a database and is com-
221
+ patible with the state-of-the-art concept learners DL-Learner [21]
222
+ and EvoLearner [14], whose classifications we would like to explain
223
+ with our approach.
224
+ 3
225
+ RELATED WORK
226
+ In the following, we introduce related work on counterfactuals and
227
+ similarity measures for description logics.
228
+ Counterfactuals. Stepin et al. [32] survey research papers on
229
+ contrastive and counterfactual explanation generation. They com-
230
+ pare definitions, summarize methods, and discuss how methods
231
+ are grounded in theoretical approaches. While some approaches
232
+ are based on white-box models such as decision trees [33], none
233
+ of them generates counterfactuals for individuals in description
234
+ logics.
235
+ According to Wachter et al. [36], counterfactual explanations
236
+ are statements of the form “Score 𝑝 was returned because 𝑉 had
237
+ values (𝑣1, 𝑣2, ...) associated with them. If 𝑉 had values (𝑣′
238
+ 1, 𝑣′
239
+ 2, . . .)
240
+ and all other variables had remained constant, score 𝑝′ would have
241
+ been returned.” While many such explanations are possible, an
242
+ ideal counterfactual alters values as little as possible and represents
243
+ the ‘closest world’ under which score 𝑝′ is returned instead of 𝑝.
244
+ 1Note that the |= operator expresses reasoning and we employ a reimplementation of
245
+ the fast instance checker [22] which follows the closed-world assumption. For example,
246
+ the reasoner, derives 𝐷 (𝑥) from the assertions 𝐶 (𝑥) and 𝐶 ⊑ 𝐷.
247
+ 2Originally, the concise bounded description (CBD) was defined for RDF, cf., https:
248
+ //www.w3.org/Submission/CBD/
249
+
250
+ Counterfactual Explanations for Concepts in ELH
251
+ Dandl et al. [10] generalize this idea and take further criteria into
252
+ account. Given a statement of the form “If 𝑋 had not occurred, 𝑌
253
+ would not have occurred”, they solve a multi-objective optimization
254
+ problem with four objectives: (1) the prediction 𝑦 of the counter-
255
+ factual 𝑥 ′ should be as close as possible to the desired prediction
256
+ 𝑦′; (2) The counterfactual 𝑥 ′ should be as similar as possible to the
257
+ instance 𝑥; (3) feature changes should be sparse; (4) the counter-
258
+ factual should have likely feature values/combinations. We use the
259
+ approach by Dandl et al. [10] as a basis for our approach and adapt
260
+ it to description logics.
261
+ Similarity Measures for Description Logics. At the core of coun-
262
+ terfactuals is the notion of ‘closest world’ and the question of how
263
+ to operationalize this notion for description logics arises. Lehmann
264
+ and Turhan [23] create a framework for semantic-based similarity
265
+ measures for ELH-concepts. They define desirable properties and
266
+ present a framework to construct similarities measures fulfilling
267
+ many of the properties. However, we need to define a similarity
268
+ measure for individuals and not for concepts.
269
+ 4
270
+ COUNTERFACTUALS IN ELH
271
+ Following Wachter et al. [36] and Dandl et al. [10] who defined
272
+ counterfactuals for black-box machine learning models with fixed-
273
+ size input vectors, we transfer their definition to individuals in
274
+ description logic. Given an individual 𝑥 ∈ 𝑁𝐼 and an (atomic or
275
+ non-atomic) concept 𝐶, 𝑥 ′ is a counterfactual candidate of 𝑥 with
276
+ respect to 𝐶 iff
277
+ K |= 𝐶(𝑥) and K ̸|= 𝐶(𝑥 ′)
278
+ or
279
+ K ̸|= 𝐶(𝑥) and K |= 𝐶(𝑥 ′)
280
+ (1)
281
+ i.e., the predictions of 𝑥 and 𝑥 ′ differ with respect to 𝐶. Without
282
+ loss of generality, we focus on the case that 𝐶 holds in the original
283
+ KB and should not hold for the counterfactual. The individual 𝑥 ′
284
+ does not necessarily need to exist in the original KB K and can be
285
+ a new hypothetical individual in an alternative knowledge base K′
286
+ defined over the same atomic concepts and roles as K.
287
+ Let 𝛿(𝑋,𝑌) := |𝑋 \𝑌 | + |𝑌 \ 𝑋 | be the edit distance between two
288
+ arbitrary sets counting the number of additions and removals. A
289
+ counterfactual candidate 𝑥 ′ is called a counterfactual of 𝑥 iff the
290
+ edit distance
291
+ 𝛿(CBD(𝑥), CBD(𝑥 ′))
292
+ (2)
293
+ between the concise bounded descriptions of the individuals 𝑥 and
294
+ 𝑥 ′ is minimal among all counterfactual candidates. If the concept is
295
+ ⊤, no counterfactual exists in ELH and we define the edit distance
296
+ as infinite.
297
+ Among multiple counterfactuals, we prefer counterfactuals
298
+ which are likely and we experimented with two variants of mea-
299
+ suring likeliness: Let 𝑁𝐼 be the set of all existing negative individ-
300
+ uals 𝑥 ∈ 𝑁𝐼 with K ̸|= 𝐶(𝑥). Moreover, given an individual 𝑥, let
301
+ 𝐶𝑅(𝑥) := {𝐶 ∈ 𝑁𝐶 |K |= 𝐶(𝑥)} ∪ {𝑟 ∈ 𝑁𝑅|∃𝑧 ∈ 𝑁𝐼 : K |= 𝑟 (𝑥,𝑧)}
302
+ be the set of all atomic concepts and roles of 𝑥. We define the min-
303
+ likeliness, variantmin of a counterfactual 𝑥 ′ with K ̸|= 𝐶(𝑥 ′) as the
304
+ minimal distance:
305
+ min
306
+ 𝑥 ∈𝑁𝐼
307
+ 𝛿(CR(x′), CR(x)).
308
+ (3)
309
+ The rationale is that a counterfactual is likely if another negative
310
+ individual in the KB exists that is similar to it. As an alternative,
311
+ variantmean, we define the mean-likeliness of a counterfactual 𝑥 ′
312
+ with K ̸|= 𝐶(𝑥 ′) as the average distance:
313
+ 1
314
+ |𝑁𝐼 |
315
+ ∑︁
316
+ 𝑥 ∈𝑁𝐼
317
+ 𝛿(CR(x′), CR(x))
318
+ (4)
319
+ The rationale is that a counterfactual is likely if it, on average, is
320
+ similar to the other negative individuals in the KB.
321
+ We decided not to take the objects of role assertions into account
322
+ (as would be done by the CBD) because the objects of roles can be
323
+ rather distinct in real-world knowledge bases, so that individuals
324
+ rarely share both roles and role objects. For example, in the family
325
+ ontology (cf., Figure 1), it is unlikely that two individuals are married
326
+ to the same person.
327
+ In practice, the best choice of similarity function depends on the
328
+ dataset and use case.
329
+ 4.1
330
+ Comparison to Dandl et al.’s
331
+ Counterfactual Objectives
332
+ Our definitions contain the four objectives 𝑜1–𝑜4 by Dandl.
333
+ (𝑜1: Prediction) “A counterfactual instance produces the prede-
334
+ fined prediction as closely as possible.” Our predefined classification
335
+ of a counterfactual 𝑥 ′ is the opposite of the classification of 𝑥 as
336
+ pointed out in Equation 1.
337
+ (𝑜2, 𝑜3: Similarity, Sparseness) “A counterfactual should be as
338
+ similar as possible to the instance regarding feature values” and
339
+ “change as few features as possible.” Since all our CBDs (or “fea-
340
+ tures”) are discrete and do not contain numeric values, 𝑜2 and 𝑜3
341
+ collapse. We define the similarity according to the edit distance in
342
+ Equation 2.
343
+ (𝑜4: Likeliness) “Counterfactuals should have likely feature val-
344
+ ues/combinations”. We compute the likeliness/plausibility of feature
345
+ values as being close to existing individuals in the knowledge base,
346
+ see Equations 3 and 4.
347
+ 4.2
348
+ Generation of Counterfactuals
349
+ Let K be a knowledge base, 𝐶 an ELH concept, and 𝑥 an indi-
350
+ vidual 𝑥 for which the concept holds, i.e., K |= 𝐶(𝑥). Let 𝐷 ∈ 𝑁𝐶
351
+ be a named concept and 𝑟,𝑟 ′ ∈ 𝑁𝑅 be role names. We construct
352
+ counterfactuals 𝑥 ′, i.e. individuals most similar to 𝑥 for which𝐶(𝑥 ′)
353
+ cannot be inferred. For this, we assume K’s TBox to contain only
354
+ subsumptions 𝐶 ⊑ 𝐷 and 𝑟 ⊑ 𝑟 ′ of atomic concepts 𝐶, 𝐷 ∈ 𝑁𝐶
355
+ and roles 𝑟,𝑟 ′ ∈ 𝑁𝑅. This assumption holds for a vast array of
356
+ real-world knowledge bases [37].
357
+ Algorithms 1 and 2 describe our approach to generate counter-
358
+ factuals. First, a reasoner infers as many concept and role assertions
359
+ as possible taking subsumptions into account (Algorithm 1, line
360
+ 5). Next, we create a deep copy K𝑖 of K for each subconcept 𝐶𝑖
361
+ of 𝐶 = 𝐶1 ⊓ 𝐶2 ⊓ . . . ⊓ 𝐶𝑛 (line 7). The method get_individual
362
+ retrieves the individual 𝑥𝑖 from K𝑖 corresponding to 𝑥 in K (line 8).
363
+ We turn the 𝑥𝑖 into a counterfactual candidate with K𝑖 ̸|= 𝐶(𝑥 ′)
364
+ (line 9) by removing axioms such that the subconcept 𝐶𝑖 does not
365
+ hold anymore (and hence the concept 𝐶 does not hold for 𝑥𝑖 any-
366
+ more). Algorithm 2 describes the generation of a single counter-
367
+ factual candidate. Having generated the candidates, the candidates
368
+
369
+ Sieger et al.
370
+ 1 Input: KB K, Concept 𝐶 = 𝐶1 ⊓ 𝐶2 ⊓ . . . ⊓ 𝐶𝑛 with 𝑛 ≥ 1,
371
+ Individual 𝑥 such that K |= 𝐶(𝑥)
372
+ 2 Output: Counterfactuals of individual 𝑥 w.r.t. 𝐶
373
+ 3 Function gen_counterfactuals(K, 𝐶, 𝑥):
374
+ 4
375
+ 𝑐𝑎𝑛𝑑𝑖𝑑𝑎𝑡𝑒𝑠 ← [ ]
376
+ 5
377
+ K ← reasoner(K)
378
+ 6
379
+ for each 𝐶𝑖 do
380
+ 7
381
+ K𝑖 ← deepcopy(K)
382
+ // Get copy of 𝑥 in K𝑖
383
+ 8
384
+ 𝑥𝑖 ← get_individual(K𝑖,𝑥)
385
+ 9
386
+ K𝑖,𝑥𝑖 ← gen_candidate(K𝑖, 𝐶𝑖, 𝑥𝑖)
387
+ 10
388
+ 𝑐𝑎𝑛𝑑𝑖𝑑𝑎𝑡𝑒𝑠.append((K𝑖,𝑥𝑖))
389
+ 11
390
+ end
391
+ 12
392
+ cfs_min ← arg min
393
+ (K𝑖,𝑥𝑖) ∈𝑐𝑎𝑛𝑑𝑖𝑑𝑎𝑡𝑒𝑠
394
+ 𝛿(CBD(𝑥), CBD(𝑥𝑖))
395
+ 13
396
+ cfs_mean ← deepcopy(cfs_min)
397
+ 14
398
+ Sort cfs_min by min-likeliness
399
+ 15
400
+ Sort cfs_mean by mean-likeliness
401
+ 16 return cfs_min, cfs_mean
402
+ Algorithm 1: Generates two lists of counterfactuals of indi-
403
+ vidual 𝑥 w.r.t. concept 𝐶—sorted by min-likeliness and mean-
404
+ likeliness.
405
+ with the least edit distance as defined in Equation 2 are selected
406
+ as counterfactuals. All counterfactuals are then rated according
407
+ to the two variants of likeliness (see Equations 3 and 4) and the
408
+ algorithm returns two sorted lists of counterfactuals—one list for
409
+ each measure.
410
+ 4.3
411
+ Analysis of the Generation of
412
+ Counterfactuals
413
+ In the following, we argue that every step carried out by the al-
414
+ gorithms is necessary and that the steps carried out are sufficient.
415
+ ELH allows concept intersection, existential restrictions and role
416
+ hierarchy (see Table 1). Because the concept 𝐶 is in ELH, we can
417
+ assume that each 𝐶𝑖 (Algorithm 1, line 9) does not contain an in-
418
+ tersection on the outer level anymore (such as 𝐶𝑖 = 𝐴 ⊓ 𝐵) and all
419
+ remaining intersections must be within an existential restriction
420
+ (such as 𝐶𝑖 = ∃𝑟.(𝐴 ⊓ 𝐵)). If the concept 𝐶 is an intersection, Al-
421
+ gorithm 1 splits it into the subconcepts 𝐶𝑖 to apply Algorithm 2
422
+ to each subconcept 𝐶𝑖. If K ̸|= 𝐶𝑖 (𝑥) for any one 𝐶𝑖, it follows
423
+ that K ̸|= 𝐶(𝑥) does not hold. Creating additional candidates by
424
+ making multiple 𝐶𝑖 not hold at once is not necessary, because these
425
+ candidates could not exceed other candidates in minimizing the
426
+ edit distance. If 𝐶𝑖 ∈ 𝑁𝐶, i.e. it is an atomic concept, all of the
427
+ individual’s assertions to this concept or its subsumed subconcepts
428
+ are removed (Algorithm 2, line 7). Similarly, if 𝐶𝑖 is an existential
429
+ restriction 𝐶𝑖 = ∃𝑟.𝐴, all role assertions 𝑟 ′(𝑥,𝑎) with K |= 𝐴(𝑎)
430
+ and K |= 𝑟 ′ ⊑ 𝑟 are removed (Algorithm 2, line 9). This happens
431
+ regardless of whether 𝐴 is a concept, another existential restriction,
432
+ or an intersection. This is sufficient, because we aim only to remove
433
+ axioms with the individual as subject to generate counterfactuals.
434
+ 1 Input: KB K, Concept 𝐶, Individual 𝑥 such that K |= 𝐶(𝑥)
435
+ 2 Output: KB K, Individual 𝑥 such that K ̸|= 𝐶(𝑥)
436
+ 3 Function gen_candidate(K, 𝐶, 𝑥):
437
+ 4
438
+ if 𝐶 ≡ ⊤ then
439
+ 5
440
+ K ← 𝑁𝑜𝑛𝑒
441
+ 6
442
+ else if 𝐶 ∈ 𝑁𝐶 then
443
+ 7
444
+ Remove assertions {𝐷(𝑥) | K |= 𝐷 ⊑ 𝐶 ∧ 𝐷 ∈ 𝑁𝐶}
445
+ from K
446
+ 8
447
+ else if 𝐶 = ∃𝑟.𝐴 then
448
+ 9
449
+ Remove assertions
450
+ {𝑟 ′(𝑥,𝑎) | K |= 𝐴(𝑎) ∧ K |= 𝑟 ′ ⊑ 𝑟} from K
451
+ 10 return (K,𝑥)
452
+ Algorithm 2: Generates a counterfactual candidate (K,𝑥) by
453
+ changing the CBD of 𝑥 such that K ̸|= 𝐶(𝑥).
454
+ Table 2: Overview of the final, modified datasets in terms of
455
+ number of instances (𝑁𝐼 ), axioms, atomic concepts and roles.
456
+ Instances
457
+ Axioms
458
+ Atomic
459
+ Roles
460
+ Dataset
461
+ Concepts
462
+ Family
463
+ 202
464
+ 2,033
465
+ 18
466
+ 5
467
+ Animals
468
+ 28
469
+ 170
470
+ 19
471
+ 4
472
+ 5
473
+ EXPLANATIONS PREFERRED BY USERS
474
+ We conducted a survey in which we let participants rate different
475
+ potential counterfactual explanations against each other. We then
476
+ compared the participants’ preferences with the decisions made by
477
+ our approach. We used modified versions of the Family and Animals
478
+ ontologies [37] to evaluate our approach. These ontologies were
479
+ chosen because the concept, role and individual names therein are
480
+ familiar and understandable to average lay users—in contrast to, for
481
+ example, ontologies related to bio-medicine or chemistry. We used
482
+ the DL concept learner [8] with ELTL—the EL Tree Learner [7]—to
483
+ learn the concepts to be used for counterfactual generation, since a
484
+ future goal is to combine these programs to reach a fully automated
485
+ explainable AI.
486
+ 5.1
487
+ Data Generation
488
+ Table 2 gives an overview of the datasets used for our user survey.
489
+ 5.1.1
490
+ Family Ontology. We added a super role hasPartner of
491
+ married to the original family ontology because the original on-
492
+ tology had none and we wanted it to include a role hierarchy, so
493
+ that we had an actual example of ELH and not just EL. To ob-
494
+ tain (complex) concepts for the generation of counterfactuals, for
495
+ each atomic concept present in the ontology, we did the following:
496
+ First, we removed the atomic concept from the ontology. Then, we
497
+ let the DL concept learner [8] with ELTL learn a concept using
498
+ 10 randomly chosen individuals that formerly were instances of
499
+ the atomic concept as positive examples, and 10 random others as
500
+ negative examples. Thereafter, we randomly selected an individual
501
+ which is an instance of that concept and applied our counterfac-
502
+ tual algorithm. We manually inspected the learned concepts and
503
+ used the correct concepts for the survey (e.g. concept Father leads
504
+
505
+ Counterfactual Explanations for Concepts in ELH
506
+ to Male ⊓ ∃hasChild.⊤). For consistency, we also queried for the
507
+ concepts for Brother and Grandmother as the corresponding con-
508
+ cepts to Sister and Grandfather in the survey, even if ELTL did
509
+ not correctly recognize the concept. This way, we ended up with
510
+ Mother/Father, Sister/Brother and Grandmother/Grandfather
511
+ for the survey.
512
+ 5.1.2
513
+ Animals Ontology. We added two super roles to the animals
514
+ ontology, i.e., residence and home, for the same reasons as named
515
+ above. Furthermore, we restructured the ontology to fit ELH se-
516
+ mantics. The atomic concepts of species were removed and their
517
+ roles added to the individual animals. This way we could train
518
+ ELTL [8] to learn a concept for each species, using the instance be-
519
+ longing to that species as positive example, and all other instances
520
+ of animals as negative examples. Our algorithm was applied after-
521
+ wards. We collected all concepts that could be used for explanations
522
+ (see code at https://anonymous.4open.science/r/Counterfactual-
523
+ Explanations-ELH-EBDA/ for details) and chose 6 of them randomly
524
+ to use these and their counterfactual candidates for the survey.
525
+ 5.2
526
+ Setup of User Survey
527
+ The
528
+ full
529
+ survey
530
+ material
531
+ and
532
+ data
533
+ can
534
+ be
535
+ found
536
+ at
537
+ https://anonymous.4open.science/r/Counterfactual-Explanations-
538
+ ELH-EBDA/. Using the generated concepts from the family and
539
+ animals ontologies (see above) and their respective counterfactual
540
+ candidates, we generated short stories of artificial intelligences
541
+ classifying people in a family tree or animals and created a
542
+ counterfactual explanation from each counterfactual candidate.
543
+ We conducted an online survey via SoSciSurvey from May 1,
544
+ 2022 to May 4, 2022 in German. Participants were recruited
545
+ through social networks and snowballing. On the first pages,
546
+ participants were informed about the content and goal of the
547
+ survey and what counterfactual explanations are, and we collected
548
+ sociodemographic data about age, gender and occupation. On the
549
+ next pages, the counterfactual explanations were presented. First, a
550
+ scenario was described in which an AI would classify instances of
551
+ family members or animals. Then, on every page, a classification
552
+ made by an AI was presented in one sentence, followed by one
553
+ or multiple sentences giving counterfactual explanations for
554
+ the classification, e.g. “I would not have classified this animal
555
+ as a turtle, if it did not have scales”. Within the two scenarios,
556
+ classifications were presented in randomized order, one on each
557
+ page. For the family ontology, where each concept had led to
558
+ two counterfactual candidates, the participants were randomly
559
+ shown only one of the counterfactual explanations. However,
560
+ because many explanations were quite similar (e.g. all concepts
561
+ included counterfactual candidates referring to gender) it was
562
+ made sure that they were presented mixed explanation types. Each
563
+ explanation was accompanied by one item asking to rate on a scale
564
+ from one to seven how helpful they perceived the explanation
565
+ for understanding the decision of the program. For the animals
566
+ scenario, participants were shown all counterfactual candidates
567
+ (between two and five) at the same time, in random order, and
568
+ presented the same rating scale for each of the explanations.
569
+ 5.3
570
+ Results of User Survey
571
+ In the following, we present the results of our evaluation of our
572
+ counterfactual rating algorithm through a user survey.
573
+ Sample. 72 people took part in the survey. Age ranged between
574
+ 20 and 69 (average = 34.9, median = 32, standard deviation = 12.1,
575
+ missing age data for one participant). 30 participants were female,
576
+ 39 male and 3 diverse. Participants had mixed professions including
577
+ both academic and non-academic ones, technical and non-technical.
578
+ Family Ontology. We used Wilcoxon signed-rank tests to calcu-
579
+ late significance of deviation from the central value (4 on a scale
580
+ from 1-7) for each item and to compare both items of each concept
581
+ with another. Tests were chosen given the fact that we use ad-hoc
582
+ generated items, so we assume the ratings to be ordinal. Deviation
583
+ results are presented in Table 3. For all six concepts, users preferred
584
+ the explanation that featured a role referring to relatives of the
585
+ individual (hasChild, hasSibling) against the explanation that
586
+ featured a 𝐶𝑖 referring to the individuals gender (all p<.001, ex-
587
+ cept Sister: p<.01). These explanations (and only these) differed
588
+ significantly from the central value (all p<.001).
589
+ Comparison of user ratings with algorithmic decisions. For all
590
+ the 4 individuals processed by our algorithms, the subconcepts
591
+ 𝐶𝑖 ∈ 𝑁𝑅 were found to be counterfactuals by our algorithm, while
592
+ the subconcepts 𝐶𝑖 ∈ 𝑁𝐶 were not. Consequentially, both variants
593
+ came to the same decision as the participants.
594
+ Animals ontology. We used Wilcoxon signed-rank tests as above
595
+ (but for matched samples). For concepts with more than two coun-
596
+ terfactuals, we used the Friedmann test.
597
+ 5.3.1
598
+ User evaluations of explanations. Table 3 presents results for
599
+ Wilcoxon test of deviation from center and if and which algorithm
600
+ variant chose this counterfactual. “Subconcept 𝐶𝑖” describes the
601
+ subconcept that was used for explanation, e.g. hasLegs means the
602
+ counterfactual explanation contained “(...) if it did not have legs”.
603
+ 5.3.2
604
+ Differences in user evaluations. For each animal, we calcu-
605
+ lated which differences between the counterfactual explanations’
606
+ ratings were significant with a p value <.05. The difference be-
607
+ tween the counterfactuals of Girl were not significant. For Snake,
608
+ habitat was rated significantly worse than the other counterfac-
609
+ tuals. For Penguin, only the difference between the best and worst
610
+ counterfactual was significant. For Eagle, the lowest rated two ex-
611
+ planations (homeothermic and hasLegs) were rated significantly
612
+ less helpful than the others. Regarding Turtle, only the difference
613
+ between the best (hasCovering(Scales)) and worst (hasLegs) ex-
614
+ planation was significant. Finally, for Crocodile, differences were
615
+ not significant.
616
+ 5.3.3
617
+ Comparison of user ratings with algorithmic decisions. Al-
618
+ though in the animals ontology, explanations similar to each other
619
+ existed, too, participants’ decision about these varied. The concept
620
+ hasEggs was rather popular, while hasLegs was not. Concepts
621
+ habitat/residence were preferred 2 of 4 times. For hasCovering,
622
+ results were mixed; concept homeothermic was never chosen. We
623
+ suspect that participants preferred explanations referring to fea-
624
+ tures they find characteristic of the animal or groups of animals.
625
+ For the animals ontology, all 𝐶𝑖 were counterfactuals. Measuring
626
+
627
+ Sieger et al.
628
+ Table 3: Ratings of counterfactual explanations (Wilcoxon
629
+ signed-rank test). The test statistics 𝜇, 𝑍, and 𝑝 refer to the
630
+ user preferences of a subconcept 𝐶𝑖 of the named concept
631
+ in the first column (e.g., Mother ≡ Female ⊓ hasChild.⊤). ES
632
+ stands for Effect Size. Subconcepts in italic were chosen by
633
+ algorithm with likeliness variant min. Subconcepts in bold
634
+ were chosen with variant mean. The star(*) indicates p <.01
635
+ and double-star(**) indicates p<.001.
636
+ Name
637
+ Subconcept 𝐶𝑖
638
+ 𝜇
639
+ Z
640
+ p
641
+ ES
642
+ Mother
643
+ Female
644
+ 4.3
645
+ -1.16
646
+ .25
647
+ Mother
648
+ hasChild(⊤)
649
+ 6.1
650
+ -4.83
651
+ .001**
652
+ 0.84
653
+ Father
654
+ Male
655
+ 4.1
656
+ -0.24
657
+ .81
658
+ Father
659
+ hasChild(⊤)
660
+ 6.2
661
+ -5.07
662
+ <.001**
663
+ 0.81
664
+ Sister
665
+ Female
666
+ 4.5
667
+ -1.73
668
+ .08
669
+ Sister
670
+ hasSibling(⊤)
671
+ 5.9
672
+ -4.11
673
+ <.001**
674
+ 0.71
675
+ Brother
676
+ Male
677
+ 4.3
678
+ -1.02
679
+ .31
680
+ Brother
681
+ hasSibling(⊤)
682
+ 5.9
683
+ -4.88
684
+ <.001**
685
+ 0.78
686
+ Grandmother
687
+ Female
688
+ 4.3
689
+ -0.87
690
+ .38
691
+ Grandmother
692
+ hasChild(Parent)
693
+ 6.1
694
+ -4.88
695
+ <.001**
696
+ 0.78
697
+ Grandfather
698
+ Male
699
+ 4.3
700
+ -0.79
701
+ .43
702
+ Grandfather
703
+ hasChild(Parent)
704
+ 6.0
705
+ -4.51
706
+ <.001**
707
+ 0.79
708
+ Girl
709
+ HasLegs
710
+ 4.3
711
+ -1.67
712
+ .09
713
+ Girl
714
+ residence(⊤)
715
+ 4.6
716
+ -2.70
717
+ <.01*
718
+ 0.32
719
+ Snake
720
+ HasEggs
721
+ 4.6
722
+ -2.99
723
+ <.01*
724
+ 0.35
725
+ Snake
726
+ habitat(Land)
727
+ 3.6
728
+ -0.04
729
+ .97
730
+ Snake
731
+ hasCovering(Scales)
732
+ 5.0
733
+ -4.36
734
+ <.001**
735
+ 0.51
736
+ Penguin
737
+ HasEggs
738
+ 4.9
739
+ -4.07
740
+ <.001**
741
+ 0.48
742
+ Penguin
743
+ homeothermic
744
+ 4.0
745
+ -0.65
746
+ .50
747
+ Penguin
748
+ HasLegs
749
+ 4.4
750
+ -2.08
751
+ .04
752
+ 0.25
753
+ Penguin
754
+ habitat(Water)
755
+ 4.3
756
+ -1.82
757
+ .07
758
+ Penguin
759
+ hasCovering(Feathers)
760
+ 4.5
761
+ -2.49
762
+ .01
763
+ Eagle
764
+ HasEggs
765
+ 5.0
766
+ -4.56
767
+ <.001**
768
+ 0.54
769
+ Eagle
770
+ homeothermic
771
+ 3.9
772
+ -0.32
773
+ .75
774
+ Eagle
775
+ HasLegs
776
+ 4.1
777
+ -0.79
778
+ .43
779
+ Eagle
780
+ habitat(Air)
781
+ 5.2
782
+ -5.21
783
+ <.001**
784
+ 0.61
785
+ Eagle
786
+ hasCovering(Feathers)
787
+ 5.5
788
+ -5.92
789
+ <.001**
790
+ 0.70
791
+ Turtle
792
+ HasEggs
793
+ 4.7
794
+ -3.90
795
+ <.001**
796
+ 0.46
797
+ Turtle
798
+ HasLegs
799
+ 4.1
800
+ -1.14
801
+ .25
802
+ Turtle
803
+ hasCovering(Scales)
804
+ 3.6
805
+ -0.04
806
+ .96
807
+ Crocodile
808
+ HasEggs
809
+ 4.6
810
+ -2.87
811
+ <.01*
812
+ 0.34
813
+ Crocodile
814
+ HasLegs
815
+ 4.3
816
+ -1.50
817
+ .13
818
+ Crocodile
819
+ hasCovering(Scales)
820
+ 4.7
821
+ -3.42
822
+ <.001**
823
+ 0.40
824
+ the match of our algorithms with the participants’ ratings using
825
+ F-score (2 · precision·recall
826
+ precision+recall ), variantmin reached a score of 0.3 while
827
+ variantmean reached 0.52.
828
+ Interpretation of results. Overall, the survey results over both on-
829
+ tologies can be interpreted as participants preferring explanations
830
+ that contain features which are rather unlikely. We assume that this
831
+ is because such features are the most salient to distinguish between
832
+ individuals. In contrast, features which are very common (like be-
833
+ ing of a certain gender or having legs) seem to be deemed less
834
+ helpful. This fits our likeliness measurement idea, since removing a
835
+ feature that does not appear often in the population for candidate
836
+ generation should also result in a rather high likeliness score using
837
+ our definitions. Our algorithm partly manages to cover that, but
838
+ could be improved. variantmean seems to be more promising for
839
+ that.
840
+ 6
841
+ STUDY ON USE CASES
842
+ To assess possible use cases for counterfactual explanations in de-
843
+ scription logics, we conducted an explorative study. We wanted
844
+ to know about users’ preferences for concept-based and/or coun-
845
+ terfactual explanations, and how different use cases or con-
846
+ cept length affect these. The full study material and data can
847
+ be found at https://anonymous.4open.science/r/Counterfactual-
848
+ Explanations-ELH-EBDA/.
849
+ 6.1
850
+ Method
851
+ We conducted an online survey via SoSciSurvey in German. Par-
852
+ ticipants were recruited from August 8, 2022 to August 15, 2022.
853
+ Recruiting and setup of the study were similar to the survey. This
854
+ time, participants were confronted with 4 different scenario stories.
855
+ The first two were similar to the ones in the survey (based on the
856
+ family and animals ontologies), the others were fictional stories
857
+ not based on existing ontologies. One was about an AI helping
858
+ select the right medicine for a fictional person and in which case
859
+ another medicament would be the better choice. The other was
860
+ about an AI deciding that the customer, called Clara, does not get a
861
+ loan from the bank and what she could do to change this. In this
862
+ study, participants were both presented an explanation based on
863
+ a concept (e.g. “I classify Petra as a mother, because she is female
864
+ and has a child”) and a counterfactual explanation to rate. For each
865
+ scenario except the family scenario, participants were randomly
866
+ assigned to one of two groups: For one, a long concept (size >3) was
867
+ used for explanation. The second group was presented with shorter
868
+ concepts. Participants were asked to rate each information on a
869
+ scale from 1-7 using three items: helpfulness for understanding the
870
+ AI, usefulness, and if the information enhances controllability of
871
+ the AI.
872
+ 6.2
873
+ Results
874
+ In this section, we present the results of our explorative study on
875
+ explanation use cases.
876
+ 6.2.1
877
+ Sample. 96 people took part in the survey. Age ranged be-
878
+ tween 20 and 70, mean = 35.0, median = 32, standard deviation
879
+ = 11.0. 46 participants were female, 46 male, 3 diverse, one left
880
+ the question blank. 17 had professions related to IT, 33 worked
881
+ in unrelated fields, 31 did not state it clearly enough to tell (e.g.,
882
+ student).
883
+ 6.2.2
884
+ Factors related to explanation rating. For each scenario and
885
+ item, we used the Mann-Whitney U test to test for differences in
886
+ concept-based explanation ratings from concept length. None of
887
+ the results was significant (p>.01). In one case, a difference between
888
+ concept-based and counterfactual explanation was significant: In
889
+
890
+ Counterfactual Explanations for Concepts in ELH
891
+ the loan scenario, the counterfactual explanation was rated signifi-
892
+ cantly higher on the item “This information is useful for Clara” than
893
+ the long concept-based explanation (𝑍 = -3.29, 𝑝 = <.001, Effect size
894
+ = .34). To explore differences in ratings over scenarios, we used the
895
+ Friedmann test. We found that, again for the usefulness-item, the
896
+ counterfactual explanation was significantly rated higher in the
897
+ loan scenario than in the medicine or animal scenario (𝜒(3) = 25.10,
898
+ 𝑝 <.0001) and also higher than in the family scenario. However, the
899
+ latter difference was not significant by itself. Concept ratings were
900
+ not affected by scenario (Wilcoxon-signed rank test). All explana-
901
+ tions had high ratings (average ratings ranging between 5.13 and
902
+ 6.39).
903
+ 7
904
+ DISCUSSION
905
+ We showed that our approach is able to generate counterfactuals
906
+ with minimal edit distance measured by the distance of their concise
907
+ bounded descriptions, i.e. few features changes to the individual.
908
+ Moreover, as there can be multiple counterfactuals per individual
909
+ with minimal edit distance, we explored two likeliness measures
910
+ to choose among them. Regarding choosing the best counterfac-
911
+ tual for an explanation, the results of our evaluation survey show
912
+ room for improvement, but potential that an automated selection
913
+ of explanations can be possible.
914
+ Concept-based vs. counterfactual explanations. The explorative
915
+ study gave us insight into people’s thoughts regarding concept-
916
+ based versus counterfactual explanations. While participants rated
917
+ all explanations rather positively, we did not find much differences
918
+ regarding the factors we took into account. However, regarding the
919
+ loan scenario, we found that the counterfactual was rated more use-
920
+ ful than the concept-based explanation. The loan and the medicine
921
+ scenario differed from the other two, that were already used in the
922
+ first survey, in the fact that the AI’s classification directly affected a
923
+ person. However, while the counterfactual was unclearly actionable
924
+ (have a better cholesterol level) in the medicine scenario, the loan
925
+ scenario’s counterfactual explanation was designed to provide a
926
+ concrete possible action (pay off debts) to change the classifica-
927
+ tion. We suppose that this is the reason this explanation scored
928
+ significantly higher on usefulness than the long concept and other
929
+ counterfactuals. Overall, our results suggest that counterfactuals
930
+ perform at least as well as concept verbalization w.r.t. explaining
931
+ algorithmic decisions. In addition, the study indicates that study-
932
+ ing domains where counterfactual explanations lead to actionable
933
+ decisions might be worthwhile.
934
+ 7.1
935
+ Limitations and future work
936
+ First of all, the target in our approach was to create a counterfac-
937
+ tual that would not be classified as the chosen concept. However,
938
+ in many applications, reaching a specific classification could be
939
+ relevant. Furthermore, we restricted the TBox to non-complex con-
940
+ cept subsumptions, as such subsumptions rarely occur in practical
941
+ ontologies. Future work might relax this assumption. The concepts
942
+ we used were rather simple. A description logic that contains dis-
943
+ junctions could be used for applications where explanations are
944
+ more interesting to users, so we plan to expand our algorithm to
945
+ the more complex DL ALC.
946
+ Structure of ontologies. A point open for discussion addresses
947
+ different structures of ontologies. As it is the case in the family
948
+ ontology, sometimes individuals might have or have not the same
949
+ roles, while it is very unlikely for them to have the same objects for
950
+ these roles, as argued before. We therefore decided to just compare
951
+ the sets of classes and roles of the individuals. For other ontologies,
952
+ this might not be a good decision. The same goes for the question if
953
+ subfeatures of the changed feature should be counted into the edit
954
+ distance, as we did here. We will take a look at how various calcu-
955
+ lation possibilities depend on use cases and ontology structures to
956
+ be able to make specific recommendations.
957
+ Actionability. While we tried to check for plausibility of coun-
958
+ terfactual instances, our scoring mechanism cannot make sure yet
959
+ that the axioms that were changed can actually be changed in the
960
+ real world. One argument for counterfactual explanations is that in
961
+ many applications it might be interesting for data subjects to get to
962
+ know how they can change their classification [36]. However, the
963
+ family ontology clearly shows an example of cases where this is
964
+ not really possible, since people cannot usually change their gender
965
+ or familiar relations. Poyiadzi et al. [29] discuss the relevance of
966
+ actionability of counterfactuals. Since this is in line with our empir-
967
+ ical findings, our future work will put more focus on applications
968
+ where actionability can be reached and how to do this.
969
+ 7.2
970
+ Applications
971
+ The structure of the family ontology resembles data about individu-
972
+ als in web sources such as DBpedia, YAGO, and Wikidata. To enrich
973
+ such knowledge bases, additional information can be extracted
974
+ from the web. Concept learning allows checking the consistency of
975
+ the extracted information and inferring new (implicit) axioms from
976
+ the explicitly stated axioms.
977
+ Concept learning has been effectively applied to medical on-
978
+ tologies [22], but the learned concepts can become very long [18],
979
+ making them hard to grasp even for experts. Counterfactuals, which
980
+ might even be verbalized in natural language, help to steer focus to
981
+ the most important parts of the concept.
982
+ Our study suggests that counterfactual explanations are most
983
+ useful in actionable settings. For example, if a website is falsely
984
+ classified as unsafe by a phishing site detector, the website owner
985
+ might be interested in knowing which feature of his website caused
986
+ the decision so that they can change it.
987
+ Ultimately, we want to develop a chatbot that, in the spirit of XAI,
988
+ provides users with natural language explanations of automatically
989
+ learned concepts and can be applied to various use cases in areas
990
+ including web science, medicine and finance. Meanwhile, we will
991
+ look further into using counterfactual explanations for offering
992
+ possible actions to alter classifications, to provide more agency to
993
+ users.
994
+ 8
995
+ CONCLUSION
996
+ We propose the first approach for generating counterfactual expla-
997
+ nations in the description logic ELH. Our approach performs well
998
+ on the objective to generate counterfactual candidates for which
999
+ a designated concept does not hold and which are similar to the
1000
+ individual. We discussed possibilities to improve the likeliness mea-
1001
+ surement of counterfactual candidates in accordance with findings
1002
+
1003
+ Sieger et al.
1004
+ from a user study. Our future work will move on to more complex
1005
+ DLs.
1006
+ ACKNOWLEDGMENTS
1007
+ Funded by the Deutsche Forschungsgemeinschaft (DFG, German
1008
+ Research Foundation): TRR 318/1 2021 – 438445824
1009
+ REFERENCES
1010
+ [1] Amina Adadi and Mohammed Berrada. 2018. Peeking Inside the Black-Box: A
1011
+ Survey on Explainable Artificial Intelligence (XAI). IEEE Access 6 (2018), 52138–
1012
+ 52160.
1013
+ [2] Alejandro Barredo Arrieta, Natalia Díaz Rodríguez, Javier Del Ser, Adrien Ben-
1014
+ netot, Siham Tabik, Alberto Barbado, Salvador García, Sergio Gil-Lopez, Daniel
1015
+ Molina, Richard Benjamins, Raja Chatila, and Francisco Herrera. 2020. Explain-
1016
+ able Artificial Intelligence (XAI): Concepts, taxonomies, opportunities and chal-
1017
+ lenges toward responsible AI. Inf. Fusion 58 (2020), 82–115.
1018
+ [3] Sören Auer, Christian Bizer, Georgi Kobilarov, Jens Lehmann, Richard Cyganiak,
1019
+ and Zachary Ives. 2007. DBpedia: A Nucleus for a Web of Open Data. In The
1020
+ Semantic Web, Karl Aberer, Key-Sun Choi, Natasha Noy, Dean Allemang, Kyung-
1021
+ Il Lee, Lyndon Nixon, Jennifer Golbeck, Peter Mika, Diana Maynard, Riichiro
1022
+ Mizoguchi, Guus Schreiber, and Philippe Cudré-Mauroux (Eds.). Springer Berlin
1023
+ Heidelberg, Berlin, Heidelberg, 722–735.
1024
+ [4] Franz Baader, Ian Horrocks, Carsten Lutz, and Uli Sattler. 2017. An Introduction
1025
+ to Description Logic. Cambridge University Press, Cambridge. https://doi.org/10.
1026
+ 1017/9781139025355
1027
+ [5] Roi Blanco, Giuseppe Ottaviano, and Edgar Meij. 2015. Fast and Space-Efficient
1028
+ Entity Linking for Queries. In Proceedings of the Eighth ACM International Con-
1029
+ ference on Web Search and Data Mining (Shanghai, China) (WSDM ’15). As-
1030
+ sociation for Computing Machinery, New York, NY, USA, 179–188.
1031
+ https:
1032
+ //doi.org/10.1145/2684822.2685317
1033
+ [6] S. Brandt. 2004. Reasoning in ELH w.r.t. General Concept Inclusion Axioms. LTCS-
1034
+ Report LTCS-04-03. Chair for Automata Theory, Institute for Theoretical Com-
1035
+ puter Science, Dresden University of Technology, Germany. See http://lat.inf.tu-
1036
+ dresden.de/research/reports.html..
1037
+ [7] Lorenz Bühmann, Daniel Fleischhacker, Jens Lehmann, André Melo, and Johanna
1038
+ Völker. 2014. Inductive Lexical Learning of Class Expressions. In EKAW (Lecture
1039
+ Notes in Computer Science, Vol. 8876). Springer, Cham, 42–53.
1040
+ [8] Lorenz Bühmann, Jens Lehmann, and Patrick Westphal. 2016. DL-Learner—A
1041
+ framework for inductive learning on the Semantic Web. Journal of Web Semantics
1042
+ 39 (2016), 15–24. https://doi.org/10.1016/j.websem.2016.06.001
1043
+ [9] Jiaoyan Chen, Xi Chen, Ian Horrocks, Erik B. Myklebust, and Ernesto Jimenez-
1044
+ Ruiz. 2020. Correcting Knowledge Base Assertions. In Proceedings of The Web
1045
+ Conference 2020 (Taipei, Taiwan) (WWW ’20). Association for Computing Machin-
1046
+ ery, New York, NY, USA, 1537–1547. https://doi.org/10.1145/3366423.3380226
1047
+ [10] Susanne Dandl, Christoph Molnar, Martin Binder, and Bernd Bischl. 2020. Multi-
1048
+ Objective Counterfactual Explanations. In Parallel Problem Solving from Nature
1049
+ – PPSN XVI, Thomas Bäck, Mike Preuss, André Deutz, Hao Wang, Carola Do-
1050
+ err, Michael Emmerich, and Heike Trautmann (Eds.). Springer International
1051
+ Publishing, Cham, 448–469.
1052
+ [11] Caglar Demir and Axel-Cyrille Ngonga Ngomo. 2021. DRILL- Deep Reinforce-
1053
+ ment Learning for Refinement Operators in ALC. CoRR abs/2106.15373 (2021).
1054
+ [12] Brigitte Grau and Anne-Laure Ligozat. 2018. A Corpus for Hybrid Question
1055
+ Answering Systems. In Companion Proceedings of the The Web Conference 2018
1056
+ (Lyon, France) (WWW ’18). International World Wide Web Conferences Steering
1057
+ Committee, Republic and Canton of Geneva, CHE, 1081–1086. https://doi.org/
1058
+ 10.1145/3184558.3191540
1059
+ [13] Riccardo Guidotti, Anna Monreale, Salvatore Ruggieri, Franco Turini, Fosca
1060
+ Giannotti, and Dino Pedreschi. 2019. A Survey of Methods for Explaining Black
1061
+ Box Models. ACM Comput. Surv. 51, 5 (2019), 93:1–93:42.
1062
+ [14] Stefan Heindorf, Lukas Blübaum, Nick Düsterhus, Till Werner, Varun Nandku-
1063
+ mar Golani, Caglar Demir, and Axel-Cyrille Ngonga Ngomo. 2022. EvoLearner:
1064
+ Learning Description Logics with Evolutionary Algorithms. In Proceedings of the
1065
+ ACM Web Conference 2022. ACM. https://doi.org/10.1145/3485447.3511925
1066
+ [15] Andre Hernich, Carsten Lutz, Ana Ozaki, and Frank Wolter. 2015. Schema.Org as
1067
+ a Description Logic. In Proceedings of the 24th International Conference on Artificial
1068
+ Intelligence (IJCAI’15). AAAI Press, Buenos Aires, Argentina, 3048–3054.
1069
+ [16] Aidan Hogan, Eva Blomqvist, Michael Cochez, Claudia d’Amato, Gerard de Melo,
1070
+ Claudio Gutiérrez, Sabrina Kirrane, José Emilio Labra Gayo, Roberto Navigli,
1071
+ Sebastian Neumaier, Axel-Cyrille Ngonga Ngomo, Axel Polleres, Sabbir M. Rashid,
1072
+ Anisa Rula, Lukas Schmelzeisen, Juan F. Sequeda, Steffen Staab, and Antoine
1073
+ Zimmermann. 2021. Knowledge Graphs. Number 22 in Synthesis Lectures on
1074
+ Data, Semantics, and Knowledge. Morgan & Claypool. https://doi.org/10.2200/
1075
+ S01125ED1V01Y202109DSK022
1076
+ [17] N’Dah Jean Kouagou, Stefan Heindorf, Caglar Demir, and Axel-Cyrille Ngonga
1077
+ Ngomo. 2021. Neural Class Expression Synthesis.
1078
+ https://doi.org/10.48550/
1079
+ ARXIV.2111.08486
1080
+ [18] N’Dah Jean Kouagou, Stefan Heindorf, Caglar Demir, and Axel-Cyrille Ngonga
1081
+ Ngomo. 2022. Learning Concept Lengths Accelerates Concept Learning in ALC.
1082
+ In The Semantic Web, Paul Groth, Maria-Esther Vidal, Fabian Suchanek, Pedro
1083
+ Szekley, Pavan Kapanipathi, Catia Pesquita, Hala Skaf-Molli, and Minna Tamper
1084
+ (Eds.). Springer International Publishing, Cham, 236–252.
1085
+ [19] Maxat Kulmanov, Wang Liu-Wei, Yuan Yan, and Robert Hoehndorf. 2019. EL
1086
+ Embeddings: Geometric Construction of Models for the Description Logic EL++.
1087
+ In Proceedings of the Twenty-Eighth International Joint Conference on Artificial
1088
+ Intelligence, IJCAI-19. International Joint Conferences on Artificial Intelligence
1089
+ Organization, 6103–6109. https://doi.org/10.24963/ijcai.2019/845
1090
+ [20] Jonathan Lajus and Fabian M. Suchanek. 2018. Are All People Married? Deter-
1091
+ mining Obligatory Attributes in Knowledge Bases. In Proceedings of the 2018
1092
+ World Wide Web Conference (Lyon, France) (WWW ’18). International World
1093
+ Wide Web Conferences Steering Committee, Republic and Canton of Geneva,
1094
+ CHE, 1115–1124. https://doi.org/10.1145/3178876.3186010
1095
+ [21] Jens Lehmann. 2009. DL-Learner: Learning Concepts in Description Logics.
1096
+ Journal of Machine Learning Research 10 (2009), 2639–2642. https://doi.org/10.
1097
+ 1145/1577069.1755874
1098
+ [22] Jens Lehmann and Pascal Hitzler. 2010. Concept learning in description logics
1099
+ using refinement operators. Mach. Learn. 78, 1-2 (2010), 203–250.
1100
+ [23] Karsten Lehmann and Anni-Yasmin Turhan. 2012. A Framework for Semantic-
1101
+ based Similarity Measures for ELH-Concepts. In Proceedings of the 13th Eu-
1102
+ ropean Conference on Logics in Artificial Intelligence (Lecture Notes in Artificial
1103
+ Intelligence), Luis Fariñas del Cerro, Andreas Herzig, and Jérôme Mengin (Eds.).
1104
+ Springer Verlag, 307–319.
1105
+ [24] Jiaqi Li, Xuan Wu, Chang Lu, Wenxing Deng, and Yizheng Zhao. 2021. Computing
1106
+ Views of OWL Ontologies for the Semantic Web. In Proceedings of the Web
1107
+ Conference 2021 (Ljubljana, Slovenia) (WWW ’21). Association for Computing
1108
+ Machinery, New York, NY, USA, 2624–2635.
1109
+ https://doi.org/10.1145/3442381.
1110
+ 3449881
1111
+ [25] Christian Meske, Enrico Bunde, Johannes Schneider, and Martin Gersch. 2022.
1112
+ Explainable artificial intelligence: objectives, stakeholders, and future research
1113
+ opportunities. Information Systems Management 39, 1 (2022), 53–63.
1114
+ [26] Christoph Molnar. 2022. Interpretable Machine Learning: A Guide for Making
1115
+ Black Box Models Explainable. christophm.github.io/interpretable-ml-book/
1116
+ [27] Carina Negreanu, Alperen Karaoglu, Jack Williams, Shuang Chen, Daniel Fabian,
1117
+ Andrew Gordon, and Chin-Yew Lin. 2022. Rows from Many Sources: Enriching
1118
+ Row Completions from Wikidata with a Pre-Trained Language Model. In Compan-
1119
+ ion Proceedings of the Web Conference 2022 (Virtual Event, Lyon, France) (WWW
1120
+ ’22). Association for Computing Machinery, New York, NY, USA, 1272–1280.
1121
+ https://doi.org/10.1145/3487553.3524923
1122
+ [28] Thomas Pellissier Tanon, Camille Bourgaux, and Fabian Suchanek. 2019. Learning
1123
+ How to Correct a Knowledge Base from the Edit History. In The World Wide Web
1124
+ Conference (San Francisco, CA, USA) (WWW ’19). Association for Computing
1125
+ Machinery, New York, NY, USA, 1465–1475.
1126
+ https://doi.org/10.1145/3308558.
1127
+ 3313584
1128
+ [29] Rafael Poyiadzi, Kacper Sokol, Raul Santos-Rodriguez, Tijl De Bie, and Peter
1129
+ Flach. 2020. FACE: Feasible and Actionable Counterfactual Explanations. In
1130
+ Proceedings of the AAAI/ACM Conference on AI, Ethics, and Society (New York,
1131
+ NY, USA) (AIES ’20). Association for Computing Machinery, New York, NY, USA,
1132
+ 344–350. https://doi.org/10.1145/3375627.3375850
1133
+ [30] Charlotte Rudnik, Thibault Ehrhart, Olivier Ferret, Denis Teyssou, Raphael
1134
+ Troncy, and Xavier Tannier. 2019. Searching News Articles Using an Event
1135
+ Knowledge Graph Leveraged by Wikidata. In Companion Proceedings of The
1136
+ 2019 World Wide Web Conference (San Francisco, USA) (WWW ’19). Asso-
1137
+ ciation for Computing Machinery, New York, NY, USA, 1232–1239.
1138
+ https:
1139
+ //doi.org/10.1145/3308560.3316761
1140
+ [31] Md Kamruzzaman Sarker and Pascal Hitzler. 2019. Efficient Concept Induction for
1141
+ Description Logics. Proceedings of the AAAI Conference on Artificial Intelligence
1142
+ 33, 3036–3043. https://doi.org/10.1609/aaai.v33i01.33013036
1143
+ [32] Ilia Stepin, Jose Alonso, Alejandro Catala, and Martin Pereira-Farina. 2021. A
1144
+ Survey of Contrastive and Counterfactual Explanation Generation Methods
1145
+ for Explainable Artificial Intelligence. IEEE Access 9 (01 2021), 11974–12001.
1146
+ https://doi.org/10.1109/ACCESS.2021.3051315
1147
+ [33] Ilia Stepin, José Maria Alonso, Alejandro Catalá, and Martin Pereira-Fariña.
1148
+ 2020. Generation and Evaluation of Factual and Gounterfaetual Explanations for
1149
+ Decision Trees and Fuzzy Rule-based Classifiers. In FUZZ-IEEE. IEEE, 1–8.
1150
+ [34] Fabian M. Suchanek, Gjergji Kasneci, and Gerhard Weikum. 2007. Yago: A Core of
1151
+ Semantic Knowledge. In Proceedings of the 16th International Conference on World
1152
+ Wide Web (Banff, Alberta, Canada) (WWW ’07). Association for Computing Ma-
1153
+ chinery, New York, NY, USA, 697–706. https://doi.org/10.1145/1242572.1242667
1154
+ [35] Denny Vrandečić and Markus Krötzsch. 2014. Wikidata: A Free Collaborative
1155
+ Knowledgebase. Commun. ACM 57, 10 (sep 2014), 78–85.
1156
+ https://doi.org/10.
1157
+ 1145/2629489
1158
+
1159
+ Counterfactual Explanations for Concepts in ELH
1160
+ [36] Sandra Wachter, Brent Mittelstadt, and Chris Russell. 2018. Counterfactual
1161
+ Explanations Without Opening the Black Box: Automated Decisions and the
1162
+ GDPR. Harvard journal of law & technology 31 (04 2018), 841–887.
1163
+ https:
1164
+ //doi.org/10.2139/ssrn.3063289
1165
+ [37] Patrick Westphal, Lorenz Bühmann, Simon Bin, Hajira Jabeen, and Jens Lehmann.
1166
+ 2019. SML-Bench - A benchmarking framework for structured machine learning.
1167
+ Semantic Web 10, 2 (2019), 231–245.
1168
+
FNE4T4oBgHgl3EQffg3m/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
HNAyT4oBgHgl3EQfrvkK/content/tmp_files/2301.00564v1.pdf.txt ADDED
@@ -0,0 +1,1618 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ arXiv:2301.00564v1 [eess.SY] 2 Jan 2023
2
+ JOURNAL OF MODERN POWER SYSTEMS AND CLEAN ENERGY, VOL. XX, NO. XX, XXXX
3
+ 1
4
+ Estimating Risk-Aware Flexibility Areas for EV
5
+ Charging Pools via Stochastic AC-OPF
6
+ Juan S. Giraldo, Member, IEEE, Nataly Ba˜nol Arias, Member, IEEE, Pedro P. Vergara, Member, IEEE,
7
+ Maria Vlasiou, Gerwin Hoogsteen, Member, IEEE, and Johann L. Hurink, Member, IEEE
8
+ Abstract—This
9
+ paper
10
+ introduces a stochastic
11
+ AC-OPF
12
+ (SOPF) for the flexibility management of electric vehicle (EV)
13
+ charging pools in distribution networks under uncertainty.
14
+ The SOPF considers discrete utility functions from charging
15
+ pools as a compensation mechanism for eventual energy not
16
+ served to their charging tasks. An application of the proposed
17
+ SOPF is described where a distribution system operator (DSO)
18
+ requires flexibility to each charging pool in a day-ahead time
19
+ frame, minimizing the cost for flexibility while guaranteeing
20
+ technical limits. Flexibility areas are defined for each charging
21
+ pool and calculated as a function of a risk parameter involving
22
+ the solution’s uncertainty. Results show that all players can
23
+ benefit from this approach, i.e., the DSO obtains a risk-aware
24
+ solution, while charging pools/tasks perceive a reduction in the
25
+ total energy payment due to flexibility services.
26
+ Index Terms—Electric vehicles, flexibility management,
27
+ stochastic optimal power flow, risk awareness, compensation
28
+ mechanism.
29
+ NOMENCLATURE
30
+ Sets
31
+ Ωb
32
+ Set of nodes
33
+ ΩS
34
+ Set of nodes with charging pools
35
+ Ωs
36
+ N
37
+ Set of charging points at charging pool s ∈ ΩS
38
+ Ωs
39
+ K
40
+ Set of breaking points at charging pool s ∈ ΩS
41
+ ΩT
42
+ Set of time periods
43
+ Ωω
44
+ Set of stochastic scenarios
45
+ Parameters
46
+ An,ω
47
+ Characteristics of charging task n at scenario ω
48
+ an,ω
49
+ Arrival time of charging task n at scenario ω
50
+ dn,ω
51
+ Departure time of charging task n at scenario ω
52
+ En,ω
53
+ Required energy of charging task n at scenario ω
54
+ Rij, Xij Resistance and reactance of branch connecting
55
+ nodes ij
56
+ PD
57
+ i,t, QD
58
+ i,t Active and reactive demand power at node i and
59
+ period t
60
+ ηa
61
+ n
62
+ Expected arrival time of charging task n
63
+ ηd
64
+ n
65
+ Expected departure time of charging task n
66
+ βs,t
67
+ Risk parameter at charging pool s in period t
68
+ This work was financially supported by the Netherlands Enterprise
69
+ Agency (RVO) – DEI+ project 120037 “Het Indi¨e terrein: Een slimme
70
+ buurtbatterij in de oude weverij”.
71
+ J. S. Giraldo is with the Energy Transition Studies group, Nether-
72
+ lands Organisation for Applied Scientific Research (TNO), Amsterdam,
73
+ 1043 NT, The Netherlands (e-mail: [email protected]).
74
+ N. B. Arias, M. Vlasiou, G. Hoogsteen, and J. L. Hurink are
75
+ with the dept. Electrical Engineering, Mathematics and Computer Sci-
76
+ ence, University of Twente, Enschede, 7522 NB, The Netherlands, (e-
77
+ mail:{m.n.banolarias; m.vlasiou; g.hoogsteen; j.l.hurink}@utwente.nl).
78
+ P. P. Vergara is with the Intelligent Electrical Power Grids group,
79
+ EEMCS, Delft University of Technology, Delft, 2628 CD, The Nether-
80
+ lands, (e-mail: [email protected]).
81
+ κ
82
+ Number of breaking points
83
+ ps,t
84
+ Maximum power allowed of charging pool s in
85
+ period t
86
+ xn
87
+ Maximum charging power of charging task n
88
+ hs,k, bs,k Coefficients of the utility function at charging
89
+ pool s and break point k
90
+ αs,k
91
+ Break point value of energy not served at pool s
92
+ and point k
93
+ ∆t
94
+ Duration of the time period t
95
+ cs,t
96
+ Unitary cost of energy at charging pool s period
97
+ t
98
+ Iij
99
+ Maximum allowed current magnitude at branch
100
+ i-j
101
+ V
102
+ Maximum allowed voltage magnitude
103
+ V
104
+ Minimum allowed voltage magnitude
105
+ πω
106
+ Probability of scenario ω
107
+ Variables
108
+ ps,t
109
+ Reserved power for charging pool s in period t
110
+ xs,t,ω
111
+ Allocated power consumption for charging pool
112
+ s in period t and scenario ω
113
+ ρs,t,ω
114
+ Power mismatch for charging pool s in period t
115
+ and scenario ω
116
+ φn,ω
117
+ Energy not served to task n in scenario ω
118
+ Φs,ω
119
+ Total energy not served at charging pool s in
120
+ scenario ω
121
+ λs,k,ω, λs,k,ω Weights in break point k, at pool s in sce-
122
+ nario ω
123
+ Pij,t,ω, Qij,t,ω Active and reactive power flowing through
124
+ branch i-j in period t in scenario ω
125
+ Isqr
126
+ ij,t,ω
127
+ Squared current magnitude flowing through
128
+ branch i-j in period t in scenario ω
129
+ V sqr
130
+ i,t,ω
131
+ Squared voltage magnitude at node i in period t
132
+ in scenario ω
133
+ ys,k,ω
134
+ Binary variable representing state of segment at
135
+ break point k, pool s in scenario ω
136
+ Rs,t
137
+ Flexibility area of charging pool s in period t
138
+ Zs,ω
139
+ Cost for energy not served at charging pool s
140
+ and scenario ω
141
+ I. INTRODUCTION
142
+ B
143
+ ESIDES being an environmentally-friendly option for
144
+ transportation, electric vehicles (EVs) can also pro-
145
+ vide services due to the controllable nature of their load.
146
+ Examples of these services are, amongst others, congestion
147
+ management, peak shaving, and frequency regulation [1].
148
+ These services may be of increased value as technical prob-
149
+ lems, such as voltage violations and branch overloading,
150
+ are expected to be more likely in distribution systems if
151
+
152
+ JOURNAL OF MODERN POWER SYSTEMS AND CLEAN ENERGY, VOL. XX, NO. XX, XXXX
153
+ 2
154
+ no actions are taken [2]. For distribution system operators
155
+ (DSOs), which are responsible for delivering electricity to
156
+ end customers and maintaining a reliable network operation,
157
+ it might be interesting to assess the flexibility needs in
158
+ their networks. In a later stage, these flexibility needs may
159
+ also be provided by entities such as aggregators to solve
160
+ operational issues or offer it as an ancillary service. For
161
+ this, flexibility areas may be determined corresponding to
162
+ the range of active power in which flexibility sources can
163
+ be managed [3].
164
+ In [4], it is already stated that network issues can be
165
+ tackled through flexibility management frameworks to avoid
166
+ common issues in distribution systems, such as congestion
167
+ or voltage limit violations. This strategy is known as DSO’s
168
+ flexibility procurement, and it has gained momentum during
169
+ the last few years due to its economic advantages over
170
+ other solutions such as grid reinforcement. However, for
171
+ a flexibility scheme to be successful, it must guarantee that
172
+ all participants can benefit from participating and are thus
173
+ willing to engage in the flexibility scheme [5].
174
+ Due to driving behaviours, penetration levels, and en-
175
+ ergy requirements, different EVs add an intrinsic, highly
176
+ volatile stochasticity layer to the already complex flexibility
177
+ management problem [6]. Hence, to successfully implement
178
+ a flexibility scheme, new management mechanisms are
179
+ needed that incentivise EV users to offer their flexibility
180
+ and encourage them to participate in such schemes allowing
181
+ the DSO to guarantee a high-quality delivery service under
182
+ uncertainty. In this context, a call for flexibility consists of
183
+ acquiring services from EVs by the DSO to ensure the safe
184
+ operation of the grid [3], ensuring that EV’s interests are
185
+ respected.
186
+ Several works have studied flexibility concepts concern-
187
+ ing EVs in distribution systems using pricing strategies.
188
+ For example, the authors in [7] propose a roadmap with
189
+ key recommendations for the inclusion of EVs, where they
190
+ define EV flexibility services in terms of power, time,
191
+ duration, and location. Furthermore, the authors in [8]
192
+ propose an adaptive pricing strategy that helps to mitigate
193
+ peak demand and to reduce the need for grid reinforcement.
194
+ Likewise, in [4], a dynamic pricing strategy for peak load
195
+ reduction is proposed to optimize the profit of charging pool
196
+ owners, while the uncertain preferences of customers are
197
+ accounted for via robust optimization.
198
+ Smart charging strategies designed in [9] are able to sat-
199
+ isfy multiple flexibility objectives and target specific groups
200
+ of EV users according to user profile preferences. However,
201
+ they do not take into account different pricing schemes,
202
+ aggregator profit, and EV user compensation. Similarly, the
203
+ authors in [10] present a stochastic optimization model for
204
+ cooperative control of charging stations using an aggregated
205
+ energy storage equivalent to describing the charging tasks
206
+ of the EVs. However, although the approaches mentioned
207
+ above can provide local peak shaving services, they are
208
+ not designed to consider network constraints. In [11], EV
209
+ flexibility is provided in the form of peak shaving and valley
210
+ filling, and pricing and charging scheduling mechanisms
211
+ are proposed based on a linear demand-price function. The
212
+ problem is formulated as a bilevel program in which the
213
+ distribution market clearing is simulated in the lower level
214
+ and the upper level solves the EV charging scheduling. Al-
215
+ though aggregated flexibility is calculated for DSO services,
216
+ the proposed framework is deterministic disregarding the
217
+ uncertain nature of EV parameters.
218
+ The concept of flexibility envelopes was introduced
219
+ in [12] as an alternative to quantifying flexibility reserves
220
+ considering the time evolution. This concept has been used,
221
+ for example, in [13], to show that the flexibility reserves
222
+ depend highly on the availability of EVs. Furthermore, in
223
+ [14], flexibility envelopes are calculated for local energy
224
+ communities highlighting it as an ease-of-use approach for
225
+ managing and reserving flexibility in real-time. A similar
226
+ concept known as flexibility areas has been used to estimate
227
+ the flexibility of the available active and reactive power
228
+ at the TSO-DSO boundary [3]. A bottom-up aggregation
229
+ is commonly performed to estimate such flexibility areas
230
+ by determining the potential of different assets at the
231
+ boundary [15]. In [16], a risk-aware framework is proposed
232
+ to define the aggregated flexibility from TSO-DSO inter-
233
+ connections and a two-stage linear stochastic optimization
234
+ model is developed to optimally define the active power
235
+ flexibility available from DSOs to TSOs via a DC-OPF.
236
+ Moreover, as concluded in [17], OPF-based algorithms
237
+ allow for obtaining more reliable feasible operating regions
238
+ compared to random sampling methods. However, none of
239
+ the above approaches does consider uncertainty.
240
+ Stochastic programming is a common approach for han-
241
+ dling uncertainty in electrical power systems including net-
242
+ work constraints [18]. For example, the authors in [19] in-
243
+ troduce a multi-period stochastic AC-OPF (SOPF) consid-
244
+ ering different flexibility assets for congestion management
245
+ and voltage control. A two-stage stochastic programming
246
+ model for managing the flexibility of EVs is proposed
247
+ in [20] for distribution systems in which EVs have already
248
+ been fully recharged. Similarly, the authors in [21] used a
249
+ linearized power flow model in a stochastic optimization
250
+ model considering network constraints focusing on the net-
251
+ work’s reliability. Robust optimization has also been used as
252
+ in [22] to provide flexibility of EVs to DSOs through active
253
+ and reactive power management strategies minimizing the
254
+ amount of non-supplied energy and considering network
255
+ constraints. A queuing network model for electric vehicle
256
+ charging is presented in [23], where the authors define the
257
+ power allocation in the distribution grid while avoiding
258
+ congestion and voltage issues. However, all these works as-
259
+ sume that users agree to participate in the flexibility scheme
260
+ without taking into account their particular priorities.
261
+ The willingness of participants to engage in energy
262
+ trading is an essential factor to be considered in a flexibility
263
+ scheme. Different approaches have been identified in the
264
+ literature, such as solving a global optimization problem that
265
+ is aware of all participants’ subproblems, double auction
266
+ schemes, and using marginal utility functions [5]. The au-
267
+ thors in [24] quantify the EV flexibility for a group of EVs
268
+ classified by user priorities in terms of amount, time and
269
+ duration of availability, via a data-driven approach. Even
270
+ though the EV flexibility is properly quantified, the work
271
+ focuses on data analysis without explicitly proposing an EV
272
+ flexibility scheme for practical implementations. Similarly,
273
+ an online algorithm for charging scheduling of EVs in
274
+ charging pools is proposed in [25], aiming to optimize the
275
+ amount of energy, charging time and prices for EV users,
276
+
277
+ JOURNAL OF MODERN POWER SYSTEMS AND CLEAN ENERGY, VOL. XX, NO. XX, XXXX
278
+ 3
279
+ which are able to choose their most preferable option from
280
+ a menu-based pricing scheme. Although this work ignores
281
+ economic profits of each individual charging pool and a
282
+ detailed operation of the electrical grid (i.e., power flow
283
+ equations), its online nature sets it as a promising option
284
+ for real implementations of EV flexibility schemes.
285
+ With this, simplified representations for utility functions
286
+ are common since they allow for using decentralized opti-
287
+ mization algorithms. For example, the authors in [26] intro-
288
+ duce a decentralized flexibility market based on linear utility
289
+ functions where the prosumers’ willingness to participate
290
+ is explicitly considered. Furthermore, in [27] the authors
291
+ propose using piecewise-quadratic utility functions. How-
292
+ ever, as found in [5], utility functions are often nonlinear
293
+ and nonconvex, and in the case they are linear, they can
294
+ be relatively flat with occasionally significant variations,
295
+ resulting in non-smooth utility functions.
296
+ The reviewed studies show that flexibility services via
297
+ EV charging have been widely studied. However, we have
298
+ identified three main gaps in the current literature which we
299
+ attempt to fill with this paper:
300
+ • Most papers dealing with local EV energy management
301
+ disregard network constraints and do not consider
302
+ uncertainties. We propose an AC multi-period SOPF
303
+ considering network constraints and uncertainty related
304
+ to EV requirements.
305
+ • Most papers consider quadratic utility functions be-
306
+ cause of their attractive properties. We propose a
307
+ general piecewise-linear formulation that is able to deal
308
+ with convex and nonconvex utility functions allowing
309
+ us to represent the interests of EV users. The proposed
310
+ utility functions represent the participants’ willingness
311
+ to offer flexibility services in the form of energy not
312
+ served in return for compensation.
313
+ • We propose a methodology to estimate risk-aware flex-
314
+ ibility areas where the DSO can guarantee operational
315
+ limits. This is done by introducing a risk parameter
316
+ representing the willingness of the DSO to withstand
317
+ operational limit violations. This methodology allows
318
+ estimating probable costs for flexibility requirements
319
+ and gives the charging pools more freedom to manage
320
+ the EV load.
321
+ II. PROBLEM DESCRIPTION
322
+ An operator entity, namely the DSO, is responsible for
323
+ guaranteeing reliable operational conditions in an electrical
324
+ distribution network. In addition to constraint satisfaction
325
+ (i.e., voltage and current magnitude limits), the DSO aims
326
+ to achieve an economically efficient operation on a day-
327
+ ahead time frame via flexibility procurement. In this con-
328
+ text, we consider a distribution network with a set Ωb of
329
+ nodes, connected by a set of distribution lines. A fixed
330
+ number of charging pools are connected to the network,
331
+ identified by the subset ΩS ⊂ Ωb. Hereby, a charging pool
332
+ s ∈ ΩS consists of a fixed set ��s
333
+ N of charging points
334
+ (e.g., the number of EV parking spaces). A charging task
335
+ n arriving to the charging pool s is represented as n ∈ Ωs
336
+ N,
337
+ and is characterized by its set of requirements An. It is
338
+ assumed that a truthful local market mechanism [28] is
339
+ implemented, eliminating any strategic behaviour from the
340
+ participants, meaning that all charging tasks arriving at
341
+ a charging pool are willing to provide demand flexibility
342
+ services in exchange for compensation. This compensation
343
+ must reflect the charging tasks involved in the process,
344
+ whether by a tariff reduction, a bonus, or any other kind of
345
+ settlement [29]. Therefore, the charging pools act as local
346
+ flexibility aggregators characterized by a utility function us
347
+ which are able to control the charging profiles of their tasks.
348
+ In the implemented market mechanism, the charging
349
+ pools agree on truthfully communicating the expected re-
350
+ quirements of their charging tasks (An) along with their
351
+ utility functions (us) to the DSO. Therefore, the DSO
352
+ aims to obtain optimal demand profiles for the charging
353
+ pools, which minimize the cost for flexibility procurement
354
+ while guaranteeing the safe operation of the network over
355
+ a planning horizon ΩT. In operation, it would be ideal
356
+ that the charging pools could provide the demand profiles
357
+ required, meaning that all operational constraints are satis-
358
+ fied. However, in real operation, the actual delivered power
359
+ might vary around the planned profiles since the information
360
+ from the charging pools is intrinsically uncertain, e.g., due
361
+ to the stochastic behaviour of their charging tasks. Hence,
362
+ the DSO needs to plan its actions taking into account the
363
+ operation uncertainties from the charging pools. For this
364
+ purpose, in this paper, we propose using an AC multi-period
365
+ stochastic optimal power flow, extending the work in [18].
366
+ Let ω ∈ Ωω be a realization in a set of stochastic
367
+ scenarios considering possible outcomes due to the uncer-
368
+ tainty of the characteristics of the charging tasks. Hence,
369
+ An,ω represents the expected requirements of charging task
370
+ n ∈ Ωs
371
+ N in scenario ω. The DSO receives this information
372
+ from the charging pools and solves the SOPF minimizing
373
+ the expected costs for flexibility Zs in a day-ahead time
374
+ frame. The DSO needs to define a risk parameter βs,t
375
+ based on the risk it is willing to withstand over operational
376
+ limit violations. Using the optimal solution and the risk
377
+ parameter, the DSO calculates and communicates a lower
378
+ and upper power bound to each charging pool valid for each
379
+ period of the planning horizon. These bounds compose the
380
+ flexibility area, denoted by Rs,t. A graphical representation
381
+ of the day-ahead planning involving the DSO, charging
382
+ pools, and charging tasks is depicted in Fig. 1 along with
383
+ its respective section in the paper.
384
+ In the operation stage, each charging pool s is responsible
385
+ for the local flexibility management of its charging tasks
386
+ considering the flexibility area provided by the DSO. This
387
+ can be done, for example, using profile steering as in [30].
388
+ The actual energy not served to the charging tasks at the
389
+ end of the day is then aggregated and mapped through the
390
+ utility function to calculate the actual cost for flexibility.
391
+ III. MATHEMATICAL MODELS
392
+ In this section the different components of the considered
393
+ setting are presented.
394
+ A. Charging tasks
395
+ Consider a charging task n ∈ Ωs
396
+ N in charging pool
397
+ s ∈ ΩS with a maximum deliverable power xn. In each
398
+ scenario ω ∈ Ωω, a charging task is characterized by the
399
+ tuple An,ω = (an,ω, dn,ω, En,ω). The tuple is composed
400
+
401
+ JOURNAL OF MODERN POWER SYSTEMS AND CLEAN ENERGY, VOL. XX, NO. XX, XXXX
402
+ 4
403
+ DSO
404
+ Charging pool
405
+ Charging task
406
+ Characterization
407
+ Historical data
408
+ Utility function
409
+ Flexibility area
410
+ SOPF
411
+ Day-ahead
412
+ Operation
413
+ Expected cost for
414
+ flexibility
415
+ Charging management
416
+ realization
417
+ Flexibility management
418
+ Actual cost for
419
+ flexibility
420
+ PSfrag replacements
421
+ us
422
+ An,ω
423
+ Zs
424
+ Rs,t
425
+ III-A
426
+ III-C
427
+ IV-A
428
+ IV-B
429
+ V-A
430
+ V-B
431
+ V-C
432
+ Fig. 1. Interaction between DSO, charging pools, and charging tasks.
433
+ by the task’s arrival time an,ω ∈ ΩT following a Poisson
434
+ distribution characterized by its expected value ηa
435
+ n [23]. Its
436
+ departure time dn,ω ∈ ΩT as a function of the charging
437
+ duration following an exponential distribution characterized
438
+ by the rate ηd
439
+ n [31]. And the required charging energy En,ω
440
+ is assumed to follow a uniform distribution over the closed
441
+ interval [e1, e2]:
442
+ an,ω ∼Pois(ηa
443
+ n), dn,ω ∼Exp(ηd
444
+ n) + an,ω, En,ω ∼U(e1, e2)
445
+ (1)
446
+ For feasibility we assume an,ω < dn,ω ≤ |ΩT|, and that
447
+ within the charging period, the energy required can be
448
+ delivered at full power, i.e., En,ω ≤
449
+
450
+ dn,ω − an,ω
451
+
452
+ xn.
453
+ It is worth mentioning that the effectiveness of the model
454
+ is independent of the probability distribution function used
455
+ to model the exogenous stochastic parameters. In fact, these
456
+ scenarios can also be mapped from real data [6] or can be
457
+ synthetically generated [9], [20], [32].
458
+ B. Charging pools
459
+ A charging pool s ∈ ΩS, gets an energy reserve for its
460
+ charging operation for a future planning horizon ΩT. The
461
+ energy reserve is composed of averaged power slots defined
462
+ before the actual realization ps,t ∀ t ∈ ΩT and eventual
463
+ power mismatches ρs,t,ω due to the uncertainty of the
464
+ realizations at each scenario. In other words, ps,t represents
465
+ the lower power bound of the charging pool at each period,
466
+ while ρs,t,ω represents any consumption above that bound.
467
+ Let xn,t,ω be the average power consumption allocated to
468
+ the charging task n ∈ Ωs
469
+ N during timeslot t at the realization
470
+ of scenario ω. This is a decision variable determined by the
471
+ charging pool. Then, the power consumption profile of a
472
+ charging pool s at each stochastic scenario is expressed as:
473
+ ps,t+ρs,t,ω =
474
+
475
+ n∈Ωs
476
+ N
477
+ xn,t,ω, ∀ s ∈ ΩS, t ∈ ΩT, ω ∈ Ωω (2)
478
+ which is limited by an upper bound ps,t representing the
479
+ power capacity of the charging pool’s connection, e.g,. at
480
+ the transformer
481
+ 0 ≤ ps,t + ρs,t,ω ≤ ps,t,
482
+ ∀ s ∈ ΩS, t ∈ ΩT, ω ∈ Ωω (3)
483
+ with ps,t, ρs,t,ω ≥ 0, while the power allocation of each
484
+ task is bounded by its maximum charging power xn:
485
+ 0 ≤ xn,t,ω ≤ xn, ∀ s ∈ ΩS, n ∈ Ωs
486
+ N, t ∈ ΩT, ω ∈ Ωω
487
+ : an,ω ≤ t ≤ dn,ω
488
+ (4)
489
+ and power cannot be allocated to task n outside the
490
+ task’s arrival and departure times; hence, xn,t,ω = 0 for
491
+ PSfrag replacementsus
492
+ αs,0
493
+ αs,1
494
+ αs,2
495
+ αs,3 Φs,ω
496
+ fs,2
497
+ fs,1
498
+ fs,3
499
+ us,1
500
+ us,2
501
+ Fig. 2.
502
+ Representation of a utility function for a charging pool s with
503
+ κ = 3.
504
+ t < an,ω or dn,ω < t. Note that vehicle to grid (V2G) can
505
+ be included by making the left-hand side of (4) smaller than
506
+ zero, for example, to allow peer-to-peer transactions inside
507
+ the charging pool [22].
508
+ The charging pools also offer flexibility which may imply
509
+ that some charging tasks end with a lower charged energy
510
+ than initially requested. This leads to energy not served at
511
+ task n in scenario ω, defined as φn,ω:
512
+ En,ω =
513
+ � �
514
+ t∈ΩT
515
+ xn,t,ω
516
+
517
+ +φn,ω,
518
+ ∀ s ∈ ΩS, n ∈ Ωs
519
+ N, ω ∈ Ωω.
520
+ (5)
521
+ For charging pool s, the total amount of energy not served
522
+ to its charging tasks is expressed as:
523
+ Φs,ω =
524
+
525
+ n∈Ωs
526
+ N
527
+ φn,ω,
528
+ ∀ s ∈ ΩS, ω ∈ Ωω. (6)
529
+ C. Discrete utility functions
530
+ The utility function us of a charging pool s ∈ ΩS ex-
531
+ presses the cost for flexibility as a function of the total
532
+ energy not served Φs,ω. It has been recognized that actual
533
+ utility functions can be highly nonlinear [5] and also not
534
+ necessarily convex. For this reason, a general formulation is
535
+ needed to approximate any realistic utility function. To this
536
+ end, we propose the use of discretized utility functions using
537
+ a semicontinuous convex combination formulation [33].
538
+ This formulation does not rely on the nature of the utility
539
+ function (monotonicity or convexity) to approximate it.
540
+ An example of a utility function us is shown in Fig. 2,
541
+ where the dashed line represents a continuous nonlinear
542
+ function, approximated by a linear piecewise function with
543
+ three segments.
544
+ In
545
+ this
546
+ work
547
+ we
548
+ consider
549
+ a
550
+ lower-semicontinuous
551
+ piecewise-linear function representing the utility function
552
+ of the charging pool s:
553
+ us =
554
+
555
+
556
+
557
+
558
+
559
+
560
+
561
+
562
+
563
+
564
+
565
+
566
+
567
+ fs,0 =0
568
+ Φs,ω = 0
569
+ fs,1 = hs,1Φs,ω+bs,1
570
+ 0 < Φs,ω ≤ αs,1
571
+ ...
572
+ fs,κ =hs,κΦs,ω+bs,κ
573
+ αs,κ−1 <Φs,ω ≤ αs,κ
574
+ (7)
575
+ where k ∈ Ωs
576
+ K = {0, . . . , κ} represents the set of break
577
+ points, while {hs,k, bs,k} and {αs,k−1, αs,k} ∀ k ≥ 1
578
+
579
+ JOURNAL OF MODERN POWER SYSTEMS AND CLEAN ENERGY, VOL. XX, NO. XX, XXXX
580
+ 5
581
+ denote the coefficients of the functions and their lower and
582
+ upper bounds, respectively. For the sake of simplicity, we
583
+ take us,k−1 := fs,k
584
+
585
+ αs,k−1
586
+
587
+ and us,k := fs,k
588
+
589
+ αs,k
590
+
591
+ as the
592
+ function of segment k : k ≥ 1 evaluated on its endpoints.
593
+ In order to satisfy (7), notice that us,0 = us,0 = αs,0 = 0.
594
+ It must be pointed out that (7) cannot be directly inte-
595
+ grated into a mathematical programming model. However,
596
+ by defining multipliers λs,k,ω λs,k,ω ≥ 0 ∀ k ∈ Ωs
597
+ K as the
598
+ weights at each two endpoints, and binary variables ys,k,ω,
599
+ the utility function can be expressed as a linear combination
600
+ of the cost of the endpoints by:
601
+ Zs,ω =
602
+
603
+ k∈Ωs
604
+ K: k<κ
605
+
606
+ λs,k,ωus,k + λs,k,ωus,k
607
+
608
+ + λs,κ,ωus,κ
609
+ (8)
610
+ where the energy not supplied is defined as:
611
+ Φs,ω =
612
+
613
+ k∈Ωs
614
+ K: k<κ
615
+
616
+ λs,k,ω+λs,k,ω
617
+
618
+ αs,k +λs,κ,ωαs,κ
619
+ ∀ s ∈ ΩS, ω ∈ Ωω
620
+ (9)
621
+ To make sure that (8) and (9) lead to a proper represen-
622
+ tation of the utility function, the following constraints are
623
+ added:
624
+ 1=
625
+
626
+ k∈Ωs
627
+ K: k<κ
628
+
629
+ λs,k,ω+λs,k,ω
630
+
631
+ +λs,κ,ω, ∀ s ∈ ΩS, ω ∈ Ωω (10)
632
+ λs,k,ω+λs,k+1,ω =ys,k+1,ω
633
+ ∀s ∈ ΩS, k ∈ Ωs
634
+ K, ω ∈ Ωω : k < κ
635
+ (11)
636
+
637
+ k∈Ωs
638
+ K:k≥1
639
+ ys,k,ω ≤ 1
640
+ ∀ s ∈ ΩS, ω ∈ Ωω (12)
641
+ ys,k,ω ∈ {0, 1}
642
+ ∀s ∈ ΩS, k ∈ Ωs
643
+ K, ω ∈ Ωω : k ≥ 1 (13)
644
+ Notice that (10) and (11) ensure that the multipliers are
645
+ only different from zero in the segment where ys,k,ω is
646
+ activated, while (12) and (13) guarantee that only one seg-
647
+ ment can be active. Hence, considering the utility functions,
648
+ the set of variables from the charging pools is defined as
649
+ Ycp = {Φs,ω, Zs,ω, λs,k,ω, λs,k,ω, ys,k,ω, xn,t,ω}.
650
+ D. Distribution Network Model
651
+ We consider a distribution network with radial topology
652
+ behind an electrical substation denoted by ES and a set of
653
+ branches Ωl ⊂ Ωb×Ωb. The operational state of the network
654
+ for a given scenario ω ∈ Ωω can be calculated based on
655
+ the power flow equations as given in constraints (14)–(19),
656
+ adapted from [34]. Hereby, the active power balance in the
657
+ network is ensured by:
658
+
659
+ mi∈Ωl
660
+ Pmi,t,ω −
661
+
662
+ ij∈Ωl
663
+
664
+ Pij,t,ω + RijIsqr
665
+ ij,t,ω
666
+
667
+ +P G
668
+ i,t,ω = PD
669
+ i,t+
670
+ +
671
+
672
+ s∈ΩS:s=i
673
+ ps,t + ρs,t,ω
674
+ ∀ i ∈ Ωb, t ∈ ΩT, ω ∈ Ωω
675
+ (14)
676
+ and the reactive power balance is given by:
677
+
678
+ mi∈Ωl
679
+ Qmi,t,ω −
680
+
681
+ ij∈Ωl
682
+
683
+ Qij,t,ω + XijIsqr
684
+ ij,t,ω
685
+
686
+ +QG
687
+ i,t,ω = QD
688
+ i,t,
689
+ ∀i ∈ Ωb, t ∈ ΩT, ω ∈ Ωω
690
+ (15)
691
+ where PD
692
+ i,t and QD
693
+ i,t denote the regular active and reac-
694
+ tive power demands at node i and timeslot t. Regular
695
+ power demands are assumed to be deterministic parameters
696
+ expressing the base load of all nodes disregarding EVs.
697
+ Doing this allows us to focus on the impact of EVs. Active
698
+ and reactive power flows to node i from its parent node
699
+ m are denoted by Pmi,t,ω, Qmi,t,ω, while Pij,t,ω, Qij,t,ω
700
+ are the active/reactive power flows from node i to its
701
+ descendant nodes j. For the purposes of this work, it is
702
+ also assumed that the charging stations operate at a unitary
703
+ power factor and no other controllable power sources,
704
+ such as distributed generators are available in the network,
705
+ hence P G
706
+ i,t,ω = QG
707
+ i,t,ω = 0, ∀i ∈ Ωb : i ̸= ES. Also, the volt-
708
+ age magnitude is assumed to be known for the substation
709
+ (V sqr
710
+ ES,t,ω = 1.0 pu). The voltage magnitude drop between
711
+ nodes i and j is represented by:
712
+ V sqr
713
+ j,t,ω = V sqr
714
+ i,t,ω − 2
715
+
716
+ RijPij,t,ω+XijQij,t,ω
717
+
718
+ +
719
+
720
+
721
+ R2
722
+ ij +X2
723
+ ij
724
+
725
+ Isqr
726
+ ij,t,ω,
727
+ ∀ij ∈ Ωl, t ∈ ΩT, ω ∈ Ωω
728
+ (16)
729
+ where V sqr
730
+ i,t,ω := V 2
731
+ i,t,ω and Isqr
732
+ ij,t,ω := I2
733
+ ij,t,ω are defined to
734
+ obtain a convex relaxation of the problem [35], while branch
735
+ power flows are obtained using the rotated second-order
736
+ cone constraint:
737
+ V sqr
738
+ j,t,ωIsqr
739
+ ij,t,ω ≥ P 2
740
+ ij,t,ω + Q2
741
+ ij,t,ω,
742
+ ∀ij ∈ Ωl, t ∈ ΩT, ω ∈ Ωω.
743
+ (17)
744
+ Furthermore, the upper and lower bounds for nodal
745
+ voltage and branch current magnitudes are enforced by
746
+ V2 ≤ V sqr
747
+ i,t,ω ≤ V
748
+ 2
749
+ ∀i ∈ Ωb, t ∈ ΩT, ω ∈ Ωω (18)
750
+ 0 ≤ Isqr
751
+ ij,t,ω ≤ I
752
+ 2
753
+ ij
754
+ ∀ij ∈ Ωl, t ∈ ΩT, ω ∈ Ωω (19)
755
+ Finally, the set of variables from the distribution network
756
+ is denoted by Ydn = {V sqr
757
+ i,t,ω, Isqr
758
+ ij,t,ω, Pij,t,ω, Qij,t,ω, ρs,t,ω}.
759
+ IV. PROPOSED SOPF MODEL AND ESTIMATION OF
760
+ FLEXIBILITY AREAS
761
+ A. Mathematical model
762
+ Using the mathematical formulations given in the pre-
763
+ vious section, the proposed SOPF is cast as a two-stage
764
+ stochastic optimization model, formulated as:
765
+ min
766
+ Y
767
+
768
+ ω∈Ωω
769
+ πω
770
+
771
+ s∈ΩS
772
+ Zs,ω −
773
+
774
+ t∈ΩT
775
+
776
+ s∈ΩS
777
+ cs,t ps,t
778
+ s.t.
779
+ (2)–(6), (8)–(19)
780
+ (20)
781
+ where the set Y = {Ycp ∪ Ydn ∪ ps,t} contains the decision
782
+ variables of the model, πω stands for the probability of
783
+ scenario ω, and cs,t represents the unit cost of electricity
784
+ at charging pool s at time t. The first-stage variables
785
+ (here-and-now) are ps,t, representing the decisions the DSO
786
+ takes in advance without knowing the actual realizations,
787
+ while the second-stage variables (wait-and-see) are Ycp
788
+ and Ydn, representing the expected stochastic behavior of
789
+ the system after fixing the first-stage variables. Note that
790
+ although DSOs are not allowed to retail electricity, they
791
+ may procure flexibility from the charging pools, which
792
+ act as local flexibility aggregators. Hence, the objective
793
+ function in (20) minimizes the expected value of the cost
794
+
795
+ JOURNAL OF MODERN POWER SYSTEMS AND CLEAN ENERGY, VOL. XX, NO. XX, XXXX
796
+ 6
797
+ 1
798
+ 2
799
+ 3
800
+ 4
801
+ 5
802
+ 6
803
+ 7
804
+ 8
805
+ ES
806
+ 9
807
+ � �
808
+ � �
809
+ � �
810
+ � �
811
+ � �
812
+
813
+
814
+
815
+ 
816
+ 
817
+  
818
+ 
819
+ 
820
+  
821
+  
822
+  
823
+  
824
+  
825
+  
826
+ !
827
+ " #
828
+ $ %
829
+ &
830
+ '
831
+ (
832
+ )
833
+ * +
834
+ , -
835
+ . /
836
+ 0
837
+ :
838
+ PSfrag replacements
839
+ Regular demand
840
+ Charging pool
841
+ Charging task
842
+ Fig. 3. 34-nodes test system including four charging pools.
843
+ for flexibility and maximizes the energy reserved for the
844
+ charging pools.
845
+ It must be pointed out that the SOPF in (20) is based on a
846
+ mixed-integer second-order cone programming (MISOCP)
847
+ problem, which is nonconvex in principle. However, if the
848
+ two sufficient conditions defined in [35] are satisfied, then
849
+ the relaxed continuous equivalent is convex and exact, and
850
+ a globally optimal solution is numerically reachable [36].
851
+ In the presented model, both conditions are satisfied since
852
+ the only power source in the system is the substation. Thus,
853
+ every node only consumes power, and the upper bounds of
854
+ the voltages are not binding as long as VES,t < V. More-
855
+ over, a numerical solution to (20) can be obtained using
856
+ the sample average approximation (SAA) technique under
857
+ different scenario generation methods, e.g., Monte Carlo
858
+ (MC), moment matching, or point estimate methods [18].
859
+ B. Estimation of the flexibility areas
860
+ Based on the optimal solution Y∗ of the SOPF in (20),
861
+ the empirical cumulative density function (eCDF) of ρ∗
862
+ s,t,ω
863
+ can be calculated, which is denoted as Fρs,t. Hence, the
864
+ flexibility area of a charging pool s at period t is calculated
865
+ as
866
+ Rs,t = p∗
867
+ s,t + F −1
868
+ ρs,t
869
+
870
+ βs,t
871
+
872
+ .
873
+ (21)
874
+ where βs,t ∈ [0, 1] represents a risk parameter defined by
875
+ the DSO for each charging pool at each time period. Notice
876
+ that the flexibility area Rs,t is composed of two terms,
877
+ the power reserve serving as a lower limit (p∗
878
+ s,t) and the
879
+ upper limit calculated for a specified quantile. It is worth
880
+ noting that the risk of violating the operational limits and
881
+ the flexibility area are directly proportional. This means
882
+ that βs,t = 0 represents the most conservative alternative
883
+ (lowest risk/smallest area), i.e., Rs,t = p∗
884
+ s,t, while the most
885
+ optimistic alternative (highest risk/biggest area) is given for
886
+ βs,t = 1, leading to Rs,t = p∗
887
+ s,t + max
888
+ ω {ρ∗
889
+ s,t,ω}.
890
+ Furthermore, from the perspective of the charging pools,
891
+ the flexibility area can be interpreted as an accepted oper-
892
+ ating region to fulfill its charging duties within which the
893
+ DSO expects to guarantee operational limits. Finally, notice
894
+ that Rs,t can only be obtained after solving (20) since it
895
+ depends on the optimal solution to uncertain realizations.
896
+ V. TEST SYSTEM AND SIMULATIONS
897
+ In this section, we evaluate the proposed stochastic flexi-
898
+ bility model. For the tests, we consider a radial distribution
899
+ system modified from [34] with 34 nodes (see Fig. 3), which
900
+ is an 11 kV network with a peak total nominal power
901
+ Fig. 4. Utility functions used by the charging pools.
902
+ of 1.86 MW, 1.23 Mvar, V = 0.95 pu, and V = 1.05 pu.
903
+ The maximum phase current at the substation transformer
904
+ connecting nodes 1-2 has been set to I1 2 = 88 A. Four
905
+ charging pools are placed at nodes 16, 20, 27, and 28, with
906
+ 30, 59, 36, and 16 charging tasks spread over the planning
907
+ horizon, respectively. The planning horizon is discretized
908
+ in 24 one-hour intervals, resembling a day-ahead planning
909
+ procedure.
910
+ The shape parameters ηa
911
+ n, ηd
912
+ n, characterizing the ar-
913
+ rival and duration times for the EV charging tasks,
914
+ were obtained considering the data in [9] for weekdays.
915
+ A Monte Carlo SAA with |Ωω| = 500 was used to
916
+ solve the two-stage SOPF (20), considering equiprobable
917
+ scenarios, i.e., πω
918
+ =
919
+ 1/ |Ωω|. The arrival and depar-
920
+ ture times for each scenario were calculated as in (1),
921
+ while the energy required at each scenario was cal-
922
+ culated as En,ω = min{U(e1, e2), xn
923
+
924
+ dn,ω − an,ω
925
+
926
+ } with
927
+ e1 = 0 kWh and e2 = 100 kWh. Without loss of general-
928
+ ity, the maximum power at each charging pool has been
929
+ set to ps,t
930
+ =
931
+ 200 kW, a fixed cost for electricity of
932
+ cs,t = 0.2 C/kWh was chosen, and the maximum power
933
+ at each charging task was set to xn = 22 kW. Finally,
934
+ the utility functions for the four charging pools have been
935
+ parameterized as in Fig. 4 with κ = 3.
936
+ A. Obtaining Flexibility Areas – Day-ahead planning
937
+ Two main tests were carried out to determine the flex-
938
+ ibility areas. The first one corresponds to the base case,
939
+ an instance with relaxed voltage and current magnitude
940
+ constraints and disabled flexibility from charging pools.
941
+ The base case corresponds to a situation where all required
942
+ energy from charging tasks is supplied as soon as possible,
943
+ regardless of the network status. The mean and standard
944
+ deviation of the minimum voltage magnitude at each time
945
+ period and the maximum branch current at each time period
946
+ for the base case are shown in Fig. 5. In Fig. 5 (a), periods
947
+ with undervoltage problems can be seen in around 8-10h
948
+ and 18-20h. Similarly, periods with overloading problems
949
+ are evident in Fig. 5 (b) around 18-20h. These results
950
+ indicate that the DSO might have a congestion problem
951
+ during the planning horizon and the need for flexibility.
952
+ The second test corresponds to the opposite case, i.e.,
953
+ operational constraints are enforced and flexibility from
954
+ charging pools is enabled. The resulting value of the ob-
955
+ jective function found was (-)C4,059.12 for the base case
956
+ and (-)C3,908.78 in the flexibility enabled case. Notice that
957
+ lower values indicate less energy not served. These results
958
+ represent a reduction of 3.7% in the total expected payment
959
+
960
+ us [e/kWh]
961
+ 0.4
962
+ cost
963
+ s = 16
964
+ Flexibility
965
+ 0.2
966
+ s= 20
967
+ s = 27
968
+ s = 28
969
+ 0.0
970
+ 1
971
+ .
972
+ 0
973
+ 25
974
+ 50
975
+ 75
976
+ 100
977
+ 125
978
+ Energy not served s [kWh]JOURNAL OF MODERN POWER SYSTEMS AND CLEAN ENERGY, VOL. XX, NO. XX, XXXX
979
+ 7
980
+ Fig. 5. Base case results for the planning horizon indicating congestion
981
+ problems. (a) Lowest voltage magnitude. (b) Highest current magnitude.
982
+ due to the flexibility cost in the latter case. These results
983
+ indicate that the charging pools (aggregators) would need
984
+ to pay for the energy not served to some charging tasks to
985
+ comply with the DSO’s expected flexibility requirements.
986
+ Consequently, it is expected that the DSO settles this
987
+ difference with the charging pools as part of a flexibility
988
+ market [29].
989
+ The flexibility areas proposed in Section IV-B allow the
990
+ DSO to estimate safe operation regions for the charging
991
+ pools. The first step to obtain the flexibility areas is cal-
992
+ culating the empirical eCDF of ρ∗
993
+ s,t,ω based on (21). The
994
+ eCDF of the four charging pools at s = {16, 20, 27, 28}
995
+ are shown in Fig. 6(a) for t = 14h and in Fig. 6(b)
996
+ for t = 19h. It can be seen that the expected power
997
+ areas chosen depend on the period, e.g., for β27 = 0.8
998
+ the operational powers need to be lower than or equal to
999
+ ρ27 = 49.61 kW at t = 14, but lower than or equal to
1000
+ ρ27 = 4.96 kW at t = 19. This difference is expected due
1001
+ to the network’s characteristics, i.e., there are some periods
1002
+ where the charging pools can have more room to supply
1003
+ their charging tasks without compromising the network’s
1004
+ operational limits than in other periods. The flexibility area,
1005
+ which finally will be communicated to the charging pools,
1006
+ has been calculated using (21) for both test cases. In (21),
1007
+ the flexibility area is composed by two terms, the power
1008
+ reserve serving as a lower limit (bold line) and the upper
1009
+ limit calculated for a specified quantile, as shown in Fig. 7
1010
+ for s = 20 and s = 27 using βs,t = 0.9. The load shifting
1011
+ is evident when comparing both test cases during the whole
1012
+ time horizon, especially during critical time intervals (8-10h
1013
+ and 18-20h).
1014
+ However, load shifting is not always sufficient to solve
1015
+ the congestion problems in this test case. Therefore, the
1016
+ charging pools must also procure flexibility from the charg-
1017
+ ing tasks in the form of energy not served to guarantee
1018
+ the operational limits of the DSO. The probability density
1019
+ Fig. 6. eCDFs of the operational power ρs,t,ω for (a) t = 14h and (b)
1020
+ t = 19h.
1021
+ b ;
1022
+ a<
1023
+ Fig. 7.
1024
+ Flexibility area for βs,t = 0.9 at charging pools s = 20 and
1025
+ s = 27. (a) Base case. (b) Flexibility enabled.
1026
+ Fig. 8.
1027
+ (a) PDFs of the total energy not served. (b) eCDFs of the total
1028
+ cost for flexibility.
1029
+ function (PDF) of the total energy not served at the four
1030
+ charging pools is displayed in Fig. 8 (a). Similarly, Fig. 8 (b)
1031
+ presents the eCDF of the cost for flexibility at each charging
1032
+ pool. It can be seen that the most procured charging pools
1033
+ are s = 20 and s = 27, which belong to the same
1034
+ network feeder (see Fig. 3). Interestingly, for this feeder,
1035
+ the most pronounced voltage drops occur; hence, the DSO
1036
+ must procure flexibility in these two charging pools to solve
1037
+ voltage problems. It is then evident that some charging
1038
+ pools can have an advantageous market position and might
1039
+ behave strategically depending on their location in the
1040
+ network (e.g., due to the radial topology of distribution
1041
+ networks). Therefore, these results reinforce the importance
1042
+ of truthful and fair market mechanisms in future flexibility
1043
+ markets [28], [29].
1044
+ Moreover, from Fig. 8 (b), the DSO can estimate the
1045
+ expected cost for flexibility at each charging pool. For
1046
+ example, using the 90th percentile for s = 27, means that
1047
+ the cost for flexibility at that charging pool is expected to
1048
+ be lower than or equal to C 48.97 in at least 90% of the
1049
+ expected scenarios.
1050
+ B. Validation of the Obtained Flexibility Areas with Prob-
1051
+ abilistic Power Flow – Operation
1052
+ The next step considers an operation scenario based on
1053
+ the flexibility areas identified for day-ahead in Sec. V-A.
1054
+ Two risk values are tested in this section to show the
1055
+ impact of βs,t on the safe operation of the system. We took
1056
+ arbitrarily risk values βs,t ∈ {0.57, 0.99} for the following
1057
+ analysis. A probabilistic power flow consisting of 5,000
1058
+ MC simulations is executed, considering the uncertainties
1059
+ of the aggregated consumed power at the charging pools. A
1060
+ sequential implementation of the power flow given in [37]
1061
+ has been used due to its convergence and computational
1062
+ characteristics. Uniform distributions are assumed to cope
1063
+ with any scenario combination within the flexibility area de-
1064
+ fined by the selected risk value of the form ∼ U(ps,t, Rs,t).
1065
+
1066
+ a)
1067
+ b)
1068
+ 1.0 -
1069
+ s = 16
1070
+ 0.8
1071
+ s = 20
1072
+ 0.8
1073
+ s = 27
1074
+ s = 28
1075
+ 0.6
1076
+ F
1077
+ CDI
1078
+ 0.4 -
1079
+ 0.4
1080
+ s = 16
1081
+ s = 20
1082
+ 0.2 -
1083
+ 0.2
1084
+ s = 27
1085
+ s = 28
1086
+ 0.0
1087
+ 0.0
1088
+ 0
1089
+ 10
1090
+ 20
1091
+ 30
1092
+ 0
1093
+ 20
1094
+ 40
1095
+ 60
1096
+ 80
1097
+ Energy not served s [kWh]
1098
+ Zs[@]a)
1099
+ b)
1100
+ 200
1101
+ 200
1102
+ s= 20
1103
+ s= 20
1104
+ MY
1105
+ S=27
1106
+ s=27
1107
+ 150
1108
+ 50
1109
+ 100
1110
+ 00
1111
+ Flexibility
1112
+ 50
1113
+ 50
1114
+ 0
1115
+ 0
1116
+ 5
1117
+ 10
1118
+ 15
1119
+ 20
1120
+ 25
1121
+ 5
1122
+ 10
1123
+ 15
1124
+ 0
1125
+ 0
1126
+ 20
1127
+ 25
1128
+ Time period [h]
1129
+ Time period [h]a)
1130
+ b)
1131
+ 1.0
1132
+ 1.0 -
1133
+ 0.8
1134
+ 0.8
1135
+ 0.6 -
1136
+ 0.6 -
1137
+ BS
1138
+ 0.4 -
1139
+ s = 16
1140
+ 0.4 -
1141
+ s = 16
1142
+ s = 20
1143
+ s= 20
1144
+ 0.2 -
1145
+ 0.2 -
1146
+ s= 27
1147
+ s = 27
1148
+ s = 28
1149
+ s = 28
1150
+ 0.0
1151
+ 0.0
1152
+ 0
1153
+ 20
1154
+ 40
1155
+ 60
1156
+ 80
1157
+ 100
1158
+ 0.0
1159
+ 2.5
1160
+ 5.0
1161
+ 7.5
1162
+ 10.0
1163
+ ps [kW]
1164
+ ps [kW]a)
1165
+ b)
1166
+ 90
1167
+ 0.970
1168
+ Mean
1169
+ ± Standard deviation
1170
+ A
1171
+ 0.965
1172
+ 80
1173
+ magnitude
1174
+ 0.960
1175
+ 70
1176
+ 0.955
1177
+ 60
1178
+ Mean
1179
+ 0.950
1180
+ ± Standard deviation
1181
+ 50
1182
+ 5
1183
+ 10
1184
+ 15
1185
+ 20
1186
+ 25
1187
+ 5
1188
+ 10
1189
+ 15
1190
+ 20
1191
+ 0
1192
+ 0
1193
+ 25
1194
+ Time period [h
1195
+ Time period lhJOURNAL OF MODERN POWER SYSTEMS AND CLEAN ENERGY, VOL. XX, NO. XX, XXXX
1196
+ 8
1197
+ =>
1198
+ ?@
1199
+ Fig. 9. CDF of operation results during . (a) Lowest voltage magnitude.
1200
+ (b) Highest current magnitude.
1201
+ Fig. 10. Operation results for the planning horizon using different flexi-
1202
+ bility areas. (a) Lowest voltage magnitude. (b) Highest current magnitude.
1203
+ It is assumed that the charging pools are able to control their
1204
+ consumption within the required flexibility area. Finally, it
1205
+ must be pointed out that voltage and current magnitude
1206
+ limits are not enforced in the power flow.
1207
+ At each MC simulation, the lowest voltage and the
1208
+ highest current magnitudes of the system per time period
1209
+ are stored. In Fig. 9(a), the average of the lowest volt-
1210
+ age magnitude among the buses using both risk values
1211
+ is the continuous line, while the shaded area indicates
1212
+ its maximum and minimum values. Similarly, Fig. 9(b)
1213
+ displays the average maximum branch current magnitude
1214
+ and its maximum and minimum values. For instance, at
1215
+ 20 h the average lowest voltage magnitude for βs,t = 0.57
1216
+ is 0.9514pu with a maximum of 0.9522 pu and a minimum
1217
+ of 0.9507pu. The maximum current magnitude at the same
1218
+ time has an average of 85.37 A, a maximum of 86.27 A and
1219
+ a minimum of 84.48 A. On the other hand, for βs,t = 0.99,
1220
+ the average lowest voltage magnitude is 0.9499 pu with
1221
+ a maximum of 0.9521pu and a minimum of 0.9479pu;
1222
+ while the current magnitude has an average of 87.43 A, a
1223
+ maximum of 89.95 A and a minimum of 84.69 A.
1224
+ The eCDFs of the minimum voltage magnitude consid-
1225
+ ering all periods is depicted in Fig. 10(a) for both risk
1226
+ values. It can be seen that around 88% of the scenarios
1227
+ violate the voltage limit for βs,t = 0.99, whereas for
1228
+ βs,t = 0.57 minimum voltages are always within the
1229
+ limit. The eCDFs of the maximum current magnitudes are
1230
+ displayed in Fig. 10(b) where a similar result is obtained
1231
+ with only 10% of the scenarios respecting the maximum
1232
+ current magnitude limit when βs,t = 0.99. These results
1233
+ indicate that the DSO must determine the required flexibility
1234
+ areas based on the risk it is willing to accept since there is a
1235
+ trade-off between the chosen risk value and the probability
1236
+ of violating the operational limits.
1237
+ Fig. 11. Total payment from charging pools for different risk values.
1238
+ C. Impact of Flexibility Areas on the Total Payment of the
1239
+ Charging Pools
1240
+ A final test is performed to assess the impact of the flex-
1241
+ ibility areas on the total payment received by the charging
1242
+ pools. We considered ten risk values used by the DSO (see
1243
+ Fig. 11 for the chosen values). The obtained flexibility areas
1244
+ for the different risk values were taken as power limiters
1245
+ for the charging pools, i.e., ps,t = Rs,t. On the other hand,
1246
+ the total payment, representing the revenue of the charging
1247
+ pools, was calculated as the difference between the cost
1248
+ for the energy delivered to their charging tasks and the
1249
+ cost for energy not served. Thus, positive total payment
1250
+ values are desired to guarantee revenue adequacy [38].
1251
+ We simulated 1,000 random scenarios for each risk value,
1252
+ following the same distributions as described earlier for
1253
+ the random variables. Voltage and current magnitude limits
1254
+ were enforced and the flexibility enabled.
1255
+ The obtained results are displayed in Fig. 11 using a box
1256
+ plot where the median, the interquartile range, and the 90%
1257
+ confidence intervals are depicted. Results for βs,t = 0.57
1258
+ show that the median is C -18.48, the interquartile range
1259
+ is limited by C 1,978.87 and C -1,635.18, and the confi-
1260
+ dence interval is C 4,021.13 and C -3,826.80; whereas for
1261
+ βs,t = 0.99 all these values increased considerably. Hence,
1262
+ it can be seen that the total payment for flexibility increases
1263
+ with the risk value, meaning there is a trade-off between
1264
+ the risk the DSO is willing to stand and the revenue of the
1265
+ charging pools. Interestingly, risk values βs,t < 0.57 might
1266
+ produce revenue inadequate situations, which encourages
1267
+ the use of proper compensation mechanisms for energy
1268
+ not served [32]. Consequently, it is expected that the DSO
1269
+ settles this difference with the charging pools as part of a
1270
+ flexibility market [29].
1271
+ VI. CONCLUSIONS
1272
+ In this paper, we proposed a stochastic AC-OPF for the
1273
+ flexibility management of charging pools in distribution
1274
+ networks introducing the concept of flexibility areas. The
1275
+ SOPF considers discrete utility functions for charging pools
1276
+ as a compensation mechanism for eventual energy not
1277
+ served to their charging tasks. The utility functions are
1278
+ presented using a general piecewise-linear formulation to
1279
+ deal with convex and nonconvex prosumer preferences. The
1280
+ aim is to minimize the expected cost for energy not served
1281
+ while satisfying operational constraints. An application of
1282
+ the proposed SOPF has been described, where a DSO
1283
+ specifies the flexibility area to each charging pool in a
1284
+ day-ahead time frame under uncertainty. This methodology
1285
+ allows estimating probable costs for flexibility requirements
1286
+
1287
+ 5000
1288
+ Median
1289
+ 2500
1290
+ payment
1291
+ Interquartile range
1292
+ Confidence interval
1293
+ 0
1294
+ Total
1295
+ 2500
1296
+ -5000
1297
+ 0.05
1298
+ 0.15
1299
+ 0.26
1300
+ 0.36
1301
+ 0.47
1302
+ 0.57
1303
+ 0.68
1304
+ 0.78
1305
+ 0.89
1306
+ 0.99
1307
+ Risk value βs,ta)
1308
+ b)
1309
+ 1.0 -
1310
+ 1.0 -
1311
+ 0.8
1312
+ 0.8-
1313
+ β = 0.57
1314
+ 0.6 -
1315
+ 0.6 -
1316
+ CDF
1317
+ D
1318
+ β = 0.99
1319
+ C
1320
+ 0.4 -
1321
+ 0.4
1322
+ 0.2 -
1323
+ 0.2 -
1324
+ β = 0.57
1325
+ β = 0.99
1326
+ 0.0
1327
+ 0.0 -
1328
+ 0.948
1329
+ 0.949
1330
+ 0.950
1331
+ 88.0
1332
+ 88.5
1333
+ 89.0
1334
+ 89.5
1335
+ Voltage magnitude [pu]
1336
+ Current magnitude [A]a)
1337
+ b)
1338
+ 90
1339
+ Mean - β = 0.57
1340
+ max/min - β = 0.57
1341
+ 0.970
1342
+ Mean - β = 0.99
1343
+ 80
1344
+ max/min - β = 0.99
1345
+ 0.965
1346
+ 70
1347
+ 0.960
1348
+ 60
1349
+ 0.955
1350
+ Mean - β= 0.57
1351
+ max/min - β = 0.57
1352
+ 0.950
1353
+ 50
1354
+ Mean - β = 0.99
1355
+ max/min - β = 0.99
1356
+ 0
1357
+ 5
1358
+ 10
1359
+ 15
1360
+ 20
1361
+ 25
1362
+ 0
1363
+ 5
1364
+ 10
1365
+ 15
1366
+ 20
1367
+ 25
1368
+ Time period [h]
1369
+ Time period [h]JOURNAL OF MODERN POWER SYSTEMS AND CLEAN ENERGY, VOL. XX, NO. XX, XXXX
1370
+ 9
1371
+ and gives the charging pools more freedom to manage
1372
+ the EV load. Results show that a safe flexibility area for
1373
+ charging pools can be used to address DSO’s congestion
1374
+ problems, either by load shifting or managing the energy not
1375
+ served. Moreover, the DSO is able to calculate the flexibility
1376
+ area as a function of a risk parameter βs and estimate
1377
+ probable costs for flexibility requirements. Results showed
1378
+ a trade-off between the risk the DSO is willing to stand
1379
+ and the revenue of the charging pools. At the same time,
1380
+ charging pools and tasks perceive a total energy payment
1381
+ reduction as compensation for the energy not served, which
1382
+ might stimulate charging pool operators and EV users to
1383
+ offer flexibility services (e.g., in a local flexibility market).
1384
+ Future work has to analyze the impact of the proposed
1385
+ flexibility area considering V2G enabled EVs and reactive
1386
+ power compensation capabilities.
1387
+ REFERENCES
1388
+ [1] N. B. Arias, S. Hashemi, P. B. Andersen, C. Træholt, and R. Romero,
1389
+ “Distribution system services provided by electric vehicles: recent
1390
+ status, challenges, and future prospects,” IEEE Trans. Intelligent
1391
+ Transport. Syst., vol. 20, no. 12, pp. 4277–4296, Jan 2019.
1392
+ [2] G. Hoogsteen, A. Molderink, J. L. Hurink, G. J. Smit, B. Kootstra,
1393
+ and F. Schuring, “Charging electric vehicles, baking pizzas, and
1394
+ melting a fuse in Lochem,” CIRED-Open Access Proc. J., vol. 2017,
1395
+ no. 1, pp. 1629–1633, Jun. 2017.
1396
+ [3] J. Silva, J. Sumaili, R. J. Bessa, L. Seca, M. A. Matos, V. Miranda,
1397
+ M. Caujolle, B. Goncer, and M. Sebastian-Viana, “Estimating the
1398
+ active and reactive power flexibility area at the TSO-DSO interface,”
1399
+ IEEE Transactions on Power Systems, vol. 33, no. 5, pp. 4741–4750,
1400
+ Feb. 2018.
1401
+ [4] S. Limmer and T. Rodemann, “Peak load reduction through dynamic
1402
+ pricing for electric vehicle charging,” Int. J. Elect. Power Energy
1403
+ Syst., vol. 113, pp. 117–128, Dec. 2019.
1404
+ [5] C. Ziras, T. Sousa, and P. Pinson, “What do prosumer marginal utility
1405
+ functions look like? derivation and analysis,” IEEE Trans. Power
1406
+ Syst., vol. 36, no. 5, pp. 4322–4330, Sept. 2021.
1407
+ [6] L. Calearo, A. Thingvad, K. Suzuki, and M. Marinelli, “Grid loading
1408
+ due to EV charging profiles based on pseudo-real driving pattern and
1409
+ user behavior,” IEEE Trans. Transport. Electrific., vol. 5, no. 3, pp.
1410
+ 683–694, Sept. 2019.
1411
+ [7] K. Knezovi´c, M. Marinelli, A. Zecchino, P. B. Andersen, and C. Trae-
1412
+ holt, “Supporting involvement of electric vehicles in distribution
1413
+ grids: Lowering the barriers for a proactive integration,” Energy, vol.
1414
+ 134, pp. 458–468, Sept. 2017.
1415
+ [8] K. Valogianni, W. Ketter, J. Collins, and D. Zhdanov, “Sustainable
1416
+ electric vehicle charging using adaptive pricing,” Prod. Oper. Manag.,
1417
+ vol. 29, no. 6, pp. 1550–1572, Mar. 2020.
1418
+ [9] M. Ca˜nigueral and J. Mel´endez, “Flexibility management of electric
1419
+ vehicles based on user profiles: The Arnhem case study,” Int. J. Elect.
1420
+ Power Energy Syst., vol. 133, p. 107195, Dec. 2021.
1421
+ [10] G. Arag´on, E. G¨umr¨ukc¨u, V. Pandian, and O. Werner-Kyt¨ol¨a, “Co-
1422
+ operative control of charging stations for an EV park with stochastic
1423
+ dynamic programming,” in IECON 2019 - 45th Annual Conf. of the
1424
+ IEEE Ind. Electron. Society, vol. 1, Lisbon, Portugal, Oct. 2019, pp.
1425
+ 6649–6654.
1426
+ [11] R. Xie, W. Wei, Q. Wu, T. Ding, and S. Mei, “Optimal service pricing
1427
+ and charging scheduling of an electric vehicle sharing system,” IEEE
1428
+ Transactions on Vehicular Technology, vol. 69, no. 1, pp. 78–89, Jan.
1429
+ 2020.
1430
+ [12] H. Nosair and F. Bouffard, “Flexibility envelopes for power system
1431
+ operational planning,” IEEE Transactions on Sustainable Energy,
1432
+ vol. 6, no. 3, pp. 800–809, Jul. 2015.
1433
+ [13] J. Gasser, H. Cai, S. Karagiannopoulos, P. Heer, and G. Hug,
1434
+ “Predictive energy management of residential buildings while self-
1435
+ reporting flexibility envelope,” Applied Energy, vol. 288, p. 116653,
1436
+ Apr. 2021.
1437
+ [14] H. Nagpal, I.-I. Avramidis, F. Capitanescu, and A. G. Madureira,
1438
+ “Local energy communities in service of sustainability and grid
1439
+ flexibility provision: Hierarchical management of shared energy
1440
+ storage,” IEEE Transactions on Sustainable Energy, Jul. 2022.
1441
+ [15] H. Fr¨uh, S. M¨uller, D. Contreras, K. Rudion, A. von Haken, and
1442
+ B. Surmann, “Coordinated vertical provision of flexibility from
1443
+ distribution systems,” IEEE Transactions on Power Systems, 2022.
1444
+ [16] M. Kalantar-Neyestanaki and R. Cherkaoui, “Risk-aware active
1445
+ power flexibility allocation from TSO–DSO interconnections: The
1446
+ Switzerland’s transmission network,” IEEE Systems Journal, pp. 1–
1447
+ 11, 2022.
1448
+ [17] D. A. Contreras and K. Rudion, “Computing the feasible operating
1449
+ region of active distribution networks: Comparison and validation
1450
+ of random sampling and optimal power flow based methods,” IET
1451
+ Generation, Transmission & Distribution, vol. 15, no. 10, pp. 1600–
1452
+ 1612, Jan. 2021.
1453
+ [18] J. S. Giraldo, J. C. L´opez, J. A. Castrillon, M. J. Rider, and
1454
+ C. A. Castro, “Probabilistic OPF model for unbalanced three-phase
1455
+ electrical distribution systems considering robust constraints,” IEEE
1456
+ Trans. Power Syst., vol. 34, no. 5, pp. 3443–3454, Sept. 2019.
1457
+ [19] M. I. Alizadeh, M. Usman, and F. Capitanescu, “Toward stochastic
1458
+ multi-period AC security constrained optimal power flow to procure
1459
+ flexibility for managing congestion and voltages,” in 2021 Int. Conf.
1460
+ Smart Energy Syst. and Technol. (SEST), Vaasa, Finland, 2021.
1461
+ [20] F. Wu and R. Sioshansi, “A two-stage stochastic optimization model
1462
+ for scheduling electric vehicle charging loads to relieve distribution-
1463
+ system constraints,” Transport. Res. Part B: Method., vol. 102, pp.
1464
+ 55–82, 2017.
1465
+ [21] W. Sun, F. Neumann, and G. P. Harrison, “Robust scheduling of elec-
1466
+ tric vehicle charging in LV distribution networks under uncertainty,”
1467
+ IEEE Trans. Ind. Appl., vol. 56, no. 5, pp. 5785–5795, 2020.
1468
+ [22] N. B. Arias, J. C. L´opez, M. J. Rider, and J. F. Franco, “Adaptive
1469
+ robust linear programming model for the charging scheduling and re-
1470
+ active power control of EV fleets,” in 2021 IEEE Madrid PowerTech,
1471
+ 2021, pp. 1–6.
1472
+ [23] A. Aveklouris, M. Vlasiou, and B. Zwart, “A stochastic resource-
1473
+ sharing network for electric vehicle charging,” IEEE Trans. Control
1474
+ of Network Syst., vol. 6, no. 3, pp. 1050–1061, 2019.
1475
+ [24] N. Sadeghianpourhamami, N. Refa, M. Strobbe, and C. Develder,
1476
+ “Quantitive analysis of electric vehicle flexibility: A data-driven
1477
+ approach,” Int. J. Elect. Power Energy Syst., vol. 95, pp. 451–462,
1478
+ 2018.
1479
+ [25] A. Mathioudaki, G. Tsaousoglou, E. Varvarigos, and D. Fotakis,
1480
+ “Efficient online scheduling of electric vehicle charging using a
1481
+ service-price menu,” in 2021 Int. Conf. Smart Energy Syst. and
1482
+ Technol. (SEST).
1483
+ IEEE, 2021, pp. 1–6.
1484
+ [26] T. Morstyn, A. Teytelboym, and M. D. McCulloch, “Designing
1485
+ decentralized markets for distribution system flexibility,” IEEE Trans.
1486
+ Power Syst., vol. 34, no. 3, pp. 2128–2139, 2018.
1487
+ [27] A. Paudel, L. Sampath, J. Yang, and H. B. Gooi, “Peer-to-peer energy
1488
+ trading in smart grid considering power losses and network fees,”
1489
+ IEEE Trans. Smart Grid, vol. 11, no. 6, pp. 4727–4737, 2020.
1490
+ [28] G. Tsaousoglou, J. S. Giraldo, P. Pinson, and N. G. Paterakis,
1491
+ “Mechanism design for fair and efficient DSO flexibility markets,”
1492
+ IEEE Trans. Smart Grid, vol. 12, no. 3, pp. 2249–2260, 2021.
1493
+ [29] G. Tsaousoglou, J. S. Giraldo, and N. G. Paterakis, “Market mech-
1494
+ anisms for local electricity markets: A review of models, solution
1495
+ concepts and algorithmic techniques,” Renew. Sustain. Energy Rev.,
1496
+ vol. 156, p. 111890, 2022.
1497
+ [30] M. E. T. Gerards, H. A. Toersche, G. Hoogsteen, T. van der Klauw,
1498
+ J. L. Hurink, and G. J. M. Smit, “Demand side management using
1499
+ profile steering,” in 2015 IEEE Eindhoven PowerTech, 2015, pp. 1–6.
1500
+ [31] K. Qian, C. Zhou, M. Allan, and Y. Yuan, “Modeling of load
1501
+ demand due to ev battery charging in distribution systems,” IEEE
1502
+ Transactions on Power Systems, vol. 26, no. 2, pp. 802–810, 2011.
1503
+ [32] J. S. Giraldo, N. B. Arias, E. M. S. Duque, G. Hoogsteen,
1504
+ and J. L. Hurink, “A compensation mechanism for EV flexibility
1505
+ services using discrete utility functions,” 2022. [Online]. Available:
1506
+ https://arxiv.org/abs/2205.15737
1507
+ [33] J. P. Vielma, A. B. Keha, and G. L. Nemhauser, “Nonconvex,
1508
+ lower semicontinuous piecewise linear optimization,” Discrete Op-
1509
+ tim., vol. 5, no. 2, pp. 467–488, 2008.
1510
+ [34] J. S. Giraldo, J. A. Castrillon, and C. A. Castro, “Energy management
1511
+ of isolated microgrids using mixed-integer second-order cone pro-
1512
+ gramming,” in 2017 IEEE Power Energy Society General Meeting,
1513
+ 2017, pp. 1–5.
1514
+ [35] L. Gan, N. Li, U. Topcu, and S. H. Low, “Exact convex relaxation
1515
+ of optimal power flow in radial networks,” IEEE Trans. Automatic
1516
+ Control, vol. 60, no. 1, pp. 72–87, 2014.
1517
+ [36] P. Bonami, L. T. Biegler, A. R. Conn, G. Cornu´ejols, I. E. Grossmann,
1518
+ C. D. Laird, J. Lee, A. Lodi, F. Margot, N. Sawaya et al., “An al-
1519
+ gorithmic framework for convex mixed integer nonlinear programs,”
1520
+ Discrete Optim., vol. 5, no. 2, pp. 186–204, 2008.
1521
+ [37] J. S. Giraldo, O. D. Montoya, P. P. Vergara, and F. Milano, “A fixed-
1522
+ point current injection power flow for electric distribution systems
1523
+ using Laurent series,” Electric Power Systems Research, vol. 211, p.
1524
+ 108326, 2022.
1525
+
1526
+ JOURNAL OF MODERN POWER SYSTEMS AND CLEAN ENERGY, VOL. XX, NO. XX, XXXX
1527
+ 10
1528
+ [38] H. Ming, A. A. Thatte, and L. Xie, “Revenue inadequacy with
1529
+ demand response providers: a critical appraisal,” IEEE Transactions
1530
+ on Smart Grid, vol. 10, no. 3, pp. 3282–3291, 2018.
1531
+ Juan S. Giraldo received the B.Sc. degree in electrical engineering
1532
+ from the Universidad Tecnol´ogica de Pereira, Pereira, Colombia, in 2012,
1533
+ and the M.Sc. and Ph.D. degrees in electrical engineering from the
1534
+ University of Campinas (UNICAMP), Campinas, Brazil, in 2015 and 2019,
1535
+ respectively. From Oct. 2019 to May 2021 he was a Postdoctoral Fellow
1536
+ at the Department of Electrical Engineering, Eindhoven University of
1537
+ Technology, Eindhoven, The Netherlands (NL). Later, from June 2021 to
1538
+ Aug. 2022 he was a postdoc with the Mathematics of Operations Research
1539
+ group at the University of Twente, Enschede, NL. He is currently a
1540
+ Researcher with the Energy Transition Studies group with the Netherlands
1541
+ Organisation for Applied Scientific Research (TNO), Amsterdam, NL. His
1542
+ current research interests include the optimization, planning, and control of
1543
+ energy systems, energy markets, and machine learning applied to energy
1544
+ systems.
1545
+ Nataly Ba˜nol Arias received the B.Sc. degree in Production Engineering
1546
+ from the Universidad Tecnol´ogica de Pereira, Colombia in 2012, and
1547
+ the M.Sc. and Ph.D. degree in Electrical Engineering from the S˜ao
1548
+ Paulo State University (UNESP), Ilha Solteira, Brazil, in 2015 and 2019,
1549
+ respectively. Currently, she is a researcher at the University of Twente,
1550
+ The Netherlands. Her current research interests include the development
1551
+ of methodologies for the optimization, planning, and control of modern
1552
+ distribution systems including electric vehicles and renewable energy
1553
+ sources, energy management systems, and flexibility markets.
1554
+ Pedro P. Vergara was born in Barranquilla, Colombia in 1990. He
1555
+ received the B.Sc. degree (with honors) in electronic engineering from the
1556
+ Universidad Industrial de Santander, Bucaramanga, Colombia, in 2012,
1557
+ and the M.Sc. degree in electrical engineering from the University of
1558
+ Campinas, UNICAMP, Campinas, Brazil, in 2015. In 2019, he received
1559
+ his Ph.D. degree from the University of Campinas, UNICAMP, Brazil, and
1560
+ the University of Southern Denmark, SDU, Denmark, funded by the Sao
1561
+ Paulo Research Foundation (FAPESP). In 2019, he joined the Eindhoven
1562
+ University of Technology, TU/e, in The Netherlands as a Postdoctoral
1563
+ Researcher. In 2020, he was appointed as Assistant Professor at the
1564
+ Intelligent Electrical Power Grids (IEPG) group at Delft University of
1565
+ Technology, also in The Netherlands. His main research interests include
1566
+ the development of methodologies for control, planning, and operation of
1567
+ electrical distribution systems with high penetration of low-carbon energy
1568
+ resources (e.g, electric vehicles, PV systems, electric heat pumps) using
1569
+ optimization and machine learning approaches. Dr. Vergara has received
1570
+ the Best Presentation Award at the Summer Optimization School in 2018
1571
+ organized by the Technical University of Denmark (DTU) and the Best
1572
+ Paper Award at the 3rd IEEE International Conference on Smart Energy
1573
+ Systems and Technologies (SEST), in Turkey, in 2020.
1574
+ Maria Vlasiou is a Professor at the University of Twente, The Netherlands,
1575
+ an Associate Professor at the Eindhoven University of Technology (TU/e),
1576
+ and Research Fellow of the European research institute EURANDOM.
1577
+ She received her B.Sc. (2002, Hons.) and Ph.D. (2006) from the Aristotle
1578
+ University of Thessaloniki and TU/e, respectively. In 2006, she moved
1579
+ to the H. Milton Stewart School of Industrial and Systems Engineering,
1580
+ at the Georgia Institute of Technology, where she first worked as a
1581
+ Research Engineer and later as a Postdoctoral Fellow. Her research interests
1582
+ centre on stochastic processes and stochastic operations research. Her
1583
+ research focuses on the performance of stochastic processing networks
1584
+ with layered architectures and on perturbation analysis for heavy-tailed
1585
+ risk models. Other interests include L´evy processes, large deviations for
1586
+ non-monotone stochastic recursions, and proportional fairness in heavy
1587
+ traffic for bandwidth-sharing networks. She has supervised six PhD theses
1588
+ on these topics. Prof. Vlasiou has been invited to more than 20 foreign
1589
+ universities for collaboration and seminars. She has been associate editor
1590
+ in four journals and has refereed for about 45 international journals,
1591
+ conferences, and national science foundations. Prof. Vlasiou’s research so
1592
+ far has been funded by grants from more than 10 science foundations,
1593
+ universities, societies, and organisations. She is the co-author of more than
1594
+ 50 refereed papers, the co-recipient of the best paper award in ICORES
1595
+ 2013, the Marcel Neuts student paper award in MAM8, a prize at the 8th
1596
+ conference in Actuarial Science, and the recent winner of the INFORMS
1597
+ UPS G. Smith award.
1598
+ Gerwin Hoogsteen received the PhD degree from the University of Twente
1599
+ in 2017 with his thesis “A Cyber-Physical Systems Perspective on Decen-
1600
+ tralized Energy Management”. He is currently employed as permanent
1601
+ researcher in the field of smart grids within the Computer Architecture for
1602
+ Embedded Systems chair, with a focus on applying theoretical research in
1603
+ field-tests. His research interest is in energy management for smart grids,
1604
+ and in particular where it concerns multi-disciplinary research and cyber-
1605
+ physical systems. Current research directions include the use of machine
1606
+ learning and artificial intelligence in smart grids, distributed coordination,
1607
+ and cyber-security of smart grids. Hoogsteen is the founder and maintainer
1608
+ of the DEMKit and ALPG software.
1609
+ Johann Hurink received the Ph.D. degree from University of Osnabr¨uck
1610
+ (Germany) in 1992 for a thesis on a scheduling problem occurring in
1611
+ the area of public transport. Since 2009 he is a full professor at the
1612
+ University of Twente and since 2020 also the Director of the 4TU Applied
1613
+ Mathematics Institute (AMI) in The Netherlands. He has published more
1614
+ than 190 refereed papers in international journals and conferences and has
1615
+ been involved in many European and national research projects. Current
1616
+ research mainly focuses on optimization and control problems for energy
1617
+ management and smart grids.
1618
+
HNAyT4oBgHgl3EQfrvkK/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
KtAyT4oBgHgl3EQfsfmL/content/tmp_files/2301.00578v1.pdf.txt ADDED
@@ -0,0 +1,1121 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Draft version January 3, 2023
2
+ Typeset using LATEX twocolumn style in AASTeX631
3
+ PHANGS-JWST First Results: Variations in PAH Fraction as a Function of ISM Phase and
4
+ Metallicity
5
+ J´er´emy Chastenet
6
+ ,1 Jessica Sutter
7
+ ,2 Karin Sandstrom
8
+ ,2 Francesco Belfiore
9
+ ,3 Oleg V. Egorov
10
+ ,4
11
+ Kirsten L. Larson
12
+ ,5 Adam K. Leroy
13
+ ,6 Daizhong Liu
14
+ ,7 Erik Rosolowsky
15
+ ,8 David A. Thilker
16
+ ,9
17
+ Elizabeth J. Watkins
18
+ ,4 Thomas G. Williams
19
+ ,10, 11 Ashley T. Barnes
20
+ ,12 Frank Bigiel
21
+ ,13
22
+ M´ed´eric Boquien
23
+ ,14 M´elanie Chevance
24
+ ,15, 16 I-Da Chiang (江宜達)
25
+ ,17 Daniel A. Dale
26
+ ,18
27
+ J. M. Diederik Kruijssen
28
+ ,16 Eric Emsellem
29
+ ,19, 20 Kathryn Grasha
30
+ ,21, 22 Brent Groves
31
+ ,23
32
+ Hamid Hassani
33
+ ,8 Annie Hughes
34
+ ,24 Kathryn Kreckel
35
+ ,4 Sharon E. Meidt
36
+ ,1 Ryan J. Rickards Vaught
37
+ ,2
38
+ Amy Sardone
39
+ ,25, 26 and Eva Schinnerer
40
+ 11
41
+ 1Sterrenkundig Observatorium, Ghent University, Krijgslaan 281-S9, 9000 Gent, Belgium
42
+ 2Center for Astrophysics and Space Sciences, Department of Physics, University of California, San Diego
43
+ 9500 Gilman Drive, La Jolla, CA 92093, USA
44
+ 3INAF — Arcetri Astrophysical Observatory, Largo E. Fermi 5, I-50125, Florence, Italy
45
+ 4Astronomisches Rechen-Institut, Zentrum f¨ur Astronomie der Universit¨at Heidelberg, M¨onchhofstraße 12-14, 69120 Heidelberg, Germany
46
+ 5AURA for the European Space Agency (ESA), Space Telescope Science Institute, 3700 San Martin Drive, Baltimore, MD 21218, USA
47
+ 6Department of Astronomy, The Ohio State University, 140 West 18th Avenue, Columbus, Ohio 43210, USA
48
+ 7Max-Planck-Institut f¨ur Extraterrestrische Physik (MPE), Giessenbachstr. 1, D-85748 Garching, Germany
49
+ 8Department of Physics, University of Alberta, Edmonton, Alberta, T6G 2E1, Canada
50
+ 9Department of Physics and Astronomy, The Johns Hopkins University, Baltimore, MD 21218, USA
51
+ 10Sub-department of Astrophysics, Department of Physics, University of Oxford, Keble Road, Oxford OX1 3RH, UK
52
+ 11Max-Planck-Institut f¨ur Astronomie, K¨onigstuhl 17, D-69117, Heidelberg, Germany
53
+ 12Argelander-Institut f¨ur Astronomie, Universit¨at Bonn, Auf dem H¨ugel 71, 53121, Bonn, Germany
54
+ 13Argelander-Institut f¨ur Astronomie, Universit¨at Bonn, Auf dem H¨ugel 71, 53121 Bonn, Germany
55
+ 14Centro de Astronom´ıa (CITEVA), Universidad de Antofagasta, Avenida Angamos 601, Antofagasta, Chile
56
+ 15Institut f¨ur Theoretische Astrophysik, Zentrum f¨ur Astronomie der Universit¨at Heidelberg,
57
+ Albert-Ueberle-Strasse 2, 69120 Heidelberg, Germany
58
+ 16Cosmic Origins Of Life (COOL) Research DAO, coolresearch.io
59
+ 17Institute of Astronomy and Astrophysics, Academia Sinica, No. 1, Sec. 4, Roosevelt Road, Taipei 10617, Taiwan
60
+ 18Department of Physics and Astronomy, University of Wyoming, Laramie, WY 82071, USA
61
+ 19European Southern Observatory, Karl-Schwarzschild-Straße 2, 85748 Garching, Germany
62
+ 20Univ Lyon, Univ Lyon1, ENS de Lyon, CNRS, Centre de Recherche Astrophysique de Lyon UMR5574, F-69230 Saint-Genis-Laval
63
+ France
64
+ 21Research School of Astronomy and Astrophysics, Australian National University, Canberra, ACT 2611, Australia
65
+ 22ARC Centre of Excellence for All Sky Astrophysics in 3 Dimensions (ASTRO 3D), Australia
66
+ 23International Centre for Radio Astronomy Research, University of Western Australia, 7 Fairway, Crawley, 6009 WA, Australia
67
+ 24IRAP, Universit´e de Toulouse, CNRS, CNES, UPS, (Toulouse), France
68
+ 25Department of Astronomy, The Ohio State University, 140 West 18th Avenue, Columbus, OH 43210, USA
69
+ 26Center for Cosmology and Astroparticle Physics, 191 West Woodruff Avenue, Columbus, OH 43210, USA
70
+ ABSTRACT
71
+ We present maps tracing the fraction of dust in the form of polycyclic aromatic hydrocarbons
72
+ (PAHs) in IC 5332, NGC 628, NGC 1365, and NGC 7496 from JWST/MIRI observations.
73
+ We
74
+ trace the PAH fraction by combining the F770W (7.7 µm) and F1130W (11.3 µm) filters to track
75
+ ionized and neutral PAH emission, respectively, and comparing the PAH emission to F2100W which
76
+ traces small, hot dust grains. We find average RPAH = (F770W + F1130W)/F2100W values of 3.3,
77
+ 4.7, 5.1, and 3.6 in IC 5332, NGC 628, NGC 1365, and NGC 7496, respectively.
78
+ We find that
79
+ H II regions traced by MUSE Hα show a systematically low PAH fraction. The PAH fraction re-
80
+ mains relatively constant across other galactic environments, with slight variations. We use CO+Hi
81
+ +Hα to trace the interstellar gas phase and find that the PAH fraction decreases above a value of
82
+ IHα/ΣHI+H2
83
+ ∼ 1037.5 erg s−1 kpc−2 (M⊙ pc−2)−1, in all four galaxies. Radial profiles also show a
84
+ arXiv:2301.00578v1 [astro-ph.GA] 2 Jan 2023
85
+
86
+ ID2
87
+ Chastenet, Sutter, Sandstrom et al.
88
+ decreasing PAH fraction with increasing radius, correlated with lower metallicity, in line with previous
89
+ results showing a strong metallicity dependence to the PAH fraction. Our results suggest that the
90
+ process of PAH destruction in ionized gas operates similarly across the four targets.
91
+ Keywords: Dust physics (2229), Interstellar dust (836), Polycyclic aromatic hydrocarbons (1280)
92
+ 1. INTRODUCTION
93
+ The mid-infrared (mid-IR) emission features at 3.3,
94
+ 6.2, 7.7, 8.6, 11.3, 12.6, and 17 µm are characteristic
95
+ of the aromatic content of interstellar dust (see reviews
96
+ from Draine 2003; Tielens 2008; Li 2020). The carriers
97
+ of these features are often referred to as polycyclic aro-
98
+ matic hydrocarbons (PAHs; Allamandola et al. 1985),
99
+ and have been included as an extension of carbonaceous
100
+ grains to small sizes in several physical dust models (e.g.
101
+ Desert et al. 1990; Zubko et al. 2004; Draine & Li 2007;
102
+ Galliano et al. 2008), or as an aromatic-rich mantle cov-
103
+ ering aliphatic grains (e.g. Jones et al. 2017, and refer-
104
+ ence therein). In the rest of this letter, we will refer to
105
+ the carriers of mid-IR features as PAHs.
106
+ The (collective) brightness of these features with re-
107
+ spect to a dust continuum emission can be used as a
108
+ tracer of the fraction of dust in the form of PAHs. The
109
+ mass fraction of PAHs can be measured from fitting
110
+ models to observed dust emission measured from mid-
111
+ through far-IR broadband photometry (e.g. Draine et al.
112
+ 2007; Galliano et al. 2008; Galliano 2018; Chastenet
113
+ et al. 2019; Nersesian et al. 2019; Aniano et al. 2020).
114
+ One can also fit mid-IR spectra and derive more de-
115
+ tailed information about the relative intensities of each
116
+ feature, like the average charge and size of the PAH
117
+ population (Smith et al. 2007; Lai et al. 2020; Maragk-
118
+ oudakis et al. 2022). As very prominent features, the
119
+ emission at 7.7 and 11.3 µm can be considered a satis-
120
+ factory proxy to trace the total emission from PAHs in
121
+ normal star-forming galaxies (e.g. Smith et al. 2007; Lai
122
+ et al. 2020; Draine et al. 2021).
123
+ PAHs also play a key role in heating the ISM within
124
+ photodissociation regions (PDRs; Bakes & Tielens 1994;
125
+ Weingartner & Draine 2001; Tielens 2008; Bern´e et al.
126
+ 2009; Croxall et al. 2012; Wolfire et al. 2022). As a sig-
127
+ nificant source of photo-ejected electrons, the abundance
128
+ of PAHs greatly influences the photoelectric heating ef-
129
+ ficiency. The close tie between PAHs and PDR heating
130
+ has led to the suggested use of PAH emission as a tracer
131
+ of the star-formation rate (e.g., Peeters et al. 2004; Ship-
132
+ ley et al. 2016).
133
+ The variations of the PAH fraction in the interstellar
134
+ medium (ISM) of external galaxies helps us to under-
135
+ stand their origin and evolution, as well as the mech-
136
+ anisms that regulate their formation and destruction.
137
+ Several studies have found that the fraction of PAHs de-
138
+ creases in regions of ionized gas and/or because of hard
139
+ radiation fields (e.g. Giard et al. 1994; Dong & Draine
140
+ 2011; Verstraete 2011; Salgado et al. 2016; Chastenet
141
+ et al. 2019; Rigopoulou et al. 2021), as theory predicts
142
+ (Siebenmorgen et al. 2004; Groves et al. 2008; Micelotta
143
+ et al. 2010; Bocchio et al. 2012; Zhen et al. 2016), and
144
+ becomes very low in H II regions (e.g. Pety et al. 2005;
145
+ Lebouteiller et al. 2007; Thilker et al. 2007; Compi`egne
146
+ et al. 2008). There is also evidence of a correlation of
147
+ PAH features with the CO content (see, e.g., Leroy et al.
148
+ 2022a). Studying nearby galaxies, Regan et al. (2006)
149
+ found that the 8 µm (traced by Spitzer/IRAC) and CO
150
+ radial profiles are closely matched. Evidence of a close
151
+ link between PAH and CO emission has also been ob-
152
+ served in high-redshift galaxies on galactic scales (e.g.
153
+ Pope et al. 2013; Cortzen et al. 2019).
154
+ In addition to trends observed across different ISM
155
+ environments, the abundance of PAHs has been shown
156
+ to decrease in low metallicity galaxies (e.g. Engelbracht
157
+ et al. 2008; Draine et al. 2007; Sandstrom et al. 2012).
158
+ This deficit in PAHs has multiple proposed causes, in-
159
+ cluding the destruction of PAHs by hard radiation fields
160
+ present in low-metallicity galaxies (Madden et al. 2006;
161
+ Gordon et al. 2008) or delayed PAH formation in AGB
162
+ star atmospheres (Galliano et al. 2008). These trends
163
+ have important implications for future observations of
164
+ PAH emission in high-redshift galaxies, making it essen-
165
+ tial to study PAH variation across a range of systems.
166
+ By further establishing how metallicity trends can lead
167
+ to the reduction in PAH emission, we will be better pre-
168
+ pared for using these small grains to assess ISM condi-
169
+ tions across cosmic time.
170
+ The recent launch of JWST opens a new window for
171
+ exploring this question. The MIRI F770W and F1130W
172
+ filters provide coverage of two of the most prominent
173
+ PAH features at 7.7µm and 11.3µm, while the F2100W
174
+ filter lends a useful comparison, tracing emission from
175
+ larger dust grains (Draine & Li 2007). The unique abil-
176
+ ity of the MIRI instrument to map these PAH features
177
+ at unprecedented resolution and sensitivity in galaxies
178
+ outside of the Local Group allows us to greatly expand
179
+ the range of ISM conditions in which measurements of
180
+ the PAH fraction can be made and better determine
181
+
182
+ PAH Fraction and ISM in PHANGS-JWST
183
+ 3
184
+ how the local ISM conditions can influence the relative
185
+ amount of PAHs present.
186
+ In this Letter, we investigate the variations of the PAH
187
+ fraction traced by a combination of JWST/MIRI filters
188
+ across the full disk of four nearby galaxies, IC 5332,
189
+ NGC 628, NGC 1365, and NGC 7496. By tracking the
190
+ PAH fraction across the multi-phase ISM, we are able
191
+ to determine how a range of ISM properties affect the
192
+ relative abundance of PAHs with respect to large dust
193
+ grains. This will lay the ground work for more detailed
194
+ studies of how PAH emission varies in specific condi-
195
+ tions, such as those found around sites of active star
196
+ formation.
197
+ 2. DATA
198
+ 2.1. JWST/MIRI data
199
+ The data used in this paper are part of the PHANGS-
200
+ JWST Treasury program #2107 (PI: J.C. Lee, Lee et al.
201
+ 2022). We use MIRI (Rieke et al. 2015) observations
202
+ in the F770W, F1130W, and F2100W filters, from the
203
+ latest reference files at the time of processing, as de-
204
+ scribed by Lee et al. (2022) and Leroy et al. (2022a).
205
+ The PHANGS-JWST team used the STScI Calibration
206
+ pipeline 1.7.1 for NIRCam and 1.7.0 for MIRI, and Cal-
207
+ ibration Reference Data context number 0968 for both
208
+ instruments. Table 1 gives a few key details about the
209
+ four targets of this Letter, which are used to construct
210
+ r/r25 maps.
211
+ We convolve all three filter maps to 1′′ resolution,
212
+ which is larger than the full-width at half-maximum of
213
+ the F2100W filter (0.67′′). The convolution kernels were
214
+ computed using the theoretical PSFs of each filter pro-
215
+ vided by the WebbPSF (Perrin et al. 2014), and the
216
+ method described in Aniano et al. (2011). We choose to
217
+ slightly degrade the data to increase the signal-to-noise
218
+ (S/N) in the F2100W band. By doing so, we are also
219
+ able to match the resolution of the CO and Hα data (see
220
+ below).
221
+ 2.2. Ancillary data
222
+ We use 12CO (2 − 1) “broad” moment 0 maps and
223
+ corresponding error maps from the PHANGS-ALMA
224
+ survey combining 12m + 7m + Total Power (Leroy et al.
225
+ 2021a,b), to trace molecular gas, at ∼ 1′′ (∼ 40 − 90 pc
226
+ in our sample) resolution.
227
+ To convert CO intensity
228
+ to molecular gas surface density, ΣH2 in M⊙ pc−2,
229
+ we use a constant CO-to-H2 conversion factor αCO =
230
+ 4.35 M⊙ pc−2 (K km s−1)−1 as recommended for solar
231
+ metallicity, star-forming galaxies (Bolatto et al. 2013)1,
232
+ 1 With the assumption of a flat Hi distribution, the choice of αCO
233
+ is not the dominant uncertainty.
234
+ and 12CO (2 − 1) conversion factor and a 12CO(2 −
235
+ 1)/12CO(1 − 0) line ratio R21 = 0.65 (den Brok et al.
236
+ 2021; Leroy et al. 2022b).
237
+ We use Hα maps from the PHANGS-MUSE survey
238
+ (Emsellem et al. 2022) to trace ionized gas. We use the
239
+ ‘native’ resolution maps, with an average ∼ 0.8′′ resolu-
240
+ tion, and a 0.2′′ pixel size. To trace the 12 + log(O/H)
241
+ metallicity in our targets, we use the 2D maps by
242
+ Williams et al. (2022). The maps were created by inter-
243
+ polating H II regions-derived metallicity maps (with S-
244
+ calibration), using a Gaussian Process Regression tech-
245
+ nique, based on PHANGS-MUSE maps of Hα intensity.
246
+ These maps have fixed physical-, and different angular
247
+ resolutions (Emsellem et al. 2022), all lower than 1′′ ex-
248
+ cept for NGC 1365 (1.15′′). We convolve all maps with
249
+ a resolution lower than 1′′ to that value, to match the
250
+ convolved MIRI maps.
251
+ We use Hi measurements from MeerKAT (C. Eiben-
252
+ steiner et al., in prep), at 15′′ resolution for NGC 7496,
253
+ and from THINGS (Walter et al. 2008) for NGC 628
254
+ (∼ 11′′ for the ‘natural’ weighted map). We convert the
255
+ maps to have units of atomic gas mass surface density in-
256
+ cluding helium assuming optically thin 21 cm emission,
257
+ using the prescription from Leroy et al. (2012, see also
258
+ Walter et al. 2008). We lack resolved 21 cm mapping for
259
+ IC 5332 and NGC 1365. Based on the observed flatness
260
+ of the atomic gas surface density over the inner parts
261
+ of galaxy disks (e.g., Schruba et al. 2011; Bigiel & Blitz
262
+ 2012; Kennicutt & Evans 2012; Wong et al. 2013), we
263
+ assume that the atomic gas has a flat distribution with
264
+ ΣHI = 8 M⊙ pc−2 (including helium). The Hi data have
265
+ the lowest resolution among the datasets for our sample.
266
+ Since the Hi distribution is expected to be reasonably
267
+ smooth across the disk of all our targets (as a likely re-
268
+ sult of low resolution; Leroy et al. 2013), we choose to
269
+ work at the MIRI F2100W resolution to retain as much
270
+ information about the distribution of the PAH emission
271
+ within galaxies as possible. We reproject these maps to
272
+ the MIRI pixel grid, with pixel size ∼ 0.11′′.
273
+ 2.3. Noise properties and masks
274
+ We
275
+ measure
276
+ background
277
+ standard
278
+ deviation
279
+ in
280
+ NGC 7496 as it is the only one that offers enough pixels
281
+ off target, at 1′′ resolution. Lee et al. (2022) give details
282
+ of the reduction of the data, including noise. The back-
283
+ ground removal is done by anchoring the JWST data
284
+ with Spitzer, where the background in these sources
285
+ was better estimated.
286
+ This is done as few off-source
287
+ pixels are available in most of the early targets.
288
+ We
289
+ find that MIRI maps have similar noise, and we assume
290
+ NGC 7496 estimates throughout the sample.
291
+ We re-
292
+ move pixels with signal-to-noise S/N ≤ 3 in all MIRI
293
+
294
+ 4
295
+ Chastenet, Sutter, Sandstrom et al.
296
+ bands, with background noise values of 0.05, 0.05, and
297
+ 0.1 MJy sr−1. In NGC 1365 and NGC 7496, we mask
298
+ pixels in the center due to IR brightness of the active
299
+ galactic nuclei (AGN), which saturate the signal mostly
300
+ in the F2100W band. This is done using the WebbPSF
301
+ package (Perrin et al. 2014), and centering the F2100W
302
+ PSF on the central coordinates of each target. For this
303
+ preliminary work, we remove additional conspicuous ar-
304
+ tifacts from the central AGN that remain after this anal-
305
+ ysis. These spikes are due to the central saturation, and
306
+ although they are not flagged as ‘bad pixels’ by data
307
+ reduction, they are an obvious artifact. We mask these
308
+ by hand to ensure they do not bias our initial results.
309
+ They are shown in gray scale in Figure 1, but are not
310
+ used in the analysis.
311
+ 3. PAH FRACTION
312
+ In Draine et al. (2021), the authors found that the
313
+ luminosity of the 7.7 µm feature2 normalized to the to-
314
+ tal IR luminosity can approximate the PAH fraction
315
+ in all but the most extreme cases (Draine & Li 2007;
316
+ Draine et al. 2021).
317
+ Here, we use the JWST/MIRI
318
+ RPAH = (F770W + F1130W)/F2100W ratio as a proxy
319
+ for the PAH fraction. Over a broad range of PAH size
320
+ (in terms of number of carbon atoms), and assuming a
321
+ Galactic interstellar radiation field (Mathis et al. 1983,
322
+ at 10 kpc), the 7.7 µm feature is more representative of
323
+ the ionized PAH population, and the 11.3 µm feature
324
+ of the neutral population (e.g., Rapacioli et al. 2005;
325
+ Draine et al. 2021). We assume the F2100W filter is free
326
+ from contribution from PAHs and is instead dominated
327
+ by small, hot dust grains, as seen in the Spitzer/IRS
328
+ spectra of local galaxies observed by the SINGS project
329
+ (Smith et al. 2007, see also Draine & Li 2007, Dale et al.
330
+ 2009). This assumption is validated by a clear difference
331
+ in behavior between the F2100W and PAH–dominated
332
+ band emission, demonstrated in Leroy et al. (2022a).
333
+ Normalizing the emission at 7.7 and 11.3 µm by the ob-
334
+ served flux at 21 µm help us focus on the PAH-only frac-
335
+ tion. Previous studies of the PAH population in nearby
336
+ galaxies completed with Spitzer have shown that the
337
+ ratio of 8 µm to 24 µm is a good tracer of the PAH
338
+ fraction (see e.g. Smith et al. 2007; Marble et al. 2010;
339
+ Croxall et al. 2012). In addition, models of PAH and
340
+ dust emission have shown 7.7 µm-to-Total IR luminos-
341
+ ity is a good tracer the PAH mass fraction (qPAH; Draine
342
+ & Li 2007). Using the MIRI filters, we can improve on
343
+ 2 In this model, the 7.7 µm feature luminosity is determined by
344
+ integrating between two set “clip” points, λ = 6.9 and λ = 9.7.
345
+ This is not exactly equal to fluxes observed using the F770W
346
+ filter, which spans λ = 6.6 − 8.6, but is similar.
347
+ this by using the bands centered on the PAH features
348
+ (F770W and F1130W) in place of the 8 µm data while
349
+ the F2100W replaces the 24 µm continuum tracer. As
350
+ both the PAH features and the 21 µm continuum are
351
+ from stochastic heating, using these fluxes to determine
352
+ the PAH fraction removes any significant dependence
353
+ on the radiation field (except in extreme situations, see
354
+ Draine & Li 2007, their Figure 13).
355
+ 3.1. Qualitative description
356
+ Figure 1 shows RPAH in the four PHANGS-JWST
357
+ early targets.
358
+ The white contours show the brightest
359
+ H II regions (Groves et al. subm.; Santoro et al. 2022). In
360
+ all cases, it appears that RPAH shows clear depressions
361
+ within H II regions, though NGC 628 and NGC 7496
362
+ show this contrast most clearly.
363
+ In the right section of Table 1, we show the mean of
364
+ the ratio, ⟨RPAH⟩, and associated 16th − 84th percentile
365
+ range. NGC 1365 shows the highest average for RPAH,
366
+ and IC 5332 the lowest. All 16th−84th ranges agree rea-
367
+ sonably well, and NGC 7496 shows the broadest range.
368
+ The top left panel of Figure 2 shows the radial profiles of
369
+ RPAH, in bins of r/r25. In all panels, the error bars are
370
+ 3 times the standard error of the mean (SEM). These
371
+ errors are small because of the number of pixels in each
372
+ bin (the standard deviation is much larger). Note that
373
+ not all galaxies have observations extending to the same
374
+ r/r25.
375
+ All galaxies show an overall decreasing trend with
376
+ radius. There is however, a slightly different trend in
377
+ NGC 1365 and NGC 7496, which both show an increase
378
+ in abundance ratio at small radii before exhibiting a
379
+ steady decrease. Both are Seyfert galaxies (NGC 1365:
380
+ 1.8, NGC 7496: 2.0; e.g., Garc´ıa-Bernete et al. 2022)
381
+ hosting an AGN as well as central bars that feed high
382
+ density regions at their centers. Even though we mask
383
+ the region around the AGN, this increasing trend at
384
+ small radii could be due to the influence of the central
385
+ AGN on the PAH population.
386
+ The definitive impact
387
+ of AGNs on the PAH population is not yet completely
388
+ clear. For example, Garc´ıa-Bernete et al. (2022) found
389
+ differences in the relative strengths of different PAH fea-
390
+ tures in AGN host galaxies and star-forming galaxies at
391
+ kpc scales. However, Lai et al. (2022) recently found rel-
392
+ atively small variations in PAH size and ionization and
393
+ a decrease in PAH emission only in the direct line-of-
394
+ sight of the AGN, using JWST observations. Similarly,
395
+ Viaene et al. (2020) found that the influence of the AGN
396
+ is only relevant close to the nucleus. Additionally, there
397
+ is evidence for PAH molecules surviving the harsh en-
398
+ vironment surrounding AGNs (e.g., Jensen et al. 2017;
399
+ Alonso-Herrero et al. 2014; Garc´ıa-Bernete et al. 2022).
400
+
401
+ PAH Fraction and ISM in PHANGS-JWST
402
+ 5
403
+ Target
404
+ R. A.
405
+ Dec
406
+ Distance [Mpc]
407
+ P.A. [◦]
408
+ i [◦]
409
+ r25 [′]
410
+ ⟨RPAH⟩
411
+ 16th − 84th perc.
412
+ IC 5332
413
+ 23 : 34 : 27.488
414
+ −36 : 06 : 3.89
415
+ 9.01
416
+ 74.4
417
+ 26.9
418
+ 3.03
419
+ 3.3
420
+ 1.8 − 4.8
421
+ NGC 628
422
+ 01 : 36 : 41.745
423
+ +15 : 47 : 1.11
424
+ 9.84
425
+ 20.7
426
+ 8.9
427
+ 4.94
428
+ 4.7
429
+ 3.8 − 5.6
430
+ NGC 1365
431
+ 03 : 33 : 36.458
432
+ −36 : 08 : 26.37
433
+ 19.57
434
+ 201.1
435
+ 55.4
436
+ 6.01
437
+ 5.1
438
+ 3.8 − 6.3
439
+ NGC 7496
440
+ 23 : 09 : 47.288
441
+ −43 : 25 : 40.28
442
+ 18.72
443
+ 193.7
444
+ 35.9
445
+ 1.67
446
+ 3.6
447
+ 1.8 − 5.3
448
+ Table 1. Right ascension (R. A.) and declination (Dec) coordinates (J2000), the r25 radius, in arc-minutes, used in this Letter
449
+ for our four targets, from the HyperLeda database (Makarov et al. 2014). Distances are from Anand et al. (2021). Position
450
+ angles and inclinations are from Leroy et al. (2021b). Additional information can be found in Table 1 of the survey paper (Lee
451
+ et al. 2022). The second part of the Table shows the mean and 16th − 84th percentiles of RPAH.
452
+ Although we observe a decreasing trend in these two
453
+ galaxies towards the center, it is as of yet uncertain how
454
+ the presence of an AGN may be related to this decrease.
455
+ Additional work will be required to clearly understand
456
+ the scales on which AGN impact the global fraction of
457
+ PAHs.
458
+ We also show the profile of RPAH with 12 + log(O/H)
459
+ metallicity, in the top right panel of Figure 2. Global
460
+ trends of the PAH fraction with metallicity have been
461
+ studied on integrated scales in several works (Draine
462
+ et al. 2007; R´emy-Ruyer et al. 2015; Chastenet et al.
463
+ 2019; Galliano et al. 2021).
464
+ Here, we see that this
465
+ trend is similar on small resolved scales (∼ tens of par-
466
+ secs). The turning point in the metallicity value, where
467
+ the abundance ratio starts to decrease with increasing
468
+ metallicity, is similar to the down-turn at small r/r25 as
469
+ these are primarily radial metallicity gradients.
470
+ 3.2. Variation of PAH fraction with ISM environment
471
+ In Figure 2, middle and bottom rows, we present
472
+ the variation of RPAH as a function of the ISM en-
473
+ vironment.
474
+ We combine the Hi and H2 maps to es-
475
+ timate the total gas surface density, and use the ra-
476
+ tio of Hα intensity to total gas to follow the varia-
477
+ tions of the ISM conditions in each target (in units of
478
+ erg s−1 kpc−2 (M⊙ pc−2)−1). As we expect PAH emis-
479
+ sion to arise from a range of ISM phases, the ratio of Hα
480
+ intensity to total gas (IHα/ΣHI+H2) is used as a proxy for
481
+ environments dominated by the ionized phase and can
482
+ provide a clear indication of what ISM environments the
483
+ PAH emission is coming from. For example, high val-
484
+ ues of IHα/ΣHI+H2 are indicative of regions dominated
485
+ by ionized gas, while low values of IHα/ΣHI+H2 suggest
486
+ the dominance of neutral gas. This comparison works
487
+ well because neutral and ionized gas are decorrelated on
488
+ small spatial scales and the clearing of neutral gas due
489
+ to rapid ionizing feedback (< 5 Myr, Kruijssen et al.
490
+ 2019; Chevance et al. 2020, 2022; Kim et al. 2022). By
491
+ comparing RPAH to IHα/ΣHI+H2 we can better under-
492
+ stand what ISM conditions, i.e.
493
+ what fraction of the
494
+ line of sight is ionized gas free of PAHs, could lead to
495
+ an observed dearth of PAH emission.
496
+ This is further
497
+ investigated within H II regions in Egorov et al. (2022).
498
+ The middle left panel of Figure 2 shows the varia-
499
+ tions of RPAH as a function of IHα/ΣHI+H2. The abun-
500
+ dance of PAHs appears to stay rather flat until a thresh-
501
+ old in IHα/ΣHI+H2, where it decreases steeply. This is
502
+ expected from the destruction of PAHs in harsh en-
503
+ vironments traced by high-intensity Hα (e.g., Groves
504
+ et al. 2008; Micelotta et al. 2010; Bocchio et al. 2012;
505
+ Egorov et al. 2022), and has been observed in Galac-
506
+ tic PDRs (Pety et al. 2005; Compi`egne et al. 2008).
507
+ Interestingly, it appears that all galaxies share similar
508
+ thresholds in IHα/ΣHI+H2 at which the PAH fraction
509
+ starts to decrease. These inflection points seem to be
510
+ around ∼ 37.5 erg s−1 kpc−2 (M⊙ pc−2)−1 for all tar-
511
+ gets. However, it should be pointed out that there are
512
+ (currently) no similar resolution Hi data for IC 5332 and
513
+ NGC 1365, and therefore a universal threshold across
514
+ all environments is left for future studies. Considering
515
+ IHα/ΣHI+H2 traces the fraction of ionized gas per unit
516
+ of total gas, this common threshold could be a limit at
517
+ which the amount of radiation producing the intense Hα
518
+ emission is able to destroy the PAHs through sputtering,
519
+ overcoming shielding from molecular gas and reducing
520
+ the observed PAH fraction.
521
+ We can also see that there is an offset in PAH frac-
522
+ tion, on average, between each galaxy (see also Ta-
523
+ ble 1). Overall, this offset nicely tracks the global galaxy
524
+ metallicity gradients (Kreckel et al. 2019; Santoro et al.
525
+ 2022; Groves et al. subm.), in the lower Hα intensity
526
+ regions. As we move towards higher IHα/ΣHI+H2 val-
527
+ ues, the offset gets minimized. This relates to results
528
+ seen by Egorov et al. (2022), where no metallicity trend
529
+ is found with RPAH within H II regions. This suggests
530
+ that the offset in PAH fraction between the four galaxies
531
+ may be driven by a difference in the PAH population in
532
+ the diffuse or neutral ISM set by the average metallic-
533
+ ity of the galaxy. This general offset also follows trends
534
+ observed in previous works that found that the PAH
535
+ fraction correlates positively with metallicity, in nearby
536
+ galaxies (Draine et al. 2007; R´emy-Ruyer et al. 2015;
537
+ Chastenet et al. 2019; Galliano et al. 2021), although it
538
+
539
+ 6
540
+ Chastenet, Sutter, Sandstrom et al.
541
+ IC5332
542
+ 5 kpc
543
+ NGC0628
544
+ 5 kpc
545
+ NGC1365
546
+ 5 kpc
547
+ NGC7496
548
+ 5 kpc
549
+ 2
550
+ 3
551
+ 4
552
+ 5
553
+ 6
554
+ 7
555
+ RPAH = (F770W + F1130W)/F2100W
556
+ Figure 1. Maps of RPAH in IC 5332 (top left), NGC 628 (top right), NGC 1365 (bottom left), and NGC 7496 (bottom right).
557
+ We mask the pixels with a S/N < 3 in all bands (gray uniform background). We also mask the central pixels in NGC 1365
558
+ and NGC 7496 which are saturated, using instrument PSFs, and perform a by-hand additional masking to remove conspicuous
559
+ saturation artifacts (shown in gray scale, not included in the analysis). We plot contours for a few of the brightest H II regions.
560
+ They are clearly visible as depressions (darker colors) in RPAH, especially in NGC 628 and NGC 7496.
561
+
562
+ PAH Fraction and ISM in PHANGS-JWST
563
+ 7
564
+ 0.0
565
+ 0.2
566
+ 0.4
567
+ 0.6
568
+ 0.8
569
+ r/r25
570
+ 1.0
571
+ 2.0
572
+ 3.0
573
+ 4.0
574
+ 5.0
575
+ RPAH
576
+ IC5332
577
+ NGC0628
578
+ NGC1365
579
+ NGC7496
580
+ 8.35
581
+ 8.4
582
+ 8.45
583
+ 8.5
584
+ 8.55
585
+ 8.6
586
+ 12 + log(O/H)
587
+ 36.5
588
+ 37.0
589
+ 37.5
590
+ 38.0
591
+ log10(IH /
592
+ H I + H2 [erg s
593
+ 1 kpc
594
+ 2 (M
595
+ pc
596
+ 2)
597
+ 1])
598
+ 1.0
599
+ 2.0
600
+ 3.0
601
+ 4.0
602
+ 5.0
603
+ RPAH
604
+ 0.0
605
+ 0.2
606
+ 0.4
607
+ 0.6
608
+ 0.8
609
+ 1.0
610
+ H2/
611
+ H I + H2
612
+ Center
613
+ Bar
614
+ Interarm
615
+ Spiral arms
616
+ Disk
617
+ w/o spirals
618
+ 1.0
619
+ 2.0
620
+ 3.0
621
+ 4.0
622
+ 5.0
623
+ RPAH
624
+ Figure 2. Running medians of RPAH, as a function of (top left:) r/r25; (top right:) 12 + log(O/H) using metallicity maps
625
+ from Williams et al. (2022); (middle left:) IHα/ΣHI+H2 in units of erg s−1 kpc−2 (M⊙ pc−2)−1; (middle right:) the fraction of
626
+ molecular gas; (bottom left:) the environmental masks from Querejeta et al. (2021), with a black star symbol showing the median
627
+ for all pixels within each category. The error-bars show 3× standard error of the mean in each bin (except for the bottom left
628
+ panel, only 1 SEM). Note that the middle panels involve the flat Hi distribution assumption in IC 5332 and NGC 1365, which
629
+ may shift the curves horizontally.
630
+
631
+ 8
632
+ Chastenet, Sutter, Sandstrom et al.
633
+ should be noted that the sample included in this work
634
+ covers a small range of metallicity.
635
+ Figure 3 shows the same variations, with metallicity
636
+ information. We show the 2D-histograms of RPAH as
637
+ a function of IHα/ΣHI+H2, color-coded by the median
638
+ 12 + log(O/H) metallicity in each bin. There is a visible
639
+ color difference between each galaxy, but no clear gra-
640
+ dient. This implies that while the average metallicity
641
+ of each galaxy seems to influence the PAH fraction, the
642
+ moderate local metallicity variations are not having a
643
+ large effect on RPAH.
644
+ In the middle right panel of Figure 2, we show the vari-
645
+ ations of RPAH as a function of the fraction of molecular
646
+ gas to total cold gas fraction, as traced by CO. Behav-
647
+ iors vary between each galaxy, showing either a similar
648
+ profile to that of RPAH with IHα/ΣHI+H2 (NGC 1365,
649
+ NGC 628, reflecting the similarity in spatial distribu-
650
+ tion of CO and Hα emission at these scales Schinnerer
651
+ et al. 2019), a rather flat trend (IC 5332, which has little
652
+ CO), or a ∼ 20% increase to a maximum value, followed
653
+ a decrease in RPAH (NGC 7496).
654
+ This could suggest
655
+ that the abundance of PAHs is not particularly sensi-
656
+ tive to the molecular fraction, compared to the ionized
657
+ gas content. Chastenet et al. (2022) found that the av-
658
+ erage grain size of the global PAH population (as traced
659
+ by the 3.3/7.7 µm ratio; e.g., Maragkoudakis et al. 2020;
660
+ Draine et al. 2021; Rigopoulou et al. 2021) is more sen-
661
+ sitive to the fraction of molecular gas.
662
+ In the bottom left panel of Figure 2, we plot the me-
663
+ dian values of RPAH in different galactic environments,
664
+ identified by Querejeta et al. (2021). We use their spa-
665
+ tial mask to separate pixels in 5 different categories (see
666
+ their Table 1). Figure 4 shows the masks projected to
667
+ the RPAH maps, for a visual representation of the differ-
668
+ ent environments. In this panel, it appears that there
669
+ is no striking differences between environments, again
670
+ showing minimal variations of a few tens of percent, for
671
+ individual galaxies. We also show the median and asso-
672
+ ciated standard error of the mean (SEM) for all pixels
673
+ falling into each category, with black symbols.
674
+ Here,
675
+ we can see that RPAH is the highest in the bar, and
676
+ interarm regions, with lower values in the spiral arms,
677
+ followed by the center and finally in the disk. Although
678
+ this approach is limited by the number of targets at this
679
+ stage, it shows promising results. The higher fraction
680
+ of PAHs in the interarms tracks with a less harsh envi-
681
+ ronment due to star formation, and a possibly more Hi
682
+ dominated ISM. Adding more targets to this approach
683
+ will provide a generic view of the variation of the PAH
684
+ fraction in the different phases of nearby galaxies.
685
+ Future work will improve on this work by more finely
686
+ binning the data. For example, it will be interesting to
687
+ investigate the sensitivity of each parameter to the S/N
688
+ measured in the MIRI data. It will also be possible to
689
+ test a Vorono¨ı binning, to check whether the trends seen
690
+ in Figure 2 would be significantly pulled down by taking
691
+ into account more low-S/N pixels.
692
+ 4. CONCLUSIONS
693
+ With the advent of the JWST, we can now probe indi-
694
+ vidual mid-IR emission features on spatial scales never
695
+ achieved before outside the Local Group. In this letter,
696
+ we have used a combination of the JWST/MIRI F770W,
697
+ F1130W, and F2100W filters to trace the abundance of
698
+ PAHs relative to small dust grains in four nearby galax-
699
+ ies, IC 5332, NGC 628, NGC 1365, and NGC 7496,
700
+ as part of the Treasury GO program PHANGS-JWST
701
+ #2107.
702
+ We present maps of RPAH ≡ (F770W + F1130W)/F2100W
703
+ in these first four targets.
704
+ This ratio traces the rela-
705
+ tive fraction of PAHs (the F770W and F1130W bands)
706
+ to small dust grains (from the F2100W band).
707
+ The
708
+ ratio RPAH decreases in H II regions, showing that
709
+ the PAH fraction drops there, which is further dis-
710
+ cussed in Egorov et al. (2022).
711
+ We track the vari-
712
+ ations of the abundance ratio as a function of the
713
+ ISM content as traced by CO, Hα, Hi, and metallic-
714
+ ity measurements.
715
+ We find that RPAH as a function
716
+ of ionized gas fraction (traced by IHα/ΣHI+H2, Fig-
717
+ ure 2, bottom left panel) shows a similar trend in all
718
+ the targets:
719
+ a rather flat distribution up to a value
720
+ of IHα/ΣHI+H2
721
+
722
+ 1037.5 erg s−1 kpc−2 (M⊙ pc−2)−1
723
+ for all galaxies, at which the abundance ratio system-
724
+ atically decreases. The variations with the fraction of
725
+ molecular gas (Figure 2, bottom right panel) are rather
726
+ small. This work sets the stage for future research to
727
+ refine how the local environment influences the relative
728
+ PAH fraction. As JWST data reduction methods are
729
+ improved and the sample of galaxies with this cover-
730
+ age expands, the conditions in which PAHs are found
731
+ will be better established.
732
+ This early study provides
733
+ insights into how global metallicity and ISM environ-
734
+ ment can effect the relative PAH population, and shows
735
+ the improvements that JWST observations bring to
736
+ determining the answers to these questions.
737
+ ACKNOWLEDGMENTS
738
+ We thank the anonymous referee for their careful
739
+ reading and comments that helped improve the clar-
740
+ ity of the paper.
741
+ This work was carried out as part
742
+ of the PHANGS collaboration, associated with JWST
743
+ program 2107.
744
+ This work is based on observations
745
+ made with the NASA/ESA/CSA JWST. Some/all of
746
+ the data presented in this paper were obtained from
747
+
748
+ PAH Fraction and ISM in PHANGS-JWST
749
+ 9
750
+ 0.0
751
+ 1.0
752
+ 2.0
753
+ 3.0
754
+ 4.0
755
+ 5.0
756
+ 6.0
757
+ 7.0
758
+ RPAH
759
+ IC5332
760
+ NGC0628
761
+ 36.0
762
+ 36.5
763
+ 37.0
764
+ 37.5
765
+ 38.0
766
+ 38.5
767
+ 39.0
768
+ log10(IH /
769
+ H I + H2 [erg s
770
+ 1 kpc
771
+ 2 (M
772
+ pc
773
+ 2)
774
+ 1])
775
+ 0.0
776
+ 1.0
777
+ 2.0
778
+ 3.0
779
+ 4.0
780
+ 5.0
781
+ 6.0
782
+ 7.0
783
+ RPAH
784
+ NGC1365
785
+ 36.0
786
+ 36.5
787
+ 37.0
788
+ 37.5
789
+ 38.0
790
+ 38.5
791
+ 39.0
792
+ log10(IH /
793
+ H I + H2 [erg s
794
+ 1 kpc
795
+ 2 (M
796
+ pc
797
+ 2)
798
+ 1])
799
+ NGC7496
800
+ 8.350
801
+ 8.375
802
+ 8.400
803
+ 8.425
804
+ 8.450
805
+ 8.475
806
+ 8.500
807
+ 8.525
808
+ 8.550
809
+ 12 + log OH
810
+ Figure 3. 2D histograms of the IHα/ΣHI+H2 and the RPAH, color-coded by metallicity, using the gradient from PHANGS-
811
+ MUSE. The more transparent colors indicate bins with at least 10 hits, while the solid colors with at least 100 hits per bin.
812
+
813
+ 10
814
+ Chastenet, Sutter, Sandstrom et al.
815
+ IC5332
816
+ NGC0628
817
+ NGC1365
818
+ NGC7496
819
+ 2
820
+ 3
821
+ 4
822
+ 5
823
+ 6
824
+ 7
825
+ RPAH = (F770W + F1130W)/F2100W
826
+ Center
827
+ Bar
828
+ Interarm
829
+ Spiral arms
830
+ Disk
831
+ w/o spirals
832
+ Figure 4. RPAH maps colored by the environmental masks from Querejeta et al. (2021): center in red, bar in green, interarms
833
+ in gray, spiral arms in blue and disk in orange. We use this separation to measure the median RPAH in each phase individually,
834
+ and collectively, in Figure 2.
835
+
836
+ PAH Fraction and ISM in PHANGS-JWST
837
+ 11
838
+ the Mikulski Archive for Space Telescopes (MAST) at
839
+ the Space Telescope Science Institute, which is oper-
840
+ ated by the Association of Universities for Research in
841
+ Astronomy, Inc., under NASA contract NAS 5-03127.
842
+ The specific observations analyzed can be accessed via
843
+ 10.17909/9bdf-jn24. Based on observations collected at
844
+ the European Southern Observatory under ESO pro-
845
+ grammes 094.C-0623 (PI: Kreckel), 095.C-0473, 098.C-
846
+ 0484 (PI: Blanc), 1100.B-0651 (PHANGS-MUSE; PI:
847
+ Schinnerer), as well as 094.B-0321 (MAGNUM; PI:
848
+ Marconi), 099.B-0242, 0100.B-0116, 098.B-0551 (MAD;
849
+ PI: Carollo) and 097.B-0640 (TIMER; PI: Gadotti).
850
+ This paper makes use of the following ALMA data:
851
+ ADS/JAO.ALMA#2012.1.00650.S,
852
+ ADS/JAO.ALMA#2013.1.01161.S,
853
+ ADS/JAO.ALMA#2015.1.00925.S,
854
+ ADS/JAO.ALMA#2015.1.00956.S,
855
+ ADS/JAO.ALMA#2017.1.00392.S,
856
+ ADS/JAO.ALMA#2017.1.00766.S,
857
+ ADS/JAO.ALMA#2017.1.00886.L,
858
+ ADS/JAO.ALMA#2018.1.01651.S.
859
+ ADS/JAO.ALMA#2018.A.00062.S.
860
+ ALMA is a partnership of ESO (representing its mem-
861
+ ber states), NSF (USA) and NINS (Japan), together
862
+ with NRC (Canada), MOST and ASIAA (Taiwan), and
863
+ KASI (Republic of Korea), in cooperation with the
864
+ Republic of Chile.
865
+ The Joint ALMA Observatory is
866
+ operated by ESO, AUI/NRAO and NAOJ.
867
+ JC acknowledges support from ERC starting grant
868
+ #851622 DustOrigin. EJW acknowledges funding from
869
+ the Deutsche Forschungsgemeinschaft (DFG, German
870
+ Research Foundation) – Project-ID 138713538 – SFB
871
+ 881 (“The Milky Way System”, subproject P1).
872
+ MC
873
+ gratefully acknowledges funding from the DFG through
874
+ an Emmy Noether Research Group (grant number
875
+ CH2137/1-1). COOL Research DAO is a Decentralized
876
+ Autonomous Organization supporting research in astro-
877
+ physics aimed at uncovering our cosmic origins. JMDK
878
+ gratefully acknowledges funding from the European Re-
879
+ search Council (ERC) under the European Union’s Hori-
880
+ zon 2020 research and innovation programme via the
881
+ ERC Starting Grant MUSTANG (grant agreement num-
882
+ ber 714907). TGW and ES acknowledge funding from
883
+ the European Research Council (ERC) under the Euro-
884
+ pean Union’s Horizon 2020 research and innovation pro-
885
+ gramme (grant agreement No. 694343). MB acknowl-
886
+ edges support from FONDECYT regular grant 1211000
887
+ and by the ANID BASAL project FB210003. IC thanks
888
+ the National Science and Technology Council for sup-
889
+ port through grants 108-2112-M-001-007-MY3 and 111-
890
+ 2112-M-001-038-MY3, and the Academia Sinica for In-
891
+ vestigator Award AS-IA-109-M02. KK, OE gratefully
892
+ acknowledge funding from the Deutsche Forschungsge-
893
+ meinschaft (DFG, German Research Foundation) in the
894
+ form of an Emmy Noether Research Group (grant num-
895
+ ber KR4598/2-1, PI Kreckel).
896
+ FB would like to ac-
897
+ knowledge funding from the European Research Coun-
898
+ cil (ERC) under the European Union’s Horizon 2020
899
+ research and innovation programme (grant agreement
900
+ No.726384/Empire). ER and HH acknowledge the sup-
901
+ port of the Natural Sciences and Engineering Research
902
+ Council of Canada (NSERC), funding reference number
903
+ RGPIN-2022-03499. KG is supported by the Australian
904
+ Research Council through the Discovery Early Career
905
+ Researcher Award (DECRA) Fellowship DE220100766
906
+ funded by the Australian Government. KG is supported
907
+ by the Australian Research Council Centre of Excellence
908
+ for All Sky Astrophysics in 3 Dimensions (ASTRO 3D),
909
+ through project number CE170100013. AS is supported
910
+ by an NSF Astronomy and Astrophysics Postdoctoral
911
+ Fellowship under award AST-1903834. AKL gratefully
912
+ acknowledges support by grants 1653300 and 2205628
913
+ from the National Science Foundation, by award JWST-
914
+ GO-02107.009-A, and by a Humboldt Research Award
915
+ from the Alexander von Humboldt Foundation.
916
+ Facilities: JWST (MIRI), MUSE, ALMA
917
+ REFERENCES
918
+ Allamandola, L. J., Tielens, A. G. G. M., & Barker, J. R.
919
+ 1985, ApJL, 290, L25, doi: 10.1086/184435
920
+ Alonso-Herrero, A., Ramos Almeida, C., Esquej, P., et al.
921
+ 2014, MNRAS, 443, 2766, doi: 10.1093/mnras/stu1293
922
+ Anand, G. S., Lee, J. C., Van Dyk, S. D., et al. 2021,
923
+ MNRAS, 501, 3621, doi: 10.1093/mnras/staa3668
924
+ Aniano, G., Draine, B. T., Gordon, K. D., & Sandstrom, K.
925
+ 2011, PASP, 123, 1218, doi: 10.1086/662219
926
+ Aniano, G., Draine, B. T., Hunt, L. K., et al. 2020, ApJ,
927
+ 889, 150, doi: 10.3847/1538-4357/ab5fdb
928
+ Bakes, E. L. O., & Tielens, A. G. G. M. 1994, ApJ, 427,
929
+ 822, doi: 10.1086/174188
930
+ Bern´e, O., Fuente, A., Goicoechea, J. R., et al. 2009, ApJL,
931
+ 706, L160, doi: 10.1088/0004-637X/706/1/L160
932
+ Bigiel, F., & Blitz, L. 2012, ApJ, 756, 183,
933
+ doi: 10.1088/0004-637X/756/2/183
934
+ Bocchio, M., Micelotta, E. R., Gautier, A. L., & Jones,
935
+ A. P. 2012, A&A, 545, A124,
936
+ doi: 10.1051/0004-6361/201219705
937
+
938
+ 12
939
+ Chastenet, Sutter, Sandstrom et al.
940
+ Bolatto, A. D., Wolfire, M., & Leroy, A. K. 2013, ARA&A,
941
+ 51, 207, doi: 10.1146/annurev-astro-082812-140944
942
+ Chastenet, J., Sandstrom, K., Chiang, I.-D., et al. 2019,
943
+ ApJ, 876, 62, doi: 10.3847/1538-4357/ab16cf
944
+ Chastenet, J., Sutter, J., Sandstrom, K., et al. 2022, arXiv
945
+ e-prints, arXiv:2212.10512.
946
+ https://arxiv.org/abs/2212.10512
947
+ Chevance, M., Kruijssen, J. M. D., Hygate, A. P. S., et al.
948
+ 2020, MNRAS, 493, 2872, doi: 10.1093/mnras/stz3525
949
+ Chevance, M., Kruijssen, J. M. D., Krumholz, M. R., et al.
950
+ 2022, MNRAS, 509, 272, doi: 10.1093/mnras/stab2938
951
+ Compi`egne, M., Abergel, A., Verstraete, L., & Habart, E.
952
+ 2008, A&A, 491, 797, doi: 10.1051/0004-6361:200809850
953
+ Cortzen, I., Garrett, J., Magdis, G., et al. 2019, MNRAS,
954
+ 482, 1618, doi: 10.1093/mnras/sty2777
955
+ Croxall, K. V., Smith, J. D., Wolfire, M. G., et al. 2012,
956
+ ApJ, 747, 81, doi: 10.1088/0004-637X/747/1/81
957
+ Dale, D. A., Cohen, S. A., Johnson, L. C., et al. 2009, ApJ,
958
+ 703, 517, doi: 10.1088/0004-637X/703/1/517
959
+ den Brok, J. S., Chatzigiannakis, D., Bigiel, F., et al. 2021,
960
+ MNRAS, 504, 3221, doi: 10.1093/mnras/stab859
961
+ Desert, F. X., Boulanger, F., & Puget, J. L. 1990, A&A,
962
+ 237, 215
963
+ Dong, R., & Draine, B. T. 2011, ApJ, 727, 35,
964
+ doi: 10.1088/0004-637X/727/1/35
965
+ Draine, B. T. 2003, ARA&A, 41, 241,
966
+ doi: 10.1146/annurev.astro.41.011802.094840
967
+ Draine, B. T., & Li, A. 2007, ApJ, 657, 810,
968
+ doi: 10.1086/511055
969
+ Draine, B. T., Li, A., Hensley, B. S., et al. 2021, ApJ, 917,
970
+ 3, doi: 10.3847/1538-4357/abff51
971
+ Draine, B. T., Dale, D. A., Bendo, G., et al. 2007, ApJ,
972
+ 663, 866, doi: 10.1086/518306
973
+ Egorov, O. V., Kreckel, K., Sandstrom, K. M., et al. 2022,
974
+ arXiv e-prints, arXiv:2212.09159.
975
+ https://arxiv.org/abs/2212.09159
976
+ Emsellem, E., Schinnerer, E., Santoro, F., et al. 2022,
977
+ A&A, 659, A191, doi: 10.1051/0004-6361/202141727
978
+ Engelbracht, C. W., Rieke, G. H., Gordon, K. D., et al.
979
+ 2008, ApJ, 678, 804, doi: 10.1086/529513
980
+ Galliano, F. 2018, MNRAS, 476, 1445,
981
+ doi: 10.1093/mnras/sty189
982
+ Galliano, F., Madden, S. C., Tielens, A. G. G. M., Peeters,
983
+ E., & Jones, A. P. 2008, ApJ, 679, 310,
984
+ doi: 10.1086/587051
985
+ Galliano, F., Nersesian, A., Bianchi, S., et al. 2021, A&A,
986
+ 649, A18, doi: 10.1051/0004-6361/202039701
987
+ Garc´ıa-Bernete, I., Rigopoulou, D., Alonso-Herrero, A.,
988
+ et al. 2022, MNRAS, 509, 4256,
989
+ doi: 10.1093/mnras/stab3127
990
+ Giard, M., Bernard, J. P., Lacombe, F., Normand, P., &
991
+ Rouan, D. 1994, A&A, 291, 239
992
+ Gordon, K. D., Engelbracht, C. W., Rieke, G. H., et al.
993
+ 2008, ApJ, 682, 336, doi: 10.1086/589567
994
+ Groves, B., Dopita, M. A., Sutherland, R. S., et al. 2008,
995
+ ApJS, 176, 438, doi: 10.1086/528711
996
+ Groves, B., et al. subm., MNRAS
997
+ Jensen, J. J., H¨onig, S. F., Rakshit, S., et al. 2017,
998
+ MNRAS, 470, 3071, doi: 10.1093/mnras/stx1447
999
+ Jones, A. P., K¨ohler, M., Ysard, N., Bocchio, M., &
1000
+ Verstraete, L. 2017, A&A, 602, A46,
1001
+ doi: 10.1051/0004-6361/201630225
1002
+ Kennicutt, R. C., & Evans, N. J. 2012, ARA&A, 50, 531,
1003
+ doi: 10.1146/annurev-astro-081811-125610
1004
+ Kim, J., Chevance, M., Kruijssen, J. M. D., et al. 2022,
1005
+ MNRAS, 516, 3006, doi: 10.1093/mnras/stac2339
1006
+ Kreckel, K., Ho, I. T., Blanc, G. A., et al. 2019, ApJ, 887,
1007
+ 80, doi: 10.3847/1538-4357/ab5115
1008
+ Kruijssen, J. M. D., Schruba, A., Chevance, M., et al. 2019,
1009
+ Nature, 569, 519, doi: 10.1038/s41586-019-1194-3
1010
+ Lai, T. S. Y., Smith, J. D. T., Baba, S., Spoon, H. W. W.,
1011
+ & Imanishi, M. 2020, ApJ, 905, 55,
1012
+ doi: 10.3847/1538-4357/abc002
1013
+ Lai, T. S. Y., Armus, L., U, V., et al. 2022, arXiv e-prints,
1014
+ arXiv:2209.06741. https://arxiv.org/abs/2209.06741
1015
+ Lebouteiller, V., Brandl, B., Bernard-Salas, J., Devost, D.,
1016
+ & Houck, J. R. 2007, ApJ, 665, 390, doi: 10.1086/519014
1017
+ Lee, J. C., Sandstrom, K. M., Leroy, A. K., et al. 2022,
1018
+ arXiv e-prints, arXiv:2212.02667.
1019
+ https://arxiv.org/abs/2212.02667
1020
+ Leroy, A. K., Bigiel, F., de Blok, W. J. G., et al. 2012, AJ,
1021
+ 144, 3, doi: 10.1088/0004-6256/144/1/3
1022
+ Leroy, A. K., Lee, C., Schruba, A., et al. 2013, ApJL, 769,
1023
+ L12, doi: 10.1088/2041-8205/769/1/L12
1024
+ Leroy, A. K., Hughes, A., Liu, D., et al. 2021a, ApJS, 255,
1025
+ 19, doi: 10.3847/1538-4365/abec80
1026
+ Leroy, A. K., Schinnerer, E., Hughes, A., et al. 2021b,
1027
+ ApJS, 257, 43, doi: 10.3847/1538-4365/ac17f3
1028
+ Leroy, A. K., Sandstrom, K., Rosolowsky, E., et al. 2022a,
1029
+ arXiv e-prints, arXiv:2212.10574.
1030
+ https://arxiv.org/abs/2212.10574
1031
+ Leroy, A. K., Rosolowsky, E., Usero, A., et al. 2022b, ApJ,
1032
+ 927, 149, doi: 10.3847/1538-4357/ac3490
1033
+ Li, A. 2020, Nature Astronomy, 4, 339,
1034
+ doi: 10.1038/s41550-020-1051-1
1035
+ Madden, S. C., Galliano, F., Jones, A. P., & Sauvage, M.
1036
+ 2006, A&A, 446, 877, doi: 10.1051/0004-6361:20053890
1037
+ Makarov, D., Prugniel, P., Terekhova, N., Courtois, H., &
1038
+ Vauglin, I. 2014, A&A, 570, A13,
1039
+ doi: 10.1051/0004-6361/201423496
1040
+
1041
+ PAH Fraction and ISM in PHANGS-JWST
1042
+ 13
1043
+ Maragkoudakis, A., Boersma, C., Temi, P., Bregman, J. D.,
1044
+ & Allamandola, L. J. 2022, ApJ, 931, 38,
1045
+ doi: 10.3847/1538-4357/ac666f
1046
+ Maragkoudakis, A., Peeters, E., & Ricca, A. 2020, MNRAS,
1047
+ 494, 642, doi: 10.1093/mnras/staa681
1048
+ Marble, A. R., Engelbracht, C. W., van Zee, L., et al. 2010,
1049
+ ApJ, 715, 506, doi: 10.1088/0004-637X/715/1/506
1050
+ Mathis, J. S., Mezger, P. G., & Panagia, N. 1983, A&A,
1051
+ 128, 212
1052
+ Micelotta, E. R., Jones, A. P., & Tielens, A. G. G. M. 2010,
1053
+ A&A, 510, A37, doi: 10.1051/0004-6361/200911683
1054
+ Nersesian, A., Xilouris, E. M., Bianchi, S., et al. 2019,
1055
+ A&A, 624, A80, doi: 10.1051/0004-6361/201935118
1056
+ Peeters, E., Spoon, H. W. W., & Tielens, A. G. G. M. 2004,
1057
+ ApJ, 613, 986, doi: 10.1086/423237
1058
+ Perrin, M. D., Sivaramakrishnan, A., Lajoie, C.-P., et al.
1059
+ 2014, in Society of Photo-Optical Instrumentation
1060
+ Engineers (SPIE) Conference Series, Vol. 9143, Space
1061
+ Telescopes and Instrumentation 2014: Optical, Infrared,
1062
+ and Millimeter Wave, ed. J. Oschmann, Jacobus M.,
1063
+ M. Clampin, G. G. Fazio, & H. A. MacEwen, 91433X,
1064
+ doi: 10.1117/12.2056689
1065
+ Pety, J., Teyssier, D., Foss´e, D., et al. 2005, A&A, 435, 885,
1066
+ doi: 10.1051/0004-6361:20041170
1067
+ Pope, A., Wagg, J., Frayer, D., et al. 2013, ApJ, 772, 92,
1068
+ doi: 10.1088/0004-637X/772/2/92
1069
+ Querejeta, M., Schinnerer, E., Meidt, S., et al. 2021, A&A,
1070
+ 656, A133, doi: 10.1051/0004-6361/202140695
1071
+ Rapacioli, M., Joblin, C., & Boissel, P. 2005, A&A, 429,
1072
+ 193, doi: 10.1051/0004-6361:20041247
1073
+ Regan, M. W., Thornley, M. D., Vogel, S. N., et al. 2006,
1074
+ ApJ, 652, 1112, doi: 10.1086/505382
1075
+ R´emy-Ruyer, A., Madden, S. C., Galliano, F., et al. 2015,
1076
+ A&A, 582, A121, doi: 10.1051/0004-6361/201526067
1077
+ Rieke, G. H., Wright, G. S., B¨oker, T., et al. 2015, PASP,
1078
+ 127, 584, doi: 10.1086/682252
1079
+ Rigopoulou, D., Barale, M., Clary, D. C., et al. 2021,
1080
+ MNRAS, 504, 5287, doi: 10.1093/mnras/stab959
1081
+ Salgado, F., Bern´e, O., Adams, J. D., et al. 2016, ApJ, 830,
1082
+ 118, doi: 10.3847/0004-637X/830/2/118
1083
+ Sandstrom, K. M., Bolatto, A. D., Bot, C., et al. 2012,
1084
+ ApJ, 744, 20, doi: 10.1088/0004-637X/744/1/20
1085
+ Santoro, F., Kreckel, K., Belfiore, F., et al. 2022, A&A, 658,
1086
+ A188, doi: 10.1051/0004-6361/202141907
1087
+ Schinnerer, E., Hughes, A., Leroy, A., et al. 2019, ApJ, 887,
1088
+ 49, doi: 10.3847/1538-4357/ab50c2
1089
+ Schruba, A., Leroy, A. K., Walter, F., et al. 2011, AJ, 142,
1090
+ 37, doi: 10.1088/0004-6256/142/2/37
1091
+ Shipley, H. V., Papovich, C., Rieke, G. H., Brown, M. J. I.,
1092
+ & Moustakas, J. 2016, ApJ, 818, 60,
1093
+ doi: 10.3847/0004-637X/818/1/60
1094
+ Siebenmorgen, R., Kr¨ugel, E., & Spoon, H. W. W. 2004,
1095
+ A&A, 414, 123, doi: 10.1051/0004-6361:20031633
1096
+ Smith, J. D. T., Draine, B. T., Dale, D. A., et al. 2007,
1097
+ ApJ, 656, 770, doi: 10.1086/510549
1098
+ Thilker, D. A., Boissier, S., Bianchi, L., et al. 2007, ApJS,
1099
+ 173, 572, doi: 10.1086/516646
1100
+ Tielens, A. G. G. M. 2008, ARA&A, 46, 289,
1101
+ doi: 10.1146/annurev.astro.46.060407.145211
1102
+ Verstraete, L. 2011, in EAS Publications Series, Vol. 46,
1103
+ EAS Publications Series, ed. C. Joblin & A. G. G. M.
1104
+ Tielens, 415–426, doi: 10.1051/eas/1146043
1105
+ Viaene, S., Nersesian, A., Fritz, J., et al. 2020, A&A, 638,
1106
+ A150, doi: 10.1051/0004-6361/202037476
1107
+ Walter, F., Brinks, E., de Blok, W. J. G., et al. 2008, AJ,
1108
+ 136, 2563, doi: 10.1088/0004-6256/136/6/2563
1109
+ Weingartner, J. C., & Draine, B. T. 2001, ApJS, 134, 263,
1110
+ doi: 10.1086/320852
1111
+ Williams, T. G., Kreckel, K., Belfiore, F., et al. 2022,
1112
+ MNRAS, 509, 1303, doi: 10.1093/mnras/stab3082
1113
+ Wolfire, M. G., Vallini, L., & Chevance, M. 2022, ARA&A,
1114
+ 60, 247, doi: 10.1146/annurev-astro-052920-010254
1115
+ Wong, T., Xue, R., Bolatto, A. D., et al. 2013, ApJL, 777,
1116
+ L4, doi: 10.1088/2041-8205/777/1/L4
1117
+ Zhen, J., Rodriguez Castillo, S., Joblin, C., et al. 2016,
1118
+ ApJ, 822, 113, doi: 10.3847/0004-637X/822/2/113
1119
+ Zubko, V., Dwek, E., & Arendt, R. G. 2004, ApJS, 152,
1120
+ 211, doi: 10.1086/382351
1121
+
KtAyT4oBgHgl3EQfsfmL/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
M9FJT4oBgHgl3EQfzi0X/content/tmp_files/2301.11643v1.pdf.txt ADDED
@@ -0,0 +1,959 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ arXiv:2301.11643v1 [math.NT] 27 Jan 2023
2
+ Primes, knots and periodic orbits
3
+ Christopher Deninger∗
4
+ 1
5
+ Introduction
6
+ We begin by sketching some analogies between number theory and knot theory originally
7
+ pointed out by Manin, Mazur [Maz] and Mumford. Those were later developed by Kapra-
8
+ nov, Morishita, Reznikov, Sikora and many other reseachers.
9
+ We then explain a more
10
+ structured analogy where the knots arise from the closed orbits of an R-dynamical system.
11
+ Finally, we explain our recent construction of dynamical systems for arithmetic schemes
12
+ which realize some aspects - but not all - of these analogies. At least in the beginning we
13
+ assume more knowledge of analysis than of algebra on the part of the reader.
14
+ I am very grateful to Umberto Zannier for the invitation to Pisa and to the organizers of
15
+ the Colloquium de Giorgi for giving me the occasion to contribute to this series.
16
+ 2
17
+ Primes and Knots
18
+ We first explain how a prime number p can be viewed as a 1-dimensional object and the
19
+ ring of integers Z as 3-dimensional. For this we need to introduce schemes and the étale
20
+ (Grothendieck) topology.
21
+ For a commutative unital ring R, the spectrum spec R consists of the prime ideals p of R.
22
+ It is equipped with the Zariski topology whose closed subsets are of the form
23
+ V (S) = {p ∈ spec R | p ⊃ S}
24
+ with S any subset of R. The Zariski topology is almost never Hausdorff and the topological
25
+ space spec R is only a weak invariant of R. Grothendieck equipped X = spec R with a
26
+ sheaf of rings OX. An element f ∈ R gives a global section of OX and we may view f as a
27
+ function on spec R by sending p to the residue class f mod p in κ(p) = Quot(R/p). Thus
28
+ ∗Funded by the Deutsche Forschungsgemeinschaft (DFG, German Research Foundation) under Ger-
29
+ many’s Excellence Strategy EXC 2044–390685587, Mathematics Münster: Dynamics–Geometry–Structure
30
+ and the CRC 1442 Geometry: Deformations and Rigidity
31
+ 1
32
+
33
+ we do not have only one field where our functions can take values but many. For example
34
+ f ∈ Z takes values f((p)) ∈ Fp for the prime numbers p and f((0)) ∈ Q. In this sense
35
+ the important idea that “numbers are functions” has been realized. However, working with
36
+ spec Z in isolation, this elementary geometric point of view does not give new arithmetic
37
+ insights. Using functoriality the situation can be improved. Every homomorphism of rings
38
+ ϕ : R1 → R2 induces a continuous map
39
+ spec R2 → spec R1
40
+ via p �→ ϕ−1(p) .
41
+ One even obtains a map of locally ringed spaces between the “affine schemes” spec Ri. Affine
42
+ schemes can be glued to give new “spaces”, the schemes of Grothendieck. Moreover, us-
43
+ ing the entire web of schemes which map to spec R one can refine the Zariski topologies
44
+ to Grothendieck-topologies from which very interesting homotopical and cohomological in-
45
+ variants of the original ring R can be obtained. Let us motivate the basic idea behind
46
+ the étale topology: The usual topology underlying our geometric intuition on a complex
47
+ manifold has the following property: Any analytic map whose Jacobian is everywhere in-
48
+ vertible is itself locally invertible. In the context of algebraic geometry this statement is
49
+ no longer true for the Zariski topology. The map x �→ x2 has the square root as a local
50
+ inverse around x = 1 but the square root is not a polynomial map. One can translate the
51
+ invertibility of the Jacobian into commutative algebra terms and one arrives at the class
52
+ of “etale” maps of schemes. Without giving the formal definition, let us just note that the
53
+ map spec L → spec K corresponding to an inclusion of fields K ⊂ L is étale if and only if
54
+ the extension L/K is finite and separable. For a finite extension of number fields L/K with
55
+ rings of integers oL and oK the map spec oL → spec oK is étale if and only if the extension
56
+ L/K is unramified at all primes. In general it is étale away from the ramified primes.
57
+ The above map x �→ x2 gives a ring homomorphism C[x] → C[x] and the induced map
58
+ spec C[x] ← spec C[x] is étale around the point p = (x − 1) of spec C[x]. For a topology
59
+ closer to our intuition than the Zariski topology, all étale maps and in particular the ones
60
+ in the example should have local inverses. This can only be achieved by generalizing the
61
+ notion of a topology on a set X. In the usual context, the open sets U are subsets of X.
62
+ Instead Grothendieck considered the class of étale maps f : U → X as the “open sets”
63
+ of the étale “topology” on X. Finite intersections are defined by iterated fibre products
64
+ over X, coverings are also easy to define, and many notions of topology can be extended
65
+ to this more general setting, including cohomology and fundamental groups. Now we have
66
+ achieved our goal: In the étale topology, étale maps f are locally invertible! The reason is
67
+ trivial: Consider the diagram:
68
+ U
69
+ id
70
+ ⑦⑦⑦⑦⑦⑦⑦⑦
71
+ ⑦⑦⑦⑦⑦⑦⑦⑦
72
+ f
73
+
74
+ U
75
+ f
76
+ � X
77
+ Here the vertical map f defines an “open set” on which the horizontal étale map f which we
78
+ want to invert has an inverse, namely the identity on U! Historically, in [Ser58] Serre had
79
+ introduced the condition of being “locally isotrivial” for fibre bundles on algebraic varieties.
80
+ This is a weaker condition than local triviality for the Zariski topology. Inspired by this
81
+ work, Grothendieck invented the étale topology and used it to define étale cohomology and
82
+ the étale fundamental group.
83
+ 2
84
+
85
+ Let us now look at the inclusion
86
+ spec Fp ֒→ spec Z , (0) �→ (p)
87
+ coming from the projection Z → Z/p = Fp. The étale fundamental group ˆπ1(spec Fp) is the
88
+ automorphism group of the universal (pro-)étale covering of spec Fp i.e. of spec Fp. Hence
89
+ we have
90
+ ˆπ1(spec Fp) = Aut(Fp) .
91
+ This is a (pro-)cyclic group generated by the Frobenius automorphism x �→ xp. We may
92
+ therefore view
93
+ (1)
94
+ ˆπ1(spec Fp) = ˆZ := lim
95
+ ←−
96
+ N
97
+ Z/N
98
+ as an analogue of
99
+ (2)
100
+ π1(S1) = Z
101
+ where S1 is the cicle.
102
+ By the way, the ultimate reason why étale fundamental groups are always pro-finite like
103
+ ˆZ = lim
104
+ ←−N Z/N is this: polynomials in one variable have only finite many zeroes. Note that
105
+ the group Z in (2) occurs as the automorphism group of the covering R → S1, t �→ exp 2πit,
106
+ and the deck transformations t �→ t + n correspond to the infinitely many zeroes n ∈ Z of
107
+ the function 1 − exp(2πit).
108
+ It turns out that the higher étale homotopy groups of spec Fp vanish so that for the étale
109
+ topology, spec Fp is a K(ˆZ, 1)-space just as S1 is a K(Z, 1), space for the ordinary topology.
110
+ Let us now turn to spec Z. Its Zariski dimension which intuitively corresponds to the com-
111
+ plex dimension is one. So its étale cohomological dimension which intuitively corresponds to
112
+ the usual real dimension should be 2. However the residue fields Fp of the closed points (p)
113
+ are not separably closed and the étale topological dimension 1 of the spec Fp’s adds to the
114
+ étale topological dimension of spec Z. These heuristics suggest that the étale cohomogical
115
+ dimension of spec Z should be 2 · 1 + 1 = 3. A proof using class field theory can be found in
116
+ [Maz73]. From an arithmetic point of view spec Z is not compact, because it only contains
117
+ the (equivalence classes of the) non-archimedean absolute values of Z, which correspond to
118
+ the prime ideals (p), but not the archimedean absolute value. The latter is usually denoted
119
+ by the symbol ∞ and we may view spec Z = spec Z ∪ {∞} as a compactification of spec Z.
120
+ Artin and Verdier extended the étale topology in a natural way to spec Z. The resulting
121
+ cohomology groups differ from the ones of spec Z only by 2-torsion, which for the purposes
122
+ of this section is harmless.
123
+ In the next section, the role of ∞ will be more important.
124
+ Intuitively we may view spec Z as a compact 3-manifold M3 (without boundary). By a
125
+ theorem of Minkowski, there are no non-trivial everywhere unramified extensions of the
126
+ number field Q. In terms of the étale topology this result can be restated as ˆπ1(spec Z) = 1
127
+ which implies ˆπ1(spec Z) = 1. In this regard spec Z resembles a closed simply connected 3-
128
+ manifold, i.e. S3 by the Poincaré conjecture. Let us write Kp for the embedding spec Fp ֒→
129
+ spec Z. Since the image is (p), we may view Kp as (p) embedded into spec Z. As explained
130
+ above this is reminiscent of an embedding S1 ֒→ S3 i.e. of a knot K. Apparently, this
131
+ observation was first made by Mumford [Maz, Introduction].
132
+ 3
133
+
134
+ Here are some analogies between the topological and the arithmetical situation where for
135
+ simplicity we deal with spec Z instead of spec Z. The abelianized fundamental group of
136
+ the knot complement is cyclic, πab
137
+ 1 (S3 \ K) ∼= Z. On the other hand, the abelianized étale
138
+ fundamental group of spec Z \ Kp is the Galois group of the maximal abelian extension of
139
+ Q which is unramified away from the prime p. By a theorem of Kronecker the latter is the
140
+ field Q(µp∞) obtained by adjoining all pn-th roots of unity to Q for n ≥ 1. Hence we have
141
+ ˆπab
142
+ 1 (spec Z \ Kp) = Gal(Q(µp∞)/Q) = ˆZ×
143
+ p .
144
+ Here ˆZp is the ring of p-adic numbers. The group ˆZ×
145
+ p is not quite (pro p) cyclic, but it
146
+ almost is. The Alexander polynomial of the knot K is the characteristic polynomial of a
147
+ generator of πab
148
+ 1 (S3 \ K) ∼= Z acting on πab
149
+ 1 ( �
150
+ S3 \ K) ⊗Z Q. Here �
151
+ S3 \ K is the Z-covering of
152
+ S3 \ K corresponding to the quotient
153
+ π1(S3 \ K) −→ πab
154
+ 1 (S3 \ K) ∼= Z .
155
+ Correspondingly, the quotient
156
+ ˆπ1(spec Z \ Kp) −→ ˆπab
157
+ 1 (spec Z \ Kp) ∼= ˆZ×
158
+ p
159
+ corresponds to a pro-étale ˆZ×
160
+ p -covering
161
+
162
+ spec Z \ Kp of spec Z\Kp. The action of ˆπab
163
+ 1 (spec Z\
164
+ Kp) ∼= Z×
165
+ p on ˆπab
166
+ 1 (
167
+
168
+ spec Z \ Kp) which is the Galois group of the maximal abelian outside of
169
+ p unramified extension of Q(µp∞), gives rise to the Iwasawa zeta function. Iwasawa thought
170
+ in terms of Galois groups, the analogy with knot theory via the étale topology was observed
171
+ only later by Mazur [Maz]. The work of Iwasawa gave rise to a most fruitful direction in
172
+ algebraic number theory. Morishita and his co-authors have also applied techniques from
173
+ knot theory to the study of non-abelian Iwasawa theory [MT17].
174
+ Here is another well known analogy. The mod 2 linking number l(K, L) of two knots K, L
175
+ may be defined by counting mod 2 the number of times that L intersects a Seifert surface
176
+ with boundary K. With this definition it is a nontrivial fact that we have
177
+ (3)
178
+ l(K, L) = l(L, K)
179
+ in Z/2 .
180
+ For odd prime numbers p ̸= l the quadratic residue symbol
181
+ �p
182
+ l
183
+
184
+ is 1 if p is a square mod l
185
+ and −1 if it is not. If p or l is congruent to 1 mod 4 the famous Gauss reciprocity law
186
+ asserts that
187
+ (4)
188
+ �p
189
+ l
190
+
191
+ =
192
+ � l
193
+ p
194
+
195
+ .
196
+ Viewing primes as knots, there are good reasons to view
197
+ � p
198
+ l
199
+
200
+ as an analogue of (−1)l(K,L).
201
+ In fact there is a proof of (3) which can be translated to the arithmetic context via our
202
+ dictionary and which then yields a proof of (4).
203
+ The limitations of viewing spec Z as
204
+ analogous to S3 become apparent though. If both p and l are not congruent to 1 mod 4,
205
+ quadratic reciprocity assert that
206
+ �p
207
+ l
208
+
209
+ = −
210
+ � l
211
+ p
212
+
213
+ .
214
+ 4
215
+
216
+ According to Kapranov and Smirnov [KS, § 3], the reason for this assymmetry is the follow-
217
+ ing: the primes p which are not congruent to 1 mod 4 should correspond to knots which are
218
+ not homologous to zero in the 3-manifold M3 corresponding to spec Z in our analogy. Tak-
219
+ ing S3 for M3 is an oversimplification in this regard because in S3 all knots are homologous
220
+ to zero. In [KS] it is explained how to restore the analogy between quadratic reciprocity
221
+ and mod 2 linking of knots if more general 3-manifolds M3 are allowed.
222
+ For three knots in S3 which are pairwise unlinked their union can still be a non-trivial link,
223
+ as for the Borromean rings. This can be shown by the non-triviality of certain triple Massey
224
+ products for example. In 1938 Redei published a symbol (p, l, q) defined for three prime
225
+ numbers p, l, q congruent to 1 mod 4 whose quadratic residue symbols satisfy ( p
226
+ l ) = 1 and
227
+ ( p
228
+ q) = 1. Morishita observed that non-triviality of the Redei symbol could be interpreted
229
+ as the three primes being non-trivially linked while being pairwise unlinked. For example,
230
+ we may view the primes 5, 41, 61 as an analogue of the Borromean link. He also gave an
231
+ entirely parallel construction of “higher Milnor invariants” both for n-tuples of knots and of
232
+ primes, which reduce to the Redei symbol for n = 3, [Mor02]. The relation of Redei symbols
233
+ with Massey products in Galois cohomology is explained in [Mor04]. Recently [AC22] gives
234
+ an interesting application of Massey products to infinite class field towers. There are very
235
+ many further analogies between knot theory and prime numbers and more generally between
236
+ three dimensional topology and algebraic number theory. We refer to the book [Mor12] for
237
+ a great overview of this branch of mathematics, called arithmetic topology.
238
+ 3
239
+ Primes and periodic orbits
240
+ In this section we explain certain analogies between number theory and the theory of R-
241
+ dynamical systems on 3-manifolds M3 with a 1-codimensional foliation F. Up to isotopy
242
+ the periodic orbits give embedded circles i.e. knots in M3. The analogies in the present
243
+ section enhance the ones of section 2. They are mostly of an analytic nature and relate
244
+ to analytic number theory contrary to the topological analogies of the previous section.
245
+ I arrived at these analogies by a long detour via cohomological considerations [Den00].
246
+ However they can be much more easily motived by the following argument, [Kop06]. For a
247
+ rational number f ∈ Q× the p-adic absolute values of f are
248
+ |f|p = p−ordpf
249
+ if f = pordpf a
250
+ b
251
+ with 0 ̸= b, a ∈ Z prime to p .
252
+ We also have the ordinary archimedean absolute value |f|∞ := |f|. The product formula
253
+ which immediately follows from these definitions asserts that
254
+
255
+ p≤∞
256
+ |f|p = 1 .
257
+ Taking the log, we get
258
+ (5)
259
+
260
+ p̸=∞
261
+ ordpf · log p − log |f|∞ = 0 .
262
+ 5
263
+
264
+ This reminds of, but is more complicated than the formula
265
+ (6)
266
+
267
+ x∈X
268
+ ordxf = 0
269
+ for a meromorphic function f on a Riemann surface X. In (6) only integers are added,
270
+ whereas in (5) the integers are multiplied with the Q-linearly independent transcendental
271
+ numbers log p, and there is also the term log |f|∞ which seems of a different nature. A
272
+ formula like (5) but without a term corresponding to − log |f|∞ was observed by Ghys
273
+ in the context of Riemann surface laminations.
274
+ Kopei later showed how to include an
275
+ analogue of − log |f|∞: As in [Den08] consider triples (X, F, φ) where X is a closed smooth
276
+ 3-manifold with a 1-codimensional foliation F by Riemann surfaces, and φ is a flow, such
277
+ that each φt maps leaves of F to (possibly other) leaves. The flow should be non-degenerate
278
+ which implies that there are only finitely many fixed points x and for any C > 0 there are
279
+ only finitely many closed orbits γ with length l(γ) ≤ C. The fixed points of φ should lie in
280
+ finitely many compact leaves. All other leaves should be non-compact and the flow should
281
+ be transversal to them. Let X be the open complement in X of the union over the finitely
282
+ many compact leaves of F. Since the compact leaves contain fixed points, they are invariant
283
+ under the flow and become sub-dynamical systems of codimension one. The open manifold
284
+ X is invariant under the flow and foliated by the non-compact leaves of F.
285
+ The triple (X, F, φt) can be described more explicitely as follows.
286
+ Pick a leaf F of F
287
+ (they are all diffeomorphic), let Yφ be the vector field generated by the flow and let ωφ be
288
+ the 1-form on X which is zero on the tangent bundle TF to the foliation and such that
289
+ ⟨ωφ, Yφ⟩ = 1. For the period group
290
+ Λ =
291
+ � �
292
+ γ
293
+ ωφ | γ ∈ πab
294
+ 1 (X)
295
+
296
+ ⊂ R
297
+ we have Λ = {t ∈ R | φt(F) = F}. For example, if γ is a periodic orbit then l(γ) ∈ Λ and
298
+ φl(γ) is the Poincaré return map on F. The group Λ acts diagonally on F ×R. Moreover the
299
+ action is fixed point free and properly discontinuous. The map F × R → X, (x, t) �→ φt(x)
300
+ induces a diffeomorphism of F ×Λ R with X. Here the leaves of F correspond to the images
301
+ of F × {s} in F ×Λ R and φt becomes translation by t via the second factor. In [ALKL22]
302
+ and [KMNT21] the possible shapes of the triples (X, F, φt) are determined. For example
303
+ the Reeb foliation F on X = S3 with suitable flows are possibilities. Recall that the Reeb
304
+ foliation of S3 is obtained by glueing two solid tori S1 × D foliated by concentric infinitely
305
+ extended paraboloids, along their common boundary. Thus there is one compact leaf, the
306
+ 2-torus S1 × S1 and all the other leaves are diffeomorphic to the plane.
307
+ Any choice of a smooth metric on TF over X defines conformal structures on the leaves
308
+ which vary smoothly in the transversal direction. Thus for a smooth 3-manifold with a
309
+ smooth 1-codimensional foliation one obtains the structure of a Riemann surface lamination
310
+ [Ghy99]. Let f be a smooth P1(C)-valued function whose restrictions to all leaves F of F
311
+ are holomorphic and let dFf be the exterior derivative of f along the leaves. Applying
312
+ Stoke’s theorem to the differential form
313
+ 1
314
+ 2πif −1dFf ∧ωφ on the complement in X of disjoint
315
+ open tubular neighborhoods of the periodic orbits and of ε-neighborhoods Uε(K) of the
316
+ compact leaves K, Kopei obtained the following formula for small ε > 0 in [Kop06]
317
+ (7)
318
+
319
+ γ
320
+ ordγf l(γ) −
321
+
322
+ x
323
+ 1
324
+ 2πi
325
+
326
+ ∂Uε(Kx)
327
+ f −1dFf ∧ ωφ = 0 .
328
+ 6
329
+
330
+ Here γ runs over the periodic orbits and ordγf ∈ Z is defined to be the order of the
331
+ meromorphic function f |F in a point z ∈ F ∩γ ̸= ∅. Since ordz(f |F) ∈ Z varies continuously
332
+ with z ∈ γ, this is independent of the leaf F and the chosen point z ∈ F ∩ γ. Moreover
333
+ x runs over the fixed points and Kx is the compact leaf containing x. Comparing (5) and
334
+ (7), we see that in the analogy prime numbers p correspond to periodic orbits γ where log p
335
+ corresponds to l(γ). Incidentally, note that if we had a bijection p ↔ γ with log p = l(γ),
336
+ then the Riemann zeta function would be a Ruelle zeta function
337
+ ζ(s) =
338
+
339
+ γ
340
+ (1 − e−sl(γ))−1
341
+ for Re s > 1 .
342
+ The question whether a natural dynamical system with this property exists is quite old and
343
+ we will discuss our progress in this direction in the last section. Back to our analogy. From
344
+ (5) and (7) we also see that the archimedean absolute value | |∞ of spec Z should correspond
345
+ to a fixed point x. More generally, there is an analogue of (5) for number fields K. It shows
346
+ that the prime ideals 0 ̸= p ∈ spec oK correspond to periodic orbits γ where log Np �= l(γ)
347
+ and the finitely many archimedean absolute values correspond to the finitely many fixed
348
+ points. Note that every periodic orbit γ comes with embeddings
349
+ R/l(γ)Z ֒→ X t mod l(γ) �→ φt(x)
350
+ for the choices of points x ∈ γ. The embeddings for different choices of x are isotopic (via
351
+ φt for a suitable t) and therefore define the same knot in X. Thus the dynamical systems
352
+ analogy between primes and periodic orbits refines the previous analogy between primes
353
+ and knots.
354
+ There are several further analogies between spec Z and systems of the form (X, F, φt). For
355
+ example, Hilbert reciprocity has a dynamical analogue as shown in [KMNT21]. Lichten-
356
+ baum’s conjecture on the order of vanishing and the leading coefficient of the Hasse-Weil
357
+ zeta function of a regular algebraic scheme over spec Z in terms of Weil-étale cohomology
358
+ can be translated almost verbally to the dynamical context, where it can be proved under
359
+ certain conditions, c.f. [Den08], also [Den06]. The proof uses work of Álvarez-Lopez and
360
+ Kordyukov and the Cheeger-Müller theorem.
361
+ Here is another analogy which was found earlier [Den01, 3.5 Corollary].
362
+ The “explicit
363
+ formulas of analytic number theory” are an equality of two distributions on the real line,
364
+ c.f.
365
+ [Wei52].
366
+ Restricted to R>0 they have a particularly simple form: In the space of
367
+ distributions D′(R>0) we have
368
+ (8)
369
+ 1 −
370
+
371
+ ρ
372
+ etρ + et =
373
+
374
+ p
375
+ log p
376
+
377
+ k≥1
378
+ δk log p + (1 − e−2t)−1 .
379
+ Here ρ runs over the zeroes of ζ(s) in 0 < Re s < 1, for α ∈ C the locally integrable
380
+ function etα is viewed as a distribution, and δx is the Dirac delta distribution supported in
381
+ x. Evaluating on a test function ϕ ∈ C∞
382
+ c (R>0) and setting Φ(α) =
383
+
384
+ R etαϕ(t) dt formula (8)
385
+ takes the more familiar form
386
+ Φ(0) −
387
+
388
+ ρ
389
+ Φ(p) + Φ(1) =
390
+
391
+ p
392
+ log p
393
+
394
+ k≥1
395
+ ϕ(k log p) +
396
+ � ∞
397
+ 0
398
+ ϕ(t)
399
+ 1 − e−2t dt .
400
+ 7
401
+
402
+ For the foliation analogue, assume that there exists a metric gF of TF such that φt acts
403
+ with conformal factor eαt for some α ∈ R. Then the spectrum of the infinitesimal generator
404
+ θ of the group of operators (φt)∗ for t ∈ R on the space of global leafwise harmonic L2-forms
405
+ ker ∆1
406
+ F,(2) consists of eigenvalues ρ. If dim X = 3 and there are not compact leaves, so that
407
+ X = X and the flow is everywhere transverse to the leaves, then the following formula holds
408
+ in D′(R>0) for certain signs ± which can easily be made explicit
409
+ (9)
410
+ 1 −
411
+
412
+ ρ
413
+ etρ + eαt =
414
+
415
+ γ
416
+ l(γ)
417
+
418
+ k≥1
419
+ ±δkl(γ) .
420
+ Moreover we have Re ρ = α
421
+ 2 for all the eigenvalues ρ. Equation (9) is a transversal index
422
+ theorem for the R-action φt and the complex (Λ• T ∗F, dF) which is elliptic in the leaf
423
+ direction. For fixed t the operator φt∗ on ker ∆i
424
+ F,(2) is not trace class if ker ∆i
425
+ F,(2) is infinite
426
+ dimensional. However for ϕ ∈ C∞
427
+ c (R) the trace of the mollified operator
428
+
429
+ R φt∗ϕ(t) dt on
430
+ ker ∆i
431
+ F,(2) exists and by our assumptions we have
432
+ ⟨Tr(φ∗ | ker ∆i
433
+ F,(2), ϕ⟩ := Tr
434
+
435
+ R
436
+ φt∗ϕ(t) dt
437
+ =
438
+
439
+ ρ
440
+
441
+ R
442
+ etθϕ(t) dt
443
+ = ⟨
444
+
445
+ ρ
446
+ etρ, ϕ⟩ .
447
+ The only eigenvalues ρ of θ on ker ∆i
448
+ F,(2) for i = 0, 2 are 0 and α by our conditions. Thus
449
+ the left hand side of (9) may be viewed as the transversal index defined by Atiyah for
450
+ compact Lie group actions and by Hörmander in general.
451
+ It is given by the following
452
+ Euler-characteristic
453
+
454
+ i
455
+ (−1)iTr(φ∗ | ker ∆i
456
+ F,(2)) ∈ D′(R) .
457
+ Incidentally, ker ∆i
458
+ F,(2) may also be interpreted as the maximal Hausdorff quotient of the
459
+ leafwise L2-cohomology
460
+ Hi
461
+ F,(2)(X) = ker di
462
+ F,(2)/im di−1
463
+ F,(2) .
464
+ Formula (9) does not contain a term corresponding to (1−e−2t)−1 in (8) because we assumed
465
+ that φt had no fixed points. If we allow fixed points, then the distributional trace defined
466
+ above may no longer exist. An extension of transverse index theory to such a more general
467
+ situation has only recently been accomplished by Álvarez-Lopez, Leichtnam and Kordyukov,
468
+ c.f. [ALKL23], [ALKL21]. It is much more involved then the transversal case and leads
469
+ to formulas which are quite similar to the explicit formulas of number theory, even as
470
+ distributions on all of R.
471
+ One can show that the conformal factor eαt for a metric gF as above necessarily has to
472
+ be 1, i.e. α = 0 which implies that the eigenvalues ρ of θ on ker ∆1
473
+ F,(2) have real part
474
+ Re ρ = 0. By comparison with the Riemann hypothesis, we would obviously want α = 1
475
+ to be a possibility in the geometric analogue (X, F, φt). This is only one instance which
476
+ shows that the class of smooth compact manifolds is too restrictive to actually rewrite the
477
+ explicit formulas of analytic number theory as a transversal index theorem. One can show
478
+ 8
479
+
480
+ that α = 1 can be achieved if for X we allow the local structure (totally disconnected) ×
481
+ (3-dimensional ball), c.f. [Lei07]. In [Ghy99] and [MS06] it is explained how to do analyis
482
+ of PDE on such spaces.
483
+ Analogies of Arakelov theory with foliated dynamical systems
484
+ were obtained in [Kop11]. Recently we found an argument why a possible complex valued
485
+ Weil-type cohomology theory for arithmetic curves spec oK cannot have a functorial real
486
+ structure, [Den22b].
487
+ Since leafwise cohomology groups or the spaces of global leafwise
488
+ harmonic forms always have natural real structures, this shows that our analogies are not
489
+ perfect in this regard. We are missing a fundamental “twist” excluding real structures on
490
+ cohomology somewhere.
491
+ 4
492
+ Dynamical systems for arithmetic schemes
493
+ In this section we recall the construction of “foliated” topological dynamical systems for
494
+ arithmetic schemes given in [Den22a] and explain their basic properties. We first found an
495
+ extrinsic construction of the typical leaf with its Poincaré return maps guided by the idea
496
+ to use Frobenius elements in Galois groups to generate periodic orbits. The following more
497
+ general and conceptual intrinsic definition using C-valued points of rational Witt spaces
498
+ came later after understanding the work of Kucharczyk and Scholze [KS18]. The previous
499
+ extrinsic definition then became a theorem, namely Theorem 4.1 below. Our dynamical
500
+ systems have some but by no means all of the properties that we expect from the analogies
501
+ in section 3. We view them as a first but important step in our quest to apply analysis
502
+ on dynamical systems to number theory. Since arithmetic over p-adic fields is much better
503
+ understood than over number fields we also studied a p-adic version of our construction. In
504
+ that situation there is a very natural modification of the dynamical system and it turned
505
+ out to be closely related to the Fargues-Fontaine curve, one of the fundamental objects in
506
+ p-adic Hodge theory.
507
+ Before we can define rational Witt spaces, we have to recall the rational Witt vectors Wrat(R)
508
+ of a commutative unital ring R. As a set, Wrat(R) consists of the rational functions f among
509
+ the power series f ∈ R[[t]], with f(0) = 1, i.e. f = P/Q with P, Q ∈ R[t], P(0) = 1 = Q(0).
510
+ Addition in Wrat(R) is defined to be multiplication of rational functions. Following Almkvist
511
+ [Alm74] we write f ∈ Wrat(R) as a quotient
512
+ f = det(1 − tϕ | V )
513
+ det(1 − tψ | W) ,
514
+ where V and W are projective R-modules of finite rank equipped with endomorphisms ϕ
515
+ and ψ. If ˜f has a corresponding expression then the sum f + ˜f in Wrat(R) will be represented
516
+ by (ϕ ⊕ ˜ϕ, V ⊕ ˜V ) and (ψ ⊕ ˜ψ, W ⊕ ˜W). By definition the product of f and ˜f in Wrat(R) is
517
+ represented by (ϕ⊗ ˜ϕ, V ⊗ ˜V ) and (ψ ⊗ ˜ψ, W ⊗ ˜W). One can check that this is independent
518
+ of all choices, and in fact the product in Wrat(R) coincides with the product in the big Witt
519
+ ring W(R) = 1 + tR[[t]]. This leads to the K-theoretical description of Wrat(R) in [Alm74].
520
+ Now let X be a scheme, for example X = spec R and let Wrat(OX) be the sheafification of
521
+ the Zariski presheaf U �→ Wrat(OX(U)). For all x ∈ X we have Wrat(OX)x = Wrat(OX,x).
522
+ We call the ringed space
523
+ Wrat(X) = (Xtop, Wrat(OX)) ,
524
+ 9
525
+
526
+ the rational Witt space of X, where Xtop is the underlying topological space of X. If S is
527
+ another scheme we define a morphism P : S → Wrat(X) as a morphism of ringed spaces
528
+ (P, P ♯) such that for all s ∈ S there is a (uniquely determined) ring homomorphism ˜P ♯
529
+ s
530
+ making the following diagram commutative
531
+ (10)
532
+ Wrat(OX,f(s))
533
+ P ♯
534
+ s
535
+
536
+ ��
537
+ OS,s
538
+ ��
539
+ Wrat(κ(f(s)))
540
+ ˜P ♯
541
+ s
542
+ � κ(s) .
543
+ Here κ denotes the residue field. The stalks Wrat(OX)s are not local rings in general and
544
+ Wrat(X) is not a locally ringed space. Condition (10) replaces the usual locality condition
545
+ in scheme theory. The set of S-valued points of Wrat(X) is
546
+ Wrat(X)(S) = Mor(S, Wrat(X)) .
547
+ If S = spec A is affine we set Wrat(X)(A) = Wrat(X)(S). The canonical ring homomor-
548
+ phisms
549
+ Wrat(R) −→ R , f �−→ −f ′(0)/f(0)
550
+ induce a canonical morphism
551
+ X −→ Wrat(X) .
552
+ By composition we get an injection
553
+ X(S) ֒→ Wrat(X)(S) .
554
+ Hence Wrat(X)(S) contains the classical S-valued points of X.
555
+ Morphisms Wrat(Y ) → Wrat(X) between two rational Witt spaces are defined similarly as
556
+ above. Every morphism α : Y → X of schemes induces a morphism Wrat(α) : Wrat(Y ) →
557
+ Wrat(X) and one obtains a faithful but not fully faithful functor from schemes to rational
558
+ Witt spaces.
559
+ For example, the commuting Frobenius endomorphisms Fν for ν ≥ 1 of
560
+ Witt vector theory induce commuting Frobenius endomorphisms Fν on Wrat(X). We have
561
+ Fpn = Wrat(F n) if X is an Fp-scheme and F : X → X is the absolute Frobenius, but in
562
+ general the Fν are not induced by morphisms of schemes. The multiplicative monoid N of
563
+ positive integers therefore acts on Wrat(X) and hence also on Wrat(X)(S) for all S. We now
564
+ describe how global sections f of X give rise to A-valued functions on Wrat(X)(A) using
565
+ the multiplicative (Teichmüller-)map
566
+ [ ] : R −→ Wrat(R)
567
+ with [r] = 1 − rt .
568
+ Namely, for f ∈ Γ(X, OX) consider its images [f] in Wrat(OX(X)) and hence in Wrat(OX)(X).
569
+ A point P ∈ Wrat(X)(C) gives a morphism of sheaves P ♯ : Wrat(OX) → P∗Ospec C. We de-
570
+ fine the value of f in P to be the image of [f] ∈ Wrat(OX)(X) in (P∗Ospec C)(X) = C under
571
+ this map. In this way we obtain a multiplicative map from Γ(X, OX) into the C-algebra of
572
+ C-valued function on Wrat(X)(C).
573
+ For normal schemes X with countable function field we defined a natural topology on
574
+ Wrat(X)(C) in [Den22a, section 7] and the previous construction gives a multiplicative map
575
+ (11)
576
+ [ ] : Γ(X, O) −→ C0(Wrat(X)(C), C) .
577
+ 10
578
+
579
+ For X = spec Z this map interprets numbers i.e. elements of Γ(spec Z, O) = Z as highly
580
+ non-trivial C-valued continuous functions on the infinite dimensional connected Hausdorff
581
+ space Wrat(spec Z)(C). The following result which follows from [KS18, Lemma 4.9] makes
582
+ the points of Wrat(X)(C) somewhat more explicit but even for X = spec Z we do not have
583
+ a satisfactory understanding of that space. We change the notation somewhat.
584
+ Theorem 4.1. Let X0 be a normal scheme with function field K0 and let X be the normal-
585
+ ization of X0 in an algebraic closure K of K0. Let G = Aut(K/K0) be the absolute Galois
586
+ group of K0 and set
587
+
588
+ X(C) = {(x, P
589
+ ×) | x ∈ X, P
590
+ × ∈ Hom(κ(x)×, C×)} .
591
+ Then there is a natural N -equivariant bijection
592
+ Wrat(X0)(C)
593
+ ∼−→
594
+
595
+ X0(C) :=
596
+
597
+ X(C)/G .
598
+ Here σ ∈ G acts on
599
+
600
+ X(C) via (x, P
601
+ ×)σ = (xσ, P
602
+ ×
603
+ ◦σ) and ν ∈ N acts G-equivariantly via
604
+ Fν(x, P
605
+ ×) = (x, P
606
+ ×
607
+ ◦( )ν).
608
+ The space Wrat(X0)(C) =
609
+
610
+ X0(C) is almost the typical leaf of the “foliated” dynamical system
611
+ that we will construct. The monoid N acts on
612
+
613
+ X0(C) by injective maps and we need to
614
+ invert them to get a group action by (Q>0, ·) via homeomorphisms. This is done by forming
615
+ the colimit space over N viewed as a poset ordered by divisibility
616
+ ˇX0(C) = colimN
617
+
618
+ X0(C) .
619
+ Note that on the level of functions we have a limit over Frobenii, which reminds of the
620
+ tilting process in p-adic geometry. Set
621
+ X0 = (ˇX0(C) × R>0)/Q>0
622
+ where Q>0 acts diagonally. Let t ∈ R act on X0 by setting φt[P, u] = [P, etu]. The 1-
623
+ codimensional “foliation” F has leaves the images of ˇX0(C) × {u} in X0 for u ∈ R>0. It
624
+ is everywhere transversal to the flow and each φt maps leaves to leaves. In general, the
625
+ dynamical system (X0, φt) has too many periodic orbits, since the N -space Wrat(X0)(C)
626
+ does not know enough about the addition in OX0. In the local p-adic situation below, we
627
+ know the right modification to make. However in the global case presently we can only
628
+ impose an “admissible” condition E on the characters P
629
+ × : κ(x)× → C× in the description
630
+ of Theorem 4.1. What we know for certain is that the restrictions of P
631
+ × to µ(κ(x)) must
632
+ have finite kernels (condition Etors) and that for char κ(x) > 0 the image of P
633
+ × must not
634
+ be torsion unless κ(x)× is itself torsion. For example E can be the conditions that ker P
635
+ ×
636
+ is always finite resp.
637
+ finitely generated.
638
+ We refer to [Den22a, section 4] for a detailed
639
+ discussion. With the obvious modifictions we get a G×N -space
640
+
641
+ X(C)E, an N -space
642
+
643
+ X0(C)E
644
+ and a “foliated” dynamical system (X0E, F, φt).
645
+ Theorem 4.2. Let X0 be normal of finite type over spec Z, e.g.
646
+ X0 = spec R0 for an
647
+ integrally closed finitely generated ring R0. Then we have
648
+ {x0 ∈ X0E | φt(x0) = x0
649
+ for some t > 0} =
650
+
651
+ x0
652
+ Γx0 .
653
+ 11
654
+
655
+ Here x0 runs over the closed points of X0, i.e. the maximal ideals m0 of R0 if X0 = spec R0.
656
+ The compact subsets Γx0 ⊂ X0 consist of periodic orbits of length log Nx0 where Nx0 =
657
+ |κ(x0)| (= |R0/m0|) and they are pairwise disjoint. In fact Γx0 is a fibre space over the
658
+ compact group Aut(F
659
+ ×
660
+ p )/Aut(Fp) where p = char κ(x) with fibres the compact orbits in Γx0.
661
+ The theorem asserts that the closed points of X0 e.g. the prime numbers p if X0 = spec Z
662
+ correspond not to individual periodic orbits γ as in the analogies of section 3 but to compact
663
+ packets of periodic orbits all of which have length log Nx0 i.e. log p if X0 = spec Z. This is
664
+ reminiscient of the invariant tori of Hamiltonian dynamics.
665
+ It follows from the existence of Frobenius elements in the Galois group G that closed points
666
+ give periodic orbits in X0E. It is more difficult to show that any periodic orbit comes from
667
+ a closed point i.e. lies in Γx0 for some x0, c.f. [Den22a, Theorems 5.2 and 6.1].
668
+ The proof of the following result requires de Jong’s theory of alterations if dim X0 ≥ 2 and
669
+ some approximation theorems from number theory.
670
+ Theorem 4.3. Let X0 be an integral normal scheme which is flat of finite type over spec Z.
671
+ Then the spaces X0 and X0E are connected. In fact they are almost pathwise connected: for
672
+ any two points x0 and x′
673
+ 0 in X0E and any two neighborhoods U0 ∋ x0 and U′
674
+ 0 ∋ x′
675
+ 0 there are
676
+ points y0 ∈ U0 and y′
677
+ 0 ∈ U′
678
+ 0 which can be connected by a continuous path.
679
+ Another result, which is stronger than connectedness asserts that the leafwise cohomology
680
+ group H0
681
+ F(X0E) is one dimensional. It is essentially the group of global sections of the sheaf
682
+ of continuous R-valued functions on X0E which are locally constant along the leaves of F,
683
+ c.f. [Den22a, section 10].
684
+ The space X0E is infinite dimensional if dim X0 ≥ 1 and one could hope that the sub-
685
+ dynamical system obtained as the closure of the union of all its compact orbits might be
686
+ significantly smaller. However, this is not the case as follows from [Den22a, Theorem 8.2].
687
+ The closure is the subsystem obtained by replacing
688
+
689
+ X(C)E in the previous constructions with
690
+ the subspace of pairs (x, P
691
+ ×) with P
692
+ × : κ(x)× → S1 a unitary character. For dim X0 ≥ 2
693
+ this is conditional on a result in Diophantine approximation which should be provable and
694
+ which is known for dim X0 = 1 and X0 flat over spec Z.
695
+ The following result makes the structure of the dynamical system X0 clearer. Consider the
696
+ natural projection
697
+
698
+ X(C) → X mapping (x, P
699
+ ×) to x. Let
700
+
701
+ X(C)p resp.
702
+
703
+ X(C)Q be the fibres of
704
+ the composition
705
+
706
+ X(C) → X → spec Z over (p) resp. (0). Consider the G-invariant subspace
707
+
708
+ X(C)in = {(x, P
709
+ ×) ∈
710
+
711
+ X(C) | P
712
+ × |µ(κ(x)) is injective }
713
+ and set
714
+
715
+ X(C)p,in =
716
+
717
+ X(C)in ∩
718
+
719
+ X(C)p
720
+ and
721
+
722
+ X(C)Q,in =
723
+
724
+ X(C)in ∩
725
+
726
+ X(C)Q .
727
+ These are subspaces of
728
+
729
+ X(C) and the quotient topologies on
730
+
731
+ X0(C)p,in =
732
+
733
+ X(C)p,in/G
734
+ and
735
+
736
+ X0(C)Q,in =
737
+
738
+ X(C)Q,in/G
739
+ 12
740
+
741
+ agree with the subspace topologies within
742
+
743
+ X0(C). For any p, the Frobenius endomorphism
744
+ Fp of
745
+
746
+ X0(C) restricts to a homeomorphism of
747
+
748
+ X0(C)p,in. Hence pZ ⊂ Q>0 acts on
749
+
750
+ X0(C)p,in
751
+ via p ↔ Fp.
752
+ Theorem 4.4. The following canonical φt-equivariant map is a continuous bijection (and
753
+ similarly after imposing an admissible condition E)
754
+
755
+ X0(C)Q,in × R>0 ∐
756
+
757
+ p
758
+
759
+ X0(C)p,in ×pZ R>0
760
+ ∼−→ X0 = ˇX0(C)Etors ×Q>0 R>0 .
761
+ In view of Theorem 4.3 the map in the theorem is not a homeomorphism since X0 is
762
+ connected, whereas the left hand side is disconnected.
763
+ We now discuss the relation of our construction with the work of Kucharczyk and Scholze
764
+ [KS18].
765
+ Consider a field of characteristic zero containing all roots of unity, and fix an
766
+ injective homomorphism ι : µ(F) = µ(F) ֒→ C×.
767
+ The multiplicative Teichmüller map
768
+ [ ] : F × ֒→ Wrat(F) and the multiplicative map ι give ring homomorphisms
769
+ Z[µ(F)] −→ Wrat(F)
770
+ and
771
+ Z[µ(F)] −→ C
772
+ on the group ring of µ(F). Set
773
+ XF = spec (Wrat(F) ⊗Z[µ(F )] C) .
774
+ One can show that the connected components of Wrat(spec F)(C) are parametrized by the
775
+ embeddings µ(F) ֒→ C× and that XF(C) is the component corresponding to ι. For arbitrary
776
+ connected pointed topological spaces (Z, z) Kucharczyk and Scholze defined a pro-finite
777
+ fundamental group π´et
778
+ 1 (Z, z) which classifies the finite coverings of Z. One of their main
779
+ results is an isomorphism of π´et
780
+ 1 (XF(C), x) with the absolute Galois group of F. They also
781
+ calculate the sheaf cohomology of XF(C) with coefficients in Z/n and Q. For Z/n they prove
782
+ that it is isomorphic to the Galois cohomology of F with Z/n-coefficients using the work
783
+ of Rost and Voevodsky on the Bloch-Kato conjecture. For Q-coefficients the cohomology
784
+ of XF(C) is the Galois fixed part of Λ• (F
785
+ × ⊗ Q).
786
+ A more natural group would be the
787
+ Milnor K-group of F tensored with Q. The absence of the Steinberg relations in rational
788
+ cohomology is an indication that the space XF(C) and hence also our space Wrat(X)(C) do
789
+ not encode enough information about the additive structure of F resp. OX.
790
+ In [DW23] we introduced and studied a pro-algebraic fundamental group πE(Z, z) over any
791
+ field E for pointed connected topological spaces (Z, z). Its maximal pro-étale quotient is
792
+ π´et
793
+ 1 (Z, z) viewed as a group scheme over E. For the “right” version of XF(C) discussed in
794
+ the introduction of [KS18], we expect the pro-algebraic fundamental group to be deeply
795
+ related to the motivic Galois group for motives over F with coefficients in E. In [DW23,
796
+ section 5] we calculated πE(XF(C), x) for algebraically closed fields E of characteristic zero.
797
+ Its connected component is commutative and its unipotent part is related to extensions of
798
+ Tate motives. For the reductive part we could see no relation with motives, i.e. to the Serre
799
+ group. In our opinion this just shows that XF(C) and our spaces Wrat(X0)(C) are only first
800
+ steps (but in the right direction).
801
+ For inspiration, we looked at the much better understood situation where X0 is a normal
802
+ scheme of finite type over spec Zp instead of spec Z. In order to compare with p-adic Hodge
803
+ 13
804
+
805
+ theory it is reasonable to study Wrat(X0)(o) where o is the valuation ring in the completion
806
+ Cp of Qp. We proved that
807
+ Wrat(X0)(o) = Wrat(X)(o)/G .
808
+ Here, as before X is the normalization of X0 in K0, with K0 the function field of X0 and
809
+ G its absolute Galois group. The points of Wrat(X)(o) are certain diagrams determined by
810
+ points x,y ∈ X with y ∈ {x} and multiplicative maps Py : O{x},y → o sending 1 to 1 and 0
811
+ to 0. Here we know how to modify our constructions in order to get the right Fp-dynamical
812
+ system: We have to impose the condition that the mod p reduction of the multiplicative
813
+ map Py i.e. the composition
814
+ (12)
815
+ O{x},y
816
+ Py
817
+ −→ o −→ o/p
818
+ is additive. The technical details are more involved but this is the heart of the matter. It
819
+ now turns out that the elements of Fontaine’s Ainf-rings become ordinary o-valued functions
820
+ on the resulting sub-dynamical systems. Judith Lutz has proved that this representation
821
+ of Ainf by functions is faithful. Also, e.g. for X0 = spec Zp we obtained a natural bijection
822
+ of the subsystem with the points of the Fontaine-Fargue curve.
823
+ This uses the work of
824
+ Fontaine-Wintenberger in the reformulation by Scholze and Kedlaya. One can reformulate
825
+ additivity of (12) in terms of absolute values but it is still unclear what the right analogue
826
+ is to impose on Wrat(X)(C) for X0/Z.
827
+ References
828
+ [AC22]
829
+ Eric Ahlqvist and Magnus Carlson. Massey products in the étale cohomology
830
+ of number fields, 2022.
831
+ [ALKL21]
832
+ Jesús A. Álvarez López, Yuri A. Kordyukov, and Eric Leichtnam. Zeta invari-
833
+ ants of Morse forms, 2021. arXiv:2112.03191.
834
+ [ALKL22]
835
+ Jesús A. Álvarez López, Yuri A. Kordyukov, and Eric Leichtnam. Simple foli-
836
+ ated flows. Tohoku Math. J. (2), 74(1):53–81, 2022.
837
+ [ALKL23]
838
+ Jesús A. Álvarez López, Yuri A. Kordyukov, and Eric Leichtnam.
839
+ A trace
840
+ formula for foliated flows, 2023. in preparation.
841
+ [Alm74]
842
+ Gert Almkvist. The Grothendieck ring of the category of endomorphisms. J.
843
+ Algebra, 28:375–388, 1974.
844
+ [Den00]
845
+ Christopher Deninger. On dynamical systems and their possible significance for
846
+ arithmetic geometry. In Regulators in analysis, geometry and number theory,
847
+ volume 171 of Progr. Math., pages 29–87. Birkhäuser Boston, Boston, MA,
848
+ 2000.
849
+ [Den01]
850
+ Christopher Deninger.
851
+ Number theory and dynamical systems on foliated
852
+ spaces. Jahresber. Deutsch. Math.-Verein., 103(3):79–100, 2001.
853
+ 14
854
+
855
+ [Den06]
856
+ Christopher
857
+ Deninger.
858
+ A
859
+ dynamical
860
+ systems
861
+ analogue
862
+ of
863
+ lichten-
864
+ baum’s conjectures on special values of hasse-weil zeta functions, 2006.
865
+ https://arxiv.org/abs/math/0605724.
866
+ [Den08]
867
+ Christopher Deninger. Analogies between analysis on foliated spaces and arith-
868
+ metic geometry. In Groups and analysis, volume 354 of London Math. Soc.
869
+ Lecture Note Ser., pages 174–190. Cambridge Univ. Press, Cambridge, 2008.
870
+ [Den22a]
871
+ Christopher Deninger.
872
+ Dynamical systems for arithmetic schemes, 2022.
873
+ 1807.06400.
874
+ [Den22b]
875
+ Christopher Deninger. There is no “Weil-”cohomology theory with real coef-
876
+ ficients for arithmetic curves, 2022. arXiv:2204.02714, to appear in Ann Sc.
877
+ Norm. Super. Pisa.
878
+ [DW23]
879
+ Christopher Deninger and Michael Wibmer. On the pro-algebraic fundamental
880
+ group of topological spaces and amalgamated products of affine group schemes,
881
+ 2023. in preparation.
882
+ [Ghy99]
883
+ Étienne Ghys.
884
+ Laminations par surfaces de Riemann.
885
+ In Dynamique et
886
+ géométrie complexes (Lyon, 1997), volume 8 of Panor. Synthèses, pages ix,
887
+ xi, 49–95. Soc. Math. France, Paris, 1999.
888
+ [KMNT21] Junhyeong Kim, Masanori Morishita, Takeo Noda, and Yuji Terashima. On 3-
889
+ dimensional foliated dynamical systems and Hilbert type reciprocity law. Mün-
890
+ ster J. Math., 14(2):323–348, 2021.
891
+ [Kop06]
892
+ Fabian Kopei. A remark on a relation between foliations and number theory.
893
+ In Foliations 2005, pages 245–249. World Sci. Publ., Hackensack, NJ, 2006.
894
+ [Kop11]
895
+ Fabian Kopei. A foliated analogue of one- and two-dimensional Arakelov theory.
896
+ Abh. Math. Semin. Univ. Hambg., 81(2):141–189, 2011.
897
+ [KS]
898
+ M.
899
+ Kapranov
900
+ and
901
+ A.
902
+ Smirnov.
903
+ Cohomology
904
+ determi-
905
+ nants
906
+ and
907
+ reciprocity
908
+ laws:
909
+ number
910
+ field
911
+ case.
912
+ Preprint,
913
+ https://cage.ugent.be/∼kthas/Fun/library/KapranovSmirnov.pdf.
914
+ [KS18]
915
+ Robert A. Kucharczyk and Peter Scholze. Topological realisations of absolute
916
+ Galois groups. In Cohomology of arithmetic groups, volume 245 of Springer
917
+ Proc. Math. Stat., pages 201–288. Springer, Cham, 2018.
918
+ [Lei07]
919
+ Eric Leichtnam. Scaling group flow and Lefschetz trace formula for laminated
920
+ spaces with p-adic transversal. Bull. Sci. Math., 131(7):638–669, 2007.
921
+ [Maz]
922
+ Barry
923
+ Mazur.
924
+ Remarks
925
+ on
926
+ the
927
+ Alexander
928
+ polynomial.
929
+ https://people.math.harvard.edu/∼mazur/papers/alexander_polynomial.pdf.
930
+ [Maz73]
931
+ Barry Mazur. Notes on étale cohomology of number fields. Ann. Sci. École
932
+ Norm. Sup. (4), 6:521–552 (1974), 1973.
933
+ [Mor02]
934
+ Masanori Morishita. On certain analogies between knots and primes. J. Reine
935
+ Angew. Math., 550:141–167, 2002.
936
+ 15
937
+
938
+ [Mor04]
939
+ Masanori Morishita. Milnor invariants and Massey products for prime numbers.
940
+ Compos. Math., 140(1):69–83, 2004.
941
+ [Mor12]
942
+ Masanori Morishita. Knots and primes. Universitext. Springer, London, 2012.
943
+ An introduction to arithmetic topology.
944
+ [MS06]
945
+ Calvin C. Moore and Claude L. Schochet. Global analysis on foliated spaces,
946
+ volume 9 of Mathematical Sciences Research Institute Publications. Cambridge
947
+ University Press, New York, second edition, 2006.
948
+ [MT17]
949
+ Masanori Morishita and Yuji Terashima. p-Johnson homomorphisms and pro-p
950
+ groups. J. Algebra, 479:102–136, 2017.
951
+ [Ser58]
952
+ J.P. Serre. Espaces fibrés algébriques. Séminaire Claude Chevally, tome 3, exp.
953
+ no 1:1–37, 1958.
954
+ [Wei52]
955
+ André Weil. Sur les “formules explicites” de la théorie des nombres premiers.
956
+ Comm. Sém. Math. Univ. Lund [Medd. Lunds Univ. Mat. Sem.], 1952(Tome
957
+ Supplémentaire):252–265, 1952.
958
+ 16
959
+
M9FJT4oBgHgl3EQfzi0X/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
O9AyT4oBgHgl3EQfg_h-/content/tmp_files/2301.00369v1.pdf.txt ADDED
@@ -0,0 +1,1996 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Learn to Rapidly and Robustly Optimize
2
+ Hybrid Precoding
3
+ Ortal Lavi and Nir Shlezinger
4
+ Abstract
5
+ Hybrid precoding plays a key role in realizing massive multiple-input multiple-output (MIMO)
6
+ transmitters with controllable cost. MIMO precoders are required to frequently adapt based on the
7
+ variations in the channel conditions. In hybrid MIMO, where precoding is comprised of digital and
8
+ analog beamforming, such an adaptation involves lengthy optimization and depends on accurate channel
9
+ state information (CSI). This affects the spectral efficiency when the channel varies rapidly and when
10
+ operating with noisy CSI. In this work we employ deep learning techniques to learn how to rapidly and
11
+ robustly optimize hybrid precoders, while being fully interpretable. We leverage data to learn iteration-
12
+ dependent hyperparameter settings of projected gradient sum-rate optimization with a predefined number
13
+ of iterations. The algorithm maps channel realizations into hybrid precoding settings while preserving
14
+ the interpretable flow of the optimizer and improving its convergence speed. To cope with noisy CSI,
15
+ we learn to optimize the minimal achievable sum-rate among all tolerable errors, proposing a robust
16
+ hybrid precoding based on the projected conceptual mirror prox minimax optimizer. Numerical results
17
+ demonstrate that our approach allows using over ten times less iterations compared to that required
18
+ by conventional optimization with shared hyperparameters, while achieving similar and even improved
19
+ sum-rate performance.
20
+ I. INTRODUCTION
21
+ Wireless communication networks are subject to constantly growing requirements in terms of
22
+ connectivity, throughput, and reliability. One of the emerging technologies which is expected to
23
+ play a key role in meeting these demands is based on equipping wireless base stations (BSs) with
24
+ large-scale antenna arrays, resulting in massive multiple-input multiple-output (MIMO) networks
25
+ [2]. While the theoretical gains of massive MIMO are well-established [3]–[5], implementing
26
+ such large scale arrays in a power and cost efficient manner is associated with several core
27
+ Parts of this work were presented at the 2022 IEEE Workshop on Signal Processing Advances in Wireless Communications
28
+ (SPAWC) as the paper [1]. This work was supported in part by the Israeli Innovation Authority through the 5G-WIN consortium.
29
+ The authors are with the School of ECE, Ben-Gurion University of the Negev (e-mail: [email protected]; [email protected]).
30
+ 1
31
+ arXiv:2301.00369v1 [eess.SP] 1 Jan 2023
32
+
33
+ challenges. Among these challenges is the conventional need to feed each antenna element with
34
+ a dedicated RF chain, which tend to be costly and consume notable power [6].
35
+ A leading approach to tackle the cost and power challenges of massive MIMO is to utilize
36
+ hybrid analog/digital MIMO transceivers [7], [8]. Hybrid MIMO transceivers carry out part of
37
+ the processing of the transmitted and received signals in the analog domain, enabling operation
38
+ with less RF chains than antennas [9]–[11]. As a result, hybrid MIMO transmitters implement
39
+ precoding partially in digital and partially in analog. Analog processing is dictated by the
40
+ circuitry, often implemented using vector modulators [12] or phase shifters [9]. Consequently,
41
+ analog precoding is typically more constrained compared with digital processing, where, e.g.,
42
+ one can typically apply different precoders in each frequency [13].
43
+ The constrained form of hybrid MIMO makes the setting of the precoding pattern for a given
44
+ channel realization notably more challenging compared with costly fully-digital architectures.
45
+ Various methods have been proposed for designing hybrid precoding systems, optimizing their
46
+ analog and digital processing to meet the communication demands [14]. The common approach
47
+ formulates the objective of the precoders, e.g., sum-rate maximization or minimizing the distance
48
+ from the fully-digital precoder [15], [16], as an optimization problem. The resulting optimization
49
+ is then tackled using iterative solvers which vary based on the objective and the specific con-
50
+ straints induced by the analog circuitry and the antenna architecture. Iterative algorithms were
51
+ proposed for tunning hybrid MIMO systems with controllable gains [11], phase-shifting structure
52
+ [10], [13], partial-connectivity [9], [15], discretized vector modulators [12], and Lorentzian-
53
+ constrained metasurface antennas [17], [18]. While iterative optimizers are interpretable, being
54
+ derived as the solution to the formulated problem, they are often slow in terms of convergence.
55
+ This can be a major limitation as this setting is based on the instantaneous channel state
56
+ information (CSI), and thus must be done in real-time to cope with the frequent variations
57
+ of wireless channels, and its performance depends on the accuracy of the CSI.
58
+ An alternative emerging approach to tuning hybrid precoders is based on deep learning. This
59
+ approach builds upon the ability of deep neural networks (DNNs) to learn complex mapping
60
+ while inferring at controllable speed dictated by the number of layers, which is often much
61
+ faster compared with conventional iterative optimizers [19]. The usage of deep learning to tackle
62
+ optimization problems is referred to as learn-to-optimize [20]. DNN-aided optimization of hybrid
63
+ precoders was considered in [21]–[27], which employed multi-layered perceptrons [21], [22]
64
+ and convolutional neural networks [23]–[27] as the optimizer, while [28], [29] employed deep
65
+ 2
66
+
67
+ reinforcement learning techniques. While such deep models are able to map channel estimates
68
+ into precoder structure, they lack of transparency or interpretability in how input data are
69
+ transformed into the precoder setting. Furthermore, the resulting precoding scheme is geared
70
+ towards the number of users and the distribution of the channels used for its training. When
71
+ the channel distribution or the number of users changes, the DNN needs to be trained anew,
72
+ which is a lengthy procedure. Moreover, highly-parameterized DNNs may be too computationally
73
+ complex to deploy on hardware-limited wireless communication devices.
74
+ Interpretable deep models with a small number of parameters can be obtained from iterative
75
+ optimization algorithms via the deep unfolding methodology [30]. Deep unfolding leverages
76
+ data-driven deep learning techniques to improve an iterative optimizer, rather than replace its
77
+ operation with DNNs [31], [32]. Deep unfolded optimizers were utilized for configuring one-bit
78
+ hybrid precoders in [33]; for fully-digital (non-hybrid) narrowband precoders in [34]; for narrow-
79
+ band phase shifter based hybrid precoders in [35], [36]; and for narrowband hybrid predcoders
80
+ with limited feedback in [37]. The latter unrolled an optimization algorithm using generative
81
+ networks for handling the limited feedback and overparametrized ResNets for optimizing the
82
+ precoders, resulting in a highly-parameterized DNN, which may not be suitable for application on
83
+ hardware limited MIMO devices. The work [38] used dedicated DNNs integrated into unfolded
84
+ optimization of analog precoders in hybrid MIMO transmitters with full CSI, at the cost of
85
+ additional complexity during inference. This motivates designing interpretable light-weight learn-
86
+ to-optimize algorithms for rapidly translating CSI into multi-band hybrid precoders, while being
87
+ robust to inaccurate CSI.
88
+ In this work, we propose a learn-to-optimize algorithm for tuning multi-band downlink hybrid
89
+ MIMO precoders in a manner that is rapid, robust, and interpretable. We consider different analog
90
+ architectures, including analog precoders with controllable gains, as well as architectures based on
91
+ fully-connected phase shifters. Our approach leverages data in the form of past channel realization
92
+ to accelerate the convergence of conventional iterative optimization of the achievable sum-rate.
93
+ In order to design an unfolded algorithm for dealing with the challenging and practical setting
94
+ where the CSI may be noisy, we commence by treating the setting where full CSI is available,
95
+ for which we formulate an unfolded optimizer which naturally extends to cope with noisy CSI.
96
+ Our proposed data-aided algorithms fully preserve the interpretable and flexible operation of
97
+ conventional optimizers from which they originate, while being light-weight and operating with
98
+ fixed run-time and complexity.
99
+ 3
100
+
101
+ In particular, we adopt the projected gradient ascent (PGA) algorithm as the hybrid precoding
102
+ designing optimizer for maximizing the achievable sum-rate with full CSI. Our motivation here
103
+ stems from the ability of this approach to directly optimize the sum-rate, rather than adopting
104
+ some simpler surrogate objective as done in, e.g., [10], [15], which can thus be extended to
105
+ robust optimization of this measure. We unfold the PGA algorithm, by fixing a small number of
106
+ iterations and train only its iteration-dependent hyperparameters which can be tuned from data
107
+ without deviating from its overall flow and operation.
108
+ Our selection of PGA optimization with the sum-rate objective as our basis for hybrid pre-
109
+ coding design with full CSI facilitates extending our approach to noisy CSI settings: we identify
110
+ the projected conceptual mirror prox (PCMP) algorithm for maximin optimization [39] as a
111
+ suitable optimizer for hybrid precoding with noisy CSI, whose algorithmic steps involve com-
112
+ putations of gradients of projection of the sum-rate objective, as we used by PGA with full
113
+ CSI. Consequently, we propose to cope with noisy CSI by formulating our design objective as
114
+ maximizing the minimal achievable sum-rate within a given tolerable CSI error margin. We then
115
+ unfold PCMP, resulting in a trainable architecture involving similar steps as those used when
116
+ unfolding PGA, where again data is leveraged to tune the hyperparameters of the optimizer for
117
+ each iteration. Our experimental results evaluate our proposed unfolded algorithms compared
118
+ with the conventional optimizers from which they originate for hybrid precoding in multi-band
119
+ synthetic Rayleigh channels as well as channels generated via the Quasi Deterministic Radio
120
+ channel Generator (QuaDRiGa) channel simulator [40] in various signal-to-noise ratios (SNRs).
121
+ There, we systematically show that the proposed unfolded algorithms achieve similar and even
122
+ improved sum-rates compared with their iterative counterparts, while operating with over ten
123
+ times less iterations and computational complexity.
124
+ The rest of this work is organized as follows: Section II describes the system model; the
125
+ proposed learn-to-optimize algorithm for tuning hybrid precoders with full CSI is derived in
126
+ Section III, while Section IV derives the learned optimizer for noisy CSI. Our proposed algo-
127
+ rithms are numerically evaluated in Section V, and Section VI provides concluding remarks.
128
+ Throughout the paper, we use lowercase boldface letters for vectors, e.g., x; [x]i denotes the
129
+ ith element of x. Uppercase boldface letters are used for matrices, e.g., X, with [X]i,j being its
130
+ (i, j)th entry and In denoting the n×n identity matrix. Calligraphic letters, such as X, are used
131
+ for sets, and C is the set of complex numbers. The transpose, Hermitian transpose, Frobenius
132
+ norm, and stochastic expectation are denoted by (·)T, (·)H, ∥ · ∥F, and E{·}, respectively.
133
+ 4
134
+
135
+ Fig. 1: Architecture of MIMO system using hybrid precoding
136
+ II. SYSTEM MODEL
137
+ In this section we present the system model. We start by reviewing the model for wideband
138
+ downlink MIMO communications with hybrid beamforming in Subsection II-A, after which we
139
+ discuss the considered analog precoder architectures in Subsection II-B. Then, we formulate the
140
+ considered problem of rapid and robust hybrid precoder setting in Subsection II-C.
141
+ A. Downlink MIMO Communications with Hybrid Beamforming
142
+ 1) Channel Model: We consider a single-cell downlink hybrid MIMO system with N single-
143
+ antenna users. The BS is equipped with M transmitting antennas, and utilizes B frequency bands
144
+ for communications, where the spectrum is shared among all users in a non-orthogonal fashion.
145
+ The overall system is illustrated in Fig. 1.
146
+ The BS employs multi-carrier signaling, and we use sb ∈ CN to denote the multiuser trans-
147
+ mitted signal vector that is being transmitted in the bth frequency bin, b ∈ {1, 2, . . . , B} ≜ B.
148
+ The transmitted symbols are i.i.d. and of equal power, such that E[sbsH
149
+ b ] = 1
150
+ N IN for each b ∈ B.
151
+ At each frequency bin b ∈ B, for a channel input xb ∈ CM, the channel output is given by
152
+ yb = Hb · xb + nb ∈ CN,
153
+ (1)
154
+ where Hb ∈ CN×M is the bth frequency band sub-channel, and nb ∈ CN is additive white
155
+ Gaussian noise (AWGN) with i.i.d. entries of variance σ2.
156
+ 2) Hybrid Beamforming: The BS has L < M RF chains, and thus employs hybrid precoding.
157
+ Here, the multiuser transmitted signal vectors {sb}b∈B are precoded in two stages. First, a digital
158
+ 5
159
+
160
+ Channel
161
+ Receivers
162
+ Digital Precoder
163
+ Analog Precoder
164
+ →Y1,1
165
+ S1
166
+ RF Chain
167
+ S2
168
+ +YB,1
169
+ Wa
170
+ .
171
+ Wa,B
172
+ HB
173
+ .Y1,N
174
+ SB
175
+ RF Chain
176
+ →yB,N
177
+ N
178
+ B
179
+ L
180
+ M
181
+ B
182
+ N
183
+ Users
184
+ FreguencyBands
185
+ RF Chains
186
+ Tx Antennas
187
+ Frequency Bands
188
+ Receiversprecoder Wd,b ∈ CL×N is applied to sb in each frequency bin b ∈ B, i.e., Wd,b is the digital
189
+ precoding matrix of the bth bin. Next, the digital symbols pass through L RF chains, and are
190
+ combined into the channel input xb using an analog precoder. Unlike digital processing, analog
191
+ precoding is carried out using dedicated hardware assumed to be static in frequency. Hence,
192
+ analog precoding is modeled using the matrix Wa ∈ A ⊆ CM×L, where A represents the set of
193
+ feasible analog precoder settings, discussed in the sequel.
194
+ The output of the transmitter in the bth bin is given by
195
+ xb = WaWd,b · sb.
196
+ (2)
197
+ We require the precoders to satisfy
198
+ 1
199
+ B
200
+ B
201
+
202
+ j=1
203
+ ∥WaWd,j∥2
204
+ F ≤ N,
205
+ (3)
206
+ as the transmitter’s total power constraint. Substituting (2) into (1), the channel output at the N
207
+ users at frequency bin b can be written as
208
+ yb = HbWaWd,b · sb + nb ∈ CN.
209
+ (4)
210
+ B. Analog Precoders
211
+ The feasible mappings that can be realized by the analog precoder Wa, encapsulated in the set
212
+ A, depend on the hardware architecture. We consider two different architectures for the analog
213
+ precoder: unconstrained precodersZ and fully-connected phase shifter networks.
214
+ 1) Unconstrained Precoder: Here, the analog precoding matrix, Wa, has no hardware con-
215
+ straints, and can realize any complex matrix (while satisfying the overall power constraint (3)).
216
+ For unconstrained precoders, we use A = CM×L. Such analog processing with configurable
217
+ attenuation and phase shifting can be implemented using, e.g., vector modulators, as in [11],
218
+ [12]. While this formulation does not assume any constraints, other than the power constraint, it is
219
+ emphasized that unconstrained solutions can be useful for constrained analog hardware designs,
220
+ which often involve a preliminary step of obtaining an unconstrained combiner followed by its
221
+ projection to the constrained set, as done in, e.g., [10].
222
+ 2) Phase Shifter Networks: A common implementation of analog precoders utilizes phase
223
+ shifters [9], [10]. In fully-connected phase shifter networks, every antenna element is connected
224
+ 6
225
+
226
+ to each RF chain via a dedicated controllable phase shifter. Such precoders are modelled as
227
+ matrices whose entries have a unit magnitude, namely,
228
+ A =
229
+
230
+ A ∈ CM×L���
231
+ ��[A]m,l
232
+ �� = 1,
233
+ ∀(m, l)
234
+
235
+ .
236
+ (5)
237
+ C. Problem Formulation
238
+ We aim at designing the hybrid precoding operation given a channel realization to maximize
239
+ the achievable sum-rate of multiuser downlink MIMO communications. Defining the sum-rate as
240
+ the precoding objective is a common approach [13], [18], [41], being a communication measure
241
+ of the overall combined effect of the channel and the hybrid precoder. We particularly focus on
242
+ two scenarios – sum-rate maximization (given accurate CSI) and robust sum-rate maximization
243
+ (given noisy CSI).
244
+ 1) Sum-Rate Maximization: Since [sbsH
245
+ b ] =
246
+ 1
247
+ N IN, it holds that the following sum-rate is
248
+ achievable [42]
249
+ R (Wa, {Wd,b}b∈B, {Hb}b∈B) = 1
250
+ B
251
+ B
252
+
253
+ b=1
254
+ log
255
+ ����IN +
256
+ 1
257
+ Nσ2HbWaWd,bWH
258
+ d,bWH
259
+ a HH
260
+ b
261
+ ���� .
262
+ (6)
263
+ Consequently, for a given channel realization {Hb}b∈B, we aim to find W(o)
264
+ a
265
+ and {W(o)
266
+ d,b}b∈B, that
267
+ are the solution to the following optimization problem
268
+
269
+ W(o)
270
+ a , {W(o)
271
+ d,b}b∈B
272
+
273
+ =
274
+ argmax
275
+ Wa,{Wd,b}b∈B
276
+ R (Wa, {Wd,b}, {Hb})
277
+ (7)
278
+ s.t.
279
+
280
+
281
+
282
+
283
+
284
+ 1
285
+ B
286
+ �B
287
+ b=1 ∥WaWd,b∥2
288
+ F ≤ N
289
+ Wa ∈ A
290
+ .
291
+ In (7), A is the set of matrices corresponding to the analog precoding models described above, i.e.,
292
+ we seek to find a suitable precoders under the different constraints detailed in Subsection II-B.
293
+ Since the optimization problem (7) must be tackled each time the channel realization changes,
294
+ our proposed solution should not only tackle (7), but also to do it rapidly, i.e., with a predefined
295
+ amount of computations. To achieve this aim, we assume access to a set D of previously
296
+ encountered or simulated channel realizations {Hr}|D|
297
+ r=1, which can be exploited to facilitate
298
+ optimization within a fixed number of operations (dictated by, e.g., the coherence duration of
299
+ the channel).
300
+ 7
301
+
302
+ 2) Robust Sum-Rate Maximization: The optimization problem in (7) relies on knowledge of
303
+ the channel in each frequency bin, i.e., on full CSI. Using (6) as our objective is expected to
304
+ affect the performance of the hybrid precoders when the channel matrices provided as inputs
305
+ are (possibly inaccurate) estimates of the true channel. Consequently, we seek to optimize the
306
+ hybrid precoders in a manner that is robust to a predefined level of inaccuracies in the CSI.
307
+ To formulate this, we consider a noisy sub-channel estimation denoted {Hb + Eb}b∈B, where
308
+ Hb is the true channel realization, and Eb is the estimation error. We wish to design the hybrid
309
+ precoders to be robust to estimation errors within a predefined level ε, i.e., when ∥Eb∥F < ε for
310
+ each b ∈ B. Consequently, we convert (7) into a maximin problem
311
+
312
+ W(o)
313
+ a , {W(o)
314
+ d,b}b∈B
315
+
316
+ =
317
+ argmax
318
+ Wa,{Wd,b}b∈B
319
+
320
+ min
321
+ ∥Eb∥F <ε R (Wa, {Wd,b}, {Hb + Eb})
322
+
323
+ (8)
324
+ s.t.
325
+
326
+
327
+
328
+
329
+
330
+ 1
331
+ B
332
+ �B
333
+ b=1 ∥WaWd,b∥2
334
+ F ≤ N
335
+ Wa ∈ A
336
+ .
337
+ In (8), we seek to maximize the minimal rate resulting from a tolerable estimation error of the
338
+ channel, i.e., an estimation error within the predefined level ε. Again, we wish to carry out robust
339
+ optimization rapidly, and can leverage the set of past channel realizations D to that aim.
340
+ III. RAPID HYBRID PRECODER LEARNED OPTIMIZATION WITH FULL CSI
341
+ We first consider the rapid tuning of the hybrid precoder with full CSI. For each realization
342
+ of the wireless channel {Hb}b∈B, the configuration of the hybrid precoder can be formulated
343
+ as a constrained optimization problem (7). Consequently, one can design a hybrid precoder
344
+ using suitable iterative optimization methods. A candidate method for tackling the optimization
345
+ problem in (7) is PGA. PGA can directly tackle the multi-carrier sum-rate objective in (7), as
346
+ opposed to alternative iterative optimizers for hybrid beamforming which use a relaxed objective
347
+ aiming to approach the fully-digital beamformer as in [10], [15]. An additional motivation for
348
+ aiming at directly optimizing the sum-rate rather than an alternative surrogate objective (which
349
+ may be desired to optimize) stems from the fact that the resulting derivation can be extended to
350
+ robust optimization, i.e., to cope with noisy CSI, as detailed in Section IV. Setting the hybrid
351
+ precoder setup is a channel-dependent task. Consequently, one would have to carry out the
352
+ optimization procedure each time the channel changes, i.e., on each coherence duration, while
353
+ principled iterative optimizers such as PGA tend to be slow and lengthy. To cope with this
354
+ challenge, in this section we present the method of learn-to-optimize hybrid precoding with full
355
+ 8
356
+
357
+ CSI, which is specifically designed to rapidly configure hybrid precoders. Our scheme is based
358
+ on the application of PGA to (7), as detailed in Subsection III-A, whose convergence speed we
359
+ optimize without compromising on interpretability and suitability using deep unfolding [31], as
360
+ we derive in Subsection III-B and discuss in Subsection III-C.
361
+ A. Projected Gradient Ascent
362
+ Problem (7) represents constrained maximization with B + 1 optimization matrix variables
363
+ Wa, {Wd,b}b∈B. Such problems can be tackled using the PGA algorithm combined with alter-
364
+ nating optimization. In this iterative method, each iteration first optimizes Wa while keeping
365
+ {Wd,b}b∈B fixed, then repeats this process for every Wd,b. The optimized matrices are projected
366
+ to guarantee the constraints are not violated.
367
+ To formulate this operation mathematically, we define ˜Hb ≜
368
+
369
+ 1
370
+ Nσ2Hb. Each iteration of index
371
+ k + 1 is comprised of two alternating stages: analog PGA and digital PGA.
372
+ Analog PGA: The update of Wa is carried out according to
373
+ W(k+1)
374
+ a
375
+ = ΠA
376
+
377
+ W(k)
378
+ a
379
+ + µ(k)
380
+ a
381
+
382
+ ∂Wa
383
+ R(W(k)
384
+ a , {W(k)
385
+ d,b}, {Hb})
386
+
387
+ ,
388
+ (9)
389
+ where µ(k)
390
+ a
391
+ is the step size of the gradient step, and ΠA{·} is the projection operator onto the
392
+ set A. The gradient of R with respect to Wa is given by (see Appendix A)
393
+
394
+ ∂Wa
395
+ R(Wa, {Wd,b}, {Hb}) = 1
396
+ B
397
+ B
398
+
399
+ b=1
400
+ ˜HT
401
+ b Gb(Wa, Wd,b, Hb)−T ˜H∗
402
+ bW∗
403
+ aW∗
404
+ d,bWT
405
+ d,b,
406
+ (10)
407
+ where Gb(Wa, Wd,b, Hb) ≜ (IN + ˜HbWaWd,bWH
408
+ d,bWH
409
+ a ˜HH
410
+ b ).
411
+ The projection operator ΠA in (9) depends on the feasible analog mappings. For unconstrained
412
+ architectures, clearly ΠA(A) = A. For fully connected phase shifters based hardware, the
413
+ projection is given by
414
+ ΠA{A} = ˜A,
415
+ [˜A]m,l = [A]m,l
416
+ |[A]m,l|, ∀(m, l).
417
+ (11)
418
+ Digital PGA: The digital precoder is updated after the analog precoder, where the update is
419
+ carried out for all frequencies in parallel. Namely, the gradient step for each b ∈ B is computed
420
+ as
421
+ ˆW(k+1)
422
+ d,b
423
+ = W(k)
424
+ d,b + µ(k)
425
+ d,b
426
+
427
+ ∂Wd,b
428
+ R
429
+
430
+ W(k+1)
431
+ a
432
+ , {W(k)
433
+ d,b}, {Hb}
434
+
435
+ ,
436
+ (12)
437
+ 9
438
+
439
+ where µ(k)
440
+ d,b is the step size. The gradient of R with respect to Wd,b for each b ∈ B is computed
441
+ as (see Appendix A)
442
+
443
+ ∂Wd,b
444
+ R(Wa, {Wd,b}, {Hb}) = 1
445
+ B WT
446
+ a ˜HT
447
+ b Gb(Wa, Wd,b, Hb)−T ˜H∗
448
+ bW∗
449
+ aW∗
450
+ d,b.
451
+ (13)
452
+ After the gradient step is taken for all frequency bins, the solution is projected to meet the
453
+ power constraint via
454
+ W(k+1)
455
+ d,b
456
+ =
457
+
458
+ NB
459
+ �B
460
+ b=1 ∥W(k+1)
461
+ a
462
+ ˆW(k+1)
463
+ d,b
464
+ ∥2
465
+ F
466
+ · ˆW(k+1)
467
+ d,b
468
+ .
469
+ (14)
470
+ The overall procedure is summarized as Algorithm 1. While the initial settings of {W(0)
471
+ d,b}b∈B
472
+ are taken to be random, the initial analog combiner W(0)
473
+ a
474
+ is set to be the first L right-singular
475
+ vectors of
476
+ 1
477
+ B
478
+ �B
479
+ b=1 ˜Hb (the frequency bands sub-channels average). This setting corresponds
480
+ to analog beamforming towards the eigenmodes of the (frequency-average) channel, being the
481
+ part of the capacity achieving precoding method for frequency flat MIMO channels [43, Ch.
482
+ 10]. This principled initialization is numerically shown to notably improve the performance of
483
+ hybrid precoders tuned to directly optimize the rate in (7).
484
+ Algorithm 1: Projected Gradient Ascent for Hybrid Precoding
485
+ Init: Randomize {W(0)
486
+ d,b}b∈B
487
+ W(0)
488
+ a
489
+ ← first L right-singular vectors of
490
+ 1
491
+ B
492
+
493
+ b ˜Hb
494
+ Set step sizes {µ(k)
495
+ d,b}b∈B, µ(k)
496
+ a
497
+ Input: Channel matrices {˜Hb}b∈B
498
+ 1 for k = 0, 1, . . . until convergence do
499
+ 2
500
+ Update W(k+1)
501
+ a
502
+ via (9)
503
+ 3
504
+ for b = 1, . . . , B do
505
+ 4
506
+ Calculate ˆW(k+1)
507
+ d,b
508
+ by (12)
509
+ 5
510
+ end
511
+ 6
512
+ for b = 1, . . . , B do
513
+ 7
514
+ Update W(k+1)
515
+ d,b
516
+ via (14)
517
+ 8
518
+ end
519
+ 9 end
520
+ 10 return {W(k)
521
+ d,b}b∈B and W(k)
522
+ a
523
+ The convergence speed of gradient-based optimizers largely depends on the step sizes, i.e.,
524
+ ���
525
+ µ(k)
526
+ d,b
527
+
528
+ b∈B, µ(k)
529
+ a
530
+ ��
531
+ in Algorithm 1. However, conventional step size optimization methods based
532
+ on, e.g., line search and backtracking [44, Ch. 9], typically involve additional per-iteration
533
+ 10
534
+
535
+ processing which increases the overall complexity and run-time. Hence, a common practice
536
+ is to use pre-defined hand-tuned constant step sizes, which may result in lengthy convergence.
537
+ B. Learn-to-Optimize Hybrid Precoding
538
+ Algorithm 1 optimizes hybrid precoders for a given channel realization. However, its conver-
539
+ gence speed largely depends on its hyperparameters, i.e., the step sizes, which tend to be difficult
540
+ to set. Here, we propose to leverage automated data-based optimizers used in deep learning to
541
+ tune iteration-dependent step sizes, i.e., to learn-to-optimize hybrid precoders in a small and
542
+ predefined number of iterations.
543
+ Our design follows the deep unfolding methodology [30], [31], which designs DNNs as
544
+ iterative optimizers with a fixed number of iterations. In particular, we use as our optimizer
545
+ the PGA method in Algorithm 1 with exactly K iterations. By doing so, we guarantee an exact
546
+ pre-known, and typically small, run-time and complexity in real-time. While the accuracy of
547
+ first-order optimizers such as PGA is typically invariant of the setting of the hyperparameters
548
+ when allowed to run until convergence (under mild conditions, e.g., that the step sizes are
549
+ sufficiently small), their performance is largely affected by these values when the number of
550
+ iterations is fixed. Consequently, our design treats the hyperparameters of an iterative optimizer
551
+ with K iterations as the parameters of a DNN with K layers, and tunes them via end-to-end
552
+ training, based on the available data set D, thus converting PGA into a trainable discriminative
553
+ model [45].
554
+ To formulate this, the step sizes vector of the kth iteration is defined as µk ≜ (µ(k)
555
+ a , . . . , µ(k)
556
+ d,B),
557
+ and the step sizes matrix defined as µ ≜ (µ0, . . . , µK−1)T for K iterations of Algorithm 1. The
558
+ entries of this K ×(B +1) matrix are trainable parameters, that are learned from data. Note that
559
+ end-to-end training is feasible despite the fact that D does not hold the ground truth precoders.
560
+ This follows since the performance of hybrid precoders can be evaluated using the differentiable
561
+ measure in (6), that is used to define a loss function with which the hyperparameters µ are
562
+ trained in an unsupervised manner.
563
+ The loss function, for a given normalized channel ˜H = {˜Hb}b∈B and step sizes µ, is computed
564
+ as a weighted average of the negative resulting achievable sum-rates of this channel (6) in
565
+ each PGAK(˜H, µ) iteration. This implies that the kth iteration sum-rate is computed when the
566
+ precoders are
567
+
568
+ W(k)
569
+ a , {W(k)
570
+ d,b}b∈B
571
+
572
+ ≜ PGAk(˜H, µ), i.e., the precoders obtained via Algorithm 1
573
+ after k < K iterations and step sizes µ. Since each iteration is required to provide a setting of
574
+ 11
575
+
576
+ the hybrid beamformer which gradually improves along the iterative procedure, we adopt the
577
+ following loss, inspired by [46]
578
+ L(˜H, µ) = 1
579
+ K
580
+ K
581
+
582
+ k=1
583
+ log(1 + k) ·
584
+ �−1
585
+ B
586
+ B
587
+
588
+ b=1
589
+ log
590
+ ���IN + ˜HbW(k)
591
+ a W(k)
592
+ d,b
593
+ �˜HbW(k)
594
+ a W(k)
595
+ d,b
596
+ �H���
597
+
598
+ .
599
+ (15)
600
+ The data set D includes channel realizations. Since ˜Hb ≜
601
+
602
+ 1
603
+ Nσ2Hb with known N and σ2, we
604
+ henceforth write the entries of the data set D as {˜Hr}|D|
605
+ r=1.
606
+ The learn-to-optimize method seeks to tune the hyperparameters vector µ to best fit the data
607
+ set D in the sense of the loss measure (15). Namely, we aim at setting
608
+ µ(o) = arg min
609
+ µ
610
+ 1
611
+ |D|
612
+ |D|
613
+
614
+ r=1
615
+ L(˜Hr, µ).
616
+ (16)
617
+ We tackle (16) using deep learning optimization techniques based on, e.g., mini-batch stochastic
618
+ gradient descent, to tune µ based on the data set D. The resulting procedure is summarized
619
+ as Algorithm 2. We initialize µ before the training process, with fixed step sizes with which
620
+ PGA converges. After training, which is based on past channel realization and can thus be done
621
+ offline, the learned µ is used as hyperparameters for rapidly converting a channel realization
622
+ into a hybrid precoding setting via K of Algorithm 1. The resulting unfolded PGA algorithm is
623
+ illustrated in Fig. 2.
624
+ Algorithm 2: Learn-to-Optimize Hybrid Precoding with Full CSI
625
+ Init: Set µ as fixed step sizes.
626
+ Fix learning rate η
627
+ Input: Training set D = {˜Hr}|D|
628
+ r=1
629
+ 1 for epoch = 0, 1, . . . , epochmax − 1 do
630
+ 2
631
+ Randomly divide D into Q batches {Dq}Q
632
+ q=1
633
+ 3
634
+ for q = 1, . . . , Q do
635
+ 4
636
+ Compute precoders via PGAK(Dq, µ)
637
+ 5
638
+ Compute the average loss of the batch: L(µ) =
639
+ 1
640
+ |Dq|
641
+
642
+ ˜H∈Dq L(˜H, µ)
643
+ 6
644
+ Update µ ← µ − η∇µL(µ)
645
+ 7
646
+ end
647
+ 8 end
648
+ 9 return µ
649
+ 12
650
+
651
+ Fig. 2: Unfolded PGA block illustration. The learned parameters are marked in red fonts.
652
+ C. Discussion
653
+ The proposed learn-to-optimize method leverages data to improve the performance and con-
654
+ vergence speed of iterative PGA-based optimization. The resulting precoder design preserves the
655
+ interpretability and simplicity of classic PGA optimization, while inferring at a fixed and low
656
+ delay as done by DNNs applied for such tasks. We thus benefit from the best of both worlds of
657
+ model-based optimization and data-driven deep learning.
658
+ The fact that the number of iterations is fixed and limited is reflected upon the computational
659
+ complexity associated with setting a hybrid precoder for a given channel realization. To quantify
660
+ the complexity, we examine one iteration of Algorithm 1; its complexity is dominated by the
661
+ gradient computation (whose complexity order is O
662
+
663
+ BM 2(N + L)
664
+
665
+ ) in Step 2 (which is of
666
+ the same complexity order as the B gradient computations in Step 12), and by the projection
667
+ required in Step 7 (whose complexity order is O
668
+
669
+ BNML
670
+
671
+ ). For K iterations of Algorithm 1
672
+ and when signaling over B frequency bands, it follows that the overall complexity of the PGA
673
+ algorithm with pre-defined K iterations, as is done by the proposed learned optimizer, is of the
674
+ order of
675
+ CPGA = O
676
+
677
+ K · BM
678
+
679
+ NL + M(N + L)
680
+ ��
681
+ .
682
+ (17)
683
+ The fact that we set our objective to be the rate R(·) results in its gradient computation yielding a
684
+ higher complexity per iteration compared with that used when taking the gradients of a surrogate
685
+ objective, e.g., [15] (where the quadratic dependence is on the number of RF chains rather than
686
+ the number of antennas), while being of a similar order of that used in [16]. However, recall that
687
+ 13
688
+
689
+ H
690
+ Unfolded PGA
691
+ Iteration#1
692
+ Iteration#K
693
+ aR
694
+ (0)
695
+ (K-1)
696
+ aR
697
+ I1.A(-)
698
+ (K-1)
699
+ aw.
700
+ Ha
701
+ aw.
702
+ 11.^()
703
+ +W(K)
704
+ +
705
+ +
706
+ H
707
+ ++
708
+ aR
709
+ ,(0)
710
+ (K-1)
711
+ aR
712
+ Ha,1
713
+ .(K-1)
714
+ aWa,1
715
+ Pa,i
716
+ d.1
717
+ d,1
718
+ aWa.
719
+ W(R)
720
+ d,1
721
+ + +
722
+ + +
723
+ ...
724
+ Digital
725
+ Digital
726
+ Projection
727
+ Projection
728
+ H
729
+ aR
730
+ (0)
731
+ aR
732
+ d.BT
733
+ awd.
734
+ Pa,B
735
+ awa.
736
+ d,B
737
+ d,B
738
+ W(R)
739
+ d,B
740
+ + +
741
+ +our derivation of Algorithm 2 serves as the first step towards rapid and robust optimization of
742
+ the rate, for which these gradient computations are useful, as shown in the sequel. Furthermore,
743
+ the proposed learn-to-optimize framework facilitates implementing the optimizer with a fixed
744
+ and small number of iterations, allowing to limit the overall complexity.
745
+ Our approach follows the deep unfolding methodology [30]–[32]. As opposed to other forms
746
+ of deep unfolded networks, which designed DNNs to imitate the operation of a model-based
747
+ optimizer while modifying its operation, as in, e.g., [46], our design is geared to preserve the
748
+ operation of model-based iterative optimization. We use automated training capabilities of deep
749
+ learning tools to tune the hyperparameters of the optimizer. By doing so, we improve upon
750
+ the conventional usage of fixed hyperparameters, as demonstrated in Section V, and avoid the
751
+ excessive delay of implementing hyperparameter search in each iteration.
752
+ The design objective used in our derivation is the achievable sum-rate (6), which is approached
753
+ using dedicated coding over asymptotically large blocks. While one is likely to deviate from (6)
754
+ in practice, it serves as a fundamental characteristic of the overall channel which encompasses
755
+ hybrid precoding, transmission, and reception, making it a relevant figure-of-merit for optimizing
756
+ hybrid MIMO systems. Furthermore, as the objective in (6) is explicit and differentiable, it
757
+ enables our method to learn-to-optimize in an unsupervised manner, i.e., one does not need
758
+ access to ground-truth precoders as in [19], and can train using solely channel realizations as
759
+ data. Yet, using (6) as our objective is expected to affect the performance of the hybrid precoders
760
+ when the channel matrices provided as inputs are inaccurate estimates of the true channel, in
761
+ the same manner that such CSI errors affect the performance of model-based optimizers. We
762
+ discuss this extension of our method to handling CSI errors in the following section.
763
+ IV. RAPID AND ROBUST HYBRID PRECODER LEARNED OPTIMIZATION WITH NOISY CSI
764
+ In Section III, we designed the hybrid precoder assuming full CSI. The resulting Algorithm 2
765
+ is compatible for a specific channel, therefore, when the estimation of the channel is noisy,
766
+ a performance degradation is expected. When dealing with mismatched CSI, the optimization
767
+ problem can be formulated as (8), where the minimal rate over all bounded errors is maximized.
768
+ In this section we present a method which builds upon our derivation of Algorithm 2 for
769
+ tackling (8) via rapid optimization with a fixed run-time. Our approach is based on the PCMP
770
+ algorithm [39], which is an iterative optimizer suitable for maximin objectives as in (8). As
771
+ detailed in Subsection IV-A, PCMP relies on projected gradient steps, and thus its derivation
772
+ can utilize steps obtained for non-robust optimization via PGA. Thus, following the approach
773
+ 14
774
+
775
+ used in Section III, we employ deep unfolding, leveraging data to optimize its performance within
776
+ a fixed number of iterations, as described in Subsection IV-B. Then, we provide a discussion in
777
+ Subsection IV-C.
778
+ A. Projected Conceptual Mirror Prox Robust Optimization
779
+ The formulation in (8) represents a constrained maximin optimization problem with 2B + 1
780
+ optimization (and auxiliary) matrix variables Wa, {Wd,b}b∈B, {Eb}b∈B. Such problems can be
781
+ tackled by combining the conceptual mirror prox (CMP) algorithm [39] with alternating opti-
782
+ mization and projections, resulting in the PCMP method.
783
+ PCMP is an iterative method. Each iteration is comprised of two stages: CMP and projection.
784
+ We next formulate these stages in the context of (8).
785
+ CMP: The objective in (8) is maximized according to the analog and digital precoding
786
+ matrices, and minimized according to the error matrices. CMP aims at iteratively refining the
787
+ optimization variables via gradient steps, which at iteration index k + 1 take the form
788
+
789
+ W(k+1)
790
+ a
791
+ , {W(k+1)
792
+ d,b
793
+ }b∈B, {E(k+1)
794
+ b
795
+ }b∈B
796
+
797
+ =
798
+
799
+ W(k)
800
+ a , {W(k)
801
+ d,b}b∈B, {E(k)
802
+ b }b∈B
803
+
804
+ + µ(k)
805
+
806
+
807
+ ∂Wa
808
+ ,
809
+
810
+
811
+ ∂Wd,b
812
+
813
+ , −
814
+ � ∂
815
+ ∂Eb
816
+ ��
817
+ R
818
+
819
+ W(k+1)
820
+ a
821
+ , {W(k+1)
822
+ d,b
823
+ }b∈B, {Hb + E(k+1)
824
+ b
825
+ }b∈B
826
+
827
+ .
828
+ (18)
829
+ The computation in (18) cannot be directly implemented in general since the gradients are
830
+ taken with respect to the updated optimization variables (i.e., the iteration index k + 1 appears
831
+ on both sides of the update equation). However, it can be approached via additional iterative
832
+ updates with index i of the form [39, Eq. (6)]
833
+ ˆWa,(i) = W(k)
834
+ a
835
+ + µ(k)
836
+ a,(i) ·
837
+
838
+ ∂Wa
839
+ R
840
+
841
+ ˆWa,(i−1), { ˆWd,b,(i−1)}, {Hb + ˆEb,(i−1)}
842
+
843
+ ,
844
+ (19a)
845
+ ˆWd,b,(i) = W(k)
846
+ d,b + µ(k)
847
+ d,b(i) ·
848
+
849
+ ∂Wd,b
850
+ R
851
+
852
+ ˆWa,(i−1), { ˆWd,b,(i−1)}, {Hb + ˆEb,(i−1)}
853
+
854
+ , ∀b ∈ B,
855
+ (19b)
856
+ ˆEb,(i) = E(k)
857
+ b
858
+ − µ(k)
859
+ e,b(i) ·
860
+
861
+ ∂Eb
862
+ R
863
+
864
+ ˆWa,(i−1), { ˆWd,b,(i���1)}, {Hb + ˆEb,(i−1)}
865
+
866
+ , ∀b ∈ B.
867
+ (19c)
868
+ In (19), µ(k)
869
+ a(i), µ(k)
870
+ d,b(i), µ(k)
871
+ e,b(i) are the step sizes. The optimization variables in (19) are initialized to
872
+
873
+ ˆWa,(0), { ˆWd,b,(0)}b∈B, {ˆEb,(0)}b∈B
874
+
875
+ =
876
+
877
+ W(k)
878
+ a , {W(k)
879
+ d,b}b∈B, {E(k)
880
+ b }b∈B
881
+
882
+ .
883
+ (20)
884
+ 15
885
+
886
+ The computation of the gradients in (19) with respect to the analog and digital precoders can
887
+ use the gradient formulations derived for PGA in (10) and (13), respectively. The gradient of R
888
+ with respect to Eb for each b ∈ B is computed as (see Appendix B)
889
+
890
+ ∂Eb
891
+ R(Wa, {Wd,b}, {Hb+Eb}) = 1
892
+ B Gb(Wa, Wd,b, Hb+Eb)−T(˜H∗
893
+ b+E∗
894
+ b)W∗
895
+ aW∗
896
+ d,bWT
897
+ d,bWT
898
+ a .
899
+ (21)
900
+ While the above CMP procedure introduces an additional iterative procedure which has to be
901
+ carried out at each iteration of index k, it is typically sufficient to only carry out two iterations
902
+ of (19) [47], i.e., repeat (19) for i = 1, . . . , imax with imax = 2.
903
+ Projection: After the CMP is conducted for two iterations, the resulting matrices, denoted
904
+
905
+ ˆWa,(imax), { ˆWd,b,(imax)}b∈B, {ˆEb,(imax)}b∈B
906
+
907
+ , are projected to meet the constraints. Thus, the
908
+ update rule at iteration k + 1 is
909
+ W(k+1)
910
+ a
911
+ = ΠA
912
+
913
+ ˆWa,(imax)
914
+
915
+ ,
916
+ (22a)
917
+ W(k+1)
918
+ d,b
919
+ =
920
+
921
+ NB
922
+ �B
923
+ b=1 ∥W(k+1)
924
+ a
925
+ ˆWd,b,(imax)∥2
926
+ F
927
+ · ˆWd,b,(imax),
928
+ ∀b ∈ B,
929
+ (22b)
930
+ E(k+1)
931
+ b
932
+ = min
933
+
934
+ ε · NM
935
+ ∥ˆEb,(imax)∥F
936
+ , 1
937
+
938
+ · ˆEb,(imax),
939
+ ∀b ∈ B,
940
+ (22c)
941
+ where ε is the error bound on the entries of the sub-channel matrix, {Hb}b∈B ∈ CN×M.
942
+ The overall procedure is summarized as Algorithm 3. The matrices W(0)
943
+ a , {W(0)
944
+ d,b}b∈B are
945
+ initialized in the same manner as in Algorithm 1, while {E(0)
946
+ b }b∈B is generated randomly while
947
+ normalizing to guarantee that ∥Eb∥F < ϵ for each b ∈ B. Notice that Algorithm 3 describes
948
+ a gradient-based optimizer, similar to Algorithm 1. Therefore, its convergence speed depends
949
+ as well on the step sizes µ(k)
950
+ a(i), {µ(k)
951
+ d,b(i)}b∈B, {µ(k)
952
+ e,b(i)}b∈B, which are hard to select manually. In
953
+ Subsection IV-B we will describe the learn-to-rapidly-optimize method, extending the rationale
954
+ used with full CSI in Algorithm 2, for accelerating Algorithm 3 convergence via data-aided
955
+ hyperparameters tuning.
956
+ B. Robust Learn-to-Optimize Hybrid Precoding
957
+ Algorithm 3 optimizes hybrid precoders for a given noisy channel realization. Nevertheless, it
958
+ needs to be executed in real-time, whenever there is a change in the channel, and thus the need
959
+ to obtain reliable hybrid precoders rapidly, i.e., within a fixed and small number of iterations,
960
+ still applies. To accomplish this, we use the deep unfolding methodology following the approach
961
+ 16
962
+
963
+ Algorithm 3: Projected Conceptual Mirror Prox for Robust Hybrid Precoding
964
+ Init: Randomize {W(0)
965
+ d,b}b∈B, {E(0)
966
+ b }b∈B
967
+ W(0)
968
+ a
969
+ ← first L right-singular vectors of
970
+ 1
971
+ B
972
+
973
+ b ˜Hb
974
+ Set step sizes µ(k)
975
+ a(i), {µ(k)
976
+ d,b(i)}b∈B, {µ(k)
977
+ e,b(i)}b∈B
978
+ Input: Channel matrices {˜Hb}b∈B
979
+ 1 for k = 0, 1, . . . until convergence do
980
+ 2
981
+ Set (20)
982
+ 3
983
+ for i = 1, . . . , imax do
984
+ 4
985
+ Calculate
986
+
987
+ ˆWa,(i), { ˆWd,b,(i)}b∈B, {ˆEb,(i)}b∈B
988
+
989
+ by (19)
990
+ 5
991
+ end
992
+ 6
993
+ Update
994
+
995
+ W(k+1)
996
+ a
997
+ , {W(k+1)
998
+ d,b
999
+ }b∈B, {E(k+1)
1000
+ b
1001
+ }b∈B
1002
+
1003
+ via (22)
1004
+ 7 end
1005
+ 8 return {W(k)
1006
+ d,b}b∈B and W(k)
1007
+ a
1008
+ as in Subsection III-B, leveraging its ability to tune hyperparameters in optimization involving
1009
+ projected gradients of the rate function, where the main differences are in the number of learned
1010
+ parameters and in the algorithm structure.
1011
+ We use the PCMP method as the optimizer with exactly K iterations and imax = 2 in-
1012
+ ternal iterations. Let us define the step sizes vector for the analog update of the kth itera-
1013
+ tion as µk
1014
+ a ≜ (µ(k)
1015
+ a(1), µ(k)
1016
+ a(2))T; step sizes vectors for the digital updates of the kth iteration as
1017
+ {µk
1018
+ d,b}b∈B ≜ {(µ(k)
1019
+ d,b(1), µ(k)
1020
+ d,b(2))T}b∈B; and the step sizes vector for the error updates as {µk
1021
+ e,b}b∈B ≜
1022
+ {(µ(k)
1023
+ e,b(1), µ(k)
1024
+ e,b(2))T}b∈B. Accordingly, we define the kth iteration 2 × 2B + 1 step sizes matrix
1025
+ as µk ≜ (µk
1026
+ a, µk
1027
+ d,1, . . . , µk
1028
+ d,B, µk
1029
+ e,1, . . . , µk
1030
+ e,B), obtaining the K × 2 × 2B + 1 step sizes tensor
1031
+ µ ≜ (µ0, . . . , µK−1) for K iterations of Algorithm 3.
1032
+ The unfolded architecture converts the PCMP method with K iteration into a discriminative
1033
+ algorithm whose trainable parameters are the entries of µ. Similarly to the approach used in
1034
+ Subsection III-B, we train the unfolded PCMP in an unsupervised manner, i.e., the data set only
1035
+ includes channel realizations, while the level of tolerable error ε is given. The loss function
1036
+ for a given normalized channel ˜H = {˜Hb}b∈B and step sizes µ is computed as the maximal
1037
+ negative resulting achievable sum-rate of this channel, (6) when the maximum is taken over all
1038
+ ∥Eb∥F < ε, and the precoders are
1039
+
1040
+ W(K)
1041
+ a
1042
+ , {W(K)
1043
+ d,b }b∈B
1044
+
1045
+ ≜ PCMPK(˜H, µ), i.e., the precoders
1046
+ obtained via Algorithm 3 with K iterations and step sizes µ. The resulting loss is
1047
+ L(˜H, µ)= max
1048
+ ∥Eb∥F <ε
1049
+
1050
+ −1
1051
+ B
1052
+ B
1053
+
1054
+ b=1
1055
+ log
1056
+ ����IN +
1057
+ 1
1058
+ Nσ2(Hb+Eb)W(K)
1059
+ a
1060
+ W(K)
1061
+ d,b
1062
+
1063
+ (Hb+Eb)W(K)
1064
+ a
1065
+ W(K)
1066
+ d,b
1067
+ �H
1068
+ ����
1069
+
1070
+ . (23)
1071
+ The maximization term in (23) notably complicates its usage as a training objective for learning
1072
+ 17
1073
+
1074
+ the PCMP hyperparameters. To overcome this, we generate a finite set of ne error patterns
1075
+ (satisfying ∥Eb∥F < ε) via random generation, to which we add the zero error, i.e., E ≜
1076
+
1077
+ {Et
1078
+ b}b∈B
1079
+ �ne
1080
+ t=1∪{0}, and seek the setting which minimizes the maximal loss among these error
1081
+ patterns. Namely, to maintain feasible training, the objective used for training the unfolded
1082
+ algorithm evaluates the loss based on its output after K iterations and is given by
1083
+ ˜L(˜H, µ)=max
1084
+ Eb∈E
1085
+
1086
+ −1
1087
+ B
1088
+ B
1089
+
1090
+ b=1
1091
+ log
1092
+ ����IN +
1093
+ 1
1094
+ Nσ2(Hb+Eb)W(K)
1095
+ a
1096
+ W(K)
1097
+ d,b
1098
+
1099
+ (Hb+Eb)W(K)
1100
+ a
1101
+ W(K)
1102
+ d,b
1103
+ �H
1104
+ ����
1105
+
1106
+ .
1107
+ (24)
1108
+ The robust learn-to-optimize method, summarized as Algorithm 4, uses data to tune µ. We
1109
+ initialize µ before the training process, with fixed step sizes with which PCMP converges (though
1110
+ not necessarily rapidly). After training, the learned matrix µ is used as hyperparameters for
1111
+ rapidly converting a noisy channel realization into a hybrid precoding setting via K iterations
1112
+ of Algorithm 3.
1113
+ Algorithm 4: Robust Learn-to-Optimize Hybrid Precoding
1114
+ Init: Set µ as fixed step sizes. Fix learning rate η
1115
+ Input : Training set D = {˜Hr}|D|
1116
+ r=1
1117
+ 1 for epoch = 0, 1, . . . , epochmax − 1 do
1118
+ 2
1119
+ Randomly divide D into Q batches {Dq}Q
1120
+ q=1
1121
+ 3
1122
+ for q = 1, . . . , Q do
1123
+ 4
1124
+ Compute precoders via PCMPK(Dq, µ)
1125
+ 5
1126
+ Compute the average loss of the batch: L(µ) =
1127
+ 1
1128
+ |Dq|
1129
+
1130
+ ˜H∈Dq ˜L(˜H, µ)
1131
+ 6
1132
+ Update µ ← µ − η∇µL(µ)
1133
+ 7
1134
+ end
1135
+ 8 end
1136
+ 9 return µ
1137
+ C. Discussion
1138
+ The proposed robust learn-to-optimize method in Algorithm 4 extends the method in Algo-
1139
+ rithm 2 to cope with noisy CSI. In particular, for the special case of ε = 0 and imax = 1,
1140
+ it holds that the PCMP algorithm (Algorithm 3) reduces to the PGA method (Algorithm 1).
1141
+ Accordingly, the data-aided optimized Algorithm 4 specializes Algorithm 2. Consequently, our
1142
+ gradual design, which started with designing learned PGA optimization applied to the rate
1143
+ function in Section III, allowed us to extend its derivation to realize robust learned PCMP
1144
+ algorithm for maximin rate optimization. In addition, this implementation shows that the general
1145
+ 18
1146
+
1147
+ learn-to-optimize method can be adapted for speeding the convergence of a broad range iterative
1148
+ model-based hyperparameters-depending algorithms, and particularly those utilizing gradient and
1149
+ projection steps.
1150
+ In terms of complexity, the unfolded PCMP with K iterations and imax = 2 shares the same
1151
+ complexity order as that the PGA method with full CSI. In particular, Step 4 of Algorithm 3
1152
+ repeats the gradient computations of Algorithm 1 imax times per iteration and includes additional
1153
+ gradients with respect to Eb (which is of the same complexity as taking the gradients with respect
1154
+ to Wd,b). Thus, the complexity order of the unfolded PCMP algorithm is
1155
+ CPCMP = O
1156
+
1157
+ K · BM
1158
+
1159
+ NL + M(N + L)imax
1160
+ ��
1161
+ ,
1162
+ (25)
1163
+ which, for imax = 2, yields a similar complexity as that of the unfolded PGA in (17).
1164
+ The ability to rapidly optimize in a robust manner via the unfolded PCMP results in hybrid
1165
+ precoders that are less sensitive to channel estimation errors. The PCMP algorithm is coping
1166
+ with mismatched channels by considering a wide range of channel errors when setting the hybrid
1167
+ precoders. While the PGA algorithm is carried out each time the channel changes, the PCMP
1168
+ algorithm can be carried out less frequently since it is more robust and stable. Accordingly, the
1169
+ PCMP can be also used to reduce the rate in which the optimization procedure is carried out,
1170
+ and not only for coping with mismatched channels.
1171
+ The error bound value, ε, plays a key role in the robust algorithm. It affects the robustness,
1172
+ reliability, and stability of the solution, and therefore, it needs to be chosen based on some prior
1173
+ knowledge, or on application needs. Another approach is to use channel estimation methods prior
1174
+ to the precoders design we presented in this work, and by this overcome the mismatched channel
1175
+ problem. An additional important parameter is the setting of the expected error patterns evaluated
1176
+ during training, i.e., E. While in our evaluation we generated this set in a random fashion and
1177
+ included in it the zero-error pattern to guarantee suitability for error-free case, one can consider
1178
+ alternative methods for preparing this set such that the resulting optimized hyperparameters
1179
+ would be most suitable for the desired robust optimization metric. Since this setting is carried
1180
+ out offline and thus complexity is not a key issue here, one can possibly explore the usage of
1181
+ sequential sampling and Bayesian optimization techniques [48] for setting E. We leave the study
1182
+ of extensions of our method to future work.
1183
+ 19
1184
+
1185
+ V. NUMERICAL EVALUATIONS
1186
+ We next numerically evaluate the proposed unfolded optimization framework1. Our main
1187
+ purpose is to numerically demonstrate the ability of the proposed learn-to-optimize framework
1188
+ to notably reduce the number of iterations compared with conventional optimization with fixed
1189
+ hyperparameters.
1190
+ Our numerical evaluations commence with settings with full CSI in Subsection V-A. As the
1191
+ full CSI setting (with analog combiners constrained to represent phase shifter network) is the
1192
+ common setup considered for hybrid precoding, this numerical evaluation allows us to compare
1193
+ the first step of our design, i.e., the unfolded PGA method, to existing optimization methods.
1194
+ Then, we consider robust optimization based on the unfolded PCMP in Subsection V-B. For
1195
+ both CSI settings, we simulate two different models for the downlink hybrid MIMO system as
1196
+ described in Subsection II-A: Rayleigh fading, where the channel matrix in each frequency bin is
1197
+ randomized from an i.i.d. Gaussian distribution; and the QuaDRiGa model [40], an open source
1198
+ geometry-based stochastic channel model, relevant for simulating realistic MIMO systems.
1199
+ A. Hybrid Precoding with Full CSI
1200
+ For full CSI, the optimizer for designing the hybrid precoder is PGA, and its data-aided
1201
+ learn-to-optimize version is detailed Subsection III-B. The implementation of this method can
1202
+ be carried out for both unconstrained analog combiners (for which the only constraint is the
1203
+ power constraint), as well as hardware-limited designs, where a common constraint is that of
1204
+ phase shifter networks. We thus divide our evaluation into learned PGA with unconstrained
1205
+ analog combiners and PGA with phase shifters.
1206
+ 1) PGA using unconstrained analog combiners: In this case we use the analog projection
1207
+ operator as ΠA(A) = A, i.e., we do not impose any constraints on the analog architecture. Such
1208
+ unconstrained combiners can be approximated using architectures proposed in, e.g. [11], [12].
1209
+ We consider three different settings for the number frequency bands B, the number of users
1210
+ N, the number of RF chains L, the number of transmit antennas M, and for the data source:
1211
+ 1) A Rayleigh channel with 8 frequency bins, configured with B = 8, N = 6, L = 10, M = 12;
1212
+ 2) A QuaDRiGa channel with B = 16 frequency bins, where we use N = 4, L = 6, M = 12;
1213
+ 3) A wideband QuaDRiGa channel with B = 128, N = 4, L = 8, M = 16.
1214
+ For each configuration, we applied Algorithm 2 to learn to set hybrid precoders with merely
1215
+ 1The complete source is available at https://github.com/ortalagiv/Learn-to-Rapidly-Optimize-Hybrid-Precoding.
1216
+ 20
1217
+
1218
+ K = 5, 10 iterations based on |D| = 1000 channel realization, where we used 50 − 70 epochs
1219
+ with batch size |Dq| = 100 and used Adam for the update in Step 6 of Algorithm 2.
1220
+ The PGA hybrid precoding design with K optimized iterations is compared with applying
1221
+ PGA with fixed hyperparameters, where we used a constant step size chosen based on empirical
1222
+ trials. Both hybrid precoders are evaluated over 100 unseen test channels. The simulation results
1223
+ for the settings of (B = 8, N = 6, L = 10, M = 12), (B = 16, N = 4, L = 6, M = 12), and
1224
+ (B = 128, N = 4, L = 8, M = 16) are depicted in Fig. 3, Fig. 4, and Fig. 5, respectively,
1225
+ where each figure compares both the convergence of the algorithms averaged over all channel
1226
+ realizations and for the randomly chose realizations, as well as the resulting sum-rates versus
1227
+ SNR.
1228
+ The resulting sum-rates (for SNR= 0dB) versus the number of PGA iterations, of both
1229
+ the unfolded PGA and the classical PGA (with manually chosen constant step sizes), when
1230
+ averaged over all unseen channels, and for two random channel realizations, are depicted in
1231
+ Fig. 3a, Fig. 4a, and Fig. 5a. We observe in these figures that the proposed learn-to-optimize
1232
+ consistently facilitates simple PGA optimization of the hybrid precoders, achieving similar
1233
+ and even surpassing the sum-rates achieved by conventional PGA with fixed step sizes, while
1234
+ requiring much fewer iterations. The reduction in the number of iterations due to learn-to-
1235
+ optimize is by factors of 20 (5 iterations vs. 100 iterations) and 10 (10 iterations vs. 100
1236
+ iterations) in speed, compared to conventional fixed-size optimization. These gains are consistent
1237
+ over the different channel models and configurations considered. Fig. 3b, Fig. 4b, and Fig. 5b
1238
+ illustrate the sum-rate for different values of SNR, of the proposed unfolded PGA compared
1239
+ with that of the classical PGA and the sum-rate resulting from fully digital baseband precoding,
1240
+ serving as an upper bound on the achievable sum-rate. The figures show the gain of converting
1241
+ the classical PGA algorithm in a discriminative trainable model. In particular, the unfolded
1242
+ algorithm implements PGA with merely few iterations while systematically improving upon
1243
+ conventional PGA with fixed step size and 100 iterations. These results demonstrate the benefits
1244
+ of the proposed approach in leveraging data to improve both performance and convergence speed
1245
+ while preserving the interpretability and suitability of conventional iterative optimizers.
1246
+ 2) PGA using phase shifters networks: The numerical evaluation above showed that the
1247
+ considered deep unfolding methodology indeed facilitates rapid optimization of hybrid precoders.
1248
+ To demonstrate that these gains are not unique to unconstrained analog combiners, as well as to
1249
+ compare with alternative iterative optimizers, we next consider phase shifters networks for the
1250
+ 21
1251
+
1252
+ (a) Sum-rate per PGA iteration.
1253
+ (b) Sum-rate vs. SNR.
1254
+ Fig. 3: Rayleigh channel; unconstrained analog precoder; B = 8, N = 6, L = 10, M = 12.
1255
+ (a) Sum-rate per PGA iteration.
1256
+ (b) Sum-rate vs. SNR.
1257
+ Fig. 4: QuaDRiGa channel; unconstrained analog precoder; B = 16, N = 4, L = 6, M = 12.
1258
+ (a) Sum-rate per PGA iteration.
1259
+ (b) Sum-rate vs. SNR.
1260
+ Fig. 5: QuaDRiGa channel; unconstrained analog precoder; B = 128, N = 4, L = 8, M = 16.
1261
+ 22
1262
+
1263
+ 19.5
1264
+ 19
1265
+ 19.0
1266
+ 18
1267
+ 18.5
1268
+ Achievable Rate
1269
+ 17
1270
+ 16
1271
+ 18.0
1272
+ 15
1273
+ 17.5
1274
+ 14
1275
+ : Average on all realizations - Classical PGA
1276
+ Average on all realizations - Unfolded PGA
1277
+ ?Realization#1-UnfoldedPGA
1278
+ 17.0
1279
+ 13
1280
+ Realization#1-ClassicalPGA
1281
+ Realization #2 - Unfolded PGA
1282
+ 12
1283
+ Realization #2 -Classical PGA
1284
+ 345
1285
+ 1
1286
+ 20
1287
+ 40
1288
+ 60
1289
+ 80
1290
+ 100
1291
+ NumberofIterationClassical PGA - 1oo iterations
1292
+ Classical PGA - 5 iterations
1293
+ Unfolded PGA - 5 iterations
1294
+ 25
1295
+ Fully digital
1296
+ Rate
1297
+ 20
1298
+ Achievable
1299
+ 15
1300
+ 10
1301
+ 5
1302
+ -4
1303
+ -3
1304
+ -2
1305
+ -1
1306
+ 0
1307
+ 1
1308
+ 2
1309
+ 3
1310
+ 4
1311
+ 5
1312
+ SNR[dB]14
1313
+ 14
1314
+ 13
1315
+ 13
1316
+ Achievable Rate
1317
+ 12
1318
+ 12
1319
+ 11
1320
+ 11
1321
+ Average on all realizations - Classical PGA
1322
+ Average on all realizations - Unfolded PGA
1323
+ ←Realization#1-UnfoldedPGA
1324
+ 10 +
1325
+ Realization #1 - Classical PGA
1326
+ 10
1327
+ Realization #2 - Unfolded PGA
1328
+ Realization #2 - Classical PGA
1329
+ 1
1330
+ 5
1331
+ 10
1332
+ 1
1333
+ 20
1334
+ 40
1335
+ 60
1336
+ 80
1337
+ 100
1338
+ NumberofIterationClassical PGA - 1oo iterations
1339
+ 20
1340
+ ClassicalPGA - 10 iterations
1341
+ Unfolded PGA - 1o iterations
1342
+ 18
1343
+ Fully digital
1344
+ 13
1345
+ Rate
1346
+ 16
1347
+ Achievable
1348
+ 12
1349
+ 14
1350
+ 11
1351
+ 12
1352
+ .1
1353
+ 0
1354
+ 10
1355
+ 8
1356
+ -5
1357
+ -4
1358
+ 3
1359
+ -2
1360
+ -1
1361
+ 0
1362
+ 1
1363
+ 2
1364
+ m
1365
+ 4
1366
+ 5
1367
+ SNR [dB]16
1368
+ 16
1369
+ 15
1370
+ 15
1371
+ 14
1372
+ Rate
1373
+ 14
1374
+ Achievable I
1375
+ 13
1376
+ 13
1377
+ 12
1378
+ Average on all realizations - Classical PGA
1379
+ 12
1380
+ Average on all realizations - Unfolded PGA
1381
+ 11
1382
+ Realization#1-UnfoldedPGA
1383
+ Realization #1 - Classical PGA
1384
+ 11
1385
+ Realization #2 - Unfolded PGA
1386
+ 10
1387
+ Realization #2 - Classical PGA
1388
+ 1
1389
+ 5
1390
+ 10
1391
+ L
1392
+ 20
1393
+ 40
1394
+ 60
1395
+ 80
1396
+ 100
1397
+ NumberofIterationClassical PGA - 1oo iterations
1398
+ 22
1399
+ Classical PGA - 10 iterations
1400
+ Unfolded PGA - 1o iterations
1401
+ 20
1402
+ +Fully digital
1403
+ 18
1404
+ 16
1405
+ Rate
1406
+ Achievable
1407
+ 16
1408
+ 15
1409
+ 14
1410
+ 0
1411
+ 12
1412
+ 10
1413
+ 8
1414
+ -5
1415
+ -4
1416
+ -3
1417
+ -2
1418
+ -1
1419
+ 0
1420
+ 1
1421
+ 2
1422
+ 3
1423
+ 4
1424
+ 5
1425
+ SNR [dB]implementation of the analog architecture, as often considered in the literature. This means that
1426
+ the projection in (11) is used in Step 2 of Algorithm 1. We used as a benchmark the MO-AltMin
1427
+ algorithm of [15], which is designed to iteratively optimize such constrained hybrid precoders.
1428
+ We consider the QuaDRiGa channel model for two different settings of the number frequency
1429
+ bands B, users N, RF chains L, and transmit antennasM: 1) B = 16, N = 4, L = 2, M = 12;
1430
+ and 2) B = 128, N = 4, L = 2, M = 16. Similarly to the unconstrained case, for each setting,
1431
+ we apply Algorithm 2 to learn the hyperparameters for which the PGA converges with K = 5
1432
+ iterations. In the training procedure we use |D| = 1000 channels for each setting, where we
1433
+ used 50 epochs with batch size |Dq| = 100 and used Adam for the update in Step 6. The
1434
+ PGA with K = 5 learned iterations is compared with the PGA with fixed hyperparameters,
1435
+ chosen empirically. The hybrid precoders optimizers are evaluated over 100 unseen test channels.
1436
+ The performance evaluation results are shown in Fig. 6, and Fig. 7, for the settings of B =
1437
+ 16, N = 4, L = 2, M = 12, and B = 128, N = 4, L = 2, M = 16, respectively, where each
1438
+ figure examines both the convergence curves as well as the sum-rate achieved at the end of the
1439
+ optimization procedure versus SNR.
1440
+ The resulting sum-rate (for SNR= 0dB) versus the number of PGA iterations, when averaged
1441
+ over all unseen channels, and of two random channel realizations, is shown in Fig. 6a, and
1442
+ Fig. 7a. We observe in these figures that the learn-to-optimize method is able to accelerate and
1443
+ outperform the PGA optimization, when compared to the standard PGA, with constant, manually
1444
+ chosen, step sizes. Observe that the number of iterations is reduced by 20 (5 iterations vs. 100),
1445
+ compared to standard optimization. The gain in performance systematically observed here follows
1446
+ from the ability of data-driven optimization to facilitate coping with the non-convex nature of
1447
+ the resulting optimization problem. Fig. 6b, and Fig. 7b demonstrate the comparison between
1448
+ the proposed unfolded PGA, the classical PGA, the MO-Altmin algorithm of [15], and fully
1449
+ digital baseband precoding. It is shown that the gap from the fully digital baseband precoding is
1450
+ significant, due to the use of a relatively small number of RF chains in the hybrid architecture.
1451
+ When comparing the iterative algorithms we see a small difference in terms of sum-rate, but
1452
+ it is important to consider the fact that the proposed unfolded PGA operates with the least
1453
+ number of iterations, therefor it achieves improvement in terms of speed when comparing to the
1454
+ benchmark and to the standard PGA. These results show the ability of the proposed learn-to-
1455
+ optimize technique to tackle and incorporate different constraints into the PGA algorithm while
1456
+ enabling rapid performance and fully preserving interpretability.
1457
+ 23
1458
+
1459
+ (a) Sum-rate per PGA iteration.
1460
+ (b) Sum-rate vs. SNR.
1461
+ Fig. 6: QuaDRiGa channel; constrained analog precoder; B = 16, N = 4, L = 2, M = 12.
1462
+ (a) Sum-rate per PGA iteration.
1463
+ (b) Sum-rate vs. SNR.
1464
+ Fig. 7: QuaDRiGa channel; constrained analog precoder; B = 128, N = 4, L = 2, M = 16.
1465
+ B. Hybrid Precoding with Noisy CSI
1466
+ The numerical studies reported in Subsection V-A empirically validate the ability of the pro-
1467
+ posed methodology to facilitate rapid optimization under different settings. We next demonstrate
1468
+ its ability to simultaneously enable rapid and robust hybrid precoding. Hence, in the following,
1469
+ we consider the unfolding of the PCMP algorithm for precoding under noisy channel estimation.
1470
+ Having demonstrated the ability of our approach to deal with constrained precoders, we focus
1471
+ here on unconstrained analog combiners. According, we implement of the learn-to-optimize
1472
+ methodology, i.e. Algorithm 4, for Algorithm 3, when the projection operator applied on the
1473
+ analog precoder in Step 6 is set to be ΠA(A) = A. The set of considered error patterns E is
1474
+ comprised of ne = 20 patterns randomly generated with Frobenius norm values in the range
1475
+ (0, ϵ), and we evaluate the maximin rate over E.
1476
+ We examine two different settings of the number frequency bands B, users N, RF chains
1477
+ 24
1478
+
1479
+ Classical PGA - 1oo iterations
1480
+ 20
1481
+ Classical PGA - 5 iteriterations
1482
+ MO AltMin - 3o iterations (average)
1483
+ 18
1484
+ Unfolded PGA - 5 iterations
1485
+ Fully digital
1486
+ 16
1487
+ 10
1488
+ Rate
1489
+ Achievable
1490
+ 14
1491
+ 12
1492
+ 10
1493
+ 8
1494
+ 6
1495
+ -5
1496
+ -4
1497
+ -3
1498
+ -2
1499
+ -1
1500
+ 0
1501
+ 1
1502
+ 2
1503
+ 3
1504
+ 4
1505
+ 5
1506
+ SNR [dB]10.4
1507
+ 10.4
1508
+ -: Average on all realizations - Classical PGA
1509
+ Average on all realizations - Unfolded PGA
1510
+ Realization #1 - Unfolded PGA
1511
+ 10.2
1512
+ Realization #1 - Classical PGA
1513
+ 10.2
1514
+ Realization #2 -Unfolded PGA
1515
+ Realization #2 - Classical PGA
1516
+ 10.0
1517
+ AchievableRate
1518
+ 10.0
1519
+ 9.8 -
1520
+ 9.8
1521
+ F 9'6
1522
+ 9.6
1523
+ 9.4 -
1524
+ 9.4
1525
+ 12345
1526
+ 1
1527
+ 20
1528
+ 40
1529
+ 60
1530
+ 80
1531
+ 100
1532
+ Numberof Iteration22
1533
+ Classical PGA - 1oo iterations
1534
+ Classical PGA - 5 iteriterations
1535
+ MO AltMin - 74 iterations (average)
1536
+ 20
1537
+ Unfolded PGA - 5 iterations
1538
+ Fully digital
1539
+ 18
1540
+ Rate
1541
+ 10
1542
+ 16
1543
+ Achievable
1544
+ 14
1545
+ 9
1546
+ 12
1547
+ 10
1548
+ 8
1549
+ 6
1550
+ 5
1551
+ -2
1552
+ -1
1553
+ 0
1554
+ 1
1555
+ 2
1556
+ m
1557
+ 4
1558
+ 5
1559
+ SNR [dB]9.8
1560
+ 9.8
1561
+ 9.6
1562
+ 9.6
1563
+ Achievable Rate
1564
+ 9.4
1565
+ 9.4
1566
+ 9.2
1567
+ 9.2
1568
+ Average on all realizations - Classical PGA
1569
+ 9.0
1570
+ Average on all realizations - Unfolded PGA
1571
+ Realization #1-Unfolded PGA
1572
+ Realization #1 - Classical PGA
1573
+ 9.0
1574
+ Realization #2 - Unfolded PGA
1575
+ 8.8
1576
+ Realization #2 - Classical PGA
1577
+ 12345
1578
+ 1
1579
+ 20
1580
+ 40
1581
+ 60
1582
+ 80
1583
+ 100
1584
+ NumberofIterationL, transmit antennas M, and the data source: B = 8, N = 6, L = 10, M = 12, with Rayleigh
1585
+ channels; and B = 16, N = 4, L = 6, M = 12 with QuaDRiGa channel model, the simulations
1586
+ results for each setting are demonstrated in Fig. 8, and Fig. 9, respectively. Again, we evaluate
1587
+ both the convergence rate and the minimal rate (within the tolerable error regime) at the end of
1588
+ the optimization procedure versus SNR, and compare our results with the conventional PCMP
1589
+ optimizer. In the simulations, three error bound values are considered, ε = 0.005, 0.05, 0.5. For
1590
+ each setting, we applied Algorithm 4 to learn to set hybrid precoders with K = 5 iterations based
1591
+ on |D| = 1000 channels, where we used 40 − 50 epochs with batch size |Dq| = 100, and used
1592
+ Adam for the update in Step 6. We compared the standard PCMP, with constant hyperparameters,
1593
+ to the optimized PCMP with exactly K = 5 iterations.
1594
+ Fig. 8a and Fig. 9a depict the minimal sum-rates, averaged on 100 unseen test channels
1595
+ results, for the three error bound values, vs. the number of PCMP iterations. In these figures,
1596
+ we observe notable gains in convergence speed of a factor of 20 (5 iterations vs. 100 iterations),
1597
+ and it is shown that the performances of the learned PCMP algorithm consistently surpasses
1598
+ the performances of the conventional PCMP with constant step sizes. In Fig. 8b, and Fig. 9b,
1599
+ the sum-rate for different values of SNR is shown. These figures include the fully digital
1600
+ baseband precoding error-free sum-rates, which are calculated with full CSI, and reflect on the
1601
+ best performance one can achieve given full CSI and without RF chain reduction. We observe
1602
+ that the proposed robust optimization method, the unfolded PCMP, achieves relatively close
1603
+ performances to the full-CSI fully digital baseband precoding, systematically outperforming the
1604
+ model-based PCMP operating with much more iterations. These results demonstrates the gains
1605
+ and advantages of our proposed learn-to-optimize method in enabling optimization of hybrid
1606
+ precoders which is both rapid and robust.
1607
+ VI. CONCLUSIONS
1608
+ In this work we proposed a method to leverage data to enable rapid, robust, and interpretable
1609
+ tuning of hybrid precoders. Our approach unfolds a suitable optimizer for maximizing the
1610
+ minimal sum-rate within a given tolerable CSI error into a fixed and small number of iterations.
1611
+ Then, we use data to tune the hyperparameters of each iteration. Our method is shown to
1612
+ notably improve convergence speed while setting hybrid precoders which achieve similar and
1613
+ even improved sum-rates compared to those tuned via lengthy non-learned optimization.
1614
+ 25
1615
+
1616
+ (a) Minimal sum-rate per PCMP iteration.
1617
+ (b) Minimal sum-rate vs. SNR.
1618
+ Fig. 8: Rayleigh channel; unconstrained analog precoder; B = 8, N = 6, L = 10, M = 12.
1619
+ (a) Minimal sum-rate per PCMP iteration.
1620
+ (b) Minimal sum-rate vs. SNR.
1621
+ Fig. 9: QuaDRiGa channel; unconstrained analog precoder; B = 16, N = 4, L = 6, M = 12.
1622
+ VII. ACKNOWLEDGEMENTS
1623
+ The authors would like to thank Tomer Yeblonka from CEVA for his valuable inputs and
1624
+ meaningful discussions.
1625
+ APPENDIX A
1626
+ COMPLEX GRADIENTS OF R(·) WITH RESPECT TO Wa, {Wd,b}b∈B
1627
+ We first derive (10) following the computation of complex-valued gradients of a general scalar
1628
+ function detailed in [49]. The complex differential of R (Wa, {Wd,b}, {Hb}) with respect to Wa
1629
+ 26
1630
+
1631
+ 17.5
1632
+ 17
1633
+ 17.0
1634
+ IAchievableRate
1635
+ 16
1636
+ 16.5
1637
+ 15
1638
+ 16.0
1639
+ Minimal
1640
+ 15.5
1641
+ Classical PCMP - =0.5
1642
+ 13
1643
+ Unfolded PCMP - E=0.5
1644
+ 15.0
1645
+ ←UnfoldedPCMP-=0.05
1646
+ Classical PCMP - =0.05
1647
+ 12
1648
+ Unfolded PCMP-E=0.005
1649
+ 14.5
1650
+ Classical PCMP - =0.005
1651
+ 2345
1652
+ 20
1653
+ 40
1654
+ 60
1655
+ 80
1656
+ 100
1657
+ Numberof IterationClassical PCMP - 100 iter, E=0.05
1658
+ Classical PCMP -5 iter. =0.05
1659
+ Unfolded PCMP - 5 iter, =0.05
1660
+ 25
1661
+ Classical PCMP - 100 iter, =0.005
1662
+ Rate
1663
+ Classical PCMP - 5 iter, =0.005
1664
+ Unfolded PCMP - 5 iter, =0.005
1665
+ ble
1666
+ Classical PCMP - 100 iter, E=0.5
1667
+ 20
1668
+ IAchievab
1669
+ Classical PCMP - 5 iter, =0.5
1670
+ Unfolded PCMP - 5 iter, =0.5
1671
+ Error Free Fully digital
1672
+ Minimal
1673
+ 15
1674
+ 18
1675
+ 10
1676
+ 16
1677
+ -5
1678
+ -4
1679
+ -3
1680
+ -2
1681
+ -1
1682
+ 0
1683
+ 1
1684
+ 2
1685
+ 3
1686
+ 4
1687
+ 5
1688
+ SNRdB]12.0
1689
+ 11.75
1690
+ 11.5
1691
+ 11.50
1692
+ 11.0
1693
+ Minimal AchievableRate
1694
+ 11.25
1695
+ 10.5
1696
+ 11.00
1697
+ 10.0
1698
+ 10.75
1699
+ 9.5
1700
+ 10.50
1701
+ Classical PCMP - =0.5
1702
+ 9.0
1703
+ Unfolded PCMP - E=0.5
1704
+ 10.25
1705
+ Unfolded PCMP - E=0.05
1706
+ 8.5
1707
+ Classical PCMP - E=0.05
1708
+ Unfolded PCMP - E=0.005
1709
+ 10.00
1710
+ 8.0
1711
+ Classical PCMP - =0.005
1712
+ 12345
1713
+ 1
1714
+ 20
1715
+ 40
1716
+ 60
1717
+ 80
1718
+ 100
1719
+ Numberof IterationClassical PCMP - 100 iter, E=0.05
1720
+ 20
1721
+ Classical PCMP - 5 iter, =0.05
1722
+ Unfolded PCMP - 5 iter, =0.05
1723
+ 18
1724
+ Classical PCMP - 100 iter, =0.005
1725
+ Classical PCMP - 5 iter, =0.005
1726
+ Rate
1727
+ +
1728
+ 16
1729
+ Unfolded PCMP - 5 iter, =0.005
1730
+ Minimal Achievable
1731
+ Classical PCMP - 100 iter, E=0.5
1732
+ 14
1733
+ Classical PCMP - 5 iter, =0.5
1734
+ Unfolded PCMP - 5 iter, =0.5
1735
+ 12
1736
+ Error Free Fully digital
1737
+ 10
1738
+ 8
1739
+ 12
1740
+ 11
1741
+ 6
1742
+ 4
1743
+ 0
1744
+ -5
1745
+ -4
1746
+ -3
1747
+ -2
1748
+ -1
1749
+ 0
1750
+ 1
1751
+ 2
1752
+ 3
1753
+ 4
1754
+ 5
1755
+ SNR[dB]is
1756
+ dWaR (Wa, {Wd,b}, {Hb})
1757
+ = dWa
1758
+
1759
+ 1
1760
+ B
1761
+ B
1762
+
1763
+ b=1
1764
+ log
1765
+ ��IN + ˜HbWaWd,bWH
1766
+ d,bWH
1767
+ a ˜HH
1768
+ b
1769
+ ��
1770
+
1771
+ = Tr
1772
+ � 1
1773
+ B
1774
+ B
1775
+
1776
+ b=1
1777
+ Wd,bWH
1778
+ d,bWH
1779
+ a ˜HH
1780
+ b Gb(Wa, Wd,b, Hb)−1 ˜Hb(dWa)
1781
+
1782
+ + Tr
1783
+ � 1
1784
+ B
1785
+ B
1786
+
1787
+ b=1
1788
+ W∗
1789
+ d,bWT
1790
+ d,bWT
1791
+ a ˜HT
1792
+ b Gb(Wa, Wd,b, Hb)−1 ˜H∗
1793
+ b(dW∗
1794
+ a)
1795
+
1796
+ .
1797
+ Using [49, Table 3.2], this yields (10).
1798
+ Similarly, the differential of R (Wa, {Wd,b}, {Hb}) with respect to Wd,b is
1799
+ dWd,bR (Wa, {Wd,b}, {Hb})
1800
+ = dWd,b
1801
+
1802
+ 1
1803
+ B
1804
+ B
1805
+
1806
+ n=1
1807
+ log
1808
+ ��IN + ˜HnWaWd,nWH
1809
+ d,nWH
1810
+ a ˜HH
1811
+ n
1812
+ ��
1813
+
1814
+ = Tr
1815
+ � 1
1816
+ B WH
1817
+ d,bWH
1818
+ a ˜HH
1819
+ b ˜HbWa(dWd,b)
1820
+
1821
+ + Tr
1822
+ � 1
1823
+ B WT
1824
+ d,bWT
1825
+ a ˜HT
1826
+ b Gb(Wa, Wd,b, Hb)−T ˜H∗
1827
+ bW∗
1828
+ a(dW∗
1829
+ d,b)
1830
+
1831
+ .
1832
+ Using [49, Table 3.2], this yields (13).
1833
+ APPENDIX B
1834
+ COMPLEX GRADIENT OF R(·) WITH RESPECT TO {Eb}b∈B
1835
+ The complex differential of R(Wa, {Wd,b}, {Hb + Eb}) with respect to Eb is given by
1836
+ dEbR(Wa, {Wd,b}, {Hb + Eb})
1837
+ = dEb
1838
+
1839
+ 1
1840
+ B
1841
+ B
1842
+
1843
+ n=1
1844
+ log
1845
+ ���IN +
1846
+ �˜Hn + En
1847
+
1848
+ WaWd,nWH
1849
+ d,nWH
1850
+ a
1851
+ �˜Hn + En
1852
+ �H���
1853
+
1854
+ = Tr
1855
+ � 1
1856
+ B
1857
+
1858
+ WaWd,bWH
1859
+ d,bWH
1860
+ a ˜HH
1861
+ b Gb(Wa, Wd,b, Hb + Eb)−1
1862
+ + WaWd,bWH
1863
+ d,bWH
1864
+ a EH
1865
+ b Gb(Wa, Wd,b, Hb + Eb)−1�
1866
+ (dEb)
1867
+
1868
+ + Tr
1869
+ � 1
1870
+ B
1871
+
1872
+ W∗
1873
+ aW∗
1874
+ d,bWT
1875
+ d,bWT
1876
+ a ˜HT
1877
+ b Gb(Wa, Wd,b, Hb + Eb)−T
1878
+ + W∗
1879
+ aW∗
1880
+ d,bWT
1881
+ d,bWT
1882
+ a ET
1883
+ b Gb(Wa, Wd,b, Hb + Eb)−T�
1884
+ (dE∗
1885
+ b)
1886
+
1887
+ .
1888
+ Using [49, Table 3.2], this yields (21).
1889
+ 27
1890
+
1891
+ REFERENCES
1892
+ [1] O. Agiv and N. Shlezinger, “Learn to rapidly optimize hybrid precoding,” in Proc. IEEE SPAWC, 2022.
1893
+ [2] “6G - the next hyper connected experience for all,” Samsung, 2020.
1894
+ [3] T. L. Marzetta, “Noncooperative cellular wireless with unlimited numbers of base station antennas,” IEEE Trans. Wireless
1895
+ Commun., vol. 9, no. 11, p. 3590, 2010.
1896
+ [4] E. Bj¨ornson, J. Hoydis, and L. Sanguinetti, “Massive MIMO networks: Spectral, energy, and hardware efficiency,”
1897
+ Foundations and Trends® in Signal Processing, vol. 11, no. 3-4, pp. 154–655, 2017.
1898
+ [5] N. Shlezinger and Y. C. Eldar, “On the spectral efficiency of noncooperative uplink massive MIMO systems,” IEEE Trans.
1899
+ Commun., vol. 67, no. 3, pp. 1956–1971, 2019.
1900
+ [6] X. Gao, L. Dai, and A. M. Sayeed, “Low RF-complexity technologies to enable millimeter-wave MIMO with large antenna
1901
+ array for 5G wireless communications,” IEEE Commun. Mag., vol. 56, no. 4, pp. 211–217, 2018.
1902
+ [7] A. F. Molisch, V. V. Ratnam, S. Han, Z. Li, S. L. H. Nguyen, L. Li, and K. Haneda, “Hybrid beamforming for massive
1903
+ MIMO: A survey,” IEEE Commun. Mag., vol. 55, no. 9, pp. 134–141, 2017.
1904
+ [8] I. Ahmed, H. Khammari, A. Shahid, A. Musa, K. S. Kim, E. De Poorter, and I. Moerman, “A survey on hybrid beamforming
1905
+ techniques in 5G: Architecture and system model perspectives,” IEEE Commun. Surveys Tuts., vol. 20, no. 4, pp. 3060–
1906
+ 3097, 2018.
1907
+ [9] R. M´endez-Rial, C. Rusu, N. Gonz´alez-Prelcic, A. Alkhateeb, and R. W. Heath, “Hybrid MIMO architectures for millimeter
1908
+ wave communications: Phase shifters or switches?” IEEE Access, vol. 4, pp. 247–267, 2016.
1909
+ [10] S. S. Ioushua and Y. C. Eldar, “A family of hybrid analog–digital beamforming methods for massive MIMO systems,”
1910
+ IEEE Trans. Signal Process., vol. 67, no. 12, pp. 3243–3257, 2019.
1911
+ [11] T. Gong, N. Shlezinger, S. S. Ioushua, M. Namer, Z. Yang, and Y. C. Eldar, “RF chain reduction for MIMO systems: A
1912
+ hardware prototype,” IEEE Syst. J., vol. 14, no. 4, pp. 5296–5307, 2020.
1913
+ [12] T. Zirtiloglu, N. Shlezinger, Y. C. Eldar, and R. T. Yazicigil, “Power-efficient hybrid MIMO reciever with task-specific
1914
+ beamforming using low-resolution ADCs,” in Proc. IEEE ICASSP, 2022, pp. 5338–5342.
1915
+ [13] S. Park, A. Alkhateeb, and R. W. Heath, “Dynamic subarrays for hybrid precoding in wideband mmWave MIMO systems,”
1916
+ IEEE Trans. Wireless Commun., vol. 16, no. 5, pp. 2907–2920, 2017.
1917
+ [14] M. A. Albreem, A. H. Al Habbash, A. M. Abu-Hudrouss, and S. S. Ikki, “Overview of precoding techniques for massive
1918
+ MIMO,” IEEE Access, vol. 9, pp. 60 764–60 801, 2021.
1919
+ [15] X. Yu, J.-C. Shen, J. Zhang, and K. B. Letaief, “Alternating minimization algorithms for hybrid precoding in millimeter
1920
+ wave MIMO systems,” IEEE J. Sel. Topics Signal Process., vol. 10, no. 3, pp. 485–500, 2016.
1921
+ [16] F. Sohrabi and W. Yu, “Hybrid digital and analog beamforming design for large-scale antenna arrays,” IEEE J. Sel. Topics
1922
+ Signal Process., vol. 10, no. 3, 2016.
1923
+ [17] N. Shlezinger, G. C. Alexandropoulos, M. F. Imani, Y. C. Eldar, and D. R. Smith, “Dynamic metasurface antennas for 6G
1924
+ extreme massive MIMO communications,” IEEE Commun. Mag., vol. 28, no. 2, pp. 106–113, 2021.
1925
+ [18] H. Zhang, N. Shlezinger, F. Guidi, D. Dardari, M. F. Imani, and Y. C. Eldar, “Beam focusing for near-field multi-user
1926
+ MIMO communications,” IEEE Trans. Wireless Commun., vol. 21, no. 9, pp. 7476–7490, 2022.
1927
+ [19] A. Zappone, M. Di Renzo, and M. Debbah, “Wireless networks design in the era of deep learning: Model-based, AI-based,
1928
+ or both?” IEEE Trans. Commun., vol. 67, no. 10, pp. 7331–7376, 2019.
1929
+ [20] T. Chen, X. Chen, W. Chen, H. Heaton, J. Liu, Z. Wang, and W. Yin, “Learning to optimize: A primer and a benchmark,”
1930
+ arXiv preprint arXiv:2103.12828, 2021.
1931
+ [21] Q. Hu, Y. Cai, K. Kang, G. Yu, J. Hoydis, and Y. C. Eldar, “Two-timescale end-to-end learning for channel acquisition
1932
+ and hybrid precoding,” IEEE J. Sel. Topics Signal Process., vol. 40, no. 1, pp. 163–181, 2021.
1933
+ 28
1934
+
1935
+ [22] H. Huang, Y. Song, J. Yang, G. Gui, and F. Adachi, “Deep-learning-based millimeter-wave massive MIMO for hybrid
1936
+ precoding,” IEEE Trans. Veh. Technol., vol. 68, no. 3, pp. 3027–3032, 2019.
1937
+ [23] H. Huang, Y. Peng, J. Yang, W. Xia, and G. Gui, “Fast beamforming design via deep learning,” IEEE Trans. Veh. Technol.,
1938
+ vol. 69, no. 1, pp. 1065–1069, 2019.
1939
+ [24] A. M. Elbir and A. K. Papazafeiropoulos, “Hybrid precoding for multiuser millimeter wave massive MIMO systems: A
1940
+ deep learning approach,” IEEE Trans. Veh. Technol., vol. 69, no. 1, pp. 552–563, 2019.
1941
+ [25] A. M. Elbir, K. V. Mishra, and S. Chatzinotas, “Terahertz-band joint ultra-massive MIMO radar-communications: Model-
1942
+ based and model-free hybrid beamforming,” IEEE J. Sel. Topics Signal Process., vol. 15, no. 6, pp. 1468–1483, 2021.
1943
+ [26] T. Peken, S. Adiga, R. Tandon, and T. Bose, “Deep learning for SVD and hybrid beamforming,” IEEE Trans. Wireless
1944
+ Commun., vol. 19, no. 10, pp. 6621–6642, 2020.
1945
+ [27] H. Hojatian, J. Nadal, J.-F. Frigon, and F. Leduc-Primeau, “Unsupervised deep learning for massive MIMO hybrid
1946
+ beamforming,” IEEE Trans. Wireless Commun., vol. 20, no. 11, pp. 7086–7099, 2021.
1947
+ [28] Q. Hu, Y. Liu, Y. Cai, G. Yu, and Z. Ding, “Joint deep reinforcement learning and unfolding: Beam selection and precoding
1948
+ for mmWave multiuser MIMO with lens arrays,” IEEE J. Sel. Areas Commun., vol. 39, no. 8, pp. 2289–2304, 2021.
1949
+ [29] Q. Wang, K. Feng, X. Li, and S. Jin, “PrecoderNet: Hybrid beamforming for millimeter wave systems with deep
1950
+ reinforcement learning,” IEEE Commun. Lett., vol. 9, no. 10, pp. 1677–1681, 2020.
1951
+ [30] N. Shlezinger, J. Whang, Y. C. Eldar, and A. G. Dimakis, “Model-based deep learning,” arXiv preprint arXiv:2012.08405,
1952
+ 2020.
1953
+ [31] N. Shlezinger, Y. C. Eldar, and S. P. Boyd, “Model-based deep learning: On the intersection of deep learning and
1954
+ optimization,” IEEE Access, vol. 10, pp. 115 384–115 398, 2022.
1955
+ [32] A. Balatsoukas-Stimming and C. Studer, “Deep unfolding for communications systems: A survey and some new directions,”
1956
+ in Proc. IEEE SiPS, 2019, pp. 266–271.
1957
+ [33] A. Balatsoukas-Stimming, O. Casta˜neda, S. Jacobsson, G. Durisi, and C. Studer, “Neural-network optimized 1-bit precoding
1958
+ for massive MU-MIMO,” in Proc. IEEE SPAWC, 2019.
1959
+ [34] L. Pellaco, M. Bengtsson, and J. Jald´en, “Matrix-inverse-free deep unfolding of the weighted MMSE beamforming
1960
+ algorithm,” IEEE Open Journal of the Communications Society, vol. 3, pp. 65–81, 2021.
1961
+ [35] J. Luo, J. Fan, and J. Zhang, “MDL-AltMin: A hybrid precoding scheme for mmWave systems with deep learning and
1962
+ alternate optimization,” IEEE Commun. Lett., vol. 11, no. 9, pp. 1925–1929, 2022.
1963
+ [36] S. Shi, Y. Cai, Q. Hu, B. Champagne, and L. Hanzo, “Deep-unfolding neural-network aided hybrid beamforming based
1964
+ on symbol-error probability minimization,” IEEE Trans. Veh. Technol., 2022, early access.
1965
+ [37] E. Balevi and J. G. Andrews, “Unfolded hybrid beamforming with GAN compressed ultra-low feedback overhead,” IEEE
1966
+ Trans. Wireless Commun., vol. 20, no. 12, pp. 8381–8392, 2021.
1967
+ [38] K.-Y. Chen, H.-Y. Chang, R. Y. Chang, and W.-H. Chung, “Hybrid beamforming in mmwave MIMO-OFDM systems via
1968
+ deep unfolding,” in Vehicular Technology Conference:(VTC2022-Spring).
1969
+ IEEE, 2022.
1970
+ [39] K. K. Thekumparampil, P. Jain, P. Netrapalli, and S. Oh, “Efficient algorithms for smooth minimax optimization,” Advances
1971
+ in Neural Information Processing Systems, vol. 32, 2019.
1972
+ [40] S. Jaeckel, L. Raschkowski, K. B¨orner, and L. Thiele, “Quadriga: A 3-D multi-cell channel model with time evolution for
1973
+ enabling virtual field trials,” IEEE Trans. Antennas Propag., vol. 62, no. 6, pp. 3242–3256, 2014.
1974
+ [41] X. Gao, L. Dai, S. Han, I. Chih-Lin, and R. W. Heath, “Energy-efficient hybrid analog and digital precoding for mmWave
1975
+ MIMO systems with large antenna arrays,” IEEE J. Sel. Areas Commun., vol. 34, no. 4, pp. 998–1009, 2016.
1976
+ [42] Z. Shen, R. Chen, J. G. Andrews, R. W. Heath, and B. L. Evans, “Sum capacity of multiuser MIMO broadcast channels
1977
+ with block diagonalization,” IEEE Trans. Wireless Commun., vol. 6, no. 6, pp. 2040–2045, 2007.
1978
+ 29
1979
+
1980
+ [43] A. Goldsmith, Wireless communications.
1981
+ Cambridge, 2005.
1982
+ [44] S. Boyd and L. Vandenberghe, Convex optimization.
1983
+ Cambridge, 2004.
1984
+ [45] N. Shlezinger and T. Routtenberg, “Discriminative and generative learning for linear estimation of random signals [lecture
1985
+ notes],” arXiv preprint arXiv:2206.04432, 2022.
1986
+ [46] N. Samuel, T. Diskin, and A. Wiesel, “Learning to detect,” IEEE Trans. Signal Process., vol. 67, no. 10, pp. 2554–2564,
1987
+ 2019.
1988
+ [47] A. Mokhtari, A. Ozdaglar, and S. Pattathil, “A unified analysis of extra-gradient and optimistic gradient methods for saddle
1989
+ point problems: Proximal point approach,” in International Conference on Artificial Intelligence and Statistics.
1990
+ PMLR,
1991
+ 2020, pp. 1497–1507.
1992
+ [48] P. I. Frazier, “A tutorial on Bayesian optimization,” arXiv preprint arXiv:1807.02811, 2018.
1993
+ [49] A. Hj¨orungnes, Complex-valued matrix derivatives with applications in signal processing and communications. Cambridge,
1994
+ 2011.
1995
+ 30
1996
+
O9AyT4oBgHgl3EQfg_h-/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
S9E1T4oBgHgl3EQfuQUV/content/tmp_files/2301.03385v1.pdf.txt ADDED
The diff for this file is too large to render. See raw diff
 
S9E1T4oBgHgl3EQfuQUV/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
TdE0T4oBgHgl3EQflQEG/content/tmp_files/2301.02482v1.pdf.txt ADDED
@@ -0,0 +1,2395 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Astronomy & Astrophysics manuscript no. main
2
+ ©ESO 2023
3
+ January 9, 2023
4
+ Evolution of the reservoirs of volatiles in the protosolar nebula
5
+ Antoine Schneeberger1, Olivier Mousis12, Artyom Aguichine1, and Jonathan I. Lunine3
6
+ 1 Aix- Marseille Université, CNRS, CNES, Institut Origines, LAM, Marseille, France
7
+ e-mail: [email protected]
8
+ 2 Institut Universitaire de France (IUF), France
9
+ 3 Cornell University, Department of Astronomy, Ithaca NY, USA
10
+ Received August 02, 2022; accepted November 30, 2022
11
+ ABSTRACT
12
+ The supersolar abundances of volatiles observed in giant planets suggest that a compositional gradient was present at the time of
13
+ their formation in the protosolar nebula. To explain this gradient, several studies have investigated the radial transport of trace species
14
+ and the effect of icelines on the abundance profiles of solids and vapors formed in the disk. However, these models only consider
15
+ the presence of solids in the forms of pure condensates or amorphous ice during the evolution of the protosolar nebula. They usually
16
+ neglect the possible crystallization and destabilization of clathrates, along with the resulting interplay between the abundance of water
17
+ and those of these crystalline forms. This study is aimed at pushing this kind of investigation further by considering all possible solid
18
+ phases together in the protosolar nebula: pure condensates, amorphous ice, and clathrates. To this end, we used a one-dimensional
19
+ (1D) protoplanetary disk model coupled with modules describing the evolution of trace species in the vapor phase, as well as the
20
+ dynamics of dust and pebbles. Eleven key species are considered here, including H2O, CO, CO2, CH4, H2S, N2, NH3, Ar, Kr, Xe, and
21
+ PH3. Two sets of initial conditions are explored for the protosolar nebula. In a first scenario, the disk is initially filled with icy grains
22
+ in the forms of pure condensates. In this case, we show that clathrates can crystallize and form enrichment peaks up to about ten times
23
+ the initial abundances at their crystallization lines. In a second scenario, the volatiles were delivered to the protosolar nebula in the
24
+ forms of amorphous grains. In this case, the presence of clathrates is not possible because there is no available crystalline water ice
25
+ in their formation region. Enrichment peaks of pure condensates also form beyond the snowline up to about seven times the initial
26
+ abundances. Our model can then be used to compare the compositions of its different volatile reservoirs with those of comet C/2016
27
+ R2 PanSTARRS, Jupiter, Uranus, and Neptune. We find that the two investigated scenarios provide compositions of solids and vapors
28
+ consistent with those observed in the bodies considered.
29
+ Key words. Solar system formation; Planetary system formation; Protoplanetary disks; Comets origins; Solar system planets
30
+ 1. Introduction
31
+ It is commonly assumed that Solar System bodies have bulk
32
+ compositions that are representative of the material present in the
33
+ protosolar nebula (PSN) from which they formed. If the PSN was
34
+ homogeneous in composition, gas and ice giants would be ex-
35
+ pected to reflect this homogeneity. However, observations show
36
+ that giant planets present a range of supersolar metallicities. In
37
+ Jupiter’s atmosphere, the abundances of volatile elements were
38
+ found to be ∼1.5–6.1 times higher than their protosolar values
39
+ (Atreya et al. 2003; Mousis et al. 2018; Li et al. 2020), with a
40
+ few exceptions attributed to interior processes. In Uranus and
41
+ Neptune, volatile abundances can reach up to about 100 times
42
+ their protosolar values (Lindal et al. 1987, 1990; Baines et al.
43
+ 1995; Karkoschka & Tomasko 2009; Sromovsky et al. 2014).
44
+ Numerical models show that the dynamics of icy pebbles and
45
+ their vapors around icelines is an efficient mechanism to produce
46
+ local changes in the composition of the PSN (Booth et al. 2017;
47
+ Desch et al. 2017). This process efficiently concentrates species
48
+ around their respective icelines, creating the compositional gra-
49
+ dient that may be responsible for the volatile enrichment in giant
50
+ planets of our Solar System. The radial transport of trace species
51
+ and the effect of icelines have been investigated using accretion
52
+ disk models to assess the composition of the PSN. The resulting
53
+ compositional profiles would then be used to constrain the for-
54
+ mation conditions of gas giants (Mousis et al. 2019; Schneider
55
+ & Bitsch 2021; Aguichine et al. 2022) or ice giants (Owen et al.
56
+ 1999; Monga & Desch 2015; Mousis et al. 2020). This approach
57
+ has also been used to explain the diversity among the cometary
58
+ compositions and to determine their source or the general origins
59
+ of their building blocks (Mandt et al. 2020; Mousis et al. 2021a).
60
+ The form taken by volatiles that have fallen from the inter-
61
+ stellar medium (ISM) onto the PSN is still an open question. Icy
62
+ pebbles that are present at the earliest stages of the PSN may
63
+ have formed in the very cold environment of the ISM, at tem-
64
+ peratures of 10K or below (Gibb et al. 2004). At such low tem-
65
+ peratures, H2O condenses in an amorphous structure that can
66
+ efficiently trap other volatile species (Mayer & Pletzer 1986;
67
+ Jenniskens et al. 1995). At ∼135 K, the amorphous ice transi-
68
+ tions to crystalline ice and releases trapped volatiles (Bar-Nun et
69
+ al. 2007). This temperature is much higher than the usual subli-
70
+ mation temperature of pure condensates. In the PSN, the helio-
71
+ centric distance at which this release occurs is called the Amor-
72
+ phous to Crystalline Transition Zone (ACTZ), and is located at
73
+ approximately 5 au (Mousis et al. 2019). However, it is not clear
74
+ whether this amorphous ice survives the fall onto the PSN. For
75
+ instance, it has been proposed that amorphous dust was heated
76
+ up to crystallization when entering the PSN (Visser et al. 2013),
77
+ as a consequence of the presence of shockwaves in the accreting
78
+ Article number, page 1 of 19
79
+ arXiv:2301.02482v1 [astro-ph.EP] 6 Jan 2023
80
+
81
+ A&A proofs: manuscript no. main
82
+ PSN (Miura et al. 2017; Burkhardt et al. 2019). As a result, many
83
+ circumstellar disk models treat volatile species as pure conden-
84
+ sates, with sublimation temperatures computed from thermody-
85
+ namic tables (Dodson-Robinson et al. 2009; Ciesla et al. 2015;
86
+ Öberg & Wordsworth 2019). Alternatively, volatile species may
87
+ also be trapped in clathrate form in the PSN, when sufficient
88
+ amounts of H2O are available (Lunine & Stevenson 1985; Gau-
89
+ tier & Hersant 2005; Mousis et al. 2021b). A species, i, is usually
90
+ trapped in clathrate at a higher temperature than the one needed
91
+ to sublimate its pure condensate form, except for the cases of
92
+ CO2 and NH3. Because CO2 clathrate and NH3 monohydrate
93
+ form at lower temperatures than their respective condensates at
94
+ nebular pressures, they are not considered in our model. In the
95
+ following, we refer to the heliocentric distance at which volatiles
96
+ are entrapped in or released from clathrates as the clathration
97
+ line. For this reason, volatile species can remain adsorbed on
98
+ amorphous ice or trapped in clathrates, then they are released
99
+ several au closer to the Sun – than they otherwise would be if
100
+ they were in the form of pure condensates.
101
+ In this study, we aim to quantify the influence of the presence
102
+ of various icelines in the PSN, including the ACTZ and multiple
103
+ clathration lines, on the nature of the main volatile reservoirs
104
+ that were at play during the formation of the first icy grains in
105
+ the disk. To do so, we use an existing PSN model that already
106
+ describes the condensation and sublimation of pure ices, as well
107
+ as the transport of species in solid and vapor forms (Aguichine
108
+ et al. 2020, 2022), along with prescriptions of amorphous ice
109
+ destabilization, as well as clathrate crystallization and dissocia-
110
+ tion added. Eleven key species are considered in our approach,
111
+ namely: H2O, CO, CO2, CH4, H2S, N2, NH3, Ar, Kr, Xe, and
112
+ PH3. Each of these species can exist in the forms of vapor, crys-
113
+ talline ice, clathrate (monohydrate in the case of NH3), or amor-
114
+ phous ice in the PSN. Two scenarios are investigated, each of
115
+ them corresponding to a different initial state of the system. In
116
+ scenario 1: the PSN is filled with volatile species in pure con-
117
+ densates or vapor form, depending on their location in the PSN.
118
+ In scenario 2: the PSN is filled with volatile species adsorbed
119
+ on amorphous ice beyond the ACTZ, and in vapor form in re-
120
+ gions closer to the Sun. Because the ACTZ is located beyond the
121
+ snowline, H2O is found in crystalline form between the snow-
122
+ line and the ACTZ. Figure 1 represents the different forms of
123
+ volatiles in the PSN in these two cases. In scenario 1, volatile
124
+ species are in the vapor phase between the snowline and their
125
+ respective icelines. If enough H2O is available, these vapors can
126
+ form clathrates. In scenario 2, icy grains of amorphous ice that
127
+ drifted inward of the ACTZ release the adsorbed volatile species
128
+ as vapors. The outward diffusion of these vapors can lead to the
129
+ formation of clathrates or pure condensates (or both).
130
+ Section 2 describes the PSN model, as well as the transport
131
+ modules used in our calculations. It also depicts the different for-
132
+ malisms that have been added to the disk model to mimic the for-
133
+ mation and destabilization of clathrates, as well as the desorption
134
+ of volatiles from the amorphous ice particles crossing the ACTZ.
135
+ In Section 3, the radial profiles of the abundances of the different
136
+ species are represented in various forms as a function of time in
137
+ the PSN and in the individual cases described by the two sce-
138
+ narios. Section 4 is devoted to a discussion of the sensitivity of
139
+ our results in light of the variation of the disk parameters. Our
140
+ model is then used to compare the compositions of its resulting
141
+ volatile reservoirs with those of the H2O–poor comet C/2016 R2
142
+ PanSTARRS (R2), Jupiter, Uranus, and Neptune. This allows us
143
+ to discuss the formation conditions of those bodies in the context
144
+ of the two scenarios. Section 5 presents our conclusions.
145
+ 2. Volatile transport and evolution model
146
+ In this section, we describe the protosolar nebula model em-
147
+ ployed in our simulations, along with the modules calculating
148
+ the transport of dust particles and vapors within the disk. Source
149
+ and sink terms related to sublimation and condensation of pure
150
+ ices as well as to clathrate destabilization and formation within
151
+ the disk are also depicted.
152
+ 2.1. Protoplanetary disk model
153
+ The disk model used here is the one described in Aguichine et
154
+ al. (2020) and Mousis et al. (2020). The evolution of the PSN is
155
+ governed by the following differential equation (Lynden-Bell &
156
+ Pringle 1974):
157
+ ∂Σg
158
+ ∂t = 3
159
+ r
160
+
161
+ ∂r
162
+
163
+ r1/2 ∂
164
+ ∂r
165
+
166
+ r1/2Σgν
167
+ ��
168
+ ,
169
+ (1)
170
+ which describes the time evolution of a viscous accretion disk
171
+ of surface density, Σg, and viscosity, ν, assuming invariance in
172
+ the orbital direction and hydrostatic equilibrium in the azimuthal
173
+ direction. This equation can be rewritten as a set of two first-
174
+ order differential equations coupling the gas surface density, Σg,
175
+ field and mass accretion rate, ˙M:
176
+ �������������
177
+ ∂Σg
178
+ ∂t =
179
+ 1
180
+ 2πr
181
+ ∂ ˙M
182
+ ∂r
183
+ ˙M = 3πΣgν
184
+
185
+ 1 + 2∂ ln νΣg
186
+ ∂ ln r
187
+
188
+ .
189
+ (2)
190
+ The first equation is a mass conservation law and the second
191
+ one is a diffusion equation. The mass accretion rate is expressed
192
+ as a function of the gas velocity field, vg, and the radius, r, as
193
+ ˙M = −2πΣgvgr.
194
+ The dynamical viscosity ν is calculated using the prescrip-
195
+ tion of Shakura & Sunyaev (1973):
196
+ ν = α c2
197
+ s
198
+ ΩK
199
+ ,
200
+ (3)
201
+ where α is the viscosity coefficient, cs is the sound speed in the
202
+ PSN, and ΩK is the Keplerian frequency; also, α is estimated to
203
+ be in the 10−4–10−2 range, based on models calibrated on disk
204
+ observations (Hartmann et al. 1998; Hersant et al. 2004; Gautier
205
+ & Hersant 2005; Birnstiel et al. 2012; Dr˛a˙zkowska & Alibert
206
+ 2017; Armitage 2019). The sound speed, cs, is expressed as fol-
207
+ lows:
208
+ cs =
209
+
210
+ RT
211
+ µg
212
+ ,
213
+ (4)
214
+ where µg is the mean molecular mass of the gas in the PSN, as-
215
+ sumed here to be equal to 2.31 g·mol−1, T is the midplane tem-
216
+ perature, and R is the ideal gas constant.
217
+ Two energy sources are considered in our model, namely vis-
218
+ cous heating, and the constant irradiation by the local environ-
219
+ ment of ambient temperature, Tamb = 10 K. Irradiation from the
220
+ young Sun is neglected because the presence of shadowing is as-
221
+ sumed in the outer part of the disk (Ohno & Ueda 2021). This
222
+ allows the disk temperature to decrease to the condensation tem-
223
+ perature of Ar (∼20 K), allowing this species to be trapped in
224
+ Article number, page 2 of 19
225
+
226
+ A. Schneeberger et al.: Evolution of the reservoirs of volatiles in the protosolar nebula
227
+ Scenario 1
228
+ Scenario 2
229
+ Pure condensates
230
+ pebbles
231
+ Clathrate pebbles
232
+ Condensation line
233
+ Clathration line
234
+ Vapor
235
+ Radial drift (inward)
236
+ .
237
+ . :
238
+ '
239
+ \
240
+ - r
241
+ -
242
+ .
243
+ .
244
+ I
245
+ '
246
+ - ,
247
+ \
248
+ .
249
+ ' /
250
+ -
251
+ y
252
+ '
253
+ ,
254
+ a
255
+ /
256
+ \
257
+ '
258
+ s
259
+ -
260
+ -
261
+ /
262
+ -
263
+ \ ,
264
+ "
265
+ "
266
+ °
267
+ . .
268
+ -
269
+ I
270
+ /
271
+
272
+ Pure condensates
273
+ pebbles
274
+ Condensation line
275
+ Clathration line
276
+ Vapor
277
+ Radial drift (inward)
278
+ Amorphous ice
279
+ pebbles
280
+ ACTZ
281
+ .
282
+ .
283
+ .
284
+ '
285
+ '
286
+ I
287
+ - r
288
+ - -
289
+ /
290
+ -
291
+ -
292
+ -
293
+ I
294
+ /
295
+ /
296
+ I
297
+
298
+ .
299
+ ..
300
+ '.
301
+ "
302
+ I
303
+ -
304
+ y
305
+ '
306
+ .
307
+ .
308
+ -
309
+ /
310
+ <
311
+ \
312
+ I
313
+ -
314
+ 1
315
+ -
316
+ -
317
+ -
318
+ /
319
+ - ,
320
+ I
321
+
322
+ -
323
+ /
324
+ -
325
+ -
326
+ -
327
+ /
328
+ -
329
+ Iceline
330
+ Pure condensates
331
+ pebbles
332
+ Clathrate pebbles
333
+ Iceline
334
+ Clathration line
335
+ Vapor
336
+ Radial drift (inward)
337
+ .
338
+ . :
339
+ '
340
+ \
341
+ - r
342
+ -
343
+ .
344
+ .
345
+ I
346
+ '
347
+ - ,
348
+ \
349
+ .
350
+ ' /
351
+ -
352
+ y
353
+ '
354
+ ,
355
+ a
356
+ /
357
+ \
358
+ '
359
+ s
360
+ -
361
+ -
362
+ /
363
+ -
364
+ \ ,
365
+ "
366
+ "
367
+ °
368
+ . .
369
+ -
370
+ I
371
+ /
372
+
373
+ Pure condensates
374
+ pebbles
375
+ Iceline
376
+ Clathration line
377
+ Vapor
378
+ Radial drift (inward)
379
+ Amorphous ice
380
+ pebbles
381
+ ACTZ
382
+ .
383
+ .
384
+ .
385
+ '
386
+ '
387
+ I
388
+ - r
389
+ - -
390
+ /
391
+ -
392
+ -
393
+ -
394
+ I
395
+ /
396
+ /
397
+ I
398
+
399
+ .
400
+ ..
401
+ '.
402
+ "
403
+ I
404
+ -
405
+ y
406
+ '
407
+ .
408
+ .
409
+ -
410
+ /
411
+ <
412
+ \
413
+ I
414
+ -
415
+ 1
416
+ -
417
+ -
418
+ -
419
+ /
420
+ - ,
421
+ I
422
+
423
+ -
424
+ /
425
+ -
426
+ -
427
+ -
428
+ /
429
+ -
430
+ Fig. 1. Two outcome scenarios for volatile species explored in this paper. Top panel represents the case where volatiles are initially delivered
431
+ in pure condensate form to the PSN (scenario 1). Bottom panel represents the case where volatiles are released in vapor form in the PSN when
432
+ amorphous grains cross the ACTZ region (scenario 2). Pure condensates, clathrate, and amorphous ice pebbles are represented as blue, brown and
433
+ red circles, respectively. Vapor is represented as purple dots. The iceline, clathration line, and ACTZ are represented as blue, brown, and red solid
434
+ lines, respectively. Once delivered to the disk, the phase (solid or gaseous) of each species is determined by the positions of the corresponding
435
+ condensation, hydration, or clathration lines. Except for the case of CO2, which vaporises at a higher temperature than its clathrate form, hydration,
436
+ or clathration lines of the volatiles considered are closer to the Sun than their respective icelines. Gaseous volatiles condense or become entrapped
437
+ (depending on the availability of water ice) when diffusing outward of the locations of their condensation, hydration, or clathration lines. Con-
438
+ versely, volatiles condensed or entrapped in grains or pebbles are released in vapor form when drifting inward of their lines. Peaks of abundances
439
+ form close to each phase-transition line (see text). Those enrichments are represented by higher solid and vapor concentrations in the panels.
440
+ Jupiter’s building blocks in a way consistent with the supersolar
441
+ abundance observed in its envelope (Mousis et al. 2009, 2012,
442
+ 2021b). The temperature profile is computed by summing the
443
+ energy production rates of both energy sources (Hueso & Guil-
444
+ lot 2005):
445
+ T 4 =
446
+ 1
447
+ 2σSB
448
+ �3
449
+ 8τR + 1
450
+ 2τP
451
+
452
+ ΣgνΩ2
453
+ K + T 4
454
+ amb,
455
+ (5)
456
+ where σsb is the Stefan-Boltzmann constant, while τR and τP are
457
+ the Rosseland and Planck optical depth, respectively. Here, we
458
+ assume τP = 2.4τR, a case corresponding to the opacity gener-
459
+ ated by dust grains smaller than 10 µm (Nakamoto & Nakagawa
460
+ 1994); τR is derived from the Rosseland mean opacity, κR, via
461
+ the following expression (Hueso & Guillot 2005):
462
+ τR = ΣgκR
463
+ 2
464
+ .
465
+ (6)
466
+ Here, κR is computed as a sequence of power laws of the form
467
+ κR = κ0ρaT b, where ρ denotes the gas density at the midplane,
468
+ and κ0, a, and b are constants that are obtained by fits on obser-
469
+ vational data in different opacity regimes (Bell & Lin 1994).
470
+ The initial state of the model is computed from the self-
471
+ similar solution derived by Lynden-Bell & Pringle (1974):
472
+ Σgν ∝ exp
473
+ �������−
474
+ � r
475
+ rc
476
+ �2−p�������.
477
+ (7)
478
+ By combining Eqs. 7 and 2, and assuming p =
479
+ 3
480
+ 2, which cor-
481
+ responds to the case for an early disk (Lynden-Bell & Pringle
482
+ 1974), the initial profiles of the dust surface density and mass
483
+ accretion rate are given by:
484
+ �����������������
485
+ Σg,0 =
486
+ ˙Macc,0
487
+ 3πν exp
488
+ �������−
489
+ � r
490
+ rc
491
+ �0.5�������
492
+ ˙M0 = ˙Macc,0
493
+ �������1 −
494
+ � r
495
+ rc
496
+ �0.5������� exp
497
+ �������−
498
+ � r
499
+ rc
500
+ �0.5�������
501
+ ,
502
+ (8)
503
+ where rc is the centrifugal radius and ˙Macc,0 is the initial mass
504
+ accretion rate onto the central star, set to 10−7.6 M⊙·yr−1 (Hart-
505
+ Article number, page 3 of 19
506
+
507
+ A&A proofs: manuscript no. main
508
+ mann et al. 1998). The disk mass is related to the surface density
509
+ profile via the following expression:
510
+ Mdisk = 2π
511
+ � Rmax
512
+ Rmin
513
+ Σrdr,
514
+ (9)
515
+ where Rmin and Rmax are the inner and outer bounds of our
516
+ model. The total disk mass is set to 0.1M⊙ and most of it (99%)
517
+ is encapsulated within ∼200 au. The centrifugal radius, rc, is de-
518
+ termined by solving Eqs. 8 with 9 for the chosen values of mass
519
+ accretion rate and disk mass. Figure 2 represents the thermody-
520
+ namic profiles of our PSN model assuming α = 10−3, and at t =
521
+ 104, 105, and 106 yr of the disk evolution.
522
+ 100
523
+ 101
524
+ 102
525
+ 101
526
+ 102
527
+ 103
528
+ Temperature [K]
529
+ 10.0 kyr
530
+ 100.0 kyr
531
+ 1000.0 kyr
532
+ 100
533
+ 101
534
+ 102
535
+ 10
536
+ 10
537
+ 10
538
+ 7
539
+ 10
540
+ 4
541
+ 10
542
+ 1
543
+ 102
544
+ Midplane Pressure [Pa]
545
+ 100
546
+ 101
547
+ 102
548
+ Distance to the star [AU]
549
+ 10
550
+ 3
551
+ 10
552
+ 1
553
+ 101
554
+ 103
555
+ 105
556
+ Surface density [Kg. m
557
+ 2]
558
+ Fig. 2. Profiles of the disk midplane temperature, pressure and surface
559
+ density calculated at t = 104, 105, and 106 yr as a function of heliocentric
560
+ distance, assuming α = 10−3, shown from top to bottom.
561
+ 2.2. Dust dynamics
562
+ To determine the size of the dust pebbles, we rely heavily on the
563
+ two-population algorithm developed by Birnstiel et al. (2012).
564
+ This algorithm relies on the key idea that the dynamics of dust
565
+ pebbles of many different sizes can be well approximated by the
566
+ dynamics of only two populations of particles, in which all par-
567
+ ticles have the same representative sizes. The first group cor-
568
+ responds to the small population, where grains are of constant
569
+ size: a0 = 0.1 µm. The second group represents a large popula-
570
+ tion, where pebbles have a representative size a1, which depends
571
+ on the characteristics of the flow.
572
+ In the disk, pebbles grow by sticking collisions via the fol-
573
+ lowing law:
574
+ a1(t) = a0 exp
575
+
576
+ t
577
+ τgrowth
578
+
579
+ ,
580
+ (10)
581
+ where τgrowth is the growth timescale,
582
+ τgrow =
583
+ 4Σg
584
+
585
+ 3ϵgΣbΩK
586
+ ,
587
+ (11)
588
+ where Σb is the total surface density of solids, and ϵg is the dust
589
+ growth efficiency through mutual sticking set to 0.5 (Lambrechts
590
+ & Johansen 2014). Then, we compute the Stokes number of peb-
591
+ bles as a function of their sizes (Johansen et al. 2014):
592
+ St =
593
+ ���������������
594
+
595
+ 2πa1ρb
596
+ Σg
597
+ If a1 ≤ 9
598
+
599
+ 8
600
+ 9
601
+ a2
602
+ 1ρbcs
603
+ Σgν
604
+ If a1 ≥ 9
605
+
606
+ .
607
+ (12)
608
+ The top and bottom lines of Eq. 12 correspond to the Epstein and
609
+ Stokes regimes, respectively. The limit between both regimes is
610
+ fixed by the gas mean free path λ = √π/2 · ν/cs, computed by
611
+ equating the two terms in Eq.(12). The term ρb is the pebbles
612
+ mean bulk density:
613
+ ρb =
614
+
615
+ i Σb,iρb,i
616
+
617
+ i Σb,i
618
+ ,
619
+ (13)
620
+ computed as the average of each species’ bulk density, ρb,i,
621
+ weighted by their solid surface density, Σb,i.
622
+ Observations indicate that disks are rich in small dust and
623
+ suggest that fragmentation is a dominant process (Williams &
624
+ Cieza 2011). Based on this observation, our approach consid-
625
+ ers fragmentation and radial drift as the growth-limiting mech-
626
+ anisms. These mechanisms set an upper limit on the highest
627
+ Stokes number that particles can achieve. The first limitation re-
628
+ sults from the fragmentation occurring when the relative speed
629
+ between two pebbles due to turbulent motion exceeds the frag-
630
+ mentation velocity, uf. This upper limit is given by (Birnstiel et
631
+ al. 2012):
632
+ Stfrag = ff
633
+ 1
634
+
635
+ u2
636
+ f
637
+ c2s
638
+ ,
639
+ (14)
640
+ where uf is set to 10 m·s−1 and the factor ff = 0.37 accounts
641
+ for the fact that the representative size of the large population
642
+ is smaller than the biggest size particles can achieve before they
643
+ fragment.
644
+ A second limitation for dust growth is determined by the drift
645
+ velocities of the different pebbles. When pebbles drift faster than
646
+ they grow, this sets another upper limit for the Stokes number
647
+ (Birnstiel et al. 2012):
648
+ Stdrift = fd
649
+ Σbv2
650
+ K
651
+ Σgc2s
652
+ �����
653
+ d ln P
654
+ d ln r
655
+ �����
656
+ −1
657
+ ,
658
+ (15)
659
+ where P is the disk midplane pressure, vK the keplerian velocity,
660
+ and fd = 0.55 has the same origin as ff.
661
+ Article number, page 4 of 19
662
+
663
+ A. Schneeberger et al.: Evolution of the reservoirs of volatiles in the protosolar nebula
664
+ When dust grains drift at a high velocity and collide with
665
+ other particles on their path, they can fragment. This induces a
666
+ third upper limit for the Stokes number (Birnstiel et al. 2012),
667
+ given by:
668
+ Stdf =
669
+ 1
670
+ 1 − N
671
+ ufvK
672
+ cs
673
+ �dP
674
+ dr
675
+ �−1
676
+ ,
677
+ (16)
678
+ where the factor N = 0.5 accounts for the fact that only larger
679
+ grains fragment when colliding.
680
+ In the algorithm, all limiting Stokes numbers are computed
681
+ and compared with the Stokes number derived from Eq. 12. At
682
+ each time step, the smallest Stokes number found in this compar-
683
+ ison becomes the reference Stokes number which, in turn, sets
684
+ the value for the representative size, a1, of the large population.
685
+ The representative size of the small population is always a0, and
686
+ their Stokes number is always computed in the Epstein regime
687
+ (top line of Eq. 12).
688
+ Finally, the two-population algorithm of Birnstiel et al.
689
+ (2012) introduces fm the fraction of the mass contained in
690
+ the large population. Among the three size-limiting mecha-
691
+ nisms, if particle drift is the most limiting one (Stdrift
692
+ =
693
+ min
694
+
695
+ Stfrag, Stdrift, Stdf
696
+
697
+ ), then the fraction of the mass contained
698
+ in the large population is fm = 0.97. Otherwise, fm is set to 0.75
699
+ (Birnstiel et al. 2012). The mean grain size ¯a is then given by:
700
+ ¯a = fma1 + (1 − fm)a0.
701
+ (17)
702
+ 2.3. Trace species evolution model
703
+ Trace species are considered in four distinct forms: vapors, pure
704
+ condensates, entrapped in clathrates, or forming a monohydrate
705
+ (case for NH3 only), and adsorbed in amorphous ice. In our
706
+ model, a distinct surface density is attributed to each of these
707
+ forms, with Σv,i, Σp,i, Σc,i, and Σa,i corresponding to species i in
708
+ vapor, pure condensate, clathrate or hydrate, or amorphous ice
709
+ phases, respectively. Their time and radial evolution is governed
710
+ by the advection-diffusion equation (Birnstiel et al. 2012; Desch
711
+ et al. 2017):
712
+ ∂Σi
713
+ ∂t + 1
714
+ r
715
+
716
+ ∂r
717
+
718
+ r
719
+
720
+ Σivi − DiΣg
721
+
722
+ ∂r
723
+ � Σi
724
+ Σg
725
+ ���
726
+ − ˙Qi = 0,
727
+ (18)
728
+ where Di is the diffusion coefficient and is vi is the radial speed.
729
+ ˙Qi is a source or sink term that accounts for phase changes,
730
+ counted positive/negative when some matter is created or lost.
731
+ For surface densities of vapors, we assume Di = Dg and vi
732
+ = vg because vapors are well coupled to the PSN gas and evolve
733
+ similarly. The gas diffusivity, Dg, is assumed to be equal to the
734
+ viscosity, ν, and the gas velocity is (Shakura & Sunyaev 1973):
735
+ vg = −
736
+ ˙Macc
737
+ 2πrΣg
738
+ .
739
+ (19)
740
+ At each time and location, we assume that dust particles
741
+ are formed from a mixture of all available solids. As a conse-
742
+ quence, surface densities of solid phases, namely clathrates (and
743
+ NH3 monohydrate), amorphous ices, and pure condensates, are
744
+ evolved with the same diffusion coefficient, Ds, and radial veloc-
745
+ ity, vs. For particles of a given size, a, and Stokes number, St, the
746
+ diffusion coefficient is given by (Birnstiel et al. 2012):
747
+ Ds =
748
+ Dg
749
+ 1 + St2 .
750
+ (20)
751
+ The dust radial velocity is expressed as the sum of gas drag and
752
+ drift velocities (Birnstiel et al. 2012):
753
+ vs =
754
+ 1
755
+ 1 + St2 vg +
756
+ 2St
757
+ 1 + St2 vdrift,
758
+ (21)
759
+ where the drift velocity is (Weidenschilling 1997):
760
+ vdrift = c2
761
+ s
762
+ vK
763
+ d ln P
764
+ d ln r .
765
+ (22)
766
+ The diffusion coefficient and radial velocity of solids are com-
767
+ puted for the small and the large populations, that is, for particles
768
+ of sizes a0 and a1. The diffusion coefficient, Ds, and radial veloc-
769
+ ity vs used to evolve surface densities of solids are then given by
770
+ mass-averaged diffusivities and velocities of the small and large
771
+ population (Birnstiel et al. 2012):
772
+ �vs = fmvd,a1 + (1 − fm)vd,a0.
773
+ Ds = fmDd,a1 + (1 − fm)Dd,a0.
774
+ (23)
775
+ 2.4. Sources and sinks of trace species
776
+ We follow the approach of Aguichine et al. (2020) to depict the
777
+ sources and sinks for both the solid and vapor phases of the dif-
778
+ ferent species. A pure condensate of species i undergoes sub-
779
+ limation if its partial pressure is lower than the corresponding
780
+ equilibrium pressure. Sublimation results in a sink term for pure
781
+ condensates during the time step, ∆t (Dr˛a˙zkowska & Alibert
782
+ 2017):
783
+ ˙Qp,i = − min
784
+ �������
785
+
786
+ 8πµi
787
+ RT
788
+ 3
789
+ π¯a¯ρPeq,iΣp,i; Σp,i
790
+ ∆t
791
+ ������� ,
792
+ (24)
793
+ where µi is the molar mass of species i, ¯ρ is the mean bulk den-
794
+ sity of grains, Peq,i is the equilibrium pressure, and ¯a is the mean
795
+ size of grains. The second part of the minimum function ensures
796
+ that no more than the available quantity of pure condensate sub-
797
+ limates. Equilibrium curves of pure condensates are given in Ap-
798
+ pendix A.
799
+ Conversely, a gas of species i forms a pure condensate if
800
+ its partial pressure is larger than the corresponding equilibrium
801
+ pressure. The condensation rates results in a source term for pure
802
+ condensates (Dr˛a˙zkowska & Alibert 2017):
803
+ ˙Qp,i = min
804
+ ��
805
+ Pi − Peq,i
806
+ � 2Hµi
807
+ RT∆t; Σv,i
808
+ ∆t
809
+
810
+ .
811
+ (25)
812
+ We also added the possibility of NH3 monohydrate and
813
+ clathrate crystallization in the PSN. Assuming that enough crys-
814
+ talline water is available, these solids form first during the cool-
815
+ ing of the disk because their crystallization temperatures are
816
+ higher than those of the corresponding pure condensates (see
817
+ Fig. 3). The only exceptions to that rule are CO2 and NH3,
818
+ namely the only species that condense at a higher temperature
819
+ than their hydrates at nebular conditions (see Fig. 3). To compute
820
+ the source and sink terms of trace species in clathrates, we used
821
+ the same prescription as that used for pure condensates (Eqs.
822
+ 24 and 25). The equilibrium pressures of pure condensates are
823
+ replaced by those of clathrates and NH3 monohydrate (see Ap-
824
+ pendix B). The formation of clathrates and NH3 monohydrate
825
+ Article number, page 5 of 19
826
+
827
+ A&A proofs: manuscript no. main
828
+ also requires the presence of a minimum amount of crystalline
829
+ water, resulting in a limit for their source term ˙Qc,i:
830
+ ˙Qc,i∆t ≤
831
+ µi
832
+ S iµH2O
833
+ �������Σp,H2O −
834
+
835
+ k
836
+ Σc,k
837
+ S kµH2O
838
+ µk
839
+ ������� .
840
+ (26)
841
+ This expression takes the amount of available crystalline wa-
842
+ ter Σp,H2O and subtracts the amount of water that is already used
843
+ to trap currently existing clathrates. In this expression, S k is the
844
+ stoichiometric ratio between the species k and water. This ra-
845
+ tio is set to 5.75, 5.66, and 1 in the cases of type I clathrate,
846
+ type II clathrate, and NH3 monohydrate, respectively. This con-
847
+ dition sets an upper limit on the clathrate source term, that can be
848
+ equal to 0 if all the crystalline water is already holding clathrates.
849
+ If all conditions are met for a trace species to be able to form
850
+ pure condensates, clathrates, and monohydrates, we prioritize
851
+ the solid phase that has the greatest Pi − Peq,i value. Prioritizing
852
+ the largest Pi −Peq,i value is equivalent to prioritizing the highest
853
+ solidification rate. Such considerations are not taken into account
854
+ when performing a prioritization test among clathrate formation
855
+ and condensation of pure condensates, since clathrates only form
856
+ when pure condensates are not stable.
857
+ 10
858
+ 9
859
+ 10
860
+ 8
861
+ 10
862
+ 7
863
+ 10
864
+ 6
865
+ Midplane Pressure [bar]
866
+ 20
867
+ 30
868
+ 40
869
+ 50
870
+ 60
871
+ 70
872
+ 80
873
+ 90
874
+ 100
875
+ Temperature [K]
876
+ Condensation lines
877
+ Fig. 3. Equilibrium curves of pure condensates (solid lines), clathrates,
878
+ and NH3 monohydrate (dashed lines) in a pressure-temperature domain
879
+ relevant to PSN conditions (see the appendix for the relevant data). Two
880
+ clathrate structures are considered in our model, namely, type I and type
881
+ II with stoichiometric factors of 5.75 and 5.66, respectively. Partial pres-
882
+ sures are calculated by considering the species abundances given in Ta-
883
+ ble 1.
884
+ When grains containing amorphous ice cross the ACTZ,
885
+ water crystallizes and releases all the adsorbed volatiles irre-
886
+ versibly. The corresponding sink term is then:
887
+ ˙Qa = −Σa
888
+ ∆t,
889
+ (27)
890
+ with the only condition that must be satisfied is: T > TACTZ.
891
+ From the various rates of condensation, crystallization and
892
+ sublimation, we can finally derive the overall sink and source
893
+ term for the vapor:
894
+ ˙Qv,i = − ˙Qp,i − ˙Qc,i − ˙Qa,i.
895
+ (28)
896
+ 3. Results
897
+ Simulations have been performed in the case of two distinct sce-
898
+ narios. In scenario 1, particles initially released in the PSN are
899
+ only made from pure condensates. During their inward drift, they
900
+ can sublimate, condense again and/or form various clathrates
901
+ and a NH3 monohydrate, depending on the local temperature and
902
+ pressure conditions of the disk. In scenario 2, particles initially
903
+ released in the PSN are only made from amorphous ice. During
904
+ their inward drift, water contained in these particles transitions
905
+ to a crystalline structure when crossing the ACTZ and leads to
906
+ the release of adsorbed volatiles in the gas phase. The released
907
+ vapors can in turn condense into pure ices and/or form various
908
+ clathrates and NH3 monohydrate, following the prescription de-
909
+ scribed in the previous section. Both scenarios are explored with
910
+ the assumption of 0.1M⊙ for the mass of the PSN and a viscosity
911
+ parameter of α = 10−3.
912
+ The initial surface density of a species, i, is:
913
+ Σ0,i = x0,iΣg,
914
+ (29)
915
+ where x0,i is the initial mass fraction of the species, i. At t = 0,
916
+ the partial pressures of the different species are computed at each
917
+ point of the grid. In scenario 1, if the partial pressure of a given
918
+ species is below its equilibrium pressure, then the correspond-
919
+ ing location is filled with vapor. Otherwise, this location filled
920
+ with pure ice. In scenario 2, species are in the vapor phase where
921
+ T ≥ TACTZ and in an amorphous ice phrase otherwise. In both
922
+ scenarios, thermodynamic equilibrium is established after a few
923
+ time steps (∼ 1 yr).
924
+ The initial PSN composition is derived from the protosolar
925
+ elemental abundances tabulated by Lodders et al. (2009). We as-
926
+ sume that all C is distributed between CO, CO2, or CH4, with
927
+ the remaining O forming H2O. We have set CO:CO2:CH4 =
928
+ 10:4:1 in the PSN gas phase. The CO:CO2 ratio is derived from
929
+ ROSINA measurements of comet 67P/C-G between 2014 Au-
930
+ gust and 2016 September (Mousis et al. 2014). The CO:CH4 ra-
931
+ tio is consistent with the production rates measured in the south-
932
+ ern hemisphere of the 67P/C-G in October 2014 by the ROSINA
933
+ instrument (Le Roy et al. 2015). Sulfur is assumed to be half
934
+ in H2S form and half in refractory sulfide components (Pasek
935
+ et al. 2005). We also assumed N2:NH3 = 1:1, a value predicted
936
+ by thermochemical models that take into account catalytic ef-
937
+ fects of Fe grains on the kinetics of N2 to NH3 conversion of
938
+ the PSN (Fegley 2000; Mousis et al. 2009). The molar abun-
939
+ dances of the different species are derived from the gas phase
940
+ abundances given in Table 1.
941
+ Figure 4 represents the radial evolution of the water mass
942
+ abundance in the PSN at different epochs of its evolution in sce-
943
+ nario 1 and scenario 2 (top row and bottom row, respectively).
944
+ Article number, page 6 of 19
945
+
946
+ A. Schneeberger et al.: Evolution of the reservoirs of volatiles in the protosolar nebula
947
+ Table 1. Initial molar abundances of the considered trace species.
948
+ Trace species
949
+ (X/H2)⊙
950
+ Trace species
951
+ (X/H2)⊙
952
+ H2O
953
+ 5.479 × 10−4
954
+ NH3
955
+ 5.456 × 10−5
956
+ CO
957
+ 3.698 × 10−4
958
+ PH3
959
+ 6.368 × 10−7
960
+ CO2
961
+ 1.479 × 10−4
962
+ Ar
963
+ 7.150 × 10−6
964
+ CH4
965
+ 3.698 × 10−5
966
+ Kr
967
+ 4.310 × 10−9
968
+ H2S
969
+ 1.633 × 10−5
970
+ Xe
971
+ 4.210 × 10−10
972
+ N2
973
+ 5.456 × 10−5
974
+ Both cases produce very similar water abundances and show a
975
+ water enrichment peak that is about 10 times its initial abun-
976
+ dance at the location of the snowline (∼2.8 au). However, the
977
+ availability of crystalline ice is much more limited in scenario 2
978
+ due to H2O being mostly in an amorphous state. Indeed, in this
979
+ case, crystalline ice is present only in the ∼2.8–4 au region.
980
+ 3.1. Scenario 1: Initial delivery of pure condensates
981
+ Figure 5 represents the time and radial evolution of the abun-
982
+ dance ratios (with respect to initial abundances) of the differ-
983
+ ent species existing in various phases in the case of scenario 1,
984
+ respectively. After 10 kyr of PSN evolution, the species con-
985
+ sidered are present under all their possible forms – except for
986
+ CO2 and NH3, which are never enclathrated. By successive order
987
+ with progressing heliocentric distance (and decreasing tempera-
988
+ ture and pressure conditions), we first find the different vapors,
989
+ then narrow regions corresponding to the presence of clathrates,
990
+ and, finally, an outer region that is only populated with pure con-
991
+ densates. Regions where clathrates exist expand from 7 to 12 au,
992
+ depending on the species considered. At this early stage of the
993
+ PSN evolution, there is no significant enrichment that can be ob-
994
+ served for any species.
995
+ After 0.1 Myr of disk evolution, Figure 5 also shows that
996
+ beyond 6 au, clathrates coexist with pure condensates and their
997
+ abundances decrease steeply – except for CO2 and NH3, which
998
+ that exist only as pure ices. A few au beyond that, pure con-
999
+ densates become the only solid structures existing in the outer
1000
+ PSN. Depending on the PSN ther modynamic conditions and
1001
+ the availability of crystalline water, when the different species
1002
+ become fully enclathrated, their abundances form unique enrich-
1003
+ ment peaks located at their clathration lines, reaching up to ∼15
1004
+ times their initial values. On the other hand, if the budget of crys-
1005
+ talline water is not high enough, then the species are only partly
1006
+ enclathrated. They then form two narrow enrichment peaks at
1007
+ their condensation and clathration lines, reaching ∼5 and ∼15
1008
+ times their initial abundances, respectively. Table 2 displays the
1009
+ heliocentric distance and the value of the enrichment peak (rel-
1010
+ ative to the initial abundance) for each species under consider-
1011
+ ation at t = 0.1 Myr of the PSN evolution. Depending on the
1012
+ species considered, the enrichment peaks range between 2 and
1013
+ 18 times the protosolar values and are located in the 2–11 au re-
1014
+ gion. The closest and furthest peaks from the Sun are those of the
1015
+ water snow line at 2.8 au and N2 iceline at 10.8 au, respectively.
1016
+ Two enrichment peaks, located at the clathration and icelines,
1017
+ are found in the cases of CH4 and Kr.
1018
+ In Figure 5, all species, except CO, N2, and Ar, exhibit a
1019
+ dip in the surface densities of the pebbles of pure condensates
1020
+ around 10.5 au. In this region, the total surface density of icy
1021
+ pebbles is increased due to the combined actions of CO, N2, and
1022
+ Ar icelines located at 10.4, 10.9, and 10.7 au, respectively. The
1023
+ condensations rates of CO, N2, and Ar locally increase the sur-
1024
+ face density of solids, which are in excess compared with their
1025
+ loss rates via inward drift. On the other hand, because the ice-
1026
+ lines of the other species are located closer to the Sun, their sur-
1027
+ face densities progressively decrease in this region, as a result of
1028
+ the inward drift of particles.
1029
+ After 1 Myr of PSN evolution, all peaks are smoothed out
1030
+ in the gas phase. Because of the inward drift of pebbles, most of
1031
+ the species are in vapor form when the solids start to deplete. The
1032
+ total mass of solids has decreased by a factor of four compared
1033
+ to the beginning of the simulation. This effect is more significant
1034
+ in the case of clathrates forming at very low temperatures (less
1035
+ than 50 K), since the fraction of crystalline water used to form
1036
+ higher temperature clathrates increases with time.
1037
+ Table 2. Heliocentric distance and value of the enrichment peak (rela-
1038
+ tive to the initial abundance) for each species under consideration at t =
1039
+ 0.1 Myr in the case of scenario 1 (middle column of Figure 5).
1040
+ Element
1041
+ Peak location (au)
1042
+ Peak value
1043
+ H2O
1044
+ 2.7
1045
+ 11.0
1046
+ CO
1047
+ 10.4
1048
+ 8.1
1049
+ CO2
1050
+ 6.0
1051
+ 16.0
1052
+ CH4
1053
+ 7.1
1054
+ 4.7
1055
+ 9.5
1056
+ 9.4
1057
+ H2S
1058
+ 5.9
1059
+ 14.0
1060
+ N2
1061
+ 10.9
1062
+ 5.6
1063
+ NH3
1064
+ 5.6
1065
+ 17.2
1066
+ Ar
1067
+ 10.7
1068
+ 7.3
1069
+ Kr
1070
+ 8.2
1071
+ 9.12
1072
+ 9.8
1073
+ 23.5
1074
+ Xe
1075
+ 7.0
1076
+ 14.3
1077
+ PH3
1078
+ 6.4
1079
+ 15.4
1080
+ Both vapor and solid forms are considered.
1081
+ 3.2. Scenario 2: initial delivery of amorphous ices
1082
+ Figure 6 represents the time and radial evolutions of the abun-
1083
+ dance ratios (with respect to the initial abundances) of the dif-
1084
+ ferent species existing in various phases in the case of scenario
1085
+ 2. After 10 kyr of PSN evolution, with progressing heliocentric
1086
+ distance, first the different vapors are found, then an outer region
1087
+ that is only populated with amorphous ice. The budget of solid
1088
+ phase is dominated by species trapped in amorphous ice. Pure
1089
+ condensates only form when the vapors desorb from amorphous
1090
+ ice at the ACTZ (shown at ∼5 au), diffuse outward and cross an
1091
+ iceline. Such a process is efficient only if the condensation line
1092
+ is close to the ACTZ, leading to very narrow regions with the
1093
+ presence of pure condensates only in the case of NH3.
1094
+ After 0.1 Myr of disk evolution, it is notable that only pure
1095
+ condensates of NH3, H2S, CO2, and PH3 form. Table 3 displays
1096
+ the heliocentric distance and the value of the enrichment peak
1097
+ (relative to the initial abundance) for each species under consid-
1098
+ eration at this epoch of the PSN evolution. All peaks are located
1099
+ in a much narrower region, centered at the location of the ACTZ,
1100
+ compared with the scenario 1, with values ranging from 7 to 10
1101
+ times the initial abundances. The peak locations are influenced
1102
+ by the presence of narrow (less than 1 au) regions filled with pure
1103
+ condensates. In those regions, corresponding to the icelines, the
1104
+ abundance of pure condensates exceed that of amorphous ice,
1105
+ thus influencing the location of the enrichment peaks.
1106
+ After 1 Myr of PSN evolution, as a result of pebble drift, all
1107
+ peaks have been smoothed and the volatiles trapped in amor-
1108
+ phous water ice phase are strongly depleted by factors reach-
1109
+ Article number, page 7 of 19
1110
+
1111
+ A&A proofs: manuscript no. main
1112
+ 100
1113
+ 101
1114
+ Heliocentric distance [au]
1115
+ 10
1116
+ 5
1117
+ 10
1118
+ 4
1119
+ 10
1120
+ 3
1121
+ 10
1122
+ 2
1123
+ 10
1124
+ 1
1125
+ Water mass abundance
1126
+ Scenario I
1127
+ Scenario II
1128
+ t = 1.00e+04 yr
1129
+ 100
1130
+ 101
1131
+ Heliocentric distance [au]
1132
+ t = 1.00e+05 yr
1133
+ 100
1134
+ 101
1135
+ Heliocentric distance [au]
1136
+ t = 1.00e+06 yr
1137
+ 100
1138
+ 101
1139
+ Heliocentric distance [au]
1140
+ 10
1141
+ 5
1142
+ 10
1143
+ 4
1144
+ 10
1145
+ 3
1146
+ 10
1147
+ 2
1148
+ 10
1149
+ 1
1150
+ Water mass abundance
1151
+ t = 1.00e+04 yr
1152
+ 100
1153
+ 101
1154
+ Heliocentric distance [au]
1155
+ t = 1.00e+05 yr
1156
+ 100
1157
+ 101
1158
+ Heliocentric distance [au]
1159
+ t = 1.00e+06 yr
1160
+ Fig. 4. Time evolution of the mass abundance of water, defined as the radial profile of ΣH2O/Σg, for both scenarios at t = 104, 105, and 106 yr. Solid
1161
+ lines represent H2O in the gaseous phase (orange line), crystalline phase (blue line), and in amorphous phase (red line).
1162
+ ing more than 100, compared with their gaseous abundances in
1163
+ the inner disk. The amount of pure condensates exceeds that
1164
+ of amorphous ice in some narrow regions, except in the cases
1165
+ of H2S and PH3. For reasons identical to those invoked at the
1166
+ same epoch of PSN evolution in scenario 1, the surface density
1167
+ of solids is strongly decreased in the region centered at ∼7 au.
1168
+ Table 3. Heliocentric distance and value of the enrichment peak (rela-
1169
+ tive to the initial abundance) for each species under consideration at t =
1170
+ 0.1 Myr in the case of scenario 2 (middle column of Figure 6).
1171
+ Element
1172
+ Peak location (au)
1173
+ Peak value
1174
+ H2O
1175
+ 2.7
1176
+ 8.5
1177
+ CO
1178
+ 4.8
1179
+ 7.0
1180
+ CO2
1181
+ 4.7
1182
+ 7.5
1183
+ CH4
1184
+ 4.7
1185
+ 7.0
1186
+ H2S
1187
+ 4.7
1188
+ 7.1
1189
+ N2
1190
+ 4.7
1191
+ 7.0
1192
+ NH3
1193
+ 5.6
1194
+ 10.1
1195
+ Ar
1196
+ 4.7
1197
+ 7.0
1198
+ Kr
1199
+ 4.7
1200
+ 7.0
1201
+ Xe
1202
+ 4.7
1203
+ 7.0
1204
+ PH3
1205
+ 4.7
1206
+ 7.1
1207
+ Both vapor and solid forms are considered.
1208
+ 4. Discussion
1209
+ In this section, we discuss the implications of our model for var-
1210
+ ious bodies of the solar system. We first investigate the sensitiv-
1211
+ ity of our model to the variation of its input parameters and then
1212
+ provide fits of the volatile composition of comet R2 and those of
1213
+ Uranus and Neptune.
1214
+ 4.1. Sensitivity to parameters
1215
+ The stability of our results has been tested against the variations
1216
+ of the pebble density, disk’s mass, and the viscosity parameter in
1217
+ the 0.1–1 g cm−2, 10−2–10−1 M⊙, and 10−4–10−2 ranges, respec-
1218
+ tively. Variation in pebble density leads to results similar to those
1219
+ presented in Sec. 3.1 and 3.2. Lower density pebbles drift over
1220
+ shorter timescales at given size, but are also smaller because of
1221
+ a lower fragmentation limit (see Sect. 2.2). On the other hand,
1222
+ smaller pebbles drift over longer timescales, implying that both
1223
+ effects are (roughly) mutually counterbalanced and produce only
1224
+ minor variations in the abundance profiles. Both the mass and α
1225
+ viscosity parameter of the disk affect its viscous evolution and,
1226
+ thus, the locations of the various icelines. Less massive disks
1227
+ are cooler because of their reduced viscous dissipation (see Eq.
1228
+ 5) and display their icelines closer to the host star. For exam-
1229
+ ple, we find that the condensation and clathration lines of the
1230
+ species investigated in our study are ∼2 au closer to the Sun in a
1231
+ Article number, page 8 of 19
1232
+
1233
+ A. Schneeberger et al.: Evolution of the reservoirs of volatiles in the protosolar nebula
1234
+ 10−2 M⊙ disk, compared with a 10−1 M⊙ disk. As another exam-
1235
+ ple, the enrichment peak associated with the CO iceline ranges
1236
+ between 7 and 11 au from the Sun when the α–value is varied
1237
+ between 10−4 and 10−2. The magnitude of the abundance peaks
1238
+ is also affected by the variation of α. The abundance of the CO
1239
+ peak ranges between about 10 and 5 times, respectively, its ini-
1240
+ tial PSN abundance when the α value is varied between 10−4 and
1241
+ 10−2. In our disk model, the contribution from the irradiation by
1242
+ the Sun to the disk’s midplane temperature is not considered be-
1243
+ cause it is assumed that the outer PSN is shadowed by its inner
1244
+ region (Ohno & Ueda 2021). This allows the disk to reach tem-
1245
+ peratures low enough to enable the condensation of ultravolatiles
1246
+ (CO, N2, Ar, etc.) at the current locations of the giant planets,
1247
+ assuming the absence of migration during formation. When this
1248
+ contribution is included by considering the formalism depicted
1249
+ in Adams et al. (1988) and Ruden & Pollack (1991), the temper-
1250
+ ature profile becomes slightly warmer, implying that the icelines
1251
+ and clathration lines are moved outward by 1–2 au. Despite these
1252
+ changes, the general trend of our results is not impacted.
1253
+ 4.2. Implications for comet R2
1254
+ R2 is a long-period comet displaying an unusually high N2/CO
1255
+ ratio of 0.006–0.008 (Biver et al. 2018; Opitom et al. 2019). An-
1256
+ other peculiar characteristic of this comet is its heavy depletion
1257
+ in terms of H2O, with a CO/H2O ratio of about 312 (McKay et
1258
+ al. 2019).
1259
+ Figures 7 and 8 represent the radial profiles of the CO/H2O
1260
+ and N2/CO ratios calculated in the PSN pebbles with our nomi-
1261
+ nal model as a function of time in the cases of scenario 1 and
1262
+ scenario 2, respectively. Both ratios are compared with those
1263
+ measured in R2’s coma (blue horizontal bar). Assuming that R2
1264
+ formed from a unique set of building blocks, we require both
1265
+ ratios to be reproduced by our model at the same heliocentric
1266
+ distance and epoch. Simulations performed in the case of sce-
1267
+ nario 1 reproduce both ratios at a heliocentric distance of 7 au,
1268
+ after 1 Myr of PSN evolution. Our result is then consistent with
1269
+ those derived from the study of Mousis et al. (2021b), based on
1270
+ a simple approach that does not consider the interplay between
1271
+ the clathrate and water ice reservoirs.
1272
+ Simulations performed in the case of scenario 2 reproduce
1273
+ the N2/CO ratio at 8 au after 1 Myr of PSN evolution. However,
1274
+ the CO/H2O ratio is not matched by our model, even if a peak
1275
+ is seen at 8 au and 1 Myr. We should note that the positions and
1276
+ magnitudes of those peaks can change when the α–parameter
1277
+ and mass of our disk model are varied. This implies that, even
1278
+ if scenario 1 provides a better match of R2’s composition with
1279
+ our nominal model, scenario 2 cannot be excluded. Interestingly,
1280
+ our calculated peaks are within a zone of dynamic instability in
1281
+ the early Solar System, which is more likely to result in ejection
1282
+ of planetesimals than capture by the Oort Cloud. This is a pos-
1283
+ sible explanation for the lack of R2-like comets observed today
1284
+ (Anderson et al. 2022).
1285
+ 4.3. Implications for the composition of Jupiter
1286
+ One-σ error bar measurements made at Jupiter by the Galileo
1287
+ probe and the Juno spacecraft indicate C, N, O, S, P, Ar, Kr, and
1288
+ Xe abundances that are ∼1.5 to 6 times higher than the proto-
1289
+ solar values (Atreya et al. 2003; Wong et al. 2004; Mousis et
1290
+ al. 2018; Li et al. 2020). To explain those features, it has been
1291
+ proposed that Jupiter’s atmosphere could reflect the composition
1292
+ of icy planetesimals either made of amorphous ice (Owen et al.
1293
+ 1999) or from pure condensates and/or clathrates (Gautier et al.
1294
+ 2001; Gautier & Hersant 2005; Mousis et al. 2018, 2021b). Al-
1295
+ ternatively, it has been proposed that this supersolar metallicity
1296
+ could result from the accretion of already pre-enriched PSN gas
1297
+ (Mousis et al. 2019; Aguichine et al. 2022).
1298
+ Figure 9 represents the time evolution of the sum of the el-
1299
+ emental enrichments calculated in vapor and solid phases at the
1300
+ heliocetric distance of 4 au, compared with their protosolar val-
1301
+ ues, and in the cases of our two scenarios. Following the ap-
1302
+ proach of Aguichine et al. (2022), we focused on the composi-
1303
+ tion of the PSN at 4 au, chosen as the location of Jupiter’s for-
1304
+ mation. This distance is, in the model, beyond the water iceline
1305
+ but inward of the icelines of all other trace species. The dust-to-
1306
+ gas ratio can easily become greater than 2 to 3 times the pro-
1307
+ tosolar composition in this region and could ease the formation
1308
+ of a proto-Jupiter core via the streaming instability (Yang et al.
1309
+ 2017).
1310
+ Figure 9 shows that the measured elemental enrichments are
1311
+ all matched by our model after 0.8–1 Myr and 50–100 kyr of the
1312
+ PSN evolution in scenario 1 and scenario 2, respectively. Our
1313
+ models suggest that the consideration of clathrate formation in
1314
+ addition to the crystallization of pure condensates in the PSN
1315
+ (scenario 1) still allow for the formation of a Jupiter-like planet
1316
+ from supersolar gases originating from the disk, compared with
1317
+ models considering the crystallization of pure condensates only,
1318
+ such as that developed by Aguichine et al. (2022). Our model
1319
+ also suggests that the presence of multiple condensation and
1320
+ clathration lines does not alter the formation of supersolar va-
1321
+ pors subsequent to their release from amorphous ice (scenario
1322
+ 2). Previous works exploring this possibility did not consider the
1323
+ formation of icelines in their models (Monga & Desch 2015;
1324
+ Mousis et al. 2019). In particular, Saturn’s tropospheric abun-
1325
+ dances of C, N, S, and P have been measured to be between 3
1326
+ and 13 times their protosolar abundances (Atreya et al. 2018),
1327
+ suggesting that its metallicity is higher than that of Jupiter. As-
1328
+ suming that Saturn formed in the vicinity of the CO2 iceline to
1329
+ account for its high carbon enrichment, which corresponds to a
1330
+ heliocentric distance of ∼6 au at early epochs in our PSN model,
1331
+ our calculations show that this range of enrichments is repro-
1332
+ duced within 0.2–0.3 Myr in scenario 1 and 0.2 Myr in scenario
1333
+ 2. This implies that Saturn could have formed earlier than Jupiter
1334
+ in scenario 1, whereas in scenario 2, it could have formed later.
1335
+ An earlier formation of Saturn could have reduced the inward
1336
+ flux of pebble and vapors, lowering the value of elemental en-
1337
+ richment peaks at Jupiter’s location. However, the height of en-
1338
+ richment peaks is highly sensitive to the disk parameters (e.g.,
1339
+ the α-value; see Aguichine et al. (2022)). Therefore, if the ac-
1340
+ cretion of pebbles by Saturn reduces the height of the enrich-
1341
+ ment peaks at Jupiter’s location, it is still possible to achieve a
1342
+ metallicity similar to what is measured in its atmosphere.
1343
+ 4.4. Implications for the composition of Ice Giants
1344
+ The composition of the deep atmospheres of Uranus and Nep-
1345
+ tune is shrouded in mystery since most of the heavy constituents
1346
+ condense at pressures deeper than may readily be probed re-
1347
+ motely (Mousis et al. 2020). The only determinations that can
1348
+ be used so far in our model are the C/N and C/S ratios, which
1349
+ have been found equal to or higher than ∼175 and ∼35, respec-
1350
+ tively (Asplund et al. 2009; Karkoschka & Tomasko 2009, 2011;
1351
+ Irwin et al. 2018, 2019a,b). Figures 10 and 11 represent the ra-
1352
+ dial profiles of the C/N and C/S elemental ratios in pebbles as a
1353
+ function of time in the PSN, compared with the minimum val-
1354
+ ues measured in the tropospheres of the two ice giants. In both
1355
+ Article number, page 9 of 19
1356
+
1357
+ A&A proofs: manuscript no. main
1358
+ cases, these ratios can be reproduced in the ∼7–8 au region after
1359
+ 1 Myr of PSN evolution. The formation distance of solids in the
1360
+ PSN is model-dependent, but our simulations suggest that the
1361
+ giant planets did form in a more compact configuration than cur-
1362
+ rent the one – which is also in agreement with several dynamical
1363
+ models (Tsiganis et al. 2005; Lykawka et al. 2010; Guilera et
1364
+ al. 2011). Given their high metallicities, the formation of Uranus
1365
+ and Neptune requires a higher surface density of solids than the
1366
+ values derived here for the outer PSN. This assumption is at odds
1367
+ with the fact that the planetesimal density and collision proba-
1368
+ bility are both low in the outer disk. One way to overcome this
1369
+ difficulty would be to assume the formation of the two giants
1370
+ via the accretion of pebbles directly onto the planetary embryo,
1371
+ which can still work efficiently far from the host star (Helled et
1372
+ al. 2014; Bitsch et al. 2015, 2018; Armitage 2019).
1373
+ 4.5. Limitations of the model
1374
+ Over the recent years, substructures have been largely observed
1375
+ in protoplanetary disks. The ALMA/DSHARP survey showed
1376
+ that protoplanetary disks are not smooth and that substructures
1377
+ are ubiquitous (Andrews et al. 2020; Jennings et al. 2022). Sub-
1378
+ structures can be produces by planet-disk interactions, in the
1379
+ form of spiral density waves (Muto et al. 2012; Zhang et al.
1380
+ 2021) and gaps (Bae et al. 2017). Radiative hydrodynamic mod-
1381
+ els show that these substructures can be also formed by insta-
1382
+ bilities in the disk (Lovelace et al. 1999; Lovelace & Romanova
1383
+ 2014; Blanco et al. 2021). Such features translate into local den-
1384
+ sity and pressure variations that act as dust traps which locally
1385
+ enhance the dust surface density. Although our model does not
1386
+ take into account such disk substructures, we show that the ice-
1387
+ lines, clathration lines, and the ACTZ correspond to vapor and
1388
+ pebble enrichment peaks, which can lead to instabilities.
1389
+ In this work, giant planets are assumed to be formed in situ.
1390
+ In scenario 1, Jupiter is formed within 0.8–1 Myr. This timescale
1391
+ is compatible with a formation via pebble accretion (Bitsch et
1392
+ al. 2015, 2018; Alibert et al. 2018; Armitage 2019; Venturini &
1393
+ Helled 2020) and gravitational instability (Boss 1997; Zhu et al.
1394
+ 2012; Kratter & Lodato 2016). On the other hand, in scenario
1395
+ 2, Jupiter forms in less than 0.1 Myr. This timescale is consis-
1396
+ tent with a gravitational instability which can be triggered as
1397
+ early as 0.1 Myr (Zhu et al. 2012). An early formation of Jupiter
1398
+ allows us to account for the observed carbonaceous chondrites
1399
+ dichotomy (Kleine et al. 2020). Although, the disk instability
1400
+ model is consistent with formation timescales found in both sce-
1401
+ nario 1 and scenario 2, it is important to note that observations
1402
+ and models suggest that, at minimum, amorphous ice should be
1403
+ heated up to its crystallization temperature when falling from the
1404
+ presolar cloud onto the PSN (Visser et al. 2013). Those findings
1405
+ suggest that scenario 1 is the most likely scenario, implying that
1406
+ our results remain consistent with the core accretion model.
1407
+ One limitation of our model is the fact that planet migration
1408
+ is not considered. During or after formation, planets migrate in-
1409
+ ward or outward (Masset & Papaloizou 2003; Bitsch et al. 2015;
1410
+ Schneider & Bitsch 2021). During migration, planets accrete
1411
+ material from different parts of the disk with various compo-
1412
+ sitions. Although planetary migration contradicts an in situ for-
1413
+ mation hypothesis, 3D hydrodynamical simulations indicate that
1414
+ the rates of type I and type II migrations could be several times
1415
+ slower than the prescription usually employed in the literature of
1416
+ planet formation (Chrenko & Nesvorný 2020; Lega et al. 2021;
1417
+ Chametla & Chrenko 2022). Assuming an in situ formation of
1418
+ Jupiter in our model to reproduce its observed metallicity is ex-
1419
+ pected to remain valid in light of these revised migration rates
1420
+ because our derived timescales are still quite short, compared to
1421
+ the PSN evolution.
1422
+ 5. Conclusion
1423
+ In this work, we investigate the impact of clathrate formation
1424
+ on the radial distribution of volatiles in the PSN, considering
1425
+ two scenarios, each of them corresponding to a distinct initial
1426
+ condition. To do so, we used a 1D protoplanetary disk model
1427
+ coupled with modules describing the evolution of trace species
1428
+ in the vapor phase, as well as the dynamics of dust and peb-
1429
+ bles. This model also considers the different sources and sinks
1430
+ for the volatile phases considered (vapors, pure condensates, or
1431
+ clathrates).
1432
+ In scenario 1, we assume that the volatiles were delivered to
1433
+ the PSN in the form of pure condensate grains. In this case, we
1434
+ show that clathrates can crystallize and form enrichment peaks
1435
+ at about 10 times the value of the initial abundances at their
1436
+ clathration lines, which are closer to the Sun than their corre-
1437
+ sponding icelines. The amount of clathrates formed in the PSN
1438
+ depends on the local abundance of crystalline water, which in
1439
+ many cases, acts as a limiting factor in our model. In scenario
1440
+ 2, we assumed that the volatiles were delivered to the PSN in
1441
+ the form of amorphous grains. Under those conditions, volatiles
1442
+ are only released from amorphous ice when the icy grains are
1443
+ heated up to ∼135K, namely, at the ACTZ location. An enrich-
1444
+ ment peak up to about seven times the initial abundances then
1445
+ forms at the ACTZ location. In this case, clathrate formation is
1446
+ not possible because there is no crystalline water ice available
1447
+ beyond the ACTZ in the PSN. All the enrichment peaks of pure
1448
+ condensates are also located close to the ACTZ. Our investiga-
1449
+ tion shows that both scenario 1 and scenario 2 can reproduce the
1450
+ known compositions of comet R2, Jupiter, Uranus, and Neptune.
1451
+ This implies that our model does not allow us to formally rule
1452
+ out the presence of amorphous ice during the early phases of the
1453
+ PSN, assuming that those planetary bodies accreted from peb-
1454
+ bles or pebble-made planetesimals. More planetary composition
1455
+ data, such as the in situ measurements of Saturn’s atmosphere,
1456
+ are needed to understand the initial formation conditions of the
1457
+ PSN.
1458
+ 6. Acknowledgments
1459
+ The project leading to this publication has received fund-
1460
+ ing from the Excellence Initiative of Aix-Marseille Université
1461
+ – A*Midex, a French ”Investissements d’Avenir programme”
1462
+ AMX-21-IET-018. This research holds as part of the project FA-
1463
+ COM (ANR-22-CE49-0005-01_ACT) and has benefited from a
1464
+ funding provided by l’Agence Nationale de la Recherche (ANR)
1465
+ under the Generic Call for Proposals 2022. OM acknowledges
1466
+ support from CNES. JIL was supported by the Juno project. We
1467
+ acknowledge Sarah E. Anderson for helpful discussions about
1468
+ her dynamical simulations regarding the origin of comet R2. We
1469
+ thank the anonymous referee for their useful comments that im-
1470
+ proved the quality of this paper.
1471
+ Article number, page 10 of 19
1472
+
1473
+ A. Schneeberger et al.: Evolution of the reservoirs of volatiles in the protosolar nebula
1474
+ 10
1475
+ 2
1476
+ 10
1477
+ 1
1478
+ 100
1479
+ 101
1480
+ f
1481
+ NH3
1482
+ t = 1.00e+04 yr
1483
+ t = 1.00e+05 yr
1484
+ t = 1.00e+06 yr
1485
+ 10
1486
+ 2
1487
+ 10
1488
+ 1
1489
+ 100
1490
+ 101
1491
+ f
1492
+ H2S
1493
+ 10
1494
+ 2
1495
+ 10
1496
+ 1
1497
+ 100
1498
+ 101
1499
+ f
1500
+ CO2
1501
+ 10
1502
+ 2
1503
+ 10
1504
+ 1
1505
+ 100
1506
+ 101
1507
+ f
1508
+ PH3
1509
+ 10
1510
+ 2
1511
+ 10
1512
+ 1
1513
+ 100
1514
+ 101
1515
+ f
1516
+ CH4
1517
+ 10
1518
+ 2
1519
+ 10
1520
+ 1
1521
+ 100
1522
+ 101
1523
+ f
1524
+ N2
1525
+ 10
1526
+ 2
1527
+ 10
1528
+ 1
1529
+ 100
1530
+ 101
1531
+ f
1532
+ CO
1533
+ 10
1534
+ 2
1535
+ 10
1536
+ 1
1537
+ 100
1538
+ 101
1539
+ f
1540
+ Ar
1541
+ 10
1542
+ 2
1543
+ 10
1544
+ 1
1545
+ 100
1546
+ 101
1547
+ f
1548
+ Kr
1549
+ 100
1550
+ 101
1551
+ Heliocentric distance [au]
1552
+ 10
1553
+ 2
1554
+ 10
1555
+ 1
1556
+ 100
1557
+ 101
1558
+ f
1559
+ Xe
1560
+ 100
1561
+ 101
1562
+ Heliocentric distance [au]
1563
+ 100
1564
+ 101
1565
+ Heliocentric distance [au]
1566
+ Fig. 5. Time and radial evolution of species’ mass abundances normalized to their initial values in gaseous phase (orange line), pure condensate
1567
+ form (blue line), and clathrate (green line), at t = 104, 105, and 106 yr in scenario 1.
1568
+ Article number, page 11 of 19
1569
+
1570
+ A&A proofs: manuscript no. main
1571
+ 10
1572
+ 2
1573
+ 10
1574
+ 1
1575
+ 100
1576
+ 101
1577
+ f
1578
+ NH3
1579
+ t = 1.00e+04 yr
1580
+ t = 1.00e+05 yr
1581
+ t = 1.00e+06 yr
1582
+ 10
1583
+ 2
1584
+ 10
1585
+ 1
1586
+ 100
1587
+ 101
1588
+ f
1589
+ H2S
1590
+ 10
1591
+ 2
1592
+ 10
1593
+ 1
1594
+ 100
1595
+ 101
1596
+ f
1597
+ CO2
1598
+ 10
1599
+ 2
1600
+ 10
1601
+ 1
1602
+ 100
1603
+ 101
1604
+ f
1605
+ PH3
1606
+ 10
1607
+ 2
1608
+ 10
1609
+ 1
1610
+ 100
1611
+ 101
1612
+ f
1613
+ CH4
1614
+ 10
1615
+ 2
1616
+ 10
1617
+ 1
1618
+ 100
1619
+ 101
1620
+ f
1621
+ N2
1622
+ 10
1623
+ 2
1624
+ 10
1625
+ 1
1626
+ 100
1627
+ 101
1628
+ f
1629
+ CO
1630
+ 10
1631
+ 2
1632
+ 10
1633
+ 1
1634
+ 100
1635
+ 101
1636
+ f
1637
+ Ar
1638
+ 10
1639
+ 2
1640
+ 10
1641
+ 1
1642
+ 100
1643
+ 101
1644
+ f
1645
+ Kr
1646
+ 100
1647
+ 101
1648
+ Heliocentric distance [au]
1649
+ 10
1650
+ 2
1651
+ 10
1652
+ 1
1653
+ 100
1654
+ 101
1655
+ f
1656
+ Xe
1657
+ 100
1658
+ 101
1659
+ Heliocentric distance [au]
1660
+ 100
1661
+ 101
1662
+ Heliocentric distance [au]
1663
+ Fig. 6. Time and radial evolution of species’ mass abundances normalized to their initial values in gaseous phase (orange line), pure condensate
1664
+ form (blue line), and amorphous form (red line), compared with their initial mass abundances, at t = 104, 105, and 106 yr in scenario 2.
1665
+ Article number, page 12 of 19
1666
+
1667
+ A. Schneeberger et al.: Evolution of the reservoirs of volatiles in the protosolar nebula
1668
+ 100
1669
+ 101
1670
+ Heliocentric distance [au]
1671
+ 10
1672
+ 4
1673
+ 10
1674
+ 3
1675
+ 10
1676
+ 2
1677
+ 10
1678
+ 1
1679
+ 100
1680
+ 101
1681
+ 102
1682
+ 103
1683
+ [N2]/[CO]
1684
+ R2
1685
+ 0.1 Myr
1686
+ 0.5 Myr
1687
+ 1.0 Myr
1688
+ 100
1689
+ 101
1690
+ Heliocentric distance [au]
1691
+ 10
1692
+ 4
1693
+ 10
1694
+ 3
1695
+ 10
1696
+ 2
1697
+ 10
1698
+ 1
1699
+ 100
1700
+ 101
1701
+ 102
1702
+ 103
1703
+ [CO]/[H2O]
1704
+ R2
1705
+ 0.1 Myr
1706
+ 0.5 Myr
1707
+ 1.0 Myr
1708
+ Fig. 7. N2/CO (top panel) and CO/H2O (bottom panel) abundance ratios
1709
+ in pebbles represented as a function of heliocentric distance in the case
1710
+ of scenario 1, and compared with those measured in R2’s coma (blue
1711
+ bar) at 0.1, 0.5, and 1 Myr of the PSN evolution. Both ratios measured
1712
+ in R2 are simultaneously matched by our model at a distance of 7 au
1713
+ and 1 Myr.
1714
+ 100
1715
+ 101
1716
+ Heliocentric distance [au]
1717
+ 10
1718
+ 4
1719
+ 10
1720
+ 3
1721
+ 10
1722
+ 2
1723
+ 10
1724
+ 1
1725
+ 100
1726
+ 101
1727
+ 102
1728
+ 103
1729
+ [N2]/[CO]
1730
+ R2
1731
+ 0.1 Myr
1732
+ 0.5 Myr
1733
+ 1.0 Myr
1734
+ 100
1735
+ 101
1736
+ Heliocentric distance [au]
1737
+ 10
1738
+ 4
1739
+ 10
1740
+ 3
1741
+ 10
1742
+ 2
1743
+ 10
1744
+ 1
1745
+ 100
1746
+ 101
1747
+ 102
1748
+ 103
1749
+ [CO]/[H2O]
1750
+ R2
1751
+ 0.1 Myr
1752
+ 0.5 Myr
1753
+ 1.0 Myr
1754
+ Fig. 8. N2/CO (top panel) and CO/H2O (bottom panel) abundance ratios
1755
+ in pebbles represented as a function of heliocentric distance in the case
1756
+ of scenario 2, and compared with those measured in R2’s coma (blue
1757
+ bar) at 0.1, 0.5 and 1 Myr of the PSN evolution. Only the N2/CO ratio
1758
+ is reproduced in R2 at 8 au and 1 Myr. The CO/H2O ratio is however
1759
+ approached by our model at the same location and epoch of the PSN
1760
+ evolution.
1761
+ Article number, page 13 of 19
1762
+
1763
+ A&A proofs: manuscript no. main
1764
+ 104
1765
+ 105
1766
+ time (yr)
1767
+ 100
1768
+ 101
1769
+ fvapor + solid
1770
+ Scenario I, r = 4.0 au
1771
+ C
1772
+ S
1773
+ N
1774
+ P
1775
+ O
1776
+ Ar
1777
+ Kr
1778
+ Xe
1779
+ 104
1780
+ 105
1781
+ time (yr)
1782
+ 100
1783
+ 101
1784
+ fvapor + solid
1785
+ Scenario II, r = 4.0 au
1786
+ C
1787
+ S
1788
+ N
1789
+ P
1790
+ O
1791
+ Ar
1792
+ Kr
1793
+ Xe
1794
+ Fig. 9. Time evolution of the elemental abundances (relatives to the pro-
1795
+ tosolar values) at a heliocentric distance of 4 au in the cases of scenario
1796
+ 1 (top panel) and scenario 2 (bottom panel). The blue area corresponds
1797
+ to the range covered by the elemental abundances derived from space-
1798
+ craft measurements (see text).
1799
+ 100
1800
+ 101
1801
+ Heliocentric distance [au]
1802
+ 10
1803
+ 1
1804
+ 100
1805
+ 101
1806
+ 102
1807
+ 103
1808
+ 104
1809
+ C/N
1810
+ 0.1 Myr
1811
+ 0.5 Myr
1812
+ 1.0 Myr
1813
+ 100
1814
+ 101
1815
+ Heliocentric distance [au]
1816
+ 10
1817
+ 1
1818
+ 100
1819
+ 101
1820
+ 102
1821
+ 103
1822
+ 104
1823
+ C/S
1824
+ 0.1 Myr
1825
+ 0.5 Myr
1826
+ 1.0 Myr
1827
+ Fig. 10. Radial profiles of the C/N (top panel) and C/S (bottom panel)
1828
+ ratios calculated in pebbles at different epochs of the PSN evolution in
1829
+ the case of scenario 1. The horizontal dashed line represents the min-
1830
+ imum ratio measured in the tropospheres of Uranus and Neptune. The
1831
+ orange area encompasses the current locations of the ice giants in the
1832
+ solar system.
1833
+ Article number, page 14 of 19
1834
+
1835
+ A. Schneeberger et al.: Evolution of the reservoirs of volatiles in the protosolar nebula
1836
+ 100
1837
+ 101
1838
+ Heliocentric distance [au]
1839
+ 10
1840
+ 1
1841
+ 100
1842
+ 101
1843
+ 102
1844
+ 103
1845
+ 104
1846
+ C/N
1847
+ 0.1 Myr
1848
+ 0.5 Myr
1849
+ 1.0 Myr
1850
+ 100
1851
+ 101
1852
+ Heliocentric distance [au]
1853
+ 10
1854
+ 1
1855
+ 100
1856
+ 101
1857
+ 102
1858
+ 103
1859
+ 104
1860
+ C/S
1861
+ 0.1 Myr
1862
+ 0.5 Myr
1863
+ 1.0 Myr
1864
+ Fig. 11. Radial profiles of the C/N (top panel) and C/S (bottom panel)
1865
+ ratios calculated in pebbles at different epochs of the PSN evolution in
1866
+ the case of scenario 2. The horizontal dashed line represents the min-
1867
+ imum ratio measured in the tropospheres of Uranus and Neptune. The
1868
+ orange area encompasses the current locations of the ice giants in the
1869
+ Solar System.
1870
+ Article number, page 15 of 19
1871
+
1872
+ A&A proofs: manuscript no. main
1873
+ References
1874
+ Adams, F. C., Lada, C. J., & Shu, F. H. 1988, ApJ, 326, 865. doi:10.1086/166144
1875
+ Aguichine, A., Mousis, O., Devouard, B., et al. 2020, ApJ, 901, 97.
1876
+ doi:10.3847/1538-4357/abaf47
1877
+ Aguichine, A., Mousis, O., & Lunine, J. I. 2022, Planet. sci. j. , 3, 141.
1878
+ doi:10.3847/PSJ/ac6bf1
1879
+ Alibert, Y., Venturini, J., Helled, R., et al. 2018, Nature Astronomy, 2, 873.
1880
+ doi:10.1038/s41550-018-0557-2
1881
+ Anderson, S. E., Petit, J.-M., Noyelles, B., et al. 2022, LPI Contributions, 2678,
1882
+ 2395
1883
+ Andrews, S. M., Huang, J., Perez, L. M., et al. 2020, VizieR Online Data Catalog,
1884
+ J/ApJ/869/L41
1885
+ Armitage, P. J. 2019, Saas-Fee Advanced Course, 45, 1. doi:10.1007/978-3-662-
1886
+ 58687-7_1
1887
+ Asplund, M., Grevesse, N., Sauval, A. J., et al. 2009, ARA&A, 47, 481.
1888
+ doi:10.1146/annurev.astro.46.060407.145222
1889
+ Atreya, S. K., Mahaffy, P. R., Niemann, H. B., et al. 2003, Planet. Space Sci., 51,
1890
+ 105. doi:10.1016/S0032-0633(02)00144-7
1891
+ Atreya, S. K., Crida, A., Guillot, T., et al. 2018, Saturn in the 21st Century, 5.
1892
+ doi:10.1017/9781316227220.002
1893
+ Bae, J., Zhu, Z., & Hartmann, L. 2017, ApJ, 850, 201. doi:10.3847/1538-
1894
+ 4357/aa9705
1895
+ Baines, K. H., Mickelson, M. E., Larson, L. E., et al. 1995, Icarus, 114, 328.
1896
+ doi:10.1006/icar.1995.1065
1897
+ Bar-Nun,
1898
+ A.,
1899
+ Notesco,
1900
+ G.,
1901
+ &
1902
+ Owen,
1903
+ T.
1904
+ 2007,
1905
+ Icarus,
1906
+ 190,
1907
+ 655.
1908
+ doi:10.1016/j.icarus.2007.03.021
1909
+ Bell, K. R. & Lin, D. N. C. 1994, ApJ, 427, 987. doi:10.1086/174206
1910
+ Birnstiel,
1911
+ T.,
1912
+ Klahr,
1913
+ H.,
1914
+ &
1915
+ Ercolano,
1916
+ B.
1917
+ 2012,
1918
+ A&A,
1919
+ 539,
1920
+ A148.
1921
+ doi:10.1051/0004-6361/201118136
1922
+ Bitsch, B., Lambrechts, M., & Johansen, A. 2015, A&A, 582, A112.
1923
+ doi:10.1051/0004-6361/201526463
1924
+ Bitsch, B., Lambrechts, M., & Johansen, A. 2018, A&A, 609. doi:10.1051/0004-
1925
+ 6361/201526463e
1926
+ Biver, N., Bockelée-Morvan, D., Paubert, G., et al. 2018, A&A, 619, A127.
1927
+ doi:10.1051/0004-6361/201833449
1928
+ Blanco, D., Ricci, L., Flock, M., et al. 2021, ApJ, 920, 70. doi:10.3847/1538-
1929
+ 4357/ac15fa
1930
+ Boss, A. P. 1997, Science, 276, 1836. doi:10.1126/science.276.5320.1836
1931
+ Booth, R. A., Clarke, C. J., Madhusudhan, N., et al. 2017, MNRAS, 469, 3994.
1932
+ doi:10.1093/mnras/stx1103
1933
+ Burkhardt, A. M., Shingledecker, C. N., Le Gal, R., et al. 2019, ApJ, 881, 32.
1934
+ doi:10.3847/1538-4357/ab2be8
1935
+ Chametla,
1936
+ R.
1937
+ O.
1938
+ &
1939
+ Chrenko,
1940
+ O.
1941
+ 2022,
1942
+ MNRAS,
1943
+ 512,
1944
+ 2189.
1945
+ doi:10.1093/mnras/stac611
1946
+ Chrenko, O. & Nesvorný, D. 2020, A&A, 642, A219. doi:10.1051/0004-
1947
+ 6361/202038988
1948
+ Ciesla, F. J., Mulders, G. D., Pascucci, I., et al. 2015, ApJ, 804, 9.
1949
+ doi:10.1088/0004-637X/804/1/9
1950
+ Desch, S. J., Estrada, P. R., Kalyaan, A., et al. 2017, ApJ, 840, 86.
1951
+ doi:10.3847/1538-4357/aa6bfb
1952
+ Dodson-Robinson, S. E., Willacy, K., Bodenheimer, P., et al. 2009, Icarus, 200,
1953
+ 672. doi:10.1016/j.icarus.2008.11.023
1954
+ Dr˛a˙zkowska, J. & Alibert, Y. 2017, A&A, 608, A92. doi:10.1051/0004-
1955
+ 6361/201731491
1956
+ Fegley, B. J. 2000, Space Science Reviews, 92, 177
1957
+ Fray,
1958
+ N.
1959
+ &
1960
+ Schmitt,
1961
+ B.
1962
+ 2009,
1963
+ Planet.
1964
+ Space
1965
+ Sci.,
1966
+ 57,
1967
+ 2053.
1968
+ doi:10.1016/j.pss.2009.09.011
1969
+ Gautier,
1970
+ D.,
1971
+ Hersant,
1972
+ F.,
1973
+ Mousis,
1974
+ O.,
1975
+ et
1976
+ al.
1977
+ 2001,
1978
+ ApJ,
1979
+ 550,
1980
+ L227.
1981
+ doi:10.1086/319648
1982
+ Gautier, D. & Hersant, F. 2005, Space Sci. Rev., 116, 25. doi:10.1007/s11214-
1983
+ 005-1946-2
1984
+ Gibb, E. L., Whittet, D. C. B., Boogert, A. C. A., et al. 2004, ApJS, 151, 35.
1985
+ doi:10.1086/381182
1986
+ Guilera, O. M., Fortier, A., Brunini, A., et al. 2011, A&A, 532, A142.
1987
+ doi:10.1051/0004-6361/201015731
1988
+ Hartmann, L., Calvet, N., Gullbring, E., et al. 1998, ApJ, 495, 385.
1989
+ doi:10.1086/305277
1990
+ Helled, R., Bodenheimer, P., Podolak, M., et al. 2014, Protostars and Planets VI,
1991
+ 643. doi:10.2458/azu_uapress_9780816531240-ch028
1992
+ Hersant, F., Gautier, D., & Lunine, J. I. 2004, Planet. Space Sci., 52, 623.
1993
+ doi:10.1016/j.pss.2003.12.011
1994
+ Hueso, R. & Guillot, T. 2005, A&A, 442, 703. doi:10.1051/0004-6361:20041905
1995
+ Irwin, P. G. J., Toledo, D., Garland, R., et al. 2018, Nature Astronomy, 2, 420.
1996
+ doi:10.1038/s41550-018-0432-1
1997
+ Irwin, P. G. J., Toledo, D., Garland, R., et al. 2019, Icarus, 321, 550.
1998
+ doi:10.1016/j.icarus.2018.12.014
1999
+ Irwin, P. G. J., Toledo, D., Braude, A. S., et al. 2019, Icarus, 331, 69.
2000
+ doi:10.1016/j.icarus.2019.05.011
2001
+ Jennings, J., Booth, R. A., Tazzari, M., et al. 2022, MNRAS, 509, 2780.
2002
+ doi:10.1093/mnras/stab3185
2003
+ Jenniskens, P., Blake, D. F., Wilson, M. A., et al. 1995, ApJ, 455, 389.
2004
+ doi:10.1086/176585
2005
+ Johansen, A., Blum, J., Tanaka, H., et al. 2014, Protostars and Planets VI, 547.
2006
+ doi:10.2458/azu_uapress_9780816531240-ch024
2007
+ Karkoschka,
2008
+ E.
2009
+ &
2010
+ Tomasko,
2011
+ M.
2012
+ 2009,
2013
+ Icarus,
2014
+ 202,
2015
+ 287.
2016
+ doi:10.1016/j.icarus.2009.02.010
2017
+ Karkoschka,
2018
+ E.
2019
+ &
2020
+ Tomasko,
2021
+ M.
2022
+ G.
2023
+ 2011,
2024
+ Icarus,
2025
+ 211,
2026
+ 780.
2027
+ doi:10.1016/j.icarus.2010.08.013
2028
+ Kratter, K. & Lodato, G. 2016, ARA&A, 54, 271. doi:10.1146/annurev-astro-
2029
+ 081915-023307
2030
+ Kleine, T., Budde, G., Burkhardt, C., et al. 2020, Space Sci. Rev., 216, 55.
2031
+ doi:10.1007/s11214-020-00675-w
2032
+ Lambrechts, M. & Johansen, A. 2014, A&A, 572, A107. doi:10.1051/0004-
2033
+ 6361/201424343
2034
+ Lega, E., Nelson, R. P., Morbidelli, A., et al. 2021, A&A, 646, A166.
2035
+ doi:10.1051/0004-6361/202039520
2036
+ Le Roy, L., Altwegg, K., Balsiger, H., et al. 2015, A&A, 583, A1.
2037
+ doi:10.1051/0004-6361/201526450
2038
+ Li, C., Ingersoll, A., Bolton, S., et al. 2020, Nature Astronomy, 4, 609.
2039
+ doi:10.1038/s41550-020-1009-3
2040
+ Lindal, G. F., Lyons, J. R., Sweetnam, D. N., et al. 1987, J. Geophys. Res., 92,
2041
+ 14987. doi:10.1029/JA092iA13p14987
2042
+ Lindal, G. F., Lyons, J. R., Sweetnam, D. N., et al. 1990, Geophys. Res. Lett.,
2043
+ 17, 1733. doi:10.1029/GL017i010p01733
2044
+ Lodders, K., Palme, H., & Gail, H.-P. 2009, Landolt B&ouml;rnstein, 4B, 712.
2045
+ doi:10.1007/978-3-540-88055-4_34
2046
+ Longhi,
2047
+ J.
2048
+ 2005,
2049
+ Geochim.
2050
+ Cosmochim.
2051
+ Acta,
2052
+ 69,
2053
+ 529.
2054
+ doi:10.1016/j.gca.2004.07.007
2055
+ Lovelace, R. V. E., Li, H., Colgate, S. A., et al. 1999, ApJ, 513, 805.
2056
+ doi:10.1086/306900
2057
+ Lovelace, R. V. E. & Romanova, M. M. 2014, Fluid Dynamics Research, 46,
2058
+ 041401. doi:10.1088/0169-5983/46/4/041401
2059
+ Lunine, J. I. & Stevenson, D. J. 1985, ApJS, 58, 493. doi:10.1086/191050
2060
+ Lykawka, P. S., Horner, J., Jones, B. W., et al. 2010, MNRAS, 404, 1272.
2061
+ doi:10.1111/j.1365-2966.2010.16381.x
2062
+ Lynden-Bell,
2063
+ D.
2064
+ &
2065
+ Pringle,
2066
+ J.
2067
+ E.
2068
+ 1974,
2069
+ MNRAS,
2070
+ 168,
2071
+ 603.
2072
+ doi:10.1093/mnras/168.3.603
2073
+ Mandt, K. E., Mousis, O., Lunine, J., et al. 2020, Space Sci. Rev., 216, 99.
2074
+ doi:10.1007/s11214-020-00723-5
2075
+ Masset, F. S. & Papaloizou, J. C. B. 2003, ApJ, 588, 494. doi:10.1086/373892
2076
+ Mayer, E. & Pletzer, R. 1986, Nature, 319, 298. doi:10.1038/319298a0
2077
+ McKay, A. J., DiSanti, M. A., Kelley, M. S. P., et al. 2019, AJ, 158, 128.
2078
+ doi:10.3847/1538-3881/ab32e4
2079
+ Miura,
2080
+ H.,
2081
+ Yamamoto,
2082
+ T.,
2083
+ Nomura,
2084
+ H.,
2085
+ et
2086
+ al.
2087
+ 2017,
2088
+ ApJ,
2089
+ 839,
2090
+ 47.
2091
+ doi:10.3847/1538-4357/aa67df
2092
+ Monga, N. & Desch, S. 2015, ApJ, 798, 9. doi:10.1088/0004-637X/798/1/9
2093
+ Mousis, O., Lunine, J. I., Thomas, C., et al. 2009, ApJ, 691, 1780.
2094
+ doi:10.1088/0004-637X/691/2/1780
2095
+ Mousis, O., Marboeuf, U., Lunine, J. I., et al. 2009, ApJ, 696, 1348.
2096
+ doi:10.1088/0004-637X/696/2/1348
2097
+ Mousis, O., Lunine, J. I., Madhusudhan, N., et al. 2012, ApJ, 751, L7.
2098
+ doi:10.1088/2041-8205/751/1/L7
2099
+ Mousis, O., Lunine, J. I., Fletcher, L. N., et al. 2014, ApJ, 796, L28.
2100
+ doi:10.1088/2041-8205/796/2/L28
2101
+ Mousis, O., Atkinson, D. H., Cavalié, T., et al. 2018, Planet. Space Sci., 155, 12.
2102
+ doi:10.1016/j.pss.2017.10.005
2103
+ Mousis, O., Ronnet, T., & Lunine, J. I. 2019, ApJ, 875, 9. doi:10.3847/1538-
2104
+ 4357/ab0a72
2105
+ Mousis, O., Aguichine, A., Helled, R., et al. 2020, Philosophical Trans-
2106
+ actions of the Royal Society of London Series A, 378, 20200107.
2107
+ doi:10.1098/rsta.2020.0107
2108
+ Mousis, O., Aguichine, A., Bouquet, A., et al. 2021a, Planet. sci. j. Planet. sci. j.
2109
+ , 2, 72. doi:10.3847/PSJ/abeaa7
2110
+ Mousis, O., Lunine, J.I., & Aguichine, A. 2021b, ApJ, 918, L23.
2111
+ Muto, T., Grady, C. A., Hashimoto, J., et al. 2012, ApJ, 748, L22.
2112
+ doi:10.1088/2041-8205/748/2/L22
2113
+ Nakamoto, T. & Nakagawa, Y. 1994, ApJ, 421, 640. doi:10.1086/173678
2114
+ Öberg, K. I. & Wordsworth, R. 2019, AJ, 158, 194. doi:10.3847/1538-
2115
+ 3881/ab46a8
2116
+ Ohno, K. & Ueda, T. 2021, A&A, 651, L2. doi:10.1051/0004-6361/202141169
2117
+ Opitom, C., Hutsemékers, D., Jehin, E., et al. 2019, A&A, 624, A64.
2118
+ doi:10.1051/0004-6361/201834357
2119
+ Owen, T., Mahaffy, P., Niemann, H. B., et al. 1999, Nature, 402, 269.
2120
+ doi:10.1038/46232
2121
+ Pasek, M. A., Milsom, J. A., Ciesla, F. J., et al. 2005, Icarus, 175, 1.
2122
+ doi:10.1016/j.icarus.2004.10.012
2123
+ Ruden, S. P. & Pollack, J. B. 1991, ApJ, 375, 740. doi:10.1086/170239
2124
+ Article number, page 16 of 19
2125
+
2126
+ A. Schneeberger et al.: Evolution of the reservoirs of volatiles in the protosolar nebula
2127
+ Schneider, A. D. & Bitsch, B. 2021, A&A, 654, A72. doi:10.1051/0004-
2128
+ 6361/202141096
2129
+ Shakura, N. I. & Sunyaev, R. A. 1973, X- and Gamma-Ray Astronomy, 55, 155
2130
+ Sromovsky, L. A., Karkoschka, E., Fry, P. M., et al. 2014, Icarus, 238, 137.
2131
+ doi:10.1016/j.icarus.2014.05.016
2132
+ Stull,D.R
2133
+ 1947, Industrial & Engineering Chemistry, Vol. 39, p. 517-540,
2134
+ doi:10.1021/ie50448a022
2135
+ Tsiganis, K., Gomes, R., Morbidelli, A., et al. 2005, Nature, 435, 459.
2136
+ doi:10.1038/nature03539
2137
+ Venturini, J. & Helled, R. 2020, A&A, 634, A31. doi:10.1051/0004-
2138
+ 6361/201936591
2139
+ Visser, R., Jørgensen, J. K., Kristensen, L. E., et al. 2013, ApJ, 769, 19.
2140
+ doi:10.1088/0004-637X/769/1/19
2141
+ Wagner, W., Riethmann, T., Feistel, R., et al. 2011, Journal of Physical and
2142
+ Chemical Reference Data, 40, 043103. doi:10.1063/1.3657937
2143
+ Weidenschilling, S. J. 1997, Icarus, 127, 290. doi:10.1006/icar.1997.5712
2144
+ Williams, J. P. & Cieza, L. A. 2011, ARA&A, 49, 67. doi:10.1146/annurev-astro-
2145
+ 081710-102548
2146
+ Wong, M. H., Mahaffy, P. R., Atreya, S. K., et al. 2004, Icarus, 171, 153.
2147
+ doi:10.1016/j.icarus.2004.04.010
2148
+ Yang,
2149
+ C.-C.,
2150
+ Johansen,
2151
+ A.,
2152
+ &
2153
+ Carrera,
2154
+ D.
2155
+ 2017,
2156
+ A&A,
2157
+ 606,
2158
+ A80.
2159
+ doi:10.1051/0004-6361/201630106
2160
+ Zhang, S., Hu, X., Zhu, Z., et al. 2021, ApJ, 923, 70. doi:10.3847/1538-
2161
+ 4357/ac2c82
2162
+ Zhu, Z., Hartmann, L., Nelson, R. P., et al. 2012, ApJ, 746, 110.
2163
+ doi:10.1088/0004-637X/746/1/110
2164
+ Article number, page 17 of 19
2165
+
2166
+ A&A proofs: manuscript no. main
2167
+ Appendix A: Vapor pressures of pure condensates
2168
+ The vapor pressures of the pure condensates considered in this
2169
+ work, except H2O and NH3, follow the law:
2170
+ ln Peq =
2171
+
2172
+ k
2173
+ ak
2174
+ � 1
2175
+ T
2176
+ �k
2177
+ ,
2178
+ (A.1)
2179
+ where the ak factors have been determined experimentally (Fray
2180
+ & Schmitt 2009) and are summarized in Table A.1.
2181
+ The vapor pressures of H2O is given by (Wagner et al. 2011):
2182
+ Peq =Ptp exp
2183
+ �Ttp
2184
+ T
2185
+ � �������−21.2144006
2186
+ �Ttp
2187
+ T
2188
+ �1/300
2189
+ + 27.3203819
2190
+ �Ttp
2191
+ T
2192
+ �2.10666667
2193
+ −6.10598130
2194
+ �Ttp
2195
+ T
2196
+ �1.70333333������� ,
2197
+ (A.2)
2198
+ where Ptp and Ttp are the pressure and the temperature of the
2199
+ triple point of water, respectively.
2200
+ The phosphine equilibrium pressure is given by Stull (1947):
2201
+ log10 Peq = 4.02591 −
2202
+ 702.651
2203
+ T − 11.065.
2204
+ (A.3)
2205
+ Appendix B: Dissociation pressures of NH3
2206
+ monohydrate and clathrates
2207
+ The dissociation pressures of NH3 monohydrate and clathrates
2208
+ follow the Antoine law:
2209
+ ln Peq = A
2210
+ T + B,
2211
+ (B.1)
2212
+ with A and B parameters determined from experiments and sum-
2213
+ marized in Table B.1.
2214
+ Article number, page 18 of 19
2215
+
2216
+ A. Schneeberger et al.: Evolution of the reservoirs of volatiles in the protosolar nebula
2217
+ Table A.1. Polynomial factors for the vapor pressure equations of pure condensates
2218
+ Element
2219
+ Temperature range (K)
2220
+ a0
2221
+ a1
2222
+ a2
2223
+ a3
2224
+ a4
2225
+ a5
2226
+ a6
2227
+ CO
2228
+ T ≤ 61.55
2229
+ 10.43
2230
+ -721.3
2231
+ -10740
2232
+ 2.341 × 105
2233
+ −2.392 × 106
2234
+ 9.478 × 106
2235
+
2236
+ T > 61.55
2237
+ 10.25
2238
+ -748.2
2239
+ -5843
2240
+ 3.939 × 104
2241
+
2242
+
2243
+
2244
+ CO2
2245
+ T ≤ 40
2246
+ 10−40
2247
+
2248
+
2249
+
2250
+
2251
+
2252
+
2253
+ 40.0 < T ≤ 194.7
2254
+ 14.76
2255
+ -2571
2256
+ −7.781 × 104
2257
+ 4.325 × 106
2258
+ −1.207 × 108
2259
+ 1.350 × 109
2260
+
2261
+ T > 194.7
2262
+ 18.61
2263
+ -4154
2264
+ 1.041 × 105
2265
+
2266
+
2267
+
2268
+
2269
+ CH4
2270
+ all
2271
+ 10.51
2272
+ -1110
2273
+ -4341
2274
+ 1.035 × 105
2275
+ −7.910 × 105
2276
+
2277
+
2278
+ H2S
2279
+ T ≤ 127.0
2280
+ 12.98
2281
+ -2707
2282
+
2283
+
2284
+
2285
+
2286
+
2287
+ T > 127.0
2288
+ 8.933
2289
+ -726.0
2290
+ −3.504 × 105
2291
+ 2.724 × 107
2292
+ −8.582 × 108
2293
+
2294
+
2295
+ N2
2296
+ T ≤ 35.61
2297
+ 12.40
2298
+ -80.74
2299
+ -3926
2300
+ 6.297 × 104
2301
+ −4.633 × 105
2302
+ 1.325 × 105
2303
+
2304
+ T > 35.61
2305
+ 8.514
2306
+ -456.4
2307
+ −1.987 × 104
2308
+ 4.800 × 105
2309
+ −4.524 × 106
2310
+
2311
+
2312
+ NH3
2313
+ all
2314
+ 15.96
2315
+ -3537
2316
+ −3.310 × 104
2317
+ 1.742 × 106
2318
+ −2.995 × 107
2319
+
2320
+
2321
+ Ar
2322
+ all
2323
+ 10.69
2324
+ -893.2
2325
+ -3567
2326
+ 6.574 × 104
2327
+ −4.280 × 105
2328
+
2329
+
2330
+ Kr
2331
+ all
2332
+ 10.77
2333
+ -1223
2334
+ -8903
2335
+ 2.635 × 105
2336
+ −4.260 × 106
2337
+ 3.575 × 107
2338
+ −1.210 × 108
2339
+ Xe
2340
+ all
2341
+ 10.698
2342
+ -1737
2343
+ −1.332 × 104
2344
+ 4.349 × 105
2345
+ −7.027 × 106
2346
+ 4.447 × 107
2347
+
2348
+ Table B.1. Parameters for the dissociation pressure equations of NH3
2349
+ monohydrate and clathrates
2350
+ Element
2351
+ A
2352
+ B
2353
+ Reference
2354
+ CO
2355
+ -1685.54
2356
+ 10.9946
2357
+ Hersant et al. (2004)
2358
+ CO2
2359
+ -2544.395
2360
+ 11.411518
2361
+ Longhi (2005)
2362
+ CH4
2363
+ -2161.81
2364
+ 11.1249
2365
+ Hersant et al. (2004)
2366
+ H2S
2367
+ -3111.02
2368
+ 11.3801
2369
+ Hersant et al. (2004)
2370
+ N2
2371
+ -1677.62
2372
+ 11.1919
2373
+ Hersant et al. (2004)
2374
+ NH3
2375
+ -2878.28
2376
+ 8.00205
2377
+ Hersant et al. (2004)
2378
+ Ar
2379
+ -1481.78
2380
+ 9.95523
2381
+ Hersant et al. (2004)
2382
+ Kr
2383
+ -1987.5
2384
+ 9.99046
2385
+ Hersant et al. (2004)
2386
+ Xe
2387
+ -2899.19
2388
+ 11.0354
2389
+ Hersant et al. (2004)
2390
+ PH3
2391
+ -3011.28
2392
+ 11.95
2393
+ Lunine & Stevenson (1985)
2394
+ Article number, page 19 of 19
2395
+
TdE0T4oBgHgl3EQflQEG/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
UNFKT4oBgHgl3EQflS6S/content/tmp_files/2301.11853v1.pdf.txt ADDED
@@ -0,0 +1,1599 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Competition between the Spin and Pseudospin Subsystems
2
+ in a Model Cuprate
3
+ Yu. D. Panova, *, V. A. Ulitkoa, K. S. Budrina, D. N. Yasinskayaa, and A. A. Chikova
4
+ a Ural Federal University Named after the First President of the Russian Federation B.N. Yeltsin,
5
+ Yekaterinburg, 620002 Russia
6
+ *e-mail: [email protected]
7
+ Abstract—The competition between the magnetic and charge orderings in a model cuprate is considered in
8
+ terms of a simplified static 2D spin–pseudospin model. This model is equivalent to the 2D dilute antiferro-
9
+ magnetic (AFM) Ising model with charged impurities. The mean-field approximation results are presented
10
+ for the system under study and briefly compared to the classical Monte Carlo (MC) calculations. The numer-
11
+ ical simulation shows that the cases of the strong exchange and the strong charge correlation differ qualita-
12
+ tively. In the case of a strong exchange, the AMF phase is instable with respect to the phase separation (PS)
13
+ into the pseudospin (charge) and magnetic (spin) subsystems that behave as immiscible quantum liquids. The
14
+ analytical expression has been obtained for the PS temperature.
15
+ 1. INTRODUCTION
16
+ A topical problem of the physics of superconduct-
17
+ ing cuprates is the coexistence and the competition of
18
+ the spin, superconducting, and charge orderings. The
19
+ correlation between the magnetism and the supercon-
20
+ ductivity in cuprates has been studied for a long time
21
+ [1, 2]. For the last fifteen years, many experimental
22
+ results indicating the existence of the charge ordering
23
+ [3–8] and the mutual influence of the spin and charge
24
+ orderings in cuprates [9–14] were obtained. The
25
+ model that relates the unique properties of cuprates to
26
+ their instability to the charge transfer of the CuO4 cen-
27
+ ter states in the CuO2 planes was proposed in [15]. This
28
+ model makes it possible to consider, for CuO4 centers
29
+ in the CuO2 plane, three many-electron valence states
30
+ CuO
31
+ (that formally correspond to the states of
32
+ Cu1+, 2+, 3+ cooper ions) as components of the pseudo-
33
+ spin triplet S = 1 with MS = –1, 0, +1, respectively,
34
+ and enables us to use the pseudospin formalism for
35
+ pseudospin S = 1 [15, 16]. To consider the competi-
36
+ tion between the spin and charge orderings in cupra-
37
+ tes, the simplified static 2D spin–pseudospin model
38
+ that is a limiting case of the general pseudospin model
39
+ was proposed in [17–19].
40
+ Hamiltonian of a static spin–pseudospin model is
41
+ (1)
42
+ where Szi is the z component of pseudospin S = 1 on a
43
+ site, and σzi = P0iszi/s is the normalized z component of
44
+ spin s = 1/2 multiplied by the projection operator P0i =
45
+ 1 –
46
+ . Parameters Δ = U/2 and V > 0 determine the
47
+ on-site and the inter-site density-density interactions,
48
+ respectively; J =
49
+ > 0 is the Ising exchange inter-
50
+ action between Cu2+ ions, h =
51
+ is external magnetic
52
+ field, μ is the chemical potential necessary for the
53
+ inclusion of the condition of the doping charge con-
54
+ stancy, and nN =
55
+ = const, where n is the dop-
56
+ ing charge density. The summation is carried out over
57
+ the 2D square lattice and ij implies the nearest
58
+ neighbors. This spin–pseudospin model generalizes
59
+ the 2D dilute antiferromagnetic (AFM) Ising model
60
+ with charged impurities. In the limit Δ → –∞, it
61
+ reduces to the Ising model for spin S = 1/2 with a fixed
62
+ magnetization. At Δ > 0, the results can be compared
63
+ to the Blume–Capel [20, 21] or to the Blume–
64
+ Emery–Griffiths [22] model. The Ising model with
65
+ mobile charged impurities was also considered in [23].
66
+ It is apparent that the most important restriction of
67
+ our model for its comparison with real cuprates is the
68
+ absence of charge transfer in the Hamiltonian.
69
+ The phase diagrams of the ground state were con-
70
+ sidered in the mean-field approximation in [17, 18]. It
71
+ was shown that in all five phases of the ground state are
72
+ realized in two limits. In the weak exchange limit at
73
+ < V, all the ground state phases (COI, COII, COIII,
74
+ FIM) correspond to the charge ordering (CO) of a
75
+ − − −
76
+ 7 ,6 ,5
77
+ 4
78
+ = Δ
79
+ +
80
+ +
81
+ σ σ
82
+
83
+ σ
84
+ − μ
85
+
86
+
87
+
88
+
89
+
90
+
91
+
92
+ *
93
+ 2
94
+ ,
95
+ zi
96
+ zi
97
+ zj
98
+ zi
99
+ zj
100
+ i
101
+ ij
102
+ ij
103
+ zi
104
+ zi
105
+ i
106
+ i
107
+ S
108
+ V
109
+ S S
110
+ J
111
+ h
112
+ S
113
+ 2
114
+ zi
115
+ S
116
+
117
+ 2
118
+ /
119
+ J s
120
+ �/
121
+ h s
122
+
123
+ zi
124
+ S
125
+ �J
126
+ 1
127
+
128
+
129
+
130
+
131
+
132
+
133
+
134
+ checker-board type at average charge density n.
135
+ Whereas there are no spin centers (Cu2+) in phase
136
+ COI, phases COII and COIII are diluted with nonin-
137
+ teracting spin centers distributed only in one sublat-
138
+ tice. Such a ferrimagnetic spin ordering is a result of
139
+ the mean-field approximation; because of this, the
140
+ calculations by the classical Monte Carlo (MC)
141
+ method in these cases show a paramagnetic response
142
+ at low temperatures. The FIM phase is also formally
143
+ ferrimagnetic. In this case, the spin AFM ordering is
144
+ diluted with noninteracting charge centers (Cu1+, 3+)
145
+ distributed only in one sublattice. In the limit of strong
146
+ exchange, at > V, we observe only COI and AFM
147
+ phases in which charge centers are homogeneously
148
+ distributed in both sublattices.
149
+ This report is organized as follows. We present the
150
+ results of the calculation of the thermodynamic prop-
151
+ erties of the system under study in the mean-field
152
+ approximation and concisely compare them with the
153
+ calculations by the classical MC method in Section 2.
154
+ The MC calculations show that, in the limit of the
155
+ strong exchange, the AFM phase is instable with
156
+ respect to the phase separation (PS) into the subsys-
157
+ tems of charge and spin centers. In Section 3, we ana-
158
+ lyze the thermodynamic properties of the PS state in a
159
+ framework of coexistence of two homogeneous
160
+ phases. Section 4 presents the conclusions.
161
+ 2. MEAN-FIELD APPROXIMATION
162
+ In this section, we briefly present the results of the
163
+ calculations of the thermodynamic properties in a
164
+ mean-field (MF) approximation. We use the Bogo-
165
+ lyubov inequality for the grand potential Ω(
166
+ ):
167
+ Ω(
168
+ ) ≤ Ω = Ω(
169
+ ) + 
170
+
171
+ . In the standard way,
172
+ we introduce two sublattices A and B on a square lat-
173
+ tice and choose
174
+ (2)
175
+ where β = 1/T, δ = βΔ, βα and γα are the molecular
176
+ fields, α = A, B. We obtain the expression for estima-
177
+ tion of ω = Ω/N
178
+ (3)
179
+ where ξ = βμ, ν = βV, j =
180
+ , η =
181
+ , z = 4 is the
182
+ number of the nearest neighbors, and the average
183
+ (pseudo)magnetizations for sublattices
184
+ = Sα and
185
+ = σα have the form
186
+ (4)
187
+ �J
188
+ *
189
+ *
190
+ * 0
191
+ *
192
+ * 0
193
+ α
194
+ α
195
+ α
196
+ α
197
+ α
198
+ α
199
+ α
200
+ α
201
+ β
202
+ = δ
203
+
204
+ β
205
+
206
+ γ σ
207
+
208
+
209
+
210
+ *
211
+ 2
212
+ 0
213
+ ,
214
+ ,
215
+ ,
216
+ zi
217
+ zi
218
+ zi
219
+ i
220
+ i
221
+ i
222
+ S
223
+ S
224
+ α
225
+ α
226
+ α
227
+ α
228
+ α
229
+ −δ
230
+ α
231
+ α
232
+ βω =
233
+ β − ξ
234
+ + γ − η σ
235
+
236
+ β +
237
+ γ
238
+ + ν
239
+ +
240
+ σ σ
241
+
242
+ 2
243
+ [(
244
+ )
245
+ (
246
+ )
247
+ ln 2(
248
+ cosh
249
+ cosh
250
+ )]
251
+ ,
252
+ A
253
+ B
254
+ A
255
+ B
256
+ S
257
+ e
258
+ z S S
259
+ zi
260
+ β �J
261
+ β �h
262
+ α
263
+ zi
264
+ S
265
+ α
266
+ σz
267
+ α
268
+ α
269
+ δ
270
+ α
271
+ α
272
+ α
273
+ α
274
+ −δ
275
+ α
276
+ α
277
+ β
278
+ =
279
+ β +
280
+ γ
281
+ γ
282
+ σ
283
+ =
284
+ β +
285
+ γ
286
+ sinh
287
+ ,
288
+ cosh
289
+ cosh
290
+ sinh
291
+ .
292
+ cosh
293
+ cosh
294
+ S
295
+ e
296
+ e
297
+ Minimizing ω with respect to βα and γα, we obtain the
298
+ system of the MF equations
299
+ (5)
300
+ where
301
+ = B and
302
+ = A.
303
+ Equations (5) must be complemented by charge
304
+ restriction SA + SB = 2n. To explicitly include this con-
305
+ dition, we can introduce the charge order parameter
306
+ a = (SA – SB)/2 and to write the free energy f = ω + μn
307
+ as a function of n, a, and σα using the inverse relation-
308
+ ships for Eqs. (4):
309
+ (6)
310
+ where
311
+ For the nonordered (NO) high-temperature solu-
312
+ tion at h = 0, we have a = 0 and σα = 0, and the free
313
+ energy per one site takes the form
314
+ (7)
315
+ where g0 = ((1 – n2)e–2δ + n2)1/2. This enables us to cal-
316
+ culate all the thermodynamic functions of the NO
317
+ phase. The entropy, the internal energy, and the spe-
318
+ cific heat per one site are
319
+ (8)
320
+ (9)
321
+ (10)
322
+ Equations (7)–(10) correspond to the thermodynamic
323
+ characteristics of the ideal system of noninteracting
324
+ pseudospin (charge) and spin doublets separated in
325
+ energy by the value Δ up to the temperature indepen-
326
+ dent term
327
+ . At Δ = 0, the entropy and the internal
328
+ α
329
+ α
330
+ α
331
+ α
332
+ β − ξ = − ν
333
+ γ − η = −
334
+ σ
335
+ ,
336
+ ,
337
+ z S
338
+ z j
339
+ A
340
+ B
341
+ α
342
+ α
343
+ δ
344
+ − δ
345
+ β
346
+ α
347
+ α
348
+ α
349
+ α
350
+ α
351
+ −δ
352
+ δ
353
+ γ
354
+ α
355
+ α
356
+ α
357
+ α
358
+ α
359
+ +
360
+ − σ
361
+ =
362
+
363
+ − σ
364
+ σ
365
+ +
366
+
367
+ =
368
+ − σ
369
+
370
+ 2
371
+ 2
372
+ 2
373
+ 2
374
+ 2
375
+ 2
376
+ 2
377
+ 2 2
378
+ 2
379
+ 2
380
+ 2
381
+ (
382
+ )
383
+ ,
384
+ (1
385
+ )
386
+ (
387
+ )
388
+ ,
389
+ (1
390
+ )
391
+ S e
392
+ G
393
+ e
394
+ e
395
+ S
396
+ e
397
+ G
398
+ S e
399
+ e
400
+ S
401
+ δ
402
+ − δ
403
+ α
404
+ α
405
+ α
406
+ α
407
+ α
408
+ =
409
+
410
+ − σ +
411
+ + σ
412
+ 2
413
+ 2
414
+ 2 2
415
+ 2
416
+ 2
417
+ 1/2
418
+ (1
419
+ )
420
+ .
421
+ G
422
+ S
423
+ S e
424
+ e
425
+ +
426
+
427
+
428
+ =
429
+ + Δ
430
+
431
+
432
+
433
+ β
434
+
435
+
436
+
437
+
438
+
439
+ +
440
+ +
441
+
442
+
443
+ β
444
+
445
+
446
+
447
+ 2
448
+ 0
449
+ NO
450
+ 2
451
+ 0
452
+ 1
453
+ 1 ln 2
454
+ 2
455
+ 1
456
+ ln
457
+ ,
458
+ 1
459
+ g
460
+ z
461
+ f
462
+ Vn
463
+ n
464
+ n
465
+ n
466
+ n
467
+ g
468
+ n
469
+
470
+
471
+ +
472
+
473
+
474
+ = δ
475
+ +
476
+
477
+
478
+ +
479
+
480
+
481
+
482
+
483
+
484
+ +
485
+
486
+
487
+
488
+
489
+
490
+
491
+ 0
492
+ 0
493
+ NO
494
+ 2
495
+ 0
496
+ 0
497
+ (1
498
+ )(
499
+ )
500
+ 1
501
+ ln 2
502
+ 1
503
+ 1
504
+ ln
505
+ ,
506
+ 1
507
+ n
508
+ g
509
+ n
510
+ g
511
+ s
512
+ g
513
+ n
514
+ n
515
+ g
516
+ n
517
+ n
518
+ +
519
+ =
520
+ + Δ
521
+ +
522
+ 2
523
+ 2
524
+ 0
525
+ NO
526
+ 0
527
+ ,
528
+ 2
529
+ 1
530
+ n
531
+ g
532
+ z
533
+ e
534
+ Vn
535
+ g
536
+ − δ
537
+
538
+ = δ
539
+ +
540
+ 2 2
541
+ 2
542
+ 2
543
+ NO
544
+ 2
545
+ 0
546
+ 0
547
+ (1
548
+ )
549
+ .
550
+ (1
551
+ )
552
+ n
553
+ e
554
+ c
555
+ g
556
+ g
557
+ 2
558
+ 2
559
+ zVn
560
+ 2
561
+
562
+ energy become constant; thus, the specific heat is a
563
+ zero. If Δ ≠ 0, the specific heat has a maximum at
564
+ T ∝ |Δ|. In particular, if n = 0, then
565
+ (11)
566
+ and the maximum is in point T = |Δ|/(2x), where x is
567
+ the root of equation x = cothx.
568
+ We can also write the explicit form of the magnetic
569
+ susceptibility at h = 0 in the NO phase. Assuming that
570
+ SA = SB = n and σA = σB = σ at h ≠ 0, we eliminate ξ
571
+ from system (5) and obtain equation
572
+ (12)
573
+ where we introduced the following notations:
574
+ (13)
575
+ (14)
576
+ After the standard calculations, we obtain
577
+ (15)
578
+ where χ0(n) is the normalized susceptibility in a zero
579
+ external field for the ideal system of noninteracting
580
+ pseudospin and spin doublets. System of equations (5)
581
+ has the ferrimagnetic solutions with σA + σB ≠ 0 at
582
+ h = 0 [17] that are a result of the MF approximation
583
+ and do not appear in MC calculations. Due to the
584
+ short-range character of the exchange interaction in
585
+ our model, these solutions can appear upon a numer-
586
+ ical simulation as a mixture of the antiferromagnetic
587
+ and paramagnetic phases. The underestimating of the
588
+ paramagnetic response is the systematic error of the
589
+ MF method in these cases. In what follows, we will
590
+ consider only the AFM types of solutions with σA = –
591
+ σB = σ at h = 0. In this case, according to Eqs. (5),
592
+ relationship γA = –γB is fulfilled. The magnetizations
593
+ of sublattices σα are monotonic functions of molecular
594
+ fields γα, according to Eqs. (4), therefore, only the case
595
+ βA = ±βB is possible for σ ≠ 0. This implies that, at
596
+ n ≠ 0, there are only AFM solutions with a = 0, σ ≠ 0
597
+ and CO solutions with a ≠ 0 and σ = 0. The case n = 0
598
+ should be considered individually, since it gives a pos-
599
+ sibility for frustrated states as the CO- and AFM-types
600
+ solutions become degenerate.
601
+ The thermodynamic properties of the AFM and
602
+ CO phases suggest knowledge of the roots of Eqs. (5)
603
+ and can be calculated numerically. In addition, the
604
+ ( )
605
+
606
+ δ
607
+ δ
608
+ =
609
+ 2
610
+ 2
611
+ NO
612
+ cosh
613
+ ,
614
+ 2
615
+ 2
616
+ c
617
+ σ = ψ η −
618
+ σ
619
+ (
620
+ , ),
621
+ xj
622
+ n
623
+
624
+ ψ
625
+ =
626
+ +
627
+ 2
628
+ (1
629
+ )sinh
630
+ ( , )
631
+ ,
632
+ cosh
633
+ ( , )
634
+ n
635
+ x
636
+ x n
637
+ x
638
+ g x n
639
+ − δ
640
+ =
641
+
642
+ +
643
+ =
644
+ 2
645
+ 2
646
+ 2
647
+ 2
648
+ 1/2
649
+ 0
650
+ ( , )
651
+ ((1
652
+ )
653
+ cosh
654
+ )
655
+ ,
656
+ (0, )
657
+ .
658
+ g x n
659
+ n e
660
+ n
661
+ x
662
+ g
663
+ n
664
+ g
665
+ =
666
+ η=
667
+ χ
668
+ ∂σ
669
+ χ
670
+ = β
671
+ =
672
+ ∂η
673
+ +
674
+ χ
675
+
676
+ χ
677
+ = β +
678
+
679
+ 2
680
+ 2
681
+ 0
682
+ NO
683
+ 0
684
+ 0
685
+ 0
686
+ 2
687
+ 0
688
+ 0
689
+ ( )
690
+ ,
691
+ 1
692
+ ( )
693
+ 1
694
+ ( )
695
+ ,
696
+ 1
697
+ h
698
+ n
699
+ s
700
+ s
701
+ zJ
702
+ n
703
+ n
704
+ n
705
+ g
706
+ equations for the second-order phase transition tem-
707
+ peratures and the critical points can be found analyti-
708
+ cally.
709
+ For the AFM phase, we use condition
710
+ = 0
711
+ at σ = 0, which gives
712
+ (16)
713
+ With accounting for Eqs. (6), we obtain the equation
714
+ for the NO–AFM transition temperature
715
+ (17)
716
+ In particular, we obtain for Δ → +∞ that
717
+ (18)
718
+ which coincides with the results of [22]. Substituting
719
+ Eq. (17) into Eq. (15), we find the susceptibility in the
720
+ transition point χNO = s2/(
721
+ ).
722
+ To find the critical point that separates the first and
723
+ second order transitions, we use equation
724
+ =
725
+ 0 in the coexistence curve. After some manipulations,
726
+ we obtain
727
+ (19)
728
+ Taking into account Eq. (17), we obtain the critical
729
+ point position
730
+ (20)
731
+ In particular, at n = 0, Tc1 =
732
+ , Δc1/Tc1 = –ln2,
733
+ which agrees with the results of [22].
734
+ The susceptibility in a zero field in the AFM phase
735
+ has the form
736
+ (21)
737
+ where
738
+ (22)
739
+ The order parameter of the AFM phase σ at h = 0 can
740
+ be found from equation
741
+ (23)
742
+
743
+ ∂σ
744
+ 2
745
+ 2
746
+ /
747
+ f
748
+ α
749
+ α
750
+ α σ =
751
+ ∂γ
752
+ =
753
+ ∂σ
754
+ 0
755
+ .
756
+ zj
757
+
758
+ =
759
+ +
760
+ 2
761
+ 0
762
+ (1
763
+ )
764
+ 1
765
+ .
766
+ n zj
767
+ g
768
+ =
769
+
770
+
771
+ AFM
772
+ (1
773
+ )
774
+ ,
775
+ T
776
+ n zJ
777
+
778
+ 2zJ
779
+
780
+ ∂σ
781
+ 4
782
+ 4
783
+ /
784
+ f
785
+
786
+
787
+ =
788
+ 2
789
+ 2
790
+ 0
791
+ 0
792
+ 2
793
+ 3
794
+ 0.
795
+ g
796
+ g
797
+ n
798
+
799
+ =
800
+ +
801
+ +
802
+ Δ
803
+
804
+ =
805
+ +
806
+ +
807
+ +
808
+
809
+ 2
810
+ 1
811
+ 2
812
+ 2
813
+ 1
814
+ 2
815
+ 2
816
+ 1
817
+ 1
818
+ ,
819
+ 2
820
+ 1
821
+ 3
822
+ 1
823
+ 1
824
+ ln
825
+ .
826
+ 2
827
+ 2(1
828
+ 1
829
+ 3
830
+ )
831
+ c
832
+ c
833
+ c
834
+ n
835
+ T
836
+ zJ
837
+ n
838
+ n
839
+ T
840
+ n
841
+ n
842
+ �/3
843
+ zJ
844
+ =
845
+ βψ
846
+ σ
847
+ χ
848
+ =
849
+ +
850
+ ψ
851
+ σ
852
+ 2
853
+ AFM
854
+ 0
855
+ '(
856
+ , )
857
+ ,
858
+ 1
859
+ '(
860
+ , )
861
+ h
862
+ z j
863
+ n
864
+ s
865
+ z j
866
+ z j
867
+ n
868
+
869
+ +
870
+ ψ
871
+ =
872
+ +
873
+ 2
874
+ 2
875
+ 0
876
+ 2
877
+ (1
878
+ )( ( , )
879
+ cosh )
880
+ '( , )
881
+ .
882
+ ( , )(cosh
883
+ ( , ))
884
+ n
885
+ g x n
886
+ g
887
+ x
888
+ x n
889
+ g x n
890
+ x
891
+ g x n
892
+ σ = ψ
893
+ σ
894
+ (
895
+ , ).
896
+ zj
897
+ n
898
+ 3
899
+
900
+
901
+
902
+
903
+
904
+
905
+
906
+ By analogy, for the CO phase, condition
907
+ =
908
+ 0 at a = 0 gives
909
+ (24)
910
+ and we obtain equation for the NO–CO transition
911
+ temperature
912
+ (25)
913
+ In particular, for Δ → –∞, we obtain
914
+ (26)
915
+ In the CO phase, the equation for the critical point is
916
+ more complex
917
+ (27)
918
+ but, at n = 0, this gives Tc2 = zV/3, Δc2/Tc2 = ln2.
919
+ In a zero field the susceptibility in the CO phase is
920
+ (28)
921
+ where the CO-phase order parameter obeys equation
922
+ (29)
923
+
924
+
925
+ 2
926
+ 2
927
+ /
928
+ f
929
+ a
930
+ α
931
+ σ =
932
+ ∂γ
933
+ ∂γ
934
+
935
+
936
+
937
+ = ν
938
+
939
+
940
+
941
+
942
+
943
+
944
+ 0
945
+ 1
946
+ ,
947
+ 2
948
+ A
949
+ B
950
+ z
951
+ a
952
+ a
953
+
954
+
955
+ ν =
956
+ +
957
+ 2
958
+ 1
959
+ 0
960
+ (1
961
+ )
962
+ 1
963
+ .
964
+ n z
965
+ g
966
+ =
967
+
968
+ 2
969
+ CO
970
+ (1
971
+ )
972
+ .
973
+ T
974
+ n zV
975
+ +
976
+
977
+
978
+ +
979
+ =
980
+ 2
981
+ 3
982
+ 2
983
+ 2
984
+ 2
985
+ 0
986
+ 0
987
+ 0
988
+ 2(1
989
+ 3
990
+ )
991
+ 6
992
+ 3
993
+ 0,
994
+ n g
995
+ g
996
+ n g
997
+ n
998
+ =
999
+ χ
1000
+ +
1001
+ + χ
1002
+
1003
+ χ
1004
+ =
1005
+ +
1006
+ χ
1007
+ +
1008
+ + χ
1009
+
1010
+
1011
+ 0
1012
+ 0
1013
+ 2
1014
+ CO
1015
+ 0
1016
+ 0
1017
+ 0
1018
+ 1(
1019
+ (
1020
+ )
1021
+ (
1022
+ ))
1023
+ 2
1024
+ ,
1025
+ 1
1026
+ 1
1027
+ (
1028
+ (
1029
+ )
1030
+ (
1031
+ ))
1032
+ 2
1033
+ h
1034
+ n
1035
+ a
1036
+ n
1037
+ a
1038
+ s
1039
+ zJ
1040
+ m
1041
+ a
1042
+ n
1043
+ a
1044
+
1045
+
1046
+ +
1047
+ +
1048
+ +
1049
+
1050
+ +
1051
+ =
1052
+
1053
+
1054
+ ν
1055
+
1056
+ +
1057
+
1058
+
1059
+
1060
+
1061
+
1062
+ (
1063
+ (0,
1064
+ ))(1
1065
+ )
1066
+ 1 ln
1067
+ .
1068
+ 2
1069
+ (
1070
+ (0,
1071
+ ))(1
1072
+ )
1073
+ n
1074
+ a
1075
+ g
1076
+ n
1077
+ a
1078
+ n
1079
+ a
1080
+ a
1081
+ z
1082
+ n
1083
+ a
1084
+ g
1085
+ n
1086
+ a
1087
+ n
1088
+ a
1089
+ The general formula for the susceptibility in a zero
1090
+ field combining the cases of the NO, AFM, and CO
1091
+ phases is given by relationship
1092
+ (30)
1093
+ where σ is the AFM-phase order parameter, and a is
1094
+ the CO-phase order parameter.
1095
+ The numerical simulation was carried out using a
1096
+ high-efficient algorithm of parallel calculations and
1097
+ the classical MC method. Figure 1 shows the results of
1098
+ the MC calculations. The peak position in the tem-
1099
+ perature dependence of the specific heat approxi-
1100
+ mately (because of a finite size of the system) corre-
1101
+ sponds to the disorder–order transition temperature.
1102
+ These values are indicated by points. The transition
1103
+ temperatures obtained in the MF approximation are
1104
+ shown by solid lines. Figure 1 clearly demonstrates the
1105
+ typical (by a factor of slightly lower than two times)
1106
+ overestimation of the critical temperature value in the
1107
+ MF approximation. Figure 3 shows the dependence of
1108
+ the AFM-transition critical temperature on n in the
1109
+ MF approximation. Its shape qualitatively agrees with
1110
+ the results obtained in the Bethe approximation
1111
+ in [23].
1112
+ Figure 2 presents the comparison of the results for
1113
+ the susceptibility and the specific heat obtained by the
1114
+ MF approximation and by MC method. The analyti-
1115
+ cal MF-dependences show a qualitative agreement to
1116
+ the results of the numerical simulation and, in some
1117
+ cases, even a quantitative coincidence of the results for
1118
+ the high-temperature region. The main discrepancies
1119
+ are due to the difference in the critical temperature
1120
+ β ψ
1121
+ σ
1122
+ +
1123
+ + ψ
1124
+ σ
1125
+
1126
+ χ =
1127
+ +
1128
+ ψ
1129
+ σ
1130
+ +
1131
+
1132
+ σ
1133
+
1134
+ 2
1135
+ 1 (
1136
+ '(
1137
+ ,
1138
+ )
1139
+ '(
1140
+ ,
1141
+ ))
1142
+ 2
1143
+ ,
1144
+ 1
1145
+ 1
1146
+ (
1147
+ '(
1148
+ ,
1149
+ )(
1150
+ '(
1151
+ ,
1152
+ ))
1153
+ 2
1154
+ z j
1155
+ n
1156
+ a
1157
+ z j
1158
+ n
1159
+ a
1160
+ s
1161
+ z j
1162
+ z j
1163
+ n
1164
+ a
1165
+ z j
1166
+ n
1167
+ a
1168
+ Fig. 1. (a) Left panel: the case of weak exchange: n = 0.1, = 0.25, and V = 1; (b) the case of the strong exchange: n = 0.1, =
1169
+ 0.25, and V = 0.1. Points correspond to the MC critical temperatures. The values of the MF critical temperature given by
1170
+ Eqs. (17), (25), and (34) are indicated in lines 1–3.
1171
+ 2
1172
+ 1
1173
+ NO
1174
+ CO
1175
+ AFM
1176
+ �1
1177
+ 0
1178
+ 1
1179
+ 2
1180
+ �/J
1181
+ �/J
1182
+ 0
1183
+ 0.5
1184
+ 1.0
1185
+ 1.5
1186
+ 2.0
1187
+ 2.5
1188
+ T/J
1189
+ T/J
1190
+ �2
1191
+ �1
1192
+ 0
1193
+ 1
1194
+ 2
1195
+ CO
1196
+ 2
1197
+ 1
1198
+ NO
1199
+ AFM
1200
+ 3
1201
+ 0
1202
+ 0.2
1203
+ 0.4
1204
+ 0.6
1205
+ 0.8
1206
+ 1.0
1207
+ AFM + charge droplets
1208
+ (a)
1209
+ (b)
1210
+ �J
1211
+ �J
1212
+ 4
1213
+
1214
+ and systematic inaccuracies in the MF approximation
1215
+ in the case of description of the critical fluctuations
1216
+ and the paramagnetic response at low temperatures.
1217
+ 3. THE PHASE SEPARATION
1218
+ CRITICAL TEMPERATURE
1219
+ According to the results of the numerical simula-
1220
+ tion by the MC method, the temperature dependences
1221
+ of the specific heat demonstrate in the limit of strong
1222
+ exchange at positive Δ two successive phase transi-
1223
+ tions. The immediate study of the system state shows
1224
+ that the first transition is the AFM ordering. With low-
1225
+ ering temperature in the spin subsystem that is an
1226
+ AFM matrix diluted by randomly distributed charged
1227
+ impurities, the impurities are condensed into charge
1228
+ droplets. It means that in the limit of the strong
1229
+ exchange, the diluted AFM-phase is instable with
1230
+ respect to the macroscopic (PS) into the pseudospin
1231
+ (charge) and magnetic (spin) subsystems. At this
1232
+ stage, the AFM matrix forces out charged nonmag-
1233
+ netic impurities to minimize the surface energy. Note
1234
+ that, in the limit of weak exchange, the charged impu-
1235
+ rities are randomly distributed over the AFM matrix
1236
+ up to T = 0 and also the charged impurities are ran-
1237
+ domly distributed in the CO phase, since the energies
1238
+ of all possible distributions of additional charges over
1239
+ the CO matrix are the same in the approximation of
1240
+ interaction of only the nearest neighbors. The results
1241
+ of our numerical simulation are similar to the results
1242
+ obtained for binary alloys in [24, 25].
1243
+ To describe the thermodynamic properties of the
1244
+ heterogeneous state, we use the model developed in
1245
+ [26–28] for a macroscopic PS in electron systems.
1246
+ This model is based on the Maxwell construction.
1247
+ Assuming that there are two coexisting macroscopic
1248
+ homogeneous phases 1 and 2, we write the free energy
1249
+ of the PS state per one site as
1250
+ (31)
1251
+ where m is the system fraction with density n1, 1 – m is
1252
+ the system fraction with density n2, so that mn1 + (1 –
1253
+ m)n2 = n. In our case, one phase consists of charged
1254
+ centers (C), and another phase is the spin AFM phase
1255
+ without impurities; therefore, n1 = sgnn, n2 = 0, and
1256
+ m = |n|. The transition point is determined by equation
1257
+ (32)
1258
+ =
1259
+ +
1260
+
1261
+ PS
1262
+ 1
1263
+ 1
1264
+ 2
1265
+ 2
1266
+ ( )
1267
+ (1
1268
+ ) (
1269
+ ),
1270
+ f
1271
+ mf n
1272
+ m f n
1273
+ +
1274
+
1275
+ =
1276
+ AFM
1277
+ AFM
1278
+ (1)
1279
+ (1
1280
+ )
1281
+ (0)
1282
+ ( ).
1283
+ C
1284
+ n f
1285
+ n f
1286
+ f
1287
+ n
1288
+ Fig. 2. Susceptibility and the specific heat obtained (solid lines) in the MF approximation and (points) by MC method: (a) the
1289
+ case of weak exchange: n = 0.1, = 0.25, and V = 1 and (b) the case of the strong exchange: n = 0.1, = 0.25, and V = 0.1.
1290
+ �/J = 0
1291
+ �/J = 0
1292
+ �/J = 0
1293
+ �/J = 1
1294
+ �/J = 1
1295
+ �/J = 1
1296
+ �/J = �1
1297
+ �/J = �1
1298
+ �/J = 2
1299
+ �/J = 0
1300
+ �/J = 1
1301
+ �/J = 2
1302
+
1303
+ 0
1304
+ 1
1305
+ 2
1306
+ 0.2
1307
+ 0.1
1308
+ 0
1309
+ �, arb.units
1310
+ c, arb.units
1311
+ �, arb.units
1312
+ c, arb.units
1313
+ 0
1314
+ 1
1315
+ 2
1316
+ 3
1317
+ T/J
1318
+ T/J
1319
+ 0.10
1320
+ 0.05
1321
+ 0
1322
+ 0
1323
+ 1
1324
+ 2
1325
+ 3
1326
+ (a)
1327
+ (b)
1328
+ 0
1329
+ 2
1330
+ 1
1331
+ 0
1332
+ 1
1333
+ 2
1334
+ 2
1335
+ 2
1336
+ 2
1337
+ 0
1338
+ 1
1339
+ 0
1340
+ 1
1341
+ 0
1342
+ 1
1343
+ �J
1344
+ �J
1345
+ Fig. 3. The bright circles correspond to the susceptibility
1346
+ maxima upon the AFM ordering; dark cycles correspond
1347
+ to the specific heat maxima upon PS obtained by the MC
1348
+ method. The model parameters are Δ = 1, = 0.25, and
1349
+ V = 0.14. Lines 1 and 3 show the critical temperatures
1350
+ given by Eqs. (17) and (34).
1351
+ NO
1352
+ AFM
1353
+ 1
1354
+ 3
1355
+ n
1356
+ 0
1357
+ 0.2
1358
+ 0.4
1359
+ 0.6
1360
+ 0.8
1361
+ 1.0
1362
+ AFM droplets
1363
+ AFM + charge droplets
1364
+ 0
1365
+ 0.2
1366
+ 0.4
1367
+ 0.6
1368
+ 0.8
1369
+ T/J
1370
+ �J
1371
+ 5
1372
+
1373
+
1374
+
1375
+
1376
+
1377
+
1378
+
1379
+ The free energy of charge centers fC(1) = 2V + Δ. The
1380
+ free energy of the AFM phase can be written as
1381
+ (33)
1382
+ We assume that Δ > 0 and consider the case of low
1383
+ temperatures, thus, δ
1384
+ 1 and j
1385
+ 1. In this approxi-
1386
+ mation, with the inclusion of Eq. (23), we obtain |σ| =
1387
+ 1 – |n|. As a result, Eq. (32) gives the following rela-
1388
+ tionship for PS temperature
1389
+ (34)
1390
+ This expression does not depend on Δ, which agrees
1391
+ with the MC results for TPS in Fig. 1.
1392
+ Figure 3 shows the concentration dependences of
1393
+ the critical temperatures for the AFM transition and
1394
+ the PS. The circles denote the MC results for the sus-
1395
+ ceptibility maxima upon the AFM ordering, and the
1396
+ points show the specific heat maxima upon the PS.
1397
+ Solid line 3 shows the PS temperature determined by
1398
+ Eq. (34). This temperature agrees unexpectedly well
1399
+ with the MC results, while the dependence in the MF
1400
+ approximation (line 2) for the AFM-ordering tem-
1401
+ perature determined by Eq. (17) becomes qualitatively
1402
+ wrong at |n| > 0.5. Note as well that Eq. (34) for the PS
1403
+ temperature based on the Maxwell construction gives
1404
+ lower values as compared to the values found in [22].
1405
+ 4. CONCLUSIONS
1406
+ We considered the static 2D spin–pseudospin
1407
+ model on a square lattice that generalizes the dilute
1408
+ antiferromagnetic Ising model. We compared similar
1409
+ results in the MF approximation with the results of the
1410
+ numerical simulation by the classical MC method.
1411
+ The analysis of the specific heat and the susceptibility
1412
+ obtained by the MC method showed that the MF crit-
1413
+ ical temperature of CO and AFM ordering qualita-
1414
+ tively reproduce the numerical results, but they sys-
1415
+ tematically give higher values. The MC calculations
1416
+ show that the cases of the strong and weak exchange
1417
+ are qualitatively different. In the case of the weak
1418
+ exchange, a frustration appears in the charge-ordered
1419
+ ground state of the system. In the limit of the strong
1420
+ exchange, the homogeneous AFM phase is instable
1421
+ with respect to the PS of the pseudospin and spin sub-
1422
+ systems. We obtained the analytical expression for the
1423
+ PS temperature and revealed that it agrees well with
1424
+ the numerical simulation by the classical MC method.
1425
+ =
1426
+ +
1427
+ σ
1428
+ +
1429
+ Δ
1430
+ σ +
1431
+ σ
1432
+
1433
+
1434
+
1435
+
1436
+
1437
+ β
1438
+
1439
+
1440
+
1441
+ σ +
1442
+ σ
1443
+
1444
+
1445
+ +
1446
+
1447
+
1448
+ β
1449
+
1450
+
1451
+
1452
+
1453
+ 2
1454
+ 2
1455
+ AFM
1456
+ 2
1457
+ ( )
1458
+ (
1459
+ )
1460
+ 2
1461
+ cosh(
1462
+ )
1463
+ (
1464
+ , )
1465
+ 1 ln 2
1466
+ 1
1467
+ cosh(
1468
+ )
1469
+ (
1470
+ , )
1471
+ ln
1472
+ .
1473
+ 1
1474
+ z
1475
+ f
1476
+ n
1477
+ Vn
1478
+ J
1479
+ n
1480
+ z j
1481
+ g z j
1482
+ n
1483
+ n
1484
+ n
1485
+ z j
1486
+ g z j
1487
+ n
1488
+ n
1489
+ n
1490
+
1491
+
1492
+
1493
+
1494
+ =
1495
+ +
1496
+
1497
+
1498
+
1499
+ PS
1500
+ (1
1501
+ )
1502
+ (
1503
+ ).
1504
+ ln
1505
+ (1
1506
+ )ln(1
1507
+ )
1508
+ 2
1509
+ n
1510
+ n
1511
+ z V
1512
+ J
1513
+ T
1514
+ n
1515
+ n
1516
+ n
1517
+ n
1518
+ FUNDING
1519
+ This work was supported by Program 211 of the
1520
+ Government of the Russian Federation (Agreement
1521
+ 02.A03.21.0006), the Ministry of Education and Sci-
1522
+ ence of the Russian federation (projects nos. 2277 and
1523
+ 5719), and the Russian Foundation for Basic Research
1524
+ (project no. 18-32-00837\18).
1525
+ REFERENCES
1526
+ 1. R. J. Birgeneau, C. Stock, J. M. Tranquada, and
1527
+ K. Yamada, J. Phys. Soc. Jpn. 75, 111003 (2006).
1528
+ 2. J. M. Tranquada, G. Xu, and I. A. Zaliznyak, J. Magn.
1529
+ Magn. Mater. 350, 148 (2014).
1530
+ 3. T. Wu, H. Mayaffre, S. Krämer, M. Horvatić, C. Ber-
1531
+ thier, W. N. Hardy, R. Liang, D. A. Bonn, and
1532
+ M.-H. Julien, Nature (London, U.K.) 477, 191 (2011).
1533
+ 4. G. Ghiringhelli, M. le Tacon, M. Minola, S. Blanco-
1534
+ Canosa, C. Mazzoli, N. B. Brookes, G. M. de Luca,
1535
+ A. Frano, D. G. Hawthorn, F. He, T. Loew, M. Mo-
1536
+ retti Sala, D. C. Peets, M. Salluzzo, E. Schierle, et al.,
1537
+ Science (Washington, DC, U. S.) 337, 821 (2012).
1538
+ 5. J. Chang, E. Blackburn, A. T. Holmes, N. B. Chris-
1539
+ tensen, J. Larsen, J. Mesot, R. Liang, D. A. Bonn,
1540
+ W. N. Hardy, A. Watenphul, M. V. Zimmermann,
1541
+ E. M. Forgan, and S. M. Hayden, Nat. Phys. 8, 871
1542
+ (2012).
1543
+ 6. E. H. da Silva Neto, P. Aynajian, A. Frano, R. Comin,
1544
+ E. Schierle, E. Weschke, A. Gyenis, J. Wen, J. Schnee-
1545
+ loch, Z. Xu, S. Ono, G. Gu, M. le Tacon, and
1546
+ A. Yazdani, Science (Washington, DC, U. S.) 343, 393
1547
+ (2014).
1548
+ 7. R. Comin and A. Damascelli, Ann. Rev. Condens.
1549
+ Matter Phys. 7, 369 (2016).
1550
+ 8. F. Laliberté, M. Frachet, S. Benhabib, B. Borgnic,
1551
+ T. Loew, J. Porras, M. Le Tacon, B. Keimer, S. Wied-
1552
+ mann, C. Proust, and D. LeBoeuf, npj Quantum
1553
+ Mater. 3, 11 (2018).
1554
+ 9. P. Abbamonte, A. Rusydi, S. Smadici, G. D. Gu,
1555
+ G. A. Sawatzky, and D. L. Feng, Nat. Phys. 1, 155
1556
+ (2005).
1557
+ 10. E. Berg, E. Fradkin, S. A. Kivelson, and J. M. Tran-
1558
+ quada, New J. Phys. 11, 115004 (2009).
1559
+ 11. M. Fujita, H. Hiraka, M. Matsuda, M. Matsuura,
1560
+ J. M. Tranquada, S. Wakimoto, G. Xu, and K. Yama-
1561
+ da, J. Phys. Soc. Jpn. 81, 011007 (2012).
1562
+ 12. E. Fradkin and S. A. Kivelson, Nat. Phys. 8, 864 (2012).
1563
+ 13. G. Drachuck, E. Razzoli, G. Bazalitski, A. Kanigel,
1564
+ C. Niedermayer, M. Shi, and A. Keren, Nat. Commun.
1565
+ 5, 3390 (2014).
1566
+ 14. O. Cyr-Choinière, G. Grissonnanche, S. Badoux,
1567
+ J. Day, D. A. Bonn, W. N. Hardy, R. Liang, N. Doi-
1568
+ ron-Leyraud, and L. Taillefer, Phys. Rev. B 92, 224502
1569
+ (2015).
1570
+ 15. A. S. Moskvin, Phys. Rev. B 84, 075116 (2011).
1571
+ 16. A. S. Moskvin, J. Phys.: Condens. Matter 25, 085601
1572
+ (2013).
1573
+ 17. Yu. D. Panov, A. S. Moskvin, A. A. Chikov, and
1574
+ I. L. Avvakumov, J. Supercond. Nov. Magn. 29, 1077
1575
+ (2016).
1576
+ 6
1577
+
1578
+ 18. Yu. D. Panov, A. S. Moskvin, A. A. Chikov, and
1579
+ K. S. Budrin, J. Low Temp. Phys. 187, 646 (2017).
1580
+ 19. Yu. D. Panov, K. S. Budrin, A. A. Chikov, and
1581
+ A. S. Moskvin, JETP Lett. 106, 440 (2017).
1582
+ 20. M. Blume, Phys. Rev. 141, 517 (1966).
1583
+ 21. H. W. Capel, Physica 32, 966 (1966).
1584
+ 22. M. Blume, V. J. Emery, and R. B. Griffiths, Phys. Rev.
1585
+ A 4, 1071 (1971).
1586
+ 23. S. V. Semkin and V. P. Smagin, Phys. Solid State 57,
1587
+ 943 (2015).
1588
+ 24. K. Yaldram, G. K. Khalil, and A. Sadiq, Solid State
1589
+ Commun. 87, 1045 (1993).
1590
+ 25. G. K. Khalil, K. Yaldram, and A. Sadiq, Int. J. Mod.
1591
+ Phys. C 08, 139 (1997).
1592
+ 26. K. Kapcia, S. Robaszkiewicz, and R. Micnas, J. Phys.:
1593
+ Condens. Matter 24, 215601 (2012).
1594
+ 27. K. Kapcia and S. Robaszkiewicz, J. Phys.: Condens.
1595
+ Matter 25, 065603 (2013).
1596
+ 28. K. J. Kapcia, S. Murawski, W. Klobus, and S. Robasz-
1597
+ kiewicz, Phys. A (Amsterdam, Neth.) 437, 218 (2015).
1598
+ 7
1599
+
UNFKT4oBgHgl3EQflS6S/content/tmp_files/load_file.txt ADDED
@@ -0,0 +1,543 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ filepath=/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf,len=542
2
+ page_content='Competition between the Spin and Pseudospin Subsystems in a Model Cuprate Yu.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
3
+ page_content=' D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
4
+ page_content=' Panova, *, V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
5
+ page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
6
+ page_content=' Ulitkoa, K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
7
+ page_content=' S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
8
+ page_content=' Budrina, D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
9
+ page_content=' N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
10
+ page_content=' Yasinskayaa, and A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
11
+ page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
12
+ page_content=' Chikova a Ural Federal University Named after the First President of the Russian Federation B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
13
+ page_content='N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
14
+ page_content=' Yeltsin, Yekaterinburg, 620002 Russia e-mail: yuri.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
15
+ page_content='panov@urfu.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
16
+ page_content='ru Abstract—The competition between the magnetic and charge orderings in a model cuprate is considered in terms of a simplified static 2D spin–pseudospin model.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
17
+ page_content=' This model is equivalent to the 2D dilute antiferro- magnetic (AFM) Ising model with charged impurities.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
18
+ page_content=' The mean-field approximation results are presented for the system under study and briefly compared to the classical Monte Carlo (MC) calculations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
19
+ page_content=' The numer- ical simulation shows that the cases of the strong exchange and the strong charge correlation differ qualita- tively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
20
+ page_content=' In the case of a strong exchange, the AMF phase is instable with respect to the phase separation (PS) into the pseudospin (charge) and magnetic (spin) subsystems that behave as immiscible quantum liquids.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
21
+ page_content=' The analytical expression has been obtained for the PS temperature.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
22
+ page_content=' 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
23
+ page_content=' INTRODUCTION A topical problem of the physics of superconduct- ing cuprates is the coexistence and the competition of the spin, superconducting, and charge orderings.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
24
+ page_content=' The correlation between the magnetism and the supercon- ductivity in cuprates has been studied for a long time [1, 2].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
25
+ page_content=' For the last fifteen years, many experimental results indicating the existence of the charge ordering [3–8] and the mutual influence of the spin and charge orderings in cuprates [9–14] were obtained.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
26
+ page_content=' The model that relates the unique properties of cuprates to their instability to the charge transfer of the CuO4 cen- ter states in the CuO2 planes was proposed in [15].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
27
+ page_content=' This model makes it possible to consider, for CuO4 centers in the CuO2 plane, three many-electron valence states CuO (that formally correspond to the states of Cu1+, 2+, 3+ cooper ions) as components of the pseudo- spin triplet S = 1 with MS = –1, 0, +1, respectively, and enables us to use the pseudospin formalism for pseudospin S = 1 [15, 16].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
28
+ page_content=' To consider the competi- tion between the spin and charge orderings in cupra- tes, the simplified static 2D spin–pseudospin model that is a limiting case of the general pseudospin model was proposed in [17–19].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
29
+ page_content=' Hamiltonian of a static spin–pseudospin model is (1) where Szi is the z component of pseudospin S = 1 on a site, and σzi = P0iszi/s is the normalized z component of spin s = 1/2 multiplied by the projection operator P0i = 1 – .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
30
+ page_content=' Parameters Δ = U/2 and V > 0 determine the on-site and the inter-site density-density interactions, respectively;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
31
+ page_content=' J = > 0 is the Ising exchange inter- action between Cu2+ ions, h = is external magnetic field, μ is the chemical potential necessary for the inclusion of the condition of the doping charge con- stancy, and nN = = const, where n is the dop- ing charge density.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
32
+ page_content=' The summation is carried out over the 2D square lattice and \uf0e1ij\uf0f1 implies the nearest neighbors.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
33
+ page_content=' This spin–pseudospin model generalizes the 2D dilute antiferromagnetic (AFM) Ising model with charged impurities.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
34
+ page_content=' In the limit Δ → –∞, it reduces to the Ising model for spin S = 1/2 with a fixed magnetization.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
35
+ page_content=' At Δ > 0, the results can be compared to the Blume–Capel [20, 21] or to the Blume– Emery–Griffiths [22] model.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
36
+ page_content=' The Ising model with mobile charged impurities was also considered in [23].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
37
+ page_content=' It is apparent that the most important restriction of our model for its comparison with real cuprates is the absence of charge transfer in the Hamiltonian.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
38
+ page_content=' The phase diagrams of the ground state were con- sidered in the mean-field approximation in [17, 18].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
39
+ page_content=' It was shown that in all five phases of the ground state are realized in two limits.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
40
+ page_content=' In the weak exchange limit at < V, all the ground state phases (COI, COII, COIII, FIM) correspond to the charge ordering (CO) of a − − − 7 ,6 ,5 4 = Δ + + σ σ − σ − μ \uf0e5 \uf0e5 \uf0e5 \uf0e5 \uf0e5 � � 2 , zi zi zj zi zj i ij ij zi zi i i S V S S J h S 2 zi S � 2 / J s �/ h s \uf0e5 zi S �J 1 checker-board type at average charge density n.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
41
+ page_content=' Whereas there are no spin centers (Cu2+) in phase COI, phases COII and COIII are diluted with nonin- teracting spin centers distributed only in one sublat- tice.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
42
+ page_content=' Such a ferrimagnetic spin ordering is a result of the mean-field approximation;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
43
+ page_content=' because of this, the calculations by the classical Monte Carlo (MC) method in these cases show a paramagnetic response at low temperatures.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
44
+ page_content=' The FIM phase is also formally ferrimagnetic.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
45
+ page_content=' In this case, the spin AFM ordering is diluted with noninteracting charge centers (Cu1+, 3+) distributed only in one sublattice.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
46
+ page_content=' In the limit of strong exchange, at > V, we observe only COI and AFM phases in which charge centers are homogeneously distributed in both sublattices.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
47
+ page_content=' This report is organized as follows.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
48
+ page_content=' We present the results of the calculation of the thermodynamic prop- erties of the system under study in the mean-field approximation and concisely compare them with the calculations by the classical MC method in Section 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
49
+ page_content=' The MC calculations show that, in the limit of the strong exchange, the AFM phase is instable with respect to the phase separation (PS) into the subsys- tems of charge and spin centers.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
50
+ page_content=' In Section 3, we ana- lyze the thermodynamic properties of the PS state in a framework of coexistence of two homogeneous phases.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
51
+ page_content=' Section 4 presents the conclusions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
52
+ page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
53
+ page_content=' MEAN-FIELD APPROXIMATION In this section, we briefly present the results of the calculations of the thermodynamic properties in a mean-field (MF) approximation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
54
+ page_content=' We use the Bogo- lyubov inequality for the grand potential Ω( ): Ω( ) ≤ Ω = Ω( ) + \uf0e1 – \uf0f1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
55
+ page_content=' In the standard way, we introduce two sublattices A and B on a square lat- tice and choose (2) where β = 1/T, δ = βΔ, βα and γα are the molecular fields, α = A, B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
56
+ page_content=' We obtain the expression for estima- tion of ω = Ω/N (3) where ξ = βμ,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
57
+ page_content=' ν = βV,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
58
+ page_content=' j = ,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
59
+ page_content=' η = ,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
60
+ page_content=' z = 4 is the number of the nearest neighbors,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
61
+ page_content=' and the average (pseudo)magnetizations for sublattices = Sα and = σα have the form (4) �J 0 0 α α α α α α α α β = δ − β − γ σ \uf0e5 \uf0e5 \uf0e5 2 0 ,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
62
+ page_content=' ,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
63
+ page_content=' ,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
64
+ page_content=' zi zi zi i i i S S α α α α α −δ α α βω = β − ξ + γ − η σ − β + γ + ν + σ σ \uf0e5 2 [( ) ( ) ln 2( cosh cosh )] ,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
65
+ page_content=' A B A B S e z S S zi β �J β �h α zi S α σz α α δ α α α α −δ α α β = β + γ γ σ = β + γ sinh ,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
66
+ page_content=' cosh cosh sinh .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
67
+ page_content=' cosh cosh S e e Minimizing ω with respect to βα and γα, we obtain the system of the MF equations (5) where = B and = A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
68
+ page_content=' Equations (5) must be complemented by charge restriction SA + SB = 2n.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
69
+ page_content=' To explicitly include this con- dition, we can introduce the charge order parameter a = (SA – SB)/2 and to write the free energy f = ω + μn as a function of n, a, and σα using the inverse relation- ships for Eqs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
70
+ page_content=' (4): (6) where For the nonordered (NO) high-temperature solu- tion at h = 0, we have a = 0 and σα = 0, and the free energy per one site takes the form (7) where g0 = ((1 – n2)e–2δ + n2)1/2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
71
+ page_content=' This enables us to cal- culate all the thermodynamic functions of the NO phase.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
72
+ page_content=' The entropy, the internal energy, and the spe- cific heat per one site are (8) (9) (10) Equations (7)–(10) correspond to the thermodynamic characteristics of the ideal system of noninteracting pseudospin (charge) and spin doublets separated in energy by the value Δ up to the temperature indepen- dent term .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
73
+ page_content=' At Δ = 0, the entropy and the internal α α α α β − ξ = − ν γ − η = − σ , , z S z j A B α α δ − δ β α α α α α −δ δ γ α α α α α + − σ = − − σ σ + − = − σ − 2 2 2 2 2 2 2 2 2 2 2 2 ( ) , (1 ) ( ) , (1 ) S e G e e S e G S e e S δ − δ α α α α α = − − σ + + σ 2 2 2 2 2 2 1/2 (1 ) .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
74
+ page_content=' G S S e e + \uf0e6 \uf0f6 = + Δ − \uf0e7 \uf0f7 β \uf0e8 \uf0f8 − \uf0e6 \uf0f6 + + \uf0e7 \uf0f7 β − \uf0e8 \uf0f8 2 0 NO 2 0 1 1 ln 2 2 1 ln , 1 g z f Vn n n n n g n − − + \uf0e6 \uf0f6 = δ + \uf0e7 \uf0f7 + \uf0e8 \uf0f8 − \uf0e6 \uf0f6 + − \uf0e7 \uf0f7 − \uf0e8 \uf0f8 0 0 NO 2 0 0 (1 )( ) 1 ln 2 1 1 ln , 1 n g n g s g n n g n n + = + Δ + 2 2 0 NO 0 , 2 1 n g z e Vn g − δ − = δ + 2 2 2 2 NO 2 0 0 (1 ) .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
75
+ page_content=' (1 ) n e c g g 2 2 zVn 2 energy become constant;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
76
+ page_content=' thus, the specific heat is a zero.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
77
+ page_content=' If Δ ≠ 0, the specific heat has a maximum at T ∝ |Δ|.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
78
+ page_content=' In particular, if n = 0, then (11) and the maximum is in point T = |Δ|/(2x), where x is the root of equation x = cothx.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
79
+ page_content=' We can also write the explicit form of the magnetic susceptibility at h = 0 in the NO phase.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
80
+ page_content=' Assuming that SA = SB = n and σA = σB = σ at h ≠ 0, we eliminate ξ from system (5) and obtain equation (12) where we introduced the following notations: (13) (14) After the standard calculations, we obtain (15) where χ0(n) is the normalized susceptibility in a zero external field for the ideal system of noninteracting pseudospin and spin doublets.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
81
+ page_content=' System of equations (5) has the ferrimagnetic solutions with σA + σB ≠ 0 at h = 0 [17] that are a result of the MF approximation and do not appear in MC calculations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
82
+ page_content=' Due to the short-range character of the exchange interaction in our model, these solutions can appear upon a numer- ical simulation as a mixture of the antiferromagnetic and paramagnetic phases.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
83
+ page_content=' The underestimating of the paramagnetic response is the systematic error of the MF method in these cases.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
84
+ page_content=' In what follows, we will consider only the AFM types of solutions with σA = – σB = σ at h = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
85
+ page_content=' In this case, according to Eqs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
86
+ page_content=' (5), relationship γA = –γB is fulfilled.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
87
+ page_content=' The magnetizations of sublattices σα are monotonic functions of molecular fields γα, according to Eqs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
88
+ page_content=' (4), therefore, only the case βA = ±βB is possible for σ ≠ 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
89
+ page_content=' This implies that, at n ≠ 0, there are only AFM solutions with a = 0, σ ≠ 0 and CO solutions with a ≠ 0 and σ = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
90
+ page_content=' The case n = 0 should be considered individually, since it gives a pos- sibility for frustrated states as the CO- and AFM-types solutions become degenerate.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
91
+ page_content=' The thermodynamic properties of the AFM and CO phases suggest knowledge of the roots of Eqs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
92
+ page_content=' (5) and can be calculated numerically.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
93
+ page_content=' In addition, the ( ) − δ δ = 2 2 NO cosh , 2 2 c σ = ψ η − σ ( , ), xj n − ψ = + 2 (1 )sinh ( , ) , cosh ( , ) n x x n x g x n − δ = − + = 2 2 2 2 1/2 0 ( , ) ((1 ) cosh ) , (0, ) .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
94
+ page_content=' g x n n e n x g n g = η= χ ∂σ χ = β = ∂η + χ − χ = β + � 2 2 0 NO 0 0 0 2 0 0 ( ) , 1 ( ) 1 ( ) , 1 h n s s zJ n n n g equations for the second-order phase transition tem- peratures and the critical points can be found analyti- cally.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
95
+ page_content=' For the AFM phase, we use condition = 0 at σ = 0, which gives (16) With accounting for Eqs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
96
+ page_content=' (6), we obtain the equation for the NO–AFM transition temperature (17) In particular, we obtain for Δ → +∞ that (18) which coincides with the results of [22].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
97
+ page_content=' Substituting Eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
98
+ page_content=' (17) into Eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
99
+ page_content=' (15), we find the susceptibility in the transition point χNO = s2/( ).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
100
+ page_content=' To find the critical point that separates the first and second order transitions, we use equation = 0 in the coexistence curve.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
101
+ page_content=' After some manipulations, we obtain (19) Taking into account Eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
102
+ page_content=' (17), we obtain the critical point position (20) In particular, at n = 0, Tc1 = , Δc1/Tc1 = –ln2, which agrees with the results of [22].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
103
+ page_content=' The susceptibility in a zero field in the AFM phase has the form (21) where (22) The order parameter of the AFM phase σ at h = 0 can be found from equation (23) ∂ ∂σ 2 2 / f α α α σ = ∂γ = ∂σ 0 .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
104
+ page_content=' zj − = + 2 0 (1 ) 1 .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
105
+ page_content=' n zj g = − � AFM (1 ) , T n zJ � 2zJ ∂ ∂σ 4 4 / f − − = 2 2 0 0 2 3 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
106
+ page_content=' g g n − = + + Δ − = + + + � 2 1 2 2 1 2 2 1 1 , 2 1 3 1 1 ln .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
107
+ page_content=" 2 2(1 1 3 ) c c c n T zJ n n T n n �/3 zJ = βψ σ χ = + ψ σ 2 AFM 0 '( , ) , 1 '( , ) h z j n s z j z j n − + ψ = + 2 2 0 2 (1 )( ( , ) cosh ) '( , ) ." metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
108
+ page_content=' ( , )(cosh ( , )) n g x n g x x n g x n x g x n σ = ψ σ ( , ).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
109
+ page_content=' zj n 3 By analogy, for the CO phase, condition = 0 at a = 0 gives (24) and we obtain equation for the NO–CO transition temperature (25) In particular, for Δ → –∞, we obtain (26) In the CO phase, the equation for the critical point is more complex (27) but, at n = 0, this gives Tc2 = zV/3, Δc2/Tc2 = ln2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
110
+ page_content=' In a zero field the susceptibility in the CO phase is (28) where the CO-phase order parameter obeys equation (29) ∂ ∂ 2 2 / f a α σ = ∂γ ∂γ \uf0e6 \uf0f6 − = ν \uf0e7 \uf0f7 \uf0e8 \uf0f8 ∂ ∂ 0 1 , 2 A B z a a − − ν = + 2 1 0 (1 ) 1 .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
111
+ page_content=' n z g = − 2 CO (1 ) .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
112
+ page_content=' T n zV + − − + = 2 3 2 2 2 0 0 0 2(1 3 ) 6 3 0, n g g n g n = χ + + χ − χ = + χ + + χ − � 0 0 2 CO 0 0 0 1( ( ) ( )) 2 , 1 1 ( ( ) ( )) 2 h n a n a s zJ m a n a \uf0e6 \uf0f6 + + + − + = \uf0e7 \uf0f7 ν − + − − − \uf0e8 \uf0f8 ( (0, ))(1 ) 1 ln .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
113
+ page_content=' 2 ( (0, ))(1 ) n a g n a n a a z n a g n a n a The general formula for the susceptibility in a zero field combining the cases of the NO, AFM, and CO phases is given by relationship (30) where σ is the AFM-phase order parameter, and a is the CO-phase order parameter.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
114
+ page_content=' The numerical simulation was carried out using a high-efficient algorithm of parallel calculations and the classical MC method.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
115
+ page_content=' Figure 1 shows the results of the MC calculations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
116
+ page_content=' The peak position in the tem- perature dependence of the specific heat approxi- mately (because of a finite size of the system) corre- sponds to the disorder–order transition temperature.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
117
+ page_content=' These values are indicated by points.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
118
+ page_content=' The transition temperatures obtained in the MF approximation are shown by solid lines.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
119
+ page_content=' Figure 1 clearly demonstrates the typical (by a factor of slightly lower than two times) overestimation of the critical temperature value in the MF approximation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
120
+ page_content=' Figure 3 shows the dependence of the AFM-transition critical temperature on n in the MF approximation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
121
+ page_content=' Its shape qualitatively agrees with the results obtained in the Bethe approximation in [23].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
122
+ page_content=' Figure 2 presents the comparison of the results for the susceptibility and the specific heat obtained by the MF approximation and by MC method.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
123
+ page_content=' The analyti- cal MF-dependences show a qualitative agreement to the results of the numerical simulation and, in some cases, even a quantitative coincidence of the results for the high-temperature region.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
124
+ page_content=" The main discrepancies are due to the difference in the critical temperature β ψ σ + + ψ σ − χ = + ψ σ + +ψ σ − 2 1 ( '( , ) '( , )) 2 , 1 1 ( '( , )( '( , )) 2 z j n a z j n a s z j z j n a z j n a Fig." metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
125
+ page_content=' 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
126
+ page_content=' (a) Left panel: the case of weak exchange: n = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
127
+ page_content='1, = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
128
+ page_content='25, and V = 1;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
129
+ page_content=' (b) the case of the strong exchange: n = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
130
+ page_content='1, = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
131
+ page_content='25, and V = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
132
+ page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
133
+ page_content=' Points correspond to the MC critical temperatures.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
134
+ page_content=' The values of the MF critical temperature given by Eqs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
135
+ page_content=' (17), (25), and (34) are indicated in lines 1–3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
136
+ page_content=' 2 1 NO CO AFM �1 0 1 2 �/J �/J 0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
137
+ page_content='5 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
138
+ page_content='0 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
139
+ page_content='5 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
140
+ page_content='0 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
141
+ page_content='5 T/J T/J �2 �1 0 1 2 CO 2 1 NO AFM 3 0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
142
+ page_content='2 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
143
+ page_content='4 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
144
+ page_content='6 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
145
+ page_content='8 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
146
+ page_content='0 AFM + charge droplets (a) (b) �J �J 4 and systematic inaccuracies in the MF approximation in the case of description of the critical fluctuations and the paramagnetic response at low temperatures.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
147
+ page_content=' 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
148
+ page_content=' THE PHASE SEPARATION CRITICAL TEMPERATURE According to the results of the numerical simula- tion by the MC method, the temperature dependences of the specific heat demonstrate in the limit of strong exchange at positive Δ two successive phase transi- tions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
149
+ page_content=' The immediate study of the system state shows that the first transition is the AFM ordering.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
150
+ page_content=' With low- ering temperature in the spin subsystem that is an AFM matrix diluted by randomly distributed charged impurities, the impurities are condensed into charge droplets.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
151
+ page_content=' It means that in the limit of the strong exchange, the diluted AFM-phase is instable with respect to the macroscopic (PS) into the pseudospin (charge) and magnetic (spin) subsystems.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
152
+ page_content=' At this stage, the AFM matrix forces out charged nonmag- netic impurities to minimize the surface energy.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
153
+ page_content=' Note that, in the limit of weak exchange, the charged impu- rities are randomly distributed over the AFM matrix up to T = 0 and also the charged impurities are ran- domly distributed in the CO phase, since the energies of all possible distributions of additional charges over the CO matrix are the same in the approximation of interaction of only the nearest neighbors.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
154
+ page_content=' The results of our numerical simulation are similar to the results obtained for binary alloys in [24, 25].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
155
+ page_content=' To describe the thermodynamic properties of the heterogeneous state, we use the model developed in [26–28] for a macroscopic PS in electron systems.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
156
+ page_content=' This model is based on the Maxwell construction.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
157
+ page_content=' Assuming that there are two coexisting macroscopic homogeneous phases 1 and 2, we write the free energy of the PS state per one site as (31) where m is the system fraction with density n1, 1 – m is the system fraction with density n2, so that mn1 + (1 – m)n2 = n.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
158
+ page_content=' In our case, one phase consists of charged centers (C), and another phase is the spin AFM phase without impurities;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
159
+ page_content=' therefore, n1 = sgnn, n2 = 0, and m = |n|.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
160
+ page_content=' The transition point is determined by equation (32) = + − PS 1 1 2 2 ( ) (1 ) ( ), f mf n m f n + − = AFM AFM (1) (1 ) (0) ( ).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
161
+ page_content=' C n f n f f n Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
162
+ page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
163
+ page_content=' Susceptibility and the specific heat obtained (solid lines) in the MF approximation and (points) by MC method: (a) the case of weak exchange: n = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
164
+ page_content='1, = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
165
+ page_content='25, and V = 1 and (b) the case of the strong exchange: n = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
166
+ page_content='1, = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
167
+ page_content='25, and V = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
168
+ page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
169
+ page_content=' �/J = 0 �/J = 0 �/J = 0 �/J = 1 �/J = 1 �/J = 1 �/J = �1 �/J = �1 �/J = 2 �/J = 0 �/J = 1 �/J = 2 0 1 2 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
170
+ page_content='2 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
171
+ page_content='1 0 �, arb.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
172
+ page_content='units c, arb.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
173
+ page_content='units �, arb.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
174
+ page_content='units c, arb.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
175
+ page_content='units 0 1 2 3 T/J T/J 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
176
+ page_content='10 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
177
+ page_content='05 0 0 1 2 3 (a) (b) 0 2 1 0 1 2 2 2 2 0 1 0 1 0 1 �J �J Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
178
+ page_content=' 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
179
+ page_content=' The bright circles correspond to the susceptibility maxima upon the AFM ordering;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
180
+ page_content=' dark cycles correspond to the specific heat maxima upon PS obtained by the MC method.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
181
+ page_content=' The model parameters are Δ = 1, = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
182
+ page_content='25, and V = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
183
+ page_content='14.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
184
+ page_content=' Lines 1 and 3 show the critical temperatures given by Eqs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
185
+ page_content=' (17) and (34).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
186
+ page_content=' NO AFM 1 3 n 0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
187
+ page_content='2 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
188
+ page_content='4 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
189
+ page_content='6 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
190
+ page_content='8 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
191
+ page_content='0 AFM droplets AFM + charge droplets 0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
192
+ page_content='2 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
193
+ page_content='4 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
194
+ page_content='6 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
195
+ page_content='8 T/J �J 5 The free energy of charge centers fC(1) = 2V + Δ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
196
+ page_content=' The free energy of the AFM phase can be written as (33) We assume that Δ > 0 and consider the case of low temperatures, thus, δ 1 and j 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
197
+ page_content=' In this approxi- mation, with the inclusion of Eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
198
+ page_content=' (23), we obtain |σ| = 1 – |n|.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
199
+ page_content=' As a result, Eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
200
+ page_content=' (32) gives the following rela- tionship for PS temperature (34) This expression does not depend on Δ, which agrees with the MC results for TPS in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
201
+ page_content=' 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
202
+ page_content=' Figure 3 shows the concentration dependences of the critical temperatures for the AFM transition and the PS.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
203
+ page_content=' The circles denote the MC results for the sus- ceptibility maxima upon the AFM ordering, and the points show the specific heat maxima upon the PS.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
204
+ page_content=' Solid line 3 shows the PS temperature determined by Eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
205
+ page_content=' (34).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
206
+ page_content=' This temperature agrees unexpectedly well with the MC results, while the dependence in the MF approximation (line 2) for the AFM-ordering tem- perature determined by Eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
207
+ page_content=' (17) becomes qualitatively wrong at |n| > 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
208
+ page_content='5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
209
+ page_content=' Note as well that Eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
210
+ page_content=' (34) for the PS temperature based on the Maxwell construction gives lower values as compared to the values found in [22].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
211
+ page_content=' 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
212
+ page_content=' CONCLUSIONS We considered the static 2D spin–pseudospin model on a square lattice that generalizes the dilute antiferromagnetic Ising model.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
213
+ page_content=' We compared similar results in the MF approximation with the results of the numerical simulation by the classical MC method.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
214
+ page_content=' The analysis of the specific heat and the susceptibility obtained by the MC method showed that the MF crit- ical temperature of CO and AFM ordering qualita- tively reproduce the numerical results, but they sys- tematically give higher values.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
215
+ page_content=' The MC calculations show that the cases of the strong and weak exchange are qualitatively different.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
216
+ page_content=' In the case of the weak exchange, a frustration appears in the charge-ordered ground state of the system.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
217
+ page_content=' In the limit of the strong exchange, the homogeneous AFM phase is instable with respect to the PS of the pseudospin and spin sub- systems.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
218
+ page_content=' We obtained the analytical expression for the PS temperature and revealed that it agrees well with the numerical simulation by the classical MC method.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
219
+ page_content=' = + σ + Δ σ + σ \uf0e6 \uf0f6 − \uf0e7 \uf0f7 β − \uf0e8 \uf0f8 σ + σ \uf0e6 \uf0f6 + \uf0e7 \uf0f7 β − \uf0e8 \uf0f8 � 2 2 AFM 2 ( ) ( ) 2 cosh( ) ( , ) 1 ln 2 1 cosh( ) ( , ) ln .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
220
+ page_content=' 1 z f n Vn J n z j g z j n n n z j g z j n n n ≫ ≫ − − = + − − � PS (1 ) ( ).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
221
+ page_content=' ln (1 )ln(1 ) 2 n n z V J T n n n n FUNDING This work was supported by Program 211 of the Government of the Russian Federation (Agreement 02.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
222
+ page_content='A03.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
223
+ page_content='21.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
224
+ page_content='0006), the Ministry of Education and Sci- ence of the Russian federation (projects nos.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
225
+ page_content=' 2277 and 5719), and the Russian Foundation for Basic Research (project no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
226
+ page_content=' 18-32-00837\\18).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
227
+ page_content=' REFERENCES 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
228
+ page_content=' R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
229
+ page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
230
+ page_content=' Birgeneau, C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
231
+ page_content=' Stock, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
232
+ page_content=' M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
233
+ page_content=' Tranquada, and K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
234
+ page_content=' Yamada, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
235
+ page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
236
+ page_content=' Soc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
237
+ page_content=' Jpn.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
238
+ page_content=' 75, 111003 (2006).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
239
+ page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
240
+ page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
241
+ page_content=' M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
242
+ page_content=' Tranquada, G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
243
+ page_content=' Xu, and I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
244
+ page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
245
+ page_content=' Zaliznyak, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
246
+ page_content=' Magn.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
247
+ page_content=' Magn.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
248
+ page_content=' Mater.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
249
+ page_content=' 350, 148 (2014).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
250
+ page_content=' 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
251
+ page_content=' T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
252
+ page_content=' Wu, H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
253
+ page_content=' Mayaffre, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
254
+ page_content=' Krämer, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
255
+ page_content=' Horvatić, C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
256
+ page_content=' Ber- thier, W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
257
+ page_content=' N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
258
+ page_content=' Hardy, R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
259
+ page_content=' Liang, D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
260
+ page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
261
+ page_content=' Bonn, and M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
262
+ page_content='-H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
263
+ page_content=' Julien, Nature (London, U.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
264
+ page_content='K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
265
+ page_content=') 477, 191 (2011).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
266
+ page_content=' 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
267
+ page_content=' G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
268
+ page_content=' Ghiringhelli, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
269
+ page_content=' le Tacon, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
270
+ page_content=' Minola, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
271
+ page_content=' Blanco- Canosa, C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
272
+ page_content=' Mazzoli, N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
273
+ page_content=' B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
274
+ page_content=' Brookes, G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
275
+ page_content=' M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
276
+ page_content=' de Luca, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
277
+ page_content=' Frano, D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
278
+ page_content=' G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
279
+ page_content=' Hawthorn, F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
280
+ page_content=' He, T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
281
+ page_content=' Loew, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
282
+ page_content=' Mo- retti Sala, D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
283
+ page_content=' C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
284
+ page_content=' Peets, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
285
+ page_content=' Salluzzo, E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
286
+ page_content=' Schierle, et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
287
+ page_content=', Science (Washington, DC, U.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
288
+ page_content=' S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
289
+ page_content=') 337, 821 (2012).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
290
+ page_content=' 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
291
+ page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
292
+ page_content=' Chang, E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
293
+ page_content=' Blackburn, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
294
+ page_content=' T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
295
+ page_content=' Holmes, N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
296
+ page_content=' B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
297
+ page_content=' Chris- tensen, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
298
+ page_content=' Larsen, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
299
+ page_content=' Mesot, R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
300
+ page_content=' Liang, D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
301
+ page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
302
+ page_content=' Bonn, W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
303
+ page_content=' N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
304
+ page_content=' Hardy, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
305
+ page_content=' Watenphul, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
306
+ page_content=' V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
307
+ page_content=' Zimmermann, E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
308
+ page_content=' M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
309
+ page_content=' Forgan, and S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
310
+ page_content=' M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
311
+ page_content=' Hayden, Nat.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
312
+ page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
313
+ page_content=' 8, 871 (2012).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
314
+ page_content=' 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
315
+ page_content=' E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
316
+ page_content=' H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
317
+ page_content=' da Silva Neto, P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
318
+ page_content=' Aynajian, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
319
+ page_content=' Frano, R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
320
+ page_content=' Comin, E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
321
+ page_content=' Schierle, E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
322
+ page_content=' Weschke, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
323
+ page_content=' Gyenis, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
324
+ page_content=' Wen, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
325
+ page_content=' Schnee- loch, Z.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
326
+ page_content=' Xu, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
327
+ page_content=' Ono, G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
328
+ page_content=' Gu, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
329
+ page_content=' le Tacon, and A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
330
+ page_content=' Yazdani, Science (Washington, DC, U.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
331
+ page_content=' S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
332
+ page_content=') 343, 393 (2014).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
333
+ page_content=' 7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
334
+ page_content=' R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
335
+ page_content=' Comin and A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
336
+ page_content=' Damascelli, Ann.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
337
+ page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
338
+ page_content=' Condens.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
339
+ page_content=' Matter Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
340
+ page_content=' 7, 369 (2016).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
341
+ page_content=' 8.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
342
+ page_content=' F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
343
+ page_content=' Laliberté, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
344
+ page_content=' Frachet, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
345
+ page_content=' Benhabib, B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
346
+ page_content=' Borgnic, T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
347
+ page_content=' Loew, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
348
+ page_content=' Porras, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
349
+ page_content=' Le Tacon, B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
350
+ page_content=' Keimer, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
351
+ page_content=' Wied- mann, C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
352
+ page_content=' Proust, and D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
353
+ page_content=' LeBoeuf, npj Quantum Mater.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
354
+ page_content=' 3, 11 (2018).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
355
+ page_content=' 9.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
356
+ page_content=' P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
357
+ page_content=' Abbamonte, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
358
+ page_content=' Rusydi, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
359
+ page_content=' Smadici, G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
360
+ page_content=' D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
361
+ page_content=' Gu, G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
362
+ page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
363
+ page_content=' Sawatzky, and D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
364
+ page_content=' L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
365
+ page_content=' Feng, Nat.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
366
+ page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
367
+ page_content=' 1, 155 (2005).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
368
+ page_content=' 10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
369
+ page_content=' E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
370
+ page_content=' Berg, E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
371
+ page_content=' Fradkin, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
372
+ page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
373
+ page_content=' Kivelson, and J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
374
+ page_content=' M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
375
+ page_content=' Tran- quada, New J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
376
+ page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
377
+ page_content=' 11, 115004 (2009).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
378
+ page_content=' 11.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
379
+ page_content=' M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
380
+ page_content=' Fujita, H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
381
+ page_content=' Hiraka, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
382
+ page_content=' Matsuda, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
383
+ page_content=' Matsuura, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
384
+ page_content=' M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
385
+ page_content=' Tranquada, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
386
+ page_content=' Wakimoto, G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
387
+ page_content=' Xu, and K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
388
+ page_content=' Yama- da, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
389
+ page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
390
+ page_content=' Soc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
391
+ page_content=' Jpn.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
392
+ page_content=' 81, 011007 (2012).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
393
+ page_content=' 12.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
394
+ page_content=' E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
395
+ page_content=' Fradkin and S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
396
+ page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
397
+ page_content=' Kivelson, Nat.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
398
+ page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
399
+ page_content=' 8, 864 (2012).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
400
+ page_content=' 13.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
401
+ page_content=' G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
402
+ page_content=' Drachuck, E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
403
+ page_content=' Razzoli, G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
404
+ page_content=' Bazalitski, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
405
+ page_content=' Kanigel, C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
406
+ page_content=' Niedermayer, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
407
+ page_content=' Shi, and A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
408
+ page_content=' Keren, Nat.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
409
+ page_content=' Commun.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
410
+ page_content=' 5, 3390 (2014).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
411
+ page_content=' 14.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
412
+ page_content=' O.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
413
+ page_content=' Cyr-Choinière, G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
414
+ page_content=' Grissonnanche, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
415
+ page_content=' Badoux, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
416
+ page_content=' Day, D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
417
+ page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
418
+ page_content=' Bonn, W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
419
+ page_content=' N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
420
+ page_content=' Hardy, R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
421
+ page_content=' Liang, N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
422
+ page_content=' Doi- ron-Leyraud, and L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
423
+ page_content=' Taillefer, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
424
+ page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
425
+ page_content=' B 92, 224502 (2015).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
426
+ page_content=' 15.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
427
+ page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
428
+ page_content=' S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
429
+ page_content=' Moskvin, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
430
+ page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
431
+ page_content=' B 84, 075116 (2011).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
432
+ page_content=' 16.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
433
+ page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
434
+ page_content=' S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
435
+ page_content=' Moskvin, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
436
+ page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
437
+ page_content=' : Condens.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
438
+ page_content=' Matter 25, 085601 (2013).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
439
+ page_content=' 17.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
440
+ page_content=' Yu.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
441
+ page_content=' D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
442
+ page_content=' Panov, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
443
+ page_content=' S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
444
+ page_content=' Moskvin, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
445
+ page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
446
+ page_content=' Chikov, and I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
447
+ page_content=' L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
448
+ page_content=' Avvakumov, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
449
+ page_content=' Supercond.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
450
+ page_content=' Nov.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
451
+ page_content=' Magn.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
452
+ page_content=' 29, 1077 (2016).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
453
+ page_content=' 6 18.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
454
+ page_content=' Yu.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
455
+ page_content=' D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
456
+ page_content=' Panov, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
457
+ page_content=' S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
458
+ page_content=' Moskvin, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
459
+ page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
460
+ page_content=' Chikov, and K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
461
+ page_content=' S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
462
+ page_content=' Budrin, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
463
+ page_content=' Low Temp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
464
+ page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
465
+ page_content=' 187, 646 (2017).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
466
+ page_content=' 19.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
467
+ page_content=' Yu.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
468
+ page_content=' D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
469
+ page_content=' Panov, K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
470
+ page_content=' S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
471
+ page_content=' Budrin, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
472
+ page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
473
+ page_content=' Chikov, and A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
474
+ page_content=' S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
475
+ page_content=' Moskvin, JETP Lett.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
476
+ page_content=' 106, 440 (2017).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
477
+ page_content=' 20.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
478
+ page_content=' M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
479
+ page_content=' Blume, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
480
+ page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
481
+ page_content=' 141, 517 (1966).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
482
+ page_content=' 21.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
483
+ page_content=' H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
484
+ page_content=' W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
485
+ page_content=' Capel, Physica 32, 966 (1966).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
486
+ page_content=' 22.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
487
+ page_content=' M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
488
+ page_content=' Blume, V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
489
+ page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
490
+ page_content=' Emery, and R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
491
+ page_content=' B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
492
+ page_content=' Griffiths, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
493
+ page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
494
+ page_content=' A 4, 1071 (1971).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
495
+ page_content=' 23.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
496
+ page_content=' S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
497
+ page_content=' V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
498
+ page_content=' Semkin and V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
499
+ page_content=' P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
500
+ page_content=' Smagin, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
501
+ page_content=' Solid State 57, 943 (2015).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
502
+ page_content=' 24.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
503
+ page_content=' K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
504
+ page_content=' Yaldram, G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
505
+ page_content=' K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
506
+ page_content=' Khalil, and A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
507
+ page_content=' Sadiq, Solid State Commun.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
508
+ page_content=' 87, 1045 (1993).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
509
+ page_content=' 25.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
510
+ page_content=' G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
511
+ page_content=' K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
512
+ page_content=' Khalil, K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
513
+ page_content=' Yaldram, and A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
514
+ page_content=' Sadiq, Int.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
515
+ page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
516
+ page_content=' Mod.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
517
+ page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
518
+ page_content=' C 08, 139 (1997).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
519
+ page_content=' 26.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
520
+ page_content=' K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
521
+ page_content=' Kapcia, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
522
+ page_content=' Robaszkiewicz, and R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
523
+ page_content=' Micnas, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
524
+ page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
525
+ page_content=' : Condens.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
526
+ page_content=' Matter 24, 215601 (2012).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
527
+ page_content=' 27.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
528
+ page_content=' K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
529
+ page_content=' Kapcia and S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
530
+ page_content=' Robaszkiewicz, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
531
+ page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
532
+ page_content=' : Condens.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
533
+ page_content=' Matter 25, 065603 (2013).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
534
+ page_content=' 28.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
535
+ page_content=' K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
536
+ page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
537
+ page_content=' Kapcia, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
538
+ page_content=' Murawski, W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
539
+ page_content=' Klobus, and S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
540
+ page_content=' Robasz- kiewicz, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
541
+ page_content=' A (Amsterdam, Neth.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
542
+ page_content=') 437, 218 (2015).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
543
+ page_content=' 7' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UNFKT4oBgHgl3EQflS6S/content/2301.11853v1.pdf'}
VtE1T4oBgHgl3EQfIwPB/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
WdAzT4oBgHgl3EQfmP2O/content/tmp_files/2301.01560v1.pdf.txt ADDED
The diff for this file is too large to render. See raw diff
 
WdAzT4oBgHgl3EQfmP2O/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
c9E3T4oBgHgl3EQfeQoX/content/tmp_files/load_file.txt ADDED
@@ -0,0 +1,424 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ filepath=/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf,len=423
2
+ page_content='arXiv:2301.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
3
+ page_content='04541v1 [math.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
4
+ page_content='CT] 11 Jan 2023 ALMOST MATHEMATICS OF POINTED SYMMETRIC MONOIDAL MODEL CATEGORIES BY SMITH IDEAL THEORY YUKI KATO Abstract.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
5
+ page_content=' This article is a generalization of a result in Quillen’s note [Qui96] “Module theory over non- unital rings” giving a one-to-one correspondence between bilocalization of abelian categories of modules and idempotent ideals of the base ring.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
6
+ page_content=' Faltings [Fal88];' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
7
+ page_content=' Gabber and Ramero [GR03] established almost mathematics, the same as Quillen’s bilocalization of a category of modules by nil modules.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
8
+ page_content=' In this paper, by using the theory of Smith ideals mentioned in Hovey [Hov14], we consider almost mathematics of symmetric monoidal pointed model categories and prove a weak analogue of the one-to- one correspondence in Quillen [Qui96].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
9
+ page_content=' 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
10
+ page_content=' Introduction Almost mathematics is firstly introduced by Faltings [Fal88], proving almost purity in his article.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
11
+ page_content=' Gab- ber and Ramero [GR03] provided a detailed foundation of almost mathematics;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
12
+ page_content=' they called it almost ring theory: almost modules, almost algebras, and almost homotopy algebras.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
13
+ page_content=' Let V be a unital commutative ring with an idempotent ideal I of V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
14
+ page_content=' A V-module M is said to be almost I-zero (or simply, almost zero) if M is killed by I, and almost mathematics is a theory of algebra working by localizing the category of V-modules by the Serre subcategory of almost zero modules.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
15
+ page_content=' Independently, Quillen considered linear algebra over non-unital rings, the same as almost mathe- matics in his unpublished note [Qui96]: Almost mathematics in Quillen [Qui96] is characterized as bilocalization (both localization and colocalization) of an abelian category of modules.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
16
+ page_content=' Theorem 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
17
+ page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
18
+ page_content=' ([Qui96] Proposition 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
19
+ page_content='5) Let V be a commutative ring with a multiplicative unit.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
20
+ page_content=' There is a one-to-one correspondence between Serre subcategories S of ModV which the localization F : ModV → ModV/S is also a colocalization, and idempotent ideals of V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
21
+ page_content=' This article aims to prove a symmetric monoidal model categorical analogue of Theorem 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
22
+ page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
23
+ page_content=' To intro- duce a theory of idempotent ideals for model categories, we use the theory of Smith ideals Hovey [Hov14].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
24
+ page_content=' In the theory of algebra, a two-sided ideal of a ring can be defined to be a kernel of some ring homo- morphism.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
25
+ page_content=' We can interpret that Smith ideals theory is based on the correspondence between two-sided ideals of rings and kernels of ring homomorphisms (See Hovey [Hov14, Section 1]).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
26
+ page_content=' A category is pointed if it has an initial object ∅ and a final object ∗ such that the unique morphism ∅ → ∗ is an isomorphism.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
27
+ page_content=' We call the initial object the zero object of a pointed category, and 0 denotes it.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
28
+ page_content=' Throughout this paper, we consider pointed (model) categories.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
29
+ page_content=' Let C be a pointed symmetric monoidal Date: January 12, 2023.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
30
+ page_content=' Key words and phrases.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
31
+ page_content=' Symmetric monoidal model categories, Smith ideals, almost mathematics, Bousfield localization and colocalization.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
32
+ page_content=' 1 category with a monoidal unit object V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
33
+ page_content=' Let ∆1 denote the category with two objects 0 and 1, and only one non-trivial morphism 0 → 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
34
+ page_content=' The functor category Fun(∆1, C) from ∆1 to C is called the arrow category of C, and Ar(C) denotes it.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
35
+ page_content=' By Hovey [Hov14, Theorem 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
36
+ page_content='2], the category Ar(C) has two distinct symmetric monoidal structures derived from C’s: For any two morphisms in C, f : X0 → X1 and g : Y0 → Y1, one has a commutative square: X0 ⊗ Y0 f⊗id � id⊗g � X1 ⊗ Y0 id⊗g � X0 ⊗ Y1 f⊗id �X1 ⊗ Y1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
37
+ page_content=' One of them is the diagonal (or tensor) product monoidal structure is defined by f ⊗g as the composition f ⊗ g = ( f ⊗ id) ◦ (id ⊗ g) = (id ⊗ g) ◦ ( f ⊗ id) : X0 ⊗ Y0 → X1 ⊗ Y1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
38
+ page_content=' The other is the push-out product monoidal structure is defined by the induced morphism: f□g : (X0 ⊗ Y1) ∐X0⊗Y0 (X1 ⊗ Y0) → X1 ⊗ Y1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
39
+ page_content=' We can define Smith ideals by the push-out product monoidal structure: A Smith ideal j : I → R is defined to be a commutative monoid object of Ar(C) with respect to the push-out product monoidal structure.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
40
+ page_content=' In the case of a pointed symmetric monoidal category C, the cokernel functor cok : Ar(C) ∋ ( f : X → Y) �→ (Y → Coker( f)) ∈ Ar(C) is symmetric monoidal from the pushout product monoidal structure to the diagonal product monoidal structure.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
41
+ page_content=' Further, the right adjoint of cok is the kernel functor ker : Ar(C) ∋ ( f : X → Y) �→ (Ker( f) → X) ∈ Ar(C).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
42
+ page_content=' (See Hovey [Hov14, Theorem 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
43
+ page_content='4]).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
44
+ page_content=' In the special case, a Smith ideal j : I → R with an isomorphism j → (ker ◦ cok)( j) is isomorphic to the kernel of the monoid morphism cok( j) : R → Coker( j).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
45
+ page_content=' For any class T of morphisms in a category, �T (resp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
46
+ page_content=' T�) denotes the class of morphisms which have right (resp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
47
+ page_content=' left) lifting property with respect to all morphisms in T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
48
+ page_content=' Then �(T�) is said to be the weakly saturated class of morphisms generated by T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
49
+ page_content=' In this paper, we always assume that all model categories are cofibrantly generated: there exist small subsets I and J of the set of morphisms of the model category such that the collection of all cofibrations (resp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
50
+ page_content=' trivial cofibrations) is the weakly saturated class of morphisms generated by I (resp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
51
+ page_content=' J).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
52
+ page_content=' In this paper, we define a homotopical analogue of almost mathematics;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
53
+ page_content=' idempotent ideals, almost zero-modules, and almost isomorphisms by using the Smith ideal theory of model categories.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
54
+ page_content=' In Sec- tion 2, we recall the definition of Smith ideals of model categories and some properties of the homotopy cokernel and kernel functors to work in this paper.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
55
+ page_content=' In Section 3, we introduce the theory of almost mathematics of pointed symmetric monoidal model categories;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
56
+ page_content=' homotopically idempotent Smith ideals, homotopically almost zero objects, and homotopically almost weak equivalences.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
57
+ page_content=' As the main results, we prove a weak version of a model categorical analogue of Theorem 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
58
+ page_content='1: Given a pointed symmetric monoidal model category with a homotopically idempotent Smith ideal of the monoidal unit object, we obtain that the Bousfield localization on the model category by homotopically 2 almost weak equivalences is also a Bousfield colocalization (Theorem 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
59
+ page_content='13).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
60
+ page_content=' Conversely, in the case that the monoidal unit generates the stable symmetric monoidal model category in the sense of MacLane [?' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
61
+ page_content=', Chapter V, Section 7], we can construct a homotopically idempotent ideal (Theorem 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
62
+ page_content='5).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
63
+ page_content=' Acknowledgements.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
64
+ page_content=' I would like to thank a colleague for giving me an innovative idea to use Hovey’s Smith ideal theory.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
65
+ page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
66
+ page_content=' Smith ideal theory of symmetric monoidal model categories Following Hovey [Hov14], we explain concise of the theory of Smith ideals to generalize almost mathematics theory.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
67
+ page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
68
+ page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
69
+ page_content=' The arrow categories of pointed model categories.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
70
+ page_content=' A symmetric monoidal model category M is a model category with a symmetric monoidal structure − ⊗ − : M × M → M such that, for any object M of M, those functors (−) ⊗ M and M ⊗ (−) are left Quillen functors on themselves.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
71
+ page_content=' This paper assumes that symmetric monoidal model categories are always closed.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
72
+ page_content=' That is, Madmits internal hom-objects MapM(M, N) for any couple (M, N) of objects of M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
73
+ page_content=' The arrow category Ar(M) has the evaluation functors Evi( f : X0 → X1) = Xi (i = 0, 1), which has a left adjoint and a right adjoint: Evi : Ar(M) �M : Li, Ui (i = 0, 1), �� where Li denotes the left adjoint of Evi and Ui the right adjoint.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
74
+ page_content=' The category Ar(M) has two canonical model structures the injective model structure and the projec- tive model structure induced by M’s: Definition 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
75
+ page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
76
+ page_content=' Let M be a model category.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
77
+ page_content=' The arrow category Ar(M) has the following two model structures.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
78
+ page_content=' (Injective model structure) A morphism α : ( f : X0 → X1) → (g : Y0 → Y1) is a cofibrations (resp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
79
+ page_content=' weak equivalence) in Ar(M) if and only if so is each Evi(α) for i = 0, 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
80
+ page_content=' Fibrations are morphisms with the right lifting property for all trivial cofibrations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
81
+ page_content=' (Projective model structure) A morphism α : ( f : X0 → X1) → (g : Y0 → Y1) is a fibrations (resp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
82
+ page_content=' weak equivalence) in Ar(M) if and only if so is each Evi(α) for i = 0, 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
83
+ page_content=' Cofibrations are morphisms with the right lifting property for all trivial fibrations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
84
+ page_content=' By the definition of the injective and the projective model structures, for each i = 0, 1, Evi is both a left Quillen functor with respect to the injective model structure and a right Quillen functor with respect to the projective model structure.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
85
+ page_content=' Therefore one has the following: Proposition 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
86
+ page_content='2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
87
+ page_content=' Let M be a model category.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
88
+ page_content=' (1) The injective model structure of Ar(M) admits a Quillen adjunction Li : M ⇄ Ar(M) : Evi for each i = 0, 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
89
+ page_content=' (2) The projective model structure of Ar(M) admits a Quillen adjunction Evi : Ar(M) ⇄ M : Ui for each i = 0, 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
90
+ page_content=' □ 3 In the allow category Ar(M), fibrations of the injective model structure and cofibrations of the projec- tive model structure are characterized as follows: Proposition 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
91
+ page_content='3 ([Hov14] Thereom 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
92
+ page_content='1(2) and Therem 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
93
+ page_content='1 (2)).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
94
+ page_content=' Let M be a model category.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
95
+ page_content=' (1) On the injective model structure of Ar(M), α : f → g is a (trivial) fibration if and only if so are Ev1(α) and the induced morphism ( f, Ev1(α)) : Ev1( f) → Ev0(g) ×Ev1(g) Ev1( f).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
96
+ page_content=' In particular, if α is a (trivial) fibration, so is Evi(α) for each i = 0, 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
97
+ page_content=' (2) On the projective model structure of Ar(M), α : f → g is a (trivial) cofibration if and only if so are Ev0(α) and the induced morphism (Ev0(α), g) : Ev1( f) ∐Ev0(f) Ev0(g) → Ev1(g).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
98
+ page_content=' In particular, if α is a (trivial) cofibration, so is Evi(α) for each i = 0, 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
99
+ page_content=' □ In a pointed model category M, we consider a homotopically commutative diagram: X f � � Y g � 0 �Z.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
100
+ page_content=' If the diagram is a homotopy Cartesian square, then X is said to be a homotopy kernel of g, and if it is a homotopy coCartesian sequence, then Z is a homotopy cokernel of f.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
101
+ page_content=' We can consider homotopy image objects and homotopy coimage objects as additive categories: Let f : X → Y be a morphism.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
102
+ page_content=' The homotopy image object of f is the homotopy kernel of Y → Coker f, and Im( f) denotes it.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
103
+ page_content=' Dually, the homotopy coimage object is the homotopy cokernel of Ker f → X, and Coim( f) denotes it.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
104
+ page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
105
+ page_content='2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
106
+ page_content=' The two monoidal structure of the arrow category of symmetric monoidal pointed model categories.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
107
+ page_content=' A symmetric monoidal category can be regarded as a symmetric multicategory (See Le- inster [Lei04, Example 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
108
+ page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
109
+ page_content='3 and Section 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
110
+ page_content='3]).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
111
+ page_content=' Let 1 denote the terminal multicategory.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
112
+ page_content=' A commutative monoid object R of M is a covariant functor from 1 to M of symmetric multi-categories [Lei04, Example 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
113
+ page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
114
+ page_content='1].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
115
+ page_content=' Let CAlg(M) denote the category of commutative monoid object of M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
116
+ page_content=' Directly explaining, the commutative monoid R is equipped with a unit morphism η : V → R and a multiplication µ : R ⊗ R → R satisfying commutativity, associativity, and unity.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
117
+ page_content=' On the arrow category Ar(M), those functors cok : Ar(M) → Ar(M) and ker : Ar(M) → Ar(M) are defined as follows: For a morphism f : X → Y in M, the arrow cok( f) is Y → Coker f and ker( f) Ker( f) → X.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
118
+ page_content=' Then the pair cok : Ar(M) ⇄ Ar(M) : ker is a Quillen adjunction.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
119
+ page_content=' The diagonal monoidal structure is compatible with the injective model structure, and the push-out monoidal structure is compatible with the projective model structure: Theorem 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
120
+ page_content='4 ([Hov14] Theorem 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
121
+ page_content='1 (4), Theorem 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
122
+ page_content='1 (5), and c.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
123
+ page_content='f.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
124
+ page_content=' Theorem 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
125
+ page_content='4).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
126
+ page_content=' Let M be a cofi- brantly generated symmetric monoidal model category.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
127
+ page_content=' Then the category Ar(M) has the following two symmetric monoidal model structures: (1) The injective model structure of Ar(M) is symmetric monoidal with respect to the diagonal monoidal model structure.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
128
+ page_content=' 4 (2) The projective model structure of Ar(M) is symmetric monoidal with respect to the push-out monoidal model structure.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
129
+ page_content=' (3) Further, if M is pointed, then the Quillen adjunction cok : Ar(M) ⇄ Ar(M) : ker is compatible with those monoidal model structures the push-out and the diagonal.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
130
+ page_content=' proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
131
+ page_content=' The assertions (1) and (2) are Hovey [Hov14, Theorem 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
132
+ page_content='1 (4)] and [Hov14, Theorem 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
133
+ page_content='1 (5)], respectively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
134
+ page_content=' The third is obtained by the homotopical analogues of the proof of Hovey [Hov14, Theorem 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
135
+ page_content='4]: Let V be a unit object of M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
136
+ page_content=' Then U0(V) = (0 → V) and L0(V) = idV : V → V are unit objects of the push-out monoidal structure and the diagonal monoidal structure, respectively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
137
+ page_content=' The functor cok : Ar(M) → Ar(M) sends U0(V) to (V → Coker(0 → V)) ≃ (idV : V → V) = L0(V).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
138
+ page_content=' Therefore, the functor cok is homotopically unital.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
139
+ page_content=' For two morphisms f : X0 → X1 and g : Y0 → Y1, we show that those objects cok( f)□cok(g) and cok( f ⊗ g) are isomorphic in the homotopy category of Ar(M).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
140
+ page_content=' Consider the following commutative diagram: X1 ⊗ Y1 X0 ⊗ Y1 � �0 Coker( f) ⊗ Y1 X1 ⊗ Y0 � � X0 ⊗ Y0 � � � � 0 � � Coker( f) ⊗ Y0 id⊗g � � X1 ⊗ Y0 X1 ⊗ Y0 � �0 0 X1 ⊗ Y1 (X1 ⊗ Y1) ∐X0⊗Y0 (X1 ⊗ Y0) � f□g � 0, where the bottom horizontal diagram of the out of squares is induced by the homotopy push-outs of the vertical arrows in the squares, and the right vertical diagram is induced by the homotopy-push outs of horizontal arrows in the squares.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
141
+ page_content=' Since the homotopy colimit of the whole squares are uniquely determined up to homotopy equivalence, those push-outs of the diagrams out of the squares are weakly equivalent: one has a zig-zag of weak equivalences Coker( f□g) ← Z → Coker( f) ⊗ Coker(g), where Z denotes the homotopy colimit of whole the squares.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
142
+ page_content=' □ Definition 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
143
+ page_content='5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
144
+ page_content=' Let M be a pointed symmetric monoidal model category.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
145
+ page_content=' A Smith ideal in M is a monoid object j : I → R in the symmetric monoidal model category Ar(M) with respect to the push-out product monoidal model structure.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
146
+ page_content=' A stable model category is a model category whose homotopy category is triangulated.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
147
+ page_content=' In the case that M is further stable, the cokernel functor is a left Quillen equivalence: Theorem 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
148
+ page_content='6 ([Hov14] Theorem 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
149
+ page_content='3).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
150
+ page_content=' Let M be a cofibrantly generated stable symmetric monoidal model category.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
151
+ page_content=' The cokernel functor cok : Ar(M) → Ar(M) is a left Quillen equivalence form the projective model structure to the injective model structure.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
152
+ page_content=' 5 If M is a cofibrantly generated symmetric monoidal stable model category, the cokernel functor is a Quillen equivalence from the model category of Smith ideals to the model category of monoid morphisms.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
153
+ page_content=' □ 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
154
+ page_content=' Almost mathematics of pointed symmetric monoidal model categories On the model category setting, we will consider almost mathematics theory.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
155
+ page_content=' Fix a pointed closed symmetric monoidal model category M with a zero object 0, a unital commutative monoid object V, and a Smith ideal j : I → V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
156
+ page_content=' Definition 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
157
+ page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
158
+ page_content=' A Smith ideal j : I → V is homotopically idempotent if it satisfies the following proper- ties: The homotopically coCartesian square I j � � V cok(j) � 0 �Coker( j) is also homotopy Cartesian.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
159
+ page_content=' The push-out product µ j : j□ j → j is a weak equivalence in the model category Ar(M).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
160
+ page_content=' Equiv- alently, the homotopy cokernel I ∐I⊗I 0 of the product µ : I ⊗ I → I is contractible.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
161
+ page_content=' The tensor product ˜I := I ⊗ I is homotopically flat.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
162
+ page_content=' That is, the functor ˜I ⊗ (−) : M → M preserves all finite homotopy limits.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
163
+ page_content=' Remark 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
164
+ page_content='2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
165
+ page_content=' Let V be a unital commutative ring and m an idempotent ideal of V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
166
+ page_content=' In almost mathematics theory, we usually consider the case ˜m = m ⊗ m is a flat V-module.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
167
+ page_content=' Therefore, in this paper, we include the homotopically flatness of ˜I in the definition of homotopically idempotentness.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
168
+ page_content=' Definition 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
169
+ page_content='3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
170
+ page_content=' Let j : I → V be a homotopically idempotent Smith ideal of V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
171
+ page_content=' For any M ∈ M, We say that M is homotopically almost zero if the homotopy image of the composition µM : I⊗M → V⊗M → M is contractible.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
172
+ page_content=' Let V/I denote the homotopy cokernel of j : I → V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
173
+ page_content=' By the homotopically idempotentness of I, one has I ⊗ V/I ≃ I ⊗ (V ∐I 0) ≃ I ∐I⊗I 0 ≃ 0, implying that V/I is homotopically almost zero.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
174
+ page_content=' Furthermore, since I ⊗ I is homotopically flat and j : I → V is the homotopy kernel of cok( j) : V → Coker( j), the composition ε′ ˜I ◦ (µ ⊗ j) : ˜I ⊗ I → ˜I ⊗ V → ˜I is a weak equivalence, where ε′ ˜I is the inverse of the unit isomorphism ε˜I : ˜I → ˜I ⊗ V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
175
+ page_content=' Definition 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
176
+ page_content='4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
177
+ page_content=' A morphism f : M → N in M is a homotopically almost weak equivalence, if the homotopy kernel and cokernel are both homotopically almost zero.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
178
+ page_content=' Definition 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
179
+ page_content='5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
180
+ page_content=' An object M of M is homotopically almost local if, for any homotopically almost weak equivalence f : N1 → N2, the induced map f∗ : HomHoM(M, N1) → HomHoM(M, N2) is an isomor- phism.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
181
+ page_content=' Dually, M is homotopically almost colocal if the induced morphism f ∗ : HomHoM(M, N2) → HomHoM(M, N1) is an isomorphism.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
182
+ page_content=' 6 Proposition 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
183
+ page_content='6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
184
+ page_content=' Let M be a pointed symmetric monoidal model category with a monoidal unit V and a homotopically idempotent Smith ideal j : I → V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
185
+ page_content=' Then the following conditions are equivalent: (1) An object M is homotopically almost local.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
186
+ page_content=' (2) For any homotopically almost zero object N, the set HomM(M, N) has only one point in the homotopy category.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
187
+ page_content=' Dually, the following conditions are equivalent: (1)’ An object M is homotopically almost colocal.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
188
+ page_content=' (2)’ For any homotopically almost zero object N, the set HomM(N, M) has only one point in the homotopy category.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
189
+ page_content=' proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
190
+ page_content=' Let N be a homotopically almost zero object.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
191
+ page_content=' Then the trivial morphisms 0 → N and N → 0 are almost weak equivalences by definition.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
192
+ page_content=' Therefore, the implication (1) to (2) (resp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
193
+ page_content=' (1)’ to (2)’) is trivial.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
194
+ page_content=' We assume that the homotopy kernel and cokernel of f : X → Y are homotopically almost zero, and we have zig-zags of weak equivalences Y ≃ X∐X Y ≃ (Y ∐X 0)∐X ← X and X ≃ X×Y Y ≃ (X×Y 0)×Y → Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
195
+ page_content=' Therefore, under the condition (2) (resp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
196
+ page_content=' (2)’), the induced map by f f∗ : HomM(M, X) → HomM(M, Y) (resp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
197
+ page_content=' f ∗ : HomM(Y, M) → HomM(X, M)) is an isomorphism in the homotopy category of M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
198
+ page_content=' □ Definition 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
199
+ page_content='7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
200
+ page_content=' An object M of M is homotopically firm if the product morphism µM : I ⊗ M → M is a weak equivalence.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
201
+ page_content=' Dually, M is homotopically closed if the induced morphism µ∗ M : M → MapM(I, M) is a weak equivalence.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
202
+ page_content=' Lemma 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
203
+ page_content='8.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
204
+ page_content=' Let j : I → V be a homotopically idempotent Smith ideal.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
205
+ page_content=' Then an object M is homotopi- cally almost zero if and only if ˜I ⊗ M is contractible.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
206
+ page_content=' proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
207
+ page_content=' Since j : I → V is homotopically idempotent, the morphism µM : I ⊗ M → M induces an weak equivalence id˜I ⊗ µM : ˜I ⊗ I ⊗ M → ˜I ⊗ M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
208
+ page_content=' If µM is null-homotopic, the ˜I ⊗ M is contractible.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
209
+ page_content=' Conversely, if the bar construction ˜I ⊗ M is contractible, the morphism µM ◦ (µ ⊗ idM) : I ⊗ I ⊗ M → I ⊗ M → M is null-homotopic.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
210
+ page_content=' Since the homotopy cokernel of µ ⊗ idM is contractible, the induced morphism Coker(µM◦(µ⊗idM)) → Coker(µM) is a weak equivalence.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
211
+ page_content=' Therefore the canonical morphism cok(µM) : M → Coker(µM) is also a weak equivalence, entailing µM : I ⊗ M → M is null-homotopic.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
212
+ page_content=' □ We recall the definition of lax Quillen adjunctions: Definition 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
213
+ page_content='9 ([SS03a] Definition 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
214
+ page_content='6).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
215
+ page_content=' Let L : M ⇄ N : R be a Quillen adjunction of monoidal model categories.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
216
+ page_content=' Then we say that (L, R) is lax Quillen monoidal if it satisfies the following properties: (1) The right Quillen functor R is lax monoidal.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
217
+ page_content=' (2) For any cofibrant objects M and N in M, the induced morphism ∇M, N : L(M ⊗ N) → L(M) ⊗ L(N) by the canonical morphism ∆M, N : M ⊗ N → R(L(M)) ⊗ R(L(N)) → R(L(M) ⊗ L(N)) is a weak equivalence.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
218
+ page_content=' 7 (3) For any cofibrant replacement c : C(1M) → 1M of the monoidal unit 1M of M, the composition L(C(1M)) → L(1M) → 1M is a weak equivalence.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
219
+ page_content=' Proposition 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
220
+ page_content='10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
221
+ page_content=' Assume that ˜I is flat.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
222
+ page_content=' Let M be an object of M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
223
+ page_content=' Then the following conditions are equivalent: (1) The object M is almost colocal.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
224
+ page_content=' (2) The object M is homotopically firm.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
225
+ page_content=' (3) The canonical morphism ˜I ⊗ M → M is a weak equivalence.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
226
+ page_content=' proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
227
+ page_content=' Since ˜I ⊗ I → ˜I is a weak equivalence, I ⊗ ˜I ⊗ M → ˜I ⊗ M is also a weak equivalence.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
228
+ page_content=' Therefore the conditions (2) and (3) are equivalent.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
229
+ page_content=' For any homotopically almost zero object N, the identity morphism on N factors through V/I ⊗ N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
230
+ page_content=' A homotopical section s : V/I ⊗ N → N corresponds to the morphism s∗ : N → MapM(V/I, N).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
231
+ page_content=' If M is firm, since V/I ⊗ M is contractible, any morphism M → MapM(V/I, N) is null-homotopic.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
232
+ page_content=' Hence, any morphism from M to N is also null-homotopic.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
233
+ page_content=' This means that M is almost colocal.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
234
+ page_content=' Finally, we assume that M is almost colocal.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
235
+ page_content=' Then µM : I ⊗ M → M has a homotopical section.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
236
+ page_content=' Equivalently, any morphism from coker(µM) is null-homotopic.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
237
+ page_content=' Therefore coker(µM) is contractible and µM : I ⊗ M → M is a weak equivalence.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
238
+ page_content=' □ Dually, we have the following: Proposition 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
239
+ page_content='11.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
240
+ page_content=' Let M be an object of M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
241
+ page_content=' Then the following conditions are equivalent: (1) The object M is almost local.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
242
+ page_content=' (2) The object M is homotopically closed.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
243
+ page_content=' (3) The canonical morphism M → MapM(˜I, M) is a weak equivalence.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
244
+ page_content=' □ Corollary 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
245
+ page_content='12.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
246
+ page_content=' Let j : I → V be a homotopically idempotent Smith ideal.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
247
+ page_content=' Then the functor ˜I ⊗ (−) : M → M is a left lax monoidal Quillen functor.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
248
+ page_content=' proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
249
+ page_content=' Indeed, the product µ˜I : (˜I ⊗ M) ⊗ (˜I ⊗ N) → ˜I ⊗ M ⊗ N is a weak equivalence, letting the functor ˜I ⊗ (−) : M → M be homotopically monoidal.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
250
+ page_content=' □ Theorem 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
251
+ page_content='13.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
252
+ page_content=' Let M be a pointed symmetric monoidal model category and V a unit object.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
253
+ page_content=' Assume that V has an idempotent Smith ideal j : I → V and ˜I is flat.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
254
+ page_content=' Then the Bousfield localization La : M → Ma by almost weak equivalence admits homotopically fully faithful left Quillen adjoint and right Quillen adjoint.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
255
+ page_content=' Furthermore, let Mfirm and Mclosed denote the full subcategory spanned by all firm objects and closed objects, respectively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
256
+ page_content=' Then the left Quillen functor ˜I ⊗ (−) : M → Mfirm and the right Quillen functor MapM(˜I, −) : M → Mclosed are a left adjoint and a right adjoint of La: Mclosed La �Ma MapM(˜I, −) � ˜I⊗(−)�Mfirm La � 8 proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
257
+ page_content=' We only prove that the right Quillen adjunction ˜I ⊗ (−) : Ma ⇄: Mfirm is a Quillen equivalence.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
258
+ page_content=' By Lemma 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
259
+ page_content='8 and the homotopically idempotentness of the functor ˜I ⊗ (−), the natural transformation ˜I ⊗ (−) → IdM is a homotopically almost equivalence.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
260
+ page_content=' Therefore the unit IdMa → La ◦ ˜I ⊗ (−) is a weak equivalence.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
261
+ page_content=' By the equivalence of conditions (2) and (3) of Proposition 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
262
+ page_content='10, the counit ˜I ⊗ (−) ◦ La → IdMfirm is a weak equivalence.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
263
+ page_content=' □ Corollary 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
264
+ page_content='14.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
265
+ page_content=' Let V be a commutative unital monoid object of M and j : I → V a homotopically idempotent Smith ideal.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
266
+ page_content=' Then ˜I ⊗ M is contractible if and only if so is MapM(˜I, M).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
267
+ page_content=' □ 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
268
+ page_content=' Bousfield bilocalization of stable symmetric monoidal model categories generated by the monoidal unit Following the previous section, we consider a stable symmetric monoidal model category M with a unit object V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
269
+ page_content=' Given a Bousfield bilocalization functor F : M → M, we show that F determines an idempotent Smith ideal j : I → V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
270
+ page_content=' Let F∗ : M → M denote the homotopically fully faithful left adjoint of F and F!' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
271
+ page_content=' the homotopically fully faithful right adjoint: M F �M F!' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
272
+ page_content=' � F∗ �M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
273
+ page_content=' F � Further, we assume that, in this section, the left adjoint F∗ : M → M preserves all finite homotopy limits and F∗ : M ⇄ M : F is a lax Quillen monoidal adjunction and the counit c : F∗ ◦ F → IdM induces a Smith ideal cV : F∗(F(V)) → V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
274
+ page_content=' Let j : I → V denote the homotopy image of cV.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
275
+ page_content=' Since M is stable, by Theorem 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
276
+ page_content='6, the unit morphism cV → j is a projective weak equivalence in the arrow category of Ar(M).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
277
+ page_content=' We will prove that I is homotopically idempotent.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
278
+ page_content=' By the assumption of F∗, one has a weak equivalence: ∇ : F∗(F(V) ⊗ F(V)) → F∗(F(V)) ⊗ F∗(F(V)).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
279
+ page_content=' The product µ : F∗(F(V)) ⊗ F∗(F(V)) → F∗(F(V)) is homotopic to the push-out of ∇ along the isomor- phism F∗(F(µ)) : F∗(F(V) ⊗ F(V)) → F∗(F(V)), letting µ : I ⊗ I → I be a weak equivalence.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
280
+ page_content=' Following MacLane [Mac88], we recall the definition of generators of categories: Let C be a category and G a class of objects of C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
281
+ page_content=' The set G is a generator of C if for any parallel of morphisms h, h′ : X → Y in C, h � h′ implies that there exists S ∈ G and a morphism f : S → X such that h ◦ f � h′ ◦ f.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
282
+ page_content=' Definition 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
283
+ page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
284
+ page_content=' Let M be a model category with a class G of objects of M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
285
+ page_content=' We say that G generates M if the equivalence class of G generates the homotopy category of M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
286
+ page_content=' Lemma 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
287
+ page_content='2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
288
+ page_content=' Let M be a pointed closed symmetric monoidal model category with a class G of objects of M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
289
+ page_content=' Assume that G generates M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
290
+ page_content=' Then an object M is contractible if and only if so is the internal hom-object MapM(S, M) for any S ∈ G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
291
+ page_content=' proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
292
+ page_content=' The if-direction is clear.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
293
+ page_content=' Let M be an object of M such that the internal-hom object MapM(S, M) is contractible for any S ∈ G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
294
+ page_content=' Since G generates M, for any object N and morphism f : N → M, 9 the condition that f is not null-homotopic implies that there exists an object S ∈ G and a morphism i : S → N and f ◦ i : S → M is not null-homotopic, contradicting the generating condition.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
295
+ page_content=' □ Lemma 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
296
+ page_content='3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
297
+ page_content=' Let M be a pointed closed symmetric monoidal model category generated by the monoidal unit V and F : M → M a symmetric monoidal Bousfield bilocalization, and F∗ : M → M denote the homotopically fully faithful left adjoint and F!' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
298
+ page_content=' : M → M the homotopically fully faithful right adjoint.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
299
+ page_content=' Then, for any object M, F(M) is contractible if and only if so is F∗(F(V)) ⊗ M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
300
+ page_content=' proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
301
+ page_content=' Since the induced morphism F(cV) is to homotopic the identity on F(V), the if-direction is clear.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
302
+ page_content=' Assume that F(M) is contractible.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
303
+ page_content=' Since F is monoidal, the counit cV : F∗(F(V)) → V induces a weak equivalence F(M) → F(F∗(F(V)) ⊗ M).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
304
+ page_content=' Therefore, by Lemma 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
305
+ page_content='2, the internal-hom object MapM(V, F!' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
306
+ page_content=' (F(F∗(F(V) ⊗ M)))) is contractible.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
307
+ page_content=' Note that, for any object N, one has a zig-zag of iso- morphisms: HomHo(M)(V, MapM(F∗(F(V)), N)) ≃ HomHo(M)(F∗(F(V)), N) ≃ HomHo(M)(V, F!' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
308
+ page_content='F(N)) ≃ HomHo(M)(V, MapM(V, F!' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
309
+ page_content=' (F(N))))).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
310
+ page_content=' Applying the case N = F∗(F(V)) ⊗ M to the isomorphisms, we obtain that the internal-hom object MapM(F∗(F(V)), F∗(F(V) ⊗ M))) is contractible, implying that, by the canonical isomorphism HomHo(M)(F∗(F(V)) ⊗ M, F∗(F(V)) ⊗ M) ≃ HomHo(M)(M, MapM(F∗(F(V)), F∗(F(V)) ⊗ M)))), F∗(F(V)) ⊗ M is also contractible.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
311
+ page_content=' □ Proposition 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
312
+ page_content='4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
313
+ page_content=' Let M be a stable closed symmetric monoidal model category generated by the monoidal unit V and F : M → M a symmetric monoidal Bousfield bilocalization, and F∗ : M → M denote the homotopically fully faithful left adjoint.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
314
+ page_content=' Then, for any object M of M, the counit cM : F∗(F(M)) → M of M induces a zig-zag of weak equivalences: F∗(F(M)) ≃ F∗(F(V) ⊗ F(M)) ≃ F∗(F(V)) ⊗ F∗(F(M)) → F∗(F(V)) ⊗ M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
315
+ page_content=' proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
316
+ page_content=' Let C denote the homotopy cokernel of the counit cM : F∗(F(M)) → M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
317
+ page_content=' Then F(C) is con- tractible.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
318
+ page_content=' By Lemma 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
319
+ page_content='3, the homotopy cokernel C ⊗ F(F∗(V)) of the induced morphism idF∗(F(V)) ⊗cM : F∗(F(V)) ⊗ F∗(F(M)) → F∗(F(V)) ⊗ M is also contractible, implying that idF∗(F(V)) ⊗ cM : F∗(F(V)) ⊗ F∗(F(M)) → F∗(F(V)) ⊗ M is a weak equivalence.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
320
+ page_content=' □ In the case that M is stable and F∗ : M → M preserves all finite homotopy limits, the composition F∗ ◦ F also preserves all finite homotopy limits.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
321
+ page_content=' Immediately, by Proposition 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
322
+ page_content='4, the counit F∗(F(V)) is a flat object of M if the monoidal unit V generates M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
323
+ page_content=' Thus, we obtain the following theorem: Theorem 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
324
+ page_content='5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
325
+ page_content=' Let M be a stable closed symmetric monoidal model category with a monoidal unit object V and F : M → M a symmetric monoidal Bousfield bilocalization, and F∗ : M → M denote the homotopically fully faithful left adjoint of F and c : F∗ ◦ F → Id the counit.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
326
+ page_content=' Assume that the left adjoint F∗ : M → M preserves all finite homotopy limits and the monoidal unit V generates M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
327
+ page_content=' Then the counit morphism cV : F∗(F(V)) → V of the Quillen adjunction (F∗, F) determines a homotopically idempotent Smith ideal j : I → V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
328
+ page_content=' □ 10 References [Fal88] Faltings, Gerd: p-adic Hodge theory.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
329
+ page_content=' In: J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
330
+ page_content=' Amer.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
331
+ page_content=' Math.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
332
+ page_content=' Soc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
333
+ page_content=' 1 (1988), Nr.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
334
+ page_content=' 1, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
335
+ page_content=' 255–299.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
336
+ page_content=' – ISSN 0894–0347 [GR03] Gabber, Ofer ;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
337
+ page_content=' Ramero, Lorenzo: Lecture Notes in Mathematics.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
338
+ page_content=' Bd.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
339
+ page_content=' 1800: Almost ring theory.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
340
+ page_content=' Springer-Verlag, Berlin, 2003.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
341
+ page_content=' – vi+307 S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
342
+ page_content=' – ISBN 3–540–40594–1 [Hir03] Hirschhorn, Philip S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
343
+ page_content=': Math.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
344
+ page_content=' Surv.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
345
+ page_content=' Monogr.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
346
+ page_content='. Bd.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
347
+ page_content=' 99: Model categories and their localizations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
348
+ page_content=' Providence, RI: American Mathematical Society (AMS), 2003.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
349
+ page_content=' – ISBN 0–8218–3279–4 [Hov99] Hovey, Mark: Mathematical Surveys and Monographs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
350
+ page_content=' Bd.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
351
+ page_content=' 63: Model categories.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
352
+ page_content=' American Mathematical Society, Providence, RI, 1999.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
353
+ page_content=' – xii+209 S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
354
+ page_content=' – ISBN 0–8218–1359–5 [Hov14] Hovey, Mark: Smith ideals of structured ring spectra.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
355
+ page_content=' Available at:https://arxiv.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
356
+ page_content='org/abs/1401.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
357
+ page_content='2850, 2014 [Lei04] Leinster, Tom: London Mathematical Society Lecture Note Series.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
358
+ page_content=' Bd.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
359
+ page_content=' 298: Higher operads, higher categories.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
360
+ page_content=' Cambridge University Press, Cambridge, 2004.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
361
+ page_content=' – xiv+433 S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
362
+ page_content=' http://dx.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
363
+ page_content='doi.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
364
+ page_content='org/10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
365
+ page_content='1017/CBO9780511525896.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
366
+ page_content=' http://dx.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
367
+ page_content='doi.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
368
+ page_content='org/10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
369
+ page_content='1017/CBO9780511525896.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
370
+ page_content=' – ISBN 0–521–53215–9 [Lur09] Lurie, Jacob: Annals of Mathematics Studies.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
371
+ page_content=' Bd.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
372
+ page_content=' 170: Higher topos theory.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
373
+ page_content=' Princeton, NJ : Princeton University Press, 2009.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
374
+ page_content=' – xviii+925 S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
375
+ page_content=' – ISBN 978–0–691–14049–0;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
376
+ page_content=' 0–691–14049–9 [Lur17] Lurie, Jacob: Higher Algebra.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
377
+ page_content=' available at:https://www.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
378
+ page_content='math.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
379
+ page_content='ias.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
380
+ page_content='edu/˜lurie/papers/HA.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
381
+ page_content='pdf, 2017 [Mac88] MacLane, Saunders: Grad.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
382
+ page_content=' Texts Math.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
383
+ page_content='. Bd.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
384
+ page_content=' 5: Categories for the working mathematician.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
385
+ page_content=' 4th corrected printing.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
386
+ page_content=' New York etc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
387
+ page_content=' : Springer-Verlag, 1988.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
388
+ page_content=' – ISBN 3–540–90035–7 [Qui96] Quillen, Daniel: Module theory over nonunital rings.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
389
+ page_content=' Available at: https://ncatlab.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
390
+ page_content='org/nlab/files/QuillenModulesOverRngs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
391
+ page_content='pdf, 1996 [SS03a] Schwede, Stefan ;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
392
+ page_content=' Shipley, Brooke: Equivalences of monoidal model categories.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
393
+ page_content=' In: Algebr.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
394
+ page_content=' Geom.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
395
+ page_content=' Topol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
396
+ page_content=' 3 (2003), S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
397
+ page_content=' 287–334.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
398
+ page_content=' http://dx.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
399
+ page_content='doi.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
400
+ page_content='org/10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
401
+ page_content='2140/agt.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
402
+ page_content='2003.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
403
+ page_content='3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
404
+ page_content='287.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
405
+ page_content=' – DOI 10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
406
+ page_content='2140/agt.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
407
+ page_content='2003.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
408
+ page_content='3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
409
+ page_content='287.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
410
+ page_content=' – ISSN 1472–2747 [SS03b] Schwede, Stefan ;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
411
+ page_content=' Shipley, Brooke: Stable model categories are categories of modules.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
412
+ page_content=' In: Topology 42 (2003), Nr.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
413
+ page_content=' 1, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
414
+ page_content=' 103–153.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
415
+ page_content=' http://dx.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
416
+ page_content='doi.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
417
+ page_content='org/10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
418
+ page_content='1016/S0040-9383(02)00006-X.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
419
+ page_content=' – DOI 10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
420
+ page_content='1016/S0040–9383(02)00006– X.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
421
+ page_content=' – ISSN 0040–9383 National institute of technology, Ube college, 2-14-1, Tokiwadai, Ube, Yamaguchi, JAPAN 755-8555.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
422
+ page_content=' Email address: ykato@ube-k.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
423
+ page_content='ac.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
424
+ page_content='jp 11' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/c9E3T4oBgHgl3EQfeQoX/content/2301.04541v1.pdf'}
ctFAT4oBgHgl3EQf6B4X/content/tmp_files/2301.08736v1.pdf.txt ADDED
@@ -0,0 +1,1134 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ First search for ultralight dark matter with a space-based gravitational-wave antenna:
2
+ LISA Pathfinder
3
+ Andrew L. Miller
4
+ 1, 2, 3, ∗ and Luis Mendes4, †
5
+ 1Universit´e catholique de Louvain, B-1348 Louvain-la-Neuve, Belgium
6
+ 2Nikhef – National Institute for Subatomic Physics,
7
+ Science Park 105, 1098 XG Amsterdam, The Netherlands
8
+ 3Institute for Gravitational and Subatomic Physics (GRASP),
9
+ Utrecht University, Princetonplein 1, 3584 CC Utrecht, The Netherlands
10
+ 4RHEA Group for ESA, Camino bajo del Castillo s/n,
11
+ Urb. Villafranca del Castillo, Villanueva de la Ca˜nada, 28692 Madrid, Spain
12
+ We present here results from the first-ever search for dark photon dark matter that could have
13
+ coupled to baryons in LISA Pathfinder, the technology demonstrator for a space-based gravitational-
14
+ wave antenna. After analyzing approximately three months of data taken by LISA Pathfinder in
15
+ the frequency range [2 × 10−5, 5] Hz, corresponding to dark photon masses of [8 × 10−20, 2 × 10−14]
16
+ eV/c2, we find no evidence of a dark-matter signal, and set upper limits on the strength of the
17
+ dark photon/baryon coupling. To perform this search, we leveraged methods that search for quasi-
18
+ monochromatic gravitational-wave signals in ground-based interferometers, and are robust against
19
+ non-Gaussianities and gaps in the data. Our work therefore represents a proof-of-concept test of
20
+ search methods in LISA to find persistent, quasi-monochromatic signals, and shows our ability to
21
+ handle non-Guassian artifacts and gaps while maintaining good sensitivity compared to the optimal
22
+ matched filter. The results also indicate that these methods can be powerful tools in LISA to not
23
+ only find dark matter, but also look for other persistent signals from e.g. intermediate-mass black
24
+ hole inspirals and galactic white dwarf binaries.
25
+ I.
26
+ INTRODUCTION
27
+ LISA Pathfinder [1–3] was a demonstrator of some of
28
+ the technologies to be used in LISA, the space-based
29
+ gravitational-wave antenna to be launched in the sec-
30
+ ond half of the next decade [4, 5].
31
+ Its main goal, the
32
+ demonstration that the noise in the separation of two
33
+ test masses ≈ 40cm apart could be kept at a suitably
34
+ low level to allow the detection of gravitational waves
35
+ by LISA, was successfully achieved by LISA Pathfinder.
36
+ In fact, LISA Pathfinder was a remarkable success and
37
+ produced a noise power spectral density that surpassed
38
+ the LPF mission requirement by more than an order of
39
+ magnitude for some frequency regions and by a factor of
40
+ a few compared to the LISA requirement [6, 7].
41
+ Though designed for the purpose described above, the
42
+ data from LISA Pathfinder have been used in different
43
+ ways to probe other areas of physics, such as quan-
44
+ tifying possible noise correlations in future stochastic
45
+ gravitational-wave background searches [8], measuring
46
+ the value of Newton’s gravitational constant [9], testing
47
+ the strong equivalence principle when spacecrafts orbit
48
+ Lagrange points [10], and bounding collapse models [11].
49
+ Such studies show that high-precision measurements of
50
+ acceleration or displacement can be employed to tackle
51
+ interesting physics problems for which the experiment
52
+ was not primarily designed, and motivate the need for
53
+ further analyses of LISA Pathfinder data [12] to see what
54
55
56
+ other kinds of questions that this data, and the future
57
+ LISA mission, can answer.
58
+ LISA Pathfinder data can be used to probe the exis-
59
+ tence of ultralight dark matter directly via its interac-
60
+ tions with the test masses. Essentially, the instruments
61
+ exists in a field or “wind” of dark matter, and this dark
62
+ matter would couple to standard model particles in the
63
+ test masses, causing sinusoidal oscillations of their posi-
64
+ tions over time at a frequency fixed by the dark matter
65
+ mass. Scalar, dilaton dark matter would cause oscilla-
66
+ tions in the electron mass or other fundamental constants
67
+ [13–15], resulting in a change of the size of an object [16];
68
+ axions [17] would alter the phase velocity of light [18, 19],
69
+ affecting the roundtrip time of laser light in LISA; dark
70
+ photons could couple to baryons or baryon-lepton num-
71
+ ber in the test masses, leading to a sinusoidal force ex-
72
+ erted on them [20]. While the physics of each model is
73
+ different, the observable is the same: time-varying posi-
74
+ tions or accelerations of test masses relative to one an-
75
+ other.
76
+ The mass range to which space-based gravitational-
77
+ wave detectors are sensitive is a function of the frequency
78
+ range: O(10−5 − 1) Hz corresponds to O(10−19 − 10−14)
79
+ eV/c2.
80
+ At such low masses – compared to those to
81
+ which ground-based gravitational-wave detectors such as
82
+ LIGO [21], Virgo [22], and KAGRA [23] could probe
83
+ – the expected signal is monochromatic, since the fre-
84
+ quency shift canonically introduced by the motion of the
85
+ earth through the dark matter “wind” is very small com-
86
+ pared to the frequency resolution of a search. Therefore,
87
+ we cannot differentiate between a monochromatic and a
88
+ “quasi”-monochromatic ultralight dark-matter signal at
89
+ most frequencies to which LISA Pathfinder and LISA are
90
+ arXiv:2301.08736v1 [gr-qc] 20 Jan 2023
91
+
92
+ 2
93
+ sensitive1.
94
+ There is a growing interest in using gravitational-wave
95
+ detectors to search for ultralight dark matter. GEO600
96
+ data [24] was recently analyzed using a Logarithmic fre-
97
+ quency axis Power Spectral Density (LPSD) method
98
+ [25, 26], yielding strong constraints on scalar, dilaton
99
+ dark matter coupling to the beam splitter [27]. Further-
100
+ more, constraints on vector dark matter, i.e. dark pho-
101
+ tons, were placed using data from the first [28] and third
102
+ [29] observing runs of advanced LIGO/Virgo/KAGRA
103
+ that surpassed upper limits from the E¨ot-Wash [30]
104
+ and MICROSCOPE [31] experiments by a few orders
105
+ of magnitude at frequencies between ∼ 100 − 1000 Hz
106
+ (4×10−13 −4×10−12 eV/c2). Finally, methods to search
107
+ for axions and dilatons in different interferometer chan-
108
+ nels [18, 32], for vector bosons with KAGRA [33], and
109
+ tensor bosons [34] in LIGO/Virgo/KAGRA and pulsar
110
+ timing arrays [35] have been developed for such kinds of
111
+ searches.
112
+ What has not yet been done in this field of direct dark-
113
+ matter searches with gravitational-wave detectors is to
114
+ apply these methods to space-based instruments. While
115
+ projected sensitivities have been estimated for a variety
116
+ of dark-matter models [20, 36, 37], the development of al-
117
+ gorithms tuned towards monochromatic signals in LISA,
118
+ DECIGO [38], and TianQin [39] has not yet followed. In
119
+ this work, we take a first step in this direction by per-
120
+ forming a search of LISA Pathfinder data, a precursor to
121
+ the kind of data that we expect in LISA, for ultralight
122
+ dark matter, which requires that we develop methods
123
+ to handle specific problems that LISA Pathfinder faced
124
+ and LISA will face, such as non-Gaussianities, gaps, and
125
+ sparse sampling at low frequencies [40–42] Specifically,
126
+ we adapt methods developed in the context of quasi-
127
+ monochromatic, persistent signals emitted by isolated
128
+ neutron stars [43], planetary- and asteroid-mass primor-
129
+ dial black hole binaries [44–46], depleting boson clouds
130
+ around black holes [47, 48], and dark matter that cou-
131
+ ples to ground-based gravitational-wave interferometers
132
+ [20, 49], to look for dark matter in space with LISA
133
+ Pathfinder.
134
+ The methods presented here are generically good at
135
+ finding quasi-monochromatic signals in any dataset, re-
136
+ gardless of the underlying physics [43, 50].
137
+ They are
138
+ also (1) robust against noise disturbances such as pow-
139
+ erful lines, (2) efficiently deal with gaps in data collec-
140
+ tion, and (3) are computationally cheap compared to
141
+ matched filtering, the optimal method to find weak sig-
142
+ nals buried in noise.
143
+ In space-based detectors, gravi-
144
+ tational waves from a variety of astrophysical sources,
145
+ such as galactic white dwarf binaries or black hole inspi-
146
+ rals [51, 52], will also be quasi-monochromatic and last
147
+ for durations longer than the observing time [49, 53],
148
+ 1 This depends on the duration of data analyzed, as will be ex-
149
+ plained in section II, but is generally true for the expected life-
150
+ time of LISA.
151
+ or at least for greater lengths of time than in ground-
152
+ based detectors, of O(hours-days). Currently, proposals
153
+ for parameter estimation and matched-filtering searches
154
+ for gravitational waves with LISA struggle with each of
155
+ the three aforementioned points [54–56]; therefore, the
156
+ work presented here has much farther reaching implica-
157
+ tions than “just” a search for dark matter; it represents
158
+ a comprehensive analysis scheme that can be applied to
159
+ any quasi-monochromatic signal embedded in imperfect,
160
+ non-Gaussian, gapped LISA data.
161
+ This paper is organized as follows:
162
+ in section II,
163
+ we describe the dark-matter signal expected at LISA
164
+ Pathfinder when it flew; in section III, we explain which
165
+ data segments from the ∼ 1.5 year run we analyze. Sec-
166
+ tion IV focuses on the methods that we use to search
167
+ for ultralight dark matter, one that breaks the data into
168
+ smaller, Gaussian chunks, and another that match filters
169
+ the data with a signal model coherently. We present our
170
+ results in section V, which include rejecting strong out-
171
+ liers in the data and upper limits on the strength of the
172
+ coupling of dark matter to baryons.
173
+ Finally, we draw
174
+ some conclusions in section VI and discuss opportunities
175
+ for future work.
176
+ II.
177
+ DARK MATTER SIGNAL
178
+ Dark matter could be composed of spin-1 particles,
179
+ which we denote as dark photons. The relic abundance
180
+ of dark matter can be explained entirely by dark photons,
181
+ which could arise from the misalignment mechanism [57–
182
+ 59], parametric resonance or the tachyonic instability of a
183
+ scalar field [60–63], or from cosmic string network decays
184
+ [64]. Dark photons could couple directly to baryon or
185
+ baryon-lepton number in the two LISA Pathfinder test
186
+ masses, and exert a “dark” force on the them, causing
187
+ quasi-sinusoidal oscillations [20, 49].
188
+ Similarly to the ordinary photon, the vector potential
189
+ for a single dark photon particle can be written as:
190
+ ⃗A(t, ⃗x) =
191
+ �ℏ√2ρDM
192
+ mc2
193
+ 1
194
+ √ϵ0
195
+
196
+ sin
197
+
198
+ ωt − ⃗k · ⃗x + φ
199
+
200
+ ,
201
+ (1)
202
+ where ω = (mc2)/ℏ is the angular Compton frequency,
203
+ ⃗k = (m⃗vobs)/ℏ is the wave vector, m is the mass of the
204
+ vector field, ϵ0 is the permittivity of free space and φ is
205
+ a random phase.
206
+ The Lagrangian L that characterizes the dark photon
207
+ coupling to a number current density Jµ of baryons or
208
+ baryons minus leptons is:
209
+ L = − 1
210
+ 4µ0
211
+ F µνFµν +
212
+ 1
213
+ 2µ0
214
+ �mc
215
+
216
+ �2
217
+ AµAµ − ϵeJµAµ, (2)
218
+ where Fµν indicates the dark electromagnetic field ten-
219
+ sor, µ0 is the magnetic permeability in vacuum, Aµ is the
220
+ four-vector potential of the dark photon, e is the electric
221
+
222
+ 3
223
+ charge, and ϵ is the strength of the particle/dark pho-
224
+ ton coupling normalized by the electromagnetic coupling
225
+ constant.
226
+ Dark photons would cause small motions in each of
227
+ the test masses, and lead to an observable effect be-
228
+ cause the test masses are separated from each other and
229
+ hence experience slightly different dark photon dark mat-
230
+ ter phases. Such a phase difference leads to a change of
231
+ the arm length over time. What is needed, therefore, is
232
+ very precise measurements of the positions of the two test
233
+ masses, something which LISA Pathfinder provides.
234
+ Each test mass experiences an almost identical accel-
235
+ eration:
236
+ ⃗a(t, ⃗x) ≃ ϵe q
237
+ M ω ⃗A cos(ωt − ⃗k · ⃗x + φ),
238
+ (3)
239
+ where q/M is the charge-to-mass ratio of the test masses.
240
+ This effect is in fact a residual one: if the test masses were
241
+ made of different materials, then the signal induced from
242
+ dark photons coupling to baryon-lepton number would be
243
+ enhanced [33]. A simple relation between dark photon
244
+ parameters and the effective strain hD experienced by
245
+ LISA Pathfinder can be written as [20, 29, 37]:
246
+
247
+ ⟨h2
248
+ D⟩ = CLPF
249
+ q
250
+ M
251
+ v0
252
+ 2πc2
253
+
254
+ 2ρDM
255
+ ϵ0
256
+
257
+ fA
258
+ ,
259
+ (4)
260
+ where fA = ω/(2π) is the frequency of the dark-matter
261
+ particle, and CLPF = 1/3 is a geometrical factor obtained
262
+ by averaging the acceleration over all possible dark pho-
263
+ ton propagation and polarization directions for a single
264
+ arm, using the appendix in [20] to aid with this calcula-
265
+ tion. We note CLPF is a factor of
266
+
267
+ 2 smaller than the
268
+ geometrical factor in LIGO CLIGO =
269
+
270
+ 2/3, which indi-
271
+ cates that an L-shaped interferometer would observe a
272
+ signal
273
+
274
+ 2 ∼ 1.4 times stronger than a single arm would.
275
+ As we can see from equation 3, the test masses will
276
+ experience a sinusoidal oscillation of their positions over
277
+ time, at a frequency set by the mass of the dark-matter
278
+ particle. However, if we observe for longer than the dark-
279
+ matter signal coherence time Tcoh, then we will resolve
280
+ stochastic frequency fluctuations ∆f about the dark-
281
+ matter mass, induced by the motion of the spacecraft
282
+ relative to the dark-matter field. In other words, we wish
283
+ to contain these fluctuations to one frequency bin δf, so
284
+ we require:
285
+ ∆f = 1
286
+ 2
287
+ �v0
288
+ c
289
+ �2
290
+ fA < δf =
291
+ 1
292
+ TFFT
293
+ (5)
294
+ which leads to:
295
+ TFFT < 107 s
296
+ �0.1 Hz
297
+ fA
298
+
299
+ ∼ Tcoh
300
+ (6)
301
+ where TFFT is the fast Fourier transform length, and v0 ≃
302
+ 220 km/s is the velocity at which dark matter orbits the
303
+ number
304
+ date
305
+ duration (days) TFFT (s) Temp (C)
306
+ 1
307
+ 2016-03-21
308
+ 5.08
309
+ 16384
310
+ 22
311
+ 2
312
+ 2016-04-04
313
+ 9.33
314
+ 16384
315
+ 22
316
+ 3
317
+ 2016-07-24
318
+ 5.29
319
+ 4096
320
+ 22
321
+ 4
322
+ 2016-11-16
323
+ 9.82
324
+ 8192
325
+ 22
326
+ 5
327
+ 2016-12-26
328
+ 17.86
329
+ 8192
330
+ 22
331
+ 6
332
+ 2017-02-14
333
+ 13.33
334
+ 8192
335
+ 11
336
+ 7
337
+ 2017-05-29
338
+ 7.04
339
+ 131072
340
+ 22
341
+ 8
342
+ 2017-06-08
343
+ 8.4
344
+ 262144
345
+ 22
346
+ TABLE I. Data segments considered in this search obtained
347
+ from [12]. Segment # 6 is treated as a separate dataset here:
348
+ we perform coincidences of the other seven datasets with seg-
349
+ ment # 6 in order to reduce the number of outliers.
350
+ center of our galaxy, i.e. the virial velocity [65]. Here,
351
+ we observe for a duration much less than Tcoh, which
352
+ implies that the signal will be fully contained within one
353
+ frequency bin, i.e.
354
+ it is purely monochromatic for our
355
+ purposes.
356
+ III.
357
+ DATA
358
+ We analyze eight periods of differential acceleration
359
+ time-series LISA Pathfinder data, whose details are given
360
+ in table I, each of which lasts from ∼ 5 days to ∼ 2.5
361
+ weeks [12]. One segment, #6, that began on 14 February
362
+ 2017, was obtained at a much lower temperature than the
363
+ others, which resulted in a different noise level [7]. We
364
+ therefore treat it as a separate dataset from the others,
365
+ as will be detailed in Sec. IV, and present all constraints
366
+ based on this dataset.
367
+ In table I, we also report the TFFT such that the data
368
+ within that segment remain Gaussian at the 5% signifi-
369
+ cance level, based on the Kolmogorov-Smirnov test [66].
370
+ We see here that some segments remain Gaussian for
371
+ longer compared to others, but in general, the duration
372
+ of Gaussian data is short compared to the segment dura-
373
+ tion. Therefore, for the semi-coherent search, we consider
374
+ TFFT = 8192 s for all segments, as explained in the next
375
+ section.
376
+ IV.
377
+ METHOD
378
+ .
379
+ A.
380
+ Semi-coherent method: projection
381
+ Due to the non-Gaussian nature of the noise when ob-
382
+ serving for longer than ∼ 8192 s, we break the dataset
383
+ into smaller chunks, of duration TFFT = 8192 s, analyze
384
+ these chunks coherently, and then combine their power
385
+ incoherently, that is, without the phase information. To
386
+ perform this analysis, we leverage existing methods used
387
+
388
+ 4
389
+ in continuous-wave data analysis for the search of deplet-
390
+ ing boson clouds around black holes [47], and for dark
391
+ matter that could couple to ground-based gravitational-
392
+ wave detectors [49].
393
+ 1.
394
+ Creation of time/frequency peakmaps
395
+ This semi-coherent method [49] operates on data in
396
+ the time/frequency plane, so we take fast Fourier Trans-
397
+ forms with TFFT = 8192 s, divide the square modulus of
398
+ the fast Fourier transform by a running-median estima-
399
+ tion of the power spectral density to obtain “equalized
400
+ power” (whose mean value in noise should be 1), set a
401
+ threshold θthr = 2.5 to remove spurious noise peaks, and
402
+ select local maxima in the power spectra. Each of these
403
+ choices is motivated in [67], and is meant to be robust
404
+ against the presence of non-stationarities in the noise.
405
+ This threshold in fact comes from empirical studies in
406
+ [67] showing that while the ideal threshold in Gaussian
407
+ noise is 2, a threshold of 2.5 allows for a higher value
408
+ of the detection statistic, and a reduction in the num-
409
+ ber of outliers in the presence of disturbances in real
410
+ LIGO/Virgo data. The “local maxima” criteria is ap-
411
+ plied because spectral disturbances in real data may not
412
+ be well localized to one frequency bin (i.e.
413
+ they have
414
+ finite coherence times that do not match the TFFT cho-
415
+ sen), or they may turn on and off over the course of the
416
+ run (or even within one TFFT. Therefore, selecting local
417
+ maxima helps to minimize contamination of nearby bins
418
+ from noise lines. The thresholded time/frequency maps
419
+ are called “peakmaps”, in which only powerful “peaks”,
420
+ i.e. points in the time/frequency plane, remain after the
421
+ thresholding and local maxima selection.
422
+ This procedure results in the left-hand panel of figure
423
+ 1, for segment #6. We employ the semi-coherent method
424
+ at frequencies above ∼ 1 mHz, since below this value, it
425
+ becomes difficult to estimate the power spectral density
426
+ using a simple running median, due to the lack of data
427
+ points at such low frequencies.
428
+ 2.
429
+ Projection and selection of candidates
430
+ After we have created the time/frequency peakmaps,
431
+ we then attempt to recover some signal power that has
432
+ been lost due to dividing the data into chunks. To do
433
+ this, we integrate the peakmap over time, i.e. we project
434
+ it onto the frequency axis, summing only whether or not
435
+ a peak appears at a given time and frequency, not the
436
+ equalized power that is given in the color bar of the left-
437
+ hand panel of figure 1. This is a choice that is, again,
438
+ motivated by the presence of noise artifacts:
439
+ in pure
440
+ Gaussian noise, summing signal power provides the best
441
+ chances of detection. However, there are powerful noise
442
+ lines, e.g. the one at 1 Hz, that we do not want to blind
443
+ us to possible signals. In this way, we reduce the signal-
444
+ to-noise ratio of the instrumental lines, while preserv-
445
+ ing sensitivity towards weak, monochromatic signals. We
446
+ sum each peakmap from datasets 1-5; 7-8 together in this
447
+ method, allowing us to recover some signal-to-noise ratio
448
+ that is lost by breaking the data into chunks of length
449
+ TFFT.
450
+ At this point, we obtain a “histogram” of the number
451
+ of peaks at a given frequency, in the right-hand panel of
452
+ figure 1. It is on this projected peakmap that we select
453
+ possible significant candidates, i.e.
454
+ particular frequen-
455
+ cies, whose number counts are high relative to other fre-
456
+ quencies. Since the frequency range spans three orders of
457
+ magnitude, we select candidates uniformly in the log of
458
+ frequency. We decide on a certain number of candidates
459
+ Ncand to select such that we would expect a certain num-
460
+ ber of coincidences Ncoin between the combined dataset
461
+ (segments #1-5; 7-8) and segment #6 if the data were
462
+ purely Gaussian in the frequency band of width B:
463
+ Ncand ≈
464
+
465
+ NcoinTFFTB.
466
+ (7)
467
+ Here, we set Ncoin = 1, B = 5 Hz, and TFFT = 8192 s, so
468
+ we select Ncand ≈ 200 candidates uniformly in logarith-
469
+ mic frequency. We select the strongest candidate in each
470
+ sub-band.
471
+ Once we have these candidates, we compute our detec-
472
+ tion statistic, the critical ratio (CR):
473
+ CR = n − µ
474
+ σ
475
+ ,
476
+ (8)
477
+ where n is the number of peaks at a given frequency, and
478
+ µ and σ are the average number and standard deviation
479
+ of peaks across the sub-band, respectively. The CR is a
480
+ random variable with mean 0 and standard devitation of
481
+ 1; therefore, we set a threshold CRthr = 5, corresponding
482
+ to 5 standard deviations from the mean, that indicates
483
+ that a particular candidate is “significant” and needs to
484
+ be studied further.
485
+ B.
486
+ Fully-coherent method: matched-filter
487
+ For the frequencies considered in this analysis, and for
488
+ the durations analyzed (see table I), equation 6 indicates
489
+ that the signal will be purely monochromatic; hence, we
490
+ also perform a fully coherent search of each segment, by
491
+ simply taking a fast Fourier Transform and computing
492
+ the so-called matched filter signal-to-noise ratio (SNR)
493
+ ρ:
494
+ ρ2 = 4 Re
495
+ �� ∞
496
+ 0
497
+ df
498
+ ˜h(f) ˜d(f)
499
+ Sn(f)
500
+
501
+ (9)
502
+ = 4 Re
503
+ � ˜d(f)2
504
+ Sn(f)
505
+
506
+ (10)
507
+ where the tilde denotes the Fourier Transform of the cor-
508
+ responding quantity, ˜d(f) is the Fourier transform of the
509
+
510
+ 5
511
+ FIG. 1. Left: example time/frequency peakmap used in the semi-coherent search. Right: projection of the peakmap onto the
512
+ frequency axis, corresponding to an integration over time.
513
+ time-series ∆g acceleration data d(t), ˜h(f) is the Fourier
514
+ Transform of the waveform for the dark-photon signal
515
+ h(t), and Sn is the power spectral density of the noise. To
516
+ pass from the first to the second line in the above equa-
517
+ tion, we note that our desired signal is purely monochro-
518
+ matic. Therefore, the best filter, at each frequency, is
519
+ simply a monochromatic signal at that frequency, and the
520
+ number of templates used is simply equal to the number
521
+ of frequencies analyzed, Nf ∼ 3.4 × 106. We impose a
522
+ threshold ρthr = 8 to indicate “significant” events, which
523
+ corresponds to a false alarm probability, in pure Gaussian
524
+ noise accounting for the trials factor, of 1 per 109.
525
+ 1.
526
+ PSD estimation at low frequencies
527
+ The sparseness of LISA Pathfinder data at low fre-
528
+ quencies (defined here as less than 1 mHz) is problem-
529
+ atic for a running-median estimation of the PSD. Hence,
530
+ we employ a method developed in [68] in order to ob-
531
+ tain a robust low-frequency estimation of the PSD. The
532
+ concept is to average Black-Harris windowed, 50% in-
533
+ terlaced power spectra, obtained with a fixed TFFT at
534
+ a given frequency, and then subsequently decrease TFFT
535
+ at higher frequencies, resulting in more spectra to aver-
536
+ age. The frequencies fj at which the PSD estimation are
537
+ performed are given by a recursive formula:
538
+ fj =
539
+ 2
540
+ (3/5)j−1 f0
541
+ (11)
542
+ f0 =
543
+ M
544
+ Nmax∆T
545
+ (12)
546
+ where M is the spacing between frequency bins needed to
547
+ avoid spectral leakage from the averaging window among
548
+ neighboring frequencies, Nmax is the maximum number
549
+ of samples to fast Fourier transform (for the starting
550
+ TFFT = T0 = 2×105 s), and ∆T = 1/10 s is the sampling
551
+ time. Here, Nmax =
552
+ T0
553
+ ∆T = 2 × 106 samples, and M is
554
+ set to 4 bins at f0, and 8 bins for all others, obtained by
555
+ ensuring a lack of correlation between neighboring bins
556
+ [69]. The factor 3/5 is obtained by avoiding correlations
557
+ between two neighboring frequency bins:
558
+ M − α
559
+ M + α = 3
560
+ 5,
561
+ (13)
562
+ where α = 2 ensures that no correlations in the PSD exist
563
+ between frequencies spaced by with a spacing δf =
564
+
565
+ TFFT .
566
+ TFFT scales with the same relation as:
567
+ TFFT,j =
568
+ �3
569
+ 5
570
+ �j−1
571
+ Nmax∆T
572
+ (14)
573
+ By windowing, Fourier transforming and averaging the
574
+ data in chunks of length TFFT,j, we obtain the val-
575
+ ues of the PSD at frequencies between 20µHz and ∼
576
+ 1mHz, shown in figure 2 as black dots. For the rest of
577
+ the parameter space, a running median estimation over
578
+ 20 bins is employed to estimate the PSD, as in many
579
+ LIGO/Virgo/KAGRA searches.
580
+ C.
581
+ Coincidences
582
+ We have indicated in table I eight segments that have
583
+ been analyzed in this work. However, we only have data
584
+ from one detector. Typically, in gravitational-wave data
585
+ analysis, we look for similar signals in a collection of de-
586
+ tectors to rule out the possibility of false alarms. In this
587
+ case, though, we can look for coincidences between two
588
+ datasets if their noise distributions are sufficiently differ-
589
+ ent, such that they “function” as independent probes of
590
+ dark matter. Furthermore, the dark-matter signal should
591
+ always be present in the data; therefore, if a candidate
592
+ is seen in one segment but not in another, this would
593
+ indicate that it is due to something artificial, not astro-
594
+ physical.
595
+
596
+ 100
597
+ 80
598
+ equalized power spectrum
599
+ frequency (Hz)
600
+ 60
601
+ 40
602
+ 20
603
+ 10-3
604
+ 0
605
+ 2
606
+ 4
607
+ 6
608
+ 8
609
+ 10
610
+ 12
611
+ days since 14 Feb. 2017250
612
+ number of peaks
613
+ 200
614
+ 150
615
+ 100
616
+ 50
617
+ 0
618
+ 10-3
619
+ 10-2
620
+ 10-1
621
+ 100
622
+ frequency (Hz)6
623
+ FIG. 2. Estimation of the amplitude spectral density at low
624
+ and high frequencies, using the method described in [68] and
625
+ a running median, respectively.
626
+ In the semi-coherent case, we sum the peakmaps from
627
+ segments #1−5; 7−8 and require that a candidate in one
628
+ detector appear within 2 frequency bins of a candidate
629
+ in another. This choice of 2 bins is in fact very generous:
630
+ the dark-matter signal should be exactly at the same fre-
631
+ quency in each segment.
632
+ We then impose a threshold
633
+ on the critical ratio, requiring that a candidate’s CR is
634
+ greater than CRthr = 5.
635
+ In the fully-coherent searches, we do coincidences be-
636
+ tween each segment and segment #6, and again require
637
+ that candidates be within 2 frequency bins of each other.
638
+ In this case, however, the size of the frequency bins of
639
+ each segment will be slightly different, since their dura-
640
+ tions are not equal. We therefore use the larger of the
641
+ two frequency bins to determine whether a coincidence
642
+ has occurred. Then, we impose that the SNR must be
643
+ greater than ρthr = 8. As a last stringent check, we will
644
+ also require that a candidate be present in each data seg-
645
+ ment for it to be considered as an “outlier” worthy of
646
+ further study.
647
+ V.
648
+ RESULTS
649
+ We present here the results of our search for dark mat-
650
+ ter interacting with the test masses in LISA Pathfinder.
651
+ In the semi-coherent search in the high-frequency
652
+ regime, the only coincident outliers above CRthr were
653
+ at ∼ 70 mHz, 1 Hz and 3 Hz.
654
+ These frequencies are
655
+ contaminated with very strong noise lines and can thus
656
+ be discarded. At 70 mHz, there is a known noise distur-
657
+ bacne due to the thrusters [70]; at 1 Hz and 3 Hz, these
658
+ are harmonics arising from electrical cross-couplings from
659
+ the pulse-per-second timing signal present on the space-
660
+ craft [71].
661
+ In the fully-coherent search, across all frequencies, we
662
+ only obtained three coincident outliers in at least two of
663
+ the segments analyzed that were not due to a particular
664
+ frequency (Hz) SNR
665
+ 0.474766
666
+ 8.57
667
+ 1.213422
668
+ 8.50
669
+ 2.584182
670
+ 8.26
671
+ TABLE II.
672
+ Remaining candidates from the fully coher-
673
+ ent, high-frequency search that appeared in at least two the
674
+ datasets analyzed. We note that these candidates did not ap-
675
+ pear in all segments analyzed, as we would expect for a true
676
+ dark photon signal; thus, we veto them.
677
+ FIG. 3. Distribution of the semi-coherent detection statistic
678
+ CR, with a Gaussian curve overlayed for data segment #6
679
+ starting on 14 Feb. 2017.
680
+ known noise disturbance. They are given in table II, and
681
+ are barely above the SNR threshold set. We note, how-
682
+ ever, that these outliers did not appear in each segment
683
+ that we separately analyzed, indicating that they are due
684
+ to noise disturbances.
685
+ For the critical ratio and the matched-filter SNR, we
686
+ provide the statistical distributions obtained from the
687
+ search in figures 3 and 4, respectively. We can see here
688
+ that these distributions are not exactly Gaussian, due to
689
+ the presence of non-stationarities in the data.
690
+ After vetoing all candidates, we then set upper lim-
691
+ its on the coupling of dark matter to baryons in the
692
+ test masses. We provide these limits in figure 5 in the
693
+ low- and high-frequency regime. Specifically, in the high-
694
+ frequency regime, we calculate these limits with both the
695
+ results of the projection method and the matched filter
696
+ for comparison. To obtain these limits, we employ the
697
+ Feldman-Cousins approach [72] to map values of the crit-
698
+ ical ratio and SNR to “inferred” ones to ensure complete
699
+ coverage at the chosen confidence level (95% in this case)
700
+ using table 10 of [72]. This procedure inherently assumes
701
+ that the critical ratio and SNR follow Gaussian distribu-
702
+ tions, but is robust against non-Gaussianities: it provides
703
+ conservative results with respect to simulations of dark-
704
+ photon signals injected in real data (see figure 12 in [49]).
705
+ From these “inferred” values of our detection statistics,
706
+ we compute the constraint on the coupling strength us-
707
+ ing equation 30 in [49], and equation 4 here. Equation 30
708
+
709
+ 7/T-
710
+ amplitude spectral density (Hz-
711
+ low-freguency estimation
712
+ 10-12
713
+ median estimation
714
+ 10-13
715
+ 10-14
716
+ 10-15
717
+ 10-16
718
+ 10-17
719
+ 10-4
720
+ 10-3
721
+ 10-2
722
+ 10-1
723
+ 100
724
+ frequency (Hz)104
725
+ 103
726
+ count
727
+ 102
728
+ 101
729
+ 100
730
+ -2
731
+ 0
732
+ 2
733
+ -8
734
+ -6
735
+ -4
736
+ 4
737
+ 6
738
+ 8
739
+ critical ratio (CR)7
740
+ FIG. 4.
741
+ Distribution of the matched-filter detection statis-
742
+ tic ρ across the whole frequency range, for data segment #6
743
+ starting on 14 Feb 2017.
744
+ in [49] arises from theoretically calculating the minimum
745
+ detectable amplitude of a monochromatic signal that our
746
+ search could see in Gaussian noise.
747
+ We note that the upper limits for the semi-coherent
748
+ method, which combine the peaks in each segment, are
749
+ shown for the “limiting” segment #6, since the duration
750
+ and noise spectral density of this segment impede the sen-
751
+ sitivity of the semi-coherent search relative to the other
752
+ segments. If we were, instead, to use the critical ratios
753
+ arising from integrating over each of the other segments,
754
+ the limits would be lower by ∼ 2, representing the ra-
755
+ tio between the total observation time of segments #1-5;
756
+ 7-8, and segment #6.
757
+ There is an additional effect that must be accounted
758
+ for when calculating these upper limits. Due to the fact
759
+ that Tobs << Tcoh for the parameter space considered
760
+ here, the stochastic nature of the signal amplitude af-
761
+ fects the strength of the dark-matter coupling that we
762
+ could observe. In other words, it could be possible that
763
+ we would observe the dark-matter field amplitude at a
764
+ near-zero value, something that does not happen in the
765
+ regime Tobs >> Tcoh, since we break the data into chunks
766
+ of length TFFT ∼ Tcoh, i.e. we observe for a full coher-
767
+ ence time. These effects have been calculated for both
768
+ scalar, axion dark matter [73] and vector dark matter
769
+ (dark photons) [74]. This stochastic effect amounts to an
770
+ O(1) loosening of the upper limits in amplitude, and in
771
+ our case, our limits on ϵ2 must be increased by a factor
772
+ of 9. This correction has been applied in figure 5.
773
+ VI.
774
+ CONCLUSIONS
775
+ We have performed the first search for dark photon
776
+ dark matter with LISA Pathfinder data, and have set
777
+ upper limits on the coupling of dark photons to baryons
778
+ in the test masses used in this mission.
779
+ While these
780
+ limits are not stringent compared to those from tor-
781
+ FIG. 5.
782
+ Upper limits in both the fully-coherent and semi-
783
+ coherent regimes, with the red indicating the regime in which
784
+ the low-frequency PSD estimation was used, for the period
785
+ starting 14 Feb. 2017. The mass range shown on the x-axis
786
+ corresponds to the frequency range [2 × 10−5, 5] Hz.
787
+ sion balance experiments [30, 31], the work here pro-
788
+ vides a proof-of-concept pipeline to analyze future LISA
789
+ data and perform dark-matter searches.
790
+ Interestingly,
791
+ we had to consider problems such as PSD estimation
792
+ at very low frequencies, performing coincidences using
793
+ one instrument, dealing with non-Gaussian artifacts aris-
794
+ ing from a gravitational-wave detector in space, and
795
+ breaking the search into semi-coherent and fully-coherent
796
+ regimes. Even though there were not many visible (by
797
+ eye) non-Gaussian disturbances, the Gaussianity of this
798
+ data broke down after O(hours − days) in each seg-
799
+ ment analyzed.
800
+ Our work therefore motivates the de-
801
+ velopment of more advanced PSD estimation algorithms
802
+ that can handle future data in LISA, the need for semi-
803
+ coherent, time/frequency-based analyses of the data, and
804
+ the power that search techniques designed for quasi-
805
+ monochromatic signals in ground-based gravitational-
806
+ wave detectors have when applied to a LISA-like mission.
807
+ Furthermore, in LISA, many astrophysical signals will
808
+ be almost monochromatic – light binary black hole in-
809
+ spirals, inspiraling galactic white dwarf binaries, etc.–;
810
+ therefore, our work shows how effective time/frequency
811
+ analyses, as opposed to pure, computationally expensive
812
+ matched filters, can be to look for different kinds of sig-
813
+ nals in future LISA data.
814
+ While there is of course a
815
+ sacrifice in sensitivity, evidenced by comparing the pur-
816
+ ple and magenta curves in the right-hand panel of figure
817
+ 5, the difference is, at most, an order of magnitude in ϵ2
818
+ at ∼ 1 mHz, meaning a factor of a few in strain, which is
819
+ consistent with the comparison of semi-coherent methods
820
+ to matched filtering given in [75].
821
+ For dark-matter searches, LISA will provide access to
822
+ masses that ground-based gravitational-wave detectors
823
+ simply cannot probe, due to seismic activity and Newto-
824
+
825
+ 105
826
+ 104
827
+ 103
828
+ 102
829
+ 101
830
+ 100
831
+ 0
832
+ -40
833
+ -20
834
+ 20
835
+ 40
836
+ signal-to-noise ratio (SNR)semi-coherent, high-frequency
837
+ 10-14
838
+ fully-coherent, high-frequency
839
+ fully-coherent, low-frequency
840
+ 10-18
841
+ 95%
842
+ 29
843
+ 3
844
+ 10-22
845
+ coupling strength
846
+ 10-26
847
+ 10-30
848
+ 10-34
849
+ 10-38
850
+ 10-19
851
+ 10-18
852
+ 10-17
853
+ 10-16
854
+ 10-15
855
+ 10-14
856
+ dark photon mass (eV/c2)8
857
+ nian noise on earth. The sensitivity achievable in LISA
858
+ is expected to surpass by several orders of magnitude
859
+ the existing constraints on ϵ2 from torsion-balance ex-
860
+ periments [20]. It is therefore worth investing in data-
861
+ analysis pipelines in LISA, such as the one employed
862
+ here, to perform searches to potentially directly detect
863
+ dark matter, and also other astrophysical sources that
864
+ would emit quasi-monochromatic signals.
865
+ Future work will include implementing a more robust
866
+ estimation of the background of our detection statistics
867
+ as described in [76], extending our analysis to the whole
868
+ LISA Pathfinder dataset, performing simulations of dark-
869
+ matter particles interacting with the detector, and apply-
870
+ ing this analysis to other types of dark-matter that could
871
+ be detected, e.g. the dark photon arising from kinetic
872
+ mixing that couples to the ordinary photon [77]. All of
873
+ these avenues of research will be relevant for when LISA
874
+ eventually flies.
875
+ ACKNOWLEDGMENTS
876
+ LIGO Laboratory which is a major facility fully funded
877
+ by the National Science Foundation.
878
+ Computational resources have been provided by the
879
+ supercomputing facilities of the Universit´e catholique
880
+ de Louvain (CISM/UCL) and the Consortium des
881
+ ´Equipements de Calcul Intensif en F´ed´eration Wallonie
882
+ Bruxelles (C´ECI) funded by the Fond de la Recherche
883
+ Scientifique de Belgique (F.R.S.-FNRS) under conven-
884
+ tion 2.5020.11 and by the Walloon Region.
885
+ We would like to thank Eleonora Castelli for useful
886
+ discussions on the noise disturbances in Lisa Pathfinder
887
+ data, and Yue Zhao for a Mathematica code to perform
888
+ the geometric factor calculation.
889
+ This work has made use of the LTPDA MATLAB tool-
890
+ box.
891
+ All plots were made with the Python tools Matplotlib
892
+ [78], Numpy [79], and Pandas [80, 81].
893
+ A.L.M. is a beneficiary of a FSR Incoming Post-
894
+ doctoral Fellowship. We acknowledge support from the
895
+ ESA Archival Research Visitor Programme, that allowed
896
+ us to carry out this work.
897
+ We would like to thank all of the essential workers who
898
+ put their health at risk during the COVID-19 pandemic,
899
+ without whom we would not have been able to complete
900
+ this work.
901
+ [1] P. McNamara, S. Vitale,
902
+ and K. Danzmann (LISA),
903
+ Class. Quant. Grav. 25, 114034 (2008).
904
+ [2] M. Armano et al., Class. Quant. Grav. 26, 094001 (2009).
905
+ [3] F. Antonucci et al., Class. Quant. Grav. 29, 124014
906
+ (2012).
907
+ [4] K. Danzmann and L. S. Team, Advances in Space Re-
908
+ search 32, 1233 (2003).
909
+ [5] P. Amaro-Seoane et al. (LISA), (2017), arXiv:1702.00786
910
+ [astro-ph.IM].
911
+ [6] M. Armano et al., Phys. Rev. Lett. 116, 231101 (2016).
912
+ [7] M. Armano et al., Phys. Rev. Lett. 120, 061101 (2018).
913
+ [8] G. Boileau, N. Christensen,
914
+ and R. Meyer, Phys. Rev.
915
+ D 106, 063025 (2022), arXiv:2204.03867 [gr-qc].
916
+ [9] M. Armano et al. (LISA Pathfinder), Phys. Rev. D 100,
917
+ 062003 (2019).
918
+ [10] G. Congedo and F. De Marchi, Phys. Rev. D 93, 102003
919
+ (2016), arXiv:1602.05949 [gr-qc].
920
+ [11] M. Carlesso, A. Bassi, P. Falferi, and A. Vinante, Phys.
921
+ Rev. D 94, 124036 (2016), arXiv:1606.04581 [quant-ph].
922
+ [12] “LISA Pathfinder Legacy Archive,” http://lpf.esac.
923
+ esa.int/lpfsa/.
924
+ [13] Y. Stadnik and V. Flambaum, Physical Review Letters
925
+ 114, 161301 (2015).
926
+ [14] Y. Stadnik and V. Flambaum, Physical Review Letters
927
+ 115, 201301 (2015).
928
+ [15] Y. Stadnik and V. Flambaum, Physical Review A 93,
929
+ 063630 (2016).
930
+ [16] H. Grote and Y. Stadnik, Physical Review Research 1,
931
+ 033187 (2019).
932
+ [17] J. Preskill, M. B. Wise, and F. Wilczek, Phys. Lett. B
933
+ 120, 127 (1983).
934
+ [18] K. Nagano, T. Fujita, Y. Michimura, and I. Obata, Phys-
935
+ ical Review Letters 123, 111301 (2019).
936
+ [19] K. Nagano et al., Physical Review D 104, 062008 (2021).
937
+ [20] A. Pierce, K. Riles, and Y. Zhao, Phys. Rev. Lett. 121,
938
+ 061102 (2018), arXiv:1801.10161 [hep-ph].
939
+ [21] J. Aasi, B. P. Abbott, R. Abbott, T. Abbott, M. R. Aber-
940
+ nathy, K. Ackley, C. Adams, T. Adams, P. Addesso, and
941
+ et al., CQGra 32, 074001 (2015), arXiv:1411.4547 [gr-qc].
942
+ [22] F. Acernese, M. Agathos, K. Agatsuma, D. Aisa, N. Alle-
943
+ mandou, A. Allocca, J. Amarni, P. Astone, G. Balestri,
944
+ G. Ballardin,
945
+ and et al., CQGra 32, 024001 (2015),
946
+ arXiv:1408.3978 [gr-qc].
947
+ [23] Y.
948
+ Aso,
949
+ Y.
950
+ Michimura,
951
+ K.
952
+ Somiya,
953
+ M.
954
+ Ando,
955
+ O. Miyakawa, T. Sekiguchi, D. Tatsumi,
956
+ and H. Ya-
957
+ mamoto (KAGRA), Phys. Rev. D 88, 043007 (2013),
958
+ arXiv:1306.6747 [gr-qc].
959
+ [24] K. L. Dooley et al., Class. Quant. Grav. 33, 075009
960
+ (2016), arXiv:1510.00317 [physics.ins-det].
961
+ [25] M. Tr¨obs and G. Heinzel, Measurement 39, 120 (2006).
962
+ [26] M. Tr¨obs and G. Heinzel, Measurement 42, 170 (2009).
963
+ [27] S. M. Vermeulen et al., Nature 600, 424 (2021).
964
+ [28] H.-K. Guo, K. Riles, F.-W. Yang,
965
+ and Y. Zhao, Com-
966
+ mun. Phys. 2, 155 (2019), arXiv:1905.04316 [hep-ph].
967
+ [29] R. Abbott et al. (LIGO Scientific, Virgo, KAGRA), Phys.
968
+ Rev. D 105, 063030 (2022), arXiv:2105.13085 [astro-
969
+ ph.CO].
970
+ [30] S. Schlamminger, K. Y. Choi, T. A. Wagner, J. H. Gund-
971
+
972
+ 9
973
+ lach, and E. G. Adelberger, Phys. Rev. Lett. 100, 041101
974
+ (2008), arXiv:0712.0607 [gr-qc].
975
+ [31] J.
976
+ Berg´e,
977
+ P.
978
+ Brax,
979
+ G.
980
+ M´etris,
981
+ M.
982
+ Pernot-Borr`as,
983
+ P. Touboul,
984
+ and J.-P. Uzan, Phys. Rev. Lett. 120,
985
+ 141101 (2018), arXiv:1712.00483 [gr-qc].
986
+ [32] E. Hall and N. Aggarwal, (2022), arXiv:2210.17487 [hep-
987
+ ex].
988
+ [33] Y. Michimura, T. Fujita, S. Morisaki, H. Nakatsuka,
989
+ and I. Obata, Phys. Rev. D 102, 102001 (2020),
990
+ arXiv:2008.02482 [hep-ph].
991
+ [34] J. M. Armaleo, D. L. Nacir, and F. R. Urban, JCAP 04,
992
+ 053 (2021), arXiv:2012.13997 [astro-ph.CO].
993
+ [35] J. M. Armaleo, D. L´opez Nacir, and F. R. Urban, JCAP
994
+ 09, 031 (2020), arXiv:2005.03731 [astro-ph.CO].
995
+ [36] A. Arvanitaki, M. Baryakhtar, and X. Huang, Physical
996
+ Review D 91, 084011 (2015).
997
+ [37] S. Morisaki, T. Fujita, Y. Michimura, H. Nakatsuka,
998
+ and I. Obata, Phys. Rev. D 103, L051702 (2021),
999
+ arXiv:2011.03589 [hep-ph].
1000
+ [38] S. Kawamura et al., PTEP 2021, 05A105 (2021),
1001
+ arXiv:2006.13545 [gr-qc].
1002
+ [39] J. Luo et al. (TianQin), Class. Quant. Grav. 33, 035010
1003
+ (2016), arXiv:1512.02076 [astro-ph.IM].
1004
+ [40] L. Ferraioli, G. Congedo, M. Hueller, S. Vitale, M. He-
1005
+ witson, M. Nofrarias, and M. Armano, Phys. Rev. D 84,
1006
+ 122003 (2011), arXiv:1111.3320 [gr-qc].
1007
+ [41] M. C. Edwards, P. Maturana-Russel, R. Meyer, J. Gair,
1008
+ N. Korsakova,
1009
+ and N. Christensen, Phys. Rev. D 102,
1010
+ 084062 (2020), arXiv:2004.07515 [gr-qc].
1011
+ [42] Q. Baghi, N. Korsakova, J. Slutsky, E. Castelli, N. Kar-
1012
+ nesis, and J.-B. Bayle, Phys. Rev. D 105, 042002 (2022),
1013
+ arXiv:2112.07490 [gr-qc].
1014
+ [43] K. Riles, Modern Physics Letters A 32, 1730035 (2017).
1015
+ [44] A. L. Miller, S. Clesse, F. De Lillo, G. Bruno, A. Depasse,
1016
+ and A. Tanasijczuk, Phys. Dark Univ. 32, 100836 (2021),
1017
+ arXiv:2012.12983 [astro-ph.HE].
1018
+ [45] A. L. Miller, N. Aggarwal, S. Clesse,
1019
+ and F. De Lillo,
1020
+ Phys. Rev. D 105, 062008 (2022), arXiv:2110.06188 [gr-
1021
+ qc].
1022
+ [46] H.-K. Guo and A. Miller,
1023
+ (2022), arXiv:2205.10359
1024
+ [astro-ph.IM].
1025
+ [47] S. D’Antonio, C. Palomba, P. Astone, S. Frasca, G. In-
1026
+ tini, I. La Rosa, P. Leaci, S. Mastrogiovanni, A. Miller,
1027
+ F. Muciaccia, et al., Physical Review D 98, 103017
1028
+ (2018).
1029
+ [48] M. Isi, L. Sun, R. Brito, and A. Melatos, Physical Review
1030
+ D 99, 084042 (2019).
1031
+ [49] A. L. Miller et al., Phys. Rev. D 103, 103002 (2021),
1032
+ arXiv:2010.01925 [astro-ph.IM].
1033
+ [50] M. Sieniawska et al., Universe 5, 217 (2019).
1034
+ [51] J. S. B. Wyithe and A. Loeb, The Astrophysical Journal
1035
+ 590, 691 (2003).
1036
+ [52] S. Babak, J. Gair, A. Sesana, E. Barausse, C. F. Sop-
1037
+ uerta, C. P. L. Berry, E. Berti, P. Amaro-Seoane, A. Pe-
1038
+ titeau,
1039
+ and A. Klein, Phys. Rev. D 95, 103012 (2017),
1040
+ arXiv:1703.09722 [gr-qc].
1041
+ [53] A. L. Miller, F. Badaracco,
1042
+ and C. Palomba (LIGO
1043
+ Scientific, Virgo, KAGRA), Phys. Rev. D 105, 103035
1044
+ (2022), arXiv:2204.03814 [astro-ph.IM].
1045
+ [54] Q. Baghi, I. Thorpe, J. Slutsky, J. Baker, T. Dal Can-
1046
+ ton, N. Korsakova, and N. Karnesis, Phys. Rev. D 100,
1047
+ 022003 (2019), arXiv:1907.04747 [gr-qc].
1048
+ [55] K. Dey, N. Karnesis, A. Toubiana, E. Barausse, N. Ko-
1049
+ rsakova, Q. Baghi,
1050
+ and S. Basak, Phys. Rev. D 104,
1051
+ 044035 (2021), arXiv:2104.12646 [gr-qc].
1052
+ [56] A. Blelly, J. Bobin,
1053
+ and H. Moutarde, Mon. Not. Roy.
1054
+ Astron. Soc. 509, 5902 (2021), arXiv:2104.05250 [gr-qc].
1055
+ [57] A. E. Nelson and J. Scholtz, Physical Review D 84,
1056
+ 103501 (2011).
1057
+ [58] P. Arias, D. Cadamuro, M. Goodsell, J. Jaeckel, J. Re-
1058
+ dondo, and A. Ringwald, Journal of Cosmology and As-
1059
+ troparticle Physics 2012, 013 (2012).
1060
+ [59] P. W. Graham, J. Mardon, and S. Rajendran, Physical
1061
+ Review D 93, 103520 (2016).
1062
+ [60] P. Agrawal, N. Kitajima, M. Reece, T. Sekiguchi,
1063
+ and
1064
+ F. Takahashi, Physics Letters B 801, 135136 (2020).
1065
+ [61] R. T. Co, A. Pierce, Z. Zhang, and Y. Zhao, Phys. Rev.
1066
+ D 99, 075002 (2019), arXiv:1810.07196 [hep-ph].
1067
+ [62] M. Bastero-Gil, J. Santiago, L. Ubaldi,
1068
+ and R. Vega-
1069
+ Morales, JCAP 04, 015 (2019), arXiv:1810.07208 [hep-
1070
+ ph].
1071
+ [63] J. A. Dror, K. Harigaya, and V. Narayan, Phys. Rev. D
1072
+ 99, 035036 (2019), arXiv:1810.07195 [hep-ph].
1073
+ [64] A. J. Long and L.-T. Wang, Physical Review D 99,
1074
+ 063529 (2019).
1075
+ [65] M. C. Smith, G. R. Ruchti, A. Helmi, R. F. Wyse, J. P.
1076
+ Fulbright, K. C. Freeman, J. F. Navarro, G. M. Seabroke,
1077
+ M. Steinmetz, M. Williams, et al., Monthly Notices of the
1078
+ Royal Astronomical Society 379, 755 (2007).
1079
+ [66] F. J. Massey Jr, Journal of the American statistical As-
1080
+ sociation 46, 68 (1951).
1081
+ [67] P. Astone, S. Frasca,
1082
+ and C. Palomba, Class. Quant.
1083
+ Grav. 22, S1197 (2005).
1084
+ [68] E. Castelli, LISA Pathfinder noise performance results:
1085
+ disturbances in the sub-mHz frequency band and projec-
1086
+ tion to LISA, Ph.D. thesis, Trento U. (2020).
1087
+ [69] S. Vitale et al., Phys. Rev. D 90, 042003 (2014),
1088
+ arXiv:1404.4792 [gr-qc].
1089
+ [70] M. Armano et al. (LISA Pathfinder), Phys. Rev. D 99,
1090
+ 122003 (2019).
1091
+ [71] M. Armano et al., Phys. Rev. D 106, 082001 (2022).
1092
+ [72] G. J. Feldman and R. D. Cousins, Phys. Rev. D 57, 3873
1093
+ (1998), arXiv:physics/9711021.
1094
+ [73] G. P. Centers et al., Nature Commun. 12, 7321 (2021),
1095
+ arXiv:1905.13650 [astro-ph.CO].
1096
+ [74] H.
1097
+ Nakatsuka,
1098
+ S.
1099
+ Morisaki,
1100
+ T.
1101
+ Fujita,
1102
+ J.
1103
+ Kume,
1104
+ Y. Michimura, K. Nagano,
1105
+ and I. Obata,
1106
+ (2022),
1107
+ arXiv:2205.02960 [astro-ph.CO].
1108
+ [75] P. Astone, A. Colla, S. D’Antonio, S. Frasca,
1109
+ and
1110
+ C. Palomba, Physical Review D 90, 042002 (2014).
1111
+ [76] R. Tenorio, L. M. Modafferi, D. Keitel, and A. M. Sintes,
1112
+ Phys. Rev. D 105, 044029 (2022), arXiv:2111.12032 [gr-
1113
+ qc].
1114
+ [77] S. Chaudhuri, P. W. Graham, K. Irwin, J. Mardon,
1115
+ S. Rajendran,
1116
+ and Y. Zhao, Phys. Rev. D 92, 075012
1117
+ (2015), arXiv:1411.7382 [hep-ph].
1118
+ [78] J. D. Hunter, Comput. Sci. Eng. 9, 90 (2007).
1119
+ [79] C.
1120
+ R.
1121
+ Harris
1122
+ et
1123
+ al.,
1124
+ Nature
1125
+ 585,
1126
+ 357
1127
+ (2020),
1128
+ arXiv:2006.10256 [cs.MS].
1129
+ [80] Wes McKinney, in Proceedings of the 9th Python in Sci-
1130
+ ence Conference, edited by St´efan van der Walt and Jar-
1131
+ rod Millman (2010) pp. 56 – 61.
1132
+ [81] T. pandas development team, “pandas-dev/pandas: Pan-
1133
+ das,” (2020).
1134
+
ctFAT4oBgHgl3EQf6B4X/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
eNAyT4oBgHgl3EQfwvnx/content/tmp_files/2301.00656v1.pdf.txt ADDED
@@ -0,0 +1,548 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ TRINET: STABILIZING SELF-SUPERVISED LEARNING FROM COMPLETE OR SLOW
2
+ COLLAPSE
3
+ Lixin Cao 1†
4
+ Jun Wang 1†
5
+ Ben Yang 1,2‡
6
+ Dan Su1
7
+ Dong Yu3
8
+ 1Tencent AI Lab, China
9
+ 2 Peking University
10
+ 3Tencent AI Lab, USA
11
+ ABSTRACT
12
+ Self-supervised learning (SSL) models confront challenges of
13
+ abrupt informational collapse or slow dimensional collapse.
14
+ We propose TriNet, which introduces a novel triple-branch
15
+ architecture for preventing collapse and stabilizing the pre-
16
+ training. Our experimental results show that the proposed
17
+ method notably stabilizes and accelerates pre-training and
18
+ achieves a relative word error rate reduction (WERR) of
19
+ 5.32% compared to the state-of-the-art (SOTA) Data2vec for
20
+ a downstream benchmark ASR task. We will release our code
21
+ at https://github.com/tencent-ailab/.
22
+ Index Terms— Self-supervised learning, collapse, pseudo
23
+ label, self-learning, bootstrapping
24
+ 1. INTRODUCTION
25
+ Self-supervised learning (SSL) models leverage unlabeled
26
+ data, which makes significant advances [1] and reaches per-
27
+ formances almost on par with supervised baselines on many
28
+ downstream tasks such as speech processing [2, 3, 4]. Among
29
+ these models, state-of-the-art contrastive learning methods
30
+ [3, 5, 1, 6] learn to reduce the distance between positive pairs
31
+ of a sample and its distorted version, while increasing the dis-
32
+ tance between negative pairs of different samples. They yield
33
+ good performance with large amounts of contrastive pairs[1],
34
+ which are difficult to mine and computationally intensive for
35
+ training.
36
+ These challenges motivate alternative methods.
37
+ Boot-
38
+ strapping approaches [7, 2, 8] emerge to avoid using negative
39
+ examples. Two networks are used to predict the same repre-
40
+ sentation from augmented pairs. One is the teacher network
41
+ with a stop-gradient (SG) operation (otherwise, a complete
42
+ informational collapse may happen where the learned rep-
43
+ resentations would rapidly collapse towards a single vector
44
+ regardless of the inputs), and the other is the student network
45
+ updating online. Among these approaches, SimSiam [8] sim-
46
+ ply copied the student network’s weights over to the teacher
47
+ network; BYOL [7] updated the teacher network by track-
48
+ ing the exponential moving average (EMA) of the student
49
+ network’s weights. Data2vec[2] also took EMA to update
50
+ † Equal Contribution.
51
+ ‡ Contribution made during internship in Tencent
52
+ the teacher network, but it used a masking prediction task
53
+ similar to Wav2vec2[3] by feeding the student network with
54
+ the masked data and the teacher network with the original
55
+ data. Its objective is to predict the averaged embedding of
56
+ several top layers of the teacher network, which is different
57
+ from using only the top layer in BYOL.
58
+ As reported in Data2vec [2], a collapse issue is more pro-
59
+ nounced for speech tasks than computer vision or natural lan-
60
+ guage processing tasks, due to the very correlated adjacent
61
+ targets of the speech modality. It may come from two dif-
62
+ ferent natures [9]: 1) the complete collapse; 2) a slow col-
63
+ lapse like the observation made in [10] that the architectural
64
+ tricks such as BYOL, Data2vec, and SiaSiam are not perfectly
65
+ maintaining the variance of the representations, i.e., very slow
66
+ collapse is still happening with these methods. In this pa-
67
+ per, we propose a novel network structure TriNet, an analogy
68
+ with a three-legged stabilizing stand “Trivet”, to address the
69
+ main challenge for the above joint embedding architectures
70
+ by preventing the complete or slow collapse. After introduc-
71
+ ing related work in Section 2, we summarize our contribu-
72
+ tions. Then we describe the method about its detailed network
73
+ architecture in Section 3.1, its pre-training process in 3.2 and
74
+ regularization objectives in 3.3. Experimental setups and re-
75
+ sults are presented in 4, where we demonstrate our proposed
76
+ method remarkably stabilizes the pre-training and speeds up
77
+ the convergence, and meanwhile achieves a WERR of 5.32%
78
+ compared to the state-of-the-art (SOTA) Data2vec model in a
79
+ benchmark ASR task.
80
+ 2. RELATED WORK
81
+ Aside from contrastive methods for preventing informational
82
+ collapse, other main trends are regularization methods for
83
+ maximizing the information content of the embedding to pre-
84
+ vent collapse.
85
+ Recently, various regularization approaches
86
+ are proposed to prevent the collapse in which the embed-
87
+ ding variables contain highly redundant information. Among
88
+ them, W-MSE[11], Barlow-Twinss[12], and VICReg[10] at-
89
+ tempt to produce embedding variables that are decorrelated
90
+ from each other, whereas CorInfoMax[13] does not constrain
91
+ the variables to be uncorrelated but instead avoids covariance
92
+ matrix degeneracy by using log-determinant as a regular-
93
+ izer loss function. However, recent investigations show that
94
+ arXiv:2301.00656v1 [eess.AS] 12 Dec 2022
95
+
96
+ these regularization terms worked effectively only if given
97
+ specific SSL structural settings [10] and strong data aug-
98
+ mentation [14]. Note that all these regularization methods
99
+ [10, 13, 11, 12] adopt an SSL-no-SG structure, where “no-
100
+ SG” means the branch networks are both learnable with no
101
+ stop-gradient. Instead, optimization of some regularization
102
+ terms together with SSL-SG structures ([7, 8]) was found
103
+ hard[10]. We also empirically observed that adding covari-
104
+ ance regularization terms was not as effective in an SSL-SG
105
+ structure. Data2vec[2] employs the SSL-SG structural tricks
106
+ akin to BYOL[7] and Simsiam [8] that rely on a mechanism
107
+ of normalizing the target to prevent collapse. This strategy
108
+ seems effective but difficult to interpret and may lead to
109
+ instabilities during the training[10, 2].
110
+ Given the above challenges, we are motivated to study
111
+ novel regularization methods that are effective and prac-
112
+ tical for SSL models that are susceptible to complete or
113
+ slow collapse.
114
+ Our idea is also related to a different re-
115
+ search area on pseudo-labeling. BEST-RQ [15] employs a
116
+ random-projection quantizer to generate discrete pseudo la-
117
+ bels. Hubert[4] uses an offline K-means clustering step to
118
+ provide discrete pseudo labels for the masked regions, and
119
+ takes an iterative re-clustering and re-training process. These
120
+ pseudo-labeling methods simplify the SSL targets to the level
121
+ of clusters but essentially require the downstream tasks to
122
+ be at the appropriate clustering level for the model to learn
123
+ well. Another related idea is a combination of SSL and self-
124
+ training [16, 17, 18, 19]. A fine-tuned SSL model [20, 21] or
125
+ a supervised teacher model [22] is used as the initial teacher
126
+ model for pseudo-labeling the unlabeled set. Then a student
127
+ model is trained on the combined labeled and pseudo-labeled
128
+ data. Different from these approaches, our proposed TriNet
129
+ has contributions mainly as follows:
130
+ • In contrast to most other pseudo-labeling approaches,
131
+ TriNet does not require techniques such as K-means clus-
132
+ tering, frame-level alignment, etc.
133
+ For example, unlike
134
+ Hubert [4], which builds a fixed set of discrete target units
135
+ by clustering, TriNet learns the SSL latent embedding space
136
+ and incorporates it to a higher level space for constructing
137
+ target vectors with no limitation on the number of target
138
+ units.
139
+ • Not requiring to distract from any negative samples like
140
+ Wav2vec2 does, nor requiring any statistical assumption
141
+ as the other advanced regularization approaches do (such
142
+ as decorrelation [10] or maximizing log determinant [13]
143
+ which may not always be tenable for the sequences and
144
+ tasks at hand), TriNet instead employs a third branch to
145
+ generate stable and stale target vectors from the sequences
146
+ themselves in the high-level space to construct regulariza-
147
+ tion loss, which acts effectively as barriers against embed-
148
+ ding space degeneracy.
149
+ • We show that our regularization method stabilizes and ac-
150
+ Fig. 1. Illustration of TriNet with its three-legged networks:
151
+ the left and right teacher networks perform in different modes
152
+ to produce representations based on the original input, which
153
+ are then predicted by the same middle network in student
154
+ mode based on a perturbed version of the input.
155
+ Bottom
156
+ is t-SNE visualization of latent embedding of Data2vec and
157
+ TriNet.
158
+ celerates 1 the pre-training and leads to significant perfor-
159
+ mance improvements, with no requirement for more data
160
+ augmentation or larger model capacities.
161
+ To the best of our knowledge, TriNet is the first work that of-
162
+ fers successful regularization and stabilization for speech pro-
163
+ cessing in an SSL-SG framework. Meanwhile, we would like
164
+ to point out that TriNet achieves the above advances provided
165
+ a frozen teacher model, although TriNet will notably surpass
166
+ the frozen teacher, as we will demonstrate in the paper.
167
+ 3. METHOD
168
+ 3.1. Network Architecture
169
+ As illustrated on top of Fig. 1, the proposed TriNet consists of
170
+ three supporting networks. The middle “leg” represents a stu-
171
+ dent network that simultaneously regresses and predicts tar-
172
+ gets from the left and right teacher networks. The left teacher
173
+ tracks the student parameters and generates the regression tar-
174
+ get, while the right teacher is a frozen fine-tuned model for
175
+ automatic speech recognition (ASR) to generate high-level
176
+ target vectors for stabilizing the whole training. Due to the
177
+ different nature of the targets, we project both the student and
178
+ the right teacher’s embedding to a pseudo-class space.
179
+ 1Comparing the pretraining time of SSL model with the frozen teacher to
180
+ that without, while not counting the training of the frozen teacher model.
181
+
182
+ original input x
183
+ Perturbation
184
+ x
185
+ x
186
+ Encoder
187
+ Encoder
188
+ Encoder
189
+ inEMAteachermode
190
+ instudentmode
191
+ infrozenteachetmode
192
+ trackingstu&entparameters
193
+ Projector
194
+ Projector
195
+ predicting averaged latent
196
+ predicting pseudo
197
+ embeddingof originalinput
198
+ class of original input
199
+ Zstruc.
200
+ z'
201
+ Yreg
202
+ Date2vecemb.
203
+ TriNet emb. z'
204
+ TriNet emb.z"!We mask spans of the input sequence x to generate the
205
+ perturbed sequence x′ and feed it to a standard Conformer en-
206
+ coder [23] of the student. The target zstruc. is constructed by
207
+ encoding the intact input x with the same network but param-
208
+ eterized as an EMA teacher, as shown as the left “leg” in Fig.
209
+ 1, and summarizing the teacher’s top-K layer outputs [24, 7].
210
+ This “leg” adopts the same SSL structure as in Data2vec[2]
211
+ and BYOL[7] for a straightforward comparison in this paper,
212
+ whereas alternative SSL structures should be equally applica-
213
+ ble. Meanwhile, TriNet stabilizes the training by introducing
214
+ the third “leg”, as shown as the right branch in Fig. 1, which
215
+ takes the fine-tuned teacher to encode the intact input x and
216
+ generates pseudo target yregul. of the original input data. The
217
+ design prevents the rest joint embedding architectures from
218
+ abrupt or very slow collapse, in which output vectors pro-
219
+ duced by the branches are identical and constant, or end up
220
+ spanning a low-dimension subspace.
221
+ 3.2. Pre-training
222
+ In the proposed TriNet, we pretrain the student encoder to
223
+ simultaneously learn contextualized representations of differ-
224
+ ent levels and structural natures. The EMA teacher relies on
225
+ the structural tricks of averaging (including both the moving
226
+ average of model weights and the averaging of top-K layer
227
+ outputs) to keep the prediction targets relatively stable while
228
+ allowing the student to evolve freely and hopefully learn mid-
229
+ level contextual representations. This freedom is a double-
230
+ edged sword, though: the downside is that once the student
231
+ starts to collapse, the EMA teacher will end up collapsing
232
+ albeit very slowly, which will be demonstrated in our experi-
233
+ ment Section 4.2.1.
234
+ To address either abrupt or slow collapse, the third branch
235
+ plays the important role of “anchor” by regularizing and
236
+ avoiding cases in which the student and the EMA teacher
237
+ degenerate together. TriNet employs the frozen teacher to
238
+ provide high-level targets for regularization in a pseudo-class
239
+ space, which is different from the mid-level embedding space
240
+ between the student and the EMA teacher that maintains the
241
+ SSL property. At the bottom of Fig. 1, we use t-SNE [25]
242
+ to visualize the latent embedding generated by Data2vec and
243
+ TriNet. Each point denotes a sample in a random batch and
244
+ its color denotes its class. It indicates that TriNet actually
245
+ arranges intra-class samples, of which the layout gets more
246
+ obvious from z′ of the mid-level embedding space to z′′ for
247
+ the higher-level space, while the inter-class samples scatter
248
+ all over the spaces.
249
+ 3.3. Regularization
250
+ Given the predicted latent embedding z′ in the mid-level em-
251
+ bedding space and the contextualized targets zstruc., we use a
252
+ squared L2 norm loss to regress these targets:
253
+ Lstruc. =
254
+ 1
255
+
256
+ D
257
+
258
+ B×T ×D
259
+ (z′
260
+ n − (zstruc.)n)2,
261
+ (1)
262
+ where n is the index of a total of B × T × D elements in a
263
+ batch, and B, T, D are batch, frame, and dimension sizes.
264
+ Given the prediction y′ in the high-level space and the
265
+ pseudo-class targets yregul., we examine and compare two
266
+ kinds of objectives. One is a squared L2 norm for regression:
267
+ Lregre. =
268
+ 1
269
+
270
+ D
271
+
272
+ B×T ×D
273
+ (y′
274
+ n − (yregul.)n)2,
275
+ (2)
276
+ The other is a cross-entropy loss for classification:
277
+ Lregul. =
278
+ 1
279
+
280
+ D
281
+ CrossEntropy(y′, Softmax(yregul.)),
282
+ (3)
283
+ Our ablation study shows that Lregul. is more effective
284
+ than Lregre.. We consider that is because, in the high-level
285
+ space, Lregul. is a more suitable measure of how well the pre-
286
+ dictions are made by a pseudo-phoneme classification rather
287
+ than a latent embedding regression, again echoing the differ-
288
+ ence of the various-level spaces and their complementary reg-
289
+ ularization effects. Consequently, we adopt L = Lstruc. +
290
+ Lregul. as training objective in our experiments.
291
+ 4. EXPERIMENTS
292
+ 4.1. Pre-training and Fine-tuning
293
+ We pre-train models on unlabeled data Librispeech [26] that
294
+ contains 960 hours of speech (LS-960h). We fine-tune pre-
295
+ trained models for ASR on the clean 100h (LS-100h) sub-
296
+ set of LS-960h. We evaluate the standard Librispeech dev-
297
+ clean/other and test-clean/other sets.
298
+ We implemented both the proposed model TriNet and the
299
+ reference model Data2vec Base based on Fairseq[23]. For fair
300
+ comparison, both apply the same pre-processing and feature
301
+ extraction: the input 16 kHz waveform is first transformed
302
+ into an 80-dim filter bank to have less memory footprint than
303
+ the raw waveform; it is then processed by a feature extrac-
304
+ tor containing two Convolution-2D subsampling layers with
305
+ 576 channels, strides (2,2), and kernel widths (3,3). This re-
306
+ sults in an output sequence of 1/4 of the original length. The
307
+ input is applied with layer norm before sending to the en-
308
+ coder. The dropout and masking strategy for Data2vec and
309
+ the proposed TriNet is identical to [2] and results in approx-
310
+ imately 49% of all time steps masked for a typical training
311
+ sequence. Other hyper-parameters, including annealing rates,
312
+ optimizers, learning rate schedulers, and fine-tuning regimes,
313
+ also follow [2] and otherwise would be described if different.
314
+ The encoder for both Data2vec and TriNet contains 12
315
+ Conformer blocks with 768 hidden dimension and 16 at-
316
+ tention heads. In our experiments, we used the fine-tuned
317
+
318
+ Fig. 2. Pre-training losses
319
+ Data2vec model on LS-100h as the frozen fine-tuned teacher
320
+ in TriNet to demonstrate that TriNet with no requirement
321
+ for additional data, larger model capacity, or varying model
322
+ structural tricks will surpass the frozen teacher.
323
+ While an
324
+ arbitrary teacher with a heterogeneous architecture may also
325
+ be applicable, we leave the investigation for future work. For
326
+ pre-training, TriNet uses the first 11 Conformer blocks for
327
+ encoding the mid-level latent embedding space as described
328
+ in Sec.3 (blank blocks in Fig. 1), and dedicates the last 1
329
+ Conformer block to the high-level space (blue blocks in Fig.
330
+ 1). The overall learnable model size is identical to Data2vec
331
+ Base. Each model was pre-trained for a maximum of 450
332
+ epochs over 2 × 8 GPU V100 cores.
333
+ 4.2. Results
334
+ 4.2.1. Training Stability and Convergence
335
+ In Fig. 2, the drop of the Data2vec loss from epoch 350 to 450
336
+ actually reflected a slow collapsing case — the downstream
337
+ fine-tuned model has the word error rate (WER, via greedy
338
+ search on the dev-other set) degenerating from 9.949% at
339
+ epoch 300 to 10.25% at epoch 350 and further to 10.432% at
340
+ epoch 400. We chose the best Data2vec checkpoint at epoch
341
+ 300 for the comparison in 4.2.2.
342
+ In contrast, we can observe the pre-training loss of TriNet
343
+ is much smoother and stabler than that of Data2vec (light blue
344
+ curve is without smoothing. Note the absolute loss values are
345
+ not directly comparable), indicating that the frozen teacher
346
+ in TriNet works effectively as an “anchor” by providing sta-
347
+ ble and stale regularization and preventing the EMA teacher
348
+ and the student from drifting together toward a collapsed sub-
349
+ space. Meanwhile, TriNet manages to converge within 2/3 of
350
+ the overall epochs of Data2vec.
351
+ 4.2.2. Downstream ASR Performance
352
+ Pre-trained models are fine-tuned on LS-100h labeled for
353
+ ASR by mapping the representations via a randomly initial-
354
+ ized linear projection on top of the network into 32 classes
355
+ Table 1. WER (%) on the Librispeech dev/test sets when
356
+ training on the LS-100h labeled.
357
+ Model
358
+ dev
359
+ test
360
+ clean
361
+ other
362
+ clean
363
+ other
364
+ Wav2vec 2.0[3]
365
+ 2.7
366
+ 7.9
367
+ 3.4
368
+ 8.0
369
+ Hubert[4]
370
+ 2.6
371
+ 7.8
372
+ 3.4
373
+ 8.1
374
+ Data2vec3
375
+ 2.61
376
+ 6.79
377
+ 3.09
378
+ 7.07
379
+ TriNet (ablated)
380
+ 2.49
381
+ 7.16
382
+ 2.95
383
+ 7.23
384
+ TriNet
385
+ 2.45
386
+ 6.79
387
+ 2.88
388
+ 6.48
389
+ representing the vocabulary. Models are optimized by mini-
390
+ mizing a CTC[27] loss.
391
+ Our approach achieves relative word error rate reductions
392
+ (WERRs) of 6.13%/0/6.80%/8.35% (5.32% in average)
393
+ over Data2vec on dev-clean/other and test-clean/other of the
394
+ Librispeech benchmark as shown in Table 1.
395
+ Moreover,
396
+ it achieves WERRs of 35.05%/27.92%/28.14%/25.23%
397
+ (29.09% in average) when training on a 1 hour Libri-light
398
+ (LS-1h) labeled data setup2, reflecting more effectiveness for
399
+ the extremely low-resource setting.
400
+ 4.2.3. Ablations
401
+ To exam the different natures of the two spaces, we make
402
+ an ablation study by removing the projectors and spare no
403
+ Conformer layer specific for the high-level target (blue blocks
404
+ in Fig. 1). It turns out the training becomes rather unstable,
405
+ as shown as the orange curve of the training loss in Fig. 2,
406
+ indicating the learning process is dragged zig-zag between the
407
+ two spaces of different natures and can not converge well.
408
+ Another ablation study is on comparing the regulariza-
409
+ tion terms of Lregul. and Lregre.. The second line from the
410
+ bottom of Table 1 indicates the result by replacing Lregul.
411
+ with Lregre..
412
+ Although the result marginally outperforms
413
+ Data2vec, it is much worse than TriNet before ablation. This
414
+ validates the effectiveness of Lregul. being a more suitable
415
+ measure for the high-level space than an MSE loss that is
416
+ suitable for mid-level embedding regression, reflecting the
417
+ complementary nature of the spaces constructed at different
418
+ levels via the triple “legs” in TriNet.
419
+ 5. CONCLUSION
420
+ The proposed TriNet addresses challenges of complete or
421
+ slow collapse for joint embedding SSL architectures by em-
422
+ ploying a frozen teacher and a novel architecture. It succeeds
423
+ in stabilizing and accelerating the pre-training and obtaining
424
+ significant WERR gains compared to the SOTA Data2vec
425
+ model in a benchmark ASR task.
426
+ 2Using hyper-parameters for Data2vec on LS-100h rather than tuned for
427
+ LS-1h or TriNet.
428
+ 3Data2vec Base model reproduced by our implementation based on
429
+ Fairseq
430
+
431
+ TriNet
432
+ 4.6
433
+ TriNet (ablated
434
+ 4.2
435
+ Data2vec
436
+ 3.8
437
+ 3.4
438
+ 3
439
+ 2.6
440
+ 0
441
+ 100
442
+ 200
443
+ 300
444
+ 4006. REFERENCES
445
+ [1] T. Chen, S. Kornblith, K. Swersky, M. Norouzi, and
446
+ G. Hinton, “Big self-supervised models are strong semi-
447
+ supervised learners,” in Neurips, 2020.
448
+ [2] A. Baevski, W. Hsu, Q. Xu, A. Babu, J. Gu, and M. Auli,
449
+ “data2vec:
450
+ A general framework for self-supervised
451
+ learning in speech, vision and language,”
452
+ in ICML,
453
+ 2022.
454
+ [3] A. Baevski, Y. Zhou, A. Mohamed, and M. Auli,
455
+ “wav2vec 2.0: A framework for self-supervised learn-
456
+ ing of speech representations,” in Neurips, 2020.
457
+ [4] W.N. Hsu, Y.H.H. Tsai, B. Bolte, R. Salakhutdinov, and
458
+ A. Mohamed, “Hubert: How much can a bad teacher
459
+ benefit asr pre-training,” in ICASSP, 2021.
460
+ [5] T. Chen, S. Kornblith, M. Norouzi, and G. E. Hinton,
461
+ “A simple framework for contrastive learning of visual
462
+ representations.,” in ICML, 2020.
463
+ [6] D. Jiang, W. Li, M. Cao, W. Zou, and X. Li, “Speech
464
+ simclr: Combining contrastive and reconstruction ob-
465
+ jective for self-supervised speech representation learn-
466
+ ing.,” in Interspeech, 2020.
467
+ [7] J.B. Grill,
468
+ F. Strub,
469
+ F. Altche,
470
+ C. Tallec,
471
+ P.H.
472
+ Richemond,
473
+ E.
474
+ Buchatskaya,
475
+ C.
476
+ Doersch,
477
+ B.A.
478
+ Pires, Z.D. Guo, M.G. Azar, B.Piot, K.Kavukcuoglu,
479
+ R.Munos, and M. Valko, “Bootstrap your own latent: A
480
+ new approach to self-supervised learning,” in Neurips,
481
+ 2020.
482
+ [8] X. Chen and K. He, “Exploring simple siamese repre-
483
+ sentation learning,” in CVPR, 2021.
484
+ [9] L. Jing, P. Vincent, Y. LeCun, and Y. Tian, “Understand-
485
+ ing dimensional collapse in contrastive self-supervised
486
+ learning,” in ICLR, 2022.
487
+ [10] A. Bardes, J. Ponce, and Y. LeCun, “Vicreg: Variance-
488
+ invariance-covariance regularization for self-supervised
489
+ learning,” in ICLR, 2022.
490
+ [11] A. Ermolov, A. Siarohin, E. Sangineto, and N. Sebe,
491
+ “Whitening for self-supervised representation learning,”
492
+ in ICML, 2021.
493
+ [12] J. Zbontar, L. Jing, I. Misra, Y. LeCun, and S. Deny,
494
+ “Barlow twins: Self-supervised learning via redundancy
495
+ reduction,” in ICML, 2021.
496
+ [13] S. Ozsoy, S. Hamdan, S. ¨O. Arik, D. Yuret, and A. T.
497
+ Erdogan, “Self-supervised learning with an information
498
+ maximization criterion,” in ICLR, 2022.
499
+ [14] T. Lepage and R. Dehak,
500
+ “Label-efficient self-
501
+ supervised speaker verification with information max-
502
+ imization and contrastive learning,”
503
+ in Interspeech,
504
+ 2022.
505
+ [15] C. Chiu, J. Qin, Y. Zhang, J. Yu, and Y. Wu,
506
+ “Self-
507
+ supervised learning with random-projection quantizer
508
+ for speech recognition,” in ICML, 2022.
509
+ [16] B. Li, T. N. Sainath, R. Pang, and Z. Wu,
510
+ “Semi-
511
+ supervised training for end-to-end models via weak dis-
512
+ tillation,” in ICASSP, 2019.
513
+ [17] J. Kahn, A. Lee, and A. Hannun, “Self-training for end-
514
+ to-end speech recognition,” in ICASSP, 2020.
515
+ [18] Q. Xu, T. Likhomanenko, J. Kahn, A. Hannun, G. Syn-
516
+ naeve, and R. Collobert, “Iterative pseudo-labeling for
517
+ speech recognition,” in Interspeech, 2020.
518
+ [19] D. S. Park, Y. Zhang, Y. Jia, W. Han, C. Chiu, B. Li,
519
+ Y. Wu, and Q. V. Le, “Improved noisy student training
520
+ for automatic speech recognition,” in Interspeech, 2020.
521
+ [20] Y. Zhang, J. Qin, D. S. Park, W. Han, C. Chiu, R. Pang,
522
+ Q. V. Le, and Y. Wu,
523
+ “Pushing the limits of semi-
524
+ supervised learning for automatic speech recognition,”
525
+ in NeurIPS SAS Workshop, 2020.
526
+ [21] Q. Xu, A. Baevski, T. Likhomanenko, P. Tomasello,
527
+ A. Conneau, G. Synnaeve R. Collobert, and M. Auli,
528
+ “Self-training and pre-training are complementary for
529
+ speech recognition,” in ICASSP, 2021.
530
+ [22] C. Wang, Y. Wang, Y. Wu, S. Chen, J. Li, S. Liu, and
531
+ F. Wei, “Supervision-guided codebooks for masked pre-
532
+ diction in speech pre-training,” in Interspeech, 2022.
533
+ [23] M. Ott, S. Edunov, A. Baevski, A. Fan, S. Gross, N. Ng,
534
+ D. Grangier, and M. Auli, “fairseq: A fast, extensible
535
+ toolkit for sequence modeling,” in NAACL, 2019.
536
+ [24] M. Caron, H. Touvron, I. Misra, H. Jegou, J. Mairal,
537
+ P. Bojanowski, and A. Joulin, “Emerging properties in
538
+ self-supervised vision transformers,” in ICCV, 2021.
539
+ [25] L. v. d. Maaten and G. Hinton, “Visualizing data using
540
+ t-sne,” in Journal of Machine Learning Research, 2008.
541
+ [26] V. Panayotov, G. Chen, D. Povey, and S. Khudanpur,
542
+ “Librispeech: an asr corpus based on public domain au-
543
+ dio books,” in ICASSP, 2015.
544
+ [27] A. Graves, S. Fern´andez, and F. Gomez, “Connection-
545
+ ist temporal classification: Labelling unsegmented se-
546
+ quence data with recurrent neural networks,” in ICML,
547
+ 2006.
548
+
eNAyT4oBgHgl3EQfwvnx/content/tmp_files/load_file.txt ADDED
@@ -0,0 +1,413 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ filepath=/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf,len=412
2
+ page_content='TRINET: STABILIZING SELF-SUPERVISED LEARNING FROM COMPLETE OR SLOW COLLAPSE Lixin Cao 1† Jun Wang 1† Ben Yang 1,2‡ Dan Su1 Dong Yu3 1Tencent AI Lab, China 2 Peking University 3Tencent AI Lab, USA ABSTRACT Self-supervised learning (SSL) models confront challenges of abrupt informational collapse or slow dimensional collapse.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
3
+ page_content=' We propose TriNet, which introduces a novel triple-branch architecture for preventing collapse and stabilizing the pre- training.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
4
+ page_content=' Our experimental results show that the proposed method notably stabilizes and accelerates pre-training and achieves a relative word error rate reduction (WERR) of 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
5
+ page_content='32% compared to the state-of-the-art (SOTA) Data2vec for a downstream benchmark ASR task.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
6
+ page_content=' We will release our code at https://github.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
7
+ page_content='com/tencent-ailab/.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
8
+ page_content=' Index Terms— Self-supervised learning, collapse, pseudo label, self-learning, bootstrapping 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
9
+ page_content=' INTRODUCTION Self-supervised learning (SSL) models leverage unlabeled data, which makes significant advances [1] and reaches per- formances almost on par with supervised baselines on many downstream tasks such as speech processing [2, 3, 4].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
10
+ page_content=' Among these models, state-of-the-art contrastive learning methods [3, 5, 1, 6] learn to reduce the distance between positive pairs of a sample and its distorted version, while increasing the dis- tance between negative pairs of different samples.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
11
+ page_content=' They yield good performance with large amounts of contrastive pairs[1], which are difficult to mine and computationally intensive for training.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
12
+ page_content=' These challenges motivate alternative methods.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
13
+ page_content=' Boot- strapping approaches [7, 2, 8] emerge to avoid using negative examples.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
14
+ page_content=' Two networks are used to predict the same repre- sentation from augmented pairs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
15
+ page_content=' One is the teacher network with a stop-gradient (SG) operation (otherwise, a complete informational collapse may happen where the learned rep- resentations would rapidly collapse towards a single vector regardless of the inputs), and the other is the student network updating online.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
16
+ page_content=' Among these approaches, SimSiam [8] sim- ply copied the student network’s weights over to the teacher network;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
17
+ page_content=' BYOL [7] updated the teacher network by track- ing the exponential moving average (EMA) of the student network’s weights.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
18
+ page_content=' Data2vec[2] also took EMA to update † Equal Contribution.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
19
+ page_content=' ‡ Contribution made during internship in Tencent the teacher network, but it used a masking prediction task similar to Wav2vec2[3] by feeding the student network with the masked data and the teacher network with the original data.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
20
+ page_content=' Its objective is to predict the averaged embedding of several top layers of the teacher network, which is different from using only the top layer in BYOL.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
21
+ page_content=' As reported in Data2vec [2], a collapse issue is more pro- nounced for speech tasks than computer vision or natural lan- guage processing tasks, due to the very correlated adjacent targets of the speech modality.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
22
+ page_content=' It may come from two dif- ferent natures [9]: 1) the complete collapse;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
23
+ page_content=' 2) a slow col- lapse like the observation made in [10] that the architectural tricks such as BYOL, Data2vec, and SiaSiam are not perfectly maintaining the variance of the representations, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
24
+ page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
25
+ page_content=', very slow collapse is still happening with these methods.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
26
+ page_content=' In this pa- per, we propose a novel network structure TriNet, an analogy with a three-legged stabilizing stand “Trivet”, to address the main challenge for the above joint embedding architectures by preventing the complete or slow collapse.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
27
+ page_content=' After introduc- ing related work in Section 2, we summarize our contribu- tions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
28
+ page_content=' Then we describe the method about its detailed network architecture in Section 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
29
+ page_content='1, its pre-training process in 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
30
+ page_content='2 and regularization objectives in 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
31
+ page_content='3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
32
+ page_content=' Experimental setups and re- sults are presented in 4, where we demonstrate our proposed method remarkably stabilizes the pre-training and speeds up the convergence, and meanwhile achieves a WERR of 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
33
+ page_content='32% compared to the state-of-the-art (SOTA) Data2vec model in a benchmark ASR task.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
34
+ page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
35
+ page_content=' RELATED WORK Aside from contrastive methods for preventing informational collapse, other main trends are regularization methods for maximizing the information content of the embedding to pre- vent collapse.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
36
+ page_content=' Recently, various regularization approaches are proposed to prevent the collapse in which the embed- ding variables contain highly redundant information.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
37
+ page_content=' Among them, W-MSE[11], Barlow-Twinss[12], and VICReg[10] at- tempt to produce embedding variables that are decorrelated from each other, whereas CorInfoMax[13] does not constrain the variables to be uncorrelated but instead avoids covariance matrix degeneracy by using log-determinant as a regular- izer loss function.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
38
+ page_content=' However, recent investigations show that arXiv:2301.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
39
+ page_content='00656v1 [eess.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
40
+ page_content='AS] 12 Dec 2022 these regularization terms worked effectively only if given specific SSL structural settings [10] and strong data aug- mentation [14].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
41
+ page_content=' Note that all these regularization methods [10, 13, 11, 12] adopt an SSL-no-SG structure, where “no- SG” means the branch networks are both learnable with no stop-gradient.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
42
+ page_content=' Instead, optimization of some regularization terms together with SSL-SG structures ([7, 8]) was found hard[10].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
43
+ page_content=' We also empirically observed that adding covari- ance regularization terms was not as effective in an SSL-SG structure.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
44
+ page_content=' Data2vec[2] employs the SSL-SG structural tricks akin to BYOL[7] and Simsiam [8] that rely on a mechanism of normalizing the target to prevent collapse.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
45
+ page_content=' This strategy seems effective but difficult to interpret and may lead to instabilities during the training[10, 2].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
46
+ page_content=' Given the above challenges, we are motivated to study novel regularization methods that are effective and prac- tical for SSL models that are susceptible to complete or slow collapse.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
47
+ page_content=' Our idea is also related to a different re- search area on pseudo-labeling.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
48
+ page_content=' BEST-RQ [15] employs a random-projection quantizer to generate discrete pseudo la- bels.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
49
+ page_content=' Hubert[4] uses an offline K-means clustering step to provide discrete pseudo labels for the masked regions, and takes an iterative re-clustering and re-training process.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
50
+ page_content=' These pseudo-labeling methods simplify the SSL targets to the level of clusters but essentially require the downstream tasks to be at the appropriate clustering level for the model to learn well.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
51
+ page_content=' Another related idea is a combination of SSL and self- training [16, 17, 18, 19].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
52
+ page_content=' A fine-tuned SSL model [20, 21] or a supervised teacher model [22] is used as the initial teacher model for pseudo-labeling the unlabeled set.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
53
+ page_content=' Then a student model is trained on the combined labeled and pseudo-labeled data.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
54
+ page_content=' Different from these approaches, our proposed TriNet has contributions mainly as follows: In contrast to most other pseudo-labeling approaches, TriNet does not require techniques such as K-means clus- tering, frame-level alignment, etc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
55
+ page_content=' For example, unlike Hubert [4], which builds a fixed set of discrete target units by clustering, TriNet learns the SSL latent embedding space and incorporates it to a higher level space for constructing target vectors with no limitation on the number of target units.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
56
+ page_content=' Not requiring to distract from any negative samples like Wav2vec2 does,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
57
+ page_content=' nor requiring any statistical assumption as the other advanced regularization approaches do (such as decorrelation [10] or maximizing log determinant [13] which may not always be tenable for the sequences and tasks at hand),' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
58
+ page_content=' TriNet instead employs a third branch to generate stable and stale target vectors from the sequences themselves in the high-level space to construct regulariza- tion loss,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
59
+ page_content=' which acts effectively as barriers against embed- ding space degeneracy.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
60
+ page_content=' We show that our regularization method stabilizes and ac- Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
61
+ page_content=' 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
62
+ page_content=' Illustration of TriNet with its three-legged networks: the left and right teacher networks perform in different modes to produce representations based on the original input, which are then predicted by the same middle network in student mode based on a perturbed version of the input.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
63
+ page_content=' Bottom is t-SNE visualization of latent embedding of Data2vec and TriNet.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
64
+ page_content=' celerates 1 the pre-training and leads to significant perfor- mance improvements, with no requirement for more data augmentation or larger model capacities.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
65
+ page_content=' To the best of our knowledge, TriNet is the first work that of- fers successful regularization and stabilization for speech pro- cessing in an SSL-SG framework.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
66
+ page_content=' Meanwhile, we would like to point out that TriNet achieves the above advances provided a frozen teacher model, although TriNet will notably surpass the frozen teacher, as we will demonstrate in the paper.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
67
+ page_content=' 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
68
+ page_content=' METHOD 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
69
+ page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
70
+ page_content=' Network Architecture As illustrated on top of Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
71
+ page_content=' 1, the proposed TriNet consists of three supporting networks.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
72
+ page_content=' The middle “leg” represents a stu- dent network that simultaneously regresses and predicts tar- gets from the left and right teacher networks.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
73
+ page_content=' The left teacher tracks the student parameters and generates the regression tar- get, while the right teacher is a frozen fine-tuned model for automatic speech recognition (ASR) to generate high-level target vectors for stabilizing the whole training.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
74
+ page_content=' Due to the different nature of the targets, we project both the student and the right teacher’s embedding to a pseudo-class space.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
75
+ page_content=' 1Comparing the pretraining time of SSL model with the frozen teacher to that without, while not counting the training of the frozen teacher model.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
76
+ page_content=' original input x Perturbation x x Encoder Encoder Encoder inEMAteachermode instudentmode infrozenteachetmode trackingstu&entparameters Projector Projector predicting averaged latent predicting pseudo embeddingof originalinput class of original input Zstruc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
77
+ page_content=" z' Yreg Date2vecemb." metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
78
+ page_content=' TriNet emb.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
79
+ page_content=" z' TriNet emb." metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
80
+ page_content='z"!' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
81
+ page_content='We mask spans of the input sequence x to generate the perturbed sequence x′ and feed it to a standard Conformer en- coder [23] of the student.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
82
+ page_content=' The target zstruc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
83
+ page_content=' is constructed by encoding the intact input x with the same network but param- eterized as an EMA teacher, as shown as the left “leg” in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
84
+ page_content=' 1, and summarizing the teacher’s top-K layer outputs [24, 7].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
85
+ page_content=' This “leg” adopts the same SSL structure as in Data2vec[2] and BYOL[7] for a straightforward comparison in this paper, whereas alternative SSL structures should be equally applica- ble.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
86
+ page_content=' Meanwhile, TriNet stabilizes the training by introducing the third “leg”, as shown as the right branch in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
87
+ page_content=' 1, which takes the fine-tuned teacher to encode the intact input x and generates pseudo target yregul.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
88
+ page_content=' of the original input data.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
89
+ page_content=' The design prevents the rest joint embedding architectures from abrupt or very slow collapse, in which output vectors pro- duced by the branches are identical and constant, or end up spanning a low-dimension subspace.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
90
+ page_content=' 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
91
+ page_content='2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
92
+ page_content=' Pre-training In the proposed TriNet, we pretrain the student encoder to simultaneously learn contextualized representations of differ- ent levels and structural natures.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
93
+ page_content=' The EMA teacher relies on the structural tricks of averaging (including both the moving average of model weights and the averaging of top-K layer outputs) to keep the prediction targets relatively stable while allowing the student to evolve freely and hopefully learn mid- level contextual representations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
94
+ page_content=' This freedom is a double- edged sword, though: the downside is that once the student starts to collapse, the EMA teacher will end up collapsing albeit very slowly, which will be demonstrated in our experi- ment Section 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
95
+ page_content='2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
96
+ page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
97
+ page_content=' To address either abrupt or slow collapse, the third branch plays the important role of “anchor” by regularizing and avoiding cases in which the student and the EMA teacher degenerate together.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
98
+ page_content=' TriNet employs the frozen teacher to provide high-level targets for regularization in a pseudo-class space, which is different from the mid-level embedding space between the student and the EMA teacher that maintains the SSL property.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
99
+ page_content=' At the bottom of Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
100
+ page_content=' 1, we use t-SNE [25] to visualize the latent embedding generated by Data2vec and TriNet.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
101
+ page_content=' Each point denotes a sample in a random batch and its color denotes its class.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
102
+ page_content=' It indicates that TriNet actually arranges intra-class samples, of which the layout gets more obvious from z′ of the mid-level embedding space to z′′ for the higher-level space, while the inter-class samples scatter all over the spaces.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
103
+ page_content=' 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
104
+ page_content='3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
105
+ page_content=' Regularization Given the predicted latent embedding z′ in the mid-level em- bedding space and the contextualized targets zstruc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
106
+ page_content=', we use a squared L2 norm loss to regress these targets: Lstruc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
107
+ page_content=' = 1 √ D � B×T ×D (z′ n − (zstruc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
108
+ page_content=' )n)2, (1) where n is the index of a total of B × T × D elements in a batch, and B, T, D are batch, frame, and dimension sizes.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
109
+ page_content=' Given the prediction y′ in the high-level space and the pseudo-class targets yregul.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
110
+ page_content=', we examine and compare two kinds of objectives.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
111
+ page_content=' One is a squared L2 norm for regression: Lregre.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
112
+ page_content=' = 1 √ D � B×T ×D (y′ n − (yregul.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
113
+ page_content=' )n)2, (2) The other is a cross-entropy loss for classification: Lregul.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
114
+ page_content=' = 1 √ D CrossEntropy(y′, Softmax(yregul.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
115
+ page_content=' )), (3) Our ablation study shows that Lregul.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
116
+ page_content=' is more effective than Lregre.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
117
+ page_content='. We consider that is because, in the high-level space, Lregul.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
118
+ page_content=' is a more suitable measure of how well the pre- dictions are made by a pseudo-phoneme classification rather than a latent embedding regression, again echoing the differ- ence of the various-level spaces and their complementary reg- ularization effects.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
119
+ page_content=' Consequently, we adopt L = Lstruc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
120
+ page_content=' + Lregul.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
121
+ page_content=' as training objective in our experiments.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
122
+ page_content=' 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
123
+ page_content=' EXPERIMENTS 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
124
+ page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
125
+ page_content=' Pre-training and Fine-tuning We pre-train models on unlabeled data Librispeech [26] that contains 960 hours of speech (LS-960h).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
126
+ page_content=' We fine-tune pre- trained models for ASR on the clean 100h (LS-100h) sub- set of LS-960h.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
127
+ page_content=' We evaluate the standard Librispeech dev- clean/other and test-clean/other sets.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
128
+ page_content=' We implemented both the proposed model TriNet and the reference model Data2vec Base based on Fairseq[23].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
129
+ page_content=' For fair comparison, both apply the same pre-processing and feature extraction: the input 16 kHz waveform is first transformed into an 80-dim filter bank to have less memory footprint than the raw waveform;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
130
+ page_content=' it is then processed by a feature extrac- tor containing two Convolution-2D subsampling layers with 576 channels, strides (2,2), and kernel widths (3,3).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
131
+ page_content=' This re- sults in an output sequence of 1/4 of the original length.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
132
+ page_content=' The input is applied with layer norm before sending to the en- coder.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
133
+ page_content=' The dropout and masking strategy for Data2vec and the proposed TriNet is identical to [2] and results in approx- imately 49% of all time steps masked for a typical training sequence.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
134
+ page_content=' Other hyper-parameters, including annealing rates, optimizers, learning rate schedulers, and fine-tuning regimes, also follow [2] and otherwise would be described if different.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
135
+ page_content=' The encoder for both Data2vec and TriNet contains 12 Conformer blocks with 768 hidden dimension and 16 at- tention heads.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
136
+ page_content=' In our experiments, we used the fine-tuned Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
137
+ page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
138
+ page_content=' Pre-training losses Data2vec model on LS-100h as the frozen fine-tuned teacher in TriNet to demonstrate that TriNet with no requirement for additional data, larger model capacity, or varying model structural tricks will surpass the frozen teacher.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
139
+ page_content=' While an arbitrary teacher with a heterogeneous architecture may also be applicable, we leave the investigation for future work.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
140
+ page_content=' For pre-training, TriNet uses the first 11 Conformer blocks for encoding the mid-level latent embedding space as described in Sec.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
141
+ page_content='3 (blank blocks in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
142
+ page_content=' 1), and dedicates the last 1 Conformer block to the high-level space (blue blocks in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
143
+ page_content=' 1).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
144
+ page_content=' The overall learnable model size is identical to Data2vec Base.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
145
+ page_content=' Each model was pre-trained for a maximum of 450 epochs over 2 × 8 GPU V100 cores.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
146
+ page_content=' 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
147
+ page_content='2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
148
+ page_content=' Results 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
149
+ page_content='2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
150
+ page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
151
+ page_content=' Training Stability and Convergence In Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
152
+ page_content=' 2, the drop of the Data2vec loss from epoch 350 to 450 actually reflected a slow collapsing case — the downstream fine-tuned model has the word error rate (WER, via greedy search on the dev-other set) degenerating from 9.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
153
+ page_content='949% at epoch 300 to 10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
154
+ page_content='25% at epoch 350 and further to 10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
155
+ page_content='432% at epoch 400.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
156
+ page_content=' We chose the best Data2vec checkpoint at epoch 300 for the comparison in 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
157
+ page_content='2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
158
+ page_content='2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
159
+ page_content=' In contrast, we can observe the pre-training loss of TriNet is much smoother and stabler than that of Data2vec (light blue curve is without smoothing.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
160
+ page_content=' Note the absolute loss values are not directly comparable), indicating that the frozen teacher in TriNet works effectively as an “anchor” by providing sta- ble and stale regularization and preventing the EMA teacher and the student from drifting together toward a collapsed sub- space.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
161
+ page_content=' Meanwhile, TriNet manages to converge within 2/3 of the overall epochs of Data2vec.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
162
+ page_content=' 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
163
+ page_content='2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
164
+ page_content='2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
165
+ page_content=' Downstream ASR Performance Pre-trained models are fine-tuned on LS-100h labeled for ASR by mapping the representations via a randomly initial- ized linear projection on top of the network into 32 classes Table 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
166
+ page_content=' WER (%) on the Librispeech dev/test sets when training on the LS-100h labeled.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
167
+ page_content=' Model dev test clean other clean other Wav2vec 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
168
+ page_content='0[3] 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
169
+ page_content='7 7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
170
+ page_content='9 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
171
+ page_content='4 8.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
172
+ page_content='0 Hubert[4] 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
173
+ page_content='6 7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
174
+ page_content='8 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
175
+ page_content='4 8.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
176
+ page_content='1 Data2vec3 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
177
+ page_content='61 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
178
+ page_content='79 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
179
+ page_content='09 7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
180
+ page_content='07 TriNet (ablated) 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
181
+ page_content='49 7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
182
+ page_content='16 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
183
+ page_content='95 7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
184
+ page_content='23 TriNet 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
185
+ page_content='45 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
186
+ page_content='79 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
187
+ page_content='88 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
188
+ page_content='48 representing the vocabulary.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
189
+ page_content=' Models are optimized by mini- mizing a CTC[27] loss.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
190
+ page_content=' Our approach achieves relative word error rate reductions (WERRs) of 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
191
+ page_content='13%/0/6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
192
+ page_content='80%/8.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
193
+ page_content='35% (5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
194
+ page_content='32% in average) over Data2vec on dev-clean/other and test-clean/other of the Librispeech benchmark as shown in Table 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
195
+ page_content=' Moreover, it achieves WERRs of 35.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
196
+ page_content='05%/27.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
197
+ page_content='92%/28.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
198
+ page_content='14%/25.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
199
+ page_content='23% (29.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
200
+ page_content='09% in average) when training on a 1 hour Libri-light (LS-1h) labeled data setup2, reflecting more effectiveness for the extremely low-resource setting.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
201
+ page_content=' 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
202
+ page_content='2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
203
+ page_content='3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
204
+ page_content=' Ablations To exam the different natures of the two spaces, we make an ablation study by removing the projectors and spare no Conformer layer specific for the high-level target (blue blocks in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
205
+ page_content=' 1).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
206
+ page_content=' It turns out the training becomes rather unstable, as shown as the orange curve of the training loss in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
207
+ page_content=' 2, indicating the learning process is dragged zig-zag between the two spaces of different natures and can not converge well.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
208
+ page_content=' Another ablation study is on comparing the regulariza- tion terms of Lregul.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
209
+ page_content=' and Lregre.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
210
+ page_content='. The second line from the bottom of Table 1 indicates the result by replacing Lregul.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
211
+ page_content=' with Lregre.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
212
+ page_content='. Although the result marginally outperforms Data2vec, it is much worse than TriNet before ablation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
213
+ page_content=' This validates the effectiveness of Lregul.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
214
+ page_content=' being a more suitable measure for the high-level space than an MSE loss that is suitable for mid-level embedding regression, reflecting the complementary nature of the spaces constructed at different levels via the triple “legs” in TriNet.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
215
+ page_content=' 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
216
+ page_content=' CONCLUSION The proposed TriNet addresses challenges of complete or slow collapse for joint embedding SSL architectures by em- ploying a frozen teacher and a novel architecture.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
217
+ page_content=' It succeeds in stabilizing and accelerating the pre-training and obtaining significant WERR gains compared to the SOTA Data2vec model in a benchmark ASR task.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
218
+ page_content=' 2Using hyper-parameters for Data2vec on LS-100h rather than tuned for LS-1h or TriNet.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
219
+ page_content=' 3Data2vec Base model reproduced by our implementation based on Fairseq TriNet 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
220
+ page_content='6 TriNet (ablated 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
221
+ page_content='2 Data2vec 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
222
+ page_content='8 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
223
+ page_content='4 3 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
224
+ page_content='6 0 100 200 300 4006.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
225
+ page_content=' REFERENCES [1] T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
226
+ page_content=' Chen, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
227
+ page_content=' Kornblith, K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
228
+ page_content=' Swersky, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
229
+ page_content=' Norouzi, and G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
230
+ page_content=' Hinton, “Big self-supervised models are strong semi- supervised learners,” in Neurips, 2020.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
231
+ page_content=' [2] A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
232
+ page_content=' Baevski, W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
233
+ page_content=' Hsu, Q.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
234
+ page_content=' Xu, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
235
+ page_content=' Babu, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
236
+ page_content=' Gu, and M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
237
+ page_content=' Auli, “data2vec: A general framework for self-supervised learning in speech, vision and language,” in ICML, 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
238
+ page_content=' [3] A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
239
+ page_content=' Baevski, Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
240
+ page_content=' Zhou, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
241
+ page_content=' Mohamed, and M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
242
+ page_content=' Auli, “wav2vec 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
243
+ page_content='0: A framework for self-supervised learn- ing of speech representations,” in Neurips, 2020.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
244
+ page_content=' [4] W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
245
+ page_content='N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
246
+ page_content=' Hsu, Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
247
+ page_content='H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
248
+ page_content='H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
249
+ page_content=' Tsai, B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
250
+ page_content=' Bolte, R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
251
+ page_content=' Salakhutdinov, and A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
252
+ page_content=' Mohamed, “Hubert: How much can a bad teacher benefit asr pre-training,” in ICASSP, 2021.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
253
+ page_content=' [5] T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
254
+ page_content=' Chen, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
255
+ page_content=' Kornblith, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
256
+ page_content=' Norouzi, and G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
257
+ page_content=' E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
258
+ page_content=' Hinton, “A simple framework for contrastive learning of visual representations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
259
+ page_content=',” in ICML, 2020.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
260
+ page_content=' [6] D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
261
+ page_content=' Jiang, W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
262
+ page_content=' Li, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
263
+ page_content=' Cao, W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
264
+ page_content=' Zou, and X.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
265
+ page_content=' Li, “Speech simclr: Combining contrastive and reconstruction ob- jective for self-supervised speech representation learn- ing.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
266
+ page_content=',” in Interspeech, 2020.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
267
+ page_content=' [7] J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
268
+ page_content='B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
269
+ page_content=' Grill, F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
270
+ page_content=' Strub, F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
271
+ page_content=' Altche, C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
272
+ page_content=' Tallec, P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
273
+ page_content='H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
274
+ page_content=' Richemond, E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
275
+ page_content=' Buchatskaya, C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
276
+ page_content=' Doersch, B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
277
+ page_content='A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
278
+ page_content=' Pires, Z.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
279
+ page_content='D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
280
+ page_content=' Guo, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
281
+ page_content='G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
282
+ page_content=' Azar, B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
283
+ page_content='Piot, K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
284
+ page_content='Kavukcuoglu, R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
285
+ page_content='Munos, and M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
286
+ page_content=' Valko, “Bootstrap your own latent: A new approach to self-supervised learning,” in Neurips, 2020.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
287
+ page_content=' [8] X.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
288
+ page_content=' Chen and K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
289
+ page_content=' He, “Exploring simple siamese repre- sentation learning,” in CVPR, 2021.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
290
+ page_content=' [9] L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
291
+ page_content=' Jing, P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
292
+ page_content=' Vincent, Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
293
+ page_content=' LeCun, and Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
294
+ page_content=' Tian, “Understand- ing dimensional collapse in contrastive self-supervised learning,” in ICLR, 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
295
+ page_content=' [10] A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
296
+ page_content=' Bardes, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
297
+ page_content=' Ponce, and Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
298
+ page_content=' LeCun, “Vicreg: Variance- invariance-covariance regularization for self-supervised learning,” in ICLR, 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
299
+ page_content=' [11] A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
300
+ page_content=' Ermolov, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
301
+ page_content=' Siarohin, E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
302
+ page_content=' Sangineto, and N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
303
+ page_content=' Sebe, “Whitening for self-supervised representation learning,” in ICML, 2021.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
304
+ page_content=' [12] J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
305
+ page_content=' Zbontar, L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
306
+ page_content=' Jing, I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
307
+ page_content=' Misra, Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
308
+ page_content=' LeCun, and S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
309
+ page_content=' Deny, “Barlow twins: Self-supervised learning via redundancy reduction,” in ICML, 2021.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
310
+ page_content=' [13] S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
311
+ page_content=' Ozsoy, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
312
+ page_content=' Hamdan, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
313
+ page_content=' ¨O.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
314
+ page_content=' Arik, D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
315
+ page_content=' Yuret, and A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
316
+ page_content=' T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
317
+ page_content=' Erdogan, “Self-supervised learning with an information maximization criterion,” in ICLR, 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
318
+ page_content=' [14] T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
319
+ page_content=' Lepage and R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
320
+ page_content=' Dehak, “Label-efficient self- supervised speaker verification with information max- imization and contrastive learning,” in Interspeech, 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
321
+ page_content=' [15] C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
322
+ page_content=' Chiu, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
323
+ page_content=' Qin, Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
324
+ page_content=' Zhang, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
325
+ page_content=' Yu, and Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
326
+ page_content=' Wu, “Self- supervised learning with random-projection quantizer for speech recognition,” in ICML, 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
327
+ page_content=' [16] B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
328
+ page_content=' Li, T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
329
+ page_content=' N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
330
+ page_content=' Sainath, R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
331
+ page_content=' Pang, and Z.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
332
+ page_content=' Wu, “Semi- supervised training for end-to-end models via weak dis- tillation,” in ICASSP, 2019.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
333
+ page_content=' [17] J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
334
+ page_content=' Kahn, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
335
+ page_content=' Lee, and A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
336
+ page_content=' Hannun, “Self-training for end- to-end speech recognition,” in ICASSP, 2020.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
337
+ page_content=' [18] Q.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
338
+ page_content=' Xu, T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
339
+ page_content=' Likhomanenko, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
340
+ page_content=' Kahn, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
341
+ page_content=' Hannun, G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
342
+ page_content=' Syn- naeve, and R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
343
+ page_content=' Collobert, “Iterative pseudo-labeling for speech recognition,” in Interspeech, 2020.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
344
+ page_content=' [19] D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
345
+ page_content=' S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
346
+ page_content=' Park, Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
347
+ page_content=' Zhang, Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
348
+ page_content=' Jia, W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
349
+ page_content=' Han, C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
350
+ page_content=' Chiu, B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
351
+ page_content=' Li, Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
352
+ page_content=' Wu, and Q.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
353
+ page_content=' V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
354
+ page_content=' Le, “Improved noisy student training for automatic speech recognition,” in Interspeech, 2020.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
355
+ page_content=' [20] Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
356
+ page_content=' Zhang, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
357
+ page_content=' Qin, D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
358
+ page_content=' S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
359
+ page_content=' Park, W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
360
+ page_content=' Han, C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
361
+ page_content=' Chiu, R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
362
+ page_content=' Pang, Q.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
363
+ page_content=' V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
364
+ page_content=' Le, and Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
365
+ page_content=' Wu, “Pushing the limits of semi- supervised learning for automatic speech recognition,” in NeurIPS SAS Workshop, 2020.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
366
+ page_content=' [21] Q.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
367
+ page_content=' Xu, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
368
+ page_content=' Baevski, T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
369
+ page_content=' Likhomanenko, P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
370
+ page_content=' Tomasello, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
371
+ page_content=' Conneau, G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
372
+ page_content=' Synnaeve R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
373
+ page_content=' Collobert, and M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
374
+ page_content=' Auli, “Self-training and pre-training are complementary for speech recognition,” in ICASSP, 2021.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
375
+ page_content=' [22] C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
376
+ page_content=' Wang, Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
377
+ page_content=' Wang, Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
378
+ page_content=' Wu, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
379
+ page_content=' Chen, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
380
+ page_content=' Li, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
381
+ page_content=' Liu, and F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
382
+ page_content=' Wei, “Supervision-guided codebooks for masked pre- diction in speech pre-training,” in Interspeech, 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
383
+ page_content=' [23] M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
384
+ page_content=' Ott, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
385
+ page_content=' Edunov, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
386
+ page_content=' Baevski, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
387
+ page_content=' Fan, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
388
+ page_content=' Gross, N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
389
+ page_content=' Ng, D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
390
+ page_content=' Grangier, and M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
391
+ page_content=' Auli, “fairseq: A fast, extensible toolkit for sequence modeling,” in NAACL, 2019.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
392
+ page_content=' [24] M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
393
+ page_content=' Caron, H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
394
+ page_content=' Touvron, I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
395
+ page_content=' Misra, H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
396
+ page_content=' Jegou, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
397
+ page_content=' Mairal, P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
398
+ page_content=' Bojanowski, and A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
399
+ page_content=' Joulin, “Emerging properties in self-supervised vision transformers,” in ICCV, 2021.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
400
+ page_content=' [25] L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
401
+ page_content=' v.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
402
+ page_content=' d.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
403
+ page_content=' Maaten and G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
404
+ page_content=' Hinton, “Visualizing data using t-sne,” in Journal of Machine Learning Research, 2008.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
405
+ page_content=' [26] V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
406
+ page_content=' Panayotov, G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
407
+ page_content=' Chen, D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
408
+ page_content=' Povey, and S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
409
+ page_content=' Khudanpur, “Librispeech: an asr corpus based on public domain au- dio books,” in ICASSP, 2015.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
410
+ page_content=' [27] A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
411
+ page_content=' Graves, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
412
+ page_content=' Fern´andez, and F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
413
+ page_content=' Gomez, “Connection- ist temporal classification: Labelling unsegmented se- quence data with recurrent neural networks,” in ICML, 2006.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/eNAyT4oBgHgl3EQfwvnx/content/2301.00656v1.pdf'}
etAzT4oBgHgl3EQfaPzl/content/tmp_files/2301.01367v1.pdf.txt ADDED
@@ -0,0 +1,2266 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ The Price of Anarchy in One-Sided Allocation Problems
2
+ with Multi-Unit Demand Agents
3
+ Sissi Jiang
4
5
+ Ndiame Ndiaye,
6
7
+ Adrian Vetta
8
9
+ Eggie Wu
10
11
+ January 5, 2023
12
+ Abstract
13
+ We study the one-sided allocation problem with multi-unit demand agents for additive unit-
14
+ sum valuations. The special case of the one-sided matching problem with unit demand agents
15
+ has been studied extensively. The primary focus has been on the folklore Random Priority mech-
16
+ anism and the Probabilistic Serial mechanism, introduced by Bogomolnaia and Moulin [6], with
17
+ emphasis on structural properties, incentives, and performance with respect to social welfare.
18
+ Under the standard assumption of unit-sum valuation functions, Christodoulou et al. [10] proved
19
+ that the price of anarchy is Θ(√n) in the one-sided matching problem for both the Random
20
+ Priority and Probabilistic Serial mechanisms. Whilst both Random Priority and Probabilistic
21
+ Serial are ordinal mechanisms, these approximation guarantees are the best possible even for
22
+ the broader class of cardinal mechanisms.
23
+ To extend these results to the general setting of one-sided allocation problems with multi-
24
+ unit demand agents, we consider a natural cardinal mechanism variant of Probabilistic Serial,
25
+ which we call Cardinal Probabilistic Serial. We present structural theorems for this mechanism
26
+ and use them to show that Cardinal Probabilistic Serial has a price of anarchy of O(√n · log n)
27
+ for the one-sided allocation problem with multi-unit demand agents. This result is near tight.
28
+ 1
29
+ Introduction
30
+ In the one-sided matching problem a set of n items must be matched to a set of n agents. This is
31
+ a classical problem in economics and computer science with numerous practical applications, such
32
+ as assigning children to schools, patients to doctors, workers to tasks, social housing to people, etc.
33
+ Consequently, there has been a huge amount of research concerning matching mechanisms, their
34
+ incentive and structural properties, and the social quality of the outcomes they induce. Of course,
35
+ these mechanisms are restricted by the fact that the allocation must be a matching. Equivalently,
36
+ this constraint can be viewed as a restriction to unit demand valuation functions, where each
37
+ agents desires at most one good. Budish et al. [8] highlight the importance of moving beyond unit-
38
+ demand agents. Indeed, in many practical applications the agents have multi-unit demand valuation
39
+ functions. For example, in estate division or the allocation of shifts to employees, university courses
40
+ to students, landing and hanger slots to airlines, etc. This motivates our work: we introduce an
41
+ allocation mechanism for the one-sided allocation problem with multi-unit demand agents and
42
+ analyse the quality of the outcomes it produces with respect to social welfare.
43
+ 1
44
+ arXiv:2301.01367v1 [cs.GT] 3 Jan 2023
45
+
46
+ 1.1
47
+ Background
48
+ The one-sided matching problem with indivisible items was formally introduced by Hylland and
49
+ Zeckhauser [13] in 1979, where they studied the competitive equilibrium from equal incomes (CEEI)
50
+ mechanism. This mechanism is envy-free but not strategy-proof and, indeed, early work in the
51
+ economics community focused on the structural and incentive properties of matching mechanisms.
52
+ For example, Zhou [18] gave an impossibility result showing the non-existence of a mechanism that
53
+ is simultaneously strategy-proof, pareto optimal, and symmetric. See [2, 16] for surveys on the
54
+ one-sided matching problem and matching markets more generally.
55
+ Since monetary transfers are typically not allowed in the one-sided matching problem, it be-
56
+ longs to the field of mechanism design without money [15]. A folklore mechanism in this realm
57
+ is Random Priority (RP). Applied to the one-sided matching problem, this mechanism orders the
58
+ agents uniformly at random who then, in turn, select their favourite item that has not previously
59
+ been selected. This mechanism, also popularly known as Random Serial Dictatorship (RSD) [1], is
60
+ strategy-proof.
61
+ Another prominent mechanism is Probabilistic Serial (PS), introduced by Bogomolnaia and
62
+ Moulin [6] in 2001. This is a “consumption” mechanism: to begin, every agent consumes their
63
+ favourite item at the same consumption rate. When the favourite item of an agent is completely
64
+ consumed (that is, together all the agents have consumed exactly one unit of that item) then
65
+ this agent switches to consume its next favorite item, etc. Since its discovery, Probabilistic Serial
66
+ has become the most well-studied mechanism for the one-sided matching problem. It has many
67
+ desirable properties such as envy-freeness and ordinal efficiency when the agents are truthful [6].
68
+ However, unlike Random Priority, it is not strategy-proof and some of its desirable properties fail to
69
+ hold when the agents are strategic [11]. Several extensions to the mechanism have been proposed;
70
+ see, for example, [14, 8, 3]. Aziz et al. studied the manipulability of Probabilistic Serial [5] and
71
+ proved the existence of pure strategy Nash equilibria under the mechanism [4].
72
+ An important recent line of research in the computer science community has been to quantify the
73
+ social welfare of allocations induced by a mechanism in comparison to the optimal obtainable social
74
+ welfare. Two approaches abound in the literature [12, 17]. First is the approximation ratio, where
75
+ agents are assumed to report truthfully to the mechanism. Second, and more interestingly from a
76
+ game-theoretic perspective, is the price of anarchy, where agents are assumed to be strategic [10].
77
+ However, for mechanism design without money, these measures are of little interest without a
78
+ fairness or normalization assumption. As a result, the standard normalization assumption [7, 9,
79
+ 10, 12, 17] is that the valuation function of each agent is unit-sum. Specifically, agent i has a
80
+ value v′
81
+ i(j) for item j and �
82
+ j v′
83
+ i(j) = 1. Under the unit-sum assumption, a breakthrough result
84
+ of Christodoulou et al. [10] is that price of anarchy is Θ(√n) for both the Random Priority and
85
+ Probabilistic Serial mechanisms for the one-sided matching problem.
86
+ We remark that both Random Priority and Probabilistic Serial have the characteristic that
87
+ they are ordinal mechanisms. Specifically, rather than requiring the entire valuation function of
88
+ each agent, they need only the preference ordering on the items induced by the valuation function.
89
+ Interestingly, despite being ordinal mechanisms, these bounds are the best possible even for the
90
+ broader class of cardinal mechanisms where agents are required to submit their entire valuation
91
+ function [10].
92
+ 2
93
+
94
+ 1.2
95
+ Overview and Results
96
+ The aim of this work is to extend the study of one-sided allocation problems beyond matchings to
97
+ general allocations. Ergo, we allow for agents with multi-unit demand valuation functions rather
98
+ than unit demand valuations.
99
+ In particular, we desire a mechanism with provably good social welfare guarantees. To do this we
100
+ work with cardinal mechanisms rather than ordinal mechanisms. Specifically, we design a cardinal
101
+ variant of the Probabilistic Serial (recall that Probabilistic Serial is an ordinal mechanism): at any
102
+ point in time each agent simultaneously consumes multiple items, with the consumption rates of
103
+ the items weighted in accordance with the cardinal valuation function of the agent. We call this
104
+ the Cardinal Probabilistic Serial (CPS) mechanism and define it formally in Section 3 along with
105
+ examples.
106
+ In Section 4 we present structural theorems for the Cardinal Probabilistic Serial mechanism.
107
+ We use these in Section 5 to prove our main result: the Cardinal Probabilistic Serial mechanism
108
+ has a price of anarchy of O(√n·log n) for the one-sided allocation problem with multi-unit demand
109
+ agents or additive unit-sum valuations. This result is near tight; we show a lower bound of Ω(√n)
110
+ on the price of anarchy holds for fair mechanism1. In Section 6 we show these bounds also apply
111
+ to the price of stability.
112
+ 2
113
+ The One-Sided Allocation Problem
114
+ In this section we present the one-sided allocation problem with multi-unit demand agents. There
115
+ is a set I of n agents and a set J of n items. Each agent i ∈ I has a value v′
116
+ i(j) for item j ∈ J.
117
+ The agents have additive multi-unit demands; for any collection S ⊆ J of items, agent i has a
118
+ value v′
119
+ i(S) = �
120
+ j∈S v′
121
+ i(j).2 Furthermore, we assume that valuation functions are unit-sum, that is,
122
+
123
+ j∈J v′
124
+ i(j) = 1 for every agent i. Denote by U the set of unit-sum valuation functions.
125
+ Our focus is on direct revelation mechanisms. Given a unit-sum valuation function v′
126
+ i, agent
127
+ i can report to the allocation mechanism M a, possibly non-truthful, unit-sum valuation function
128
+ vi.
129
+ We denote the space of feasible reports the mechanism may receive by V ≡ Un.
130
+ Given a
131
+ set v = {v1, v2, . . . vn} ∈ V of reported valuations, let v−i = {v1, . . . , vi−1, vi+1, . . . vn} be the set
132
+ of reported valuations excluding agent i. We define M(v′
133
+ i; v) = M(v′
134
+ i; {vi, v−i}) to be the true
135
+ value of the bundle of items allocated to agent i by the mechanism M given the report valuations
136
+ v = {vi, v−i}. We say that M(v′
137
+ i; v) is the payoff to agent i. Further, vi is a best response to v−i if it
138
+ maximizes the resultant payoff to agent i, that is, vi = arg maxˆvi∈U M(v′
139
+ i; {ˆvi, v−i}). The reported
140
+ valuation v is a Nash equilibrium if vi is best response to v−i, for every agent i ∈ I.
141
+ Denote
142
+ by NE(v′) the set of valuations which are Nash equilibria with respect to the true valuations
143
+ v′ = {v′
144
+ 1, v′
145
+ 2, . . . , v′
146
+ n}.
147
+ The social welfare of the allocation given by the mechanism is �
148
+ i∈I M(v′
149
+ i; v). Observe that the
150
+ social welfare is maximized by simply assigning each item to the agent that values it the most.
151
+ Thus the optimal welfare is OPT(v′) = �
152
+ j∈J maxi∈I vi(j). The price of anarchy is the worst-case
153
+ ratio between the optimal welfare and the social welfare of the worst Nash equilibrium, namely
154
+ supv′ supv∈NE(v′)
155
+ OPT(v��)
156
+
157
+ i∈I M(v′
158
+ i;v). Similarly, the price of stability is the worst-case ratio between the
159
+ optimal welfare and the social welfare of the best Nash equilibrium,
160
+ 1In this context, a mechanism is fair if every agent has the same number of items in expectation.
161
+ 2In contrast, for a unit demand agent i, we have v′
162
+ i(S) = maxj∈S v′
163
+ i(j).
164
+ 3
165
+
166
+ 3
167
+ The Cardinal Probabilistic Serial Mechanism
168
+ We are now ready to present our allocation mechanism.
169
+ We generalize the ordinal mechanism
170
+ Probabilistic Serial to a cardinal mechanism. In this consumption mechanism, Cardinal Probabilistic
171
+ Serial (CPS), at any time the agents simultaneous consume multiple items rather than just their
172
+ most preferred remaining item. Specifically, at any time, the total consumption rate (speed) of
173
+ an agent over all items is one but this consumption rate is split amongst the remaining items in
174
+ proportion to their value to the agent. Let’s now formalize the mechanism.
175
+ 3.1
176
+ A Cardinal Variant of Probabilistic Serial
177
+ Let v = {v1, v2, . . . vn} ∈ V be the reported unit-sum valuations. Each item has a size (quantity) of
178
+ one unit, and each agent i has a consumption rate of 1 at any time. At time t ∈ [0, 1], let rv(t) be
179
+ the set of remaining items, that is, the items that have not yet been entirely consumed. Each agent
180
+ partitions its consumption over the remaining items in proportion to their values. Specifically, at
181
+ time t, the consumption rate of an item j ∈ rv(t) by agent i is denoted cv
182
+ i,j(t). Formally, if j ∈ rv(t)
183
+ and ∃ℓ ∈ rv(t) such that vi(ℓ) > 0 then cv
184
+ i,j(t) =
185
+ vi(j)
186
+
187
+ ℓ∈rv(t)
188
+ vi(ℓ).
189
+ If j has already been entirely consumed by time t, that is, j /∈ rv(t), then cv
190
+ i,j(t) = 0. However,
191
+ if the agent has no value for any of the remaining items then any partition of the consumption rate
192
+ over the remaining items is allowed and is consistent. (Indeed, in this case, for our subsequent price
193
+ of anarchy results we may assume the consumption rates are chosen adversarially.)
194
+ Let q: [n] × [0, 1] × V → [0, 1] be the function denoting the quantity of an item j remaining at
195
+ time t given the strategies v. Thus:
196
+ qv
197
+ j (t) = 1 −
198
+ � t
199
+ τ=0
200
+ ��
201
+ i∈I
202
+ cv
203
+ i,j(τ)
204
+
205
+
206
+ Observe j ∈ rv(t) ⇔ qv
207
+ j (t) > 0; that is, item j is available at time t if and only if a positive
208
+ quantity of the good remains. In particular, at time 0 we have qv
209
+ j (0) = 1 and rv(0) = J = [n] =
210
+ {1, 2, . . . , n}. Whilst at time 1 we have qv
211
+ j (t) = 0 and rv(t) = ∅. We say that the consumption time
212
+ of item j is the earliest time t at which qv
213
+ j (t) = 0.
214
+ At time 1 we then allocate the items to the agents as follows. Let γi,j to be the total amount
215
+ agent i consumed of item j. Then item j is randomly allocated to agent i with probability γi,j.
216
+ We remark that Cardinal Probabilistic Serial does generalize Probabilistic Serial. Specifically,
217
+ Lemma A.1 in the Appendix formally shows how this cardinal mechanism can simulate the ordinal
218
+ mechanism Probabilistic Serial.
219
+ 3.2
220
+ Examples
221
+ The Cardinal Probabilistic Serial mechanism is easy to understand with some examples.
222
+ Example I. First, consider the valuations shown in Figure 1, for three agents (A, B and C) and
223
+ three items (1, 2 and 3).
224
+ At time t = 0 the agents consume the items in proportion to their valuations. For example,
225
+ agent A has a consumption rate of 0.6 for the item 1, 0.3 for the item 2 and 0.1 for the item 3.
226
+ An important observation is that the consumption rates depend only on the set of remaining items
227
+ 4
228
+
229
+ Figure 1: Valuations for the three agents.
230
+ rv(t). In particular, the consumption rates remain constant until the consumption time of the next
231
+ item to be entirely consumed. In this example, that happens at time t = 2
232
+ 3 because that is the
233
+ consumption time of item 2. This is illustrated in Figure 2.
234
+ Figure 2: Situation after item 2 has been entirely consumed.
235
+ Because item 2 is no longer available after t = 2
236
+ 3, the consumption rates are updated. These
237
+ consumption rates are constant until the consumption time of item 1 at t = 460/501. At this time
238
+ the amount each agent has consumed is illustrated in Figure 3.
239
+ Figure 3: Situation after item 1 has been entirely consumed.
240
+ Now only item 3 remains so each agent consumes it at rate 1. The consumption time of this
241
+ last item is t = 1 and the algorithm terminates.
242
+ At this point, see Figure 4, the agent A has consumed the item with quantities (0.62, 0.2, 0.18),
243
+ respectively. The agent B has consumed the item with quantities (0.15, 0.47, 0.38). And agent C
244
+ 5
245
+
246
+ 1
247
+ 2
248
+ 3
249
+ A
250
+ 0.6
251
+ 0.3
252
+ 0.1
253
+ B
254
+ 0.1
255
+ 0.7
256
+ 0.2
257
+ C
258
+ 0.2
259
+ 0.5
260
+ 0.3At t1 = 2/3
261
+ Consumption Rates after t1
262
+ item 1
263
+ item 2
264
+ item 3
265
+ 1
266
+ 2
267
+ 3
268
+ Quantities Consumed
269
+ 0.6
270
+ 0.1
271
+ 0.0
272
+ 1
273
+ 2
274
+ 3
275
+ 1-0.3
276
+ 1- 0.3
277
+ A
278
+ 0.4
279
+ 0.2
280
+ 0.06
281
+ 0.1
282
+ 0.2
283
+ 0.0
284
+ B
285
+ 0.07
286
+ 0.47
287
+ 0.13
288
+ 1-0.7
289
+ 1-0.7
290
+ C
291
+ 0.13
292
+ 0.33
293
+ 0.2
294
+ 0.2
295
+ 0.3
296
+ 0.0
297
+ C
298
+ 1-0.5
299
+ 1 - 0.5At t2 = 460/501
300
+ item 1
301
+ item 2
302
+ item 3
303
+ Quantities Consumed
304
+ Consumption Rates after t2
305
+ 1
306
+ 2
307
+ 3
308
+ 1
309
+ 2
310
+ 3
311
+ 0.62
312
+ 0.2
313
+ 0.10
314
+ A
315
+ 0.0
316
+ 0.0
317
+ 1.0
318
+ A
319
+ 0.30
320
+ B
321
+ 0.0
322
+ 0.0
323
+ 1.0
324
+ B
325
+ 0.15
326
+ 0.47
327
+ 0.23
328
+ 0.33
329
+ 0.35
330
+ C
331
+ 0.0
332
+ 0.0
333
+ 1.0
334
+ CFigure 4: Situation after item 3 has been entirely consumed.
335
+ has consumed the item with quantities (0.23, 0.33, 0.44). Thus, item 1 is assigned to agents A, B
336
+ and C with probabilities 0.62, 0.15 and 0.23, respectively, etc.
337
+ Example II. Let there be two agents (A and B) and two items (1 and 2). Let v′
338
+ A = ( 2
339
+ 3, 1
340
+ 3) and
341
+ v′
342
+ B = ( 1
343
+ 3, 2
344
+ 3). Thus agent A prefers item 1 and the agent B prefers item 2. If the agents report
345
+ truthfully v = v′ then agent A obtains the bundle (2
346
+ 3, 1
347
+ 3) for a payoff of (2
348
+ 3)2+( 1
349
+ 3)2 = 5
350
+ 9. Similarly the
351
+ agent B obtains the bundle (1
352
+ 3, 2
353
+ 3) for a payoff of (1
354
+ 3)2 + ( 2
355
+ 3)2 = 5
356
+ 9. But this is not an equilibrium.
357
+ In particular, if the agent A reports (1, 0) then it will obtain the bundle (3
358
+ 4, 1
359
+ 4) for a payoff of
360
+ 3
361
+ 4 · 2
362
+ 3 + 1
363
+ 4 · 1
364
+ 3 = 7
365
+ 12 > 5
366
+ 9.
367
+ 3.3
368
+ The Social Welfare of Equilibria
369
+ Example II shows that Cardinal Probabilistic Serial is not strategy-proof and motivates studying
370
+ strategic agents and Nash equilibria under this mechanism. We are especially interested in calcu-
371
+ lating the price of anarchy of the mechanism. For the ordinal mechanism Probabilistic Serial the
372
+ price of anarchy is known for the one-sided matching problem due to the work Christodoulou et
373
+ al [10].
374
+ Theorem 3.1. [10] For the one-sided matching problem with unit-sum valuations, the price of
375
+ anarchy of Probabilistic Serial is Θ(√n).
376
+ In fact, this guarantee extends beyond Nash equilibria to coarse correlated equilibria and to
377
+ Bayesian settings. Furthermore, they show this guarantee is the best possible.
378
+ Theorem 3.2. [10] For the one-sided matching problem with unit-sum valuations, the price of
379
+ anarchy of any unit-sum mechanism is Ω(√n).
380
+ The aim of this paper is to extend to results of [10] to general one-sided allocation problems
381
+ with multi-unit demand valuations using the Cardinal Probabilistic Serial mechanism. This we
382
+ achieve in Section 5.1 with our main result:
383
+ Theorem 3.3. For the one-sided allocation problem with multi-unit demand agents, the price of
384
+ anarchy of Cardinal Probabilistic Serial is O(√n · log n).
385
+ This result is nearly tight. In particular, in Section 5.2 we show that the lower bound of Θ(√n)
386
+ of [10] can be extended to this setting. The remainder of the paper is dedicated to proving these
387
+ results.
388
+ 6
389
+
390
+ At t3 = 1
391
+ item 1
392
+ item 2
393
+ item 3
394
+ Quantities Consumed
395
+ 1
396
+ 2
397
+ 3
398
+ A
399
+ 0.62
400
+ 0.2
401
+ 0.18
402
+ B
403
+ 0.15
404
+ 0.47
405
+ 0.38
406
+ C
407
+ 0.23
408
+ 0.33
409
+ 0.444
410
+ Single-Minded & Sequential Bidding
411
+ To quantify the price the anarchy we require an understanding of the allocations and payoffs induced
412
+ at a Nash equilibrium v ∈ V. This is difficult to do directly. So a standard approach is, for each
413
+ agent i, to fix the strategies v−i of the other agents and hypothesize about the payoff obtainable if
414
+ the agent plays an alternative strategy. This lower bounds the payoff obtained by the strategy vi
415
+ because it is a best response to v−i. Summing over all agents then gives a lower bound on social
416
+ welfare.
417
+ But what alternative strategies should be considered? In Sections 4.1 and 4.2, we study two
418
+ simple strategies for each agent: single-minded bidding and sequential bidding. We prove structural
419
+ properties of these strategies and these properties to prove a technical lemma in Section 4.3 that
420
+ can be viewed as a generalization to general allocation problems of the main technical lemma of [10]
421
+ for matching problems.
422
+ 4.1
423
+ Single-Minded Bidding
424
+ As stated, a natural approach in trying to quantify the social welfare of a Nash equilibrium v is
425
+ to consider alternate strategies for the agents. Of particular importance is single-minded reporting
426
+ where an agent i reports a value 1 for a specific item j and value 0 for every other item. We denote
427
+ this report by ˆuj.
428
+ To analyze this change of strategy, let tj(v) be the minimum value of t such that qv
429
+ j (t) = 0; recall
430
+ this is the consumption time of item j under the Nash equilibrium v. Now denote by ˜tj = tj(ˆuj, v−i),
431
+ the consumption time of item j when agent i bids single-mindedly for j and the other agents −i
432
+ report v−i.
433
+ Two properties of single-minded reporting will be useful. First, regardless of the strategies of the
434
+ other agents −i, the consumption time of item j will be minimized if agent i bids single-mindedly
435
+ on item j. Second, at a Nash equilibrium, if agent i deviates and bids single-mindedly on item j
436
+ then the consumption time of item j can decrease by at most 75%.
437
+ Before proving these two properties we remark that whilst the first property may seem self-
438
+ evident there is a major subtlety due to dynamic knock-on effects. If agent i bids for an item
439
+ ℓ ̸= j this may decrease the completion time of item ℓ resulting in many other agents then bidding
440
+ (defacto) more strongly for item j thus decreasing the consumption time of item j. The key to the
441
+ proof is showing that these indirect knock-on effects do not outweigh the direct effects of bidding
442
+ single-mindedly.
443
+ Lemma 4.1. Given any v−i, the consumption time of item j is minimized when agent i bids
444
+ single-minded for j. That is, minu∈U tj(u, v−i) = ˜tj and argminu∈U tj(u, v−i) = ˆuj
445
+ Proof. Take any agent i ∈ I = [n], any item j ∈ J = [n] and any v ∈ V.
446
+ We remark that
447
+ throughout the proof v−i will be fixed but starting from an arbitrary vi we will shift towards ˆuj.
448
+ Next, let X = {j′ ∈ [n] : vi(j′) > 0, j′ ̸= j} be the set of items, other than j, for which agent i
449
+ reports a positive value. Now label the items of X by increasing consumption time; that is, xk for
450
+ k = 1, . . . , |X| such that txk is increasing.
451
+ The idea behind the proof is to construct a series of valuations {vi = u|X|, u|X|−1, . . . , u1, u0 =
452
+ ˆuj} such that tj(uk−1, v−i) ≤ tj(uk, v−i), for each k ≤ |X|, and where uk−1 has support of cardinality
453
+ one less than uk. Thus the consumption time of item j is less with the single-minded report ˆuj
454
+ than with the report vi. Because the choice of vi was arbitrary the result will follow.
455
+ 7
456
+
457
+ So we begin with u|X| = vi.
458
+ Then, given uk, we define uk−1 as follows.
459
+ Let uk−1
460
+ xk
461
+ = 0,
462
+ uk−1
463
+ j′
464
+ = uk
465
+ j + uk
466
+ xℓ and uk−1
467
+ j′
468
+ = uk
469
+ j′ for any other item j′. For simplicity, we will use the notation
470
+ uk = (uk, v−i) and tk
471
+ j = tj(uk, v−i). Now consider uk−1 and uk, and let T = min
472
+
473
+ tk
474
+ xk, tk−1
475
+ j
476
+
477
+ . If
478
+ every item has the same consumption time in both uk−1 and under uk then tk−1
479
+ j
480
+ = tk
481
+ j , which implies
482
+ that tk−1
483
+ j
484
+ ≤ tk
485
+ j which is what we wanted.
486
+ Otherwise, let t be the smallest time such that the set of items that have been consumed is
487
+ different under both strategies. We wish to show that t = T. By definition, for any τ ∈ [0, t), we
488
+ have r(uk)(τ) = r(uk−1)(τ) because j′ is the first item to be consumed under one strategy but not
489
+ the other. This implies that if either i′ ̸= i or j′ /∈ {j, xℓ} then we have cuk
490
+ i′,j′(τ) =
491
+ vi′(j′)
492
+
493
+ ℓ′∈r(uk)(τ) vi′(ℓ′) =
494
+ cuk−1
495
+ i′,j′ (τ). Thus, if j′ /∈ {j, xk}, the quantity of good j remaining at time t is the same for both
496
+ strategies; that is, quk
497
+ j′ (t) = quk−1
498
+ j′
499
+ (t), since the consumption integrals are identical in both cases.
500
+ Consequently, it must be the case that j′ ∈ {j, xk}.
501
+ But the consumption rate cuk−1
502
+ i,xk (τ) = 0 < cuk
503
+ i,xk(τ). Hence, quk
504
+ xk (t) < quk−1
505
+ xk
506
+ (t). So, if j′ = xk
507
+ then its consumption time must be smaller in uk than in uk−1. Similarly, the consumption rate
508
+ cuk−1
509
+ i,j
510
+ (τ) = cuk
511
+ i,j(τ)+cuk
512
+ i,xk(τ) > cuk
513
+ i,j(τ). Hence, q(uk′)
514
+ j
515
+ (t) > quk′−1
516
+ j
517
+ (t). So, if j′ = j then its consumption
518
+ time must be smaller in uk−1 than in uk. This implies t = T = min
519
+
520
+ tk
521
+ xk, tk−1
522
+ j
523
+
524
+ as desired. Thus,
525
+ we have two cases to consider.
526
+ Case I: tk−1
527
+ j
528
+ ≤ tk
529
+ xk.
530
+ Then j must be the first item to be completed in uk−1 before being
531
+ completed in uk. Hence, tk−1
532
+ j
533
+ < tk
534
+ j and the result holds.
535
+ Case II: tk−1
536
+ j
537
+ > tk
538
+ xk. Observe that r(uk)(t) ⊆ r(uk−1)(t) for any time t ∈ [tk
539
+ xk, tk−1
540
+ j
541
+ ]. Thus before
542
+ tk−1
543
+ j
544
+ , no item can finish earlier under uk−1 than under uk. This implies that, unless j′ = j and i′ = i,
545
+ we have cuk
546
+ i′,j′(t) ≥ cuk−1
547
+ i′,j′ (t) until j′ is entirely consumed under uk. In particular, let Y be the set of
548
+ items with consumption time in the interval [tk
549
+ xk, tk
550
+ j ] under uk. (Note that {xk, j} ⊆ Y .) Then, only
551
+ these items in Y have a consumption time in [tk
552
+ xk, tk−1
553
+ j
554
+ ] under uk−1. Now set CY,k
555
+ i
556
+ (t) = �
557
+ j′∈Y cuk
558
+ i,j′(t)
559
+ and CY,k−1
560
+ i
561
+ (t) = �
562
+ j′∈Y cuk−1
563
+ i,j′ (t). These are the total consumption rates at time t of agent i for items
564
+ in Y under under uk and uk−1, respectively. We claim that CY,k
565
+ i
566
+ (t) ≤ CY,k−1
567
+ i
568
+ (t) for t ∈ [0, tk−1
569
+ j
570
+ ].
571
+ To prove this, recall that, for t ∈ [0, tk
572
+ j ], r(uk)(t) ⊆ r(uk−1)(t). Furthermore, r(uk−1)(t)\r(uk)(t) ⊆ Y .
573
+ Denoting r(uk)(t) = R1 and r(uk−1)(t) = R2, and
574
+ � �
575
+ ℓ∈R2
576
+ vi(j′)
577
+ �� �
578
+ j′∈R1
579
+ vi(j′)
580
+
581
+ = R3 we obtain:
582
+ 8
583
+
584
+ CY,k−1
585
+ i
586
+ (t) − CY,k
587
+ i
588
+ (t)
589
+ =
590
+
591
+ j′∈Y ∩R2
592
+ vi(j′)
593
+
594
+ j∗∈R2 vi(j∗) −
595
+
596
+ j′∈Y ∩R1
597
+ vi(j′)
598
+
599
+ j∗∈R1 vi(j∗)
600
+ =
601
+
602
+ j′∈Y ∩R2
603
+ vi(j′)
604
+
605
+ j′∈R2
606
+ vi(j′)
607
+
608
+
609
+ j′∈Y ∩R1
610
+ vi(j′)
611
+
612
+ j′∈R1
613
+ vi(j′)
614
+ =
615
+
616
+
617
+ j′∈Y ∩R2
618
+ vi(j′)
619
+ � �
620
+
621
+ j′∈R1
622
+ vi(j′)
623
+
624
+
625
+
626
+
627
+ j′∈Y ∩R1
628
+ vi(j′)
629
+ � �
630
+
631
+ j′∈R2
632
+ vi(j′)
633
+
634
+
635
+
636
+ j′∈R2
637
+ vi(j′)
638
+ � �
639
+
640
+ j′∈R1
641
+ vi(j′)
642
+
643
+ =
644
+
645
+
646
+ j′∈Y ∩(R2\R1)
647
+ vi(j′) +
648
+
649
+ j′∈Y ∩(R1∩R2)
650
+ vi(j′)
651
+
652
+
653
+ j′∈R1
654
+ vi(j′) −
655
+
656
+ j′∈Y ∩R1
657
+ vi(j′)
658
+
659
+
660
+ j′∈R2\R1
661
+ vi(j′) +
662
+
663
+ j′∈R1∩R2
664
+ vi(j′)
665
+
666
+
667
+
668
+ j′∈R2
669
+ vi(j′)
670
+ � �
671
+
672
+ j′∈R1
673
+ vi(j′)
674
+
675
+ But R1 ⊆ R2 and R2 \ R1 ⊆ Y . So we have
676
+ CY,k−1
677
+ i
678
+ (t) − CY,k
679
+ i
680
+ (t)
681
+ =
682
+
683
+
684
+ j′∈R2\R1
685
+ vi(j′) +
686
+
687
+ j′∈Y ∩R1
688
+ vi(j′)
689
+
690
+
691
+ j′∈R1
692
+ vi(j′) −
693
+
694
+ j′∈Y ∩R1
695
+ vi(j′)
696
+
697
+
698
+ j′∈R2\R1
699
+ vi(j′) + �
700
+ j′∈R1
701
+ vi(j′)
702
+
703
+ ��
704
+
705
+ j′∈R2
706
+ vi(j′)
707
+ � �
708
+
709
+ j′∈R1
710
+ vi(j′)
711
+
712
+ =
713
+
714
+
715
+ j′∈R2\R1
716
+ vi(j′)
717
+ � �
718
+
719
+ j′∈R1
720
+ vi(j′)
721
+
722
+
723
+
724
+
725
+ j′∈Y ∩R1
726
+ vi(j′)
727
+ � �
728
+
729
+ j′∈R2\R1
730
+ vi(j′)
731
+
732
+
733
+
734
+ j′∈R2
735
+ vi(j′)
736
+ � �
737
+
738
+ j′∈R1
739
+ vi(j′)
740
+
741
+ =
742
+
743
+
744
+ j′∈R2\R1
745
+ vi(j′)
746
+ � �
747
+
748
+ j′∈R1\Y
749
+ vi(j′)
750
+
751
+
752
+
753
+ j′∈R2
754
+ vi(j′)
755
+ � �
756
+
757
+ j′∈R1
758
+ vi(j′)
759
+
760
+ ≥ 0
761
+ By definition of Y , every item in Y has consumption time earlier than j under uk. However, before
762
+ the consumption time tk
763
+ j of j under uk, the total consumption rate of all the items in Y is at least
764
+ as large under uk−1 than under uk. Therefore at consumption time tk−1
765
+ j
766
+ of j under uk−1 not every
767
+ 9
768
+
769
+ item of Y has been consumed under uk. In particular, j itself has not been consumed by then
770
+ under uk. So, j is consumed faster in uk−1 than in uk.
771
+ We iterate this argument with k −1 until we get k = 0 and we have computed u0 = ˆuj in which
772
+ only j has non-0 value. This implies that u0 = ˆuj as desired.
773
+ The consumption time of each item in the Nash equilibrium will be denoted as the time tj =
774
+ tj(v). For convenience we denote t0 = 0. Without loss of generality, we relabel the items so that tj
775
+ is increasing with j.
776
+ Let’s now prove the second property.
777
+ Lemma 4.2. Let v be a pure Nash equilibrium. Take any agent i and any item j. The consumption
778
+ time of item j decreases by at most 75% if agent i switches to the single-minded strategy ˆuj, that
779
+ is ˜tj ≥ 1
780
+ 4 · tj.
781
+ Proof. Assume that �
782
+ i′̸=i cˆuj
783
+ i′,j(t) < 1 for any time t.
784
+ Then qˆuj
785
+ i (t)
786
+ � 1
787
+ 2
788
+
789
+ > 0 which implies that
790
+ ˜tj > 1
791
+ 2 ≥ 1
792
+ 4tj. So we may assume there is a smallest time τ such that �
793
+ i′̸=i cˆuj
794
+ i′,j(τ) ≥ 1. We now
795
+ have two cases.
796
+ Case I: τ ≥ 1
797
+ 4tj
798
+ By definition, the total consumption rate of item j is positive at time τ. Thus, item j is still
799
+ available at time 1
800
+ 4tj. Consequently ˜tj ≥ 1
801
+ 4tj.
802
+ Case II: τ < 1
803
+ 4tj
804
+ Agent i has a consumption rate 1 for item j under ˆuj until its consumption time. Note that before
805
+ its consumption time the total consumption rate for j is non-decreasing. In particular, before τ
806
+ (phase 1) the total consumption rate of the other agents for j is at most 1. After τ (phase 2) the
807
+ total consumption rate of the other agents for j is at least 1.
808
+ Then agent i consumes τ units of good j in phase 1. In phase 2, the other agents consume j
809
+ at least as fast as i. Thus agent i consumes at most half the remaining amount of good j, which is
810
+ obviously at most 1
811
+ 2. So agent i gets at most 1
812
+ 4tj + 1
813
+ 2 units of good j. This implies the other agents
814
+ get at least 1
815
+ 2 − 1
816
+ 4tj units of good j.
817
+ Recall from the proof of Lemma 4.1 that r(v)(t) = r(u|X|)(t) ⊆ r(u0)(t) = r(ˆuj)(t) for any time
818
+ t ≤ tj(ˆuj, v−i), that is before the consumption time of item j under ˆuj. This implies that, at
819
+ each point in time, the total consumption rate at which the agents (excluding i) consume item j
820
+ is smaller under ˆuj than under v. In particular, if it takes time t(α) for the agents excluding i to
821
+ consume α units of item j under v then it will take at least t(α) for them to consume α units of j
822
+ under ˆuj. Moreover, recall cv
823
+ i′,j(t) is non-decreasing. Thus, for any β ∈ (0, 1), the time it takes the
824
+ agents excluding i to consume β · α units of good j under v is at least β · t(α).
825
+ Furthermore, if α is the amount of good j that the agents excluding i consume under v then
826
+ t(α) = tj(v). Now set β =
827
+ 1
828
+ 2 − 1
829
+ 4 tj(v)
830
+ α
831
+ . Then because 1
832
+ α ≥ 1 and 1
833
+ 4tj(v) ≤ 1
834
+ 4 we have that β ≥ 1
835
+ 4.
836
+ Moreover, since α ≥ 1
837
+ 2 − 1
838
+ 4tj(v), we have β ≤ 1. Hence the agents excluding i consume at least
839
+ α · β = 1
840
+ 2 − 1
841
+ 4tj(v) units in time tj(ˆuj) under ˆuj and they consume α units in time tj(v) under v.
842
+ Thus
843
+ tj(ˆuj) ≥ t(βα) ≥ βt(α) = βtj(v)
844
+ 10
845
+
846
+ and since β ≥ 1
847
+ 4 we have:
848
+ βtj(v) ≥ 1
849
+ 4tj(v).
850
+ Thus tj(ˆuj) ≥ 1
851
+ 4tj(v) as desired.
852
+ 4.2
853
+ Sequential Bidding
854
+ Unfortunately, consideration of deviations to single-minded bidding strategies is insufficient to
855
+ prove a good price of anarchy bound for the Cardinal Probabilistic Serial mechanism. Indeed, this
856
+ is intuitively obvious. If an agent wins many items in the optimal solution to the allocation problem
857
+ then a strategy that targets a single item will likely to do very poorly in comparison.
858
+ To circumvent this problem, we consider a second class of strategies, which we term sequential
859
+ bidding. The idea is that an agent has a target set X = {x1, x2, . . . , xk} and, moreover, requests
860
+ to consume the items one-at-a-time in the given order. However, the Cardinal Probabilistic Serial
861
+ is not perfectly compatible with such a sequential request. But it does allow the agents to mimic
862
+ such a strategy with arbitrary precision. To see this, given a finite sequence X = {x1, . . . , xk} and
863
+ ε ∈
864
+
865
+ 0, 1
866
+ 2
867
+
868
+ , define the epsilon-valuation ˆuε
869
+ X to be 1 − �k−1
870
+ ℓ=1 εℓ if j = x1, εℓ if j = xℓ for ℓ > 1, and 0
871
+ if j /∈ X.
872
+ Then, given a finite sequence X, we can define the sequential bidding strategy ˆuX = limε→0 ˆuε
873
+ X.
874
+ Under this sequential bidding strategy, at any time t, the agent will consume the first item in X
875
+ that has not yet been entirely consumed. We defer a formal mathematical justification for the
876
+ validity of this construction to Appendix A.
877
+ 4.3
878
+ A Technical Lemma
879
+ Using the two properties we obtained for single-minded bidding, we can analyse the consequences
880
+ of deviating to a sequential bidding strategy. Specifically, we prove the following technical lemma.
881
+ Lemma 4.3. For any agent i, let v′
882
+ i be the true value i has for the items and let v be any pure
883
+ Nash equilibrium with respect to v′. Then, for any sequence of items X = {x1, x2, . . . , xk}, it holds
884
+ that:
885
+ CPS(v′
886
+ i; v) ≥ 1
887
+ 4 ·
888
+ k
889
+
890
+ ℓ=1
891
+ (txℓ − txℓ−1) · v′
892
+ i(xℓ).
893
+ Proof. Recall that we have:
894
+ • tℓ: consumption time of item xℓ in the Nash Equilibrium v.
895
+ • ˜tℓ: consumption time of item xℓ in (ˆuX, v−i) if i where i makes a sequential bid for X.
896
+ We additionally denote the consumption time of item j when an agent switches to a sequential
897
+ strategy as ˆtj = tj(ˆuX, v−i). Moreover, for convenience we denote ˆt0 = 0.
898
+ By Lemma 4.1 we have ˜tj ≥ ˆtℓ. By Lemma 4.2 we have ˆtℓ ≥ 1
899
+ 4tℓ. Therefore, ˜tj ≥ 1
900
+ 4tℓ. Now
901
+ recall, under the strategy ˆuX, the items of X = {x1, x2, . . . , xk} are ordered in decreasing order of
902
+ value for agent i. This means that before time ˜tℓ the agent consumes an item whose value is at
903
+ 11
904
+
905
+ least v′
906
+ i(xℓ). In particular, because ˜tj ≥ 1
907
+ 4tj, if tℓ−1 ≤ tℓ then during the interval [1
908
+ 4tℓ−1, 1
909
+ 4tℓ] agent
910
+ i consumes an item of value at least v′
911
+ i(xℓ). Therefore, agent i has a payoff of
912
+ CPS(v′; {ˆuX, v−i}) ≥
913
+ k
914
+
915
+ ℓ=1
916
+ max
917
+ �1
918
+ 4tℓ − 1
919
+ 4tℓ−1 , 0
920
+
921
+ · v′
922
+ i(xℓ)
923
+ ≥ �k
924
+ ℓ=1
925
+ � 1
926
+ 4tℓ − 1
927
+ 4tℓ−1
928
+
929
+ · v′
930
+ i(xℓ) ≥ 1
931
+ 4 · �k
932
+ ℓ=1 (tℓ − tℓ−1) · v′
933
+ i(xℓ)
934
+ As v is a Nash equilibrium, it must also give agent i a payoff of at least 1
935
+ 4·�k
936
+ i=1 (tℓ − tℓ−1)·v′
937
+ i(xℓ).
938
+ 5
939
+ The Price of Anarchy
940
+ We are now ready to quantify the price of anarchy. We begin with the upper bound. We will then
941
+ present a near-matching lower bound.
942
+ 5.1
943
+ Upper Bound on the Price of Anarchy
944
+ For an upper bound we formulate the price of anarchy as an optimization program. This optimiza-
945
+ tion program is very difficult to handle directly. So our basic approach will be to apply a series
946
+ of relaxations and simplifications until we obtain a program we can solve. The task is to ensure
947
+ the transformations are consistent with generating upper bounds and that they do not degrade the
948
+ value of the objective function excessively. So let’s now prove our main result.
949
+ Theorem 3.3. For the one-sided allocation problem with multi-unit demand agents, the price of
950
+ anarchy of Cardinal Probabilistic Serial is O(√n · log n).
951
+ Proof of Theorem 3.3. Let {X1, X2, . . . , Xn} be the optimal allocation, where each agent i receives
952
+ the bundle of items Xi =
953
+
954
+ xi
955
+ 1, . . . , xi
956
+ ki
957
+
958
+ . Here we assume the items in Xi are ordered by increasing
959
+ consumption time in the Nash equilibrium v. We can then use Lemma 4.3 to lower bound the social
960
+ welfare of the Nash equilibrium v. To do this first note that, whilst the items of Xi are ordered by
961
+ consumption time they are not ordered by value. In particular, for the lower bound in Lemma 4.3
962
+ we may use the right-to-left maxima of {v′
963
+ i(xi
964
+ 1), v′
965
+ i(xi
966
+ 2), . . . , v′
967
+ i(xi
968
+ ki)}. This gives a lower bound on
969
+ the social welfare of the Nash equilibrium v of:
970
+ 1
971
+ 4
972
+ n
973
+
974
+ i=1
975
+ ki
976
+
977
+ ℓ=1
978
+
979
+ max
980
+ ℓ′=ℓ,...,ki
981
+
982
+ v′
983
+ i(xℓ′)
984
+
985
+ · (txi
986
+ ℓ(v) − txi
987
+ ℓ−1(v))
988
+
989
+ 12
990
+
991
+ We may then bound the price of anarchy using the following optimization program:
992
+ min
993
+ 1
994
+ 4 · �n
995
+ i=1
996
+ �ki
997
+ ℓ=1
998
+
999
+ maxℓ′=ℓ,...,ki {v′
1000
+ i(xℓ′)} · (txi
1001
+ ℓ(v) − txi
1002
+ ℓ(v))
1003
+
1004
+ OPT
1005
+ (1)
1006
+ s.t.
1007
+ n
1008
+
1009
+ i=1
1010
+ ki
1011
+
1012
+ ℓ=1
1013
+ v′
1014
+ i,xi
1015
+ ℓ =
1016
+ OPT
1017
+ (2)
1018
+ n�
1019
+ i=1
1020
+
1021
+ xi
1022
+ ℓ : ℓ ∈ [ki]
1023
+
1024
+ =
1025
+ [n]
1026
+ (3)
1027
+ n
1028
+
1029
+ j=1
1030
+ v′
1031
+ i(j) =
1032
+ 1
1033
+ ∀i ∈ [n]
1034
+ (4)
1035
+ n
1036
+
1037
+ j=1
1038
+ vi(j) =
1039
+ 1
1040
+ ∀i ∈ [n]
1041
+ (5)
1042
+ tj(v) ≤
1043
+ tj+1(v)
1044
+ ∀j ∈ [n − 1]
1045
+ (6)
1046
+ v ∈
1047
+ NE(v′)
1048
+ (7)
1049
+ Let’s understand this optimization program. Constraints (4) and (5) state that for every agent
1050
+ v′
1051
+ i and vi are unit-sum valuation functions. Constraints (2) and (3) ensure {X1, X2, . . . , Xn} is a
1052
+ partition of the items with optimal social welfare (with respect to the true valuation functions v′).
1053
+ Next the constraint (6) forces the items to be ordered by increasing consumption time. Finally,
1054
+ the constraint (7) states that v is a Nash equilibrium with respect to the true valuations v′. The
1055
+ objective function (1) then gives a worst-case bound on the price of anarchy using Lemma 4.3.
1056
+ However, this optimization program is difficult to analyze so our task now is to simplify the
1057
+ program without weakening the resultant price of anarchy guarantee. To do this, our first step
1058
+ is to fix OPT, the social welfare of the optimal solution. (We will later determine the worst case
1059
+ values of OPT.) In doing so we may omit the denominator from the objective function (1). Second,
1060
+ observe that the bound can only be worse if we relax or remove some of the constraints from the
1061
+ optimization program. In particular, let’s omit the Nash equilibrium constraint (7). This gives:
1062
+ min
1063
+ 1
1064
+ 4 ·
1065
+ n
1066
+
1067
+ i=1
1068
+ ki
1069
+
1070
+ ℓ=1
1071
+
1072
+ max
1073
+ ℓ′=ℓ,...,ki
1074
+
1075
+ v′
1076
+ i(xℓ′)
1077
+
1078
+ · (txi
1079
+ ℓ(v) − txi
1080
+ ℓ(v))
1081
+
1082
+ (8)
1083
+ s.t.
1084
+ n
1085
+
1086
+ i=1
1087
+ ki
1088
+
1089
+ ℓ=1
1090
+ v′
1091
+ i,xi
1092
+ ℓ =
1093
+ OPT
1094
+ n�
1095
+ i=1
1096
+
1097
+ xi
1098
+ ℓ : ℓ ∈ [ki]
1099
+
1100
+ =
1101
+ [n]
1102
+ n
1103
+
1104
+ j=1
1105
+ v′
1106
+ i(j) =
1107
+ 1
1108
+ ∀i ∈ [n]
1109
+ n
1110
+
1111
+ j=1
1112
+ vi(j) =
1113
+ 1
1114
+ ∀i ∈ [n]
1115
+ tj(v) ≤
1116
+ tj+1(v)
1117
+ ∀j ∈ [n − 1]
1118
+ 13
1119
+
1120
+ The reader may ask if removing the Nash equilibrium constraint (7) will then render the opti-
1121
+ mization program useless. As we will see, the answer is no because implicitly the Nash equilibrium
1122
+ conditions have been used in deriving the objective function. Now note that maxℓ′=ℓ,...,ki {v′
1123
+ i(xℓ′)} ≥
1124
+ v′
1125
+ i(xℓ). Thus after removing the Nash equilibrium constraint we may now assume in the worst case
1126
+ that the items of Xi are also ordered in decreasing value. That is, the items of Xi =
1127
+
1128
+ xi
1129
+ 1, . . . , xi
1130
+ ki
1131
+
1132
+ decrease in both consumption time and in value. Adding this new constraint (11) then gives the
1133
+ program
1134
+ min
1135
+ 1
1136
+ 4 ·
1137
+ n
1138
+
1139
+ i=1
1140
+ ki
1141
+
1142
+ ℓ=1
1143
+
1144
+ v′
1145
+ i(xℓ) · (txi
1146
+ ℓ(v) − txi
1147
+ ℓ(v))
1148
+
1149
+ (9)
1150
+ s.t.
1151
+ n
1152
+
1153
+ i=1
1154
+ ki
1155
+
1156
+ ℓ=1
1157
+ v′
1158
+ i,xi
1159
+ ℓ =
1160
+ OPT
1161
+ n�
1162
+ i=1
1163
+
1164
+ xi
1165
+ ℓ : ℓ ∈ [ki]
1166
+
1167
+ =
1168
+ [n]
1169
+ n
1170
+
1171
+ j=1
1172
+ v′
1173
+ i(j) =
1174
+ 1
1175
+ ∀i ∈ [n]
1176
+ ki
1177
+
1178
+ ℓ=1
1179
+ vi(xi
1180
+ ℓ) ≤
1181
+ 1
1182
+ ∀i ∈ [n]
1183
+ (10)
1184
+ tj(v) ≤
1185
+ tj+1(v)
1186
+ ∀j ∈ [n − 1]
1187
+ vi(xi
1188
+ ℓ) ≥
1189
+ vi(xi
1190
+ ℓ+1)
1191
+ ∀i ∈ [n], ∀ℓ ∈ [ki]
1192
+ (11)
1193
+ Note above that we may replace the unit-sum condition (5) on vi by a constraint (10) only on the
1194
+ values of items in Xi.
1195
+ For the next step, for each agent i we use a change of variables to {yi
1196
+ 1, yi
1197
+ 2 . . . , yi
1198
+ ki}. Specifically,
1199
+ set yi
1200
+ ki = ki·v′
1201
+ i(xi
1202
+ ki). Then, recursively, set yi
1203
+ ℓ = ℓ·
1204
+
1205
+ v′
1206
+ i(xi
1207
+ ℓ) − v′
1208
+ i(xi
1209
+ ℓ+1)
1210
+
1211
+ , for each ℓ = {ki−1, . . . , 2, 1}.
1212
+ Observe that
1213
+ ki
1214
+
1215
+ ℓ=1
1216
+ yi
1217
+ ℓ =
1218
+ ki
1219
+
1220
+ ℓ=1
1221
+ ki · v′
1222
+ i(xi
1223
+ ki) =
1224
+ ki
1225
+
1226
+ ℓ=1
1227
+ v′
1228
+ i(xi
1229
+ ℓ)
1230
+ In particular, the yi
1231
+ ℓ are non-negative and sum to at most one.
1232
+ Moreover, we have v′
1233
+ i(x(i)
1234
+ ℓ ) =
1235
+ �k
1236
+ ℓ′=ℓ
1237
+ yi
1238
+ ℓ′
1239
+ ℓ′ . Thus we have
1240
+ n
1241
+
1242
+ i=1
1243
+ ki
1244
+
1245
+ ℓ=1
1246
+
1247
+ v′
1248
+ i,xi
1249
+ ℓ ·
1250
+
1251
+ txi
1252
+ ℓ(v) − txi
1253
+ ℓ−1(v)
1254
+ ��
1255
+ =
1256
+ n
1257
+
1258
+ i=1
1259
+ ki
1260
+
1261
+ ℓ=1
1262
+ � ki
1263
+
1264
+ ℓ′=ℓ
1265
+ yi
1266
+ ℓ′
1267
+ ℓ′ ·
1268
+
1269
+ txi
1270
+ ℓ − txi
1271
+ ℓ−1
1272
+ ��
1273
+ =
1274
+ n
1275
+
1276
+ i=1
1277
+ ki
1278
+
1279
+ ℓ′=1
1280
+ yi
1281
+ ℓ′
1282
+ ℓ′
1283
+ ℓ′
1284
+
1285
+ ℓ=1
1286
+
1287
+ txi
1288
+ ℓ − txi
1289
+ ℓ−1
1290
+
1291
+ =
1292
+ n
1293
+
1294
+ i=1
1295
+ ki
1296
+
1297
+ ℓ′=1
1298
+ �yi
1299
+ ℓ′
1300
+ ℓ′ · txi
1301
+ ℓ′
1302
+
1303
+ 14
1304
+
1305
+ So, relabelling ℓ′ as ℓ, we obtain the optimization program:
1306
+ min
1307
+ n
1308
+
1309
+ i=1
1310
+ ki
1311
+
1312
+ ℓ=1
1313
+ �yi
1314
+
1315
+ ℓ · txi
1316
+
1317
+
1318
+ (12)
1319
+ s.t.
1320
+ n
1321
+
1322
+ i=1
1323
+ ki
1324
+
1325
+ ℓ=1
1326
+ yi
1327
+ ℓ =
1328
+ OPT
1329
+ (13)
1330
+ n�
1331
+ i=1
1332
+
1333
+ xi
1334
+ ℓ : ℓ ∈ [ki]
1335
+
1336
+ =
1337
+ [n]
1338
+ ki
1339
+
1340
+ ℓ=1
1341
+ yi
1342
+ ℓ ≤
1343
+ 1
1344
+ ∀i ∈ [n]
1345
+ (14)
1346
+ yi
1347
+ ℓ ≥
1348
+ 0
1349
+ ∀i ∈ [n], ∀ℓ ∈ [ki]
1350
+ (15)
1351
+ tj(v) ≤
1352
+ tj+1(v)
1353
+ ∀j ∈ [n − 1]
1354
+ Observe above that, for simplicity, we have removed the factor 1
1355
+ 4 from the objective function (12).
1356
+ We will reincorporate it later.
1357
+ Let’s now investigate the structure of the optimal solution to this program. We claim that,
1358
+ for each agent i, only one yi
1359
+ ℓ need be positive. To see this, assume yi
1360
+ ℓ > 0 and yi
1361
+ ℓ′ > 0 for ℓ ̸= ℓ′.
1362
+ Without loss of generality, let
1363
+ txi
1364
+
1365
+
1366
+
1367
+ txi
1368
+ ℓ′
1369
+ ℓ′ . Then replacing yi
1370
+ ℓ by yi
1371
+ ℓ + yi
1372
+ ℓ′ and replacing yi
1373
+ ℓ′ by 0
1374
+ decreases (or keeps constant) the objective function. We may enforce this by adding a constraint
1375
+ denoting ℓi to be the index which minimizes
1376
+ txi
1377
+
1378
+ ℓ .
1379
+ min
1380
+ n
1381
+
1382
+ i=1
1383
+
1384
+ yi
1385
+ ℓ ·
1386
+ txi
1387
+
1388
+ ℓi
1389
+
1390
+ (16)
1391
+ s.t.
1392
+ n
1393
+
1394
+ i=1
1395
+ ki
1396
+
1397
+ ℓ=1
1398
+ yi
1399
+ ℓ =
1400
+ OPT
1401
+ n�
1402
+ i=1
1403
+
1404
+ xi
1405
+ ℓ : ℓ ∈ [ki]
1406
+
1407
+ =
1408
+ [n]
1409
+ ℓi =
1410
+ argmaxℓ∈[ki]
1411
+ txi
1412
+
1413
+
1414
+ ∀i
1415
+ (17)
1416
+ yi
1417
+ ℓi ≤
1418
+ 1
1419
+ ∀i ∈ [n]
1420
+ (18)
1421
+ yi
1422
+ ℓi ≥
1423
+ 0
1424
+ ∀i ∈ [n]
1425
+ (19)
1426
+ tj(v) ≤
1427
+ tj+1(v)
1428
+ ∀j ∈ [n − 1]
1429
+ We may now apply a similar trick over pairs of agents.
1430
+ Assume there are two agents i, i′ and
1431
+ two indices ℓi, ℓi′ such that both yi
1432
+ ℓi and yi′
1433
+ ℓi′ are non-integral, that is, yi
1434
+ ℓi ∈ (0, 1) and yi′
1435
+ ℓi′ ∈ (0, 1).
1436
+ Without loss of generality, let
1437
+ txi
1438
+ ℓi
1439
+ ℓi ≤
1440
+ txi′
1441
+ ℓi′
1442
+ ℓ′
1443
+ i′ . Then replacing yi
1444
+ ℓi by yi
1445
+ ℓi′ +δ and replacing yi′
1446
+ ℓi′ by yi′
1447
+ ℓi′ −δ,
1448
+ for some small δ, decreases (or keeps constant) the objective function. Note that this is a feasible
1449
+ change because constraint (13) is remains tight and constraints (18) and (19) still hold. Moreover,
1450
+ 15
1451
+
1452
+ setting δ = min
1453
+
1454
+ 1 − yi
1455
+ ℓi, yi′
1456
+ ℓi′
1457
+
1458
+ forces either yi
1459
+ ℓi or yi′
1460
+ ℓi′ to become integral. But this implies there is
1461
+ an optimal solution in which exactly one yi
1462
+ ℓi is non-integral.
1463
+ In particular, let k = ⌊OPT⌋. Then we may relabel the agents so that yi
1464
+ ℓi = 1 for each 1 ≤ i ≤ k,
1465
+ yi
1466
+ ℓk+1 = OPT − k, and yi
1467
+ ℓi = 0 for each k + 2 ≤ i ≤ n. Thus our problem simplifies to:
1468
+ min
1469
+ k
1470
+
1471
+ i=1
1472
+ txi
1473
+ ℓi
1474
+ ℓi
1475
+ + (OPT − k) ·
1476
+ txk+1
1477
+ ℓk+1
1478
+ ℓk+1
1479
+ s.t.
1480
+ n�
1481
+ i=1
1482
+
1483
+ xi
1484
+ ℓ : ℓ ∈ [ki]
1485
+
1486
+ =
1487
+ [n]
1488
+ Of course, we can further reduce the objective function by removing its second term. This gives:
1489
+ min
1490
+ k
1491
+
1492
+ i=1
1493
+ txi
1494
+ ℓi
1495
+ ℓi
1496
+ s.t.
1497
+ n�
1498
+ i=1
1499
+
1500
+ xi
1501
+ ℓ : ℓ ∈ [ki]
1502
+
1503
+ =
1504
+ [n]
1505
+ To evaluate this, recall that the items are labelled in increasing order of consumption time.
1506
+ These consumption times then satisfy the following property.
1507
+ Lemma 5.1. The consumption time of item j must satisfy tj ≥ j
1508
+ n.
1509
+ Proof. Each agent has a total consumption rate of 1. Consequently, the total consumption rate of
1510
+ all agents is n. Thus at time t = j
1511
+ n the number of units consumed of all goods is exactly j. But the
1512
+ quantity of each good is each is exactly 1, so at most j goods can have been completely consumed
1513
+ at time t = j
1514
+ n. Hence the consumption time of good j is tj ≥ j
1515
+ n.
1516
+ Next we partition the agents into groups depending upon their ℓi.
1517
+ Specifically, let Iτ =
1518
+
1519
+ i ∈ [k] : ℓi ∈ [2τ, 2τ+1)
1520
+
1521
+ for all 0 ≤ τ ≤ ⌈log n⌉.
1522
+ Further, for each agent i ≤ k we let Ti be
1523
+ the consumption time of xi
1524
+ ℓi. We then order the agents of Iτ by increasing Ti. We use the notation
1525
+
1526
+ q to denote the qth agent of Iτ in this ordering.
1527
+ In particular, by the time xi
1528
+ ℓi is consumed for i = iτ
1529
+ q, at least 2τ · q items have been consumed.
1530
+ Thus, by Lemma 5.1, the consumption time of this item is tx
1531
+
1532
+ iτq
1533
+ iτq
1534
+ ≥ 2τ·q
1535
+ n . In particular,
1536
+ t
1537
+ x
1538
+ iτq
1539
+ ℓiτq
1540
+ ℓiτq
1541
+ ≥ 2τ · q
1542
+ n
1543
+ · 1
1544
+ ℓiτq
1545
+ ≥ 2τ · q
1546
+ n
1547
+ ·
1548
+ 1
1549
+ 2τ+1 =
1550
+ q
1551
+ 2n
1552
+ (20)
1553
+ 16
1554
+
1555
+ We can now obtain a useful bound on the value of the optimization program.
1556
+ k
1557
+
1558
+ i=1
1559
+ txi
1560
+ ℓi
1561
+ ℓi
1562
+
1563
+ ⌈log n⌉
1564
+
1565
+ τ=0
1566
+ |Iτ|
1567
+
1568
+ q=1
1569
+ q
1570
+ 2n
1571
+ =
1572
+ ⌈log n⌉
1573
+
1574
+ τ=0
1575
+ |Iτ| · (|Iτ| + 1)
1576
+ 4n
1577
+
1578
+ 1
1579
+ 4n ·
1580
+ ⌈log n⌉
1581
+
1582
+ τ=0
1583
+ |Iτ|2
1584
+
1585
+ 1
1586
+ 4n ·
1587
+ max
1588
+ 0≤τ≤⌈log n⌉ |Iτ|2
1589
+
1590
+ 1
1591
+ 4n ·
1592
+
1593
+ k
1594
+ log n + 1
1595
+ �2
1596
+ =
1597
+ k2
1598
+ 4n log2 n + o (n log n)
1599
+ We are now ready to prove our price of anarchy upper bound.
1600
+ By applying Lemma 4.3, with
1601
+ X = [n], at any Nash equilibrium each agent is guaranteed a payoff of at least
1602
+ 1
1603
+ 4n. Thus the social
1604
+ welfare of any Nash equilibrium is at least 1
1605
+ 4. The price of anarchy is then at most
1606
+ max
1607
+ k∈[1,n]
1608
+
1609
+ min{k
1610
+ 1
1611
+ 4
1612
+ ,
1613
+ k
1614
+ 1
1615
+ 4 ·
1616
+ k2
1617
+ 4n log2 n+o(n log n)
1618
+ }
1619
+
1620
+ ≤ max
1621
+ k∈[1,n]
1622
+
1623
+ min
1624
+
1625
+ 4k , (16n log2 n + o (n log n))/k
1626
+ ��
1627
+ = 2√n · log n + o
1628
+ ��
1629
+ n log n
1630
+
1631
+ So, the price of anarchy of the Cardinal Probabilistic Serial mechanism is O (√n · log n).
1632
+ We remark that this proof is for pure Nash equilibria. However, as we show in Appendix B, the
1633
+ result extends to mixed Nash equilibria and to coarse correlated equilibria. Furthermore, mixed
1634
+ Nash equilibria and coarse correlated equilibria are guaranteed to exist in this model.
1635
+ 5.2
1636
+ Lower Bound of the Price of Anarchy
1637
+ For the lower bound, we verify that Theorem 3.2 extends to the one-side allocation problem with
1638
+ multi-unit demand agents.
1639
+ Theorem 5.2. For the one-side allocation problem, the pure price of anarchy of any unit-sum
1640
+ mechanism is Ω(√n).
1641
+ Proof Sketch. Consider the example used by Christodoulou et al. [10] to prove Theorem 3.2 for the
1642
+ matching problem. Take the following valuation function:
1643
+ vi(j) =
1644
+
1645
+ 1
1646
+ n + ε if i = j · √n + i′ for i′ = 1, . . . , √n
1647
+ 1
1648
+ n −
1649
+ ε
1650
+ n−1 otherwise
1651
+ 17
1652
+
1653
+ Now consider a Nash equilibrium for v. Let ij be the index of the agent who has positive value for
1654
+ item j but has the smallest probability of being assigned j in the Nash Equilibrium. Next, create
1655
+ a new valuation v′
1656
+ i(j) which is vi(j) if i ̸= ij′ for any j′ and which is 1 if i = ij and 0 if i = ij′ ̸= ij
1657
+ Since the agents get the same number of items in expectation, a Nash equilibrium for v is also a
1658
+ Nash equilibrium for v′ where the agents maximize their probability of getting their favorite item.
1659
+ The social welfare of the optimal allocation is √n. At the Nash equilibrium, since the agents ij get
1660
+ assigned j with probability at most
1661
+ 1
1662
+ √n, the social welfare is at most √n ·
1663
+ 1
1664
+ √n + √n ·
1665
+
1666
+ 1 −
1667
+ 1
1668
+ √n
1669
+
1670
+ ·
1671
+ � 1
1672
+ n + 1
1673
+ n3
1674
+
1675
+ ≤ 3. This gives a lower bound of Ω(√n) on the price of anarchy.
1676
+ 5.3
1677
+ Tightness of Proof Methodology
1678
+ We conjecture that the lower bound is tight; that is, that the price of anarchy is Θ(√n). Thus, we
1679
+ believe the log n term in Theorem 3.3 is superfluous. However, in Appendix C, we show that the
1680
+ tools utilized in this paper are not strong enough to prove such a result. Ergo, to prove a tight
1681
+ price of anarchy result the bounds one the value of each agent need to be (slightly) improved.
1682
+ 6
1683
+ The Price of Stability
1684
+ We obtain similar bounds for the price of stability.
1685
+ Theorem 6.1. For the one-sided allocation problem with multi-unit demand agents, the price of
1686
+ stability of of Cardinal Probabilistic Serial is at least Ω(√n) and at most O(√n · log n).
1687
+ Here the upper bound follows immediately from our price of anarchy bound. The lower bound
1688
+ is given in Appendix D.
1689
+ 7
1690
+ Conclusion
1691
+ We studied a cardinal variant of the Probablistic Serial mechanism and provided corresponding
1692
+ lower and upper bounds on the price of anarchy for the one-sided allocation problem with multi-unit
1693
+ demand agents. Removing the logarithmic gap between these bounds is a natural open problem.
1694
+ Another interesting line of research is to study whether these results can be extended to agents
1695
+ with non-additive valuation functions.
1696
+ References
1697
+ [1] A. Abdulkadirogl and T. Sonmez.
1698
+ Random serial dictatorship and the core from random
1699
+ endowments in house allocation problems. Econometrica, 66(3):689–701, 1998.
1700
+ [2] A. Abdulkadirogl and T. Sonmez.
1701
+ Matching Markets: Theory and Practice, volume 1 of
1702
+ Econometric Society Monographs, page 3–47. Cambridge University Press, 2013.
1703
+ [3] I. Ashlagi, A. Saberi, and A. Shameli. Assignment mechanisms under distributional constraints.
1704
+ Operations Research, 68(2):467–479, 2020.
1705
+ 18
1706
+
1707
+ [4] H. Aziz, S. Gaspers, S. Mackenzie, N. Mattei, N. Narodytska, and T. Walsh. Equilibria under
1708
+ the probabilistic serial rule.
1709
+ In Proceedings of 24th International Conference on Artificial
1710
+ Intelligence (AAAI), pages 1105–1112, 2015.
1711
+ [5] H. Aziz, S. Gaspers, S. Mackenzie, N. Mattei, N. Narodytska, and T. Walsh. Manipulating
1712
+ the probabilistic serial rule.
1713
+ In Proceeding of Autonomous Agents and Multiagent Systems
1714
+ International Conference (AAMAS), pages 1451–1459, 2015.
1715
+ [6] A. Bogomolnaia and H. Moulin. A new solution to the random assignment problem. Journal
1716
+ of Economic Theory, 100(2):295–328, 2001.
1717
+ [7] C. Boutilier, I. Caragiannis, S. Haber, T. Lu, A. Procaccia, and O. Sheffet. Optimal social
1718
+ choice functions: a utilitarian view. In Proceedings of 13th Conference on Electronic Commerce
1719
+ (EC), pages 197–214, 2013.
1720
+ [8] E. Budish, Y. Che, F. Kojima, and P. Milgrom. Designing random allocation mechanisms:
1721
+ Theory and applications. The American Economic Review, 103(2):585–623, 2013.
1722
+ [9] I. Caragiannis, C. Kaklamanis, P. Kanellopoulos, and M. Kyropoulou. The efficiency of fair
1723
+ division. Theory of Computing Systems, 50(4):589–610, 2012.
1724
+ [10] G. Christodoulou, A. Filos-Ratsikas, S. Frederiksen, P. Goldberg, J. Zhang, and J. Zhang.
1725
+ Social welfare in one-sided matching mechanisms. In Nardine Osman and Carles Sierra, ed-
1726
+ itors, Proceeding of Autonomous Agents and Multiagent Systems International Conference
1727
+ (AAMAS), pages 30–50, 2016.
1728
+ [11] O Ekici and O. Kesten. An equilibrium analysis of the probabilistic serial mechanism. Inter-
1729
+ national Journal of Game Theory, 2016.
1730
+ [12] A. Filos-Ratsikas, S. Frederiksen, and J. Zhang. Social welfare in one-sided matchings: Random
1731
+ priority and beyond.
1732
+ In Ron Lavi, editor, Proceedings of 7th International Symposium on
1733
+ Algorithmic Game Theory (SAGT), pages 1–12, Berlin, Heidelberg, 2014. Springer Berlin
1734
+ Heidelberg.
1735
+ [13] A. Hylland and R. Zeckhauser. The efficient allocation of individuals to positions. Journal of
1736
+ Political Economy, 87(2):293–314, 1979.
1737
+ [14] A. Katta and J. Sethuraman.
1738
+ A solution to the random assignment problem on the full
1739
+ preference domain. Journal of Economic Theory, 131(1):231–250, 2006.
1740
+ [15] A. Procaccia and M. Tennenholtz. Approximate mechanism design without money. In Pro-
1741
+ ceedings of 10th Conference on Electronic Commerce (EC), pages 177–186, 2009.
1742
+ [16] T. Sonmez and U. Unver. Matching, allocation and exchange of discrete resources. volume 1
1743
+ of Handbook of Social Economics, pages 781–852. North-Holland, 2011.
1744
+ [17] J. Zhang. Tight social welfare approximation of probabilistic serial. Theoretical Computer
1745
+ Science, 934:1–6, 2022.
1746
+ [18] L. Zhou. On a conjecture by gale about one-sided matching problems. Journal of Economic
1747
+ Theory, 52(1):123–135, 1990.
1748
+ 19
1749
+
1750
+ A
1751
+ Appendix: Epsilon Strategies and Sequential Bidding
1752
+ In this section we show that an agent can mimic the sequential bidding strategy with arbitrary
1753
+ precision using epsilon-valuation strategies. Recall, given a sequence X of length k, the epsilon-
1754
+ strategy ˆuε
1755
+ X ∈ U is defined by
1756
+ ˆuε
1757
+ X(j) =
1758
+
1759
+
1760
+
1761
+
1762
+
1763
+ 1 − �k−1
1764
+ ℓ=1 εℓ
1765
+ if j = x1
1766
+ εℓ
1767
+ if j = xℓ
1768
+ 0
1769
+ otherwise
1770
+ The limit of the epsilon-strategy ˆuε
1771
+ X when ε → 0 is the sequential strategy ˆuX.
1772
+ Here we will
1773
+ formally justify allowing the sequential strategy in the mechanism.
1774
+ Lemma A.1. ∀i ∈ [n], ∀v ∈ V, ∀δ > 0, ∃ε > 0 such that CPS(v′
1775
+ i, (ˆuε
1776
+ X, v−i)) ≥ (1 − ε) ·
1777
+ CPS(v′
1778
+ i, (ˆuX, v−i)).
1779
+ That is, the payoff of the epsilon-strategy is within δ of the payoff of the
1780
+ sequential strategy.
1781
+ Proof. For convenience, in the proof we assume that the order of the items in the sequential strategy
1782
+ is the same as the completion time. If that is not the case for some item j, then compared to the
1783
+ case where i is using an epsilon-strategy, the difference between the amount consumed in both cases
1784
+ is at most ε while the difference between the amount consumed by the remaining agents is bounded
1785
+ by the difference between the consumption times of the items which precede, which is bounded by
1786
+ the rest of our proof.
1787
+ Let ∆j = tj − tj−1 with ∆1 = t1 in the sequential strategy. Let ∆′
1788
+ j = τj − τj−1 with ∆1 = τ1
1789
+ where τj is the consumption time of j in the epsilon-strategy. Let i′ be any agent and i be the
1790
+ agent that changes strategy.
1791
+ Then we have that for the sequential strategy:
1792
+ ∆j =
1793
+ 1 − �j−1
1794
+ j′=1 ∆j′ · (�n
1795
+ i′=1,i′̸=i
1796
+ vi′(j)
1797
+ 1−�j′
1798
+ ˜j=1 vi′(˜j))
1799
+ 1 + �
1800
+ i′̸=i
1801
+ vi′(j)
1802
+ 1−�j−1
1803
+ ˜j=1 vi′(˜j)
1804
+ .
1805
+ For the epsilon-strategy:
1806
+ ∆′
1807
+ j
1808
+ =
1809
+ 1 − �j−1
1810
+ j′=1 ∆′
1811
+ j′ · (�n
1812
+ i′=1,i′̸=i
1813
+ vi′(j)
1814
+ 1−�j′−1
1815
+ ˜j=1 vi′(˜j)) − �j−1
1816
+ j′=1 ∆′
1817
+ j′ · (εj−j′fj)
1818
+ fj + �
1819
+ i′̸=i
1820
+ vi′(j)
1821
+ 1−�j−1
1822
+ ˜j=1 vi′(˜j)
1823
+ ,
1824
+ where
1825
+ fj =
1826
+ εj
1827
+ 1 − 1 + �k
1828
+ j′=1 εj′ − �j−1
1829
+ j′=1 εj′ =
1830
+ 1
1831
+ �k−j
1832
+ j′=0 εj′ = 1 −
1833
+ �k−j
1834
+ j′=1 εj′
1835
+ �k−j
1836
+ j′=0 εj′ .
1837
+ Now let A(j)
1838
+ j′ be the consumption rate of j by agents aside from i when the items up to j′ have
1839
+ been consumed. That is:
1840
+ A(j)
1841
+ j′ =
1842
+ n
1843
+
1844
+ i′=1,i′̸=i
1845
+ vi′(j)
1846
+ 1 − �j′
1847
+ ˜j=1 vi(˜j)
1848
+ 20
1849
+
1850
+ Then we can simplify the expressions for ∆j and ∆′
1851
+ j to
1852
+ ∆j =
1853
+ 1 − �j−1
1854
+ j′=1 ∆j′ · A(j)
1855
+ j′
1856
+ 1 + A(j)
1857
+ j
1858
+ ∆′
1859
+ j =
1860
+ 1 − �j−1
1861
+ j′=1 ∆′
1862
+ j′ · (A(j)
1863
+ j′ + εj−j′ · fj′)
1864
+ fj + A(j)
1865
+ j
1866
+ This gives us the following equation:
1867
+ ∆j =
1868
+ 1 − �j−1
1869
+ j′=1 ∆j′ · A(j)
1870
+ j′
1871
+ 1 + A(j)
1872
+ j
1873
+ =
1874
+ (fj + A(j)
1875
+ j ) · (1 − �j−1
1876
+ j′=1 ∆j′ · A(j)
1877
+ j′ )
1878
+ (1 + A(j)
1879
+ j ) · (fj + Aj)
1880
+ =
1881
+ (fj − 1) · (1 − �j−1
1882
+ j′=1 ∆j′ · A(j)
1883
+ j′ )
1884
+ (1 + A(j)
1885
+ j ) · (fj + Aj)
1886
+ +
1887
+ (1 + A(j)
1888
+ j ) · (1 − �j−1
1889
+ j′=1 ∆j′ · A(j)
1890
+ j′ )
1891
+ (1 + A(j)
1892
+ j ) · (fj + Aj)
1893
+ =
1894
+ (fj − 1) · (1 − �j−1
1895
+ j′=1 ∆j′ · A(j)
1896
+ j′ )
1897
+ (1 + A(j)
1898
+ j ) · (fj + Aj)
1899
+ +
1900
+ 1 − �j−1
1901
+ j′=1 ∆j′ · A(j)
1902
+ j′
1903
+ fj + Aj
1904
+ So, when taking ∆j − ∆′
1905
+ j we get the following:
1906
+ ∆j − ∆′
1907
+ j =
1908
+ (fj − 1) · (1 − �j−1
1909
+ j′=1 ∆j′ · A(j)
1910
+ j′ )
1911
+ (1 + A(j)
1912
+ j ) · (fj + Aj)
1913
+ +
1914
+ 1 − �j−1
1915
+ j′=1 ∆j′ · A(j)
1916
+ j′
1917
+ fj + Aj
1918
+
1919
+ 1 − �j−1
1920
+ j′=1 ∆′
1921
+ j′ · (A(j)
1922
+ j′ + εj−j′ · fj′)
1923
+ fj + A(j)
1924
+ j
1925
+ =
1926
+ (fj − 1) · (1 − �j−1
1927
+ j′=1 ∆j′ · A(j)
1928
+ j′ )
1929
+ (1 + A(j)
1930
+ j ) · (fj + Aj)
1931
+ +
1932
+ �j−1
1933
+ j′=1 ∆′
1934
+ j′ · (A(j)
1935
+ j′ + εj−j′ · fj′) − ∆j′ · A(j)
1936
+ j′
1937
+ fj + A(j)
1938
+ j
1939
+ Remark that 1 ≥ fj ≥ 1 − ε and that �j
1940
+ j′=1 ∆′
1941
+ j < 1 So, by taking the absolute value, we get:
1942
+ 21
1943
+
1944
+ |∆j − ∆′
1945
+ j| ≤
1946
+ ������
1947
+ (fj − 1) · (1 − �j−1
1948
+ j′=1 ∆j′ · A(j)
1949
+ j′ )
1950
+ (1 + A(j)
1951
+ j ) · (fj + Aj)
1952
+ ������
1953
+ +
1954
+ ������
1955
+ �j−1
1956
+ j′=1 ∆′
1957
+ j′ · (A(j)
1958
+ j′ + εj−j′ · fj′) − ∆j′ · A(j)
1959
+ j′
1960
+ fj + A(j)
1961
+ j
1962
+ ������
1963
+
1964
+ |fj − 1|
1965
+ (1 + A(j)
1966
+ j ) · (fj + A(j)
1967
+ j )
1968
+ +
1969
+ ����j−1
1970
+ j′=1(∆′
1971
+ j′ − ∆j′) · A(j)
1972
+ j′
1973
+ ���
1974
+ fj + A(j)
1975
+ j
1976
+ +
1977
+ �����
1978
+ �j−1
1979
+ j′=1 ∆′
1980
+ j′ · εj−j′ · fj′
1981
+ fj + A(j)
1982
+ j
1983
+ �����
1984
+ ≤ ε
1985
+ 1
1986
+ 2
1987
+ +
1988
+ ������
1989
+ |
1990
+ j−1
1991
+
1992
+ j′=1
1993
+ (∆′
1994
+ j′ − ∆j′)
1995
+ ������
1996
+ ·
1997
+ A(j)
1998
+ j′
1999
+ fj + A(j)
2000
+ j
2001
+ + ε ·
2002
+ fj′
2003
+ fj + A(j)
2004
+ j
2005
+ ≤ 3ε +
2006
+ j−1
2007
+
2008
+ j′=1
2009
+ ��∆′
2010
+ j′ − ∆j′
2011
+ ��
2012
+ So we get |∆j − ∆′
2013
+ j| ≤ 3jε.
2014
+ So, the set of remaining items only changes for a time of at most �j
2015
+ j′=1 |∆j′ − ∆′
2016
+ j′| ≤ 3j2ε
2017
+ which implies that the payoff for the agents i′ ̸= i changes by at most 3j2ε since they have unit-
2018
+ sum valuations.
2019
+ On the other hand, for i when both mechanisms agree on the set of remaining items i only
2020
+ changes the item they are consuming by less than 2ε, in particular, if we sum the difference between
2021
+ what is consumed when the mechanisms disagree and when they agree i’s consumption only changes
2022
+ by at most 2ε + 3j2ε ≤ 4j2ε. Since i has a unit-sum valuation, the change in the payoff is at most
2023
+ 4j2ε.
2024
+ By setting ε =
2025
+ δ
2026
+ 4j2 we get the result we wanted.
2027
+ B
2028
+ Appendix: Mixed Strategies
2029
+ Here we show that our main result, the upper bound on the price of anarchy for pure stragey Nash
2030
+ Equilibria, also applies to mixed strategy Nash equilibria and coarse correlated equilibria. To show
2031
+ this we use the following definitions and notations. A mixed strategy for an agent i is a probability
2032
+ distribution of U and is denoted as pi : U → [0, 1]. The mixed strategy used by every agent is
2033
+ denoted as p: V → [0, 1] with p(v) = �n
2034
+ i=1 pi(vi).
2035
+ Theorem B.1. The price of anarchy of coarse correlated equilibria is O(√n·log n) in the one-sided
2036
+ allocation problem with multi-unit demand agents.
2037
+ Proof. Recall Lemma 4.3states that for any pure Nash equilibrium v and for any sequence of items
2038
+ X = {x1, x2, . . . , xk}:
2039
+ CPS(v′
2040
+ i; v) ≥ 1
2041
+ 4
2042
+ k
2043
+
2044
+ ℓ=1
2045
+ (txℓ − txℓ−1) · v′
2046
+ i(xℓ).
2047
+ 22
2048
+
2049
+ To prove this, we bounded the payoff i obtained by deviating to the sequential bidding strategy.
2050
+ This also applies for mixed strategies. In particular, if the xℓ are ordered by i’s value for them,
2051
+ then by deviating to the sequential strategy from any pure strategy agent i can consume item xℓ
2052
+ from time 1
2053
+ 4 maxℓ′=1,...,ℓ−1 txℓ′ to time 1
2054
+ 4 maxℓ′=1,...,ℓ txℓ′. By the linearity of the expectation, this
2055
+ gives the following bound for a mixed strategy:
2056
+ E
2057
+ � ki
2058
+
2059
+ ℓ=1
2060
+ v′
2061
+ i(xℓ) ·
2062
+ �1
2063
+ 4
2064
+ max
2065
+ ℓ′=1,...,ℓ txℓ′ − 1
2066
+ 4
2067
+ max
2068
+ ℓ′=1,...,ℓ−1 txℓ′
2069
+ ��
2070
+
2071
+ 1
2072
+ 4 ·
2073
+ ki
2074
+
2075
+ ℓ=1
2076
+ v′
2077
+ i(xℓ) ·
2078
+
2079
+ E
2080
+
2081
+ max
2082
+ ℓ′=1,...,ℓ txℓ′
2083
+
2084
+ − E
2085
+
2086
+ max
2087
+ ℓ′=1,...,ℓ−1 txℓ′
2088
+ ��
2089
+ We can now use this bound and apply the same proof as in Theorem 3.3 to obtain the same upper
2090
+ bound on the price of anarchy for mixed equilibria. A similar argument applies for coarse correlated
2091
+ equilibria.
2092
+ We remark that mixed Nash equilibria and coarse correlated equilibria are guaranteed to exist.
2093
+ C
2094
+ Appendix: Tightness of Proof Methodology
2095
+ As discussed, we conjecture that the price of anarchy of Cardinal Probabilistic Serial is Θ(√n)..
2096
+ However, we show here that the tools utilized in this paper are not strong enough to prove such
2097
+ a result. In particular, the bound from Lemma 5.1is too loose and so will induce a logarithmic
2098
+ term in the upper bound. Namely, assuming that the items are consumed in increasing order, then
2099
+ substituting tj by j/n will lead to the appearance of a log factor.
2100
+ Lemma C.1. O(√n · logO(1) n) is a tight bound when bounding tj below by j/n.
2101
+ Proof. Consider the following example. There are x · k agents. For each z = 0, . . . , x − 1, there are
2102
+ exactly k agents who are assigned 2z items in the optimal allocation and have value 1
2103
+ 2z for each item.
2104
+ Hence there are n = (2x −1)·k items. Setting k = (2x −1)/x2, we have n = (xk)2 = ((2x −1)2)/x2.
2105
+ Note that each agent will individually consume the items they are meant to be assigned at
2106
+ a rate of at most 1/n so unless other agents consume these the consumption time will be 1. In
2107
+ particular, this implies that using the remaining n − z · k agents, we can choose the order in which
2108
+ the items are consumed. So, assume that the items of higher value, that is those assigned to agents
2109
+ with smaller bundles, are consumed faster.
2110
+ Let Iz be the set of agents who receive 2z items in the optimal allocation. Let Jz be the set of
2111
+ items assigned to agents in Iz. Let prec(j) be the set of items that have been consumed before or
2112
+ at the same time as j (including j). Then, for any j ∈ Jz, an upper bound on the number of items
2113
+ that have been consumed before j, is the number of items that are assigned to agents with at most
2114
+ 2z items. That is:
2115
+ |prec(j)| ≤
2116
+ �����
2117
+ z�
2118
+ z′=0
2119
+ Jz′
2120
+ ����� =
2121
+ z
2122
+
2123
+ z′=0
2124
+ 2z′ · k = (2z+1 − 1) · k ≤ 2z · k
2125
+ In particular, by denoting Xi =
2126
+
2127
+ xi
2128
+ 1, . . . , xi
2129
+ 2z
2130
+
2131
+ to be the set of items i ∈ Iz gets, the bound we
2132
+ get for the value of the allocation when substituting the time by prec(j)/n is the following:
2133
+ 23
2134
+
2135
+ x
2136
+
2137
+ z=0
2138
+
2139
+ i∈Iz
2140
+ 1
2141
+ 2z · supℓ=1,...,2z prec(x(i)
2142
+ ℓ )
2143
+ n
2144
+
2145
+ x
2146
+
2147
+ z=0
2148
+ |Iz| · 1
2149
+ 2z · 2z+1 · k
2150
+ n
2151
+ =
2152
+ x
2153
+
2154
+ z=0
2155
+ 2k2
2156
+ n
2157
+ =
2158
+ 2xk2
2159
+ (xk)2 = 2
2160
+ x
2161
+ This means that our bound will only prove O(x√n) and given that n =
2162
+ (2x−1)2
2163
+ x2
2164
+ , we get that
2165
+ x = logO(1)(n).
2166
+ D
2167
+ Appendix: The Price of Stability
2168
+ Here we study the price of stability. To do this, we say that a strategy u ∈ U is a safety strategy for
2169
+ agent i if ∀v ∈ V the allocation output on input (u, v−i) gives i k
2170
+ n of its top k items in expectation.
2171
+ For the one-sided matching problem under Random Priority and Probabilistic Serial, truthtelling
2172
+ is known to be a safety strategy.
2173
+ Similar to the price of anarchy, the price of stability is the worst case ratio between the optimal
2174
+ welfare and the social welfare of the best Nash equilibrium, namely:
2175
+ sup
2176
+ v′
2177
+ inf
2178
+ v∈NE(v′)
2179
+ OPT(v′)
2180
+
2181
+ i∈I M(v′
2182
+ i; v)
2183
+ Interestingly, the existence of safety strategies induces the following bound on the price of
2184
+ stability for the one-sided matching problem:
2185
+ Theorem D.1 ([10]). For the one-sided matching problem, the pure price of stability of any mech-
2186
+ anism with a safety strategy is Ω(√n).
2187
+ As we did for the lower bound on the price of anarchy of general mechanisms, first we show
2188
+ that this lower bound extends to our setting.
2189
+ Theorem D.2. For the one-sided allocation problem, the pure price of stability of any mechanism
2190
+ with a safety strategy is Ω(√n).
2191
+ Proof. The example used by Christodoulou et al. [10] to prove Theorem D.1 for matchings suffices.
2192
+ Consider the following valuation:
2193
+ vi(j) =
2194
+
2195
+
2196
+
2197
+
2198
+
2199
+
2200
+
2201
+ 1
2202
+ if i = j ≤ √n
2203
+ 1
2204
+
2205
+ (n)
2206
+ if i > √n ≥ j
2207
+ 0
2208
+ otherwise
2209
+ Then clearly the optimal allocation is to assign an item to the agent who has value 1 for it, if
2210
+ possible, and to assign the remaining items in any way. Denoting pi,j to be the probability assigning
2211
+ j to i, then:
2212
+
2213
+ i∈[n]
2214
+
2215
+ j∈[√n]
2216
+ pi,j = √n.
2217
+ 24
2218
+
2219
+ However, since the mechanism has a safety strategy, the agents who are matched in the optimal
2220
+ solution get their top item with probability at least 1/n so, we get the following bound on the
2221
+ contribution of the remaining agents to the social welfare of the Nash equilibrium:
2222
+
2223
+ i∈[n]\[√n]
2224
+
2225
+ j∈[√n]
2226
+ pi,j · 1
2227
+ √n ≤
2228
+ 1
2229
+ √n ·
2230
+ �√n − 1
2231
+ √n
2232
+
2233
+ ≤ 1
2234
+ On the other hand, the agents who do not get matched can get their top √n items with
2235
+ probability at least
2236
+ 1
2237
+ √n, so we get the following bound on the contribution of the matched agents
2238
+ to the social welfare of the Nash Equilibrium:
2239
+
2240
+ i∈[√n]
2241
+
2242
+ j∈[√n]
2243
+ pi,j ≤ √n − (n − √n) · 1
2244
+ √n = 1
2245
+ So, the contribution of all the agents to the social welfare of the Nash equilibrium is at most 2.
2246
+ But the optimal allocation clearly has value √n.
2247
+ So, if we can show that Cardinal Probabilistic Serial has a safety strategy then we get a lower
2248
+ bound of Ω(√n) on the price of stability. However, interestingly, unlike it’s ordinal counterpart,
2249
+ truthtelling is not a safety strategy.
2250
+ Lemma D.3. Truthtelling is NOT a safety strategy for Cardinal Probabilistic Serial.
2251
+ Proof. Assume that vi(j) = 1, vi(j) = 0, v1(1) = 1 − (n − 1)ε and v1(j) = ε for any i ̸= 1 and
2252
+ j ̸= 1. Then if agent 1 is truthful it has a probability less than 1/n of getting item 1, which is its
2253
+ top item. So, truthtelling is not a safety strategy.
2254
+ Nonetheless, we can find a safety strategy for Cardinal Probabilistic Serial.
2255
+ Lemma D.4. Cardinal Probabilistic Serial has a safety strategy.
2256
+ Proof. This follows directly from Lemma 5.1by considering the sequential strategy with Xi = [n].
2257
+ Before time j/n, at most j − 1 items have been consumed so under the sequential strategy agent i
2258
+ is consuming from one of their j favorite items. This is what we need.
2259
+ Corollary D.5. For the one-sided allocation problem, the price of stability of Cardinal Probabilistic
2260
+ Serial is Ω(√n) and O (√n · log n)
2261
+ Proof. So this game has a safety strategy by Corollary D.4 The lower bound then follows Theo-
2262
+ rem D.2 which states that any mechanism with a safety strategy has a price of stability of Ω(√n).
2263
+ The upper bound follows from Theorem 3.3because the price of anarchy upper bounds the price of
2264
+ stability.
2265
+ 25
2266
+
etAzT4oBgHgl3EQfaPzl/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
etE2T4oBgHgl3EQfGgZ8/content/tmp_files/load_file.txt ADDED
@@ -0,0 +1,257 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ filepath=/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf,len=256
2
+ page_content='SF2A 2022 J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
3
+ page_content=' Richard, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
4
+ page_content=' Siebert, E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
5
+ page_content=' Lagadec, N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
6
+ page_content=' Lagarde, O.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
7
+ page_content=' Venot, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
8
+ page_content=' Malzac, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
9
+ page_content='-B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
10
+ page_content=' Marquette, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
11
+ page_content=' N’Diaye, D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
12
+ page_content=' Briot (eds) COMMISSION FEMMES ET ASTRONOMIE DE LA SF2A : WOMEN PARTICIPATION IN FRENCH ASTRONOMY Rhita-Maria Ouazzani1, Caroline Bot2, Sylvie Brau-Nogu´e3, Danielle Briot4, Patrick de Laverny5, Nad`ege Lagarde6, Nicole Nesvadba7, Julien Malzac8, Isabelle Vauglin9 and Olivia Venot10 Abstract.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
13
+ page_content=' The Commission Femmes et Astronomie conducted a statistical study that aims at mapping the presence of women in French professional Astronomy today, and set a starting point for studying its evolution with time.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
14
+ page_content=' For the year 2021, we proceeded with a sub-set of 8 astronomy and astrophysics institutes, hosting a total of 1060 employees, among which PhD students, post-doctoral researchers, and academic, technical, and administrative staff, representing around 25% of the community.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
15
+ page_content=' We have investigated how the percentage of women vary with career stage, level of responsibility, job security, and level of income.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
16
+ page_content=' The results of this preliminary study seem to illustrate the leaky pipeline, with one major bottleneck being the access to permanent positions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
17
+ page_content=' It appears that the proportion of women steadily decreases with the security of jobs, with the career stage, with the qualification level and with the income level.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
18
+ page_content=' Keywords: Astronomy & Astrophysics, Gender inequalities, Career 1 Introduction The Commission Femmes et Astronomie of the SF2A (Soci´et´e Fran¸caise d’Astronomie et d’Astrophysique, French astronomical Society) was created in 2020 to form an instance where questions related to gender equality can be addressed within the French astronomical community.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
19
+ page_content=' The Commission has ten members, of which six members are currently –or were at some point– also part of the SF2A Council: Caroline Bot, Sylvie Brau- Nogu´e, Danielle Briot*, Patrick de Laverny*, Nad`ege Lagarde*, Rhita-Maria Ouazzani*, Nicole Nesvadba, Julien Malzac*, Isabelle Vauglin, and Olivia Venot∗.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
20
+ page_content=' The main goals of the Commission are to promote gender equality in Astronomy & Astrophysics in France, fight against sexual and gender-based violence, support gender- focused outreach actions, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
21
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
22
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
23
+ page_content=' Before the commission was created, different efforts to do a census of the status of women in astronomy in France were conducted.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
24
+ page_content=' In particular, a survey was conducted through the SF2A to probe the future of doctors who obtained their PhD in Astronomy and Astrophysics between 2007 and 2017.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
25
+ page_content=' The results presented in Bern´e & Hilaire (2020) showed, among other points, that women were less likely to be offered permanent positions than men.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
26
+ page_content=' That same year, Bot & Buat (2020) did a census of the percentage of women on permanent positions in France, finding that 23% percents of permanent positions at that time were held by women.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
27
+ page_content=' Looking at two different age classes,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
28
+ page_content=' they found that the number of women seemed to be decreasing for university positions 1 LESIA,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
29
+ page_content=' Observatoire de Paris,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
30
+ page_content=' Universit´e PSL,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
31
+ page_content=' Sorbonne Universit´e,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
32
+ page_content=' Universit´e Paris Cit´e,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
33
+ page_content=' CNRS,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
34
+ page_content=' 5 place Jules Janssen,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
35
+ page_content=' 92195 Meudon,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
36
+ page_content=' France 2 Universit´e de Strasbourg,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
37
+ page_content=' CNRS,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
38
+ page_content=' Observatoire Astronomique de Strasbourg,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
39
+ page_content=' UMR7550,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
40
+ page_content=' F–67000 Strasbourg,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
41
+ page_content=' France 3 IRAP,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
42
+ page_content=' Universit´e de Toulouse,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
43
+ page_content=' CNRS,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
44
+ page_content=' UPS,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
45
+ page_content=' CNES,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
46
+ page_content=' Toulouse,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
47
+ page_content=' France 4 Observatoire de Paris,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
48
+ page_content=' 61 avenue de l’Observatoire,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
49
+ page_content=' 75014 Paris,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
50
+ page_content=' France 5 Universit´e Cˆote d’Azur,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
51
+ page_content=' Observatoire de la Cˆote d’Azur,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
52
+ page_content=' CNRS,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
53
+ page_content=' Laboratoire Lagrange,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
54
+ page_content='F-06304 Nice,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
55
+ page_content=' France 6 Laboratoire d’Astrophysique de Bordeaux,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
56
+ page_content=' Univ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
57
+ page_content=' Bordeaux,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
58
+ page_content=' CNRS,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
59
+ page_content=' B18N,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
60
+ page_content=' all´ee Geoffroy Saint-Hilaire,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
61
+ page_content=' 33615 Pessac,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
62
+ page_content=' France 7 Universit´e Cˆote d’Azur,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
63
+ page_content=' Observatoire de la Cˆote d’Azur,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
64
+ page_content=' CNRS,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
65
+ page_content=' Laboratoire Lagrange,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
66
+ page_content='F-06304 Nice,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
67
+ page_content=' France 8 IRAP,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
68
+ page_content=' Universit´e de Toulouse,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
69
+ page_content=' CNRS,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
70
+ page_content=' UPS,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
71
+ page_content=' CNES,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
72
+ page_content=' Toulouse,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
73
+ page_content=' France 9 Univ Lyon,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
74
+ page_content=' Universit´e Lyon1,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
75
+ page_content=' ENS de Lyon,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
76
+ page_content=' CNRS,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
77
+ page_content=' CRAL UMR5574,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
78
+ page_content=' F-69230 Saint-Genis-Laval,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
79
+ page_content=' France 10 Universit´e de Paris Cit´e and Univ Paris Est Creteil,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
80
+ page_content=' CNRS,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
81
+ page_content=' LISA,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
82
+ page_content=' F-75013 Paris,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
83
+ page_content=' France ∗members of the SF2A Council © Soci´et´e Fran¸caise d’Astronomie et d’Astrophysique (SF2A) 2022 arXiv:2301.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
84
+ page_content='03658v1 [astro-ph.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
85
+ page_content='IM] 9 Jan 2023 238 SF2A 2022 Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
86
+ page_content=' 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
87
+ page_content=' Left: Proportion of women for the overall sample, among permanent staff, and non-permanent staff.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
88
+ page_content=' Right: Pro- portion of women among the researchers (from PhD to Emeritus, 687 individuals), and among administrative, technical and engineering staff (a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
89
+ page_content='k.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
90
+ page_content='a ITA, 373 individuals).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
91
+ page_content=' while increasing for astronomer positions (CNAP) and that no evidence of a glass ceiling effect was observed.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
92
+ page_content=' While both studies were important and necessary, they gave an instantaneous glimpse of the status of women in astronomy in 2019-2020, they were limited to the information requested or available and were biased by the surveyed population (young researchers for Bern´e & Hilaire 2020 or permanent positions for Bot & Buat 2020).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
93
+ page_content=' In this context, the Commission Femmes et Astronomie decided to conduct a statistical study that aims at mapping the presence of women in French professional Astronomy today, and set a starting point for studying its evolution with time.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
94
+ page_content=' As a first step, we would like to address general questions such as: What is the percentage of women in French Astronomical institutes?' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
95
+ page_content=' How does their number vary with their level of seniority –i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
96
+ page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
97
+ page_content=' career stage–?' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
98
+ page_content=' What is the percentage of women at different levels of responsibility?' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
99
+ page_content=' How does the number of women depend on income level?' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
100
+ page_content=' The perimeter of this study is restricted to the research units (institutes) depending of the Astronomy & Astrophysics (AA) section of the National Institute for Universe Sciences (INSU), with the exception of the LISA institute, which was included in this study although it was not labeled AA, as part of this institute’s activities are related to astronomy and astrophysics.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
101
+ page_content=' The approach adopted consists in collecting data directly from the institutes heads, through their administrative services.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
102
+ page_content=' The data is anonymised upfront, to comply with privacy policies.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
103
+ page_content=' Once anonymised it is distributed to the members of the committee, who are the only persons authorized to manipulate them using secured tools.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
104
+ page_content=' For the year 2021, taken as the starting point for the evolutionary sequence, we proceeded with a sub-set of institutes of the INSU-AA, as a proof of concept, with the aim of extending the study to all the INSU-AA institutes in the near future.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
105
+ page_content=' 2 Participation of women in Astronomy in 2021 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
106
+ page_content='1 The 2021 study set-up We were able to collect data from eight research institutes within France: GEPI, IRAP, Lagrange, LESIA, LISA, LUTh, ObAS and the SYRTE, which include 1060 individuals, representing around 25% of the community.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
107
+ page_content=' For all these institutes, the data contained the following entries: Gender, Date of Birth, Employer (CNRS/CNAP/University/else), Status (students/post-doc/researcher/engineers, administrative or technical staff a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
108
+ page_content='k.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
109
+ page_content='a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
110
+ page_content=' ITA), Proportionofwomenin2021 (8institutes) 80% 69,4% 71,5% 60% 64,8% 40% 30,6% 35,2% 20% 28,5% 0% Overall population Permanent staff Non-permanent staff Women MenDistribution researcher/ITA 80,0% 71,3% 60,0% 66,0% 40,0% 34,0% 28,7% 20,0% 0,0% Researchers ITAs Women MenCounting women 239 Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
111
+ page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
112
+ page_content=' Proportion of women at each stage of the research career.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
113
+ page_content=' In solid lines are superimposed linear fits of the proportion of women (light orange) and men (light green), the quality of the fit is indicated by a value of R2 = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
114
+ page_content='486.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
115
+ page_content=' and for the public servants: the category (known as grade in french: IR/IE/CR/DR/AA/A/MdC/PU/.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
116
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
117
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
118
+ page_content=' ).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
119
+ page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
120
+ page_content='2 General results and job security The first number presented in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
121
+ page_content=' 1 (left, overall population), gives the proportion of women, regardless of their status, age or position.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
122
+ page_content=' This number represents the likelihood of crossing paths with a woman in a corridor when walking through a French astronomy institute: one in three.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
123
+ page_content=' The workforce in French academia is composed of permanent staff, among which we count public servants –this includes persons in research, engineering, technical or administrative positions–, as well as very few (but nevertheless growing number of) persons employed on corporate-like permanent positions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
124
+ page_content=' As for non-permanent positions, are counted PhD students, post-doctoral researchers, teaching assistants, apprenticeships, and holders of a short-term contract (on engineering, technical or administrative jobs).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
125
+ page_content=' Looking at the distribution of women among permanent and non-permanent positions (Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
126
+ page_content='1, left), we see that women (35.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
127
+ page_content='2%) are most likely employed on temporary contracts than men (28.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
128
+ page_content='5%).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
129
+ page_content=' If we restrict this comparison to research positions, 25.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
130
+ page_content='0% of researchers on permanent positions are women, whereas it is 34.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
131
+ page_content='9% for non-permanent positions (28.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
132
+ page_content='7% for the overall population).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
133
+ page_content=' One potential source of variability in these numbers is expected to come from the type of position (research or not).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
134
+ page_content=' That is what is explored on the right panel of Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
135
+ page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
136
+ page_content=' We are aware that persons hired on ITA positions also contribute to the research that is produced in these institutes, but different social and economical values are attributed to research and ITA positions, and that is what, we believe, is determining here.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
137
+ page_content=' Among women working in the 8 institutes included in the study, 39.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
138
+ page_content='2% are hired as ITA, while for men the percentage is 33.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
139
+ page_content='4%.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
140
+ page_content=' For the following discussions, we consider separately the population of researchers (in the broad sense: from PhD to Emeritus) on the one hand, and the population of Engineering, Technical and Administrative staff altogether (ITA) on the other hand.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
141
+ page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
142
+ page_content='3 Research career Concerning researchers, we have sorted the population (687 individuals) according to the category of their position.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
143
+ page_content=' From the youngest to the most seniors, we have listed: PhD students, post-doctoral researchers, and positions equivalent to associate professors (CR, ASTA, PHYSA, MC), to second-class professors (DR2, PU2, AST2), to first-class professors (DR1, PU1, AST1), to professor of exceptional class (DRCE, PUCE, ASTCE), Distribution of researchers according to category 76,6% 76,9% 78.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
144
+ page_content='8% 80,0% 70,6% 72.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
145
+ page_content='7% 64,9% 64.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
146
+ page_content='3% 60,0% 40,0% 35;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
147
+ page_content='1% 35,7% 29,4% 27,3% 23.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
148
+ page_content='4% 23.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
149
+ page_content='1% 21,2% 20,0% 0,0% PhD students Post-docs CR -ASTA - PHYSA DR2 -PU2-AST2 DR1 - PU1 -AST1 DRCE- PUCE - Emeritus MC ASTCE Women Linear trend for women R² = 0,486 Men Linear trend for Men R?' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
150
+ page_content=' = 0,486240 SF2A 2022 Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
151
+ page_content=' 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
152
+ page_content=' Proportion of women in each category of ITA jobs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
153
+ page_content=' From left to right they are ordered by qualification and income level.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
154
+ page_content=' The solid lines give the optimal linear fits of these distributions, with a value of R2 = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
155
+ page_content='661.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
156
+ page_content=' and Emeritus.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
157
+ page_content=' The result is illustrated in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
158
+ page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
159
+ page_content=' In order to emphasize the general trend, a linear fit has been performed (R2 = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
160
+ page_content='486, p = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
161
+ page_content='08), which shows that the proportion of women decreases with the career stage.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
162
+ page_content=' This overall trend seems to be mostly caused by the first drop in the distribution: when women represent around 35% of the population in non-permanent positions (PhD students and post-doctoral researchers), the proportion decreases to 23.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
163
+ page_content='4% for the first level of permanent employment.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
164
+ page_content=' After this first bottleneck, the number varies slightly between around 23% and around 29%, with two noticeable increases: one at the second-class professor level, and another one at the Emeritus level.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
165
+ page_content=' It is important to bear in mind that this study gives a snapshot of the distribution for 2021.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
166
+ page_content=' Temporal or causal relations between one stage to another are delicate to establish, and could properly be addressed only if this snapshot is renewed every year.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
167
+ page_content=' However, concerning the clear increase of proportion of women between the associate professor level and the second-class professor level, one can wonder if it is not a stellar-main-sequence effect.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
168
+ page_content=' Astronomers know that the large majority of observable stars are currently in their main sequence.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
169
+ page_content=' That is because the main sequence, during which they burn hydrogen in their core, is the longest of all stellar evolution stages.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
170
+ page_content=' Hence, we are led to wonder if this increase of women is not due to the fact that once they are promoted to second-class professorship, they spend a particularly long time in that stage before being promoted further up, if at all.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
171
+ page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
172
+ page_content='4 ITA careers Concerning the population of ITA, composed here of 373 individuals, their distribution by career level is illus- trated in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
173
+ page_content=' 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
174
+ page_content=' It is worth mentioning that the histogram presents broad categories of ITA (known as corps in French) ordered by levels of income and qualification, but contrary to Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
175
+ page_content=' 2, the progression from one category to the other is very little or none.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
176
+ page_content=' Furthermore, the sources of variability are much more numerous than in the research career case.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
177
+ page_content=' Firstly because of the variety of jobs it encompasses (administrative, technical, R&D .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
178
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
179
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
180
+ page_content=' ).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
181
+ page_content=' The jobs that fall into the ATR-T and AI categories have an dominant administrative component, whereas IE and IR are mostly scientific and technical jobs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
182
+ page_content=' Another source of variability are the qualifications needed to apply for these different kinds of positions: some require a PhD (IR), and others the High School Leaving Certificate (Baccalaur´eat).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
183
+ page_content=' In general, it is safe to assert that women are present in higher proportion in jobs that have a clear administrative component, and have lower levels of qualifications and lower income.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
184
+ page_content=' As for men, they dominate in more technical jobs, where the level of qualification can be higher, and access higher income.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
185
+ page_content=' In summary, we can conclude from Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
186
+ page_content=' 3 that as the qualification and the level of income increases, the number of women decreases (illustrated by the linear fit, with a p value of p = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
187
+ page_content='1).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
188
+ page_content=' A finer analysis would DistributionofITAsbycategory 80% 74,7% 60% 64,8% 56,7% 51,4% 48,6% 40% 43,3% 35,2% 20% 25,3% 0% ATR-T AI IE IR Women MenCounting women 241 Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
189
+ page_content=' 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
190
+ page_content=' Proportion of women and men at each income level give in Table 1, increasing from left to right.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
191
+ page_content=' The quality of the fit is given by a value of R2 = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
192
+ page_content='662.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
193
+ page_content=' level category L1 AJT, TCN, TCS L2 TCE, AI L3 IECN, IR2 L4 IEHC, IR1, CRCN, MC, PRAGCN, ASTA, PHYSA L5 IRHC, CR1, CRHC, MCHC, DR2, PU2, AST2 L6 DR1, DRCE, PU1, PUCE, AST1, ASTCE, Emerites Table 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
194
+ page_content=' Scale of income for all the workers in the sample, researchers and ITA altogether.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
195
+ page_content=' In terms of gross salary, it starts from about 1590 euros and reaches around 6200 euros.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
196
+ page_content=' require to blow up each of the histogram stick into finer category (grade in French), but with the current data at hand, we risk ending up with the small numbers statistics issue.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
197
+ page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
198
+ page_content='5 The sinews of war We also addressed the crux of the matter: salary levels.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
199
+ page_content=' For this purpose, we bring together again the whole sample (1060 individuals), and sort them out simply by level of income.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
200
+ page_content=' To do so, we chose to use a scale of income set up by S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
201
+ page_content=' Brau-Nogu´e (see https://www.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
202
+ page_content='irap.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
203
+ page_content='omp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
204
+ page_content='eu/egalite/bilan-social-et-parite-2022/) in her work to document gender inequalities in her institute (IRAP), work which has largely inspired this study.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
205
+ page_content=' The scale is presented in Table 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
206
+ page_content=' Far from being a motivation for working in the academic sector, we believe that the level of income is a good indicator of the social value associated to a given position.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
207
+ page_content=' Concerning the first two levels, they encompass mainly technical and administrative positions that are known to be positions which are very gender specific.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
208
+ page_content=' But once we reach level L3, we observe that there is a clear and regular decrease of the proportion of women as the income increases.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
209
+ page_content=' In solid lines are given the optimal linear fits of the distributions for men and women, with a p value of p = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
210
+ page_content='05.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
211
+ page_content=' 3 Preliminary conclusions and perspectives We present the results of our first statistical study on the participation of women in French Astronomical Institutes.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
212
+ page_content=' Our sample was composed of 1060 individuals, belonging to 8 institutes, making up for around 25% Distributionbylevelofincome 74,6% 76,7% 80,0% 71,4% 72,9% 58,5% 60.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
213
+ page_content='0% 52.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
214
+ page_content='1% 47,9% 41,5% 40,0% 28;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
215
+ page_content='6% 27,1% 25,4% 23,3% 20,0% 0,0% L1 L2 L3 L4 L5 L6 Incomelevel omer LMen242 SF2A 2022 of the targeted population.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
216
+ page_content=' Although the results are still preliminary, it appears that the proportion of women steadily decreases with the security of jobs / the career stage / the qualification level / the income level.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
217
+ page_content=' This seems to illustrate the well known leaky pipeline issue, but needs further confirmation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
218
+ page_content=' In particular, the sample for this study suffered from a number of shortcomings.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
219
+ page_content=' Some institutes included in the study cover topics which go beyond Astrophysics, such as the LISA and the SYRTE.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
220
+ page_content=' Looking at the p values associated to the trends determined, we wish to improve the statistical robustness of the inferences.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
221
+ page_content=' We aim at solving this issue by extending the sample to all the French Astronomical Institutes in the coming years.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
222
+ page_content=' Moreover, the snap-shot nature of this study prevents from drawing strong conclusions about the evolutionary trends.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
223
+ page_content=' Even if it can be very tempting to get a sense of evolution by looking at different generations of workers, one should keep in mind that state policies, or even the culture can change from one generation to the other.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
224
+ page_content=' Appendix: Index of jobs in A&A Here we give some elements for understanding the zoo of jobs that one can find in the astronomical institutes in France.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
225
+ page_content=' In general all the positions are divided into category (a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
226
+ page_content='k.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
227
+ page_content='a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
228
+ page_content=' corps in french), and class (a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
229
+ page_content='k.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
230
+ page_content='a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
231
+ page_content=' grade in french).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
232
+ page_content=' Academic careers: The three main job providers are the CNRS (French national institute for research), Univer- sities, and the CNAP (Conseil National des Astronomes et Physiciens).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
233
+ page_content=' According to the hiring institution, we can define different career paths, all of which contain 2 categories and each category can be split into 2 or 3 classes: CNRS: Charg´es de Recherche (research associates;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
234
+ page_content=' 2 classes: CRCN and CRHC) → Directeurs de Recherche (research directors;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
235
+ page_content=' 3 classes: DR2, DR1, DRCE) CNAP: Astronomes Associ´es (associate astronomers;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
236
+ page_content=' 2 classes: ASTA, PHYSA) → Astronomes (as- tronomers;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
237
+ page_content=' 3 classes: AST2, AST1, ASTCE) University: Maitres de Conf´erence (associate professors, 2 classes: MC, MCHC) → Professeurs (professors;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
238
+ page_content=' 3 classes: PU2,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
239
+ page_content=' PU1,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
240
+ page_content=' PUCE) Engineering,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
241
+ page_content=' technical,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
242
+ page_content=' administrative careers (ITA): For ITA,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
243
+ page_content=' the positions are divided into 5 categories,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
244
+ page_content=' which are themselves divided into several classes (ordered by level of qualification): Adjoints techniques de la recherche (AJT) Techniciens de la recherche (TCN,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
245
+ page_content=' TCS,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
246
+ page_content=' TCE) Assistants ing´enieurs (AI) Ing´enieurs d’´etudes (IECN,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
247
+ page_content=' IEHC) Ingenieurs de recherche (IR2,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
248
+ page_content=' IR1,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
249
+ page_content=' IRHC) The members of the Commission Femmes et Astronomie would like to thank all institutes directors and colleagues who kindly agreed to providing the data that made this study possible,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
250
+ page_content=' and the administrative staff who worked on their compilation and anonymisation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
251
+ page_content=' References Bern´e, O.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
252
+ page_content=' & Hilaire, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
253
+ page_content=' 2020, Nature Astronomy, 4, 296 Bot, C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
254
+ page_content=' & Buat, V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
255
+ page_content=' 2020, http://sf2a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
256
+ page_content='eu/Bot_Buat.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
257
+ page_content='pdf' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/etE2T4oBgHgl3EQfGgZ8/content/2301.03658v1.pdf'}
f9AzT4oBgHgl3EQfof2V/content/tmp_files/2301.01598v1.pdf.txt ADDED
@@ -0,0 +1,2668 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Non-arithmetic uniformization of metric
2
+ spaces attached to unitary Shimura varieties
3
+ Olivier de Gaay Fortman, January 5, 2023
4
+ 1
5
+ Introduction
6
+ In various cases, Hodge theory provides a bridge between hyperbolic geometry and
7
+ algebraic geometry: there are moduli spaces of complex varieties whose period map
8
+ identifies it with a quotient of complex hyperbolic space.
9
+ The ball quotients that
10
+ arise in this way are often (but not always) arithmetic [Pic83; Shi64; DM86; Kon00;
11
+ ACT02b]. Similar constructions can be carried out to uniformize moduli of real vari-
12
+ eties [AY98; ACT06; ACT10; Chu11; HR18]. A striking result in this direction was
13
+ given by Allcock–Carlson–Toledo, who identified the space of stable real cubic surfaces
14
+ with a four-dimensional non-arithmetic real ball quotient [ACT10]. Their space is as-
15
+ sembled from various pieces, each of which an arithmetic quotient containing an open
16
+ subset that parametrizes moduli of smooth real cubic surfaces of one topological type.
17
+ The starting point of this paper is the question whether similar glueing construc-
18
+ tions apply to real loci of arbitrary unitary Shimura varieties, a priori not depending
19
+ on real moduli theory. Our first goal is to prove that this can indeed be done, leading
20
+ to a construction which generalizes [ACT07; ACT10] and seems an orbifold analogue
21
+ of the construction of Gromov–Piatetski-Shapiro [GPS87]. For indeed, our second goal
22
+ is to show that many of the lattices that arise in this way, are in fact non-arithmetic.
23
+ To explain this, let n ∈ N and consider a CM field K and a hermitian OK-lattice
24
+ Λ of signature (n, 1) for one infinite place of K and definite for others. To Λ one can
25
+ associate a quotient Γ \ Bn(C), and each anti-unitary involution α: Λ → Λ defines a
26
+ real arithmetic ball quotient Γα\Bn
27
+ α(R) := StabΓ(Bn(C)α)\Bn(C)α. We glue these real
28
+ quotients together along a certain orthogonal hyperplane arrangement H ⊂ Bn(C).
29
+ The resulting space Xn is a complete metric space (c.f. Proposition 3.7). Our first
30
+ main result says that moreover, Xn carries a complete hyperbolic orbifold structure:
31
+ Theorem 1.1 (c.f. Theorem 3.1). For each connected component X+
32
+ n ⊂ Xn there
33
+ exists a lattice Γ+
34
+ n ⊂ PO(n, 1) and a canonical isometry X+
35
+ n ∼= Γ+
36
+ n \ Bn(R).
37
+ For suitable choices of K and Λ, the space X2 is connected (c.f. Lemma 5.1), immerses
38
+ totally geodesically into a connected component X+
39
+ n of Xn for each n ∈ Z≥2 (c.f.
40
+ Theorem 5.8), and the lattice Γ+
41
+ 2 ⊂ PO(2, 1) underlying X2 is non-arithmetic. By
42
+ [BC05, Proposition 15.2.2], this forces Γ+
43
+ n to be non-arithmetic. As a result, we obtain:
44
+ 1
45
+ arXiv:2301.01598v1 [math.GT] 4 Jan 2023
46
+
47
+ Theorem 1.2 (c.f. Theorem 5.18). For n ∈ Z≥2 and Λ = (Z[ζ3]n+1, diag(−1, 1, . . . , 1))
48
+ or Λ =
49
+
50
+ Z[ζ5]n+1, diag( 1−
51
+
52
+ 5
53
+ 2
54
+ , 1, . . . , 1)
55
+
56
+ , there is a connected component X+
57
+ n ⊂ Xn such
58
+ that the lattice Γ+
59
+ n ⊂ PO(n, 1) underlying X+
60
+ n is non-arithmetic.
61
+ Remark 1.3. For some moduli stacks of GIT stable hypersurfaces Ms, one can con-
62
+ sider the hermitian lattice Λ that arises as the cohomology of the cover of projec-
63
+ tive space ramified along a member of the moduli space, and define an isomorphism
64
+ Ms(R) ∼= Xn for n = dim(Ms). By applying Theorem 1.1, one obtains a uniformiza-
65
+ tion of Ms(R) by real hyperbolic space. For cubic surfaces and binary sextics, this is
66
+ the content of [ACT10; ACT06]. In [GF21], we prove this for real binary quintics.
67
+ We now explain the glueing construction in more detail. Let K be a CM field of
68
+ degree 2g over Q with ring of integers OK, and let Λ be a free OK-module of rank
69
+ n + 1 equipped with a hermitian form h : Λ × Λ → OK. Suppose that h has signature
70
+ (n, 1) with respect to an embedding τ : K → C and is definite other infinite places of
71
+ K. Let CHn be the space of negative lines in Λ ⊗OK,τ C and PΓn = Aut(Λn, h)/µK
72
+ where µK ⊂ O∗
73
+ K is the group of finite units in OK. Let PAn be the quotient of the
74
+ set of anti-unitary involutions α : Λ → Λ by µK. Attached to the hermitian lattice
75
+ (Λ, h) there is a Shimura variety ShK(G, X) (c.f. [Ach20, Section 5.3]) with complex
76
+ uniformization ShK(G, X)(C) = Γn \ CHn, see Corollary 4.9 (or [Shi63, Theorem 2]).
77
+ Consider the hyperplane arrangement
78
+ H =
79
+
80
+ r∈Λ:
81
+ h(r,r)=1
82
+ ⟨rC⟩⊥ ⊂ CHn
83
+ and assume that the following holds :
84
+ Condition 1.4 (c.f. [ACT02a]). Any two different hyperplanes in ⟨rC⟩⊥, ⟨tC⟩⊥ ⊂ H
85
+ intersect orthogonally or not at all, i.e. either h(r, t) = 0 or ⟨rC⟩⊥ ∩ ⟨tC⟩⊥ = ∅.
86
+ In many cases, this condition is automatically satisfied:
87
+ Theorem 1.5 (c.f. Theorem 4.12). If the CM type is primitive and the different ideal
88
+ DK ⊂ OK is generated by a purely imaginary element, then Condition 1.4 holds.
89
+ This condition on the different ideal DK ⊂ OK is satisfied when the field K is
90
+ cyclotomic or quadratic, see Proposition 4.14.
91
+ The glueing construction is then carried out by assembling the different copies
92
+ RHn
93
+ α := (CHn)α ⊂ CHn,
94
+ α ∈ PAn
95
+ of real hyperbolic space RHn along the hyperplane arrangement H . See Definition
96
+ 2.14 and Remark 2.15 for the formulation of the equivalence relation. This gives a
97
+ topological space Yn, acted upon by PΓn. Define PΓα ⊂ PΓn to be stabilizer of RHn
98
+ α.
99
+ 2
100
+
101
+ Theorem 1.6 (c.f. Theorem 3.1). The space Xn = PΓn \ Yn admits a complete path
102
+ metric such that the natural map Xn → PΓn \CHn is a local isometry. Moreover, this
103
+ metric on Xn extends to a real hyperbolic orbifold structure, such that
104
+
105
+ α∈PΓn\PAn
106
+ PΓα \ (RHn
107
+ α − H ) ⊂ Xn
108
+ is an open suborbifold, and such that for each connected component X+
109
+ n ⊂ Xn there is
110
+ a lattice Γ+
111
+ n ⊂ PO(n, 1) and an isomorphism of hyperbolic orbifolds X+
112
+ n ∼= Γ+
113
+ n \ RHn.
114
+ Remark 1.7. Our construction relies on Condition 1.4, saying that the hyperplane
115
+ arrangement H ⊂ CHn is an orthogonal arrangement in the sense of [ACT02a]. In
116
+ fact, there is always a canonical orthogonal arrangement H ⊂ CHn attached to h in
117
+ such a way that H = H when H is orthogonal (c.f. Remark 4.15). Moreover, one
118
+ can glue the different copies RHn
119
+ α of real hyperbolic space along the arrangement H to
120
+ obtain a complete hyperbolic orbifold as in Theorem 1.6, but we will not prove this.
121
+ 1.1
122
+ Acknowledgements. This research was undertaken partly during my PhD at the
123
+ ENS in Paris, supported by the European Union’s Horizon 2020 research and inno-
124
+ vation programme under the Marie Skłodowska-Curie grant agreement No754362
125
+ ,
126
+ and partly at the Leibniz University Hannover, where I am supported by the RationAl-
127
+ gic ERC Starting Grant. I thank Olivier Benoist, Nicolas Bergeron, Samuel Bronstein,
128
+ Frans Oort, Pierre Py, Nicolas Tholozan and Domenico Valloni for stimulating con-
129
+ versations and useful comments on earlier versions of this paper.
130
+ 2
131
+ The glueing construction
132
+ 2.1
133
+ The complex arithmetic ball quotient and anti-unitary involutions. Let g
134
+ and n be positive integers. Let K be a CM field of degree 2g over Q and let F ⊂ K
135
+ be its totally real subfield. Let OK (resp. OF) be the ring of integers of K (resp. F)
136
+ and let σ ∈ Gal(K/F) be the non-trivial element. We will often write
137
+ σ: K → K,
138
+ σ(x) = x.
139
+ Fix a set of embeddings
140
+ Ψ = {τi : K → C}1≤i≤g
141
+ |
142
+ Ψ ∪ Ψσ = {τi, τiσ}1≤i≤g = Hom(K, C).
143
+ (1)
144
+ Let Λ be a free OK-module of rank n + 1 equipped with a hermitian form
145
+ h: Λ × Λ → OK
146
+ of signature (ri, si) with respect to τi. In other words, h is linear in its first argument
147
+ and σ-linear in its second, and the complex vector space Λ⊗OK,τi C admits a basis {ei}
148
+ such that (hτi(ei, ej))ij is a diagonal matrix with ri diagonal entries equal to 1 and si
149
+ diagonal entries equal to −1. Here
150
+ hτi : Λ ⊗OK,τi C × Λ ⊗OK,τi C → C
151
+ 3
152
+
153
+ is the hermitian form attached to h and the embedding τi. Define
154
+ τ = τ1 : K → C,
155
+ and
156
+ V = Λ ⊗OK,τ C,
157
+ and assume that
158
+ (ri, si)
159
+ =
160
+
161
+ (n, 1)
162
+ if i = 1,
163
+ (n + 1, 0)
164
+ if 2 ≤ i ≤ g.
165
+ Let m be the largest positive integer for which the m-th cyclotomic field Q(ζm) can
166
+ be embedded in K, where ζm = e2πi/m ∈ C. Let ζ ∈ K be a primitive m-th root of
167
+ unity in K, and define
168
+ µK = ⟨ζ⟩ ⊂ O∗
169
+ K ⊂ OK.
170
+ Moreover, define Γ to be the unitary group of Λ, and PΓ as its quotient by µK:
171
+ Γ = U(Λ)(OK) = AutOK(Λ, h)
172
+ and
173
+ PΓ = Γ/µK.
174
+ A norm one vector r ∈ Λ is called a short root. Let R ⊂ Λ be the set of short roots.
175
+ For r ∈ R, define isometries φi
176
+ r : V → V as follows:
177
+ φr(x) = x − (1 − ζ)h(x, r) · r,
178
+ φi
179
+ r(x) = x − (1 − ζi)h(x, r) · r,
180
+ i ∈ (Z/m)∗.
181
+ Note that φi
182
+ r ∈ Γ for r ∈ R, and that φi
183
+ r = φr ◦ · · · ◦ φr (i times). In particular,
184
+ φm
185
+ r = id. Let P(V ) be the projective space of lines in V , and let
186
+ CHn = {ℓ = [v] ∈ P(V ) | h(v, v) < 0} ⊂ P(V )
187
+ be the space of negative lines in V . Define
188
+ Hr = {x ∈ CHn : h(x, r) = 0} for r ∈ R,
189
+ and
190
+ H =
191
+
192
+ r∈R
193
+ Hr
194
+
195
+ CHn.
196
+ Lemma 2.1. The family of hyperplanes (Hr)r∈R is locally finite, so that the hyperplane
197
+ arrangement H ⊂ CHn is a divisor of CHn.
198
+ Proof. See [Bea09, Lemma 5.3].
199
+ Define an OF-linear map α : Λ → Λ to be anti-unitary if for all x, y ∈ Λ and λ ∈ OK,
200
+ one has α(λx) = σ(λ) · α(x) and h(α(x), α(y)) = σ(h(x, y)) ∈ OK. Define Γ′ to be the
201
+ group of unitary and anti-unitary OF-linear bijections Λ
202
+ ∼−→ Λ. Let A ⊂ Γ′ be the set
203
+ of anti-unitary involutions α: Λ → Λ. Then
204
+ µK ⊂ Γ ⊂ Γ′
205
+
206
+ define
207
+ PΓ′ = Γ′/µK.
208
+ (2)
209
+ Let λ ∈ K∗. Observe that
210
+
211
+ λ ∈ O∗
212
+ K and |λ|2 = λ · σ(λ) = 1
213
+
214
+ ⇐⇒
215
+ λ ∈ µK.
216
+ (3)
217
+ Indeed, we have, for any embedding ϕ: K → C, that
218
+ |ϕ(λ)|2 = ϕ(λ) · ϕ(λ) = ϕ(λ) · ϕ(σ(λ)) = ϕ(λ · σ(λ)),
219
+ where ϕ(λ) = ϕ(σ(λ)) by [Mil20, Proposition 1.4]. Moreover, we have |ϕ(λ)| = 1 for
220
+ each ϕ: K → C if and only if λ is a root of 1, see [Mil08, Corollary 5.6].
221
+ 4
222
+
223
+ Lemma 2.2. Let Isom(CHn) be the group of isometries f : CHn
224
+ ∼−→ CHn. The natural
225
+ homomorphism PΓ′ → Isom(CHn) is injective.
226
+ Proof. This is easy and left to the reader.
227
+ The group µK acts on A by multiplication; define
228
+ PA = µK \ A ,
229
+ and
230
+ CA = PΓ \ PA ,
231
+ where PΓ acts on PA by conjugation. Any α ∈ PA defines an anti-holomorphic
232
+ involution
233
+ α : CHn → CHn;
234
+ define
235
+ RHn
236
+ α = (CHn)α ⊂ CHn.
237
+ For any element α ∈ A , the quadratic form h|V α on the real vector space
238
+ V α = Λα ⊗OF ,τ|F C
239
+ has hyperbolic signature. The following lemma is readily proved:
240
+ Lemma 2.3. For α ∈ A , let P(V α) be the real projective space of lines in V α, and
241
+ let RH(V α) ⊂ P(V α) be the space of negative lines in V α. The canonical isomorphism
242
+ P(V α) ∼= P(V )α restricts to an isomorphism RH(V α) ∼= RHn
243
+ α.
244
+ We conclude that RHn
245
+ α ⊂ CHn is isometric to the real hyperbolic space of dimension
246
+ n. Finally, we define
247
+ PΓα = StabPΓ(RHn
248
+ α) ⊂ PΓ
249
+ (the stabilizer of RHn
250
+ α in PΓ).
251
+ 2.2
252
+ Orthogonal hyperplanes and complex reflections. We assume, in the entire
253
+ Section 2, that the following condition is satisfied:
254
+ Condition 2.4. If r, t ∈ R are such that Hr ̸= Ht and Hr ∩ Ht ̸= ∅, then h(r, t) = 0.
255
+ Example 2.5. Theorem 4.12 of Section 4 shows that Condition 2.4 holds if the fol-
256
+ lowing conditions are satisfied:
257
+ 1. The different ideal DK ⊂ OK is generated by a single element η ∈ OK such that
258
+ σ(η) = −η and ℑ(τi(η)) > 0 for every i.
259
+ 2. The CM type (K, Ψ) is primitive.
260
+ We will see that condition 1 is automatically satisfied for quadratic and cyclotomic
261
+ CM fields K, see Proposition 4.14.
262
+ Note that Condition 2.4 implies that if Hr1, . . . , Hrk for ri ∈ R are mutually distinct,
263
+ and if their common intersection is non-empty, then ∩k
264
+ i=1Hri ⊂ CHn is a totally
265
+ geodesic subspace of codimension k. Note also that for any r ∈ R, the element φr ∈ Γ
266
+ generates a finite subgroup ⟨φr⟩ ⊂ Γ of order m, and that the restriction of the quotient
267
+ map π: Γ → PΓ to this subgroup ⟨φr⟩ ⊂ Γ is injective. We will abuse notation, by
268
+ letting φr ∈ PΓ denote the image of φr ∈ Γ in PΓ.
269
+ 5
270
+
271
+ Definition 2.6. Let H = {Hr | r ∈ R}. For x ∈ CHn, define
272
+ H(x) = {H ∈ H | x ∈ H} ,
273
+ G(x) = ⟨φi
274
+ r ∈ PΓ with r ∈ R, i ∈ Z/m | x ∈ Hr⟩.
275
+ The hyperplanes H ∈ H(x) are called the nodes of x. We say that x has k nodes if
276
+ the cardinality of H(x) is k.
277
+ Proposition 2.7. Let r, t ∈ R. The following are equivalent:
278
+ 1. One has φr = φt ∈ Γ.
279
+ 2. There exist i, j ∈ Z/m − {0} such that φi
280
+ r = φj
281
+ t ∈ Γ.
282
+ 3. There exist a, b ∈ OK − {0} with |a|2 = |b|2 such that a · r = b · t ∈ OK.
283
+ Proof. [1 =⇒ 2] : This is clear.
284
+ [2 =⇒ 3] : Suppose for contradiction that there are no such a, b ∈ OK − {0}. Since
285
+ K = Frac(OK), this implies that r, t ∈ V are linearly independent over K, and hence
286
+ over C, which contradicts the equality
287
+ ζi · r = φi
288
+ r(r) = φj
289
+ t(r) = r − (1 − ζj)h(r, t) · t ∈ V.
290
+ Thus, there exist a, b ∈ OK − {0} with a · t = b · r. We have |a|2 = h(a · t, a · t) =
291
+ h(b · r, b · r) = |b|2.
292
+ [3 =⇒ 1] : Write λ = b/a ∈ K∗; then t = λ · r with |λ|2 = 1. For x ∈ V , one gets
293
+ φt(x) = φλ·r(x) = x − (1 − ζ) · h(x, λ · r) · λ · r = x − (1 − ζ) · h(x, r) · r = φr(x).
294
+ Lemma 2.8. Let x ∈ CHn and suppose that x has k nodes. Then G(x) ∼= (Z/m)k.
295
+ Proof. Let r, t ∈ R. Then, for z ∈ Λ, one has
296
+ φi
297
+ r(φj
298
+ t(z)) = φi
299
+ r
300
+
301
+ z − (1 − ζj)h(z, t) · t
302
+
303
+ = z − (1 − ζj)h(z, t) · t − (1 − ζi)h
304
+ ��
305
+ z − (1 − ζj)h(z, t) · t
306
+
307
+ , r
308
+
309
+ · r
310
+ = z − (1 − ζj)h(z, t) · t − (1 − ζi)h(z, r) · r + (1 − ζi)(1 − ζj)h(z, t)h(t, r) · r.
311
+ (4)
312
+ Now suppose that Hr, Ht ∈ H(x), with Hr ̸= Ht. By Condition 2.4, we have h(r, t) = 0;
313
+ by (4), this implies that φi
314
+ r ◦ φj
315
+ t = φj
316
+ t ◦ φi
317
+ r for each i, j ∈ Z/m. We conclude that the
318
+ group G(x) is abelian.
319
+ Next, suppose that Hr = Ht ∈ H(x). To finish the proof, it suffices to show that
320
+ φt = λ · φi
321
+ r for some i ∈ Z/m and λ ∈ µK. This follows from Lemma 2.9 below.
322
+ Lemma 2.9. Let r ∈
323
+ R. Let φ : CHn → CHn be an isometry of order m that
324
+ restricts to the identity on Hr ⊂ CHn. Then φ = φi
325
+ r for some i ∈ Z/m.
326
+ 6
327
+
328
+ Proof. Let Hn
329
+ C be the hyperbolic space attached to the standard hermitian space Cn,1
330
+ of dimension n + 1. It is classical that
331
+ StabU(n,1)(Hn−1
332
+ C
333
+ ) = U(n − 1, 1) × U(1).
334
+ Thus, any φ ∈ U(n, 1) that fixes Hn−1
335
+ C
336
+ pointwise lies in C∗ × U(1), where U(1) denotes
337
+ {z ∈ C∗ : |z|2 = 1}. If φm ∈ C∗ × {1}, then φ ∈ C∗ × ⟨ζ⟩ ⊂ U(n − 1, 1) × U(1).
338
+ We will also consider G(x) as a subgroup of Γ sometimes. Lemma 2.2 allows us to
339
+ view PA as a subset of Isom(CHn), and also to view the groups G(x) ⊂ PΓ ⊂ PΓ′
340
+ (for any x ∈ CHn) as subgroups of Isom(CHn). Define
341
+ �Y =
342
+
343
+ α∈PA
344
+ RHn
345
+ α.
346
+ We will glue the different hyperbolic spaces RHn
347
+ α, by defining an equivalence relation
348
+ ∼ on �Y . Before we define it, we state and prove a couple of trivial results.
349
+ Lemma 2.10. Let α ∈ A and r ∈ R. Then α ◦ φi
350
+ r = φ−i
351
+ α(r) ◦ α.
352
+ Proof. Indeed, for x ∈ Λ, we have
353
+ α(φi
354
+ r(x)) = α
355
+
356
+ x − (1 − ζi)h(x, r) · r
357
+
358
+ = α(x) − (1 − ζ−i)h(x, r) · α(r)
359
+ = α(x) − (1 − ζ−i)h(α(x), α(r)) · α(r) = φ−i
360
+ α(r)(α(x)).
361
+ Lemma 2.11. Let x ∈ RHn
362
+ α and write H(x) = {Hr1, . . . , Hrk} for some ri ∈ R. Then
363
+ for each i ∈ {1, . . . , k} there is a unique j ∈ {1, . . . , k} such that α(Hri) = Hα(ri) = Hrj.
364
+ Proof. Indeed, we have, for any β ∈ A and r ∈ R, that β(Hr) = Hβ(r). Since x ∈ Hri,
365
+ we have x = α(x) ∈ α(Hri) = Hα(ri) for every i. In particular, we have Hα(ri) ∈ H(x)
366
+ (see Definition 2.6), so that Hα(ri) = Hrj for some j.
367
+ Definition 2.12. Let α ∈ PA and x ∈ RHn
368
+ α. Write H(x) = {Hr1, . . . , Hrk}, see
369
+ Definition 2.6. By Lemma 2.11, the involution α induces an involution on the set
370
+ H(x). Define α: I → I as the resulting involution on the set I = {1, . . . , k}.
371
+ Proposition 2.13. Let α ∈ PA and x ∈ RHn
372
+ α. Write H(x) = {Hr1, . . . , Hrk} (Def-
373
+ inition 2.6) and let g = φi1
374
+ r1 ◦ · · · ◦ φik
375
+ rk ∈ G(x) for some iν ∈ Z/m. The following are
376
+ equivalent:
377
+ 1. We have g ◦ α ∈ PA . (In other words, g ◦ α is an involution.)
378
+ 2. For each ν ∈ I, we have iν ≡ iα(ν) mod m.
379
+ 7
380
+
381
+ Proof. Lift α ∈ PA to an element α ∈ A . We claim that, for each i ∈ I, we have
382
+ φα(ri) = φrα(i). Indeed, by Lemma 2.11, for each i ∈ I, we have α(Hri) = Hα(ri) = Hrj ∈
383
+ H(x) for some j ∈ I. By definition of the involution α: I → I, we have j = α(i).
384
+ Therefore, φα(ri) = φbirα(i) for some bi ∈ Z/m, see Lemma 2.9. By Proposition 2.7, we
385
+ have bi = 1. By Lemma 2.10 and by this claim, we obtain φiν
386
+ rν ◦α = α◦φ−iν
387
+ α(rν) = α◦φ−iν
388
+ rα(ν)
389
+ for each ν ∈ I, which implies that φi1
390
+ r1 ◦ · · · ◦ φik
391
+ ik ◦ α = α ◦ φ−i1
392
+ rα(1) ◦ · · · ◦ φ−ik
393
+ iα(k). Therefore,
394
+
395
+ φi1
396
+ r1 ◦ · · · ◦ φik
397
+ ik ◦ α
398
+ �2 = φi1
399
+ r1 ◦ · · · ◦ φik
400
+ ik ◦ φ−i1
401
+ rα(1) ◦ · · · ◦ φ−ik
402
+ iα(k)
403
+ = φ
404
+ iα(1)
405
+ rα(1) ◦ · · · ◦ φ
406
+ iα(k)
407
+ iα(k) ◦ φ−i1
408
+ rα(1) ◦ · · · ◦ φ−ik
409
+ iα(k)
410
+ = φ
411
+ iα(1)−i1
412
+ rα(1)
413
+ ◦ · · · ◦ φ
414
+ iα(k)−ik
415
+ iα(k)
416
+ ∈ G(x),
417
+ and this is the identity in G(x) if and only if iν ≡ iα(ν) mod m.
418
+ 2.3
419
+ The glueing construction.
420
+ Definition 2.14. Define a relation R ⊂ �Y × �Y as follows. An element
421
+ (xα, yβ) ∈ RHn
422
+ α × RHn
423
+ β ⊂ �Y × �Y
424
+ is an element of R if the following conditions are satisfied:
425
+ 1. The images of xα and yβ in CHn agree.
426
+ 2. If α ̸= β, then
427
+ (a) xα = yβ lies in H ; and
428
+ (b) β = g ◦ α ∈ PA for some g ∈ G(xα) = G(yβ) (c.f. Lemma 2.2).
429
+ Remark 2.15. Conditions 1 and 2 in Definition 2.14 say that we are identifying
430
+ points of RHn
431
+ α ∩ H and RHn
432
+ β ∩ H that have the same image in CHn. But we do
433
+ not glue all such points: the real structures α and β are required to differ by complex
434
+ reflections in the hyperplanes that pass through x. In fact, we will see below (see
435
+ Lemma 3.2) that the glueing can be rephrased as follows: we glue RHn
436
+ α and RHn
437
+ β
438
+ along their intersection, provided that this intersection is contained in H in such a
439
+ way that for some (equivalently, any) x ∈ RHn
440
+ α ∩ RHn
441
+ β , the real structures α and β
442
+ differ by reflections in hyperplanes that pass through x.
443
+ Lemma 2.16. R is an equivalence relation.
444
+ Proof. Consider three elements xα, yβ, zγ ∈ �Y . The fact that xα ∼ xα is clear.
445
+ Suppose that xα ∼ yβ. If α = β then xα = yβ ∈ �Y hence yβ ∼ xα. If α ̸= β then
446
+ xα = yβ ∈ H ⊂ CHn, and β = g ◦ α for g ∈ G(xα) = G(yβ) as in Definition 2.14.
447
+ Since α = g−1 ◦ β with g−1 ∈ G(xα), this shows that yβ ∼ xα.
448
+ Suppose that xα ∼ yβ and yβ ∼ zγ; we claim that xα ∼ zγ. We may and do assume
449
+ that α, β and γ are different, which implies that xα = yβ = zγ ∈ H , that γ = h◦β for
450
+ some h ∈ G(yβ), and that β = g◦α for some g ∈ G(xα). We obtain γ = h◦β = h◦g◦α
451
+ for h ◦ g ∈ G(xα) = G(yβ) = G(zγ).
452
+ 8
453
+
454
+ Definition 2.17. Define Y to be the quotient of �Y by the equivalence relation R, and
455
+ equip it with the quotient topology. We shall prove (Lemma 2.18) that the group PΓ
456
+ acts on Y . We call PΓ\Y the glued space attached to the hermitian OK-lattice (Λ, h).
457
+ Lemma 2.18. The action of PΓ on CHn induces an action of PΓ on �Y , compat-
458
+ ible with the equivalence relation R, so that PΓ acts on Y .
459
+ Moreover, PΓ \ �Y =
460
+
461
+ α∈CA PΓα \ RHn
462
+ α.
463
+ Proof. If φ ∈ PΓ, then φ (RHn
464
+ α) = RHn
465
+ φαφ−1 hence PΓ acts on �Y = �
466
+ α∈PA RHn
467
+ α, and
468
+ PΓ \ �Y = PΓ \
469
+
470
+ α∈PA
471
+ RHn
472
+ α =
473
+
474
+ α∈CA
475
+ PΓα \ RHn
476
+ α.
477
+ Now suppose that xα ∼ yβ ∈ �Y and f ∈ PΓ. Then f(xα) ∈ RHn
478
+ fαf−1 and f(yβ) ∈
479
+ RHn
480
+ fβf−1. We claim that
481
+ f(xα)fαf−1 ∼ f(yβ)fβf−1.
482
+ For this, we may and do assume that xα ̸= yβ, hence xα = yβ ∈ H and β = g ◦ α for
483
+ some g ∈ G(xα) as in Definition 2.14. In particular, f(xα) = f(yβ). Since f ◦φi
484
+ r◦f −1 =
485
+ φi
486
+ f(r) for each r ∈ R and i ∈ Z/m, and h(x, r) = 0 if and only if h(f(x), f(r)) = 0, we
487
+ have fG(x)f −1 = G(f(x)) for each x ∈ CHn. We are done:
488
+ fβf −1 = f(g ◦ α)f −1 = fgf −1 ◦ (fαf −1),
489
+ fgf −1 ∈ G(f(xα)).
490
+ 3
491
+ The hyperbolic orbifold structure on the glued space
492
+ The following is the main result of Section 3:
493
+ Theorem 3.1.
494
+ 1. The glued space PΓ\Y admits a metric that makes it a complete
495
+ path metric space. The natural map PΓ \ Y → PΓ \ CHn is a local isometry.
496
+ 2. Each point x ∈ PΓ\Y admits an open neighborhood U ⊂ PΓ\Y which is isomet-
497
+ ric to the quotient of an open subset V ⊂ RHn by a finite group of isometries.
498
+ Therefore, the glued space PΓ \ Y has a real hyperbolic orbifold structure.
499
+ 3. One has �
500
+ α∈CA PΓα \ (RHn
501
+ α − H ) ⊂ PΓ \ Y as an open suborbifold.
502
+ 4. The connected components of the real hyperbolic orbifold PΓ \ Y are uniformized
503
+ by RHn: for each component C ⊂ PΓ \ Y there exists a lattice PΓC ⊂ PO(n, 1)
504
+ and an isomorphism of real hyperbolic orbifolds C ∼= PΓC \ RHn. Consequently,
505
+ PΓ \ Y ∼=
506
+
507
+ C∈π0(PΓ\K)
508
+ PΓC \ RHn.
509
+ It can happen that PΓ \ Y is connected: such is the case when K = Q(ζ3) and
510
+ h = diag(−1, 1, 1, 1, 1), see [ACT10]. When K = Q(ζ3) and h = diag(−1, 1, 1, 1), then
511
+ PΓ \ Y has two components, see [ACT07, Remark 6].
512
+ 9
513
+
514
+ 3.1
515
+ The path metric on the glued space. We start with a lemma. We will need it in
516
+ the proof of Lemma 3.4 below, which will be used to define a path metric on PΓ \ Y
517
+ making it locally isometric to quotients of RHn by finite groups of isometries. It also
518
+ serves as a sanity check: if there exists x ∈ RHn
519
+ α ∩ RHn
520
+ β such that xα ∼ xβ, then one
521
+ glues the entire copy RHn
522
+ α to the copy RHn
523
+ β along their intersection in CHn.
524
+ Lemma 3.2.
525
+ 1. Let g = �k
526
+ ν=1 φiν
527
+ rν ∈ Γ for some set {rν} ⊂ R of mutually orthog-
528
+ onal short roots rν, where iν ̸≡ 0 mod m for each ν. Then (CHn)g = ∩k
529
+ ν=1Hrν.
530
+ 2. Let α, β ∈ PA and x ∈ RHn
531
+ α ∩ RHn
532
+ β such that xα ∼ xβ. Then yα ∼ yβ for every
533
+ y ∈ RHn
534
+ α ∩ RHn
535
+ β .
536
+ 3. The natural map �Y → CHn descends to a PΓ-equivariant map P : Y → CHn.
537
+ Proof. 1. Let y ∈ V be representing an element in (CHn)φ. Since the ri are orthogonal,
538
+ and g(y) = λ for some λ ∈ C∗, we have
539
+ g(y) =
540
+ k
541
+
542
+ ν=1
543
+ φiν
544
+ rν(y) = y −
545
+ k
546
+
547
+ ν=1
548
+
549
+ 1 − ζiν�
550
+ h(y, rν)rν = λy,
551
+ (5)
552
+ hence (1 − λ)y = �ℓ
553
+ i=1 (1 − ζiν) h(y, rν)rν ∈ V .
554
+ But y spans a negative definite
555
+ subspace of V while the rν span a positive definite subspace, so that we must have
556
+ 1 − λ = 0 = �k
557
+ ν=1 (1 − ζiν) h(y, rν)rν. Since the rν are mutually orthogonal, they
558
+ are linearly independent; since ζiν ̸= 1 we find h(y, rν) = 0 for each ν. Conversely, if
559
+ x ∈ ∩Hrν, then φiν
560
+ rν(x) = x for each ν.
561
+ 2. Since xα ∼ xβ, there exists g ∈ G(x) such that β = g ◦ α. Write H(x) =
562
+ {Hr1, . . . , Hrk}. Let y ∈ RHn
563
+ α ∩ RHn
564
+ β . Then α(y) = β(y) = y implies that g(y) = y.
565
+ In particular, y ∈ ∩νHrν by Part 1, which implies that H(x) ⊂ H(y), which in turn
566
+ implies that G(x) ⊂ G(y). We conclude that g ∈ G(y). Hence yα ∼ yβ.
567
+ 3. If xα ∼ yβ, then x = y ∈ CHn.
568
+ By Lemma 3.2, we obtain continuous maps
569
+ P : K → CHn,
570
+ and
571
+ P : PΓ \ Y → PΓ \ CHn.
572
+ Our next goal is to prove that each point x ∈ Y has a neighbourhood V ⊂ Y that
573
+ maps homeomorphically onto a finite union ∪ℓ
574
+ i=1RHn
575
+ αi ⊂ CHn. Hence x has an open
576
+ neighourhood x ∈ U ⊂ V that identifies with an open set in a union of copies of RHn
577
+ in CHn under the map P. This allows us to define a metric on Y by pulling back the
578
+ metric on CHn.
579
+ Lemma 3.3. Each compact set Z ⊂ CHn meets only finitely many RHn
580
+ α, α ∈ PA .
581
+ Proof. Recall the subgroup PΓ′ ⊂ Isom(CHn) (see (2) and Lemma 2.2). We have that
582
+ PΓ′ acts properly discontinuously on CHn. So if S is the set of α ∈ PA such that
583
+ αZ ∩ Z ̸= ∅, then S is finite. In particular, Z meets only finitely many RHn
584
+ α.
585
+ 10
586
+
587
+ Fix a point f ∈ Y and a point xα ∈ �Y lying above f. Let α1, . . . , αℓ be the elements
588
+ in PA such that xαi ∼ xα for each i ∈ I := {1, . . . , ℓ} (since the group G(x) is finite
589
+ by Lemma 2.8, these are finite in number).
590
+ Let p : �Y → Y be the quotient map, and define
591
+ Yf = p
592
+ � ℓ�
593
+ i=1
594
+ RHn
595
+ αi
596
+
597
+ ⊂ Y.
598
+ (6)
599
+ We prove that Y is locally isometric to opens in unions of real hyperbolic subspaces
600
+ of CHn. Indeed, we have the following:
601
+ Lemma 3.4.
602
+ 1. The set Yf is closed in Y .
603
+ 2. We have P (Yf) = ∪ℓ
604
+ i=1RHn
605
+ αi ⊂ CHn, and the map
606
+ Pf : Yf → ∪ℓ
607
+ i=1RHn
608
+ αi
609
+ induced by P is a homeomorphism.
610
+ 3. The set Yf ⊂ Y contains an open neighborhood Uf of f in Y .
611
+ Proof. 1. One has
612
+ p−1 (Yf) = p−1
613
+
614
+ p
615
+ � ℓ�
616
+ i=1
617
+ RHn
618
+ αi
619
+ ��
620
+ =
621
+ ℓ�
622
+ i=1
623
+ p−1 �
624
+ p
625
+
626
+ RHn
627
+ αi
628
+ ��
629
+ ⊂ �Y .
630
+ Therefore, it suffices to show that p−1 �
631
+ p
632
+
633
+ RHn
634
+ αi
635
+ ��
636
+ is closed in �Y .
637
+ But notice that
638
+ xβ ∈ p−1 (p (RHn
639
+ α)) if and only if x ∈ RHn
640
+ α and xα ∼ xβ, which implies (Lemma 3.2)
641
+ that RHn
642
+ α ∩ RHn
643
+ β ⊂ p−1 (p (RHn
644
+ α)). Hence for any α ∈ PA , one has
645
+ p−1 (p (RHn
646
+ α)) =
647
+
648
+ β∼α
649
+ RHn
650
+ α ∩ RHn
651
+ β ,
652
+ where β ∼ α if and only if there exists x ∈ RHn
653
+ α ∩ RHn
654
+ β such that xα ∼ xβ. It follows
655
+ that p−1 (p (RHn
656
+ α)) ∩ RHn
657
+ β is closed in RHn
658
+ β for every β ∈ PA . But the RHn
659
+ β are open
660
+ in �Y and cover �Y , so that p−1 (p (RHn
661
+ α)) is closed in �Y .
662
+ 2. We have
663
+ Pf(Yf) = P
664
+
665
+ p
666
+ � ℓ�
667
+ i=1
668
+ RHn
669
+ αi
670
+ ��
671
+ = �
672
+ P
673
+ � ℓ�
674
+ i=1
675
+ RHn
676
+ αi
677
+
678
+ =
679
+ ℓ�
680
+ i=1
681
+ RHn
682
+ αi ⊂ CHn.
683
+ To prove injectivity, let xαi, yαj ∈ �Y and suppose that x = y ∈ CHn. Then indeed,
684
+ xαi ∼ yαj because ∼ is an equivalence relation by Lemma 2.16.
685
+ Let Z ⊂ CHn be a compact set. Write
686
+
687
+ P : �Y → CHn
688
+ 11
689
+
690
+ for the canonical map.
691
+ Remark that Z meets only finitely many of the RHn
692
+ α for
693
+ α ∈ PA , see Lemma 3.3. Each Z ∩ RHn
694
+ α is closed in Z since RHn
695
+ α is closed in CHn,
696
+ so each Z ∩ RHn
697
+ α is compact. We conclude that �
698
+ P−1(Z) = � Z ∩ RHn
699
+ α is compact.
700
+ In particular, �
701
+ P is closed [Lee13, Theorem A.57].
702
+ Finally, we prove that Pf is closed. Let Z ⊂ Yf be a closed set. Then Z is closed
703
+ in Y by Part 1, hence p−1(Z) is closed in �Y , hence �
704
+ P (p−1(Z))) is closed in CHn, so
705
+ that
706
+ Pf(Z) = P(Z) = �
707
+ P
708
+
709
+ p−1 (Z)
710
+
711
+ =
712
+
713
+
714
+ P
715
+
716
+ p−1 (Z)
717
+ ��
718
+
719
+
720
+ ∪ℓ
721
+ i=1RHn
722
+ αi
723
+
724
+ is closed in ∪ℓ
725
+ i=1RHn
726
+ αi.
727
+ 3. Let x = P(f) ∈ CHn. Since CHn is locally compact, there exists a compact
728
+ set Z ⊂ CHn and an open set U ⊂ CHn with x ∈ U ⊂ Z. Since Z is compact, it
729
+ meets only finitely many of the RHn
730
+ β ⊂ CHn (Lemma 3.3). Consequently, the same
731
+ holds for U; define V = P−1(U) ⊂ Y . Define
732
+ B = {β ∈ PA : U ∩ RHn
733
+ β ̸= ∅}.
734
+ Also define, for β ∈ PA , Zβ = p
735
+
736
+ RHn
737
+ β
738
+
739
+ ⊂ Y . Then
740
+ f ∈ V ⊂
741
+
742
+ β∈B
743
+ Zβ =
744
+
745
+ β∈B
746
+ β(x)=x
747
+
748
+
749
+ β∈B
750
+ β(x)̸=x
751
+ Zβ.
752
+ Since each Zβ is closed in Y by the proof of part 1, there is an open V ′ ⊂ V with
753
+ f ∈ V ′ ⊂
754
+
755
+ β∈B
756
+ β(x)=x
757
+ Zβ =
758
+
759
+ β∈B
760
+ β(x)=x
761
+ xβ∼xα
762
+
763
+
764
+ β∈B
765
+ β(x)=x
766
+ xβ̸∼xα
767
+
768
+ Hence again there exists an open subset V ′′ ⊂ V ′ with
769
+ f ∈ V ′′ ⊂
770
+
771
+ β∈B
772
+ β(x)=x
773
+ xβ∼xα
774
+ Zβ ⊂
775
+
776
+ β∈PA
777
+ β(x)=x
778
+ xβ∼xα
779
+ Zβ = Yf.
780
+ Therefore, Uf := V ′′ ⊂ Y satisfies the requirements.
781
+ We need one further lemma:
782
+ Lemma 3.5. The topological space Y is Hausdorff.
783
+ Proof. Let f, f ′ ∈ Y be elements such that f ̸= f ′. First suppose that f ̸∈ Yf′. Since
784
+ Yf′ is closed in Y by Lemma 3.4, there is an open neighbourhood U of f such that
785
+ U ∩ Uf′ ⊂ U ∩ Yf′ = ∅.
786
+ Next, suppose that f ∈ Yf′. Lift f and f ′ to elements xα, yβ ∈ �Y . Assume first
787
+ that x = y. This means that P(f) = P(f ′). Since P : Yf′ → CHn is injective,
788
+ this implies that f = f ′, contradiction. So we have x ̸= y ∈ CHn. But CHn is
789
+ Hausdorff, so there are open subsets (U ⊂ CHn, V ⊂ CHn) such that x ∈ U, y ∈ V
790
+ and U ∩ V = ∅. Then P−1(U) ∩ P−1(V ) = ∅.
791
+ 12
792
+
793
+ We then obtain:
794
+ Proposition 3.6. Y is naturally a path metric space, piecewise isometric to RHn.
795
+ Proof. From Lemma 3.4, we deduce that for each f ∈ Y there exists an open neighbor-
796
+ hood f ∈ Uf ⊂ Y such that P induces a homeomorphism Y ⊃ Uf
797
+ ∼−→ P(Uf) ⊂ CHn.
798
+ Pull back the metric on P(Uf) to obtain a metric on Uf. Then define a metric on
799
+ Y as the largest metric which is compatible with the metric on each open set Uf and
800
+ which preserves the lengths of paths.
801
+ Proposition 3.7. The path metric on Y descends to a path metric on X = PΓ \ Y .
802
+ Proof. The metric on Y descends in any case to a pseudo-metric on PΓ \ Y , and
803
+ by [Gro07, Chapter 1], this is a metric if PΓ acts by isometries on Y with closed
804
+ orbits. This is true: the fact that PΓ acts isometrically on Y comes from the PΓ-
805
+ equivariance of P : Y → CHn (Lemma 3.2) together with the construction of the
806
+ metric on Y (Proposition 3.6). To check that the PΓ-orbits are closed in Y , let f ∈ Y
807
+ with representative xα ∈ �Y . By equivariance of p : �Y → Y , we have p−1 (PΓ · f) =
808
+ PΓ · (p−1f), so since p is a quotient map, it suffices to show that
809
+ PΓ ·
810
+
811
+ p−1f
812
+
813
+ = PΓ · ∪xβ∼xαxβ = ∪xβ∼xαPΓ · xβ
814
+ is closed in �Y , thus that each orbit PΓ · xβ is closed in �Y . Since PΓ is discrete, it
815
+ suffices to show that PΓ acts properly on �Y . So let Z ⊂ �Y be any compact set: we
816
+ claim that {g ∈ PΓ : gZ ∩ Z ̸= ∅} is a finite set. Indeed, for each g ∈ PΓ, one has
817
+
818
+ P (gZ ∩ Z) ⊂ g �
819
+ P(Z) ∩ �
820
+ P(Z), and the latter is non-empty for only finitely many
821
+ g ∈ PΓ, by properness of the action of PΓ on CHn.
822
+ Since the metric on Y is a path metric, so is the metric on PΓ \ Y [Gro07].
823
+ 3.2
824
+ The orbifold structure on the glued space. The next step is to prove that the
825
+ glued space PΓ \ Y (see Definition 2.17) is locally isometric to quotients of open sets
826
+ in RHn by finite groups of isometries.
827
+ Definition 3.8. Let f ∈ Y with representative xα ∈ �Y . Thus, x is an element in
828
+ CHn, and α ∈ PA is the class of an anti-unitary involution such that α(x) = x.
829
+ 1. The nodes of f are by definition the nodes of xα (see Definition 2.6). Thus, these
830
+ are the hyperplanes H ∈ H(x), i.e. the hyperplanes Hr ∈ H defined by short
831
+ roots r ∈ R such that x ∈ Hr (equivalently, such that h(x, r) = 0).
832
+ 2. The number of nodes of f is the cardinality of H(x).
833
+ 3. The anti-unitary involution α ∈ PA induces an involution on the set H(x) by
834
+ Lemma 2.11. Let H ∈ H(x) be a node. We call H a real node of f if α(H) = H.
835
+ We call (H, α(H)) a pair of complex conjugate nodes of f if α(H) ̸= H.
836
+ 4. If k is the number of nodes of f, we generally write k = 2a+b, with a the number
837
+ of pairs of complex conjugate nodes of f, and b the number of real nodes of f.
838
+ 13
839
+
840
+ Fix again a point f ∈ Y and a point xα ∈ �Y lying above f. Let k = 2a + b be the
841
+ number of nodes of f. Thus x ∈ RHn
842
+ α, and there exist r1, . . . , rk ∈ R such that
843
+ H(x) = {Hr1, . . . , Hrk} ,
844
+ G(x) = ⟨φr1, . . . , φrℓ⟩ ∼= (Z/m)k.
845
+ For β ∈ PA , observe that xβ ∼ xα if and only if α ◦ β ∈ G(x). We relabel the ri so
846
+ that they satisfy the following condition:
847
+ α(Hri) = Hri+1 for i odd and i ≤ 2a,
848
+ α(Hri) = Hri−1 for i even and i ≤ 2a, and
849
+ α(Hri) = Hri for i ∈ {2a + 1, . . . , k} .
850
+ (7)
851
+ In other words, Hri is a real root if and only if i > 2a, and
852
+
853
+ Hri, Hri+1
854
+
855
+ is a pair of
856
+ complex conjugate roots if and only if i < 2a is odd.
857
+ Lemma 3.9. Continue with the notation from above.
858
+ 1. Let β ∈ PA be such that xβ ∼ xα. Then
859
+ β =
860
+ a
861
+
862
+ i=1
863
+
864
+ φr2i−1 ◦ φr2i
865
+ �ji ◦
866
+ k
867
+
868
+ i=2a+1
869
+ φji
870
+ ri ◦ α
871
+ for some j1, . . . , ja, j2a+1, . . . , jk ∈ Z/m. In particular, there are ma+b such β.
872
+ 2. There is an isometry CHn
873
+ ∼−→ Bn(C) identifying x with the origin, φri with the
874
+ map
875
+ Bn(C) → Bn(C),
876
+ (t1, . . . , ti, . . . , tn) �→ (t1, . . . , ζti, . . . , tn),
877
+ and α with the map defined by
878
+ ti �→
879
+
880
+
881
+
882
+
883
+
884
+ ¯ti+1
885
+ for i odd and i ≤ 2a
886
+ ¯ti−1
887
+ for i even and i ≤ 2a
888
+ ¯ti
889
+ for i > 2a.
890
+ (8)
891
+ Proof. 1. This follows readily from Proposition 2.13.
892
+ 2. Since the Hri are orthogonal by Condition 2.4, and their intersection contains
893
+ x, we can find coordinates t1, . . . , tn+1 on V that induce an identification (V, h) ∼=
894
+ Cn,1 := (Cn+1, H) with H(x, x) = |x1|2 + · · · + |xn|2 − |xn+1|2, in such a way that
895
+ Hri ⊂ V is identified with the hyperplane {ti = 0} ⊂ Cn+1 and x ∈ ∩iHri with the
896
+ point (0, 0, . . . , 0, 1). We will do this in the following way. Define
897
+ T = ⟨x⟩ ⊕ ⟨r1⟩ ⊕ · · · ⊕ ⟨rk⟩ ⊂ V,
898
+ W = T ⊥ = {w ∈ V | h(w, t) = 0 ∀t ∈ T}.
899
+ For each i ∈ I = {1, . . . , k}, we have α(ri) = λi · rα(i) for some λi ∈ K (see Lemma
900
+ 2.11, Definition 2.12, and Lemmas 2.9 and 2.8). Observe that α(W) = W. Since
901
+ W ⊂ ⟨x⟩⊥, the hermitian space (W, h|W) is positive definite. Let {w1, . . . , wn−k} ⊂ W
902
+ be an orthonormal basis such that α(wi) = wi, which exists by the elementary
903
+ 14
904
+
905
+ Lemma 3.10. Let (W, h) a non-degenerate hermitian vector space of dimension n ≥ 1
906
+ and let α: W → W be an anti-linear involution with h(α(x), α(y)) = h(x, y) for
907
+ x, y ∈ W. For each positive integer m ≤ n, there exists a linearly independent set
908
+ {wi}m
909
+ i=1 ⊂ W such that h(wi, wj) = ±δij and α(wi) = wi for each i = 1, . . . , m.
910
+ Let {ei}n+1
911
+ i=1 be the standard basis of Cn+1, and define a C-linear isomorphism
912
+ Φ: V
913
+ ∼−→ Cn+1,
914
+
915
+ x
916
+ h(x, x) �→ en+1,
917
+ ri �→ ei,
918
+ wi �→ ei
919
+
920
+ .
921
+ (9)
922
+ By (7), we have that α(ri) = λi · ri+1 for i odd and i ≤ 2a, that α(ri) = λi · ri−1 for i
923
+ even and i ≤ 2a, and that α(ri) = λi · ri for i > 2a. We conclude that the anti-linear
924
+ involution on Cn+1 induced by α and (9) corresponds to the matrix
925
+ α =
926
+
927
+
928
+
929
+
930
+
931
+
932
+
933
+
934
+
935
+
936
+
937
+
938
+
939
+ 0
940
+ α1
941
+ . . .
942
+ 0
943
+ . . .
944
+ . . .
945
+ 0
946
+ α2
947
+ 0
948
+ 0
949
+ 0
950
+ . . .
951
+ ...
952
+ 0
953
+ 0
954
+ 0
955
+ α4
956
+ 0
957
+ 0
958
+ α3
959
+ 0
960
+ ...
961
+ 0
962
+ ...
963
+ ...
964
+ ...
965
+ ...
966
+ ...
967
+ ...
968
+ 0
969
+ ...
970
+ αn
971
+ 0
972
+ 0
973
+ 0
974
+ . . .
975
+ 0
976
+ . . .
977
+ 0
978
+ αn+1
979
+
980
+
981
+
982
+
983
+
984
+
985
+
986
+
987
+
988
+
989
+
990
+
991
+
992
+ where each αi is an anti-linear involution C → C, and αi = αi+1 for i < 2a odd. If
993
+ αi(1) = µi ∈ C∗, then µ−1
994
+ i
995
+ · αi = conj: C → C (complex conjugation). Since |µi| = 1,
996
+ there exists ρi ∈ C such that µi = ρi/ρi and |ρi| = 1. This gives µ−1
997
+ i
998
+ ·αi = ρi ·αi ·ρ−1
999
+ i
1000
+ =
1001
+ conj: C → C. The composition
1002
+ V
1003
+ Φ � Cn+1diag(ρi)� Cn+1
1004
+ induces an isomorphism CHn ∼= Bn(C) with the required properties.
1005
+ Definition 3.11.
1006
+ • Define Af = StabPΓ(f) to be the subgroup of PΓ fixing f ∈ Y .
1007
+ This contains the group G(x) ∼= (Z/m)k.
1008
+ • Define Bf as the subgroup of G(x) generated by the order m complex re-
1009
+ flections associated to the real nodes of f, rather than all the nodes. Hence
1010
+ Bf = ⟨φri⟩i>2a ∼= (Z/m)b.
1011
+ Recall the quotient map p: �Y → Y , the definition (6) of Yf, and Lemma 3.4.
1012
+ Lemma 3.12. The stabilizer Af of f ∈ Y preserves the subset Yf ⊂ Y .
1013
+ Proof. Let ψ ∈ Af, with f = p(xα) ∈ Y , x ∈ ∩iHri. Then ψ(x)ψαψ−1 ∼ xα. Now let
1014
+ p(yβ) ∈ Yf. Then β(x) = x and xα ∼ xβ. Hence xα ∼ ψ · xα ∼ ψ · xβ = ψ(x)ψβψ−1.
1015
+ This implies that ψβψ−1 ◦ α ∈ G(x), so that p (ψ(y)ψβψ−1) ∈ Yf.
1016
+ We also need the following lemma. Write m = 2ak with k ̸= 0 mod 2.
1017
+ 15
1018
+
1019
+ Lemma 3.13. Let T = {t ∈ C : tm ∈ R}. Then G = ⟨ζm⟩ acts on T by multiplication.
1020
+ Each element in T/G has a unique representative of the form ζϵ
1021
+ 2a+1 · r for r ≥ 0 and
1022
+ ϵ ∈ {0, 1}.
1023
+ Proof. Therefore, we have a ≥ 1. Next, observe that t = rζj
1024
+ 2m for some j ∈ Z and
1025
+ r ∈ R if and only if tm ∈ R. One easily shows that since gcd(2, k) = 1, we have
1026
+ ζ2a+1 ·ζ2ak = (ζ2a+1k)k+2. Raising both sides to the power b = (k +2)−1 ∈ (Z/m)∗ gives
1027
+ ζ2m = ζb
1028
+ 2a+1 · ζb
1029
+ m. Consequently, tm ∈ R if and only if t = r · ζbj
1030
+ 2a+1 · ζbj
1031
+ m for some r ∈ R.
1032
+ Finally, ζu
1033
+ 2a+1 · ζv
1034
+ 2a = ζu+2v
1035
+ 2a+1 hence ⟨ζ2a+1⟩/⟨ζ2a⟩ ∼= Z/2.
1036
+ We obtain the key to Theorem 3.1.
1037
+ Proposition 3.14. Keep the above notations, and consider the set Yf ⊂ Y (see (6)).
1038
+ 1. If f has no nodes, then G(x) = Bf is trivial, and Yf = RHn
1039
+ α ∼= Bn(R).
1040
+ 2. If f has only real nodes, then Bf \ Yf is isometric to Bn(R).
1041
+ 3. If f has a pairs of complex conjugate nodes (k = 2a), and no other nodes, then
1042
+ Bf \ Yf = Yf is the union of ma copies of Bn(R), any two of which meet along a
1043
+ B2c(R) for some integer c with 0 ≤ c ≤ a.
1044
+ 4. If f has 2a complex conjugate nodes and b real nodes, then there is an isometry
1045
+ between Bf \ Yf and the union of ma copies of Bn(R) identified along common
1046
+ B2c(R)′s, that is, the set Yf of case 3 above.
1047
+ 5. In each case, Af acts transitively on the indicated copies of Bn(R). If Bn(R) is
1048
+ any one of them, and Γf = (Af/Bf)Bn(R) its stabilizer, then the natural map
1049
+ Γf \ Bn(R) → (Af/Bf) \ (Bf \ Yf) = Af \ Yf
1050
+ is an isometry of path metrics.
1051
+ Proof. 1. This is clear.
1052
+ 2. Suppose then that f has k real nodes. Then in the local coordinates ti of Lemma
1053
+ 3.9.2, we have that α : Bn(C) → Bn(C) is defined by α(ti) = ¯ti. Part 1 of the same
1054
+ lemma shows that any β ∈ PA fixing x such that xα ∼ xβ is of the form
1055
+ Bn(C) → Bn(C),
1056
+ (t1, . . . , ti, . . . , tn) �→ (¯t1ζj1, . . . , ¯tkζjk, ¯tk+1, . . . , ¯tn).
1057
+ Since f has k real nodes and no complex conjugate nodes, we have (writing j =
1058
+ (j1, . . . , jk) and αj = �k
1059
+ i=1 φjiri ◦ α):
1060
+ Yf ∼=
1061
+ m
1062
+
1063
+ j1,...,jk=1
1064
+ RHn
1065
+ αj ∼= {(t1, . . . , tn) ∈ Bn(C) : tm
1066
+ 1 , . . . , tm
1067
+ k , tk+1, . . . , tn ∈ R} .
1068
+ Each of the 2k subsets
1069
+ Kf,ϵ1,...,ϵk :=
1070
+
1071
+ (t1, . . . , tn) ∈ Bn(C) : ζ−ϵ1
1072
+ 2a+1t1, . . . , ζ−ϵk
1073
+ 2a+1tk ∈ R≥0 and tk+1, . . . , tn ∈ R
1074
+
1075
+ ,
1076
+ 16
1077
+
1078
+ indexed by ϵ1, . . . , ϵk ∈ {0, 1}, is isometric to the closed region in Bn(R) bounded by
1079
+ k mutually orthogonal hyperplanes. By Lemma 3.13, their union U is a fundamental
1080
+ domain for Bf, in the sense that it maps homeomorphically and piecewise-isometrically
1081
+ onto Bf \ Yf. Under its path metric, U = ∪Kf,ϵ1,...,ϵk is isometric to Bn(R) by the
1082
+ following map:
1083
+ U → Bn(R),
1084
+ (t1, . . . , tk) �→
1085
+
1086
+ (−ζ2a+1)−ϵ1t1, . . . , (−ζ2a+1)−ϵktk, tk+1, . . . , tn
1087
+
1088
+ .
1089
+ This identifies Bf \ Yf with the standard Bn(R) ⊂ Bn(C).
1090
+ 3. Now suppose f has k = 2a nodes Hr1, . . . , Hr2a. There are now ma anti-isometric
1091
+ involutions αji fixing x and such that xαji ∼ xα: they are given in the coordinates ti
1092
+ as follows, taking j = (j1, . . . , ja) ∈ (Z/m)a:
1093
+ αj : (t1, . . . , tn) �→ (¯t2ζj1, ¯t1ζj1, . . . , ¯t2aζja, ¯t2a−1ζja, ¯t2a+1, . . . , ¯tn).
1094
+ So any fixed-point set RHn
1095
+ αj is identified with
1096
+ Bn(R)αj :=
1097
+
1098
+ (t1, . . . , tn) ∈ Bn(C) : ti = ¯ti−1ζji for 1 ≤ i ≤ 2a even, ti ∈ R for i > 2a
1099
+
1100
+ .
1101
+ All these ma copies of Bn(R) meet at the origin of Bn(C); in fact, for j ̸= j′, the space
1102
+ Bn(R)αj meets the space Bn(R)αj′ in a B2c(R) if c is the number of pairs (ji, j′
1103
+ i) with
1104
+ ji = j′
1105
+ i.
1106
+ 4. Now we treat the general case. In the local coordinates ti, any anti-unitary
1107
+ involutions fixing x and equivalent to α is of the form
1108
+ αj :(t1, . . . , tn) �→
1109
+ (¯t2ζj1, ¯t1ζj1, . . . , ¯t2aζja, ¯t2a−1ζja, ¯t2a+1ζj2a+1, . . . , ¯tkζjk, ¯tk+1, . . . , ¯tn)
1110
+ for some j = (j1, . . . , ja, j2a+1, . . . , jk) ∈ (Z/m)a+b. We now have Bf ∼= (Z/m)b acting
1111
+ by multiplying the ti for 2a+1 ≤ i ≤ k by powers of ζ, and there are ma+b anti-unitary
1112
+ involutions αj. We have
1113
+ Yf ∼=
1114
+ m
1115
+
1116
+ j1,...,jk=1
1117
+ RHn
1118
+ αj ∼=
1119
+
1120
+ (t1, . . . , tn) ∈ Bn(C) | tm
1121
+ 2 = ¯tm
1122
+ 1 , . . . , tm
1123
+ 2a = ¯tm
1124
+ 2a−1, tm
1125
+ 2a+1, . . . , tm
1126
+ k , tk+1, . . . , tn ∈ R
1127
+
1128
+ .
1129
+ We look at subsets Kf,ϵ1,...,ϵk ⊂ Yf again, this time defined as
1130
+ Kf,ϵ =Kf,ϵ1,...,ϵk
1131
+ = {(t1, . . . , tn) ∈ Bn(C) |
1132
+ tm
1133
+ i = ¯tm
1134
+ i−1 i ≤ 2a even, ζ−ϵi
1135
+ 2a+1ti ∈ R≥0 2a < i ≤ k, ti ∈ R, i > k
1136
+
1137
+ .
1138
+ As before, we have that the natural map U := �
1139
+ ϵ Kf,ϵ → Bf \Yf is an isometry. Define
1140
+ �Yf =
1141
+
1142
+ (t1, . . . , tn) ∈ Bn(C) : tm
1143
+ i = ¯tm
1144
+ i−1 for i ≤ 2a even, ti ∈ R, for i > 2a
1145
+
1146
+ .
1147
+ 17
1148
+
1149
+ Under its path metric, U = ∪ϵKf,ϵ1,...,ϵk is isometric to �Yf by the following map:
1150
+ U → �Yf,
1151
+ (t1, . . . , tk) �→
1152
+
1153
+ t1, . . . , t2a, (−ζ2a+1)−ϵ1t2a+1, . . . , (−ζ2a+1)−ϵktk, tk+1, . . . , tn
1154
+
1155
+ .
1156
+ Hence Bf \ Yf ∼= �Yf; but since �Yf is what Yf was in case 3, we are done.
1157
+ 5.
1158
+ The transitivity of Af on the copies of Bn(R) follows from the fact that
1159
+ G(x) ⊂ Af contains transformations multiplying t1, . . . , t2a by powers of ζ, hence
1160
+ ti �→ ζuti, ti−1 �→ ti−1 maps those ti−1, ti with ti = ¯ti−1ζji to those ti−1, ti with
1161
+ ti = ¯ti−1ζj1+u.
1162
+ So if B is any one of the copies of Bn(R), and G = (Af/Bf)H is
1163
+ its stabilizer, then it remains to prove that G \ B → Af \ Yf is an isometry. Surjec-
1164
+ tivity follows from the transitivity of Af on the Bn(R)
1165
+ ′s. It is a piecewise isometry so
1166
+ we only need to prove injectivity. This will follow from an elementary lemma.
1167
+ Lemma 3.15. Let a group G act on a set X, let Y and I be sets, and let {φi : Y �→ X}i∈I
1168
+ be a set of embeddings. Write Yi = φi(Y ) and suppose that X = ∪iYi. Fix 0 ∈ I. Let
1169
+ H ⊂ G be the stabilizer of Y0. Suppose that for all y ∈ X, the stabilizer of y in G acts
1170
+ transitively on the sets Yi containing y. Then H \ Y0 → G \ X is injective.
1171
+ Proof. Let x, y ∈ Y0 and g ∈ G such that g · x = y. Then y = gx ∈ gY0. Since also
1172
+ y ∈ Y0, there is an element h ∈ StabG(y) such that hgY0 = Y0 and hg(x) = h(y) = y.
1173
+ Let f = hg; then f ∈ H and f · x = y, which proves what we want.
1174
+ Now let us use the lemma: suppose that y ∈ Bf \ Yf.
1175
+ We need to prove that
1176
+ StabAf/Bf(y) acts transtivitely on the copies of Bn(R) containing y. There exists
1177
+ j = (j1, . . . , ja, j2a+1, . . . , jk) ∈ (Z/m)a+b
1178
+ such that y = (t1, . . . , tn) with ti = ¯ti−1ζji for i ≤ 2a even, ti = ¯ti−1ζji for 2a < i ≤ k,
1179
+ and ti ∈ R for i > k. If all ti are non-zero, then y ∈ ∪j′RHn
1180
+ αj′ is only contained in
1181
+ RHn
1182
+ αj, so there is nothing to prove. Let us suppose that t1 = t2 = 0 and the other
1183
+ ti are non-zero. Then y is contained in all the RHn
1184
+ αj′ with j′
1185
+ i = ji for i ≥ 2; there
1186
+ are m of them. The stabilizer of y multiplies t1 and t2 by powers of ζ and leaves the
1187
+ other ti invariant; it acts transitively on the RHn
1188
+ αj′ containing y for if t2 = ¯t1ζj′
1189
+ 1 then
1190
+ ζ(j′′
1191
+ 1 −j′
1192
+ 1)t2 = ¯t1ζj′′
1193
+ 1 . The general case is similar.
1194
+ We need one more lemma before we can prove Theorem 3.1:
1195
+ Lemma 3.16. The maps P : Y → CHn and P : PΓ \ Y → PΓ \ CHn are proper.
1196
+ Proof. The map P : Y → CHn is proper because any compact set in CHn meets only
1197
+ finitely many (RHn
1198
+ α)
1199
+ ′s, α ∈ PA (Lemma 3.3), and P carries each Hα = p (RHn
1200
+ α)
1201
+ homeomorphically onto RHn
1202
+ α.
1203
+ To prove that P is proper, let π (resp.
1204
+ q) be the
1205
+ quotient map CHn → PΓ \ CHn (resp. Y → PΓ \ Y ), consider the commutative
1206
+ diagram
1207
+ Y
1208
+ q
1209
+
1210
+ P
1211
+ � CHn
1212
+ π
1213
+
1214
+ PΓ \ Y
1215
+ P � PΓ \ CHn
1216
+ 18
1217
+
1218
+ and let Z ⊂ PΓ \ Y be a closed subset. Its inverse image W = q−1(Z) ⊂ Y in Y is a
1219
+ closed, PΓ-invariant subset. Since P is proper and PΓ-equivariant, P(W) ⊂ CHn is
1220
+ a closed, PΓ-invariant subset of CHn and we have
1221
+ P(W) = π−1π (P(W)) = π−1 �
1222
+ P (Z)
1223
+
1224
+ .
1225
+ Hence P(Z) is closed in PΓ \ CHn, which proves that P is closed. Therefore, to
1226
+ prove that P is proper, it suffices to show that it has finite fibers.
1227
+ Let y ∈ PΓ \ CHn and let V = P
1228
+ −1(y) ⊂ PΓ \ Y . For each v ∈ V , choose an
1229
+ element uv ∈ Y such that q(uv) = v. This gives
1230
+ q−1(V ) =
1231
+
1232
+ v∈V
1233
+ PΓ · uv ⊂ Y.
1234
+ Moreover, we have that
1235
+ P(PΓ · uv) = PΓ · P(uv) = π−1π (P(uv)) = π−1(q(v)) = π−1(y)
1236
+ for each v ∈ V . This gives a map
1237
+ P :
1238
+
1239
+ v∈V
1240
+ PΓ · uv → π−1(y)
1241
+ which is surjective on each PΓ · uv. By properness of P, for any z ∈ π−1(y), the
1242
+ inverse image
1243
+ P−1(z) ⊂
1244
+
1245
+ v∈V
1246
+ PΓ · uv ⊂ Y
1247
+ is finite. Since P−1(z) meets every orbit PΓ · uv, it follows that V is finite.
1248
+ Proof of Theorem 3.1. 1. The path metric on PΓ \ Y is given by Proposition 3.7.
1249
+ Note that the map P : Y → CHn is a local embedding by Lemma 3.4, which was
1250
+ used to define the metric on Y (Proposition 3.6). Thus, almost by definition, P is
1251
+ a local isometry. For each f ∈ Y we can find a PΓf-invariant open neighborhood
1252
+ Uf ⊂ Yf ⊂ Y such that PΓf \ Uf ⊂ PΓ \ Y , with Uf mapping bijectively onto an open
1253
+ subset Vf in the closed subset P(Yf) = ∪iRHn
1254
+ αi ⊂ CHn. By PΓ-equivariance of P,
1255
+ the set Vf is PΓf-invariant, and we have PΓf \ Vf ⊂ PΓ \ CHn. Thus
1256
+ P : PΓ \ Y → PΓ \ CHn
1257
+ is also a local isometry. The space PΓ \ CHn is complete, and P is proper by Lemma
1258
+ 3.16, so PΓ \ Y is complete as well.
1259
+ 2. [f] ∈ PΓ \ Y be the image of f ∈ Y . Then [f] has an open neighborhood
1260
+ isometric to the quotient of an open set W in RHn by a finite group of isometries Γf.
1261
+ Indeed, take Yf ⊂ Y as in Equation (6), and f ∈ Uf ⊂ Yf as in Lemma 3.4.2. We
1262
+ let Af = PΓf be the stabilizer of f in PΓ as before, and take an Af-equivariant open
1263
+ neighborhood Vf ⊂ Uf such that Af \ Vf ⊂ PΓ \ Y . By Proposition 3.14.5, we know
1264
+ that Af \ Yf is isometric to Γf \ RHn for some finite group of isometries of RHn. This
1265
+ 19
1266
+
1267
+ implies that Af \ Vf is isometric to some open set W ′ in Γf \ RHn. Take W ⊂ RHn
1268
+ to be the preimage of W ′.
1269
+ Claim: For any path metric space X locally isometric to quotients of RHn by finite
1270
+ groups of isometries, there is a unique real-hyperbolic orbifold structure on X whose
1271
+ path metric is the given one.
1272
+ Proof of the Claim: If U and U ′ are connected open subsets of RHn and Γ and Γ′
1273
+ finite groups of isometries of RHn preserving U and U ′ respectively, then any isometry
1274
+ ¯φ : Γ \ U → Γ′ \ U ′ extends to an isometry φ : RHn → RHn such that φ(U) = U ′ and
1275
+ φΓφ−1 = Γ′ ⊂ Isom(RHn).
1276
+ We conclude that PΓ \ Y is naturally a real hyperbolic orbifold.
1277
+ 3. Let us show that
1278
+ O :=
1279
+
1280
+ α∈CA
1281
+ [PΓα \ (RHn
1282
+ α − H )] ⊂ PΓ \ Y
1283
+ as hyperbolic orbifolds. It suffices to show the following
1284
+ Claim: For those f = p(xα) ∈ Y that have no nodes, the stabilizer Af = PΓf ⊂ PΓ
1285
+ of f ∈ Y and the stabilizer PΓα,x ⊂ PΓα of x in RHn
1286
+ α agree as subgroups of PΓ.
1287
+ Proof of the Claim: To prove that Af = PΓα,x, we first observe that p : �Y → Y
1288
+ induces an isomorphism between PΓxα, the stabilizer of xα ∈ �Y and PΓf, the stabilizer
1289
+ of f = [x, α] ∈ Y . So it suffices to show that PΓxα = PΓα,x. For this we use that the
1290
+ normalizer NPΓ(α) and the stabilizer PΓα ⊂ PΓ of α in PΓ are equal, which implies
1291
+ that PΓα,x = PΓxα because
1292
+ {g ∈ PΓα : gx = x} = {g ∈ NPΓ(α) : gx = x}
1293
+ =
1294
+
1295
+ g ∈ PΓ : g · xα = (g(x), gαg−1) = xα
1296
+
1297
+ .
1298
+ The claim is proved. Part 3 of the theorem can be deduced from it as follows. Let
1299
+ f = p(xα) ∈ Y have no nodes. We have Yf = RHn
1300
+ α, hence
1301
+ Af \ RHn
1302
+ α = Af \ Yf = Γf \ RHn
1303
+ with
1304
+ Γf = Af \ Bf = Af.
1305
+ By construction, an orbifold chart of the glued space PΓ \ Y is given by
1306
+ W → Af \ W ⊂ PΓα \ RHn
1307
+ α ⊂ Y
1308
+ for an invariant open subset W of RHn
1309
+ α containing x. Because Af = PΓα,x by the
1310
+ claim, this is also an orbifold chart for O at the point xα.
1311
+ 4. The real-hyperbolic orbifold PΓ \ Y is complete by Part 1, so the uniformiza-
1312
+ tion of the connected components of PΓ \ Y follows from the Ehresmann–Thurston
1313
+ uniformization theorem for (G, X)-orbifolds, see [Thu80, Proposition 13.3.2].
1314
+ This
1315
+ concludes the proof of Theorem 3.1, and thereby also of Theorem 1.6.
1316
+ 4
1317
+ Unitary Shimura varieties
1318
+ The goal of this section is to prove Proposition 4.7, which describes the complex ball
1319
+ quotient PΓ\CHn in terms of moduli of abelian varieties with OK-action of hyperbolic
1320
+ 20
1321
+
1322
+ signature, and Proposition 4.10, which interprets the divisor PΓ \ H as the locus
1323
+ of abelian varieties A that admit an OK-linear homomorphism Cg/Ψ(OK) → A of
1324
+ polarized abelian varieties with OK-action. This has two applications:
1325
+ 1. Consider a relative uniform cyclic cover (see e.g. [AV04])
1326
+ X → P → S,
1327
+ where P = P1
1328
+ S (resp. P3
1329
+ S), the fibers of X → S are curves (resp. threefolds with H0,3 =
1330
+ 0) and the induced hermitian form on middle cohomology has hyperbolic signature.
1331
+ Since the image I = P(S(C)) ⊂ PΓ \ CHn of the period map P : S(C) → PΓ \ CHn
1332
+ is contained in the locus of abelian varieties whose theta divisor is irreducible, one has
1333
+ I ⊂ PΓ \ (CHn − H ) .
1334
+ 2.
1335
+ If the different ideal DK ⊂ OK is generated by some η ∈ OK − OF with
1336
+ η2 ∈ OF, then the hyperplanes in the arrangement H ⊂ CHn are orthogonal along
1337
+ their intersection (see Theorem 4.12).
1338
+ 4.1
1339
+ Alternating and hermitian forms on the lattice. The goal of this subsection is
1340
+ to prove two lemmas. They will later be used to show that PΓ\CHn is a moduli space
1341
+ of abelian varieties, and to give a modular interpretation of the divisor PΓ \ H ⊂
1342
+ PΓ \ CHn. We continue with the notation of Section 2.1. In particular, Λ is a free
1343
+ OK-module of rank n + 1.
1344
+ Lemma 4.1. The assignment T �→ TrK/Q ◦ T defines a bijection between:
1345
+ 1. The set of skew-hermitian forms T : ΛQ × ΛQ → K.
1346
+ 2. The set of alternating forms E : ΛQ×ΛQ → Q such that E(a·x, y) = E(x, aσ ·y).
1347
+ Under this correspondence, T(Λ, Λ) ⊂ D−1
1348
+ K if and only if E(Λ, Λ) ⊂ Z.
1349
+ Proof. Let
1350
+ T : ΛQ × ΛQ → K
1351
+ be as in 1. Define ET = TrK/Q ◦ T. Since T is skew-hermitian, we have, for each
1352
+ x, y ∈ ΛQ, that
1353
+ TrK/QT(x, y) = −TrK/QT(y, x).
1354
+ Since K/Q is separable, for any x ∈ K, we have [Ste08, (7-1)]:
1355
+ TrK/Q(x) =
1356
+
1357
+ 1≤i≤g
1358
+ (τi(x) + τiσ(x)) .
1359
+ Thus, we have TrK/Q(σ(x)) = TrK/Q(x), so that ET(x, y) = −ET(y, x) for any x, y ∈
1360
+ ΛQ. The property in 2 is easily checked.
1361
+ 21
1362
+
1363
+ Conversely, let E : ΛQ × ΛQ → Q be as in 2. Choose a basis {b1, . . . , bn+1} ⊂ Λ for
1364
+ Λ over OK. Define Q to be the induced map Kn+1 × Kn+1 → Q and consider the map
1365
+ K → Q, a �→ Q(a · ei, ej). Since the trace pairing
1366
+ K × K → Q,
1367
+ (x, y) �→ TrK/Q(xy)
1368
+ is non-degenerate [Stacks, Tag 0BIE], there is a unique tij ∈ K such that Q(a·ei, ej) =
1369
+ TrK/Q(a · tij) for every a ∈ K.
1370
+ This gives a matrix (tij)ij ∈ Mn+1(K) such that
1371
+ σ(tij) = −tji, and the basis {bi} induces a skew-hermitian form TE : ΛQ × ΛQ → K.
1372
+ The last claim from the definition of D−1
1373
+ K ⊂ K as the trace dual of OK, see [Ser79,
1374
+ Chapter III, §3].
1375
+ Examples 4.2.
1376
+ 1. Suppose K = Q(
1377
+
1378
+ ∆) is imaginary quadratic with discriminant
1379
+ ∆ and non-trivial Galois automorphism a �→ aσ. Let E : Λ × Λ → Z be an
1380
+ alternating form with E(a · x, y) = E(x, aσ · y). The form T : Λ × Λ → D−1
1381
+ K =
1382
+ (
1383
+
1384
+ ∆)−1 is defined as
1385
+ T(x, y) = E(
1386
+
1387
+ ∆ · x, y) + E(x, y)
1388
+
1389
+
1390
+ 2
1391
+
1392
+
1393
+ .
1394
+ 2. Let K = Q(ζ) where ζ = ζp = e2πi/p ∈ C for some prime number p > 2. Let
1395
+ E : Λ × Λ → Z be an alternating form with E(a · x, y) = E(x, aσ · y). Then
1396
+ DK = (p/(ζ − ζ−1)) and
1397
+ T : Λ × Λ → D−1
1398
+ K ,
1399
+ T(x, y) = 1
1400
+ p
1401
+ p−1
1402
+
1403
+ j=0
1404
+ ζjE
1405
+
1406
+ x, ζj · y
1407
+
1408
+ .
1409
+ Now consider a corresponding pair
1410
+ (E : ΛQ × ΛQ → Q,
1411
+ T : ΛQ × ΛQ → K)
1412
+ as in Lemma 4.1, and suppose that E is non-degenerate.
1413
+ Let ϕ : K → C be an
1414
+ embedding. Define a skew-hermitian form T ϕ as
1415
+ T ϕ : Λ ⊗OK,ϕ C × Λ ⊗OK,ϕ C → C,
1416
+ T ϕ(
1417
+
1418
+ i
1419
+ xi ⊗ λi,
1420
+
1421
+ j
1422
+ yj ⊗ µj) =
1423
+
1424
+ ij
1425
+ λiµj · ϕ (T(xi, yj)) .
1426
+ On ΛC, we also have the skew-hermitian form A(x, y) = EC(x, ¯y). The composition
1427
+ (Λ ⊗Z C)ϕ → Λ ⊗Z C → Λ ⊗OK,ϕ C
1428
+ is an isomorphism. Define Aϕ to be the restriction of A to the subspace (Λ ⊗Z C)ϕ =
1429
+ Λ ⊗OK,ϕ C ⊂ ΛC. Note that
1430
+ Λ ⊗Z C ∼= ⊕φ:K→C (Λ ⊗Z C)φ .
1431
+ For x ∈ Λ ⊗Z C, let xφ be the image of x under Λ ⊗Z C → (Λ ⊗Z C)φ.
1432
+ 22
1433
+
1434
+ Lemma 4.3. Let ϕ: K → C be an embedding. We have an equality of skew-hermitian
1435
+ forms:
1436
+ T ϕ = Aϕ : (Λ ⊗Z C)ϕ × (Λ ⊗Z C)ϕ → C.
1437
+ More precisely, we have A(x, y) = �
1438
+ φ:K→C T φ(xφ, yφ) for every x, y ∈ Λ ⊗Z C.
1439
+ Proof. Write V = ΛQ. The lemma follows from the fact that the following diagram
1440
+ commutes:
1441
+ V × V
1442
+ � �
1443
+ ��
1444
+ T
1445
+ � K� �
1446
+
1447
+ TrK/Q
1448
+ � Q� �
1449
+
1450
+ V ⊗Q C × V ⊗Q C
1451
+ TC
1452
+
1453
+ A(x,y)
1454
+
1455
+ K ⊗Q C
1456
+ ⊕φ (V ⊗Q C)φ × (V ⊗Q C)φ
1457
+ ⊕T φ
1458
+ � ⊕φCφ
1459
+
1460
+ � C.
1461
+ Here, φ ranges over the set of embeddings K → C, Cφ is the K-module C where K
1462
+ acts via φ, and
1463
+ TC : V ⊗Q C × V ⊗Q C → K ⊗Q C
1464
+ is the map that sends (v ⊗ λ, x ⊗ µ) to λ¯µT(v, w).
1465
+ 4.2
1466
+ Moduli of abelian varieties with an action by a CM field.
1467
+ Notation 4.4. In the rest of Section 4, we fix:
1468
+ 1. a non-degenerate hermitian form h : Λ × Λ → D−1
1469
+ K ; and
1470
+ 2. an element ξ ∈ D−1
1471
+ K such that σ(ξ) = −ξ and ℑ (τi(ξ)) < 0 for 1 ≤ i ≤ g and
1472
+ write η = ξ−1. Here, the embeddings τi : K → C are those introduced in (1).
1473
+ These data define a skew-hermitian form
1474
+ T : Λ × Λ → D−1
1475
+ K ,
1476
+ T := ξ · h.
1477
+ The form T is in turn attached to a symplectic form (see Lemma 4.1)
1478
+ E : Λ × Λ → Z
1479
+ such that E(ax, y) = E(x, aσy) for all a ∈ OK, x, y ∈ Λ.
1480
+ Write Vi = ΛQ ⊗K,τi C and define
1481
+ hτi : Vi × Vi → C
1482
+ to be the hermitian form restricting to τi ◦ h on Λ. Let (ri, si) be the signature of the
1483
+ hermitian form hτi.
1484
+ Let A be a complex abelian variety, ι a homomorphism OK → End(A), and λ a
1485
+ polarization A → A∨, satisfying the following (c.f. [KR14, Part I, §2.1]):
1486
+ 23
1487
+
1488
+ Conditions 4.5.
1489
+ 1. We have ι(a)† = i(aσ) for the Rosati involution
1490
+ †: End(A)Q → End(A)Q,
1491
+ and
1492
+ 2. char(t, ι(a)|Lie(A)) = �g
1493
+ ν=1(t − aτi)ri · (t − aτiσ)si ∈ C[t]
1494
+ (the characteristic polynomial of ι(a)).
1495
+ Note that dim A = g(n + 1). Define EA : H1(A, Z) × H1(A, Z) → Z to be the alter-
1496
+ nating form corresponding to λ. The condition on the Rosati involution implies that
1497
+ EA(ι(a)x, y) = EA(x, ι(aσ)y) for x, y ∈ H1(A, Q). Define a hermitian form hA on the
1498
+ OK-module H1(A, Z) as follows:
1499
+ hA = ηTA : H1(A, Z) × H1(A, Z) → D−1
1500
+ K .
1501
+ Here, TA : H1(A, Z) × H1(A, Z) → D−1
1502
+ K is the skew-hermitian form attached to EA via
1503
+ Lemma 4.1.
1504
+ Definition 4.6.
1505
+ 1. Let �
1506
+ ShK(h) be the set of isomorphism classes of four-tuples
1507
+ (A, i, λ, j), where (A, i, λ) is as above and satisfies Conditions 4.5, and where
1508
+ j : H1(A, Z) → Λ is a symplectic isomorphism of OK-modules.
1509
+ 2. Let D(Vi) be the space of negative si-planes in the hermitian space (Vi, hτi).
1510
+ We have the following proposition which is due to Shimura, see [Shi63, Theorem 2]
1511
+ or [Shi64, §1]. We give a different proof since it will imply Proposition 4.10 below,
1512
+ whereas we did not know how to deduce Proposition 4.10 from loc.cit. We remark
1513
+ that Shimura assumes Λ to be an R-module for any order R ⊂ OK; our proof carries
1514
+ over, but we do not need this generalization.
1515
+ Proposition 4.7. There is a canonical bijection
1516
+
1517
+ ShK(h) ∼= D(V1) × · · · × D(Vg).
1518
+ Proof. Let (A, i, λ, j) be a representative of an isomorphism class in �
1519
+ ShK(h).
1520
+ Let
1521
+ H1(A, C) = H−1,0 ⊕ H0,−1 be the Hodge decomposition of A. For 1 ≤ i ≤ g there is a
1522
+ decomposition
1523
+ H1(A, C)τi = H−1,0
1524
+ τi
1525
+ ⊕ H0,−1
1526
+ τi
1527
+ ,
1528
+ (10)
1529
+ with dim H−1,0
1530
+ τi
1531
+ = ri and dim H0,−1
1532
+ τi
1533
+ = si. The latter holds because
1534
+ H−1,0
1535
+ τiσ = H0,−1
1536
+ τi
1537
+ .
1538
+ By Lemma 4.3, τi(η)EA,C(x, ¯y) and hτi
1539
+ A,C(x, y) agree as hermitian forms on the complex
1540
+ vector space H1(A, Z) ⊗OK,τi C. Since ℑτi(η) > 0 for every i, the decomposition of
1541
+ H1(A, C)τi in (10) is a decomposition into a positive definite ri-dimensional subspace
1542
+ and a negative definite si-dimensional subspace. The isomorphism j : H1(A, Q) → ΛQ
1543
+ induces an isometry ji : H1(A, C)τi → Vi for every i, and so we obtain a negative
1544
+ si-plane j(H0,−1
1545
+ τi
1546
+ ) in the hermitian space Vi for all i.
1547
+ Reversing the argument shows that given a negative si-plane Xi ⊂ Vi for every i,
1548
+ there is a canonical polarized abelian variety A = H−1,0/Λ, acted upon by OK and
1549
+ inducing the planes Xi ⊂ Vi.
1550
+ 24
1551
+
1552
+ Definition 4.8.
1553
+ 1. Let ShK(h) be the set of isomorphism classes of polarized OK-
1554
+ linear abelian varieties (A, i, λ), satisfying Conditions 4.5, such that H1(A, Z) is
1555
+ isometric to Λ as hermitian OK-modules.
1556
+ 2. Let Γ(h) = AutOK(Λ, h); this is the group of OK-linear automorphisms of Λ
1557
+ preserving our form h : Λ × Λ → D−1
1558
+ K .
1559
+ The bijection in Proposition 4.7 being Γ(h)-equivariant, we obtain the following:
1560
+ Corollary 4.9. There is a canonical bijection
1561
+ ShK(h) ∼= Γ(h) \ D(V1) × · · · × D(Vg).
1562
+ 4.3
1563
+ Abelian varieties with moduli in the hyperplane arrangement. The set of
1564
+ embeddings Ψ defined in (1) defines a map Ψ : OK → Cg, giving a complex torus
1565
+ Cg/Ψ(OK). The map
1566
+ Q : K × K → Q,
1567
+ Q(x, y) = TrK/Q(ξx¯y)
1568
+ is a non-degenerate Q-bilinear form such that Q(ax, y) = Q(x, aσy) for every a, x, y ∈
1569
+ K. Moreover, Q(OK, OK) ⊂ Z because ξ ∈ D−1
1570
+ K . By [Mil20, Example 2.9 & Footnote
1571
+ 16], Q defines a Riemann form on the complex torus Cg/Ψ(OK).
1572
+ As in Section 2.1, let CHn be the set of negative lines in Λ ⊗OK,τ1 C, and define
1573
+ H = ∪h(r,r)=1⟨rC⟩⊥ ⊂ CHn.
1574
+ Proposition 4.10. Suppose that (r1, s1) = (n, 1), (ri, si) = (n + 1, 0) ∀2 ≤ i ≤ g.
1575
+ Under the bijection �
1576
+ ShK(h) ∼= CHn of Proposition 4.7, points in H ⊂ CHn correspond
1577
+ to isomorphism classes of those polarized marked OK-linear abelian varieties A that
1578
+ admit a OK-linear homomorphism Cg/Ψ(OK) → A of polarized abelian varieties.
1579
+ Proof. Consider an isomorphism class [(A, i, λ, y)] ∈ �
1580
+ ShK(h) corresponding to a point
1581
+ [x] ∈ CHn. We may assume that A = H−1,0/Λ with Λ ⊗Z C = H−1,0 ⊕ H0,−1, and that
1582
+ TA = T. Let
1583
+ φ : Cg/Ψ(OK) → A
1584
+ be a homomorphism as in the proposition. We obtain a homomorphism
1585
+ OK → Ψ(OK) → H1(A, Z) = Λ
1586
+ which, for simplicity, we also denote by φ : OK → Λ. Let r ∈ Λ be the image of
1587
+ 1 ∈ OK. The fact that Q = φ∗EA implies that TQ = φ∗TA = φ∗T. Therefore, we have
1588
+ η−1 = TQ(1, 1) = TA(φ(1), φ(1)) = T(φ(1), φ(1)) = T(r, r),
1589
+ 25
1590
+
1591
+ so that h(r, r) = η · T(r, r) = 1.
1592
+ We claim that h(x, rτ) = 0, where the element
1593
+ rτ ∈ (Λ ⊗Z C)τ is the image of r ∈ Λ. To see this, write
1594
+ Ψ(OK) = L,
1595
+ L ⊗ C = W −1,0 ⊕ W 0,−1,
1596
+ and let α ∈ L correspond to 1 ∈ OK. Notice that (L ⊗Z C)τ = W −1,0
1597
+ τ
1598
+ . Consequently,
1599
+ since the composition
1600
+ W −1,0
1601
+ τ
1602
+ = (L ⊗Z C)τ → (Λ ⊗Z C)τ = H−1,0
1603
+ τ
1604
+ ⊕ H0,−1
1605
+ τ
1606
+ factors through the inclusion of H−1,0
1607
+ τ
1608
+ into (L ⊗Z C)τ, we see that
1609
+ rτ = r−1,0
1610
+ τ
1611
+ ∈ H−1,0
1612
+ τ
1613
+ =
1614
+
1615
+ H0,−1
1616
+ τ
1617
+ �⊥ = ⟨x⟩⊥,
1618
+ and the claim follows.
1619
+ Conversely, let [x] ∈ ⟨rC⟩⊥ ⊂ H with r ∈ Λ such that h(r, r) = 1 and consider the
1620
+ marked abelian variety A = H−1,0/Λ corresponding to [x]. Define a homomorphism
1621
+ φ : OK → Λ by φ(1) = r. Then φ can be shown to be a morphism of Hodge structures
1622
+ using the fact that its C-linear extension preserves the eigenspace decompositions. We
1623
+ obtain an OK-linear homorphism φ : Cg/Ψ(OK) → A.
1624
+ The fact that h(r, r) = 1
1625
+ implies that φ preserves the polarizations on both sides.
1626
+ Observe that if the different DK ⊂ OK is a principal ideal (η) ⊂ OK, then we have
1627
+ {x ∈ K : TrK/Q
1628
+
1629
+ xη−1OK
1630
+
1631
+ ⊂ Z} = {x ∈ K : x · η−1OK ⊂ η−1OK}
1632
+ = {x ∈ K : xOK ⊂ OK} = OK.
1633
+ Thus, Q : Ψ(OK)×Ψ(OK) → Z defines a principal polarization on the torus Cg/Ψ(OK)
1634
+ in this case. In fact, for β ∈ K, the rational Riemann form
1635
+ Ψ(K) × Ψ(K) → Q,
1636
+ (Ψ(x), Ψ(y)) �→ TrK/Q(β−1x¯y)
1637
+ defines a principal polarization on Cg/Ψ(OK) if and only if (i) we have that β generates
1638
+ the different ideal DK, (ii) we have that σ(β) = −β, and (iii) we have that ℑ(ϕ(β)) > 0
1639
+ for every ϕ ∈ Ψ. This follows from the above; see also [Wam99].
1640
+ Consider the following:
1641
+ Conditions 4.11.
1642
+ 1. The CM type (K, Ψ) is primitive.
1643
+ 2. We have DK = (η) for some η ∈ OK such that σ(η) = −η.
1644
+ 3. The signature of hτi is (n, 1) for i = 1 and (n + 1, 0) for i ̸= 1.
1645
+ Theorem 4.12. Suppose that Conditions 4.11 hold. Let r1, r2 ∈ Λ satisfy Hr1∩Hr2 ̸= ∅
1646
+ and Hr1 ̸= Hr2 ⊂ CHn for Hri = ⟨ri,C⟩⊥ ⊂ CHn. Then h(r1, r2) = 0.
1647
+ 26
1648
+
1649
+ Proof. Let [x] ∈ Hr ∩ Ht ⊂ CHn(V ), and let A be an abelian variety whose iso-
1650
+ morphism class gives [x].
1651
+ Define B to be the principally polarized abelian variety
1652
+ Cg/Ψ(OK). By Proposition 4.10, the roots r and t induce OK-linear embeddings
1653
+ φ1 : B �→ A
1654
+ and
1655
+ φ2 : B �→ A
1656
+ of polarized abelian varieties. By Lemma 4.13 below, the φi induce decompositions
1657
+ A ∼= B × C1
1658
+ and
1659
+ A ∼= B × C2
1660
+ as polarized abelian varieties. Note that B is non-decomposable as an abelian vari-
1661
+ ety because End(B) ⊗Z Q = K is a field (here we use that the CM type (K, Ψ) is
1662
+ primitive). By [Deb96], the decomposition of (A, λ) into non-decomposable polarized
1663
+ abelian subvarieties is unique, in the strong sense that if (Ai, λi), i ∈ {1, . . . , r} and
1664
+ (Bj, µj), j ∈ {1, . . . , m} are polarized abelian subvarieties such that the natural ho-
1665
+ momorphisms �
1666
+ i(Ai, λi) → (A, λ) and �
1667
+ j(Bj, λj) → (A, λ) are isomorphisms, then
1668
+ r = m and there exists a permutation σ on {1, . . . , r} such that Bj and Aσ(j) are equal
1669
+ as polarized abelian subvarieties of (A, λ), for every j ∈ {1, . . . , r}. Consequently, for
1670
+ the two abelian subvarieties
1671
+ Bi = φi(B) ⊂ A,
1672
+ we have either that
1673
+ B1 = B2 ⊂ A
1674
+ or that
1675
+ B1 ∩ B2 = {0}.
1676
+ Suppose first that B1 = B2. Then
1677
+ OK · r = φ1(OK) = φ2(OK) = OK · t ⊂ Λ.
1678
+ Therefore, r = λt for some λ ∈ O∗
1679
+ K; but then Hr = Ht which is absurd. Thus, we
1680
+ must have
1681
+ A ∼= B1 × B2 × C
1682
+ as polarized abelian varieties, for some polarized abelian subvariety C of A.
1683
+ This
1684
+ implies that
1685
+ H−1,0 = Lie(A) ∼= Lie(B1) × Lie(B2) × Lie(C),
1686
+ which is orthogonal for the positive definite hermitian form iEC(x, ¯y) on H−1,0.
1687
+ Observe that rτ = r−1,0
1688
+ τ
1689
+ ∈ H−1,0
1690
+ τ
1691
+ and tτ = t−1,0
1692
+ τ
1693
+ ∈ H−1,0
1694
+ τ
1695
+ : see the proof of Proposition
1696
+ 4.10. By Lemma 4.3, we have
1697
+ h(r, t) = hτ(rτ, tτ) = τ(η) · T τ
1698
+ C(rτ, tτ)
1699
+ = τ(η) · EC(rτ, ¯tτ) = τ(η) · EC(r−1,0
1700
+ τ
1701
+ , t−1,0
1702
+ τ
1703
+ ).
1704
+ Since r−1,0
1705
+ τ
1706
+ ∈ Lie(B1) and t−1,0
1707
+ τ
1708
+ ∈ Lie(B2), we have iEC(r−1,0
1709
+ τ
1710
+ , t−1,0
1711
+ τ
1712
+ ) = 0.
1713
+ Lemma 4.13. Let A be an abelian variety over a field k, with polarization λ : A → �A.
1714
+ Let B ⊂ A be an abelian subvariety such that the polarization µ = λ|B is principal.
1715
+ There is a polarized abelian subvariety Z ⊂ A such that A ∼= B×Z as polarized abelian
1716
+ varieties.
1717
+ 27
1718
+
1719
+ Proof. Let W = Ker(A
1720
+ λ−→ �A → �B). Let Z = W 0
1721
+ red. Then Z is an abelian subvariety of
1722
+ dimension dim(A)−dim(B) of A. The kernel of the natural homomorphism B×Z → A
1723
+ is contained in (B ∩Z)×(B ∩Z). However, B ∩Z ⊂ B ∩W = (0) because µ : B → �B
1724
+ is an isomorphism. Thus, B × Z → A is an isomorphism.
1725
+ Finally, we remark that the condition on the different ideal DK
1726
+ ⊂ OK in Theorem
1727
+ 4.12 (see Conditions 4.11) is satisfied in two interesting cases:
1728
+ Proposition 4.14. Suppose that K/Q is an imaginary quadratic extension, or that
1729
+ K = Q(ζn) is a cyclotomic field for some integer n ≥ 3. Then Condition 4.11.2 is
1730
+ satisfied, i.e. we have DK = (η) ⊂ OK for some element η ∈ OK such that σ(η) = −η.
1731
+ Proof. If K/Q is imaginary quadratic with discriminant ∆, then DK = (
1732
+
1733
+ ∆) and the
1734
+ assertion is immediate. Let n ≥ 3 be an integer, and consider the fields
1735
+ K = Q(ζn) ⊃ F = Q(α),
1736
+ with
1737
+ α = ζn + ζ−1
1738
+ n .
1739
+ Since OK = Z[ζn] by [Neu99, I, Proposition 10.2], we have OK = OF[ζn]. Notice
1740
+ that f(x) = x2 − αx + 1 ∈ OF[x] is the minimal polynomial of ζn over F. We have
1741
+ f ′(ζn) = 2ζn − αζn = ζn − ζ−1
1742
+ n . Therefore,
1743
+ DK/F = (f ′(ζn)) =
1744
+
1745
+ ζn − ζ−1
1746
+ n
1747
+
1748
+ ,
1749
+ see [Neu99, III, Proposition 2.4].
1750
+ By [Lia76], we know that OF = Z[α]. Moreover, if g(x) ∈ Z[x] is the minimal polyno-
1751
+ mial of α over Q, then DF/Q = (g′(α)). By [Neu99, III, Proposition 2.2], we have that
1752
+ DK/Q = DK/FDF/Q. Combining all this yields
1753
+ DK/Q = DK/FDF/Q =
1754
+
1755
+ ζn − ζ−1
1756
+ n
1757
+
1758
+ · (g′(α)) =
1759
+
1760
+ (ζn − ζ−1
1761
+ n )g′(α)
1762
+
1763
+ .
1764
+ Remark 4.15. It would be more natural to attach an orthogonal hyperplane arrange-
1765
+ ment H ⊂ CHn to every primitive CM field K and integral hermitian form h of
1766
+ hyperbolic signature, such that H = H = ∪h(r,r)=1⟨rC⟩⊥ if DK = (η) for some η ∈ OK
1767
+ such that σ(η) = −η. This turns out to be possible. The idea is as follows.
1768
+ Consider our CM field K. Choose β ∈ OK − OF such that β2 ∈ OF; then choose
1769
+ a CM type Ψ = {τi : K → C}1≤i≤g such that ℑ(τi(β)) > 0 for all i. Let h be a non-
1770
+ degenerate hermitian form Λ × Λ → D−1
1771
+ K such that sign(hτ) = (n, 1) and sign(hτi) =
1772
+ (n + 1, 0) for i ̸= 1. Let S be the set of fractional ideals a ⊂ K for which there exist
1773
+ an element b ∈ OF such that DKaa = (bβ). By [Wam99, Theorem 4], S is not empty.
1774
+ For a ∈ S , define η = bβ ∈ OK and consider the complex torus B = Cg/Ψ(a). It
1775
+ is equipped with the Riemann form Q : Ψ(a) × Ψ(a) → Z, (x, y) �→ TrK/Q(η−1x¯y),
1776
+ and Q defines a principal polarization on B [Wam99, Theorem 3]. Let R be the set
1777
+ of embeddings φ : a → Λ, a ∈ S , such that h(φ(x), φ(y)) = x¯y for all x, y ∈ a. For
1778
+ φ ∈ R, one obtains a hyperplane Hφ = {x ∈ CHn : hτ(x, φ(a)) = 0} ⊂ CHn. The
1779
+ sought-for hyperplane arrangement H ⊂ CHn is defined as H = ∪φ∈RHφ. Indeed, if
1780
+ the CM type (K, Ψ) is primitive, then H is an orthogonal arrangement by arguments
1781
+ similar to those used to prove Proposition 4.10 and Theorem 4.12.
1782
+ 28
1783
+
1784
+ 5
1785
+ Non-arithmeticity of the lattice underlying the glued space
1786
+ 5.1
1787
+ The glued space attached to the standard hermitian lattice over the Eisen-
1788
+ stein integers. Let K = Q(ζ3). For an integer n ≥ 2, let Λn = Z[ζ3]n+1 and define
1789
+ Hn : Λn ⊗Z Λn → OK,
1790
+ Hn(x, y) = −x0¯y0 +
1791
+ n
1792
+
1793
+ i=1
1794
+ xi¯yi.
1795
+ Let Rn = {r ∈ Λn | Hn(r, r) = 1}. By Proposition 4.14 and Theorem 4.12, the hyper-
1796
+ plane arrangement H = ∪r∈RnHr is an orthogonal arrangement, i.e. Condition 2.4
1797
+ is satisfied. Thus, we can perform the glueing construction of Section 2 to obtain a
1798
+ metric space
1799
+ Xn = PΓn \ Yn.
1800
+ Moreover, this metric on Xn extends to a complete real hyperbolic orbifold structure,
1801
+ hence its connected components are quotients of RHn by discrete groups of isometries
1802
+ (see Theorem 3.1.4).
1803
+ The goal of Section 5 is to prove that for every n ≥ 2, there exists a connected
1804
+ component X+
1805
+ n of Xn such that the lattice Γ+
1806
+ n ⊂ PO(n, 1) underlying X+
1807
+ n is non-
1808
+ arithmetic. Moreover, we will prove the analogous statement for the field K′ = Q(ζ5)
1809
+ and the lattice Λ′
1810
+ n =
1811
+
1812
+ Z[ζ5]n+1, diag((1 −
1813
+
1814
+ 5)/2, 1, . . . , 1)
1815
+
1816
+ . See Theorem 5.18 below.
1817
+ 5.2
1818
+ The case n = 2. Define four anti-unitary involutions αi : Λ2 → Λ2 as follows:
1819
+ α0 : (x0, x1, x2) �→ (¯x0,
1820
+ ¯x1,
1821
+ ¯x2)
1822
+ α1 : (x0, x1, x2) �→ (¯x0, −¯x1,
1823
+ ¯x2)
1824
+ α2 : (x0, x1, x2) �→ (¯x0, −¯x1, −¯x2).
1825
+ (11)
1826
+ Lemma 5.1. The anti-unitary involutions α0, α1, α2 are pairwise non-conjugate, each
1827
+ anti-unitary involution of Λ2 is Γ2-conjugate to exactly one of the ±αi for i = 0, 1, 2,
1828
+ the composition
1829
+ 2
1830
+
1831
+ i=0
1832
+ RH2
1833
+ αi → Y2 → PΓ2 \ Y2 = X2
1834
+ is surjective, and X2 is connected.
1835
+ Proof. For the first statement, see [ACT06; ACT10].
1836
+ The idea is as follows.
1837
+ Let
1838
+ θ = ζ3 − ζ−1
1839
+ 3
1840
+ = √−3 ∈ Z[ζ3] and consider the vector space W2 = Λ2/θΛ2. For α ∈ A ,
1841
+ let α: W2 → W2 be the induced involution, and let q2 : V → F3 be the quadratic form
1842
+ q2(x) = H2(x, x) mod θ. Define
1843
+ D(α) = dim(V α),
1844
+ T(α) = det(q2|V α) ∈ F∗
1845
+ 3/(F∗
1846
+ 3)2 = {±1}.
1847
+ (12)
1848
+ The restrictions of q2 := H2 mod θ to the fixed spaces V αi ⊂ V for α0, α1, α2 have
1849
+ pairwise distinct conjugacy invariant (D(αi), T(αi)) (see Lemma 5.2 below), which
1850
+ proves the first statement. Using moduli of real binary sextics with one marked real
1851
+ root, one can then show that each anti-unitary involution of Λ2 must be Γ2-conjugate
1852
+ to exactly one of the ±αi for i = 0, 1, 2. The third statement follows from this. The
1853
+ fourth statement (i.e. the connectivity of X2) follows from the third statement.
1854
+ 29
1855
+
1856
+ 5.3
1857
+ Conjugacy classes of anti-unitary involutions. Define θ = ζ3 − ζ−1
1858
+ 3
1859
+ as before,
1860
+ and define
1861
+ Wn = Λn/θΛn.
1862
+ Define anti-unitary involutions as follows:
1863
+ β0 : Λn → Λn,
1864
+ β0(x0, . . . , xn) = (¯x0, . . . , ¯xn) ,
1865
+ βi : Λn → Λn,
1866
+ βi(x0, . . . , xn) = (¯x0, −¯x1, . . . , −¯xi, ¯xi+1, . . . , ¯xn) .
1867
+ (13)
1868
+ These involutions induce the following involutions on the F3-vector spaces Wn:
1869
+ β0 : Wn → Wn,
1870
+ β0(x0, . . . , xn) = (x0, . . . , xn) ,
1871
+ βi : Wn → Wn,
1872
+ βi(x0, . . . , xn) = (x0, −x1, . . . , −xi, xi+1, . . . , xn) .
1873
+ We also consider the quadratic form
1874
+ qn : Wn → F3,
1875
+ qn(x) = Hn(x, x)
1876
+ mod θ.
1877
+ Note that, for i ≥ 1 and x = (x0, xi+1 . . . , xn) ∈ W βi
1878
+ n , one has qn(x) = −x2
1879
+ 0 + x2
1880
+ i+1 +
1881
+ · · · + x2
1882
+ n. Similarly, for x = (x1, . . . , xi) ∈ V −βi, one has qn(x) = x2
1883
+ 1 + · · · + x2
1884
+ i . For an
1885
+ anti-unitary involution α: Λn → Λn, define the following Γn-conjugacy invariants:
1886
+ D(α) = dim(V α),
1887
+ T(α) = det(qn|V α).
1888
+ The above shows that
1889
+ (D(βi), T(βi)) = (n − i + 1, −1) ,
1890
+ (D(−βi), T(−βi)) = (i, 1) ,
1891
+ i = 0, 1, . . . , n.
1892
+ Therefore, we have shown:
1893
+ Lemma 5.2. The classes ±βi ∈ A for i = 0, . . . , n are all pairwise non Γn-conjugate.
1894
+ In particular, the classes βi ∈ PAn are all pairwise non PΓn-conjugate.
1895
+ 5.4
1896
+ The map between the glued spaces. Consider the canonical embedding of her-
1897
+ mitian OK-lattices
1898
+ Ψ: Λ2 → Λn,
1899
+ Ψ(x0, x1, x2) = (x0, x1, x2, 0, 0, . . . , 0) .
1900
+ We view Λ2 as a sublattice of Λn via Ψ, and write
1901
+ Λn = Λ2 ⊕ (Λ2)⊥ .
1902
+ (14)
1903
+ Using the canonical basis of Λn, we may view Γn = AutOK(Λn, Hn) as a subgroup of
1904
+ GLn+1(OK). This gives an embedding
1905
+ j : Γ2 → Γn,
1906
+ M �→ (M, In−2).
1907
+ (15)
1908
+ The natural totally geodesic embedding
1909
+ ν : CH2 �→ CHn,
1910
+ [x0 : x1 : x2] �→ [x0 : x1 : x2 : 0 : . . . : 0]
1911
+ (16)
1912
+ 30
1913
+
1914
+ induces a totally geodesic embedding
1915
+ ν :
1916
+ 2
1917
+
1918
+ i=0
1919
+ RH2
1920
+ αi �→
1921
+ 2
1922
+
1923
+ i=0
1924
+ RHn
1925
+ βi ⊂
1926
+
1927
+ α∈PAn
1928
+ RHn
1929
+ α = �Yn.
1930
+ (17)
1931
+ Since the composition SO(2, 1) → O(2, 1) → PO(2, 1) = Isom(RH2) is an isomor-
1932
+ phism, there is a natural embedding PO(2, 1) �→ PO(n, 1). Moreover, since we have
1933
+ PΓαi := (PΓ2)αi = PO(Λαi
1934
+ 2 ) by [ACT06, (5.1)], the map (15) induces embeddings
1935
+ j : PΓαi �→ PΓβi,
1936
+ i = 0, 1, 2
1937
+ (18)
1938
+ that make the map ν in (17) equivariant.
1939
+ By Lemma 5.2, the classes of β0, β1 and β2 in PAn are pairwise non-conjugate
1940
+ under the action of PΓn on PAn, so that the induced map
1941
+ O2 :=
1942
+ 2
1943
+
1944
+ i=0
1945
+ PΓαi \
1946
+
1947
+ RH2
1948
+ αi − H2
1949
+
1950
+
1951
+
1952
+ α∈CAn
1953
+ PΓα \ (RHn
1954
+ α − Hn) =: On
1955
+ (19)
1956
+ induces an injective map on sets of connected components π0(O2) → π0(On).
1957
+ Lemma 5.3. For each integer n ≥ 2, there exists a natural map of metric spaces
1958
+ ι: X2 → Xn.
1959
+ Proof. We claim that (19) extends to a commutative diagram of metric spaces
1960
+ PΓ2 \ Y2
1961
+ ι
1962
+ � PΓn \ Yn
1963
+ O2
1964
+ ��
1965
+
1966
+ � On.
1967
+ ��
1968
+
1969
+ Define
1970
+ �Y #
1971
+ 2 =
1972
+ 2
1973
+
1974
+ i=0
1975
+ RH2
1976
+ αi ⊂ �Y2.
1977
+ It suffices to prove the following assertions:
1978
+ 1. The map �Y #
1979
+ 2 → �Yn defined in (17) is compatible with the equivalence relations
1980
+ on both sides (see Definition 2.14).
1981
+ 2. The resulting map of metric spaces
1982
+ φ: Y #
1983
+ 2 → Yn
1984
+ (20)
1985
+ is equivariant for the actions of PΓ2 and PΓn. Thus, φ descends to a map
1986
+ ι: X2 = PΓ2 \ Y2 = PΓ2 \ �Y #
1987
+ 2 → PΓn \ Yn = Xn,
1988
+ (21)
1989
+ where the equality on the left of (21) follows from Lemma 5.1.
1990
+ 31
1991
+
1992
+ As for 1, let r ∈ R2 be a short root in Λ2, which we also view as a short root in
1993
+ Λn. Let k ∈ Z/m and let x = y + z ∈ Λn be any element in Λn, where we decomposed
1994
+ x using (14). Consider the reflection φk
1995
+ r : Λ2 → Λ2. We have
1996
+ j
1997
+
1998
+ φk
1999
+ r
2000
+
2001
+ (x) = j(φk
2002
+ r)(y + z) = x − (1 − ζk
2003
+ 3)Hn(x, r) · r.
2004
+ Thus j(φk
2005
+ r) = φk
2006
+ r. Next, let (x, αi), (x, αj) ∈ �Y #
2007
+ 2
2008
+ be such that (x, αi) ∼ (x, αj). We
2009
+ want to show that φ2(x, αi) ∼ φ2(x, αj). We may assume that αi ̸= αj. Therefore,
2010
+ x ∈ H2 and αj = g ◦ αi ∈ PA2 for some g ∈ G2(x), where G2(x) is as in Definition
2011
+ 2.6. By the above, we have j(G2(x)) = Gn(ν(x)), where ν : CH2 → CHn is as in (16).
2012
+ Since αi ◦ αj = g ∈ G2(x), we have f(αi) ◦ f(αj) = j(g) ∈ Gn(ν(x)), which proves 1.
2013
+ To prove 2, let (x, αi), (y, αj) ∈ �Y #
2014
+ 2
2015
+ with images v = p2(x, αi), w = p2(y, αj) ∈ Y #
2016
+ 2 .
2017
+ Suppose that there exists an element g ∈ StabPΓ2(�Y #
2018
+ 2 ) ⊂ PΓ2 such that
2019
+ g · v = p2(g · x, gαig−1) = w = p2(y, αj).
2020
+ We want to show that j2(g)·φ(v) = φ(w). Since g ∈ StabPΓ2(�Y #
2021
+ 2 ), we have gαig−1 = αi
2022
+ by Lemma 5.1. We thus get that p2(g · x, αi) = p2(y, αi). Since the map p2 : �Y2 → Y2
2023
+ is injective when restricted to RH2
2024
+ αi, it follows that
2025
+ g · (x, αi) = (g · x, gαig−1) = (g · x, αi) = (y, αi),
2026
+ which implies that
2027
+ j(g) · (ν(x), f(αi)) = ν(g · (x, αi)) = ν(y, αi) = (ν(y), f(αi)).
2028
+ Since φ(v) = pn(ν(x), f(αi)) and φ(w) = pn(ν(y), f(αj)), we obtain j(g) · φ(v) = φ(w)
2029
+ as desired.
2030
+ 5.5
2031
+ The orbifold map between the glued spaces. Let ¯f ∈ X2 and lift ¯f to an element
2032
+ f ∈ Y #
2033
+ 2
2034
+ ⊂ Y2 (this is possible by Lemma 5.1). In turn, we can lift f to an element
2035
+ (x, αj) ∈ �Y #
2036
+ 2 . If f has zero nodes (see Definition 2.6), then ¯f lies in the open subset
2037
+ O2 ⊂ X2 and the map O2 → On of (19) is a morphism of orbifolds.
2038
+ So suppose that f has one real node, defined by a short root r ∈ R2 such that
2039
+ x ∈ Hr. Consider the image g = φ(f) ∈ Yn of f in Yn by the map φ: Y #
2040
+ 2
2041
+ → Yn
2042
+ defined in (20). It admits the lift (ν(x), βj) ∈ �Yn. For p ∈ {2, . . . , n − 1}, let rp =
2043
+ (0, 0, 0, . . . , 1, . . . , 0) ∈ Rn, where the 1 is on the (p + 1)-th coordinate. Note that ν(x)
2044
+ has n − 1 nodes. Define
2045
+ r1 = Ψ(r) ∈ Rn,
2046
+ so that
2047
+ ν(x) ∈
2048
+ n−1
2049
+
2050
+ i=1
2051
+ Hri ⊂ CHn,
2052
+ and
2053
+ {r1, r2, . . . , rn−1} ⊂ Rn
2054
+ is a set of short roots of maximal cardinality such that ν(x) ∈ Ht for t ∈ Rx.
2055
+ 32
2056
+
2057
+ Lemma 5.4. Consider x ∈ CH2, ν(x) ∈ CHn, r ∈ R2 and Ψ(r) ∈ Rn as above.
2058
+ There are isometries
2059
+ κ2 : CH2
2060
+ ∼−→ B2(C),
2061
+ κn : CHn
2062
+ ∼−→ Bn(C),
2063
+ identifying x (resp. ν(x)) with the origin, φr (resp. φr1, resp. φri for i ≥ 2) with the
2064
+ respective maps
2065
+ B2(C) → B2(C),
2066
+ (t1, t2) �→ (ζ6 · t1, t2),
2067
+ Bn(C) → Bn(C),
2068
+ (t1, . . . , tn) �→ (ζ6 · t1, . . . , tn),
2069
+ Bn(C) → Bn(C),
2070
+ (t1, . . . , tn) �→ (t1, . . . , ζ6 · ti+1, . . . , tn),
2071
+ and αj (resp. βj) with the respective maps
2072
+ B2(C) → B2(C),
2073
+ (t1, t2) �→ (¯t1, ¯t2),
2074
+ Bn(C) → Bn(C),
2075
+ (t1, . . . , tn) �→ (¯t1, . . . , ¯tn),
2076
+ and such that, for the canonical embedding ρ: B2(C) �→ Bn(C), the following diagram
2077
+ commutes:
2078
+ CH2
2079
+ κ2 �
2080
+ ν
2081
+
2082
+ B2(C)
2083
+ ρ
2084
+
2085
+ CHn
2086
+ κn � Bn(C).
2087
+ Proof. Define Vn as the complex n+1-dimensional hermitian space Vn = (Λ ⊗ C, (Hn)C) .
2088
+ Let x ∈ V2 be a lift of x ∈ CH2 = {negative lines in V2}. Defining ν : V2 → Vn as the
2089
+ natural embedding allows us to consider x and r an elements of Vn. Then define
2090
+ T2 = ⟨x⟩ ⊕ ⟨r⟩ ⊂ V2,
2091
+ R2 = T ⊥
2092
+ 2 ⊂ V2,
2093
+ Tn = ⟨x⟩ ⊕ ⟨r⟩ ⊂ Vn,
2094
+ Rn = T ⊥
2095
+ n ⊂ Vn.
2096
+ Choose appropriate bases for R2 and Rn scale appropriately as in Lemma 3.9.
2097
+ We are now ready to prove:
2098
+ Proposition 5.5. The map ι defined in Lemma 5.3 is a map of hyperbolic orbifolds.
2099
+ Proof. We continue with the notation from above. Consider the coordinates CH2
2100
+ ∼−→
2101
+ B2(C) of Lemma 5.4: they make the involution αj correspond to (t1, t2) �→ (¯t1, ¯t2), and
2102
+ any ξ ∈ PA2 with (x, α) ∼ (x, ξ) to an involution of the form (t1, t2) �→ (ζi
2103
+ 6·¯t1, ¯t2). Thus
2104
+ if the ξi for i = 1, . . . , 6 are the six anti-unitary involutions such that (x, α) ∼ (x, ξi),
2105
+ then for the set Yf defined in (6), one has
2106
+ Yf ∼=
2107
+ 6�
2108
+ i=1
2109
+ RH2
2110
+ ξi ∼=
2111
+
2112
+ (t1, t2) ∈ B2(C) | t6
2113
+ 1, t2 ∈ R
2114
+
2115
+ .
2116
+ The union of two subsets
2117
+ Kf,ϵ =
2118
+
2119
+ (t1, t2) ∈ B2(C) | i−ϵ · t1 ∈ R≥0, t2 ∈ R
2120
+
2121
+ ,
2122
+ 33
2123
+
2124
+ indexed by ϵ ∈ {0, 1} is a fundamental domain for the action of Bf on Yf, and under
2125
+ its path metric, U = Kf,0 ∪ Kf,1 is isometric to B2(R) by the following map:
2126
+ U → B2(R),
2127
+ (t1, t2) �→
2128
+
2129
+ (−i)−ϵ · t1, t2
2130
+
2131
+ .
2132
+ Therefore, the following composition identifies Bf \ Yf with B2(R):
2133
+ Bf \ Yf ∼= Bf \
2134
+ 6�
2135
+ i=1
2136
+ RHn
2137
+ ξi ∼= ⟨ζ6⟩ \
2138
+
2139
+ (t1, t2) ∈ B2(C) | t6
2140
+ 1, t2 ∈ R
2141
+ � ∼=
2142
+
2143
+ ϵ∈{0,1}
2144
+ Kf,ϵ ∼= B2(R).
2145
+ Similarly, we get, using the coordinates of Lemma 5.4, writing i = (i1, . . . , in−1) and
2146
+ χi = �n−1
2147
+ p=1 φip
2148
+ rp ◦ βj, that
2149
+ Yg ∼=
2150
+ 6�
2151
+ i1,...,in−1=1
2152
+ RHn
2153
+ χi ∼=
2154
+
2155
+ (t1, . . . , tn) ∈ Bn(C) | t6
2156
+ 1, t2, t6
2157
+ 3, . . . , t6
2158
+ n ∈ R
2159
+
2160
+ .
2161
+ Moreover, if we define
2162
+ Kg,ϵ1,...,ϵn−1 =
2163
+
2164
+ (t1, . . . , tn) ∈ Bn(C) | iϵ1t1, i−ϵ2t3, . . . , i−ϵn−1tn ∈ R≥0, t2 ∈ R
2165
+
2166
+ ,
2167
+ then Ug = �1
2168
+ ϵ1,...,ϵn−1=0 Kg,ϵ1,...,ϵn−1 is a fundamental domain for the action of Bg on Yg,
2169
+ and there is an isometry
2170
+ Ug → Bn(R),
2171
+ (t1, . . . , tn) �→
2172
+
2173
+ (−i)−ϵ1 · t1, t2, (−i)−ϵ3 · t3, . . . , (−i)−ϵn · tn
2174
+
2175
+ .
2176
+ Together, this gives
2177
+ Bg \ Yg ∼= Bg \
2178
+ 6�
2179
+ i1,...,in−1=1
2180
+ RHn
2181
+ χi ∼= ⟨ζ6⟩n−1 \
2182
+
2183
+ (t1, . . . , tn) | t6
2184
+ 1, t2, t6
2185
+ 3, . . . , t6
2186
+ n ∈ R
2187
+
2188
+ ∼= Ug =
2189
+ 1�
2190
+ ϵ1,...,ϵn−1=0
2191
+ Kg,ϵ1,...,ϵn−1 ∼= Bn(R).
2192
+ Since ξi = φi
2193
+ r ◦ αj and ξ(i,6,...,6) = φi
2194
+ r1 ◦ βj for i ∈ {1, . . . , 6}, one has
2195
+ x ∈ RH2
2196
+ ξi ⇐⇒ (φi
2197
+ r ◦ αj)(x) = x =⇒ (φi
2198
+ r1 ◦ βj)(ν(x)) = ν(x) ⇐⇒ ν(x) ∈ RHn
2199
+ χi,6,...,6.
2200
+ Therefore, with respect to the natural embedding ν : CH2(C) → CHn(C), one has
2201
+ for each i = 1, . . . , 6, that ν
2202
+
2203
+ RHn
2204
+ ξi
2205
+
2206
+ ⊂ RHn
2207
+ χi,6,...,6. Thus, the maps defined above fit
2208
+ 34
2209
+
2210
+ together in the following commutative diagram of metric spaces:
2211
+ Bf \ Yf
2212
+
2213
+
2214
+ � �
2215
+ � Bg \ Yg
2216
+
2217
+
2218
+ Bf \ �6
2219
+ i=1 RHn
2220
+ ξi
2221
+ � �
2222
+
2223
+
2224
+
2225
+ Bg \ �6
2226
+ i1,...,in−1=1 RH2
2227
+ χi
2228
+
2229
+
2230
+ ⟨ζ6⟩ \ {(t1, t2) ∈ B2(C) | t6
2231
+ 1, t2 ∈ R}
2232
+
2233
+
2234
+ � �
2235
+ � ⟨ζ6⟩n−1 \ {(t1, . . . , tn) | t6
2236
+ 1, t2, t6
2237
+ 3, . . . , t6
2238
+ n ∈ R}
2239
+
2240
+
2241
+
2242
+ ϵ∈{0,1} Kf,ϵ
2243
+
2244
+
2245
+ � �
2246
+ � �1
2247
+ ϵ1,...,ϵn−1=0 Kg,ϵ1,...,ϵn−1
2248
+
2249
+
2250
+ B2(R)� �
2251
+ � Bn(R).
2252
+ (22)
2253
+ Since the map Y #
2254
+ 2
2255
+ → Yn defined in (20) is equivariant with respect to Γ2 �→ Γn, we
2256
+ obtain a map StabΓ2(f) �→ StabΓn(g). Finally, via the commutative diagram
2257
+ PO(2, 1) = Isom(B2(R))� �
2258
+ � Isom(Bn(R)) = PO(n, 1)
2259
+ StabΓ2(f)� �
2260
+
2261
+
2262
+ StabΓn(g)
2263
+
2264
+ Bf
2265
+
2266
+ � �
2267
+ � Bg
2268
+
2269
+ we obtain a well-defined embedding
2270
+ Af/Bf = StabPΓ2(f)/Bf �→ StabPΓn(g)/Bg = Ag/Bg.
2271
+ (23)
2272
+ The embedding Bf \Yf �→ Bg\Yg is equivariant with respect to (23). As in the proof of
2273
+ Theorem 3.1.2, we choose an Af (resp. Ag)-equivariant open neighbourhood f ∈ Vf ⊂
2274
+ Yf (resp. g ∈ Vg ⊂ Yg) such that Af \ Vf ⊂ PΓf \ Y2 (resp. Ag \ Vg ⊂ PΓg \ Yn). Using
2275
+ the above diagram (22), we get open neighbourhoods Wf ⊂ B2(R) and Wg ⊂ Bn(R),
2276
+ acted upon by Af/Bf and Ag/Bg respectively, such that Af \ Vf = (Af/Bf) \ Wf and
2277
+ Ag \ Vg = (Ag/Bg) \ Wg, and such that there exists a totally geodesic embedding
2278
+ B2(R) ⊃ Wf � �
2279
+ ρ
2280
+ � Wg ⊂ Bn(R)
2281
+ (24)
2282
+ 35
2283
+
2284
+ which is equivariant for (23) and makes the diagram
2285
+ Wf � �
2286
+ ρ
2287
+
2288
+
2289
+ Wg
2290
+
2291
+ (Af/Bf) \ Wf
2292
+ � �
2293
+
2294
+ ρ
2295
+ � (Ag/Bg) \ Wg
2296
+ � �
2297
+
2298
+ PΓ2 \ Y2
2299
+ ι
2300
+ � PΓn \ Yn
2301
+ commute. We conclude that ι: X2 → Xn is an orbifold map at each point ¯f ∈ X2
2302
+ such that any lift f ∈ Y #
2303
+ 2
2304
+ of ¯f has either no nodes or one real node. The proof of the
2305
+ case when f has two real nodes or one pair of complex conjugate nodes is similar.
2306
+ 5.6
2307
+ Totally geodesic immersions. The goal of Section 5.6 is to prove Theorem 5.8,
2308
+ using the results of Sections 5.7 - 5.5. Recall the following (see e.g. [Bel+21, §2.3.1]):
2309
+ Definition 5.6. Let n, m ∈ N. A map i: RHm/Λ → RHn/Γ of hyperbolic orbifolds
2310
+ is a totally geodesic immersion if there exists a totally geodesic subspace U ⊂ RHn
2311
+ and a lift ˜i: RHm → RHn of i that factors through an isometry ˜i: RHm
2312
+ ∼−→ U. In this
2313
+ setting, the orbifold RHm/Λ is called a totally geodesic suborbifold of RHn/Γ.
2314
+ Definition 5.7. Consider the map ι: X2 → Xn, recall that X2 is connected (Lemma
2315
+ 5.14) and let X+
2316
+ n be the connected component containing ι(X2). Let Γ+
2317
+ n ⊂ PO(n, 1)
2318
+ be the lattice underlying the complete connected hyperbolic orbifold X+
2319
+ n .
2320
+ The goal of Section 5.6 is to prove the following theorem.
2321
+ Theorem 5.8. For each integer n ≥ 2, there exists a canonical proper totally geodesic
2322
+ immersion of complete connected hyperbolic orbifolds ι: X2 → X+
2323
+ n .
2324
+ To prove this, we need several results.
2325
+ Lemma 5.9. The map ι: X2 → Xn defined in Lemma 5.3 is proper with finite fibers.
2326
+ Proof. Observe that for each α ∈ PAn, the canonical map fα : PΓα \ RHn → Xn is
2327
+ a closed immersion. Since CAn = PAn/PΓn is finite, �
2328
+ α∈CAn fα (PΓα \ RHn) = Xn
2329
+ forms a finite closed covering of Xn. Moreover, the restriction of ι to the closed subset
2330
+ fαi (PΓαi \ RH2) ⊂ X2 is induced by the canonical map
2331
+ PΓαi \ RH2
2332
+ αi → PΓβi \ RHn
2333
+ βi.
2334
+ (25)
2335
+ Here, αi and βi are as in (11) and (13). To prove that ι is proper with finite fibers, it
2336
+ therefore suffices to prove that (25) is proper with finite fibers for each i ∈ {0, 1, 2}.
2337
+ Define quadratic forms
2338
+ Qn
2339
+ 0(x0, . . . , xn) = −x2
2340
+ 0 + x2
2341
+ 1 + · · · + x2
2342
+ n,
2343
+ Qn
2344
+ 1(x0, . . . , xn) = −x2
2345
+ 0 + 3x2
2346
+ 1 + · · · + x2
2347
+ n,
2348
+ Qn
2349
+ 2(x0, . . . , xn) = −x2
2350
+ 0 + 3x2
2351
+ 1 + 3x2
2352
+ 2 + x2
2353
+ 3 + · · · + x2
2354
+ n.
2355
+ (26)
2356
+ 36
2357
+
2358
+ For each i = 0, 1, 2, the canonical homomorphism PO(Qn
2359
+ i , Z) → PΓβi is an isomor-
2360
+ phism by [ACT10, Theorem 5.1], thus (25) is proper with finite fibers.
2361
+ Lemma 5.10. For any base point of X2, the induced map Γ+
2362
+ 2 → Γ+
2363
+ n is injective.
2364
+ Proof. The natural map of orbifolds X+
2365
+ n → PΓn \ CHn induces a homomorphism
2366
+ Γ+
2367
+ n → PΓn = PU(n, 1)(Z[ζ3]). In case n = 2, this map is injective and factors as
2368
+ Γ+
2369
+ 2 �→ PO(2, 1)(Z[
2370
+
2371
+ 3]) ⊂ PU(2, 1)(Z[ζ3]),
2372
+ see [ACT06, p. 167-168]. Since SO(2, 1) = PO(2, 1), this map Γ+
2373
+ 2 → PU(2, 1)(Z[ζ3])
2374
+ factors through an embedding Γ+
2375
+ 2 �→ U(2, 1)(Z[ζ3]). The commutative diagram of
2376
+ orbifolds
2377
+ Γ+
2378
+ 2 \ RH2
2379
+
2380
+
2381
+ Γ+
2382
+ n \ RHn
2383
+
2384
+ U(2, 1)(Z[ζ3]) \ CH2
2385
+ � PU(n, 1)(Z[ζ3]) \ CHn
2386
+ gives rise to a commutative diagram of orbifold fundamental groups
2387
+ Γ+
2388
+ 2
2389
+
2390
+
2391
+ Γ+
2392
+ n
2393
+
2394
+ U(2, 1)(Z[ζ3])
2395
+ � PU(n, 1)(Z[ζ3]).
2396
+ The composition Γ+
2397
+ 2 → U(2, 1)(Z[ζ3]) → PU(n, 1)(Z[ζ3]) is injective, hence the map
2398
+ Γ+
2399
+ 2 → Γ+
2400
+ n is injective as desired.
2401
+ Lemma 5.11. Let X/Λ and Y/L be quotient orbifolds, where X and Y are simply
2402
+ connected manifolds, and Λ and L discrete groups acting smoothly, properly discontin-
2403
+ uously on X and Y . Let f : X/Λ → Y/L be a proper map with finite fibers and suppose
2404
+ that f∗ : Λ → L is injective. Then any lift ˜f : X → Y of f is proper with finite fibers.
2405
+ Proof. The map ˜f is locally given by maps U/G → V/H where U (resp.
2406
+ V ) is
2407
+ connected open in X (resp. Y ) and G and H are finite groups. Thus ˜f is closed. To
2408
+ see that ˜f has finite fibers, observe that Λ·x → L· ˜f(x) is injective for each x ∈ X.
2409
+ We obtain:
2410
+ Proposition 5.12. The morphism of hyperbolic orbifolds
2411
+ ι: X2 = Γ+
2412
+ 2 \ RH2 → Γ+
2413
+ n \ RHn = X+
2414
+ n
2415
+ is proper with finite fibers, and the same holds for any lift ˜ι: RH2 → RHn of ι.
2416
+ Proof. This follows from Lemma’s 5.9, 5.10 and 5.11.
2417
+ The proof of Theorem 5.8 rests on the above results, together with the following:
2418
+ 37
2419
+
2420
+ Lemma 5.13. Let N = RHm/Λ and M = RHn/Γ be real hyperbolic orbifolds. Let
2421
+ i: N → M
2422
+ be a proper map of hyperbolic orbifolds, induced by a homomorphism φ: Λ → Γ and
2423
+ an equivariant proper map ˜i: RHm → RHn. Suppose that, locally around each point
2424
+ of N, the morphism i is given by a diagram of the form
2425
+ U
2426
+
2427
+ ˜i
2428
+ � V
2429
+
2430
+ U/G
2431
+ i
2432
+ � V/H,
2433
+ G
2434
+ φ
2435
+ � H,
2436
+ (U ⊂ RHm, V ⊂ RHn connected open)
2437
+ (27)
2438
+ where the map ˜i: U → V is a proper totally geodesic immersion. Then i: N → M is
2439
+ a totally geodesic immersion of hyperbolic orbifolds.
2440
+ Proof. Since ˜i is proper and locally a totally geodesic immersion, it is a totally geodesic
2441
+ embedding. Thus i: N → M is a totally geodesic immersion, see Definition 5.6.
2442
+ Proof of Theorem 5.8. Consider the map of metric spaces ι: X2 → X+
2443
+ n ⊂ Xn defined
2444
+ in Lemma 5.3, where X+
2445
+ n is the connected component of Xn containing ι(X2). By
2446
+ Proposition 5.5, the map ι is a morphism of hyperbolic orbifolds. Moreover, locally ι
2447
+ lifts to a proper totally geodesic embedding ρ: Wf �→ Wg as in (24) for some connected
2448
+ open subsets Wf ⊂ B2(R) and Wg ⊂ Bn(R), equivariant for the inclusion of stabilizer
2449
+ groups Af/Bf �→ Ag/Bg defined in (23). By Proposition 5.12, the map ι: X2 → X+
2450
+ n
2451
+ is proper with finite fibers, and the same holds for any lift ˜ι: RH2 → RHn of ι. By
2452
+ Lemma 5.13, it follows that ι is a totally geodesic immersion of hyperbolic orbifolds.
2453
+ 5.7
2454
+ Fifth roots of unity. Let K′ = Q(ζ5). For an integer n ≥ 2, let Λ′
2455
+ n = Z[ζ5]n+1, and
2456
+ define
2457
+ H′
2458
+ n : Λ′
2459
+ n ⊗Z[α] Λ′
2460
+ n → OK,
2461
+ H′
2462
+ n(x, y) = −
2463
+ �√
2464
+ 5 − 1
2465
+ 2
2466
+
2467
+ · x0¯y0 +
2468
+ n
2469
+
2470
+ i=1
2471
+ xi¯yi.
2472
+ Let R′
2473
+ n = {r ∈ Λ′
2474
+ n | H′
2475
+ n(r, r) = 1}. By Proposition 4.14 and Theorem 4.12, the hy-
2476
+ perplane arrangement H ′ = ∪r∈R′nHr ⊂ CHn is an orthogonal arrangement, i.e.
2477
+ Condition 2.4 is satisfied. The glueing construction of Section 2 provides us with a
2478
+ metric space
2479
+ Zn = PΓ′
2480
+ n \ Y ′
2481
+ n,
2482
+ and the metric on Zn extends to a complete real hyperbolic orbifold structure by
2483
+ Theorem 3.1. Thus, each connected components of Zn is the quotient of RHn by a
2484
+ discrete group of isometries.
2485
+ Define three anti-unitary involutions αi : Λ′
2486
+ 2 → Λ′
2487
+ 2 as follows:
2488
+ α0 : (x0, x1, x2) �→ (¯x0,
2489
+ ¯x1,
2490
+ ¯x2)
2491
+ α1 : (x0, x1, x2) �→ (¯x0, −¯x1,
2492
+ ¯x2)
2493
+ α2 : (x0, x1, x2) �→ (¯x0, −¯x1, −¯x2)
2494
+ (28)
2495
+ 38
2496
+
2497
+ Lemma 5.14. The involutions α0, α1, α2 are pairwise non-conjugate, the composition
2498
+ 2
2499
+
2500
+ i=0
2501
+ RH2
2502
+ αi → Y ′
2503
+ 2 → PΓ′
2504
+ 2 \ Y ′
2505
+ 2 = Z2
2506
+ is surjective, and Z2 is connected and compact.
2507
+ Proof. See [GF21].
2508
+ Similar to the the Eisenstein case above, we have the following result.
2509
+ Theorem 5.15. For each n ≥ 2, there exists a connected component Z+
2510
+ n ⊂ Zn and a
2511
+ natural proper totally geodesic immersion of complete connected hyperbolic orbifolds
2512
+ ι: Z2 → Z+
2513
+ n .
2514
+ Proof. The proof is completely analogous to the proof of Theorem 5.8.
2515
+ Definition 5.16. Let Λ+
2516
+ n ⊂ PO(n, 1) be the lattice underlying the complete connected
2517
+ hyperbolic orbifold Z+
2518
+ n .
2519
+ 5.8
2520
+ Non-arithmetic real hyperbolic lattices. Consider the lattices Γ+
2521
+ n ⊂ PO(n, 1)
2522
+ and Λ+
2523
+ n ⊂ PO(n, 1), see Definitions 5.7 and 5.16. We are now in position to prove that
2524
+ Γ+
2525
+ n and Λ+
2526
+ n are non-arithmetic. The key is to use the following result.
2527
+ Theorem 5.17 (Bergeron–Clozel). Let RHm/Λ → RHn/Γ be a totally geodesic im-
2528
+ mersion of real hyperbolic orbifolds of finite volume. If the lattice Γ ⊂ PO(n, 1) is
2529
+ arithmetic, then the lattice Λ ⊂ PO(m, 1) is arithmetic as well.
2530
+ Proof. See [BC05, Proposition 15.2.2] (compare also [Bel+21, Theorem 1.4]).
2531
+ Theorem 5.18. For each n ∈ Z≥2, the lattices Γ+
2532
+ n ⊂ PO(n, 1) and Λ+
2533
+ n ⊂ PO(n, 1)
2534
+ are non-arithmetic.
2535
+ Proof. By Theorem 5.8 (resp. Theorem 5.15), there exists a proper totally geodesic
2536
+ immersion of hyperbolic orbifolds X2 → X+
2537
+ n (resp. Z2 → Z+
2538
+ n ). Therefore, by Theorem
2539
+ 5.17, it suffices to show that Γ+
2540
+ 2 ⊂ PO(2, 1) and Λ+
2541
+ 2 ⊂ PO(2, 1) are non-arithmetic.
2542
+ For Γ+
2543
+ 2 , this is shown in [ACT06, Section 5], and for Λ+
2544
+ 2 in [GF21].
2545
+ References
2546
+ [Ach20]
2547
+ Jeffrey Achter. “Arithmetic occult period maps”. In: Algebraic Geometry
2548
+ 7.5 (2020), pp. 581–606.
2549
+ [ACT02a]
2550
+ Daniel Allcock, James Carlson, and Domingo Toledo. “Orthogonal com-
2551
+ plex hyperbolic arrangements”. In: Symposium in Honor of C. H. Clemens
2552
+ (Salt Lake City, UT, 2000). Vol. 312. Contemporary Mathematics. Amer-
2553
+ ican Mathematical Society, 2002, pp. 1–8.
2554
+ 39
2555
+
2556
+ [ACT02b]
2557
+ Daniel Allcock, James Carlson, and Domingo Toledo. “The complex hy-
2558
+ perbolic geometry of the moduli space of cubic surfaces”. In: Journal of
2559
+ Algebraic Geometry 11.4 (2002), pp. 659–724.
2560
+ [ACT06]
2561
+ Daniel Allcock, James Carlson, and Domingo Toledo. “Non-arithmetic
2562
+ uniformization of some real moduli spaces”. In: Geometriae Dedicata 171
2563
+ (2006), 159–169.
2564
+ [ACT07]
2565
+ Daniel Allcock, James Carlson, and Domingo Toledo. “Hyperbolic geome-
2566
+ try and the moduli space of real binary sextics”. In: Arithmetic and geom-
2567
+ etry around hypergeometric functions. Vol. 260. Progress in Mathematics.
2568
+ Birkhäuser, 2007, pp. 1–22.
2569
+ [ACT10]
2570
+ Daniel Allcock, James Carlson, and Domingo Toledo. “Hyperbolic geome-
2571
+ try and moduli of real cubic surfaces”. In: Annales Scientifiques de l’École
2572
+ Normale Supérieure 43.1 (2010), pp. 69–115.
2573
+ [AV04]
2574
+ Alessandro Arsie and Angelo Vistoli. “Stacks of cyclic covers of projective
2575
+ spaces”. In: Compositio Mathematica 140.3 (2004), pp. 647–666.
2576
+ [AY98]
2577
+ François Apéry and Masaaki Yoshida. “Pentagonal structure of the config-
2578
+ uration space of five points in the real projective line”. In: Kyushu Journal
2579
+ of Mathematics 52.1 (1998), pp. 1–14.
2580
+ [BC05]
2581
+ Nicolas Bergeron and Laurent Clozel. Spectre automorphe des variétés hy-
2582
+ perboliques et applications topologiques. Astérisque 303. Société mathéma-
2583
+ tique de France, 2005.
2584
+ [Bea09]
2585
+ Arnaud Beauville. “Moduli of cubic surfaces and Hodge theory (after
2586
+ Allcock, Carlson, Toledo)”. In: Géométries à courbure négative ou nulle,
2587
+ groupes discrets et rigidités. Vol. 18. Séminaires et Congrès. Société Math-
2588
+ ématique de France, 2009, pp. 445–466.
2589
+ [Bel+21]
2590
+ Mikhail Belolipetsky et al. “Subspace stabilisers in hyperbolic lattices”. In:
2591
+ arXiv e-prints (2021).
2592
+ [Chu11]
2593
+ Kenneth Chu. “On the Geometry of the Moduli Space of Real Binary
2594
+ Octics”. In: Canadian Journal of Mathematics 63 (2011).
2595
+ [Deb96]
2596
+ Olivier Debarre. “Polarisations sur les variétés abéliennes produits”. In:
2597
+ Comptes Rendus de l’Académie des Sciences 323.6 (1996), pp. 631–635.
2598
+ [DM86]
2599
+ Pierre Deligne and George Mostow. “Monodromy of hypergeometric func-
2600
+ tions and nonlattice integral monodromy”. In: Institut des Hautes Études
2601
+ Scientifiques. Publications Mathématiques 63 (1986), pp. 5–89.
2602
+ [GF21]
2603
+ Olivier de Gaay Fortman. “Hyperbolic geometry and real moduli of five
2604
+ points on the line”. In: arXiv e-prints (2021).
2605
+ [GPS87]
2606
+ Mikhael Gromov and Ilya Piatetski-Shapiro. “Non-arithmetic groups in
2607
+ Lobachevsky spaces”. In: Publications Mathématiques de l’IHÉS 66 (1987),
2608
+ pp. 93–103.
2609
+ 40
2610
+
2611
+ [Gro07]
2612
+ Misha Gromov. Metric Structures for Riemannian and non-Riemannian
2613
+ Spaces. Modern Birkhäuser Classics. Birkhäuser, 2007, pp. xx+585.
2614
+ [HR18]
2615
+ Gert Heckman and Sander Rieken. “Hyperbolic geometry and moduli of
2616
+ real curves of genus three”. In: Mathematische Annalen 370.3-4 (2018),
2617
+ pp. 1321–1360.
2618
+ [Kon00]
2619
+ Shigeyuki Kond¯o. “A complex hyperbolic structure for the moduli space
2620
+ of curves of genus three”. In: Journal für die Reine und Angewandte Math-
2621
+ ematik 525 (2000), pp. 219–232.
2622
+ [KR14]
2623
+ Stephen Kudla and Michael Rapoport. “Special cycles on unitary Shimura
2624
+ varieties II: Global theory”. In: Journal für die Reine und Angewandte
2625
+ Mathematik 697 (2014), pp. 91–157.
2626
+ [Lee13]
2627
+ John Lee. Introduction to Smooth Manifolds. Second. Vol. 218. Graduate
2628
+ Texts in Mathematics. Springer, 2013, pp. xvi+708.
2629
+ [Lia76]
2630
+ Joseph Liang. “On the integral basis of the maximal real subfield of a
2631
+ cyclotomic field”. In: Journal für die Reine und Angewandte Mathematik
2632
+ 286(287) (1976), pp. 223–226.
2633
+ [Mil08]
2634
+ James Milne. Algebraic Number Theory (v3.01). 2008.
2635
+ [Mil20]
2636
+ James Milne. Complex Multiplication (v0.10). 2020.
2637
+ [Neu99]
2638
+ Jürgen Neukirch. Algebraic number theory. Vol. 322. Grundlehren der
2639
+ mathematischen Wissenschaften. Springer, 1999, pp. xviii+571.
2640
+ [Pic83]
2641
+ Emile Picard. “Sur des fonctions de deux variables indépendantes ana-
2642
+ logues aux fonctions modulaires”. In: Acta Mathematica 2.1 (1883), pp. 114–
2643
+ 135.
2644
+ [Ser79]
2645
+ Jean-Pierre Serre. Local fields. Vol. 67. Graduate Texts in Mathematics.
2646
+ Springer, 1979, pp. viii+241.
2647
+ [Shi63]
2648
+ Goro Shimura. “On analytic families of polarized abelian varieties and
2649
+ automorphic functions”. In: Annals of Mathematics 78 (1963), pp. 149–
2650
+ 192.
2651
+ [Shi64]
2652
+ Goro Shimura. “On purely transcendental fields automorphic functions of
2653
+ several variable”. In: Osaka Mathematical Journal 1.1 (1964), pp. 1–14.
2654
+ [Stacks]
2655
+ The Stacks Project Authors. Stacks Project. https://stacks.math.
2656
+ columbia.edu. 2018.
2657
+ [Ste08]
2658
+ Peter Stevenhagen. “The arithmetic of number rings”. In: Algorithmic
2659
+ number theory: lattices, number fields, curves and cryptography. Vol. 44.
2660
+ Cambridge University Press, 2008, pp. 209–266.
2661
+ [Thu80]
2662
+ William Thurston. The Geometry and Topology of Three-Manifolds. Prince-
2663
+ ton University Press, 1980.
2664
+ [Wam99]
2665
+ Paul van Wamelen. “Examples of genus two CM curves defined over the
2666
+ rationals”. In: Mathematics of Computation 68.225 (1999), pp. 307–320.
2667
+ 41
2668
+
f9AzT4oBgHgl3EQfof2V/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
jtE5T4oBgHgl3EQfGQ7H/content/tmp_files/2301.05430v1.pdf.txt ADDED
@@ -0,0 +1,2611 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING
2
+ 1
3
+ HS-GCN: Hamming Spatial Graph Convolutional
4
+ Networks for Recommendation
5
+ Han Liu, Yinwei Wei, Member, IEEE, Jianhua Yin, Member, IEEE,
6
+ and Liqiang Nie, Senior Member, IEEE
7
+ Abstract—An efficient solution to the large-scale recommender system is to represent users and items as binary hash codes in the
8
+ Hamming space. Towards this end, existing methods tend to code users by modeling their Hamming similarities with the items they
9
+ historically interact with, which are termed as the first-order similarities in this work. Despite their efficiency, these methods suffer from
10
+ the suboptimal representative capacity, since they forgo the correlation established by connecting multiple first-order similarities, i.e.,
11
+ the relation among the indirect instances, which could be defined as the high-order similarity. To tackle this drawback, we propose to
12
+ model both the first- and the high-order similarities in the Hamming space through the user-item bipartite graph. Therefore, we develop
13
+ a novel learning to hash framework, namely Hamming Spatial Graph Convolutional Networks (HS-GCN), which explicitly models the
14
+ Hamming similarity and embeds it into the codes of users and items. Extensive experiments on three public benchmark datasets
15
+ demonstrate that our proposed model significantly outperforms several state-of-the-art hashing models, and obtains performance
16
+ comparable with the real-valued recommendation models.
17
+ Index Terms—Hashing, Efficient Recommendation, High-order Similarity, Graph Convolutional Network, Hamming Space.
18
+ !
19
+ 1
20
+ INTRODUCTION
21
+ T
22
+ HE recommender system is developed to locate the
23
+ interested items from the overwhelming information
24
+ according to users’ preferences. Hence, how to measure the
25
+ similarities between users and items is at the core of the per-
26
+ sonalized recommendation. Towards this end, existing stud-
27
+ ies [1], [2], [3] tend to follow a two-stage pipeline: represent-
28
+ ing the users and items with vectors [4], and then predicting
29
+ their interactions by measuring the similarities between
30
+ vectors. Despite the remarkable performance, these methods
31
+ still face an inevitable problem that the computation grows
32
+ exponentially with increasing users and items [5]. Theoreti-
33
+ cally, for recommending top-k preferred items for each user,
34
+ the time complexity is O(NMK + NMlogk) when there
35
+ are N users and M items, represented by K-dimensional
36
+ embeddings in the latent space.
37
+ Diving into these methods, we can easily find that the
38
+ problem mainly comes from the user-item similarity com-
39
+ putations [6]. However, it is virtually impossible to design
40
+ a new algorithm that not only can compute the similarity
41
+ between two vectors but is more efficient than the inner-
42
+ product. Therefore, some efforts have been dedicated to
43
+ learning a new kind of representation—hash code—for the
44
+ user and item, so as to alleviate the complexity [7], [8]. In
45
+ particular, benefiting from such a code consisting of ±1
46
+ bits, the measurement can be accelerated via XOR bit op-
47
+ eration [9]. Hence, the time complexity of recommendation
48
+ is significantly reduced and even constant time search is
49
+ made possible by exploiting lookup tables [6]. Since the
50
+
51
+ Han Liu, Jianhua Yin, and Liqiang Nie are with School of Computer
52
+ Science and Technology, Shandong University, Qingdao 266200, China.
53
54
+
55
+ Yinwei Wei is with School of Computing, National University of Singa-
56
+ pore, Singapore.
57
+ E-mail: [email protected].
58
+
59
+ Liqiang Nie is the corresponding author.
60
+ 𝑢3
61
+ 𝑖2
62
+ 𝑖3
63
+ 𝑖5
64
+ 1
65
+ 1
66
+ 1
67
+ 1
68
+ -1
69
+ 1
70
+ -1
71
+ -1
72
+ -1
73
+ 1
74
+ -1
75
+ 1
76
+ 𝑢2
77
+ 𝑖1
78
+ 𝑖3
79
+ 𝑖4
80
+ 1
81
+ 1
82
+ 1
83
+ 1
84
+ -1
85
+ -1
86
+ -1
87
+ 1
88
+ 1
89
+ 1
90
+ 1
91
+ 1
92
+ 𝑢1
93
+ 𝑖1
94
+ 𝑖2
95
+ 1
96
+ -1
97
+ 1
98
+ 1
99
+ -1
100
+ -1
101
+ 1
102
+ -1
103
+
104
+ (a) First-order Hamming similarity
105
+ 1
106
+ -1
107
+ 1
108
+ 1
109
+ -1
110
+ -1
111
+ 1
112
+ 1
113
+ 1
114
+ -1
115
+ 1
116
+ 1
117
+ -1
118
+ -1
119
+ -1
120
+ 1
121
+ 1
122
+ 1
123
+ 1
124
+ -1
125
+ 1
126
+ 1
127
+ -1
128
+ 1
129
+ 𝑢1
130
+ 𝑖1
131
+ 𝑖2
132
+ 𝑢2
133
+ 𝑢3
134
+ 𝑖4
135
+ 𝑖5
136
+ 𝒍 = 𝟏
137
+ 𝒍 = 𝟐
138
+ 𝒍 = 𝟑
139
+ 𝑖3
140
+ (b) High-order Hamming similarity for 𝒖𝟏
141
+ Fig. 1. Illustration of the high-order and the first-order Hamming similarity
142
+ in learning to hash.
143
+ computation efficiency of the user-item similarity is su-
144
+ percharged, the large-scale recommendation could be con-
145
+ ducted efficiently [10], [11], especially on mobile application
146
+ where the computational resource is very limited [12], [13].
147
+ Nevertheless, since users and items are approximately rep-
148
+ resented as the binary vectors, the performance of hashing-
149
+ based recommendation models tends to be suboptimal. To
150
+ deal with this drawback, several methods are developed to
151
+ enhance the representation ability of the hash codes [14],
152
+ [15], [16]. For instance, HashNet [17] utilizes the deep
153
+ neural networks to learn the user and item embeddings
154
+ and then map them into the Hamming space to calculate
155
+ the Hamming distance between two vectors. More recently,
156
+ inspired by the success of graph convolutional networks in
157
+ representation learning, HashGNN [18] has been proposed
158
+ to encode the local structural information into each node in
159
+ the user-item interaction graph, and binarize their enhanced
160
+ representations via a hash layer.
161
+ Although these methods enrich the user and item repre-
162
+ sentations, we argue that they learn the hash codes merely
163
+ with the similarities of interacted user-item pairs, but ig-
164
+ nore the similarities hidden in the indirect interactions. To
165
+ distinguish these similarities with the similarity computing
166
+ arXiv:2301.05430v1 [cs.IR] 13 Jan 2023
167
+
168
+ IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING
169
+ 2
170
+ in Euclidean space [2], we term them as the first-order and
171
+ high-order Hamming similarities, respectively. To illustrate
172
+ our argument, we connect the direct interactions to model
173
+ the indirect interactions, which builds a user-item bipartite
174
+ graph shown in Figure 1(b), and compare it with the direct
175
+ interactions shown in Figure 1(a) on hash code learning. In
176
+ particular, the users (i.e., u1, u2, and u3) and items (i.e., i1, i2,
177
+ and i3) are represented by binary vectors, and the presence
178
+ of an edge signifies that the user interacts with the item. To
179
+ learn the hash codes for the users, both the deep learning
180
+ based and GNN-based models code their interacted items
181
+ and minimize their first-order Hamming similarities (i.e.,
182
+ ⟨u1, i1⟩ and ⟨u1, i2⟩), as shown in Figure 1(a). However, for
183
+ u1, we argue that its code is hard to determine merely by the
184
+ first-order Hamming similarity, because it lies right in the
185
+ middle of two items. On the contrary, by incorporating the
186
+ high-order Hamming similarity, as illustrated in Figure 1(b),
187
+ the hidden cues can be captured by measuring its high-order
188
+ Hamming similarities, such as ⟨u1, u2⟩ and ⟨u1, u3⟩, largely
189
+ facilitating the hash code learning.
190
+ Therefore, we propose to code the users and items by
191
+ explicitly modeling the high-order Hamming similarity on
192
+ the user-item bipartite graph. It is worth noticing that this
193
+ is different with HashGNN that learns the nodes’ repre-
194
+ sentations in Euclidean space and then transforms them
195
+ into hash codes. We argue that the supervision signal for
196
+ the hash code optimization merely comes from the first-
197
+ order interactions in the history, which may aggravate the
198
+ information loss of high-order Hamming similarity during
199
+ the transformation.
200
+ However, conducting the graph convolutional opera-
201
+ tions in the Hamming space to capture the Hamming sim-
202
+ ilarity is non-trivial. Following the terms in graph con-
203
+ volutional networks, we attribute the challenges into two
204
+ aspects:
205
+ • Different from the operations on the continuous vectors,
206
+ each element in hash codes is restricted to the binary
207
+ values. Therefore, for each node, how to aggregate the
208
+ information from its neighbors in the Hamming space is the
209
+ first challenge we face.
210
+ • In order to represent the nodes in Hamming space, it is
211
+ essential to preserve their Hamming similarities with the
212
+ codes of their neighbors. Hence, how to explicitly encode
213
+ the Hamming similarities into each node is another technical
214
+ challenge in this work.
215
+ In order to address the outlined challenges, we develop a
216
+ novel hashing-based recommendation model, named Ham-
217
+ ming Spatial Graph Convolutional Networks (HS-GCN),
218
+ consisting of the initial, propagation, and prediction layers.
219
+ Specifically, in the initial layer, we recognize the user-item
220
+ interactions as a bipartite graph and initialize the nodes
221
+ with a hash code generation method proposed in [17], which
222
+ guarantees the feasibility of end-to-end optimization. Upon
223
+ the constructed graph, we devise a code propagation layer
224
+ to implement the graph convolutional operations in Ham-
225
+ ming space. More specifically, the layer could be divided
226
+ into two components — hash code aggregation and hash
227
+ code encoding. The former aggregates information from
228
+ first-order similar neighbors by counting the bit-wise signs
229
+ (i.e., finding out the dominated bit value in each dimension)
230
+ of their corresponding hash codes. And the latter injects the
231
+ Hamming similarities into the node hash codes by refining
232
+ their bits consistent with the bit-wise signs of their neigh-
233
+ bors. With the stacked propagation layers, we iteratively
234
+ embed the learned hash codes into the nodes. And then,
235
+ the interactions of user-item pairs could be predicted by
236
+ scoring their affinities at the prediction layer. To evaluate
237
+ our proposed model, we conduct extensive experiments on
238
+ three publicly accessible datasets and compare the perfor-
239
+ mance with several state-of-the-art baselines. In addition to
240
+ outperforming the hash-based models (e.g., HashNet and
241
+ HashGNN), our proposed method achieves the results com-
242
+ parable with the real-valued based models, such as PinSage
243
+ and GraphSAGE.
244
+ Overall, the main contributions of our work are summa-
245
+ rized in three-folds:
246
+ • To the best of our knowledge, this is the first attempt
247
+ to explicitly model the high-order Hamming similarity
248
+ between users and items in the recommender system,
249
+ which enhances the representation ability of hash codes
250
+ and accordingly optimizes the user-item interaction pre-
251
+ diction.
252
+ • We
253
+ present
254
+ a
255
+ GCN-based
256
+ hashing
257
+ recommendation
258
+ model, named Hamming Spatial Graph Convolutional
259
+ Network (HS-GCN), which explicitly captures the first-
260
+ and high-order Hamming similarities. In particular, we
261
+ develop the novel graph convolutions operation—hash
262
+ code aggregation and hash code encoding—in the Ham-
263
+ ming space.
264
+ • Extensive
265
+ experimental
266
+ results
267
+ on
268
+ three
269
+ real-world
270
+ datasets have demonstrated that the proposed model
271
+ yields a substantial performance improvement compared
272
+ with several state-of-the-art baselines. As a side contri-
273
+ bution, we have released the codes to facilitate other
274
+ researchers: https://github.com/hanliu95/HS-GCN.
275
+ 2
276
+ RELATED WORK
277
+ In this section, we briefly review graph-based methods for
278
+ recommendation and learning to hash for recommendation.
279
+ 2.1
280
+ Graph-based Methods for Recommendation
281
+ Machine learning on graphs is an important task with the
282
+ advantage of incorporating structural information. As one
283
+ of the primary applications, representation learning on the
284
+ user-item graph structure has been widely-studied in rec-
285
+ ommendation scenarios by utilizing information propaga-
286
+ tion. In this line of research, ItemRank [19] and BiRank [20]
287
+ make early efforts for label propagation. In particular, these
288
+ methods directly propagate the user preference scores (i.e.,
289
+ labels) on the graph, scoring connected items with similar
290
+ labels for a user. However, these methods are essentially
291
+ neighbor-based and insufficient to encode structural infor-
292
+ mation of a graph.
293
+ Recently, GNNs have received focused attention [21],
294
+ [22], since GNNs have special advantage on modeling
295
+ the graph structure, especially information propagation, to
296
+ guide the representation learning. However, early GNN-
297
+ based methods suffer from expensive computation costs
298
+ as the graph convolution on the spectral domain. Subse-
299
+ quently, GCNs exploit a graph convolution operation on the
300
+
301
+ IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING
302
+ 3
303
+ spatial domain, which aggregates the embeddings of neigh-
304
+ bors to refine the embedding of the target node [3], [23]. Mo-
305
+ tivated by the efficiency of graph convolution, GC-MC [24],
306
+ PinSage [25], and NGCF [2] employ GCNs to capture the
307
+ propagation of latent Collaborative Filtering (CF) signals in
308
+ the user-item interaction graph for recommendation. How-
309
+ ever, later studies argue the excessive complexity of GCNs.
310
+ For example, LightGCN [26] develops a linear model by
311
+ removing all redundant parameters. Experimental results
312
+ demonstrate that the simplified design outperforms original
313
+ GCNs by a large margin. This shows that the nonlinearity
314
+ of GCNs is unnecessary for CF recommendation.
315
+ As aforementioned, we summarized two key points: 1)
316
+ graph-based methods shed light on modeling the relational
317
+ information propagation like the high-order similarity in
318
+ the Hamming space, based on a user-item graph; 2) graph
319
+ convolution has better performance after being simplified,
320
+ verifying that the nonlinearity is not necessary in graph-
321
+ based recommendation. Our work is highly inspired by
322
+ these analyses, since the high-order Hamming similarity
323
+ can be effectively modeled by the graph-based mechanism,
324
+ and all the operations are simply linear in the Hamming
325
+ space. Moreover, Heterogeneous GNN is proposed to be
326
+ adapted upon structurally complex graphs to utilize richer
327
+ information within them. Based on this technology, some
328
+ methods effectively learn representations by aggregating
329
+ different types of neighboring information in heterogeneous
330
+ information network, such as HERec [27], MCRec [28],
331
+ MEIRec [29], and ie-HGCN [30]. On contrary, our method
332
+ works with simple interaction information which can be
333
+ easily collected.
334
+ 2.2
335
+ Learning to Hash for Recommendation
336
+ Another relevant research line is learning to hash for recom-
337
+ mendation, which proceeds along two directions: unsuper-
338
+ vised hashing and supervised hashing [31]. The former [32],
339
+ [33] learns hash functions that encode objects to binary
340
+ codes by training from unlabeled data, while the latter [34],
341
+ [35], [36], [37] aims to learn more discriminative hash codes
342
+ by exploring labeled signals, such as the feedback between
343
+ users and items in recommendation scenarios. In general,
344
+ early learning to hash for recommendation methods are es-
345
+ sentially two-stage approaches [38]. However, the Hamming
346
+ similarity between learned hash codes might not correspond
347
+ to the original relevance between a user and an item, since
348
+ there are quantization deviations when thresholding real
349
+ values to binary bits during the binarization step. DCF [6]
350
+ tackles the challenging discrete optimization problem and
351
+ learns user and item hash codes directly. Therefore, the
352
+ learned hash codes are able to model the intrinsic user-item
353
+ relevance.
354
+ A prevailing trend is to leverage deep learning for
355
+ recommendation. For instance, NFM [39] successfully in-
356
+ troduces deep learning to enhance representation learning
357
+ and matching function modeling in recommendation. In the
358
+ light of this, deep learning to hash is subsequently devel-
359
+ oped and yields promising recommendation performance.
360
+ Early efforts of deep learning to hash also adopt a two-stage
361
+ strategy: the first stage employs deep networks to learn con-
362
+ tinuous representations and the second one uses the sign(x)
363
+ function to binarize the learned representations into binary
364
+ hash codes. This category of methods, such as CNNH [40],
365
+ DNNH [41], and DHN [15], also suffer from the quantiza-
366
+ tion deviation. To alleviate it, HashNet [17] is proposed to
367
+ devise a one-stage learning to hash technique to decrease
368
+ the quantization deviation of binarization. It approximates
369
+ the sign(x) function with function tanh(βx), where β is a
370
+ scaled parameter that increases during training. The infinite
371
+ approximation makes the deviation negligible, and thus
372
+ contributes to better recommendation performance.
373
+ In a sense, the aforementioned hashing techniques only
374
+ consider the first-order similarity between hash codes.
375
+ Therefore, we introduced graph-based techniques in hash
376
+ learning to capture the high-order Hamming similarity. It
377
+ is worth mentioning that several recent efforts have in-
378
+ corporated GNN insights into hashing, such as DGCN-
379
+ BinCF [42], GCNH [43], and HashGNN [18]. Particularly,
380
+ HashGNN [18] sets up a GNN in the continuous space,
381
+ followed by a straight through estimator [44] for generating
382
+ hash codes in the Hamming space. However, the hashing
383
+ step leads to information loss, which impedes the capturing
384
+ of intrinsic high-order Hamming similarity. To bridge this
385
+ gap, we directly constructed a GCN in the Hamming space
386
+ to model the high-order similarity.
387
+ Different from the diffusion models [45], [46], [47] which
388
+ combine different similarity measures by multiple similar-
389
+ ity graphs [48], [49], [50], [51], our method extends the
390
+ Hamming similarity from first-order to high-order via a
391
+ single graph, and the high-order similarity is exploited to
392
+ learn hash codes with better representative capacity. Also
393
+ different from hypergraph convolution networks that ex-
394
+ ploit multi-modal data in hypergraph for representation
395
+ learning [52], our method is simply based on the single-
396
+ modal interaction information in user-item graph, which
397
+ can be obtained more easily.
398
+ 3
399
+ PRELIMINARIES
400
+ We first give the definition of Hamming similarity, a similar-
401
+ ity measurement for the hash codes in the Hamming space,
402
+ highlighting that it is related to the number of the same bits.
403
+ We then formulate the problem to be solved in our work.
404
+ 3.1
405
+ Hamming Similarity
406
+ In the Hamming space, the user-item similarity is equivalent
407
+ to the similarity between their corresponding hash codes,
408
+ called Hamming similarity. Given user u and item i, we
409
+ denote their hash codes as hu ∈ {±1}K and hi ∈ {±1}K
410
+ respectively, where K represents the length of the codes. Ac-
411
+ cordingly, the Hamming similarity between them is defined
412
+ as:
413
+ sim(u, i) = 1
414
+ K
415
+ K
416
+
417
+ k=1
418
+ I(huk = hik),
419
+ (1)
420
+ where huk and hik are the k-th bits of hu and hi, respec-
421
+ tively, and I(·) denotes the indicator function that returns
422
+ 1 if the statement is true and 0 otherwise. Furthermore,
423
+ it could be proven that sim(u, i) is proportional to the
424
+ number of same bits in hu and hi. As such, we rewrite the
425
+ formulation [6] as:
426
+ sim(u, i) = 1
427
+ 2 +
428
+ 1
429
+ 2K hu
430
+ ⊤hi ∝ hu
431
+ ⊤hi,
432
+ (2)
433
+
434
+ IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING
435
+ 4
436
+ Prediction layer
437
+ -ReLU
438
+ clamp
439
+ 1
440
+ 1
441
+ 1
442
+ 𝐡𝑢1
443
+ (𝑙−1)
444
+ 𝐡𝑖1
445
+ (𝑙−1)
446
+ 𝐡𝑖2
447
+ (𝑙−1)
448
+ 𝒍 = 𝟏
449
+ 𝑢1
450
+ 𝑖1
451
+ 𝑖2
452
+ 𝒍 = 𝟑
453
+ 𝒍 = 𝟐
454
+ 1
455
+ 1
456
+ 1
457
+ 1
458
+ -1
459
+ 1
460
+ -ReLU
461
+ clamp
462
+ 1
463
+ 1
464
+ 1
465
+ 𝐡𝑖3
466
+ (𝑙−1)
467
+ 𝐡𝑢2
468
+ (𝑙−1)
469
+ 𝐡𝑢3
470
+ (𝑙−1)
471
+ 𝒍 = 𝟏
472
+ 𝑖3
473
+ 𝑢2
474
+ 𝑢3
475
+ 𝒍 = 𝟑
476
+ 𝒍 = 𝟐
477
+ 𝐡𝑢1
478
+ (3)
479
+ 𝐡𝑖3
480
+ (3)
481
+ Propagation layers
482
+ ො𝑦 𝑢1, 𝑖3
483
+ × −2
484
+ × −2
485
+ Fig. 2. Illustration of our proposed HS-GCN model (the arrow lines
486
+ present the flow of information). The hash codes of user u1 (left) and
487
+ item i3 (right) are refined with multiple hash code propagation layers.
488
+ where the derivation process is omitted. Based on this
489
+ formulation, we directly employ the inner product of hu
490
+ and hi to measure the similarity between u and i.
491
+ 3.2
492
+ Problem Formulation
493
+ In this work, we aim to tackle the problem of mapping
494
+ nodes in a user-item graph to hash codes for recommen-
495
+ dation. We formulate the problem to be addressed in this
496
+ paper as the following:
497
+ • Input: the user-item bipartite graph G = (V, E) that
498
+ records historical user-item interactions in a graph struc-
499
+ ture. Whereinto, the node set consists of the user set U
500
+ of N users and the item set I of M items, formally
501
+ V = U ∪ I. And, the edge set E contains the observed
502
+ user-item interactions in the training phase.
503
+ • Output: the hash codes of all users and items, defined as
504
+ {h∗
505
+ u|u ∈ U} ∪ {h∗
506
+ i |i ∈ I}. Since h∗
507
+ u
508
+ ⊤h∗
509
+ i denotes the simi-
510
+ larity score between user u and item i, and on top of that
511
+ we can generate a ranking list of items for a given user and
512
+ hence solve the practical problem of recommendation.
513
+ To accurately measure the similarity score, we focus on
514
+ devising a GCN for hash code propagation, which is
515
+ able to learn node hash codes with high-order Hamming
516
+ similarities latent in the user-item bipartite graph.
517
+ 4
518
+ METHODOLOGY
519
+ In this section, we detail our proposed HS-GCN model, as
520
+ illustrated in Figure 2. Specifically, the model consists of
521
+ three components: 1) the initial layer that yields the trainable
522
+ hash codes for the nodes in the user-item bipartite graph; 2)
523
+ the propagation layer that explicitly model the Hamming
524
+ similarities of node pairs and inject them into their codes
525
+ for enhancement of the representation ability; and 3) the
526
+ prediction layer that scores the similarity between the user
527
+ and item by conducting the inner product of their hash
528
+ codes. Moreover, we provide the optimization of HS-GCN
529
+ in the form of matrix and compare HS-GCN with a graph-
530
+ based learning to hash method HashGNN [18].
531
+ 4.1
532
+ Initial Layer
533
+ The initial layer serves to generate the initial hash codes
534
+ hu ∈ {±1}K (hi ∈ {±1}K) for user u (item i), where K is
535
+ the size of hash codes. Obviously, due to its discrete value,
536
+ the hash code cannot be trained by the gradient descent.
537
+ Hence, we alternatively employ a proxy to represent the
538
+ users and items during the training phase. To achieve this
539
+ goal, we follow the existing work [17] to reformulate the
540
+ hash codes as,
541
+ hu = lim
542
+ β→∞ tanh(βeu), hi = lim
543
+ β→∞ tanh(βei),
544
+ (3)
545
+ where eu ∈ RK and ei ∈ RK denote the parameter vector of
546
+ user u and item i, respectively. By scaling the value of β, the
547
+ outputs can approximate the desired codes. With the help
548
+ of such a proxy, it is capable of addressing the ill-posed gra-
549
+ dient issue and optimizing the representations during the
550
+ training process. When the model reaches the convergence,
551
+ we could infer the interactions between users and items via
552
+ the learned hash codes, instead of their approximations.
553
+ In what follows, we take the approximate codes of users
554
+ and items as the initial representations of the nodes in the
555
+ user-item graph and detail our devised graph convolutional
556
+ operations in Hamming space. For notational convenience,
557
+ we denote them as h(0)
558
+ u
559
+ and h(0)
560
+ i
561
+ , identifying the nodes’
562
+ codes at the 0-th layer.
563
+ 4.2
564
+ Propagation Layer
565
+ To perform the graph convolutional operations in Hamming
566
+ space, we devise a novel propagation layer, which disentan-
567
+ gles the operations into the hash code aggregation and hash
568
+ code encoding. With the stacked propagation layers, we
569
+ could explicitly model the first- and high-order Hamming
570
+ similarities hidden in the user-item graph and optimize the
571
+ nodes’ representations by injecting the learned Hamming
572
+ similarities into the codes.
573
+ In this section, without particular clarification, we elabo-
574
+ rate our proposed model on the user nodes and conduct the
575
+ same operations on item nodes.
576
+ 4.2.1
577
+ Hash Code Aggregation
578
+ Regarding the graph convolutional operations, it is essential
579
+ to capture the local structure information for each centric-
580
+ node. To the end, we are inspired by the prior studies [2], [3]
581
+ and develop a new aggregation to explicitly model the local
582
+ structure information in Hamming space, which reveals the
583
+ first-order Hamming similarity. Formally, the aggregation at
584
+ (l + 1)-th propagation layer can be defined as,
585
+ m(l)
586
+ u = f
587
+ �h(l)
588
+ u , {h(l)
589
+ i |i ∈ Nu}
590
+ �,
591
+ (4)
592
+ where h(l)
593
+ u
594
+ ∈ {±1}K and h(l)
595
+ i
596
+ ∈ {±1}K recursively denote
597
+ the hash codes of user u and item i at the l-th layer
598
+ propagation, respectively. And, Nu denotes the set of item
599
+ neighbors of user u, which u directly interacted with. Using
600
+ the function f(·), we could capture the informative signal
601
+ m(l)
602
+ u distilled by incorporating the node with its neighbors.
603
+ However, the implementation of this function is not
604
+ straightforward in Hamming space. In this work, we imple-
605
+ ment it in two steps. In particular, considering the fact that
606
+
607
+ IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING
608
+ 5
609
+ the transformation of the weighted matrix is inapplicable
610
+ in Hamming space, we first adopt the non-weighted sum to
611
+ integrate the bit-wise signals of the hash codes. Accordingly,
612
+ we rewrite the aggregation in Hamming space:
613
+ m(l)
614
+ u = f(h(l)
615
+ u +
616
+
617
+ i∈Nu
618
+ h(l)
619
+ i ).
620
+ (5)
621
+ Then, since the hash codes constrain binary values (i.e., +1
622
+ and -1), we capture the bit-wise dominate value in the hash
623
+ codes of centric node and its neighbors, which is different
624
+ with the graph operations in Euclidean space, like mean-
625
+ and max-pooling. We attribute it to the binomial distribution
626
+ of the hash code. As such, we aim at designing a bit-wise
627
+ function f(·) for aggregated codes and use each bit in m(l)
628
+ u
629
+ as the sign to reflect the dominate value at the correspond-
630
+ ing bit of codes of u associated with its neighbors. Thereby,
631
+ jointly considering the continuity of function, we implement
632
+ f(·) with the interval limited clamp function as follows:
633
+ m(l)
634
+ u = clamp(x) =
635
+
636
+
637
+
638
+
639
+
640
+ 1, if x > 1
641
+ x, if − 1 ≤ x ≤ 1
642
+ −1, if x < −1
643
+ ,
644
+ (6)
645
+ where x = (h(l)
646
+ u + �
647
+ i∈Nu h(l)
648
+ i ). Owing to the characteristic
649
+ of the clamp function, we can guarantee m(l)
650
+ u ∈ {−1, 0, 1}K.
651
+ For each node, the function is expected to reflect the dis-
652
+ tribution of its neighbors’ hash codes. It is able to deter-
653
+ mine the value of centric node, making it similar with its
654
+ neighbors. Taking one bit in hash code as an example, the
655
+ function will output −1 on this bit when the majority of
656
+ corresponding bits in neighbors’ hash codes are −1, and vice
657
+ versa. In a nutshell, we propose an aggregation operation in
658
+ Hamming space, which integrates the codes from the centric
659
+ node associated with its neighbors and distills the signal to
660
+ reflect the bit-wise value distributions of hash codes.
661
+ 4.2.2
662
+ Hash Code Encoding
663
+ Obtaining the aggregated codes from the local structure, we
664
+ then encode the information into the nodes to preserve their
665
+ first-order Hamming similarities towards their connected
666
+ nodes. As for each node, it is of importance to minimize
667
+ the total of bits which are different from the corresponding
668
+ bits of its neighbors’ codes. Therefore, we first compare the
669
+ code of user u (i.e., h(l)
670
+ u ) with the obtained signs (i.e., m(l)
671
+ u )
672
+ to capture the number of different bits, as,
673
+ d(l)
674
+ u = h(l)
675
+ u ⊙ m(l)
676
+ u ,
677
+ (7)
678
+ where ⊙ denotes the element-wise product, and d(l)
679
+ u
680
+
681
+ {−1, 0, 1}K is a vector consisting of the bit-wise comparison
682
+ result. More specifically, the value −1 in the output indi-
683
+ cates the corresponding bit differs from most of neighbors’;
684
+ whereas, the value 1 means the node has the same bit value
685
+ with the majority of nodes around it. Besides, when the
686
+ value equals to 0, it implies that the corresponding bit is
687
+ caught in the middle.
688
+ Then, we could refine the codes of user u according to
689
+ each value in the obtained vector. Considering the element 0
690
+ existing in the vector, this operation is hardly implemented
691
+ by conducting the element-wise product of two vectors,
692
+ which probably outputs zero in addition to the binary
693
+ value (i.e., +1 and −1). Therefore, we design a new function
694
+ to avoid the negative influence of the value 0. It is formally
695
+ defined as,
696
+ c(l)
697
+ u = −ReLU(−2 × d(l)
698
+ u ) + ones,
699
+ (8)
700
+ where ones = {1}K is the vector that adjusts the outputs
701
+ following the binary constraint. Based on this transform
702
+ function, the values are tuned within {−1, 1}. Note that
703
+ we convert the values 0 to 1 rather than −1, making the
704
+ −1 values in c(l)
705
+ u
706
+ exactly indicate the unquestioned bit
707
+ differences between the node and its neighbors. This will
708
+ improve the reliability of the following bit-wise refinement.
709
+ With the tuned vector, we could refine the hash code h(l)
710
+ u
711
+ by maximizing the similarity with its neighbors. Since c(l)
712
+ u
713
+ indicates the bits which are distinct with the majority of its
714
+ neighbors, we utilize c(l)
715
+ u
716
+ to refine the bits of h(l)
717
+ u
718
+ with the
719
+ element-wise product, formally,
720
+ h(l+1)
721
+ u
722
+ = c(l)
723
+ u ⊙ h(l)
724
+ u ,
725
+ (9)
726
+ where h(l+1)
727
+ u
728
+ denotes the hash code of user u learned at the
729
+ (l+1)-th propagation layer. Analogously, we can obtain the
730
+ hash code h(l+1)
731
+ i
732
+ of item i by propagating hash codes from
733
+ itself and its connected users. In summary, the designed
734
+ hash code propagation layer contributes to exploit the first-
735
+ order similarity information to relate user and item hash
736
+ codes in the Hamming space.
737
+ 4.2.3
738
+ Hash Code Propagation Rule in the Matrix Form
739
+ To offer a holistic view of the hash code propagation archi-
740
+ tecture and facilitate the batch implementation, we provide
741
+ the matrix form of the layer-wise propagation rule as:
742
+ H(l+1) =
743
+
744
+ − ReLU
745
+ � − 2 × clamp
746
+ �(A + I)H(l)� ⊙ H(l)�
747
+ + Ones
748
+
749
+ ⊙ H(l),
750
+ (10)
751
+ where H(l) ∈ {±1}(N+M)×K are the hash codes for users
752
+ and items obtained after l steps of propagation. H(0) is
753
+ the matrix of the initial hash codes after the initial layer,
754
+ where h(0)
755
+ u
756
+ = hu and h(0)
757
+ i
758
+ = hi. I denotes the identity
759
+ matrix, and Ones ∈ {1}(N+M)×K is a matrix of all ones. A
760
+ denotes the adjacency matrix for the user-item graph, which
761
+ is formulated as:
762
+ A =
763
+
764
+ 0
765
+ R
766
+ R⊤
767
+ 0
768
+
769
+ ,
770
+ (11)
771
+ where R ∈ {0, 1}N×M is the user-item interaction matrix,
772
+ and 0 is a all zero matrix. By implementing the matrix
773
+ form propagation rule, we can simultaneously update the
774
+ hash codes for all users and items in a rather efficient way.
775
+ Moreover, it assists us to discard the node sampling proce-
776
+ dure, which is commonly used to make graph convolution
777
+ networks applicable on large-scale graph.
778
+ 4.3
779
+ Prediction Layer
780
+ We stack multiple propagation layers to explore the high-
781
+ order similarities between hash codes, which are vital for
782
+ upgrading the hash codes to finally estimate the relevance
783
+ between the user-item pair. In particular, we define L as the
784
+
785
+ IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING
786
+ 6
787
+ depth of the final propagation layer, and the hash code of
788
+ user u is recursively defined as:
789
+
790
+
791
+
792
+
793
+
794
+
795
+
796
+
797
+
798
+
799
+
800
+ h(1)
801
+ u
802
+ = c(0)
803
+ u
804
+ ⊙ hu,
805
+ h(2)
806
+ u
807
+ = c(1)
808
+ u
809
+ ⊙ h(1)
810
+ u
811
+ = c(1)
812
+ u
813
+ ⊙ c(0)
814
+ u
815
+ ⊙ hu,
816
+ · · · · · ·
817
+ h(L)
818
+ u
819
+ = c(L−1)
820
+ u
821
+ ⊙ h(L−1)
822
+ u
823
+ = c(L−1)
824
+ u
825
+ ⊙ · · · ⊙ c(0)
826
+ u
827
+ ⊙ hu.
828
+ (12)
829
+ It shows that our model obtains the final hash codes by
830
+ element-wise multiplying the initial ones with a series of
831
+ refinement vectors. These refinement vectors then modulate
832
+ the bit signals of user u’s hash code layer by layer. As
833
+ thus, the high-order Hamming similarity is injected into the
834
+ hash code learning process. Note that the length of hash
835
+ code is identically K in each layer according to Eqn.(12).
836
+ Analogously, we can obtain the hash code for item i at the
837
+ L-th layer.
838
+ After performing L propagation layers, we obtain mul-
839
+ tiple hash codes for user u, termed {h(1)
840
+ u , · · · , h(L)
841
+ u }. It is
842
+ worth noting that we choose not to concatenate them as the
843
+ final representation for a user, which is widely used in the
844
+ graph-based recommendation models [2], [26]. The reason is
845
+ that the length of concatenation codes probably harms the
846
+ computational efficiency and memory space. Alternately, we
847
+ take the hash codes at the last layer (i.e., h(L)
848
+ u
849
+ and h(L)
850
+ i
851
+ )
852
+ as the representations of user u and item i to predict their
853
+ interaction, formally,
854
+ h∗
855
+ u = h(L)
856
+ u ,
857
+ h∗
858
+ i = h(L)
859
+ i
860
+ .
861
+ (13)
862
+ Finally, we apply the inner product to estimate the
863
+ similarity between hash codes of the target user and item,
864
+ which can be equivalently treated as the user’s preference
865
+ towards the item:
866
+ ˆyui = h∗
867
+ u
868
+ ⊤h∗
869
+ i .
870
+ (14)
871
+ 4.4
872
+ Optimization
873
+ In this work, we optimize the proposed model based on
874
+ the users’ implicit feedback, such as observations and pur-
875
+ chases [53], [54]. Compared to explicit ratings, the implicit
876
+ feedback is easier to collect but more challenging for ex-
877
+ ploring the user preference, due to its scarcity of nega-
878
+ tive feedback. To optimize the model by the maximization
879
+ likelihood estimation (MLE), we formulate the likelihood
880
+ function P(rui|h∗
881
+ u, h∗
882
+ i ) as the probability of the interaction
883
+ between user u and item i equals rui given their trainable
884
+ codes h∗
885
+ u and h∗
886
+ i . As such, its optimal objective can be
887
+ instantiated as the pairwise logistic function as follows:
888
+ P(rui|h∗
889
+ u, h∗
890
+ i ) =
891
+
892
+ σ(ˆyui), rui = 1,
893
+ 1 − σ(ˆyui), rui = 0,
894
+ (15)
895
+ where σ(·) is the standard sigmoid function. And, ˆyui =
896
+ h∗
897
+ u
898
+ ⊤h∗
899
+ i is the estimated Hamming similarity between h∗
900
+ u
901
+ and h∗
902
+ i . In this case, the more similar the hash codes are,
903
+ the larger the conditional probability P(1|h∗
904
+ u, h∗
905
+ i ) will be,
906
+ and vice versa. Therefore, Eqn.(15) is a reasonable extension
907
+ of the logistic regression classifier for the pairwise classifica-
908
+ tion problem based on hash codes. Further, we can optimize
909
+ the parameter by minimizing the following loss function:
910
+ Lcross = −
911
+
912
+ rui∈R
913
+ ruilog(σ(ˆyui)) + (1 − rui)log(1 − σ(ˆyui)),
914
+ (16)
915
+ where R is the aforementioned user-item interaction matrix
916
+ that records the ground-truth implicit feedback. With this
917
+ loss, the optimal object turns to reconstruct the observed
918
+ interactions in the training phase.
919
+ In general, Eqn.(16) is effective in learning useful hash
920
+ codes for users and items, and guarantees that the inter-
921
+ acted user-item pairs have similar hash codes. However, the
922
+ ranking among candidate items tends to be more important
923
+ than their absolute scores, since recommender systems sug-
924
+ gest items to users mainly according to their rankings. For
925
+ implicit feedback data, the ranking relation can be obtained
926
+ by sampling from the interaction matrix R [1]. Specifically,
927
+ we assume that the observed interactions, which are more
928
+ reflective of a user’s preference, should be assigned with
929
+ higher estimated values than the unobserved ones. Inspired
930
+ by this, we introduce a ranking order reinforced loss func-
931
+ tion as:
932
+ Lrank =
933
+
934
+ (u,i,j)∈D
935
+ max(0, −σ(ˆyui) + σ(ˆyuj) + α),
936
+ (17)
937
+ where D = {(u, i, j)|(u, i) ∈ R+, (u, j) ∈ R−} denotes the
938
+ triplet training data, R+ indicates the observed interactions,
939
+ and R− is the unobserved interactions; α is the margin pa-
940
+ rameter that helps to control the observed and unobserved
941
+ interactions. By minimizing Lrank, the interacted items will
942
+ gather around the user u more closely than items that are
943
+ not interacted with u in the Hamming space.
944
+ By combining the aforementioned factors, the overall
945
+ loss function to be minimized is formulated as:
946
+ L = Lcross + λ1Lrank + λ2∥E∥2
947
+ 2
948
+ = −
949
+
950
+ rui∈R
951
+ ruilog(σ(ˆyui)) + (1 − rui)log(1 − σ(ˆyui))
952
+ + λ1
953
+
954
+ (u,i,j)∈D
955
+ max(0, −σ(ˆyui) + σ(ˆyuj) + α) + λ2∥E∥2
956
+ 2,
957
+ (18)
958
+ where λ1 is the trade-off parameter to balance the pro-
959
+ portion between the entropy and the ranking loss. Note
960
+ that both the pair-wise ranking loss and the point-wise
961
+ reconstruction loss are necessary for the model optimiza-
962
+ tion; E ∈ R(N+M)×K denotes the real-valued parameter
963
+ matrix in the initial layer as trainable model parameters,
964
+ and λ2 controls the L2 regularization strenghth to prevent
965
+ overfitting. In addition, we adopt mini-batch Adam [55]
966
+ to optimize our model and update the model parame-
967
+ ters. Particularly, for a batch of randomly sampled triplets
968
+ (u, i, j) ∈ D, we obtain their final hash codes h∗
969
+ u, h∗
970
+ i , and h∗
971
+ j,
972
+ and then update model parameters by using the gradients
973
+ of the loss function.
974
+ 4.5
975
+ Comparison with HashGNN
976
+ We
977
+ compare
978
+ our
979
+ hash
980
+ code
981
+ propagation
982
+ layer
983
+ with
984
+ HashGNN [18], which adopts the embedding propagation
985
+ in Euclidean space to learn hash codes. HashGNN designs
986
+
987
+ IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING
988
+ 7
989
+ the graph convolution operation not on the hash code h(l)
990
+ u
991
+ (or h(l)
992
+ i ) but on its real-valued parameter approximation
993
+ e(l)
994
+ u (or e(l)
995
+ i ). There obviously exists a quantization deviation
996
+ between them, i.e., e(l)
997
+ u = h(l)
998
+ u + ϵ(l)
999
+ u . Hence, the propagation
1000
+ layer of HashGNN can be formulated as:
1001
+ e(l+1)
1002
+ u
1003
+ = tanh
1004
+ �W(l) · mean
1005
+ �h(l)
1006
+ u + ϵ(l)
1007
+ u +
1008
+
1009
+ i∈Nu
1010
+ (h(l)
1011
+ i
1012
+ + ϵ(l)
1013
+ i )
1014
+ ��,
1015
+ (19)
1016
+ where the quantization deviations are accumulated with
1017
+ the aggregation. The nonlinear tanh function and weight
1018
+ matrix W(l) ∈ RK×K cause a new deviation between e(l+1)
1019
+ u
1020
+ and h(l+1)
1021
+ u
1022
+ , which will make the final hash codes unable to
1023
+ obtain the high-order Hamming similarity. Compared with
1024
+ HashGNN, our proposed HS-GCN model implements the
1025
+ propagation of hash codes without introducing quantization
1026
+ deviations, effectively capturing the high-order Hamming
1027
+ similarity between hash codes.
1028
+ 5
1029
+ EXPERIMENTAL SETUP
1030
+ In this section, we first present the evaluation datasets,
1031
+ and then introduce our experimental settings, followed by
1032
+ elaboration of baseline methods.
1033
+ 5.1
1034
+ Datasets
1035
+ To justify the effectiveness of our proposed model, we
1036
+ conducted experiments on six publicly accessible datasets:
1037
+ MovieLens1, Yelp2, Amazon3, Gowalla, Pinterest, and Net-
1038
+ flix4. Table 1 summarizes the detailed statistics of the evalu-
1039
+ ated datasets.
1040
+ MovieLens: This is a widely used movie rating dataset,
1041
+ and we adopted the 1M version in our experiments. Sim-
1042
+ ilar to [56], we transformed the rating scores into implicit
1043
+ feedback, so that the label of each user-item pair is either 1
1044
+ or 0, indicating whether the user rated the movie. The other
1045
+ datasets are processed in a similar way.
1046
+ Yelp: Yelp is a famous online review platform for business,
1047
+ such as restaurants, bars, and spas. We selected the dataset
1048
+ from the latest version and used a 20-core setting to provide
1049
+ a denser dataset.
1050
+ Amazon: Amazon-review is a popular dataset for commod-
1051
+ ity recommendation [57]. We selected Amazon-book from
1052
+ the collection. Similarly, we used the 20-core setting to
1053
+ ensure that each user and item have 20 interactions at least.
1054
+ Gowalla: This is the check-in dataset [58] obtained from
1055
+ Gowalla, where users share their locations by checking-
1056
+ in. To ensure the quality of the dataset, we used the 10-
1057
+ core setting, i.e., retaining users and items with at least ten
1058
+ interactions similar to [2].
1059
+ Pinterest: This implicit feedback dataset is constructed
1060
+ by [59] for evaluating image recommendation. We adopted
1061
+ its processed version shared by [60].
1062
+ Netflix: This is the large-scale movie rating dataset used
1063
+ in the Netflix challenge. We applied the 20-core setting to
1064
+ obtain a denser dataset.
1065
+ 1. https://grouplens.org/datasets/movielens/.
1066
+ 2. https://www.yelp.com/dataset.
1067
+ 3. http://jmcauley.ucsd.edu/data/amazon/.
1068
+ 4. http://www.netflixprize.com/.
1069
+ TABLE 1
1070
+ Statistics of the datasets.
1071
+ Dataset
1072
+ #Users
1073
+ #Items
1074
+ #Interactions
1075
+ Density
1076
+ MovieLens
1077
+ 6,040
1078
+ 3,706
1079
+ 1,000,209
1080
+ 4.47%
1081
+ Yelp
1082
+ 40,500
1083
+ 58,755
1084
+ 2,024,283
1085
+ 0.09%
1086
+ Amazon
1087
+ 36,783
1088
+ 77,379
1089
+ 2,402,416
1090
+ 0.08%
1091
+ Gowalla
1092
+ 29,585
1093
+ 40,981
1094
+ 1,027,370
1095
+ 0.09%
1096
+ Pinterest
1097
+ 55,187
1098
+ 9,916
1099
+ 1,500,809
1100
+ 0.27%
1101
+ Netflix
1102
+ 429,584
1103
+ 17,764
1104
+ 99,884,887
1105
+ 1.31%
1106
+ For each dataset, we randomly split its implicit feedback
1107
+ into two parts: 70% for training and the rest 30% for testing.
1108
+ Moreover, 10% interactions in the training set are randomly
1109
+ selected as the validation set for hyper-parameter tuning.
1110
+ For each observed user-item interaction in the training set,
1111
+ we treated it as a positive instance, and then adopted the
1112
+ negative sampling strategy to pair it with five negative items
1113
+ that the user did not interact with in the training set.
1114
+ 5.2
1115
+ Experimental Settings
1116
+ Evaluation Metric. For each user in the testing set, we
1117
+ regarded all items with no interaction with her/him as
1118
+ negative ones. Then the recommendation method predicts
1119
+ the user’s preference scores (e.g., Hamming similarity) over
1120
+ all the items, except the ones used in the training set. To
1121
+ measure the performance of top-K recommendation and
1122
+ preference ranking, we adopted HR@K (Hit Ratio) [60] and
1123
+ NDCG@K (Normalized Discounted Cumulative Gain) as
1124
+ the evaluation metrics. Whereinto, NDCG@K are formally
1125
+ defined as:
1126
+ NDCG@K = DCGK
1127
+ IDCGK
1128
+ , and DCGK =
1129
+ K
1130
+
1131
+ i=1
1132
+ 2rui − 1
1133
+ log2(1 + i),
1134
+ where IDCG is the ideal DCG, and rui denotes the interac-
1135
+ tion status of the i-th recommended item. By default, we set
1136
+ K = 50 and 100. We reported the average metrics for all
1137
+ users in the testing set.
1138
+ Model Implementation. We implemented our HS-GCN
1139
+ model via the development tool Pytorch5 and Pytorch Ge-
1140
+ ometric6. We set the depth of HS-GCN L as two to model
1141
+ the second-order Hamming similarity. The hash code size is
1142
+ set to be 64. We optimized our model by Adam optimizer
1143
+ with a batch size of 3,000. Besides, we utilized the popular
1144
+ approach of Xavier [61] to initialize all the parameters in
1145
+ our model. And we applied the grid search for tuning the
1146
+ hyper-parameters based on the results from the validation
1147
+ set: the learning rate is tuned amongst {1e-4, 3e-4, 1e-3, 3e-
1148
+ 3}, and finally set to be 3e-4; the trade-off coefficient λ1 is
1149
+ tuned from 0.1 to 1 with step size of 0.1, and finally set
1150
+ to be 0.1; the coefficient λ2 of L2 normalization is searched
1151
+ within {1e-8, 1e-7, · · · , 1}, and 1e-7 is the optimal value. The
1152
+ margin parameter α is fixed to 0.2. Moreover, early stopping
1153
+ is adopted if HR@K on the validation data does not increase
1154
+ for 10 successive epochs.
1155
+ 5. https://pytorch.org/.
1156
+ 6. https://pytorch-geometric.readthedocs.io/en/latest/.
1157
+
1158
+ IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING
1159
+ 8
1160
+ 5.3
1161
+ Baseline Comparison
1162
+ To demonstrate the effectiveness, we compared the perfor-
1163
+ mance of our proposed method with a series of state-of-
1164
+ the-art hash learning based models (i.e., DHN, Hash ste,
1165
+ HashNet, and HashGNN). Beyond these methods, we also
1166
+ introduce several real-valued recommendation models (i.e.,
1167
+ MF, BiNE, PinSage, and GraphSAGE) to justify that HS-
1168
+ GCN could achieve comparable results.
1169
+ • DCF [6]: It is the first method to directly optimize hash
1170
+ codes based on the rating matrix. In our experiments, we
1171
+ adapted DCF for addressing the interaction matrix.
1172
+ • DFM [5]: This is a discretely parameterized factorization
1173
+ machine for rating prediction. We adapted it to be trained
1174
+ on implicit data.
1175
+ • DHN [15]: This is a popular deep hashing method for
1176
+ similar image recommendation. It learns high-quality
1177
+ hash codes by controlling the quantization deviation. We
1178
+ adapted it for user-item recommendation by replacing the
1179
+ original AlexNet [62] framework with Graph Convolution
1180
+ Networks (GCNs).
1181
+ • Hash ste: This is an effective end-to-end hash learning
1182
+ method based on straight through estimator [44], which
1183
+ enables the optimization of discrete variables by directly
1184
+ copying approximated gradients of them.
1185
+ • HashNet [17]: This is a state-of-the-art deep hashing
1186
+ method, which devises a continuous and differentiable
1187
+ function to approximate the sign function. Similarly, we
1188
+ used GCN to replace the AlexNet in HashNet.
1189
+ • GCNH [43]: It is a graph-based hashing method, which
1190
+ introduces a novel and efficient asymmetric graph convo-
1191
+ lution network, followed by a binarization step to learn
1192
+ similarity-preserving hash codes. We adapted it for rec-
1193
+ ommendation via the user and item ID information as its
1194
+ input feature.
1195
+ • DGCN-BinCF [42]: It is a graph-based hashing method.
1196
+ This method relaxes the binary constraint and makes
1197
+ continuous optimization possible to distill the ranking
1198
+ information from GCN into hash codes.
1199
+ • HashGNN [18]: It is a graph-based hashing model, where
1200
+ GNN is utilized towards high quality hash codes.
1201
+ • MF [63]: Matrix Factorization is the most common embed-
1202
+ ding model for recommendation, which only exploits the
1203
+ user-item direct interactions for recommendation.
1204
+ • BiNE [64]: This embedding model adopts biased random
1205
+ walks for representation learning based on the bipartite
1206
+ graph. It applies an optimization framework for both
1207
+ explicit ratings and implicit feedback.
1208
+ • PinSage [25]: PinSage is a graph embedding model. It
1209
+ combines efficient random walks and graph convolutions
1210
+ on the item-item graph, which incorporates both the
1211
+ graph structure and the node feature information. Hereon,
1212
+ we applied it on the user-item interaction graph.
1213
+ • GraphSage [65]: As a famous graph embedding model, it
1214
+ is a general inductive framework that learns embeddings
1215
+ by sampling and aggregating features from a node’s local
1216
+ neighborhood.
1217
+ Baseline Implementation. For fair comparison, all base-
1218
+ line methods are implemented in Pytorch and Pytorch Ge-
1219
+ ometric, except the publicly available implementation of
1220
+ DCF7, DFM8, GCNH9, and BiNE10. Without specification,
1221
+ the default size of embedding or hash code is 64. For
1222
+ all graph-based baselines, we adopted a two-layer GCN
1223
+ initialized from Xavier, and used the Adam optimizer with
1224
+ a well-chosen mini-batch size for model optimization. The
1225
+ learning rate is tuned amongst {1e-4, 3e-4, 1e-3, 3e-3}. For
1226
+ HashGNN, we set the architecture of the graph layer, and
1227
+ the hyper-parameters, following the original paper [18]. For
1228
+ HashNet, we initialized the scale parameter β for tanh(βx)
1229
+ as 1, and exponentially increased it after constant epochs as
1230
+ suggested in [17]. For DGCN-BinCF, PinSage, and Graph-
1231
+ Sage, we implemented them according to the default archi-
1232
+ tectures in the original papers [25], [42], [64], [65], and tuned
1233
+ their hyper-parameters based upon the model performance
1234
+ on validation set.
1235
+ 6
1236
+ EXPERIMENTAL RESULTS
1237
+ In order to validate the effectiveness of our proposed
1238
+ method, we conducted overall experiments to compare our
1239
+ proposed HS-GCN model with baseline methods in perfor-
1240
+ mance, efficiency, and sparsity issue. Moreover, in order to
1241
+ evaluate the effectiveness of components in HS-GCN, we
1242
+ performed ablation experiments on the key components
1243
+ including: propagation layers, ranking loss, and dropout
1244
+ technique.
1245
+ 6.1
1246
+ Overall Experiments
1247
+ We started by comparing the performance of all the meth-
1248
+ ods, and then analyzed the efficiency of these methods.
1249
+ Finally, we explored the effectiveness of modeling high-
1250
+ order similarity under the sparse settings.
1251
+ 6.1.1
1252
+ Performance Comparison
1253
+ The results of our method and baselines over the exper-
1254
+ imented datasets are presented in Table 2. Besides, we
1255
+ reported the improvements and statistical significance test
1256
+ in Table 2, which are calculated between our proposed
1257
+ method and the strongest hashing baseline (highlighted
1258
+ with underline). Observing the results shown in Table 2
1259
+ from top to bottom, we obtained the following key findings:
1260
+ • DCF and DFM underperform on the implicit feedback
1261
+ datasets. This reflects the limitation of hashing methods
1262
+ that are designed on the basis of explicit feedback. DHN
1263
+ obtains poor performance on all the datasets. This indi-
1264
+ cates that the two-stage hashing method is insufficient to
1265
+ capture first-order similarities between users and items in
1266
+ the Hamming space, which is caused by the quantization
1267
+ deviation. Hash ste consistently exceeds DHN across all
1268
+ cases, demonstrating the advantage of directly learning to
1269
+ hash strategy. However, Hash ste fails to completely solve
1270
+ the quantization deviation between the straight through
1271
+ estimator and the sign function.
1272
+ • Compared with DHN and Hash ste, HashNet effectively
1273
+ eliminates the quantization deviation, and the better per-
1274
+ formance verifies that HashNet captures the first-order
1275
+ 7. https://github.com/hanwangzhang/Discrete-Collaborative-
1276
+ Filtering.
1277
+ 8. https://github.com/hanliu95/DFM.
1278
+ 9. https://github.com/zxJohnFly/GCN.
1279
+ 10. https://github.com/clhchtcjj/BiNE.
1280
+
1281
+ IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING
1282
+ 9
1283
+ TABLE 2
1284
+ Overall performance comparison on six datasets. % Improv. and p-value denote the relative improvements (%) and t-test results of HS-GCN
1285
+ compared with HashGNN, respectively.
1286
+ Methods
1287
+ MovieLens
1288
+ Yelp
1289
+ Amazon
1290
+ Gowalla
1291
+ Pinterest
1292
+ Netflix
1293
+ HR@50
1294
+ HR@100
1295
+ HR@50
1296
+ HR@100
1297
+ HR@50
1298
+ HR@100
1299
+ HR@50
1300
+ HR@100
1301
+ HR@50
1302
+ HR@100
1303
+ HR@50
1304
+ HR@100
1305
+ DCF
1306
+ 0.0469
1307
+ 0.0910
1308
+ 0.0143
1309
+ 0.0281
1310
+ 0.0145
1311
+ 0.0288
1312
+ 0.1376
1313
+ 0.1471
1314
+ 0.0723
1315
+ 0.0840
1316
+ 0.0667
1317
+ 0.1143
1318
+ DFM
1319
+ 0.0549
1320
+ 0.1068
1321
+ 0.0163
1322
+ 0.0310
1323
+ 0.0171
1324
+ 0.0336
1325
+ 0.1753
1326
+ 0.1820
1327
+ 0.0849
1328
+ 0.0931
1329
+ 0.0819
1330
+ 0.1330
1331
+ DHN
1332
+ 0.0782
1333
+ 0.1393
1334
+ 0.0228
1335
+ 0.0430
1336
+ 0.0238
1337
+ 0.0448
1338
+ 0.2281
1339
+ 0.2415
1340
+ 0.1200
1341
+ 0.1328
1342
+ 0.1084
1343
+ 0.1813
1344
+ Hash ste
1345
+ 0.0955
1346
+ 0.1684
1347
+ 0.0349
1348
+ 0.0620
1349
+ 0.0327
1350
+ 0.0557
1351
+ 0.3268
1352
+ 0.3606
1353
+ 0.1125
1354
+ 0.2032
1355
+ 0.1211
1356
+ 0.2007
1357
+ HashNet
1358
+ 0.1359
1359
+ 0.2232
1360
+ 0.0364
1361
+ 0.0651
1362
+ 0.0353
1363
+ 0.0599
1364
+ 0.3370
1365
+ 0.3830
1366
+ 0.1539
1367
+ 0.2730
1368
+ 0.1463
1369
+ 0.2337
1370
+ GCNH
1371
+ 0.1552
1372
+ 0.2488
1373
+ 0.0389
1374
+ 0.0714
1375
+ 0.0394
1376
+ 0.0636
1377
+ 0.3979
1378
+ 0.4209
1379
+ 0.1847
1380
+ 0.3129
1381
+ 0.1515
1382
+ 0.2402
1383
+ DGCN-BinCF
1384
+ 0.1554
1385
+ 0.2546
1386
+ 0.0358
1387
+ 0.0666
1388
+ 0.0373
1389
+ 0.0623
1390
+ 0.3420
1391
+ 0.3853
1392
+ 0.1834
1393
+ 0.3112
1394
+ 0.1744
1395
+ 0.2883
1396
+ HashGNN
1397
+ 0.1598
1398
+ 0.2557
1399
+ 0.0447
1400
+ 0.0774
1401
+ 0.0363
1402
+ 0.0611
1403
+ 0.3932
1404
+ 0.4329
1405
+ 0.1947
1406
+ 0.3214
1407
+ 0.2058
1408
+ 0.3185
1409
+ HS-GCN
1410
+ 0.2052
1411
+ 0.3169
1412
+ 0.0497
1413
+ 0.0883
1414
+ 0.0523
1415
+ 0.0885
1416
+ 0.4084
1417
+ 0.4480
1418
+ 0.2066
1419
+ 0.3322
1420
+ 0.2192
1421
+ 0.3432
1422
+ MF
1423
+ 0.1332
1424
+ 0.2042
1425
+ 0.0319
1426
+ 0.0513
1427
+ 0.0349
1428
+ 0.0566
1429
+ 0.3360
1430
+ 0.3675
1431
+ 0.1400
1432
+ 0.2472
1433
+ 0.1981
1434
+ 0.3042
1435
+ BiNE
1436
+ 0.1308
1437
+ 0.1868
1438
+ 0.0345
1439
+ 0.0546
1440
+ 0.0335
1441
+ 0.0560
1442
+ 0.3603
1443
+ 0.3812
1444
+ 0.1526
1445
+ 0.2582
1446
+ 0.2097
1447
+ 0.3346
1448
+ PinSage
1449
+ 0.1587
1450
+ 0.2501
1451
+ 0.0503
1452
+ 0.0812
1453
+ 0.0402
1454
+ 0.0656
1455
+ 0.3791
1456
+ 0.4131
1457
+ 0.1837
1458
+ 0.3008
1459
+ 0.2279
1460
+ 0.3585
1461
+ GraphSage
1462
+ 0.2132
1463
+ 0.3326
1464
+ 0.0581
1465
+ 0.0942
1466
+ 0.0408
1467
+ 0.0672
1468
+ 0.3894
1469
+ 0.4305
1470
+ 0.1919
1471
+ 0.3162
1472
+ 0.2334
1473
+ 0.3616
1474
+ % Improv.
1475
+ 28.41%
1476
+ 23.93%
1477
+ 11.19%
1478
+ 14.08%
1479
+ 44.08%
1480
+ 44.84%
1481
+ 3.87%
1482
+ 3.49%
1483
+ 6.11%
1484
+ 3.36%
1485
+ 6.51%
1486
+ 7.76%
1487
+ p-value
1488
+ 2.77e-4
1489
+ 7.01e-4
1490
+ 5.62e-3
1491
+ 1.95e-4
1492
+ 1.04e-3
1493
+ 1.27e-4
1494
+ 1.81e-4
1495
+ 1.39e-4
1496
+ 1.37e-3
1497
+ 5.08e-4
1498
+ 1.35e-4
1499
+ 2.04e-4
1500
+ Methods
1501
+ MovieLens
1502
+ Yelp
1503
+ Amazon
1504
+ Gowalla
1505
+ Pinterest
1506
+ Netflix
1507
+ N@50
1508
+ N@100
1509
+ N@50
1510
+ N@100
1511
+ N@50
1512
+ N@100
1513
+ N@50
1514
+ N@100
1515
+ N@50
1516
+ N@100
1517
+ N@50
1518
+ N@100
1519
+ DCF
1520
+ 0.0641
1521
+ 0.0785
1522
+ 0.0097
1523
+ 0.0137
1524
+ 0.0113
1525
+ 0.0173
1526
+ 0.2066
1527
+ 0.2599
1528
+ 0.0756
1529
+ 0.1109
1530
+ 0.0862
1531
+ 0.1014
1532
+ DFM
1533
+ 0.0767
1534
+ 0.0937
1535
+ 0.0105
1536
+ 0.0165
1537
+ 0.0131
1538
+ 0.0187
1539
+ 0.2616
1540
+ 0.3041
1541
+ 0.0912
1542
+ 0.1242
1543
+ 0.1019
1544
+ 0.1294
1545
+ DHN
1546
+ 0.1038
1547
+ 0.1251
1548
+ 0.0149
1549
+ 0.0226
1550
+ 0.0176
1551
+ 0.0264
1552
+ 0.3440
1553
+ 0.4080
1554
+ 0.1212
1555
+ 0.1710
1556
+ 0.1373
1557
+ 0.1660
1558
+ Hash ste
1559
+ 0.1305
1560
+ 0.1608
1561
+ 0.0225
1562
+ 0.0322
1563
+ 0.0263
1564
+ 0.0354
1565
+ 0.4692
1566
+ 0.5114
1567
+ 0.1248
1568
+ 0.1748
1569
+ 0.1515
1570
+ 0.1817
1571
+ HashNet
1572
+ 0.1940
1573
+ 0.2233
1574
+ 0.0232
1575
+ 0.0335
1576
+ 0.0281
1577
+ 0.0378
1578
+ 0.4825
1579
+ 0.5245
1580
+ 0.1441
1581
+ 0.1877
1582
+ 0.1710
1583
+ 0.1900
1584
+ GCNH
1585
+ 0.1443
1586
+ 0.2283
1587
+ 0.0294
1588
+ 0.0450
1589
+ 0.0319
1590
+ 0.0408
1591
+ 0.4957
1592
+ 0.5490
1593
+ 0.1616
1594
+ 0.2105
1595
+ 0.1723
1596
+ 0.2049
1597
+ DGCN-BinCF
1598
+ 0.2298
1599
+ 0.2688
1600
+ 0.0268
1601
+ 0.0345
1602
+ 0.0302
1603
+ 0.0390
1604
+ 0.4646
1605
+ 0.5234
1606
+ 0.1436
1607
+ 0.2072
1608
+ 0.2230
1609
+ 0.2745
1610
+ HashGNN
1611
+ 0.2335
1612
+ 0.2630
1613
+ 0.0308
1614
+ 0.0430
1615
+ 0.0273
1616
+ 0.0374
1617
+ 0.5155
1618
+ 0.5512
1619
+ 0.1693
1620
+ 0.2198
1621
+ 0.3056
1622
+ 0.3502
1623
+ HS-GCN
1624
+ 0.3081
1625
+ 0.3376
1626
+ 0.0336
1627
+ 0.0483
1628
+ 0.0436
1629
+ 0.0585
1630
+ 0.5351
1631
+ 0.5696
1632
+ 0.1786
1633
+ 0.2325
1634
+ 0.3883
1635
+ 0.4501
1636
+ MF
1637
+ 0.2023
1638
+ 0.2216
1639
+ 0.0240
1640
+ 0.0312
1641
+ 0.0303
1642
+ 0.0392
1643
+ 0.4977
1644
+ 0.5221
1645
+ 0.1029
1646
+ 0.1514
1647
+ 0.2469
1648
+ 0.2883
1649
+ BiNE
1650
+ 0.1370
1651
+ 0.1765
1652
+ 0.0231
1653
+ 0.0320
1654
+ 0.0278
1655
+ 0.0370
1656
+ 0.5104
1657
+ 0.5346
1658
+ 0.1169
1659
+ 0.1858
1660
+ 0.2584
1661
+ 0.2999
1662
+ PinSage
1663
+ 0.2316
1664
+ 0.2517
1665
+ 0.0380
1666
+ 0.0496
1667
+ 0.0337
1668
+ 0.0438
1669
+ 0.5136
1670
+ 0.5447
1671
+ 0.1536
1672
+ 0.2063
1673
+ 0.2923
1674
+ 0.3261
1675
+ GraphSage
1676
+ 0.3195
1677
+ 0.3490
1678
+ 0.0434
1679
+ 0.0570
1680
+ 0.0349
1681
+ 0.0457
1682
+ 0.5368
1683
+ 0.5581
1684
+ 0.1643
1685
+ 0.2124
1686
+ 0.3703
1687
+ 0.4114
1688
+ % Improv.
1689
+ 31.95%
1690
+ 28.37%
1691
+ 9.09%
1692
+ 12.33%
1693
+ 59.71%
1694
+ 56.42%
1695
+ 3.80%
1696
+ 3.34%
1697
+ 5.49%
1698
+ 5.78%
1699
+ 27.1%
1700
+ 28.5%
1701
+ p-value
1702
+ 3.28e-3
1703
+ 2.87e-3
1704
+ 1.41e-2
1705
+ 8.47e-4
1706
+ 3.51e-4
1707
+ 1.44e-4
1708
+ 2.21e-3
1709
+ 4.09e-4
1710
+ 4.11e-3
1711
+ 1.69e-3
1712
+ 4.15e-3
1713
+ 3.72e-3
1714
+ Hamming similarity more accurately. However, none of
1715
+ these methods explicitly models the high-order Hamming
1716
+ similarity in the hash code learning process, which leads
1717
+ to suboptimal results.
1718
+ • GNN-based hashing methods significantly outperform
1719
+ the hashing methods based on deep learning. It makes
1720
+ sense since GNN improves the quality of user and item
1721
+ continuous representations prior to the binarization step,
1722
+ which indirectly enriches the final hash codes. Within
1723
+ GNN-based methods, HashGNN is superior since it is
1724
+ a real sense of end-to-end hash learning method, due
1725
+ to its ability of solving the back-propagation issue of
1726
+ sign function by gradient copy. In contrast, DGCN-BinCF
1727
+ and GCNH both use sign function as an extra step for
1728
+ binarization, inevitably resulting in quantization loss.
1729
+ • It is clear that HS-GCN yields the best performance
1730
+ among hashing methods. In particular, the average im-
1731
+ provements of HS-GCN over the strongest hashing base-
1732
+ line HashGNN w.r.t. HR@K are 26.17%, 12.64%, 44.46%,
1733
+ 3.68%, 4.74%, and 7.14%, and w.r.t. NDCG@K are 30.16%,
1734
+ 10.71%, 58.07%, 3.57%, 5.64%, and 27.8% in MovieLens,
1735
+ Yelp, Amazon, Gowalla, Pinterest, and Netflix, respec-
1736
+ tively. The reason is that HS-GCN is capable of capturing
1737
+ the high-order similarity of hash codes by directly con-
1738
+ structing GCN in the Hamming space, while HashGNN
1739
+ only uses the first-order similarity to guide the hash
1740
+ learning. Additionally, we conducted the cross validation
1741
+ t-test, and p-value < 0.05 indicates that the improvements
1742
+ of HS-GCN over the strongest hashing baseline are statis-
1743
+ tically significant.
1744
+ • HS-GCN significantly outperforms the embedding based
1745
+ baselines MF and BiNE. Moreover, compared with the
1746
+ graph embedding models GraphSage and PinSage, our
1747
+ model yields comparable performance. GraphSage per-
1748
+ forms better than most hash-based methods, since it uti-
1749
+ lizes GCN to learn real-valued embeddings for users and
1750
+ items, which have better representative ability than binary
1751
+ codes. It is worth mentioning that our performance on
1752
+
1753
+ IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING
1754
+ 10
1755
+ Amazon is superior than the best graph embedding model
1756
+ GraphSage. This also verifies the importance of capturing
1757
+ the high-order similarity for hash learning.
1758
+ 6.1.2
1759
+ Efficiency Comparison
1760
+ In this section, we analyzed the efficiency of HS-GCN
1761
+ compared with baselines. In particular, we focused on both
1762
+ the training and the testing efficiency of these models, and
1763
+ recorded their running time. For fair comparison, all the
1764
+ models are trained on Ubuntu 16.04.5 with NVIDIA TITAN
1765
+ Xp, 12GB frame buffer and Python3.7 until the convergence,
1766
+ and tested on Windows 10 with Intel Core i7, 16GB RAM
1767
+ and Python3.7. During the training process, the hyper-
1768
+ parameters (e.g., the training epoch, the batch size, and
1769
+ the learning rate) of all models follow the optimal settings.
1770
+ Though we adopted linear scan as the testing technique to
1771
+ recommend items for all methods, it is worth mentioning
1772
+ some techniques like multi-level indexing [66] can further
1773
+ accelerate the testing of hashing methods. Table 3 summa-
1774
+ rizes the results on different-scale Amazon dataset, where
1775
+ “1/8Amazon” is constructed by randomly selecting one in
1776
+ eight interactions from the complete dataset, and the rest
1777
+ can be done in the same manner. There are similar efficiency
1778
+ comparisons on other datasets, and thus we omitted them
1779
+ for space saving. Regarding the experiments, we found that:
1780
+ • Our model costs much less training time than other
1781
+ methods. Compared to MF, HS-GCN and other graph-
1782
+ based models are more efficient in training since they
1783
+ quickly converge in experiments. This is reasonable since
1784
+ indirectly connected users and items are involved through
1785
+ the graph structure when optimizing the interaction pairs
1786
+ in mini-batch. Compared to other graph-based models,
1787
+ HS-GCN performs more efficiently during the training
1788
+ process, since it has the most concise model size that
1789
+ is the same as MF. Specifically, HS-GCN introduces no
1790
+ additional parameters except for the initial real-valued
1791
+ matrix E, while other models introduce the trainable
1792
+ weight matrix as transfer parameters in each propagation
1793
+ layer.
1794
+ • Similar with most hashing models, HS-GCN achieves
1795
+ significant speedup compared with continuous recom-
1796
+ mendation models regarding the testing time. By jointly
1797
+ analyzing Table 2 and Table 3, we can see that HS-GCN
1798
+ not only can achieve competitive performance compared
1799
+ to state-of-the-art continuous models, but also is time-
1800
+ efficient. This verifies that HS-GCN is an operable solution
1801
+ for large-scale Web services to substantially reduce the
1802
+ computation cost of their recommendation systems [67].
1803
+ • Across the different-scale datasets, the training efficiency
1804
+ ratio of HS-GCN is stable around 2.4 times based on
1805
+ HashGNN, and the testing efficiency ratio is stable around
1806
+ 4.9 times based on GraphSage. From Table 3, we can
1807
+ observe that both training and testing efficiency ratios of
1808
+ our method show upward trends with the scale of the
1809
+ dataset gradually increasing.
1810
+ 6.1.3
1811
+ Performance Comparison w.r.t. Interaction Sparsity
1812
+ Levels
1813
+ The sparsity issue usually limits the expressiveness of
1814
+ recommender systems, since inactive users lack sufficient
1815
+ TABLE 3
1816
+ Training/Testing time on different-scale Amazon dataset with 64 bits.
1817
+ The results are reported in hours and seconds, respectively.
1818
+ Training/Testing efficiency ratio is computed between HS-GCN and
1819
+ HashGNN/GraphSage, which is the best graph-based
1820
+ hashing/embedding baseline.
1821
+ Methods
1822
+ 1/8Amazon
1823
+ 1/4Amazon
1824
+ 1/2Amazon
1825
+ Amazon
1826
+ Train
1827
+ Test
1828
+ Train
1829
+ Test
1830
+ Train
1831
+ Test
1832
+ Train
1833
+ Test
1834
+ HS-GCN
1835
+ 1.3
1836
+ 3.0
1837
+ 2.4
1838
+ 6.1
1839
+ 4.6
1840
+ 13.3
1841
+ 9.1
1842
+ 24.8
1843
+ DHN
1844
+ 1.4
1845
+ 3.0
1846
+ 2.7
1847
+ 6.1
1848
+ 5.4
1849
+ 13.2
1850
+ 11.2
1851
+ 24.9
1852
+ Hash ste
1853
+ 1.5
1854
+ 3.0
1855
+ 3.0
1856
+ 6.0
1857
+ 6.1
1858
+ 13.3
1859
+ 12.6
1860
+ 24.7
1861
+ HashNet
1862
+ 2.1
1863
+ 3.0
1864
+ 4.3
1865
+ 6.2
1866
+ 9.0
1867
+ 13.1
1868
+ 18.3
1869
+ 24.8
1870
+ GCNH
1871
+ 1.9
1872
+ 3.1
1873
+ 3.6
1874
+ 6.1
1875
+ 7.2
1876
+ 13.3
1877
+ 14.8
1878
+ 25.0
1879
+ DGCN-BinCF
1880
+ 1.6
1881
+ 3.1
1882
+ 3.2
1883
+ 6.1
1884
+ 6.2
1885
+ 13.3
1886
+ 12.6
1887
+ 24.8
1888
+ HashGNN
1889
+ 2.7
1890
+ 3.0
1891
+ 5.6
1892
+ 6.1
1893
+ 11.1
1894
+ 13.2
1895
+ 23.3
1896
+ 24.9
1897
+ MF
1898
+ 2.3
1899
+ 14.1
1900
+ 4.3
1901
+ 30.5
1902
+ 9.1
1903
+ 66.2
1904
+ 18.9
1905
+ 127.3
1906
+ BiNE
1907
+ 1.4
1908
+ 14.2
1909
+ 2.6
1910
+ 30.2
1911
+ 5.4
1912
+ 66.2
1913
+ 10.9
1914
+ 127.0
1915
+ PinSage
1916
+ 1.6
1917
+ 14.1
1918
+ 3.2
1919
+ 30.4
1920
+ 6.5
1921
+ 66.0
1922
+ 13.1
1923
+ 127.2
1924
+ GraphSage
1925
+ 1.5
1926
+ 14.1
1927
+ 2.9
1928
+ 30.1
1929
+ 6.0
1930
+ 65.9
1931
+ 12.1
1932
+ 127.0
1933
+ Efficiency Ratio
1934
+ 2.1
1935
+ 4.7
1936
+ 2.3
1937
+ 4.9
1938
+ 2.4
1939
+ 5.0
1940
+ 2.6
1941
+ 5.1
1942
+ interactions to generate high-quality representations. This
1943
+ especially impedes the learning to hash methods only based
1944
+ on the first-order Hamming similarity. In this section, we
1945
+ attempted to answer whether exploring the high-order
1946
+ Hamming similarity is useful to alleviate this issue.
1947
+ Towards this end, we first divided users into different
1948
+ sparsity-level groups. In particular, according to the inter-
1949
+ action number per user in the training set, we divided the
1950
+ testing set into four groups, each of which has the same
1951
+ interaction sum. Taking Yelp dataset as an example, the
1952
+ interaction numbers per user are less than 23, 42, 89, and
1953
+ 1,713, respectively. Figure 3 shows the experiment results
1954
+ w.r.t. NDCG@50 on different user groups in MovieLens,
1955
+ Yelp, and Amazon. There is a similar performance trend
1956
+ w.r.t. HR@50, and thus we omitted this part for space saving.
1957
+ Regarding the results, we found that:
1958
+ • HS-GCN consistently outperforms all other hashing base-
1959
+ lines on all user groups. This demonstrates that exploiting
1960
+ the high-order Hamming similarity can improve the hash
1961
+ code learning for both active and inactive users.
1962
+ • After analyzing Figures 3, we observed that HS-GCN
1963
+ achieves larger improvements in the first two groups (e.g.,
1964
+ 9.31% and 6.88% over the best baseline separately for
1965
+ < 23 and < 42 in Yelp) than that of the others (e.g., 0.52%
1966
+ for <1,713 Yelp group). It verifies that capturing the high-
1967
+ order Hamming similarity is especially beneficial to the
1968
+ inactive users, since their hash codes are learned from
1969
+ more sufficient similar information besides first-order
1970
+ similarities. Hence, exploiting the high-order similarity
1971
+ is promising to solve the sparsity issue in hashing-based
1972
+ recommender systems.
1973
+ 6.2
1974
+ Ablation Experiments
1975
+ In this section, we studied the effect of key components in
1976
+ our proposed model, including propagation layers, ranking
1977
+ loss, and dropout. As the hash code propagation layer plays
1978
+ an important role in our model, we started by investigating
1979
+ the influence of layer numbers on the performance. Then
1980
+
1981
+ IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING
1982
+ 11
1983
+ � � � �
1984
+ � � � �
1985
+ � � � �
1986
+ � � � � �
1987
+
1988
+
1989
+ � �
1990
+ � �
1991
+ � �
1992
+ � �
1993
+ � � � � � � � � �
1994
+ � � � � � � � � � �
1995
+ � � �
1996
+ � � �
1997
+ � � �
1998
+ � � �
1999
+ � � �
2000
+ � � �
2001
+
2002
+ �� � � � � �
2003
+
2004
+ �� � � � � � �
2005
+
2006
+ �� � � � � � �� � �
2007
+
2008
+ �� � � �
2009
+
2010
+ �� � � � � � �
2011
+
2012
+ �� � � � � � � �
2013
+
2014
+ �� � �
2015
+ � � � � � � �
2016
+ (a) MovieLens
2017
+ � � �
2018
+ � � �
2019
+ � � �
2020
+ � � � � �
2021
+
2022
+
2023
+ � �
2024
+ � �
2025
+ � �
2026
+ � � � � � � � � �
2027
+ � � � � � � � � � �
2028
+ � � � �
2029
+ � � � �
2030
+ � � � �
2031
+ � � � �
2032
+ � � � �
2033
+ � � � �
2034
+
2035
+ �� � � � � �
2036
+
2037
+ �� � � � � � �
2038
+
2039
+ �� � � � � � �� � �
2040
+
2041
+ �� � � �
2042
+
2043
+ �� � � � � � �
2044
+
2045
+ �� � � � � � � �
2046
+
2047
+ �� � �
2048
+ � � � � � � �
2049
+ (b) Yelp
2050
+ � � �
2051
+ � � �
2052
+ � � � �
2053
+ � � � � �
2054
+
2055
+
2056
+ � �
2057
+ � �
2058
+ � �
2059
+ � � � � � � � � �
2060
+ � � � � � � � � � �
2061
+ � � � �
2062
+ � � � �
2063
+ � � � �
2064
+ � � � �
2065
+ � � � �
2066
+ � � � �
2067
+ � � � �
2068
+
2069
+ �� � � � � �
2070
+
2071
+ �� � � � � � �
2072
+
2073
+ �� � � � � � �� � �
2074
+
2075
+ �� � � �
2076
+
2077
+ �� � � � � � �
2078
+
2079
+ �� � � � � � � �
2080
+
2081
+ �� � �
2082
+ � � � � � � �
2083
+ (c) Amazon
2084
+ Fig. 3. Performance comparison over the sparsity distribution of user groups on three different datasets. Wherein, the background histograms
2085
+ indicate the number of users involved in each group, and the lines demonstrate the performance w.r.t. NDCG@50.
2086
+ TABLE 4
2087
+ Effect of hash codes propagation layer numbers (L).
2088
+ Methods
2089
+ MovieLens
2090
+ Yelp
2091
+ Amazon
2092
+ HR@50
2093
+ N@50
2094
+ HR@50
2095
+ N@50
2096
+ HR@50
2097
+ N@50
2098
+ HS-GCN-1
2099
+ 0.1822
2100
+ 0.2774
2101
+ 0.0452
2102
+ 0.0316
2103
+ 0.0407
2104
+ 0.0340
2105
+ HS-GCN-2
2106
+ 0.2052
2107
+ 0.3081
2108
+ 0.0497
2109
+ 0.0336
2110
+ 0.0523
2111
+ 0.0436
2112
+ HS-GCN-3
2113
+ 0.1840
2114
+ 0.2798
2115
+ 0.0482
2116
+ 0.0329
2117
+ 0.0500
2118
+ 0.0421
2119
+ we analyzed the ranking reinforced loss in the model opti-
2120
+ mization. Moreover, we jointly analyzed the affects of node
2121
+ dropout and bit dropout ratios.
2122
+ 6.2.1
2123
+ Effect of Layer Numbers
2124
+ To investigate the optimal number of hash code propagation
2125
+ layers, we varied the model depth. Particularly, we searched
2126
+ the layer numbers within {1, 2, 3}. Table 4 summarizes the
2127
+ experimental results, where HS-GCN-2 denotes the model
2128
+ with two propagation layers, and similar notations for the
2129
+ others. Jointly analyzing Table 2 and Table 4, we have the
2130
+ following observations:
2131
+ • Obviously, HS-GCN-2 and HS-GCN-3 consistently out-
2132
+ perform HS-GCN-1 across all datasets. The reason is
2133
+ that HS-GCN-1 only considers the first-order Hamming
2134
+ similarity, while HS-GCN-2 and HS-GCN-3 both utilize
2135
+ the high-order Hamming similarity.
2136
+ • HS-GCN-2 achieves the best performance. When further
2137
+ stacking the propagation layer, we found that HS-GCN-
2138
+ 3 leads to overfitting on all the datasets. The optimal
2139
+ layer number of our model is consistent with the prior
2140
+ HashGNN [18]. Therefore, the second-order similarity is
2141
+ sufficient for hash learning.
2142
+ • When varying the number of propagation layers, HS-
2143
+ GCN is consistently superior to the learning to hash
2144
+ baselines across three datasets. This verifies that directly
2145
+ capturing the high-order Hamming similarity can facili-
2146
+ tate the quality of hash codes.
2147
+ 6.2.2
2148
+ Effect of the Ranking Loss
2149
+ For capturing the relative item ranking in hash learning, we
2150
+ introduced the ranking reinforced loss in model optimiza-
2151
+ tion. During the experiments, we found that the ranking loss
2152
+ can contribute to both the initial layer and the prediction
2153
+ layer, where the ranking losses are computed by the initial
2154
+ state {hu, hi, hj} and the final hash codes {h∗
2155
+ u, h∗
2156
+ i , h∗
2157
+ j},
2158
+ respectively. To study the influence of these two types of
2159
+ TABLE 5
2160
+ Performance comparison of the models with and without different
2161
+ losses.
2162
+ Methods
2163
+ MovieLens
2164
+ Yelp
2165
+ Amazon
2166
+ HR@50 N@50 HR@50 N@50 HR@50 N@50
2167
+ HS-GCN
2168
+ 0.2052
2169
+ 0.3081
2170
+ 0.0497
2171
+ 0.0336
2172
+ 0.0523
2173
+ 0.0436
2174
+ W/o Initial Rank
2175
+ 0.1773
2176
+ 0.2747
2177
+ 0.0468
2178
+ 0.0313
2179
+ 0.0509
2180
+ 0.0428
2181
+ W/o Final Rank
2182
+ 0.1769
2183
+ 0.2566
2184
+ 0.0418
2185
+ 0.0281
2186
+ 0.0460
2187
+ 0.0385
2188
+ W/o CR-Entropy
2189
+ 0.1564
2190
+ 0.2426
2191
+ 0.0156
2192
+ 0.0100
2193
+ 0.0289
2194
+ 0.0239
2195
+ ranking losses, we conducted ablation study to validate how
2196
+ each of them contributes to the overall performance of our
2197
+ model.
2198
+ Table 5 records the results of the ablation study on
2199
+ three datasets, where HS-GCN is our intact model with two
2200
+ types of ranking losses, which are computed upon triplets
2201
+ of the initial state {hu, hi, hj} and the final hash codes
2202
+ {h∗
2203
+ u, h∗
2204
+ i , h∗
2205
+ j}, respectively. W/o Initial Rank denotes the
2206
+ ablation variant of HS-GCN via removing the ranking loss
2207
+ on the triplets of initial hash codes, while W/o Final Rank
2208
+ is the variant via removing the ranking loss on the final
2209
+ hash codes. From the table, we can observe that HS-GCN
2210
+ performs worse when ignoring the ranking loss for pre-
2211
+ diction. This demonstrates the capacity of ranking loss for
2212
+ more effective hashing. Moreover, we found that the ranking
2213
+ loss can improve the model performance more significantly
2214
+ when acting on the initial layer, since it injects the order
2215
+ information into the initial state. This also demonstrates that
2216
+ initialization enhances the quality of final hash codes, which
2217
+ is consistent with the findings of prior efforts [6], [11].
2218
+ Following the operations in HashGNN [18], we intro-
2219
+ duce the cross-entropy loss to supervise the interactions
2220
+ between users and items they consumed before. We suggest
2221
+ that the cross-entropy loss maximization provides the signal
2222
+ to preserve the bipartite graph structure, which is the base of
2223
+ graph neural networks. Since this is not originally presented
2224
+ by us, we did not claim this design in our paper. To evaluate
2225
+ the effectiveness of each design, we do ablation study on
2226
+ the several datasets. In particular, we removed the binary
2227
+ cross-entropy loss from the final loss function, denoted as
2228
+ W/o CR-Entropy in Table 5, and observed that the variant
2229
+ is suboptimal compared with the intact one. The possible
2230
+ reason is that the binary cross-entropy loss is capable of
2231
+ supervising the hash codes to reconstruct the interactions
2232
+ between users and items, and thus optimizes their hash
2233
+ coding.
2234
+
2235
+ IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING
2236
+ 12
2237
+ � ��
2238
+ � ��
2239
+ � ��
2240
+ � ��
2241
+ � �� �
2242
+ � �� �
2243
+ � �� �
2244
+ � �� �
2245
+ � �� �
2246
+ � � � � �
2247
+ � � � � � � � � � � � � �
2248
+ � � � � � � � � � � � � �
2249
+ � � � � � � � � � � � �
2250
+ (a) MovieLens
2251
+ � ��
2252
+ � ��
2253
+ � ��
2254
+ � ��
2255
+ � �� � �
2256
+ � �� � �
2257
+ � �� � �
2258
+ � �� � �
2259
+ � �� � �
2260
+ � � � � �
2261
+ � � � � � � � � � � � � �
2262
+ � � � � � � � � � � � � �
2263
+ � � � � � � � � � � � �
2264
+ (b) Yelp
2265
+ � ��
2266
+ � ��
2267
+ � ��
2268
+ � ��
2269
+ � �� � �
2270
+ � �� � �
2271
+ � �� � �
2272
+ � �� � �
2273
+ � �� � �
2274
+ � � � � �
2275
+ � � � � � � � � � � � � �
2276
+ � � � � � � � � � � � � �
2277
+ � � � � � � � � � � � �
2278
+ (c) Amazon
2279
+ Fig. 4. Effect of node dropout and bit dropout ratios.
2280
+
2281
+ � �
2282
+ � �
2283
+ � �
2284
+ � � � �
2285
+ � � � �
2286
+ � � � �
2287
+ � � � �
2288
+ � � � � �
2289
+
2290
+
2291
+ �� � � � � �
2292
+
2293
+ �� � � � � � �
2294
+
2295
+ �� � � � � � �� � �
2296
+
2297
+ �� � � �
2298
+
2299
+ �� � � � � � �
2300
+
2301
+ �� � � � � � � �
2302
+
2303
+ �� � �
2304
+ (a) MovieLens
2305
+
2306
+ � �
2307
+ � �
2308
+ � �
2309
+ � � �
2310
+ � � �
2311
+ � � �
2312
+ � � �
2313
+ � � � � �
2314
+
2315
+
2316
+ �� � � � � �
2317
+
2318
+ �� � � � � � �
2319
+
2320
+ �� � � � � � �� � �
2321
+
2322
+ �� � � �
2323
+
2324
+ �� � � � � � �
2325
+
2326
+ �� � � � � � � �
2327
+
2328
+ �� � �
2329
+ (b) Gowalla
2330
+ Fig. 5. Effect of the length of hash codes.
2331
+ 6.2.3
2332
+ Effect of Dropout
2333
+ Although GCNs have strong representation ability, they
2334
+ usually suffer from the overfitting problem. Dropout is an
2335
+ effective solution to prevent models from overfitting [68].
2336
+ Following the prior GCN-based researches and consid-
2337
+ ering our model architecture, we attempted to employ
2338
+ two dropout techniques: node dropout and bit dropout
2339
+ to improve the performance of HS-GCN. Node dropout
2340
+ randomly discards particular neighbor nodes during the
2341
+ aggregation of hash codes. For the l-th propagation layer,
2342
+ we randomly dropped p1 ×(N +M) nodes of the adjacency
2343
+ matrix, where p1 is the dropout ratio. We also conducted bit
2344
+ dropout that randomly drops a few bits of the final user and
2345
+ item hash codes before the prediction, with a probability p2.
2346
+ Note that dropout is only used during the training
2347
+ process, and should be disabled in the testing process.
2348
+ Figure 4 plots the effect of node dropout ratio p1 and
2349
+ bit dropout ratio p2 under HR@50 evaluation metric on
2350
+ different datasets. Regarding the two dropout strategies,
2351
+ bit dropout delivers much better performance especially on
2352
+ sparse datasets. Node dropout even has a negative effect on
2353
+ Yelp dataset. One reason might be that dropping neighbor
2354
+ nodes damages the hash code aggregation operation in
2355
+ the propagation process of HS-GCN, especially when the
2356
+ neighbor nodes are sparse. Bit dropout is more effective,
2357
+ which means that it can be an effective strategy to address
2358
+ the overfitting of learning to hash on GCNs.
2359
+ 6.2.4
2360
+ Effect of the Length of Hash Codes
2361
+ In order to explore how the length of hash code affects HS-
2362
+ GCN and other baselines, we changed the length of their
2363
+ hash codes within {8, 16, 32, 64}, and repeated the experi-
2364
+ ments. Figure 5 shows the performance of these models with
2365
+ different length K on MovieLens and Gowalla datasets.
2366
+ It can be observed that the hash code length has positive
2367
+ influence on hashing models, while the influence weakens
2368
+ as length K increases. Similar trends are observed on other
2369
+ datasets.
2370
+ 7
2371
+ CONCLUSION AND FUTURE WORK
2372
+ In this work, we explicitly incorporate the high-order Ham-
2373
+ ming similarity into the hash code learning. Particularly, we
2374
+ devise a novel framework HS-GCN, which yields binary
2375
+ hash codes by propagating the similarity information on
2376
+ the user-item graph structure. HS-GCN is the first proposed
2377
+ graph convolutional network in the Hamming space, where
2378
+ the propagation layers are built upon Hamming space op-
2379
+ erations to directly capture the high-order Hamming sim-
2380
+ ilarity. Extensive experiments on three real-world datasets
2381
+ demonstrate the rationality and effectiveness of capturing
2382
+ the high-order similarity for learning to hash.
2383
+ In future, we plan to strengthen HS-GCN by incor-
2384
+ porating multi-form knowledge [69], like attributes in ta-
2385
+ bles [70], and celebrities in matrices [71], [72]. Moreover,
2386
+ we are interested in building recommender systems for
2387
+ micro videos [73]. Considering the micro videos constantly
2388
+ emerge in large numbers, they thus require more efficient
2389
+ and accurate recommendation. Another emerging research
2390
+ direction is to explore the interpretable hashing-based rec-
2391
+ ommendation [74].
2392
+ ACKNOWLEDGMENTS
2393
+ This work is supported by the National Natural Science
2394
+ Foundation of China, No.:U1936203; the Key R&D Program
2395
+ of Shandong (Major scientific and technological innovation
2396
+ projects), No.:2020CXGC010111; and Beijing Academy of
2397
+ Artificial Intelligence(BAAI).
2398
+ REFERENCES
2399
+ [1]
2400
+ S. Rendle, C. Freudenthaler, Z. Gantner, and L. Schmidt-Thieme,
2401
+ “Bpr: Bayesian personalized ranking from implicit feedback,” in
2402
+ UAI, 2012, pp. 452–461.
2403
+ [2]
2404
+ X. Wang, X. He, M. Wang, F. Feng, and T.-S. Chua, “Neural graph
2405
+ collaborative filtering,” in SIGIR, 2019, pp. 165–174.
2406
+ [3]
2407
+ Y. Wei, X. Wang, L. Nie, X. He, R. Hong, and T.-S. Chua, “Mmgcn:
2408
+ Multi-modal graph convolution network for personalized recom-
2409
+ mendation of micro-video,” in MM, 2019, pp. 1437–1445.
2410
+ [4]
2411
+ Z. Li, J. Tang, and T. Mei, “Deep collaborative embedding for social
2412
+ image understanding,” TPAMI, vol. 41, no. 9, pp. 2070–2083, 2018.
2413
+ [5]
2414
+ H. Liu, X. He, F. Feng, L. Nie, R. Liu, and H. Zhang, “Discrete
2415
+ factorization machines for fast feature-based recommendation,” in
2416
+ IJCAI, 2018, pp. 3449–3455.
2417
+ [6]
2418
+ H. Zhang, F. Shen, W. Liu, X. He, H. Luan, and T.-S. Chua,
2419
+ “Discrete collaborative filtering,” in SIGIR, 2016, pp. 325–334.
2420
+ [7]
2421
+ Y. Zhang, H. Wang, D. Lian, I. W. Tsang, H. Yin, and G. Yang, “Dis-
2422
+ crete ranking-based matrix factorization with self-paced learning,”
2423
+ in KDD, 2018, pp. 2758–2767.
2424
+ [8]
2425
+ J. Wang, S. Kumar, and S.-F. Chang, “Semi-supervised hashing for
2426
+ large-scale search,” TPAMI, vol. 34, no. 12, pp. 2393–2406, 2012.
2427
+ [9]
2428
+ Y. Weiss, A. Torralba, and R. Fergus, “Spectral hashing,” in NIPS,
2429
+ 2009, pp. 1753–1760.
2430
+ [10] W.-C. Kang and J. McAuley, “Candidate generation with binary
2431
+ codes for large-scale top-n recommendation,” in CIKM, 2019, pp.
2432
+ 1523–1532.
2433
+ [11] D. Lian, R. Liu, Y. Ge, K. Zheng, X. Xie, and L. Cao, “Discrete
2434
+ content-aware matrix factorization,” in KDD, 2017, pp. 325–334.
2435
+ [12] T. Chen, H. Yin, Y. Zheng, Z. Huang, Y. Wang, and M. Wang,
2436
+ “Learning elastic embeddings for customizing on-device recom-
2437
+ menders,” in KDD, 2021, pp. 138–147.
2438
+ [13] Q. Wang, H. Yin, T. Chen, Z. Huang, H. Wang, Y. Zhao, and N. Q.
2439
+ Viet Hung, “Next point-of-interest recommendation on resource-
2440
+ constrained mobile devices,” in WWW, 2020, pp. 906–916.
2441
+
2442
+ IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING
2443
+ 13
2444
+ [14] Y. Zhang, H. Yin, Z. Huang, X. Du, G. Yang, and D. Lian, “Discrete
2445
+ deep learning for fast content-aware recommendation,” in WSDM,
2446
+ 2018, pp. 717–726.
2447
+ [15] H. Zhu, M. Long, J. Wang, and Y. Cao, “Deep hashing network for
2448
+ efficient similarity retrieval,” in AAAI, 2016, pp. 2415–2421.
2449
+ [16] H. Liu, R. Wang, S. Shan, and X. Chen, “Deep supervised hashing
2450
+ for fast image retrieval,” in CVPR, 2016, pp. 2064–2072.
2451
+ [17] Z. Cao, M. Long, J. Wang, and P. S. Yu, “Hashnet: Deep learning
2452
+ to hash by continuation,” in ICCV, 2017, pp. 5608–5617.
2453
+ [18] Q. Tan, N. Liu, X. Zhao, H. Yang, J. Zhou, and X. Hu, “Learning to
2454
+ hash with graph neural networks for recommender systems,” in
2455
+ WWW, 2020, pp. 1988–1998.
2456
+ [19] M. Gori, A. Pucci, V. Roma, and I. Siena, “Itemrank: A random-
2457
+ walk based scoring algorithm for recommender engines,” in IJCAI,
2458
+ 2007, pp. 2766–2771.
2459
+ [20] X. He, M. Gao, M.-Y. Kan, and D. Wang, “Birank: Towards ranking
2460
+ on bipartite graphs,” TKDE, vol. 29, no. 1, pp. 57–71, 2016.
2461
+ [21] Y. Wei, X. Wang, X. He, L. Nie, Y. Rui, and T.-S. Chua, “Hierarchi-
2462
+ cal user intent graph network for multimedia recommendation,”
2463
+ TMM, 2021.
2464
+ [22] Y. Wei, X. Wang, L. Nie, X. He, and T.-S. Chua, “Graph-refined con-
2465
+ volutional network for multimedia recommendation with implicit
2466
+ feedback,” in MM, 2020, pp. 3541–3549.
2467
+ [23] F. Liu, Z. Cheng, L. Zhu, Z. Gao, and L. Nie, “Interest-aware
2468
+ message-passing GCN for recommendation,” in WWW, 2021, pp.
2469
+ 1296–1305.
2470
+ [24] Y. Wu, H. Liu, and Y. Yang, “Graph convolutional matrix comple-
2471
+ tion for bipartite edge prediction,” in IC3K, 2018, pp. 49–58.
2472
+ [25] R. Ying, R. He, K. Chen, P. Eksombatchai, W. L. Hamilton, and
2473
+ J. Leskovec, “Graph convolutional neural networks for web-scale
2474
+ recommender systems,” in KDD, 2018, pp. 974–983.
2475
+ [26] X. He, K. Deng, X. Wang, Y. Li, Y. Zhang, and M. Wang, “Lightgcn:
2476
+ simplifying and powering graph convolution network for recom-
2477
+ mendation,” in SIGIR, 2020, pp. 639–648.
2478
+ [27] C. Shi, B. Hu, W. X. Zhao, and S. Y. Philip, “Heterogeneous
2479
+ information network embedding for recommendation,” TKDE,
2480
+ vol. 31, no. 2, pp. 357–370, 2018.
2481
+ [28] B. Hu, C. Shi, W. X. Zhao, and P. S. Yu, “Leveraging meta-
2482
+ path based context for top-n recommendation with a neural co-
2483
+ attention model,” in KDD, 2018, pp. 1531–1540.
2484
+ [29] S. Fan, J. Zhu, X. Han, C. Shi, L. Hu, B. Ma, and Y. Li, “Metapath-
2485
+ guided heterogeneous graph neural network for intent recommen-
2486
+ dation,” in KDD, 2019, pp. 2478–2486.
2487
+ [30] Y. Yang, Z. Guan, J. Li, W. Zhao, J. Cui, and Q. Wang, “Interpretable
2488
+ and efficient heterogeneous graph convolutional network,” TKDE,
2489
+ 2021.
2490
+ [31] Z. Li, J. Tang, L. Zhang, and J. Yang, “Weakly-supervised semantic
2491
+ guided hashing for social image retrieval.” IJCV, vol. 128, no. 8/9,
2492
+ pp. 2265–2278, 2020.
2493
+ [32] H. Jegou, M. Douze, and C. Schmid, “Product quantization for
2494
+ nearest neighbor search,” TPAMI, vol. 33, no. 1, pp. 117–128, 2010.
2495
+ [33] W. Liu, J. Wang, S. Kumar, and S.-F. Chang, “Hashing with
2496
+ graphs,” in ICML, 2011, pp. 1–8.
2497
+ [34] B. Kulis and T. Darrell, “Learning to hash with binary reconstruc-
2498
+ tive embeddings,” in NIPS, 2009, pp. 1042–1050.
2499
+ [35] W. Liu, J. Wang, R. Ji, Y.-G. Jiang, and S.-F. Chang, “Supervised
2500
+ hashing with kernels,” in CVPR, 2012, pp. 2074–2081.
2501
+ [36] M. Norouzi and D. J. Fleet, “Minimal loss hashing for compact
2502
+ binary codes,” in ICML, 2011, pp. 353–360.
2503
+ [37] F. Shen, C. Shen, W. Liu, and H. Tao Shen, “Supervised discrete
2504
+ hashing,” in CVPR, 2015, pp. 37–45.
2505
+ [38] Y. Gong, S. Lazebnik, A. Gordo, and F. Perronnin, “Iterative
2506
+ quantization: A procrustean approach to learning binary codes for
2507
+ large-scale image retrieval,” TPAMI, vol. 35, no. 12, pp. 2916–2929,
2508
+ 2012.
2509
+ [39] X. He and T.-S. Chua, “Neural factorization machines for sparse
2510
+ predictive analytics,” in SIGIR, 2017, pp. 355–364.
2511
+ [40] R. Xia, Y. Pan, H. Lai, C. Liu, and S. Yan, “Supervised hashing for
2512
+ image retrieval via image representation learning,” in AAAI, 2014,
2513
+ pp. 2156–2162.
2514
+ [41] H. Lai, Y. Pan, Y. Liu, and S. Yan, “Simultaneous feature learning
2515
+ and hash coding with deep neural networks,” in CVPR, 2015, pp.
2516
+ 3270–3278.
2517
+ [42] H. Wang, D. Lian, and Y. Ge, “Binarized collaborative filter-
2518
+ ing with distilling graph convolutional networks,” arXiv preprint
2519
+ arXiv:1906.01829, 2019.
2520
+ [43] X. Zhou, F. Shen, L. Liu, W. Liu, L. Nie, Y. Yang, and H. T. Shen,
2521
+ “Graph convolutional network hashing,” TC, vol. 50, no. 4, pp.
2522
+ 1460–1472, 2018.
2523
+ [44] Y. Bengio, N. L´eonard, and A. Courville, “Estimating or propagat-
2524
+ ing gradients through stochastic neurons for conditional compu-
2525
+ tation,” arXiv preprint arXiv:1308.3432, 2013.
2526
+ [45] Y. Zhou, X. Bai, W. Liu, and L. J. Latecki, “Fusion with diffusion
2527
+ for robust visual tracking,” in NIPS, 2012, pp. 2978–2986.
2528
+ [46] F. Yang, R. Hinami, Y. Matsui, S. Ly, and S. Satoh, “Efficient
2529
+ image retrieval via decoupling diffusion into online and offline
2530
+ processing,” in AAAI, 2019, pp. 9087–9094.
2531
+ [47] B. Wang, A. M. Mezlini, F. Demir, M. Fiume, Z. Tu, M. Brudno,
2532
+ B. Haibe-Kains, and A. Goldenberg, “Similarity network fusion
2533
+ for aggregating data types on a genomic scale,” Nature Methods,
2534
+ vol. 11, no. 3, pp. 333–337, 2014.
2535
+ [48] H. Liu, R. Ji, Y. Wu, F. Huang, and B. Zhang, “Cross-modality
2536
+ binary code learning via fusion similarity hashing,” in CVPR, 2017,
2537
+ pp. 7380–7388.
2538
+ [49] S. Bai, Z. Zhou, J. Wang, X. Bai, L. Jan Latecki, and Q. Tian,
2539
+ “Ensemble diffusion for retrieval,” in ICCV, 2017, pp. 774–783.
2540
+ [50] Y. Wang, Y. Wang, J. Yang, and Z. Lin, “Dissecting the diffusion
2541
+ process in linear graph convolutional networks,” arXiv preprint
2542
+ arXiv:2102.10739, 2021.
2543
+ [51] B. Jiang, D. Lin, J. Tang, and B. Luo, “Data representation and
2544
+ learning with graph diffusion-embedding networks,” in CVPR,
2545
+ 2019, pp. 10 414–10 423.
2546
+ [52] Y. Feng, H. You, Z. Zhang, R. Ji, and Y. Gao, “Hypergraph neural
2547
+ networks,” in AAAI, 2019, pp. 3558–3565.
2548
+ [53] Y. Wei, X. Wang, Q. Li, L. Nie, Y. Li, X. Li, and T.-S. Chua,
2549
+ “Contrastive learning for cold-start recommendation,” in MM,
2550
+ 2021, pp. 5382–5390.
2551
+ [54] X. Yu, T. Gan, Y. Wei, Z. Cheng, and L. Nie, “Personalized item
2552
+ recommendation for second-hand trading platform,” in MM, 2020,
2553
+ pp. 3478–3486.
2554
+ [55] Z. Zhang, “Improved adam optimizer for deep neural networks,”
2555
+ in IWQoS, 2018, pp. 1–2.
2556
+ [56] X. He, H. Zhang, M.-Y. Kan, and T.-S. Chua, “Fast matrix factoriza-
2557
+ tion for online recommendation with implicit feedback,” in SIGIR,
2558
+ 2016, pp. 549–558.
2559
+ [57] X. Wang, X. He, L. Nie, and T.-S. Chua, “Item silk road: Rec-
2560
+ ommending items from information domains to social users,” in
2561
+ SIGIR, 2017, pp. 185–194.
2562
+ [58] D. Liang, L. Charlin, J. McInerney, and D. M. Blei, “Modeling user
2563
+ exposure in recommendation,” in WWW, 2016, pp. 951–961.
2564
+ [59] X. Geng, H. Zhang, J. Bian, and T.-S. Chua, “Learning image and
2565
+ user features for recommendation in social networks,” in ICCV,
2566
+ 2015, pp. 4274–4282.
2567
+ [60] X. He, L. Liao, H. Zhang, L. Nie, X. Hu, and T.-S. Chua, “Neural
2568
+ collaborative filtering,” in WWW, 2017, pp. 173–182.
2569
+ [61] X. Glorot and Y. Bengio, “Understanding the difficulty of training
2570
+ deep feedforward neural networks,” in AISTATS, 2010, pp. 249–
2571
+ 256.
2572
+ [62] A. Krizhevsky, I. Sutskever, and G. E. Hinton, “Imagenet classifi-
2573
+ cation with deep convolutional neural networks,” Communications
2574
+ of the ACM, vol. 60, no. 6, pp. 84–90, 2017.
2575
+ [63] A. Mnih and R. R. Salakhutdinov, “Probabilistic matrix factoriza-
2576
+ tion,” in NIPS, 2008, pp. 1257–1264.
2577
+ [64] M. Gao, L. Chen, X. He, and A. Zhou, “Bine: Bipartite network
2578
+ embedding,” in SIGIR, 2018, pp. 715–724.
2579
+ [65] W. Hamilton, Z. Ying, and J. Leskovec, “Inductive representation
2580
+ learning on large graphs,” in NIPS, 2017, pp. 1024–1034.
2581
+ [66] M. Norouzi, A. Punjani, and D. J. Fleet, “Fast search in hamming
2582
+ space with multi-index hashing,” in CVPR, 2012, pp. 3108–3115.
2583
+ [67] J. Liu, Z. Li, J. Tang, Y. Jiang, and H. Lu, “Personalized geo-specific
2584
+ tag recommendation for photos on social websites,” TMM, vol. 16,
2585
+ no. 3, pp. 588–600, 2014.
2586
+ [68] N. Srivastava, G. Hinton, A. Krizhevsky, I. Sutskever, and
2587
+ R. Salakhutdinov, “Dropout: a simple way to prevent neural
2588
+ networks from overfitting,” JMLR, vol. 15, no. 1, pp. 1929–1958,
2589
+ 2014.
2590
+ [69] F. Liu, Z. Cheng, C. Sun, Y. Wang, L. Nie, and M. S. Kankanhalli,
2591
+ “User diverse preference modeling by multimodal attentive metric
2592
+ learning,” in MM, 2019, pp. 1526–1534.
2593
+ [70] X. Wang, X. He, Y. Cao, M. Liu, and T.-S. Chua, “Kgat: Knowledge
2594
+ graph attention network for recommendation,” in KDD, 2019, pp.
2595
+ 950–958.
2596
+
2597
+ IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING
2598
+ 14
2599
+ [71] X. Song, F. Feng, X. Han, X. Yang, W. Liu, and L. Nie, “Neural
2600
+ compatibility modeling with attentive knowledge distillation,” in
2601
+ SIGIR, 2018, pp. 5–14.
2602
+ [72] C. Sun, X. Song, F. Feng, W. X. Zhao, H. Zhang, and L. Nie,
2603
+ “Supervised hierarchical cross-modal hashing,” in SIGIR, 2019, pp.
2604
+ 725–734.
2605
+ [73] Y. Wei, X. Wang, W. Guan, L. Nie, Z. Lin, and B. Chen, “Neural
2606
+ multimodal cooperative learning toward micro-video understand-
2607
+ ing,” TIP, vol. 29, pp. 1–14, 2019.
2608
+ [74] Y. Zhang, Y. Zhang, M. Zhang, and C. Shah, “Ears 2019: the
2609
+ 2nd international workshop on explainable recommendation and
2610
+ search,” in SIGIR, 2019, pp. 1438–1440.
2611
+