jackkuo commited on
Commit
489d644
·
verified ·
1 Parent(s): 5e07670

Add files using upload-large-folder tool

Browse files
This view is limited to 50 files because it contains too many changes.   See raw diff
Files changed (50) hide show
  1. .gitattributes +101 -0
  2. 0NFJT4oBgHgl3EQfjiwF/content/tmp_files/2301.11574v1.pdf.txt +1837 -0
  3. 0NFJT4oBgHgl3EQfjiwF/content/tmp_files/load_file.txt +0 -0
  4. 0dFQT4oBgHgl3EQfDjUj/vector_store/index.faiss +3 -0
  5. 0tE3T4oBgHgl3EQfnAp3/content/tmp_files/2301.04621v1.pdf.txt +1870 -0
  6. 0tE3T4oBgHgl3EQfnAp3/content/tmp_files/load_file.txt +0 -0
  7. 29E3T4oBgHgl3EQfoAqh/vector_store/index.faiss +3 -0
  8. 29E3T4oBgHgl3EQfoAqh/vector_store/index.pkl +3 -0
  9. 3NFKT4oBgHgl3EQfQi0f/content/tmp_files/2301.11767v1.pdf.txt +1056 -0
  10. 3NFKT4oBgHgl3EQfQi0f/content/tmp_files/load_file.txt +0 -0
  11. 49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf +3 -0
  12. 49E1T4oBgHgl3EQfmQS7/vector_store/index.faiss +3 -0
  13. 4NE0T4oBgHgl3EQfvQFL/content/2301.02615v1.pdf +3 -0
  14. 4NE0T4oBgHgl3EQfvQFL/vector_store/index.faiss +3 -0
  15. 4NE0T4oBgHgl3EQfvQFL/vector_store/index.pkl +3 -0
  16. 4NFQT4oBgHgl3EQfHjWk/content/2301.13249v1.pdf +3 -0
  17. 4NFQT4oBgHgl3EQfHjWk/vector_store/index.faiss +3 -0
  18. 4NFQT4oBgHgl3EQfHjWk/vector_store/index.pkl +3 -0
  19. 59E2T4oBgHgl3EQf7Ahe/content/2301.04205v1.pdf +3 -0
  20. 59E2T4oBgHgl3EQf7Ahe/vector_store/index.faiss +3 -0
  21. 59E2T4oBgHgl3EQf7Ahe/vector_store/index.pkl +3 -0
  22. 5dE3T4oBgHgl3EQfQgnL/vector_store/index.faiss +3 -0
  23. 69E4T4oBgHgl3EQf2A2F/content/tmp_files/2301.05295v1.pdf.txt +416 -0
  24. 69E4T4oBgHgl3EQf2A2F/content/tmp_files/load_file.txt +323 -0
  25. 7NE4T4oBgHgl3EQfCQsk/content/tmp_files/2301.04858v1.pdf.txt +1675 -0
  26. 7NE4T4oBgHgl3EQfCQsk/content/tmp_files/load_file.txt +0 -0
  27. 89AyT4oBgHgl3EQfdPcr/content/2301.00297v1.pdf +3 -0
  28. 89AyT4oBgHgl3EQfdPcr/vector_store/index.faiss +3 -0
  29. 89AyT4oBgHgl3EQfdPcr/vector_store/index.pkl +3 -0
  30. 8dE1T4oBgHgl3EQfngSj/content/tmp_files/2301.03310v1.pdf.txt +693 -0
  31. 8dE1T4oBgHgl3EQfngSj/content/tmp_files/load_file.txt +0 -0
  32. 8dE4T4oBgHgl3EQfCwtu/content/2301.04863v1.pdf +3 -0
  33. 8dE4T4oBgHgl3EQfCwtu/vector_store/index.faiss +3 -0
  34. 8dE4T4oBgHgl3EQfCwtu/vector_store/index.pkl +3 -0
  35. 9tE4T4oBgHgl3EQf3g1J/content/tmp_files/2301.05306v1.pdf.txt +2152 -0
  36. 9tE4T4oBgHgl3EQf3g1J/content/tmp_files/load_file.txt +0 -0
  37. A9FKT4oBgHgl3EQfWS5f/content/2301.11791v1.pdf +3 -0
  38. A9FKT4oBgHgl3EQfWS5f/vector_store/index.faiss +3 -0
  39. A9FKT4oBgHgl3EQfWS5f/vector_store/index.pkl +3 -0
  40. B9E4T4oBgHgl3EQfeA2w/content/tmp_files/2301.05096v1.pdf.txt +734 -0
  41. B9E4T4oBgHgl3EQfeA2w/content/tmp_files/load_file.txt +0 -0
  42. C9E0T4oBgHgl3EQfQQB9/content/2301.02190v1.pdf +3 -0
  43. C9E0T4oBgHgl3EQfQQB9/vector_store/index.faiss +3 -0
  44. C9E0T4oBgHgl3EQfQQB9/vector_store/index.pkl +3 -0
  45. C9E1T4oBgHgl3EQf-AYx/content/tmp_files/2301.03562v1.pdf.txt +898 -0
  46. C9E1T4oBgHgl3EQf-AYx/content/tmp_files/load_file.txt +0 -0
  47. CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf +3 -0
  48. D9E2T4oBgHgl3EQf9gn9/vector_store/index.faiss +3 -0
  49. DdE1T4oBgHgl3EQfqAWA/vector_store/index.faiss +3 -0
  50. DtE2T4oBgHgl3EQfSQej/content/2301.03791v1.pdf +3 -0
.gitattributes CHANGED
@@ -1692,3 +1692,104 @@ kdA0T4oBgHgl3EQfI_9R/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -tex
1692
  xNE5T4oBgHgl3EQfMw6X/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1693
  L9FIT4oBgHgl3EQfbiuW/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1694
  D9E2T4oBgHgl3EQf9gn9/content/2301.04230v1.pdf filter=lfs diff=lfs merge=lfs -text
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1692
  xNE5T4oBgHgl3EQfMw6X/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1693
  L9FIT4oBgHgl3EQfbiuW/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1694
  D9E2T4oBgHgl3EQf9gn9/content/2301.04230v1.pdf filter=lfs diff=lfs merge=lfs -text
1695
+ CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf filter=lfs diff=lfs merge=lfs -text
1696
+ KdAyT4oBgHgl3EQfsflO/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1697
+ z9FQT4oBgHgl3EQfCzX9/content/2301.13232v1.pdf filter=lfs diff=lfs merge=lfs -text
1698
+ DdE1T4oBgHgl3EQfqAWA/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1699
+ z9FQT4oBgHgl3EQfCzX9/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1700
+ y9AyT4oBgHgl3EQfn_hb/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1701
+ 5dE3T4oBgHgl3EQfQgnL/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1702
+ o9E0T4oBgHgl3EQfqgFN/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1703
+ edFKT4oBgHgl3EQfri7Q/content/2301.11879v1.pdf filter=lfs diff=lfs merge=lfs -text
1704
+ GdE1T4oBgHgl3EQfFAO9/content/2301.02898v1.pdf filter=lfs diff=lfs merge=lfs -text
1705
+ utAyT4oBgHgl3EQf0vkn/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1706
+ N9FIT4oBgHgl3EQfdisk/content/2301.11270v1.pdf filter=lfs diff=lfs merge=lfs -text
1707
+ SNE4T4oBgHgl3EQfLAy5/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1708
+ 4NFQT4oBgHgl3EQfHjWk/content/2301.13249v1.pdf filter=lfs diff=lfs merge=lfs -text
1709
+ xdE3T4oBgHgl3EQflgqp/content/2301.04608v1.pdf filter=lfs diff=lfs merge=lfs -text
1710
+ KtFJT4oBgHgl3EQfxS3S/content/2301.11634v1.pdf filter=lfs diff=lfs merge=lfs -text
1711
+ OdFKT4oBgHgl3EQffi6d/content/2301.11830v1.pdf filter=lfs diff=lfs merge=lfs -text
1712
+ T9E3T4oBgHgl3EQfEQll/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1713
+ SNE4T4oBgHgl3EQfLAy5/content/2301.04935v1.pdf filter=lfs diff=lfs merge=lfs -text
1714
+ GdE1T4oBgHgl3EQfFAO9/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1715
+ aNAzT4oBgHgl3EQfm_36/content/2301.01575v1.pdf filter=lfs diff=lfs merge=lfs -text
1716
+ L9FIT4oBgHgl3EQfbiuW/content/2301.11262v1.pdf filter=lfs diff=lfs merge=lfs -text
1717
+ 49E1T4oBgHgl3EQfmQS7/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1718
+ vdE3T4oBgHgl3EQf-gs4/content/2301.04826v1.pdf filter=lfs diff=lfs merge=lfs -text
1719
+ 4NFQT4oBgHgl3EQfHjWk/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1720
+ C9E0T4oBgHgl3EQfQQB9/content/2301.02190v1.pdf filter=lfs diff=lfs merge=lfs -text
1721
+ OdFKT4oBgHgl3EQffi6d/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1722
+ OdE3T4oBgHgl3EQfxQsz/content/2301.04709v1.pdf filter=lfs diff=lfs merge=lfs -text
1723
+ 49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf filter=lfs diff=lfs merge=lfs -text
1724
+ T9E1T4oBgHgl3EQfIQOS/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1725
+ IdE4T4oBgHgl3EQfhA2z/content/2301.05122v1.pdf filter=lfs diff=lfs merge=lfs -text
1726
+ Y9AzT4oBgHgl3EQfKvuz/content/2301.01103v1.pdf filter=lfs diff=lfs merge=lfs -text
1727
+ 59E2T4oBgHgl3EQf7Ahe/content/2301.04205v1.pdf filter=lfs diff=lfs merge=lfs -text
1728
+ TdE4T4oBgHgl3EQfmQ04/content/2301.05166v1.pdf filter=lfs diff=lfs merge=lfs -text
1729
+ dtE4T4oBgHgl3EQfQQzr/content/2301.04981v1.pdf filter=lfs diff=lfs merge=lfs -text
1730
+ utE4T4oBgHgl3EQfWgzV/content/2301.05034v1.pdf filter=lfs diff=lfs merge=lfs -text
1731
+ GtA0T4oBgHgl3EQfBv8y/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1732
+ N9FIT4oBgHgl3EQfdisk/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1733
+ T9E2T4oBgHgl3EQftQh4/content/2301.04068v1.pdf filter=lfs diff=lfs merge=lfs -text
1734
+ aNAzT4oBgHgl3EQfm_36/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1735
+ zNFQT4oBgHgl3EQfyzZN/content/2301.13410v1.pdf filter=lfs diff=lfs merge=lfs -text
1736
+ 59E2T4oBgHgl3EQf7Ahe/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1737
+ XdFLT4oBgHgl3EQfUC-H/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1738
+ GtA0T4oBgHgl3EQfBv8y/content/2301.01979v1.pdf filter=lfs diff=lfs merge=lfs -text
1739
+ MtAyT4oBgHgl3EQfs_ll/content/2301.00586v1.pdf filter=lfs diff=lfs merge=lfs -text
1740
+ TdA0T4oBgHgl3EQfEP9z/content/2301.02015v1.pdf filter=lfs diff=lfs merge=lfs -text
1741
+ PNA0T4oBgHgl3EQfC__J/content/2301.01998v1.pdf filter=lfs diff=lfs merge=lfs -text
1742
+ D9E2T4oBgHgl3EQf9gn9/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1743
+ 0dFQT4oBgHgl3EQfDjUj/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1744
+ IdE4T4oBgHgl3EQfhA2z/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1745
+ T9E2T4oBgHgl3EQftQh4/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1746
+ C9E0T4oBgHgl3EQfQQB9/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1747
+ cdAyT4oBgHgl3EQfXfcW/content/2301.00182v1.pdf filter=lfs diff=lfs merge=lfs -text
1748
+ utE4T4oBgHgl3EQfWgzV/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1749
+ ltE2T4oBgHgl3EQfeAeD/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1750
+ vdE3T4oBgHgl3EQf-gs4/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1751
+ 29E3T4oBgHgl3EQfoAqh/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1752
+ KtFJT4oBgHgl3EQfxS3S/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1753
+ cdAyT4oBgHgl3EQfXfcW/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1754
+ XdFLT4oBgHgl3EQfUC-H/content/2301.12047v1.pdf filter=lfs diff=lfs merge=lfs -text
1755
+ MtAyT4oBgHgl3EQfs_ll/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1756
+ _NAzT4oBgHgl3EQfvf2q/content/2301.01708v1.pdf filter=lfs diff=lfs merge=lfs -text
1757
+ p9E1T4oBgHgl3EQf2QWg/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1758
+ DtE2T4oBgHgl3EQfSQej/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1759
+ p9E1T4oBgHgl3EQf2QWg/content/2301.03477v1.pdf filter=lfs diff=lfs merge=lfs -text
1760
+ jdE4T4oBgHgl3EQfTAyo/content/2301.05004v1.pdf filter=lfs diff=lfs merge=lfs -text
1761
+ DtE2T4oBgHgl3EQfSQej/content/2301.03791v1.pdf filter=lfs diff=lfs merge=lfs -text
1762
+ PNA0T4oBgHgl3EQfC__J/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1763
+ jdE4T4oBgHgl3EQfTAyo/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1764
+ 4NE0T4oBgHgl3EQfvQFL/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1765
+ _NAzT4oBgHgl3EQfvf2q/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1766
+ ltE2T4oBgHgl3EQfeAeD/content/2301.03912v1.pdf filter=lfs diff=lfs merge=lfs -text
1767
+ edFKT4oBgHgl3EQfri7Q/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1768
+ 4NE0T4oBgHgl3EQfvQFL/content/2301.02615v1.pdf filter=lfs diff=lfs merge=lfs -text
1769
+ RdE2T4oBgHgl3EQfWQda/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1770
+ t9E_T4oBgHgl3EQf9xwP/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1771
+ A9FKT4oBgHgl3EQfWS5f/content/2301.11791v1.pdf filter=lfs diff=lfs merge=lfs -text
1772
+ 89AyT4oBgHgl3EQfdPcr/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1773
+ 89AyT4oBgHgl3EQfdPcr/content/2301.00297v1.pdf filter=lfs diff=lfs merge=lfs -text
1774
+ RdE2T4oBgHgl3EQfWQda/content/2301.03831v1.pdf filter=lfs diff=lfs merge=lfs -text
1775
+ A9FKT4oBgHgl3EQfWS5f/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1776
+ zNFQT4oBgHgl3EQfyzZN/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1777
+ VtFIT4oBgHgl3EQfhCtr/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1778
+ YdFAT4oBgHgl3EQf3R5S/content/2301.08719v1.pdf filter=lfs diff=lfs merge=lfs -text
1779
+ _NAzT4oBgHgl3EQfFvpH/content/2301.01015v1.pdf filter=lfs diff=lfs merge=lfs -text
1780
+ TdA0T4oBgHgl3EQfEP9z/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1781
+ s9E_T4oBgHgl3EQf9Bwt/content/2301.08378v1.pdf filter=lfs diff=lfs merge=lfs -text
1782
+ etA0T4oBgHgl3EQfHP_m/content/2301.02060v1.pdf filter=lfs diff=lfs merge=lfs -text
1783
+ Y9FST4oBgHgl3EQfADiR/content/2301.13697v1.pdf filter=lfs diff=lfs merge=lfs -text
1784
+ 8dE4T4oBgHgl3EQfCwtu/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1785
+ udFLT4oBgHgl3EQfjC8Y/content/2301.12109v1.pdf filter=lfs diff=lfs merge=lfs -text
1786
+ _9FQT4oBgHgl3EQf8TZV/content/2301.13446v1.pdf filter=lfs diff=lfs merge=lfs -text
1787
+ VtFIT4oBgHgl3EQfhCtr/content/2301.11286v1.pdf filter=lfs diff=lfs merge=lfs -text
1788
+ FtAzT4oBgHgl3EQfxP5f/content/2301.01734v1.pdf filter=lfs diff=lfs merge=lfs -text
1789
+ 8dE4T4oBgHgl3EQfCwtu/content/2301.04863v1.pdf filter=lfs diff=lfs merge=lfs -text
1790
+ _NAzT4oBgHgl3EQfFvpH/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1791
+ kNE_T4oBgHgl3EQf5Rz9/content/2301.08358v1.pdf filter=lfs diff=lfs merge=lfs -text
1792
+ atE3T4oBgHgl3EQfdQoZ/content/2301.04532v1.pdf filter=lfs diff=lfs merge=lfs -text
1793
+ kNE_T4oBgHgl3EQf5Rz9/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1794
+ OdE3T4oBgHgl3EQfxQsz/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1795
+ UdAyT4oBgHgl3EQfuvkh/content/2301.00617v1.pdf filter=lfs diff=lfs merge=lfs -text
0NFJT4oBgHgl3EQfjiwF/content/tmp_files/2301.11574v1.pdf.txt ADDED
@@ -0,0 +1,1837 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Damage Preserving Transformation for Materials with Microstructure
2
+ Philip P. Müllera, Falk K. Wittela, David S. Kammera,∗
3
+ aInstitute for Building Materials (IfB), ETH Zuerich, Laura-Hezner-Weg 7, 8093, Zuerich, Switzerland
4
+ Abstract
5
+ The failure of heterogeneous materials with microstructures is a complex process of damage nucleation, growth and
6
+ localisation. This process spans multiple length scales and is challenging to simulate numerically due to its high com-
7
+ putational cost. One option is to use domain decomposed multi-scale methods with dynamical refinement. If needed,
8
+ these methods refine coarse regions into a fine-scale representation to explicitly model the damage in the microstructure.
9
+ However, damage evolution is commonly restricted to fine-scale regions only. Thus, they are unable to capture the full
10
+ complexity and breath of the degradation process in the material. In this contribution, a generic procedure that allows
11
+ to account for damage in all representations is proposed. The approach combines a specially designed damage law,
12
+ with a scheme to generate pre-damaged fine-scale microstructures. Results indicate that the damage approximation for
13
+ the coarse representation works well. Furthermore, the generated fine-scale damage patterns are overall consistent with
14
+ explicitly simulated damage patterns. Minor discrepancies occur in the generation but subsequently vanish when explicit
15
+ damage evolution continuous; for instance under increased load. The presented approach provides a methodological basis
16
+ for adaptive multi-scale simulation schemes with consistent damage evolution.
17
+ Keywords:
18
+ Lattice, Continuum damage mechanics, Microstrutured disordered material, Anisotropic damage,
19
+ Multi-scale simulation, Harmonic decomposition, Damage modelling
20
+ ∗Corresponding author
21
+ Email addresses: [email protected] (Philip P. Müller),
22
+ [email protected] (Falk K. Wittel), [email protected] (David S.
23
+ Kammer)
24
+
25
+ Contents
26
+ 1
27
+ Introduction
28
+ 3
29
+ 2
30
+ Materials and Methods
31
+ 4
32
+ 2.1
33
+ Generic Damage Transforming Method . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
34
+ 4
35
+ 2.2
36
+ Continuum Representation of 2D Isotropic Continua . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
37
+ 4
38
+ 2.3
39
+ Exemplary Material Motive . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
40
+ 5
41
+ 2.4
42
+ Determining the Damage Law for the Continuum . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
43
+ 6
44
+ 2.5
45
+ Process for the Construction of a Damaged Lattice . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
46
+ 6
47
+ 2.6
48
+ Numerical Simulations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
49
+ 7
50
+ 2.6.1
51
+ The UniformSim Simulation Setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
52
+ 7
53
+ 2.6.2
54
+ The MultiLoadSim Simulation Setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
55
+ 7
56
+ 2.6.3
57
+ The ReconstrSim Simulation Setup
58
+ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
59
+ 8
60
+ 3
61
+ Results
62
+ 8
63
+ 3.1
64
+ Details of a Numerical Simulation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
65
+ 8
66
+ 3.2
67
+ Estimation of the Damage Law �D(#–κ)
68
+ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
69
+ 8
70
+ 3.3
71
+ Test of the Damage Evolution Law �D(#–κ)
72
+ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
73
+ 11
74
+ 3.4
75
+ Estimation of the Transfer Function #–�r (#–κ) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
76
+ 12
77
+ 3.5
78
+ Tests of the Reconstruction Process
79
+ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
80
+ 13
81
+ 4
82
+ Summary and Conclusion
83
+ 15
84
+ 5
85
+ CRediT
86
+ 15
87
+ 6
88
+ Declaration of Competing Interest
89
+ 15
90
+ 7
91
+ Data Availability
92
+ 15
93
+ Appendix A
94
+ Parameters of �rx(κx) and �ry(κy)
95
+ 16
96
+ References
97
+ 17
98
+ 2
99
+
100
+ 1. Introduction
101
+ At a certain scale even heterogeneous materials will
102
+ appear homogeneous and some can even be considered
103
+ isotropic.
104
+ Among others, this is true for concrete, one
105
+ of the most widely used commodity on earth, a mixture
106
+ made of sand, aggregates, cement, water and chemical ad-
107
+ mixtures. The growth of damage inside concrete is highly
108
+ affected by the particular microstructure, where, depend-
109
+ ing on the scale, aggregates or even sand grains act either
110
+ as focal points for stresses or obstacles for damage.
111
+ Damage initiates at very small scales, long before the
112
+ macroscopic structure itself will fail or crack. Instead, the
113
+ damage leads to a reduction of the material’s stiffness.
114
+ Nevertheless, at one point the accumulated damage be-
115
+ comes so widespread, that even its smallest increase, will
116
+ trigger the previously isolated nuclei to merge. This leads
117
+ to a cascade of increasingly larger defects, culminating in
118
+ the emergence of a macroscopic crack.
119
+ Continuum based methods are the methods of choice
120
+ if large structures should be simulated, due to their com-
121
+ putational efficiency. For taking into account intrinsic de-
122
+ generative processes, constitutive laws are used. One of
123
+ the earliest, but still widely used laws for modelling dam-
124
+ age in concrete was proposed by Mazars (Lemaître, 2001;
125
+ Mazars and Lemaître, 1985).
126
+ It employs a scalar dam-
127
+ age variable to degrade the material’s stiffness. However,
128
+ even if the material was initially isotropic, damage will
129
+ induce anisotropy into the material’s behaviour. Clearly
130
+ any scalar damage variable is inherently unable to capture
131
+ this. During the years, a variety of anisotropic damage
132
+ models were proposed to address this issue (Brancherie
133
+ and Ibrahimbegovic, 2009; Braun et al., 2021; H. Chen et
134
+ al., 2016; Delaplace and Desmorat, 2008; Desmorat et al.,
135
+ 2007; Gaede et al., 2013). All of them consider the ac-
136
+ cumulated effects of the damage’s growth, represented by
137
+ internal state variables at the material points and by that
138
+ disregard the actual microstructure, whose degeneration is
139
+ the actual cause for the emerging damage.
140
+ To overcome this deficiency, the entire microstructure
141
+ could be explicitly represented and simulated. Unfortu-
142
+ nately, even with today’s fast computers, this is only pos-
143
+ sible for small sizes. A way to overcome this barrier are
144
+ multi-scale methods. They allow to invest computational
145
+ power exactly where it is needed, by combining different
146
+ representations. Although, many different methods were
147
+ proposed over the past years, they can be classified to be
148
+ either of hierarchical or of concurrent nature (Liu, 2018;
149
+ Zhang et al., 2012).
150
+ Hierarchical methods are characterised by a full sepa-
151
+ ration of scales, which allows to treat every level indepen-
152
+ dently from each other. Thus, the information is passed
153
+ between the different levels as one serves as input for the
154
+ hierarchically higher level.
155
+ Opposed to this, concurrent methods lack the full sepa-
156
+ ration of scales and typically decompose the computational
157
+ domain into different regions. Imagine a typical setting
158
+ where high accuracy is only needed inside a small part of
159
+ the computational domain, for example around a crack tip.
160
+ Ideally, one limits methods with high accuracy but large
161
+ computational burden to these small regions, while the
162
+ remaining part of the computational domain is described
163
+ by much more efficient methods. The flow of information
164
+ between the different regions must be handled by a cou-
165
+ pling scheme such as the Arlequin method (Anciaux et al.,
166
+ 2008; Bauman et al., 2008; Guidault and Belytschko, 2007;
167
+ Unger and Eckardt, 2011; Wellmann and Wriggers, 2012).
168
+ Whenever the decomposition is not available in advance,
169
+ one must resort to adaptive methods to refine regions on
170
+ demand (e.g., P. Y. Chen et al., 2021; Evangelista, Alves,
171
+ et al., 2020; Evangelista and Moreira, 2020; Rodrigues et
172
+ al., 2018). However, important questions are (i) how are
173
+ the regions that need to be refined identified, and (ii) how
174
+ is the loading history of the coarse connected to the initial
175
+ state of the newly created fine scale representation? Espe-
176
+ cially (ii) does not seem to be addressed well in literature.
177
+ Most authors assume that the coarse representation does
178
+ not accumulate any damage before being refined (L. Chen
179
+ et al., 2021; P. Y. Chen et al., 2021; Rodrigues et al.,
180
+ 2018; Unger, Eckardt, and Konke, 2011). Consequently,
181
+ damage is only allowed to evolve inside of the fine scale
182
+ representations that start off as undamaged. This is in-
183
+ consistent because it essentially disregards the entire load
184
+ history, including the damage, that would have degraded
185
+ a real material.
186
+ In this paper we propose, to the best of our knowledge,
187
+ a generic approach for the refinement step in adaptive con-
188
+ current multi-scale simulations, that is able to account for
189
+ the preceding damage evolution inside the coarse repre-
190
+ sentation. Thus, the created fine scale representation con-
191
+ tains an initial damage that is mechanically consistent to
192
+ the damage that has evolved inside the coarse represen-
193
+ tation. Our solution is to equip both, the fine and coarse
194
+ scale representations, with their own damage measure. We
195
+ analyse these damage measures and establish a connection
196
+ between them. Our approach is actually able to address
197
+ both questions raised above. By interpreting the coarse
198
+ damage measure as a “measure of suitability”, critical re-
199
+ gions that require refinement are regions whose damage
200
+ measure surpassed some predetermined threshold value.
201
+ Further, the coarse damage is used to initialise the fine
202
+ scale damage.
203
+ While the approach is generic and rather simple, its
204
+ practical details highly depend on the selected represen-
205
+ tations. Thus, we demonstrate it by applying it to one
206
+ particular test case. The reminder of this paper is organ-
207
+ ised as follows: In Sec. 2, we explain our method in more
208
+ detail and present the proposed techniques. In Sec. 3 we
209
+ determine the parameters of our method and asses its ap-
210
+ plicability, before we draw final conclusions in Sec. 4.
211
+ 3
212
+
213
+ 2. Materials and Methods
214
+ The particular choice of the material’s microstructure,
215
+ also called motive, is in general arbitrary, but should fol-
216
+ low principles of representative volume elements (RVE)
217
+ (Lemaître and Desmorat, 2005). The state of a discrete
218
+ representation with its inherent characteristic structure is
219
+ fully given by r, that describes every single discrete ele-
220
+ ment (right side of Fig. 1). In this representation, damage
221
+ D(r) is given by the irreversible degeneration of the con-
222
+ stituting elements. On the left side of Fig. 1, the smeared
223
+ continuum representation is shown, which lacks such an
224
+ explicit microstructure and only considers cumulative ef-
225
+ fects of the damage through internal state variables added
226
+ to the constitutive law. Here, damage is given by D, which
227
+ depends on the state #–κ at a particular location and is em-
228
+ bedded in the constitutive law.
229
+ Figure 1: The continuum damage, at a certain point, is given by D, which
230
+ depends on the respective state #–
231
+ κ . The discrete damage D(r) depends on
232
+ r and hence on the state of all discrete elements of the lattice. The two
233
+ representations are interconnected to each other by homogenisation and
234
+ refinement processes. Scale of the lattice is exaggerated.
235
+ Since the continuum representation loses its validity
236
+ once cracks localise, one must refine the continuum to its
237
+ discrete twin in such way that all important aspects of the
238
+ fracture will be captured accurately on the fine scale. The
239
+ key for a meaningful adaptive modelling of the damage
240
+ evolution lies in the transformation of the continuum to
241
+ the discrete representation, that conserves the degraded
242
+ mechanical behaviour found inside the continuum. One
243
+ focus of this work is an approach to construct a discrete
244
+ representation that respects the preceding damage present
245
+ in the continuum representation.
246
+ Even though the procedure is generic and in principal
247
+ not restricted to specific numerical material representa-
248
+ tions, this paper focuses on one particular choice. How-
249
+ ever, we will outline the generic way of working with the
250
+ method (see Sec. 2.1), before we start with our specific
251
+ choice.
252
+ We exemplarily chose a two-dimensional plane
253
+ stress, isotropic material (see Sec. 2.2) with an under-
254
+ lying material heterogeneity represented by a triangular
255
+ network of beam-truss elements with linear-elastic, brittle
256
+ behaviour with quenched disorder of breaking thresholds
257
+ (see Sec. 2.3). We then discuss the particular choice of
258
+ the damage law as well as the reconstruction step (see
259
+ Secs. 2.4, 2.5). To determine and test them, we use data
260
+ obtained from numerical simulations (see Sec. 2.6).
261
+ 2.1. Generic Damage Transforming Method
262
+ Initially, the domain is described as a continuum with-
263
+ out any internal structure, whose state is fully described
264
+ by the continuum state variable #–κ. In the continuum, the
265
+ damage evolution is fully govern by the damage function
266
+ �D(#–κ). Therefore, �D(#–κ) can be interpreted as the macro-
267
+ scopic damage, that is expected for a hypothetical dis-
268
+ crete representation with identical loading. Thus we can
269
+ determine the function describing the macroscopic dam-
270
+ age by homogenising the discrete damage D(r). This leads
271
+ to a perspective on the damage law that is different from
272
+ the conventional one, where the damage law is calibrated
273
+ against a physical material. Instead, here the law is cali-
274
+ brated against a particular numerical representation of the
275
+ material.
276
+ When the continuum model experiences a certain dam-
277
+ age limit, it is no longer suitable and has to be refined to
278
+ a discrete representation. However, this discrete state has
279
+ to be consistent with the previous continuum representa-
280
+ tion. This includes stiffness and damage, which have to
281
+ be preserved as much as possible by the transformation.
282
+ Determining this reconstruction process challenging, since
283
+ it is by its very nature not unique.
284
+ 2.2. Continuum Representation of 2D Isotropic Continua
285
+ To represent a two-dimensional isotropic material un-
286
+ der plane stress, the Finite Element Method (FEM) and
287
+ as damage measure continuum damage mechanics (CDM)
288
+ is used (Lemaître, 2001; Lemaître, 1996; Lemaître and
289
+ Desmorat, 2005). We use the well known material law:
290
+ σ = (I − D) Cε,
291
+ (1)
292
+ where σ and ε denote the continuum stress and strain ten-
293
+ sors, respectively, and C is the continuum stiffness tensor
294
+ of the undamaged material. Due to the choice of CDM, as
295
+ continuum damage measure, the damage variable D can
296
+ directly be identified with the damage function �D(#–κ). Fur-
297
+ ther, we identify #–κ as the continuum state variable given
298
+ as
299
+ #–κ :=
300
+ �κx
301
+ κy
302
+
303
+ .
304
+ (2)
305
+ A zoning approach is used to divide the principal strain
306
+ space along an angle χ, known as zone boundary, into an
307
+ x- (shaded red parts) and y-zone (shaded yellow parts in
308
+ Fig. 2). The two components κx and κy represent the max-
309
+ imal reached principal tensile strain in x and y direction,
310
+ respectively, i.e.
311
+ κx := max
312
+
313
+ κx, ⟨ε1⟩+
314
+
315
+ ,
316
+ κy := max
317
+
318
+ κy, ⟨ε2⟩+
319
+
320
+ .
321
+ While ε1 and ε2 are the eigenvalues of the strain tensor
322
+ ε, its eigenvectors form a Givens rotation matrix of angle
323
+ Γ, which is sometimes called eigenangle.
324
+ The angle Γ,
325
+ together with the boundary χ, determines which zone the
326
+ eigenvalues are associated with, see Fig. 2.
327
+ 4
328
+
329
+ Figure 2: Interpretation of the zone boundary parameter χ. While ε1
330
+ and ε2 are the eigenvalues of ε, its eigenvectors are described by the
331
+ value Γ. The eigenangle Γ and the zone boundary χ determines which
332
+ eigenvalue acts in which direction.
333
+ Since the continuum damage is only used during the
334
+ initial phase with low damage, two assumptions are made:
335
+ (i) It is assumed that the damage is orthotropic which re-
336
+ duces D and �D(#–κ) to diagonal matrices. (ii) It is assumed
337
+ that κx only acts on the x-damage while κy only affects
338
+ the y-damage, which means that we assume no correlation
339
+ between the directions.
340
+ 2.3. Exemplary Material Motive
341
+ The example material motive chosen here is based on
342
+ models proposed in Refs. (Herrmann et al., 1989; Mier,
343
+ 2017), namely a regular triangular lattice but formed by
344
+ 3rd order Reddy truss-beam elements with characteristic
345
+ lattice size ℓ (Reddy, 1997; Reddy et al., 1997).
346
+ Using
347
+ beams allows to include bending properties and the re-
348
+ sulting lattice is able to represent a Cosserat continuum
349
+ (Ostoja-Starzewski, 2008; Vardoulakis, 2019).
350
+ The mi-
351
+ croscopical beams consist of an isotropic material with
352
+ Young’s modulus Eb and Poisson’s ratio νb. A list of all
353
+ used material parameters is given in Tab. I. In a multi-
354
+ scale simulation, Eb has to be chosen such that the result-
355
+ ing behaviour of the discrete structure matches the one of
356
+ the continuum, i.e. its stiffness tensor C. However, since
357
+ this paper studies the refinement step in isolation, with-
358
+ out having an actual continuum phase, the choice of Eb is
359
+ actually irrelevant.
360
+ Lattice Geometry.
361
+ The motive is defined by the number of
362
+ nodes (Nx, Ny) in x- and y-direction, the spatial extension
363
+ in x-direction Lx, with resulting characteristic lattice size
364
+ ℓ := Lx/(Nx −1) and spatial y-extension Ly := Nyℓ
365
+
366
+ 3/2.
367
+ An out-of-plane height of H is assumed. To remove the
368
+ symmetries of the lattice, topological disorder is intro-
369
+ duced (Moukarzel and Herrmann, 1992; Wittel, 2006) by
370
+ adding the random displacement
371
+ #–x ∆
372
+ i := a ℓ
373
+ 2
374
+ #–x ∗
375
+ i
376
+ (3)
377
+ to every internal node of the grid, where #–x ∗
378
+ i is a random
379
+ vector sampled uniformly from the unit circle (see Fig. 3a).
380
+ Table I: Parameters of the discrete material motive.
381
+ Property
382
+ Value
383
+ Unit
384
+ Nx, Ny
385
+ 300, 346
386
+ [−]
387
+ Lx, Ly
388
+ 2, 1.998
389
+ m
390
+ H
391
+ 1
392
+ m
393
+ Eb
394
+ 1 × 106
395
+ Pa
396
+ νb
397
+ 0.3
398
+ [−]
399
+
400
+ 3
401
+ [−]
402
+ λε
403
+ 0.02
404
+ [−]
405
+
406
+ 3
407
+
408
+ λΦ
409
+ 0.02
410
+ [−]
411
+ The distortion is controlled by parameter a ∈ [0, 1[, known
412
+ as distortion level.
413
+ Figure 3: (a) Distortion of the central node, ignoring the distortion of the
414
+ surrounding nodes. The location of the distorted node (yellow circle), is
415
+ randomly selected within the blue circle of radius aℓ/2. Afterwards, the
416
+ length of the beams are adjusted to match the new node location (black
417
+ lines). (b) The thickness of beam i is given as ti := A(O)
418
+ i
419
+ /ℓi, where ℓi is
420
+ its length and A(O)
421
+ i
422
+ is the area the beam is representing. Points zL and
423
+ zK are centres of the adjacent triangles’ incircles.
424
+ Geometrical Properties of Beam-Truss Elements.
425
+ The
426
+ thickness of beam i, denoted as ti, depends on the lat-
427
+ tice’s geometry. It is given as ti := A(O)
428
+ i
429
+ /ℓi, where A(O)
430
+ i
431
+ is the area represented by the beam and ℓi its length, see
432
+ Fig. 3b. The area A(O)
433
+ i
434
+ is formally defined as the set of
435
+ points that are closer to beam i than any other beam, but
436
+ are inside the lattice. It can be determined by finding the
437
+ intersection of the angle’s bisectors, i.e. centre of the incir-
438
+ cle, of the two adjacent triangles denoted as zK and zL in
439
+ Fig. 3b. In case the beam is part of the boundary A(O)
440
+ i
441
+ is
442
+ artificially doubled. This ensures that in a regular lattice
443
+ all beams have the same axial rigidity.
444
+ Damage Criterion Applied to the Beam-Truss Lattice.
445
+ In
446
+ the discrete representation, damage is the irreversible fail-
447
+ ure of elements, namely the reduction of their contributing
448
+ stiffness to an insignificant level. To determine if a beam
449
+ has surpassed its loading capacity, the elliptical criterion
450
+ � εi
451
+ εi; th
452
+ �2
453
+ +
454
+ max
455
+ ����Φ(r)
456
+ i
457
+ ��� ,
458
+ ���Φ(l)
459
+ i
460
+ ���
461
+
462
+ Φi; th
463
+ =: Ψi ≥ 1
464
+ (4)
465
+ is used, where εi;th and Φi;th are the beam’s elongation
466
+ and bending thresholds, respectively (Herrmann et al.,
467
+ 5
468
+
469
+ KicKy
470
+ E2a
471
+ (b)
472
+ ZK
473
+ a
474
+ ZL
475
+ Φ
476
+ (r)1989). Both thresholds are sampled independently from
477
+ the Weibull distributions εi;th
478
+ iid
479
+ ∼ Weib (kε, λε) and Φi;th
480
+ iid
481
+
482
+ Weib (kΦ, λΦ).
483
+ The Discrete State Variable #–r .
484
+ The
485
+ discrete
486
+ state
487
+ is
488
+ uniquely described by r. However, for the context of this
489
+ paper the surrogate discrete state variable
490
+ #–r :=
491
+
492
+ rx
493
+ ry
494
+
495
+ (5)
496
+ is introduced and termed “discrete state variable”. Since
497
+ #–r has only two components it does not uniquely describe
498
+ the damaged state.
499
+ This ambiguity will be resolved by
500
+ the reconstruction process (see Sec. 2.5).
501
+ #–r is a purely
502
+ mathematical quantity designed to have certain properties.
503
+ First, its 1-norm �r := ∥#–r ∥1 := |rx| + |rx| equals to Nf/NT,
504
+ where Nf is the number of failed beams and NT the total
505
+ number of beams in the lattice. �r is also called the ratio of
506
+ failed beams (rfb). Second, its components are defined by
507
+ associating them to the x- and y-zone, respectively, similar
508
+ to #–κ (see Sec. 2.2). But while κx is connected to strains
509
+ in the x-zone, rx is related to the amount of beams that
510
+ have failed due to κx.
511
+ 2.4. Determining the Damage Law for the Continuum
512
+ The damage function �D(#–κ) will take the role of the
513
+ damage variable D inside the constitutive equation (1).
514
+ Thus, �D(#–κ) has to be designed such that its evolution
515
+ mimics the expected behaviour of D (see Sec. 3.2). For
516
+ the extraction, which involves two steps, the Uniform-
517
+ Sim simulation data of fully discrete lattices is used (see
518
+ Sec. 2.6.1).
519
+ Step 1: Effective Material Stiffness Tensor C.
520
+ First, the
521
+ effective stiffness tensor C is calculated by homogenisation.
522
+ After the convergence of each loading step, the following
523
+ seven strain-states
524
+
525
+
526
+
527
+
528
+
529
+ 1
530
+ 2
531
+ 3
532
+
533
+ �,
534
+
535
+
536
+ 4
537
+ 5
538
+ 0
539
+
540
+ �,
541
+
542
+
543
+ 6
544
+ 0
545
+ 0
546
+
547
+ �,
548
+
549
+
550
+ 0
551
+ 7
552
+ 0
553
+
554
+ �,
555
+
556
+
557
+ 0
558
+ 0
559
+ 8
560
+
561
+ �,
562
+
563
+
564
+ 9
565
+ 0
566
+ 10
567
+
568
+ �,
569
+
570
+
571
+ 0
572
+ 9
573
+ 8
574
+
575
+
576
+
577
+
578
+ � ,
579
+ (6)
580
+ denoted as (εxx, εyy, 2εxy)T × 10−3, were applied to the
581
+ lattice, while blocking further damage to measure the re-
582
+ sulting stresses. This results in an overdetermined system
583
+ of 21 equations for the 6 unknown coefficients of C, which
584
+ is solved by a least-square approach.
585
+ Step 2: Determining the Damage Variable D.
586
+ Second,
587
+ the damage variable D is extracted from the effective stiff-
588
+ ness tensors of the lattice. For this, a technique originally
589
+ presented by Oliver-Leblond et al. (2021) is used. For com-
590
+ pleteness, the relevant equations are replicated to be
591
+ d(T ) := tr1,2[T ] = Tkkij,
592
+ (7a)
593
+ K := 1
594
+ 4 tr
595
+
596
+ d(C)
597
+
598
+ ,
599
+ (7b)
600
+ D := D
601
+
602
+ C, �C
603
+
604
+ :=
605
+ 1
606
+ 2K
607
+
608
+ d(C) − d
609
+
610
+ �C
611
+ � �
612
+ .
613
+ (7c)
614
+ The tensor defined by Eq. (7a) is also known as dilatation
615
+ second order tensor, while scalar K of Eq. (7b) is the bulk
616
+ modulus. Eq. (7c) combines the effective C and undam-
617
+ aged stiffness tensor �C to the damage variable D. D is
618
+ by construction a real symmetric 2 × 2 matrix, thus fully
619
+ characterised by its two eigenvalues d(x) and d(y) as well as
620
+ a single scalar Γ, describing the rotation of its eigenbasis
621
+ (see Fig. 2).
622
+ 2.5. Process for the Construction of a Damaged Lattice
623
+ The reconstruction process, i.e. the creation of a dis-
624
+ crete lattice with a particular damage, involves two compo-
625
+ nents: (i) The transfer function #–�r (#–κ), which transforms
626
+ the continuum state #–κ into the discrete surrogate state
627
+ variable #–r . (ii) A scheme which transforms the surrogate
628
+ state #–r into the full discrete state r. Hence, the scheme
629
+ must be able to resolve the inherently present ambiguity in
630
+ #–r . As direct consequence of the definition of the discrete
631
+ state #–r (see Eq. (5)), the transfer function is given as
632
+ #–�r (#–κ) :=
633
+ ��rx(κx)
634
+ �ry(κy)
635
+
636
+ .
637
+ (8)
638
+ As for the damage function �D(#–κ), we are using data ob-
639
+ tained from the UniformSim simulations (see Sec. 2.6.1)
640
+ to empirically determine the function #–�r (#–κ) that approxi-
641
+ mates #–r . Due to the nature of #–r it is impossible to mea-
642
+ sure its components and thus to fit them directly. How-
643
+ ever, it is easy to measure and fit the quantity �r := ∥#–r ∥1.
644
+ Because of the specific design of the simulations and as-
645
+ sumptions, it is possible to associate the value �r to the
646
+ components of #–r , see Sec. 2.6.1.
647
+ For reconstructing the full discrete state, a probabilis-
648
+ tic scheme was devised. It starts by constructing an un-
649
+ damaged lattice from which certain beams are removed,
650
+ such that the resulting damage matches in a statistical
651
+ sense the one given by #–κ. Due to the assumed decoupling
652
+ between the x- and y-zone, it is possible to handle the two
653
+ directions independently. For each direction α, i.e. x and
654
+ y, the following steps must be done:
655
+ 1. From the continuum state κα the corresponding dis-
656
+ crete state
657
+ variable,
658
+ rα = �rα(κα)
659
+ is
660
+ computed.
661
+ Through the relationship Nα := rα·NT , it is possible
662
+ to determine how many failed beams are associated
663
+ to this direction.
664
+ 2. Each beam is assigned a probability defined as
665
+ pi ∝
666
+ 1
667
+ εi; th
668
+ ���
669
+ �#–b i, #–t α
670
+ ����
671
+ k
672
+ ,
673
+ (9)
674
+ where εi; th is the elongation threshold and #–b i the di-
675
+ rection of the beam. The vector #–t α, called “damage
676
+ basis”, represents the main damage direction. In our
677
+ motive, it is either #–t x := (1, 0)T or #–t y := (0, 1)T.
678
+ Finally, parameter k, called “directional weight”, is
679
+ 6
680
+
681
+ a tuning parameter that balances the relative impor-
682
+ tance of the two terms and needs to be determined
683
+ (see Sec. 3.4).
684
+ 3. The Nα many beams to fail are drawn from the prob-
685
+ ability distribution defined by Eq. (9) without re-
686
+ placement.
687
+ 4. The selected beams are marked as failed.
688
+ 2.6. Numerical Simulations
689
+ For estimating and testing the damage function �D(#–κ)
690
+ and the transfer function #–�r (#–κ), a series of different numer-
691
+ ical simulations are carried out on fully discrete lattices.
692
+ We employ for this a customised version of the Akantu
693
+ FEM library (Richart and Molinari, 2015).
694
+ Due to the
695
+ randomness of the lattice, 30 realisations were made for
696
+ each case.
697
+ 2.6.1. The UniformSim Simulation Setup
698
+ The first type of simulation, called UniformSim, is used
699
+ for estimating the transfer function #–�r (#–κ) and the damage
700
+ law �D(#–κ). These simulations realise an uni-axial strain
701
+ Figure 4: Boundary conditions used by the UniformSim series, shown for
702
+ the case of ϕ = 0°. In general, the boundary conditions given by Eq. (10)
703
+ are applied to the whole boundary. Scale of the lattice is exaggerated.
704
+ state of the lattice that is also rotated by an arbitrary but
705
+ constant angle ϕ, called the pull direction. (see Fig. 4).
706
+ Thus
707
+ εϕ := Rϕ
708
+ T
709
+ ��ε1
710
+ 0
711
+ 0
712
+ 0
713
+
714
+ Rϕ,
715
+ (10)
716
+ where Rϕ is the Givens rotation matrix for angle ϕ that
717
+ is applied to the lattice’s boundary. In each loading step,
718
+ �ε1 is increased by 0.0001 until 0.005 is reached. The limit
719
+ is chosen to ensure that no localisation will occur and that
720
+ damage maintains its diffuse character.
721
+ The particular setup of the UniformSim simulations
722
+ together with the previous assumptions on D and #–�r (#–κ)
723
+ allows the following conclusions and simplifications:
724
+ (i) A pull direction is either associated to the x- or y-
725
+ zone (see Sec. 2.2).
726
+ This allows to probe the be-
727
+ haviour of a single zone. Which zone is probed de-
728
+ pends on ϕ and the yet unknown zone boundary
729
+ value χ.
730
+ (ii) A simulation, i.e. a particular value of ϕ, will only
731
+ affect the state of either the x- or the y-zone. Thus,
732
+ an increase of �ε1 will only affect one eigenvalue of D
733
+ and a single component of #–κ as well as #–r . Which
734
+ component is affected depends on ϕ and χ.
735
+ (iii) For the continuum state variable the relation �κ
736
+ !=
737
+ ∥#–κ∥1
738
+ != |κα|
739
+ != �ε1 holds.
740
+ Thus, one component
741
+ equals the applied uni-axial strain �ε1, while the other
742
+ is zero.
743
+ (iv) For the discrete state variable, the relation �r
744
+ != ∥#–r ∥1
745
+ !=
746
+ |rα| holds. Thus, only one component is non zero and
747
+ equals �r. This can be used to determine the compo-
748
+ nents of #–r from �r, once the x- and y-zones are known
749
+ (see Sec. 3.4).
750
+ 2.6.2. The MultiLoadSim Simulation Setup
751
+ For testing the damage function as well as the recon-
752
+ struction procedure, a second type of simulation is used,
753
+ called MultiLoadSim.
754
+ It realises a bi-axial strain state,
755
+ imposed along the x- and y-axes (see Fig. 5). Both strains
756
+ are increased until εxx = εyy = εfin is reached, where εfin
757
+ is the control parameter. For each simulation, the loading
758
+ is imposed in three different ways, but each time the same
759
+ initial lattice is used:
760
+ XThenYSim: εxx is increased in steps of 0.0001 until it
761
+ reaches εfin and then maintained. Then εyy is in-
762
+ creased by the same increment until εfin is reached.
763
+ YThenXSim: The same as XThenYSim, however, the order
764
+ of loading the axes is switched.
765
+ BothXYSim: Both strains εxx and εyy are increased simul-
766
+ taneously, in steps of 0.0001 until εfin is reached.
767
+ All three paths reach the same final state, εxx = εyy =
768
+ κx = κy = εfin, but via different paths. As a consequence,
769
+ the special relation �κ := ∥#–κ∥1 = |εxx| + |εyy| holds in
770
+ these simulations. Both, the XThenYSim and the YThenX-
771
+ Sim loading path impose in the first half of the loading an
772
+ uni-axial strain state and then switch to a bi-axial strain
773
+ state for the second half, while the BothXYSim loading path
774
+ imposes a bi-axial strain state from the beginning.
775
+ Figure 5: Boundary conditions used in the verification simulations. Scale
776
+ of the lattice is exaggerated.
777
+ 7
778
+
779
+ 2.6.3. The ReconstrSim Simulation Setup
780
+ For testing the reconstruction process (see Sec. 2.5), a
781
+ third type of simulation is used, called ReconstrSim. The
782
+ basic setup is equivalent to UniformSim, but for ϕ = 0°.
783
+ Further, a lattice with a certain initial damage is used.
784
+ This damage was constructed to match the continuum
785
+ state #–κ = (�ε, 0)T, i.e.
786
+ the damage created by an uni-
787
+ axial strain of �ε applied along the x-direction. Another
788
+ important difference is, that the loading does not start at
789
+ zero but at �ε. In case of a perfectly working reconstruc-
790
+ tion process, one would expect no additional damage for
791
+ strains ≤ �ε.
792
+ Unlike the MultiLoadSim tests, which focuses on the
793
+ value of the reconstructed damage, these tests focus on
794
+ how the reconstructed lattices behave after their recon-
795
+ struction. In essence, this test simulates the exchange of
796
+ the continuum representation with the discrete represen-
797
+ tation, i.e. the refinement process, which is the core ap-
798
+ plication of the proposed method.
799
+ 3. Results
800
+ Our proposed method relies on the damage law �D(#–κ)
801
+ used inside the continuum and the reconstruction process.
802
+ First, we discuss how we will use the techniques introduced
803
+ in Sec. 2 to process the data that we have collected from
804
+ the numerical simulations. Then, we determine the dam-
805
+ age law �D(#–κ) and the zone boundary value χ (see Sec. 3.2)
806
+ followed by an assessment of its accuracy (see Sec. 3.3).
807
+ Thereafter, we repeat the process to determine the trans-
808
+ fer function #–�r (#–κ) and the directional weight parameter k
809
+ (see Sec. 3.4). Finally, we demonstrate the applicability of
810
+ our method (see Sec. 3.5).
811
+ 3.1. Details of a Numerical Simulation
812
+ Let’s consider a setting similar to UniformSim but with
813
+ ϕ = 0° (see Fig. 6a). Only one realisation is simulated and
814
+ the loading goes beyond �ε1 = 0.005.
815
+ We measure the normalised stresses (solid lines) and
816
+ compare them with the expected ones in case of suppressed
817
+ damage, i.e. undamaged case (dashed lines) (Fig. 6b). As
818
+ expected, initially the stresses behave predominantly lin-
819
+ ear. However, once a strain of about 0.003 is reached, we
820
+ observe that �σxx starts to deviate from the undamaged
821
+ case.
822
+ While this deviation increases with further load-
823
+ ing, we cannot observe it for �σyy, that is much less af-
824
+ fected by the loading. At one point, we observe that both
825
+ stresses suddenly drop. This is caused by the emergence
826
+ of a macroscopic crack, which is the expected behaviour
827
+ for a brittle disordered material, such as concrete.
828
+ Using the techniques presented in Sec. 2.4, it is possible to
829
+ extract the macroscopic damage variable D for the lattice,
830
+ at any loading step. In Fig. 6c, we show the eigenvalues of
831
+ the extracted damage variables where we can see that d(x)
832
+ exceeds d(y). This also explains why �σxx deviates much
833
+ more from the undamaged behaviour when compared to
834
+ �σyy. The underlying reason of this difference are the hor-
835
+ izontal beams. They experience much larger strains than
836
+ inclined beams, since they align with the loading and thus
837
+ fail at much larger number. From Fig. 6c, we can also see
838
+ that d(y) drops for a strain at around 0.002. This is a non-
839
+ physical behaviour as damage should always increase. It is
840
+ caused by some numerical issues during the determination
841
+ of the stiffness tensor (see Sec. 2.4) and the sensitivity of
842
+ damage extraction process.
843
+ Fig. 6d shows the ratio of failed beams (rfb), �r := ∥#–r ∥1 :=
844
+ Nf/NT, where Nf is the total number of number of failed
845
+ beams and NT the total beams in the lattice. We will use
846
+ it to indirectly estimate the transfer function #–�r (#–κ).
847
+ Figs. 6e-h show snapshots of the lattice’s underlying
848
+ microstructure. While taken at different loading steps (see
849
+ Fig. 6d), they always show the same set of nodes, located
850
+ roughly at the lattice’s centre. While the exact damage
851
+ pattern depends on the realisation of the lattice and lo-
852
+ cations where the snapshot was taken, statistically they
853
+ all look the same.
854
+ It is this statistical damage pattern
855
+ that we want to capture by the transfer function #–�r (#–κ)
856
+ and recreate by the reconstruction process. Whereas the
857
+ damage law �D(#–κ) captures the accumulated effects on the
858
+ lattice’s macroscopical stiffness.
859
+ 3.2. Estimation of the Damage Law �D(#–κ)
860
+ We now study the behaviour of the damage variable D
861
+ that we have extracted from the data of the UniformSim
862
+ simulations. From these observations, we will determine
863
+ the damage function �D(#–κ) as well as the zone boundary
864
+ value χ (see Fig. 2).
865
+ Functional Form of �dx(κx) and �dy(κy).
866
+ Since we have
867
+ assumed an orthotropic damage variable (see Sec. 2.2), we
868
+ have to assume the same for the damage function. Thus
869
+ arriving the tentative form of the damage function is given
870
+ by
871
+ �D(#–κ) :=
872
+ �dxx(#–κ)
873
+ 0
874
+ 0
875
+ dyy(#–κ)
876
+
877
+ .
878
+ To account for deviations from this assumption, we will
879
+ connect the two diagonal elements of the damage func-
880
+ tion with the eigenvalues of the measured damage vari-
881
+ able. Thus, we have only two functions that we need to
882
+ determine.
883
+ Fig. 7 shows the evolution of the eigenvalues d(x) and
884
+ d(x) from the extracted damage variable for the pull di-
885
+ rections ϕ ∈ { 0°, 60° } at various distortion levels.
886
+ For
887
+ ϕ = 0°, the eigenvalue d(x) is much larger than d(y), while
888
+ for ϕ = 60° the opposite is observed. Later, we will use
889
+ this to determine the zone boundary value χ. Most im-
890
+ portantly, the figures show that both eigenvalues follow a
891
+ power law, irrespective of the pull direction and distortion.
892
+ Thus we approximate the diagonal elements/eigenvalues of
893
+ 8
894
+
895
+ Figure 6: Representative simulation example.
896
+ (a) Schematics of the model configuration, scale of the lattice is exaggerated.
897
+ (b-d) Evolution of
898
+ continuum and microstructure properties of the lattice. Dotted lines denote strains beyond the limit of 0.005 used in UniformSim. (b) Normalised
899
+ measured stresses. Dashed lines represent the behaviour in case of suppressed damage. (c) Eigenvalues of the extracted damage variable D, see Eq. (1).
900
+ (d) Ratio of failed beams �r in the specimen. (e-h) Snapshots of a small section of the microstructure. Colours indicate the remaining load carrying
901
+ capacity of the beams �
902
+ Ψi := 1 − Ψi, where Ψi is defined by Eq. (4). Associated states are indicated in (d) by markers. Bending of beams is not shown.
903
+ �D(#–κ) as:
904
+ dxx ≈ �dx(κx; a, ϕ) := α(x)
905
+ a,ϕ · κx
906
+ β(x)
907
+ a,ϕ,
908
+ (11a)
909
+ dyy ≈ �dy(κy; a, ϕ) := α(y)
910
+ a,ϕ · κy
911
+ β(y)
912
+ a,ϕ.
913
+ (11b)
914
+ The parameters of these approximations depend on the
915
+ distortion level a and the pull direction ϕ. Later, we will
916
+ eliminate their dependency on ϕ and obtain the final pa-
917
+ rameters that only depend on a, which is constant. Fur-
918
+ ther, this choice guarantees that the damage is strictly
919
+ increasing.
920
+ Because of our previous assumption about the indepen-
921
+ dence of the directions, the approximations of the eigenval-
922
+ ues only depend on a single component of the continuum
923
+ state #–κ (Sec. 2.2). While this could be justified due to their
924
+ large differences, that we can see in Fig. 7, we clearly see
925
+ that even for ϕ = 0°, there is a certain coupling between
926
+ d(x) and d(y). To handle this, we use a simple coupling
927
+ scheme, which leads to the final damage function
928
+ �D(#–κ) :=
929
+ (12)
930
+
931
+
932
+
933
+
934
+ max
935
+
936
+ �dx(κx), �
937
+ dy(κy)
938
+ η
939
+
940
+ 0
941
+ 0
942
+ max
943
+
944
+ �dy(κy), �
945
+ dx(κx)
946
+ η
947
+
948
+
949
+
950
+
951
+ �,
952
+ where �dx(κx) and �dy(κy) are the approximations of the
953
+ eigenvalues defined by Eq. (11) but without the depen-
954
+ dence on ϕ. The coupling ensures that the eigenvalues of
955
+ the damage function �D(#–κ) will at most differ by a factor
956
+ of η, which is exactly what we see in the case of uni-axial
957
+ loading (see Fig. 7). Here, we will assume that the em-
958
+ pirical parameter η equals 10 in all cases. We will later
959
+ give a justification of the form and value of the proposed
960
+ coupling. It is important to notice that this coupling is
961
+ designed for the uni-axial case. However, a more elabo-
962
+ rated coupling might be needed, depending on the details
963
+ of other material motives.
964
+ Parameters of �dx(κx) and �dy(κy).
965
+ Since the data, espe-
966
+ cially for the non-dominant eigenvalue shows strong vari-
967
+ ation for small strains, only data points corresponding to
968
+ 9
969
+
970
+ a)
971
+ ouy
972
+ 0.005
973
+ <6
974
+ 0.000
975
+ (
976
+ d(c)
977
+ d(y)
978
+ -4
979
+ -6
980
+ d
981
+ 0.02
982
+ (h)
983
+ 0.01
984
+ (g)
985
+ (f)
986
+ (e)
987
+ 0.00
988
+ 0.000
989
+ 0.002
990
+ 0.004
991
+ 0.006
992
+ 0.008
993
+ remaining load carrying capacity := 1 -
994
+ Err [-]
995
+ >0Figure 7: Eigenvalues of the extracted damage variable D for pull direc-
996
+ tions ϕ = 0° (a) and 60° (b). Solid lines correspond to d(x), while dashed
997
+ lines correspond to d(y). Colours indicate different distortion levels a of
998
+ the underlying lattice.
999
+ strains above 0.002 were used for the parameter estima-
1000
+ tion.
1001
+ In Figs. 8a,b, we see that for small values of ϕ,
1002
+ the α(x)
1003
+ a,ϕ-parameters are very close to each other, while for
1004
+ larger values of ϕ one observes a much larger scattering.
1005
+ Interestingly, α(y)
1006
+ a,ϕ-parameters behave inversely. Further-
1007
+ more, on Fig. 8b we can clearly observe the α(y)
1008
+ a,ϕ depen-
1009
+ dence on ϕ. We see that α(y)
1010
+ a,ϕ is small if ϕ is small too, but
1011
+ above a certain value of ϕ, the parameters become much
1012
+ larger and their scattering increases. The same, but in an
1013
+ opposite way, holds for the α(x)
1014
+ a,ϕ-parameters but in a less
1015
+ pronounced fashion.
1016
+ The estimates for the β-parameters (see Figs. 8c,d)
1017
+ show a similar behaviour with respect to ϕ.
1018
+ However,
1019
+ while we observed a significant change in the behaviour
1020
+ of the α-parameters’ values, from a particular value of ϕ
1021
+ on we just observe an increase of the variability of β.
1022
+ In summary, from Fig. 8 we can conclude that the β- and
1023
+ especially the α(y)-parameters have different regimes de-
1024
+ pending on ϕ. Further, inside such a regime, their partic-
1025
+ Figure 8: Values of the α- (a,b) and β-parameters (c,d) with respect to
1026
+ the pull direction ϕ. Colours indicate different distortion levels. Solid
1027
+ lines correspond to lg α(x)
1028
+ a,ϕ and β(x)
1029
+ a,ϕ, while dashed lines to lg α(y)
1030
+ a,ϕ and
1031
+ β(y)
1032
+ a,ϕ. Error bars indicate the 95% confidence interval.
1033
+ ular value does not depend much on ϕ.
1034
+ We also saw that the values for the β(x)-parameters for
1035
+ small values of ϕ and β(y)-parameters for large values of
1036
+ ϕ are both close to three. This means that the growth
1037
+ behaviour of �dx(κx) and �dy(κy) are very similar. This jus-
1038
+ tifies the form of the coupling used in the damage function
1039
+ in Eq. (12).
1040
+ Zone Boundary χ.
1041
+ In Figs. 7 and 8, we have observed
1042
+ that depending on the pull direction either d(x) or d(y) is
1043
+ dominant. We now exploit this fact to define χ. To this
1044
+ end, we define the dominance function ζ as:
1045
+ ζ(a, ϕ) := lg
1046
+
1047
+ d(x)
1048
+ a,ϕ; ˜κ=0.005
1049
+ d(y)
1050
+ a,ϕ; ˜κ=0.005
1051
+
1052
+ ,
1053
+ (13)
1054
+ with d(α)
1055
+ a,ϕ; ˜κ=0.005 as the damage eigenvalue associated to
1056
+ direction α, once the uni-axial strain has reached 0.005.
1057
+ 10
1058
+
1059
+ a
1060
+ = 0.0°
1061
+ 10-2
1062
+ d(r) a = 0.0
1063
+ d(r) aα = 0.1
1064
+ d(r) a = 0.2
1065
+ 10-3
1066
+ d(r) a = 0.3
1067
+ d(r) α = 0.5
1068
+ 10-4
1069
+ ~ d(y)
1070
+ (α)p
1071
+ 10-5
1072
+ 10-6
1073
+ 10-7
1074
+ L
1075
+ (b)
1076
+ Φ = 60.0°
1077
+ 10-2
1078
+ d(y) a = 0.1
1079
+ d(y) a = 0.2
1080
+ 10-3
1081
+ d(y) a = 0.3
1082
+ d(y) α = 0.5
1083
+ 10-4
1084
+ ~ d(r)
1085
+ (6)p
1086
+ 10-5
1087
+ 10-6
1088
+ 10-7
1089
+ 10-4
1090
+ 10-3
1091
+ [-](a)
1092
+ 5.0
1093
+ 4.0
1094
+ (b)
1095
+ 5.5
1096
+ [-] °
1097
+ 5.0
1098
+ 4.5
1099
+ 4.0
1100
+ (c)
1101
+ +
1102
+ a= 0.0
1103
+ α= 0.3
1104
+ 4.0
1105
+ α = 0.1
1106
+ a = 0.5
1107
+ a = 0.2
1108
+ a = 0.7
1109
+ 3.5
1110
+ 3.0
1111
+ (d)
1112
+ 4.0
1113
+
1114
+ 3.5
1115
+ 3.0
1116
+ 0
1117
+ 20
1118
+ 40
1119
+ 60
1120
+ 80
1121
+ [] The most important aspects of this function are its sign
1122
+ and root, to a lesser extend its value. ζ > 0 means that
1123
+ d(x) is dominant, while ζ < 0 indicates that d(y) is domi-
1124
+ nant. Thus, χ, which might depend on the distortion a, is
1125
+ defined as ζ(a, χ)
1126
+ != 0.
1127
+ Figure 9: Dominance function ζ(a, ϕ), Eq. 13, for different distortion
1128
+ parameters a. The x-dominated region, i.e. d(x) ≫ d(y), is defined by
1129
+ ζ > 0, while the y-dominated (grey shaded) region, i.e. d(x) ≪ d(y), is
1130
+ defined by ζ < 0. The UniformSim data was used.
1131
+ Examining Fig. 9, we see that, irrespective of the distor-
1132
+ tion, χ must lie between 30° and 45°. After some exper-
1133
+ imentation, we decided to use 40° as zone boundary, ir-
1134
+ respective of the distortion level. A closer analysis might
1135
+ yield different estimations.
1136
+ ζ can be seen as a measure of the coupling between
1137
+ d(x) and d(y). Thus, we can used it to determine the value
1138
+ of the empirical coupling parameter η, see Eq. (12). Our
1139
+ value η = 10 was selected because it is roughly the mean
1140
+ value for ϕ = 0°.
1141
+ Final Parameters of �dx(κx) and �dy(κy).
1142
+ Eliminating the
1143
+ dependency of the α- and β-parameters on the pull di-
1144
+ rection ϕ will results in parameters that are valid inside
1145
+ the entire x- or y-zone. For this, we combine the different
1146
+ estimates as:
1147
+ lg α(x)
1148
+ a
1149
+ := 1
1150
+ |X|
1151
+
1152
+ ϕ∈X
1153
+ lg α(x)
1154
+ a,ϕ,
1155
+ lg α(y)
1156
+ a := 1
1157
+ |Y|
1158
+
1159
+ ϕ∈Y
1160
+ lg α(y)
1161
+ a,ϕ, (14a)
1162
+ β(x)
1163
+ a
1164
+ := 1
1165
+ |X|
1166
+
1167
+ ϕ∈X
1168
+ β(x)
1169
+ a,ϕ,
1170
+ β(y)
1171
+ a
1172
+ := 1
1173
+ |Y|
1174
+
1175
+ ϕ∈Y
1176
+ β(y)
1177
+ a,ϕ,
1178
+ (14b)
1179
+ where X contains all the pull directions associated to the
1180
+ x- and Y the ones associated to the y-zone. Parameters
1181
+ associated to the transversal directions are simply ignored,
1182
+ e.g. lg α(y)
1183
+ a,ϕ=0°. Further, the functional form of �dx(κx) and
1184
+ �dy(κy) is still given by Eq. (12), just without the depen-
1185
+ dency on ϕ. Note that Eq. (14) weights the different pull
1186
+ directions equally.
1187
+ 3.3. Test of the Damage Evolution Law �D(#–κ)
1188
+ We now evaluate how well the damage function is able
1189
+ to predict the damage of a fully discrete simulation. For
1190
+ this purpose, the MultiLoadSim simulations are used.
1191
+ Figure 10: Damage eigenvalues for the three different loading paths, de-
1192
+ scribed in Sec. 2.6.2, with final strain εfin = 0.002, plotted against
1193
+ τ := ˜κ/2 εfin. Using a fully discrete simulation (solid) as reference and
1194
+ the CDM damage law �
1195
+ D(#–
1196
+ κ ) (dash-dotted).
1197
+ The colours indicates the
1198
+ three different loading paths. The distortion of the lattices was a = 0.3.
1199
+ Fig. 10 shows the results of such an experiment for
1200
+ εfin = 0.002. We can see the eigenvalues, once computed
1201
+ for the reference (solid), i.e. a fully discrete simulation,
1202
+ and alternatively computed by the damage function �D(#–κ)
1203
+ (dash-dotted), i.e.
1204
+ CDM. They are plotted against the
1205
+ normalised total strain τ := ˜κ/2 εfin. Thus, both the X-
1206
+ ThenYSim (orange) and the YThenXSim (green) load paths
1207
+ switch from an uni-axial to a bi-axial strain state at τ =
1208
+ 0.5. We observe that irrespective of the loading path the
1209
+ same final damage values are reached. The value depends
1210
+ on the used method, since the final value of the CDM is
1211
+ different from the reference value. Note that this is not
1212
+ problematic since the CDM is only used during the initial
1213
+ phase.
1214
+ 11
1215
+
1216
+ 2.0
1217
+ a
1218
+ =0.0
1219
+ c-dominated
1220
+ a = 0.1
1221
+ a = 0.2
1222
+ 1.0
1223
+ a = 0.3
1224
+ a = 0.5
1225
+ [-] (
1226
+ a = 0.7
1227
+ a
1228
+ = 0.8
1229
+ 0.0
1230
+ ‘p)S
1231
+ y-dominated
1232
+ -1.0
1233
+ X
1234
+ -2.0
1235
+ 0
1236
+ 20
1237
+ 40
1238
+ 60
1239
+ 80
1240
+ 6e
1241
+ 10-3
1242
+ 10-4
1243
+ 10-5
1244
+ (a)p
1245
+ 10-6
1246
+ 10-7
1247
+ (b)
1248
+ 10-3
1249
+ 10-4
1250
+ I
1251
+ 10-5
1252
+ (r)p
1253
+ 10-6
1254
+ ref. BothXY
1255
+ 10-7
1256
+ ref. XThenY
1257
+ ref. YThenX
1258
+ CDM
1259
+ 0.0
1260
+ 0.2
1261
+ 0.4
1262
+ 0.6
1263
+ 0.8
1264
+ 1.0
1265
+ T := K/2efin [-]Fig. 10 also demonstrates that the damage for the X-
1266
+ ThenYSim and YThenXSim are very similar to each other.
1267
+ However, the eigenvalues are flipped, which is the expected
1268
+ behaviour. During the first half of the loading (i.e. τ <
1269
+ 0.5), the prediction of the dominant eigenvalue matches
1270
+ well with the reference value for both loading paths. At
1271
+ the same time, the non-dominant eigenvalue, i.e. the one
1272
+ belonging to the transverse direction, is captured with less
1273
+ but still acceptable accuracy.
1274
+ The mismatch is entirely
1275
+ due to the rather crude choice of the η coupling parameter
1276
+ (see Eq. (12)). However, it indicates that the proposed
1277
+ coupling is indeed working.
1278
+ Nevertheless, for the second half of the loading (i.e. τ >
1279
+ 0.5) the CDM is unable to capture the evolution to a satis-
1280
+ factory degree. In case of XThenYSim (orange lines), we see
1281
+ that the CDM approximation of the x-eigenvalue d(x) re-
1282
+ mains constant, since κx is not affected by a loading along
1283
+ the y-axis. However, we see that in the reference system
1284
+ d(x) continuously increase (see Fig. 11 for more). The y-
1285
+ eigenvalue d(y) predicted by the CDM remains initially
1286
+ constant due to the coupling. Once �dy(κy) has become
1287
+ larger than �
1288
+ dx(εfin)/η �dy(κy) starts to increase. However,
1289
+ as it can be seen form Fig. 10b, the reference d(y) starts
1290
+ to increase almost immediately.
1291
+ A different case is the BothXYSim loading path. From
1292
+ Fig. 10, it seems that for τ < 0.5 its damage grows slower
1293
+ than the dominant damage observed for the other two
1294
+ paths. This is because BothXYSim only has half the num-
1295
+ bers of loading steps the other two have. If this is corrected
1296
+ for then it would actually grow faster. This indicates that
1297
+ there is some form of coupling between the two directions
1298
+ that is not considered correctly.
1299
+ In Fig. 11, we can see how the final damage, i.e. val-
1300
+ ues of d(x) and d(y) at εxx = εyy = εfin, depend on the
1301
+ control parameter εfin, using either the reference (solid
1302
+ lines), the CDM (dash-dotted lines) or the reconstruction
1303
+ (dashed lines). The colours distinguish the three different
1304
+ load paths that were tested (see Sec. 2.6.2). The collapse
1305
+ of the lines indicate that the damage is indeed path in-
1306
+ dependent, regardless of the final strain εfin. However,
1307
+ the final value depends on the particular method that was
1308
+ used. In in Fig. 10, we observe a gap between the final
1309
+ damage attained by the reference and the one predicted
1310
+ by the CDM. We can now see that this gap is systematic
1311
+ and actually increases with larger εfin. This is again in-
1312
+ dicating that there is some form of coupling between the
1313
+ directions that is not take into account yet.
1314
+ 3.4. Estimation of the Transfer Function #–�r (#–κ)
1315
+ Our procedure to reconstruct a discrete lattice repre-
1316
+ sentation based on a damaged continuum state (presented
1317
+ in Sec. 2.5) requires two unknown quantities: First, the
1318
+ transfer function #–�r (#–κ), which maps the continuum state
1319
+ #–κ to the corresponding discrete surrogate state #–r . Sec-
1320
+ ond, the directional weight parameter k, which balances
1321
+ the orientation and the strength of a beam during the re-
1322
+ Figure 11: Final value of the d(x) and d(y) damage eigenvalues, com-
1323
+ puted using the reference (solid), CDM (dash doted) and reconstruction
1324
+ (dashed) method, plotted against εfin. The colours indicate the three
1325
+ different loading cases from Sec. 2.6.2. All lattices have a distortion of
1326
+ a = 0.3.
1327
+ construction process (see Eq. (9)).
1328
+ Analogously to the
1329
+ determination of the damage function, the data from the
1330
+ UniformSim is used.
1331
+ Functional Form of �rx(κx) and �ry(κy).
1332
+ As mentioned be-
1333
+ fore, it is impossible to measure the components of #–r di-
1334
+ rectly. However, as outlined in Sec. 2.6.1 #–r is connected
1335
+ to the ratio of failed beam as �r = ∥#–r ∥1 = Nf/NT
1336
+ != rα.
1337
+ Thus, we can estimate #–r indirectly. Fig. 12 shows �r for
1338
+ the pull direction ϕ = 0° at various distortion levels. As we
1339
+ can see, the distortion level has only minor influence. Dif-
1340
+ ferent pull directions do not lead to a qualitative change
1341
+ (data not shown). For that reason, we approximate the
1342
+ mean rfb as
1343
+ �r ≈
1344
+ ���#–�r (#–κ)
1345
+ ���
1346
+ 1 := �r(κ; a, ϕ) := α(r)
1347
+ a,ϕ · κβ(r)
1348
+ a,ϕ,
1349
+ (15)
1350
+ with the two fit parameters α(r)
1351
+ a,ϕ and β(r)
1352
+ a,ϕ. Both depend
1353
+ on the distortion a and the pull direction ϕ. Due to our
1354
+ 12
1355
+
1356
+ 0.007
1357
+ 0.006
1358
+ 0.005
1359
+ 0.004
1360
+ (c)p
1361
+ 0.003
1362
+ 0.002
1363
+ 0.001
1364
+ 0.000
1365
+ b
1366
+ 0.007
1367
+ k = 6, a= 0.3
1368
+
1369
+ ref. BothXY
1370
+ 0.006
1371
+ ref. XThenY
1372
+ ref. YThenX
1373
+ 0.005
1374
+ CDM
1375
+ -王-
1376
+ PD, k = 6
1377
+ I
1378
+ 0.004
1379
+ (r)p
1380
+ 0.003
1381
+ 0.002
1382
+ 0.001
1383
+ 0.000
1384
+ 0.0005
1385
+ 0.0010
1386
+ 0.0015
1387
+ 0.0020
1388
+ 0.0025
1389
+ fin [-]Figure 12: ⟨˜r⟩ := �
1390
+ ∥#–r ∥1
1391
+
1392
+ for pull direction ϕ = 0°, at different values
1393
+ of the distortion parameter a.
1394
+ No qualitative change is observed for
1395
+ different pull directions ϕ.
1396
+ previous assumptions, we can identify its argument κ di-
1397
+ rectly with �κ. To eliminate the dependency on ϕ we use
1398
+ the same method as for the damage function (see Sec. 3.2).
1399
+ However, parameters associated to pull directions in X are
1400
+ used to determine �rx(κx), while the ones belonging to Y
1401
+ determine �ry(κy). This will transform the approximation
1402
+ of the scalar quantity
1403
+ ���#–�r (#–κ)
1404
+ ���
1405
+ 1 into the one for #–�r (#–κ).
1406
+ For the discussion about the estimated α- and β-para-
1407
+ meters please see Appendix A.
1408
+ Directional Weight Parameter k.
1409
+ The empirical tuning
1410
+ parameter k influences the selection of beams during the
1411
+ reconstruction process. It balances a beam’s strength, i.e.
1412
+ its elongation threshold εth, against how well it aligns with
1413
+ the damage basis #–t α (see Sec. 2.5). We determine k such
1414
+ that the reconstructed damage variable D resembles the
1415
+ reference damage D most closely. To this end, we define
1416
+ Υk:=
1417
+ ��D11−D11
1418
+ ��
1419
+ ℓ2+
1420
+ ��D22−D22
1421
+ ��
1422
+ ℓ2+2
1423
+ ��D12−D12
1424
+ ��
1425
+ ℓ2 (16)
1426
+ as a measure of separation between the two damages. For
1427
+ minimising Υk, we select a heuristic approach, in which
1428
+ the reconstruction process (see Sec. 2.5) is run for differ-
1429
+ ent values of k.
1430
+ The k that minimises Υk will then be
1431
+ used for the remaining part of this paper. However, for
1432
+ this particular reconstruction process, the used α(r)- and
1433
+ β(r)-parameters still depended on ϕ. Further, zoning was
1434
+ ignored and as damage basis the pull direction ϕ was used.
1435
+ The underlying lattice was not distorted. From Fig. 13 we
1436
+ see that k = 6 minimises Υk independent of the pull di-
1437
+ rection. We also see that pull directions { 30°, 90° } seem
1438
+ to be almost unaffected by k, however, their values match
1439
+ Υk=6. This is an artefact caused by the regular structure
1440
+ of the underlying lattice and the scalar product used in the
1441
+ definition of the selection probability (see Eq. (9)). How-
1442
+ ever, this artefact is indicating that k = 6 is indeed a good
1443
+ Figure 13: Υk, Eq. (16), for some values of k and various pull directions.
1444
+ The reconstruction process was done on regular grids, without zoning.
1445
+ Further the pull direction and its orthogonal was used as damage basis.
1446
+ choice.
1447
+ 3.5. Tests of the Reconstruction Process
1448
+ Now we evaluate the performance of the proposed
1449
+ reconstruction scheme to create a mechanically equiva-
1450
+ lent lattice, based solely on the continuum state #–κ (see
1451
+ Sec. 2.5). For verification, we use the MultiLoadSim sim-
1452
+ ulations (see Sec. 2.6.2).
1453
+ In addition, we use the Re-
1454
+ constrSim simulations to simulate a refinement step (see
1455
+ Sec. 2.6.3).
1456
+ The MultiLoadSim Results.
1457
+ In Fig. 14, we see the re-
1458
+ sults from the MultiLoadSim setup with εfin = 0.002
1459
+ (see Sec. 2.6.2).
1460
+ They impose the bi-axial strain state
1461
+ εxx = εyy = εfin, but with loading applied via three dif-
1462
+ ferent paths. We used this setup before to assess the CDM
1463
+ (see Sec. 3.3). An important note concerning the recon-
1464
+ structed states is, that in each loading step the lattice and
1465
+ hence the damage is constructed anew. Thus, although it
1466
+ looks like a damage evolution, the damage at any loading
1467
+ step has no connection to the previous one. However, each
1468
+ time the same undamaged but distorted lattice was used.
1469
+ If we now compare the damage from the references
1470
+ (solid lines) with the one from the reconstructed lattices
1471
+ (dashed lines) in Fig. 14, we see that the overall dam-
1472
+ age values are very similar to the ones obtained by the
1473
+ CDM. As before, we observe that for τ < 0.5 the dom-
1474
+ inant eigenvalues, i.e.
1475
+ d(x) for XThenYSim and d(y) for
1476
+ YThenXSim, are captured well. Then, for τ > 0.5, these
1477
+ reconstructed eigenvalues stop growing and thus deviate
1478
+ from the references (solid lines).
1479
+ An effect we observed
1480
+ for CDM (dashed lines), too. But if we look at the other
1481
+ eigenvalues, i.e. d(y) for XThenYSim (orange) and d(x) for
1482
+ the YThenXSim (green), we see that they start to increase
1483
+ almost immediately like the reference. This was not the
1484
+ case for the CDM (dash-dotted lines shown in Fig. 10).
1485
+ 13
1486
+
1487
+ 10-2
1488
+ 0=0.0°
1489
+ 00=D
1490
+ 10-3
1491
+ a = 0.1
1492
+ a = 0.2
1493
+ a = 0.3
1494
+ 10-4
1495
+ a = 0.5
1496
+ 10-5
1497
+ 10-6
1498
+ 10-7
1499
+ 10-4
1500
+ 10-3
1501
+ i [-]a = 0.0
1502
+ β = 0.0°
1503
+ § = 15.0°
1504
+ § = 30.0°
1505
+ § = 45.0°
1506
+ P = 60.0°
1507
+ Φ = 75.0°
1508
+ = 90.0°
1509
+ 6
1510
+ 10-4
1511
+ 1
1512
+ 4
1513
+ 6
1514
+ 8
1515
+ k [-]Figure 14: Damage eigenvalues for the three different loading paths, de-
1516
+ scribed in Sec. 2.6.2, with final strain εfin = 0.002, plotted against
1517
+ τ := ˜κ/2 εfin. Using fully discrete simulations (solid) as reference and the
1518
+ reconstructed damage (dashed). The colours indicate the three different
1519
+ loading paths that were taken. The distortion of the lattices was a = 0.3.
1520
+ See Fig. 10 for the damage evolution predicted by the CDM.
1521
+ The reconstruction process is affected by the ignored cou-
1522
+ pling between the directions as well. However, the damage
1523
+ eigenvalues generated by it follow the reference much bet-
1524
+ ter than the ones computed by the CDM.
1525
+ The ReconstrSim Results.
1526
+ Now we are using the Recon-
1527
+ strSim simulation setup, described in Sec. 2.6.3. The lat-
1528
+ tices that are used here were reconstructed for the con-
1529
+ tinuum state #–κ = (�ε, 0)T. The system is loaded under
1530
+ uni-axial strain along the x-axis, starting at �ε. This setup
1531
+ simulates how a discrete region that was loaded up to �ε, as
1532
+ continuum and then refined behaves upon further loading.
1533
+ In Fig. 15, we see how the damage eigenvalues d(x) and
1534
+ d(y) (dashed and dotted lines, respectively) and the rfb �r
1535
+ (solid lines), evolve for different reconstruction strains �ε,
1536
+ indicated by different colours. The grey lines correspond
1537
+ to the reference without any reconstruction.
1538
+ The circles in Fig. 15 indicate the values for d(x), d(y)
1539
+ and �r have in the reconstructed lattice before any loading
1540
+ was applied to them. The circles associated to ∥#–r ∥1 show,
1541
+ Figure 15: Behaviour of the d(x) and d(y) damage eigenvalues and �r.
1542
+ Colours indicate different reconstruction parameters �ε. Grey is the ref-
1543
+ erence, i.e. no reconstruction. Circles indicate damage/rfb values of the
1544
+ lattices directly after reconstruction. Squares indicate damage/rfb values
1545
+ of the lattices for an applied strain of �ε.
1546
+ that the reconstructed lattices have a matching rfb value �r
1547
+ which is a consequence of its construction. It is, however,
1548
+ much more important, that the reconstructed d(x) eigen-
1549
+ value (circles), matches the one predicted by the reference.
1550
+ Thus the process is able to reconstruct the dominant eigen-
1551
+ value.
1552
+ We are also observing that d(y) are not as well re-
1553
+ constructed.
1554
+ This is a consequence of the assumptions
1555
+ that the components of #–r are independent.
1556
+ Since Re-
1557
+ constrSim only impose strains along the x-axis, we have
1558
+ κy ≡ 0 ⇒ ry ≡ 0. Thus, the reconstructed y-eigenvalues
1559
+ we are seeing are caused by a directional sampling effect
1560
+ created during the reconstruction of the damage. How-
1561
+ ever, since d(y) is the non-dominant eigenvalue, we expect
1562
+ and allow that it is less well reconstructed.
1563
+ The squares in Fig. 15 indicate the state of the lat-
1564
+ tices after an uni-axial strain of �ε along the x-axis was
1565
+ applied to them. The difference between a square and its
1566
+ associated circle proves that this strain causes the failure
1567
+ of additional beams. If the reconstruction process would
1568
+ work perfectly, any strain below or equal �ε should not lead
1569
+ to the failure of any beam. Therefore, we might have re-
1570
+ moved the right number of beams and these were more or
1571
+ less correctly oriented, the selection of some of them was
1572
+ not fully optimal.
1573
+ Furthermore, we see that for subsequent loading steps,
1574
+ the damage and rfb continue to increase (Fig. 15). While
1575
+ the observed values for the restored systems remain above
1576
+ the reference, the restored lattices slowly converge towards
1577
+ them. This is because the damage created by the subse-
1578
+ quent loading steps starts to dominate the artificial one,
1579
+ 14
1580
+
1581
+ e
1582
+ 10-3
1583
+ 10-4
1584
+ (a)p
1585
+ 10-5
1586
+ 10-6
1587
+ 10-7
1588
+ (b)
1589
+ 10-3
1590
+ 10-4
1591
+
1592
+ (6)p
1593
+ 10-5
1594
+ a = 0.3, fin = 0.002
1595
+ 10-6
1596
+ ref. BothXY
1597
+ ref. XThenY
1598
+ ref. YThenX
1599
+ PD. k = 6
1600
+ 10-7
1601
+ 0.0
1602
+ 0.2
1603
+ 0.4
1604
+ 0.6
1605
+ 0.8
1606
+ 1.0
1607
+ T := K/2efin [-]= 0.003
1608
+ = 0.002
1609
+ = 0.001
1610
+ =0.0
1611
+ d(c)
1612
+ 10-2
1613
+ d(y)
1614
+ 10-3
1615
+ 10-4
1616
+ k = 6, a = 0.3
1617
+ 10-5
1618
+ = 0.001
1619
+ = 0.003
1620
+ 10-6
1621
+ = 0.002
1622
+ restored: after loading
1623
+ restored: before loading
1624
+ 0.000
1625
+ 0.001
1626
+ 0.002
1627
+ 0.003
1628
+ 0.004
1629
+ 0.005
1630
+ i [-]that we created through the restoration process.
1631
+ 4. Summary and Conclusion
1632
+ In this study, we presented a generic approach for the
1633
+ creation of a discrete twin of a continuum representation
1634
+ containing an initial damage. The discrete twin’s damage
1635
+ is created in such a way, that it is mechanically consistent
1636
+ to the original’s continuum damage. This is a step towards
1637
+ adaptive multi-scale simulations, which take the state of
1638
+ the coarse description of a region into account upon its
1639
+ refinement.
1640
+ While the method is general and has no restrictions
1641
+ concerning the used numerical representations, we pre-
1642
+ sented it in form of a concrete example. As continuum
1643
+ representation, we have used FEM with CDM as damage
1644
+ measure.
1645
+ For the discrete representation, we have used
1646
+ a lattice based on a triangular grid consisting of brittle
1647
+ beam-truss elements.
1648
+ One part of our method is the damage measure used
1649
+ inside the continuum representation. This measure is used
1650
+ during the initial continuum phase to track the evolving
1651
+ continuum damage. Unlike classical CDM, that are cali-
1652
+ brated to match the degradation of a particular material,
1653
+ we calibrated the CDM against the degeneration of the
1654
+ discrete numerical representation. Thus, it measures the
1655
+ degeneration that would occur on a hypothetical fine scale
1656
+ representation.
1657
+ We saw that the determined CDM is indeed able to
1658
+ capture the damage caused by uni-axial strains to a sat-
1659
+ isfying degree. However, for bi-axial loading, the CDM is
1660
+ unable to achieve the same. This is explained by the as-
1661
+ sumption that the directions are independent. Directional
1662
+ coupling must be used to further improve the CDM’s ac-
1663
+ curacy
1664
+ The second part of our method is the ability to con-
1665
+ struct a discrete damage that is mechanically consistent
1666
+ to a given continuum state #–κ. Since this problem is obvi-
1667
+ ously not unique, we devised a stochastic scheme to gen-
1668
+ erate representations containing such a particular discrete
1669
+ damage.
1670
+ We have seen, that the reconstruction process is indeed
1671
+ able to create discrete lattices, whose initial degeneration
1672
+ is consistent with the given continuum state #–κ. A draw-
1673
+ back is, that imposing a strain that corresponds to #–κ it-
1674
+ self, leads to the failing of some additional beams. This
1675
+ is indicating that the selection process needs to be further
1676
+ refined. Furthermore, as for the CDM, we observed prob-
1677
+ lems for bi-axial strains, which are again caused by the
1678
+ independence assumed between the directions.
1679
+ Nevertheless, our data is indicating that our approach
1680
+ works well for the case of uni-axial loading and is in prin-
1681
+ cipal able to work for bi-axial loading. The next step is to
1682
+ integrate our method into an adaptive multi-scale simula-
1683
+ tion scheme.
1684
+ 5. CRediT
1685
+ Philip Müller: Conceptualisation, Methodology, Soft-
1686
+ ware, Validation, Writing - Original Draft, Visualisation;
1687
+ Falk Wittel: Conceptualisation, Writing - Review & Edit-
1688
+ ing, Supervision; David Kammer: Conceptualisation, Writ-
1689
+ ing - Review & Editing, Supervision.
1690
+ 6. Declaration of Competing Interest
1691
+ The authors declare that they have no known compet-
1692
+ ing financial interests or personal relationships that could
1693
+ have appeared to influence the work reported in this paper.
1694
+ 7. Data Availability
1695
+ The simulation data generated in this study have been
1696
+ deposited in the ETH Research collection database avail-
1697
+ able at TBA.
1698
+ 15
1699
+
1700
+ Appendix A. Parameters of �rx(κx) and �ry(κy)
1701
+ The fitting parameters (see Eq. (15)) of the ratio of
1702
+ failed beams (rfb) �r, denoted as α(r)
1703
+ a,ϕ and β(r)
1704
+ a,ϕ were esti-
1705
+ mated in the same way as the ones for the two damage
1706
+ functions �dx(κx) and �dy(κy). However, they behave much
1707
+ more stable and thus show less variations.
1708
+ Figs. A.16a
1709
+ Figure A.16:
1710
+ Dependence of the two fitting parameters of Eq. (15),
1711
+ lg α(r)
1712
+ a, ϕ (a) and β(r)
1713
+ a, ϕ (b), on the pull direction ϕ.
1714
+ Colours indicating
1715
+ different distortion levels a. The error bars is given by the 95% confi-
1716
+ dence interval.
1717
+ show the values for the α- and A.16b for the β-parameters.
1718
+ Compared with the parameters we obtained for the dam-
1719
+ age law (see Fig. 8), we see much less variability here. This
1720
+ is because it is far easier to measure this quantity than the
1721
+ damage.
1722
+ 16
1723
+
1724
+ 4.80
1725
+ 4.75
1726
+ 4.70
1727
+ 4.65
1728
+ 4.60
1729
+ 4.55
1730
+ 4.50
1731
+ 4.45
1732
+ 3.100
1733
+ 3.075
1734
+ 3.050
1735
+ 3.025
1736
+ 3.000
1737
+ 2.975
1738
+ a= 0.0
1739
+ 2.950
1740
+ a = 0.1
1741
+ a= 0.2
1742
+ 2.925
1743
+ a= 0.3
1744
+ a = 0.5
1745
+ 2.900
1746
+ 0
1747
+ 20
1748
+ 40
1749
+ 60
1750
+ 80
1751
+ [oReferences
1752
+ Anciaux, G., O. Coulaud, J. Roman, and G. Zerah (2008). “Ghost force reduction and spectral analysis of the 1 D
1753
+ bridging method”. In: Bulletin of Sociological Methodology/Bulletin de Méthodologie Sociologique. Vol. 37. doi: 10.
1754
+ 1177/075910639203700105.
1755
+ Bauman, P. T., H. B. Dhia, N. Elkhodja, J. T. Oden, and S. Prudhomme (2008). “On the application of the Arlequin
1756
+ method to the coupling of particle and continuum models”. In: Computational Mechanics 42.4. doi: 10.1007/s00466-
1757
+ 008-0291-1.
1758
+ Brancherie, D. and A. Ibrahimbegovic (2009). “Novel anisotropic continuumdiscrete damage model capable of represent-
1759
+ ing localized failure of massive structures: Part I: theoretical formulation and numerical implementation”. In: Engi-
1760
+ neering Computations 26.1/2. Ed. by A. Ibrahimbegovic, I. Koar, and P. Marovi. doi: 10.1108/02644400910924825.
1761
+ Braun, M., I. Iváñez, and M. P. Ariza (2021). “A numerical study of progressive damage in unidirectional composite
1762
+ materials using a 2D lattice model”. In: Engineering Fracture Mechanics 249. doi: 10.1016/j.engfracmech.2021.
1763
+ 107767.
1764
+ Chen, H., Y. Jiao, and Y. Liu (2016). “A nonlocal lattice particle model for fracture simulation of anisotropic materials”.
1765
+ In: Composites Part B: Engineering 90. doi: 10.1016/j.compositesb.2015.12.028.
1766
+ Chen, L., W. Sun, B. Chen, Z. Shi, J. Lai, and J. Feng (2021). “Multiscale study of fibre orientation effect on pullout
1767
+ and tensile behavior of steel fibre reinforced concrete”. In: Construction and Building Materials 283. doi: 10.1016/
1768
+ j.conbuildmat.2021.122506.
1769
+ Chen, P. Y., M. Chantharayukhonthorn, Y. Yue, E. Grinspun, and K. Kamrin (2021). “Hybrid discrete-continuum
1770
+ modeling of shear localization in granular media”. In: Journal of the Mechanics and Physics of Solids 153. doi:
1771
+ 10.1016/j.jmps.2021.104404.
1772
+ Delaplace, A. and R. Desmorat (2008). “Discrete 3D model as complimentary numerical testing for anisotropic damage”.
1773
+ In: International Journal of Fracture 148.2. doi: 10.1007/s10704-008-9183-9.
1774
+ Desmorat, R., F. Gatuingt, and F. Ragueneau (2007). “Nonlocal anisotropic damage model and related computational
1775
+ aspects for quasi-brittle materials”. In: Engineering Fracture Mechanics 74.10. doi: 10.1016/j.engfracmech.2006.
1776
+ 09.012.
1777
+ Evangelista, F., G. d. S. Alves, J. F. A. Moreira, and G. O. F. d. Paiva (2020). “A globallocal strategy with the
1778
+ generalized finite element framework for continuum damage models”. In: Computer Methods in Applied Mechanics
1779
+ and Engineering 363. doi: 10.1016/j.cma.2020.112888.
1780
+ Evangelista, F. and J. F. A. Moreira (2020). “A novel continuum damage model to simulate quasi-brittle failure in mode
1781
+ I and mixed-mode conditions using a continuous or a continuous-discontinuous strategy”. In: Theoretical and Applied
1782
+ Fracture Mechanics 109. doi: 10.1016/j.tafmec.2020.102745.
1783
+ Gaede, O., A. Karrech, and K. Regenauer-Lieb (2013). “Anisotropic damage mechanics as a novel approach to improve
1784
+ pre- and post-failure borehole stability analysis”. In: Geophysical Journal International 193.3. doi: 10.1093/gji/
1785
+ ggt045.
1786
+ Guidault, P.-A. and T. Belytschko (2007). “On the L2 and the H1 couplings for an overlapping domain decomposition
1787
+ method using Lagrange multipliers”. In: International Journal for Numerical Methods in Engineering 70.3. doi:
1788
+ 10.1002/nme.1882.
1789
+ Herrmann, H. J., A. Hansen, and S. Roux (1989). “Fracture of disordered, elastic lattices in two dimensions”. In: Physical
1790
+ Review B 39.1. doi: 10.1103/PhysRevB.39.637.
1791
+ Lemaître, J., ed. (2001). Handbook of materials behavior models. San Diego, CA: Academic Press. isbn: 978-0-12-443341-0.
1792
+ Lemaître, J. (1996). A Course on Damage Mechanics. Berlin, Heidelberg: Springer Berlin Heidelberg. doi: 10.1007/978-
1793
+ 3-642-18255-6.
1794
+ Lemaître, J. and R. Desmorat (2005). Engineering damage mechanics: ductile, creep, fatigue and brittle failures. Berlin
1795
+ ; New York: Springer. doi: 10.1007/b138882.
1796
+ Liu, J. (2018). “Multi-scale FEM-DEM model for granular materials : micro-scale boundary conditions, statics and
1797
+ dynamics”. PhD thesis. Technische Universiteit Eindhoven. isbn: 978-90-386-4621-3.
1798
+ Mazars, J. and J. Lemaître (1985). “Application of Continuous Damage Mechanics to Strain and Fracture Behavior of
1799
+ Concrete”. In: Application of Fracture Mechanics to Cementitious Composites. Ed. by S. P. Shah. Vol. 94. NATO ASI
1800
+ Series. Dordrecht: Springer Netherlands. doi: 10.1007/978-94-009-5121-1_17.
1801
+ Mier, J. G. M. van (2017). Fracture Processes of Concrete: Assessment of Material Parameters for Fracture Models.
1802
+ 1st ed. CRC Press. doi: 10.1201/b22384.
1803
+ Moukarzel, C. and H. J. Herrmann (1992). “A vectorizable random lattice”. In: Journal of Statistical Physics 68.5-6. doi:
1804
+ 10.1007/BF01048880.
1805
+ Oliver-Leblond, C., R. Desmorat, and B. Kolev (2021). “Continuous anisotropic damage as a twin modelling of discrete bi-
1806
+ dimensional fracture”. In: European Journal of Mechanics - A/Solids 89. doi: 10.1016/j.euromechsol.2021.104285.
1807
+ 17
1808
+
1809
+ Ostoja-Starzewski, M. (2008). Microstructural randomness and scaling in mechanics of materials. CRC series–modern
1810
+ mechanics and mathematics. Boca Raton: Chapman & Hall/CRC. doi: 10.1201/9781420010275.
1811
+ Reddy, J. N. (1997). “On locking-free shear deformable beam finite elements”. In: Computer Methods in Applied Mechanics
1812
+ and Engineering. Containing papers presented at the Symposium on Advances in Computational Mechanics 149.1.
1813
+ doi: 10.1016/S0045-7825(97)00075-3.
1814
+ Reddy, J. N., C. M. Wang, and K. Y. Lam (1997). “Unified Finite Elements Based on the Classical and Shear Deformation
1815
+ Theories of Beams and Axisymmetric Circular Plates”. In: Communications in Numerical Methods in Engineering
1816
+ 13.6. doi: 10.1002/(SICI)1099-0887(199706)13:6<495::AID-CNM82>3.0.CO;2-9.
1817
+ Richart, N. and J. F. Molinari (2015). “Implementation of a parallel finite-element library: Test case on a non-local
1818
+ continuum damage model”. In: Finite Elements in Analysis and Design 100. doi: 10.1016/j.finel.2015.02.003.
1819
+ Rodrigues, E. A., O. L. Manzoli, L. A. G. Bitencourt, T. N. Bittencourt, and M. Sánchez (2018). “An adaptive concurrent
1820
+ multiscale model for concrete based on coupling finite elements”. In: Computer Methods in Applied Mechanics and
1821
+ Engineering 328. doi: 10.1016/j.cma.2017.08.048.
1822
+ Unger, J. F., S. Eckardt, and C. Konke (2011). “A mesoscale model for concrete to simulate mechanical failure”. In:
1823
+ Computers and Concrete 8.4. doi: 10.12989/CAC.2011.8.4.401.
1824
+ Unger, J. F. and S. Eckardt (2011). “Multiscale Modeling of Concrete”. In: Archives of Computational Methods in
1825
+ Engineering 18.3. doi: 10.1007/s11831-011-9063-8.
1826
+ Vardoulakis, I. (2019). Cosserat Continuum Mechanics: With Applications to Granular Media. Vol. 87. Lecture Notes in
1827
+ Applied and Computational Mechanics. Cham: Springer International Publishing. doi: 10.1007/978-3-319-95156-0.
1828
+ Wellmann, C. and P. Wriggers (2012). “A two-scale model of granular materials”. In: Computer Methods in Applied
1829
+ Mechanics and Engineering. Special Issue on Advances in Computational Methods in Contact Mechanics 205-208.
1830
+ doi: 10.1016/j.cma.2010.12.023.
1831
+ Wittel, F. K. (2006). “Diskrete Elemente-Modelle zur Bestimmung der Festigkeitsevolution in Verbundwerkstoffen”. PhD
1832
+ Thesis. Universität Stuttgart. isbn: 3-930683-59-8.
1833
+ Zhang, H., J. Wu, and Y. Zheng (2012). “An adaptive multiscale method for strain localization analysis of 2D periodic
1834
+ lattice truss materials”. In: Philosophical Magazine 92.28-30. doi: https://doi.org/10.1080/14786435.2012.
1835
+ 731087.
1836
+ 18
1837
+
0NFJT4oBgHgl3EQfjiwF/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
0dFQT4oBgHgl3EQfDjUj/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:8b49c52cee60bab97dd5392732161cc2ae0a08194235ab8a990537cc8d5f1e81
3
+ size 31981613
0tE3T4oBgHgl3EQfnAp3/content/tmp_files/2301.04621v1.pdf.txt ADDED
@@ -0,0 +1,1870 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Entropy of different phases formed by soft rods
2
+ Jayeeta Chattopadhyay,1 Shiang-Tai Lin,2 and Prabal K. Maiti1, a)
3
+ 1)Centre for Condensed Matter Theory, Department of Physics, Indian Institute of Science, Bangalore 560012,
4
+ India
5
+ 2)Department of Chemical Engineering, National Taiwan University, Taipei 10617, Taiwan
6
+ (Dated: 12 January 2023)
7
+ Computation of entropy in liquids and liquid crystal phases is a big challenge in statistical physics. In this work, we
8
+ extend the two-phase thermodynamic model (2PT) to shape anisotropic soft repulsive spherocylinders (SRSs) and
9
+ report the absolute values of entropy for different liquid crystal (LC) phases for a range of aspect ratios L/D = 2 − 5.
10
+ We calculate the density of states (DoS) for different LC phases and decompose it into contributions arising from
11
+ translational and rotational degrees of freedom.
12
+ The translational and rotational modes are further partitioned into
13
+ diffusive, gas-like, and non-diffusive, solid-like components using a fluidicity factor. In the dilute limit, the entropy
14
+ values obtained from the 2PT method match exactly those of an ideal rigid rotor. We find that, for a given packing
15
+ fraction, the magnitude of the total entropy is roughly equal regardless of the different LC phases associated with
16
+ different aspect ratios. We also compute the excess entropy (for L/D = 5) and compare those with the values obtained
17
+ using the standard integration approach of molecular dynamics (MD) or Monte Carlo (MC) equation of state (EOS) of
18
+ SRS. The values obtained using both approaches match very well. The rotational and translational fluidicity factors are
19
+ further used to determine the phase boundaries of different liquid crystal phases for the respective aspect ratios.
20
+ I.
21
+ INTRODUCTION
22
+ The phase behavior of shape anisotropic particles is an
23
+ emerging field of research that gives rise to various liquid
24
+ crystal (LC) phases1–3. Examples span from living organisms
25
+ like tobacco mosaic virus4–6, fd virus7 to synthetic systems
26
+ of rod-like particles like boehmite8, silica9 etc. Different liq-
27
+ uid crystal phases can be identified based on their microscopic
28
+ arrangements, as well as positional and orientational order.
29
+ Onsager, in his seminal work10, showed that a system of
30
+ thin and hard rods could undergo a phase transition from
31
+ disordered isotropic to orientationally ordered nematic phase
32
+ above a critical aspect ratio (L/D > 3.7) that is mainly driven
33
+ by entropy. The loss of orientational entropy in the nematic
34
+ phase is compensated by the increase of translational entropy
35
+ due to the ordered structure.
36
+ Similarly, for the other LC
37
+ phases, entropy plays an important role in studying the stabil-
38
+ ity of the phases. Entropy of a fluid can be expressed as a mul-
39
+ tiparticle correlation expansion of statistical entropy devel-
40
+ oped by Green and Nettleton11,12 and generalized by Lazaridis
41
+ and co-workers13,14 for the non-spherical bodies. Costa et al.
42
+ first used this method to calculate the entropy of a system of
43
+ hard spherocylinders (HSCs)15,16 and later, by Cuetos et al.17
44
+ in a system of soft repulsive spherocylinders (SRSs). It is also
45
+ worth mentioning several interesting works by Dhar et al.18,19
46
+ where they have calculated entropy of hard rods and rigid rect-
47
+ angles in 3D and 2D using analytically solvable lattice model
48
+ and MC simulations.
49
+ In 2003, Lin et al.20 developed the two-phase thermody-
50
+ namic (2PT) model to calculate the entropy, free energy, and
51
+ other thermodynamic properties of liquids from a short MD
52
+ trajectory (20 picoseconds (ps)).
53
+ 2PT model has emerged
54
+ as an efficient and accurate method in calculating various
55
+ a)Electronic mail: [email protected]
56
+ thermodynamic properties of Lennard-Jones fluids for the di-
57
+ verse setting of state points both in 2D21 and 3D20, water
58
+ in bulk22 and under different confinement, carbon dioxide23
59
+ and other organic and inorganic molecules24.
60
+ The results
61
+ match very well with those of the experimental studies. In
62
+ the 2PT method, the density of state (DoS) of a liquid, which
63
+ is calculated from the Fourier transform of the velocity auto-
64
+ correlation function (VACF), is decomposed into vibrational
65
+ (solid) and diffusive (gas) components. The thermodynamic
66
+ quantities, including entropy, are then calculated using har-
67
+ monic oscillator approximation to the solid component and
68
+ hard sphere approximation to the gas component. For the ro-
69
+ tational mode, the diffusive part is calculated from the rigid
70
+ rotor approximation20,22. In 2PT method, the entropy of a
71
+ definite state point is calculated from a single MD trajectory.
72
+ Thus, it is far more efficient than the conventional integration
73
+ approach of MD or MC equation of state of the SRS, which
74
+ entails several discrete MD/MC trajectories along the integra-
75
+ tion path. This is advantageous for the systems for which the
76
+ analytical form of the equation of state is unknown (such as
77
+ SRS).
78
+ In this work, we extend the 2PT method to calculate en-
79
+ tropy of various liquid crystal phases formed by a system
80
+ of soft repulsive spherocylinders of different aspect ratios
81
+ (length/diameter) L/D = 2,3,3.5,4 and 5. We validate our
82
+ method by comparing the entropy values obtained using the
83
+ standard integration approach of equation of state of the SRS
84
+ of L/D = 5 at T ∗ = 516,17.
85
+ We find that the entropy val-
86
+ ues do not have any strong dependence on the aspect ratio
87
+ but strongly depend on the packing fraction (η)of the system.
88
+ We also find that LC phase transitions are governed by the
89
+ change of pair entropy. The loss of orientational pair entropy
90
+ in the nematic phase is compensated by the increase of trans-
91
+ lational pair entropy. Similarly, in case of the smectic phase,
92
+ the loss of translational pair entropy is compensated by the
93
+ residual entropy arising from the multi-particle contribution.
94
+ In addition, we present an alternative way to identify the phase
95
+ boundaries of different liquid crystal phases from the fluidic-
96
+ arXiv:2301.04621v1 [cond-mat.soft] 11 Jan 2023
97
+
98
+ 2
99
+ ity factor that is directly related to the diffusivity of the sys-
100
+ tem: the packing fraction at which the translational fluidicity
101
+ ftrans saturates but rotational fluidicity frot decreases sharply
102
+ indicates the phase boundary of the isotropic to nematic (I-
103
+ N) phase transition. Similarly, the nematic to smectic (N-Sm)
104
+ transition is located where frot saturates but ftrans keeps de-
105
+ creasing.
106
+ The rest of the paper is organized as follows: In section
107
+ II, we briefly describe the theoretical background of the 2PT
108
+ method and summarize the multiparticle correlation expan-
109
+ sions method and the integration approach of equation of state
110
+ to calculate the entropy of SRS; in section III, we describe the
111
+ SRS model and the simulation protocol. We present the results
112
+ and analysis in section IV. Finally, in section V, we conclude
113
+ with the discussion on the major benefits of the 2PT method
114
+ and possible applications.
115
+ II.
116
+ MODEL AND COMPUTATIONAL DETAILS
117
+ We model the system as a collection of spherocylinders
118
+ (cylinder with hemispherical caps) of aspect ratios L/D =
119
+ 2,3,3.5,4,5. The interacting potential is only due to the ex-
120
+ cluded volume interaction described by the Weeks-Chandler-
121
+ Andersen (WCA) potential given as follows25:
122
+ USRS = 4ε[( D
123
+ dm
124
+ )12 −( D
125
+ dm
126
+ )6]+ε
127
+ if
128
+ dm < 2
129
+ 1
130
+ 6 D
131
+ = 0
132
+ if
133
+ dm ≥ 2
134
+ 1
135
+ 6 D
136
+ (1)
137
+ Here, dm is the shortest distance between two SRS that
138
+ determines their relative orientation2,17,26,27,34.
139
+ For conve-
140
+ nience, thermodynamic quantities are expressed in terms of
141
+ interaction strength ε, diameter of the SRS D and mass m:
142
+ temperature T ∗ = kBT
143
+ ε , pressure P∗ = Pvhsc
144
+ kBT , packing fraction
145
+ η = vhscρ, where ρ is the number density of the system
146
+ defined as, ρ = N
147
+ V and vhsc = πD2( D
148
+ 6 + L
149
+ 4) is the volume of the
150
+ spherocylinder; energy E∗ = E
151
+ ε , entropy S∗ = S
152
+ kB , Helmholtz
153
+ free energy A∗ = A
154
+ ε , Gibbs free energy G∗ = G
155
+ ε , diffusivity
156
+ d∗ = d( m
157
+ ε )1/2/D and the time t∗ = t
158
+
159
+ ε/m/D. To compute
160
+ entropy using 2PT method, we convert all the thermody-
161
+ namic quantities in real units using the parameters of argon
162
+ (ε = 0.238 kcal/mol, σ = 3.405Å and mass m = 39.948
163
+ g/mol) and then again convert them into the reduced units.
164
+ We build the system in a hexagonal-closed-packed (HCP)
165
+ crystal structure. As the particles are inherently anisotropic
166
+ in shape, we choose the number of particles in the x, y and
167
+ z directions such that the simulation box can be built in a
168
+ near-cubic geometry. If nx, ny, nz are the number of particles
169
+ in the x, y, z direction respectively and nu is the number of
170
+ particles in one unit cell, then the total number of particles
171
+ in one simulation box N = nu × nx × ny × nz. In our case,
172
+ number of SRSs is chosen to be N = 1024.
173
+ The periodic
174
+ boundary condition in all three directions are used.
175
+ We have carried out a series of MD simulations for a wide
176
+ range of state points spanning the melting transition from solid
177
+ (crystal) to gas (isotropic) for all the aspect ratios. We melt
178
+ the initial crystal structure slowly by reducing the pressure in
179
+ NPT ensemble (Constant particle number, pressure and tem-
180
+ perature) at T ∗ = 5 for each L/D. The positions and velocities
181
+ of the SRSs are updated using Verlet algorithm28 and the rota-
182
+ tional motion by quaternion-based rigid-body dynamics29–33.
183
+ The temperature and pressure of the system are controlled
184
+ using Berendsen thermostat and barostat35 with a tempera-
185
+ ture relaxation time τT = 0.05 and pressure relaxation time
186
+ τP = 2 respectively. We perform 1×105 to 2×105 MD steps
187
+ (with an integration time step δt = 0.001 in reduced unit) to
188
+ reach equilibrium condition and another 2−5×103 steps (5-
189
+ 30 ps in real unit using the above-mentioned parameters) with
190
+ δt = 5×10−4(1 fs)in real unit for the 2PT method.
191
+ III.
192
+ THEORY
193
+ A.
194
+ Two phase thermodynamic method
195
+ 1.
196
+ Density of State Function
197
+ The density of state (DoS) function G(ν) is defined as the
198
+ mass weighted sum of the atomic spectral densities.
199
+ This
200
+ can be obtained from Fourier transform of velocity auto-
201
+ correlation function (VACF) obtained from MD trajectory20.
202
+ G(ν) =
203
+ 1
204
+ kBT
205
+ Natom
206
+
207
+ l=1
208
+ 3
209
+
210
+ k=1
211
+ lim
212
+ τ→−∞
213
+ ml
214
+ τ
215
+ ����
216
+ � τ
217
+ −τ vk
218
+ l (t)e−i2πνtdt
219
+ ����
220
+ 2
221
+ (2)
222
+ Here, Natom is the total number of atoms in the system. ml is
223
+ mass of the lth atom and vk
224
+ l is the velocity of the lth atom in kth
225
+ direction ( k indicates spatial coordinates x,y,z respectively).
226
+ G(ν) represents distribution of normal modes in the system i.e
227
+ G(ν) dν represents number of normal modes in the frequency
228
+ range ν to ν + dν. So, total number of modes in the system
229
+ i.e degrees of freedom of the system 3N
230
+ � ∞
231
+ 0 G(ν)dν = 3N
232
+ (3)
233
+ The diffusion constant (D) of the system is directly related
234
+ to the zero-frequency density of state of the system G(0):
235
+ D = kBT
236
+ 12mN G(0)
237
+ (4)
238
+ For a rigid SRS, there is no vibrational motion. So, total
239
+ number of degrees of freedom for a rigid SRS is 5 compris-
240
+ ing 3 translational and 2 rotational motion. Therefore, total
241
+ number of modes in the system is:
242
+ � ∞
243
+ 0 G(ν)dν = 5N
244
+ (5)
245
+ Density of state G(ν) is decomposed into translational and
246
+ rotational part:
247
+ G(ν) = Gtrans(ν)+Grot(ν)
248
+ (6)
249
+
250
+ 3
251
+ where, Gtrans(ν) is obtained from the translational component
252
+ of the center of mass velocity of the SRS:
253
+ Gtrans(ν) =
254
+ 1
255
+ kBT
256
+ N
257
+
258
+ j=1
259
+ 3
260
+
261
+ k=1
262
+ lim
263
+ τ→−∞
264
+ m j
265
+ τ
266
+ ����
267
+ � τ
268
+ −τ vktrans
269
+ j
270
+ (t)e−i2πνtdt
271
+ ����
272
+ 2
273
+ (7)
274
+ here, N is the total number of SRS in the system and m j is
275
+ the mass of the SRS. vktrans
276
+ j
277
+ is the translational velocity of jth
278
+ SRS in kth direction.
279
+ Grot(ν) =
280
+ 1
281
+ kBT
282
+ N
283
+
284
+ j=1
285
+ 2
286
+
287
+ k=1
288
+ lim
289
+ τ→−∞
290
+ Ik
291
+ j
292
+ τ
293
+ ����
294
+ � τ
295
+ −τ ωk
296
+ j (t)e−i2πνtdt
297
+ ����
298
+ 2
299
+ (8)
300
+ here, Ik
301
+ j is the moment of inertia of jth SRS along kth the
302
+ principal axis. As SRS is linear, the moment of inertia along
303
+ its director is 0. Therefore, k runs from 1 to 2. ωk
304
+ j represents
305
+ the angular velocity.
306
+ 2.
307
+ Thermodynamic properties from 2PT method
308
+ Various thermodynamic quantities like energy, entropy of
309
+ a system can be expressed as a summation over the contribu-
310
+ tions from translational and rotational motion of SRS)22,23:
311
+ E = E0 +Etrans +Erot,
312
+ (9)
313
+ S = Strans +Srot.
314
+ (10)
315
+ Here, E0 is the reference energy. In 2PT method, the density
316
+ of states corresponding to translational or rotational motion is
317
+ partitioned as:
318
+ Gk(ν) = Gs
319
+ k(ν)+Gg
320
+ k(ν)
321
+ (11)
322
+ where, the subscript k stands for translational, or rotational
323
+ motion. The 1st term in Eq. 11 refers to the solid-like and the
324
+ 2nd term in Eq. 11 refers to the gas-like contributions. For a
325
+ solid-like system, the DoS can be exactly determined by that
326
+ of harmonic oscillator. But for a liquid, harmonic approxima-
327
+ tion is no longer valid at the low frequency regime due to the
328
+ strong effect of anharmonicity. Also, the diffusive model at
329
+ the zero frequency can lead to singularity. In the 2PT model,
330
+ the anharmonicity effect at the low frequency is treated by de-
331
+ composing the DoS into gas-like and solid-like components
332
+ as mentioned in Eq. 11. The gas-like component is evaluated
333
+ from the DoS at the zero frequency and the fluidicity factor fk
334
+ using the following equation :
335
+ Gg
336
+ k(ν) =
337
+ Gk(0)
338
+ 1+
339
+
340
+ πνGk(0)
341
+ 6fkN
342
+ �2 .
343
+ (12)
344
+ The fluidicity factor fk is calculated using the equation below:
345
+ 2∆−9/2
346
+ k
347
+ f 15/2
348
+ k
349
+ −6∆−3
350
+ k
351
+ f 5
352
+ k −∆−3/2
353
+ k
354
+ f 7/2
355
+ k
356
+ +6∆−3/2
357
+ k
358
+ f 5/2
359
+ k
360
+ +2fk−2 = 0,
361
+ (13)
362
+ where, ∆k is the diffusivity constant in reduced unit that is
363
+ defined as:
364
+ ∆k(T,V,N,k,Gk(0)) = 2Gk(0)
365
+ 9N
366
+ �πkBT
367
+ k
368
+ �1/2 �N
369
+ V
370
+ �1/3 � 6
371
+ π
372
+ �2/3
373
+ .
374
+ (14)
375
+ The above equation Eq.
376
+ 14 indicates ∆k only depends
377
+ on the thermodynamic state points (T,V,N) and Gk(0) that
378
+ can uniquely determines the fluidicity factor fk for different
379
+ modes. Once we calculate Gg
380
+ k(ν) from Eq. 12, the solid-like
381
+ component can be determined by subtracting it from the total
382
+ DoS Gk(ν) (Eq. 11) obtained from velocity auto-correlation.
383
+ Once we calculate Gg
384
+ k(ν) and Gs
385
+ k(ν), each component
386
+ (translational, rotational) of the thermodynamic quantities
387
+ (energy from Eq. 9 and entropy from Eq. 10) can be de-
388
+ termined by integrating the DoS using appropriate weighting
389
+ functions for the respective thermodynamic quantities:
390
+ Ek = β −1
391
+ �� ∞
392
+ 0 dνGs
393
+ k(ν)W s
394
+ E,k(ν)+
395
+ � ∞
396
+ 0 dνGg
397
+ k(ν)W g
398
+ E,k(ν)
399
+
400
+ ,
401
+ (15)
402
+ Sk = kB
403
+ �� ∞
404
+ 0 dνGs
405
+ k(ν)W s
406
+ S,k(ν)+
407
+ � ∞
408
+ 0 dνGg
409
+ k(ν)W g
410
+ S,k(ν)
411
+
412
+ ,
413
+ (16)
414
+ Ak = β −1
415
+ �� ∞
416
+ 0 dνGs
417
+ k(ν)W s
418
+ A,k(ν)+
419
+ � ∞
420
+ 0 dνGg
421
+ k(ν)W g
422
+ A,k(ν)
423
+
424
+ ,
425
+ (17)
426
+ where, β = (kBT)−1 and W g/s
427
+ l,k
428
+ is the weighting function for
429
+ thermodynamic quantity l (E/S/A) for each mode k (transla-
430
+ tion/rotation) partitioned into gas-like (g) or solid-like (s) con-
431
+ tribution. Here,
432
+ W s
433
+ E = βhν
434
+ 2
435
+ +
436
+ βhν
437
+ exp(βhν)−1,
438
+ (18)
439
+ W s
440
+ S =
441
+ βhν
442
+ exp(βhν)−1 −ln[1−exp(−βhν)],
443
+ (19)
444
+ W g
445
+ E,trans(ν) = W g
446
+ E,rot(ν) = 0.5,
447
+ (20)
448
+ W g
449
+ S,trans(ν) = 1
450
+ 3
451
+ SHS
452
+ kB
453
+ ,
454
+ (21)
455
+ W g
456
+ S,rot(ν) = 1
457
+ 3
458
+ SR
459
+ kB
460
+ (22)
461
+ where, SHS is the hard-sphere entropy and SR is the rotational
462
+ entropy of ideal gas modelled as rigid rotor:
463
+ SHS
464
+ kB
465
+ = 5
466
+ 2 +ln
467
+ ��2πmkBT
468
+ h2
469
+ �3/2 V
470
+ ftrN z(y)
471
+
472
+ + y(3y−4)
473
+ (1−y)2 , (23)
474
+ SR
475
+ kB
476
+ = 1+ln
477
+ � T
478
+ σΘr
479
+
480
+ ,
481
+ (24)
482
+
483
+ 4
484
+ here, y = f 5/2
485
+ trans/∆3/2
486
+ trans and z(y) is the compressibility factor of
487
+ hard sphere from the Carnahan-Starling equation of state36.
488
+ Θr is the rotational temperature defined as Θr =
489
+ h2
490
+ 8π2IrkB and
491
+ σ is the rotational symmetry. The reference energy now be-
492
+ comes,
493
+ E0 = EMD −β −13N(1−0.5 ftrans −0.5 frot),
494
+ (25)
495
+ where, EMD is the total energy calculated from the MD simu-
496
+ lation.
497
+ B.
498
+ Entropy using multiparticle correlation expansion method
499
+ and integration approach on the SRS equation of state
500
+ The configurational entropy Scon is defined as:13–15,17.
501
+ Scon
502
+ tot = Sid +
503
+
504
+
505
+ n=2
506
+ Sn,
507
+ (26)
508
+ where, Sid denotes the entropy of an ideal gas and Sn denotes
509
+ the entropy due to n-particle spatial correlation. Therefore,
510
+ the excess entropy can be calculated from well-known multi-
511
+ particle correlation expansion of the configurational entropy
512
+ (ME) Sex can be written as:
513
+ Sex =
514
+
515
+
516
+ n=2
517
+ Sn = Scon
518
+ tot −Sid,
519
+ (27)
520
+ If S2 represents the entropy due to pair interaction, then the
521
+ residual entropy ∆s that includes the spatial correlation for n ≥
522
+ 3 becomes:
523
+ ∆s = Sex −S2.
524
+ (28)
525
+ Pair entropy S2 can be expressed as:
526
+ S2 = Strans
527
+ 2
528
+ +Srot
529
+ 2 ,
530
+ (29)
531
+ Strans
532
+ 2
533
+ = −2πρ
534
+
535
+ [g(r)lng(r)−g(r)+1]r2dr,
536
+ (30)
537
+ Srot
538
+ 2 = 4πρ
539
+
540
+ g(r)qrot(r)r2dr,
541
+ (31)
542
+ qrot(r) = −1
543
+ 4
544
+ � π
545
+ 0 g(θ|r)sinθdθ.
546
+ (32)
547
+ In a system of linear molecules, the probability distribution
548
+ function g(r,θ) can be factorized as15, g(r,θ) = g(r)g(θ|r),
549
+ where, g(r) denotes the radial distribution and g(θ|r) denotes
550
+ the conditional probability distribution function between two
551
+ rods at a r distance with a relative angle between θ to θ +dθ.
552
+ The excess entropy can be exactly calculated using the
553
+ equation of state (EOS) of the SRS defined below17:
554
+ SEOS
555
+ ex
556
+ (ρ) = Uex
557
+ T −
558
+ � ρ
559
+ 0
560
+
561
+ P
562
+ kBTρ′ −1
563
+ � dρ′
564
+ ρ′ ,
565
+ (33)
566
+ where, Uex represents the excess energy, which is the potential
567
+ energy per particle in the units of kB.
568
+ IV.
569
+ RESULTS AND DISCUSSION
570
+ We present equilibrium phase diagram of SRS of aspect
571
+ ratios L/D = 2 − 5 at the temperature T ∗ = 5 (Fig.
572
+ 1
573
+ and Fig.7(a)).
574
+ The magnitude of the pressures and densi-
575
+ ties corresponding to different phases for different aspect ra-
576
+ tios are listed in table IV. We obtain 4 stable phases for
577
+ L/D ≥ 3.5 :17,37–40 crystal (K), smectic (Sm), nematic (N) and
578
+ isotropic (I); 3 stable phases for L/D = 3: crystal, smectic,
579
+ and isotropic and two stable phases for L/D = 2: crystal and
580
+ isotropic. For further details of these phases and their charac-
581
+ terization, we refer the reader to our earlier work39,40. Here
582
+ we are interested in entropy computations of these phases.
583
+ I
584
+ I
585
+ I
586
+ N
587
+ Sm
588
+ N
589
+ N
590
+ Sm
591
+ Sm
592
+ K
593
+ K
594
+ K
595
+ (a)
596
+ (c)
597
+ (b)
598
+ FIG. 1. (a) Equation of state (b) nematic order parameter S (c) po-
599
+ tential energy per particle U∗/N are plotted with packing fraction
600
+ η for the system of soft repulsive spherocylinders of aspect ratio
601
+ L/D = 5. Thermodynamic quantities are defined in the reduced unit:
602
+ pressure P∗ = Pvhsc/kBT and packing fraction, η = ρvhsc where vhsc
603
+ is the volume of the spherocylinder. We observe four stable phases:
604
+ isotropic (I), nematic (N), smectic (Sm) and crystal (K). The vertical
605
+ gray lines indicate boundaries between two phases.
606
+ A.
607
+ Validation of 2PT method
608
+ In the dilute limit, the entropy and Helmholtz free energy of
609
+ SRS, calculated using 2PT method, can be compared with the
610
+ values obtained for an ideal diatomic gas modeled as a rigid
611
+ rotor. The analytical expressions for the partition function Z,
612
+
613
+ 15
614
+ 10
615
+ N/n
616
+ 5
617
+ 0
618
+ 0.1
619
+ 0.2
620
+ 0.3
621
+ 0.4
622
+ 0.5
623
+ 0.6
624
+ 0.7
625
+ 0.8
626
+ 0.9
627
+ n20
628
+ 15
629
+ 10
630
+ 5
631
+ 0
632
+ 0.1
633
+ 0.2
634
+ 0.3
635
+ 0.4
636
+ 0.5
637
+ 0.6
638
+ 0.7
639
+ 0.8
640
+ 0.9
641
+ n0.8
642
+ 0.6
643
+ S
644
+ 0.4
645
+ 0.2
646
+ 0
647
+ 0.1
648
+ 0.2
649
+ 0.3
650
+ 0.40.5
651
+ 0.6
652
+ 0.7
653
+ 0.8
654
+ 0.95
655
+ entropy S, and Helmholtz free energy A of an ideal rigid rotor
656
+ are as follows:
657
+ Z(V,T) =
658
+ �2πmkBT
659
+ h2
660
+ �3/2
661
+ V 8π2IkBT
662
+ σh2
663
+ ,
664
+ (34)
665
+ S
666
+ NkB
667
+ = ln
668
+ �2π(m1 +m2)kBT
669
+ h2
670
+ �3/2 Ve5/2
671
+ N
672
+ +ln8π2IkBTe
673
+ σh2
674
+ .
675
+ (35)
676
+ A
677
+ NkBT = −
678
+
679
+ ln
680
+ �2π(m1 +m2)kBT
681
+ h2
682
+ �3/2 V
683
+ N +ln8π2IkBT
684
+ σh2
685
+ +1
686
+
687
+ .
688
+ (36)
689
+ The 1st term in Eq. 35 is due to the translational motion,
690
+ and the 2nd term is due to the rotational motion (for an ideal
691
+ rigid rotor, there is no vibrational motion). In Table I and
692
+ II, we compare the entropy of the SRS system in a dilute limit
693
+ calculated from the 2pt method with that of an ideal rigid rotor
694
+ at the same state point calculated using the above equations for
695
+ different aspect ratios which are found to be in a very good
696
+ agreement.
697
+ TABLE I. Comparison of the total Stot, translational Strans and ro-
698
+ tational Srot entropy of SRS of different aspect ratios from the 2PT
699
+ method at the temperature T ∗ = 5 and number density ρ∗ = 0.01
700
+ with that of a rigid rotor at the same state points calculated using Eq.
701
+ 35. Here, entropy is calculated in kB/particle unit.
702
+ L/D
703
+ ρ∗
704
+ Sid
705
+ trans
706
+ Sidrot
707
+ Sid
708
+ tot
709
+ S2PT
710
+ trans S2PT
711
+ rot
712
+ S2PT
713
+ tot
714
+ 5
715
+ 0.01 18.36 12.18 30.54 18.26 12.30 30.56
716
+ 3
717
+ 0.01 18.36 11.15 29.51 18.36 11.25 29.61
718
+ 2
719
+ 0.01 18.36 10.34 28.70 18.36 10.44 28.80
720
+ TABLE II. Comparison of the Helmholtz free energy of SRS of dif-
721
+ ferent aspect ratios from the 2PT method with that of the ideal rigid
722
+ rotor using Eq.36 at the dilute limit, temperature T ∗ = 5 and number
723
+ density ρ∗ = 0.01. A∗tot designates the total Helmholtz free energy
724
+ and A∗trans, A∗rot designate the translational and rotational components
725
+ respectively.
726
+ L/D
727
+ ρ∗
728
+ Aid
729
+ trans
730
+ Aidrot
731
+ Aid
732
+ tot
733
+ A2PT
734
+ trans
735
+ A2PT
736
+ rot
737
+ A2PT
738
+ tot
739
+ 5
740
+ 0.01 -84.24 -55.81 -139.95 -84.91 -55.95 -140.86
741
+ 3
742
+ 0.01 -84.24 -50.71 -134.98 -85.63 -50.65 -136.28
743
+ 2
744
+ 0.01 -84.24 -46.66 -130.88 -83.74 -48.33 -132.07
745
+ B.
746
+ Density of states of liquid crystal phases
747
+ We calculate the density of state G(ν) of different liquid
748
+ crystal phases using 2PT method as shown in Fig. 2. For
749
+ each phase, we show the total DoS and its decomposition
750
+ into translational, rotational modes.
751
+ The translational and
752
+ rotational modes are further decomposed into gas-like and
753
+ solid-like components, as mentioned in the 2PT method
754
+ section.
755
+ In Fig.2(a), we plot DoS for the state point P∗ = 1.78,η =
756
+ 0.29 which corresponds to the isotropic phase as shown in
757
+ the equilibrium phase diagram [Fig.1]. We find that both the
758
+ translational Gtrans and rotational Grot DoS are dominated by
759
+ the gas like contribution and decay exponentially. At the zero
760
+ frequency ν = 0, both of Gtrans and Grot have large finite val-
761
+ ues, indicating that the system possesses high translational
762
+ and rotational diffusivity. Similarly, in Fig.2(b), we plot DoS
763
+ of nematic phase for the state point P∗ = 6.23,η = 0.50. We
764
+ see that Gtrans decays exponentially and have a fine value at
765
+ ν = 0 indicating gas-like behaviour. However, Grot is domi-
766
+ nated by solid-like behaviour with a low rotational diffusivity.
767
+ In the case of the smectic phase ( P∗ = 8,η = 0.6), both of
768
+ the Gtrans and Grot are dominated by solid-like contribution.
769
+ However, Gtrans has a very low value at zero-frequency indi-
770
+ cating a low-diffusivity which is due to the in-layer fluid-like
771
+ motion. In crystal phase (state point P∗ = 15.13,η = 0.78),
772
+ G(ν) is roughly zero at ν = 0 indicating absence of diffusive
773
+ mode in the system. Both translational and rotational DoS
774
+ exhibit solid-like behaviour.
775
+ C.
776
+ Fluidicity factor of liquid crystal phases
777
+ The decomposition of the translational and rotational DoS
778
+ into gas-like and solid-like components is carried out by cal-
779
+ culating the fluidicity factor f as discussed in Section III-A.
780
+ We find that both of translational and rotational fluidicity fac-
781
+ tors are very high in the isotropic phase, very low in the crystal
782
+ phase and intermediate in the LC phases as mentioned in the
783
+ Table III and in Fig. 3. We also calculate the phase bound-
784
+ aries of different LC phases from the change of ftrans and frot.
785
+ In Fig.3, we find that, both of the ftrans and frot decrease
786
+ with packing fraction η in the isotropic phase. In the ne-
787
+ matic phase, ftrans remains almost constant at its value in the
788
+ isotropic phase, while frot keeps decreasing. This is also con-
789
+ sistent with the DoS calculation showing that rotational dif-
790
+ fusivity is much lower in the nematic phase than translational
791
+ diffusivity. The I-N phase boundary is therefore defined as
792
+ the packing fraction where frot keeps decreasing but ftrans be-
793
+ comes constant (η∗
794
+ I−N ≈ 0.41−0.44 for L/D = 5). Similarly,
795
+ in the Smectic phase, frot remains nearly constant at its value
796
+ in the nematic phase while ftrans drops sharply. Hence, the
797
+ N-Sm phase boundary can be located at the packing fraction
798
+ where ftrans continues to decrease but frot remains almost con-
799
+ stant (η∗
800
+ N−Sm ≈ 0.54 − 0.57 for L/D = 5). Both of ftrans and
801
+ frot acquire a very low value in the crystal phase. These anal-
802
+ yses suggest another method of quantifying the phase bound-
803
+
804
+ 6
805
+ aries using the fluidicity factor.
806
+ TABLE III. Translational and rotational fluidicity factors for different
807
+ liquid crystal phases for the aspect ratio L/D = 5.
808
+ P∗
809
+ η
810
+ ftrans
811
+ frot Phase
812
+ 1.78 0.29 0.62 0.53
813
+ I
814
+ 6.23 0.50 0.41 0.18
815
+ N
816
+ 8.01 0.60 0.26 0.07
817
+ Sm
818
+ 15.13 0.78 0.09 0.06
819
+ K
820
+ D.
821
+ Entropy calculation from 2PT method
822
+ In Table IV and in Fig.4, Fig.7, we mention the total en-
823
+ tropy Stot and its decomposition into the translational Strans
824
+ and rotational Srot modes for different liquid crystal phases
825
+ associated to different aspect ratios. We find that entropy de-
826
+ creases as a function of packing fraction for the given aspect
827
+ ratios. We also find that, at a certain packing fraction, to-
828
+ tal entropy is close by for the given aspect ratios, irrespec-
829
+ tive of the different liquid crystal phases they exhibit. As for
830
+ example, at η = 0.60, the magnitude of the total entropy is
831
+ Stot = 18.54 − 19.03 kB/particle; however, it shows smectic
832
+ structure for L/D ≥ 3 and isotropic structure for L/D = 2.
833
+ Similarly, at η = 0.54, Stot = 19.40−19.92 kB/particle while
834
+ it shows nematic structure for L/D ≥ 3.5 and isotropic struc-
835
+ ture for L/D = 3,2. These results indicate that, total entropy
836
+ depends on the thermodynamic state points only, not on the
837
+ different liquid crystal phases corresponding to different L/D
838
+ s. However, the entropy of different L/D s differs at the higher
839
+ packing fractions, as mentioned in Fig. 7(b).
840
+ In Fig.6, we calculate the pair entropy S2 of different LC
841
+ phases using Eq. 29 and its decomposition into translational
842
+ Str
843
+ 2 and rotational Srot
844
+ 2
845
+ parts. We observe that, Srot
846
+ 2
847
+ decreases
848
+ sharply at the I-N phase boundary, while Str
849
+ 2 decreases slowly.
850
+ For N-Sm transition, Str
851
+ 2 decreases more rapidly than that of
852
+ I-N phase boundary. Our results are consistent with those of
853
+ Cuetos et al.17. These analyses indicate that the change of
854
+ entropy at the LC phase transition points are mainly driven by
855
+ the translational or rotational pair entropy. The sharp decrease
856
+ of rotational pair entropy at the I-N phase boundary is com-
857
+ pensated by residual entropy ∆s arising from the multi particle
858
+ correlation (Eq. 28). Similarly, the N-Sm phase transition is
859
+ driven by the sharp decrease of translational pair entropy that
860
+ is also compensated by residual entropy.
861
+ E.
862
+ Comparison of excess entropy from 2PT method and
863
+ integrating on the SRS equation of state
864
+ We calculate the excess entropy, Sex which is defined as the
865
+ amount of entropy arises due to the particles’ interaction us-
866
+ ing Eq.27. It is calculated from the difference between the
867
+ absolute entropy calculated from the 2PT method or integrat-
868
+ ing over MD/MC equation of state and the entropy of an ideal
869
+ rigid rotor at the same state point. We mention the magni-
870
+ tude of Sex for different liquid crystal phases in Table V for
871
+ L/D = 5 at T ∗ = 5. In Fig. 8, we compare the excess entropy
872
+ of SRS at different packing fractions from the 2PT method
873
+ with those of the standard integration approach on the (a) MD
874
+ equation of state of SRS from our simulation and (b) MC
875
+ equation of state of SRS employed by Cuetos et al.17 We ob-
876
+ serve that the magnitude of Sex are in good agreement at the
877
+ lower densities for the given methods. At the higher densi-
878
+ ties, Sex calculated from 2PT method matches well with the
879
+ MD equation of state, but it differs from the MC equation of
880
+ state17.
881
+ V.
882
+ CONCLUSION AND OUTLOOK
883
+ We describe a technique based on the two-phase thermody-
884
+ namic model (2PT) for computing the entropy of liquid crystal
885
+ phases of SRS with a range of aspect ratios L/D = 2−5. For
886
+ various liquid crystal phases, we compute the density of state
887
+ (DoS) functions and its decomposition into translational and
888
+ rotational motions. In the dilute limit, the entropy calculated
889
+ using the 2PT method matches exactly with that of an ideal
890
+ rigid rotor. We find that, at a definite packing fraction, the
891
+ magnitude of the total entropy is roughly equal regardless of
892
+ the different LC phases associated to different aspect ratios.
893
+ We compare the excess entropy with that of the conventional
894
+ integration approach on equation of state of SRS, that matches
895
+ well. The phase boundaries of different liquid crystal phases
896
+ are also calculated using the rotational and translational flu-
897
+ idicity factors. Our future study will involve to utilise this
898
+ method in calculating absolute value of entropy and other ther-
899
+ modynamic quantities of various liquid crystal molecules and
900
+ compare it with experiments.
901
+ ACKNOWLEDGMENTS
902
+ We thank SERB, India for financial support through provid-
903
+ ing computational facility. JC acknowledges support through
904
+ an INSPIRE fellowship. JC thanks S. Siva Nasarayya Chari
905
+ for insightful discussions.
906
+ 1P.-G. De Gennes and J. Prost, The physics of liquid crystals, Vol. 83 (Oxford
907
+ university press, 1993).
908
+ 2P. Bolhuis and D. Frenkel, The Journal of chemical physics 106, 666 (1997).
909
+ 3S. C. McGrother, D. C. Williamson, and G. Jackson, The Journal of Chem-
910
+ ical Physics 104, 6755 (1996).
911
+ 4Z. Dogic and S. Fraden, Phys. Rev. Lett. 78, 2417 (1997).
912
+ 5H. Graf and H. Löwen, Phys. Rev. E 59, 1932 (1999).
913
+ 6S. Fraden, G. Maret, D. L. D. Caspar, and R. B. Meyer, Phys. Rev. Lett.
914
+ 63, 2068 (1989).
915
+ 7Z. Dogic and S. Fraden, Phys. Rev. Lett. 78, 2417 (1997).
916
+ 8P. Buining and H. Lekkerkerker, The Journal of Physical Chemistry 97,
917
+ 11510 (1993).
918
+ 9A. Kuijk, D. V. Byelov, A. V. Petukhov, A. Van Blaaderen, and A. Imhof,
919
+ Faraday discussions 159, 181 (2012).
920
+ 10L. Onsager, Annals of the New York Academy of Sciences 51, 627 (1949).
921
+
922
+ 7
923
+ 0
924
+ 100
925
+ 200
926
+ 300
927
+ 400
928
+ ν
929
+ 0
930
+ 20
931
+ 40
932
+ 60
933
+ G( ν)
934
+ η = 0.78 (Crystal)
935
+ 0
936
+ 100
937
+ 200
938
+ 300
939
+ 400
940
+ ν
941
+ 0
942
+ 20
943
+ 40
944
+ 60
945
+ 80
946
+ 100
947
+ G( ν)
948
+ η = 0.60 (SmecticA)
949
+ 0
950
+ 100
951
+ 200
952
+ 300
953
+ 400
954
+ ν
955
+ 0
956
+ 25
957
+ 50
958
+ 75
959
+ 100
960
+ 125
961
+ G( ν)
962
+ η = 0.50 (Nematic)
963
+ 0
964
+ 25
965
+ 50
966
+ 75
967
+ 100
968
+ 125
969
+ 150
970
+ ν
971
+ 0
972
+ 100
973
+ 200
974
+ 300
975
+ 400
976
+ G( ν)
977
+ η = 0.29 (Isotropic)
978
+ Gtrans
979
+ g
980
+ Gtrans
981
+ s
982
+ Grot
983
+ g
984
+ Grot
985
+ s
986
+ Gtrans
987
+ Grot
988
+ Gor
989
+ Total
990
+ (a)
991
+ (b)
992
+ (c)
993
+ (d)
994
+ FIG. 2. Density of state (DoS) G(ν) for (a) isotropic (b) nematic (c) smectic and (d) crystal phase. The components of the entropy are
995
+ mentioned in the legend. The snapshots of the configurations are shown for the respective phases. Here, we see that DoS of nematic phase
996
+ [Fig. (b)] comprises both solid and gas like components, whereas for smectic phase [Fig.(c)], it is dominated by solid like components only.
997
+ 11H. Green, “The molecular theory of fluids. amsterdam: North holland publ,”
998
+ (1952).
999
+ 12R. Nettleton and M. Green, The Journal of Chemical Physics 29, 1365
1000
+ (1958).
1001
+ 13T. Lazaridis and M. E. Paulaitis, The Journal of Physical Chemistry 96,
1002
+ 3847 (1992).
1003
+ 14T. Lazaridis and M. Karplus, The Journal of chemical physics 105, 4294
1004
+ (1996).
1005
+ 15D. Costa, F. Saija,
1006
+ and P. Giaquinta, Chemical physics letters 283, 86
1007
+ (1998).
1008
+ 16D. Costa, F. Micali, F. Saija, and P. Giaquinta, The Journal of Physical
1009
+ Chemistry B 106, 12297 (2002).
1010
+ 17A. Cuetos, B. Martınez-Haya, L. Rull, and S. Lago, The Journal of chemi-
1011
+ cal physics 117, 2934 (2002).
1012
+ 18A. Ghosh and D. Dhar, EPL (Europhysics Letters) 78, 20003 (2007).
1013
+ 19D. Dhar and R. Rajesh, Phys. Rev. E 103, 042130 (2021).
1014
+ 20S.-T. Lin, M. Blanco, and W. A. Goddard III, The Journal of chemical
1015
+ physics 119, 11792 (2003).
1016
+ 21S. S. Pannir Sivajothi, S.-T. Lin, and P. K. Maiti, The Journal of Physical
1017
+ Chemistry B 123, 180 (2018).
1018
+ 22S.-T. Lin, P. K. Maiti, and W. A. Goddard III, The Journal of Physical
1019
+ Chemistry B 114, 8191 (2010).
1020
+ 23S.-N. Huang, T. A. Pascal, W. A. Goddard III, P. K. Maiti, and S.-T. Lin,
1021
+ Journal of chemical theory and computation 7, 1893 (2011).
1022
+ 24B. J. Borah, P. K. Maiti, C. Chakravarty, and S. Yashonath, The Journal of
1023
+ Chemical Physics 136, 174510 (2012).
1024
+ 25J. D. Weeks, D. Chandler, and H. C. Andersen, The Journal of chemical
1025
+ physics 54, 5237 (1971).
1026
+ 26M. P. Allen, G. T. Evans, D. Frenkel, and B. Mulder, Advances in chemical
1027
+ physics 86, 1 (1993).
1028
+ 27C. Vega and S. Lago, Computers & chemistry 18, 55 (1994).
1029
+ 28L. Verlet, Physical review 159, 98 (1967).
1030
+ 29I. P. Omelyan, Computers in Physics 12, 97 (1998).
1031
+ 30N. S. Martys and R. D. Mountain, Physical Review E 59, 3733 (1999).
1032
+ 31M. Rotunno, T. Bellini, Y. Lansac, and M. A. Glaser, The Journal of chem-
1033
+ ical physics 121, 5541 (2004).
1034
+ 32Y. Lansac, P. K. Maiti, N. A. Clark, and M. A. Glaser, Physical Review E
1035
+ 67, 011703 (2003).
1036
+ 33P. K. Maiti, Y. Lansac, M. A. Glaser, and N. A. Clark, Physical review
1037
+ letters 88, 065504 (2002).
1038
+ 34D. Rajendra, J. Mandal, Y. Hatwalne, and P. K. Maiti, Soft Matter (2022).
1039
+ 35H. J. Berendsen, J. v. Postma, W. F. van Gunsteren, A. DiNola, and J. R.
1040
+ Haak, The Journal of chemical physics 81, 3684 (1984).
1041
+ 36N. F. Carnahan and K. E. Starling, The Journal of Chemical Physics 53, 600
1042
+ (1970).
1043
+
1044
+ 8
1045
+ 0.3
1046
+ 0.4
1047
+ 0.5
1048
+ 0.6
1049
+ 0.7
1050
+ 0.8
1051
+ η
1052
+ 0
1053
+ 0.1
1054
+ 0.2
1055
+ 0.3
1056
+ 0.4
1057
+ 0.5
1058
+ fluidicity (f)
1059
+ ftrans
1060
+ frot
1061
+ I
1062
+ N
1063
+ Sm
1064
+ K
1065
+ FIG. 3. Phase diagram of the SRS with aspect ratio L/D = 5 at
1066
+ T ∗ = 5 in fluidicity, packing fraction (f − η) space. ftrans and frot
1067
+ represent the translational and rotational components respectively.
1068
+ The black dotted lines denote phase boundaries of different phases.
1069
+ 0.2
1070
+ 0.3
1071
+ 0.4
1072
+ 0.5
1073
+ 0.6
1074
+ 0.7
1075
+ 0.8
1076
+ 0.9
1077
+ η
1078
+ 0
1079
+ 5
1080
+ 10
1081
+ 15
1082
+ 20
1083
+ 25
1084
+ 30
1085
+ S(kB/particle)
1086
+ Strans
1087
+ Srot
1088
+ Stot
1089
+ I
1090
+ N
1091
+ Sm
1092
+ K
1093
+ FIG. 4. Total entropy and its translational and rotational components
1094
+ of different liquid crystal phases for the aspect ratio L/D = 5 at T ∗ =
1095
+ 5. The black dotted lines denote the phase boundaries.
1096
+ 37A. Cuetos and B. Martínez-Haya, Molecular Physics 113, 1137 (2015).
1097
+ 38D. J. Earl, J. Ilnytskyi, and M. R. Wilson, Molecular physics 99, 1719
1098
+ (2001).
1099
+ 39J. Chattopadhyay, S. Pannir-Sivajothi, K. Varma, S. Ramaswamy, C. Das-
1100
+ gupta, and P. K. Maiti, Phys. Rev. E 104, 054610 (2021).
1101
+ 40J. Chattopadhyay, S. Ramaswamy, C. Dasgupta, and P. K. Maiti, arXiv
1102
+ preprint arXiv:2205.00667 (2022).
1103
+
1104
+ 9
1105
+ 0
1106
+ 0.1
1107
+ 0.2
1108
+ 0.3
1109
+ 0.4
1110
+ 0.5
1111
+ 0.6
1112
+ 0.7
1113
+ 0.8
1114
+ 0.9
1115
+ η
1116
+ -200
1117
+ -150
1118
+ -100
1119
+ -50
1120
+ 0
1121
+ A*
1122
+ A*trans
1123
+ A*rot
1124
+ A*tot
1125
+ I
1126
+ N
1127
+ Sm
1128
+ K
1129
+ FIG. 5. Helmholtz free energy A∗tot and its translational A∗trans and
1130
+ rotational A∗rot components of different liquid crystal phases for the
1131
+ aspect ratio L/D = 5 at T ∗ = 5. The black dotted lines denote the
1132
+ phase boundaries.
1133
+ -6
1134
+ -5
1135
+ -4
1136
+ -3
1137
+ -2
1138
+ -1
1139
+ 0
1140
+ 0
1141
+ 0.1
1142
+ 0.2
1143
+ 0.3
1144
+ 0.4
1145
+ 0.5
1146
+ 0.6
1147
+ 0.7
1148
+ η
1149
+ S2tr (kB/particle)
1150
+ I
1151
+ N
1152
+ Sm
1153
+ FIG. 6. Translational pair entropy per particle of different liquid crys-
1154
+ tal phases for the aspect ratio L/D = 5 at T ∗ = 5. The black dotted
1155
+ lines denote the phase boundaries.
1156
+
1157
+ -
1158
+ -
1159
+ -
1160
+ -
1161
+ -
1162
+ -
1163
+ -
1164
+ -
1165
+ -
1166
+ -
1167
+ -
1168
+ -
1169
+ -
1170
+ -
1171
+ -
1172
+ -
1173
+ -
1174
+ -
1175
+ -
1176
+ -
1177
+ -
1178
+ -
1179
+ -
1180
+ -
1181
+ -
1182
+ -
1183
+ -
1184
+ -
1185
+ -
1186
+ -
1187
+ -
1188
+ -
1189
+ -
1190
+ -
1191
+ -
1192
+ -
1193
+ -
1194
+ -
1195
+ -
1196
+ --
1197
+ -
1198
+ -
1199
+ -
1200
+ -
1201
+ -
1202
+ -
1203
+ -
1204
+ -
1205
+ -
1206
+ -
1207
+ -
1208
+ -
1209
+ -
1210
+ -
1211
+ -
1212
+ -
1213
+ -
1214
+ -
1215
+ -
1216
+ -
1217
+ -
1218
+ -
1219
+ -
1220
+ -
1221
+ -
1222
+ -
1223
+ -
1224
+ -
1225
+ -
1226
+ -
1227
+ --
1228
+ -
1229
+ -
1230
+ -
1231
+ -
1232
+ -
1233
+ -
1234
+ -
1235
+ -
1236
+ -
1237
+ -
1238
+ -
1239
+ -
1240
+ -
1241
+ -
1242
+ -
1243
+ -
1244
+ -
1245
+ -
1246
+ -10
1247
+ 2
1248
+ 4
1249
+ 6
1250
+ 8
1251
+ 10
1252
+ 12
1253
+ 14
1254
+ 16
1255
+ 18
1256
+ 0.4 0.45 0.5 0.55 0.6 0.65 0.7 0.75 0.8 0.85
1257
+ P*
1258
+
1259
+ L/D = 2.0
1260
+ L/D = 3.0
1261
+ L/D = 3.5
1262
+ L/D = 4.0
1263
+ L/D = 5.0
1264
+ 15
1265
+ 16
1266
+ 17
1267
+ 18
1268
+ 19
1269
+ 20
1270
+ 21
1271
+ 22
1272
+ 23
1273
+ 0.4 0.45 0.5 0.55 0.6 0.65 0.7 0.75 0.8 0.85
1274
+ Stot (kB/particle)
1275
+
1276
+ L/D = 2.0
1277
+ L/D = 3.0
1278
+ L/D = 3.5
1279
+ L/D = 4.0
1280
+ L/D = 5.0
1281
+ 9.5
1282
+ 10
1283
+ 10.5
1284
+ 11
1285
+ 11.5
1286
+ 12
1287
+ 12.5
1288
+ 13
1289
+ 0.4 0.45 0.5 0.55 0.6 0.65 0.7 0.75 0.8 0.85
1290
+ Strans (kB/particle)
1291
+
1292
+ 5
1293
+ 5.5
1294
+ 6
1295
+ 6.5
1296
+ 7
1297
+ 7.5
1298
+ 8
1299
+ 8.5
1300
+ 9
1301
+ 9.5
1302
+ 10
1303
+ 0.4 0.45 0.5 0.55 0.6 0.65 0.7 0.75 0.8 0.85
1304
+ Srot (kB/particle)
1305
+
1306
+ (a)
1307
+ (c)
1308
+ (b)
1309
+ (d)
1310
+ FIG. 7. (a) Equation of state, (b) total entropy Stot and its decomposition into (c) translational Strans and (d) rotational Srot motion as a function
1311
+ of packing fraction η for different L/Ds at the temperature T ∗ = 5. Here we see that, at a certain packing fraction, total entropy is roughly
1312
+ same irrespective of the different LC phases corresponding to different L/Ds.
1313
+
1314
+ 11
1315
+ 0
1316
+ 0.2
1317
+ 0.4
1318
+ 0.6
1319
+ 0.8
1320
+ η
1321
+ -10
1322
+ -8
1323
+ -6
1324
+ -4
1325
+ -2
1326
+ 0
1327
+ Sex(kB/particle)
1328
+ MD_EOS
1329
+ MC EOS [Ref. 17]
1330
+ 2PT
1331
+ I
1332
+ N
1333
+ Sm
1334
+ FIG. 8. Excess entropy Sex = S2PT/EOS
1335
+ tot
1336
+ − Sid
1337
+ tot vs packing fraction η for L/D = 5 calculated using 2PT method and equation of state (EOS)
1338
+ of SRS. Here, we compare the excess entropy calculated using MD equation of state and 2PT method from our simulation with those of the
1339
+ Monte Carlo (MC) EOS from Cuetos et al.17. The black dotted lines denote the phase boundaries.
1340
+
1341
+ 12
1342
+ TABLE IV. Total entropy S2PT
1343
+ tot
1344
+ and its decomposition into translational S2PT
1345
+ trans and rotational S2PT
1346
+ rot
1347
+ degrees of freedom for different liquid
1348
+ crystal phases associated to different aspect ratios L/D s at T ∗ = 5. Here, P∗,ρ∗ and η indicate pressure, number density and packing fraction
1349
+ respectively.
1350
+ P∗
1351
+ ρ∗
1352
+ η
1353
+ S2PT
1354
+ trans
1355
+ S2PT
1356
+ rot
1357
+ S2PT
1358
+ tot
1359
+ Phase
1360
+ L/D = 5
1361
+ 4.45
1362
+ 0.093
1363
+ 0.413
1364
+ 12.574
1365
+ 9.230
1366
+ 21.804
1367
+ I
1368
+ 4.90
1369
+ 0.098
1370
+ 0.434
1371
+ 12.509
1372
+ 8.985
1373
+ 21.494
1374
+ N
1375
+ 5.34
1376
+ 0.103
1377
+ 0.457
1378
+ 12.483
1379
+ 8.667
1380
+ 21.150
1381
+ N
1382
+ 5.79
1383
+ 0.107
1384
+ 0.477
1385
+ 12.435
1386
+ 8.391
1387
+ 20.827
1388
+ N
1389
+ 6.23
1390
+ 0.111
1391
+ 0.496
1392
+ 12.320
1393
+ 8.354
1394
+ 20.674
1395
+ N
1396
+ 6.68
1397
+ 0.116
1398
+ 0.517
1399
+ 12.228
1400
+ 7.928
1401
+ 20.157
1402
+ N
1403
+ 7.12
1404
+ 0.121
1405
+ 0.539
1406
+ 12.170
1407
+ 7.751
1408
+ 19.921
1409
+ N
1410
+ 7.57
1411
+ 0.130
1412
+ 0.580
1413
+ 11.924
1414
+ 7.344
1415
+ 19.268
1416
+ SmA
1417
+ 8.01
1418
+ 0.135
1419
+ 0.599
1420
+ 11.780
1421
+ 7.231
1422
+ 19.011
1423
+ SmA
1424
+ 8.46
1425
+ 0.137
1426
+ 0.611
1427
+ 11.730
1428
+ 7.039
1429
+ 18.768
1430
+ SmA
1431
+ 9.35
1432
+ 0.144
1433
+ 0.639
1434
+ 11.355
1435
+ 6.841
1436
+ 18.197
1437
+ SmA
1438
+ 9.79
1439
+ 0.147
1440
+ 0.652
1441
+ 11.298
1442
+ 6.761
1443
+ 18.059
1444
+ SmA
1445
+ 10.68
1446
+ 0.151
1447
+ 0.674
1448
+ 11.221
1449
+ 6.951
1450
+ 18.172
1451
+ SmA
1452
+ 12.46
1453
+ 0.160
1454
+ 0.710
1455
+ 10.909
1456
+ 6.553
1457
+ 17.462
1458
+ SmA
1459
+ 14.24
1460
+ 0.171
1461
+ 0.762
1462
+ 10.161
1463
+ 5.950
1464
+ 16.111
1465
+ SmA
1466
+ 16.02
1467
+ 0.177
1468
+ 0.788
1469
+ 9.879
1470
+ 5.944
1471
+ 15.823
1472
+ K
1473
+ 17.80
1474
+ 0.184
1475
+ 0.818
1476
+ 9.656
1477
+ 5.563
1478
+ 15.219
1479
+ K
1480
+ L/D = 4
1481
+ 5.13
1482
+ 0.121
1483
+ 0.444
1484
+ 12.287
1485
+ 9.081
1486
+ 21.368
1487
+ I
1488
+ 5.86
1489
+ 0.127
1490
+ 0.466
1491
+ 11.999
1492
+ 8.783
1493
+ 20.782
1494
+ I
1495
+ 6.60
1496
+ 0.134
1497
+ 0.490
1498
+ 11.845
1499
+ 8.493
1500
+ 20.338
1501
+ I
1502
+ 6.96
1503
+ 0.137
1504
+ 0.502
1505
+ 11.812
1506
+ 8.438
1507
+ 20.251
1508
+ N
1509
+ 7.33
1510
+ 0.141
1511
+ 0.516
1512
+ 11.706
1513
+ 8.290
1514
+ 19.996
1515
+ N
1516
+ 7.70
1517
+ 0.146
1518
+ 0.537
1519
+ 11.740
1520
+ 8.008
1521
+ 19.748
1522
+ N
1523
+ 8.06
1524
+ 0.155
1525
+ 0.568
1526
+ 11.720
1527
+ 7.787
1528
+ 19.507
1529
+ SmA
1530
+ 8.43
1531
+ 0.165
1532
+ 0.606
1533
+ 11.630
1534
+ 7.401
1535
+ 19.031
1536
+ SmA
1537
+ 8.80
1538
+ 0.169
1539
+ 0.620
1540
+ 11.446
1541
+ 7.346
1542
+ 18.792
1543
+ SmA
1544
+ 11.00
1545
+ 0.187
1546
+ 0.685
1547
+ 11.019
1548
+ 6.625
1549
+ 17.644
1550
+ K
1551
+
1552
+ 13
1553
+ P∗
1554
+ ρ∗
1555
+ η
1556
+ S2PT
1557
+ trans
1558
+ S2PT
1559
+ rot
1560
+ S2PT
1561
+ tot
1562
+ Phase
1563
+ L/D = 3.5
1564
+ 7.20
1565
+ 0.155
1566
+ 0.508
1567
+ 11.708
1568
+ 8.369
1569
+ 20.077
1570
+ I
1571
+ 7.85
1572
+ 0.160
1573
+ 0.523
1574
+ 11.608
1575
+ 8.203
1576
+ 19.810
1577
+ I
1578
+ 8.18
1579
+ 0.162
1580
+ 0.531
1581
+ 11.549
1582
+ 8.135
1583
+ 19.684
1584
+ N
1585
+ 8.51
1586
+ 0.166
1587
+ 0.543
1588
+ 11.385
1589
+ 8.041
1590
+ 19.427
1591
+ N
1592
+ 8.84
1593
+ 0.171
1594
+ 0.559
1595
+ 11.412
1596
+ 7.873
1597
+ 19.285
1598
+ N
1599
+ 9.16
1600
+ 0.191
1601
+ 0.624
1602
+ 11.410
1603
+ 7.134
1604
+ 18.544
1605
+ SmA
1606
+ 9.49
1607
+ 0.196
1608
+ 0.643
1609
+ 11.233
1610
+ 6.931
1611
+ 18.164
1612
+ SmA
1613
+ 9.82
1614
+ 0.198
1615
+ 0.647
1616
+ 11.306
1617
+ 6.870
1618
+ 18.176
1619
+ SmA
1620
+ 10.14
1621
+ 0.203
1622
+ 0.663
1623
+ 11.130
1624
+ 6.714
1625
+ 17.844
1626
+ K
1627
+ 10.47
1628
+ 0.205
1629
+ 0.672
1630
+ 11.082
1631
+ 6.607
1632
+ 17.688
1633
+ K
1634
+ 13.09
1635
+ 0.224
1636
+ 0.732
1637
+ 10.282
1638
+ 6.142
1639
+ 16.423
1640
+ K
1641
+ L/D = 3
1642
+ 2.30
1643
+ 0.122
1644
+ 0.352
1645
+ 13.438
1646
+ 9.802
1647
+ 23.239
1648
+ I
1649
+ 6.91
1650
+ 0.176
1651
+ 0.506
1652
+ 11.708
1653
+ 8.453
1654
+ 20.161
1655
+ I
1656
+ 8.06
1657
+ 0.185
1658
+ 0.534
1659
+ 11.387
1660
+ 8.116
1661
+ 19.504
1662
+ I
1663
+ 8.35
1664
+ 0.187
1665
+ 0.539
1666
+ 11.345
1667
+ 8.058
1668
+ 19.403
1669
+ I
1670
+ 9.50
1671
+ 0.195
1672
+ 0.562
1673
+ 11.142
1674
+ 7.878
1675
+ 19.020
1676
+ I
1677
+ 9.79
1678
+ 0.198
1679
+ 0.570
1680
+ 11.026
1681
+ 7.736
1682
+ 18.762
1683
+ SmA
1684
+ 10.08
1685
+ 0.211
1686
+ 0.608
1687
+ 11.161
1688
+ 7.460
1689
+ 18.621
1690
+ SmA
1691
+ 10.37
1692
+ 0.227
1693
+ 0.653
1694
+ 11.052
1695
+ 6.920
1696
+ 17.972
1697
+ SmA
1698
+ 10.66
1699
+ 0.233
1700
+ 0.670
1701
+ 10.963
1702
+ 6.614
1703
+ 17.577
1704
+ K
1705
+ 12.67
1706
+ 0.249
1707
+ 0.717
1708
+ 10.507
1709
+ 6.486
1710
+ 16.992
1711
+ K
1712
+ L/D = 2
1713
+ 10.47
1714
+ 0.282
1715
+ 0.590
1716
+ 10.955
1717
+ 7.584
1718
+ 18.539
1719
+ I
1720
+ 11.10
1721
+ 0.287
1722
+ 0.600
1723
+ 10.776
1724
+ 7.510
1725
+ 18.286
1726
+ I
1727
+ 11.94
1728
+ 0.293
1729
+ 0.613
1730
+ 10.614
1731
+ 7.404
1732
+ 18.017
1733
+ I
1734
+ 12.15
1735
+ 0.326
1736
+ 0.683
1737
+ 10.457
1738
+ 6.351
1739
+ 16.808
1740
+ K
1741
+ 12.57
1742
+ 0.344
1743
+ 0.721
1744
+ 9.830
1745
+ 5.992
1746
+ 15.822
1747
+ K
1748
+ 12.99
1749
+ 0.348
1750
+ 0.729
1751
+ 9.786
1752
+ 5.862
1753
+ 15.647
1754
+ K
1755
+
1756
+ 14
1757
+ TABLE V. Total entropy S2PT
1758
+ tot
1759
+ and the excess entropy S2PT
1760
+ ex
1761
+ calculated from the 2PT method, entropy of ideal rigid rotor Sid
1762
+ tot calculated using
1763
+ Eq. 35 and excess entropy using Monte Carlo equation of state from Cuetos et al.17 SEOS
1764
+ ex
1765
+ for different liquid crystal phases of L/D = 5 at
1766
+ T ∗ = 5:
1767
+ P∗
1768
+ ρ∗
1769
+ S2PT
1770
+ tot
1771
+ Sid
1772
+ tot
1773
+ S2PT
1774
+ ex
1775
+ SEOS
1776
+ ex
1777
+ Ref17
1778
+ Phase
1779
+ 4.45
1780
+ 0.093
1781
+ 21.803
1782
+ 28.316
1783
+ -6.512
1784
+ -4.023
1785
+ I
1786
+ 4.90
1787
+ 0.098
1788
+ 21.494
1789
+ 28.267
1790
+ -6.772
1791
+ -4.454
1792
+ N
1793
+ 5.34
1794
+ 0.103
1795
+ 21.150
1796
+ 28.215
1797
+ -7.064
1798
+ -4.598
1799
+ N
1800
+ 5.79
1801
+ 0.107
1802
+ 20.827
1803
+ 28.172
1804
+ -7.345
1805
+ -4.885
1806
+ N
1807
+ 6.23
1808
+ 0.112
1809
+ 20.674
1810
+ 28.134
1811
+ -7.459
1812
+ -5.316
1813
+ N
1814
+ 6.68
1815
+ 0.116
1816
+ 20.156
1817
+ 28.093
1818
+ -7.936
1819
+ -5.891
1820
+ N
1821
+ 7.12
1822
+ 0.121
1823
+ 19.921
1824
+ 28.051
1825
+ -8.131
1826
+ -6.322
1827
+ N
1828
+ 7.57
1829
+ 0.130
1830
+ 19.268
1831
+ 27.977
1832
+ -8.709
1833
+ -6.753
1834
+ SmA
1835
+ 8.01
1836
+ 0.135
1837
+ 19.011
1838
+ 27.946
1839
+ -8.935
1840
+ -7.328
1841
+ SmA
1842
+ 8.46
1843
+ 0.137
1844
+ 18.768
1845
+ 27.926
1846
+ -9.158
1847
+ -7.615
1848
+ SmA
1849
+ 8.90
1850
+ 0.141
1851
+ 18.425
1852
+ 27.898
1853
+ -9.473
1854
+ -
1855
+ SmA
1856
+ 9.35
1857
+ 0.144
1858
+ 18.197
1859
+ 27.880
1860
+ -9.683
1861
+ -8.046
1862
+ SmA
1863
+ 9.79
1864
+ 0.147
1865
+ 18.059
1866
+ 27.860
1867
+ -9.801
1868
+ -8.333
1869
+ SmA
1870
+
0tE3T4oBgHgl3EQfnAp3/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
29E3T4oBgHgl3EQfoAqh/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:0c69d2a741dfddfcb881d1042bc0f0a0b7f63527a6124c16051ba3b6a59562f2
3
+ size 4718637
29E3T4oBgHgl3EQfoAqh/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:89e7d9cf196f866cc6b824b8f83d7b2bc9beed9cec9a98627a1a3dfabe015dc1
3
+ size 164744
3NFKT4oBgHgl3EQfQi0f/content/tmp_files/2301.11767v1.pdf.txt ADDED
@@ -0,0 +1,1056 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ CAPoW: Context-Aware AI-Assisted Proof of Work
2
+ based DDoS Defense
3
+ Trisha Chakraborty∗, Shaswata Mitra†, Sudip Mittal‡
4
+ Department of Computer Science & Engineering, Mississippi State University
5
+ {tc2006∗, sm3843†}@msstate.edu, mittal‡@cse.msstate.edu
6
+ Abstract—Critical servers can be secured against distributed
7
+ denial of service (DDoS) attacks using proof of work (PoW)
8
+ systems assisted by an Artificial Intelligence (AI) that learns
9
+ contextual network request patterns. In this work, we introduce
10
+ CAPOW, a context-aware anti-DDoS framework that injects la-
11
+ tency adaptively during communication by utilizing context-aware
12
+ PoW puzzles. In CAPOW, a security professional can define
13
+ relevant request context attributes which can be learned by the AI
14
+ system. These contextual attributes can include information about
15
+ the user request, such as IP address, time, flow-level information,
16
+ etc., and are utilized to generate a contextual score for incoming
17
+ requests that influence the hardness of a PoW puzzle. These
18
+ puzzles need to be solved by a user before the server begins
19
+ to process their request. Solving puzzles slow down the volume
20
+ of incoming adversarial requests. Additionally, the framework
21
+ compels the adversary to incur a cost per request, hence making
22
+ it expensive for an adversary to prolong a DDoS attack. We
23
+ include the theoretical foundations of the CAPOW framework
24
+ along with a description of its implementation and evaluation.
25
+ I. INTRODUCTION
26
+ An organization protects its critical servers from distributed
27
+ denial of service (DDoS), which may contain valuable infor-
28
+ mation, such as intellectual property, trade secrets, employee
29
+ personally identifiable information (PII), etc. To launch a
30
+ DDoS attack, the malicious users send a flood of requests to
31
+ these servers. As a result, requests from legitimate users either
32
+ experience delays or their requests are dropped. For more than
33
+ two decades, DDoS attacks have been a prominent issue and
34
+ even today it is far from being solved as these attacks are
35
+ cheaper to launch than to defend, especially with the rise of
36
+ DoS-as-a-Service [25].
37
+ PoW system works by requiring incoming requests to ex-
38
+ pend resources solving an computational puzzles to prove ones
39
+ legitimacy. The general system consists of two parts: prover
40
+ and verifier. The prover finds the solution to the computational
41
+ puzzles, when solved, sends the solution to the verifier. In
42
+ a simple networked client-server environment, the user-side
43
+ contains the prover component, and the server-side contains
44
+ the verifier components. Researchers have proposed PoW-
45
+ based solutions for DDoS which makes the attack expensive to
46
+ launch [4], [21], [34]. Although, these solutions suffer from a
47
+ lack of intuition on how to set puzzle difficulty and adaptability
48
+ in different settings.
49
+ In this paper, we develop a defensive tool that emphasizes
50
+ on learning the normal activity patterns of legitimate users.
51
+ The idea behind the tool is to penalize the users that deviates
52
+ from normal activity patterns by issuing them hard puzzles
53
+ and at the same time issuing easy puzzles to users who
54
+ follow the pattern. We leverage a context-aware AI model
55
+ that can learn these normal activity patterns by contextual
56
+ information. The term context within the scope of legitimate
57
+ activity patterns can be defined as request attributes, such
58
+ as, IP address, time, flow-level information, etc. When the
59
+ context is IP address, network activity is considered deviated
60
+ if the source IP address is part of a known blocked IP
61
+ list. Whereas, when the context is time, network activity is
62
+ considered deviated if it arrives at an unusual time compared
63
+ to the normal activity pattern. Security professionals can select
64
+ relevant request context attributes which can be learned by the
65
+ AI models. The concept of context-aware AI models is derived
66
+ from context-aware computing introduced by Dey et. al [9].
67
+ We introduce CAPOW tool, a context-aware AI-assisted
68
+ PoW system that helps to secure critical servers against DDoS
69
+ attacks. Our framework utilizes context-aware AI models that
70
+ learn the expected context pattern from server-side activity-
71
+ logs. The activity-logs are stored and managed by the server
72
+ which contains user activity (IP address, timestamp, flow-
73
+ level data, etc). The deviation from the learned pattern is then
74
+ leveraged to generate a contextual score for incoming requests
75
+ which tunes the difficulty level of the PoW puzzle to be solved.
76
+ The underlying defensive strategy curtails the ability of a
77
+ malicious user to prolong the attack by adaptively introducing
78
+ latency through PoW puzzles and compelling malicious users
79
+ to expend more resources to complete an attack. The main
80
+ contributions of this paper are as follows.
81
+ Contribution 1: We introduce CAPOW, an anti-DDoS frame-
82
+ work that injects latency adaptively, i.e., the framework en-
83
+ sures that malicious users incur higher latency than legitimate
84
+ users based on the deviation in context pattern. We discuss
85
+ the process of context score calculation from deviation in
86
+ Section III-B.
87
+ Contribution 2: We propose a policy component that is
88
+ created by security personnel to incorporate server-specific
89
+ security demands. We provide intuition for policy construction
90
+ in Section III-C.
91
+ Contribution 3: We discuss an instance of CAPOW imple-
92
+ mentation and perform evaluation to illustrate the effective-
93
+ ness of CAPOW. The implementation details are discussed
94
+ Section IV. The code is released on GitHuB [3].
95
+ The rest of the paper is structured as follows. In Section II
96
+ we discuss the threat model and attack definitions. We discuss
97
+ the theoretical foundation of CAPOW in Section III and
98
+ arXiv:2301.11767v1 [cs.CR] 27 Jan 2023
99
+
100
+ CAPOW implementation in Section IV. We discuss related
101
+ works of the PoW system and DoS defense in Section V,
102
+ followed by the conclusion in Section VI.
103
+ II. THREAT MODEL
104
+ In this section, we present a series of assumptions associated
105
+ with the adversary’s abilities. An adversary A initiates a DDoS
106
+ attack by sending a flood of requests to the server. The ad-
107
+ versary’s intention is to overwhelm the server’s computational
108
+ resources and disrupt legitimate user communication with the
109
+ server. Although the attack described is a variant of DDoS,
110
+ the usefulness of CAPOW can be extended to other variants.
111
+ These assumptions described below are similar to previous
112
+ literature on DDoS defense using proof of work [17] and in
113
+ some sense, we consider a stronger adversary.
114
+ Assumption 1. Adversary A can eavesdrop on the communi-
115
+ cation channel of the server. A cannot modify any user request
116
+ and cannot read any request payload data.
117
+ Assume a secure network communication channel is used
118
+ by the user to send request packets to the server. The user
119
+ performs encryption on the payload data, including the puzzle
120
+ solution, and sends the packet to the server. When an adversary
121
+ eavesdrops on the channel, they can read the source and
122
+ destination IP of the packet, but they cannot read the encrypted
123
+ payload consisting of the puzzle parameters. Additionally, the
124
+ adversary cannot flip bits of the packet and pollute the puzzle
125
+ solution included in the payload. Hence, we assume that the
126
+ adversary has no knowledge of the puzzle parameters solved
127
+ by a user nor can it deny service to a user who has correctly
128
+ solved the puzzle. In Section IV, we utilize assumption 1 to
129
+ claim that the adversary cannot reverse engineer the base AI
130
+ models to receive easier PoW puzzles.
131
+ Assumption 2 Adversary A can spoof user identifiers, such as
132
+ IP addresses, and deceive a subset of underlying AI models.
133
+ CAPOW uses AI models to learn legitimate network ac-
134
+ tivity patterns and the deviation from the pattern is directly
135
+ proportional to the difficulty of PoW puzzles to be solved by
136
+ the user. A can spoof a legitimate user IP address and send
137
+ requests to the server. An intelligent adversary would send
138
+ probe packets to the server using a set of spoofed IP addresses
139
+ and only utilize IPs that require puzzles to be solved. This way,
140
+ the adversary is able to deceive the AI model and reduce the
141
+ latency introduced. In Section IV, we discuss that sending
142
+ probe packets becomes costly for an adversary to deceive
143
+ multiple base AI models.
144
+ Assumption 3 Adversary A cannot pollute the training data
145
+ of the AI models.
146
+ The AI model used by CAPOW learns normal activity
147
+ patterns and calculates a deviation which directly influences
148
+ the hardness of the puzzle. Hence, it is essential that the AI
149
+ learns normal activity patterns from an unpolluted activity-log
150
+ to maximize the effectiveness of CAPOW. In Section IV-B,
151
+ we describe the training process of a context-aware AI model
152
+ where a security professional is deployed to select secure data
153
+ to train the base AI models.
154
+ III. CAPOW ARCHITECTURAL DESIGN AND
155
+ THEORETICAL FOUNDATIONS
156
+ In this section, we describe the high-level architecture of
157
+ the core components and their inner workings that molds the
158
+ CAPOW framework. As shown in Figure 1, CAPOW consists
159
+ of four core components: request context extractor, context-
160
+ aware AI models, policy, and proof-of-work.
161
+ The AI models learn the normal activity pattern from
162
+ previous activity-logs. When an incoming request packet is
163
+ seen, first the context attributes are extracted from the new
164
+ request packet (see Section III-A). Then, the deviation between
165
+ the learned normal context pattern and new request contexts is
166
+ computed to calculate context score. We elaborate on AI model
167
+ training and score calculation in Section III-B. The policy
168
+ component of CAPOW provides security professionals with
169
+ certain abilities that strengthen the effectiveness of CAPOW
170
+ in various security settings (see Section III-C). The context
171
+ score influences the difficulty of PoW puzzle. In Section III-D,
172
+ we discuss the proof-of-work component and how the PoW
173
+ puzzles can curtails the ability of a malicious user to prolong
174
+ the attack by adaptively introducing latency.
175
+ Data Flow. From Figure 1, the flow of data between different
176
+ components of CAPOW is described below. (1) When a new
177
+ incoming packet is seen, the request packet is forwarded to
178
+ the request context extractor. (2) The extracted request context
179
+ attributes are passed to context-aware AI models which learned
180
+ expected context patterns from activity logs. The context
181
+ score generated by individual AI models is combined using
182
+ a function f to produce the final context score (Φ). (3) The
183
+ context score is forwarded to the policy component which sets
184
+ certain parameters, such as, it maps the context score to a
185
+ puzzle difficulty level. (4) The difficulty level is passed to the
186
+ puzzle solver which solves a puzzle of the defined difficulty
187
+ level using a function func. (5) The computed solution is sent
188
+ to the verifier. (6) When the solution is correct, the request
189
+ packet is placed on the server queue for processing.
190
+ A. Context Extraction from Request Packet
191
+ The concept of context-aware computing was introduced
192
+ by Dey et. al [9], where the proposed mechanism improved
193
+ human-to-computer interaction by delivering contextually rel-
194
+ evant data. In the paper, the author proposed an abstract defini-
195
+ tion of context, which is a piece of information that clarifies the
196
+ characteristics of an entity. When a system contains contextual
197
+ data about a situation or entity, the system can take context-
198
+ aware decisions which improve the overall quality of any
199
+ general decision-making.
200
+ In a security setting, a certain request is deemed suspicious
201
+ if the associated request attributes deviate from the usual
202
+ network activity pattern. For instance, a request packet of
203
+ payload size 65500 bytes is considered suspicious due to
204
+ deviation when the expected normal payload size pattern
205
+ is in the order of a few hundred bytes. To this end, we
206
+ 2
207
+
208
+ Src IP
209
+ Dst IP
210
+ Payload
211
+ Context-Aware AI Model
212
+ f
213
+ Incoming Packet
214
+ Activity
215
+ Logs
216
+ Context Score
217
+ Range
218
+ Difficulty
219
+ Range
220
+ Policy File(s)
221
+ Solution = func (puzzle parameter)
222
+ Security
223
+ Professional
224
+ Policy
225
+ d-constrained
226
+ solution found?
227
+ func (solution parameter)
228
+ Proof-of-work
229
+ Server Queue
230
+ Packet n
231
+ Packet n-1
232
+ Packet n-2
233
+ Context C1
234
+ Model
235
+ Context Score (Φ)
236
+ W1
237
+ W2
238
+ Wn
239
+ d1
240
+ d2
241
+ d3
242
+ d4
243
+
244
+ Φ1
245
+ Φ2
246
+ Φ3
247
+ Φ4
248
+
249
+ Calculated
250
+ context
251
+ score
252
+ forwarded
253
+ to policy
254
+ module
255
+ Puzzle Verifier
256
+ Puzzle Solver
257
+ Mapped
258
+ puzzle
259
+ difficulty
260
+ level
261
+ forwarded
262
+ to puzzle
263
+ solver
264
+ Packets with correct puzzle
265
+ solution placed in server
266
+ queue to process.
267
+ Send solution
268
+ 1
269
+ 2
270
+ 3
271
+ 4
272
+ 5
273
+ Request Context Extraction
274
+ C1
275
+ C2
276
+ Context C2
277
+ Model
278
+ Context Ck
279
+ Model
280
+ Puzzle Parameters
281
+ Model Parameters
282
+
283
+ Ck
284
+ 6
285
+ Fig. 1. The figure illustrates the architecture of CAPOW framework. CAPOW consists of four core components: request context extractor, context-aware AI model, policy, and
286
+ proof of work. The AI model learns context patterns from previous activity-logs selected by security personnel and calculates a context score based on the deviation of the incoming
287
+ packet. The calculated score is mapped to the PoW puzzle difficulty level as defined by the security professional in policy files. The proof of work component performs evaluations
288
+ to find the constrained solution. The request with a correct solution is placed on the server queue to process.
289
+ define context of a request packet as request attributes, such
290
+ as source IP address, time of arrival, port address, time
291
+ to live (TTL), and other flow-level attributes. The contexts
292
+ attributes to be extracted are selected by security personnel
293
+ via policy component. The list of selected context attributes
294
+ are reformed periodically to update the defensive posture of
295
+ the organization deployed. When a new request packet is seen,
296
+ the request context extractor component extracts the selected
297
+ context attributes from the request packet and feeds it to the
298
+ context-aware AI models.
299
+ B. Context-Aware AI Model
300
+ The framework component consumes activity-logs supplied
301
+ by security personnel as input to generate a context-aware AI
302
+ model. The model is generated by considering a set of request
303
+ packets from the activity-log λ = {λ0, λ1, λ2, ..., λi}. Each
304
+ request packet λi consists of a set of request context attributes,
305
+ Cλi = {C0λi, C1λi, C2λi, ..., Ckλi}
306
+ (1)
307
+ where k is the number of request context attributes. Ck is
308
+ represented as n-dimensional vector. When an n-dimensional
309
+ vector of a single context for λ requests is projected in
310
+ Euclidean space, such relative positioning produces a cluster.
311
+ For k context attributes, k clusters are generated. The clusters
312
+ represent the normal activity pattern. To evaluate a new incom-
313
+ ing request, request context extractor from Section III-A, feeds
314
+ the context attributes which are then projected in Euclidean
315
+ space. The deviation ∆(p, q) of context Ck is calculated as the
316
+ Euclidean distance between the corresponding normal activity
317
+ cluster and the new request projection,
318
+ ∆(p, q) =
319
+
320
+
321
+
322
+
323
+ n
324
+
325
+ j=1
326
+ (qj − pj)2
327
+ (2)
328
+ where p is projected single context attribute of the new request
329
+ and q is center of a normal cluster of the same context.
330
+ Consequently, the context score Φ for Ck is calculated as,
331
+ Φ(Ck) =
332
+ �∆(p, q)
333
+ ∆max
334
+
335
+ × I
336
+ (3)
337
+ where ∆max is the maximum possible deviation for Ck. The
338
+ score is in the range of [0, I], where I ∈ Z+. In Section IV-B,
339
+ we discuss the implementation of context-aware AI models.
340
+ C. Policy
341
+ The policy component is a rule-based strategy that facilitates
342
+ the adaptive security guarantees of CAPOW. The rules are set
343
+ in policy files that determine certain CAPOW characteristics.
344
+ These characteristics include context-aware AI model specifi-
345
+ cations, such as, which activity-logs are supplied to train the
346
+ AI models, which context attributes hold more significance
347
+ over the others, etc. Additionally, these parameters include
348
+ proof-of-work components specifications, such as, what is
349
+ the rule to translate context score to puzzle difficulty, which
350
+ variant of PoW puzzle to be used, etc. Hence, it is evident
351
+ that policy construction is a non-trivial task and requires
352
+ consideration of various facets of the deployed server to bolster
353
+ the effectiveness of CAPOW in different security settings.
354
+ To perform the convoluted task of policy designing, security
355
+ professionals are deployed to design server-specific policies.
356
+ Intuition for AI model parameters. From Section III-A,
357
+ a request packet consists of several context attributes. The
358
+ significance of some contexts holds more importance over
359
+ others depending on the type of attack defense. For instance,
360
+ payload size is an important context attribute to protect against
361
+ large payload DDoS attacks [37], but less important to de-
362
+ fend volumetric DDoS attacks. Policy includes the weight
363
+ associated with context attributes to provide an attack-specific
364
+ defense. Additionally, a policy includes the source of data
365
+ 3
366
+
367
+ to train the AI models to avoid model data pollution attacks
368
+ (Assumption 3).
369
+ Intuition for proof-of-work parameters. The context score
370
+ produced by the context-aware AI model is translated to
371
+ the PoW difficulty level. The policy includes the rules to
372
+ translate context scores to puzzle difficulty. In Section IV-C,
373
+ we implemented three rules to show that the translation leads
374
+ to adaptive latency injected. As stated by Green et. al [13],
375
+ amongst groups of users, the CPU capacity of each device can
376
+ vary 10x times, whereas memory capacity may only vary 4x
377
+ times. Hence, when a memory-bound PoW puzzle is used, it is
378
+ less likely for the adversary to have an edge over a legitimate
379
+ user as the discrepancy in memory power as the resource is
380
+ less compared to CPU-bound puzzles. The policy includes the
381
+ means to set variants of puzzles depending on the expected
382
+ user base.
383
+ D. Proof of Work
384
+ Classical proof of work systems [4], [10], [34] consists
385
+ of two main components – prover and verifier. The prover
386
+ provides verifiable evidence of expanding computational re-
387
+ sources by solving puzzles as assigned by the server. On the
388
+ other hand, the verifier validates whether the solved puzzle
389
+ yielded the desired solution. When PoW systems are used as
390
+ DoS defense [4], [26], [35], a user commits some computation
391
+ resources (CPU cycle, bandwidth, etc.) and burns one of these
392
+ resources for solving the PoW puzzle to prove their legitimacy.
393
+ In CAPOW, when a user deviates from a normal activity
394
+ pattern, the PoW component issues a PoW puzzle to request
395
+ proof of legitimacy. The difficulty level of PoW puzzle is
396
+ a function of context score. The rule to translate to context
397
+ score to difficulty level is defined under policy component
398
+ (Section III-C). PoW solver uses a function func to solve the
399
+ assigned difficulty puzzle (see Figure 1). In general terms, this
400
+ function injects two types of cost: (1) direct cost of resource
401
+ burning [14], and (2) indirect cost of latency. The notion
402
+ of resource burning cost represents the resource consumption
403
+ of a user, where the resource could be computational power,
404
+ memory, network bandwidth, or human capital [14]. This cost
405
+ directly impacts the ability of the adversary to conduct a DDoS
406
+ attack as every request requires the adversary to spend real-
407
+ life resources. The notion of latency cost captures the delay
408
+ in time introduced in communication due to the act of puzzle
409
+ solving. This cost indirectly impacts the adversarial intent by
410
+ throttling the rate of adversarial requests reaching the server
411
+ queue. Both costs ultimately cripple the adversarial capability
412
+ to prolong an ongoing DDoS attack.
413
+ IV. CAPOW IMPLEMENTATION, TOOL INSTANCE
414
+ DEPLOYMENT, AND EVALUATION
415
+ In this section, we present a deployment of CAPOW frame-
416
+ work by implementing a single instance of each core compo-
417
+ nent: context extractor, context-aware AI models, policy, and
418
+ proof-of-work. First, the context extractor instance extracts se-
419
+ lected request context attributes. Second, the extracted contexts
420
+ are relayed to context-aware AI model instances where each
421
+ base AI model is generated using server-side activity-logs.
422
+ Then, the trained AI models calculate the deviation of selected
423
+ contexts to produce a context score. Third, we provide three
424
+ policy designs that maps context score to difficulty of PoW
425
+ puzzle. Finally, we implemented a hash-based PoW puzzle
426
+ instance which, over repeated trials, finds the constrained
427
+ solution of assigned difficulty level. The costs inflicted due
428
+ to the our puzzle instance are CPU-cycles (resource burning)
429
+ and time spent (latency). For the purposes of validating our
430
+ contribution via evaluation, we consider that the main cost
431
+ injected is latency which, when injected, throttles the rate of
432
+ adversarial requests.
433
+ Now, we will describe our evaluation setup. We split the
434
+ CIC-IDS2017 dataset [24] into test and train files where day
435
+ 1 to day 5 (Monday - Thursday) is used to train the models
436
+ and day 6 (Friday) is used to evaluate CAPOW. From day
437
+ 1 to day 5, we deleted the attack traffic to learn normal
438
+ activity pattern. Consider five users sending requests to the
439
+ server U1, U2, U3, U4, and U5. We fixed four user identifiers
440
+ from day 5 to map the four above-mentioned users. Let the
441
+ fifth user U5, be mapped to the user identifier that performs
442
+ DoS on day 6. Since, the user identifier in CIC-IDS2017
443
+ is IP address, let the mapped IP of user U1, U2, U3, U4, and
444
+ U5 is represented by 104.20.30.120, 83.66.160.22,
445
+ 37.59.195.0, 104.16.84.55, and 205.174.165.73
446
+ respectively. Through our evaluation scenario, we provided
447
+ evidence that CAPOW injects latency adaptively based on
448
+ the calculated context score of user U5 which throttles the
449
+ adversarial requests and make it expensive for an adversary to
450
+ prolong a DDoS attack.
451
+ A. Context Extraction Instance
452
+ The context extraction instance consumes the request packet
453
+ and extracts context attributes from the request packet. For
454
+ our implementation, we select three context attributes: (1) IP
455
+ address, (2) temporal activity, and (3) flow-level data. For
456
+ evaluation, we used feature attributes of CIC-IDS2017 dataset
457
+ to serve as context attributes. The source IP feature becomes
458
+ the IP address context, the timestamp feature becomes the
459
+ temporal activity context, and the remaining features become
460
+ flow-level context.
461
+ B. Context-Aware AI Model Instance
462
+ We propose an ensemble learner that consists of dedicated
463
+ base AI models to learn individual contextual patterns. The
464
+ base AI model receives the context attributes from the context
465
+ extractor as inputs. The model that (1) learns the IP address
466
+ pattern is called dynamic attribute-based reputation (DAbR),
467
+ (2) learns the temporal activity pattern is called temporal ac-
468
+ tivity model (TAM), and (3) learns the flow-level data pattern
469
+ is called flow-level model (FLOW). Each model computes a
470
+ context score in the range between [0, 10]. Context scores
471
+ from three AI models are combined using the argmax function.
472
+ Next, we discuss three base models where the subsections are
473
+ divided into model generation, context score calculation, and
474
+ evaluation.
475
+ 4
476
+
477
+ User
478
+ Temporal Activity
479
+ User 1
480
+ [[500, 501, …,600], [800, 801,
481
+ …,900]]
482
+ User 2
483
+ [[770, 771, …,800], [850, 851,
484
+ …,860], …]
485
+ User 3
486
+ [[100, 101, …,110], [300, 301, …,
487
+ 315]]
488
+ User 4
489
+ [[550, 551, …,560]]
490
+ User
491
+ Temporal Activity
492
+ User 1
493
+ [[100, 102, …,220], [500,501,…,510]]
494
+ User 2
495
+ [[200, 201,…, 230],]
496
+ User 3
497
+ [[190, 191, …, 200], [630, …690]]
498
+ User 4
499
+ [[100, 101, …,250], [260, 261, … 410]]
500
+ User 1
501
+ Time (seconds)
502
+ 100
503
+ 200
504
+ 400
505
+ 300
506
+ 500
507
+ 600
508
+ 700
509
+ User 2
510
+ User 3
511
+ User 4
512
+ User
513
+ Temporal Activity
514
+ User 1
515
+ [[650, 651, …, 700], [760, 761, …, 800]]
516
+ User 2
517
+ [[175, 176, …,190], [790, 791, …,800]]
518
+ User 3
519
+ [[530, 531, …,602], [740, 741, …, 750]]
520
+ User 4
521
+ [[350, 351, …,440], [690, 691, …, 701]]
522
+ User
523
+ Temporal Activity
524
+ User 1
525
+ [[300, 301, …,405], [500,501,…,510]]
526
+ User 2
527
+ [[505, 540], [640, 641, …680]]
528
+ User 3
529
+ [[190,…200], [410, 530]]
530
+ User 4
531
+ [[100, 101, …, 250], [260, 261, …,
532
+ 410], [500, 501, …, 515]]
533
+ Activity log on t-3 day
534
+ Activity log t-1 day
535
+ Activity log t day
536
+ Activity log on t-2 day
537
+ Aged Activity Logs
538
+ User Activity Cluster
539
+ Current Activity Logs
540
+ Fig. 2. The figure shows that selected activity-logs (left) are used to generate a temporal activity model (TAM) (right). The illustration shows that out of four activity logs, currently
541
+ only two activity logs are used to form the model (blue box). The remaining activity-logs are aged in an attempt to keep the model up-to-date.
542
+ Dynamic Attribute-based Reputation (DAbR): We utilize
543
+ DAbR [29] as the base AI model that learns context patterns
544
+ for IP attributes. The AI model is generated by projecting
545
+ malicious IP attributes from Cisco Talos dataset [31] into
546
+ Euclidean space. The dataset contains a list of malicious
547
+ IP addresses and IP-related attributes [29]. The red dots in
548
+ Figure 3(A) represent the projected malicious IP attributes that
549
+ form a cluster in Euclidean space. When a new request is
550
+ evaluated, the IP attributes of the new request are projected
551
+ in Euclidean space and a deviation is calculated as Euclidean
552
+ distance to the malicious cluster center. The distance calculated
553
+ produces the context score for DAbR (α). The multi-colored
554
+ stars represent U1, U2, U3, U4, and U5. User U1, U2, U3, U4, and
555
+ U5 receives 2.87, 1.16, 3.15, 2.18, and 2.98 reputation score
556
+ respectively.
557
+ Temporal Activity Model (TAM): We propose a temporal
558
+ activity model (TAM) that learns the pattern of user request
559
+ activity based on time of arrival from activity-logs. The model
560
+ is generated using previous t-days server activity-logs. The
561
+ selected activity-logs can be either previous t consecutive days,
562
+ or t specific days (as defined in the policy). The temporal
563
+ model can be updated by aging the older activity models
564
+ (see Figure 2). The red rectangular blocks in Figure 3(B)
565
+ represent an activity cluster per user. The term active in
566
+ practice can represent a user session or concurrent requests.
567
+ When a user request U arrives at the server, the server finds
568
+ the corresponding user activity cluster (UCLS) formed by the
569
+ temporal activity model. The user activity cluster (UCLS) is a
570
+ list of time intervals that represents the user’s historical activity
571
+ times. The deviation in time is calculated as the distance
572
+ between the two nearest clusters. From CIC-IDS2017 dataset,
573
+ the cluster formed for user U1 shows that the user was active
574
+ between 130 − 140 minutes, 160 − 170 minutes, 600 − 670
575
+ minutes, and 720−760 minutes. When user U1 arrived at time
576
+ 700 minutes on day 6, the two nearest clusters are 600 − 670
577
+ and 720−760 (see Figure 3(B)). This deviation is called ∆local
578
+ which is the distance between the two nearest clusters. Finally,
579
+ the context score for TAM is calculated as,
580
+ β = ∆local
581
+ ∆max
582
+ × 10
583
+ (4)
584
+ where, ∆max represents the maximum deviation possible
585
+ which in our implementation is 720 minutes. Note that no
586
+ cluster is found for U5, hence the context score calculates is
587
+ the highest in range.
588
+ Flow-level Model (FLOW): Flow-level Model (FLOW) learns
589
+ network flow context patterns from activity-logs. The network
590
+ flow attributes of a request packet are flow-related data, such as
591
+ TTL, flow duration, payload size, protocol, etc. To generate the
592
+ model, the n-dimensional flow attribute vectors are projected
593
+ in Euclidean space. In Figure 3(C), the green dots represent
594
+ projected network flow attributes of legitimate requests, and
595
+ the red dots represent projected network flow attributes of
596
+ malicious requests. When a new request is seen, its flow-
597
+ level attributes are projected and the Euclidean distance to
598
+ malicious and legitimate clusters are computed. The context
599
+ score is calculated as,
600
+ γ = ∆l,m
601
+ ∆max
602
+ × 10
603
+ (5)
604
+ where, ∆l,m is the deviation from malicious and legitimate
605
+ clusters and ∆max is the maximum deviation possible in flow-
606
+ level context.
607
+ C. Policy Component Instance
608
+ We constructed three policy instances, policy 1, policy 2,
609
+ and policy 3. These policies only set the mapping function
610
+ between context scores to the PoW puzzle difficulty level.
611
+ Context score is directly proportional to the difficulty of the
612
+ PoW puzzle, such as the increase in contextual deviation leads
613
+ to a higher difficulty puzzle and more latency injected.
614
+ Policies 1 and 2: Linear mapping. Assume a linear map
615
+ function. Policy 1 maps f(Φ) → d, where Φ ∈ [0, 10] is the
616
+ range of context score and d ∈ [0, 10] is the difficulty levels of
617
+ the PoW puzzle. Similar to policy 1, policy 2 maps f(Φ) → d,
618
+ where Φ ∈ [0, 10] and d ∈ [10, 20]. Note that, the error bar
619
+ in Figure 4 shows the discrepancy in time to solve d-level
620
+ PoW puzzle. As discussed in Section III-C, this discrepancy
621
+ in time to solve can be avoided by using memory-bound PoW
622
+ puzzles.
623
+ Policy 3: Error range mapping For policy 3, we incorporated
624
+ the error ϵ of the context-aware AI model. Assume a linear
625
+ map function. Policy 3 maps f(Φ) → d, where Φ ∈ [0, 10] and
626
+ d ∈ [0, 10]. The final difficulty level assigned is a difficulty
627
+ value chosen at random in the interval [⌈di − ϵ⌉, ⌈di + ϵ⌉],
628
+ where ϵ = 0.2. Figure 4 shows that as contextual deviation
629
+ increases, the amount of injected latency increases.
630
+ 5
631
+
632
+ 0.2
633
+ 0.4
634
+ 0.6
635
+ 0.8
636
+ 1.0
637
+ Malicious cluster centre
638
+ User 1
639
+ User 2
640
+ User 3
641
+ User 4
642
+ User 5
643
+ Malicious IP
644
+ 0.2
645
+ 0.4
646
+ 0.6
647
+ 0.8
648
+ 1.0
649
+ 0
650
+ 2
651
+ 4
652
+ 6
653
+ 8
654
+ 10
655
+ Time (minutes)
656
+ Context Score
657
+ 100
658
+ 200
659
+ 400
660
+ 300
661
+ 500
662
+ 600
663
+ 700
664
+ 800
665
+ 0.2
666
+ 0.4
667
+ 0.6
668
+ 0.8
669
+ 0
670
+ 0.2
671
+ 0.4
672
+ 0.6
673
+ 0.8
674
+ 1.0
675
+ 1.0
676
+ Iu87
677
+ Malicious
678
+ User 1
679
+ User 2
680
+ User 3
681
+ User 4
682
+ User 5
683
+ Benign
684
+ User 1
685
+ Context Score
686
+ User 4
687
+ User 3
688
+ User 2
689
+ User 5
690
+ Model B
691
+ Model C
692
+ Model A
693
+ 2
694
+ 4
695
+ 6
696
+ 10
697
+ 8
698
+ (A)
699
+ (B)
700
+ (C)
701
+ (D)
702
+ Fig. 3. The figure contains four sub-figures. (A) Representation of trained DAbR in the 2-D plot. The red dot cluster represents malicious IP attributes. (B) Representation of
703
+ trained TAM. The stars represent the current time of arrival. (C) Representation of FLOW. The green cluster represents legitimate flow-level attributes and the red cluster represents
704
+ malicious ones. (D) Represents the calculated context score after combining scores from Model A is DAbR, Model B is TAM, and Model C is FLOW.
705
+ 0
706
+ 1
707
+ 2
708
+ 3
709
+ 4
710
+ 5
711
+ 6
712
+ 7
713
+ 8
714
+ 9
715
+ 10
716
+ Context Score (
717
+ )
718
+ 0
719
+ 200
720
+ 400
721
+ 600
722
+ 800
723
+ Latency (millisecond)
724
+ Policy 1
725
+ Policy 2
726
+ Policy 3
727
+ Fig. 4. An evaluation of our three implemented policies. The median of 30 trials is
728
+ reported for each reputation score.
729
+ D. PoW Instance – Hash Function
730
+ We discuss two sub-components of CAPOW that mimic
731
+ proof-of-work system: puzzle solver, and puzzle verifier.
732
+ Puzzle Solver. The puzzle solver takes user identifiers as input,
733
+ such as the timestamp of the arrival of the request packet (t),
734
+ and the user IP address (u). Additionally, the solver takes
735
+ a server seed value (ρ) to protect against pre-computational
736
+ attacks. To this, a n-bit string is added, which the client
737
+ modifies upon each hash function evaluation. We call this
738
+ string nonce denoted by η.
739
+ The user evaluates this input until it finds an output string
740
+ Y where Y = H(u||t||ρ||η) with d leading zeroes, where d is
741
+ the difficulty level assigned to the request packet. The puzzle
742
+ solver is a user-end component that is installed either in the
743
+ browser [19] or kernel-level. After solving, the user sends the
744
+ nonce back to the server for verification.
745
+ Puzzle Verifier. Puzzle verification is a server-side compo-
746
+ nent that performs straightforward verification of the puz-
747
+ zle solution by performing one hash evaluation, i.e., Y ′ =
748
+ H(u||t||ρ||η). If the sent η value leads to desired number of
749
+ leading 0’s, then the solution is verified.
750
+ Summary of CAPOW implementation evaluation. The con-
751
+ text scores produced by DAbR, TAM, and FLOW models are
752
+ combined to produce the final context score (Φ). As discussed
753
+ in Section III-C, some contexts might be more relevant than
754
+ others to provide attack specific defense. We denote weight w
755
+ as the significance of each context in the final context score.
756
+ The weights for each AI model are fixed through the policy
757
+ instance as discussed in Section IV-C.
758
+ Φ = arg max(w1α, w2β, w3γ)
759
+ (6)
760
+ where w1, w2, and w3 represent weights associated with
761
+ DAbR, TAM, and FLOW respectively. Figure 3(D) illustrates
762
+ the combined context score where w1, w2, and w3 is set to 1.
763
+ User U1 and U2 show that the final context score is decided
764
+ by FLOW model. Similarly, U3, U4, and U5 the final score
765
+ is decided by TAM model. Using policy 2, user U5 incurs
766
+ ≈ 300ms latency for a context score of 8, which is the highest
767
+ latency amongst other users introduced by CAPOW.
768
+ Notably, the evaluation performed using a simulated dataset
769
+ might not reflect the worst case efficiency of CAPOW as in
770
+ practice, user U5 might not be deviate in a temporal activity
771
+ context. In this section, we discuss that the cost of deceiving
772
+ multiple AI models is expensive for the adversary. In our
773
+ implementation, user U5 has to deceive three AI models to
774
+ receive an easy PoW puzzle by receiving lower context scores.
775
+ User U5 can receive a lower context score for DAbR by
776
+ trivially spoofing the IP address (Assumption 2). To deceive
777
+ TAM, the user can engineer the requests around the same time
778
+ as noticed during eavesdropping (Assumption 1). As reading
779
+ or tracking flow-level data embedded in request payload data
780
+ while eavesdropping is not possible (Assumption 1), the only
781
+ way to deceive FLOW is by sending multiple probe packets to
782
+ land on a low context score. This is an extensive approach as
783
+ a security personnel may select new contexts to improve the
784
+ defensive posture of the organization periodically. Therefore,
785
+ deceiving all AI models becomes expensive for the adversary.
786
+ To validate contribution 3, we designed and evaluated an
787
+ implementation instance on CAPOW and provided policy
788
+ designs to validate contribution 2. Finally, CAPOW ensures
789
+ that malicious users incur higher latency than legitimate users
790
+ based on the deviation in context pattern that prevents DDOS.
791
+ Hence, we validate contribution 1 (see Section I).
792
+ V. RELATED WORKS
793
+ In this section, we discuss the overview of proof-of-work
794
+ (PoW) literature in DDoS. Relevant to our work, we will also
795
+ discuss the current advances in AI-assisted cybersecurity.
796
+ 6
797
+
798
+ A. Classical Proof-of-Work
799
+ Dwork et. al [10] coined the term proof-of-work (PoW)
800
+ when they proposed the use of cryptographic hash functions
801
+ (also known as client puzzles) to combat unsolicited bulk
802
+ emails (junk emails). Following that, Franklin et. al [11]
803
+ proposed a lightweight website metering scheme in 1997 to
804
+ prevent fraudulent web server owners from inflating their
805
+ website’s popularity. In 1999, Jakobsson et. al [16] proposed
806
+ MicroMinting (originally proposed by Rivest et. al [30] as a
807
+ digital payment scheme) as a candidate problem that can reuse
808
+ the computational effort of solving the POW puzzle. Later that
809
+ year, Laurie et. al [18] proposed that proof of work does not
810
+ work in a spam setting.
811
+ B. Proof-of-Work as DoS defense
812
+ Similar to spam emails, in DDoS, it is significantly cheaper
813
+ for the attacking party to launch a DDoS attack than to defend
814
+ an infrastructure with the defending party. According to Arbor
815
+ network, launching a DoS attack costs an average of $66 per
816
+ attack and can cause damage to the victim of around $500 per
817
+ minute [20]. Aura et. al [4] proposed the first client puzzle
818
+ authentication protocol for a DoS resilient system. Mankins
819
+ et. al [21] investigated methods for tuning the amount of re-
820
+ source consumption to access server resources based on client
821
+ behavior, where the costs imposed can be either monetary
822
+ or computational. In a similar vein, Wang and Reiter [33]
823
+ investigate how clients can bid on puzzles through auctions.
824
+ Ndibwile et. al [22] proposed web traffic authentication as a
825
+ replacement for CAPTCHA-based defenses. Wu et. al [36]
826
+ proposed a software puzzle framework that disqualifies the
827
+ adversary’s ability to gain an advantage by using a GPU to
828
+ solve puzzles. A framework was put forth by Dean et. al [8] to
829
+ reduce DoS in TLS servers. A DoS variant was introduced by
830
+ Wood et. al [35]. Certain PoW defenses against DoS are layer-
831
+ specific. The network layer of the proof-of-work system used
832
+ by Parno et. al [26] prioritizes users who use more CPU time to
833
+ solve puzzles. The Heimdall architecture, which can detect any
834
+ change in network flow in routers, was introduced by Chen et.
835
+ al [7]. When a change in network flow is identified for any new
836
+ connection, a puzzle is generated and sent to the new user. The
837
+ difficulty of the computational challenges used in the context
838
+ of DoS attacks on the transport layer was recently assessed
839
+ using game theory by Noureddine et. al [23]. Walfish et.
840
+ al [32] propose an alternative resource called communication
841
+ capacity as a defense against application-layer flood attacks.
842
+ Other research has concentrated on incorporating PoW puzzles
843
+ into practical browsing experiences [5], [6], [19].
844
+ C. Automated DoS defense
845
+ In this section, we revisit the literature on ensemble learning
846
+ techniques for network traffic classification problems. En-
847
+ semble learning is a branch of supervised machine learning
848
+ technique that aggregates the learning of multiple base learners
849
+ to improve overall prediction accuracy [28]. Like network
850
+ traffic classification problems, each base learner is trained to
851
+ become an expert in the local area of the total feature space.
852
+ Gaikwad et. al [12] proposed a bagging ensemble approach
853
+ using REPTree base learners to improve classification over
854
+ weaker AI models. Gupta et. al [2] suggested an IDS system
855
+ that uses ensemble learning to address a class imbalance
856
+ problem. The ensemble learner uses three base learners. First,
857
+ the deep neural network classifies normal and suspicious
858
+ traffic. Second, eXtreme Gradient Boosting is used to identify
859
+ major attacks. Third, random forest is used to classify minor
860
+ attacks. Zhou et. al [1] proposed feature selection process
861
+ using ensemble learning in two stages. The first stage involves
862
+ feature reduction using the heuristic method CFS and the
863
+ Bat Algorithm (BA). The second stage involves aggregating
864
+ C4.5 and Random Forest (RF) algorithms. Jabbar et. al [15]
865
+ suggested an ensemble classifier that uses Alternating Decision
866
+ Tree (ADTree) and the k-Nearest Neighbor algorithm (kNN)
867
+ as base AI models. Paulauskas and Auskalnis [27] proposed an
868
+ ensemble learner that employs four base classifiers: J48, C5.0,
869
+ Naive Bayes, and Partial Decision List (PART) to improve
870
+ classification results over individual AI models.
871
+ VI. CONCLUSION AND FUTURE WORK
872
+ In this paper, we design and evaluate CAPOW a context-
873
+ aware AI-assisted PoW framework that protects critical servers
874
+ against DDoS. The underlying defensive strategy involves
875
+ adaptively introducing latency on malicious users. To achieve
876
+ this functionality, our framework employs an AI model that
877
+ takes the context attributes from the incoming user request
878
+ packet as input. The AI model computes deviation from
879
+ normal activity patterns to output a context score. This score
880
+ influences the difficulty level of a PoW puzzle that injects
881
+ latency adaptively during communication. CAPOW ensures
882
+ that the ability of a malicious user to prolong the attack is
883
+ constrained by adaptively introducing latency through PoW
884
+ puzzles and compelling malicious users to expend more re-
885
+ sources to complete an attack.
886
+ For future work, different design variants of CAPOW can
887
+ be configured to combat different DDoS attack types. PoW
888
+ systems suffer from inherent pitfalls of resource wastage which
889
+ can be circumvented by replacing the model with proof of
890
+ stake (PoS) component. Additionally, alternate design can
891
+ include enhanced human in loop strategy which provides
892
+ control of the framework to the security personnel deploying
893
+ the framework.
894
+ REFERENCES
895
+ [1] Building an efficient intrusion detection system based on feature selec-
896
+ tion and ensemble classifier. Computer Networks, 174:107247, 2020.
897
+ [2] Cse-ids: Using cost-sensitive deep learning and ensemble algorithms to
898
+ handle class imbalance in network-based intrusion detection systems.
899
+ Computers & Security, 112:102499, 2022.
900
+ [3] Anonymous.
901
+ Github.
902
+ Online Website, 2022.
903
+ https://github.com/
904
+ voyagerinfinite/CAPoW.
905
+ [4] Tuomas Aura, Pekka Nikander, and Jussipekka Leiwo. Dos resistant
906
+ authentication with client puzzles.
907
+ In Revised Papers from the 8th
908
+ International Workshop on Security Protocols, page 170–177, Berlin,
909
+ Heidelberg, 2000. Springer-Verlag.
910
+ [5] Trisha Chakraborty, Shaswata Mitra, Sudip Mittal, and Maxwell Young.
911
+ Ai adaptive pow: An ai assisted proof of work (pow) framework for
912
+ ddos defense. Software Impacts, 13:100335, 2022.
913
+ 7
914
+
915
+ [6] Trisha Chakraborty, Shaswata Mitra, Sudip Mittal, and Maxwell Young.
916
+ A policy driven ai-assisted pow framework.
917
+ 2022 52nd Annual
918
+ IEEE/IFIP International Conference on Dependable Systems and Net-
919
+ works - Supplemental Volume (DSN-S), pages 37–38, 2022.
920
+ [7] Y. Chen, W. Ku, K. Sakai, and C. DeCruze.
921
+ A novel ddos attack
922
+ defending framework with minimized bilateral damages. In 2010 7th
923
+ IEEE Consumer Communications and Networking Conference, pages
924
+ 1–5, 2010.
925
+ [8] Drew Dean and Adam Stubblefield.
926
+ Using client puzzles to protect
927
+ TLS.
928
+ In 10th USENIX Security Symposium (USENIX Security 01),
929
+ Washington, D.C., August 2001. USENIX Association.
930
+ [9] Anind K. Dey. Understanding and using context. page 4–7, 2001.
931
+ [10] Cynthia Dwork and Moni Naor. Pricing via processing or combatting
932
+ junk mail.
933
+ CRYPTO ’92, page 139–147, Berlin, Heidelberg, 1992.
934
+ Springer-Verlag.
935
+ [11] Matthew K. Franklin and Dahlia Malkhi.
936
+ Auditable metering with
937
+ lightweight security.
938
+ In Proceedings of the First International Con-
939
+ ference on Financial Cryptography, FC ’97, page 151–160, Berlin,
940
+ Heidelberg, 1997. Springer-Verlag.
941
+ [12] D.P. Gaikwad and Ravindra C. Thool. Intrusion detection system using
942
+ bagging ensemble method of machine learning. In 2015 International
943
+ Conference on Computing Communication Control and Automation,
944
+ pages 291–295, 2015.
945
+ [13] Jeff Green, Joshua Juen, Omid Fatemieh, Ravinder Shankesi, Dong Jin,
946
+ and Carl A. Gunter. Reconstructing hash reversal based proof of work
947
+ schemes. USA, 2011. USENIX Association.
948
+ [14] Diksha Gupta, Jared Saia, and Maxwell Young.
949
+ Resource burning
950
+ for permissionless systems. In International Colloquium on Structural
951
+ Information and Communication Complexity, pages 19–44. Springer,
952
+ 2020.
953
+ [15] M. A. Jabbar, Rajanikanth Aluvalu, and S. Sai Satyanarayana Reddy.
954
+ Cluster based ensemble classification for intrusion detection system.
955
+ New York, NY, USA, 2017. Association for Computing Machinery.
956
+ [16] Markus Jakobsson and Ari Juels. Proofs of work and bread pudding
957
+ protocols (extended abstract). 1999.
958
+ [17] Ari Juels and John Brainard. Client puzzles: A cryptographic counter-
959
+ measure against connection depletion attacks.
960
+ In Proceedings of the
961
+ Network and Distributed System Security Symposium (NDSS), pages
962
+ 151–165, 1999.
963
+ [18] Ben Laurie and Richard Clayton. Proof-of-work” proves not to work.
964
+ 2004.
965
+ [19] Tien Le, Akshay Dua, and Wu-chang Feng. kapow plugins: protecting
966
+ web applications using reputation-based proof-of-work.
967
+ In 2nd Joint
968
+ WICOW/AIRWeb Workshop on Web Quality, pages 60–63, 2012.
969
+ [20] Vincent
970
+ Lynch.
971
+ Everything
972
+ you
973
+ ever
974
+ wanted
975
+ to
976
+ know
977
+ about
978
+ dos/ddos
979
+ attacks,
980
+ 2017.
981
+ https://www.thesslstore.com/blog/
982
+ everything-you-ever-wanted-to-know-about-dosddos-attacks/.
983
+ [21] David Mankins, Rajesh Krishnan, Ceilyn Boyd, John Zao, and Michael
984
+ Frentz. Mitigating distributed denial of service attacks with dynamic
985
+ resource pricing. In Proceedings of the Seventeenth Annual Computer
986
+ Security Applications Conference, pages 411–421. IEEE, 2001.
987
+ [22] Jema David Ndibwile, A. Govardhan, Kazuya Okada, and Youki
988
+ Kadobayashi.
989
+ Web server protection against application layer ddos
990
+ attacks using machine learning and traffic authentication. In 2015 IEEE
991
+ 39th Annual Computer Software and Applications Conference, volume 3,
992
+ pages 261–267, 2015.
993
+ [23] M. A. Noureddine, A. M. Fawaz, A. Hsu, C. Guldner, S. Vijay, T. Bas¸ar,
994
+ and W. H. Sanders. Revisiting client puzzles for state exhaustion attacks
995
+ resilience. In Proceedings of the 49th Annual IEEE/IFIP International
996
+ Conference on Dependable Systems and Networks (DSN), pages 617–
997
+ 629, 2019.
998
+ [24] University of New Brunswick.
999
+ Intrusion detection evaluation dataset
1000
+ (cic-ids2017). Online Website, 2017. https://www.unb.ca/cic/datasets/
1001
+ ids-2017.html.
1002
+ [25] Andrew Orlowski.
1003
+ Meet ddosaas: Distributed denial of service-as-a-
1004
+ service. Online Website, 2016. https://www.theregister.com/2016/09/12/
1005
+ denial of service as a service/.
1006
+ [26] Bryan Parno, Dan Wendlandt, Elaine Shi, Adrian Perrig, Bruce Maggs,
1007
+ and Yih-Chun Hu. Portcullis: Protecting connection setup from denial-
1008
+ of-capability attacks. SIGCOMM ’07, page 289–300, New York, NY,
1009
+ USA, 2007. Association for Computing Machinery.
1010
+ [27] Nerijus Paulauskas and Juozas Auskalnis.
1011
+ Analysis of data pre-
1012
+ processing influence on intrusion detection using nsl-kdd dataset.
1013
+ In
1014
+ 2017 Open Conference of Electrical, Electronic and Information Sci-
1015
+ ences (eStream), pages 1–5, 2017.
1016
+ [28] R. Polikar. Ensemble based systems in decision making. IEEE Circuits
1017
+ and Systems Magazine, 6(3):21–45, 2006.
1018
+ [29] Arya Renjan, Karuna Pande Joshi, Sandeep Nair Narayanan, and
1019
+ Anupam Joshi. Dabr: Dynamic attribute-based reputation scoring for
1020
+ malicious ip address detection. In 2018 IEEE International Conference
1021
+ on Intelligence and Security Informatics (ISI), pages 64–69. IEEE, 2018.
1022
+ [30] Ronald L. Rivest and Adi Shamir. Payword and micromint: Two simple
1023
+ micropayment schemes. In Security Protocols Workshop, 1996.
1024
+ [31] Cisco Talos. Talos threat source, 2022. https://www.talosintelligence.
1025
+ com/.
1026
+ [32] Michael Walfish, Mythili Vutukuru, Hari Balakrishnan, David Karger,
1027
+ and Scott Shenker.
1028
+ DDoS Defense by Offense.
1029
+ In Proceedings of
1030
+ the 2006 Conference on Applications, Technologies, Architectures, and
1031
+ Protocols for Computer Communications (SIGCOMM), pages 303–314,
1032
+ 2006.
1033
+ [33] XiaoFeng Wang and Michael K. Reiter. Defending against denial-of-
1034
+ service attacks with puzzle auctions. In Proceedings of the 2003 IEEE
1035
+ Symposium on Security and Privacy, pages 78–92, 2003.
1036
+ [34] Brent Waters, Ari Juels, Alex Halderman, and Edward Felten.
1037
+ New
1038
+ client puzzle outsourcing techniques for DoS resistance. In Proceedings
1039
+ of the 11th ACM Conference on Computer and Communications Security
1040
+ (CCS), pages 246–256, 2004.
1041
+ [35] Paul Wood, Christopher Gutierrez, and Saurabh Bagchi.
1042
+ Denial of
1043
+ service elusion (dose): Keeping clients connected for less.
1044
+ In 2015
1045
+ IEEE 34th Symposium on Reliable Distributed Systems (SRDS), pages
1046
+ 94–103, 2015.
1047
+ [36] Yongdong Wu, Zhigang Zhao, Feng Bao, and Robert H. Deng. Software
1048
+ puzzle: A countermeasure to resource-inflated denial-of-service attacks.
1049
+ IEEE Transactions on Information Forensics and Security, 10(1):168–
1050
+ 177, 2015.
1051
+ [37] S¨uleyman ¨Ozdel, Pelin Damla Ates¸, C¸ a˘gatay Ates¸, Mutlu Koca, and
1052
+ Emin Anarım. Network anomaly detection with payload-based analysis.
1053
+ In 2022 30th Signal Processing and Communications Applications
1054
+ Conference (SIU), pages 1–4, 2022.
1055
+ 8
1056
+
3NFKT4oBgHgl3EQfQi0f/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:93f819ef367cb2c918234ff557d74d12bd5db18e74e1889f44138ef0ec654bda
3
+ size 2365286
49E1T4oBgHgl3EQfmQS7/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:f77a4faf00a20d6684c7448b8f23e14a0380bf5a64cc1980b3f81ed1201beccb
3
+ size 2031661
4NE0T4oBgHgl3EQfvQFL/content/2301.02615v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:96c40e6fbb48c0a50c2149ac8ce7f02a1880f86a0d0966a302ed9b4db7e7e1e1
3
+ size 3775262
4NE0T4oBgHgl3EQfvQFL/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:6015677b732cec665baa10c4265b614b049ddc5a385e5caed8795e88cc92282b
3
+ size 2752557
4NE0T4oBgHgl3EQfvQFL/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:f37a5c60e4593430adc2a9147cdef5b2aa03b1248e56e55a2bd5b0c1143b2694
3
+ size 106147
4NFQT4oBgHgl3EQfHjWk/content/2301.13249v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:7fbf2c01133db2cff33474e13e526cd800c2b6487a75a9870826a9f39c8e62f3
3
+ size 791371
4NFQT4oBgHgl3EQfHjWk/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:d91d1e7410db05bcf5a103ae6bf6190f4b4ed6c76bca008797916c4bff666e41
3
+ size 4915245
4NFQT4oBgHgl3EQfHjWk/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:9b9069844308561f7652c90065bf9eaa6428cc64233f4fc0e9e41201bdc66626
3
+ size 171077
59E2T4oBgHgl3EQf7Ahe/content/2301.04205v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:3ea55adb606a6a5b63433056d1909ec0777537aa1e8d24f0f308d7afbaba0e5d
3
+ size 842712
59E2T4oBgHgl3EQf7Ahe/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:685b814535e3c8ed811bcbe74994dc077d951a1bd1dd709aad98cef65e7751d8
3
+ size 3801133
59E2T4oBgHgl3EQf7Ahe/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:c4fefed88b4f1a01a6b30690ca29ad3ec3c515e2daedd4e03c593d37d382cb28
3
+ size 162728
5dE3T4oBgHgl3EQfQgnL/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:5e260e8d2552dbfce50b63fdcad9760a0550d0685febde21cc515ff410fc533f
3
+ size 4194349
69E4T4oBgHgl3EQf2A2F/content/tmp_files/2301.05295v1.pdf.txt ADDED
@@ -0,0 +1,416 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Rock Guitar Tablature Generation via
2
+ Natural Language Processing
3
+ Josue Casco-Rodriguez
4
+ Rice University
5
+ Houston, TX, USA
6
7
+ Abstract
8
+ Deep learning has recently empowered and democratized generative modeling of images and
9
+ text [1, 2], with additional concurrent works exploring the possibility of generating more complex
10
+ forms of data, such as audio [3, 4]. However, the high dimensionality, long-range dependencies,
11
+ and lack of standardized datasets currently makes generative modeling of audio and music very
12
+ challenging.
13
+ We propose to model music as a series of discrete notes upon which we can use
14
+ autoregressive natural language processing techniques for successful generative modeling. While
15
+ previous works used similar pipelines on data such as sheet music and MIDI [5, 6], we aim to
16
+ extend such approaches to the under-studied medium of guitar tablature. Specifically, we develop
17
+ the first work to our knowledge that models one specific genre—heavy rock—as guitar tablature.
18
+ Unlike other works in guitar tablature generation, we have a freely available public demo at
19
+ https://huggingface.co/spaces/josuelmet/Metal Music Interpolator.1
20
+ 1
21
+ Introduction
22
+ Music, like images and language, is a fundamental form of art and a quintessential piece of the hu-
23
+ man experience. Despite the fact that recent works—such as Stable Diffusion and OpenAI’s DALL-E
24
+ [7, 1]—have produced explosive breakthroughs in the generation and modeling of visual art, such
25
+ breakthroughs for music production have not yet been realized; however, recent works, such as Ope-
26
+ nAI’s Jukebox [4], have made progress towards advanced music generation. A large factor in why such
27
+ breakthroughs have yet to be is that music is challenging to model, requiring sequence-modeling of
28
+ data mediums that are not as well-understood or intuitive as images or words.
29
+ When investigating how a machine can learn to understand or generate music, one can begin by
30
+ understanding how people learn to work with music. Although music exists as a continuous-time au-
31
+ dio signal, people most efficiently understand and analyze music as a pattern of discrete frequencies
32
+ (for example, the note “A” = 440 Hz) that are played for discretely quantized intervals of time (e.g.,
33
+ quarter-, half-, and whole-notes). As such, sequence-modeling techniques for understanding sequences
34
+ of discrete data can be leveraged towards music modeling, given a sufficient dataset of music samples
35
+ represented in discrete forms.
36
+ While sheet music and Musical Instrument Digital Interface (MIDI) files are conventional forms of
37
+ discretely compressed representations of music, one prominent form of music representation that has
38
+ been studied less is guitar tablature (see fig. 1 and fig. 2). While appearing similar to traditional
39
+ sheet music, guitar tablature differs by representing notes as fret and string indices upon which the
40
+ instrument-players must place their fingers so as to produce a specific note, since stringed instruments
41
+ are unique in that most notes that can be played on them have more than one fret and string combi-
42
+ nation that can produce them.
43
+ We develop a new dataset of compressed representations of guitar tablature from one specific genre of
44
+ 1Our source code is used to train final demo model is available at https://github.com/Josuelmet/Metal-Music-
45
+ Interpolator.
46
+ 1
47
+ arXiv:2301.05295v1 [eess.AS] 12 Jan 2023
48
+
49
+ Figure 1:
50
+ A guitar tablature snippet of two measures written in 4/4 time. Each note is represented
51
+ not as its pitch, but rather as the specific fret index upon which a player should press upon a certain
52
+ string so as to produce the note. The fret index of a note on the string it is played on is equivalent to
53
+ the number of semitones between the note’s pitch and the lowest pitch that the string can play. Note
54
+ that certain notes contain information about their dynamics: for example, the P.M. symbol indicates
55
+ that certain notes should be played in a semi-muted fashion.
56
+ Figure 2:
57
+ Another guitar tablature snippet in 4/4 time, this time consisting of the iconic first measure
58
+ of Sweet Child O’ Mine by Guns N’ Roses. The six pitches arranged vertically on the left are the lowest
59
+ pitches that each of the six guitar strings can play.
60
+ music (heavy rock), as well as a neural network architecture that can leverage sequence modeling (such
61
+ as in long short-term memory networks or natural language processing models) to produce new guitar
62
+ tablature sequences when conditioned on a brief snippet of an existing guitar tablature. Specifically,
63
+ the proposed autoregressive model aims to estimate the most likely new tablature token xN+1 when
64
+ given the previous tokens x1, x2, ..., xN (i.e., estimate the conditional probability p(xN+1|x1, ..., xN)),
65
+ thus enabling an iterative procedure through which an M-token sequence can be generated from an
66
+ N-token sequence, for M > N.
67
+ 2
68
+ Background
69
+ 2.1
70
+ Sequence Models
71
+ Recurrent networks. Sequence modeling is a long-standing problem in machine learning and statis-
72
+ tics, with one of its earliest prominent efforts being recurrent neural networks [8]. While recurrent
73
+ neural networks are able to leverage a form of memory to model sequences of theoretically unbounded
74
+ contexts, in practice they and their recent variants [9] struggle to do so, in part due to gradient prop-
75
+ agation issues [10].
76
+ Transformers.
77
+ Meanwhile, transformers [11] circumvent the problems with recurrent neural net-
78
+ works by replacing recurrent operations with one feedforward attention operation that compares every
79
+ element of a sequence with every other element of the sequence; such an approach could initially
80
+ seem disadvantaged due to the memoryless nature, inherently finite bounded context [12], and O(N 2)
81
+ runtime of an attention mechanism on a sequence of length N [13]. However, when combined with
82
+ additional innovations such as positional embeddings and token dimensionality reduction via vector-
83
+ ization, transformer architectures have yielded enormous advances in sequence and image modeling
84
+ [2, 1, 14].
85
+ Self-attention. The key behind any transformer architecture is the self-attention mechanism. Given
86
+ a vector-valued input sequence X = [x1, x2, ..., xN] ∈ RN×Dx such that each element is Dx-dimensional
87
+ and the transformer feedforward dimension is D, a self-attention head transforms X into an output
88
+ sequence ˆV through the following: [13]
89
+ 2
90
+
91
+ P. M.
92
+ P. M.
93
+ P. M.
94
+ 4
95
+ 5
96
+ 18
97
+ 仆9
98
+ 10
99
+ 0
100
+ 0
101
+ 12
102
+ 0
103
+ 0
104
+ 11
105
+ 0
106
+ 81
107
+ D#
108
+ 15
109
+ 14
110
+ 4
111
+ A#
112
+ 15
113
+ F#
114
+ 14
115
+ —12
116
+ 14
117
+ 14
118
+ C#
119
+ 4
120
+ 12
121
+ G#
122
+ D#1. Using the weights WQ, WK ∈ RD×Dx and WV ∈ RDv×Dx, project X into three distinct
123
+ matrices—the query, key, and value matrices Q, K, and V—via these linear transformations:
124
+ Q = XWT
125
+ Q
126
+ K = XWT
127
+ K
128
+ V = XWT
129
+ V
130
+ 2. Let us express the query, key, and value matrices as Q = [q1, ..., qN]T , K = [k1, ..., kN]T , and
131
+ V = [v1, ..., vN]T , where the vectors qi, ki, vi for i ∈ {1, 2, ..., N} are the query, key, and value
132
+ vectors, respectively.
133
+ Each output sequence vector ˆvi is calculated by multiplying each value vector vj by a score
134
+ determined as the similarity between the query vector qi the key vector kj :
135
+ ˆvi =
136
+ N
137
+
138
+ j=1
139
+ softmax
140
+ �qT
141
+ i kj
142
+
143
+ D
144
+
145
+ vj
146
+ Calculation of ˆV = [ˆv1, ..., ˆvN]T can thus be simply expressed as:
147
+ ˆV = softmax
148
+
149
+ QKT
150
+
151
+ D
152
+
153
+ V = AV,
154
+ where the attention matrix A is computed by applying the softmax operation to each row of the
155
+ matrix QKT /
156
+
157
+ D [13].
158
+ 2.2
159
+ Related Works
160
+ Music/audio generation. Our key contribution to musical sequence modeling is publicly available
161
+ guitar tablature modeling of heavy rock. Various previous and ongoing works have approached music
162
+ generation both continuous and discrete data modalities. For example, the recent SaShiMi [3] and
163
+ Jukebox [4] architectures approach audio and music generation in the spaces of continuous waveforms
164
+ and discrete notes, respectively. The advent of diffusion models [15] has also found influence in a new
165
+ model combining spectrogram and MIDI music generation [16].
166
+ Guitar tablature literature.
167
+ The field of guitar tablature analysis is small but growing, with
168
+ various works tackling challenges such as graph-based solo analysis [17], transcription [18], dataset
169
+ collection, and sequence modeling [19, 20, 21]. Of particular importance to our work are AnimeTab
170
+ [19] and DadaGP [20], since they also opt for a transformer-based approach to statistically generate
171
+ sequences of guitar tablature. Unlike DadaGP, our model has token representations that are much
172
+ more simple and easy to understand, is trained on one specific genre, and has a publicly available
173
+ demo. While our model may share some similarities with AnimeTab, which was published during the
174
+ development of this work and is supposed to have a demo released soon, our model has a demo already
175
+ available and is trained on the genre of heavy rock music instead of anime/video game music.
176
+ 3
177
+ Methods
178
+ 3.1
179
+ Data Processing
180
+ Initial preprocessing. The success of statistical inference methods often reflects the quality of data
181
+ used for training—data preprocessing is just as important to a successful model as the model itself.
182
+ Our data preprocessing pipeline begins by first collecting a sizeable volume of songs, in guitar tabla-
183
+ ture format, that accurately represent one subgenre of music2. For each tablature file, every song is
184
+ first converted into 4/4 time for ease of processing, and is then converted into a Python object via
185
+ PyGuitarPro3 for ease of querying. Each track of each song (i.e., each instrument or voice of each
186
+ 2Complete list of songs: https://github.com/Josuelmet/Metal-Music-Interpolator/blob/main/songs/README.md
187
+ 3https://github.com/Perlence/PyGuitarPro
188
+ 3
189
+
190
+ Figure 3:
191
+ Note embedding scheme illustrated for the example note of a whole note on fret 0 of the
192
+ lowest string on a guitar/bass. The fret value is one-hot encoded as 0, the note length is one-hot
193
+ encoded as a whole note, and none of the flags are set to 1 because the note is neither dotted nor
194
+ palm-muted nor a dead/rest/tied note.
195
+ song, not including drums) is then converted into a one-dimensional list containing each note in the
196
+ song; each note is represented as a tuple containing the note’s pitch (with special designations for tied,
197
+ dead4, and rest notes) , duration, the chordal nature if applicable (with the represented chords being
198
+ 4th, diminished 5th, and perfect 5th chords), and two flags indicating whether the note is dotted and
199
+ whether the note is muted. Note that the pitch of each note is represented not as the musical pitch
200
+ of each note (e.g., “A4” or “C3”), but rather as the fret on the guitar (or bass) upon which a player
201
+ should place their finger so as to generate the note. Once all songs’ notes have been represented as
202
+ tuples, each tuple is converted to an integer via an invertible dictionary map.
203
+ Embedding initialization. After initial pre-processing, each song exists as a set of sequences, where
204
+ each sequence represents one voice or instrument and contains integers that represent each note. While
205
+ a na¨ıve sequence model could attempt inference upon these scalar sequences, modern sequence models
206
+ have found success in instead representing the individual tokens or elements of a sequence as vectors,
207
+ allowing for more expressive and informative representations token modalities. Unlike previous works
208
+ [20], we opt for a simple, but effective, initial token vectorization illustrated in fig. 3. Each initial
209
+ vectorized token embedding, before training, has 72 dimensions: the first 59 are reserved for one-hot
210
+ encoding the number of semitones (equivalent to the number of frets on a guitar or bass) between the
211
+ pitch value and the lowest pitch playable by the given instrument; the next 3 dimensions are flags indi-
212
+ cating if the note is a dead, rest, or tied note; the next 8 dimensions one-hot encode the note’s duration
213
+ (e.g., whole-, half-, and quarter-notes); and the last two dimensions are flags indicating if the note’s
214
+ duration is dotted and if the note is played in a muted fashion. While the vectorized token embeddings
215
+ are trained, and thus iteravely refined, during the training process, we found that our hand-crafted
216
+ initialization scheme performed better than default random token initialization. As in any other suc-
217
+ cessful transformer architecture, each token also has a positional embedding that accompanies the
218
+ vectorized token embedding before going into the transformer model.
219
+ 3.2
220
+ Model Architecture
221
+ In addition to implementing the entire data preprocessing pipeline with the only starting point being
222
+ PyGuitarPro for querying tablature files as Python objects, we also had to manually implement the
223
+ transformer architecture, since we opted for a mini-GPT model due to the relatively small dataset at
224
+ our disposal compared to the number of sequences and number of parameters used to train conven-
225
+ tional language models [2]. Since we were not using a pre-written transformer model, we also had to
226
+ implement a causal masking mechanism to ensure that the transformer cannot use information from
227
+ any tokens after the token it is trying to predict. After extensive hyperparameter tuning on a 90-10
228
+ testing-validation, split, our final hyperparameter values are located in table 1. The final mini-GPT ar-
229
+ chitecture consists of an embedding layer (as described earlier), three transformer blocks in sequence,
230
+ 4Dead notes are noted that are heavily muted such that they lose a distinct sense of pitch.
231
+ 4
232
+
233
+ 0
234
+ 0
235
+ 1
236
+ 2
237
+ 57
238
+ 58
239
+ Extra
240
+ Dead
241
+ Rest
242
+ Tied
243
+ Fret:
244
+ Note
245
+ 10
246
+ 0
247
+ 0
248
+ 0
249
+ 0
250
+ 0
251
+ 0
252
+ 0
253
+ Types:
254
+ cat
255
+ Dotted
256
+ Palm
257
+ Whole
258
+ Half
259
+ 64th
260
+ 128th
261
+ Duration
262
+ Mute
263
+ Note
264
+ 1
265
+ 0
266
+ Length:
267
+ 0
268
+ 0
269
+ 0
270
+ 0
271
+ 0Hyperparameter
272
+ Value
273
+ N (sequence length)
274
+ 100
275
+ Output dimensionality (number of unique tokens)
276
+ 1629
277
+ Initial embedding dimensionality
278
+ 72
279
+ Number of transformer blocks
280
+ 3
281
+ Transformer feedforward dimension
282
+ 512
283
+ Transformer dropout rate
284
+ 30%
285
+ Attention heads per transformer
286
+ 10
287
+ Initial learning rate
288
+ 0.003
289
+ β1 (Adam parameter)
290
+ 0.96
291
+ Batch size
292
+ 512
293
+ Training epochs (determined by early stopping)
294
+ ∼ 120
295
+ Table 1:
296
+ Hyperparameters of the final mini-GPT model.
297
+ Figure 4:
298
+ Training and validation accuracy and loss of the final mini-GPT model using a 90-10
299
+ training-validation split.
300
+ and one final feedforward layer that returns a 1629-dimensional vector representing the conditional
301
+ probability of the next token’s value p (xN+1|x1, ..., xN).
302
+ 4
303
+ Results
304
+ Performance. Using the hyperparameters specified in table 1 and early stopping based on the valida-
305
+ tion loss, our mini-GPT model achieved over 70% training accuracy and over 60% validation accuracy,
306
+ as shown in fig. 4. While it was possible to improve the training accuracy by reducing the transformer
307
+ dropout, we empirically found that doing so worsened validation generalization due to overfitting.
308
+ Qualititative evaluation of our model is made possible through the interactive demo provided5. Not
309
+ only is our work the first, to our knowledge, that provides a publicly accessible generation demo, but
310
+ our model’s success also further validates the usage of and need for natural language processing tech-
311
+ niques in the realm of audio and music generation.
312
+ Future works. Straightforward and interesting extensions of our model include more explicity incor-
313
+ porating rhythmic information [21] in the embeddings or as a separate embedding; such an approach
314
+ would be better able to capture and understand the differences between notes that land on downbeats,
315
+ upbeats, and backbeats. Another extension would be to model multiple tracks or voices at a time,
316
+ allowing for modeling of rich chords or drum sequences. For note-based chord or drum modeling, some
317
+ form of specialized translational invariance could be key to ensuring that the autoregressive model
318
+ understands that, when multiple notes are placed at the same time, their order in a sequence does not
319
+ matter. Using a more novel attention mechanism [13] could further improve performance. Diffusion
320
+ 5https://huggingface.co/spaces/josuelmet/Metal Music Interpolator
321
+ 5
322
+
323
+ Accuracy
324
+ Loss
325
+ 0.7
326
+ Train Accuracy
327
+ 6
328
+ Train LosS
329
+ Val Accuracy
330
+ Val Los5
331
+ 0.6
332
+ 5
333
+ 0.5
334
+ 4
335
+ 0.4
336
+ 3
337
+ 0.3
338
+ 0.2
339
+ 2 -
340
+ 0.1
341
+ 1
342
+ 0
343
+ 20
344
+ 40
345
+ 60
346
+ 80
347
+ 100
348
+ 120
349
+ 20
350
+ 40
351
+ 60
352
+ 80
353
+ 100
354
+ 120models could also play a role in generating sequences of guitar tablature, but whether they can out-
355
+ perform autoregressive language models has yet to be shown; recent work has shown that transformers
356
+ and diffusion models can be combined to produce state-of-the-art results in music generation [16].
357
+ References
358
+ [1] A. Ramesh, P. Dhariwal, A. Nichol, C. Chu, and M. Chen, “Hierarchical text-conditional image
359
+ generation with CLIP latents,” arXiv preprint arXiv:2204.06125, 2022.
360
+ [2] T. Brown, B. Mann, N. Ryder, M. Subbiah, J. D. Kaplan, P. Dhariwal, A. Neelakantan, P. Shyam,
361
+ G. Sastry, A. Askell, S. Agarwal, A. Herbert-Voss, G. Krueger, T. Henighan, R. Child, A. Ramesh,
362
+ D. Ziegler, J. Wu, C. Winter, C. Hesse, M. Chen, E. Sigler, M. Litwin, S. Gray, B. Chess, J. Clark,
363
+ C. Berner, S. McCandlish, A. Radford, I. Sutskever, and D. Amodei, “Language models are few-
364
+ shot learners,” in Advances in Neural Information Processing Systems, vol. 33, 2020.
365
+ [3] K. Goel, A. Gu, C. Donahue, and C. Re, “It’s raw! Audio generation with state-space models,”
366
+ in Proceedings of the 39th International Conference on Machine Learning, vol. 162 of Proceedings
367
+ of Machine Learning Research, 2022.
368
+ [4] P. Dhariwal, H. Jun, C. Payne, J. W. Kim, A. Radford, and I. Sutskever, “Jukebox: A generative
369
+ model for music,” arXiv preprint arXiv:2005.00341, 2020.
370
+ [5] C. Payne, “MuseNet,” OpenAI Blog, 2019.
371
+ [6] G. Mittal, J. Engel, C. Hawthorne, and I. Simon, “Symbolic music generation with diffusion
372
+ models,” in International Society for Music Information Retrieval Conference, vol. 22, 2021.
373
+ [7] R. Rombach, A. Blattmann, D. Lorenz, P. Esser, and B. Ommer, “High-resolution image synthesis
374
+ with latent diffusion models,” in Proceedings of the IEEE/CVF Conference on Computer Vision
375
+ and Pattern Recognition (CVPR), 2022.
376
+ [8] A. Sherstinsky, “Fundamentals of recurrent neural network (RNN) and long short-term memory
377
+ (LSTM) network,” Physica D: Nonlinear Phenomena, vol. 404, 2020.
378
+ [9] S. Hochreiter and J. Schmidhuber, “Long short-term memory,” Neural computation, vol. 9, no. 8,
379
+ pp. 1735–1780, 1997.
380
+ [10] B. Kiani, R. Balestriero, Y. LeCun, and S. Lloyd, “projUNN: efficient method for training deep
381
+ networks with unitary matrices,” in Advances in Neural Information Processing Systems, vol. 35,
382
+ 2022.
383
+ [11] A. Vaswani, N. Shazeer, N. Parmar, J. Uszkoreit, L. Jones, A. N. Gomez, �L. Kaiser, and I. Polo-
384
+ sukhin, “Attention is all you need,” in Advances in Neural Information Processing Systems, vol. 30,
385
+ 2017.
386
+ [12] A. Gu, K. Goel, and C. R´e, “Efficiently modeling long sequences with structured state spaces,”
387
+ in International Conference on Learning Representations, 2022.
388
+ [13] T. Nguyen, V. Suliafu, S. Osher, L. Chen, and B. Wang, “FMMformer: Efficient and flexible
389
+ transformer via decomposed near-field and far-field attention,” in Advances in Neural Information
390
+ Processing Systems, vol. 34, 2021.
391
+ [14] A. Dosovitskiy, L. Beyer, A. Kolesnikov, D. Weissenborn, X. Zhai, T. Unterthiner, M. Dehghani,
392
+ M. Minderer, G. Heigold, S. Gelly, J. Uszkoreit, and N. Houlsby, “An image is worth 16x16
393
+ words: Transformers for image recognition at scale,” in International Conference on Learning
394
+ Representations, 2021.
395
+ [15] J. Ho, A. Jain, and P. Abbeel, “Denoising diffusion probabilistic models,” in Advances in Neural
396
+ Information Processing Systems, vol. 33, 2020.
397
+ 6
398
+
399
+ [16] C. Hawthorne, I. Simon, A. Roberts, N. Zeghidour, J. Gardner, E. Manilow, and J. Engel, “Multi-
400
+ instrument music synthesis with spectrogram diffusion,” in International Society for Music Infor-
401
+ mation Retrieval Conference, vol. 23, 2022.
402
+ [17] S. Ferretti, “Guitar solos as networks,” in IEEE International Conference on Multimedia and
403
+ Expo, 2016.
404
+ [18] Y.-H. Chen, W.-Y. Hsiao, T.-K. Hsieh, J.-S. R. Jang, and Y.-H. Yang, “Towards automatic
405
+ transcription of polyphonic electric guitar music: A new dataset and a multi-loss transformer
406
+ model,” in IEEE International Conference on Acoustics, Speech and Signal Processing, 2022.
407
+ [19] Y. Zhou, Y. Ju, and L. Xie, “Animetab: A new guitar tablature dataset of anime and game
408
+ music,” 2022.
409
+ [20] P. Sarmento, A. Kumar, C. Carr, Z. Zukowski, M. Barthet, and Y.-H. Yang, “DadaGP: a dataset
410
+ of tokenized GuitarPro songs for sequence models,” in International Society for Music Information
411
+ Retrieval Conference, vol. 22, 2021.
412
+ [21] Y.-H. Chen, Y.-H. Huang, W.-Y. Hsiao, and Y.-H. Yang, “Automatic composition of guitar tabs
413
+ by transformers and groove modeling,” in International Society for Music Information Retrieval
414
+ Conference, vol. 21, 2020.
415
+ 7
416
+
69E4T4oBgHgl3EQf2A2F/content/tmp_files/load_file.txt ADDED
@@ -0,0 +1,323 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ filepath=/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf,len=322
2
+ page_content='Rock Guitar Tablature Generation via Natural Language Processing Josue Casco-Rodriguez Rice University Houston, TX, USA jc135@rice.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
3
+ page_content='edu Abstract Deep learning has recently empowered and democratized generative modeling of images and text [1, 2], with additional concurrent works exploring the possibility of generating more complex forms of data, such as audio [3, 4].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
4
+ page_content=' However, the high dimensionality, long-range dependencies, and lack of standardized datasets currently makes generative modeling of audio and music very challenging.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
5
+ page_content=' We propose to model music as a series of discrete notes upon which we can use autoregressive natural language processing techniques for successful generative modeling.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
6
+ page_content=' While previous works used similar pipelines on data such as sheet music and MIDI [5, 6], we aim to extend such approaches to the under-studied medium of guitar tablature.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
7
+ page_content=' Specifically, we develop the first work to our knowledge that models one specific genre—heavy rock—as guitar tablature.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
8
+ page_content=' Unlike other works in guitar tablature generation, we have a freely available public demo at https://huggingface.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
9
+ page_content='co/spaces/josuelmet/Metal Music Interpolator.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
10
+ page_content='1 1 Introduction Music, like images and language, is a fundamental form of art and a quintessential piece of the hu- man experience.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
11
+ page_content=' Despite the fact that recent works—such as Stable Diffusion and OpenAI’s DALL-E [7, 1]—have produced explosive breakthroughs in the generation and modeling of visual art, such breakthroughs for music production have not yet been realized;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
12
+ page_content=' however, recent works, such as Ope- nAI’s Jukebox [4], have made progress towards advanced music generation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
13
+ page_content=' A large factor in why such breakthroughs have yet to be is that music is challenging to model, requiring sequence-modeling of data mediums that are not as well-understood or intuitive as images or words.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
14
+ page_content=' When investigating how a machine can learn to understand or generate music, one can begin by understanding how people learn to work with music.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
15
+ page_content=' Although music exists as a continuous-time au- dio signal, people most efficiently understand and analyze music as a pattern of discrete frequencies (for example, the note “A” = 440 Hz) that are played for discretely quantized intervals of time (e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
16
+ page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
17
+ page_content=', quarter-, half-, and whole-notes).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
18
+ page_content=' As such, sequence-modeling techniques for understanding sequences of discrete data can be leveraged towards music modeling, given a sufficient dataset of music samples represented in discrete forms.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
19
+ page_content=' While sheet music and Musical Instrument Digital Interface (MIDI) files are conventional forms of discretely compressed representations of music, one prominent form of music representation that has been studied less is guitar tablature (see fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
20
+ page_content=' 1 and fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
21
+ page_content=' 2).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
22
+ page_content=' While appearing similar to traditional sheet music, guitar tablature differs by representing notes as fret and string indices upon which the instrument-players must place their fingers so as to produce a specific note, since stringed instruments are unique in that most notes that can be played on them have more than one fret and string combi- nation that can produce them.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
23
+ page_content=' We develop a new dataset of compressed representations of guitar tablature from one specific genre of 1Our source code is used to train final demo model is available at https://github.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
24
+ page_content='com/Josuelmet/Metal-Music- Interpolator.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
25
+ page_content=' 1 arXiv:2301.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
26
+ page_content='05295v1 [eess.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
27
+ page_content='AS] 12 Jan 2023 Figure 1: A guitar tablature snippet of two measures written in 4/4 time.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
28
+ page_content=' Each note is represented not as its pitch, but rather as the specific fret index upon which a player should press upon a certain string so as to produce the note.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
29
+ page_content=' The fret index of a note on the string it is played on is equivalent to the number of semitones between the note’s pitch and the lowest pitch that the string can play.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
30
+ page_content=' Note that certain notes contain information about their dynamics: for example, the P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
31
+ page_content='M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
32
+ page_content=' symbol indicates that certain notes should be played in a semi-muted fashion.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
33
+ page_content=' Figure 2: Another guitar tablature snippet in 4/4 time, this time consisting of the iconic first measure of Sweet Child O’ Mine by Guns N’ Roses.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
34
+ page_content=' The six pitches arranged vertically on the left are the lowest pitches that each of the six guitar strings can play.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
35
+ page_content=' music (heavy rock), as well as a neural network architecture that can leverage sequence modeling (such as in long short-term memory networks or natural language processing models) to produce new guitar tablature sequences when conditioned on a brief snippet of an existing guitar tablature.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
36
+ page_content=' Specifically, the proposed autoregressive model aims to estimate the most likely new tablature token xN+1 when given the previous tokens x1, x2, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
37
+ page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
38
+ page_content=', xN (i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
39
+ page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
40
+ page_content=', estimate the conditional probability p(xN+1|x1, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
41
+ page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
42
+ page_content=', xN)), thus enabling an iterative procedure through which an M-token sequence can be generated from an N-token sequence, for M > N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
43
+ page_content=' 2 Background 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
44
+ page_content='1 Sequence Models Recurrent networks.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
45
+ page_content=' Sequence modeling is a long-standing problem in machine learning and statis- tics, with one of its earliest prominent efforts being recurrent neural networks [8].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
46
+ page_content=' While recurrent neural networks are able to leverage a form of memory to model sequences of theoretically unbounded contexts, in practice they and their recent variants [9] struggle to do so, in part due to gradient prop- agation issues [10].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
47
+ page_content=' Transformers.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
48
+ page_content=' Meanwhile, transformers [11] circumvent the problems with recurrent neural net- works by replacing recurrent operations with one feedforward attention operation that compares every element of a sequence with every other element of the sequence;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
49
+ page_content=' such an approach could initially seem disadvantaged due to the memoryless nature, inherently finite bounded context [12], and O(N 2) runtime of an attention mechanism on a sequence of length N [13].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
50
+ page_content=' However, when combined with additional innovations such as positional embeddings and token dimensionality reduction via vector- ization, transformer architectures have yielded enormous advances in sequence and image modeling [2, 1, 14].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
51
+ page_content=' Self-attention.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
52
+ page_content=' The key behind any transformer architecture is the self-attention mechanism.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
53
+ page_content=' Given a vector-valued input sequence X = [x1, x2, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
54
+ page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
55
+ page_content=', xN] ∈ RN×Dx such that each element is Dx-dimensional and the transformer feedforward dimension is D, a self-attention head transforms X into an output sequence ˆV through the following: [13] 2 P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
56
+ page_content=' M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
57
+ page_content=' P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
58
+ page_content=' M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
59
+ page_content=' P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
60
+ page_content=' M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
61
+ page_content=' 4 5 18 仆9 10 0 0 12 0 0 11 0 81 D# 15 14 4 A# 15 F# 14 —12 14 14 C# 4 12 G# D#1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
62
+ page_content=' Using the weights WQ, WK ∈ RD×Dx and WV ∈ RDv×Dx, project X into three distinct matrices—the query, key, and value matrices Q, K, and V—via these linear transformations: Q = XWT Q K = XWT K V = XWT V 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
63
+ page_content=' Let us express the query, key, and value matrices as Q = [q1, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
64
+ page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
65
+ page_content=', qN]T , K = [k1, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
66
+ page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
67
+ page_content=', kN]T , and V = [v1, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
68
+ page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
69
+ page_content=', vN]T , where the vectors qi, ki, vi for i ∈ {1, 2, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
70
+ page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
71
+ page_content=', N} are the query, key, and value vectors, respectively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
72
+ page_content=' Each output sequence vector ˆvi is calculated by multiplying each value vector vj by a score determined as the similarity between the query vector qi the key vector kj : ˆvi = N � j=1 softmax �qT i kj √ D � vj Calculation of ˆV = [ˆv1, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
73
+ page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
74
+ page_content=', ˆvN]T can thus be simply expressed as: ˆV = softmax � QKT √ D � V = AV, where the attention matrix A is computed by applying the softmax operation to each row of the matrix QKT / √ D [13].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
75
+ page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
76
+ page_content='2 Related Works Music/audio generation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
77
+ page_content=' Our key contribution to musical sequence modeling is publicly available guitar tablature modeling of heavy rock.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
78
+ page_content=' Various previous and ongoing works have approached music generation both continuous and discrete data modalities.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
79
+ page_content=' For example, the recent SaShiMi [3] and Jukebox [4] architectures approach audio and music generation in the spaces of continuous waveforms and discrete notes, respectively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
80
+ page_content=' The advent of diffusion models [15] has also found influence in a new model combining spectrogram and MIDI music generation [16].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
81
+ page_content=' Guitar tablature literature.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
82
+ page_content=' The field of guitar tablature analysis is small but growing, with various works tackling challenges such as graph-based solo analysis [17], transcription [18], dataset collection, and sequence modeling [19, 20, 21].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
83
+ page_content=' Of particular importance to our work are AnimeTab [19] and DadaGP [20], since they also opt for a transformer-based approach to statistically generate sequences of guitar tablature.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
84
+ page_content=' Unlike DadaGP, our model has token representations that are much more simple and easy to understand, is trained on one specific genre, and has a publicly available demo.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
85
+ page_content=' While our model may share some similarities with AnimeTab, which was published during the development of this work and is supposed to have a demo released soon, our model has a demo already available and is trained on the genre of heavy rock music instead of anime/video game music.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
86
+ page_content=' 3 Methods 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
87
+ page_content='1 Data Processing Initial preprocessing.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
88
+ page_content=' The success of statistical inference methods often reflects the quality of data used for training—data preprocessing is just as important to a successful model as the model itself.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
89
+ page_content=' Our data preprocessing pipeline begins by first collecting a sizeable volume of songs, in guitar tabla- ture format, that accurately represent one subgenre of music2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
90
+ page_content=' For each tablature file, every song is first converted into 4/4 time for ease of processing, and is then converted into a Python object via PyGuitarPro3 for ease of querying.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
91
+ page_content=' Each track of each song (i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
92
+ page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
93
+ page_content=', each instrument or voice of each 2Complete list of songs: https://github.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
94
+ page_content='com/Josuelmet/Metal-Music-Interpolator/blob/main/songs/README.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
95
+ page_content='md 3https://github.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
96
+ page_content='com/Perlence/PyGuitarPro 3 Figure 3: Note embedding scheme illustrated for the example note of a whole note on fret 0 of the lowest string on a guitar/bass.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
97
+ page_content=' The fret value is one-hot encoded as 0, the note length is one-hot encoded as a whole note, and none of the flags are set to 1 because the note is neither dotted nor palm-muted nor a dead/rest/tied note.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
98
+ page_content=' song, not including drums) is then converted into a one-dimensional list containing each note in the song;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
99
+ page_content=' each note is represented as a tuple containing the note’s pitch (with special designations for tied, dead4, and rest notes) , duration, the chordal nature if applicable (with the represented chords being 4th, diminished 5th, and perfect 5th chords), and two flags indicating whether the note is dotted and whether the note is muted.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
100
+ page_content=' Note that the pitch of each note is represented not as the musical pitch of each note (e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
101
+ page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
102
+ page_content=', “A4” or “C3”), but rather as the fret on the guitar (or bass) upon which a player should place their finger so as to generate the note.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
103
+ page_content=' Once all songs’ notes have been represented as tuples, each tuple is converted to an integer via an invertible dictionary map.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
104
+ page_content=' Embedding initialization.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
105
+ page_content=' After initial pre-processing, each song exists as a set of sequences, where each sequence represents one voice or instrument and contains integers that represent each note.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
106
+ page_content=' While a na¨ıve sequence model could attempt inference upon these scalar sequences, modern sequence models have found success in instead representing the individual tokens or elements of a sequence as vectors, allowing for more expressive and informative representations token modalities.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
107
+ page_content=' Unlike previous works [20], we opt for a simple, but effective, initial token vectorization illustrated in fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
108
+ page_content=' 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
109
+ page_content=' Each initial vectorized token embedding, before training, has 72 dimensions: the first 59 are reserved for one-hot encoding the number of semitones (equivalent to the number of frets on a guitar or bass) between the pitch value and the lowest pitch playable by the given instrument;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
110
+ page_content=' the next 3 dimensions are flags indi- cating if the note is a dead, rest, or tied note;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
111
+ page_content=' the next 8 dimensions one-hot encode the note’s duration (e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
112
+ page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
113
+ page_content=', whole-, half-, and quarter-notes);' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
114
+ page_content=' and the last two dimensions are flags indicating if the note’s duration is dotted and if the note is played in a muted fashion.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
115
+ page_content=' While the vectorized token embeddings are trained, and thus iteravely refined, during the training process, we found that our hand-crafted initialization scheme performed better than default random token initialization.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
116
+ page_content=' As in any other suc- cessful transformer architecture, each token also has a positional embedding that accompanies the vectorized token embedding before going into the transformer model.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
117
+ page_content=' 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
118
+ page_content='2 Model Architecture In addition to implementing the entire data preprocessing pipeline with the only starting point being PyGuitarPro for querying tablature files as Python objects, we also had to manually implement the transformer architecture, since we opted for a mini-GPT model due to the relatively small dataset at our disposal compared to the number of sequences and number of parameters used to train conven- tional language models [2].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
119
+ page_content=' Since we were not using a pre-written transformer model, we also had to implement a causal masking mechanism to ensure that the transformer cannot use information from any tokens after the token it is trying to predict.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
120
+ page_content=' After extensive hyperparameter tuning on a 90-10 testing-validation, split, our final hyperparameter values are located in table 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
121
+ page_content=' The final mini-GPT ar- chitecture consists of an embedding layer (as described earlier), three transformer blocks in sequence, 4Dead notes are noted that are heavily muted such that they lose a distinct sense of pitch.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
122
+ page_content=' 4 0 0 1 2 57 58 Extra Dead Rest Tied Fret: Note 10 0 0 0 0 0 0 0 Types: cat Dotted Palm Whole Half 64th 128th Duration Mute Note 1 0 Length: 0 0 0 0 0Hyperparameter Value N (sequence length) 100 Output dimensionality (number of unique tokens) 1629 Initial embedding dimensionality 72 Number of transformer blocks 3 Transformer feedforward dimension 512 Transformer dropout rate 30% Attention heads per transformer 10 Initial learning rate 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
123
+ page_content='003 β1 (Adam parameter) 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
124
+ page_content='96 Batch size 512 Training epochs (determined by early stopping) ∼ 120 Table 1: Hyperparameters of the final mini-GPT model.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
125
+ page_content=' Figure 4: Training and validation accuracy and loss of the final mini-GPT model using a 90-10 training-validation split.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
126
+ page_content=' and one final feedforward layer that returns a 1629-dimensional vector representing the conditional probability of the next token’s value p (xN+1|x1, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
127
+ page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
128
+ page_content=', xN).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
129
+ page_content=' 4 Results Performance.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
130
+ page_content=' Using the hyperparameters specified in table 1 and early stopping based on the valida- tion loss, our mini-GPT model achieved over 70% training accuracy and over 60% validation accuracy, as shown in fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
131
+ page_content=' 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
132
+ page_content=' While it was possible to improve the training accuracy by reducing the transformer dropout, we empirically found that doing so worsened validation generalization due to overfitting.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
133
+ page_content=' Qualititative evaluation of our model is made possible through the interactive demo provided5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
134
+ page_content=' Not only is our work the first, to our knowledge, that provides a publicly accessible generation demo, but our model’s success also further validates the usage of and need for natural language processing tech- niques in the realm of audio and music generation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
135
+ page_content=' Future works.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
136
+ page_content=' Straightforward and interesting extensions of our model include more explicity incor- porating rhythmic information [21] in the embeddings or as a separate embedding;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
137
+ page_content=' such an approach would be better able to capture and understand the differences between notes that land on downbeats, upbeats, and backbeats.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
138
+ page_content=' Another extension would be to model multiple tracks or voices at a time, allowing for modeling of rich chords or drum sequences.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
139
+ page_content=' For note-based chord or drum modeling, some form of specialized translational invariance could be key to ensuring that the autoregressive model understands that, when multiple notes are placed at the same time, their order in a sequence does not matter.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
140
+ page_content=' Using a more novel attention mechanism [13] could further improve performance.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
141
+ page_content=' Diffusion 5https://huggingface.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
142
+ page_content='co/spaces/josuelmet/Metal Music Interpolator 5 Accuracy Loss 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
143
+ page_content='7 Train Accuracy 6 Train LosS Val Accuracy Val Los5 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
144
+ page_content='6 5 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
145
+ page_content='5 4 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
146
+ page_content='4 3 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
147
+ page_content='3 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
148
+ page_content='2 2 - 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
149
+ page_content='1 1 0 20 40 60 80 100 120 20 40 60 80 100 120models could also play a role in generating sequences of guitar tablature, but whether they can out- perform autoregressive language models has yet to be shown;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
150
+ page_content=' recent work has shown that transformers and diffusion models can be combined to produce state-of-the-art results in music generation [16].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
151
+ page_content=' References [1] A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
152
+ page_content=' Ramesh, P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
153
+ page_content=' Dhariwal, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
154
+ page_content=' Nichol, C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
155
+ page_content=' Chu, and M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
156
+ page_content=' Chen, “Hierarchical text-conditional image generation with CLIP latents,” arXiv preprint arXiv:2204.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
157
+ page_content='06125, 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
158
+ page_content=' [2] T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
159
+ page_content=' Brown, B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
160
+ page_content=' Mann, N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
161
+ page_content=' Ryder, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
162
+ page_content=' Subbiah, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
163
+ page_content=' D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
164
+ page_content=' Kaplan, P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
165
+ page_content=' Dhariwal, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
166
+ page_content=' Neelakantan, P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
167
+ page_content=' Shyam, G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
168
+ page_content=' Sastry, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
169
+ page_content=' Askell, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
170
+ page_content=' Agarwal, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
171
+ page_content=' Herbert-Voss, G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
172
+ page_content=' Krueger, T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
173
+ page_content=' Henighan, R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
174
+ page_content=' Child, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
175
+ page_content=' Ramesh, D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
176
+ page_content=' Ziegler, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
177
+ page_content=' Wu, C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
178
+ page_content=' Winter, C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
179
+ page_content=' Hesse, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
180
+ page_content=' Chen, E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
181
+ page_content=' Sigler, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
182
+ page_content=' Litwin, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
183
+ page_content=' Gray, B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
184
+ page_content=' Chess, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
185
+ page_content=' Clark, C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
186
+ page_content=' Berner, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
187
+ page_content=' McCandlish, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
188
+ page_content=' Radford, I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
189
+ page_content=' Sutskever, and D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
190
+ page_content=' Amodei, “Language models are few- shot learners,” in Advances in Neural Information Processing Systems, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
191
+ page_content=' 33, 2020.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
192
+ page_content=' [3] K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
193
+ page_content=' Goel, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
194
+ page_content=' Gu, C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
195
+ page_content=' Donahue, and C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
196
+ page_content=' Re, “It’s raw!' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
197
+ page_content=' Audio generation with state-space models,” in Proceedings of the 39th International Conference on Machine Learning, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
198
+ page_content=' 162 of Proceedings of Machine Learning Research, 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
199
+ page_content=' [4] P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
200
+ page_content=' Dhariwal, H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
201
+ page_content=' Jun, C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
202
+ page_content=' Payne, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
203
+ page_content=' W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
204
+ page_content=' Kim, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
205
+ page_content=' Radford, and I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
206
+ page_content=' Sutskever, “Jukebox: A generative model for music,” arXiv preprint arXiv:2005.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
207
+ page_content='00341, 2020.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
208
+ page_content=' [5] C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
209
+ page_content=' Payne, “MuseNet,” OpenAI Blog, 2019.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
210
+ page_content=' [6] G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
211
+ page_content=' Mittal, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
212
+ page_content=' Engel, C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
213
+ page_content=' Hawthorne, and I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
214
+ page_content=' Simon, “Symbolic music generation with diffusion models,” in International Society for Music Information Retrieval Conference, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
215
+ page_content=' 22, 2021.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
216
+ page_content=' [7] R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
217
+ page_content=' Rombach, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
218
+ page_content=' Blattmann, D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
219
+ page_content=' Lorenz, P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
220
+ page_content=' Esser, and B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
221
+ page_content=' Ommer, “High-resolution image synthesis with latent diffusion models,” in Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
222
+ page_content=' [8] A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
223
+ page_content=' Sherstinsky, “Fundamentals of recurrent neural network (RNN) and long short-term memory (LSTM) network,” Physica D: Nonlinear Phenomena, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
224
+ page_content=' 404, 2020.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
225
+ page_content=' [9] S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
226
+ page_content=' Hochreiter and J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
227
+ page_content=' Schmidhuber, “Long short-term memory,” Neural computation, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
228
+ page_content=' 9, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
229
+ page_content=' 8, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
230
+ page_content=' 1735–1780, 1997.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
231
+ page_content=' [10] B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
232
+ page_content=' Kiani, R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
233
+ page_content=' Balestriero, Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
234
+ page_content=' LeCun, and S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
235
+ page_content=' Lloyd, “projUNN: efficient method for training deep networks with unitary matrices,” in Advances in Neural Information Processing Systems, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
236
+ page_content=' 35, 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
237
+ page_content=' [11] A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
238
+ page_content=' Vaswani, N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
239
+ page_content=' Shazeer, N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
240
+ page_content=' Parmar, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
241
+ page_content=' Uszkoreit, L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
242
+ page_content=' Jones, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
243
+ page_content=' N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
244
+ page_content=' Gomez, �L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
245
+ page_content=' Kaiser, and I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
246
+ page_content=' Polo- sukhin, “Attention is all you need,” in Advances in Neural Information Processing Systems, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
247
+ page_content=' 30, 2017.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
248
+ page_content=' [12] A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
249
+ page_content=' Gu, K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
250
+ page_content=' Goel, and C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
251
+ page_content=' R´e, “Efficiently modeling long sequences with structured state spaces,” in International Conference on Learning Representations, 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
252
+ page_content=' [13] T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
253
+ page_content=' Nguyen, V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
254
+ page_content=' Suliafu, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
255
+ page_content=' Osher, L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
256
+ page_content=' Chen, and B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
257
+ page_content=' Wang, “FMMformer: Efficient and flexible transformer via decomposed near-field and far-field attention,” in Advances in Neural Information Processing Systems, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
258
+ page_content=' 34, 2021.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
259
+ page_content=' [14] A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
260
+ page_content=' Dosovitskiy, L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
261
+ page_content=' Beyer, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
262
+ page_content=' Kolesnikov, D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
263
+ page_content=' Weissenborn, X.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
264
+ page_content=' Zhai, T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
265
+ page_content=' Unterthiner, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
266
+ page_content=' Dehghani, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
267
+ page_content=' Minderer, G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
268
+ page_content=' Heigold, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
269
+ page_content=' Gelly, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
270
+ page_content=' Uszkoreit, and N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
271
+ page_content=' Houlsby, “An image is worth 16x16 words: Transformers for image recognition at scale,” in International Conference on Learning Representations, 2021.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
272
+ page_content=' [15] J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
273
+ page_content=' Ho, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
274
+ page_content=' Jain, and P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
275
+ page_content=' Abbeel, “Denoising diffusion probabilistic models,” in Advances in Neural Information Processing Systems, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
276
+ page_content=' 33, 2020.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
277
+ page_content=' 6 [16] C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
278
+ page_content=' Hawthorne, I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
279
+ page_content=' Simon, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
280
+ page_content=' Roberts, N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
281
+ page_content=' Zeghidour, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
282
+ page_content=' Gardner, E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
283
+ page_content=' Manilow, and J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
284
+ page_content=' Engel, “Multi- instrument music synthesis with spectrogram diffusion,” in International Society for Music Infor- mation Retrieval Conference, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
285
+ page_content=' 23, 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
286
+ page_content=' [17] S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
287
+ page_content=' Ferretti, “Guitar solos as networks,” in IEEE International Conference on Multimedia and Expo, 2016.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
288
+ page_content=' [18] Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
289
+ page_content='-H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
290
+ page_content=' Chen, W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
291
+ page_content='-Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
292
+ page_content=' Hsiao, T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
293
+ page_content='-K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
294
+ page_content=' Hsieh, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
295
+ page_content='-S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
296
+ page_content=' R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
297
+ page_content=' Jang, and Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
298
+ page_content='-H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
299
+ page_content=' Yang, “Towards automatic transcription of polyphonic electric guitar music: A new dataset and a multi-loss transformer model,” in IEEE International Conference on Acoustics, Speech and Signal Processing, 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
300
+ page_content=' [19] Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
301
+ page_content=' Zhou, Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
302
+ page_content=' Ju, and L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
303
+ page_content=' Xie, “Animetab: A new guitar tablature dataset of anime and game music,” 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
304
+ page_content=' [20] P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
305
+ page_content=' Sarmento, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
306
+ page_content=' Kumar, C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
307
+ page_content=' Carr, Z.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
308
+ page_content=' Zukowski, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
309
+ page_content=' Barthet, and Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
310
+ page_content='-H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
311
+ page_content=' Yang, “DadaGP: a dataset of tokenized GuitarPro songs for sequence models,” in International Society for Music Information Retrieval Conference, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
312
+ page_content=' 22, 2021.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
313
+ page_content=' [21] Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
314
+ page_content='-H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
315
+ page_content=' Chen, Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
316
+ page_content='-H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
317
+ page_content=' Huang, W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
318
+ page_content='-Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
319
+ page_content=' Hsiao, and Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
320
+ page_content='-H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
321
+ page_content=' Yang, “Automatic composition of guitar tabs by transformers and groove modeling,” in International Society for Music Information Retrieval Conference, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
322
+ page_content=' 21, 2020.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
323
+ page_content=' 7' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
7NE4T4oBgHgl3EQfCQsk/content/tmp_files/2301.04858v1.pdf.txt ADDED
@@ -0,0 +1,1675 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Advancing carrier transport models for InAs/GaSb type-II superlattice MWIR
2
+ photodetectors
3
+ Rohit Kumar, Anup Kumar Mandia, Anuja Singh and Bhaskaran Muralidharan∗
4
+ Department of Electrical Engineering, Indian Institute of Technology Bombay, Powai, Mumbai-400076, India
5
+ (Dated: January 13, 2023)
6
+ In order to provide the best possible performance, modern infrared photodetector designs necessitate
7
+ extremely precise modeling of the superlattice absorber region. We advance the Rode’s method for
8
+ the Boltzmann transport equation in conjunction with the k.p band structure and the envelope
9
+ function approximation for a detailed computation of the carrier mobility and conductivity of layered
10
+ type-II superlattice structures, using which, we unravel two crucial insights. First, the significance of
11
+ both elastic and inelastic scattering mechanisms, particularly the influence of the interface roughness
12
+ and polar optical phonon scattering mechanisms in technologically relevant superlattice structures.
13
+ Second, that the structure-specific Hall mobility and Hall scattering factor reveals that temperature
14
+ and carrier concentrations significantly affect the Hall scattering factor, which deviates significantly
15
+ from unity even for small magnetic fields.
16
+ This reinforces the caution that should be exercised
17
+ when employing the Hall scattering factor in experimental estimations of drift mobilities and carrier
18
+ concentrations.
19
+ Our research hence offers a comprehensive microscopic understanding of carrier
20
+ dynamics in such technologically relevant superlattices. Our models also provide highly accurate
21
+ and precise transport parameters beyond the relaxation time approximation and thereby paving the
22
+ way to develop physics-based device modules for mid-wavelength infrared photodetectors.
23
+ I.
24
+ INTRODUCTION
25
+ Modeling state-of-the-art infrared (IR) photodetectors
26
+ [1–6] require highly accurate transport parameters for de-
27
+ veloping dark and photocurrent performance projections
28
+ [5, 7–10]. Current technologically relevant IR photode-
29
+ tectors use III-V materials such as InAs/GaSb [11, 12]
30
+ due to numerous advantages [13, 14]. Type-II superlat-
31
+ tices (T2SLs) based on stacks of InAs/GaSb [1, 2, 14] are
32
+ thus extensively used to design high-performance third-
33
+ generation IR detectors [15, 16]. Despite the fact that the
34
+ mobility of the photogenerated minority carriers has a
35
+ significant impact on the performance of IR photodetec-
36
+ tors, carrier transport in technologically relevant T2SL
37
+ structures has not as extensively been explored. Recent
38
+ explorations in this context [17–23] which include carrier
39
+ mobility calculations [24], do not conclusively bring to
40
+ the fore structure-specific impact of important scatter-
41
+ ing mechanisms such as Piezoelectric (PZ), polar opti-
42
+ cal phonon (POP), acoustic deformation potential (ADP)
43
+ scattering mechanisms and most importantly the inter-
44
+ face roughness scattering (IRS).
45
+ With the necessity to develop a deeper understand-
46
+ ing of carrier transport in technologically relevant T2SLs,
47
+ this work advances an accurate model for transport calcu-
48
+ lations, wherein, we investigate different scattering lim-
49
+ ited transport under low-field in InAs/GaSb superlattices
50
+ (SLs) as a function of free electron carrier concentration,
51
+ temperature, and SL structural parameters. In our cal-
52
+ culations, five primary scattering mechanisms that limit
53
+ carrier mobility are the ionized impurity (II) [25], the PZ
54
+ [26], the ADP [27], the POP and the IRS [28–31].
55
+ ∗ corresponding author: [email protected]
56
+ We advance the Rode’s method [32–34] which goes be-
57
+ yond the relaxation time approximation (RTA) [35, 36],
58
+ coupled with band structure calculations via the k.p [37–
59
+ 41] technique that also includes the strain effect due to
60
+ lattice mismatch between InAs and GaSb materials [42].
61
+ We demonstrate the effect of both the elastic and the
62
+ inelastic scattering mechanisms [43] on the electron mo-
63
+ bility of the composite structure for a wide range of tem-
64
+ peratures and doping concentrations. Our studies reveal
65
+ that the low-temperature mobility of T2SLs is limited
66
+ by the II, PZ and IRS scattering mechanisms. In con-
67
+ trast, the mobility at higher temperatures is mainly lim-
68
+ ited by the POP scattering mechanism, an inelastic and
69
+ anisotropic process. At intermediate temperatures, how-
70
+ ever, the mobility decreases due to a combined effect of
71
+ ADP and IRS mechanisms. The effects of several struc-
72
+ tural parameters including layer thicknesses, interface
73
+ roughness heights, correlation lengths, and ion densities
74
+ are thoroughly investigated. Our calculations thereby re-
75
+ inforce the superiority of the Rode’s method [32, 34] over
76
+ the conventionally employed RTA, wherein, the former is
77
+ applicable over a wide temperature range in the presence
78
+ of inelastic and anisotropic scattering mechanism.
79
+ In order to experimentally obtain the carrier concen-
80
+ tration and drift mobility in a SL structure, it is also im-
81
+ portant to ascertain the Hall scattering factor, which is
82
+ frequently thought of as being equal to unity, indicating
83
+ that the Hall mobility and the drift mobility are equal.
84
+ However, in many heterostructures, it differs significantly
85
+ from unity, which results in inaccurate estimates of the
86
+ carrier density and drift mobility. We clearly show that
87
+ the temperature and carrier concentrations significantly
88
+ affect the Hall scattering factor, and that it ranges from
89
+ 0.3 to about 1.48 even for weak magnetic fields, thereby
90
+ reinforcing that caution should be exercised when em-
91
+ ploying this factor in calculations involving drift mobil-
92
+ arXiv:2301.04858v1 [cond-mat.mtrl-sci] 12 Jan 2023
93
+
94
+ 2
95
+ ity and carrier concentration. The models developed here
96
+ pave the way to develop physics-based device modules for
97
+ mid-wavelength IR (MWIR) photodetectors.
98
+ This paper is structured as follows. In Sec. II we de-
99
+ scribe the k.p model to compute the band structure, elec-
100
+ tron distribution function, Boltzmann transport formal-
101
+ ism, Rode’s approach and various scattering processes.
102
+ In Sec. III we illustrate the simulation methodology. In
103
+ Sec. IV, we explain the findings and finally, in Sec. V,
104
+ we summarize our results.
105
+ II.
106
+ ANALYTICAL FORMALISM
107
+ A.
108
+ Electronic band structure
109
+ The energy band structure of T2SLs can be calcu-
110
+ lated using various theoretical approaches like the den-
111
+ sity functional theory (DFT) [44], the empirical tight-
112
+ binding method [35, 45, 46], the empirical pseudopoten-
113
+ tial method [47, 48], many-body perturbation theory [49]
114
+ and the k.p perturbation method [37]. For this study, we
115
+ use the k.p technique with the envelope function approx-
116
+ imation (EFA) [24, 50, 51] since it overcomes the compu-
117
+ tational limitations of first-principles methods. The k.p
118
+ model is extensively used because of its superiority in
119
+ computing the energy band gap. Unlike ab − initio and
120
+ tight binding methods, the k.p technique requires fewer
121
+ input parameters I, with the related calculation proce-
122
+ dure being straightforward.
123
+ In this work, we solve the 8-band Kane Hamilto-
124
+ nian [52], by perturbatively extending the wave function
125
+ around high-symmetry points of the reciprocal space, em-
126
+ ploying the Lowdin’s perturbation approach [52].
127
+ We
128
+ also consider the spin-orbit coupling [53] in our com-
129
+ putation, which provides additional contributions to the
130
+ spin splitting of the energy bands [3]. The SL wavefunc-
131
+ tions (Φn(z)) in the orbital basis states (u0(z)) along the
132
+ growth direction (z) are articulated in terms of the slowly
133
+ varying envelope functions (F(z)), which are given as
134
+ Φn(z) =
135
+
136
+ j
137
+ Fj(z)uj0(z).
138
+ (1)
139
+ Such envelope functions under the periodic boundary
140
+ conditions can be rewritten as
141
+ F i
142
+ j(k, z0) = e−iadF i
143
+ j(k, zM),
144
+ F i
145
+ j(k, zM+1) = eiadF i
146
+ j(k, z1),
147
+ (2)
148
+ where, d denotes the thickness of a period, M represents
149
+ the number of grid points, a denotes the Bloch vector of
150
+ the envelope function that spans the Brillouin zone (BZ)
151
+ and k represents the momentum along the transverse di-
152
+ rection. The final Hamiltonian of the SL in the basis set
153
+ comprises three matrices (H0, HI and HII), given by
154
+ H(k, kz) = H0 + HI �
155
+ −i ∂
156
+ ∂z
157
+
158
+ +
159
+
160
+ −i ∂
161
+ ∂z
162
+
163
+ HII �
164
+ −i ∂
165
+ ∂z
166
+
167
+ . The
168
+ entire coupled differential equation is then solved using
169
+ a numerical finite difference method [54], as described in
170
+ earlier work [3].
171
+ The interface between the InAs and the GaSb layers
172
+ is very abrupt as depicted in Fig. 1(a). The energy dif-
173
+ ference between the conduction band minimum (CBM)
174
+ and the first heavy hole (HH) maximum at the center of
175
+ the BZ determines the band gap in an InAs/GaSb-based
176
+ T2SL, as shown in Fig. 1(b). Figure 1(b) also demon-
177
+ strates that the InAs conduction band (CB) is lower than
178
+ the GaSb valence band (VB), indicating that the band
179
+ structure is a staggered T2SL [55].
180
+ B.
181
+ Carrier transport model
182
+ 1.
183
+ Boltzmann transport equation and its solution
184
+ In order to characterize the behavior of the T2SL sys-
185
+ tem, we solve the Boltzmann transport equation (BTE)
186
+ and compute the probability of finding a carrier with a
187
+ crystal momentum k at a location r at a time t as indi-
188
+ cated by the distribution function f(r, k, t). Solving the
189
+ BTE (3) yields the average distribution of the carriers in
190
+ both the position and the momentum space. The BTE
191
+ can be written as [56–58]
192
+ ∂f
193
+ ∂t − ∂f
194
+ ∂t
195
+ ���
196
+ diff
197
+ − ∂f
198
+ ∂t
199
+ ���
200
+ forces
201
+ = ∂f
202
+ ∂t
203
+ ���
204
+ coll
205
+ + s(r, p, t) .
206
+ (3)
207
+ The term s(r, p, t), in Eq.
208
+ (3), represents generation-
209
+ recombination processes [59], where p is the classical mo-
210
+ mentum. The term (∂f/∂t)forces, represents the change
211
+ in the distribution function due to applied electric and
212
+ magnetic fields.
213
+ The term (∂f/∂t)forces = −F · ∇pf,
214
+ where, F = (dp/dt) = ℏ(dk/dt) = −e(E + v × B), repre-
215
+ sents the total force equal to the sum of the electric-force
216
+ and the Lorentz-force owing to the magnetic flux density
217
+ B, where e is the electron charge, E is the applied elec-
218
+ tric field and v denotes the group velocity of the carriers.
219
+ The term (∂f/∂t)diff = −v.∇rf, refers to the spatial
220
+ change in the distribution function caused by tempera-
221
+ ture or concentration gradients, which results in carrier
222
+ diffusion in the coordinate space. Here, (∂f/∂t)coll is the
223
+ collision term, which indicates how the distribution func-
224
+ tion changes over time due to collision events, and can
225
+ be described as the difference between the in- and the
226
+ out-scattering processes, i.e.,
227
+ �∂f
228
+ ∂t
229
+
230
+ coll
231
+ =
232
+
233
+ k1
234
+
235
+ S(k1, k) f (k1)
236
+
237
+ 1 − f (k)
238
+
239
+ − S(k, k1) f (k)
240
+
241
+ 1 − f (k1)
242
+ ��
243
+ ,
244
+ (4)
245
+ where, S(k, k1) and S(k1, k) are the transition rates
246
+ for an electron moving between states k and k1.
247
+ Un-
248
+ der steady-state, ∂f
249
+ ∂t = 0, in case of spatial homogeneity,
250
+ ∇rf = 0, and assuming that there is no recombination-
251
+
252
+ 3
253
+ (a)
254
+ (b)
255
+ FIG. 1. Preliminaries. (a) Schematic of InAs/GaSb based T2SL structure. The electron wave function in the InAs layer
256
+ extends beyond the interface into the GaSb layer and overlaps with the heavy hole wave function. Here, nML and mML are
257
+ the numbers of monolayers of InAs and GaSb respectively, in a single period d. (b) Band alignment of InAs/GaSb based
258
+ T2SL system showing the optical transition between the heavy-hole valence miniband and the electrons from lowest conduction
259
+ minibands that is employed to detect IR radiation. The periodic potential of the d period emerges in the material due to the
260
+ modulation of the semiconductor layers. The creation of hole (electron) minibands in the valence (conduction) band is caused
261
+ by the overlap of hole (electron) wave functions between adjacent GaSb (InAs) layers. The difference between the first electron
262
+ miniband in the CB and the first heavy hole miniband in the valence band is used to compute the effective bandgap energy Eg
263
+ of the T2SL (highlighted in black).
264
+ generation term, the BTE (3) can be rewritten as
265
+ −eE
266
+ ℏ · ∇kf =
267
+
268
+ k1
269
+
270
+ S(k1, k) f (k1)
271
+
272
+ 1 − f (k)
273
+
274
+ − S(k, k1) f (k)
275
+
276
+ 1 − f (k1)
277
+ ��
278
+ .
279
+ (5)
280
+ In the low-electric field regime, the distribution func-
281
+ tion can be represented as [60]
282
+ f(k) = f0
283
+
284
+ ε(k)
285
+
286
+ + g(k) cos θ ,
287
+ (6)
288
+ where, k=|k|, f denotes the actual electron distribution
289
+ function, which includes both the elastic and the inelas-
290
+ tic scattering mechanisms, g(k) is the perturbation term
291
+ to f0[ε(k)] produced by the electric field, θ is the angle
292
+ between applied electric field (along the symmetry axis)
293
+ and the electron wave vector k, and f0 represents the dis-
294
+ tribution function under equilibrium conditions, which is
295
+ taken according to Fermi-Dirac statistics [35, 59].
296
+ By
297
+ solving Eqs.
298
+ (5) and (6), the perturbation term g(k),
299
+ can be calculated as [32, 34, 61, 62]
300
+ gi(k) =
301
+ �Si
302
+
303
+ gi(k)
304
+
305
+ − (−e)E
306
+
307
+
308
+ ∂f0
309
+ ∂k
310
+
311
+ So(k) +
312
+ 1
313
+ τel(k)
314
+
315
+ ,
316
+ (7)
317
+ FIG. 2.
318
+ The various dominant scattering mechanisms in-
319
+ volved in a T2SL structure.
320
+ where E = |E|, and gi(k) appears on both sides of Eq.
321
+ (7).
322
+ Hence, we solve Eq.
323
+ (7) iteratively and the con-
324
+ vergence is exponentially fast which takes a few itera-
325
+ tions. Once gi(k) is obtained, we calculate the mobil-
326
+ ity. In Eq. (7), the term i indicates the iteration index,
327
+ and the terms, Si & So are the in-scattering and the
328
+ out-scattering operators, respectively, for inelastic scat-
329
+ tering mechanisms, as explained in Sec. II B. The term
330
+ 1
331
+ τel(k), represents the total momentum relaxation rate of
332
+ all the elastic scattering mechanisms, which is calculated
333
+ according to the Matthiessen’s rule (8), and can be writ-
334
+ ten as
335
+
336
+ Interface scattering
337
+ GaSb
338
+ Growth direction
339
+ Extended Phonons
340
+ Interface
341
+ nMI
342
+ KeD
343
+ InAs
344
+ Temperature gradientInAs.
345
+ GaSb
346
+ InAs
347
+ GaSb
348
+ InAs
349
+ GaSb
350
+ InAs
351
+ z
352
+ GaSb
353
+ GaSb
354
+ CB
355
+ GaSb
356
+ VB
357
+ Ec
358
+ Eg
359
+ HH
360
+ LH
361
+ M
362
+ InAs
363
+ InAs
364
+ InAs
365
+ InAs
366
+ Spatial coordinateDominant scattering mechanisms in T2SL
367
+ Defect scattering
368
+ Lattice scattering
369
+ IRS
370
+ Impurity
371
+ Intravalley
372
+ 4
373
+ Ionized
374
+ Acoustic
375
+ Optical
376
+ Deformation potential
377
+ Piezoelectric
378
+ Polar4
379
+ 1
380
+ τel(k) =
381
+ 1
382
+ τII(k) +
383
+ 1
384
+ τP Z(k) +
385
+ 1
386
+ τADP (k) +
387
+ 1
388
+ τIRS(k) .
389
+ (8)
390
+ The various dominant scattering mechanisms involved
391
+ in an InAs/GaSb-based T2SL structure are shown in Fig.
392
+ 2.
393
+ 2.
394
+ Ionized impurity scattering
395
+ The II scattering mechanism [25] arises due to the
396
+ Coulomb interactions between electrons and ions, when
397
+ a charged center is introduced inside the bulk material.
398
+ The II scattering mechanism is entirely elastic and dom-
399
+ inates usually at high doping concentrations and low
400
+ temperatures. The II scattering mechanism dominates
401
+ near the CB edge but reduces drastically as the energy
402
+ increases [63].
403
+ The scattering rate for the II increases
404
+ rapidly with decreasing temperature. Here, we use the
405
+ Brooks-Herring approach [64] for the calculation of II
406
+ scattering rate [34, 65], which is given by
407
+ 1
408
+ τII(k) =
409
+ e4N
410
+ 8π ν(k) (ϵ0 ϵs)2 (ℏ k)2
411
+
412
+ P(k) ln
413
+
414
+ 1 + 4
415
+ � k
416
+ β
417
+ �2�
418
+ − Q(k)
419
+
420
+ ,
421
+ (9)
422
+ where, ϵ0 is the permittivity of the free space, ϵs is the
423
+ static dielectric constant, ℏ is the reduced Planck’s con-
424
+ stant and N is the ionized impurity concentration, which
425
+ is the sum of the acceptor and donor impurity concen-
426
+ tration i.e., N = NA + ND. Here, β indicates the inverse
427
+ screening length, which is given as
428
+ β =
429
+
430
+ e2
431
+ ϵ0 ϵs kB T
432
+
433
+ DS(ε)f0(1 − f0)dε ,
434
+ (10)
435
+ where, DS(ε) is the density of states (DOS) at energy ε
436
+ and kB is the Boltzmann constant. P(k) and Q(k) can
437
+ be expressed as follows [34, 62]
438
+ P(k) =
439
+ � 3
440
+ 4
441
+ �β c(k)
442
+ k
443
+ �4
444
+ + 2
445
+ �β c(k)
446
+ k
447
+ �2
448
+ + 1
449
+
450
+ ,
451
+ (11)
452
+ Q(k) =
453
+ �3 β4 + 6 β2 k2 − 8 k4
454
+ (β2 + 4 k2) k2
455
+
456
+ c4(k)
457
+ + 8
458
+ � β2 + 2k2
459
+ β2 + 4 k2
460
+
461
+ c2(k) +
462
+
463
+ 4
464
+
465
+ k/β
466
+ �2
467
+ 1 + 4
468
+
469
+ k/β
470
+ �2
471
+
472
+ .
473
+ (12)
474
+ The detailed explanation of the P and Q parameters are
475
+ given in the literature [34]. Here, the wave function ad-
476
+ mixture c(k) represents the contribution of the p-orbital
477
+ to the wave function of the band.
478
+ 3.
479
+ Piezoelectric scattering
480
+ The PZ effect arises due to the acoustic phonon scat-
481
+ tering in polar semiconductors. Being a weak effect, the
482
+ PZ scattering is elastic and significant only at low doping
483
+ concentrations and low temperatures, where other scat-
484
+ tering mechanisms are weak. The momentum relaxation
485
+ rate for the PZ scattering is given by [32, 65]
486
+ 1
487
+ τP Z(k) =
488
+ (eP)2 kB T
489
+ 6π ϵ0 ϵs ν(k) ℏ2
490
+
491
+ 4c4(k) − 6c2(k) + 3
492
+
493
+ ,
494
+ (13)
495
+ where, P is a piezoelectric coefficient, which is a dimen-
496
+ sionless quantity. For the zincblende structure, it is given
497
+ as [34, 62]
498
+ P 2 = h2
499
+ 14 ϵ0 ϵs
500
+ 35
501
+ ��12
502
+ cl
503
+
504
+ +
505
+ �16
506
+ ct
507
+ ��
508
+ ,
509
+ (14)
510
+ where, h14 is an element of the PZ stress tensor, and ct
511
+ and cl represents the spherically averaged elastic con-
512
+ stants for transverse and longitudinal modes, respec-
513
+ tively, and are given by [26, 32, 34]
514
+ cl = 3
515
+ 5c11 + 1
516
+ 5
517
+
518
+ 2c12 + 4c44
519
+
520
+ ,
521
+ ct = 1
522
+ 5
523
+
524
+ c11 − c12
525
+
526
+ + 3
527
+ 5c44 ,
528
+ (15)
529
+ where c11, c12, and c44 are three independent elastic con-
530
+ stants.
531
+ 4.
532
+ Acoustic deformation potential scattering
533
+ The ADP scattering mechanism is caused by the inter-
534
+ action of electrons with non-polar acoustic phonons. It
535
+ is approximately elastic near room temperature For the
536
+ ADP scattering mechanism, the momentum relaxation
537
+ rate is given by [34, 65]
538
+ 1
539
+ τADP (k) =
540
+ kB T
541
+
542
+ e ΞD k
543
+ �2
544
+ 3π cel ν(k) ℏ2
545
+
546
+ 6c4(k)−8c2(k)+3
547
+
548
+ , (16)
549
+
550
+ 5
551
+ where, cel denotes the spherically averaged elastic con-
552
+ stant and ΞD represents the acoustic deformation poten-
553
+ tial, which is obtained by the CB shift (in eV) per unit
554
+ strain, owing to the acoustic waves(17). To calculate the
555
+ acoustic deformation potential (ΞD), we use the following
556
+ relation (17)
557
+ ΞD = −V ×
558
+
559
+ ∂ECBM
560
+ ∂V
561
+ ������
562
+ V =V0
563
+ ,
564
+ (17)
565
+ where, V denotes the volume, ECBM represents the en-
566
+ ergy of the CBM and V0 is the zero pressure volume of
567
+ the structure.
568
+ 5.
569
+ Interface roughness scattering
570
+ The existence of the interface roughness in a T2SL
571
+ [17, 18, 23, 29, 66] structure leads to endemic variations
572
+ in InAs well widths, causes modulation of the associated
573
+ energy levels and introduces an unstable potential for the
574
+ motion of the confined electrons. The IRS mechanism
575
+ can occur due to the imperfections that arise during the
576
+ growth of the material. The earlier related works [67, 68]
577
+ show that the degree of scattering decreases in propor-
578
+ tion to the well width hence it is important in MWIR
579
+ detectors. The IRS mechanism is an elastic process and
580
+ dominates at low temperatures in thin-film systems for
581
+ a short period of T2SL, and it is significant at high elec-
582
+ tron density. The momentum relaxation rate for the IRS
583
+ mechanism is given as [57, 69, 70]
584
+ 1
585
+ τIRS(k) =
586
+
587
+ e2 ∆ Λ
588
+ ϵ0 ϵ∞
589
+ �2
590
+ k
591
+ ℏ2 ν(k)
592
+
593
+ Nd + Ns
594
+ 2
595
+ �2
596
+ ×
597
+ 1
598
+
599
+ 1 + (kΛ)2 ε
600
+
601
+
602
+
603
+ 1 + (kΛ)2
604
+
605
+ ,
606
+ (18)
607
+ where, Λ is the lateral correlation length, ∆ is the rough-
608
+ ness height, Ns is the sheet carrier concentration, and Nd
609
+ is the doping carrier density.
610
+ 6.
611
+ Polar optical phonon scattering
612
+ The POP scattering results from the interaction of op-
613
+ tical phonons with electrons. The POP scattering mech-
614
+ anism is inelastic and anisotropic, which occurs via the
615
+ emission or the absorption of a phonon hence, RTA is in-
616
+ applicable in such SL structures. The scattering rate due
617
+ to the POP scattering mechanism is approximately con-
618
+ stant at very high energies, and it depends on the POP
619
+ frequencies. The POP scattering dominates in the higher
620
+ temperature domain. Hence, it is significant at both near
621
+ and beyond room temperature. The out-scattering oper-
622
+ ator is given by [34]
623
+ So =
624
+
625
+ Npop + 1 − f −�
626
+ λ−
627
+ o +
628
+
629
+ Npop + f +�
630
+ λ+
631
+ o ,
632
+ (19)
633
+ λ±
634
+ o = L±�
635
+ (A±)2ln
636
+ ���k± + k
637
+ k± − k
638
+ ��� − A±cc± − aca±c±�
639
+ , (20)
640
+ L± =
641
+ e2 ωpop k±
642
+ 4π ℏ k ν(k±)
643
+ �ϵs − ϵ∞
644
+ ϵs ϵ∞
645
+
646
+ ,
647
+ (21)
648
+ where, ϵ∞ and ϵs are high and low-frequency dielectric
649
+ constants, respectively.
650
+ A± = aa± + [(k±)2 + k2] cc±/ 2 k±k ,
651
+ (22)
652
+ where c, c±, a and a± are the wave function coefficients,
653
+ k± is the solution of Eq. ε(k) ± ℏωpop. Any quantity
654
+ superfixed by plus/minus is to be evaluated at the en-
655
+ ergy corresponding to k+ or k−. The superscript plus
656
+ denotes scattering by the absorption and is evaluated at
657
+ an energy ε(k) + ℏωpop. Similarly, superscript minus de-
658
+ notes scattering by the emission and is evaluated at en-
659
+ ergy ε(k)−ℏωpop. Emission of phonons is possible only if
660
+ the phonons’ energy is greater than ℏωpop energy. There-
661
+ fore, if the phonon energy is less than ℏωpop, the term λ−
662
+ o
663
+ has to be considered as zero. The term Npop, indicates
664
+ the number of optical phonons and is given by the Bose
665
+ distribution as [32, 34]
666
+ Npop =
667
+ 1
668
+ exp (ℏ ωpop / kB T) − 1 .
669
+ (23)
670
+ The in-scattering operator Si, is given by
671
+ Si = (Npop + 1 − f)λ+
672
+ i g+ + (Npop + f)λ−
673
+ i g− ,
674
+ (24)
675
+ where, plus and minus superscripts indicate the absorp-
676
+ tion and emission processes, respectively.
677
+ The term
678
+ λ±
679
+ i (k) can be expressed as
680
+ λ±
681
+ i (k) = L± �(k±)2 + k2
682
+ 2 k± k
683
+ (A±)2 ln
684
+ ���k± + k
685
+ k± − k
686
+ ���
687
+ − (A±)2 − c2(k) (c±(k))2
688
+ 3
689
+
690
+ .
691
+ (25)
692
+ The mobility can be calculated after calculating the
693
+ rates of all the elastic scattering mechanisms
694
+ 1
695
+ τel(k) (8)
696
+ and the influence of inelastic scattering mechanisms on g
697
+ (7) through the terms Si(g) (24) and So (19). The rates
698
+ of various elastic scattering mechanisms are calculated by
699
+ using the expressions given in Eqs. (9), (13), (16), (18).
700
+ C.
701
+ Mobility and conductivity
702
+ The RTA [56] cannot be used if the scattering process
703
+ is inelastic and anisotropic because there is no way to
704
+ define the relaxation time that is independent of the dis-
705
+ tribution function.
706
+ In such instances, Rode’s iterative
707
+ approach can be applied to compute the real distribu-
708
+ tion function under low-field conditions. After calculat-
709
+ ing the perturbation distribution by using Rode’s algo-
710
+ rithm, we finally calculate the low-field carrier mobility,
711
+
712
+ 6
713
+ FIG. 3. Flowchart for the calculation of electronic transport
714
+ parameters.
715
+ µ [32, 34, 65]
716
+ µ =
717
+ 1
718
+ 3E
719
+
720
+ ν(ε) DS(ε) g(ε) dε
721
+
722
+ DS(ε) f0(ε) dε
723
+ .
724
+ (26)
725
+ The term g(ε), can be obtained from Eq. (7) and the
726
+ carrier velocity ν(k) can be calculated from the band
727
+ structure as
728
+ ν(k) = 1
729
+
730
+ ∂ε
731
+ ∂k .
732
+ (27)
733
+ Once the mobility is determined, it is pretty easy to
734
+ calculate the electrical conductivity by using
735
+ σ = n e µ ,
736
+ (28)
737
+ where, µ is the electron drift mobility, and n is the elec-
738
+ tron carrier concentration. The entire sequence for cal-
739
+ culating the transport coefficients using Rode’s approach
740
+ is shown in Fig. 3.
741
+ Similarly, in the presence of an arbitrary magnetic
742
+ field, the BTE can be solved. The distribution function
743
+ in such cases can be written as [33, 71]
744
+ f(k) = f0[ε(k)] + xg(k) + yh(k) ,
745
+ (29)
746
+ where, y is the direction, cosine from B × E to k, and
747
+ h(k) is the perturbation distribution function due to the
748
+ magnetic field. Substituting Eq. (29) in (3) gives a pair
749
+ of coupled equations that can be solved iteratively [33]
750
+ gi+1(k) = Si(gi(k) − (−e)E
751
+
752
+ ( ∂f0
753
+ ∂k ) + βSi(hi(k))
754
+ So(k) (1 + β2)
755
+ ,
756
+ (30)
757
+ hi+1(k) = Si(hi(k) + β (−e)E
758
+
759
+ ( ∂f0
760
+ ∂k ) − βSi(gi(k))
761
+ So(k) (1 + β2)
762
+ , (31)
763
+ where, β =
764
+ (−e)ν(k)B
765
+ ℏkSo(k) , and B is the applied magnetic
766
+ field. The expression for the Hall mobility and the Hall
767
+ scattering factor can be written as [60]
768
+ µH = 1
769
+ B
770
+
771
+ ν(ε) DS(ε) h(ε) dε
772
+
773
+ ν(ε) DS(ε) g(ε) dε ,
774
+ (32)
775
+ rH = µH
776
+ µ ,
777
+ (33)
778
+ where, µH and µ are the Hall and the drift mobility,
779
+ respectively, and rH is the Hall scattering factor. This
780
+ solution gives a more accurate result for the Hall scatter-
781
+ ing factor compared with the other expressions based on
782
+ the RTA [71].
783
+ III.
784
+ SIMULATION APPROACH
785
+ First, we calculate the band structure using the k.p
786
+ technique as discussed in Sec. II A and then analytically
787
+ fit it to produce a smooth curve for the calculation of
788
+ group velocity [62]. By using Eq. (34), the Fermi level is
789
+ determined with a smooth band structure obtained after
790
+ the analytical fitting, where V0 represents the volume of
791
+ the cell and εc represents the energy at the bottom of the
792
+ CB.
793
+ n = 1
794
+ V0
795
+ � ∞
796
+ εc
797
+ DS(ε)f(ε)dε .
798
+ (34)
799
+ Equations (9), (13), (16), (18), (19), (24) are used to
800
+ calculate the various scattering rates, and the perturba-
801
+ tion in the distribution function is determined using Eq.
802
+ (7) with Si(k) = 0. The term g(k), is calculated itera-
803
+ tively until g(k) converges and it gives results beyond the
804
+ RTA.
805
+ IV.
806
+ RESULTS AND DISCUSSION
807
+ A.
808
+ Dispersion relation for T2SL
809
+ We calculate the band structure of an InAs/GaSb-
810
+ based T2SL, with layer widths nML/mML, where n, m
811
+ = 8, 8 correspondingly, using the 8 × 8 k.p technique
812
+ as described in Sec. II A, at a temperature of T=77 K,
813
+ and the results are shown in Fig. 4. In a single period
814
+ of 8ML/8ML InAs/GaSb configuration, the thickness of
815
+
816
+ Start
817
+ Calculation of Input Parameters and
818
+ Band Structure
819
+ Analytical Fitting of Band Structure
820
+ Calculation of Fermi-Level
821
+ Calculation of Various Scattering
822
+ Rates
823
+ Si (g(k))=0
824
+ Perturbation g(k) of the
825
+ distribution function
826
+ (-e)Ecfo
827
+ Si(gi(k) -
828
+ h
829
+ Cok
830
+ gi(k)
831
+ 7
832
+ So(k) +
833
+ Tel(k)
834
+ No
835
+ g(k) Converged ?
836
+ Si (g(k))=0
837
+ Yes
838
+ Transport Coefficients
839
+ Stop7
840
+ TABLE I.
841
+ Material parameters required to calculate the electronic band structure using the k.p technique at T = 77 K
842
+ [37, 72–74]
843
+ Quantity
844
+ Unit
845
+ InAs
846
+ GaSb
847
+ Lattice constant
848
+ ˚A
849
+ 6.0584
850
+ 6.0959
851
+ Effective mass of electron (m∗
852
+ e)
853
+ -
854
+ 0.022
855
+ 0.0412
856
+ Energy band gap at 0 K
857
+ eV
858
+ 0.418
859
+ 0.814
860
+ Luttinger parameter γ1
861
+ -
862
+ 19.4
863
+ 11.84
864
+ Luttinger parameter γ2
865
+ -
866
+ 8.545
867
+ 4.25
868
+ Luttinger parameter γ3
869
+ -
870
+ 9.17
871
+ 5.01
872
+ Varshini Parameter α
873
+ meV/K
874
+ 0.276
875
+ 0.417
876
+ Varshini Parameter β
877
+ K
878
+ 93
879
+ 140
880
+ Interband mixing parameter Ep
881
+ eV
882
+ 21.5
883
+ 22.4
884
+ Spin-orbit splitting (SO)
885
+ eV
886
+ 0.38
887
+ 0.76
888
+ Valence band offset (VBO)
889
+ eV
890
+ -0.56
891
+ 0
892
+ (a) (110)
893
+ (b) (001)
894
+ FIG. 4. Calculated band structure in the first BZ using the
895
+ periodic boundary condition of a T2SL based on 8 ML InAs
896
+ / 8 ML GaSb at T = 77 K using the k.p method (a) The
897
+ in-plane dispersion and (b) the out-of-plane dispersion.
898
+ FIG. 5.
899
+ DOS calculated using the k.p method in an
900
+ InAs/GaSb SL as a function of energy.
901
+ The inset clearly
902
+ shows how the DOS for the carriers in the VB varies as a
903
+ function of energy.
904
+ each layer is roughly 24 ˚A. The dispersion curve along the
905
+ in-plane and the out-of-plane directions are presented in
906
+ Figs. 4(a) and 4(b), respectively and the calculated band
907
+ gap is 270 meV. The band gap of 270 meV corresponds
908
+ to a cut-off wavelength of 4.59 µm which confirms that
909
+ our model is best suited for the MWIR spectrum. In Fig.
910
+ 5 we show the DOS of an SL as a function of energy, cal-
911
+ culated using the k.p method. Table I summarizes the
912
+ values of the parameters, utilized in the k.p calculations.
913
+ B.
914
+ Scattering rates
915
+ In Fig. 6, we show the dependence of scattering rates
916
+ with energy for the temperatures of 77 K, 300 K, and
917
+ 500 K at doping densities of ND = 1 × 1013 cm−3
918
+ and ND = 2 × 1017 cm−3.
919
+ Here, we show the rela-
920
+ tive importance of each of the scattering mechanisms in
921
+ a T2SL. The IRS mechanism is the strongest scatter-
922
+ ing mechanism for low as well as high doping densities
923
+ at a temperature of 77 K and 300 K as shown in Fig.
924
+ 6. At a temperature of 77 K and a doping density of
925
+ ND = 1 × 1013 cm−3, the most dominant contributions
926
+ are due to the IRS followed by the ADP and the POP
927
+ scattering mechanisms. The II scattering mechanism is
928
+ the least significant scattering mechanism at this partic-
929
+ ular temperature and doping density, whereas it has a
930
+ significant contribution at higher doping densities.
931
+ At room temperature, the average energy of the carri-
932
+ ers is 3/2kBT = 0.0388 eV , indicating that the majority
933
+ of the carriers are in the low-energy region. Hence, it is
934
+ clear from Fig. 6(e) that at room temperature, the signif-
935
+ icant contribution comes from the IRS mechanism as well
936
+ as the POP scattering mechanism. Both scattering mech-
937
+ anisms are dominant at this temperature, and the dom-
938
+ inance of the POP scattering mechanism changes with
939
+ respect to temperature and the average energy of the
940
+ carriers, which signifies that the POP scattering mech-
941
+ anism plays a significant role in such a T2SL structure.
942
+ As a result, it is important to note that the POP scatter-
943
+ ing mechanism is the primary factor limiting the carrier’s
944
+ mobility from room temperature to higher temperatures.
945
+ At a temperature of 500 K, the average energy of
946
+ the carriers is 0.0646 eV and, most of the carrier con-
947
+ tributes to the POP scattering mechanism hence, this
948
+
949
+ Energy (eV)
950
+ Ec
951
+ Eg
952
+ 0
953
+ HH
954
+ .1
955
+ -0.5
956
+ 0
957
+ 0.5
958
+ r /a
959
+ TEnergy (eV)
960
+ 0.4
961
+ Ec
962
+ 0.2
963
+ HH
964
+ 0
965
+ -0.2
966
+ -0.4
967
+ -1
968
+ 0
969
+ 1
970
+ T /L1020
971
+ (ev-1cm*
972
+ 1018
973
+ 1020
974
+ DOS
975
+ 1019
976
+ @1018
977
+ sO
978
+ -0.02405
979
+ -0.02340
980
+ Energy (eV)
981
+ -0.05 0.25
982
+ 0.35
983
+ 0.45
984
+ Energy (eV)8
985
+ (a) T=77 K
986
+ (b) T=300 K
987
+ (c) T=500 K
988
+ (d) T=77 K
989
+ (e) T=300 K
990
+ (f) T=500 K
991
+ FIG. 6.
992
+ Scattering rates for 8ML/8ML InAs/GaSb based T2SL with roughness parameters Λ = 3 nm and ∆ = 0.3 nm as
993
+ a function of electron energy at
994
+ (a) T = 77 K and ND = 1 × 1013 cm−3
995
+ (b) T = 300 K and ND = 1 × 1013 cm−3
996
+ (c)
997
+ T = 500 K and ND = 1 × 1013 cm−3 (d) T = 77 K and ND = 2 × 1017 cm−3 (e) T = 300 K and ND = 2 × 1017 cm−3 and (f)
998
+ T = 500 K and ND = 2 × 1017 cm−3 .
999
+ TABLE II. Material parameters required to compute the various scattering rates [32, 73, 75–78].
1000
+ Parameter
1001
+ Unit
1002
+ InAs
1003
+ GaSb
1004
+ Elastic constant c11
1005
+ GPa
1006
+ 832.9
1007
+ 884.2
1008
+ Elastic constant c12
1009
+ GPa
1010
+ 452.6
1011
+ 402.6
1012
+ Elastic constant c44
1013
+ GPa
1014
+ 395.9
1015
+ 432.2
1016
+ Acoustic deformation potential
1017
+ eV
1018
+ 4.90
1019
+ 6.70
1020
+ Low freq. dielectric constant
1021
+ -
1022
+ 14.55
1023
+ 15.00
1024
+ High freq. dielectric constant
1025
+ -
1026
+ 11.78
1027
+ 13.80
1028
+ Piezoelectric coefficient
1029
+ C/m2
1030
+ 0.045
1031
+ 0.126
1032
+ Optical phonon frequency
1033
+ 1/cm
1034
+ 240 (LO)a, 218 (TO)b
1035
+ 193 (LO)a, 215 (TO)b
1036
+ a LO : Longitudinal Optical Phonon Frequency.
1037
+ b TO : Transverse Optical Phonon Frequency.
1038
+ again demonstrates that the POP scattering mechanism
1039
+ is the most dominant scattering mechanism for T2SL at
1040
+ and beyond the ambient temperature for both doping
1041
+ densities, as shown in Figs. 6(c) and 6(f). Figure 6 shows
1042
+ a sudden change in the POP scattering rate after partic-
1043
+ ular energy, which is because if the electron energy is
1044
+ less than the POP energy, the electron can only scat-
1045
+ ter by the absorption of the optical phonons, whereas if
1046
+ the energy is greater than the phonon energy, the elec-
1047
+ tron can scatter by both the absorption and the emission
1048
+ of phonons, where the optical phonon energy is deter-
1049
+ mined using ℏωP OP . The PZ scattering is the least domi-
1050
+ nant scattering mechanism at higher doping densities, as
1051
+ shown in Figs. 6(d), 6(e), 6(f). Table II lists the ma-
1052
+ terial parameters that are used to compute the various
1053
+ scattering rates.
1054
+ It is generally known that the ADP scattering mech-
1055
+ anism becomes substantial at temperatures of 77 K and
1056
+ above, reducing electron mobility. Therefore, it is also
1057
+ important to include the effect of the ADP scattering
1058
+ mechanism, which is significant near the room tempera-
1059
+ ture for low as well as high doping densities, which was
1060
+
1061
+ PZ
1062
+ (sec)
1063
+ POP
1064
+ IRS
1065
+ ADP
1066
+ Total
1067
+ rate (
1068
+ Scattering
1069
+ 1011
1070
+ 107
1071
+ 0.03
1072
+ 0.055
1073
+ 0.1
1074
+ Energy (eV)1015
1075
+ PZ
1076
+ (sec
1077
+ POP
1078
+ IRS
1079
+ ADP
1080
+ Total
1081
+ rate
1082
+ Scattering
1083
+ 1011
1084
+ 107
1085
+ 0.03
1086
+ 0.055
1087
+ 0.1
1088
+ Energy (eV)1015
1089
+ PZ
1090
+ (sec
1091
+ POP
1092
+ IRS
1093
+ ADP
1094
+ Total
1095
+ rate (
1096
+ Scattering
1097
+ 1011
1098
+ 107
1099
+ 0.03
1100
+ 0.055
1101
+ 0.1
1102
+ Energy (eV)PZ
1103
+ (sec)
1104
+ POP
1105
+ IRS
1106
+ ADP
1107
+ Total
1108
+ rate (
1109
+ Scattering
1110
+ 1011
1111
+ 107
1112
+ 0.03
1113
+ 0.055
1114
+ 0.1
1115
+ Energy (eV)1015
1116
+ PZ
1117
+ (sec'
1118
+ POP
1119
+ IRS
1120
+ ADP
1121
+ Total
1122
+ rate
1123
+ M
1124
+ Scattering
1125
+ 1011
1126
+ 107
1127
+ 0.03
1128
+ 0.055
1129
+ 0.1
1130
+ Energy (eV)1015
1131
+ PZ
1132
+ (sec
1133
+ POP
1134
+ IRS
1135
+ ADP
1136
+ Total
1137
+ rate
1138
+ Scattering
1139
+ 1011
1140
+ 107
1141
+ 0.03
1142
+ 0.055
1143
+ 0.1
1144
+ Energy (eV)9
1145
+ FIG. 7.
1146
+ Calculated mobility contribution for electrons due
1147
+ to the various scattering mechanism involved in (8ML/8ML)
1148
+ InAs/GaSb T2SL as a function of temperature for ND = 9 ×
1149
+ 1016 cm−3.
1150
+ FIG. 8.
1151
+ Calculated low-field electron drift mobility in
1152
+ 8ML/8ML InAs/GaSb SL as a function of doping concen-
1153
+ tration for temperatures of 77 K, 120 K and 150 K.
1154
+ not highlighted in the earlier works for such SL struc-
1155
+ tures. At lower temperatures and in the thin-film sys-
1156
+ tems, the IRS scattering is considerable, and to compute
1157
+ the roughness scattering rate, we utilize a sheet carrier
1158
+ density Ns, of 4.6 × 1012 cm−2 and a doping carrier den-
1159
+ sity Nd, of 1 × 1011 cm−2 with the roughness height ∆,
1160
+ fixed at 0.3 nm, and the correlation length of the fluctu-
1161
+ ations Λ kept at 3 nm. The IRS mechanism is temper-
1162
+ ature independent, but the carrier distribution function
1163
+ depends on the temperature. Therefore, the electron mo-
1164
+ bility through the IRS mechanism is somewhat tempera-
1165
+ ture sensitive. Except for the IRS scattering rate, which
1166
+ is temperature independent, we see that all the scattering
1167
+ rates increase as the temperature rises as shown in Figs.
1168
+ 6(a), 6(b), 6(c). When the temperature is either low or
1169
+ intermediate, the II scattering rate increases with an in-
1170
+ crease in the doping concentration, which suppress the
1171
+ contribution from the PZ scattering, as shown in Figs.
1172
+ 6(a), 6(d), 6(b), 6(e).
1173
+ FIG. 9.
1174
+ Comparison of conductivity in a T2SL as a func-
1175
+ tion of temperature, calculated using the Rode’s and the RTA
1176
+ method for various doping concentrations.
1177
+ FIG. 10.
1178
+ Calculated temperature dependence of electronic
1179
+ mobility with IRS heights for a correlation length of 3 nm
1180
+ & ND = 9 × 1016 cm−3. The mobility due to only the IRS
1181
+ mechanism is shown.
1182
+ C.
1183
+ Electron transport parameters
1184
+ We calculate the mobility and the conductivity for
1185
+ a T2SL at various temperatures and doping concentra-
1186
+ tions.
1187
+ Figure 7 shows the contribution to the mobil-
1188
+ ity due to various scattering mechanisms calculated for
1189
+ ND = 9 × 1016 cm−3.
1190
+ To the best of our knowledge,
1191
+ the combined effect of these scattering mechanisms in a
1192
+ T2SL structure has never been shown in earlier works.
1193
+ These five types of scattering mechanisms show their sig-
1194
+ nificant contribution to the overall mobility calculation.
1195
+ From Fig. 7 it turns out that the scattering mechanism
1196
+ with the lowest mobility values is the dominant one in
1197
+ that temperature range. Therefore, starting at a tem-
1198
+ perature of 150 K, the POP scattering mechanism is the
1199
+ most dominant scattering mechanism until 700 K; below
1200
+ 77 K, a significant contribution to the mobility comes
1201
+ from the II scattering and the IRS mechanisms as shown
1202
+
1203
+ 1010
1204
+ Overall
1205
+ RTAO
1206
+ pOp
1207
+ ADP
1208
+ PZO
1209
+ IRS
1210
+ Overall + RTA + Il+ POP + ADP + PZ + IRS
1211
+ 103
1212
+ 102
1213
+ 300
1214
+ 500
1215
+ 700
1216
+ Temperature (K)
1217
+ 106
1218
+ 102
1219
+ 20
1220
+ 150
1221
+ 300
1222
+ 500
1223
+ 700
1224
+ Temperature (K)6
1225
+ 10
1226
+ △77K口120K*150K
1227
+ 104
1228
+ 10°
1229
+ 1012
1230
+ 1014
1231
+ 1016
1232
+ 1018
1233
+ Doping Concentration (cm-3104
1234
+ Conductivity (S/cm)
1235
+ -. 1×1016 cm-3-*. 1×1016 cm-3
1236
+ - - 9×1016 cm-3...*.. 9×1016 cm-3
1237
+ 101
1238
+ ....0..0....0
1239
+ :::
1240
+ 10-2
1241
+ Rode
1242
+ RTA
1243
+ 10-5
1244
+ 20
1245
+ 150
1246
+ 300
1247
+ 500
1248
+ 700
1249
+ Temperature (K)Mobility (cm? / V-sec)
1250
+ A=0.1nm-0-A=0.3nm-0A=0.5nm
1251
+ △=0.7nm
1252
+ 106
1253
+ 105
1254
+ 104
1255
+ 103
1256
+ 20
1257
+ 150
1258
+ 300
1259
+ Temperature (K)10
1260
+ FIG. 11.
1261
+ Calculated mobility for electrons in an 8ML
1262
+ InAs/8ML GaSb SL as a function of temperature and cor-
1263
+ relation length for an IRS height of 0.3 nm with ND =
1264
+ 9 × 1016 cm−3. Here, the mobility due to only the IRS mech-
1265
+ anism is shown.
1266
+ FIG. 12. Temperature dependence of electron Hall mobility
1267
+ in a T2SL calculated using the Rode’s and the RTA method
1268
+ at B = 0.69 T for various doping concentrations.
1269
+ in Fig. 7.
1270
+ In case of II scattering mechanism, with increasing
1271
+ temperature, the electron density increases exponentially
1272
+ and causes growth in the screening length.
1273
+ As a re-
1274
+ sult, the mobility at low temperatures increases sharply
1275
+ with rising temperatures because the scattering rates are
1276
+ inversely related to the square of the screening length.
1277
+ Since the POP scattering mechanism is more prominent
1278
+ above 150 K; hence the overall mobility is reduced as
1279
+ shown in Fig. 7. In Fig. 7, we also compare the mo-
1280
+ bility computed using the RTA approach to the overall
1281
+ mobility calculated using Rode’s method and it is found
1282
+ that in the RTA approach, the mobility is underestimated
1283
+ because the POP scattering mechanism is inelastic and
1284
+ nonrandomizing, making it impossible to characterize the
1285
+ perturbation in the distribution function using the relax-
1286
+ FIG. 13. Hall scattering factor versus temperature at B= 0.69
1287
+ T for ND = 9 × 1017cm−3.
1288
+ FIG. 14. Hall scattering factor as a function of temperature
1289
+ and carrier concentration at B= 0.69 T.
1290
+ ation time. The POP scattering mechanism becomes in-
1291
+ significant at low temperatures, resulting in nearly com-
1292
+ parable mobilities determined using the RTA and Rode’s
1293
+ iterative technique.
1294
+ In Fig. 8, we demonstrate the overall mobility versus
1295
+ doping concentration at different temperatures and em-
1296
+ phasize on the mobility at 77K, which is the usual operat-
1297
+ ing temperature of most high-performance IR detectors.
1298
+ The graph illustrates a decrease in mobility as the doping
1299
+ concentration increases due to a rise in the number of ion-
1300
+ ized centers. As we raise the temperature, the mobility
1301
+ diminishes as expected because at higher temperatures
1302
+ the phonon scattering increases. The mobility values do
1303
+ not differ significantly for low carrier concentrations be-
1304
+ cause the II scattering mechanism is less significant at
1305
+ this range and the primary contributions for lower doping
1306
+ concentration at low temperatures come from the PZ and
1307
+ the ADP scattering mechanisms, while at greater doping
1308
+ concentrations, the II scattering mechanism is compara-
1309
+ ble to the ADP and the PZ scattering mechanisms. The
1310
+ mobility owing to the II scattering mechanism is a de-
1311
+
1312
+ A=30nm
1313
+ A=20nm
1314
+ ^=12nm
1315
+ Correlation lengthN
1316
+ 106
1317
+ A=8nm
1318
+ Λ=6nm
1319
+ Λ=3nm
1320
+ Λ=2nm
1321
+ 103
1322
+ A=1nm
1323
+ 20
1324
+ 150
1325
+ 300
1326
+ Temperature
1327
+ (K)Hall mobility (cm? / V-sec)
1328
+ 105
1329
+ D—1×1013 cm-3——1×1013 cm-3
1330
+ -0- 1×1016 cm-3-★- 1×1016 cm-3
1331
+ .O..9×1016 cm-3...*...9×1016 cm-3
1332
+ 104
1333
+ Rode
1334
+ RTA
1335
+ 20
1336
+ 150
1337
+ 300
1338
+ Temperature (K)Hall scattering factor r
1339
+ .o..Rode ..o..RTA
1340
+ 1.00
1341
+ 0.75
1342
+ 20
1343
+ 100
1344
+ 200
1345
+ Temperature (K)3
1346
+ Carrier conc. (cm*
1347
+ 1016
1348
+ H
1349
+ 1014
1350
+ 2
1351
+ 0.5
1352
+ 12
1353
+ 10
1354
+ 30
1355
+ 77
1356
+ 120
1357
+ 150
1358
+ 200
1359
+ Temperature(K)11
1360
+ creasing function of ND, the mobility begins to decrease
1361
+ as ND exceeds 1 × 1016 cm−3.
1362
+ In Fig. 9, we show the conductivity versus temperature
1363
+ for the doping concentrations of ND = 1 × 1013 cm−3,
1364
+ ND = 1 × 1016 cm−3 and ND = 9 × 1016 cm−3, re-
1365
+ spectively, and to demonstrate the supremacy of our
1366
+ approach, we compare the results obtained using both
1367
+ the Rode’s and the RTA method. At higher tempera-
1368
+ tures, the difference in the result of Rode’s method and
1369
+ the RTA is due to the POP scattering mechanism, the
1370
+ POP scattering is weaker at lower temperatures hence
1371
+ both the RTA and the Rode exhibit the same conduc-
1372
+ tivity. We demonstrate that the conductivity in a T2SL
1373
+ increases with an increase in the carrier concentration
1374
+ but decreases as we increase the temperature.
1375
+ In Figs. 10 and 11, we show the mobility due to only
1376
+ the IRS mechanism.
1377
+ The calculated mobilities are vi-
1378
+ tal functions of the roughness parameters and the carrier
1379
+ scattering. The existing mobility calculations reveal that,
1380
+ up to temperatures where the POP scattering mechanism
1381
+ takes over, the IRS is the dominating scattering mecha-
1382
+ nism in T2SL. The screening is included in our calcu-
1383
+ lation using Thomas-Fermi screening which lowers the
1384
+ scattering rates and increases the mobility. As illustrated
1385
+ in Fig. 10, the mobility is shown to be strongly reliant
1386
+ on the roughness height ∆, and decreases monotonically
1387
+ with increasing ∆, and is proportional to ∆−2.
1388
+ Figures 10 and 11 show that at low temperatures, the
1389
+ mobility rises since the value of ∂f
1390
+ ∂ε is an ascending func-
1391
+ tion of temperature and the denominator of Eq. (26) is
1392
+ virtually constant at lower temperatures. Also, the elec-
1393
+ tron density increases at higher temperatures and hence
1394
+ the mobility drop smoothly. Figure 11 shows that the
1395
+ mobility is high for smaller values of correlation length
1396
+ Λ, and drops rapidly as the correlation length of rough-
1397
+ ness increases until it reaches a saturation point. The
1398
+ mobility reaches its maximum value at roughly 50 K for
1399
+ smaller values of Λ, and this maximum point moves to-
1400
+ ward the higher temperatures for greater values of Λ.
1401
+ The Hall mobility in InAs/GaSb T2SLs is depicted in
1402
+ Fig. 12. At temperatures above 50 K, the mobility re-
1403
+ duces as expected from a combination of the ADP and
1404
+ the POP scattering mechanisms. In T2SL, the mobility
1405
+ increases with decreasing temperature, preferable to the
1406
+ T −3/2 dependency associated with the phonon scattering.
1407
+ The greater temperature dependency of the electron mo-
1408
+ bility in InAs/GaSb-based T2SL may indicate stronger
1409
+ electron-phonon coupling than in the bulk material. The
1410
+ increased mobility near 50 K could be attributed to a
1411
+ longer scattering time or a lower electron-effective mass
1412
+ at the CB edge.
1413
+ When the Hall scattering factor rH, deviates signifi-
1414
+ cantly from unity, it indicates that to derive the elec-
1415
+ tron drift mobility from the experimentally calculated
1416
+ Hall mobility data, the Hall scattering factor must be
1417
+ precisely determined. Figure 13 shows the predicted val-
1418
+ ues of the Hall scattering factor against the temperature
1419
+ at B = 0.69 T for ND = 9 × 1017 cm−3, while Fig. 14
1420
+ depicts the Hall scattering factor as a function of tem-
1421
+ perature and the carrier concentration at B = 0.69 T.
1422
+ To the best of our knowledge, calculations of the Hall
1423
+ scattering factor in such SLs have not been performed
1424
+ yet in earlier works. The contribution of various scat-
1425
+ tering mechanisms decides the Hall scattering factor’s
1426
+ value. Figures 13 and 14 indicate that the value of rH at
1427
+ low temperatures deviates significantly from unity, while
1428
+ many researchers use one as an ideal value for a variety
1429
+ of calculations and studies, which is not accurate. The
1430
+ carrier concentration and the drift mobility may both be
1431
+ overestimated and underestimated when the Hall scatter-
1432
+ ing factor is used as unity. The Hall scattering factor, in
1433
+ our calculation, fluctuates between the values as low as
1434
+ 0.3 at low temperature and electron concentration, and
1435
+ as high as 1.48 and even more at high temperature and
1436
+ electron concentration as shown in Fig. 14. Therefore,
1437
+ it is worth pointing out that, while evaluating the car-
1438
+ rier concentration and the drift mobility in such SLs, one
1439
+ must use caution.
1440
+ In this work, we calculate the precise values of the
1441
+ Hall scattering factor and show that for a doping value
1442
+ of ND = 9 × 1017 cm−3, the computed values of rH are
1443
+ 0.914, 0.952 and 1.01 at temperatures of 77 K, 150 K
1444
+ and 190 K, respectively, as also depicted in Fig.
1445
+ 13.
1446
+ At higher temperatures, the value of the Hall scatter-
1447
+ ing factor is more than unity, indicating that the drift
1448
+ mobility is lower than the Hall mobility, implying that
1449
+ the phonon-assisted scattering mechanisms are substan-
1450
+ tial and diminish the drift mobility. As shown in Fig.
1451
+ 14, at temperatures of 30 K and 77 K, the Hall scat-
1452
+ tering factor is equal to 0.335 & 0.638 for lower doping
1453
+ concentrations of ND = 1 × 1012 cm−3 and it is equal
1454
+ to 0.369 & 0.691 with slightly higher doping concentra-
1455
+ tions of ND = 5×1015 cm−3 which signifies that the Hall
1456
+ scattering factor increases as the temperature and elec-
1457
+ tron concentrations rise, but as we increase the carrier
1458
+ concentration beyond 3 × 1017 cm−3, the Hall scattering
1459
+ factor starts decreasing. The higher electron concentra-
1460
+ tion causes a rapid variation in the Hall factor.
1461
+ V.
1462
+ CONCLUSION
1463
+ In this paper, we developed the Rode algorithm on the
1464
+ BTE in conjunction with the k.p band structure and the
1465
+ EFA for a detailed computation of the carrier mobility
1466
+ and conductivity, in order to primarily unravel two cru-
1467
+ cial insights. First, the significance of both elastic and in-
1468
+ elastic scattering mechanisms, particularly the influence
1469
+ of the IRS and POP scattering mechanisms in techno-
1470
+ logically relevant SL structures. Second, the structure
1471
+ specific Hall mobility and Hall scattering factor, which
1472
+ reveals that temperature and carrier concentrations sig-
1473
+ nificantly affect the Hall scattering factor, which devi-
1474
+ ates significantly from unity, i.e., from 0.3 to about 1.48,
1475
+ even for small magnetic fields. This reinforces the cau-
1476
+ tion that should be exercised when employing the Hall
1477
+
1478
+ 12
1479
+ scattering factor in experimental estimations of drift mo-
1480
+ bilities and carrier concentrations. Our research offers a
1481
+ comprehensive microscopic understanding of carrier dy-
1482
+ namics in such technologically relevant SLs. Our model
1483
+ also provides highly accurate and precise transport pa-
1484
+ rameters beyond the RTA and hence paves the way to
1485
+ develop physics based device modules for MWIR pho-
1486
+ todetectors.
1487
+ ACKNOWLEDGMENTS
1488
+ The authors acknowledge funding from ISRO under
1489
+ the ISRO-IIT Bombay Space Technology Cell.
1490
+ [1] D. Smith and C. Mailhiot, Journal of Applied Physics
1491
+ 62, 2545 (1987).
1492
+ [2] A. Rogalski, P. Martyniuk, and M. Kopytko, Applied
1493
+ physics reviews 4, 031304 (2017).
1494
+ [3] S. Mukherjee, A. Singh, A. Bodhankar, and B. Muralid-
1495
+ haran, Journal of Physics D: Applied Physics 54, 345104
1496
+ (2021).
1497
+ [4] A. Rogalski, Infrared detectors (CRC press, 2000).
1498
+ [5] A. Dehzangi, J. Li, and M. Razeghi, Light: Science &
1499
+ Applications 10, 1 (2021).
1500
+ [6] A. Rogalski, Progress in quantum electronics 27, 59
1501
+ (2003).
1502
+ [7] Y. Le Thi, Y. Kamakura, and N. Mori, Japanese Journal
1503
+ of Applied Physics 58, 044002 (2019).
1504
+ [8] P.
1505
+ Klipstein,
1506
+ Y.
1507
+ Benny,
1508
+ Y.
1509
+ Cohen,
1510
+ N.
1511
+ Fraenkel,
1512
+ R. Fraenkel, S. Gliksman, A. Glozman, I. Hirsch, O. Klin,
1513
+ L. Langof, et al., in Infrared Technology and Applications
1514
+ XLVII (SPIE, 2021), vol. 11741, pp. 102–112.
1515
+ [9] J.
1516
+ Wr´obel,
1517
+ P.
1518
+ Martyniuk,
1519
+ E.
1520
+ Plis,
1521
+ P.
1522
+ Madejczyk,
1523
+ W. Gawron, S. Krishna, and A. Rogalski, in Infrared
1524
+ Technology and Applications XXXVIII (SPIE, 2012), vol.
1525
+ 8353, pp. 412–420.
1526
+ [10] N. Gautam, H. Kim, M. Kutty, E. Plis, L. Dawson, and
1527
+ S. Krishna, Applied Physics Letters 96, 231107 (2010).
1528
+ [11] G. A. Sai-Halasz, L. Esaki, and W. A. Harrison, Phys.
1529
+ Rev. B 18, 2812 (1978).
1530
+ [12] T. Manyk, K. Michalczewski, K. Murawski, K. Grodecki,
1531
+ J. Rutkowski, and P. Martyniuk, Results in Physics 11,
1532
+ 1119 (2018).
1533
+ [13] A. Rogalski, P. Martyniuk, and M. Kopytko, Progress in
1534
+ Quantum Electronics 68, 100228 (2019).
1535
+ [14] D. Chow,
1536
+ R. Miles,
1537
+ J. Schulman,
1538
+ D. Collins,
1539
+ and
1540
+ T. McGill, Semiconductor Science and Technology 6, C47
1541
+ (1991).
1542
+ [15] E. A. Plis, Advances in Electronics 2014 (2014).
1543
+ [16] P. Martyniuk, J. Antoszewski, M. Martyniuk, L. Faraone,
1544
+ and A. Rogalski, Applied Physics Reviews 1, 041102
1545
+ (2014).
1546
+ [17] S. Safa, A. Asgari, and L. Faraone, Journal of Applied
1547
+ Physics 114, 053712 (2013).
1548
+ [18] S. Safa and A. Asgari, arXiv preprint arXiv:1502.02449
1549
+ (2015).
1550
+ [19] S. Safa and A. Asgari, arXiv preprint arXiv:1502.01453
1551
+ (2015).
1552
+ [20] S. Safa and A. Asgari, arXiv preprint arXiv:1504.02871
1553
+ (2015).
1554
+ [21] F. Szmulowicz, H. Haugan, S. Elhamri, and G. Brown,
1555
+ Physical Review B 84, 155307 (2011).
1556
+ [22] F. Szmulowicz and G. Brown, Applied Physics Letters
1557
+ 98, 182105 (2011).
1558
+ [23] F. Szmulowicz and G. Brown, Journal of Applied Physics
1559
+ 113, 014302 (2013).
1560
+ [24] G. Bastard, Physical Review B 24, 5693 (1981).
1561
+ [25] E. Conwell and V. Weisskopf, Physical review 77, 388
1562
+ (1950).
1563
+ [26] J. D. Zook, Physical Review 136, A869 (1964).
1564
+ [27] K. Kaasbjerg, K. S. Thygesen, and A.-P. Jauho, Physical
1565
+ Review B 87, 235312 (2013).
1566
+ [28] T.-Y. Tsai, K. Michalczewski, P. Martyniuk, C.-H. Wu,
1567
+ and Y.-R. Wu, Journal of Applied Physics 127, 033104
1568
+ (2020).
1569
+ [29] M. Wataya, N. Sawaki, H. Goto, I. Akasaki, H. Kano,
1570
+ and M. Hashimoto, Japanese Journal of Applied Physics
1571
+ 28, 1934 (1989).
1572
+ [30] I. Dharssi, P. Butcher, and G. Warren, Superlattices and
1573
+ microstructures 9, 335 (1991).
1574
+ [31] I. Dharssi and P. Butcher, Journal of Physics: condensed
1575
+ matter 2, 4629 (1990).
1576
+ [32] D. Rode, Physical Review B 2, 1012 (1970).
1577
+ [33] D. Rode, physica status solidi (b) 55, 687 (1973).
1578
+ [34] D. Rode, in Semiconductors and semimetals (Elsevier,
1579
+ 1975), vol. 10, pp. 1–89.
1580
+ [35] N. W. Ashcroft, N. D. Mermin, et al., Solid state physics.
1581
+ [36] N. D. Mermin, Physical Review B 1, 2362 (1970).
1582
+ [37] Y. Livneh, P. Klipstein, O. Klin, N. Snapi, S. Grossman,
1583
+ A. Glozman, and E. Weiss, Physical Review B 86, 235311
1584
+ (2012).
1585
+ [38] P. Klipstein, Physical Review B 81, 235314 (2010).
1586
+ [39] C. Ricciardi, M. L. Della Rocca, and M. Benfante (2020).
1587
+ [40] P.-F. Qiao, S. Mou, and S. L. Chuang, Optics express 20,
1588
+ 2319 (2012).
1589
+ [41] P. Klipstein, Y. Livneh, O. Klin, S. Grossman, N. Snapi,
1590
+ A. Glozman, and E. Weiss, Infrared Physics & Technol-
1591
+ ogy 59, 53 (2013).
1592
+ [42] D. E. Aspnes and A. Studna, Physical review B 27, 985
1593
+ (1983).
1594
+ [43] S. Datta, Quantum transport: atom to transistor (Cam-
1595
+ bridge university press, 2005).
1596
+ [44] T. Garwood, N. A. Modine, and S. Krishna, Infrared
1597
+ Physics & Technology 81, 27 (2017).
1598
+ [45] Y. Wei and M. Razeghi, Physical Review B 69, 085316
1599
+ (2004).
1600
+ [46] R. Nucho and A. Madhukar, Journal of Vacuum Science
1601
+ and Technology 15, 1530 (1978).
1602
+ [47] G. C. Dente and M. L. Tilton, Journal of Applied Physics
1603
+ 86, 1420 (1999).
1604
+ [48] R. Magri and A. Zunger, Physical Review B 65, 165302
1605
+ (2002).
1606
+ [49] Z. Taghipour, E. Shojaee, and S. Krishna, Journal of
1607
+ Physics: Condensed Matter 30, 325701 (2018).
1608
+ [50] G. Bastard, Physical Review B 25, 7584 (1982).
1609
+ [51] M. Altarelli, Physical review B 28, 842 (1983).
1610
+ [52] E. Kane, in Narrow Gap Semiconductors Physics and Ap-
1611
+ plications (Springer, 1980), pp. 13–31.
1612
+
1613
+ 13
1614
+ [53] S. L. Chuang, Physics of photonic devices (John Wiley
1615
+ & Sons, 2012).
1616
+ [54] Y. Jiang, X. Ma, Y. Xu, and G. Song, Journal of Applied
1617
+ Physics 116, 173702 (2014).
1618
+ [55] N. K. Dhar, R. Dat, and A. K. Sood, Optoelectronics-
1619
+ Advanced Materials and Devices 1 (2013).
1620
+ [56] M. Lundstrom, Fundamentals of carrier transport (2002).
1621
+ [57] D. K. Ferry, Semiconductor transport (CRC Press, 2016).
1622
+ [58] J. Singh, Electronic and optoelectronic properties of
1623
+ semiconductor structures (Cambridge University Press,
1624
+ 2007).
1625
+ [59] R. F. Pierret and G. W. Neudeck, Advanced semiconduc-
1626
+ tor fundamentals, vol. 6 (Addison-Wesley Reading, MA,
1627
+ 1987).
1628
+ [60] D. Vasileska, S. M. Goodnick, and G. Klimeck, Com-
1629
+ putational Electronics: semiclassical and quantum device
1630
+ modeling and simulation (CRC press, 2017).
1631
+ [61] S. Chakrabarty, A. K. Mandia, B. Muralidharan, S. C.
1632
+ Lee, and S. Bhattacharjee, Journal of Physics:
1633
+ Con-
1634
+ densed Matter 32, 135704 (2019).
1635
+ [62] A. K. Mandia, B. Muralidharan, J.-H. Choi, S.-C. Lee,
1636
+ and S. Bhattacharjee, Computer Physics Communica-
1637
+ tions 259, 107697 (2021).
1638
+ [63] A. M. Ganose, J. Park, A. Faghaninia, R. Woods-
1639
+ Robinson, K. A. Persson, and A. Jain, Nature communi-
1640
+ cations 12, 1 (2021).
1641
+ [64] H. Brooks, in Advances in electronics and electron physics
1642
+ (Elsevier, 1955), vol. 7, pp. 85–182.
1643
+ [65] A. Faghaninia, J. W. Ager III, and C. S. Lo, Physical
1644
+ Review B 91, 235123 (2015).
1645
+ [66] K. Kothari and M. Maldovan, Scientific Reports 7, 1
1646
+ (2017).
1647
+ [67] H. Sakaki, T. Noda, K. Hirakawa, M. Tanaka, and
1648
+ T. Matsusue, Applied physics letters 51, 1934 (1987).
1649
+ [68] A. Gold, Physical Review B 35, 723 (1987).
1650
+ [69] L. Sang, S. Y. Yang, G. P. Liu, G. J. Zhao, C. B. Liu,
1651
+ C. Y. Gu, H. Y. Wei, X. L. Liu, Q. S. Zhu, and Z. G.
1652
+ Wang, IEEE transactions on electron devices 60, 2077
1653
+ (2013).
1654
+ [70] S. Goodnick, D. Ferry, C. Wilmsen, Z. Liliental, D. Fathy,
1655
+ and O. Krivanek, Physical Review B 32, 8171 (1985).
1656
+ [71] A. K. Mandia, N. A. Koshi, B. Muralidharan, S. C. Lee,
1657
+ and S. Bhattacharjee, Journal of Materials Chemistry C
1658
+ (2022).
1659
+ [72] Z. Becer, A. Bennecer, and N. Sengouga, Crystals 9, 629
1660
+ (2019).
1661
+ [73] I. Vurgaftman, J. ´a. Meyer, and L. ´a. Ram-Mohan, Jour-
1662
+ nal of applied physics 89, 5815 (2001).
1663
+ [74] M. Delmas, B. Liang, and D. L. Huffaker, in Quantum
1664
+ Sensing and Nano Electronics and Photonics XVI (In-
1665
+ ternational Society for Optics and Photonics, 2019), vol.
1666
+ 10926, p. 109260G.
1667
+ [75] S. Mitra, Physical Review 132, 986 (1963).
1668
+ [76] D. Lockwood, G. Yu, and N. Rowell, Solid State Com-
1669
+ munications 136, 404 (2005).
1670
+ [77] H. Haugan, G. Brown, F. Szmulowicz, and S. Elhamri,
1671
+ in AIP Conference Proceedings (American Institute of
1672
+ Physics, 2011), vol. 1416, pp. 155–157.
1673
+ [78] R. Alchaar, J.-B. Rodriguez, L. H¨oglund, S. Naureen,
1674
+ and P. Christol, AIP Advances 9, 055012 (2019).
1675
+
7NE4T4oBgHgl3EQfCQsk/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
89AyT4oBgHgl3EQfdPcr/content/2301.00297v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:ddb75c1f0854295e8410e291f53128d195db76de07dd27ecd61a856d66b5c3e2
3
+ size 628801
89AyT4oBgHgl3EQfdPcr/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:614ae65e313f10a679428d9e92c64e2a20bddefb927e9bdf81575cd3d5bfad79
3
+ size 1966125
89AyT4oBgHgl3EQfdPcr/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:434cd092d5d150c77637faaa543f7294a66f988c4be9366966b2eadd9724b04e
3
+ size 77275
8dE1T4oBgHgl3EQfngSj/content/tmp_files/2301.03310v1.pdf.txt ADDED
@@ -0,0 +1,693 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ IMPROVED FRONT STEEPEST DESCENT
2
+ FOR MULTI-OBJECTIVE OPTIMIZATION
3
+ Matteo Lapucci
4
+ Global Optimization Laboratory (GOL)
5
+ Department of Information Engineering
6
+ University of Florence
7
+ Via di Santa Marta, 3, 50139, Florence, Italy
8
9
+ Pierluigi Mansueto
10
+ Global Optimization Laboratory (GOL)
11
+ Department of Information Engineering
12
+ University of Florence
13
+ Via di Santa Marta, 3, 50139, Florence, Italy
14
15
+ ABSTRACT
16
+ In this paper, we deal with the Front Steepest Descent algorithm for multi-objective optimization.
17
+ We point out that the algorithm from the literature is often incapable, by design, of spanning large
18
+ portions of the Pareto front. We thus introduce some modifications within the algorithm aimed to
19
+ overcome this significant limitation. We prove that the asymptotic convergence properties of the
20
+ algorithm are preserved and numerically show that the proposed method significantly outperforms
21
+ the original one.
22
+ Keywords Multi-objective optimization · Steepest descent · Pareto front
23
+ Mathematics Subject Classification (2020) 90C29 · 90C30
24
+ 1
25
+ Introduction
26
+ In this paper, we are interested in optimization problems of the form
27
+ min
28
+ x∈Rn F(x) = (f1(x), . . . , fm(x))T ,
29
+ (1)
30
+ where F : Rn → Rm is a vector-valued continuously differentiable function. We are thus dealing with smooth,
31
+ unconstrained multi-objective optimization problems, where many functions have to be simultaneously minimized and
32
+ Pareto’s efficiency concepts have to be considered to establish optimality. We refer the reader to [8] for an introduction
33
+ to multi-objective optimization.
34
+ Multi-objective descent methods [9–11, 16] constitute a class of algorithmic approaches designed to tackle these
35
+ problems; these approaches basically extend classical iterative optimization algorithms for scalar optimization to the
36
+ multi-objective setting. Descent methods are receiving increasing attention and have consistently become significant
37
+ alternatives to scalarization methods [6, 7, 15] and evolutionary algorithms [4]. This is particularly true for recent
38
+ versions of descent approaches that are specifically designed to handle sets of points and to construct an approximation
39
+ of the entire Pareto front, rather than a single solution.
40
+ In this short manuscript, we focus on the Front Steepest Descent (FSD) algorithm proposed in [2]. In particular, we
41
+ argue that, although being far superior than the original single point steepest descent algorithm for multi-objective
42
+ optimization [10], FSD as defined in [2] has limited exploration capabilities and it is quite frequently unable to span
43
+ large portions of the Pareto front.
44
+ We thus propose small but crucial modifications to the algorithm, that allow to turn it tremendously effective at spanning
45
+ the entire Pareto front, regardless of the starting set of points. We show that the proposed approach still enjoys the nice
46
+ convergence guarantees of the original FSD.
47
+ The rest of the paper is organized as follows: in Section 2, we summarize the FSD algorithm, recalling its convergence
48
+ properties; we then point out in Section 2.1 that in certain, common situations the algorithm is unable to span large
49
+ arXiv:2301.03310v1 [math.OC] 9 Jan 2023
50
+
51
+ Improved Front Steepest Descent for MOO
52
+ MATTEO LAPUCCI AND PIERLUIGI MANSUETO
53
+ portions of the Pareto front. In Section 3 we introduce the novel strategy for generating nondominated solutions within
54
+ FSD and we provide the convergence analysis for the resulting algorithm in Section 3.1. In Section 4, we present the
55
+ results of numerical experiments showing that the proposed modification significantly improves effectiveness and
56
+ consistency of the FSD algorithm. We finally give some concluding remarks in Section 5.
57
+ 2
58
+ The Front Steepest Descent algorithm
59
+ The Front Steepest Descent algorithm [2] was designed to solve problem (1) according to Pareto’s optimality concepts.
60
+ Given the standard partial ordering in Rm, i.e.,
61
+ u ≤ v ⇐⇒ uj ≤ vj, ∀ j = 1, . . . , m,
62
+ u < v ⇐⇒ uj < vj, ∀ j = 1, . . . , m,
63
+ u ≨ v ⇐⇒ u ≤ v ∧ u ̸= v,
64
+ the aim is to find solutions ¯x ∈ Rn that satisfy the following properties, listed in decreasing order of strength:
65
+ • Pareto optimality: ∄ y ∈ Rn s.t. F(y) ≨ F(¯x);
66
+ • Weak Pareto optimality: ∄ y ∈ Rn s.t. F(y) < F(¯x);
67
+ • Pareto stationarity: min
68
+ d∈Rn
69
+ max
70
+ j=1,...,m ∇fj(¯x)T d = 0.
71
+ In fact, there typically exist many Pareto optimal solutions (the Pareto set) that account for different trade-offs between
72
+ the contrasting objectives; these trade-offs, that constitute in the objectives space the Pareto front, can a posteriori be
73
+ evaluated by the decision makers, who are thus willing to have the broadest possible range of available options.
74
+ FSD method specifically aims to construct an approximation of the entire Pareto front; the algorithm works in an iterative
75
+ fashion, maintaining at each iteration a set Xk of solutions that are mutually nondominated, i.e., for any x ∈ Xk there
76
+ is no y ∈ Xk such that F(y) ≨ F(x).
77
+ The points for the set Xk+1 are computed carrying out search steps starting from the points ˆx ∈ Xk along:
78
+ • the steepest common descent direction [10]:
79
+ v(ˆx) = arg min
80
+ d∈Rn
81
+ max
82
+ j=1,...,m ∇fj(ˆx)T d + 1
83
+ 2∥d∥2;
84
+ (2)
85
+ • the steepest partial descent directions [1,2]: given I ⊂ {1, . . . , m},
86
+ vI(ˆx) = arg min
87
+ d∈Rn
88
+ max
89
+ j∈I ∇fj(ˆx)T d + 1
90
+ 2∥d∥2.
91
+ (3)
92
+ The use of equality notation in the definition of steepest descent directions is justified by the uniqueness of the solution
93
+ set for the above optimization problems (the objective is strongly convex and continuous). Given any subset of objectives
94
+ I, a partial descent direction exists if
95
+ θI(ˆx) = min
96
+ d∈Rn max
97
+ j∈I ∇fj(ˆx)T d + 1
98
+ 2∥d∥2 < 0;
99
+ of course, the steepest common descent direction v(ˆx) and the corresponding θ (ˆx) are considered when I = {1, . . . , m}.
100
+ Both mappings vI(ˆx) and θI(ˆx) are continuous [10].
101
+ The instructions of the FSD procedure are summarized in Algorithm 1. In brief, at each iteration k, all points in the
102
+ current set of nondominated solutions, Xk, are considered; for each one of these points, xc, a line search along the
103
+ steepest partial descent direction is carried out for any subset of objectives I ⊆ {1, . . . , m} such that θI(xc) < 0; in
104
+ addition, a subset I is only considered for xc if the point is nondominated with respect to that subset of objectives.
105
+ The line search is an Armijo-type procedure whose scheme is reported in Algorithm 2. Given a nondominated point and
106
+ a search direction w.r.t. the objectives in I, the algorithm returns a new point such that it is “sufficiently nondominated”.
107
+ The obtained point is added to the set of nondominated points, while all the points that are now dominated by it are
108
+ filtered out.
109
+ Algorithm 2 enjoys the following finite termination properties.
110
+ 2
111
+
112
+ Improved Front Steepest Descent for MOO
113
+ MATTEO LAPUCCI AND PIERLUIGI MANSUETO
114
+ Algorithm 1: FrontSteepestDescent
115
+ 1 Input: F : Rn → Rm, X0 set of mutually nondominated points w.r.t. F.
116
+ 2 k = 0
117
+ 3 while a stopping criterion is not satisfied do
118
+ 4
119
+ ˆXk = Xk
120
+ 5
121
+ forall xc ∈ Xk do
122
+ 6
123
+ forall I ⊆ {1, . . . , m} such that
124
+ • ∄y ∈ ˆXk s.t. FI(y) ≨ FI(xc) and
125
+ • θI(xc) < 0
126
+ 7
127
+ do
128
+ 8
129
+ α = ArmijoLS(F(·), I, ˆXk, xc, vI(xc), θI(xc))
130
+ 9
131
+ ˆXk = ˆXk \ {y ∈ ˆXk | F(xc + αvI(xc)) ≨ F(y)} ∪ {xc + αvI(xc)}
132
+ 10
133
+ Xk+1 = ˆXk
134
+ 11
135
+ k = k + 1
136
+ 12 return Xk
137
+ Algorithm 2: ArmijoLS
138
+ 1 Input: F : Rn → Rm, I ⊆ {1, . . . , m}, ˆX set of mutually nondominated points w.r.t. F, xc ∈ ˆX, vI(xc) ∈ Rn,
139
+ θI(xc) ∈ R, α0 > 0, δ ∈ (0, 1), γ ∈ (0, 1).
140
+ 2 α = α0
141
+ 3 Let ˆXI be the set of points in ˆX that are mutually nondominated w.r.t. FI
142
+ 4 while ∃ y ∈ ˆXI s.t. FI(y) + 1γαθI(xc) < FI(xc + αvI(xc)) do
143
+ 5
144
+ α = δα
145
+ 6 return α
146
+ Proposition 1 ( [2, Proposition 4]). Let I ⊆ {1, . . . , m}, ˆX be a set of mutually nondominated solutions containing
147
+ xc; xc is also nondominated w.r.t. FI and it is such that θI(xc) < 0. Then, ∃ α > 0, sufficiently small, such that
148
+ FI(y) + 1γαθI(xc) ≮ FI(xc + αvI(xc)),
149
+ ∀ y ∈ ˆXI,
150
+ with ˆXI being the set of points in ˆX that are mutually nondominated w.r.t. FI. Furthermore, the produced point
151
+ xc + αvI(xc) is nondominated by any point in ˆX with respect to F.
152
+ Remark 1. An improved version of Algorithm 2 was also proposed in [2], which is based on an extrapolation strategy
153
+ and allows to possibly obtain many nondominated solutions along the search direction. When used within Algorithm 1,
154
+ the extrapolation technique does not alter theoretical convergence results, but the resulting algorithm is reported to be
155
+ significantly more effective.
156
+ Now, we shall recall the convergence properties of Algorithm 1, which are based on the concept of linked sequence [14].
157
+ Definition 1. Let {Xk} be the sequence of sets of nondominated points produced by Algorithm 1. We define a linked
158
+ sequence as a sequence {xjk} such that, for any k = 1, 2, . . ., the point xjk ∈ Xk is generated at iteration k − 1 of
159
+ Algorithm 1 by the point xjk−1 ∈ Xk−1.
160
+ Proposition 2 ( [2, Proposition 5]). Let us assume that there exists x0 ∈ X0 such that
161
+ • x0 is not Pareto stationary;
162
+ • the set L(x0) = �m
163
+ j=1{x ∈ Rn | fj(x) ≤ fj(x0)} is compact.
164
+ Let {Xk} be the sequence of sets of nondominated points produced by Algorithm 1. Let {xjk} be a linked sequence,
165
+ then it admits limit points and every limit point is Pareto-stationary for problem (1).
166
+ 3
167
+
168
+ Improved Front Steepest Descent for MOO
169
+ MATTEO LAPUCCI AND PIERLUIGI MANSUETO
170
+ 0.0
171
+ 0.5
172
+ 1.0
173
+ 1.5
174
+ 2.0
175
+ 2.5
176
+ 3.0
177
+ 3.5
178
+ 4.0
179
+ f1
180
+ 0.0
181
+ 0.5
182
+ 1.0
183
+ 1.5
184
+ 2.0
185
+ 2.5
186
+ 3.0
187
+ 3.5
188
+ 4.0
189
+ f2
190
+ (a)
191
+ 0.0
192
+ 0.5
193
+ 1.0
194
+ 1.5
195
+ 2.0
196
+ 2.5
197
+ 3.0
198
+ 3.5
199
+ 4.0
200
+ f1
201
+ 0.0
202
+ 0.5
203
+ 1.0
204
+ 1.5
205
+ 2.0
206
+ 2.5
207
+ 3.0
208
+ 3.5
209
+ 4.0
210
+ f2
211
+ (b)
212
+ 0.0
213
+ 0.5
214
+ 1.0
215
+ 1.5
216
+ 2.0
217
+ 2.5
218
+ 3.0
219
+ 3.5
220
+ 4.0
221
+ f1
222
+ 0.0
223
+ 0.5
224
+ 1.0
225
+ 1.5
226
+ 2.0
227
+ 2.5
228
+ 3.0
229
+ 3.5
230
+ 4.0
231
+ f2
232
+ (c)
233
+ 0.0
234
+ 0.5
235
+ 1.0
236
+ 1.5
237
+ 2.0
238
+ 2.5
239
+ 3.0
240
+ 3.5
241
+ 4.0
242
+ f1
243
+ 0.0
244
+ 0.5
245
+ 1.0
246
+ 1.5
247
+ 2.0
248
+ 2.5
249
+ 3.0
250
+ 3.5
251
+ 4.0
252
+ f2
253
+ (d)
254
+ Figure 1: Pareto fronts obtained by the FSD algorithm on the convex JOS problem (n = 5). (a) FSD starts from 1 Pareto
255
+ point; (b) FSD starts from 2 Pareto points; (c) 3 independent FSD runs, started from 3 different random points; (d) 3
256
+ independent runs of FSD with the extrapolation strategy, started from the same 3 random points as in (c).
257
+ 2.1
258
+ FSD may not span the Pareto front
259
+ The FSD algorithm constitutes, in practice, a significant improvement w.r.t. the simple multi-start steepest descent
260
+ strategy for multi-objective optimization. However, in experimental settings, it is not uncommon to observe situations
261
+ where FSD is unable to retrieve large portions of the Pareto front.
262
+ Here, we highlight this shortcoming and argue that it is the direct result of algorithmic design. In particular, the first
263
+ condition at step 6 of Algorithm 1 makes the outcome of the algorithm very strongly dependent on the starting point(s).
264
+ When a point xc is considered for exploration in Algorithm 1, a partial descent direction obtained according to the
265
+ subset of objectives I ⊆ {1, . . . , m} is only considered if xc is nondominated within Xk w.r.t. FI; in other words, there
266
+ is no y ∈ Xk such that FI(y) ≨ FI(xc). This condition was required by the authors of [2] in order to establish finite
267
+ termination properties for the line search (Algorithm 2).
268
+ Unfortunately, that same condition results in a limited fraction of points in Xk to be used for starting a partial descent
269
+ search. This fact can be visualized, with very extreme outcomes, in the bi-objective case; indeed, when m = 2, for
270
+ each of the two proper subsets of indices, I1 = {1} and I2 = {2} there is only one point that satisfies the (partial)
271
+ nondominance condition: xI1 = arg minx∈Xk f1(x) and xI2 = arg minx∈Xk f2(x).
272
+ Thus, partial descent is only carried out starting from the two current extreme points in the Pareto front. Moreover,
273
+ these partial descent steps will only allow to explore, outwards, the extreme parts of the current front approximation,
274
+ whereas the other descent step will mainly drive points to Pareto stationarity; as a result, even large holes within the
275
+ current solutions set cannot be filled.
276
+ Taking the reasoning to the extreme, let us assume that the starting set of solutions already lies on the Pareto front; if the
277
+ set contains only one point, then by repeated partial descent w.r.t. I1 and I2 the entire Pareto front can be spanned quite
278
+ uniformly; this situation is depicted in Figure 1a. If, on the other hand, there are two starting solutions, possibly far
279
+ away from each other in the objective space, then only the extreme parts of the front will be spanned, while the gap
280
+ 4
281
+
282
+ Improved Front Steepest Descent for MOO
283
+ MATTEO LAPUCCI AND PIERLUIGI MANSUETO
284
+ between the two points is not tackled (Figure 1b). Of course, the same reasoning applies with more than two starting
285
+ points.
286
+ The paradoxical behavior of the algorithm is such that it might be convenient to start far away from the Pareto front.
287
+ In this way, FSD may have many iterations at its disposal to increase the size of the set Xk and uniformly span the
288
+ objectives space; points are then driven to Pareto stationarity thanks to steps carried out considering I = {1, 2}.
289
+ Anyhow, the results are still influenced, somewhat randomly, by the starting solutions, as shown in Figure 1c. Moreover,
290
+ the extreme parts of the front are always spanned much more densely than the central one. We shall remark that, as the
291
+ intermediate regions of the front often provide the most interesting trade-offs to users, this is a very significant issue in
292
+ practice.
293
+ The extrapolation technique proposed in [2] might allow to partly alleviate the issue discussed here, as much more
294
+ nondominated solutions are obtained at each iteration; however, it is again the exploration of the extreme regions that is
295
+ mainly enhanced and sped up, with possibly overall counterproductive results (Figure 1d).
296
+ 3
297
+ Improved Front Steepest Descent
298
+ In Algorithm 3, we report the scheme of a modified Front Steepest Descent (IFSD) algorithm that overcomes the
299
+ limitations of Algorithm 1 discussed in Section 2.1.
300
+ Algorithm 3: ImprovedFrontSteepestDescent
301
+ 1 Input: F : Rn → Rm, X0 set of mutually nondominated points w.r.t. F, α0 > 0, δ ∈ (0, 1), γ ∈ (0, 1).
302
+ 2 k = 0
303
+ 3 while a stopping criterion is not satisfied do
304
+ 4
305
+ ˆXk = Xk
306
+ 5
307
+ forall xc ∈ Xk do
308
+ 6
309
+ if xc ∈ ˆXk then
310
+ 7
311
+ if θ(xc) < 0 then
312
+ 8
313
+ αk
314
+ c = maxh=0,1,...{α0δh | F(xc + α0δhv(xc)) ≤ F(xc) + 1γα0δhθ(xc)}
315
+ 9
316
+ else
317
+ 10
318
+ αk
319
+ c = 0
320
+ 11
321
+ zk
322
+ c = xc + αk
323
+ cv(xc)
324
+ 12
325
+ ˆXk = ˆXk \ {y ∈ ˆXk | F(zk
326
+ c ) ≨ F(y)} ∪ {zk
327
+ c }
328
+ 13
329
+ forall I ⊆ {1, . . . , m} s.t. θI(zk
330
+ c ) < 0 do
331
+ 14
332
+ if zk
333
+ c ∈ ˆXk then
334
+ 15
335
+ αI
336
+ c = maxh=0,1,...{α0δh | ∀ y ∈ ˆXk ∃j ∈ {1, . . . , m} s.t. fj(zk
337
+ c + α0δhvI(zk
338
+ c )) < fj(y)}
339
+ 16
340
+ ˆXk = ˆXk \ {y ∈ ˆXk | F(zk
341
+ c + αI
342
+ cvI(zk
343
+ c )) ≨ F(y)} ∪ {zk
344
+ c + αI
345
+ cvI(zk
346
+ c )}
347
+ 17
348
+ Xk+1 = ˆXk
349
+ 18
350
+ k = k + 1
351
+ 19 return Xk
352
+ Algorithm 3 includes a bunch of modifications w.r.t. the original FSD approach:
353
+ • for any point in Xk that is still nondominated when it is considered for exploration, a preliminary steepest
354
+ descent step is carried out; this step exploits a classical single point Armijo line search [10];
355
+ • further searches w.r.t. subsets of objectives start at the obtained point, as long as it is not dominated;
356
+ • for partial descent searches, we require the obtained point to be nondominated by all other points in ˆXk.
357
+ The idea is that, with these modifications, all points may be used to start exploration based on partial descent;
358
+ convergence of all the produced points towards stationarity is then forced by means of the “preliminary” steepest
359
+ descent step, that ensures the sufficient decrease. In the next section we prove that the algorithm is well defined and
360
+ actually produces convergent sequences of points.
361
+ 5
362
+
363
+ Improved Front Steepest Descent for MOO
364
+ MATTEO LAPUCCI AND PIERLUIGI MANSUETO
365
+ 3.1
366
+ Convergence analysis
367
+ In this section, we provide the formal convergence analysis for Algorithm 3.
368
+ Proposition 3. The line search at step 8 of Algorithm 3 is well defined.
369
+ Proof. The result follows from [10, Lemma 4] and by the if condition at step 7 that ensures that θ(xc) < 0.
370
+ Proposition 4. Step 15 of Algorithm 3 is well defined if zk
371
+ c is nondominated with respect to points in ˆXk.
372
+ Proof. Let y be any point in ˆXk; if F(y) = F(zk
373
+ c ), then by [10, Lemma 4] and the condition θI(zk
374
+ c ) < 0, there exists
375
+ ¯α > 0 such that FI(zk
376
+ c + αvI(zk
377
+ c )) < FI(zk
378
+ c ) = FI(y) for all α < ¯α; thus there exists h sufficiently large such that
379
+ fj(zk
380
+ c +α0δhvI(zk
381
+ c )) < fj(y) for all j ∈ I. If, on the other hand, there exists j ∈ {1, . . . , m} such that fj(zk
382
+ c ) < fj(y),
383
+ then by the continuity of F there exists α = α0δh sufficiently small such that fj(zk
384
+ c + αvI(zk
385
+ c )) < fj(y). Thus, the
386
+ condition can be satisfied for all y ∈ ˆXk and αI
387
+ c is the minimum of the corresponding values of α0δh.
388
+ Proposition 5. If Xk contains mutually nondominated points with respect to F, then ˆXk contains nondominated points
389
+ at any time during iteration k; thus step 15 is always well defined and Xk+1 is finally a set of nondominated solutions.
390
+ Proof. At iteration k, the set ˆXk is initialized with the nondominated points Xk; then, it is only updated at steps 12
391
+ and 16. At step 12, either zk
392
+ c = xc, and the set is not modified, or, by the definition of αk
393
+ c, zk
394
+ c dominates xc, which in
395
+ turn was nondominated. Thus, the added point zk
396
+ c is nondominated, while all the newly dominated points are removed.
397
+ At step 16, the added point zk
398
+ c + αI
399
+ cvI(zk
400
+ c ) is nondominated by the definition of αI
401
+ c; all the newly dominated points are
402
+ removed. Thus, ˆXk always contains mutually nondominated solutions. By Proposition 4 step 15 is therefore always
403
+ well defined. Moreover, since Xk+1 = ˆXk at the end of the iteration, Xk+1 inherits the nondominance property from
404
+ ˆXk.
405
+ Lemma 1. After step 12 of Algorithm 3, zk
406
+ c belongs to ˆXk. Moreover, for all ˜k > k, there exists y ∈ X˜k such that
407
+ F(y) ≤ F(zk
408
+ c ).
409
+ Proof. The first assertion of the proposition trivially follows from the update rule of ˆXk, at step 12. Now, either
410
+ zk
411
+ c ∈ X˜k or zk
412
+ c /∈ X˜k; in the former case, we trivially have y = zk
413
+ c ; otherwise, we can notice that, by the instructions of
414
+ the algorithm, any set X˜k, ˜k > k, is the result of repeated application of steps 12 and 16, starting from ˆXk at some point
415
+ when zk
416
+ c ∈ ˆXk. When zk
417
+ c was removed from the set, a point y1 was certainly inserted such that F(y1) ≤ F(zk
418
+ c ). Then,
419
+ either y1 ∈ X˜k, or y1 was removed when a point y2 such that F(y2) ≤ F(y1) was added. By recursively applying
420
+ the reasoning, we have that there is certainly a point yt ∈ X˜k such that F(yt) ≤ F(yt−1) ≤ . . . ≤ F(y2) ≤ F(y1) ≤
421
+ F(zk
422
+ c ). This completes the proof.
423
+ Proposition 6. Let X0 be a set of mutually nondominated points and x0 ∈ X0 be a point such that the set L(x0) =
424
+ �m
425
+ j=1{x ∈ Rn | fj(x) ≤ fj(x0)} is compact. Let {Xk} be the sequence of sets of nondominated points produced by
426
+ Algorithm 3. Let {xjk} be a linked sequence, then it admits limit points and every limit point is Pareto-stationary for
427
+ problem (1).
428
+ Proof. For any k, either x0 ∈ Xk or x0 /∈ Xk. In the former case, since all points in Xk are mutually nondominated,
429
+ we certainly have xjk ∈ L(x0). Otherwise, by a similar reasoning as in the proof of Lemma 1, we have that there is a
430
+ point yk ∈ Xk such that F(yk) ≤ F(x0); since yk does not dominate xjk, we have that there exists h ∈ {1, . . . , m}
431
+ such that fh(xjk) ≤ fh(yk) ≤ fh(x0); thus, again, xjk ∈ L(x0). Therefore the entire sequence {xjk} belongs to the
432
+ compact set L(x0), and thus admits limit points.
433
+ Now, let us consider a limit point ¯x of a linked sequence {xjk}, i.e., there exists K ⊆ {1, 2, . . .} such that
434
+ lim
435
+ k→∞
436
+ k∈K
437
+ xjk = ¯x.
438
+ We assume by contradiction that θ(¯x) < 0 and thus there exists ε > 0 such that for all k ∈ K sufficiently large we have
439
+ θ(xjk) ≤ −ε < 0. Let zjk = xjk + αjkv(xjk) the point obtained at step 11 of the algorithm starting from xjk. Now,
440
+ αjk ∈ [0, α0], which is a compact set, thus there exists a further subsequence K1 ⊆ K such that αjk → ¯α ∈ [0, α0].
441
+ 6
442
+
443
+ Improved Front Steepest Descent for MOO
444
+ MATTEO LAPUCCI AND PIERLUIGI MANSUETO
445
+ Moreover, function v(·) is continuous, thus v(xjk) → v(¯x) for k → ∞, k ∈ K1. Hence, taking the limits along K1 we
446
+ also get that zjk → ¯x + ¯αv(¯x) = ¯z.
447
+ By the definition of αjk and zjk (steps 8-11) we have that
448
+ F(zjk) ≤ F(xjk) + 1γαjkθ(xjk).
449
+ Taking the limits for k ∈ K1, k → ∞, recalling the continuity of θ(·), we get
450
+ F(¯z) ≤ F(¯x) + 1γ ¯αθ(¯x) ≤ F(¯x) − 1γ ¯αε.
451
+ (4)
452
+ Now, given k ∈ K1, let k1(k) be the smallest index in K1 such that k1(k) > k. By Lemma 1, there exists yjk1(k) ∈
453
+ Xk1(k) such that F(yjk1(k)) ≤ F(zjk); moreover, xjk1(k) ∈ Xk1(k); by Proposition 5, the points in Xk1(k) are mutually
454
+ nondominated, hence there exists h(k) ∈ {1, . . . , m} such that
455
+ fh(k)(xjk1(k)) ≤ fh(k)(yjk1(k)) ≤ fh(k)(zjk).
456
+ Considering a further subsequence K2 ⊆ K1 such that h(k) = h for all k ∈ K2 and taking the limits, we obtain
457
+ fh(¯x) ≤ fh(¯z).
458
+ Putting this last result together with (4), we get
459
+ fh(¯x) ≤ fh(¯z) ≤ fh(¯x) − γ ¯αε.
460
+ Since ¯α ∈ [0, α0], ε > 0 and γ > 0, the above chain of inequalities can only hold if ¯α = limk→∞,k∈K2 αjk = 0.
461
+ For all k ∈ K2 sufficiently large, we have θ(xjk) < 0 and, thus, αjk is defined at step 8. Since αjk → 0, for any
462
+ q ∈ N, for all k ∈ K2 large enough we certainly have αjk < α0δq; thus, the Armijo condition F(xjk + αv(xjk)) ≤
463
+ F(xjk) + 1γαθ(xjk) is not satisfied by α = α0δq, i.e., there exists ˜h(k) such that
464
+ f˜h(k)(xjk + α0δqv(xjk)) > f˜h(k)(xjk) + γα0δqθ(xjk).
465
+ Taking the limits along a suitable subsequence such that ˜h(k) = ˜h, we get
466
+ f˜h(¯x + α0δqv(¯x)) ≥ f˜h(¯x) + γα0δqθ(¯x).
467
+ Now, since q is arbitrary and θ(¯x) < 0, this is absurd by [10, Lemma 4]. The proof is thus complete.
468
+ 4
469
+ Numerical results
470
+ In this section, we show the results of computational experiments, supporting the discussion in Sections 2-3. The code,
471
+ which was written in Python3, was executed on a computer with the following characteristics: Ubuntu 22.04, Intel
472
+ Xeon Processor E5-2430 v2 6 cores 2.50 GHz, 16 GB RAM. In order to solve instances of problems (2)-(3), the Gurobi
473
+ optimizer (version 9.5) was employed.
474
+ We compared our approach (IFSD) to the original FSD, Algorithm 1, equipped with the base line search (Algorithm 2)
475
+ or the extrapolation strategy (EFSD). The following parameters setting was used for line searches: α0 = 1, δ = 0.5, γ =
476
+ 10−4.
477
+ With respect to the conceptual scheme in Algorithm 3, we employed within IFSD a strategy to limit the number of points
478
+ used for partial descent searches, in order to improve the efficiency of the overall procedure and avoid the production
479
+ of too many, very close solutions. In particular, we added a condition based on the crowding distance [4] to decide
480
+ whether a point should be considered for further exploration after the steepest descent step or not.
481
+ The benchmark used for the comparisons consists of the following unconstrained problems: CEC09_2, CEC09_3 [17],
482
+ JOS_1 [12], MAN [13] (m = 2) and CEC09_10 (m = 3) [17]. For all the problems, we considered instances with
483
+ values of n in {5, 10, 20, 30, 40, 50, 100, 200}. Moreover, each problem was tested twice, with different strategies for
484
+ the initial points: a) n points are uniformly sampled from the hyper-diagonal of a suitable box; b) only the midpoint of
485
+ the hyper-diagonal is selected. The hyper-diagonal refers to the box constituting the constraints in the bounded version
486
+ of CEC and MAN problems, whereas it is [−100, 100]n for the JOS problem.
487
+ In order to appreciate the relative performance and robustness of the approaches, we employed the performance
488
+ profiles [5]. In brief, this tool shows the probability that a metric value achieved by a method in a problem is within
489
+ a factor τ ∈ R of the best value obtained by any of the algorithms in that problem. We employed classical metrics
490
+ for multi-objective optimization: purity, Γ–spread, ∆–spread [3] and hyper-volume [18]. Purity and hyper-volume
491
+ 7
492
+
493
+ Improved Front Steepest Descent for MOO
494
+ MATTEO LAPUCCI AND PIERLUIGI MANSUETO
495
+ 0.0
496
+ 0.5
497
+ 1.0
498
+ 1.5
499
+ 2.0
500
+ 2.5
501
+ 3.0
502
+ 3.5
503
+ 4.0
504
+ f1
505
+ 0.0
506
+ 0.5
507
+ 1.0
508
+ 1.5
509
+ 2.0
510
+ 2.5
511
+ 3.0
512
+ 3.5
513
+ 4.0
514
+ f2
515
+ (a)
516
+ 0.0
517
+ 0.5
518
+ 1.0
519
+ 1.5
520
+ 2.0
521
+ 2.5
522
+ 3.0
523
+ 3.5
524
+ 4.0
525
+ f1
526
+ 0.0
527
+ 0.5
528
+ 1.0
529
+ 1.5
530
+ 2.0
531
+ 2.5
532
+ 3.0
533
+ 3.5
534
+ 4.0
535
+ f2
536
+ (b)
537
+ 0.0
538
+ 0.5
539
+ 1.0
540
+ 1.5
541
+ 2.0
542
+ 2.5
543
+ 3.0
544
+ 3.5
545
+ 4.0
546
+ f1
547
+ 0.0
548
+ 0.5
549
+ 1.0
550
+ 1.5
551
+ 2.0
552
+ 2.5
553
+ 3.0
554
+ 3.5
555
+ 4.0
556
+ f2
557
+ (c)
558
+ Figure 2: Pareto fronts obtained by the IFSD algorithm on the convex JOS problem (n = 5) starting from different
559
+ initial points: (a) 1 Pareto point as in Figure 1a; (b) 2 Pareto points as in Figure 1b; (c) 3 independent runs from the
560
+ same random points as those of Figure 1(c)-(d).
561
+ have increasing values for better solutions: then, the corresponding profiles are produced considering the inverse of the
562
+ obtained values.
563
+ In Figure 2, the behavior of the proposed approach in the same setting as in Figure 1 is shown. In this example we can
564
+ observe that now, regardless, of the starting point(s), the entire Pareto front is effectively spanned, with not even tiny
565
+ holes.
566
+ For a more consistent assessment of algorithms performance, we report in Figure 3 the performance profiles for the
567
+ IFSD, FSD and EFSD algorithms on the entire benchmark of 80 problem instances.
568
+ We observe a remarkable superiority of the proposed approach w.r.t. the original variants of the algorithm, especially in
569
+ terms of the spread metrics, which points out that the Pareto front is indeed spanned more widely and uniformly. The
570
+ strong hypervolume performance also supports this result. As for purity metric, the three algorithms appear to be closer,
571
+ but we still observe a slight advantage of IFSD.
572
+ 5
573
+ Conclusions
574
+ In this paper, we introduced an improved Front Steepest Descent algorithm with asymptotic convergence guarantees
575
+ similar as those of the original method. The novel algorithm is designed so as to overcome some empirically evident
576
+ limitation of FSD, that is often unable to span large portions of the Pareto front. Numerical evidence suggests that the
577
+ proposed procedure effectively achieves this goal.
578
+ Future work should be focused on the integration of the proposed approach and the extrapolation strategy proposed
579
+ in [2]. Moreover, the employment of the proposed approach within memetic procedures for global multi-objective
580
+ optimization [13] might be considered. Finally, the algorithm defined in this work could be extended to deal with
581
+ constrained optimization problems.
582
+ 8
583
+
584
+ Improved Front Steepest Descent for MOO
585
+ MATTEO LAPUCCI AND PIERLUIGI MANSUETO
586
+ 1
587
+ 2
588
+ 3
589
+ 4
590
+ 5
591
+ 6
592
+ 7
593
+ 8
594
+ 0.0
595
+ 0.2
596
+ 0.4
597
+ 0.6
598
+ 0.8
599
+ 1.0
600
+ Cumulative
601
+ Purity
602
+ IFSD
603
+ FSD
604
+ EFSD
605
+ (a) Purity profile
606
+ 1.00 1.25 1.50 1.75 2.00 2.25 2.50 2.75 3.00
607
+ 0.0
608
+ 0.2
609
+ 0.4
610
+ 0.6
611
+ 0.8
612
+ 1.0
613
+ Cumulative
614
+ Hypervolume
615
+ (b) Hypervolume profile
616
+ 1
617
+ 2
618
+ 3
619
+ 4
620
+ 5
621
+ 6
622
+ 0.0
623
+ 0.2
624
+ 0.4
625
+ 0.6
626
+ 0.8
627
+ 1.0
628
+ Cumulative
629
+ -spread
630
+ (c) Γ-spread profile
631
+ 1.0
632
+ 1.2
633
+ 1.4
634
+ 1.6
635
+ 1.8
636
+ 2.0
637
+ 0.0
638
+ 0.2
639
+ 0.4
640
+ 0.6
641
+ 0.8
642
+ 1.0
643
+ Cumulative
644
+ -spread
645
+ (d) ∆-spread profile
646
+ Figure 3: Performance profiles for the IFSD, FSD and EFSD algorithms on a benchmark of 80 multi-objective problems.
647
+ Conflict of interest
648
+ The authors declare that they have no conflict of interest.
649
+ References
650
+ [1] G. Cocchi, M. Lapucci, and P. Mansueto. Pareto front approximation through a multi-objective augmented
651
+ lagrangian method. EURO Journal on Computational Optimization, page 100008, 2021.
652
+ [2] G. Cocchi, G. Liuzzi, S. Lucidi, and M. Sciandrone. On the convergence of steepest descent methods for
653
+ multiobjective optimization. Computational Optimization and Applications, pages 1–27, 2020.
654
+ [3] A. L. Custódio, J. F. A. Madeira, A. I. F. Vaz, and L. N. Vicente. Direct multisearch for multiobjective optimization.
655
+ SIAM Journal on Optimization, 21(3):1109–1140, 2011.
656
+ [4] K. Deb, A. Pratap, S. Agarwal, and T. Meyarivan. A fast and elitist multiobjective genetic algorithm: NSGA-II.
657
+ IEEE Transactions on Evolutionary Computation, 6(2):182–197, 2002.
658
+ [5] E. D. Dolan and J. J. Moré. Benchmarking optimization software with performance profiles. Mathematical
659
+ Programming, 91(2):201–213, 2002.
660
+ [6] L. G. Drummond, N. Maculan, and B. F. Svaiter. On the choice of parameters for the weighting method in vector
661
+ optimization. Mathematical Programming, 111(1-2):201–216, 2008.
662
+ [7] G. Eichfelder. An adaptive scalarization method in multiobjective optimization. SIAM Journal on Optimization,
663
+ 19(4):1694–1718, 2009.
664
+ [8] G. Eichfelder. Twenty years of continuous multiobjective optimization in the twenty-first century. EURO Journal
665
+ on Computational Optimization, 9:100014, 2021.
666
+ 9
667
+
668
+ Improved Front Steepest Descent for MOO
669
+ MATTEO LAPUCCI AND PIERLUIGI MANSUETO
670
+ [9] J. Fliege, L. G. Drummond, and B. F. Svaiter. Newton’s method for multiobjective optimization. SIAM Journal on
671
+ Optimization, 20(2):602–626, 2009.
672
+ [10] J. Fliege and B. F. Svaiter. Steepest descent methods for multicriteria optimization. Mathematical Methods of
673
+ Operations Research, 51(3):479–494, 2000.
674
+ [11] M. L. N. Gonçalves, F. S. Lima, and L. F. Prudente. Globally convergent newton-type methods for multiobjective
675
+ optimization. Computational Optimization and Applications, 83(2):403–434, Nov 2022.
676
+ [12] Y. Jin, M. Olhofer, and B. Sendhoff. Dynamic weighted aggregation for evolutionary multi-objective optimization:
677
+ Why does it work and how? In Proceedings of the genetic and evolutionary computation conference, pages
678
+ 1042–1049, 2001.
679
+ [13] M. Lapucci, P. Mansueto, and F. Schoen. A memetic procedure for global multi-objective optimization. Mathe-
680
+ matical Programming Computation, 2022.
681
+ [14] G. Liuzzi, S. Lucidi, and F. Rinaldi. A derivative-free approach to constrained multiobjective nonsmooth
682
+ optimization. SIAM Journal on Optimization, 26(4):2744–2774, 2016.
683
+ [15] A. Pascoletti and P. Serafini. Scalarizing vector optimization problems. Journal of Optimization Theory and
684
+ Applications, 42(4):499–524, 1984.
685
+ [16] H. Tanabe, E. H. Fukuda, and N. Yamashita. Proximal gradient methods for multiobjective optimization and their
686
+ applications. Computational Optimization and Applications, 72(2):339–361, Mar 2019.
687
+ [17] Q. Zhang, A. Zhou, S. Zhao, P. Suganthan, W. Liu, and S. Tiwari. Multiobjective optimization test instances for
688
+ the cec 2009 special session and competition. Mechanical Engineering, 01 2008.
689
+ [18] E. Zitzler and L. Thiele. Multiobjective optimization using evolutionary algorithms — a comparative case study.
690
+ In A. E. Eiben, T. Bäck, M. Schoenauer, and H.-P. Schwefel, editors, Parallel Problem Solving from Nature —
691
+ PPSN V, pages 292–301, Berlin, Heidelberg, 1998. Springer Berlin Heidelberg.
692
+ 10
693
+
8dE1T4oBgHgl3EQfngSj/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
8dE4T4oBgHgl3EQfCwtu/content/2301.04863v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:0a48cb595468a4712b1971bb44d162c0289044cd35a7dfcf91a4b391f845f897
3
+ size 325307
8dE4T4oBgHgl3EQfCwtu/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:ba16a8c0aeda513b2671c5a5eb75ac176bed51bd96a19ba5fa1b0d15f8855748
3
+ size 4194349
8dE4T4oBgHgl3EQfCwtu/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:b8e7ad0056c8fb8d236ea7649da30b7b421b2f7cde8b19e340b8788f9d8f14f6
3
+ size 171480
9tE4T4oBgHgl3EQf3g1J/content/tmp_files/2301.05306v1.pdf.txt ADDED
@@ -0,0 +1,2152 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ DRAFT VERSION JANUARY 16, 2023
2
+ Typeset using LATEX twocolumn style in AASTeX63
3
+ A Simultaneous Dual-Frequency Scintillation Arc Survey of Six Bright Canonical Pulsars Using the Upgraded Giant
4
+ Metrewave Radio Telescope
5
+ JACOB E. TURNER,1, 2 BHAL CHANDRA JOSHI,3 MAURA A. MCLAUGHLIN,1, 2 AND DANIEL R. STINEBRING4
6
+ 1Department of Physics and Astronomy, West Virginia University, P.O. Box 6315, Morgantown, WV 26506, USA
7
+ 2Center for Gravitational Waves and Cosmology, West Virginia University, Chestnut Ridge Research Building, Morgantown, WV 26505, USA
8
+ 3National Centre for Radio Astrophysics, Tata Institute of Fundamental Research, Post Bag 3, Ganeshkhind, Pune - 411007, India
9
+ 4Department of Physics and Astronomy, Oberlin College, Oberlin, OH 44074, USA
10
+ ABSTRACT
11
+ We use the Upgraded Giant Metrewave Radio Telescope to measure scintillation arc properties in six bright
12
+ canonical pulsars with simultaneous dual frequency coverage. These observations at frequencies from 300 to
13
+ 750 MHz allowed for detailed analysis of arc evolution across frequency and epoch. We perform more robust
14
+ determinations of arc curvature and scattering delay frequency-dependence than allowed by single-frequency-
15
+ band-per-epoch measurements, which we find to agree with theory and previous literature. We report the dis-
16
+ covery of a strong correlation between arc asymmetry and arc curvature, potentially indicating a link between
17
+ scattering screen distance and refraction strength or the effect of asymmetric distribution of scattering material
18
+ on a scattering screen. The inclusion of a 155 minute observation allowed us to resolve the scale of scintilla-
19
+ tion variations on short timescales, which we find to be directly tied to the amount of ISM sampled over the
20
+ observation. Some of our pulsars showed either consistent or emerging asymmetries in arc curvature, indicating
21
+ instances of refraction across their lines of sight. The presence of significant features in various pulsars, such
22
+ as multiple scintillation arcs in PSR J1136+1551 and flat arclets in PSR J1509+5531, that have been found in
23
+ previous works, were also sufficiently detected. Possible evidence for a timescale over which a given scatter-
24
+ ing screen dominates signal propagation was found by tracking visible scintillation arcs in each epoch in PSR
25
+ J1136+1551. The interesting pulsar science accomplished with this upgraded telescope shows strong promise
26
+ for important future work in pulsar astronomy.
27
+ Keywords: methods: data analysis – stars: pulsars – ISM: general – ISM: structure
28
+ 1. INTRODUCTION
29
+ The scintillation of pulsar emission occurs as the result of
30
+ the propagation of this emission through non-uniform distri-
31
+ butions of free electrons in the ionized interstellar medium
32
+ (IISM). This interaction results in frequency-dependent and
33
+ time-evolving variations in the flux density of the pulsar sig-
34
+ nal as measured at a detector.
35
+ When these variations are
36
+ examined across observing frequency and time in so-called
37
+ dynamic spectra, representations of the change in the pulsar
38
+ signal’s intensity across frequency and time, for a given ob-
39
+ servation, they can provide valuable insight into the structure
40
+ of these electron density variations along our line of sight
41
+ (LOS) to a given pulsar. For observations where the scin-
42
+ tles, bright patches in a dynamic spectrum resulting from
43
+ constructive interference between photons as the result of
44
+ propagation through the free electrons in the ISM, are fully
45
+ resolved in frequency, have sufficient coverage in time, and
46
+ exhibit structures over the course of observations including,
47
+ but not limited to, non-zero slopes across frequency and time,
48
+ known as scintillation drift, as well as “crisscrossing” scin-
49
+ tillation patterns, then additional information can be gained
50
+ about the ISM structure along the LOS by examining the
51
+ parabolic arcs, known as scintillation arcs, that can emerge
52
+ by examining the Fourier transform of the dynamic spec-
53
+ trum (Stinebring et al. 2001). Some current hypotheses on
54
+ the physical origins of these arcs postulate that they originate
55
+ from compressed plasma along the boundaries of 50−100 pc
56
+ size bubbles in the ISM (Stinebring et al. 2022).
57
+ Traditional measurements of scintillation arcs have typ-
58
+ ically been limited to either one observing band over all
59
+ epochs (i.e., Trang & Rickett (2007)), or alternated between
60
+ observing bands from epoch to epoch (i.e., Stinebring et al.
61
+ (2019)). While generally sufficient for most analyses, this
62
+ band limit results in a bottleneck for examining the evo-
63
+ lution of various frequency-dependent effects over shorter
64
+ timescales, including scintillation arc curvature, structures
65
+ within individual arcs, and asymmetries in both arc bright-
66
+ ness and power as a function of differential time delay. By
67
+ making use of the subarray capabilities of the Upgraded Gi-
68
+ ant Metrewave Radio Telescope (uGMRT), we can effec-
69
+ arXiv:2301.05306v1 [astro-ph.HE] 12 Jan 2023
70
+
71
+ 2
72
+ J. E. TURNER ET AL.
73
+ tively create an ultra wideband receiver by setting multiple
74
+ groups of dishes to simultaneously observe at different fre-
75
+ quencies. This work is primarily data-focused and aims to
76
+ highlight the results of some multi-frequency analyses per-
77
+ formed on a small survey of six strong canonical pulsars us-
78
+ ing this approach. In Section 2 we discuss the data taken
79
+ as part of our survey. Section 3 describes the analyses per-
80
+ formed and the physical parameters extracted. Section 4 de-
81
+ tails the results of these analyses. Finally, Section 5 summa-
82
+ rizes our results and discusses possible next steps.
83
+ 2. DATA
84
+ Our data were taken across across eight epochs span-
85
+ ning MJD 58987−59497 using 22 dishes split into subarrays
86
+ for simultaneous multi-frequency observations at uGMRT’s
87
+ Band 3 and Band 4, centered at 400 MHz and 650 MHz,
88
+ respectively, each with 200 MHz of bandwidth. This simul-
89
+ taneous low-frequency accessibility is comparable to instru-
90
+ ments like CHIME that can observe continuously between
91
+ 400-800 MHz and better than instruments such as the Green
92
+ Bank Telescope, which, while having a wide range of low
93
+ frequency coverage, can only observe below one GHz with
94
+ at most 240 MHz of bandwidth at frequencies close to one
95
+ GHz and less than 200 MHz of bandwidth in lower frequency
96
+ ranges. Observations were also made at Band 5 centered
97
+ at 1360 MHz, although due to a combination of RFI and
98
+ low S/N no scintles were detectable in the dynamic spec-
99
+ tra. The observing bands were split into 4096 49 kHz wide
100
+ frequency channels and observed with 10 second subintegra-
101
+ tions. These data were flux calibrated using observations of
102
+ either 3C147 or 3C286 taken at the beginning of every ob-
103
+ serving session and every pulsar was phase calibrated with
104
+ a nearby source for five minutes once every 40 minutes of
105
+ observing time on the pulsar. Two to three pulsars were ob-
106
+ served at each epoch for 40 minutes each, except for MJD
107
+ 59497, where three pulsars were observed for 155 minutes
108
+ each. As a result of the phase calibration, each of those obser-
109
+ vations were comprised of three 40 minute sub-observations
110
+ plus an additional 20 minute sub-observation.
111
+ 3. ANALYSIS
112
+ All observations were processed to extract their dynamic
113
+ spectra by calculating the intensity, S, of the pulsar’s signal
114
+ at each observing frequency, ν, and time, t, via
115
+ S(ν, t) = Pon(ν, t) − Poff(ν, t)
116
+ Pbandpass(ν, t)
117
+ ,
118
+ (1)
119
+ where Pbandpass is the total power of the observation as a
120
+ function of observing frequency and time, and Pon and Poff
121
+ are the power in all on- and off-pulse components, respec-
122
+ tively, as a function of frequency and time. Each dynamic
123
+ spectrum was then broken up into four 50 MHz spectra to
124
+ allow for more in-depth frequency-dependent analyses and
125
+ manually zapped by examining dynamic spectra data arrays
126
+ and removing pixels that were brighter than the brightest
127
+ scintle maxima.
128
+ Secondary spectra were then created by
129
+ taking the absolute square of the Fourier transform (i.e., the
130
+ power spectrum) of the corresponding dynamic spectrum and
131
+ converting it to units of dB. The primary (brightest) scintilla-
132
+ tion arcs on the positive and negative side of each secondary
133
+ spectrum’s fringe frequency axis were then found via sepa-
134
+ rate fν = ηf 2
135
+ t fits, where fν is the differential time delay, η
136
+ is the arc curvature, and ft is the fringe frequency.
137
+ We also determined scintillation parameters by using the
138
+ python package Pypulse (Lam 2017) to create the 2D au-
139
+ tocorrelation functions (ACFs) of each dynamic spectrum
140
+ and fit 2D Gaussians to these ACFs to determine their scin-
141
+ tillation bandwidth, ∆νd, defined as the half-width at half-
142
+ maximum (HWHM) along the frequency axis of the ACF at
143
+ lag 0, scintillation timescale, ∆td, defined as the half-width
144
+ at e−1 along the time axis at ACF lag 0, and scintillation
145
+ drift rate, dν/dt, defined as the rotation of the 2D Gaussian
146
+ fit to the 2D ACF in the plane of the frequency and time lags.
147
+ For our scattering delay scaling index analysis, our measured
148
+ scintillation bandwidths were converted to scattering delays
149
+ using
150
+ 2π∆νdτ = C1,
151
+ (2)
152
+ where C1 is a dimensionless quantity between 0.6 − 1.5 that
153
+ depends on the spectrum of the electron density fluctuations
154
+ and geometry of the medium (Cordes & Rickett 1998). For
155
+ this work we use C1 = 1.
156
+ 4. RESULTS & DISCUSSION
157
+ Measured arc curvatures and their corresponding dynamic
158
+ spectrum scintillation drift rates can be found in Table 1. All
159
+ curvatures and their uncertainties have been scaled to their
160
+ corresponding value at 1 GHz assuming a ν−2 frequency de-
161
+ pendence (Hill et al. 2003). Here errors on the arc curva-
162
+ tures represent fitting errors from the linear least squares fit.
163
+ Some pulsars on MJD 59497 have multiple curvature mea-
164
+ surements at a given frequency, which is the result of this
165
+ epoch being 155 minutes instead of the 40 minutes of the
166
+ other observations. As a result, a new η was measured after
167
+ every 40 minutes since these observations were broken up
168
+ into 40 minute chunks separated by five minute phase cali-
169
+ brations. On days where measurements are given for the left
170
+ or right arm only, arcs on the other side of the fringe fre-
171
+ quency axis may have been present, but were unmeasureable
172
+ due to either having insufficient extension along the differ-
173
+ ential delay axis, insufficient flux relative to the background
174
+ noise, being too diffuse, being too close to central spike in
175
+ flux that commonly occurs around a fringe frequency of 0
176
+ mHz, or some combination of these factors.
177
+
178
+ SIMULTANEOUS DUAL-FREQUENCY SCINTILLATION ARC SURVEY
179
+ 3
180
+ Table 1. Pulsar Scintillation Arc Curvatures and Drift Rates
181
+ Pulsar
182
+ MJD
183
+ Frequency
184
+ ηL
185
+ σηL
186
+ ηR
187
+ σηR
188
+ dν/dt
189
+ σdν/dt
190
+ (MHz)
191
+ (s3)
192
+ (s3)
193
+ (s3)
194
+ (s3)
195
+ (MHz/min)
196
+ (MHz/min)
197
+ J0630–2834
198
+ 58987
199
+ 325
200
+
201
+
202
+ 0.2071
203
+ 0.0069
204
+ –0.0164
205
+ 0.0009
206
+ J0630–2834
207
+ 58987
208
+ 375
209
+
210
+
211
+ 0.2331
212
+ 0.0160
213
+ –0.0676
214
+ 0.0097
215
+ J0630–2834
216
+ 58987
217
+ 425
218
+
219
+
220
+ 0.2932
221
+ 0.0223
222
+ –0.0343
223
+ 0.0027
224
+ J0630–2834
225
+ 58987
226
+ 475
227
+
228
+
229
+ 0.2037
230
+ 0.0207
231
+ –0.0574
232
+ 0.0059
233
+ J0630–2834
234
+ 58987
235
+ 575
236
+
237
+
238
+ 0.1220
239
+ 0.0061
240
+ 0.0076
241
+ 0.0025
242
+ J0630–2834
243
+ 58987
244
+ 625
245
+
246
+
247
+ 0.1233
248
+ 0.0049
249
+ –0.0779
250
+ 0.0097
251
+ J0630–2834
252
+ 58987
253
+ 675
254
+
255
+
256
+ 0.1553
257
+ 0.0058
258
+ 0.0818
259
+ 0.0118
260
+ J0630–2834
261
+ 58987
262
+ 725
263
+
264
+
265
+ 0.2566
266
+ 0.0162
267
+ 0.2685
268
+ 0.0196
269
+ J1136+1551
270
+ 58987
271
+ 325
272
+ 0.0154
273
+ 0.0007
274
+ 0.0238
275
+ 0.0006
276
+
277
+
278
+ J1136+1551
279
+ 58987
280
+ 375
281
+ 0.0198
282
+ 0.0009
283
+ 0.0231
284
+ 0.0005
285
+ 0.0202
286
+ 0.0067
287
+ J1136+1551
288
+ 58987
289
+ 425
290
+ 0.0195
291
+ 0.0010
292
+ 0.0225
293
+ 0.0004
294
+ –0.0287
295
+ 0.0074
296
+ J1136+1551
297
+ 58987
298
+ 575
299
+ 0.0214
300
+ 0.0005
301
+ 0.0218
302
+ 0.0003
303
+ –0.0173
304
+ 0.0067
305
+ J1136+1551
306
+ 58987
307
+ 625
308
+ 0.0202
309
+ 0.0007
310
+ 0.0229
311
+ 0.0002
312
+
313
+
314
+ J1136+1551
315
+ 58987
316
+ 675
317
+ 0.0199
318
+ 0.0005
319
+ 0.0249
320
+ 0.0003
321
+ –0.0322
322
+ 0.0250
323
+ J1136+1551
324
+ 58987
325
+ 725
326
+ 0.0203
327
+ 0.0007
328
+ 0.0282
329
+ 0.0006
330
+ 0.00004
331
+ 0.7446
332
+ J1136+1551
333
+ 58991
334
+ 325
335
+ 0.0126
336
+ 0.0004
337
+ 0.0234
338
+ 0.0005
339
+ 0.0048
340
+ 0.0093
341
+ J1136+1551
342
+ 58991
343
+ 375
344
+ 0.0149
345
+ 0.0007
346
+ 0.0253
347
+ 0.0007
348
+ 0.2686
349
+ 0.0128
350
+ J1136+1551
351
+ 58991
352
+ 425
353
+ 0.0167
354
+ 0.0009
355
+ 0.0250
356
+ 0.0006
357
+
358
+
359
+ J1136+1551
360
+ 58991
361
+ 475
362
+ 0.0183
363
+ 0.0007
364
+ 0.0225
365
+ 0.0005
366
+ –0.0402
367
+ 0.0123
368
+ J1136+1551
369
+ 58991
370
+ 575
371
+ 0.0165
372
+ 0.0005
373
+ 0.0254
374
+ 0.0005
375
+ 0.0097
376
+ 0.0026
377
+ J1136+1551
378
+ 58991
379
+ 625
380
+ 0.0178
381
+ 0.0008
382
+ 0.0271
383
+ 0.0005
384
+ –0.0088
385
+ 0.0034
386
+ J1136+1551
387
+ 58991
388
+ 675
389
+ 0.0173
390
+ 0.0007
391
+ 0.0261
392
+ 0.0004
393
+
394
+
395
+ J1136+1551
396
+ 58991
397
+ 725
398
+ 0.0171
399
+ 0.0007
400
+ 0.0239
401
+ 0.0003
402
+ 0.00003
403
+ 0.4211
404
+ J1136+1551
405
+ 59115
406
+ 325
407
+ 0.0084
408
+ 0.0002
409
+ 0.0099
410
+ 0.0002
411
+ 0.2219
412
+ 0.0095
413
+ J1136+1551
414
+ 59115
415
+ 375
416
+ 0.0085
417
+ 0.0003
418
+ 0.0116
419
+ 0.0003
420
+ 0.1232
421
+ 0.0115
422
+ J1136+1551
423
+ 59115
424
+ 425
425
+ 0.0095
426
+ 0.0005
427
+ 0.0139
428
+ 0.0004
429
+
430
+
431
+ J1136+1551
432
+ 59115
433
+ 475
434
+ 0.0092
435
+ 0.0005
436
+ 0.0129
437
+ 0.0004
438
+ 0.0869
439
+ 0.0079
440
+ J1136+1551
441
+ 59115
442
+ 575
443
+ 0.0095
444
+ 0.0003
445
+ 0.0111
446
+ 0.0002
447
+ 0.0057
448
+ 0.0014
449
+ J1136+1551
450
+ 59115
451
+ 625
452
+ 0.0135
453
+ 0.0007
454
+ 0.0141
455
+ 0.0006
456
+
457
+
458
+ J1136+1551
459
+ 59115
460
+ 675
461
+ 0.0143
462
+ 0.0004
463
+ 0.0154
464
+ 0.0003
465
+ 0.0159
466
+ 0.0057
467
+ J1136+1551
468
+ 59115
469
+ 725
470
+ 0.0130
471
+ 0.0005
472
+ 0.0160
473
+ 0.0005
474
+ 0.0109
475
+ 0.0036
476
+ J1136+1551
477
+ 59497
478
+ 325
479
+ 0.0065
480
+ 0.0002
481
+ 0.0070
482
+ 0.0003
483
+ –0.1251
484
+ 0.0104
485
+ J1136+1551
486
+ 59497
487
+ 375
488
+ 0.0078
489
+ 0.0004
490
+ 0.0077
491
+ 0.0005
492
+ –0.0554
493
+ 0.0069
494
+ J1136+1551
495
+ 59497
496
+ 425
497
+ 0.0079
498
+ 0.0002
499
+ 0.0072
500
+ 0.0002
501
+ –0.0119
502
+ 0.0019
503
+ J1136+1551
504
+ 59497
505
+ 475
506
+ 0.0070
507
+ 0.0003
508
+ 0.0068
509
+ 0.0004
510
+ –0.0293
511
+ 0.0044
512
+ J1136+1551
513
+ 59497
514
+ 325
515
+ 0.0070
516
+ 0.0001
517
+ 0.0067
518
+ 0.0002
519
+ 0.0076
520
+ 0.0030
521
+ J1136+1551
522
+ 59497
523
+ 375
524
+ 0.0077
525
+ 0.0002
526
+ 0.0068
527
+ 0.0002
528
+ 0.2637
529
+ 0.0498
530
+ J1136+1551
531
+ 59497
532
+ 425
533
+ 0.0072
534
+ 0.0002
535
+ 0.0076
536
+ 0.0002
537
+ –0.0544
538
+ 0.0066
539
+ Table 1 continued
540
+
541
+ 4
542
+ J. E. TURNER ET AL.
543
+ Table 1 (continued)
544
+ Pulsar
545
+ MJD
546
+ Frequency
547
+ ηL
548
+ σηL
549
+ ηR
550
+ σηR
551
+ dν/dt
552
+ σdν/dt
553
+ (MHz)
554
+ (s3)
555
+ (s3)
556
+ (s3)
557
+ (s3)
558
+ (MHz/min)
559
+ (MHz/min)
560
+ J1136+1551
561
+ 59497
562
+ 475
563
+ 0.0069
564
+ 0.0001
565
+ 0.0067
566
+ 0.0002
567
+ –0.0302
568
+ 0.0045
569
+ J1136+1551
570
+ 59497
571
+ 325
572
+ 0.0075
573
+ 0.0002
574
+ 0.0075
575
+ 0.0002
576
+ –0.0651
577
+ 0.0058
578
+ J1136+1551
579
+ 59497
580
+ 375
581
+ 0.0076
582
+ 0.0002
583
+ 0.0076
584
+ 0.0003
585
+ –0.0877
586
+ 0.0175
587
+ J1136+1551
588
+ 59497
589
+ 425
590
+ 0.0082
591
+ 0.0002
592
+ 0.0075
593
+ 0.0002
594
+ –0.0656
595
+ 0.0064
596
+ J1136+1551
597
+ 59497
598
+ 475
599
+ 0.0067
600
+ 0.0002
601
+ 0.0074
602
+ 0.0003
603
+ –0.0417
604
+ 0.0053
605
+ J1136+1551
606
+ 59497
607
+ 575
608
+ 0.0063
609
+ 0.0004
610
+ 0.0079
611
+ 0.0013
612
+ –0.0977
613
+ 0.0507
614
+ J1136+1551
615
+ 59497
616
+ 675
617
+ 0.0059
618
+ 0.0004
619
+ 0.0075
620
+ 0.0007
621
+
622
+
623
+ J1136+1551
624
+ 59497
625
+ 725
626
+ 0.0057
627
+ 0.0005
628
+ 0.0068
629
+ 0.0008
630
+
631
+
632
+ J1509+5531
633
+ 58987
634
+ 575
635
+ 0.3155
636
+ 0.0191
637
+ 0.1798
638
+ 0.0063
639
+
640
+
641
+ J1509+5531
642
+ 58987
643
+ 625
644
+ 0.3642
645
+ 0.0184
646
+ 0.2021
647
+ 0.0060
648
+ –0.0284
649
+ 0.0224
650
+ J1509+5531
651
+ 58987
652
+ 675
653
+ 0.3410
654
+ 0.0207
655
+ 0.1978
656
+ 0.0078
657
+ –1.5130
658
+ 0.0117
659
+ J1509+5531
660
+ 59064
661
+ 575
662
+ 0.2611
663
+ 0.0147
664
+ 0.2495
665
+ 0.0116
666
+ 0.0015
667
+ 0.0030
668
+ J1509+5531
669
+ 59064
670
+ 625
671
+ 0.2890
672
+ 0.0170
673
+ 0.2767
674
+ 0.0118
675
+
676
+
677
+ J1509+5531
678
+ 59064
679
+ 675
680
+ 0.2736
681
+ 0.0181
682
+ 0.2714
683
+ 0.0128
684
+ 0.0039
685
+ 0.0016
686
+ J1509+5531
687
+ 59064
688
+ 725
689
+ 0.2921
690
+ 0.0186
691
+ 0.2930
692
+ 0.0142
693
+ 0.1192
694
+ 0.0728
695
+ J1509+5531
696
+ 59115
697
+ 575
698
+ 0.0852
699
+ 0.0029
700
+ 0.0928
701
+ 0.0037
702
+
703
+
704
+ J1509+5531
705
+ 59115
706
+ 625
707
+ 0.0868
708
+ 0.0029
709
+ 0.0964
710
+ 0.0044
711
+ 0.0173
712
+ 0.0066
713
+ J1509+5531
714
+ 59115
715
+ 675
716
+ 0.0958
717
+ 0.0031
718
+ 0.0908
719
+ 0.0044
720
+ –0.0970
721
+ 0.0628
722
+ J1509+5531
723
+ 59115
724
+ 725
725
+ 0.1074
726
+ 0.0026
727
+ 0.0872
728
+ 0.0030
729
+
730
+
731
+ J1509+5531
732
+ 59497
733
+ 575
734
+ 0.0992
735
+ 0.0034
736
+ 0.1139
737
+ 0.0045
738
+ –0.9922
739
+ 0.0226
740
+ J1509+5531
741
+ 59497
742
+ 625
743
+ 0.1057
744
+ 0.0032
745
+ 0.1257
746
+ 0.0043
747
+ 0.0186
748
+ 0.0140
749
+ J1509+5531
750
+ 59497
751
+ 675
752
+ 0.1088
753
+ 0.0033
754
+ 0.1160
755
+ 0.0035
756
+
757
+
758
+ J1509+5531
759
+ 59497
760
+ 725
761
+ 0.0973
762
+ 0.0026
763
+ 0.1337
764
+ 0.0036
765
+ 0.0517
766
+ 0.0395
767
+ J1509+5531
768
+ 59497
769
+ 575
770
+ 0.0706
771
+ 0.0028
772
+ 0.1054
773
+ 0.0047
774
+
775
+
776
+ J1509+5531
777
+ 59497
778
+ 625
779
+ 0.0741
780
+ 0.0026
781
+ 0.1101
782
+ 0.0046
783
+ 0.0059
784
+ 0.0047
785
+ J1509+5531
786
+ 59497
787
+ 675
788
+ 0.0782
789
+ 0.0022
790
+ 0.1200
791
+ 0.0047
792
+ 0.0109
793
+ 0.0086
794
+ J1509+5531
795
+ 59497
796
+ 725
797
+ 0.0808
798
+ 0.0021
799
+ 0.1265
800
+ 0.0040
801
+
802
+
803
+ J1509+5531
804
+ 59497
805
+ 675
806
+ 0.0606
807
+ 0.0020
808
+ 0.1194
809
+ 0.0042
810
+
811
+
812
+ J1645–0317
813
+ 59074
814
+ 575
815
+ 0.0832
816
+ 0.0051
817
+
818
+
819
+ 0.2015
820
+ 0.0091
821
+ J1645–0317
822
+ 59074
823
+ 625
824
+ 0.0885
825
+ 0.0059
826
+
827
+
828
+ –0.1688
829
+ 0.0098
830
+ J1645–0317
831
+ 59074
832
+ 675
833
+ 0.0806
834
+ 0.0063
835
+
836
+
837
+ –0.1812
838
+ 0.0091
839
+ J1645–0317
840
+ 59074
841
+ 725
842
+ 0.0832
843
+ 0.0061
844
+
845
+
846
+ –0.2235
847
+ 0.0105
848
+ J1932+1059
849
+ 58997
850
+ 325
851
+ 0.0382
852
+ 0.0030
853
+ 0.0331
854
+ 0.0018
855
+ –0.1092
856
+ 0.0227
857
+ J1932+1059
858
+ 58997
859
+ 375
860
+ 0.0358
861
+ 0.0016
862
+ 0.0364
863
+ 0.0020
864
+
865
+
866
+ J1932+1059
867
+ 58997
868
+ 425
869
+ 0.0346
870
+ 0.0006
871
+ 0.0335
872
+ 0.0007
873
+ –0.0224
874
+ 0.0086
875
+ J1932+1059
876
+ 58997
877
+ 475
878
+ 0.0365
879
+ 0.0007
880
+ 0.0335
881
+ 0.0005
882
+ 0.1987
883
+ 0.0427
884
+ J1932+1059
885
+ 58997
886
+ 575
887
+ 0.0351
888
+ 0.0005
889
+ 0.0360
890
+ 0.0004
891
+ 0.0181
892
+ 0.0093
893
+ J1932+1059
894
+ 58997
895
+ 625
896
+ 0.0366
897
+ 0.0005
898
+ 0.0335
899
+ 0.0004
900
+ 0.0614
901
+ 0.0352
902
+ J1932+1059
903
+ 58997
904
+ 675
905
+ 0.0359
906
+ 0.0010
907
+ 0.0358
908
+ 0.0010
909
+ –0.0062
910
+ 0.0016
911
+ J1932+1059
912
+ 58997
913
+ 725
914
+ 0.0373
915
+ 0.0007
916
+ 0.0348
917
+ 0.0012
918
+ –0.0074
919
+ 0.0022
920
+ Table 1 continued
921
+
922
+ SIMULTANEOUS DUAL-FREQUENCY SCINTILLATION ARC SURVEY
923
+ 5
924
+ Table 1 (continued)
925
+ Pulsar
926
+ MJD
927
+ Frequency
928
+ ηL
929
+ σηL
930
+ ηR
931
+ σηR
932
+ dν/dt
933
+ σdν/dt
934
+ (MHz)
935
+ (s3)
936
+ (s3)
937
+ (s3)
938
+ (s3)
939
+ (MHz/min)
940
+ (MHz/min)
941
+ J1932+1059
942
+ 59062
943
+ 325
944
+ 0.0330
945
+ 0.0006
946
+ 0.0271
947
+ 0.0004
948
+ 0.0669
949
+ 0.0111
950
+ J1932+1059
951
+ 59062
952
+ 375
953
+ 0.0352
954
+ 0.0007
955
+ 0.0285
956
+ 0.0008
957
+ 0.1331
958
+ 0.0219
959
+ J1932+1059
960
+ 59062
961
+ 425
962
+ 0.0347
963
+ 0.0005
964
+ 0.0293
965
+ 0.0004
966
+ –0.0326
967
+ 0.0256
968
+ J1932+1059
969
+ 59062
970
+ 475
971
+ 0.0345
972
+ 0.0007
973
+ 0.0278
974
+ 0.0006
975
+ –0.1200
976
+ 0.0297
977
+ J1932+1059
978
+ 59062
979
+ 575
980
+ 0.0337
981
+ 0.0007
982
+ 0.0303
983
+ 0.0004
984
+
985
+
986
+ J1932+1059
987
+ 59062
988
+ 625
989
+ 0.0332
990
+ 0.0004
991
+ 0.0323
992
+ 0.0004
993
+ –0.0221
994
+ 0.0095
995
+ J1932+1059
996
+ 59062
997
+ 675
998
+ 0.0350
999
+ 0.0006
1000
+ 0.0356
1001
+ 0.0006
1002
+ –0.0221
1003
+ 0.0095
1004
+ J1932+1059
1005
+ 59062
1006
+ 725
1007
+ 0.0297
1008
+ 0.0005
1009
+ 0.0304
1010
+ 0.0006
1011
+ –0.0192
1012
+ 0.0152
1013
+ J1932+1059
1014
+ 59497
1015
+ 325
1016
+ 0.0365
1017
+ 0.0008
1018
+ 0.0279
1019
+ 0.0009
1020
+ –0.8215
1021
+ 0.0090
1022
+ J1932+1059
1023
+ 59497
1024
+ 375
1025
+ 0.0351
1026
+ 0.0007
1027
+ 0.0294
1028
+ 0.0004
1029
+ 0.1062
1030
+ 0.0302
1031
+ J1932+1059
1032
+ 59497
1033
+ 425
1034
+ 0.0399
1035
+ 0.0004
1036
+ 0.0320
1037
+ 0.0005
1038
+ 0.1479
1039
+ 0.0287
1040
+ J1932+1059
1041
+ 59497
1042
+ 475
1043
+ 0.0389
1044
+ 0.0007
1045
+ 0.0341
1046
+ 0.0008
1047
+ 0.2495
1048
+ 0.3407
1049
+ J1932+1059
1050
+ 59497
1051
+ 575
1052
+ 0.0405
1053
+ 0.0016
1054
+ 0.0363
1055
+ 0.0012
1056
+
1057
+
1058
+ J1932+1059
1059
+ 59497
1060
+ 625
1061
+ 0.0393
1062
+ 0.0014
1063
+ 0.0358
1064
+ 0.0013
1065
+ –0.0815
1066
+ 0.0392
1067
+ J1932+1059
1068
+ 59497
1069
+ 675
1070
+ 0.0433
1071
+ 0.0017
1072
+ 0.0385
1073
+ 0.0012
1074
+ –0.0222
1075
+ 0.0103
1076
+ J1932+1059
1077
+ 59497
1078
+ 725
1079
+ 0.0461
1080
+ 0.0022
1081
+ 0.0416
1082
+ 0.0013
1083
+
1084
+
1085
+ J2048–1616
1086
+ 59062
1087
+ 325
1088
+ 0.0221
1089
+ 0.0006
1090
+ 0.0108
1091
+ 0.0009
1092
+ –0.4158
1093
+ 0.0081
1094
+ J2048–1616
1095
+ 59062
1096
+ 375
1097
+ 0.0198
1098
+ 0.0007
1099
+ 0.0113
1100
+ 0.0023
1101
+ –0.0211
1102
+ 0.0077
1103
+ J2048–1616
1104
+ 59062
1105
+ 425
1106
+ 0.0247
1107
+ 0.0020
1108
+ 0.0108
1109
+ 0.0012
1110
+ –0.1529
1111
+ 0.0139
1112
+ J2048–1616
1113
+ 59062
1114
+ 625
1115
+ 0.0152
1116
+ 0.0004
1117
+ 0.0132
1118
+ 0.0005
1119
+ –0.0058
1120
+ 0.0012
1121
+ J2048–1616
1122
+ 59062
1123
+ 675
1124
+ 0.0152
1125
+ 0.0004
1126
+ 0.0138
1127
+ 0.0005
1128
+ 0.0208
1129
+ 0.0090
1130
+ J2048–1616
1131
+ 59062
1132
+ 725
1133
+ 0.0148
1134
+ 0.0004
1135
+ 0.0135
1136
+ 0.0005
1137
+ 0.00005
1138
+ 0.0001
1139
+ NOTE—Scintillation arc measurements and drift rates in the left and right primary arms of each epoch at all
1140
+ frequencies where measurable. ηL and ηR are the the arc curvature measurements for the left and right arms,
1141
+ respectively, and dν/dt is the measured scintillation drift rate, with the matching σ’s representing the corre-
1142
+ sponding uncertainties. All curvatures and their errors have been scaled to 1 GHz and errors on curvature here
1143
+ are fit uncertainties. Some pulsars on MJD 59497 have multiple curvature measurements at a given frequency,
1144
+ due to this epoch being 155 minutes instead of the 40 minutes of the other observations, and so a new η was
1145
+ measured after every 40 minutes.
1146
+ 4.1. Scintillation Arc Curvature Scaling Behavior
1147
+ As mentioned earlier, Hill et al. (2003) demonstrated
1148
+ through both theoretical and observational means that the
1149
+ arc curvature η should follow a ν−2 dependence, implying
1150
+ that scattering is dominated by one or several thin screens
1151
+ along the LOS. While over 2 GHz of bandwidth was used in
1152
+ those observations (10-12.5 MHz of bandwidth centered at
1153
+ 430 MHz and either 50 or 100 MHz of bandwidth centered at
1154
+ 1175 MHz, 1400 MHz, and 2250 MHz), the frequency cov-
1155
+ erage was discontinuous and all η measurements used in their
1156
+ corresponding fits were from different epochs. Generally the
1157
+ latter point should not be an issue as long as the observations
1158
+ were taken within a period shorter than the pulsar’s refrac-
1159
+ tive timescale. Indeed, for the data used in their fits, their
1160
+ measured arc curvatures at a given frequency did not vary
1161
+ significantly on day or week timescales, making them suit-
1162
+ able for this type of analysis. However, the ideal situation
1163
+ would be to obtain many measurements at many frequencies
1164
+ during the same observation, preferably at the same time for
1165
+ optimal consistency. With our high resolution and sufficient
1166
+ observing time, we have the ability to make up to eight con-
1167
+ current arc measurements over 450 MHz of bandwidth at low
1168
+ frequency and can consequentially provide a more definitive
1169
+ examination of the theory.
1170
+ Following the methodology of Hill et al. (2003), for a scal-
1171
+ ing index α, we performed a weighted linear least-squares fit
1172
+ of the form
1173
+ log10 η = α log10 ν + β
1174
+ (3)
1175
+ on the unscaled curvatures for each pulsar at each MJD. Ex-
1176
+ ample fits can be seen in Figure 1, with all measured in-
1177
+
1178
+ 6
1179
+ J. E. TURNER ET AL.
1180
+ dices listed in Table 2. We find that, overall, our scaling
1181
+ indices are consistent with a theoretical index of −2, which
1182
+ assumes thin screen scattering (Stinebring et al. 2001), with
1183
+ PSRs J1136+1551 and J1932+1059 being especially consis-
1184
+ tent. This effect can also be seen in Table 1, where arc cur-
1185
+ vatures at all frequencies from a given pulsar at the same
1186
+ MJD are generally in strong agreement after being scaled to
1187
+ 1 GHz. Interestingly, a weighted average of all curvature
1188
+ fits shows that our left arm fits are overall more consistent
1189
+ with an index of −2 than our right arms, with a weighted av-
1190
+ erage of −1.99±0.03 across all left arm fits compared with
1191
+ −1.69±0.02 across all right arm fits, indicating that refrac-
1192
+ tion may play a role in how closely arc curvature scales as
1193
+ expected with frequency.
1194
+ 4.2. Scattering Delay Scaling Behavior
1195
+ Our wide frequency coverage also allowed us to examine
1196
+ the scaling index of scattering delays. Under the assumption
1197
+ that ISM fluctuations follow behaviors consistent with a Kol-
1198
+ mogorov medium and that scattering can be modeled as the
1199
+ result of interactions of pulsar emission with an infinite, thin,
1200
+ scattering screen during its propagation, we should expect
1201
+ that scattering delays scale with frequency as τd ∝ ν−4.4
1202
+ (Romani et al. 1986; Cordes & Rickett 1998).
1203
+ Previous
1204
+ studies examining the scattering indices of various pulsars
1205
+ have done so using a number of methods, including simul-
1206
+ taneous multi-frequency measurements (Bhat et al. 2004;
1207
+ Bansal et al. 2019), splitting up measurements from a single
1208
+ frequency band into multiple subbands (Levin et al. 2016;
1209
+ Turner et al. 2021), and using measurements from many
1210
+ epochs taken at two observing bands non-simultaneously
1211
+ (Turner et al. 2021). Since more measurements and more fre-
1212
+ quency coverage in a single epoch is ideal, the method used
1213
+ in Bhat et al. (2004) and Bansal et al. (2019) is the most pre-
1214
+ ferred of the three. The method in this paper utilizes a com-
1215
+ bination of this approach and the subband approach to max-
1216
+ imize the number of delay measurements per epoch, which
1217
+ can be done thanks to our high frequency resolution and sen-
1218
+ sitivity in both observing bands.
1219
+ Similar to Equation 3 used to determine the arc curva-
1220
+ ture scaling index, our scattering delay scaling indices ξ at
1221
+ each epoch were determined by performing a weighted lin-
1222
+ ear least-squares fit of the form
1223
+ log10 τd = ξ log10 ν + b.
1224
+ (4)
1225
+ Example fits can be seen in Figure 2, with all measured in-
1226
+ dices listed in Table 3. We find that half of our measured
1227
+ indices are consistent with a Kolmogorov medium, while the
1228
+ other half are consistent with a shallower medium. This be-
1229
+ havior agrees well with previous studies, as both Bhat et al.
1230
+ (2004) and Bansal et al. (2019) found indices either consis-
1231
+ tent with a Kolmogorov medium or shallower than a Kol-
1232
+ mogorov medium, while Levin et al. (2016) and Turner et al.
1233
+ (2021) only found indices that were shallower than a Kol-
1234
+ mogorov medium.
1235
+ Many explanations have been given for why shallower-
1236
+ than-Kolmogorov medium behavior has been observed so
1237
+ frequently. Physical arguments have called into question the
1238
+ validity of the simple infinite, thin screen model, demonstrat-
1239
+ ing that shallower scaling indices are more consistent with
1240
+ finite, thin screens (Rickett et al. 2009). This is expected to
1241
+ be much more common among low DM pulsars (Cordes &
1242
+ Lazio 2001), which agrees with our results, as all of the pul-
1243
+ sars have dispersion measures below 40 pc cm−3. Shallower
1244
+ indices have also been attributed to the existence of multi-
1245
+ ple finite screens along the LOS (Lewandowski et al. 2013).
1246
+ This hypothesis agrees well with our measured indices for
1247
+ PSR B1133+16, as its indices are consistently shallower than
1248
+ that of a Kolmogorov medium and it is also known to have at
1249
+ least six distinct scattering screens (McKee et al. 2022).
1250
+ Quality-of-data arguments have also been proposed.
1251
+ Turner et al. (2021) suggested their shallower indices may
1252
+ be at least partially attributable to an imbalance of lower fre-
1253
+ quency data to higher frequency data for their multiple epoch
1254
+ approach as well as a lack of sufficient frequency resolution
1255
+ in their lower frequency band in some epochs. However, nei-
1256
+ ther of these issues should affect our results, as our observa-
1257
+ tions have a consistently even balance of low and high fre-
1258
+ quency measurements at all epochs and all of our measure-
1259
+ ments are well-resolved in frequency.
1260
+ 4.3. 155 Minute Observation
1261
+ The inclusion of a 155 minute observation in our survey
1262
+ on MJD 59497 allowed for an analysis of short-term arc cur-
1263
+ vature variation in some pulsars, as observations had to be
1264
+ paused every 40 minutes for a five minute phase calibration,
1265
+ resulting in multiple 40 minute sub-observations. For pulsars
1266
+ with at least two measurements in a given scintillation arc at a
1267
+ given frequency, we examined overall variation in that arc at
1268
+ that frequency by looking at the percent difference between a
1269
+ given curvature measurement and the weighted average cur-
1270
+ vature for that arm and frequency over the entire epoch.
1271
+ For PSR J1136+1551, all observing frequencies centered
1272
+ at or below 475 MHz had three measurements in each pri-
1273
+ mary arm (the brightest arm, overwhelmingly often the arm
1274
+ with the lowest curvature) at each frequency, with the accu-
1275
+ mulation of all percent differences yielding a bimodal distri-
1276
+ bution with peaks around percent differences of 2% and 7%.
1277
+ The largest percent difference away from a weighted mean
1278
+ was 7.9±0.2% and the smallest was 0.14±1.91%, although
1279
+ the majority of all percent differences was below 3%. All of
1280
+ this strongly indicates the ISM underwent very little change
1281
+ along the LOS to this pulsar over the course of a given ob-
1282
+ servation. This result is supported by this pulsar’s incredibly
1283
+ low dispersion measure, meaning it does not sample a size-
1284
+
1285
+ SIMULTANEOUS DUAL-FREQUENCY SCINTILLATION ARC SURVEY
1286
+ 7
1287
+ (a) α fit for PSR J1932+1059 on MJD 58997
1288
+ (b) α fit for PSR J1136+1551 on MJD 58997. The inclusion of multiple points at
1289
+ certain frequencies is the result of this epoch containing a 155 minute
1290
+ observation instead of the 40 minutes of the other observations, and so a new η
1291
+ was measured after every 40 minutes.
1292
+ Figure 1. Example fits for the arc curvature scaling index
1293
+ Table 2. Fitted Pulsar Scintillation Arc Curvature Scaling Indices
1294
+ Pulsar
1295
+ MJD
1296
+ Scaling Index Left Arc
1297
+ Scaling Index Error Left Arc
1298
+
1299
+ Scaling Index Right Arc
1300
+ Scaling Index Error Right Arc
1301
+
1302
+ J0630–2834
1303
+ 58987
1304
+
1305
+
1306
+
1307
+ –2.48
1308
+ 0.31
1309
+ 8
1310
+ J1136+1551
1311
+ 58987
1312
+ –1.79
1313
+ 0.11
1314
+ 7
1315
+ –1.89
1316
+ 0.12
1317
+ 7
1318
+ J1136+1551
1319
+ 58991
1320
+ –1.65
1321
+ 0.12
1322
+ 8
1323
+ –1.94
1324
+ 0.08
1325
+ 8
1326
+ J1136+1551
1327
+ 59115
1328
+ –1.36
1329
+ 0.13
1330
+ 8
1331
+ –1.52
1332
+ 0.15
1333
+ 8
1334
+ J1136+1551
1335
+ 59497
1336
+ –2.12
1337
+ 0.12
1338
+ 15
1339
+ –1.99
1340
+ 0.10
1341
+ 15
1342
+ J1509+5531
1343
+ 58987
1344
+ –1.49
1345
+ 0.83
1346
+ 3
1347
+ –1.34
1348
+ 0.55
1349
+ 3
1350
+ J1509+5531
1351
+ 59064
1352
+ –1.62
1353
+ 0.26
1354
+ 4
1355
+ –1.41
1356
+ 0.22
1357
+ 4
1358
+ J1509+5531
1359
+ 59115
1360
+ –0.93
1361
+ 0.21
1362
+ 4
1363
+ –2.31
1364
+ 0.18
1365
+ 4
1366
+ J1509+5531
1367
+ 59497
1368
+ –2.01
1369
+ 0.87
1370
+ 9
1371
+ –1.34
1372
+ 0.21
1373
+ 9
1374
+ J1645–0317
1375
+ 59074
1376
+ –2.09
1377
+ 0.26
1378
+ 4
1379
+
1380
+
1381
+
1382
+ J1932+1059
1383
+ 58997
1384
+ –1.93
1385
+ 0.05
1386
+ 8
1387
+ –1.93
1388
+ 0.09
1389
+ 8
1390
+ J1932+1059
1391
+ 59062
1392
+ –2.08
1393
+ 0.07
1394
+ 8
1395
+ –1.75
1396
+ 0.07
1397
+ 8
1398
+ J1932+1059
1399
+ 59497
1400
+ –1.77
1401
+ 0.09
1402
+ 8
1403
+ –1.53
1404
+ 0.04
1405
+ 8
1406
+ J2048–1616
1407
+ 59062
1408
+ –2.52
1409
+ 0.07
1410
+ 6
1411
+ –1.68
1412
+ 0.05
1413
+ 6
1414
+ NOTE—Fitted arc curvature scaling indices for both left and right primary arcs. Nη indicates the number of arc curvature measurements used
1415
+ in each fit. Measurements on MJD 59497 may have Nη > 8 due to this epoch being 155 minutes rather than the 40 minutes of the other
1416
+ observations, and so a new η was measured after every 40 minutes. Arc curvature measurements used in these fits were left unscaled.
1417
+ able portion of the ISM along its LOS relative to many pul-
1418
+ sars that are observed (Bilous et al. 2016; Manchester et al.
1419
+ 2005; Pilkington et al. 1968).
1420
+ For PSR J1509+5531, all observing frequencies centered
1421
+ at or above 575 MHz had at least two measurements in each
1422
+ arm at each frequency, with the accumulation of all per-
1423
+ cent differences resulting in a one-sided distribution peaked
1424
+
1425
+ J1932+1059MJD 5899T
1426
+ 4 × 10-1
1427
+ nL; Scaling Index= -1.93 ± 0.05
1428
+ nR; Scaling Index = -1.93 ± 0.09
1429
+ 3 × 10-1.
1430
+ 2 × 10-1
1431
+ n
1432
+ 10-1
1433
+ 6 × 10-2
1434
+ 400
1435
+ 500
1436
+ 600
1437
+ 700
1438
+ Frequency [MHz]J1136+1551MJD 5949T
1439
+ nL; Scaling Index= -2.12 ± 0.12
1440
+ 6 × 10-2
1441
+ nr; Scaling Index = -1.99 ± 0.10
1442
+ 4 × 10-2
1443
+ 3 × 10-2
1444
+ n
1445
+ 2 × 10-2
1446
+ 10-1
1447
+ 400
1448
+ 500
1449
+ 600
1450
+ 700
1451
+ Frequency [MHz]8
1452
+ J. E. TURNER ET AL.
1453
+ (a) Scattering delay scaling index fit for PSR J1932+1059 on MJD 59497
1454
+ (b) Scattering delay scaling index fit for PSR J1136+1551 on MJD 58991.
1455
+ Figure 2. Example fits for the scattering delay scaling index
1456
+ Table 3. Fitted Pulsar Scattering Delay Scaling Indices
1457
+ Pulsar
1458
+ MJD
1459
+ Scaling Index
1460
+ Index Error
1461
+ Nτd
1462
+ J0630–2834
1463
+ 58987
1464
+ –4.19
1465
+ 1.43
1466
+ 8
1467
+ J1136+1551
1468
+ 58987
1469
+ –1.44
1470
+ 0.71
1471
+ 6
1472
+ J1136+1551
1473
+ 58991
1474
+ –3.78
1475
+ 0.62
1476
+ 7
1477
+ J1136+1551
1478
+ 59115
1479
+ –2.72
1480
+ 1.05
1481
+ 6
1482
+ J1136+1551
1483
+ 59497
1484
+ –1.71
1485
+ 0.57
1486
+ 13
1487
+ J1645–0317
1488
+ 59074
1489
+ –4.60
1490
+ 0.75
1491
+ 4
1492
+ J1932+1059
1493
+ 58997
1494
+ –1.83
1495
+ 0.31
1496
+ 7
1497
+ J1932+1059
1498
+ 59062
1499
+ –1.74
1500
+ 0.31
1501
+ 6
1502
+ J1932+1059
1503
+ 59497
1504
+ –4.14
1505
+ 0.39
1506
+ 6
1507
+ J2048–1616
1508
+ 59062
1509
+ –3.77
1510
+ 1.39
1511
+ 6
1512
+ NOTE—Fitted scattering delay scaling indices, with a minimum
1513
+ of four delay measurements (Nτd) required in a given epoch to
1514
+ obtain a scaling index. Errors are the parameter uncertainties
1515
+ from parameter fits. Half of our measured indices were con-
1516
+ sistent with a Kolmogorov medium, while the other half were
1517
+ consistent with a shallower medium. Measurements on MJD
1518
+ 59497 may have Nτd > 8 due to this epoch being 155 minutes
1519
+ rather than the 40 minutes of the other observations, and so a
1520
+ new �� was measured after every 40 minutes.
1521
+ around 6%.
1522
+ The smallest percent difference away from
1523
+ a weighted mean was 1.2±2.1%, while the largest was
1524
+ 36±0.1%, although the next largest after that was only
1525
+ 22±0.1%, meaning this maximum was an extreme outlier.
1526
+ The majority of all percent differences was below 7%. As
1527
+ with the previous pulsar, this also strongly indicates the ISM
1528
+ underwent very little change along the LOS to this pul-
1529
+ sar over the course of a given observation, a result again
1530
+ supported by this pulsar’s fairly low dispersion measure
1531
+ (Huguenin et al. 1968; Manchester et al. 2005). The fact that
1532
+ this pulsar shows higher variation of this observation com-
1533
+ pared to PSR J1136+1551 is likely due to PSR J1509+5531
1534
+ having a dispersion measure four times higher and a trans-
1535
+ verse velocity 45% larger (Bilous et al. 2016; Huguenin et al.
1536
+ 1968; Manchester et al. 2005; Pilkington et al. 1968; Stovall
1537
+ et al. 2015), so a significantly larger fraction of the ISM was
1538
+ sampled during its observation, increasing the likelihood of
1539
+ larger scintillation-based variations.
1540
+ The next few subsections will be dedicated to highlighting
1541
+ the features of a few pulsars in the survey.
1542
+ 4.4. J0630-2834
1543
+ In the one epoch for which we were able to resolve a scin-
1544
+ tillation arc, only the right arm was resolvable across all fre-
1545
+ quencies, with its relative brightness relative to the left side
1546
+ of the fringe frequency axis consistently decreasing as fre-
1547
+ quency increased. An example of this asymmetry can be seen
1548
+ in Figure 3.This strong asymmetry is known to be the result
1549
+ of refraction leading to scintillation drifting in the dynamic
1550
+ spectra (Cordes et al. 2006). Interestingly, despite our asym-
1551
+ metry appearing to decrease with frequency, the magnitude
1552
+ of our measured scintillation drift rates seem to mildly favor
1553
+ an increase with frequency, whereas one would expect an in-
1554
+ crease in scintillation drift to coincide with an increase in the
1555
+ asymmetry.
1556
+ 4.5. J1136+1551
1557
+
1558
+ J1932+1059 MJD 59497
1559
+ Scaling Index= -4.14 ± 0.39
1560
+ 102
1561
+ (ns)
1562
+ 101
1563
+ 400
1564
+ 500
1565
+ 600
1566
+ 700
1567
+ Frequency [MHz]J1136+1551MJD 58991
1568
+ Scaling Index= -3.78 ± 0.62
1569
+ 102
1570
+ (ns)
1571
+ 101
1572
+ 400
1573
+ 500
1574
+ 600
1575
+ 700
1576
+ Frequency [MHz]SIMULTANEOUS DUAL-FREQUENCY SCINTILLATION ARC SURVEY
1577
+ 9
1578
+ Figure 3. An example dynamic (top) and secondary (bottom) spec-
1579
+ trum from PSR J0630-2834 on MJD 58987 centered at 425 MHz.
1580
+ There is a clear asymmetry in the secondary spectrum, with the right
1581
+ arm being the dominant feature. This is likely the result of refraction
1582
+ along the line of sight. The green line represents the arc curvature
1583
+ fit and the arc curvature measurement quoted is unscaled. Scaled
1584
+ uncertainties of the arc curvature can be found in Table 1.
1585
+ This pulsar is well known for having the uncommon fea-
1586
+ ture of multiple scintillation arcs, implying multiple scatter-
1587
+ ing screens along its LOS (Hill et al. 2003; Stinebring et al.
1588
+ 2019). In the literature six distinct sets of arcs have been
1589
+ found over a ∼34 year span of observations (McKee et al.
1590
+ 2022). In three of the four epochs in we which observed
1591
+ this pulsar, we observed multiple arcs, an example of which
1592
+ can be seen in Figure 4. After scaling our measurements
1593
+ to 1400 MHz and using the convention from McKee et al.
1594
+ (2022), we can conclude that we detected arcs E, C, and B
1595
+ on MJDs 58987 and 58991 and arcs D and C on MJD 59115,
1596
+ with arc C being the only detectable arc on MJD 59497. All
1597
+ multiple-arc detections were made only in the observations
1598
+ using uGMRT’s band 4, which was centered at 650 MHz.
1599
+ The fact that the two epochs closest to each other in our sur-
1600
+ vey (58987 and 58991) both detected the same sets of arcs
1601
+ may hint at a timescale over which certain screens have a
1602
+ larger influence over the pulsar signal propagation.
1603
+ An examination of the power in each of the arms show
1604
+ notable levels of asymmetry along the delay axis, and conse-
1605
+ quently a notable amount of refraction, in all detectable arms
1606
+ and across all frequencies in the first two epochs, with the
1607
+ right arm having more power and extending further out on the
1608
+ delay axis. This asymmetry clearly decreases over the course
1609
+ of our observations across all frequencies until our final ob-
1610
+ servation, where the arcs have approximately even levels of
1611
+ power or the left arc starts to dominate in the asymmetry.
1612
+ This trend is generally supported by the measured scintilla-
1613
+ tion drift rates as well, especially for data taken at band 4
1614
+ (650 MHz), i.e., the same band where the multiple arcs were
1615
+ visible, as measured drifts are generally positive during the
1616
+ first three epochs and then considerably negative during the
1617
+ final epoch.
1618
+ Perhaps the most interesting finding from our observations
1619
+ of this pulsar is the discovery of a strong correlation between
1620
+ the measured arc curvatures and the arc asymmetry index,
1621
+ which is a metric that describes the relative power between
1622
+ the left and right arcs and is found by comparing the average
1623
+ power along each arc via
1624
+ A = PR(fν) − PL(fν)
1625
+ PR(fν) + PL(fν)
1626
+ ,
1627
+ (5)
1628
+ with a larger index magnitude indicating greater asymmetry.
1629
+ We believe this phenomenon has never before been reported
1630
+ and is therefore worth further examination in future observa-
1631
+ tions. As briefly mentioned earlier, asymmetry in arcs has
1632
+ long been attributed to either the refraction of pulsar emis-
1633
+ sion at the scattering screen or as the result of an asymmetric
1634
+ distribution of the material within the screen (Cordes et al.
1635
+ 2006), while arc curvature is known to indicate the distance
1636
+ between a given scattering screen and the observer (Stine-
1637
+ bring et al. 2001). The correlation between the two suggests
1638
+ further study of this effect may result in a better understand-
1639
+ ing of how screen asymmetry and/or refraction affects pulsar
1640
+ emission depending on the scattering screen’s proximity to
1641
+ the pulsar.
1642
+ An example dynamic and secondary spectrum pair is
1643
+ shown in Figure 5, with its corresponding normalized sec-
1644
+ ondary spectrum power profile, which is used to determine
1645
+ the asymmetry index, shown in Figure 6, while the scatter
1646
+ plot showing the relation between measured arc curvature
1647
+ and arc asymmetry index across all measurements taken in
1648
+ the 650 MHz band is shown in Figure 7. Of particular note in
1649
+ Figure 7 are the three distinct clumps, which we believe are
1650
+ the result of our observations being dominated by a differ-
1651
+ ent scattering screen at each epoch (two of our observations
1652
+ were taken four days apart, and so are dominated by the same
1653
+ screen). It is likely that this pulsar’s at least six known scat-
1654
+ tering screens are the main reason why we were able to see
1655
+ this correlation in our data in the first place, as individual
1656
+ scattering screens likely do not vary enough in distance over
1657
+ time for this trend to become apparent. Indeed, the limited
1658
+ number of pulsars with multiple known screens is probably
1659
+ the main reason why this trend has not been reported in ear-
1660
+ lier studies.
1661
+ 4.6. J1509+5531
1662
+ In the observations of this pulsar in the 650 MHz band,
1663
+ all secondary spectra featured patchy rather than continuous
1664
+
1665
+ PSR J0630-2834 MJD 58987
1666
+ 450
1667
+ Flux Density (Arbitrary Units)
1668
+ 0.15
1669
+ [MHz]
1670
+ 440
1671
+ 0.10
1672
+ 430
1673
+ Frequency [
1674
+ 0.05
1675
+ 420
1676
+ 0.00
1677
+ 410
1678
+ -0.05
1679
+ 400
1680
+ 0
1681
+ 10
1682
+ 20
1683
+ 30
1684
+ 40
1685
+ Time [Min]
1686
+ 10
1687
+ nL =1.534 s3
1688
+ 40
1689
+ nR =1.623 s3
1690
+ Log Power (dB)
1691
+ 5
1692
+ Delay [μs]
1693
+ 20
1694
+ 0
1695
+ 0
1696
+ -5
1697
+ 20
1698
+ -40
1699
+ -10
1700
+ -40
1701
+ -20
1702
+ 0
1703
+ 20
1704
+ 40
1705
+ Fringe Frequency [10-3 Hz]10
1706
+ J. E. TURNER ET AL.
1707
+ (a) Scintillation arcs without overlaid fits
1708
+ (b) Scintillation arcs with overlaid fits
1709
+ Figure 4. Secondary spectrum of PSR J1136+1551 at 650 MHz on MJD 58987 showing the detection of three distinct scintillation arcs.
1710
+ Figure 5. Dynamic (top) and secondary (bottom) spectra of PSR
1711
+ J1136+1551 centered at 650 MHz on MJD 58987. The top half of
1712
+ the secondary spectrum shows the overlaid arc fits in green. Scaled
1713
+ uncertainties of the arc curvature can be found in Table 1.
1714
+ arcs, particularly in the left arm. This patchiness indicates
1715
+ a detection of this pulsar’s arclets, which result from sub-
1716
+ structures in the ISM thought to arise from scattering inter-
1717
+ ference between an inhomogeniously scattered distribution
1718
+ of material and some distinct offset region (Walker & Stine-
1719
+ bring 2005; Cordes et al. 2006). In the particular case of this
1720
+ Figure 6. Normalized secondary spectrum power profile of PSR
1721
+ J1136+1551 centered at 650 MHz on MJD 58987. The vertical
1722
+ dashed lines indicate where the arcs fall on the normalized delay
1723
+ axis.
1724
+ pulsar these substructures are roughly AU in scale. Unique
1725
+ to these arclets is their distinctly flat nature, which has been
1726
+ attributed to its exceptionally high transverse velocity of over
1727
+ 960 km s−1 (Manchester et al. 2005). Interestingly, the arc
1728
+ curvatures measured in the last two epochs (MJDs 59115 and
1729
+ 59497) are a factor of two to three times smaller than the first
1730
+
1731
+ PSR J1136+1551MJD 5898T
1732
+ 14000
1733
+ 70
1734
+ 12000
1735
+ 60
1736
+ 10000
1737
+ 50
1738
+ 8000
1739
+ ({_w) f
1740
+ 40
1741
+ 6000
1742
+ 30
1743
+ 4000
1744
+ 20
1745
+ 2000
1746
+ 10
1747
+ 0
1748
+ -20
1749
+ 0
1750
+ 20
1751
+ -40
1752
+ 40
1753
+ ft (mHz)PSR J1136+1551MJD5898T
1754
+ 14000
1755
+ 70
1756
+ 12000
1757
+ 60
1758
+ 10000
1759
+ 50
1760
+ 8000
1761
+ ({_w) f
1762
+ 40
1763
+ 6000
1764
+ 30
1765
+ 4000
1766
+ 20
1767
+ 2000
1768
+ 10
1769
+ -20
1770
+ 0
1771
+ 20
1772
+ -40
1773
+ 40
1774
+ ft (mHz)PSR J1136+1551MJD 5898T
1775
+ 750
1776
+ ( )s
1777
+ 0.35
1778
+ 0.30
1779
+ Frequency [MHz]
1780
+ 700
1781
+ 0.25
1782
+ 650
1783
+ 0.15
1784
+ 0.10
1785
+ 600
1786
+ 0.05
1787
+ 550
1788
+ 0.00
1789
+ 0
1790
+ 5
1791
+ 10
1792
+ 15
1793
+ 20
1794
+ 25
1795
+ 30
1796
+ 35
1797
+ 40
1798
+ Time [Min]
1799
+ 10
1800
+ nL =0.056 s3
1801
+ 60
1802
+ nR =0.060 s3
1803
+ 5
1804
+ Power (dB)
1805
+ 40
1806
+ Delay [μs]
1807
+ 20
1808
+ 0
1809
+ 0
1810
+ Log
1811
+ 20
1812
+ -10
1813
+ -40
1814
+ -20
1815
+ 0
1816
+ 20
1817
+ 40
1818
+ Fringe Frequency [10-3 Hz]18
1819
+ 16
1820
+ 12
1821
+ 10
1822
+ 8
1823
+ -2
1824
+ 0
1825
+ -1
1826
+ 2
1827
+ Normalized ftSIMULTANEOUS DUAL-FREQUENCY SCINTILLATION ARC SURVEY
1828
+ 11
1829
+ Figure 7. Scatter plot showing measured arc curvatures and the
1830
+ corresponding asymmetry indices for all measurements of PSR
1831
+ J1136+1551 taken with Band 4. All arc curvatures have been scaled
1832
+ to their corresponding 1 GHz equivalent. The three distinct clumps
1833
+ are the result of the observations being dominated by three different
1834
+ scattering screens.
1835
+ two epochs (MJDs 59064 and 58987), possibly indicating a
1836
+ detection of multiple scattering screens along the LOS to this
1837
+ pulsar. This result augments the results of Sprenger et al.
1838
+ (2022), who also found significant variability along the LOS
1839
+ to this pulsar during the same period of time. An example
1840
+ observation from the earlier two epochs is shown in Figure
1841
+ 8, while an example from the later two epochs is shown in
1842
+ Figure 9.
1843
+ 4.7. J1932+1059
1844
+ Due to having the lowest DM in our survey, this pulsar
1845
+ showed the least variation in arc curvature from epoch to
1846
+ epoch across all frequencies. Its close proximity to Earth also
1847
+ resulted in wide scintles in frequency, leading to high scintle
1848
+ resolution and, consequently, very bright, narrow, and well
1849
+ defined arcs. The sharpness of these arcs may also indicate
1850
+ scattering that is highly anisotropic along the LOS (Walker
1851
+ et al. 2004; Cordes et al. 2006), as well as originating from
1852
+ a discrete, localized source (Stinebring et al. 2001). Overall
1853
+ this was our most consistent pulsar in all aspects of scintilla-
1854
+ tion.
1855
+ This consistency lines up with its other astrophysical pa-
1856
+ rameters, as its dispersion measure of 3.18 pc cm−3 (Large
1857
+ et al. 1968; Manchester et al. 2005) was the lowest in our
1858
+ survey and its transverse velocity of 152 km s−1 (Bilous
1859
+ et al. 2016; Manchester et al. 2005) was the second low-
1860
+ est. While its transverse velocity is a bit larger than PSR
1861
+ Figure 8. Dynamic (top) and secondary (bottom) spectra of PSR
1862
+ J1509+5531 centered at 625 MHz on MJD 58987. The top half of
1863
+ the secondary spectrum shows the overlaid arc fits in green. Scaled
1864
+ uncertainties of the arc curvature can be found in Table 1. During
1865
+ this period of observations, visible arcs were considerably narrower
1866
+ than later observations.
1867
+ Figure 9. Dynamic (top) and secondary (bottom) spectra of PSR
1868
+ J1509+5531 centered at 650 MHz on MJD 59115. The top half of
1869
+ the secondary spectrum shows the overlaid arc fits in green. Scaled
1870
+ uncertainties of the arc curvature can be found in Table 1. During
1871
+ this period of observations, visible arcs were considerably wider
1872
+ than later observations.
1873
+ J0630−2834 and their distances are almost equivalent, PSR
1874
+ J0630−2834 has a dispersion measure 10 times higher than
1875
+ PSR J1932+1059 (Large et al. 1968, 1969; Manchester et al.
1876
+
1877
+ J1136+1551 High Frequencies PL =0.92; PR =0.88
1878
+ Referenced at 1 GHz
1879
+ nL
1880
+ 0.12
1881
+ NR
1882
+ 0.10
1883
+ 0.08
1884
+ 0.06
1885
+ 0.04
1886
+ 0.02
1887
+ 0.00
1888
+ -0.02
1889
+ 0.000
1890
+ 0.005
1891
+ 0.010
1892
+ 0.015
1893
+ 0.020
1894
+ 0.025
1895
+ 0.030
1896
+ n (s3)PSR J1509+5531MJD 58987
1897
+ 650
1898
+ Flux Density (Arbitrary Units)
1899
+ 0.125
1900
+ [MHz]
1901
+ 640
1902
+ 0.100
1903
+ 0.075
1904
+ 630
1905
+ Frequency
1906
+ 0.050
1907
+ 620
1908
+ 0.025
1909
+ 610
1910
+ 0.000
1911
+ -0.025
1912
+ 600
1913
+ 0
1914
+ 10
1915
+ 20
1916
+ 30
1917
+ 40
1918
+ Time [Min]
1919
+ 10
1920
+ nL =0.932 s3
1921
+ 40
1922
+ NR =0.518 s3
1923
+ 5
1924
+ Log Power (dB)
1925
+ 20
1926
+ Delay [μs]
1927
+ 0
1928
+ 0
1929
+ 20
1930
+ -5
1931
+
1932
+ -40
1933
+ -10
1934
+ -40
1935
+ -20
1936
+ 0
1937
+ 20
1938
+ 40
1939
+ Fringe Frequency [10-3 Hz]PSR J1509+5531 MJD 59115
1940
+ 750
1941
+ (n ) s
1942
+ 0.35
1943
+ 0.30
1944
+ Frequency [MHz]
1945
+ 700
1946
+ 0.25
1947
+ 0.20
1948
+ 650
1949
+ 0.15
1950
+ 0.10
1951
+ 600
1952
+ 0.05
1953
+ 0.00
1954
+ 550
1955
+ 0
1956
+ 5
1957
+ 10
1958
+ 15
1959
+ 20
1960
+ 25
1961
+ 30
1962
+ 35
1963
+ Time [Min]
1964
+ 10
1965
+ 60
1966
+ nL =0.224 s3
1967
+ NR =0.187 s3
1968
+ 40
1969
+ 5
1970
+ Power (dB)
1971
+ Delay [μs]
1972
+ 20
1973
+ 0
1974
+ 0
1975
+ Logl
1976
+ -5
1977
+ -20
1978
+ -10
1979
+ -40
1980
+ -20
1981
+ 0
1982
+ 20
1983
+ 40
1984
+ Fringe Frequency [10-3 Hz]12
1985
+ J. E. TURNER ET AL.
1986
+ 2005). This means that a much denser ISM was sampled
1987
+ in PSR J0630−2834 than in PSR J1932+1059, meaning that
1988
+ PSR J1932+1059 had decisively the least amount of ISM
1989
+ sampled over our survey, making it the least likely to ex-
1990
+ perience large scintillation-related variations. An example
1991
+ observation is shown in Figure 10.
1992
+ Figure 10. Dynamic (top) and secondary (bottom) spectra of PSR
1993
+ J1932+1059 centered at 725 MHz on MJD 58987. The top half of
1994
+ the secondary spectrum shows the overlaid arc fits in green. Scaled
1995
+ uncertainties of the arc curvature can be found in Table 1.
1996
+ 5. CONCLUSIONS & FUTURE WORK
1997
+ We performed simultaneous dual-frequency observations
1998
+ of six bright canonical pulsars using the uGMRT. We ex-
1999
+ tracted scintillation arc, bandwidth, and drift rate measure-
2000
+ ments for each of these pulsars to examine a variety of sci-
2001
+ ence. We examined how arc curvature scaled with frequency
2002
+ and found our observations to be consistent with the index
2003
+ predicted by theory, while at the same time using a more as-
2004
+ tronomically ideal setup to perform these measurements. We
2005
+ also measured scattering delay scaling indices for five of our
2006
+ six pulsars and found indices consistent with or shallower
2007
+ than what is expected from a Kolmogorov medium, agreeing
2008
+ with previous literature. Finally, we find an interesting and
2009
+ strong correlation between arc curvature and arc asymmetry
2010
+ in PSR J1136+1551, demonstrating a potential connection
2011
+ between screen asymmetry and/or refraction and scattering
2012
+ screen location along the LOS, and the which we intend to
2013
+ follow up with additional observations.
2014
+ This study demonstrates the value of array-based tele-
2015
+ scopes such as uGMRT to the pulsar astronomy community,
2016
+ as well as the strengths of simultaneous multiband studies of
2017
+ pulsars and the wide variety of science that can be done with
2018
+ such an approach. This also shows strong promise for the
2019
+ future observations using ultrawideband (UWB) receivers,
2020
+ which are coming online at instruments such as the Green
2021
+ Bank Telescope.
2022
+ We thank the staff at the uGMRT who have made these
2023
+ observations possible. The uGMRT is run by the National
2024
+ Centre for Radio Astrophysics of the Tata Institute of Funda-
2025
+ mental Research. We gratefully acknowledge support of this
2026
+ effort from the NSF Physics Frontiers Center grants 1430284
2027
+ and 2020265 to NANOGrav. Some of the data processing
2028
+ in this work utilized the resources of the Bowser computing
2029
+ cluster at West Virginia University.
2030
+ Software:
2031
+ SCINTOOLS Reardon et al. (2020), PYPULSE
2032
+ Lam (2017), SCIPY Virtanen et al. (2020), NUMPY van der
2033
+ Walt et al. (2011), and MATPLOTLIB Hunter (2007).
2034
+ REFERENCES
2035
+ Bansal, K., Taylor, G. B., Stovall, K., & Dowell, J. 2019, The
2036
+ Astrophysical Journal, 875, 146, doi: 10.3847/1538-4357/ab0d8f
2037
+ Bhat, N. D. R., Cordes, J. M., Camilo, F., Nice, D. J., & Lorimer,
2038
+ D. R. 2004, The Astrophysical Journal, 605, 759,
2039
+ doi: 10.1086/382680
2040
+ Bilous, A. V., Kondratiev, V. I., Kramer, M., et al. 2016, A&A,
2041
+ 591, A134, doi: 10.1051/0004-6361/201527702
2042
+ Cordes, J. M., & Lazio, T. J. W. 2001, The Astrophysical Journal,
2043
+ 549, 997, doi: 10.1086/319442
2044
+ Cordes, J. M., & Rickett, B. J. 1998, The Astrophysical Journal,
2045
+ 507, 846, doi: 10.1086/306358
2046
+ Cordes, J. M., Rickett, B. J., Stinebring, D. R., & Coles, W. A.
2047
+ 2006, ApJ, 637, 346, doi: 10.1086/498332
2048
+ Hill, A. S., Stinebring, D. R., Barnor, H. A., Berwick, D. E., &
2049
+ Webber, A. B. 2003, The Astrophysical Journal, 599, 457,
2050
+ doi: 10.1086/379191
2051
+ Huguenin, G. R., Taylor, J. H., Goad, L. E., et al. 1968, Nature,
2052
+ 219, 576, doi: 10.1038/219576a0
2053
+ Hunter, J. D. 2007, Computing in Science & Engineering, 9, 90,
2054
+ doi: 10.1109/MCSE.2007.55
2055
+ Lam, M. T. 2017, PyPulse: PSRFITS handler.
2056
+ http://ascl.net/1706.011
2057
+ Large, M. I., Vaughan, A. E., & Wielebinski, R. 1968, Nature, 220,
2058
+ 753, doi: 10.1038/220753a0
2059
+ —. 1969, Nature, 223, 1249, doi: 10.1038/2231249a0
2060
+
2061
+ PSR J1932±1059 MJD 59062
2062
+ 750
2063
+ (
2064
+ 0.10
2065
+ 740
2066
+ Frequency [MHz]
2067
+ 0.08
2068
+ 730
2069
+ 0.06
2070
+ 0.04
2071
+ 720
2072
+ 0.02
2073
+ 710
2074
+ 0.00
2075
+ 700
2076
+ 0
2077
+ 5
2078
+ 10
2079
+ 15
2080
+ 20
2081
+ 25
2082
+ 30
2083
+ 35
2084
+ 40
2085
+ Time [Min]
2086
+ 10
2087
+ 60
2088
+ nL =0.057 s3
2089
+ nR =0.058 s3
2090
+ 40
2091
+ 5
2092
+ Power (dB)
2093
+ Delay [μs]
2094
+ 20
2095
+ 0
2096
+ 0
2097
+ -5
2098
+ -40
2099
+ -10
2100
+ -40
2101
+ -20
2102
+ 0
2103
+ 20
2104
+ 40
2105
+ Fringe Frequency [10-3 Hz]SIMULTANEOUS DUAL-FREQUENCY SCINTILLATION ARC SURVEY
2106
+ 13
2107
+ Levin, L., McLaughlin, M. A., Jones, G., et al. 2016, The
2108
+ Astrophysical Journal, 818, 166.
2109
+ http://stacks.iop.org/0004-637X/818/i=2/a=166
2110
+ Lewandowski, W., Dembska, M., Kijak, J., & Kowali´nska, M.
2111
+ 2013, Monthly Notices of the Royal Astronomical Society, 434,
2112
+ 69, doi: 10.1093/mnras/stt989
2113
+ Manchester, R. N., Hobbs, G. B., Teoh, A., & Hobbs, M. 2005, AJ,
2114
+ 129, 1993, doi: 10.1086/428488
2115
+ McKee, J. W., Zhu, H., Stinebring, D. R., & Cordes, J. M. 2022,
2116
+ The Astrophysical Journal, 927, 99,
2117
+ doi: 10.3847/1538-4357/ac460b
2118
+ Pilkington, J. D. H., Hewish, A., Bell, S. J., & Cole, T. W. 1968,
2119
+ Nature, 218, 126, doi: 10.1038/218126a0
2120
+ Reardon, D. J., Coles, W. A., Bailes, M., et al. 2020, ApJ, 904, 104,
2121
+ doi: 10.3847/1538-4357/abbd40
2122
+ Rickett, B., Johnston, S., Tomlinson, T., & Reynolds, J. 2009,
2123
+ Monthly Notices of the Royal Astronomical Society, 395, 1391,
2124
+ doi: 10.1111/j.1365-2966.2009.14471.x
2125
+ Romani, R. W., Narayan, R., & Blandford, R. 1986, MNRAS, 220,
2126
+ 19, doi: 10.1093/mnras/220.1.19
2127
+ Sprenger, T., Main, R., Wucknitz, O., Mall, G., & Wu, J. 2022,
2128
+ Monthly Notices of the Royal Astronomical Society, 515, 6198,
2129
+ doi: 10.1093/mnras/stac2160
2130
+ Stinebring, D. R., McLaughlin, M. A., Cordes, J. M., et al. 2001,
2131
+ ApJL, 549, L97, doi: 10.1086/319133
2132
+ Stinebring, D. R., Rickett, B. J., & Ocker, S. K. 2019, ApJ, 870,
2133
+ 82, doi: 10.3847/1538-4357/aaef80
2134
+ Stinebring, D. R., Rickett, B. J., Minter, A. H., et al. 2022, The
2135
+ Astrophysical Journal, 941, 34, doi: 10.3847/1538-4357/ac8ea8
2136
+ Stovall, K., Ray, P. S., Blythe, J., et al. 2015, The Astrophysical
2137
+ Journal, 808, 156, doi: 10.1088/0004-637x/808/2/156
2138
+ Trang, F. S., & Rickett, B. J. 2007, ApJ, 661, 1064,
2139
+ doi: 10.1086/516706
2140
+ Turner, J. E., McLaughlin, M. A., Cordes, J. M., et al. 2021, ApJ,
2141
+ 917, 10, doi: 10.3847/1538-4357/abfafe
2142
+ van der Walt, S., Colbert, S. C., & Varoquaux, G. 2011, Computing
2143
+ in Science Engineering, 13, 22
2144
+ Virtanen, P., Gommers, R., Oliphant, T. E., et al. 2020, Nature
2145
+ Methods, 17, 261,
2146
+ doi: https://doi.org/10.1038/s41592-019-0686-2
2147
+ Walker, M. A., Melrose, D. B., Stinebring, D. R., & Zhang, C. M.
2148
+ 2004, MNRAS, 354, 43,
2149
+ doi: 10.1111/j.1365-2966.2004.08159.x
2150
+ Walker, M. A., & Stinebring, D. R. 2005, MNRAS, 362, 1279,
2151
+ doi: 10.1111/j.1365-2966.2005.09396.x
2152
+
9tE4T4oBgHgl3EQf3g1J/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
A9FKT4oBgHgl3EQfWS5f/content/2301.11791v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:bc4e80794b3ba6773137ed99879622309c3c326ccdc0996759903b5b1fe7a915
3
+ size 319499
A9FKT4oBgHgl3EQfWS5f/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:a64a8755038b90a044f7666d5affac834fd155864e1a7a812d0ffb927342baa1
3
+ size 3932205
A9FKT4oBgHgl3EQfWS5f/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:c1dadb644931e7174e19f40950dacabb19ac76e4f471e7265f5c047825b15fe6
3
+ size 142740
B9E4T4oBgHgl3EQfeA2w/content/tmp_files/2301.05096v1.pdf.txt ADDED
@@ -0,0 +1,734 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Asynchronous training of quantum reinforcement learning
2
+ Samuel Yen-Chi Chen1
3
+ 1Wells Fargo
4
+ (Dated: January 13, 2023)
5
+ Abstract
6
+ The development of quantum machine learning (QML) has received a lot of interest recently
7
+ thanks to developments in both quantum computing (QC) and machine learning (ML). One of
8
+ the ML paradigms that can be utilized to address challenging sequential decision-making issues is
9
+ reinforcement learning (RL). It has been demonstrated that classical RL can successfully complete
10
+ many difficult tasks. A leading method of building quantum RL agents relies on the variational
11
+ quantum circuits (VQC). However, training QRL algorithms with VQCs requires significant amount
12
+ of computational resources. This issue hurdles the exploration of various QRL applications. In
13
+ this paper, we approach this challenge through asynchronous training QRL agents. Specifically,
14
+ we choose the asynchronous training of advantage actor-critic variational quantum policies. We
15
+ demonstrate the results via numerical simulations that within the tasks considered, the asyn-
16
+ chronous training of QRL agents can reach performance comparable to or superior than classical
17
+ agents with similar model sizes and architectures.
18
+ 1
19
+ arXiv:2301.05096v1 [quant-ph] 12 Jan 2023
20
+
21
+ I.
22
+ INTRODUCTION
23
+ Quantum computing (QC) has been posited as a means of achieving computational supe-
24
+ riority for certain tasks that classical computers struggle to solve [1]. Despite this potential,
25
+ the lack of error-correction in current quantum computers has made it challenging to ef-
26
+ fectively implement complex quantum circuits on these ”noisy intermediate-scale quantum”
27
+ (NISQ) devices [2]. To harness the quantum advantages offered by NISQ devices, the devel-
28
+ opment of specialized quantum circuit architectures is necessary.
29
+ Recent advances in the hybrid quantum-classical computing framework [3] that utilizes
30
+ both classical and quantum computing. Under this approach, certain computational tasks
31
+ that are expected to benefit from quantum processing are executed on a quantum computer,
32
+ while others, such as gradient calculations, are performed on classical computers. This hybrid
33
+ approach aims to take advantage of the strengths of both types of computing to address a
34
+ wide range of tasks. Hybrid algorithms that utilize variational quantum circuits (VQC)
35
+ have proven to be effective in a variety of machine learning tasks. VQCs are a subclass of
36
+ quantum circuits that possess tunable parameters, and their incorporation into QML models
37
+ has demonstrated success in a wide range of tasks [3, 4].
38
+ Reinforcement learning (RL) is a branch of machine learning that deals with sequential
39
+ decision making tasks. Deep neural network-based RL has achieved remarkable results in
40
+ complicated tasks with human-level [5] or super-human performance [6]. However, quantum
41
+ RL is a developing field with many unresolved issues and challenges. The majority of existing
42
+ quantum RL models are based on VQC [7–11]. Although these models have been shown to
43
+ perform well in a variety of benchmark tasks, training them requires a significant amount
44
+ of computational resources. The long training time limits the exploration of quantum RL’s
45
+ broad application possibilities. We propose an asynchronous training framework for quantum
46
+ RL agents in this paper. We focus on the asynchronous training of advantage actor-critic
47
+ quantum policies using multiple instances of agents running in parallel.
48
+ We show, using numerical simulations, that quantum models may outperform or be sim-
49
+ ilar to classical models in the various benchmark tasks considered. Furthermore, the sug-
50
+ gested training approach has the practical advantage of requiring significantly less time for
51
+ training, allowing for more quantum RL applications.
52
+ The structure of this paper is as follows: In SectionII, we provide an overview of relevant
53
+ 2
54
+
55
+ prior work and compare our proposal to these approaches. In SectionIII, we provide a brief
56
+ overview of the necessary background in reinforcement learning. In SectionIV, we introduce
57
+ the concept of variational quantum circuits (VQCs), which serve as the building blocks of
58
+ our quantum reinforcement learning agents. In SectionV, we present our proposed quantum
59
+ A3C framework. In Section VI, we describe our experimental setup and present our results.
60
+ Finally, in Section VII, we offer some concluding remarks.
61
+ II.
62
+ RELEVANT WORKS
63
+ The work that gave rise to quantum reinforcement learning (QRL) [12] may be traced
64
+ back to [13]. However, the framework demands a quantum environment, which may not
65
+ be met in most real-world situations. Further studies utilizing Grover-like methods include
66
+ [14, 15]. Quantum linear system solvers are also used to implement quantum policy iteration
67
+ [16]. We will concentrate on recent advancements in VQC-based QRL dealing with classical
68
+ environments.
69
+ The first VQC-based QRL [7], which is the quantum version of deep Q-
70
+ learning (DQN), considers discrete observation and action spaces in the testing environments
71
+ such as Frozen-Lake and Cognitive-Radio. Later, more sophisticated efforts in the area of
72
+ quantum DQN take into account continuous observation spaces like Cart-Pole [8, 9]. A
73
+ further development along this direction includes the using of quantum recurrent neural
74
+ networks such as QLSTM as the value function approximator [17] to tackle challenges such
75
+ as partial observability or environments requiring longer memory of previous steps. Various
76
+ methods such as hybrid quantum-classical linear solver are developed to find value functions
77
+ [18]. A further improvement of DQN which can improve the agent convergence such as
78
+ Double DQN (DDQN) are also implemented within VQC framework in the work [19], in
79
+ which the authors apply QRL to solve robot navigation task. Recent advances in QRL
80
+ have led to the development of frameworks that aim to learn policy functions, denoted as
81
+ π, directly. These frameworks are able to learn the optimal policy for a given problem,
82
+ in addition to learning value functions such as the Q-function.
83
+ For example, the paper
84
+ [10] describes the quantum policy gradient RL through the use of REINFORCE algorithm.
85
+ Then, the work [11] consider an improved policy gradient algorithm called PPO with VQCs
86
+ and show that even with a small number of parameters, quantum models can outperform
87
+ their classical counterparts. Provable quantum advantages of policy gradient are shown in
88
+ 3
89
+
90
+ the work [20]. Additional research, such as the work in [21], has explored the impact of
91
+ various post-processing methods for VQC on the performance of quantum policy gradients.
92
+ Several improved quantum policy gradient algorithms have been proposed in recent years,
93
+ including actor-critic [22] and soft actor-critic (SAC) [23, 24]. These modifications seek to
94
+ further improve the efficiency and effectiveness of QRL methods. QRL has also been applied
95
+ to the field of quantum control [25] and has been extended to the multi-agent setting [26–
96
+ 28]. The work [29] were the first to explore the use of evolutionary optimization for QRL.
97
+ In their work, multiple agents were initialized and run in parallel, with the top performing
98
+ agents being selected as parents to generate the next generation of agents. In the work [30],
99
+ the authors studied the use of advanced quantum policy gradient methods, such as the deep
100
+ deterministic policy gradient (DDPG) algorithm, for QRL in continuous action spaces.
101
+ In this work, we extend upon previous research on quantum policy gradient [10, 11, 22] by
102
+ introducing an asynchronous training method for quantum policy learning. While previous
103
+ approaches have employed single-threaded training, our method utilizes an asynchronous
104
+ approach, which may offer practical benefits such as reduced training time through the use
105
+ of multi-core CPU computing resources and the potential for utilizing multiple quantum
106
+ processing units (QPUs) in the future.
107
+ Our approach shares some similarities with the
108
+ evolutionary QRL method presented in [29], which also utilizes parallel computing resources.
109
+ However, our approach differs in that individual agents can share their gradients directly
110
+ with the shared global gradient asynchronously, rather than waiting for all agents to finish
111
+ before calculating fitness and creating the next generation of agents. This characteristic
112
+ may further improve the efficiency of the training process. These contributions represent a
113
+ novel advancement in the field of quantum reinforcement learning.
114
+ III.
115
+ REINFORCEMENT LEARNING
116
+ Reinforcement learning (RL) is a machine learning framework in which an agent learns to
117
+ accomplish a given goal by interacting with an environment E in discrete time steps [31]. The
118
+ agent observes a state st at each time step t and then chooses an action at from the action
119
+ space A based on its current policy π. The policy is a mapping from a specific state st to the
120
+ probabilities of choosing one of the actions in A. After performing the action at, the agent
121
+ gets a scalar reward rt and the state of the following time step st+1 from the environment.
122
+ 4
123
+
124
+ For episodic tasks, the procedure is repeated across a number of time steps until the agent
125
+ reaches the terminal state or the maximum number of steps permitted. Seeing the state
126
+ st along the training process, the agent aims to maximize the expected return, which can
127
+ be expressed as the value function at state s under policy π, V π(s) = E [Rt|st = s], where
128
+ Rt = �T
129
+ t′=t γt′−trt′ is the return, the total discounted reward from time step t. The value
130
+ function can be further expressed as V π(s) = �
131
+ a∈A Qπ(s, a)π(a|s), where the action-value
132
+ function or Q-value function Qπ(s, a) = E[Rt|st = s, a] is the expected return of choosing
133
+ an action a ∈ A in state s according to the policy π. The Q-learning is RL algorithm to
134
+ optimize the Qπ(s, a) via the following formula
135
+ Q (st, at) ← Q (st, at)
136
+ + α
137
+
138
+ rt + γ max
139
+ a
140
+ Q (st+1, a) − Q (st, at)
141
+
142
+ .
143
+ (1)
144
+ In contrast to value-based reinforcement learning techniques, such as Q-learning, which
145
+ rely on learning a value function and using it to guide decision-making at each time step,
146
+ policy gradient methods focus on directly optimizing a policy function, denoted as π(a|s; θ),
147
+ parametrized by θ. The parameters θ are updated through a gradient ascent procedure
148
+ on the expected total return, E[Rt]. A notable example of a policy gradient algorithm is
149
+ the REINFORCE algorithm, introduced in [32]. In the standard REINFORCE algorithm,
150
+ the parameters θ are updated along the direction ∇θ log π (at|st; θ) Rt, which is an unbiased
151
+ estimate of ∇θE [Rt]. However, this policy gradient estimate often suffers from high variance,
152
+ making training difficult.
153
+ To reduce the variance of this estimate while maintaining its
154
+ unbiasedness, a term known as the baseline can be subtracted from the return. This baseline,
155
+ denoted as bt(st), is a learned function of the state st.
156
+ The resulting update becomes
157
+ ∇θ log π (at|st; θ) (Rt − bt (st)). A common choice for the baseline bt(st) in RL is an estimate
158
+ of the value function V π(st).
159
+ Using this choice for the baseline often results in a lower
160
+ variance estimate of the policy gradient [31]. The quantity Rt − bt = Q(st, at) − V (st) can
161
+ be interpreted as the advantage A(st, at) of action at at state st. Intuitively, the advantage
162
+ can be thought of as the ”goodness or badness” of action at relative to the average value
163
+ at state st. This approach is known as the advantage actor-critic (A2C) method, where the
164
+ policy π is the actor and the baseline, which is the value function V , is the critic [31].
165
+ The asynchronous advantage actor-critic (A3C) algorithm [33] is a variant of the A2C
166
+ method that employs multiple concurrent actors to learn the policy through parallelization.
167
+ 5
168
+
169
+ Asynchronous training of RL agents involves executing multiple agents on multiple instances
170
+ of the environment, allowing the agents to encounter diverse states at any given time step.
171
+ This diminished correlation between states or observations enhances the numerical stability
172
+ of on-policy RL algorithms such as actor-critic [33]. Furthermore, asynchronous training does
173
+ not require the maintenance of a large replay memory, thus reducing memory requirements
174
+ [33]. By harnessing the advantages and gradients computed by a pool of actors, A3C exhibits
175
+ impressive sample efficiency and robust learning performance, making it a prevalent choice
176
+ in the realm of reinforcement learning.
177
+ IV.
178
+ VARIATIONAL QUANTUM CIRCUIT
179
+ Variational quantum circuits (VQCs), also referred to as parameterized quantum circuits
180
+ (PQCs), are a class of quantum circuits that contain tunable parameters. These parame-
181
+ ters can be optimized using various techniques from classical machine learning, including
182
+ gradient-based and non-gradient-based methods. A generic illustration of a VQC is in the
183
+ central part of Figure 1.
184
+ The three primary components of a VQC are the encoding circuit, the variational circuit,
185
+ and the quantum measurement layer. The encoding circuit, denoted as U(x), transforms
186
+ classical values into a quantum state, while the variational circuit, denoted as V (θ), serves
187
+ as the learnable part of the VQC. The quantum measurement layer, on the other hand,
188
+ is utilized to extract information from the circuit. It is a common practice to repeatedly
189
+ execute the circuit, also known as ”shots,” in order to obtain the expectation values of
190
+ each qubit. A common choice is to use the Pauli-Z expectation values. Instead of being
191
+ binary integers, the values are received as floats. Additionally, other components, such as
192
+ additional VQCs or classical components such as DNN, can process the values obtained from
193
+ the circuit.
194
+ The VQC can operate with other classical components such as tensor networks (TN) [29,
195
+ 34, 35] and deep neural networks (NN) to perform data pre-processing such as dimensional
196
+ reduction or post-processing such as scaling. We call such VQCs as dressed VQC, as shown
197
+ in Figure 1. The whole model can be trained in an end-to-end manner via gradient-based
198
+ [34, 35] or gradient-free methods [29]. For the gradient-based methods, the whole model
199
+ can be represented as a directed acyclic graph (DAG) and then back-propagation can be
200
+ 6
201
+
202
+ applied. The success of such end-to-end optimization relies on the capabilities of calculating
203
+ the quantum gradients such as parameter-shift rule [36]. VQC-based QML models have
204
+ shown success in areas such as classification [34–38], natural language processing [39–41]
205
+ and sequence modeling [42, 43].
206
+ Hybrid VQC
207
+ U(x)
208
+ V(θ)
209
+ |0⟩
210
+ |0⟩
211
+ |0⟩
212
+ |0⟩
213
+ NN
214
+ NN
215
+ FIG. 1. Hybrid variational quantum circuit (VQC) architecture. The hybrid VQC archi-
216
+ tecture includes a VQC and classical neural networks (NN) before and after the VQC. NN can be
217
+ used to reduce the dimensionality of the input data and refine the outputs from the VQC.
218
+ V.
219
+ QUANTUM A3C
220
+ The proposed quantum asynchronous advantage actor-critic (QA3C) framework consists
221
+ of two main components: a global shared memory and process-specific memories for each
222
+ agent. The global shared memory maintains the dressed VQC policy and value parameters,
223
+ which are modified when an individual process uploads its own gradients for parameter up-
224
+ dates. Each agent has its own process-specific memory that maintains local dressed VQC
225
+ policy and value parameters. These local models are used to generate actions during an
226
+ episode within individual processes. When certain criteria are met, the gradients of the
227
+ local model parameters are uploaded to the global shared memory, and the global model
228
+ parameters are modified accordingly. The updated global model parameters are then im-
229
+ mediately downloaded to the local agent that just uploaded its own gradients. The overall
230
+ concept of QA3C is depicted in Figure 2.
231
+ We construct the quantum policy π (at | st; θ) and value V (st; θv) function with the
232
+ dressed VQC as shown in Figure 1, in which the VQC follows the architecture shown in
233
+ 7
234
+
235
+
236
+ Worker 1
237
+ Worker 2
238
+ Worker 3
239
+ Worker n
240
+ Environment 1
241
+ Environment 2
242
+ Environment 3
243
+ Environment n
244
+ Global Parameter
245
+ st
246
+ π(at|st)
247
+ V(st)
248
+ FIG. 2.
249
+ Quantum asynchronous advantage actor-critic (A3C) learner.
250
+ The proposed
251
+ quantum A3C includes a global shared parameters and multiple parallel workers.
252
+ The action
253
+ generation process within each local agent is performed using the dressed VQC policy and value
254
+ functions stored in the process-specific memories. Upon meeting certain criteria, the gradients of
255
+ the local model parameters are uploaded to the global shared memory, where the global model
256
+ parameters are updated. The updated global model parameters are then immediately downloaded
257
+ to the local agent that just uploaded its own gradients.
258
+ Figure 3. This VQC architecture has been studied in the work such as quantum recurrent
259
+ neural networks (QRNN) [42], quantum recurrent RL [17], quantum convolutional neural
260
+ networks [44], federated quantum classification [38] and has demonstrated superior perfor-
261
+ mance over their classical counterparts under certain conditions. In addition, we employ
262
+ the classical DNN before and after the VQC to dimensionally reduce the data and fine-tune
263
+ the outputs from the VQC, respectively. The neural network components in this hybrid
264
+ architecture consist of single-layer networks for dimensionality conversion. Specifically, the
265
+ network preceding the VQC is a linear layer with an input dimension equal to the size of the
266
+ observation vector and an output dimension equal to the number of qubits in the VQC. The
267
+ networks following the VQC are linear layers with input dimensions equal to the number
268
+ of qubits in the VQC and output dimensions equal to the number of actions (for the actor
269
+ function π (at | st; θ)) or 1 (for the critic function V (st; θv)). These layers serve to convert
270
+ 8
271
+
272
+ the output of the VQC for use in the actor-critic algorithm. The policy and value function
273
+ are updated after every S steps or when the agent reaches the terminal state. The details
274
+ of the algorithm such as the gradient update formulas are presented in Algorithm 1.
275
+ |0⟩
276
+ H
277
+ Ry(arctan(x1))
278
+ Rz(arctan(x2
279
+ 1))
280
+
281
+
282
+ R(α1, β1, γ1)
283
+ |0⟩
284
+ H
285
+ Ry(arctan(x2))
286
+ Rz(arctan(x2
287
+ 2))
288
+
289
+
290
+ R(α2, β2, γ2)
291
+ |0⟩
292
+ H
293
+ Ry(arctan(x3))
294
+ Rz(arctan(x2
295
+ 3))
296
+
297
+
298
+ R(α3, β3, γ3)
299
+ |0⟩
300
+ H
301
+ Ry(arctan(x4))
302
+ Rz(arctan(x2
303
+ 4))
304
+
305
+
306
+ R(α4, β4, γ4)
307
+ FIG. 3. VQC architecture for quantum A3C. The VQC used here includes Ry and Rz for
308
+ encoding classical values x, multiple CNOT gates to entangle qubits, general unitary rotations R
309
+ and the final measurement. The output of the VQC consists of Pauli-Z expectation values, which
310
+ are obtained through multiple runs (shots) of the circuit.
311
+ These values are then processed by
312
+ classical neural networks for further use. We use a 4-qubit system as an example here, however, it
313
+ can be enlarge or shrink based on the problem of interest. In this work, the number of qubit is 8.
314
+ VI.
315
+ EXPERIMENTS AND RESULTS
316
+ A.
317
+ Testing Environments
318
+ 1.
319
+ Acrobot
320
+ The Acrobot environment from OpenAI Gym [45] consists of a system with two linearly
321
+ connected links, with one end fixed. The joint connecting the two links can be actuated by
322
+ applying torques. The goal is to swing the free end of the chain over a predetermined height,
323
+ starting from a downward hanging position, using as few steps as possible. The observation
324
+ in this environment is a six-dimensional vector comprising the sine and cosine values of the
325
+ two rotational joint angles, as well as their angular velocities. The agents are able to take
326
+ one of three actions: applying −1, 0, or +1 torque to the actuated joint. An action resulting
327
+ in the free end reaching the target height receives a reward of 0 and terminates the episode.
328
+ Any action that does not lead to the desired height receives a reward of −1. The reward
329
+ threshold is −100.
330
+ 9
331
+
332
+ FIG. 4. The Acrobat environment from OpenAI Gym.
333
+ 2.
334
+ Cart-Pole
335
+ Cart-Pole is a commonly used evaluation environment for simple RL models that has
336
+ been utilized as a standard example with in OpenAI Gym [45] (see Figure 5).
337
+ A fixed
338
+ junction connects a pole to a cart traveling horizontally over a frictionless track in this
339
+ environment. The pendulum initially stands upright, and the aim is to keep it as near to its
340
+ starting position as possible by moving the cart left and right. Each time step, the RL agent
341
+ learns to produce the right action according on the observation it gets. The observation in
342
+ this environment is a four dimensional vector st containing values of the cart position, cart
343
+ velocity, pole angle, and pole velocity at the tip. Every time step where the pole is near to
344
+ being upright results in a +1 award. An episode ends if the pole is inclined more than 15
345
+ degrees from vertical or the cart moves more than 2.4 units away from the center.
346
+ FIG. 5. The Cart-Pole environment from OpenAI Gym.
347
+ 10
348
+
349
+ 3.
350
+ MiniGrid-SimpleCrossing
351
+ The MiniGrid-SimpleCrossing environment [46] is more sophisticated, with a lot bigger
352
+ observation input for the RL agent. In this scenario, the RL agent receives a 7 × 7 × 3 =
353
+ 147 dimensional vector through observation and must choose an action from the action
354
+ space A, which offers six options. It is important to note that the 147-dimensional vector
355
+ is a compact and efficient representation of the environment rather than the real pixels.
356
+ There are six actions 0,· · · ,5 in the action space A for the agent to choose.
357
+ They are
358
+ turn left, turn right, move forward, pick up an object, drop the object being carried and
359
+ toggle. Only the first three of them are having actual effects in this case. The agent is
360
+ expected to learn this fact. In this environment, the agent receives a reward of 1 upon
361
+ reaching the goal.
362
+ A penalty is subtracted from this reward based on the formula 1 −
363
+ 0.9 × (number of steps/max steps allowed), where the maximum number of steps allowed is
364
+ defined as 4 × n × n, and n is the grid size [46]. In this work, n is set to 9. This reward
365
+ scheme presents a challenge because it is sparse, meaning that the agent does not receive
366
+ rewards until it reaches the goal. As shown in Figure 6, the agent (shown in red triangle)
367
+ is expected to find the shortest path from the starting point to the goal (shown in green).
368
+ We consider three cases in this environment: MiniGrid-SimpleCrossingS9N1-v0, MiniGrid-
369
+ SimpleCrossingS9N2-v0 and MiniGrid-SimpleCrossingS9N3-v0. Here the N represents the
370
+ number of valid crossings across walls from the starting position to the goal.
371
+ B.
372
+ Hyperparameters and Model Size
373
+ In the proposed QA3C, we use the Adam optimizer with learning rate 1×10−4, β1 = 0.92
374
+ and β2 = 0.999. The local agents will update the parameters with the global shared memory
375
+ every S = 5 steps. The discount factor γ is set to be 0.9. For the VQC, we set the number
376
+ of qubits to be 8 and two variational layers are used. Therefore, for each VQC, there are
377
+ 8 × 3 × 2 = 48 quantum parameters. Actor and critic both have their own VQC, thus
378
+ the total number of quantum parameters is 96. The VQC architecture are the same across
379
+ various testing environments considered in this work. As we described in the Section V,
380
+ single layer networks are used before and after the VQC to convert the dimensions of data.
381
+ The networks preceding the VQC have input dimensions based on the environments that
382
+ 11
383
+
384
+ (a)
385
+ (b)
386
+ (c)
387
+ FIG. 6. The SimpleCrossing environment from MiniGrid. The three environments from
388
+ MiniGrid-SimpleCrossing we consider in this work.
389
+ In each environment, there are also walls
390
+ which span 1 unit on each side (not shown in the figure).
391
+ (a), (b) and (c) represent exam-
392
+ ples from the MiniGrid-SimpleCrossingS9N1-v0, MiniGrid-SimpleCrossingS9N2-v0 and MiniGrid-
393
+ SimpleCrossingS9N3-v0 environments, respectively.
394
+ the agent is to solve. For the classical benchmarks, we consider the model which are very
395
+ similar to the dressed VQC model. Specifically, we keep the architecture of classical model
396
+ similar to the one presented in Figure 1 while we replace the 8-qubit VQC with a single
397
+ layer with input and output dimensions equal to 8. This makes the architecture very similar
398
+ to the quantum model and the number of parameters are also very close. We summarize
399
+ the number of parameters in Table I. We utilize the open-source PennyLane package [47]
400
+ QA3C
401
+ Classical
402
+ Classical Quantum Total
403
+ Total
404
+ Acrobot
405
+ 148
406
+ 96
407
+ 244
408
+ 292
409
+ Cart-Pole
410
+ 107
411
+ 96
412
+ 203
413
+ 251
414
+ SimpleCrossing
415
+ 2431
416
+ 96
417
+ 2527
418
+ 2575
419
+ TABLE I. Number of parameters. We provide details on the number of parameters in the
420
+ proposed QA3C model, which includes both quantum and classical components.
421
+ The classical
422
+ benchmarks were designed with architectures similar to the quantum model, resulting in similar
423
+ model sizes.
424
+ to construct the quantum circuit models and the PyTorch as a overall machine learning
425
+ 12
426
+
427
+ framework. The number of CPU cores and hence the number of parallel agents is 80 in
428
+ this work. We present simulation results in which the scores from the past 100 episodes are
429
+ averaged.
430
+ C.
431
+ Results
432
+ 1.
433
+ Acrobot
434
+ We begin by evaluating the performance of our models on the Acrobot environment. The
435
+ simulation results of this experiment are presented in Figure7. The total number of episodes
436
+ was 100,000. As shown in the figure, the quantum model exhibits a gradual improvement
437
+ during the early training episodes, while the classical model struggles to improve its policy.
438
+ In terms of average score, the quantum model demonstrates superior performance compared
439
+ to the classical model. Furthermore, the quantum model exhibits a more stable convergence
440
+ pattern, without significant fluctuations or collapses after reaching optimal scores. These
441
+ results suggest that the quantum model may be more robust and reliable in this environment.
442
+ 0
443
+ 20000
444
+ 40000
445
+ 60000
446
+ 80000
447
+ 100000
448
+ Episode #
449
+ 500
450
+ 400
451
+ 300
452
+ 200
453
+ 100
454
+ 0
455
+ Average Score
456
+ Quantum
457
+ Classical
458
+ FIG. 7. Results: Quantum A3C in the Acrobot environment.
459
+ 13
460
+
461
+ 2.
462
+ Cart-Pole
463
+ The next experiment was conducted in the Cart-Pole environment. The total number of
464
+ episodes was 100,000. As illustrated in Figure 8, the quantum model achieved significantly
465
+ higher scores than the classical model. While the classical model demonstrated faster learn-
466
+ ing in the early training episodes, the quantum model eventually surpassed it and reached
467
+ superior scores. These results suggest that the quantum model may be more effective in this
468
+ environment.
469
+ 0
470
+ 20000
471
+ 40000
472
+ 60000
473
+ 80000
474
+ 100000
475
+ Episode #
476
+ 0
477
+ 100
478
+ 200
479
+ 300
480
+ 400
481
+ 500
482
+ Average Score
483
+ Quantum
484
+ Classical
485
+ FIG. 8. Results: Quantum A3C in the CartPole environment.
486
+ 3.
487
+ MiniGrid-SimpleCrossing
488
+ The final experiment was conducted in the MiniGrid-SimpleCrossing environment, com-
489
+ prising a total of 100,000 episodes.
490
+ As depicted in Figure 9, among the three scenar-
491
+ ios, MiniGrid-SimpleCrossingS9N1-v0, MiniGrid-SimpleCrossingS9N2-v0, and MiniGrid-
492
+ SimpleCrossingS9N3-v0, the quantum model outperformed the classical model in two of
493
+ the three scenarios, MiniGrid-SimpleCrossingS9N2-v0 and MiniGrid-SimpleCrossingS9N3-
494
+ v0, demonstrating faster convergence and higher scores. Even in the remaining scenario,
495
+ MiniGrid-SimpleCrossingS9N1-v0, the difference in performance between the two models
496
+ 14
497
+
498
+ was minor.
499
+ 0
500
+ 20000
501
+ 40000
502
+ 60000
503
+ 80000
504
+ 100000
505
+ Episode #
506
+ 0.2
507
+ 0.0
508
+ 0.2
509
+ 0.4
510
+ 0.6
511
+ 0.8
512
+ 1.0
513
+ 1.2
514
+ Average Score
515
+ S9N1-Quantum
516
+ S9N1-Classical
517
+ 0
518
+ 20000
519
+ 40000
520
+ 60000
521
+ 80000
522
+ 100000
523
+ Episode #
524
+ Average Score
525
+ S9N2-Quantum
526
+ S9N2-Classical
527
+ 0
528
+ 20000
529
+ 40000
530
+ 60000
531
+ 80000
532
+ 100000
533
+ Episode #
534
+ Average Score
535
+ S9N3-Quantum
536
+ S9N3-Classical
537
+ FIG. 9. Results: Quantum A3C in the MiniGrid-SimpleCrossing environment.
538
+ VII.
539
+ CONCLUSION
540
+ In this study, we demonstrate the effectiveness of an asynchronous training framework for
541
+ quantum RL agents. Through numerical simulations, we show that in the benchmark tasks
542
+ considered, advantage actor-critic quantum policies trained asynchronously can outperform
543
+ or match the performance of classical models with similar architecture and sizes.
544
+ This
545
+ technique affords a strategy for expediting the training of quantum RL agents through
546
+ parallelization, and may have potential applications in various real-world scenarios.
547
+ ACKNOWLEDGMENTS
548
+ The views expressed in this article are those of the authors and do not represent the views
549
+ of Wells Fargo. This article is for informational purposes only. Nothing contained in this
550
+ article should be construed as investment advice. Wells Fargo makes no express or implied
551
+ warranties and expressly disclaims all legal, tax, and accounting implications related to this
552
+ article.
553
+ 15
554
+
555
+ Appendix A: Algorithms
556
+ 1.
557
+ Quantum-A3C
558
+ Algorithm 1 Quantum asynchronous advantage actor-critic learning (algorithm for each
559
+ actor-learner process)
560
+ Define the global update parameter S
561
+ Assume global shared hybrid VQC policy parameter θ
562
+ Assume global shared hybrid VQC value parameter θv
563
+ Assume global shared episode counter T = 0
564
+ Assume process-specific hybrid VQC policy parameter θ′
565
+ Assume process-specific hybrid VQC value parameter θ′
566
+ v
567
+ Initialize process-specific counter t = 1
568
+ while T < Tmax do
569
+ Reset gradients dθ ← 0 and dθv ← 0
570
+ Set tstart = t
571
+ Reset the environment and get state st
572
+ while st non-terminal or t − tstart < tmax do
573
+ Perform at according to policy π(at|st; θ′)
574
+ Receive reward rt and the new state st+1
575
+ Update process-specific counter t ← t + 1
576
+ if t mod S = 0 or reach terminal state then
577
+ Set R =
578
+
579
+
580
+
581
+ 0
582
+ for terminal st
583
+ V (st, θ′
584
+ v)
585
+ for non-terminal st
586
+ for i ∈ {t − 1, . . . , tstart } do
587
+ R ← ri + γR
588
+ Accumulate gradients wrt θ′: dθ ← dθ + ∇θ′ log π (ai | si; θ′) (R − V (si; θ′
589
+ v))
590
+ Accumulate gradients wrt θ′
591
+ v: dθv ← dθv + ∂ (R − V (si; θ′
592
+ v))2 /∂θ′
593
+ v
594
+ end for
595
+ Perform asynchronous update of θ using dθ and of θv using dθv
596
+ Update process-specific parameters from global parameters: θ′ ← θ and θ′
597
+ v ← θv
598
+ end if
599
+ end while
600
+ end while
601
+ 16
602
+
603
+ [1] M. A. Nielsen and I. L. Chuang, “Quantum computation and quantum information,” 2010.
604
+ [2] J. Preskill, “Quantum computing in the nisq era and beyond,” Quantum, vol. 2, p. 79, 2018.
605
+ [3] K. Bharti, A. Cervera-Lierta, T. H. Kyaw, T. Haug, S. Alperin-Lea, A. Anand, M. Deg-
606
+ roote, H. Heimonen, J. S. Kottmann, T. Menke, et al., “Noisy intermediate-scale quantum
607
+ algorithms,” Reviews of Modern Physics, vol. 94, no. 1, p. 015004, 2022.
608
+ [4] M. Cerezo, A. Arrasmith, R. Babbush, S. C. Benjamin, S. Endo, K. Fujii, J. R. McClean,
609
+ K. Mitarai, X. Yuan, L. Cincio, et al., “Variational quantum algorithms,” Nature Reviews
610
+ Physics, vol. 3, no. 9, pp. 625–644, 2021.
611
+ [5] V. Mnih, K. Kavukcuoglu, D. Silver, A. A. Rusu, J. Veness, M. G. Bellemare, A. Graves,
612
+ M. Riedmiller, A. K. Fidjeland, G. Ostrovski, et al., “Human-level control through deep
613
+ reinforcement learning,” nature, vol. 518, no. 7540, pp. 529–533, 2015.
614
+ [6] D. Silver, J. Schrittwieser, K. Simonyan, I. Antonoglou, A. Huang, A. Guez, T. Hubert,
615
+ L. Baker, M. Lai, A. Bolton, et al., “Mastering the game of go without human knowledge,”
616
+ nature, vol. 550, no. 7676, pp. 354–359, 2017.
617
+ [7] S. Y.-C. Chen, C.-H. H. Yang, J. Qi, P.-Y. Chen, X. Ma, and H.-S. Goan, “Variational
618
+ quantum circuits for deep reinforcement learning,” IEEE Access, vol. 8, pp. 141007–141024,
619
+ 2020.
620
+ [8] O. Lockwood and M. Si, “Reinforcement learning with quantum variational circuit,” in Pro-
621
+ ceedings of the AAAI Conference on Artificial Intelligence and Interactive Digital Entertain-
622
+ ment, vol. 16, pp. 245–251, 2020.
623
+ [9] A. Skolik, S. Jerbi, and V. Dunjko, “Quantum agents in the gym: a variational quantum
624
+ algorithm for deep q-learning,” Quantum, vol. 6, p. 720, 2022.
625
+ [10] S. Jerbi, C. Gyurik, S. Marshall, H. J. Briegel, and V. Dunjko, “Variational quantum policies
626
+ for reinforcement learning,” arXiv preprint arXiv:2103.05577, 2021.
627
+ [11] J.-Y. Hsiao, Y. Du, W.-Y. Chiang, M.-H. Hsieh, and H.-S. Goan, “Unentangled quantum
628
+ reinforcement learning agents in the openai gym,” arXiv preprint arXiv:2203.14348, 2022.
629
+ [12] N. Meyer, C. Ufrecht, M. Periyasamy, D. D. Scherer, A. Plinge, and C. Mutschler, “A survey
630
+ on quantum reinforcement learning,” arXiv preprint arXiv:2211.03464, 2022.
631
+ [13] D. Dong, C. Chen, H. Li, and T.-J. Tarn, “Quantum reinforcement learning,” IEEE Transac-
632
+ 17
633
+
634
+ tions on Systems, Man, and Cybernetics, Part B (Cybernetics), vol. 38, no. 5, pp. 1207–1220,
635
+ 2008.
636
+ [14] S. Wiedemann, D. Hein, S. Udluft, and C. Mendl, “Quantum policy iteration via amplitude
637
+ estimation and grover search–towards quantum advantage for reinforcement learning,” arXiv
638
+ preprint arXiv:2206.04741, 2022.
639
+ [15] A. Sannia, A. Giordano, N. L. Gullo, C. Mastroianni, and F. Plastina, “A hybrid classical-
640
+ quantum approach to speed-up q-learning,” arXiv preprint arXiv:2205.07730, 2022.
641
+ [16] E. A. Cherrat, I. Kerenidis, and A. Prakash, “Quantum reinforcement learning via policy
642
+ iteration,” arXiv preprint arXiv:2203.01889, 2022.
643
+ [17] S.
644
+ Y.-C.
645
+ Chen,
646
+ “Quantum
647
+ deep
648
+ recurrent
649
+ reinforcement
650
+ learning,”
651
+ arXiv
652
+ preprint
653
+ arXiv:2210.14876, 2022.
654
+ [18] C.-C. CHEN, K. SHIBA, M. SOGABE, K. SAKAMOTO, and T. SOGABE, “Hybrid
655
+ quantum-classical ulam-von neumann linear solver-based quantum dynamic programing al-
656
+ gorithm,” Proceedings of the Annual Conference of JSAI, vol. JSAI2020, pp. 2K6ES203–
657
+ 2K6ES203, 2020.
658
+ [19] D. Heimann, H. Hohenfeld, F. Wiebe, and F. Kirchner, “Quantum deep reinforcement learning
659
+ for robot navigation tasks,” arXiv preprint arXiv:2202.12180, 2022.
660
+ [20] S. Jerbi, A. Cornelissen, M. Ozols, and V. Dunjko, “Quantum policy gradient algorithms,”
661
+ arXiv preprint arXiv:2212.09328, 2022.
662
+ [21] N. Meyer, D. D. Scherer, A. Plinge, C. Mutschler, and M. J. Hartmann, “Quantum policy
663
+ gradient algorithm with optimized action decoding,” arXiv preprint arXiv:2212.06663, 2022.
664
+ [22] M. Schenk, E. F. Combarro, M. Grossi, V. Kain, K. S. B. Li, M.-M. Popa, and S. Vallecorsa,
665
+ “Hybrid actor-critic algorithm for quantum reinforcement learning at cern beam lines,” arXiv
666
+ preprint arXiv:2209.11044, 2022.
667
+ [23] Q. Lan, “Variational quantum soft actor-critic,” arXiv preprint arXiv:2112.11921, 2021.
668
+ [24] A. Acuto, P. Barill`a, L. Bozzolo, M. Conterno, M. Pavese, and A. Policicchio, “Variational
669
+ quantum soft actor-critic for robotic arm control,” arXiv preprint arXiv:2212.11681, 2022.
670
+ [25] A. Sequeira, L. P. Santos, and L. S. Barbosa, “Variational quantum policy gradients with an
671
+ application to quantum control,” arXiv preprint arXiv:2203.10591, 2022.
672
+ [26] W. J. Yun, Y. Kwak, J. P. Kim, H. Cho, S. Jung, J. Park, and J. Kim, “Quantum
673
+ multi-agent reinforcement learning via variational quantum circuit design,” arXiv preprint
674
+ 18
675
+
676
+ arXiv:2203.10443, 2022.
677
+ [27] R. Yan, Y. Wang, Y. Xu, and J. Dai, “A multiagent quantum deep reinforcement learn-
678
+ ing method for distributed frequency control of islanded microgrids,” IEEE Transactions on
679
+ Control of Network Systems, vol. 9, no. 4, pp. 1622–1632, 2022.
680
+ [28] W. J. Yun, J. Park, and J. Kim, “Quantum multi-agent meta reinforcement learning,” arXiv
681
+ preprint arXiv:2208.11510, 2022.
682
+ [29] S. Y.-C. Chen, C.-M. Huang, C.-W. Hsing, H.-S. Goan, and Y.-J. Kao, “Variational quan-
683
+ tum reinforcement learning via evolutionary optimization,” Machine Learning: Science and
684
+ Technology, vol. 3, no. 1, p. 015025, 2022.
685
+ [30] S. Wu, S. Jin, D. Wen, and X. Wang, “Quantum reinforcement learning in continuous action
686
+ space,” arXiv preprint arXiv:2012.10711, 2020.
687
+ [31] R. S. Sutton and A. G. Barto, Reinforcement learning: An introduction. MIT press, 2018.
688
+ [32] R. J. Williams, “Simple statistical gradient-following algorithms for connectionist reinforce-
689
+ ment learning,” Machine learning, vol. 8, no. 3-4, pp. 229–256, 1992.
690
+ [33] V. Mnih, A. P. Badia, M. Mirza, A. Graves, T. Lillicrap, T. Harley, D. Silver, and
691
+ K. Kavukcuoglu, “Asynchronous methods for deep reinforcement learning,” in International
692
+ conference on machine learning, pp. 1928–1937, PMLR, 2016.
693
+ [34] S. Y.-C. Chen, C.-M. Huang, C.-W. Hsing, and Y.-J. Kao, “An end-to-end trainable hy-
694
+ brid classical-quantum classifier,” Machine Learning: Science and Technology, vol. 2, no. 4,
695
+ p. 045021, 2021.
696
+ [35] J. Qi, C.-H. H. Yang, and P.-Y. Chen, “Qtn-vqc: An end-to-end learning framework for
697
+ quantum neural networks,” arXiv preprint arXiv:2110.03861, 2021.
698
+ [36] K. Mitarai, M. Negoro, M. Kitagawa, and K. Fujii, “Quantum circuit learning,” Physical
699
+ Review A, vol. 98, no. 3, p. 032309, 2018.
700
+ [37] M. Chehimi and W. Saad, “Quantum federated learning with quantum data,” in ICASSP
701
+ 2022-2022 IEEE International Conference on Acoustics, Speech and Signal Processing
702
+ (ICASSP), pp. 8617–8621, IEEE, 2022.
703
+ [38] S. Y.-C. Chen and S. Yoo, “Federated quantum machine learning,” Entropy, vol. 23, no. 4,
704
+ p. 460, 2021.
705
+ [39] C.-H. H. Yang, J. Qi, S. Y.-C. Chen, P.-Y. Chen, S. M. Siniscalchi, X. Ma, and C.-H. Lee,
706
+ “Decentralizing feature extraction with quantum convolutional neural network for automatic
707
+ 19
708
+
709
+ speech recognition,” in ICASSP 2021-2021 IEEE International Conference on Acoustics,
710
+ Speech and Signal Processing (ICASSP), pp. 6523–6527, IEEE, 2021.
711
+ [40] C.-H. H. Yang, J. Qi, S. Y.-C. Chen, Y. Tsao, and P.-Y. Chen, “When bert meets quan-
712
+ tum temporal convolution learning for text classification in heterogeneous computing,” in
713
+ ICASSP 2022-2022 IEEE International Conference on Acoustics, Speech and Signal Process-
714
+ ing (ICASSP), pp. 8602–8606, IEEE, 2022.
715
+ [41] R. Di Sipio, J.-H. Huang, S. Y.-C. Chen, S. Mangini, and M. Worring, “The dawn of quan-
716
+ tum natural language processing,” in ICASSP 2022-2022 IEEE International Conference on
717
+ Acoustics, Speech and Signal Processing (ICASSP), pp. 8612–8616, IEEE, 2022.
718
+ [42] S. Y.-C. Chen, S. Yoo, and Y.-L. L. Fang, “Quantum long short-term memory,” in
719
+ ICASSP 2022-2022 IEEE International Conference on Acoustics, Speech and Signal Process-
720
+ ing (ICASSP), pp. 8622–8626, IEEE, 2022.
721
+ [43] S. Y.-C. Chen, D. Fry, A. Deshmukh, V. Rastunkov, and C. Stefanski, “Reservoir computing
722
+ via quantum recurrent neural networks,” arXiv preprint arXiv:2211.02612, 2022.
723
+ [44] S. Y.-C. Chen, T.-C. Wei, C. Zhang, H. Yu, and S. Yoo, “Quantum convolutional neural
724
+ networks for high energy physics data analysis,” Physical Review Research, vol. 4, no. 1,
725
+ p. 013231, 2022.
726
+ [45] G. Brockman, V. Cheung, L. Pettersson, J. Schneider, J. Schulman, J. Tang, and W. Zaremba,
727
+ “Openai gym,” arXiv preprint arXiv:1606.01540, 2016.
728
+ [46] M. Chevalier-Boisvert, L. Willems, and S. Pal, “Minimalistic gridworld environment for openai
729
+ gym.” https://github.com/maximecb/gym-minigrid, 2018.
730
+ [47] V. Bergholm, J. Izaac, M. Schuld, C. Gogolin, C. Blank, K. McKiernan, and N. Killoran, “Pen-
731
+ nylane: Automatic differentiation of hybrid quantum-classical computations,” arXiv preprint
732
+ arXiv:1811.04968, 2018.
733
+ 20
734
+
B9E4T4oBgHgl3EQfeA2w/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
C9E0T4oBgHgl3EQfQQB9/content/2301.02190v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:74997de1f465b85232df4d694855acbb614c063b0502ed876800c2fb5b34f7a3
3
+ size 298396
C9E0T4oBgHgl3EQfQQB9/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:798afb9aa34324f9b3af7a1ae2cec1f093919ffd7dd2918ccf7741d6f5d65900
3
+ size 4194349
C9E0T4oBgHgl3EQfQQB9/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:9312ec1be0fe835b1953be2fcdfaf304a25a9515a605f15c16f5e278d5e319dd
3
+ size 158384
C9E1T4oBgHgl3EQf-AYx/content/tmp_files/2301.03562v1.pdf.txt ADDED
@@ -0,0 +1,898 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ arXiv:2301.03562v1 [math.FA] 9 Jan 2023
2
+ (Non-)amenability of B(E) and Banach space geometry
3
+ Matthew Daws and Matthias Neufang
4
+ Abstract
5
+ Let E be a Banach space, and B(E) the algebra of all bounded linear operators on E. The question
6
+ of amenability of B(E) goes back to Johnson’s seminal memoir [39] from 1972. We present the first
7
+ general criteria applying to very wide classes of Banach spaces, given in terms of the Banach space
8
+ geometry of E, which imply that B(E) is non-amenable. We cover all spaces for which this is known so
9
+ far (with the exception of one particular example), with much shorter proofs, such as ℓp for p ∈ [1, ∞]
10
+ and c0, but also many new spaces: the numerous classes of spaces covered range from all Lp-spaces
11
+ for p ∈ (1, ∞) to Lorentz sequence spaces and reflexive Orlicz sequence spaces, to the Schatten classes
12
+ Sp for p ∈ [1, ∞], and to the James space J, the Schlumprecht space S, and the Tsirelson space T ,
13
+ among others. Our approach also highlights the geometric difference to the only space for which B(E)
14
+ is known to be amenable, the Argyros–Haydon space, which solved the famous scalar-plus-compact
15
+ problem.
16
+ 1
17
+ Introduction
18
+ Amenability of Banach algebras is a central notion in functional analysis; cf., e.g., [56, 59]. We mention
19
+ Johnson’s fundamental result [39] that a locally compact group G is amenable if and only if its group
20
+ algebra L1(G) is amenable. Amenability is also a key concept in operator algebra theory. We note the
21
+ deep classical result, due to Connes [21], Bunce–Paschke [14] and Haagerup [38], that for C∗-algebras,
22
+ amenability is equivalent to nuclearity (the forward implication is due to Connes and Bunce–Paschke).
23
+ Together with work of Wassermann [66], it follows that the algebra B(H) of all bounded linear operators
24
+ on a Hilbert space H is non-amenable. However, it was a long-standing open problem whether this holds
25
+ for B(ℓp) for all p ∈ [1, ∞]. Indeed, Johnson already asked in 1972 in [39], where he introduced the very
26
+ notion of amenability, whether B(E) is ever amenable for an infinite-dimensional Banach space E. Since
27
+ then, determining if B(E) is amenable or not for a given infinite-dimensional Banach space E, has proven
28
+ a very difficult open problem; cf. the survey article [58].
29
+ Let us briefly recall the history of this problem. For many years, ℓ2 remained the only space for
30
+ which the problem was solved. Then Read showed in [54] that B(ℓ1) is non-amenable. His proof was
31
+ simplified by Pisier in [51], using expanders, and further simplified by Ozawa in [47], where also a proof
32
+ of non-amenability of B(ℓ2) is given avoiding the use of the above results of Connes, Bunce–Paschke and
33
+ Wassermann. Moreover, it is shown by Ozawa in [47] that B(ℓ∞) and (implicitly) B(c0) are not amenable.
34
+ However, the case of B(ℓp) for p ∈ (1, ∞)\{2} remained open, as noted by Ozawa in [47], by Pisier in [51],
35
+ and by Read in [54]. In [57], Runde finally established the celebrated result that B(ℓp) is not amenable
36
+ for any p ∈ (1, ∞), through a technically involved proof, building in particular on his earlier work with
37
+ Daws ([26], [27]) and on Ozawa’s work. More generally, it is shown in [57] that B(ℓp(E)) is non-amenable
38
+ for all Lp-spaces E, where p ∈ (1, ∞). Moreover, Choi shows in [19] that B(L1[0, 1]) is non-amenable;
39
+ this is also proven by Aldabbas in [2]. Further, Choi gives a criterion, applying to E = T (ℓ2), the trace
40
+ class operators on ℓ2, showing that B(E) is not amenable; see Remark 4.19 below. However, as noted by
41
+ Dales (cf. [57, Corollary 2.5]), the Argyros–Haydon space, which solved the famous scalar-plus-compact
42
+ problem, provides an example of an infinite-dimensional space E such that B(E) is amenable. Note that
43
+ this space is a hereditarily indecomposable L∞-space.
44
+ 1
45
+
46
+ In this paper, we develop entirely different methods from the ones used so far and establish, employing
47
+ our new techniques, the first general principles which encode non-amenability of B(E), for very wide classes
48
+ of spaces E, in terms of the Banach space geometry of E. For instance, we show that if E is reflexive
49
+ with the approximation property and isomorphic to its square, then B(E) is non-amenable. We also show
50
+ that if E is infinite-dimensional and reflexive with a subsymmetric basis, then B(E) is non-amenable.
51
+ Our results cover all spaces known so far (with the exception of one particular example, cf. Remark 4.19
52
+ below), with much shorter proofs, and many new (classes of) spaces. The following is a list of spaces E
53
+ – obviously always assumed infinite-dimensional – for which we show that B(E) is non-amenable, as a
54
+ result of our general approach (we write “∼=” to denote a Banach space isomorphism):
55
+ 1. all Lp(Ω, B, µ)-spaces and, more generally, all Lp spaces for p ∈ (1, ∞) – this generalises the main
56
+ result of [57];
57
+ 2. the Lorentz sequence spaces d(w, p), the Garling sequence spaces g(w, p), and the Baernstein spaces
58
+ Bp, for all p ∈ (1, ∞);
59
+ 3. all reflexive Orlicz sequence spaces whose Orlicz function satisfies the ∆2 condition at 0;
60
+ 4. all separable reflexive rearrangement invariant (r.i.) function spaces;
61
+ 5. the Schatten classes Sp for all p ∈ [1, ∞];
62
+ 6. the non-commutative Lp-spaces Lp(M) for all p ∈ [2, ∞), whenever M is an infinite-dimensional
63
+ von Neumann algebra such that Lp(M) has the approximation property;
64
+ 7. c0, ℓ1, ℓ∞;
65
+ 8. the non-commutative counterparts of the above, i.e., the spaces K(H), T (H) and B(H) of compact,
66
+ trace class and all bounded linear operators on a separable Hilbert space H, and, more generally,
67
+ K(ℓp), N(ℓp) and B(ℓp) for all p ∈ (1, ∞);
68
+ 9. C(K) for any infinite compact metric space K (that is, all separable C(K) spaces), and all separable
69
+ L1(Ω, B, µ)-spaces (note that L∞[0, 1] ∼= ℓ∞, so this space is covered as well);
70
+ 10. the Hardy spaces Hp for all p ∈ [1, ∞) (note that Hp ∼= Lp[0, 1] for p ∈ (1, ∞));
71
+ 11. the vector-valued spaces Lp(µ, X) for all p ∈ (1, ∞), for σ-finite µ with Lp(µ) infinite-dimensional,
72
+ whenever X∗ has the bounded approximation property and the Radon-Nikodym Property (for ex-
73
+ ample, X is reflexive with the approximation property);
74
+ 12. the vector-valued spaces C(K, X) for any infinite compact metric space K, whenever X∗ has the
75
+ bounded approximation property and the Radon-Nikodym Property;
76
+ 13. particular spaces such as the James space J, the Schlumprecht space S, and the Tsirelson space T.
77
+ The paper is organized as follows. In Section 2, we first establish a result on a new hereditary property
78
+ of amenability which generalises a well-known theorem of Gourdeau and Ghahramani–Loy–Willis. From
79
+ this we shall derive, in Section 3, the general criteria for non-amenability of B(E) in the case of reflexive
80
+ spaces E. We treat the non-reflexive situation in Section 4. In the last Section, we present an alternative,
81
+ short proof of the non-amenability of B(ℓp) for all p ∈ (1, ∞] which uses operator algebra techniques
82
+ and harmonic analysis, instead of Banach space geometry. We also present an “elementary” proof of the
83
+ non-amenability of B(ℓ2), which has long been sought after: it is even shorter and of course avoids the
84
+ use of nuclearity for C∗-algebras.
85
+ 2
86
+
87
+ 2
88
+ A new hereditary property of amenability
89
+ The central idea of this paper is the following.
90
+ For a Banach space E, write A(E) for the space of
91
+ approximable operators, the norm closure of the finite-rank operators in B(E).
92
+ Write K(E) for the
93
+ compact operators on E. Often A(E) = K(E); this is true when E has the approximation property
94
+ (AP), [60, Chapter 4]. When E is reflexive with the AP, we can identify the bidual K(E)∗∗ with B(E),
95
+ where K(E)∗∗ is given the (first) Arens product.
96
+ Indeed, K(E) is Arens regular, and so both Arens
97
+ products agree. This result goes back to [48, Theorem 2], see also [24, Section 6], and in more generality,
98
+ [25]. Consequently, to study B(E), one might study the bidual of A = K(E). A well-known result in
99
+ this direction if that when A∗∗ is amenable, also A is amenable, a result shown by Gourdeau ([34], [35,
100
+ Theorem 2.3]) and, independently, Ghahramani–Loy–Willis [33, Theorem 1.8]. This result is not directly
101
+ useful to us, as K(E) is often amenable (cf. [11, 36]). We will thus substantially generalise this result
102
+ below, and this generalisation will be central to our new approach.
103
+ With this motivation outlined, we start with some generality, and consider a Banach algebra A and
104
+ its bidual A∗∗ equipped with the first Arens product. Let us recall the Arens products. We turn A∗, A∗∗
105
+ into A-bimodules in the usual way. We then define bilinear maps A∗∗ × A∗ → A∗, A∗ × A∗∗ → A∗ by
106
+ ⟨F · µ, a⟩ = ⟨F, µ · a⟩,
107
+ ⟨µ · F, a⟩ = ⟨F, a · µ⟩
108
+ (a ∈ A, µ ∈ A∗, F ∈ A∗∗).
109
+ We then define bilinear maps ✷, ✸ : A∗∗ × A∗∗ → A∗∗ by
110
+ ⟨F✷G, µ⟩ = ⟨F, G · µ⟩,
111
+ ⟨F✸G, µ⟩ = ⟨G, µ · F⟩
112
+ (F, G ∈ A∗∗, µ ∈ A∗).
113
+ Direct calculations show that these are Banach algebra products, the first and second Arens products,
114
+ respectively. The canonical map κA : A → A∗∗ is a homomorphism, and κA(a)✷F = a·F, F✷κA(a) = F·a,
115
+ and similarly for ✸. Henceforth, we always equip A∗∗ with ✷ unless otherwise stated.
116
+ Our first step, following [33], is to link A∗∗ �⊗A∗∗ with (A�⊗A)∗∗, where �⊗ denotes the completed
117
+ projective Banach space tensor product. We wish to use slightly more concrete identifications than [33],
118
+ and we shall hence identify (A�⊗A)∗ with B(A, A∗), say B(A, A∗) ∋ T ↔ ϕT ∈ (A�⊗A)∗ by
119
+ ⟨ϕT , a ⊗ b⟩ = ⟨T(a), b⟩
120
+ (a, b ∈ A).
121
+ (1)
122
+ Compare with [60, Section 2.2], for example. Define Ψ : A∗∗ �⊗A∗∗ → (A�⊗A)∗∗ by
123
+ ⟨Ψ(F ⊗ G), ϕT ⟩ = ⟨F, T ∗(G)⟩
124
+ (F, G ∈ A∗∗).
125
+ (2)
126
+ Clearly Ψ extends by bi-linearity and continuity to a contraction. Let us just check that this agrees with
127
+ [33, Lemma 1.7], so choose bounded nets (ai), (bj) in A converging weak∗ to F, G ∈ A∗∗, respectively.
128
+ Then
129
+ ⟨Ψ(F ⊗ G), ϕT ⟩ = ⟨F, T ∗(G)⟩ = lim
130
+ i ⟨T ∗(G), ai⟩ = lim
131
+ i lim
132
+ j ⟨T(ai), bj⟩ = lim
133
+ i lim
134
+ j ⟨ϕT , ai ⊗ bj⟩,
135
+ which is the same extension given by [33, Lemma 1.6] (cf. [5, §3]).
136
+ We now record some useful facts about this map.
137
+ Proposition 2.1 ([33, Lemma 1.7]). We have the following commutative diagram
138
+ A∗∗ �⊗A∗∗
139
+ Ψ
140
+ � (A�⊗A)∗∗
141
+ A�⊗A
142
+ ��
143
+ κA⊗κA
144
+
145
+ ��
146
+ κA �
147
+ ⊗A
148
+ �q
149
+ q
150
+ q
151
+ q
152
+ q
153
+ q
154
+ q
155
+ q
156
+ q
157
+ q
158
+ With πA : A�⊗A → A the product map, and similarly for πA∗∗, we have that (πA)∗∗ ◦ Ψ = πA∗∗. Further-
159
+ more, Ψ is an A-bimodule map.
160
+ 3
161
+
162
+ An obvious, but key, property is that A(E) is always an ideal in B(E). We abstract this idea as follows.
163
+ Firstly identify A with κA(A) ⊆ A∗∗. Suppose that B ⊆ A∗∗ is some closed subalgebra containing A as
164
+ an ideal; we write A ✂ B ⊆ A∗∗. As A is an ideal in B, naturally A is a B-bimodule, and hence also A�⊗A
165
+ is a B-bimodule. In the standard way, hence also A∗ and A∗∗, so also A∗∗ �⊗A∗∗, and (A�⊗A)∗∗, become
166
+ B-bimodules. However, as B ⊆ A∗∗, also A∗∗ and A∗ have B-actions for the restriction of the A∗∗ actions.
167
+ Lemma 2.2. The two B actions on A∗ agree, while the left action of B on A∗∗ agrees with ✸, and the
168
+ right action of B on A∗∗ agrees with ✷.
169
+ Proof. In this proof, to avoid confusion, let us write b ⊲ a and a ⊳ b for a ∈ A, b ∈ B, to denote the
170
+ B-bimodule actions arising from viewing A as an ideal in B, and similarly for the actions of B on A∗ and
171
+ A∗∗. Given b ∈ B, a ∈ A, µ ∈ A∗, we find that
172
+ ⟨b ⊲ µ, a⟩ = ⟨µ, a ⊳ b⟩ = ⟨a · b, µ⟩ = ⟨b, µ · a⟩ = ⟨b · µ, a⟩,
173
+ and so b ⊲ µ = b · µ. To be precise, when we write “a · b” we are considering b ∈ A∗∗ and the natural A
174
+ action on A∗∗; similarly b · µ is the A∗∗ action on A∗ where we view B as a subalgebra of A∗∗.
175
+ Similarly
176
+ ⟨µ ⊳ b, a⟩ = ⟨µ, b ⊲ a⟩ = ⟨b · a, µ⟩ = ⟨b, a · µ⟩ = ⟨µ · b, a⟩,
177
+ so that µ ⊳ b = µ · b.
178
+ Then, given b ∈ B, F ∈ A∗∗, µ ∈ A∗, we have
179
+ ⟨b ⊲ F, µ⟩ = ⟨F, µ ⊳ b⟩ = ⟨F, µ · b⟩ = ⟨b✸F, µ⟩,
180
+ ⟨F ⊳ b, µ⟩ = ⟨F, b ⊲ µ⟩ = ⟨F, b · µ⟩ = ⟨F✷b, µ⟩,
181
+ as claimed.
182
+ As both A∗∗ �⊗A∗∗ and (A�⊗A)∗∗ are B-bimodules, we might ask if Ψ is a B-bimodule map. Again, the
183
+ situation is slightly complicated as both Arens products arise.
184
+ Lemma 2.3. Given b ∈ B and F, G ∈ A∗∗ we have
185
+ b · Ψ(F ⊗ G) = Ψ(b✸F ⊗ G),
186
+ Ψ(F ⊗ G) · b = Ψ(F ⊗ G✷b).
187
+ Proof. Again, we identify T ∈ B(A, A∗) with ϕT ∈ (A�⊗A)∗ as in (1), and in the proof we continue to
188
+ write ⊲, ⊳ for the B-bimodule actions. For b ∈ B, a1, a2 ∈ A,
189
+ ⟨b ⊲ ϕT , a1 ⊗ a2⟩ = ⟨ϕT , a1 ⊗ a2 ⊳ b⟩ = ⟨T(a1), a2 ⊳ b⟩ = ⟨b ⊲ T(a1), a2⟩,
190
+ ⟨ϕT ⊳ b, a1 ⊗ a2⟩ = ⟨ϕT , b ⊲ a1 ⊗ a2⟩ = ⟨T(b ⊲ a1), a2⟩.
191
+ Set b ⊲ ϕT = ϕT1 and ϕT ⊳ b = ϕT2, so that T1(a1) = b ⊲ T(a1) and T2(a1) = T(b ⊲ a1). Then, for G ∈ A∗∗,
192
+ ⟨T ∗
193
+ 1 (G), a1⟩ = ⟨G, b ⊲ T(a1)⟩ = ⟨T ∗(G ⊳ b), a1⟩,
194
+ ⟨T ∗
195
+ 2 (G), a1⟩ = ⟨G, T(b ⊲ a1)⟩ = ⟨T ∗(G), b ⊲ a1⟩ = ⟨T ∗(G) ⊳ b, a1⟩.
196
+ Then, for F, G ∈ A∗∗, from (2), and using Lemma 2.2,
197
+ ⟨b · Ψ(F ⊗ G), ϕT ⟩ = ⟨Ψ(F ⊗ G), ϕT2⟩ = ⟨F, T ∗
198
+ 2 (G)⟩ = ⟨F, T ∗(G) ⊳ b⟩ = ⟨Ψ(b✸F ⊗ G), ϕT ⟩,
199
+ ⟨Ψ(F ⊗ G) · b, ϕT ⟩ = ⟨Ψ(F ⊗ G), ϕT1⟩ = ⟨F, T ∗
200
+ 1 (G)⟩ = ⟨F, T ∗(G ⊳ b)⟩ = ⟨Ψ(F ⊗ G✷b), ϕT ⟩,
201
+ as claimed.
202
+ 4
203
+
204
+ We write Zt(A∗∗) for the (first) topological centre (denoted by Z(1)
205
+ t
206
+ (A∗∗) in [24, 25]), that is,
207
+ Zt(A∗∗) = {F ∈ A∗∗ : F✷G = F✸G (G ∈ A∗∗)}.
208
+ The following is now immediate from Lemmas 2.2 and 2.3.
209
+ Corollary 2.4. Let A ✂ B ⊆ A∗∗ and suppose that B ⊆ Zt(A∗∗). Then the B-bimodule actions on A∗∗
210
+ agree with the product ✷, and Ψ is a B-bimodule map.
211
+ We now state and prove the main result of this Section, which shows that amenability of A∗∗ (or more
212
+ generally a subalgebra) passes to B when A ✂ B. This generalises [35, Theorem 2.3] and [33, Theorem
213
+ 1.8], where the statement is shown for the special case B = A and C = A∗∗.
214
+ Theorem 2.5. Let A✂B ⊆ A∗∗ and suppose that B ⊆ Zt(A∗∗). Let C ⊆ A∗∗ be a closed subalgebra which
215
+ is amenable, with B ⊆ C. Then B is amenable.
216
+ Proof. The canonical maps
217
+ A�⊗A → B�⊗B → C �⊗C → A∗∗ �⊗A∗∗
218
+ are all contractions, but the overall composition is an isometry, [60, Corollary 2.14], and so each individual
219
+ map must also be an isometry, and we identify each tensor product as a closed subspace of A∗∗ �⊗A∗∗. As
220
+ B ⊆ Zt(A∗∗), Lemma 2.2 shows that each inclusion is also a B-bimodule map.
221
+ As C is amenable, [56, Theorem 2.2.4] or [59, Theorem 2.2.5], it has a bounded approximate diagonal
222
+ (di) ⊆ C �⊗C ⊆ A∗∗ �⊗A∗∗, that is,
223
+ ∥c · di − di · c∥ → 0,
224
+ ∥πC(di)✷c − c∥ → 0
225
+ (c ∈ C).
226
+ (3)
227
+ For each i let ni = Ψ(di) ∈ (A�⊗A)∗∗. As B ⊆ C, (3) holds for each member of B, and so it follows from
228
+ Corollary 2.4 that for each b ∈ B,
229
+ ∥b · ni − ni · b∥ = ∥Ψ(b · di) − Ψ(di · b)∥ ≤ ∥b · di − di · b∥ → 0,
230
+ (4)
231
+ ∥(πA)∗∗(ni)✷b − b∥ = ∥(πA)∗∗(Ψ(di))✷b − b∥ = ∥πA∗∗(di)✷b − b∥ = ∥πC(di)✷b − b∥ → 0,
232
+ (5)
233
+ the second claim using Proposition 2.1.
234
+ The bi-adjoint of the inclusion A�⊗A → B�⊗B gives an (isometric) inclusion (A�⊗A)∗∗ → (B�⊗B)∗∗.
235
+ For each i let mi be the image of ni in (B�⊗B)∗∗, and let m ∈ (B�⊗B)∗∗ be a weak∗-cluster point of the
236
+ bounded net (mi). As the B-bimodule actions on (B�⊗B)∗∗ are weak∗-continuous, it follows from (4) that
237
+ b · m = m · b for each b ∈ B. As A is a subalgebra of B, it follows that (πB)∗∗(mi) = (πA)∗∗(ni) for each
238
+ i, and so (5) shows that (πB)∗∗(m)✷b = b for each b ∈ B. That is, m is a virtual diagonal for B, showing
239
+ that B is amenable, [56, Theorem 2.2.4] or [59, Theorem 2.2.5].
240
+ We immediately obtain the following
241
+ Corollary 2.6. Let A ✂ B ⊆ A∗∗ and suppose that A is Arens regular. If A∗∗ is amenable, then so is B.
242
+ 3
243
+ The general criteria in the reflexive case, and applications
244
+ In this Section, we apply Theorem 2.5 in the classical situation when E is reflexive with the AP. As
245
+ explained above, it follows that if we set A = A(E) then A = K(E) and A∗∗ is isomorphic to B(E). As
246
+ A is Arens regular in this case, the condition on Zt(A∗∗) is vacuous; see Corollary 2.6. Our aim is to use
247
+ contradiction to show that B(E) cannot be amenable, by applying Corollary 2.6 to a suitable algebra B
248
+ which is “obviously” not amenable. Our technique for finding such B is the following idea which, combined
249
+ with Theorem 2.5 or Corollary 2.6, is key to our simplified approach.
250
+ 5
251
+
252
+ Proposition 3.1. Let E be a Banach space, and suppose there exists T ∈ B(E) which is not compact,
253
+ but with T 2 ∈ K(E). Let B be the Banach algebra generated by K(E) and T. Then B is the linear span
254
+ of K(E) and T, and B is not amenable.
255
+ Proof. As T 2 ∈ K(E) it is easy to see that B is the linear span of K(E) and T. Consider the quotient
256
+ algebra C = B/K(E), and let x be the image of T in this quotient. As T is non-compact, x ̸= 0, but x2 = 0
257
+ as T 2 is compact. Thus C is the one-dimensional algebra spanned by x. As C is obviously not unital, it
258
+ cannot be amenable. Thus B also cannot be amenable, as amenability passes to quotient algebras.
259
+ Corollary 3.2. Let E be a reflexive Banach space with the AP such that there exists T ∈ B(E) which is
260
+ not compact, but with T 2 ∈ K(E). Then B(E) is not amenable.
261
+ Proof. This follows from Corollary 2.6 applied with A = A(E), so that A∗∗ = B(E), and with B as in
262
+ Proposition 3.1.
263
+ Theorem 3.3. Let E be a reflexive Banach space with the AP such that E ∼= E0 ⊕ E1 with E0, E1
264
+ isomorphic as Banach spaces. When E is infinite-dimensional, B(E) is not amenable.
265
+ Proof. Let T ∈ B(E) be the composition of the projection from E onto E0, the isomorphism from E0
266
+ to E1, and the inclusion E1 → E. Then T 2 = 0. As E is infinite dimensional, so are E0, E1, and hence
267
+ T is not compact. Indeed, by the Riesz Lemma, we can find a sequence of unit vectors (xn) in E0 with
268
+ ∥xn − xm∥ ≥ 1/2 for n ̸= m. Treating E0 ⊆ E, we have that (T(xn)) is a bounded sequence of vectors,
269
+ with ∥T(xn) − T(xm)∥ ≥ c/2 for each n ̸= m, where c > 0 is a constant depending on the isomorphisms
270
+ E ∼= E0 ⊕ E1 and E0 ∼= E1. Thus T cannot be compact. The result then follows from Corollary 3.2.
271
+ Corollary 3.4. Let E be a reflexive Banach space with the AP. If E ∼= E ⊕E then B(E) is not amenable.
272
+ For the definition of tree translation equivalent Banach spaces used below, we refer the reader to [10,
273
+ Section 4]. This technical definition is useful to us precisely because it allows us to prove the following.
274
+ Corollary 3.5. Let E be a reflexive, tree translation equivalent Banach space. Then B(E) is not amenable.
275
+ Proof. By assumption, E has a tree translation equivalent basis, so in particular has a basis and hence
276
+ has the AP, and by [10, Theorem 4.6], satisfies E ∼= E ⊕ E. Corollary 3.4 now yields the claim.
277
+ Generalising the above idea, we obtain the following.
278
+ Theorem 3.6. Let E be a reflexive Banach space with the AP, such that there exist closed, infinite-
279
+ dimensional, isomorphic subspaces E0 and E1, and a projection P from E onto E0 with P(E1) finite-
280
+ dimensional. Then B(E) is not amenable.
281
+ Proof. Let T0 : E0 → E1 be an isomorphism, let P : E → E0 be a projection, and set T = T0P : E →
282
+ E1 ⊆ E. As PT0P(x) ∈ P(E1) for any x ∈ E, and as P(E1) is finite-dimensional, PT0P is compact,
283
+ and so T 2 is compact. As T(x) = T0(x) for each x ∈ E0, and as E0 is infinite-dimensional, and T0 an
284
+ isomorphism, it follows that T is not compact. The result now follows from Corollary 3.2.
285
+ For the next result, recall the notion of a subsymmetric basis, [46, Definition 3.a.2], which is an
286
+ unconditional basis (en) such that (eni) is equivalent to (en) for all increasing sequences (ni).
287
+ Corollary 3.7. Let E be a reflexive Banach space with the AP. If E has an infinite-dimensional com-
288
+ plemented subspace with a subsymmetric basis, then B(E) is not amenable.
289
+ In particular, if E is an
290
+ infinite-dimensional reflexive Banach space with a subsymmetric basis, then B(E) is not amenable.
291
+ 6
292
+
293
+ Proof. Let (ei) be the subsymmetric basis of the infinite-dimensional complemented subspace X. Put
294
+ E0 := lin{e2i | i ∈ N} and E1 := lin{e2i−1 | i ∈ N}. As (ei) is subsymmetric, by definition the map
295
+ ei �→ e2i extends linearly and continuously to an isomorphism between E and E0; similarly E and E1 are
296
+ isomorphic, whence also E0 ∼= E1. As X is complemented, we have a projection P from E onto X. As (ei)
297
+ is unconditional, we have a projection Q from X onto E0. Obviously, QP(E) = E0 and QP(E1) = {0}.
298
+ By Theorem 3.6, we obtain that B(E) is non-amenable.
299
+ We now apply the above results to various classes of Banach spaces. We start with Lp-spaces; for
300
+ details on this very important class of spaces, we refer the reader to [3, Section 5] or [44, 45]. We use [28,
301
+ Section 23] below, which takes a different definition, but [28, Section 23.3] shows that the latter covers
302
+ the Lp-spaces.
303
+ Corollary 3.8. Let E be any infinite-dimensional Lp-space, where p ∈ (1, ∞); for instance, E is any
304
+ infinite-dimensional Lp(Ω, B, µ) space. Then B(E) is not amenable.
305
+ Proof. Let E be an Lp-space, for p ∈ (1, ∞). By [44, Theorem 7.1], E is isomorphic to a complemented
306
+ subspace of an Lp space, so certainly reflexive. Further, by [28, Section 21.6, Corollary 1], taking account
307
+ of the aforementioned [28, Section 23.3], E has the bounded approximation property. Finally, by [44,
308
+ Proposition 7.3], E contains a complemented subspace isomorphic to ℓp. As ℓp has a symmetric basis,
309
+ Corollary 3.7 yields the claim.
310
+ Remark 3.9. The above corollary generalises [57, Theorem 4.4], the main result of [57], and provides
311
+ a much shorter proof. More precisely, it is shown in [57, Theorem 4.4] that B(ℓp(E)) is non-amenable
312
+ for any Lp-space E. We note that ℓp(E) is again an Lp- or an L2-space. Indeed, E is isomorphic to
313
+ a complemented subspace of some Lp-space, by [45, Corollary 1]. Hence, ℓp(E) is also isomorphic to a
314
+ complemented subspace of some Lp-space. Thus, ℓp(E) is an Lp- or an L2-space, by [45, Corollary 1].
315
+ (See also the introduction to [3, Section 5].)
316
+ The Baernstein space B2 was introduced by Baernstein in [8], and the p generalisations Bp by Seifert
317
+ in his dissertation [63]. They are now viewed as being strongly related to Tsirelson’s space, see [16].
318
+ Corollary 3.10. The Baernstein spaces Bp satisfy that B(Bp) is non-amenable for all p ∈ (1, ∞).
319
+ Proof. Each Bp is reflexive and has a basis, hence the AP, and contains a complemented subspace iso-
320
+ morphic to ℓp; cf. [16, Theorem 0.15]. As above, the claim now follows from Corollary 3.7.
321
+ We now consider the most fundamental examples of non-commutative Lp spaces, namely the Schatten
322
+ classes Sp. Recall that Sp is the collection of operators u in B(ℓ2) with Tr(|u|p) < ∞, and norm ∥u∥p =
323
+ Tr(|u|p)1/p. For p ∈ (1, ∞), Sp is reflexive (having canonically dual Sq for 1
324
+ p + 1
325
+ q = 1). Letting Pn ∈ B(ℓ2)
326
+ be the projection onto the first n coordinates, we have that PnuPn ∈ Sp for each u ∈ Sp, with ∥PnuPn∥p ≤
327
+ ∥u∥p. Further, PnuPn → u is norm, hence showing that Sp has the (metric) approximation property.
328
+ Corollary 3.11. For p ∈ (1, ∞) the Schatten class Sp satisfies that B(Sp) is not amenable.
329
+ Proof. The operation of projecting an operator in B(ℓ2) onto its diagonal restricts to Sp and gives a
330
+ projection of Sp onto a subspace isomorphic to ℓp, see the discussion in [4, pages 84–85] for example. The
331
+ claim now follows from Corollary 3.7.
332
+ More generally, given a von Neumann algebra M, one can consider the non-commutative Lp-spaces
333
+ over M, denoted by Lp(M). Again, for p ∈ (1, ∞), Lp(M) is reflexive (having canonically dual Lq(M) for
334
+ 1
335
+ p + 1
336
+ q = 1). To our knowledge, it is not in general known when Lp(M) has the (Banach space) AP, but
337
+ there has been some study of when Lp(M) possesses various Operator Space approximation properties,
338
+ 7
339
+
340
+ all of which imply the AP; see for example [41] which shows in particular that for a discrete group Γ with
341
+ the (group) approximation property, and with M = V N(Γ) the group von Neumann algebra, Lp(M) has
342
+ the Operator Space Approximation Property, [41, Theorem 1.1].
343
+ Corollary 3.12. Let p ∈ [2, ∞), and let M be an infinite-dimensional von Neumann algebra such that
344
+ Lp(M) has the AP. Then B(Lp(M)) is not amenable.
345
+ Proof. By [53, Theorem 0.2], Lp(M) contains a complemented subspace isomorphic to ℓ2 or ℓp. Under
346
+ our hypothesis, Corollary 3.7 now applies to give the result.
347
+ In the following, we consider various classes of “classical” Banach spaces; in the statement of the result
348
+ we give references regarding the properties of the spaces needed for Corollary 3.7 to apply.
349
+ Corollary 3.13. For the following infinite-dimensional Banach spaces E we have that B(E) is non-
350
+ amenable:
351
+ (i) the Lorentz sequence spaces d(w, p) for all p ∈ (1, ∞), see [46, Section 3.a, Section 4.e];
352
+ (ii) the reflexive Orlicz sequence spaces whose Orlicz function satisfies the ∆2 condition at 0, see [46,
353
+ Section 4.a, Proposition 4.a.4], and for when such a space is reflexive, [46, Proposition 4.b.2];
354
+ (iii) the Garling sequence spaces g(w, p) for all p ∈ (1, ∞), see [1, Proposition 2.4, Theorem 3.1];
355
+ (iv) the Schlumprecht space S, [62], which is reflexive, [18, Theorem 2.1] or [6, Corollary 8.3].
356
+ Proof. Each Banach space above is infinite-dimensional and reflexive with a subsymmetric basis, which
357
+ the given references show. Corollary 3.7 hence implies the claims.
358
+ For the Tsirelson space T, we follow the modern convention and view T as the dual of the original
359
+ construction of Tsirelson, so T is as defined in [31, Section 2].
360
+ Corollary 3.14. For the following Banach spaces E we have that B(E) is non-amenable:
361
+ (i) all infinite-dimensional separable reflexive rearrangement invariant (r.i.) function spaces;
362
+ (ii) the Tsirelson space T.
363
+ Proof. Each Banach space above is infinite-dimensional, reflexive (cf. [31, Section 2] for T) and, by
364
+ [10, Examples 4.3 and 4.4], tree translation equivalent (note that the Haar system is a tree translation
365
+ equivalent basis in case (i)). Hence Corollary 3.5 yields the claims.
366
+ Remark 3.15. The isomorphism T ∼= T ⊕T, used by Corollary 3.5, also appears in [9]. There, the author
367
+ defines a generalised way of constructing “Tsirelson-like” spaces, which are denoted by S. The space T
368
+ follows as a special case, see [9, page 209]. The remarks after [9, Corollary 4.7] show that S ∼= S ⊕ T and
369
+ so in particular, T ∼= T ⊕ T.
370
+ In this direction, we should also remark that A(T) is known to be non-amenable, [11, Corollary 5.8],
371
+ and so [33, 35] shows also that B(T) cannot be amenable.
372
+ Finally, we note that the uniformly convex Banach space E (of Tsirelson type) with symmetric basis
373
+ which contains no isomorphic copy of any ℓp for p ∈ (1, ∞), constructed by Figiel–Johnson in [31, Section
374
+ 4], also satisfies that B(E) is non-amenable, by Corollary 3.7.
375
+ We finish this Section by comparing these constructions with the one known example of an infinite-
376
+ dimensional space E with B(E) amenable.
377
+ 8
378
+
379
+ Remark 3.16. Note that the Argyros–Haydon space X, [7], for which B(X) is amenable, [57, Corol-
380
+ lary 2.5], is a hereditarily indecomposable L∞-space. Its dual X∗ is isomorphic to ℓ1 and hence has the
381
+ AP, so X has the AP, [60, Corollary 4.7]. Yet, besides being non-reflexive, the key geometric property
382
+ of X of being hereditarily indecomposable is in stark contrast to the Banach space properties which we
383
+ employ above, all of which say that the space is “very decomposable”.
384
+ 4
385
+ The case of non-reflexive Banach spaces
386
+ In this Section, we treat the case when E is not reflexive. Then A(E) is not Arens regular, and so we
387
+ need to consider the (first) topological centre when applying Theorem 2.5.
388
+ We follow [25], which is a dense article, so we recall some of the definitions. Given a Banach space E
389
+ we write N(E) for the nuclear operators on E, the image of E∗ �⊗E in B(E) equipped with the quotient
390
+ norm. Write I(E) for the integral operators; there is always a norm-decreasing inclusion N(E) ⊆ I(E).
391
+ Given x∗ ∈ E∗ and x ∈ E we write θx,x∗ for the rank-one operator y �→ ⟨x∗, y⟩x. Then A(E) is by
392
+ definition the closed linear span of such operators in B(E). Trace duality gives a natural pairing between
393
+ A(E) and I(E∗) which extends the pairing
394
+ ⟨J, θx,x∗⟩ = Tr(Jθ∗
395
+ x,x∗) = ⟨J(x∗), x⟩
396
+ (J ∈ I(E∗), θx,x∗ ∈ A(E)).
397
+ With respect to this pairing, we have that A(E)∗ = I(E∗).
398
+ For T ∈ B(E∗∗) define
399
+ η(T) = κ∗
400
+ E ◦ T ∗ ◦ κE∗ ∈ B(E∗),
401
+ and let Q(T) = η(T)∗. Direct calculation shows that η(T ∗) = T for T ∈ B(E∗), as κ∗
402
+ ET ∗∗κE∗ = κ∗
403
+ EκE∗T =
404
+ T. Similarly, given S ∈ B(E∗∗) we see that η(T ∗S) = κ∗
405
+ ES∗T ∗∗κE∗ = η(S)T and so Q(T ∗S) = T ∗Q(S).
406
+ Define a bilinear map ⋆ on B(E∗∗) by T ⋆ S = Q(T) ◦ S. Then ⋆ is a Banach algebra product, see [25,
407
+ Proposition 2.5].
408
+ We write W(E) for the ideal of weakly compact operators in B(E).
409
+ Proposition 4.1. Let E be a Banach space. Suppose that A(E) admits a bounded approximate identity
410
+ (eα). This holds if and only if E∗ has the bounded approximation property (BAP). Let Φ0 ∈ A(E)∗∗ be a
411
+ weak∗-cluster point of the net (eα). There are bounded maps ψ1, ψ2 : B(E∗∗) → A(E)∗∗ = I(E∗)∗ given
412
+ by
413
+ ⟨ψ1(T), J⟩ = ⟨Φ0, η(TJ∗)⟩,
414
+ ⟨ψ2(T), J⟩ = ⟨Φ0, η(T)J⟩
415
+ (T ∈ B(E∗∗), J ∈ I(E∗)).
416
+ Then ψ1 is an isomorphism onto its range, and a homomorphism B(E∗∗) → (A(E)∗∗, ✷), and ψ2 is
417
+ a homomorphism (B(E∗∗), ⋆) → (A(E)∗∗, ✸).
418
+ The map ψ2, restricted to {T ∗ : T ∈ B(E∗)}, is an
419
+ isomorphism onto its range. For a ∈ A(E) we have that ψ1(a∗∗) = ψ2(a∗∗) = κA(E)(a). For T ∈ W(E)
420
+ we have that ψ1(T ∗∗) = ψ2(T ∗∗).
421
+ We have the identification
422
+ Zt(A(E)∗∗) =
423
+
424
+ ψ2(T ∗) : T ∈ B(E∗), TI(E∗) ⊆ N(E∗)
425
+
426
+ .
427
+ Proof. The equivalence of A(E) having a bai and E∗ having the BAP is shown in [37], building on the
428
+ work of many authors. [25, Theorem 5.17] shows the claims about ψ1, ψ2, while that ψ1(T ∗∗) = ψ2(T ∗∗)
429
+ for T ∈ W(E) is observed at the end of the proof of [25, Corollary 5.22]. Finally [25, Corollary 5.22]
430
+ shows the claim about Zt(A(E)∗∗), which is denoted by Z(1)
431
+ t
432
+ (A(E)∗∗) in [25].
433
+ To obtain a class of operators T ∈ B(E∗) with TI(E∗) ⊆ N(E∗), we use [25, Theorem 3.31] or [60,
434
+ Theorem 5.47], which shows that when T ∈ W(E∗), we have TI(E∗) ⊆ N(E∗).
435
+ 9
436
+
437
+ Theorem 4.2. Let E be a Banach space such that E∗ has the BAP. Suppose there is S ∈ W(E) \ K(E)
438
+ with S2 ∈ K(E). Then B(E) is not amenable.
439
+ Proof. That S is weakly compact means that S∗ is weakly compact by Gantmacher’s Theorem, [22,
440
+ Theorem 5.5] for example, and so ψ2(S∗∗) is in Zt(A(E)∗∗). Further, ψ1(S∗∗) = ψ2(S∗∗).
441
+ Set A = A(E) and let C = {ψ1(T ∗∗) : T ∈ B(E)} ⊆ A∗∗, an algebra isomorphic to B(E), as
442
+ B(E) → B(E∗∗), T �→ T ∗∗ is a homomorphism. Let B0 be the algebra generated by A(E) = K(E) and S,
443
+ so as S2 ∈ K(E), B0 is the linear span of A(E) and S. Let B be the image of B0 in C. As ψ1(S∗∗) = ψ2(S∗∗)
444
+ and ψ1, ψ2 agree on A, we see that B ⊆ Zt(A∗∗).
445
+ If B(E) is amenable, so is C, so by Theorem 2.5, B is amenable, hence B0 is amenable. Thus B0/A
446
+ is amenable, which as in the proof of Proposition 3.1 leads to the required contradiction. So B(E) is not
447
+ amenable.
448
+ Corollary 4.3. Let K be an uncountable compact metric space. Then B(C(K)) is not amenable.
449
+ Proof. By Milutin’s Theorem, [55, Theorem 2.1], we have C(K) ∼= C[0, 1], so it is enough to consider
450
+ E = C[0, 1]. We apply Theorem 4.2, so we seek S ∈ W(E) \ K(E) with S2 ∈ K(E). Firstly, suppose we
451
+ can find any T ∈ W(E) \ K(E). Define linear maps
452
+ T0 : C[0, 1] → C[0, 1],
453
+ T0(f)(s) = f(2s)
454
+ (f ∈ C[0, 1], s ∈ [0, 1]),
455
+ and also T1 : C[0, 1] → C[0, 1] in the following way.
456
+ Pick a small δ > 0 and a linear bijection ϕ :
457
+ [1/2+δ, 1−δ] → [0, 1]. For f ∈ C[0, 1] define T1(f) as follows. For 1/2+δ ≤ t ≤ 1−δ let T1(f)(t) = f(ϕ(t)),
458
+ and for t < 1/2 let T1(f)(t) = 0.
459
+ Set T1(f)(1/2) = T1(f)(1) = 0, and linearly interpolate on the
460
+ intervals [1/2, 1/2 + δ] and [1 − δ, 1].
461
+ Then T0 is a metric surjection, T1 is an isometry, and hence
462
+ S = T1TT0 ∈ W(E)\K(E). As T0T1 = 0 also S2 = 0. In fact, the square of any weakly compact operator
463
+ on any C(K) is always compact by a result of Grothendieck, [55, Corollary 4.2], and so already T works
464
+ in Theorem 4.2, but we prefer to give this explicit construction.
465
+ It hence remains to find a suitable T. We use [52, Example 6] which gives an example of an absolutely
466
+ summing but non-compact map R : C[0, 1] → c0; for instance, with rn : [0, 1] → {±1} the Rademacher
467
+ functions, we may define
468
+ R(f) =
469
+ � � 1
470
+ 0
471
+ rn(t)f(t) dt
472
+ �∞
473
+ n=1.
474
+ By [60, Corollary 6.20], R is weakly compact as it is absolutely summing. It remains to find an isometry
475
+ c0 → C[0, 1] which when composed with R will give us our required T. This is well-known (cf., e.g.,
476
+ [55, Lemma 2.5 (d)]) but we give a construction.
477
+ Let f1 ∈ C[0, 1] be the piece-wise linear function
478
+ with f1(0) = f1(1/2) = f1(1) = 0, f1(3/4) = 1, let f2 ∈ C[0, 1] be the piece-wise linear function with
479
+ f2(0) = f2(1/4) = f2(1/2) = f2(1) = 0, f2(3/8) = 1, and so forth. Then (fn) is a copy of the standard
480
+ unit vector basis of c0, and the map c0 → C[0, 1], (an) �→ �
481
+ n anfn is our isometry. Here the sum is to be
482
+ interpreted pointwise, but as (an) ∈ c0, it actually converges absolutely.
483
+ Corollary 4.4. B(L1[0, 1]) is not amenable.
484
+ Proof. We apply Theorem 4.2 to E = L1[0, 1]. As E∗ = L∞[0, 1] has the BAP, we need only find a
485
+ suitable S ∈ W(E). As E ∼= E ⊕ E, we can obtain S2 = 0 so long as we can find any R ∈ W(E) \ K(E).
486
+ To find such an R, we can follow [19, Example 3.4], for instance.
487
+ Corollary 4.5. Let E be a Banach space containing a complemented subspace isomorphic to ℓp for some
488
+ p ∈ (1, ∞). If E∗ has the BAP then B(E) is not amenable.
489
+ 10
490
+
491
+ Proof. We can easily find R ∈ B(ℓp) with R non-compact but R2 = 0. Indeed, if (en) is the standard
492
+ unit vector basis of ℓp, define R by R(e2n) = e2n+1 and R(e2n−1) = 0 for each n ∈ N. Let P from E
493
+ onto ℓp be a projection, so as ℓp is reflexive, RP is weakly compact. As R2 = 0 also (RP)2 = 0. As P
494
+ is a projection onto ℓp and by the construction of R, we see that RP is not compact. Now Theorem 4.2
495
+ implies the result.
496
+ Remark 4.6. Note that the above yields another proof of the non-amenability of B(E) for any Lp-space
497
+ E, where p ∈ (1, ∞).
498
+ Corollary 4.7. The Hardy spaces Hp for all p ∈ [1, ∞) satisfy that B(Hp) is not amenable.
499
+ Proof. For p ∈ (1, ∞) we have Hp ∼= Lp[0, 1] by the classical result [12], so the claim follows from
500
+ Corollary 3.8. Now consider H1. By [42, Section 3], H1 contains a complemented subspace isomorphic
501
+ to ℓ2 (this is due to Paley, cf. the references in [42]). Also, by [40, Corollary 1], the dual H∗
502
+ 1 ∼= BMO
503
+ has the uniform approximation property, hence the BAP. Now Corollary 4.5 entails that B(H1) is not
504
+ amenable.
505
+ Next we derive a result concerning vector-valued Lp spaces over σ-finite measure spaces. So let µ be a
506
+ σ-finite measure, E a Banach space, and consider Lp(µ, E). When E∗ has the Radon-Nikodym Property
507
+ (RNP), then Lp(µ, E)∗ = Lq(µ, E∗), where 1
508
+ p + 1
509
+ q = 1, cf. [30, Section IV, Theorem 1]. For the RNP, see,
510
+ e.g., [30, Chapter III] or [25, Definition 3.16]. All reflexive spaces, and all separable dual spaces have the
511
+ RNP. More generally, E∗ has the RNP if and only if every separable subspace of E has separable dual,
512
+ [30, Section VII.2, Corollary 8]. We note that [30] works only with finite measures, but the σ-finite case
513
+ is a routine generalisation from this.
514
+ To apply our result, we wish to know when Lq(µ, E∗) has the BAP. The following result is surely
515
+ known, but as we have not found a suitable reference, we give a proof.
516
+ Lemma 4.8. Let E have the BAP, and let p ∈ [1, ∞). Let µ be a σ-finite measure. Then Lp(µ, E) has
517
+ the BAP.
518
+ Proof. We shall use the ∆p norm from [28, Chapter 7] which is not quite a “tensor norm” on Lp(µ) ⊗ E;
519
+ in particular, it fails the usual mapping property. Nevertheless, Lp(µ) ⊗ E is dense in Lp(µ, E) for the
520
+ norm ∆p.
521
+ It is easy to see that we can witness that Lp(µ) has the metric approximation property by finite-rank,
522
+ positive operators (Ti), cf. [30, Section VIII.3, Example 11] for instance. For any positive operator T on
523
+ Lp(µ), we do have that T ⊗ idE is bounded for ∆p, with bound ∥T∥, and so extends to Lp(µ, E), see [28,
524
+ Theorem 7.3].
525
+ Any S ∈ B(E) extends to idLp(µ) ⊗ S on Lp(µ, E) with norm ∥S∥. Thus if (Sj) is a bounded net of
526
+ finite-rank operators on E witnessing that E has the BAP, then (Ti ⊗ Sj) is a bounded net of finite-rank
527
+ operators on Lp(µ, E) which tends in the point-norm topology to the identity on Lp(µ) ⊗ E, and thus by
528
+ boundedness and density, on all of Lp(µ, E). Hence Lp(µ, E) has the BAP.
529
+ Corollary 4.9. Let E be a Banach space such that E∗ has the BAP and the RNP (for example, E is
530
+ reflexive with the AP), and let p ∈ (1, ∞). Let µ be a σ-finite measure with Lp(µ) infinite-dimensional.
531
+ Then B(Lp(µ, E)) is not amenable.
532
+ Proof. The discussion above shows that under these hypotheses, Lp(µ, E) has dual Lq(µ, E∗). By Lemma
533
+ 4.8, also Lq(µ, E∗) has the BAP, as E∗ does. Furthermore, Lp(µ, E) contains a complemented subspace
534
+ isomorphic to ℓp, by [17, Proposition 1.4.1]. Now Corollary 4.5 implies the result.
535
+ For the definition of the James space J, we refer the reader to [46, Example 1.d.2].
536
+ 11
537
+
538
+ Corollary 4.10. The James space J satisfies that B(J) is not amenable.
539
+ Proof. By combining [15, Theorem 5] with the remark after [15, Corollary 4] and [15, Corollary 3], we
540
+ find that J admits a complemented subspace isomorphic to ℓ2. Also, as J has a shrinking basis, J∗ has
541
+ a basis by [46, Proposition 1.b.1], and so the BAP. Again, Corollary 4.5 yields the claim.
542
+ 4.1
543
+ When the nuclear and integral operators on E∗ agree
544
+ If we assume that N(E∗) = I(E∗) then we can say more.
545
+ Recall the discussion of the RNP after
546
+ Corollary 4.7 above. A useful result is that when E∗ has the RNP, then N(E∗) = I(E∗) with equal
547
+ norms, [25, Theorem 3.18] and [60, Section 5.3].
548
+ We continue with the notation from Proposition 4.1.
549
+ Lemma 4.11. Let E be a Banach space such that E∗ has the BAP, and N(E∗) = I(E∗). Then ψ1(T ∗) =
550
+ ψ2(T ∗) for each T ∈ B(E∗).
551
+ Proof. Firstly, for general E, given T ∈ B(E∗) and J ∈ I(E∗), we always have
552
+ ⟨ψ1(T ∗), J⟩ = ⟨Φ0, η(T ∗J∗)⟩ = ⟨Φ0, JT ⟩,
553
+ ⟨ψ2(T ∗), J⟩ = ⟨Φ0, η(T ∗)J⟩ = ⟨Φ0, TJ⟩.
554
+ (6)
555
+ As in Proposition 4.1, here Φ0 is a weak∗-cluster point of a bai (eα) for A(E). Now let J ∈ N(E∗), say
556
+ J = θx∗,x∗∗. Then
557
+ ⟨Φ0, JT ⟩ = ⟨Φ0, θx∗,T ∗(x∗∗)⟩ = lim
558
+ α ⟨θx∗,T ∗(x∗∗), eα⟩ = lim
559
+ α ⟨T ∗(x∗∗), e∗
560
+ α(x∗)⟩ = ⟨T ∗(x∗∗), x∗⟩,
561
+ here using that e∗
562
+ α(x∗) → x∗ for each x∗ ∈ E∗. Indeed, as θx,x∗eα = θx,e∗α(x∗) and ∥θx,x∗ − θx,x∗eα∥ → 0,
563
+ it follows that ∥x∥∥x∗ − e∗
564
+ α(x∗)∥ → 0. We similarly see that
565
+ ⟨Φ0, TJ⟩ = ⟨Φ0, θT(x∗),x∗∗⟩ = lim
566
+ α ⟨θT(x∗),x∗∗, eα⟩ = lim
567
+ α ⟨x∗∗, e∗
568
+ α(T(x∗))⟩ = ⟨x∗∗, T(x∗)⟩.
569
+ It follows that ⟨Φ0, TJ⟩ = ⟨Φ0, JT⟩, and by linearity and continuity, this holds for all J ∈ N(E∗). The
570
+ result now follows from (6).
571
+ Theorem 4.12. Let E be a Banach space such that E∗ has the BAP, and N(E∗) = I(E∗). Let B be
572
+ a closed subalgebra with K(E) ✂ B ⊆ B(E). If any of B(E), B(E∗) or B(E∗∗) is amenable, then B is
573
+ amenable.
574
+ Proof. Set A = A(E), and let C = {ψ1(T ∗∗) : T ∈ B(E)} ⊆ A∗∗, an algebra isomorphic to B(E).
575
+ As I(E∗) = N(E∗), we know from Proposition 4.1 that Zt(A∗∗) = {ψ2(T ∗) : T ∈ B(E∗)}, and by
576
+ Lemma 4.11, this equals {ψ1(T ∗) : T ∈ B(E∗)}. Thus C ⊆ Zt(A∗∗), and so when B(E) is amenable, also
577
+ C is amenable, and hence Theorem 2.5 yields the result.
578
+ When B(E∗) is amenable, we instead set C = {ψ1(T ∗) : T ∈ B(E∗)} ⊆ A∗∗, an algebra anti-isomorphic
579
+ to B(E∗), so that C is amenable. Now C = Zt(A∗∗). We identify B with {ψ1(T ∗∗) : T ∈ B}, so that B ⊆ C,
580
+ and A ✂ B. Again, Theorem 2.5 yields the claim.
581
+ Finally, suppose that B(E∗∗) is amenable. As A∗ = I(E∗) = N(E∗) by hypothesis, and as E∗ has the
582
+ BAP so that N(E∗)∗ = B(E∗∗), it follows that A∗∗ = B(E∗∗) with ψ1 being an isomorphism. For this,
583
+ see [25, Section 5.2] and [24, Section 6]. Now set C = A∗∗ which is thus amenable, and again identify B
584
+ with {ψ1(T ∗∗) : T ∈ B}, so that B ⊆ Zt(A∗∗). Again Theorem 2.5 implies the result.
585
+ Corollary 4.13. Let K be an infinite countable compact metric space. Then B(C(K)) is not amenable.
586
+ 12
587
+
588
+ Proof. By [55, Lemma 2.5(d)], we know that C(K) contains an isometric copy of c0. Using Sobczyk’s
589
+ theorem, see [65], as C(K) is separable, there is a projection P from C(K) onto c0. As K is countable,
590
+ we have C(K)∗ = M(K) ∼= ℓ1(K) which is a separable dual space, and hence has the RNP; also it has
591
+ the BAP. We then apply Theorem 4.12 with B = K(C(K)) ⊕ CS for a suitable operator S. Again, we use
592
+ Proposition 3.1, so we seek S non-compact with S2 compact. It is easy to find T ∈ B(c0) non-compact
593
+ with T 2 = 0, compare the proof of Corollary 4.16 below. Set S = TP, so that S is non-compact as P is
594
+ a projection onto c0, while PT = T so S2 = TPTP = T 2P = 0. Theorem 4.12 now yields that B(C(K))
595
+ is not amenable.
596
+ Corollary 4.14. Let K be an infinite compact metric space, equivalently, let K be an infinite compact
597
+ space with C(K) separable. Then B(C(K)) is not amenable.
598
+ Proof. This follows immediately from Corollaries 4.3 and 4.13.
599
+ We now consider the vector-valued spaces C(K, E) for a Banach space E. These can be realised as the
600
+ injective tensor product C(K)ˇ⊗E, see [60, Section 3.2]. The following generalises the previous corollary,
601
+ in that we can take E = C.
602
+ Corollary 4.15. Let K be an infinite compact metric space, and let E be a Banach space such that E∗
603
+ has the BAP and the RNP. Then B(C(K, E)) is not amenable.
604
+ Proof. We may identify C(K, E)∗ with the space of regular vector measures of bounded variation, defined
605
+ on the Borel subsets of K, with values in E∗, see for example [60, page 112]. As E∗ has the RNP, [60,
606
+ Corollary 5.23] shows that this space coincides with M(K)�⊗E∗, paired against C(K)ˇ⊗E = C(K, E) in
607
+ the canonical way. As both M(K) and E∗ have the BAP, the proof of Lemma 4.8 is readily adapted to
608
+ show that M(K)�⊗E∗ = C(K, E)∗ has the BAP; cf. also [29, Corollary 1.18].
609
+ As C(K, E) = C(K)ˇ⊗E, fixing x ∈ E and µ ∈ E∗ with ∥x∥ = ∥µ∥ = ⟨µ, x⟩ = 1, the maps
610
+ C(K)ˇ⊗E → C(K), f ⊗ y �→ ⟨µ, y⟩f
611
+ and
612
+ C(K) → C(K)ˇ⊗E, f �→ f ⊗ x
613
+ establish that C(K) is a complemented subspace of C(K, E). When K is uncountable, we may use the
614
+ complemented copy of C(K) together with the proof of Corollary 4.3 to show that there is T ∈ B(C(K, E))
615
+ which is weakly compact but not compact, and with T 2 compact. Thus Theorem 4.2 yields the result.
616
+ Now suppose that K is countable. As E∗ has the RNP, we know that separable subspaces of E have
617
+ separable duals. Let X ⊆ C(K, E) be separable, and let (fn) be a dense subset. Then {fn(k) : n ∈ N, k ∈
618
+ K} is a countable subset of E and so its closed linear span is a separable subspace of E, say E0. Then
619
+ X ⊆ C(K, E0), and as K is countable, it follows easily that C(K, E0) is separable. We know that E∗
620
+ 0 is
621
+ separable, and so C(K, E0)∗ = ℓ1(K)�⊗E∗
622
+ 0 is separable, as ℓ1(K) is separable. We have hence shown that
623
+ separable subspaces of C(K, E) have separable dual. So C(K, E)∗ has the RNP and the BAP in this case.
624
+ As in the proof of Corollary 4.13, C(K) contains a complemented copy of c0, and hence so does C(K, E).
625
+ We can now argue exactly as in the proof of Corollary 4.13 to see that B(C(K, E)) is not amenable.
626
+ Corollary 4.16. B(c0), B(ℓ1) and B(ℓ∞) are not amenable.
627
+ Proof. Set E = c0. Then E∗ = ℓ1 has the BAP, and as a separable dual space, has the RNP, so that
628
+ N(E∗) = I(E∗). We can find S ∈ B(c0) \ K(c0) with S2 = 0. Indeed, if (en) is the standard unit vector
629
+ basis of c0 then define S by S(e2n) = e2n+1 and S(e2n−1) = 0 for each n ∈ N. Choosing B = K(c0) ⊕ CS
630
+ gives a non-amenable Banach algebra by Proposition 3.1, and then Theorem 4.12 shows that B(c0), B(ℓ1)
631
+ and B(ℓ∞) are not amenable.
632
+ Corollary 4.17. Let E be an infinite-dimensional separable L1 space. Then B(E) is not amenable.
633
+ 13
634
+
635
+ Proof. There is a classification of such E, [67, p. 83]: indeed, either E ∼= L1[0, 1] or E ∼= ℓ1, so the result
636
+ follows from Corollaries 4.4 and 4.16.
637
+ We now establish the non-commutative version of Corollary 4.16.
638
+ Corollary 4.18. Let H be an infinite-dimensional separable Hilbert space. Then B(K(H)), B(T (H)) and
639
+ B(B(H)) are not amenable.
640
+ Proof. Set E = K(H), so that E∗ = T (H), the trace class operators, and E∗∗ = B(H). Then E∗ has
641
+ the BAP, indeed, even a (Schauder) basis, which follows from [60, Proposition 4.25] for example. Also
642
+ T (H) is a separable dual space, and so has the RNP, hence N(E∗) = I(E∗). As in the proof of the
643
+ next corollary, we can find an operator S ∈ B(E) which is non-compact with S2 = 0, thus showing that
644
+ B = K(E) ⊕ CS is not amenable, by Proposition 3.1. Now Theorem 4.12 yields that B(K(H)), B(T (H))
645
+ and B(B(H)) are not amenable.
646
+ Remark 4.19. In [19, Section 4], Choi shows that when E is a Banach space with the BAP such that
647
+ E∗ does not have the BAP, then B(E) is not amenable. This criterion is rather restrictive; the canonical
648
+ example, thanks to Szankowski’s result [64], is E = T (H).
649
+ Choi’s argument uses again [37] which shows that, under these hypotheses, A(E) has a one-sided but
650
+ no two-sided bounded approximate identity. As A(E) is an ideal in B(E), this contradicts B(E) being
651
+ amenable, cf. [19, Lemma 2.2]. Our proof above that B(T (H)) is non-amenable avoids the use of the very
652
+ deep result of Szankowski.
653
+ There is to our knowledge one way to construct spaces which Choi’s result covers, giving non-amenability
654
+ of B(E), and where our methods do not apply. By [43, Corollary 3], see also [46, Theorem 1.e.7(b)], start-
655
+ ing with any Banach space F which fails to have the AP, one can show that there exists a Banach space
656
+ E with the BAP (indeed, a Schauder basis) such that E∗ does not have the AP.
657
+ In fact, more generally, we obtain the following.
658
+ Corollary 4.20. For all p ∈ (1, ∞) we have that B(K(ℓp)), B(N(ℓp)) and B(B(ℓp)) are not amenable.
659
+ Proof. We proceed at first with some generality. Let F be a Banach space such that F ∗∗ is separable
660
+ with the BAP. Also F ∗ is separable, and a dual space, and so has the RNP. Further, F ∗ has the BAP,
661
+ see [25, Corollary 3.22] for example, and so there are bounded nets (ti), (sj) of finite-rank operators in
662
+ B(F ∗), B(F ∗∗), respectively, converging in the point-norm topology to the identity. Set E = K(F) = A(F),
663
+ so that E∗ = I(F ∗) = N(F ∗) = F ∗ �⊗F ∗∗ by the hypotheses on F. Then (ti ⊗ sj) is a bounded net of
664
+ finite-rank operators converging in the point-norm topology to the identity on F ∗ �⊗F ∗∗, showing that E∗
665
+ has the BAP. As F ∗∗ and F ∗ are separable, also E∗ is separable. Thus we can apply Theorem 4.12 to
666
+ find that B(E), B(E∗) and B(E∗∗) are not amenable, provided a suitable B can be constructed.
667
+ Now specialise to the case F = ℓp for p ∈ (1, ∞). Let (en) be the usual unit vector basis of ℓp, and
668
+ set F0, F1 to be the closed span of (e2n), (e2n−1), respectively. For i = 0, 1 there is a natural projection
669
+ Pi : F → Fi, and an inclusion ιi : Fi → F. Further, there is an isometry j : F0 → F1. For x ∈ A(ℓp)
670
+ define S(x) = jP0xP0 ∈ A(ℓp). As P0j = 0, we see that S2(x) = jP0S(x)P0 = jP0jP0xP0 = 0 for each
671
+ x. For y ∈ A(F0) we can set x = ι0yP0 ∈ A(ℓp), and then S(x) = jP0ι0yP0 = jyP0, so in particular,
672
+ ∥S(x)∥ = ∥yP0∥ = ∥y∥ = ∥x∥. This shows that S is non-compact, and so B = A(E) ⊕ CS is a suitable
673
+ non-amenable algebra.
674
+ Remark 4.21. Note that the Argyros–Haydon space X, for which B(X) is amenable, cf. Remark 3.16,
675
+ satisfies that X∗ is isomorphic to ℓ1, so X∗ has the BAP and the RNP, whence N(X∗) = I(X∗). However,
676
+ as B(X) = K(X) ⊕ CidX, there is obviously no operator S ∈ B(X) \ K(X) with S2 compact.
677
+ 14
678
+
679
+ 5
680
+ Alternative proofs of the non-amenability of B(ℓp) for p ∈ (1, ∞]
681
+ In this Section, we present alternative, quick proofs that B(ℓp) is non-amenable for all p ∈ (1, ∞] using
682
+ operator algebra methods and harmonic analysis, rather than Banach space geometry. We first give a
683
+ short proof of the non-amenability of B(ℓ2), avoiding the use of nuclearity for C∗-algebras (we remark
684
+ that [13] quoted below was written when there was no relationship known between amenability and
685
+ nuclearity for C∗-algebras, as noted therein). Given a discrete group G, we write C∗
686
+ r (G) for its reduced
687
+ group C∗-algebra. Recall that K(ℓ2(G)) is Arens regular being a C∗-algebra, and the Arens product on
688
+ K(ℓ2(G))∗∗ = B(ℓ2(G)) is the usual composition of operators.
689
+ Theorem 5.1. B(ℓ2) is not amenable.
690
+ Proof. Realize ℓ2 as ℓ2(G) for some countable discrete non-amenable group G, such as F2.
691
+ Suppose
692
+ that B(ℓ2(G)) is amenable. Put A := K(ℓ2(G)), and consider the C∗-subalgebra B := A ⊕ C∗
693
+ r (G) of
694
+ B(ℓ2(G)) = A∗∗ (note that K(ℓ2(G)) ∩ C∗
695
+ r (G) = {0} by [20, Proposition 3.2]). As in Section 3 we can
696
+ apply Corollary 2.6 to see that amenability of B(ℓ2(G)) passes to B, and hence to the quotient C∗
697
+ r (G).
698
+ Thus G is amenable by [13, Proposition 2] – a contradiction.
699
+ For the case of B(ℓp), p ∈ (1, ∞), we will argue similarly. We will consider the p-analogue of C∗
700
+ r (G),
701
+ i.e., the algebra PFp(G) of p-pseudofunctions on G, defined as the Banach algebra generated in B(ℓp(G))
702
+ by λp(ℓ1(G)), where λp is the representation of ℓ1(G) on ℓp(G) given by left convolution.
703
+ We are grateful to N.C. Phillips for pointing out the following
704
+ Lemma 5.2. Let G be a countable discrete group, and p ∈ (1, ∞). Then the canonical quotient map
705
+ q : B(ℓp(G)) → B(ℓp(G))/K(ℓp(G)) is isometric on PFp(G).
706
+ Proof. This is shown for p = 2 in [49, Proposition 4.5], and inspection of the proof shows that the
707
+ argument carries over, mutatis mutandis, to the case of general p.
708
+ For the following, note that given a discrete group G, K(ℓp(G)) is Arens regular by [23, Theorem
709
+ 2.6.23], and the product on K(ℓp(G))∗∗ = B(ℓp(G)) is the usual composition of operators.
710
+ Theorem 5.3. B(ℓp) is not amenable for any p ∈ (1, ∞).
711
+ Proof. Let p ∈ (1, ∞). Realize ℓp as ℓp(G) for some countable discrete non-amenable group G, such as
712
+ F2. Suppose that B(ℓp(G)) is amenable. Put A := K(ℓp(G)), and consider the space B := A ⊕ PFp(G)
713
+ (note that K(ℓp(G)) ∩ PFp(G) = {0} as the proof of [20, Proposition 3.2] for p = 2 carries over to
714
+ the case of general p).
715
+ Let q : B(ℓp(G)) → B(ℓp(G))/K(ℓp(G)) be the canonical quotient map.
716
+ By
717
+ Lemma 5.2, q(PFp(G)) ⊆ B(ℓp(G))/K(ℓp(G)) is closed. Hence B = q−1(q(PFp(G))) is a closed subalgebra
718
+ of B(ℓp(G)) = A∗∗. Again, by Corollary 2.6, B is amenable. So the quotient PFp(G) is amenable, whence
719
+ G is amenable (see the proof of [32, Theorem 6.4], which uses work of Phillips [50]) – a contradiction.
720
+ We shall now give an alternative proof of the non-amenability of B(ℓ∞). To this end, let G be a
721
+ countable discrete group. We recall that K(c0(G))∗∗ = B(ℓ∞(G)), with the first Arens product being the
722
+ usual composition of operators, and Zt(K(c0(G))∗∗) = Bσ(ℓ∞(G)), where the latter denotes the maps in
723
+ B(ℓ∞(G)) which are weak∗-weak∗-continuous; see pages 59–61, in particular Example 6.2, in [24]. (This
724
+ also follows from Proposition 4.1 in this special case when E = c0(G), as then E∗ = ℓ1(G) has the RNP
725
+ and so the ideas of Section 4.1 apply.) We also recall that Φ : ℓ1(G) → B(c0(G)), where
726
+ Φ(f)(g) = f ∗ g for all f ∈ ℓ1(G), g ∈ c0(G),
727
+ is an isometric representation. We see B(c0(G)) as a subalgebra of B(ℓ∞(G)) (by taking second adjoints).
728
+ So we have B(c0(G)) ⊆ Bσ(ℓ∞(G)).
729
+ We have the following
730
+ 15
731
+
732
+ Lemma 5.4. Let G be a countable discrete group. Then the canonical quotient map q : B(c0(G)) →
733
+ B(c0(G))/K(c0(G)) is isometric on Φ(ℓ1(G)).
734
+ Proof. Again, this follows, mutatis mutandis, as in the proof of [49, Proposition 4.5], replacing ℓ2(I) by
735
+ c0(I). Note that all elements of Φ(ℓ1(G)) commute with right translations in B(c0(G)).
736
+ We shall now prove
737
+ Theorem 5.5. B(ℓ∞) is not amenable.
738
+ Proof. Realize ℓ∞ as ℓ∞(G) for some countable discrete non-amenable group G, such as F2. Suppose that
739
+ B(ℓ∞(G)) is amenable. Put A := K(c0(G)), and consider the space B := A ⊕ Φ(ℓ1(G)) ⊆ B(c0(G)) ⊆
740
+ Bσ(ℓ∞(G)); note that K(c0(G))∩Φ(ℓ1(G)) = {0} follows from [61, proof of Theorem 1]. Let q : B(c0(G)) →
741
+ B(c0(G))/K(c0(G)) be the canonical quotient map. By Lemma 5.4, q(Φ(ℓ1(G))) ⊆ B(c0(G))/K(c0(G)) is
742
+ closed. Hence B = q−1(q(Φ(ℓ1(G)))) is a closed subalgebra of Bσ(ℓ∞(G)) = Zt(A∗∗). By Theorem 2.5, B
743
+ is amenable. So the quotient Φ(ℓ1(G)) is amenable. Thus, ℓ1(G) is amenable, whence G is amenable by
744
+ Johnson’s classical result, [59, Theorem 2.1.10] or [56, Theorem 2.1.8] – a contradiction.
745
+ Acknowledgements
746
+ The first named author is partially supported by EPSRC grant EP/T030992/1. For the purpose of open
747
+ access, the authors have applied a CC BY public copyright licence to any Author Accepted Manuscript
748
+ version arising. No data were created or analysed in this study. The second named author is partially
749
+ supported by NSERC; this support is gratefully acknowledged.
750
+ References
751
+ [1] F. Albiac, J.L. Ansorena and B. Wallis, Garling sequence spaces, J. Lond. Math. Soc. (2) 98 (2018),
752
+ no. 1, 204–222.
753
+ [2] E. Aldabbas, Amenability properties of certain Banach algebras of operators on Banach spaces, Ph.D.
754
+ thesis, University of Alberta, 2017.
755
+ [3] D. Alspach and E. Odell, Lp spaces, in: Handbook of the Geometry of Banach spaces, Vol. I, 123–159,
756
+ North-Holland, Amsterdam, 2001.
757
+ [4] J. Arazy and J. Lindenstrauss, Some linear topological properties of the spaces Cp of operators on
758
+ Hilbert space, Compositio Math. 30 (1975), 81–111.
759
+ [5] R. Arens, The adjoint of a bilinear operation, Proc. Amer. Math. Soc. 2 (1951), 839–848.
760
+ [6] S.A. Argyros and V. Felouzis, Interpolating hereditarily indecomposable Banach spaces, J. Amer.
761
+ Math. Soc. 13 (2000), no. 2, 243–294.
762
+ [7] S.A. Argyros and R.G. Haydon, A hereditarily indecomposable L∞-space that solves the scalar-plus-
763
+ compact problem, Acta Math. 206 (2011), no. 1, 1–54.
764
+ [8] A. Baernstein, II, On reflexivity and summability, Studia Math. 42 (1972), 91–94.
765
+ [9] S.F. Bellenot, Tsirelson superspaces and lp, J. Funct. Anal. 69 (1986), no. 2, 207–228.
766
+ [10] S.F.
767
+ Bellenot,
768
+ Tree
769
+ basis
770
+ in
771
+ Banach
772
+ spaces,
773
+ unpublished,
774
+ available
775
+ as
776
+ https://www.math.fsu.edu/~bellenot/past/tree-basis-preprint.pdf
777
+ 16
778
+
779
+ [11] A. Blanco and N. Grønbæk, Amenability of algebras of approximable operators, Israel J. Math. 171
780
+ (2009), 127–156.
781
+ [12] R.P. Boas, Jr., Isomorphism between Hp and Lp, Amer. J. Math. 77 (1955), 655–656.
782
+ [13] J.W. Bunce, Finite operators and amenable C∗-algebras, Proc. Amer. Math. Soc. 56 (1976), 145–151.
783
+ [14] J.W. Bunce and W.L. Paschke, Quasi-expectations and amenable von Neumann algebras, Proc. Amer.
784
+ Math. Soc. 71 (1978), no. 2, 232–236.
785
+ [15] P.G. Casazza, B.L. Lin and R.H. Lohman, On James’ quasi-reflexive Banach space, Proc. Amer.
786
+ Math. Soc. 67 (1977), no. 2, 265–271.
787
+ [16] P.G. Casazza and T.J. Shura, Tsirelson’s space. With an appendix by J. Baker, O. Slotterbeck and
788
+ R. Aron, Lecture Notes in Mathematics, 1363, Springer-Verlag, Berlin, 1989.
789
+ [17] P. Cembranos and J. Mendoza, Banach spaces of vector-valued functions, Lecture Notes in Mathe-
790
+ matics, 1676, Springer-Verlag, Berlin, 1997.
791
+ [18] K. Cho and C. Lee, Banach-Saks property on the dual of Schlumprecht space, Kangweon–Kyungki
792
+ Math. Jour. 6 (1998) no. 2, 341–348.
793
+ [19] Y. Choi, A short proof that B(L1) is not amenable, Proc. Roy. Soc. Edinburgh Sect. A 151 (2021),
794
+ no. 6, 1758–1767.
795
+ [20] C. Chou, A.T.-M. Lau and J. Rosenblatt, Approximation of compact operators by sums of transla-
796
+ tions, Illinois J. Math. 29 (1985), no. 2, 340–350.
797
+ [21] A. Connes, On the cohomology of operator algebras, J. Funct. Anal. 28 (1978), no. 2, 248–253.
798
+ [22] J.B. Conway, A course in functional analysis, second edition, Graduate Texts in Mathematics, 96,
799
+ Springer-Verlag, New York, 1990.
800
+ [23] H.G. Dales, Banach algebras and automatic continuity, London Mathematical Society Monographs.
801
+ New Series, 24, Oxford Science Publications, The Clarendon Press, Oxford University Press, New
802
+ York, 2000.
803
+ [24] H.G. Dales and A.T.-M. Lau, The second duals of Beurling algebras, Mem. Amer. Math. Soc. 177
804
+ (2005), no. 836.
805
+ [25] M. Daws, Arens-regularity of algebras arising from tensor norms, New York J. Math. 13 (2007),
806
+ 215–270.
807
+ [26] M. Daws and V. Runde, Can B(ℓp) ever be amenable?, Studia Math. 188 (2008), no. 2, 151–174.
808
+ [27] M. Daws and V. Runde, Erratum to “Can B(ℓp) ever be amenable?”, Studia Math. 195 (2009), no.
809
+ 3, 297–298.
810
+ [28] A. Defant and K. Floret, Tensor norms and operator ideals, North-Holland Mathematics Studies,
811
+ 176, North-Holland Publishing Co., Amsterdam, 1993.
812
+ [29] J. Diestel, J. Fourie and J. Swart, The projective tensor product. I, in: Trends in Banach spaces and
813
+ operator theory (Memphis, TN, 2001), 37–65, Contemp. Math., 321, Amer. Math. Soc., Providence,
814
+ RI, 2003.
815
+ 17
816
+
817
+ [30] J. Diestel and J.J. Uhl, Jr., Vector measures. With a foreword by B. J. Pettis, Mathematical Surveys,
818
+ no. 15, American Mathematical Society, Providence, R.I., 1977.
819
+ [31] T. Figiel and W.B. Johnson, A uniformly convex Banach space which contains no lp, Compositio
820
+ Math. 29 (1974), 179–190.
821
+ [32] E. Gardella and H. Thiel, Isomorphisms of algebras of convolution operators, Ann. Sci. ´Ec. Norm.
822
+ Sup´er. (4) 55 (2022), no. 5, 1433–1471.
823
+ [33] F. Ghahramani, R.J. Loy and G.A. Willis, Amenability and weak amenability of second conjugate
824
+ Banach algebras, Proc. Amer. Math. Soc. 124 (1996), no. 5, 1489–1497.
825
+ [34] F. Gourdeau, Amenability of Banach algebras, Ph.D. thesis, University of Cambridge, 1989.
826
+ [35] F. Gourdeau, Amenability and the second dual of a Banach algebra, Studia Math. 125 (1997), no. 1,
827
+ 75–81.
828
+ [36] N. Grønbæk, B.E. Johnson and G.A. Willis, Amenability of Banach algebras of compact operators,
829
+ Israel J. Math. 87 (1994), no. 1-3, 289–324.
830
+ [37] N. Grønbæk and G.A. Willis, Approximate identities in Banach algebras of compact operators, Canad.
831
+ Math. Bull. 36 (1993), no. 1, 45–53.
832
+ [38] U. Haagerup, All nuclear C∗-algebras are amenable, Invent. Math. 74 (1983), no. 2, 305–319.
833
+ [39] B.E. Johnson, Cohomology in Banach algebras, Memoirs of the American Mathematical Society, no.
834
+ 127, American Mathematical Society, Providence, R.I., 1972.
835
+ [40] P.W. Jones, BMO and the Banach space approximation problem, Amer. J. Math. 107 (1985), no. 4,
836
+ 853–893.
837
+ [41] M. Junge and Z.-J. Ruan, Approximation properties for noncommutative Lp-spaces associated with
838
+ discrete groups, Duke Math. J. 117 (2003), no. 2, 313–341.
839
+ [42] S. Kwapie´n and A. Pelczy´nski, Some linear topological properties of the Hardy spaces Hp, Compositio
840
+ Math. 33 (1976), no. 3, 261–288.
841
+ [43] J. Lindenstrauss, On James’s paper “Separable conjugate spaces”, Israel J. Math. 9 (1971), 279–284.
842
+ [44] J. Lindenstrauss and A. Pelczy´nski, Absolutely summing operators in Lp-spaces and their applications,
843
+ Studia Math. 29 (1968), 275–326.
844
+ [45] J. Lindenstrauss and H.P. Rosenthal, The Lp spaces, Israel J. Math. 7 (1969), 325–349.
845
+ [46] J. Lindenstrauss and L. Tzafriri, Classical Banach spaces. I, Ergebnisse der Mathematik und ihrer
846
+ Grenzgebiete, Band 92, Springer-Verlag, Berlin, 1977.
847
+ [47] N. Ozawa, A note on non-amenability of B(ℓp) for p = 1, 2, Internat. J. Math. 15 (2004), no. 6,
848
+ 557–565.
849
+ [48] T.W. Palmer, The bidual of the compact operators, Trans. Amer. Math. Soc. 288 (1985), no. 2,
850
+ 827–839.
851
+ [49] M. Pavone, Toeplitz operators on discrete groups, J. Operator Theory 27 (1992), no. 2, 359–384.
852
+ [50] N.C. Phillips, Multiplicative domain for Lp operator algebras, preprint (2014).
853
+ 18
854
+
855
+ [51] G. Pisier, On Read’s proof that B(ℓ1) is not amenable, in: Geometric aspects of functional analysis,
856
+ 269–275, Lecture Notes in Mathematics, 1850, Springer-Verlag, Berlin, 2004.
857
+ [52] D. Popa, Some examples of weakly compact, compact, absolutely summing and nuclear operators on
858
+ the space C[0, 1], Quaest. Math. 26 (2003), no. 1, 31–51.
859
+ [53] Y. Raynaud and Q. Xu, On subspaces of non-commutative Lp-spaces, J. Funct. Anal. 203 (2003),
860
+ no. 1, 149–196.
861
+ [54] C.J. Read, Relative amenability and the non-amenability of B(ℓ1), J. Aust. Math. Soc. 80 (2006), no.
862
+ 3, 317–333.
863
+ [55] H.P. Rosenthal, The Banach spaces C(K), in: Handbook of the Geometry of Banach spaces, Vol. 2,
864
+ 1547–1602, North-Holland, Amsterdam, 2003.
865
+ [56] V. Runde, Lectures on amenability, Lecture Notes in Mathematics, 1774, Springer-Verlag, Berlin,
866
+ 2002.
867
+ [57] V. Runde, B(ℓp) is never amenable, J. Amer. Math. Soc. 23 (2010), no. 4, 1175–1185.
868
+ [58] V. Runde, (Non-)amenability of B(E), in: Banach algebras 2009, 339–351, Banach Center Publ., 91,
869
+ Polish Acad. Sci. Inst. Math., Warsaw, 2010.
870
+ [59] V. Runde, Amenable Banach algebras. A panorama, Springer Monographs in Mathematics, Springer-
871
+ Verlag, New York, 2020.
872
+ [60] R.A. Ryan, Introduction to tensor products of Banach spaces, Springer Monographs in Mathematics.
873
+ Springer-Verlag London, Ltd., London, 2002.
874
+ [61] S. Sakai, Weakly compact operators on operator algebras, Pacific J. Math. 14 (1964), 659–664.
875
+ [62] T. Schlumprecht, An arbitrarily distortable Banach space, Israel J. Math. 76 (1991), no. 1-2, 81–95.
876
+ [63] C.J. Seifert, Averaging in Banach spaces, Ph.D. thesis, Kent State University, 1977.
877
+ [64] A. Szankowski, B(H) does not have the approximation property, Acta Math. 147 (1981), no. 1-2,
878
+ 89–108.
879
+ [65] W.A. Veech, Short proof of Sobczyk’s theorem, Proc. Amer. Math. Soc. 28 (1971), 627–628.
880
+ [66] S. Wassermann, On tensor products of certain group C∗-algebras, J. Funct. Anal. 23 (1976), no. 3,
881
+ 239–254.
882
+ [67] P. Wojtaszczyk, Banach spaces for analysts, Cambridge Studies in Advanced Mathematics, 25, Cam-
883
+ bridge University Press, Cambridge, 1991.
884
+ 19
885
+
886
+ Authors’ affiliations
887
+ Matthew Daws
888
+ Jeremiah Horrocks Institute, University of Central Lancashire, Preston, PR1 2HE, United Kingdom
889
890
+ Matthias Neufang
891
+ School of Mathematics and Statistics, Carleton University, 1125 Colonel By Drive, Ottawa, Ontario, K1S
892
+ 5B6, Canada
893
+ and
894
+ Laboratoire de Math´ematiques Paul Painlev´e (UMR CNRS 8524), Universit´e de Lille, D´epartement de
895
+ Math´ematiques, 59655 Villeneuve d’Ascq Cedex, France
896
897
+ 20
898
+
C9E1T4oBgHgl3EQf-AYx/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:ee4b850870067e161719635b214aca66f3ce1304efa9e01885c918434c40ffc7
3
+ size 1793078
D9E2T4oBgHgl3EQf9gn9/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:2de8de5e707a421db1f3e8dc0372c24d81391154ec18b252a1b31ec82ebe5c25
3
+ size 29425709
DdE1T4oBgHgl3EQfqAWA/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:2dcd85a74bd804a69eef0443e171debc5d0a63cfd7d4ad6b8af202664ab8b127
3
+ size 10158125
DtE2T4oBgHgl3EQfSQej/content/2301.03791v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:e06213dd5f24ce5e98bda1709de68944fbde72f9f06447ff8cfe9a6a3bfff667
3
+ size 1397693