Add files using upload-large-folder tool
Browse filesThis view is limited to 50 files because it contains too many changes.
See raw diff
- .gitattributes +101 -0
- 0NFJT4oBgHgl3EQfjiwF/content/tmp_files/2301.11574v1.pdf.txt +1837 -0
- 0NFJT4oBgHgl3EQfjiwF/content/tmp_files/load_file.txt +0 -0
- 0dFQT4oBgHgl3EQfDjUj/vector_store/index.faiss +3 -0
- 0tE3T4oBgHgl3EQfnAp3/content/tmp_files/2301.04621v1.pdf.txt +1870 -0
- 0tE3T4oBgHgl3EQfnAp3/content/tmp_files/load_file.txt +0 -0
- 29E3T4oBgHgl3EQfoAqh/vector_store/index.faiss +3 -0
- 29E3T4oBgHgl3EQfoAqh/vector_store/index.pkl +3 -0
- 3NFKT4oBgHgl3EQfQi0f/content/tmp_files/2301.11767v1.pdf.txt +1056 -0
- 3NFKT4oBgHgl3EQfQi0f/content/tmp_files/load_file.txt +0 -0
- 49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf +3 -0
- 49E1T4oBgHgl3EQfmQS7/vector_store/index.faiss +3 -0
- 4NE0T4oBgHgl3EQfvQFL/content/2301.02615v1.pdf +3 -0
- 4NE0T4oBgHgl3EQfvQFL/vector_store/index.faiss +3 -0
- 4NE0T4oBgHgl3EQfvQFL/vector_store/index.pkl +3 -0
- 4NFQT4oBgHgl3EQfHjWk/content/2301.13249v1.pdf +3 -0
- 4NFQT4oBgHgl3EQfHjWk/vector_store/index.faiss +3 -0
- 4NFQT4oBgHgl3EQfHjWk/vector_store/index.pkl +3 -0
- 59E2T4oBgHgl3EQf7Ahe/content/2301.04205v1.pdf +3 -0
- 59E2T4oBgHgl3EQf7Ahe/vector_store/index.faiss +3 -0
- 59E2T4oBgHgl3EQf7Ahe/vector_store/index.pkl +3 -0
- 5dE3T4oBgHgl3EQfQgnL/vector_store/index.faiss +3 -0
- 69E4T4oBgHgl3EQf2A2F/content/tmp_files/2301.05295v1.pdf.txt +416 -0
- 69E4T4oBgHgl3EQf2A2F/content/tmp_files/load_file.txt +323 -0
- 7NE4T4oBgHgl3EQfCQsk/content/tmp_files/2301.04858v1.pdf.txt +1675 -0
- 7NE4T4oBgHgl3EQfCQsk/content/tmp_files/load_file.txt +0 -0
- 89AyT4oBgHgl3EQfdPcr/content/2301.00297v1.pdf +3 -0
- 89AyT4oBgHgl3EQfdPcr/vector_store/index.faiss +3 -0
- 89AyT4oBgHgl3EQfdPcr/vector_store/index.pkl +3 -0
- 8dE1T4oBgHgl3EQfngSj/content/tmp_files/2301.03310v1.pdf.txt +693 -0
- 8dE1T4oBgHgl3EQfngSj/content/tmp_files/load_file.txt +0 -0
- 8dE4T4oBgHgl3EQfCwtu/content/2301.04863v1.pdf +3 -0
- 8dE4T4oBgHgl3EQfCwtu/vector_store/index.faiss +3 -0
- 8dE4T4oBgHgl3EQfCwtu/vector_store/index.pkl +3 -0
- 9tE4T4oBgHgl3EQf3g1J/content/tmp_files/2301.05306v1.pdf.txt +2152 -0
- 9tE4T4oBgHgl3EQf3g1J/content/tmp_files/load_file.txt +0 -0
- A9FKT4oBgHgl3EQfWS5f/content/2301.11791v1.pdf +3 -0
- A9FKT4oBgHgl3EQfWS5f/vector_store/index.faiss +3 -0
- A9FKT4oBgHgl3EQfWS5f/vector_store/index.pkl +3 -0
- B9E4T4oBgHgl3EQfeA2w/content/tmp_files/2301.05096v1.pdf.txt +734 -0
- B9E4T4oBgHgl3EQfeA2w/content/tmp_files/load_file.txt +0 -0
- C9E0T4oBgHgl3EQfQQB9/content/2301.02190v1.pdf +3 -0
- C9E0T4oBgHgl3EQfQQB9/vector_store/index.faiss +3 -0
- C9E0T4oBgHgl3EQfQQB9/vector_store/index.pkl +3 -0
- C9E1T4oBgHgl3EQf-AYx/content/tmp_files/2301.03562v1.pdf.txt +898 -0
- C9E1T4oBgHgl3EQf-AYx/content/tmp_files/load_file.txt +0 -0
- CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf +3 -0
- D9E2T4oBgHgl3EQf9gn9/vector_store/index.faiss +3 -0
- DdE1T4oBgHgl3EQfqAWA/vector_store/index.faiss +3 -0
- DtE2T4oBgHgl3EQfSQej/content/2301.03791v1.pdf +3 -0
.gitattributes
CHANGED
@@ -1692,3 +1692,104 @@ kdA0T4oBgHgl3EQfI_9R/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -tex
|
|
1692 |
xNE5T4oBgHgl3EQfMw6X/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1693 |
L9FIT4oBgHgl3EQfbiuW/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1694 |
D9E2T4oBgHgl3EQf9gn9/content/2301.04230v1.pdf filter=lfs diff=lfs merge=lfs -text
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1692 |
xNE5T4oBgHgl3EQfMw6X/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1693 |
L9FIT4oBgHgl3EQfbiuW/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1694 |
D9E2T4oBgHgl3EQf9gn9/content/2301.04230v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1695 |
+
CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1696 |
+
KdAyT4oBgHgl3EQfsflO/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1697 |
+
z9FQT4oBgHgl3EQfCzX9/content/2301.13232v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1698 |
+
DdE1T4oBgHgl3EQfqAWA/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1699 |
+
z9FQT4oBgHgl3EQfCzX9/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1700 |
+
y9AyT4oBgHgl3EQfn_hb/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1701 |
+
5dE3T4oBgHgl3EQfQgnL/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1702 |
+
o9E0T4oBgHgl3EQfqgFN/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1703 |
+
edFKT4oBgHgl3EQfri7Q/content/2301.11879v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1704 |
+
GdE1T4oBgHgl3EQfFAO9/content/2301.02898v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1705 |
+
utAyT4oBgHgl3EQf0vkn/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1706 |
+
N9FIT4oBgHgl3EQfdisk/content/2301.11270v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1707 |
+
SNE4T4oBgHgl3EQfLAy5/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1708 |
+
4NFQT4oBgHgl3EQfHjWk/content/2301.13249v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1709 |
+
xdE3T4oBgHgl3EQflgqp/content/2301.04608v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1710 |
+
KtFJT4oBgHgl3EQfxS3S/content/2301.11634v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1711 |
+
OdFKT4oBgHgl3EQffi6d/content/2301.11830v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1712 |
+
T9E3T4oBgHgl3EQfEQll/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1713 |
+
SNE4T4oBgHgl3EQfLAy5/content/2301.04935v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1714 |
+
GdE1T4oBgHgl3EQfFAO9/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1715 |
+
aNAzT4oBgHgl3EQfm_36/content/2301.01575v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1716 |
+
L9FIT4oBgHgl3EQfbiuW/content/2301.11262v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1717 |
+
49E1T4oBgHgl3EQfmQS7/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1718 |
+
vdE3T4oBgHgl3EQf-gs4/content/2301.04826v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1719 |
+
4NFQT4oBgHgl3EQfHjWk/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1720 |
+
C9E0T4oBgHgl3EQfQQB9/content/2301.02190v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1721 |
+
OdFKT4oBgHgl3EQffi6d/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1722 |
+
OdE3T4oBgHgl3EQfxQsz/content/2301.04709v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1723 |
+
49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1724 |
+
T9E1T4oBgHgl3EQfIQOS/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1725 |
+
IdE4T4oBgHgl3EQfhA2z/content/2301.05122v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1726 |
+
Y9AzT4oBgHgl3EQfKvuz/content/2301.01103v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1727 |
+
59E2T4oBgHgl3EQf7Ahe/content/2301.04205v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1728 |
+
TdE4T4oBgHgl3EQfmQ04/content/2301.05166v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1729 |
+
dtE4T4oBgHgl3EQfQQzr/content/2301.04981v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1730 |
+
utE4T4oBgHgl3EQfWgzV/content/2301.05034v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1731 |
+
GtA0T4oBgHgl3EQfBv8y/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1732 |
+
N9FIT4oBgHgl3EQfdisk/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1733 |
+
T9E2T4oBgHgl3EQftQh4/content/2301.04068v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1734 |
+
aNAzT4oBgHgl3EQfm_36/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1735 |
+
zNFQT4oBgHgl3EQfyzZN/content/2301.13410v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1736 |
+
59E2T4oBgHgl3EQf7Ahe/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1737 |
+
XdFLT4oBgHgl3EQfUC-H/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1738 |
+
GtA0T4oBgHgl3EQfBv8y/content/2301.01979v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1739 |
+
MtAyT4oBgHgl3EQfs_ll/content/2301.00586v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1740 |
+
TdA0T4oBgHgl3EQfEP9z/content/2301.02015v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1741 |
+
PNA0T4oBgHgl3EQfC__J/content/2301.01998v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1742 |
+
D9E2T4oBgHgl3EQf9gn9/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1743 |
+
0dFQT4oBgHgl3EQfDjUj/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1744 |
+
IdE4T4oBgHgl3EQfhA2z/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1745 |
+
T9E2T4oBgHgl3EQftQh4/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1746 |
+
C9E0T4oBgHgl3EQfQQB9/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1747 |
+
cdAyT4oBgHgl3EQfXfcW/content/2301.00182v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1748 |
+
utE4T4oBgHgl3EQfWgzV/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1749 |
+
ltE2T4oBgHgl3EQfeAeD/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1750 |
+
vdE3T4oBgHgl3EQf-gs4/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1751 |
+
29E3T4oBgHgl3EQfoAqh/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1752 |
+
KtFJT4oBgHgl3EQfxS3S/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1753 |
+
cdAyT4oBgHgl3EQfXfcW/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1754 |
+
XdFLT4oBgHgl3EQfUC-H/content/2301.12047v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1755 |
+
MtAyT4oBgHgl3EQfs_ll/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1756 |
+
_NAzT4oBgHgl3EQfvf2q/content/2301.01708v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1757 |
+
p9E1T4oBgHgl3EQf2QWg/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1758 |
+
DtE2T4oBgHgl3EQfSQej/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1759 |
+
p9E1T4oBgHgl3EQf2QWg/content/2301.03477v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1760 |
+
jdE4T4oBgHgl3EQfTAyo/content/2301.05004v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1761 |
+
DtE2T4oBgHgl3EQfSQej/content/2301.03791v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1762 |
+
PNA0T4oBgHgl3EQfC__J/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1763 |
+
jdE4T4oBgHgl3EQfTAyo/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1764 |
+
4NE0T4oBgHgl3EQfvQFL/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1765 |
+
_NAzT4oBgHgl3EQfvf2q/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1766 |
+
ltE2T4oBgHgl3EQfeAeD/content/2301.03912v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1767 |
+
edFKT4oBgHgl3EQfri7Q/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1768 |
+
4NE0T4oBgHgl3EQfvQFL/content/2301.02615v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1769 |
+
RdE2T4oBgHgl3EQfWQda/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1770 |
+
t9E_T4oBgHgl3EQf9xwP/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1771 |
+
A9FKT4oBgHgl3EQfWS5f/content/2301.11791v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1772 |
+
89AyT4oBgHgl3EQfdPcr/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1773 |
+
89AyT4oBgHgl3EQfdPcr/content/2301.00297v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1774 |
+
RdE2T4oBgHgl3EQfWQda/content/2301.03831v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1775 |
+
A9FKT4oBgHgl3EQfWS5f/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1776 |
+
zNFQT4oBgHgl3EQfyzZN/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1777 |
+
VtFIT4oBgHgl3EQfhCtr/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1778 |
+
YdFAT4oBgHgl3EQf3R5S/content/2301.08719v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1779 |
+
_NAzT4oBgHgl3EQfFvpH/content/2301.01015v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1780 |
+
TdA0T4oBgHgl3EQfEP9z/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1781 |
+
s9E_T4oBgHgl3EQf9Bwt/content/2301.08378v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1782 |
+
etA0T4oBgHgl3EQfHP_m/content/2301.02060v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1783 |
+
Y9FST4oBgHgl3EQfADiR/content/2301.13697v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1784 |
+
8dE4T4oBgHgl3EQfCwtu/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1785 |
+
udFLT4oBgHgl3EQfjC8Y/content/2301.12109v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1786 |
+
_9FQT4oBgHgl3EQf8TZV/content/2301.13446v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1787 |
+
VtFIT4oBgHgl3EQfhCtr/content/2301.11286v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1788 |
+
FtAzT4oBgHgl3EQfxP5f/content/2301.01734v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1789 |
+
8dE4T4oBgHgl3EQfCwtu/content/2301.04863v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1790 |
+
_NAzT4oBgHgl3EQfFvpH/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1791 |
+
kNE_T4oBgHgl3EQf5Rz9/content/2301.08358v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1792 |
+
atE3T4oBgHgl3EQfdQoZ/content/2301.04532v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1793 |
+
kNE_T4oBgHgl3EQf5Rz9/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1794 |
+
OdE3T4oBgHgl3EQfxQsz/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1795 |
+
UdAyT4oBgHgl3EQfuvkh/content/2301.00617v1.pdf filter=lfs diff=lfs merge=lfs -text
|
0NFJT4oBgHgl3EQfjiwF/content/tmp_files/2301.11574v1.pdf.txt
ADDED
@@ -0,0 +1,1837 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
Damage Preserving Transformation for Materials with Microstructure
|
2 |
+
Philip P. Müllera, Falk K. Wittela, David S. Kammera,∗
|
3 |
+
aInstitute for Building Materials (IfB), ETH Zuerich, Laura-Hezner-Weg 7, 8093, Zuerich, Switzerland
|
4 |
+
Abstract
|
5 |
+
The failure of heterogeneous materials with microstructures is a complex process of damage nucleation, growth and
|
6 |
+
localisation. This process spans multiple length scales and is challenging to simulate numerically due to its high com-
|
7 |
+
putational cost. One option is to use domain decomposed multi-scale methods with dynamical refinement. If needed,
|
8 |
+
these methods refine coarse regions into a fine-scale representation to explicitly model the damage in the microstructure.
|
9 |
+
However, damage evolution is commonly restricted to fine-scale regions only. Thus, they are unable to capture the full
|
10 |
+
complexity and breath of the degradation process in the material. In this contribution, a generic procedure that allows
|
11 |
+
to account for damage in all representations is proposed. The approach combines a specially designed damage law,
|
12 |
+
with a scheme to generate pre-damaged fine-scale microstructures. Results indicate that the damage approximation for
|
13 |
+
the coarse representation works well. Furthermore, the generated fine-scale damage patterns are overall consistent with
|
14 |
+
explicitly simulated damage patterns. Minor discrepancies occur in the generation but subsequently vanish when explicit
|
15 |
+
damage evolution continuous; for instance under increased load. The presented approach provides a methodological basis
|
16 |
+
for adaptive multi-scale simulation schemes with consistent damage evolution.
|
17 |
+
Keywords:
|
18 |
+
Lattice, Continuum damage mechanics, Microstrutured disordered material, Anisotropic damage,
|
19 |
+
Multi-scale simulation, Harmonic decomposition, Damage modelling
|
20 |
+
∗Corresponding author
|
21 |
+
Email addresses: [email protected] (Philip P. Müller),
|
22 |
+
[email protected] (Falk K. Wittel), [email protected] (David S.
|
23 |
+
Kammer)
|
24 |
+
|
25 |
+
Contents
|
26 |
+
1
|
27 |
+
Introduction
|
28 |
+
3
|
29 |
+
2
|
30 |
+
Materials and Methods
|
31 |
+
4
|
32 |
+
2.1
|
33 |
+
Generic Damage Transforming Method . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
|
34 |
+
4
|
35 |
+
2.2
|
36 |
+
Continuum Representation of 2D Isotropic Continua . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
|
37 |
+
4
|
38 |
+
2.3
|
39 |
+
Exemplary Material Motive . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
|
40 |
+
5
|
41 |
+
2.4
|
42 |
+
Determining the Damage Law for the Continuum . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
|
43 |
+
6
|
44 |
+
2.5
|
45 |
+
Process for the Construction of a Damaged Lattice . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
|
46 |
+
6
|
47 |
+
2.6
|
48 |
+
Numerical Simulations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
|
49 |
+
7
|
50 |
+
2.6.1
|
51 |
+
The UniformSim Simulation Setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
|
52 |
+
7
|
53 |
+
2.6.2
|
54 |
+
The MultiLoadSim Simulation Setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
|
55 |
+
7
|
56 |
+
2.6.3
|
57 |
+
The ReconstrSim Simulation Setup
|
58 |
+
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
|
59 |
+
8
|
60 |
+
3
|
61 |
+
Results
|
62 |
+
8
|
63 |
+
3.1
|
64 |
+
Details of a Numerical Simulation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
|
65 |
+
8
|
66 |
+
3.2
|
67 |
+
Estimation of the Damage Law �D(#–κ)
|
68 |
+
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
|
69 |
+
8
|
70 |
+
3.3
|
71 |
+
Test of the Damage Evolution Law �D(#–κ)
|
72 |
+
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
|
73 |
+
11
|
74 |
+
3.4
|
75 |
+
Estimation of the Transfer Function #–�r (#–κ) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
|
76 |
+
12
|
77 |
+
3.5
|
78 |
+
Tests of the Reconstruction Process
|
79 |
+
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
|
80 |
+
13
|
81 |
+
4
|
82 |
+
Summary and Conclusion
|
83 |
+
15
|
84 |
+
5
|
85 |
+
CRediT
|
86 |
+
15
|
87 |
+
6
|
88 |
+
Declaration of Competing Interest
|
89 |
+
15
|
90 |
+
7
|
91 |
+
Data Availability
|
92 |
+
15
|
93 |
+
Appendix A
|
94 |
+
Parameters of �rx(κx) and �ry(κy)
|
95 |
+
16
|
96 |
+
References
|
97 |
+
17
|
98 |
+
2
|
99 |
+
|
100 |
+
1. Introduction
|
101 |
+
At a certain scale even heterogeneous materials will
|
102 |
+
appear homogeneous and some can even be considered
|
103 |
+
isotropic.
|
104 |
+
Among others, this is true for concrete, one
|
105 |
+
of the most widely used commodity on earth, a mixture
|
106 |
+
made of sand, aggregates, cement, water and chemical ad-
|
107 |
+
mixtures. The growth of damage inside concrete is highly
|
108 |
+
affected by the particular microstructure, where, depend-
|
109 |
+
ing on the scale, aggregates or even sand grains act either
|
110 |
+
as focal points for stresses or obstacles for damage.
|
111 |
+
Damage initiates at very small scales, long before the
|
112 |
+
macroscopic structure itself will fail or crack. Instead, the
|
113 |
+
damage leads to a reduction of the material’s stiffness.
|
114 |
+
Nevertheless, at one point the accumulated damage be-
|
115 |
+
comes so widespread, that even its smallest increase, will
|
116 |
+
trigger the previously isolated nuclei to merge. This leads
|
117 |
+
to a cascade of increasingly larger defects, culminating in
|
118 |
+
the emergence of a macroscopic crack.
|
119 |
+
Continuum based methods are the methods of choice
|
120 |
+
if large structures should be simulated, due to their com-
|
121 |
+
putational efficiency. For taking into account intrinsic de-
|
122 |
+
generative processes, constitutive laws are used. One of
|
123 |
+
the earliest, but still widely used laws for modelling dam-
|
124 |
+
age in concrete was proposed by Mazars (Lemaître, 2001;
|
125 |
+
Mazars and Lemaître, 1985).
|
126 |
+
It employs a scalar dam-
|
127 |
+
age variable to degrade the material’s stiffness. However,
|
128 |
+
even if the material was initially isotropic, damage will
|
129 |
+
induce anisotropy into the material’s behaviour. Clearly
|
130 |
+
any scalar damage variable is inherently unable to capture
|
131 |
+
this. During the years, a variety of anisotropic damage
|
132 |
+
models were proposed to address this issue (Brancherie
|
133 |
+
and Ibrahimbegovic, 2009; Braun et al., 2021; H. Chen et
|
134 |
+
al., 2016; Delaplace and Desmorat, 2008; Desmorat et al.,
|
135 |
+
2007; Gaede et al., 2013). All of them consider the ac-
|
136 |
+
cumulated effects of the damage’s growth, represented by
|
137 |
+
internal state variables at the material points and by that
|
138 |
+
disregard the actual microstructure, whose degeneration is
|
139 |
+
the actual cause for the emerging damage.
|
140 |
+
To overcome this deficiency, the entire microstructure
|
141 |
+
could be explicitly represented and simulated. Unfortu-
|
142 |
+
nately, even with today’s fast computers, this is only pos-
|
143 |
+
sible for small sizes. A way to overcome this barrier are
|
144 |
+
multi-scale methods. They allow to invest computational
|
145 |
+
power exactly where it is needed, by combining different
|
146 |
+
representations. Although, many different methods were
|
147 |
+
proposed over the past years, they can be classified to be
|
148 |
+
either of hierarchical or of concurrent nature (Liu, 2018;
|
149 |
+
Zhang et al., 2012).
|
150 |
+
Hierarchical methods are characterised by a full sepa-
|
151 |
+
ration of scales, which allows to treat every level indepen-
|
152 |
+
dently from each other. Thus, the information is passed
|
153 |
+
between the different levels as one serves as input for the
|
154 |
+
hierarchically higher level.
|
155 |
+
Opposed to this, concurrent methods lack the full sepa-
|
156 |
+
ration of scales and typically decompose the computational
|
157 |
+
domain into different regions. Imagine a typical setting
|
158 |
+
where high accuracy is only needed inside a small part of
|
159 |
+
the computational domain, for example around a crack tip.
|
160 |
+
Ideally, one limits methods with high accuracy but large
|
161 |
+
computational burden to these small regions, while the
|
162 |
+
remaining part of the computational domain is described
|
163 |
+
by much more efficient methods. The flow of information
|
164 |
+
between the different regions must be handled by a cou-
|
165 |
+
pling scheme such as the Arlequin method (Anciaux et al.,
|
166 |
+
2008; Bauman et al., 2008; Guidault and Belytschko, 2007;
|
167 |
+
Unger and Eckardt, 2011; Wellmann and Wriggers, 2012).
|
168 |
+
Whenever the decomposition is not available in advance,
|
169 |
+
one must resort to adaptive methods to refine regions on
|
170 |
+
demand (e.g., P. Y. Chen et al., 2021; Evangelista, Alves,
|
171 |
+
et al., 2020; Evangelista and Moreira, 2020; Rodrigues et
|
172 |
+
al., 2018). However, important questions are (i) how are
|
173 |
+
the regions that need to be refined identified, and (ii) how
|
174 |
+
is the loading history of the coarse connected to the initial
|
175 |
+
state of the newly created fine scale representation? Espe-
|
176 |
+
cially (ii) does not seem to be addressed well in literature.
|
177 |
+
Most authors assume that the coarse representation does
|
178 |
+
not accumulate any damage before being refined (L. Chen
|
179 |
+
et al., 2021; P. Y. Chen et al., 2021; Rodrigues et al.,
|
180 |
+
2018; Unger, Eckardt, and Konke, 2011). Consequently,
|
181 |
+
damage is only allowed to evolve inside of the fine scale
|
182 |
+
representations that start off as undamaged. This is in-
|
183 |
+
consistent because it essentially disregards the entire load
|
184 |
+
history, including the damage, that would have degraded
|
185 |
+
a real material.
|
186 |
+
In this paper we propose, to the best of our knowledge,
|
187 |
+
a generic approach for the refinement step in adaptive con-
|
188 |
+
current multi-scale simulations, that is able to account for
|
189 |
+
the preceding damage evolution inside the coarse repre-
|
190 |
+
sentation. Thus, the created fine scale representation con-
|
191 |
+
tains an initial damage that is mechanically consistent to
|
192 |
+
the damage that has evolved inside the coarse represen-
|
193 |
+
tation. Our solution is to equip both, the fine and coarse
|
194 |
+
scale representations, with their own damage measure. We
|
195 |
+
analyse these damage measures and establish a connection
|
196 |
+
between them. Our approach is actually able to address
|
197 |
+
both questions raised above. By interpreting the coarse
|
198 |
+
damage measure as a “measure of suitability”, critical re-
|
199 |
+
gions that require refinement are regions whose damage
|
200 |
+
measure surpassed some predetermined threshold value.
|
201 |
+
Further, the coarse damage is used to initialise the fine
|
202 |
+
scale damage.
|
203 |
+
While the approach is generic and rather simple, its
|
204 |
+
practical details highly depend on the selected represen-
|
205 |
+
tations. Thus, we demonstrate it by applying it to one
|
206 |
+
particular test case. The reminder of this paper is organ-
|
207 |
+
ised as follows: In Sec. 2, we explain our method in more
|
208 |
+
detail and present the proposed techniques. In Sec. 3 we
|
209 |
+
determine the parameters of our method and asses its ap-
|
210 |
+
plicability, before we draw final conclusions in Sec. 4.
|
211 |
+
3
|
212 |
+
|
213 |
+
2. Materials and Methods
|
214 |
+
The particular choice of the material’s microstructure,
|
215 |
+
also called motive, is in general arbitrary, but should fol-
|
216 |
+
low principles of representative volume elements (RVE)
|
217 |
+
(Lemaître and Desmorat, 2005). The state of a discrete
|
218 |
+
representation with its inherent characteristic structure is
|
219 |
+
fully given by r, that describes every single discrete ele-
|
220 |
+
ment (right side of Fig. 1). In this representation, damage
|
221 |
+
D(r) is given by the irreversible degeneration of the con-
|
222 |
+
stituting elements. On the left side of Fig. 1, the smeared
|
223 |
+
continuum representation is shown, which lacks such an
|
224 |
+
explicit microstructure and only considers cumulative ef-
|
225 |
+
fects of the damage through internal state variables added
|
226 |
+
to the constitutive law. Here, damage is given by D, which
|
227 |
+
depends on the state #–κ at a particular location and is em-
|
228 |
+
bedded in the constitutive law.
|
229 |
+
Figure 1: The continuum damage, at a certain point, is given by D, which
|
230 |
+
depends on the respective state #–
|
231 |
+
κ . The discrete damage D(r) depends on
|
232 |
+
r and hence on the state of all discrete elements of the lattice. The two
|
233 |
+
representations are interconnected to each other by homogenisation and
|
234 |
+
refinement processes. Scale of the lattice is exaggerated.
|
235 |
+
Since the continuum representation loses its validity
|
236 |
+
once cracks localise, one must refine the continuum to its
|
237 |
+
discrete twin in such way that all important aspects of the
|
238 |
+
fracture will be captured accurately on the fine scale. The
|
239 |
+
key for a meaningful adaptive modelling of the damage
|
240 |
+
evolution lies in the transformation of the continuum to
|
241 |
+
the discrete representation, that conserves the degraded
|
242 |
+
mechanical behaviour found inside the continuum. One
|
243 |
+
focus of this work is an approach to construct a discrete
|
244 |
+
representation that respects the preceding damage present
|
245 |
+
in the continuum representation.
|
246 |
+
Even though the procedure is generic and in principal
|
247 |
+
not restricted to specific numerical material representa-
|
248 |
+
tions, this paper focuses on one particular choice. How-
|
249 |
+
ever, we will outline the generic way of working with the
|
250 |
+
method (see Sec. 2.1), before we start with our specific
|
251 |
+
choice.
|
252 |
+
We exemplarily chose a two-dimensional plane
|
253 |
+
stress, isotropic material (see Sec. 2.2) with an under-
|
254 |
+
lying material heterogeneity represented by a triangular
|
255 |
+
network of beam-truss elements with linear-elastic, brittle
|
256 |
+
behaviour with quenched disorder of breaking thresholds
|
257 |
+
(see Sec. 2.3). We then discuss the particular choice of
|
258 |
+
the damage law as well as the reconstruction step (see
|
259 |
+
Secs. 2.4, 2.5). To determine and test them, we use data
|
260 |
+
obtained from numerical simulations (see Sec. 2.6).
|
261 |
+
2.1. Generic Damage Transforming Method
|
262 |
+
Initially, the domain is described as a continuum with-
|
263 |
+
out any internal structure, whose state is fully described
|
264 |
+
by the continuum state variable #–κ. In the continuum, the
|
265 |
+
damage evolution is fully govern by the damage function
|
266 |
+
�D(#–κ). Therefore, �D(#–κ) can be interpreted as the macro-
|
267 |
+
scopic damage, that is expected for a hypothetical dis-
|
268 |
+
crete representation with identical loading. Thus we can
|
269 |
+
determine the function describing the macroscopic dam-
|
270 |
+
age by homogenising the discrete damage D(r). This leads
|
271 |
+
to a perspective on the damage law that is different from
|
272 |
+
the conventional one, where the damage law is calibrated
|
273 |
+
against a physical material. Instead, here the law is cali-
|
274 |
+
brated against a particular numerical representation of the
|
275 |
+
material.
|
276 |
+
When the continuum model experiences a certain dam-
|
277 |
+
age limit, it is no longer suitable and has to be refined to
|
278 |
+
a discrete representation. However, this discrete state has
|
279 |
+
to be consistent with the previous continuum representa-
|
280 |
+
tion. This includes stiffness and damage, which have to
|
281 |
+
be preserved as much as possible by the transformation.
|
282 |
+
Determining this reconstruction process challenging, since
|
283 |
+
it is by its very nature not unique.
|
284 |
+
2.2. Continuum Representation of 2D Isotropic Continua
|
285 |
+
To represent a two-dimensional isotropic material un-
|
286 |
+
der plane stress, the Finite Element Method (FEM) and
|
287 |
+
as damage measure continuum damage mechanics (CDM)
|
288 |
+
is used (Lemaître, 2001; Lemaître, 1996; Lemaître and
|
289 |
+
Desmorat, 2005). We use the well known material law:
|
290 |
+
σ = (I − D) Cε,
|
291 |
+
(1)
|
292 |
+
where σ and ε denote the continuum stress and strain ten-
|
293 |
+
sors, respectively, and C is the continuum stiffness tensor
|
294 |
+
of the undamaged material. Due to the choice of CDM, as
|
295 |
+
continuum damage measure, the damage variable D can
|
296 |
+
directly be identified with the damage function �D(#–κ). Fur-
|
297 |
+
ther, we identify #–κ as the continuum state variable given
|
298 |
+
as
|
299 |
+
#–κ :=
|
300 |
+
�κx
|
301 |
+
κy
|
302 |
+
�
|
303 |
+
.
|
304 |
+
(2)
|
305 |
+
A zoning approach is used to divide the principal strain
|
306 |
+
space along an angle χ, known as zone boundary, into an
|
307 |
+
x- (shaded red parts) and y-zone (shaded yellow parts in
|
308 |
+
Fig. 2). The two components κx and κy represent the max-
|
309 |
+
imal reached principal tensile strain in x and y direction,
|
310 |
+
respectively, i.e.
|
311 |
+
κx := max
|
312 |
+
�
|
313 |
+
κx, ⟨ε1⟩+
|
314 |
+
�
|
315 |
+
,
|
316 |
+
κy := max
|
317 |
+
�
|
318 |
+
κy, ⟨ε2⟩+
|
319 |
+
�
|
320 |
+
.
|
321 |
+
While ε1 and ε2 are the eigenvalues of the strain tensor
|
322 |
+
ε, its eigenvectors form a Givens rotation matrix of angle
|
323 |
+
Γ, which is sometimes called eigenangle.
|
324 |
+
The angle Γ,
|
325 |
+
together with the boundary χ, determines which zone the
|
326 |
+
eigenvalues are associated with, see Fig. 2.
|
327 |
+
4
|
328 |
+
|
329 |
+
Figure 2: Interpretation of the zone boundary parameter χ. While ε1
|
330 |
+
and ε2 are the eigenvalues of ε, its eigenvectors are described by the
|
331 |
+
value Γ. The eigenangle Γ and the zone boundary χ determines which
|
332 |
+
eigenvalue acts in which direction.
|
333 |
+
Since the continuum damage is only used during the
|
334 |
+
initial phase with low damage, two assumptions are made:
|
335 |
+
(i) It is assumed that the damage is orthotropic which re-
|
336 |
+
duces D and �D(#–κ) to diagonal matrices. (ii) It is assumed
|
337 |
+
that κx only acts on the x-damage while κy only affects
|
338 |
+
the y-damage, which means that we assume no correlation
|
339 |
+
between the directions.
|
340 |
+
2.3. Exemplary Material Motive
|
341 |
+
The example material motive chosen here is based on
|
342 |
+
models proposed in Refs. (Herrmann et al., 1989; Mier,
|
343 |
+
2017), namely a regular triangular lattice but formed by
|
344 |
+
3rd order Reddy truss-beam elements with characteristic
|
345 |
+
lattice size ℓ (Reddy, 1997; Reddy et al., 1997).
|
346 |
+
Using
|
347 |
+
beams allows to include bending properties and the re-
|
348 |
+
sulting lattice is able to represent a Cosserat continuum
|
349 |
+
(Ostoja-Starzewski, 2008; Vardoulakis, 2019).
|
350 |
+
The mi-
|
351 |
+
croscopical beams consist of an isotropic material with
|
352 |
+
Young’s modulus Eb and Poisson’s ratio νb. A list of all
|
353 |
+
used material parameters is given in Tab. I. In a multi-
|
354 |
+
scale simulation, Eb has to be chosen such that the result-
|
355 |
+
ing behaviour of the discrete structure matches the one of
|
356 |
+
the continuum, i.e. its stiffness tensor C. However, since
|
357 |
+
this paper studies the refinement step in isolation, with-
|
358 |
+
out having an actual continuum phase, the choice of Eb is
|
359 |
+
actually irrelevant.
|
360 |
+
Lattice Geometry.
|
361 |
+
The motive is defined by the number of
|
362 |
+
nodes (Nx, Ny) in x- and y-direction, the spatial extension
|
363 |
+
in x-direction Lx, with resulting characteristic lattice size
|
364 |
+
ℓ := Lx/(Nx −1) and spatial y-extension Ly := Nyℓ
|
365 |
+
√
|
366 |
+
3/2.
|
367 |
+
An out-of-plane height of H is assumed. To remove the
|
368 |
+
symmetries of the lattice, topological disorder is intro-
|
369 |
+
duced (Moukarzel and Herrmann, 1992; Wittel, 2006) by
|
370 |
+
adding the random displacement
|
371 |
+
#–x ∆
|
372 |
+
i := a ℓ
|
373 |
+
2
|
374 |
+
#–x ∗
|
375 |
+
i
|
376 |
+
(3)
|
377 |
+
to every internal node of the grid, where #–x ∗
|
378 |
+
i is a random
|
379 |
+
vector sampled uniformly from the unit circle (see Fig. 3a).
|
380 |
+
Table I: Parameters of the discrete material motive.
|
381 |
+
Property
|
382 |
+
Value
|
383 |
+
Unit
|
384 |
+
Nx, Ny
|
385 |
+
300, 346
|
386 |
+
[−]
|
387 |
+
Lx, Ly
|
388 |
+
2, 1.998
|
389 |
+
m
|
390 |
+
H
|
391 |
+
1
|
392 |
+
m
|
393 |
+
Eb
|
394 |
+
1 × 106
|
395 |
+
Pa
|
396 |
+
νb
|
397 |
+
0.3
|
398 |
+
[−]
|
399 |
+
kε
|
400 |
+
3
|
401 |
+
[−]
|
402 |
+
λε
|
403 |
+
0.02
|
404 |
+
[−]
|
405 |
+
kΦ
|
406 |
+
3
|
407 |
+
◦
|
408 |
+
λΦ
|
409 |
+
0.02
|
410 |
+
[−]
|
411 |
+
The distortion is controlled by parameter a ∈ [0, 1[, known
|
412 |
+
as distortion level.
|
413 |
+
Figure 3: (a) Distortion of the central node, ignoring the distortion of the
|
414 |
+
surrounding nodes. The location of the distorted node (yellow circle), is
|
415 |
+
randomly selected within the blue circle of radius aℓ/2. Afterwards, the
|
416 |
+
length of the beams are adjusted to match the new node location (black
|
417 |
+
lines). (b) The thickness of beam i is given as ti := A(O)
|
418 |
+
i
|
419 |
+
/ℓi, where ℓi is
|
420 |
+
its length and A(O)
|
421 |
+
i
|
422 |
+
is the area the beam is representing. Points zL and
|
423 |
+
zK are centres of the adjacent triangles’ incircles.
|
424 |
+
Geometrical Properties of Beam-Truss Elements.
|
425 |
+
The
|
426 |
+
thickness of beam i, denoted as ti, depends on the lat-
|
427 |
+
tice’s geometry. It is given as ti := A(O)
|
428 |
+
i
|
429 |
+
/ℓi, where A(O)
|
430 |
+
i
|
431 |
+
is the area represented by the beam and ℓi its length, see
|
432 |
+
Fig. 3b. The area A(O)
|
433 |
+
i
|
434 |
+
is formally defined as the set of
|
435 |
+
points that are closer to beam i than any other beam, but
|
436 |
+
are inside the lattice. It can be determined by finding the
|
437 |
+
intersection of the angle’s bisectors, i.e. centre of the incir-
|
438 |
+
cle, of the two adjacent triangles denoted as zK and zL in
|
439 |
+
Fig. 3b. In case the beam is part of the boundary A(O)
|
440 |
+
i
|
441 |
+
is
|
442 |
+
artificially doubled. This ensures that in a regular lattice
|
443 |
+
all beams have the same axial rigidity.
|
444 |
+
Damage Criterion Applied to the Beam-Truss Lattice.
|
445 |
+
In
|
446 |
+
the discrete representation, damage is the irreversible fail-
|
447 |
+
ure of elements, namely the reduction of their contributing
|
448 |
+
stiffness to an insignificant level. To determine if a beam
|
449 |
+
has surpassed its loading capacity, the elliptical criterion
|
450 |
+
� εi
|
451 |
+
εi; th
|
452 |
+
�2
|
453 |
+
+
|
454 |
+
max
|
455 |
+
����Φ(r)
|
456 |
+
i
|
457 |
+
��� ,
|
458 |
+
���Φ(l)
|
459 |
+
i
|
460 |
+
���
|
461 |
+
�
|
462 |
+
Φi; th
|
463 |
+
=: Ψi ≥ 1
|
464 |
+
(4)
|
465 |
+
is used, where εi;th and Φi;th are the beam’s elongation
|
466 |
+
and bending thresholds, respectively (Herrmann et al.,
|
467 |
+
5
|
468 |
+
|
469 |
+
KicKy
|
470 |
+
E2a
|
471 |
+
(b)
|
472 |
+
ZK
|
473 |
+
a
|
474 |
+
ZL
|
475 |
+
Φ
|
476 |
+
(r)1989). Both thresholds are sampled independently from
|
477 |
+
the Weibull distributions εi;th
|
478 |
+
iid
|
479 |
+
∼ Weib (kε, λε) and Φi;th
|
480 |
+
iid
|
481 |
+
∼
|
482 |
+
Weib (kΦ, λΦ).
|
483 |
+
The Discrete State Variable #–r .
|
484 |
+
The
|
485 |
+
discrete
|
486 |
+
state
|
487 |
+
is
|
488 |
+
uniquely described by r. However, for the context of this
|
489 |
+
paper the surrogate discrete state variable
|
490 |
+
#–r :=
|
491 |
+
�
|
492 |
+
rx
|
493 |
+
ry
|
494 |
+
�
|
495 |
+
(5)
|
496 |
+
is introduced and termed “discrete state variable”. Since
|
497 |
+
#–r has only two components it does not uniquely describe
|
498 |
+
the damaged state.
|
499 |
+
This ambiguity will be resolved by
|
500 |
+
the reconstruction process (see Sec. 2.5).
|
501 |
+
#–r is a purely
|
502 |
+
mathematical quantity designed to have certain properties.
|
503 |
+
First, its 1-norm �r := ∥#–r ∥1 := |rx| + |rx| equals to Nf/NT,
|
504 |
+
where Nf is the number of failed beams and NT the total
|
505 |
+
number of beams in the lattice. �r is also called the ratio of
|
506 |
+
failed beams (rfb). Second, its components are defined by
|
507 |
+
associating them to the x- and y-zone, respectively, similar
|
508 |
+
to #–κ (see Sec. 2.2). But while κx is connected to strains
|
509 |
+
in the x-zone, rx is related to the amount of beams that
|
510 |
+
have failed due to κx.
|
511 |
+
2.4. Determining the Damage Law for the Continuum
|
512 |
+
The damage function �D(#–κ) will take the role of the
|
513 |
+
damage variable D inside the constitutive equation (1).
|
514 |
+
Thus, �D(#–κ) has to be designed such that its evolution
|
515 |
+
mimics the expected behaviour of D (see Sec. 3.2). For
|
516 |
+
the extraction, which involves two steps, the Uniform-
|
517 |
+
Sim simulation data of fully discrete lattices is used (see
|
518 |
+
Sec. 2.6.1).
|
519 |
+
Step 1: Effective Material Stiffness Tensor C.
|
520 |
+
First, the
|
521 |
+
effective stiffness tensor C is calculated by homogenisation.
|
522 |
+
After the convergence of each loading step, the following
|
523 |
+
seven strain-states
|
524 |
+
�
|
525 |
+
�
|
526 |
+
�
|
527 |
+
�
|
528 |
+
�
|
529 |
+
1
|
530 |
+
2
|
531 |
+
3
|
532 |
+
�
|
533 |
+
�,
|
534 |
+
�
|
535 |
+
�
|
536 |
+
4
|
537 |
+
5
|
538 |
+
0
|
539 |
+
�
|
540 |
+
�,
|
541 |
+
�
|
542 |
+
�
|
543 |
+
6
|
544 |
+
0
|
545 |
+
0
|
546 |
+
�
|
547 |
+
�,
|
548 |
+
�
|
549 |
+
�
|
550 |
+
0
|
551 |
+
7
|
552 |
+
0
|
553 |
+
�
|
554 |
+
�,
|
555 |
+
�
|
556 |
+
�
|
557 |
+
0
|
558 |
+
0
|
559 |
+
8
|
560 |
+
�
|
561 |
+
�,
|
562 |
+
�
|
563 |
+
�
|
564 |
+
9
|
565 |
+
0
|
566 |
+
10
|
567 |
+
�
|
568 |
+
�,
|
569 |
+
�
|
570 |
+
�
|
571 |
+
0
|
572 |
+
9
|
573 |
+
8
|
574 |
+
�
|
575 |
+
�
|
576 |
+
�
|
577 |
+
�
|
578 |
+
� ,
|
579 |
+
(6)
|
580 |
+
denoted as (εxx, εyy, 2εxy)T × 10−3, were applied to the
|
581 |
+
lattice, while blocking further damage to measure the re-
|
582 |
+
sulting stresses. This results in an overdetermined system
|
583 |
+
of 21 equations for the 6 unknown coefficients of C, which
|
584 |
+
is solved by a least-square approach.
|
585 |
+
Step 2: Determining the Damage Variable D.
|
586 |
+
Second,
|
587 |
+
the damage variable D is extracted from the effective stiff-
|
588 |
+
ness tensors of the lattice. For this, a technique originally
|
589 |
+
presented by Oliver-Leblond et al. (2021) is used. For com-
|
590 |
+
pleteness, the relevant equations are replicated to be
|
591 |
+
d(T ) := tr1,2[T ] = Tkkij,
|
592 |
+
(7a)
|
593 |
+
K := 1
|
594 |
+
4 tr
|
595 |
+
�
|
596 |
+
d(C)
|
597 |
+
�
|
598 |
+
,
|
599 |
+
(7b)
|
600 |
+
D := D
|
601 |
+
�
|
602 |
+
C, �C
|
603 |
+
�
|
604 |
+
:=
|
605 |
+
1
|
606 |
+
2K
|
607 |
+
�
|
608 |
+
d(C) − d
|
609 |
+
�
|
610 |
+
�C
|
611 |
+
� �
|
612 |
+
.
|
613 |
+
(7c)
|
614 |
+
The tensor defined by Eq. (7a) is also known as dilatation
|
615 |
+
second order tensor, while scalar K of Eq. (7b) is the bulk
|
616 |
+
modulus. Eq. (7c) combines the effective C and undam-
|
617 |
+
aged stiffness tensor �C to the damage variable D. D is
|
618 |
+
by construction a real symmetric 2 × 2 matrix, thus fully
|
619 |
+
characterised by its two eigenvalues d(x) and d(y) as well as
|
620 |
+
a single scalar Γ, describing the rotation of its eigenbasis
|
621 |
+
(see Fig. 2).
|
622 |
+
2.5. Process for the Construction of a Damaged Lattice
|
623 |
+
The reconstruction process, i.e. the creation of a dis-
|
624 |
+
crete lattice with a particular damage, involves two compo-
|
625 |
+
nents: (i) The transfer function #–�r (#–κ), which transforms
|
626 |
+
the continuum state #–κ into the discrete surrogate state
|
627 |
+
variable #–r . (ii) A scheme which transforms the surrogate
|
628 |
+
state #–r into the full discrete state r. Hence, the scheme
|
629 |
+
must be able to resolve the inherently present ambiguity in
|
630 |
+
#–r . As direct consequence of the definition of the discrete
|
631 |
+
state #–r (see Eq. (5)), the transfer function is given as
|
632 |
+
#–�r (#–κ) :=
|
633 |
+
��rx(κx)
|
634 |
+
�ry(κy)
|
635 |
+
�
|
636 |
+
.
|
637 |
+
(8)
|
638 |
+
As for the damage function �D(#–κ), we are using data ob-
|
639 |
+
tained from the UniformSim simulations (see Sec. 2.6.1)
|
640 |
+
to empirically determine the function #–�r (#–κ) that approxi-
|
641 |
+
mates #–r . Due to the nature of #–r it is impossible to mea-
|
642 |
+
sure its components and thus to fit them directly. How-
|
643 |
+
ever, it is easy to measure and fit the quantity �r := ∥#–r ∥1.
|
644 |
+
Because of the specific design of the simulations and as-
|
645 |
+
sumptions, it is possible to associate the value �r to the
|
646 |
+
components of #–r , see Sec. 2.6.1.
|
647 |
+
For reconstructing the full discrete state, a probabilis-
|
648 |
+
tic scheme was devised. It starts by constructing an un-
|
649 |
+
damaged lattice from which certain beams are removed,
|
650 |
+
such that the resulting damage matches in a statistical
|
651 |
+
sense the one given by #–κ. Due to the assumed decoupling
|
652 |
+
between the x- and y-zone, it is possible to handle the two
|
653 |
+
directions independently. For each direction α, i.e. x and
|
654 |
+
y, the following steps must be done:
|
655 |
+
1. From the continuum state κα the corresponding dis-
|
656 |
+
crete state
|
657 |
+
variable,
|
658 |
+
rα = �rα(κα)
|
659 |
+
is
|
660 |
+
computed.
|
661 |
+
Through the relationship Nα := rα·NT , it is possible
|
662 |
+
to determine how many failed beams are associated
|
663 |
+
to this direction.
|
664 |
+
2. Each beam is assigned a probability defined as
|
665 |
+
pi ∝
|
666 |
+
1
|
667 |
+
εi; th
|
668 |
+
���
|
669 |
+
�#–b i, #–t α
|
670 |
+
����
|
671 |
+
k
|
672 |
+
,
|
673 |
+
(9)
|
674 |
+
where εi; th is the elongation threshold and #–b i the di-
|
675 |
+
rection of the beam. The vector #–t α, called “damage
|
676 |
+
basis”, represents the main damage direction. In our
|
677 |
+
motive, it is either #–t x := (1, 0)T or #–t y := (0, 1)T.
|
678 |
+
Finally, parameter k, called “directional weight”, is
|
679 |
+
6
|
680 |
+
|
681 |
+
a tuning parameter that balances the relative impor-
|
682 |
+
tance of the two terms and needs to be determined
|
683 |
+
(see Sec. 3.4).
|
684 |
+
3. The Nα many beams to fail are drawn from the prob-
|
685 |
+
ability distribution defined by Eq. (9) without re-
|
686 |
+
placement.
|
687 |
+
4. The selected beams are marked as failed.
|
688 |
+
2.6. Numerical Simulations
|
689 |
+
For estimating and testing the damage function �D(#–κ)
|
690 |
+
and the transfer function #–�r (#–κ), a series of different numer-
|
691 |
+
ical simulations are carried out on fully discrete lattices.
|
692 |
+
We employ for this a customised version of the Akantu
|
693 |
+
FEM library (Richart and Molinari, 2015).
|
694 |
+
Due to the
|
695 |
+
randomness of the lattice, 30 realisations were made for
|
696 |
+
each case.
|
697 |
+
2.6.1. The UniformSim Simulation Setup
|
698 |
+
The first type of simulation, called UniformSim, is used
|
699 |
+
for estimating the transfer function #–�r (#–κ) and the damage
|
700 |
+
law �D(#–κ). These simulations realise an uni-axial strain
|
701 |
+
Figure 4: Boundary conditions used by the UniformSim series, shown for
|
702 |
+
the case of ϕ = 0°. In general, the boundary conditions given by Eq. (10)
|
703 |
+
are applied to the whole boundary. Scale of the lattice is exaggerated.
|
704 |
+
state of the lattice that is also rotated by an arbitrary but
|
705 |
+
constant angle ϕ, called the pull direction. (see Fig. 4).
|
706 |
+
Thus
|
707 |
+
εϕ := Rϕ
|
708 |
+
T
|
709 |
+
��ε1
|
710 |
+
0
|
711 |
+
0
|
712 |
+
0
|
713 |
+
�
|
714 |
+
Rϕ,
|
715 |
+
(10)
|
716 |
+
where Rϕ is the Givens rotation matrix for angle ϕ that
|
717 |
+
is applied to the lattice’s boundary. In each loading step,
|
718 |
+
�ε1 is increased by 0.0001 until 0.005 is reached. The limit
|
719 |
+
is chosen to ensure that no localisation will occur and that
|
720 |
+
damage maintains its diffuse character.
|
721 |
+
The particular setup of the UniformSim simulations
|
722 |
+
together with the previous assumptions on D and #–�r (#–κ)
|
723 |
+
allows the following conclusions and simplifications:
|
724 |
+
(i) A pull direction is either associated to the x- or y-
|
725 |
+
zone (see Sec. 2.2).
|
726 |
+
This allows to probe the be-
|
727 |
+
haviour of a single zone. Which zone is probed de-
|
728 |
+
pends on ϕ and the yet unknown zone boundary
|
729 |
+
value χ.
|
730 |
+
(ii) A simulation, i.e. a particular value of ϕ, will only
|
731 |
+
affect the state of either the x- or the y-zone. Thus,
|
732 |
+
an increase of �ε1 will only affect one eigenvalue of D
|
733 |
+
and a single component of #–κ as well as #–r . Which
|
734 |
+
component is affected depends on ϕ and χ.
|
735 |
+
(iii) For the continuum state variable the relation �κ
|
736 |
+
!=
|
737 |
+
∥#–κ∥1
|
738 |
+
!= |κα|
|
739 |
+
!= �ε1 holds.
|
740 |
+
Thus, one component
|
741 |
+
equals the applied uni-axial strain �ε1, while the other
|
742 |
+
is zero.
|
743 |
+
(iv) For the discrete state variable, the relation �r
|
744 |
+
!= ∥#–r ∥1
|
745 |
+
!=
|
746 |
+
|rα| holds. Thus, only one component is non zero and
|
747 |
+
equals �r. This can be used to determine the compo-
|
748 |
+
nents of #–r from �r, once the x- and y-zones are known
|
749 |
+
(see Sec. 3.4).
|
750 |
+
2.6.2. The MultiLoadSim Simulation Setup
|
751 |
+
For testing the damage function as well as the recon-
|
752 |
+
struction procedure, a second type of simulation is used,
|
753 |
+
called MultiLoadSim.
|
754 |
+
It realises a bi-axial strain state,
|
755 |
+
imposed along the x- and y-axes (see Fig. 5). Both strains
|
756 |
+
are increased until εxx = εyy = εfin is reached, where εfin
|
757 |
+
is the control parameter. For each simulation, the loading
|
758 |
+
is imposed in three different ways, but each time the same
|
759 |
+
initial lattice is used:
|
760 |
+
XThenYSim: εxx is increased in steps of 0.0001 until it
|
761 |
+
reaches εfin and then maintained. Then εyy is in-
|
762 |
+
creased by the same increment until εfin is reached.
|
763 |
+
YThenXSim: The same as XThenYSim, however, the order
|
764 |
+
of loading the axes is switched.
|
765 |
+
BothXYSim: Both strains εxx and εyy are increased simul-
|
766 |
+
taneously, in steps of 0.0001 until εfin is reached.
|
767 |
+
All three paths reach the same final state, εxx = εyy =
|
768 |
+
κx = κy = εfin, but via different paths. As a consequence,
|
769 |
+
the special relation �κ := ∥#–κ∥1 = |εxx| + |εyy| holds in
|
770 |
+
these simulations. Both, the XThenYSim and the YThenX-
|
771 |
+
Sim loading path impose in the first half of the loading an
|
772 |
+
uni-axial strain state and then switch to a bi-axial strain
|
773 |
+
state for the second half, while the BothXYSim loading path
|
774 |
+
imposes a bi-axial strain state from the beginning.
|
775 |
+
Figure 5: Boundary conditions used in the verification simulations. Scale
|
776 |
+
of the lattice is exaggerated.
|
777 |
+
7
|
778 |
+
|
779 |
+
2.6.3. The ReconstrSim Simulation Setup
|
780 |
+
For testing the reconstruction process (see Sec. 2.5), a
|
781 |
+
third type of simulation is used, called ReconstrSim. The
|
782 |
+
basic setup is equivalent to UniformSim, but for ϕ = 0°.
|
783 |
+
Further, a lattice with a certain initial damage is used.
|
784 |
+
This damage was constructed to match the continuum
|
785 |
+
state #–κ = (�ε, 0)T, i.e.
|
786 |
+
the damage created by an uni-
|
787 |
+
axial strain of �ε applied along the x-direction. Another
|
788 |
+
important difference is, that the loading does not start at
|
789 |
+
zero but at �ε. In case of a perfectly working reconstruc-
|
790 |
+
tion process, one would expect no additional damage for
|
791 |
+
strains ≤ �ε.
|
792 |
+
Unlike the MultiLoadSim tests, which focuses on the
|
793 |
+
value of the reconstructed damage, these tests focus on
|
794 |
+
how the reconstructed lattices behave after their recon-
|
795 |
+
struction. In essence, this test simulates the exchange of
|
796 |
+
the continuum representation with the discrete represen-
|
797 |
+
tation, i.e. the refinement process, which is the core ap-
|
798 |
+
plication of the proposed method.
|
799 |
+
3. Results
|
800 |
+
Our proposed method relies on the damage law �D(#–κ)
|
801 |
+
used inside the continuum and the reconstruction process.
|
802 |
+
First, we discuss how we will use the techniques introduced
|
803 |
+
in Sec. 2 to process the data that we have collected from
|
804 |
+
the numerical simulations. Then, we determine the dam-
|
805 |
+
age law �D(#–κ) and the zone boundary value χ (see Sec. 3.2)
|
806 |
+
followed by an assessment of its accuracy (see Sec. 3.3).
|
807 |
+
Thereafter, we repeat the process to determine the trans-
|
808 |
+
fer function #–�r (#–κ) and the directional weight parameter k
|
809 |
+
(see Sec. 3.4). Finally, we demonstrate the applicability of
|
810 |
+
our method (see Sec. 3.5).
|
811 |
+
3.1. Details of a Numerical Simulation
|
812 |
+
Let’s consider a setting similar to UniformSim but with
|
813 |
+
ϕ = 0° (see Fig. 6a). Only one realisation is simulated and
|
814 |
+
the loading goes beyond �ε1 = 0.005.
|
815 |
+
We measure the normalised stresses (solid lines) and
|
816 |
+
compare them with the expected ones in case of suppressed
|
817 |
+
damage, i.e. undamaged case (dashed lines) (Fig. 6b). As
|
818 |
+
expected, initially the stresses behave predominantly lin-
|
819 |
+
ear. However, once a strain of about 0.003 is reached, we
|
820 |
+
observe that �σxx starts to deviate from the undamaged
|
821 |
+
case.
|
822 |
+
While this deviation increases with further load-
|
823 |
+
ing, we cannot observe it for �σyy, that is much less af-
|
824 |
+
fected by the loading. At one point, we observe that both
|
825 |
+
stresses suddenly drop. This is caused by the emergence
|
826 |
+
of a macroscopic crack, which is the expected behaviour
|
827 |
+
for a brittle disordered material, such as concrete.
|
828 |
+
Using the techniques presented in Sec. 2.4, it is possible to
|
829 |
+
extract the macroscopic damage variable D for the lattice,
|
830 |
+
at any loading step. In Fig. 6c, we show the eigenvalues of
|
831 |
+
the extracted damage variables where we can see that d(x)
|
832 |
+
exceeds d(y). This also explains why �σxx deviates much
|
833 |
+
more from the undamaged behaviour when compared to
|
834 |
+
�σyy. The underlying reason of this difference are the hor-
|
835 |
+
izontal beams. They experience much larger strains than
|
836 |
+
inclined beams, since they align with the loading and thus
|
837 |
+
fail at much larger number. From Fig. 6c, we can also see
|
838 |
+
that d(y) drops for a strain at around 0.002. This is a non-
|
839 |
+
physical behaviour as damage should always increase. It is
|
840 |
+
caused by some numerical issues during the determination
|
841 |
+
of the stiffness tensor (see Sec. 2.4) and the sensitivity of
|
842 |
+
damage extraction process.
|
843 |
+
Fig. 6d shows the ratio of failed beams (rfb), �r := ∥#–r ∥1 :=
|
844 |
+
Nf/NT, where Nf is the total number of number of failed
|
845 |
+
beams and NT the total beams in the lattice. We will use
|
846 |
+
it to indirectly estimate the transfer function #–�r (#–κ).
|
847 |
+
Figs. 6e-h show snapshots of the lattice’s underlying
|
848 |
+
microstructure. While taken at different loading steps (see
|
849 |
+
Fig. 6d), they always show the same set of nodes, located
|
850 |
+
roughly at the lattice’s centre. While the exact damage
|
851 |
+
pattern depends on the realisation of the lattice and lo-
|
852 |
+
cations where the snapshot was taken, statistically they
|
853 |
+
all look the same.
|
854 |
+
It is this statistical damage pattern
|
855 |
+
that we want to capture by the transfer function #–�r (#–κ)
|
856 |
+
and recreate by the reconstruction process. Whereas the
|
857 |
+
damage law �D(#–κ) captures the accumulated effects on the
|
858 |
+
lattice’s macroscopical stiffness.
|
859 |
+
3.2. Estimation of the Damage Law �D(#–κ)
|
860 |
+
We now study the behaviour of the damage variable D
|
861 |
+
that we have extracted from the data of the UniformSim
|
862 |
+
simulations. From these observations, we will determine
|
863 |
+
the damage function �D(#–κ) as well as the zone boundary
|
864 |
+
value χ (see Fig. 2).
|
865 |
+
Functional Form of �dx(κx) and �dy(κy).
|
866 |
+
Since we have
|
867 |
+
assumed an orthotropic damage variable (see Sec. 2.2), we
|
868 |
+
have to assume the same for the damage function. Thus
|
869 |
+
arriving the tentative form of the damage function is given
|
870 |
+
by
|
871 |
+
�D(#–κ) :=
|
872 |
+
�dxx(#–κ)
|
873 |
+
0
|
874 |
+
0
|
875 |
+
dyy(#–κ)
|
876 |
+
�
|
877 |
+
.
|
878 |
+
To account for deviations from this assumption, we will
|
879 |
+
connect the two diagonal elements of the damage func-
|
880 |
+
tion with the eigenvalues of the measured damage vari-
|
881 |
+
able. Thus, we have only two functions that we need to
|
882 |
+
determine.
|
883 |
+
Fig. 7 shows the evolution of the eigenvalues d(x) and
|
884 |
+
d(x) from the extracted damage variable for the pull di-
|
885 |
+
rections ϕ ∈ { 0°, 60° } at various distortion levels.
|
886 |
+
For
|
887 |
+
ϕ = 0°, the eigenvalue d(x) is much larger than d(y), while
|
888 |
+
for ϕ = 60° the opposite is observed. Later, we will use
|
889 |
+
this to determine the zone boundary value χ. Most im-
|
890 |
+
portantly, the figures show that both eigenvalues follow a
|
891 |
+
power law, irrespective of the pull direction and distortion.
|
892 |
+
Thus we approximate the diagonal elements/eigenvalues of
|
893 |
+
8
|
894 |
+
|
895 |
+
Figure 6: Representative simulation example.
|
896 |
+
(a) Schematics of the model configuration, scale of the lattice is exaggerated.
|
897 |
+
(b-d) Evolution of
|
898 |
+
continuum and microstructure properties of the lattice. Dotted lines denote strains beyond the limit of 0.005 used in UniformSim. (b) Normalised
|
899 |
+
measured stresses. Dashed lines represent the behaviour in case of suppressed damage. (c) Eigenvalues of the extracted damage variable D, see Eq. (1).
|
900 |
+
(d) Ratio of failed beams �r in the specimen. (e-h) Snapshots of a small section of the microstructure. Colours indicate the remaining load carrying
|
901 |
+
capacity of the beams �
|
902 |
+
Ψi := 1 − Ψi, where Ψi is defined by Eq. (4). Associated states are indicated in (d) by markers. Bending of beams is not shown.
|
903 |
+
�D(#–κ) as:
|
904 |
+
dxx ≈ �dx(κx; a, ϕ) := α(x)
|
905 |
+
a,ϕ · κx
|
906 |
+
β(x)
|
907 |
+
a,ϕ,
|
908 |
+
(11a)
|
909 |
+
dyy ≈ �dy(κy; a, ϕ) := α(y)
|
910 |
+
a,ϕ · κy
|
911 |
+
β(y)
|
912 |
+
a,ϕ.
|
913 |
+
(11b)
|
914 |
+
The parameters of these approximations depend on the
|
915 |
+
distortion level a and the pull direction ϕ. Later, we will
|
916 |
+
eliminate their dependency on ϕ and obtain the final pa-
|
917 |
+
rameters that only depend on a, which is constant. Fur-
|
918 |
+
ther, this choice guarantees that the damage is strictly
|
919 |
+
increasing.
|
920 |
+
Because of our previous assumption about the indepen-
|
921 |
+
dence of the directions, the approximations of the eigenval-
|
922 |
+
ues only depend on a single component of the continuum
|
923 |
+
state #–κ (Sec. 2.2). While this could be justified due to their
|
924 |
+
large differences, that we can see in Fig. 7, we clearly see
|
925 |
+
that even for ϕ = 0°, there is a certain coupling between
|
926 |
+
d(x) and d(y). To handle this, we use a simple coupling
|
927 |
+
scheme, which leads to the final damage function
|
928 |
+
�D(#–κ) :=
|
929 |
+
(12)
|
930 |
+
�
|
931 |
+
�
|
932 |
+
�
|
933 |
+
�
|
934 |
+
max
|
935 |
+
�
|
936 |
+
�dx(κx), �
|
937 |
+
dy(κy)
|
938 |
+
η
|
939 |
+
�
|
940 |
+
0
|
941 |
+
0
|
942 |
+
max
|
943 |
+
�
|
944 |
+
�dy(κy), �
|
945 |
+
dx(κx)
|
946 |
+
η
|
947 |
+
�
|
948 |
+
�
|
949 |
+
�
|
950 |
+
�
|
951 |
+
�,
|
952 |
+
where �dx(κx) and �dy(κy) are the approximations of the
|
953 |
+
eigenvalues defined by Eq. (11) but without the depen-
|
954 |
+
dence on ϕ. The coupling ensures that the eigenvalues of
|
955 |
+
the damage function �D(#–κ) will at most differ by a factor
|
956 |
+
of η, which is exactly what we see in the case of uni-axial
|
957 |
+
loading (see Fig. 7). Here, we will assume that the em-
|
958 |
+
pirical parameter η equals 10 in all cases. We will later
|
959 |
+
give a justification of the form and value of the proposed
|
960 |
+
coupling. It is important to notice that this coupling is
|
961 |
+
designed for the uni-axial case. However, a more elabo-
|
962 |
+
rated coupling might be needed, depending on the details
|
963 |
+
of other material motives.
|
964 |
+
Parameters of �dx(κx) and �dy(κy).
|
965 |
+
Since the data, espe-
|
966 |
+
cially for the non-dominant eigenvalue shows strong vari-
|
967 |
+
ation for small strains, only data points corresponding to
|
968 |
+
9
|
969 |
+
|
970 |
+
a)
|
971 |
+
ouy
|
972 |
+
0.005
|
973 |
+
<6
|
974 |
+
0.000
|
975 |
+
(
|
976 |
+
d(c)
|
977 |
+
d(y)
|
978 |
+
-4
|
979 |
+
-6
|
980 |
+
d
|
981 |
+
0.02
|
982 |
+
(h)
|
983 |
+
0.01
|
984 |
+
(g)
|
985 |
+
(f)
|
986 |
+
(e)
|
987 |
+
0.00
|
988 |
+
0.000
|
989 |
+
0.002
|
990 |
+
0.004
|
991 |
+
0.006
|
992 |
+
0.008
|
993 |
+
remaining load carrying capacity := 1 -
|
994 |
+
Err [-]
|
995 |
+
>0Figure 7: Eigenvalues of the extracted damage variable D for pull direc-
|
996 |
+
tions ϕ = 0° (a) and 60° (b). Solid lines correspond to d(x), while dashed
|
997 |
+
lines correspond to d(y). Colours indicate different distortion levels a of
|
998 |
+
the underlying lattice.
|
999 |
+
strains above 0.002 were used for the parameter estima-
|
1000 |
+
tion.
|
1001 |
+
In Figs. 8a,b, we see that for small values of ϕ,
|
1002 |
+
the α(x)
|
1003 |
+
a,ϕ-parameters are very close to each other, while for
|
1004 |
+
larger values of ϕ one observes a much larger scattering.
|
1005 |
+
Interestingly, α(y)
|
1006 |
+
a,ϕ-parameters behave inversely. Further-
|
1007 |
+
more, on Fig. 8b we can clearly observe the α(y)
|
1008 |
+
a,ϕ depen-
|
1009 |
+
dence on ϕ. We see that α(y)
|
1010 |
+
a,ϕ is small if ϕ is small too, but
|
1011 |
+
above a certain value of ϕ, the parameters become much
|
1012 |
+
larger and their scattering increases. The same, but in an
|
1013 |
+
opposite way, holds for the α(x)
|
1014 |
+
a,ϕ-parameters but in a less
|
1015 |
+
pronounced fashion.
|
1016 |
+
The estimates for the β-parameters (see Figs. 8c,d)
|
1017 |
+
show a similar behaviour with respect to ϕ.
|
1018 |
+
However,
|
1019 |
+
while we observed a significant change in the behaviour
|
1020 |
+
of the α-parameters’ values, from a particular value of ϕ
|
1021 |
+
on we just observe an increase of the variability of β.
|
1022 |
+
In summary, from Fig. 8 we can conclude that the β- and
|
1023 |
+
especially the α(y)-parameters have different regimes de-
|
1024 |
+
pending on ϕ. Further, inside such a regime, their partic-
|
1025 |
+
Figure 8: Values of the α- (a,b) and β-parameters (c,d) with respect to
|
1026 |
+
the pull direction ϕ. Colours indicate different distortion levels. Solid
|
1027 |
+
lines correspond to lg α(x)
|
1028 |
+
a,ϕ and β(x)
|
1029 |
+
a,ϕ, while dashed lines to lg α(y)
|
1030 |
+
a,ϕ and
|
1031 |
+
β(y)
|
1032 |
+
a,ϕ. Error bars indicate the 95% confidence interval.
|
1033 |
+
ular value does not depend much on ϕ.
|
1034 |
+
We also saw that the values for the β(x)-parameters for
|
1035 |
+
small values of ϕ and β(y)-parameters for large values of
|
1036 |
+
ϕ are both close to three. This means that the growth
|
1037 |
+
behaviour of �dx(κx) and �dy(κy) are very similar. This jus-
|
1038 |
+
tifies the form of the coupling used in the damage function
|
1039 |
+
in Eq. (12).
|
1040 |
+
Zone Boundary χ.
|
1041 |
+
In Figs. 7 and 8, we have observed
|
1042 |
+
that depending on the pull direction either d(x) or d(y) is
|
1043 |
+
dominant. We now exploit this fact to define χ. To this
|
1044 |
+
end, we define the dominance function ζ as:
|
1045 |
+
ζ(a, ϕ) := lg
|
1046 |
+
�
|
1047 |
+
d(x)
|
1048 |
+
a,ϕ; ˜κ=0.005
|
1049 |
+
d(y)
|
1050 |
+
a,ϕ; ˜κ=0.005
|
1051 |
+
�
|
1052 |
+
,
|
1053 |
+
(13)
|
1054 |
+
with d(α)
|
1055 |
+
a,ϕ; ˜κ=0.005 as the damage eigenvalue associated to
|
1056 |
+
direction α, once the uni-axial strain has reached 0.005.
|
1057 |
+
10
|
1058 |
+
|
1059 |
+
a
|
1060 |
+
= 0.0°
|
1061 |
+
10-2
|
1062 |
+
d(r) a = 0.0
|
1063 |
+
d(r) aα = 0.1
|
1064 |
+
d(r) a = 0.2
|
1065 |
+
10-3
|
1066 |
+
d(r) a = 0.3
|
1067 |
+
d(r) α = 0.5
|
1068 |
+
10-4
|
1069 |
+
~ d(y)
|
1070 |
+
(α)p
|
1071 |
+
10-5
|
1072 |
+
10-6
|
1073 |
+
10-7
|
1074 |
+
L
|
1075 |
+
(b)
|
1076 |
+
Φ = 60.0°
|
1077 |
+
10-2
|
1078 |
+
d(y) a = 0.1
|
1079 |
+
d(y) a = 0.2
|
1080 |
+
10-3
|
1081 |
+
d(y) a = 0.3
|
1082 |
+
d(y) α = 0.5
|
1083 |
+
10-4
|
1084 |
+
~ d(r)
|
1085 |
+
(6)p
|
1086 |
+
10-5
|
1087 |
+
10-6
|
1088 |
+
10-7
|
1089 |
+
10-4
|
1090 |
+
10-3
|
1091 |
+
[-](a)
|
1092 |
+
5.0
|
1093 |
+
4.0
|
1094 |
+
(b)
|
1095 |
+
5.5
|
1096 |
+
[-] °
|
1097 |
+
5.0
|
1098 |
+
4.5
|
1099 |
+
4.0
|
1100 |
+
(c)
|
1101 |
+
+
|
1102 |
+
a= 0.0
|
1103 |
+
α= 0.3
|
1104 |
+
4.0
|
1105 |
+
α = 0.1
|
1106 |
+
a = 0.5
|
1107 |
+
a = 0.2
|
1108 |
+
a = 0.7
|
1109 |
+
3.5
|
1110 |
+
3.0
|
1111 |
+
(d)
|
1112 |
+
4.0
|
1113 |
+
二
|
1114 |
+
3.5
|
1115 |
+
3.0
|
1116 |
+
0
|
1117 |
+
20
|
1118 |
+
40
|
1119 |
+
60
|
1120 |
+
80
|
1121 |
+
[] The most important aspects of this function are its sign
|
1122 |
+
and root, to a lesser extend its value. ζ > 0 means that
|
1123 |
+
d(x) is dominant, while ζ < 0 indicates that d(y) is domi-
|
1124 |
+
nant. Thus, χ, which might depend on the distortion a, is
|
1125 |
+
defined as ζ(a, χ)
|
1126 |
+
!= 0.
|
1127 |
+
Figure 9: Dominance function ζ(a, ϕ), Eq. 13, for different distortion
|
1128 |
+
parameters a. The x-dominated region, i.e. d(x) ≫ d(y), is defined by
|
1129 |
+
ζ > 0, while the y-dominated (grey shaded) region, i.e. d(x) ≪ d(y), is
|
1130 |
+
defined by ζ < 0. The UniformSim data was used.
|
1131 |
+
Examining Fig. 9, we see that, irrespective of the distor-
|
1132 |
+
tion, χ must lie between 30° and 45°. After some exper-
|
1133 |
+
imentation, we decided to use 40° as zone boundary, ir-
|
1134 |
+
respective of the distortion level. A closer analysis might
|
1135 |
+
yield different estimations.
|
1136 |
+
ζ can be seen as a measure of the coupling between
|
1137 |
+
d(x) and d(y). Thus, we can used it to determine the value
|
1138 |
+
of the empirical coupling parameter η, see Eq. (12). Our
|
1139 |
+
value η = 10 was selected because it is roughly the mean
|
1140 |
+
value for ϕ = 0°.
|
1141 |
+
Final Parameters of �dx(κx) and �dy(κy).
|
1142 |
+
Eliminating the
|
1143 |
+
dependency of the α- and β-parameters on the pull di-
|
1144 |
+
rection ϕ will results in parameters that are valid inside
|
1145 |
+
the entire x- or y-zone. For this, we combine the different
|
1146 |
+
estimates as:
|
1147 |
+
lg α(x)
|
1148 |
+
a
|
1149 |
+
:= 1
|
1150 |
+
|X|
|
1151 |
+
�
|
1152 |
+
ϕ∈X
|
1153 |
+
lg α(x)
|
1154 |
+
a,ϕ,
|
1155 |
+
lg α(y)
|
1156 |
+
a := 1
|
1157 |
+
|Y|
|
1158 |
+
�
|
1159 |
+
ϕ∈Y
|
1160 |
+
lg α(y)
|
1161 |
+
a,ϕ, (14a)
|
1162 |
+
β(x)
|
1163 |
+
a
|
1164 |
+
:= 1
|
1165 |
+
|X|
|
1166 |
+
�
|
1167 |
+
ϕ∈X
|
1168 |
+
β(x)
|
1169 |
+
a,ϕ,
|
1170 |
+
β(y)
|
1171 |
+
a
|
1172 |
+
:= 1
|
1173 |
+
|Y|
|
1174 |
+
�
|
1175 |
+
ϕ∈Y
|
1176 |
+
β(y)
|
1177 |
+
a,ϕ,
|
1178 |
+
(14b)
|
1179 |
+
where X contains all the pull directions associated to the
|
1180 |
+
x- and Y the ones associated to the y-zone. Parameters
|
1181 |
+
associated to the transversal directions are simply ignored,
|
1182 |
+
e.g. lg α(y)
|
1183 |
+
a,ϕ=0°. Further, the functional form of �dx(κx) and
|
1184 |
+
�dy(κy) is still given by Eq. (12), just without the depen-
|
1185 |
+
dency on ϕ. Note that Eq. (14) weights the different pull
|
1186 |
+
directions equally.
|
1187 |
+
3.3. Test of the Damage Evolution Law �D(#–κ)
|
1188 |
+
We now evaluate how well the damage function is able
|
1189 |
+
to predict the damage of a fully discrete simulation. For
|
1190 |
+
this purpose, the MultiLoadSim simulations are used.
|
1191 |
+
Figure 10: Damage eigenvalues for the three different loading paths, de-
|
1192 |
+
scribed in Sec. 2.6.2, with final strain εfin = 0.002, plotted against
|
1193 |
+
τ := ˜κ/2 εfin. Using a fully discrete simulation (solid) as reference and
|
1194 |
+
the CDM damage law �
|
1195 |
+
D(#–
|
1196 |
+
κ ) (dash-dotted).
|
1197 |
+
The colours indicates the
|
1198 |
+
three different loading paths. The distortion of the lattices was a = 0.3.
|
1199 |
+
Fig. 10 shows the results of such an experiment for
|
1200 |
+
εfin = 0.002. We can see the eigenvalues, once computed
|
1201 |
+
for the reference (solid), i.e. a fully discrete simulation,
|
1202 |
+
and alternatively computed by the damage function �D(#–κ)
|
1203 |
+
(dash-dotted), i.e.
|
1204 |
+
CDM. They are plotted against the
|
1205 |
+
normalised total strain τ := ˜κ/2 εfin. Thus, both the X-
|
1206 |
+
ThenYSim (orange) and the YThenXSim (green) load paths
|
1207 |
+
switch from an uni-axial to a bi-axial strain state at τ =
|
1208 |
+
0.5. We observe that irrespective of the loading path the
|
1209 |
+
same final damage values are reached. The value depends
|
1210 |
+
on the used method, since the final value of the CDM is
|
1211 |
+
different from the reference value. Note that this is not
|
1212 |
+
problematic since the CDM is only used during the initial
|
1213 |
+
phase.
|
1214 |
+
11
|
1215 |
+
|
1216 |
+
2.0
|
1217 |
+
a
|
1218 |
+
=0.0
|
1219 |
+
c-dominated
|
1220 |
+
a = 0.1
|
1221 |
+
a = 0.2
|
1222 |
+
1.0
|
1223 |
+
a = 0.3
|
1224 |
+
a = 0.5
|
1225 |
+
[-] (
|
1226 |
+
a = 0.7
|
1227 |
+
a
|
1228 |
+
= 0.8
|
1229 |
+
0.0
|
1230 |
+
‘p)S
|
1231 |
+
y-dominated
|
1232 |
+
-1.0
|
1233 |
+
X
|
1234 |
+
-2.0
|
1235 |
+
0
|
1236 |
+
20
|
1237 |
+
40
|
1238 |
+
60
|
1239 |
+
80
|
1240 |
+
6e
|
1241 |
+
10-3
|
1242 |
+
10-4
|
1243 |
+
10-5
|
1244 |
+
(a)p
|
1245 |
+
10-6
|
1246 |
+
10-7
|
1247 |
+
(b)
|
1248 |
+
10-3
|
1249 |
+
10-4
|
1250 |
+
I
|
1251 |
+
10-5
|
1252 |
+
(r)p
|
1253 |
+
10-6
|
1254 |
+
ref. BothXY
|
1255 |
+
10-7
|
1256 |
+
ref. XThenY
|
1257 |
+
ref. YThenX
|
1258 |
+
CDM
|
1259 |
+
0.0
|
1260 |
+
0.2
|
1261 |
+
0.4
|
1262 |
+
0.6
|
1263 |
+
0.8
|
1264 |
+
1.0
|
1265 |
+
T := K/2efin [-]Fig. 10 also demonstrates that the damage for the X-
|
1266 |
+
ThenYSim and YThenXSim are very similar to each other.
|
1267 |
+
However, the eigenvalues are flipped, which is the expected
|
1268 |
+
behaviour. During the first half of the loading (i.e. τ <
|
1269 |
+
0.5), the prediction of the dominant eigenvalue matches
|
1270 |
+
well with the reference value for both loading paths. At
|
1271 |
+
the same time, the non-dominant eigenvalue, i.e. the one
|
1272 |
+
belonging to the transverse direction, is captured with less
|
1273 |
+
but still acceptable accuracy.
|
1274 |
+
The mismatch is entirely
|
1275 |
+
due to the rather crude choice of the η coupling parameter
|
1276 |
+
(see Eq. (12)). However, it indicates that the proposed
|
1277 |
+
coupling is indeed working.
|
1278 |
+
Nevertheless, for the second half of the loading (i.e. τ >
|
1279 |
+
0.5) the CDM is unable to capture the evolution to a satis-
|
1280 |
+
factory degree. In case of XThenYSim (orange lines), we see
|
1281 |
+
that the CDM approximation of the x-eigenvalue d(x) re-
|
1282 |
+
mains constant, since κx is not affected by a loading along
|
1283 |
+
the y-axis. However, we see that in the reference system
|
1284 |
+
d(x) continuously increase (see Fig. 11 for more). The y-
|
1285 |
+
eigenvalue d(y) predicted by the CDM remains initially
|
1286 |
+
constant due to the coupling. Once �dy(κy) has become
|
1287 |
+
larger than �
|
1288 |
+
dx(εfin)/η �dy(κy) starts to increase. However,
|
1289 |
+
as it can be seen form Fig. 10b, the reference d(y) starts
|
1290 |
+
to increase almost immediately.
|
1291 |
+
A different case is the BothXYSim loading path. From
|
1292 |
+
Fig. 10, it seems that for τ < 0.5 its damage grows slower
|
1293 |
+
than the dominant damage observed for the other two
|
1294 |
+
paths. This is because BothXYSim only has half the num-
|
1295 |
+
bers of loading steps the other two have. If this is corrected
|
1296 |
+
for then it would actually grow faster. This indicates that
|
1297 |
+
there is some form of coupling between the two directions
|
1298 |
+
that is not considered correctly.
|
1299 |
+
In Fig. 11, we can see how the final damage, i.e. val-
|
1300 |
+
ues of d(x) and d(y) at εxx = εyy = εfin, depend on the
|
1301 |
+
control parameter εfin, using either the reference (solid
|
1302 |
+
lines), the CDM (dash-dotted lines) or the reconstruction
|
1303 |
+
(dashed lines). The colours distinguish the three different
|
1304 |
+
load paths that were tested (see Sec. 2.6.2). The collapse
|
1305 |
+
of the lines indicate that the damage is indeed path in-
|
1306 |
+
dependent, regardless of the final strain εfin. However,
|
1307 |
+
the final value depends on the particular method that was
|
1308 |
+
used. In in Fig. 10, we observe a gap between the final
|
1309 |
+
damage attained by the reference and the one predicted
|
1310 |
+
by the CDM. We can now see that this gap is systematic
|
1311 |
+
and actually increases with larger εfin. This is again in-
|
1312 |
+
dicating that there is some form of coupling between the
|
1313 |
+
directions that is not take into account yet.
|
1314 |
+
3.4. Estimation of the Transfer Function #–�r (#–κ)
|
1315 |
+
Our procedure to reconstruct a discrete lattice repre-
|
1316 |
+
sentation based on a damaged continuum state (presented
|
1317 |
+
in Sec. 2.5) requires two unknown quantities: First, the
|
1318 |
+
transfer function #–�r (#–κ), which maps the continuum state
|
1319 |
+
#–κ to the corresponding discrete surrogate state #–r . Sec-
|
1320 |
+
ond, the directional weight parameter k, which balances
|
1321 |
+
the orientation and the strength of a beam during the re-
|
1322 |
+
Figure 11: Final value of the d(x) and d(y) damage eigenvalues, com-
|
1323 |
+
puted using the reference (solid), CDM (dash doted) and reconstruction
|
1324 |
+
(dashed) method, plotted against εfin. The colours indicate the three
|
1325 |
+
different loading cases from Sec. 2.6.2. All lattices have a distortion of
|
1326 |
+
a = 0.3.
|
1327 |
+
construction process (see Eq. (9)).
|
1328 |
+
Analogously to the
|
1329 |
+
determination of the damage function, the data from the
|
1330 |
+
UniformSim is used.
|
1331 |
+
Functional Form of �rx(κx) and �ry(κy).
|
1332 |
+
As mentioned be-
|
1333 |
+
fore, it is impossible to measure the components of #–r di-
|
1334 |
+
rectly. However, as outlined in Sec. 2.6.1 #–r is connected
|
1335 |
+
to the ratio of failed beam as �r = ∥#–r ∥1 = Nf/NT
|
1336 |
+
!= rα.
|
1337 |
+
Thus, we can estimate #–r indirectly. Fig. 12 shows �r for
|
1338 |
+
the pull direction ϕ = 0° at various distortion levels. As we
|
1339 |
+
can see, the distortion level has only minor influence. Dif-
|
1340 |
+
ferent pull directions do not lead to a qualitative change
|
1341 |
+
(data not shown). For that reason, we approximate the
|
1342 |
+
mean rfb as
|
1343 |
+
�r ≈
|
1344 |
+
���#–�r (#–κ)
|
1345 |
+
���
|
1346 |
+
1 := �r(κ; a, ϕ) := α(r)
|
1347 |
+
a,ϕ · κβ(r)
|
1348 |
+
a,ϕ,
|
1349 |
+
(15)
|
1350 |
+
with the two fit parameters α(r)
|
1351 |
+
a,ϕ and β(r)
|
1352 |
+
a,ϕ. Both depend
|
1353 |
+
on the distortion a and the pull direction ϕ. Due to our
|
1354 |
+
12
|
1355 |
+
|
1356 |
+
0.007
|
1357 |
+
0.006
|
1358 |
+
0.005
|
1359 |
+
0.004
|
1360 |
+
(c)p
|
1361 |
+
0.003
|
1362 |
+
0.002
|
1363 |
+
0.001
|
1364 |
+
0.000
|
1365 |
+
b
|
1366 |
+
0.007
|
1367 |
+
k = 6, a= 0.3
|
1368 |
+
王
|
1369 |
+
ref. BothXY
|
1370 |
+
0.006
|
1371 |
+
ref. XThenY
|
1372 |
+
ref. YThenX
|
1373 |
+
0.005
|
1374 |
+
CDM
|
1375 |
+
-王-
|
1376 |
+
PD, k = 6
|
1377 |
+
I
|
1378 |
+
0.004
|
1379 |
+
(r)p
|
1380 |
+
0.003
|
1381 |
+
0.002
|
1382 |
+
0.001
|
1383 |
+
0.000
|
1384 |
+
0.0005
|
1385 |
+
0.0010
|
1386 |
+
0.0015
|
1387 |
+
0.0020
|
1388 |
+
0.0025
|
1389 |
+
fin [-]Figure 12: ⟨˜r⟩ := �
|
1390 |
+
∥#–r ∥1
|
1391 |
+
�
|
1392 |
+
for pull direction ϕ = 0°, at different values
|
1393 |
+
of the distortion parameter a.
|
1394 |
+
No qualitative change is observed for
|
1395 |
+
different pull directions ϕ.
|
1396 |
+
previous assumptions, we can identify its argument κ di-
|
1397 |
+
rectly with �κ. To eliminate the dependency on ϕ we use
|
1398 |
+
the same method as for the damage function (see Sec. 3.2).
|
1399 |
+
However, parameters associated to pull directions in X are
|
1400 |
+
used to determine �rx(κx), while the ones belonging to Y
|
1401 |
+
determine �ry(κy). This will transform the approximation
|
1402 |
+
of the scalar quantity
|
1403 |
+
���#–�r (#–κ)
|
1404 |
+
���
|
1405 |
+
1 into the one for #–�r (#–κ).
|
1406 |
+
For the discussion about the estimated α- and β-para-
|
1407 |
+
meters please see Appendix A.
|
1408 |
+
Directional Weight Parameter k.
|
1409 |
+
The empirical tuning
|
1410 |
+
parameter k influences the selection of beams during the
|
1411 |
+
reconstruction process. It balances a beam’s strength, i.e.
|
1412 |
+
its elongation threshold εth, against how well it aligns with
|
1413 |
+
the damage basis #–t α (see Sec. 2.5). We determine k such
|
1414 |
+
that the reconstructed damage variable D resembles the
|
1415 |
+
reference damage D most closely. To this end, we define
|
1416 |
+
Υk:=
|
1417 |
+
��D11−D11
|
1418 |
+
��
|
1419 |
+
ℓ2+
|
1420 |
+
��D22−D22
|
1421 |
+
��
|
1422 |
+
ℓ2+2
|
1423 |
+
��D12−D12
|
1424 |
+
��
|
1425 |
+
ℓ2 (16)
|
1426 |
+
as a measure of separation between the two damages. For
|
1427 |
+
minimising Υk, we select a heuristic approach, in which
|
1428 |
+
the reconstruction process (see Sec. 2.5) is run for differ-
|
1429 |
+
ent values of k.
|
1430 |
+
The k that minimises Υk will then be
|
1431 |
+
used for the remaining part of this paper. However, for
|
1432 |
+
this particular reconstruction process, the used α(r)- and
|
1433 |
+
β(r)-parameters still depended on ϕ. Further, zoning was
|
1434 |
+
ignored and as damage basis the pull direction ϕ was used.
|
1435 |
+
The underlying lattice was not distorted. From Fig. 13 we
|
1436 |
+
see that k = 6 minimises Υk independent of the pull di-
|
1437 |
+
rection. We also see that pull directions { 30°, 90° } seem
|
1438 |
+
to be almost unaffected by k, however, their values match
|
1439 |
+
Υk=6. This is an artefact caused by the regular structure
|
1440 |
+
of the underlying lattice and the scalar product used in the
|
1441 |
+
definition of the selection probability (see Eq. (9)). How-
|
1442 |
+
ever, this artefact is indicating that k = 6 is indeed a good
|
1443 |
+
Figure 13: Υk, Eq. (16), for some values of k and various pull directions.
|
1444 |
+
The reconstruction process was done on regular grids, without zoning.
|
1445 |
+
Further the pull direction and its orthogonal was used as damage basis.
|
1446 |
+
choice.
|
1447 |
+
3.5. Tests of the Reconstruction Process
|
1448 |
+
Now we evaluate the performance of the proposed
|
1449 |
+
reconstruction scheme to create a mechanically equiva-
|
1450 |
+
lent lattice, based solely on the continuum state #–κ (see
|
1451 |
+
Sec. 2.5). For verification, we use the MultiLoadSim sim-
|
1452 |
+
ulations (see Sec. 2.6.2).
|
1453 |
+
In addition, we use the Re-
|
1454 |
+
constrSim simulations to simulate a refinement step (see
|
1455 |
+
Sec. 2.6.3).
|
1456 |
+
The MultiLoadSim Results.
|
1457 |
+
In Fig. 14, we see the re-
|
1458 |
+
sults from the MultiLoadSim setup with εfin = 0.002
|
1459 |
+
(see Sec. 2.6.2).
|
1460 |
+
They impose the bi-axial strain state
|
1461 |
+
εxx = εyy = εfin, but with loading applied via three dif-
|
1462 |
+
ferent paths. We used this setup before to assess the CDM
|
1463 |
+
(see Sec. 3.3). An important note concerning the recon-
|
1464 |
+
structed states is, that in each loading step the lattice and
|
1465 |
+
hence the damage is constructed anew. Thus, although it
|
1466 |
+
looks like a damage evolution, the damage at any loading
|
1467 |
+
step has no connection to the previous one. However, each
|
1468 |
+
time the same undamaged but distorted lattice was used.
|
1469 |
+
If we now compare the damage from the references
|
1470 |
+
(solid lines) with the one from the reconstructed lattices
|
1471 |
+
(dashed lines) in Fig. 14, we see that the overall dam-
|
1472 |
+
age values are very similar to the ones obtained by the
|
1473 |
+
CDM. As before, we observe that for τ < 0.5 the dom-
|
1474 |
+
inant eigenvalues, i.e.
|
1475 |
+
d(x) for XThenYSim and d(y) for
|
1476 |
+
YThenXSim, are captured well. Then, for τ > 0.5, these
|
1477 |
+
reconstructed eigenvalues stop growing and thus deviate
|
1478 |
+
from the references (solid lines).
|
1479 |
+
An effect we observed
|
1480 |
+
for CDM (dashed lines), too. But if we look at the other
|
1481 |
+
eigenvalues, i.e. d(y) for XThenYSim (orange) and d(x) for
|
1482 |
+
the YThenXSim (green), we see that they start to increase
|
1483 |
+
almost immediately like the reference. This was not the
|
1484 |
+
case for the CDM (dash-dotted lines shown in Fig. 10).
|
1485 |
+
13
|
1486 |
+
|
1487 |
+
10-2
|
1488 |
+
0=0.0°
|
1489 |
+
00=D
|
1490 |
+
10-3
|
1491 |
+
a = 0.1
|
1492 |
+
a = 0.2
|
1493 |
+
a = 0.3
|
1494 |
+
10-4
|
1495 |
+
a = 0.5
|
1496 |
+
10-5
|
1497 |
+
10-6
|
1498 |
+
10-7
|
1499 |
+
10-4
|
1500 |
+
10-3
|
1501 |
+
i [-]a = 0.0
|
1502 |
+
β = 0.0°
|
1503 |
+
§ = 15.0°
|
1504 |
+
§ = 30.0°
|
1505 |
+
§ = 45.0°
|
1506 |
+
P = 60.0°
|
1507 |
+
Φ = 75.0°
|
1508 |
+
= 90.0°
|
1509 |
+
6
|
1510 |
+
10-4
|
1511 |
+
1
|
1512 |
+
4
|
1513 |
+
6
|
1514 |
+
8
|
1515 |
+
k [-]Figure 14: Damage eigenvalues for the three different loading paths, de-
|
1516 |
+
scribed in Sec. 2.6.2, with final strain εfin = 0.002, plotted against
|
1517 |
+
τ := ˜κ/2 εfin. Using fully discrete simulations (solid) as reference and the
|
1518 |
+
reconstructed damage (dashed). The colours indicate the three different
|
1519 |
+
loading paths that were taken. The distortion of the lattices was a = 0.3.
|
1520 |
+
See Fig. 10 for the damage evolution predicted by the CDM.
|
1521 |
+
The reconstruction process is affected by the ignored cou-
|
1522 |
+
pling between the directions as well. However, the damage
|
1523 |
+
eigenvalues generated by it follow the reference much bet-
|
1524 |
+
ter than the ones computed by the CDM.
|
1525 |
+
The ReconstrSim Results.
|
1526 |
+
Now we are using the Recon-
|
1527 |
+
strSim simulation setup, described in Sec. 2.6.3. The lat-
|
1528 |
+
tices that are used here were reconstructed for the con-
|
1529 |
+
tinuum state #–κ = (�ε, 0)T. The system is loaded under
|
1530 |
+
uni-axial strain along the x-axis, starting at �ε. This setup
|
1531 |
+
simulates how a discrete region that was loaded up to �ε, as
|
1532 |
+
continuum and then refined behaves upon further loading.
|
1533 |
+
In Fig. 15, we see how the damage eigenvalues d(x) and
|
1534 |
+
d(y) (dashed and dotted lines, respectively) and the rfb �r
|
1535 |
+
(solid lines), evolve for different reconstruction strains �ε,
|
1536 |
+
indicated by different colours. The grey lines correspond
|
1537 |
+
to the reference without any reconstruction.
|
1538 |
+
The circles in Fig. 15 indicate the values for d(x), d(y)
|
1539 |
+
and �r have in the reconstructed lattice before any loading
|
1540 |
+
was applied to them. The circles associated to ∥#–r ∥1 show,
|
1541 |
+
Figure 15: Behaviour of the d(x) and d(y) damage eigenvalues and �r.
|
1542 |
+
Colours indicate different reconstruction parameters �ε. Grey is the ref-
|
1543 |
+
erence, i.e. no reconstruction. Circles indicate damage/rfb values of the
|
1544 |
+
lattices directly after reconstruction. Squares indicate damage/rfb values
|
1545 |
+
of the lattices for an applied strain of �ε.
|
1546 |
+
that the reconstructed lattices have a matching rfb value �r
|
1547 |
+
which is a consequence of its construction. It is, however,
|
1548 |
+
much more important, that the reconstructed d(x) eigen-
|
1549 |
+
value (circles), matches the one predicted by the reference.
|
1550 |
+
Thus the process is able to reconstruct the dominant eigen-
|
1551 |
+
value.
|
1552 |
+
We are also observing that d(y) are not as well re-
|
1553 |
+
constructed.
|
1554 |
+
This is a consequence of the assumptions
|
1555 |
+
that the components of #–r are independent.
|
1556 |
+
Since Re-
|
1557 |
+
constrSim only impose strains along the x-axis, we have
|
1558 |
+
κy ≡ 0 ⇒ ry ≡ 0. Thus, the reconstructed y-eigenvalues
|
1559 |
+
we are seeing are caused by a directional sampling effect
|
1560 |
+
created during the reconstruction of the damage. How-
|
1561 |
+
ever, since d(y) is the non-dominant eigenvalue, we expect
|
1562 |
+
and allow that it is less well reconstructed.
|
1563 |
+
The squares in Fig. 15 indicate the state of the lat-
|
1564 |
+
tices after an uni-axial strain of �ε along the x-axis was
|
1565 |
+
applied to them. The difference between a square and its
|
1566 |
+
associated circle proves that this strain causes the failure
|
1567 |
+
of additional beams. If the reconstruction process would
|
1568 |
+
work perfectly, any strain below or equal �ε should not lead
|
1569 |
+
to the failure of any beam. Therefore, we might have re-
|
1570 |
+
moved the right number of beams and these were more or
|
1571 |
+
less correctly oriented, the selection of some of them was
|
1572 |
+
not fully optimal.
|
1573 |
+
Furthermore, we see that for subsequent loading steps,
|
1574 |
+
the damage and rfb continue to increase (Fig. 15). While
|
1575 |
+
the observed values for the restored systems remain above
|
1576 |
+
the reference, the restored lattices slowly converge towards
|
1577 |
+
them. This is because the damage created by the subse-
|
1578 |
+
quent loading steps starts to dominate the artificial one,
|
1579 |
+
14
|
1580 |
+
|
1581 |
+
e
|
1582 |
+
10-3
|
1583 |
+
10-4
|
1584 |
+
(a)p
|
1585 |
+
10-5
|
1586 |
+
10-6
|
1587 |
+
10-7
|
1588 |
+
(b)
|
1589 |
+
10-3
|
1590 |
+
10-4
|
1591 |
+
工
|
1592 |
+
(6)p
|
1593 |
+
10-5
|
1594 |
+
a = 0.3, fin = 0.002
|
1595 |
+
10-6
|
1596 |
+
ref. BothXY
|
1597 |
+
ref. XThenY
|
1598 |
+
ref. YThenX
|
1599 |
+
PD. k = 6
|
1600 |
+
10-7
|
1601 |
+
0.0
|
1602 |
+
0.2
|
1603 |
+
0.4
|
1604 |
+
0.6
|
1605 |
+
0.8
|
1606 |
+
1.0
|
1607 |
+
T := K/2efin [-]= 0.003
|
1608 |
+
= 0.002
|
1609 |
+
= 0.001
|
1610 |
+
=0.0
|
1611 |
+
d(c)
|
1612 |
+
10-2
|
1613 |
+
d(y)
|
1614 |
+
10-3
|
1615 |
+
10-4
|
1616 |
+
k = 6, a = 0.3
|
1617 |
+
10-5
|
1618 |
+
= 0.001
|
1619 |
+
= 0.003
|
1620 |
+
10-6
|
1621 |
+
= 0.002
|
1622 |
+
restored: after loading
|
1623 |
+
restored: before loading
|
1624 |
+
0.000
|
1625 |
+
0.001
|
1626 |
+
0.002
|
1627 |
+
0.003
|
1628 |
+
0.004
|
1629 |
+
0.005
|
1630 |
+
i [-]that we created through the restoration process.
|
1631 |
+
4. Summary and Conclusion
|
1632 |
+
In this study, we presented a generic approach for the
|
1633 |
+
creation of a discrete twin of a continuum representation
|
1634 |
+
containing an initial damage. The discrete twin’s damage
|
1635 |
+
is created in such a way, that it is mechanically consistent
|
1636 |
+
to the original’s continuum damage. This is a step towards
|
1637 |
+
adaptive multi-scale simulations, which take the state of
|
1638 |
+
the coarse description of a region into account upon its
|
1639 |
+
refinement.
|
1640 |
+
While the method is general and has no restrictions
|
1641 |
+
concerning the used numerical representations, we pre-
|
1642 |
+
sented it in form of a concrete example. As continuum
|
1643 |
+
representation, we have used FEM with CDM as damage
|
1644 |
+
measure.
|
1645 |
+
For the discrete representation, we have used
|
1646 |
+
a lattice based on a triangular grid consisting of brittle
|
1647 |
+
beam-truss elements.
|
1648 |
+
One part of our method is the damage measure used
|
1649 |
+
inside the continuum representation. This measure is used
|
1650 |
+
during the initial continuum phase to track the evolving
|
1651 |
+
continuum damage. Unlike classical CDM, that are cali-
|
1652 |
+
brated to match the degradation of a particular material,
|
1653 |
+
we calibrated the CDM against the degeneration of the
|
1654 |
+
discrete numerical representation. Thus, it measures the
|
1655 |
+
degeneration that would occur on a hypothetical fine scale
|
1656 |
+
representation.
|
1657 |
+
We saw that the determined CDM is indeed able to
|
1658 |
+
capture the damage caused by uni-axial strains to a sat-
|
1659 |
+
isfying degree. However, for bi-axial loading, the CDM is
|
1660 |
+
unable to achieve the same. This is explained by the as-
|
1661 |
+
sumption that the directions are independent. Directional
|
1662 |
+
coupling must be used to further improve the CDM’s ac-
|
1663 |
+
curacy
|
1664 |
+
The second part of our method is the ability to con-
|
1665 |
+
struct a discrete damage that is mechanically consistent
|
1666 |
+
to a given continuum state #–κ. Since this problem is obvi-
|
1667 |
+
ously not unique, we devised a stochastic scheme to gen-
|
1668 |
+
erate representations containing such a particular discrete
|
1669 |
+
damage.
|
1670 |
+
We have seen, that the reconstruction process is indeed
|
1671 |
+
able to create discrete lattices, whose initial degeneration
|
1672 |
+
is consistent with the given continuum state #–κ. A draw-
|
1673 |
+
back is, that imposing a strain that corresponds to #–κ it-
|
1674 |
+
self, leads to the failing of some additional beams. This
|
1675 |
+
is indicating that the selection process needs to be further
|
1676 |
+
refined. Furthermore, as for the CDM, we observed prob-
|
1677 |
+
lems for bi-axial strains, which are again caused by the
|
1678 |
+
independence assumed between the directions.
|
1679 |
+
Nevertheless, our data is indicating that our approach
|
1680 |
+
works well for the case of uni-axial loading and is in prin-
|
1681 |
+
cipal able to work for bi-axial loading. The next step is to
|
1682 |
+
integrate our method into an adaptive multi-scale simula-
|
1683 |
+
tion scheme.
|
1684 |
+
5. CRediT
|
1685 |
+
Philip Müller: Conceptualisation, Methodology, Soft-
|
1686 |
+
ware, Validation, Writing - Original Draft, Visualisation;
|
1687 |
+
Falk Wittel: Conceptualisation, Writing - Review & Edit-
|
1688 |
+
ing, Supervision; David Kammer: Conceptualisation, Writ-
|
1689 |
+
ing - Review & Editing, Supervision.
|
1690 |
+
6. Declaration of Competing Interest
|
1691 |
+
The authors declare that they have no known compet-
|
1692 |
+
ing financial interests or personal relationships that could
|
1693 |
+
have appeared to influence the work reported in this paper.
|
1694 |
+
7. Data Availability
|
1695 |
+
The simulation data generated in this study have been
|
1696 |
+
deposited in the ETH Research collection database avail-
|
1697 |
+
able at TBA.
|
1698 |
+
15
|
1699 |
+
|
1700 |
+
Appendix A. Parameters of �rx(κx) and �ry(κy)
|
1701 |
+
The fitting parameters (see Eq. (15)) of the ratio of
|
1702 |
+
failed beams (rfb) �r, denoted as α(r)
|
1703 |
+
a,ϕ and β(r)
|
1704 |
+
a,ϕ were esti-
|
1705 |
+
mated in the same way as the ones for the two damage
|
1706 |
+
functions �dx(κx) and �dy(κy). However, they behave much
|
1707 |
+
more stable and thus show less variations.
|
1708 |
+
Figs. A.16a
|
1709 |
+
Figure A.16:
|
1710 |
+
Dependence of the two fitting parameters of Eq. (15),
|
1711 |
+
lg α(r)
|
1712 |
+
a, ϕ (a) and β(r)
|
1713 |
+
a, ϕ (b), on the pull direction ϕ.
|
1714 |
+
Colours indicating
|
1715 |
+
different distortion levels a. The error bars is given by the 95% confi-
|
1716 |
+
dence interval.
|
1717 |
+
show the values for the α- and A.16b for the β-parameters.
|
1718 |
+
Compared with the parameters we obtained for the dam-
|
1719 |
+
age law (see Fig. 8), we see much less variability here. This
|
1720 |
+
is because it is far easier to measure this quantity than the
|
1721 |
+
damage.
|
1722 |
+
16
|
1723 |
+
|
1724 |
+
4.80
|
1725 |
+
4.75
|
1726 |
+
4.70
|
1727 |
+
4.65
|
1728 |
+
4.60
|
1729 |
+
4.55
|
1730 |
+
4.50
|
1731 |
+
4.45
|
1732 |
+
3.100
|
1733 |
+
3.075
|
1734 |
+
3.050
|
1735 |
+
3.025
|
1736 |
+
3.000
|
1737 |
+
2.975
|
1738 |
+
a= 0.0
|
1739 |
+
2.950
|
1740 |
+
a = 0.1
|
1741 |
+
a= 0.2
|
1742 |
+
2.925
|
1743 |
+
a= 0.3
|
1744 |
+
a = 0.5
|
1745 |
+
2.900
|
1746 |
+
0
|
1747 |
+
20
|
1748 |
+
40
|
1749 |
+
60
|
1750 |
+
80
|
1751 |
+
[oReferences
|
1752 |
+
Anciaux, G., O. Coulaud, J. Roman, and G. Zerah (2008). “Ghost force reduction and spectral analysis of the 1 D
|
1753 |
+
bridging method”. In: Bulletin of Sociological Methodology/Bulletin de Méthodologie Sociologique. Vol. 37. doi: 10.
|
1754 |
+
1177/075910639203700105.
|
1755 |
+
Bauman, P. T., H. B. Dhia, N. Elkhodja, J. T. Oden, and S. Prudhomme (2008). “On the application of the Arlequin
|
1756 |
+
method to the coupling of particle and continuum models”. In: Computational Mechanics 42.4. doi: 10.1007/s00466-
|
1757 |
+
008-0291-1.
|
1758 |
+
Brancherie, D. and A. Ibrahimbegovic (2009). “Novel anisotropic continuumdiscrete damage model capable of represent-
|
1759 |
+
ing localized failure of massive structures: Part I: theoretical formulation and numerical implementation”. In: Engi-
|
1760 |
+
neering Computations 26.1/2. Ed. by A. Ibrahimbegovic, I. Koar, and P. Marovi. doi: 10.1108/02644400910924825.
|
1761 |
+
Braun, M., I. Iváñez, and M. P. Ariza (2021). “A numerical study of progressive damage in unidirectional composite
|
1762 |
+
materials using a 2D lattice model”. In: Engineering Fracture Mechanics 249. doi: 10.1016/j.engfracmech.2021.
|
1763 |
+
107767.
|
1764 |
+
Chen, H., Y. Jiao, and Y. Liu (2016). “A nonlocal lattice particle model for fracture simulation of anisotropic materials”.
|
1765 |
+
In: Composites Part B: Engineering 90. doi: 10.1016/j.compositesb.2015.12.028.
|
1766 |
+
Chen, L., W. Sun, B. Chen, Z. Shi, J. Lai, and J. Feng (2021). “Multiscale study of fibre orientation effect on pullout
|
1767 |
+
and tensile behavior of steel fibre reinforced concrete”. In: Construction and Building Materials 283. doi: 10.1016/
|
1768 |
+
j.conbuildmat.2021.122506.
|
1769 |
+
Chen, P. Y., M. Chantharayukhonthorn, Y. Yue, E. Grinspun, and K. Kamrin (2021). “Hybrid discrete-continuum
|
1770 |
+
modeling of shear localization in granular media”. In: Journal of the Mechanics and Physics of Solids 153. doi:
|
1771 |
+
10.1016/j.jmps.2021.104404.
|
1772 |
+
Delaplace, A. and R. Desmorat (2008). “Discrete 3D model as complimentary numerical testing for anisotropic damage”.
|
1773 |
+
In: International Journal of Fracture 148.2. doi: 10.1007/s10704-008-9183-9.
|
1774 |
+
Desmorat, R., F. Gatuingt, and F. Ragueneau (2007). “Nonlocal anisotropic damage model and related computational
|
1775 |
+
aspects for quasi-brittle materials”. In: Engineering Fracture Mechanics 74.10. doi: 10.1016/j.engfracmech.2006.
|
1776 |
+
09.012.
|
1777 |
+
Evangelista, F., G. d. S. Alves, J. F. A. Moreira, and G. O. F. d. Paiva (2020). “A globallocal strategy with the
|
1778 |
+
generalized finite element framework for continuum damage models”. In: Computer Methods in Applied Mechanics
|
1779 |
+
and Engineering 363. doi: 10.1016/j.cma.2020.112888.
|
1780 |
+
Evangelista, F. and J. F. A. Moreira (2020). “A novel continuum damage model to simulate quasi-brittle failure in mode
|
1781 |
+
I and mixed-mode conditions using a continuous or a continuous-discontinuous strategy”. In: Theoretical and Applied
|
1782 |
+
Fracture Mechanics 109. doi: 10.1016/j.tafmec.2020.102745.
|
1783 |
+
Gaede, O., A. Karrech, and K. Regenauer-Lieb (2013). “Anisotropic damage mechanics as a novel approach to improve
|
1784 |
+
pre- and post-failure borehole stability analysis”. In: Geophysical Journal International 193.3. doi: 10.1093/gji/
|
1785 |
+
ggt045.
|
1786 |
+
Guidault, P.-A. and T. Belytschko (2007). “On the L2 and the H1 couplings for an overlapping domain decomposition
|
1787 |
+
method using Lagrange multipliers”. In: International Journal for Numerical Methods in Engineering 70.3. doi:
|
1788 |
+
10.1002/nme.1882.
|
1789 |
+
Herrmann, H. J., A. Hansen, and S. Roux (1989). “Fracture of disordered, elastic lattices in two dimensions”. In: Physical
|
1790 |
+
Review B 39.1. doi: 10.1103/PhysRevB.39.637.
|
1791 |
+
Lemaître, J., ed. (2001). Handbook of materials behavior models. San Diego, CA: Academic Press. isbn: 978-0-12-443341-0.
|
1792 |
+
Lemaître, J. (1996). A Course on Damage Mechanics. Berlin, Heidelberg: Springer Berlin Heidelberg. doi: 10.1007/978-
|
1793 |
+
3-642-18255-6.
|
1794 |
+
Lemaître, J. and R. Desmorat (2005). Engineering damage mechanics: ductile, creep, fatigue and brittle failures. Berlin
|
1795 |
+
; New York: Springer. doi: 10.1007/b138882.
|
1796 |
+
Liu, J. (2018). “Multi-scale FEM-DEM model for granular materials : micro-scale boundary conditions, statics and
|
1797 |
+
dynamics”. PhD thesis. Technische Universiteit Eindhoven. isbn: 978-90-386-4621-3.
|
1798 |
+
Mazars, J. and J. Lemaître (1985). “Application of Continuous Damage Mechanics to Strain and Fracture Behavior of
|
1799 |
+
Concrete”. In: Application of Fracture Mechanics to Cementitious Composites. Ed. by S. P. Shah. Vol. 94. NATO ASI
|
1800 |
+
Series. Dordrecht: Springer Netherlands. doi: 10.1007/978-94-009-5121-1_17.
|
1801 |
+
Mier, J. G. M. van (2017). Fracture Processes of Concrete: Assessment of Material Parameters for Fracture Models.
|
1802 |
+
1st ed. CRC Press. doi: 10.1201/b22384.
|
1803 |
+
Moukarzel, C. and H. J. Herrmann (1992). “A vectorizable random lattice”. In: Journal of Statistical Physics 68.5-6. doi:
|
1804 |
+
10.1007/BF01048880.
|
1805 |
+
Oliver-Leblond, C., R. Desmorat, and B. Kolev (2021). “Continuous anisotropic damage as a twin modelling of discrete bi-
|
1806 |
+
dimensional fracture”. In: European Journal of Mechanics - A/Solids 89. doi: 10.1016/j.euromechsol.2021.104285.
|
1807 |
+
17
|
1808 |
+
|
1809 |
+
Ostoja-Starzewski, M. (2008). Microstructural randomness and scaling in mechanics of materials. CRC series–modern
|
1810 |
+
mechanics and mathematics. Boca Raton: Chapman & Hall/CRC. doi: 10.1201/9781420010275.
|
1811 |
+
Reddy, J. N. (1997). “On locking-free shear deformable beam finite elements”. In: Computer Methods in Applied Mechanics
|
1812 |
+
and Engineering. Containing papers presented at the Symposium on Advances in Computational Mechanics 149.1.
|
1813 |
+
doi: 10.1016/S0045-7825(97)00075-3.
|
1814 |
+
Reddy, J. N., C. M. Wang, and K. Y. Lam (1997). “Unified Finite Elements Based on the Classical and Shear Deformation
|
1815 |
+
Theories of Beams and Axisymmetric Circular Plates”. In: Communications in Numerical Methods in Engineering
|
1816 |
+
13.6. doi: 10.1002/(SICI)1099-0887(199706)13:6<495::AID-CNM82>3.0.CO;2-9.
|
1817 |
+
Richart, N. and J. F. Molinari (2015). “Implementation of a parallel finite-element library: Test case on a non-local
|
1818 |
+
continuum damage model”. In: Finite Elements in Analysis and Design 100. doi: 10.1016/j.finel.2015.02.003.
|
1819 |
+
Rodrigues, E. A., O. L. Manzoli, L. A. G. Bitencourt, T. N. Bittencourt, and M. Sánchez (2018). “An adaptive concurrent
|
1820 |
+
multiscale model for concrete based on coupling finite elements”. In: Computer Methods in Applied Mechanics and
|
1821 |
+
Engineering 328. doi: 10.1016/j.cma.2017.08.048.
|
1822 |
+
Unger, J. F., S. Eckardt, and C. Konke (2011). “A mesoscale model for concrete to simulate mechanical failure”. In:
|
1823 |
+
Computers and Concrete 8.4. doi: 10.12989/CAC.2011.8.4.401.
|
1824 |
+
Unger, J. F. and S. Eckardt (2011). “Multiscale Modeling of Concrete”. In: Archives of Computational Methods in
|
1825 |
+
Engineering 18.3. doi: 10.1007/s11831-011-9063-8.
|
1826 |
+
Vardoulakis, I. (2019). Cosserat Continuum Mechanics: With Applications to Granular Media. Vol. 87. Lecture Notes in
|
1827 |
+
Applied and Computational Mechanics. Cham: Springer International Publishing. doi: 10.1007/978-3-319-95156-0.
|
1828 |
+
Wellmann, C. and P. Wriggers (2012). “A two-scale model of granular materials”. In: Computer Methods in Applied
|
1829 |
+
Mechanics and Engineering. Special Issue on Advances in Computational Methods in Contact Mechanics 205-208.
|
1830 |
+
doi: 10.1016/j.cma.2010.12.023.
|
1831 |
+
Wittel, F. K. (2006). “Diskrete Elemente-Modelle zur Bestimmung der Festigkeitsevolution in Verbundwerkstoffen”. PhD
|
1832 |
+
Thesis. Universität Stuttgart. isbn: 3-930683-59-8.
|
1833 |
+
Zhang, H., J. Wu, and Y. Zheng (2012). “An adaptive multiscale method for strain localization analysis of 2D periodic
|
1834 |
+
lattice truss materials”. In: Philosophical Magazine 92.28-30. doi: https://doi.org/10.1080/14786435.2012.
|
1835 |
+
731087.
|
1836 |
+
18
|
1837 |
+
|
0NFJT4oBgHgl3EQfjiwF/content/tmp_files/load_file.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
0dFQT4oBgHgl3EQfDjUj/vector_store/index.faiss
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:8b49c52cee60bab97dd5392732161cc2ae0a08194235ab8a990537cc8d5f1e81
|
3 |
+
size 31981613
|
0tE3T4oBgHgl3EQfnAp3/content/tmp_files/2301.04621v1.pdf.txt
ADDED
@@ -0,0 +1,1870 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
Entropy of different phases formed by soft rods
|
2 |
+
Jayeeta Chattopadhyay,1 Shiang-Tai Lin,2 and Prabal K. Maiti1, a)
|
3 |
+
1)Centre for Condensed Matter Theory, Department of Physics, Indian Institute of Science, Bangalore 560012,
|
4 |
+
India
|
5 |
+
2)Department of Chemical Engineering, National Taiwan University, Taipei 10617, Taiwan
|
6 |
+
(Dated: 12 January 2023)
|
7 |
+
Computation of entropy in liquids and liquid crystal phases is a big challenge in statistical physics. In this work, we
|
8 |
+
extend the two-phase thermodynamic model (2PT) to shape anisotropic soft repulsive spherocylinders (SRSs) and
|
9 |
+
report the absolute values of entropy for different liquid crystal (LC) phases for a range of aspect ratios L/D = 2 − 5.
|
10 |
+
We calculate the density of states (DoS) for different LC phases and decompose it into contributions arising from
|
11 |
+
translational and rotational degrees of freedom.
|
12 |
+
The translational and rotational modes are further partitioned into
|
13 |
+
diffusive, gas-like, and non-diffusive, solid-like components using a fluidicity factor. In the dilute limit, the entropy
|
14 |
+
values obtained from the 2PT method match exactly those of an ideal rigid rotor. We find that, for a given packing
|
15 |
+
fraction, the magnitude of the total entropy is roughly equal regardless of the different LC phases associated with
|
16 |
+
different aspect ratios. We also compute the excess entropy (for L/D = 5) and compare those with the values obtained
|
17 |
+
using the standard integration approach of molecular dynamics (MD) or Monte Carlo (MC) equation of state (EOS) of
|
18 |
+
SRS. The values obtained using both approaches match very well. The rotational and translational fluidicity factors are
|
19 |
+
further used to determine the phase boundaries of different liquid crystal phases for the respective aspect ratios.
|
20 |
+
I.
|
21 |
+
INTRODUCTION
|
22 |
+
The phase behavior of shape anisotropic particles is an
|
23 |
+
emerging field of research that gives rise to various liquid
|
24 |
+
crystal (LC) phases1–3. Examples span from living organisms
|
25 |
+
like tobacco mosaic virus4–6, fd virus7 to synthetic systems
|
26 |
+
of rod-like particles like boehmite8, silica9 etc. Different liq-
|
27 |
+
uid crystal phases can be identified based on their microscopic
|
28 |
+
arrangements, as well as positional and orientational order.
|
29 |
+
Onsager, in his seminal work10, showed that a system of
|
30 |
+
thin and hard rods could undergo a phase transition from
|
31 |
+
disordered isotropic to orientationally ordered nematic phase
|
32 |
+
above a critical aspect ratio (L/D > 3.7) that is mainly driven
|
33 |
+
by entropy. The loss of orientational entropy in the nematic
|
34 |
+
phase is compensated by the increase of translational entropy
|
35 |
+
due to the ordered structure.
|
36 |
+
Similarly, for the other LC
|
37 |
+
phases, entropy plays an important role in studying the stabil-
|
38 |
+
ity of the phases. Entropy of a fluid can be expressed as a mul-
|
39 |
+
tiparticle correlation expansion of statistical entropy devel-
|
40 |
+
oped by Green and Nettleton11,12 and generalized by Lazaridis
|
41 |
+
and co-workers13,14 for the non-spherical bodies. Costa et al.
|
42 |
+
first used this method to calculate the entropy of a system of
|
43 |
+
hard spherocylinders (HSCs)15,16 and later, by Cuetos et al.17
|
44 |
+
in a system of soft repulsive spherocylinders (SRSs). It is also
|
45 |
+
worth mentioning several interesting works by Dhar et al.18,19
|
46 |
+
where they have calculated entropy of hard rods and rigid rect-
|
47 |
+
angles in 3D and 2D using analytically solvable lattice model
|
48 |
+
and MC simulations.
|
49 |
+
In 2003, Lin et al.20 developed the two-phase thermody-
|
50 |
+
namic (2PT) model to calculate the entropy, free energy, and
|
51 |
+
other thermodynamic properties of liquids from a short MD
|
52 |
+
trajectory (20 picoseconds (ps)).
|
53 |
+
2PT model has emerged
|
54 |
+
as an efficient and accurate method in calculating various
|
55 |
+
a)Electronic mail: [email protected]
|
56 |
+
thermodynamic properties of Lennard-Jones fluids for the di-
|
57 |
+
verse setting of state points both in 2D21 and 3D20, water
|
58 |
+
in bulk22 and under different confinement, carbon dioxide23
|
59 |
+
and other organic and inorganic molecules24.
|
60 |
+
The results
|
61 |
+
match very well with those of the experimental studies. In
|
62 |
+
the 2PT method, the density of state (DoS) of a liquid, which
|
63 |
+
is calculated from the Fourier transform of the velocity auto-
|
64 |
+
correlation function (VACF), is decomposed into vibrational
|
65 |
+
(solid) and diffusive (gas) components. The thermodynamic
|
66 |
+
quantities, including entropy, are then calculated using har-
|
67 |
+
monic oscillator approximation to the solid component and
|
68 |
+
hard sphere approximation to the gas component. For the ro-
|
69 |
+
tational mode, the diffusive part is calculated from the rigid
|
70 |
+
rotor approximation20,22. In 2PT method, the entropy of a
|
71 |
+
definite state point is calculated from a single MD trajectory.
|
72 |
+
Thus, it is far more efficient than the conventional integration
|
73 |
+
approach of MD or MC equation of state of the SRS, which
|
74 |
+
entails several discrete MD/MC trajectories along the integra-
|
75 |
+
tion path. This is advantageous for the systems for which the
|
76 |
+
analytical form of the equation of state is unknown (such as
|
77 |
+
SRS).
|
78 |
+
In this work, we extend the 2PT method to calculate en-
|
79 |
+
tropy of various liquid crystal phases formed by a system
|
80 |
+
of soft repulsive spherocylinders of different aspect ratios
|
81 |
+
(length/diameter) L/D = 2,3,3.5,4 and 5. We validate our
|
82 |
+
method by comparing the entropy values obtained using the
|
83 |
+
standard integration approach of equation of state of the SRS
|
84 |
+
of L/D = 5 at T ∗ = 516,17.
|
85 |
+
We find that the entropy val-
|
86 |
+
ues do not have any strong dependence on the aspect ratio
|
87 |
+
but strongly depend on the packing fraction (η)of the system.
|
88 |
+
We also find that LC phase transitions are governed by the
|
89 |
+
change of pair entropy. The loss of orientational pair entropy
|
90 |
+
in the nematic phase is compensated by the increase of trans-
|
91 |
+
lational pair entropy. Similarly, in case of the smectic phase,
|
92 |
+
the loss of translational pair entropy is compensated by the
|
93 |
+
residual entropy arising from the multi-particle contribution.
|
94 |
+
In addition, we present an alternative way to identify the phase
|
95 |
+
boundaries of different liquid crystal phases from the fluidic-
|
96 |
+
arXiv:2301.04621v1 [cond-mat.soft] 11 Jan 2023
|
97 |
+
|
98 |
+
2
|
99 |
+
ity factor that is directly related to the diffusivity of the sys-
|
100 |
+
tem: the packing fraction at which the translational fluidicity
|
101 |
+
ftrans saturates but rotational fluidicity frot decreases sharply
|
102 |
+
indicates the phase boundary of the isotropic to nematic (I-
|
103 |
+
N) phase transition. Similarly, the nematic to smectic (N-Sm)
|
104 |
+
transition is located where frot saturates but ftrans keeps de-
|
105 |
+
creasing.
|
106 |
+
The rest of the paper is organized as follows: In section
|
107 |
+
II, we briefly describe the theoretical background of the 2PT
|
108 |
+
method and summarize the multiparticle correlation expan-
|
109 |
+
sions method and the integration approach of equation of state
|
110 |
+
to calculate the entropy of SRS; in section III, we describe the
|
111 |
+
SRS model and the simulation protocol. We present the results
|
112 |
+
and analysis in section IV. Finally, in section V, we conclude
|
113 |
+
with the discussion on the major benefits of the 2PT method
|
114 |
+
and possible applications.
|
115 |
+
II.
|
116 |
+
MODEL AND COMPUTATIONAL DETAILS
|
117 |
+
We model the system as a collection of spherocylinders
|
118 |
+
(cylinder with hemispherical caps) of aspect ratios L/D =
|
119 |
+
2,3,3.5,4,5. The interacting potential is only due to the ex-
|
120 |
+
cluded volume interaction described by the Weeks-Chandler-
|
121 |
+
Andersen (WCA) potential given as follows25:
|
122 |
+
USRS = 4ε[( D
|
123 |
+
dm
|
124 |
+
)12 −( D
|
125 |
+
dm
|
126 |
+
)6]+ε
|
127 |
+
if
|
128 |
+
dm < 2
|
129 |
+
1
|
130 |
+
6 D
|
131 |
+
= 0
|
132 |
+
if
|
133 |
+
dm ≥ 2
|
134 |
+
1
|
135 |
+
6 D
|
136 |
+
(1)
|
137 |
+
Here, dm is the shortest distance between two SRS that
|
138 |
+
determines their relative orientation2,17,26,27,34.
|
139 |
+
For conve-
|
140 |
+
nience, thermodynamic quantities are expressed in terms of
|
141 |
+
interaction strength ε, diameter of the SRS D and mass m:
|
142 |
+
temperature T ∗ = kBT
|
143 |
+
ε , pressure P∗ = Pvhsc
|
144 |
+
kBT , packing fraction
|
145 |
+
η = vhscρ, where ρ is the number density of the system
|
146 |
+
defined as, ρ = N
|
147 |
+
V and vhsc = πD2( D
|
148 |
+
6 + L
|
149 |
+
4) is the volume of the
|
150 |
+
spherocylinder; energy E∗ = E
|
151 |
+
ε , entropy S∗ = S
|
152 |
+
kB , Helmholtz
|
153 |
+
free energy A∗ = A
|
154 |
+
ε , Gibbs free energy G∗ = G
|
155 |
+
ε , diffusivity
|
156 |
+
d∗ = d( m
|
157 |
+
ε )1/2/D and the time t∗ = t
|
158 |
+
�
|
159 |
+
ε/m/D. To compute
|
160 |
+
entropy using 2PT method, we convert all the thermody-
|
161 |
+
namic quantities in real units using the parameters of argon
|
162 |
+
(ε = 0.238 kcal/mol, σ = 3.405Å and mass m = 39.948
|
163 |
+
g/mol) and then again convert them into the reduced units.
|
164 |
+
We build the system in a hexagonal-closed-packed (HCP)
|
165 |
+
crystal structure. As the particles are inherently anisotropic
|
166 |
+
in shape, we choose the number of particles in the x, y and
|
167 |
+
z directions such that the simulation box can be built in a
|
168 |
+
near-cubic geometry. If nx, ny, nz are the number of particles
|
169 |
+
in the x, y, z direction respectively and nu is the number of
|
170 |
+
particles in one unit cell, then the total number of particles
|
171 |
+
in one simulation box N = nu × nx × ny × nz. In our case,
|
172 |
+
number of SRSs is chosen to be N = 1024.
|
173 |
+
The periodic
|
174 |
+
boundary condition in all three directions are used.
|
175 |
+
We have carried out a series of MD simulations for a wide
|
176 |
+
range of state points spanning the melting transition from solid
|
177 |
+
(crystal) to gas (isotropic) for all the aspect ratios. We melt
|
178 |
+
the initial crystal structure slowly by reducing the pressure in
|
179 |
+
NPT ensemble (Constant particle number, pressure and tem-
|
180 |
+
perature) at T ∗ = 5 for each L/D. The positions and velocities
|
181 |
+
of the SRSs are updated using Verlet algorithm28 and the rota-
|
182 |
+
tional motion by quaternion-based rigid-body dynamics29–33.
|
183 |
+
The temperature and pressure of the system are controlled
|
184 |
+
using Berendsen thermostat and barostat35 with a tempera-
|
185 |
+
ture relaxation time τT = 0.05 and pressure relaxation time
|
186 |
+
τP = 2 respectively. We perform 1×105 to 2×105 MD steps
|
187 |
+
(with an integration time step δt = 0.001 in reduced unit) to
|
188 |
+
reach equilibrium condition and another 2−5×103 steps (5-
|
189 |
+
30 ps in real unit using the above-mentioned parameters) with
|
190 |
+
δt = 5×10−4(1 fs)in real unit for the 2PT method.
|
191 |
+
III.
|
192 |
+
THEORY
|
193 |
+
A.
|
194 |
+
Two phase thermodynamic method
|
195 |
+
1.
|
196 |
+
Density of State Function
|
197 |
+
The density of state (DoS) function G(ν) is defined as the
|
198 |
+
mass weighted sum of the atomic spectral densities.
|
199 |
+
This
|
200 |
+
can be obtained from Fourier transform of velocity auto-
|
201 |
+
correlation function (VACF) obtained from MD trajectory20.
|
202 |
+
G(ν) =
|
203 |
+
1
|
204 |
+
kBT
|
205 |
+
Natom
|
206 |
+
∑
|
207 |
+
l=1
|
208 |
+
3
|
209 |
+
∑
|
210 |
+
k=1
|
211 |
+
lim
|
212 |
+
τ→−∞
|
213 |
+
ml
|
214 |
+
τ
|
215 |
+
����
|
216 |
+
� τ
|
217 |
+
−τ vk
|
218 |
+
l (t)e−i2πνtdt
|
219 |
+
����
|
220 |
+
2
|
221 |
+
(2)
|
222 |
+
Here, Natom is the total number of atoms in the system. ml is
|
223 |
+
mass of the lth atom and vk
|
224 |
+
l is the velocity of the lth atom in kth
|
225 |
+
direction ( k indicates spatial coordinates x,y,z respectively).
|
226 |
+
G(ν) represents distribution of normal modes in the system i.e
|
227 |
+
G(ν) dν represents number of normal modes in the frequency
|
228 |
+
range ν to ν + dν. So, total number of modes in the system
|
229 |
+
i.e degrees of freedom of the system 3N
|
230 |
+
� ∞
|
231 |
+
0 G(ν)dν = 3N
|
232 |
+
(3)
|
233 |
+
The diffusion constant (D) of the system is directly related
|
234 |
+
to the zero-frequency density of state of the system G(0):
|
235 |
+
D = kBT
|
236 |
+
12mN G(0)
|
237 |
+
(4)
|
238 |
+
For a rigid SRS, there is no vibrational motion. So, total
|
239 |
+
number of degrees of freedom for a rigid SRS is 5 compris-
|
240 |
+
ing 3 translational and 2 rotational motion. Therefore, total
|
241 |
+
number of modes in the system is:
|
242 |
+
� ∞
|
243 |
+
0 G(ν)dν = 5N
|
244 |
+
(5)
|
245 |
+
Density of state G(ν) is decomposed into translational and
|
246 |
+
rotational part:
|
247 |
+
G(ν) = Gtrans(ν)+Grot(ν)
|
248 |
+
(6)
|
249 |
+
|
250 |
+
3
|
251 |
+
where, Gtrans(ν) is obtained from the translational component
|
252 |
+
of the center of mass velocity of the SRS:
|
253 |
+
Gtrans(ν) =
|
254 |
+
1
|
255 |
+
kBT
|
256 |
+
N
|
257 |
+
∑
|
258 |
+
j=1
|
259 |
+
3
|
260 |
+
∑
|
261 |
+
k=1
|
262 |
+
lim
|
263 |
+
τ→−∞
|
264 |
+
m j
|
265 |
+
τ
|
266 |
+
����
|
267 |
+
� τ
|
268 |
+
−τ vktrans
|
269 |
+
j
|
270 |
+
(t)e−i2πνtdt
|
271 |
+
����
|
272 |
+
2
|
273 |
+
(7)
|
274 |
+
here, N is the total number of SRS in the system and m j is
|
275 |
+
the mass of the SRS. vktrans
|
276 |
+
j
|
277 |
+
is the translational velocity of jth
|
278 |
+
SRS in kth direction.
|
279 |
+
Grot(ν) =
|
280 |
+
1
|
281 |
+
kBT
|
282 |
+
N
|
283 |
+
∑
|
284 |
+
j=1
|
285 |
+
2
|
286 |
+
∑
|
287 |
+
k=1
|
288 |
+
lim
|
289 |
+
τ→−∞
|
290 |
+
Ik
|
291 |
+
j
|
292 |
+
τ
|
293 |
+
����
|
294 |
+
� τ
|
295 |
+
−τ ωk
|
296 |
+
j (t)e−i2πνtdt
|
297 |
+
����
|
298 |
+
2
|
299 |
+
(8)
|
300 |
+
here, Ik
|
301 |
+
j is the moment of inertia of jth SRS along kth the
|
302 |
+
principal axis. As SRS is linear, the moment of inertia along
|
303 |
+
its director is 0. Therefore, k runs from 1 to 2. ωk
|
304 |
+
j represents
|
305 |
+
the angular velocity.
|
306 |
+
2.
|
307 |
+
Thermodynamic properties from 2PT method
|
308 |
+
Various thermodynamic quantities like energy, entropy of
|
309 |
+
a system can be expressed as a summation over the contribu-
|
310 |
+
tions from translational and rotational motion of SRS)22,23:
|
311 |
+
E = E0 +Etrans +Erot,
|
312 |
+
(9)
|
313 |
+
S = Strans +Srot.
|
314 |
+
(10)
|
315 |
+
Here, E0 is the reference energy. In 2PT method, the density
|
316 |
+
of states corresponding to translational or rotational motion is
|
317 |
+
partitioned as:
|
318 |
+
Gk(ν) = Gs
|
319 |
+
k(ν)+Gg
|
320 |
+
k(ν)
|
321 |
+
(11)
|
322 |
+
where, the subscript k stands for translational, or rotational
|
323 |
+
motion. The 1st term in Eq. 11 refers to the solid-like and the
|
324 |
+
2nd term in Eq. 11 refers to the gas-like contributions. For a
|
325 |
+
solid-like system, the DoS can be exactly determined by that
|
326 |
+
of harmonic oscillator. But for a liquid, harmonic approxima-
|
327 |
+
tion is no longer valid at the low frequency regime due to the
|
328 |
+
strong effect of anharmonicity. Also, the diffusive model at
|
329 |
+
the zero frequency can lead to singularity. In the 2PT model,
|
330 |
+
the anharmonicity effect at the low frequency is treated by de-
|
331 |
+
composing the DoS into gas-like and solid-like components
|
332 |
+
as mentioned in Eq. 11. The gas-like component is evaluated
|
333 |
+
from the DoS at the zero frequency and the fluidicity factor fk
|
334 |
+
using the following equation :
|
335 |
+
Gg
|
336 |
+
k(ν) =
|
337 |
+
Gk(0)
|
338 |
+
1+
|
339 |
+
�
|
340 |
+
πνGk(0)
|
341 |
+
6fkN
|
342 |
+
�2 .
|
343 |
+
(12)
|
344 |
+
The fluidicity factor fk is calculated using the equation below:
|
345 |
+
2∆−9/2
|
346 |
+
k
|
347 |
+
f 15/2
|
348 |
+
k
|
349 |
+
−6∆−3
|
350 |
+
k
|
351 |
+
f 5
|
352 |
+
k −∆−3/2
|
353 |
+
k
|
354 |
+
f 7/2
|
355 |
+
k
|
356 |
+
+6∆−3/2
|
357 |
+
k
|
358 |
+
f 5/2
|
359 |
+
k
|
360 |
+
+2fk−2 = 0,
|
361 |
+
(13)
|
362 |
+
where, ∆k is the diffusivity constant in reduced unit that is
|
363 |
+
defined as:
|
364 |
+
∆k(T,V,N,k,Gk(0)) = 2Gk(0)
|
365 |
+
9N
|
366 |
+
�πkBT
|
367 |
+
k
|
368 |
+
�1/2 �N
|
369 |
+
V
|
370 |
+
�1/3 � 6
|
371 |
+
π
|
372 |
+
�2/3
|
373 |
+
.
|
374 |
+
(14)
|
375 |
+
The above equation Eq.
|
376 |
+
14 indicates ∆k only depends
|
377 |
+
on the thermodynamic state points (T,V,N) and Gk(0) that
|
378 |
+
can uniquely determines the fluidicity factor fk for different
|
379 |
+
modes. Once we calculate Gg
|
380 |
+
k(ν) from Eq. 12, the solid-like
|
381 |
+
component can be determined by subtracting it from the total
|
382 |
+
DoS Gk(ν) (Eq. 11) obtained from velocity auto-correlation.
|
383 |
+
Once we calculate Gg
|
384 |
+
k(ν) and Gs
|
385 |
+
k(ν), each component
|
386 |
+
(translational, rotational) of the thermodynamic quantities
|
387 |
+
(energy from Eq. 9 and entropy from Eq. 10) can be de-
|
388 |
+
termined by integrating the DoS using appropriate weighting
|
389 |
+
functions for the respective thermodynamic quantities:
|
390 |
+
Ek = β −1
|
391 |
+
�� ∞
|
392 |
+
0 dνGs
|
393 |
+
k(ν)W s
|
394 |
+
E,k(ν)+
|
395 |
+
� ∞
|
396 |
+
0 dνGg
|
397 |
+
k(ν)W g
|
398 |
+
E,k(ν)
|
399 |
+
�
|
400 |
+
,
|
401 |
+
(15)
|
402 |
+
Sk = kB
|
403 |
+
�� ∞
|
404 |
+
0 dνGs
|
405 |
+
k(ν)W s
|
406 |
+
S,k(ν)+
|
407 |
+
� ∞
|
408 |
+
0 dνGg
|
409 |
+
k(ν)W g
|
410 |
+
S,k(ν)
|
411 |
+
�
|
412 |
+
,
|
413 |
+
(16)
|
414 |
+
Ak = β −1
|
415 |
+
�� ∞
|
416 |
+
0 dνGs
|
417 |
+
k(ν)W s
|
418 |
+
A,k(ν)+
|
419 |
+
� ∞
|
420 |
+
0 dνGg
|
421 |
+
k(ν)W g
|
422 |
+
A,k(ν)
|
423 |
+
�
|
424 |
+
,
|
425 |
+
(17)
|
426 |
+
where, β = (kBT)−1 and W g/s
|
427 |
+
l,k
|
428 |
+
is the weighting function for
|
429 |
+
thermodynamic quantity l (E/S/A) for each mode k (transla-
|
430 |
+
tion/rotation) partitioned into gas-like (g) or solid-like (s) con-
|
431 |
+
tribution. Here,
|
432 |
+
W s
|
433 |
+
E = βhν
|
434 |
+
2
|
435 |
+
+
|
436 |
+
βhν
|
437 |
+
exp(βhν)−1,
|
438 |
+
(18)
|
439 |
+
W s
|
440 |
+
S =
|
441 |
+
βhν
|
442 |
+
exp(βhν)−1 −ln[1−exp(−βhν)],
|
443 |
+
(19)
|
444 |
+
W g
|
445 |
+
E,trans(ν) = W g
|
446 |
+
E,rot(ν) = 0.5,
|
447 |
+
(20)
|
448 |
+
W g
|
449 |
+
S,trans(ν) = 1
|
450 |
+
3
|
451 |
+
SHS
|
452 |
+
kB
|
453 |
+
,
|
454 |
+
(21)
|
455 |
+
W g
|
456 |
+
S,rot(ν) = 1
|
457 |
+
3
|
458 |
+
SR
|
459 |
+
kB
|
460 |
+
(22)
|
461 |
+
where, SHS is the hard-sphere entropy and SR is the rotational
|
462 |
+
entropy of ideal gas modelled as rigid rotor:
|
463 |
+
SHS
|
464 |
+
kB
|
465 |
+
= 5
|
466 |
+
2 +ln
|
467 |
+
��2πmkBT
|
468 |
+
h2
|
469 |
+
�3/2 V
|
470 |
+
ftrN z(y)
|
471 |
+
�
|
472 |
+
+ y(3y−4)
|
473 |
+
(1−y)2 , (23)
|
474 |
+
SR
|
475 |
+
kB
|
476 |
+
= 1+ln
|
477 |
+
� T
|
478 |
+
σΘr
|
479 |
+
�
|
480 |
+
,
|
481 |
+
(24)
|
482 |
+
|
483 |
+
4
|
484 |
+
here, y = f 5/2
|
485 |
+
trans/∆3/2
|
486 |
+
trans and z(y) is the compressibility factor of
|
487 |
+
hard sphere from the Carnahan-Starling equation of state36.
|
488 |
+
Θr is the rotational temperature defined as Θr =
|
489 |
+
h2
|
490 |
+
8π2IrkB and
|
491 |
+
σ is the rotational symmetry. The reference energy now be-
|
492 |
+
comes,
|
493 |
+
E0 = EMD −β −13N(1−0.5 ftrans −0.5 frot),
|
494 |
+
(25)
|
495 |
+
where, EMD is the total energy calculated from the MD simu-
|
496 |
+
lation.
|
497 |
+
B.
|
498 |
+
Entropy using multiparticle correlation expansion method
|
499 |
+
and integration approach on the SRS equation of state
|
500 |
+
The configurational entropy Scon is defined as:13–15,17.
|
501 |
+
Scon
|
502 |
+
tot = Sid +
|
503 |
+
∞
|
504 |
+
∑
|
505 |
+
n=2
|
506 |
+
Sn,
|
507 |
+
(26)
|
508 |
+
where, Sid denotes the entropy of an ideal gas and Sn denotes
|
509 |
+
the entropy due to n-particle spatial correlation. Therefore,
|
510 |
+
the excess entropy can be calculated from well-known multi-
|
511 |
+
particle correlation expansion of the configurational entropy
|
512 |
+
(ME) Sex can be written as:
|
513 |
+
Sex =
|
514 |
+
∞
|
515 |
+
∑
|
516 |
+
n=2
|
517 |
+
Sn = Scon
|
518 |
+
tot −Sid,
|
519 |
+
(27)
|
520 |
+
If S2 represents the entropy due to pair interaction, then the
|
521 |
+
residual entropy ∆s that includes the spatial correlation for n ≥
|
522 |
+
3 becomes:
|
523 |
+
∆s = Sex −S2.
|
524 |
+
(28)
|
525 |
+
Pair entropy S2 can be expressed as:
|
526 |
+
S2 = Strans
|
527 |
+
2
|
528 |
+
+Srot
|
529 |
+
2 ,
|
530 |
+
(29)
|
531 |
+
Strans
|
532 |
+
2
|
533 |
+
= −2πρ
|
534 |
+
�
|
535 |
+
[g(r)lng(r)−g(r)+1]r2dr,
|
536 |
+
(30)
|
537 |
+
Srot
|
538 |
+
2 = 4πρ
|
539 |
+
�
|
540 |
+
g(r)qrot(r)r2dr,
|
541 |
+
(31)
|
542 |
+
qrot(r) = −1
|
543 |
+
4
|
544 |
+
� π
|
545 |
+
0 g(θ|r)sinθdθ.
|
546 |
+
(32)
|
547 |
+
In a system of linear molecules, the probability distribution
|
548 |
+
function g(r,θ) can be factorized as15, g(r,θ) = g(r)g(θ|r),
|
549 |
+
where, g(r) denotes the radial distribution and g(θ|r) denotes
|
550 |
+
the conditional probability distribution function between two
|
551 |
+
rods at a r distance with a relative angle between θ to θ +dθ.
|
552 |
+
The excess entropy can be exactly calculated using the
|
553 |
+
equation of state (EOS) of the SRS defined below17:
|
554 |
+
SEOS
|
555 |
+
ex
|
556 |
+
(ρ) = Uex
|
557 |
+
T −
|
558 |
+
� ρ
|
559 |
+
0
|
560 |
+
�
|
561 |
+
P
|
562 |
+
kBTρ′ −1
|
563 |
+
� dρ′
|
564 |
+
ρ′ ,
|
565 |
+
(33)
|
566 |
+
where, Uex represents the excess energy, which is the potential
|
567 |
+
energy per particle in the units of kB.
|
568 |
+
IV.
|
569 |
+
RESULTS AND DISCUSSION
|
570 |
+
We present equilibrium phase diagram of SRS of aspect
|
571 |
+
ratios L/D = 2 − 5 at the temperature T ∗ = 5 (Fig.
|
572 |
+
1
|
573 |
+
and Fig.7(a)).
|
574 |
+
The magnitude of the pressures and densi-
|
575 |
+
ties corresponding to different phases for different aspect ra-
|
576 |
+
tios are listed in table IV. We obtain 4 stable phases for
|
577 |
+
L/D ≥ 3.5 :17,37–40 crystal (K), smectic (Sm), nematic (N) and
|
578 |
+
isotropic (I); 3 stable phases for L/D = 3: crystal, smectic,
|
579 |
+
and isotropic and two stable phases for L/D = 2: crystal and
|
580 |
+
isotropic. For further details of these phases and their charac-
|
581 |
+
terization, we refer the reader to our earlier work39,40. Here
|
582 |
+
we are interested in entropy computations of these phases.
|
583 |
+
I
|
584 |
+
I
|
585 |
+
I
|
586 |
+
N
|
587 |
+
Sm
|
588 |
+
N
|
589 |
+
N
|
590 |
+
Sm
|
591 |
+
Sm
|
592 |
+
K
|
593 |
+
K
|
594 |
+
K
|
595 |
+
(a)
|
596 |
+
(c)
|
597 |
+
(b)
|
598 |
+
FIG. 1. (a) Equation of state (b) nematic order parameter S (c) po-
|
599 |
+
tential energy per particle U∗/N are plotted with packing fraction
|
600 |
+
η for the system of soft repulsive spherocylinders of aspect ratio
|
601 |
+
L/D = 5. Thermodynamic quantities are defined in the reduced unit:
|
602 |
+
pressure P∗ = Pvhsc/kBT and packing fraction, η = ρvhsc where vhsc
|
603 |
+
is the volume of the spherocylinder. We observe four stable phases:
|
604 |
+
isotropic (I), nematic (N), smectic (Sm) and crystal (K). The vertical
|
605 |
+
gray lines indicate boundaries between two phases.
|
606 |
+
A.
|
607 |
+
Validation of 2PT method
|
608 |
+
In the dilute limit, the entropy and Helmholtz free energy of
|
609 |
+
SRS, calculated using 2PT method, can be compared with the
|
610 |
+
values obtained for an ideal diatomic gas modeled as a rigid
|
611 |
+
rotor. The analytical expressions for the partition function Z,
|
612 |
+
|
613 |
+
15
|
614 |
+
10
|
615 |
+
N/n
|
616 |
+
5
|
617 |
+
0
|
618 |
+
0.1
|
619 |
+
0.2
|
620 |
+
0.3
|
621 |
+
0.4
|
622 |
+
0.5
|
623 |
+
0.6
|
624 |
+
0.7
|
625 |
+
0.8
|
626 |
+
0.9
|
627 |
+
n20
|
628 |
+
15
|
629 |
+
10
|
630 |
+
5
|
631 |
+
0
|
632 |
+
0.1
|
633 |
+
0.2
|
634 |
+
0.3
|
635 |
+
0.4
|
636 |
+
0.5
|
637 |
+
0.6
|
638 |
+
0.7
|
639 |
+
0.8
|
640 |
+
0.9
|
641 |
+
n0.8
|
642 |
+
0.6
|
643 |
+
S
|
644 |
+
0.4
|
645 |
+
0.2
|
646 |
+
0
|
647 |
+
0.1
|
648 |
+
0.2
|
649 |
+
0.3
|
650 |
+
0.40.5
|
651 |
+
0.6
|
652 |
+
0.7
|
653 |
+
0.8
|
654 |
+
0.95
|
655 |
+
entropy S, and Helmholtz free energy A of an ideal rigid rotor
|
656 |
+
are as follows:
|
657 |
+
Z(V,T) =
|
658 |
+
�2πmkBT
|
659 |
+
h2
|
660 |
+
�3/2
|
661 |
+
V 8π2IkBT
|
662 |
+
σh2
|
663 |
+
,
|
664 |
+
(34)
|
665 |
+
S
|
666 |
+
NkB
|
667 |
+
= ln
|
668 |
+
�2π(m1 +m2)kBT
|
669 |
+
h2
|
670 |
+
�3/2 Ve5/2
|
671 |
+
N
|
672 |
+
+ln8π2IkBTe
|
673 |
+
σh2
|
674 |
+
.
|
675 |
+
(35)
|
676 |
+
A
|
677 |
+
NkBT = −
|
678 |
+
�
|
679 |
+
ln
|
680 |
+
�2π(m1 +m2)kBT
|
681 |
+
h2
|
682 |
+
�3/2 V
|
683 |
+
N +ln8π2IkBT
|
684 |
+
σh2
|
685 |
+
+1
|
686 |
+
�
|
687 |
+
.
|
688 |
+
(36)
|
689 |
+
The 1st term in Eq. 35 is due to the translational motion,
|
690 |
+
and the 2nd term is due to the rotational motion (for an ideal
|
691 |
+
rigid rotor, there is no vibrational motion). In Table I and
|
692 |
+
II, we compare the entropy of the SRS system in a dilute limit
|
693 |
+
calculated from the 2pt method with that of an ideal rigid rotor
|
694 |
+
at the same state point calculated using the above equations for
|
695 |
+
different aspect ratios which are found to be in a very good
|
696 |
+
agreement.
|
697 |
+
TABLE I. Comparison of the total Stot, translational Strans and ro-
|
698 |
+
tational Srot entropy of SRS of different aspect ratios from the 2PT
|
699 |
+
method at the temperature T ∗ = 5 and number density ρ∗ = 0.01
|
700 |
+
with that of a rigid rotor at the same state points calculated using Eq.
|
701 |
+
35. Here, entropy is calculated in kB/particle unit.
|
702 |
+
L/D
|
703 |
+
ρ∗
|
704 |
+
Sid
|
705 |
+
trans
|
706 |
+
Sidrot
|
707 |
+
Sid
|
708 |
+
tot
|
709 |
+
S2PT
|
710 |
+
trans S2PT
|
711 |
+
rot
|
712 |
+
S2PT
|
713 |
+
tot
|
714 |
+
5
|
715 |
+
0.01 18.36 12.18 30.54 18.26 12.30 30.56
|
716 |
+
3
|
717 |
+
0.01 18.36 11.15 29.51 18.36 11.25 29.61
|
718 |
+
2
|
719 |
+
0.01 18.36 10.34 28.70 18.36 10.44 28.80
|
720 |
+
TABLE II. Comparison of the Helmholtz free energy of SRS of dif-
|
721 |
+
ferent aspect ratios from the 2PT method with that of the ideal rigid
|
722 |
+
rotor using Eq.36 at the dilute limit, temperature T ∗ = 5 and number
|
723 |
+
density ρ∗ = 0.01. A∗tot designates the total Helmholtz free energy
|
724 |
+
and A∗trans, A∗rot designate the translational and rotational components
|
725 |
+
respectively.
|
726 |
+
L/D
|
727 |
+
ρ∗
|
728 |
+
Aid
|
729 |
+
trans
|
730 |
+
Aidrot
|
731 |
+
Aid
|
732 |
+
tot
|
733 |
+
A2PT
|
734 |
+
trans
|
735 |
+
A2PT
|
736 |
+
rot
|
737 |
+
A2PT
|
738 |
+
tot
|
739 |
+
5
|
740 |
+
0.01 -84.24 -55.81 -139.95 -84.91 -55.95 -140.86
|
741 |
+
3
|
742 |
+
0.01 -84.24 -50.71 -134.98 -85.63 -50.65 -136.28
|
743 |
+
2
|
744 |
+
0.01 -84.24 -46.66 -130.88 -83.74 -48.33 -132.07
|
745 |
+
B.
|
746 |
+
Density of states of liquid crystal phases
|
747 |
+
We calculate the density of state G(ν) of different liquid
|
748 |
+
crystal phases using 2PT method as shown in Fig. 2. For
|
749 |
+
each phase, we show the total DoS and its decomposition
|
750 |
+
into translational, rotational modes.
|
751 |
+
The translational and
|
752 |
+
rotational modes are further decomposed into gas-like and
|
753 |
+
solid-like components, as mentioned in the 2PT method
|
754 |
+
section.
|
755 |
+
In Fig.2(a), we plot DoS for the state point P∗ = 1.78,η =
|
756 |
+
0.29 which corresponds to the isotropic phase as shown in
|
757 |
+
the equilibrium phase diagram [Fig.1]. We find that both the
|
758 |
+
translational Gtrans and rotational Grot DoS are dominated by
|
759 |
+
the gas like contribution and decay exponentially. At the zero
|
760 |
+
frequency ν = 0, both of Gtrans and Grot have large finite val-
|
761 |
+
ues, indicating that the system possesses high translational
|
762 |
+
and rotational diffusivity. Similarly, in Fig.2(b), we plot DoS
|
763 |
+
of nematic phase for the state point P∗ = 6.23,η = 0.50. We
|
764 |
+
see that Gtrans decays exponentially and have a fine value at
|
765 |
+
ν = 0 indicating gas-like behaviour. However, Grot is domi-
|
766 |
+
nated by solid-like behaviour with a low rotational diffusivity.
|
767 |
+
In the case of the smectic phase ( P∗ = 8,η = 0.6), both of
|
768 |
+
the Gtrans and Grot are dominated by solid-like contribution.
|
769 |
+
However, Gtrans has a very low value at zero-frequency indi-
|
770 |
+
cating a low-diffusivity which is due to the in-layer fluid-like
|
771 |
+
motion. In crystal phase (state point P∗ = 15.13,η = 0.78),
|
772 |
+
G(ν) is roughly zero at ν = 0 indicating absence of diffusive
|
773 |
+
mode in the system. Both translational and rotational DoS
|
774 |
+
exhibit solid-like behaviour.
|
775 |
+
C.
|
776 |
+
Fluidicity factor of liquid crystal phases
|
777 |
+
The decomposition of the translational and rotational DoS
|
778 |
+
into gas-like and solid-like components is carried out by cal-
|
779 |
+
culating the fluidicity factor f as discussed in Section III-A.
|
780 |
+
We find that both of translational and rotational fluidicity fac-
|
781 |
+
tors are very high in the isotropic phase, very low in the crystal
|
782 |
+
phase and intermediate in the LC phases as mentioned in the
|
783 |
+
Table III and in Fig. 3. We also calculate the phase bound-
|
784 |
+
aries of different LC phases from the change of ftrans and frot.
|
785 |
+
In Fig.3, we find that, both of the ftrans and frot decrease
|
786 |
+
with packing fraction η in the isotropic phase. In the ne-
|
787 |
+
matic phase, ftrans remains almost constant at its value in the
|
788 |
+
isotropic phase, while frot keeps decreasing. This is also con-
|
789 |
+
sistent with the DoS calculation showing that rotational dif-
|
790 |
+
fusivity is much lower in the nematic phase than translational
|
791 |
+
diffusivity. The I-N phase boundary is therefore defined as
|
792 |
+
the packing fraction where frot keeps decreasing but ftrans be-
|
793 |
+
comes constant (η∗
|
794 |
+
I−N ≈ 0.41−0.44 for L/D = 5). Similarly,
|
795 |
+
in the Smectic phase, frot remains nearly constant at its value
|
796 |
+
in the nematic phase while ftrans drops sharply. Hence, the
|
797 |
+
N-Sm phase boundary can be located at the packing fraction
|
798 |
+
where ftrans continues to decrease but frot remains almost con-
|
799 |
+
stant (η∗
|
800 |
+
N−Sm ≈ 0.54 − 0.57 for L/D = 5). Both of ftrans and
|
801 |
+
frot acquire a very low value in the crystal phase. These anal-
|
802 |
+
yses suggest another method of quantifying the phase bound-
|
803 |
+
|
804 |
+
6
|
805 |
+
aries using the fluidicity factor.
|
806 |
+
TABLE III. Translational and rotational fluidicity factors for different
|
807 |
+
liquid crystal phases for the aspect ratio L/D = 5.
|
808 |
+
P∗
|
809 |
+
η
|
810 |
+
ftrans
|
811 |
+
frot Phase
|
812 |
+
1.78 0.29 0.62 0.53
|
813 |
+
I
|
814 |
+
6.23 0.50 0.41 0.18
|
815 |
+
N
|
816 |
+
8.01 0.60 0.26 0.07
|
817 |
+
Sm
|
818 |
+
15.13 0.78 0.09 0.06
|
819 |
+
K
|
820 |
+
D.
|
821 |
+
Entropy calculation from 2PT method
|
822 |
+
In Table IV and in Fig.4, Fig.7, we mention the total en-
|
823 |
+
tropy Stot and its decomposition into the translational Strans
|
824 |
+
and rotational Srot modes for different liquid crystal phases
|
825 |
+
associated to different aspect ratios. We find that entropy de-
|
826 |
+
creases as a function of packing fraction for the given aspect
|
827 |
+
ratios. We also find that, at a certain packing fraction, to-
|
828 |
+
tal entropy is close by for the given aspect ratios, irrespec-
|
829 |
+
tive of the different liquid crystal phases they exhibit. As for
|
830 |
+
example, at η = 0.60, the magnitude of the total entropy is
|
831 |
+
Stot = 18.54 − 19.03 kB/particle; however, it shows smectic
|
832 |
+
structure for L/D ≥ 3 and isotropic structure for L/D = 2.
|
833 |
+
Similarly, at η = 0.54, Stot = 19.40−19.92 kB/particle while
|
834 |
+
it shows nematic structure for L/D ≥ 3.5 and isotropic struc-
|
835 |
+
ture for L/D = 3,2. These results indicate that, total entropy
|
836 |
+
depends on the thermodynamic state points only, not on the
|
837 |
+
different liquid crystal phases corresponding to different L/D
|
838 |
+
s. However, the entropy of different L/D s differs at the higher
|
839 |
+
packing fractions, as mentioned in Fig. 7(b).
|
840 |
+
In Fig.6, we calculate the pair entropy S2 of different LC
|
841 |
+
phases using Eq. 29 and its decomposition into translational
|
842 |
+
Str
|
843 |
+
2 and rotational Srot
|
844 |
+
2
|
845 |
+
parts. We observe that, Srot
|
846 |
+
2
|
847 |
+
decreases
|
848 |
+
sharply at the I-N phase boundary, while Str
|
849 |
+
2 decreases slowly.
|
850 |
+
For N-Sm transition, Str
|
851 |
+
2 decreases more rapidly than that of
|
852 |
+
I-N phase boundary. Our results are consistent with those of
|
853 |
+
Cuetos et al.17. These analyses indicate that the change of
|
854 |
+
entropy at the LC phase transition points are mainly driven by
|
855 |
+
the translational or rotational pair entropy. The sharp decrease
|
856 |
+
of rotational pair entropy at the I-N phase boundary is com-
|
857 |
+
pensated by residual entropy ∆s arising from the multi particle
|
858 |
+
correlation (Eq. 28). Similarly, the N-Sm phase transition is
|
859 |
+
driven by the sharp decrease of translational pair entropy that
|
860 |
+
is also compensated by residual entropy.
|
861 |
+
E.
|
862 |
+
Comparison of excess entropy from 2PT method and
|
863 |
+
integrating on the SRS equation of state
|
864 |
+
We calculate the excess entropy, Sex which is defined as the
|
865 |
+
amount of entropy arises due to the particles’ interaction us-
|
866 |
+
ing Eq.27. It is calculated from the difference between the
|
867 |
+
absolute entropy calculated from the 2PT method or integrat-
|
868 |
+
ing over MD/MC equation of state and the entropy of an ideal
|
869 |
+
rigid rotor at the same state point. We mention the magni-
|
870 |
+
tude of Sex for different liquid crystal phases in Table V for
|
871 |
+
L/D = 5 at T ∗ = 5. In Fig. 8, we compare the excess entropy
|
872 |
+
of SRS at different packing fractions from the 2PT method
|
873 |
+
with those of the standard integration approach on the (a) MD
|
874 |
+
equation of state of SRS from our simulation and (b) MC
|
875 |
+
equation of state of SRS employed by Cuetos et al.17 We ob-
|
876 |
+
serve that the magnitude of Sex are in good agreement at the
|
877 |
+
lower densities for the given methods. At the higher densi-
|
878 |
+
ties, Sex calculated from 2PT method matches well with the
|
879 |
+
MD equation of state, but it differs from the MC equation of
|
880 |
+
state17.
|
881 |
+
V.
|
882 |
+
CONCLUSION AND OUTLOOK
|
883 |
+
We describe a technique based on the two-phase thermody-
|
884 |
+
namic model (2PT) for computing the entropy of liquid crystal
|
885 |
+
phases of SRS with a range of aspect ratios L/D = 2−5. For
|
886 |
+
various liquid crystal phases, we compute the density of state
|
887 |
+
(DoS) functions and its decomposition into translational and
|
888 |
+
rotational motions. In the dilute limit, the entropy calculated
|
889 |
+
using the 2PT method matches exactly with that of an ideal
|
890 |
+
rigid rotor. We find that, at a definite packing fraction, the
|
891 |
+
magnitude of the total entropy is roughly equal regardless of
|
892 |
+
the different LC phases associated to different aspect ratios.
|
893 |
+
We compare the excess entropy with that of the conventional
|
894 |
+
integration approach on equation of state of SRS, that matches
|
895 |
+
well. The phase boundaries of different liquid crystal phases
|
896 |
+
are also calculated using the rotational and translational flu-
|
897 |
+
idicity factors. Our future study will involve to utilise this
|
898 |
+
method in calculating absolute value of entropy and other ther-
|
899 |
+
modynamic quantities of various liquid crystal molecules and
|
900 |
+
compare it with experiments.
|
901 |
+
ACKNOWLEDGMENTS
|
902 |
+
We thank SERB, India for financial support through provid-
|
903 |
+
ing computational facility. JC acknowledges support through
|
904 |
+
an INSPIRE fellowship. JC thanks S. Siva Nasarayya Chari
|
905 |
+
for insightful discussions.
|
906 |
+
1P.-G. De Gennes and J. Prost, The physics of liquid crystals, Vol. 83 (Oxford
|
907 |
+
university press, 1993).
|
908 |
+
2P. Bolhuis and D. Frenkel, The Journal of chemical physics 106, 666 (1997).
|
909 |
+
3S. C. McGrother, D. C. Williamson, and G. Jackson, The Journal of Chem-
|
910 |
+
ical Physics 104, 6755 (1996).
|
911 |
+
4Z. Dogic and S. Fraden, Phys. Rev. Lett. 78, 2417 (1997).
|
912 |
+
5H. Graf and H. Löwen, Phys. Rev. E 59, 1932 (1999).
|
913 |
+
6S. Fraden, G. Maret, D. L. D. Caspar, and R. B. Meyer, Phys. Rev. Lett.
|
914 |
+
63, 2068 (1989).
|
915 |
+
7Z. Dogic and S. Fraden, Phys. Rev. Lett. 78, 2417 (1997).
|
916 |
+
8P. Buining and H. Lekkerkerker, The Journal of Physical Chemistry 97,
|
917 |
+
11510 (1993).
|
918 |
+
9A. Kuijk, D. V. Byelov, A. V. Petukhov, A. Van Blaaderen, and A. Imhof,
|
919 |
+
Faraday discussions 159, 181 (2012).
|
920 |
+
10L. Onsager, Annals of the New York Academy of Sciences 51, 627 (1949).
|
921 |
+
|
922 |
+
7
|
923 |
+
0
|
924 |
+
100
|
925 |
+
200
|
926 |
+
300
|
927 |
+
400
|
928 |
+
ν
|
929 |
+
0
|
930 |
+
20
|
931 |
+
40
|
932 |
+
60
|
933 |
+
G( ν)
|
934 |
+
η = 0.78 (Crystal)
|
935 |
+
0
|
936 |
+
100
|
937 |
+
200
|
938 |
+
300
|
939 |
+
400
|
940 |
+
ν
|
941 |
+
0
|
942 |
+
20
|
943 |
+
40
|
944 |
+
60
|
945 |
+
80
|
946 |
+
100
|
947 |
+
G( ν)
|
948 |
+
η = 0.60 (SmecticA)
|
949 |
+
0
|
950 |
+
100
|
951 |
+
200
|
952 |
+
300
|
953 |
+
400
|
954 |
+
ν
|
955 |
+
0
|
956 |
+
25
|
957 |
+
50
|
958 |
+
75
|
959 |
+
100
|
960 |
+
125
|
961 |
+
G( ν)
|
962 |
+
η = 0.50 (Nematic)
|
963 |
+
0
|
964 |
+
25
|
965 |
+
50
|
966 |
+
75
|
967 |
+
100
|
968 |
+
125
|
969 |
+
150
|
970 |
+
ν
|
971 |
+
0
|
972 |
+
100
|
973 |
+
200
|
974 |
+
300
|
975 |
+
400
|
976 |
+
G( ν)
|
977 |
+
η = 0.29 (Isotropic)
|
978 |
+
Gtrans
|
979 |
+
g
|
980 |
+
Gtrans
|
981 |
+
s
|
982 |
+
Grot
|
983 |
+
g
|
984 |
+
Grot
|
985 |
+
s
|
986 |
+
Gtrans
|
987 |
+
Grot
|
988 |
+
Gor
|
989 |
+
Total
|
990 |
+
(a)
|
991 |
+
(b)
|
992 |
+
(c)
|
993 |
+
(d)
|
994 |
+
FIG. 2. Density of state (DoS) G(ν) for (a) isotropic (b) nematic (c) smectic and (d) crystal phase. The components of the entropy are
|
995 |
+
mentioned in the legend. The snapshots of the configurations are shown for the respective phases. Here, we see that DoS of nematic phase
|
996 |
+
[Fig. (b)] comprises both solid and gas like components, whereas for smectic phase [Fig.(c)], it is dominated by solid like components only.
|
997 |
+
11H. Green, “The molecular theory of fluids. amsterdam: North holland publ,”
|
998 |
+
(1952).
|
999 |
+
12R. Nettleton and M. Green, The Journal of Chemical Physics 29, 1365
|
1000 |
+
(1958).
|
1001 |
+
13T. Lazaridis and M. E. Paulaitis, The Journal of Physical Chemistry 96,
|
1002 |
+
3847 (1992).
|
1003 |
+
14T. Lazaridis and M. Karplus, The Journal of chemical physics 105, 4294
|
1004 |
+
(1996).
|
1005 |
+
15D. Costa, F. Saija,
|
1006 |
+
and P. Giaquinta, Chemical physics letters 283, 86
|
1007 |
+
(1998).
|
1008 |
+
16D. Costa, F. Micali, F. Saija, and P. Giaquinta, The Journal of Physical
|
1009 |
+
Chemistry B 106, 12297 (2002).
|
1010 |
+
17A. Cuetos, B. Martınez-Haya, L. Rull, and S. Lago, The Journal of chemi-
|
1011 |
+
cal physics 117, 2934 (2002).
|
1012 |
+
18A. Ghosh and D. Dhar, EPL (Europhysics Letters) 78, 20003 (2007).
|
1013 |
+
19D. Dhar and R. Rajesh, Phys. Rev. E 103, 042130 (2021).
|
1014 |
+
20S.-T. Lin, M. Blanco, and W. A. Goddard III, The Journal of chemical
|
1015 |
+
physics 119, 11792 (2003).
|
1016 |
+
21S. S. Pannir Sivajothi, S.-T. Lin, and P. K. Maiti, The Journal of Physical
|
1017 |
+
Chemistry B 123, 180 (2018).
|
1018 |
+
22S.-T. Lin, P. K. Maiti, and W. A. Goddard III, The Journal of Physical
|
1019 |
+
Chemistry B 114, 8191 (2010).
|
1020 |
+
23S.-N. Huang, T. A. Pascal, W. A. Goddard III, P. K. Maiti, and S.-T. Lin,
|
1021 |
+
Journal of chemical theory and computation 7, 1893 (2011).
|
1022 |
+
24B. J. Borah, P. K. Maiti, C. Chakravarty, and S. Yashonath, The Journal of
|
1023 |
+
Chemical Physics 136, 174510 (2012).
|
1024 |
+
25J. D. Weeks, D. Chandler, and H. C. Andersen, The Journal of chemical
|
1025 |
+
physics 54, 5237 (1971).
|
1026 |
+
26M. P. Allen, G. T. Evans, D. Frenkel, and B. Mulder, Advances in chemical
|
1027 |
+
physics 86, 1 (1993).
|
1028 |
+
27C. Vega and S. Lago, Computers & chemistry 18, 55 (1994).
|
1029 |
+
28L. Verlet, Physical review 159, 98 (1967).
|
1030 |
+
29I. P. Omelyan, Computers in Physics 12, 97 (1998).
|
1031 |
+
30N. S. Martys and R. D. Mountain, Physical Review E 59, 3733 (1999).
|
1032 |
+
31M. Rotunno, T. Bellini, Y. Lansac, and M. A. Glaser, The Journal of chem-
|
1033 |
+
ical physics 121, 5541 (2004).
|
1034 |
+
32Y. Lansac, P. K. Maiti, N. A. Clark, and M. A. Glaser, Physical Review E
|
1035 |
+
67, 011703 (2003).
|
1036 |
+
33P. K. Maiti, Y. Lansac, M. A. Glaser, and N. A. Clark, Physical review
|
1037 |
+
letters 88, 065504 (2002).
|
1038 |
+
34D. Rajendra, J. Mandal, Y. Hatwalne, and P. K. Maiti, Soft Matter (2022).
|
1039 |
+
35H. J. Berendsen, J. v. Postma, W. F. van Gunsteren, A. DiNola, and J. R.
|
1040 |
+
Haak, The Journal of chemical physics 81, 3684 (1984).
|
1041 |
+
36N. F. Carnahan and K. E. Starling, The Journal of Chemical Physics 53, 600
|
1042 |
+
(1970).
|
1043 |
+
|
1044 |
+
8
|
1045 |
+
0.3
|
1046 |
+
0.4
|
1047 |
+
0.5
|
1048 |
+
0.6
|
1049 |
+
0.7
|
1050 |
+
0.8
|
1051 |
+
η
|
1052 |
+
0
|
1053 |
+
0.1
|
1054 |
+
0.2
|
1055 |
+
0.3
|
1056 |
+
0.4
|
1057 |
+
0.5
|
1058 |
+
fluidicity (f)
|
1059 |
+
ftrans
|
1060 |
+
frot
|
1061 |
+
I
|
1062 |
+
N
|
1063 |
+
Sm
|
1064 |
+
K
|
1065 |
+
FIG. 3. Phase diagram of the SRS with aspect ratio L/D = 5 at
|
1066 |
+
T ∗ = 5 in fluidicity, packing fraction (f − η) space. ftrans and frot
|
1067 |
+
represent the translational and rotational components respectively.
|
1068 |
+
The black dotted lines denote phase boundaries of different phases.
|
1069 |
+
0.2
|
1070 |
+
0.3
|
1071 |
+
0.4
|
1072 |
+
0.5
|
1073 |
+
0.6
|
1074 |
+
0.7
|
1075 |
+
0.8
|
1076 |
+
0.9
|
1077 |
+
η
|
1078 |
+
0
|
1079 |
+
5
|
1080 |
+
10
|
1081 |
+
15
|
1082 |
+
20
|
1083 |
+
25
|
1084 |
+
30
|
1085 |
+
S(kB/particle)
|
1086 |
+
Strans
|
1087 |
+
Srot
|
1088 |
+
Stot
|
1089 |
+
I
|
1090 |
+
N
|
1091 |
+
Sm
|
1092 |
+
K
|
1093 |
+
FIG. 4. Total entropy and its translational and rotational components
|
1094 |
+
of different liquid crystal phases for the aspect ratio L/D = 5 at T ∗ =
|
1095 |
+
5. The black dotted lines denote the phase boundaries.
|
1096 |
+
37A. Cuetos and B. Martínez-Haya, Molecular Physics 113, 1137 (2015).
|
1097 |
+
38D. J. Earl, J. Ilnytskyi, and M. R. Wilson, Molecular physics 99, 1719
|
1098 |
+
(2001).
|
1099 |
+
39J. Chattopadhyay, S. Pannir-Sivajothi, K. Varma, S. Ramaswamy, C. Das-
|
1100 |
+
gupta, and P. K. Maiti, Phys. Rev. E 104, 054610 (2021).
|
1101 |
+
40J. Chattopadhyay, S. Ramaswamy, C. Dasgupta, and P. K. Maiti, arXiv
|
1102 |
+
preprint arXiv:2205.00667 (2022).
|
1103 |
+
|
1104 |
+
9
|
1105 |
+
0
|
1106 |
+
0.1
|
1107 |
+
0.2
|
1108 |
+
0.3
|
1109 |
+
0.4
|
1110 |
+
0.5
|
1111 |
+
0.6
|
1112 |
+
0.7
|
1113 |
+
0.8
|
1114 |
+
0.9
|
1115 |
+
η
|
1116 |
+
-200
|
1117 |
+
-150
|
1118 |
+
-100
|
1119 |
+
-50
|
1120 |
+
0
|
1121 |
+
A*
|
1122 |
+
A*trans
|
1123 |
+
A*rot
|
1124 |
+
A*tot
|
1125 |
+
I
|
1126 |
+
N
|
1127 |
+
Sm
|
1128 |
+
K
|
1129 |
+
FIG. 5. Helmholtz free energy A∗tot and its translational A∗trans and
|
1130 |
+
rotational A∗rot components of different liquid crystal phases for the
|
1131 |
+
aspect ratio L/D = 5 at T ∗ = 5. The black dotted lines denote the
|
1132 |
+
phase boundaries.
|
1133 |
+
-6
|
1134 |
+
-5
|
1135 |
+
-4
|
1136 |
+
-3
|
1137 |
+
-2
|
1138 |
+
-1
|
1139 |
+
0
|
1140 |
+
0
|
1141 |
+
0.1
|
1142 |
+
0.2
|
1143 |
+
0.3
|
1144 |
+
0.4
|
1145 |
+
0.5
|
1146 |
+
0.6
|
1147 |
+
0.7
|
1148 |
+
η
|
1149 |
+
S2tr (kB/particle)
|
1150 |
+
I
|
1151 |
+
N
|
1152 |
+
Sm
|
1153 |
+
FIG. 6. Translational pair entropy per particle of different liquid crys-
|
1154 |
+
tal phases for the aspect ratio L/D = 5 at T ∗ = 5. The black dotted
|
1155 |
+
lines denote the phase boundaries.
|
1156 |
+
|
1157 |
+
-
|
1158 |
+
-
|
1159 |
+
-
|
1160 |
+
-
|
1161 |
+
-
|
1162 |
+
-
|
1163 |
+
-
|
1164 |
+
-
|
1165 |
+
-
|
1166 |
+
-
|
1167 |
+
-
|
1168 |
+
-
|
1169 |
+
-
|
1170 |
+
-
|
1171 |
+
-
|
1172 |
+
-
|
1173 |
+
-
|
1174 |
+
-
|
1175 |
+
-
|
1176 |
+
-
|
1177 |
+
-
|
1178 |
+
-
|
1179 |
+
-
|
1180 |
+
-
|
1181 |
+
-
|
1182 |
+
-
|
1183 |
+
-
|
1184 |
+
-
|
1185 |
+
-
|
1186 |
+
-
|
1187 |
+
-
|
1188 |
+
-
|
1189 |
+
-
|
1190 |
+
-
|
1191 |
+
-
|
1192 |
+
-
|
1193 |
+
-
|
1194 |
+
-
|
1195 |
+
-
|
1196 |
+
--
|
1197 |
+
-
|
1198 |
+
-
|
1199 |
+
-
|
1200 |
+
-
|
1201 |
+
-
|
1202 |
+
-
|
1203 |
+
-
|
1204 |
+
-
|
1205 |
+
-
|
1206 |
+
-
|
1207 |
+
-
|
1208 |
+
-
|
1209 |
+
-
|
1210 |
+
-
|
1211 |
+
-
|
1212 |
+
-
|
1213 |
+
-
|
1214 |
+
-
|
1215 |
+
-
|
1216 |
+
-
|
1217 |
+
-
|
1218 |
+
-
|
1219 |
+
-
|
1220 |
+
-
|
1221 |
+
-
|
1222 |
+
-
|
1223 |
+
-
|
1224 |
+
-
|
1225 |
+
-
|
1226 |
+
-
|
1227 |
+
--
|
1228 |
+
-
|
1229 |
+
-
|
1230 |
+
-
|
1231 |
+
-
|
1232 |
+
-
|
1233 |
+
-
|
1234 |
+
-
|
1235 |
+
-
|
1236 |
+
-
|
1237 |
+
-
|
1238 |
+
-
|
1239 |
+
-
|
1240 |
+
-
|
1241 |
+
-
|
1242 |
+
-
|
1243 |
+
-
|
1244 |
+
-
|
1245 |
+
-
|
1246 |
+
-10
|
1247 |
+
2
|
1248 |
+
4
|
1249 |
+
6
|
1250 |
+
8
|
1251 |
+
10
|
1252 |
+
12
|
1253 |
+
14
|
1254 |
+
16
|
1255 |
+
18
|
1256 |
+
0.4 0.45 0.5 0.55 0.6 0.65 0.7 0.75 0.8 0.85
|
1257 |
+
P*
|
1258 |
+
�
|
1259 |
+
L/D = 2.0
|
1260 |
+
L/D = 3.0
|
1261 |
+
L/D = 3.5
|
1262 |
+
L/D = 4.0
|
1263 |
+
L/D = 5.0
|
1264 |
+
15
|
1265 |
+
16
|
1266 |
+
17
|
1267 |
+
18
|
1268 |
+
19
|
1269 |
+
20
|
1270 |
+
21
|
1271 |
+
22
|
1272 |
+
23
|
1273 |
+
0.4 0.45 0.5 0.55 0.6 0.65 0.7 0.75 0.8 0.85
|
1274 |
+
Stot (kB/particle)
|
1275 |
+
�
|
1276 |
+
L/D = 2.0
|
1277 |
+
L/D = 3.0
|
1278 |
+
L/D = 3.5
|
1279 |
+
L/D = 4.0
|
1280 |
+
L/D = 5.0
|
1281 |
+
9.5
|
1282 |
+
10
|
1283 |
+
10.5
|
1284 |
+
11
|
1285 |
+
11.5
|
1286 |
+
12
|
1287 |
+
12.5
|
1288 |
+
13
|
1289 |
+
0.4 0.45 0.5 0.55 0.6 0.65 0.7 0.75 0.8 0.85
|
1290 |
+
Strans (kB/particle)
|
1291 |
+
�
|
1292 |
+
5
|
1293 |
+
5.5
|
1294 |
+
6
|
1295 |
+
6.5
|
1296 |
+
7
|
1297 |
+
7.5
|
1298 |
+
8
|
1299 |
+
8.5
|
1300 |
+
9
|
1301 |
+
9.5
|
1302 |
+
10
|
1303 |
+
0.4 0.45 0.5 0.55 0.6 0.65 0.7 0.75 0.8 0.85
|
1304 |
+
Srot (kB/particle)
|
1305 |
+
�
|
1306 |
+
(a)
|
1307 |
+
(c)
|
1308 |
+
(b)
|
1309 |
+
(d)
|
1310 |
+
FIG. 7. (a) Equation of state, (b) total entropy Stot and its decomposition into (c) translational Strans and (d) rotational Srot motion as a function
|
1311 |
+
of packing fraction η for different L/Ds at the temperature T ∗ = 5. Here we see that, at a certain packing fraction, total entropy is roughly
|
1312 |
+
same irrespective of the different LC phases corresponding to different L/Ds.
|
1313 |
+
|
1314 |
+
11
|
1315 |
+
0
|
1316 |
+
0.2
|
1317 |
+
0.4
|
1318 |
+
0.6
|
1319 |
+
0.8
|
1320 |
+
η
|
1321 |
+
-10
|
1322 |
+
-8
|
1323 |
+
-6
|
1324 |
+
-4
|
1325 |
+
-2
|
1326 |
+
0
|
1327 |
+
Sex(kB/particle)
|
1328 |
+
MD_EOS
|
1329 |
+
MC EOS [Ref. 17]
|
1330 |
+
2PT
|
1331 |
+
I
|
1332 |
+
N
|
1333 |
+
Sm
|
1334 |
+
FIG. 8. Excess entropy Sex = S2PT/EOS
|
1335 |
+
tot
|
1336 |
+
− Sid
|
1337 |
+
tot vs packing fraction η for L/D = 5 calculated using 2PT method and equation of state (EOS)
|
1338 |
+
of SRS. Here, we compare the excess entropy calculated using MD equation of state and 2PT method from our simulation with those of the
|
1339 |
+
Monte Carlo (MC) EOS from Cuetos et al.17. The black dotted lines denote the phase boundaries.
|
1340 |
+
|
1341 |
+
12
|
1342 |
+
TABLE IV. Total entropy S2PT
|
1343 |
+
tot
|
1344 |
+
and its decomposition into translational S2PT
|
1345 |
+
trans and rotational S2PT
|
1346 |
+
rot
|
1347 |
+
degrees of freedom for different liquid
|
1348 |
+
crystal phases associated to different aspect ratios L/D s at T ∗ = 5. Here, P∗,ρ∗ and η indicate pressure, number density and packing fraction
|
1349 |
+
respectively.
|
1350 |
+
P∗
|
1351 |
+
ρ∗
|
1352 |
+
η
|
1353 |
+
S2PT
|
1354 |
+
trans
|
1355 |
+
S2PT
|
1356 |
+
rot
|
1357 |
+
S2PT
|
1358 |
+
tot
|
1359 |
+
Phase
|
1360 |
+
L/D = 5
|
1361 |
+
4.45
|
1362 |
+
0.093
|
1363 |
+
0.413
|
1364 |
+
12.574
|
1365 |
+
9.230
|
1366 |
+
21.804
|
1367 |
+
I
|
1368 |
+
4.90
|
1369 |
+
0.098
|
1370 |
+
0.434
|
1371 |
+
12.509
|
1372 |
+
8.985
|
1373 |
+
21.494
|
1374 |
+
N
|
1375 |
+
5.34
|
1376 |
+
0.103
|
1377 |
+
0.457
|
1378 |
+
12.483
|
1379 |
+
8.667
|
1380 |
+
21.150
|
1381 |
+
N
|
1382 |
+
5.79
|
1383 |
+
0.107
|
1384 |
+
0.477
|
1385 |
+
12.435
|
1386 |
+
8.391
|
1387 |
+
20.827
|
1388 |
+
N
|
1389 |
+
6.23
|
1390 |
+
0.111
|
1391 |
+
0.496
|
1392 |
+
12.320
|
1393 |
+
8.354
|
1394 |
+
20.674
|
1395 |
+
N
|
1396 |
+
6.68
|
1397 |
+
0.116
|
1398 |
+
0.517
|
1399 |
+
12.228
|
1400 |
+
7.928
|
1401 |
+
20.157
|
1402 |
+
N
|
1403 |
+
7.12
|
1404 |
+
0.121
|
1405 |
+
0.539
|
1406 |
+
12.170
|
1407 |
+
7.751
|
1408 |
+
19.921
|
1409 |
+
N
|
1410 |
+
7.57
|
1411 |
+
0.130
|
1412 |
+
0.580
|
1413 |
+
11.924
|
1414 |
+
7.344
|
1415 |
+
19.268
|
1416 |
+
SmA
|
1417 |
+
8.01
|
1418 |
+
0.135
|
1419 |
+
0.599
|
1420 |
+
11.780
|
1421 |
+
7.231
|
1422 |
+
19.011
|
1423 |
+
SmA
|
1424 |
+
8.46
|
1425 |
+
0.137
|
1426 |
+
0.611
|
1427 |
+
11.730
|
1428 |
+
7.039
|
1429 |
+
18.768
|
1430 |
+
SmA
|
1431 |
+
9.35
|
1432 |
+
0.144
|
1433 |
+
0.639
|
1434 |
+
11.355
|
1435 |
+
6.841
|
1436 |
+
18.197
|
1437 |
+
SmA
|
1438 |
+
9.79
|
1439 |
+
0.147
|
1440 |
+
0.652
|
1441 |
+
11.298
|
1442 |
+
6.761
|
1443 |
+
18.059
|
1444 |
+
SmA
|
1445 |
+
10.68
|
1446 |
+
0.151
|
1447 |
+
0.674
|
1448 |
+
11.221
|
1449 |
+
6.951
|
1450 |
+
18.172
|
1451 |
+
SmA
|
1452 |
+
12.46
|
1453 |
+
0.160
|
1454 |
+
0.710
|
1455 |
+
10.909
|
1456 |
+
6.553
|
1457 |
+
17.462
|
1458 |
+
SmA
|
1459 |
+
14.24
|
1460 |
+
0.171
|
1461 |
+
0.762
|
1462 |
+
10.161
|
1463 |
+
5.950
|
1464 |
+
16.111
|
1465 |
+
SmA
|
1466 |
+
16.02
|
1467 |
+
0.177
|
1468 |
+
0.788
|
1469 |
+
9.879
|
1470 |
+
5.944
|
1471 |
+
15.823
|
1472 |
+
K
|
1473 |
+
17.80
|
1474 |
+
0.184
|
1475 |
+
0.818
|
1476 |
+
9.656
|
1477 |
+
5.563
|
1478 |
+
15.219
|
1479 |
+
K
|
1480 |
+
L/D = 4
|
1481 |
+
5.13
|
1482 |
+
0.121
|
1483 |
+
0.444
|
1484 |
+
12.287
|
1485 |
+
9.081
|
1486 |
+
21.368
|
1487 |
+
I
|
1488 |
+
5.86
|
1489 |
+
0.127
|
1490 |
+
0.466
|
1491 |
+
11.999
|
1492 |
+
8.783
|
1493 |
+
20.782
|
1494 |
+
I
|
1495 |
+
6.60
|
1496 |
+
0.134
|
1497 |
+
0.490
|
1498 |
+
11.845
|
1499 |
+
8.493
|
1500 |
+
20.338
|
1501 |
+
I
|
1502 |
+
6.96
|
1503 |
+
0.137
|
1504 |
+
0.502
|
1505 |
+
11.812
|
1506 |
+
8.438
|
1507 |
+
20.251
|
1508 |
+
N
|
1509 |
+
7.33
|
1510 |
+
0.141
|
1511 |
+
0.516
|
1512 |
+
11.706
|
1513 |
+
8.290
|
1514 |
+
19.996
|
1515 |
+
N
|
1516 |
+
7.70
|
1517 |
+
0.146
|
1518 |
+
0.537
|
1519 |
+
11.740
|
1520 |
+
8.008
|
1521 |
+
19.748
|
1522 |
+
N
|
1523 |
+
8.06
|
1524 |
+
0.155
|
1525 |
+
0.568
|
1526 |
+
11.720
|
1527 |
+
7.787
|
1528 |
+
19.507
|
1529 |
+
SmA
|
1530 |
+
8.43
|
1531 |
+
0.165
|
1532 |
+
0.606
|
1533 |
+
11.630
|
1534 |
+
7.401
|
1535 |
+
19.031
|
1536 |
+
SmA
|
1537 |
+
8.80
|
1538 |
+
0.169
|
1539 |
+
0.620
|
1540 |
+
11.446
|
1541 |
+
7.346
|
1542 |
+
18.792
|
1543 |
+
SmA
|
1544 |
+
11.00
|
1545 |
+
0.187
|
1546 |
+
0.685
|
1547 |
+
11.019
|
1548 |
+
6.625
|
1549 |
+
17.644
|
1550 |
+
K
|
1551 |
+
|
1552 |
+
13
|
1553 |
+
P∗
|
1554 |
+
ρ∗
|
1555 |
+
η
|
1556 |
+
S2PT
|
1557 |
+
trans
|
1558 |
+
S2PT
|
1559 |
+
rot
|
1560 |
+
S2PT
|
1561 |
+
tot
|
1562 |
+
Phase
|
1563 |
+
L/D = 3.5
|
1564 |
+
7.20
|
1565 |
+
0.155
|
1566 |
+
0.508
|
1567 |
+
11.708
|
1568 |
+
8.369
|
1569 |
+
20.077
|
1570 |
+
I
|
1571 |
+
7.85
|
1572 |
+
0.160
|
1573 |
+
0.523
|
1574 |
+
11.608
|
1575 |
+
8.203
|
1576 |
+
19.810
|
1577 |
+
I
|
1578 |
+
8.18
|
1579 |
+
0.162
|
1580 |
+
0.531
|
1581 |
+
11.549
|
1582 |
+
8.135
|
1583 |
+
19.684
|
1584 |
+
N
|
1585 |
+
8.51
|
1586 |
+
0.166
|
1587 |
+
0.543
|
1588 |
+
11.385
|
1589 |
+
8.041
|
1590 |
+
19.427
|
1591 |
+
N
|
1592 |
+
8.84
|
1593 |
+
0.171
|
1594 |
+
0.559
|
1595 |
+
11.412
|
1596 |
+
7.873
|
1597 |
+
19.285
|
1598 |
+
N
|
1599 |
+
9.16
|
1600 |
+
0.191
|
1601 |
+
0.624
|
1602 |
+
11.410
|
1603 |
+
7.134
|
1604 |
+
18.544
|
1605 |
+
SmA
|
1606 |
+
9.49
|
1607 |
+
0.196
|
1608 |
+
0.643
|
1609 |
+
11.233
|
1610 |
+
6.931
|
1611 |
+
18.164
|
1612 |
+
SmA
|
1613 |
+
9.82
|
1614 |
+
0.198
|
1615 |
+
0.647
|
1616 |
+
11.306
|
1617 |
+
6.870
|
1618 |
+
18.176
|
1619 |
+
SmA
|
1620 |
+
10.14
|
1621 |
+
0.203
|
1622 |
+
0.663
|
1623 |
+
11.130
|
1624 |
+
6.714
|
1625 |
+
17.844
|
1626 |
+
K
|
1627 |
+
10.47
|
1628 |
+
0.205
|
1629 |
+
0.672
|
1630 |
+
11.082
|
1631 |
+
6.607
|
1632 |
+
17.688
|
1633 |
+
K
|
1634 |
+
13.09
|
1635 |
+
0.224
|
1636 |
+
0.732
|
1637 |
+
10.282
|
1638 |
+
6.142
|
1639 |
+
16.423
|
1640 |
+
K
|
1641 |
+
L/D = 3
|
1642 |
+
2.30
|
1643 |
+
0.122
|
1644 |
+
0.352
|
1645 |
+
13.438
|
1646 |
+
9.802
|
1647 |
+
23.239
|
1648 |
+
I
|
1649 |
+
6.91
|
1650 |
+
0.176
|
1651 |
+
0.506
|
1652 |
+
11.708
|
1653 |
+
8.453
|
1654 |
+
20.161
|
1655 |
+
I
|
1656 |
+
8.06
|
1657 |
+
0.185
|
1658 |
+
0.534
|
1659 |
+
11.387
|
1660 |
+
8.116
|
1661 |
+
19.504
|
1662 |
+
I
|
1663 |
+
8.35
|
1664 |
+
0.187
|
1665 |
+
0.539
|
1666 |
+
11.345
|
1667 |
+
8.058
|
1668 |
+
19.403
|
1669 |
+
I
|
1670 |
+
9.50
|
1671 |
+
0.195
|
1672 |
+
0.562
|
1673 |
+
11.142
|
1674 |
+
7.878
|
1675 |
+
19.020
|
1676 |
+
I
|
1677 |
+
9.79
|
1678 |
+
0.198
|
1679 |
+
0.570
|
1680 |
+
11.026
|
1681 |
+
7.736
|
1682 |
+
18.762
|
1683 |
+
SmA
|
1684 |
+
10.08
|
1685 |
+
0.211
|
1686 |
+
0.608
|
1687 |
+
11.161
|
1688 |
+
7.460
|
1689 |
+
18.621
|
1690 |
+
SmA
|
1691 |
+
10.37
|
1692 |
+
0.227
|
1693 |
+
0.653
|
1694 |
+
11.052
|
1695 |
+
6.920
|
1696 |
+
17.972
|
1697 |
+
SmA
|
1698 |
+
10.66
|
1699 |
+
0.233
|
1700 |
+
0.670
|
1701 |
+
10.963
|
1702 |
+
6.614
|
1703 |
+
17.577
|
1704 |
+
K
|
1705 |
+
12.67
|
1706 |
+
0.249
|
1707 |
+
0.717
|
1708 |
+
10.507
|
1709 |
+
6.486
|
1710 |
+
16.992
|
1711 |
+
K
|
1712 |
+
L/D = 2
|
1713 |
+
10.47
|
1714 |
+
0.282
|
1715 |
+
0.590
|
1716 |
+
10.955
|
1717 |
+
7.584
|
1718 |
+
18.539
|
1719 |
+
I
|
1720 |
+
11.10
|
1721 |
+
0.287
|
1722 |
+
0.600
|
1723 |
+
10.776
|
1724 |
+
7.510
|
1725 |
+
18.286
|
1726 |
+
I
|
1727 |
+
11.94
|
1728 |
+
0.293
|
1729 |
+
0.613
|
1730 |
+
10.614
|
1731 |
+
7.404
|
1732 |
+
18.017
|
1733 |
+
I
|
1734 |
+
12.15
|
1735 |
+
0.326
|
1736 |
+
0.683
|
1737 |
+
10.457
|
1738 |
+
6.351
|
1739 |
+
16.808
|
1740 |
+
K
|
1741 |
+
12.57
|
1742 |
+
0.344
|
1743 |
+
0.721
|
1744 |
+
9.830
|
1745 |
+
5.992
|
1746 |
+
15.822
|
1747 |
+
K
|
1748 |
+
12.99
|
1749 |
+
0.348
|
1750 |
+
0.729
|
1751 |
+
9.786
|
1752 |
+
5.862
|
1753 |
+
15.647
|
1754 |
+
K
|
1755 |
+
|
1756 |
+
14
|
1757 |
+
TABLE V. Total entropy S2PT
|
1758 |
+
tot
|
1759 |
+
and the excess entropy S2PT
|
1760 |
+
ex
|
1761 |
+
calculated from the 2PT method, entropy of ideal rigid rotor Sid
|
1762 |
+
tot calculated using
|
1763 |
+
Eq. 35 and excess entropy using Monte Carlo equation of state from Cuetos et al.17 SEOS
|
1764 |
+
ex
|
1765 |
+
for different liquid crystal phases of L/D = 5 at
|
1766 |
+
T ∗ = 5:
|
1767 |
+
P∗
|
1768 |
+
ρ∗
|
1769 |
+
S2PT
|
1770 |
+
tot
|
1771 |
+
Sid
|
1772 |
+
tot
|
1773 |
+
S2PT
|
1774 |
+
ex
|
1775 |
+
SEOS
|
1776 |
+
ex
|
1777 |
+
Ref17
|
1778 |
+
Phase
|
1779 |
+
4.45
|
1780 |
+
0.093
|
1781 |
+
21.803
|
1782 |
+
28.316
|
1783 |
+
-6.512
|
1784 |
+
-4.023
|
1785 |
+
I
|
1786 |
+
4.90
|
1787 |
+
0.098
|
1788 |
+
21.494
|
1789 |
+
28.267
|
1790 |
+
-6.772
|
1791 |
+
-4.454
|
1792 |
+
N
|
1793 |
+
5.34
|
1794 |
+
0.103
|
1795 |
+
21.150
|
1796 |
+
28.215
|
1797 |
+
-7.064
|
1798 |
+
-4.598
|
1799 |
+
N
|
1800 |
+
5.79
|
1801 |
+
0.107
|
1802 |
+
20.827
|
1803 |
+
28.172
|
1804 |
+
-7.345
|
1805 |
+
-4.885
|
1806 |
+
N
|
1807 |
+
6.23
|
1808 |
+
0.112
|
1809 |
+
20.674
|
1810 |
+
28.134
|
1811 |
+
-7.459
|
1812 |
+
-5.316
|
1813 |
+
N
|
1814 |
+
6.68
|
1815 |
+
0.116
|
1816 |
+
20.156
|
1817 |
+
28.093
|
1818 |
+
-7.936
|
1819 |
+
-5.891
|
1820 |
+
N
|
1821 |
+
7.12
|
1822 |
+
0.121
|
1823 |
+
19.921
|
1824 |
+
28.051
|
1825 |
+
-8.131
|
1826 |
+
-6.322
|
1827 |
+
N
|
1828 |
+
7.57
|
1829 |
+
0.130
|
1830 |
+
19.268
|
1831 |
+
27.977
|
1832 |
+
-8.709
|
1833 |
+
-6.753
|
1834 |
+
SmA
|
1835 |
+
8.01
|
1836 |
+
0.135
|
1837 |
+
19.011
|
1838 |
+
27.946
|
1839 |
+
-8.935
|
1840 |
+
-7.328
|
1841 |
+
SmA
|
1842 |
+
8.46
|
1843 |
+
0.137
|
1844 |
+
18.768
|
1845 |
+
27.926
|
1846 |
+
-9.158
|
1847 |
+
-7.615
|
1848 |
+
SmA
|
1849 |
+
8.90
|
1850 |
+
0.141
|
1851 |
+
18.425
|
1852 |
+
27.898
|
1853 |
+
-9.473
|
1854 |
+
-
|
1855 |
+
SmA
|
1856 |
+
9.35
|
1857 |
+
0.144
|
1858 |
+
18.197
|
1859 |
+
27.880
|
1860 |
+
-9.683
|
1861 |
+
-8.046
|
1862 |
+
SmA
|
1863 |
+
9.79
|
1864 |
+
0.147
|
1865 |
+
18.059
|
1866 |
+
27.860
|
1867 |
+
-9.801
|
1868 |
+
-8.333
|
1869 |
+
SmA
|
1870 |
+
|
0tE3T4oBgHgl3EQfnAp3/content/tmp_files/load_file.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
29E3T4oBgHgl3EQfoAqh/vector_store/index.faiss
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:0c69d2a741dfddfcb881d1042bc0f0a0b7f63527a6124c16051ba3b6a59562f2
|
3 |
+
size 4718637
|
29E3T4oBgHgl3EQfoAqh/vector_store/index.pkl
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:89e7d9cf196f866cc6b824b8f83d7b2bc9beed9cec9a98627a1a3dfabe015dc1
|
3 |
+
size 164744
|
3NFKT4oBgHgl3EQfQi0f/content/tmp_files/2301.11767v1.pdf.txt
ADDED
@@ -0,0 +1,1056 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
CAPoW: Context-Aware AI-Assisted Proof of Work
|
2 |
+
based DDoS Defense
|
3 |
+
Trisha Chakraborty∗, Shaswata Mitra†, Sudip Mittal‡
|
4 |
+
Department of Computer Science & Engineering, Mississippi State University
|
5 |
+
{tc2006∗, sm3843†}@msstate.edu, mittal‡@cse.msstate.edu
|
6 |
+
Abstract—Critical servers can be secured against distributed
|
7 |
+
denial of service (DDoS) attacks using proof of work (PoW)
|
8 |
+
systems assisted by an Artificial Intelligence (AI) that learns
|
9 |
+
contextual network request patterns. In this work, we introduce
|
10 |
+
CAPOW, a context-aware anti-DDoS framework that injects la-
|
11 |
+
tency adaptively during communication by utilizing context-aware
|
12 |
+
PoW puzzles. In CAPOW, a security professional can define
|
13 |
+
relevant request context attributes which can be learned by the AI
|
14 |
+
system. These contextual attributes can include information about
|
15 |
+
the user request, such as IP address, time, flow-level information,
|
16 |
+
etc., and are utilized to generate a contextual score for incoming
|
17 |
+
requests that influence the hardness of a PoW puzzle. These
|
18 |
+
puzzles need to be solved by a user before the server begins
|
19 |
+
to process their request. Solving puzzles slow down the volume
|
20 |
+
of incoming adversarial requests. Additionally, the framework
|
21 |
+
compels the adversary to incur a cost per request, hence making
|
22 |
+
it expensive for an adversary to prolong a DDoS attack. We
|
23 |
+
include the theoretical foundations of the CAPOW framework
|
24 |
+
along with a description of its implementation and evaluation.
|
25 |
+
I. INTRODUCTION
|
26 |
+
An organization protects its critical servers from distributed
|
27 |
+
denial of service (DDoS), which may contain valuable infor-
|
28 |
+
mation, such as intellectual property, trade secrets, employee
|
29 |
+
personally identifiable information (PII), etc. To launch a
|
30 |
+
DDoS attack, the malicious users send a flood of requests to
|
31 |
+
these servers. As a result, requests from legitimate users either
|
32 |
+
experience delays or their requests are dropped. For more than
|
33 |
+
two decades, DDoS attacks have been a prominent issue and
|
34 |
+
even today it is far from being solved as these attacks are
|
35 |
+
cheaper to launch than to defend, especially with the rise of
|
36 |
+
DoS-as-a-Service [25].
|
37 |
+
PoW system works by requiring incoming requests to ex-
|
38 |
+
pend resources solving an computational puzzles to prove ones
|
39 |
+
legitimacy. The general system consists of two parts: prover
|
40 |
+
and verifier. The prover finds the solution to the computational
|
41 |
+
puzzles, when solved, sends the solution to the verifier. In
|
42 |
+
a simple networked client-server environment, the user-side
|
43 |
+
contains the prover component, and the server-side contains
|
44 |
+
the verifier components. Researchers have proposed PoW-
|
45 |
+
based solutions for DDoS which makes the attack expensive to
|
46 |
+
launch [4], [21], [34]. Although, these solutions suffer from a
|
47 |
+
lack of intuition on how to set puzzle difficulty and adaptability
|
48 |
+
in different settings.
|
49 |
+
In this paper, we develop a defensive tool that emphasizes
|
50 |
+
on learning the normal activity patterns of legitimate users.
|
51 |
+
The idea behind the tool is to penalize the users that deviates
|
52 |
+
from normal activity patterns by issuing them hard puzzles
|
53 |
+
and at the same time issuing easy puzzles to users who
|
54 |
+
follow the pattern. We leverage a context-aware AI model
|
55 |
+
that can learn these normal activity patterns by contextual
|
56 |
+
information. The term context within the scope of legitimate
|
57 |
+
activity patterns can be defined as request attributes, such
|
58 |
+
as, IP address, time, flow-level information, etc. When the
|
59 |
+
context is IP address, network activity is considered deviated
|
60 |
+
if the source IP address is part of a known blocked IP
|
61 |
+
list. Whereas, when the context is time, network activity is
|
62 |
+
considered deviated if it arrives at an unusual time compared
|
63 |
+
to the normal activity pattern. Security professionals can select
|
64 |
+
relevant request context attributes which can be learned by the
|
65 |
+
AI models. The concept of context-aware AI models is derived
|
66 |
+
from context-aware computing introduced by Dey et. al [9].
|
67 |
+
We introduce CAPOW tool, a context-aware AI-assisted
|
68 |
+
PoW system that helps to secure critical servers against DDoS
|
69 |
+
attacks. Our framework utilizes context-aware AI models that
|
70 |
+
learn the expected context pattern from server-side activity-
|
71 |
+
logs. The activity-logs are stored and managed by the server
|
72 |
+
which contains user activity (IP address, timestamp, flow-
|
73 |
+
level data, etc). The deviation from the learned pattern is then
|
74 |
+
leveraged to generate a contextual score for incoming requests
|
75 |
+
which tunes the difficulty level of the PoW puzzle to be solved.
|
76 |
+
The underlying defensive strategy curtails the ability of a
|
77 |
+
malicious user to prolong the attack by adaptively introducing
|
78 |
+
latency through PoW puzzles and compelling malicious users
|
79 |
+
to expend more resources to complete an attack. The main
|
80 |
+
contributions of this paper are as follows.
|
81 |
+
Contribution 1: We introduce CAPOW, an anti-DDoS frame-
|
82 |
+
work that injects latency adaptively, i.e., the framework en-
|
83 |
+
sures that malicious users incur higher latency than legitimate
|
84 |
+
users based on the deviation in context pattern. We discuss
|
85 |
+
the process of context score calculation from deviation in
|
86 |
+
Section III-B.
|
87 |
+
Contribution 2: We propose a policy component that is
|
88 |
+
created by security personnel to incorporate server-specific
|
89 |
+
security demands. We provide intuition for policy construction
|
90 |
+
in Section III-C.
|
91 |
+
Contribution 3: We discuss an instance of CAPOW imple-
|
92 |
+
mentation and perform evaluation to illustrate the effective-
|
93 |
+
ness of CAPOW. The implementation details are discussed
|
94 |
+
Section IV. The code is released on GitHuB [3].
|
95 |
+
The rest of the paper is structured as follows. In Section II
|
96 |
+
we discuss the threat model and attack definitions. We discuss
|
97 |
+
the theoretical foundation of CAPOW in Section III and
|
98 |
+
arXiv:2301.11767v1 [cs.CR] 27 Jan 2023
|
99 |
+
|
100 |
+
CAPOW implementation in Section IV. We discuss related
|
101 |
+
works of the PoW system and DoS defense in Section V,
|
102 |
+
followed by the conclusion in Section VI.
|
103 |
+
II. THREAT MODEL
|
104 |
+
In this section, we present a series of assumptions associated
|
105 |
+
with the adversary’s abilities. An adversary A initiates a DDoS
|
106 |
+
attack by sending a flood of requests to the server. The ad-
|
107 |
+
versary’s intention is to overwhelm the server’s computational
|
108 |
+
resources and disrupt legitimate user communication with the
|
109 |
+
server. Although the attack described is a variant of DDoS,
|
110 |
+
the usefulness of CAPOW can be extended to other variants.
|
111 |
+
These assumptions described below are similar to previous
|
112 |
+
literature on DDoS defense using proof of work [17] and in
|
113 |
+
some sense, we consider a stronger adversary.
|
114 |
+
Assumption 1. Adversary A can eavesdrop on the communi-
|
115 |
+
cation channel of the server. A cannot modify any user request
|
116 |
+
and cannot read any request payload data.
|
117 |
+
Assume a secure network communication channel is used
|
118 |
+
by the user to send request packets to the server. The user
|
119 |
+
performs encryption on the payload data, including the puzzle
|
120 |
+
solution, and sends the packet to the server. When an adversary
|
121 |
+
eavesdrops on the channel, they can read the source and
|
122 |
+
destination IP of the packet, but they cannot read the encrypted
|
123 |
+
payload consisting of the puzzle parameters. Additionally, the
|
124 |
+
adversary cannot flip bits of the packet and pollute the puzzle
|
125 |
+
solution included in the payload. Hence, we assume that the
|
126 |
+
adversary has no knowledge of the puzzle parameters solved
|
127 |
+
by a user nor can it deny service to a user who has correctly
|
128 |
+
solved the puzzle. In Section IV, we utilize assumption 1 to
|
129 |
+
claim that the adversary cannot reverse engineer the base AI
|
130 |
+
models to receive easier PoW puzzles.
|
131 |
+
Assumption 2 Adversary A can spoof user identifiers, such as
|
132 |
+
IP addresses, and deceive a subset of underlying AI models.
|
133 |
+
CAPOW uses AI models to learn legitimate network ac-
|
134 |
+
tivity patterns and the deviation from the pattern is directly
|
135 |
+
proportional to the difficulty of PoW puzzles to be solved by
|
136 |
+
the user. A can spoof a legitimate user IP address and send
|
137 |
+
requests to the server. An intelligent adversary would send
|
138 |
+
probe packets to the server using a set of spoofed IP addresses
|
139 |
+
and only utilize IPs that require puzzles to be solved. This way,
|
140 |
+
the adversary is able to deceive the AI model and reduce the
|
141 |
+
latency introduced. In Section IV, we discuss that sending
|
142 |
+
probe packets becomes costly for an adversary to deceive
|
143 |
+
multiple base AI models.
|
144 |
+
Assumption 3 Adversary A cannot pollute the training data
|
145 |
+
of the AI models.
|
146 |
+
The AI model used by CAPOW learns normal activity
|
147 |
+
patterns and calculates a deviation which directly influences
|
148 |
+
the hardness of the puzzle. Hence, it is essential that the AI
|
149 |
+
learns normal activity patterns from an unpolluted activity-log
|
150 |
+
to maximize the effectiveness of CAPOW. In Section IV-B,
|
151 |
+
we describe the training process of a context-aware AI model
|
152 |
+
where a security professional is deployed to select secure data
|
153 |
+
to train the base AI models.
|
154 |
+
III. CAPOW ARCHITECTURAL DESIGN AND
|
155 |
+
THEORETICAL FOUNDATIONS
|
156 |
+
In this section, we describe the high-level architecture of
|
157 |
+
the core components and their inner workings that molds the
|
158 |
+
CAPOW framework. As shown in Figure 1, CAPOW consists
|
159 |
+
of four core components: request context extractor, context-
|
160 |
+
aware AI models, policy, and proof-of-work.
|
161 |
+
The AI models learn the normal activity pattern from
|
162 |
+
previous activity-logs. When an incoming request packet is
|
163 |
+
seen, first the context attributes are extracted from the new
|
164 |
+
request packet (see Section III-A). Then, the deviation between
|
165 |
+
the learned normal context pattern and new request contexts is
|
166 |
+
computed to calculate context score. We elaborate on AI model
|
167 |
+
training and score calculation in Section III-B. The policy
|
168 |
+
component of CAPOW provides security professionals with
|
169 |
+
certain abilities that strengthen the effectiveness of CAPOW
|
170 |
+
in various security settings (see Section III-C). The context
|
171 |
+
score influences the difficulty of PoW puzzle. In Section III-D,
|
172 |
+
we discuss the proof-of-work component and how the PoW
|
173 |
+
puzzles can curtails the ability of a malicious user to prolong
|
174 |
+
the attack by adaptively introducing latency.
|
175 |
+
Data Flow. From Figure 1, the flow of data between different
|
176 |
+
components of CAPOW is described below. (1) When a new
|
177 |
+
incoming packet is seen, the request packet is forwarded to
|
178 |
+
the request context extractor. (2) The extracted request context
|
179 |
+
attributes are passed to context-aware AI models which learned
|
180 |
+
expected context patterns from activity logs. The context
|
181 |
+
score generated by individual AI models is combined using
|
182 |
+
a function f to produce the final context score (Φ). (3) The
|
183 |
+
context score is forwarded to the policy component which sets
|
184 |
+
certain parameters, such as, it maps the context score to a
|
185 |
+
puzzle difficulty level. (4) The difficulty level is passed to the
|
186 |
+
puzzle solver which solves a puzzle of the defined difficulty
|
187 |
+
level using a function func. (5) The computed solution is sent
|
188 |
+
to the verifier. (6) When the solution is correct, the request
|
189 |
+
packet is placed on the server queue for processing.
|
190 |
+
A. Context Extraction from Request Packet
|
191 |
+
The concept of context-aware computing was introduced
|
192 |
+
by Dey et. al [9], where the proposed mechanism improved
|
193 |
+
human-to-computer interaction by delivering contextually rel-
|
194 |
+
evant data. In the paper, the author proposed an abstract defini-
|
195 |
+
tion of context, which is a piece of information that clarifies the
|
196 |
+
characteristics of an entity. When a system contains contextual
|
197 |
+
data about a situation or entity, the system can take context-
|
198 |
+
aware decisions which improve the overall quality of any
|
199 |
+
general decision-making.
|
200 |
+
In a security setting, a certain request is deemed suspicious
|
201 |
+
if the associated request attributes deviate from the usual
|
202 |
+
network activity pattern. For instance, a request packet of
|
203 |
+
payload size 65500 bytes is considered suspicious due to
|
204 |
+
deviation when the expected normal payload size pattern
|
205 |
+
is in the order of a few hundred bytes. To this end, we
|
206 |
+
2
|
207 |
+
|
208 |
+
Src IP
|
209 |
+
Dst IP
|
210 |
+
Payload
|
211 |
+
Context-Aware AI Model
|
212 |
+
f
|
213 |
+
Incoming Packet
|
214 |
+
Activity
|
215 |
+
Logs
|
216 |
+
Context Score
|
217 |
+
Range
|
218 |
+
Difficulty
|
219 |
+
Range
|
220 |
+
Policy File(s)
|
221 |
+
Solution = func (puzzle parameter)
|
222 |
+
Security
|
223 |
+
Professional
|
224 |
+
Policy
|
225 |
+
d-constrained
|
226 |
+
solution found?
|
227 |
+
func (solution parameter)
|
228 |
+
Proof-of-work
|
229 |
+
Server Queue
|
230 |
+
Packet n
|
231 |
+
Packet n-1
|
232 |
+
Packet n-2
|
233 |
+
Context C1
|
234 |
+
Model
|
235 |
+
Context Score (Φ)
|
236 |
+
W1
|
237 |
+
W2
|
238 |
+
Wn
|
239 |
+
d1
|
240 |
+
d2
|
241 |
+
d3
|
242 |
+
d4
|
243 |
+
…
|
244 |
+
Φ1
|
245 |
+
Φ2
|
246 |
+
Φ3
|
247 |
+
Φ4
|
248 |
+
…
|
249 |
+
Calculated
|
250 |
+
context
|
251 |
+
score
|
252 |
+
forwarded
|
253 |
+
to policy
|
254 |
+
module
|
255 |
+
Puzzle Verifier
|
256 |
+
Puzzle Solver
|
257 |
+
Mapped
|
258 |
+
puzzle
|
259 |
+
difficulty
|
260 |
+
level
|
261 |
+
forwarded
|
262 |
+
to puzzle
|
263 |
+
solver
|
264 |
+
Packets with correct puzzle
|
265 |
+
solution placed in server
|
266 |
+
queue to process.
|
267 |
+
Send solution
|
268 |
+
1
|
269 |
+
2
|
270 |
+
3
|
271 |
+
4
|
272 |
+
5
|
273 |
+
Request Context Extraction
|
274 |
+
C1
|
275 |
+
C2
|
276 |
+
Context C2
|
277 |
+
Model
|
278 |
+
Context Ck
|
279 |
+
Model
|
280 |
+
Puzzle Parameters
|
281 |
+
Model Parameters
|
282 |
+
…
|
283 |
+
Ck
|
284 |
+
6
|
285 |
+
Fig. 1. The figure illustrates the architecture of CAPOW framework. CAPOW consists of four core components: request context extractor, context-aware AI model, policy, and
|
286 |
+
proof of work. The AI model learns context patterns from previous activity-logs selected by security personnel and calculates a context score based on the deviation of the incoming
|
287 |
+
packet. The calculated score is mapped to the PoW puzzle difficulty level as defined by the security professional in policy files. The proof of work component performs evaluations
|
288 |
+
to find the constrained solution. The request with a correct solution is placed on the server queue to process.
|
289 |
+
define context of a request packet as request attributes, such
|
290 |
+
as source IP address, time of arrival, port address, time
|
291 |
+
to live (TTL), and other flow-level attributes. The contexts
|
292 |
+
attributes to be extracted are selected by security personnel
|
293 |
+
via policy component. The list of selected context attributes
|
294 |
+
are reformed periodically to update the defensive posture of
|
295 |
+
the organization deployed. When a new request packet is seen,
|
296 |
+
the request context extractor component extracts the selected
|
297 |
+
context attributes from the request packet and feeds it to the
|
298 |
+
context-aware AI models.
|
299 |
+
B. Context-Aware AI Model
|
300 |
+
The framework component consumes activity-logs supplied
|
301 |
+
by security personnel as input to generate a context-aware AI
|
302 |
+
model. The model is generated by considering a set of request
|
303 |
+
packets from the activity-log λ = {λ0, λ1, λ2, ..., λi}. Each
|
304 |
+
request packet λi consists of a set of request context attributes,
|
305 |
+
Cλi = {C0λi, C1λi, C2λi, ..., Ckλi}
|
306 |
+
(1)
|
307 |
+
where k is the number of request context attributes. Ck is
|
308 |
+
represented as n-dimensional vector. When an n-dimensional
|
309 |
+
vector of a single context for λ requests is projected in
|
310 |
+
Euclidean space, such relative positioning produces a cluster.
|
311 |
+
For k context attributes, k clusters are generated. The clusters
|
312 |
+
represent the normal activity pattern. To evaluate a new incom-
|
313 |
+
ing request, request context extractor from Section III-A, feeds
|
314 |
+
the context attributes which are then projected in Euclidean
|
315 |
+
space. The deviation ∆(p, q) of context Ck is calculated as the
|
316 |
+
Euclidean distance between the corresponding normal activity
|
317 |
+
cluster and the new request projection,
|
318 |
+
∆(p, q) =
|
319 |
+
�
|
320 |
+
�
|
321 |
+
�
|
322 |
+
�
|
323 |
+
n
|
324 |
+
�
|
325 |
+
j=1
|
326 |
+
(qj − pj)2
|
327 |
+
(2)
|
328 |
+
where p is projected single context attribute of the new request
|
329 |
+
and q is center of a normal cluster of the same context.
|
330 |
+
Consequently, the context score Φ for Ck is calculated as,
|
331 |
+
Φ(Ck) =
|
332 |
+
�∆(p, q)
|
333 |
+
∆max
|
334 |
+
�
|
335 |
+
× I
|
336 |
+
(3)
|
337 |
+
where ∆max is the maximum possible deviation for Ck. The
|
338 |
+
score is in the range of [0, I], where I ∈ Z+. In Section IV-B,
|
339 |
+
we discuss the implementation of context-aware AI models.
|
340 |
+
C. Policy
|
341 |
+
The policy component is a rule-based strategy that facilitates
|
342 |
+
the adaptive security guarantees of CAPOW. The rules are set
|
343 |
+
in policy files that determine certain CAPOW characteristics.
|
344 |
+
These characteristics include context-aware AI model specifi-
|
345 |
+
cations, such as, which activity-logs are supplied to train the
|
346 |
+
AI models, which context attributes hold more significance
|
347 |
+
over the others, etc. Additionally, these parameters include
|
348 |
+
proof-of-work components specifications, such as, what is
|
349 |
+
the rule to translate context score to puzzle difficulty, which
|
350 |
+
variant of PoW puzzle to be used, etc. Hence, it is evident
|
351 |
+
that policy construction is a non-trivial task and requires
|
352 |
+
consideration of various facets of the deployed server to bolster
|
353 |
+
the effectiveness of CAPOW in different security settings.
|
354 |
+
To perform the convoluted task of policy designing, security
|
355 |
+
professionals are deployed to design server-specific policies.
|
356 |
+
Intuition for AI model parameters. From Section III-A,
|
357 |
+
a request packet consists of several context attributes. The
|
358 |
+
significance of some contexts holds more importance over
|
359 |
+
others depending on the type of attack defense. For instance,
|
360 |
+
payload size is an important context attribute to protect against
|
361 |
+
large payload DDoS attacks [37], but less important to de-
|
362 |
+
fend volumetric DDoS attacks. Policy includes the weight
|
363 |
+
associated with context attributes to provide an attack-specific
|
364 |
+
defense. Additionally, a policy includes the source of data
|
365 |
+
3
|
366 |
+
|
367 |
+
to train the AI models to avoid model data pollution attacks
|
368 |
+
(Assumption 3).
|
369 |
+
Intuition for proof-of-work parameters. The context score
|
370 |
+
produced by the context-aware AI model is translated to
|
371 |
+
the PoW difficulty level. The policy includes the rules to
|
372 |
+
translate context scores to puzzle difficulty. In Section IV-C,
|
373 |
+
we implemented three rules to show that the translation leads
|
374 |
+
to adaptive latency injected. As stated by Green et. al [13],
|
375 |
+
amongst groups of users, the CPU capacity of each device can
|
376 |
+
vary 10x times, whereas memory capacity may only vary 4x
|
377 |
+
times. Hence, when a memory-bound PoW puzzle is used, it is
|
378 |
+
less likely for the adversary to have an edge over a legitimate
|
379 |
+
user as the discrepancy in memory power as the resource is
|
380 |
+
less compared to CPU-bound puzzles. The policy includes the
|
381 |
+
means to set variants of puzzles depending on the expected
|
382 |
+
user base.
|
383 |
+
D. Proof of Work
|
384 |
+
Classical proof of work systems [4], [10], [34] consists
|
385 |
+
of two main components – prover and verifier. The prover
|
386 |
+
provides verifiable evidence of expanding computational re-
|
387 |
+
sources by solving puzzles as assigned by the server. On the
|
388 |
+
other hand, the verifier validates whether the solved puzzle
|
389 |
+
yielded the desired solution. When PoW systems are used as
|
390 |
+
DoS defense [4], [26], [35], a user commits some computation
|
391 |
+
resources (CPU cycle, bandwidth, etc.) and burns one of these
|
392 |
+
resources for solving the PoW puzzle to prove their legitimacy.
|
393 |
+
In CAPOW, when a user deviates from a normal activity
|
394 |
+
pattern, the PoW component issues a PoW puzzle to request
|
395 |
+
proof of legitimacy. The difficulty level of PoW puzzle is
|
396 |
+
a function of context score. The rule to translate to context
|
397 |
+
score to difficulty level is defined under policy component
|
398 |
+
(Section III-C). PoW solver uses a function func to solve the
|
399 |
+
assigned difficulty puzzle (see Figure 1). In general terms, this
|
400 |
+
function injects two types of cost: (1) direct cost of resource
|
401 |
+
burning [14], and (2) indirect cost of latency. The notion
|
402 |
+
of resource burning cost represents the resource consumption
|
403 |
+
of a user, where the resource could be computational power,
|
404 |
+
memory, network bandwidth, or human capital [14]. This cost
|
405 |
+
directly impacts the ability of the adversary to conduct a DDoS
|
406 |
+
attack as every request requires the adversary to spend real-
|
407 |
+
life resources. The notion of latency cost captures the delay
|
408 |
+
in time introduced in communication due to the act of puzzle
|
409 |
+
solving. This cost indirectly impacts the adversarial intent by
|
410 |
+
throttling the rate of adversarial requests reaching the server
|
411 |
+
queue. Both costs ultimately cripple the adversarial capability
|
412 |
+
to prolong an ongoing DDoS attack.
|
413 |
+
IV. CAPOW IMPLEMENTATION, TOOL INSTANCE
|
414 |
+
DEPLOYMENT, AND EVALUATION
|
415 |
+
In this section, we present a deployment of CAPOW frame-
|
416 |
+
work by implementing a single instance of each core compo-
|
417 |
+
nent: context extractor, context-aware AI models, policy, and
|
418 |
+
proof-of-work. First, the context extractor instance extracts se-
|
419 |
+
lected request context attributes. Second, the extracted contexts
|
420 |
+
are relayed to context-aware AI model instances where each
|
421 |
+
base AI model is generated using server-side activity-logs.
|
422 |
+
Then, the trained AI models calculate the deviation of selected
|
423 |
+
contexts to produce a context score. Third, we provide three
|
424 |
+
policy designs that maps context score to difficulty of PoW
|
425 |
+
puzzle. Finally, we implemented a hash-based PoW puzzle
|
426 |
+
instance which, over repeated trials, finds the constrained
|
427 |
+
solution of assigned difficulty level. The costs inflicted due
|
428 |
+
to the our puzzle instance are CPU-cycles (resource burning)
|
429 |
+
and time spent (latency). For the purposes of validating our
|
430 |
+
contribution via evaluation, we consider that the main cost
|
431 |
+
injected is latency which, when injected, throttles the rate of
|
432 |
+
adversarial requests.
|
433 |
+
Now, we will describe our evaluation setup. We split the
|
434 |
+
CIC-IDS2017 dataset [24] into test and train files where day
|
435 |
+
1 to day 5 (Monday - Thursday) is used to train the models
|
436 |
+
and day 6 (Friday) is used to evaluate CAPOW. From day
|
437 |
+
1 to day 5, we deleted the attack traffic to learn normal
|
438 |
+
activity pattern. Consider five users sending requests to the
|
439 |
+
server U1, U2, U3, U4, and U5. We fixed four user identifiers
|
440 |
+
from day 5 to map the four above-mentioned users. Let the
|
441 |
+
fifth user U5, be mapped to the user identifier that performs
|
442 |
+
DoS on day 6. Since, the user identifier in CIC-IDS2017
|
443 |
+
is IP address, let the mapped IP of user U1, U2, U3, U4, and
|
444 |
+
U5 is represented by 104.20.30.120, 83.66.160.22,
|
445 |
+
37.59.195.0, 104.16.84.55, and 205.174.165.73
|
446 |
+
respectively. Through our evaluation scenario, we provided
|
447 |
+
evidence that CAPOW injects latency adaptively based on
|
448 |
+
the calculated context score of user U5 which throttles the
|
449 |
+
adversarial requests and make it expensive for an adversary to
|
450 |
+
prolong a DDoS attack.
|
451 |
+
A. Context Extraction Instance
|
452 |
+
The context extraction instance consumes the request packet
|
453 |
+
and extracts context attributes from the request packet. For
|
454 |
+
our implementation, we select three context attributes: (1) IP
|
455 |
+
address, (2) temporal activity, and (3) flow-level data. For
|
456 |
+
evaluation, we used feature attributes of CIC-IDS2017 dataset
|
457 |
+
to serve as context attributes. The source IP feature becomes
|
458 |
+
the IP address context, the timestamp feature becomes the
|
459 |
+
temporal activity context, and the remaining features become
|
460 |
+
flow-level context.
|
461 |
+
B. Context-Aware AI Model Instance
|
462 |
+
We propose an ensemble learner that consists of dedicated
|
463 |
+
base AI models to learn individual contextual patterns. The
|
464 |
+
base AI model receives the context attributes from the context
|
465 |
+
extractor as inputs. The model that (1) learns the IP address
|
466 |
+
pattern is called dynamic attribute-based reputation (DAbR),
|
467 |
+
(2) learns the temporal activity pattern is called temporal ac-
|
468 |
+
tivity model (TAM), and (3) learns the flow-level data pattern
|
469 |
+
is called flow-level model (FLOW). Each model computes a
|
470 |
+
context score in the range between [0, 10]. Context scores
|
471 |
+
from three AI models are combined using the argmax function.
|
472 |
+
Next, we discuss three base models where the subsections are
|
473 |
+
divided into model generation, context score calculation, and
|
474 |
+
evaluation.
|
475 |
+
4
|
476 |
+
|
477 |
+
User
|
478 |
+
Temporal Activity
|
479 |
+
User 1
|
480 |
+
[[500, 501, …,600], [800, 801,
|
481 |
+
…,900]]
|
482 |
+
User 2
|
483 |
+
[[770, 771, …,800], [850, 851,
|
484 |
+
…,860], …]
|
485 |
+
User 3
|
486 |
+
[[100, 101, …,110], [300, 301, …,
|
487 |
+
315]]
|
488 |
+
User 4
|
489 |
+
[[550, 551, …,560]]
|
490 |
+
User
|
491 |
+
Temporal Activity
|
492 |
+
User 1
|
493 |
+
[[100, 102, …,220], [500,501,…,510]]
|
494 |
+
User 2
|
495 |
+
[[200, 201,…, 230],]
|
496 |
+
User 3
|
497 |
+
[[190, 191, …, 200], [630, …690]]
|
498 |
+
User 4
|
499 |
+
[[100, 101, …,250], [260, 261, … 410]]
|
500 |
+
User 1
|
501 |
+
Time (seconds)
|
502 |
+
100
|
503 |
+
200
|
504 |
+
400
|
505 |
+
300
|
506 |
+
500
|
507 |
+
600
|
508 |
+
700
|
509 |
+
User 2
|
510 |
+
User 3
|
511 |
+
User 4
|
512 |
+
User
|
513 |
+
Temporal Activity
|
514 |
+
User 1
|
515 |
+
[[650, 651, …, 700], [760, 761, …, 800]]
|
516 |
+
User 2
|
517 |
+
[[175, 176, …,190], [790, 791, …,800]]
|
518 |
+
User 3
|
519 |
+
[[530, 531, …,602], [740, 741, …, 750]]
|
520 |
+
User 4
|
521 |
+
[[350, 351, …,440], [690, 691, …, 701]]
|
522 |
+
User
|
523 |
+
Temporal Activity
|
524 |
+
User 1
|
525 |
+
[[300, 301, …,405], [500,501,…,510]]
|
526 |
+
User 2
|
527 |
+
[[505, 540], [640, 641, …680]]
|
528 |
+
User 3
|
529 |
+
[[190,…200], [410, 530]]
|
530 |
+
User 4
|
531 |
+
[[100, 101, …, 250], [260, 261, …,
|
532 |
+
410], [500, 501, …, 515]]
|
533 |
+
Activity log on t-3 day
|
534 |
+
Activity log t-1 day
|
535 |
+
Activity log t day
|
536 |
+
Activity log on t-2 day
|
537 |
+
Aged Activity Logs
|
538 |
+
User Activity Cluster
|
539 |
+
Current Activity Logs
|
540 |
+
Fig. 2. The figure shows that selected activity-logs (left) are used to generate a temporal activity model (TAM) (right). The illustration shows that out of four activity logs, currently
|
541 |
+
only two activity logs are used to form the model (blue box). The remaining activity-logs are aged in an attempt to keep the model up-to-date.
|
542 |
+
Dynamic Attribute-based Reputation (DAbR): We utilize
|
543 |
+
DAbR [29] as the base AI model that learns context patterns
|
544 |
+
for IP attributes. The AI model is generated by projecting
|
545 |
+
malicious IP attributes from Cisco Talos dataset [31] into
|
546 |
+
Euclidean space. The dataset contains a list of malicious
|
547 |
+
IP addresses and IP-related attributes [29]. The red dots in
|
548 |
+
Figure 3(A) represent the projected malicious IP attributes that
|
549 |
+
form a cluster in Euclidean space. When a new request is
|
550 |
+
evaluated, the IP attributes of the new request are projected
|
551 |
+
in Euclidean space and a deviation is calculated as Euclidean
|
552 |
+
distance to the malicious cluster center. The distance calculated
|
553 |
+
produces the context score for DAbR (α). The multi-colored
|
554 |
+
stars represent U1, U2, U3, U4, and U5. User U1, U2, U3, U4, and
|
555 |
+
U5 receives 2.87, 1.16, 3.15, 2.18, and 2.98 reputation score
|
556 |
+
respectively.
|
557 |
+
Temporal Activity Model (TAM): We propose a temporal
|
558 |
+
activity model (TAM) that learns the pattern of user request
|
559 |
+
activity based on time of arrival from activity-logs. The model
|
560 |
+
is generated using previous t-days server activity-logs. The
|
561 |
+
selected activity-logs can be either previous t consecutive days,
|
562 |
+
or t specific days (as defined in the policy). The temporal
|
563 |
+
model can be updated by aging the older activity models
|
564 |
+
(see Figure 2). The red rectangular blocks in Figure 3(B)
|
565 |
+
represent an activity cluster per user. The term active in
|
566 |
+
practice can represent a user session or concurrent requests.
|
567 |
+
When a user request U arrives at the server, the server finds
|
568 |
+
the corresponding user activity cluster (UCLS) formed by the
|
569 |
+
temporal activity model. The user activity cluster (UCLS) is a
|
570 |
+
list of time intervals that represents the user’s historical activity
|
571 |
+
times. The deviation in time is calculated as the distance
|
572 |
+
between the two nearest clusters. From CIC-IDS2017 dataset,
|
573 |
+
the cluster formed for user U1 shows that the user was active
|
574 |
+
between 130 − 140 minutes, 160 − 170 minutes, 600 − 670
|
575 |
+
minutes, and 720−760 minutes. When user U1 arrived at time
|
576 |
+
700 minutes on day 6, the two nearest clusters are 600 − 670
|
577 |
+
and 720−760 (see Figure 3(B)). This deviation is called ∆local
|
578 |
+
which is the distance between the two nearest clusters. Finally,
|
579 |
+
the context score for TAM is calculated as,
|
580 |
+
β = ∆local
|
581 |
+
∆max
|
582 |
+
× 10
|
583 |
+
(4)
|
584 |
+
where, ∆max represents the maximum deviation possible
|
585 |
+
which in our implementation is 720 minutes. Note that no
|
586 |
+
cluster is found for U5, hence the context score calculates is
|
587 |
+
the highest in range.
|
588 |
+
Flow-level Model (FLOW): Flow-level Model (FLOW) learns
|
589 |
+
network flow context patterns from activity-logs. The network
|
590 |
+
flow attributes of a request packet are flow-related data, such as
|
591 |
+
TTL, flow duration, payload size, protocol, etc. To generate the
|
592 |
+
model, the n-dimensional flow attribute vectors are projected
|
593 |
+
in Euclidean space. In Figure 3(C), the green dots represent
|
594 |
+
projected network flow attributes of legitimate requests, and
|
595 |
+
the red dots represent projected network flow attributes of
|
596 |
+
malicious requests. When a new request is seen, its flow-
|
597 |
+
level attributes are projected and the Euclidean distance to
|
598 |
+
malicious and legitimate clusters are computed. The context
|
599 |
+
score is calculated as,
|
600 |
+
γ = ∆l,m
|
601 |
+
∆max
|
602 |
+
× 10
|
603 |
+
(5)
|
604 |
+
where, ∆l,m is the deviation from malicious and legitimate
|
605 |
+
clusters and ∆max is the maximum deviation possible in flow-
|
606 |
+
level context.
|
607 |
+
C. Policy Component Instance
|
608 |
+
We constructed three policy instances, policy 1, policy 2,
|
609 |
+
and policy 3. These policies only set the mapping function
|
610 |
+
between context scores to the PoW puzzle difficulty level.
|
611 |
+
Context score is directly proportional to the difficulty of the
|
612 |
+
PoW puzzle, such as the increase in contextual deviation leads
|
613 |
+
to a higher difficulty puzzle and more latency injected.
|
614 |
+
Policies 1 and 2: Linear mapping. Assume a linear map
|
615 |
+
function. Policy 1 maps f(Φ) → d, where Φ ∈ [0, 10] is the
|
616 |
+
range of context score and d ∈ [0, 10] is the difficulty levels of
|
617 |
+
the PoW puzzle. Similar to policy 1, policy 2 maps f(Φ) → d,
|
618 |
+
where Φ ∈ [0, 10] and d ∈ [10, 20]. Note that, the error bar
|
619 |
+
in Figure 4 shows the discrepancy in time to solve d-level
|
620 |
+
PoW puzzle. As discussed in Section III-C, this discrepancy
|
621 |
+
in time to solve can be avoided by using memory-bound PoW
|
622 |
+
puzzles.
|
623 |
+
Policy 3: Error range mapping For policy 3, we incorporated
|
624 |
+
the error ϵ of the context-aware AI model. Assume a linear
|
625 |
+
map function. Policy 3 maps f(Φ) → d, where Φ ∈ [0, 10] and
|
626 |
+
d ∈ [0, 10]. The final difficulty level assigned is a difficulty
|
627 |
+
value chosen at random in the interval [⌈di − ϵ⌉, ⌈di + ϵ⌉],
|
628 |
+
where ϵ = 0.2. Figure 4 shows that as contextual deviation
|
629 |
+
increases, the amount of injected latency increases.
|
630 |
+
5
|
631 |
+
|
632 |
+
0.2
|
633 |
+
0.4
|
634 |
+
0.6
|
635 |
+
0.8
|
636 |
+
1.0
|
637 |
+
Malicious cluster centre
|
638 |
+
User 1
|
639 |
+
User 2
|
640 |
+
User 3
|
641 |
+
User 4
|
642 |
+
User 5
|
643 |
+
Malicious IP
|
644 |
+
0.2
|
645 |
+
0.4
|
646 |
+
0.6
|
647 |
+
0.8
|
648 |
+
1.0
|
649 |
+
0
|
650 |
+
2
|
651 |
+
4
|
652 |
+
6
|
653 |
+
8
|
654 |
+
10
|
655 |
+
Time (minutes)
|
656 |
+
Context Score
|
657 |
+
100
|
658 |
+
200
|
659 |
+
400
|
660 |
+
300
|
661 |
+
500
|
662 |
+
600
|
663 |
+
700
|
664 |
+
800
|
665 |
+
0.2
|
666 |
+
0.4
|
667 |
+
0.6
|
668 |
+
0.8
|
669 |
+
0
|
670 |
+
0.2
|
671 |
+
0.4
|
672 |
+
0.6
|
673 |
+
0.8
|
674 |
+
1.0
|
675 |
+
1.0
|
676 |
+
Iu87
|
677 |
+
Malicious
|
678 |
+
User 1
|
679 |
+
User 2
|
680 |
+
User 3
|
681 |
+
User 4
|
682 |
+
User 5
|
683 |
+
Benign
|
684 |
+
User 1
|
685 |
+
Context Score
|
686 |
+
User 4
|
687 |
+
User 3
|
688 |
+
User 2
|
689 |
+
User 5
|
690 |
+
Model B
|
691 |
+
Model C
|
692 |
+
Model A
|
693 |
+
2
|
694 |
+
4
|
695 |
+
6
|
696 |
+
10
|
697 |
+
8
|
698 |
+
(A)
|
699 |
+
(B)
|
700 |
+
(C)
|
701 |
+
(D)
|
702 |
+
Fig. 3. The figure contains four sub-figures. (A) Representation of trained DAbR in the 2-D plot. The red dot cluster represents malicious IP attributes. (B) Representation of
|
703 |
+
trained TAM. The stars represent the current time of arrival. (C) Representation of FLOW. The green cluster represents legitimate flow-level attributes and the red cluster represents
|
704 |
+
malicious ones. (D) Represents the calculated context score after combining scores from Model A is DAbR, Model B is TAM, and Model C is FLOW.
|
705 |
+
0
|
706 |
+
1
|
707 |
+
2
|
708 |
+
3
|
709 |
+
4
|
710 |
+
5
|
711 |
+
6
|
712 |
+
7
|
713 |
+
8
|
714 |
+
9
|
715 |
+
10
|
716 |
+
Context Score (
|
717 |
+
)
|
718 |
+
0
|
719 |
+
200
|
720 |
+
400
|
721 |
+
600
|
722 |
+
800
|
723 |
+
Latency (millisecond)
|
724 |
+
Policy 1
|
725 |
+
Policy 2
|
726 |
+
Policy 3
|
727 |
+
Fig. 4. An evaluation of our three implemented policies. The median of 30 trials is
|
728 |
+
reported for each reputation score.
|
729 |
+
D. PoW Instance – Hash Function
|
730 |
+
We discuss two sub-components of CAPOW that mimic
|
731 |
+
proof-of-work system: puzzle solver, and puzzle verifier.
|
732 |
+
Puzzle Solver. The puzzle solver takes user identifiers as input,
|
733 |
+
such as the timestamp of the arrival of the request packet (t),
|
734 |
+
and the user IP address (u). Additionally, the solver takes
|
735 |
+
a server seed value (ρ) to protect against pre-computational
|
736 |
+
attacks. To this, a n-bit string is added, which the client
|
737 |
+
modifies upon each hash function evaluation. We call this
|
738 |
+
string nonce denoted by η.
|
739 |
+
The user evaluates this input until it finds an output string
|
740 |
+
Y where Y = H(u||t||ρ||η) with d leading zeroes, where d is
|
741 |
+
the difficulty level assigned to the request packet. The puzzle
|
742 |
+
solver is a user-end component that is installed either in the
|
743 |
+
browser [19] or kernel-level. After solving, the user sends the
|
744 |
+
nonce back to the server for verification.
|
745 |
+
Puzzle Verifier. Puzzle verification is a server-side compo-
|
746 |
+
nent that performs straightforward verification of the puz-
|
747 |
+
zle solution by performing one hash evaluation, i.e., Y ′ =
|
748 |
+
H(u||t||ρ||η). If the sent η value leads to desired number of
|
749 |
+
leading 0’s, then the solution is verified.
|
750 |
+
Summary of CAPOW implementation evaluation. The con-
|
751 |
+
text scores produced by DAbR, TAM, and FLOW models are
|
752 |
+
combined to produce the final context score (Φ). As discussed
|
753 |
+
in Section III-C, some contexts might be more relevant than
|
754 |
+
others to provide attack specific defense. We denote weight w
|
755 |
+
as the significance of each context in the final context score.
|
756 |
+
The weights for each AI model are fixed through the policy
|
757 |
+
instance as discussed in Section IV-C.
|
758 |
+
Φ = arg max(w1α, w2β, w3γ)
|
759 |
+
(6)
|
760 |
+
where w1, w2, and w3 represent weights associated with
|
761 |
+
DAbR, TAM, and FLOW respectively. Figure 3(D) illustrates
|
762 |
+
the combined context score where w1, w2, and w3 is set to 1.
|
763 |
+
User U1 and U2 show that the final context score is decided
|
764 |
+
by FLOW model. Similarly, U3, U4, and U5 the final score
|
765 |
+
is decided by TAM model. Using policy 2, user U5 incurs
|
766 |
+
≈ 300ms latency for a context score of 8, which is the highest
|
767 |
+
latency amongst other users introduced by CAPOW.
|
768 |
+
Notably, the evaluation performed using a simulated dataset
|
769 |
+
might not reflect the worst case efficiency of CAPOW as in
|
770 |
+
practice, user U5 might not be deviate in a temporal activity
|
771 |
+
context. In this section, we discuss that the cost of deceiving
|
772 |
+
multiple AI models is expensive for the adversary. In our
|
773 |
+
implementation, user U5 has to deceive three AI models to
|
774 |
+
receive an easy PoW puzzle by receiving lower context scores.
|
775 |
+
User U5 can receive a lower context score for DAbR by
|
776 |
+
trivially spoofing the IP address (Assumption 2). To deceive
|
777 |
+
TAM, the user can engineer the requests around the same time
|
778 |
+
as noticed during eavesdropping (Assumption 1). As reading
|
779 |
+
or tracking flow-level data embedded in request payload data
|
780 |
+
while eavesdropping is not possible (Assumption 1), the only
|
781 |
+
way to deceive FLOW is by sending multiple probe packets to
|
782 |
+
land on a low context score. This is an extensive approach as
|
783 |
+
a security personnel may select new contexts to improve the
|
784 |
+
defensive posture of the organization periodically. Therefore,
|
785 |
+
deceiving all AI models becomes expensive for the adversary.
|
786 |
+
To validate contribution 3, we designed and evaluated an
|
787 |
+
implementation instance on CAPOW and provided policy
|
788 |
+
designs to validate contribution 2. Finally, CAPOW ensures
|
789 |
+
that malicious users incur higher latency than legitimate users
|
790 |
+
based on the deviation in context pattern that prevents DDOS.
|
791 |
+
Hence, we validate contribution 1 (see Section I).
|
792 |
+
V. RELATED WORKS
|
793 |
+
In this section, we discuss the overview of proof-of-work
|
794 |
+
(PoW) literature in DDoS. Relevant to our work, we will also
|
795 |
+
discuss the current advances in AI-assisted cybersecurity.
|
796 |
+
6
|
797 |
+
|
798 |
+
A. Classical Proof-of-Work
|
799 |
+
Dwork et. al [10] coined the term proof-of-work (PoW)
|
800 |
+
when they proposed the use of cryptographic hash functions
|
801 |
+
(also known as client puzzles) to combat unsolicited bulk
|
802 |
+
emails (junk emails). Following that, Franklin et. al [11]
|
803 |
+
proposed a lightweight website metering scheme in 1997 to
|
804 |
+
prevent fraudulent web server owners from inflating their
|
805 |
+
website’s popularity. In 1999, Jakobsson et. al [16] proposed
|
806 |
+
MicroMinting (originally proposed by Rivest et. al [30] as a
|
807 |
+
digital payment scheme) as a candidate problem that can reuse
|
808 |
+
the computational effort of solving the POW puzzle. Later that
|
809 |
+
year, Laurie et. al [18] proposed that proof of work does not
|
810 |
+
work in a spam setting.
|
811 |
+
B. Proof-of-Work as DoS defense
|
812 |
+
Similar to spam emails, in DDoS, it is significantly cheaper
|
813 |
+
for the attacking party to launch a DDoS attack than to defend
|
814 |
+
an infrastructure with the defending party. According to Arbor
|
815 |
+
network, launching a DoS attack costs an average of $66 per
|
816 |
+
attack and can cause damage to the victim of around $500 per
|
817 |
+
minute [20]. Aura et. al [4] proposed the first client puzzle
|
818 |
+
authentication protocol for a DoS resilient system. Mankins
|
819 |
+
et. al [21] investigated methods for tuning the amount of re-
|
820 |
+
source consumption to access server resources based on client
|
821 |
+
behavior, where the costs imposed can be either monetary
|
822 |
+
or computational. In a similar vein, Wang and Reiter [33]
|
823 |
+
investigate how clients can bid on puzzles through auctions.
|
824 |
+
Ndibwile et. al [22] proposed web traffic authentication as a
|
825 |
+
replacement for CAPTCHA-based defenses. Wu et. al [36]
|
826 |
+
proposed a software puzzle framework that disqualifies the
|
827 |
+
adversary’s ability to gain an advantage by using a GPU to
|
828 |
+
solve puzzles. A framework was put forth by Dean et. al [8] to
|
829 |
+
reduce DoS in TLS servers. A DoS variant was introduced by
|
830 |
+
Wood et. al [35]. Certain PoW defenses against DoS are layer-
|
831 |
+
specific. The network layer of the proof-of-work system used
|
832 |
+
by Parno et. al [26] prioritizes users who use more CPU time to
|
833 |
+
solve puzzles. The Heimdall architecture, which can detect any
|
834 |
+
change in network flow in routers, was introduced by Chen et.
|
835 |
+
al [7]. When a change in network flow is identified for any new
|
836 |
+
connection, a puzzle is generated and sent to the new user. The
|
837 |
+
difficulty of the computational challenges used in the context
|
838 |
+
of DoS attacks on the transport layer was recently assessed
|
839 |
+
using game theory by Noureddine et. al [23]. Walfish et.
|
840 |
+
al [32] propose an alternative resource called communication
|
841 |
+
capacity as a defense against application-layer flood attacks.
|
842 |
+
Other research has concentrated on incorporating PoW puzzles
|
843 |
+
into practical browsing experiences [5], [6], [19].
|
844 |
+
C. Automated DoS defense
|
845 |
+
In this section, we revisit the literature on ensemble learning
|
846 |
+
techniques for network traffic classification problems. En-
|
847 |
+
semble learning is a branch of supervised machine learning
|
848 |
+
technique that aggregates the learning of multiple base learners
|
849 |
+
to improve overall prediction accuracy [28]. Like network
|
850 |
+
traffic classification problems, each base learner is trained to
|
851 |
+
become an expert in the local area of the total feature space.
|
852 |
+
Gaikwad et. al [12] proposed a bagging ensemble approach
|
853 |
+
using REPTree base learners to improve classification over
|
854 |
+
weaker AI models. Gupta et. al [2] suggested an IDS system
|
855 |
+
that uses ensemble learning to address a class imbalance
|
856 |
+
problem. The ensemble learner uses three base learners. First,
|
857 |
+
the deep neural network classifies normal and suspicious
|
858 |
+
traffic. Second, eXtreme Gradient Boosting is used to identify
|
859 |
+
major attacks. Third, random forest is used to classify minor
|
860 |
+
attacks. Zhou et. al [1] proposed feature selection process
|
861 |
+
using ensemble learning in two stages. The first stage involves
|
862 |
+
feature reduction using the heuristic method CFS and the
|
863 |
+
Bat Algorithm (BA). The second stage involves aggregating
|
864 |
+
C4.5 and Random Forest (RF) algorithms. Jabbar et. al [15]
|
865 |
+
suggested an ensemble classifier that uses Alternating Decision
|
866 |
+
Tree (ADTree) and the k-Nearest Neighbor algorithm (kNN)
|
867 |
+
as base AI models. Paulauskas and Auskalnis [27] proposed an
|
868 |
+
ensemble learner that employs four base classifiers: J48, C5.0,
|
869 |
+
Naive Bayes, and Partial Decision List (PART) to improve
|
870 |
+
classification results over individual AI models.
|
871 |
+
VI. CONCLUSION AND FUTURE WORK
|
872 |
+
In this paper, we design and evaluate CAPOW a context-
|
873 |
+
aware AI-assisted PoW framework that protects critical servers
|
874 |
+
against DDoS. The underlying defensive strategy involves
|
875 |
+
adaptively introducing latency on malicious users. To achieve
|
876 |
+
this functionality, our framework employs an AI model that
|
877 |
+
takes the context attributes from the incoming user request
|
878 |
+
packet as input. The AI model computes deviation from
|
879 |
+
normal activity patterns to output a context score. This score
|
880 |
+
influences the difficulty level of a PoW puzzle that injects
|
881 |
+
latency adaptively during communication. CAPOW ensures
|
882 |
+
that the ability of a malicious user to prolong the attack is
|
883 |
+
constrained by adaptively introducing latency through PoW
|
884 |
+
puzzles and compelling malicious users to expend more re-
|
885 |
+
sources to complete an attack.
|
886 |
+
For future work, different design variants of CAPOW can
|
887 |
+
be configured to combat different DDoS attack types. PoW
|
888 |
+
systems suffer from inherent pitfalls of resource wastage which
|
889 |
+
can be circumvented by replacing the model with proof of
|
890 |
+
stake (PoS) component. Additionally, alternate design can
|
891 |
+
include enhanced human in loop strategy which provides
|
892 |
+
control of the framework to the security personnel deploying
|
893 |
+
the framework.
|
894 |
+
REFERENCES
|
895 |
+
[1] Building an efficient intrusion detection system based on feature selec-
|
896 |
+
tion and ensemble classifier. Computer Networks, 174:107247, 2020.
|
897 |
+
[2] Cse-ids: Using cost-sensitive deep learning and ensemble algorithms to
|
898 |
+
handle class imbalance in network-based intrusion detection systems.
|
899 |
+
Computers & Security, 112:102499, 2022.
|
900 |
+
[3] Anonymous.
|
901 |
+
Github.
|
902 |
+
Online Website, 2022.
|
903 |
+
https://github.com/
|
904 |
+
voyagerinfinite/CAPoW.
|
905 |
+
[4] Tuomas Aura, Pekka Nikander, and Jussipekka Leiwo. Dos resistant
|
906 |
+
authentication with client puzzles.
|
907 |
+
In Revised Papers from the 8th
|
908 |
+
International Workshop on Security Protocols, page 170–177, Berlin,
|
909 |
+
Heidelberg, 2000. Springer-Verlag.
|
910 |
+
[5] Trisha Chakraborty, Shaswata Mitra, Sudip Mittal, and Maxwell Young.
|
911 |
+
Ai adaptive pow: An ai assisted proof of work (pow) framework for
|
912 |
+
ddos defense. Software Impacts, 13:100335, 2022.
|
913 |
+
7
|
914 |
+
|
915 |
+
[6] Trisha Chakraborty, Shaswata Mitra, Sudip Mittal, and Maxwell Young.
|
916 |
+
A policy driven ai-assisted pow framework.
|
917 |
+
2022 52nd Annual
|
918 |
+
IEEE/IFIP International Conference on Dependable Systems and Net-
|
919 |
+
works - Supplemental Volume (DSN-S), pages 37–38, 2022.
|
920 |
+
[7] Y. Chen, W. Ku, K. Sakai, and C. DeCruze.
|
921 |
+
A novel ddos attack
|
922 |
+
defending framework with minimized bilateral damages. In 2010 7th
|
923 |
+
IEEE Consumer Communications and Networking Conference, pages
|
924 |
+
1–5, 2010.
|
925 |
+
[8] Drew Dean and Adam Stubblefield.
|
926 |
+
Using client puzzles to protect
|
927 |
+
TLS.
|
928 |
+
In 10th USENIX Security Symposium (USENIX Security 01),
|
929 |
+
Washington, D.C., August 2001. USENIX Association.
|
930 |
+
[9] Anind K. Dey. Understanding and using context. page 4–7, 2001.
|
931 |
+
[10] Cynthia Dwork and Moni Naor. Pricing via processing or combatting
|
932 |
+
junk mail.
|
933 |
+
CRYPTO ’92, page 139–147, Berlin, Heidelberg, 1992.
|
934 |
+
Springer-Verlag.
|
935 |
+
[11] Matthew K. Franklin and Dahlia Malkhi.
|
936 |
+
Auditable metering with
|
937 |
+
lightweight security.
|
938 |
+
In Proceedings of the First International Con-
|
939 |
+
ference on Financial Cryptography, FC ’97, page 151–160, Berlin,
|
940 |
+
Heidelberg, 1997. Springer-Verlag.
|
941 |
+
[12] D.P. Gaikwad and Ravindra C. Thool. Intrusion detection system using
|
942 |
+
bagging ensemble method of machine learning. In 2015 International
|
943 |
+
Conference on Computing Communication Control and Automation,
|
944 |
+
pages 291–295, 2015.
|
945 |
+
[13] Jeff Green, Joshua Juen, Omid Fatemieh, Ravinder Shankesi, Dong Jin,
|
946 |
+
and Carl A. Gunter. Reconstructing hash reversal based proof of work
|
947 |
+
schemes. USA, 2011. USENIX Association.
|
948 |
+
[14] Diksha Gupta, Jared Saia, and Maxwell Young.
|
949 |
+
Resource burning
|
950 |
+
for permissionless systems. In International Colloquium on Structural
|
951 |
+
Information and Communication Complexity, pages 19–44. Springer,
|
952 |
+
2020.
|
953 |
+
[15] M. A. Jabbar, Rajanikanth Aluvalu, and S. Sai Satyanarayana Reddy.
|
954 |
+
Cluster based ensemble classification for intrusion detection system.
|
955 |
+
New York, NY, USA, 2017. Association for Computing Machinery.
|
956 |
+
[16] Markus Jakobsson and Ari Juels. Proofs of work and bread pudding
|
957 |
+
protocols (extended abstract). 1999.
|
958 |
+
[17] Ari Juels and John Brainard. Client puzzles: A cryptographic counter-
|
959 |
+
measure against connection depletion attacks.
|
960 |
+
In Proceedings of the
|
961 |
+
Network and Distributed System Security Symposium (NDSS), pages
|
962 |
+
151–165, 1999.
|
963 |
+
[18] Ben Laurie and Richard Clayton. Proof-of-work” proves not to work.
|
964 |
+
2004.
|
965 |
+
[19] Tien Le, Akshay Dua, and Wu-chang Feng. kapow plugins: protecting
|
966 |
+
web applications using reputation-based proof-of-work.
|
967 |
+
In 2nd Joint
|
968 |
+
WICOW/AIRWeb Workshop on Web Quality, pages 60–63, 2012.
|
969 |
+
[20] Vincent
|
970 |
+
Lynch.
|
971 |
+
Everything
|
972 |
+
you
|
973 |
+
ever
|
974 |
+
wanted
|
975 |
+
to
|
976 |
+
know
|
977 |
+
about
|
978 |
+
dos/ddos
|
979 |
+
attacks,
|
980 |
+
2017.
|
981 |
+
https://www.thesslstore.com/blog/
|
982 |
+
everything-you-ever-wanted-to-know-about-dosddos-attacks/.
|
983 |
+
[21] David Mankins, Rajesh Krishnan, Ceilyn Boyd, John Zao, and Michael
|
984 |
+
Frentz. Mitigating distributed denial of service attacks with dynamic
|
985 |
+
resource pricing. In Proceedings of the Seventeenth Annual Computer
|
986 |
+
Security Applications Conference, pages 411–421. IEEE, 2001.
|
987 |
+
[22] Jema David Ndibwile, A. Govardhan, Kazuya Okada, and Youki
|
988 |
+
Kadobayashi.
|
989 |
+
Web server protection against application layer ddos
|
990 |
+
attacks using machine learning and traffic authentication. In 2015 IEEE
|
991 |
+
39th Annual Computer Software and Applications Conference, volume 3,
|
992 |
+
pages 261–267, 2015.
|
993 |
+
[23] M. A. Noureddine, A. M. Fawaz, A. Hsu, C. Guldner, S. Vijay, T. Bas¸ar,
|
994 |
+
and W. H. Sanders. Revisiting client puzzles for state exhaustion attacks
|
995 |
+
resilience. In Proceedings of the 49th Annual IEEE/IFIP International
|
996 |
+
Conference on Dependable Systems and Networks (DSN), pages 617–
|
997 |
+
629, 2019.
|
998 |
+
[24] University of New Brunswick.
|
999 |
+
Intrusion detection evaluation dataset
|
1000 |
+
(cic-ids2017). Online Website, 2017. https://www.unb.ca/cic/datasets/
|
1001 |
+
ids-2017.html.
|
1002 |
+
[25] Andrew Orlowski.
|
1003 |
+
Meet ddosaas: Distributed denial of service-as-a-
|
1004 |
+
service. Online Website, 2016. https://www.theregister.com/2016/09/12/
|
1005 |
+
denial of service as a service/.
|
1006 |
+
[26] Bryan Parno, Dan Wendlandt, Elaine Shi, Adrian Perrig, Bruce Maggs,
|
1007 |
+
and Yih-Chun Hu. Portcullis: Protecting connection setup from denial-
|
1008 |
+
of-capability attacks. SIGCOMM ’07, page 289–300, New York, NY,
|
1009 |
+
USA, 2007. Association for Computing Machinery.
|
1010 |
+
[27] Nerijus Paulauskas and Juozas Auskalnis.
|
1011 |
+
Analysis of data pre-
|
1012 |
+
processing influence on intrusion detection using nsl-kdd dataset.
|
1013 |
+
In
|
1014 |
+
2017 Open Conference of Electrical, Electronic and Information Sci-
|
1015 |
+
ences (eStream), pages 1–5, 2017.
|
1016 |
+
[28] R. Polikar. Ensemble based systems in decision making. IEEE Circuits
|
1017 |
+
and Systems Magazine, 6(3):21–45, 2006.
|
1018 |
+
[29] Arya Renjan, Karuna Pande Joshi, Sandeep Nair Narayanan, and
|
1019 |
+
Anupam Joshi. Dabr: Dynamic attribute-based reputation scoring for
|
1020 |
+
malicious ip address detection. In 2018 IEEE International Conference
|
1021 |
+
on Intelligence and Security Informatics (ISI), pages 64–69. IEEE, 2018.
|
1022 |
+
[30] Ronald L. Rivest and Adi Shamir. Payword and micromint: Two simple
|
1023 |
+
micropayment schemes. In Security Protocols Workshop, 1996.
|
1024 |
+
[31] Cisco Talos. Talos threat source, 2022. https://www.talosintelligence.
|
1025 |
+
com/.
|
1026 |
+
[32] Michael Walfish, Mythili Vutukuru, Hari Balakrishnan, David Karger,
|
1027 |
+
and Scott Shenker.
|
1028 |
+
DDoS Defense by Offense.
|
1029 |
+
In Proceedings of
|
1030 |
+
the 2006 Conference on Applications, Technologies, Architectures, and
|
1031 |
+
Protocols for Computer Communications (SIGCOMM), pages 303–314,
|
1032 |
+
2006.
|
1033 |
+
[33] XiaoFeng Wang and Michael K. Reiter. Defending against denial-of-
|
1034 |
+
service attacks with puzzle auctions. In Proceedings of the 2003 IEEE
|
1035 |
+
Symposium on Security and Privacy, pages 78–92, 2003.
|
1036 |
+
[34] Brent Waters, Ari Juels, Alex Halderman, and Edward Felten.
|
1037 |
+
New
|
1038 |
+
client puzzle outsourcing techniques for DoS resistance. In Proceedings
|
1039 |
+
of the 11th ACM Conference on Computer and Communications Security
|
1040 |
+
(CCS), pages 246–256, 2004.
|
1041 |
+
[35] Paul Wood, Christopher Gutierrez, and Saurabh Bagchi.
|
1042 |
+
Denial of
|
1043 |
+
service elusion (dose): Keeping clients connected for less.
|
1044 |
+
In 2015
|
1045 |
+
IEEE 34th Symposium on Reliable Distributed Systems (SRDS), pages
|
1046 |
+
94–103, 2015.
|
1047 |
+
[36] Yongdong Wu, Zhigang Zhao, Feng Bao, and Robert H. Deng. Software
|
1048 |
+
puzzle: A countermeasure to resource-inflated denial-of-service attacks.
|
1049 |
+
IEEE Transactions on Information Forensics and Security, 10(1):168–
|
1050 |
+
177, 2015.
|
1051 |
+
[37] S¨uleyman ¨Ozdel, Pelin Damla Ates¸, C¸ a˘gatay Ates¸, Mutlu Koca, and
|
1052 |
+
Emin Anarım. Network anomaly detection with payload-based analysis.
|
1053 |
+
In 2022 30th Signal Processing and Communications Applications
|
1054 |
+
Conference (SIU), pages 1–4, 2022.
|
1055 |
+
8
|
1056 |
+
|
3NFKT4oBgHgl3EQfQi0f/content/tmp_files/load_file.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:93f819ef367cb2c918234ff557d74d12bd5db18e74e1889f44138ef0ec654bda
|
3 |
+
size 2365286
|
49E1T4oBgHgl3EQfmQS7/vector_store/index.faiss
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:f77a4faf00a20d6684c7448b8f23e14a0380bf5a64cc1980b3f81ed1201beccb
|
3 |
+
size 2031661
|
4NE0T4oBgHgl3EQfvQFL/content/2301.02615v1.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:96c40e6fbb48c0a50c2149ac8ce7f02a1880f86a0d0966a302ed9b4db7e7e1e1
|
3 |
+
size 3775262
|
4NE0T4oBgHgl3EQfvQFL/vector_store/index.faiss
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:6015677b732cec665baa10c4265b614b049ddc5a385e5caed8795e88cc92282b
|
3 |
+
size 2752557
|
4NE0T4oBgHgl3EQfvQFL/vector_store/index.pkl
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:f37a5c60e4593430adc2a9147cdef5b2aa03b1248e56e55a2bd5b0c1143b2694
|
3 |
+
size 106147
|
4NFQT4oBgHgl3EQfHjWk/content/2301.13249v1.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:7fbf2c01133db2cff33474e13e526cd800c2b6487a75a9870826a9f39c8e62f3
|
3 |
+
size 791371
|
4NFQT4oBgHgl3EQfHjWk/vector_store/index.faiss
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:d91d1e7410db05bcf5a103ae6bf6190f4b4ed6c76bca008797916c4bff666e41
|
3 |
+
size 4915245
|
4NFQT4oBgHgl3EQfHjWk/vector_store/index.pkl
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:9b9069844308561f7652c90065bf9eaa6428cc64233f4fc0e9e41201bdc66626
|
3 |
+
size 171077
|
59E2T4oBgHgl3EQf7Ahe/content/2301.04205v1.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:3ea55adb606a6a5b63433056d1909ec0777537aa1e8d24f0f308d7afbaba0e5d
|
3 |
+
size 842712
|
59E2T4oBgHgl3EQf7Ahe/vector_store/index.faiss
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:685b814535e3c8ed811bcbe74994dc077d951a1bd1dd709aad98cef65e7751d8
|
3 |
+
size 3801133
|
59E2T4oBgHgl3EQf7Ahe/vector_store/index.pkl
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:c4fefed88b4f1a01a6b30690ca29ad3ec3c515e2daedd4e03c593d37d382cb28
|
3 |
+
size 162728
|
5dE3T4oBgHgl3EQfQgnL/vector_store/index.faiss
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:5e260e8d2552dbfce50b63fdcad9760a0550d0685febde21cc515ff410fc533f
|
3 |
+
size 4194349
|
69E4T4oBgHgl3EQf2A2F/content/tmp_files/2301.05295v1.pdf.txt
ADDED
@@ -0,0 +1,416 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
Rock Guitar Tablature Generation via
|
2 |
+
Natural Language Processing
|
3 |
+
Josue Casco-Rodriguez
|
4 |
+
Rice University
|
5 |
+
Houston, TX, USA
|
6 | |
7 |
+
Abstract
|
8 |
+
Deep learning has recently empowered and democratized generative modeling of images and
|
9 |
+
text [1, 2], with additional concurrent works exploring the possibility of generating more complex
|
10 |
+
forms of data, such as audio [3, 4]. However, the high dimensionality, long-range dependencies,
|
11 |
+
and lack of standardized datasets currently makes generative modeling of audio and music very
|
12 |
+
challenging.
|
13 |
+
We propose to model music as a series of discrete notes upon which we can use
|
14 |
+
autoregressive natural language processing techniques for successful generative modeling. While
|
15 |
+
previous works used similar pipelines on data such as sheet music and MIDI [5, 6], we aim to
|
16 |
+
extend such approaches to the under-studied medium of guitar tablature. Specifically, we develop
|
17 |
+
the first work to our knowledge that models one specific genre—heavy rock—as guitar tablature.
|
18 |
+
Unlike other works in guitar tablature generation, we have a freely available public demo at
|
19 |
+
https://huggingface.co/spaces/josuelmet/Metal Music Interpolator.1
|
20 |
+
1
|
21 |
+
Introduction
|
22 |
+
Music, like images and language, is a fundamental form of art and a quintessential piece of the hu-
|
23 |
+
man experience. Despite the fact that recent works—such as Stable Diffusion and OpenAI’s DALL-E
|
24 |
+
[7, 1]—have produced explosive breakthroughs in the generation and modeling of visual art, such
|
25 |
+
breakthroughs for music production have not yet been realized; however, recent works, such as Ope-
|
26 |
+
nAI’s Jukebox [4], have made progress towards advanced music generation. A large factor in why such
|
27 |
+
breakthroughs have yet to be is that music is challenging to model, requiring sequence-modeling of
|
28 |
+
data mediums that are not as well-understood or intuitive as images or words.
|
29 |
+
When investigating how a machine can learn to understand or generate music, one can begin by
|
30 |
+
understanding how people learn to work with music. Although music exists as a continuous-time au-
|
31 |
+
dio signal, people most efficiently understand and analyze music as a pattern of discrete frequencies
|
32 |
+
(for example, the note “A” = 440 Hz) that are played for discretely quantized intervals of time (e.g.,
|
33 |
+
quarter-, half-, and whole-notes). As such, sequence-modeling techniques for understanding sequences
|
34 |
+
of discrete data can be leveraged towards music modeling, given a sufficient dataset of music samples
|
35 |
+
represented in discrete forms.
|
36 |
+
While sheet music and Musical Instrument Digital Interface (MIDI) files are conventional forms of
|
37 |
+
discretely compressed representations of music, one prominent form of music representation that has
|
38 |
+
been studied less is guitar tablature (see fig. 1 and fig. 2). While appearing similar to traditional
|
39 |
+
sheet music, guitar tablature differs by representing notes as fret and string indices upon which the
|
40 |
+
instrument-players must place their fingers so as to produce a specific note, since stringed instruments
|
41 |
+
are unique in that most notes that can be played on them have more than one fret and string combi-
|
42 |
+
nation that can produce them.
|
43 |
+
We develop a new dataset of compressed representations of guitar tablature from one specific genre of
|
44 |
+
1Our source code is used to train final demo model is available at https://github.com/Josuelmet/Metal-Music-
|
45 |
+
Interpolator.
|
46 |
+
1
|
47 |
+
arXiv:2301.05295v1 [eess.AS] 12 Jan 2023
|
48 |
+
|
49 |
+
Figure 1:
|
50 |
+
A guitar tablature snippet of two measures written in 4/4 time. Each note is represented
|
51 |
+
not as its pitch, but rather as the specific fret index upon which a player should press upon a certain
|
52 |
+
string so as to produce the note. The fret index of a note on the string it is played on is equivalent to
|
53 |
+
the number of semitones between the note’s pitch and the lowest pitch that the string can play. Note
|
54 |
+
that certain notes contain information about their dynamics: for example, the P.M. symbol indicates
|
55 |
+
that certain notes should be played in a semi-muted fashion.
|
56 |
+
Figure 2:
|
57 |
+
Another guitar tablature snippet in 4/4 time, this time consisting of the iconic first measure
|
58 |
+
of Sweet Child O’ Mine by Guns N’ Roses. The six pitches arranged vertically on the left are the lowest
|
59 |
+
pitches that each of the six guitar strings can play.
|
60 |
+
music (heavy rock), as well as a neural network architecture that can leverage sequence modeling (such
|
61 |
+
as in long short-term memory networks or natural language processing models) to produce new guitar
|
62 |
+
tablature sequences when conditioned on a brief snippet of an existing guitar tablature. Specifically,
|
63 |
+
the proposed autoregressive model aims to estimate the most likely new tablature token xN+1 when
|
64 |
+
given the previous tokens x1, x2, ..., xN (i.e., estimate the conditional probability p(xN+1|x1, ..., xN)),
|
65 |
+
thus enabling an iterative procedure through which an M-token sequence can be generated from an
|
66 |
+
N-token sequence, for M > N.
|
67 |
+
2
|
68 |
+
Background
|
69 |
+
2.1
|
70 |
+
Sequence Models
|
71 |
+
Recurrent networks. Sequence modeling is a long-standing problem in machine learning and statis-
|
72 |
+
tics, with one of its earliest prominent efforts being recurrent neural networks [8]. While recurrent
|
73 |
+
neural networks are able to leverage a form of memory to model sequences of theoretically unbounded
|
74 |
+
contexts, in practice they and their recent variants [9] struggle to do so, in part due to gradient prop-
|
75 |
+
agation issues [10].
|
76 |
+
Transformers.
|
77 |
+
Meanwhile, transformers [11] circumvent the problems with recurrent neural net-
|
78 |
+
works by replacing recurrent operations with one feedforward attention operation that compares every
|
79 |
+
element of a sequence with every other element of the sequence; such an approach could initially
|
80 |
+
seem disadvantaged due to the memoryless nature, inherently finite bounded context [12], and O(N 2)
|
81 |
+
runtime of an attention mechanism on a sequence of length N [13]. However, when combined with
|
82 |
+
additional innovations such as positional embeddings and token dimensionality reduction via vector-
|
83 |
+
ization, transformer architectures have yielded enormous advances in sequence and image modeling
|
84 |
+
[2, 1, 14].
|
85 |
+
Self-attention. The key behind any transformer architecture is the self-attention mechanism. Given
|
86 |
+
a vector-valued input sequence X = [x1, x2, ..., xN] ∈ RN×Dx such that each element is Dx-dimensional
|
87 |
+
and the transformer feedforward dimension is D, a self-attention head transforms X into an output
|
88 |
+
sequence ˆV through the following: [13]
|
89 |
+
2
|
90 |
+
|
91 |
+
P. M.
|
92 |
+
P. M.
|
93 |
+
P. M.
|
94 |
+
4
|
95 |
+
5
|
96 |
+
18
|
97 |
+
仆9
|
98 |
+
10
|
99 |
+
0
|
100 |
+
0
|
101 |
+
12
|
102 |
+
0
|
103 |
+
0
|
104 |
+
11
|
105 |
+
0
|
106 |
+
81
|
107 |
+
D#
|
108 |
+
15
|
109 |
+
14
|
110 |
+
4
|
111 |
+
A#
|
112 |
+
15
|
113 |
+
F#
|
114 |
+
14
|
115 |
+
—12
|
116 |
+
14
|
117 |
+
14
|
118 |
+
C#
|
119 |
+
4
|
120 |
+
12
|
121 |
+
G#
|
122 |
+
D#1. Using the weights WQ, WK ∈ RD×Dx and WV ∈ RDv×Dx, project X into three distinct
|
123 |
+
matrices—the query, key, and value matrices Q, K, and V—via these linear transformations:
|
124 |
+
Q = XWT
|
125 |
+
Q
|
126 |
+
K = XWT
|
127 |
+
K
|
128 |
+
V = XWT
|
129 |
+
V
|
130 |
+
2. Let us express the query, key, and value matrices as Q = [q1, ..., qN]T , K = [k1, ..., kN]T , and
|
131 |
+
V = [v1, ..., vN]T , where the vectors qi, ki, vi for i ∈ {1, 2, ..., N} are the query, key, and value
|
132 |
+
vectors, respectively.
|
133 |
+
Each output sequence vector ˆvi is calculated by multiplying each value vector vj by a score
|
134 |
+
determined as the similarity between the query vector qi the key vector kj :
|
135 |
+
ˆvi =
|
136 |
+
N
|
137 |
+
�
|
138 |
+
j=1
|
139 |
+
softmax
|
140 |
+
�qT
|
141 |
+
i kj
|
142 |
+
√
|
143 |
+
D
|
144 |
+
�
|
145 |
+
vj
|
146 |
+
Calculation of ˆV = [ˆv1, ..., ˆvN]T can thus be simply expressed as:
|
147 |
+
ˆV = softmax
|
148 |
+
�
|
149 |
+
QKT
|
150 |
+
√
|
151 |
+
D
|
152 |
+
�
|
153 |
+
V = AV,
|
154 |
+
where the attention matrix A is computed by applying the softmax operation to each row of the
|
155 |
+
matrix QKT /
|
156 |
+
√
|
157 |
+
D [13].
|
158 |
+
2.2
|
159 |
+
Related Works
|
160 |
+
Music/audio generation. Our key contribution to musical sequence modeling is publicly available
|
161 |
+
guitar tablature modeling of heavy rock. Various previous and ongoing works have approached music
|
162 |
+
generation both continuous and discrete data modalities. For example, the recent SaShiMi [3] and
|
163 |
+
Jukebox [4] architectures approach audio and music generation in the spaces of continuous waveforms
|
164 |
+
and discrete notes, respectively. The advent of diffusion models [15] has also found influence in a new
|
165 |
+
model combining spectrogram and MIDI music generation [16].
|
166 |
+
Guitar tablature literature.
|
167 |
+
The field of guitar tablature analysis is small but growing, with
|
168 |
+
various works tackling challenges such as graph-based solo analysis [17], transcription [18], dataset
|
169 |
+
collection, and sequence modeling [19, 20, 21]. Of particular importance to our work are AnimeTab
|
170 |
+
[19] and DadaGP [20], since they also opt for a transformer-based approach to statistically generate
|
171 |
+
sequences of guitar tablature. Unlike DadaGP, our model has token representations that are much
|
172 |
+
more simple and easy to understand, is trained on one specific genre, and has a publicly available
|
173 |
+
demo. While our model may share some similarities with AnimeTab, which was published during the
|
174 |
+
development of this work and is supposed to have a demo released soon, our model has a demo already
|
175 |
+
available and is trained on the genre of heavy rock music instead of anime/video game music.
|
176 |
+
3
|
177 |
+
Methods
|
178 |
+
3.1
|
179 |
+
Data Processing
|
180 |
+
Initial preprocessing. The success of statistical inference methods often reflects the quality of data
|
181 |
+
used for training—data preprocessing is just as important to a successful model as the model itself.
|
182 |
+
Our data preprocessing pipeline begins by first collecting a sizeable volume of songs, in guitar tabla-
|
183 |
+
ture format, that accurately represent one subgenre of music2. For each tablature file, every song is
|
184 |
+
first converted into 4/4 time for ease of processing, and is then converted into a Python object via
|
185 |
+
PyGuitarPro3 for ease of querying. Each track of each song (i.e., each instrument or voice of each
|
186 |
+
2Complete list of songs: https://github.com/Josuelmet/Metal-Music-Interpolator/blob/main/songs/README.md
|
187 |
+
3https://github.com/Perlence/PyGuitarPro
|
188 |
+
3
|
189 |
+
|
190 |
+
Figure 3:
|
191 |
+
Note embedding scheme illustrated for the example note of a whole note on fret 0 of the
|
192 |
+
lowest string on a guitar/bass. The fret value is one-hot encoded as 0, the note length is one-hot
|
193 |
+
encoded as a whole note, and none of the flags are set to 1 because the note is neither dotted nor
|
194 |
+
palm-muted nor a dead/rest/tied note.
|
195 |
+
song, not including drums) is then converted into a one-dimensional list containing each note in the
|
196 |
+
song; each note is represented as a tuple containing the note’s pitch (with special designations for tied,
|
197 |
+
dead4, and rest notes) , duration, the chordal nature if applicable (with the represented chords being
|
198 |
+
4th, diminished 5th, and perfect 5th chords), and two flags indicating whether the note is dotted and
|
199 |
+
whether the note is muted. Note that the pitch of each note is represented not as the musical pitch
|
200 |
+
of each note (e.g., “A4” or “C3”), but rather as the fret on the guitar (or bass) upon which a player
|
201 |
+
should place their finger so as to generate the note. Once all songs’ notes have been represented as
|
202 |
+
tuples, each tuple is converted to an integer via an invertible dictionary map.
|
203 |
+
Embedding initialization. After initial pre-processing, each song exists as a set of sequences, where
|
204 |
+
each sequence represents one voice or instrument and contains integers that represent each note. While
|
205 |
+
a na¨ıve sequence model could attempt inference upon these scalar sequences, modern sequence models
|
206 |
+
have found success in instead representing the individual tokens or elements of a sequence as vectors,
|
207 |
+
allowing for more expressive and informative representations token modalities. Unlike previous works
|
208 |
+
[20], we opt for a simple, but effective, initial token vectorization illustrated in fig. 3. Each initial
|
209 |
+
vectorized token embedding, before training, has 72 dimensions: the first 59 are reserved for one-hot
|
210 |
+
encoding the number of semitones (equivalent to the number of frets on a guitar or bass) between the
|
211 |
+
pitch value and the lowest pitch playable by the given instrument; the next 3 dimensions are flags indi-
|
212 |
+
cating if the note is a dead, rest, or tied note; the next 8 dimensions one-hot encode the note’s duration
|
213 |
+
(e.g., whole-, half-, and quarter-notes); and the last two dimensions are flags indicating if the note’s
|
214 |
+
duration is dotted and if the note is played in a muted fashion. While the vectorized token embeddings
|
215 |
+
are trained, and thus iteravely refined, during the training process, we found that our hand-crafted
|
216 |
+
initialization scheme performed better than default random token initialization. As in any other suc-
|
217 |
+
cessful transformer architecture, each token also has a positional embedding that accompanies the
|
218 |
+
vectorized token embedding before going into the transformer model.
|
219 |
+
3.2
|
220 |
+
Model Architecture
|
221 |
+
In addition to implementing the entire data preprocessing pipeline with the only starting point being
|
222 |
+
PyGuitarPro for querying tablature files as Python objects, we also had to manually implement the
|
223 |
+
transformer architecture, since we opted for a mini-GPT model due to the relatively small dataset at
|
224 |
+
our disposal compared to the number of sequences and number of parameters used to train conven-
|
225 |
+
tional language models [2]. Since we were not using a pre-written transformer model, we also had to
|
226 |
+
implement a causal masking mechanism to ensure that the transformer cannot use information from
|
227 |
+
any tokens after the token it is trying to predict. After extensive hyperparameter tuning on a 90-10
|
228 |
+
testing-validation, split, our final hyperparameter values are located in table 1. The final mini-GPT ar-
|
229 |
+
chitecture consists of an embedding layer (as described earlier), three transformer blocks in sequence,
|
230 |
+
4Dead notes are noted that are heavily muted such that they lose a distinct sense of pitch.
|
231 |
+
4
|
232 |
+
|
233 |
+
0
|
234 |
+
0
|
235 |
+
1
|
236 |
+
2
|
237 |
+
57
|
238 |
+
58
|
239 |
+
Extra
|
240 |
+
Dead
|
241 |
+
Rest
|
242 |
+
Tied
|
243 |
+
Fret:
|
244 |
+
Note
|
245 |
+
10
|
246 |
+
0
|
247 |
+
0
|
248 |
+
0
|
249 |
+
0
|
250 |
+
0
|
251 |
+
0
|
252 |
+
0
|
253 |
+
Types:
|
254 |
+
cat
|
255 |
+
Dotted
|
256 |
+
Palm
|
257 |
+
Whole
|
258 |
+
Half
|
259 |
+
64th
|
260 |
+
128th
|
261 |
+
Duration
|
262 |
+
Mute
|
263 |
+
Note
|
264 |
+
1
|
265 |
+
0
|
266 |
+
Length:
|
267 |
+
0
|
268 |
+
0
|
269 |
+
0
|
270 |
+
0
|
271 |
+
0Hyperparameter
|
272 |
+
Value
|
273 |
+
N (sequence length)
|
274 |
+
100
|
275 |
+
Output dimensionality (number of unique tokens)
|
276 |
+
1629
|
277 |
+
Initial embedding dimensionality
|
278 |
+
72
|
279 |
+
Number of transformer blocks
|
280 |
+
3
|
281 |
+
Transformer feedforward dimension
|
282 |
+
512
|
283 |
+
Transformer dropout rate
|
284 |
+
30%
|
285 |
+
Attention heads per transformer
|
286 |
+
10
|
287 |
+
Initial learning rate
|
288 |
+
0.003
|
289 |
+
β1 (Adam parameter)
|
290 |
+
0.96
|
291 |
+
Batch size
|
292 |
+
512
|
293 |
+
Training epochs (determined by early stopping)
|
294 |
+
∼ 120
|
295 |
+
Table 1:
|
296 |
+
Hyperparameters of the final mini-GPT model.
|
297 |
+
Figure 4:
|
298 |
+
Training and validation accuracy and loss of the final mini-GPT model using a 90-10
|
299 |
+
training-validation split.
|
300 |
+
and one final feedforward layer that returns a 1629-dimensional vector representing the conditional
|
301 |
+
probability of the next token’s value p (xN+1|x1, ..., xN).
|
302 |
+
4
|
303 |
+
Results
|
304 |
+
Performance. Using the hyperparameters specified in table 1 and early stopping based on the valida-
|
305 |
+
tion loss, our mini-GPT model achieved over 70% training accuracy and over 60% validation accuracy,
|
306 |
+
as shown in fig. 4. While it was possible to improve the training accuracy by reducing the transformer
|
307 |
+
dropout, we empirically found that doing so worsened validation generalization due to overfitting.
|
308 |
+
Qualititative evaluation of our model is made possible through the interactive demo provided5. Not
|
309 |
+
only is our work the first, to our knowledge, that provides a publicly accessible generation demo, but
|
310 |
+
our model’s success also further validates the usage of and need for natural language processing tech-
|
311 |
+
niques in the realm of audio and music generation.
|
312 |
+
Future works. Straightforward and interesting extensions of our model include more explicity incor-
|
313 |
+
porating rhythmic information [21] in the embeddings or as a separate embedding; such an approach
|
314 |
+
would be better able to capture and understand the differences between notes that land on downbeats,
|
315 |
+
upbeats, and backbeats. Another extension would be to model multiple tracks or voices at a time,
|
316 |
+
allowing for modeling of rich chords or drum sequences. For note-based chord or drum modeling, some
|
317 |
+
form of specialized translational invariance could be key to ensuring that the autoregressive model
|
318 |
+
understands that, when multiple notes are placed at the same time, their order in a sequence does not
|
319 |
+
matter. Using a more novel attention mechanism [13] could further improve performance. Diffusion
|
320 |
+
5https://huggingface.co/spaces/josuelmet/Metal Music Interpolator
|
321 |
+
5
|
322 |
+
|
323 |
+
Accuracy
|
324 |
+
Loss
|
325 |
+
0.7
|
326 |
+
Train Accuracy
|
327 |
+
6
|
328 |
+
Train LosS
|
329 |
+
Val Accuracy
|
330 |
+
Val Los5
|
331 |
+
0.6
|
332 |
+
5
|
333 |
+
0.5
|
334 |
+
4
|
335 |
+
0.4
|
336 |
+
3
|
337 |
+
0.3
|
338 |
+
0.2
|
339 |
+
2 -
|
340 |
+
0.1
|
341 |
+
1
|
342 |
+
0
|
343 |
+
20
|
344 |
+
40
|
345 |
+
60
|
346 |
+
80
|
347 |
+
100
|
348 |
+
120
|
349 |
+
20
|
350 |
+
40
|
351 |
+
60
|
352 |
+
80
|
353 |
+
100
|
354 |
+
120models could also play a role in generating sequences of guitar tablature, but whether they can out-
|
355 |
+
perform autoregressive language models has yet to be shown; recent work has shown that transformers
|
356 |
+
and diffusion models can be combined to produce state-of-the-art results in music generation [16].
|
357 |
+
References
|
358 |
+
[1] A. Ramesh, P. Dhariwal, A. Nichol, C. Chu, and M. Chen, “Hierarchical text-conditional image
|
359 |
+
generation with CLIP latents,” arXiv preprint arXiv:2204.06125, 2022.
|
360 |
+
[2] T. Brown, B. Mann, N. Ryder, M. Subbiah, J. D. Kaplan, P. Dhariwal, A. Neelakantan, P. Shyam,
|
361 |
+
G. Sastry, A. Askell, S. Agarwal, A. Herbert-Voss, G. Krueger, T. Henighan, R. Child, A. Ramesh,
|
362 |
+
D. Ziegler, J. Wu, C. Winter, C. Hesse, M. Chen, E. Sigler, M. Litwin, S. Gray, B. Chess, J. Clark,
|
363 |
+
C. Berner, S. McCandlish, A. Radford, I. Sutskever, and D. Amodei, “Language models are few-
|
364 |
+
shot learners,” in Advances in Neural Information Processing Systems, vol. 33, 2020.
|
365 |
+
[3] K. Goel, A. Gu, C. Donahue, and C. Re, “It’s raw! Audio generation with state-space models,”
|
366 |
+
in Proceedings of the 39th International Conference on Machine Learning, vol. 162 of Proceedings
|
367 |
+
of Machine Learning Research, 2022.
|
368 |
+
[4] P. Dhariwal, H. Jun, C. Payne, J. W. Kim, A. Radford, and I. Sutskever, “Jukebox: A generative
|
369 |
+
model for music,” arXiv preprint arXiv:2005.00341, 2020.
|
370 |
+
[5] C. Payne, “MuseNet,” OpenAI Blog, 2019.
|
371 |
+
[6] G. Mittal, J. Engel, C. Hawthorne, and I. Simon, “Symbolic music generation with diffusion
|
372 |
+
models,” in International Society for Music Information Retrieval Conference, vol. 22, 2021.
|
373 |
+
[7] R. Rombach, A. Blattmann, D. Lorenz, P. Esser, and B. Ommer, “High-resolution image synthesis
|
374 |
+
with latent diffusion models,” in Proceedings of the IEEE/CVF Conference on Computer Vision
|
375 |
+
and Pattern Recognition (CVPR), 2022.
|
376 |
+
[8] A. Sherstinsky, “Fundamentals of recurrent neural network (RNN) and long short-term memory
|
377 |
+
(LSTM) network,” Physica D: Nonlinear Phenomena, vol. 404, 2020.
|
378 |
+
[9] S. Hochreiter and J. Schmidhuber, “Long short-term memory,” Neural computation, vol. 9, no. 8,
|
379 |
+
pp. 1735–1780, 1997.
|
380 |
+
[10] B. Kiani, R. Balestriero, Y. LeCun, and S. Lloyd, “projUNN: efficient method for training deep
|
381 |
+
networks with unitary matrices,” in Advances in Neural Information Processing Systems, vol. 35,
|
382 |
+
2022.
|
383 |
+
[11] A. Vaswani, N. Shazeer, N. Parmar, J. Uszkoreit, L. Jones, A. N. Gomez, �L. Kaiser, and I. Polo-
|
384 |
+
sukhin, “Attention is all you need,” in Advances in Neural Information Processing Systems, vol. 30,
|
385 |
+
2017.
|
386 |
+
[12] A. Gu, K. Goel, and C. R´e, “Efficiently modeling long sequences with structured state spaces,”
|
387 |
+
in International Conference on Learning Representations, 2022.
|
388 |
+
[13] T. Nguyen, V. Suliafu, S. Osher, L. Chen, and B. Wang, “FMMformer: Efficient and flexible
|
389 |
+
transformer via decomposed near-field and far-field attention,” in Advances in Neural Information
|
390 |
+
Processing Systems, vol. 34, 2021.
|
391 |
+
[14] A. Dosovitskiy, L. Beyer, A. Kolesnikov, D. Weissenborn, X. Zhai, T. Unterthiner, M. Dehghani,
|
392 |
+
M. Minderer, G. Heigold, S. Gelly, J. Uszkoreit, and N. Houlsby, “An image is worth 16x16
|
393 |
+
words: Transformers for image recognition at scale,” in International Conference on Learning
|
394 |
+
Representations, 2021.
|
395 |
+
[15] J. Ho, A. Jain, and P. Abbeel, “Denoising diffusion probabilistic models,” in Advances in Neural
|
396 |
+
Information Processing Systems, vol. 33, 2020.
|
397 |
+
6
|
398 |
+
|
399 |
+
[16] C. Hawthorne, I. Simon, A. Roberts, N. Zeghidour, J. Gardner, E. Manilow, and J. Engel, “Multi-
|
400 |
+
instrument music synthesis with spectrogram diffusion,” in International Society for Music Infor-
|
401 |
+
mation Retrieval Conference, vol. 23, 2022.
|
402 |
+
[17] S. Ferretti, “Guitar solos as networks,” in IEEE International Conference on Multimedia and
|
403 |
+
Expo, 2016.
|
404 |
+
[18] Y.-H. Chen, W.-Y. Hsiao, T.-K. Hsieh, J.-S. R. Jang, and Y.-H. Yang, “Towards automatic
|
405 |
+
transcription of polyphonic electric guitar music: A new dataset and a multi-loss transformer
|
406 |
+
model,” in IEEE International Conference on Acoustics, Speech and Signal Processing, 2022.
|
407 |
+
[19] Y. Zhou, Y. Ju, and L. Xie, “Animetab: A new guitar tablature dataset of anime and game
|
408 |
+
music,” 2022.
|
409 |
+
[20] P. Sarmento, A. Kumar, C. Carr, Z. Zukowski, M. Barthet, and Y.-H. Yang, “DadaGP: a dataset
|
410 |
+
of tokenized GuitarPro songs for sequence models,” in International Society for Music Information
|
411 |
+
Retrieval Conference, vol. 22, 2021.
|
412 |
+
[21] Y.-H. Chen, Y.-H. Huang, W.-Y. Hsiao, and Y.-H. Yang, “Automatic composition of guitar tabs
|
413 |
+
by transformers and groove modeling,” in International Society for Music Information Retrieval
|
414 |
+
Conference, vol. 21, 2020.
|
415 |
+
7
|
416 |
+
|
69E4T4oBgHgl3EQf2A2F/content/tmp_files/load_file.txt
ADDED
@@ -0,0 +1,323 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
filepath=/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf,len=322
|
2 |
+
page_content='Rock Guitar Tablature Generation via Natural Language Processing Josue Casco-Rodriguez Rice University Houston, TX, USA jc135@rice.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
3 |
+
page_content='edu Abstract Deep learning has recently empowered and democratized generative modeling of images and text [1, 2], with additional concurrent works exploring the possibility of generating more complex forms of data, such as audio [3, 4].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
4 |
+
page_content=' However, the high dimensionality, long-range dependencies, and lack of standardized datasets currently makes generative modeling of audio and music very challenging.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
5 |
+
page_content=' We propose to model music as a series of discrete notes upon which we can use autoregressive natural language processing techniques for successful generative modeling.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
6 |
+
page_content=' While previous works used similar pipelines on data such as sheet music and MIDI [5, 6], we aim to extend such approaches to the under-studied medium of guitar tablature.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
7 |
+
page_content=' Specifically, we develop the first work to our knowledge that models one specific genre—heavy rock—as guitar tablature.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
8 |
+
page_content=' Unlike other works in guitar tablature generation, we have a freely available public demo at https://huggingface.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
9 |
+
page_content='co/spaces/josuelmet/Metal Music Interpolator.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
10 |
+
page_content='1 1 Introduction Music, like images and language, is a fundamental form of art and a quintessential piece of the hu- man experience.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
11 |
+
page_content=' Despite the fact that recent works—such as Stable Diffusion and OpenAI’s DALL-E [7, 1]—have produced explosive breakthroughs in the generation and modeling of visual art, such breakthroughs for music production have not yet been realized;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
12 |
+
page_content=' however, recent works, such as Ope- nAI’s Jukebox [4], have made progress towards advanced music generation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
13 |
+
page_content=' A large factor in why such breakthroughs have yet to be is that music is challenging to model, requiring sequence-modeling of data mediums that are not as well-understood or intuitive as images or words.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
14 |
+
page_content=' When investigating how a machine can learn to understand or generate music, one can begin by understanding how people learn to work with music.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
15 |
+
page_content=' Although music exists as a continuous-time au- dio signal, people most efficiently understand and analyze music as a pattern of discrete frequencies (for example, the note “A” = 440 Hz) that are played for discretely quantized intervals of time (e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
16 |
+
page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
17 |
+
page_content=', quarter-, half-, and whole-notes).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
18 |
+
page_content=' As such, sequence-modeling techniques for understanding sequences of discrete data can be leveraged towards music modeling, given a sufficient dataset of music samples represented in discrete forms.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
19 |
+
page_content=' While sheet music and Musical Instrument Digital Interface (MIDI) files are conventional forms of discretely compressed representations of music, one prominent form of music representation that has been studied less is guitar tablature (see fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
20 |
+
page_content=' 1 and fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
21 |
+
page_content=' 2).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
22 |
+
page_content=' While appearing similar to traditional sheet music, guitar tablature differs by representing notes as fret and string indices upon which the instrument-players must place their fingers so as to produce a specific note, since stringed instruments are unique in that most notes that can be played on them have more than one fret and string combi- nation that can produce them.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
23 |
+
page_content=' We develop a new dataset of compressed representations of guitar tablature from one specific genre of 1Our source code is used to train final demo model is available at https://github.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
24 |
+
page_content='com/Josuelmet/Metal-Music- Interpolator.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
25 |
+
page_content=' 1 arXiv:2301.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
26 |
+
page_content='05295v1 [eess.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
27 |
+
page_content='AS] 12 Jan 2023 Figure 1: A guitar tablature snippet of two measures written in 4/4 time.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
28 |
+
page_content=' Each note is represented not as its pitch, but rather as the specific fret index upon which a player should press upon a certain string so as to produce the note.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
29 |
+
page_content=' The fret index of a note on the string it is played on is equivalent to the number of semitones between the note’s pitch and the lowest pitch that the string can play.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
30 |
+
page_content=' Note that certain notes contain information about their dynamics: for example, the P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
31 |
+
page_content='M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
32 |
+
page_content=' symbol indicates that certain notes should be played in a semi-muted fashion.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
33 |
+
page_content=' Figure 2: Another guitar tablature snippet in 4/4 time, this time consisting of the iconic first measure of Sweet Child O’ Mine by Guns N’ Roses.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
34 |
+
page_content=' The six pitches arranged vertically on the left are the lowest pitches that each of the six guitar strings can play.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
35 |
+
page_content=' music (heavy rock), as well as a neural network architecture that can leverage sequence modeling (such as in long short-term memory networks or natural language processing models) to produce new guitar tablature sequences when conditioned on a brief snippet of an existing guitar tablature.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
36 |
+
page_content=' Specifically, the proposed autoregressive model aims to estimate the most likely new tablature token xN+1 when given the previous tokens x1, x2, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
37 |
+
page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
38 |
+
page_content=', xN (i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
39 |
+
page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
40 |
+
page_content=', estimate the conditional probability p(xN+1|x1, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
41 |
+
page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
42 |
+
page_content=', xN)), thus enabling an iterative procedure through which an M-token sequence can be generated from an N-token sequence, for M > N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
43 |
+
page_content=' 2 Background 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
44 |
+
page_content='1 Sequence Models Recurrent networks.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
45 |
+
page_content=' Sequence modeling is a long-standing problem in machine learning and statis- tics, with one of its earliest prominent efforts being recurrent neural networks [8].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
46 |
+
page_content=' While recurrent neural networks are able to leverage a form of memory to model sequences of theoretically unbounded contexts, in practice they and their recent variants [9] struggle to do so, in part due to gradient prop- agation issues [10].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
47 |
+
page_content=' Transformers.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
48 |
+
page_content=' Meanwhile, transformers [11] circumvent the problems with recurrent neural net- works by replacing recurrent operations with one feedforward attention operation that compares every element of a sequence with every other element of the sequence;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
49 |
+
page_content=' such an approach could initially seem disadvantaged due to the memoryless nature, inherently finite bounded context [12], and O(N 2) runtime of an attention mechanism on a sequence of length N [13].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
50 |
+
page_content=' However, when combined with additional innovations such as positional embeddings and token dimensionality reduction via vector- ization, transformer architectures have yielded enormous advances in sequence and image modeling [2, 1, 14].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
51 |
+
page_content=' Self-attention.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
52 |
+
page_content=' The key behind any transformer architecture is the self-attention mechanism.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
53 |
+
page_content=' Given a vector-valued input sequence X = [x1, x2, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
54 |
+
page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
55 |
+
page_content=', xN] ∈ RN×Dx such that each element is Dx-dimensional and the transformer feedforward dimension is D, a self-attention head transforms X into an output sequence ˆV through the following: [13] 2 P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
56 |
+
page_content=' M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
57 |
+
page_content=' P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
58 |
+
page_content=' M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
59 |
+
page_content=' P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
60 |
+
page_content=' M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
61 |
+
page_content=' 4 5 18 仆9 10 0 0 12 0 0 11 0 81 D# 15 14 4 A# 15 F# 14 —12 14 14 C# 4 12 G# D#1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
62 |
+
page_content=' Using the weights WQ, WK ∈ RD×Dx and WV ∈ RDv×Dx, project X into three distinct matrices—the query, key, and value matrices Q, K, and V—via these linear transformations: Q = XWT Q K = XWT K V = XWT V 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
63 |
+
page_content=' Let us express the query, key, and value matrices as Q = [q1, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
64 |
+
page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
65 |
+
page_content=', qN]T , K = [k1, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
66 |
+
page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
67 |
+
page_content=', kN]T , and V = [v1, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
68 |
+
page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
69 |
+
page_content=', vN]T , where the vectors qi, ki, vi for i ∈ {1, 2, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
70 |
+
page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
71 |
+
page_content=', N} are the query, key, and value vectors, respectively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
72 |
+
page_content=' Each output sequence vector ˆvi is calculated by multiplying each value vector vj by a score determined as the similarity between the query vector qi the key vector kj : ˆvi = N � j=1 softmax �qT i kj √ D � vj Calculation of ˆV = [ˆv1, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
73 |
+
page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
74 |
+
page_content=', ˆvN]T can thus be simply expressed as: ˆV = softmax � QKT √ D � V = AV, where the attention matrix A is computed by applying the softmax operation to each row of the matrix QKT / √ D [13].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
75 |
+
page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
76 |
+
page_content='2 Related Works Music/audio generation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
77 |
+
page_content=' Our key contribution to musical sequence modeling is publicly available guitar tablature modeling of heavy rock.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
78 |
+
page_content=' Various previous and ongoing works have approached music generation both continuous and discrete data modalities.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
79 |
+
page_content=' For example, the recent SaShiMi [3] and Jukebox [4] architectures approach audio and music generation in the spaces of continuous waveforms and discrete notes, respectively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
80 |
+
page_content=' The advent of diffusion models [15] has also found influence in a new model combining spectrogram and MIDI music generation [16].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
81 |
+
page_content=' Guitar tablature literature.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
82 |
+
page_content=' The field of guitar tablature analysis is small but growing, with various works tackling challenges such as graph-based solo analysis [17], transcription [18], dataset collection, and sequence modeling [19, 20, 21].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
83 |
+
page_content=' Of particular importance to our work are AnimeTab [19] and DadaGP [20], since they also opt for a transformer-based approach to statistically generate sequences of guitar tablature.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
84 |
+
page_content=' Unlike DadaGP, our model has token representations that are much more simple and easy to understand, is trained on one specific genre, and has a publicly available demo.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
85 |
+
page_content=' While our model may share some similarities with AnimeTab, which was published during the development of this work and is supposed to have a demo released soon, our model has a demo already available and is trained on the genre of heavy rock music instead of anime/video game music.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
86 |
+
page_content=' 3 Methods 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
87 |
+
page_content='1 Data Processing Initial preprocessing.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
88 |
+
page_content=' The success of statistical inference methods often reflects the quality of data used for training—data preprocessing is just as important to a successful model as the model itself.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
89 |
+
page_content=' Our data preprocessing pipeline begins by first collecting a sizeable volume of songs, in guitar tabla- ture format, that accurately represent one subgenre of music2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
90 |
+
page_content=' For each tablature file, every song is first converted into 4/4 time for ease of processing, and is then converted into a Python object via PyGuitarPro3 for ease of querying.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
91 |
+
page_content=' Each track of each song (i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
92 |
+
page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
93 |
+
page_content=', each instrument or voice of each 2Complete list of songs: https://github.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
94 |
+
page_content='com/Josuelmet/Metal-Music-Interpolator/blob/main/songs/README.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
95 |
+
page_content='md 3https://github.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
96 |
+
page_content='com/Perlence/PyGuitarPro 3 Figure 3: Note embedding scheme illustrated for the example note of a whole note on fret 0 of the lowest string on a guitar/bass.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
97 |
+
page_content=' The fret value is one-hot encoded as 0, the note length is one-hot encoded as a whole note, and none of the flags are set to 1 because the note is neither dotted nor palm-muted nor a dead/rest/tied note.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
98 |
+
page_content=' song, not including drums) is then converted into a one-dimensional list containing each note in the song;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
99 |
+
page_content=' each note is represented as a tuple containing the note’s pitch (with special designations for tied, dead4, and rest notes) , duration, the chordal nature if applicable (with the represented chords being 4th, diminished 5th, and perfect 5th chords), and two flags indicating whether the note is dotted and whether the note is muted.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
100 |
+
page_content=' Note that the pitch of each note is represented not as the musical pitch of each note (e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
101 |
+
page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
102 |
+
page_content=', “A4” or “C3”), but rather as the fret on the guitar (or bass) upon which a player should place their finger so as to generate the note.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
103 |
+
page_content=' Once all songs’ notes have been represented as tuples, each tuple is converted to an integer via an invertible dictionary map.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
104 |
+
page_content=' Embedding initialization.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
105 |
+
page_content=' After initial pre-processing, each song exists as a set of sequences, where each sequence represents one voice or instrument and contains integers that represent each note.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
106 |
+
page_content=' While a na¨ıve sequence model could attempt inference upon these scalar sequences, modern sequence models have found success in instead representing the individual tokens or elements of a sequence as vectors, allowing for more expressive and informative representations token modalities.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
107 |
+
page_content=' Unlike previous works [20], we opt for a simple, but effective, initial token vectorization illustrated in fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
108 |
+
page_content=' 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
109 |
+
page_content=' Each initial vectorized token embedding, before training, has 72 dimensions: the first 59 are reserved for one-hot encoding the number of semitones (equivalent to the number of frets on a guitar or bass) between the pitch value and the lowest pitch playable by the given instrument;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
110 |
+
page_content=' the next 3 dimensions are flags indi- cating if the note is a dead, rest, or tied note;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
111 |
+
page_content=' the next 8 dimensions one-hot encode the note’s duration (e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
112 |
+
page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
113 |
+
page_content=', whole-, half-, and quarter-notes);' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
114 |
+
page_content=' and the last two dimensions are flags indicating if the note’s duration is dotted and if the note is played in a muted fashion.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
115 |
+
page_content=' While the vectorized token embeddings are trained, and thus iteravely refined, during the training process, we found that our hand-crafted initialization scheme performed better than default random token initialization.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
116 |
+
page_content=' As in any other suc- cessful transformer architecture, each token also has a positional embedding that accompanies the vectorized token embedding before going into the transformer model.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
117 |
+
page_content=' 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
118 |
+
page_content='2 Model Architecture In addition to implementing the entire data preprocessing pipeline with the only starting point being PyGuitarPro for querying tablature files as Python objects, we also had to manually implement the transformer architecture, since we opted for a mini-GPT model due to the relatively small dataset at our disposal compared to the number of sequences and number of parameters used to train conven- tional language models [2].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
119 |
+
page_content=' Since we were not using a pre-written transformer model, we also had to implement a causal masking mechanism to ensure that the transformer cannot use information from any tokens after the token it is trying to predict.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
120 |
+
page_content=' After extensive hyperparameter tuning on a 90-10 testing-validation, split, our final hyperparameter values are located in table 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
121 |
+
page_content=' The final mini-GPT ar- chitecture consists of an embedding layer (as described earlier), three transformer blocks in sequence, 4Dead notes are noted that are heavily muted such that they lose a distinct sense of pitch.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
122 |
+
page_content=' 4 0 0 1 2 57 58 Extra Dead Rest Tied Fret: Note 10 0 0 0 0 0 0 0 Types: cat Dotted Palm Whole Half 64th 128th Duration Mute Note 1 0 Length: 0 0 0 0 0Hyperparameter Value N (sequence length) 100 Output dimensionality (number of unique tokens) 1629 Initial embedding dimensionality 72 Number of transformer blocks 3 Transformer feedforward dimension 512 Transformer dropout rate 30% Attention heads per transformer 10 Initial learning rate 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
123 |
+
page_content='003 β1 (Adam parameter) 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
124 |
+
page_content='96 Batch size 512 Training epochs (determined by early stopping) ∼ 120 Table 1: Hyperparameters of the final mini-GPT model.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
125 |
+
page_content=' Figure 4: Training and validation accuracy and loss of the final mini-GPT model using a 90-10 training-validation split.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
126 |
+
page_content=' and one final feedforward layer that returns a 1629-dimensional vector representing the conditional probability of the next token’s value p (xN+1|x1, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
127 |
+
page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
128 |
+
page_content=', xN).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
129 |
+
page_content=' 4 Results Performance.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
130 |
+
page_content=' Using the hyperparameters specified in table 1 and early stopping based on the valida- tion loss, our mini-GPT model achieved over 70% training accuracy and over 60% validation accuracy, as shown in fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
131 |
+
page_content=' 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
132 |
+
page_content=' While it was possible to improve the training accuracy by reducing the transformer dropout, we empirically found that doing so worsened validation generalization due to overfitting.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
133 |
+
page_content=' Qualititative evaluation of our model is made possible through the interactive demo provided5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
134 |
+
page_content=' Not only is our work the first, to our knowledge, that provides a publicly accessible generation demo, but our model’s success also further validates the usage of and need for natural language processing tech- niques in the realm of audio and music generation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
135 |
+
page_content=' Future works.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
136 |
+
page_content=' Straightforward and interesting extensions of our model include more explicity incor- porating rhythmic information [21] in the embeddings or as a separate embedding;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
137 |
+
page_content=' such an approach would be better able to capture and understand the differences between notes that land on downbeats, upbeats, and backbeats.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
138 |
+
page_content=' Another extension would be to model multiple tracks or voices at a time, allowing for modeling of rich chords or drum sequences.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
139 |
+
page_content=' For note-based chord or drum modeling, some form of specialized translational invariance could be key to ensuring that the autoregressive model understands that, when multiple notes are placed at the same time, their order in a sequence does not matter.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
140 |
+
page_content=' Using a more novel attention mechanism [13] could further improve performance.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
141 |
+
page_content=' Diffusion 5https://huggingface.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
142 |
+
page_content='co/spaces/josuelmet/Metal Music Interpolator 5 Accuracy Loss 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
143 |
+
page_content='7 Train Accuracy 6 Train LosS Val Accuracy Val Los5 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
144 |
+
page_content='6 5 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
145 |
+
page_content='5 4 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
146 |
+
page_content='4 3 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
147 |
+
page_content='3 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
148 |
+
page_content='2 2 - 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
149 |
+
page_content='1 1 0 20 40 60 80 100 120 20 40 60 80 100 120models could also play a role in generating sequences of guitar tablature, but whether they can out- perform autoregressive language models has yet to be shown;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
150 |
+
page_content=' recent work has shown that transformers and diffusion models can be combined to produce state-of-the-art results in music generation [16].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
151 |
+
page_content=' References [1] A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
152 |
+
page_content=' Ramesh, P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
153 |
+
page_content=' Dhariwal, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
154 |
+
page_content=' Nichol, C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
155 |
+
page_content=' Chu, and M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
156 |
+
page_content=' Chen, “Hierarchical text-conditional image generation with CLIP latents,” arXiv preprint arXiv:2204.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
157 |
+
page_content='06125, 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
158 |
+
page_content=' [2] T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
159 |
+
page_content=' Brown, B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
160 |
+
page_content=' Mann, N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
161 |
+
page_content=' Ryder, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
162 |
+
page_content=' Subbiah, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
163 |
+
page_content=' D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
164 |
+
page_content=' Kaplan, P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
165 |
+
page_content=' Dhariwal, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
166 |
+
page_content=' Neelakantan, P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
167 |
+
page_content=' Shyam, G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
168 |
+
page_content=' Sastry, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
169 |
+
page_content=' Askell, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
170 |
+
page_content=' Agarwal, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
171 |
+
page_content=' Herbert-Voss, G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
172 |
+
page_content=' Krueger, T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
173 |
+
page_content=' Henighan, R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
174 |
+
page_content=' Child, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
175 |
+
page_content=' Ramesh, D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
176 |
+
page_content=' Ziegler, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
177 |
+
page_content=' Wu, C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
178 |
+
page_content=' Winter, C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
179 |
+
page_content=' Hesse, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
180 |
+
page_content=' Chen, E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
181 |
+
page_content=' Sigler, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
182 |
+
page_content=' Litwin, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
183 |
+
page_content=' Gray, B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
184 |
+
page_content=' Chess, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
185 |
+
page_content=' Clark, C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
186 |
+
page_content=' Berner, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
187 |
+
page_content=' McCandlish, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
188 |
+
page_content=' Radford, I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
189 |
+
page_content=' Sutskever, and D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
190 |
+
page_content=' Amodei, “Language models are few- shot learners,” in Advances in Neural Information Processing Systems, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
191 |
+
page_content=' 33, 2020.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
192 |
+
page_content=' [3] K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
193 |
+
page_content=' Goel, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
194 |
+
page_content=' Gu, C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
195 |
+
page_content=' Donahue, and C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
196 |
+
page_content=' Re, “It’s raw!' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
197 |
+
page_content=' Audio generation with state-space models,” in Proceedings of the 39th International Conference on Machine Learning, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
198 |
+
page_content=' 162 of Proceedings of Machine Learning Research, 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
199 |
+
page_content=' [4] P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
200 |
+
page_content=' Dhariwal, H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
201 |
+
page_content=' Jun, C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
202 |
+
page_content=' Payne, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
203 |
+
page_content=' W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
204 |
+
page_content=' Kim, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
205 |
+
page_content=' Radford, and I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
206 |
+
page_content=' Sutskever, “Jukebox: A generative model for music,” arXiv preprint arXiv:2005.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
207 |
+
page_content='00341, 2020.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
208 |
+
page_content=' [5] C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
209 |
+
page_content=' Payne, “MuseNet,” OpenAI Blog, 2019.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
210 |
+
page_content=' [6] G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
211 |
+
page_content=' Mittal, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
212 |
+
page_content=' Engel, C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
213 |
+
page_content=' Hawthorne, and I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
214 |
+
page_content=' Simon, “Symbolic music generation with diffusion models,” in International Society for Music Information Retrieval Conference, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
215 |
+
page_content=' 22, 2021.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
216 |
+
page_content=' [7] R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
217 |
+
page_content=' Rombach, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
218 |
+
page_content=' Blattmann, D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
219 |
+
page_content=' Lorenz, P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
220 |
+
page_content=' Esser, and B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
221 |
+
page_content=' Ommer, “High-resolution image synthesis with latent diffusion models,” in Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
222 |
+
page_content=' [8] A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
223 |
+
page_content=' Sherstinsky, “Fundamentals of recurrent neural network (RNN) and long short-term memory (LSTM) network,” Physica D: Nonlinear Phenomena, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
224 |
+
page_content=' 404, 2020.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
225 |
+
page_content=' [9] S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
226 |
+
page_content=' Hochreiter and J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
227 |
+
page_content=' Schmidhuber, “Long short-term memory,” Neural computation, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
228 |
+
page_content=' 9, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
229 |
+
page_content=' 8, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
230 |
+
page_content=' 1735–1780, 1997.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
231 |
+
page_content=' [10] B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
232 |
+
page_content=' Kiani, R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
233 |
+
page_content=' Balestriero, Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
234 |
+
page_content=' LeCun, and S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
235 |
+
page_content=' Lloyd, “projUNN: efficient method for training deep networks with unitary matrices,” in Advances in Neural Information Processing Systems, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
236 |
+
page_content=' 35, 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
237 |
+
page_content=' [11] A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
238 |
+
page_content=' Vaswani, N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
239 |
+
page_content=' Shazeer, N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
240 |
+
page_content=' Parmar, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
241 |
+
page_content=' Uszkoreit, L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
242 |
+
page_content=' Jones, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
243 |
+
page_content=' N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
244 |
+
page_content=' Gomez, �L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
245 |
+
page_content=' Kaiser, and I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
246 |
+
page_content=' Polo- sukhin, “Attention is all you need,” in Advances in Neural Information Processing Systems, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
247 |
+
page_content=' 30, 2017.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
248 |
+
page_content=' [12] A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
249 |
+
page_content=' Gu, K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
250 |
+
page_content=' Goel, and C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
251 |
+
page_content=' R´e, “Efficiently modeling long sequences with structured state spaces,” in International Conference on Learning Representations, 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
252 |
+
page_content=' [13] T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
253 |
+
page_content=' Nguyen, V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
254 |
+
page_content=' Suliafu, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
255 |
+
page_content=' Osher, L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
256 |
+
page_content=' Chen, and B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
257 |
+
page_content=' Wang, “FMMformer: Efficient and flexible transformer via decomposed near-field and far-field attention,” in Advances in Neural Information Processing Systems, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
258 |
+
page_content=' 34, 2021.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
259 |
+
page_content=' [14] A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
260 |
+
page_content=' Dosovitskiy, L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
261 |
+
page_content=' Beyer, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
262 |
+
page_content=' Kolesnikov, D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
263 |
+
page_content=' Weissenborn, X.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
264 |
+
page_content=' Zhai, T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
265 |
+
page_content=' Unterthiner, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
266 |
+
page_content=' Dehghani, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
267 |
+
page_content=' Minderer, G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
268 |
+
page_content=' Heigold, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
269 |
+
page_content=' Gelly, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
270 |
+
page_content=' Uszkoreit, and N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
271 |
+
page_content=' Houlsby, “An image is worth 16x16 words: Transformers for image recognition at scale,” in International Conference on Learning Representations, 2021.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
272 |
+
page_content=' [15] J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
273 |
+
page_content=' Ho, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
274 |
+
page_content=' Jain, and P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
275 |
+
page_content=' Abbeel, “Denoising diffusion probabilistic models,” in Advances in Neural Information Processing Systems, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
276 |
+
page_content=' 33, 2020.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
277 |
+
page_content=' 6 [16] C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
278 |
+
page_content=' Hawthorne, I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
279 |
+
page_content=' Simon, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
280 |
+
page_content=' Roberts, N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
281 |
+
page_content=' Zeghidour, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
282 |
+
page_content=' Gardner, E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
283 |
+
page_content=' Manilow, and J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
284 |
+
page_content=' Engel, “Multi- instrument music synthesis with spectrogram diffusion,” in International Society for Music Infor- mation Retrieval Conference, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
285 |
+
page_content=' 23, 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
286 |
+
page_content=' [17] S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
287 |
+
page_content=' Ferretti, “Guitar solos as networks,” in IEEE International Conference on Multimedia and Expo, 2016.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
288 |
+
page_content=' [18] Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
289 |
+
page_content='-H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
290 |
+
page_content=' Chen, W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
291 |
+
page_content='-Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
292 |
+
page_content=' Hsiao, T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
293 |
+
page_content='-K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
294 |
+
page_content=' Hsieh, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
295 |
+
page_content='-S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
296 |
+
page_content=' R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
297 |
+
page_content=' Jang, and Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
298 |
+
page_content='-H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
299 |
+
page_content=' Yang, “Towards automatic transcription of polyphonic electric guitar music: A new dataset and a multi-loss transformer model,” in IEEE International Conference on Acoustics, Speech and Signal Processing, 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
300 |
+
page_content=' [19] Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
301 |
+
page_content=' Zhou, Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
302 |
+
page_content=' Ju, and L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
303 |
+
page_content=' Xie, “Animetab: A new guitar tablature dataset of anime and game music,” 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
304 |
+
page_content=' [20] P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
305 |
+
page_content=' Sarmento, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
306 |
+
page_content=' Kumar, C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
307 |
+
page_content=' Carr, Z.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
308 |
+
page_content=' Zukowski, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
309 |
+
page_content=' Barthet, and Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
310 |
+
page_content='-H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
311 |
+
page_content=' Yang, “DadaGP: a dataset of tokenized GuitarPro songs for sequence models,” in International Society for Music Information Retrieval Conference, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
312 |
+
page_content=' 22, 2021.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
313 |
+
page_content=' [21] Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
314 |
+
page_content='-H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
315 |
+
page_content=' Chen, Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
316 |
+
page_content='-H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
317 |
+
page_content=' Huang, W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
318 |
+
page_content='-Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
319 |
+
page_content=' Hsiao, and Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
320 |
+
page_content='-H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
321 |
+
page_content=' Yang, “Automatic composition of guitar tabs by transformers and groove modeling,” in International Society for Music Information Retrieval Conference, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
322 |
+
page_content=' 21, 2020.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
323 |
+
page_content=' 7' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/69E4T4oBgHgl3EQf2A2F/content/2301.05295v1.pdf'}
|
7NE4T4oBgHgl3EQfCQsk/content/tmp_files/2301.04858v1.pdf.txt
ADDED
@@ -0,0 +1,1675 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
Advancing carrier transport models for InAs/GaSb type-II superlattice MWIR
|
2 |
+
photodetectors
|
3 |
+
Rohit Kumar, Anup Kumar Mandia, Anuja Singh and Bhaskaran Muralidharan∗
|
4 |
+
Department of Electrical Engineering, Indian Institute of Technology Bombay, Powai, Mumbai-400076, India
|
5 |
+
(Dated: January 13, 2023)
|
6 |
+
In order to provide the best possible performance, modern infrared photodetector designs necessitate
|
7 |
+
extremely precise modeling of the superlattice absorber region. We advance the Rode’s method for
|
8 |
+
the Boltzmann transport equation in conjunction with the k.p band structure and the envelope
|
9 |
+
function approximation for a detailed computation of the carrier mobility and conductivity of layered
|
10 |
+
type-II superlattice structures, using which, we unravel two crucial insights. First, the significance of
|
11 |
+
both elastic and inelastic scattering mechanisms, particularly the influence of the interface roughness
|
12 |
+
and polar optical phonon scattering mechanisms in technologically relevant superlattice structures.
|
13 |
+
Second, that the structure-specific Hall mobility and Hall scattering factor reveals that temperature
|
14 |
+
and carrier concentrations significantly affect the Hall scattering factor, which deviates significantly
|
15 |
+
from unity even for small magnetic fields.
|
16 |
+
This reinforces the caution that should be exercised
|
17 |
+
when employing the Hall scattering factor in experimental estimations of drift mobilities and carrier
|
18 |
+
concentrations.
|
19 |
+
Our research hence offers a comprehensive microscopic understanding of carrier
|
20 |
+
dynamics in such technologically relevant superlattices. Our models also provide highly accurate
|
21 |
+
and precise transport parameters beyond the relaxation time approximation and thereby paving the
|
22 |
+
way to develop physics-based device modules for mid-wavelength infrared photodetectors.
|
23 |
+
I.
|
24 |
+
INTRODUCTION
|
25 |
+
Modeling state-of-the-art infrared (IR) photodetectors
|
26 |
+
[1–6] require highly accurate transport parameters for de-
|
27 |
+
veloping dark and photocurrent performance projections
|
28 |
+
[5, 7–10]. Current technologically relevant IR photode-
|
29 |
+
tectors use III-V materials such as InAs/GaSb [11, 12]
|
30 |
+
due to numerous advantages [13, 14]. Type-II superlat-
|
31 |
+
tices (T2SLs) based on stacks of InAs/GaSb [1, 2, 14] are
|
32 |
+
thus extensively used to design high-performance third-
|
33 |
+
generation IR detectors [15, 16]. Despite the fact that the
|
34 |
+
mobility of the photogenerated minority carriers has a
|
35 |
+
significant impact on the performance of IR photodetec-
|
36 |
+
tors, carrier transport in technologically relevant T2SL
|
37 |
+
structures has not as extensively been explored. Recent
|
38 |
+
explorations in this context [17–23] which include carrier
|
39 |
+
mobility calculations [24], do not conclusively bring to
|
40 |
+
the fore structure-specific impact of important scatter-
|
41 |
+
ing mechanisms such as Piezoelectric (PZ), polar opti-
|
42 |
+
cal phonon (POP), acoustic deformation potential (ADP)
|
43 |
+
scattering mechanisms and most importantly the inter-
|
44 |
+
face roughness scattering (IRS).
|
45 |
+
With the necessity to develop a deeper understand-
|
46 |
+
ing of carrier transport in technologically relevant T2SLs,
|
47 |
+
this work advances an accurate model for transport calcu-
|
48 |
+
lations, wherein, we investigate different scattering lim-
|
49 |
+
ited transport under low-field in InAs/GaSb superlattices
|
50 |
+
(SLs) as a function of free electron carrier concentration,
|
51 |
+
temperature, and SL structural parameters. In our cal-
|
52 |
+
culations, five primary scattering mechanisms that limit
|
53 |
+
carrier mobility are the ionized impurity (II) [25], the PZ
|
54 |
+
[26], the ADP [27], the POP and the IRS [28–31].
|
55 |
+
∗ corresponding author: [email protected]
|
56 |
+
We advance the Rode’s method [32–34] which goes be-
|
57 |
+
yond the relaxation time approximation (RTA) [35, 36],
|
58 |
+
coupled with band structure calculations via the k.p [37–
|
59 |
+
41] technique that also includes the strain effect due to
|
60 |
+
lattice mismatch between InAs and GaSb materials [42].
|
61 |
+
We demonstrate the effect of both the elastic and the
|
62 |
+
inelastic scattering mechanisms [43] on the electron mo-
|
63 |
+
bility of the composite structure for a wide range of tem-
|
64 |
+
peratures and doping concentrations. Our studies reveal
|
65 |
+
that the low-temperature mobility of T2SLs is limited
|
66 |
+
by the II, PZ and IRS scattering mechanisms. In con-
|
67 |
+
trast, the mobility at higher temperatures is mainly lim-
|
68 |
+
ited by the POP scattering mechanism, an inelastic and
|
69 |
+
anisotropic process. At intermediate temperatures, how-
|
70 |
+
ever, the mobility decreases due to a combined effect of
|
71 |
+
ADP and IRS mechanisms. The effects of several struc-
|
72 |
+
tural parameters including layer thicknesses, interface
|
73 |
+
roughness heights, correlation lengths, and ion densities
|
74 |
+
are thoroughly investigated. Our calculations thereby re-
|
75 |
+
inforce the superiority of the Rode’s method [32, 34] over
|
76 |
+
the conventionally employed RTA, wherein, the former is
|
77 |
+
applicable over a wide temperature range in the presence
|
78 |
+
of inelastic and anisotropic scattering mechanism.
|
79 |
+
In order to experimentally obtain the carrier concen-
|
80 |
+
tration and drift mobility in a SL structure, it is also im-
|
81 |
+
portant to ascertain the Hall scattering factor, which is
|
82 |
+
frequently thought of as being equal to unity, indicating
|
83 |
+
that the Hall mobility and the drift mobility are equal.
|
84 |
+
However, in many heterostructures, it differs significantly
|
85 |
+
from unity, which results in inaccurate estimates of the
|
86 |
+
carrier density and drift mobility. We clearly show that
|
87 |
+
the temperature and carrier concentrations significantly
|
88 |
+
affect the Hall scattering factor, and that it ranges from
|
89 |
+
0.3 to about 1.48 even for weak magnetic fields, thereby
|
90 |
+
reinforcing that caution should be exercised when em-
|
91 |
+
ploying this factor in calculations involving drift mobil-
|
92 |
+
arXiv:2301.04858v1 [cond-mat.mtrl-sci] 12 Jan 2023
|
93 |
+
|
94 |
+
2
|
95 |
+
ity and carrier concentration. The models developed here
|
96 |
+
pave the way to develop physics-based device modules for
|
97 |
+
mid-wavelength IR (MWIR) photodetectors.
|
98 |
+
This paper is structured as follows. In Sec. II we de-
|
99 |
+
scribe the k.p model to compute the band structure, elec-
|
100 |
+
tron distribution function, Boltzmann transport formal-
|
101 |
+
ism, Rode’s approach and various scattering processes.
|
102 |
+
In Sec. III we illustrate the simulation methodology. In
|
103 |
+
Sec. IV, we explain the findings and finally, in Sec. V,
|
104 |
+
we summarize our results.
|
105 |
+
II.
|
106 |
+
ANALYTICAL FORMALISM
|
107 |
+
A.
|
108 |
+
Electronic band structure
|
109 |
+
The energy band structure of T2SLs can be calcu-
|
110 |
+
lated using various theoretical approaches like the den-
|
111 |
+
sity functional theory (DFT) [44], the empirical tight-
|
112 |
+
binding method [35, 45, 46], the empirical pseudopoten-
|
113 |
+
tial method [47, 48], many-body perturbation theory [49]
|
114 |
+
and the k.p perturbation method [37]. For this study, we
|
115 |
+
use the k.p technique with the envelope function approx-
|
116 |
+
imation (EFA) [24, 50, 51] since it overcomes the compu-
|
117 |
+
tational limitations of first-principles methods. The k.p
|
118 |
+
model is extensively used because of its superiority in
|
119 |
+
computing the energy band gap. Unlike ab − initio and
|
120 |
+
tight binding methods, the k.p technique requires fewer
|
121 |
+
input parameters I, with the related calculation proce-
|
122 |
+
dure being straightforward.
|
123 |
+
In this work, we solve the 8-band Kane Hamilto-
|
124 |
+
nian [52], by perturbatively extending the wave function
|
125 |
+
around high-symmetry points of the reciprocal space, em-
|
126 |
+
ploying the Lowdin’s perturbation approach [52].
|
127 |
+
We
|
128 |
+
also consider the spin-orbit coupling [53] in our com-
|
129 |
+
putation, which provides additional contributions to the
|
130 |
+
spin splitting of the energy bands [3]. The SL wavefunc-
|
131 |
+
tions (Φn(z)) in the orbital basis states (u0(z)) along the
|
132 |
+
growth direction (z) are articulated in terms of the slowly
|
133 |
+
varying envelope functions (F(z)), which are given as
|
134 |
+
Φn(z) =
|
135 |
+
�
|
136 |
+
j
|
137 |
+
Fj(z)uj0(z).
|
138 |
+
(1)
|
139 |
+
Such envelope functions under the periodic boundary
|
140 |
+
conditions can be rewritten as
|
141 |
+
F i
|
142 |
+
j(k, z0) = e−iadF i
|
143 |
+
j(k, zM),
|
144 |
+
F i
|
145 |
+
j(k, zM+1) = eiadF i
|
146 |
+
j(k, z1),
|
147 |
+
(2)
|
148 |
+
where, d denotes the thickness of a period, M represents
|
149 |
+
the number of grid points, a denotes the Bloch vector of
|
150 |
+
the envelope function that spans the Brillouin zone (BZ)
|
151 |
+
and k represents the momentum along the transverse di-
|
152 |
+
rection. The final Hamiltonian of the SL in the basis set
|
153 |
+
comprises three matrices (H0, HI and HII), given by
|
154 |
+
H(k, kz) = H0 + HI �
|
155 |
+
−i ∂
|
156 |
+
∂z
|
157 |
+
�
|
158 |
+
+
|
159 |
+
�
|
160 |
+
−i ∂
|
161 |
+
∂z
|
162 |
+
�
|
163 |
+
HII �
|
164 |
+
−i ∂
|
165 |
+
∂z
|
166 |
+
�
|
167 |
+
. The
|
168 |
+
entire coupled differential equation is then solved using
|
169 |
+
a numerical finite difference method [54], as described in
|
170 |
+
earlier work [3].
|
171 |
+
The interface between the InAs and the GaSb layers
|
172 |
+
is very abrupt as depicted in Fig. 1(a). The energy dif-
|
173 |
+
ference between the conduction band minimum (CBM)
|
174 |
+
and the first heavy hole (HH) maximum at the center of
|
175 |
+
the BZ determines the band gap in an InAs/GaSb-based
|
176 |
+
T2SL, as shown in Fig. 1(b). Figure 1(b) also demon-
|
177 |
+
strates that the InAs conduction band (CB) is lower than
|
178 |
+
the GaSb valence band (VB), indicating that the band
|
179 |
+
structure is a staggered T2SL [55].
|
180 |
+
B.
|
181 |
+
Carrier transport model
|
182 |
+
1.
|
183 |
+
Boltzmann transport equation and its solution
|
184 |
+
In order to characterize the behavior of the T2SL sys-
|
185 |
+
tem, we solve the Boltzmann transport equation (BTE)
|
186 |
+
and compute the probability of finding a carrier with a
|
187 |
+
crystal momentum k at a location r at a time t as indi-
|
188 |
+
cated by the distribution function f(r, k, t). Solving the
|
189 |
+
BTE (3) yields the average distribution of the carriers in
|
190 |
+
both the position and the momentum space. The BTE
|
191 |
+
can be written as [56–58]
|
192 |
+
∂f
|
193 |
+
∂t − ∂f
|
194 |
+
∂t
|
195 |
+
���
|
196 |
+
diff
|
197 |
+
− ∂f
|
198 |
+
∂t
|
199 |
+
���
|
200 |
+
forces
|
201 |
+
= ∂f
|
202 |
+
∂t
|
203 |
+
���
|
204 |
+
coll
|
205 |
+
+ s(r, p, t) .
|
206 |
+
(3)
|
207 |
+
The term s(r, p, t), in Eq.
|
208 |
+
(3), represents generation-
|
209 |
+
recombination processes [59], where p is the classical mo-
|
210 |
+
mentum. The term (∂f/∂t)forces, represents the change
|
211 |
+
in the distribution function due to applied electric and
|
212 |
+
magnetic fields.
|
213 |
+
The term (∂f/∂t)forces = −F · ∇pf,
|
214 |
+
where, F = (dp/dt) = ℏ(dk/dt) = −e(E + v × B), repre-
|
215 |
+
sents the total force equal to the sum of the electric-force
|
216 |
+
and the Lorentz-force owing to the magnetic flux density
|
217 |
+
B, where e is the electron charge, E is the applied elec-
|
218 |
+
tric field and v denotes the group velocity of the carriers.
|
219 |
+
The term (∂f/∂t)diff = −v.∇rf, refers to the spatial
|
220 |
+
change in the distribution function caused by tempera-
|
221 |
+
ture or concentration gradients, which results in carrier
|
222 |
+
diffusion in the coordinate space. Here, (∂f/∂t)coll is the
|
223 |
+
collision term, which indicates how the distribution func-
|
224 |
+
tion changes over time due to collision events, and can
|
225 |
+
be described as the difference between the in- and the
|
226 |
+
out-scattering processes, i.e.,
|
227 |
+
�∂f
|
228 |
+
∂t
|
229 |
+
�
|
230 |
+
coll
|
231 |
+
=
|
232 |
+
�
|
233 |
+
k1
|
234 |
+
�
|
235 |
+
S(k1, k) f (k1)
|
236 |
+
�
|
237 |
+
1 − f (k)
|
238 |
+
�
|
239 |
+
− S(k, k1) f (k)
|
240 |
+
�
|
241 |
+
1 − f (k1)
|
242 |
+
��
|
243 |
+
,
|
244 |
+
(4)
|
245 |
+
where, S(k, k1) and S(k1, k) are the transition rates
|
246 |
+
for an electron moving between states k and k1.
|
247 |
+
Un-
|
248 |
+
der steady-state, ∂f
|
249 |
+
∂t = 0, in case of spatial homogeneity,
|
250 |
+
∇rf = 0, and assuming that there is no recombination-
|
251 |
+
|
252 |
+
3
|
253 |
+
(a)
|
254 |
+
(b)
|
255 |
+
FIG. 1. Preliminaries. (a) Schematic of InAs/GaSb based T2SL structure. The electron wave function in the InAs layer
|
256 |
+
extends beyond the interface into the GaSb layer and overlaps with the heavy hole wave function. Here, nML and mML are
|
257 |
+
the numbers of monolayers of InAs and GaSb respectively, in a single period d. (b) Band alignment of InAs/GaSb based
|
258 |
+
T2SL system showing the optical transition between the heavy-hole valence miniband and the electrons from lowest conduction
|
259 |
+
minibands that is employed to detect IR radiation. The periodic potential of the d period emerges in the material due to the
|
260 |
+
modulation of the semiconductor layers. The creation of hole (electron) minibands in the valence (conduction) band is caused
|
261 |
+
by the overlap of hole (electron) wave functions between adjacent GaSb (InAs) layers. The difference between the first electron
|
262 |
+
miniband in the CB and the first heavy hole miniband in the valence band is used to compute the effective bandgap energy Eg
|
263 |
+
of the T2SL (highlighted in black).
|
264 |
+
generation term, the BTE (3) can be rewritten as
|
265 |
+
−eE
|
266 |
+
ℏ · ∇kf =
|
267 |
+
�
|
268 |
+
k1
|
269 |
+
�
|
270 |
+
S(k1, k) f (k1)
|
271 |
+
�
|
272 |
+
1 − f (k)
|
273 |
+
�
|
274 |
+
− S(k, k1) f (k)
|
275 |
+
�
|
276 |
+
1 − f (k1)
|
277 |
+
��
|
278 |
+
.
|
279 |
+
(5)
|
280 |
+
In the low-electric field regime, the distribution func-
|
281 |
+
tion can be represented as [60]
|
282 |
+
f(k) = f0
|
283 |
+
�
|
284 |
+
ε(k)
|
285 |
+
�
|
286 |
+
+ g(k) cos θ ,
|
287 |
+
(6)
|
288 |
+
where, k=|k|, f denotes the actual electron distribution
|
289 |
+
function, which includes both the elastic and the inelas-
|
290 |
+
tic scattering mechanisms, g(k) is the perturbation term
|
291 |
+
to f0[ε(k)] produced by the electric field, θ is the angle
|
292 |
+
between applied electric field (along the symmetry axis)
|
293 |
+
and the electron wave vector k, and f0 represents the dis-
|
294 |
+
tribution function under equilibrium conditions, which is
|
295 |
+
taken according to Fermi-Dirac statistics [35, 59].
|
296 |
+
By
|
297 |
+
solving Eqs.
|
298 |
+
(5) and (6), the perturbation term g(k),
|
299 |
+
can be calculated as [32, 34, 61, 62]
|
300 |
+
gi(k) =
|
301 |
+
�Si
|
302 |
+
�
|
303 |
+
gi(k)
|
304 |
+
�
|
305 |
+
− (−e)E
|
306 |
+
ℏ
|
307 |
+
�
|
308 |
+
∂f0
|
309 |
+
∂k
|
310 |
+
�
|
311 |
+
So(k) +
|
312 |
+
1
|
313 |
+
τel(k)
|
314 |
+
�
|
315 |
+
,
|
316 |
+
(7)
|
317 |
+
FIG. 2.
|
318 |
+
The various dominant scattering mechanisms in-
|
319 |
+
volved in a T2SL structure.
|
320 |
+
where E = |E|, and gi(k) appears on both sides of Eq.
|
321 |
+
(7).
|
322 |
+
Hence, we solve Eq.
|
323 |
+
(7) iteratively and the con-
|
324 |
+
vergence is exponentially fast which takes a few itera-
|
325 |
+
tions. Once gi(k) is obtained, we calculate the mobil-
|
326 |
+
ity. In Eq. (7), the term i indicates the iteration index,
|
327 |
+
and the terms, Si & So are the in-scattering and the
|
328 |
+
out-scattering operators, respectively, for inelastic scat-
|
329 |
+
tering mechanisms, as explained in Sec. II B. The term
|
330 |
+
1
|
331 |
+
τel(k), represents the total momentum relaxation rate of
|
332 |
+
all the elastic scattering mechanisms, which is calculated
|
333 |
+
according to the Matthiessen’s rule (8), and can be writ-
|
334 |
+
ten as
|
335 |
+
|
336 |
+
Interface scattering
|
337 |
+
GaSb
|
338 |
+
Growth direction
|
339 |
+
Extended Phonons
|
340 |
+
Interface
|
341 |
+
nMI
|
342 |
+
KeD
|
343 |
+
InAs
|
344 |
+
Temperature gradientInAs.
|
345 |
+
GaSb
|
346 |
+
InAs
|
347 |
+
GaSb
|
348 |
+
InAs
|
349 |
+
GaSb
|
350 |
+
InAs
|
351 |
+
z
|
352 |
+
GaSb
|
353 |
+
GaSb
|
354 |
+
CB
|
355 |
+
GaSb
|
356 |
+
VB
|
357 |
+
Ec
|
358 |
+
Eg
|
359 |
+
HH
|
360 |
+
LH
|
361 |
+
M
|
362 |
+
InAs
|
363 |
+
InAs
|
364 |
+
InAs
|
365 |
+
InAs
|
366 |
+
Spatial coordinateDominant scattering mechanisms in T2SL
|
367 |
+
Defect scattering
|
368 |
+
Lattice scattering
|
369 |
+
IRS
|
370 |
+
Impurity
|
371 |
+
Intravalley
|
372 |
+
4
|
373 |
+
Ionized
|
374 |
+
Acoustic
|
375 |
+
Optical
|
376 |
+
Deformation potential
|
377 |
+
Piezoelectric
|
378 |
+
Polar4
|
379 |
+
1
|
380 |
+
τel(k) =
|
381 |
+
1
|
382 |
+
τII(k) +
|
383 |
+
1
|
384 |
+
τP Z(k) +
|
385 |
+
1
|
386 |
+
τADP (k) +
|
387 |
+
1
|
388 |
+
τIRS(k) .
|
389 |
+
(8)
|
390 |
+
The various dominant scattering mechanisms involved
|
391 |
+
in an InAs/GaSb-based T2SL structure are shown in Fig.
|
392 |
+
2.
|
393 |
+
2.
|
394 |
+
Ionized impurity scattering
|
395 |
+
The II scattering mechanism [25] arises due to the
|
396 |
+
Coulomb interactions between electrons and ions, when
|
397 |
+
a charged center is introduced inside the bulk material.
|
398 |
+
The II scattering mechanism is entirely elastic and dom-
|
399 |
+
inates usually at high doping concentrations and low
|
400 |
+
temperatures. The II scattering mechanism dominates
|
401 |
+
near the CB edge but reduces drastically as the energy
|
402 |
+
increases [63].
|
403 |
+
The scattering rate for the II increases
|
404 |
+
rapidly with decreasing temperature. Here, we use the
|
405 |
+
Brooks-Herring approach [64] for the calculation of II
|
406 |
+
scattering rate [34, 65], which is given by
|
407 |
+
1
|
408 |
+
τII(k) =
|
409 |
+
e4N
|
410 |
+
8π ν(k) (ϵ0 ϵs)2 (ℏ k)2
|
411 |
+
�
|
412 |
+
P(k) ln
|
413 |
+
�
|
414 |
+
1 + 4
|
415 |
+
� k
|
416 |
+
β
|
417 |
+
�2�
|
418 |
+
− Q(k)
|
419 |
+
�
|
420 |
+
,
|
421 |
+
(9)
|
422 |
+
where, ϵ0 is the permittivity of the free space, ϵs is the
|
423 |
+
static dielectric constant, ℏ is the reduced Planck’s con-
|
424 |
+
stant and N is the ionized impurity concentration, which
|
425 |
+
is the sum of the acceptor and donor impurity concen-
|
426 |
+
tration i.e., N = NA + ND. Here, β indicates the inverse
|
427 |
+
screening length, which is given as
|
428 |
+
β =
|
429 |
+
�
|
430 |
+
e2
|
431 |
+
ϵ0 ϵs kB T
|
432 |
+
�
|
433 |
+
DS(ε)f0(1 − f0)dε ,
|
434 |
+
(10)
|
435 |
+
where, DS(ε) is the density of states (DOS) at energy ε
|
436 |
+
and kB is the Boltzmann constant. P(k) and Q(k) can
|
437 |
+
be expressed as follows [34, 62]
|
438 |
+
P(k) =
|
439 |
+
� 3
|
440 |
+
4
|
441 |
+
�β c(k)
|
442 |
+
k
|
443 |
+
�4
|
444 |
+
+ 2
|
445 |
+
�β c(k)
|
446 |
+
k
|
447 |
+
�2
|
448 |
+
+ 1
|
449 |
+
�
|
450 |
+
,
|
451 |
+
(11)
|
452 |
+
Q(k) =
|
453 |
+
�3 β4 + 6 β2 k2 − 8 k4
|
454 |
+
(β2 + 4 k2) k2
|
455 |
+
�
|
456 |
+
c4(k)
|
457 |
+
+ 8
|
458 |
+
� β2 + 2k2
|
459 |
+
β2 + 4 k2
|
460 |
+
�
|
461 |
+
c2(k) +
|
462 |
+
�
|
463 |
+
4
|
464 |
+
�
|
465 |
+
k/β
|
466 |
+
�2
|
467 |
+
1 + 4
|
468 |
+
�
|
469 |
+
k/β
|
470 |
+
�2
|
471 |
+
�
|
472 |
+
.
|
473 |
+
(12)
|
474 |
+
The detailed explanation of the P and Q parameters are
|
475 |
+
given in the literature [34]. Here, the wave function ad-
|
476 |
+
mixture c(k) represents the contribution of the p-orbital
|
477 |
+
to the wave function of the band.
|
478 |
+
3.
|
479 |
+
Piezoelectric scattering
|
480 |
+
The PZ effect arises due to the acoustic phonon scat-
|
481 |
+
tering in polar semiconductors. Being a weak effect, the
|
482 |
+
PZ scattering is elastic and significant only at low doping
|
483 |
+
concentrations and low temperatures, where other scat-
|
484 |
+
tering mechanisms are weak. The momentum relaxation
|
485 |
+
rate for the PZ scattering is given by [32, 65]
|
486 |
+
1
|
487 |
+
τP Z(k) =
|
488 |
+
(eP)2 kB T
|
489 |
+
6π ϵ0 ϵs ν(k) ℏ2
|
490 |
+
�
|
491 |
+
4c4(k) − 6c2(k) + 3
|
492 |
+
�
|
493 |
+
,
|
494 |
+
(13)
|
495 |
+
where, P is a piezoelectric coefficient, which is a dimen-
|
496 |
+
sionless quantity. For the zincblende structure, it is given
|
497 |
+
as [34, 62]
|
498 |
+
P 2 = h2
|
499 |
+
14 ϵ0 ϵs
|
500 |
+
35
|
501 |
+
��12
|
502 |
+
cl
|
503 |
+
�
|
504 |
+
+
|
505 |
+
�16
|
506 |
+
ct
|
507 |
+
��
|
508 |
+
,
|
509 |
+
(14)
|
510 |
+
where, h14 is an element of the PZ stress tensor, and ct
|
511 |
+
and cl represents the spherically averaged elastic con-
|
512 |
+
stants for transverse and longitudinal modes, respec-
|
513 |
+
tively, and are given by [26, 32, 34]
|
514 |
+
cl = 3
|
515 |
+
5c11 + 1
|
516 |
+
5
|
517 |
+
�
|
518 |
+
2c12 + 4c44
|
519 |
+
�
|
520 |
+
,
|
521 |
+
ct = 1
|
522 |
+
5
|
523 |
+
�
|
524 |
+
c11 − c12
|
525 |
+
�
|
526 |
+
+ 3
|
527 |
+
5c44 ,
|
528 |
+
(15)
|
529 |
+
where c11, c12, and c44 are three independent elastic con-
|
530 |
+
stants.
|
531 |
+
4.
|
532 |
+
Acoustic deformation potential scattering
|
533 |
+
The ADP scattering mechanism is caused by the inter-
|
534 |
+
action of electrons with non-polar acoustic phonons. It
|
535 |
+
is approximately elastic near room temperature For the
|
536 |
+
ADP scattering mechanism, the momentum relaxation
|
537 |
+
rate is given by [34, 65]
|
538 |
+
1
|
539 |
+
τADP (k) =
|
540 |
+
kB T
|
541 |
+
�
|
542 |
+
e ΞD k
|
543 |
+
�2
|
544 |
+
3π cel ν(k) ℏ2
|
545 |
+
�
|
546 |
+
6c4(k)−8c2(k)+3
|
547 |
+
�
|
548 |
+
, (16)
|
549 |
+
|
550 |
+
5
|
551 |
+
where, cel denotes the spherically averaged elastic con-
|
552 |
+
stant and ΞD represents the acoustic deformation poten-
|
553 |
+
tial, which is obtained by the CB shift (in eV) per unit
|
554 |
+
strain, owing to the acoustic waves(17). To calculate the
|
555 |
+
acoustic deformation potential (ΞD), we use the following
|
556 |
+
relation (17)
|
557 |
+
ΞD = −V ×
|
558 |
+
�
|
559 |
+
∂ECBM
|
560 |
+
∂V
|
561 |
+
������
|
562 |
+
V =V0
|
563 |
+
,
|
564 |
+
(17)
|
565 |
+
where, V denotes the volume, ECBM represents the en-
|
566 |
+
ergy of the CBM and V0 is the zero pressure volume of
|
567 |
+
the structure.
|
568 |
+
5.
|
569 |
+
Interface roughness scattering
|
570 |
+
The existence of the interface roughness in a T2SL
|
571 |
+
[17, 18, 23, 29, 66] structure leads to endemic variations
|
572 |
+
in InAs well widths, causes modulation of the associated
|
573 |
+
energy levels and introduces an unstable potential for the
|
574 |
+
motion of the confined electrons. The IRS mechanism
|
575 |
+
can occur due to the imperfections that arise during the
|
576 |
+
growth of the material. The earlier related works [67, 68]
|
577 |
+
show that the degree of scattering decreases in propor-
|
578 |
+
tion to the well width hence it is important in MWIR
|
579 |
+
detectors. The IRS mechanism is an elastic process and
|
580 |
+
dominates at low temperatures in thin-film systems for
|
581 |
+
a short period of T2SL, and it is significant at high elec-
|
582 |
+
tron density. The momentum relaxation rate for the IRS
|
583 |
+
mechanism is given as [57, 69, 70]
|
584 |
+
1
|
585 |
+
τIRS(k) =
|
586 |
+
�
|
587 |
+
e2 ∆ Λ
|
588 |
+
ϵ0 ϵ∞
|
589 |
+
�2
|
590 |
+
k
|
591 |
+
ℏ2 ν(k)
|
592 |
+
�
|
593 |
+
Nd + Ns
|
594 |
+
2
|
595 |
+
�2
|
596 |
+
×
|
597 |
+
1
|
598 |
+
�
|
599 |
+
1 + (kΛ)2 ε
|
600 |
+
�
|
601 |
+
kΛ
|
602 |
+
�
|
603 |
+
1 + (kΛ)2
|
604 |
+
�
|
605 |
+
,
|
606 |
+
(18)
|
607 |
+
where, Λ is the lateral correlation length, ∆ is the rough-
|
608 |
+
ness height, Ns is the sheet carrier concentration, and Nd
|
609 |
+
is the doping carrier density.
|
610 |
+
6.
|
611 |
+
Polar optical phonon scattering
|
612 |
+
The POP scattering results from the interaction of op-
|
613 |
+
tical phonons with electrons. The POP scattering mech-
|
614 |
+
anism is inelastic and anisotropic, which occurs via the
|
615 |
+
emission or the absorption of a phonon hence, RTA is in-
|
616 |
+
applicable in such SL structures. The scattering rate due
|
617 |
+
to the POP scattering mechanism is approximately con-
|
618 |
+
stant at very high energies, and it depends on the POP
|
619 |
+
frequencies. The POP scattering dominates in the higher
|
620 |
+
temperature domain. Hence, it is significant at both near
|
621 |
+
and beyond room temperature. The out-scattering oper-
|
622 |
+
ator is given by [34]
|
623 |
+
So =
|
624 |
+
�
|
625 |
+
Npop + 1 − f −�
|
626 |
+
λ−
|
627 |
+
o +
|
628 |
+
�
|
629 |
+
Npop + f +�
|
630 |
+
λ+
|
631 |
+
o ,
|
632 |
+
(19)
|
633 |
+
λ±
|
634 |
+
o = L±�
|
635 |
+
(A±)2ln
|
636 |
+
���k± + k
|
637 |
+
k± − k
|
638 |
+
��� − A±cc± − aca±c±�
|
639 |
+
, (20)
|
640 |
+
L± =
|
641 |
+
e2 ωpop k±
|
642 |
+
4π ℏ k ν(k±)
|
643 |
+
�ϵs − ϵ∞
|
644 |
+
ϵs ϵ∞
|
645 |
+
�
|
646 |
+
,
|
647 |
+
(21)
|
648 |
+
where, ϵ∞ and ϵs are high and low-frequency dielectric
|
649 |
+
constants, respectively.
|
650 |
+
A± = aa± + [(k±)2 + k2] cc±/ 2 k±k ,
|
651 |
+
(22)
|
652 |
+
where c, c±, a and a± are the wave function coefficients,
|
653 |
+
k± is the solution of Eq. ε(k) ± ℏωpop. Any quantity
|
654 |
+
superfixed by plus/minus is to be evaluated at the en-
|
655 |
+
ergy corresponding to k+ or k−. The superscript plus
|
656 |
+
denotes scattering by the absorption and is evaluated at
|
657 |
+
an energy ε(k) + ℏωpop. Similarly, superscript minus de-
|
658 |
+
notes scattering by the emission and is evaluated at en-
|
659 |
+
ergy ε(k)−ℏωpop. Emission of phonons is possible only if
|
660 |
+
the phonons’ energy is greater than ℏωpop energy. There-
|
661 |
+
fore, if the phonon energy is less than ℏωpop, the term λ−
|
662 |
+
o
|
663 |
+
has to be considered as zero. The term Npop, indicates
|
664 |
+
the number of optical phonons and is given by the Bose
|
665 |
+
distribution as [32, 34]
|
666 |
+
Npop =
|
667 |
+
1
|
668 |
+
exp (ℏ ωpop / kB T) − 1 .
|
669 |
+
(23)
|
670 |
+
The in-scattering operator Si, is given by
|
671 |
+
Si = (Npop + 1 − f)λ+
|
672 |
+
i g+ + (Npop + f)λ−
|
673 |
+
i g− ,
|
674 |
+
(24)
|
675 |
+
where, plus and minus superscripts indicate the absorp-
|
676 |
+
tion and emission processes, respectively.
|
677 |
+
The term
|
678 |
+
λ±
|
679 |
+
i (k) can be expressed as
|
680 |
+
λ±
|
681 |
+
i (k) = L± �(k±)2 + k2
|
682 |
+
2 k± k
|
683 |
+
(A±)2 ln
|
684 |
+
���k± + k
|
685 |
+
k± − k
|
686 |
+
���
|
687 |
+
− (A±)2 − c2(k) (c±(k))2
|
688 |
+
3
|
689 |
+
�
|
690 |
+
.
|
691 |
+
(25)
|
692 |
+
The mobility can be calculated after calculating the
|
693 |
+
rates of all the elastic scattering mechanisms
|
694 |
+
1
|
695 |
+
τel(k) (8)
|
696 |
+
and the influence of inelastic scattering mechanisms on g
|
697 |
+
(7) through the terms Si(g) (24) and So (19). The rates
|
698 |
+
of various elastic scattering mechanisms are calculated by
|
699 |
+
using the expressions given in Eqs. (9), (13), (16), (18).
|
700 |
+
C.
|
701 |
+
Mobility and conductivity
|
702 |
+
The RTA [56] cannot be used if the scattering process
|
703 |
+
is inelastic and anisotropic because there is no way to
|
704 |
+
define the relaxation time that is independent of the dis-
|
705 |
+
tribution function.
|
706 |
+
In such instances, Rode’s iterative
|
707 |
+
approach can be applied to compute the real distribu-
|
708 |
+
tion function under low-field conditions. After calculat-
|
709 |
+
ing the perturbation distribution by using Rode’s algo-
|
710 |
+
rithm, we finally calculate the low-field carrier mobility,
|
711 |
+
|
712 |
+
6
|
713 |
+
FIG. 3. Flowchart for the calculation of electronic transport
|
714 |
+
parameters.
|
715 |
+
µ [32, 34, 65]
|
716 |
+
µ =
|
717 |
+
1
|
718 |
+
3E
|
719 |
+
�
|
720 |
+
ν(ε) DS(ε) g(ε) dε
|
721 |
+
�
|
722 |
+
DS(ε) f0(ε) dε
|
723 |
+
.
|
724 |
+
(26)
|
725 |
+
The term g(ε), can be obtained from Eq. (7) and the
|
726 |
+
carrier velocity ν(k) can be calculated from the band
|
727 |
+
structure as
|
728 |
+
ν(k) = 1
|
729 |
+
ℏ
|
730 |
+
∂ε
|
731 |
+
∂k .
|
732 |
+
(27)
|
733 |
+
Once the mobility is determined, it is pretty easy to
|
734 |
+
calculate the electrical conductivity by using
|
735 |
+
σ = n e µ ,
|
736 |
+
(28)
|
737 |
+
where, µ is the electron drift mobility, and n is the elec-
|
738 |
+
tron carrier concentration. The entire sequence for cal-
|
739 |
+
culating the transport coefficients using Rode’s approach
|
740 |
+
is shown in Fig. 3.
|
741 |
+
Similarly, in the presence of an arbitrary magnetic
|
742 |
+
field, the BTE can be solved. The distribution function
|
743 |
+
in such cases can be written as [33, 71]
|
744 |
+
f(k) = f0[ε(k)] + xg(k) + yh(k) ,
|
745 |
+
(29)
|
746 |
+
where, y is the direction, cosine from B × E to k, and
|
747 |
+
h(k) is the perturbation distribution function due to the
|
748 |
+
magnetic field. Substituting Eq. (29) in (3) gives a pair
|
749 |
+
of coupled equations that can be solved iteratively [33]
|
750 |
+
gi+1(k) = Si(gi(k) − (−e)E
|
751 |
+
ℏ
|
752 |
+
( ∂f0
|
753 |
+
∂k ) + βSi(hi(k))
|
754 |
+
So(k) (1 + β2)
|
755 |
+
,
|
756 |
+
(30)
|
757 |
+
hi+1(k) = Si(hi(k) + β (−e)E
|
758 |
+
ℏ
|
759 |
+
( ∂f0
|
760 |
+
∂k ) − βSi(gi(k))
|
761 |
+
So(k) (1 + β2)
|
762 |
+
, (31)
|
763 |
+
where, β =
|
764 |
+
(−e)ν(k)B
|
765 |
+
ℏkSo(k) , and B is the applied magnetic
|
766 |
+
field. The expression for the Hall mobility and the Hall
|
767 |
+
scattering factor can be written as [60]
|
768 |
+
µH = 1
|
769 |
+
B
|
770 |
+
�
|
771 |
+
ν(ε) DS(ε) h(ε) dε
|
772 |
+
�
|
773 |
+
ν(ε) DS(ε) g(ε) dε ,
|
774 |
+
(32)
|
775 |
+
rH = µH
|
776 |
+
µ ,
|
777 |
+
(33)
|
778 |
+
where, µH and µ are the Hall and the drift mobility,
|
779 |
+
respectively, and rH is the Hall scattering factor. This
|
780 |
+
solution gives a more accurate result for the Hall scatter-
|
781 |
+
ing factor compared with the other expressions based on
|
782 |
+
the RTA [71].
|
783 |
+
III.
|
784 |
+
SIMULATION APPROACH
|
785 |
+
First, we calculate the band structure using the k.p
|
786 |
+
technique as discussed in Sec. II A and then analytically
|
787 |
+
fit it to produce a smooth curve for the calculation of
|
788 |
+
group velocity [62]. By using Eq. (34), the Fermi level is
|
789 |
+
determined with a smooth band structure obtained after
|
790 |
+
the analytical fitting, where V0 represents the volume of
|
791 |
+
the cell and εc represents the energy at the bottom of the
|
792 |
+
CB.
|
793 |
+
n = 1
|
794 |
+
V0
|
795 |
+
� ∞
|
796 |
+
εc
|
797 |
+
DS(ε)f(ε)dε .
|
798 |
+
(34)
|
799 |
+
Equations (9), (13), (16), (18), (19), (24) are used to
|
800 |
+
calculate the various scattering rates, and the perturba-
|
801 |
+
tion in the distribution function is determined using Eq.
|
802 |
+
(7) with Si(k) = 0. The term g(k), is calculated itera-
|
803 |
+
tively until g(k) converges and it gives results beyond the
|
804 |
+
RTA.
|
805 |
+
IV.
|
806 |
+
RESULTS AND DISCUSSION
|
807 |
+
A.
|
808 |
+
Dispersion relation for T2SL
|
809 |
+
We calculate the band structure of an InAs/GaSb-
|
810 |
+
based T2SL, with layer widths nML/mML, where n, m
|
811 |
+
= 8, 8 correspondingly, using the 8 × 8 k.p technique
|
812 |
+
as described in Sec. II A, at a temperature of T=77 K,
|
813 |
+
and the results are shown in Fig. 4. In a single period
|
814 |
+
of 8ML/8ML InAs/GaSb configuration, the thickness of
|
815 |
+
|
816 |
+
Start
|
817 |
+
Calculation of Input Parameters and
|
818 |
+
Band Structure
|
819 |
+
Analytical Fitting of Band Structure
|
820 |
+
Calculation of Fermi-Level
|
821 |
+
Calculation of Various Scattering
|
822 |
+
Rates
|
823 |
+
Si (g(k))=0
|
824 |
+
Perturbation g(k) of the
|
825 |
+
distribution function
|
826 |
+
(-e)Ecfo
|
827 |
+
Si(gi(k) -
|
828 |
+
h
|
829 |
+
Cok
|
830 |
+
gi(k)
|
831 |
+
7
|
832 |
+
So(k) +
|
833 |
+
Tel(k)
|
834 |
+
No
|
835 |
+
g(k) Converged ?
|
836 |
+
Si (g(k))=0
|
837 |
+
Yes
|
838 |
+
Transport Coefficients
|
839 |
+
Stop7
|
840 |
+
TABLE I.
|
841 |
+
Material parameters required to calculate the electronic band structure using the k.p technique at T = 77 K
|
842 |
+
[37, 72–74]
|
843 |
+
Quantity
|
844 |
+
Unit
|
845 |
+
InAs
|
846 |
+
GaSb
|
847 |
+
Lattice constant
|
848 |
+
˚A
|
849 |
+
6.0584
|
850 |
+
6.0959
|
851 |
+
Effective mass of electron (m∗
|
852 |
+
e)
|
853 |
+
-
|
854 |
+
0.022
|
855 |
+
0.0412
|
856 |
+
Energy band gap at 0 K
|
857 |
+
eV
|
858 |
+
0.418
|
859 |
+
0.814
|
860 |
+
Luttinger parameter γ1
|
861 |
+
-
|
862 |
+
19.4
|
863 |
+
11.84
|
864 |
+
Luttinger parameter γ2
|
865 |
+
-
|
866 |
+
8.545
|
867 |
+
4.25
|
868 |
+
Luttinger parameter γ3
|
869 |
+
-
|
870 |
+
9.17
|
871 |
+
5.01
|
872 |
+
Varshini Parameter α
|
873 |
+
meV/K
|
874 |
+
0.276
|
875 |
+
0.417
|
876 |
+
Varshini Parameter β
|
877 |
+
K
|
878 |
+
93
|
879 |
+
140
|
880 |
+
Interband mixing parameter Ep
|
881 |
+
eV
|
882 |
+
21.5
|
883 |
+
22.4
|
884 |
+
Spin-orbit splitting (SO)
|
885 |
+
eV
|
886 |
+
0.38
|
887 |
+
0.76
|
888 |
+
Valence band offset (VBO)
|
889 |
+
eV
|
890 |
+
-0.56
|
891 |
+
0
|
892 |
+
(a) (110)
|
893 |
+
(b) (001)
|
894 |
+
FIG. 4. Calculated band structure in the first BZ using the
|
895 |
+
periodic boundary condition of a T2SL based on 8 ML InAs
|
896 |
+
/ 8 ML GaSb at T = 77 K using the k.p method (a) The
|
897 |
+
in-plane dispersion and (b) the out-of-plane dispersion.
|
898 |
+
FIG. 5.
|
899 |
+
DOS calculated using the k.p method in an
|
900 |
+
InAs/GaSb SL as a function of energy.
|
901 |
+
The inset clearly
|
902 |
+
shows how the DOS for the carriers in the VB varies as a
|
903 |
+
function of energy.
|
904 |
+
each layer is roughly 24 ˚A. The dispersion curve along the
|
905 |
+
in-plane and the out-of-plane directions are presented in
|
906 |
+
Figs. 4(a) and 4(b), respectively and the calculated band
|
907 |
+
gap is 270 meV. The band gap of 270 meV corresponds
|
908 |
+
to a cut-off wavelength of 4.59 µm which confirms that
|
909 |
+
our model is best suited for the MWIR spectrum. In Fig.
|
910 |
+
5 we show the DOS of an SL as a function of energy, cal-
|
911 |
+
culated using the k.p method. Table I summarizes the
|
912 |
+
values of the parameters, utilized in the k.p calculations.
|
913 |
+
B.
|
914 |
+
Scattering rates
|
915 |
+
In Fig. 6, we show the dependence of scattering rates
|
916 |
+
with energy for the temperatures of 77 K, 300 K, and
|
917 |
+
500 K at doping densities of ND = 1 × 1013 cm−3
|
918 |
+
and ND = 2 × 1017 cm−3.
|
919 |
+
Here, we show the rela-
|
920 |
+
tive importance of each of the scattering mechanisms in
|
921 |
+
a T2SL. The IRS mechanism is the strongest scatter-
|
922 |
+
ing mechanism for low as well as high doping densities
|
923 |
+
at a temperature of 77 K and 300 K as shown in Fig.
|
924 |
+
6. At a temperature of 77 K and a doping density of
|
925 |
+
ND = 1 × 1013 cm−3, the most dominant contributions
|
926 |
+
are due to the IRS followed by the ADP and the POP
|
927 |
+
scattering mechanisms. The II scattering mechanism is
|
928 |
+
the least significant scattering mechanism at this partic-
|
929 |
+
ular temperature and doping density, whereas it has a
|
930 |
+
significant contribution at higher doping densities.
|
931 |
+
At room temperature, the average energy of the carri-
|
932 |
+
ers is 3/2kBT = 0.0388 eV , indicating that the majority
|
933 |
+
of the carriers are in the low-energy region. Hence, it is
|
934 |
+
clear from Fig. 6(e) that at room temperature, the signif-
|
935 |
+
icant contribution comes from the IRS mechanism as well
|
936 |
+
as the POP scattering mechanism. Both scattering mech-
|
937 |
+
anisms are dominant at this temperature, and the dom-
|
938 |
+
inance of the POP scattering mechanism changes with
|
939 |
+
respect to temperature and the average energy of the
|
940 |
+
carriers, which signifies that the POP scattering mech-
|
941 |
+
anism plays a significant role in such a T2SL structure.
|
942 |
+
As a result, it is important to note that the POP scatter-
|
943 |
+
ing mechanism is the primary factor limiting the carrier’s
|
944 |
+
mobility from room temperature to higher temperatures.
|
945 |
+
At a temperature of 500 K, the average energy of
|
946 |
+
the carriers is 0.0646 eV and, most of the carrier con-
|
947 |
+
tributes to the POP scattering mechanism hence, this
|
948 |
+
|
949 |
+
Energy (eV)
|
950 |
+
Ec
|
951 |
+
Eg
|
952 |
+
0
|
953 |
+
HH
|
954 |
+
.1
|
955 |
+
-0.5
|
956 |
+
0
|
957 |
+
0.5
|
958 |
+
r /a
|
959 |
+
TEnergy (eV)
|
960 |
+
0.4
|
961 |
+
Ec
|
962 |
+
0.2
|
963 |
+
HH
|
964 |
+
0
|
965 |
+
-0.2
|
966 |
+
-0.4
|
967 |
+
-1
|
968 |
+
0
|
969 |
+
1
|
970 |
+
T /L1020
|
971 |
+
(ev-1cm*
|
972 |
+
1018
|
973 |
+
1020
|
974 |
+
DOS
|
975 |
+
1019
|
976 |
+
@1018
|
977 |
+
sO
|
978 |
+
-0.02405
|
979 |
+
-0.02340
|
980 |
+
Energy (eV)
|
981 |
+
-0.05 0.25
|
982 |
+
0.35
|
983 |
+
0.45
|
984 |
+
Energy (eV)8
|
985 |
+
(a) T=77 K
|
986 |
+
(b) T=300 K
|
987 |
+
(c) T=500 K
|
988 |
+
(d) T=77 K
|
989 |
+
(e) T=300 K
|
990 |
+
(f) T=500 K
|
991 |
+
FIG. 6.
|
992 |
+
Scattering rates for 8ML/8ML InAs/GaSb based T2SL with roughness parameters Λ = 3 nm and ∆ = 0.3 nm as
|
993 |
+
a function of electron energy at
|
994 |
+
(a) T = 77 K and ND = 1 × 1013 cm−3
|
995 |
+
(b) T = 300 K and ND = 1 × 1013 cm−3
|
996 |
+
(c)
|
997 |
+
T = 500 K and ND = 1 × 1013 cm−3 (d) T = 77 K and ND = 2 × 1017 cm−3 (e) T = 300 K and ND = 2 × 1017 cm−3 and (f)
|
998 |
+
T = 500 K and ND = 2 × 1017 cm−3 .
|
999 |
+
TABLE II. Material parameters required to compute the various scattering rates [32, 73, 75–78].
|
1000 |
+
Parameter
|
1001 |
+
Unit
|
1002 |
+
InAs
|
1003 |
+
GaSb
|
1004 |
+
Elastic constant c11
|
1005 |
+
GPa
|
1006 |
+
832.9
|
1007 |
+
884.2
|
1008 |
+
Elastic constant c12
|
1009 |
+
GPa
|
1010 |
+
452.6
|
1011 |
+
402.6
|
1012 |
+
Elastic constant c44
|
1013 |
+
GPa
|
1014 |
+
395.9
|
1015 |
+
432.2
|
1016 |
+
Acoustic deformation potential
|
1017 |
+
eV
|
1018 |
+
4.90
|
1019 |
+
6.70
|
1020 |
+
Low freq. dielectric constant
|
1021 |
+
-
|
1022 |
+
14.55
|
1023 |
+
15.00
|
1024 |
+
High freq. dielectric constant
|
1025 |
+
-
|
1026 |
+
11.78
|
1027 |
+
13.80
|
1028 |
+
Piezoelectric coefficient
|
1029 |
+
C/m2
|
1030 |
+
0.045
|
1031 |
+
0.126
|
1032 |
+
Optical phonon frequency
|
1033 |
+
1/cm
|
1034 |
+
240 (LO)a, 218 (TO)b
|
1035 |
+
193 (LO)a, 215 (TO)b
|
1036 |
+
a LO : Longitudinal Optical Phonon Frequency.
|
1037 |
+
b TO : Transverse Optical Phonon Frequency.
|
1038 |
+
again demonstrates that the POP scattering mechanism
|
1039 |
+
is the most dominant scattering mechanism for T2SL at
|
1040 |
+
and beyond the ambient temperature for both doping
|
1041 |
+
densities, as shown in Figs. 6(c) and 6(f). Figure 6 shows
|
1042 |
+
a sudden change in the POP scattering rate after partic-
|
1043 |
+
ular energy, which is because if the electron energy is
|
1044 |
+
less than the POP energy, the electron can only scat-
|
1045 |
+
ter by the absorption of the optical phonons, whereas if
|
1046 |
+
the energy is greater than the phonon energy, the elec-
|
1047 |
+
tron can scatter by both the absorption and the emission
|
1048 |
+
of phonons, where the optical phonon energy is deter-
|
1049 |
+
mined using ℏωP OP . The PZ scattering is the least domi-
|
1050 |
+
nant scattering mechanism at higher doping densities, as
|
1051 |
+
shown in Figs. 6(d), 6(e), 6(f). Table II lists the ma-
|
1052 |
+
terial parameters that are used to compute the various
|
1053 |
+
scattering rates.
|
1054 |
+
It is generally known that the ADP scattering mech-
|
1055 |
+
anism becomes substantial at temperatures of 77 K and
|
1056 |
+
above, reducing electron mobility. Therefore, it is also
|
1057 |
+
important to include the effect of the ADP scattering
|
1058 |
+
mechanism, which is significant near the room tempera-
|
1059 |
+
ture for low as well as high doping densities, which was
|
1060 |
+
|
1061 |
+
PZ
|
1062 |
+
(sec)
|
1063 |
+
POP
|
1064 |
+
IRS
|
1065 |
+
ADP
|
1066 |
+
Total
|
1067 |
+
rate (
|
1068 |
+
Scattering
|
1069 |
+
1011
|
1070 |
+
107
|
1071 |
+
0.03
|
1072 |
+
0.055
|
1073 |
+
0.1
|
1074 |
+
Energy (eV)1015
|
1075 |
+
PZ
|
1076 |
+
(sec
|
1077 |
+
POP
|
1078 |
+
IRS
|
1079 |
+
ADP
|
1080 |
+
Total
|
1081 |
+
rate
|
1082 |
+
Scattering
|
1083 |
+
1011
|
1084 |
+
107
|
1085 |
+
0.03
|
1086 |
+
0.055
|
1087 |
+
0.1
|
1088 |
+
Energy (eV)1015
|
1089 |
+
PZ
|
1090 |
+
(sec
|
1091 |
+
POP
|
1092 |
+
IRS
|
1093 |
+
ADP
|
1094 |
+
Total
|
1095 |
+
rate (
|
1096 |
+
Scattering
|
1097 |
+
1011
|
1098 |
+
107
|
1099 |
+
0.03
|
1100 |
+
0.055
|
1101 |
+
0.1
|
1102 |
+
Energy (eV)PZ
|
1103 |
+
(sec)
|
1104 |
+
POP
|
1105 |
+
IRS
|
1106 |
+
ADP
|
1107 |
+
Total
|
1108 |
+
rate (
|
1109 |
+
Scattering
|
1110 |
+
1011
|
1111 |
+
107
|
1112 |
+
0.03
|
1113 |
+
0.055
|
1114 |
+
0.1
|
1115 |
+
Energy (eV)1015
|
1116 |
+
PZ
|
1117 |
+
(sec'
|
1118 |
+
POP
|
1119 |
+
IRS
|
1120 |
+
ADP
|
1121 |
+
Total
|
1122 |
+
rate
|
1123 |
+
M
|
1124 |
+
Scattering
|
1125 |
+
1011
|
1126 |
+
107
|
1127 |
+
0.03
|
1128 |
+
0.055
|
1129 |
+
0.1
|
1130 |
+
Energy (eV)1015
|
1131 |
+
PZ
|
1132 |
+
(sec
|
1133 |
+
POP
|
1134 |
+
IRS
|
1135 |
+
ADP
|
1136 |
+
Total
|
1137 |
+
rate
|
1138 |
+
Scattering
|
1139 |
+
1011
|
1140 |
+
107
|
1141 |
+
0.03
|
1142 |
+
0.055
|
1143 |
+
0.1
|
1144 |
+
Energy (eV)9
|
1145 |
+
FIG. 7.
|
1146 |
+
Calculated mobility contribution for electrons due
|
1147 |
+
to the various scattering mechanism involved in (8ML/8ML)
|
1148 |
+
InAs/GaSb T2SL as a function of temperature for ND = 9 ×
|
1149 |
+
1016 cm−3.
|
1150 |
+
FIG. 8.
|
1151 |
+
Calculated low-field electron drift mobility in
|
1152 |
+
8ML/8ML InAs/GaSb SL as a function of doping concen-
|
1153 |
+
tration for temperatures of 77 K, 120 K and 150 K.
|
1154 |
+
not highlighted in the earlier works for such SL struc-
|
1155 |
+
tures. At lower temperatures and in the thin-film sys-
|
1156 |
+
tems, the IRS scattering is considerable, and to compute
|
1157 |
+
the roughness scattering rate, we utilize a sheet carrier
|
1158 |
+
density Ns, of 4.6 × 1012 cm−2 and a doping carrier den-
|
1159 |
+
sity Nd, of 1 × 1011 cm−2 with the roughness height ∆,
|
1160 |
+
fixed at 0.3 nm, and the correlation length of the fluctu-
|
1161 |
+
ations Λ kept at 3 nm. The IRS mechanism is temper-
|
1162 |
+
ature independent, but the carrier distribution function
|
1163 |
+
depends on the temperature. Therefore, the electron mo-
|
1164 |
+
bility through the IRS mechanism is somewhat tempera-
|
1165 |
+
ture sensitive. Except for the IRS scattering rate, which
|
1166 |
+
is temperature independent, we see that all the scattering
|
1167 |
+
rates increase as the temperature rises as shown in Figs.
|
1168 |
+
6(a), 6(b), 6(c). When the temperature is either low or
|
1169 |
+
intermediate, the II scattering rate increases with an in-
|
1170 |
+
crease in the doping concentration, which suppress the
|
1171 |
+
contribution from the PZ scattering, as shown in Figs.
|
1172 |
+
6(a), 6(d), 6(b), 6(e).
|
1173 |
+
FIG. 9.
|
1174 |
+
Comparison of conductivity in a T2SL as a func-
|
1175 |
+
tion of temperature, calculated using the Rode’s and the RTA
|
1176 |
+
method for various doping concentrations.
|
1177 |
+
FIG. 10.
|
1178 |
+
Calculated temperature dependence of electronic
|
1179 |
+
mobility with IRS heights for a correlation length of 3 nm
|
1180 |
+
& ND = 9 × 1016 cm−3. The mobility due to only the IRS
|
1181 |
+
mechanism is shown.
|
1182 |
+
C.
|
1183 |
+
Electron transport parameters
|
1184 |
+
We calculate the mobility and the conductivity for
|
1185 |
+
a T2SL at various temperatures and doping concentra-
|
1186 |
+
tions.
|
1187 |
+
Figure 7 shows the contribution to the mobil-
|
1188 |
+
ity due to various scattering mechanisms calculated for
|
1189 |
+
ND = 9 × 1016 cm−3.
|
1190 |
+
To the best of our knowledge,
|
1191 |
+
the combined effect of these scattering mechanisms in a
|
1192 |
+
T2SL structure has never been shown in earlier works.
|
1193 |
+
These five types of scattering mechanisms show their sig-
|
1194 |
+
nificant contribution to the overall mobility calculation.
|
1195 |
+
From Fig. 7 it turns out that the scattering mechanism
|
1196 |
+
with the lowest mobility values is the dominant one in
|
1197 |
+
that temperature range. Therefore, starting at a tem-
|
1198 |
+
perature of 150 K, the POP scattering mechanism is the
|
1199 |
+
most dominant scattering mechanism until 700 K; below
|
1200 |
+
77 K, a significant contribution to the mobility comes
|
1201 |
+
from the II scattering and the IRS mechanisms as shown
|
1202 |
+
|
1203 |
+
1010
|
1204 |
+
Overall
|
1205 |
+
RTAO
|
1206 |
+
pOp
|
1207 |
+
ADP
|
1208 |
+
PZO
|
1209 |
+
IRS
|
1210 |
+
Overall + RTA + Il+ POP + ADP + PZ + IRS
|
1211 |
+
103
|
1212 |
+
102
|
1213 |
+
300
|
1214 |
+
500
|
1215 |
+
700
|
1216 |
+
Temperature (K)
|
1217 |
+
106
|
1218 |
+
102
|
1219 |
+
20
|
1220 |
+
150
|
1221 |
+
300
|
1222 |
+
500
|
1223 |
+
700
|
1224 |
+
Temperature (K)6
|
1225 |
+
10
|
1226 |
+
△77K口120K*150K
|
1227 |
+
104
|
1228 |
+
10°
|
1229 |
+
1012
|
1230 |
+
1014
|
1231 |
+
1016
|
1232 |
+
1018
|
1233 |
+
Doping Concentration (cm-3104
|
1234 |
+
Conductivity (S/cm)
|
1235 |
+
-. 1×1016 cm-3-*. 1×1016 cm-3
|
1236 |
+
- - 9×1016 cm-3...*.. 9×1016 cm-3
|
1237 |
+
101
|
1238 |
+
....0..0....0
|
1239 |
+
:::
|
1240 |
+
10-2
|
1241 |
+
Rode
|
1242 |
+
RTA
|
1243 |
+
10-5
|
1244 |
+
20
|
1245 |
+
150
|
1246 |
+
300
|
1247 |
+
500
|
1248 |
+
700
|
1249 |
+
Temperature (K)Mobility (cm? / V-sec)
|
1250 |
+
A=0.1nm-0-A=0.3nm-0A=0.5nm
|
1251 |
+
△=0.7nm
|
1252 |
+
106
|
1253 |
+
105
|
1254 |
+
104
|
1255 |
+
103
|
1256 |
+
20
|
1257 |
+
150
|
1258 |
+
300
|
1259 |
+
Temperature (K)10
|
1260 |
+
FIG. 11.
|
1261 |
+
Calculated mobility for electrons in an 8ML
|
1262 |
+
InAs/8ML GaSb SL as a function of temperature and cor-
|
1263 |
+
relation length for an IRS height of 0.3 nm with ND =
|
1264 |
+
9 × 1016 cm−3. Here, the mobility due to only the IRS mech-
|
1265 |
+
anism is shown.
|
1266 |
+
FIG. 12. Temperature dependence of electron Hall mobility
|
1267 |
+
in a T2SL calculated using the Rode’s and the RTA method
|
1268 |
+
at B = 0.69 T for various doping concentrations.
|
1269 |
+
in Fig. 7.
|
1270 |
+
In case of II scattering mechanism, with increasing
|
1271 |
+
temperature, the electron density increases exponentially
|
1272 |
+
and causes growth in the screening length.
|
1273 |
+
As a re-
|
1274 |
+
sult, the mobility at low temperatures increases sharply
|
1275 |
+
with rising temperatures because the scattering rates are
|
1276 |
+
inversely related to the square of the screening length.
|
1277 |
+
Since the POP scattering mechanism is more prominent
|
1278 |
+
above 150 K; hence the overall mobility is reduced as
|
1279 |
+
shown in Fig. 7. In Fig. 7, we also compare the mo-
|
1280 |
+
bility computed using the RTA approach to the overall
|
1281 |
+
mobility calculated using Rode’s method and it is found
|
1282 |
+
that in the RTA approach, the mobility is underestimated
|
1283 |
+
because the POP scattering mechanism is inelastic and
|
1284 |
+
nonrandomizing, making it impossible to characterize the
|
1285 |
+
perturbation in the distribution function using the relax-
|
1286 |
+
FIG. 13. Hall scattering factor versus temperature at B= 0.69
|
1287 |
+
T for ND = 9 × 1017cm−3.
|
1288 |
+
FIG. 14. Hall scattering factor as a function of temperature
|
1289 |
+
and carrier concentration at B= 0.69 T.
|
1290 |
+
ation time. The POP scattering mechanism becomes in-
|
1291 |
+
significant at low temperatures, resulting in nearly com-
|
1292 |
+
parable mobilities determined using the RTA and Rode’s
|
1293 |
+
iterative technique.
|
1294 |
+
In Fig. 8, we demonstrate the overall mobility versus
|
1295 |
+
doping concentration at different temperatures and em-
|
1296 |
+
phasize on the mobility at 77K, which is the usual operat-
|
1297 |
+
ing temperature of most high-performance IR detectors.
|
1298 |
+
The graph illustrates a decrease in mobility as the doping
|
1299 |
+
concentration increases due to a rise in the number of ion-
|
1300 |
+
ized centers. As we raise the temperature, the mobility
|
1301 |
+
diminishes as expected because at higher temperatures
|
1302 |
+
the phonon scattering increases. The mobility values do
|
1303 |
+
not differ significantly for low carrier concentrations be-
|
1304 |
+
cause the II scattering mechanism is less significant at
|
1305 |
+
this range and the primary contributions for lower doping
|
1306 |
+
concentration at low temperatures come from the PZ and
|
1307 |
+
the ADP scattering mechanisms, while at greater doping
|
1308 |
+
concentrations, the II scattering mechanism is compara-
|
1309 |
+
ble to the ADP and the PZ scattering mechanisms. The
|
1310 |
+
mobility owing to the II scattering mechanism is a de-
|
1311 |
+
|
1312 |
+
A=30nm
|
1313 |
+
A=20nm
|
1314 |
+
^=12nm
|
1315 |
+
Correlation lengthN
|
1316 |
+
106
|
1317 |
+
A=8nm
|
1318 |
+
Λ=6nm
|
1319 |
+
Λ=3nm
|
1320 |
+
Λ=2nm
|
1321 |
+
103
|
1322 |
+
A=1nm
|
1323 |
+
20
|
1324 |
+
150
|
1325 |
+
300
|
1326 |
+
Temperature
|
1327 |
+
(K)Hall mobility (cm? / V-sec)
|
1328 |
+
105
|
1329 |
+
D—1×1013 cm-3——1×1013 cm-3
|
1330 |
+
-0- 1×1016 cm-3-★- 1×1016 cm-3
|
1331 |
+
.O..9×1016 cm-3...*...9×1016 cm-3
|
1332 |
+
104
|
1333 |
+
Rode
|
1334 |
+
RTA
|
1335 |
+
20
|
1336 |
+
150
|
1337 |
+
300
|
1338 |
+
Temperature (K)Hall scattering factor r
|
1339 |
+
.o..Rode ..o..RTA
|
1340 |
+
1.00
|
1341 |
+
0.75
|
1342 |
+
20
|
1343 |
+
100
|
1344 |
+
200
|
1345 |
+
Temperature (K)3
|
1346 |
+
Carrier conc. (cm*
|
1347 |
+
1016
|
1348 |
+
H
|
1349 |
+
1014
|
1350 |
+
2
|
1351 |
+
0.5
|
1352 |
+
12
|
1353 |
+
10
|
1354 |
+
30
|
1355 |
+
77
|
1356 |
+
120
|
1357 |
+
150
|
1358 |
+
200
|
1359 |
+
Temperature(K)11
|
1360 |
+
creasing function of ND, the mobility begins to decrease
|
1361 |
+
as ND exceeds 1 × 1016 cm−3.
|
1362 |
+
In Fig. 9, we show the conductivity versus temperature
|
1363 |
+
for the doping concentrations of ND = 1 × 1013 cm−3,
|
1364 |
+
ND = 1 × 1016 cm−3 and ND = 9 × 1016 cm−3, re-
|
1365 |
+
spectively, and to demonstrate the supremacy of our
|
1366 |
+
approach, we compare the results obtained using both
|
1367 |
+
the Rode’s and the RTA method. At higher tempera-
|
1368 |
+
tures, the difference in the result of Rode’s method and
|
1369 |
+
the RTA is due to the POP scattering mechanism, the
|
1370 |
+
POP scattering is weaker at lower temperatures hence
|
1371 |
+
both the RTA and the Rode exhibit the same conduc-
|
1372 |
+
tivity. We demonstrate that the conductivity in a T2SL
|
1373 |
+
increases with an increase in the carrier concentration
|
1374 |
+
but decreases as we increase the temperature.
|
1375 |
+
In Figs. 10 and 11, we show the mobility due to only
|
1376 |
+
the IRS mechanism.
|
1377 |
+
The calculated mobilities are vi-
|
1378 |
+
tal functions of the roughness parameters and the carrier
|
1379 |
+
scattering. The existing mobility calculations reveal that,
|
1380 |
+
up to temperatures where the POP scattering mechanism
|
1381 |
+
takes over, the IRS is the dominating scattering mecha-
|
1382 |
+
nism in T2SL. The screening is included in our calcu-
|
1383 |
+
lation using Thomas-Fermi screening which lowers the
|
1384 |
+
scattering rates and increases the mobility. As illustrated
|
1385 |
+
in Fig. 10, the mobility is shown to be strongly reliant
|
1386 |
+
on the roughness height ∆, and decreases monotonically
|
1387 |
+
with increasing ∆, and is proportional to ∆−2.
|
1388 |
+
Figures 10 and 11 show that at low temperatures, the
|
1389 |
+
mobility rises since the value of ∂f
|
1390 |
+
∂ε is an ascending func-
|
1391 |
+
tion of temperature and the denominator of Eq. (26) is
|
1392 |
+
virtually constant at lower temperatures. Also, the elec-
|
1393 |
+
tron density increases at higher temperatures and hence
|
1394 |
+
the mobility drop smoothly. Figure 11 shows that the
|
1395 |
+
mobility is high for smaller values of correlation length
|
1396 |
+
Λ, and drops rapidly as the correlation length of rough-
|
1397 |
+
ness increases until it reaches a saturation point. The
|
1398 |
+
mobility reaches its maximum value at roughly 50 K for
|
1399 |
+
smaller values of Λ, and this maximum point moves to-
|
1400 |
+
ward the higher temperatures for greater values of Λ.
|
1401 |
+
The Hall mobility in InAs/GaSb T2SLs is depicted in
|
1402 |
+
Fig. 12. At temperatures above 50 K, the mobility re-
|
1403 |
+
duces as expected from a combination of the ADP and
|
1404 |
+
the POP scattering mechanisms. In T2SL, the mobility
|
1405 |
+
increases with decreasing temperature, preferable to the
|
1406 |
+
T −3/2 dependency associated with the phonon scattering.
|
1407 |
+
The greater temperature dependency of the electron mo-
|
1408 |
+
bility in InAs/GaSb-based T2SL may indicate stronger
|
1409 |
+
electron-phonon coupling than in the bulk material. The
|
1410 |
+
increased mobility near 50 K could be attributed to a
|
1411 |
+
longer scattering time or a lower electron-effective mass
|
1412 |
+
at the CB edge.
|
1413 |
+
When the Hall scattering factor rH, deviates signifi-
|
1414 |
+
cantly from unity, it indicates that to derive the elec-
|
1415 |
+
tron drift mobility from the experimentally calculated
|
1416 |
+
Hall mobility data, the Hall scattering factor must be
|
1417 |
+
precisely determined. Figure 13 shows the predicted val-
|
1418 |
+
ues of the Hall scattering factor against the temperature
|
1419 |
+
at B = 0.69 T for ND = 9 × 1017 cm−3, while Fig. 14
|
1420 |
+
depicts the Hall scattering factor as a function of tem-
|
1421 |
+
perature and the carrier concentration at B = 0.69 T.
|
1422 |
+
To the best of our knowledge, calculations of the Hall
|
1423 |
+
scattering factor in such SLs have not been performed
|
1424 |
+
yet in earlier works. The contribution of various scat-
|
1425 |
+
tering mechanisms decides the Hall scattering factor’s
|
1426 |
+
value. Figures 13 and 14 indicate that the value of rH at
|
1427 |
+
low temperatures deviates significantly from unity, while
|
1428 |
+
many researchers use one as an ideal value for a variety
|
1429 |
+
of calculations and studies, which is not accurate. The
|
1430 |
+
carrier concentration and the drift mobility may both be
|
1431 |
+
overestimated and underestimated when the Hall scatter-
|
1432 |
+
ing factor is used as unity. The Hall scattering factor, in
|
1433 |
+
our calculation, fluctuates between the values as low as
|
1434 |
+
0.3 at low temperature and electron concentration, and
|
1435 |
+
as high as 1.48 and even more at high temperature and
|
1436 |
+
electron concentration as shown in Fig. 14. Therefore,
|
1437 |
+
it is worth pointing out that, while evaluating the car-
|
1438 |
+
rier concentration and the drift mobility in such SLs, one
|
1439 |
+
must use caution.
|
1440 |
+
In this work, we calculate the precise values of the
|
1441 |
+
Hall scattering factor and show that for a doping value
|
1442 |
+
of ND = 9 × 1017 cm−3, the computed values of rH are
|
1443 |
+
0.914, 0.952 and 1.01 at temperatures of 77 K, 150 K
|
1444 |
+
and 190 K, respectively, as also depicted in Fig.
|
1445 |
+
13.
|
1446 |
+
At higher temperatures, the value of the Hall scatter-
|
1447 |
+
ing factor is more than unity, indicating that the drift
|
1448 |
+
mobility is lower than the Hall mobility, implying that
|
1449 |
+
the phonon-assisted scattering mechanisms are substan-
|
1450 |
+
tial and diminish the drift mobility. As shown in Fig.
|
1451 |
+
14, at temperatures of 30 K and 77 K, the Hall scat-
|
1452 |
+
tering factor is equal to 0.335 & 0.638 for lower doping
|
1453 |
+
concentrations of ND = 1 × 1012 cm−3 and it is equal
|
1454 |
+
to 0.369 & 0.691 with slightly higher doping concentra-
|
1455 |
+
tions of ND = 5×1015 cm−3 which signifies that the Hall
|
1456 |
+
scattering factor increases as the temperature and elec-
|
1457 |
+
tron concentrations rise, but as we increase the carrier
|
1458 |
+
concentration beyond 3 × 1017 cm−3, the Hall scattering
|
1459 |
+
factor starts decreasing. The higher electron concentra-
|
1460 |
+
tion causes a rapid variation in the Hall factor.
|
1461 |
+
V.
|
1462 |
+
CONCLUSION
|
1463 |
+
In this paper, we developed the Rode algorithm on the
|
1464 |
+
BTE in conjunction with the k.p band structure and the
|
1465 |
+
EFA for a detailed computation of the carrier mobility
|
1466 |
+
and conductivity, in order to primarily unravel two cru-
|
1467 |
+
cial insights. First, the significance of both elastic and in-
|
1468 |
+
elastic scattering mechanisms, particularly the influence
|
1469 |
+
of the IRS and POP scattering mechanisms in techno-
|
1470 |
+
logically relevant SL structures. Second, the structure
|
1471 |
+
specific Hall mobility and Hall scattering factor, which
|
1472 |
+
reveals that temperature and carrier concentrations sig-
|
1473 |
+
nificantly affect the Hall scattering factor, which devi-
|
1474 |
+
ates significantly from unity, i.e., from 0.3 to about 1.48,
|
1475 |
+
even for small magnetic fields. This reinforces the cau-
|
1476 |
+
tion that should be exercised when employing the Hall
|
1477 |
+
|
1478 |
+
12
|
1479 |
+
scattering factor in experimental estimations of drift mo-
|
1480 |
+
bilities and carrier concentrations. Our research offers a
|
1481 |
+
comprehensive microscopic understanding of carrier dy-
|
1482 |
+
namics in such technologically relevant SLs. Our model
|
1483 |
+
also provides highly accurate and precise transport pa-
|
1484 |
+
rameters beyond the RTA and hence paves the way to
|
1485 |
+
develop physics based device modules for MWIR pho-
|
1486 |
+
todetectors.
|
1487 |
+
ACKNOWLEDGMENTS
|
1488 |
+
The authors acknowledge funding from ISRO under
|
1489 |
+
the ISRO-IIT Bombay Space Technology Cell.
|
1490 |
+
[1] D. Smith and C. Mailhiot, Journal of Applied Physics
|
1491 |
+
62, 2545 (1987).
|
1492 |
+
[2] A. Rogalski, P. Martyniuk, and M. Kopytko, Applied
|
1493 |
+
physics reviews 4, 031304 (2017).
|
1494 |
+
[3] S. Mukherjee, A. Singh, A. Bodhankar, and B. Muralid-
|
1495 |
+
haran, Journal of Physics D: Applied Physics 54, 345104
|
1496 |
+
(2021).
|
1497 |
+
[4] A. Rogalski, Infrared detectors (CRC press, 2000).
|
1498 |
+
[5] A. Dehzangi, J. Li, and M. Razeghi, Light: Science &
|
1499 |
+
Applications 10, 1 (2021).
|
1500 |
+
[6] A. Rogalski, Progress in quantum electronics 27, 59
|
1501 |
+
(2003).
|
1502 |
+
[7] Y. Le Thi, Y. Kamakura, and N. Mori, Japanese Journal
|
1503 |
+
of Applied Physics 58, 044002 (2019).
|
1504 |
+
[8] P.
|
1505 |
+
Klipstein,
|
1506 |
+
Y.
|
1507 |
+
Benny,
|
1508 |
+
Y.
|
1509 |
+
Cohen,
|
1510 |
+
N.
|
1511 |
+
Fraenkel,
|
1512 |
+
R. Fraenkel, S. Gliksman, A. Glozman, I. Hirsch, O. Klin,
|
1513 |
+
L. Langof, et al., in Infrared Technology and Applications
|
1514 |
+
XLVII (SPIE, 2021), vol. 11741, pp. 102–112.
|
1515 |
+
[9] J.
|
1516 |
+
Wr´obel,
|
1517 |
+
P.
|
1518 |
+
Martyniuk,
|
1519 |
+
E.
|
1520 |
+
Plis,
|
1521 |
+
P.
|
1522 |
+
Madejczyk,
|
1523 |
+
W. Gawron, S. Krishna, and A. Rogalski, in Infrared
|
1524 |
+
Technology and Applications XXXVIII (SPIE, 2012), vol.
|
1525 |
+
8353, pp. 412–420.
|
1526 |
+
[10] N. Gautam, H. Kim, M. Kutty, E. Plis, L. Dawson, and
|
1527 |
+
S. Krishna, Applied Physics Letters 96, 231107 (2010).
|
1528 |
+
[11] G. A. Sai-Halasz, L. Esaki, and W. A. Harrison, Phys.
|
1529 |
+
Rev. B 18, 2812 (1978).
|
1530 |
+
[12] T. Manyk, K. Michalczewski, K. Murawski, K. Grodecki,
|
1531 |
+
J. Rutkowski, and P. Martyniuk, Results in Physics 11,
|
1532 |
+
1119 (2018).
|
1533 |
+
[13] A. Rogalski, P. Martyniuk, and M. Kopytko, Progress in
|
1534 |
+
Quantum Electronics 68, 100228 (2019).
|
1535 |
+
[14] D. Chow,
|
1536 |
+
R. Miles,
|
1537 |
+
J. Schulman,
|
1538 |
+
D. Collins,
|
1539 |
+
and
|
1540 |
+
T. McGill, Semiconductor Science and Technology 6, C47
|
1541 |
+
(1991).
|
1542 |
+
[15] E. A. Plis, Advances in Electronics 2014 (2014).
|
1543 |
+
[16] P. Martyniuk, J. Antoszewski, M. Martyniuk, L. Faraone,
|
1544 |
+
and A. Rogalski, Applied Physics Reviews 1, 041102
|
1545 |
+
(2014).
|
1546 |
+
[17] S. Safa, A. Asgari, and L. Faraone, Journal of Applied
|
1547 |
+
Physics 114, 053712 (2013).
|
1548 |
+
[18] S. Safa and A. Asgari, arXiv preprint arXiv:1502.02449
|
1549 |
+
(2015).
|
1550 |
+
[19] S. Safa and A. Asgari, arXiv preprint arXiv:1502.01453
|
1551 |
+
(2015).
|
1552 |
+
[20] S. Safa and A. Asgari, arXiv preprint arXiv:1504.02871
|
1553 |
+
(2015).
|
1554 |
+
[21] F. Szmulowicz, H. Haugan, S. Elhamri, and G. Brown,
|
1555 |
+
Physical Review B 84, 155307 (2011).
|
1556 |
+
[22] F. Szmulowicz and G. Brown, Applied Physics Letters
|
1557 |
+
98, 182105 (2011).
|
1558 |
+
[23] F. Szmulowicz and G. Brown, Journal of Applied Physics
|
1559 |
+
113, 014302 (2013).
|
1560 |
+
[24] G. Bastard, Physical Review B 24, 5693 (1981).
|
1561 |
+
[25] E. Conwell and V. Weisskopf, Physical review 77, 388
|
1562 |
+
(1950).
|
1563 |
+
[26] J. D. Zook, Physical Review 136, A869 (1964).
|
1564 |
+
[27] K. Kaasbjerg, K. S. Thygesen, and A.-P. Jauho, Physical
|
1565 |
+
Review B 87, 235312 (2013).
|
1566 |
+
[28] T.-Y. Tsai, K. Michalczewski, P. Martyniuk, C.-H. Wu,
|
1567 |
+
and Y.-R. Wu, Journal of Applied Physics 127, 033104
|
1568 |
+
(2020).
|
1569 |
+
[29] M. Wataya, N. Sawaki, H. Goto, I. Akasaki, H. Kano,
|
1570 |
+
and M. Hashimoto, Japanese Journal of Applied Physics
|
1571 |
+
28, 1934 (1989).
|
1572 |
+
[30] I. Dharssi, P. Butcher, and G. Warren, Superlattices and
|
1573 |
+
microstructures 9, 335 (1991).
|
1574 |
+
[31] I. Dharssi and P. Butcher, Journal of Physics: condensed
|
1575 |
+
matter 2, 4629 (1990).
|
1576 |
+
[32] D. Rode, Physical Review B 2, 1012 (1970).
|
1577 |
+
[33] D. Rode, physica status solidi (b) 55, 687 (1973).
|
1578 |
+
[34] D. Rode, in Semiconductors and semimetals (Elsevier,
|
1579 |
+
1975), vol. 10, pp. 1–89.
|
1580 |
+
[35] N. W. Ashcroft, N. D. Mermin, et al., Solid state physics.
|
1581 |
+
[36] N. D. Mermin, Physical Review B 1, 2362 (1970).
|
1582 |
+
[37] Y. Livneh, P. Klipstein, O. Klin, N. Snapi, S. Grossman,
|
1583 |
+
A. Glozman, and E. Weiss, Physical Review B 86, 235311
|
1584 |
+
(2012).
|
1585 |
+
[38] P. Klipstein, Physical Review B 81, 235314 (2010).
|
1586 |
+
[39] C. Ricciardi, M. L. Della Rocca, and M. Benfante (2020).
|
1587 |
+
[40] P.-F. Qiao, S. Mou, and S. L. Chuang, Optics express 20,
|
1588 |
+
2319 (2012).
|
1589 |
+
[41] P. Klipstein, Y. Livneh, O. Klin, S. Grossman, N. Snapi,
|
1590 |
+
A. Glozman, and E. Weiss, Infrared Physics & Technol-
|
1591 |
+
ogy 59, 53 (2013).
|
1592 |
+
[42] D. E. Aspnes and A. Studna, Physical review B 27, 985
|
1593 |
+
(1983).
|
1594 |
+
[43] S. Datta, Quantum transport: atom to transistor (Cam-
|
1595 |
+
bridge university press, 2005).
|
1596 |
+
[44] T. Garwood, N. A. Modine, and S. Krishna, Infrared
|
1597 |
+
Physics & Technology 81, 27 (2017).
|
1598 |
+
[45] Y. Wei and M. Razeghi, Physical Review B 69, 085316
|
1599 |
+
(2004).
|
1600 |
+
[46] R. Nucho and A. Madhukar, Journal of Vacuum Science
|
1601 |
+
and Technology 15, 1530 (1978).
|
1602 |
+
[47] G. C. Dente and M. L. Tilton, Journal of Applied Physics
|
1603 |
+
86, 1420 (1999).
|
1604 |
+
[48] R. Magri and A. Zunger, Physical Review B 65, 165302
|
1605 |
+
(2002).
|
1606 |
+
[49] Z. Taghipour, E. Shojaee, and S. Krishna, Journal of
|
1607 |
+
Physics: Condensed Matter 30, 325701 (2018).
|
1608 |
+
[50] G. Bastard, Physical Review B 25, 7584 (1982).
|
1609 |
+
[51] M. Altarelli, Physical review B 28, 842 (1983).
|
1610 |
+
[52] E. Kane, in Narrow Gap Semiconductors Physics and Ap-
|
1611 |
+
plications (Springer, 1980), pp. 13–31.
|
1612 |
+
|
1613 |
+
13
|
1614 |
+
[53] S. L. Chuang, Physics of photonic devices (John Wiley
|
1615 |
+
& Sons, 2012).
|
1616 |
+
[54] Y. Jiang, X. Ma, Y. Xu, and G. Song, Journal of Applied
|
1617 |
+
Physics 116, 173702 (2014).
|
1618 |
+
[55] N. K. Dhar, R. Dat, and A. K. Sood, Optoelectronics-
|
1619 |
+
Advanced Materials and Devices 1 (2013).
|
1620 |
+
[56] M. Lundstrom, Fundamentals of carrier transport (2002).
|
1621 |
+
[57] D. K. Ferry, Semiconductor transport (CRC Press, 2016).
|
1622 |
+
[58] J. Singh, Electronic and optoelectronic properties of
|
1623 |
+
semiconductor structures (Cambridge University Press,
|
1624 |
+
2007).
|
1625 |
+
[59] R. F. Pierret and G. W. Neudeck, Advanced semiconduc-
|
1626 |
+
tor fundamentals, vol. 6 (Addison-Wesley Reading, MA,
|
1627 |
+
1987).
|
1628 |
+
[60] D. Vasileska, S. M. Goodnick, and G. Klimeck, Com-
|
1629 |
+
putational Electronics: semiclassical and quantum device
|
1630 |
+
modeling and simulation (CRC press, 2017).
|
1631 |
+
[61] S. Chakrabarty, A. K. Mandia, B. Muralidharan, S. C.
|
1632 |
+
Lee, and S. Bhattacharjee, Journal of Physics:
|
1633 |
+
Con-
|
1634 |
+
densed Matter 32, 135704 (2019).
|
1635 |
+
[62] A. K. Mandia, B. Muralidharan, J.-H. Choi, S.-C. Lee,
|
1636 |
+
and S. Bhattacharjee, Computer Physics Communica-
|
1637 |
+
tions 259, 107697 (2021).
|
1638 |
+
[63] A. M. Ganose, J. Park, A. Faghaninia, R. Woods-
|
1639 |
+
Robinson, K. A. Persson, and A. Jain, Nature communi-
|
1640 |
+
cations 12, 1 (2021).
|
1641 |
+
[64] H. Brooks, in Advances in electronics and electron physics
|
1642 |
+
(Elsevier, 1955), vol. 7, pp. 85–182.
|
1643 |
+
[65] A. Faghaninia, J. W. Ager III, and C. S. Lo, Physical
|
1644 |
+
Review B 91, 235123 (2015).
|
1645 |
+
[66] K. Kothari and M. Maldovan, Scientific Reports 7, 1
|
1646 |
+
(2017).
|
1647 |
+
[67] H. Sakaki, T. Noda, K. Hirakawa, M. Tanaka, and
|
1648 |
+
T. Matsusue, Applied physics letters 51, 1934 (1987).
|
1649 |
+
[68] A. Gold, Physical Review B 35, 723 (1987).
|
1650 |
+
[69] L. Sang, S. Y. Yang, G. P. Liu, G. J. Zhao, C. B. Liu,
|
1651 |
+
C. Y. Gu, H. Y. Wei, X. L. Liu, Q. S. Zhu, and Z. G.
|
1652 |
+
Wang, IEEE transactions on electron devices 60, 2077
|
1653 |
+
(2013).
|
1654 |
+
[70] S. Goodnick, D. Ferry, C. Wilmsen, Z. Liliental, D. Fathy,
|
1655 |
+
and O. Krivanek, Physical Review B 32, 8171 (1985).
|
1656 |
+
[71] A. K. Mandia, N. A. Koshi, B. Muralidharan, S. C. Lee,
|
1657 |
+
and S. Bhattacharjee, Journal of Materials Chemistry C
|
1658 |
+
(2022).
|
1659 |
+
[72] Z. Becer, A. Bennecer, and N. Sengouga, Crystals 9, 629
|
1660 |
+
(2019).
|
1661 |
+
[73] I. Vurgaftman, J. ´a. Meyer, and L. ´a. Ram-Mohan, Jour-
|
1662 |
+
nal of applied physics 89, 5815 (2001).
|
1663 |
+
[74] M. Delmas, B. Liang, and D. L. Huffaker, in Quantum
|
1664 |
+
Sensing and Nano Electronics and Photonics XVI (In-
|
1665 |
+
ternational Society for Optics and Photonics, 2019), vol.
|
1666 |
+
10926, p. 109260G.
|
1667 |
+
[75] S. Mitra, Physical Review 132, 986 (1963).
|
1668 |
+
[76] D. Lockwood, G. Yu, and N. Rowell, Solid State Com-
|
1669 |
+
munications 136, 404 (2005).
|
1670 |
+
[77] H. Haugan, G. Brown, F. Szmulowicz, and S. Elhamri,
|
1671 |
+
in AIP Conference Proceedings (American Institute of
|
1672 |
+
Physics, 2011), vol. 1416, pp. 155–157.
|
1673 |
+
[78] R. Alchaar, J.-B. Rodriguez, L. H¨oglund, S. Naureen,
|
1674 |
+
and P. Christol, AIP Advances 9, 055012 (2019).
|
1675 |
+
|
7NE4T4oBgHgl3EQfCQsk/content/tmp_files/load_file.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
89AyT4oBgHgl3EQfdPcr/content/2301.00297v1.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:ddb75c1f0854295e8410e291f53128d195db76de07dd27ecd61a856d66b5c3e2
|
3 |
+
size 628801
|
89AyT4oBgHgl3EQfdPcr/vector_store/index.faiss
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:614ae65e313f10a679428d9e92c64e2a20bddefb927e9bdf81575cd3d5bfad79
|
3 |
+
size 1966125
|
89AyT4oBgHgl3EQfdPcr/vector_store/index.pkl
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:434cd092d5d150c77637faaa543f7294a66f988c4be9366966b2eadd9724b04e
|
3 |
+
size 77275
|
8dE1T4oBgHgl3EQfngSj/content/tmp_files/2301.03310v1.pdf.txt
ADDED
@@ -0,0 +1,693 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
IMPROVED FRONT STEEPEST DESCENT
|
2 |
+
FOR MULTI-OBJECTIVE OPTIMIZATION
|
3 |
+
Matteo Lapucci
|
4 |
+
Global Optimization Laboratory (GOL)
|
5 |
+
Department of Information Engineering
|
6 |
+
University of Florence
|
7 |
+
Via di Santa Marta, 3, 50139, Florence, Italy
|
8 | |
9 |
+
Pierluigi Mansueto
|
10 |
+
Global Optimization Laboratory (GOL)
|
11 |
+
Department of Information Engineering
|
12 |
+
University of Florence
|
13 |
+
Via di Santa Marta, 3, 50139, Florence, Italy
|
14 | |
15 |
+
ABSTRACT
|
16 |
+
In this paper, we deal with the Front Steepest Descent algorithm for multi-objective optimization.
|
17 |
+
We point out that the algorithm from the literature is often incapable, by design, of spanning large
|
18 |
+
portions of the Pareto front. We thus introduce some modifications within the algorithm aimed to
|
19 |
+
overcome this significant limitation. We prove that the asymptotic convergence properties of the
|
20 |
+
algorithm are preserved and numerically show that the proposed method significantly outperforms
|
21 |
+
the original one.
|
22 |
+
Keywords Multi-objective optimization · Steepest descent · Pareto front
|
23 |
+
Mathematics Subject Classification (2020) 90C29 · 90C30
|
24 |
+
1
|
25 |
+
Introduction
|
26 |
+
In this paper, we are interested in optimization problems of the form
|
27 |
+
min
|
28 |
+
x∈Rn F(x) = (f1(x), . . . , fm(x))T ,
|
29 |
+
(1)
|
30 |
+
where F : Rn → Rm is a vector-valued continuously differentiable function. We are thus dealing with smooth,
|
31 |
+
unconstrained multi-objective optimization problems, where many functions have to be simultaneously minimized and
|
32 |
+
Pareto’s efficiency concepts have to be considered to establish optimality. We refer the reader to [8] for an introduction
|
33 |
+
to multi-objective optimization.
|
34 |
+
Multi-objective descent methods [9–11, 16] constitute a class of algorithmic approaches designed to tackle these
|
35 |
+
problems; these approaches basically extend classical iterative optimization algorithms for scalar optimization to the
|
36 |
+
multi-objective setting. Descent methods are receiving increasing attention and have consistently become significant
|
37 |
+
alternatives to scalarization methods [6, 7, 15] and evolutionary algorithms [4]. This is particularly true for recent
|
38 |
+
versions of descent approaches that are specifically designed to handle sets of points and to construct an approximation
|
39 |
+
of the entire Pareto front, rather than a single solution.
|
40 |
+
In this short manuscript, we focus on the Front Steepest Descent (FSD) algorithm proposed in [2]. In particular, we
|
41 |
+
argue that, although being far superior than the original single point steepest descent algorithm for multi-objective
|
42 |
+
optimization [10], FSD as defined in [2] has limited exploration capabilities and it is quite frequently unable to span
|
43 |
+
large portions of the Pareto front.
|
44 |
+
We thus propose small but crucial modifications to the algorithm, that allow to turn it tremendously effective at spanning
|
45 |
+
the entire Pareto front, regardless of the starting set of points. We show that the proposed approach still enjoys the nice
|
46 |
+
convergence guarantees of the original FSD.
|
47 |
+
The rest of the paper is organized as follows: in Section 2, we summarize the FSD algorithm, recalling its convergence
|
48 |
+
properties; we then point out in Section 2.1 that in certain, common situations the algorithm is unable to span large
|
49 |
+
arXiv:2301.03310v1 [math.OC] 9 Jan 2023
|
50 |
+
|
51 |
+
Improved Front Steepest Descent for MOO
|
52 |
+
MATTEO LAPUCCI AND PIERLUIGI MANSUETO
|
53 |
+
portions of the Pareto front. In Section 3 we introduce the novel strategy for generating nondominated solutions within
|
54 |
+
FSD and we provide the convergence analysis for the resulting algorithm in Section 3.1. In Section 4, we present the
|
55 |
+
results of numerical experiments showing that the proposed modification significantly improves effectiveness and
|
56 |
+
consistency of the FSD algorithm. We finally give some concluding remarks in Section 5.
|
57 |
+
2
|
58 |
+
The Front Steepest Descent algorithm
|
59 |
+
The Front Steepest Descent algorithm [2] was designed to solve problem (1) according to Pareto’s optimality concepts.
|
60 |
+
Given the standard partial ordering in Rm, i.e.,
|
61 |
+
u ≤ v ⇐⇒ uj ≤ vj, ∀ j = 1, . . . , m,
|
62 |
+
u < v ⇐⇒ uj < vj, ∀ j = 1, . . . , m,
|
63 |
+
u ≨ v ⇐⇒ u ≤ v ∧ u ̸= v,
|
64 |
+
the aim is to find solutions ¯x ∈ Rn that satisfy the following properties, listed in decreasing order of strength:
|
65 |
+
• Pareto optimality: ∄ y ∈ Rn s.t. F(y) ≨ F(¯x);
|
66 |
+
• Weak Pareto optimality: ∄ y ∈ Rn s.t. F(y) < F(¯x);
|
67 |
+
• Pareto stationarity: min
|
68 |
+
d∈Rn
|
69 |
+
max
|
70 |
+
j=1,...,m ∇fj(¯x)T d = 0.
|
71 |
+
In fact, there typically exist many Pareto optimal solutions (the Pareto set) that account for different trade-offs between
|
72 |
+
the contrasting objectives; these trade-offs, that constitute in the objectives space the Pareto front, can a posteriori be
|
73 |
+
evaluated by the decision makers, who are thus willing to have the broadest possible range of available options.
|
74 |
+
FSD method specifically aims to construct an approximation of the entire Pareto front; the algorithm works in an iterative
|
75 |
+
fashion, maintaining at each iteration a set Xk of solutions that are mutually nondominated, i.e., for any x ∈ Xk there
|
76 |
+
is no y ∈ Xk such that F(y) ≨ F(x).
|
77 |
+
The points for the set Xk+1 are computed carrying out search steps starting from the points ˆx ∈ Xk along:
|
78 |
+
• the steepest common descent direction [10]:
|
79 |
+
v(ˆx) = arg min
|
80 |
+
d∈Rn
|
81 |
+
max
|
82 |
+
j=1,...,m ∇fj(ˆx)T d + 1
|
83 |
+
2∥d∥2;
|
84 |
+
(2)
|
85 |
+
• the steepest partial descent directions [1,2]: given I ⊂ {1, . . . , m},
|
86 |
+
vI(ˆx) = arg min
|
87 |
+
d∈Rn
|
88 |
+
max
|
89 |
+
j∈I ∇fj(ˆx)T d + 1
|
90 |
+
2∥d∥2.
|
91 |
+
(3)
|
92 |
+
The use of equality notation in the definition of steepest descent directions is justified by the uniqueness of the solution
|
93 |
+
set for the above optimization problems (the objective is strongly convex and continuous). Given any subset of objectives
|
94 |
+
I, a partial descent direction exists if
|
95 |
+
θI(ˆx) = min
|
96 |
+
d∈Rn max
|
97 |
+
j∈I ∇fj(ˆx)T d + 1
|
98 |
+
2∥d∥2 < 0;
|
99 |
+
of course, the steepest common descent direction v(ˆx) and the corresponding θ (ˆx) are considered when I = {1, . . . , m}.
|
100 |
+
Both mappings vI(ˆx) and θI(ˆx) are continuous [10].
|
101 |
+
The instructions of the FSD procedure are summarized in Algorithm 1. In brief, at each iteration k, all points in the
|
102 |
+
current set of nondominated solutions, Xk, are considered; for each one of these points, xc, a line search along the
|
103 |
+
steepest partial descent direction is carried out for any subset of objectives I ⊆ {1, . . . , m} such that θI(xc) < 0; in
|
104 |
+
addition, a subset I is only considered for xc if the point is nondominated with respect to that subset of objectives.
|
105 |
+
The line search is an Armijo-type procedure whose scheme is reported in Algorithm 2. Given a nondominated point and
|
106 |
+
a search direction w.r.t. the objectives in I, the algorithm returns a new point such that it is “sufficiently nondominated”.
|
107 |
+
The obtained point is added to the set of nondominated points, while all the points that are now dominated by it are
|
108 |
+
filtered out.
|
109 |
+
Algorithm 2 enjoys the following finite termination properties.
|
110 |
+
2
|
111 |
+
|
112 |
+
Improved Front Steepest Descent for MOO
|
113 |
+
MATTEO LAPUCCI AND PIERLUIGI MANSUETO
|
114 |
+
Algorithm 1: FrontSteepestDescent
|
115 |
+
1 Input: F : Rn → Rm, X0 set of mutually nondominated points w.r.t. F.
|
116 |
+
2 k = 0
|
117 |
+
3 while a stopping criterion is not satisfied do
|
118 |
+
4
|
119 |
+
ˆXk = Xk
|
120 |
+
5
|
121 |
+
forall xc ∈ Xk do
|
122 |
+
6
|
123 |
+
forall I ⊆ {1, . . . , m} such that
|
124 |
+
• ∄y ∈ ˆXk s.t. FI(y) ≨ FI(xc) and
|
125 |
+
• θI(xc) < 0
|
126 |
+
7
|
127 |
+
do
|
128 |
+
8
|
129 |
+
α = ArmijoLS(F(·), I, ˆXk, xc, vI(xc), θI(xc))
|
130 |
+
9
|
131 |
+
ˆXk = ˆXk \ {y ∈ ˆXk | F(xc + αvI(xc)) ≨ F(y)} ∪ {xc + αvI(xc)}
|
132 |
+
10
|
133 |
+
Xk+1 = ˆXk
|
134 |
+
11
|
135 |
+
k = k + 1
|
136 |
+
12 return Xk
|
137 |
+
Algorithm 2: ArmijoLS
|
138 |
+
1 Input: F : Rn → Rm, I ⊆ {1, . . . , m}, ˆX set of mutually nondominated points w.r.t. F, xc ∈ ˆX, vI(xc) ∈ Rn,
|
139 |
+
θI(xc) ∈ R, α0 > 0, δ ∈ (0, 1), γ ∈ (0, 1).
|
140 |
+
2 α = α0
|
141 |
+
3 Let ˆXI be the set of points in ˆX that are mutually nondominated w.r.t. FI
|
142 |
+
4 while ∃ y ∈ ˆXI s.t. FI(y) + 1γαθI(xc) < FI(xc + αvI(xc)) do
|
143 |
+
5
|
144 |
+
α = δα
|
145 |
+
6 return α
|
146 |
+
Proposition 1 ( [2, Proposition 4]). Let I ⊆ {1, . . . , m}, ˆX be a set of mutually nondominated solutions containing
|
147 |
+
xc; xc is also nondominated w.r.t. FI and it is such that θI(xc) < 0. Then, ∃ α > 0, sufficiently small, such that
|
148 |
+
FI(y) + 1γαθI(xc) ≮ FI(xc + αvI(xc)),
|
149 |
+
∀ y ∈ ˆXI,
|
150 |
+
with ˆXI being the set of points in ˆX that are mutually nondominated w.r.t. FI. Furthermore, the produced point
|
151 |
+
xc + αvI(xc) is nondominated by any point in ˆX with respect to F.
|
152 |
+
Remark 1. An improved version of Algorithm 2 was also proposed in [2], which is based on an extrapolation strategy
|
153 |
+
and allows to possibly obtain many nondominated solutions along the search direction. When used within Algorithm 1,
|
154 |
+
the extrapolation technique does not alter theoretical convergence results, but the resulting algorithm is reported to be
|
155 |
+
significantly more effective.
|
156 |
+
Now, we shall recall the convergence properties of Algorithm 1, which are based on the concept of linked sequence [14].
|
157 |
+
Definition 1. Let {Xk} be the sequence of sets of nondominated points produced by Algorithm 1. We define a linked
|
158 |
+
sequence as a sequence {xjk} such that, for any k = 1, 2, . . ., the point xjk ∈ Xk is generated at iteration k − 1 of
|
159 |
+
Algorithm 1 by the point xjk−1 ∈ Xk−1.
|
160 |
+
Proposition 2 ( [2, Proposition 5]). Let us assume that there exists x0 ∈ X0 such that
|
161 |
+
• x0 is not Pareto stationary;
|
162 |
+
• the set L(x0) = �m
|
163 |
+
j=1{x ∈ Rn | fj(x) ≤ fj(x0)} is compact.
|
164 |
+
Let {Xk} be the sequence of sets of nondominated points produced by Algorithm 1. Let {xjk} be a linked sequence,
|
165 |
+
then it admits limit points and every limit point is Pareto-stationary for problem (1).
|
166 |
+
3
|
167 |
+
|
168 |
+
Improved Front Steepest Descent for MOO
|
169 |
+
MATTEO LAPUCCI AND PIERLUIGI MANSUETO
|
170 |
+
0.0
|
171 |
+
0.5
|
172 |
+
1.0
|
173 |
+
1.5
|
174 |
+
2.0
|
175 |
+
2.5
|
176 |
+
3.0
|
177 |
+
3.5
|
178 |
+
4.0
|
179 |
+
f1
|
180 |
+
0.0
|
181 |
+
0.5
|
182 |
+
1.0
|
183 |
+
1.5
|
184 |
+
2.0
|
185 |
+
2.5
|
186 |
+
3.0
|
187 |
+
3.5
|
188 |
+
4.0
|
189 |
+
f2
|
190 |
+
(a)
|
191 |
+
0.0
|
192 |
+
0.5
|
193 |
+
1.0
|
194 |
+
1.5
|
195 |
+
2.0
|
196 |
+
2.5
|
197 |
+
3.0
|
198 |
+
3.5
|
199 |
+
4.0
|
200 |
+
f1
|
201 |
+
0.0
|
202 |
+
0.5
|
203 |
+
1.0
|
204 |
+
1.5
|
205 |
+
2.0
|
206 |
+
2.5
|
207 |
+
3.0
|
208 |
+
3.5
|
209 |
+
4.0
|
210 |
+
f2
|
211 |
+
(b)
|
212 |
+
0.0
|
213 |
+
0.5
|
214 |
+
1.0
|
215 |
+
1.5
|
216 |
+
2.0
|
217 |
+
2.5
|
218 |
+
3.0
|
219 |
+
3.5
|
220 |
+
4.0
|
221 |
+
f1
|
222 |
+
0.0
|
223 |
+
0.5
|
224 |
+
1.0
|
225 |
+
1.5
|
226 |
+
2.0
|
227 |
+
2.5
|
228 |
+
3.0
|
229 |
+
3.5
|
230 |
+
4.0
|
231 |
+
f2
|
232 |
+
(c)
|
233 |
+
0.0
|
234 |
+
0.5
|
235 |
+
1.0
|
236 |
+
1.5
|
237 |
+
2.0
|
238 |
+
2.5
|
239 |
+
3.0
|
240 |
+
3.5
|
241 |
+
4.0
|
242 |
+
f1
|
243 |
+
0.0
|
244 |
+
0.5
|
245 |
+
1.0
|
246 |
+
1.5
|
247 |
+
2.0
|
248 |
+
2.5
|
249 |
+
3.0
|
250 |
+
3.5
|
251 |
+
4.0
|
252 |
+
f2
|
253 |
+
(d)
|
254 |
+
Figure 1: Pareto fronts obtained by the FSD algorithm on the convex JOS problem (n = 5). (a) FSD starts from 1 Pareto
|
255 |
+
point; (b) FSD starts from 2 Pareto points; (c) 3 independent FSD runs, started from 3 different random points; (d) 3
|
256 |
+
independent runs of FSD with the extrapolation strategy, started from the same 3 random points as in (c).
|
257 |
+
2.1
|
258 |
+
FSD may not span the Pareto front
|
259 |
+
The FSD algorithm constitutes, in practice, a significant improvement w.r.t. the simple multi-start steepest descent
|
260 |
+
strategy for multi-objective optimization. However, in experimental settings, it is not uncommon to observe situations
|
261 |
+
where FSD is unable to retrieve large portions of the Pareto front.
|
262 |
+
Here, we highlight this shortcoming and argue that it is the direct result of algorithmic design. In particular, the first
|
263 |
+
condition at step 6 of Algorithm 1 makes the outcome of the algorithm very strongly dependent on the starting point(s).
|
264 |
+
When a point xc is considered for exploration in Algorithm 1, a partial descent direction obtained according to the
|
265 |
+
subset of objectives I ⊆ {1, . . . , m} is only considered if xc is nondominated within Xk w.r.t. FI; in other words, there
|
266 |
+
is no y ∈ Xk such that FI(y) ≨ FI(xc). This condition was required by the authors of [2] in order to establish finite
|
267 |
+
termination properties for the line search (Algorithm 2).
|
268 |
+
Unfortunately, that same condition results in a limited fraction of points in Xk to be used for starting a partial descent
|
269 |
+
search. This fact can be visualized, with very extreme outcomes, in the bi-objective case; indeed, when m = 2, for
|
270 |
+
each of the two proper subsets of indices, I1 = {1} and I2 = {2} there is only one point that satisfies the (partial)
|
271 |
+
nondominance condition: xI1 = arg minx∈Xk f1(x) and xI2 = arg minx∈Xk f2(x).
|
272 |
+
Thus, partial descent is only carried out starting from the two current extreme points in the Pareto front. Moreover,
|
273 |
+
these partial descent steps will only allow to explore, outwards, the extreme parts of the current front approximation,
|
274 |
+
whereas the other descent step will mainly drive points to Pareto stationarity; as a result, even large holes within the
|
275 |
+
current solutions set cannot be filled.
|
276 |
+
Taking the reasoning to the extreme, let us assume that the starting set of solutions already lies on the Pareto front; if the
|
277 |
+
set contains only one point, then by repeated partial descent w.r.t. I1 and I2 the entire Pareto front can be spanned quite
|
278 |
+
uniformly; this situation is depicted in Figure 1a. If, on the other hand, there are two starting solutions, possibly far
|
279 |
+
away from each other in the objective space, then only the extreme parts of the front will be spanned, while the gap
|
280 |
+
4
|
281 |
+
|
282 |
+
Improved Front Steepest Descent for MOO
|
283 |
+
MATTEO LAPUCCI AND PIERLUIGI MANSUETO
|
284 |
+
between the two points is not tackled (Figure 1b). Of course, the same reasoning applies with more than two starting
|
285 |
+
points.
|
286 |
+
The paradoxical behavior of the algorithm is such that it might be convenient to start far away from the Pareto front.
|
287 |
+
In this way, FSD may have many iterations at its disposal to increase the size of the set Xk and uniformly span the
|
288 |
+
objectives space; points are then driven to Pareto stationarity thanks to steps carried out considering I = {1, 2}.
|
289 |
+
Anyhow, the results are still influenced, somewhat randomly, by the starting solutions, as shown in Figure 1c. Moreover,
|
290 |
+
the extreme parts of the front are always spanned much more densely than the central one. We shall remark that, as the
|
291 |
+
intermediate regions of the front often provide the most interesting trade-offs to users, this is a very significant issue in
|
292 |
+
practice.
|
293 |
+
The extrapolation technique proposed in [2] might allow to partly alleviate the issue discussed here, as much more
|
294 |
+
nondominated solutions are obtained at each iteration; however, it is again the exploration of the extreme regions that is
|
295 |
+
mainly enhanced and sped up, with possibly overall counterproductive results (Figure 1d).
|
296 |
+
3
|
297 |
+
Improved Front Steepest Descent
|
298 |
+
In Algorithm 3, we report the scheme of a modified Front Steepest Descent (IFSD) algorithm that overcomes the
|
299 |
+
limitations of Algorithm 1 discussed in Section 2.1.
|
300 |
+
Algorithm 3: ImprovedFrontSteepestDescent
|
301 |
+
1 Input: F : Rn → Rm, X0 set of mutually nondominated points w.r.t. F, α0 > 0, δ ∈ (0, 1), γ ∈ (0, 1).
|
302 |
+
2 k = 0
|
303 |
+
3 while a stopping criterion is not satisfied do
|
304 |
+
4
|
305 |
+
ˆXk = Xk
|
306 |
+
5
|
307 |
+
forall xc ∈ Xk do
|
308 |
+
6
|
309 |
+
if xc ∈ ˆXk then
|
310 |
+
7
|
311 |
+
if θ(xc) < 0 then
|
312 |
+
8
|
313 |
+
αk
|
314 |
+
c = maxh=0,1,...{α0δh | F(xc + α0δhv(xc)) ≤ F(xc) + 1γα0δhθ(xc)}
|
315 |
+
9
|
316 |
+
else
|
317 |
+
10
|
318 |
+
αk
|
319 |
+
c = 0
|
320 |
+
11
|
321 |
+
zk
|
322 |
+
c = xc + αk
|
323 |
+
cv(xc)
|
324 |
+
12
|
325 |
+
ˆXk = ˆXk \ {y ∈ ˆXk | F(zk
|
326 |
+
c ) ≨ F(y)} ∪ {zk
|
327 |
+
c }
|
328 |
+
13
|
329 |
+
forall I ⊆ {1, . . . , m} s.t. θI(zk
|
330 |
+
c ) < 0 do
|
331 |
+
14
|
332 |
+
if zk
|
333 |
+
c ∈ ˆXk then
|
334 |
+
15
|
335 |
+
αI
|
336 |
+
c = maxh=0,1,...{α0δh | ∀ y ∈ ˆXk ∃j ∈ {1, . . . , m} s.t. fj(zk
|
337 |
+
c + α0δhvI(zk
|
338 |
+
c )) < fj(y)}
|
339 |
+
16
|
340 |
+
ˆXk = ˆXk \ {y ∈ ˆXk | F(zk
|
341 |
+
c + αI
|
342 |
+
cvI(zk
|
343 |
+
c )) ≨ F(y)} ∪ {zk
|
344 |
+
c + αI
|
345 |
+
cvI(zk
|
346 |
+
c )}
|
347 |
+
17
|
348 |
+
Xk+1 = ˆXk
|
349 |
+
18
|
350 |
+
k = k + 1
|
351 |
+
19 return Xk
|
352 |
+
Algorithm 3 includes a bunch of modifications w.r.t. the original FSD approach:
|
353 |
+
• for any point in Xk that is still nondominated when it is considered for exploration, a preliminary steepest
|
354 |
+
descent step is carried out; this step exploits a classical single point Armijo line search [10];
|
355 |
+
• further searches w.r.t. subsets of objectives start at the obtained point, as long as it is not dominated;
|
356 |
+
• for partial descent searches, we require the obtained point to be nondominated by all other points in ˆXk.
|
357 |
+
The idea is that, with these modifications, all points may be used to start exploration based on partial descent;
|
358 |
+
convergence of all the produced points towards stationarity is then forced by means of the “preliminary” steepest
|
359 |
+
descent step, that ensures the sufficient decrease. In the next section we prove that the algorithm is well defined and
|
360 |
+
actually produces convergent sequences of points.
|
361 |
+
5
|
362 |
+
|
363 |
+
Improved Front Steepest Descent for MOO
|
364 |
+
MATTEO LAPUCCI AND PIERLUIGI MANSUETO
|
365 |
+
3.1
|
366 |
+
Convergence analysis
|
367 |
+
In this section, we provide the formal convergence analysis for Algorithm 3.
|
368 |
+
Proposition 3. The line search at step 8 of Algorithm 3 is well defined.
|
369 |
+
Proof. The result follows from [10, Lemma 4] and by the if condition at step 7 that ensures that θ(xc) < 0.
|
370 |
+
Proposition 4. Step 15 of Algorithm 3 is well defined if zk
|
371 |
+
c is nondominated with respect to points in ˆXk.
|
372 |
+
Proof. Let y be any point in ˆXk; if F(y) = F(zk
|
373 |
+
c ), then by [10, Lemma 4] and the condition θI(zk
|
374 |
+
c ) < 0, there exists
|
375 |
+
¯α > 0 such that FI(zk
|
376 |
+
c + αvI(zk
|
377 |
+
c )) < FI(zk
|
378 |
+
c ) = FI(y) for all α < ¯α; thus there exists h sufficiently large such that
|
379 |
+
fj(zk
|
380 |
+
c +α0δhvI(zk
|
381 |
+
c )) < fj(y) for all j ∈ I. If, on the other hand, there exists j ∈ {1, . . . , m} such that fj(zk
|
382 |
+
c ) < fj(y),
|
383 |
+
then by the continuity of F there exists α = α0δh sufficiently small such that fj(zk
|
384 |
+
c + αvI(zk
|
385 |
+
c )) < fj(y). Thus, the
|
386 |
+
condition can be satisfied for all y ∈ ˆXk and αI
|
387 |
+
c is the minimum of the corresponding values of α0δh.
|
388 |
+
Proposition 5. If Xk contains mutually nondominated points with respect to F, then ˆXk contains nondominated points
|
389 |
+
at any time during iteration k; thus step 15 is always well defined and Xk+1 is finally a set of nondominated solutions.
|
390 |
+
Proof. At iteration k, the set ˆXk is initialized with the nondominated points Xk; then, it is only updated at steps 12
|
391 |
+
and 16. At step 12, either zk
|
392 |
+
c = xc, and the set is not modified, or, by the definition of αk
|
393 |
+
c, zk
|
394 |
+
c dominates xc, which in
|
395 |
+
turn was nondominated. Thus, the added point zk
|
396 |
+
c is nondominated, while all the newly dominated points are removed.
|
397 |
+
At step 16, the added point zk
|
398 |
+
c + αI
|
399 |
+
cvI(zk
|
400 |
+
c ) is nondominated by the definition of αI
|
401 |
+
c; all the newly dominated points are
|
402 |
+
removed. Thus, ˆXk always contains mutually nondominated solutions. By Proposition 4 step 15 is therefore always
|
403 |
+
well defined. Moreover, since Xk+1 = ˆXk at the end of the iteration, Xk+1 inherits the nondominance property from
|
404 |
+
ˆXk.
|
405 |
+
Lemma 1. After step 12 of Algorithm 3, zk
|
406 |
+
c belongs to ˆXk. Moreover, for all ˜k > k, there exists y ∈ X˜k such that
|
407 |
+
F(y) ≤ F(zk
|
408 |
+
c ).
|
409 |
+
Proof. The first assertion of the proposition trivially follows from the update rule of ˆXk, at step 12. Now, either
|
410 |
+
zk
|
411 |
+
c ∈ X˜k or zk
|
412 |
+
c /∈ X˜k; in the former case, we trivially have y = zk
|
413 |
+
c ; otherwise, we can notice that, by the instructions of
|
414 |
+
the algorithm, any set X˜k, ˜k > k, is the result of repeated application of steps 12 and 16, starting from ˆXk at some point
|
415 |
+
when zk
|
416 |
+
c ∈ ˆXk. When zk
|
417 |
+
c was removed from the set, a point y1 was certainly inserted such that F(y1) ≤ F(zk
|
418 |
+
c ). Then,
|
419 |
+
either y1 ∈ X˜k, or y1 was removed when a point y2 such that F(y2) ≤ F(y1) was added. By recursively applying
|
420 |
+
the reasoning, we have that there is certainly a point yt ∈ X˜k such that F(yt) ≤ F(yt−1) ≤ . . . ≤ F(y2) ≤ F(y1) ≤
|
421 |
+
F(zk
|
422 |
+
c ). This completes the proof.
|
423 |
+
Proposition 6. Let X0 be a set of mutually nondominated points and x0 ∈ X0 be a point such that the set L(x0) =
|
424 |
+
�m
|
425 |
+
j=1{x ∈ Rn | fj(x) ≤ fj(x0)} is compact. Let {Xk} be the sequence of sets of nondominated points produced by
|
426 |
+
Algorithm 3. Let {xjk} be a linked sequence, then it admits limit points and every limit point is Pareto-stationary for
|
427 |
+
problem (1).
|
428 |
+
Proof. For any k, either x0 ∈ Xk or x0 /∈ Xk. In the former case, since all points in Xk are mutually nondominated,
|
429 |
+
we certainly have xjk ∈ L(x0). Otherwise, by a similar reasoning as in the proof of Lemma 1, we have that there is a
|
430 |
+
point yk ∈ Xk such that F(yk) ≤ F(x0); since yk does not dominate xjk, we have that there exists h ∈ {1, . . . , m}
|
431 |
+
such that fh(xjk) ≤ fh(yk) ≤ fh(x0); thus, again, xjk ∈ L(x0). Therefore the entire sequence {xjk} belongs to the
|
432 |
+
compact set L(x0), and thus admits limit points.
|
433 |
+
Now, let us consider a limit point ¯x of a linked sequence {xjk}, i.e., there exists K ⊆ {1, 2, . . .} such that
|
434 |
+
lim
|
435 |
+
k→∞
|
436 |
+
k∈K
|
437 |
+
xjk = ¯x.
|
438 |
+
We assume by contradiction that θ(¯x) < 0 and thus there exists ε > 0 such that for all k ∈ K sufficiently large we have
|
439 |
+
θ(xjk) ≤ −ε < 0. Let zjk = xjk + αjkv(xjk) the point obtained at step 11 of the algorithm starting from xjk. Now,
|
440 |
+
αjk ∈ [0, α0], which is a compact set, thus there exists a further subsequence K1 ⊆ K such that αjk → ¯α ∈ [0, α0].
|
441 |
+
6
|
442 |
+
|
443 |
+
Improved Front Steepest Descent for MOO
|
444 |
+
MATTEO LAPUCCI AND PIERLUIGI MANSUETO
|
445 |
+
Moreover, function v(·) is continuous, thus v(xjk) → v(¯x) for k → ∞, k ∈ K1. Hence, taking the limits along K1 we
|
446 |
+
also get that zjk → ¯x + ¯αv(¯x) = ¯z.
|
447 |
+
By the definition of αjk and zjk (steps 8-11) we have that
|
448 |
+
F(zjk) ≤ F(xjk) + 1γαjkθ(xjk).
|
449 |
+
Taking the limits for k ∈ K1, k → ∞, recalling the continuity of θ(·), we get
|
450 |
+
F(¯z) ≤ F(¯x) + 1γ ¯αθ(¯x) ≤ F(¯x) − 1γ ¯αε.
|
451 |
+
(4)
|
452 |
+
Now, given k ∈ K1, let k1(k) be the smallest index in K1 such that k1(k) > k. By Lemma 1, there exists yjk1(k) ∈
|
453 |
+
Xk1(k) such that F(yjk1(k)) ≤ F(zjk); moreover, xjk1(k) ∈ Xk1(k); by Proposition 5, the points in Xk1(k) are mutually
|
454 |
+
nondominated, hence there exists h(k) ∈ {1, . . . , m} such that
|
455 |
+
fh(k)(xjk1(k)) ≤ fh(k)(yjk1(k)) ≤ fh(k)(zjk).
|
456 |
+
Considering a further subsequence K2 ⊆ K1 such that h(k) = h for all k ∈ K2 and taking the limits, we obtain
|
457 |
+
fh(¯x) ≤ fh(¯z).
|
458 |
+
Putting this last result together with (4), we get
|
459 |
+
fh(¯x) ≤ fh(¯z) ≤ fh(¯x) − γ ¯αε.
|
460 |
+
Since ¯α ∈ [0, α0], ε > 0 and γ > 0, the above chain of inequalities can only hold if ¯α = limk→∞,k∈K2 αjk = 0.
|
461 |
+
For all k ∈ K2 sufficiently large, we have θ(xjk) < 0 and, thus, αjk is defined at step 8. Since αjk → 0, for any
|
462 |
+
q ∈ N, for all k ∈ K2 large enough we certainly have αjk < α0δq; thus, the Armijo condition F(xjk + αv(xjk)) ≤
|
463 |
+
F(xjk) + 1γαθ(xjk) is not satisfied by α = α0δq, i.e., there exists ˜h(k) such that
|
464 |
+
f˜h(k)(xjk + α0δqv(xjk)) > f˜h(k)(xjk) + γα0δqθ(xjk).
|
465 |
+
Taking the limits along a suitable subsequence such that ˜h(k) = ˜h, we get
|
466 |
+
f˜h(¯x + α0δqv(¯x)) ≥ f˜h(¯x) + γα0δqθ(¯x).
|
467 |
+
Now, since q is arbitrary and θ(¯x) < 0, this is absurd by [10, Lemma 4]. The proof is thus complete.
|
468 |
+
4
|
469 |
+
Numerical results
|
470 |
+
In this section, we show the results of computational experiments, supporting the discussion in Sections 2-3. The code,
|
471 |
+
which was written in Python3, was executed on a computer with the following characteristics: Ubuntu 22.04, Intel
|
472 |
+
Xeon Processor E5-2430 v2 6 cores 2.50 GHz, 16 GB RAM. In order to solve instances of problems (2)-(3), the Gurobi
|
473 |
+
optimizer (version 9.5) was employed.
|
474 |
+
We compared our approach (IFSD) to the original FSD, Algorithm 1, equipped with the base line search (Algorithm 2)
|
475 |
+
or the extrapolation strategy (EFSD). The following parameters setting was used for line searches: α0 = 1, δ = 0.5, γ =
|
476 |
+
10−4.
|
477 |
+
With respect to the conceptual scheme in Algorithm 3, we employed within IFSD a strategy to limit the number of points
|
478 |
+
used for partial descent searches, in order to improve the efficiency of the overall procedure and avoid the production
|
479 |
+
of too many, very close solutions. In particular, we added a condition based on the crowding distance [4] to decide
|
480 |
+
whether a point should be considered for further exploration after the steepest descent step or not.
|
481 |
+
The benchmark used for the comparisons consists of the following unconstrained problems: CEC09_2, CEC09_3 [17],
|
482 |
+
JOS_1 [12], MAN [13] (m = 2) and CEC09_10 (m = 3) [17]. For all the problems, we considered instances with
|
483 |
+
values of n in {5, 10, 20, 30, 40, 50, 100, 200}. Moreover, each problem was tested twice, with different strategies for
|
484 |
+
the initial points: a) n points are uniformly sampled from the hyper-diagonal of a suitable box; b) only the midpoint of
|
485 |
+
the hyper-diagonal is selected. The hyper-diagonal refers to the box constituting the constraints in the bounded version
|
486 |
+
of CEC and MAN problems, whereas it is [−100, 100]n for the JOS problem.
|
487 |
+
In order to appreciate the relative performance and robustness of the approaches, we employed the performance
|
488 |
+
profiles [5]. In brief, this tool shows the probability that a metric value achieved by a method in a problem is within
|
489 |
+
a factor τ ∈ R of the best value obtained by any of the algorithms in that problem. We employed classical metrics
|
490 |
+
for multi-objective optimization: purity, Γ–spread, ∆–spread [3] and hyper-volume [18]. Purity and hyper-volume
|
491 |
+
7
|
492 |
+
|
493 |
+
Improved Front Steepest Descent for MOO
|
494 |
+
MATTEO LAPUCCI AND PIERLUIGI MANSUETO
|
495 |
+
0.0
|
496 |
+
0.5
|
497 |
+
1.0
|
498 |
+
1.5
|
499 |
+
2.0
|
500 |
+
2.5
|
501 |
+
3.0
|
502 |
+
3.5
|
503 |
+
4.0
|
504 |
+
f1
|
505 |
+
0.0
|
506 |
+
0.5
|
507 |
+
1.0
|
508 |
+
1.5
|
509 |
+
2.0
|
510 |
+
2.5
|
511 |
+
3.0
|
512 |
+
3.5
|
513 |
+
4.0
|
514 |
+
f2
|
515 |
+
(a)
|
516 |
+
0.0
|
517 |
+
0.5
|
518 |
+
1.0
|
519 |
+
1.5
|
520 |
+
2.0
|
521 |
+
2.5
|
522 |
+
3.0
|
523 |
+
3.5
|
524 |
+
4.0
|
525 |
+
f1
|
526 |
+
0.0
|
527 |
+
0.5
|
528 |
+
1.0
|
529 |
+
1.5
|
530 |
+
2.0
|
531 |
+
2.5
|
532 |
+
3.0
|
533 |
+
3.5
|
534 |
+
4.0
|
535 |
+
f2
|
536 |
+
(b)
|
537 |
+
0.0
|
538 |
+
0.5
|
539 |
+
1.0
|
540 |
+
1.5
|
541 |
+
2.0
|
542 |
+
2.5
|
543 |
+
3.0
|
544 |
+
3.5
|
545 |
+
4.0
|
546 |
+
f1
|
547 |
+
0.0
|
548 |
+
0.5
|
549 |
+
1.0
|
550 |
+
1.5
|
551 |
+
2.0
|
552 |
+
2.5
|
553 |
+
3.0
|
554 |
+
3.5
|
555 |
+
4.0
|
556 |
+
f2
|
557 |
+
(c)
|
558 |
+
Figure 2: Pareto fronts obtained by the IFSD algorithm on the convex JOS problem (n = 5) starting from different
|
559 |
+
initial points: (a) 1 Pareto point as in Figure 1a; (b) 2 Pareto points as in Figure 1b; (c) 3 independent runs from the
|
560 |
+
same random points as those of Figure 1(c)-(d).
|
561 |
+
have increasing values for better solutions: then, the corresponding profiles are produced considering the inverse of the
|
562 |
+
obtained values.
|
563 |
+
In Figure 2, the behavior of the proposed approach in the same setting as in Figure 1 is shown. In this example we can
|
564 |
+
observe that now, regardless, of the starting point(s), the entire Pareto front is effectively spanned, with not even tiny
|
565 |
+
holes.
|
566 |
+
For a more consistent assessment of algorithms performance, we report in Figure 3 the performance profiles for the
|
567 |
+
IFSD, FSD and EFSD algorithms on the entire benchmark of 80 problem instances.
|
568 |
+
We observe a remarkable superiority of the proposed approach w.r.t. the original variants of the algorithm, especially in
|
569 |
+
terms of the spread metrics, which points out that the Pareto front is indeed spanned more widely and uniformly. The
|
570 |
+
strong hypervolume performance also supports this result. As for purity metric, the three algorithms appear to be closer,
|
571 |
+
but we still observe a slight advantage of IFSD.
|
572 |
+
5
|
573 |
+
Conclusions
|
574 |
+
In this paper, we introduced an improved Front Steepest Descent algorithm with asymptotic convergence guarantees
|
575 |
+
similar as those of the original method. The novel algorithm is designed so as to overcome some empirically evident
|
576 |
+
limitation of FSD, that is often unable to span large portions of the Pareto front. Numerical evidence suggests that the
|
577 |
+
proposed procedure effectively achieves this goal.
|
578 |
+
Future work should be focused on the integration of the proposed approach and the extrapolation strategy proposed
|
579 |
+
in [2]. Moreover, the employment of the proposed approach within memetic procedures for global multi-objective
|
580 |
+
optimization [13] might be considered. Finally, the algorithm defined in this work could be extended to deal with
|
581 |
+
constrained optimization problems.
|
582 |
+
8
|
583 |
+
|
584 |
+
Improved Front Steepest Descent for MOO
|
585 |
+
MATTEO LAPUCCI AND PIERLUIGI MANSUETO
|
586 |
+
1
|
587 |
+
2
|
588 |
+
3
|
589 |
+
4
|
590 |
+
5
|
591 |
+
6
|
592 |
+
7
|
593 |
+
8
|
594 |
+
0.0
|
595 |
+
0.2
|
596 |
+
0.4
|
597 |
+
0.6
|
598 |
+
0.8
|
599 |
+
1.0
|
600 |
+
Cumulative
|
601 |
+
Purity
|
602 |
+
IFSD
|
603 |
+
FSD
|
604 |
+
EFSD
|
605 |
+
(a) Purity profile
|
606 |
+
1.00 1.25 1.50 1.75 2.00 2.25 2.50 2.75 3.00
|
607 |
+
0.0
|
608 |
+
0.2
|
609 |
+
0.4
|
610 |
+
0.6
|
611 |
+
0.8
|
612 |
+
1.0
|
613 |
+
Cumulative
|
614 |
+
Hypervolume
|
615 |
+
(b) Hypervolume profile
|
616 |
+
1
|
617 |
+
2
|
618 |
+
3
|
619 |
+
4
|
620 |
+
5
|
621 |
+
6
|
622 |
+
0.0
|
623 |
+
0.2
|
624 |
+
0.4
|
625 |
+
0.6
|
626 |
+
0.8
|
627 |
+
1.0
|
628 |
+
Cumulative
|
629 |
+
-spread
|
630 |
+
(c) Γ-spread profile
|
631 |
+
1.0
|
632 |
+
1.2
|
633 |
+
1.4
|
634 |
+
1.6
|
635 |
+
1.8
|
636 |
+
2.0
|
637 |
+
0.0
|
638 |
+
0.2
|
639 |
+
0.4
|
640 |
+
0.6
|
641 |
+
0.8
|
642 |
+
1.0
|
643 |
+
Cumulative
|
644 |
+
-spread
|
645 |
+
(d) ∆-spread profile
|
646 |
+
Figure 3: Performance profiles for the IFSD, FSD and EFSD algorithms on a benchmark of 80 multi-objective problems.
|
647 |
+
Conflict of interest
|
648 |
+
The authors declare that they have no conflict of interest.
|
649 |
+
References
|
650 |
+
[1] G. Cocchi, M. Lapucci, and P. Mansueto. Pareto front approximation through a multi-objective augmented
|
651 |
+
lagrangian method. EURO Journal on Computational Optimization, page 100008, 2021.
|
652 |
+
[2] G. Cocchi, G. Liuzzi, S. Lucidi, and M. Sciandrone. On the convergence of steepest descent methods for
|
653 |
+
multiobjective optimization. Computational Optimization and Applications, pages 1–27, 2020.
|
654 |
+
[3] A. L. Custódio, J. F. A. Madeira, A. I. F. Vaz, and L. N. Vicente. Direct multisearch for multiobjective optimization.
|
655 |
+
SIAM Journal on Optimization, 21(3):1109–1140, 2011.
|
656 |
+
[4] K. Deb, A. Pratap, S. Agarwal, and T. Meyarivan. A fast and elitist multiobjective genetic algorithm: NSGA-II.
|
657 |
+
IEEE Transactions on Evolutionary Computation, 6(2):182–197, 2002.
|
658 |
+
[5] E. D. Dolan and J. J. Moré. Benchmarking optimization software with performance profiles. Mathematical
|
659 |
+
Programming, 91(2):201–213, 2002.
|
660 |
+
[6] L. G. Drummond, N. Maculan, and B. F. Svaiter. On the choice of parameters for the weighting method in vector
|
661 |
+
optimization. Mathematical Programming, 111(1-2):201–216, 2008.
|
662 |
+
[7] G. Eichfelder. An adaptive scalarization method in multiobjective optimization. SIAM Journal on Optimization,
|
663 |
+
19(4):1694–1718, 2009.
|
664 |
+
[8] G. Eichfelder. Twenty years of continuous multiobjective optimization in the twenty-first century. EURO Journal
|
665 |
+
on Computational Optimization, 9:100014, 2021.
|
666 |
+
9
|
667 |
+
|
668 |
+
Improved Front Steepest Descent for MOO
|
669 |
+
MATTEO LAPUCCI AND PIERLUIGI MANSUETO
|
670 |
+
[9] J. Fliege, L. G. Drummond, and B. F. Svaiter. Newton’s method for multiobjective optimization. SIAM Journal on
|
671 |
+
Optimization, 20(2):602–626, 2009.
|
672 |
+
[10] J. Fliege and B. F. Svaiter. Steepest descent methods for multicriteria optimization. Mathematical Methods of
|
673 |
+
Operations Research, 51(3):479–494, 2000.
|
674 |
+
[11] M. L. N. Gonçalves, F. S. Lima, and L. F. Prudente. Globally convergent newton-type methods for multiobjective
|
675 |
+
optimization. Computational Optimization and Applications, 83(2):403–434, Nov 2022.
|
676 |
+
[12] Y. Jin, M. Olhofer, and B. Sendhoff. Dynamic weighted aggregation for evolutionary multi-objective optimization:
|
677 |
+
Why does it work and how? In Proceedings of the genetic and evolutionary computation conference, pages
|
678 |
+
1042–1049, 2001.
|
679 |
+
[13] M. Lapucci, P. Mansueto, and F. Schoen. A memetic procedure for global multi-objective optimization. Mathe-
|
680 |
+
matical Programming Computation, 2022.
|
681 |
+
[14] G. Liuzzi, S. Lucidi, and F. Rinaldi. A derivative-free approach to constrained multiobjective nonsmooth
|
682 |
+
optimization. SIAM Journal on Optimization, 26(4):2744–2774, 2016.
|
683 |
+
[15] A. Pascoletti and P. Serafini. Scalarizing vector optimization problems. Journal of Optimization Theory and
|
684 |
+
Applications, 42(4):499–524, 1984.
|
685 |
+
[16] H. Tanabe, E. H. Fukuda, and N. Yamashita. Proximal gradient methods for multiobjective optimization and their
|
686 |
+
applications. Computational Optimization and Applications, 72(2):339–361, Mar 2019.
|
687 |
+
[17] Q. Zhang, A. Zhou, S. Zhao, P. Suganthan, W. Liu, and S. Tiwari. Multiobjective optimization test instances for
|
688 |
+
the cec 2009 special session and competition. Mechanical Engineering, 01 2008.
|
689 |
+
[18] E. Zitzler and L. Thiele. Multiobjective optimization using evolutionary algorithms — a comparative case study.
|
690 |
+
In A. E. Eiben, T. Bäck, M. Schoenauer, and H.-P. Schwefel, editors, Parallel Problem Solving from Nature —
|
691 |
+
PPSN V, pages 292–301, Berlin, Heidelberg, 1998. Springer Berlin Heidelberg.
|
692 |
+
10
|
693 |
+
|
8dE1T4oBgHgl3EQfngSj/content/tmp_files/load_file.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
8dE4T4oBgHgl3EQfCwtu/content/2301.04863v1.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:0a48cb595468a4712b1971bb44d162c0289044cd35a7dfcf91a4b391f845f897
|
3 |
+
size 325307
|
8dE4T4oBgHgl3EQfCwtu/vector_store/index.faiss
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:ba16a8c0aeda513b2671c5a5eb75ac176bed51bd96a19ba5fa1b0d15f8855748
|
3 |
+
size 4194349
|
8dE4T4oBgHgl3EQfCwtu/vector_store/index.pkl
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:b8e7ad0056c8fb8d236ea7649da30b7b421b2f7cde8b19e340b8788f9d8f14f6
|
3 |
+
size 171480
|
9tE4T4oBgHgl3EQf3g1J/content/tmp_files/2301.05306v1.pdf.txt
ADDED
@@ -0,0 +1,2152 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
DRAFT VERSION JANUARY 16, 2023
|
2 |
+
Typeset using LATEX twocolumn style in AASTeX63
|
3 |
+
A Simultaneous Dual-Frequency Scintillation Arc Survey of Six Bright Canonical Pulsars Using the Upgraded Giant
|
4 |
+
Metrewave Radio Telescope
|
5 |
+
JACOB E. TURNER,1, 2 BHAL CHANDRA JOSHI,3 MAURA A. MCLAUGHLIN,1, 2 AND DANIEL R. STINEBRING4
|
6 |
+
1Department of Physics and Astronomy, West Virginia University, P.O. Box 6315, Morgantown, WV 26506, USA
|
7 |
+
2Center for Gravitational Waves and Cosmology, West Virginia University, Chestnut Ridge Research Building, Morgantown, WV 26505, USA
|
8 |
+
3National Centre for Radio Astrophysics, Tata Institute of Fundamental Research, Post Bag 3, Ganeshkhind, Pune - 411007, India
|
9 |
+
4Department of Physics and Astronomy, Oberlin College, Oberlin, OH 44074, USA
|
10 |
+
ABSTRACT
|
11 |
+
We use the Upgraded Giant Metrewave Radio Telescope to measure scintillation arc properties in six bright
|
12 |
+
canonical pulsars with simultaneous dual frequency coverage. These observations at frequencies from 300 to
|
13 |
+
750 MHz allowed for detailed analysis of arc evolution across frequency and epoch. We perform more robust
|
14 |
+
determinations of arc curvature and scattering delay frequency-dependence than allowed by single-frequency-
|
15 |
+
band-per-epoch measurements, which we find to agree with theory and previous literature. We report the dis-
|
16 |
+
covery of a strong correlation between arc asymmetry and arc curvature, potentially indicating a link between
|
17 |
+
scattering screen distance and refraction strength or the effect of asymmetric distribution of scattering material
|
18 |
+
on a scattering screen. The inclusion of a 155 minute observation allowed us to resolve the scale of scintilla-
|
19 |
+
tion variations on short timescales, which we find to be directly tied to the amount of ISM sampled over the
|
20 |
+
observation. Some of our pulsars showed either consistent or emerging asymmetries in arc curvature, indicating
|
21 |
+
instances of refraction across their lines of sight. The presence of significant features in various pulsars, such
|
22 |
+
as multiple scintillation arcs in PSR J1136+1551 and flat arclets in PSR J1509+5531, that have been found in
|
23 |
+
previous works, were also sufficiently detected. Possible evidence for a timescale over which a given scatter-
|
24 |
+
ing screen dominates signal propagation was found by tracking visible scintillation arcs in each epoch in PSR
|
25 |
+
J1136+1551. The interesting pulsar science accomplished with this upgraded telescope shows strong promise
|
26 |
+
for important future work in pulsar astronomy.
|
27 |
+
Keywords: methods: data analysis – stars: pulsars – ISM: general – ISM: structure
|
28 |
+
1. INTRODUCTION
|
29 |
+
The scintillation of pulsar emission occurs as the result of
|
30 |
+
the propagation of this emission through non-uniform distri-
|
31 |
+
butions of free electrons in the ionized interstellar medium
|
32 |
+
(IISM). This interaction results in frequency-dependent and
|
33 |
+
time-evolving variations in the flux density of the pulsar sig-
|
34 |
+
nal as measured at a detector.
|
35 |
+
When these variations are
|
36 |
+
examined across observing frequency and time in so-called
|
37 |
+
dynamic spectra, representations of the change in the pulsar
|
38 |
+
signal’s intensity across frequency and time, for a given ob-
|
39 |
+
servation, they can provide valuable insight into the structure
|
40 |
+
of these electron density variations along our line of sight
|
41 |
+
(LOS) to a given pulsar. For observations where the scin-
|
42 |
+
tles, bright patches in a dynamic spectrum resulting from
|
43 |
+
constructive interference between photons as the result of
|
44 |
+
propagation through the free electrons in the ISM, are fully
|
45 |
+
resolved in frequency, have sufficient coverage in time, and
|
46 |
+
exhibit structures over the course of observations including,
|
47 |
+
but not limited to, non-zero slopes across frequency and time,
|
48 |
+
known as scintillation drift, as well as “crisscrossing” scin-
|
49 |
+
tillation patterns, then additional information can be gained
|
50 |
+
about the ISM structure along the LOS by examining the
|
51 |
+
parabolic arcs, known as scintillation arcs, that can emerge
|
52 |
+
by examining the Fourier transform of the dynamic spec-
|
53 |
+
trum (Stinebring et al. 2001). Some current hypotheses on
|
54 |
+
the physical origins of these arcs postulate that they originate
|
55 |
+
from compressed plasma along the boundaries of 50−100 pc
|
56 |
+
size bubbles in the ISM (Stinebring et al. 2022).
|
57 |
+
Traditional measurements of scintillation arcs have typ-
|
58 |
+
ically been limited to either one observing band over all
|
59 |
+
epochs (i.e., Trang & Rickett (2007)), or alternated between
|
60 |
+
observing bands from epoch to epoch (i.e., Stinebring et al.
|
61 |
+
(2019)). While generally sufficient for most analyses, this
|
62 |
+
band limit results in a bottleneck for examining the evo-
|
63 |
+
lution of various frequency-dependent effects over shorter
|
64 |
+
timescales, including scintillation arc curvature, structures
|
65 |
+
within individual arcs, and asymmetries in both arc bright-
|
66 |
+
ness and power as a function of differential time delay. By
|
67 |
+
making use of the subarray capabilities of the Upgraded Gi-
|
68 |
+
ant Metrewave Radio Telescope (uGMRT), we can effec-
|
69 |
+
arXiv:2301.05306v1 [astro-ph.HE] 12 Jan 2023
|
70 |
+
|
71 |
+
2
|
72 |
+
J. E. TURNER ET AL.
|
73 |
+
tively create an ultra wideband receiver by setting multiple
|
74 |
+
groups of dishes to simultaneously observe at different fre-
|
75 |
+
quencies. This work is primarily data-focused and aims to
|
76 |
+
highlight the results of some multi-frequency analyses per-
|
77 |
+
formed on a small survey of six strong canonical pulsars us-
|
78 |
+
ing this approach. In Section 2 we discuss the data taken
|
79 |
+
as part of our survey. Section 3 describes the analyses per-
|
80 |
+
formed and the physical parameters extracted. Section 4 de-
|
81 |
+
tails the results of these analyses. Finally, Section 5 summa-
|
82 |
+
rizes our results and discusses possible next steps.
|
83 |
+
2. DATA
|
84 |
+
Our data were taken across across eight epochs span-
|
85 |
+
ning MJD 58987−59497 using 22 dishes split into subarrays
|
86 |
+
for simultaneous multi-frequency observations at uGMRT’s
|
87 |
+
Band 3 and Band 4, centered at 400 MHz and 650 MHz,
|
88 |
+
respectively, each with 200 MHz of bandwidth. This simul-
|
89 |
+
taneous low-frequency accessibility is comparable to instru-
|
90 |
+
ments like CHIME that can observe continuously between
|
91 |
+
400-800 MHz and better than instruments such as the Green
|
92 |
+
Bank Telescope, which, while having a wide range of low
|
93 |
+
frequency coverage, can only observe below one GHz with
|
94 |
+
at most 240 MHz of bandwidth at frequencies close to one
|
95 |
+
GHz and less than 200 MHz of bandwidth in lower frequency
|
96 |
+
ranges. Observations were also made at Band 5 centered
|
97 |
+
at 1360 MHz, although due to a combination of RFI and
|
98 |
+
low S/N no scintles were detectable in the dynamic spec-
|
99 |
+
tra. The observing bands were split into 4096 49 kHz wide
|
100 |
+
frequency channels and observed with 10 second subintegra-
|
101 |
+
tions. These data were flux calibrated using observations of
|
102 |
+
either 3C147 or 3C286 taken at the beginning of every ob-
|
103 |
+
serving session and every pulsar was phase calibrated with
|
104 |
+
a nearby source for five minutes once every 40 minutes of
|
105 |
+
observing time on the pulsar. Two to three pulsars were ob-
|
106 |
+
served at each epoch for 40 minutes each, except for MJD
|
107 |
+
59497, where three pulsars were observed for 155 minutes
|
108 |
+
each. As a result of the phase calibration, each of those obser-
|
109 |
+
vations were comprised of three 40 minute sub-observations
|
110 |
+
plus an additional 20 minute sub-observation.
|
111 |
+
3. ANALYSIS
|
112 |
+
All observations were processed to extract their dynamic
|
113 |
+
spectra by calculating the intensity, S, of the pulsar’s signal
|
114 |
+
at each observing frequency, ν, and time, t, via
|
115 |
+
S(ν, t) = Pon(ν, t) − Poff(ν, t)
|
116 |
+
Pbandpass(ν, t)
|
117 |
+
,
|
118 |
+
(1)
|
119 |
+
where Pbandpass is the total power of the observation as a
|
120 |
+
function of observing frequency and time, and Pon and Poff
|
121 |
+
are the power in all on- and off-pulse components, respec-
|
122 |
+
tively, as a function of frequency and time. Each dynamic
|
123 |
+
spectrum was then broken up into four 50 MHz spectra to
|
124 |
+
allow for more in-depth frequency-dependent analyses and
|
125 |
+
manually zapped by examining dynamic spectra data arrays
|
126 |
+
and removing pixels that were brighter than the brightest
|
127 |
+
scintle maxima.
|
128 |
+
Secondary spectra were then created by
|
129 |
+
taking the absolute square of the Fourier transform (i.e., the
|
130 |
+
power spectrum) of the corresponding dynamic spectrum and
|
131 |
+
converting it to units of dB. The primary (brightest) scintilla-
|
132 |
+
tion arcs on the positive and negative side of each secondary
|
133 |
+
spectrum’s fringe frequency axis were then found via sepa-
|
134 |
+
rate fν = ηf 2
|
135 |
+
t fits, where fν is the differential time delay, η
|
136 |
+
is the arc curvature, and ft is the fringe frequency.
|
137 |
+
We also determined scintillation parameters by using the
|
138 |
+
python package Pypulse (Lam 2017) to create the 2D au-
|
139 |
+
tocorrelation functions (ACFs) of each dynamic spectrum
|
140 |
+
and fit 2D Gaussians to these ACFs to determine their scin-
|
141 |
+
tillation bandwidth, ∆νd, defined as the half-width at half-
|
142 |
+
maximum (HWHM) along the frequency axis of the ACF at
|
143 |
+
lag 0, scintillation timescale, ∆td, defined as the half-width
|
144 |
+
at e−1 along the time axis at ACF lag 0, and scintillation
|
145 |
+
drift rate, dν/dt, defined as the rotation of the 2D Gaussian
|
146 |
+
fit to the 2D ACF in the plane of the frequency and time lags.
|
147 |
+
For our scattering delay scaling index analysis, our measured
|
148 |
+
scintillation bandwidths were converted to scattering delays
|
149 |
+
using
|
150 |
+
2π∆νdτ = C1,
|
151 |
+
(2)
|
152 |
+
where C1 is a dimensionless quantity between 0.6 − 1.5 that
|
153 |
+
depends on the spectrum of the electron density fluctuations
|
154 |
+
and geometry of the medium (Cordes & Rickett 1998). For
|
155 |
+
this work we use C1 = 1.
|
156 |
+
4. RESULTS & DISCUSSION
|
157 |
+
Measured arc curvatures and their corresponding dynamic
|
158 |
+
spectrum scintillation drift rates can be found in Table 1. All
|
159 |
+
curvatures and their uncertainties have been scaled to their
|
160 |
+
corresponding value at 1 GHz assuming a ν−2 frequency de-
|
161 |
+
pendence (Hill et al. 2003). Here errors on the arc curva-
|
162 |
+
tures represent fitting errors from the linear least squares fit.
|
163 |
+
Some pulsars on MJD 59497 have multiple curvature mea-
|
164 |
+
surements at a given frequency, which is the result of this
|
165 |
+
epoch being 155 minutes instead of the 40 minutes of the
|
166 |
+
other observations. As a result, a new η was measured after
|
167 |
+
every 40 minutes since these observations were broken up
|
168 |
+
into 40 minute chunks separated by five minute phase cali-
|
169 |
+
brations. On days where measurements are given for the left
|
170 |
+
or right arm only, arcs on the other side of the fringe fre-
|
171 |
+
quency axis may have been present, but were unmeasureable
|
172 |
+
due to either having insufficient extension along the differ-
|
173 |
+
ential delay axis, insufficient flux relative to the background
|
174 |
+
noise, being too diffuse, being too close to central spike in
|
175 |
+
flux that commonly occurs around a fringe frequency of 0
|
176 |
+
mHz, or some combination of these factors.
|
177 |
+
|
178 |
+
SIMULTANEOUS DUAL-FREQUENCY SCINTILLATION ARC SURVEY
|
179 |
+
3
|
180 |
+
Table 1. Pulsar Scintillation Arc Curvatures and Drift Rates
|
181 |
+
Pulsar
|
182 |
+
MJD
|
183 |
+
Frequency
|
184 |
+
ηL
|
185 |
+
σηL
|
186 |
+
ηR
|
187 |
+
σηR
|
188 |
+
dν/dt
|
189 |
+
σdν/dt
|
190 |
+
(MHz)
|
191 |
+
(s3)
|
192 |
+
(s3)
|
193 |
+
(s3)
|
194 |
+
(s3)
|
195 |
+
(MHz/min)
|
196 |
+
(MHz/min)
|
197 |
+
J0630–2834
|
198 |
+
58987
|
199 |
+
325
|
200 |
+
—
|
201 |
+
—
|
202 |
+
0.2071
|
203 |
+
0.0069
|
204 |
+
–0.0164
|
205 |
+
0.0009
|
206 |
+
J0630–2834
|
207 |
+
58987
|
208 |
+
375
|
209 |
+
—
|
210 |
+
—
|
211 |
+
0.2331
|
212 |
+
0.0160
|
213 |
+
–0.0676
|
214 |
+
0.0097
|
215 |
+
J0630–2834
|
216 |
+
58987
|
217 |
+
425
|
218 |
+
—
|
219 |
+
—
|
220 |
+
0.2932
|
221 |
+
0.0223
|
222 |
+
–0.0343
|
223 |
+
0.0027
|
224 |
+
J0630–2834
|
225 |
+
58987
|
226 |
+
475
|
227 |
+
—
|
228 |
+
—
|
229 |
+
0.2037
|
230 |
+
0.0207
|
231 |
+
–0.0574
|
232 |
+
0.0059
|
233 |
+
J0630–2834
|
234 |
+
58987
|
235 |
+
575
|
236 |
+
—
|
237 |
+
—
|
238 |
+
0.1220
|
239 |
+
0.0061
|
240 |
+
0.0076
|
241 |
+
0.0025
|
242 |
+
J0630–2834
|
243 |
+
58987
|
244 |
+
625
|
245 |
+
—
|
246 |
+
—
|
247 |
+
0.1233
|
248 |
+
0.0049
|
249 |
+
–0.0779
|
250 |
+
0.0097
|
251 |
+
J0630–2834
|
252 |
+
58987
|
253 |
+
675
|
254 |
+
—
|
255 |
+
—
|
256 |
+
0.1553
|
257 |
+
0.0058
|
258 |
+
0.0818
|
259 |
+
0.0118
|
260 |
+
J0630–2834
|
261 |
+
58987
|
262 |
+
725
|
263 |
+
—
|
264 |
+
—
|
265 |
+
0.2566
|
266 |
+
0.0162
|
267 |
+
0.2685
|
268 |
+
0.0196
|
269 |
+
J1136+1551
|
270 |
+
58987
|
271 |
+
325
|
272 |
+
0.0154
|
273 |
+
0.0007
|
274 |
+
0.0238
|
275 |
+
0.0006
|
276 |
+
—
|
277 |
+
—
|
278 |
+
J1136+1551
|
279 |
+
58987
|
280 |
+
375
|
281 |
+
0.0198
|
282 |
+
0.0009
|
283 |
+
0.0231
|
284 |
+
0.0005
|
285 |
+
0.0202
|
286 |
+
0.0067
|
287 |
+
J1136+1551
|
288 |
+
58987
|
289 |
+
425
|
290 |
+
0.0195
|
291 |
+
0.0010
|
292 |
+
0.0225
|
293 |
+
0.0004
|
294 |
+
–0.0287
|
295 |
+
0.0074
|
296 |
+
J1136+1551
|
297 |
+
58987
|
298 |
+
575
|
299 |
+
0.0214
|
300 |
+
0.0005
|
301 |
+
0.0218
|
302 |
+
0.0003
|
303 |
+
–0.0173
|
304 |
+
0.0067
|
305 |
+
J1136+1551
|
306 |
+
58987
|
307 |
+
625
|
308 |
+
0.0202
|
309 |
+
0.0007
|
310 |
+
0.0229
|
311 |
+
0.0002
|
312 |
+
—
|
313 |
+
—
|
314 |
+
J1136+1551
|
315 |
+
58987
|
316 |
+
675
|
317 |
+
0.0199
|
318 |
+
0.0005
|
319 |
+
0.0249
|
320 |
+
0.0003
|
321 |
+
–0.0322
|
322 |
+
0.0250
|
323 |
+
J1136+1551
|
324 |
+
58987
|
325 |
+
725
|
326 |
+
0.0203
|
327 |
+
0.0007
|
328 |
+
0.0282
|
329 |
+
0.0006
|
330 |
+
0.00004
|
331 |
+
0.7446
|
332 |
+
J1136+1551
|
333 |
+
58991
|
334 |
+
325
|
335 |
+
0.0126
|
336 |
+
0.0004
|
337 |
+
0.0234
|
338 |
+
0.0005
|
339 |
+
0.0048
|
340 |
+
0.0093
|
341 |
+
J1136+1551
|
342 |
+
58991
|
343 |
+
375
|
344 |
+
0.0149
|
345 |
+
0.0007
|
346 |
+
0.0253
|
347 |
+
0.0007
|
348 |
+
0.2686
|
349 |
+
0.0128
|
350 |
+
J1136+1551
|
351 |
+
58991
|
352 |
+
425
|
353 |
+
0.0167
|
354 |
+
0.0009
|
355 |
+
0.0250
|
356 |
+
0.0006
|
357 |
+
—
|
358 |
+
—
|
359 |
+
J1136+1551
|
360 |
+
58991
|
361 |
+
475
|
362 |
+
0.0183
|
363 |
+
0.0007
|
364 |
+
0.0225
|
365 |
+
0.0005
|
366 |
+
–0.0402
|
367 |
+
0.0123
|
368 |
+
J1136+1551
|
369 |
+
58991
|
370 |
+
575
|
371 |
+
0.0165
|
372 |
+
0.0005
|
373 |
+
0.0254
|
374 |
+
0.0005
|
375 |
+
0.0097
|
376 |
+
0.0026
|
377 |
+
J1136+1551
|
378 |
+
58991
|
379 |
+
625
|
380 |
+
0.0178
|
381 |
+
0.0008
|
382 |
+
0.0271
|
383 |
+
0.0005
|
384 |
+
–0.0088
|
385 |
+
0.0034
|
386 |
+
J1136+1551
|
387 |
+
58991
|
388 |
+
675
|
389 |
+
0.0173
|
390 |
+
0.0007
|
391 |
+
0.0261
|
392 |
+
0.0004
|
393 |
+
—
|
394 |
+
—
|
395 |
+
J1136+1551
|
396 |
+
58991
|
397 |
+
725
|
398 |
+
0.0171
|
399 |
+
0.0007
|
400 |
+
0.0239
|
401 |
+
0.0003
|
402 |
+
0.00003
|
403 |
+
0.4211
|
404 |
+
J1136+1551
|
405 |
+
59115
|
406 |
+
325
|
407 |
+
0.0084
|
408 |
+
0.0002
|
409 |
+
0.0099
|
410 |
+
0.0002
|
411 |
+
0.2219
|
412 |
+
0.0095
|
413 |
+
J1136+1551
|
414 |
+
59115
|
415 |
+
375
|
416 |
+
0.0085
|
417 |
+
0.0003
|
418 |
+
0.0116
|
419 |
+
0.0003
|
420 |
+
0.1232
|
421 |
+
0.0115
|
422 |
+
J1136+1551
|
423 |
+
59115
|
424 |
+
425
|
425 |
+
0.0095
|
426 |
+
0.0005
|
427 |
+
0.0139
|
428 |
+
0.0004
|
429 |
+
—
|
430 |
+
—
|
431 |
+
J1136+1551
|
432 |
+
59115
|
433 |
+
475
|
434 |
+
0.0092
|
435 |
+
0.0005
|
436 |
+
0.0129
|
437 |
+
0.0004
|
438 |
+
0.0869
|
439 |
+
0.0079
|
440 |
+
J1136+1551
|
441 |
+
59115
|
442 |
+
575
|
443 |
+
0.0095
|
444 |
+
0.0003
|
445 |
+
0.0111
|
446 |
+
0.0002
|
447 |
+
0.0057
|
448 |
+
0.0014
|
449 |
+
J1136+1551
|
450 |
+
59115
|
451 |
+
625
|
452 |
+
0.0135
|
453 |
+
0.0007
|
454 |
+
0.0141
|
455 |
+
0.0006
|
456 |
+
—
|
457 |
+
—
|
458 |
+
J1136+1551
|
459 |
+
59115
|
460 |
+
675
|
461 |
+
0.0143
|
462 |
+
0.0004
|
463 |
+
0.0154
|
464 |
+
0.0003
|
465 |
+
0.0159
|
466 |
+
0.0057
|
467 |
+
J1136+1551
|
468 |
+
59115
|
469 |
+
725
|
470 |
+
0.0130
|
471 |
+
0.0005
|
472 |
+
0.0160
|
473 |
+
0.0005
|
474 |
+
0.0109
|
475 |
+
0.0036
|
476 |
+
J1136+1551
|
477 |
+
59497
|
478 |
+
325
|
479 |
+
0.0065
|
480 |
+
0.0002
|
481 |
+
0.0070
|
482 |
+
0.0003
|
483 |
+
–0.1251
|
484 |
+
0.0104
|
485 |
+
J1136+1551
|
486 |
+
59497
|
487 |
+
375
|
488 |
+
0.0078
|
489 |
+
0.0004
|
490 |
+
0.0077
|
491 |
+
0.0005
|
492 |
+
–0.0554
|
493 |
+
0.0069
|
494 |
+
J1136+1551
|
495 |
+
59497
|
496 |
+
425
|
497 |
+
0.0079
|
498 |
+
0.0002
|
499 |
+
0.0072
|
500 |
+
0.0002
|
501 |
+
–0.0119
|
502 |
+
0.0019
|
503 |
+
J1136+1551
|
504 |
+
59497
|
505 |
+
475
|
506 |
+
0.0070
|
507 |
+
0.0003
|
508 |
+
0.0068
|
509 |
+
0.0004
|
510 |
+
–0.0293
|
511 |
+
0.0044
|
512 |
+
J1136+1551
|
513 |
+
59497
|
514 |
+
325
|
515 |
+
0.0070
|
516 |
+
0.0001
|
517 |
+
0.0067
|
518 |
+
0.0002
|
519 |
+
0.0076
|
520 |
+
0.0030
|
521 |
+
J1136+1551
|
522 |
+
59497
|
523 |
+
375
|
524 |
+
0.0077
|
525 |
+
0.0002
|
526 |
+
0.0068
|
527 |
+
0.0002
|
528 |
+
0.2637
|
529 |
+
0.0498
|
530 |
+
J1136+1551
|
531 |
+
59497
|
532 |
+
425
|
533 |
+
0.0072
|
534 |
+
0.0002
|
535 |
+
0.0076
|
536 |
+
0.0002
|
537 |
+
–0.0544
|
538 |
+
0.0066
|
539 |
+
Table 1 continued
|
540 |
+
|
541 |
+
4
|
542 |
+
J. E. TURNER ET AL.
|
543 |
+
Table 1 (continued)
|
544 |
+
Pulsar
|
545 |
+
MJD
|
546 |
+
Frequency
|
547 |
+
ηL
|
548 |
+
σηL
|
549 |
+
ηR
|
550 |
+
σηR
|
551 |
+
dν/dt
|
552 |
+
σdν/dt
|
553 |
+
(MHz)
|
554 |
+
(s3)
|
555 |
+
(s3)
|
556 |
+
(s3)
|
557 |
+
(s3)
|
558 |
+
(MHz/min)
|
559 |
+
(MHz/min)
|
560 |
+
J1136+1551
|
561 |
+
59497
|
562 |
+
475
|
563 |
+
0.0069
|
564 |
+
0.0001
|
565 |
+
0.0067
|
566 |
+
0.0002
|
567 |
+
–0.0302
|
568 |
+
0.0045
|
569 |
+
J1136+1551
|
570 |
+
59497
|
571 |
+
325
|
572 |
+
0.0075
|
573 |
+
0.0002
|
574 |
+
0.0075
|
575 |
+
0.0002
|
576 |
+
–0.0651
|
577 |
+
0.0058
|
578 |
+
J1136+1551
|
579 |
+
59497
|
580 |
+
375
|
581 |
+
0.0076
|
582 |
+
0.0002
|
583 |
+
0.0076
|
584 |
+
0.0003
|
585 |
+
–0.0877
|
586 |
+
0.0175
|
587 |
+
J1136+1551
|
588 |
+
59497
|
589 |
+
425
|
590 |
+
0.0082
|
591 |
+
0.0002
|
592 |
+
0.0075
|
593 |
+
0.0002
|
594 |
+
–0.0656
|
595 |
+
0.0064
|
596 |
+
J1136+1551
|
597 |
+
59497
|
598 |
+
475
|
599 |
+
0.0067
|
600 |
+
0.0002
|
601 |
+
0.0074
|
602 |
+
0.0003
|
603 |
+
–0.0417
|
604 |
+
0.0053
|
605 |
+
J1136+1551
|
606 |
+
59497
|
607 |
+
575
|
608 |
+
0.0063
|
609 |
+
0.0004
|
610 |
+
0.0079
|
611 |
+
0.0013
|
612 |
+
–0.0977
|
613 |
+
0.0507
|
614 |
+
J1136+1551
|
615 |
+
59497
|
616 |
+
675
|
617 |
+
0.0059
|
618 |
+
0.0004
|
619 |
+
0.0075
|
620 |
+
0.0007
|
621 |
+
—
|
622 |
+
—
|
623 |
+
J1136+1551
|
624 |
+
59497
|
625 |
+
725
|
626 |
+
0.0057
|
627 |
+
0.0005
|
628 |
+
0.0068
|
629 |
+
0.0008
|
630 |
+
—
|
631 |
+
—
|
632 |
+
J1509+5531
|
633 |
+
58987
|
634 |
+
575
|
635 |
+
0.3155
|
636 |
+
0.0191
|
637 |
+
0.1798
|
638 |
+
0.0063
|
639 |
+
—
|
640 |
+
—
|
641 |
+
J1509+5531
|
642 |
+
58987
|
643 |
+
625
|
644 |
+
0.3642
|
645 |
+
0.0184
|
646 |
+
0.2021
|
647 |
+
0.0060
|
648 |
+
–0.0284
|
649 |
+
0.0224
|
650 |
+
J1509+5531
|
651 |
+
58987
|
652 |
+
675
|
653 |
+
0.3410
|
654 |
+
0.0207
|
655 |
+
0.1978
|
656 |
+
0.0078
|
657 |
+
–1.5130
|
658 |
+
0.0117
|
659 |
+
J1509+5531
|
660 |
+
59064
|
661 |
+
575
|
662 |
+
0.2611
|
663 |
+
0.0147
|
664 |
+
0.2495
|
665 |
+
0.0116
|
666 |
+
0.0015
|
667 |
+
0.0030
|
668 |
+
J1509+5531
|
669 |
+
59064
|
670 |
+
625
|
671 |
+
0.2890
|
672 |
+
0.0170
|
673 |
+
0.2767
|
674 |
+
0.0118
|
675 |
+
—
|
676 |
+
—
|
677 |
+
J1509+5531
|
678 |
+
59064
|
679 |
+
675
|
680 |
+
0.2736
|
681 |
+
0.0181
|
682 |
+
0.2714
|
683 |
+
0.0128
|
684 |
+
0.0039
|
685 |
+
0.0016
|
686 |
+
J1509+5531
|
687 |
+
59064
|
688 |
+
725
|
689 |
+
0.2921
|
690 |
+
0.0186
|
691 |
+
0.2930
|
692 |
+
0.0142
|
693 |
+
0.1192
|
694 |
+
0.0728
|
695 |
+
J1509+5531
|
696 |
+
59115
|
697 |
+
575
|
698 |
+
0.0852
|
699 |
+
0.0029
|
700 |
+
0.0928
|
701 |
+
0.0037
|
702 |
+
—
|
703 |
+
—
|
704 |
+
J1509+5531
|
705 |
+
59115
|
706 |
+
625
|
707 |
+
0.0868
|
708 |
+
0.0029
|
709 |
+
0.0964
|
710 |
+
0.0044
|
711 |
+
0.0173
|
712 |
+
0.0066
|
713 |
+
J1509+5531
|
714 |
+
59115
|
715 |
+
675
|
716 |
+
0.0958
|
717 |
+
0.0031
|
718 |
+
0.0908
|
719 |
+
0.0044
|
720 |
+
–0.0970
|
721 |
+
0.0628
|
722 |
+
J1509+5531
|
723 |
+
59115
|
724 |
+
725
|
725 |
+
0.1074
|
726 |
+
0.0026
|
727 |
+
0.0872
|
728 |
+
0.0030
|
729 |
+
—
|
730 |
+
—
|
731 |
+
J1509+5531
|
732 |
+
59497
|
733 |
+
575
|
734 |
+
0.0992
|
735 |
+
0.0034
|
736 |
+
0.1139
|
737 |
+
0.0045
|
738 |
+
–0.9922
|
739 |
+
0.0226
|
740 |
+
J1509+5531
|
741 |
+
59497
|
742 |
+
625
|
743 |
+
0.1057
|
744 |
+
0.0032
|
745 |
+
0.1257
|
746 |
+
0.0043
|
747 |
+
0.0186
|
748 |
+
0.0140
|
749 |
+
J1509+5531
|
750 |
+
59497
|
751 |
+
675
|
752 |
+
0.1088
|
753 |
+
0.0033
|
754 |
+
0.1160
|
755 |
+
0.0035
|
756 |
+
—
|
757 |
+
—
|
758 |
+
J1509+5531
|
759 |
+
59497
|
760 |
+
725
|
761 |
+
0.0973
|
762 |
+
0.0026
|
763 |
+
0.1337
|
764 |
+
0.0036
|
765 |
+
0.0517
|
766 |
+
0.0395
|
767 |
+
J1509+5531
|
768 |
+
59497
|
769 |
+
575
|
770 |
+
0.0706
|
771 |
+
0.0028
|
772 |
+
0.1054
|
773 |
+
0.0047
|
774 |
+
—
|
775 |
+
—
|
776 |
+
J1509+5531
|
777 |
+
59497
|
778 |
+
625
|
779 |
+
0.0741
|
780 |
+
0.0026
|
781 |
+
0.1101
|
782 |
+
0.0046
|
783 |
+
0.0059
|
784 |
+
0.0047
|
785 |
+
J1509+5531
|
786 |
+
59497
|
787 |
+
675
|
788 |
+
0.0782
|
789 |
+
0.0022
|
790 |
+
0.1200
|
791 |
+
0.0047
|
792 |
+
0.0109
|
793 |
+
0.0086
|
794 |
+
J1509+5531
|
795 |
+
59497
|
796 |
+
725
|
797 |
+
0.0808
|
798 |
+
0.0021
|
799 |
+
0.1265
|
800 |
+
0.0040
|
801 |
+
—
|
802 |
+
—
|
803 |
+
J1509+5531
|
804 |
+
59497
|
805 |
+
675
|
806 |
+
0.0606
|
807 |
+
0.0020
|
808 |
+
0.1194
|
809 |
+
0.0042
|
810 |
+
—
|
811 |
+
—
|
812 |
+
J1645–0317
|
813 |
+
59074
|
814 |
+
575
|
815 |
+
0.0832
|
816 |
+
0.0051
|
817 |
+
—
|
818 |
+
—
|
819 |
+
0.2015
|
820 |
+
0.0091
|
821 |
+
J1645–0317
|
822 |
+
59074
|
823 |
+
625
|
824 |
+
0.0885
|
825 |
+
0.0059
|
826 |
+
—
|
827 |
+
—
|
828 |
+
–0.1688
|
829 |
+
0.0098
|
830 |
+
J1645–0317
|
831 |
+
59074
|
832 |
+
675
|
833 |
+
0.0806
|
834 |
+
0.0063
|
835 |
+
—
|
836 |
+
—
|
837 |
+
–0.1812
|
838 |
+
0.0091
|
839 |
+
J1645–0317
|
840 |
+
59074
|
841 |
+
725
|
842 |
+
0.0832
|
843 |
+
0.0061
|
844 |
+
—
|
845 |
+
—
|
846 |
+
–0.2235
|
847 |
+
0.0105
|
848 |
+
J1932+1059
|
849 |
+
58997
|
850 |
+
325
|
851 |
+
0.0382
|
852 |
+
0.0030
|
853 |
+
0.0331
|
854 |
+
0.0018
|
855 |
+
–0.1092
|
856 |
+
0.0227
|
857 |
+
J1932+1059
|
858 |
+
58997
|
859 |
+
375
|
860 |
+
0.0358
|
861 |
+
0.0016
|
862 |
+
0.0364
|
863 |
+
0.0020
|
864 |
+
—
|
865 |
+
—
|
866 |
+
J1932+1059
|
867 |
+
58997
|
868 |
+
425
|
869 |
+
0.0346
|
870 |
+
0.0006
|
871 |
+
0.0335
|
872 |
+
0.0007
|
873 |
+
–0.0224
|
874 |
+
0.0086
|
875 |
+
J1932+1059
|
876 |
+
58997
|
877 |
+
475
|
878 |
+
0.0365
|
879 |
+
0.0007
|
880 |
+
0.0335
|
881 |
+
0.0005
|
882 |
+
0.1987
|
883 |
+
0.0427
|
884 |
+
J1932+1059
|
885 |
+
58997
|
886 |
+
575
|
887 |
+
0.0351
|
888 |
+
0.0005
|
889 |
+
0.0360
|
890 |
+
0.0004
|
891 |
+
0.0181
|
892 |
+
0.0093
|
893 |
+
J1932+1059
|
894 |
+
58997
|
895 |
+
625
|
896 |
+
0.0366
|
897 |
+
0.0005
|
898 |
+
0.0335
|
899 |
+
0.0004
|
900 |
+
0.0614
|
901 |
+
0.0352
|
902 |
+
J1932+1059
|
903 |
+
58997
|
904 |
+
675
|
905 |
+
0.0359
|
906 |
+
0.0010
|
907 |
+
0.0358
|
908 |
+
0.0010
|
909 |
+
–0.0062
|
910 |
+
0.0016
|
911 |
+
J1932+1059
|
912 |
+
58997
|
913 |
+
725
|
914 |
+
0.0373
|
915 |
+
0.0007
|
916 |
+
0.0348
|
917 |
+
0.0012
|
918 |
+
–0.0074
|
919 |
+
0.0022
|
920 |
+
Table 1 continued
|
921 |
+
|
922 |
+
SIMULTANEOUS DUAL-FREQUENCY SCINTILLATION ARC SURVEY
|
923 |
+
5
|
924 |
+
Table 1 (continued)
|
925 |
+
Pulsar
|
926 |
+
MJD
|
927 |
+
Frequency
|
928 |
+
ηL
|
929 |
+
σηL
|
930 |
+
ηR
|
931 |
+
σηR
|
932 |
+
dν/dt
|
933 |
+
σdν/dt
|
934 |
+
(MHz)
|
935 |
+
(s3)
|
936 |
+
(s3)
|
937 |
+
(s3)
|
938 |
+
(s3)
|
939 |
+
(MHz/min)
|
940 |
+
(MHz/min)
|
941 |
+
J1932+1059
|
942 |
+
59062
|
943 |
+
325
|
944 |
+
0.0330
|
945 |
+
0.0006
|
946 |
+
0.0271
|
947 |
+
0.0004
|
948 |
+
0.0669
|
949 |
+
0.0111
|
950 |
+
J1932+1059
|
951 |
+
59062
|
952 |
+
375
|
953 |
+
0.0352
|
954 |
+
0.0007
|
955 |
+
0.0285
|
956 |
+
0.0008
|
957 |
+
0.1331
|
958 |
+
0.0219
|
959 |
+
J1932+1059
|
960 |
+
59062
|
961 |
+
425
|
962 |
+
0.0347
|
963 |
+
0.0005
|
964 |
+
0.0293
|
965 |
+
0.0004
|
966 |
+
–0.0326
|
967 |
+
0.0256
|
968 |
+
J1932+1059
|
969 |
+
59062
|
970 |
+
475
|
971 |
+
0.0345
|
972 |
+
0.0007
|
973 |
+
0.0278
|
974 |
+
0.0006
|
975 |
+
–0.1200
|
976 |
+
0.0297
|
977 |
+
J1932+1059
|
978 |
+
59062
|
979 |
+
575
|
980 |
+
0.0337
|
981 |
+
0.0007
|
982 |
+
0.0303
|
983 |
+
0.0004
|
984 |
+
—
|
985 |
+
—
|
986 |
+
J1932+1059
|
987 |
+
59062
|
988 |
+
625
|
989 |
+
0.0332
|
990 |
+
0.0004
|
991 |
+
0.0323
|
992 |
+
0.0004
|
993 |
+
–0.0221
|
994 |
+
0.0095
|
995 |
+
J1932+1059
|
996 |
+
59062
|
997 |
+
675
|
998 |
+
0.0350
|
999 |
+
0.0006
|
1000 |
+
0.0356
|
1001 |
+
0.0006
|
1002 |
+
–0.0221
|
1003 |
+
0.0095
|
1004 |
+
J1932+1059
|
1005 |
+
59062
|
1006 |
+
725
|
1007 |
+
0.0297
|
1008 |
+
0.0005
|
1009 |
+
0.0304
|
1010 |
+
0.0006
|
1011 |
+
–0.0192
|
1012 |
+
0.0152
|
1013 |
+
J1932+1059
|
1014 |
+
59497
|
1015 |
+
325
|
1016 |
+
0.0365
|
1017 |
+
0.0008
|
1018 |
+
0.0279
|
1019 |
+
0.0009
|
1020 |
+
–0.8215
|
1021 |
+
0.0090
|
1022 |
+
J1932+1059
|
1023 |
+
59497
|
1024 |
+
375
|
1025 |
+
0.0351
|
1026 |
+
0.0007
|
1027 |
+
0.0294
|
1028 |
+
0.0004
|
1029 |
+
0.1062
|
1030 |
+
0.0302
|
1031 |
+
J1932+1059
|
1032 |
+
59497
|
1033 |
+
425
|
1034 |
+
0.0399
|
1035 |
+
0.0004
|
1036 |
+
0.0320
|
1037 |
+
0.0005
|
1038 |
+
0.1479
|
1039 |
+
0.0287
|
1040 |
+
J1932+1059
|
1041 |
+
59497
|
1042 |
+
475
|
1043 |
+
0.0389
|
1044 |
+
0.0007
|
1045 |
+
0.0341
|
1046 |
+
0.0008
|
1047 |
+
0.2495
|
1048 |
+
0.3407
|
1049 |
+
J1932+1059
|
1050 |
+
59497
|
1051 |
+
575
|
1052 |
+
0.0405
|
1053 |
+
0.0016
|
1054 |
+
0.0363
|
1055 |
+
0.0012
|
1056 |
+
—
|
1057 |
+
—
|
1058 |
+
J1932+1059
|
1059 |
+
59497
|
1060 |
+
625
|
1061 |
+
0.0393
|
1062 |
+
0.0014
|
1063 |
+
0.0358
|
1064 |
+
0.0013
|
1065 |
+
–0.0815
|
1066 |
+
0.0392
|
1067 |
+
J1932+1059
|
1068 |
+
59497
|
1069 |
+
675
|
1070 |
+
0.0433
|
1071 |
+
0.0017
|
1072 |
+
0.0385
|
1073 |
+
0.0012
|
1074 |
+
–0.0222
|
1075 |
+
0.0103
|
1076 |
+
J1932+1059
|
1077 |
+
59497
|
1078 |
+
725
|
1079 |
+
0.0461
|
1080 |
+
0.0022
|
1081 |
+
0.0416
|
1082 |
+
0.0013
|
1083 |
+
—
|
1084 |
+
—
|
1085 |
+
J2048–1616
|
1086 |
+
59062
|
1087 |
+
325
|
1088 |
+
0.0221
|
1089 |
+
0.0006
|
1090 |
+
0.0108
|
1091 |
+
0.0009
|
1092 |
+
–0.4158
|
1093 |
+
0.0081
|
1094 |
+
J2048–1616
|
1095 |
+
59062
|
1096 |
+
375
|
1097 |
+
0.0198
|
1098 |
+
0.0007
|
1099 |
+
0.0113
|
1100 |
+
0.0023
|
1101 |
+
–0.0211
|
1102 |
+
0.0077
|
1103 |
+
J2048–1616
|
1104 |
+
59062
|
1105 |
+
425
|
1106 |
+
0.0247
|
1107 |
+
0.0020
|
1108 |
+
0.0108
|
1109 |
+
0.0012
|
1110 |
+
–0.1529
|
1111 |
+
0.0139
|
1112 |
+
J2048–1616
|
1113 |
+
59062
|
1114 |
+
625
|
1115 |
+
0.0152
|
1116 |
+
0.0004
|
1117 |
+
0.0132
|
1118 |
+
0.0005
|
1119 |
+
–0.0058
|
1120 |
+
0.0012
|
1121 |
+
J2048–1616
|
1122 |
+
59062
|
1123 |
+
675
|
1124 |
+
0.0152
|
1125 |
+
0.0004
|
1126 |
+
0.0138
|
1127 |
+
0.0005
|
1128 |
+
0.0208
|
1129 |
+
0.0090
|
1130 |
+
J2048–1616
|
1131 |
+
59062
|
1132 |
+
725
|
1133 |
+
0.0148
|
1134 |
+
0.0004
|
1135 |
+
0.0135
|
1136 |
+
0.0005
|
1137 |
+
0.00005
|
1138 |
+
0.0001
|
1139 |
+
NOTE—Scintillation arc measurements and drift rates in the left and right primary arms of each epoch at all
|
1140 |
+
frequencies where measurable. ηL and ηR are the the arc curvature measurements for the left and right arms,
|
1141 |
+
respectively, and dν/dt is the measured scintillation drift rate, with the matching σ’s representing the corre-
|
1142 |
+
sponding uncertainties. All curvatures and their errors have been scaled to 1 GHz and errors on curvature here
|
1143 |
+
are fit uncertainties. Some pulsars on MJD 59497 have multiple curvature measurements at a given frequency,
|
1144 |
+
due to this epoch being 155 minutes instead of the 40 minutes of the other observations, and so a new η was
|
1145 |
+
measured after every 40 minutes.
|
1146 |
+
4.1. Scintillation Arc Curvature Scaling Behavior
|
1147 |
+
As mentioned earlier, Hill et al. (2003) demonstrated
|
1148 |
+
through both theoretical and observational means that the
|
1149 |
+
arc curvature η should follow a ν−2 dependence, implying
|
1150 |
+
that scattering is dominated by one or several thin screens
|
1151 |
+
along the LOS. While over 2 GHz of bandwidth was used in
|
1152 |
+
those observations (10-12.5 MHz of bandwidth centered at
|
1153 |
+
430 MHz and either 50 or 100 MHz of bandwidth centered at
|
1154 |
+
1175 MHz, 1400 MHz, and 2250 MHz), the frequency cov-
|
1155 |
+
erage was discontinuous and all η measurements used in their
|
1156 |
+
corresponding fits were from different epochs. Generally the
|
1157 |
+
latter point should not be an issue as long as the observations
|
1158 |
+
were taken within a period shorter than the pulsar’s refrac-
|
1159 |
+
tive timescale. Indeed, for the data used in their fits, their
|
1160 |
+
measured arc curvatures at a given frequency did not vary
|
1161 |
+
significantly on day or week timescales, making them suit-
|
1162 |
+
able for this type of analysis. However, the ideal situation
|
1163 |
+
would be to obtain many measurements at many frequencies
|
1164 |
+
during the same observation, preferably at the same time for
|
1165 |
+
optimal consistency. With our high resolution and sufficient
|
1166 |
+
observing time, we have the ability to make up to eight con-
|
1167 |
+
current arc measurements over 450 MHz of bandwidth at low
|
1168 |
+
frequency and can consequentially provide a more definitive
|
1169 |
+
examination of the theory.
|
1170 |
+
Following the methodology of Hill et al. (2003), for a scal-
|
1171 |
+
ing index α, we performed a weighted linear least-squares fit
|
1172 |
+
of the form
|
1173 |
+
log10 η = α log10 ν + β
|
1174 |
+
(3)
|
1175 |
+
on the unscaled curvatures for each pulsar at each MJD. Ex-
|
1176 |
+
ample fits can be seen in Figure 1, with all measured in-
|
1177 |
+
|
1178 |
+
6
|
1179 |
+
J. E. TURNER ET AL.
|
1180 |
+
dices listed in Table 2. We find that, overall, our scaling
|
1181 |
+
indices are consistent with a theoretical index of −2, which
|
1182 |
+
assumes thin screen scattering (Stinebring et al. 2001), with
|
1183 |
+
PSRs J1136+1551 and J1932+1059 being especially consis-
|
1184 |
+
tent. This effect can also be seen in Table 1, where arc cur-
|
1185 |
+
vatures at all frequencies from a given pulsar at the same
|
1186 |
+
MJD are generally in strong agreement after being scaled to
|
1187 |
+
1 GHz. Interestingly, a weighted average of all curvature
|
1188 |
+
fits shows that our left arm fits are overall more consistent
|
1189 |
+
with an index of −2 than our right arms, with a weighted av-
|
1190 |
+
erage of −1.99±0.03 across all left arm fits compared with
|
1191 |
+
−1.69±0.02 across all right arm fits, indicating that refrac-
|
1192 |
+
tion may play a role in how closely arc curvature scales as
|
1193 |
+
expected with frequency.
|
1194 |
+
4.2. Scattering Delay Scaling Behavior
|
1195 |
+
Our wide frequency coverage also allowed us to examine
|
1196 |
+
the scaling index of scattering delays. Under the assumption
|
1197 |
+
that ISM fluctuations follow behaviors consistent with a Kol-
|
1198 |
+
mogorov medium and that scattering can be modeled as the
|
1199 |
+
result of interactions of pulsar emission with an infinite, thin,
|
1200 |
+
scattering screen during its propagation, we should expect
|
1201 |
+
that scattering delays scale with frequency as τd ∝ ν−4.4
|
1202 |
+
(Romani et al. 1986; Cordes & Rickett 1998).
|
1203 |
+
Previous
|
1204 |
+
studies examining the scattering indices of various pulsars
|
1205 |
+
have done so using a number of methods, including simul-
|
1206 |
+
taneous multi-frequency measurements (Bhat et al. 2004;
|
1207 |
+
Bansal et al. 2019), splitting up measurements from a single
|
1208 |
+
frequency band into multiple subbands (Levin et al. 2016;
|
1209 |
+
Turner et al. 2021), and using measurements from many
|
1210 |
+
epochs taken at two observing bands non-simultaneously
|
1211 |
+
(Turner et al. 2021). Since more measurements and more fre-
|
1212 |
+
quency coverage in a single epoch is ideal, the method used
|
1213 |
+
in Bhat et al. (2004) and Bansal et al. (2019) is the most pre-
|
1214 |
+
ferred of the three. The method in this paper utilizes a com-
|
1215 |
+
bination of this approach and the subband approach to max-
|
1216 |
+
imize the number of delay measurements per epoch, which
|
1217 |
+
can be done thanks to our high frequency resolution and sen-
|
1218 |
+
sitivity in both observing bands.
|
1219 |
+
Similar to Equation 3 used to determine the arc curva-
|
1220 |
+
ture scaling index, our scattering delay scaling indices ξ at
|
1221 |
+
each epoch were determined by performing a weighted lin-
|
1222 |
+
ear least-squares fit of the form
|
1223 |
+
log10 τd = ξ log10 ν + b.
|
1224 |
+
(4)
|
1225 |
+
Example fits can be seen in Figure 2, with all measured in-
|
1226 |
+
dices listed in Table 3. We find that half of our measured
|
1227 |
+
indices are consistent with a Kolmogorov medium, while the
|
1228 |
+
other half are consistent with a shallower medium. This be-
|
1229 |
+
havior agrees well with previous studies, as both Bhat et al.
|
1230 |
+
(2004) and Bansal et al. (2019) found indices either consis-
|
1231 |
+
tent with a Kolmogorov medium or shallower than a Kol-
|
1232 |
+
mogorov medium, while Levin et al. (2016) and Turner et al.
|
1233 |
+
(2021) only found indices that were shallower than a Kol-
|
1234 |
+
mogorov medium.
|
1235 |
+
Many explanations have been given for why shallower-
|
1236 |
+
than-Kolmogorov medium behavior has been observed so
|
1237 |
+
frequently. Physical arguments have called into question the
|
1238 |
+
validity of the simple infinite, thin screen model, demonstrat-
|
1239 |
+
ing that shallower scaling indices are more consistent with
|
1240 |
+
finite, thin screens (Rickett et al. 2009). This is expected to
|
1241 |
+
be much more common among low DM pulsars (Cordes &
|
1242 |
+
Lazio 2001), which agrees with our results, as all of the pul-
|
1243 |
+
sars have dispersion measures below 40 pc cm−3. Shallower
|
1244 |
+
indices have also been attributed to the existence of multi-
|
1245 |
+
ple finite screens along the LOS (Lewandowski et al. 2013).
|
1246 |
+
This hypothesis agrees well with our measured indices for
|
1247 |
+
PSR B1133+16, as its indices are consistently shallower than
|
1248 |
+
that of a Kolmogorov medium and it is also known to have at
|
1249 |
+
least six distinct scattering screens (McKee et al. 2022).
|
1250 |
+
Quality-of-data arguments have also been proposed.
|
1251 |
+
Turner et al. (2021) suggested their shallower indices may
|
1252 |
+
be at least partially attributable to an imbalance of lower fre-
|
1253 |
+
quency data to higher frequency data for their multiple epoch
|
1254 |
+
approach as well as a lack of sufficient frequency resolution
|
1255 |
+
in their lower frequency band in some epochs. However, nei-
|
1256 |
+
ther of these issues should affect our results, as our observa-
|
1257 |
+
tions have a consistently even balance of low and high fre-
|
1258 |
+
quency measurements at all epochs and all of our measure-
|
1259 |
+
ments are well-resolved in frequency.
|
1260 |
+
4.3. 155 Minute Observation
|
1261 |
+
The inclusion of a 155 minute observation in our survey
|
1262 |
+
on MJD 59497 allowed for an analysis of short-term arc cur-
|
1263 |
+
vature variation in some pulsars, as observations had to be
|
1264 |
+
paused every 40 minutes for a five minute phase calibration,
|
1265 |
+
resulting in multiple 40 minute sub-observations. For pulsars
|
1266 |
+
with at least two measurements in a given scintillation arc at a
|
1267 |
+
given frequency, we examined overall variation in that arc at
|
1268 |
+
that frequency by looking at the percent difference between a
|
1269 |
+
given curvature measurement and the weighted average cur-
|
1270 |
+
vature for that arm and frequency over the entire epoch.
|
1271 |
+
For PSR J1136+1551, all observing frequencies centered
|
1272 |
+
at or below 475 MHz had three measurements in each pri-
|
1273 |
+
mary arm (the brightest arm, overwhelmingly often the arm
|
1274 |
+
with the lowest curvature) at each frequency, with the accu-
|
1275 |
+
mulation of all percent differences yielding a bimodal distri-
|
1276 |
+
bution with peaks around percent differences of 2% and 7%.
|
1277 |
+
The largest percent difference away from a weighted mean
|
1278 |
+
was 7.9±0.2% and the smallest was 0.14±1.91%, although
|
1279 |
+
the majority of all percent differences was below 3%. All of
|
1280 |
+
this strongly indicates the ISM underwent very little change
|
1281 |
+
along the LOS to this pulsar over the course of a given ob-
|
1282 |
+
servation. This result is supported by this pulsar’s incredibly
|
1283 |
+
low dispersion measure, meaning it does not sample a size-
|
1284 |
+
|
1285 |
+
SIMULTANEOUS DUAL-FREQUENCY SCINTILLATION ARC SURVEY
|
1286 |
+
7
|
1287 |
+
(a) α fit for PSR J1932+1059 on MJD 58997
|
1288 |
+
(b) α fit for PSR J1136+1551 on MJD 58997. The inclusion of multiple points at
|
1289 |
+
certain frequencies is the result of this epoch containing a 155 minute
|
1290 |
+
observation instead of the 40 minutes of the other observations, and so a new η
|
1291 |
+
was measured after every 40 minutes.
|
1292 |
+
Figure 1. Example fits for the arc curvature scaling index
|
1293 |
+
Table 2. Fitted Pulsar Scintillation Arc Curvature Scaling Indices
|
1294 |
+
Pulsar
|
1295 |
+
MJD
|
1296 |
+
Scaling Index Left Arc
|
1297 |
+
Scaling Index Error Left Arc
|
1298 |
+
Nη
|
1299 |
+
Scaling Index Right Arc
|
1300 |
+
Scaling Index Error Right Arc
|
1301 |
+
Nη
|
1302 |
+
J0630–2834
|
1303 |
+
58987
|
1304 |
+
—
|
1305 |
+
—
|
1306 |
+
—
|
1307 |
+
–2.48
|
1308 |
+
0.31
|
1309 |
+
8
|
1310 |
+
J1136+1551
|
1311 |
+
58987
|
1312 |
+
–1.79
|
1313 |
+
0.11
|
1314 |
+
7
|
1315 |
+
–1.89
|
1316 |
+
0.12
|
1317 |
+
7
|
1318 |
+
J1136+1551
|
1319 |
+
58991
|
1320 |
+
–1.65
|
1321 |
+
0.12
|
1322 |
+
8
|
1323 |
+
–1.94
|
1324 |
+
0.08
|
1325 |
+
8
|
1326 |
+
J1136+1551
|
1327 |
+
59115
|
1328 |
+
–1.36
|
1329 |
+
0.13
|
1330 |
+
8
|
1331 |
+
–1.52
|
1332 |
+
0.15
|
1333 |
+
8
|
1334 |
+
J1136+1551
|
1335 |
+
59497
|
1336 |
+
–2.12
|
1337 |
+
0.12
|
1338 |
+
15
|
1339 |
+
–1.99
|
1340 |
+
0.10
|
1341 |
+
15
|
1342 |
+
J1509+5531
|
1343 |
+
58987
|
1344 |
+
–1.49
|
1345 |
+
0.83
|
1346 |
+
3
|
1347 |
+
–1.34
|
1348 |
+
0.55
|
1349 |
+
3
|
1350 |
+
J1509+5531
|
1351 |
+
59064
|
1352 |
+
–1.62
|
1353 |
+
0.26
|
1354 |
+
4
|
1355 |
+
–1.41
|
1356 |
+
0.22
|
1357 |
+
4
|
1358 |
+
J1509+5531
|
1359 |
+
59115
|
1360 |
+
–0.93
|
1361 |
+
0.21
|
1362 |
+
4
|
1363 |
+
–2.31
|
1364 |
+
0.18
|
1365 |
+
4
|
1366 |
+
J1509+5531
|
1367 |
+
59497
|
1368 |
+
–2.01
|
1369 |
+
0.87
|
1370 |
+
9
|
1371 |
+
–1.34
|
1372 |
+
0.21
|
1373 |
+
9
|
1374 |
+
J1645–0317
|
1375 |
+
59074
|
1376 |
+
–2.09
|
1377 |
+
0.26
|
1378 |
+
4
|
1379 |
+
—
|
1380 |
+
—
|
1381 |
+
—
|
1382 |
+
J1932+1059
|
1383 |
+
58997
|
1384 |
+
–1.93
|
1385 |
+
0.05
|
1386 |
+
8
|
1387 |
+
–1.93
|
1388 |
+
0.09
|
1389 |
+
8
|
1390 |
+
J1932+1059
|
1391 |
+
59062
|
1392 |
+
–2.08
|
1393 |
+
0.07
|
1394 |
+
8
|
1395 |
+
–1.75
|
1396 |
+
0.07
|
1397 |
+
8
|
1398 |
+
J1932+1059
|
1399 |
+
59497
|
1400 |
+
–1.77
|
1401 |
+
0.09
|
1402 |
+
8
|
1403 |
+
–1.53
|
1404 |
+
0.04
|
1405 |
+
8
|
1406 |
+
J2048–1616
|
1407 |
+
59062
|
1408 |
+
–2.52
|
1409 |
+
0.07
|
1410 |
+
6
|
1411 |
+
–1.68
|
1412 |
+
0.05
|
1413 |
+
6
|
1414 |
+
NOTE—Fitted arc curvature scaling indices for both left and right primary arcs. Nη indicates the number of arc curvature measurements used
|
1415 |
+
in each fit. Measurements on MJD 59497 may have Nη > 8 due to this epoch being 155 minutes rather than the 40 minutes of the other
|
1416 |
+
observations, and so a new η was measured after every 40 minutes. Arc curvature measurements used in these fits were left unscaled.
|
1417 |
+
able portion of the ISM along its LOS relative to many pul-
|
1418 |
+
sars that are observed (Bilous et al. 2016; Manchester et al.
|
1419 |
+
2005; Pilkington et al. 1968).
|
1420 |
+
For PSR J1509+5531, all observing frequencies centered
|
1421 |
+
at or above 575 MHz had at least two measurements in each
|
1422 |
+
arm at each frequency, with the accumulation of all per-
|
1423 |
+
cent differences resulting in a one-sided distribution peaked
|
1424 |
+
|
1425 |
+
J1932+1059MJD 5899T
|
1426 |
+
4 × 10-1
|
1427 |
+
nL; Scaling Index= -1.93 ± 0.05
|
1428 |
+
nR; Scaling Index = -1.93 ± 0.09
|
1429 |
+
3 × 10-1.
|
1430 |
+
2 × 10-1
|
1431 |
+
n
|
1432 |
+
10-1
|
1433 |
+
6 × 10-2
|
1434 |
+
400
|
1435 |
+
500
|
1436 |
+
600
|
1437 |
+
700
|
1438 |
+
Frequency [MHz]J1136+1551MJD 5949T
|
1439 |
+
nL; Scaling Index= -2.12 ± 0.12
|
1440 |
+
6 × 10-2
|
1441 |
+
nr; Scaling Index = -1.99 ± 0.10
|
1442 |
+
4 × 10-2
|
1443 |
+
3 × 10-2
|
1444 |
+
n
|
1445 |
+
2 × 10-2
|
1446 |
+
10-1
|
1447 |
+
400
|
1448 |
+
500
|
1449 |
+
600
|
1450 |
+
700
|
1451 |
+
Frequency [MHz]8
|
1452 |
+
J. E. TURNER ET AL.
|
1453 |
+
(a) Scattering delay scaling index fit for PSR J1932+1059 on MJD 59497
|
1454 |
+
(b) Scattering delay scaling index fit for PSR J1136+1551 on MJD 58991.
|
1455 |
+
Figure 2. Example fits for the scattering delay scaling index
|
1456 |
+
Table 3. Fitted Pulsar Scattering Delay Scaling Indices
|
1457 |
+
Pulsar
|
1458 |
+
MJD
|
1459 |
+
Scaling Index
|
1460 |
+
Index Error
|
1461 |
+
Nτd
|
1462 |
+
J0630–2834
|
1463 |
+
58987
|
1464 |
+
–4.19
|
1465 |
+
1.43
|
1466 |
+
8
|
1467 |
+
J1136+1551
|
1468 |
+
58987
|
1469 |
+
–1.44
|
1470 |
+
0.71
|
1471 |
+
6
|
1472 |
+
J1136+1551
|
1473 |
+
58991
|
1474 |
+
–3.78
|
1475 |
+
0.62
|
1476 |
+
7
|
1477 |
+
J1136+1551
|
1478 |
+
59115
|
1479 |
+
–2.72
|
1480 |
+
1.05
|
1481 |
+
6
|
1482 |
+
J1136+1551
|
1483 |
+
59497
|
1484 |
+
–1.71
|
1485 |
+
0.57
|
1486 |
+
13
|
1487 |
+
J1645–0317
|
1488 |
+
59074
|
1489 |
+
–4.60
|
1490 |
+
0.75
|
1491 |
+
4
|
1492 |
+
J1932+1059
|
1493 |
+
58997
|
1494 |
+
–1.83
|
1495 |
+
0.31
|
1496 |
+
7
|
1497 |
+
J1932+1059
|
1498 |
+
59062
|
1499 |
+
–1.74
|
1500 |
+
0.31
|
1501 |
+
6
|
1502 |
+
J1932+1059
|
1503 |
+
59497
|
1504 |
+
–4.14
|
1505 |
+
0.39
|
1506 |
+
6
|
1507 |
+
J2048–1616
|
1508 |
+
59062
|
1509 |
+
–3.77
|
1510 |
+
1.39
|
1511 |
+
6
|
1512 |
+
NOTE—Fitted scattering delay scaling indices, with a minimum
|
1513 |
+
of four delay measurements (Nτd) required in a given epoch to
|
1514 |
+
obtain a scaling index. Errors are the parameter uncertainties
|
1515 |
+
from parameter fits. Half of our measured indices were con-
|
1516 |
+
sistent with a Kolmogorov medium, while the other half were
|
1517 |
+
consistent with a shallower medium. Measurements on MJD
|
1518 |
+
59497 may have Nτd > 8 due to this epoch being 155 minutes
|
1519 |
+
rather than the 40 minutes of the other observations, and so a
|
1520 |
+
new �� was measured after every 40 minutes.
|
1521 |
+
around 6%.
|
1522 |
+
The smallest percent difference away from
|
1523 |
+
a weighted mean was 1.2±2.1%, while the largest was
|
1524 |
+
36±0.1%, although the next largest after that was only
|
1525 |
+
22±0.1%, meaning this maximum was an extreme outlier.
|
1526 |
+
The majority of all percent differences was below 7%. As
|
1527 |
+
with the previous pulsar, this also strongly indicates the ISM
|
1528 |
+
underwent very little change along the LOS to this pul-
|
1529 |
+
sar over the course of a given observation, a result again
|
1530 |
+
supported by this pulsar’s fairly low dispersion measure
|
1531 |
+
(Huguenin et al. 1968; Manchester et al. 2005). The fact that
|
1532 |
+
this pulsar shows higher variation of this observation com-
|
1533 |
+
pared to PSR J1136+1551 is likely due to PSR J1509+5531
|
1534 |
+
having a dispersion measure four times higher and a trans-
|
1535 |
+
verse velocity 45% larger (Bilous et al. 2016; Huguenin et al.
|
1536 |
+
1968; Manchester et al. 2005; Pilkington et al. 1968; Stovall
|
1537 |
+
et al. 2015), so a significantly larger fraction of the ISM was
|
1538 |
+
sampled during its observation, increasing the likelihood of
|
1539 |
+
larger scintillation-based variations.
|
1540 |
+
The next few subsections will be dedicated to highlighting
|
1541 |
+
the features of a few pulsars in the survey.
|
1542 |
+
4.4. J0630-2834
|
1543 |
+
In the one epoch for which we were able to resolve a scin-
|
1544 |
+
tillation arc, only the right arm was resolvable across all fre-
|
1545 |
+
quencies, with its relative brightness relative to the left side
|
1546 |
+
of the fringe frequency axis consistently decreasing as fre-
|
1547 |
+
quency increased. An example of this asymmetry can be seen
|
1548 |
+
in Figure 3.This strong asymmetry is known to be the result
|
1549 |
+
of refraction leading to scintillation drifting in the dynamic
|
1550 |
+
spectra (Cordes et al. 2006). Interestingly, despite our asym-
|
1551 |
+
metry appearing to decrease with frequency, the magnitude
|
1552 |
+
of our measured scintillation drift rates seem to mildly favor
|
1553 |
+
an increase with frequency, whereas one would expect an in-
|
1554 |
+
crease in scintillation drift to coincide with an increase in the
|
1555 |
+
asymmetry.
|
1556 |
+
4.5. J1136+1551
|
1557 |
+
|
1558 |
+
J1932+1059 MJD 59497
|
1559 |
+
Scaling Index= -4.14 ± 0.39
|
1560 |
+
102
|
1561 |
+
(ns)
|
1562 |
+
101
|
1563 |
+
400
|
1564 |
+
500
|
1565 |
+
600
|
1566 |
+
700
|
1567 |
+
Frequency [MHz]J1136+1551MJD 58991
|
1568 |
+
Scaling Index= -3.78 ± 0.62
|
1569 |
+
102
|
1570 |
+
(ns)
|
1571 |
+
101
|
1572 |
+
400
|
1573 |
+
500
|
1574 |
+
600
|
1575 |
+
700
|
1576 |
+
Frequency [MHz]SIMULTANEOUS DUAL-FREQUENCY SCINTILLATION ARC SURVEY
|
1577 |
+
9
|
1578 |
+
Figure 3. An example dynamic (top) and secondary (bottom) spec-
|
1579 |
+
trum from PSR J0630-2834 on MJD 58987 centered at 425 MHz.
|
1580 |
+
There is a clear asymmetry in the secondary spectrum, with the right
|
1581 |
+
arm being the dominant feature. This is likely the result of refraction
|
1582 |
+
along the line of sight. The green line represents the arc curvature
|
1583 |
+
fit and the arc curvature measurement quoted is unscaled. Scaled
|
1584 |
+
uncertainties of the arc curvature can be found in Table 1.
|
1585 |
+
This pulsar is well known for having the uncommon fea-
|
1586 |
+
ture of multiple scintillation arcs, implying multiple scatter-
|
1587 |
+
ing screens along its LOS (Hill et al. 2003; Stinebring et al.
|
1588 |
+
2019). In the literature six distinct sets of arcs have been
|
1589 |
+
found over a ∼34 year span of observations (McKee et al.
|
1590 |
+
2022). In three of the four epochs in we which observed
|
1591 |
+
this pulsar, we observed multiple arcs, an example of which
|
1592 |
+
can be seen in Figure 4. After scaling our measurements
|
1593 |
+
to 1400 MHz and using the convention from McKee et al.
|
1594 |
+
(2022), we can conclude that we detected arcs E, C, and B
|
1595 |
+
on MJDs 58987 and 58991 and arcs D and C on MJD 59115,
|
1596 |
+
with arc C being the only detectable arc on MJD 59497. All
|
1597 |
+
multiple-arc detections were made only in the observations
|
1598 |
+
using uGMRT’s band 4, which was centered at 650 MHz.
|
1599 |
+
The fact that the two epochs closest to each other in our sur-
|
1600 |
+
vey (58987 and 58991) both detected the same sets of arcs
|
1601 |
+
may hint at a timescale over which certain screens have a
|
1602 |
+
larger influence over the pulsar signal propagation.
|
1603 |
+
An examination of the power in each of the arms show
|
1604 |
+
notable levels of asymmetry along the delay axis, and conse-
|
1605 |
+
quently a notable amount of refraction, in all detectable arms
|
1606 |
+
and across all frequencies in the first two epochs, with the
|
1607 |
+
right arm having more power and extending further out on the
|
1608 |
+
delay axis. This asymmetry clearly decreases over the course
|
1609 |
+
of our observations across all frequencies until our final ob-
|
1610 |
+
servation, where the arcs have approximately even levels of
|
1611 |
+
power or the left arc starts to dominate in the asymmetry.
|
1612 |
+
This trend is generally supported by the measured scintilla-
|
1613 |
+
tion drift rates as well, especially for data taken at band 4
|
1614 |
+
(650 MHz), i.e., the same band where the multiple arcs were
|
1615 |
+
visible, as measured drifts are generally positive during the
|
1616 |
+
first three epochs and then considerably negative during the
|
1617 |
+
final epoch.
|
1618 |
+
Perhaps the most interesting finding from our observations
|
1619 |
+
of this pulsar is the discovery of a strong correlation between
|
1620 |
+
the measured arc curvatures and the arc asymmetry index,
|
1621 |
+
which is a metric that describes the relative power between
|
1622 |
+
the left and right arcs and is found by comparing the average
|
1623 |
+
power along each arc via
|
1624 |
+
A = PR(fν) − PL(fν)
|
1625 |
+
PR(fν) + PL(fν)
|
1626 |
+
,
|
1627 |
+
(5)
|
1628 |
+
with a larger index magnitude indicating greater asymmetry.
|
1629 |
+
We believe this phenomenon has never before been reported
|
1630 |
+
and is therefore worth further examination in future observa-
|
1631 |
+
tions. As briefly mentioned earlier, asymmetry in arcs has
|
1632 |
+
long been attributed to either the refraction of pulsar emis-
|
1633 |
+
sion at the scattering screen or as the result of an asymmetric
|
1634 |
+
distribution of the material within the screen (Cordes et al.
|
1635 |
+
2006), while arc curvature is known to indicate the distance
|
1636 |
+
between a given scattering screen and the observer (Stine-
|
1637 |
+
bring et al. 2001). The correlation between the two suggests
|
1638 |
+
further study of this effect may result in a better understand-
|
1639 |
+
ing of how screen asymmetry and/or refraction affects pulsar
|
1640 |
+
emission depending on the scattering screen’s proximity to
|
1641 |
+
the pulsar.
|
1642 |
+
An example dynamic and secondary spectrum pair is
|
1643 |
+
shown in Figure 5, with its corresponding normalized sec-
|
1644 |
+
ondary spectrum power profile, which is used to determine
|
1645 |
+
the asymmetry index, shown in Figure 6, while the scatter
|
1646 |
+
plot showing the relation between measured arc curvature
|
1647 |
+
and arc asymmetry index across all measurements taken in
|
1648 |
+
the 650 MHz band is shown in Figure 7. Of particular note in
|
1649 |
+
Figure 7 are the three distinct clumps, which we believe are
|
1650 |
+
the result of our observations being dominated by a differ-
|
1651 |
+
ent scattering screen at each epoch (two of our observations
|
1652 |
+
were taken four days apart, and so are dominated by the same
|
1653 |
+
screen). It is likely that this pulsar’s at least six known scat-
|
1654 |
+
tering screens are the main reason why we were able to see
|
1655 |
+
this correlation in our data in the first place, as individual
|
1656 |
+
scattering screens likely do not vary enough in distance over
|
1657 |
+
time for this trend to become apparent. Indeed, the limited
|
1658 |
+
number of pulsars with multiple known screens is probably
|
1659 |
+
the main reason why this trend has not been reported in ear-
|
1660 |
+
lier studies.
|
1661 |
+
4.6. J1509+5531
|
1662 |
+
In the observations of this pulsar in the 650 MHz band,
|
1663 |
+
all secondary spectra featured patchy rather than continuous
|
1664 |
+
|
1665 |
+
PSR J0630-2834 MJD 58987
|
1666 |
+
450
|
1667 |
+
Flux Density (Arbitrary Units)
|
1668 |
+
0.15
|
1669 |
+
[MHz]
|
1670 |
+
440
|
1671 |
+
0.10
|
1672 |
+
430
|
1673 |
+
Frequency [
|
1674 |
+
0.05
|
1675 |
+
420
|
1676 |
+
0.00
|
1677 |
+
410
|
1678 |
+
-0.05
|
1679 |
+
400
|
1680 |
+
0
|
1681 |
+
10
|
1682 |
+
20
|
1683 |
+
30
|
1684 |
+
40
|
1685 |
+
Time [Min]
|
1686 |
+
10
|
1687 |
+
nL =1.534 s3
|
1688 |
+
40
|
1689 |
+
nR =1.623 s3
|
1690 |
+
Log Power (dB)
|
1691 |
+
5
|
1692 |
+
Delay [μs]
|
1693 |
+
20
|
1694 |
+
0
|
1695 |
+
0
|
1696 |
+
-5
|
1697 |
+
20
|
1698 |
+
-40
|
1699 |
+
-10
|
1700 |
+
-40
|
1701 |
+
-20
|
1702 |
+
0
|
1703 |
+
20
|
1704 |
+
40
|
1705 |
+
Fringe Frequency [10-3 Hz]10
|
1706 |
+
J. E. TURNER ET AL.
|
1707 |
+
(a) Scintillation arcs without overlaid fits
|
1708 |
+
(b) Scintillation arcs with overlaid fits
|
1709 |
+
Figure 4. Secondary spectrum of PSR J1136+1551 at 650 MHz on MJD 58987 showing the detection of three distinct scintillation arcs.
|
1710 |
+
Figure 5. Dynamic (top) and secondary (bottom) spectra of PSR
|
1711 |
+
J1136+1551 centered at 650 MHz on MJD 58987. The top half of
|
1712 |
+
the secondary spectrum shows the overlaid arc fits in green. Scaled
|
1713 |
+
uncertainties of the arc curvature can be found in Table 1.
|
1714 |
+
arcs, particularly in the left arm. This patchiness indicates
|
1715 |
+
a detection of this pulsar’s arclets, which result from sub-
|
1716 |
+
structures in the ISM thought to arise from scattering inter-
|
1717 |
+
ference between an inhomogeniously scattered distribution
|
1718 |
+
of material and some distinct offset region (Walker & Stine-
|
1719 |
+
bring 2005; Cordes et al. 2006). In the particular case of this
|
1720 |
+
Figure 6. Normalized secondary spectrum power profile of PSR
|
1721 |
+
J1136+1551 centered at 650 MHz on MJD 58987. The vertical
|
1722 |
+
dashed lines indicate where the arcs fall on the normalized delay
|
1723 |
+
axis.
|
1724 |
+
pulsar these substructures are roughly AU in scale. Unique
|
1725 |
+
to these arclets is their distinctly flat nature, which has been
|
1726 |
+
attributed to its exceptionally high transverse velocity of over
|
1727 |
+
960 km s−1 (Manchester et al. 2005). Interestingly, the arc
|
1728 |
+
curvatures measured in the last two epochs (MJDs 59115 and
|
1729 |
+
59497) are a factor of two to three times smaller than the first
|
1730 |
+
|
1731 |
+
PSR J1136+1551MJD 5898T
|
1732 |
+
14000
|
1733 |
+
70
|
1734 |
+
12000
|
1735 |
+
60
|
1736 |
+
10000
|
1737 |
+
50
|
1738 |
+
8000
|
1739 |
+
({_w) f
|
1740 |
+
40
|
1741 |
+
6000
|
1742 |
+
30
|
1743 |
+
4000
|
1744 |
+
20
|
1745 |
+
2000
|
1746 |
+
10
|
1747 |
+
0
|
1748 |
+
-20
|
1749 |
+
0
|
1750 |
+
20
|
1751 |
+
-40
|
1752 |
+
40
|
1753 |
+
ft (mHz)PSR J1136+1551MJD5898T
|
1754 |
+
14000
|
1755 |
+
70
|
1756 |
+
12000
|
1757 |
+
60
|
1758 |
+
10000
|
1759 |
+
50
|
1760 |
+
8000
|
1761 |
+
({_w) f
|
1762 |
+
40
|
1763 |
+
6000
|
1764 |
+
30
|
1765 |
+
4000
|
1766 |
+
20
|
1767 |
+
2000
|
1768 |
+
10
|
1769 |
+
-20
|
1770 |
+
0
|
1771 |
+
20
|
1772 |
+
-40
|
1773 |
+
40
|
1774 |
+
ft (mHz)PSR J1136+1551MJD 5898T
|
1775 |
+
750
|
1776 |
+
( )s
|
1777 |
+
0.35
|
1778 |
+
0.30
|
1779 |
+
Frequency [MHz]
|
1780 |
+
700
|
1781 |
+
0.25
|
1782 |
+
650
|
1783 |
+
0.15
|
1784 |
+
0.10
|
1785 |
+
600
|
1786 |
+
0.05
|
1787 |
+
550
|
1788 |
+
0.00
|
1789 |
+
0
|
1790 |
+
5
|
1791 |
+
10
|
1792 |
+
15
|
1793 |
+
20
|
1794 |
+
25
|
1795 |
+
30
|
1796 |
+
35
|
1797 |
+
40
|
1798 |
+
Time [Min]
|
1799 |
+
10
|
1800 |
+
nL =0.056 s3
|
1801 |
+
60
|
1802 |
+
nR =0.060 s3
|
1803 |
+
5
|
1804 |
+
Power (dB)
|
1805 |
+
40
|
1806 |
+
Delay [μs]
|
1807 |
+
20
|
1808 |
+
0
|
1809 |
+
0
|
1810 |
+
Log
|
1811 |
+
20
|
1812 |
+
-10
|
1813 |
+
-40
|
1814 |
+
-20
|
1815 |
+
0
|
1816 |
+
20
|
1817 |
+
40
|
1818 |
+
Fringe Frequency [10-3 Hz]18
|
1819 |
+
16
|
1820 |
+
12
|
1821 |
+
10
|
1822 |
+
8
|
1823 |
+
-2
|
1824 |
+
0
|
1825 |
+
-1
|
1826 |
+
2
|
1827 |
+
Normalized ftSIMULTANEOUS DUAL-FREQUENCY SCINTILLATION ARC SURVEY
|
1828 |
+
11
|
1829 |
+
Figure 7. Scatter plot showing measured arc curvatures and the
|
1830 |
+
corresponding asymmetry indices for all measurements of PSR
|
1831 |
+
J1136+1551 taken with Band 4. All arc curvatures have been scaled
|
1832 |
+
to their corresponding 1 GHz equivalent. The three distinct clumps
|
1833 |
+
are the result of the observations being dominated by three different
|
1834 |
+
scattering screens.
|
1835 |
+
two epochs (MJDs 59064 and 58987), possibly indicating a
|
1836 |
+
detection of multiple scattering screens along the LOS to this
|
1837 |
+
pulsar. This result augments the results of Sprenger et al.
|
1838 |
+
(2022), who also found significant variability along the LOS
|
1839 |
+
to this pulsar during the same period of time. An example
|
1840 |
+
observation from the earlier two epochs is shown in Figure
|
1841 |
+
8, while an example from the later two epochs is shown in
|
1842 |
+
Figure 9.
|
1843 |
+
4.7. J1932+1059
|
1844 |
+
Due to having the lowest DM in our survey, this pulsar
|
1845 |
+
showed the least variation in arc curvature from epoch to
|
1846 |
+
epoch across all frequencies. Its close proximity to Earth also
|
1847 |
+
resulted in wide scintles in frequency, leading to high scintle
|
1848 |
+
resolution and, consequently, very bright, narrow, and well
|
1849 |
+
defined arcs. The sharpness of these arcs may also indicate
|
1850 |
+
scattering that is highly anisotropic along the LOS (Walker
|
1851 |
+
et al. 2004; Cordes et al. 2006), as well as originating from
|
1852 |
+
a discrete, localized source (Stinebring et al. 2001). Overall
|
1853 |
+
this was our most consistent pulsar in all aspects of scintilla-
|
1854 |
+
tion.
|
1855 |
+
This consistency lines up with its other astrophysical pa-
|
1856 |
+
rameters, as its dispersion measure of 3.18 pc cm−3 (Large
|
1857 |
+
et al. 1968; Manchester et al. 2005) was the lowest in our
|
1858 |
+
survey and its transverse velocity of 152 km s−1 (Bilous
|
1859 |
+
et al. 2016; Manchester et al. 2005) was the second low-
|
1860 |
+
est. While its transverse velocity is a bit larger than PSR
|
1861 |
+
Figure 8. Dynamic (top) and secondary (bottom) spectra of PSR
|
1862 |
+
J1509+5531 centered at 625 MHz on MJD 58987. The top half of
|
1863 |
+
the secondary spectrum shows the overlaid arc fits in green. Scaled
|
1864 |
+
uncertainties of the arc curvature can be found in Table 1. During
|
1865 |
+
this period of observations, visible arcs were considerably narrower
|
1866 |
+
than later observations.
|
1867 |
+
Figure 9. Dynamic (top) and secondary (bottom) spectra of PSR
|
1868 |
+
J1509+5531 centered at 650 MHz on MJD 59115. The top half of
|
1869 |
+
the secondary spectrum shows the overlaid arc fits in green. Scaled
|
1870 |
+
uncertainties of the arc curvature can be found in Table 1. During
|
1871 |
+
this period of observations, visible arcs were considerably wider
|
1872 |
+
than later observations.
|
1873 |
+
J0630−2834 and their distances are almost equivalent, PSR
|
1874 |
+
J0630−2834 has a dispersion measure 10 times higher than
|
1875 |
+
PSR J1932+1059 (Large et al. 1968, 1969; Manchester et al.
|
1876 |
+
|
1877 |
+
J1136+1551 High Frequencies PL =0.92; PR =0.88
|
1878 |
+
Referenced at 1 GHz
|
1879 |
+
nL
|
1880 |
+
0.12
|
1881 |
+
NR
|
1882 |
+
0.10
|
1883 |
+
0.08
|
1884 |
+
0.06
|
1885 |
+
0.04
|
1886 |
+
0.02
|
1887 |
+
0.00
|
1888 |
+
-0.02
|
1889 |
+
0.000
|
1890 |
+
0.005
|
1891 |
+
0.010
|
1892 |
+
0.015
|
1893 |
+
0.020
|
1894 |
+
0.025
|
1895 |
+
0.030
|
1896 |
+
n (s3)PSR J1509+5531MJD 58987
|
1897 |
+
650
|
1898 |
+
Flux Density (Arbitrary Units)
|
1899 |
+
0.125
|
1900 |
+
[MHz]
|
1901 |
+
640
|
1902 |
+
0.100
|
1903 |
+
0.075
|
1904 |
+
630
|
1905 |
+
Frequency
|
1906 |
+
0.050
|
1907 |
+
620
|
1908 |
+
0.025
|
1909 |
+
610
|
1910 |
+
0.000
|
1911 |
+
-0.025
|
1912 |
+
600
|
1913 |
+
0
|
1914 |
+
10
|
1915 |
+
20
|
1916 |
+
30
|
1917 |
+
40
|
1918 |
+
Time [Min]
|
1919 |
+
10
|
1920 |
+
nL =0.932 s3
|
1921 |
+
40
|
1922 |
+
NR =0.518 s3
|
1923 |
+
5
|
1924 |
+
Log Power (dB)
|
1925 |
+
20
|
1926 |
+
Delay [μs]
|
1927 |
+
0
|
1928 |
+
0
|
1929 |
+
20
|
1930 |
+
-5
|
1931 |
+
一
|
1932 |
+
-40
|
1933 |
+
-10
|
1934 |
+
-40
|
1935 |
+
-20
|
1936 |
+
0
|
1937 |
+
20
|
1938 |
+
40
|
1939 |
+
Fringe Frequency [10-3 Hz]PSR J1509+5531 MJD 59115
|
1940 |
+
750
|
1941 |
+
(n ) s
|
1942 |
+
0.35
|
1943 |
+
0.30
|
1944 |
+
Frequency [MHz]
|
1945 |
+
700
|
1946 |
+
0.25
|
1947 |
+
0.20
|
1948 |
+
650
|
1949 |
+
0.15
|
1950 |
+
0.10
|
1951 |
+
600
|
1952 |
+
0.05
|
1953 |
+
0.00
|
1954 |
+
550
|
1955 |
+
0
|
1956 |
+
5
|
1957 |
+
10
|
1958 |
+
15
|
1959 |
+
20
|
1960 |
+
25
|
1961 |
+
30
|
1962 |
+
35
|
1963 |
+
Time [Min]
|
1964 |
+
10
|
1965 |
+
60
|
1966 |
+
nL =0.224 s3
|
1967 |
+
NR =0.187 s3
|
1968 |
+
40
|
1969 |
+
5
|
1970 |
+
Power (dB)
|
1971 |
+
Delay [μs]
|
1972 |
+
20
|
1973 |
+
0
|
1974 |
+
0
|
1975 |
+
Logl
|
1976 |
+
-5
|
1977 |
+
-20
|
1978 |
+
-10
|
1979 |
+
-40
|
1980 |
+
-20
|
1981 |
+
0
|
1982 |
+
20
|
1983 |
+
40
|
1984 |
+
Fringe Frequency [10-3 Hz]12
|
1985 |
+
J. E. TURNER ET AL.
|
1986 |
+
2005). This means that a much denser ISM was sampled
|
1987 |
+
in PSR J0630−2834 than in PSR J1932+1059, meaning that
|
1988 |
+
PSR J1932+1059 had decisively the least amount of ISM
|
1989 |
+
sampled over our survey, making it the least likely to ex-
|
1990 |
+
perience large scintillation-related variations. An example
|
1991 |
+
observation is shown in Figure 10.
|
1992 |
+
Figure 10. Dynamic (top) and secondary (bottom) spectra of PSR
|
1993 |
+
J1932+1059 centered at 725 MHz on MJD 58987. The top half of
|
1994 |
+
the secondary spectrum shows the overlaid arc fits in green. Scaled
|
1995 |
+
uncertainties of the arc curvature can be found in Table 1.
|
1996 |
+
5. CONCLUSIONS & FUTURE WORK
|
1997 |
+
We performed simultaneous dual-frequency observations
|
1998 |
+
of six bright canonical pulsars using the uGMRT. We ex-
|
1999 |
+
tracted scintillation arc, bandwidth, and drift rate measure-
|
2000 |
+
ments for each of these pulsars to examine a variety of sci-
|
2001 |
+
ence. We examined how arc curvature scaled with frequency
|
2002 |
+
and found our observations to be consistent with the index
|
2003 |
+
predicted by theory, while at the same time using a more as-
|
2004 |
+
tronomically ideal setup to perform these measurements. We
|
2005 |
+
also measured scattering delay scaling indices for five of our
|
2006 |
+
six pulsars and found indices consistent with or shallower
|
2007 |
+
than what is expected from a Kolmogorov medium, agreeing
|
2008 |
+
with previous literature. Finally, we find an interesting and
|
2009 |
+
strong correlation between arc curvature and arc asymmetry
|
2010 |
+
in PSR J1136+1551, demonstrating a potential connection
|
2011 |
+
between screen asymmetry and/or refraction and scattering
|
2012 |
+
screen location along the LOS, and the which we intend to
|
2013 |
+
follow up with additional observations.
|
2014 |
+
This study demonstrates the value of array-based tele-
|
2015 |
+
scopes such as uGMRT to the pulsar astronomy community,
|
2016 |
+
as well as the strengths of simultaneous multiband studies of
|
2017 |
+
pulsars and the wide variety of science that can be done with
|
2018 |
+
such an approach. This also shows strong promise for the
|
2019 |
+
future observations using ultrawideband (UWB) receivers,
|
2020 |
+
which are coming online at instruments such as the Green
|
2021 |
+
Bank Telescope.
|
2022 |
+
We thank the staff at the uGMRT who have made these
|
2023 |
+
observations possible. The uGMRT is run by the National
|
2024 |
+
Centre for Radio Astrophysics of the Tata Institute of Funda-
|
2025 |
+
mental Research. We gratefully acknowledge support of this
|
2026 |
+
effort from the NSF Physics Frontiers Center grants 1430284
|
2027 |
+
and 2020265 to NANOGrav. Some of the data processing
|
2028 |
+
in this work utilized the resources of the Bowser computing
|
2029 |
+
cluster at West Virginia University.
|
2030 |
+
Software:
|
2031 |
+
SCINTOOLS Reardon et al. (2020), PYPULSE
|
2032 |
+
Lam (2017), SCIPY Virtanen et al. (2020), NUMPY van der
|
2033 |
+
Walt et al. (2011), and MATPLOTLIB Hunter (2007).
|
2034 |
+
REFERENCES
|
2035 |
+
Bansal, K., Taylor, G. B., Stovall, K., & Dowell, J. 2019, The
|
2036 |
+
Astrophysical Journal, 875, 146, doi: 10.3847/1538-4357/ab0d8f
|
2037 |
+
Bhat, N. D. R., Cordes, J. M., Camilo, F., Nice, D. J., & Lorimer,
|
2038 |
+
D. R. 2004, The Astrophysical Journal, 605, 759,
|
2039 |
+
doi: 10.1086/382680
|
2040 |
+
Bilous, A. V., Kondratiev, V. I., Kramer, M., et al. 2016, A&A,
|
2041 |
+
591, A134, doi: 10.1051/0004-6361/201527702
|
2042 |
+
Cordes, J. M., & Lazio, T. J. W. 2001, The Astrophysical Journal,
|
2043 |
+
549, 997, doi: 10.1086/319442
|
2044 |
+
Cordes, J. M., & Rickett, B. J. 1998, The Astrophysical Journal,
|
2045 |
+
507, 846, doi: 10.1086/306358
|
2046 |
+
Cordes, J. M., Rickett, B. J., Stinebring, D. R., & Coles, W. A.
|
2047 |
+
2006, ApJ, 637, 346, doi: 10.1086/498332
|
2048 |
+
Hill, A. S., Stinebring, D. R., Barnor, H. A., Berwick, D. E., &
|
2049 |
+
Webber, A. B. 2003, The Astrophysical Journal, 599, 457,
|
2050 |
+
doi: 10.1086/379191
|
2051 |
+
Huguenin, G. R., Taylor, J. H., Goad, L. E., et al. 1968, Nature,
|
2052 |
+
219, 576, doi: 10.1038/219576a0
|
2053 |
+
Hunter, J. D. 2007, Computing in Science & Engineering, 9, 90,
|
2054 |
+
doi: 10.1109/MCSE.2007.55
|
2055 |
+
Lam, M. T. 2017, PyPulse: PSRFITS handler.
|
2056 |
+
http://ascl.net/1706.011
|
2057 |
+
Large, M. I., Vaughan, A. E., & Wielebinski, R. 1968, Nature, 220,
|
2058 |
+
753, doi: 10.1038/220753a0
|
2059 |
+
—. 1969, Nature, 223, 1249, doi: 10.1038/2231249a0
|
2060 |
+
|
2061 |
+
PSR J1932±1059 MJD 59062
|
2062 |
+
750
|
2063 |
+
(
|
2064 |
+
0.10
|
2065 |
+
740
|
2066 |
+
Frequency [MHz]
|
2067 |
+
0.08
|
2068 |
+
730
|
2069 |
+
0.06
|
2070 |
+
0.04
|
2071 |
+
720
|
2072 |
+
0.02
|
2073 |
+
710
|
2074 |
+
0.00
|
2075 |
+
700
|
2076 |
+
0
|
2077 |
+
5
|
2078 |
+
10
|
2079 |
+
15
|
2080 |
+
20
|
2081 |
+
25
|
2082 |
+
30
|
2083 |
+
35
|
2084 |
+
40
|
2085 |
+
Time [Min]
|
2086 |
+
10
|
2087 |
+
60
|
2088 |
+
nL =0.057 s3
|
2089 |
+
nR =0.058 s3
|
2090 |
+
40
|
2091 |
+
5
|
2092 |
+
Power (dB)
|
2093 |
+
Delay [μs]
|
2094 |
+
20
|
2095 |
+
0
|
2096 |
+
0
|
2097 |
+
-5
|
2098 |
+
-40
|
2099 |
+
-10
|
2100 |
+
-40
|
2101 |
+
-20
|
2102 |
+
0
|
2103 |
+
20
|
2104 |
+
40
|
2105 |
+
Fringe Frequency [10-3 Hz]SIMULTANEOUS DUAL-FREQUENCY SCINTILLATION ARC SURVEY
|
2106 |
+
13
|
2107 |
+
Levin, L., McLaughlin, M. A., Jones, G., et al. 2016, The
|
2108 |
+
Astrophysical Journal, 818, 166.
|
2109 |
+
http://stacks.iop.org/0004-637X/818/i=2/a=166
|
2110 |
+
Lewandowski, W., Dembska, M., Kijak, J., & Kowali´nska, M.
|
2111 |
+
2013, Monthly Notices of the Royal Astronomical Society, 434,
|
2112 |
+
69, doi: 10.1093/mnras/stt989
|
2113 |
+
Manchester, R. N., Hobbs, G. B., Teoh, A., & Hobbs, M. 2005, AJ,
|
2114 |
+
129, 1993, doi: 10.1086/428488
|
2115 |
+
McKee, J. W., Zhu, H., Stinebring, D. R., & Cordes, J. M. 2022,
|
2116 |
+
The Astrophysical Journal, 927, 99,
|
2117 |
+
doi: 10.3847/1538-4357/ac460b
|
2118 |
+
Pilkington, J. D. H., Hewish, A., Bell, S. J., & Cole, T. W. 1968,
|
2119 |
+
Nature, 218, 126, doi: 10.1038/218126a0
|
2120 |
+
Reardon, D. J., Coles, W. A., Bailes, M., et al. 2020, ApJ, 904, 104,
|
2121 |
+
doi: 10.3847/1538-4357/abbd40
|
2122 |
+
Rickett, B., Johnston, S., Tomlinson, T., & Reynolds, J. 2009,
|
2123 |
+
Monthly Notices of the Royal Astronomical Society, 395, 1391,
|
2124 |
+
doi: 10.1111/j.1365-2966.2009.14471.x
|
2125 |
+
Romani, R. W., Narayan, R., & Blandford, R. 1986, MNRAS, 220,
|
2126 |
+
19, doi: 10.1093/mnras/220.1.19
|
2127 |
+
Sprenger, T., Main, R., Wucknitz, O., Mall, G., & Wu, J. 2022,
|
2128 |
+
Monthly Notices of the Royal Astronomical Society, 515, 6198,
|
2129 |
+
doi: 10.1093/mnras/stac2160
|
2130 |
+
Stinebring, D. R., McLaughlin, M. A., Cordes, J. M., et al. 2001,
|
2131 |
+
ApJL, 549, L97, doi: 10.1086/319133
|
2132 |
+
Stinebring, D. R., Rickett, B. J., & Ocker, S. K. 2019, ApJ, 870,
|
2133 |
+
82, doi: 10.3847/1538-4357/aaef80
|
2134 |
+
Stinebring, D. R., Rickett, B. J., Minter, A. H., et al. 2022, The
|
2135 |
+
Astrophysical Journal, 941, 34, doi: 10.3847/1538-4357/ac8ea8
|
2136 |
+
Stovall, K., Ray, P. S., Blythe, J., et al. 2015, The Astrophysical
|
2137 |
+
Journal, 808, 156, doi: 10.1088/0004-637x/808/2/156
|
2138 |
+
Trang, F. S., & Rickett, B. J. 2007, ApJ, 661, 1064,
|
2139 |
+
doi: 10.1086/516706
|
2140 |
+
Turner, J. E., McLaughlin, M. A., Cordes, J. M., et al. 2021, ApJ,
|
2141 |
+
917, 10, doi: 10.3847/1538-4357/abfafe
|
2142 |
+
van der Walt, S., Colbert, S. C., & Varoquaux, G. 2011, Computing
|
2143 |
+
in Science Engineering, 13, 22
|
2144 |
+
Virtanen, P., Gommers, R., Oliphant, T. E., et al. 2020, Nature
|
2145 |
+
Methods, 17, 261,
|
2146 |
+
doi: https://doi.org/10.1038/s41592-019-0686-2
|
2147 |
+
Walker, M. A., Melrose, D. B., Stinebring, D. R., & Zhang, C. M.
|
2148 |
+
2004, MNRAS, 354, 43,
|
2149 |
+
doi: 10.1111/j.1365-2966.2004.08159.x
|
2150 |
+
Walker, M. A., & Stinebring, D. R. 2005, MNRAS, 362, 1279,
|
2151 |
+
doi: 10.1111/j.1365-2966.2005.09396.x
|
2152 |
+
|
9tE4T4oBgHgl3EQf3g1J/content/tmp_files/load_file.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
A9FKT4oBgHgl3EQfWS5f/content/2301.11791v1.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:bc4e80794b3ba6773137ed99879622309c3c326ccdc0996759903b5b1fe7a915
|
3 |
+
size 319499
|
A9FKT4oBgHgl3EQfWS5f/vector_store/index.faiss
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:a64a8755038b90a044f7666d5affac834fd155864e1a7a812d0ffb927342baa1
|
3 |
+
size 3932205
|
A9FKT4oBgHgl3EQfWS5f/vector_store/index.pkl
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:c1dadb644931e7174e19f40950dacabb19ac76e4f471e7265f5c047825b15fe6
|
3 |
+
size 142740
|
B9E4T4oBgHgl3EQfeA2w/content/tmp_files/2301.05096v1.pdf.txt
ADDED
@@ -0,0 +1,734 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
Asynchronous training of quantum reinforcement learning
|
2 |
+
Samuel Yen-Chi Chen1
|
3 |
+
1Wells Fargo
|
4 |
+
(Dated: January 13, 2023)
|
5 |
+
Abstract
|
6 |
+
The development of quantum machine learning (QML) has received a lot of interest recently
|
7 |
+
thanks to developments in both quantum computing (QC) and machine learning (ML). One of
|
8 |
+
the ML paradigms that can be utilized to address challenging sequential decision-making issues is
|
9 |
+
reinforcement learning (RL). It has been demonstrated that classical RL can successfully complete
|
10 |
+
many difficult tasks. A leading method of building quantum RL agents relies on the variational
|
11 |
+
quantum circuits (VQC). However, training QRL algorithms with VQCs requires significant amount
|
12 |
+
of computational resources. This issue hurdles the exploration of various QRL applications. In
|
13 |
+
this paper, we approach this challenge through asynchronous training QRL agents. Specifically,
|
14 |
+
we choose the asynchronous training of advantage actor-critic variational quantum policies. We
|
15 |
+
demonstrate the results via numerical simulations that within the tasks considered, the asyn-
|
16 |
+
chronous training of QRL agents can reach performance comparable to or superior than classical
|
17 |
+
agents with similar model sizes and architectures.
|
18 |
+
1
|
19 |
+
arXiv:2301.05096v1 [quant-ph] 12 Jan 2023
|
20 |
+
|
21 |
+
I.
|
22 |
+
INTRODUCTION
|
23 |
+
Quantum computing (QC) has been posited as a means of achieving computational supe-
|
24 |
+
riority for certain tasks that classical computers struggle to solve [1]. Despite this potential,
|
25 |
+
the lack of error-correction in current quantum computers has made it challenging to ef-
|
26 |
+
fectively implement complex quantum circuits on these ”noisy intermediate-scale quantum”
|
27 |
+
(NISQ) devices [2]. To harness the quantum advantages offered by NISQ devices, the devel-
|
28 |
+
opment of specialized quantum circuit architectures is necessary.
|
29 |
+
Recent advances in the hybrid quantum-classical computing framework [3] that utilizes
|
30 |
+
both classical and quantum computing. Under this approach, certain computational tasks
|
31 |
+
that are expected to benefit from quantum processing are executed on a quantum computer,
|
32 |
+
while others, such as gradient calculations, are performed on classical computers. This hybrid
|
33 |
+
approach aims to take advantage of the strengths of both types of computing to address a
|
34 |
+
wide range of tasks. Hybrid algorithms that utilize variational quantum circuits (VQC)
|
35 |
+
have proven to be effective in a variety of machine learning tasks. VQCs are a subclass of
|
36 |
+
quantum circuits that possess tunable parameters, and their incorporation into QML models
|
37 |
+
has demonstrated success in a wide range of tasks [3, 4].
|
38 |
+
Reinforcement learning (RL) is a branch of machine learning that deals with sequential
|
39 |
+
decision making tasks. Deep neural network-based RL has achieved remarkable results in
|
40 |
+
complicated tasks with human-level [5] or super-human performance [6]. However, quantum
|
41 |
+
RL is a developing field with many unresolved issues and challenges. The majority of existing
|
42 |
+
quantum RL models are based on VQC [7–11]. Although these models have been shown to
|
43 |
+
perform well in a variety of benchmark tasks, training them requires a significant amount
|
44 |
+
of computational resources. The long training time limits the exploration of quantum RL’s
|
45 |
+
broad application possibilities. We propose an asynchronous training framework for quantum
|
46 |
+
RL agents in this paper. We focus on the asynchronous training of advantage actor-critic
|
47 |
+
quantum policies using multiple instances of agents running in parallel.
|
48 |
+
We show, using numerical simulations, that quantum models may outperform or be sim-
|
49 |
+
ilar to classical models in the various benchmark tasks considered. Furthermore, the sug-
|
50 |
+
gested training approach has the practical advantage of requiring significantly less time for
|
51 |
+
training, allowing for more quantum RL applications.
|
52 |
+
The structure of this paper is as follows: In SectionII, we provide an overview of relevant
|
53 |
+
2
|
54 |
+
|
55 |
+
prior work and compare our proposal to these approaches. In SectionIII, we provide a brief
|
56 |
+
overview of the necessary background in reinforcement learning. In SectionIV, we introduce
|
57 |
+
the concept of variational quantum circuits (VQCs), which serve as the building blocks of
|
58 |
+
our quantum reinforcement learning agents. In SectionV, we present our proposed quantum
|
59 |
+
A3C framework. In Section VI, we describe our experimental setup and present our results.
|
60 |
+
Finally, in Section VII, we offer some concluding remarks.
|
61 |
+
II.
|
62 |
+
RELEVANT WORKS
|
63 |
+
The work that gave rise to quantum reinforcement learning (QRL) [12] may be traced
|
64 |
+
back to [13]. However, the framework demands a quantum environment, which may not
|
65 |
+
be met in most real-world situations. Further studies utilizing Grover-like methods include
|
66 |
+
[14, 15]. Quantum linear system solvers are also used to implement quantum policy iteration
|
67 |
+
[16]. We will concentrate on recent advancements in VQC-based QRL dealing with classical
|
68 |
+
environments.
|
69 |
+
The first VQC-based QRL [7], which is the quantum version of deep Q-
|
70 |
+
learning (DQN), considers discrete observation and action spaces in the testing environments
|
71 |
+
such as Frozen-Lake and Cognitive-Radio. Later, more sophisticated efforts in the area of
|
72 |
+
quantum DQN take into account continuous observation spaces like Cart-Pole [8, 9]. A
|
73 |
+
further development along this direction includes the using of quantum recurrent neural
|
74 |
+
networks such as QLSTM as the value function approximator [17] to tackle challenges such
|
75 |
+
as partial observability or environments requiring longer memory of previous steps. Various
|
76 |
+
methods such as hybrid quantum-classical linear solver are developed to find value functions
|
77 |
+
[18]. A further improvement of DQN which can improve the agent convergence such as
|
78 |
+
Double DQN (DDQN) are also implemented within VQC framework in the work [19], in
|
79 |
+
which the authors apply QRL to solve robot navigation task. Recent advances in QRL
|
80 |
+
have led to the development of frameworks that aim to learn policy functions, denoted as
|
81 |
+
π, directly. These frameworks are able to learn the optimal policy for a given problem,
|
82 |
+
in addition to learning value functions such as the Q-function.
|
83 |
+
For example, the paper
|
84 |
+
[10] describes the quantum policy gradient RL through the use of REINFORCE algorithm.
|
85 |
+
Then, the work [11] consider an improved policy gradient algorithm called PPO with VQCs
|
86 |
+
and show that even with a small number of parameters, quantum models can outperform
|
87 |
+
their classical counterparts. Provable quantum advantages of policy gradient are shown in
|
88 |
+
3
|
89 |
+
|
90 |
+
the work [20]. Additional research, such as the work in [21], has explored the impact of
|
91 |
+
various post-processing methods for VQC on the performance of quantum policy gradients.
|
92 |
+
Several improved quantum policy gradient algorithms have been proposed in recent years,
|
93 |
+
including actor-critic [22] and soft actor-critic (SAC) [23, 24]. These modifications seek to
|
94 |
+
further improve the efficiency and effectiveness of QRL methods. QRL has also been applied
|
95 |
+
to the field of quantum control [25] and has been extended to the multi-agent setting [26–
|
96 |
+
28]. The work [29] were the first to explore the use of evolutionary optimization for QRL.
|
97 |
+
In their work, multiple agents were initialized and run in parallel, with the top performing
|
98 |
+
agents being selected as parents to generate the next generation of agents. In the work [30],
|
99 |
+
the authors studied the use of advanced quantum policy gradient methods, such as the deep
|
100 |
+
deterministic policy gradient (DDPG) algorithm, for QRL in continuous action spaces.
|
101 |
+
In this work, we extend upon previous research on quantum policy gradient [10, 11, 22] by
|
102 |
+
introducing an asynchronous training method for quantum policy learning. While previous
|
103 |
+
approaches have employed single-threaded training, our method utilizes an asynchronous
|
104 |
+
approach, which may offer practical benefits such as reduced training time through the use
|
105 |
+
of multi-core CPU computing resources and the potential for utilizing multiple quantum
|
106 |
+
processing units (QPUs) in the future.
|
107 |
+
Our approach shares some similarities with the
|
108 |
+
evolutionary QRL method presented in [29], which also utilizes parallel computing resources.
|
109 |
+
However, our approach differs in that individual agents can share their gradients directly
|
110 |
+
with the shared global gradient asynchronously, rather than waiting for all agents to finish
|
111 |
+
before calculating fitness and creating the next generation of agents. This characteristic
|
112 |
+
may further improve the efficiency of the training process. These contributions represent a
|
113 |
+
novel advancement in the field of quantum reinforcement learning.
|
114 |
+
III.
|
115 |
+
REINFORCEMENT LEARNING
|
116 |
+
Reinforcement learning (RL) is a machine learning framework in which an agent learns to
|
117 |
+
accomplish a given goal by interacting with an environment E in discrete time steps [31]. The
|
118 |
+
agent observes a state st at each time step t and then chooses an action at from the action
|
119 |
+
space A based on its current policy π. The policy is a mapping from a specific state st to the
|
120 |
+
probabilities of choosing one of the actions in A. After performing the action at, the agent
|
121 |
+
gets a scalar reward rt and the state of the following time step st+1 from the environment.
|
122 |
+
4
|
123 |
+
|
124 |
+
For episodic tasks, the procedure is repeated across a number of time steps until the agent
|
125 |
+
reaches the terminal state or the maximum number of steps permitted. Seeing the state
|
126 |
+
st along the training process, the agent aims to maximize the expected return, which can
|
127 |
+
be expressed as the value function at state s under policy π, V π(s) = E [Rt|st = s], where
|
128 |
+
Rt = �T
|
129 |
+
t′=t γt′−trt′ is the return, the total discounted reward from time step t. The value
|
130 |
+
function can be further expressed as V π(s) = �
|
131 |
+
a∈A Qπ(s, a)π(a|s), where the action-value
|
132 |
+
function or Q-value function Qπ(s, a) = E[Rt|st = s, a] is the expected return of choosing
|
133 |
+
an action a ∈ A in state s according to the policy π. The Q-learning is RL algorithm to
|
134 |
+
optimize the Qπ(s, a) via the following formula
|
135 |
+
Q (st, at) ← Q (st, at)
|
136 |
+
+ α
|
137 |
+
�
|
138 |
+
rt + γ max
|
139 |
+
a
|
140 |
+
Q (st+1, a) − Q (st, at)
|
141 |
+
�
|
142 |
+
.
|
143 |
+
(1)
|
144 |
+
In contrast to value-based reinforcement learning techniques, such as Q-learning, which
|
145 |
+
rely on learning a value function and using it to guide decision-making at each time step,
|
146 |
+
policy gradient methods focus on directly optimizing a policy function, denoted as π(a|s; θ),
|
147 |
+
parametrized by θ. The parameters θ are updated through a gradient ascent procedure
|
148 |
+
on the expected total return, E[Rt]. A notable example of a policy gradient algorithm is
|
149 |
+
the REINFORCE algorithm, introduced in [32]. In the standard REINFORCE algorithm,
|
150 |
+
the parameters θ are updated along the direction ∇θ log π (at|st; θ) Rt, which is an unbiased
|
151 |
+
estimate of ∇θE [Rt]. However, this policy gradient estimate often suffers from high variance,
|
152 |
+
making training difficult.
|
153 |
+
To reduce the variance of this estimate while maintaining its
|
154 |
+
unbiasedness, a term known as the baseline can be subtracted from the return. This baseline,
|
155 |
+
denoted as bt(st), is a learned function of the state st.
|
156 |
+
The resulting update becomes
|
157 |
+
∇θ log π (at|st; θ) (Rt − bt (st)). A common choice for the baseline bt(st) in RL is an estimate
|
158 |
+
of the value function V π(st).
|
159 |
+
Using this choice for the baseline often results in a lower
|
160 |
+
variance estimate of the policy gradient [31]. The quantity Rt − bt = Q(st, at) − V (st) can
|
161 |
+
be interpreted as the advantage A(st, at) of action at at state st. Intuitively, the advantage
|
162 |
+
can be thought of as the ”goodness or badness” of action at relative to the average value
|
163 |
+
at state st. This approach is known as the advantage actor-critic (A2C) method, where the
|
164 |
+
policy π is the actor and the baseline, which is the value function V , is the critic [31].
|
165 |
+
The asynchronous advantage actor-critic (A3C) algorithm [33] is a variant of the A2C
|
166 |
+
method that employs multiple concurrent actors to learn the policy through parallelization.
|
167 |
+
5
|
168 |
+
|
169 |
+
Asynchronous training of RL agents involves executing multiple agents on multiple instances
|
170 |
+
of the environment, allowing the agents to encounter diverse states at any given time step.
|
171 |
+
This diminished correlation between states or observations enhances the numerical stability
|
172 |
+
of on-policy RL algorithms such as actor-critic [33]. Furthermore, asynchronous training does
|
173 |
+
not require the maintenance of a large replay memory, thus reducing memory requirements
|
174 |
+
[33]. By harnessing the advantages and gradients computed by a pool of actors, A3C exhibits
|
175 |
+
impressive sample efficiency and robust learning performance, making it a prevalent choice
|
176 |
+
in the realm of reinforcement learning.
|
177 |
+
IV.
|
178 |
+
VARIATIONAL QUANTUM CIRCUIT
|
179 |
+
Variational quantum circuits (VQCs), also referred to as parameterized quantum circuits
|
180 |
+
(PQCs), are a class of quantum circuits that contain tunable parameters. These parame-
|
181 |
+
ters can be optimized using various techniques from classical machine learning, including
|
182 |
+
gradient-based and non-gradient-based methods. A generic illustration of a VQC is in the
|
183 |
+
central part of Figure 1.
|
184 |
+
The three primary components of a VQC are the encoding circuit, the variational circuit,
|
185 |
+
and the quantum measurement layer. The encoding circuit, denoted as U(x), transforms
|
186 |
+
classical values into a quantum state, while the variational circuit, denoted as V (θ), serves
|
187 |
+
as the learnable part of the VQC. The quantum measurement layer, on the other hand,
|
188 |
+
is utilized to extract information from the circuit. It is a common practice to repeatedly
|
189 |
+
execute the circuit, also known as ”shots,” in order to obtain the expectation values of
|
190 |
+
each qubit. A common choice is to use the Pauli-Z expectation values. Instead of being
|
191 |
+
binary integers, the values are received as floats. Additionally, other components, such as
|
192 |
+
additional VQCs or classical components such as DNN, can process the values obtained from
|
193 |
+
the circuit.
|
194 |
+
The VQC can operate with other classical components such as tensor networks (TN) [29,
|
195 |
+
34, 35] and deep neural networks (NN) to perform data pre-processing such as dimensional
|
196 |
+
reduction or post-processing such as scaling. We call such VQCs as dressed VQC, as shown
|
197 |
+
in Figure 1. The whole model can be trained in an end-to-end manner via gradient-based
|
198 |
+
[34, 35] or gradient-free methods [29]. For the gradient-based methods, the whole model
|
199 |
+
can be represented as a directed acyclic graph (DAG) and then back-propagation can be
|
200 |
+
6
|
201 |
+
|
202 |
+
applied. The success of such end-to-end optimization relies on the capabilities of calculating
|
203 |
+
the quantum gradients such as parameter-shift rule [36]. VQC-based QML models have
|
204 |
+
shown success in areas such as classification [34–38], natural language processing [39–41]
|
205 |
+
and sequence modeling [42, 43].
|
206 |
+
Hybrid VQC
|
207 |
+
U(x)
|
208 |
+
V(θ)
|
209 |
+
|0⟩
|
210 |
+
|0⟩
|
211 |
+
|0⟩
|
212 |
+
|0⟩
|
213 |
+
NN
|
214 |
+
NN
|
215 |
+
FIG. 1. Hybrid variational quantum circuit (VQC) architecture. The hybrid VQC archi-
|
216 |
+
tecture includes a VQC and classical neural networks (NN) before and after the VQC. NN can be
|
217 |
+
used to reduce the dimensionality of the input data and refine the outputs from the VQC.
|
218 |
+
V.
|
219 |
+
QUANTUM A3C
|
220 |
+
The proposed quantum asynchronous advantage actor-critic (QA3C) framework consists
|
221 |
+
of two main components: a global shared memory and process-specific memories for each
|
222 |
+
agent. The global shared memory maintains the dressed VQC policy and value parameters,
|
223 |
+
which are modified when an individual process uploads its own gradients for parameter up-
|
224 |
+
dates. Each agent has its own process-specific memory that maintains local dressed VQC
|
225 |
+
policy and value parameters. These local models are used to generate actions during an
|
226 |
+
episode within individual processes. When certain criteria are met, the gradients of the
|
227 |
+
local model parameters are uploaded to the global shared memory, and the global model
|
228 |
+
parameters are modified accordingly. The updated global model parameters are then im-
|
229 |
+
mediately downloaded to the local agent that just uploaded its own gradients. The overall
|
230 |
+
concept of QA3C is depicted in Figure 2.
|
231 |
+
We construct the quantum policy π (at | st; θ) and value V (st; θv) function with the
|
232 |
+
dressed VQC as shown in Figure 1, in which the VQC follows the architecture shown in
|
233 |
+
7
|
234 |
+
|
235 |
+
⋯
|
236 |
+
Worker 1
|
237 |
+
Worker 2
|
238 |
+
Worker 3
|
239 |
+
Worker n
|
240 |
+
Environment 1
|
241 |
+
Environment 2
|
242 |
+
Environment 3
|
243 |
+
Environment n
|
244 |
+
Global Parameter
|
245 |
+
st
|
246 |
+
π(at|st)
|
247 |
+
V(st)
|
248 |
+
FIG. 2.
|
249 |
+
Quantum asynchronous advantage actor-critic (A3C) learner.
|
250 |
+
The proposed
|
251 |
+
quantum A3C includes a global shared parameters and multiple parallel workers.
|
252 |
+
The action
|
253 |
+
generation process within each local agent is performed using the dressed VQC policy and value
|
254 |
+
functions stored in the process-specific memories. Upon meeting certain criteria, the gradients of
|
255 |
+
the local model parameters are uploaded to the global shared memory, where the global model
|
256 |
+
parameters are updated. The updated global model parameters are then immediately downloaded
|
257 |
+
to the local agent that just uploaded its own gradients.
|
258 |
+
Figure 3. This VQC architecture has been studied in the work such as quantum recurrent
|
259 |
+
neural networks (QRNN) [42], quantum recurrent RL [17], quantum convolutional neural
|
260 |
+
networks [44], federated quantum classification [38] and has demonstrated superior perfor-
|
261 |
+
mance over their classical counterparts under certain conditions. In addition, we employ
|
262 |
+
the classical DNN before and after the VQC to dimensionally reduce the data and fine-tune
|
263 |
+
the outputs from the VQC, respectively. The neural network components in this hybrid
|
264 |
+
architecture consist of single-layer networks for dimensionality conversion. Specifically, the
|
265 |
+
network preceding the VQC is a linear layer with an input dimension equal to the size of the
|
266 |
+
observation vector and an output dimension equal to the number of qubits in the VQC. The
|
267 |
+
networks following the VQC are linear layers with input dimensions equal to the number
|
268 |
+
of qubits in the VQC and output dimensions equal to the number of actions (for the actor
|
269 |
+
function π (at | st; θ)) or 1 (for the critic function V (st; θv)). These layers serve to convert
|
270 |
+
8
|
271 |
+
|
272 |
+
the output of the VQC for use in the actor-critic algorithm. The policy and value function
|
273 |
+
are updated after every S steps or when the agent reaches the terminal state. The details
|
274 |
+
of the algorithm such as the gradient update formulas are presented in Algorithm 1.
|
275 |
+
|0⟩
|
276 |
+
H
|
277 |
+
Ry(arctan(x1))
|
278 |
+
Rz(arctan(x2
|
279 |
+
1))
|
280 |
+
•
|
281 |
+
•
|
282 |
+
R(α1, β1, γ1)
|
283 |
+
|0⟩
|
284 |
+
H
|
285 |
+
Ry(arctan(x2))
|
286 |
+
Rz(arctan(x2
|
287 |
+
2))
|
288 |
+
•
|
289 |
+
•
|
290 |
+
R(α2, β2, γ2)
|
291 |
+
|0⟩
|
292 |
+
H
|
293 |
+
Ry(arctan(x3))
|
294 |
+
Rz(arctan(x2
|
295 |
+
3))
|
296 |
+
•
|
297 |
+
•
|
298 |
+
R(α3, β3, γ3)
|
299 |
+
|0⟩
|
300 |
+
H
|
301 |
+
Ry(arctan(x4))
|
302 |
+
Rz(arctan(x2
|
303 |
+
4))
|
304 |
+
•
|
305 |
+
•
|
306 |
+
R(α4, β4, γ4)
|
307 |
+
FIG. 3. VQC architecture for quantum A3C. The VQC used here includes Ry and Rz for
|
308 |
+
encoding classical values x, multiple CNOT gates to entangle qubits, general unitary rotations R
|
309 |
+
and the final measurement. The output of the VQC consists of Pauli-Z expectation values, which
|
310 |
+
are obtained through multiple runs (shots) of the circuit.
|
311 |
+
These values are then processed by
|
312 |
+
classical neural networks for further use. We use a 4-qubit system as an example here, however, it
|
313 |
+
can be enlarge or shrink based on the problem of interest. In this work, the number of qubit is 8.
|
314 |
+
VI.
|
315 |
+
EXPERIMENTS AND RESULTS
|
316 |
+
A.
|
317 |
+
Testing Environments
|
318 |
+
1.
|
319 |
+
Acrobot
|
320 |
+
The Acrobot environment from OpenAI Gym [45] consists of a system with two linearly
|
321 |
+
connected links, with one end fixed. The joint connecting the two links can be actuated by
|
322 |
+
applying torques. The goal is to swing the free end of the chain over a predetermined height,
|
323 |
+
starting from a downward hanging position, using as few steps as possible. The observation
|
324 |
+
in this environment is a six-dimensional vector comprising the sine and cosine values of the
|
325 |
+
two rotational joint angles, as well as their angular velocities. The agents are able to take
|
326 |
+
one of three actions: applying −1, 0, or +1 torque to the actuated joint. An action resulting
|
327 |
+
in the free end reaching the target height receives a reward of 0 and terminates the episode.
|
328 |
+
Any action that does not lead to the desired height receives a reward of −1. The reward
|
329 |
+
threshold is −100.
|
330 |
+
9
|
331 |
+
|
332 |
+
FIG. 4. The Acrobat environment from OpenAI Gym.
|
333 |
+
2.
|
334 |
+
Cart-Pole
|
335 |
+
Cart-Pole is a commonly used evaluation environment for simple RL models that has
|
336 |
+
been utilized as a standard example with in OpenAI Gym [45] (see Figure 5).
|
337 |
+
A fixed
|
338 |
+
junction connects a pole to a cart traveling horizontally over a frictionless track in this
|
339 |
+
environment. The pendulum initially stands upright, and the aim is to keep it as near to its
|
340 |
+
starting position as possible by moving the cart left and right. Each time step, the RL agent
|
341 |
+
learns to produce the right action according on the observation it gets. The observation in
|
342 |
+
this environment is a four dimensional vector st containing values of the cart position, cart
|
343 |
+
velocity, pole angle, and pole velocity at the tip. Every time step where the pole is near to
|
344 |
+
being upright results in a +1 award. An episode ends if the pole is inclined more than 15
|
345 |
+
degrees from vertical or the cart moves more than 2.4 units away from the center.
|
346 |
+
FIG. 5. The Cart-Pole environment from OpenAI Gym.
|
347 |
+
10
|
348 |
+
|
349 |
+
3.
|
350 |
+
MiniGrid-SimpleCrossing
|
351 |
+
The MiniGrid-SimpleCrossing environment [46] is more sophisticated, with a lot bigger
|
352 |
+
observation input for the RL agent. In this scenario, the RL agent receives a 7 × 7 × 3 =
|
353 |
+
147 dimensional vector through observation and must choose an action from the action
|
354 |
+
space A, which offers six options. It is important to note that the 147-dimensional vector
|
355 |
+
is a compact and efficient representation of the environment rather than the real pixels.
|
356 |
+
There are six actions 0,· · · ,5 in the action space A for the agent to choose.
|
357 |
+
They are
|
358 |
+
turn left, turn right, move forward, pick up an object, drop the object being carried and
|
359 |
+
toggle. Only the first three of them are having actual effects in this case. The agent is
|
360 |
+
expected to learn this fact. In this environment, the agent receives a reward of 1 upon
|
361 |
+
reaching the goal.
|
362 |
+
A penalty is subtracted from this reward based on the formula 1 −
|
363 |
+
0.9 × (number of steps/max steps allowed), where the maximum number of steps allowed is
|
364 |
+
defined as 4 × n × n, and n is the grid size [46]. In this work, n is set to 9. This reward
|
365 |
+
scheme presents a challenge because it is sparse, meaning that the agent does not receive
|
366 |
+
rewards until it reaches the goal. As shown in Figure 6, the agent (shown in red triangle)
|
367 |
+
is expected to find the shortest path from the starting point to the goal (shown in green).
|
368 |
+
We consider three cases in this environment: MiniGrid-SimpleCrossingS9N1-v0, MiniGrid-
|
369 |
+
SimpleCrossingS9N2-v0 and MiniGrid-SimpleCrossingS9N3-v0. Here the N represents the
|
370 |
+
number of valid crossings across walls from the starting position to the goal.
|
371 |
+
B.
|
372 |
+
Hyperparameters and Model Size
|
373 |
+
In the proposed QA3C, we use the Adam optimizer with learning rate 1×10−4, β1 = 0.92
|
374 |
+
and β2 = 0.999. The local agents will update the parameters with the global shared memory
|
375 |
+
every S = 5 steps. The discount factor γ is set to be 0.9. For the VQC, we set the number
|
376 |
+
of qubits to be 8 and two variational layers are used. Therefore, for each VQC, there are
|
377 |
+
8 × 3 × 2 = 48 quantum parameters. Actor and critic both have their own VQC, thus
|
378 |
+
the total number of quantum parameters is 96. The VQC architecture are the same across
|
379 |
+
various testing environments considered in this work. As we described in the Section V,
|
380 |
+
single layer networks are used before and after the VQC to convert the dimensions of data.
|
381 |
+
The networks preceding the VQC have input dimensions based on the environments that
|
382 |
+
11
|
383 |
+
|
384 |
+
(a)
|
385 |
+
(b)
|
386 |
+
(c)
|
387 |
+
FIG. 6. The SimpleCrossing environment from MiniGrid. The three environments from
|
388 |
+
MiniGrid-SimpleCrossing we consider in this work.
|
389 |
+
In each environment, there are also walls
|
390 |
+
which span 1 unit on each side (not shown in the figure).
|
391 |
+
(a), (b) and (c) represent exam-
|
392 |
+
ples from the MiniGrid-SimpleCrossingS9N1-v0, MiniGrid-SimpleCrossingS9N2-v0 and MiniGrid-
|
393 |
+
SimpleCrossingS9N3-v0 environments, respectively.
|
394 |
+
the agent is to solve. For the classical benchmarks, we consider the model which are very
|
395 |
+
similar to the dressed VQC model. Specifically, we keep the architecture of classical model
|
396 |
+
similar to the one presented in Figure 1 while we replace the 8-qubit VQC with a single
|
397 |
+
layer with input and output dimensions equal to 8. This makes the architecture very similar
|
398 |
+
to the quantum model and the number of parameters are also very close. We summarize
|
399 |
+
the number of parameters in Table I. We utilize the open-source PennyLane package [47]
|
400 |
+
QA3C
|
401 |
+
Classical
|
402 |
+
Classical Quantum Total
|
403 |
+
Total
|
404 |
+
Acrobot
|
405 |
+
148
|
406 |
+
96
|
407 |
+
244
|
408 |
+
292
|
409 |
+
Cart-Pole
|
410 |
+
107
|
411 |
+
96
|
412 |
+
203
|
413 |
+
251
|
414 |
+
SimpleCrossing
|
415 |
+
2431
|
416 |
+
96
|
417 |
+
2527
|
418 |
+
2575
|
419 |
+
TABLE I. Number of parameters. We provide details on the number of parameters in the
|
420 |
+
proposed QA3C model, which includes both quantum and classical components.
|
421 |
+
The classical
|
422 |
+
benchmarks were designed with architectures similar to the quantum model, resulting in similar
|
423 |
+
model sizes.
|
424 |
+
to construct the quantum circuit models and the PyTorch as a overall machine learning
|
425 |
+
12
|
426 |
+
|
427 |
+
framework. The number of CPU cores and hence the number of parallel agents is 80 in
|
428 |
+
this work. We present simulation results in which the scores from the past 100 episodes are
|
429 |
+
averaged.
|
430 |
+
C.
|
431 |
+
Results
|
432 |
+
1.
|
433 |
+
Acrobot
|
434 |
+
We begin by evaluating the performance of our models on the Acrobot environment. The
|
435 |
+
simulation results of this experiment are presented in Figure7. The total number of episodes
|
436 |
+
was 100,000. As shown in the figure, the quantum model exhibits a gradual improvement
|
437 |
+
during the early training episodes, while the classical model struggles to improve its policy.
|
438 |
+
In terms of average score, the quantum model demonstrates superior performance compared
|
439 |
+
to the classical model. Furthermore, the quantum model exhibits a more stable convergence
|
440 |
+
pattern, without significant fluctuations or collapses after reaching optimal scores. These
|
441 |
+
results suggest that the quantum model may be more robust and reliable in this environment.
|
442 |
+
0
|
443 |
+
20000
|
444 |
+
40000
|
445 |
+
60000
|
446 |
+
80000
|
447 |
+
100000
|
448 |
+
Episode #
|
449 |
+
500
|
450 |
+
400
|
451 |
+
300
|
452 |
+
200
|
453 |
+
100
|
454 |
+
0
|
455 |
+
Average Score
|
456 |
+
Quantum
|
457 |
+
Classical
|
458 |
+
FIG. 7. Results: Quantum A3C in the Acrobot environment.
|
459 |
+
13
|
460 |
+
|
461 |
+
2.
|
462 |
+
Cart-Pole
|
463 |
+
The next experiment was conducted in the Cart-Pole environment. The total number of
|
464 |
+
episodes was 100,000. As illustrated in Figure 8, the quantum model achieved significantly
|
465 |
+
higher scores than the classical model. While the classical model demonstrated faster learn-
|
466 |
+
ing in the early training episodes, the quantum model eventually surpassed it and reached
|
467 |
+
superior scores. These results suggest that the quantum model may be more effective in this
|
468 |
+
environment.
|
469 |
+
0
|
470 |
+
20000
|
471 |
+
40000
|
472 |
+
60000
|
473 |
+
80000
|
474 |
+
100000
|
475 |
+
Episode #
|
476 |
+
0
|
477 |
+
100
|
478 |
+
200
|
479 |
+
300
|
480 |
+
400
|
481 |
+
500
|
482 |
+
Average Score
|
483 |
+
Quantum
|
484 |
+
Classical
|
485 |
+
FIG. 8. Results: Quantum A3C in the CartPole environment.
|
486 |
+
3.
|
487 |
+
MiniGrid-SimpleCrossing
|
488 |
+
The final experiment was conducted in the MiniGrid-SimpleCrossing environment, com-
|
489 |
+
prising a total of 100,000 episodes.
|
490 |
+
As depicted in Figure 9, among the three scenar-
|
491 |
+
ios, MiniGrid-SimpleCrossingS9N1-v0, MiniGrid-SimpleCrossingS9N2-v0, and MiniGrid-
|
492 |
+
SimpleCrossingS9N3-v0, the quantum model outperformed the classical model in two of
|
493 |
+
the three scenarios, MiniGrid-SimpleCrossingS9N2-v0 and MiniGrid-SimpleCrossingS9N3-
|
494 |
+
v0, demonstrating faster convergence and higher scores. Even in the remaining scenario,
|
495 |
+
MiniGrid-SimpleCrossingS9N1-v0, the difference in performance between the two models
|
496 |
+
14
|
497 |
+
|
498 |
+
was minor.
|
499 |
+
0
|
500 |
+
20000
|
501 |
+
40000
|
502 |
+
60000
|
503 |
+
80000
|
504 |
+
100000
|
505 |
+
Episode #
|
506 |
+
0.2
|
507 |
+
0.0
|
508 |
+
0.2
|
509 |
+
0.4
|
510 |
+
0.6
|
511 |
+
0.8
|
512 |
+
1.0
|
513 |
+
1.2
|
514 |
+
Average Score
|
515 |
+
S9N1-Quantum
|
516 |
+
S9N1-Classical
|
517 |
+
0
|
518 |
+
20000
|
519 |
+
40000
|
520 |
+
60000
|
521 |
+
80000
|
522 |
+
100000
|
523 |
+
Episode #
|
524 |
+
Average Score
|
525 |
+
S9N2-Quantum
|
526 |
+
S9N2-Classical
|
527 |
+
0
|
528 |
+
20000
|
529 |
+
40000
|
530 |
+
60000
|
531 |
+
80000
|
532 |
+
100000
|
533 |
+
Episode #
|
534 |
+
Average Score
|
535 |
+
S9N3-Quantum
|
536 |
+
S9N3-Classical
|
537 |
+
FIG. 9. Results: Quantum A3C in the MiniGrid-SimpleCrossing environment.
|
538 |
+
VII.
|
539 |
+
CONCLUSION
|
540 |
+
In this study, we demonstrate the effectiveness of an asynchronous training framework for
|
541 |
+
quantum RL agents. Through numerical simulations, we show that in the benchmark tasks
|
542 |
+
considered, advantage actor-critic quantum policies trained asynchronously can outperform
|
543 |
+
or match the performance of classical models with similar architecture and sizes.
|
544 |
+
This
|
545 |
+
technique affords a strategy for expediting the training of quantum RL agents through
|
546 |
+
parallelization, and may have potential applications in various real-world scenarios.
|
547 |
+
ACKNOWLEDGMENTS
|
548 |
+
The views expressed in this article are those of the authors and do not represent the views
|
549 |
+
of Wells Fargo. This article is for informational purposes only. Nothing contained in this
|
550 |
+
article should be construed as investment advice. Wells Fargo makes no express or implied
|
551 |
+
warranties and expressly disclaims all legal, tax, and accounting implications related to this
|
552 |
+
article.
|
553 |
+
15
|
554 |
+
|
555 |
+
Appendix A: Algorithms
|
556 |
+
1.
|
557 |
+
Quantum-A3C
|
558 |
+
Algorithm 1 Quantum asynchronous advantage actor-critic learning (algorithm for each
|
559 |
+
actor-learner process)
|
560 |
+
Define the global update parameter S
|
561 |
+
Assume global shared hybrid VQC policy parameter θ
|
562 |
+
Assume global shared hybrid VQC value parameter θv
|
563 |
+
Assume global shared episode counter T = 0
|
564 |
+
Assume process-specific hybrid VQC policy parameter θ′
|
565 |
+
Assume process-specific hybrid VQC value parameter θ′
|
566 |
+
v
|
567 |
+
Initialize process-specific counter t = 1
|
568 |
+
while T < Tmax do
|
569 |
+
Reset gradients dθ ← 0 and dθv ← 0
|
570 |
+
Set tstart = t
|
571 |
+
Reset the environment and get state st
|
572 |
+
while st non-terminal or t − tstart < tmax do
|
573 |
+
Perform at according to policy π(at|st; θ′)
|
574 |
+
Receive reward rt and the new state st+1
|
575 |
+
Update process-specific counter t ← t + 1
|
576 |
+
if t mod S = 0 or reach terminal state then
|
577 |
+
Set R =
|
578 |
+
�
|
579 |
+
�
|
580 |
+
�
|
581 |
+
0
|
582 |
+
for terminal st
|
583 |
+
V (st, θ′
|
584 |
+
v)
|
585 |
+
for non-terminal st
|
586 |
+
for i ∈ {t − 1, . . . , tstart } do
|
587 |
+
R ← ri + γR
|
588 |
+
Accumulate gradients wrt θ′: dθ ← dθ + ∇θ′ log π (ai | si; θ′) (R − V (si; θ′
|
589 |
+
v))
|
590 |
+
Accumulate gradients wrt θ′
|
591 |
+
v: dθv ← dθv + ∂ (R − V (si; θ′
|
592 |
+
v))2 /∂θ′
|
593 |
+
v
|
594 |
+
end for
|
595 |
+
Perform asynchronous update of θ using dθ and of θv using dθv
|
596 |
+
Update process-specific parameters from global parameters: θ′ ← θ and θ′
|
597 |
+
v ← θv
|
598 |
+
end if
|
599 |
+
end while
|
600 |
+
end while
|
601 |
+
16
|
602 |
+
|
603 |
+
[1] M. A. Nielsen and I. L. Chuang, “Quantum computation and quantum information,” 2010.
|
604 |
+
[2] J. Preskill, “Quantum computing in the nisq era and beyond,” Quantum, vol. 2, p. 79, 2018.
|
605 |
+
[3] K. Bharti, A. Cervera-Lierta, T. H. Kyaw, T. Haug, S. Alperin-Lea, A. Anand, M. Deg-
|
606 |
+
roote, H. Heimonen, J. S. Kottmann, T. Menke, et al., “Noisy intermediate-scale quantum
|
607 |
+
algorithms,” Reviews of Modern Physics, vol. 94, no. 1, p. 015004, 2022.
|
608 |
+
[4] M. Cerezo, A. Arrasmith, R. Babbush, S. C. Benjamin, S. Endo, K. Fujii, J. R. McClean,
|
609 |
+
K. Mitarai, X. Yuan, L. Cincio, et al., “Variational quantum algorithms,” Nature Reviews
|
610 |
+
Physics, vol. 3, no. 9, pp. 625–644, 2021.
|
611 |
+
[5] V. Mnih, K. Kavukcuoglu, D. Silver, A. A. Rusu, J. Veness, M. G. Bellemare, A. Graves,
|
612 |
+
M. Riedmiller, A. K. Fidjeland, G. Ostrovski, et al., “Human-level control through deep
|
613 |
+
reinforcement learning,” nature, vol. 518, no. 7540, pp. 529–533, 2015.
|
614 |
+
[6] D. Silver, J. Schrittwieser, K. Simonyan, I. Antonoglou, A. Huang, A. Guez, T. Hubert,
|
615 |
+
L. Baker, M. Lai, A. Bolton, et al., “Mastering the game of go without human knowledge,”
|
616 |
+
nature, vol. 550, no. 7676, pp. 354–359, 2017.
|
617 |
+
[7] S. Y.-C. Chen, C.-H. H. Yang, J. Qi, P.-Y. Chen, X. Ma, and H.-S. Goan, “Variational
|
618 |
+
quantum circuits for deep reinforcement learning,” IEEE Access, vol. 8, pp. 141007–141024,
|
619 |
+
2020.
|
620 |
+
[8] O. Lockwood and M. Si, “Reinforcement learning with quantum variational circuit,” in Pro-
|
621 |
+
ceedings of the AAAI Conference on Artificial Intelligence and Interactive Digital Entertain-
|
622 |
+
ment, vol. 16, pp. 245–251, 2020.
|
623 |
+
[9] A. Skolik, S. Jerbi, and V. Dunjko, “Quantum agents in the gym: a variational quantum
|
624 |
+
algorithm for deep q-learning,” Quantum, vol. 6, p. 720, 2022.
|
625 |
+
[10] S. Jerbi, C. Gyurik, S. Marshall, H. J. Briegel, and V. Dunjko, “Variational quantum policies
|
626 |
+
for reinforcement learning,” arXiv preprint arXiv:2103.05577, 2021.
|
627 |
+
[11] J.-Y. Hsiao, Y. Du, W.-Y. Chiang, M.-H. Hsieh, and H.-S. Goan, “Unentangled quantum
|
628 |
+
reinforcement learning agents in the openai gym,” arXiv preprint arXiv:2203.14348, 2022.
|
629 |
+
[12] N. Meyer, C. Ufrecht, M. Periyasamy, D. D. Scherer, A. Plinge, and C. Mutschler, “A survey
|
630 |
+
on quantum reinforcement learning,” arXiv preprint arXiv:2211.03464, 2022.
|
631 |
+
[13] D. Dong, C. Chen, H. Li, and T.-J. Tarn, “Quantum reinforcement learning,” IEEE Transac-
|
632 |
+
17
|
633 |
+
|
634 |
+
tions on Systems, Man, and Cybernetics, Part B (Cybernetics), vol. 38, no. 5, pp. 1207–1220,
|
635 |
+
2008.
|
636 |
+
[14] S. Wiedemann, D. Hein, S. Udluft, and C. Mendl, “Quantum policy iteration via amplitude
|
637 |
+
estimation and grover search–towards quantum advantage for reinforcement learning,” arXiv
|
638 |
+
preprint arXiv:2206.04741, 2022.
|
639 |
+
[15] A. Sannia, A. Giordano, N. L. Gullo, C. Mastroianni, and F. Plastina, “A hybrid classical-
|
640 |
+
quantum approach to speed-up q-learning,” arXiv preprint arXiv:2205.07730, 2022.
|
641 |
+
[16] E. A. Cherrat, I. Kerenidis, and A. Prakash, “Quantum reinforcement learning via policy
|
642 |
+
iteration,” arXiv preprint arXiv:2203.01889, 2022.
|
643 |
+
[17] S.
|
644 |
+
Y.-C.
|
645 |
+
Chen,
|
646 |
+
“Quantum
|
647 |
+
deep
|
648 |
+
recurrent
|
649 |
+
reinforcement
|
650 |
+
learning,”
|
651 |
+
arXiv
|
652 |
+
preprint
|
653 |
+
arXiv:2210.14876, 2022.
|
654 |
+
[18] C.-C. CHEN, K. SHIBA, M. SOGABE, K. SAKAMOTO, and T. SOGABE, “Hybrid
|
655 |
+
quantum-classical ulam-von neumann linear solver-based quantum dynamic programing al-
|
656 |
+
gorithm,” Proceedings of the Annual Conference of JSAI, vol. JSAI2020, pp. 2K6ES203–
|
657 |
+
2K6ES203, 2020.
|
658 |
+
[19] D. Heimann, H. Hohenfeld, F. Wiebe, and F. Kirchner, “Quantum deep reinforcement learning
|
659 |
+
for robot navigation tasks,” arXiv preprint arXiv:2202.12180, 2022.
|
660 |
+
[20] S. Jerbi, A. Cornelissen, M. Ozols, and V. Dunjko, “Quantum policy gradient algorithms,”
|
661 |
+
arXiv preprint arXiv:2212.09328, 2022.
|
662 |
+
[21] N. Meyer, D. D. Scherer, A. Plinge, C. Mutschler, and M. J. Hartmann, “Quantum policy
|
663 |
+
gradient algorithm with optimized action decoding,” arXiv preprint arXiv:2212.06663, 2022.
|
664 |
+
[22] M. Schenk, E. F. Combarro, M. Grossi, V. Kain, K. S. B. Li, M.-M. Popa, and S. Vallecorsa,
|
665 |
+
“Hybrid actor-critic algorithm for quantum reinforcement learning at cern beam lines,” arXiv
|
666 |
+
preprint arXiv:2209.11044, 2022.
|
667 |
+
[23] Q. Lan, “Variational quantum soft actor-critic,” arXiv preprint arXiv:2112.11921, 2021.
|
668 |
+
[24] A. Acuto, P. Barill`a, L. Bozzolo, M. Conterno, M. Pavese, and A. Policicchio, “Variational
|
669 |
+
quantum soft actor-critic for robotic arm control,” arXiv preprint arXiv:2212.11681, 2022.
|
670 |
+
[25] A. Sequeira, L. P. Santos, and L. S. Barbosa, “Variational quantum policy gradients with an
|
671 |
+
application to quantum control,” arXiv preprint arXiv:2203.10591, 2022.
|
672 |
+
[26] W. J. Yun, Y. Kwak, J. P. Kim, H. Cho, S. Jung, J. Park, and J. Kim, “Quantum
|
673 |
+
multi-agent reinforcement learning via variational quantum circuit design,” arXiv preprint
|
674 |
+
18
|
675 |
+
|
676 |
+
arXiv:2203.10443, 2022.
|
677 |
+
[27] R. Yan, Y. Wang, Y. Xu, and J. Dai, “A multiagent quantum deep reinforcement learn-
|
678 |
+
ing method for distributed frequency control of islanded microgrids,” IEEE Transactions on
|
679 |
+
Control of Network Systems, vol. 9, no. 4, pp. 1622–1632, 2022.
|
680 |
+
[28] W. J. Yun, J. Park, and J. Kim, “Quantum multi-agent meta reinforcement learning,” arXiv
|
681 |
+
preprint arXiv:2208.11510, 2022.
|
682 |
+
[29] S. Y.-C. Chen, C.-M. Huang, C.-W. Hsing, H.-S. Goan, and Y.-J. Kao, “Variational quan-
|
683 |
+
tum reinforcement learning via evolutionary optimization,” Machine Learning: Science and
|
684 |
+
Technology, vol. 3, no. 1, p. 015025, 2022.
|
685 |
+
[30] S. Wu, S. Jin, D. Wen, and X. Wang, “Quantum reinforcement learning in continuous action
|
686 |
+
space,” arXiv preprint arXiv:2012.10711, 2020.
|
687 |
+
[31] R. S. Sutton and A. G. Barto, Reinforcement learning: An introduction. MIT press, 2018.
|
688 |
+
[32] R. J. Williams, “Simple statistical gradient-following algorithms for connectionist reinforce-
|
689 |
+
ment learning,” Machine learning, vol. 8, no. 3-4, pp. 229–256, 1992.
|
690 |
+
[33] V. Mnih, A. P. Badia, M. Mirza, A. Graves, T. Lillicrap, T. Harley, D. Silver, and
|
691 |
+
K. Kavukcuoglu, “Asynchronous methods for deep reinforcement learning,” in International
|
692 |
+
conference on machine learning, pp. 1928–1937, PMLR, 2016.
|
693 |
+
[34] S. Y.-C. Chen, C.-M. Huang, C.-W. Hsing, and Y.-J. Kao, “An end-to-end trainable hy-
|
694 |
+
brid classical-quantum classifier,” Machine Learning: Science and Technology, vol. 2, no. 4,
|
695 |
+
p. 045021, 2021.
|
696 |
+
[35] J. Qi, C.-H. H. Yang, and P.-Y. Chen, “Qtn-vqc: An end-to-end learning framework for
|
697 |
+
quantum neural networks,” arXiv preprint arXiv:2110.03861, 2021.
|
698 |
+
[36] K. Mitarai, M. Negoro, M. Kitagawa, and K. Fujii, “Quantum circuit learning,” Physical
|
699 |
+
Review A, vol. 98, no. 3, p. 032309, 2018.
|
700 |
+
[37] M. Chehimi and W. Saad, “Quantum federated learning with quantum data,” in ICASSP
|
701 |
+
2022-2022 IEEE International Conference on Acoustics, Speech and Signal Processing
|
702 |
+
(ICASSP), pp. 8617–8621, IEEE, 2022.
|
703 |
+
[38] S. Y.-C. Chen and S. Yoo, “Federated quantum machine learning,” Entropy, vol. 23, no. 4,
|
704 |
+
p. 460, 2021.
|
705 |
+
[39] C.-H. H. Yang, J. Qi, S. Y.-C. Chen, P.-Y. Chen, S. M. Siniscalchi, X. Ma, and C.-H. Lee,
|
706 |
+
“Decentralizing feature extraction with quantum convolutional neural network for automatic
|
707 |
+
19
|
708 |
+
|
709 |
+
speech recognition,” in ICASSP 2021-2021 IEEE International Conference on Acoustics,
|
710 |
+
Speech and Signal Processing (ICASSP), pp. 6523–6527, IEEE, 2021.
|
711 |
+
[40] C.-H. H. Yang, J. Qi, S. Y.-C. Chen, Y. Tsao, and P.-Y. Chen, “When bert meets quan-
|
712 |
+
tum temporal convolution learning for text classification in heterogeneous computing,” in
|
713 |
+
ICASSP 2022-2022 IEEE International Conference on Acoustics, Speech and Signal Process-
|
714 |
+
ing (ICASSP), pp. 8602–8606, IEEE, 2022.
|
715 |
+
[41] R. Di Sipio, J.-H. Huang, S. Y.-C. Chen, S. Mangini, and M. Worring, “The dawn of quan-
|
716 |
+
tum natural language processing,” in ICASSP 2022-2022 IEEE International Conference on
|
717 |
+
Acoustics, Speech and Signal Processing (ICASSP), pp. 8612–8616, IEEE, 2022.
|
718 |
+
[42] S. Y.-C. Chen, S. Yoo, and Y.-L. L. Fang, “Quantum long short-term memory,” in
|
719 |
+
ICASSP 2022-2022 IEEE International Conference on Acoustics, Speech and Signal Process-
|
720 |
+
ing (ICASSP), pp. 8622–8626, IEEE, 2022.
|
721 |
+
[43] S. Y.-C. Chen, D. Fry, A. Deshmukh, V. Rastunkov, and C. Stefanski, “Reservoir computing
|
722 |
+
via quantum recurrent neural networks,” arXiv preprint arXiv:2211.02612, 2022.
|
723 |
+
[44] S. Y.-C. Chen, T.-C. Wei, C. Zhang, H. Yu, and S. Yoo, “Quantum convolutional neural
|
724 |
+
networks for high energy physics data analysis,” Physical Review Research, vol. 4, no. 1,
|
725 |
+
p. 013231, 2022.
|
726 |
+
[45] G. Brockman, V. Cheung, L. Pettersson, J. Schneider, J. Schulman, J. Tang, and W. Zaremba,
|
727 |
+
“Openai gym,” arXiv preprint arXiv:1606.01540, 2016.
|
728 |
+
[46] M. Chevalier-Boisvert, L. Willems, and S. Pal, “Minimalistic gridworld environment for openai
|
729 |
+
gym.” https://github.com/maximecb/gym-minigrid, 2018.
|
730 |
+
[47] V. Bergholm, J. Izaac, M. Schuld, C. Gogolin, C. Blank, K. McKiernan, and N. Killoran, “Pen-
|
731 |
+
nylane: Automatic differentiation of hybrid quantum-classical computations,” arXiv preprint
|
732 |
+
arXiv:1811.04968, 2018.
|
733 |
+
20
|
734 |
+
|
B9E4T4oBgHgl3EQfeA2w/content/tmp_files/load_file.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
C9E0T4oBgHgl3EQfQQB9/content/2301.02190v1.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:74997de1f465b85232df4d694855acbb614c063b0502ed876800c2fb5b34f7a3
|
3 |
+
size 298396
|
C9E0T4oBgHgl3EQfQQB9/vector_store/index.faiss
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:798afb9aa34324f9b3af7a1ae2cec1f093919ffd7dd2918ccf7741d6f5d65900
|
3 |
+
size 4194349
|
C9E0T4oBgHgl3EQfQQB9/vector_store/index.pkl
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:9312ec1be0fe835b1953be2fcdfaf304a25a9515a605f15c16f5e278d5e319dd
|
3 |
+
size 158384
|
C9E1T4oBgHgl3EQf-AYx/content/tmp_files/2301.03562v1.pdf.txt
ADDED
@@ -0,0 +1,898 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
arXiv:2301.03562v1 [math.FA] 9 Jan 2023
|
2 |
+
(Non-)amenability of B(E) and Banach space geometry
|
3 |
+
Matthew Daws and Matthias Neufang
|
4 |
+
Abstract
|
5 |
+
Let E be a Banach space, and B(E) the algebra of all bounded linear operators on E. The question
|
6 |
+
of amenability of B(E) goes back to Johnson’s seminal memoir [39] from 1972. We present the first
|
7 |
+
general criteria applying to very wide classes of Banach spaces, given in terms of the Banach space
|
8 |
+
geometry of E, which imply that B(E) is non-amenable. We cover all spaces for which this is known so
|
9 |
+
far (with the exception of one particular example), with much shorter proofs, such as ℓp for p ∈ [1, ∞]
|
10 |
+
and c0, but also many new spaces: the numerous classes of spaces covered range from all Lp-spaces
|
11 |
+
for p ∈ (1, ∞) to Lorentz sequence spaces and reflexive Orlicz sequence spaces, to the Schatten classes
|
12 |
+
Sp for p ∈ [1, ∞], and to the James space J, the Schlumprecht space S, and the Tsirelson space T ,
|
13 |
+
among others. Our approach also highlights the geometric difference to the only space for which B(E)
|
14 |
+
is known to be amenable, the Argyros–Haydon space, which solved the famous scalar-plus-compact
|
15 |
+
problem.
|
16 |
+
1
|
17 |
+
Introduction
|
18 |
+
Amenability of Banach algebras is a central notion in functional analysis; cf., e.g., [56, 59]. We mention
|
19 |
+
Johnson’s fundamental result [39] that a locally compact group G is amenable if and only if its group
|
20 |
+
algebra L1(G) is amenable. Amenability is also a key concept in operator algebra theory. We note the
|
21 |
+
deep classical result, due to Connes [21], Bunce–Paschke [14] and Haagerup [38], that for C∗-algebras,
|
22 |
+
amenability is equivalent to nuclearity (the forward implication is due to Connes and Bunce–Paschke).
|
23 |
+
Together with work of Wassermann [66], it follows that the algebra B(H) of all bounded linear operators
|
24 |
+
on a Hilbert space H is non-amenable. However, it was a long-standing open problem whether this holds
|
25 |
+
for B(ℓp) for all p ∈ [1, ∞]. Indeed, Johnson already asked in 1972 in [39], where he introduced the very
|
26 |
+
notion of amenability, whether B(E) is ever amenable for an infinite-dimensional Banach space E. Since
|
27 |
+
then, determining if B(E) is amenable or not for a given infinite-dimensional Banach space E, has proven
|
28 |
+
a very difficult open problem; cf. the survey article [58].
|
29 |
+
Let us briefly recall the history of this problem. For many years, ℓ2 remained the only space for
|
30 |
+
which the problem was solved. Then Read showed in [54] that B(ℓ1) is non-amenable. His proof was
|
31 |
+
simplified by Pisier in [51], using expanders, and further simplified by Ozawa in [47], where also a proof
|
32 |
+
of non-amenability of B(ℓ2) is given avoiding the use of the above results of Connes, Bunce–Paschke and
|
33 |
+
Wassermann. Moreover, it is shown by Ozawa in [47] that B(ℓ∞) and (implicitly) B(c0) are not amenable.
|
34 |
+
However, the case of B(ℓp) for p ∈ (1, ∞)\{2} remained open, as noted by Ozawa in [47], by Pisier in [51],
|
35 |
+
and by Read in [54]. In [57], Runde finally established the celebrated result that B(ℓp) is not amenable
|
36 |
+
for any p ∈ (1, ∞), through a technically involved proof, building in particular on his earlier work with
|
37 |
+
Daws ([26], [27]) and on Ozawa’s work. More generally, it is shown in [57] that B(ℓp(E)) is non-amenable
|
38 |
+
for all Lp-spaces E, where p ∈ (1, ∞). Moreover, Choi shows in [19] that B(L1[0, 1]) is non-amenable;
|
39 |
+
this is also proven by Aldabbas in [2]. Further, Choi gives a criterion, applying to E = T (ℓ2), the trace
|
40 |
+
class operators on ℓ2, showing that B(E) is not amenable; see Remark 4.19 below. However, as noted by
|
41 |
+
Dales (cf. [57, Corollary 2.5]), the Argyros–Haydon space, which solved the famous scalar-plus-compact
|
42 |
+
problem, provides an example of an infinite-dimensional space E such that B(E) is amenable. Note that
|
43 |
+
this space is a hereditarily indecomposable L∞-space.
|
44 |
+
1
|
45 |
+
|
46 |
+
In this paper, we develop entirely different methods from the ones used so far and establish, employing
|
47 |
+
our new techniques, the first general principles which encode non-amenability of B(E), for very wide classes
|
48 |
+
of spaces E, in terms of the Banach space geometry of E. For instance, we show that if E is reflexive
|
49 |
+
with the approximation property and isomorphic to its square, then B(E) is non-amenable. We also show
|
50 |
+
that if E is infinite-dimensional and reflexive with a subsymmetric basis, then B(E) is non-amenable.
|
51 |
+
Our results cover all spaces known so far (with the exception of one particular example, cf. Remark 4.19
|
52 |
+
below), with much shorter proofs, and many new (classes of) spaces. The following is a list of spaces E
|
53 |
+
– obviously always assumed infinite-dimensional – for which we show that B(E) is non-amenable, as a
|
54 |
+
result of our general approach (we write “∼=” to denote a Banach space isomorphism):
|
55 |
+
1. all Lp(Ω, B, µ)-spaces and, more generally, all Lp spaces for p ∈ (1, ∞) – this generalises the main
|
56 |
+
result of [57];
|
57 |
+
2. the Lorentz sequence spaces d(w, p), the Garling sequence spaces g(w, p), and the Baernstein spaces
|
58 |
+
Bp, for all p ∈ (1, ∞);
|
59 |
+
3. all reflexive Orlicz sequence spaces whose Orlicz function satisfies the ∆2 condition at 0;
|
60 |
+
4. all separable reflexive rearrangement invariant (r.i.) function spaces;
|
61 |
+
5. the Schatten classes Sp for all p ∈ [1, ∞];
|
62 |
+
6. the non-commutative Lp-spaces Lp(M) for all p ∈ [2, ∞), whenever M is an infinite-dimensional
|
63 |
+
von Neumann algebra such that Lp(M) has the approximation property;
|
64 |
+
7. c0, ℓ1, ℓ∞;
|
65 |
+
8. the non-commutative counterparts of the above, i.e., the spaces K(H), T (H) and B(H) of compact,
|
66 |
+
trace class and all bounded linear operators on a separable Hilbert space H, and, more generally,
|
67 |
+
K(ℓp), N(ℓp) and B(ℓp) for all p ∈ (1, ∞);
|
68 |
+
9. C(K) for any infinite compact metric space K (that is, all separable C(K) spaces), and all separable
|
69 |
+
L1(Ω, B, µ)-spaces (note that L∞[0, 1] ∼= ℓ∞, so this space is covered as well);
|
70 |
+
10. the Hardy spaces Hp for all p ∈ [1, ∞) (note that Hp ∼= Lp[0, 1] for p ∈ (1, ∞));
|
71 |
+
11. the vector-valued spaces Lp(µ, X) for all p ∈ (1, ∞), for σ-finite µ with Lp(µ) infinite-dimensional,
|
72 |
+
whenever X∗ has the bounded approximation property and the Radon-Nikodym Property (for ex-
|
73 |
+
ample, X is reflexive with the approximation property);
|
74 |
+
12. the vector-valued spaces C(K, X) for any infinite compact metric space K, whenever X∗ has the
|
75 |
+
bounded approximation property and the Radon-Nikodym Property;
|
76 |
+
13. particular spaces such as the James space J, the Schlumprecht space S, and the Tsirelson space T.
|
77 |
+
The paper is organized as follows. In Section 2, we first establish a result on a new hereditary property
|
78 |
+
of amenability which generalises a well-known theorem of Gourdeau and Ghahramani–Loy–Willis. From
|
79 |
+
this we shall derive, in Section 3, the general criteria for non-amenability of B(E) in the case of reflexive
|
80 |
+
spaces E. We treat the non-reflexive situation in Section 4. In the last Section, we present an alternative,
|
81 |
+
short proof of the non-amenability of B(ℓp) for all p ∈ (1, ∞] which uses operator algebra techniques
|
82 |
+
and harmonic analysis, instead of Banach space geometry. We also present an “elementary” proof of the
|
83 |
+
non-amenability of B(ℓ2), which has long been sought after: it is even shorter and of course avoids the
|
84 |
+
use of nuclearity for C∗-algebras.
|
85 |
+
2
|
86 |
+
|
87 |
+
2
|
88 |
+
A new hereditary property of amenability
|
89 |
+
The central idea of this paper is the following.
|
90 |
+
For a Banach space E, write A(E) for the space of
|
91 |
+
approximable operators, the norm closure of the finite-rank operators in B(E).
|
92 |
+
Write K(E) for the
|
93 |
+
compact operators on E. Often A(E) = K(E); this is true when E has the approximation property
|
94 |
+
(AP), [60, Chapter 4]. When E is reflexive with the AP, we can identify the bidual K(E)∗∗ with B(E),
|
95 |
+
where K(E)∗∗ is given the (first) Arens product.
|
96 |
+
Indeed, K(E) is Arens regular, and so both Arens
|
97 |
+
products agree. This result goes back to [48, Theorem 2], see also [24, Section 6], and in more generality,
|
98 |
+
[25]. Consequently, to study B(E), one might study the bidual of A = K(E). A well-known result in
|
99 |
+
this direction if that when A∗∗ is amenable, also A is amenable, a result shown by Gourdeau ([34], [35,
|
100 |
+
Theorem 2.3]) and, independently, Ghahramani–Loy–Willis [33, Theorem 1.8]. This result is not directly
|
101 |
+
useful to us, as K(E) is often amenable (cf. [11, 36]). We will thus substantially generalise this result
|
102 |
+
below, and this generalisation will be central to our new approach.
|
103 |
+
With this motivation outlined, we start with some generality, and consider a Banach algebra A and
|
104 |
+
its bidual A∗∗ equipped with the first Arens product. Let us recall the Arens products. We turn A∗, A∗∗
|
105 |
+
into A-bimodules in the usual way. We then define bilinear maps A∗∗ × A∗ → A∗, A∗ × A∗∗ → A∗ by
|
106 |
+
⟨F · µ, a⟩ = ⟨F, µ · a⟩,
|
107 |
+
⟨µ · F, a⟩ = ⟨F, a · µ⟩
|
108 |
+
(a ∈ A, µ ∈ A∗, F ∈ A∗∗).
|
109 |
+
We then define bilinear maps ✷, ✸ : A∗∗ × A∗∗ → A∗∗ by
|
110 |
+
⟨F✷G, µ⟩ = ⟨F, G · µ⟩,
|
111 |
+
⟨F✸G, µ⟩ = ⟨G, µ · F⟩
|
112 |
+
(F, G ∈ A∗∗, µ ∈ A∗).
|
113 |
+
Direct calculations show that these are Banach algebra products, the first and second Arens products,
|
114 |
+
respectively. The canonical map κA : A → A∗∗ is a homomorphism, and κA(a)✷F = a·F, F✷κA(a) = F·a,
|
115 |
+
and similarly for ✸. Henceforth, we always equip A∗∗ with ✷ unless otherwise stated.
|
116 |
+
Our first step, following [33], is to link A∗∗ �⊗A∗∗ with (A�⊗A)∗∗, where �⊗ denotes the completed
|
117 |
+
projective Banach space tensor product. We wish to use slightly more concrete identifications than [33],
|
118 |
+
and we shall hence identify (A�⊗A)∗ with B(A, A∗), say B(A, A∗) ∋ T ↔ ϕT ∈ (A�⊗A)∗ by
|
119 |
+
⟨ϕT , a ⊗ b⟩ = ⟨T(a), b⟩
|
120 |
+
(a, b ∈ A).
|
121 |
+
(1)
|
122 |
+
Compare with [60, Section 2.2], for example. Define Ψ : A∗∗ �⊗A∗∗ → (A�⊗A)∗∗ by
|
123 |
+
⟨Ψ(F ⊗ G), ϕT ⟩ = ⟨F, T ∗(G)⟩
|
124 |
+
(F, G ∈ A∗∗).
|
125 |
+
(2)
|
126 |
+
Clearly Ψ extends by bi-linearity and continuity to a contraction. Let us just check that this agrees with
|
127 |
+
[33, Lemma 1.7], so choose bounded nets (ai), (bj) in A converging weak∗ to F, G ∈ A∗∗, respectively.
|
128 |
+
Then
|
129 |
+
⟨Ψ(F ⊗ G), ϕT ⟩ = ⟨F, T ∗(G)⟩ = lim
|
130 |
+
i ⟨T ∗(G), ai⟩ = lim
|
131 |
+
i lim
|
132 |
+
j ⟨T(ai), bj⟩ = lim
|
133 |
+
i lim
|
134 |
+
j ⟨ϕT , ai ⊗ bj⟩,
|
135 |
+
which is the same extension given by [33, Lemma 1.6] (cf. [5, §3]).
|
136 |
+
We now record some useful facts about this map.
|
137 |
+
Proposition 2.1 ([33, Lemma 1.7]). We have the following commutative diagram
|
138 |
+
A∗∗ �⊗A∗∗
|
139 |
+
Ψ
|
140 |
+
� (A�⊗A)∗∗
|
141 |
+
A�⊗A
|
142 |
+
��
|
143 |
+
κA⊗κA
|
144 |
+
�
|
145 |
+
��
|
146 |
+
κA �
|
147 |
+
⊗A
|
148 |
+
�q
|
149 |
+
q
|
150 |
+
q
|
151 |
+
q
|
152 |
+
q
|
153 |
+
q
|
154 |
+
q
|
155 |
+
q
|
156 |
+
q
|
157 |
+
q
|
158 |
+
With πA : A�⊗A → A the product map, and similarly for πA∗∗, we have that (πA)∗∗ ◦ Ψ = πA∗∗. Further-
|
159 |
+
more, Ψ is an A-bimodule map.
|
160 |
+
3
|
161 |
+
|
162 |
+
An obvious, but key, property is that A(E) is always an ideal in B(E). We abstract this idea as follows.
|
163 |
+
Firstly identify A with κA(A) ⊆ A∗∗. Suppose that B ⊆ A∗∗ is some closed subalgebra containing A as
|
164 |
+
an ideal; we write A ✂ B ⊆ A∗∗. As A is an ideal in B, naturally A is a B-bimodule, and hence also A�⊗A
|
165 |
+
is a B-bimodule. In the standard way, hence also A∗ and A∗∗, so also A∗∗ �⊗A∗∗, and (A�⊗A)∗∗, become
|
166 |
+
B-bimodules. However, as B ⊆ A∗∗, also A∗∗ and A∗ have B-actions for the restriction of the A∗∗ actions.
|
167 |
+
Lemma 2.2. The two B actions on A∗ agree, while the left action of B on A∗∗ agrees with ✸, and the
|
168 |
+
right action of B on A∗∗ agrees with ✷.
|
169 |
+
Proof. In this proof, to avoid confusion, let us write b ⊲ a and a ⊳ b for a ∈ A, b ∈ B, to denote the
|
170 |
+
B-bimodule actions arising from viewing A as an ideal in B, and similarly for the actions of B on A∗ and
|
171 |
+
A∗∗. Given b ∈ B, a ∈ A, µ ∈ A∗, we find that
|
172 |
+
⟨b ⊲ µ, a⟩ = ⟨µ, a ⊳ b⟩ = ⟨a · b, µ⟩ = ⟨b, µ · a⟩ = ⟨b · µ, a⟩,
|
173 |
+
and so b ⊲ µ = b · µ. To be precise, when we write “a · b” we are considering b ∈ A∗∗ and the natural A
|
174 |
+
action on A∗∗; similarly b · µ is the A∗∗ action on A∗ where we view B as a subalgebra of A∗∗.
|
175 |
+
Similarly
|
176 |
+
⟨µ ⊳ b, a⟩ = ⟨µ, b ⊲ a⟩ = ⟨b · a, µ⟩ = ⟨b, a · µ⟩ = ⟨µ · b, a⟩,
|
177 |
+
so that µ ⊳ b = µ · b.
|
178 |
+
Then, given b ∈ B, F ∈ A∗∗, µ ∈ A∗, we have
|
179 |
+
⟨b ⊲ F, µ⟩ = ⟨F, µ ⊳ b⟩ = ⟨F, µ · b⟩ = ⟨b✸F, µ⟩,
|
180 |
+
⟨F ⊳ b, µ⟩ = ⟨F, b ⊲ µ⟩ = ⟨F, b · µ⟩ = ⟨F✷b, µ⟩,
|
181 |
+
as claimed.
|
182 |
+
As both A∗∗ �⊗A∗∗ and (A�⊗A)∗∗ are B-bimodules, we might ask if Ψ is a B-bimodule map. Again, the
|
183 |
+
situation is slightly complicated as both Arens products arise.
|
184 |
+
Lemma 2.3. Given b ∈ B and F, G ∈ A∗∗ we have
|
185 |
+
b · Ψ(F ⊗ G) = Ψ(b✸F ⊗ G),
|
186 |
+
Ψ(F ⊗ G) · b = Ψ(F ⊗ G✷b).
|
187 |
+
Proof. Again, we identify T ∈ B(A, A∗) with ϕT ∈ (A�⊗A)∗ as in (1), and in the proof we continue to
|
188 |
+
write ⊲, ⊳ for the B-bimodule actions. For b ∈ B, a1, a2 ∈ A,
|
189 |
+
⟨b ⊲ ϕT , a1 ⊗ a2⟩ = ⟨ϕT , a1 ⊗ a2 ⊳ b⟩ = ⟨T(a1), a2 ⊳ b⟩ = ⟨b ⊲ T(a1), a2⟩,
|
190 |
+
⟨ϕT ⊳ b, a1 ⊗ a2⟩ = ⟨ϕT , b ⊲ a1 ⊗ a2⟩ = ⟨T(b ⊲ a1), a2⟩.
|
191 |
+
Set b ⊲ ϕT = ϕT1 and ϕT ⊳ b = ϕT2, so that T1(a1) = b ⊲ T(a1) and T2(a1) = T(b ⊲ a1). Then, for G ∈ A∗∗,
|
192 |
+
⟨T ∗
|
193 |
+
1 (G), a1⟩ = ⟨G, b ⊲ T(a1)⟩ = ⟨T ∗(G ⊳ b), a1⟩,
|
194 |
+
⟨T ∗
|
195 |
+
2 (G), a1⟩ = ⟨G, T(b ⊲ a1)⟩ = ⟨T ∗(G), b ⊲ a1⟩ = ⟨T ∗(G) ⊳ b, a1⟩.
|
196 |
+
Then, for F, G ∈ A∗∗, from (2), and using Lemma 2.2,
|
197 |
+
⟨b · Ψ(F ⊗ G), ϕT ⟩ = ⟨Ψ(F ⊗ G), ϕT2⟩ = ⟨F, T ∗
|
198 |
+
2 (G)⟩ = ⟨F, T ∗(G) ⊳ b⟩ = ⟨Ψ(b✸F ⊗ G), ϕT ⟩,
|
199 |
+
⟨Ψ(F ⊗ G) · b, ϕT ⟩ = ⟨Ψ(F ⊗ G), ϕT1⟩ = ⟨F, T ∗
|
200 |
+
1 (G)⟩ = ⟨F, T ∗(G ⊳ b)⟩ = ⟨Ψ(F ⊗ G✷b), ϕT ⟩,
|
201 |
+
as claimed.
|
202 |
+
4
|
203 |
+
|
204 |
+
We write Zt(A∗∗) for the (first) topological centre (denoted by Z(1)
|
205 |
+
t
|
206 |
+
(A∗∗) in [24, 25]), that is,
|
207 |
+
Zt(A∗∗) = {F ∈ A∗∗ : F✷G = F✸G (G ∈ A∗∗)}.
|
208 |
+
The following is now immediate from Lemmas 2.2 and 2.3.
|
209 |
+
Corollary 2.4. Let A ✂ B ⊆ A∗∗ and suppose that B ⊆ Zt(A∗∗). Then the B-bimodule actions on A∗∗
|
210 |
+
agree with the product ✷, and Ψ is a B-bimodule map.
|
211 |
+
We now state and prove the main result of this Section, which shows that amenability of A∗∗ (or more
|
212 |
+
generally a subalgebra) passes to B when A ✂ B. This generalises [35, Theorem 2.3] and [33, Theorem
|
213 |
+
1.8], where the statement is shown for the special case B = A and C = A∗∗.
|
214 |
+
Theorem 2.5. Let A✂B ⊆ A∗∗ and suppose that B ⊆ Zt(A∗∗). Let C ⊆ A∗∗ be a closed subalgebra which
|
215 |
+
is amenable, with B ⊆ C. Then B is amenable.
|
216 |
+
Proof. The canonical maps
|
217 |
+
A�⊗A → B�⊗B → C �⊗C → A∗∗ �⊗A∗∗
|
218 |
+
are all contractions, but the overall composition is an isometry, [60, Corollary 2.14], and so each individual
|
219 |
+
map must also be an isometry, and we identify each tensor product as a closed subspace of A∗∗ �⊗A∗∗. As
|
220 |
+
B ⊆ Zt(A∗∗), Lemma 2.2 shows that each inclusion is also a B-bimodule map.
|
221 |
+
As C is amenable, [56, Theorem 2.2.4] or [59, Theorem 2.2.5], it has a bounded approximate diagonal
|
222 |
+
(di) ⊆ C �⊗C ⊆ A∗∗ �⊗A∗∗, that is,
|
223 |
+
∥c · di − di · c∥ → 0,
|
224 |
+
∥πC(di)✷c − c∥ → 0
|
225 |
+
(c ∈ C).
|
226 |
+
(3)
|
227 |
+
For each i let ni = Ψ(di) ∈ (A�⊗A)∗∗. As B ⊆ C, (3) holds for each member of B, and so it follows from
|
228 |
+
Corollary 2.4 that for each b ∈ B,
|
229 |
+
∥b · ni − ni · b∥ = ∥Ψ(b · di) − Ψ(di · b)∥ ≤ ∥b · di − di · b∥ → 0,
|
230 |
+
(4)
|
231 |
+
∥(πA)∗∗(ni)✷b − b∥ = ∥(πA)∗∗(Ψ(di))✷b − b∥ = ∥πA∗∗(di)✷b − b∥ = ∥πC(di)✷b − b∥ → 0,
|
232 |
+
(5)
|
233 |
+
the second claim using Proposition 2.1.
|
234 |
+
The bi-adjoint of the inclusion A�⊗A → B�⊗B gives an (isometric) inclusion (A�⊗A)∗∗ → (B�⊗B)∗∗.
|
235 |
+
For each i let mi be the image of ni in (B�⊗B)∗∗, and let m ∈ (B�⊗B)∗∗ be a weak∗-cluster point of the
|
236 |
+
bounded net (mi). As the B-bimodule actions on (B�⊗B)∗∗ are weak∗-continuous, it follows from (4) that
|
237 |
+
b · m = m · b for each b ∈ B. As A is a subalgebra of B, it follows that (πB)∗∗(mi) = (πA)∗∗(ni) for each
|
238 |
+
i, and so (5) shows that (πB)∗∗(m)✷b = b for each b ∈ B. That is, m is a virtual diagonal for B, showing
|
239 |
+
that B is amenable, [56, Theorem 2.2.4] or [59, Theorem 2.2.5].
|
240 |
+
We immediately obtain the following
|
241 |
+
Corollary 2.6. Let A ✂ B ⊆ A∗∗ and suppose that A is Arens regular. If A∗∗ is amenable, then so is B.
|
242 |
+
3
|
243 |
+
The general criteria in the reflexive case, and applications
|
244 |
+
In this Section, we apply Theorem 2.5 in the classical situation when E is reflexive with the AP. As
|
245 |
+
explained above, it follows that if we set A = A(E) then A = K(E) and A∗∗ is isomorphic to B(E). As
|
246 |
+
A is Arens regular in this case, the condition on Zt(A∗∗) is vacuous; see Corollary 2.6. Our aim is to use
|
247 |
+
contradiction to show that B(E) cannot be amenable, by applying Corollary 2.6 to a suitable algebra B
|
248 |
+
which is “obviously” not amenable. Our technique for finding such B is the following idea which, combined
|
249 |
+
with Theorem 2.5 or Corollary 2.6, is key to our simplified approach.
|
250 |
+
5
|
251 |
+
|
252 |
+
Proposition 3.1. Let E be a Banach space, and suppose there exists T ∈ B(E) which is not compact,
|
253 |
+
but with T 2 ∈ K(E). Let B be the Banach algebra generated by K(E) and T. Then B is the linear span
|
254 |
+
of K(E) and T, and B is not amenable.
|
255 |
+
Proof. As T 2 ∈ K(E) it is easy to see that B is the linear span of K(E) and T. Consider the quotient
|
256 |
+
algebra C = B/K(E), and let x be the image of T in this quotient. As T is non-compact, x ̸= 0, but x2 = 0
|
257 |
+
as T 2 is compact. Thus C is the one-dimensional algebra spanned by x. As C is obviously not unital, it
|
258 |
+
cannot be amenable. Thus B also cannot be amenable, as amenability passes to quotient algebras.
|
259 |
+
Corollary 3.2. Let E be a reflexive Banach space with the AP such that there exists T ∈ B(E) which is
|
260 |
+
not compact, but with T 2 ∈ K(E). Then B(E) is not amenable.
|
261 |
+
Proof. This follows from Corollary 2.6 applied with A = A(E), so that A∗∗ = B(E), and with B as in
|
262 |
+
Proposition 3.1.
|
263 |
+
Theorem 3.3. Let E be a reflexive Banach space with the AP such that E ∼= E0 ⊕ E1 with E0, E1
|
264 |
+
isomorphic as Banach spaces. When E is infinite-dimensional, B(E) is not amenable.
|
265 |
+
Proof. Let T ∈ B(E) be the composition of the projection from E onto E0, the isomorphism from E0
|
266 |
+
to E1, and the inclusion E1 → E. Then T 2 = 0. As E is infinite dimensional, so are E0, E1, and hence
|
267 |
+
T is not compact. Indeed, by the Riesz Lemma, we can find a sequence of unit vectors (xn) in E0 with
|
268 |
+
∥xn − xm∥ ≥ 1/2 for n ̸= m. Treating E0 ⊆ E, we have that (T(xn)) is a bounded sequence of vectors,
|
269 |
+
with ∥T(xn) − T(xm)∥ ≥ c/2 for each n ̸= m, where c > 0 is a constant depending on the isomorphisms
|
270 |
+
E ∼= E0 ⊕ E1 and E0 ∼= E1. Thus T cannot be compact. The result then follows from Corollary 3.2.
|
271 |
+
Corollary 3.4. Let E be a reflexive Banach space with the AP. If E ∼= E ⊕E then B(E) is not amenable.
|
272 |
+
For the definition of tree translation equivalent Banach spaces used below, we refer the reader to [10,
|
273 |
+
Section 4]. This technical definition is useful to us precisely because it allows us to prove the following.
|
274 |
+
Corollary 3.5. Let E be a reflexive, tree translation equivalent Banach space. Then B(E) is not amenable.
|
275 |
+
Proof. By assumption, E has a tree translation equivalent basis, so in particular has a basis and hence
|
276 |
+
has the AP, and by [10, Theorem 4.6], satisfies E ∼= E ⊕ E. Corollary 3.4 now yields the claim.
|
277 |
+
Generalising the above idea, we obtain the following.
|
278 |
+
Theorem 3.6. Let E be a reflexive Banach space with the AP, such that there exist closed, infinite-
|
279 |
+
dimensional, isomorphic subspaces E0 and E1, and a projection P from E onto E0 with P(E1) finite-
|
280 |
+
dimensional. Then B(E) is not amenable.
|
281 |
+
Proof. Let T0 : E0 → E1 be an isomorphism, let P : E → E0 be a projection, and set T = T0P : E →
|
282 |
+
E1 ⊆ E. As PT0P(x) ∈ P(E1) for any x ∈ E, and as P(E1) is finite-dimensional, PT0P is compact,
|
283 |
+
and so T 2 is compact. As T(x) = T0(x) for each x ∈ E0, and as E0 is infinite-dimensional, and T0 an
|
284 |
+
isomorphism, it follows that T is not compact. The result now follows from Corollary 3.2.
|
285 |
+
For the next result, recall the notion of a subsymmetric basis, [46, Definition 3.a.2], which is an
|
286 |
+
unconditional basis (en) such that (eni) is equivalent to (en) for all increasing sequences (ni).
|
287 |
+
Corollary 3.7. Let E be a reflexive Banach space with the AP. If E has an infinite-dimensional com-
|
288 |
+
plemented subspace with a subsymmetric basis, then B(E) is not amenable.
|
289 |
+
In particular, if E is an
|
290 |
+
infinite-dimensional reflexive Banach space with a subsymmetric basis, then B(E) is not amenable.
|
291 |
+
6
|
292 |
+
|
293 |
+
Proof. Let (ei) be the subsymmetric basis of the infinite-dimensional complemented subspace X. Put
|
294 |
+
E0 := lin{e2i | i ∈ N} and E1 := lin{e2i−1 | i ∈ N}. As (ei) is subsymmetric, by definition the map
|
295 |
+
ei �→ e2i extends linearly and continuously to an isomorphism between E and E0; similarly E and E1 are
|
296 |
+
isomorphic, whence also E0 ∼= E1. As X is complemented, we have a projection P from E onto X. As (ei)
|
297 |
+
is unconditional, we have a projection Q from X onto E0. Obviously, QP(E) = E0 and QP(E1) = {0}.
|
298 |
+
By Theorem 3.6, we obtain that B(E) is non-amenable.
|
299 |
+
We now apply the above results to various classes of Banach spaces. We start with Lp-spaces; for
|
300 |
+
details on this very important class of spaces, we refer the reader to [3, Section 5] or [44, 45]. We use [28,
|
301 |
+
Section 23] below, which takes a different definition, but [28, Section 23.3] shows that the latter covers
|
302 |
+
the Lp-spaces.
|
303 |
+
Corollary 3.8. Let E be any infinite-dimensional Lp-space, where p ∈ (1, ∞); for instance, E is any
|
304 |
+
infinite-dimensional Lp(Ω, B, µ) space. Then B(E) is not amenable.
|
305 |
+
Proof. Let E be an Lp-space, for p ∈ (1, ∞). By [44, Theorem 7.1], E is isomorphic to a complemented
|
306 |
+
subspace of an Lp space, so certainly reflexive. Further, by [28, Section 21.6, Corollary 1], taking account
|
307 |
+
of the aforementioned [28, Section 23.3], E has the bounded approximation property. Finally, by [44,
|
308 |
+
Proposition 7.3], E contains a complemented subspace isomorphic to ℓp. As ℓp has a symmetric basis,
|
309 |
+
Corollary 3.7 yields the claim.
|
310 |
+
Remark 3.9. The above corollary generalises [57, Theorem 4.4], the main result of [57], and provides
|
311 |
+
a much shorter proof. More precisely, it is shown in [57, Theorem 4.4] that B(ℓp(E)) is non-amenable
|
312 |
+
for any Lp-space E. We note that ℓp(E) is again an Lp- or an L2-space. Indeed, E is isomorphic to
|
313 |
+
a complemented subspace of some Lp-space, by [45, Corollary 1]. Hence, ℓp(E) is also isomorphic to a
|
314 |
+
complemented subspace of some Lp-space. Thus, ℓp(E) is an Lp- or an L2-space, by [45, Corollary 1].
|
315 |
+
(See also the introduction to [3, Section 5].)
|
316 |
+
The Baernstein space B2 was introduced by Baernstein in [8], and the p generalisations Bp by Seifert
|
317 |
+
in his dissertation [63]. They are now viewed as being strongly related to Tsirelson’s space, see [16].
|
318 |
+
Corollary 3.10. The Baernstein spaces Bp satisfy that B(Bp) is non-amenable for all p ∈ (1, ∞).
|
319 |
+
Proof. Each Bp is reflexive and has a basis, hence the AP, and contains a complemented subspace iso-
|
320 |
+
morphic to ℓp; cf. [16, Theorem 0.15]. As above, the claim now follows from Corollary 3.7.
|
321 |
+
We now consider the most fundamental examples of non-commutative Lp spaces, namely the Schatten
|
322 |
+
classes Sp. Recall that Sp is the collection of operators u in B(ℓ2) with Tr(|u|p) < ∞, and norm ∥u∥p =
|
323 |
+
Tr(|u|p)1/p. For p ∈ (1, ∞), Sp is reflexive (having canonically dual Sq for 1
|
324 |
+
p + 1
|
325 |
+
q = 1). Letting Pn ∈ B(ℓ2)
|
326 |
+
be the projection onto the first n coordinates, we have that PnuPn ∈ Sp for each u ∈ Sp, with ∥PnuPn∥p ≤
|
327 |
+
∥u∥p. Further, PnuPn → u is norm, hence showing that Sp has the (metric) approximation property.
|
328 |
+
Corollary 3.11. For p ∈ (1, ∞) the Schatten class Sp satisfies that B(Sp) is not amenable.
|
329 |
+
Proof. The operation of projecting an operator in B(ℓ2) onto its diagonal restricts to Sp and gives a
|
330 |
+
projection of Sp onto a subspace isomorphic to ℓp, see the discussion in [4, pages 84–85] for example. The
|
331 |
+
claim now follows from Corollary 3.7.
|
332 |
+
More generally, given a von Neumann algebra M, one can consider the non-commutative Lp-spaces
|
333 |
+
over M, denoted by Lp(M). Again, for p ∈ (1, ∞), Lp(M) is reflexive (having canonically dual Lq(M) for
|
334 |
+
1
|
335 |
+
p + 1
|
336 |
+
q = 1). To our knowledge, it is not in general known when Lp(M) has the (Banach space) AP, but
|
337 |
+
there has been some study of when Lp(M) possesses various Operator Space approximation properties,
|
338 |
+
7
|
339 |
+
|
340 |
+
all of which imply the AP; see for example [41] which shows in particular that for a discrete group Γ with
|
341 |
+
the (group) approximation property, and with M = V N(Γ) the group von Neumann algebra, Lp(M) has
|
342 |
+
the Operator Space Approximation Property, [41, Theorem 1.1].
|
343 |
+
Corollary 3.12. Let p ∈ [2, ∞), and let M be an infinite-dimensional von Neumann algebra such that
|
344 |
+
Lp(M) has the AP. Then B(Lp(M)) is not amenable.
|
345 |
+
Proof. By [53, Theorem 0.2], Lp(M) contains a complemented subspace isomorphic to ℓ2 or ℓp. Under
|
346 |
+
our hypothesis, Corollary 3.7 now applies to give the result.
|
347 |
+
In the following, we consider various classes of “classical” Banach spaces; in the statement of the result
|
348 |
+
we give references regarding the properties of the spaces needed for Corollary 3.7 to apply.
|
349 |
+
Corollary 3.13. For the following infinite-dimensional Banach spaces E we have that B(E) is non-
|
350 |
+
amenable:
|
351 |
+
(i) the Lorentz sequence spaces d(w, p) for all p ∈ (1, ∞), see [46, Section 3.a, Section 4.e];
|
352 |
+
(ii) the reflexive Orlicz sequence spaces whose Orlicz function satisfies the ∆2 condition at 0, see [46,
|
353 |
+
Section 4.a, Proposition 4.a.4], and for when such a space is reflexive, [46, Proposition 4.b.2];
|
354 |
+
(iii) the Garling sequence spaces g(w, p) for all p ∈ (1, ∞), see [1, Proposition 2.4, Theorem 3.1];
|
355 |
+
(iv) the Schlumprecht space S, [62], which is reflexive, [18, Theorem 2.1] or [6, Corollary 8.3].
|
356 |
+
Proof. Each Banach space above is infinite-dimensional and reflexive with a subsymmetric basis, which
|
357 |
+
the given references show. Corollary 3.7 hence implies the claims.
|
358 |
+
For the Tsirelson space T, we follow the modern convention and view T as the dual of the original
|
359 |
+
construction of Tsirelson, so T is as defined in [31, Section 2].
|
360 |
+
Corollary 3.14. For the following Banach spaces E we have that B(E) is non-amenable:
|
361 |
+
(i) all infinite-dimensional separable reflexive rearrangement invariant (r.i.) function spaces;
|
362 |
+
(ii) the Tsirelson space T.
|
363 |
+
Proof. Each Banach space above is infinite-dimensional, reflexive (cf. [31, Section 2] for T) and, by
|
364 |
+
[10, Examples 4.3 and 4.4], tree translation equivalent (note that the Haar system is a tree translation
|
365 |
+
equivalent basis in case (i)). Hence Corollary 3.5 yields the claims.
|
366 |
+
Remark 3.15. The isomorphism T ∼= T ⊕T, used by Corollary 3.5, also appears in [9]. There, the author
|
367 |
+
defines a generalised way of constructing “Tsirelson-like” spaces, which are denoted by S. The space T
|
368 |
+
follows as a special case, see [9, page 209]. The remarks after [9, Corollary 4.7] show that S ∼= S ⊕ T and
|
369 |
+
so in particular, T ∼= T ⊕ T.
|
370 |
+
In this direction, we should also remark that A(T) is known to be non-amenable, [11, Corollary 5.8],
|
371 |
+
and so [33, 35] shows also that B(T) cannot be amenable.
|
372 |
+
Finally, we note that the uniformly convex Banach space E (of Tsirelson type) with symmetric basis
|
373 |
+
which contains no isomorphic copy of any ℓp for p ∈ (1, ∞), constructed by Figiel–Johnson in [31, Section
|
374 |
+
4], also satisfies that B(E) is non-amenable, by Corollary 3.7.
|
375 |
+
We finish this Section by comparing these constructions with the one known example of an infinite-
|
376 |
+
dimensional space E with B(E) amenable.
|
377 |
+
8
|
378 |
+
|
379 |
+
Remark 3.16. Note that the Argyros–Haydon space X, [7], for which B(X) is amenable, [57, Corol-
|
380 |
+
lary 2.5], is a hereditarily indecomposable L∞-space. Its dual X∗ is isomorphic to ℓ1 and hence has the
|
381 |
+
AP, so X has the AP, [60, Corollary 4.7]. Yet, besides being non-reflexive, the key geometric property
|
382 |
+
of X of being hereditarily indecomposable is in stark contrast to the Banach space properties which we
|
383 |
+
employ above, all of which say that the space is “very decomposable”.
|
384 |
+
4
|
385 |
+
The case of non-reflexive Banach spaces
|
386 |
+
In this Section, we treat the case when E is not reflexive. Then A(E) is not Arens regular, and so we
|
387 |
+
need to consider the (first) topological centre when applying Theorem 2.5.
|
388 |
+
We follow [25], which is a dense article, so we recall some of the definitions. Given a Banach space E
|
389 |
+
we write N(E) for the nuclear operators on E, the image of E∗ �⊗E in B(E) equipped with the quotient
|
390 |
+
norm. Write I(E) for the integral operators; there is always a norm-decreasing inclusion N(E) ⊆ I(E).
|
391 |
+
Given x∗ ∈ E∗ and x ∈ E we write θx,x∗ for the rank-one operator y �→ ⟨x∗, y⟩x. Then A(E) is by
|
392 |
+
definition the closed linear span of such operators in B(E). Trace duality gives a natural pairing between
|
393 |
+
A(E) and I(E∗) which extends the pairing
|
394 |
+
⟨J, θx,x∗⟩ = Tr(Jθ∗
|
395 |
+
x,x∗) = ⟨J(x∗), x⟩
|
396 |
+
(J ∈ I(E∗), θx,x∗ ∈ A(E)).
|
397 |
+
With respect to this pairing, we have that A(E)∗ = I(E∗).
|
398 |
+
For T ∈ B(E∗∗) define
|
399 |
+
η(T) = κ∗
|
400 |
+
E ◦ T ∗ ◦ κE∗ ∈ B(E∗),
|
401 |
+
and let Q(T) = η(T)∗. Direct calculation shows that η(T ∗) = T for T ∈ B(E∗), as κ∗
|
402 |
+
ET ∗∗κE∗ = κ∗
|
403 |
+
EκE∗T =
|
404 |
+
T. Similarly, given S ∈ B(E∗∗) we see that η(T ∗S) = κ∗
|
405 |
+
ES∗T ∗∗κE∗ = η(S)T and so Q(T ∗S) = T ∗Q(S).
|
406 |
+
Define a bilinear map ⋆ on B(E∗∗) by T ⋆ S = Q(T) ◦ S. Then ⋆ is a Banach algebra product, see [25,
|
407 |
+
Proposition 2.5].
|
408 |
+
We write W(E) for the ideal of weakly compact operators in B(E).
|
409 |
+
Proposition 4.1. Let E be a Banach space. Suppose that A(E) admits a bounded approximate identity
|
410 |
+
(eα). This holds if and only if E∗ has the bounded approximation property (BAP). Let Φ0 ∈ A(E)∗∗ be a
|
411 |
+
weak∗-cluster point of the net (eα). There are bounded maps ψ1, ψ2 : B(E∗∗) → A(E)∗∗ = I(E∗)∗ given
|
412 |
+
by
|
413 |
+
⟨ψ1(T), J⟩ = ⟨Φ0, η(TJ∗)⟩,
|
414 |
+
⟨ψ2(T), J⟩ = ⟨Φ0, η(T)J⟩
|
415 |
+
(T ∈ B(E∗∗), J ∈ I(E∗)).
|
416 |
+
Then ψ1 is an isomorphism onto its range, and a homomorphism B(E∗∗) → (A(E)∗∗, ✷), and ψ2 is
|
417 |
+
a homomorphism (B(E∗∗), ⋆) → (A(E)∗∗, ✸).
|
418 |
+
The map ψ2, restricted to {T ∗ : T ∈ B(E∗)}, is an
|
419 |
+
isomorphism onto its range. For a ∈ A(E) we have that ψ1(a∗∗) = ψ2(a∗∗) = κA(E)(a). For T ∈ W(E)
|
420 |
+
we have that ψ1(T ∗∗) = ψ2(T ∗∗).
|
421 |
+
We have the identification
|
422 |
+
Zt(A(E)∗∗) =
|
423 |
+
�
|
424 |
+
ψ2(T ∗) : T ∈ B(E∗), TI(E∗) ⊆ N(E∗)
|
425 |
+
�
|
426 |
+
.
|
427 |
+
Proof. The equivalence of A(E) having a bai and E∗ having the BAP is shown in [37], building on the
|
428 |
+
work of many authors. [25, Theorem 5.17] shows the claims about ψ1, ψ2, while that ψ1(T ∗∗) = ψ2(T ∗∗)
|
429 |
+
for T ∈ W(E) is observed at the end of the proof of [25, Corollary 5.22]. Finally [25, Corollary 5.22]
|
430 |
+
shows the claim about Zt(A(E)∗∗), which is denoted by Z(1)
|
431 |
+
t
|
432 |
+
(A(E)∗∗) in [25].
|
433 |
+
To obtain a class of operators T ∈ B(E∗) with TI(E∗) ⊆ N(E∗), we use [25, Theorem 3.31] or [60,
|
434 |
+
Theorem 5.47], which shows that when T ∈ W(E∗), we have TI(E∗) ⊆ N(E∗).
|
435 |
+
9
|
436 |
+
|
437 |
+
Theorem 4.2. Let E be a Banach space such that E∗ has the BAP. Suppose there is S ∈ W(E) \ K(E)
|
438 |
+
with S2 ∈ K(E). Then B(E) is not amenable.
|
439 |
+
Proof. That S is weakly compact means that S∗ is weakly compact by Gantmacher’s Theorem, [22,
|
440 |
+
Theorem 5.5] for example, and so ψ2(S∗∗) is in Zt(A(E)∗∗). Further, ψ1(S∗∗) = ψ2(S∗∗).
|
441 |
+
Set A = A(E) and let C = {ψ1(T ∗∗) : T ∈ B(E)} ⊆ A∗∗, an algebra isomorphic to B(E), as
|
442 |
+
B(E) → B(E∗∗), T �→ T ∗∗ is a homomorphism. Let B0 be the algebra generated by A(E) = K(E) and S,
|
443 |
+
so as S2 ∈ K(E), B0 is the linear span of A(E) and S. Let B be the image of B0 in C. As ψ1(S∗∗) = ψ2(S∗∗)
|
444 |
+
and ψ1, ψ2 agree on A, we see that B ⊆ Zt(A∗∗).
|
445 |
+
If B(E) is amenable, so is C, so by Theorem 2.5, B is amenable, hence B0 is amenable. Thus B0/A
|
446 |
+
is amenable, which as in the proof of Proposition 3.1 leads to the required contradiction. So B(E) is not
|
447 |
+
amenable.
|
448 |
+
Corollary 4.3. Let K be an uncountable compact metric space. Then B(C(K)) is not amenable.
|
449 |
+
Proof. By Milutin’s Theorem, [55, Theorem 2.1], we have C(K) ∼= C[0, 1], so it is enough to consider
|
450 |
+
E = C[0, 1]. We apply Theorem 4.2, so we seek S ∈ W(E) \ K(E) with S2 ∈ K(E). Firstly, suppose we
|
451 |
+
can find any T ∈ W(E) \ K(E). Define linear maps
|
452 |
+
T0 : C[0, 1] → C[0, 1],
|
453 |
+
T0(f)(s) = f(2s)
|
454 |
+
(f ∈ C[0, 1], s ∈ [0, 1]),
|
455 |
+
and also T1 : C[0, 1] → C[0, 1] in the following way.
|
456 |
+
Pick a small δ > 0 and a linear bijection ϕ :
|
457 |
+
[1/2+δ, 1−δ] → [0, 1]. For f ∈ C[0, 1] define T1(f) as follows. For 1/2+δ ≤ t ≤ 1−δ let T1(f)(t) = f(ϕ(t)),
|
458 |
+
and for t < 1/2 let T1(f)(t) = 0.
|
459 |
+
Set T1(f)(1/2) = T1(f)(1) = 0, and linearly interpolate on the
|
460 |
+
intervals [1/2, 1/2 + δ] and [1 − δ, 1].
|
461 |
+
Then T0 is a metric surjection, T1 is an isometry, and hence
|
462 |
+
S = T1TT0 ∈ W(E)\K(E). As T0T1 = 0 also S2 = 0. In fact, the square of any weakly compact operator
|
463 |
+
on any C(K) is always compact by a result of Grothendieck, [55, Corollary 4.2], and so already T works
|
464 |
+
in Theorem 4.2, but we prefer to give this explicit construction.
|
465 |
+
It hence remains to find a suitable T. We use [52, Example 6] which gives an example of an absolutely
|
466 |
+
summing but non-compact map R : C[0, 1] → c0; for instance, with rn : [0, 1] → {±1} the Rademacher
|
467 |
+
functions, we may define
|
468 |
+
R(f) =
|
469 |
+
� � 1
|
470 |
+
0
|
471 |
+
rn(t)f(t) dt
|
472 |
+
�∞
|
473 |
+
n=1.
|
474 |
+
By [60, Corollary 6.20], R is weakly compact as it is absolutely summing. It remains to find an isometry
|
475 |
+
c0 → C[0, 1] which when composed with R will give us our required T. This is well-known (cf., e.g.,
|
476 |
+
[55, Lemma 2.5 (d)]) but we give a construction.
|
477 |
+
Let f1 ∈ C[0, 1] be the piece-wise linear function
|
478 |
+
with f1(0) = f1(1/2) = f1(1) = 0, f1(3/4) = 1, let f2 ∈ C[0, 1] be the piece-wise linear function with
|
479 |
+
f2(0) = f2(1/4) = f2(1/2) = f2(1) = 0, f2(3/8) = 1, and so forth. Then (fn) is a copy of the standard
|
480 |
+
unit vector basis of c0, and the map c0 → C[0, 1], (an) �→ �
|
481 |
+
n anfn is our isometry. Here the sum is to be
|
482 |
+
interpreted pointwise, but as (an) ∈ c0, it actually converges absolutely.
|
483 |
+
Corollary 4.4. B(L1[0, 1]) is not amenable.
|
484 |
+
Proof. We apply Theorem 4.2 to E = L1[0, 1]. As E∗ = L∞[0, 1] has the BAP, we need only find a
|
485 |
+
suitable S ∈ W(E). As E ∼= E ⊕ E, we can obtain S2 = 0 so long as we can find any R ∈ W(E) \ K(E).
|
486 |
+
To find such an R, we can follow [19, Example 3.4], for instance.
|
487 |
+
Corollary 4.5. Let E be a Banach space containing a complemented subspace isomorphic to ℓp for some
|
488 |
+
p ∈ (1, ∞). If E∗ has the BAP then B(E) is not amenable.
|
489 |
+
10
|
490 |
+
|
491 |
+
Proof. We can easily find R ∈ B(ℓp) with R non-compact but R2 = 0. Indeed, if (en) is the standard
|
492 |
+
unit vector basis of ℓp, define R by R(e2n) = e2n+1 and R(e2n−1) = 0 for each n ∈ N. Let P from E
|
493 |
+
onto ℓp be a projection, so as ℓp is reflexive, RP is weakly compact. As R2 = 0 also (RP)2 = 0. As P
|
494 |
+
is a projection onto ℓp and by the construction of R, we see that RP is not compact. Now Theorem 4.2
|
495 |
+
implies the result.
|
496 |
+
Remark 4.6. Note that the above yields another proof of the non-amenability of B(E) for any Lp-space
|
497 |
+
E, where p ∈ (1, ∞).
|
498 |
+
Corollary 4.7. The Hardy spaces Hp for all p ∈ [1, ∞) satisfy that B(Hp) is not amenable.
|
499 |
+
Proof. For p ∈ (1, ∞) we have Hp ∼= Lp[0, 1] by the classical result [12], so the claim follows from
|
500 |
+
Corollary 3.8. Now consider H1. By [42, Section 3], H1 contains a complemented subspace isomorphic
|
501 |
+
to ℓ2 (this is due to Paley, cf. the references in [42]). Also, by [40, Corollary 1], the dual H∗
|
502 |
+
1 ∼= BMO
|
503 |
+
has the uniform approximation property, hence the BAP. Now Corollary 4.5 entails that B(H1) is not
|
504 |
+
amenable.
|
505 |
+
Next we derive a result concerning vector-valued Lp spaces over σ-finite measure spaces. So let µ be a
|
506 |
+
σ-finite measure, E a Banach space, and consider Lp(µ, E). When E∗ has the Radon-Nikodym Property
|
507 |
+
(RNP), then Lp(µ, E)∗ = Lq(µ, E∗), where 1
|
508 |
+
p + 1
|
509 |
+
q = 1, cf. [30, Section IV, Theorem 1]. For the RNP, see,
|
510 |
+
e.g., [30, Chapter III] or [25, Definition 3.16]. All reflexive spaces, and all separable dual spaces have the
|
511 |
+
RNP. More generally, E∗ has the RNP if and only if every separable subspace of E has separable dual,
|
512 |
+
[30, Section VII.2, Corollary 8]. We note that [30] works only with finite measures, but the σ-finite case
|
513 |
+
is a routine generalisation from this.
|
514 |
+
To apply our result, we wish to know when Lq(µ, E∗) has the BAP. The following result is surely
|
515 |
+
known, but as we have not found a suitable reference, we give a proof.
|
516 |
+
Lemma 4.8. Let E have the BAP, and let p ∈ [1, ∞). Let µ be a σ-finite measure. Then Lp(µ, E) has
|
517 |
+
the BAP.
|
518 |
+
Proof. We shall use the ∆p norm from [28, Chapter 7] which is not quite a “tensor norm” on Lp(µ) ⊗ E;
|
519 |
+
in particular, it fails the usual mapping property. Nevertheless, Lp(µ) ⊗ E is dense in Lp(µ, E) for the
|
520 |
+
norm ∆p.
|
521 |
+
It is easy to see that we can witness that Lp(µ) has the metric approximation property by finite-rank,
|
522 |
+
positive operators (Ti), cf. [30, Section VIII.3, Example 11] for instance. For any positive operator T on
|
523 |
+
Lp(µ), we do have that T ⊗ idE is bounded for ∆p, with bound ∥T∥, and so extends to Lp(µ, E), see [28,
|
524 |
+
Theorem 7.3].
|
525 |
+
Any S ∈ B(E) extends to idLp(µ) ⊗ S on Lp(µ, E) with norm ∥S∥. Thus if (Sj) is a bounded net of
|
526 |
+
finite-rank operators on E witnessing that E has the BAP, then (Ti ⊗ Sj) is a bounded net of finite-rank
|
527 |
+
operators on Lp(µ, E) which tends in the point-norm topology to the identity on Lp(µ) ⊗ E, and thus by
|
528 |
+
boundedness and density, on all of Lp(µ, E). Hence Lp(µ, E) has the BAP.
|
529 |
+
Corollary 4.9. Let E be a Banach space such that E∗ has the BAP and the RNP (for example, E is
|
530 |
+
reflexive with the AP), and let p ∈ (1, ∞). Let µ be a σ-finite measure with Lp(µ) infinite-dimensional.
|
531 |
+
Then B(Lp(µ, E)) is not amenable.
|
532 |
+
Proof. The discussion above shows that under these hypotheses, Lp(µ, E) has dual Lq(µ, E∗). By Lemma
|
533 |
+
4.8, also Lq(µ, E∗) has the BAP, as E∗ does. Furthermore, Lp(µ, E) contains a complemented subspace
|
534 |
+
isomorphic to ℓp, by [17, Proposition 1.4.1]. Now Corollary 4.5 implies the result.
|
535 |
+
For the definition of the James space J, we refer the reader to [46, Example 1.d.2].
|
536 |
+
11
|
537 |
+
|
538 |
+
Corollary 4.10. The James space J satisfies that B(J) is not amenable.
|
539 |
+
Proof. By combining [15, Theorem 5] with the remark after [15, Corollary 4] and [15, Corollary 3], we
|
540 |
+
find that J admits a complemented subspace isomorphic to ℓ2. Also, as J has a shrinking basis, J∗ has
|
541 |
+
a basis by [46, Proposition 1.b.1], and so the BAP. Again, Corollary 4.5 yields the claim.
|
542 |
+
4.1
|
543 |
+
When the nuclear and integral operators on E∗ agree
|
544 |
+
If we assume that N(E∗) = I(E∗) then we can say more.
|
545 |
+
Recall the discussion of the RNP after
|
546 |
+
Corollary 4.7 above. A useful result is that when E∗ has the RNP, then N(E∗) = I(E∗) with equal
|
547 |
+
norms, [25, Theorem 3.18] and [60, Section 5.3].
|
548 |
+
We continue with the notation from Proposition 4.1.
|
549 |
+
Lemma 4.11. Let E be a Banach space such that E∗ has the BAP, and N(E∗) = I(E∗). Then ψ1(T ∗) =
|
550 |
+
ψ2(T ∗) for each T ∈ B(E∗).
|
551 |
+
Proof. Firstly, for general E, given T ∈ B(E∗) and J ∈ I(E∗), we always have
|
552 |
+
⟨ψ1(T ∗), J⟩ = ⟨Φ0, η(T ∗J∗)⟩ = ⟨Φ0, JT ⟩,
|
553 |
+
⟨ψ2(T ∗), J⟩ = ⟨Φ0, η(T ∗)J⟩ = ⟨Φ0, TJ⟩.
|
554 |
+
(6)
|
555 |
+
As in Proposition 4.1, here Φ0 is a weak∗-cluster point of a bai (eα) for A(E). Now let J ∈ N(E∗), say
|
556 |
+
J = θx∗,x∗∗. Then
|
557 |
+
⟨Φ0, JT ⟩ = ⟨Φ0, θx∗,T ∗(x∗∗)⟩ = lim
|
558 |
+
α ⟨θx∗,T ∗(x∗∗), eα⟩ = lim
|
559 |
+
α ⟨T ∗(x∗∗), e∗
|
560 |
+
α(x∗)⟩ = ⟨T ∗(x∗∗), x∗⟩,
|
561 |
+
here using that e∗
|
562 |
+
α(x∗) → x∗ for each x∗ ∈ E∗. Indeed, as θx,x∗eα = θx,e∗α(x∗) and ∥θx,x∗ − θx,x∗eα∥ → 0,
|
563 |
+
it follows that ∥x∥∥x∗ − e∗
|
564 |
+
α(x∗)∥ → 0. We similarly see that
|
565 |
+
⟨Φ0, TJ⟩ = ⟨Φ0, θT(x∗),x∗∗⟩ = lim
|
566 |
+
α ⟨θT(x∗),x∗∗, eα⟩ = lim
|
567 |
+
α ⟨x∗∗, e∗
|
568 |
+
α(T(x∗))⟩ = ⟨x∗∗, T(x∗)⟩.
|
569 |
+
It follows that ⟨Φ0, TJ⟩ = ⟨Φ0, JT⟩, and by linearity and continuity, this holds for all J ∈ N(E∗). The
|
570 |
+
result now follows from (6).
|
571 |
+
Theorem 4.12. Let E be a Banach space such that E∗ has the BAP, and N(E∗) = I(E∗). Let B be
|
572 |
+
a closed subalgebra with K(E) ✂ B ⊆ B(E). If any of B(E), B(E∗) or B(E∗∗) is amenable, then B is
|
573 |
+
amenable.
|
574 |
+
Proof. Set A = A(E), and let C = {ψ1(T ∗∗) : T ∈ B(E)} ⊆ A∗∗, an algebra isomorphic to B(E).
|
575 |
+
As I(E∗) = N(E∗), we know from Proposition 4.1 that Zt(A∗∗) = {ψ2(T ∗) : T ∈ B(E∗)}, and by
|
576 |
+
Lemma 4.11, this equals {ψ1(T ∗) : T ∈ B(E∗)}. Thus C ⊆ Zt(A∗∗), and so when B(E) is amenable, also
|
577 |
+
C is amenable, and hence Theorem 2.5 yields the result.
|
578 |
+
When B(E∗) is amenable, we instead set C = {ψ1(T ∗) : T ∈ B(E∗)} ⊆ A∗∗, an algebra anti-isomorphic
|
579 |
+
to B(E∗), so that C is amenable. Now C = Zt(A∗∗). We identify B with {ψ1(T ∗∗) : T ∈ B}, so that B ⊆ C,
|
580 |
+
and A ✂ B. Again, Theorem 2.5 yields the claim.
|
581 |
+
Finally, suppose that B(E∗∗) is amenable. As A∗ = I(E∗) = N(E∗) by hypothesis, and as E∗ has the
|
582 |
+
BAP so that N(E∗)∗ = B(E∗∗), it follows that A∗∗ = B(E∗∗) with ψ1 being an isomorphism. For this,
|
583 |
+
see [25, Section 5.2] and [24, Section 6]. Now set C = A∗∗ which is thus amenable, and again identify B
|
584 |
+
with {ψ1(T ∗∗) : T ∈ B}, so that B ⊆ Zt(A∗∗). Again Theorem 2.5 implies the result.
|
585 |
+
Corollary 4.13. Let K be an infinite countable compact metric space. Then B(C(K)) is not amenable.
|
586 |
+
12
|
587 |
+
|
588 |
+
Proof. By [55, Lemma 2.5(d)], we know that C(K) contains an isometric copy of c0. Using Sobczyk’s
|
589 |
+
theorem, see [65], as C(K) is separable, there is a projection P from C(K) onto c0. As K is countable,
|
590 |
+
we have C(K)∗ = M(K) ∼= ℓ1(K) which is a separable dual space, and hence has the RNP; also it has
|
591 |
+
the BAP. We then apply Theorem 4.12 with B = K(C(K)) ⊕ CS for a suitable operator S. Again, we use
|
592 |
+
Proposition 3.1, so we seek S non-compact with S2 compact. It is easy to find T ∈ B(c0) non-compact
|
593 |
+
with T 2 = 0, compare the proof of Corollary 4.16 below. Set S = TP, so that S is non-compact as P is
|
594 |
+
a projection onto c0, while PT = T so S2 = TPTP = T 2P = 0. Theorem 4.12 now yields that B(C(K))
|
595 |
+
is not amenable.
|
596 |
+
Corollary 4.14. Let K be an infinite compact metric space, equivalently, let K be an infinite compact
|
597 |
+
space with C(K) separable. Then B(C(K)) is not amenable.
|
598 |
+
Proof. This follows immediately from Corollaries 4.3 and 4.13.
|
599 |
+
We now consider the vector-valued spaces C(K, E) for a Banach space E. These can be realised as the
|
600 |
+
injective tensor product C(K)ˇ⊗E, see [60, Section 3.2]. The following generalises the previous corollary,
|
601 |
+
in that we can take E = C.
|
602 |
+
Corollary 4.15. Let K be an infinite compact metric space, and let E be a Banach space such that E∗
|
603 |
+
has the BAP and the RNP. Then B(C(K, E)) is not amenable.
|
604 |
+
Proof. We may identify C(K, E)∗ with the space of regular vector measures of bounded variation, defined
|
605 |
+
on the Borel subsets of K, with values in E∗, see for example [60, page 112]. As E∗ has the RNP, [60,
|
606 |
+
Corollary 5.23] shows that this space coincides with M(K)�⊗E∗, paired against C(K)ˇ⊗E = C(K, E) in
|
607 |
+
the canonical way. As both M(K) and E∗ have the BAP, the proof of Lemma 4.8 is readily adapted to
|
608 |
+
show that M(K)�⊗E∗ = C(K, E)∗ has the BAP; cf. also [29, Corollary 1.18].
|
609 |
+
As C(K, E) = C(K)ˇ⊗E, fixing x ∈ E and µ ∈ E∗ with ∥x∥ = ∥µ∥ = ⟨µ, x⟩ = 1, the maps
|
610 |
+
C(K)ˇ⊗E → C(K), f ⊗ y �→ ⟨µ, y⟩f
|
611 |
+
and
|
612 |
+
C(K) → C(K)ˇ⊗E, f �→ f ⊗ x
|
613 |
+
establish that C(K) is a complemented subspace of C(K, E). When K is uncountable, we may use the
|
614 |
+
complemented copy of C(K) together with the proof of Corollary 4.3 to show that there is T ∈ B(C(K, E))
|
615 |
+
which is weakly compact but not compact, and with T 2 compact. Thus Theorem 4.2 yields the result.
|
616 |
+
Now suppose that K is countable. As E∗ has the RNP, we know that separable subspaces of E have
|
617 |
+
separable duals. Let X ⊆ C(K, E) be separable, and let (fn) be a dense subset. Then {fn(k) : n ∈ N, k ∈
|
618 |
+
K} is a countable subset of E and so its closed linear span is a separable subspace of E, say E0. Then
|
619 |
+
X ⊆ C(K, E0), and as K is countable, it follows easily that C(K, E0) is separable. We know that E∗
|
620 |
+
0 is
|
621 |
+
separable, and so C(K, E0)∗ = ℓ1(K)�⊗E∗
|
622 |
+
0 is separable, as ℓ1(K) is separable. We have hence shown that
|
623 |
+
separable subspaces of C(K, E) have separable dual. So C(K, E)∗ has the RNP and the BAP in this case.
|
624 |
+
As in the proof of Corollary 4.13, C(K) contains a complemented copy of c0, and hence so does C(K, E).
|
625 |
+
We can now argue exactly as in the proof of Corollary 4.13 to see that B(C(K, E)) is not amenable.
|
626 |
+
Corollary 4.16. B(c0), B(ℓ1) and B(ℓ∞) are not amenable.
|
627 |
+
Proof. Set E = c0. Then E∗ = ℓ1 has the BAP, and as a separable dual space, has the RNP, so that
|
628 |
+
N(E∗) = I(E∗). We can find S ∈ B(c0) \ K(c0) with S2 = 0. Indeed, if (en) is the standard unit vector
|
629 |
+
basis of c0 then define S by S(e2n) = e2n+1 and S(e2n−1) = 0 for each n ∈ N. Choosing B = K(c0) ⊕ CS
|
630 |
+
gives a non-amenable Banach algebra by Proposition 3.1, and then Theorem 4.12 shows that B(c0), B(ℓ1)
|
631 |
+
and B(ℓ∞) are not amenable.
|
632 |
+
Corollary 4.17. Let E be an infinite-dimensional separable L1 space. Then B(E) is not amenable.
|
633 |
+
13
|
634 |
+
|
635 |
+
Proof. There is a classification of such E, [67, p. 83]: indeed, either E ∼= L1[0, 1] or E ∼= ℓ1, so the result
|
636 |
+
follows from Corollaries 4.4 and 4.16.
|
637 |
+
We now establish the non-commutative version of Corollary 4.16.
|
638 |
+
Corollary 4.18. Let H be an infinite-dimensional separable Hilbert space. Then B(K(H)), B(T (H)) and
|
639 |
+
B(B(H)) are not amenable.
|
640 |
+
Proof. Set E = K(H), so that E∗ = T (H), the trace class operators, and E∗∗ = B(H). Then E∗ has
|
641 |
+
the BAP, indeed, even a (Schauder) basis, which follows from [60, Proposition 4.25] for example. Also
|
642 |
+
T (H) is a separable dual space, and so has the RNP, hence N(E∗) = I(E∗). As in the proof of the
|
643 |
+
next corollary, we can find an operator S ∈ B(E) which is non-compact with S2 = 0, thus showing that
|
644 |
+
B = K(E) ⊕ CS is not amenable, by Proposition 3.1. Now Theorem 4.12 yields that B(K(H)), B(T (H))
|
645 |
+
and B(B(H)) are not amenable.
|
646 |
+
Remark 4.19. In [19, Section 4], Choi shows that when E is a Banach space with the BAP such that
|
647 |
+
E∗ does not have the BAP, then B(E) is not amenable. This criterion is rather restrictive; the canonical
|
648 |
+
example, thanks to Szankowski’s result [64], is E = T (H).
|
649 |
+
Choi’s argument uses again [37] which shows that, under these hypotheses, A(E) has a one-sided but
|
650 |
+
no two-sided bounded approximate identity. As A(E) is an ideal in B(E), this contradicts B(E) being
|
651 |
+
amenable, cf. [19, Lemma 2.2]. Our proof above that B(T (H)) is non-amenable avoids the use of the very
|
652 |
+
deep result of Szankowski.
|
653 |
+
There is to our knowledge one way to construct spaces which Choi’s result covers, giving non-amenability
|
654 |
+
of B(E), and where our methods do not apply. By [43, Corollary 3], see also [46, Theorem 1.e.7(b)], start-
|
655 |
+
ing with any Banach space F which fails to have the AP, one can show that there exists a Banach space
|
656 |
+
E with the BAP (indeed, a Schauder basis) such that E∗ does not have the AP.
|
657 |
+
In fact, more generally, we obtain the following.
|
658 |
+
Corollary 4.20. For all p ∈ (1, ∞) we have that B(K(ℓp)), B(N(ℓp)) and B(B(ℓp)) are not amenable.
|
659 |
+
Proof. We proceed at first with some generality. Let F be a Banach space such that F ∗∗ is separable
|
660 |
+
with the BAP. Also F ∗ is separable, and a dual space, and so has the RNP. Further, F ∗ has the BAP,
|
661 |
+
see [25, Corollary 3.22] for example, and so there are bounded nets (ti), (sj) of finite-rank operators in
|
662 |
+
B(F ∗), B(F ∗∗), respectively, converging in the point-norm topology to the identity. Set E = K(F) = A(F),
|
663 |
+
so that E∗ = I(F ∗) = N(F ∗) = F ∗ �⊗F ∗∗ by the hypotheses on F. Then (ti ⊗ sj) is a bounded net of
|
664 |
+
finite-rank operators converging in the point-norm topology to the identity on F ∗ �⊗F ∗∗, showing that E∗
|
665 |
+
has the BAP. As F ∗∗ and F ∗ are separable, also E∗ is separable. Thus we can apply Theorem 4.12 to
|
666 |
+
find that B(E), B(E∗) and B(E∗∗) are not amenable, provided a suitable B can be constructed.
|
667 |
+
Now specialise to the case F = ℓp for p ∈ (1, ∞). Let (en) be the usual unit vector basis of ℓp, and
|
668 |
+
set F0, F1 to be the closed span of (e2n), (e2n−1), respectively. For i = 0, 1 there is a natural projection
|
669 |
+
Pi : F → Fi, and an inclusion ιi : Fi → F. Further, there is an isometry j : F0 → F1. For x ∈ A(ℓp)
|
670 |
+
define S(x) = jP0xP0 ∈ A(ℓp). As P0j = 0, we see that S2(x) = jP0S(x)P0 = jP0jP0xP0 = 0 for each
|
671 |
+
x. For y ∈ A(F0) we can set x = ι0yP0 ∈ A(ℓp), and then S(x) = jP0ι0yP0 = jyP0, so in particular,
|
672 |
+
∥S(x)∥ = ∥yP0∥ = ∥y∥ = ∥x∥. This shows that S is non-compact, and so B = A(E) ⊕ CS is a suitable
|
673 |
+
non-amenable algebra.
|
674 |
+
Remark 4.21. Note that the Argyros–Haydon space X, for which B(X) is amenable, cf. Remark 3.16,
|
675 |
+
satisfies that X∗ is isomorphic to ℓ1, so X∗ has the BAP and the RNP, whence N(X∗) = I(X∗). However,
|
676 |
+
as B(X) = K(X) ⊕ CidX, there is obviously no operator S ∈ B(X) \ K(X) with S2 compact.
|
677 |
+
14
|
678 |
+
|
679 |
+
5
|
680 |
+
Alternative proofs of the non-amenability of B(ℓp) for p ∈ (1, ∞]
|
681 |
+
In this Section, we present alternative, quick proofs that B(ℓp) is non-amenable for all p ∈ (1, ∞] using
|
682 |
+
operator algebra methods and harmonic analysis, rather than Banach space geometry. We first give a
|
683 |
+
short proof of the non-amenability of B(ℓ2), avoiding the use of nuclearity for C∗-algebras (we remark
|
684 |
+
that [13] quoted below was written when there was no relationship known between amenability and
|
685 |
+
nuclearity for C∗-algebras, as noted therein). Given a discrete group G, we write C∗
|
686 |
+
r (G) for its reduced
|
687 |
+
group C∗-algebra. Recall that K(ℓ2(G)) is Arens regular being a C∗-algebra, and the Arens product on
|
688 |
+
K(ℓ2(G))∗∗ = B(ℓ2(G)) is the usual composition of operators.
|
689 |
+
Theorem 5.1. B(ℓ2) is not amenable.
|
690 |
+
Proof. Realize ℓ2 as ℓ2(G) for some countable discrete non-amenable group G, such as F2.
|
691 |
+
Suppose
|
692 |
+
that B(ℓ2(G)) is amenable. Put A := K(ℓ2(G)), and consider the C∗-subalgebra B := A ⊕ C∗
|
693 |
+
r (G) of
|
694 |
+
B(ℓ2(G)) = A∗∗ (note that K(ℓ2(G)) ∩ C∗
|
695 |
+
r (G) = {0} by [20, Proposition 3.2]). As in Section 3 we can
|
696 |
+
apply Corollary 2.6 to see that amenability of B(ℓ2(G)) passes to B, and hence to the quotient C∗
|
697 |
+
r (G).
|
698 |
+
Thus G is amenable by [13, Proposition 2] – a contradiction.
|
699 |
+
For the case of B(ℓp), p ∈ (1, ∞), we will argue similarly. We will consider the p-analogue of C∗
|
700 |
+
r (G),
|
701 |
+
i.e., the algebra PFp(G) of p-pseudofunctions on G, defined as the Banach algebra generated in B(ℓp(G))
|
702 |
+
by λp(ℓ1(G)), where λp is the representation of ℓ1(G) on ℓp(G) given by left convolution.
|
703 |
+
We are grateful to N.C. Phillips for pointing out the following
|
704 |
+
Lemma 5.2. Let G be a countable discrete group, and p ∈ (1, ∞). Then the canonical quotient map
|
705 |
+
q : B(ℓp(G)) → B(ℓp(G))/K(ℓp(G)) is isometric on PFp(G).
|
706 |
+
Proof. This is shown for p = 2 in [49, Proposition 4.5], and inspection of the proof shows that the
|
707 |
+
argument carries over, mutatis mutandis, to the case of general p.
|
708 |
+
For the following, note that given a discrete group G, K(ℓp(G)) is Arens regular by [23, Theorem
|
709 |
+
2.6.23], and the product on K(ℓp(G))∗∗ = B(ℓp(G)) is the usual composition of operators.
|
710 |
+
Theorem 5.3. B(ℓp) is not amenable for any p ∈ (1, ∞).
|
711 |
+
Proof. Let p ∈ (1, ∞). Realize ℓp as ℓp(G) for some countable discrete non-amenable group G, such as
|
712 |
+
F2. Suppose that B(ℓp(G)) is amenable. Put A := K(ℓp(G)), and consider the space B := A ⊕ PFp(G)
|
713 |
+
(note that K(ℓp(G)) ∩ PFp(G) = {0} as the proof of [20, Proposition 3.2] for p = 2 carries over to
|
714 |
+
the case of general p).
|
715 |
+
Let q : B(ℓp(G)) → B(ℓp(G))/K(ℓp(G)) be the canonical quotient map.
|
716 |
+
By
|
717 |
+
Lemma 5.2, q(PFp(G)) ⊆ B(ℓp(G))/K(ℓp(G)) is closed. Hence B = q−1(q(PFp(G))) is a closed subalgebra
|
718 |
+
of B(ℓp(G)) = A∗∗. Again, by Corollary 2.6, B is amenable. So the quotient PFp(G) is amenable, whence
|
719 |
+
G is amenable (see the proof of [32, Theorem 6.4], which uses work of Phillips [50]) – a contradiction.
|
720 |
+
We shall now give an alternative proof of the non-amenability of B(ℓ∞). To this end, let G be a
|
721 |
+
countable discrete group. We recall that K(c0(G))∗∗ = B(ℓ∞(G)), with the first Arens product being the
|
722 |
+
usual composition of operators, and Zt(K(c0(G))∗∗) = Bσ(ℓ∞(G)), where the latter denotes the maps in
|
723 |
+
B(ℓ∞(G)) which are weak∗-weak∗-continuous; see pages 59–61, in particular Example 6.2, in [24]. (This
|
724 |
+
also follows from Proposition 4.1 in this special case when E = c0(G), as then E∗ = ℓ1(G) has the RNP
|
725 |
+
and so the ideas of Section 4.1 apply.) We also recall that Φ : ℓ1(G) → B(c0(G)), where
|
726 |
+
Φ(f)(g) = f ∗ g for all f ∈ ℓ1(G), g ∈ c0(G),
|
727 |
+
is an isometric representation. We see B(c0(G)) as a subalgebra of B(ℓ∞(G)) (by taking second adjoints).
|
728 |
+
So we have B(c0(G)) ⊆ Bσ(ℓ∞(G)).
|
729 |
+
We have the following
|
730 |
+
15
|
731 |
+
|
732 |
+
Lemma 5.4. Let G be a countable discrete group. Then the canonical quotient map q : B(c0(G)) →
|
733 |
+
B(c0(G))/K(c0(G)) is isometric on Φ(ℓ1(G)).
|
734 |
+
Proof. Again, this follows, mutatis mutandis, as in the proof of [49, Proposition 4.5], replacing ℓ2(I) by
|
735 |
+
c0(I). Note that all elements of Φ(ℓ1(G)) commute with right translations in B(c0(G)).
|
736 |
+
We shall now prove
|
737 |
+
Theorem 5.5. B(ℓ∞) is not amenable.
|
738 |
+
Proof. Realize ℓ∞ as ℓ∞(G) for some countable discrete non-amenable group G, such as F2. Suppose that
|
739 |
+
B(ℓ∞(G)) is amenable. Put A := K(c0(G)), and consider the space B := A ⊕ Φ(ℓ1(G)) ⊆ B(c0(G)) ⊆
|
740 |
+
Bσ(ℓ∞(G)); note that K(c0(G))∩Φ(ℓ1(G)) = {0} follows from [61, proof of Theorem 1]. Let q : B(c0(G)) →
|
741 |
+
B(c0(G))/K(c0(G)) be the canonical quotient map. By Lemma 5.4, q(Φ(ℓ1(G))) ⊆ B(c0(G))/K(c0(G)) is
|
742 |
+
closed. Hence B = q−1(q(Φ(ℓ1(G)))) is a closed subalgebra of Bσ(ℓ∞(G)) = Zt(A∗∗). By Theorem 2.5, B
|
743 |
+
is amenable. So the quotient Φ(ℓ1(G)) is amenable. Thus, ℓ1(G) is amenable, whence G is amenable by
|
744 |
+
Johnson’s classical result, [59, Theorem 2.1.10] or [56, Theorem 2.1.8] – a contradiction.
|
745 |
+
Acknowledgements
|
746 |
+
The first named author is partially supported by EPSRC grant EP/T030992/1. For the purpose of open
|
747 |
+
access, the authors have applied a CC BY public copyright licence to any Author Accepted Manuscript
|
748 |
+
version arising. No data were created or analysed in this study. The second named author is partially
|
749 |
+
supported by NSERC; this support is gratefully acknowledged.
|
750 |
+
References
|
751 |
+
[1] F. Albiac, J.L. Ansorena and B. Wallis, Garling sequence spaces, J. Lond. Math. Soc. (2) 98 (2018),
|
752 |
+
no. 1, 204–222.
|
753 |
+
[2] E. Aldabbas, Amenability properties of certain Banach algebras of operators on Banach spaces, Ph.D.
|
754 |
+
thesis, University of Alberta, 2017.
|
755 |
+
[3] D. Alspach and E. Odell, Lp spaces, in: Handbook of the Geometry of Banach spaces, Vol. I, 123–159,
|
756 |
+
North-Holland, Amsterdam, 2001.
|
757 |
+
[4] J. Arazy and J. Lindenstrauss, Some linear topological properties of the spaces Cp of operators on
|
758 |
+
Hilbert space, Compositio Math. 30 (1975), 81–111.
|
759 |
+
[5] R. Arens, The adjoint of a bilinear operation, Proc. Amer. Math. Soc. 2 (1951), 839–848.
|
760 |
+
[6] S.A. Argyros and V. Felouzis, Interpolating hereditarily indecomposable Banach spaces, J. Amer.
|
761 |
+
Math. Soc. 13 (2000), no. 2, 243–294.
|
762 |
+
[7] S.A. Argyros and R.G. Haydon, A hereditarily indecomposable L∞-space that solves the scalar-plus-
|
763 |
+
compact problem, Acta Math. 206 (2011), no. 1, 1–54.
|
764 |
+
[8] A. Baernstein, II, On reflexivity and summability, Studia Math. 42 (1972), 91–94.
|
765 |
+
[9] S.F. Bellenot, Tsirelson superspaces and lp, J. Funct. Anal. 69 (1986), no. 2, 207–228.
|
766 |
+
[10] S.F.
|
767 |
+
Bellenot,
|
768 |
+
Tree
|
769 |
+
basis
|
770 |
+
in
|
771 |
+
Banach
|
772 |
+
spaces,
|
773 |
+
unpublished,
|
774 |
+
available
|
775 |
+
as
|
776 |
+
https://www.math.fsu.edu/~bellenot/past/tree-basis-preprint.pdf
|
777 |
+
16
|
778 |
+
|
779 |
+
[11] A. Blanco and N. Grønbæk, Amenability of algebras of approximable operators, Israel J. Math. 171
|
780 |
+
(2009), 127–156.
|
781 |
+
[12] R.P. Boas, Jr., Isomorphism between Hp and Lp, Amer. J. Math. 77 (1955), 655–656.
|
782 |
+
[13] J.W. Bunce, Finite operators and amenable C∗-algebras, Proc. Amer. Math. Soc. 56 (1976), 145–151.
|
783 |
+
[14] J.W. Bunce and W.L. Paschke, Quasi-expectations and amenable von Neumann algebras, Proc. Amer.
|
784 |
+
Math. Soc. 71 (1978), no. 2, 232–236.
|
785 |
+
[15] P.G. Casazza, B.L. Lin and R.H. Lohman, On James’ quasi-reflexive Banach space, Proc. Amer.
|
786 |
+
Math. Soc. 67 (1977), no. 2, 265–271.
|
787 |
+
[16] P.G. Casazza and T.J. Shura, Tsirelson’s space. With an appendix by J. Baker, O. Slotterbeck and
|
788 |
+
R. Aron, Lecture Notes in Mathematics, 1363, Springer-Verlag, Berlin, 1989.
|
789 |
+
[17] P. Cembranos and J. Mendoza, Banach spaces of vector-valued functions, Lecture Notes in Mathe-
|
790 |
+
matics, 1676, Springer-Verlag, Berlin, 1997.
|
791 |
+
[18] K. Cho and C. Lee, Banach-Saks property on the dual of Schlumprecht space, Kangweon–Kyungki
|
792 |
+
Math. Jour. 6 (1998) no. 2, 341–348.
|
793 |
+
[19] Y. Choi, A short proof that B(L1) is not amenable, Proc. Roy. Soc. Edinburgh Sect. A 151 (2021),
|
794 |
+
no. 6, 1758–1767.
|
795 |
+
[20] C. Chou, A.T.-M. Lau and J. Rosenblatt, Approximation of compact operators by sums of transla-
|
796 |
+
tions, Illinois J. Math. 29 (1985), no. 2, 340–350.
|
797 |
+
[21] A. Connes, On the cohomology of operator algebras, J. Funct. Anal. 28 (1978), no. 2, 248–253.
|
798 |
+
[22] J.B. Conway, A course in functional analysis, second edition, Graduate Texts in Mathematics, 96,
|
799 |
+
Springer-Verlag, New York, 1990.
|
800 |
+
[23] H.G. Dales, Banach algebras and automatic continuity, London Mathematical Society Monographs.
|
801 |
+
New Series, 24, Oxford Science Publications, The Clarendon Press, Oxford University Press, New
|
802 |
+
York, 2000.
|
803 |
+
[24] H.G. Dales and A.T.-M. Lau, The second duals of Beurling algebras, Mem. Amer. Math. Soc. 177
|
804 |
+
(2005), no. 836.
|
805 |
+
[25] M. Daws, Arens-regularity of algebras arising from tensor norms, New York J. Math. 13 (2007),
|
806 |
+
215–270.
|
807 |
+
[26] M. Daws and V. Runde, Can B(ℓp) ever be amenable?, Studia Math. 188 (2008), no. 2, 151–174.
|
808 |
+
[27] M. Daws and V. Runde, Erratum to “Can B(ℓp) ever be amenable?”, Studia Math. 195 (2009), no.
|
809 |
+
3, 297–298.
|
810 |
+
[28] A. Defant and K. Floret, Tensor norms and operator ideals, North-Holland Mathematics Studies,
|
811 |
+
176, North-Holland Publishing Co., Amsterdam, 1993.
|
812 |
+
[29] J. Diestel, J. Fourie and J. Swart, The projective tensor product. I, in: Trends in Banach spaces and
|
813 |
+
operator theory (Memphis, TN, 2001), 37–65, Contemp. Math., 321, Amer. Math. Soc., Providence,
|
814 |
+
RI, 2003.
|
815 |
+
17
|
816 |
+
|
817 |
+
[30] J. Diestel and J.J. Uhl, Jr., Vector measures. With a foreword by B. J. Pettis, Mathematical Surveys,
|
818 |
+
no. 15, American Mathematical Society, Providence, R.I., 1977.
|
819 |
+
[31] T. Figiel and W.B. Johnson, A uniformly convex Banach space which contains no lp, Compositio
|
820 |
+
Math. 29 (1974), 179–190.
|
821 |
+
[32] E. Gardella and H. Thiel, Isomorphisms of algebras of convolution operators, Ann. Sci. ´Ec. Norm.
|
822 |
+
Sup´er. (4) 55 (2022), no. 5, 1433–1471.
|
823 |
+
[33] F. Ghahramani, R.J. Loy and G.A. Willis, Amenability and weak amenability of second conjugate
|
824 |
+
Banach algebras, Proc. Amer. Math. Soc. 124 (1996), no. 5, 1489–1497.
|
825 |
+
[34] F. Gourdeau, Amenability of Banach algebras, Ph.D. thesis, University of Cambridge, 1989.
|
826 |
+
[35] F. Gourdeau, Amenability and the second dual of a Banach algebra, Studia Math. 125 (1997), no. 1,
|
827 |
+
75–81.
|
828 |
+
[36] N. Grønbæk, B.E. Johnson and G.A. Willis, Amenability of Banach algebras of compact operators,
|
829 |
+
Israel J. Math. 87 (1994), no. 1-3, 289–324.
|
830 |
+
[37] N. Grønbæk and G.A. Willis, Approximate identities in Banach algebras of compact operators, Canad.
|
831 |
+
Math. Bull. 36 (1993), no. 1, 45–53.
|
832 |
+
[38] U. Haagerup, All nuclear C∗-algebras are amenable, Invent. Math. 74 (1983), no. 2, 305–319.
|
833 |
+
[39] B.E. Johnson, Cohomology in Banach algebras, Memoirs of the American Mathematical Society, no.
|
834 |
+
127, American Mathematical Society, Providence, R.I., 1972.
|
835 |
+
[40] P.W. Jones, BMO and the Banach space approximation problem, Amer. J. Math. 107 (1985), no. 4,
|
836 |
+
853–893.
|
837 |
+
[41] M. Junge and Z.-J. Ruan, Approximation properties for noncommutative Lp-spaces associated with
|
838 |
+
discrete groups, Duke Math. J. 117 (2003), no. 2, 313–341.
|
839 |
+
[42] S. Kwapie´n and A. Pelczy´nski, Some linear topological properties of the Hardy spaces Hp, Compositio
|
840 |
+
Math. 33 (1976), no. 3, 261–288.
|
841 |
+
[43] J. Lindenstrauss, On James’s paper “Separable conjugate spaces”, Israel J. Math. 9 (1971), 279–284.
|
842 |
+
[44] J. Lindenstrauss and A. Pelczy´nski, Absolutely summing operators in Lp-spaces and their applications,
|
843 |
+
Studia Math. 29 (1968), 275–326.
|
844 |
+
[45] J. Lindenstrauss and H.P. Rosenthal, The Lp spaces, Israel J. Math. 7 (1969), 325–349.
|
845 |
+
[46] J. Lindenstrauss and L. Tzafriri, Classical Banach spaces. I, Ergebnisse der Mathematik und ihrer
|
846 |
+
Grenzgebiete, Band 92, Springer-Verlag, Berlin, 1977.
|
847 |
+
[47] N. Ozawa, A note on non-amenability of B(ℓp) for p = 1, 2, Internat. J. Math. 15 (2004), no. 6,
|
848 |
+
557–565.
|
849 |
+
[48] T.W. Palmer, The bidual of the compact operators, Trans. Amer. Math. Soc. 288 (1985), no. 2,
|
850 |
+
827–839.
|
851 |
+
[49] M. Pavone, Toeplitz operators on discrete groups, J. Operator Theory 27 (1992), no. 2, 359–384.
|
852 |
+
[50] N.C. Phillips, Multiplicative domain for Lp operator algebras, preprint (2014).
|
853 |
+
18
|
854 |
+
|
855 |
+
[51] G. Pisier, On Read’s proof that B(ℓ1) is not amenable, in: Geometric aspects of functional analysis,
|
856 |
+
269–275, Lecture Notes in Mathematics, 1850, Springer-Verlag, Berlin, 2004.
|
857 |
+
[52] D. Popa, Some examples of weakly compact, compact, absolutely summing and nuclear operators on
|
858 |
+
the space C[0, 1], Quaest. Math. 26 (2003), no. 1, 31–51.
|
859 |
+
[53] Y. Raynaud and Q. Xu, On subspaces of non-commutative Lp-spaces, J. Funct. Anal. 203 (2003),
|
860 |
+
no. 1, 149–196.
|
861 |
+
[54] C.J. Read, Relative amenability and the non-amenability of B(ℓ1), J. Aust. Math. Soc. 80 (2006), no.
|
862 |
+
3, 317–333.
|
863 |
+
[55] H.P. Rosenthal, The Banach spaces C(K), in: Handbook of the Geometry of Banach spaces, Vol. 2,
|
864 |
+
1547–1602, North-Holland, Amsterdam, 2003.
|
865 |
+
[56] V. Runde, Lectures on amenability, Lecture Notes in Mathematics, 1774, Springer-Verlag, Berlin,
|
866 |
+
2002.
|
867 |
+
[57] V. Runde, B(ℓp) is never amenable, J. Amer. Math. Soc. 23 (2010), no. 4, 1175–1185.
|
868 |
+
[58] V. Runde, (Non-)amenability of B(E), in: Banach algebras 2009, 339–351, Banach Center Publ., 91,
|
869 |
+
Polish Acad. Sci. Inst. Math., Warsaw, 2010.
|
870 |
+
[59] V. Runde, Amenable Banach algebras. A panorama, Springer Monographs in Mathematics, Springer-
|
871 |
+
Verlag, New York, 2020.
|
872 |
+
[60] R.A. Ryan, Introduction to tensor products of Banach spaces, Springer Monographs in Mathematics.
|
873 |
+
Springer-Verlag London, Ltd., London, 2002.
|
874 |
+
[61] S. Sakai, Weakly compact operators on operator algebras, Pacific J. Math. 14 (1964), 659–664.
|
875 |
+
[62] T. Schlumprecht, An arbitrarily distortable Banach space, Israel J. Math. 76 (1991), no. 1-2, 81–95.
|
876 |
+
[63] C.J. Seifert, Averaging in Banach spaces, Ph.D. thesis, Kent State University, 1977.
|
877 |
+
[64] A. Szankowski, B(H) does not have the approximation property, Acta Math. 147 (1981), no. 1-2,
|
878 |
+
89–108.
|
879 |
+
[65] W.A. Veech, Short proof of Sobczyk’s theorem, Proc. Amer. Math. Soc. 28 (1971), 627–628.
|
880 |
+
[66] S. Wassermann, On tensor products of certain group C∗-algebras, J. Funct. Anal. 23 (1976), no. 3,
|
881 |
+
239–254.
|
882 |
+
[67] P. Wojtaszczyk, Banach spaces for analysts, Cambridge Studies in Advanced Mathematics, 25, Cam-
|
883 |
+
bridge University Press, Cambridge, 1991.
|
884 |
+
19
|
885 |
+
|
886 |
+
Authors’ affiliations
|
887 |
+
Matthew Daws
|
888 |
+
Jeremiah Horrocks Institute, University of Central Lancashire, Preston, PR1 2HE, United Kingdom
|
889 |
+
Email: [email protected]; [email protected]
|
890 |
+
Matthias Neufang
|
891 |
+
School of Mathematics and Statistics, Carleton University, 1125 Colonel By Drive, Ottawa, Ontario, K1S
|
892 |
+
5B6, Canada
|
893 |
+
and
|
894 |
+
Laboratoire de Math´ematiques Paul Painlev´e (UMR CNRS 8524), Universit´e de Lille, D´epartement de
|
895 |
+
Math´ematiques, 59655 Villeneuve d’Ascq Cedex, France
|
896 |
+
Email: [email protected]; [email protected]
|
897 |
+
20
|
898 |
+
|
C9E1T4oBgHgl3EQf-AYx/content/tmp_files/load_file.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:ee4b850870067e161719635b214aca66f3ce1304efa9e01885c918434c40ffc7
|
3 |
+
size 1793078
|
D9E2T4oBgHgl3EQf9gn9/vector_store/index.faiss
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:2de8de5e707a421db1f3e8dc0372c24d81391154ec18b252a1b31ec82ebe5c25
|
3 |
+
size 29425709
|
DdE1T4oBgHgl3EQfqAWA/vector_store/index.faiss
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:2dcd85a74bd804a69eef0443e171debc5d0a63cfd7d4ad6b8af202664ab8b127
|
3 |
+
size 10158125
|
DtE2T4oBgHgl3EQfSQej/content/2301.03791v1.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:e06213dd5f24ce5e98bda1709de68944fbde72f9f06447ff8cfe9a6a3bfff667
|
3 |
+
size 1397693
|