Add files using upload-large-folder tool
Browse filesThis view is limited to 50 files because it contains too many changes.
See raw diff
- -9FJT4oBgHgl3EQfqCwO/content/2301.11602v1.pdf +3 -0
- -9FJT4oBgHgl3EQfqCwO/vector_store/index.faiss +3 -0
- -9FJT4oBgHgl3EQfqCwO/vector_store/index.pkl +3 -0
- -9FST4oBgHgl3EQfczg_/content/2301.13804v1.pdf +3 -0
- -9FST4oBgHgl3EQfczg_/vector_store/index.faiss +3 -0
- -9FST4oBgHgl3EQfczg_/vector_store/index.pkl +3 -0
- .gitattributes +101 -0
- 19A0T4oBgHgl3EQfMv_l/content/tmp_files/2301.02138v1.pdf.txt +1192 -0
- 19A0T4oBgHgl3EQfMv_l/content/tmp_files/load_file.txt +0 -0
- 1tA0T4oBgHgl3EQfMv-f/content/tmp_files/2301.02137v1.pdf.txt +2100 -0
- 1tA0T4oBgHgl3EQfMv-f/content/tmp_files/load_file.txt +0 -0
- 39E0T4oBgHgl3EQfvAGt/content/2301.02613v1.pdf +3 -0
- 39FST4oBgHgl3EQfZTjC/content/2301.13791v1.pdf +3 -0
- 39FST4oBgHgl3EQfZTjC/vector_store/index.faiss +3 -0
- 39FST4oBgHgl3EQfZTjC/vector_store/index.pkl +3 -0
- 3tFST4oBgHgl3EQfZDim/content/tmp_files/2301.13790v1.pdf.txt +0 -0
- 3tFST4oBgHgl3EQfZDim/content/tmp_files/load_file.txt +0 -0
- 49E1T4oBgHgl3EQfmQS7/vector_store/index.pkl +3 -0
- 59E3T4oBgHgl3EQfpgot/content/tmp_files/2301.04642v1.pdf.txt +855 -0
- 59E3T4oBgHgl3EQfpgot/content/tmp_files/load_file.txt +0 -0
- 5NE1T4oBgHgl3EQfBAIU/content/tmp_files/2301.02845v1.pdf.txt +1784 -0
- 5NE1T4oBgHgl3EQfBAIU/content/tmp_files/load_file.txt +0 -0
- 5dE3T4oBgHgl3EQfQgnL/content/2301.04414v1.pdf +3 -0
- 5dE3T4oBgHgl3EQfQgnL/vector_store/index.pkl +3 -0
- 5dE4T4oBgHgl3EQfbwyA/content/2301.05077v1.pdf +3 -0
- 5dE4T4oBgHgl3EQfbwyA/vector_store/index.faiss +3 -0
- 5dE4T4oBgHgl3EQfbwyA/vector_store/index.pkl +3 -0
- 5tFIT4oBgHgl3EQf8CtK/vector_store/index.faiss +3 -0
- 79E3T4oBgHgl3EQfRwk1/content/tmp_files/2301.04424v1.pdf.txt +1399 -0
- 79E3T4oBgHgl3EQfRwk1/content/tmp_files/load_file.txt +0 -0
- 7dE0T4oBgHgl3EQffQBI/content/tmp_files/2301.02401v1.pdf.txt +1848 -0
- 7dE0T4oBgHgl3EQffQBI/content/tmp_files/load_file.txt +0 -0
- 9NFQT4oBgHgl3EQf5jYf/content/2301.13435v1.pdf +3 -0
- 9NFQT4oBgHgl3EQf5jYf/vector_store/index.faiss +3 -0
- 9NFQT4oBgHgl3EQf5jYf/vector_store/index.pkl +3 -0
- 9dE4T4oBgHgl3EQf3Q3I/content/tmp_files/2301.05305v1.pdf.txt +787 -0
- 9dE4T4oBgHgl3EQf3Q3I/content/tmp_files/load_file.txt +426 -0
- AtAyT4oBgHgl3EQf3_qJ/content/2301.00779v1.pdf +3 -0
- AtAyT4oBgHgl3EQf3_qJ/vector_store/index.faiss +3 -0
- AtAyT4oBgHgl3EQf3_qJ/vector_store/index.pkl +3 -0
- CNE0T4oBgHgl3EQfgAHQ/content/2301.02413v1.pdf +3 -0
- CNE0T4oBgHgl3EQfgAHQ/vector_store/index.faiss +3 -0
- CNE0T4oBgHgl3EQfgAHQ/vector_store/index.pkl +3 -0
- CdAyT4oBgHgl3EQf4fpA/vector_store/index.faiss +3 -0
- CdAyT4oBgHgl3EQf4fpA/vector_store/index.pkl +3 -0
- D9E2T4oBgHgl3EQf9gn9/content/2301.04230v1.pdf +3 -0
- D9E2T4oBgHgl3EQf9gn9/vector_store/index.pkl +3 -0
- D9E4T4oBgHgl3EQffA2Y/content/tmp_files/2301.05104v1.pdf.txt +1218 -0
- D9E4T4oBgHgl3EQffA2Y/content/tmp_files/load_file.txt +0 -0
- DdE1T4oBgHgl3EQfqAWA/content/2301.03338v1.pdf +3 -0
-9FJT4oBgHgl3EQfqCwO/content/2301.11602v1.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:fceeb5e3cd95ce51cce63cb1d7c4b25d79508eadf159c72d2c116618a786d499
|
3 |
+
size 369741
|
-9FJT4oBgHgl3EQfqCwO/vector_store/index.faiss
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:33d3f1464199af0789bdc125b84aefba321bb7efda8a158bbd3dc3268d963d54
|
3 |
+
size 4259885
|
-9FJT4oBgHgl3EQfqCwO/vector_store/index.pkl
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:9c4adbbec95860dac0aa6cb1923da9e74ae0d9749a8e942f92b3fe153fe7cad1
|
3 |
+
size 161119
|
-9FST4oBgHgl3EQfczg_/content/2301.13804v1.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:fa7f5dbf1acd01fd75b9ae31d8be40dc6e89ba1dd6fb2713e489367980b6bc95
|
3 |
+
size 236409
|
-9FST4oBgHgl3EQfczg_/vector_store/index.faiss
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:8f284578e772fc54ea95d955c2f411ea56592984aa38e29fc30e132f3a394442
|
3 |
+
size 2752557
|
-9FST4oBgHgl3EQfczg_/vector_store/index.pkl
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:aac318c11ebf0b86fee82650b490aecc7dd50de4226bd751044ce925de39a857
|
3 |
+
size 115781
|
.gitattributes
CHANGED
@@ -1591,3 +1591,104 @@ QNFPT4oBgHgl3EQfojUh/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -tex
|
|
1591 |
btFAT4oBgHgl3EQf5R5J/content/2301.08732v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1592 |
gNFKT4oBgHgl3EQftS6b/content/2301.11886v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1593 |
WdE4T4oBgHgl3EQfNAwx/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1591 |
btFAT4oBgHgl3EQf5R5J/content/2301.08732v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1592 |
gNFKT4oBgHgl3EQftS6b/content/2301.11886v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1593 |
WdE4T4oBgHgl3EQfNAwx/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1594 |
+
StE3T4oBgHgl3EQfzQsi/content/2301.04726v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1595 |
+
NdAyT4oBgHgl3EQfs_n5/content/2301.00589v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1596 |
+
otAyT4oBgHgl3EQflvhP/content/2301.00457v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1597 |
+
kb_test/content/2301.00001v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1598 |
+
NdAyT4oBgHgl3EQfs_n5/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1599 |
+
rNE1T4oBgHgl3EQf2wV_/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1600 |
+
StE3T4oBgHgl3EQfzQsi/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1601 |
+
n9FST4oBgHgl3EQfMDgV/content/2301.13742v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1602 |
+
n9FST4oBgHgl3EQfMDgV/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1603 |
+
otAyT4oBgHgl3EQflvhP/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1604 |
+
s9E0T4oBgHgl3EQfbACf/content/2301.02343v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1605 |
+
r9E3T4oBgHgl3EQfMwkD/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1606 |
+
5tFIT4oBgHgl3EQf8CtK/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1607 |
+
kb_test/content/test.pdf filter=lfs diff=lfs merge=lfs -text
|
1608 |
+
udE2T4oBgHgl3EQfgAc5/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1609 |
+
V9E5T4oBgHgl3EQfBw5N/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1610 |
+
cNE5T4oBgHgl3EQffQ_r/content/2301.05626v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1611 |
+
V9E5T4oBgHgl3EQfBw5N/content/2301.05389v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1612 |
+
-9FJT4oBgHgl3EQfqCwO/content/2301.11602v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1613 |
+
s9E0T4oBgHgl3EQfbACf/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1614 |
+
cNE5T4oBgHgl3EQffQ_r/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1615 |
+
CNE0T4oBgHgl3EQfgAHQ/content/2301.02413v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1616 |
+
kb_test/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1617 |
+
AtAyT4oBgHgl3EQf3_qJ/content/2301.00779v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1618 |
+
kb_test/content/98e2f027-c8ee-45d3-9b9f-9bfd2d232293-01-2018-A[[:space:]]metagenomics[[:space:]]roadmap[[:space:]]to[[:space:]]the[[:space:]]uncultured[[:space:]]genome[[:space:]]diversity[[:space:]]in[[:space:]]hypersaline[[:space:]]soda[[:space:]]lake[[:space:]]sediments.pdf filter=lfs diff=lfs merge=lfs -text
|
1619 |
+
ltAyT4oBgHgl3EQfYfdr/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1620 |
+
uNE2T4oBgHgl3EQffwfX/content/2301.03931v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1621 |
+
jNE1T4oBgHgl3EQfgARW/content/2301.03224v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1622 |
+
jNE1T4oBgHgl3EQfgARW/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1623 |
+
-9FJT4oBgHgl3EQfqCwO/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1624 |
+
xdFIT4oBgHgl3EQf0CtU/content/2301.11367v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1625 |
+
HtE3T4oBgHgl3EQfuQsq/content/2301.04682v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1626 |
+
uNE2T4oBgHgl3EQffwfX/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1627 |
+
CNE0T4oBgHgl3EQfgAHQ/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1628 |
+
xdFIT4oBgHgl3EQf0CtU/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1629 |
+
39E0T4oBgHgl3EQfvAGt/content/2301.02613v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1630 |
+
htE3T4oBgHgl3EQfgQqz/content/2301.04560v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1631 |
+
HtE3T4oBgHgl3EQfuQsq/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1632 |
+
d9AyT4oBgHgl3EQfjfgx/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1633 |
+
utAyT4oBgHgl3EQf0vkn/content/2301.00722v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1634 |
+
39FST4oBgHgl3EQfZTjC/content/2301.13791v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1635 |
+
KtE1T4oBgHgl3EQfGgOV/content/2301.02915v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1636 |
+
ldAzT4oBgHgl3EQfp_0o/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1637 |
+
o9E0T4oBgHgl3EQfqgFN/content/2301.02553v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1638 |
+
qdFKT4oBgHgl3EQfHy2j/content/2301.11731v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1639 |
+
N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1640 |
+
AtAyT4oBgHgl3EQf3_qJ/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1641 |
+
udE2T4oBgHgl3EQfgAc5/content/2301.03932v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1642 |
+
ldAzT4oBgHgl3EQfp_0o/content/2301.01620v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1643 |
+
gNFKT4oBgHgl3EQftS6b/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1644 |
+
dtE3T4oBgHgl3EQfGwnT/content/2301.04318v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1645 |
+
9NFQT4oBgHgl3EQf5jYf/content/2301.13435v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1646 |
+
ntE3T4oBgHgl3EQfLAkR/content/2301.04358v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1647 |
+
ntE3T4oBgHgl3EQfLAkR/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1648 |
+
39FST4oBgHgl3EQfZTjC/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1649 |
+
WtE4T4oBgHgl3EQfNAys/content/2301.04953v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1650 |
+
N9AzT4oBgHgl3EQfWfwG/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1651 |
+
JNE0T4oBgHgl3EQfSABV/content/2301.02215v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1652 |
+
zNAzT4oBgHgl3EQfQ_ty/content/2301.01208v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1653 |
+
ntE2T4oBgHgl3EQfzgi3/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1654 |
+
-9FST4oBgHgl3EQfczg_/content/2301.13804v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1655 |
+
qtE2T4oBgHgl3EQf0whS/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1656 |
+
kNFPT4oBgHgl3EQfGTRY/content/2301.13003v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1657 |
+
zNAzT4oBgHgl3EQfQ_ty/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1658 |
+
KtE1T4oBgHgl3EQfGgOV/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1659 |
+
9NFQT4oBgHgl3EQf5jYf/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1660 |
+
odFIT4oBgHgl3EQfvCvA/content/2301.11346v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1661 |
+
5dE4T4oBgHgl3EQfbwyA/content/2301.05077v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1662 |
+
qtE2T4oBgHgl3EQf0whS/content/2301.04144v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1663 |
+
5dE4T4oBgHgl3EQfbwyA/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1664 |
+
-9FST4oBgHgl3EQfczg_/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1665 |
+
MtFAT4oBgHgl3EQfxh5M/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1666 |
+
kNFPT4oBgHgl3EQfGTRY/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1667 |
+
k9E_T4oBgHgl3EQf6BwH/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1668 |
+
Y9AzT4oBgHgl3EQfKvuz/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1669 |
+
MdFLT4oBgHgl3EQfNC8e/content/2301.12018v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1670 |
+
qtAzT4oBgHgl3EQfAvrv/content/2301.00933v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1671 |
+
WtE4T4oBgHgl3EQfNAys/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1672 |
+
t9E_T4oBgHgl3EQf9xwP/content/2301.08382v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1673 |
+
MdFLT4oBgHgl3EQfNC8e/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1674 |
+
KdAyT4oBgHgl3EQfsflO/content/2301.00577v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1675 |
+
qdFKT4oBgHgl3EQfHy2j/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1676 |
+
DdE1T4oBgHgl3EQfqAWA/content/2301.03338v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1677 |
+
JNE0T4oBgHgl3EQfSABV/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1678 |
+
qtAzT4oBgHgl3EQfAvrv/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1679 |
+
odFIT4oBgHgl3EQfvCvA/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1680 |
+
kdA0T4oBgHgl3EQfI_9R/content/2301.02083v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1681 |
+
xNE5T4oBgHgl3EQfMw6X/content/2301.05484v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1682 |
+
MtFAT4oBgHgl3EQfxh5M/content/2301.08687v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1683 |
+
T9E3T4oBgHgl3EQfEQll/content/2301.04294v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1684 |
+
ttAyT4oBgHgl3EQf0flC/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1685 |
+
T9E1T4oBgHgl3EQfIQOS/content/2301.02937v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1686 |
+
CdAyT4oBgHgl3EQf4fpA/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1687 |
+
ktFQT4oBgHgl3EQfmza3/content/2301.13367v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1688 |
+
ktFQT4oBgHgl3EQfmza3/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1689 |
+
y9AyT4oBgHgl3EQfn_hb/content/2301.00498v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1690 |
+
5dE3T4oBgHgl3EQfQgnL/content/2301.04414v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1691 |
+
kdA0T4oBgHgl3EQfI_9R/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1692 |
+
xNE5T4oBgHgl3EQfMw6X/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1693 |
+
L9FIT4oBgHgl3EQfbiuW/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1694 |
+
D9E2T4oBgHgl3EQf9gn9/content/2301.04230v1.pdf filter=lfs diff=lfs merge=lfs -text
|
19A0T4oBgHgl3EQfMv_l/content/tmp_files/2301.02138v1.pdf.txt
ADDED
@@ -0,0 +1,1192 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
arXiv:2301.02138v1 [math.CO] 5 Jan 2023
|
2 |
+
INDUCED SUBGRAPHS AND TREE DECOMPOSITIONS
|
3 |
+
VIII. EXCLUDING A FOREST IN (THETA, PRISM)-FREE GRAPHS
|
4 |
+
TARA ABRISHAMI∗†, BOGDAN ALECU∗∗¶, MARIA CHUDNOVSKY∗∐, SEPEHR HAJEBI §,
|
5 |
+
AND SOPHIE SPIRKL§∥
|
6 |
+
Abstract. Given a graph H, we prove that every (theta, prism)-free graph of sufficiently large
|
7 |
+
treewidth contains either a large clique or an induced subgraph isomorphic to H, if and only if
|
8 |
+
H is a forest.
|
9 |
+
1. Introduction
|
10 |
+
All graphs in this paper are finite and simple unless specified otherwise. Let G, H be graphs.
|
11 |
+
We say that G contains H if G has an induced subgraph isomorphic to H, and we say G is
|
12 |
+
H-free if G does not contain H. For a family H of graphs we say G is H-free if G is H-free
|
13 |
+
for every H ∈ H. A class of graphs is hereditary if it is closed under isomorphism and taking
|
14 |
+
induced subgraphs, or equivalently, if it is the class of all H-free graphs for some other family
|
15 |
+
H of graphs.
|
16 |
+
For a graph G = (V (G), E(G)), a tree decomposition (T, χ) of G consists of a tree T and a
|
17 |
+
map χ : V (T) → 2V (G) with the following properties:
|
18 |
+
(i) For every v ∈ V (G), there exists t ∈ V (T) such that v ∈ χ(t).
|
19 |
+
(ii) For every v1v2 ∈ E(G), there exists t ∈ V (T) such that v1, v2 ∈ χ(t).
|
20 |
+
(iii) For every v ∈ V (G), the subgraph of T induced by {t ∈ V (T) | v ∈ χ(t)} is connected.
|
21 |
+
For each t ∈ V (T), we refer to χ(t) as a bag of (T, χ). The width of a tree decomposition
|
22 |
+
(T, χ), denoted by width(T, χ), is maxt∈V (T) |χ(t)| − 1. The treewidth of G, denoted by tw(G),
|
23 |
+
is the minimum width of a tree decomposition of G.
|
24 |
+
Treewidth was first popularized by Robertson and Seymour in their graph minors project,
|
25 |
+
and has attracted a great deal of interest over the past three decades. Particularly, graphs of
|
26 |
+
bounded treewidth have been shown to be well-behaved from structural [19] and algorithmic [6]
|
27 |
+
viewpoints.
|
28 |
+
This motivates investigating the structure of graphs with large treewidth, and especially,
|
29 |
+
the substructures emerging in them. The canonical result in this realm is the Grid Theorem
|
30 |
+
of Robertson and Seymour [19], the following, which describes the unavoidable subgraphs of
|
31 |
+
graphs with large treewidth. For a positive integer t, the (t × t)-wall, denoted by Wt×t, is a
|
32 |
+
planar graph with maximum degree three and treewidth t (see Figure 1; a formal definition can
|
33 |
+
be found in [3]).
|
34 |
+
∗Princeton University, Princeton, NJ, USA
|
35 |
+
∗∗School of Computing, University of Leeds, Leeds, UK
|
36 |
+
§Department of Combinatorics and Optimization, University of Waterloo, Waterloo, Ontario,
|
37 |
+
Canada
|
38 |
+
† Supported by NSF-EPSRC Grant DMS-2120644.
|
39 |
+
∐ Supported by NSF-EPSRC Grant DMS-2120644 and by AFOSR grant FA9550-22-1-0083.
|
40 |
+
¶ Supported by DMS-EPSRC Grant EP/V002813/1.
|
41 |
+
∥ We acknowledge the support of the Natural Sciences and Engineering Research Council of
|
42 |
+
Canada (NSERC), [funding reference number RGPIN-2020-03912]. Cette recherche a été financée
|
43 |
+
par le Conseil de recherches en sciences naturelles et en génie du Canada (CRSNG), [numéro de
|
44 |
+
référence RGPIN-2020-03912]. This project was funded in part by the Government of Ontario.
|
45 |
+
Date: January 6, 2023.
|
46 |
+
1
|
47 |
+
|
48 |
+
2
|
49 |
+
INDUCED SUBGRAPHS AND TREE DECOMPOSITIONS VIII.
|
50 |
+
Figure 1. W5×5
|
51 |
+
Theorem 1.1 (Robertson and Seymour [19]). For every integer t ≥ 1 there exists w = w(t) ≥ 1
|
52 |
+
such that every graph of treewidth more than w contains a subdivision of Wt×t as a subgraph.
|
53 |
+
Theorem 1.1 can also be reformulated into a full characterization of unavoidable minors in
|
54 |
+
graphs of large treewidth, that every graph of sufficiently large treewidth contains any given
|
55 |
+
planar graph as a minor (and no non-planar graph has this property). In contrast, unavoidable
|
56 |
+
induced subgraphs of graphs with large treewidth are far from completely understood. There
|
57 |
+
are some natural candidates though, which we refer to as the “basic obstructions”: complete
|
58 |
+
graphs and complete bipartite graphs, subdivided walls mentioned above, and line graphs of
|
59 |
+
subdivided walls, where the line graph L(F) of a graph F is the graph with vertex set E(F),
|
60 |
+
such that two vertices of L(F) are adjacent if and only if the corresponding edges of F share an
|
61 |
+
end. Note that the complete graph Kt+1, the complete bipartite graph Kt,t, and the line graph
|
62 |
+
of every subdivision of Wt×t all have treewidth t. For a positive integer t, let us say a graph H
|
63 |
+
is a t-basic obstruction if H is one of the following graphs: Kt, Kt,t, a subdivision of Wt×t, or
|
64 |
+
the line graph of a subdivision of Wt×t. We say a graph G is t-clean if G does not contain a
|
65 |
+
t-basic obstruction.
|
66 |
+
The basic obstructions do not form a comprehensive list of induced subgraph obstructions
|
67 |
+
for bounded treewidth. Equivalently, there are t-clean graphs of arbitrarily large treewidth for
|
68 |
+
small values of t. A well-known hereditary class of graphs evidencing this fact is the class of
|
69 |
+
even-hole-free graphs, where a hole is an induced cycle on at least four vertices, the length of
|
70 |
+
a hole is its number of edges and an even hole is a hole with even length. In fact, for every
|
71 |
+
positive integer t ≥ 1, one may observe that an even-hole-free graph is t-clean if and only if it is
|
72 |
+
Kt-free. It is therefore tempting to ask whether even-hole-free graphs excluding a fixed complete
|
73 |
+
graph have bounded treewidth. Sintiari and Trotignon [20] answered this with a vehement no,
|
74 |
+
providing a construction of (even-hole, K4)-free graphs with arbitrarily large treewidth, hence
|
75 |
+
proving that there are t-clean (even-hole-free) graphs of arbitrarily large treewidth for every
|
76 |
+
fixed t ≥ 4. In addition, graphs from this construction are rather sparse, in the sense that they
|
77 |
+
exclude short holes.
|
78 |
+
Theorem 1.2 (Sintiari and Trotignon [20]). For all integers w, l ≥ 1, there exists an (even-hole,
|
79 |
+
K4)-free graph Gw,l of treewidth more than w and with no hole of length at most l.
|
80 |
+
Note that t-clean graphs for t ≤ 2 have empty vertex set or edge set. But one might still
|
81 |
+
hope for 3-clean graphs to have bounded treewidth. This is in fact supported by a result from
|
82 |
+
[7] asserting that 3-clean even-hole-free graphs have treewidth at most five. However, another
|
83 |
+
construction by Sintiari and Trotignon [20] shows that being 3-clean fails to guarantee bounded
|
84 |
+
treewidth in the more general class of theta-free graphs (see the next section for the definition of
|
85 |
+
a theta; one may check that the every t-basic obstruction for t ≥ 3 contains either a theta or a
|
86 |
+
triangle). Indeed, the treewidth of theta-free graphs remains unbounded even when forbidding
|
87 |
+
short cycles.
|
88 |
+
Theorem 1.3 (Sintiari and Trotignon [20]). For all integers w, g ≥ 1, there exists a theta-free
|
89 |
+
graph Gw,g of treewidth more than w and girth more than g.
|
90 |
+
A natural question to ask then is what further conditions must be imposed to force bounded
|
91 |
+
treewidth in even-hole-free graphs. For instance, graphs from both Theorems 1.2 and 1.3 have
|
92 |
+
|
93 |
+
INDUCED SUBGRAPHS AND TREE DECOMPOSITIONS VIII.
|
94 |
+
3
|
95 |
+
vertices of arbitrarily large degree, and so it was conjectured in [1] that (theta, triangle)-
|
96 |
+
free graphs of bounded maximum degree have bounded treewidth and even-hole-free graphs
|
97 |
+
of bounded maximum degree have bounded treewidth. These were proved in [3] and [4], respec-
|
98 |
+
tively. In the same paper [1], a stronger conjecture was made, asserting that basic obstructions
|
99 |
+
are in fact the only obstructions to bounded treewidth in graphs of bounded maximum degree.
|
100 |
+
This was later proved in [16], which closed the line of inquiry into graph classes of bounded
|
101 |
+
maximum degree.
|
102 |
+
Theorem 1.4 (Korhonen [16]). For all integers t, δ ≥ 1, there exists w = w(t, δ) such that every
|
103 |
+
t-clean graph of maximum degree at most δ has treewidth at most w.
|
104 |
+
Despite its generality, the proof of Theorem 1.4 is surprisingly short. However, the case of
|
105 |
+
proper hereditary classes containing graphs of unbounded maximum degree seems to be much
|
106 |
+
harder. For graph classes G and H, let us say H modulates G if for every positive integer t,
|
107 |
+
there exists a positive integer w(t) (depending on G and H) such that every t-clean H-free graph
|
108 |
+
in G has treewidth at most w(t). An induced-subgraph analogue to Theorem 1.1 is therefore
|
109 |
+
equivalent to a full characterization of graph classes H which modulate the class of all graphs.
|
110 |
+
This remains out of reach, but the special case where |H| = 1 turns out to be more approachable.
|
111 |
+
For a graph H and a graph class G, let us say H modulates G if {H} modulates G. Building
|
112 |
+
on a method from [17], recently we characterized all graphs H which modulate the class of all
|
113 |
+
graphs:
|
114 |
+
Theorem 1.5 (Abrishami, Alecu, Chudnovsky, Hajebi and Spirkl [2]). Let H be a graph. Then
|
115 |
+
H modulates the class of all graphs if and only if H is a subdivided star forest, that is, a forest
|
116 |
+
in which every component has at most one vertex of degree more than two.
|
117 |
+
In general, for a hereditary class G containing t-clean graphs of arbitrarily large treewidth for
|
118 |
+
small t, one may ask for a characterization of graphs H modulating G. Given Theorem 1.2, a
|
119 |
+
natural class G to consider is the class of even-hole-free graphs. Note that Theorem 1.2 shows
|
120 |
+
that a graph H modulates even-hole-free graphs only if H is a chordal graph (that is, a graph
|
121 |
+
with no hole) of clique number at most three. As far as we know, the converse may also be
|
122 |
+
true, that every chordal graph of clique number at most three modulates even-hole-free graphs.
|
123 |
+
In fact, in this paper we narrow the gap, showing that every chordal graph of clique number at
|
124 |
+
most two, that is, every forest, modulates the class of even-hole-free graphs.
|
125 |
+
Theorem 1.6. For every forest H and every integer t ≥ 1, every even-hole-free graph of suffi-
|
126 |
+
ciently large treewidth contains either H or a clique of cardinality t.
|
127 |
+
This aligns with the observation [21] that every forest is contained in some graph Gw,l from
|
128 |
+
Theorem 1.2. As mentioned above, one way to improve on Theorem 1.6 is to push H towards
|
129 |
+
being an arbitrary chordal graph of clique number three. Another way to strengthen Theorem 1.6
|
130 |
+
is to find a superclass G of even-hole-free graphs for which forests are the only graphs modulating
|
131 |
+
G. While the former remains open, we provide an appealing answer to the latter: our main result
|
132 |
+
shows that forests are exactly the graphs which modulate the class of (theta, prism)-free graphs
|
133 |
+
(see the next section for the definition of a prism; again one may check that in (theta, prism)-free
|
134 |
+
graphs, being t-clean is equivalent to being Kt-free for every positive integer t).
|
135 |
+
Theorem 1.7. Let H be a graph. Then H modulates (theta, prism)-free graphs if and only if
|
136 |
+
H is a forest. In other words, given a graph H, for every integer t ≥ 1, every (theta, prism)-free
|
137 |
+
graph of sufficiently large treewidth contains either H or a clique of cardinality t, if and only if
|
138 |
+
H is a forest.
|
139 |
+
Let C be the class of all (theta, prism)-free graphs. It is easily seen that C contains all even-
|
140 |
+
hole-free graphs, and so Theorem 1.7 implies Theorem 1.6. Note that the “only if” direction
|
141 |
+
of Theorem 1.7 follows immediately from Theorem 1.3 as prisms contain triangles. Since every
|
142 |
+
forest is an induced subgraph of a tree, in order to prove Theorem 1.7, it suffices to prove
|
143 |
+
|
144 |
+
4
|
145 |
+
INDUCED SUBGRAPHS AND TREE DECOMPOSITIONS VIII.
|
146 |
+
Theorem 1.8 below, which we do in Section 7. For a positive integer t and a tree F, we denote
|
147 |
+
by Ct the class of all graphs in C with no clique of cardinality t (that is, t-clean graph in C), and
|
148 |
+
by Ct(F) the class of all F-free graphs in Ct.
|
149 |
+
Theorem 1.8. For every tree F and every integer t ≥ 1, there exists an integer τ(F, t) ≥ 1
|
150 |
+
such that every graph in Ct(F) has treewidth at most τ(F, t).
|
151 |
+
We conclude this introduction by sketching our proofs (the terms we use here are defined in
|
152 |
+
later sections). The proof of Theorem 1.8 begins with a two-step preparation which culminates
|
153 |
+
in the proof of Theorem 6.2, a result we will also use in subsequent papers in this series. As the
|
154 |
+
first step, inspired by a result from [9], we show that for every graph G ∈ C which contains a
|
155 |
+
pyramid with certain conditions on the apex and its neighbors, G admits a construction which we
|
156 |
+
call a “(T, a)-strip-structure,” where a is the apex of the pyramid and T is an optimally chosen
|
157 |
+
tree. Roughly speaking, we show that G\{a} can be partitioned into two induced subgraphs H
|
158 |
+
and J where H is more or less similar to the line graph of the tree T and every vertex in J with a
|
159 |
+
neighbor in H attaches at a pyramid lurking in H in a restricted way; we call the latter vertices
|
160 |
+
“jewels”. The proof of this theorem occupies Sections 3 and 4. The second step is to employ the
|
161 |
+
previous result to show that if G ∈ Ct admits a (C, a)-strip-structure where C is a caterpillar,
|
162 |
+
then every vertex in G \ NG[a] can be separated from a by removing a few vertices (our proof
|
163 |
+
works more generally when C is any tree of bounded maximum degree, but the caterpillar case
|
164 |
+
suffices for our application). We prove this in Section 6. The central difficulty in the proof is to
|
165 |
+
deal with the jewels separately. This is surmounted in Section 5 where we prove several results
|
166 |
+
concerning the properties of jewels. Most notably, we show that jewels only attach at “local
|
167 |
+
areas of the line-graph-like part” of G, and that only a few jewels attach at each local area. This
|
168 |
+
concludes the preparation for proving Theorem 1.8.
|
169 |
+
Next, we embark on the proof of Theorem 1.8. We assume that G ∈ Ct has large treewidth,
|
170 |
+
which together with results from Section 2 implies that G contains two vertices x, y joined by
|
171 |
+
many pairwise internally disjoint induced paths P1, . . . , Pm. Now we analyze the structure of
|
172 |
+
the graph G[P1 ∪ · · · ∪ Pm]. It turns out that, if m is large enough, then either
|
173 |
+
• there are many paths among Pi’s whose union H admits a (C, x)-strip-structure for some
|
174 |
+
caterpillar C, or
|
175 |
+
• for some large value of d, G[P1 ∪ · · · ∪ Pm] contains a tree S isomorphic to the complete
|
176 |
+
bipartite graph K1,d, such that x is the vertex of degree d in S, and for every leaf l of S,
|
177 |
+
there are many pairwise internally disjoint induced paths between l and y, such that in
|
178 |
+
addition, paths corresponding to distinct leaves of S are also pairwise internally disjoint.
|
179 |
+
The former case implies that y can be separated from x by removing few vertices, which using
|
180 |
+
a result from Section 6, yields a contradiction with Menger’s theorem. The latter case is the first
|
181 |
+
step towards building the large tree in G as a subgraph. We now iterate the argument we just
|
182 |
+
described, applying it to each leaf l of S and y, obtaining larger and larger trees. The process is
|
183 |
+
stopped once we reach a sufficiently large tree as a subgraph of G. This, combined with the fact
|
184 |
+
that G ∈ Ct and a result of Kierstead and Penrice [15], yields the desired tree F as an induced
|
185 |
+
subgraph of G.
|
186 |
+
This paper is organized as follows. Section 2 covers preliminary definitions as well as some
|
187 |
+
results from the literature used in our proofs. Section 3 investigates the behavior of pyramids in
|
188 |
+
graphs from C. Section 4 is devoted to defining strip-structures and jewels, and showing how they
|
189 |
+
arise from pyramids in graphs in C. Section 5 takes a closer look at jewels for the strip-structures
|
190 |
+
obtained in Section 4. In Section 6 we show that admitting certain strip-structures weakens the
|
191 |
+
connectivity of most vertices to the apex. Finally, in Section 7, we prove Theorem 1.8.
|
192 |
+
2. Preliminaries and results from the literature
|
193 |
+
Let G = (V (G), E(G)) be a graph. For a set X ⊆ V (G) we denote by G[X] the subgraph of
|
194 |
+
G induced by X. For X ⊆ V (G)∪E(G), G\X denotes the subgraph of G obtained by removing
|
195 |
+
|
196 |
+
INDUCED SUBGRAPHS AND TREE DECOMPOSITIONS VIII.
|
197 |
+
5
|
198 |
+
X. Note that if X ⊆ V (G), then G \ X denotes the subgraph of G induced by V (G) \ X. In
|
199 |
+
this paper, we use induced subgraphs and their vertex sets interchangeably.
|
200 |
+
Let x ∈ G and d be a positive integer. We denote by N d
|
201 |
+
G(x) the set of all vertices in G at
|
202 |
+
distance d from some x, and by N d
|
203 |
+
G[x] the set of all vertices in G at distance at most d from x.
|
204 |
+
We write NG(x) for N 1
|
205 |
+
G(x) and NG[x] for N 1
|
206 |
+
G[x]. For an induced subgraph H of G, we define
|
207 |
+
NH(x) = NG(x) ∩ H, NH[x] = NG[x] ∩ H. Also, for X ⊆ G, we denote by NG(X) the set of all
|
208 |
+
vertices in G \ X with at least one neighbor in X, and define NG[X] = NG(X) ∪ X.
|
209 |
+
Let X, Y ⊆ G be disjoint. We say X is complete to Y if all edges with an end in X and an
|
210 |
+
end in Y are present in G, and X is anticomplete to Y if there are no edges between X and Y .
|
211 |
+
A path in G is an induced subgraph of G that is a path.
|
212 |
+
If P is a path in G, we write
|
213 |
+
P = p1- · · · -pk to mean that V (P) = {p1, . . . , pk} and pi is adjacent to pj if and only if |i−j| = 1.
|
214 |
+
We call the vertices p1 and pk the ends of P, and say that P is from p1 to pk. The interior of
|
215 |
+
P, denoted by P ∗, is the set P \ {p1, pk}. The length of a path is its number of edges (so a path
|
216 |
+
of length at most one has empty interior). Similarly, if C is a cycle, we write C = c1- · · · -ck-c1
|
217 |
+
to mean that V (C) = {c1, . . . , ck} and ci is adjacent to cj if and only if |i − j| ∈ {1, k − 1}. The
|
218 |
+
length of a cycle is its number edges (or equivalently, vertices.)
|
219 |
+
A theta is a graph Θ consisting of two non-adjacent vertices a, b, called the ends of Θ, and
|
220 |
+
three pairwise internally disjoint paths P1, P2, P3 from a to b of length at least two, called the
|
221 |
+
paths of Θ, such that P ∗
|
222 |
+
1 , P ∗
|
223 |
+
2 , P ∗
|
224 |
+
3 are pairwise anticomplete to each other. For a graph G, by a
|
225 |
+
theta in G we mean an induced subgraph of G which is a theta.
|
226 |
+
A prism is a graph Π consisting of two disjoint triangles {a1, a2, a3}, {b1, b2, b3} called the
|
227 |
+
triangles of Π, and three pairwise disjoint paths P1, P2, P3 called the paths of Π, where Pi has
|
228 |
+
ends ai, bi for each i ∈ {1, 2, 3}, and for distinct i, j ∈ {1, 2, 3}, aiaj and bibj are the only edges
|
229 |
+
between Pi and Pj. For a graph G, by a prism in G we mean an induced subgraph of G which
|
230 |
+
is a prism.
|
231 |
+
A pyramid is a graph Σ consisting of a vertex a, a triangle {b1, b2, b3} and three paths P1, P2, P3
|
232 |
+
of length at least one with Pi from a to bi for each i ∈ {1, 2, 3} and otherwise pairwise disjoint,
|
233 |
+
such that for distinct i, j ∈ {1, 2, 3}, bibj is the only edge between Pi \ {a} and Pj \ {a}, and
|
234 |
+
at most one of P1, P2, P3 has length exactly one. We say that a is the apex of the pyramid and
|
235 |
+
b1b2b3 is the base of the pyramid. The pyramid Σ is said to be long if Pi has length more than
|
236 |
+
one for every i ∈ {1, 2, 3}. For a graph G, by a pyramid in G we mean an induced subgraph of
|
237 |
+
G which is a pyramid.
|
238 |
+
Figure 2. Theta, pyramid and prism. The dotted lines represent paths of
|
239 |
+
length at least one.
|
240 |
+
Let us now mention a few results from the literature which we will use in this paper. Let
|
241 |
+
G be a graph. By a separation in G we mean a triple (L, M, R) of pairwise disjoint subsets of
|
242 |
+
vertices in G with L ∪ M ∪ R = G, such that neither L nor R is empty and L is anticomplete
|
243 |
+
to R in G. Let x, y ∈ G be distinct. We say a set M ⊆ G \ {x, y} separates x and y if there
|
244 |
+
exists a separation (L, M, R) in G with x ∈ L and y ∈ R. Also, for disjoint sets X, Y ⊆ G, we
|
245 |
+
say a set M ⊆ G \ (X ∪ Y ) separates X and Y if there exists a separation (L, M, R) in G with
|
246 |
+
X ⊆ L and Y ⊆ R. If X = {x}, we say that M separates x and Y to mean M separates X and
|
247 |
+
Y . Recall the following well-known theorem of Menger [18]:
|
248 |
+
|
249 |
+
6
|
250 |
+
INDUCED SUBGRAPHS AND TREE DECOMPOSITIONS VIII.
|
251 |
+
Theorem 2.1 (Menger [18]). Let k ≥ 1 be an integer, let G be a graph and let x, y ∈ G be
|
252 |
+
distinct and non-adjacent. Then either there exists a set M ⊆ G \ {x, y} with |M| < k such that
|
253 |
+
M separates x and y, or there are k pairwise internally disjoint paths in G from x to y.
|
254 |
+
Let k be a positive integer and let G be a graph. A strong k-block in G is a set B of at least k
|
255 |
+
vertices in G such that for every 2-subset {x, y} of B, there exists a collection P{x,y} of at least
|
256 |
+
k distinct and pairwise internally disjoint paths in G from x to y, where for every two distinct
|
257 |
+
2-subsets {x, y}, {x′, y′} ⊆ B of G, and every choice of paths P ∈ P{x,y} and P ′ ∈ P{x′,y′}, we
|
258 |
+
have P ∩ P ′ = {x, y} ∩ {x′, y′}.
|
259 |
+
For a tree T and xy ∈ E(T), we denote by Tx,y the component of T − xy containing x. Let G
|
260 |
+
be a graph and (T, χ) be a tree decomposition for G. For every S ⊆ T, let χ(S) = �
|
261 |
+
x∈S χ(x).
|
262 |
+
By an adhesion of (T, χ) we mean the set χ(x) ∩ χ(y) = χ(Tx,y) ∩ χ(Ty,x) for some xy ∈ E(T).
|
263 |
+
For every x ∈ V (T), by the torso at x, denoted by ˆχ(x), we mean the graph obtained from
|
264 |
+
the bag χ(x) by, for each y ∈ NT (x), adding an edge between every two non-adjacent vertices
|
265 |
+
u, v ∈ χ(x, y). In [2], we used Theorem 1.4 and the following result from [13]:
|
266 |
+
Theorem 2.2 (Erde and Weißauer [13], see also [14]). Let r be a positive integer, and let G
|
267 |
+
be a graph containing no subdivision of Kr as a subgraph. Then G admits a tree decomposition
|
268 |
+
(T, χ) for which the following hold.
|
269 |
+
• Every adhesion of (T, χ) has cardinality less than r2.
|
270 |
+
• For every x ∈ V (T), either ˆχ(x) has fewer than r2 vertices of degree at least 2r4, or ˆχ(x)
|
271 |
+
has no minor isomorphic to K2r2.
|
272 |
+
to prove the following.
|
273 |
+
Theorem 2.3 (Abrishami, Alecu, Chudnovsky, Hajebi and Spirkl [2]). Let k, t ≥ 1 be integers.
|
274 |
+
Then there exists an integer w = w(k, t) ≥ 1 such that every t-clean graph with no strong k-block
|
275 |
+
has treewidth at most w.
|
276 |
+
Note that for every t ≥ 3, every subdivision of Wt×t contains a theta and the line graph of
|
277 |
+
every subdivision of Wt×t contains a prism. It follows that for every t ≥ 1, every graph in Ct is
|
278 |
+
t-clean, and so the following is immediate from Theorem 2.3:
|
279 |
+
Corollary 2.4. For all integers k, t ≥ 1, there exists an integer β = β(k, t) such that every
|
280 |
+
graph in Ct with no strong k-block has treewidth at most β(k, t).
|
281 |
+
A vertex v in a graph G is said to be a branch vertex if v has degree more than two. By
|
282 |
+
a caterpillar we mean a tree C with maximum degree three such that there is a path P in
|
283 |
+
C containing all branch vertices of C (our definition of a caterpillar is non-standard for two
|
284 |
+
reasons: a caterpillar is often allowed to be of arbitrary maximum degree, and the path P from
|
285 |
+
the definition often contains all vertices of degree more than one). By a subdivided star we mean
|
286 |
+
a graph isomorphic to a subdivision of the complete bipartite graph K1,δ for some δ ≥ 3. In
|
287 |
+
other words, a subdivided star is a tree with exactly one branch vertex, which we call its root.
|
288 |
+
For every graph H, a vertex v of H is said to be simplicial if NH(v) is a clique. We denote by
|
289 |
+
Z(H) the set of all simplicial vertices of H. Note that for every tree T, Z(T) is the set of all
|
290 |
+
leaves of T. An edge e of a tree T is said to be a leaf-edge of T if e is incident with a leaf of
|
291 |
+
T. It follows that if H is the line graph of a tree T, then Z(H) is the set of all vertices in H
|
292 |
+
corresponding to the leaf-edges of T. The following is proved in [2] based on (and refining) a
|
293 |
+
result from [11].
|
294 |
+
Theorem 2.5 (Abrishami, Alecu, Chudnovsky, Hajebi and Spirkl [2]). For every integer h ≥ 1,
|
295 |
+
there exists an integer µ = µ(h) ≥ 1 with the following property. Let G be a connected graph
|
296 |
+
with no clique of cardinality h and let S ⊆ G such that |S| ≥ µ. Then either some path in G
|
297 |
+
contains h vertices from S, or there is an induced subgraph H of G with |H ∩ S| = h for which
|
298 |
+
one of the following holds.
|
299 |
+
• H is either a caterpillar or the line graph of a caterpillar with H ∩ S = Z(H).
|
300 |
+
• H is a subdivided star with root r such that Z(H) ⊆ H ∩ S ⊆ Z(H) ∪ {r}.
|
301 |
+
|
302 |
+
INDUCED SUBGRAPHS AND TREE DECOMPOSITIONS VIII.
|
303 |
+
7
|
304 |
+
3. Jumps and jewels on pyramids with trapped apices
|
305 |
+
For a graph G, an induced subgraph H of G and a vertex a ∈ H, we say a is trapped in H if
|
306 |
+
• we have N 2
|
307 |
+
G[a] ⊆ H, and;
|
308 |
+
• every vertex in NH(a) = NG(a) has degree two in H (and so in G).
|
309 |
+
The goal of this section is, for a graph G ∈ C, H ⊆ G and a pyramid Σ in H, to investigate the
|
310 |
+
adjacency between Σ and a path in G \ H, assuming that the apex of Σ is trapped in H. This
|
311 |
+
will be of essential use in the next section.
|
312 |
+
We begin with a few definitions. Let G be a graph and let Σ be a pyramid in G with apex
|
313 |
+
a, base b1b2b3 and paths P1, P2, P3. A set X ⊆ Σ is said to be local (in Σ) if either X ⊆ Pi for
|
314 |
+
some i ∈ {1, 2, 3} or X ⊆ {b1, b2, b3}. Let P be a path in G \ Σ with (not necessarily distinct)
|
315 |
+
ends p1, p2. For i ∈ {1, 2, 3}, we say P is a corner path for Σ at bi if
|
316 |
+
• p1 has at least one neighbor in Pi \ {bi};
|
317 |
+
• p2 is complete to {b1, b2, b3} \ {bi}, and;
|
318 |
+
• except for the edges between {p1, p2} and Σ described in the above two bullets, there is
|
319 |
+
no edge with an end in P and an end in Σ \ {bi}.
|
320 |
+
By a corner path for Σ we mean a corner path for Σ at one of b1, b2 or b3.
|
321 |
+
Let p ∈ G \ Σ. Then p is said to be narrow for Σ if NΣ(p) is local in Σ. Otherwise, we say
|
322 |
+
p is wide for Σ. For i ∈ {1, 2, 3}, we say p is a jewel for Σ at bi if p is anticomplete to Pi (in
|
323 |
+
particular, p is anticomplete to a), and for every j ∈ {1, 2, 3} \ {i}, we have NPj(p) = NPj[bj].
|
324 |
+
By a jewel for Σ we mean a jewel for Σ at one of b1, b2 or b3. Note that if p is either a corner
|
325 |
+
path or a jewel for Σ, then p is wide for Σ. The following lemma establishes a converse to this
|
326 |
+
fact for graphs in C and pyramids with a trapped apex.
|
327 |
+
Lemma 3.1. Let G ∈ C be graph, let H ⊆ G and let a ∈ H be trapped in H. Let Σ be a pyramid
|
328 |
+
in H with apex a, base b1b2b3 and paths P1, P2, P3. Let p ∈ G \ H. Then p is wide for Σ if and
|
329 |
+
only if p is either a corner path for Σ or a jewel for Σ.
|
330 |
+
Proof. We only need to prove the “only if” direction. Assume that p ∈ G \ H is wide for Σ and
|
331 |
+
p is not a corner path for Σ. Since a is trapped in H and p ∈ G \ H, it follows that Σ is long
|
332 |
+
and p is anticomplete to NΣ[a]. First, we show that:
|
333 |
+
(1) There exists i ∈ {1, 2, 3} for which p is anticomplete to Pi.
|
334 |
+
Suppose for a contradiction that p has a neighbor in each of P1, P2, P3. Since p is wide for Σ
|
335 |
+
and p is not a corner path for Σ, we may assume without loss of generality that p has a neighbor
|
336 |
+
in P ∗
|
337 |
+
1 and a neighbor in P ∗
|
338 |
+
2 . For each i ∈ {1, 2, 3}, traversing Pi from a to bi, let xi be the first
|
339 |
+
neighbor of p in Pi. Since a is trapped, it follows that x1 ∈ P ∗
|
340 |
+
1 , x2 ∈ P ∗
|
341 |
+
2 and x3 ∈ P3\NΣ[a]. But
|
342 |
+
then there is a theta in G with ends a, p and paths a-Pi-xi-p for i ∈ {1, 2, 3}, a contradiction.
|
343 |
+
This proves (1).
|
344 |
+
By (1) and without loss of generality, we may assume that p is anticomplete to P3. Note that
|
345 |
+
since p is wide for Σ, it follows that for every j ∈ {1, 2}, p has a neighbor in Pj, and there exists
|
346 |
+
j ∈ {1, 2} for which p has a neighbor in P ∗
|
347 |
+
j . For each j ∈ {1, 2}, traversing Pj from a to bj, let xj
|
348 |
+
and yj be the first and the last neighbor of p in Pj, respectively. Then we have xj ∈ P ∗
|
349 |
+
j \NPj(a)
|
350 |
+
for some j ∈ {1, 2}. In fact, the following holds.
|
351 |
+
(2) For every j ∈ {1, 2}, we have xj ∈ P ∗
|
352 |
+
j \ NPj(a).
|
353 |
+
Suppose not. Then since p is wide for Σ, we may assume without loss of generality that p has
|
354 |
+
a neighbor in P ∗
|
355 |
+
1 and we have x2 = y2 = b2. But now there is a theta in G with ends a, b2 and
|
356 |
+
paths a-P1-x1-p-b2, a-P2-b2 and a-P3-b3-b2, a contradiction. This proves (2).
|
357 |
+
(3) For every j ∈ {1, 2}, NPj(p) is a clique of cardinal ity two.
|
358 |
+
Suppose not. Then we may assume without loss of generality that either x1 = y1 or x1 and y1
|
359 |
+
are distinct and non-adjacent. By (2), for every j ∈ {1, 2}, we have xj ∈ P ∗
|
360 |
+
j \NPj(a). Therefore,
|
361 |
+
|
362 |
+
8
|
363 |
+
INDUCED SUBGRAPHS AND TREE DECOMPOSITIONS VIII.
|
364 |
+
if x1 = y1, then there is a theta in G with ends a, x1 and paths a-P1-x1, a-P2-x2-p-x1 and
|
365 |
+
a-P3-b3-b1-P1-x1, which is impossible. Thus, x1 and y1 are distinct and non-adjacent. But now
|
366 |
+
there is a theta in G with ends a, p and paths a-P1-x1-p, a-P2-x2-p and a-P3-b3-b1-P1-y1-p, a
|
367 |
+
contradiction. This proves (3).
|
368 |
+
The proof is almost concluded. By (3), for every j ∈ {1, 2}, we have NPj(p) = {xj, yj} and xj
|
369 |
+
is adjacent to yj. If yj ∈ P ∗
|
370 |
+
j for some j ∈ {1, 2}, then there is a prism in G with triangles xjyjp
|
371 |
+
and b1b2b3 and paths xj-Pj-a-P3-b3, yj-Pj-bj and p-y3−j-P3−j-b3−j, a contradiction. Hence, we
|
372 |
+
have yj = bj for every j ∈ {1, 2}, and so p is a jewel corner for Σ at bi. This completes the proof
|
373 |
+
of Lemma 3.1.
|
374 |
+
■
|
375 |
+
We can now prove the main result of this section.
|
376 |
+
Theorem 3.2. Let G ∈ C be a graph, let H ⊆ G and let a ∈ H be trapped in H. Let Σ be a
|
377 |
+
pyramid in H with apex a, base b1b2b3 and paths P1, P2, P3. Let P be a path in G \ H. Then
|
378 |
+
one of the following holds.
|
379 |
+
• NΣ(P) is local in Σ.
|
380 |
+
• P contains a corner path for Σ.
|
381 |
+
• P contains a jewel for Σ.
|
382 |
+
Proof. Suppose for a contradiction that there exists a path P in G \ H for which none of the
|
383 |
+
outcomes of Theorem 3.2 hold. We choose such a path P with |P| as small as possible. It follows
|
384 |
+
that NΣ(P) is not local in Σ, NΣ(X) is local in Σ for every connected set X ⊊ P, P contains
|
385 |
+
no corner path for Σ and P contains no jewel for Σ. Therefore, by Lemma 3.1, we have |P| > 1.
|
386 |
+
Since a is trapped in H and P ⊆ G\H, it follows that Σ is long and P is anticomplete to NΣ[a].
|
387 |
+
For every i ∈ {1, 2, 3}, let P ′
|
388 |
+
i = Pi \ NPi[a]. Since NΣ(P) is not local and P is minimal subject
|
389 |
+
to this property, we may assume without loss of generality that
|
390 |
+
• NΣ(p1) ⊆ P ′
|
391 |
+
1 and p1 has a neighbor in P ′
|
392 |
+
1 \ {b1}, and;
|
393 |
+
• p2 has a neighbor in P ′
|
394 |
+
2, and either NΣ(p2) ⊆ P ′
|
395 |
+
2, or NΣ(p2) ⊆ {b1, b2, b3}.
|
396 |
+
It follows from the choice of P that P ∗ is anticomplete to Σ\{b1}. For each i ∈ {1, 2}, traversing
|
397 |
+
Pi from a to bi, let xi and yi be the first and the last neighbor of pi in Pi, respectively. So we
|
398 |
+
have x1 ∈ P ′
|
399 |
+
1 \ {b1}, y1 ∈ P ′
|
400 |
+
1 and x2, y2 ∈ P ′
|
401 |
+
2. In fact, the following holds.
|
402 |
+
(4) We have x2 ∈ P ′
|
403 |
+
2 \ {b2}.
|
404 |
+
Suppose not. Then we have x2 = y2 = b2, and so b2 ∈ NΣ(p2) ⊆ {b1, b2, b3}. Note that if p2
|
405 |
+
is adjacent to b3, then P is a corner path for Σ at b1, which is impossible. So p2 is not adjacent
|
406 |
+
to b3. But now there is a theta in G with ends a, b2 and paths a-P1-x1-p1-P-p2-b2, a-P2-b2 and
|
407 |
+
a-P3-b3-b2, a contradiction. This proves (4).
|
408 |
+
In view of (4) and the choice of P, we conclude that P ∗ is anticomplete to Σ, and for every
|
409 |
+
i ∈ {1, 2}, we have NΣ(pi) = NP ′
|
410 |
+
i (pi), xi ∈ P ′
|
411 |
+
i \ {bi} and yi ∈ P ′
|
412 |
+
i.
|
413 |
+
(5) For every i ∈ {1, 2}, xi and yi are distinct and adjacent.
|
414 |
+
Suppose not. Then we may assume without loss of generality that either x1 = y1 or x1 and
|
415 |
+
y1 are distinct and non-adjacent. In the former case, there is a theta in G with ends a, x1 and
|
416 |
+
paths a-P1-x1, a-P2-x2-p2-P-p1-x1 and a-P3-b3-b1-P1-x1, which is impossible. It follows that x1
|
417 |
+
and y1 are distinct and non-adjacent. But then there is a theta in G with ends a, p1 and paths
|
418 |
+
a-P1-x1-p1, a-P2-x2-p2-P-p1 and a-P3-b3-b1-P1-y1-p1, a contradiction. This proves (5).
|
419 |
+
By (5), for every i ∈ {1, 2}, we have NPi(p) = {xi, yi} and xi is adjacent to yi. But now there is
|
420 |
+
a prism in G with triangles p1x1y1 and p2x2y2 and paths P, x1-P1-a-P2-x2 and y1-P1-b1-b2-P2-y2,
|
421 |
+
a contradiction. This completes the proof of Theorem 3.2.
|
422 |
+
■
|
423 |
+
|
424 |
+
INDUCED SUBGRAPHS AND TREE DECOMPOSITIONS VIII.
|
425 |
+
9
|
426 |
+
4. Strip structures with an ornament of jewels
|
427 |
+
The main result of this section, Theorem 4.2, provides a description of the structure of graphs
|
428 |
+
in C which have an induced subgraph containing a pyramid with a trapped apex.
|
429 |
+
We first set up a framework that allows us to think of a pyramid with apex a as a special case
|
430 |
+
of a construction similar to the line graph of a tree T, which we call a “(T, a)-strip-structure.”
|
431 |
+
We start with an induced subgraph W of G that admits an “optimal” (T, a)-strip-structure in
|
432 |
+
G in a certain sense, and show that the rest of the graph fits into the same construction, except
|
433 |
+
for vertices which are jewels for certain canonically positioned pyramids in W.
|
434 |
+
First, we need to properly define a strip-structure (this is similar to [8], [9] and [10]). A
|
435 |
+
tree T is said to be smooth if T has at least three vertices and every vertex of T is either
|
436 |
+
a branch vertex or a leaf.
|
437 |
+
Let G be a graph, let a ∈ G, let T be a smooth tree, and let
|
438 |
+
η : V (T) ∪ E(T) ∪ (E(T) × V (T)) → 2G\{a} be a function. For every S ⊆ V (T), we define
|
439 |
+
η(S) = �
|
440 |
+
v∈S,e∈E(T[S])(η(v) ∪ η(e)) and η+(S) = η(S) ∪ {a}. For every vertex v ∈ V (T), we
|
441 |
+
define Bη(v) to be the union of all sets η(e, v) taken over all edges e ∈ E(T) incident with v (we
|
442 |
+
often omit the subscript η unless there is ambiguity).
|
443 |
+
The function η is said to be a (T, a)-strip-structure in G if the following conditions are satisfied.
|
444 |
+
(S1) For all distinct o, o′ ∈ V (T) ∪ E(T), we have η(o) ∩ η(o′) = ∅.
|
445 |
+
(S2) If l ∈ V (T) is a leaf of T, then η(l) is empty.
|
446 |
+
(S3) For all e ∈ E(T) and v ∈ V (T), we have η(e, v) ⊆ η(e) and η(e, v) ̸= ∅ if and only if e is
|
447 |
+
incident with v.
|
448 |
+
(S4) For all distinct edges e, f ∈ E(T) and every vertex v ∈ V (T), η(e, v) is complete to η(f, v),
|
449 |
+
and there are no other edges between η(e) and η(f). In particular, if e and f share no end,
|
450 |
+
the η(e) is anticomplete to η(f).
|
451 |
+
(S5) For every e ∈ E(T) with ends u, v, define η◦(e) = η(e) \ (η(e, u) ∪ η(e, v)). Then for every
|
452 |
+
vertex x ∈ η(e), there is a path in η(e) from x to a vertex in η(e, u) with interior contained
|
453 |
+
in η◦(e), and there is a path in η(e) from x to a vertex in η(e, v) with interior contained in
|
454 |
+
η◦(e).
|
455 |
+
(S6) For all v ∈ V (T) and e ∈ E(T), η(v) is anticomplete to η(e) \ η(e, v). In other words, we
|
456 |
+
have Nη(T)(η(v)) ⊆ Bη(v).
|
457 |
+
(S7) For every v ∈ V (T) and every connected component D of η(v), we have NBη(v)(D) ̸= ∅.
|
458 |
+
(S8) For every leaf l ∈ V (T) of T, assuming e ∈ E(T) to be the leaf-edge of T incident with l,
|
459 |
+
a is complete to η(e, l). Also, a has no other neighbors in η(T).
|
460 |
+
Let S ⊆ η(T). We say that S is local in η if S ⊆ η(e) for some e ∈ E(T) or S ⊆ Bη(v) ∪ η(v)
|
461 |
+
for some v ∈ V (T). The following lemma shows that every non-local subset contains a 2-subset
|
462 |
+
(that is, a subset of cardinality two) which is non-local.
|
463 |
+
Lemma 4.1. Let G be a graph and a ∈ G. Let T be a smooth tree and η be a (T, a)-strip-
|
464 |
+
structure in G. Assume also that C ⊆ η(T) is not local in η. Then there is a 2-subset of C
|
465 |
+
which is not local in η.
|
466 |
+
Proof. First, suppose there exists a vertex x ∈ C ∩ η◦(e) for some e ∈ E(T). Since C is not
|
467 |
+
local, there exists y ∈ C \ η(e). Now {x, y} is a 2-subset of C which is not local in η, as desired.
|
468 |
+
Therefore, we may assume that C ⊆ �
|
469 |
+
v∈V (T)(B(v) ∪ η(v)). Since the empty set is local in η,
|
470 |
+
we have C ̸= ∅; thus, we may pick x ∈ C, v ∈ V (T) and e ∈ E(T) such that x ∈ η(e, v) ∪ η(v).
|
471 |
+
If there exists a vertex y ∈ C \ (η(e) ∪ B(v) ∪ η(v)), then {x, y} is a 2-subset of C which is not
|
472 |
+
local in η, and so we are done. Consequently, we may assume that C ⊆ η(e) ∪ B(v) ∪ η(v).
|
473 |
+
Since C is not local, there exist x′ ∈ η(e) \ (B(v) ∪ η(v))) and y′ ∈ (B(v) ∪ η(v)) \ η(e) such that
|
474 |
+
{x′, y′} ⊆ C. Now {x′, y′} is a 2-subset of C which is not local in η, as required. This completes
|
475 |
+
the proof of Lemma 4.1.
|
476 |
+
■
|
477 |
+
In order to state and prove the main result of this section, we need to define several notions
|
478 |
+
related to strip-structures. From here until the statement of Theorem 4.2, let us fix a graph G,
|
479 |
+
a vertex a ∈ G, a smooth tree T and a (T, a)-strip-structure η in G.
|
480 |
+
|
481 |
+
10
|
482 |
+
INDUCED SUBGRAPHS AND TREE DECOMPOSITIONS VIII.
|
483 |
+
For every edge e ∈ E(T) with ends u, v, by an η(e)-rung, we mean a path P in η(e) ⊆ η(T)
|
484 |
+
for which either |P| = 1 and P ⊆ η(e, u) ∩ η(e, v), or P has an end in η(e, u) \ η(e, v) and an
|
485 |
+
end in η(e, v) \ η(e, u) and we have P ∗ ⊆ η◦(e). Equivalently, a path P in η(e) is an η(e)-rung
|
486 |
+
if P has an end in η(e, u) and an end in η(e, v) and we have |P ∩ η(e, u)| = |P ∩ η(e, v)| = 1. It
|
487 |
+
follows from (S5) that every vertex in η(e) \ η◦(e) is contained in an η(e)-rung. In particular,
|
488 |
+
if either η(e, u) ⊆ η(e, v) or η(e, v) ⊆ η(e, u), then η(e, u) = η(e, v). An η(e)-rung is said to be
|
489 |
+
long if it is of non-zero length.
|
490 |
+
For every edge e ∈ E(T), let ˜η(e) be the set of vertices in η(e) that are not in any η(e)-rung
|
491 |
+
(so ˜η(e) ⊆ η◦(e).) We say that η is tame if
|
492 |
+
• η(v) = ∅ for every v ∈ V (T), and;
|
493 |
+
• ˜η(e) = ∅ for every e ∈ E(T).
|
494 |
+
In other words, η is tame if and only if every vertex in η(T) is in an η(e)-rung for some e ∈ E(T).
|
495 |
+
For a (T, a)-strip-structure η′ in G, we write η ≤ η′ to mean that for every o ∈ V (T)∪E(T)∪
|
496 |
+
(E(T)×V (T)), we have η(o) ⊆ η′(o). We say a (T, a)-strip-structure η is substantial if for every
|
497 |
+
e ∈ E(T), there exists a long η(e)-rung in G. Equivalently, η is substantial if for every edge
|
498 |
+
e ∈ E(T) with ends u, v, we have η(e, u) ̸= η(e, v), and so η(e, u) \ η(e, v), η(e, v) \ η(e, u) ̸= ∅.
|
499 |
+
One may observe that since T has at least three vertices, if η is substantial and η ≤ η′, then η′
|
500 |
+
is substantial too.
|
501 |
+
We say η is rich if
|
502 |
+
• a is trapped in η+(T), and;
|
503 |
+
• for every leaf l ∈ V (T) of T, assuming e ∈ E(T) to be the leaf-edge of T incident with
|
504 |
+
l, we have |η(e, l)| = 1.
|
505 |
+
It follows that if there exists a rich (T, a)-strip-structure η in G, then T has exactly |NG(a)|
|
506 |
+
leaves, and for every leaf l ∈ V (T) of T, assuming e ∈ E(T) to be the leaf-edge of T incident
|
507 |
+
with l and v ∈ V (T) to be the unique neighbor of l in T, we have η(e, v) ∩ η(e, l) = ∅.
|
508 |
+
By a seagull in T we mean a triple (v, e1, e2) where v ∈ V (T) and e1, e2 are two distinct
|
509 |
+
edges of T incident with v. By a claw in T we mean a 4-tuple (v, e1, e2, e3) where v ∈ V (T) and
|
510 |
+
e1, e2, e3 are three distinct edges of T incident with v.
|
511 |
+
Let (v, e1, e2, e3) be a claw in T. By an η-pyramid at (v, e1, e2, e3), we mean a pyramid Σ with
|
512 |
+
apex a, base b1b2b3 and paths P1, P2, P3, satisfying the following for each i ∈ {1, 2, 3}.
|
513 |
+
• bi ∈ η(ei, v).
|
514 |
+
• There exists a leaf li of T with the following properties:
|
515 |
+
(1) li belongs to the component of T \ {ei} not containing v.
|
516 |
+
(2) Let Λi be the unique path in T from v to li (so ei ∈ E(Λi)). Then Pi = Γi ∪ {a},
|
517 |
+
where Γi is a path in �
|
518 |
+
e∈E(Λi) η(e) such that Ri = Γi ∩ η(ei) is a long η(ei)-rung
|
519 |
+
and Γi ∩ η(e) is a η(e)-rung for each e ∈ E(Λi) \ {ei}.
|
520 |
+
In particular, assuming ui to be the ends of ei distinct from v and ci to be the unique vertex in
|
521 |
+
NRi(bi) = NPi(bi) for each i ∈ {1, 2, 3}, we have bi ∈ η(ei, v) \ η(ei, ui) and ci ∈ η(ei) \ η(ei, v).
|
522 |
+
For a branch vertex v ∈ V (T), by an η-pyramid at v we mean an η-pyramid at (v, e1, e2, e3) for
|
523 |
+
some claw (v, e1, e2, e3) in T. Also, by an η-pyramid we mean an η-pyramid at v for some branch
|
524 |
+
vertex v ∈ V (T). It follows that every η-pyramid is a long pyramid. Also, if η is substantial,
|
525 |
+
then for every claw (v, e1, e2, e3) in T there is a η-pyramid at (v, e1, e2, e3).
|
526 |
+
Let (v, e1, e2) be a seagull in T. A vertex p ∈ G\η+(T) is said to be a jewel for η at (v, e1, e2)
|
527 |
+
if for some edge e3 ∈ E(T)\{e1, e2} incident with v, there exists an η-pyramid Σ at (v, e1, e2, e3)
|
528 |
+
with base b1b2b3 where bi ∈ η(ei, v) for each i ∈ {1, 2, 3}, such that p is a jewel for Σ at b3. In
|
529 |
+
particular, for each i ∈ {1, 2}, p is adjacent to bi and the unique vertex ci in NPi(bi). Therefore,
|
530 |
+
since Σ is an η-pyramid at (v, e1, e2, e3), assuming ui to be the end of ei distinct from v, it
|
531 |
+
follows that p has a neighbor bi ∈ η(ei, v) \ η(ei, ui) and a neighbor ci ∈ η(ei) \ η(ei, v).
|
532 |
+
For a vertex v ∈ V (T), by a jewel for η at v we mean a jewel for η at (v, e1, e2) for some
|
533 |
+
seagull (v, e1, e2) in T. Also, by a jewel for η we mean a jewel for η at v for some branch vertex
|
534 |
+
v ∈ V (T). We denote by Jη the set of all jewels for η. It follows that Jη ⊆ G \ η+(T).
|
535 |
+
|
536 |
+
INDUCED SUBGRAPHS AND TREE DECOMPOSITIONS VIII.
|
537 |
+
11
|
538 |
+
We are now in a position to prove the main result of this section:
|
539 |
+
Theorem 4.2. Let G ∈ C, let a ∈ G and let T be a smooth tree. Suppose that there exists
|
540 |
+
a tame, substantial and rich (T, a)-strip-structure in G. Then there is a substantial and rich
|
541 |
+
(T, a)-strip-structure ζ in G for which G \ (ζ+(T) ∪ Jζ) is anticomplete to ζ+(T).
|
542 |
+
Proof. Let η be a tame, substantial and rich (T, a)-strip-structure in G such that η(T) is maximal
|
543 |
+
with respect to inclusion. Let M = G \ (η+(T) ∪ Jη).
|
544 |
+
(6)
|
545 |
+
Let P be a path in M with ends p1 and p2 such that there exists x1 ∈ Nη(T)(p1) and
|
546 |
+
x2 ∈ Nη(T)(p2) for which {x1, x2} is not local in η, and such that |P| ≥ 1 is as small as possible
|
547 |
+
subject to this property. Then there exists {j1, j2} = {1, 2} and f = v1v2 ∈ E(T) such that
|
548 |
+
xj1 ∈ B(vj1) \ η(f) and xj2 ∈ (B(vj2) ∪ η(f)) \ B(vj1).
|
549 |
+
Suppose not. For each i ∈ {1, 2}, let ei ∈ E(T) such that xi ∈ η(ei) (hence e1 ̸= e2) and
|
550 |
+
si be an end of ei such that there exists a path Λ0 (possibly of length zero) from s1 to s2 in
|
551 |
+
T \ {e1, e2}. We claim that there is a vertex v ∈ Λ0 such that B(v) ∩ {x1, x2} = ∅. Suppose first
|
552 |
+
that s1 ̸= s2; let v1 be unique neighbor of s1 in Λ0. Then we have x1 /∈ B(v1) and x2 /∈ B(s1).
|
553 |
+
Also, since f = s1v1 does not satisfy (6), we have either x1 /∈ B(s1) or x2 /∈ B(v1). But then
|
554 |
+
either v = s1 or v = v1 satisfies the claim. Thus, we may assume that v = s1 = s2. Note
|
555 |
+
that since neither e1 nor e2 satisfies (6), we have x1 /∈ B(s1) and x2 /∈ B(s2). In other words,
|
556 |
+
we have B(v) ∩ {x1, x2} = ∅, and the claim follows. Henceforth, let v be as promised by the
|
557 |
+
above claim. For each i ∈ {1, 2}, let ui be the end of ei distinct from si (hence u1 ̸= u2). Let
|
558 |
+
Λ = u1-s1-Λ0-s2-u2 and let u′
|
559 |
+
1, u′
|
560 |
+
2 be the neighbors of v in Λ such that Λ traverses u1, u′
|
561 |
+
1, v, u′
|
562 |
+
2, u2
|
563 |
+
in this order (so either of u1 = u′
|
564 |
+
1 and u2 = u′
|
565 |
+
2 is possible). Let e′
|
566 |
+
i = u′
|
567 |
+
iv for each i ∈ {1, 2}. Since
|
568 |
+
T is smooth, there exists a vertex u′
|
569 |
+
3 ∈ NT (v) \ Λ; let e′
|
570 |
+
3 = u′
|
571 |
+
3v. For each i ∈ {1, 2, 3}, let Ti be
|
572 |
+
the component of T \(NT (v)\{u′
|
573 |
+
i}) containing v (so e′
|
574 |
+
i ∈ E(Ti)). Then since B(v)∩{x1, x2} = ∅
|
575 |
+
and since η is tame and substantial, there exists an η-pyramid Σ at (v, e′
|
576 |
+
1, e′
|
577 |
+
2, e′
|
578 |
+
3) with apex a,
|
579 |
+
base b1b2b3 and paths P1, P2, P3 such that we have
|
580 |
+
• bi ∈ η(e′
|
581 |
+
i, v) and Pi \ {a, bi} ⊆ η(Ti) \ B(v) for each i ∈ {1, 2, 3}, and;
|
582 |
+
• xi ∈ P ∗
|
583 |
+
i for each i ∈ {1, 2}.
|
584 |
+
In particular, the second bullet above implies that NΣ(P) is not local in Σ and P is not a corner
|
585 |
+
path for Σ. Since P ⊆ M, we have P ∩ Jη = ∅. Thus, Σ being an η-pyramid, it follows that
|
586 |
+
P contains no jewel for Σ. Also, since η is rich, a is trapped in η+(T). Therefore, applying
|
587 |
+
Theorem 3.2 to G, H = η+(T), a, Σ and P, we deduce that P contains a corner path for Σ.
|
588 |
+
On the other hand, note that by the second bullet above, for every vertex x ∈ Σ \ {a}, either
|
589 |
+
{x, x1} or {x, x2} is not local in η. From this, the minimality of |P| and the fact that η is rich,
|
590 |
+
it follows that P ∗ is anticomplete to Σ. But then P is a corner path for Σ, a contradiction. This
|
591 |
+
proves (6).
|
592 |
+
(7) Let P be a path in M with ends p1 and p2 such that there exists x1 ∈ Nη(T)(p1) and
|
593 |
+
x2 ∈ Nη(T)(p2) for which {x1, x2} is not local in η, and such that |P| ≥ 1 is as small as possible
|
594 |
+
subject to this property. Let f = v1v2 ∈ E(T) and {j1, j2} = {1, 2} be as guaranteed by (6) applied
|
595 |
+
to P, x1 and x2. Then we have Nη(T)(P ∗) ⊆ η(f, vj1) and Nη(T)({p1, p2}) ⊆ η(f)∪B(v1)∪B(v2).
|
596 |
+
Suppose not. Without loss of generality, we may assume that j1 = 1 and j2 = 2. Note that by
|
597 |
+
the minimality of |P|, we have Nη(T)(P ∗) ⊆ η(f, v1). Therefore, one of p1 and p2 has a neighbor
|
598 |
+
in η(T) \ (η(f) ∪ B(v1) ∪ B(v2)); say p1 is adjacent to x′
|
599 |
+
1 ∈ η(T) \ (η(f) ∪ B(v1) ∪ B(v2)). For
|
600 |
+
each i ∈ {1, 2}, let Ti be the component of T \ {f} containing vi. It follows that there exists
|
601 |
+
j ∈ {1, 2} such that x′
|
602 |
+
1 ∈ η(Tj) \ B(vj). Assume that |P| > 1. By the minimality of |P|, we
|
603 |
+
have j = 1. But then P, x′
|
604 |
+
1 and x2 violate (6). We deduce that |P| = 1. But now P, x′
|
605 |
+
1 and x3−j
|
606 |
+
violate (6). This proves (7).
|
607 |
+
|
608 |
+
12
|
609 |
+
INDUCED SUBGRAPHS AND TREE DECOMPOSITIONS VIII.
|
610 |
+
(8) Let P be a path in M with ends p1 and p2 such that there exists x1 ∈ Nη(T)(p1) and
|
611 |
+
x2 ∈ Nη(T)(p2) for which {x1, x2} is not local in η, and such that |P| ≥ 1 is as small as
|
612 |
+
possible subject to this property. Suppose that there exist {k1, k2} = {1, 2}, f = v1v2 ∈ E(T)
|
613 |
+
and e1 ∈ E(T) \ {f} incident with vk1 such that pk1 has a neighbor in η(e1, vk1) and pk2 has a
|
614 |
+
neighbor in (B(vk2) ∪ η(f)) \ B(vk1). Then pk1 is complete to B(vk1) \ (η(e1, vk1) ∪ η(f)).
|
615 |
+
Due to symmetry, we may assume that k1 = 1 and k2 = 2. Let e3 ∈ E(T)\{e1, f} be incident
|
616 |
+
with v1 and let b3 ∈ η(e3, v1) be arbitrary. We need to show that p1 is adjacent to b3. Suppose
|
617 |
+
for a contradiction that p1 and b3 are non-adjacent. Let b1 ∈ η(e1, v1) be adjacent to p1 and let
|
618 |
+
x ∈ (B(v2) ∪ η(f)) \ B(v1) be adjacent to p2. Let T2 be the component of T \ (NT (v1) \ {v2})
|
619 |
+
containing v1 (so f ∈ E(T2)). Also, for each i ∈ {1, 3}, let ui be the end of ei distinct from v1
|
620 |
+
and let Ti be the component of T \ (NT (v1) \ {ui}) containing v1 (so ei ∈ E(Ti)). By (6) and
|
621 |
+
(7), there exists an edge f ′ = v′
|
622 |
+
1v′
|
623 |
+
2 ∈ E(T) such that Nη(T)({p1, p2}) ⊆ η(f ′) ∪ B(v′
|
624 |
+
1) ∪ B(v′
|
625 |
+
2).
|
626 |
+
This, along with the minimality of |P|, implies that p1 is anticomplete to (η(T1)∪η(T3))\B(v1),
|
627 |
+
P \ {p1} is anticomplete to η(T1) ∪ η(T3) and P \ {p2} is anticomplete to η(T2) \ B(v1). Since
|
628 |
+
p2 has a neighbor x ∈ (B(v2) ∪ η(f)) \ B(v1) and since η is tame, there exists a path P2 in G
|
629 |
+
from a to p2 with P ∗
|
630 |
+
2 ⊆ η(T2) \ B(v1). Also, for each i ∈ {1, 3}, there exists a path Pi in G
|
631 |
+
from a to bi with P ∗
|
632 |
+
i ⊆ η(Ti) \ B(v1). Note that since η is rich, P anticomplete to NG[a]; in
|
633 |
+
particular, P1 has length at least two. But now there is a theta in G with ends a and b1 and
|
634 |
+
paths P1, a-P2-p2-P-p1-b1 and b1-b3-P3-a, a contradiction. This proves (8).
|
635 |
+
The following is immediate from (8) and the fact that T is smooth.
|
636 |
+
(9) Let P be a path in M with ends p1 and p2 such that there exists x1 ∈ Nη(T)(p1) and
|
637 |
+
x2 ∈ Nη(T)(p2) for which {x1, x2} is not local in η, and such that |P| ≥ 1 is as small as possible
|
638 |
+
subject to this property. Suppose that there exist {k1, k2} = {1, 2} and f = v1v2 ∈ E(T) such that
|
639 |
+
xk1 ∈ B(vk1) \ (η(f)) and xk2 ∈ (B(vk2) ∪ η(f)) \ B(vk1). Then pk1 is complete to B(vk1) \ η(f).
|
640 |
+
We now deduce:
|
641 |
+
(10) Let D be a component of M. Then Nη(T)(D) is local in η.
|
642 |
+
Suppose not. By Lemma 4.1, there exist x1, x2 ∈ Nη(T)(D) such that {x1, x2} is not local in η.
|
643 |
+
For each i ∈ {1, 2}, let pi be a neighbor of xi in D. Since D is connected, there exists a path P
|
644 |
+
in D ⊆ M from p1 to p2. In other words, there exists a path P in M with ends p1, p2 along with
|
645 |
+
x1 ∈ Nη(T)(p1) and x2 ∈ Nη(T)(p2) such that {x1, x2} is not local in η. Now, let P be a path in M
|
646 |
+
with ends p1 and p2 such that there exists x1 ∈ Nη(T)(p1) and x2 ∈ Nη(T)(p2) for which {x1, x2}
|
647 |
+
is not local in η, and such that |P| ≥ 1 is as small as possible subject to this property. So we can
|
648 |
+
apply (6) to P, x1 and x2; let {j1, j2} = {1, 2} and f = v1v2 ∈ E(T) be as in (6). We may assume
|
649 |
+
without loss of generality that j1 = 1 and j2 = 2; thus, v1 is a branch vertex of T. It follows from
|
650 |
+
(7) that Nη(T)(P ∗) ⊆ η(f, v1) and Nη(T)({p1, p2}) ⊆ η(f) ∪ B(v1) ∪ B(v2). By (9) applied to
|
651 |
+
k1 = 1 and k2 = 2, p1 is complete to B(v1) \ η(f). Also, from (9) applied to k1 = 2 and k2 = 1,
|
652 |
+
it follows that either p2 is complete to B(v2) \ η(f) and B(v2) \ η(f) ̸= ∅, or p2 is anticomplete
|
653 |
+
to B(v2) \ η(f). Note that if |P| > 1, then by the minimality of |P|, we have Nη(T)(p1) ⊆ B(v1)
|
654 |
+
and Nη(T)(p2) ⊆ (B(v2)∪η(f))\B(v1). Let us define η′ : V (T)∪E(T)∪(E(T)×V (T)) ⊆ 2G\{a}
|
655 |
+
as follows. Let η′(f) = η(f) ∪ P and let η′(f, v1) = η(f, v1) ∪ {p1}. Let
|
656 |
+
• η′(f, v2) = η(f, v2) ∪ {p2} if p2 is complete to B(v2) \ η(f) and B(v2) \ η(f) ̸= ∅, and;
|
657 |
+
• η′(f, v2) = η(f, v2) if p2 is anticomplete to B(v2) \ η(f).
|
658 |
+
Let η′ = η elsewhere on V (T) ∪ E(T) ∪ (E(T) × V (T)). Then since η is tame, substantial and
|
659 |
+
rich, and p2 is adjacent to x2 ∈ B(v2) ∪ η(f)) \ B(v1), it is straightforward to check that η′
|
660 |
+
is also a tame, substantial and rich (T, a)-strip-structure. But we have η′(T) = η(T) ∪ P, a
|
661 |
+
contradiction with the maximality of η(T). This proves (10).
|
662 |
+
The proof is almost concluded. Let X be the union of all the components D of M such that
|
663 |
+
D is anticomplete to η+(T). Since η is rich, it follows that for every component D of M \ X, a
|
664 |
+
|
665 |
+
INDUCED SUBGRAPHS AND TREE DECOMPOSITIONS VIII.
|
666 |
+
13
|
667 |
+
is anticomplete to X and Nη+(T)(D) = Nη(T)(D) is non-empty. By (10), for every component D
|
668 |
+
of M \ X, Nη(T)(D) is local in η. Let D be the set of all components D of M \ X for which we
|
669 |
+
have Nη+(T)(D) ⊆ Bη(v) for some v ∈ V (T). Breaking the ties arbitrarily and by the definition
|
670 |
+
of X, we may write D = �
|
671 |
+
v∈V (T) Dv, where
|
672 |
+
• for all distinct u, v ∈ V (T), we have Du ∩ Dv = ∅, and;
|
673 |
+
• for all v ∈ V (T) and every D ∈ Dv, we have Nη+(T)(D) ⊆ Bη(v) and Nη+(T)(D) ̸= ∅.
|
674 |
+
Also, for every e = uv ∈ E(T), let De be the set of all components D of M \ X for which we
|
675 |
+
have Nη+(T)(D) ⊆ η(e) and
|
676 |
+
• either Nη(T)(D) ∩ η◦(e) ̸= ∅, or;
|
677 |
+
• Nη(T)(D) ∩ (η(e, u) \ η(e, v)) ̸= ∅ and Nη(T)(D) ∩ (η(e, v) \ η(e, v)) ̸= ∅.
|
678 |
+
From the definition of X, it follows that every component of M \ X belongs to exactly one of
|
679 |
+
the sets {Dv, De : v ∈ V (T), e ∈ E(T)} (note that since η is rich, a is anticomplete to each such
|
680 |
+
component).
|
681 |
+
Let ζ : V (T) ∪ E(T) ∪ (E(T) × V (T)) ⊆ 2G\{a} be defined as follows. For all v ∈ V (T) and
|
682 |
+
e ∈ E(T), let
|
683 |
+
• ζ(v) = �
|
684 |
+
D∈Dv D;
|
685 |
+
• ζ(e) = η(e) ∪ (�
|
686 |
+
D∈De D), and;
|
687 |
+
• ζ(e, v) = η(e, v).
|
688 |
+
It is easily seen that ζ satisfies the conditions (S1-S8) from the definition of a (T, a)-strip-
|
689 |
+
structure. In particular, since η is rich, ζ satisfies (S2), and from the definitions of X, Dv’s and
|
690 |
+
De’s, it follows that ζ satisfies (S5) and (S7). Also, we have η ≤ ζ.
|
691 |
+
Now, since η is substantial and rich, since η ≤ ζ and from the definitions of X and ζ, it follows
|
692 |
+
that ζ is a substantial and rich (T, a)-strip-structure with Jζ = Jη. Moreover, note that we have
|
693 |
+
ζ+(T) = η(T)+ ∪ (M \ X), and so G \ (ζ+(T) ∪ Jζ) = G \ (ζ+(T) ∪ Jη) = X is anticomplete to
|
694 |
+
ζ+(T). This completes the proof of Theorem 4.2.
|
695 |
+
■
|
696 |
+
5. Jewels under the loupe
|
697 |
+
Here we revisit jewels for strip-structures, establishing several results about their proper-
|
698 |
+
ties in various settings. This will help attune Theorem 4.2 for its application in the proof of
|
699 |
+
Theorem 6.1.
|
700 |
+
First we need to introduce some notation. Let G be a graph and let a ∈ G. Let T be a smooth
|
701 |
+
tree and let ζ be a (T, a)-strip-structure in G. Let v ∈ V (T) and let e ∈ E(T) be incident with
|
702 |
+
v. We denote by ζe(v) the set of all components D of ζ(v) for which we have NB(v)(D) ⊆ η(e, v),
|
703 |
+
or equivalently, Nζ(T)\ζ(e,v)(D) = ∅.
|
704 |
+
Let (v, e1, e2) be a seagull in T and let ui be the end of ei distinct from v for each i ∈ {1, 2}.
|
705 |
+
We define
|
706 |
+
ζ(v, e1, e2) = ζ(e1) ∪ ζ(e2) ∪ ζe1(u1) ∪ ζe2(u2) ∪ ζ(v).
|
707 |
+
We denote by Jζ,(v,e1,e2) the set of all jewels for ζ at (v, e1, e2), and for every vertex v ∈ V (T),
|
708 |
+
Jζ,v stands for the set of all jewels for η at v. It follows that Jζ,v = ∅ if v is a leaf of T.
|
709 |
+
The first result in this section describes, for a (T, a)-strip-structure in a theta-free graph, the
|
710 |
+
attachments of jewels at a vertex of T.
|
711 |
+
Theorem 5.1. Let G be a theta-free graph and let a ∈ G. Let T be a smooth tree and let ζ be
|
712 |
+
a (T, a)-strip-structure in G. Let (v, e1, e2) be a seagull in T and let x ∈ Jζ,(v,e1,e2). Then the
|
713 |
+
following hold.
|
714 |
+
• We have Nζ+(T)(x) ⊆ ζ(v, e1, e2), and so Nζ+(T)(Jζ,(v,e1,e2)) ⊆ ζ(v, e1, e2). Consequently,
|
715 |
+
for every vertex v ∈ V (T), we have Nζ+(T)(Jζ,v) ⊆ ζ(NT [v]), and for every two distinct
|
716 |
+
vertices v, v′ ∈ V (T), we have Jζ,v ∩ Jζ,v′ = ∅.
|
717 |
+
|
718 |
+
14
|
719 |
+
INDUCED SUBGRAPHS AND TREE DECOMPOSITIONS VIII.
|
720 |
+
• Assume that ζ is rich. Let i ∈ {1, 2} and let R be a long ζ(ei)-rung, let r be the end of
|
721 |
+
R in ζ(ei, v) and let r′ be the unique neighbor of r in R. Then either x is anticomplete
|
722 |
+
to R or NR(x) = {r, r′}.
|
723 |
+
Proof. Note that v is a branch vertex of T. For each i ∈ {1, 2}, let ui be the end of ei distinct
|
724 |
+
from v and let Ti be the component of T \(NT (v)\{ui}) containing v. Let T ′ be the component
|
725 |
+
of T \{u1, u2} containing v. Let x ∈ Jζ,(v,e1,e2). Since x ∈ Jζ,(v,e1,e2) is a jewel for ζ, there exists
|
726 |
+
an edge e3 ∈ E(T)\{e1, e2} incident with v and a ζ-pyramid Σ at (v, e1, e2, e3) with apex a, base
|
727 |
+
b1b2b3 and paths P1, P2, P3 such that x is a jewel for Σ at b3. In particular, for each j ∈ {1, 2, 3},
|
728 |
+
Pj ∩ ζ(ej) is a long ζ(ej)-rung Rj with bj as its end in ζ(ej, v).
|
729 |
+
Also, x is anticomplete to
|
730 |
+
P3 (and so x is not adjacent to a), and for each j ∈ {1, 2}, assuming cj to be the unique
|
731 |
+
vertex in NRj(bj) = NPj(bj), x is adjacent to bj ∈ ζ(ej, v) \ ζ(ej, uj) and cj ∈ ζ(ej) \ ζ(ej, v).
|
732 |
+
Therefore, there exist paths Qi, Si of length more than one in G from a to x for which we have
|
733 |
+
bi ∈ Q∗
|
734 |
+
i ⊆ (ζ(T ′) \ ζ(v)) ∪ (ζ(ei, v) \ ζ(ei, ui)) and ci ∈ S∗
|
735 |
+
i ⊆ ζ(Ti) \ (B(v) ∪ ζ(ui) ∪ ζ(v)).
|
736 |
+
To prove the first assertion of the Theorem 5.1, assume for a contradiction that x has a
|
737 |
+
neighbor y ∈ ζ+(T) \ ζ(v, e1, e2). Since x is not adjacent to a, we have y ∈ ζ(T) \ ζ(v, e1, e2).
|
738 |
+
First, assume that y ∈ ζ(T ′)\ζ(v). Then by (S5) and (S7) from the definition of a strip-structure,
|
739 |
+
there exists a path Q′ of length more than one in G from a to x with Q′∗ ⊆ ζ(T ′) \ ζ(v). But
|
740 |
+
now there is a theta in G with ends a, x and paths a-S1-x, a-S2-x and a-Q′-x, a contradiction.
|
741 |
+
It follows that y ∈ ζ(T1 ∪ T2) \ ζ(v, e1, e2).
|
742 |
+
In other words, for some i ∈ {1, 2}, we have
|
743 |
+
y ∈ ζ(Ti) \ (ζ(ei) ∪ ζei(ui) ∪ ζ(v)). As a result, by (S5) and (S7) from the definition a strip-
|
744 |
+
structure, and by the definition of ζei(ui), there exists a path S′
|
745 |
+
i of length more than one in G
|
746 |
+
from a to x with S′∗
|
747 |
+
i ⊆ ζ(Ti)\(ζ(ei)∪ζei(ui)∪ζ(v)). But now assuming i′ ∈ {1, 2} to be distinct
|
748 |
+
from i, there is a theta in G with ends a, x and paths a-Qi-x, a-S′
|
749 |
+
i-x and a-Si′-x, a contradiction.
|
750 |
+
This proves the the first assertion.
|
751 |
+
Next we prove the second assertion of Theorem 5.1. By symmetry, we may assume that i = 1.
|
752 |
+
Assume that x has a neighbor y ∈ R. Let P ′
|
753 |
+
1 = (P1 \ R1) ∪ R. Let Σ′ be the pyramid with
|
754 |
+
apex a, base rb2b3 and paths P ′
|
755 |
+
1, P2 and P3. Recall that since ζ is rich, a is trapped in ζ+(T).
|
756 |
+
Also, Σ′ is a pyramid in ζ+(T), x is adjacent to y ∈ P ′
|
757 |
+
1, x is adjacent to b2, c2 ∈ P2 and x is
|
758 |
+
anticomplete to P3. It follows that x is a wide vertex for Σ′ which is not a corner path for Σ′.
|
759 |
+
Now applying Lemma 3.1 to G, a, H = ζ+(T), Σ′ and p = x, we deduce that x is a jewel for Σ′
|
760 |
+
at b3, and so NR(x) = NP ′
|
761 |
+
1(x) = {r, r′}. This completes the proof of Theorem 5.1.
|
762 |
+
■
|
763 |
+
Our next goal is to show that for every rich (T, a)-strip-structure in a graph G ∈ Ct, there
|
764 |
+
are only a few jewels at each vertex of T. Let us begin with a lemma, asserting that for a rich
|
765 |
+
(T, a)-strip-structure ζ in a theta-free graph, each set Bζ(v) is almost a clique.
|
766 |
+
Lemma 5.2. Let G be a theta-free graph and a ∈ G. Let T be a smooth tree and ζ be a rich
|
767 |
+
(T, a)-strip-structure in G. Then for every v ∈ V (T), there exists at most one edge f ∈ E(T)
|
768 |
+
such that η(f, v) is not a clique.
|
769 |
+
Proof. Suppose for a contradiction that there are two distinct edges f1, f2 ∈ E(T) incident with
|
770 |
+
v, and for each i ∈ {1, 2}, there exist xi, yi ∈ ζ(fi, v) such that xi is not adjacent to yi. Then
|
771 |
+
v is not a leaf of T and H = x1-x2-y1-y2-x1 is a hole of length four in G. Since ζ is rich, a
|
772 |
+
is anticomplete to H. Let f1 = u1v. Let l1 be a leaf of T which belongs to the component of
|
773 |
+
T \ {v} containing u1, and let Λ1 be the unique path in T from v to l1 (so f1 ∈ E(Λ1)). Let
|
774 |
+
Rx1 be an ζ(f)-rung containing x1 and let Ry1 be an ζ(f)-rung containing y1. Since ζ is rich,
|
775 |
+
H1 = Rx1 ∪ Rx2 ∪ B(u1) is a connected induced subgraph of G, and so there is a path Q in H1
|
776 |
+
from x1 to y1. It follows that Q has length more than one and Q∗ ⊆ (B(u1) ∪ ζ(f1))\B(v). But
|
777 |
+
now there is a theta in G with ends x1, y1 and paths Q, x1-x2-y1 and x1-y2-y1, a contradiction.
|
778 |
+
This completes the proof of Lemma 5.2.
|
779 |
+
■
|
780 |
+
Recall the following classical result of Ramsey (see, for instance, [5] for an explicit bound.)
|
781 |
+
|
782 |
+
INDUCED SUBGRAPHS AND TREE DECOMPOSITIONS VIII.
|
783 |
+
15
|
784 |
+
Theorem 5.3 (See [5]). For all integers a, b ≥ 1, there exists an integer R = R(a, b) ≥ 1 such
|
785 |
+
that every graph G on at least R(a, b) vertices contains either a clique of cardinality a or a stable
|
786 |
+
set of cardinality b.
|
787 |
+
We can now prove the second main result of this section.
|
788 |
+
Theorem 5.4. For all positive integers t, δ, there exists a positive integer j = j(t, δ) with the
|
789 |
+
following property. Let G ∈ Ct be a graph and let a ∈ G and let T be a smooth tree of maximum
|
790 |
+
degree δ. Let ζ be a rich (T, a)-strip-structure in G. Then for every vertex v ∈ V (T), we have
|
791 |
+
|Jζ,v| < j.
|
792 |
+
Proof. Let j = j(t, δ) =
|
793 |
+
�δ
|
794 |
+
2
|
795 |
+
�R(t, 3) with R(·, ·) as in Theorem 5.3.
|
796 |
+
Then in order to prove
|
797 |
+
|Jζ,v| < j, it is enough to show that |Jζ,(v,e1,e2)| < R(t, 3) for every seagull (v, e1, e2) in T.
|
798 |
+
Suppose for a contradiction that |Jζ,(v,e1,e2)| ≥ R(t, 3) for some seagull (v, e1, e2) in T. Then v is
|
799 |
+
a branch vertex of T. For each i ∈ {1, 2}, let ui be the end of ei different from v. Since G ∈ Ct,
|
800 |
+
it follows from Theorem 5.3 that Jζ,(v,e1,e2) contains a stable set X of cardinality three. For
|
801 |
+
every x ∈ X, since x is a jewel for ζ at (v, e1, e2), it follows that for every i ∈ {1, 2}, there exists
|
802 |
+
a long ζ(ei)-rung Rx
|
803 |
+
i such that Qx
|
804 |
+
i = Rx
|
805 |
+
i \ ζ(ei, v) is a path in ζ(ei) \ ζ(ei, v) from a neighbor
|
806 |
+
of x to a vertex in ζ(ei, ui) \ ζ(ei, v); in particular, Rx
|
807 |
+
i contains a neighbor of x. Therefore, for
|
808 |
+
each i ∈ {1, 2}, we may pick a non-empty set Ri of long ζ(ei)-rungs such that every vertex in X
|
809 |
+
has a neighbor in at least one rung in Ri, and with Ri minimal with respect to inclusion. We
|
810 |
+
deduce:
|
811 |
+
(11) There exists i ∈ {1, 2} with |Ri| > 1.
|
812 |
+
Suppose not. Then for every i ∈ {1, 2}, there exists a long ζ(ei)-rung Si such that every vertex
|
813 |
+
in X has a neighbor in Si. Let si be the end of Si in ζ(ei, v) and s′
|
814 |
+
i be unique neighbor of si in
|
815 |
+
Si. By the second assertion of Theorem 5.1, X is complete to {s′
|
816 |
+
1, s′
|
817 |
+
2}. But now X ∪ {s′
|
818 |
+
1, s′
|
819 |
+
2} is
|
820 |
+
a theta in G with ends s′
|
821 |
+
1, s′
|
822 |
+
2, a contradiction. This proves (11).
|
823 |
+
By (11) and due to symmetry, we may assume that |R1| > 1.
|
824 |
+
This, together with the
|
825 |
+
minimality of R1, implies that there exist distinct vertices x, y ∈ X as well as distinct long
|
826 |
+
ζ(e1)-rungs Rx, Ry ∈ R1 such that x has a neighbor in Rx, y has a neighbor in Ry, x is
|
827 |
+
anticomplete to Ry, and y anticomplete to Rx. Let rx and ry be the ends of Rx and Ry in
|
828 |
+
ζ(e1, v), respectively. Let r′
|
829 |
+
x be the unique neighbor of rx in Rx and r′
|
830 |
+
y be the unique neighbor
|
831 |
+
of ry in Ry; so we have r′
|
832 |
+
x, r′
|
833 |
+
y ∈ ζ(e1) \ ζ(e1, v). By the second assertion of Theorem 5.1, we
|
834 |
+
have NRx∪Ry(x) = {rx, r′
|
835 |
+
x} and NRx∪Ry(y) = {ry, r′
|
836 |
+
y}. It follows that rx, r′
|
837 |
+
x ∈ Rx \ Ry and
|
838 |
+
ry, r′
|
839 |
+
y ∈ Ry \ Rx. Also, rx is anticomplete to Ry \ {ry}, as otherwise (Ry \ {ry}) ∪ {rx} contains
|
840 |
+
a long ζ(e1)-rung R with NR(x) = {rx}, which violates the second assertion of Theorem 5.1.
|
841 |
+
Similarly, ry is anticomplete to Rx \ {rx}.
|
842 |
+
Now, let G1 = G[(B(u1)\ζ(e1, u1))∪((Rx∪Ry)\{rx, ry})] and let G2 = G[(B(u2)\ζ(e2, u2))∪
|
843 |
+
Qx
|
844 |
+
2 ∪ Qy
|
845 |
+
2]. Since ζ is rich, the second bullet in the definition of a rich strip-structure implies that
|
846 |
+
G1 and G2 are connected. Consequently, there exists a path Q1 in G1 from r′
|
847 |
+
x to r′
|
848 |
+
y, and there
|
849 |
+
exists a path Q2 from x to y with Q∗
|
850 |
+
2 ⊆ G2. Also, since v is a branch vertex of T, we may choose
|
851 |
+
an edge e3 ∈ E(T) \ {e1, e2} incident with v. By the first assertion of Theorem 5.1, {x, y} is
|
852 |
+
anticomplete to ζ(e3, v). Let Q3 be a path from rx to ry with Q∗
|
853 |
+
3 ⊆ ζ(e3, v) (thus |Q3| ∈ {2, 3}).
|
854 |
+
But now there is a prism with triangles xrxr′
|
855 |
+
x and yryr′
|
856 |
+
y and paths Q1, Q2, Q3, a contradiction.
|
857 |
+
This completes the proof of Theorem 5.4.
|
858 |
+
■
|
859 |
+
Our last theorem in this section examines the connectivity within G \ ζ+(T) for a (T, a)-
|
860 |
+
strip-structure ζ arising from Theorem 4.2. We need the following lemma, the proof of which is
|
861 |
+
similar to that of Theorem 5.1.
|
862 |
+
Lemma 5.5. Let G be a theta-free graph and let a ∈ G. Let T be a smooth tree and let ζ be a
|
863 |
+
(T, a)-strip-structure in G. Let v, v′ ∈ V (T) be distinct and let P be a path in G \ ζ+(T) with
|
864 |
+
|
865 |
+
16
|
866 |
+
INDUCED SUBGRAPHS AND TREE DECOMPOSITIONS VIII.
|
867 |
+
ends x, x′ such that x ∈ Jζ,v, x′ ∈ Jζ,v′ and P ∗ is anticomplete to ζ+(T). Then v and v′ are
|
868 |
+
adjacent in T.
|
869 |
+
Proof. Suppose not. Note that by Theorem 5.1, x and x′ are distinct. Let Λ be the path in T
|
870 |
+
from v to v′. Then Λ has length more than one, and so there are two distinct edges f, f ′ ∈ E(Λ)
|
871 |
+
such that f is incident with v and f ′ is incident with v′. Let u be the end of f distinct from
|
872 |
+
v and u′ be the end of f ′ distinct from v′. Let (v, e1, e2) and (v′, e′
|
873 |
+
1, e′
|
874 |
+
2) be two seagulls in G
|
875 |
+
such that x ∈ Jζ,(v,e1,e2) and x′ ∈ Jζ,(v′,e′
|
876 |
+
1,e′
|
877 |
+
2). For each i ∈ {1, 2}, let ui be the end of ei distinct
|
878 |
+
from v and let u′
|
879 |
+
i be the end of e′
|
880 |
+
i distinct from v′. Without loss of generality, we may assume
|
881 |
+
that u2, u′
|
882 |
+
2 /∈ Λ. Let T2 be the component of T \ (NT (v) \ {u2}) containing v and let T ′
|
883 |
+
2 be the
|
884 |
+
component of T \(NT (v′)\{u′
|
885 |
+
2}) containing v′. Let T ′ be the component of T \{u′, u′
|
886 |
+
2} containing
|
887 |
+
v′. Since x is a jewel for ζ at (v, e1, e2), it follows that x is not adjacent to a, and x has a neighbor
|
888 |
+
c ∈ ζ(e2) \ ζ(e2, v) ⊆ ζ(T2) \ (B(v) ∪ ζ(u2) ∪ ζ(v)). Therefore, there exists a path Q of length
|
889 |
+
more than one in G from a to x for which we have c ∈ Q∗ ⊆ ζ(T2) \ (B(v) ∪ ζ(u2) ∪ ζ(v)). Also,
|
890 |
+
since x′ is a jewel for ζ at (v′, e′
|
891 |
+
1, e′
|
892 |
+
2), it follows that x′ is not adjacent to a, and x′ has a neighbor
|
893 |
+
b′ ∈ B(v′)\(ζ(f ′, u′)∪ζ(e′
|
894 |
+
2, v′)) and a neighbor c′ ∈ ζ(e′
|
895 |
+
2)\ζ(e′
|
896 |
+
2, v′) ⊆ ζ(T ′
|
897 |
+
2)\(B(v′)∪ζ(u′
|
898 |
+
2)∪ζ(v′)).
|
899 |
+
Therefore, there exist paths P ′, Q′ of length more than one in G from a to x′ for which we have
|
900 |
+
b′ ∈ P ′∗ ⊆ (ζ(T ′) \ ζ(v′)) ∪ (ζ(f ′, v′) \ ζ(f ′, u′)) and c′ ∈ Q′∗ ⊆ ζ(T ′
|
901 |
+
2) \ (B(v′) ∪ ζ(u2) ∪ ζ(v′)).
|
902 |
+
But now there is a theta in G with ends a, x′ and paths a-P ′-x′, a-Q′-x′ and a-Q-x-P-x′, a
|
903 |
+
contradiction. This proves Lemma 5.5.
|
904 |
+
■
|
905 |
+
Theorem 5.6. Let t, δ ≥ 1 be integers and let j(t, δ) be as in Theorem 5.4. Let G ∈ Ct be a
|
906 |
+
graph and let a ∈ G. Let T be a smooth tree of maximum degree δ and let v ∈ V (T). Let ζ
|
907 |
+
be a rich (T, a)-strip-structure in G such that G \ (ζ+(T) ∪ Jζ) is anticomplete to ζ+(T). Let
|
908 |
+
x ∈ G \ (ζ+(T) ∪ Jζ). Then there exists Sx ⊆ G \ (ζ+(T) ∪ {x}) such that |Sx| < 2j(t, δ) and Sx
|
909 |
+
separates x and Jζ \ ({x} ∪ Sx) in G \ ζ+(T). Consequently, Sx separates x and ζ+(T) in G.
|
910 |
+
Proof. By Theorem 5.1, {Jζ,v : v ∈ V (T)} is a partition of Jζ. Let G′ be the graph obtained
|
911 |
+
from G\ζ+(T) by contracting the set Jζ,v into a vertex zv for each v ∈ V (T) with Jζ,v ̸= ∅, and
|
912 |
+
then adding a new vertex z such that NG′(z) = {zv : v ∈ V (T), Jζ,v ̸= ∅}. We claim that there
|
913 |
+
is a set Y ⊆ G′ \ {x, z} of cardinality at most two which separates x and z in G′. Suppose not.
|
914 |
+
By Theorem 2.1, there are three pairwise internally disjoint paths in G′ from x to z. Thus, there
|
915 |
+
exist S ⊆ T with |S| = 3 as well as three paths {Pv : v ∈ S} in G \ ζ+(T) all having x as an end
|
916 |
+
and otherwise disjoint, such that for each v ∈ S, Pv has an end yv ∈ Jζ,v distinct from x, and
|
917 |
+
we have P ∗
|
918 |
+
v ⊆ G\(ζ+(T) ∪ Jζ). As a result, for all distinct v, v′ ∈ S, Pv,v′ = yv-Pv-x-Pv′-yv′ is a
|
919 |
+
path in G\ζ+(T) from yv ∈ Jζ,v to yv′ ∈ Jζ,v′ such that P ∗
|
920 |
+
v,v′ ⊆ G\(ζ+(T)∪Jζ). In particular,
|
921 |
+
P ∗
|
922 |
+
v,v′ is anticomplete to ζ+(T). But then by Lemma 5.5, S is a clique in T, which is impossible.
|
923 |
+
The claim follows.
|
924 |
+
Let Y be as in the above claim. For each y ∈ Y , if y = zv for some v ∈ V (T), then let
|
925 |
+
Ay = Jζ,v. Otherwise, let Ay = {y}. Let Sx = �
|
926 |
+
y∈Y Ay. Then Sx ⊆ G\(ζ+(T)∪{x}) separates
|
927 |
+
x and Jζ \({x}∪Sx) in G\ζ+(T). Also, by Theorem 5.4, we have |Sx| < 2j(t, δ). This completes
|
928 |
+
the proof of Theorem 5.6.
|
929 |
+
■
|
930 |
+
6. Strip structures and connectivity
|
931 |
+
In this section, we investigate the connectivity implications of the presence of certain (T, a)-
|
932 |
+
strip-structures in graphs from Ct. The main result is the following.
|
933 |
+
Theorem 6.1. For all integers t, δ ≥ 1, there exists an integer σ = σ(t, δ) ≥ 1 with the following
|
934 |
+
property. Let G ∈ Ct be a graph and let a ∈ G. Let T be a smooth tree of maximum degree δ and
|
935 |
+
let ζ be a rich (T, a)-strip-structure in G such that G \ (ζ+(T) ∪ Jζ) is anticomplete to ζ+(T).
|
936 |
+
Then for every vertex x ∈ G \ NG[a], there exists a set Sx ⊆ G \ {a, x} with |Sx| < σ such that
|
937 |
+
S separates a and x in G.
|
938 |
+
|
939 |
+
INDUCED SUBGRAPHS AND TREE DECOMPOSITIONS VIII.
|
940 |
+
17
|
941 |
+
Proof. Let j(t, δ) be as in Theorem 5.4. We claim that
|
942 |
+
σ = σ(t, δ) = 2δ(j(t, δ) + t)
|
943 |
+
satisfies Theorem 6.1. For every vertex v ∈ V (T), we define Cv = B(v) if v is a leaf of T and
|
944 |
+
Cv = ∅ otherwise. Also, for every vertex v ∈ V (T), let Kv be a maximal clique of G contained
|
945 |
+
in B(v). Thus, we have |Kv| < t. Moreover, Lemma 5.2 along with the assumption that ζ is
|
946 |
+
rich implies if v is a leaf of T, then we have Kv = B(v) = Cv (and so |Kv| = 1), and if v is a
|
947 |
+
branch vertex of T, then Kv contains all but possibly one of the sets η(f, v) for f ∈ E(T). For
|
948 |
+
every S ⊆ T, we define
|
949 |
+
MS =
|
950 |
+
�
|
951 |
+
w∈NT (S)
|
952 |
+
Jη,w,
|
953 |
+
NS =
|
954 |
+
�
|
955 |
+
w∈NT (S)
|
956 |
+
Kw.
|
957 |
+
Also, we write Mv for M{v} and Nv for N{v}. For every v ∈ V (T), let Ov = Mv ∪ Nv. The
|
958 |
+
following is immediate from Theorems 5.1 and 5.4 and Lemma 5.5.
|
959 |
+
(12) For every v ∈ V (T), we have
|
960 |
+
• Ov ⊆ G \ (Jζ,v ∪ {a});
|
961 |
+
• |Ov| < δ(j(t, δ) + t) ≤ σ, and;
|
962 |
+
• Ov separates a and Jζ,v in G.
|
963 |
+
Now, for every x ∈ G \ NG[a], we define Sx as follows. First, assume that x ∈ ζ(T) \ NG[a].
|
964 |
+
Then either x ∈ ζ(e) for some edge e = uv ∈ E(T), or x ∈ ζ(v) for some branch vertex v ∈ V (T).
|
965 |
+
In the former case, let
|
966 |
+
Ex = Mu ∪ Mv,
|
967 |
+
Ix = N{u,v} ∪ Cu ∪ Cv.
|
968 |
+
In the latter case, let
|
969 |
+
Ex = Mv ∪ Jζ,v
|
970 |
+
Ix = Nv.
|
971 |
+
Let Sx = Ex ∪ Ix.
|
972 |
+
Observe that since x ∈ G \ NG[a], we have Sx ⊆ G \ {a, x}.
|
973 |
+
Also, by
|
974 |
+
Theorem 5.4, we have |Ex| ≤ 2δj(t, δ) and so |Sx| < 2δ(j(t, δ) + t) = σ.
|
975 |
+
Moreover, from
|
976 |
+
Theorem 5.1 and the fact that ζ is rich, it is easy to check that for every path P in G from a
|
977 |
+
to x, if P ⊆ ζ+(T), then P contains a vertex from Ix, and otherwise P contains a vertex from
|
978 |
+
either Ix or Ex. Therefore, Sx separates a and x in G.
|
979 |
+
Next, assume that x ∈ Jζ. Then by Theorem 5.1, there exists a unique vertex v ∈ V (T) such
|
980 |
+
that x ∈ Jζ,v. Let Sx = Ov. Then by (12), we have Sx ⊆ G \ {a, x}, |Sx| < σ and Sx separates
|
981 |
+
a and x in G.
|
982 |
+
Finally, assume that x ∈ G\(ζ+(T)∪Jζ). Then letting Sx to be as in Theorem 5.6, it follows
|
983 |
+
from Theorem 5.6 that Sx ⊆ G \ {a, x}, |X| < 2j(t, δ) ≤ σ and Sx separates a and x in G. This
|
984 |
+
completes the proof of Theorem 6.1.
|
985 |
+
■
|
986 |
+
Our application of Theorem 6.1 though is confined to the case where T is a caterpillar. More
|
987 |
+
precisely, for a graph G and a vertex a ∈ G, an induced subgraph H ⊆ G \ {a} is said to be an
|
988 |
+
a-seed in G if the following hold.
|
989 |
+
• There exists a caterpillar C such that H is the line graph of a 1-subdivision of C and
|
990 |
+
NG(a) = Z(H).
|
991 |
+
• The vertex a is trapped in H ∪ {a}.
|
992 |
+
It follows that Z(H) is the set of all degree-one vertices of H. We now combine Theorems 4.2
|
993 |
+
and 6.1 to deduce the following.
|
994 |
+
|
995 |
+
18
|
996 |
+
INDUCED SUBGRAPHS AND TREE DECOMPOSITIONS VIII.
|
997 |
+
Theorem 6.2. For every integer t ≥ 1, there exists an integer s = s(t) ≥ 1 with the following
|
998 |
+
property. Let G ∈ Ct be a graph and a ∈ G. Assume that there is an a-seed in G. Then for
|
999 |
+
every vertex x ∈ G \ NG[a], there exists Sx ⊆ G \ {a, x} with |Sx| < s such that Sx separates a
|
1000 |
+
and x in G.
|
1001 |
+
Proof. Let σ(·, ·) be as in Theorem 6.1. We show that s = s(t) = σ(t, 3) satisfies Theorem 6.2.
|
1002 |
+
Pick an a-seed H in G. Let T be the unique smooth caterpillar with |NG(a)| leaves. Then T has
|
1003 |
+
maximum degree three. Also, one may immediately observe that there is a tame, substantial
|
1004 |
+
and rich (T, a)-strip-structure η in G with η(T) = H. Now we can apply Theorem 4.2 to G, a
|
1005 |
+
and T, deducing that there exists a substantial and rich (T, a)-strip-structure ζ in G such that
|
1006 |
+
G \ (ζ+(T) ∪ Jζ) is anticomplete to ζ+(T). Hence, by Theorem 6.1 applied to G, a, T and ζ,
|
1007 |
+
for every vertex x ∈ G \ NG[a], there exists Sx ⊆ G \ {a, x} with |Sx| < s such that Sx separates
|
1008 |
+
a and x in G. This completes the proof of Theorem 6.2.
|
1009 |
+
■
|
1010 |
+
7. From blocks to trees
|
1011 |
+
In this section, we prove Theorem 1.8. We begin with a result which captures the use of
|
1012 |
+
Theorem 6.2 in the proof of Theorem 1.8. For a positive integer n, we write [n] = {1, . . . , n}.
|
1013 |
+
Theorem 7.1. For all integers ν, t ≥ 1, there exists an integer ψ = ψ(t, ν) ≥ 1 with the
|
1014 |
+
following property. Let G ∈ Ct, let a, b ∈ G be distinct and non-adjacent and let {Pi : i ∈ [ψ]}
|
1015 |
+
be a collection of ψ pairwise internally disjoint paths in G from a to b. For each i ∈ [ψ], let
|
1016 |
+
ai be the neighbor of a in Pi (so ai ̸= b). Then there exists I ⊆ [ψ] with |I| = ν for which the
|
1017 |
+
following holds.
|
1018 |
+
• {ai : i ∈ I} ∪ {b} is a stable set in G.
|
1019 |
+
• For all i, j ∈ I with i < j, ai has a neighbor in P ∗
|
1020 |
+
j \ {aj}.
|
1021 |
+
Proof. Let s = s(t) be as in Theorem 6.2 and let µ = µ(max{2s + 1, t}), where µ(·) is as in
|
1022 |
+
Theorem 2.5. Let R(·, ·) be as in Theorem 5.3. For every integer p ≥ 1, let Rtourn(p) be the
|
1023 |
+
smallest positive integer n such that every tournament on at least n vertices contains a transitive
|
1024 |
+
tournament on p vertices; the existence of Rtourn(p) follows easily from Theorem 5.3 (in fact,
|
1025 |
+
one may observe that Rtourn(p) ≤ R(p, p)). Let γ = R(Rtourn(ν + 1), µ). We prove that
|
1026 |
+
ψ = ψ(t, ν) = R(γ, t)
|
1027 |
+
satisfies Theorem 7.1. Let P1, . . . , Pψ be ψ pairwise internally disjoint paths in G from a to
|
1028 |
+
b. Since G is Kt-free, it follows from Theorem 5.3 and the definition of ψ that there exists a
|
1029 |
+
stable set N ⊆ {ai : i ∈ [ψ]} in G with |N| = γ; we may assume without loss of generality that
|
1030 |
+
N = {ai : i ∈ [γ]}.
|
1031 |
+
Let D be a directed graph with V (D) = N such that for distinct i, j ∈ [γ], there is an arc
|
1032 |
+
from ai to aj in D if and only if xi has a neighbor in P ∗
|
1033 |
+
j \ {aj}. Note that D may contain both
|
1034 |
+
arcs (ai, aj) and (aj, ai), and so the undirected underlying graph of D might not be simple. Let
|
1035 |
+
D− be the simple graph obtained from the undirected underlying graph of D by removing one
|
1036 |
+
of every two parallel edges.
|
1037 |
+
(13) D− contains no stable set of cardinality µ.
|
1038 |
+
Suppose for a contradiction that D− contains a stable set S of cardinality µ. We may assume
|
1039 |
+
without loss of generality that S = {a1, . . . , aµ}.
|
1040 |
+
Let G1 = G[(�µ
|
1041 |
+
j=1 Pj) \ {a}].
|
1042 |
+
Note that
|
1043 |
+
by the definition of D, for every i ∈ [µ], we have NG1(ai) = NPi(ai) \ {a}, and in particular
|
1044 |
+
|NG1(ai)| = 1. Since G1 is connected and Kt-free, and since and |S| = µ = µ(max{2s + 1, t}),
|
1045 |
+
we can apply Theorem 2.5 to G1 and S. Note that every vertex in S has a unique neighbor in
|
1046 |
+
G1, and so no path in G1 contains max{2s + 1, t} ≥ 3 vertices from S. Consequently, there is
|
1047 |
+
an induced subgraph H1 of G1 with |H1 ∩ S| = 2s + 1 for which one of the following holds.
|
1048 |
+
• H1 is either a caterpillar or the line graph of a caterpillar with H1 ∩ S = Z(H1).
|
1049 |
+
• H1 is a subdivided star with root r1 such that Z(H1) ⊆ H1 ∩ S ⊆ Z(H1) ∪ {r1}.
|
1050 |
+
|
1051 |
+
INDUCED SUBGRAPHS AND TREE DECOMPOSITIONS VIII.
|
1052 |
+
19
|
1053 |
+
If H1 is a caterpillar, then G[H1∪{a}] contains a theta with ends a and a′ for every vertex a′ ∈ H1
|
1054 |
+
of degree more than two, a contradiction. Also, if the second bullet above holds, then since every
|
1055 |
+
vertex in S is of degree one in G1, we have H1 ∩ S = Z(H1), and so r1 is not adjacent to a. But
|
1056 |
+
then G[H1 ∪ {a}] contains a theta with ends x and r1, a contradiction. It follows that H1 is the
|
1057 |
+
line graph of a caterpillar with |H1 ∩ S| = 2s + 1 and H1 ∩ S = Z(H1). This, together with the
|
1058 |
+
fact that every vertex in H1 ∩ S ⊆ S has a unique neighbor in H1 ⊆ G, implies that H1 contains
|
1059 |
+
the line graph H2 of a 1-subdivision of a caterpillar with |H2 ∩ S| = s and H2 ∩ S = Z(H2).
|
1060 |
+
Let S2 = H2 ∩ S = Z(H2); then S2 is the set of all vertices of degree one in H2, and we may
|
1061 |
+
assume without loss of generality that S2 = {a1, . . . , as}. Let G2 = G[H2 ∪(�s
|
1062 |
+
j=1 Pj)]. It follows
|
1063 |
+
that G2 ∈ Ct, NG2(a) = S2 = Z(H2) and a is trapped in H2 ∪ {a}. Therefore, H2 is an a-seed
|
1064 |
+
in G2. Since b ∈ G2 \ NG2[a], applying Theorem 6.2 to G2 and a, we deduce that there exists
|
1065 |
+
Sb ⊆ G2 \{a, b} such that |Sb| < s and Sb separates a and b in G2. But P1, . . . , Ps are s pairwise
|
1066 |
+
internally disjoint paths in G2 from a to b, a contradiction with Theorem 2.1. This proves (13).
|
1067 |
+
By (13), Theorem 5.3 and the definition γ, D− contains a clique of cardinality Rtourn(ν + 1).
|
1068 |
+
This, along with the definition of Rtourn(·), implies that D contains (as a subdigraph) a transitive
|
1069 |
+
tournament K on ν + 1 vertices.
|
1070 |
+
We may assume without loss of generality that V (K) =
|
1071 |
+
{a1, . . . , aν+1} such that for distinct i, j ∈ [ν + 1], (ai, aj) is an arc in K if i < j. From the
|
1072 |
+
definition of D, it follows that {a2, . . . , aν+1, b} is a stable set in G, and for all i, j ∈ {2, . . . , ν+1}
|
1073 |
+
with i < j, ai has a neighbor in P ∗
|
1074 |
+
j \{aj}. Hence, I = {2, . . . , ν + 1} satisfies Theorem 7.1. This
|
1075 |
+
completes the proof.
|
1076 |
+
■
|
1077 |
+
For positive integers d and r, let T r
|
1078 |
+
d denote the rooted tree in which every leaf is at distance
|
1079 |
+
r from the root, the root has degree d, and every vertex that is neither a leaf nor the root has
|
1080 |
+
degree d + 1. We need a result from [15]:
|
1081 |
+
Theorem 7.2 (Kierstead and Penrice [15]). For all integers d, r, s, t ≥ 1, there exists an integer
|
1082 |
+
f = f(d, r, s, t) ≥ 1 such that if G contains T f
|
1083 |
+
f as a subgraph, then G contains one of Ks,s, Kt
|
1084 |
+
and T r
|
1085 |
+
d as an induced subgraph.
|
1086 |
+
The following lemma is the penultimate step in the proof of Theorem 1.8.
|
1087 |
+
Lemma 7.3. For all integers d, r, t ≥ 1, there exists an integer m = m(d, r, t) with the following
|
1088 |
+
property. Let G ∈ Ct be a graph, let a, b ∈ G be non-adjacent and let {Pi : i ∈ [m]} be a collection
|
1089 |
+
of m pairwise internally disjoint paths in G from a to b. Then G[�m
|
1090 |
+
j=1 Pj] contains a subgraph
|
1091 |
+
J isomorphic to T r
|
1092 |
+
d such that a ∈ J and a has degree d in J (that is, a is the root of J), and we
|
1093 |
+
have b /∈ J.
|
1094 |
+
Proof. Let d, t ≥ 1 be fixed. Let m1 = d. For every integer r > 1, let mr = ψ(t, (mr−1 + 1)d)
|
1095 |
+
where ψ(·, ·) is as in Theorem 7.1. We prove by induction on r ≥ 1 that m(d, r, t) = mr satisfies
|
1096 |
+
Lemma 7.3. Let P1, . . . , Pmr be mr pairwise internally disjoint paths in G from a to b. Since a
|
1097 |
+
and b are not adjacent, it follows that for each i ∈ [mr], we have P ∗
|
1098 |
+
i ̸= ∅; let ai be the neighbor
|
1099 |
+
of a in Pi. In particular, we have b /∈ {ai : i ∈ [mr]}. Suppose first that r = 1. Then we have
|
1100 |
+
|{ai : i ∈ [m1]}| = m1 = d, and so G[{ai : i ∈ [mr]} ∪ {a}] contains a (spanning) subgraph
|
1101 |
+
J isomorphic to T 1
|
1102 |
+
d such that a ∈ J and a has degree d in J, and we have b /∈ J, as desired.
|
1103 |
+
Therefore, we may assume that r ≥ 2. Since mr = ψ(t, (mr−1 + 1)d), we can apply Theorem 7.1
|
1104 |
+
to a, b and {Pi : i ∈ [mr]}, obtaining I ⊆ [mr] with |I| = (mr−1 + 1)d which satisfies the two
|
1105 |
+
outcomes of Theorem 7.1. Without loss of generality, we may assume that I = [(mr−1 + 1)d].
|
1106 |
+
It follows that {a1, · · · , a(mr−1+1)d, b} is a stable set in G, and for all i, j ∈ [(mr−1 + 1)d] with
|
1107 |
+
i < j, ai has a neighbor in P ∗
|
1108 |
+
j \ {aj}. For every i ∈ [d], let a′
|
1109 |
+
i = a(i−1)mr−1+i and let
|
1110 |
+
Ai = {(i − 1)mr−1 + i + 1, . . . , (i − 1)mr−1 + i + mr−1}.
|
1111 |
+
In particular, we have |Ai| = mr−1. Then for each i ∈ [d] and each j ∈ Ai, a′
|
1112 |
+
i has a neighbor in
|
1113 |
+
P ∗
|
1114 |
+
j \ {aj}, and so there exists a path Qj in G from a′
|
1115 |
+
i to b with Q∗
|
1116 |
+
j ⊆ P ∗
|
1117 |
+
j . Now, for every i ∈ [d],
|
1118 |
+
a′
|
1119 |
+
i and b are non-adjacent, and {Qj : j ∈ Ai} is a collection of mr−1 pairwise internally disjoint
|
1120 |
+
|
1121 |
+
20
|
1122 |
+
INDUCED SUBGRAPHS AND TREE DECOMPOSITIONS VIII.
|
1123 |
+
paths in G from a′
|
1124 |
+
i to b. It follows from the induction hypothesis that G[�
|
1125 |
+
j∈Ai Qj] contains a
|
1126 |
+
subgraph Ji isomorphic to T r−1
|
1127 |
+
d
|
1128 |
+
such that a′
|
1129 |
+
i ∈ Ji and a′
|
1130 |
+
i has degree d in Ji, and we have b /∈ Ji.
|
1131 |
+
But now G[(�d
|
1132 |
+
i=1 V (Ji)) ∪ {a}] ⊆ G[�mr
|
1133 |
+
j=1 Pj] contains a (spanning) subgraph J isomorphic to
|
1134 |
+
T r
|
1135 |
+
d such that a ∈ J and a has degree d in J, and we have b /∈ J. This completes the proof of
|
1136 |
+
Lemma 7.3.
|
1137 |
+
■
|
1138 |
+
Finally, we prove Theorem 1.8, which we restate:
|
1139 |
+
Theorem 1.8. For every tree F and every integer t ≥ 1, there exists an integer τ(F, t) ≥ 1
|
1140 |
+
such that every graph in Ct(F) has treewidth at most τ(F, t).
|
1141 |
+
Proof. Let d and r be the maximum degree and the radius of F, respectively. It follows that
|
1142 |
+
T r
|
1143 |
+
d contains F as an induced subgraph.
|
1144 |
+
Let f = f(d, r, 3, t) be as in Theorem 7.2 and let
|
1145 |
+
m = m(f, f, t) be as in Lemma 7.3. Let β(·, ·) be as in Corollary 2.4. We claim that τ(F, t) =
|
1146 |
+
β(max{m, t + 1}, t) satisfies Theorem 1.8. Suppose for a contradiction that tw(G) > τ for some
|
1147 |
+
G ∈ Ct(F). By Corollary 2.4, G contains a max{m, t + 1}-block B. Consequently, since G is
|
1148 |
+
Kt-free, there are two distinct and non-adjacent vertices a, b ∈ B, and m pairwise internally
|
1149 |
+
disjoint paths P1, . . . , Pm in G from a to b. It follows from Lemma 7.3 that G contains T f
|
1150 |
+
f as a
|
1151 |
+
subgraph. Also, since G ∈ Ct(F) ⊆ Ct, G is (K3,3, Kt)-free. But now by Theorem 7.2, G contains
|
1152 |
+
T r
|
1153 |
+
d , and so F, as an induced subgraph, a contradiction. This completes the proof.
|
1154 |
+
■
|
1155 |
+
References
|
1156 |
+
[1] P. Aboulker, I. Adler, E. J. Kim, N. L. D. Sintiari, and N. Trotignon. “On the treewidth of even-hole-free
|
1157 |
+
graphs.” European Journal of Combinatorics 98, (2021), 103394.
|
1158 |
+
[2] T. Abrishami, B. Alecu, M. Chudnovsky, S. Hajebi, and S. Spirkl, “Induced subgraphs and tree decomposi-
|
1159 |
+
tions VII. Basic obstructions in H-free graphs.” arXiv:2212.02737, (2022).
|
1160 |
+
[3] T. Abrishami, M. Chudnovsky, C. Dibek, S. Hajebi, P. Rzążewski, S. Spirkl, and K. Vušković, “Induced
|
1161 |
+
subgraphs and tree decompositions II. Toward walls and their line graphs in graphs of bounded degree.”
|
1162 |
+
arXiv:2108.01162, (2021).
|
1163 |
+
[4] T. Abrishami, M. Chudnovsky and K. Vušković, “Induced subgraphs and tree decompositions I. Even-hole-
|
1164 |
+
free graphs of bounded degree.” J. Combin. Theory Ser. B, 157 (2022), 144-175.
|
1165 |
+
[5] M. Ajtai, J. Komlós and E. Szemerédi. “A note on Ramsey numbers.” J. Combinatorial Theory, Ser. A 29
|
1166 |
+
(1980), 354–360.
|
1167 |
+
[6] H. L. Bodlaender. “Dynamic programming on graphs with bounded treewidth.” Springer, Berlin, Heidelberg,
|
1168 |
+
(1988), pp. 105–118.
|
1169 |
+
[7] K. Cameron, M.V. da Silva, S. Huang, and K. Vušković, “Structure and algorithms for (cap, even hole)-free
|
1170 |
+
graphs.” Discrete Mathematics 341, 2 (2018), 463-473.
|
1171 |
+
[8] M. Chudnovsky, N. Robertson, P. Seymour, and R. Thomas, “The strong perfect graph theorem.” Annals of
|
1172 |
+
Math 164 (2006), 51-229.
|
1173 |
+
[9] M. Chudnovsky and P. Seymour, “Even-hole-free graphs still have bisimplicial vertices.” arXiv:1909.10967,
|
1174 |
+
(2019).
|
1175 |
+
[10] M. Chudnovsky and P. Seymour, “The three-in-a-tree problem.” Combinatorica 30, 4 (2010): 387-417.
|
1176 |
+
[11] J. Davies, “Vertex-minor-closed classes are χ-bounded.” arXiv:2008.05069, (2020).
|
1177 |
+
[12] J. Davies, appeared in an Oberwolfach technical report DOI:10.4171/OWR/2022/1.
|
1178 |
+
[13] J. Erde and D. Weißauer. “A short derivation of the structure theorem for graphs with excluded topological
|
1179 |
+
minors.” SIAM Journal of Discrete Mathematics 33, 3 (2019), 1654–1661.
|
1180 |
+
[14] M. Grohe and D. Marx. “Structure theorem and isomorphism test for graphs with excluded topological
|
1181 |
+
subgraphs,” SIAM Journal on Computing 44, 1 (2015), 114–159.
|
1182 |
+
[15] H.A. Kierstead and S. G. Penrice, “Radius two trees specify χ-bounded classes.” J. Graph Theory 18, 2
|
1183 |
+
(1994): 119–129.
|
1184 |
+
[16] T. Korhonen, “Grid Induced Minor Theorem for Graphs of Small degree.” arXiv:2203.13233, (2022).
|
1185 |
+
[17] V. Lozin and I. Razgon. “Tree-width dichotomy.” European J. Combinatorics 103 (2022): 103517.
|
1186 |
+
[18] K. Menger, “Zur allgemeinen Kurventheorie.” Fund. Math. 10, 1927, 96–115.
|
1187 |
+
[19] N. Robertson and P. Seymour. “Graph minors. V. Excluding a planar graph.” J. Combin. Theory Ser. B, 41
|
1188 |
+
(1) (1996), 92–114.
|
1189 |
+
[20] N.L.D. Sintiari and N. Trotignon. “(Theta, triangle)-free and (even-hole, K4)-free graphs. Part 1: Layered
|
1190 |
+
wheels.” J. Graph Theory 97 (4) (2021), 475-509.
|
1191 |
+
[21] N. Trotignon, private communication, 2021.
|
1192 |
+
|
19A0T4oBgHgl3EQfMv_l/content/tmp_files/load_file.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
1tA0T4oBgHgl3EQfMv-f/content/tmp_files/2301.02137v1.pdf.txt
ADDED
@@ -0,0 +1,2100 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
arXiv:2301.02137v1 [nucl-th] 5 Jan 2023
|
2 |
+
Reduced nuclear helicity amplitudes for deuteron
|
3 |
+
electrodisintegration and other processes
|
4 |
+
J. Flores and S. S. Chabysheva
|
5 |
+
Department of Physics, University of Idaho, Moscow ID 83844 USA
|
6 |
+
J. R. Hiller
|
7 |
+
Department of Physics, University of Idaho, Moscow ID 83844 USA and
|
8 |
+
Department of Physics and Astronomy,
|
9 |
+
University of Minnesota-Duluth, Duluth, Minnesota 55812 USA
|
10 |
+
(Dated: January 6, 2023)
|
11 |
+
1
|
12 |
+
|
13 |
+
Abstract
|
14 |
+
We extend the original idea of reduced nuclear amplitudes to capture individual helicity ampli-
|
15 |
+
tudes and discuss various applications to exclusive processes involving the deuteron. Specifically,
|
16 |
+
we consider deuteron form factors, structure functions, tensor polarization observables, photodisin-
|
17 |
+
tegration, and electrodisintegration. The basic premise is that nuclear processes at high momentum
|
18 |
+
transfer can be approximated by tree graphs for point-like nucleons supplemented by empirical form
|
19 |
+
factors for each nucleon. The latter represent the internal structure of the nucleon, and incorporate
|
20 |
+
nonperturbative physics, which can allow for early onset of scaling behavior. The nucleon form
|
21 |
+
factors are evaluated at the net momentum transfer experienced by the given nucleon, with use of
|
22 |
+
GE for a no-flip contribution and GM for a helicity-flip contribution. Results are compared with
|
23 |
+
data where available. The deuteron photodisintegration asymmetry Σ is obtained with a value of
|
24 |
+
Σ(90◦) ≃ −0.06, which is much closer to experiment than the value of -1 originally expected. The
|
25 |
+
method also provides an estimate of the momentum transfer values required for scaling onset. We
|
26 |
+
find that the deuteron structure function B is a good place to look, above momentum transfers of
|
27 |
+
10 GeV2.
|
28 |
+
I.
|
29 |
+
INTRODUCTION
|
30 |
+
With the advent of the upgraded electron accelerator at the Thomas Jefferson National
|
31 |
+
Accelerator Facility, scattering experiments with polarized beams and targets at high energy
|
32 |
+
and high momentum transfer become possible. In the regime of high momentum transfer to
|
33 |
+
all relevant nucleons, quantum chromodynamics (QCD) implies that the internal structure of
|
34 |
+
every nucleon is important. Until ab initio QCD (lattice) calculations for nuclear scattering
|
35 |
+
processes are available for more than very simple processes, one is led to consider models
|
36 |
+
that can represent the basic physics.
|
37 |
+
One such approach is the reduced nuclear amplitude (RNA) analysis pioneered by Brod-
|
38 |
+
sky and Chertok [1]. In addition to their application to a generic deuteron form factor,
|
39 |
+
the approach has been applied to deuteron disintegration [2], pion photoproduction [3], and
|
40 |
+
photodisintegration of 3He [4]. As originally developed, a nuclear process was modeled as
|
41 |
+
a tree-level amplitude multiplied by a generic form factor for each nucleon, with each form
|
42 |
+
factor evaluated at the net momentum transferred to that nucleon. In order to model the
|
43 |
+
behavior of polarization observables [5–15], we extend this approach to a reduced nuclear
|
44 |
+
helicity amplitude (RNHA) method to combine a tree-level helicity amplitude for point-like
|
45 |
+
nucleons with the appropriate form factor for each nucleon. When the nucleon does (not)
|
46 |
+
flip its helicity, we use the electric (magnetic) form factor GEN (GMN). As a check on the
|
47 |
+
procedure, virtual photon absorption by a single nucleon in the RNHA approach is consistent
|
48 |
+
with the definitions of GEN and GMN.
|
49 |
+
A caveat in applications of the RNA approach is that the normalization is not determined
|
50 |
+
by the model and is fixed to data at infinite momentum transfer by the coefficient of the
|
51 |
+
leading power-law behavior. This means that the normalization cannot be determined in
|
52 |
+
practice; fitting to a data point at some intermediate kinematics will give the wrong nor-
|
53 |
+
malization and the wrong magnitude at higher momentum transfer. Instead, ratios need to
|
54 |
+
be considered, so that the normalization becomes irrelevant.
|
55 |
+
The primary criterion for the asymptotic region is in the momentum transfer to each
|
56 |
+
nucleon. For every nucleon in the process, the momentum transfer must be above some
|
57 |
+
common threshold, which is at least 1 GeV2. For example, for deuteron photodisintegration,
|
58 |
+
2
|
59 |
+
|
60 |
+
the momentum transfer to a nucleon is −tN = −(pN − p/2)2, where pN is the final four-
|
61 |
+
momentum of the nucleon and p is the initial deuteron momentum. When expressed in
|
62 |
+
terms of the photon energy Eγ and the final nucleon angle θ, the constraint to be above 1
|
63 |
+
GeV2 becomes [16]
|
64 |
+
mNEγ
|
65 |
+
�
|
66 |
+
1 −
|
67 |
+
�
|
68 |
+
Eγ
|
69 |
+
mN + Eγ
|
70 |
+
| cos θ|
|
71 |
+
�
|
72 |
+
≥ 1 GeV2.
|
73 |
+
(1.1)
|
74 |
+
This relationship is illustrated in Fig. 1.
|
75 |
+
Notice that away from 90◦, the lower limit is
|
76 |
+
quite high. For electrodisintegration, only the most recent data [17, 18] begins to reach this
|
77 |
+
θ (deg)
|
78 |
+
0
|
79 |
+
20
|
80 |
+
40
|
81 |
+
60
|
82 |
+
80
|
83 |
+
100
|
84 |
+
120
|
85 |
+
140
|
86 |
+
160
|
87 |
+
180
|
88 |
+
Eγ (GeV)
|
89 |
+
0
|
90 |
+
2
|
91 |
+
4
|
92 |
+
6
|
93 |
+
8
|
94 |
+
10
|
95 |
+
FIG. 1. Angular dependence of the scale for large momentum transfer in deuteron photodisinte-
|
96 |
+
gration.
|
97 |
+
threshold.
|
98 |
+
Here we will focus on deuteron processes, including photodisintegration and electrodisin-
|
99 |
+
tegration. For recent reviews of deuteron studies at high momentum transfer, see [16, 19, 20].
|
100 |
+
Elastic electron scattering data at high momentum transfer is presented in [21–25]. Recent
|
101 |
+
photodisintegration data can be found in [26–29], and for electrodisintegration data, in
|
102 |
+
[17, 18, 30–33]. Other analyses of deuteron processes include hidden-color contributions to
|
103 |
+
deuteron form factors [34], the hard rescattering mechanism [35], quark-gluon strings [36],
|
104 |
+
the Moscow NN potential [37], and AdS/QCD models [38, 39].
|
105 |
+
One recent experiment [17] used the 10.6 GeV electron beam at JLab and the Hall
|
106 |
+
C spectrometers to measure electron scattering from a liquid deuterium target. The final
|
107 |
+
electron and the proton were detected, with the kinematics restricted to the exclusive process
|
108 |
+
ed → e′pn. One spectrometer measured the final electron at a nominal 12.2◦ degrees from
|
109 |
+
the beam direction, with a momentum of 8.5-9.1 GeV such that the recorded events had a
|
110 |
+
distribution of momentum transfer squared reaching 5 GeV2. The events studied were taken
|
111 |
+
from a bin of 4.5±0.5 GeV2 in the tail of the distribution; however, the nominal transfer
|
112 |
+
was 4.2 GeV2, because the majority of the events were in the lower half of the bin.
|
113 |
+
A second spectrometer measured the proton momentum at a range of angles to the
|
114 |
+
beam direction, tuned to select events where the (missing) neutron had an angle relative to
|
115 |
+
the direction of the momentum transfer that fell within a chosen bin. In the one-photon
|
116 |
+
exchange approximation, which we assume, the momentum transferred is, of course, the
|
117 |
+
photon momentum. The published neutron angles are binned at 35◦, 45◦ and 75◦, with the
|
118 |
+
first two selected to minimize final-state interactions. For our purposes, the importance of
|
119 |
+
3
|
120 |
+
|
121 |
+
these two angles is that the momentum transferred to the neutron reaches 1 GeV in a zero-
|
122 |
+
binding approximation, so that, rather than focus on the internal structure of the deuteron,
|
123 |
+
we can consider the response to a large momentum transfer to all the nucleons involved and
|
124 |
+
we can see that experiments may be approaching the threshold where our model can be
|
125 |
+
applied.
|
126 |
+
The RNHA model is constructed in detail in Sec. II for two-nucleon processes. In the
|
127 |
+
remainder of the paper, we consider various processes for the deuteron. In Sec. III, the
|
128 |
+
form factors,1 structure functions, and tensor polarization observables of elastic electron
|
129 |
+
scattering from the deuteron are obtained. Photodisintegration and electrodisintegration
|
130 |
+
are analyzed in Secs. IV and V. Within the zero-binding approximation, elastic scattering
|
131 |
+
and photodisintegration live at edges of the kinematic range of electrodisintegration and
|
132 |
+
are essentially special cases that provide introductory examples.
|
133 |
+
Section VI contains a
|
134 |
+
summary of the results and suggestions for additional applications. Many details of the
|
135 |
+
electrodisintegration helicity amplitudes are left to an appendix.
|
136 |
+
II.
|
137 |
+
CONSTRUCTION OF THE MODEL
|
138 |
+
The basic process for a two-nucleon system to absorb a photon and exchange momentum
|
139 |
+
between the nucleons is illustrated in Fig. 2. These diagrams are modeled on the primitive
|
140 |
+
process of γ∗ff → ff, with f representing a point-like nucleon.2 The structure of each
|
141 |
+
nucleon is then introduced by combining the Feynman amplitude for each diagram with the
|
142 |
+
appropriate form factor for each nucleon, evaluated at the net momentum transfer for that
|
143 |
+
nucleon. For a deuteron process in the zero-binding limit, the initial nucleons share the
|
144 |
+
initial deuteron momentum p equally, so that pp = pn = p/2. We also neglect the nucleon
|
145 |
+
mass difference, setting mp = mn ≡ m. The distinction between different photon-absorption
|
146 |
+
processes is then in the nature of the photon, being either real or virtual, and in the outcome
|
147 |
+
for the final nucleons, bound as a deuteron or not.
|
148 |
+
The tree-level amplitudes for the four diagrams in Fig. 2 are
|
149 |
+
Mν
|
150 |
+
a (λ′
|
151 |
+
p, λ′
|
152 |
+
n, λp, λn) = Aµν
|
153 |
+
p (p/2 + q; λ′
|
154 |
+
p, λp)
|
155 |
+
1
|
156 |
+
(p′
|
157 |
+
n − p/2)2Bnµ(λ′
|
158 |
+
n, λn),
|
159 |
+
(2.1)
|
160 |
+
Mν
|
161 |
+
b (λ′
|
162 |
+
p, λ′
|
163 |
+
n, λp, λn) = Aνµ
|
164 |
+
p (p′
|
165 |
+
p − q; λ′
|
166 |
+
p, λp)
|
167 |
+
1
|
168 |
+
(p′n − p/2)2Bnµ(λ′
|
169 |
+
n, λn),
|
170 |
+
(2.2)
|
171 |
+
Mν
|
172 |
+
c (λ′
|
173 |
+
p, λ′
|
174 |
+
n, λp, λn) = Aµν
|
175 |
+
n (p/2 + q; λ′
|
176 |
+
n, λn)
|
177 |
+
1
|
178 |
+
(p′p − p/2)2Bpµ(λ′
|
179 |
+
p, λp),
|
180 |
+
(2.3)
|
181 |
+
Mν
|
182 |
+
d (λ′
|
183 |
+
p, λ′
|
184 |
+
n, λp, λn) = Aνµ
|
185 |
+
n (p′
|
186 |
+
n − q; λ′
|
187 |
+
n, λn)
|
188 |
+
1
|
189 |
+
(p′
|
190 |
+
p − p/2)2Bpµ(λ′
|
191 |
+
p, λp),
|
192 |
+
(2.4)
|
193 |
+
where
|
194 |
+
Aµν
|
195 |
+
N (p; λ′
|
196 |
+
N, λN) = ¯u′
|
197 |
+
Nγµ ̸p + m
|
198 |
+
p2 − m2γνuN, Bµ
|
199 |
+
N(λ′
|
200 |
+
N, λN) = ¯u′
|
201 |
+
NγµuN,
|
202 |
+
(2.5)
|
203 |
+
with uN (¯u′
|
204 |
+
N) the initial (final) spinor for the nucleon N with helicity λN (λ′
|
205 |
+
N). The sub-
|
206 |
+
amplitude AN represents the fermion line that absorbs the photon, and BN represents the
|
207 |
+
1 For discussion specifically in terms of perturbative QCD, see [34].
|
208 |
+
2 In [2], the primitive process was γ∗q¯q → q¯q, with q corresponding to a point-like proton and ¯q to a point-
|
209 |
+
like neutron, and direct interaction of the photon with the neutron was neglected. Here we amend and
|
210 |
+
extend this, to retain information about helicity states of the fermions and include photon absorption by
|
211 |
+
the neutron.
|
212 |
+
4
|
213 |
+
|
214 |
+
pp, λp
|
215 |
+
pn, λn
|
216 |
+
p′
|
217 |
+
p, λ′
|
218 |
+
p
|
219 |
+
p′
|
220 |
+
n, λ′
|
221 |
+
n
|
222 |
+
q, λγ
|
223 |
+
pp, λp
|
224 |
+
pn, λn
|
225 |
+
p′
|
226 |
+
p, λ′
|
227 |
+
p
|
228 |
+
p′
|
229 |
+
n, λ′
|
230 |
+
n
|
231 |
+
q, λγ
|
232 |
+
(a)
|
233 |
+
(b)
|
234 |
+
pp, λp
|
235 |
+
pn, λn
|
236 |
+
p′
|
237 |
+
p, λ′
|
238 |
+
p
|
239 |
+
p′
|
240 |
+
n, λ′
|
241 |
+
n
|
242 |
+
q, λγ
|
243 |
+
pp, λp
|
244 |
+
pn, λn
|
245 |
+
p′
|
246 |
+
p, λ′
|
247 |
+
p
|
248 |
+
p′
|
249 |
+
n, λ′
|
250 |
+
n
|
251 |
+
q, λγ
|
252 |
+
(c)
|
253 |
+
(d)
|
254 |
+
FIG. 2. Tree graphs for deuteron processes that absorb a photon of momentum q and helicity
|
255 |
+
λγ. The initial (final) nucleon momentum and helicity are pN (p′
|
256 |
+
N) and λN (λ′
|
257 |
+
N), with N = p or
|
258 |
+
n. The two nucleons exchange momentum via a vector particle. The four diagrams differ in the
|
259 |
+
nature of the photon-absorbing nucleon and the order of this absorption and momentum transfer
|
260 |
+
between nucleons.
|
261 |
+
other fermion line. Calculation of these sub-amplitudes can be checked against the trace
|
262 |
+
theorem for sums over helicities:
|
263 |
+
�
|
264 |
+
λN,λ′
|
265 |
+
N
|
266 |
+
Aν′µ′∗
|
267 |
+
N
|
268 |
+
(p; λ′
|
269 |
+
N, λN)Aµν
|
270 |
+
N (p; λ′
|
271 |
+
N, λN) = Tr
|
272 |
+
�
|
273 |
+
γν′ ̸p + m
|
274 |
+
p2 − m2γµ′(̸p′
|
275 |
+
N + m)γµ ̸p + m
|
276 |
+
p2 − m2γν(̸pN + m)
|
277 |
+
�
|
278 |
+
,
|
279 |
+
(2.6)
|
280 |
+
�
|
281 |
+
λN,λ′
|
282 |
+
N
|
283 |
+
Bµ′∗
|
284 |
+
N (λ′
|
285 |
+
N, λN)Bµ
|
286 |
+
N(λ′
|
287 |
+
N, λN) = Tr
|
288 |
+
�
|
289 |
+
γµ′(̸p′
|
290 |
+
N + m)γµ(̸pN + m)
|
291 |
+
�
|
292 |
+
.
|
293 |
+
(2.7)
|
294 |
+
The full amplitude is constructed from the MX by combining them with form factors for
|
295 |
+
each nucleon. For a deuteron with initial helicity λd, we have
|
296 |
+
Mν(λ′
|
297 |
+
p, λ′
|
298 |
+
n, λd) =
|
299 |
+
�
|
300 |
+
λp,λn
|
301 |
+
Cλd
|
302 |
+
λpλn
|
303 |
+
|
304 |
+
|
305 |
+
�
|
306 |
+
X=a,b,c,d
|
307 |
+
Mν
|
308 |
+
X(λ′
|
309 |
+
p, λ′
|
310 |
+
n, λp, λn)
|
311 |
+
|
312 |
+
Gpλ′pλp(Q2
|
313 |
+
p)Gnλ′nλn(Q2
|
314 |
+
n),
|
315 |
+
(2.8)
|
316 |
+
5
|
317 |
+
|
318 |
+
where Q2
|
319 |
+
N = −(p′
|
320 |
+
N − pN)2,
|
321 |
+
Cλd
|
322 |
+
λpλn =
|
323 |
+
|
324 |
+
|
325 |
+
|
326 |
+
δλp± 1
|
327 |
+
2δλn± 1
|
328 |
+
2,
|
329 |
+
λd = ±1
|
330 |
+
1
|
331 |
+
√
|
332 |
+
2
|
333 |
+
�
|
334 |
+
δλp 1
|
335 |
+
2δλn− 1
|
336 |
+
2 + δλp− 1
|
337 |
+
2δλn+ 1
|
338 |
+
2
|
339 |
+
�
|
340 |
+
, λd = 0,
|
341 |
+
(2.9)
|
342 |
+
and
|
343 |
+
GNλ′λ =
|
344 |
+
�
|
345 |
+
GEN, λ′ = λ
|
346 |
+
GMN, λ′ = −λ.
|
347 |
+
(2.10)
|
348 |
+
The form factors GEN and GMN represent the internal structure of the nucleons. They can
|
349 |
+
be represented by data or empirical fits. For simplicity, we use the fits [40]
|
350 |
+
GEp ≃
|
351 |
+
�
|
352 |
+
1 + Q2
|
353 |
+
N
|
354 |
+
m2
|
355 |
+
0
|
356 |
+
�−2
|
357 |
+
, GMp ≃ µpGEp, GMn ≃ µnGEp, GEn ≃ −
|
358 |
+
µnτ
|
359 |
+
1 + 5.6τ GEp,
|
360 |
+
(2.11)
|
361 |
+
where m2
|
362 |
+
0 = 0.71 GeV2, τ =
|
363 |
+
Q2
|
364 |
+
N
|
365 |
+
4m2 , µp = 2.79, and µn = −1.91. To limit the analysis to a
|
366 |
+
single mass scale, we take the parameter m0 to be proportional to the nuclear mass, with
|
367 |
+
m2
|
368 |
+
0 = 0.80 m2. We do not attempt to compute or assign an overall normalization to Mν,
|
369 |
+
and the running of the strong coupling constant is not included.
|
370 |
+
The initial nucleon spinor, for a deuteron traveling along the negative z direction, is [41]
|
371 |
+
uN =
|
372 |
+
̸p/2 + m
|
373 |
+
�
|
374 |
+
Ed/2 + m
|
375 |
+
�
|
376 |
+
φ(λN)(−ˆz)
|
377 |
+
0
|
378 |
+
�
|
379 |
+
,
|
380 |
+
(2.12)
|
381 |
+
with
|
382 |
+
φ(1/2)(−ˆz) =
|
383 |
+
�
|
384 |
+
0
|
385 |
+
1
|
386 |
+
�
|
387 |
+
, φ(−1/2)(−ˆz) =
|
388 |
+
�
|
389 |
+
1
|
390 |
+
0
|
391 |
+
�
|
392 |
+
.
|
393 |
+
(2.13)
|
394 |
+
The final nucleon spinor is
|
395 |
+
u′
|
396 |
+
N = ̸p′
|
397 |
+
N + m
|
398 |
+
�
|
399 |
+
E′
|
400 |
+
N + m
|
401 |
+
�
|
402 |
+
φ(λ′
|
403 |
+
N)(ˆp′
|
404 |
+
N)
|
405 |
+
0
|
406 |
+
�
|
407 |
+
,
|
408 |
+
(2.14)
|
409 |
+
with
|
410 |
+
φ(1/2)(ˆp′
|
411 |
+
N) =
|
412 |
+
�
|
413 |
+
cos(θN/2)
|
414 |
+
eiφN sin(θN/2)
|
415 |
+
�
|
416 |
+
, φ(−1/2)(ˆp′
|
417 |
+
N) =
|
418 |
+
�
|
419 |
+
−e−iφN sin(θN/2)
|
420 |
+
cos(θN/2)
|
421 |
+
�
|
422 |
+
,
|
423 |
+
(2.15)
|
424 |
+
where θN and φN are the polar and azimuthal angles of the outgoing momentum of the
|
425 |
+
particular nucleon.
|
426 |
+
As discussed in the Introduction, the overall normalization of the RNHA amplitude is
|
427 |
+
unknown. For comparison with data, we consider quantities which are themselves ratios or
|
428 |
+
a ratio of the model to data.
|
429 |
+
III.
|
430 |
+
ELASTIC ELECTRON SCATTERING
|
431 |
+
A.
|
432 |
+
Form factors
|
433 |
+
The three deuteron form factors, GC, GM, and GQ, are readily obtained from the hadronic
|
434 |
+
helicity amplitudes of elastic electron-deuteron scattering in the Breit frame [42]. The kine-
|
435 |
+
matics are shown in Fig. 3. The photon four-momentum is q = (0, 0, 0, qz) and the initial
|
436 |
+
6
|
437 |
+
|
438 |
+
(final) deuteron four-momentum is p = (Ed, 0, 0, −qz/2) (p′ = (Ed, 0, 0, qz/2)), with q2
|
439 |
+
z = Q2
|
440 |
+
and Ed =
|
441 |
+
�
|
442 |
+
Q2/4 + m2
|
443 |
+
d. In the zero-binding limit,3 md = 2m and the individual nucleon
|
444 |
+
four-momenta are pp = pn = p/2 and p′
|
445 |
+
p = p′
|
446 |
+
n = p′/2. The hadronic matrix elements are
|
447 |
+
given by
|
448 |
+
Gµ
|
449 |
+
λ′
|
450 |
+
d,λd =
|
451 |
+
�
|
452 |
+
λ′p,λ′n
|
453 |
+
C
|
454 |
+
λ′
|
455 |
+
d
|
456 |
+
λ′pλ′nMµ(λ′
|
457 |
+
p, λ′
|
458 |
+
n, λd).
|
459 |
+
(3.1)
|
460 |
+
The initial spinors are as in (2.12); the final spinors are specified by
|
461 |
+
u′
|
462 |
+
N =
|
463 |
+
̸p′/2 + m
|
464 |
+
�
|
465 |
+
Ed/2 + m
|
466 |
+
�
|
467 |
+
φ(λ′
|
468 |
+
N)(ˆz)
|
469 |
+
0
|
470 |
+
�
|
471 |
+
.
|
472 |
+
(3.2)
|
473 |
+
⃗q, λγ
|
474 |
+
−⃗q/2, λd
|
475 |
+
⃗q/2, λ′
|
476 |
+
d
|
477 |
+
z
|
478 |
+
⃗pe, λe
|
479 |
+
⃗p ′
|
480 |
+
e, λ′
|
481 |
+
e
|
482 |
+
FIG. 3. Kinematics for elastic electron-deuteron scattering in the Breit frame. The photon travels
|
483 |
+
along the positive z direction, and the deuteron comes from the right, along the negative z direction.
|
484 |
+
The three form factors are then extracted as [42, 43]
|
485 |
+
GC =
|
486 |
+
−1
|
487 |
+
2md
|
488 |
+
√1 + η
|
489 |
+
G+
|
490 |
+
00 − 2G+
|
491 |
+
+−
|
492 |
+
3
|
493 |
+
, GM =
|
494 |
+
2
|
495 |
+
2md
|
496 |
+
√1 + η
|
497 |
+
Gx
|
498 |
+
+0
|
499 |
+
√2η, GQ =
|
500 |
+
−1
|
501 |
+
2md
|
502 |
+
√1 + η
|
503 |
+
G+
|
504 |
+
00 + G+
|
505 |
+
+−
|
506 |
+
2η
|
507 |
+
,
|
508 |
+
(3.3)
|
509 |
+
with η ≡
|
510 |
+
Q2
|
511 |
+
4m2
|
512 |
+
d and the + superscript denoting the light-front sum of the 0 and z components.
|
513 |
+
For the helicity matrix elements, the model yields the following Q2 dependence:
|
514 |
+
G+
|
515 |
+
00 = 0.5588N m
|
516 |
+
�m
|
517 |
+
Q
|
518 |
+
�9 �
|
519 |
+
1 + 129.1m2
|
520 |
+
Q2 + O(m4
|
521 |
+
Q4 )
|
522 |
+
�
|
523 |
+
,
|
524 |
+
(3.4)
|
525 |
+
G+
|
526 |
+
+− = −69.85N m
|
527 |
+
�m
|
528 |
+
Q
|
529 |
+
�11 �
|
530 |
+
1 + 4.8m2
|
531 |
+
Q2 + O(m4
|
532 |
+
Q4 )
|
533 |
+
�
|
534 |
+
,
|
535 |
+
(3.5)
|
536 |
+
Gx
|
537 |
+
+0 = 8.851N m
|
538 |
+
�m
|
539 |
+
Q
|
540 |
+
�10 �
|
541 |
+
1 + 4.8m2
|
542 |
+
Q2 + O(m4
|
543 |
+
Q4 )
|
544 |
+
�
|
545 |
+
,
|
546 |
+
(3.6)
|
547 |
+
with N the unknown normalization. The factor of m/Q associated with each helicity flip
|
548 |
+
[44] is clearly evident. For the form factors, we find
|
549 |
+
GC = − 0.5588
|
550 |
+
√1 + η
|
551 |
+
N
|
552 |
+
12
|
553 |
+
�m
|
554 |
+
Q
|
555 |
+
�9 �
|
556 |
+
1 + 379.1m2
|
557 |
+
Q2 + O(m4
|
558 |
+
Q4 )
|
559 |
+
�
|
560 |
+
,
|
561 |
+
(3.7)
|
562 |
+
3 The difference between the proton and neutron masses is neglected in addition to the deuteron binding
|
563 |
+
energy, the two being of the same order.
|
564 |
+
7
|
565 |
+
|
566 |
+
GM =
|
567 |
+
8.851
|
568 |
+
�
|
569 |
+
η(1 + η)
|
570 |
+
N
|
571 |
+
2
|
572 |
+
√
|
573 |
+
2
|
574 |
+
�m
|
575 |
+
Q
|
576 |
+
�10 �
|
577 |
+
1 + 4.8m2
|
578 |
+
Q2 + O(m4
|
579 |
+
Q4 )
|
580 |
+
�
|
581 |
+
,
|
582 |
+
(3.8)
|
583 |
+
GQ = − 0.5588
|
584 |
+
η√1 + η
|
585 |
+
N
|
586 |
+
8
|
587 |
+
�m
|
588 |
+
Q
|
589 |
+
�9 �
|
590 |
+
1 + 4.086m2
|
591 |
+
Q2 + O(m4
|
592 |
+
Q4 )
|
593 |
+
�
|
594 |
+
.
|
595 |
+
(3.9)
|
596 |
+
The leading ± signs are as expected for large Q2.
|
597 |
+
We have left the kinematic factor η = Q2/16m2 without substitution, because there can
|
598 |
+
be three regimes for Q2. In addition to Q2 large or small, there can be an intermediate
|
599 |
+
region where Q2 is large but η is not. Such an intermediate regime does exist for GM and
|
600 |
+
GQ, where the coefficients of the nonleading terms are small enough for this correction to
|
601 |
+
be small while η is also small. For GC, this is not the case, because the coefficient of the
|
602 |
+
nonleading term is large enough to require a Q2 value for which η is also large. In the
|
603 |
+
intermediate regime, we obtain
|
604 |
+
GM ∼
|
605 |
+
�m
|
606 |
+
Q
|
607 |
+
�11
|
608 |
+
, GQ ∼
|
609 |
+
�m
|
610 |
+
Q
|
611 |
+
�11
|
612 |
+
,
|
613 |
+
(3.10)
|
614 |
+
and for the large-η regime
|
615 |
+
GC ∼
|
616 |
+
�m
|
617 |
+
Q
|
618 |
+
�10
|
619 |
+
, GM ∼
|
620 |
+
�m
|
621 |
+
Q
|
622 |
+
�12
|
623 |
+
, GQ ∼
|
624 |
+
�m
|
625 |
+
Q
|
626 |
+
�12
|
627 |
+
.
|
628 |
+
(3.11)
|
629 |
+
Ratios of these form factors at very large Q2 can be compared with the tree-level ratios
|
630 |
+
for a point-like spin-one particle, such as the W +, which are [43]
|
631 |
+
GC
|
632 |
+
GQ
|
633 |
+
= 2
|
634 |
+
3η − 1,
|
635 |
+
GM
|
636 |
+
GQ
|
637 |
+
= −2.
|
638 |
+
(3.12)
|
639 |
+
Such behavior is immediately reproduced for form factors separated according to a Drell–
|
640 |
+
Yan frame [45], with the assumption of strict G+
|
641 |
+
00 dominance [43]. In terms of our hadronic
|
642 |
+
matrix elements, we have
|
643 |
+
GC
|
644 |
+
GQ
|
645 |
+
= 2
|
646 |
+
3η − 2η
|
647 |
+
G+
|
648 |
+
+−
|
649 |
+
G+
|
650 |
+
00 + G+
|
651 |
+
+−
|
652 |
+
,
|
653 |
+
GM
|
654 |
+
GQ
|
655 |
+
= −2
|
656 |
+
�
|
657 |
+
2η
|
658 |
+
Gx
|
659 |
+
+0
|
660 |
+
G+
|
661 |
+
00 + G+
|
662 |
+
+−
|
663 |
+
.
|
664 |
+
(3.13)
|
665 |
+
As already observed in [43], these Breit-frame ratios cannot both be resolved by simply
|
666 |
+
assuming G+
|
667 |
+
00 dominance. From our model, we obtain
|
668 |
+
GC
|
669 |
+
GQ
|
670 |
+
= 2
|
671 |
+
3η + 15.6 + O(m2
|
672 |
+
Q2 ),
|
673 |
+
GM
|
674 |
+
GQ
|
675 |
+
= −11.2 + O(m2
|
676 |
+
Q2 ).
|
677 |
+
(3.14)
|
678 |
+
The leading 2
|
679 |
+
3η is just kinematic. The deviations of 15.6 and -11.2 from -1 and -2, respec-
|
680 |
+
tively, are due to nonleading contributions multiplied by powers of η. Similar deviations will
|
681 |
+
arise for calculations done in the Drell–Yan frame, because η factors again interfere with
|
682 |
+
strict G+
|
683 |
+
00 dominance. Plots of these ratios are shown in Fig. 4.
|
684 |
+
8
|
685 |
+
|
686 |
+
�����V����e/�����
|
687 |
+
V��
|
688 |
+
V��
|
689 |
+
�
|
690 |
+
��
|
691 |
+
��
|
692 |
+
��
|
693 |
+
��/M����0
|
694 |
+
�
|
695 |
+
��
|
696 |
+
���
|
697 |
+
FIG. 4. Ratios GC/GQ − 2η/3 (dashed) and GM/GQ (solid) for the model deuteron form factors.
|
698 |
+
B.
|
699 |
+
Structure functions
|
700 |
+
Experiments designed to extract these form factors measure cross sections and polariza-
|
701 |
+
tion observables in elastic electron-deuteron scattering. The unpolarized cross section
|
702 |
+
dσ
|
703 |
+
dΩ ∝ S, S ≡ A(Q2) + B(Q2) tan2(θe/2)
|
704 |
+
(3.15)
|
705 |
+
depends on the electron scattering angle θe and two structure functions
|
706 |
+
A(Q2) ≡ G2
|
707 |
+
C + 8
|
708 |
+
9η2G2
|
709 |
+
Q + 2
|
710 |
+
3ηG2
|
711 |
+
M,
|
712 |
+
(3.16)
|
713 |
+
B(Q2) ≡ 4
|
714 |
+
3η(1 + η)G2
|
715 |
+
M.
|
716 |
+
(3.17)
|
717 |
+
These have been measured at the highest Q2 yet attained at JLab [22–24], and A has been
|
718 |
+
measured at comparable Q2 at SLAC [21]. However, these do not yet reach the Q2 values
|
719 |
+
needed for a definitive comparison. Figures 5 and 6 show plots of the data divided by the
|
720 |
+
model, including an arbitrary normalization factor.
|
721 |
+
In our model, expansions of these functions in inverse powers of Q2 are
|
722 |
+
A(Q2) = 0.1041N 2
|
723 |
+
�m
|
724 |
+
Q
|
725 |
+
�20 �
|
726 |
+
1 + 1246m2
|
727 |
+
Q2 + O(m4
|
728 |
+
Q4 )
|
729 |
+
�
|
730 |
+
,
|
731 |
+
(3.18)
|
732 |
+
B(Q2) = 13.06N 2
|
733 |
+
�m
|
734 |
+
Q
|
735 |
+
�20 �
|
736 |
+
1 + 9.6m2
|
737 |
+
Q2 + O(m4
|
738 |
+
Q4 )
|
739 |
+
�
|
740 |
+
.
|
741 |
+
(3.19)
|
742 |
+
Because the expansion for GC is valid only for large η, we have used the explicit form of η in
|
743 |
+
constructing the expansion for A. The function B is independent of η; the leading factor of
|
744 |
+
9
|
745 |
+
|
746 |
+
�
|
747 |
+
�l�70V�����
|
748 |
+
5
|
749 |
+
6
|
750 |
+
7
|
751 |
+
�
|
752 |
+
�
|
753 |
+
�7Ql���70
|
754 |
+
5
|
755 |
+
6
|
756 |
+
7
|
757 |
+
�
|
758 |
+
�
|
759 |
+
�
|
760 |
+
�
|
761 |
+
�
|
762 |
+
FIG. 5. Data for the deuteron structure function A(Q2) divided by the model function, including
|
763 |
+
an arbitrary normalization. Experimental values are taken from [23] (circles) and [24] (squares).
|
764 |
+
η(1+η) in its definition exactly cancels against factors in the relationship of GM to hadronic
|
765 |
+
matrix elements. The expansion for B converges much faster than the expansion for A, and
|
766 |
+
the leading Q2 behavior is dominant for Q2 ≫ 10 GeV2 only for B. For A, one must wait
|
767 |
+
until impossibly large Q2, which enters a regime where the collective quark substructure is
|
768 |
+
important, including hidden-color effects [34], and the point-like approximation used in our
|
769 |
+
model is invalid.
|
770 |
+
In [22] the large Q2 behavior of B is quoted as being Q−24 from perturbative QCD.
|
771 |
+
This faster fall off compared to A is attributed to the extra suppression of the helicity flip
|
772 |
+
involved in GM. However, there are other compensating factors, and, just as in our model,
|
773 |
+
the behavior of B should be Q−20, which is the same as A. In Fig. 7 we plot the ratio of
|
774 |
+
B to A for a large range of Q2. This ratio becomes constant at very large Q2. Although
|
775 |
+
the plots begin at low Q2, there is nothing in the model that could reproduce diffractive
|
776 |
+
minima, hence the smooth appearance.
|
777 |
+
C.
|
778 |
+
Tensor polarization observables
|
779 |
+
Experiments can also extract tensor polarization observables [20, 25]
|
780 |
+
t20 ≡ −
|
781 |
+
1
|
782 |
+
√
|
783 |
+
2S
|
784 |
+
�8
|
785 |
+
3ηGCGQ + 8
|
786 |
+
9η2G2
|
787 |
+
Q + 1
|
788 |
+
3η
|
789 |
+
�
|
790 |
+
1 + 2(1 + η) tan2(θe/2)
|
791 |
+
�
|
792 |
+
G2
|
793 |
+
M
|
794 |
+
�
|
795 |
+
,
|
796 |
+
(3.20)
|
797 |
+
t21 ≡
|
798 |
+
2η
|
799 |
+
√
|
800 |
+
3S cos(θe/2)
|
801 |
+
�
|
802 |
+
η + η2 sin2(θe/2)GMGQ,
|
803 |
+
(3.21)
|
804 |
+
t22 ≡ −
|
805 |
+
η
|
806 |
+
2
|
807 |
+
√
|
808 |
+
3S G2
|
809 |
+
M.
|
810 |
+
(3.22)
|
811 |
+
10
|
812 |
+
|
813 |
+
�
|
814 |
+
�l��-G�����
|
815 |
+
1V �
|
816 |
+
V
|
817 |
+
V �
|
818 |
+
3
|
819 |
+
3 �
|
820 |
+
�
|
821 |
+
� �
|
822 |
+
��Ql����-
|
823 |
+
3
|
824 |
+
3 �
|
825 |
+
�
|
826 |
+
� �
|
827 |
+
�
|
828 |
+
FIG. 6. Data for the deuteron structure function B(Q2) divided by the model function, including
|
829 |
+
an arbitrary normalization. Experimental values are taken from [22].
|
830 |
+
�
|
831 |
+
�8��15�8��1
|
832 |
+
�
|
833 |
+
��
|
834 |
+
��
|
835 |
+
��
|
836 |
+
��
|
837 |
+
���
|
838 |
+
���
|
839 |
+
���
|
840 |
+
��Q8����1
|
841 |
+
���
|
842 |
+
���
|
843 |
+
���
|
844 |
+
���
|
845 |
+
���
|
846 |
+
���
|
847 |
+
���
|
848 |
+
FIG. 7. Ratio of B to A for the model deuteron structure functions.
|
849 |
+
The highest Q2 measurements of these were also done at JLab [25]. When η is held explicit,
|
850 |
+
expansions in m/Q are
|
851 |
+
t20 = −
|
852 |
+
√
|
853 |
+
2 + 1064[1 + 2(1 + η) tan2(θe/2)]
|
854 |
+
�m
|
855 |
+
Q
|
856 |
+
�2
|
857 |
+
+ O(m4
|
858 |
+
Q4 ),
|
859 |
+
(3.23)
|
860 |
+
11
|
861 |
+
|
862 |
+
t21 = 38.8 sec(θe/2)
|
863 |
+
�
|
864 |
+
η + sin2(θe/2)m
|
865 |
+
Q
|
866 |
+
(3.24)
|
867 |
+
+ sec(θe/2)
|
868 |
+
�
|
869 |
+
η + sin2(θe/2)[48606 + 77869(1 + η) tan2(θe/2)]
|
870 |
+
�m
|
871 |
+
Q
|
872 |
+
�3
|
873 |
+
+ O(m4
|
874 |
+
Q4 ),
|
875 |
+
t22 = −434.5
|
876 |
+
�m
|
877 |
+
Q
|
878 |
+
�2
|
879 |
+
+ [544703 + 872133(1 + η) tan2(θe/2)]
|
880 |
+
�m
|
881 |
+
Q
|
882 |
+
�4
|
883 |
+
+ O(m6
|
884 |
+
Q6 ).
|
885 |
+
(3.25)
|
886 |
+
While at very large Q2, they are
|
887 |
+
t20 = −
|
888 |
+
√
|
889 |
+
2 + 133 tan2(θe/2) + 1064[1 + 2 tan2(θe/2)]
|
890 |
+
�m
|
891 |
+
Q
|
892 |
+
�2
|
893 |
+
+ O(m4
|
894 |
+
Q4 ),
|
895 |
+
(3.26)
|
896 |
+
t21 = 1217 sec(θe/2) sin(θe/2)[tan2(θe/2) − 0.007972] + []
|
897 |
+
�m
|
898 |
+
Q
|
899 |
+
�2
|
900 |
+
+ O(m4
|
901 |
+
Q4 ),
|
902 |
+
(3.27)
|
903 |
+
t22 = −[434.5 − 54508 tan2(θe/2)]
|
904 |
+
�m
|
905 |
+
Q
|
906 |
+
�2
|
907 |
+
(3.28)
|
908 |
+
+[544703 + 872133 tan2(θe/2)]
|
909 |
+
�m
|
910 |
+
Q
|
911 |
+
�4
|
912 |
+
+ O(m6
|
913 |
+
Q6 ).
|
914 |
+
The coefficients of nonleading terms are quite large. Thus, very large Q2 is required for
|
915 |
+
the leading term to be dominant, well beyond any available data. The limit of −
|
916 |
+
√
|
917 |
+
2 for
|
918 |
+
t20 at θe = 0◦ was an early prediction of perturbative QCD [44, 46]. However, as argued
|
919 |
+
elsewhere [43], this value is obtained only at very large Q2, and the value is quite different for
|
920 |
+
small η. Figures 8 and 9 show plots of these observables at angles of 0◦ and 30◦, respectively.
|
921 |
+
We also compare with data [25] in Figs. 10, 11, and 12. At these ‘small’ values of Q2, only
|
922 |
+
t22 is consistent with data, something which is likely accidental with both data and model
|
923 |
+
values near zero.
|
924 |
+
IV.
|
925 |
+
PHOTODISINTEGRATION
|
926 |
+
In the photodisintegration of a deuteron, a real photon is absorbed and the two constituent
|
927 |
+
nucleons emitted. This process is depicted in Fig. 13. The initial deuteron and photon four-
|
928 |
+
momenta in the center-of-mass (c.m.) frame are p = (Ed, 0, 0, −qz) and q = (qz, 0, 0, qz),
|
929 |
+
where the incident photon is taken along the positive z axis. The final proton and neutron
|
930 |
+
four-momenta are p′
|
931 |
+
p = (E′
|
932 |
+
p, ⃗p ′
|
933 |
+
p) and p′
|
934 |
+
n = (E′
|
935 |
+
n, ⃗p ′
|
936 |
+
n), with θp and φp the polar and azimuthal
|
937 |
+
angles of the final proton.
|
938 |
+
By ignoring the nucleon mass difference, we have E′
|
939 |
+
p = E′
|
940 |
+
n,
|
941 |
+
because momentum conservation guarantees ⃗p ′
|
942 |
+
n = −⃗p ′
|
943 |
+
p in the c.m. frame.
|
944 |
+
In terms of the Mandelstam variable s, the c.m. energies and momenta are
|
945 |
+
Ed = (s + 4m2)/(2√s), qz = (s − 4m2)/(2√s), E′
|
946 |
+
p = √s/2, |⃗p ′
|
947 |
+
p| =
|
948 |
+
√
|
949 |
+
s − 4m2/2.
|
950 |
+
(4.1)
|
951 |
+
The photon energy in the lab frame is Eγ = (s − 4m2)/4m. We will work at large s, so that
|
952 |
+
momentum transfers are large.
|
953 |
+
The standard definition of helicity amplitudes for photodisintegration is [47]
|
954 |
+
Fi± ≡ ǫν(λγ)Mν(λ′
|
955 |
+
p, λ′
|
956 |
+
n, λd)
|
957 |
+
(4.2)
|
958 |
+
12
|
959 |
+
|
960 |
+
�
|
961 |
+
��5e0���e0���
|
962 |
+
V�)�
|
963 |
+
V�)�
|
964 |
+
V�)�
|
965 |
+
V�
|
966 |
+
V5)�
|
967 |
+
V5)�
|
968 |
+
V5)�
|
969 |
+
V5)�
|
970 |
+
5
|
971 |
+
��08����Q
|
972 |
+
�55
|
973 |
+
�5�
|
974 |
+
�5�
|
975 |
+
�5�
|
976 |
+
�5�
|
977 |
+
�5�
|
978 |
+
�5�
|
979 |
+
FIG. 8.
|
980 |
+
Deuteron tensor polarization observables t20 (solid), t21 (dashed), and t22 (dotted) as
|
981 |
+
computed in the model at an angle of θe = 0◦.
|
982 |
+
The asymptotic value of t20(0◦) is −
|
983 |
+
√
|
984 |
+
2, as
|
985 |
+
predicted by perturbative QCD [44, 46].
|
986 |
+
with ǫ the polarization vector for a photon with helicity λγ and Mν given in (2.8). The
|
987 |
+
index i is associated with particular helicity combinations as follows:
|
988 |
+
F1± = ǫν(1)Mν(±1
|
989 |
+
2, ±1
|
990 |
+
2, 1), F2± = ǫν(1)Mν(±1
|
991 |
+
2, ±1
|
992 |
+
2, 0),
|
993 |
+
(4.3)
|
994 |
+
F3± = ǫν(1)Mν(±1
|
995 |
+
2, ±1
|
996 |
+
2, −1), F4± = ǫν(1)Mν(±1
|
997 |
+
2, ∓1
|
998 |
+
2, 1),
|
999 |
+
(4.4)
|
1000 |
+
F5± = ǫν(1)Mν(±1
|
1001 |
+
2, ∓1
|
1002 |
+
2, 0), F6± = ǫν(1)Mν(±1
|
1003 |
+
2, ∓1
|
1004 |
+
2, −1).
|
1005 |
+
(4.5)
|
1006 |
+
The other helicity combinations are related to these by parity.
|
1007 |
+
The helicity amplitudes can be used to compute various polarization observables. The
|
1008 |
+
recoil-proton polarization Py measures the asymmetry parallel/antiparallel to the normal
|
1009 |
+
ˆy ∝ ⃗q × ⃗p ′
|
1010 |
+
p to the scattering plane:
|
1011 |
+
Py = 2Im
|
1012 |
+
3
|
1013 |
+
�
|
1014 |
+
i=1
|
1015 |
+
[F †
|
1016 |
+
i+Fi+3,− + F †
|
1017 |
+
i+3,+Fi−]/f(θ),
|
1018 |
+
(4.6)
|
1019 |
+
where f(θ) =
|
1020 |
+
�6
|
1021 |
+
i=1[|Fi+|2 + |Fi−|2] is the sum of all the helicity amplitudes squared. The
|
1022 |
+
transferred polarizations Cx′ and Cz′ measure asymmetries parallel/antiparallel to the ˆx′ ∝
|
1023 |
+
⃗p ′
|
1024 |
+
p × ˆy and ˆz′ = ˆp ′
|
1025 |
+
p directions:
|
1026 |
+
Cx′ = 2Re
|
1027 |
+
3
|
1028 |
+
�
|
1029 |
+
i=1
|
1030 |
+
[F †
|
1031 |
+
i+Fi+3,− + F †
|
1032 |
+
i+3,+Fi−]/f(θ),
|
1033 |
+
(4.7)
|
1034 |
+
Cz′ =
|
1035 |
+
6
|
1036 |
+
�
|
1037 |
+
i=1
|
1038 |
+
[|Fi+|2 − |Fi−|2]/f(θ).
|
1039 |
+
(4.8)
|
1040 |
+
13
|
1041 |
+
|
1042 |
+
�
|
1043 |
+
���e0���e0���
|
1044 |
+
V�)�
|
1045 |
+
V�)�
|
1046 |
+
V�)�
|
1047 |
+
V�)�
|
1048 |
+
V�)�
|
1049 |
+
�
|
1050 |
+
��03����Q
|
1051 |
+
���
|
1052 |
+
���
|
1053 |
+
���
|
1054 |
+
���
|
1055 |
+
���
|
1056 |
+
���
|
1057 |
+
���
|
1058 |
+
FIG. 9. Same as Fig. 8 but for an angle of θe = 30◦.
|
1059 |
+
The asymmetry Σ for linearly polarized photons is given by
|
1060 |
+
Σ = −2Re
|
1061 |
+
��
|
1062 |
+
±
|
1063 |
+
(F †
|
1064 |
+
1±F3∓ − F †
|
1065 |
+
4±F6∓) − F †
|
1066 |
+
2+F2− + F †
|
1067 |
+
5+F5−
|
1068 |
+
�
|
1069 |
+
/f(θ).
|
1070 |
+
(4.9)
|
1071 |
+
Each observable is formed as a ratio, which sets aside questions of normalization.
|
1072 |
+
Because we only need to consider photons with helicity +1, the polarization vector is
|
1073 |
+
always ǫ = − 1
|
1074 |
+
√
|
1075 |
+
2(0, 1, i, 0), relative to the momentum in the positive z direction. The final
|
1076 |
+
Dirac spinors are
|
1077 |
+
u′
|
1078 |
+
N = ̸p′
|
1079 |
+
N + m
|
1080 |
+
�
|
1081 |
+
E′
|
1082 |
+
N + m
|
1083 |
+
�
|
1084 |
+
φ(λ′
|
1085 |
+
N)(ˆp′
|
1086 |
+
N)
|
1087 |
+
0
|
1088 |
+
�
|
1089 |
+
,
|
1090 |
+
(4.10)
|
1091 |
+
with θn = π − θp, φn = φp + π = π, and
|
1092 |
+
φ(1/2)(ˆp′
|
1093 |
+
N) =
|
1094 |
+
�
|
1095 |
+
cos(θN/2)
|
1096 |
+
eiφN sin(θN/2)
|
1097 |
+
�
|
1098 |
+
, φ(−1/2)(ˆp′
|
1099 |
+
N) =
|
1100 |
+
�
|
1101 |
+
−e−iφN sin(θN/2)
|
1102 |
+
cos(θN/2)
|
1103 |
+
�
|
1104 |
+
.
|
1105 |
+
(4.11)
|
1106 |
+
With these spinors as input, the amplitudes ǫνMν
|
1107 |
+
X can be evaluated in terms of Dirac
|
1108 |
+
matrix and spinor products and then combined to construct the predefined amplitudes Fi±.
|
1109 |
+
At large s, these RNHA predictions for the helicity amplitudes reduce to
|
1110 |
+
F1+ ∼ 4
|
1111 |
+
√
|
1112 |
+
2
|
1113 |
+
√scsc2(θp
|
1114 |
+
2 )GEn(θp)GEp(θp), F1− ∼ 0,
|
1115 |
+
(4.12)
|
1116 |
+
F2+ ∼ 2m
|
1117 |
+
s cot3(θp
|
1118 |
+
2 )[GEn(θp)GMp(θp) − GMn(θp)GEp(θp)],
|
1119 |
+
(4.13)
|
1120 |
+
F2− ∼ 2m
|
1121 |
+
s cot(θp
|
1122 |
+
2 )[GMn(θp)GEp(θp) − GEn(θp)GMp(θp)],
|
1123 |
+
F3+ ∼ 0, F3− ∼ 0,
|
1124 |
+
(4.14)
|
1125 |
+
14
|
1126 |
+
|
1127 |
+
�
|
1128 |
+
���
|
1129 |
+
1���
|
1130 |
+
1���
|
1131 |
+
1���
|
1132 |
+
1���
|
1133 |
+
�
|
1134 |
+
���
|
1135 |
+
���
|
1136 |
+
���
|
1137 |
+
���
|
1138 |
+
��0(����G
|
1139 |
+
���
|
1140 |
+
���
|
1141 |
+
���
|
1142 |
+
���
|
1143 |
+
���
|
1144 |
+
���
|
1145 |
+
���
|
1146 |
+
FIG. 10. Plots of the tensor polarization observable t20 of the deuteron from both data [25] (circles)
|
1147 |
+
and the model (squares) considered in the text. The angle θe varies and is as follows in order of
|
1148 |
+
increasing Q2: 35.6◦, 33.4◦, 29.8◦, 27.3◦, 23.0◦, and 19.8◦.
|
1149 |
+
F4+ ∼ −4
|
1150 |
+
√
|
1151 |
+
2m
|
1152 |
+
s cot(θp
|
1153 |
+
2 )GMn(θp)GEp(θp), F4− ∼ 4
|
1154 |
+
√
|
1155 |
+
2m
|
1156 |
+
s cot(θp
|
1157 |
+
2 )GEn(θp)GMp(θp), (4.15)
|
1158 |
+
F5+ ∼ 2
|
1159 |
+
√s cot2(θp
|
1160 |
+
2 )GEn(θp)GEp(θp), F5− ∼ 2
|
1161 |
+
√sGEn(θp)GEp(θp),
|
1162 |
+
(4.16)
|
1163 |
+
F6+ ∼ 4
|
1164 |
+
√
|
1165 |
+
2m
|
1166 |
+
s cot3(θp
|
1167 |
+
2 )GEn(θp)GMp(θp), F6− ∼ −4
|
1168 |
+
√
|
1169 |
+
2m
|
1170 |
+
s cot(θp
|
1171 |
+
2 )GMn(θp)GEp(θp).(4.17)
|
1172 |
+
From these we can calculate the various observables. Plots of the results and recent data [48–
|
1173 |
+
50] are given in Figs. 14, 15, 16, and 17. Because the tree-level amplitudes are real, Py is
|
1174 |
+
automatically zero. That Cx′ is of order m/√s, rather than zero, is a correction to hadron
|
1175 |
+
helicity conservation [51]. Also, we find the asymmetry Σ(90◦) to be approximately -0.06,
|
1176 |
+
rather than the nominal expectation [52] of -1. In general, the trends with photon energy
|
1177 |
+
seem to be modestly consistent with data.
|
1178 |
+
V.
|
1179 |
+
ELECTRODISINTEGRATION
|
1180 |
+
The kinematics of the electrodisintegration process are shown in Fig. 18. The initial (final)
|
1181 |
+
momentum and helicity of the electron are pe (p′
|
1182 |
+
e) and λe (λ′
|
1183 |
+
e). The intermediate photon
|
1184 |
+
carries four-momentum q. The azimuthal angle φp of the proton measures the rotation of
|
1185 |
+
the hadronic reaction plane relative to the electron scattering plane.
|
1186 |
+
In the lab frame, with the z axis taken along the photon three-momentum and the electron
|
1187 |
+
mass neglected, the initial and final electron four-momenta are
|
1188 |
+
pe = (Ee, Ee sin θe, 0, Ee cos θe), p′
|
1189 |
+
e = (E′
|
1190 |
+
e, E′
|
1191 |
+
e sin θ′
|
1192 |
+
e, 0, E′
|
1193 |
+
e cos θ′
|
1194 |
+
e),
|
1195 |
+
(5.1)
|
1196 |
+
15
|
1197 |
+
|
1198 |
+
�
|
1199 |
+
���
|
1200 |
+
V�)�
|
1201 |
+
V�)�
|
1202 |
+
�
|
1203 |
+
�)�
|
1204 |
+
�)�
|
1205 |
+
�)�
|
1206 |
+
�)�
|
1207 |
+
�)�
|
1208 |
+
�)�
|
1209 |
+
��1Q����
|
1210 |
+
�)�
|
1211 |
+
�)�
|
1212 |
+
�
|
1213 |
+
�)�
|
1214 |
+
�)�
|
1215 |
+
�)�
|
1216 |
+
�)�
|
1217 |
+
FIG. 11. Same as Fig. 10 but for t21.
|
1218 |
+
�
|
1219 |
+
���
|
1220 |
+
8�4��
|
1221 |
+
8�4�
|
1222 |
+
8�4��
|
1223 |
+
8�4�
|
1224 |
+
8�4��
|
1225 |
+
�
|
1226 |
+
�4��
|
1227 |
+
�4�
|
1228 |
+
�4��
|
1229 |
+
��-G����e
|
1230 |
+
�4�
|
1231 |
+
�4�
|
1232 |
+
�
|
1233 |
+
�4�
|
1234 |
+
�4�
|
1235 |
+
�4�
|
1236 |
+
�4�
|
1237 |
+
FIG. 12. Same as Fig. 10 but for t22.
|
1238 |
+
with E′
|
1239 |
+
e and ˜θ = θ′
|
1240 |
+
e − θe, the angle of the scattered electron to the beam direction, being
|
1241 |
+
measured. The photon four-momentum q = (Eγ, 0, 0, qz) is just pe − p′
|
1242 |
+
e, which yields
|
1243 |
+
Q2 ≡ −q2 = 2EeE′
|
1244 |
+
e(1 − cos ˜θ), Eγ = Ee − E′
|
1245 |
+
e, qz =
|
1246 |
+
�
|
1247 |
+
E2γ + Q2.
|
1248 |
+
(5.2)
|
1249 |
+
The deuteron four-momentum is p = (md = 2m, 0, 0, 0), and in the zero-binding limit, the
|
1250 |
+
initial proton and neutron four-momenta are pp = pn = (m, 0, 0, 0).
|
1251 |
+
The final nucleon
|
1252 |
+
16
|
1253 |
+
|
1254 |
+
⃗q, λγ
|
1255 |
+
⃗p, λd
|
1256 |
+
⃗p ′
|
1257 |
+
p, λ′
|
1258 |
+
p
|
1259 |
+
⃗p ′
|
1260 |
+
n, λ′
|
1261 |
+
n
|
1262 |
+
θn = π − θp
|
1263 |
+
θp
|
1264 |
+
z
|
1265 |
+
FIG. 13. Kinematics for deuteron photodisintegration in the c.m. frame, with ⃗q the photon mo-
|
1266 |
+
mentum and ⃗p = −⃗q the deuteron momentum. The final proton and neutron momenta are ⃗p ′
|
1267 |
+
p and
|
1268 |
+
⃗p ′
|
1269 |
+
n. The λ’s are helicities. Coordinates are chosen such that the photon enters along the positive
|
1270 |
+
z direction and the azimuthal angle φp of the proton is zero.
|
1271 |
+
Eγ (GeV)
|
1272 |
+
0
|
1273 |
+
1
|
1274 |
+
2
|
1275 |
+
3
|
1276 |
+
4
|
1277 |
+
5
|
1278 |
+
6
|
1279 |
+
Py (90 deg)
|
1280 |
+
-1.0
|
1281 |
+
-0.8
|
1282 |
+
-0.6
|
1283 |
+
-0.4
|
1284 |
+
-0.2
|
1285 |
+
0.0
|
1286 |
+
0.2
|
1287 |
+
0.4
|
1288 |
+
0.6
|
1289 |
+
0.8
|
1290 |
+
1.0
|
1291 |
+
θ (deg)
|
1292 |
+
0
|
1293 |
+
20
|
1294 |
+
40
|
1295 |
+
60
|
1296 |
+
80
|
1297 |
+
100
|
1298 |
+
120
|
1299 |
+
140
|
1300 |
+
160
|
1301 |
+
180
|
1302 |
+
Py (Eγ=2 GeV)
|
1303 |
+
-1.0
|
1304 |
+
-0.8
|
1305 |
+
-0.6
|
1306 |
+
-0.4
|
1307 |
+
-0.2
|
1308 |
+
0.0
|
1309 |
+
0.2
|
1310 |
+
0.4
|
1311 |
+
0.6
|
1312 |
+
0.8
|
1313 |
+
1.0
|
1314 |
+
(a)
|
1315 |
+
(b)
|
1316 |
+
FIG. 14. Recoil proton polarization Py as a function of (a) photon energy Eγ and (b) proton angle
|
1317 |
+
θ. For the latter, the photon energy is 2 GeV. The solid line is the RNHA prediction; the data
|
1318 |
+
points are from [48, 49].
|
1319 |
+
four-momenta are
|
1320 |
+
p′
|
1321 |
+
p = (E′
|
1322 |
+
p =
|
1323 |
+
�
|
1324 |
+
⃗p ′2
|
1325 |
+
p + m2, |⃗p ′
|
1326 |
+
p| sin θp cos φp, |⃗p ′
|
1327 |
+
p| sin θp sin φp, |⃗p ′
|
1328 |
+
p| cos θp),
|
1329 |
+
(5.3)
|
1330 |
+
p′
|
1331 |
+
n = (E′
|
1332 |
+
n =
|
1333 |
+
�
|
1334 |
+
⃗p ′2
|
1335 |
+
n + m2, −|⃗p ′
|
1336 |
+
n| sin θn cos φp, −|⃗p ′
|
1337 |
+
n| sin θn sin φp, |⃗p ′
|
1338 |
+
n| cos θn).
|
1339 |
+
(5.4)
|
1340 |
+
Within the one-photon-exchange approximation, the scattering amplitude is proportional
|
1341 |
+
17
|
1342 |
+
|
1343 |
+
Eγ (GeV)
|
1344 |
+
0
|
1345 |
+
1
|
1346 |
+
2
|
1347 |
+
3
|
1348 |
+
4
|
1349 |
+
5
|
1350 |
+
6
|
1351 |
+
Cx' (90 deg)
|
1352 |
+
-1.0
|
1353 |
+
-0.8
|
1354 |
+
-0.6
|
1355 |
+
-0.4
|
1356 |
+
-0.2
|
1357 |
+
0.0
|
1358 |
+
0.2
|
1359 |
+
0.4
|
1360 |
+
0.6
|
1361 |
+
0.8
|
1362 |
+
1.0
|
1363 |
+
θ (deg)
|
1364 |
+
0
|
1365 |
+
20
|
1366 |
+
40
|
1367 |
+
60
|
1368 |
+
80
|
1369 |
+
100
|
1370 |
+
120
|
1371 |
+
140
|
1372 |
+
160
|
1373 |
+
180
|
1374 |
+
Cx' (Eγ=2 GeV)
|
1375 |
+
-1.0
|
1376 |
+
-0.8
|
1377 |
+
-0.6
|
1378 |
+
-0.4
|
1379 |
+
-0.2
|
1380 |
+
0.0
|
1381 |
+
0.2
|
1382 |
+
0.4
|
1383 |
+
0.6
|
1384 |
+
0.8
|
1385 |
+
1.0
|
1386 |
+
(a)
|
1387 |
+
(b)
|
1388 |
+
FIG. 15. Same as Fig. 14 but for the transferred polarization Cx′.
|
1389 |
+
Eγ (GeV)
|
1390 |
+
0
|
1391 |
+
1
|
1392 |
+
2
|
1393 |
+
3
|
1394 |
+
4
|
1395 |
+
5
|
1396 |
+
6
|
1397 |
+
Cz' (90 deg)
|
1398 |
+
-1.0
|
1399 |
+
-0.8
|
1400 |
+
-0.6
|
1401 |
+
-0.4
|
1402 |
+
-0.2
|
1403 |
+
0.0
|
1404 |
+
0.2
|
1405 |
+
0.4
|
1406 |
+
0.6
|
1407 |
+
0.8
|
1408 |
+
1.0
|
1409 |
+
θ (deg)
|
1410 |
+
0
|
1411 |
+
20
|
1412 |
+
40
|
1413 |
+
60
|
1414 |
+
80
|
1415 |
+
100
|
1416 |
+
120
|
1417 |
+
140
|
1418 |
+
160
|
1419 |
+
180
|
1420 |
+
Cz' (Eγ=2 GeV)
|
1421 |
+
-1.0
|
1422 |
+
-0.8
|
1423 |
+
-0.6
|
1424 |
+
-0.4
|
1425 |
+
-0.2
|
1426 |
+
0.0
|
1427 |
+
0.2
|
1428 |
+
0.4
|
1429 |
+
0.6
|
1430 |
+
0.8
|
1431 |
+
1.0
|
1432 |
+
(a)
|
1433 |
+
(b)
|
1434 |
+
FIG. 16. Same as Fig. 15 but for Cz′.
|
1435 |
+
to
|
1436 |
+
Med(λ′
|
1437 |
+
p, λ′
|
1438 |
+
n, λ′
|
1439 |
+
e; λd, λe) = ¯u′
|
1440 |
+
eγµue
|
1441 |
+
Dµν
|
1442 |
+
q2 Mν(λ′
|
1443 |
+
p, λ′
|
1444 |
+
n, λd),
|
1445 |
+
(5.5)
|
1446 |
+
with ue (u′
|
1447 |
+
e) the initial (final) spinor of the electron and Mν given in (2.8). The numerator
|
1448 |
+
of the photon progator is the sum over photon polarizations
|
1449 |
+
Dµν =
|
1450 |
+
1
|
1451 |
+
�
|
1452 |
+
λ=−1
|
1453 |
+
(−1)λǫ∗
|
1454 |
+
µ(λ)ǫν(λ).
|
1455 |
+
(5.6)
|
1456 |
+
18
|
1457 |
+
|
1458 |
+
Eγ (GeV)
|
1459 |
+
0
|
1460 |
+
1
|
1461 |
+
2
|
1462 |
+
3
|
1463 |
+
4
|
1464 |
+
5
|
1465 |
+
6
|
1466 |
+
Σ (90 deg)
|
1467 |
+
-1.0
|
1468 |
+
-0.8
|
1469 |
+
-0.6
|
1470 |
+
-0.4
|
1471 |
+
-0.2
|
1472 |
+
0.0
|
1473 |
+
0.2
|
1474 |
+
0.4
|
1475 |
+
0.6
|
1476 |
+
0.8
|
1477 |
+
1.0
|
1478 |
+
θ (deg)
|
1479 |
+
0
|
1480 |
+
20
|
1481 |
+
40
|
1482 |
+
60
|
1483 |
+
80
|
1484 |
+
100
|
1485 |
+
120
|
1486 |
+
140
|
1487 |
+
160
|
1488 |
+
180
|
1489 |
+
Σ (Eγ=2 GeV)
|
1490 |
+
-0.10
|
1491 |
+
-0.08
|
1492 |
+
-0.06
|
1493 |
+
-0.04
|
1494 |
+
-0.02
|
1495 |
+
0.00
|
1496 |
+
0.02
|
1497 |
+
0.04
|
1498 |
+
0.06
|
1499 |
+
0.08
|
1500 |
+
0.10
|
1501 |
+
(a)
|
1502 |
+
(b)
|
1503 |
+
FIG. 17. Same as Fig. 14 but for the asymmetry Σ. The data points are from [50].
|
1504 |
+
The polarization four-vectors are4
|
1505 |
+
ǫ(±1) = ∓ 1
|
1506 |
+
√
|
1507 |
+
2(0, 1, ±i, 0), ǫ(0) = (qz/Q, 0, 0, Eγ/Q)
|
1508 |
+
(5.7)
|
1509 |
+
relative to the photon four-momentum q = (Eγ, 0, 0, qz). Polarization observables [5–15] can
|
1510 |
+
then be computed from these helicity amplitudes.
|
1511 |
+
⃗pe, λe
|
1512 |
+
⃗p ′
|
1513 |
+
e, λ′
|
1514 |
+
e
|
1515 |
+
x
|
1516 |
+
⃗q
|
1517 |
+
⃗p ′
|
1518 |
+
p, λ′
|
1519 |
+
p
|
1520 |
+
⃗p ′
|
1521 |
+
n, λ′
|
1522 |
+
n
|
1523 |
+
y′
|
1524 |
+
x′
|
1525 |
+
z, z′
|
1526 |
+
y
|
1527 |
+
θp
|
1528 |
+
φp
|
1529 |
+
θe
|
1530 |
+
θ′
|
1531 |
+
e
|
1532 |
+
z
|
1533 |
+
θn
|
1534 |
+
˜θ
|
1535 |
+
FIG. 18. Kinematics for deuteron electrodisintegration. The unprimed axes are defined relative to
|
1536 |
+
the electron scattering plane, and the primed axes relative to the final nucleon momenta. The final
|
1537 |
+
proton momentum has polar angle θp and azimuthal angle φp relative to the unprimed frame.
|
1538 |
+
4 In the hadronic c.m. frame, the longitudinal polarization vector is ǫ(0) = (q′
|
1539 |
+
z/Q, 0, 0, E′
|
1540 |
+
γ/Q).
|
1541 |
+
19
|
1542 |
+
|
1543 |
+
In keeping with the notation of [6, 7] and [15], the differential cross section for elec-
|
1544 |
+
trodisintegration, summed over the final electron and neutron helicities in the lab frame,
|
1545 |
+
is [14, 15]5
|
1546 |
+
dσ ≡
|
1547 |
+
dσ5
|
1548 |
+
dE′dΩ′
|
1549 |
+
edΩ′
|
1550 |
+
p
|
1551 |
+
(5.8)
|
1552 |
+
= mpmn|⃗p ′
|
1553 |
+
p|
|
1554 |
+
16π3md
|
1555 |
+
σMott
|
1556 |
+
frec
|
1557 |
+
[νLRL + νT RT + νTTRTT + νLTRLT + 2λeνLT ′TLT ′ + 2λeνT ′RT ′] ,
|
1558 |
+
where Ω′
|
1559 |
+
e (Ω′
|
1560 |
+
p) is the solid angle of the scattered electron (proton), σMott is the Mott cross
|
1561 |
+
section, frec = |1 + (Eγ|⃗p ′
|
1562 |
+
p| − E′
|
1563 |
+
pqz cos θp)/(md|⃗p ′
|
1564 |
+
p|)| is the lab recoil factor,
|
1565 |
+
νL = Q4
|
1566 |
+
q4z
|
1567 |
+
, νT = Q2
|
1568 |
+
2q2z
|
1569 |
+
+ tan2 ˜θ
|
1570 |
+
2, νTT = Q2
|
1571 |
+
2q2z
|
1572 |
+
, νLT =
|
1573 |
+
Q2
|
1574 |
+
√
|
1575 |
+
2q2
|
1576 |
+
z
|
1577 |
+
�
|
1578 |
+
�
|
1579 |
+
�
|
1580 |
+
�Q2
|
1581 |
+
q2z
|
1582 |
+
+ tan2 ˜θ
|
1583 |
+
2,
|
1584 |
+
(5.9)
|
1585 |
+
νLT ′ = − Q2
|
1586 |
+
√
|
1587 |
+
2q2z
|
1588 |
+
tan
|
1589 |
+
˜θ
|
1590 |
+
2, νT ′ = tan
|
1591 |
+
˜θ
|
1592 |
+
2
|
1593 |
+
�
|
1594 |
+
�
|
1595 |
+
�
|
1596 |
+
�Q2
|
1597 |
+
q2
|
1598 |
+
z
|
1599 |
+
+ tan2 ˜θ
|
1600 |
+
2,
|
1601 |
+
and ˜θ = θ′
|
1602 |
+
e − θe is the angle between the incoming and outgoing electron. The response
|
1603 |
+
functions RX depend upon the hadronic helicity amplitudes and the azimuthal angle φp of
|
1604 |
+
the hadronic scattering plane. The subscripts refer to the polarization of the intermediate
|
1605 |
+
photon, which enters on substitution of the polarization expansion (5.6) for the numerator
|
1606 |
+
of the photon propagator in the hadronic amplitude (5.5). The amplitude then decomposes
|
1607 |
+
into separate leptonic and hadronic factors
|
1608 |
+
Med(λ′
|
1609 |
+
p, λ′
|
1610 |
+
n, λ′
|
1611 |
+
e; λd, λe) = −
|
1612 |
+
1
|
1613 |
+
�
|
1614 |
+
λ=−1
|
1615 |
+
¯u′
|
1616 |
+
e̸ ǫ∗(λ)ue
|
1617 |
+
(−1)λ
|
1618 |
+
Q2
|
1619 |
+
ǫν(λ)Mν(λ′
|
1620 |
+
p, λ′
|
1621 |
+
n, λd).
|
1622 |
+
(5.10)
|
1623 |
+
The leptonic factors give rise to the νX coefficients, and the hadronic factors to the response
|
1624 |
+
functions in the square of the amplitude used to construct the cross section [15].
|
1625 |
+
The
|
1626 |
+
subscript L(T) indicates a purely longitudinal (transverse) contribution, while LT is a cross
|
1627 |
+
term between longitudinal and transverse photon helicities. The TT subscript marks a cross
|
1628 |
+
term between different transverse helicities. A prime indicates a different combination of
|
1629 |
+
transverse helicities.
|
1630 |
+
The response functions are computed from components of the hadronic tensor
|
1631 |
+
wλ′,λ = 2
|
1632 |
+
3
|
1633 |
+
�
|
1634 |
+
λ′′p,λ′p,λ′n,λ′′
|
1635 |
+
d,λd
|
1636 |
+
ǫ∗
|
1637 |
+
ν(λ′)Mν∗(λ′′
|
1638 |
+
p, λ′
|
1639 |
+
n, λ′′
|
1640 |
+
d)ρp
|
1641 |
+
λ′′p,λ′pǫµ(λ)Mµ(λ′
|
1642 |
+
p, λ′
|
1643 |
+
n, λd)ρd
|
1644 |
+
λ′′
|
1645 |
+
d,λd,
|
1646 |
+
(5.11)
|
1647 |
+
with ρp(ρd) the density matrix for the proton (deuteron) helicity state. We construct these
|
1648 |
+
in the xyz coordinate system of the electron scattering plane. The particular components
|
1649 |
+
are [6]
|
1650 |
+
RL = w0,0, RT = w1,1 + w−1,−1, RT ′ = w1,1 − w−1,−1,
|
1651 |
+
(5.12)
|
1652 |
+
RTT = 2Rew1,−1, RLT = −2Re [w0,1 − w0,−1] , RLT ′ = −2Re [w0,1 + w0,−1] .
|
1653 |
+
5 In [6], h is 2λe but in [15], h is just λe, which leads to additional factors of 2.
|
1654 |
+
20
|
1655 |
+
|
1656 |
+
For an unpolarized target, the deuteron density matrix is proportional to the identity,
|
1657 |
+
ρd =
|
1658 |
+
1
|
1659 |
+
3I; similarly, if the proton helicity is not detected, ρp =
|
1660 |
+
1
|
1661 |
+
2I.
|
1662 |
+
We then have the
|
1663 |
+
unpolarized cross section [6]
|
1664 |
+
dσunpol = mpmn|⃗p ′
|
1665 |
+
p|
|
1666 |
+
16π3md
|
1667 |
+
σMott
|
1668 |
+
frec
|
1669 |
+
σ0, σ0 ≡ νLRU
|
1670 |
+
L + νTRU
|
1671 |
+
T + νTTRU
|
1672 |
+
TT + νLTRU
|
1673 |
+
LT ,
|
1674 |
+
(5.13)
|
1675 |
+
where the RU
|
1676 |
+
X are computed with the simple density matrices. These are then computable
|
1677 |
+
in our model, with the basic computation being the evaluation of ǫ(λγ)µMµ, which differs
|
1678 |
+
from the photodisintegration calculation in only two ways: Q2 is not zero and λγ ranges
|
1679 |
+
over all three possibilities.
|
1680 |
+
The unpolarized response functions RU
|
1681 |
+
LT ′ and RU
|
1682 |
+
T ′ are identically zero. With ρd replaced
|
1683 |
+
by 1
|
1684 |
+
3I and the form (5.7) of the polarization vectors taken into account, Rew(0, 1) is just
|
1685 |
+
the negative of Rew(0, −1), and w1,1 is equal to w−1,−1. Thus, the inputs to RU
|
1686 |
+
LT ′ and RU
|
1687 |
+
T ′,
|
1688 |
+
as given in (5.12), immediately cancel.
|
1689 |
+
The recent ed → e′pn experiment at JLab [17] does not include polarization but does
|
1690 |
+
begin to reach momentum transfers sufficient to consider the RNHA approach. Once po-
|
1691 |
+
larization data is available, the expressions developed here and in the Appendix can be
|
1692 |
+
compared.
|
1693 |
+
VI.
|
1694 |
+
SUMMARY
|
1695 |
+
We have extended the reduced nuclear amplitude approach [1, 2] to helicity amplitudes
|
1696 |
+
and applied this model to analysis of elastic electron-deuteron scattering, deuteron photo-
|
1697 |
+
disintegration, and deuteron electrodisintegration. These are just examples of the approach,
|
1698 |
+
which is generally applicable to exclusive nuclear processes. The primary limitation is that,
|
1699 |
+
for any process, the net momentum transfer to every nucleon must be large; therefore,
|
1700 |
+
as the number of nucleons increases, the required beam energy can increase dramatically.
|
1701 |
+
The primary gain is precocious scaling in the dependence on momentum transfer. What the
|
1702 |
+
model (or the original RNA approach) does not provide, though, is an overall normalization;
|
1703 |
+
comparisons must be made in terms of ratios.
|
1704 |
+
By considering helicity amplitudes, many more quantities can be studied, including po-
|
1705 |
+
larization dependence. All three of the deuteron’s electromagnetic form factors can be cal-
|
1706 |
+
culated and from there various elastic scattering observables can be constructed. In Sec. III
|
1707 |
+
we considered the standard structure functions A and B as well as the tensor polarizations
|
1708 |
+
t2m. Generally, the model implies the need for momentum transfers larger than one would
|
1709 |
+
have hoped for seeing simple perturbative QCD scaling. However, our results do imply that
|
1710 |
+
the deuteron structure function B is a good place to look, above a transfer of 10 GeV2.
|
1711 |
+
The RNHA results for polarization observables in deuteron photodisintegration, consid-
|
1712 |
+
ered in Sec. IV, are somewhat consistent with experiment. In particular, our result for the
|
1713 |
+
asymmetry Σ, with a value of Σ(90◦) ≃ −0.06, is much better than the value of -1 originally
|
1714 |
+
expected [52]. Higher photon energies would, of course, be useful.
|
1715 |
+
We have also constructed the RNHA framework for analysis of deuteron electrodisinte-
|
1716 |
+
gration, in Sec. V. This stands ready for comparison with experiment when data is available
|
1717 |
+
at sufficient energies. One aspect that does remain is to consider polarization of the outgoing
|
1718 |
+
proton, in addition to polarization of the beam and target.
|
1719 |
+
Other processes that one might consider include deeply virtual Compton scattering on
|
1720 |
+
the deuteron, pion photoproduction on the deuteron [3], and photodisintegration of 3He [4].
|
1721 |
+
21
|
1722 |
+
|
1723 |
+
In each case, our approach can provide not only information about helicity amplitudes but
|
1724 |
+
also an analysis of nonleading momentum transfer dependence with respect to the onset of
|
1725 |
+
perturbative QCD scaling. We look forward to experiments at larger momentum transfers
|
1726 |
+
for all of these processes.
|
1727 |
+
ACKNOWLEDGMENTS
|
1728 |
+
This work began in conversations with S.J. Brodsky and D.-S. Hwang. Some calculations
|
1729 |
+
were checked by W. Miller and C. Salveson. Diagrams were drawn with use of JaxoDraw [53].
|
1730 |
+
Appendix A: Electrodisintegration with polarization
|
1731 |
+
If we consider polarization for the beam and the target,6 the proton density matrix is
|
1732 |
+
still just ρp = 1
|
1733 |
+
2I, but the deuteron density matrix in the xyz frame is [6]
|
1734 |
+
ρd = 1
|
1735 |
+
3
|
1736 |
+
|
1737 |
+
|
1738 |
+
|
1739 |
+
|
1740 |
+
|
1741 |
+
1 +
|
1742 |
+
�
|
1743 |
+
3
|
1744 |
+
2T10 +
|
1745 |
+
1
|
1746 |
+
√
|
1747 |
+
2T20 −
|
1748 |
+
�
|
1749 |
+
3
|
1750 |
+
2(T ∗
|
1751 |
+
11 + T ∗
|
1752 |
+
21)
|
1753 |
+
√
|
1754 |
+
3T ∗
|
1755 |
+
22
|
1756 |
+
−
|
1757 |
+
�
|
1758 |
+
3
|
1759 |
+
2(T11 + T21)
|
1760 |
+
1 −
|
1761 |
+
√
|
1762 |
+
2T20
|
1763 |
+
−
|
1764 |
+
�
|
1765 |
+
3
|
1766 |
+
2(T ∗
|
1767 |
+
11 − T ∗
|
1768 |
+
21)
|
1769 |
+
√
|
1770 |
+
3T22
|
1771 |
+
−
|
1772 |
+
�
|
1773 |
+
3
|
1774 |
+
2(T11 − T21) 1 −
|
1775 |
+
�
|
1776 |
+
3
|
1777 |
+
2T10 +
|
1778 |
+
1
|
1779 |
+
√
|
1780 |
+
2T20
|
1781 |
+
|
1782 |
+
|
1783 |
+
|
1784 |
+
|
1785 |
+
.
|
1786 |
+
(A1)
|
1787 |
+
For a target polarization defined relative to the beam direction, rather than the xyz system
|
1788 |
+
used above, the tensor polarization coefficients TJM are related to the coefficients ˜TJM defined
|
1789 |
+
relative to the beam [6]. If only ˜T10 and ˜T20 are nonzero,7 the nonzero TJM are
|
1790 |
+
T10 = cos ˜θ ˜T10, T11 = − 1
|
1791 |
+
√
|
1792 |
+
2 sin ˜θ ˜T10,
|
1793 |
+
(A2)
|
1794 |
+
T20 = 1
|
1795 |
+
4(1 + 3 cos 2˜θ) ˜T20, T21 = −
|
1796 |
+
�
|
1797 |
+
3
|
1798 |
+
8 sin 2˜θ ˜T20, T22 =
|
1799 |
+
�
|
1800 |
+
3
|
1801 |
+
32(1 − cos 2˜θ) ˜T20.
|
1802 |
+
The density matrix can then be written as
|
1803 |
+
ρd =
|
1804 |
+
�1
|
1805 |
+
3I + ˜T10ρdV + ˜T20ρdT
|
1806 |
+
�
|
1807 |
+
,
|
1808 |
+
(A3)
|
1809 |
+
where
|
1810 |
+
ρdV = 1
|
1811 |
+
3
|
1812 |
+
|
1813 |
+
|
1814 |
+
|
1815 |
+
|
1816 |
+
|
1817 |
+
�
|
1818 |
+
3
|
1819 |
+
2 cos ˜θ
|
1820 |
+
√
|
1821 |
+
3
|
1822 |
+
2 sin ˜θ
|
1823 |
+
0
|
1824 |
+
√
|
1825 |
+
3
|
1826 |
+
2 sin ˜θ
|
1827 |
+
0
|
1828 |
+
√
|
1829 |
+
3
|
1830 |
+
2 sin ˜θ
|
1831 |
+
0
|
1832 |
+
√
|
1833 |
+
3
|
1834 |
+
2 sin ˜θ −
|
1835 |
+
�
|
1836 |
+
3
|
1837 |
+
2 cos ˜θ
|
1838 |
+
|
1839 |
+
|
1840 |
+
|
1841 |
+
|
1842 |
+
|
1843 |
+
(A4)
|
1844 |
+
and
|
1845 |
+
ρdT = 1
|
1846 |
+
3
|
1847 |
+
|
1848 |
+
|
1849 |
+
|
1850 |
+
|
1851 |
+
1
|
1852 |
+
4
|
1853 |
+
√
|
1854 |
+
2(1 + 3 cos 2˜θ)
|
1855 |
+
3
|
1856 |
+
4 sin 2˜θ
|
1857 |
+
3
|
1858 |
+
√
|
1859 |
+
32(1 − cos 2˜θ)
|
1860 |
+
3
|
1861 |
+
4 sin 2˜θ
|
1862 |
+
−
|
1863 |
+
1
|
1864 |
+
2
|
1865 |
+
√
|
1866 |
+
2(1 + 3 cos 2˜θ)
|
1867 |
+
−3
|
1868 |
+
4 sin 2˜θ
|
1869 |
+
3
|
1870 |
+
√
|
1871 |
+
32(1 − cos 2˜θ)
|
1872 |
+
−3
|
1873 |
+
4 sin 2˜θ
|
1874 |
+
1
|
1875 |
+
4
|
1876 |
+
√
|
1877 |
+
2(1 + 3 cos 2˜θ)
|
1878 |
+
|
1879 |
+
|
1880 |
+
|
1881 |
+
.
|
1882 |
+
(A5)
|
1883 |
+
6 For discussion of a polarized outgoing proton, see [7] and [15].
|
1884 |
+
7 The spherical tensor moments are related to the Cartesian tensor moments as ˜T10 =
|
1885 |
+
�
|
1886 |
+
3
|
1887 |
+
2Pz and ˜T20 =
|
1888 |
+
1
|
1889 |
+
√
|
1890 |
+
2Pzz.
|
1891 |
+
22
|
1892 |
+
|
1893 |
+
The response functions can then be separated into unpolarized, vector, and tensor contri-
|
1894 |
+
butions as RX = RU
|
1895 |
+
X + ˜T10RV
|
1896 |
+
X + ˜T20RT
|
1897 |
+
X, with RU
|
1898 |
+
X, RV
|
1899 |
+
X, and RT
|
1900 |
+
X computed with ρd replaced
|
1901 |
+
by 1
|
1902 |
+
3I, ρdV , and ρdT , respectively.
|
1903 |
+
With dσunpol defined as the unpolarized cross section, given in (5.13), the full cross section
|
1904 |
+
can be written as
|
1905 |
+
dσ =
|
1906 |
+
�
|
1907 |
+
1 + ˜T10
|
1908 |
+
�
|
1909 |
+
AV
|
1910 |
+
d + 2λeAV
|
1911 |
+
ed
|
1912 |
+
�
|
1913 |
+
+ ˜T20
|
1914 |
+
�
|
1915 |
+
AT
|
1916 |
+
d + 2λeAT
|
1917 |
+
ed
|
1918 |
+
��
|
1919 |
+
dσunpol,
|
1920 |
+
(A6)
|
1921 |
+
in terms of the single and double asymmetries
|
1922 |
+
AV
|
1923 |
+
d =
|
1924 |
+
�
|
1925 |
+
νLRV
|
1926 |
+
L + νTRV
|
1927 |
+
T + νTTRV
|
1928 |
+
TT + νLT RV
|
1929 |
+
LT
|
1930 |
+
�
|
1931 |
+
/σ0,
|
1932 |
+
(A7)
|
1933 |
+
AV
|
1934 |
+
ed =
|
1935 |
+
�
|
1936 |
+
νLT ′RV
|
1937 |
+
LT ′ + νT ′RV
|
1938 |
+
T ′
|
1939 |
+
�
|
1940 |
+
/σ0,
|
1941 |
+
(A8)
|
1942 |
+
AT
|
1943 |
+
d =
|
1944 |
+
�
|
1945 |
+
νLRT
|
1946 |
+
L + νTRT
|
1947 |
+
T + νTTRT
|
1948 |
+
TT + νLTRT
|
1949 |
+
LT
|
1950 |
+
�
|
1951 |
+
/σ0,
|
1952 |
+
(A9)
|
1953 |
+
AT
|
1954 |
+
ed =
|
1955 |
+
�
|
1956 |
+
νLT ′RT
|
1957 |
+
LT ′ + νT ′RT
|
1958 |
+
T ′
|
1959 |
+
�
|
1960 |
+
/σ0.
|
1961 |
+
(A10)
|
1962 |
+
For a recent summary of data, see [54].
|
1963 |
+
[1] S.J. Brodsky and B.T. Chertok, The deuteron form-factor and the short distance behavior of
|
1964 |
+
the nuclear force, Phys. Rev. Lett. 37, 269 (1976); The asymptotic form-factors of hadrons
|
1965 |
+
and nuclei and the continuity of particle and nuclear dynamics, Phys. Rev. D 14, 3003 (1976).
|
1966 |
+
[2] S.J. Brodsky and J.R. Hiller, Reduced nuclear amplitudes in Quantum Chromodynamics,
|
1967 |
+
Phys. Rev. C 28, 475 (1983); 30, 412E (1984).
|
1968 |
+
[3] S. J. Brodsky, J. R. Hiller, C. R. Ji, and G. A. Miller, Perturbative QCD and factorization of
|
1969 |
+
coherent pion photoproduction on the deuteron, Phys. Rev. C 64, 055204 (2001).
|
1970 |
+
[4] S. J. Brodsky, L. Frankfurt, R. A. Gilman, J. R. Hiller, G. A. Miller, E. Piasetzky, M. Sargsian,
|
1971 |
+
and M. Strikman, Hard photodisintegration of a proton pair in 3He, Phys. Lett. B 578, 69
|
1972 |
+
(2004).
|
1973 |
+
[5] S. Jeschonnek and J.W. Van Orden, Modeling quark-hadron duality in polarization observ-
|
1974 |
+
ables, Phys. Rev. D 71, 054019 (2005); A new calculation for D(e, e′p)n at GeV energies,
|
1975 |
+
Phys. Rev. C 78, 014007 (2008).
|
1976 |
+
[6] S. Jeschonnek and J.W. Van Orden, Target polarization for 2⃗H(e, e′p) at GeV energies, Phys.
|
1977 |
+
Rev. C 80, 054001 (2009).
|
1978 |
+
[7] S. Jeschonnek and J.W. Van Orden, Ejectile polarization for 2H(e, e′⃗p) at GeV energies, Phys.
|
1979 |
+
Rev. C 81, 014008 (2010).
|
1980 |
+
[8] W. P. Ford, S. Jeschonnek and J. W. Van Orden, 2H(e, e′p) observables using a Regge model
|
1981 |
+
parameterization of final state interactions, Phys. Rev. C 87, 054006 (2013); Momentum
|
1982 |
+
distributions for 2H(e, e′p), Phys. Rev. C 90, 064006 (2014); S. Jeschonnek and J.W. Van
|
1983 |
+
Orden, Factorization breaking of AT
|
1984 |
+
d for polarized deuteron targets in a relativistic framework,
|
1985 |
+
Phys. Rev. C 95, 044001 (2017).
|
1986 |
+
[9] J.M. Laget, The electro-disintegration of few body systems revisited, Phys. Lett. B 609, 49
|
1987 |
+
(2005).
|
1988 |
+
[10] C. Ciofi delgi Atti and L.P. Kaptari, A non factorized calculation of the process 3He(e, e′p)2H
|
1989 |
+
at medium energies, Phys. Rev. Lett. 100, 122301 (2008).
|
1990 |
+
23
|
1991 |
+
|
1992 |
+
[11] M.M. Sargsian, Large Q2 electrodisintegration of the deuteron in virtual nucleon approxima-
|
1993 |
+
tion, Phys. Rev. C 82, 014612 (2010)
|
1994 |
+
[12] H. Arenh¨ovel, W. Leidemann, and E.L. Tomusiak, General formulae for polarization observ-
|
1995 |
+
ables in deuteron electrodisintegration and linear relations, Few Body Syst. 15, 109 (1993);
|
1996 |
+
General survey of polarization observables in deuteron electrodisintegration, Eur. Phys. J. A
|
1997 |
+
23, 147 (2005).
|
1998 |
+
[13] G.I. Gakh, A.P. Rekalo, and E. Tomasi-Gustafsson, Relativistically invariant analysis of po-
|
1999 |
+
larization effects in exclusive deuteron electrodisintegration process, Ann. Phys. 319, 150
|
2000 |
+
(2005).
|
2001 |
+
[14] A.S. Raskin and T.W. Donnelly, Polarization in coincidence electron scattering from nuclei,
|
2002 |
+
Ann. Phys. 191, 78 (1989).
|
2003 |
+
[15] V. Dmitrasinovic and F. Gross, A Comment on general formulae for polarization observables in
|
2004 |
+
deuteron electrodisintegration and linear relations, Few Body Syst. 20, 41 (1996); Polarization
|
2005 |
+
observables in deuteron photodisintegration and electrodisintegration, Phys. Rev. C 40, 2479
|
2006 |
+
(1989); 43, 1495E (1991).
|
2007 |
+
[16] C.E. Carlson, J.R. Hiller, and R.J. Holt, Relativistic QCD view of the deuteron, Ann. Rev.
|
2008 |
+
Nucl. Part. Sci. 47, 395 (1997).
|
2009 |
+
[17] C. Yero et al., Probing the deuteron at very large internal momenta, Phys. Rev. Lett. 125,
|
2010 |
+
262501 (2020).
|
2011 |
+
[18] C. Yero, Cross Section Measurements of Deuteron Electro-Disintegration at Very High Re-
|
2012 |
+
coil Momenta and Large 4-Momentum Transfers (Q2), Ph.D. thesis, Florida International
|
2013 |
+
University, Miami, Florida, 2020, [arXiv:2009.11343 [nucl-ex]].
|
2014 |
+
[19] W. Boeglin and M. Sargsian, Modern studies of the deuteron: From the lab frame to the light
|
2015 |
+
front, Int. J. Mod. Phys. E 24, 1530003 (2015).
|
2016 |
+
[20] R. A. Gilman and F. Gross, Electromagnetic structure of the deuteron, J. Phys. G 28, R37
|
2017 |
+
(2002).
|
2018 |
+
[21] R.G. Arnold et al., Measurement of the electron-deuteron elastic-scattering cross section in
|
2019 |
+
the range 0.8 ≤ q2 ≤ 6 GeV2, Phys. Rev. Lett. 35, 776 (1975).
|
2020 |
+
[22] P.E. Bosted et al., Measurements of the deuteron and proton magnetic form factors at large
|
2021 |
+
momentum transfers, Phys. Rev. C 42, 38 (1990).
|
2022 |
+
[23] D. Abbot et al., Precise measurement of the deuteron elastic structure function A(Q2), Phys.
|
2023 |
+
Rev. Lett. 82, 1379 (1999).
|
2024 |
+
[24] L.C. Alexa et al., Measurements of the deuteron elastic structure function A(Q2) for 0.7 ≤
|
2025 |
+
Q2 ≤ 6.0 (GeV/c)2 at Jefferson Laboratory, Phys. Rev. Lett. 82, 1374 (1999).
|
2026 |
+
[25] D. Abbot et al., Measurement of tensor polarization in elastic electron-deuteron scattering at
|
2027 |
+
large momentum transfer, Phys. Rev. Lett. 84, 5053 (2000).
|
2028 |
+
[26] C. Bochna et al., Measurements of deuteron photodisintegration up to 4.0 GeV, Phys. Rev.
|
2029 |
+
Lett. 81, 4576 (1998).
|
2030 |
+
[27] E.C. Schulte et al., Measurement of the high energy two-body deuteron photodisintegration
|
2031 |
+
differential cross section, Phys. Rev. Lett. 87, 102302 (2001).
|
2032 |
+
[28] E.C. Schulte et al., High energy angular distribution measurements of the exclusive deuteron
|
2033 |
+
photodisintegration reaction, Phys. Rev. C 66, 042201 (2002).
|
2034 |
+
[29] M. Mirazita et al,. Complete angular distribution measurements of two-body deuteron photo-
|
2035 |
+
disintegration between 0.5 and 3 GeV, Phys. Rev. C 70, 014005 (2004).
|
2036 |
+
[30] W.-J. Kasdorp et al., Deuteron electrodisintegration at high missing momenta, Few Body
|
2037 |
+
Syst. 25, 115 (1998).
|
2038 |
+
24
|
2039 |
+
|
2040 |
+
[31] P.E. Ulmer et al., 2H(e, e′p)n reaction at high recoil momenta, Phys. Rev. Lett. 89, 062301
|
2041 |
+
(2002).
|
2042 |
+
[32] W.U. Boeglin et al., Probing the high momentum component of the deuteron at high Q2,
|
2043 |
+
Phys. Rev. Lett. 107, 262501 (2011).
|
2044 |
+
[33] K. S. Egiyan et al., Experimental study of exclusive 2H(e, e′p)n reaction mechanisms at high
|
2045 |
+
Q2, Phys. Rev. Lett. 98 262502 (2007)
|
2046 |
+
[34] S.J. Brodsky, C.-R. Ji, and G.P. Lepage, Quantum Chromodynamic predictions for the
|
2047 |
+
deuteron form factor, Phys. Rev. Lett. 51, 83 (1983).
|
2048 |
+
[35] M.M. Sargsian, Polarization observables in hard rescattering mechanism of deuteron photo-
|
2049 |
+
disintegration, Phys. Lett. B 587, 41 (2004).
|
2050 |
+
[36] V.Yu. Grishina et al, Forward-backward angle asymmetry and polarization observables in
|
2051 |
+
high-energy deuteron photodisintegration, Euro. Phys. J. A 19, 117 (2004).
|
2052 |
+
[37] V.A. Knyr, V.G. Neudachin, and N.A. Khokhlov, Description of polarization data for deuteron
|
2053 |
+
photodisintegration at photon energies in the range Eγ = 1.5-2.5 GeV on the basis of the
|
2054 |
+
Moscow potential of NN interaction, Phys. Atom. Nucl. 70, 2152 (2007).
|
2055 |
+
[38] N. Huseynova, S. Mamedov, and J. Samadov, Deuteron electromagnetic form factors
|
2056 |
+
and tensor polarization observables in the framework of the hard-wall AdS/QCD model,
|
2057 |
+
[arXiv:2204.06205 [hep-ph]].
|
2058 |
+
[39] T. Gutsche, V. E. Lyubovitskij, I. Schmidt and A. Vega, Nuclear physics in soft-wall
|
2059 |
+
AdS/QCD: Deuteron electromagnetic form factors, Phys. Rev. D 91, 114001 (2015);
|
2060 |
+
T. Gutsche, V. E. Lyubovitskij and I. Schmidt, Deuteron electromagnetic structure functions
|
2061 |
+
and polarization properties in soft-wall AdS/QCD, Phys. Rev. D 94, 116006 (2016).
|
2062 |
+
[40] S. Glaster et al., Elastic electron-deuteron scattering and the electric neutron form factor at
|
2063 |
+
four-momentum transfers 5 fm−2 < q2 < 14 fm−2, Nucl. Phys. B 32, 221 (1971); M.A. Preston
|
2064 |
+
and R.K. Bhaduri, Structure of the nucleon, (Addison-Wesley,Reading, MA, 1975).
|
2065 |
+
[41] M.D. Scadron, Advanced quantum theory and its applications through Feynman diagrams,
|
2066 |
+
(Springer, Berlin, 1991).
|
2067 |
+
[42] R.G. Arnold, C.E. Carlson, and F. Gross, Elastic electron-deuteron scattering at high-energy,
|
2068 |
+
Phys. Rev. C 21, 1426 (1980).
|
2069 |
+
[43] S.J. Brodsky and J.R. Hiller, Universal properties of the electromagnetic interactions of spin
|
2070 |
+
one systems, Phys. Rev. D 46, 2141 (1992).
|
2071 |
+
[44] C. E. Carlson and F. Gross, ‘Smoking gun’ signatures for QCD in nuclear physics, Phys. Rev.
|
2072 |
+
Lett. 53, 127 (1984).
|
2073 |
+
[45] S.D. Drell and T.M. Yan, Connection of elastic electromagnetic nucleon form-factors at large
|
2074 |
+
Q2 and deep inelastic structure functions near threshold, Phys. Rev. Lett. 24, 181 (1970).
|
2075 |
+
[46] R. Dymarz and F.C. Khanna, Tensor polarization of the deuteron in elastic e−D scattering,
|
2076 |
+
Phys. Rev. Lett. 56, 1448 (1986).
|
2077 |
+
[47] V.P. Barannik et al, Proton polarization in deuteron disintegration by linearly polarized pho-
|
2078 |
+
tons and dibaryon resonances, Nucl. Phys. A 451, 751 (1986).
|
2079 |
+
[48] K. Wijesooriya et al., Polarization measurements in high-energy deuteron photodisintegration,
|
2080 |
+
Phys. Rev. Lett. 86, 2975 (2001).
|
2081 |
+
[49] X. Jiang et al., Recoil-proton polarization in high-energy deuteron photodisintegration with
|
2082 |
+
circularly polarized photons, Phys. Rev. Lett. 98, 182302 (2007).
|
2083 |
+
[50] F. Adamian et al., Measurement of the cross-section asymmetry of deuteron photodisintegra-
|
2084 |
+
tion process by linearly polarized photons in the energy range Eγ = 0.8 GeV to 1.6 GeV, Eur.
|
2085 |
+
Phys. J. A 8, 423 (2000).
|
2086 |
+
25
|
2087 |
+
|
2088 |
+
[51] S.J. Brodsky and G.P. Lepage, Helicity selection rules and tests of gluon spin in exclusive
|
2089 |
+
QCD processes, Phys. Rev. D 24, 2848 (1981).
|
2090 |
+
[52] S.I. Nagornyi, Yu.A. Kasatkin, and I.K. Kirichenko, Photodisintegration of the deuteron at
|
2091 |
+
Eγ > 1 GeV in the model of asymptotic amplitudes, Sov. J. Nucl. Phys. 55, 189 (1992) [Yad.
|
2092 |
+
Fiz. 55, 345 (1992)].
|
2093 |
+
[53] D. Binosi, J. Collins, C. Kaufhold, and L. Theussl, JaxoDraw: A Graphical user interface for
|
2094 |
+
drawing Feynman diagrams. Version 2.0 release notes, Comput. Phys. Commun. 180, 1709
|
2095 |
+
(2009); D. Binosi and L. Theussl, JaxoDraw: A Graphical user interface for drawing Feynman
|
2096 |
+
diagrams, Comput. Phys. Commun. 161, 76 (2004).
|
2097 |
+
[54] R. Mayer et al., Beam-target double-spin asymmetry in quasielastic electron scattering off the
|
2098 |
+
deuteron with CLAS, Phys. Rev. C 95, 024005 (2017).
|
2099 |
+
26
|
2100 |
+
|
1tA0T4oBgHgl3EQfMv-f/content/tmp_files/load_file.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
39E0T4oBgHgl3EQfvAGt/content/2301.02613v1.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:ca22543b774078f0d57fe8548443eced6dac4817703e2756258538da100ac276
|
3 |
+
size 16972427
|
39FST4oBgHgl3EQfZTjC/content/2301.13791v1.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:768ce108945b30fbe6ec3e2ad904ed1d5d520de3b8a6a44565866b1d5aa456c1
|
3 |
+
size 2577352
|
39FST4oBgHgl3EQfZTjC/vector_store/index.faiss
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:49ab50c75885b5bfd0157d45291c1afdd90f71f0da990ebf1b4887cd5fb01a8a
|
3 |
+
size 5898285
|
39FST4oBgHgl3EQfZTjC/vector_store/index.pkl
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:4ba83fe2d88e850e7b0e10e749f8df85685465d5e81ac0322c187156f5247aba
|
3 |
+
size 249884
|
3tFST4oBgHgl3EQfZDim/content/tmp_files/2301.13790v1.pdf.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
3tFST4oBgHgl3EQfZDim/content/tmp_files/load_file.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
49E1T4oBgHgl3EQfmQS7/vector_store/index.pkl
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:83c50802be53408269e9fe8c7a618fe0f5dc755690384244abf0e96970ed1bc2
|
3 |
+
size 75432
|
59E3T4oBgHgl3EQfpgot/content/tmp_files/2301.04642v1.pdf.txt
ADDED
@@ -0,0 +1,855 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
Recursive Fermi-operator expansion strategies to accelerate subspace
|
2 |
+
diagonalization for large eigenvalue problems in density functional theory
|
3 |
+
Sameer Khadatkar1 and Phani Motamarri1
|
4 |
+
Indian Institute of Science, Bengaluru, India.
|
5 |
+
(*Electronic mail: [email protected])
|
6 |
+
Quantum mechanical calculations for material modeling using density functional theory (DFT) involves solving a
|
7 |
+
large-scale nonlinear eigenvalue problem. These calculations are computationally demanding and have asymptotic
|
8 |
+
cubic scaling complexity with the number of electrons in the material system. The efficient computational strategies
|
9 |
+
used to solve these large nonlinear DFT eigenvalue problems rely on iterative orthogonal projection methods. The
|
10 |
+
Rayleigh-Ritz projection step and the subspace diagonalization incur the dominant computational cost in these projec-
|
11 |
+
tion methods. In this work, we explore scalable polynomial expansion based on recursive Fermi-operator expansion
|
12 |
+
approaches using mixed-precision arithmetic as an alternative to subspace diagonalization of the projected Hamiltonian
|
13 |
+
to reduce the computational cost. The performance and accuracy of these approaches have been thoroughly assessed by
|
14 |
+
comparing them with the explicit diagonalization approach using the state-of-the-art ELPA library on both multinode
|
15 |
+
CPUs and GPUs.
|
16 |
+
I.
|
17 |
+
INTRODUCTION
|
18 |
+
Eigenvalue problems are frequently encountered in many
|
19 |
+
scientific disciplines. For instance, the accurate and efficient
|
20 |
+
computation of eigenvectors and eigenvalues is critical in the
|
21 |
+
study of resonance, understanding the stability of fluid flows
|
22 |
+
subjected to small perturbations, obtaining insights into vibra-
|
23 |
+
tional modes of lattices, dimensionality reduction, and many
|
24 |
+
more.
|
25 |
+
Another well-known and challenging application of
|
26 |
+
eigenvalue problems is in the area of quantum modeling of
|
27 |
+
materials using Kohn-Sham density functional theory (DFT)1,
|
28 |
+
which has been immensely successful in providing critical in-
|
29 |
+
sights into various ground-state material properties. To com-
|
30 |
+
pute the ground-state electronic structure in DFT, one is con-
|
31 |
+
fronted with solving a large-scale nonlinear eigenvalue prob-
|
32 |
+
lem using a self-consistent field iteration procedure (SCF) for
|
33 |
+
N smallest eigenvalue/eigenvector pairs, with N being pro-
|
34 |
+
portional to the number of electrons in the material system.
|
35 |
+
This results in asymptotic cubic complexity O(N3) with the
|
36 |
+
number of electrons for DFT, making these calculations com-
|
37 |
+
putationally demanding and often restrictive in terms of sys-
|
38 |
+
tem sizes that can be handled using widely used DFT codes.
|
39 |
+
Many of these codes employ plane-wave basis sets, which re-
|
40 |
+
strict simulation domains to periodic or atomic-orbital type
|
41 |
+
basis sets, which are not systematically convergent, and these
|
42 |
+
basis sets are not amenable for massive parallelization on par-
|
43 |
+
allel computing architectures. To extend the range of system
|
44 |
+
sizes to be studied, numerous past efforts have focused on de-
|
45 |
+
veloping systematically convergent real-space computational
|
46 |
+
methodologies 2–6 that have focused on reducing the prefac-
|
47 |
+
tor associated with the cubic computational complexity along-
|
48 |
+
side improving the parallel scalability, thereby enabling large-
|
49 |
+
scale DFT calculations up to 100,000 electrons. These real-
|
50 |
+
space DFT discretization approaches result in large sparse
|
51 |
+
Hermitian eigenvalue problems of the form Hψψψi = εh
|
52 |
+
i ψψψi to
|
53 |
+
be solved for N smallest eigenvalue/eigenvector pairs, with N
|
54 |
+
being proportional to M, the dimension of the sparse Hamil-
|
55 |
+
tonian matrix H (M ≈ 105 −107). We note that N depends on
|
56 |
+
the number of electrons in the material system and is usually
|
57 |
+
0.1 − 0.5% of M, the degrees of freedom (DoFs) used in the
|
58 |
+
simulation.
|
59 |
+
In the electronic structure community, the most popular
|
60 |
+
eigensolver strategies employed to solve these large DFT
|
61 |
+
eigenvalue problems include the Davidson approach, Lo-
|
62 |
+
cally Optimal Block Pre-conditioned Conjugate Gradient
|
63 |
+
(LOBPCG) method, or the Chebyshev filtered subspace it-
|
64 |
+
eration (ChFSI) approach. These eigensolvers belong to the
|
65 |
+
category of iterative orthogonal projection methods (IOP)
|
66 |
+
wherein the matrix H is orthogonally projected onto a care-
|
67 |
+
fully constructed subspace rich in the wanted eigenvectors
|
68 |
+
(Rayleigh-Ritz step), and subsequently, the resulting smaller
|
69 |
+
dense projected Hamiltonian Hp is explicitly diagonalized
|
70 |
+
(subspace diagonalization) to approximate the desired eigen-
|
71 |
+
value/eigenvector pairs of the H matrix.
|
72 |
+
The cubic scal-
|
73 |
+
ing computational cost of this subspace diagonalization step
|
74 |
+
dominates for medium to large-scale material systems (N >
|
75 |
+
20,000) in comparison to the costs associated with subspace
|
76 |
+
construction and Rayleigh-Ritz steps in IOP methods. For in-
|
77 |
+
stance, the authors6 employing the ChFSI approach have re-
|
78 |
+
ported that the subspace diagonalization constitutes roughly
|
79 |
+
30% of the total ChFSI cost for N ≈ 30,000, whereas it ac-
|
80 |
+
counts for around 56% of the total cost for N ≈ 50,000. To
|
81 |
+
this end, the current work explores recursive polynomial ex-
|
82 |
+
pansion approaches based on Fermi-operator expansion as an
|
83 |
+
alternative to the subspace diagonalization procedure to im-
|
84 |
+
prove the computational efficiency, thereby reducing the com-
|
85 |
+
putational prefactor associated with the cubic complexity of
|
86 |
+
the subspace diagonalization approach. Furthermore, the en-
|
87 |
+
ergy efficiency and parallel scaling efficiency of these ap-
|
88 |
+
proaches is examined on both multinode CPUs and multinode
|
89 |
+
GPUs.
|
90 |
+
Recursive polynomial expansion approaches (RPE) rely
|
91 |
+
on the key idea that constructing a density matrix (projec-
|
92 |
+
tor matrix corresponding to N smallest eigenvectors) suffices
|
93 |
+
to compute ground-state electronic structure in DFT at zero-
|
94 |
+
temperature without the necessity of knowing explicit eigen-
|
95 |
+
values and eigenvectors. These RPE approaches 7–12 have
|
96 |
+
been explored in the past for conducting ground-state DFT
|
97 |
+
calculations using atomic-orbital basis. However, the compu-
|
98 |
+
tational efficiency, scaling and energy efficiency of these ap-
|
99 |
+
proaches have not been explored in comparison to subspace
|
100 |
+
arXiv:2301.04642v1 [physics.comp-ph] 11 Jan 2023
|
101 |
+
|
102 |
+
2
|
103 |
+
diagonalization procedures for their use in iteration orthogo-
|
104 |
+
nal projection methods on multinode CPU and GPU architec-
|
105 |
+
tures. The evolving computing architectures in today’s ex-
|
106 |
+
ascale era place a heavy emphasis on scalable methodolo-
|
107 |
+
gies with a focus on reduced data movement and increased
|
108 |
+
arithmetic intensity, with an equal emphasis on using energy-
|
109 |
+
efficient algorithms. The current work assumes significance
|
110 |
+
in this regard and is useful for solving large-scale eigenvalue
|
111 |
+
problems arising from the discretization of DFT using sys-
|
112 |
+
tematically convergent basis sets employing IOP methods. To
|
113 |
+
this end, the key contributions of our current work, as de-
|
114 |
+
scribed in the subsequent sections, include – (a) efficient im-
|
115 |
+
plementation strategies of various recursive polynomial ex-
|
116 |
+
pansion (RPE) techniques based on Fermi-operator expansion
|
117 |
+
on both multinode CPU and GPU architectures for both zero-
|
118 |
+
temperature case and the finite-temperature case of Fermi-
|
119 |
+
dirac smearing of the occupancy function (b) design of mixed
|
120 |
+
precision strategies in conjunction with RPE to reduce com-
|
121 |
+
pute and data access costs (c) assessing accuracy, scaling effi-
|
122 |
+
ciency and energy efficiency of the proposed implementation
|
123 |
+
procedures by comparing it with explicit diagonalization al-
|
124 |
+
gorithms provided by state-of-the-art ELPA library13.
|
125 |
+
II.
|
126 |
+
RELATED WORK AND BACKGROUND
|
127 |
+
This section discusses key ideas central to recursive poly-
|
128 |
+
nomial expansion approaches which are used to approximate
|
129 |
+
the density matrix.
|
130 |
+
A.
|
131 |
+
Density matrix
|
132 |
+
At zero electronic temperature, the density matrix (D) can
|
133 |
+
be defined as a projector matrix corresponding to the lowest
|
134 |
+
occupied (Nocc ≤ N) eigenvectors of the Kohn-Sham Hamil-
|
135 |
+
tonian H matrix.
|
136 |
+
Mathematically, it takes the form of a
|
137 |
+
shifted Heaviside step function, θ(.), given by D = θ[µI−H].
|
138 |
+
The density matrix (D) in the case of finite-temperature is a
|
139 |
+
smeared version of zero-temperature density matrix and math-
|
140 |
+
ematically represented by a Fermi-operator matrix function
|
141 |
+
given by D = [eβ(H−µI) + I]−1, where, I denotes the identity
|
142 |
+
matrix, β = 1/(kBTe) is the inverse electronic temperature, µ
|
143 |
+
is the Fermi-energy, and H is the Hamiltonian matrix. Note
|
144 |
+
that the eigenvalues fi of D are referred to as occupancies. fi
|
145 |
+
is either 0 or 1 for a zero-temperature case whereas for the
|
146 |
+
case of a finite-temperature case, fi ∈ [0,1].
|
147 |
+
B.
|
148 |
+
Recursive polynomial expansion techniques to
|
149 |
+
approximate the density matrix
|
150 |
+
Two types of polynomial expansion schemes can be used
|
151 |
+
to approximate the density matrix – (a) Serial Fermi-operator
|
152 |
+
expansion schemes (Chebyshev Fermi-operator expansion
|
153 |
+
scheme14, Green’s function expansion scheme15, etc), (b)
|
154 |
+
Recursive Fermi-operator expansion schemes 8–12.
|
155 |
+
In this
|
156 |
+
work, we employ the latter approach i.e., the recursive Fermi-
|
157 |
+
operator expansion schemes as they are shown to be more ef-
|
158 |
+
ficient and can be used to approximate the density matrix for
|
159 |
+
both zero-temperature, and finite-temperature cases as well.
|
160 |
+
1.
|
161 |
+
Recursive Fermi-operator expansion for zero-temperature
|
162 |
+
density matrix (Z-RFOE)
|
163 |
+
The recursive Fermi-operator expansion8 involves succes-
|
164 |
+
sive projections of a matrix Xn, where X0 = H and Xn+1 =
|
165 |
+
F(Xn). The functions F(Xn) are chosen to project the eigen-
|
166 |
+
value spectrum of Xn to eigenvalues closer either to 1 or to 0.
|
167 |
+
Mathematically this can be represented as
|
168 |
+
D = θ(µI−H) ≈ Fm(Fm−1(...F0(H)...))
|
169 |
+
(1)
|
170 |
+
One of the most efficient techniques in Z-RFOE is to use the
|
171 |
+
second-order projection polynomials (SP2) 9 given by Xn+1 =
|
172 |
+
Fn(Xn) = Xn ± (Xn − X2
|
173 |
+
n). The SP2 here are continuously
|
174 |
+
increasing and decreasing functions in the interval [0, 1]. The
|
175 |
+
± sign is chosen to adjust the trace of Xn+1 in each projection
|
176 |
+
such that it converges to Nocc.
|
177 |
+
2.
|
178 |
+
Accelerated recursive polynomial expansion for
|
179 |
+
zero-temperature density matrix (A-Z-RFOE)
|
180 |
+
This technique works on the concept of shifting and scaling.
|
181 |
+
In Z-RFOE, we used SP2 polynomials, which either took the
|
182 |
+
form F(X) = X2 or F(X) = 2X−X2. In A-Z-RFOE, instead
|
183 |
+
of restricting ourselves to these fixed expansion functions, we
|
184 |
+
give it some freedom to choose the expansion functions such
|
185 |
+
that it moves the eigenvalues closer to either 1 or 0 faster. To
|
186 |
+
optimize the convergence, we chose the polynomial such that
|
187 |
+
each iteration gives the highest slope of projection around the
|
188 |
+
eigenvalues, which are rescaled values of the HOMO (Highest
|
189 |
+
Occupied Molecular Orbital) and LUMO (Lowest Unoccu-
|
190 |
+
pied Molecular Orbital) eigenvalues and done such that there
|
191 |
+
is no risk of eigenvalues switching the places between the oc-
|
192 |
+
cupied and the unoccupied states10.
|
193 |
+
3.
|
194 |
+
Recursive Fermi-operator expansion scheme for
|
195 |
+
finite-temperature cases (T-RFOE)
|
196 |
+
Finite-temperature density matrix has occupancies fi ∈
|
197 |
+
[0,1] and the SP2 recursion scheme discussed above is not
|
198 |
+
well suited for approximating density matrix with fractional
|
199 |
+
occupancies.
|
200 |
+
To this end, an intermediate function gener-
|
201 |
+
ated in Z-RFOE that is obtained before the convergence of
|
202 |
+
the algorithm to the projector matrix is used. This serves as a
|
203 |
+
smeared function to zero-temperature density matrix (Heavi-
|
204 |
+
side step function). To this end, the truncated expansion for
|
205 |
+
computing, the density matrix D can be given by the expres-
|
206 |
+
sion in (2).
|
207 |
+
Gm(H) = Fm(Fm−1(...F0(H)...))
|
208 |
+
(2)
|
209 |
+
Lower the electronic temperature Te higher will be the β value
|
210 |
+
(refer to Sec. IIA), and more recursion steps m will be re-
|
211 |
+
quired to approximate the density matrix11,12.
|
212 |
+
C.
|
213 |
+
Accuracy of the polynomial expansion procedures
|
214 |
+
The accuracy of the aforementioned polynomial expansion
|
215 |
+
procedures is given in terms of the degree npl of the polyno-
|
216 |
+
mial needed to approximate the density matrix and is given
|
217 |
+
by npl ∝ (εN −ε1) with ε1,εN being spectral bound estimates
|
218 |
+
|
219 |
+
3
|
220 |
+
of H16. It is well known that DFT discretized Hamiltonian H
|
221 |
+
using real-space approaches has large spectral width εN − ε1
|
222 |
+
resulting in higher npl for approximating the density matrix.
|
223 |
+
Often this leads to an inefficient computational procedure to
|
224 |
+
approximate the density matrix since the dimension of H can
|
225 |
+
be of O(105 −107).
|
226 |
+
III.
|
227 |
+
COMPUTATIONAL METHODOLOGY AND
|
228 |
+
IMPLEMENTATION
|
229 |
+
A.
|
230 |
+
Proposed methodology
|
231 |
+
Due to the aforementioned limitations of employing the re-
|
232 |
+
cursive polynomial expansion procedures on the real-space
|
233 |
+
discretized DFT Hamiltonian (H), we resort to iterative or-
|
234 |
+
thogonal projection (IOP) methods of solving a large sparse
|
235 |
+
eigenvalue problem and choose to work with the smaller dense
|
236 |
+
projected Hamiltonian Hp in the subspace rich with eigenvec-
|
237 |
+
tors of H. To this end, we employ the recursive polynomial
|
238 |
+
expansion procedures on Hp to approximate the density ma-
|
239 |
+
trix in the subspace as an alternative to explicit subspace diag-
|
240 |
+
onalization. Since the spectral width of Hp is commensurate
|
241 |
+
with spectral width corresponding to occupied eigenstates, it
|
242 |
+
is small and the proposed approach is computationally effi-
|
243 |
+
cient as demonstrated subsequently.
|
244 |
+
B.
|
245 |
+
Algorithmic details
|
246 |
+
Using Hp, Z-RFOE and A-Z-RFOE schemes employing
|
247 |
+
SP2 polynomials for approximating zero-temperature density
|
248 |
+
matrix and the T-RFOE scheme for the finite-temperature den-
|
249 |
+
sity matrix have been implemented in a distributed setting.
|
250 |
+
Figure 1 shows the schematic of the RFOE algorithm imple-
|
251 |
+
mented in the current work.
|
252 |
+
Furthermore, we also explored mixed-precision strategies
|
253 |
+
in conjunction with the RFOE schemes implemented in this
|
254 |
+
work. To this end, we rely on the fact that far away from
|
255 |
+
RFOE convergence to the appropriate density matrix, the
|
256 |
+
floating point operations involved in the initial RFOE itera-
|
257 |
+
tions can be performed in single precision (FP32) and switch-
|
258 |
+
ing to FP64 operations thereafter. The criteria to decide the
|
259 |
+
number of initial FP32 iterations is linked to relative trace
|
260 |
+
change of Xn (εtr) of two successive RFOE iterations. An es-
|
261 |
+
timate of εtr could be obtained by examining the dependence
|
262 |
+
of εtr on the relative change in occupied eigensubspace be-
|
263 |
+
tween the starting matrix X0 = Hp and the intermediate ma-
|
264 |
+
trices Xn generated during the course of RFOE. Our numerical
|
265 |
+
studies on smaller size representative Hp arising in DFT show
|
266 |
+
that εtr ≈ O(10−4) gives an acceptable error of O(10−7) with
|
267 |
+
respect to fully double precision (FP64) computation of the
|
268 |
+
density matrix.
|
269 |
+
C.
|
270 |
+
Implementation details
|
271 |
+
The multinode parallel implementation of RFOE codes was
|
272 |
+
done in C++ employing Message Passing Interface (MPI)
|
273 |
+
library.
|
274 |
+
Software for Linear Algebra Targeting Exascale
|
275 |
+
(SLATE) library17 was used for storing the parallel matrices
|
276 |
+
encountered during the course of RFOE. SLATE stores the
|
277 |
+
matrix in a 2-D block-cyclic manner on both CPUs and GPUs
|
278 |
+
within a node. The tile size is the most basic parameter that
|
279 |
+
can affect the SLATE routines’ performance. Numerical ex-
|
280 |
+
periments were conducted by varying the tile size to decide
|
281 |
+
the optimal tile size.
|
282 |
+
Some of the key aspects of the implementation are high-
|
283 |
+
lighted below:
|
284 |
+
1.
|
285 |
+
Trace Calculations
|
286 |
+
Traces of matrix squares are required during the course of
|
287 |
+
RFOE iterations and are computed by evaluating the square of
|
288 |
+
the Frobenius norm of the given symmetric matrix (Tr(A2) =
|
289 |
+
||A||2
|
290 |
+
F). To this end, Frobenius norm function available in the
|
291 |
+
SLATE library was used. Further, the computations of matrix
|
292 |
+
traces which was required only in the beginning and end of
|
293 |
+
RFOE involved a traversal through the diagonal elements of
|
294 |
+
the global matrix and the use of an MPI collective function.
|
295 |
+
2.
|
296 |
+
Matrix-matrix multiplication
|
297 |
+
The computationally dominant step in all the RFOE algo-
|
298 |
+
rithms implemented is the matrix-matrix multiplication step.
|
299 |
+
We used the SLATE library functions to perform this step
|
300 |
+
in parallel across multinode CPUs and GPUs. The perfor-
|
301 |
+
mance of the Communication-optimal Matrix Multiplication
|
302 |
+
(COSMA)18 and cuBLASMg (made available from CUDA
|
303 |
+
Math Library Early Access Program19) library was also ex-
|
304 |
+
plored to compute parallel matrix-matrix multiplications on
|
305 |
+
CPUs and GPUs.
|
306 |
+
Our studies indicates that COSMA was
|
307 |
+
slower in terms of computational times compared to the
|
308 |
+
SLATE library. And the cuBLASMg library is restricted to
|
309 |
+
multi-GPUs within a single node.
|
310 |
+
D.
|
311 |
+
Metrics for accuracy benchmarking of RFOE
|
312 |
+
For accuracy benchmarking of the RFOE methods imple-
|
313 |
+
mented, we computed two errors: (a) Relative error between
|
314 |
+
the exact and approximated density matrix (f(H)) using the
|
315 |
+
Frobenius norm, i.e ε1 = (||D − Dref ||F)/||Dref ||F, (b) Rela-
|
316 |
+
tive error between the trace of actual and the approximated
|
317 |
+
f(H)H, ε2 = (tr(DH) − tr(Dref H))/tr(Dref H).
|
318 |
+
Dref was
|
319 |
+
computed by explicit diagonalization using ELPA library13.
|
320 |
+
IV.
|
321 |
+
RESULTS AND DISCUSSION
|
322 |
+
In order to assess the accuracy and performance of the pro-
|
323 |
+
posed methods, we employ synthetic matrices representative
|
324 |
+
of the subspace projected Hamiltonians (Hp) arising in DFT
|
325 |
+
calculations.
|
326 |
+
To this end, the matrix Hp is constructed in
|
327 |
+
such a way that the spectral width is smaller and remains con-
|
328 |
+
stant with increase in matrix size. We choose H p
|
329 |
+
ij = H p
|
330 |
+
ji =
|
331 |
+
e−d∗|i−j| ∗ sin(i + 1), and the matrix sizes used were 8192 ×
|
332 |
+
8192, 16384 × 16384, 32768 × 32768, and 65536 × 65536.
|
333 |
+
The multinode CPU study was done on PARAM Pravega hav-
|
334 |
+
ing Intel Xeon Cascade Lake 8268 CPU (2.9 GHz) with 48
|
335 |
+
cores (96 threads) on each node, while multinode GPU study
|
336 |
+
was done on a local lab cluster having 16x (8 on each node)
|
337 |
+
NVIDIA Tesla V100 GPUs with 32 GB of memory.
|
338 |
+
|
339 |
+
4
|
340 |
+
FIG. 1: General implementation details flowchart for all the
|
341 |
+
RFOE codes
|
342 |
+
The performance metrics used for comparisons are:
|
343 |
+
• Node-hrs ⇒ Execution time (in hours) × the number
|
344 |
+
of nodes taken in the best scaling regime. It gives a
|
345 |
+
measure of computational efficiency on CPUs.
|
346 |
+
• GPU-hrs ⇒ Execution time (in hours) × the number
|
347 |
+
of GPUs taken in the best scaling regime. It gives a
|
348 |
+
measure of computational efficiency on GPUs.
|
349 |
+
• Minimum walltime ⇒ Least possible time for the job
|
350 |
+
execution using as many resources as possible. It is a
|
351 |
+
measure of scaling efficiency of the implementation.
|
352 |
+
• Energy consumption ⇒ Upper bound of the energy re-
|
353 |
+
quired by the job in kWh to run it on the supercomputer.
|
354 |
+
Indicative of the rupee cost required for the calculations
|
355 |
+
on the supercomputer. For the energy consumption cal-
|
356 |
+
culation we used the Thermal Design Power (TDP) rat-
|
357 |
+
ings for both CPUs and GPUs.
|
358 |
+
1.
|
359 |
+
Multinode CPU comparisons
|
360 |
+
Figure 2 shows that, all our RFOE implementations for
|
361 |
+
zero-temperature case are better than ELPA in terms of node-
|
362 |
+
hrs, which indicates that all of our implementations are com-
|
363 |
+
putationally efficient compared to ELPA. For instance, the A-
|
364 |
+
Z-RFOE results in a speedup of around 2x in comparison to
|
365 |
+
ELPA for the 65536 size matrix. In the minimum walltime
|
366 |
+
regime, we find that ELPA is slightly faster than the RFOE im-
|
367 |
+
plementation for the matrix sizes considered. Figure 3 shows
|
368 |
+
(a)
|
369 |
+
(b)
|
370 |
+
FIG. 2: (a) Node-hrs vs. matrix size plot, and (b) Min.
|
371 |
+
walltime vs. matrix size plot (Note: c stands for CPUs, n
|
372 |
+
stands for nodes) for different implementations of RFOEs for
|
373 |
+
zero-temperature case on multinode CPUs.
|
374 |
+
that, both our T-RFOE and mixed-precision T-RFOE imple-
|
375 |
+
mentations for finite-temperature case are better than ELPA in
|
376 |
+
terms of node-hrs (4.2x speedup of mixed-precision T-RFOE
|
377 |
+
implementation over ELPA for the 65536 size matrix), which
|
378 |
+
indicates that both of our implementations are computation-
|
379 |
+
ally efficient compared to ELPA. And, even in the minimum
|
380 |
+
walltime, mixed precision T-RFOE was found to be slightly
|
381 |
+
better than ELPA. The number of CPUs on which we got min-
|
382 |
+
imum walltime for different matrix sizes is also shown on the
|
383 |
+
minimum walltime plots.
|
384 |
+
2.
|
385 |
+
Multinode GPU comparisons
|
386 |
+
Figure 4 shows that, all our implementations for zero-
|
387 |
+
temperature case are better than ELPA up to 16384 size ma-
|
388 |
+
trix, and beyond this size, the mixed-precision Z-RFOE and
|
389 |
+
A-Z-RFOE are better than ELPA for GPU-hrs timings, which
|
390 |
+
indicates that both of our implementations are computation-
|
391 |
+
ally efficient compared to ELPA. Our A-Z-RFOE implemen-
|
392 |
+
tation gave 1.5x speedup over ELPA for the 32768 size ma-
|
393 |
+
trix. Due to the memory issue of ELPA, it does not work
|
394 |
+
on multinode GPUs up to 16 GPUs for the 65536 size ma-
|
395 |
+
trix, which indicates that the RFOE implementations use the
|
396 |
+
memory efficiently compared to ELPA. And for minimum
|
397 |
+
walltime, ELPA shows a better behaviour, suggesting that
|
398 |
+
the RFOE implementations are not scaling well on multinode
|
399 |
+
GPUs. Figure 5 shows that, our T-RFOE and mixed-precision
|
400 |
+
T-RFOE implementations for finite-temperature case are bet-
|
401 |
+
|
402 |
+
Initializations
|
403 |
+
Nocc : Occupancy number
|
404 |
+
So= Hp : Hamiltonian
|
405 |
+
(Defined on Distributed System)
|
406 |
+
Xo = WoSo+bol (on Parallel architectures)
|
407 |
+
Initial scaling using spectral bound estimates of H
|
408 |
+
Ns = Tr[Xo] (Using MPl_Allreduce)
|
409 |
+
While
|
410 |
+
(TrEr < Tolerance)
|
411 |
+
Final D Matrix
|
412 |
+
Xn = WXn-12 + bXn-1
|
413 |
+
Nx = IIXn-1ll-=2
|
414 |
+
FP32/FP64 GEMM for Xn-12
|
415 |
+
( IIXn-1]l==[Tr[Xn-13]1/2)
|
416 |
+
Xn and Xn-1 stored in 2-D
|
417 |
+
block-cyclic manner on
|
418 |
+
CPUs/GPUs
|
419 |
+
Compute w = f(Ns, Nx, Nocc)
|
420 |
+
and b = g(Ns, Nx, Nocc)
|
421 |
+
where f() and g(.) depends on
|
422 |
+
Update Ns using Nx and Ns
|
423 |
+
the expansion scheme (Z-RFOE
|
424 |
+
TrEr = abs(Ns - Nocc)
|
425 |
+
A-Z-RFOE, T-RFOE)5
|
426 |
+
ELPA
|
427 |
+
Double-PrecisionZ-RFOE
|
428 |
+
4
|
429 |
+
Mixed-Precision Z-RFOE
|
430 |
+
node-hrs
|
431 |
+
Double-Precision A-Z-RFOE
|
432 |
+
m
|
433 |
+
1
|
434 |
+
0
|
435 |
+
8192
|
436 |
+
16384
|
437 |
+
32768
|
438 |
+
65536
|
439 |
+
Matrix Size350
|
440 |
+
ELPA
|
441 |
+
(secs)
|
442 |
+
300
|
443 |
+
Double-Precision Z-RFOE
|
444 |
+
250
|
445 |
+
Mixed-PrecisionZ-RFOE
|
446 |
+
(6144c128n)
|
447 |
+
Double-Precision A-Z-RFOE
|
448 |
+
walltime
|
449 |
+
200
|
450 |
+
150
|
451 |
+
100
|
452 |
+
Min.
|
453 |
+
(6144c 128n)
|
454 |
+
(6144c128n)
|
455 |
+
(12288c256n)
|
456 |
+
50
|
457 |
+
(3072c64n)
|
458 |
+
←(12288c256n)
|
459 |
+
0
|
460 |
+
(3072c64n)
|
461 |
+
(12288c256n)
|
462 |
+
8192
|
463 |
+
16384
|
464 |
+
32768
|
465 |
+
65536
|
466 |
+
Matrix Size5
|
467 |
+
(a)
|
468 |
+
(b)
|
469 |
+
FIG. 3: (a) Node-hrs vs. matrix size plot, and (b) Min.
|
470 |
+
walltime vs. matrix size plot (Note: c stands for CPUs, n
|
471 |
+
stands for nodes) for different implementations of RFOEs for
|
472 |
+
finite-temperature case on multinode CPUs.
|
473 |
+
ter than ELPA for GPU-hrs timings (2.5x speedup of mixed-
|
474 |
+
precision T-RFOE implementation over ELPA for the 65536
|
475 |
+
size matrix), indicating that both implementations are com-
|
476 |
+
putationally efficient compared to ELPA. And, for minimum
|
477 |
+
walltime, our mixed-precision T-RFOE implementation is al-
|
478 |
+
most similar to or better than ELPA. The number of GPUs on
|
479 |
+
which we got minimum walltime for different matrix sizes is
|
480 |
+
shown on the minimum walltime plot.
|
481 |
+
3.
|
482 |
+
Energy consumption comparisons
|
483 |
+
Figure 6 shows that, in both the regimes of node-hrs/GPU-
|
484 |
+
hrs and minimum walltime, we are better than ELPA in terms
|
485 |
+
of energy consumption for zero-temperature case. Figure 7
|
486 |
+
shows that, in both the regimes of node-hrs/GPU-hrs and min-
|
487 |
+
imum walltime case, we are better than ELPA in terms of en-
|
488 |
+
ergy consumption for finite-temperature case. This indicates
|
489 |
+
that the rupee cost required for our calculations on the super-
|
490 |
+
computer will be less than ELPA for both zero-temperature
|
491 |
+
case and finite-temperature case of approximating the density
|
492 |
+
matrix.
|
493 |
+
4.
|
494 |
+
Accuracy benchmarking
|
495 |
+
The errors ε1 and ε2 (defined earlier) were of the O(10−10)
|
496 |
+
and O(10−09) for double-precision implementation of Z-
|
497 |
+
RFOE and A-Z-RFOE. And, were of the O(10−07) and
|
498 |
+
O(10−09) for mixed-precision implementation of Z-RFOE.
|
499 |
+
(a)
|
500 |
+
(b)
|
501 |
+
FIG. 4: (a) GPU-hrs vs. matrix size plot, and (b) Min.
|
502 |
+
walltime vs. matrix size plot for different implementations of
|
503 |
+
RFOEs for zero-temperature case on multinode GPUs.
|
504 |
+
(a)
|
505 |
+
(b)
|
506 |
+
FIG. 5: (a) GPU-hrs vs. matrix size plot, and (b) Min.
|
507 |
+
walltime vs. matrix size plot for different implementations of
|
508 |
+
RFOEs for finite-temperature case on multinode GPUs.
|
509 |
+
|
510 |
+
5
|
511 |
+
ELPA
|
512 |
+
Double-PrecisionT-RFOE
|
513 |
+
4
|
514 |
+
Mixed-Precision T-RFOE
|
515 |
+
node-hrs
|
516 |
+
m
|
517 |
+
N
|
518 |
+
1
|
519 |
+
0
|
520 |
+
8192
|
521 |
+
16384
|
522 |
+
32768
|
523 |
+
65536
|
524 |
+
Matrix Size160
|
525 |
+
ELPA
|
526 |
+
(12288c256n)
|
527 |
+
(secs)
|
528 |
+
140
|
529 |
+
Double-Precision T-RFOE
|
530 |
+
Mixed-PrecisionT-RFOE
|
531 |
+
120
|
532 |
+
(6144c128n)
|
533 |
+
Min. walltime
|
534 |
+
100
|
535 |
+
80
|
536 |
+
60
|
537 |
+
(6144c128n)
|
538 |
+
40
|
539 |
+
(6144c128n)
|
540 |
+
20
|
541 |
+
(3072c 64n)
|
542 |
+
(12288c256n)
|
543 |
+
0
|
544 |
+
(3072c64n)
|
545 |
+
(12288c256n)
|
546 |
+
8192
|
547 |
+
16384
|
548 |
+
32768
|
549 |
+
65536
|
550 |
+
Matrix Size1.75
|
551 |
+
ELPA
|
552 |
+
1.50
|
553 |
+
Double-Precision Z-RFOE
|
554 |
+
1.25
|
555 |
+
Mixed-PrecisionZ-RFOE
|
556 |
+
GPU-hrs
|
557 |
+
Double-Precision A-Z-RFOE
|
558 |
+
1.00
|
559 |
+
0.75
|
560 |
+
0.50
|
561 |
+
0.25
|
562 |
+
0.00
|
563 |
+
8192
|
564 |
+
16384
|
565 |
+
32768
|
566 |
+
65536
|
567 |
+
Matrix size700
|
568 |
+
ELPA
|
569 |
+
(SDos)
|
570 |
+
Double-Precision Z-RFOE
|
571 |
+
600
|
572 |
+
Mixed-Precision Z-RFOE
|
573 |
+
(8 GPUs)
|
574 |
+
Min. walltime
|
575 |
+
500
|
576 |
+
Double-Precision A-Z-RFOE
|
577 |
+
400
|
578 |
+
300
|
579 |
+
200
|
580 |
+
(8 GPUs)
|
581 |
+
100
|
582 |
+
(4 GPUs)
|
583 |
+
(6 GPUs)
|
584 |
+
(16 GPUS)
|
585 |
+
0
|
586 |
+
(6GPUS)
|
587 |
+
(16GPUs)
|
588 |
+
8192
|
589 |
+
16384
|
590 |
+
32768
|
591 |
+
65536
|
592 |
+
Matrix size0.8
|
593 |
+
ELPA
|
594 |
+
0.7
|
595 |
+
Double-Precision T-RFOE
|
596 |
+
0.6
|
597 |
+
Mixed-PrecisionT-RFOE
|
598 |
+
GPU-hrs
|
599 |
+
0.5
|
600 |
+
0.4
|
601 |
+
0.3
|
602 |
+
0.2
|
603 |
+
0.1
|
604 |
+
0.0
|
605 |
+
8192
|
606 |
+
16384
|
607 |
+
32768
|
608 |
+
65536
|
609 |
+
Matrix Size350
|
610 |
+
ELPA
|
611 |
+
(secs)
|
612 |
+
300
|
613 |
+
Double-PrecisionT-RFOE
|
614 |
+
Mixed-Precision T-RFOE
|
615 |
+
250
|
616 |
+
(8 GPUs)
|
617 |
+
Min. walltime
|
618 |
+
200
|
619 |
+
150
|
620 |
+
(8 GPUs)
|
621 |
+
100
|
622 |
+
(6 GPUs)
|
623 |
+
50
|
624 |
+
(4 GPUS)
|
625 |
+
(16GPUS)
|
626 |
+
0
|
627 |
+
(6GPUs)
|
628 |
+
(16-GPUs)
|
629 |
+
8192
|
630 |
+
16384
|
631 |
+
32768
|
632 |
+
65536
|
633 |
+
Matrix size6
|
634 |
+
(a)
|
635 |
+
(b)
|
636 |
+
FIG. 6: Energy consumption (kWh) vs. matrix size plot in
|
637 |
+
terms of (a) Node-hrs/GPU-hrs, and (b) Min. walltime for the
|
638 |
+
best implementation of RFOE for zero-temperature case.
|
639 |
+
(a)
|
640 |
+
(b)
|
641 |
+
FIG. 7: Energy consumption (kWh) vs. matrix size plot in
|
642 |
+
terms of (a) Node-hrs/GPU-hrs, and (b) Min. walltime for the
|
643 |
+
best implementation of RFOE for finite-temperature case.
|
644 |
+
For T-RFOE, the error ε1 was of the O(10−03) and ε2 was
|
645 |
+
of O(10−06). The density matrix approximated by T-RFOE
|
646 |
+
has an higher error compared to the Fermi-Dirac based den-
|
647 |
+
sity matrix. However, in DFT, the computation of material
|
648 |
+
properties relies on differences in energies and hence, the T-
|
649 |
+
RFOE approach can be viewed as an alternative approach to
|
650 |
+
smearing the zero-temperature density matrix, which can be
|
651 |
+
practically helpful in approximating finite-temperature den-
|
652 |
+
sity matrix.
|
653 |
+
V.
|
654 |
+
CONCLUSIONS
|
655 |
+
RFOE schemes, as expected, had a lesser computational
|
656 |
+
prefactor which made them computationally efficient com-
|
657 |
+
pared to ELPA in the node-hrs/GPU-hrs regime. In the case of
|
658 |
+
minimum walltimings, ELPA timings were better as it scaled
|
659 |
+
better than our RFOE implementations. Energy efficiency-
|
660 |
+
wise, the RFOE implementations were better on both multin-
|
661 |
+
ode CPUs and GPUs, which is directly proportional to the cost
|
662 |
+
required for the computations. In terms of memory utiliza-
|
663 |
+
tion, multinode GPU implementations of RFOE were better
|
664 |
+
than ELPA. From all the observations we can conclude that,
|
665 |
+
these techniques can be used whenever we have fewer com-
|
666 |
+
putational resources and have cost constraints.
|
667 |
+
1W. Kohn and L. J. Sham, “Self-consistent equations including exchange
|
668 |
+
and correlation effects,” Phys. Rev. 140, A1133–A1138 (1965).
|
669 |
+
2L. E. Ratcliff, W. Dawson, G. Fisicaro, D. Caliste, S. Mohr, A. Degomme,
|
670 |
+
B. Videau, V. Cristiglio, M. Stella, M. D’Alessandro, S. Goedecker,
|
671 |
+
T. Nakajima, T. Deutsch, and L. Genovese, “Flexibilities of wavelets as
|
672 |
+
a computational basis set for large-scale electronic structure calculations,”
|
673 |
+
The Journal of Chemical Physics 152, 194110 (2020).
|
674 |
+
3S. Ghosh and P. Suryanarayana, “SPARC: Accurate and efficient finite-
|
675 |
+
difference formulation and parallel implementation of density functional
|
676 |
+
theory: Isolated clusters,” Computer Physics Communications 212, 189–
|
677 |
+
204 (2017).
|
678 |
+
4S. Das, P. Motamarri, V. Gavini, B. Turcksin, Y. W. Li, and B. Leback,
|
679 |
+
“Fast, scalable and accurate finite-element based ab initio calculations using
|
680 |
+
mixed precision computing: 46 pflops simulation of a metallic dislocation
|
681 |
+
system,” in Proc. of the International Conference for High Performance
|
682 |
+
Computing, Networking, Storage and Analysis (2019).
|
683 |
+
5P. Motamarri, S. Das, S. Rudraraju, K. Ghosh, D. Davydov, and V. Gavini,
|
684 |
+
“DFT-FE – a massively parallel adaptive finite-element code for large-scale
|
685 |
+
density functional theory calculations,” Computer Physics Communications
|
686 |
+
246, 106853 (2020).
|
687 |
+
6S. Das, P. Motamarri, V. Subramanian, D. M. Rogers, and V. Gavini, “DFT-
|
688 |
+
FE 1.0: A massively parallel hybrid cpu-gpu density functional theory code
|
689 |
+
using finite-element discretization,” (2022).
|
690 |
+
7J. Finkelstein, J. S. Smith, S. M. Mniszewski, K. Barros, C. F. A. Negre,
|
691 |
+
E. H. Rubensson, and A. M. N. Niklasson, “Mixed precision fermi-operator
|
692 |
+
expansion on tensor cores from a machine learning perspective,” Journal of
|
693 |
+
Chemical Theory and Computation 17, 2256–2265 (2021).
|
694 |
+
8A. M. N. Niklasson, “Expansion algorithm for the density matrix,” Phys.
|
695 |
+
Rev. B 66, 155115 (2002).
|
696 |
+
9G. Beylkin, N. Coult,
|
697 |
+
and M. J. Mohlenkamp, “Fast spectral projec-
|
698 |
+
tion algorithms for density-matrix computations,” Journal of Computational
|
699 |
+
Physics 152, 32–54 (1999).
|
700 |
+
10E. H. Rubensson and A. M. N. Niklasson, “Accelerated density matrix ex-
|
701 |
+
pansions for born-oppenheimer molecular dynamics,” (2013).
|
702 |
+
11S. M. Mniszewski, R. Perriot, E. H. Rubensson, C. F. A. Negre, M. J. Cawk-
|
703 |
+
well, and A. M. N. Niklasson, “Linear scaling pseudo fermi-operator ex-
|
704 |
+
pansion for fractional occupation,” Journal of Chemical Theory and Com-
|
705 |
+
putation 15, 190–200 (2019).
|
706 |
+
12A. M. N. Niklasson, “A note on the pulay force at finite electronic temper-
|
707 |
+
atures,” The Journal of Chemical Physics 129, 244107 (2008).
|
708 |
+
13A. Marek, V. Blum, R. Johanni, V. Havu, B. Lang, T. Auckenthaler, A. Hei-
|
709 |
+
necke, H.-J. Bungartz, and H. Lederer, “The elpa library: Scalable parallel
|
710 |
+
|
711 |
+
2.0
|
712 |
+
CPUELPA
|
713 |
+
CPUDouble-PrecisionA-Z-RFOE
|
714 |
+
(yM)
|
715 |
+
GPU ELPA
|
716 |
+
1.5
|
717 |
+
GPUDouble-Precision A-Z-RFOE
|
718 |
+
Energy
|
719 |
+
1.0
|
720 |
+
0.5
|
721 |
+
0.0
|
722 |
+
8192
|
723 |
+
16384
|
724 |
+
32768
|
725 |
+
65536
|
726 |
+
Matrix Size3.5
|
727 |
+
CPU ELPA
|
728 |
+
3.0
|
729 |
+
CPUDouble-PrecisionA-Z-REOE
|
730 |
+
(kWh)
|
731 |
+
GPU ELPA
|
732 |
+
2.5
|
733 |
+
GPUDouble-Precision A-Z-RFOE
|
734 |
+
2.0
|
735 |
+
Energy
|
736 |
+
1.5
|
737 |
+
1.0
|
738 |
+
0.5
|
739 |
+
0.0
|
740 |
+
8192
|
741 |
+
16384
|
742 |
+
32768
|
743 |
+
65536
|
744 |
+
Matrix Size2.0
|
745 |
+
CPUELPA
|
746 |
+
CPUMixed-PrecisionT-RFOE
|
747 |
+
(yM)
|
748 |
+
GPU ELPA
|
749 |
+
1.5
|
750 |
+
GPUMixed-Precision T-RFOE
|
751 |
+
Energy
|
752 |
+
1.0
|
753 |
+
0.5
|
754 |
+
0.0
|
755 |
+
8192
|
756 |
+
16384
|
757 |
+
32768
|
758 |
+
65536
|
759 |
+
Matrix Size3.5
|
760 |
+
CPU ELPA
|
761 |
+
3.0
|
762 |
+
CPUMixed-PrecisionT-RFOE
|
763 |
+
(kWh)
|
764 |
+
GPU ELPA
|
765 |
+
2.5
|
766 |
+
GPUMixed-PrecisionT-RFOE
|
767 |
+
2.0
|
768 |
+
Energy
|
769 |
+
1.5
|
770 |
+
1.0
|
771 |
+
0.5
|
772 |
+
0.0
|
773 |
+
8192
|
774 |
+
16384
|
775 |
+
32768
|
776 |
+
65536
|
777 |
+
Matrix Size7
|
778 |
+
eigenvalue solutions for electronic structure theory and computational sci-
|
779 |
+
ence,” Journal of Physics: Condensed Matter 26, 213201 (2014).
|
780 |
+
14A. Weiße, G. Wellein, A. Alvermann, and H. Fehske, “The kernel polyno-
|
781 |
+
mial method,” Rev. Mod. Phys. 78, 275–306 (2006).
|
782 |
+
15R. Zeller, J. Deutz, and P. Dederichs, “Application of complex energy inte-
|
783 |
+
gration to selfconsistent electronic structure calculations,” Solid State Com-
|
784 |
+
munications 44, 993–997 (1982).
|
785 |
+
16S. Goedecker, “Linear scaling electronic structure methods,” Rev. Mod.
|
786 |
+
Phys. 71, 1085–1123 (1999).
|
787 |
+
17M. Gates, J. Kurzak, A. Charara, A. YarKhan, and J. Dongarra, “Slate:
|
788 |
+
Design of a modern distributed and accelerated linear algebra library,” in
|
789 |
+
Proc. of the International Conference for High Performance Computing,
|
790 |
+
Networking, Storage and Analysis (2019).
|
791 |
+
18G. Kwasniewski, M. Kabi´c, M. Besta, J. VandeVondele, R. Solcà,
|
792 |
+
and
|
793 |
+
T. Hoefler, “Red-blue pebbling revisited: Near optimal parallel matrix-
|
794 |
+
matrix multiplication,” in Proc. of the International Conference for High
|
795 |
+
Performance Computing, Networking, Storage and Analysis (2019).
|
796 |
+
19NVIDIA, “Cuda math library early access program,” .
|
797 |
+
20P. Motamarri, M. Nowak, K. Leiter, J. Knap, and V. Gavini, “Higher-order
|
798 |
+
adaptive finite-element methods for kohn–sham density functional theory,”
|
799 |
+
Journal of Computational Physics 253, 308–343 (2013).
|
800 |
+
21P. Motamarri and V. Gavini, “Subquadratic-scaling subspace projection
|
801 |
+
method for large-scale kohn-sham density functional theory calculations
|
802 |
+
using spectral finite-element discretization,” Physical Review B 90 (2014).
|
803 |
+
22R. McWeeny, “Some recent advances in density matrix theory,” Rev. Mod.
|
804 |
+
Phys. 32, 335–369 (1960).
|
805 |
+
23A. H. R. Palser and D. E. Manolopoulos, “Canonical purification of the den-
|
806 |
+
sity matrix in electronic-structure theory,” Phys. Rev. B 58, 12704–12711
|
807 |
+
(1998).
|
808 |
+
24T. Ozaki, “Continued fraction representation of the fermi-dirac function
|
809 |
+
for large-scale electronic structure calculations,” Phys. Rev. B 75, 035123
|
810 |
+
(2007).
|
811 |
+
25K. Németh and G. E. Scuseria, “Linear scaling density matrix search
|
812 |
+
based on sign matrices,” The Journal of Chemical Physics 113, 6035–6041
|
813 |
+
(2000).
|
814 |
+
26A. Holas, “Transforms for idempotency purification of density matrices in
|
815 |
+
linear-scaling electronic-structure calculations,” Chemical Physics Letters
|
816 |
+
340, 552–558 (2001).
|
817 |
+
27A. M. N. Niklasson, “Implicit purification for temperature-dependent den-
|
818 |
+
sity matrices,” Phys. Rev. B 68, 233104 (2003).
|
819 |
+
28D. K. Jordan and D. A. Mazziotti, “Comparison of two genres for linear
|
820 |
+
scaling in density functional theory: Purification and density matrix mini-
|
821 |
+
mization methods,” The Journal of Chemical Physics 122, 084114 (2005).
|
822 |
+
29E. Rudberg and E. H. Rubensson, “Assessment of density matrix meth-
|
823 |
+
ods for linear scaling electronic structure calculations,” Journal of Physics:
|
824 |
+
Condensed Matter 23, 075502 (2011).
|
825 |
+
30P. Suryanarayana, “Optimized purification for density matrix calculation,”
|
826 |
+
Chemical Physics Letters 555, 291–295 (2013).
|
827 |
+
31E. H. Rubensson and A. M. N. Niklasson, “Interior eigenvalues from den-
|
828 |
+
sity matrix expansions in quantum mechanical molecular dynamics,” SIAM
|
829 |
+
Journal on Scientific Computing 36, B147–B170 (2014).
|
830 |
+
32D. Bowler and M. Gillan, “Density matrices in o(n) electronic structure
|
831 |
+
calculations: theory and applications,” Computer Physics Communications
|
832 |
+
120, 95–108 (1999).
|
833 |
+
33L. A. Truflandier, R. M. Dianzinga, and D. R. Bowler, “Communication:
|
834 |
+
Generalized canonical purification for density matrix minimization,” The
|
835 |
+
Journal of Chemical Physics 144, 091102 (2016).
|
836 |
+
34R. K. Gupta and S. D. Senturia, “Pull-in time dynamics as a measure of
|
837 |
+
absolute pressure,” in Proc. IEEE International Workshop on Microelec-
|
838 |
+
tromechanical Systems (MEMS’97) (Nagoya, Japan, 1997) pp. 290–294.
|
839 |
+
35B. D. Cullity, Introduction to Magnetic Materials (Addison-Wesley, Read-
|
840 |
+
ing, MA, 1972).
|
841 |
+
36E. H. Rubensson, “Nonmonotonic recursive polynomial expansions for lin-
|
842 |
+
ear scaling calculation of the density matrix,” Journal of Chemical Theory
|
843 |
+
and Computation 7, 1233–1236 (2011).
|
844 |
+
37M. Methfessel and A. T. Paxton, “High-precision sampling for brillouin-
|
845 |
+
zone integration in metals,” Phys. Rev. B 40, 3616–3621 (1989).
|
846 |
+
38A. M. N. Niklasson, M. J. Cawkwell, E. H. Rubensson, and E. Rudberg,
|
847 |
+
“Canonical density matrix perturbation theory,” Phys. Rev. E 92, 063301
|
848 |
+
(2015).
|
849 |
+
39M. Wegmuller, J. P. von der Weid, P. Oberson,
|
850 |
+
and N. Gisin, “High
|
851 |
+
resolution fiber distributed measurements with coherent OFDR,” in Proc.
|
852 |
+
ECOC’00 (2000) p. 109.
|
853 |
+
40cuBLAS Library, .
|
854 |
+
41cuSOLVER Library, .
|
855 |
+
|
59E3T4oBgHgl3EQfpgot/content/tmp_files/load_file.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
5NE1T4oBgHgl3EQfBAIU/content/tmp_files/2301.02845v1.pdf.txt
ADDED
@@ -0,0 +1,1784 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
A one-dimensional model for axisymmetric deformations of an
|
2 |
+
inflated hyperelastic tube of finite wall thickness
|
3 |
+
Xiang Yua,˚, Yibin Fub
|
4 |
+
aSchool of Computer Science and Technology, Dongguan University of Technology, Dongguan, China
|
5 |
+
bSchool of Computing and Mathematics, Keele University, Staffordshire ST5 5BG, UK
|
6 |
+
Abstract
|
7 |
+
We derive a one-dimensional (1d) model for the analysis of bulging or necking in an inflated hyper-
|
8 |
+
elastic tube of finite wall thickness from the three-dimensional finite elasticity theory by applying
|
9 |
+
the dimension reduction methodology proposed by Audoly and Hutchinson (J. Mech. Phys. Solids,
|
10 |
+
97, 2016). The 1d model makes it much easier to characterize fully nonlinear axisymmetric defor-
|
11 |
+
mations of a thick-walled tube using simple numerical schemes such as the finite difference method.
|
12 |
+
The new model recovers the diffuse interface model for analyzing bulging in a membrane tube and
|
13 |
+
the 1d model for investigating necking in a stretched solid cylinder as two limiting cases. It is con-
|
14 |
+
sistent with, but significantly refines, the exact linear and weakly nonlinear bifurcation analyses.
|
15 |
+
Comparisons with finite element simulations show that for the bulging problem, the 1d model is
|
16 |
+
capable of describing the entire bulging process accurately, from initiation, growth, to propagation.
|
17 |
+
The 1d model provides a stepping stone from which similar 1d models can be derived and used to
|
18 |
+
study other effects such as anisotropy and electric loading, and other phenomena such as rupture.
|
19 |
+
Keywords:
|
20 |
+
localized bulging; necking; reduced models; tubes; stability; nonlinear elasticity
|
21 |
+
1. Introduction
|
22 |
+
Hyperelastic tubes are commonly found in various applications ranging from soft robotics (Ma
|
23 |
+
et al., 2015; Lu et al., 2015, 2020) to energy harvesting (Lu & Suo, 2012; Bucchi & Hearn, 2013;
|
24 |
+
Smith, 2016). They are also used to model human arteries in order to understand pathological
|
25 |
+
conditions such as aneurysms (Fu et al., 2012; Alhayani et al., 2014; Demirkoparan & Merodio,
|
26 |
+
2017; Varatharajan & DasGupta, 2017; Hejazi et al., 2021). Inflation of a hyperelastic tube is one
|
27 |
+
of the few boundary value problems in nonlinear elasticity that have closed-form solutions, and it
|
28 |
+
provides the simplest setup to explain bifurcation, localization, loss of convexity, and “two-phase”
|
29 |
+
deformations. Thus, understanding this problem is not only important for applications, but may
|
30 |
+
also shed light on other more complicated stability and bifurcation problems.
|
31 |
+
˚Corresponding author
|
32 |
+
Email address: [email protected] (Xiang Yu)
|
33 |
+
Preprint submitted to Journal of the Mechanics and Physics of Solids
|
34 |
+
January 10, 2023
|
35 |
+
arXiv:2301.02845v1 [cond-mat.soft] 7 Jan 2023
|
36 |
+
|
37 |
+
Simple inflation experiments with commercially available latex rubber tubes show that localized
|
38 |
+
bulging is the dominant deformation form. For almost all realistic constitutive models for rubber,
|
39 |
+
the pressure versus volume curve has an N shape under the condition of fixed resultant axial force
|
40 |
+
(Green & Adkins, 1960). This led Yin (1977) and Chater & Hutchinson (1984) to analyze the final
|
41 |
+
observable configuration as that corresponding to a “two-phase” deformation.
|
42 |
+
The subsequent
|
43 |
+
experimental studies carried out by Kyriakides & Chang (1990, 1991), Pamplona et al. (2006) and
|
44 |
+
Goncalves et al. (2008) have provided a clear picture on how a localized bulge initiates, grows and
|
45 |
+
then propagates under fixed axial force or fixed-ends conditions.
|
46 |
+
When the membrane assumption is made, the governing equations for tube inflation can be
|
47 |
+
viewed as a finite-dimensional spatial dynamical system that has two conservation laws/integrals
|
48 |
+
(Pipkin, 1968). This realization enabled Fu et al. (2008) to demonstrate explicitly how a localized
|
49 |
+
solution initiates as a zero-wave-number mode from the uniform deformation and how it evolves
|
50 |
+
into a “two-phase” state. The stability of bulging solutions and their sensitivity to imperfections
|
51 |
+
have been studied under the same framework (Pearce & Fu, 2010; Fu & Il’ichev, 2015; Fu & Xie,
|
52 |
+
2010). Fresh analytical insight into the case of fixed ends has also been obtained. It is shown
|
53 |
+
that the bifurcation condition for this case corresponds to the axial force reaching a maximum at
|
54 |
+
a fixed pressure (Fu & Il’ichev, 2015); in other words, as pressure is increased, the critical pressure
|
55 |
+
is the value of pressure at which the axial force reaches a maximum when viewed as a function of
|
56 |
+
the axial stretch. Also, in contrast with the case of fixed axial force where the measured pressure
|
57 |
+
approaches a constant value (the propagation pressure), the measured pressure in the case of fixed
|
58 |
+
ends has an N shape where the right branch approaches a master curve that is independent of the
|
59 |
+
pre-axial-stretch or the tube length (Guo et al., 2022).
|
60 |
+
In some practical applications, however, the tube wall may be of moderate or even large thickness
|
61 |
+
and the membrane model no longer applies. For example, in the context of aneurysm formation,
|
62 |
+
a human artery can be as thick as a quarter of its outer radius (M¨uller et al., 2008), and fiber-
|
63 |
+
reinforcement also seems to reduce the range of validity of the membrane assumption (Wang &
|
64 |
+
Fu, 2018). Thus, recent studies have begun to consider hyperelastic tubes of finite wall thickness.
|
65 |
+
Fu et al. (2016) showed that the associated bifurcation condition for localized bulging corresponds
|
66 |
+
to the vanishing of the Jacobian determinant of the internal pressure and resultant axial force as
|
67 |
+
functions of the azimuthal stretch and the axial stretch; see also Yu & Fu (2022) for an alternative
|
68 |
+
derivation.
|
69 |
+
This provides a framework under which additional effects such as rotation (Wang
|
70 |
+
et al., 2017), double-fiber-reinforcement (Wang & Fu, 2018), bi-laying (Liu et al., 2019; Ye et al.,
|
71 |
+
2019), torsion (Althobaiti, 2022), and surface tension (Emery & Fu, 2021a,b,c; Emery, 2023) can
|
72 |
+
be assessed in a systematic manner. Ye et al. (2020) conducted a weakly non-linear analysis and
|
73 |
+
derived the bulging solution explicitly. The analytic predictions were corroborated by numerical
|
74 |
+
simulations and experiments (Wang et al., 2019).
|
75 |
+
For tubes of finite wall thickness, the equations that govern their axisymmetric deformations
|
76 |
+
are coupled nonlinear partial differential equations. Although analytic solutions can be obtained in
|
77 |
+
2
|
78 |
+
|
79 |
+
the near-critical regime using asymptotic methods (Ye et al., 2020), the complexity of the governing
|
80 |
+
equations forbids any further analytic attempts to understand the bulging evolution further away
|
81 |
+
from the bifurcation point. The post-bifurcation behavior in the fully nonlinear regime has so far
|
82 |
+
only been investigated by resorting to Abaqus simulations (Wang et al., 2019; Lin et al., 2020).
|
83 |
+
This is not satisfactory since the insight provided by full-scale simulations tends to be limited and
|
84 |
+
there are situations where repeated calculations of the bulging profile are required (e.g. in the
|
85 |
+
assessment of the rupture potential (Hejazi et al., 2021)).
|
86 |
+
A recent series of studies by Audoly and coworkers has opened the possibility that a 1d reduced
|
87 |
+
model can be derived to describe the fully nonlinear evolution of bulging or necking. In the first
|
88 |
+
of this series, Audoly & Hutchinson (2016), the authors derived a 1d model for tensile necking
|
89 |
+
localization in a 3d prismatic solid of arbitrary cross-section. The key idea of their derivation is a
|
90 |
+
dimension reduction assuming slow variation in the axial direction that respects self-consistency.
|
91 |
+
In terms of the language of perturbation analysis, the leading-order solution is almost correct and
|
92 |
+
higher-order terms are only added to restore self-consistency. The method was later applied by
|
93 |
+
Lestrigant and Audoly to obtain a diffuse interface model for the characterization of propagating
|
94 |
+
bulges in membrane tubes (Lestringant & Audoly, 2018) and a 1d model for predicting surface
|
95 |
+
tension-driven necking in soft elastic cylinders (Lestringant & Audoly, 2020b). It has also been
|
96 |
+
used recently to derive a 1d model for elastic ribbons (Audoly & Neukirch, 2021) and for tape springs
|
97 |
+
(Kumar et al., 2022). The systematic reduction method for deriving 1d strain-gradient models for
|
98 |
+
nonlinear slender structures was further generalized by Lestringant & Audoly (2020a). It is worth
|
99 |
+
pointing out that although the 1d models are built on the assumption that localized solutions
|
100 |
+
vary slowly in the longitudinal direction, it is surprisingly accurate, even in the region where the
|
101 |
+
localization is well developed. This is illustrated by the numeric examples in the aforementioned
|
102 |
+
work and in the comparative studies by Wang & Fu (2021) and Fu et al. (2021).
|
103 |
+
This work aims to extend the diffuse interface model of Lestringant & Audoly (2018) for mem-
|
104 |
+
brane tubes to tubes of finite wall thickness, in a similar spirit as the previous work Fu et al. (2016)
|
105 |
+
and Ye et al. (2020) that extend the bifurcation condition and the weakly nonlinear analysis from
|
106 |
+
membrane tubes to thick-walled tubes. In contrast with the case under the membrane assumption
|
107 |
+
where the original governing equations are already one-dimensional, the governing equations for the
|
108 |
+
current case are two-dimensional, and the uniformly inflated deformation is no longer homogeneous
|
109 |
+
since the solution depends on the radial variable. It will be shown that a 1d reduced model can
|
110 |
+
still be derived and simplified to the form
|
111 |
+
E1dras “
|
112 |
+
ż L
|
113 |
+
´L
|
114 |
+
´
|
115 |
+
Gpa, λpaqq ` 1
|
116 |
+
2Dpaqa1pZq2¯
|
117 |
+
dZ ` Cpaqa1pZq|L
|
118 |
+
´L,
|
119 |
+
(1.1)
|
120 |
+
where L is the initial half length, Z is the axial coordinate, apZq is the azimuthal stretch on the inner
|
121 |
+
surface (a constant multiple of the deformed inner radius ) and the expressions for Gpa, λpaqq, Dpaq
|
122 |
+
and Cpaq are given in (3.10), (4.21) and (4.22), respectively. The first term G in (1.1) corresponds
|
123 |
+
to the energy of the uniform deformation, which determines the amplitudes of the two phases in
|
124 |
+
3
|
125 |
+
|
126 |
+
the bulge propagation stage; the second term accounts for the contribution of the strain gradient
|
127 |
+
to the total energy, which describes how these two phases are connected.
|
128 |
+
The Euler-Lagrange
|
129 |
+
equation associated with the energy functional (1.1) is a second-order nonlinear ode for apZq,
|
130 |
+
which is a drastic simplification from the original nonlinear partial differential equations. This 1d
|
131 |
+
model is validated by comparison with finite element simulations, showing excellent agreement with
|
132 |
+
numerical results even for the propagation stage.
|
133 |
+
The outline of this paper is as follows. In Sect. 2, we formulate the 3d axisymmetric finite-
|
134 |
+
strain model for a tube of finite wall thickness under inflation and axial stretching. In Sect. 3, we
|
135 |
+
summarize solutions corresponding to uniform inflation of the tube, making preparation for the
|
136 |
+
subsequent dimension reduction. In Sect. 4, we carry out the dimension reduction and derive the
|
137 |
+
above-mentioned 1d strain-gradient model. The connection of the 1d model with prior work is
|
138 |
+
given in Sect. 5. In Sect. 6, we validate the 1d model by making comparisons with finite element
|
139 |
+
simulations. Finally, concluding remarks are given in Sect. 7.
|
140 |
+
2. Three-dimensional finite-strain model
|
141 |
+
We consider a circular cylindrical tube that has a length 2L, inner radius A and outer radius B
|
142 |
+
in its reference configuration; see Fig. 1(a). The ratio of the outer radius to the length ε “ B{2L is
|
143 |
+
assumed to be small, thus ε ! 1. The tube deforms axisymmetrically under the combined action of
|
144 |
+
an internal pressure P and a resultant axial force N, as shown in Fig. 1(b). In terms of cylindrical
|
145 |
+
coordinates, the current position vector of a representative point is given by
|
146 |
+
x “ zpZ, Rqez ` rpZ, Rqer,
|
147 |
+
(2.1)
|
148 |
+
where pR, Θ, Zq and pr, θ, zq are the coordinates of a representative point before and after defor-
|
149 |
+
mation, and per, eθ, ezq are the standard basis vectors associated with both pR, Θ, Zq and pr, θ, zq.
|
150 |
+
The deformation gradient related to (2.1) is given by
|
151 |
+
F “ r
|
152 |
+
Reθ b eθ ` zZez b ez ` zRez b er ` rZer b ez ` rRer b er,
|
153 |
+
(2.2)
|
154 |
+
where zZ :“ Bz{BZ, zR :“ Bz{BR, etc.
|
155 |
+
We assume that the tube is made of an incompressible isotropic hyperelastic material, associated
|
156 |
+
with the strain energy function Wpλ1, λ2, λ3q, where λ1, λ2, λ3 denote the three principal stretches.
|
157 |
+
Throughout this paper, we identify the indices 1, 2, 3 such that in uniform inflation they coincide
|
158 |
+
with the θ-, z- and r-directions, respectively.
|
159 |
+
The total potential energy of the tube is composed of the elastic energy and the load potential,
|
160 |
+
which reads
|
161 |
+
E “
|
162 |
+
ż L
|
163 |
+
´L
|
164 |
+
´ ż B
|
165 |
+
A
|
166 |
+
`
|
167 |
+
wpλ1, λ2q ´ N˚zZ
|
168 |
+
˘
|
169 |
+
2πR dR ´ Pπr2zZ
|
170 |
+
ˇˇ
|
171 |
+
R“A
|
172 |
+
¯
|
173 |
+
dZ,
|
174 |
+
(2.3)
|
175 |
+
4
|
176 |
+
|
177 |
+
m
|
178 |
+
B
|
179 |
+
G
|
180 |
+
(a)
|
181 |
+
m2
|
182 |
+
G2
|
183 |
+
H2
|
184 |
+
(b)
|
185 |
+
Figure 1: A hyperelastic cylindrical tube of finite thickness in (a) reference (undeformed) configuration and (b)
|
186 |
+
current configuration.
|
187 |
+
where wpλ1, λ2q “ Wpλ1, λ2, λ´1
|
188 |
+
1 λ´1
|
189 |
+
2 q is the reduced strain energy function and N˚ “ N{pπpB2 ´
|
190 |
+
A2qq is the resultant axial force per unit cross-sectional area. The elastic model governed by the
|
191 |
+
energy functional (2.3) will be used as a starting point for the subsequent dimension reduction.
|
192 |
+
The governing equations for the two unknown functions rpZ, Rq and zpZ, Rq can be derived by
|
193 |
+
setting the first variation of E to zero, but these equations are not required in the approach that
|
194 |
+
we follow.
|
195 |
+
3. Uniform inflation
|
196 |
+
We now summarise the solution that corresponds to uniform inflation and extension of the tube.
|
197 |
+
This solution will be referred to as the uniform solution and is indicated by a superposed bar. For
|
198 |
+
a more detailed derivation, see Haughton & Ogden (1979).
|
199 |
+
First, incompressibility implies that a uniform solution must necessarily be of the form
|
200 |
+
¯z “ λZ,
|
201 |
+
¯r “
|
202 |
+
a
|
203 |
+
a2A2 ` λ´1pR2 ´ A2q,
|
204 |
+
(3.1)
|
205 |
+
where λ and a denote the constant axial stretch and azimuthal stretch on the inner surface, respec-
|
206 |
+
tively. The three principal stretches are simply
|
207 |
+
¯λ1 “ ¯r
|
208 |
+
R,
|
209 |
+
¯λ2 “ λ,
|
210 |
+
¯λ3 “ d¯r
|
211 |
+
dR “ ¯λ´1
|
212 |
+
1 ¯λ´1
|
213 |
+
2 ,
|
214 |
+
(3.2)
|
215 |
+
and the azimuthal stretch on the outer surface, denoted by b, is given by
|
216 |
+
b “ ¯λ1|R“B “
|
217 |
+
a
|
218 |
+
a2A2 ` λ´1pB2 ´ A2q
|
219 |
+
B
|
220 |
+
.
|
221 |
+
(3.3)
|
222 |
+
The three associated principal Cauchy stresses ¯σ11, ¯σ22 and ¯σ33 satisfy the relations
|
223 |
+
¯σ11 ´ ¯σ33 “ ¯λ1w1,
|
224 |
+
¯σ22 ´ ¯σ33 “ λw2,
|
225 |
+
(3.4)
|
226 |
+
5
|
227 |
+
|
228 |
+
where w1 “ Bwp¯λ1, ¯λ2q{B¯λ1 and w2 “ Bwp¯λ1, ¯λ2q{B¯λ2.
|
229 |
+
The only equilibrium equation that is not satisfied automatically is
|
230 |
+
d¯σ33
|
231 |
+
d¯r
|
232 |
+
“ ¯σ11 ´ ¯σ33
|
233 |
+
¯r
|
234 |
+
“
|
235 |
+
¯λ1w1
|
236 |
+
¯r
|
237 |
+
.
|
238 |
+
(3.5)
|
239 |
+
On integrating this equation from R “ A to R “ B and making use of the boundary conditions
|
240 |
+
that ¯σ33|R“A “ ´P and ¯σ33|R“B “ 0, we obtain
|
241 |
+
P “ Qpa, λq :“
|
242 |
+
ż a
|
243 |
+
b
|
244 |
+
w1p¯λ1, λq
|
245 |
+
¯λ2
|
246 |
+
1λ ´ 1 d¯λ1,
|
247 |
+
(3.6)
|
248 |
+
where the second equation defines the function Qpa, λq and we have made use of the identity
|
249 |
+
d¯r
|
250 |
+
¯r “ ´
|
251 |
+
d¯λ1
|
252 |
+
¯λ1p¯λ2
|
253 |
+
1λ ´ 1q,
|
254 |
+
(3.7)
|
255 |
+
which can be deduced from (3.1)2.
|
256 |
+
The overall equilibrium in the axial direction implies
|
257 |
+
Mpa, λq ´ 1
|
258 |
+
2a2P ´
|
259 |
+
N
|
260 |
+
2πA2 “ 0,
|
261 |
+
(3.8)
|
262 |
+
where Mpa, λq is given by
|
263 |
+
Mpa, λq :“ 1
|
264 |
+
A2
|
265 |
+
ż B
|
266 |
+
A
|
267 |
+
λ´1¯σ22R dR “
|
268 |
+
ż a
|
269 |
+
b
|
270 |
+
p¯λ2
|
271 |
+
1 ´ a2qw1p¯λ1, λq ` 2¯λ1λpa2λ ´ 1qw2p¯λ1, λq
|
272 |
+
2p¯λ2
|
273 |
+
1λ ´ 1q2
|
274 |
+
d¯λ1.
|
275 |
+
(3.9)
|
276 |
+
In view of (2.3), the total potential energy of the uniform deformation (3.1) per unit reference
|
277 |
+
length, after scaling by 2π, is
|
278 |
+
Gpa, λq “
|
279 |
+
ż B
|
280 |
+
A
|
281 |
+
wp¯λ1, λq R dR ´ 1
|
282 |
+
2PA2a2λ ´ N
|
283 |
+
2πλ.
|
284 |
+
(3.10)
|
285 |
+
The equilibrium equations (3.6) and (3.8) can also be obtained from BG{Ba “ 0 and BG{Bλ “ 0,
|
286 |
+
respectively. Once the loads P and N are specified, the deformation parameters a and λ can be
|
287 |
+
found by solving the equilibrium equations (3.6) and (3.8).
|
288 |
+
On differentiating the left-hand side of (3.8) with respect to λ, we find that it takes the form
|
289 |
+
Hw22pa, λq{A ` OpH2q, where H “ B ´ A is the thickness of the tube. We assume that the strong
|
290 |
+
ellipticity condition is satisfied pointwise which guarantees that w22pa, λq is positive (Knowles &
|
291 |
+
Sternberg, 1976). This, combined with the implicit function theorem, implies that (3.8) can be
|
292 |
+
inverted to express λ in terms of a uniquely at least when H is small. We assume that this remains
|
293 |
+
true for arbitrary H. This enables us to view (3.8) as an implicit equation for λ “ λpaq. We remark
|
294 |
+
that λ is also dependent on P, but this dependence is not indicated explicitly for notational brevity.
|
295 |
+
Thus, by definition, λpaq is the solution to the implicit equation
|
296 |
+
Mpa, λpaqq ´ 1
|
297 |
+
2a2P ´
|
298 |
+
N
|
299 |
+
2πA2 “ 0.
|
300 |
+
(3.11)
|
301 |
+
6
|
302 |
+
|
303 |
+
Since λ has been viewed as a function of a, all quantities (except ¯z which also depends on Z) related
|
304 |
+
to the uniform solution are functions of a and R. For instance, ¯r denotes the function
|
305 |
+
¯rpa, Rq “
|
306 |
+
a
|
307 |
+
a2A2 ` λpaq´1pR2 ´ A2q.
|
308 |
+
(3.12)
|
309 |
+
We denote ¯σ33 by ´qpa, Rq so that
|
310 |
+
qpa, Rq :“ ´¯σ33 “
|
311 |
+
ż ¯λ1
|
312 |
+
b
|
313 |
+
w1p˜λ1, λq
|
314 |
+
˜λ2
|
315 |
+
1λ ´ 1
|
316 |
+
d˜λ1.
|
317 |
+
(3.13)
|
318 |
+
We also define another function mpa, Rq through
|
319 |
+
mpa, Rq :“ 1
|
320 |
+
R2
|
321 |
+
ż B
|
322 |
+
R
|
323 |
+
λ´1¯σ22RdR “
|
324 |
+
ż ¯λ1
|
325 |
+
b
|
326 |
+
p˜λ2
|
327 |
+
1 ´ ¯λ2
|
328 |
+
1qw1p˜λ1, λq ` 2˜λ1λp¯λ2
|
329 |
+
1λ ´ 1qw2p˜λ1, λq
|
330 |
+
2p˜λ2
|
331 |
+
1λ ´ 1q2
|
332 |
+
d˜λ1,
|
333 |
+
(3.14)
|
334 |
+
and record the connections
|
335 |
+
qpa, Aq “ Qpa, λpaqq,
|
336 |
+
mpa, Aq “ Mpa, λpaqq.
|
337 |
+
(3.15)
|
338 |
+
The 1d reduced model to be derived in the next section will be expressed in terms of the two
|
339 |
+
functions qpa, Rq and mpa, Rq. The integrals in these two functions can be evaluated explicitly for
|
340 |
+
some commonly used strain energy functions, including the Gent material model that will be used
|
341 |
+
in our illustrative examples.
|
342 |
+
4. Derivation of the one-dimensional model
|
343 |
+
In this section, we apply the dimension reduction methodology proposed by Audoly & Hutchin-
|
344 |
+
son (2016) to derive a one-dimensional model from the full three-dimensional theory formulated in
|
345 |
+
Sect. 2.
|
346 |
+
4.1. Optimal correction
|
347 |
+
We start our dimension reduction by assuming that all dependent variables related to the
|
348 |
+
axisymmetric configuration vary slowly in the axial direction. More precisely, it is assumed that
|
349 |
+
all variables depend on Z through the “far distance” variable
|
350 |
+
S “ εZ.
|
351 |
+
(4.1)
|
352 |
+
Recall that ε is the ratio of the outer radius to the length, which is assumed to be small.
|
353 |
+
In
|
354 |
+
particular, we now allow a and λ to depend on S and write a “ apSq, λ “ λpapSqq. Our aim is to
|
355 |
+
derive a reduced model, an ordinary differential equation, that is satisfied by apSq. We recall that
|
356 |
+
apSq is the deformed inner radius divided by a constant (i.e. A).
|
357 |
+
A naive approach would be to use a “ apSq and λ “ λpapSqq to compute the two principal
|
358 |
+
stretches and then derive the equation satisfied by a “ apSq by minimizing the energy functional
|
359 |
+
7
|
360 |
+
|
361 |
+
(2.3). This would yield an equation for apSq that is not self-consistent. The correct way is to allow
|
362 |
+
for higher-order correction terms by looking for an asymptotic solution of the form
|
363 |
+
zpZ, Rq “ 1
|
364 |
+
ε
|
365 |
+
ż S
|
366 |
+
0
|
367 |
+
λpapTqq dT ` εv˚pS, Rq ` Opε3q,
|
368 |
+
rpZ, Rq “ ¯rpapSq, Rq ` ε2u˚pS, Rq ` Opε4q.
|
369 |
+
(4.2)
|
370 |
+
We note that the correction terms in zpZ, Rq and rpZ, Rq are of order ε and ε2, respectively.
|
371 |
+
This is because the Op1q-term in zpZ, Rq and the Opεq-term in rpZ, Rq correspond to a uniform
|
372 |
+
perturbation and can thus be absorbed into the leading terms.
|
373 |
+
On substituting (4.2) into (2.2) and truncating at order ε2, we obtain the deformation gradient
|
374 |
+
F “
|
375 |
+
¨
|
376 |
+
˚
|
377 |
+
˝
|
378 |
+
¯r{R ` ε2u˚{R
|
379 |
+
0
|
380 |
+
0
|
381 |
+
0
|
382 |
+
λpapSqq ` ε2v˚
|
383 |
+
S
|
384 |
+
εv˚
|
385 |
+
R
|
386 |
+
0
|
387 |
+
ε¯raa1pSq
|
388 |
+
¯rR ` ε2u˚
|
389 |
+
R
|
390 |
+
˛
|
391 |
+
‹‚,
|
392 |
+
(4.3)
|
393 |
+
where the subscripts represent partial differentiation with respect to the indicated variables (in
|
394 |
+
particular ¯ra “ B¯r{Ba). Consequently, the three principal stretches are given by
|
395 |
+
λ1 “ ¯λ1 ` ε2 u˚
|
396 |
+
R ,
|
397 |
+
λ2 “ ¯λ2 ` ε2´
|
398 |
+
v˚
|
399 |
+
S ` λp¯r2
|
400 |
+
aa1pSq2 ` v˚2
|
401 |
+
R q ` 2¯λ3¯raa1pSqv˚
|
402 |
+
R
|
403 |
+
2pλ2 ´ ¯λ3q
|
404 |
+
¯
|
405 |
+
,
|
406 |
+
(4.4)
|
407 |
+
where ¯λ1 and ¯λ2 are given by (3.2) but with a and λ replaced by apSq and λpapSqq, respectively.
|
408 |
+
Substituting (4.4) into (2.3) and expanding to second order, we see that E can be written, in
|
409 |
+
terms of the un-scaled variables, as
|
410 |
+
E “ 2π
|
411 |
+
´ ż L
|
412 |
+
´L
|
413 |
+
GpapZq, λpapZqqq dZ ` E2
|
414 |
+
¯
|
415 |
+
` OpLε3q,
|
416 |
+
(4.5)
|
417 |
+
where E2 represents the term of order ε2 and is given by
|
418 |
+
E2 “
|
419 |
+
ż L
|
420 |
+
´L
|
421 |
+
´ ż B
|
422 |
+
A
|
423 |
+
´
|
424 |
+
pw2 ´ N˚qvZ ` w2
|
425 |
+
λp¯r2
|
426 |
+
aa12 ` v2
|
427 |
+
Rq ` 2¯λ3¯raa1vR
|
428 |
+
2pλ2 ´ ¯λ2
|
429 |
+
3q
|
430 |
+
¯
|
431 |
+
R dR
|
432 |
+
`
|
433 |
+
ż B
|
434 |
+
A
|
435 |
+
w1u dR ´ 1
|
436 |
+
2PA2a2vZ|R“A ´ PAaλu|R“A
|
437 |
+
¯
|
438 |
+
dZ.
|
439 |
+
(4.6)
|
440 |
+
In the above expression, vpZ, Rq “ εv˚pS, Rq and upZ, Rq “ ε2u˚pS, Rq denote the unscaled dis-
|
441 |
+
placements, and here and hereafter we write apZq for apSq and so a1 now denotes a1pZq. It is seen
|
442 |
+
that the only reason for introducing S above is to identify all terms of order ε2 that should be kept
|
443 |
+
in (4.6). With this task accomplished, the scaled variable S will no longer appear in the subsequent
|
444 |
+
analysis. Also, w1 “ w1p¯λ1, λq, w2 “ w2p¯λ1, λq in which λ is a function of a and ¯λ1 is a function of
|
445 |
+
a and R.
|
446 |
+
8
|
447 |
+
|
448 |
+
Our formulation in terms of the reduced strain energy function requires the solution (4.2) to
|
449 |
+
satisfy the incompressibility condition automatically. This can be achieved by eliminating u in
|
450 |
+
(4.6) with the use of detpF q “ 1 which takes the form
|
451 |
+
λp¯ruqR ` ¯rp¯rRvZ ´ ¯raa1vRq “ 0.
|
452 |
+
(4.7)
|
453 |
+
To this end, we make use of the equilibrium equation (3.5) and write
|
454 |
+
ż B
|
455 |
+
A
|
456 |
+
w1u dR “ λ
|
457 |
+
ż B
|
458 |
+
A
|
459 |
+
¯σ33,R¯ru dR “ λ¯σ33¯ru|B
|
460 |
+
A ´ λ
|
461 |
+
ż B
|
462 |
+
A
|
463 |
+
¯σ33p¯ruqR dR
|
464 |
+
“ λPAau|R“A ´
|
465 |
+
ż B
|
466 |
+
A
|
467 |
+
q¯rp¯rRvZ ´ ¯raa1vRq dR,
|
468 |
+
(4.8)
|
469 |
+
where we have replaced ¯σ33 by ´qpa, Rq (cf. (3.13)) and have used (4.7) to eliminate p¯ruqR.
|
470 |
+
On eliminating u in (4.6) with the use of (4.8), we can recast E2 in the form
|
471 |
+
E2 “
|
472 |
+
ż L
|
473 |
+
´L
|
474 |
+
´ ż B
|
475 |
+
A
|
476 |
+
`
|
477 |
+
pλ´1¯σ22 ´ N˚qvZ ` 1
|
478 |
+
2ζp¯r2
|
479 |
+
aa12 ` v2
|
480 |
+
Rq ` ξ¯raa1vR
|
481 |
+
˘
|
482 |
+
R dR
|
483 |
+
´ 1
|
484 |
+
2PA2a2vZ|R“A
|
485 |
+
¯
|
486 |
+
dZ,
|
487 |
+
(4.9)
|
488 |
+
where ζ “ λw2{pλ2 ´ ¯λ2
|
489 |
+
3q, ξ “ q¯λ1 ` ¯λ3ζ{λ, and we have made use of the connection λw2 ´ q “ ¯σ22
|
490 |
+
that follows from (3.4)2 with ¯σ33 “ ´q. Then upon using integration by parts, we obtain
|
491 |
+
E2 “
|
492 |
+
ż L
|
493 |
+
´L
|
494 |
+
´ ż B
|
495 |
+
A
|
496 |
+
KpR, v, vRq dR ` PA2aa1v|R“A
|
497 |
+
¯
|
498 |
+
dZ
|
499 |
+
`
|
500 |
+
´ ż B
|
501 |
+
A
|
502 |
+
pλ´1¯σ22 ´ N˚qvR dR ´ 1
|
503 |
+
2PA2a2v|R“A
|
504 |
+
¯ˇˇˇ
|
505 |
+
Z“L
|
506 |
+
Z“´L,
|
507 |
+
(4.10)
|
508 |
+
where KpR, v, vRq is given by
|
509 |
+
KpR, v, vRq “ ´pλ´1¯σ22qaa1Rv ` 1
|
510 |
+
2Rζp¯r2
|
511 |
+
aa12 ` v2
|
512 |
+
Rq ` Rξ¯raa1vR.
|
513 |
+
(4.11)
|
514 |
+
In the last expression, pλ´1¯σ22qa denotes the partial derivative of λ´1¯σ22 with respect to a with R
|
515 |
+
fixed. To find the remaining correction field v “ vpZ, Rq, we assume that the leading-order stretch
|
516 |
+
apZq is prescribed and seek the correction v such that the total potential energy is stationary
|
517 |
+
(Audoly & Hutchinson, 2016). As a result, the optimal v satisfies the Euler-Lagrange equation and
|
518 |
+
the boundary conditions
|
519 |
+
BK
|
520 |
+
Bv ´ d
|
521 |
+
dR
|
522 |
+
´ BK
|
523 |
+
BvR
|
524 |
+
¯
|
525 |
+
“ 0,
|
526 |
+
A ď R ď B,
|
527 |
+
(4.12)
|
528 |
+
BK
|
529 |
+
BvR
|
530 |
+
“ PA2aa1,
|
531 |
+
R “ A,
|
532 |
+
(4.13)
|
533 |
+
BK
|
534 |
+
BvR
|
535 |
+
“ 0,
|
536 |
+
R “ B.
|
537 |
+
(4.14)
|
538 |
+
9
|
539 |
+
|
540 |
+
Solution of the above boundary value problem requires satisfaction of the solvability condition
|
541 |
+
ż B
|
542 |
+
A
|
543 |
+
BK
|
544 |
+
Bv dR “ ´PA2aa1,
|
545 |
+
that is
|
546 |
+
ż B
|
547 |
+
A
|
548 |
+
pλ´1¯σ22qaa1R dR “ PA2aa1.
|
549 |
+
This is automatically satisfied in view of the definition (3.9) for Mpa, λq and the equilibrium con-
|
550 |
+
dition (3.8).
|
551 |
+
Written out explicitly, Eqs. (4.12) and (4.14) take the form
|
552 |
+
d
|
553 |
+
dRpRζvRq “ ´
|
554 |
+
´
|
555 |
+
pλ´1¯σ22qaR ` d
|
556 |
+
dRpRξ¯raq
|
557 |
+
¯
|
558 |
+
a1,
|
559 |
+
A ď R ď B,
|
560 |
+
(4.15)
|
561 |
+
RζvR “ ´Rξ¯raa1,
|
562 |
+
R “ B.
|
563 |
+
(4.16)
|
564 |
+
Integrating (4.15) subject to the boundary condition (4.16) leads to
|
565 |
+
vR “ cpa, Rqa1pZq,
|
566 |
+
(4.17)
|
567 |
+
where cpa, Rq is defined by
|
568 |
+
cpa, Rq “ ´ ¯ra
|
569 |
+
¯λ1λ2 ` 1
|
570 |
+
Rζ
|
571 |
+
´
|
572 |
+
R2 B
|
573 |
+
Bampa, Rq ´ ¯r¯raqpa, Rq
|
574 |
+
¯
|
575 |
+
.
|
576 |
+
(4.18)
|
577 |
+
Once vR is found, the optimal correction v can be obtained by integrating (4.17) from B to R,
|
578 |
+
which yields
|
579 |
+
v “ ´
|
580 |
+
ˆż B
|
581 |
+
R
|
582 |
+
cpa, Tq dT
|
583 |
+
˙
|
584 |
+
a1pZq,
|
585 |
+
(4.19)
|
586 |
+
where we have neglected the function arising from integration since it can be absorbed into λpapZqq.
|
587 |
+
4.2. One-dimensional energy functional
|
588 |
+
Substituting the correction function v found in (4.19) back into (4.10), after some simplification
|
589 |
+
(which is detailed in Appendix A), we obtain the final expression for the energy functional of the
|
590 |
+
1d model
|
591 |
+
E1dras “
|
592 |
+
ż L
|
593 |
+
´L
|
594 |
+
´
|
595 |
+
Gpa, λpaqq ` 1
|
596 |
+
2Dpaqa1pZq2¯
|
597 |
+
dZ ` Cpaqa1pZq|L
|
598 |
+
´L,
|
599 |
+
(4.20)
|
600 |
+
where the gradient moduli D and C are given by
|
601 |
+
Dpaq “
|
602 |
+
ż B
|
603 |
+
A
|
604 |
+
Rζp¯r2
|
605 |
+
a ´ cpa, Rq2q dR,
|
606 |
+
(4.21)
|
607 |
+
Cpaq “
|
608 |
+
ż B
|
609 |
+
A
|
610 |
+
pλ´1¯σ22 ´ N˚q˜cpa, RqR dR ´ 1
|
611 |
+
2PA2a2˜cpa, Aq,
|
612 |
+
(4.22)
|
613 |
+
10
|
614 |
+
|
615 |
+
with ˜cpa, Rq “ ´
|
616 |
+
şB
|
617 |
+
R cpa, Tq dT.
|
618 |
+
The associated equilibrium equation is obtained by extremizing (4.20) with respect to apZq and
|
619 |
+
is found to take the form
|
620 |
+
A2aλpaqpQpa, λpaqq ´ Pq ´ 1
|
621 |
+
2D1paqa1pZq2 ´ Dpaqa2pZq “ 0,
|
622 |
+
(4.23)
|
623 |
+
where we have used the fact that BG{Bλ “ 0 as it is used to find the implicit relation between λ and
|
624 |
+
a (see (3.11)). Since Z does not explicitly appear in the integrand of (4.20) due to the translational
|
625 |
+
invariance of the current problem in Z, by the Beltrami identity, the equilibrium equation (4.23)
|
626 |
+
admits a first integral of the form
|
627 |
+
Gpa, λpaqq ´ 1
|
628 |
+
2Dpaqa1pZq2 “ constant.
|
629 |
+
(4.24)
|
630 |
+
We remark that the variational problem (4.20) is ill-posed due to the presence of the boundary
|
631 |
+
terms Cpaqa1pZq|L
|
632 |
+
´L.
|
633 |
+
This is because the variational structure of the problem is broken when
|
634 |
+
higher-order terms are dropped. There are two possible ways to get around this issue (Lestringant
|
635 |
+
& Audoly, 2020a). The first one is to simply ignore the boundary terms, i.e., to set Cpaq “ 0. The
|
636 |
+
second one is to add an Opε2q-term to apZq so that the boundary terms go away, which is rigorous
|
637 |
+
but slightly more complex. It has previously been verified in Lestringant & Audoly (2020a) that
|
638 |
+
the simple and rigorous approaches yield curves that can hardly be distinguished visually in any of
|
639 |
+
the plots.
|
640 |
+
To summarize, the second-order nonlinear ordinary differential equation (4.23) is our approxi-
|
641 |
+
mate 1d model that governs the variation of the inner radius (which is A times apZq) in the axial
|
642 |
+
direction. Once apZq is determined, the 3d deformation is given by (3.1). We note that the func-
|
643 |
+
tion Qpa, λpaqq is explicit for most of the commonly used strain energy functions. The only slight
|
644 |
+
complication is that the function Dpaq is given by an integral; see (4.21), but the functions mpa, Rq,
|
645 |
+
qpa, Rq, and hence cpa, Rq and the integrand in (4.21) all have explicit expressions for most of the
|
646 |
+
commonly used strain energy functions. Thus, only one numerical integration is required. This can
|
647 |
+
easily be implemented on a symbolic manipulation platform such as Mathematica (Wolfram, 1991)
|
648 |
+
as we shall show later.
|
649 |
+
5. Connections with previous work
|
650 |
+
We now demonstrate that the 1d model derived in Sect. 4 can recover the 1d model of Lestringant
|
651 |
+
& Audoly (2018) for membrane tubes and that of Audoly & Hutchinson (2016) for solid cylinders
|
652 |
+
under appropriate limits, and it can also reproduce the same weakly nonlinear bulging solution as
|
653 |
+
that based on the exact 3d theory (Ye et al., 2020).
|
654 |
+
11
|
655 |
+
|
656 |
+
5.1. Membrane limit
|
657 |
+
We first consider the reduction of the 1d model in the membrane limit when the tube thickness
|
658 |
+
H approaches zero. The general axisymmetric deformation is now described by
|
659 |
+
r “ rpZq,
|
660 |
+
θ “ Θ,
|
661 |
+
z “ zpZq,
|
662 |
+
(5.1)
|
663 |
+
and the three principal stretches are given by
|
664 |
+
λ1 “ r
|
665 |
+
R,
|
666 |
+
λ2 “
|
667 |
+
a
|
668 |
+
r12 ` z12,
|
669 |
+
λ3 “ 1{pλ1λ2q,
|
670 |
+
(5.2)
|
671 |
+
where R denotes the constant radius of the mid-surface. The total energy (2.3) reduces to
|
672 |
+
E “ 2π
|
673 |
+
ż L
|
674 |
+
´L
|
675 |
+
´
|
676 |
+
w ´ 1
|
677 |
+
2P ˚λ2
|
678 |
+
1z1 ´ N˚z1¯
|
679 |
+
dZ,
|
680 |
+
(5.3)
|
681 |
+
where P ˚ denotes the pressure scaled by H{R. Setting the first variation δE to zero then gives the
|
682 |
+
governing equations
|
683 |
+
w1 ´ R
|
684 |
+
´w2
|
685 |
+
λ2
|
686 |
+
r1¯1
|
687 |
+
´ P ˚λ1z1 “ 0,
|
688 |
+
(5.4)
|
689 |
+
w2
|
690 |
+
λ2
|
691 |
+
z1 ´ 1
|
692 |
+
2P ˚λ2
|
693 |
+
1 “ N˚.
|
694 |
+
(5.5)
|
695 |
+
Under the assumption that |r1| ! 1, we have
|
696 |
+
λ2 “ z1 ` r12
|
697 |
+
2z1 ` ¨ ¨ ¨ .
|
698 |
+
(5.6)
|
699 |
+
As an algebraic equation for z1, Eq. (5.5) has an asymptotic solution of the form
|
700 |
+
z1 “ gpλ1q ` k1pλ1qr12 ` ¨ ¨ ¨ ,
|
701 |
+
(5.7)
|
702 |
+
where the leading-order term gpλ1q obviously satisfies the algebraic equation
|
703 |
+
w2pλ1, gpλ1qq ´ 1
|
704 |
+
2P ˚λ2
|
705 |
+
1 ´ N˚ “ 0,
|
706 |
+
(5.8)
|
707 |
+
and the function k1pλ1q can easily be found but is not required. Eq. (5.8) determines gpλ1q uniquely
|
708 |
+
under the assumption w22 ą 0.
|
709 |
+
With the use of (5.6) and (5.7), we may expand the integrand in (5.3) to order r12 and obtain
|
710 |
+
E “ 2π
|
711 |
+
ż L
|
712 |
+
´L
|
713 |
+
´
|
714 |
+
wpλ1, gpλ1qq ´ 1
|
715 |
+
2P ˚λ2
|
716 |
+
1gpλ1q ´ N˚gpλ1q ` 1
|
717 |
+
2
|
718 |
+
w2pλ1, gpλ1qq
|
719 |
+
gpλ1q
|
720 |
+
r12¯
|
721 |
+
dZ.
|
722 |
+
(5.9)
|
723 |
+
This is the reduced model derived by Lestringant & Audoly (2018).
|
724 |
+
We now show that our general 1d model (4.20) can recover this 1d model under the limit H Ñ 0.
|
725 |
+
To this end, we first note that the uniformly deformed configuration is now described by
|
726 |
+
¯r “ aR,
|
727 |
+
¯z “ λZ.
|
728 |
+
(5.10)
|
729 |
+
12
|
730 |
+
|
731 |
+
In particular, we have ¯ra “ R. Since qpa, Rq and mpa, Rq involve integrals from R to B, they go to
|
732 |
+
zero as H Ñ 0. Consequently, the cpa, Rq defined in (4.18) takes the simple form
|
733 |
+
cpa, Rq “ ´ R
|
734 |
+
aλ2 .
|
735 |
+
(5.11)
|
736 |
+
Taking the limit H Ñ 0 in ζ “ λw2{pλ2 ´ ¯λ2
|
737 |
+
3q yields
|
738 |
+
ζ “ a2λ3w2
|
739 |
+
a2λ4 ´ 1.
|
740 |
+
(5.12)
|
741 |
+
Substituting (5.11) and (5.12) into (4.20), we obtain
|
742 |
+
lim
|
743 |
+
HÑ0
|
744 |
+
E1dras
|
745 |
+
RH
|
746 |
+
“
|
747 |
+
ż L
|
748 |
+
´L
|
749 |
+
´
|
750 |
+
wpa, λpaqq ´ 1
|
751 |
+
2P ˚a2λpaq ´ N˚λpaq ` 1
|
752 |
+
2R2 w2pa, λpaqq
|
753 |
+
λpaq
|
754 |
+
a1pZq2¯
|
755 |
+
dZ.
|
756 |
+
(5.13)
|
757 |
+
Note that the modulus Cpaq vanishes in the membrane limit because of the equilibrium in the axial
|
758 |
+
direction. The integrand on the right-hand side of (5.13) is the same as that on the right-hand side
|
759 |
+
of (5.9) if we identify λ1, gpλ1q and r1 with apZq, λpaq, and Ra1pZq, respectively.
|
760 |
+
5.2. Solid cylinder limit
|
761 |
+
Next we consider the other extreme limit corresponding to A Ñ 0 and P Ñ 0. The uniform
|
762 |
+
solution takes the form
|
763 |
+
¯z “ λZ,
|
764 |
+
¯r “ aR
|
765 |
+
(5.14)
|
766 |
+
with a “ λ´1{2. The three principal stretches are
|
767 |
+
¯λ1 “ ¯λ3 “ λ´1{2,
|
768 |
+
¯λ2 “ λ.
|
769 |
+
(5.15)
|
770 |
+
In particular, we have
|
771 |
+
w1p¯λ1, ¯λ2q “ 0,
|
772 |
+
w2p¯λ1, ¯λ2q “ ˆw1pλq,
|
773 |
+
(5.16)
|
774 |
+
where ˆwpλq “ Wpλ´1{2, λ, λ´1{2q. It follows from (5.16)1 that qpa, Rq “ 0. Note that the deforma-
|
775 |
+
tion (5.14) is homogeneous, so (3.14) implies that
|
776 |
+
mpa, Rq “ A2pB2 ´ R2q
|
777 |
+
R2pB2 ´ A2qmpa, Aq “ A2pB2 ´ R2q
|
778 |
+
R2pB2 ´ A2qMpa, λpaqq.
|
779 |
+
Differentiating this expression with respect to a and noting (3.11), we obtain Bmpa, Rq{Ba “ 0.
|
780 |
+
Thus cpa, Rq reduces to
|
781 |
+
cpa, Rq “ ´ R
|
782 |
+
λ3{2 .
|
783 |
+
(5.17)
|
784 |
+
The elastic modulus ζ is easily calculated as
|
785 |
+
ζ “ λ2 ˆw1pλq
|
786 |
+
λ3 ´ 1 .
|
787 |
+
(5.18)
|
788 |
+
13
|
789 |
+
|
790 |
+
Substituting (5.17) and (5.18) into (4.20), we obtain
|
791 |
+
2πE1drλs “
|
792 |
+
ż L
|
793 |
+
´L
|
794 |
+
´
|
795 |
+
πB2 ˆwpλq ` πB4
|
796 |
+
16
|
797 |
+
ˆw1pλq
|
798 |
+
λ4
|
799 |
+
λ1pZq2 ´ Nλ
|
800 |
+
¯
|
801 |
+
dZ,
|
802 |
+
(5.19)
|
803 |
+
where we have made use of the relation a1pZq “ λ1pZq{p2λ3{2q. This recovers the 1d model of
|
804 |
+
Audoly & Hutchinson (2016) specialized to an incompressible circular cylinder.
|
805 |
+
5.3. Comparison with exact weakly nonlinear analysis
|
806 |
+
Finally, we carry out a weakly nonlinear near-critical analysis using our 1d model and compare
|
807 |
+
the resulting amplitude equation with that obtained by Ye et al. (2020) from the exact 3d theory.
|
808 |
+
We focus on localized solutions in an infinitely long tube of finite wall thickness.
|
809 |
+
Denote by a8 the limit of apZq as Z Ñ 8 and λ8 “ λpa8q. It follows from (3.6) and (3.11)
|
810 |
+
that
|
811 |
+
P “ Qpa8, λ8q,
|
812 |
+
N “ 2πA2Fpa8, λ8q,
|
813 |
+
(5.20)
|
814 |
+
where Fpa8, λ8q is defined by
|
815 |
+
Fpa8, λ8q “ Mpa8, λ8q ´ 1
|
816 |
+
2a2
|
817 |
+
8Qpa8, λ8q.
|
818 |
+
(5.21)
|
819 |
+
We look for a localized solution that bifurcates from the uniform solution by writing
|
820 |
+
apZq “ a8 ` ypZq,
|
821 |
+
(5.22)
|
822 |
+
where ypZq is a small perturbation. Substituting (5.22) into the 1d equilibrium equation (4.23)
|
823 |
+
and expanding in terms of ypZq to quadratic order with the use of (5.20), we obtain
|
824 |
+
Dpa8qy2pZq “ ωpa8, λ8qypZq ` γpa8, λ8qypZq2,
|
825 |
+
(5.23)
|
826 |
+
where the two coefficient functions ωpa, λq and γpa, λq are given by
|
827 |
+
ωpa, λq “ A2
|
828 |
+
2aλ
|
829 |
+
a2Qλ ` 2Fλ
|
830 |
+
Ωpa, λq,
|
831 |
+
(5.24)
|
832 |
+
γpa, λq “ A2 aλpa2Qa ` 2Faq
|
833 |
+
Fapa2Qλ ` 2Fλq2 Γpa, λq ` A2ψpa, λqΩpa, λq.
|
834 |
+
(5.25)
|
835 |
+
In the above expressions, Qa “ BQpa, λq{Ba, Qλ “ BQpa, λq{Bλ, etc. and Ωpa, λq and Γpa, λq are
|
836 |
+
defined by
|
837 |
+
Ωpa, λq “ BQ
|
838 |
+
Ba
|
839 |
+
BF
|
840 |
+
Bλ ´ BQ
|
841 |
+
Bλ
|
842 |
+
BF
|
843 |
+
Ba ,
|
844 |
+
(5.26)
|
845 |
+
Γpa, λq “ BΩ
|
846 |
+
Ba
|
847 |
+
BF
|
848 |
+
Bλ ´ BΩ
|
849 |
+
Bλ
|
850 |
+
BF
|
851 |
+
Ba ,
|
852 |
+
(5.27)
|
853 |
+
and ψpa, λq is not written out as it is not required in the weakly nonlinear analysis.
|
854 |
+
14
|
855 |
+
|
856 |
+
The solution to the linearized equation of (5.23) changes character when the sign of ωpa8, λ8q
|
857 |
+
changes. Thus a bifurcation occurs when ωpa8, λ8q “ 0, or equivalently,
|
858 |
+
Ωpa8, λ8q “ 0.
|
859 |
+
(5.28)
|
860 |
+
Note that Qpa8, λ8q and Fpa8, λ8q represent respectively the functional dependence of P and
|
861 |
+
N on a8 and λ8. Thus the above bifurcation condition is simply the vanishing of the Jacobian
|
862 |
+
determinant of P and N as functions of a8 and λ8. This is consistent with previous work Fu et al.
|
863 |
+
(2016) and Yu & Fu (2022).
|
864 |
+
We consider two typical loading scenarios: either the resultant axial force N or the axial stretch
|
865 |
+
at infinity λ8 is fixed. The latter case is used to approximate the case of fixed axial length, which
|
866 |
+
can be realized more easily experimentally or in Abaqus simulations.
|
867 |
+
Let us first assume that the resultant axial force N “ Nc is fixed, where Nc is the prescribed
|
868 |
+
axial force. Denote by pacr, λcrq the root of the system of equations
|
869 |
+
ωpa8, λ8q “ 0,
|
870 |
+
Fpa8, λ8q “ Nc,
|
871 |
+
(5.29)
|
872 |
+
at which the bifurcation occurs according to the previous discussion. In the vicinity of the bifurca-
|
873 |
+
tion point, the amplitude equation (5.23) reduces to
|
874 |
+
Dpacrqy2pZq “ ω1pacr, λcrqpa8 ´ acrqypZq ` γpacr, λcrqypZq2,
|
875 |
+
(5.30)
|
876 |
+
where the prime on ω denotes d{da8 “ B{Ba8 ` pB{Bλ8qpdλ8{da8q. The above equation admits
|
877 |
+
a localized solution of the form
|
878 |
+
ypZq “ ´3ω1pacr, λcrq
|
879 |
+
2γpacr, λcrq pa8 ´ acrq sech2 ´1
|
880 |
+
2
|
881 |
+
d
|
882 |
+
ω1pacr, λcrq
|
883 |
+
Dpacrq
|
884 |
+
pa8 ´ acrqZ
|
885 |
+
¯
|
886 |
+
.
|
887 |
+
(5.31)
|
888 |
+
On the other hand, the weakly nonlinear amplitude equation derived from the 3d theory (Ye
|
889 |
+
et al., 2020) takes the form
|
890 |
+
c2
|
891 |
+
1pZq “ λ2
|
892 |
+
crk1pa8 ´ acrqc1pZq ` λ2
|
893 |
+
crk2c1pZq2,
|
894 |
+
(5.32)
|
895 |
+
where c1pZq and ypZq are related by
|
896 |
+
ypZq “ kc1pZq
|
897 |
+
(5.33)
|
898 |
+
with k “ ´2λpaq{λ1paq|a“acr, and k1 and k2 are constants available in Ye et al. (2020). One can
|
899 |
+
see that (5.30) and (5.32) are identical provided
|
900 |
+
k1 “ ω1pacr, λcrq
|
901 |
+
λ2crDpacrq ,
|
902 |
+
k2 “ kγpacr, λcrq
|
903 |
+
λ2crDpacrq .
|
904 |
+
(5.34)
|
905 |
+
We have verified numerically that this is indeed the case, but the current expressions on the right
|
906 |
+
hand sides of (5.34) are more compact and revealing.
|
907 |
+
15
|
908 |
+
|
909 |
+
The case of fixed λ8 can be handled similarly. Let pacr, λcrq be the solution to the system of
|
910 |
+
equations
|
911 |
+
ωpa8, λ8q “ 0,
|
912 |
+
λ8 “ λc,
|
913 |
+
(5.35)
|
914 |
+
where λc is a given constant.
|
915 |
+
In the vicinity of the bifurcation point, the amplitude equation
|
916 |
+
parallel to (5.30) is of the form
|
917 |
+
Dpacrqy2pZq “ ω1pacr, λcrqpa8 ´ acrqypZq ` γpacr, λcrqypZq2.
|
918 |
+
(5.36)
|
919 |
+
where the prime on ω now signifies B{Ba8. Similar to the previous case, one can verify that the
|
920 |
+
above amplitude equation is the same as its counterparts in Ye et al. (2020).
|
921 |
+
6. Comparison with Abaqus simulations
|
922 |
+
In this section, we demonstrate the power of the 1d model by applying it to investigate localized
|
923 |
+
bulging in an inflated tube of finite wall thickness in the fully nonlinear regime. Previous studies on
|
924 |
+
this problem usually treat the tube as a finite length tube, but the problem can be analyzed more
|
925 |
+
easily and very accurately by assuming the tube to be of infinite length. This assumption only fails
|
926 |
+
when the tube is very short and when bulging is no longer localized in the axial direction (Wang
|
927 |
+
& Fu, 2021). The reason is that bulging solutions decay exponentially towards the two ends. Thus
|
928 |
+
in the following analysis, we shall assume that the tube is effectively infinite and focus on solutions
|
929 |
+
subject to decaying boundary conditions. This assumption is validated by comparison with Abaqus
|
930 |
+
simulations based on tubes of finite lengths. We shall consider the two loading scenarios discussed
|
931 |
+
in Subsection 5.3 and compare the predictions of the 1d model with Abaqus simulations, which
|
932 |
+
allows us to quantify the accuracy of our 1d model and determine its range of validity.
|
933 |
+
In all numerical calculations and Abaqus simulations, we use the Gent material model
|
934 |
+
W “ ´µ
|
935 |
+
2 Jm ln
|
936 |
+
´
|
937 |
+
1 ´ λ2
|
938 |
+
1 ` λ2
|
939 |
+
2 ` λ2
|
940 |
+
3 ´ 3
|
941 |
+
Jm
|
942 |
+
¯
|
943 |
+
,
|
944 |
+
(6.1)
|
945 |
+
where µ is the shear modulus and Jm is a material constant. We take µ “ 1 which is equivalent
|
946 |
+
to scaling all stress variables by µ and Jm “ 97.2 which is typical for rubber. The geometry of the
|
947 |
+
tube is taken to be H{Rm “ 0.4 and 2L{Rm “ 40, where Rm “ pA ` Bq{2 is the average radius.
|
948 |
+
In the Abaqus simulations, to ensure that localized bulging occurs in the middle of the tube, a
|
949 |
+
small section with length 0.1L around the middle point of the tube is weakened by taking its shear
|
950 |
+
modulus to be 0.9999 times that of the rest of the tube.
|
951 |
+
The 1d differential equation (4.20) subject to appropriate end conditions (see (6.7) later) can
|
952 |
+
be solved numerically with the aid of the symbolic computation software Mathematica. Although
|
953 |
+
the gradient modulus Dpaq involves an integral that cannot be evaluated analytically, this integral
|
954 |
+
can be defined numerically in Mathematica with the built-in command ?NumericQ and can be
|
955 |
+
manipulated as elementary functions. Numerically solving the 1d equation is significantly faster
|
956 |
+
than Abaqus simulations. The 1d equation can typically be solved in a few seconds on a personal
|
957 |
+
computer.
|
958 |
+
16
|
959 |
+
|
960 |
+
6.1. The case of fixed axial force
|
961 |
+
We first consider the loading scenario whereby the resultant axial force N is fixed. As mentioned
|
962 |
+
earlier, we assume that the tube is infinitely long and focus on the solution that satisfies the decaying
|
963 |
+
boundary condition
|
964 |
+
lim
|
965 |
+
ZÑ8 apZq “ a8.
|
966 |
+
(6.2)
|
967 |
+
A linear analysis shows that the solution to (4.23) satisfying (6.2) decays exponentially as Z Ñ 8.
|
968 |
+
Thus we have limZÑ8 a1pZq “ 0 automatically. We assume that the bulging solution is symmetric
|
969 |
+
with respect to Z “ 0 so that a1p0q “ 0. We write λ8 “ λpa8q, a0 “ ap0q and λ0 “ λpap0qq. Since
|
970 |
+
pa8, λ8q satisfy the equations (3.6) and (3.8), we have
|
971 |
+
Mpa8, λ8q ´ 1
|
972 |
+
2a2
|
973 |
+
8Qpa8, λ8q ´
|
974 |
+
N
|
975 |
+
2πA2 “ 0,
|
976 |
+
(6.3)
|
977 |
+
Qpa8, λ8q ´ P “ 0.
|
978 |
+
(6.4)
|
979 |
+
From the definition of λ0 and the conservation law (4.24), we see that pa0, λ0q satisfies
|
980 |
+
Mpa0, λ0q ´ 1
|
981 |
+
2a2
|
982 |
+
0Qpa8, λ8q “ Mpa8, λ8q ´ 1
|
983 |
+
2a2
|
984 |
+
8Qpa8, λ8q,
|
985 |
+
(6.5)
|
986 |
+
Gpa0, λ0q “ Gpa8, λ8q.
|
987 |
+
(6.6)
|
988 |
+
Either a8 or P can be taken to be the load parameter. When a8 is specified, one can first obtain
|
989 |
+
λ8 from (6.3). The associated P is computed according to (6.4). Then by solving Eqs. (6.6) and
|
990 |
+
(6.5), one obtains the “initial” values a0 and λ0. The localized solution can be found by solving
|
991 |
+
the initial value problem
|
992 |
+
A2aλpaqpQpa, λpaqq ´ Pq ´ 1
|
993 |
+
2D1paqa1pZq2 ´ Dpaqa2pZq “ 0,
|
994 |
+
(6.7)
|
995 |
+
ap0q “ a0,
|
996 |
+
a1p0q “ 0.
|
997 |
+
(6.8)
|
998 |
+
As a first example, fixing the axial force N to be zero, we find from the bifurcation condition (5.29)
|
999 |
+
that localized bulging takes place at a8 “ acr “ 1.86 with a critical pressure Pcr “ 0.308. As we
|
1000 |
+
trace the bifurcation solution away from the bifurcation point, the pressure drops while the bulge
|
1001 |
+
grows until it has almost reached a maximum amplitude after which the bulge will propagate at a
|
1002 |
+
constant pressure. From Maxwell’s equal-areal rule, the propagation pressure is PM “ 0.197.
|
1003 |
+
Fig. 2 shows the dependence of the pressure on ap0q and the bulging amplitude on a8 based on
|
1004 |
+
Abaqus simulations and use of the 1d model. The bulging solutions given by Abaqus simulations
|
1005 |
+
and the 1d model at the four states marked in Fig. 2(a) are shown in Fig. 3. It is seen that the 1d
|
1006 |
+
solution agrees well with Abaqus simulations in the entire post-bifurcation regime. Remarkably,
|
1007 |
+
the 1d solution remains highly accurate even in the final propagation stage, as shown in Fig. 3(d).
|
1008 |
+
Note also that the Abaqus simulations and 1d calculations are conducted for 2L “ 40Rm and 8,
|
1009 |
+
respectively. This verifies our earlier claim that the tube can effectively be viewed to be infinitely
|
1010 |
+
long.
|
1011 |
+
17
|
1012 |
+
|
1013 |
+
●
|
1014 |
+
●
|
1015 |
+
●
|
1016 |
+
●
|
1017 |
+
●
|
1018 |
+
●
|
1019 |
+
●
|
1020 |
+
●
|
1021 |
+
●
|
1022 |
+
●
|
1023 |
+
●
|
1024 |
+
●
|
1025 |
+
●
|
1026 |
+
●
|
1027 |
+
●
|
1028 |
+
●
|
1029 |
+
●
|
1030 |
+
● ● ● ●
|
1031 |
+
●
|
1032 |
+
●
|
1033 |
+
●
|
1034 |
+
● ● ●
|
1035 |
+
●
|
1036 |
+
●
|
1037 |
+
●
|
1038 |
+
●
|
1039 |
+
● ●
|
1040 |
+
●
|
1041 |
+
●
|
1042 |
+
●
|
1043 |
+
1d model
|
1044 |
+
Abaqus simulation
|
1045 |
+
1
|
1046 |
+
2
|
1047 |
+
3
|
1048 |
+
4
|
1049 |
+
5
|
1050 |
+
6
|
1051 |
+
7 a(0)
|
1052 |
+
0.00
|
1053 |
+
0.05
|
1054 |
+
0.10
|
1055 |
+
0.15
|
1056 |
+
0.20
|
1057 |
+
0.25
|
1058 |
+
0.30
|
1059 |
+
P
|
1060 |
+
a
|
1061 |
+
b
|
1062 |
+
c
|
1063 |
+
d
|
1064 |
+
(a)
|
1065 |
+
●
|
1066 |
+
●
|
1067 |
+
●
|
1068 |
+
●
|
1069 |
+
●
|
1070 |
+
●
|
1071 |
+
●
|
1072 |
+
●
|
1073 |
+
●
|
1074 |
+
●
|
1075 |
+
●
|
1076 |
+
●
|
1077 |
+
●
|
1078 |
+
●
|
1079 |
+
●
|
1080 |
+
●
|
1081 |
+
●
|
1082 |
+
●
|
1083 |
+
●
|
1084 |
+
●
|
1085 |
+
●
|
1086 |
+
●
|
1087 |
+
●
|
1088 |
+
●
|
1089 |
+
●
|
1090 |
+
●
|
1091 |
+
1d model
|
1092 |
+
Abaqus simulation
|
1093 |
+
1.2
|
1094 |
+
1.3
|
1095 |
+
1.4
|
1096 |
+
1.5
|
1097 |
+
1.6
|
1098 |
+
1.7
|
1099 |
+
1.8
|
1100 |
+
1.9a∞
|
1101 |
+
0
|
1102 |
+
1
|
1103 |
+
2
|
1104 |
+
3
|
1105 |
+
4
|
1106 |
+
5
|
1107 |
+
6
|
1108 |
+
a(0) - a∞
|
1109 |
+
(b)
|
1110 |
+
Figure 2: Dependence of (a) pressure on ap0q and (b) bulging amplitude on a8 based on Abaqus simulations and the
|
1111 |
+
1d model for fixed N “ 0.
|
1112 |
+
Abaqus simulation
|
1113 |
+
1d model
|
1114 |
+
0
|
1115 |
+
2
|
1116 |
+
4
|
1117 |
+
6
|
1118 |
+
8 Z
|
1119 |
+
1.6
|
1120 |
+
1.7
|
1121 |
+
1.8
|
1122 |
+
1.9
|
1123 |
+
2.0
|
1124 |
+
2.1
|
1125 |
+
2.2
|
1126 |
+
2.3
|
1127 |
+
2.4
|
1128 |
+
a(Z)
|
1129 |
+
(a)
|
1130 |
+
Abaqus simulation
|
1131 |
+
1d model
|
1132 |
+
0
|
1133 |
+
2
|
1134 |
+
4
|
1135 |
+
6
|
1136 |
+
8 Z
|
1137 |
+
1.5
|
1138 |
+
2.0
|
1139 |
+
2.5
|
1140 |
+
3.0
|
1141 |
+
3.5
|
1142 |
+
a(Z)
|
1143 |
+
(b)
|
1144 |
+
Abaqus simulation
|
1145 |
+
1d model
|
1146 |
+
0
|
1147 |
+
2
|
1148 |
+
4
|
1149 |
+
6
|
1150 |
+
8 Z
|
1151 |
+
1.5
|
1152 |
+
2.0
|
1153 |
+
2.5
|
1154 |
+
3.0
|
1155 |
+
3.5
|
1156 |
+
4.0
|
1157 |
+
4.5
|
1158 |
+
a(Z)
|
1159 |
+
(c)
|
1160 |
+
Abaqus simulation
|
1161 |
+
1d model
|
1162 |
+
0
|
1163 |
+
2
|
1164 |
+
4
|
1165 |
+
6
|
1166 |
+
8 Z
|
1167 |
+
1
|
1168 |
+
2
|
1169 |
+
3
|
1170 |
+
4
|
1171 |
+
5
|
1172 |
+
6
|
1173 |
+
a(Z)
|
1174 |
+
(d)
|
1175 |
+
Figure 3: Bulging solutions given by Abaqus simulations and the 1d model at the four states marked in Fig. 2(a) for
|
1176 |
+
fixed N “ 0: (a) P “ 0.3, (b) P “ 0.25, (c) P “ 0.22, (d) P “ 0.197.
|
1177 |
+
18
|
1178 |
+
|
1179 |
+
6.2. The case of fixed ends
|
1180 |
+
Next, we consider the loading scenario whereby the tube is first stretched to a specified length
|
1181 |
+
2ℓ and then its two ends are fixed to prevent further axial displacement (whether the radial dis-
|
1182 |
+
placement is restricted or not at the ends is immaterial since the tube is assumed to be sufficiently
|
1183 |
+
long). In the previous subsection, we have solved the problem for a specified axial force N or
|
1184 |
+
equivalently a specified λ8. For the current problem with a given ℓ, we define λc “ ℓ{L and we
|
1185 |
+
need to find λ8 such that the following condition is satisfied:
|
1186 |
+
ż L
|
1187 |
+
0
|
1188 |
+
λpapZqq dZ “ λcL.
|
1189 |
+
(6.9)
|
1190 |
+
This can be achieved by a shooting procedure: for each N, we compute the left-hand side using
|
1191 |
+
the procedure outlined in the previous subsection and adjust N such that the left-hand side and
|
1192 |
+
the right-hand side are equal. The procedure may be started by taking λ8 “ λc. However, solving
|
1193 |
+
the present problem by the shooting procedure requires a lot of adjustments by hand due to the
|
1194 |
+
fact that the bulging solution may start to grow after decaying for a range of Z values. To find
|
1195 |
+
solutions for the current case in a more robust way, we use the finite difference method instead.
|
1196 |
+
To implement the finite difference method, we partition the domain r0, Ls using a uniform mesh
|
1197 |
+
Z0, Z1, . . . , Zn with mesh size h “ L{n and coordinate of the j-th grid point given by Zj “ jh. We
|
1198 |
+
use aj to represent the numerical approximation of apZjq. Applying the central difference scheme,
|
1199 |
+
we discretize the differential equation (6.7) as
|
1200 |
+
A2ajλpajqpQpaj, λpajqq ´ Pq ´ 1
|
1201 |
+
2D1pajq
|
1202 |
+
´aj`1 ´ aj´1
|
1203 |
+
2h
|
1204 |
+
¯2
|
1205 |
+
´ Dpajqaj`1 ´ 2aj ` aj´1
|
1206 |
+
h2
|
1207 |
+
“ 0,
|
1208 |
+
j “ 1, 2, . . . , n ´ 1.
|
1209 |
+
(6.10)
|
1210 |
+
The left boundary condition is given by
|
1211 |
+
a1p0q “ 0.
|
1212 |
+
(6.11)
|
1213 |
+
We see from (5.23) that the solution to (6.7) subject to (6.2) has the asymptotic behavior
|
1214 |
+
apZq „ a8 ` a1e´κZ
|
1215 |
+
as Z Ñ 8,
|
1216 |
+
(6.12)
|
1217 |
+
where a1 is a constant and
|
1218 |
+
κ “
|
1219 |
+
d
|
1220 |
+
ωpa8, λ8q
|
1221 |
+
Dpa8q
|
1222 |
+
.
|
1223 |
+
Because of this, we may replace the decaying condition boundary (6.2) by the “soft” asymptotic
|
1224 |
+
condition
|
1225 |
+
a1pLq ` κpapLq ´ a8q “ 0.
|
1226 |
+
(6.13)
|
1227 |
+
19
|
1228 |
+
|
1229 |
+
To avoid the loss of accuracy at the two endpoints, we introduce two additional unknowns a´1 and
|
1230 |
+
an`1. Then the left and right boundary conditions yield
|
1231 |
+
a1 ´ a´1
|
1232 |
+
2h
|
1233 |
+
“ 0,
|
1234 |
+
(6.14)
|
1235 |
+
an`1 ´ an´1
|
1236 |
+
2h
|
1237 |
+
` κpan ´ a8q “ 0.
|
1238 |
+
(6.15)
|
1239 |
+
Solving for a´1 and an`1 from the above equations, and substituting them into the difference
|
1240 |
+
equations (6.10) at j “ 0 and j “ n, we obtain the discrete boundary conditions with truncation
|
1241 |
+
errors of order h2:
|
1242 |
+
A2a0λpajqpQpa0, λpa0qq ´ Pq ´ 2Dpa0qa1 ´ a0
|
1243 |
+
h2
|
1244 |
+
“ 0,
|
1245 |
+
(6.16)
|
1246 |
+
A2anλpanqpQpan, λpanqq ´ Pq ´ 1
|
1247 |
+
2D1pajqκ2pan ´ a8q2
|
1248 |
+
´ 2Dpanqan´1 ´ an ´ hκpan ´ a8q
|
1249 |
+
h2
|
1250 |
+
“ 0.
|
1251 |
+
(6.17)
|
1252 |
+
Finally, the fixed-length restriction (6.9) gives
|
1253 |
+
1
|
1254 |
+
2λpa0q `
|
1255 |
+
n´1
|
1256 |
+
ÿ
|
1257 |
+
j“1
|
1258 |
+
λpajq ` 1
|
1259 |
+
2λpanq ´ λcL
|
1260 |
+
h
|
1261 |
+
“ 0.
|
1262 |
+
(6.18)
|
1263 |
+
We use the pressure P as the loading parameter. When P is given, one can first solve (6.4) to
|
1264 |
+
express a8 as a function of λ8. Then N can be viewed as a function of λ8 due to (6.3). It follows
|
1265 |
+
that λpµq and Dpµq also depend on λ8 through their dependence on N. This implicit dependence
|
1266 |
+
should be considered when solving the above algebraic equations.
|
1267 |
+
Setting n to be a sufficiently large number, say n “ 100, and solving the system of nonlinear
|
1268 |
+
algebraic equations consisting of (6.10), (6.16), (6.17) and (6.18) for aj’s and λ8 with a suitable
|
1269 |
+
initial guess, we obtain the finite-difference solution for the present problem.
|
1270 |
+
We may use the
|
1271 |
+
weakly nonlinear solution with fixed λ8 “ λc “ ℓ{L as an initial guess in the near-critical regime
|
1272 |
+
and continue the solution to the fully nonlinear regime by always using the solution at the previous
|
1273 |
+
step as the initial guess for the current step.
|
1274 |
+
When the total length is fixed to be ℓ “ 2L, then initially λ8 “ 2 and localized bulging takes
|
1275 |
+
place at a8 “ acr “ 1.74 with a critical pressure Pcr “ 0.198 according to (5.35). In Fig. 4, we have
|
1276 |
+
shown the dependence of the pressure on ap0q and the bulging amplitude on a8 based on Abaqus
|
1277 |
+
simulations and use of the 1d model. The bulging solutions determined by Abaqus simulations
|
1278 |
+
and the 1d model at the four states indicated in Fig. 4(a) are presented in Fig. 5. It is observed
|
1279 |
+
that the agreement between the 1d model and Abaqus simulations is again excellent in the fully
|
1280 |
+
nonlinear regime.
|
1281 |
+
Finally, Fig. 6 shows the actual variation of P against ap0q predicted by the 1d model when L
|
1282 |
+
is varied and the averaged stretch λc is fixed or λc is varied but L is fixed. These results confirm
|
1283 |
+
the theoretical prediction of Guo et al. (2022) that the right branches of these curves all converge
|
1284 |
+
20
|
1285 |
+
|
1286 |
+
●
|
1287 |
+
●
|
1288 |
+
●
|
1289 |
+
●
|
1290 |
+
●
|
1291 |
+
●
|
1292 |
+
●
|
1293 |
+
●
|
1294 |
+
●
|
1295 |
+
●
|
1296 |
+
●
|
1297 |
+
●
|
1298 |
+
●
|
1299 |
+
●
|
1300 |
+
●
|
1301 |
+
● ● ●
|
1302 |
+
●
|
1303 |
+
●
|
1304 |
+
● ●
|
1305 |
+
●
|
1306 |
+
●
|
1307 |
+
● ● ●
|
1308 |
+
● ● ●
|
1309 |
+
●
|
1310 |
+
● ●
|
1311 |
+
●
|
1312 |
+
●
|
1313 |
+
●
|
1314 |
+
1d model
|
1315 |
+
Abaqus simulation
|
1316 |
+
0
|
1317 |
+
1
|
1318 |
+
2
|
1319 |
+
3
|
1320 |
+
4
|
1321 |
+
5
|
1322 |
+
6
|
1323 |
+
7
|
1324 |
+
a(0)
|
1325 |
+
0.00
|
1326 |
+
0.05
|
1327 |
+
0.10
|
1328 |
+
0.15
|
1329 |
+
0.20
|
1330 |
+
P
|
1331 |
+
a
|
1332 |
+
b
|
1333 |
+
c
|
1334 |
+
d
|
1335 |
+
(a)
|
1336 |
+
●
|
1337 |
+
●
|
1338 |
+
●
|
1339 |
+
●
|
1340 |
+
●
|
1341 |
+
●
|
1342 |
+
●
|
1343 |
+
●
|
1344 |
+
●
|
1345 |
+
●
|
1346 |
+
●
|
1347 |
+
●
|
1348 |
+
●
|
1349 |
+
●
|
1350 |
+
●
|
1351 |
+
●
|
1352 |
+
●
|
1353 |
+
●
|
1354 |
+
●
|
1355 |
+
●
|
1356 |
+
●
|
1357 |
+
●
|
1358 |
+
●
|
1359 |
+
●
|
1360 |
+
●
|
1361 |
+
●
|
1362 |
+
●
|
1363 |
+
1d model
|
1364 |
+
Abaqus simulation
|
1365 |
+
1.1
|
1366 |
+
1.2
|
1367 |
+
1.3
|
1368 |
+
1.4
|
1369 |
+
1.5
|
1370 |
+
1.6
|
1371 |
+
1.7
|
1372 |
+
1.8a∞
|
1373 |
+
1
|
1374 |
+
2
|
1375 |
+
3
|
1376 |
+
4
|
1377 |
+
5
|
1378 |
+
6
|
1379 |
+
a(0) - a∞
|
1380 |
+
(b)
|
1381 |
+
Figure 4: Dependence of (a) pressure on ap0q and (b) bulging amplitude on a8 based on Abaqus simulations and
|
1382 |
+
using the 1d model for fixed length ℓ{L “ 2.
|
1383 |
+
Abaqus simulation
|
1384 |
+
1d model
|
1385 |
+
0
|
1386 |
+
2
|
1387 |
+
4
|
1388 |
+
6
|
1389 |
+
8
|
1390 |
+
10
|
1391 |
+
12Z
|
1392 |
+
1.2
|
1393 |
+
1.4
|
1394 |
+
1.6
|
1395 |
+
1.8
|
1396 |
+
2.0
|
1397 |
+
2.2
|
1398 |
+
2.4
|
1399 |
+
2.6
|
1400 |
+
2.8
|
1401 |
+
a(Z)
|
1402 |
+
(a)
|
1403 |
+
Abaqus simulation
|
1404 |
+
1d model
|
1405 |
+
0
|
1406 |
+
2
|
1407 |
+
4
|
1408 |
+
6
|
1409 |
+
8
|
1410 |
+
10
|
1411 |
+
12Z
|
1412 |
+
1.0
|
1413 |
+
1.5
|
1414 |
+
2.0
|
1415 |
+
2.5
|
1416 |
+
3.0
|
1417 |
+
3.5
|
1418 |
+
a(Z)
|
1419 |
+
(b)
|
1420 |
+
Abaqus simulation
|
1421 |
+
1d model
|
1422 |
+
0
|
1423 |
+
2
|
1424 |
+
4
|
1425 |
+
6
|
1426 |
+
8
|
1427 |
+
10
|
1428 |
+
12Z
|
1429 |
+
1
|
1430 |
+
2
|
1431 |
+
3
|
1432 |
+
4
|
1433 |
+
5
|
1434 |
+
a(Z)
|
1435 |
+
(c)
|
1436 |
+
Abaqus simulation
|
1437 |
+
1d model
|
1438 |
+
0
|
1439 |
+
2
|
1440 |
+
4
|
1441 |
+
6
|
1442 |
+
8
|
1443 |
+
10
|
1444 |
+
12Z
|
1445 |
+
1
|
1446 |
+
2
|
1447 |
+
3
|
1448 |
+
4
|
1449 |
+
5
|
1450 |
+
6
|
1451 |
+
7
|
1452 |
+
a(Z)
|
1453 |
+
(d)
|
1454 |
+
Figure 5: Bulging solutions based on Abaqus simulations and the 1d model the at the four states indicated in Fig.
|
1455 |
+
4(a) for fixed length ℓ{L “ 2: (a) P “ 0.19, (b) P “ 0.18, (c) P “ 0.173, (d) P “ 0.198.
|
1456 |
+
to a master curve that is independent of L or λc. These curves all terminate at the point where
|
1457 |
+
the axial stress near each end of the tube has become compressive enough so that secondary Euler
|
1458 |
+
buckling or axisymmetric wrinkling becomes possible.
|
1459 |
+
21
|
1460 |
+
|
1461 |
+
L=15
|
1462 |
+
L=20
|
1463 |
+
L=40
|
1464 |
+
0
|
1465 |
+
1
|
1466 |
+
2
|
1467 |
+
3
|
1468 |
+
4
|
1469 |
+
5
|
1470 |
+
6
|
1471 |
+
7
|
1472 |
+
a(0)
|
1473 |
+
0.12
|
1474 |
+
0.14
|
1475 |
+
0.16
|
1476 |
+
0.18
|
1477 |
+
0.20
|
1478 |
+
0.22
|
1479 |
+
P
|
1480 |
+
(a)
|
1481 |
+
λc=1.5
|
1482 |
+
λc=2
|
1483 |
+
λc=2.8
|
1484 |
+
0
|
1485 |
+
1
|
1486 |
+
2
|
1487 |
+
3
|
1488 |
+
4
|
1489 |
+
5
|
1490 |
+
6
|
1491 |
+
7
|
1492 |
+
a(0)
|
1493 |
+
0.00
|
1494 |
+
0.05
|
1495 |
+
0.10
|
1496 |
+
0.15
|
1497 |
+
0.20
|
1498 |
+
0.25
|
1499 |
+
P
|
1500 |
+
(b)
|
1501 |
+
Figure 6: Variation of P against ap0q predicted by the 1d model when (a) the total length is fixed with λc “ 2 and
|
1502 |
+
L “ 15, 20 and 40, respectively and (b) L is fixed at 20 and λc “ 1.5, 2 and 2.8, respectively.
|
1503 |
+
7. Conclusion
|
1504 |
+
We have derived a 1d model for the analysis of axisymmetric deformations of an inflated cylin-
|
1505 |
+
drical tube of finite wall thickness, and established its range of validity by comparing its predictions
|
1506 |
+
with those of Abaqus simulations for two typical loading scenarios. The comparison shows that
|
1507 |
+
the 1d model performs extremely well in both the near-critical and fully nonlinear regimes. The
|
1508 |
+
dimension reduction started from three-dimensional finite elasticity theory and is performed in
|
1509 |
+
terms of the energy functional and principal stretches. A key ingredient of the dimension reduc-
|
1510 |
+
tion is the assumption of slow variation of the leading-order solution in the axial direction without
|
1511 |
+
any restriction on its amplitude, which results in a 1d model that is simple but is still capable of
|
1512 |
+
capturing the strain-gradient effect. This is in contrast with the traditional asymptotic analysis
|
1513 |
+
where the leading order solution is assumed to be a small-amplitude perturbation from the primary
|
1514 |
+
deformation. It is because of this difference that the 1d model has a much larger range of validity
|
1515 |
+
than the expansion methods around the bifurcation point. The nonlinearity of the strain is kept
|
1516 |
+
in the 1d model, reflected by the nonlinear potential Gpa, λpaqq and the nonlinear strain gradient
|
1517 |
+
modulus Dpaq. Our expression for the strain gradient coefficient Dpaq is quite simple. For the
|
1518 |
+
Gent material model, Dpaq can be calculated by integrating once. We remark that although the
|
1519 |
+
derivation presented in this work is variational, the 1d model can also be derived by substituting
|
1520 |
+
the asymptotic solution (4.2) into the 3d governing equations and solving the resulting equations
|
1521 |
+
at successive orders.
|
1522 |
+
The 1d model is amenable to asymptotic and numerical solutions. The bifurcation condition and
|
1523 |
+
the weakly nonlinear amplitude equation predicted by the model are exact. In fact, the expressions
|
1524 |
+
(5.24) and (5.25) derived using the 1d model are more compact and more revealing than their
|
1525 |
+
counterparts in Ye et al. (2020). A major advantage of the 1d model is that the entire evolution
|
1526 |
+
process of bulging or necking can be determined using the finite difference method which is more
|
1527 |
+
accessible and much easier to implement than commercial packages such as Abaqus. This advantage
|
1528 |
+
22
|
1529 |
+
|
1530 |
+
would become even more significant when other fields such as electric loading and residual stresses
|
1531 |
+
were also present. Such extra fields and new geometries (e.g. axisymmetric necking of a stretched
|
1532 |
+
plate (Wang et al., 2022) ) will be considered in our future studies.
|
1533 |
+
A Mathematica code that produces all the results presented in the paper is available on GitHub
|
1534 |
+
(https://github.com/yfukeele).
|
1535 |
+
Acknowledgments
|
1536 |
+
This work was supported by the National Natural Science Foundation of China (Grant No
|
1537 |
+
12072224) and the Engineering and Physical Sciences Research Council, UK (Grant No EP/W007150/1).
|
1538 |
+
Appendix A. Simplifying the one-dimensional energy functional
|
1539 |
+
Substituting (4.19) into (4.11), we can write the integral of KpR, v, vRq as
|
1540 |
+
ż B
|
1541 |
+
A
|
1542 |
+
KpR, v, vRq dR “ pI1 ` I2 ` I3qa12,
|
1543 |
+
(A.1)
|
1544 |
+
where
|
1545 |
+
I1 “
|
1546 |
+
ż B
|
1547 |
+
A
|
1548 |
+
pλ´1¯σ22qaR
|
1549 |
+
ż B
|
1550 |
+
R
|
1551 |
+
cpa, Tq dT dR,
|
1552 |
+
(A.2)
|
1553 |
+
I2 “ 1
|
1554 |
+
2
|
1555 |
+
ż B
|
1556 |
+
A
|
1557 |
+
Rζp¯r2
|
1558 |
+
a ` cpa, Rq2q dR,
|
1559 |
+
(A.3)
|
1560 |
+
I3 “
|
1561 |
+
ż B
|
1562 |
+
A
|
1563 |
+
Rξ¯racpa, Rq dR.
|
1564 |
+
(A.4)
|
1565 |
+
By interchanging the order of integration, we can rewrite I1 as
|
1566 |
+
I1 “
|
1567 |
+
ż B
|
1568 |
+
A
|
1569 |
+
ż B
|
1570 |
+
R
|
1571 |
+
pλ´1¯σ22qaRcpa, Tq dT dR
|
1572 |
+
“
|
1573 |
+
ż B
|
1574 |
+
A
|
1575 |
+
ż T
|
1576 |
+
A
|
1577 |
+
pλ´1¯σ22qaRcpa, Tq dR dT
|
1578 |
+
“
|
1579 |
+
ż B
|
1580 |
+
A
|
1581 |
+
cpa, Tq B
|
1582 |
+
Ba
|
1583 |
+
´ ż T
|
1584 |
+
A
|
1585 |
+
λ´1¯σ22R dR
|
1586 |
+
¯
|
1587 |
+
dT.
|
1588 |
+
(A.5)
|
1589 |
+
From (3.14), we have
|
1590 |
+
ż T
|
1591 |
+
A
|
1592 |
+
λ´1¯σ22R dR “ A2mpa, Aq ´ T 2mpa, Tq.
|
1593 |
+
(A.6)
|
1594 |
+
Inserting (A.6) into (A.5) and noting (3.15)2 and (3.11), we can simplify I1 as
|
1595 |
+
I1 “ PA2a
|
1596 |
+
ż B
|
1597 |
+
A
|
1598 |
+
cpa, Rq dR ´
|
1599 |
+
ż B
|
1600 |
+
A
|
1601 |
+
cpa, RqR2 B
|
1602 |
+
Bampa, Rq dR.
|
1603 |
+
(A.7)
|
1604 |
+
23
|
1605 |
+
|
1606 |
+
Noting that ξ “ q¯λ1 ` ¯λ3ζ{λ, the integral I3 can be calculated as
|
1607 |
+
I3 “
|
1608 |
+
ż B
|
1609 |
+
A
|
1610 |
+
R
|
1611 |
+
´
|
1612 |
+
q¯λ1 `
|
1613 |
+
¯λ3
|
1614 |
+
λ ζ
|
1615 |
+
¯
|
1616 |
+
¯racpa, Rq dR “
|
1617 |
+
ż B
|
1618 |
+
A
|
1619 |
+
´
|
1620 |
+
¯r¯raq ` Rζ ¯ra
|
1621 |
+
¯λ1λ2
|
1622 |
+
¯
|
1623 |
+
cpa, Rq dR.
|
1624 |
+
(A.8)
|
1625 |
+
Adding up the three integrals, we obtain
|
1626 |
+
ż B
|
1627 |
+
A
|
1628 |
+
KpR, v, vRq dR ` PA2aa1v|R“A “pI1 ` I2 ` I3qa12 ´ PA2aa12
|
1629 |
+
ż B
|
1630 |
+
A
|
1631 |
+
cpa, Rq dR
|
1632 |
+
“a12
|
1633 |
+
ż B
|
1634 |
+
A
|
1635 |
+
´
|
1636 |
+
´ cpa, RqR2 B
|
1637 |
+
Bampa, Rq ` 1
|
1638 |
+
2Rζp¯r2
|
1639 |
+
a ` cpa, Rq2q
|
1640 |
+
`
|
1641 |
+
´
|
1642 |
+
¯r¯raqpa, Rq ` Rζ ¯ra
|
1643 |
+
λ1λ2
|
1644 |
+
¯
|
1645 |
+
cpa, Rq
|
1646 |
+
¯
|
1647 |
+
dR
|
1648 |
+
“a12
|
1649 |
+
ż B
|
1650 |
+
A
|
1651 |
+
p1
|
1652 |
+
2Rζp¯r2
|
1653 |
+
a ` cpa, Rq2q ´ Rζcpa, Rq2q dR
|
1654 |
+
“1
|
1655 |
+
2a12
|
1656 |
+
ż B
|
1657 |
+
A
|
1658 |
+
Rζp¯r2
|
1659 |
+
a ´ cpa, Rq2q dR.
|
1660 |
+
(A.9)
|
1661 |
+
This gives the expression of the coefficient Dpaq announced in (4.21). The expression of Cpaq in
|
1662 |
+
(4.22) follows by a straightforward substitution.
|
1663 |
+
References
|
1664 |
+
Alhayani, A. A., Rodr´ıguez, J., & Merodio, J. (2014). Competition between radial expansion and
|
1665 |
+
axial propagation in bulging of inflated cylinders with application to aneurysms propagation in
|
1666 |
+
arterial wall tissue. Int. J. Eng. Sci., 85, 74–89.
|
1667 |
+
Althobaiti, A. (2022). Effect of torsion on the initiation of localized bulging in a hyperelastic tube
|
1668 |
+
of arbitrary thickness. Z. fur Angew. Math. Phys., 73, 1–11.
|
1669 |
+
Audoly, B., & Hutchinson, J. W. (2016). Analysis of necking based on a one-dimensional model.
|
1670 |
+
J. Mech. Phys. Solids, 97, 68–91.
|
1671 |
+
Audoly, B., & Neukirch, S. (2021). A one-dimensional model for elastic ribbons: a little stretching
|
1672 |
+
makes a big difference. J. Mech. Phys. Solids, 153, 104457.
|
1673 |
+
Bucchi, A., & Hearn, G. E. (2013). Delay or removal of aneurysm formation in the anaconda wave
|
1674 |
+
energy extraction device. Renewable Energy, 55, 104–119.
|
1675 |
+
Chater, E., & Hutchinson, J. W. (1984). On the propagation of bulges and buckles. ASME J.
|
1676 |
+
Appl. Mech., 51, 269–277.
|
1677 |
+
Demirkoparan, H., & Merodio, J. (2017). Bulging bifurcation of inflated circular cylinders of doubly
|
1678 |
+
fiber-reinforced hyperelastic material under axial loading and swelling. Math. Mech. Solids, 22,
|
1679 |
+
666–682.
|
1680 |
+
24
|
1681 |
+
|
1682 |
+
Emery, D. (2023). Elasto-capillary necking, bulging and maxwell states in soft compressible cylin-
|
1683 |
+
ders. Int. J. Non-linear Mech., 148, 104276.
|
1684 |
+
Emery, D., & Fu, Y. B. (2021a). Localised bifurcation in soft cylindrical tubes under axial stretching
|
1685 |
+
and surface tension. Int. J. Solids Struct., 219-220, 23–33.
|
1686 |
+
Emery, D., & Fu, Y. B. (2021b). Localized bifurcation in soft cylindrical tubes under axial stretching
|
1687 |
+
and surface tension. Int. J. Solids Struct., 219, 23–33.
|
1688 |
+
Emery, D., & Fu, Y. B. (2021c). Post-bifurcation behaviour of elasto-capillary necking and bulging
|
1689 |
+
in soft tubes. Proc. R. Soc. A, 477, 20210311.
|
1690 |
+
Fu, Y. B., & Il’ichev, A. T. (2015). Localized standing waves in a hyperelastic membrane tube and
|
1691 |
+
their stabilization by a mean flow. Maths Mech. Solids, 20, 1198–1214.
|
1692 |
+
Fu, Y. B., Jin, L. S., & Goriely, A. (2021). Necking, beading, and bulging in soft elastic cylinders.
|
1693 |
+
J. Mech. Phys. Solids, 147, 104250.
|
1694 |
+
Fu, Y. B., Liu, J. L., & Francisco, G. S. (2016). Localized bulging in an inflated cylindrical tube
|
1695 |
+
of arbitrary thickness–the effect of bending stiffness. J. Mech. Phys. Solids, 90, 45–60.
|
1696 |
+
Fu, Y. B., Pearce, S. P., & Liu, K.-K. (2008). Post-bifurcation analysis of a thin-walled hyperelastic
|
1697 |
+
tube under inflation. Int. J. Non-Linear Mech., 43, 697–706.
|
1698 |
+
Fu, Y. B., Rogerson, G. A., & Zhang, Y. T. (2012).
|
1699 |
+
Initiation of aneurysms as a mechanical
|
1700 |
+
bifurcation phenomenon. Int. J. Non-linear Mech., 47, 179–184.
|
1701 |
+
Fu, Y. B., & Xie, Y. X. (2010). Stability of localized bulging in inflated membrane tubes under
|
1702 |
+
volume control. Int. J. Eng. Sci., 48, 1242–1252.
|
1703 |
+
Goncalves, P. B., Pamplona, D. C., & Lopes, S. R. X. (2008). Finite deformations of an initially
|
1704 |
+
stressed cylindrical shell under internal pressure. Int. J. Mech. Sci., 50, 92–103.
|
1705 |
+
Green, A. E., & Adkins, J. E. (1960).
|
1706 |
+
Large Elastic Deformations and Non-linear Continuum
|
1707 |
+
Mechanics. Clarendon Press, Oxford.
|
1708 |
+
Guo, Z. M., Wang, S. B., & Fu, Y. B. (2022). Localised bulging of an inflated rubber tube with
|
1709 |
+
fixed ends. Proc. R. Soc. A, 380, 20210318.
|
1710 |
+
Haughton, D. M., & Ogden, R. W. (1979).
|
1711 |
+
Bifurcation of inflated circular cylinders of elastic
|
1712 |
+
material under axial loading ii. exact theory for thick-walled tubes. J. Mech. Phy. Solids, 27,
|
1713 |
+
489–512.
|
1714 |
+
Hejazi, M., Hsiang, Y., & Srikantha Phani, A. (2021). Fate of a bulge in an inflated hyperelastic
|
1715 |
+
tube: theory and experiment. Proc. Roy. Soc. A, 477, 20200837.
|
1716 |
+
25
|
1717 |
+
|
1718 |
+
Knowles, J. K., & Sternberg, E. (1976). On the failure of ellipticity of the equations for finite
|
1719 |
+
elastostatic plane strain. Arch. Ratl Mech. Anal., 63, 321–336.
|
1720 |
+
Kumar, A., Audoly, B., & Lestringant, C. (2022). Asymptotic derivation of a higher-order one-
|
1721 |
+
dimensional model for tape springs. hal-03765944, .
|
1722 |
+
Kyriakides, S., & Chang, Y.-C. (1990). On the inflation of a long elastic tube in the presence of
|
1723 |
+
axial load. Int. J. Solids Struct., 26, 975–991.
|
1724 |
+
Kyriakides, S., & Chang, Y.-C. (1991). The initiation and propagation of a localized instability in
|
1725 |
+
an inflated elastic tube. Int. J. Solids Struct., 27, 1085–1111.
|
1726 |
+
Lestringant, C., & Audoly, B. (2018). A diffuse interface model for the analysis of propagating
|
1727 |
+
bulges in cylindrical balloons. Proc. R. Soc. A, 474, 20180333.
|
1728 |
+
Lestringant, C., & Audoly, B. (2020a). Asymptotically exact strain-gradient models for nonlinear
|
1729 |
+
slender elastic structures: a systematic derivation method. J. Mech. Phys. Solids, 136, 103730.
|
1730 |
+
Lestringant, C., & Audoly, B. (2020b). A one-dimensional model for elasto-capillary necking. Proc.
|
1731 |
+
R. Soc. A, 476, 20200337.
|
1732 |
+
Lin, Z. H., Li, L. A., & Ye, Y. (2020). Numerical simulation of localized bulging in an inflated
|
1733 |
+
hyperelastic tube with fixed ends. Int. J. Appl. Mech., 12, 2050118.
|
1734 |
+
Liu, Y., Ye, Y., Althobaiti, A., & Xie, Y.-X. (2019). Prevention of localized bulging in an inflated
|
1735 |
+
bilayer tube. Int. J. Mech. Sci., 153, 359–368.
|
1736 |
+
Lu, T. Q., An, L., Li, J. G., Yuan, C., & Wang, T. J. (2015). Electro-mechanical coupling bifurcation
|
1737 |
+
and bulging propagation in a cylindrical dielectric elastomer tube. J. Mech. Phy. Solids, 85, 160–
|
1738 |
+
175.
|
1739 |
+
Lu, T. Q., Ma, C., & Wang, T. J. (2020). Mechanics of dielectric elastomer structures: A review.
|
1740 |
+
Extr. Mech. Lett., 38, 100752.
|
1741 |
+
Lu, T. Q., & Suo, Z. G. (2012). Large conversion of energy in dielectric elastomers by electrome-
|
1742 |
+
chanical phase transition. Acta Mech. Sin., 28, 1106–1114.
|
1743 |
+
Ma, G. Y., Huang, X. Q., Liu, J. J., Li, T. F., Qu, S. X., & Yang, W. (2015). Dielectric elastomer
|
1744 |
+
peristaltic pump module with finite deformation. Smart Mat. Struct., 24, 075026.
|
1745 |
+
M¨uller, B., Lang, S., Dominietto, M., Rudin, M., Schulz, G., Deyhle, H., Germann, M., Pfeiffer,
|
1746 |
+
F., David, C., & Weitkamp, T. (2008). High-resolution tomographic imaging of microvessels. In
|
1747 |
+
Developments in X-ray Tomography VI (pp. 89–98). SPIE volume 7078.
|
1748 |
+
26
|
1749 |
+
|
1750 |
+
Pamplona, D. C., Goncalves, P. B., & Lopes, S. R. X. (2006). Finite deformations of cylindrical
|
1751 |
+
membrane under internal pressure. Int. J. Mech. Sci., 48, 683–696.
|
1752 |
+
Pearce, S. P., & Fu, Y. B. (2010). Characterization and stability of localized bulging/necking in
|
1753 |
+
inflated membrane tubes. IMA J. Appl. Math., 75, 581–602.
|
1754 |
+
Pipkin, A. C. (1968). Integration of an equation in membranes theory. Z. Angew. Math. Phys., 19,
|
1755 |
+
818–819.
|
1756 |
+
Smith, Q. R. (2016). Wave-structure interactions for the distensible tube wave energy converter.
|
1757 |
+
Proc. R. Soc. A, 472, 20160160.
|
1758 |
+
Varatharajan, N., & DasGupta, A. (2017).
|
1759 |
+
Study of bifurcation in a pressurized hyperelastic
|
1760 |
+
membrane tube enclosed by a soft substrate. Int. J. Non-linear Mech., 95, 233–241.
|
1761 |
+
Wang, J., Althobaiti, A., & Fu, Y. B. (2017). Localized bulging of rotating elastic cylinders and
|
1762 |
+
tubes. J. Mech. Mater. Struct., 12, 545–561.
|
1763 |
+
Wang, J., & Fu, Y. B. (2018). Effect of double-fibre reinforcement on localized bulging of an inflated
|
1764 |
+
cylindrical tube of arbitrary thickness. J. Eng. Math., 109, 21–30.
|
1765 |
+
Wang, M., & Fu, Y. B. (2021). Necking of a hyperelastic solid cylinder under axial stretching:
|
1766 |
+
Evaluation of the infinite-length approximation. Int. J. Eng. Sci., 159, 103432.
|
1767 |
+
Wang, M., Jin, L. S., & Fu, Y. B. (2022). Axi-symmetric necking versus treloar-kearsley instability
|
1768 |
+
in a hyperelastic sheet under equibiaxial stretching. Math. Mech. Solids, to appear.
|
1769 |
+
Wang, S. B., Guo, Z. M., Zhou, L., Li, L. A., & Fu, Y. B. (2019). An experimental study of localized
|
1770 |
+
bulging in inflated cylindrical tubes guided by newly emerged analytical results. J. Mech. Phys.
|
1771 |
+
Solids, 124, 536–554.
|
1772 |
+
Wolfram, S. (1991). Mathematica: A System for Doing Mathematics by Computer (2nd Edn).
|
1773 |
+
Addison-Wesley, California.
|
1774 |
+
Ye, Y., Liu, Y., Althobaiti, A., & Xie, Y.-X. (2019). Localized bulging in an inflated bilayer tube
|
1775 |
+
of arbitrary thickness: Effects of the stiffness ratio and constitutive model. Int. J. Solids Struct.,
|
1776 |
+
176, 173–184.
|
1777 |
+
Ye, Y., Liu, Y., & Fu, Y. B. (2020). Weakly nonlinear analysis of localized bulging of an inflated
|
1778 |
+
hyperelastic tube of arbitrary wall thickness. J. Mech. Phys. Solids, 135, 103804.
|
1779 |
+
Yin, W.-L. (1977). Non-uniform inflation of a cylindrical elastic membrane and direct determination
|
1780 |
+
of the strain energy function. J. Elast., 7, 265–282.
|
1781 |
+
Yu, X., & Fu, Y. B. (2022). An analytic derivation of the bifurcation conditions for localization in
|
1782 |
+
hyperelastic tubes and sheets. Z. Angew. Math. Phys., 73, 1–16.
|
1783 |
+
27
|
1784 |
+
|
5NE1T4oBgHgl3EQfBAIU/content/tmp_files/load_file.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
5dE3T4oBgHgl3EQfQgnL/content/2301.04414v1.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:681bfe8dd6075f791e2a70958be7343c1b514e7fc9ade013711bea6d0d1e30d8
|
3 |
+
size 3793444
|
5dE3T4oBgHgl3EQfQgnL/vector_store/index.pkl
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:09696876e64c0f455959efc29e76beadbcbb457f80229f647f709a1b82150605
|
3 |
+
size 179314
|
5dE4T4oBgHgl3EQfbwyA/content/2301.05077v1.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:7407bf8904c45fc6a5473cfbb291c3b8f4af2a8037afbc7a549deec85b70005c
|
3 |
+
size 1348476
|
5dE4T4oBgHgl3EQfbwyA/vector_store/index.faiss
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:393ece48fd74739eed728a412b4b2012d1c9861aaa90620451a8e4deaa6a48cd
|
3 |
+
size 5636141
|
5dE4T4oBgHgl3EQfbwyA/vector_store/index.pkl
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:1d9248c5547385b81c5d4fc9d66fca10b2776d55393df36031bc3aaf376ed809
|
3 |
+
size 201599
|
5tFIT4oBgHgl3EQf8CtK/vector_store/index.faiss
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:e83c273623c2d0f2acbda5628f65f5625a1176a006c8c4fd5d1fce952cc100f3
|
3 |
+
size 60751917
|
79E3T4oBgHgl3EQfRwk1/content/tmp_files/2301.04424v1.pdf.txt
ADDED
@@ -0,0 +1,1399 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
RIEMANNIAN GEOMETRY AND MOLECULAR SIMILARITY II:
|
2 |
+
KÄHLER QUANTIZATION
|
3 |
+
A PREPRINT
|
4 |
+
Rachael Pirie
|
5 |
+
School of Natural and Environmental Sciences
|
6 |
+
Newcastle University
|
7 | |
8 |
+
Stuart J. Hall
|
9 |
+
School of Mathematics, Statistics, and Physics
|
10 |
+
Newcastle University
|
11 | |
12 |
+
Daniel J. Cole
|
13 |
+
School of Natural and Environmental Sciences
|
14 |
+
Newcastle University
|
15 | |
16 |
+
Thomas Murphy
|
17 |
+
Department of Mathematics
|
18 |
+
California State University, Fullerton
|
19 | |
20 |
+
January 12, 2023
|
21 |
+
ABSTRACT
|
22 |
+
Shape-similarity between molecules is a tool used by chemists for virtual screening, with the goal of
|
23 |
+
reducing the cost and duration of drug discovery campaigns. This paper reports an entirely novel
|
24 |
+
shape descriptor as an alternative to the previously described RGMolSA descriptors [1], derived from
|
25 |
+
the theory of Riemannian geometry and Kähler quantization (KQMolSA). The treatment of a molecule
|
26 |
+
as a series of intersecting spheres allows us to obtain the explicit Riemannian metric which captures
|
27 |
+
the geometry of the surface, which can in turn be used to calculate a Hermitian matrix M as a directly
|
28 |
+
comparable surface representation. The potential utility of this method is demonstrated using a series
|
29 |
+
of PDE5 inhibitors considered to have similar shape. The method shows promise in its capability to
|
30 |
+
handle different conformers, and compares well to existing shape similarity methods. The code and
|
31 |
+
data used to produce the results are available at: https://github.com/RPirie96/KQMolSA.
|
32 |
+
Keywords Riemannian Geometry · Kähler Quantization · Molecular Shape · Ligand-Based Virtual Screening
|
33 |
+
1
|
34 |
+
Introduction and Summary of Part I
|
35 |
+
The concept that shared biological activity exists between similar molecules is used widely in drug discovery [2].
|
36 |
+
Molecules with known activity can be used as templates to screen large databases for other potential hits. This is
|
37 |
+
more efficient and allows coverage of a greater area of chemical space than is possible with experimental screening
|
38 |
+
alone [3]. Estimating similarity between molecules based on their 3D shape has gained popularity due to the
|
39 |
+
requirement for protein-drug shape complementarity to enable strong binding. However no fixed notion of shape
|
40 |
+
exists. Instead, comparison relies on mathematical approximation of the molecule’s shape based on its volume,
|
41 |
+
distribution of atomic distances or surface (most commonly treated as the van der Waals or solvent accessible surface) [4].
|
42 |
+
In the accompanying paper [1], the RGMolSA method was presented.
|
43 |
+
The descriptor developed there ap-
|
44 |
+
proximates the shape of the molecular surface using a simple nine-element vector containing the surface area and an
|
45 |
+
approximation to the first eight non-zero eigenvalues of the ordinary Laplacian. The descriptor can be viewed as an
|
46 |
+
approximation to the Riemannian metric, the underlying mathematical object that describes the shape of a surface.
|
47 |
+
In this paper we present an entirely different method of approximating the Riemannian metric by using ideas from
|
48 |
+
the theory of Kähler quantization; we call this method Kähler quantization for Molecular Surface Approximation
|
49 |
+
(KQMolSA). The theory was originally developed by mathematicians and string theorists in order to give explicit
|
50 |
+
representations of the shapes of 4-dimensional objects (Calabi–Yau manifolds) that appear in physical theories (see [5]
|
51 |
+
arXiv:2301.04424v1 [math.DG] 11 Jan 2023
|
52 |
+
|
53 |
+
Geometry and Molecular Surfaces
|
54 |
+
A PREPRINT
|
55 |
+
for the paper that pioneered its use as a numerical technique). In a nutshell, a function called the Kähler potential
|
56 |
+
is associated to the metric. We then compute something analogous to a Taylor expansion of this function with the
|
57 |
+
coefficients being stored in a Hermitian matrix. While the matrices themselves do depend upon the precise position and
|
58 |
+
parameterisation of the molecular surface in three-dimensional space R3, the dependence is easy to calculate. Hence we
|
59 |
+
can perform our calculations in the ‘quantized’ space of Hermitian matrices and assign a distance between the shapes of
|
60 |
+
two molecular surfaces this way. The final distance is independent of the position of the molecules and the choices
|
61 |
+
made in their parameterisations.
|
62 |
+
1.1
|
63 |
+
Summary of Previous Work
|
64 |
+
As in the accompanying paper [1], our approach begins by treating the molecule as a series of intersecting spheres, with
|
65 |
+
their radii given by the van der Waals radii of the constituent atoms. The surface is assumed to have a genus of zero, so
|
66 |
+
any rings (e.g. benzene) are replaced with a single sphere of radius 2.25 Å to facilitate this. The molecular structure
|
67 |
+
is then defined by the number of spheres N (with each ring counted as a single sphere, and excluding any hydrogen
|
68 |
+
atoms), the centres ci and radii ri for each sphere and the adjacency matrix T describing intersection of spheres, where
|
69 |
+
Tij =
|
70 |
+
�
|
71 |
+
1
|
72 |
+
if spheres i and j intersect
|
73 |
+
0
|
74 |
+
otherwise (or i = j).
|
75 |
+
The surface area A of the molecule is calculated as the area of each sphere minus the “missing parts" where two spheres
|
76 |
+
intersect:
|
77 |
+
A = 2π
|
78 |
+
�
|
79 |
+
i
|
80 |
+
�
|
81 |
+
�2r2
|
82 |
+
i −
|
83 |
+
�
|
84 |
+
�ri
|
85 |
+
�
|
86 |
+
j
|
87 |
+
Tij|ri − λij|
|
88 |
+
�
|
89 |
+
�
|
90 |
+
�
|
91 |
+
� .
|
92 |
+
(1)
|
93 |
+
This value is used to re-scale each of the starting constructs such that the surface area of the molecule is equal to that of
|
94 |
+
a unit sphere (or 4π) to address the observation that Riemannian geometry treats two objects which differ only in size
|
95 |
+
as having equivalent shape. This re-scaling is accounted for in the final descriptors with some weighting so as not to
|
96 |
+
dominate the similarity calculation.
|
97 |
+
From the initial data, a map is constructed to ‘unwrap‘ the surface onto the complex plane C in a process
|
98 |
+
we refer to as piecewise stereographic projection. This requires an atom to be selected as a starting point from which to
|
99 |
+
construct our map, which we refer to as the base sphere. This is taken to be the atom closest to the centre of mass by
|
100 |
+
first finding the centroid of the molecule and then taking the atom with the smallest Euclidean distance from this point.
|
101 |
+
The Riemannian metric g = Φ∗
|
102 |
+
ps(gEuc) induced by the mapping Φps : C → S ⊂ R3 takes the form
|
103 |
+
g =
|
104 |
+
�
|
105 |
+
�
|
106 |
+
�
|
107 |
+
�
|
108 |
+
�
|
109 |
+
�
|
110 |
+
�
|
111 |
+
�
|
112 |
+
�
|
113 |
+
�
|
114 |
+
�
|
115 |
+
�
|
116 |
+
�
|
117 |
+
�
|
118 |
+
�
|
119 |
+
�
|
120 |
+
�
|
121 |
+
�
|
122 |
+
�
|
123 |
+
�
|
124 |
+
�
|
125 |
+
�
|
126 |
+
�
|
127 |
+
4r2
|
128 |
+
B
|
129 |
+
(1+|z|2)2 (dx2 + dy2)
|
130 |
+
if z ∈ C
|
131 |
+
C1
|
132 |
+
(|z−A1|2+B1)2 (dx2 + dy2)
|
133 |
+
if z ∈ D(a1, R1),
|
134 |
+
C2
|
135 |
+
(|z−A2|2+B2)2 (dx2 + dy2)
|
136 |
+
if z ∈ D(a2, R2),
|
137 |
+
...
|
138 |
+
...
|
139 |
+
CN−1
|
140 |
+
(|z−AN−1|2+BN−1)2 (dx2 + dy2)
|
141 |
+
if z ∈ D(aN−1, RN−1),
|
142 |
+
(2)
|
143 |
+
where rB is the radius of the base sphere and
|
144 |
+
C = C\D(a1, R1) ∪ D(a2, R2) ∪ · · · ∪ D(aN−1, RN−1),
|
145 |
+
is the complement of the discs D(a1, R1), . . . , D(aN−1, RN−1) which corresponds to the points in the base sphere.
|
146 |
+
The RGMolSA descriptor uses the explicit form of the Riemannian metric provided by piecewise stereo-
|
147 |
+
graphic projection to approximate the low-lying eigenfunctions of the Laplacian ∆. In [1], we compared the RGMolSA
|
148 |
+
descriptor for Sildenafil, Vardenafil and Tadalafil, a series of PDE5 inhibitors that are known to occupy a similar volume
|
149 |
+
in the binding pocket of their target protein, and thus have similar shape (Figure 1) [6]. Vardenafil is a classic example
|
150 |
+
of a “me-too" drug, where only a few small modifications have been made to the structure of Sildenafil. As these are
|
151 |
+
both highly similar chemically, they would be expected to have close to the same shape. Tadalafil on the other hand is
|
152 |
+
chemically quite different from the other two, but inspection of the molecules in the pocket of PDE5 reveals they occupy
|
153 |
+
a similar binding pose, and thus would also be expected to have similar shape. In this article, for ease of compari-
|
154 |
+
son with the previous work [1], we again use these three molecules as the basis for investigating the new shape descriptor.
|
155 |
+
2
|
156 |
+
|
157 |
+
Geometry and Molecular Surfaces
|
158 |
+
A PREPRINT
|
159 |
+
(a) Sildenafil
|
160 |
+
Pfizer
|
161 |
+
First Sold: 1998
|
162 |
+
(b) Vardenafil
|
163 |
+
Bayer
|
164 |
+
First Sold: 2003
|
165 |
+
(c) Tadalafil
|
166 |
+
Lilly
|
167 |
+
First Sold: 2003
|
168 |
+
Figure 1: PDE5 inhibitors Sildenafil, Vardenafil and Tadalafil of known shape similarity. Tadalafil (different chemical structure, similar shape) is an example of a scaffold
|
169 |
+
hop from the first in class drug Sildenafil, and offers greatly improved performance, while Vardenafil (a "me-too" follow-up drug) only offers minor improvements.
|
170 |
+
While RGMolSA was found to give a good description of shape, it has a possible deficiency due to the dependence
|
171 |
+
of the results on the choice of base sphere, which in turn determines the trial functions for calculating the integrals
|
172 |
+
used to construct the descriptor. The geometry of the surface near the base sphere is well described, but for atoms
|
173 |
+
further away a greater number of eigenvalues would be needed for accurate description of the surface. This problem is
|
174 |
+
greater for larger molecules and can lead to the introduction of numerical errors when the molecule is large enough.
|
175 |
+
We handled such errors by ignoring any contributions from regions with numerical radii less than 10−9; however, this
|
176 |
+
forces a somewhat artificial ‘locality’ upon the shape descriptor meaning that it probably only accurately captures the
|
177 |
+
shape near to the base sphere.
|
178 |
+
In the following section we outline the theory underpinning the KQMolSA descriptors, that again uses the Riemannian
|
179 |
+
metric to approximate the geometry of the surface. The resulting descriptors lie in the manifold GL(N, C)/U(N) to
|
180 |
+
give a global descriptor of molecular geometry with reduced dependence on the starting position. Figure 2 summarises
|
181 |
+
the steps in computing these, using Sildenafil as an example. While the descriptor itself does depend upon the choices
|
182 |
+
made and the position of the surface within R3, this is easily accounted for within the space GL(N, C)/U(N). This
|
183 |
+
makes computing the ‘distance’ between the shape descriptors particularly straightforward.
|
184 |
+
2
|
185 |
+
The Mathematics of Kähler Quantization
|
186 |
+
2.1
|
187 |
+
Overview of the Theory
|
188 |
+
We should say immediately that the theory of Kähler quantization is far too advanced to be able to detail in the current
|
189 |
+
paper. For readers with sufficient mathematical background, a good account (and the original account of its use as
|
190 |
+
a numerical technique) is given in [5]. An exposition, aimed at readers with a general scientific background, of the
|
191 |
+
mathematical theory is currently being written by two of the authors [7].
|
192 |
+
The theory is concerned with the geometry of complex manifolds (shapes that locally look like Cn); any sur-
|
193 |
+
face that sits in R3 is a complex manifold as it locally looks like a copy of the complex numbers C (i.e. n = 1). More
|
194 |
+
concretely, we will be concerned with the surfaces that are topologically equivalent to S2; in the language of complex
|
195 |
+
manifolds, the sphere is often referred to as the Riemann Sphere and denoted CP1. The restriction on the topology
|
196 |
+
of the surface is justified by the fact that chemists do not expect any activity in the centre of rings occurring in most
|
197 |
+
3
|
198 |
+
|
199 |
+
N
|
200 |
+
N
|
201 |
+
HN
|
202 |
+
N
|
203 |
+
N
|
204 |
+
NN
|
205 |
+
HN
|
206 |
+
N
|
207 |
+
N
|
208 |
+
N
|
209 |
+
NH
|
210 |
+
N
|
211 |
+
N
|
212 |
+
N
|
213 |
+
010000Geometry and Molecular Surfaces
|
214 |
+
A PREPRINT
|
215 |
+
Figure 2: Key steps involved in the computation of the KQMolSA surface descriptor for Sildenafil (a PDE5 inhibitor).
|
216 |
+
drug-like molecules. The exceptions to this are macrocyclic molecules (those with large rings of more than 12 atoms)
|
217 |
+
where genuine activity occurs in the centre of the ring. Such molecules are therefore excluded from comparison by both
|
218 |
+
methods proposed.
|
219 |
+
The natural class of functions to work with when dealing with complex manifolds are those that are com-
|
220 |
+
plex differentiable, often called holomorphic functions. We consider a general complex manifold X; unfortunately,
|
221 |
+
if the manifold X is compact, the only holomorphic functions f : X → C are constant. Thus we cannot hope to
|
222 |
+
understand X simply by studying the holomorphic functions on X. A generalisation of the notion of a holomorphic
|
223 |
+
function is that of a section of a holomorphic line bundle L with base X. For readers familiar with the theory, a function
|
224 |
+
is a section of the trivial bundle. A line bundle is positive if there is a Hermitian metric h on L with positive curvature.
|
225 |
+
A foundational result of Kodaira [8] says that if the line bundle L is positive then for large enough k the tensor power
|
226 |
+
Lk, has a lot of holomorphic sections. In fact, the space of all such sections, denoted H0(Lk), is a complex vector
|
227 |
+
space of dimension that has order O(kn) as k → ∞.
|
228 |
+
The curvature of a positively curved Hermitian metric h gives rise to an object called a Kähler form, ω,
|
229 |
+
which in turn gives rise to a Riemannian metric g (the mathematical object being used in [1] to describe shape). It
|
230 |
+
turns out that the set of all positively curved Hermitian metrics on a line bundle L can be identified with the set of all
|
231 |
+
real-valued functions ϕ : X → R that satisfy, in some local coordinate z, the ∂ ¯∂-equation
|
232 |
+
√
|
233 |
+
−1∂ ¯∂ϕ = ω − ω0
|
234 |
+
where ω is the Kähler form of the metric and ω0 is a fixed reference Kähler form. We will give more detail on the
|
235 |
+
differential operators ∂ and ¯∂ in Section 2.3; in particular, we will explain that in the molecular surface setting, the
|
236 |
+
∂ ¯∂-equation is really just the familiar Poisson equation in the plane. The function ϕ is called a Kähler potential for
|
237 |
+
ω. The associated potential is not unique but any two differ by a constant; this does not affect the metric which is
|
238 |
+
constructed by taking two derivatives of the potential. However, we will see that the addition of a constant to a potential
|
239 |
+
will have the affect of scaling the Hermitian matrix we produce as a shape descriptor by a positive real number and we
|
240 |
+
will be required to find the ‘optimal’ rescaling in our distance calculation.
|
241 |
+
To summarise, what we have for a positive Hermitian line bundle (L, h) → X are:
|
242 |
+
• a Kähler form ω and a Kähler potential ϕ : X → R,
|
243 |
+
• a complex vector space H0(Lk).
|
244 |
+
4
|
245 |
+
|
246 |
+
e.g. Sildenafil
|
247 |
+
Space Filling Model
|
248 |
+
Replace Rings, Base Sphere (Grey)
|
249 |
+
- AiilD
|
250 |
+
01
|
251 |
+
Map to Complex Plane
|
252 |
+
Surface Area
|
253 |
+
Matrix of Levels
|
254 |
+
2r?
|
255 |
+
ifz εc
|
256 |
+
(1 + [z/2)2
|
257 |
+
C1
|
258 |
+
2.16 + 0j
|
259 |
+
-2.44 + 0.86j
|
260 |
+
2.41 - 1.93j 1
|
261 |
+
ifz E D(ai,R1)
|
262 |
+
F(z) =
|
263 |
+
zje-kF(z)V-1dzΛdz
|
264 |
+
M
|
265 |
+
-2.44 - 0.86j
|
266 |
+
3.01 + 0j
|
267 |
+
(lz - A1/2 + B1)2
|
268 |
+
-3.48 + 1.22j
|
269 |
+
MI
|
270 |
+
-3.48 - 1.22j
|
271 |
+
:
|
272 |
+
2.41 + 1.93j
|
273 |
+
4.41 + 0j
|
274 |
+
Cn-1
|
275 |
+
ifz E D(an-1,Rn-1)
|
276 |
+
(Iz - An-1/2 + Bn-1)2
|
277 |
+
Riemannian Metric
|
278 |
+
Construct Hermitian Matrix
|
279 |
+
Hermitian Matrix Shape DescriptorGeometry and Molecular Surfaces
|
280 |
+
A PREPRINT
|
281 |
+
What Kähler quantization amounts to is relating the geometry described by the Kähler potentials (an infinite dimensional
|
282 |
+
space of functions) to the finite dimensional complex vector space H0(Lk). This theme occurs throughout numerical
|
283 |
+
analysis and shape description, for example in the theories of Fourier analysis, spherical harmonics, Taylor series, all of
|
284 |
+
which produce a finite-dimensional vector space out of some infinite-dimensional set of functions.
|
285 |
+
2.2
|
286 |
+
Quantization and Tian’s Theorem
|
287 |
+
The data (L, h) → X allows for a natural L2-inner product on the vector space of sections H0(Lk). Given sections
|
288 |
+
s1, s2 ∈ H0(Lk), we compute
|
289 |
+
⟨s1, s2⟩ :=
|
290 |
+
�
|
291 |
+
X
|
292 |
+
hk(s1, s2)ωn
|
293 |
+
n! ,
|
294 |
+
where hk is the Hermitian metric induced on Lk by h, and ωn/n! is the volume element produced by the Kähler form.
|
295 |
+
It is this inner product that is the quantization of the data (L, h) → X. The space of all (Hermitian) inner products on a
|
296 |
+
complex N-dimensional vector space can be thought of as GL(N; C)/U(N). This is a negatively curved symmetric
|
297 |
+
space and has a natural notion of distance on it; it is this distance that we will use to measure shape similarity (see
|
298 |
+
Section 2.5).
|
299 |
+
To recover the geometry defined by (L, h) → X from the quantization, we choose a basis {sj} of the vec-
|
300 |
+
tor space H0(Lk) which gives rise to the matrix representation of the inner product
|
301 |
+
Mij := ⟨si, sj⟩.
|
302 |
+
If we let v be the vector of sections
|
303 |
+
v = (s1, s2, . . . sN) ,
|
304 |
+
then we can define a Kähler potential (recalling that the sections are locally defined holomorphic functions) ˜ϕ by
|
305 |
+
˜ϕ := −1
|
306 |
+
k log
|
307 |
+
�
|
308 |
+
v∗M−1v
|
309 |
+
�
|
310 |
+
.
|
311 |
+
Theorem 2.1 (Tian, [9]). Let (X, L, h) be a complex manifold with holomorphic line bundle L and positively curved
|
312 |
+
Hermitian metric h with curvature ω. If we produce another Kähler form
|
313 |
+
�ω = ω0 +
|
314 |
+
√
|
315 |
+
−1∂ ¯∂ ˜ϕ,
|
316 |
+
then
|
317 |
+
∥ω − �ω∥C0 = O(k−2).
|
318 |
+
Paraphrasing this theorem, we can say any Kähler form coming from a Kähler potential ϕ can be well approximated by
|
319 |
+
the Kähler form coming from the ‘algebraic’ function �ϕ. If we pick local complex coordinates z1, z2, . . . , zn then the
|
320 |
+
term v∗M−1v is just a power series in the coordinates. In the case of a molecular surface, we will have something like a
|
321 |
+
polynomial. This is the sense in which the function �ϕ is similar to a truncated Taylor series for the original function ϕ.
|
322 |
+
The theorem then says that this series really does converge.
|
323 |
+
Tian’s Theorem is stated for smooth metrics (those where one can take an arbitrary number of derivatives of
|
324 |
+
the Kähler potential ϕ); in practice (see Section 2.3), we will be working with metrics where the potentials are in
|
325 |
+
C2(X), that is twice continuously differentiable. The theory of approximating such metrics algebraically has not
|
326 |
+
been written down but we will demonstrate that we get a method that does produce meaningful shape comparisons.
|
327 |
+
We expect that, suitably adapted to this setting, something like Tian’s Theorem is still true; for example, the case of
|
328 |
+
potentials with lower regularity is discussed in [10].
|
329 |
+
2.3
|
330 |
+
Implementation in Practice
|
331 |
+
As mentioned already, in practice we take X = CP1 the Riemann sphere and the line bundle to be the anticanonical
|
332 |
+
bundle K∗
|
333 |
+
CP1 = O(2). The Kähler form ω, can be explicitly constructed from the Riemannian metric g, and in the
|
334 |
+
coordinates furnished by the piecewise stereographic projection map Φps, we can use the form of the metric (2) to get
|
335 |
+
ω = F(z)
|
336 |
+
√
|
337 |
+
−1dz ∧ dz,
|
338 |
+
5
|
339 |
+
|
340 |
+
Geometry and Molecular Surfaces
|
341 |
+
A PREPRINT
|
342 |
+
where F : C → R+ is the ‘metric function’ given by
|
343 |
+
F(z) =
|
344 |
+
�
|
345 |
+
�
|
346 |
+
�
|
347 |
+
�
|
348 |
+
�
|
349 |
+
�
|
350 |
+
�
|
351 |
+
�
|
352 |
+
�
|
353 |
+
�
|
354 |
+
�
|
355 |
+
�
|
356 |
+
�
|
357 |
+
�
|
358 |
+
�
|
359 |
+
�
|
360 |
+
�
|
361 |
+
�
|
362 |
+
�
|
363 |
+
�
|
364 |
+
�
|
365 |
+
�
|
366 |
+
�
|
367 |
+
2r2
|
368 |
+
B
|
369 |
+
(1+|z|2)2
|
370 |
+
if z ∈ C,
|
371 |
+
C1
|
372 |
+
(|z−A1|2+B1)2
|
373 |
+
if z ∈ D(a1, R1),
|
374 |
+
C2
|
375 |
+
(|z−A2|2+B2)2
|
376 |
+
if z ∈ D(a2, R2),
|
377 |
+
...
|
378 |
+
...
|
379 |
+
CN−1
|
380 |
+
(|z−AN−1|2+BN−1)2
|
381 |
+
if z ∈ D(aN−1, RN−1).
|
382 |
+
(3)
|
383 |
+
Note we have replaced, in the metric g, the real symmetric 2-tensor dx2 + dy2 with the antisymmetric form
|
384 |
+
(√−1/2)dz ∧ d¯z, where dz = dx + √−1dy and d¯z = dx − √−1dy.
|
385 |
+
To find the Kähler potential ϕ : C → R, we solve the ‘∂∂-equation’
|
386 |
+
ω =
|
387 |
+
√
|
388 |
+
−1∂∂ϕ.
|
389 |
+
If we consider the complex differential operators
|
390 |
+
∂
|
391 |
+
∂z = 1
|
392 |
+
2
|
393 |
+
� ∂
|
394 |
+
∂x −
|
395 |
+
√
|
396 |
+
−1 ∂
|
397 |
+
∂y
|
398 |
+
�
|
399 |
+
and
|
400 |
+
∂
|
401 |
+
∂z = 1
|
402 |
+
2
|
403 |
+
� ∂
|
404 |
+
∂x +
|
405 |
+
√
|
406 |
+
−1 ∂
|
407 |
+
∂y
|
408 |
+
�
|
409 |
+
,
|
410 |
+
then the ∂∂-equation is equivalent to solving the Poisson equation
|
411 |
+
∂2ϕ
|
412 |
+
∂z∂z = 1
|
413 |
+
4∆Eucϕ = F,
|
414 |
+
where ∆Euc is the usual 2-dimensional Laplacian. We can solve the Poisson problem explicitly to find ϕ. The solution
|
415 |
+
can be thought of as having two parts: a ‘local’ part that is found by simply observing that
|
416 |
+
∂2
|
417 |
+
∂z∂z
|
418 |
+
�C log(|z − A|2 + B)
|
419 |
+
B
|
420 |
+
�
|
421 |
+
=
|
422 |
+
C
|
423 |
+
(|z − A|2 + B)2 ,
|
424 |
+
and a ‘correction term’, named thus as the term is needed to ensure the function is in C2(C). The correction term is a
|
425 |
+
linear combination of functions of the form
|
426 |
+
log(|αz + β|2),
|
427 |
+
where we get one term for each sphere. As each of the correction terms is a harmonic function, that is
|
428 |
+
∆ log(|αz + β|2) = 0,
|
429 |
+
the addition of the correction terms is still a solution of the Poisson equation. It would appear the correction terms
|
430 |
+
are singular at the points z = −β/α; however, these points always lie outside the disc where the function takes this
|
431 |
+
particular form. We record the form of the potential as a theorem and refer the reader to the appendix (Section 5) for a
|
432 |
+
derivation of the solution.
|
433 |
+
Theorem 2.2 (Form of Kähler potential). Let g be of the form Equation (2). In the region associated to the ith sphere,
|
434 |
+
the Kähler potential can be written
|
435 |
+
ϕ(z) = Ci
|
436 |
+
Bi
|
437 |
+
log(|z − Ai|2 + Bi) +
|
438 |
+
N
|
439 |
+
�
|
440 |
+
j=1
|
441 |
+
Kij log(|αijz + βij|2),
|
442 |
+
where K ∈ M N×N(R), and α, β ∈ M N×N(C).
|
443 |
+
The matrices K, α, and β in the previous theorem are easily calculated from the geometric data associated to the
|
444 |
+
molecule and so it is straightforward to describe the Kähler potential explicitly.
|
445 |
+
The space of global sections H0(O(2k)) ∼= C2k+1 can be identified with the span of the functions
|
446 |
+
⟨1, z, z2, . . . , z2k⟩.
|
447 |
+
Thus the shape descriptor associated to the surface is the (2k + 1) × (2k + 1) Hermitian matrix M where (considering
|
448 |
+
indices that run from 0 to 2k)
|
449 |
+
Mij =
|
450 |
+
��
|
451 |
+
C
|
452 |
+
zizje−kϕF(z)
|
453 |
+
√
|
454 |
+
−1dz ∧ dz.
|
455 |
+
(4)
|
456 |
+
6
|
457 |
+
|
458 |
+
Geometry and Molecular Surfaces
|
459 |
+
A PREPRINT
|
460 |
+
2.4
|
461 |
+
Computing the Relevant Integrals
|
462 |
+
A naïve numerical calculation of the integrals described by Equation (4) gives rise to two obvious problems:
|
463 |
+
firstly, the domain of integration is unbounded (being the whole complex plane C); secondly, the domains and
|
464 |
+
values describing the metric and the Kähler potential ϕ could become so small that numerical instabilities start
|
465 |
+
to dominate the contribution of the associated atom.
|
466 |
+
The second problem has been discussed as a limitation
|
467 |
+
in the approximation of the spectrum of the Laplacian [1]. In this paper, we exploit the fact that the automor-
|
468 |
+
phism group of CP1 is the group of Möbius transformations, PSL(2, C); we can use elements of this group to
|
469 |
+
ensure the coordinates we perform calculations in are always in a numerically controlled region (here we use a unit disc).
|
470 |
+
Put more concretely, let m ∈ {1, 2, . . . , N} index the mth sphere making up the molecular surface, then
|
471 |
+
there is an element Tm ∈ PSL(2, C) that maps the unit disc
|
472 |
+
D = {z ∈ C | |z| < 1},
|
473 |
+
onto the region D(am, Rm) from Equation (2). We note that if the mth sphere has level l, then the pre-image of the
|
474 |
+
regions corresponding to level (l + 1) spheres which intersect the mth sphere will describe certain discs properly
|
475 |
+
contained in D. Hence the contribution of the mth sphere to the matrix described by Equation (4) is given by
|
476 |
+
��
|
477 |
+
D− ˆ
|
478 |
+
D
|
479 |
+
(Tm(w))i(Tm(w))je−kϕ(Tm(w))F(Tm(w)) dTm(w) ∧ dTm(w),
|
480 |
+
(5)
|
481 |
+
where ˆD represents the union of the discs corresponding to the next level spheres intersecting the mth sphere. In practice,
|
482 |
+
we account for these higher-level spheres by assigning the value 0 to the volume form F(Tm(w)) dTm(w) ∧ dTm(w)
|
483 |
+
whenever w ∈ ˆD (note this produces a jump discontinuity in the volume form). Numerical calculation of integrals
|
484 |
+
of the form of Equation (5) is done by splitting into an angular and radial direction and then performing successive
|
485 |
+
applications of the trapezium rule; we choose a radial step size corresponding to nr = 15 integration points and an
|
486 |
+
angular step size corresponding to taking nθ = 10 points. This seems to achieve a reasonable accuracy; for example,
|
487 |
+
one can check the area integral for a given integration scheme. We have also determined that the distance between
|
488 |
+
shape descriptors does not seem to be significantly changed by taking smaller step sizes (Section 3.1).
|
489 |
+
2.5
|
490 |
+
Finding the Distance Between Shape Descriptors
|
491 |
+
Given two positive definite Hermitian matrices M1, M2, such as those generated by Equation (4), there are innumerable
|
492 |
+
ways of defining a notion of distance between such matrices. With regards to the theory of Kähler quantization, it is
|
493 |
+
natural to consider M1, M2 as two Hermitian inner products on the fixed complex vector space H0(O(2k)). This space
|
494 |
+
is naturally seen as the manifold GL(2k + 1; C)/U(2k + 1). An inner product is specified by declaring a particular
|
495 |
+
basis to be orthonormal; any basis conjugate under the action of U(2k + 1) defines the same inner product. This
|
496 |
+
space has a natural distance on it; one characterisation of this distance is that shortest paths (geodesics) are given
|
497 |
+
by one-parameter subgroups of GL(2k + 1; C), that is by paths of matrices of the form exp(tA) where A is some
|
498 |
+
(2k + 1) × (2k + 1) complex matrix.
|
499 |
+
More explicitly, if {v1, v2, . . . , v2k+1} is a basis of H0(O(2k))such that both inner products are represented
|
500 |
+
by diagonal matrices
|
501 |
+
M1 = Diag
|
502 |
+
�
|
503 |
+
eλ1, eλ2, . . . , eλ2k+1�
|
504 |
+
,
|
505 |
+
M2 = Diag (eµ1, eµ2, . . . , eµ2k+1) ,
|
506 |
+
then
|
507 |
+
d(M1, M2) = k− 3
|
508 |
+
2
|
509 |
+
�
|
510 |
+
�
|
511 |
+
�
|
512 |
+
�
|
513 |
+
2k+1
|
514 |
+
�
|
515 |
+
i=1
|
516 |
+
(λi − µi)2.
|
517 |
+
(6)
|
518 |
+
The factor of k−3/2 ensures that the distances stabilise as k → ∞ (see Theorem 1.1 in [11]). It will be useful to consider
|
519 |
+
the following more compact form for the distance
|
520 |
+
d(M1, M2) = k− 3
|
521 |
+
2
|
522 |
+
�
|
523 |
+
�
|
524 |
+
�
|
525 |
+
�
|
526 |
+
2k+1
|
527 |
+
�
|
528 |
+
i=1
|
529 |
+
(log(ηi))2,
|
530 |
+
(7)
|
531 |
+
where {ηi} are the eigenvalues of the matrix M−1
|
532 |
+
1 M2.
|
533 |
+
7
|
534 |
+
|
535 |
+
Geometry and Molecular Surfaces
|
536 |
+
A PREPRINT
|
537 |
+
It is a well-known fact that the automorphism group of the Riemann sphere CP1 is the group of Möbius
|
538 |
+
transformations PSL(2, C). Roughly speaking, the subgroup PSU(2) ⊂ PSL(2, C) corresponds to rotations of the
|
539 |
+
original surface and the remaining maps correspond to reparameterisations that preserve the complex structure. If
|
540 |
+
ϖ ∈ PSL(2, C) is an automorphism of the form
|
541 |
+
ϖ(z) = αz + β
|
542 |
+
γz + δ ,
|
543 |
+
then ϖ also acts on the vector space H0(O(2k)). In representation theoretic terms, this action is the representation
|
544 |
+
induced on Sym2k(C2) by the standard representation of SL(2, C). If we denote the element of SL(2k+1, C) by ϑ(ϖ)
|
545 |
+
(see [12], Lemma 8) and the original shape descriptor computed in the z-coordinate by M, then the shape descriptor
|
546 |
+
computed in the ϖ(z)-coordinate will be
|
547 |
+
(ϑ(ϖ))∗ M (ϑ(ϖ)) .
|
548 |
+
As mentioned in Section 2, the fact that the Kähler potential is only defined up to the addition of a constant means we
|
549 |
+
can also scale the Hermitian matrix M by a positive constant. Hence our calculation of distance between two shape
|
550 |
+
descriptors M1 and M2 becomes the concrete problem of minimising, over (p, ϑ) ∈ R × SL(2, C),
|
551 |
+
ζ(p, ϑ) =
|
552 |
+
2k+1
|
553 |
+
�
|
554 |
+
i=1
|
555 |
+
(log(ηi))2,
|
556 |
+
where {ηi} are the eigenvalues of the matrix M−1
|
557 |
+
1 ep (ϑ(ϖ))∗ M2 (ϑ(ϖ)).
|
558 |
+
It is easy to see that the value of p at a critical point of ζ is independent of the element ϑ.
|
559 |
+
Elementary
|
560 |
+
calculus yields that the value of p is given by
|
561 |
+
p = −
|
562 |
+
1
|
563 |
+
2k + 1
|
564 |
+
2k+1
|
565 |
+
�
|
566 |
+
i=1
|
567 |
+
log(˜ηi),
|
568 |
+
where {˜ηi} are the eigenvalues of the matrix M−1
|
569 |
+
1 M2. As the matrix (ϑ(ϖ)) has unit determinant, the value of p
|
570 |
+
does not depend up the SL(2, C) action on the Hermitian matrix M2. We thus reduce the distance calculation to a
|
571 |
+
minimisation over the six-dimensional Lie group SL(2, C).
|
572 |
+
Note that the distance between the shape descriptors given by Equation (6) is the distance between the molecular shapes
|
573 |
+
after they have been re-scaled to have area 4π. Hence the distance between two molecular surfaces S1 and S2 should
|
574 |
+
include a component to reflect the difference in area between S1 and S2. As we are interested in producing a similarity
|
575 |
+
score rather than a distance between two inputs, we do not take this point up further in the article. Our initial attempts at
|
576 |
+
creating a similarity score are detailed in the subsequent section.
|
577 |
+
The remaining minimisation over SL(2, C) is done by parameterising a generic matrix by the 6 real variables x1, ...x6
|
578 |
+
and taking
|
579 |
+
ϖ(x1, x2, . . . , x6) =
|
580 |
+
�
|
581 |
+
x1 + √−1x2
|
582 |
+
x3 + √−1x4
|
583 |
+
x5 + √−1x6
|
584 |
+
∗
|
585 |
+
�
|
586 |
+
,
|
587 |
+
where ∗ is chosen to ensure det(ϖ) = 1. To perform the minimisation, we use algorithms that do not require the
|
588 |
+
input of a gradient vector, such as Nelder–Mead or Powell methods [13]. These are implemented using off-the-shelf
|
589 |
+
packages in SciPy [14]. We found that for k = 1 there was very little difference between the results for either
|
590 |
+
method; the minimisation algorithm converges to produce a robust distance value. For k = 2 the minimisation
|
591 |
+
methods appear to be a little less stable and occasionally did not converge. One way around this was to use the
|
592 |
+
element of SL(2, C) found by the k = 1 minimisation as the initial guess for the k = 2 step (otherwise the identity
|
593 |
+
matrix was used). We anticipate that one might be able to improve this process; for example, by computing the
|
594 |
+
gradient of the function to be minimised explicitly and then using this in an algorithm such as conjugate gradient descent.
|
595 |
+
One further consideration in implementing the distance measure between two matrices was in shape descrip-
|
596 |
+
tors for k > 2 (and for k = 2 in some cases), where numerical instability exists within the method. Occasionally
|
597 |
+
non-positive definite matrices are produced, that cannot be compared using the above approach. As Hermitian matrices
|
598 |
+
that differ only by scale can be considered equivalent, such cases have been treated by scaling one matrix by a factor of
|
599 |
+
10, 100 or 1000 as needed in order to bring the eigenvalues into the range required for consideration with Python.
|
600 |
+
8
|
601 |
+
|
602 |
+
Geometry and Molecular Surfaces
|
603 |
+
A PREPRINT
|
604 |
+
3
|
605 |
+
Initial Case Study: Phosphodiesterase 5 (PDE5) Inhibitors
|
606 |
+
3.1
|
607 |
+
Tuning the Parameters nr and nθ
|
608 |
+
To determine the effect of varying the parameters nr and nθ (Section 2.4) on the quality of the shape descriptors
|
609 |
+
produced, we considered three sets of parameters: nr = 200 and nθ = 100; nr = 50 and nθ = 25; nr = 15 and
|
610 |
+
nθ = 10. The distances produced between the descriptor for each set and the area returned during the computation of
|
611 |
+
the relevant integrals (which should be ∼ 12.57 for an accurate descriptor, as constrained by the choice of scaling the
|
612 |
+
surface area to 4π) are reported here for Sildenafil (Table 1), Vardenafil (Table 2) and Tadalafil (Table 3).
|
613 |
+
Table 1: Computed distances between descriptors of Sildenafil generated using different values of nr and nθ for k = 1. The area reported is that returned by the
|
614 |
+
integration step.
|
615 |
+
(200, 100), area = 12.59
|
616 |
+
(50, 25), area = 12.62
|
617 |
+
(15, 10), area = 12.62
|
618 |
+
(200, 100)
|
619 |
+
-
|
620 |
+
0.032
|
621 |
+
0.032
|
622 |
+
(50, 25)
|
623 |
+
0.038
|
624 |
+
-
|
625 |
+
0.040
|
626 |
+
(15, 10)
|
627 |
+
0.038
|
628 |
+
0.040
|
629 |
+
-
|
630 |
+
Table 2: Computed distances between descriptors of Vardenafil generated using different values of nr and nθ for k = 1. The area reported is that returned by the
|
631 |
+
integration step.
|
632 |
+
(200, 100) area = 12.57
|
633 |
+
(50, 25), area = 12.58
|
634 |
+
(15, 10), area = 12.58
|
635 |
+
(200, 100)
|
636 |
+
-
|
637 |
+
0.005
|
638 |
+
0.005
|
639 |
+
(50, 25)
|
640 |
+
0.005
|
641 |
+
-
|
642 |
+
0.004
|
643 |
+
(15, 10)
|
644 |
+
0.005
|
645 |
+
0.004
|
646 |
+
-
|
647 |
+
Table 3: Computed distances between descriptors of Tadalafil generated using different values of nr and nθ for k = 1. The area reported is that returned by the
|
648 |
+
integration step.
|
649 |
+
(200, 100), area = 14.32
|
650 |
+
(50, 25), area = 14.37
|
651 |
+
(15, 10), area = 14.37
|
652 |
+
(200, 100)
|
653 |
+
-
|
654 |
+
0.003
|
655 |
+
0.003
|
656 |
+
(50, 25)
|
657 |
+
0.003
|
658 |
+
-
|
659 |
+
0.001
|
660 |
+
(15, 10)
|
661 |
+
0.003
|
662 |
+
0.001
|
663 |
+
-
|
664 |
+
As these distances are small in each case, there is no significant loss of quality when the number of points considered is
|
665 |
+
reduced. The areas for both Sildenafil and Vardenafil are also close to 12.57, indicating high quality descriptors. The
|
666 |
+
area for Tadalafil is overestimated slightly, however this is due to an issue with the replacement of the rings for motifs
|
667 |
+
with a 5-membered ring between two other rings rather than the choice of nr and nθ. Similar results were observed for
|
668 |
+
the consideration of k = 2. As the quality is unaffected, the minimum parameters of nr = 15 and nθ = 10 were used
|
669 |
+
in the final descriptors to increase the speed of calculation.
|
670 |
+
3.2
|
671 |
+
Constructing a Similarity Score
|
672 |
+
In order to facilitate familiar comparison of molecules, we wish to construct a similarity score rather than simply taking
|
673 |
+
the distance between two matrices. In chemoinformatics, this score typically takes a value between 0 (no similarity)
|
674 |
+
and 1 (identical) [4]. To achieve this we take the inverse distance, and account for size by taking the ratio of two surface
|
675 |
+
areas. Equation 8 gives the similarity score between two molecular surfaces S1 and S2,
|
676 |
+
score(S1, S2) = x(Amin/Amax) + y
|
677 |
+
1
|
678 |
+
1 + d(M1, M2),
|
679 |
+
(8)
|
680 |
+
where Amin is the smaller of the two surface areas, and Amax is the larger, in order to give a score bounded by 0 and 1.
|
681 |
+
We therefore need to choose an appropriate set of weights x and y such that x + y = 1, and x < 0.5, to ensure the
|
682 |
+
shape is the primary contributor to the score.
|
683 |
+
Table 4 gives the resulting similarity scores for pairwise comparison of the PDE5 inhibitors. In all three cases,
|
684 |
+
the similarity increases with increasing contribution from the surface area term as expected. The increase for
|
685 |
+
Sildenafil-Vardenafil is only small, while for Tadalafil there is a greater effect of including the area. Final weights of
|
686 |
+
x = 0.3 and y = 0.7 were selected to balance the contribution of the surface area without it dominating over the shape
|
687 |
+
contribution. The PDE5 inhibitors were selected for tuning due to their known similarity, however further refinement of
|
688 |
+
9
|
689 |
+
|
690 |
+
Geometry and Molecular Surfaces
|
691 |
+
A PREPRINT
|
692 |
+
Table 4: Similarity scores for the PDE5 inhibitors for surface area weights ranging from 0 to 0.5.
|
693 |
+
x
|
694 |
+
y
|
695 |
+
Sildenafil-Vardenafil
|
696 |
+
Sildenafil-Tadalafil
|
697 |
+
Vardenafil-Tadalafil
|
698 |
+
0
|
699 |
+
1
|
700 |
+
0.884
|
701 |
+
0.286
|
702 |
+
0.275
|
703 |
+
0.1
|
704 |
+
0.9
|
705 |
+
0.892
|
706 |
+
0.340
|
707 |
+
0.328
|
708 |
+
0.2
|
709 |
+
0.8
|
710 |
+
0.900
|
711 |
+
0.394
|
712 |
+
0.380
|
713 |
+
0.3
|
714 |
+
0.7
|
715 |
+
0.908
|
716 |
+
0.449
|
717 |
+
0.432
|
718 |
+
0.4
|
719 |
+
0.6
|
720 |
+
0.916
|
721 |
+
0.503
|
722 |
+
0.485
|
723 |
+
0.5
|
724 |
+
0.5
|
725 |
+
0.924
|
726 |
+
0.557
|
727 |
+
0.537
|
728 |
+
these parameters with a larger set of examples may be required for full scale virtual screening.
|
729 |
+
3.3
|
730 |
+
Investigating Variation in 3D Conformers
|
731 |
+
As discussed in the previous work [1], consideration of the different orientations a molecule can adopt (known as
|
732 |
+
conformers) is important when using 3D shape descriptors. Conformers of the same molecule should theoretically have
|
733 |
+
scores in the range 0.7 < score < 1, as high self-similarity is expected (scores above 0.7 in chemoinformatics), while
|
734 |
+
retaining the ability to distinguish between them.
|
735 |
+
As with RGMolSA, two small sets of 10 conformers of the PDE5 inhibitors are used to investigate how KQ-
|
736 |
+
MolSA regards different conformers. One set contains 10 random conformers, in which we would expect slightly
|
737 |
+
more variance, while the other has 10 low energy conformers, for which higher similarity is expected. Both sets
|
738 |
+
were produced using the ETKDG algorithm [15] with energy optimisation using the MMFF94 force field [16], both
|
739 |
+
implemented in RDKit [17]. The minimum, maximum and average shape similarity as well as the average RMSD
|
740 |
+
(which compares conformers based on their atomic positions) for each set are given in Figure 3. The full set of RMSD
|
741 |
+
and shape similarity comparisons are available in the Supporting Data.
|
742 |
+
The RMSD and shape similarity for each set are compared in the swarm plots shown in Figure 4. For k = 1, generally
|
743 |
+
high similarity was observed, with some scores for the random conformers of Tadalafil falling slightly below 0.7.
|
744 |
+
Greater variation is observed for k = 2, where some conformer pairs have scores below 0.6. This reduction in similarity
|
745 |
+
is expected for k = 2 as the descriptors represent a more detailed approximation to the original surface than those
|
746 |
+
for k = 1 and hence will be more sensitive to differences in the geometry. However, the similarity scores obtained
|
747 |
+
were on the whole lower than for RGMolSA, where the similarity between most conformer pairs is greater than 0.8 [1].
|
748 |
+
For the random sets, the similarity between conformers showed more variation than for RGMolSA, where clusters of
|
749 |
+
similar conformers were observed. While KQMolSA does handle conformers well, RGMolSA appears to do a better
|
750 |
+
job of this, due to the insensitivity to surface deformation of the spectrum of the Laplace–Beltrami operator. For virtual
|
751 |
+
screening, this consideration of conformers as similar negates the need for a pre-alignment step prior to shape similarity
|
752 |
+
calculation, and may allow molecules that can deform to fit in the binding pocket to be identified as potential hits, where
|
753 |
+
these would otherwise be classified as the wrong shape by methods that depend on atomic coordinates.
|
754 |
+
3.4
|
755 |
+
Comparison to Existing Methods
|
756 |
+
The PDE5 inhibitor series was also used to investigate how well KQMolSA compares to the previous work, and to
|
757 |
+
other open source shape similarity methods. Table 5 provides the shape-similarity scores observed between the PDE5
|
758 |
+
inhibitors for KQMolSA (for k = 1 and k = 2), RGMolSA [1], USRCAT [18, 17], Shape-It [19] and MolSG [20]. A
|
759 |
+
2D representation, in the form of the 1024-bit Morgan fingerprint using radius 3, is also included. Each descriptor uses
|
760 |
+
a similarity score between 0 (different) and 1 (identical).
|
761 |
+
Table 5: Comparison of the work presented here (KQMolSA) to the previous work (RGMolSA) [1] and existing atomic-distance [18], atomic-centred [19] and molecular
|
762 |
+
surface based [20] descriptors. In all cases the similarity scores given are bound by 0 (no similarity) and 1 (identical).
|
763 |
+
KQMolSA
|
764 |
+
(k=1)
|
765 |
+
KQMolSA
|
766 |
+
(k=2)
|
767 |
+
RGMolSA
|
768 |
+
USRCAT
|
769 |
+
Shape-It
|
770 |
+
MolSG
|
771 |
+
Morgan
|
772 |
+
Fingerprint
|
773 |
+
Sildenafil-
|
774 |
+
Vardenafil
|
775 |
+
0.907
|
776 |
+
0.652
|
777 |
+
0.903
|
778 |
+
0.384
|
779 |
+
0.388
|
780 |
+
0.704
|
781 |
+
0.667
|
782 |
+
Sildenafil-
|
783 |
+
Tadalafil
|
784 |
+
0.449
|
785 |
+
0.482
|
786 |
+
0.809
|
787 |
+
0.269
|
788 |
+
0.278
|
789 |
+
0.746
|
790 |
+
0.201
|
791 |
+
Vardenafil-
|
792 |
+
Tadalafil
|
793 |
+
0.432
|
794 |
+
0.470
|
795 |
+
0.725
|
796 |
+
0.291
|
797 |
+
0.353
|
798 |
+
0.887
|
799 |
+
0.209
|
800 |
+
10
|
801 |
+
|
802 |
+
Geometry and Molecular Surfaces
|
803 |
+
A PREPRINT
|
804 |
+
(a) k = 1
|
805 |
+
(b) k = 2
|
806 |
+
Figure 3: Overlay of the most and least shape-similar conformers of Sildenafil, Vardenafil and Tadalafil and the average shape similarity and RMSD for each set for (a)
|
807 |
+
k = 1 and (b) k = 2. On average the conformers display a high degree of self-similarity despite the variance in atom-position similarity.
|
808 |
+
As discussed in the prequel to this paper, as Sildenafil and Vardenafil are close structural analogues they should display
|
809 |
+
both high shape and fingerprint similarity. As Tadalafil is known to occupy a similar volume in PDE5 compared to
|
810 |
+
the other inhibitors, we’d expect high shape similarity scores also, but lower 2D similarity. One conformer of each
|
811 |
+
molecule is considered for simplicity.
|
812 |
+
As for RGMolSA, Sildenafil and Vardenafil are scored as highly similar, with a score of 0.907 (k
|
813 |
+
= 1).
|
814 |
+
However Tadalafil is not scored as highly, and for KQMolSA would be classed as dissimilar if the typical threshold
|
815 |
+
of 0.7 was used. Lower similarity is observed for k = 2, which is expected as discussed previously. The similarity
|
816 |
+
score for k = 2 has a small dependence on the order of comparison (A compared to B yields a score which may
|
817 |
+
differ at the second decimal place from B compared to A, Table 6). This is due to the distance calculation involving
|
818 |
+
a numerical minimisation procedure rather than an exact expression, but this will have no practical implications in
|
819 |
+
chemoinformatics applications. Both proposed methods (RGMolSA and KQMolSA) perform well in this simple study,
|
820 |
+
with a higher predicted similarity for Sildenafil and Vardenafil than all the other 3D methods, and a more intuitive
|
821 |
+
ordering of the relative similarity measures than MolSG. However, a full scale benchmarking study will be required to
|
822 |
+
verify their performance.
|
823 |
+
11
|
824 |
+
|
825 |
+
Geometry and Molecular Surfaces
|
826 |
+
A PREPRINT
|
827 |
+
(a) RMS Similarity
|
828 |
+
(b) Shape Similarity (k = 1)
|
829 |
+
(c) Shape Similarity (k = 2)
|
830 |
+
Figure 4: Swarm plots of the RMSD (in Å) and shape similarity for our set of conformers highlight the general trend that different conformers are classed as having
|
831 |
+
similar shape, despite significant variance in their atomic positions. Conformers with RMSD less than 1 Å are considered similar, while those over 3 Å have significant
|
832 |
+
differences.
|
833 |
+
Table 6: Similarity scores for the PDE5 inhibitors for k=2 highlighting the dependence on the order of comparison.
|
834 |
+
Sildenafil
|
835 |
+
Vardenafil
|
836 |
+
Tadalafil
|
837 |
+
Sildenafil
|
838 |
+
-
|
839 |
+
0.652
|
840 |
+
0.462
|
841 |
+
Vardenafil
|
842 |
+
0.648
|
843 |
+
-
|
844 |
+
0.470
|
845 |
+
Tadalafil
|
846 |
+
0.482
|
847 |
+
0.470
|
848 |
+
-
|
849 |
+
3.5
|
850 |
+
Similarity to Potential Decoys
|
851 |
+
As for RGMolSA, we also wanted to check how the method handles molecules that should be classed as genuinely
|
852 |
+
different from the PDE5 inhibitor molecules. We therefore present a comparison to four other molecules (Figure 5):
|
853 |
+
Arginine (supplement) which has a lower molecular weight, but similar general shape (a long chain of spheres);
|
854 |
+
Lymecycline (antibiotic), with a higher molecular weight and a four-ring motif potentially giving part of the molecule a
|
855 |
+
similar shape to Sildenafil; Diflorasone (topical corticosteroid), which has a similar molecular weight and four rings, but
|
856 |
+
has a different therapeutic target/indication and S-octylglutathione (oligopeptide), which again has similar molecular
|
857 |
+
weight, but no rings and the potential for similarity due to the branching in the centre of the molecule.
|
858 |
+
The results of this comparison are presented in Figure 6. Most of the scores obtained for both k = 1 and k = 2 fall
|
859 |
+
significantly below the typical threshold of 0.7 for similarity, and as such these molecules would be classed as genuinely
|
860 |
+
different and likely inactive against PDE5. The exception is the comparison between Tadalafil and Diflorasone, where a
|
861 |
+
higher score of 0.74 (k = 1) is obtained. Due to the similarity between their structures (both contain a motif of 4 fused
|
862 |
+
rings), we would expect to see some similarity between the two. Inspection by eye of both the space filling model and
|
863 |
+
surface of the two molecules also suggests they do have genuinely similar shapes (Figure 7). These were also classed as
|
864 |
+
potentially similar by RGMolSA (similarity of 0.872).
|
865 |
+
4
|
866 |
+
Conclusion
|
867 |
+
We have outlined the theory underpinning an entirely novel shape descriptor,
|
868 |
+
Mij =
|
869 |
+
��
|
870 |
+
C
|
871 |
+
zizje−kϕF(z)
|
872 |
+
√
|
873 |
+
−1dz ∧ dz,
|
874 |
+
(9)
|
875 |
+
12
|
876 |
+
|
877 |
+
·····
|
878 |
+
Sildenafil Random
|
879 |
+
Sildenafil Low Energy
|
880 |
+
Vardenafil Random
|
881 |
+
Vardenafil Low Energy
|
882 |
+
:
|
883 |
+
Tadalafil Random
|
884 |
+
Tadalafil Low Energy
|
885 |
+
0.0
|
886 |
+
0.5
|
887 |
+
1.0
|
888 |
+
1.5
|
889 |
+
2.0
|
890 |
+
2.5
|
891 |
+
3.0
|
892 |
+
3.5
|
893 |
+
4.0
|
894 |
+
Root Mean Square Deviation··…··…
|
895 |
+
Sildenafil Random
|
896 |
+
:8
|
897 |
+
Sildenafil Low Energy
|
898 |
+
Vardenafil Random
|
899 |
+
(
|
900 |
+
8
|
901 |
+
Vardenafil Low Energy
|
902 |
+
Tadalafil Random
|
903 |
+
Tadalafil Low Energy
|
904 |
+
0.60
|
905 |
+
0.65
|
906 |
+
0.70
|
907 |
+
0.75
|
908 |
+
0.80
|
909 |
+
0.85
|
910 |
+
0.90
|
911 |
+
0.95
|
912 |
+
1.00
|
913 |
+
Shape SimilaritySildenafil Random
|
914 |
+
Sildenafil Low Energy
|
915 |
+
Vardenafil Random
|
916 |
+
Vardenafil Low Energy
|
917 |
+
Tadalafil Random
|
918 |
+
Tadalafil Low Energy
|
919 |
+
0.6
|
920 |
+
0.7
|
921 |
+
0.8
|
922 |
+
0.9
|
923 |
+
1.0
|
924 |
+
Shape SimilarityGeometry and Molecular Surfaces
|
925 |
+
A PREPRINT
|
926 |
+
Arginine
|
927 |
+
Lymecycline
|
928 |
+
Diflorasone
|
929 |
+
S-Octylglutathione
|
930 |
+
Figure 5: Chemical structures of potential decoy molecules.
|
931 |
+
the (2k + 1) × (2k + 1) Hermitian matrix which captures the geometry of the molecular surface. The distance between
|
932 |
+
two such matrix representations is then given as
|
933 |
+
d(M1, M2) = k− 3
|
934 |
+
2
|
935 |
+
�
|
936 |
+
�
|
937 |
+
�
|
938 |
+
�
|
939 |
+
2k+1
|
940 |
+
�
|
941 |
+
i=1
|
942 |
+
(λi − µi)2.
|
943 |
+
(10)
|
944 |
+
An overall similarity score of 1 for identical molecules and 0 for no similarity is then obtained as
|
945 |
+
score(S1, S2) = 0.3(Amin/Amax) + 0.7
|
946 |
+
1
|
947 |
+
1 + d(M1, M2).
|
948 |
+
(11)
|
949 |
+
As with the previously reported work, the capabilities of KQMolSA were investigated using a series of PDE5 inhibitors
|
950 |
+
known to have similar shape. The method generally handles conformers well, with similarity scores generally higher
|
951 |
+
than 0.7. The scores obtained were higher for k = 1 than k = 2, which is expected due to the greater detail leading to
|
952 |
+
more sensitivity to changes in geometry. The insensitivity to deformation of the surface lead to RGMolSA outperforming
|
953 |
+
KQMolSA in this area. KQMolSA performs relatively well compared to existing methods, identifying Sildenafil
|
954 |
+
and Vardenafil as highly similar, but assigning lower similarity scores to Tadalafil. This small study suggests that
|
955 |
+
RGMolSA might still perform better, but a full retrospective benchmarking study is required to confirm this. Compared
|
956 |
+
to RGMolSA, KQMolSA does have the advantage of a lower dependence on the choice of base sphere. There may
|
957 |
+
therefore be some instances where the use of KQMolSA is more appropriate despite its seemingly poorer performance,
|
958 |
+
for example in the consideration of long chain molecules with few rings, where numerical errors are often observed for
|
959 |
+
RGMolSA. Comparison to a set of potential decoy molecules yielded low scores for all except comparison of Tadalafil
|
960 |
+
to Diflorasone, which were also classed as similar by RGMolSA. Inspection by eye of both the space filling and surface
|
961 |
+
models of the molecules suggests that this assignment is reasonable, as they look similar in shape. Identification of such
|
962 |
+
similarity evidences the potential for scaffold hopping by these methods.
|
963 |
+
Whilst the above tests suggest that the matrix M does give a promising description of molecular shape, the method
|
964 |
+
does have some drawbacks, primarily in the calculation of the distance between two descriptors. While the notion of
|
965 |
+
the distance between two Hermitian inner products (represented by the matrices M1 and M2) is well understood, the
|
966 |
+
calculation of the distance between molecular surfaces requires the distance between a point on an SL(2, C)-orbit to be
|
967 |
+
minimised. Despite the use of existing optimised minimisation algorithms, this process is still quite slow, depending
|
968 |
+
on the extent of the required minimisation, and further does not guarantee that the global minimum has been found.
|
969 |
+
This step typically takes a few seconds per pair, compared to a near-instantaneous calculation for RGMolSA. Further
|
970 |
+
refinement of this step would be required for use of the method in screening ultra-large chemical libraries as part of a
|
971 |
+
drug discovery pipeline.
|
972 |
+
13
|
973 |
+
|
974 |
+
NH2
|
975 |
+
H2N
|
976 |
+
N
|
977 |
+
HO
|
978 |
+
NH2OH
|
979 |
+
N
|
980 |
+
H
|
981 |
+
H
|
982 |
+
N
|
983 |
+
N
|
984 |
+
OH
|
985 |
+
OH
|
986 |
+
OH
|
987 |
+
HO
|
988 |
+
OH
|
989 |
+
NH2HO
|
990 |
+
OH
|
991 |
+
OHOH
|
992 |
+
NH
|
993 |
+
s
|
994 |
+
N
|
995 |
+
HO
|
996 |
+
H
|
997 |
+
NH2Geometry and Molecular Surfaces
|
998 |
+
A PREPRINT
|
999 |
+
Figure 6: KQMolSA similarity (for k = 1 and k = 2) of four ‘different’ molecules (blue) to the PDE5 inhibitor test series (red). The overlay of the structures was
|
1000 |
+
computed using Open3DAlign [21]
|
1001 |
+
Of course, there are many other ways of measuring the distance between two Hermitian matrices.
|
1002 |
+
One
|
1003 |
+
might hope that some form of machine learning, trained on an appropriate data set, might discern other useful
|
1004 |
+
geometries on the space of descriptors.
|
1005 |
+
The method also contains numerical instability above k = 2 (and for k = 2 in a few instances), producing Hermitian
|
1006 |
+
matrices that are not positive definite. As Hermitian matrices differing only by a scale factor can be considered
|
1007 |
+
equivalent, we have handled such cases by scaling one matrix by a factor of 10-1000 to bring the eigenvalues into the
|
1008 |
+
range of Python’s numerical tolerance.
|
1009 |
+
Along with addressing these issues, both of the methods proposed could be further improved through the consideration
|
1010 |
+
of pharmacorphoric features, such as aromatic rings, hydrogen bond donors and acceptors, alongside the shape. As
|
1011 |
+
these features are important for binding, this may lead to improved predictions compared to the consideration of shape
|
1012 |
+
alone. As for RGMolSA, there would also be scope to investigate the use the Hermitian matrix descriptors produced by
|
1013 |
+
KQMolSA as a feature descriptor in machine learning.
|
1014 |
+
5
|
1015 |
+
Appendix: Finding the Kähler potential
|
1016 |
+
Before giving the proof of the form of the Kähler potential, we dispense with a small technical point. From the point of
|
1017 |
+
view of describing the Kähler form ω via
|
1018 |
+
√
|
1019 |
+
−1∂ ¯∂ϕ = ω,
|
1020 |
+
the Kähler potential ϕ is only locally defined and adding any function H satisfying √−1∂ ¯∂H = 0
|
1021 |
+
will also define a Kähler potential for ω. In our setting where the underlying complex manifold is CP1 and we are using
|
1022 |
+
the standard coordinate z, we can add any harmonic function H : C → R to obtain a valid Kähler potential.
|
1023 |
+
14
|
1024 |
+
|
1025 |
+
Arginina
|
1026 |
+
Lymecyclina
|
1027 |
+
Diforaaone
|
1028 |
+
S-octylglubthiona
|
1029 |
+
K=1:0.469
|
1030 |
+
k=1:0.513
|
1031 |
+
k=1:0.367
|
1032 |
+
k=1:0.467
|
1033 |
+
k=2: 0.413
|
1034 |
+
k=2: 0.411
|
1035 |
+
k=2: 0.3B9
|
1036 |
+
k=2: 0.378
|
1037 |
+
sildenfl
|
1038 |
+
K=1:0.493
|
1039 |
+
K=1:0.535
|
1040 |
+
K=1:0.354
|
1041 |
+
K=1:0.467
|
1042 |
+
K=2:0.445
|
1043 |
+
K=2:0.45
|
1044 |
+
k=2: 0.377
|
1045 |
+
K=2:0.378
|
1046 |
+
Vardanafil
|
1047 |
+
K=1:0.282
|
1048 |
+
k=1:0.347
|
1049 |
+
K=1:0.74
|
1050 |
+
K=1:0.421
|
1051 |
+
k=2: 0.315
|
1052 |
+
K=2: 0.339
|
1053 |
+
k=2: 0.614
|
1054 |
+
k=2: 0.4
|
1055 |
+
dalahlGeometry and Molecular Surfaces
|
1056 |
+
A PREPRINT
|
1057 |
+
(a) Tadalafil - Space Filling Model
|
1058 |
+
(b) Diflorasone - Space Filling Model
|
1059 |
+
(c) Tadalafil - Surface
|
1060 |
+
(d) Diflorasone - Surface
|
1061 |
+
Figure 7: Comparison by eye of both the space filling model and the surface of Tadalafil and Diflorasone highlights their similarity.
|
1062 |
+
However, in Kähler Quantization, the potential ϕ actually describes a global object, the Hermitian metric h
|
1063 |
+
on the line bundle L. This means that the functions
|
1064 |
+
h(zj, zj) = e−kϕ(z)|z|2j,
|
1065 |
+
are defined over whole sphere CP1. In particular, they extend to functions over the point at infinity. For example the
|
1066 |
+
round metric has Kähler potential ϕ = −2 log(|z|2 + 1) and so, if we add a harmonic function H we require
|
1067 |
+
|z|4k
|
1068 |
+
(1 + |z|2)2k e−kH
|
1069 |
+
to be bounded. The Liouville Theorem then implies H must be constant.
|
1070 |
+
Theorem 5.1 (Form of Kähler potential). Let ω be a Kähler metric of the form given by Equation (3). If we denote the
|
1071 |
+
region corresponding to the ith sphere as Ri ⊂ C, then the Kähler potential potential ϕ, which satisfies √−1∂∂ϕ = ω,
|
1072 |
+
is of the form
|
1073 |
+
ϕ(z) = Ci
|
1074 |
+
Bi
|
1075 |
+
log(|z − Ai|2 + Bi) +
|
1076 |
+
N
|
1077 |
+
�
|
1078 |
+
j=1
|
1079 |
+
Kij log(|αijz + βij|2),
|
1080 |
+
where K ∈ M N×N(R), and α, β ∈ M N×N(C).
|
1081 |
+
Proof. The proof is by induction on the number of spheres N. For N = 1 the metric ω is the round metric and we can
|
1082 |
+
take K = 0. Adding a new sphere to the surface changes the metric by adding a new region Rk which is a disc where
|
1083 |
+
the metric takes the form
|
1084 |
+
ω(z)|Rk =
|
1085 |
+
Ck
|
1086 |
+
(|z − Ak|2 + Bk)2
|
1087 |
+
√
|
1088 |
+
−1dz ∧ dz.
|
1089 |
+
15
|
1090 |
+
|
1091 |
+
Geometry and Molecular Surfaces
|
1092 |
+
A PREPRINT
|
1093 |
+
We can map Rk to the unit disc about the origin by a Möbius transformation M in such a way that, in the coordinate of
|
1094 |
+
the unit disc, the metric is given by
|
1095 |
+
�ω(w) =
|
1096 |
+
�
|
1097 |
+
�
|
1098 |
+
�
|
1099 |
+
�
|
1100 |
+
�
|
1101 |
+
F(w)√−1dw ∧ dw
|
1102 |
+
if
|
1103 |
+
|w| > 1,
|
1104 |
+
κ
|
1105 |
+
(|w|2 + ε)2
|
1106 |
+
√−1dw ∧ dw
|
1107 |
+
if
|
1108 |
+
|w| ≤ 1,
|
1109 |
+
for some function F : C → R and constants κ, ε ∈ R.
|
1110 |
+
We solve the ¯∂-equation using the Dolbeault method; for a compactly supported1 continuous function H : C → C,
|
1111 |
+
ψ(w) =
|
1112 |
+
1
|
1113 |
+
2π√−1
|
1114 |
+
��
|
1115 |
+
C
|
1116 |
+
H(p)
|
1117 |
+
p − wdp ∧ dp,
|
1118 |
+
solves ∂ψ = H(w)dw. We split the integral according to the form of the metric and consider
|
1119 |
+
ψ(w) =
|
1120 |
+
1
|
1121 |
+
2π√−1
|
1122 |
+
��
|
1123 |
+
D
|
1124 |
+
κ
|
1125 |
+
(|p|2 + ε)2(p − w)dp ∧ dp +
|
1126 |
+
1
|
1127 |
+
2π√−1
|
1128 |
+
��
|
1129 |
+
C\D
|
1130 |
+
F(p)
|
1131 |
+
p − wdp ∧ dp.
|
1132 |
+
To compute the first integral we use the Cauchy–Pompeiu integral formula and the fact that
|
1133 |
+
κ
|
1134 |
+
(|p|2 + ε)2 = ∂
|
1135 |
+
∂p
|
1136 |
+
� (κ/ε)p
|
1137 |
+
(|p|2 + ε)
|
1138 |
+
�
|
1139 |
+
,
|
1140 |
+
to give
|
1141 |
+
1
|
1142 |
+
2π√−1
|
1143 |
+
��
|
1144 |
+
D
|
1145 |
+
κ
|
1146 |
+
(|p|2 + ε)2(p − w)dp ∧ dp =
|
1147 |
+
�
|
1148 |
+
�
|
1149 |
+
�
|
1150 |
+
�
|
1151 |
+
�
|
1152 |
+
�
|
1153 |
+
�
|
1154 |
+
�
|
1155 |
+
�
|
1156 |
+
� (κ/ε)w
|
1157 |
+
(|w|2 + ε)
|
1158 |
+
�
|
1159 |
+
−
|
1160 |
+
1
|
1161 |
+
2π√−1
|
1162 |
+
�
|
1163 |
+
∂D
|
1164 |
+
(κ/ε)p
|
1165 |
+
(|p|2 + ε)(p − w)dp
|
1166 |
+
if
|
1167 |
+
|w| < 1,
|
1168 |
+
−
|
1169 |
+
1
|
1170 |
+
2π√−1
|
1171 |
+
�
|
1172 |
+
∂D
|
1173 |
+
(κ/ε)p
|
1174 |
+
(|p|2 + ε)(p − w)dp
|
1175 |
+
if
|
1176 |
+
|w| > 1.
|
1177 |
+
The contour integral
|
1178 |
+
1
|
1179 |
+
2π√−1
|
1180 |
+
�
|
1181 |
+
∂D
|
1182 |
+
(κ/ε)p
|
1183 |
+
(|p|2 + B)(p − w)dp,
|
1184 |
+
can be easily computed using the Cauchy Residue Formula and this yields
|
1185 |
+
1
|
1186 |
+
2π√−1
|
1187 |
+
�
|
1188 |
+
∂D
|
1189 |
+
(κ/ε)p
|
1190 |
+
(|p|2 + ε)(p − w)dp =
|
1191 |
+
�
|
1192 |
+
0
|
1193 |
+
if |w| < 1,
|
1194 |
+
− (κ/ε)
|
1195 |
+
(1+ε)w
|
1196 |
+
if |w| > 1.
|
1197 |
+
Finally, we arrive at
|
1198 |
+
1
|
1199 |
+
2π√−1
|
1200 |
+
��
|
1201 |
+
D
|
1202 |
+
κ
|
1203 |
+
(|p|2 + ε)2(p − w)dp ∧ dp =
|
1204 |
+
� �
|
1205 |
+
(κ/ε)w
|
1206 |
+
|w|2+ε
|
1207 |
+
�
|
1208 |
+
if |w| < 1,
|
1209 |
+
(κ/ε)
|
1210 |
+
(1+ε)w
|
1211 |
+
if |w| > 1.
|
1212 |
+
To compute the second integral, we again split the domain and consider
|
1213 |
+
1
|
1214 |
+
2π√−1
|
1215 |
+
��
|
1216 |
+
C\D
|
1217 |
+
F(p)
|
1218 |
+
p − wdp ∧ dp =
|
1219 |
+
1
|
1220 |
+
2π√−1
|
1221 |
+
��
|
1222 |
+
C
|
1223 |
+
F(p)
|
1224 |
+
p − wdp ∧ dp −
|
1225 |
+
1
|
1226 |
+
2π√−1
|
1227 |
+
��
|
1228 |
+
D
|
1229 |
+
F(p)
|
1230 |
+
p − wdp ∧ dp.
|
1231 |
+
The integral
|
1232 |
+
S(w) =
|
1233 |
+
1
|
1234 |
+
2π√−1
|
1235 |
+
��
|
1236 |
+
C
|
1237 |
+
F(p)
|
1238 |
+
p − wdp ∧ dp,
|
1239 |
+
is a solution to
|
1240 |
+
∂S
|
1241 |
+
∂w = F(w).
|
1242 |
+
1Our function is not compactly supported but we could cut off at an arbitrary radius to produce such a function.
|
1243 |
+
16
|
1244 |
+
|
1245 |
+
Geometry and Molecular Surfaces
|
1246 |
+
A PREPRINT
|
1247 |
+
In the unit disc D, F has the form
|
1248 |
+
F(w) =
|
1249 |
+
˜κ
|
1250 |
+
(|w|2 + ˜ε)2 ,
|
1251 |
+
where ˜κ and ˜ε are positive constants. Hence
|
1252 |
+
ψ(w) =
|
1253 |
+
�
|
1254 |
+
�
|
1255 |
+
�
|
1256 |
+
�
|
1257 |
+
�
|
1258 |
+
�
|
1259 |
+
�
|
1260 |
+
�
|
1261 |
+
�
|
1262 |
+
S(w) +
|
1263 |
+
� (κ/ε)
|
1264 |
+
|w|2 + ε −
|
1265 |
+
(˜κ/˜ε)
|
1266 |
+
|w|2 + ˜ε
|
1267 |
+
�
|
1268 |
+
w
|
1269 |
+
if
|
1270 |
+
|w| < 1,
|
1271 |
+
S(w) +
|
1272 |
+
�(κ/ε)
|
1273 |
+
1 + ε − (˜κ/˜ε)
|
1274 |
+
1 + ˜ε
|
1275 |
+
�
|
1276 |
+
w−1
|
1277 |
+
if
|
1278 |
+
|w| > 1,
|
1279 |
+
solves dw ∧ ∂ψ = �ω(w).
|
1280 |
+
If Q(w) is a Kähler potential for F(w)√−1dw ∧ dw then
|
1281 |
+
�ϕ(w) =
|
1282 |
+
�
|
1283 |
+
�
|
1284 |
+
�
|
1285 |
+
Q(w) + (κ/ε) log(|w|2 + ε) − (˜κ/˜ε) log(|w|2 + ˜ε) − K
|
1286 |
+
if
|
1287 |
+
|w| < 1,
|
1288 |
+
Q(w) +
|
1289 |
+
�(κ/ε)
|
1290 |
+
1 + ε − (˜κ/˜ε)
|
1291 |
+
1 + ˜ε
|
1292 |
+
�
|
1293 |
+
log(|w|2)
|
1294 |
+
if
|
1295 |
+
|w| > 1,
|
1296 |
+
where
|
1297 |
+
K = (κ/ε) log(1 + ε) − (˜κ/˜ε) log(1 + ˜ε),
|
1298 |
+
is a Kähler potential for �ω. Pulling back the function �ϕ via the Möbius transformation
|
1299 |
+
M(z) = αz + β
|
1300 |
+
γz + δ
|
1301 |
+
we see
|
1302 |
+
ϕk(z) =
|
1303 |
+
�
|
1304 |
+
�
|
1305 |
+
�
|
1306 |
+
�
|
1307 |
+
�
|
1308 |
+
�
|
1309 |
+
�
|
1310 |
+
�
|
1311 |
+
�
|
1312 |
+
�
|
1313 |
+
�
|
1314 |
+
Q
|
1315 |
+
�αz + β
|
1316 |
+
γz + δ
|
1317 |
+
�
|
1318 |
+
+ (κ/ε) log
|
1319 |
+
�����
|
1320 |
+
αz + β
|
1321 |
+
γz + δ
|
1322 |
+
����
|
1323 |
+
2
|
1324 |
+
+ ε
|
1325 |
+
�
|
1326 |
+
− K
|
1327 |
+
if
|
1328 |
+
z ∈ Rk
|
1329 |
+
Q
|
1330 |
+
�αz + β
|
1331 |
+
γz + δ
|
1332 |
+
�
|
1333 |
+
+
|
1334 |
+
�(κ/ε)
|
1335 |
+
1 + ε − (˜κ/˜ε)
|
1336 |
+
1 + ˜ε
|
1337 |
+
�
|
1338 |
+
log
|
1339 |
+
�����
|
1340 |
+
αz + β
|
1341 |
+
γz + δ
|
1342 |
+
����
|
1343 |
+
2�
|
1344 |
+
if
|
1345 |
+
z ̸∈ Rk
|
1346 |
+
is a Kähler potential for the metric which is singular at at the point z = −δ/γ. We can replace the Q-term by the
|
1347 |
+
appropriate function for the previous ϕ and then add the appropriate multiple of log(|γz + δ|2) to produce a Kähler
|
1348 |
+
potential of the appropriate form.
|
1349 |
+
6
|
1350 |
+
Acknowledgements
|
1351 |
+
The authors acknowledge support from an EPSRC Doctoral Training Partnership studentship (grant EP/R51309X/1),
|
1352 |
+
the Alan Turing Institute Enrichment Scheme (R.P.), and a UKRI Future Leaders Fellowship (grant MR/T019654/1)
|
1353 |
+
(D.J.C.). S.J.H. would like to thank Dr R. L. Hall for his interest and for useful conversations about the project. T.M.
|
1354 |
+
would like to thank University of California, Irvine for their hospitality whilst some of the work on this paper was
|
1355 |
+
completed.
|
1356 |
+
References
|
1357 |
+
[1] Daniel J. Cole, Stuart J. Hall, and Rachael Pirie. Riemannian geometry and molecular surfaces I: Spectrum of the
|
1358 |
+
Laplacian, (preprint), 2022.
|
1359 |
+
[2] Mark A. Johnson and Gerald M. Maggiora. Concepts and Applications of Molecular Similarity. 1990.
|
1360 |
+
[3] Sumudu P. Leelananda and Steffen Lindert. Computational methods in drug discovery. Beilstein J. Org. Chem.,
|
1361 |
+
12:2694–2718, 2016.
|
1362 |
+
[4] Ashutosh Kumar and Kam Y. J. Zhang. Advances in the development of shape similarity methods and their
|
1363 |
+
application in drug discovery. Front. Chem., 6:1–21, 2018.
|
1364 |
+
[5] S. K. Donaldson. Some numerical results in complex differential geometry. Pure Appl. Math. Q., 5(2):571–618,
|
1365 |
+
2009.
|
1366 |
+
17
|
1367 |
+
|
1368 |
+
Geometry and Molecular Surfaces
|
1369 |
+
A PREPRINT
|
1370 |
+
[6] Ann E. Cleves and Ajay N. Jain. Effects of inductive bias on computational evaluations of ligand-based modelling
|
1371 |
+
and on drug discovery. J. Comput. Aided Mol. Des., 22(3):147–159, 2008.
|
1372 |
+
[7] Stuart J. Hall and Thomas Murphy. Kähler geometry of molecular surfaces, in preparation.
|
1373 |
+
[8] Phillip Griffiths and Joseph Harris. Principles of algebraic geometry. Pure and Applied Mathematics. A Wiley-
|
1374 |
+
Interscience Publication. New York etc.: John Wiley & Sons. XII, 813 p. £ 29.60; $ 58.00 (1978)., 1978.
|
1375 |
+
[9] Gang Tian. On a set of polarized Kähler metrics on algebraic manifolds. J. Differ. Geom., 32(1):99–130, 1990.
|
1376 |
+
[10] Robert Berman and Julien Keller. Bergman geodesics. In Complex Monge-Ampère equations and geodesics in the
|
1377 |
+
space of Kähler metrics. Lecture notes, pages 283–302. Berlin: Springer, 2012.
|
1378 |
+
[11] Xiuxiong Chen and Song Sun. Space of Kähler metrics (V)—Kähler quantization. In Metric and differential
|
1379 |
+
geometry, volume 297 of Progr. Math., pages 19–41. Birkhäuser/Springer, Basel, 2012.
|
1380 |
+
[12] Yoshinori Hashimoto. Quantisation of extremal Kähler metrics. J. Geom. Anal., 31(3):2970–3028, 2021.
|
1381 |
+
[13] William H. Press, Saul A. Teukolsky, William T. Vetterling, and Brian P. Flannery. Numerical recipes. Cambridge
|
1382 |
+
University Press, Cambridge, third edition, 2007. The art of scientific computing.
|
1383 |
+
[14] Pauli Virtanen et al. SciPy 1.0: Fundamental Algorithms for Scientific Computing in Python. Nature Methods,
|
1384 |
+
17:261–272, 2020.
|
1385 |
+
[15] Sereina Riniker and Gregory A. Landrum. Better informed distance geometry: Using what we know to improve
|
1386 |
+
conformation generation. J. Chem. Inf. Model, 55(12):2562–2574, 2015.
|
1387 |
+
[16] Paolo Tosco, Nikolaus Stiefl, and Gregory Landrum. Bringing the mmff force field to the rdkit: Implementation
|
1388 |
+
and validation. J.Cheminformatics, 6(1), 2014.
|
1389 |
+
[17] Greg Landrum. Rdkit: Open-source cheminformatics software. Version 2021.09.1.
|
1390 |
+
[18] Adrian M Schreyer and Tom Blundell. USRCAT: Real-time ultrafast shape recognition with pharmacophoric
|
1391 |
+
constraints. J. Cheminform., 4:1489–1495, 2012.
|
1392 |
+
[19] Jonatan Taminau, Gert Thijs, and Hans De Winter. Pharao: Pharmacophore alignment and optimization. J. Mol.
|
1393 |
+
Graph, 27(2):161–169, 2008.
|
1394 |
+
[20] Matthew P. Seddon, David A. Cosgrove, Martin J. Packer, and Valerie J. Gillet. Alignment-free molecular shape
|
1395 |
+
comparison using spectral geometry: The framework. J. Chem. Inf. Model, 59:98–116, 2019.
|
1396 |
+
[21] Paolo Tosco, Thomas Balle, and Fereshteh Shiri. Open3dalign: an open-source software aimed at unsupervised
|
1397 |
+
ligand alignment. Journal of Computer-Aided Molecular Design, 25(8):777–783, 2011.
|
1398 |
+
18
|
1399 |
+
|
79E3T4oBgHgl3EQfRwk1/content/tmp_files/load_file.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
7dE0T4oBgHgl3EQffQBI/content/tmp_files/2301.02401v1.pdf.txt
ADDED
@@ -0,0 +1,1848 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
You Truly Understand What I Need
|
2 |
+
: Intellectual and Friendly Dialogue Agents grounding
|
3 |
+
Knowledge and Persona
|
4 |
+
Jungwoo Lim1, Myunghoon Kang1∗, Yuna Hur1∗, Seungwon Jung1∗, Jinsung Kim1∗,
|
5 |
+
Yoonna Jang1, Dongyub Lee3, Hyesung Ji2, Donghoon Shin2,
|
6 |
+
Seungryong Kim1§ and Heuiseok Lim1§
|
7 |
+
1Korea University, 2Dialogue Tech Division, NCSOFT, 3Naver Corporation
|
8 |
+
{wjddn803,chaos8527,yj72722,redlion0929,jin62304,seungryong_kim,limhseok}@korea.ac.kr,
|
9 |
+
{hyesung84,dhshin}@ncsoft.com, [email protected]
|
10 |
+
Abstract
|
11 |
+
To build a conversational agent that interacts
|
12 |
+
fluently
|
13 |
+
with
|
14 |
+
humans,
|
15 |
+
previous
|
16 |
+
studies
|
17 |
+
blend knowledge or personal profile into the
|
18 |
+
pre-trained language model. However, the
|
19 |
+
model that considers knowledge and persona
|
20 |
+
at the same time is still limited, leading to
|
21 |
+
hallucination and a passive way of using
|
22 |
+
personas. We propose an effective dialogue
|
23 |
+
agent that grounds external knowledge and
|
24 |
+
persona simultaneously. The agent selects
|
25 |
+
the proper knowledge and persona to use for
|
26 |
+
generating the answers with our candidate
|
27 |
+
scoring implemented with a poly-encoder.
|
28 |
+
Then, our model generates the utterance with
|
29 |
+
lesser hallucination and more engagingness
|
30 |
+
utilizing
|
31 |
+
retrieval
|
32 |
+
augmented
|
33 |
+
generation
|
34 |
+
with
|
35 |
+
knowledge-persona
|
36 |
+
enhanced
|
37 |
+
query.
|
38 |
+
We conduct experiments on the persona-
|
39 |
+
knowledge chat and achieve state-of-the-art
|
40 |
+
performance in grounding and generation
|
41 |
+
tasks on the automatic metrics. Moreover,
|
42 |
+
we validate the answers from the models
|
43 |
+
regarding
|
44 |
+
hallucination
|
45 |
+
and
|
46 |
+
engagingness
|
47 |
+
through human evaluation and qualitative
|
48 |
+
results. We show our retriever’s effectiveness
|
49 |
+
in extracting relevant documents compared
|
50 |
+
to
|
51 |
+
the
|
52 |
+
other
|
53 |
+
previous
|
54 |
+
retrievers,
|
55 |
+
along
|
56 |
+
with the comparison of multiple candidate
|
57 |
+
scoring
|
58 |
+
methods.
|
59 |
+
Code
|
60 |
+
is
|
61 |
+
available
|
62 |
+
at
|
63 |
+
https://github.com/dlawjddn803/INFO
|
64 |
+
1
|
65 |
+
Introduction
|
66 |
+
To
|
67 |
+
build
|
68 |
+
an
|
69 |
+
ultimate
|
70 |
+
conversational
|
71 |
+
agent
|
72 |
+
that interacts with humans fluently, previous
|
73 |
+
studies provide generative neural network-based
|
74 |
+
models (Sordoni et al., 2015; Vinyals and Le,
|
75 |
+
2015). Although the answers generated from those
|
76 |
+
models are plausible, they lack informativeness
|
77 |
+
and engagingness resulting in bland responses
|
78 |
+
compared to humans (Li et al., 2016; Gao et al.,
|
79 |
+
*
|
80 |
+
Equal Contributors
|
81 |
+
§ Corresponding author
|
82 |
+
Dialogue
|
83 |
+
Human: Is it in England?
|
84 |
+
Machine: No, it is actually in Scotland where you are going.
|
85 |
+
Human: Where in Scotland?
|
86 |
+
Human’s Persona
|
87 |
+
I will travel through North Ayrshire.
|
88 |
+
I am going to Scotland.
|
89 |
+
I like history.
|
90 |
+
I am interested in architecture.
|
91 |
+
I love to garden.
|
92 |
+
Ground Truth Knowledge
|
93 |
+
Eglinton Castle was a large Gothic castellated mansion in
|
94 |
+
Kilwinning, North Ayrshire, Scotland.
|
95 |
+
Predicted Answers
|
96 |
+
BARTbase
|
97 |
+
It is in Scotland, which is a place you love.
|
98 |
+
BARTlarge
|
99 |
+
It is in Scotland. in Scotland. in Scotland. in
|
100 |
+
Ground Truth Response
|
101 |
+
It is in North Ayrshire so you could visit when you travel through.
|
102 |
+
Table 1: Example of the generated answers from a
|
103 |
+
typical generative model, i.e., BART. We can find that
|
104 |
+
BARTbase uses different persona sentence which has
|
105 |
+
not appeared human’s personal profiles resulting in
|
106 |
+
hallucinated answer. Also, BARTlarge generates less
|
107 |
+
engaging answers by making use of the knowledge only
|
108 |
+
to answer the question. Both generated responses are in
|
109 |
+
the situation of hallucination and are less engaging.
|
110 |
+
2018). However, for knowledgeable and attractive
|
111 |
+
conversation, people usually provide informative
|
112 |
+
replies by considering the background of the person
|
113 |
+
whom they are talking to. Towards a human-like
|
114 |
+
manner of dialogue, Ghazvininejad et al. (2018)
|
115 |
+
and Dinan et al. (2018) introduce the knowledge-
|
116 |
+
grounded conversation for the knowledgeable
|
117 |
+
and informative responses, whereas Zhang et al.
|
118 |
+
(2018a) suggest the persona-grounded dialogue for
|
119 |
+
the personalized responses to the users.
|
120 |
+
To improve the machine’s answer with the
|
121 |
+
external knowledge base, one injects the factual
|
122 |
+
knowledge into the parameters of the language
|
123 |
+
model (Raffel et al., 2020; Roberts et al., 2020).
|
124 |
+
Despite the models’ capability of utilizing external
|
125 |
+
knowledge implicitly, they produce “hallucinations”
|
126 |
+
in the responses (Marcus, 2020). The hallucination
|
127 |
+
arXiv:2301.02401v1 [cs.CL] 6 Jan 2023
|
128 |
+
|
129 |
+
in the dialogue involves the situation where
|
130 |
+
the generated output contradicts the reference
|
131 |
+
knowledge. Also, it includes the situation when
|
132 |
+
the generated output cannot be confirmed from the
|
133 |
+
knowledge source (Ji et al., 2022). To mitigate these
|
134 |
+
hallucinated answers, hybrid models employing
|
135 |
+
parametric memory with non-parametric (i.e.,
|
136 |
+
retrieval-based) memory are introduced to directly
|
137 |
+
access external memories, leading the source to be
|
138 |
+
inspected and interpreted (Karpukhin et al., 2020;
|
139 |
+
Petroni et al., 2020; Lewis et al., 2020b).
|
140 |
+
On the other hand, Zhang et al. (2018a) suggest
|
141 |
+
persona-chat dialogues with the corresponding
|
142 |
+
personal profiles of each interlocutor to avoid
|
143 |
+
general and monotonous answers from the machine.
|
144 |
+
Though See et al. (2019); Liu et al. (2020) show
|
145 |
+
comparable quality in generating personalized
|
146 |
+
conversation, the generated utterances merely
|
147 |
+
confirm each interlocutor’s persona resulting
|
148 |
+
in a passive manner of speaking such as “I
|
149 |
+
have four children”. In addition, the incoherent
|
150 |
+
topics of the dialogues lead to shallow levels
|
151 |
+
of conversation between the interlocutors. To
|
152 |
+
elaborate on this chit-chat conversation supported
|
153 |
+
by external knowledge, Jang et al. (2022) presents
|
154 |
+
a novel persona-knowledge chat with a generative
|
155 |
+
model that considers persona information and
|
156 |
+
world knowledge altogether. Despite obtaining
|
157 |
+
the knowledge and persona when generating the
|
158 |
+
answers, the generative models’ responses still
|
159 |
+
exhibit both hallucination and lesser engagingness
|
160 |
+
as in Table 1.
|
161 |
+
In this paper, we propose INFO (Intellectual
|
162 |
+
and Friendly dialOg agents) that responds with
|
163 |
+
external knowledge and persona simultaneously.
|
164 |
+
Owing to the enhanced capturing relevancy
|
165 |
+
between the context and each candidate set,
|
166 |
+
the knowledge selector and persona selector for
|
167 |
+
the grounding task are implemented with the
|
168 |
+
poly-encoder. To alleviate hallucinated responses
|
169 |
+
from the model, we adopt retrieval-augmented
|
170 |
+
generation (RAG) (Lewis et al., 2020b) by
|
171 |
+
utilizing non-parametric memory and parametric
|
172 |
+
generator in addition to the enhanced input
|
173 |
+
query. By injecting predicted sources as input
|
174 |
+
to the retrieved-augmented generator, our model
|
175 |
+
maintains consistency between grounding and
|
176 |
+
generation while training. Therefore, our model
|
177 |
+
generates more knowledgeable and engaging
|
178 |
+
answers in an active manner with less hallucination.
|
179 |
+
We show that INFO achieves the highest
|
180 |
+
scores on both grounding and generation tasks in
|
181 |
+
empirical experiments. Also, we compare diverse
|
182 |
+
candidate scoring modules including bi-encoder,
|
183 |
+
cross-encoder, and poly-encoder and demonstrate
|
184 |
+
their effect on generation. We additionally conduct
|
185 |
+
experiments to show the effectiveness of the
|
186 |
+
retriever module compared to sparse and dense
|
187 |
+
retrievers. The qualitative results and human
|
188 |
+
evaluation are also presented to validate our
|
189 |
+
model’s capability to generate human-like answers.
|
190 |
+
Our contributions are as follows:
|
191 |
+
• We propose the model that grounds persona
|
192 |
+
information and external knowledge with
|
193 |
+
lesser hallucination and adequate utilization of
|
194 |
+
persona in an active manner simultaneously.
|
195 |
+
• Our approach suggests that the generated
|
196 |
+
responses from the model are interpretable
|
197 |
+
regarding what the model refers to while
|
198 |
+
generating.
|
199 |
+
• We show that INFO achieves the SoTA
|
200 |
+
performance in all of the automatic metrics
|
201 |
+
and demonstrate its comparable quality with
|
202 |
+
human evaluation and qualitative analysis.
|
203 |
+
2
|
204 |
+
Related Works
|
205 |
+
2.1
|
206 |
+
Knowledge Grounded Conversation
|
207 |
+
To let the neural network models ground external
|
208 |
+
knowledge and generate informative answers,
|
209 |
+
Ghazvininejad et al. (2018) suggests a data-
|
210 |
+
driven neural conversational agent that provides
|
211 |
+
knowledgeable
|
212 |
+
answers.
|
213 |
+
Also,
|
214 |
+
Dinan
|
215 |
+
et
|
216 |
+
al.
|
217 |
+
(2018) introduces open-domain dialogue where
|
218 |
+
the two speakers are talking with Wikipedia
|
219 |
+
knowledge. To inject the external knowledge
|
220 |
+
into the pre-trained language model efficiently,
|
221 |
+
Raffel et al. (2020); Roberts et al. (2020)
|
222 |
+
success in equipping the knowledge into the
|
223 |
+
parameters and show comparable performance
|
224 |
+
in open-domain question and answering tasks.
|
225 |
+
However, the approach is not capable of expand
|
226 |
+
or revise their inherent knowledge and provides
|
227 |
+
hallucination (Marcus, 2020). To overcome the
|
228 |
+
limitations, Lewis et al. (2020b) combines a
|
229 |
+
pre-trained parametric model and non-parametric
|
230 |
+
memory for the open-domain question and
|
231 |
+
answering to reduce hallucination. Since their non-
|
232 |
+
parametric memory can be updated without extra
|
233 |
+
pre-training, revising knowledge is more efficient.
|
234 |
+
Furthermore, it is found that a retrieval-augmented
|
235 |
+
|
236 |
+
Figure 1: Overview of our method. U is the input comprises dialogue history and knowledge snippet, and cand
|
237 |
+
denotes each candidate from the grounding tasks. The grounding score is obtained through the dot product
|
238 |
+
operation with the representation of input context Udial and candidate at. The predicted sources convert into the
|
239 |
+
knowledge-persona enhanced query (KPEQ) with dialogue history and KPEQ is fed into the retrieval-augmented
|
240 |
+
generator to generate the responses.
|
241 |
+
generator also reduces hallucination in knowledge-
|
242 |
+
grounded conversation as well (Shuster et al.,
|
243 |
+
2021), and a similar approach recently achieves
|
244 |
+
outstanding performance in knowledge-grounded
|
245 |
+
conversation (Paranjape et al., 2021).
|
246 |
+
2.2
|
247 |
+
Persona Grounded Conversation
|
248 |
+
In order to alleviate bland and general answers
|
249 |
+
with consistent personality, Zhang et al. (2018a)
|
250 |
+
constructs a persona-chat dataset. In the dataset,
|
251 |
+
the two interlocutors chat with the persona
|
252 |
+
profile sentences. Along with this dataset, Zhang
|
253 |
+
et al. (2018a) introduces the model with a
|
254 |
+
profile memory network by considering the
|
255 |
+
dialogue history to perform attention over the
|
256 |
+
persona. They enlarge the persona-chat dataset
|
257 |
+
with Reddit corpus, and pre-trained the model
|
258 |
+
with these dataset. After that, they fine-tune pre-
|
259 |
+
trained model on the persona-chat (Mazare et al.,
|
260 |
+
2018). Also, Liu et al. (2020) trains a receiver
|
261 |
+
to reinforce the mutual persona understanding
|
262 |
+
between interlocutors, and Wolf et al. (2019) utilize
|
263 |
+
pre-trained models (Radford et al., 2019) to build
|
264 |
+
personalized dialogue agents.
|
265 |
+
2.3
|
266 |
+
Encoders for Sentence Scoring
|
267 |
+
There exist diverse encoder structures for sentence
|
268 |
+
scoring. Bi-encoder scores the relevance between
|
269 |
+
sentences by feeding context and candidates into
|
270 |
+
separate encoders. An example of bi-encoders
|
271 |
+
are memory networks
|
272 |
+
(Zhang et al., 2018a),
|
273 |
+
transformer memory networks (Dinan et al.,
|
274 |
+
2018), LSTM (Lowe et al., 2015). Since bi-
|
275 |
+
encoder calculates with cached encoded sentence
|
276 |
+
representations, it is relatively fast in computation.
|
277 |
+
However, the bi-encoder has a limitation of
|
278 |
+
capturing mutual information between context
|
279 |
+
and candidates. Cross-encoder, on the other hand,
|
280 |
+
scores by aligning context and candidates in
|
281 |
+
one sequence. A type of cross-encoders is a
|
282 |
+
sequential matching network that is based on
|
283 |
+
deep matching networks (Yang et al., 2018) and
|
284 |
+
gated self-attention (Zhang et al., 2018b). Although
|
285 |
+
using a cross-encoder can achieve rich interaction
|
286 |
+
between the sentences within the encoder, the
|
287 |
+
problem of slow processing still remains. To
|
288 |
+
exploit both benefits of each model, poly-encoder
|
289 |
+
adopts attention mechanism into the bi-encoder
|
290 |
+
architecture and shows satisfactory performances
|
291 |
+
as cross-encoder with fast inference time (Humeau
|
292 |
+
et al., 2019). For the enhanced representation of
|
293 |
+
grounding knowledge and persona, we employ a
|
294 |
+
poly-encoder as a selector for each grounding task.
|
295 |
+
3
|
296 |
+
Method
|
297 |
+
To generate more knowledgeable and engaging
|
298 |
+
dialogue, we introduce our conversational model
|
299 |
+
that grounds external knowledge and persona
|
300 |
+
information as in Figure 1. We first encode the
|
301 |
+
input with the pre-trained language model, and
|
302 |
+
then choose the proper knowledge and persona
|
303 |
+
from the given candidates for each selector. We
|
304 |
+
employ poly-encoder
|
305 |
+
(Humeau et al., 2019)
|
306 |
+
as knowledge selector and persona selector to
|
307 |
+
exploit its enhanced capability of capturing
|
308 |
+
relevance between candidate set and context (i.e.,
|
309 |
+
dialogue history). Then, the predicted persona
|
310 |
+
and knowledge are aligned into one sequence
|
311 |
+
|
312 |
+
KPEQ
|
313 |
+
Retriever(Non-Parametric)
|
314 |
+
Poly-encoder
|
315 |
+
Knowledge Selector
|
316 |
+
Document Index
|
317 |
+
Uaial
|
318 |
+
O-
|
319 |
+
Score
|
320 |
+
Poly-
|
321 |
+
U
|
322 |
+
Z1-08
|
323 |
+
encoder
|
324 |
+
Attention
|
325 |
+
Z7777
|
326 |
+
Z1-03
|
327 |
+
Z2-02
|
328 |
+
Uaial
|
329 |
+
Uaal
|
330 |
+
acand
|
331 |
+
Knowledge
|
332 |
+
Z1-01
|
333 |
+
Candidate
|
334 |
+
Z2-09
|
335 |
+
C
|
336 |
+
CM
|
337 |
+
Dialogue
|
338 |
+
Z2-05
|
339 |
+
Z2-07
|
340 |
+
Attention
|
341 |
+
Attention
|
342 |
+
Candidate Aggregator
|
343 |
+
Persona
|
344 |
+
Candidate
|
345 |
+
个
|
346 |
+
↑
|
347 |
+
h1
|
348 |
+
hn
|
349 |
+
h2
|
350 |
+
a2
|
351 |
+
a1
|
352 |
+
aT
|
353 |
+
Persona Selector
|
354 |
+
↑
|
355 |
+
↑
|
356 |
+
Persona
|
357 |
+
Marginalize
|
358 |
+
Generator
|
359 |
+
Generated
|
360 |
+
Context Encoder
|
361 |
+
Candidate Encoder
|
362 |
+
Poly-
|
363 |
+
Level
|
364 |
+
(Parametric)
|
365 |
+
Answer
|
366 |
+
↑
|
367 |
+
T
|
368 |
+
↑
|
369 |
+
encoder
|
370 |
+
Indicator
|
371 |
+
U
|
372 |
+
candi
|
373 |
+
cand2
|
374 |
+
candTto the dialogue history for consistency between
|
375 |
+
grounding and generation. The sequence is defined
|
376 |
+
as a knowledge-persona enhanced query (KPEQ),
|
377 |
+
then it feeds into the retriever-augmented generator
|
378 |
+
(RAG). The generator then extracts the relevant
|
379 |
+
paragraphs to refer from the knowledge index to
|
380 |
+
reduce hallucination.
|
381 |
+
3.1
|
382 |
+
Input Construction
|
383 |
+
The
|
384 |
+
given
|
385 |
+
dialogue
|
386 |
+
is
|
387 |
+
notated
|
388 |
+
as
|
389 |
+
{(uhm
|
390 |
+
1 , umc
|
391 |
+
1 ), ...(uhm
|
392 |
+
o
|
393 |
+
, umc
|
394 |
+
o )},
|
395 |
+
where
|
396 |
+
o
|
397 |
+
is
|
398 |
+
the
|
399 |
+
number of rounds. uhm and umc indicate the
|
400 |
+
utterances of human and machines, respectively.
|
401 |
+
We first take o-th round dialogue history, except
|
402 |
+
for the final machine’s reply umc
|
403 |
+
o , for the initial
|
404 |
+
input for the model. We define the clue of the
|
405 |
+
dialogue as knowledge snippet clk to inform the
|
406 |
+
machine of which topic the user is interested in.
|
407 |
+
The knowledge snippet is the name of the landmark
|
408 |
+
that the user encounters, which is given topic from
|
409 |
+
the dialogue. We then align the dialogue history
|
410 |
+
and knowledge snippet into the one sequence for
|
411 |
+
the model input as U = {uhm
|
412 |
+
1 , umc
|
413 |
+
1 , ...uhm
|
414 |
+
o
|
415 |
+
, clk}.
|
416 |
+
3.2
|
417 |
+
Model Components
|
418 |
+
3.2.1
|
419 |
+
Poly-Encoder Based Candidate Scoring
|
420 |
+
For knowledge and persona grounding tasks, we
|
421 |
+
suggest poly-encoder-based candidate scoring to
|
422 |
+
leverage the capability of capturing the semantic
|
423 |
+
similarities between the context input and the
|
424 |
+
candidates. It is employed to select proper sources
|
425 |
+
to be used when generating the utterance. When
|
426 |
+
the context input U comes in, we compute
|
427 |
+
the grounding scores of each candidate utilizing
|
428 |
+
the embeddings of context input and encoded
|
429 |
+
candidates in the poly-encoder. The grounding
|
430 |
+
score is used to select the most suitable source(s) in
|
431 |
+
the knowledge selector and persona selector, which
|
432 |
+
will be introduced in the following Section 3.2.2
|
433 |
+
and 3.2.3.
|
434 |
+
In poly-encoder architecture (Humeau et al.,
|
435 |
+
2019), candidates are fed into the candidate
|
436 |
+
encoder and denoted as {a1, ..., aT } where T is
|
437 |
+
the number of candidates in the set. Each candidate
|
438 |
+
embedding at is the first output of the candidate
|
439 |
+
encoder, which is represented by the transformer
|
440 |
+
model. After encoding candidates, the context
|
441 |
+
input (i.e., dialogue history) is embedded with
|
442 |
+
a separate context encoder. Unlike the candidate
|
443 |
+
encoder, the context encoder embeds the dialogue
|
444 |
+
into multiple vectors through M context codes
|
445 |
+
{c1, ...cM}, which are learned for capturing diverse
|
446 |
+
aspects of a given context rather than using one
|
447 |
+
embedding. Each context code is used to extract
|
448 |
+
U m
|
449 |
+
dial by attending over all the previous layer’s
|
450 |
+
output as follows.
|
451 |
+
U m
|
452 |
+
dial =
|
453 |
+
�
|
454 |
+
j
|
455 |
+
wcm
|
456 |
+
j hj
|
457 |
+
(1)
|
458 |
+
Note that the h1, ..., hn is the output of the pre-
|
459 |
+
trained language model and n is the number of
|
460 |
+
tokens in the input. The weights are computed as
|
461 |
+
(wcm
|
462 |
+
1 , ..., wcm
|
463 |
+
n ) = softmax(cm · h1, ..., cm · hn).
|
464 |
+
Then, the final attention proceeds between
|
465 |
+
the global features of the input and a given
|
466 |
+
candidate. In other words, the final dialogue feature
|
467 |
+
Udial is obtained by aggregating each dialogue
|
468 |
+
feature U m
|
469 |
+
dial, while gaining richer interactions with
|
470 |
+
context codes as in Equation 2.
|
471 |
+
Udial =
|
472 |
+
�
|
473 |
+
m
|
474 |
+
wmU m
|
475 |
+
dial,
|
476 |
+
(2)
|
477 |
+
where
|
478 |
+
w1, ..., wM
|
479 |
+
can
|
480 |
+
be
|
481 |
+
obtained
|
482 |
+
from
|
483 |
+
softmax(at · U 1
|
484 |
+
dial, ..., at · U M
|
485 |
+
dial).
|
486 |
+
The final predicted candidate is chosen based
|
487 |
+
on the highest score that is acquired from the dot
|
488 |
+
product operation as (Udial · at).
|
489 |
+
3.2.2
|
490 |
+
Knowledge Selector (KS)
|
491 |
+
We build a knowledge selector for the knowledge
|
492 |
+
grounding task, employing poly-encoder-based
|
493 |
+
candidate scoring. When the grounding scores are
|
494 |
+
produced from the candidate scoring module, the
|
495 |
+
label with the highest score is selected as the
|
496 |
+
predicted knowledge.
|
497 |
+
The knowledge loss LKG for the knowledge
|
498 |
+
grounding task is computed with cross-entropy
|
499 |
+
loss (Brier et al., 1950) as in Equation 3.
|
500 |
+
LKG = −
|
501 |
+
�
|
502 |
+
j
|
503 |
+
klj · log ˆ
|
504 |
+
klj,
|
505 |
+
(3)
|
506 |
+
klj is the ground-truth label from the knowledge
|
507 |
+
candidates of the j-th example.
|
508 |
+
3.2.3
|
509 |
+
Persona Selector (PS)
|
510 |
+
We also implement a persona selector for
|
511 |
+
the persona grounding task. Since multiple
|
512 |
+
personas can be chosen to generate the responses,
|
513 |
+
consideration of one or more persona sentences
|
514 |
+
are needed. Similar to the knowledge selector,
|
515 |
+
we assign the grounding score to each persona
|
516 |
+
|
517 |
+
candidate with the candidate scoring module as
|
518 |
+
in Equation 1 and 2.
|
519 |
+
When the scores of each candidate are computed
|
520 |
+
from the candidate scoring module, then the
|
521 |
+
persona level indicator classifies which the number
|
522 |
+
of the persona should be selected with the [CLS]
|
523 |
+
token of the model input U. After predicting the
|
524 |
+
level of persona-engagingness, we pick persona
|
525 |
+
sentences to be grounded according to the number
|
526 |
+
predicted. For example, if the persona level
|
527 |
+
indicator predicts 2, then top-2 persona sentences
|
528 |
+
are chosen in the persona grounding task. The
|
529 |
+
selected persona sentence(s) are marked as 1
|
530 |
+
otherwise, 0. We use binary cross-entropy loss for
|
531 |
+
persona grounding as in Equation 4.
|
532 |
+
LPG =
|
533 |
+
−
|
534 |
+
�
|
535 |
+
j
|
536 |
+
plj · log ˆ
|
537 |
+
plj + (1 − plj) · log(1 − ˆ
|
538 |
+
plj)
|
539 |
+
(4)
|
540 |
+
Note that plj is the ground-truth label from the
|
541 |
+
knowledge candidates of the j-th example.
|
542 |
+
3.2.4
|
543 |
+
Query-Enhanced Generator
|
544 |
+
Following the works of Lewis et al. (2020b),
|
545 |
+
we exploit the retrieval augmented generation’s
|
546 |
+
capability to reduce hallucination and access the
|
547 |
+
memory directly. For a consistent way of training
|
548 |
+
while solving grounding and generation tasks,
|
549 |
+
we reconstruct the query that feeds into the
|
550 |
+
retriever. When the knowledge and persona are
|
551 |
+
predicted from each selector, we aggregate them
|
552 |
+
with dialogue history into one sequence. Then, the
|
553 |
+
final query is denoted as KPEQ = {U; ˆP; ˆK} and
|
554 |
+
defined as a knowledge-persona enhanced query. ˆP
|
555 |
+
and ˆK are predicted persona and knowledge from
|
556 |
+
each candidate set, respectively.
|
557 |
+
The retriever rη aims to search top-K latent
|
558 |
+
paragraphs with the KPEQ. We utilize a pre-
|
559 |
+
trained dense passage retriever (DPR) (Karpukhin
|
560 |
+
et
|
561 |
+
al.,
|
562 |
+
2020)
|
563 |
+
trained
|
564 |
+
on
|
565 |
+
natural
|
566 |
+
question
|
567 |
+
dataset (Kwiatkowski et al., 2019) which has
|
568 |
+
parametric memory and bi-encoder architecture to
|
569 |
+
retrieve a latent document embedding following
|
570 |
+
Lewis et al. (2020b) :
|
571 |
+
rη(z|KPEQ) ∝ exp(d(z)⊤q(KPEQ)),
|
572 |
+
(5)
|
573 |
+
where d(·) is an embedding from a document
|
574 |
+
encoder and q(·) is a representation from query
|
575 |
+
encoder, both implemented with BERTbase. z
|
576 |
+
denotes the list of document.
|
577 |
+
With the relevant paragraphs from the retriever,
|
578 |
+
we employ RAG-Token architecture as the
|
579 |
+
generator to borrow its strength of predicting
|
580 |
+
each target token based on top-K different
|
581 |
+
paragraphs. Since RAG-Sequence, which has a
|
582 |
+
different architecture to RAG-Token, uses the same
|
583 |
+
document from the retriever to predict each token
|
584 |
+
as depicted in Equation 6, the result may opt to
|
585 |
+
depend on the retrieved document (Lewis et al.,
|
586 |
+
2020a). The two different versions of RAGs (Lewis
|
587 |
+
et al., 2020b) are as follows:
|
588 |
+
SRS(y|x) ≈
|
589 |
+
�
|
590 |
+
z∈top-k(p(·|x))
|
591 |
+
rη(z|x)
|
592 |
+
N
|
593 |
+
�
|
594 |
+
i
|
595 |
+
gθ(yi|x, z, y1:i−1) (6)
|
596 |
+
SRT(y|x) ≈
|
597 |
+
N
|
598 |
+
�
|
599 |
+
i
|
600 |
+
�
|
601 |
+
z∈top-k(p(·|x))
|
602 |
+
rη(z|x)gθ(yi|x, z, y1:i−1),
|
603 |
+
(7)
|
604 |
+
where SRS indicates our method with RAG-
|
605 |
+
Sequence architecture and SRT denotes ours with
|
606 |
+
the RAG-Token model. x is a token of KPEQ and
|
607 |
+
yi is a single token from the ground truth responses.
|
608 |
+
Also, z is a retrieved paragraph from the retriever
|
609 |
+
and N is the maximum sequence length.
|
610 |
+
The SRT generator g(·) marginalizes the loss
|
611 |
+
from different paragraphs when generating answers.
|
612 |
+
In detail, the generator outputs a distribution
|
613 |
+
for the next token for each document before
|
614 |
+
marginalizing as in Equation 7 where η denotes
|
615 |
+
the parameter of the retriever, and θ indicates the
|
616 |
+
parameter of the generator. After that, the generator
|
617 |
+
repeats the process with the following output
|
618 |
+
token. Finally, the SRT aims to generate the next
|
619 |
+
token following an auto-regressive manner with a
|
620 |
+
standard beam search. In other words, the model
|
621 |
+
minimizes the negative marginal log-likelihood for
|
622 |
+
each input/output pair (KPEQj, yj). The language
|
623 |
+
model loss is formulated as :
|
624 |
+
LS = −
|
625 |
+
�
|
626 |
+
j
|
627 |
+
logp(yj|KPEQj)
|
628 |
+
(8)
|
629 |
+
3.3
|
630 |
+
Final Objectives
|
631 |
+
We then train the full model in the multi-tasking
|
632 |
+
manner. The full objectives of the model is
|
633 |
+
indicated as Equation 9.
|
634 |
+
L = λKGLKG + λPGLPG + λSLS
|
635 |
+
(9)
|
636 |
+
|
637 |
+
Models
|
638 |
+
Generation
|
639 |
+
Grounding (Acc.)
|
640 |
+
chrF++
|
641 |
+
BLEU
|
642 |
+
R-1
|
643 |
+
R-2
|
644 |
+
R-L
|
645 |
+
BERTScore
|
646 |
+
Persona
|
647 |
+
Knowledge
|
648 |
+
GPT2small
|
649 |
+
28.73
|
650 |
+
11.43
|
651 |
+
36.58
|
652 |
+
19.44
|
653 |
+
32.62
|
654 |
+
88.56
|
655 |
+
67.44
|
656 |
+
69.59
|
657 |
+
GPT2medium
|
658 |
+
30.12
|
659 |
+
12.31
|
660 |
+
38.29
|
661 |
+
21.17
|
662 |
+
34.12
|
663 |
+
88.92
|
664 |
+
67.44
|
665 |
+
72.42
|
666 |
+
BARTbase
|
667 |
+
29.77
|
668 |
+
11.99
|
669 |
+
36.24
|
670 |
+
19.73
|
671 |
+
32.13
|
672 |
+
88.35
|
673 |
+
67.45
|
674 |
+
72.18
|
675 |
+
BARTlarge
|
676 |
+
30.69
|
677 |
+
11.91
|
678 |
+
36.57
|
679 |
+
19.83
|
680 |
+
32.05
|
681 |
+
88.10
|
682 |
+
67.44
|
683 |
+
71.01
|
684 |
+
INFO (SRS)
|
685 |
+
51.33
|
686 |
+
29.36
|
687 |
+
53.36
|
688 |
+
40.36
|
689 |
+
51.16
|
690 |
+
92.00
|
691 |
+
82.70
|
692 |
+
99.24
|
693 |
+
INFO (SRT )
|
694 |
+
53.29
|
695 |
+
31.46
|
696 |
+
58.26
|
697 |
+
42.35
|
698 |
+
53.06
|
699 |
+
92.29
|
700 |
+
80.87
|
701 |
+
99.22
|
702 |
+
Table 2: Main results on the official validation set. SRS denotes our method with RAG-Sequence architecture and
|
703 |
+
SRT indicates the model with RAG-Token model as generator. The models are evaluated by generation metrics,
|
704 |
+
including chrF++, BLEU, ROUGE-1 (R-1), ROUGE-2 (R-2), ROUGE-L (R-L), and BERTScore.
|
705 |
+
We control the proportion of each task and we
|
706 |
+
set λKG, λPG, and λS as 1:1:5 for the experiments,
|
707 |
+
respectively. We find the value of each λ with
|
708 |
+
manual search.
|
709 |
+
4
|
710 |
+
Experiments
|
711 |
+
4.1
|
712 |
+
Experiment Details
|
713 |
+
Dataset
|
714 |
+
FoCus (Jang et al., 2022) is the dataset
|
715 |
+
for customized dialogue benchmark, where each
|
716 |
+
conversation is directly grounded with knowledge
|
717 |
+
and persona. The dataset includes knowledge-
|
718 |
+
aware dialogue with personal profiles between
|
719 |
+
humans and machines. There are 12,484 dialogues
|
720 |
+
about 5,152 knowledge sources from Wikipedia
|
721 |
+
and 32,855 persona sentences. To validate the
|
722 |
+
knowledge grounding capability and customized
|
723 |
+
dialogue generation, we evaluate our method
|
724 |
+
with the official FoCus validation set for the
|
725 |
+
effectiveness of experiments since the result from
|
726 |
+
the official test set can be tested only through the
|
727 |
+
leaderboard*.
|
728 |
+
Experimental Setup
|
729 |
+
For each candidate scoring
|
730 |
+
module, we implement poly-encoder (Humeau
|
731 |
+
et al., 2019) with BERTlarge, and the number of
|
732 |
+
context codes is 16. For the dialogue generation, we
|
733 |
+
implement our method with Hugging Face (Wolf
|
734 |
+
et al., 2020) and use facebook/rag-token-nq as
|
735 |
+
the backbone model. We use the same architecture
|
736 |
+
of retriever and generator from RAG along
|
737 |
+
with the decoding and leverage our knowledge
|
738 |
+
index for non-parametric query-document ranking
|
739 |
+
with FAISS library (Johnson et al., 2019). The
|
740 |
+
knowledge index consists of the paragraphs from
|
741 |
+
the given Wikipedia knowledge entitled with the
|
742 |
+
name of the given landmark. We set learning rate
|
743 |
+
as 6.25e-6 with AdamW (Kingma and Ba, 2014)
|
744 |
+
*https://codalab.lisn.upsaclay.fr/competitions/3754
|
745 |
+
for the optimization. The batch size is set as 32,
|
746 |
+
and the number of dialogue history is 1. The whole
|
747 |
+
model was trained for three epochs on RTX A6000
|
748 |
+
GPU and took 8 hours per one epoch.
|
749 |
+
Baselines
|
750 |
+
We implement the baselines from
|
751 |
+
previous study (Jang et al., 2022) and we conduct
|
752 |
+
experiments with GPT-2 (Radford et al., 2019) and
|
753 |
+
BART (Lewis et al., 2020a) as well. For a fair
|
754 |
+
comparison, we demonstrate the results on GPT-
|
755 |
+
2small, which has 12 layers, and BARTbase, which
|
756 |
+
has 6 encoders and 6 decoder layers. Also, GPT-
|
757 |
+
2medium contains 24 layers of the decoder, and
|
758 |
+
BARTlarge possesses 12 layers for each encoder
|
759 |
+
and decoder.
|
760 |
+
4.2
|
761 |
+
Automatic Evaluation
|
762 |
+
We show the main results on the FoCus dataset
|
763 |
+
with automatic metrics in grounding and generation
|
764 |
+
tasks. The official metrics for the benchmark are
|
765 |
+
chrF++ (Popovi´c, 2017), BLEU (Papineni et al.,
|
766 |
+
2002), ROUGE-1, ROUGE-2, and ROUGE-L (Lin,
|
767 |
+
2004). To consider the semantic similarity score
|
768 |
+
for each token between candidate and reference
|
769 |
+
sentences using contextual representation, we
|
770 |
+
additionally adopt BERTscore (Zhang* et al.,
|
771 |
+
2020). For grounding task, we used accuracy for
|
772 |
+
both knowledge and persona grounding, and F1
|
773 |
+
score for the persona grounding.
|
774 |
+
In Table 2, it is found that our method shows
|
775 |
+
substantial improvements in all the metrics from
|
776 |
+
generation to grounding compared to the baselines.
|
777 |
+
Especially, the performances of INFO increase
|
778 |
+
over 18% at least regarding the generation metrics
|
779 |
+
except for BERTScore. Furthermore, our model
|
780 |
+
achieves remarkable success in persona and
|
781 |
+
knowledge accuracy. Unlike the performance in
|
782 |
+
other generation metrics, SRS demonstrates better
|
783 |
+
persona accuracy than SRT . This result might be
|
784 |
+
|
785 |
+
Model
|
786 |
+
Generation
|
787 |
+
Grounding
|
788 |
+
chrF++
|
789 |
+
BLEU
|
790 |
+
R-1
|
791 |
+
R-2
|
792 |
+
R-L
|
793 |
+
BERTScore
|
794 |
+
Persona
|
795 |
+
(Acc.)
|
796 |
+
Persona
|
797 |
+
(F1)
|
798 |
+
Knowledge
|
799 |
+
(Acc.)
|
800 |
+
SRT
|
801 |
+
Bi-encoder
|
802 |
+
51.83
|
803 |
+
29.51
|
804 |
+
56.35
|
805 |
+
40.80
|
806 |
+
51.37
|
807 |
+
91.86
|
808 |
+
88.10
|
809 |
+
38.20
|
810 |
+
99.18
|
811 |
+
Cross-encoder
|
812 |
+
49.90
|
813 |
+
27.18
|
814 |
+
53.57
|
815 |
+
38.25
|
816 |
+
49.29
|
817 |
+
91.52
|
818 |
+
87.09
|
819 |
+
35.32
|
820 |
+
99.49
|
821 |
+
Poly-encoder
|
822 |
+
53.29
|
823 |
+
31.46
|
824 |
+
58.26
|
825 |
+
42.35
|
826 |
+
53.06
|
827 |
+
92.29
|
828 |
+
80.87
|
829 |
+
39.56
|
830 |
+
99.22
|
831 |
+
Table 3: Performances comparison between the encoding modules for grounding tasks
|
832 |
+
attributed to the architecture of the generator, which
|
833 |
+
is more applicable to sentence classification tasks
|
834 |
+
such as persona grounding. The official test result is
|
835 |
+
also demonstrated in Appendix A, but BERTscore
|
836 |
+
is missing due to the unreleased ground truth.
|
837 |
+
4.3
|
838 |
+
Human Evaluation
|
839 |
+
We conduct a human evaluation to validate
|
840 |
+
the responses from our model through Amazon
|
841 |
+
Mturk services†. The assessment criteria are
|
842 |
+
fluency, adequacy, provenance, engagingness, and
|
843 |
+
hallucination. In specific, provenance is the level of
|
844 |
+
utilization of the ground truth knowledge into the
|
845 |
+
responses, whereas engagingness means how much
|
846 |
+
the answers are persona-related. Also, hallucination
|
847 |
+
indicates whether the answer contradicts the
|
848 |
+
persona and knowledge or cannot be verified
|
849 |
+
from the source content. We randomly chose 50
|
850 |
+
dialogues from the official test set, and three
|
851 |
+
workers were allocated to evaluate each dialogue
|
852 |
+
generated by our model and baselines. We asked
|
853 |
+
the workers to rank the answers according to each
|
854 |
+
criterion following Cho and May (2020). Rank is
|
855 |
+
scaled from 1 to 5, and the lower number is mapped
|
856 |
+
to the better quality except for hallucination. The
|
857 |
+
agreement between the annotators is calculated
|
858 |
+
with Fleiss’ Kappa coefficient and is 0.4185
|
859 |
+
indicating fair agreement. The relations between
|
860 |
+
the annotators hardly exist since we collect the
|
861 |
+
results from the Amazon Mturk workers.
|
862 |
+
As in Table 4, INFO surpasses BARTbase,
|
863 |
+
BARTlarge, GPT-2small and GPT-2medium in all
|
864 |
+
of the criteria. INFO achieves the highest rank in
|
865 |
+
adequacy, fluency, and provenance and generates
|
866 |
+
a more human-like response than other generative
|
867 |
+
models. Also, the workers ranked our model the
|
868 |
+
lowest when they were asked to rank the responses
|
869 |
+
in the most hallucinated order. Thus, it can be found
|
870 |
+
that INFO generates more engaging and fewer
|
871 |
+
hallucination utterances with respect to the human.
|
872 |
+
The distribution of the rank per each criterion is
|
873 |
+
illustrated in Appendix B.
|
874 |
+
†https://www.mturk.com/
|
875 |
+
Models
|
876 |
+
Avg. Rank
|
877 |
+
Ad. ↓
|
878 |
+
Fl. ↓
|
879 |
+
Prov. ↓
|
880 |
+
Eng. ↓
|
881 |
+
Hall. ↑
|
882 |
+
GPT-2small
|
883 |
+
3.57
|
884 |
+
3.41
|
885 |
+
3.58
|
886 |
+
3.46
|
887 |
+
2.49
|
888 |
+
GPT-2medium
|
889 |
+
3.11
|
890 |
+
3.10
|
891 |
+
3.04
|
892 |
+
3.25
|
893 |
+
3.02
|
894 |
+
BARTbase
|
895 |
+
3.43
|
896 |
+
3.29
|
897 |
+
3.47
|
898 |
+
3.22
|
899 |
+
2.45
|
900 |
+
BARTlarge
|
901 |
+
3.31
|
902 |
+
3.63
|
903 |
+
3.29
|
904 |
+
3.44
|
905 |
+
2.69
|
906 |
+
INFO (Ours)
|
907 |
+
1.57
|
908 |
+
1.57
|
909 |
+
1.62
|
910 |
+
1.63
|
911 |
+
4.35
|
912 |
+
Table 4: Human evaluation. The value in the table
|
913 |
+
is the average rank of the each model’s response.
|
914 |
+
The
|
915 |
+
abbreviation
|
916 |
+
Ad.
|
917 |
+
Fl.
|
918 |
+
Prov.
|
919 |
+
Eng.
|
920 |
+
and
|
921 |
+
Hall
|
922 |
+
denote adequacy, fluency, provenance, engaginess, and
|
923 |
+
hallucination, respectively.
|
924 |
+
5
|
925 |
+
Results and Analysis
|
926 |
+
5.1
|
927 |
+
Variants on Candidate Scoring Module
|
928 |
+
To validate the poly-encoder as a candidate
|
929 |
+
scoring module, we apply diverse candidate scoring
|
930 |
+
modules, including the bi-encoder and cross-
|
931 |
+
encoder. From the results in Table 3, we can find
|
932 |
+
that the poly-encoder outperforms in the generation
|
933 |
+
task. In the grounding task, SRT with cross-encoder
|
934 |
+
scoring shows improved accuracy on grounding
|
935 |
+
persona and knowledge. The result seems to be
|
936 |
+
SRT with bi-encoder and cross-encoder are better
|
937 |
+
than that with poly-encoder. However, the F1
|
938 |
+
score of INFO is higher than the two candidate
|
939 |
+
scoring modules implying that low accuracy in
|
940 |
+
persona is due to the tendency of active use on the
|
941 |
+
persona in poly-encoder while the other two models
|
942 |
+
opt to predict not to use persona sentence. The
|
943 |
+
results suggest that the high accuracy of persona
|
944 |
+
not always guarantees the engagingness in the
|
945 |
+
dialogue.
|
946 |
+
5.2
|
947 |
+
Comparison on other Retrievers
|
948 |
+
We show that INFO is effective in retrieving
|
949 |
+
knowledge compared to other sparse and dense
|
950 |
+
retrievers. We retrieve the knowledge from our
|
951 |
+
knowledge index built with Wikipedia paragraphs.
|
952 |
+
We utilize TF-IDF (Joachims, 1996), and deep
|
953 |
+
passage retrieval (DPR) (Karpukhin et al., 2020).
|
954 |
+
In the case of TF-IDF, we set the sum of query
|
955 |
+
|
956 |
+
and knowledge tokens less than or equal to
|
957 |
+
512, which is the maximum sequence length of
|
958 |
+
DPR and INFO. We use bert-base-uncased
|
959 |
+
as the tokenizer. For DPR, we extract less than
|
960 |
+
40 knowledge using TF-IDF due to memory
|
961 |
+
limitations. We first retrieve the five paragraphs
|
962 |
+
related to the query that comprises knowledge
|
963 |
+
snippet, dialogue history, predicted knowledge
|
964 |
+
candidate, and selected persona sentences. In Table
|
965 |
+
5, we find that the retriever we used outperforms
|
966 |
+
compared to the TF-IDF and DPR in all the
|
967 |
+
metrics, including BERTscore. The results imply
|
968 |
+
that INFO’s retriever is suitable for extracting
|
969 |
+
similar paragraphs rather than other retrievers.
|
970 |
+
Model
|
971 |
+
chrF++
|
972 |
+
BLEU
|
973 |
+
R-1
|
974 |
+
R-2
|
975 |
+
R-L
|
976 |
+
BERTScore
|
977 |
+
TF-IDF
|
978 |
+
19.91
|
979 |
+
3.52
|
980 |
+
13.91
|
981 |
+
9.96
|
982 |
+
12.43
|
983 |
+
51.54
|
984 |
+
DPR
|
985 |
+
20.57
|
986 |
+
3.86
|
987 |
+
12.44
|
988 |
+
6.55
|
989 |
+
10.20
|
990 |
+
47.48
|
991 |
+
INFO
|
992 |
+
26.36
|
993 |
+
7.40
|
994 |
+
15.48
|
995 |
+
12.18
|
996 |
+
14.32
|
997 |
+
53.14
|
998 |
+
Table 5: Comparison with other retrievers
|
999 |
+
5.3
|
1000 |
+
Effect of Selectors on Generation
|
1001 |
+
We measure each selector module’s effect on
|
1002 |
+
the generation task by changing the query which
|
1003 |
+
feds into the retriever on a validation set. The
|
1004 |
+
experimental results are shown in Table 6, where
|
1005 |
+
GTK, GTP represents ground truth knowledge and
|
1006 |
+
persona. Although the query that comprises the
|
1007 |
+
ground truth source shows the highest scores, INFO
|
1008 |
+
demonstrates comparable results on the generation
|
1009 |
+
task. From the result where the performance
|
1010 |
+
increase of INFO + GTP is larger than that of
|
1011 |
+
INFO + GTK about 2.8%p, we can identify that
|
1012 |
+
our persona selector still has more space to achieve
|
1013 |
+
its maximum level.
|
1014 |
+
Query
|
1015 |
+
chrF++
|
1016 |
+
BLEU
|
1017 |
+
R-1
|
1018 |
+
R-2
|
1019 |
+
R-L
|
1020 |
+
BERTScore
|
1021 |
+
INFO (RT)
|
1022 |
+
53.29
|
1023 |
+
31.46
|
1024 |
+
58.26
|
1025 |
+
42.35
|
1026 |
+
53.06
|
1027 |
+
92.29
|
1028 |
+
+GTK
|
1029 |
+
53.35
|
1030 |
+
31.56
|
1031 |
+
58.31
|
1032 |
+
42.55
|
1033 |
+
53.18
|
1034 |
+
92.29
|
1035 |
+
+GTP
|
1036 |
+
56.19
|
1037 |
+
34.39
|
1038 |
+
61.61
|
1039 |
+
45.46
|
1040 |
+
56.01
|
1041 |
+
92.79
|
1042 |
+
+GTK+GTP
|
1043 |
+
56.40
|
1044 |
+
34.60
|
1045 |
+
61.88
|
1046 |
+
45.64
|
1047 |
+
56.16
|
1048 |
+
92.84
|
1049 |
+
Table
|
1050 |
+
6:
|
1051 |
+
Comparison
|
1052 |
+
between
|
1053 |
+
the
|
1054 |
+
generation
|
1055 |
+
performances based on the variants of query with
|
1056 |
+
ground truth knowledge and persona. Note that all the
|
1057 |
+
performance is evaluated with the official validation
|
1058 |
+
set.
|
1059 |
+
5.4
|
1060 |
+
Qualitative Analysis
|
1061 |
+
In Table 7, an example from the predicted results
|
1062 |
+
is illustrated. In the case of BARTlarge, and GPT-
|
1063 |
+
2medium, the responses only reflect the ground
|
1064 |
+
Given Landmark
|
1065 |
+
Finding Nemo Submarine Voyage
|
1066 |
+
Dialogue
|
1067 |
+
Human: What area of the park is this ride in?
|
1068 |
+
Machine: This ride is located in the Tomorrowland area of Disneyland.
|
1069 |
+
Human: Has this ride always been about Finding Nemo?
|
1070 |
+
Human’s Persona
|
1071 |
+
I’ve never been to California.
|
1072 |
+
My favorite cartoon is Finding Nemo.
|
1073 |
+
I would like to visit Disneyland.
|
1074 |
+
My favorite color is yellow.
|
1075 |
+
I enjoy swimming.
|
1076 |
+
Ground Truth Knowledge (Grounding)
|
1077 |
+
Based on the characters and settings of the 2003 Disney · Pixar, Finding
|
1078 |
+
Nemo, it is a re-theming of the classic Submarine Voyage attraction that
|
1079 |
+
operated from 1959 to 1998.
|
1080 |
+
Retrieved Knowledge (Generation)
|
1081 |
+
The original Submarine Voyage was built in 1959 as part of the then new
|
1082 |
+
Tomorrowland...
|
1083 |
+
In 2008, Finding Nemo Submarine Voyage received an award for
|
1084 |
+
outstanding achievement from the Themed Entertainment Association.
|
1085 |
+
Finding Nemo Submarine Voyage is ... which opened on June 11, 2007. ...
|
1086 |
+
it is a re-theming of the classic Submarine Voyage attraction that operated
|
1087 |
+
from 1959 to 1998.
|
1088 |
+
On July 15, 2005, two days before the 50th Anniversary of Disneyland,
|
1089 |
+
the Finding Nemo Submarine Voyage was officially announced at the
|
1090 |
+
new Turtle Talk...
|
1091 |
+
The attraction reuses the eight original 1959 Submarine Voyage through
|
1092 |
+
Liquid Space attraction...
|
1093 |
+
Predicted Answers
|
1094 |
+
BARTbase
|
1095 |
+
Yes, that’s right. You’re a fan of the “Fantasy” film,
|
1096 |
+
so I.
|
1097 |
+
BARTlarge
|
1098 |
+
Yes, the ride is based on the characters and settings
|
1099 |
+
of the 2003 Disney · Pixar film
|
1100 |
+
GPT-2small
|
1101 |
+
No, it was originally a way to show that you love
|
1102 |
+
Finding Nemo.
|
1103 |
+
GPT-2medium
|
1104 |
+
Yes, it has operated from 1959 to 1998.
|
1105 |
+
INFO (Ours)
|
1106 |
+
No, this attraction is actually a re-theme of the
|
1107 |
+
classic submarine voyage attraction that operated
|
1108 |
+
from 1959 to 1998. The attraction is based on the
|
1109 |
+
characters and settings of the 2003 Disney Pixar
|
1110 |
+
film Finding Nemo, which is your favorite cartoon.
|
1111 |
+
Ground Truth Response
|
1112 |
+
No, your favorite cartoon is a new addition to this ride. The current
|
1113 |
+
Finding Nemo ride is a re-theming of the classic “Submarine Voyage”
|
1114 |
+
attraction that operated here from 1959 to 1998.
|
1115 |
+
Table 7: Qualitative result. All the predicted results
|
1116 |
+
in grounding task are from our model, INFO and it
|
1117 |
+
predicts the correct answers in both tasks. We add other
|
1118 |
+
baselines’ responses for comparative analysis.
|
1119 |
+
truth knowledge resulting in less engaged answers
|
1120 |
+
without any persona-related phrases. Although
|
1121 |
+
BARTbase seems to employ a persona sentence in
|
1122 |
+
the form of the phrase “You’re fan of the Fantasy
|
1123 |
+
film”, its used sentence does not appear in human’s
|
1124 |
+
personal profiles. This result also indicates that
|
1125 |
+
the utterance is hard to identify its provenance
|
1126 |
+
on the knowledge source. Moreover, GPT-2small
|
1127 |
+
generates the utterance that contradicts the ground
|
1128 |
+
truth knowledge. From the result, we can find that
|
1129 |
+
the generated responses from the baselines show
|
1130 |
+
hallucinations on both persona and knowledge.
|
1131 |
+
Unlike other baselines, our model blends ground
|
1132 |
+
truth knowledge and persona sentence into the
|
1133 |
+
|
1134 |
+
response with less hallucination and engagingness.
|
1135 |
+
In addition, the retrieved knowledge source that
|
1136 |
+
our model refers to provides interpretability and
|
1137 |
+
provenance of the responses to the users. More
|
1138 |
+
examples are also depicted in Appendix C.
|
1139 |
+
6
|
1140 |
+
Conclusions
|
1141 |
+
In this paper, we presented a conversational
|
1142 |
+
agent that generates responses grounding the
|
1143 |
+
user’s persona and external knowledge. We
|
1144 |
+
utilized poly-encoder-based candidate scoring
|
1145 |
+
for
|
1146 |
+
each
|
1147 |
+
grounding
|
1148 |
+
task.
|
1149 |
+
We
|
1150 |
+
additionally
|
1151 |
+
implement persona level indicator to consider
|
1152 |
+
multiple persona selections for delicate persona
|
1153 |
+
grounding. With predicted sources, we construct
|
1154 |
+
a
|
1155 |
+
knowledge-persona
|
1156 |
+
enhanced
|
1157 |
+
query
|
1158 |
+
to
|
1159 |
+
retrieve latent paragraphs, and they are used
|
1160 |
+
to generate informative and engaging responses by
|
1161 |
+
marginalizing loss for each token. We show that
|
1162 |
+
our method achieves the state-of-the-art (SoTA)
|
1163 |
+
score in both grounding and generation tasks in the
|
1164 |
+
persona-knowledge conversation dataset. We also
|
1165 |
+
demonstrate that the responses from INFO show
|
1166 |
+
less hallucination and more engagingness through
|
1167 |
+
human evaluation and qualitative analysis. We also
|
1168 |
+
compare the grounding modules and retrievers to
|
1169 |
+
show INFO’s effectiveness.
|
1170 |
+
7
|
1171 |
+
Limitations
|
1172 |
+
The proposed model INFO has limitations. Given
|
1173 |
+
the INFO’s settings, the model cannot deal with
|
1174 |
+
real-world application, which means the absence
|
1175 |
+
of ground truth knowledge or persona candidates
|
1176 |
+
in the grounding task. We also conducted the
|
1177 |
+
human evaluation to evaluate the capability of
|
1178 |
+
the proposed model’s mitigating hallucination
|
1179 |
+
in dialogue generation. However, the number
|
1180 |
+
of cases is relatively small for evaluating the
|
1181 |
+
capability of mitigating hallucination. Finally,
|
1182 |
+
INFO demands high GPU computation resources,
|
1183 |
+
since it marginalizes loss at the token level.
|
1184 |
+
We plan to improve the INFO for future work.
|
1185 |
+
We will train and evaluate the INFO in open-
|
1186 |
+
domain settings as well as real-world settings for
|
1187 |
+
the applicable conversational agents. Moreover, we
|
1188 |
+
will conduct human evaluations with more cases.
|
1189 |
+
Especially, we will enhance the way of quantitative
|
1190 |
+
measurement for the model’s hallucinated answers.
|
1191 |
+
Last but not least, we will improve the generator
|
1192 |
+
of INFO with more computationally efficient
|
1193 |
+
components.
|
1194 |
+
8
|
1195 |
+
Acknowledgement
|
1196 |
+
This
|
1197 |
+
work
|
1198 |
+
was
|
1199 |
+
supported
|
1200 |
+
by
|
1201 |
+
Institute
|
1202 |
+
of
|
1203 |
+
Information
|
1204 |
+
&
|
1205 |
+
communications
|
1206 |
+
Technology
|
1207 |
+
Planning & Evaluation(IITP) grant funded by the
|
1208 |
+
Korea government(MSIT) (No. 2020-0-00368,
|
1209 |
+
A
|
1210 |
+
Neural-Symbolic
|
1211 |
+
Model
|
1212 |
+
for
|
1213 |
+
Knowledge
|
1214 |
+
Acquisition and Inference Techniques), This
|
1215 |
+
research was supported by the MSIT(Ministry
|
1216 |
+
of
|
1217 |
+
Science
|
1218 |
+
and
|
1219 |
+
ICT),
|
1220 |
+
Korea,
|
1221 |
+
under
|
1222 |
+
the
|
1223 |
+
ITRC(Information Technology Research Center)
|
1224 |
+
support
|
1225 |
+
program(IITP-2022-2018-0-01405)
|
1226 |
+
supervised by the IITP(Institute for Information
|
1227 |
+
& Communications Technology Planning &
|
1228 |
+
Evaluation), This work was supported by Institute
|
1229 |
+
for Information & communications Technology
|
1230 |
+
Planning & Evaluation(IITP) grant funded by the
|
1231 |
+
Korea government(MSIT) (No. 2022-0-00369,
|
1232 |
+
(Part 4) Development of AI Technology to support
|
1233 |
+
Expert Decision-making that can Explain the
|
1234 |
+
Reasons/Grounds for Judgment Results based on
|
1235 |
+
Expert Knowledge)
|
1236 |
+
References
|
1237 |
+
Glenn W Brier et al. 1950. Verification of forecasts
|
1238 |
+
expressed in terms of probability. Monthly weather
|
1239 |
+
review, 78(1):1–3.
|
1240 |
+
Hyundong Cho and Jonathan May. 2020. Grounding
|
1241 |
+
conversations with improvised dialogues.
|
1242 |
+
In
|
1243 |
+
Proceedings of the 58th Annual Meeting of the
|
1244 |
+
Association for Computational Linguistics, pages
|
1245 |
+
2398–2413, Online. Association for Computational
|
1246 |
+
Linguistics.
|
1247 |
+
Emily Dinan, Stephen Roller, Kurt Shuster, Angela
|
1248 |
+
Fan, Michael Auli, and Jason Weston. 2018. Wizard
|
1249 |
+
of wikipedia: Knowledge-powered conversational
|
1250 |
+
agents.
|
1251 |
+
In International Conference on Learning
|
1252 |
+
Representations.
|
1253 |
+
Jianfeng Gao, Michel Galley, and Lihong Li. 2018.
|
1254 |
+
Neural approaches to conversational ai. ACL 2018,
|
1255 |
+
page 2.
|
1256 |
+
Marjan Ghazvininejad, Chris Brockett, Ming-Wei
|
1257 |
+
Chang, Bill Dolan, Jianfeng Gao, Wen-tau Yih,
|
1258 |
+
and Michel Galley. 2018. A knowledge-grounded
|
1259 |
+
neural conversation model. In Thirty-Second AAAI
|
1260 |
+
Conference on Artificial Intelligence.
|
1261 |
+
Samuel Humeau, Kurt Shuster, Marie-Anne Lachaux,
|
1262 |
+
and
|
1263 |
+
Jason
|
1264 |
+
Weston.
|
1265 |
+
2019.
|
1266 |
+
Poly-encoders:
|
1267 |
+
Architectures and pre-training strategies for fast and
|
1268 |
+
accurate multi-sentence scoring.
|
1269 |
+
In International
|
1270 |
+
Conference on Learning Representations.
|
1271 |
+
Yoonna Jang, Jungwoo Lim, Yuna Hur, Dongsuk
|
1272 |
+
Oh, Suhyune Son, Yeonsoo Lee, Donghoon Shin,
|
1273 |
+
|
1274 |
+
Seungryong Kim, and Heuiseok Lim. 2022. Call for
|
1275 |
+
customized conversation: Customized conversation
|
1276 |
+
grounding persona and knowledge. In Proceedings
|
1277 |
+
of the AAAI Conference on Artificial Intelligence,
|
1278 |
+
volume 36, pages 10803–10812.
|
1279 |
+
Ziwei Ji, Nayeon Lee, Rita Frieske, Tiezheng Yu,
|
1280 |
+
Dan Su, Yan Xu, Etsuko Ishii, Yejin Bang, Andrea
|
1281 |
+
Madotto, and Pascale Fung. 2022.
|
1282 |
+
Survey of
|
1283 |
+
hallucination in natural language generation. arXiv
|
1284 |
+
preprint arXiv:2202.03629.
|
1285 |
+
Thorsten Joachims. 1996.
|
1286 |
+
A probabilistic analysis
|
1287 |
+
of
|
1288 |
+
the
|
1289 |
+
rocchio
|
1290 |
+
algorithm
|
1291 |
+
with
|
1292 |
+
tfidf
|
1293 |
+
for
|
1294 |
+
text
|
1295 |
+
categorization.
|
1296 |
+
Technical report, Carnegie-mellon
|
1297 |
+
univ pittsburgh pa dept of computer science.
|
1298 |
+
Jeff Johnson, Matthijs Douze, and Hervé Jégou. 2019.
|
1299 |
+
Billion-scale similarity search with GPUs.
|
1300 |
+
IEEE
|
1301 |
+
Transactions on Big Data, 7(3):535–547.
|
1302 |
+
Vladimir Karpukhin, Barlas Oguz, Sewon Min, Patrick
|
1303 |
+
Lewis, Ledell Wu, Sergey Edunov, Danqi Chen, and
|
1304 |
+
Wen-tau Yih. 2020.
|
1305 |
+
Dense passage retrieval for
|
1306 |
+
open-domain question answering.
|
1307 |
+
In Proceedings
|
1308 |
+
of the 2020 Conference on Empirical Methods
|
1309 |
+
in Natural Language Processing (EMNLP), pages
|
1310 |
+
6769–6781.
|
1311 |
+
Diederik P Kingma and Jimmy Ba. 2014. Adam: A
|
1312 |
+
method for stochastic optimization. arXiv preprint
|
1313 |
+
arXiv:1412.6980.
|
1314 |
+
Tom
|
1315 |
+
Kwiatkowski,
|
1316 |
+
Jennimaria
|
1317 |
+
Palomaki,
|
1318 |
+
Olivia
|
1319 |
+
Redfield, Michael Collins, Ankur Parikh, Chris
|
1320 |
+
Alberti, Danielle Epstein, Illia Polosukhin, Jacob
|
1321 |
+
Devlin, Kenton Lee, et al. 2019. Natural questions:
|
1322 |
+
A benchmark for question answering research.
|
1323 |
+
Transactions of the Association for Computational
|
1324 |
+
Linguistics, 7:452–466.
|
1325 |
+
Mike Lewis, Yinhan Liu, Naman Goyal, Marjan
|
1326 |
+
Ghazvininejad,
|
1327 |
+
Abdelrahman
|
1328 |
+
Mohamed,
|
1329 |
+
Omer
|
1330 |
+
Levy, Veselin Stoyanov, and Luke Zettlemoyer.
|
1331 |
+
2020a.
|
1332 |
+
Bart: Denoising sequence-to-sequence
|
1333 |
+
pre-training
|
1334 |
+
for
|
1335 |
+
natural
|
1336 |
+
language
|
1337 |
+
generation,
|
1338 |
+
translation, and comprehension.
|
1339 |
+
In Proceedings
|
1340 |
+
of the 58th Annual Meeting of the Association for
|
1341 |
+
Computational Linguistics, pages 7871–7880.
|
1342 |
+
Patrick
|
1343 |
+
Lewis,
|
1344 |
+
Ethan
|
1345 |
+
Perez,
|
1346 |
+
Aleksandra
|
1347 |
+
Piktus,
|
1348 |
+
Fabio Petroni, Vladimir Karpukhin, Naman Goyal,
|
1349 |
+
Heinrich Küttler, Mike Lewis, Wen-tau Yih, Tim
|
1350 |
+
Rocktäschel, et al. 2020b.
|
1351 |
+
Retrieval-augmented
|
1352 |
+
generation
|
1353 |
+
for
|
1354 |
+
knowledge-intensive
|
1355 |
+
nlp
|
1356 |
+
tasks.
|
1357 |
+
Advances
|
1358 |
+
in
|
1359 |
+
Neural
|
1360 |
+
Information
|
1361 |
+
Processing
|
1362 |
+
Systems, 33:9459–9474.
|
1363 |
+
Jiwei Li, Michel Galley, Chris Brockett, Jianfeng
|
1364 |
+
Gao, and William B Dolan. 2016.
|
1365 |
+
A diversity-
|
1366 |
+
promoting objective function for neural conversation
|
1367 |
+
models.
|
1368 |
+
In Proceedings of the 2016 Conference
|
1369 |
+
of the North American Chapter of the Association
|
1370 |
+
for Computational Linguistics: Human Language
|
1371 |
+
Technologies, pages 110–119.
|
1372 |
+
Chin-Yew Lin. 2004.
|
1373 |
+
ROUGE: A package for
|
1374 |
+
automatic evaluation of summaries.
|
1375 |
+
In Text
|
1376 |
+
Summarization
|
1377 |
+
Branches
|
1378 |
+
Out,
|
1379 |
+
pages
|
1380 |
+
74–81,
|
1381 |
+
Barcelona, Spain. Association for Computational
|
1382 |
+
Linguistics.
|
1383 |
+
Qian Liu, Yihong Chen, Bei Chen, Jian-Guang Lou,
|
1384 |
+
Zixuan Chen, Bin Zhou, and Dongmei Zhang.
|
1385 |
+
2020.
|
1386 |
+
You impress me: Dialogue generation
|
1387 |
+
via mutual persona perception.
|
1388 |
+
In Proceedings
|
1389 |
+
of the 58th Annual Meeting of the Association
|
1390 |
+
for Computational Linguistics. Association for
|
1391 |
+
Computational Linguistics.
|
1392 |
+
Ryan Lowe, Nissan Pow, Iulian Vlad Serban, and
|
1393 |
+
Joelle Pineau. 2015. The ubuntu dialogue corpus:
|
1394 |
+
A large dataset for research in unstructured multi-
|
1395 |
+
turn dialogue systems. In Proceedings of the 16th
|
1396 |
+
Annual Meeting of the Special Interest Group on
|
1397 |
+
Discourse and Dialogue, pages 285–294.
|
1398 |
+
Gary Marcus. 2020. The next decade in ai: four steps
|
1399 |
+
towards robust artificial intelligence. arXiv preprint
|
1400 |
+
arXiv:2002.06177.
|
1401 |
+
Pierre-Emmanuel Mazare, Samuel Humeau, Martin
|
1402 |
+
Raison, and Antoine Bordes. 2018.
|
1403 |
+
Training
|
1404 |
+
millions of personalized dialogue agents.
|
1405 |
+
In
|
1406 |
+
Proceedings of the 2018 Conference on Empirical
|
1407 |
+
Methods in Natural Language Processing, pages
|
1408 |
+
2775–2779.
|
1409 |
+
Kishore Papineni, Salim Roukos, Todd Ward, and Wei
|
1410 |
+
jing Zhu. 2002.
|
1411 |
+
Bleu: a method for automatic
|
1412 |
+
evaluation of machine translation. pages 311–318.
|
1413 |
+
Ashwin Paranjape, Omar Khattab, Christopher Potts,
|
1414 |
+
Matei Zaharia, and Christopher D Manning. 2021.
|
1415 |
+
Hindsight: Posterior-guided training of retrievers for
|
1416 |
+
improved open-ended generation. In International
|
1417 |
+
Conference on Learning Representations.
|
1418 |
+
Fabio Petroni, Patrick Lewis, Aleksandra Piktus, Tim
|
1419 |
+
Rocktäschel, Yuxiang Wu, Alexander H Miller,
|
1420 |
+
and Sebastian Riedel. 2020.
|
1421 |
+
How context affects
|
1422 |
+
language models’ factual predictions. In Automated
|
1423 |
+
Knowledge Base Construction.
|
1424 |
+
Maja
|
1425 |
+
Popovi´c.
|
1426 |
+
2017.
|
1427 |
+
chrF++:
|
1428 |
+
words
|
1429 |
+
helping
|
1430 |
+
character
|
1431 |
+
n-grams.
|
1432 |
+
In
|
1433 |
+
Proceedings
|
1434 |
+
of
|
1435 |
+
the
|
1436 |
+
Second Conference on Machine Translation, pages
|
1437 |
+
612–618, Copenhagen, Denmark. Association for
|
1438 |
+
Computational Linguistics.
|
1439 |
+
Alec Radford, Jeffrey Wu, Rewon Child, David Luan,
|
1440 |
+
Dario Amodei, Ilya Sutskever, et al. 2019. Language
|
1441 |
+
models are unsupervised multitask learners. OpenAI
|
1442 |
+
blog, 1(8):9.
|
1443 |
+
Colin Raffel, Noam Shazeer, Adam Roberts, Katherine
|
1444 |
+
Lee, Sharan Narang, Michael Matena, Yanqi Zhou,
|
1445 |
+
Wei Li, and Peter J Liu. 2020.
|
1446 |
+
Exploring the
|
1447 |
+
limits of transfer learning with a unified text-to-text
|
1448 |
+
transformer. Journal of Machine Learning Research,
|
1449 |
+
21:1–67.
|
1450 |
+
|
1451 |
+
Adam Roberts, Colin Raffel, and Noam Shazeer. 2020.
|
1452 |
+
How much knowledge can you pack into the
|
1453 |
+
parameters of a language model?
|
1454 |
+
In Proceedings
|
1455 |
+
of the 2020 Conference on Empirical Methods
|
1456 |
+
in Natural Language Processing (EMNLP), pages
|
1457 |
+
5418–5426.
|
1458 |
+
Abigail See, Stephen Roller, Douwe Kiela, and
|
1459 |
+
Jason Weston. 2019.
|
1460 |
+
What makes a good
|
1461 |
+
conversation? how controllable attributes affect
|
1462 |
+
human judgments.
|
1463 |
+
In Proceedings of the 2019
|
1464 |
+
Conference of the North American Chapter of the
|
1465 |
+
Association for Computational Linguistics: Human
|
1466 |
+
Language Technologies, Volume 1 (Long and Short
|
1467 |
+
Papers), pages 1702–1723.
|
1468 |
+
Kurt Shuster, Spencer Poff, Moya Chen, Douwe Kiela,
|
1469 |
+
and Jason Weston. 2021.
|
1470 |
+
Retrieval augmentation
|
1471 |
+
reduces hallucination in conversation. In Findings
|
1472 |
+
of the Association for Computational Linguistics:
|
1473 |
+
EMNLP 2021, pages 3784–3803.
|
1474 |
+
Alessandro Sordoni, Michel Galley, Michael Auli,
|
1475 |
+
Chris Brockett, Yangfeng Ji, Margaret Mitchell,
|
1476 |
+
Jian-Yun
|
1477 |
+
Nie,
|
1478 |
+
Jianfeng
|
1479 |
+
Gao,
|
1480 |
+
and
|
1481 |
+
William
|
1482 |
+
B
|
1483 |
+
Dolan.
|
1484 |
+
2015.
|
1485 |
+
A
|
1486 |
+
neural
|
1487 |
+
network
|
1488 |
+
approach
|
1489 |
+
to context-sensitive generation of conversational
|
1490 |
+
responses. In Proceedings of the 2015 Conference
|
1491 |
+
of the North American Chapter of the Association
|
1492 |
+
for Computational Linguistics: Human Language
|
1493 |
+
Technologies, pages 196–205.
|
1494 |
+
Oriol
|
1495 |
+
Vinyals
|
1496 |
+
and
|
1497 |
+
Quoc
|
1498 |
+
V
|
1499 |
+
Le.
|
1500 |
+
2015.
|
1501 |
+
A
|
1502 |
+
neural conversational model.
|
1503 |
+
arXiv preprint
|
1504 |
+
arXiv:1506.05869.
|
1505 |
+
Thomas Wolf, Lysandre Debut, Victor Sanh, Julien
|
1506 |
+
Chaumond,
|
1507 |
+
Clement
|
1508 |
+
Delangue,
|
1509 |
+
Anthony
|
1510 |
+
Moi,
|
1511 |
+
Pierric Cistac, Tim Rault, Rémi Louf, Morgan
|
1512 |
+
Funtowicz, Joe Davison, Sam Shleifer, Patrick
|
1513 |
+
von Platen, Clara Ma, Yacine Jernite, Julien Plu,
|
1514 |
+
Canwen Xu, Teven Le Scao, Sylvain Gugger,
|
1515 |
+
Mariama Drame, Quentin Lhoest, and Alexander M.
|
1516 |
+
Rush. 2020. Transformers: State-of-the-art natural
|
1517 |
+
language processing.
|
1518 |
+
In Proceedings of the 2020
|
1519 |
+
Conference on Empirical Methods in Natural
|
1520 |
+
Language
|
1521 |
+
Processing:
|
1522 |
+
System
|
1523 |
+
Demonstrations,
|
1524 |
+
pages 38–45, Online. Association for Computational
|
1525 |
+
Linguistics.
|
1526 |
+
Thomas Wolf, Victor Sanh, Julien Chaumond, and
|
1527 |
+
Clement Delangue. 2019.
|
1528 |
+
Transfertransfo: A
|
1529 |
+
transfer learning approach for neural network
|
1530 |
+
based conversational agents.
|
1531 |
+
arXiv preprint
|
1532 |
+
arXiv:1901.08149.
|
1533 |
+
Liu Yang, Minghui Qiu, Chen Qu, Jiafeng Guo,
|
1534 |
+
Yongfeng Zhang, W Bruce Croft, Jun Huang, and
|
1535 |
+
Haiqing Chen. 2018.
|
1536 |
+
Response ranking with
|
1537 |
+
deep matching networks and external knowledge in
|
1538 |
+
information-seeking conversation systems. In The
|
1539 |
+
41st international acm sigir conference on research
|
1540 |
+
& development in information retrieval, pages 245–
|
1541 |
+
254.
|
1542 |
+
Saizheng Zhang, Emily Dinan, Jack Urbanek, Arthur
|
1543 |
+
Szlam, Douwe Kiela, and Jason Weston. 2018a.
|
1544 |
+
Personalizing dialogue agents: I have a dog, do you
|
1545 |
+
have pets too? In Proceedings of the 56th Annual
|
1546 |
+
Meeting of the Association for Computational
|
1547 |
+
Linguistics (Volume 1: Long Papers), pages 2204–
|
1548 |
+
2213.
|
1549 |
+
Tianyi
|
1550 |
+
Zhang*,
|
1551 |
+
Varsha
|
1552 |
+
Kishore*,
|
1553 |
+
Felix
|
1554 |
+
Wu*,
|
1555 |
+
Kilian Q. Weinberger, and Yoav Artzi. 2020.
|
1556 |
+
Bertscore:
|
1557 |
+
Evaluating
|
1558 |
+
text
|
1559 |
+
generation
|
1560 |
+
with
|
1561 |
+
bert.
|
1562 |
+
In International Conference on Learning
|
1563 |
+
Representations.
|
1564 |
+
Zhuosheng Zhang, Jiangtong Li, Pengfei Zhu, Hai
|
1565 |
+
Zhao, and Gongshen Liu. 2018b. Modeling multi-
|
1566 |
+
turn conversation with deep utterance aggregation.
|
1567 |
+
In Proceedings of the 27th International Conference
|
1568 |
+
on Computational Linguistics, pages 3740–3752.
|
1569 |
+
|
1570 |
+
A
|
1571 |
+
Automatic Evaluation on Official Test Set
|
1572 |
+
Models
|
1573 |
+
Generation
|
1574 |
+
Grounding (Acc.)
|
1575 |
+
chrF++
|
1576 |
+
BLEU
|
1577 |
+
R-1
|
1578 |
+
R-2
|
1579 |
+
R-L
|
1580 |
+
Persona
|
1581 |
+
Knowledge
|
1582 |
+
GPT2small
|
1583 |
+
28.83
|
1584 |
+
11.60
|
1585 |
+
36.28
|
1586 |
+
19.56
|
1587 |
+
32.42
|
1588 |
+
67.83
|
1589 |
+
70.95
|
1590 |
+
GPT2medium
|
1591 |
+
30.34
|
1592 |
+
12.58
|
1593 |
+
38.35
|
1594 |
+
21.16
|
1595 |
+
34.34
|
1596 |
+
67.64
|
1597 |
+
72.46
|
1598 |
+
BARTbase
|
1599 |
+
29.80
|
1600 |
+
12.15
|
1601 |
+
36.26
|
1602 |
+
19.73
|
1603 |
+
32.06
|
1604 |
+
67.66
|
1605 |
+
72.02
|
1606 |
+
BARTlarge
|
1607 |
+
30.63
|
1608 |
+
11.86
|
1609 |
+
36.36
|
1610 |
+
19.42
|
1611 |
+
31.73
|
1612 |
+
67.62
|
1613 |
+
70.53
|
1614 |
+
INFO (RS)
|
1615 |
+
52.81
|
1616 |
+
29.41
|
1617 |
+
56.37
|
1618 |
+
40.41
|
1619 |
+
51.16
|
1620 |
+
82.74
|
1621 |
+
98.88
|
1622 |
+
INFO (RT)
|
1623 |
+
54.61
|
1624 |
+
32.33
|
1625 |
+
58.27
|
1626 |
+
42.39
|
1627 |
+
53.09
|
1628 |
+
80.83
|
1629 |
+
99.10
|
1630 |
+
Table 8: Main results on the official test set. RT indicates the model with RAG-Token model as generator. The
|
1631 |
+
models are evaluated by generation metrics, including chrF++, BLEU, ROUGE-1 (R-1), ROUGE-2 (R-2) and
|
1632 |
+
ROUGE-L (R-L). The accuracy for persona grounding task and knowledge grounding task are also noted. Since
|
1633 |
+
BERTscore is not the official generation metric, we cannot evaluate the result on the metric as the ground truth of
|
1634 |
+
the test is not yet disclosed.
|
1635 |
+
B
|
1636 |
+
Human Evaluation Distribution on Each Criteria
|
1637 |
+
(a) Adequacy
|
1638 |
+
(b) Fluency
|
1639 |
+
Figure 2: The distribution of the rank on the adequacy and fluency criteria. Guide A to E indicates INFO, BARTbase,
|
1640 |
+
BARTlarge, GPT-2small, and GPT-2medium, in the order.
|
1641 |
+
|
1642 |
+
Guide A
|
1643 |
+
Guide B
|
1644 |
+
100
|
1645 |
+
Guide C
|
1646 |
+
Guide D
|
1647 |
+
Guide E
|
1648 |
+
80
|
1649 |
+
f evaluation
|
1650 |
+
60
|
1651 |
+
of
|
1652 |
+
40
|
1653 |
+
#
|
1654 |
+
20
|
1655 |
+
0
|
1656 |
+
1
|
1657 |
+
2
|
1658 |
+
3
|
1659 |
+
4
|
1660 |
+
5
|
1661 |
+
RankGuide A
|
1662 |
+
Guide B
|
1663 |
+
100
|
1664 |
+
Guide C
|
1665 |
+
Guide D
|
1666 |
+
Guide E
|
1667 |
+
80
|
1668 |
+
f evaluation
|
1669 |
+
60
|
1670 |
+
JO
|
1671 |
+
40
|
1672 |
+
#
|
1673 |
+
20
|
1674 |
+
0
|
1675 |
+
1
|
1676 |
+
2
|
1677 |
+
3
|
1678 |
+
4
|
1679 |
+
5
|
1680 |
+
Rank(a) Provenance
|
1681 |
+
(b) Engagingness
|
1682 |
+
Figure 3: The distribution of the rank on the provenance and engagingness criteria. Guide A to E indicates INFO,
|
1683 |
+
BARTbase, BARTlarge, GPT-2small, and GPT-2medium, in the order.
|
1684 |
+
Figure 4: The distribution of the rank on the less hallucination criterion. Note that the highest rank (1) means the
|
1685 |
+
most hallucinated. Guide A to E indicates INFO, BARTbase, BARTlarge, GPT-2small, and GPT-2medium, in the
|
1686 |
+
order.
|
1687 |
+
|
1688 |
+
Guide A
|
1689 |
+
Guide B
|
1690 |
+
100
|
1691 |
+
Guide C
|
1692 |
+
Guide D
|
1693 |
+
Guide E
|
1694 |
+
80
|
1695 |
+
f evaluation
|
1696 |
+
60
|
1697 |
+
of
|
1698 |
+
40
|
1699 |
+
#
|
1700 |
+
20
|
1701 |
+
0
|
1702 |
+
1
|
1703 |
+
2
|
1704 |
+
3
|
1705 |
+
4
|
1706 |
+
5
|
1707 |
+
RankGuide A
|
1708 |
+
100
|
1709 |
+
Guide B
|
1710 |
+
Guide C
|
1711 |
+
Guide D
|
1712 |
+
Guide E
|
1713 |
+
80
|
1714 |
+
f evaluation
|
1715 |
+
60
|
1716 |
+
of
|
1717 |
+
40
|
1718 |
+
#
|
1719 |
+
20
|
1720 |
+
0
|
1721 |
+
1
|
1722 |
+
2
|
1723 |
+
3
|
1724 |
+
4
|
1725 |
+
5
|
1726 |
+
RankGuide A
|
1727 |
+
Guide B
|
1728 |
+
100
|
1729 |
+
Guide C
|
1730 |
+
Guide D
|
1731 |
+
Guide E
|
1732 |
+
80
|
1733 |
+
f evaluation
|
1734 |
+
60
|
1735 |
+
of
|
1736 |
+
40
|
1737 |
+
#
|
1738 |
+
20
|
1739 |
+
0
|
1740 |
+
2
|
1741 |
+
3
|
1742 |
+
5
|
1743 |
+
1
|
1744 |
+
4
|
1745 |
+
RankC
|
1746 |
+
Qualitative Results
|
1747 |
+
Given Landmark
|
1748 |
+
Nocton Hall
|
1749 |
+
Dialogue
|
1750 |
+
Human: I know this place, but I don’t remember the name of this place.
|
1751 |
+
Human’s Persona
|
1752 |
+
I have a hall in my house.
|
1753 |
+
I have worked with military hospital.
|
1754 |
+
I would like to go to England.
|
1755 |
+
I have heard about Frederick John Robinson.
|
1756 |
+
I have respect to American Officers.
|
1757 |
+
Ground Truth Knowledge (Grounding)
|
1758 |
+
Today the site is maintained by English Heritage.
|
1759 |
+
Retrieved Knowledge (Generation)
|
1760 |
+
“Hogesdon” is first recorded in the Domesday Book, meaning an Anglo-
|
1761 |
+
Saxon farm (or “fortified enclosure”) belonging to Hoch, or Hocq....
|
1762 |
+
By 1677, the church was in such poor structural condition that the Dean
|
1763 |
+
of Chichester convened a consistory court with three parishioners and
|
1764 |
+
asked them why repairs had not been carried out...
|
1765 |
+
he south transept had historically served as the mausoleum for the
|
1766 |
+
Cavendish family, who resided at nearby Latimer...
|
1767 |
+
Following the diminished influence of the ancient Priory, predecessor of
|
1768 |
+
the two parishes of St Bartholomew, disputes began to arise over rights
|
1769 |
+
to tithes and taxes payable by lay residents who claimed allegiance with
|
1770 |
+
the nearby and anciently associated parish of St Botolph Aldersgate -
|
1771 |
+
an unintended consequence and legacy of King Kenry VIII’s religious
|
1772 |
+
reforms.
|
1773 |
+
a wall-mounted stone pulpit, a stone altar, a series of tall, pointed
|
1774 |
+
windows high in the walls, an unadorned stone font and a short wooden
|
1775 |
+
steeple-little more than an extended belfry-extending from the nave
|
1776 |
+
roof...a wall-mounted stone pulpit, a stone altar, a series of tall, pointed
|
1777 |
+
windows high in the walls, an unadorned stone font and a short wooden
|
1778 |
+
steeple-little more than an extended belfry-extending from the nave roof...
|
1779 |
+
Predicted Answers
|
1780 |
+
BARTbase
|
1781 |
+
This is the Nocton Hall, a historic Grade II listed
|
1782 |
+
building in the village of Nocton,
|
1783 |
+
BARTlarge
|
1784 |
+
Nocton Hall is a historic Grade II listed building in
|
1785 |
+
the village of Nocton, in Lincoln
|
1786 |
+
GPT-2small
|
1787 |
+
This is Nocton Hall, a historic Grade II listed
|
1788 |
+
building in the village of Nocton, in
|
1789 |
+
GPT-2medium
|
1790 |
+
This is the Nocton Hall, a historic Grade II listed
|
1791 |
+
building in the village of Nocton,
|
1792 |
+
INFO (Ours)
|
1793 |
+
This will be a nice vision for you. Nocton Hall is
|
1794 |
+
a historic Grade II listed building in England that
|
1795 |
+
you would like to visit.
|
1796 |
+
Ground Truth Response
|
1797 |
+
You can see Nocton Hall in the village of Nocton, in Lincolnshire of
|
1798 |
+
England, the country you want to visit.
|
1799 |
+
Given Landmark
|
1800 |
+
Maiden Castle, Dorset
|
1801 |
+
Dialogue
|
1802 |
+
Human: Wow, this is amazing! What is this?
|
1803 |
+
Machine: It is Maiden Castle in Dorset. I thought you would like it since
|
1804 |
+
you are interested in historic forts.
|
1805 |
+
Human: Who owns the site today?
|
1806 |
+
Human’s Persona
|
1807 |
+
I like Britain.
|
1808 |
+
I have been to Dorset.
|
1809 |
+
I am interested in historic forts.
|
1810 |
+
I hope to work for English Heritage.
|
1811 |
+
I would like to visit an old fort.
|
1812 |
+
Ground Truth Knowledge (Grounding)
|
1813 |
+
Today the site is protected as a Scheduled Ancient Monument and is
|
1814 |
+
maintained by English Heritage.
|
1815 |
+
Retrieved Knowledge (Generation)
|
1816 |
+
Portland Castle is an artillery fort constructed by Henry VIII on the Isle
|
1817 |
+
of Portland, Dorset, between 1539 and 1541...
|
1818 |
+
this version of events, or even that the hill fort was attacked by the
|
1819 |
+
Romans...
|
1820 |
+
Between 1985 and 1986 further excavations under Niall Sharples were
|
1821 |
+
prompted by the hill fort’s deteriorating condition, partly caused by the
|
1822 |
+
large number of visitors to the site...
|
1823 |
+
a Tudor rose and the initials E.R. (Elizabeth Regina), has been preserved
|
1824 |
+
and can be seen in the inner bailey of the castle mounted on a replica
|
1825 |
+
carriage...
|
1826 |
+
Constructed on a territorial boundary in about 600 BC, the first hill fort
|
1827 |
+
at Maiden Castle was a 6.4-hectare (16-acre) area surrounded by a single
|
1828 |
+
ditch...
|
1829 |
+
Predicted Answers
|
1830 |
+
BARTbase
|
1831 |
+
The site is maintained by English Heritage, the
|
1832 |
+
country you are from.
|
1833 |
+
BARTlarge
|
1834 |
+
Today the site is owned by English Heritage.....
|
1835 |
+
GPT-2small
|
1836 |
+
Today the site is protected as a Scheduled Ancient
|
1837 |
+
Monument and is maintained by English Heritage.
|
1838 |
+
GPT-2medium
|
1839 |
+
Today the site is maintained by English Heritage.
|
1840 |
+
INFO (Ours)
|
1841 |
+
Today the site is owned by English Heritage. You
|
1842 |
+
may wish to research this further since you hope to
|
1843 |
+
work for English Heritage.
|
1844 |
+
Ground Truth Response
|
1845 |
+
It is owned by English Heritage; a company you hope to work for.
|
1846 |
+
Table 9: Qualitative results. All the predicted results in grounding task are from our model, INFO and it predicts
|
1847 |
+
the correct answers in both tasks. We add other baselines’ responses for comparative analysis.
|
1848 |
+
|
7dE0T4oBgHgl3EQffQBI/content/tmp_files/load_file.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
9NFQT4oBgHgl3EQf5jYf/content/2301.13435v1.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:bda137ef3a8f36545d66dcde9d276f814317fe7b42111521722b4ff4759ff344
|
3 |
+
size 1641344
|
9NFQT4oBgHgl3EQf5jYf/vector_store/index.faiss
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:5d2687bbee34704a339ae54979fd70f79a88bdcab040ba87a271e9899cbe501f
|
3 |
+
size 8585261
|
9NFQT4oBgHgl3EQf5jYf/vector_store/index.pkl
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:1f44b2bc34d59bfe025b6852a0f7c5c45471ce943f80f4cb8a5b5d41748a8778
|
3 |
+
size 269392
|
9dE4T4oBgHgl3EQf3Q3I/content/tmp_files/2301.05305v1.pdf.txt
ADDED
@@ -0,0 +1,787 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
Reinforcement Learning-based Joint Handover and
|
2 |
+
Beam Tracking in Millimeter-wave Networks
|
3 |
+
Sara Khosravi∗, Hossein S. Ghadikolaei‡, Jens Zander∗, and Marina Petrova ∗†
|
4 |
+
∗School of EECS, KTH Royal Institute of the Technology, Stockholm, Sweden,
|
5 |
+
† Mobile Communications and Computing, RWTH Aachen University, Germany, ‡ Ericsson Research, Sweden
|
6 |
+
Email: {sarakhos, jenz, petrovam} @kth.se, [email protected]
|
7 |
+
Abstract—In this paper, we develop an algorithm for joint
|
8 |
+
handover and beam tracking in millimeter-wave (mmWave)
|
9 |
+
networks. The aim is to provide a reliable connection in terms of
|
10 |
+
the achieved throughput along the trajectory of the mobile user
|
11 |
+
while preventing frequent handovers. We model the association
|
12 |
+
problem as an optimization problem and propose a reinforcement
|
13 |
+
learning-based solution. Our approach learns whether and when
|
14 |
+
beam tracking and handover should be performed and chooses
|
15 |
+
the target base stations. In the case of beam tracking, we
|
16 |
+
propose a tracking algorithm based on measuring a small spatial
|
17 |
+
neighbourhood of the optimal beams in the previous time slot.
|
18 |
+
Simulation results in an outdoor environment show the superior
|
19 |
+
performance of our proposed solution in achievable throughput
|
20 |
+
and the number of handovers needed in comparison to a multi-
|
21 |
+
connectivity baseline and a learning-based handover baseline.
|
22 |
+
Index Terms—Millimeter-wave, user association, beam track-
|
23 |
+
ing, handover, reinforcement learning.
|
24 |
+
I. INTRODUCTION
|
25 |
+
Millimeter-wave (mmWave) is a key radio access technol-
|
26 |
+
ogy for beyond 5G communication systems, offering ultra-
|
27 |
+
high data rates due to a large amount of free spectrum [1].
|
28 |
+
However, due to the fewer scattering paths and significant
|
29 |
+
penetration loss, mmWave links are vulnerable to static or
|
30 |
+
dynamic obstacles. To overcome such severe loss, both base
|
31 |
+
station (BS) and user equipment (UE) may need directional
|
32 |
+
communication using a large number of antennas, which may
|
33 |
+
result in frequent misalignment of beams due to mobility and
|
34 |
+
blockage. Hence, finding and maintaining the optimal beam
|
35 |
+
directions (beam alignment) is necessary. The lengthy period
|
36 |
+
to achieve the beam alignment (hundreds of milliseconds
|
37 |
+
to seconds [2]) results in a high cell search time or BS
|
38 |
+
discovery time in mmWave systems. As reported in [3], the
|
39 |
+
BS discovery time which is the time required to search the
|
40 |
+
target BS when the handover command is received by the
|
41 |
+
UE is about 200 ms. Moreover, to improve the capacity and
|
42 |
+
coverage the density of the BSs is usually high in mmWave
|
43 |
+
systems [1]. Hence, conventional handover methods based on
|
44 |
+
instantaneous received signal power can cause unnecessarily
|
45 |
+
frequent handovers and a ping-pong effect. This leads to a
|
46 |
+
severe drop in service reliability. Therefore, fast BS discovery
|
47 |
+
(finding target BS in the handover process), and efficient
|
48 |
+
handover execution techniques, will be required to use the
|
49 |
+
full promise of mmWave cellular networks.
|
50 |
+
The spatial mmWave channel can be approximated by a
|
51 |
+
few dominant paths, where each path can be defined with
|
52 |
+
its angle of departure (AoD), angle of arrival (AoA) and
|
53 |
+
gain [4]. Hence, one can only estimate these path parameters
|
54 |
+
instead of a large dimensional channel matrix [5], [6]. The
|
55 |
+
process of identifying the dominant paths is called beam
|
56 |
+
training. However, due to the dynamic environment, frequent
|
57 |
+
beam training may cause high overhead1. Temporal correlation
|
58 |
+
of spatial mmWave channel can be employed to accelerate
|
59 |
+
the beam training process by tracking the variation of the
|
60 |
+
dominant path directions [6].
|
61 |
+
A. Related Work
|
62 |
+
To address the link failure and throughput degradation in
|
63 |
+
a dynamic environment, the multi-connectivity technique has
|
64 |
+
been vastly analyzed in literature [7], [8]. In this technique, the
|
65 |
+
UE keeps its connection to multiple BSs (either at mmWave
|
66 |
+
band or sub-6 GHz band). However, power consumption,
|
67 |
+
synchronization and the need for frequent tracking are the
|
68 |
+
main challenges. In the 3GPP standard (release 16) two
|
69 |
+
handover techniques are introduced to improve the link robust-
|
70 |
+
ness during mobility: dual active protocol stack (DAPS), and
|
71 |
+
conditional handover (CHO) [9]. In the DAPS, the connection
|
72 |
+
to the current serving BS is maintained until the connection
|
73 |
+
to the target BS is fully established. In the CHO, the UE is
|
74 |
+
configured with multiple target BSs. During the handover, the
|
75 |
+
UE can select one of the configured BSs as the target BS
|
76 |
+
during the RRC reconfiguration message. Although CHO can
|
77 |
+
decrease the handover failure probability, it may increase the
|
78 |
+
handover latency if the UE asks for multiple handovers during
|
79 |
+
a single RRC reconfiguration [7].
|
80 |
+
Applying machine learning as the main decision-maker tool
|
81 |
+
to make the optimal handover decision and choose the target
|
82 |
+
BS has been also studied in the literature [10], [11]. The
|
83 |
+
authors in [10] proposed a reinforcement learning (RL) based
|
84 |
+
handover policy to reduce the number of handovers while
|
85 |
+
keeping the quality of service in heterogeneous networks.
|
86 |
+
In [11] an intelligent handover method based on choosing
|
87 |
+
the backup solution for each serving link to maximize the
|
88 |
+
aggregate rate along a trajectory has been proposed.
|
89 |
+
1Overhead depends on the training time compared with the changes in the
|
90 |
+
environment.
|
91 |
+
arXiv:2301.05305v1 [eess.SY] 12 Jan 2023
|
92 |
+
|
93 |
+
In terms of beam tracking, authors in [12] applied the
|
94 |
+
correlation of spatial mmWave channel in adjacent locations
|
95 |
+
and proposed the beam steering method based on searching
|
96 |
+
over a small angular space in the vicinity of the previously
|
97 |
+
known valid beams. The authors in [6] applied machine
|
98 |
+
learning to the tracking procedure to extract useful information
|
99 |
+
from the history of AoD tracking.
|
100 |
+
All the aforementioned works only take handover or beam
|
101 |
+
tracking issues into account. Additionally, they do not study
|
102 |
+
the impact of selecting beam tracking and handover on the
|
103 |
+
achieved throughput of the UE along its trajectory and instead
|
104 |
+
focus on the achieved rate as the primary performance metric.
|
105 |
+
B. Our Contributions
|
106 |
+
In this paper, we develop a novel joint handover and beam
|
107 |
+
tracking algorithm in a mmWave network under mobility. The
|
108 |
+
algorithm aims to associate the UEs to BSs that maximize
|
109 |
+
the sum achieved throughput along the trajectory and ensure
|
110 |
+
the achieved throughput in each location of the trajectory
|
111 |
+
is higher than a pre-defined threshold. The user association
|
112 |
+
process is defined as the process of determining whether a user
|
113 |
+
is associated with a particular BS before data transmissions
|
114 |
+
commence. In the case of handover, the UE is associated with a
|
115 |
+
new BS, whereas in the case of beam tracking, the UE remains
|
116 |
+
associated with the serving BS from the previous time slot. The
|
117 |
+
main contributions of our paper are summarized as below:
|
118 |
+
• System Modeling: We model the user association prob-
|
119 |
+
lem as a non-convex optimization problem. Unlike the
|
120 |
+
existing works in the literature, we consider achieved
|
121 |
+
throughput as the main performance metric to measure
|
122 |
+
the effect of handover or beam tracking on the UEs’
|
123 |
+
quality of service.
|
124 |
+
• Learning-based Solution: The objective function in our
|
125 |
+
proposed user association problem highly depends on the
|
126 |
+
user association mechanism. We utilize the reinforcement
|
127 |
+
learning (RL) algorithm to approximate the solution to
|
128 |
+
this problem. The aim is to decide whether to run a beam
|
129 |
+
tracking algorithm or a handover algorithm.
|
130 |
+
• Joint Handover and Beam Tracking Algorithm: In the
|
131 |
+
case of a handover decision, the target BS will be
|
132 |
+
recognized as the output of the RL algorithm. In the
|
133 |
+
case of beam tracking, the search space will be defined
|
134 |
+
based on our proposed tracking algorithm by searching
|
135 |
+
the directions in the small spatial neighbourhood of the
|
136 |
+
previously selected optimal directions.
|
137 |
+
• Empirical Evaluation: We apply ray tracing with a
|
138 |
+
real building data map as the input. The results show
|
139 |
+
the effectiveness of our proposed method in achieving
|
140 |
+
throughput along trajectories and decreasing the number
|
141 |
+
of handovers.
|
142 |
+
The rest of the paper is organized as follows. We introduce
|
143 |
+
the system model and problem formulation in Section II. In
|
144 |
+
Section III, we propose our method. We present the numerical
|
145 |
+
results in Section IV and, conclude our work in Section V.
|
146 |
+
Notations: Throughout the paper, vectors and scalars are
|
147 |
+
shown by bold lower-case (x) and non-bold (x) letters, respec-
|
148 |
+
tively. The conjugate transpose of a vector x is represented by
|
149 |
+
xH. We define set [M] := {1, 2, .., M} for any integer M. The
|
150 |
+
indicator function 1{·} equals to one if the constraint inside
|
151 |
+
{·} is satisfied.
|
152 |
+
II. SYSTEM MODEL AND PROBLEM FORMULATION
|
153 |
+
In this section, first, we introduce the mmWave channel
|
154 |
+
model. Then, we present the user association problem formu-
|
155 |
+
lation.
|
156 |
+
We consider a downlink communication with |B| mmWave
|
157 |
+
BSs, where each is equipped with NBS antennas, communi-
|
158 |
+
cating with a single antenna mobile UE. We consider analog
|
159 |
+
beamforming with a single RF chain. We assume all BSs
|
160 |
+
allocate equal resources to their serving UEs. The channel
|
161 |
+
between BS j ∈ B and its serving UE during time slot i is
|
162 |
+
[13]:
|
163 |
+
hj =
|
164 |
+
L
|
165 |
+
�
|
166 |
+
ℓ=1
|
167 |
+
hℓaH(φℓ, θℓ),
|
168 |
+
(1)
|
169 |
+
where L is the number of available paths. Each path ℓ has
|
170 |
+
complex gain hℓ (include path-loss) and horizontal φℓ and
|
171 |
+
vertical θℓ, AoD. Due to the notation simplicity, we drop the
|
172 |
+
index j and i from the channel parameters. The array response
|
173 |
+
vector is a(.) where its exact expression depends on the array
|
174 |
+
geometry and possible hardware impairments. The signal-to-
|
175 |
+
noise ratio (SNR) in time slot i is
|
176 |
+
SNR(i)
|
177 |
+
j
|
178 |
+
= p|hH
|
179 |
+
j fj|2
|
180 |
+
σ2
|
181 |
+
,
|
182 |
+
(2)
|
183 |
+
where σ2 is the noise power, p is the transmit power, fj ∈ CNBS
|
184 |
+
is the beamforming vector of BS j.
|
185 |
+
We define variable x(i)
|
186 |
+
j
|
187 |
+
∈ {0, 1} for j ∈ B as an association
|
188 |
+
indicator in time slot i, where is equal 1 if UE is associated to
|
189 |
+
the BS j and 0 otherwise. Hence, the achieved rate per second
|
190 |
+
per hertz in time slot i is
|
191 |
+
R(i) = x(i)
|
192 |
+
jS log2(1 + SNR(i)
|
193 |
+
jS ) =
|
194 |
+
�
|
195 |
+
j∈B
|
196 |
+
x(i)
|
197 |
+
j log2(1 + SNR(i)
|
198 |
+
j ),
|
199 |
+
where jS is the index of the serving BS of the UE during time
|
200 |
+
slot i. Here, we assume each UE is served by only one BS.
|
201 |
+
We define the achievable throughput per hertz of the UE by
|
202 |
+
multiplying its rate by the data transmission time as
|
203 |
+
Γ(i) = (1 − τ (i)
|
204 |
+
b
|
205 |
+
τc
|
206 |
+
)R(i),
|
207 |
+
(3)
|
208 |
+
where, τ (i)
|
209 |
+
b
|
210 |
+
is the beam training duration which may have a
|
211 |
+
different value in each time slot i, and τc is the duration of
|
212 |
+
the time slot that is a fixed value for all time slots, see Fig. 1.
|
213 |
+
A. Beam Training and Beam Tracking
|
214 |
+
As depicted in Fig. 1a, when the UE is connected to a
|
215 |
+
BS j ∈ B, initial beam training is performed by sending
|
216 |
+
pilots over all combination of the beam directions in the
|
217 |
+
codebook during τb. Based. on the UE’s feedback of the
|
218 |
+
received signal strength (or estimated SNR), the best beam pair
|
219 |
+
directions are selected. Then, the BS and the UE would use this
|
220 |
+
|
221 |
+
Initial beam training
|
222 |
+
Data Transmission
|
223 |
+
τb
|
224 |
+
τc
|
225 |
+
(a)
|
226 |
+
Tracking
|
227 |
+
Data Transmission
|
228 |
+
τb
|
229 |
+
(b)
|
230 |
+
Fig. 1: τc is the time slot duration. τb is (a) the initial beam
|
231 |
+
training duration when the UE is associated with the new
|
232 |
+
BS (handover case), (b) the beam tacking duration when the
|
233 |
+
serving BS is the same for the consecutive slots.
|
234 |
+
direction (φℓ⋆, θℓ⋆) during the data transmission phase. The
|
235 |
+
beamforming vector, f is chosen to maximize the achievable
|
236 |
+
rate of the UE. Due to the monotonicity of the logarithm
|
237 |
+
function, this is equivalent to maximising the SNR term in
|
238 |
+
(2). Hence
|
239 |
+
f ∗
|
240 |
+
j = arg max
|
241 |
+
fj∈F
|
242 |
+
|hH
|
243 |
+
j fj|2
|
244 |
+
(4)
|
245 |
+
where F is the beamforming codebook that contains all
|
246 |
+
the feasible beamforming vectors. The n-th element of the
|
247 |
+
codebook F is defined as f(n) = a(φn, θn), where (φn, θn)
|
248 |
+
are steering angles and a(.) is the array response vector.
|
249 |
+
When the BS continues serving the same UE in a consecu-
|
250 |
+
tive time slot, only searching the neighbouring beam directions
|
251 |
+
of the main directions can be sufficient to maintain the link
|
252 |
+
quality. This process is called beam tracking. As shown in
|
253 |
+
Fig. 1b, the duration of τb is much smaller than the initial
|
254 |
+
beam training duration.
|
255 |
+
B. Problem Formulation
|
256 |
+
The UE association depends on the channel quality between
|
257 |
+
the BS and the UE. Due to UE mobility or temporary
|
258 |
+
blockage, the channel quality changes and consequently the
|
259 |
+
UE association. Based on the UEs’ velocity, we determine how
|
260 |
+
quickly the channel quality can change and predict the time
|
261 |
+
at which the current UE association needs to be updated. We
|
262 |
+
define TA seconds as the frequency of updating the association.
|
263 |
+
Hence, we need to make the decision every TA whether to run
|
264 |
+
the handover execution or beam tracking procedure if SNR is
|
265 |
+
lower than the pre-defined SNR threshold (SNRthr). Note that
|
266 |
+
we can have an on-demand reactive handover at any time slot
|
267 |
+
if the link toward the serving BS fails abruptly. However, with
|
268 |
+
a proper choice of TA, the frequency of those reactive events
|
269 |
+
could be very small. We define the duration of the trajectory
|
270 |
+
as M and consider the discrete time index i to describe the
|
271 |
+
association update at each interval.
|
272 |
+
The goal is to maximize the aggregate throughput of the UE
|
273 |
+
along the trajectory while ensuring the achieved throughput in
|
274 |
+
each time slot i is higher than a predefined threshold. To this
|
275 |
+
end, we define functions F1 and F2 as
|
276 |
+
• F1 is the averaged throughput along the trajectory as
|
277 |
+
F1 =
|
278 |
+
M
|
279 |
+
�
|
280 |
+
i=1
|
281 |
+
E
|
282 |
+
�
|
283 |
+
Γ(i)�
|
284 |
+
,
|
285 |
+
where the expectation is with respect to the randomness
|
286 |
+
of channel fading and the blockage, M is the duration of
|
287 |
+
the trajectory, and Γ(i) is defined in (3).
|
288 |
+
• F2 is the expected number of time slots whose throughput
|
289 |
+
is lower than the threshold (Γthr).
|
290 |
+
F2 = E
|
291 |
+
� M
|
292 |
+
�
|
293 |
+
i=1
|
294 |
+
1
|
295 |
+
�
|
296 |
+
Γ(i) ≤ Γthr
|
297 |
+
��
|
298 |
+
=
|
299 |
+
M
|
300 |
+
�
|
301 |
+
i=1
|
302 |
+
Pr
|
303 |
+
�
|
304 |
+
Γ(i) ≤ Γthr
|
305 |
+
�
|
306 |
+
.
|
307 |
+
We formulate the user association at time slot i ∈ [M]
|
308 |
+
as an optimization problem which involves finding the x(i)
|
309 |
+
j
|
310 |
+
corresponding to the association indicator as
|
311 |
+
max
|
312 |
+
{x(i)
|
313 |
+
j
|
314 |
+
}i,j
|
315 |
+
F1 − λF2
|
316 |
+
(5a)
|
317 |
+
s.t.
|
318 |
+
�
|
319 |
+
j∈B
|
320 |
+
x(i)
|
321 |
+
j
|
322 |
+
= 1, ∀, i ∈ [M]
|
323 |
+
(5b)
|
324 |
+
x(i)
|
325 |
+
j
|
326 |
+
∈ {0, 1},
|
327 |
+
∀j ∈ B, i ∈ [M]
|
328 |
+
(5c)
|
329 |
+
where λ is a large constant controlling the importance of F2.
|
330 |
+
Constraint (5b) guarantees that each UE is served by one BS.
|
331 |
+
The optimization problem (5) is nonlinear. Solving this
|
332 |
+
optimization problem requires estimating the expectation value
|
333 |
+
in F1 and F2 which requires running many realizations.
|
334 |
+
Moreover, the impact of choosing the x(i)
|
335 |
+
j
|
336 |
+
(the target BSs
|
337 |
+
in the handover case or choosing beam tracking procedure)
|
338 |
+
propagates in time and can affect the UEs’ performance in
|
339 |
+
the next time slots. Therefore, we need to consider the long-
|
340 |
+
term benefits of selecting association indicators besides their
|
341 |
+
immediate effects on the UEs’ performance. Furthermore, In
|
342 |
+
order to select the target BSs, we need to model or predict the
|
343 |
+
UEs’ performance in the next time slots, which can add more
|
344 |
+
complexity to the network due to the mobility of the UE and
|
345 |
+
obstacles in mmWave networks. These motivate us to utilize
|
346 |
+
the RL to approximate the solution of (5).
|
347 |
+
III.
|
348 |
+
PROPOSED METHOD
|
349 |
+
We transform the problem (5) to an RL problem in which
|
350 |
+
the objective function is turned into a reward function, and
|
351 |
+
the constraints are transformed into the feasible state and
|
352 |
+
action spaces. In the following, first, we start with defining
|
353 |
+
the Markov decision process, and then we will describe our
|
354 |
+
joint handover and beam tracking algorithm.
|
355 |
+
A. Markov Decision Process Formulation
|
356 |
+
RL problems are formulated based on the idea of the
|
357 |
+
Markov decision process (MDP), which is the agent’s interac-
|
358 |
+
tion with different states of the environment to maximize the
|
359 |
+
expected long-term reward. The agent is the main decision-
|
360 |
+
maker who can sit on the edge cloud. All BSs are connected
|
361 |
+
to the agent. Now, we define different elements of an MDP.
|
362 |
+
|
363 |
+
1) State Space: The state space describes the environ-
|
364 |
+
ment by which the agent is interacting through different
|
365 |
+
actions. We define the state at time slot i as s(i)
|
366 |
+
=
|
367 |
+
(ℓ(i)), j(i)
|
368 |
+
S , SNR(i), I(i)) ∈ S, where ℓ(i) is the location index
|
369 |
+
of the UE along the trajectory 2, j(i)
|
370 |
+
S is the index of the serving
|
371 |
+
BS, SNR(i) is the SNR value of the UE with serving BS j(i)
|
372 |
+
S
|
373 |
+
in time slot i. I(i) ∈ {0, 1} is the beam tracking activation
|
374 |
+
indicator. I(i) = 1 means the i-th time slot is the tracking slot
|
375 |
+
for the UE.
|
376 |
+
2) Action Space: The action space includes all possible
|
377 |
+
actions that can be taken by the agent. The action can change
|
378 |
+
the state of the environment from the current state to the target
|
379 |
+
state. In our problem, a(i) ∈ A = {0, 1, 2, ..., [|B|]} is the
|
380 |
+
decision regarding beam tracking (a(i) = 0) or choosing the
|
381 |
+
index of new serving BS in the case of handover decision
|
382 |
+
(a(i) ∈ [|B|]). In other words, if a(i) ̸= 0 means the handover
|
383 |
+
decision is made and the value of a(i) shows the target BS.
|
384 |
+
Hence, the action is to specify a serving BS for the UE along
|
385 |
+
its trajectory.
|
386 |
+
3) Policy: A policy π(.) maps the state of the environment
|
387 |
+
to the action of the agent. In our case, π is a function from S
|
388 |
+
to A, i.e., π : S → {0, 1, ..., [|B|]}
|
389 |
+
4) Rewards: The agent obtains the reward after taking an
|
390 |
+
action a(i) when current state is s(i) and moves to next state
|
391 |
+
s(i+1). Here we define reward r(s(i), a(i), s(i+1)) as
|
392 |
+
r(s(i), a(i), s(i+1)) = Γ(i) − λ1
|
393 |
+
�
|
394 |
+
Γ(i) ≤ Γthr
|
395 |
+
�
|
396 |
+
,
|
397 |
+
(6)
|
398 |
+
where Γ(i) is defined in (3).
|
399 |
+
5) State-action value: The function Qπ(s, a) is the long-
|
400 |
+
term reward and is defined as the expected summation of
|
401 |
+
discounted reward in the future for the action a ∈ A that
|
402 |
+
agent takes in state s under policy π. The RL algorithm aims
|
403 |
+
to choose the optimal policy π⋆ in each state s that maximizes
|
404 |
+
the Qπ(s, a). With discount factor η ∈ [0, 1], we have
|
405 |
+
Qπ(s, a) = E
|
406 |
+
��
|
407 |
+
i
|
408 |
+
ηir(s(i), s(i), s(i+1))
|
409 |
+
�
|
410 |
+
,
|
411 |
+
where the expectation is over the transition probabilities. In
|
412 |
+
our problem, transition probabilities model the SNR variations
|
413 |
+
due to the randomness of the channel fading and blockage.
|
414 |
+
We assume mobility information including the UEs’ current
|
415 |
+
location and its trajectory is known3. Therefore, the transition
|
416 |
+
to the next location is deterministic.
|
417 |
+
The optimal policy in state s ∈ S is found by
|
418 |
+
π⋆(s) = arg max
|
419 |
+
a∈A
|
420 |
+
Qπ(s, a).
|
421 |
+
(7)
|
422 |
+
Due to the continuous and large number of state spaces, we
|
423 |
+
apply deep Q-learning (DQL) [14] to solve (7). In DQL, the
|
424 |
+
state-action value function is estimated by the deep neural
|
425 |
+
network function approximators.
|
426 |
+
2Note that, we discretize the location of the UE along the trajectory. Hence,
|
427 |
+
every location dimension (x, y) a trajectory with length M is mapped to a
|
428 |
+
location index ℓ(i) ∈ [M].
|
429 |
+
3Note that the location information can be easily fed back through lower-
|
430 |
+
frequency links.
|
431 |
+
B. Joint Handover and Beam Tracking Algorithm
|
432 |
+
Algorithm 1 describes our proposed joint handover and
|
433 |
+
beam tracking algorithm along a trajectory with duration M.
|
434 |
+
If the current association cannot offer the required SNR level,
|
435 |
+
the decision regarding handover or beam track is made based
|
436 |
+
on a(i) as the output of the RL algorithm. In the case of the
|
437 |
+
handover decision, the value of a(i) represents the target BS.
|
438 |
+
The beam tracking algorithm based on small spatial mea-
|
439 |
+
surement in time slot i is shown in Algorithm 2. In slot i, the
|
440 |
+
algorithm starts by using the main beam of the same serving
|
441 |
+
BS in the previous time slot i − 1. If the SNR value is lower
|
442 |
+
than the threshold, then starts a small spatial measurement over
|
443 |
+
the AoD direction of the main beam. To quantify the size of the
|
444 |
+
spatial neighbourhood, we define ∆φ and ∆θ as the maximum
|
445 |
+
absolute horizontal and vertical deviation from the main AoD
|
446 |
+
direction. We define δφ and δθ as the measurement resolution
|
447 |
+
in horizontal and vertical, respectively. Inspired by [15], the
|
448 |
+
spatial neighbourhood N surrounding the main AoD direction
|
449 |
+
can be expressed using the horizontal neighbourhood Nφ and
|
450 |
+
vertical neighbourhood Nθ as
|
451 |
+
Nφ(∆φ, δφ) =
|
452 |
+
�
|
453 |
+
i.δφ : i ∈
|
454 |
+
�
|
455 |
+
−
|
456 |
+
�∆φ
|
457 |
+
δφ
|
458 |
+
�
|
459 |
+
,
|
460 |
+
�∆φ
|
461 |
+
δφ
|
462 |
+
���
|
463 |
+
(8)
|
464 |
+
Nθ(∆θ, δθ) =
|
465 |
+
�
|
466 |
+
j.δθ : j ∈
|
467 |
+
�
|
468 |
+
−
|
469 |
+
�∆θ
|
470 |
+
δθ
|
471 |
+
�
|
472 |
+
,
|
473 |
+
�∆θ
|
474 |
+
δθ
|
475 |
+
���
|
476 |
+
(9)
|
477 |
+
where ⌊.⌋ is the floor operation. The complete neighbourhood
|
478 |
+
is the Cartesian product of the horizontal and vertical neigh-
|
479 |
+
bourhoods as
|
480 |
+
N(∆φ, ∆θ, δφ, δθ) = Nφ(∆φ, δφ) × Nθ(∆θ, δθ)
|
481 |
+
= {(φ, θ) : φ ∈ Nφ(∆φ, δφ), θ ∈ Nθ(∆θ, δθ)}(10)
|
482 |
+
The spatial neighborhoods T (i) in time slot i surrounding the
|
483 |
+
main AoD directions (φ(i−1)
|
484 |
+
ℓ⋆
|
485 |
+
, θ(i−1)
|
486 |
+
ℓ⋆
|
487 |
+
) in previous time slot is
|
488 |
+
T (i) = (φ(i−1)
|
489 |
+
ℓ⋆
|
490 |
+
, θ(i−1)
|
491 |
+
ℓ⋆
|
492 |
+
, ) + N(∆φ, ∆θ, δφ, δθ).
|
493 |
+
(11)
|
494 |
+
Now given the main AoD direction, we need to find the
|
495 |
+
transmit direction from neighbourhoods T (i) that offers the
|
496 |
+
SNR threshold. We represent the sorted direction pairs as
|
497 |
+
[T (i)]I, where I is the sorted indices. It means the directions
|
498 |
+
in [T (i)]I increase in distance from the main AoD direction.
|
499 |
+
Starting from the main AoD direction, the SNR of each trans-
|
500 |
+
mit direction in [T (i)]I is measured until a beam pair meets
|
501 |
+
the required SNR level. Afterwards, no further measurements
|
502 |
+
are required. If no direction meets the threshold, the entire
|
503 |
+
(∆φ, ∆θ)-neighbourhood is measured to find the beam pairs
|
504 |
+
that offer the SNR threshold.
|
505 |
+
Note that in the worse scenario, if the selected target BS
|
506 |
+
based on our proposed algorithm cannot offer the required
|
507 |
+
SNR level due to very sudden blockage, the conventional
|
508 |
+
handover methods based on searching over the candidate BSs
|
509 |
+
in UEs vicinity can be applied. However, as shown in the
|
510 |
+
numerical results, such extreme case is rare.
|
511 |
+
|
512 |
+
Algorithm 1 Joint handover and beam tracking
|
513 |
+
Input: Trajectory with duration M
|
514 |
+
1: Initialization: for i = 1 set j(1)
|
515 |
+
S =1
|
516 |
+
2: for i ∈ 1, ..., M do
|
517 |
+
3:
|
518 |
+
if SNR(i)
|
519 |
+
jS < SNRthr then
|
520 |
+
4:
|
521 |
+
Choose the optimal action a(i) based on current
|
522 |
+
s(i).
|
523 |
+
5:
|
524 |
+
if a(i) ̸= 0 then.
|
525 |
+
▷ handover execution
|
526 |
+
6:
|
527 |
+
Set j(i)
|
528 |
+
S
|
529 |
+
= a(i) and run the initial beam training
|
530 |
+
process and compute the achieved throughput Γ(i) as (3).
|
531 |
+
7:
|
532 |
+
else
|
533 |
+
8:
|
534 |
+
Run Algorithm 2 and compute Γ(i).
|
535 |
+
9:
|
536 |
+
end if
|
537 |
+
10:
|
538 |
+
end if
|
539 |
+
11: end for
|
540 |
+
Output: Γ(i)
|
541 |
+
Algorithm 2 Beam tracking in time slot i at the BS j
|
542 |
+
Input: [T (i)]I, SNRthr, duration of each beam pair testing (β),
|
543 |
+
cnt(i) = 0.
|
544 |
+
1: for (φ, θ) ∈ [T ]I do
|
545 |
+
2:
|
546 |
+
Set f (i)
|
547 |
+
j
|
548 |
+
= a(φ, θ).
|
549 |
+
3:
|
550 |
+
Measure SNR(i)
|
551 |
+
j
|
552 |
+
as (2).
|
553 |
+
4:
|
554 |
+
Set cnt(i) = cnt(i) + 1.
|
555 |
+
▷ number of beam pair
|
556 |
+
testing
|
557 |
+
5:
|
558 |
+
if SNR(i)
|
559 |
+
j
|
560 |
+
>= SNRthr then
|
561 |
+
6:
|
562 |
+
(φ(i)
|
563 |
+
ℓ⋆ , θ(i)
|
564 |
+
ℓ⋆ ) = (φBS, θBS)
|
565 |
+
7:
|
566 |
+
τ (i)
|
567 |
+
b
|
568 |
+
= β.cnt(i)
|
569 |
+
8:
|
570 |
+
break;
|
571 |
+
9:
|
572 |
+
end if
|
573 |
+
10: end for
|
574 |
+
compute the achieved throughput Γ(i) as (3)
|
575 |
+
IV. NUMERICAL RESULTS
|
576 |
+
We evaluate the performance of the proposed method in an
|
577 |
+
urban environment using the ray tracing tool in the MATLAB
|
578 |
+
toolbox. The output of the ray tracing tool is the L available
|
579 |
+
paths between a BS and a UE in a specific location. The ray
|
580 |
+
tracing maintains the spatial consistency of mmWave channels.
|
581 |
+
As depicted in Fig. 2, we extracted the building map of Kista
|
582 |
+
in Stockholm city, Sweden and used it as the input data for
|
583 |
+
the ray tracing simulation. In our scenario, we assumed the
|
584 |
+
building material is brick and the terrain material is concrete.
|
585 |
+
We also add some random obstacles in the street with different
|
586 |
+
heights (1 m and 3 m) and widths (2 m and 4 m) as the human
|
587 |
+
bodies and various vehicles. These temporary obstacles are
|
588 |
+
distributed randomly in the street with density 10−2 per m2.
|
589 |
+
The material loss and the location of the temporary obstacles
|
590 |
+
are chosen randomly in each realization of the channel. The
|
591 |
+
BSs are located on the wall of buildings. The location of the
|
592 |
+
BSs is chosen randomly while covering the entire trajectory.
|
593 |
+
The BSs’ height is 6 m. We consider a pedestrian mobility
|
594 |
+
Fig. 2: Simulation area in Kista, Stockholm. The yellow line
|
595 |
+
shows the trajectory. Stars show the location of the BSs.
|
596 |
+
model with a speed of 1 m/s. We consider the different lengths
|
597 |
+
of the trajectories as 100TA, 200TA, 300TA, 400TA, 500TA.
|
598 |
+
The main simulation parameters are listed in Table I.
|
599 |
+
In the simulation, we consider the SNRthr = 2 dB and the
|
600 |
+
throughput threshold Γthr = 1 bit/Hz. The value of τc is 10 ms.
|
601 |
+
In the case of handover, we fix the initial beam training dura-
|
602 |
+
tion as τb = 1
|
603 |
+
3τc. In the case of beam tracking, τb is not fixed
|
604 |
+
and equals the size of measuring neighbourhood multiplied
|
605 |
+
by the duration of each beam pair testing (β = 10 µs). We
|
606 |
+
compare the performance of our proposed method with two
|
607 |
+
baselines. To have a fair comparison, we choose two baselines
|
608 |
+
in which the target BS for the handover is pre-determined.
|
609 |
+
Hence, we do not take into account the discovery time of
|
610 |
+
finding the target BS in the baselines. Just like in our method,
|
611 |
+
the handover is triggered if SNR < SNRthr.
|
612 |
+
As Baseline 1 we consider the multi-connectivity method
|
613 |
+
[8]. We implement a scenario where the UE maintains its
|
614 |
+
connection with a nearby BS as a backup solution while
|
615 |
+
being connected to the serving BS and once it experiences the
|
616 |
+
blockage of the serving link, starts connecting to the backup
|
617 |
+
solution. As Baseline 2 we select the learning-based handover
|
618 |
+
in [11]. The method shows very good performance in maxi-
|
619 |
+
mizing the achieved rate along the trajectory. In this baseline,
|
620 |
+
the target BS during the handover process is determined by a
|
621 |
+
learning algorithm. Although the target BSs are selected based
|
622 |
+
on the long-term effect on the achieved rate, still can cause
|
623 |
+
frequent handovers and throughput degradation.
|
624 |
+
First, we fix the number of BSs to 10 (see Fig. 2). We
|
625 |
+
consider 104 different channel realization as the input of the
|
626 |
+
RL algorithm. After getting the optimal policy, we test it
|
627 |
+
over real-time measurements and report the average of the
|
628 |
+
performance over 500 channel realizations. Fig. 3 shows the
|
629 |
+
average number of locations with unmet throughput thresholds
|
630 |
+
along the trajectory with different lengths and Fig. 4 shows the
|
631 |
+
average number of handovers needed. In comparison to the
|
632 |
+
other two baselines, our method provides better throughput
|
633 |
+
results by selecting to perform either beam tracking or a
|
634 |
+
handover. Furthermore, we note that the two baselines have
|
635 |
+
a higher number of handovers than our method due to only
|
636 |
+
considering the handover solution. Hence, by considering the
|
637 |
+
joint handover and beam tracking problem our method pro-
|
638 |
+
vides better-achieved throughput while decreasing the number
|
639 |
+
of handovers.
|
640 |
+
Fig. 5 shows the average aggregate achieved
|
641 |
+
|
642 |
+
Table I: Simulation parameters.
|
643 |
+
Parameters
|
644 |
+
Values in Simulations
|
645 |
+
BS transmit power
|
646 |
+
10 dBm
|
647 |
+
Noise power level
|
648 |
+
σ2=-174 dBm/Hz
|
649 |
+
Signal bandwidth
|
650 |
+
100 MHz
|
651 |
+
BS antenna
|
652 |
+
8 × 8 uniform planar array [11]
|
653 |
+
Time interval duration
|
654 |
+
TA = 1s
|
655 |
+
Neighborhood size
|
656 |
+
(∆φ, ∆θ) = (10◦, 10◦)
|
657 |
+
Measurement resolution
|
658 |
+
(δφ, δθ) = (5◦, 5◦)
|
659 |
+
Discount factor
|
660 |
+
η = 0.99
|
661 |
+
λ
|
662 |
+
100
|
663 |
+
100
|
664 |
+
200
|
665 |
+
300
|
666 |
+
400
|
667 |
+
500
|
668 |
+
0
|
669 |
+
200
|
670 |
+
400
|
671 |
+
Trajectory length (m)
|
672 |
+
Number of locations satisfying Γthr
|
673 |
+
Our method
|
674 |
+
Baseline 1
|
675 |
+
Baseline 2
|
676 |
+
Fig. 3: The average number of locations with unmet through-
|
677 |
+
put threshold for different lengths of the trajectory.
|
678 |
+
throughput along the trajectory with length 300 m for different
|
679 |
+
numbers of BSs. By increasing the number of BSs the number
|
680 |
+
of the locations satisfying the Γthr also increases hence the
|
681 |
+
aggregate throughput along the trajectory increases. Even with
|
682 |
+
a small number of BSs, our method outperforms baselines
|
683 |
+
in aggregate throughput along the trajectory by determining
|
684 |
+
whether to use a handover or beam tracking solution.
|
685 |
+
We consider 10000 iterations during the training in our
|
686 |
+
method and Baseline 2. With the training machine MacBook
|
687 |
+
Pro 2020 M1 with a memory of 16 GB, each iteration takes
|
688 |
+
about 15 seconds. Note that the absolute value of the training
|
689 |
+
time per iteration depends on the running machine.
|
690 |
+
V. CONCLUSIONS
|
691 |
+
In this work, we proposed and studied a learning-based joint
|
692 |
+
handover and beam tracking method in a mobile mmWave
|
693 |
+
network. The aim of our algorithm is to maximize the aggre-
|
694 |
+
gate throughput of the UE along a trajectory and ensure the
|
695 |
+
achieved throughput in each location is higher than the thresh-
|
696 |
+
old. Our evaluation results showed that by making an optimal
|
697 |
+
decision regarding handover execution or beam tracking, our
|
698 |
+
method provides high achievable throughput and reduces the
|
699 |
+
number of handovers. Considering different mobility models
|
700 |
+
and studying the effect of neighbouring size can be valuable
|
701 |
+
future work.
|
702 |
+
REFERENCES
|
703 |
+
[1] T. S. Rappaport, S. Sun, R. Mayzus, H. Zhao, Y. Azar, K. Wang, G. N.
|
704 |
+
Wong, J. K. Schulz, M. Samimi, and F. Gutierrez Jr, “Millimeter wave
|
705 |
+
mobile communications for 5G cellular: It will work!” IEEE Access,
|
706 |
+
vol. 1, no. 1, pp. 335–349, May 2013.
|
707 |
+
[2] H. Hassanieh, O. Abari, M. Rodriguez, M. Abdelghany, D. Katabi,
|
708 |
+
and P. Indyk, “Fast millimeter wave beam alignment,” in Pro. ACM
|
709 |
+
SIGCOM, 2018, pp. 432–445.
|
710 |
+
100
|
711 |
+
200
|
712 |
+
300
|
713 |
+
400
|
714 |
+
500
|
715 |
+
0
|
716 |
+
2
|
717 |
+
4
|
718 |
+
6
|
719 |
+
8
|
720 |
+
10
|
721 |
+
Trajectory length (m)
|
722 |
+
Number of handovers
|
723 |
+
Our method
|
724 |
+
Baseline 1
|
725 |
+
Baseline 2
|
726 |
+
Fig. 4: The average number of handovers for different lengths
|
727 |
+
of the trajectory.
|
728 |
+
4
|
729 |
+
6
|
730 |
+
8
|
731 |
+
10
|
732 |
+
100
|
733 |
+
150
|
734 |
+
200
|
735 |
+
250
|
736 |
+
300
|
737 |
+
Number of BSs
|
738 |
+
Average aggregate Γ(bits/Hz)
|
739 |
+
Our method
|
740 |
+
Baseline 1
|
741 |
+
Baseline 2
|
742 |
+
Fig. 5: The average aggregate achieved throughput per Hz
|
743 |
+
along the trajectory with length 300 m.
|
744 |
+
[3] 3GPP, “Requirements for support of radio resource management,” Stan-
|
745 |
+
dard 3GPP TS 38.138, no. TS 36.133, v15.19.0, Sep. 2022.
|
746 |
+
[4] R. W. Heath, N. Gonzalez-Prelcic, S. Rangan, W. Roh, and A. M.
|
747 |
+
Sayeed, “An overview of signal processing techniques for millimeter
|
748 |
+
wave mimo systems,” IEEE J. Sel. Top. Signal Process., vol. 10, no. 3,
|
749 |
+
pp. 436–453, Apr. 2016.
|
750 |
+
[5] X. Sun, C. Qi, and G. Y. Li, “Beam training and allocation for multiuser
|
751 |
+
millimeter wave massive mimo systems,” IEEE Trans. Wirel. Commun.,
|
752 |
+
vol. 18, no. 2, pp. 1041–1053, 2019.
|
753 |
+
[6] D. Zhang, S. Shen, C. She, M. Xiao, Z. Pang, Y. Li, and L. Wang,
|
754 |
+
“Training beam sequence design for mmwave tracking systems with
|
755 |
+
and without environmental knowledge,” IEEE Trans. Wirel. Commun.,
|
756 |
+
2022.
|
757 |
+
[7] M. F. ¨Ozkoc¸, A. Koutsaftis, R. Kumar, P. Liu, and S. S. Panwar, “The
|
758 |
+
impact of multi-connectivity and handover constraints on millimeter
|
759 |
+
wave and terahertz cellular networks,” IEEE J-SAC., vol. 39, no. 6, pp.
|
760 |
+
1833–1853, 2021.
|
761 |
+
[8] M. Gapeyenko, V. Petrov, D. Moltchanov, M. R. Akdeniz, S. Andreev,
|
762 |
+
N. Himayat, and Y. Koucheryavy, “On the degree of multi-connectivity
|
763 |
+
in 5G millimeter-wave cellular urban deployments,” IEEE Trans. Veh.
|
764 |
+
Technol., vol. 68, no. 2, pp. 1973–1978, Feb. 2019.
|
765 |
+
[9] “Multi-connectivity; overall description,” Standard 3GPP, vol. v16.1.0,
|
766 |
+
no. TS 37.340, 2020.
|
767 |
+
[10] Y. Sun, G. Feng, S. Qin, Y. Liang, and T. P. Yum, “The smart handoff
|
768 |
+
policy for millimeter wave heterogeneous cellular networks,” IEEE Trans
|
769 |
+
Mob Comput., vol. 17, no. 6, pp. 1456–1468, Jun. 2018.
|
770 |
+
[11] S. Khosravi, H. S. Ghadikolaei, and M. Petrova, “Learning-based
|
771 |
+
handover in mobile millimeter-wave networks,” IEEE TCCN, vol. 7,
|
772 |
+
no. 2, pp. 663–674, 2021.
|
773 |
+
[12] A. Patra, L. Simi´c, and P. M¨ah¨onen, “Smart mm-wave beam steering
|
774 |
+
algorithm for fast link re-establishment under node mobility in 60 ghz
|
775 |
+
indoor wlans,” in Proceedings of the 13th ACM International Symposium
|
776 |
+
on Mobility Management and Wireless Access, 2015, pp. 53–62.
|
777 |
+
[13] M. R. Akdeniz, Y. Liu, M. K. Samimi, S. Sun, S. Rangan, T. S.
|
778 |
+
Rappaport, and E. Erkip, “Millimeter wave channel modeling and
|
779 |
+
cellular capacity evaluation,” IEEE J-SAC, vol. 32, no. 6, pp. 1164–
|
780 |
+
1179, Jun. 2014.
|
781 |
+
[14] D. Bertsekas, Reinforcement Learning and optimal control.
|
782 |
+
Athena
|
783 |
+
Scientific, 2019.
|
784 |
+
[15] I. P. Roberts, A. Chopra, T. Novlan, S. Vishwanath, and J. G. Andrews,
|
785 |
+
“Steer: Beam selection for full-duplex millimeter wave communication
|
786 |
+
systems,” IEEE Trans Commun., pp. 1–1, 2022.
|
787 |
+
|
9dE4T4oBgHgl3EQf3Q3I/content/tmp_files/load_file.txt
ADDED
@@ -0,0 +1,426 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
filepath=/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf,len=425
|
2 |
+
page_content='Reinforcement Learning-based Joint Handover and Beam Tracking in Millimeter-wave Networks Sara Khosravi∗, Hossein S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
3 |
+
page_content=' Ghadikolaei‡, Jens Zander∗, and Marina Petrova ∗† ∗School of EECS, KTH Royal Institute of the Technology, Stockholm, Sweden, † Mobile Communications and Computing, RWTH Aachen University, Germany, ‡ Ericsson Research, Sweden Email: {sarakhos, jenz, petrovam} @kth.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
4 |
+
page_content='se, hossein.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
5 |
+
page_content='shokri.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
6 |
+
page_content='ghadikolaei@ericsson.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
7 |
+
page_content='com Abstract—In this paper, we develop an algorithm for joint handover and beam tracking in millimeter-wave (mmWave) networks.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
8 |
+
page_content=' The aim is to provide a reliable connection in terms of the achieved throughput along the trajectory of the mobile user while preventing frequent handovers.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
9 |
+
page_content=' We model the association problem as an optimization problem and propose a reinforcement learning-based solution.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
10 |
+
page_content=' Our approach learns whether and when beam tracking and handover should be performed and chooses the target base stations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
11 |
+
page_content=' In the case of beam tracking, we propose a tracking algorithm based on measuring a small spatial neighbourhood of the optimal beams in the previous time slot.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
12 |
+
page_content=' Simulation results in an outdoor environment show the superior performance of our proposed solution in achievable throughput and the number of handovers needed in comparison to a multi- connectivity baseline and a learning-based handover baseline.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
13 |
+
page_content=' Index Terms—Millimeter-wave, user association, beam track- ing, handover, reinforcement learning.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
14 |
+
page_content=' I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
15 |
+
page_content=' INTRODUCTION Millimeter-wave (mmWave) is a key radio access technol- ogy for beyond 5G communication systems, offering ultra- high data rates due to a large amount of free spectrum [1].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
16 |
+
page_content=' However, due to the fewer scattering paths and significant penetration loss, mmWave links are vulnerable to static or dynamic obstacles.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
17 |
+
page_content=' To overcome such severe loss, both base station (BS) and user equipment (UE) may need directional communication using a large number of antennas, which may result in frequent misalignment of beams due to mobility and blockage.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
18 |
+
page_content=' Hence, finding and maintaining the optimal beam directions (beam alignment) is necessary.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
19 |
+
page_content=' The lengthy period to achieve the beam alignment (hundreds of milliseconds to seconds [2]) results in a high cell search time or BS discovery time in mmWave systems.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
20 |
+
page_content=' As reported in [3], the BS discovery time which is the time required to search the target BS when the handover command is received by the UE is about 200 ms.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
21 |
+
page_content=' Moreover, to improve the capacity and coverage the density of the BSs is usually high in mmWave systems [1].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
22 |
+
page_content=' Hence, conventional handover methods based on instantaneous received signal power can cause unnecessarily frequent handovers and a ping-pong effect.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
23 |
+
page_content=' This leads to a severe drop in service reliability.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
24 |
+
page_content=' Therefore, fast BS discovery (finding target BS in the handover process), and efficient handover execution techniques, will be required to use the full promise of mmWave cellular networks.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
25 |
+
page_content=' The spatial mmWave channel can be approximated by a few dominant paths, where each path can be defined with its angle of departure (AoD), angle of arrival (AoA) and gain [4].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
26 |
+
page_content=' Hence, one can only estimate these path parameters instead of a large dimensional channel matrix [5], [6].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
27 |
+
page_content=' The process of identifying the dominant paths is called beam training.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
28 |
+
page_content=' However, due to the dynamic environment, frequent beam training may cause high overhead1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
29 |
+
page_content=' Temporal correlation of spatial mmWave channel can be employed to accelerate the beam training process by tracking the variation of the dominant path directions [6].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
30 |
+
page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
31 |
+
page_content=' Related Work To address the link failure and throughput degradation in a dynamic environment, the multi-connectivity technique has been vastly analyzed in literature [7], [8].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
32 |
+
page_content=' In this technique, the UE keeps its connection to multiple BSs (either at mmWave band or sub-6 GHz band).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
33 |
+
page_content=' However, power consumption, synchronization and the need for frequent tracking are the main challenges.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
34 |
+
page_content=' In the 3GPP standard (release 16) two handover techniques are introduced to improve the link robust- ness during mobility: dual active protocol stack (DAPS), and conditional handover (CHO) [9].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
35 |
+
page_content=' In the DAPS, the connection to the current serving BS is maintained until the connection to the target BS is fully established.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
36 |
+
page_content=' In the CHO, the UE is configured with multiple target BSs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
37 |
+
page_content=' During the handover, the UE can select one of the configured BSs as the target BS during the RRC reconfiguration message.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
38 |
+
page_content=' Although CHO can decrease the handover failure probability, it may increase the handover latency if the UE asks for multiple handovers during a single RRC reconfiguration [7].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
39 |
+
page_content=' Applying machine learning as the main decision-maker tool to make the optimal handover decision and choose the target BS has been also studied in the literature [10], [11].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
40 |
+
page_content=' The authors in [10] proposed a reinforcement learning (RL) based handover policy to reduce the number of handovers while keeping the quality of service in heterogeneous networks.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
41 |
+
page_content=' In [11] an intelligent handover method based on choosing the backup solution for each serving link to maximize the aggregate rate along a trajectory has been proposed.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
42 |
+
page_content=' 1Overhead depends on the training time compared with the changes in the environment.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
43 |
+
page_content=' arXiv:2301.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
44 |
+
page_content='05305v1 [eess.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
45 |
+
page_content='SY] 12 Jan 2023 In terms of beam tracking, authors in [12] applied the correlation of spatial mmWave channel in adjacent locations and proposed the beam steering method based on searching over a small angular space in the vicinity of the previously known valid beams.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
46 |
+
page_content=' The authors in [6] applied machine learning to the tracking procedure to extract useful information from the history of AoD tracking.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
47 |
+
page_content=' All the aforementioned works only take handover or beam tracking issues into account.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
48 |
+
page_content=' Additionally, they do not study the impact of selecting beam tracking and handover on the achieved throughput of the UE along its trajectory and instead focus on the achieved rate as the primary performance metric.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
49 |
+
page_content=' B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
50 |
+
page_content=' Our Contributions In this paper, we develop a novel joint handover and beam tracking algorithm in a mmWave network under mobility.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
51 |
+
page_content=' The algorithm aims to associate the UEs to BSs that maximize the sum achieved throughput along the trajectory and ensure the achieved throughput in each location of the trajectory is higher than a pre-defined threshold.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
52 |
+
page_content=' The user association process is defined as the process of determining whether a user is associated with a particular BS before data transmissions commence.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
53 |
+
page_content=' In the case of handover, the UE is associated with a new BS, whereas in the case of beam tracking, the UE remains associated with the serving BS from the previous time slot.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
54 |
+
page_content=' The main contributions of our paper are summarized as below: System Modeling: We model the user association prob- lem as a non-convex optimization problem.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
55 |
+
page_content=' Unlike the existing works in the literature, we consider achieved throughput as the main performance metric to measure the effect of handover or beam tracking on the UEs’ quality of service.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
56 |
+
page_content=' Learning-based Solution: The objective function in our proposed user association problem highly depends on the user association mechanism.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
57 |
+
page_content=' We utilize the reinforcement learning (RL) algorithm to approximate the solution to this problem.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
58 |
+
page_content=' The aim is to decide whether to run a beam tracking algorithm or a handover algorithm.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
59 |
+
page_content=' Joint Handover and Beam Tracking Algorithm: In the case of a handover decision, the target BS will be recognized as the output of the RL algorithm.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
60 |
+
page_content=' In the case of beam tracking, the search space will be defined based on our proposed tracking algorithm by searching the directions in the small spatial neighbourhood of the previously selected optimal directions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
61 |
+
page_content=' Empirical Evaluation: We apply ray tracing with a real building data map as the input.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
62 |
+
page_content=' The results show the effectiveness of our proposed method in achieving throughput along trajectories and decreasing the number of handovers.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
63 |
+
page_content=' The rest of the paper is organized as follows.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
64 |
+
page_content=' We introduce the system model and problem formulation in Section II.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
65 |
+
page_content=' In Section III, we propose our method.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
66 |
+
page_content=' We present the numerical results in Section IV and, conclude our work in Section V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
67 |
+
page_content=' Notations: Throughout the paper, vectors and scalars are shown by bold lower-case (x) and non-bold (x) letters, respec- tively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
68 |
+
page_content=' The conjugate transpose of a vector x is represented by xH.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
69 |
+
page_content=' We define set [M] := {1, 2, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
70 |
+
page_content='., M} for any integer M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
71 |
+
page_content=' The indicator function 1{·} equals to one if the constraint inside {·} is satisfied.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
72 |
+
page_content=' II.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
73 |
+
page_content=' SYSTEM MODEL AND PROBLEM FORMULATION In this section, first, we introduce the mmWave channel model.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
74 |
+
page_content=' Then, we present the user association problem formu- lation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
75 |
+
page_content=' We consider a downlink communication with |B| mmWave BSs, where each is equipped with NBS antennas, communi- cating with a single antenna mobile UE.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
76 |
+
page_content=' We consider analog beamforming with a single RF chain.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
77 |
+
page_content=' We assume all BSs allocate equal resources to their serving UEs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
78 |
+
page_content=' The channel between BS j ∈ B and its serving UE during time slot i is [13]: hj = L � ℓ=1 hℓaH(φℓ, θℓ), (1) where L is the number of available paths.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
79 |
+
page_content=' Each path ℓ has complex gain hℓ (include path-loss) and horizontal φℓ and vertical θℓ, AoD.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
80 |
+
page_content=' Due to the notation simplicity, we drop the index j and i from the channel parameters.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
81 |
+
page_content=' The array response vector is a(.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
82 |
+
page_content=') where its exact expression depends on the array geometry and possible hardware impairments.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
83 |
+
page_content=' The signal-to- noise ratio (SNR) in time slot i is SNR(i) j = p|hH j fj|2 σ2 , (2) where σ2 is the noise power, p is the transmit power, fj ∈ CNBS is the beamforming vector of BS j.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
84 |
+
page_content=' We define variable x(i) j ∈ {0, 1} for j ∈ B as an association indicator in time slot i, where is equal 1 if UE is associated to the BS j and 0 otherwise.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
85 |
+
page_content=' Hence, the achieved rate per second per hertz in time slot i is R(i) = x(i) jS log2(1 + SNR(i) jS ) = � j∈B x(i) j log2(1 + SNR(i) j ), where jS is the index of the serving BS of the UE during time slot i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
86 |
+
page_content=' Here, we assume each UE is served by only one BS.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
87 |
+
page_content=' We define the achievable throughput per hertz of the UE by multiplying its rate by the data transmission time as Γ(i) = (1 − τ (i) b τc )R(i), (3) where, τ (i) b is the beam training duration which may have a different value in each time slot i, and τc is the duration of the time slot that is a fixed value for all time slots, see Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
88 |
+
page_content=' 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
89 |
+
page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
90 |
+
page_content=' Beam Training and Beam Tracking As depicted in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
91 |
+
page_content=' 1a, when the UE is connected to a BS j ∈ B, initial beam training is performed by sending pilots over all combination of the beam directions in the codebook during τb.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
92 |
+
page_content=' Based.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
93 |
+
page_content=' on the UE’s feedback of the received signal strength (or estimated SNR), the best beam pair directions are selected.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
94 |
+
page_content=' Then, the BS and the UE would use this Initial beam training Data Transmission τb τc (a) Tracking Data Transmission τb (b) Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
95 |
+
page_content=' 1: τc is the time slot duration.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
96 |
+
page_content=' τb is (a) the initial beam training duration when the UE is associated with the new BS (handover case), (b) the beam tacking duration when the serving BS is the same for the consecutive slots.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
97 |
+
page_content=' direction (φℓ⋆, θℓ⋆) during the data transmission phase.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
98 |
+
page_content=' The beamforming vector, f is chosen to maximize the achievable rate of the UE.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
99 |
+
page_content=' Due to the monotonicity of the logarithm function, this is equivalent to maximising the SNR term in (2).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
100 |
+
page_content=' Hence f ∗ j = arg max fj∈F |hH j fj|2 (4) where F is the beamforming codebook that contains all the feasible beamforming vectors.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
101 |
+
page_content=' The n-th element of the codebook F is defined as f(n) = a(φn, θn), where (φn, θn) are steering angles and a(.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
102 |
+
page_content=') is the array response vector.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
103 |
+
page_content=' When the BS continues serving the same UE in a consecu- tive time slot, only searching the neighbouring beam directions of the main directions can be sufficient to maintain the link quality.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
104 |
+
page_content=' This process is called beam tracking.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
105 |
+
page_content=' As shown in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
106 |
+
page_content=' 1b, the duration of τb is much smaller than the initial beam training duration.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
107 |
+
page_content=' B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
108 |
+
page_content=' Problem Formulation The UE association depends on the channel quality between the BS and the UE.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
109 |
+
page_content=' Due to UE mobility or temporary blockage, the channel quality changes and consequently the UE association.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
110 |
+
page_content=' Based on the UEs’ velocity, we determine how quickly the channel quality can change and predict the time at which the current UE association needs to be updated.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
111 |
+
page_content=' We define TA seconds as the frequency of updating the association.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
112 |
+
page_content=' Hence, we need to make the decision every TA whether to run the handover execution or beam tracking procedure if SNR is lower than the pre-defined SNR threshold (SNRthr).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
113 |
+
page_content=' Note that we can have an on-demand reactive handover at any time slot if the link toward the serving BS fails abruptly.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
114 |
+
page_content=' However, with a proper choice of TA, the frequency of those reactive events could be very small.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
115 |
+
page_content=' We define the duration of the trajectory as M and consider the discrete time index i to describe the association update at each interval.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
116 |
+
page_content=' The goal is to maximize the aggregate throughput of the UE along the trajectory while ensuring the achieved throughput in each time slot i is higher than a predefined threshold.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
117 |
+
page_content=' To this end, we define functions F1 and F2 as F1 is the averaged throughput along the trajectory as F1 = M � i=1 E � Γ(i)� , where the expectation is with respect to the randomness of channel fading and the blockage, M is the duration of the trajectory, and Γ(i) is defined in (3).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
118 |
+
page_content=' F2 is the expected number of time slots whose throughput is lower than the threshold (Γthr).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
119 |
+
page_content=' F2 = E � M � i=1 1 � Γ(i) ≤ Γthr �� = M � i=1 Pr � Γ(i) ≤ Γthr � .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
120 |
+
page_content=' We formulate the user association at time slot i ∈ [M] as an optimization problem which involves finding the x(i) j corresponding to the association indicator as max {x(i) j }i,j F1 − λF2 (5a) s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
121 |
+
page_content='t.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
122 |
+
page_content=' � j∈B x(i) j = 1, ∀, i ∈ [M] (5b) x(i) j ∈ {0, 1}, ∀j ∈ B, i ∈ [M] (5c) where λ is a large constant controlling the importance of F2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
123 |
+
page_content=' Constraint (5b) guarantees that each UE is served by one BS.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
124 |
+
page_content=' The optimization problem (5) is nonlinear.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
125 |
+
page_content=' Solving this optimization problem requires estimating the expectation value in F1 and F2 which requires running many realizations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
126 |
+
page_content=' Moreover, the impact of choosing the x(i) j (the target BSs in the handover case or choosing beam tracking procedure) propagates in time and can affect the UEs’ performance in the next time slots.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
127 |
+
page_content=' Therefore, we need to consider the long- term benefits of selecting association indicators besides their immediate effects on the UEs’ performance.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
128 |
+
page_content=' Furthermore, In order to select the target BSs, we need to model or predict the UEs’ performance in the next time slots, which can add more complexity to the network due to the mobility of the UE and obstacles in mmWave networks.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
129 |
+
page_content=' These motivate us to utilize the RL to approximate the solution of (5).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
130 |
+
page_content=' III.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
131 |
+
page_content=' PROPOSED METHOD We transform the problem (5) to an RL problem in which the objective function is turned into a reward function, and the constraints are transformed into the feasible state and action spaces.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
132 |
+
page_content=' In the following, first, we start with defining the Markov decision process, and then we will describe our joint handover and beam tracking algorithm.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
133 |
+
page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
134 |
+
page_content=' Markov Decision Process Formulation RL problems are formulated based on the idea of the Markov decision process (MDP), which is the agent’s interac- tion with different states of the environment to maximize the expected long-term reward.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
135 |
+
page_content=' The agent is the main decision- maker who can sit on the edge cloud.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
136 |
+
page_content=' All BSs are connected to the agent.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
137 |
+
page_content=' Now, we define different elements of an MDP.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
138 |
+
page_content=' 1) State Space: The state space describes the environ- ment by which the agent is interacting through different actions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
139 |
+
page_content=' We define the state at time slot i as s(i) = (ℓ(i)), j(i) S , SNR(i), I(i)) ∈ S, where ℓ(i) is the location index of the UE along the trajectory 2, j(i) S is the index of the serving BS, SNR(i) is the SNR value of the UE with serving BS j(i) S in time slot i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
140 |
+
page_content=' I(i) ∈ {0, 1} is the beam tracking activation indicator.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
141 |
+
page_content=' I(i) = 1 means the i-th time slot is the tracking slot for the UE.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
142 |
+
page_content=' 2) Action Space: The action space includes all possible actions that can be taken by the agent.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
143 |
+
page_content=' The action can change the state of the environment from the current state to the target state.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
144 |
+
page_content=' In our problem, a(i) ∈ A = {0, 1, 2, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
145 |
+
page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
146 |
+
page_content=', [|B|]} is the decision regarding beam tracking (a(i) = 0) or choosing the index of new serving BS in the case of handover decision (a(i) ∈ [|B|]).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
147 |
+
page_content=' In other words, if a(i) ̸= 0 means the handover decision is made and the value of a(i) shows the target BS.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
148 |
+
page_content=' Hence, the action is to specify a serving BS for the UE along its trajectory.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
149 |
+
page_content=' 3) Policy: A policy π(.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
150 |
+
page_content=') maps the state of the environment to the action of the agent.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
151 |
+
page_content=' In our case, π is a function from S to A, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
152 |
+
page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
153 |
+
page_content=', π : S → {0, 1, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
154 |
+
page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
155 |
+
page_content=', [|B|]} 4) Rewards: The agent obtains the reward after taking an action a(i) when current state is s(i) and moves to next state s(i+1).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
156 |
+
page_content=' Here we define reward r(s(i), a(i), s(i+1)) as r(s(i), a(i), s(i+1)) = Γ(i) − λ1 � Γ(i) ≤ Γthr � , (6) where Γ(i) is defined in (3).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
157 |
+
page_content=' 5) State-action value: The function Qπ(s, a) is the long- term reward and is defined as the expected summation of discounted reward in the future for the action a ∈ A that agent takes in state s under policy π.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
158 |
+
page_content=' The RL algorithm aims to choose the optimal policy π⋆ in each state s that maximizes the Qπ(s, a).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
159 |
+
page_content=' With discount factor η ∈ [0, 1], we have Qπ(s, a) = E �� i ηir(s(i), s(i), s(i+1)) � , where the expectation is over the transition probabilities.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
160 |
+
page_content=' In our problem, transition probabilities model the SNR variations due to the randomness of the channel fading and blockage.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
161 |
+
page_content=' We assume mobility information including the UEs’ current location and its trajectory is known3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
162 |
+
page_content=' Therefore, the transition to the next location is deterministic.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
163 |
+
page_content=' The optimal policy in state s ∈ S is found by π⋆(s) = arg max a∈A Qπ(s, a).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
164 |
+
page_content=' (7) Due to the continuous and large number of state spaces, we apply deep Q-learning (DQL) [14] to solve (7).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
165 |
+
page_content=' In DQL, the state-action value function is estimated by the deep neural network function approximators.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
166 |
+
page_content=' 2Note that, we discretize the location of the UE along the trajectory.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
167 |
+
page_content=' Hence, every location dimension (x, y) a trajectory with length M is mapped to a location index ℓ(i) ∈ [M].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
168 |
+
page_content=' 3Note that the location information can be easily fed back through lower- frequency links.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
169 |
+
page_content=' B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
170 |
+
page_content=' Joint Handover and Beam Tracking Algorithm Algorithm 1 describes our proposed joint handover and beam tracking algorithm along a trajectory with duration M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
171 |
+
page_content=' If the current association cannot offer the required SNR level, the decision regarding handover or beam track is made based on a(i) as the output of the RL algorithm.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
172 |
+
page_content=' In the case of the handover decision, the value of a(i) represents the target BS.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
173 |
+
page_content=' The beam tracking algorithm based on small spatial mea- surement in time slot i is shown in Algorithm 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
174 |
+
page_content=' In slot i, the algorithm starts by using the main beam of the same serving BS in the previous time slot i − 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
175 |
+
page_content=' If the SNR value is lower than the threshold, then starts a small spatial measurement over the AoD direction of the main beam.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
176 |
+
page_content=' To quantify the size of the spatial neighbourhood, we define ∆φ and ∆θ as the maximum absolute horizontal and vertical deviation from the main AoD direction.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
177 |
+
page_content=' We define δφ and δθ as the measurement resolution in horizontal and vertical, respectively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
178 |
+
page_content=' Inspired by [15], the spatial neighbourhood N surrounding the main AoD direction can be expressed using the horizontal neighbourhood Nφ and vertical neighbourhood Nθ as Nφ(∆φ, δφ) = � i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
179 |
+
page_content='δφ : i ∈ � − �∆φ δφ � , �∆φ δφ ��� (8) Nθ(∆θ, δθ) = � j.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
180 |
+
page_content='δθ : j ∈ � − �∆θ δθ � , �∆θ δθ ��� (9) where ⌊.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
181 |
+
page_content='⌋ is the floor operation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
182 |
+
page_content=' The complete neighbourhood is the Cartesian product of the horizontal and vertical neigh- bourhoods as N(∆φ, ∆θ, δφ, δθ) = Nφ(∆φ, δφ) × Nθ(∆θ, δθ) = {(φ, θ) : φ ∈ Nφ(∆φ, δφ), θ ∈ Nθ(∆θ, δθ)}(10) The spatial neighborhoods T (i) in time slot i surrounding the main AoD directions (φ(i−1) ℓ⋆ , θ(i−1) ℓ⋆ ) in previous time slot is T (i) = (φ(i−1) ℓ⋆ , θ(i−1) ℓ⋆ , ) + N(∆φ, ∆θ, δφ, δθ).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
183 |
+
page_content=' (11) Now given the main AoD direction, we need to find the transmit direction from neighbourhoods T (i) that offers the SNR threshold.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
184 |
+
page_content=' We represent the sorted direction pairs as [T (i)]I, where I is the sorted indices.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
185 |
+
page_content=' It means the directions in [T (i)]I increase in distance from the main AoD direction.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
186 |
+
page_content=' Starting from the main AoD direction, the SNR of each trans- mit direction in [T (i)]I is measured until a beam pair meets the required SNR level.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
187 |
+
page_content=' Afterwards, no further measurements are required.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
188 |
+
page_content=' If no direction meets the threshold, the entire (∆φ, ∆θ)-neighbourhood is measured to find the beam pairs that offer the SNR threshold.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
189 |
+
page_content=' Note that in the worse scenario, if the selected target BS based on our proposed algorithm cannot offer the required SNR level due to very sudden blockage, the conventional handover methods based on searching over the candidate BSs in UEs vicinity can be applied.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
190 |
+
page_content=' However, as shown in the numerical results, such extreme case is rare.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
191 |
+
page_content=' Algorithm 1 Joint handover and beam tracking Input: Trajectory with duration M 1: Initialization: for i = 1 set j(1) S =1 2: for i ∈ 1, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
192 |
+
page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
193 |
+
page_content=', M do 3: if SNR(i) jS < SNRthr then 4: Choose the optimal action a(i) based on current s(i).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
194 |
+
page_content=' 5: if a(i) ̸= 0 then.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
195 |
+
page_content=' ▷ handover execution 6: Set j(i) S = a(i) and run the initial beam training process and compute the achieved throughput Γ(i) as (3).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
196 |
+
page_content=' 7: else 8: Run Algorithm 2 and compute Γ(i).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
197 |
+
page_content=' 9: end if 10: end if 11: end for Output: Γ(i) Algorithm 2 Beam tracking in time slot i at the BS j Input: [T (i)]I, SNRthr, duration of each beam pair testing (β), cnt(i) = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
198 |
+
page_content=' 1: for (φ, θ) ∈ [T ]I do 2: Set f (i) j = a(φ, θ).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
199 |
+
page_content=' 3: Measure SNR(i) j as (2).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
200 |
+
page_content=' 4: Set cnt(i) = cnt(i) + 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
201 |
+
page_content=' ▷ number of beam pair testing 5: if SNR(i) j >= SNRthr then 6: (φ(i) ℓ⋆ , θ(i) ℓ⋆ ) = (φBS, θBS) 7: τ (i) b = β.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
202 |
+
page_content='cnt(i) 8: break;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
203 |
+
page_content=' 9: end if 10: end for compute the achieved throughput Γ(i) as (3) IV.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
204 |
+
page_content=' NUMERICAL RESULTS We evaluate the performance of the proposed method in an urban environment using the ray tracing tool in the MATLAB toolbox.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
205 |
+
page_content=' The output of the ray tracing tool is the L available paths between a BS and a UE in a specific location.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
206 |
+
page_content=' The ray tracing maintains the spatial consistency of mmWave channels.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
207 |
+
page_content=' As depicted in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
208 |
+
page_content=' 2, we extracted the building map of Kista in Stockholm city, Sweden and used it as the input data for the ray tracing simulation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
209 |
+
page_content=' In our scenario, we assumed the building material is brick and the terrain material is concrete.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
210 |
+
page_content=' We also add some random obstacles in the street with different heights (1 m and 3 m) and widths (2 m and 4 m) as the human bodies and various vehicles.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
211 |
+
page_content=' These temporary obstacles are distributed randomly in the street with density 10−2 per m2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
212 |
+
page_content=' The material loss and the location of the temporary obstacles are chosen randomly in each realization of the channel.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
213 |
+
page_content=' The BSs are located on the wall of buildings.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
214 |
+
page_content=' The location of the BSs is chosen randomly while covering the entire trajectory.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
215 |
+
page_content=' The BSs’ height is 6 m.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
216 |
+
page_content=' We consider a pedestrian mobility Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
217 |
+
page_content=' 2: Simulation area in Kista, Stockholm.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
218 |
+
page_content=' The yellow line shows the trajectory.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
219 |
+
page_content=' Stars show the location of the BSs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
220 |
+
page_content=' model with a speed of 1 m/s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
221 |
+
page_content=' We consider the different lengths of the trajectories as 100TA, 200TA, 300TA, 400TA, 500TA.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
222 |
+
page_content=' The main simulation parameters are listed in Table I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
223 |
+
page_content=' In the simulation, we consider the SNRthr = 2 dB and the throughput threshold Γthr = 1 bit/Hz.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
224 |
+
page_content=' The value of τc is 10 ms.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
225 |
+
page_content=' In the case of handover, we fix the initial beam training dura- tion as τb = 1 3τc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
226 |
+
page_content=' In the case of beam tracking, τb is not fixed and equals the size of measuring neighbourhood multiplied by the duration of each beam pair testing (β = 10 µs).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
227 |
+
page_content=' We compare the performance of our proposed method with two baselines.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
228 |
+
page_content=' To have a fair comparison, we choose two baselines in which the target BS for the handover is pre-determined.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
229 |
+
page_content=' Hence, we do not take into account the discovery time of finding the target BS in the baselines.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
230 |
+
page_content=' Just like in our method, the handover is triggered if SNR < SNRthr.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
231 |
+
page_content=' As Baseline 1 we consider the multi-connectivity method [8].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
232 |
+
page_content=' We implement a scenario where the UE maintains its connection with a nearby BS as a backup solution while being connected to the serving BS and once it experiences the blockage of the serving link, starts connecting to the backup solution.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
233 |
+
page_content=' As Baseline 2 we select the learning-based handover in [11].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
234 |
+
page_content=' The method shows very good performance in maxi- mizing the achieved rate along the trajectory.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
235 |
+
page_content=' In this baseline, the target BS during the handover process is determined by a learning algorithm.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
236 |
+
page_content=' Although the target BSs are selected based on the long-term effect on the achieved rate, still can cause frequent handovers and throughput degradation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
237 |
+
page_content=' First, we fix the number of BSs to 10 (see Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
238 |
+
page_content=' 2).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
239 |
+
page_content=' We consider 104 different channel realization as the input of the RL algorithm.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
240 |
+
page_content=' After getting the optimal policy, we test it over real-time measurements and report the average of the performance over 500 channel realizations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
241 |
+
page_content=' Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
242 |
+
page_content=' 3 shows the average number of locations with unmet throughput thresholds along the trajectory with different lengths and Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
243 |
+
page_content=' 4 shows the average number of handovers needed.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
244 |
+
page_content=' In comparison to the other two baselines, our method provides better throughput results by selecting to perform either beam tracking or a handover.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
245 |
+
page_content=' Furthermore, we note that the two baselines have a higher number of handovers than our method due to only considering the handover solution.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
246 |
+
page_content=' Hence, by considering the joint handover and beam tracking problem our method pro- vides better-achieved throughput while decreasing the number of handovers.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
247 |
+
page_content=' Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
248 |
+
page_content=' 5 shows the average aggregate achieved Table I: Simulation parameters.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
249 |
+
page_content=' Parameters Values in Simulations BS transmit power 10 dBm Noise power level σ2=-174 dBm/Hz Signal bandwidth 100 MHz BS antenna 8 × 8 uniform planar array [11] Time interval duration TA = 1s Neighborhood size (∆φ, ∆θ) = (10◦, 10◦) Measurement resolution (δφ, δθ) = (5◦, 5◦) Discount factor η = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
250 |
+
page_content='99 λ 100 100 200 300 400 500 0 200 400 Trajectory length (m) Number of locations satisfying Γthr Our method Baseline 1 Baseline 2 Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
251 |
+
page_content=' 3: The average number of locations with unmet through- put threshold for different lengths of the trajectory.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
252 |
+
page_content=' throughput along the trajectory with length 300 m for different numbers of BSs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
253 |
+
page_content=' By increasing the number of BSs the number of the locations satisfying the Γthr also increases hence the aggregate throughput along the trajectory increases.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
254 |
+
page_content=' Even with a small number of BSs, our method outperforms baselines in aggregate throughput along the trajectory by determining whether to use a handover or beam tracking solution.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
255 |
+
page_content=' We consider 10000 iterations during the training in our method and Baseline 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
256 |
+
page_content=' With the training machine MacBook Pro 2020 M1 with a memory of 16 GB, each iteration takes about 15 seconds.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
257 |
+
page_content=' Note that the absolute value of the training time per iteration depends on the running machine.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
258 |
+
page_content=' V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
259 |
+
page_content=' CONCLUSIONS In this work, we proposed and studied a learning-based joint handover and beam tracking method in a mobile mmWave network.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
260 |
+
page_content=' The aim of our algorithm is to maximize the aggre- gate throughput of the UE along a trajectory and ensure the achieved throughput in each location is higher than the thresh- old.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
261 |
+
page_content=' Our evaluation results showed that by making an optimal decision regarding handover execution or beam tracking, our method provides high achievable throughput and reduces the number of handovers.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
262 |
+
page_content=' Considering different mobility models and studying the effect of neighbouring size can be valuable future work.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
263 |
+
page_content=' REFERENCES [1] T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
264 |
+
page_content=' S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
265 |
+
page_content=' Rappaport, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
266 |
+
page_content=' Sun, R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
267 |
+
page_content=' Mayzus, H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
268 |
+
page_content=' Zhao, Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
269 |
+
page_content=' Azar, K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
270 |
+
page_content=' Wang, G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
271 |
+
page_content=' N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
272 |
+
page_content=' Wong, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
273 |
+
page_content=' K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
274 |
+
page_content=' Schulz, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
275 |
+
page_content=' Samimi, and F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
276 |
+
page_content=' Gutierrez Jr, “Millimeter wave mobile communications for 5G cellular: It will work!”' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
277 |
+
page_content=' IEEE Access, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
278 |
+
page_content=' 1, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
279 |
+
page_content=' 1, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
280 |
+
page_content=' 335–349, May 2013.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
281 |
+
page_content=' [2] H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
282 |
+
page_content=' Hassanieh, O.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
283 |
+
page_content=' Abari, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
284 |
+
page_content=' Rodriguez, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
285 |
+
page_content=' Abdelghany, D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
286 |
+
page_content=' Katabi, and P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
287 |
+
page_content=' Indyk, “Fast millimeter wave beam alignment,” in Pro.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
288 |
+
page_content=' ACM SIGCOM, 2018, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
289 |
+
page_content=' 432–445.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
290 |
+
page_content=' 100 200 300 400 500 0 2 4 6 8 10 Trajectory length (m) Number of handovers Our method Baseline 1 Baseline 2 Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
291 |
+
page_content=' 4: The average number of handovers for different lengths of the trajectory.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
292 |
+
page_content=' 4 6 8 10 100 150 200 250 300 Number of BSs Average aggregate Γ(bits/Hz) Our method Baseline 1 Baseline 2 Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
293 |
+
page_content=' 5: The average aggregate achieved throughput per Hz along the trajectory with length 300 m.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
294 |
+
page_content=' [3] 3GPP, “Requirements for support of radio resource management,” Stan- dard 3GPP TS 38.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
295 |
+
page_content='138, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
296 |
+
page_content=' TS 36.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
297 |
+
page_content='133, v15.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
298 |
+
page_content='19.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
299 |
+
page_content='0, Sep.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
300 |
+
page_content=' 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
301 |
+
page_content=' [4] R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
302 |
+
page_content=' W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
303 |
+
page_content=' Heath, N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
304 |
+
page_content=' Gonzalez-Prelcic, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
305 |
+
page_content=' Rangan, W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
306 |
+
page_content=' Roh, and A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
307 |
+
page_content=' M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
308 |
+
page_content=' Sayeed, “An overview of signal processing techniques for millimeter wave mimo systems,” IEEE J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
309 |
+
page_content=' Sel.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
310 |
+
page_content=' Top.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
311 |
+
page_content=' Signal Process.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
312 |
+
page_content=', vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
313 |
+
page_content=' 10, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
314 |
+
page_content=' 3, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
315 |
+
page_content=' 436–453, Apr.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
316 |
+
page_content=' 2016.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
317 |
+
page_content=' [5] X.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
318 |
+
page_content=' Sun, C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
319 |
+
page_content=' Qi, and G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
320 |
+
page_content=' Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
321 |
+
page_content=' Li, “Beam training and allocation for multiuser millimeter wave massive mimo systems,” IEEE Trans.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
322 |
+
page_content=' Wirel.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
323 |
+
page_content=' Commun.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
324 |
+
page_content=', vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
325 |
+
page_content=' 18, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
326 |
+
page_content=' 2, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
327 |
+
page_content=' 1041–1053, 2019.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
328 |
+
page_content=' [6] D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
329 |
+
page_content=' Zhang, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
330 |
+
page_content=' Shen, C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
331 |
+
page_content=' She, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
332 |
+
page_content=' Xiao, Z.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
333 |
+
page_content=' Pang, Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
334 |
+
page_content=' Li, and L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
335 |
+
page_content=' Wang, “Training beam sequence design for mmwave tracking systems with and without environmental knowledge,” IEEE Trans.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
336 |
+
page_content=' Wirel.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
337 |
+
page_content=' Commun.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
338 |
+
page_content=', 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
339 |
+
page_content=' [7] M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
340 |
+
page_content=' F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
341 |
+
page_content=' ¨Ozkoc¸, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
342 |
+
page_content=' Koutsaftis, R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
343 |
+
page_content=' Kumar, P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
344 |
+
page_content=' Liu, and S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
345 |
+
page_content=' S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
346 |
+
page_content=' Panwar, “The impact of multi-connectivity and handover constraints on millimeter wave and terahertz cellular networks,” IEEE J-SAC.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
347 |
+
page_content=', vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
348 |
+
page_content=' 39, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
349 |
+
page_content=' 6, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
350 |
+
page_content=' 1833–1853, 2021.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
351 |
+
page_content=' [8] M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
352 |
+
page_content=' Gapeyenko, V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
353 |
+
page_content=' Petrov, D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
354 |
+
page_content=' Moltchanov, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
355 |
+
page_content=' R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
356 |
+
page_content=' Akdeniz, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
357 |
+
page_content=' Andreev, N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
358 |
+
page_content=' Himayat, and Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
359 |
+
page_content=' Koucheryavy, “On the degree of multi-connectivity in 5G millimeter-wave cellular urban deployments,” IEEE Trans.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
360 |
+
page_content=' Veh.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
361 |
+
page_content=' Technol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
362 |
+
page_content=', vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
363 |
+
page_content=' 68, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
364 |
+
page_content=' 2, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
365 |
+
page_content=' 1973–1978, Feb.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
366 |
+
page_content=' 2019.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
367 |
+
page_content=' [9] “Multi-connectivity;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
368 |
+
page_content=' overall description,” Standard 3GPP, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
369 |
+
page_content=' v16.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
370 |
+
page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
371 |
+
page_content='0, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
372 |
+
page_content=' TS 37.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
373 |
+
page_content='340, 2020.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
374 |
+
page_content=' [10] Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
375 |
+
page_content=' Sun, G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
376 |
+
page_content=' Feng, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
377 |
+
page_content=' Qin, Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
378 |
+
page_content=' Liang, and T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
379 |
+
page_content=' P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
380 |
+
page_content=' Yum, “The smart handoff policy for millimeter wave heterogeneous cellular networks,” IEEE Trans Mob Comput.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
381 |
+
page_content=', vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
382 |
+
page_content=' 17, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
383 |
+
page_content=' 6, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
384 |
+
page_content=' 1456–1468, Jun.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
385 |
+
page_content=' 2018.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
386 |
+
page_content=' [11] S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
387 |
+
page_content=' Khosravi, H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
388 |
+
page_content=' S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
389 |
+
page_content=' Ghadikolaei, and M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
390 |
+
page_content=' Petrova, “Learning-based handover in mobile millimeter-wave networks,” IEEE TCCN, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
391 |
+
page_content=' 7, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
392 |
+
page_content=' 2, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
393 |
+
page_content=' 663–674, 2021.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
394 |
+
page_content=' [12] A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
395 |
+
page_content=' Patra, L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
396 |
+
page_content=' Simi´c, and P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
397 |
+
page_content=' M¨ah¨onen, “Smart mm-wave beam steering algorithm for fast link re-establishment under node mobility in 60 ghz indoor wlans,” in Proceedings of the 13th ACM International Symposium on Mobility Management and Wireless Access, 2015, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
398 |
+
page_content=' 53–62.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
399 |
+
page_content=' [13] M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
400 |
+
page_content=' R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
401 |
+
page_content=' Akdeniz, Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
402 |
+
page_content=' Liu, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
403 |
+
page_content=' K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
404 |
+
page_content=' Samimi, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
405 |
+
page_content=' Sun, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
406 |
+
page_content=' Rangan, T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
407 |
+
page_content=' S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
408 |
+
page_content=' Rappaport, and E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
409 |
+
page_content=' Erkip, “Millimeter wave channel modeling and cellular capacity evaluation,” IEEE J-SAC, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
410 |
+
page_content=' 32, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
411 |
+
page_content=' 6, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
412 |
+
page_content=' 1164– 1179, Jun.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
413 |
+
page_content=' 2014.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
414 |
+
page_content=' [14] D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
415 |
+
page_content=' Bertsekas, Reinforcement Learning and optimal control.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
416 |
+
page_content=' Athena Scientific, 2019.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
417 |
+
page_content=' [15] I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
418 |
+
page_content=' P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
419 |
+
page_content=' Roberts, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
420 |
+
page_content=' Chopra, T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
421 |
+
page_content=' Novlan, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
422 |
+
page_content=' Vishwanath, and J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
423 |
+
page_content=' G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
424 |
+
page_content=' Andrews, “Steer: Beam selection for full-duplex millimeter wave communication systems,” IEEE Trans Commun.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
425 |
+
page_content=', pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
426 |
+
page_content=' 1–1, 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
|
AtAyT4oBgHgl3EQf3_qJ/content/2301.00779v1.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:476cc0e9a81aa56404837a41aa2774ea843f3ccbe3eceaccc2e7d11f79b70a1a
|
3 |
+
size 325216
|
AtAyT4oBgHgl3EQf3_qJ/vector_store/index.faiss
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:bfefceeb1d9d45e3ee99fb7e144d3547315cb48f878eb64043e09fbd1db2450d
|
3 |
+
size 4456493
|
AtAyT4oBgHgl3EQf3_qJ/vector_store/index.pkl
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:3d3a5783ad9c688a4c328e08158987c01812132d91608777275dda702d740969
|
3 |
+
size 168344
|
CNE0T4oBgHgl3EQfgAHQ/content/2301.02413v1.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:86ef72244638733963c8f9bf3ba698741ff860778833b1ab89625c4cb7d11b08
|
3 |
+
size 1091018
|
CNE0T4oBgHgl3EQfgAHQ/vector_store/index.faiss
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:8ac435ad81f3f1a3d15db2209c095e8fbc618bc66cc579cb7039d4f3eb0cefc5
|
3 |
+
size 7798829
|
CNE0T4oBgHgl3EQfgAHQ/vector_store/index.pkl
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:27e3da9a49058cc5507dd9c1d49084a3bade3e414efe440329f91f85081afe1d
|
3 |
+
size 264312
|
CdAyT4oBgHgl3EQf4fpA/vector_store/index.faiss
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:586f0737aea4c2fbc0f536827dbbd28cf1ebfb9deedc5fda167b50381a04a827
|
3 |
+
size 2031661
|
CdAyT4oBgHgl3EQf4fpA/vector_store/index.pkl
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:b8dde3dba6f90a1c9e6506cd235a4df488f29495b2367767cc827fdb6fc0b957
|
3 |
+
size 72643
|
D9E2T4oBgHgl3EQf9gn9/content/2301.04230v1.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:a25b0e87b829576e167d617a59bc9a37132497357437329711641d3a0169875d
|
3 |
+
size 4815444
|
D9E2T4oBgHgl3EQf9gn9/vector_store/index.pkl
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:055b0fa044fe24741b5c3ddb7f28f2f4116b280285624b1df65781c6d704da0f
|
3 |
+
size 1070027
|
D9E4T4oBgHgl3EQffA2Y/content/tmp_files/2301.05104v1.pdf.txt
ADDED
@@ -0,0 +1,1218 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
Learning to compile smartly for program size reduction
|
2 |
+
Youwei Liang∗ 1 Kevin Stone∗ 2 Ali Shameli 2 Chris Cummins 2 Mostafa Elhoushi 2 Jiadong Guo 2
|
3 |
+
Benoit Steiner 2 Pengtao Xie 1 Hugh Leather 2 Yuandong Tian 2
|
4 |
+
Abstract
|
5 |
+
Compiler optimization passes are an important
|
6 |
+
tool for improving program efficiency and reduc-
|
7 |
+
ing program size, but manually selecting opti-
|
8 |
+
mization passes can be time-consuming and error-
|
9 |
+
prone. While human experts have identified a few
|
10 |
+
fixed sequences of optimization passes (e.g., the
|
11 |
+
Clang -Oz passes) that perform well for a wide
|
12 |
+
variety of programs, these sequences are not con-
|
13 |
+
ditioned on specific programs. In this paper, we
|
14 |
+
propose a novel approach that learns a policy to
|
15 |
+
select passes for program size reduction, allow-
|
16 |
+
ing for customization and adaptation to specific
|
17 |
+
programs. Our approach uses a search mecha-
|
18 |
+
nism that helps identify useful pass sequences
|
19 |
+
and a GNN with customized attention that se-
|
20 |
+
lects the optimal sequence to use. Crucially it
|
21 |
+
is able to generalize to new, unseen programs,
|
22 |
+
making it more flexible and general than previ-
|
23 |
+
ous approaches. We evaluate our approach on a
|
24 |
+
range of programs and show that it leads to size
|
25 |
+
reduction compared to traditional optimization
|
26 |
+
techniques. Our results demonstrate the potential
|
27 |
+
of a single policy that is able to optimize many
|
28 |
+
programs.
|
29 |
+
1. Introduction
|
30 |
+
Finding the right compiler optimization ordering for a given
|
31 |
+
program in order to execute them more efficiently with a
|
32 |
+
smaller amount of resources (e.g., memory, CPU and stor-
|
33 |
+
age) is an important yet challenging problem. Traditionally,
|
34 |
+
to tune configurations, human effort and expert knowledge
|
35 |
+
are needed, which is a time-consuming and error-prone
|
36 |
+
process that often yields sub-par results.
|
37 |
+
In recent years, machine learning-guided compiler optimiza-
|
38 |
+
tion has emerged as an interesting field to replace this labori-
|
39 |
+
ous process (Wang & O’Boyle, 2018). Along this line, many
|
40 |
+
*Equal contribution
|
41 |
+
1University of California, San Diego
|
42 |
+
2Meta AI. Correspondence to:
|
43 |
+
Kevin Stone
|
44 |
+
<kevinlee-
|
45 | |
46 |
+
works show promising results using various machine learn-
|
47 |
+
ing (ML) techniques and optimizers (e.g., reinforcement
|
48 |
+
learning (Haj-Ali et al., 2020a), language modelling (Cum-
|
49 |
+
mins et al., 2017), evolutionary algorithms (Kulkarni &
|
50 |
+
Cavazos, 2012), etc). They focus on automatic decision-
|
51 |
+
making of specific components in compilation, e.g., op-
|
52 |
+
timizing computational graph of neural network for ML
|
53 |
+
compilers (Zhou et al., 2020), optimizing the loop structure
|
54 |
+
of neural network computations (Steiner et al., 2021), deter-
|
55 |
+
mination of a function to be inlining (MLGO) (Trofin et al.,
|
56 |
+
2021), etc. There are only a few works targeting generic
|
57 |
+
optimization of compilation (Haj-Ali et al., 2020b; Almakki
|
58 |
+
et al., 2022).
|
59 |
+
In this work, we take a different path and explore the pos-
|
60 |
+
sibility of learning policies for more a general aspect of
|
61 |
+
compiler optimization. More specifically, we treat compila-
|
62 |
+
tion optimization as a general sequential decision process,
|
63 |
+
in which each step is to find an additional compiler pass
|
64 |
+
so that when combined with existing passes, can improve
|
65 |
+
specific metrics (e.g., the binary size / running speed of the
|
66 |
+
codebase). Our goal is to learn a policy, named pass policy,
|
67 |
+
to help quickly find the right compiler passes to be used,
|
68 |
+
given the current program and existing passes. We aim to
|
69 |
+
compare with existing handtuned policies in the compiler,
|
70 |
+
e.g., -Oz for code size reduction and “-O3” for running
|
71 |
+
speed optimization. Such policies have been tuned by the
|
72 |
+
domain experts for decades and used extensively in all the
|
73 |
+
computer systems, but are invariant to the program being
|
74 |
+
compiled.
|
75 |
+
As the first contribution, we propose a novel evaluation
|
76 |
+
protocol for compiler pass optimization, named zero-shot
|
77 |
+
generalizability (ZSG), to evaluate learned policies applied
|
78 |
+
to unseen programs. Here “zero-shot” means that each
|
79 |
+
unseen program has never been seen before in the training
|
80 |
+
process, and we allow a fixed number of optimization passes
|
81 |
+
(say 45). The policy is allowed to adjust the passes based
|
82 |
+
on previous outcomes (This includes backtracking if an
|
83 |
+
exploratory step turns out to be sub-optimal.) Compared
|
84 |
+
to previous works (e.g., Autophase (Haj-Ali et al., 2020b),
|
85 |
+
CompilerGym (Cummins et al., 2022), MLGO (Trofin et al.,
|
86 |
+
2021), MLGoPerf (Ashouri et al., 2022)) that run adaptive
|
87 |
+
search algorithms to optimize a set of programs for many
|
88 |
+
hours, we argue that ZSG is a realistic setting for practical
|
89 |
+
arXiv:2301.05104v1 [cs.PL] 9 Jan 2023
|
90 |
+
|
91 |
+
Learning to compile smartly for program size reduction
|
92 |
+
deployment: for most programs except the critical ones,
|
93 |
+
there is a limited time budget to optimize them, and often
|
94 |
+
there is not enough computational resources to fine-tune
|
95 |
+
learned policies for each unseen task separately (e.g., fine-
|
96 |
+
tune setting in GO (Zhou et al., 2020)). While similar metric
|
97 |
+
has been used in previous works (e.g., MLGO and GO), we
|
98 |
+
are the first to test it in more general ML-guided compiler
|
99 |
+
optimizations.
|
100 |
+
With the ZSG metric, we then evaluate multiple existing
|
101 |
+
techniques applied to compiler optimization, with LLVM
|
102 |
+
compiler and on large-scale datasets provided by Compiler-
|
103 |
+
Gym (Cummins et al., 2022). We use code-size reduction
|
104 |
+
as the metric since it is a deterministic quality and relatively
|
105 |
+
easy/cheap to compute, and we leave program run-time
|
106 |
+
optimization for future work.
|
107 |
+
Given the metric, we discover a universal core subset of
|
108 |
+
LLVM pass sequences, of size 50, that leads to very strong
|
109 |
+
performance across multiple sets of programs from diverse
|
110 |
+
domains, ranging from Linux Kernel to BLAS library. The
|
111 |
+
total number of steps in the 50 pass sequences is 625 and
|
112 |
+
the average length of the sequences is 12.5. Specifically,
|
113 |
+
for one unseen program, there exists one of the 50 pass
|
114 |
+
sequences that leads to an average code size reduction of
|
115 |
+
5.8% compared to the default -Oz setting, across 10 diverse
|
116 |
+
codebases of over one million programs. In other words,
|
117 |
+
after running trying the 625 steps on an unseen program, the
|
118 |
+
smallest code size during the compilation is 5.8% smaller
|
119 |
+
than that of -Oz. Considering the huge search space of com-
|
120 |
+
piler flags (10104), this is a very surprising finding. We find
|
121 |
+
this coreset in a training set and it can generalize reasonably
|
122 |
+
well to the evaluation set including datasets not including in
|
123 |
+
the training set.
|
124 |
+
While it can be time-consuming to find such a compiler
|
125 |
+
flag configuration with an exhaustive enumeration of the
|
126 |
+
core subset, we find that the optimal pass can be directly
|
127 |
+
predicted with high accuracy via GNN with a customized
|
128 |
+
attention layer to control information flow with the Pro-
|
129 |
+
GraML (Cummins et al., 2021) graph as the input. The
|
130 |
+
prediction top-1 and top-5 accuracy is 75% and 95%. There-
|
131 |
+
fore, we can run a few sequences selected by the model on
|
132 |
+
an unseen program to obtain a good code size reduction.
|
133 |
+
This enables us to find a good flag configuration that leads
|
134 |
+
to 4% improvement on average, with just 45 compilation
|
135 |
+
passes (this is roughly 3 sequences since the average length
|
136 |
+
of the sequences in the coreset is 12.5).
|
137 |
+
We have compared our approach with extensive baselines,
|
138 |
+
including RL-based methods such as PPO and Q-learning
|
139 |
+
and black-box optimizers such as evolutionary algorithm.
|
140 |
+
It turns out that ML approaches often suffer from severe
|
141 |
+
overfitting to the training set and does not perform well
|
142 |
+
for new program categories, even combined with heuristic
|
143 |
+
search, and optimizers may get lost in the exponential action
|
144 |
+
space due to lack of domain knowledge. In comparison, our
|
145 |
+
approach is simple, effective and generalizable to unseen
|
146 |
+
programs.
|
147 |
+
2. Related Work
|
148 |
+
Graph structured data are present in numerous applications
|
149 |
+
and it has been shown that taking advantage of this data
|
150 |
+
can help us train very effective machine learning models.
|
151 |
+
(Brauckmann et al., 2020) use abstract syntax trees and con-
|
152 |
+
trol flow graphs for learning compiler optimization goals.
|
153 |
+
They show that using such graphs allows them to outper-
|
154 |
+
form state-of-the-art in the task of heterogeneous OpenCL
|
155 |
+
mapping. (Guo et al., 2020) uses a transformer based model
|
156 |
+
with a graph guided masked attention that incorporates the
|
157 |
+
data flow graph into the training. They achieve state of the
|
158 |
+
art performance in four tasks including code search, clone
|
159 |
+
detection, code translation, and code refinement.
|
160 |
+
As a contender to graph neural networks, (Mialon et al.,
|
161 |
+
2021) uses transformers to process graphs. They show that
|
162 |
+
if we effectively encode positional and local sub-structures
|
163 |
+
of graphs and feed them to the transformer, then the trans-
|
164 |
+
former can outperform the classical GNN models. They
|
165 |
+
test their model on classification and regression tasks and
|
166 |
+
achieve state of the art performance.
|
167 |
+
In (Srinivas et al.,
|
168 |
+
2020), they used an unsupervised model to learn embed-
|
169 |
+
dings of high dimensional pixel data using contrastive learn-
|
170 |
+
ing. They then use this embedding for downstream rein-
|
171 |
+
forcement learning tasks.
|
172 |
+
3. Methodology
|
173 |
+
3.1. Action space
|
174 |
+
The CompilerGym framework provides a convenient in-
|
175 |
+
terface for the compiler pass ordering problem. The de-
|
176 |
+
fault environment allows choosing one of 124 discrete ac-
|
177 |
+
tions at each step corresponding to running a sequence of
|
178 |
+
specific compiler pass. Given that our trajectories have a
|
179 |
+
length of 45 steps, this means we have 12445 ∼ 1.6 × 1094
|
180 |
+
possible action trajectories to explore. To find an opti-
|
181 |
+
mal action sequence for a program, we can apply some
|
182 |
+
existing reinforcement learning methods including Q learn-
|
183 |
+
ing like DQN (Mnih et al., 2015) and policy gradient like
|
184 |
+
PPO (Schulman et al., 2017).
|
185 |
+
Action Sequences However for this problem it turns out
|
186 |
+
that certain action sequences are good at optimizing many
|
187 |
+
different programs (where “good” is defined as better than
|
188 |
+
the compiler default -Oz). We found that constraining the
|
189 |
+
action space to a learned set of action sequences enables
|
190 |
+
state of the performance and also significantly reduces the
|
191 |
+
challenge of exploration. This allows us to cast the prob-
|
192 |
+
lem as one of supervised learning over this set of action
|
193 |
+
|
194 |
+
Learning to compile smartly for program size reduction
|
195 |
+
Figure 1. An example of a small action tree created by keeping
|
196 |
+
track of the common prefixes of the action sequences.
|
197 |
+
sequences. We use the following algorithm to find a good
|
198 |
+
set of action sequences.
|
199 |
+
• Random search We seed the list of candidate action
|
200 |
+
trajectories (action sequences) by running a random
|
201 |
+
policy on a subset of the training programs (N). For
|
202 |
+
each program we run M episodes and keep track of
|
203 |
+
the best action sequence for each program.
|
204 |
+
• Canonicalize During the search process we find that
|
205 |
+
trajectories often revisit the same state. Whenever this
|
206 |
+
happens we truncate all previous actions. On average
|
207 |
+
this reduces the trajectory length by a factor of 1/5.
|
208 |
+
• All-to-all We then test all N best action sequences
|
209 |
+
against all N programs. This gives us a N×N matrix
|
210 |
+
where each value is the cumulative reward (return). We
|
211 |
+
then normalize this matrix by the maximum return for
|
212 |
+
each program. A value of 1 represents that an action
|
213 |
+
sequences was optimal for a program (optimal in the
|
214 |
+
sense of this limited set of action sequences).
|
215 |
+
• Greedy assignment Many action sequences are opti-
|
216 |
+
mal for more than one program. We take advantage
|
217 |
+
of this to reduce the number of action sequences by
|
218 |
+
greedily picking action sequences that are optimal for
|
219 |
+
the the largest number of programs. This results in a
|
220 |
+
much smaller list of action sequences. We can visual-
|
221 |
+
ize this by creating a prefix tree that shows common
|
222 |
+
prefixes as single node. See Figure 1 for truncated tree
|
223 |
+
for illustration.
|
224 |
+
It is interesting to note that some actions are common across
|
225 |
+
the beginning of multiple action sequences. These popular
|
226 |
+
actions such as 27 (-reg2mem) as seen in Figure 1 are
|
227 |
+
pivotal for many programs. For a complete list of all LLVM
|
228 |
+
passes refer to Table 5.
|
229 |
+
3.2. Offline behavior cloning methods
|
230 |
+
Normalized Value Prediction After discovering the “good”
|
231 |
+
action sequences (i.e., the coreset), we can turn the problem
|
232 |
+
of the sequential decision-making on compiler passes into a
|
233 |
+
problem of supervised classification. The target is to train
|
234 |
+
a model to predict the best action sequence conditioned on
|
235 |
+
the program, where the label of the program is the index
|
236 |
+
of the action sequence that results in the highest code size
|
237 |
+
reduction. However, one important observation we have
|
238 |
+
is that there are typically multiple action sequences in the
|
239 |
+
coreset that all result in the highest code size reduction.
|
240 |
+
Therefore, instead of using the single-class classification
|
241 |
+
method with cross entropy loss, we leverage the fact we have
|
242 |
+
access to the values for all action sequences. We predict
|
243 |
+
the softmax normalized value of each action sequence with
|
244 |
+
a cross entropy loss detailed below. We call this approach
|
245 |
+
behavior cloning (BC) over the coreset.
|
246 |
+
For a program o, we roll out all the predefined action se-
|
247 |
+
quences on it, obtaining a return ro
|
248 |
+
i for the i-th sequence
|
249 |
+
(i.e., the highest cumulative reward observed during the
|
250 |
+
rollout of the action sequence), which forms a value vec-
|
251 |
+
tor ro = [ro
|
252 |
+
1, . . . , ro
|
253 |
+
n]. Then, the normalized values of the
|
254 |
+
action sequences are defined by
|
255 |
+
vo = Softmax(ro/T)
|
256 |
+
(1)
|
257 |
+
where T is temperature.
|
258 |
+
For an initial observation so
|
259 |
+
0 of a program, our model out-
|
260 |
+
puts a probability distribution, p = f(so
|
261 |
+
0), over the action
|
262 |
+
sequences. The target of the training is to make p close to
|
263 |
+
the normalized values of the action sequences. We use the
|
264 |
+
cross entropy loss to supervise the model
|
265 |
+
L(po, vo) = −
|
266 |
+
n
|
267 |
+
�
|
268 |
+
i
|
269 |
+
po
|
270 |
+
i log vo
|
271 |
+
i
|
272 |
+
(2)
|
273 |
+
3.3. Program Representation
|
274 |
+
We are considering LLVM optimization passes on that op-
|
275 |
+
erate on the Intermediate Representation (IR) of a program.
|
276 |
+
The IR contains very rich structures, while its size can be
|
277 |
+
quite large for large programs. It also contains informa-
|
278 |
+
tion (e.g., strings and constants) irrelevant to the task we
|
279 |
+
are considering. We found that working with compressed
|
280 |
+
representations made this problem tractable and run in a
|
281 |
+
reasonable amount of time.
|
282 |
+
ProGraML We leverage a graph based representation that
|
283 |
+
encodes semantic information of the program covering three
|
284 |
+
layers: control flow, data flow, and data types. This rep-
|
285 |
+
resentation has the advantage that it is not a fixed size - it
|
286 |
+
does oversimplify large programs - and yet it is still a more
|
287 |
+
compact format than the original IR format.
|
288 |
+
3.4. Network Architecture
|
289 |
+
One of the ways to model our policy function is to use a
|
290 |
+
graph neural network (GNN). To achieve this goal, we use
|
291 |
+
|
292 |
+
53,122,31,36,111,10,97
|
293 |
+
10
|
294 |
+
64,31,10,52,111,116,36,40,48,54,30,53,114,29,120,10
|
295 |
+
36,103,24,53,97,53,38,69,97,57,10,29
|
296 |
+
39,64,55,53,38,122,31,111,64,10,39,21,105,36
|
297 |
+
27
|
298 |
+
104,55,57,26,103,10,29,31,36,120,102,53
|
299 |
+
root
|
300 |
+
29
|
301 |
+
55,39,61,27,41,36,25,103,10
|
302 |
+
30,48,29,120,103,96,47,29,78,21,122,41,36,10
|
303 |
+
72,55,103,36,122,59,30,65,53,10
|
304 |
+
103,102,30,36,61,29,41,71,10,61,41,52Learning to compile smartly for program size reduction
|
305 |
+
1
|
306 |
+
2
|
307 |
+
5
|
308 |
+
3
|
309 |
+
𝑋!"
|
310 |
+
#
|
311 |
+
𝑋!$
|
312 |
+
#
|
313 |
+
𝑋!%
|
314 |
+
#
|
315 |
+
𝑋"&
|
316 |
+
#
|
317 |
+
𝑋"!
|
318 |
+
𝑋%!
|
319 |
+
𝑋$!
|
320 |
+
𝑋&"
|
321 |
+
4
|
322 |
+
Figure 2. Graph attention. Circles denote nodes and solid arrows
|
323 |
+
denote edges. Squares are the calculated features, and dash arrows
|
324 |
+
represent feature aggregation. The orange/green squares denote the
|
325 |
+
features to be aggregated in the target/source nodes of the edges.
|
326 |
+
the ProGraML graph structure proposed in (Cummins et al.,
|
327 |
+
2021) in which individual statements are connected to other
|
328 |
+
statements through relational dependencies. Compared to
|
329 |
+
the approach of treating the program scripts as text and
|
330 |
+
encoding the programs with a language model, using the
|
331 |
+
ProGraML graph representations and encoding them with
|
332 |
+
GNNs has several advantages. Firstly, the long-range de-
|
333 |
+
pendencies of instructions are automatically captured by
|
334 |
+
the edges in the graphs, whereas the NLP approaches need
|
335 |
+
to use an LSTM or Transformer to capture the dependen-
|
336 |
+
cies. An LSTM could lose early memory when the program
|
337 |
+
is long, and a Transformer could cause out of memory is-
|
338 |
+
sues in such cases. Secoundly, changing the names of the
|
339 |
+
variables/constants/functions/classes in a program will not
|
340 |
+
affect its ProGraML representation but will change the rep-
|
341 |
+
resentations in texts. Our goal is to use the structure and
|
342 |
+
relational dependencies of this graph to learn an embed-
|
343 |
+
ding which allows us to learn a better policy. We experi-
|
344 |
+
mented with several different architectures such as Gated
|
345 |
+
Graph Convolutions (Li et al., 2015), Graph Attention Net-
|
346 |
+
works (Veliˇckovi´c et al., 2017), as well as our own custom
|
347 |
+
variation described bellow.
|
348 |
+
Edges types ProGraML supports multiple directed edge
|
349 |
+
types representing control flow, data flow, function call, and
|
350 |
+
data type definition. The other edge features include the
|
351 |
+
integer position of an edge among all the edges pointing
|
352 |
+
to the same node, a boolean feature indicating whether the
|
353 |
+
Notation
|
354 |
+
Meaning
|
355 |
+
E
|
356 |
+
The set of edges in the graph
|
357 |
+
(i, j)
|
358 |
+
Edge from node i pointing to node j
|
359 |
+
X(t)
|
360 |
+
i
|
361 |
+
Repr. of node i at layer t
|
362 |
+
E(t)
|
363 |
+
i→j
|
364 |
+
Repr. of the edge (i, j) at layer t
|
365 |
+
X(t)
|
366 |
+
ij
|
367 |
+
Repr. for node i associated with edge (i, j)
|
368 |
+
X′(t)
|
369 |
+
ij
|
370 |
+
Repr. for node i associated with edge (j, i)
|
371 |
+
a(t)
|
372 |
+
ij
|
373 |
+
Raw attention associated with repr. X(t)
|
374 |
+
ij
|
375 |
+
a′(t)
|
376 |
+
ij
|
377 |
+
Raw attention associated with repr. X′(t)
|
378 |
+
ij
|
379 |
+
α(t)
|
380 |
+
ij
|
381 |
+
Normalized attention associated with a(t)
|
382 |
+
ij
|
383 |
+
α′(t)
|
384 |
+
ij
|
385 |
+
Normalized attention associated with a′(t)
|
386 |
+
ij
|
387 |
+
Ti
|
388 |
+
Target neighbors of node i: {j|(i, j) ∈ E}
|
389 |
+
Si
|
390 |
+
Source neighbors of node i: {j|(j, i) ∈ E}
|
391 |
+
Table 1. The notations in GNN (“Repr.” means representation)
|
392 |
+
two nodes connected by the edge are in the same LLVM
|
393 |
+
basic block, and the distance of the two nodes if they are
|
394 |
+
in the same basic block. Equipped with the rich features of
|
395 |
+
the edges in ProGraML graphs, we propose a dynamic edge
|
396 |
+
encoding approach to capture the edge representations.
|
397 |
+
Dynamic edge representation Most existing GNNs that
|
398 |
+
exploit the edge feature basically use a static edge feature,
|
399 |
+
which means the same edge feature is repeatedly used for
|
400 |
+
all layers. It turns out that it is important to use a dynamic
|
401 |
+
edge representation during graph encoding, where the edge
|
402 |
+
representation gets updated in each GNN layer. The initial
|
403 |
+
edge representations are the concatenations of the embed-
|
404 |
+
ding of edge types, edge positions, and other edge features
|
405 |
+
discussed in the last paragraph.
|
406 |
+
Attention with edge features It was also helpful to modify
|
407 |
+
the default attention mechanism to support these custom
|
408 |
+
edge types. We propose to incorporate the edge features
|
409 |
+
by encoding a triplet containing the features of two nodes
|
410 |
+
and the feature of the edge that connects them. For clar-
|
411 |
+
ity, we show a table containing the notations used in the
|
412 |
+
GNN in Table 1. Then, the feature update process can be
|
413 |
+
mathematically defined by the following equations, where
|
414 |
+
Mi, i = 1, . . . , 5 is an encoding MLP.
|
415 |
+
X′(t+1)
|
416 |
+
ij
|
417 |
+
= M1(X(t)
|
418 |
+
i , E(t)
|
419 |
+
i→j, X(t)
|
420 |
+
j ),
|
421 |
+
(3)
|
422 |
+
a′(t+1)
|
423 |
+
ij
|
424 |
+
= M2(X(t)
|
425 |
+
i , E(t)
|
426 |
+
i→j, X(t)
|
427 |
+
j ),
|
428 |
+
(4)
|
429 |
+
X(t+1)
|
430 |
+
ji
|
431 |
+
= M3(X(t)
|
432 |
+
i , E(t)
|
433 |
+
i→j, X(t)
|
434 |
+
j ),
|
435 |
+
(5)
|
436 |
+
a(t+1)
|
437 |
+
ji
|
438 |
+
= M4(X(t)
|
439 |
+
i , E(t)
|
440 |
+
i→j, X(t)
|
441 |
+
j ),
|
442 |
+
(6)
|
443 |
+
E(t+1)
|
444 |
+
i→j
|
445 |
+
= M5(X(t)
|
446 |
+
i , E(t)
|
447 |
+
i→j, X(t)
|
448 |
+
j ),
|
449 |
+
(7)
|
450 |
+
In words, the 3-tuple, (X(t)
|
451 |
+
i , E(t)
|
452 |
+
i→j, X(t)
|
453 |
+
j ), associated with
|
454 |
+
|
455 |
+
Learning to compile smartly for program size reduction
|
456 |
+
edge (i, j), is encoded by MLPs to output 5 features, includ-
|
457 |
+
ing X′(t+1)
|
458 |
+
ij
|
459 |
+
and a′(t+1)
|
460 |
+
ij
|
461 |
+
(a representation and attention to
|
462 |
+
be aggregated in node i), and X(t+1)
|
463 |
+
ji
|
464 |
+
and a(t+1)
|
465 |
+
ji
|
466 |
+
(a repre-
|
467 |
+
sentation and attention to be aggregated in node j), and the
|
468 |
+
updated edge representation E(t+1)
|
469 |
+
i→j . Note that the features
|
470 |
+
to be aggregated to a target node are marked with the ′, and
|
471 |
+
those to a source node are without the ′. After the feature
|
472 |
+
encoding, we perform an attention-weighted neighborhood
|
473 |
+
aggregation for each node, which can be mathematically
|
474 |
+
described by the following equations.
|
475 |
+
�
|
476 |
+
{α(t+1)
|
477 |
+
ij
|
478 |
+
}j∈Ti ∪ {α′(t+1)
|
479 |
+
ij
|
480 |
+
}j∈Si
|
481 |
+
�
|
482 |
+
= Softmax
|
483 |
+
�
|
484 |
+
{a(t+1)
|
485 |
+
ij
|
486 |
+
}j∈Ti ∪ {a′(t+1)
|
487 |
+
ij
|
488 |
+
}j∈Si
|
489 |
+
�
|
490 |
+
(8)
|
491 |
+
X(t+1)
|
492 |
+
i
|
493 |
+
=
|
494 |
+
�
|
495 |
+
j∈Ti
|
496 |
+
α(t+1)
|
497 |
+
ij
|
498 |
+
X(t+1)
|
499 |
+
ij
|
500 |
+
+
|
501 |
+
�
|
502 |
+
j∈Si
|
503 |
+
α′(t+1)
|
504 |
+
ij
|
505 |
+
X′(t+1)
|
506 |
+
ij
|
507 |
+
(9)
|
508 |
+
3.5. Dataset preparation
|
509 |
+
Overfitting issues could happen if training is performed on
|
510 |
+
a small subset of programs, or the set of programs is not
|
511 |
+
diverse enough. To mitigate this we found it helpful to
|
512 |
+
create an aggregate dataset that uses many different public
|
513 |
+
datasets as curated by CompilerGym. CompilerGym gives
|
514 |
+
us access to 14 different datasets constructed using two
|
515 |
+
different methods.
|
516 |
+
• Curated These are small collections of hand-picked
|
517 |
+
programs. They are curated to be distinct from one
|
518 |
+
another, so splitting curated suites can be challenging.
|
519 |
+
Typically programs are larger as they may comprise
|
520 |
+
multiple source files combined into a single program.
|
521 |
+
These are commonly used for evaluating compiler op-
|
522 |
+
timization improvements.
|
523 |
+
• Uncurated These are comprised of individual source
|
524 |
+
files scraped from open source repositories such as
|
525 |
+
Linux, Tensorflow, or synthetically generated pro-
|
526 |
+
grams, normally targeted for compiler testing (not op-
|
527 |
+
timization). They may not be as ”representative” of
|
528 |
+
human written test programs.
|
529 |
+
For our aggregate dataset we decided to hold-out the entirety
|
530 |
+
of the four curated datasets for use as an out-of-domain test
|
531 |
+
set. This is important because they represent the types of
|
532 |
+
programs we expect to see in the wild. We also split the
|
533 |
+
uncurated datasets into train, validaton, and test programs.
|
534 |
+
3.6. Evaluation
|
535 |
+
For all our metrics and rewards we leverage the IR instruc-
|
536 |
+
tion count as value we are trying to minimize. We also
|
537 |
+
report metrics on each CompilerGym dataset as well as
|
538 |
+
Type
|
539 |
+
Dataset
|
540 |
+
Splits
|
541 |
+
Uncurated
|
542 |
+
anghabench-v1
|
543 |
+
train,val,test
|
544 |
+
blas-v0
|
545 |
+
train,val,test
|
546 |
+
github-v0
|
547 |
+
train,val,test
|
548 |
+
linux-v0
|
549 |
+
train,val,test
|
550 |
+
opencv-v0
|
551 |
+
train,val,test
|
552 |
+
poj104-v1
|
553 |
+
train,val,test
|
554 |
+
tensorflow-v0
|
555 |
+
train,val,test
|
556 |
+
clgen-v0
|
557 |
+
train,val,test
|
558 |
+
csmith-v0
|
559 |
+
train,val,test
|
560 |
+
llvm-stress-v0
|
561 |
+
train,val,test
|
562 |
+
Curated
|
563 |
+
cbench-v1
|
564 |
+
test
|
565 |
+
chstone-v0
|
566 |
+
test
|
567 |
+
mibench-v1
|
568 |
+
test
|
569 |
+
npb-v0
|
570 |
+
test
|
571 |
+
Table 2. CompilerGym dataset types and training splits.
|
572 |
+
the mean over datasets to get a single number to compare
|
573 |
+
overall results.
|
574 |
+
• The mean percent improved over -Oz (MeanOverOz)
|
575 |
+
defined as following:
|
576 |
+
MeanOverOz :=
|
577 |
+
1
|
578 |
+
|P|
|
579 |
+
�
|
580 |
+
p
|
581 |
+
IOz
|
582 |
+
p
|
583 |
+
− Iπθ
|
584 |
+
p
|
585 |
+
IOz
|
586 |
+
p
|
587 |
+
,
|
588 |
+
(10)
|
589 |
+
where p is a specific program from the set of programs
|
590 |
+
P in the dataset. IOz
|
591 |
+
p
|
592 |
+
is the number of IR instructions
|
593 |
+
in program after running the default compiler pass -Oz.
|
594 |
+
Iπθ
|
595 |
+
p
|
596 |
+
is the number of IR instruction in the program after
|
597 |
+
applying the policy under consideration. We can think
|
598 |
+
of this as a simple average of the percent improvement
|
599 |
+
over -Oz.
|
600 |
+
• We
|
601 |
+
also
|
602 |
+
look
|
603 |
+
compare
|
604 |
+
the
|
605 |
+
geometric
|
606 |
+
mean
|
607 |
+
(GMeanOverOz) of final size relative to -Oz.
|
608 |
+
This metric is less sensitive to outliers and is used
|
609 |
+
by (Cummins et al., 2022).
|
610 |
+
GMeanOverOz :=
|
611 |
+
��
|
612 |
+
p
|
613 |
+
IOz
|
614 |
+
p
|
615 |
+
Iπθ
|
616 |
+
p
|
617 |
+
�
|
618 |
+
1
|
619 |
+
|P|
|
620 |
+
(11)
|
621 |
+
4. Experiments
|
622 |
+
4.1. Baselines
|
623 |
+
• Oracle-All We consider a brute-force search over the
|
624 |
+
action tree in order to find the best action sequence for
|
625 |
+
a given program. This gives us an upper-bound of the
|
626 |
+
downstream policy network. In this case the action tree
|
627 |
+
has a total of 625 nodes.
|
628 |
+
|
629 |
+
Learning to compile smartly for program size reduction
|
630 |
+
• Oracle-Top-45 We also consider how well we would
|
631 |
+
do if the oracle is only allowed to use the most popular
|
632 |
+
action sequences but limited to 45 steps. We use 45
|
633 |
+
steps because this is maximum allowed for our all other
|
634 |
+
baselines and our proposed method.
|
635 |
+
• Autophase-RL We start with the strong baseline of us-
|
636 |
+
ing Autophase features. Autophase is a mapping from
|
637 |
+
a program to fixed size feature vector of 54 dimensions.
|
638 |
+
It contains integer counts of various program proper-
|
639 |
+
ties such as number of instructions, maximum loop
|
640 |
+
depth, etc. This is used in combined with a 2-layer
|
641 |
+
MLP model and trained with the PPO algorithm. This
|
642 |
+
is the approach presented in (Haj-Ali et al., 2020b).
|
643 |
+
• Autophase-BC We also consider the performance of
|
644 |
+
using the action sequences combined with a MLP
|
645 |
+
model using Autophase features to isolate the contribu-
|
646 |
+
tion of the GNN from the action sequences search.
|
647 |
+
• GNN-RL We compare with using ProGraML features
|
648 |
+
and our GNN model, but trained with the PPO algo-
|
649 |
+
rithm. This helps motivate the reason for performing
|
650 |
+
the search for action sequences in the first phase.
|
651 |
+
4.2. Results
|
652 |
+
In Table 3 we present the results of our experiments com-
|
653 |
+
paring our proposed model GNN-BC as compared to the
|
654 |
+
various baselines. The test programs were completely held
|
655 |
+
out during both data-driven learning phases (action sequence
|
656 |
+
search and model training).
|
657 |
+
The results show that our model achieves strong perfor-
|
658 |
+
mance over the prior method (Autophase-RL) proposed in
|
659 |
+
(Haj-Ali et al., 2020b). Additionally we can see that both
|
660 |
+
the GNN model and the action sequences were needed to
|
661 |
+
achieve our final performance. See Figure 3 for a visualiza-
|
662 |
+
tion of the improvement in program size over the 45 steps
|
663 |
+
on some of the programs from the holdout set.
|
664 |
+
The Oracle-All shows strong performance but requires a
|
665 |
+
large number of interactions with the compiler. But, this
|
666 |
+
shows that the action sequence search generalizes to new
|
667 |
+
unseen programs. This is somewhat unsurprising given that
|
668 |
+
the compilers built-in hand tuned pass list (-Oz) works
|
669 |
+
reasonably well for most programs.
|
670 |
+
The performance of Oracle-Top-45 by itself is weak show-
|
671 |
+
ing that in order to achieve good results in a reasonable
|
672 |
+
number of passes (45) we need to leverage a general pol-
|
673 |
+
icy and search to select the most likely candidate action
|
674 |
+
sequences to evaluate.
|
675 |
+
Both RL baselines using the original action space of single
|
676 |
+
passes Autophase-RL and GNN-RL performed poorly on
|
677 |
+
the generalization task. We hypothesis that this is partly
|
678 |
+
Method
|
679 |
+
Test MeanOverOz
|
680 |
+
Test GMeanOverOz
|
681 |
+
Compiler (-Oz)
|
682 |
+
0%
|
683 |
+
0
|
684 |
+
Autophase-RL
|
685 |
+
-16.3%
|
686 |
+
0.960
|
687 |
+
Autophase-BC
|
688 |
+
4.2%
|
689 |
+
1.056
|
690 |
+
GNN-RL
|
691 |
+
-9.6%
|
692 |
+
1.005
|
693 |
+
GNN-BC
|
694 |
+
4.7%
|
695 |
+
1.062
|
696 |
+
Oracle-Top-45
|
697 |
+
-7.5%
|
698 |
+
0.992
|
699 |
+
Oracle-All
|
700 |
+
5.8%
|
701 |
+
1.075
|
702 |
+
Table 3. Evaluation results on held out test set averaged over all
|
703 |
+
datasets.
|
704 |
+
due to the challenging exploration problem of the large
|
705 |
+
search space (12445). This is also a very hard setting for RL
|
706 |
+
because each program has its own cumulative reward upper
|
707 |
+
bound (which is unknown even for the training set). This
|
708 |
+
makes approximating the value function very difficult for
|
709 |
+
the baseline RL methods.
|
710 |
+
References
|
711 |
+
Almakki, M., Izzeldin, A., Huang, Q., Ali, A. H., and
|
712 |
+
Cummins, C. Autophase v2: Towards function level
|
713 |
+
phase ordering optimization. In ISCA 2022 Workshop on
|
714 |
+
MLArchSys, 2022.
|
715 |
+
Ashouri, A. H., Elhoushi, M., Hua, Y., Wang, X., Manzoor,
|
716 |
+
M. A., Chan, B., and Gao, Y. Mlgoperf: An ml guided
|
717 |
+
inliner to optimize performance, 2022. URL https:
|
718 |
+
//arxiv.org/abs/2207.08389.
|
719 |
+
Brauckmann, A., Goens, A., Ertel, S., and Castrillon, J.
|
720 |
+
Compiler-based graph representations for deep learning
|
721 |
+
models of code. In CC, pp. 201–211, 2020.
|
722 |
+
Cummins, C., Petoumenos, P., Wang, Z., and Leather, H.
|
723 |
+
End-to-end deep learning of optimization heuristics. In
|
724 |
+
26th International Conference on Parallel Architectures
|
725 |
+
and Compilation Techniques (PACT). IEEE, 2017.
|
726 |
+
Cummins, C., Fisches, Z. V., Ben-Nun, T., Hoefler, T.,
|
727 |
+
O’Boyle, M. F. P., and Leather, H. ProGraML: A Graph-
|
728 |
+
based Program Representation for Data Flow Analysis
|
729 |
+
and Compiler Optimizations. CoRR, ICML, 2021.
|
730 |
+
Cummins, C., Wasti, B., Guo, J., Cui, B., Ansel, J., Gomez,
|
731 |
+
S., Jain, S., Liu, J., Teytaud, O., Steiner, B., et al. Com-
|
732 |
+
pilergym: robust, performant compiler optimization en-
|
733 |
+
vironments for ai research. In 2022 IEEE/ACM Interna-
|
734 |
+
tional Symposium on Code Generation and Optimization
|
735 |
+
(CGO), pp. 92–105. IEEE, 2022.
|
736 |
+
Guo, D., Ren, S., Lu, S., Feng, Z., Tang, D., Liu, S., Zhou,
|
737 |
+
L., Duan, N., Svyatkovskiy, A., Fu, S., et al. Graphcode-
|
738 |
+
|
739 |
+
Learning to compile smartly for program size reduction
|
740 |
+
bert: Pre-training code representations with data flow.
|
741 |
+
arXiv preprint arXiv:2009.08366, 2020.
|
742 |
+
Haj-Ali, A., Ahmed, N. K., Willke, T., Shao, Y. S., Asanovic,
|
743 |
+
K., and Stoica, I. Neurovectorizer: End-to-end vectoriza-
|
744 |
+
tion with deep reinforcement learning. In Proceedings of
|
745 |
+
the 18th ACM/IEEE International Symposium on Code
|
746 |
+
Generation and Optimization, pp. 242–255, 2020a.
|
747 |
+
Haj-Ali, A., Huang, Q. J., Xiang, J., Moses, W., Asanovic,
|
748 |
+
K., Wawrzynek, J., and Stoica, I.
|
749 |
+
Autophase: Jug-
|
750 |
+
gling hls phase orderings in random forests with
|
751 |
+
deep reinforcement learning.
|
752 |
+
In Dhillon, I., Pa-
|
753 |
+
pailiopoulos, D., and Sze, V. (eds.), Proceedings
|
754 |
+
of Machine Learning and Systems, volume 2, pp.
|
755 |
+
70–81, 2020b.
|
756 |
+
URL https://proceedings.
|
757 |
+
mlsys.org/paper/2020/file/
|
758 |
+
4e732ced3463d06de0ca9a15b6153677-Paper.
|
759 |
+
pdf.
|
760 |
+
Kulkarni, S. and Cavazos, J. Mitigating the compiler opti-
|
761 |
+
mization phase-ordering problem using machine learning.
|
762 |
+
In Proceedings of the ACM international conference on
|
763 |
+
Object oriented programming systems languages and ap-
|
764 |
+
plications, pp. 147–162, 2012.
|
765 |
+
Li, Y., Tarlow, D., Brockschmidt, M., and Zemel, R.
|
766 |
+
Gated graph sequence neural networks. arXiv preprint
|
767 |
+
arXiv:1511.05493, 2015.
|
768 |
+
Mialon, G., Chen, D., Selosse, M., and Mairal, J. Graphit:
|
769 |
+
Encoding graph structure in transformers, 2021.
|
770 |
+
Mnih, V., Kavukcuoglu, K., Silver, D., Rusu, A. A., Veness,
|
771 |
+
J., Bellemare, M. G., Graves, A., Riedmiller, M., Fidje-
|
772 |
+
land, A. K., Ostrovski, G., et al. Human-level control
|
773 |
+
through deep reinforcement learning. nature, 518(7540):
|
774 |
+
529–533, 2015.
|
775 |
+
Schulman, J., Wolski, F., Dhariwal, P., Radford, A., and
|
776 |
+
Klimov, O. Proximal policy optimization algorithms.
|
777 |
+
arXiv preprint arXiv:1707.06347, 2017.
|
778 |
+
Srinivas, A., Laskin, M., and Abbeel, P. Curl: Contrastive
|
779 |
+
unsupervised representations for reinforcement learning,
|
780 |
+
2020.
|
781 |
+
Steiner, B., Cummins, C., He, H., and Leather, H. Value
|
782 |
+
Learning for Throughput Optimization of Deep Learning
|
783 |
+
Workloads. In MLSys, 2021.
|
784 |
+
Trofin, M., Qian, Y., Brevdo, E., Lin, Z., Choromanski,
|
785 |
+
K., and Li, D. Mlgo: a machine learning guided com-
|
786 |
+
piler optimizations framework, 2021.
|
787 |
+
URL https:
|
788 |
+
//arxiv.org/abs/2101.04808.
|
789 |
+
Veliˇckovi´c, P., Cucurull, G., Casanova, A., Romero, A.,
|
790 |
+
Lio, P., and Bengio, Y. Graph attention networks. arXiv
|
791 |
+
preprint arXiv:1710.10903, 2017.
|
792 |
+
Wang, Z. and O’Boyle, M. Machine learning in compiler
|
793 |
+
optimization. Proceedings of the IEEE, 106(11):1879–
|
794 |
+
1901, 2018.
|
795 |
+
Zhou, Y., Roy, S., Abdolrashidi, A., Wong, D., Ma, P.,
|
796 |
+
Xu, Q., Liu, H., Phothilimtha, P., Wang, S., Goldie, A.,
|
797 |
+
et al. Transferable graph optimizers for ml compilers.
|
798 |
+
Advances in Neural Information Processing Systems, 33:
|
799 |
+
13844–13855, 2020.
|
800 |
+
|
801 |
+
Learning to compile smartly for program size reduction
|
802 |
+
Figure 3. Program optimization example over many steps comparing the Autophase-RL (blue) approach with our GNN-BC (orange)
|
803 |
+
approach. The dashed line represents the compiler default -Oz performance and higher is better.
|
804 |
+
|
805 |
+
benchmark://cbench-v1/diikstra
|
806 |
+
benchmark://cbench-v1/stringsearch
|
807 |
+
1.5
|
808 |
+
1.0
|
809 |
+
0.5
|
810 |
+
0.0
|
811 |
+
benchmark://cbench-v1/blowifish
|
812 |
+
benchmark://cbench-v1/stringsearch2
|
813 |
+
1.5
|
814 |
+
1.0
|
815 |
+
0.5
|
816 |
+
0.0
|
817 |
+
benchmark://cbench-vl/gsort
|
818 |
+
benchmark://cbench-v1/bitcount
|
819 |
+
1.5
|
820 |
+
1.0
|
821 |
+
0.5
|
822 |
+
0.0
|
823 |
+
benchmark://cbench-y1/rindae!
|
824 |
+
benchmark://cbench-v1/sha
|
825 |
+
1.5
|
826 |
+
1.0
|
827 |
+
0.5
|
828 |
+
0.0
|
829 |
+
i
|
830 |
+
0
|
831 |
+
5
|
832 |
+
10
|
833 |
+
15
|
834 |
+
20
|
835 |
+
25
|
836 |
+
30
|
837 |
+
35
|
838 |
+
40
|
839 |
+
0
|
840 |
+
5
|
841 |
+
10
|
842 |
+
15
|
843 |
+
20
|
844 |
+
25
|
845 |
+
30
|
846 |
+
35
|
847 |
+
40Learning to compile smartly for program size reduction
|
848 |
+
Dataset
|
849 |
+
Oracle-All
|
850 |
+
Oracle-Top-45
|
851 |
+
Autophase-RL
|
852 |
+
Autophase-BC
|
853 |
+
GNN-RL
|
854 |
+
GNN-BC
|
855 |
+
anghabench-v1
|
856 |
+
0.7%/1.011
|
857 |
+
-1.0%/0.996
|
858 |
+
-15.9%/0.974
|
859 |
+
-0.1%/1.002
|
860 |
+
-2.5%/0.988
|
861 |
+
-0.0%/1.003
|
862 |
+
blas-v0
|
863 |
+
2.6%/1.028
|
864 |
+
-0.4%/0.997
|
865 |
+
-1.7%/0.984
|
866 |
+
1.2%/1.013
|
867 |
+
-1.2%/0.989
|
868 |
+
2.4%/1.026
|
869 |
+
cbench-v1
|
870 |
+
3.5%/1.041
|
871 |
+
-2.4%/0.984
|
872 |
+
-10.1%/0.925
|
873 |
+
1.5%/1.021
|
874 |
+
2.4%/1.030
|
875 |
+
2.2%/1.028
|
876 |
+
chstone-v0
|
877 |
+
9.3%/1.106
|
878 |
+
1.2%/1.016
|
879 |
+
1.3%/1.018
|
880 |
+
7.0%/1.079
|
881 |
+
6.4%/1.071
|
882 |
+
8.8%/1.101
|
883 |
+
clgen-v0
|
884 |
+
5.4%/1.060
|
885 |
+
3.1%/1.034
|
886 |
+
-0.5%/0.998
|
887 |
+
4.5%/1.050
|
888 |
+
2.2%/1.024
|
889 |
+
5.0%/1.056
|
890 |
+
csmith-v0
|
891 |
+
21.2%/1.320
|
892 |
+
-96.3%/0.851
|
893 |
+
-116.0%/0.954
|
894 |
+
21.1%/1.318
|
895 |
+
-125.4%/0.994
|
896 |
+
21.1%/1.320
|
897 |
+
github-v0
|
898 |
+
1.0%/1.011
|
899 |
+
0.2%/1.002
|
900 |
+
0.1%/1.001
|
901 |
+
0.9%/1.009
|
902 |
+
0.1%/1.002
|
903 |
+
0.9%/1.010
|
904 |
+
linux-v0
|
905 |
+
0.6%/1.007
|
906 |
+
-0.4%/0.998
|
907 |
+
-0.5%/0.997
|
908 |
+
0.6%/1.006
|
909 |
+
-0.9%/0.996
|
910 |
+
0.6%/1.007
|
911 |
+
llvm-stress-v0
|
912 |
+
6.3%/1.087
|
913 |
+
-18.9%/0.885
|
914 |
+
-67.0%/0.731
|
915 |
+
1.6%/1.040
|
916 |
+
-22.0%/0.872
|
917 |
+
2.1%/1.045
|
918 |
+
mibench-v1
|
919 |
+
1.7%/1.020
|
920 |
+
0.0%/1.003
|
921 |
+
-2.8%/0.976
|
922 |
+
-0.4%/0.999
|
923 |
+
0.6%/1.008
|
924 |
+
-0.1%/1.003
|
925 |
+
npb-v0
|
926 |
+
9.8%/1.159
|
927 |
+
5.7%/1.085
|
928 |
+
0.9%/1.035
|
929 |
+
6.0%/1.088
|
930 |
+
4.8%/1.074
|
931 |
+
5.5%/1.085
|
932 |
+
opencv-v0
|
933 |
+
5.2%/1.061
|
934 |
+
1.0%/1.013
|
935 |
+
0.5%/1.007
|
936 |
+
4.5%/1.054
|
937 |
+
0.7%/1.009
|
938 |
+
4.8%/1.057
|
939 |
+
poj104-v1
|
940 |
+
7.8%/1.105
|
941 |
+
3.9%/1.055
|
942 |
+
-17.5%/0.876
|
943 |
+
5.7%/1.075
|
944 |
+
0.1%/1.014
|
945 |
+
6.3%/1.082
|
946 |
+
tensorflow-v0
|
947 |
+
6.1%/1.077
|
948 |
+
-0.2%/0.998
|
949 |
+
0.2%/1.004
|
950 |
+
5.1%/1.063
|
951 |
+
0.8%/1.011
|
952 |
+
5.9%/1.075
|
953 |
+
Average
|
954 |
+
5.8%/1.075
|
955 |
+
-7.5%/0.992
|
956 |
+
-16.3%/0.960
|
957 |
+
4.2%/1.056
|
958 |
+
-9.6%/1.005
|
959 |
+
4.7%/1.062
|
960 |
+
Table 4. Evaluation results on held out test set averaged over all datasets.
|
961 |
+
|
962 |
+
Learning to compile smartly for program size reduction
|
963 |
+
Index
|
964 |
+
Flag
|
965 |
+
Index
|
966 |
+
Flag
|
967 |
+
Index
|
968 |
+
Flag
|
969 |
+
0
|
970 |
+
-add-discriminators
|
971 |
+
42
|
972 |
+
-globalsplit
|
973 |
+
84
|
974 |
+
-lower-expect
|
975 |
+
1
|
976 |
+
-adce
|
977 |
+
43
|
978 |
+
-guard-widening
|
979 |
+
85
|
980 |
+
-lower-guard-intrinsic
|
981 |
+
2
|
982 |
+
-aggressive-instcombine
|
983 |
+
44
|
984 |
+
-hotcoldsplit
|
985 |
+
86
|
986 |
+
-lowerinvoke
|
987 |
+
3
|
988 |
+
-alignment-from-assumptions
|
989 |
+
45
|
990 |
+
-ipconstprop
|
991 |
+
87
|
992 |
+
-lower-matrix-intrinsics
|
993 |
+
4
|
994 |
+
-always-inline
|
995 |
+
46
|
996 |
+
-ipsccp
|
997 |
+
88
|
998 |
+
-lowerswitch
|
999 |
+
5
|
1000 |
+
-argpromotion
|
1001 |
+
47
|
1002 |
+
-indvars
|
1003 |
+
89
|
1004 |
+
-lower-widenable-condition
|
1005 |
+
6
|
1006 |
+
-attributor
|
1007 |
+
48
|
1008 |
+
-irce
|
1009 |
+
90
|
1010 |
+
-memcpyopt
|
1011 |
+
7
|
1012 |
+
-barrier
|
1013 |
+
49
|
1014 |
+
-infer-address-spaces
|
1015 |
+
91
|
1016 |
+
-mergefunc
|
1017 |
+
8
|
1018 |
+
-bdce
|
1019 |
+
50
|
1020 |
+
-inferattrs
|
1021 |
+
92
|
1022 |
+
-mergeicmps
|
1023 |
+
9
|
1024 |
+
-break-crit-edges
|
1025 |
+
51
|
1026 |
+
-inject-tli-mappings
|
1027 |
+
93
|
1028 |
+
-mldst-motion
|
1029 |
+
10
|
1030 |
+
-simplifycfg
|
1031 |
+
52
|
1032 |
+
-instsimplify
|
1033 |
+
94
|
1034 |
+
-sancov
|
1035 |
+
11
|
1036 |
+
-callsite-splitting
|
1037 |
+
53
|
1038 |
+
-instcombine
|
1039 |
+
95
|
1040 |
+
-name-anon-globals
|
1041 |
+
12
|
1042 |
+
-called-value-propagation
|
1043 |
+
54
|
1044 |
+
-instnamer
|
1045 |
+
96
|
1046 |
+
-nary-reassociate
|
1047 |
+
13
|
1048 |
+
-canonicalize-aliases
|
1049 |
+
55
|
1050 |
+
-jump-threading
|
1051 |
+
97
|
1052 |
+
-newgvn
|
1053 |
+
14
|
1054 |
+
-consthoist
|
1055 |
+
56
|
1056 |
+
-lcssa
|
1057 |
+
98
|
1058 |
+
-pgo-memop-opt
|
1059 |
+
15
|
1060 |
+
-constmerge
|
1061 |
+
57
|
1062 |
+
-licm
|
1063 |
+
99
|
1064 |
+
-partial-inliner
|
1065 |
+
16
|
1066 |
+
-constprop
|
1067 |
+
58
|
1068 |
+
-libcalls-shrinkwrap
|
1069 |
+
100
|
1070 |
+
-partially-inline-libcalls
|
1071 |
+
17
|
1072 |
+
-coro-cleanup
|
1073 |
+
59
|
1074 |
+
-load-store-vectorizer
|
1075 |
+
101
|
1076 |
+
-post-inline-ee-instrument
|
1077 |
+
18
|
1078 |
+
-coro-early
|
1079 |
+
60
|
1080 |
+
-loop-data-prefetch
|
1081 |
+
102
|
1082 |
+
-functionattrs
|
1083 |
+
19
|
1084 |
+
-coro-elide
|
1085 |
+
61
|
1086 |
+
-loop-deletion
|
1087 |
+
103
|
1088 |
+
-mem2reg
|
1089 |
+
20
|
1090 |
+
-coro-split
|
1091 |
+
62
|
1092 |
+
-loop-distribute
|
1093 |
+
104
|
1094 |
+
-prune-eh
|
1095 |
+
21
|
1096 |
+
-correlated-propagation
|
1097 |
+
63
|
1098 |
+
-loop-fusion
|
1099 |
+
105
|
1100 |
+
-reassociate
|
1101 |
+
22
|
1102 |
+
-cross-dso-cfi
|
1103 |
+
64
|
1104 |
+
-loop-guard-widening
|
1105 |
+
106
|
1106 |
+
-redundant-dbg-inst-elim
|
1107 |
+
23
|
1108 |
+
-deadargelim
|
1109 |
+
65
|
1110 |
+
-loop-idiom
|
1111 |
+
107
|
1112 |
+
-rpo-functionattrs
|
1113 |
+
24
|
1114 |
+
-dce
|
1115 |
+
66
|
1116 |
+
-loop-instsimplify
|
1117 |
+
108
|
1118 |
+
-rewrite-statepoints-for-gc
|
1119 |
+
25
|
1120 |
+
-die
|
1121 |
+
67
|
1122 |
+
-loop-interchange
|
1123 |
+
109
|
1124 |
+
-sccp
|
1125 |
+
26
|
1126 |
+
-dse
|
1127 |
+
68
|
1128 |
+
-loop-load-elim
|
1129 |
+
110
|
1130 |
+
-slp-vectorizer
|
1131 |
+
27
|
1132 |
+
-reg2mem
|
1133 |
+
69
|
1134 |
+
-loop-predication
|
1135 |
+
111
|
1136 |
+
-sroa
|
1137 |
+
28
|
1138 |
+
-div-rem-pairs
|
1139 |
+
70
|
1140 |
+
-loop-reroll
|
1141 |
+
112
|
1142 |
+
-scalarizer
|
1143 |
+
29
|
1144 |
+
-early-cse-memssa
|
1145 |
+
71
|
1146 |
+
-loop-rotate
|
1147 |
+
113
|
1148 |
+
-separate-const-offset-from-gep
|
1149 |
+
30
|
1150 |
+
-early-cse
|
1151 |
+
72
|
1152 |
+
-loop-simplifycfg
|
1153 |
+
114
|
1154 |
+
-simple-loop-unswitch
|
1155 |
+
31
|
1156 |
+
-elim-avail-extern
|
1157 |
+
73
|
1158 |
+
-loop-simplify
|
1159 |
+
115
|
1160 |
+
-sink
|
1161 |
+
32
|
1162 |
+
-ee-instrument
|
1163 |
+
74
|
1164 |
+
-loop-sink
|
1165 |
+
116
|
1166 |
+
-speculative-execution
|
1167 |
+
33
|
1168 |
+
-flattencfg
|
1169 |
+
75
|
1170 |
+
-loop-reduce
|
1171 |
+
117
|
1172 |
+
-slsr
|
1173 |
+
34
|
1174 |
+
-float2int
|
1175 |
+
76
|
1176 |
+
-loop-unroll-and-jam
|
1177 |
+
118
|
1178 |
+
-strip-dead-prototypes
|
1179 |
+
35
|
1180 |
+
-forceattrs
|
1181 |
+
77
|
1182 |
+
-loop-unroll
|
1183 |
+
119
|
1184 |
+
-strip-debug-declare
|
1185 |
+
36
|
1186 |
+
-inline
|
1187 |
+
78
|
1188 |
+
-loop-unswitch
|
1189 |
+
120
|
1190 |
+
-strip-nondebug
|
1191 |
+
37
|
1192 |
+
-insert-gcov-profiling
|
1193 |
+
79
|
1194 |
+
-loop-vectorize
|
1195 |
+
121
|
1196 |
+
-strip
|
1197 |
+
38
|
1198 |
+
-gvn-hoist
|
1199 |
+
80
|
1200 |
+
-loop-versioning-licm
|
1201 |
+
122
|
1202 |
+
-tailcallelim
|
1203 |
+
39
|
1204 |
+
-gvn
|
1205 |
+
81
|
1206 |
+
-loop-versioning
|
1207 |
+
123
|
1208 |
+
-mergereturn
|
1209 |
+
40
|
1210 |
+
-globaldce
|
1211 |
+
82
|
1212 |
+
-loweratomic
|
1213 |
+
41
|
1214 |
+
-globalopt
|
1215 |
+
83
|
1216 |
+
-lower-constant-intrinsics
|
1217 |
+
Table 5. A list of LLVM compiler pass indices and their corresponding command line flag.
|
1218 |
+
|
D9E4T4oBgHgl3EQffA2Y/content/tmp_files/load_file.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
DdE1T4oBgHgl3EQfqAWA/content/2301.03338v1.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:42d085cb5f84e37209b3b601ac4ccd533ebd64364eb252aabb9745b351db2f36
|
3 |
+
size 6979065
|