jackkuo commited on
Commit
5e07670
·
verified ·
1 Parent(s): 357acb0

Add files using upload-large-folder tool

Browse files
This view is limited to 50 files because it contains too many changes.   See raw diff
Files changed (50) hide show
  1. -9FJT4oBgHgl3EQfqCwO/content/2301.11602v1.pdf +3 -0
  2. -9FJT4oBgHgl3EQfqCwO/vector_store/index.faiss +3 -0
  3. -9FJT4oBgHgl3EQfqCwO/vector_store/index.pkl +3 -0
  4. -9FST4oBgHgl3EQfczg_/content/2301.13804v1.pdf +3 -0
  5. -9FST4oBgHgl3EQfczg_/vector_store/index.faiss +3 -0
  6. -9FST4oBgHgl3EQfczg_/vector_store/index.pkl +3 -0
  7. .gitattributes +101 -0
  8. 19A0T4oBgHgl3EQfMv_l/content/tmp_files/2301.02138v1.pdf.txt +1192 -0
  9. 19A0T4oBgHgl3EQfMv_l/content/tmp_files/load_file.txt +0 -0
  10. 1tA0T4oBgHgl3EQfMv-f/content/tmp_files/2301.02137v1.pdf.txt +2100 -0
  11. 1tA0T4oBgHgl3EQfMv-f/content/tmp_files/load_file.txt +0 -0
  12. 39E0T4oBgHgl3EQfvAGt/content/2301.02613v1.pdf +3 -0
  13. 39FST4oBgHgl3EQfZTjC/content/2301.13791v1.pdf +3 -0
  14. 39FST4oBgHgl3EQfZTjC/vector_store/index.faiss +3 -0
  15. 39FST4oBgHgl3EQfZTjC/vector_store/index.pkl +3 -0
  16. 3tFST4oBgHgl3EQfZDim/content/tmp_files/2301.13790v1.pdf.txt +0 -0
  17. 3tFST4oBgHgl3EQfZDim/content/tmp_files/load_file.txt +0 -0
  18. 49E1T4oBgHgl3EQfmQS7/vector_store/index.pkl +3 -0
  19. 59E3T4oBgHgl3EQfpgot/content/tmp_files/2301.04642v1.pdf.txt +855 -0
  20. 59E3T4oBgHgl3EQfpgot/content/tmp_files/load_file.txt +0 -0
  21. 5NE1T4oBgHgl3EQfBAIU/content/tmp_files/2301.02845v1.pdf.txt +1784 -0
  22. 5NE1T4oBgHgl3EQfBAIU/content/tmp_files/load_file.txt +0 -0
  23. 5dE3T4oBgHgl3EQfQgnL/content/2301.04414v1.pdf +3 -0
  24. 5dE3T4oBgHgl3EQfQgnL/vector_store/index.pkl +3 -0
  25. 5dE4T4oBgHgl3EQfbwyA/content/2301.05077v1.pdf +3 -0
  26. 5dE4T4oBgHgl3EQfbwyA/vector_store/index.faiss +3 -0
  27. 5dE4T4oBgHgl3EQfbwyA/vector_store/index.pkl +3 -0
  28. 5tFIT4oBgHgl3EQf8CtK/vector_store/index.faiss +3 -0
  29. 79E3T4oBgHgl3EQfRwk1/content/tmp_files/2301.04424v1.pdf.txt +1399 -0
  30. 79E3T4oBgHgl3EQfRwk1/content/tmp_files/load_file.txt +0 -0
  31. 7dE0T4oBgHgl3EQffQBI/content/tmp_files/2301.02401v1.pdf.txt +1848 -0
  32. 7dE0T4oBgHgl3EQffQBI/content/tmp_files/load_file.txt +0 -0
  33. 9NFQT4oBgHgl3EQf5jYf/content/2301.13435v1.pdf +3 -0
  34. 9NFQT4oBgHgl3EQf5jYf/vector_store/index.faiss +3 -0
  35. 9NFQT4oBgHgl3EQf5jYf/vector_store/index.pkl +3 -0
  36. 9dE4T4oBgHgl3EQf3Q3I/content/tmp_files/2301.05305v1.pdf.txt +787 -0
  37. 9dE4T4oBgHgl3EQf3Q3I/content/tmp_files/load_file.txt +426 -0
  38. AtAyT4oBgHgl3EQf3_qJ/content/2301.00779v1.pdf +3 -0
  39. AtAyT4oBgHgl3EQf3_qJ/vector_store/index.faiss +3 -0
  40. AtAyT4oBgHgl3EQf3_qJ/vector_store/index.pkl +3 -0
  41. CNE0T4oBgHgl3EQfgAHQ/content/2301.02413v1.pdf +3 -0
  42. CNE0T4oBgHgl3EQfgAHQ/vector_store/index.faiss +3 -0
  43. CNE0T4oBgHgl3EQfgAHQ/vector_store/index.pkl +3 -0
  44. CdAyT4oBgHgl3EQf4fpA/vector_store/index.faiss +3 -0
  45. CdAyT4oBgHgl3EQf4fpA/vector_store/index.pkl +3 -0
  46. D9E2T4oBgHgl3EQf9gn9/content/2301.04230v1.pdf +3 -0
  47. D9E2T4oBgHgl3EQf9gn9/vector_store/index.pkl +3 -0
  48. D9E4T4oBgHgl3EQffA2Y/content/tmp_files/2301.05104v1.pdf.txt +1218 -0
  49. D9E4T4oBgHgl3EQffA2Y/content/tmp_files/load_file.txt +0 -0
  50. DdE1T4oBgHgl3EQfqAWA/content/2301.03338v1.pdf +3 -0
-9FJT4oBgHgl3EQfqCwO/content/2301.11602v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:fceeb5e3cd95ce51cce63cb1d7c4b25d79508eadf159c72d2c116618a786d499
3
+ size 369741
-9FJT4oBgHgl3EQfqCwO/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:33d3f1464199af0789bdc125b84aefba321bb7efda8a158bbd3dc3268d963d54
3
+ size 4259885
-9FJT4oBgHgl3EQfqCwO/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:9c4adbbec95860dac0aa6cb1923da9e74ae0d9749a8e942f92b3fe153fe7cad1
3
+ size 161119
-9FST4oBgHgl3EQfczg_/content/2301.13804v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:fa7f5dbf1acd01fd75b9ae31d8be40dc6e89ba1dd6fb2713e489367980b6bc95
3
+ size 236409
-9FST4oBgHgl3EQfczg_/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:8f284578e772fc54ea95d955c2f411ea56592984aa38e29fc30e132f3a394442
3
+ size 2752557
-9FST4oBgHgl3EQfczg_/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:aac318c11ebf0b86fee82650b490aecc7dd50de4226bd751044ce925de39a857
3
+ size 115781
.gitattributes CHANGED
@@ -1591,3 +1591,104 @@ QNFPT4oBgHgl3EQfojUh/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -tex
1591
  btFAT4oBgHgl3EQf5R5J/content/2301.08732v1.pdf filter=lfs diff=lfs merge=lfs -text
1592
  gNFKT4oBgHgl3EQftS6b/content/2301.11886v1.pdf filter=lfs diff=lfs merge=lfs -text
1593
  WdE4T4oBgHgl3EQfNAwx/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1591
  btFAT4oBgHgl3EQf5R5J/content/2301.08732v1.pdf filter=lfs diff=lfs merge=lfs -text
1592
  gNFKT4oBgHgl3EQftS6b/content/2301.11886v1.pdf filter=lfs diff=lfs merge=lfs -text
1593
  WdE4T4oBgHgl3EQfNAwx/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1594
+ StE3T4oBgHgl3EQfzQsi/content/2301.04726v1.pdf filter=lfs diff=lfs merge=lfs -text
1595
+ NdAyT4oBgHgl3EQfs_n5/content/2301.00589v1.pdf filter=lfs diff=lfs merge=lfs -text
1596
+ otAyT4oBgHgl3EQflvhP/content/2301.00457v1.pdf filter=lfs diff=lfs merge=lfs -text
1597
+ kb_test/content/2301.00001v1.pdf filter=lfs diff=lfs merge=lfs -text
1598
+ NdAyT4oBgHgl3EQfs_n5/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1599
+ rNE1T4oBgHgl3EQf2wV_/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1600
+ StE3T4oBgHgl3EQfzQsi/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1601
+ n9FST4oBgHgl3EQfMDgV/content/2301.13742v1.pdf filter=lfs diff=lfs merge=lfs -text
1602
+ n9FST4oBgHgl3EQfMDgV/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1603
+ otAyT4oBgHgl3EQflvhP/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1604
+ s9E0T4oBgHgl3EQfbACf/content/2301.02343v1.pdf filter=lfs diff=lfs merge=lfs -text
1605
+ r9E3T4oBgHgl3EQfMwkD/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1606
+ 5tFIT4oBgHgl3EQf8CtK/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1607
+ kb_test/content/test.pdf filter=lfs diff=lfs merge=lfs -text
1608
+ udE2T4oBgHgl3EQfgAc5/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1609
+ V9E5T4oBgHgl3EQfBw5N/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1610
+ cNE5T4oBgHgl3EQffQ_r/content/2301.05626v1.pdf filter=lfs diff=lfs merge=lfs -text
1611
+ V9E5T4oBgHgl3EQfBw5N/content/2301.05389v1.pdf filter=lfs diff=lfs merge=lfs -text
1612
+ -9FJT4oBgHgl3EQfqCwO/content/2301.11602v1.pdf filter=lfs diff=lfs merge=lfs -text
1613
+ s9E0T4oBgHgl3EQfbACf/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1614
+ cNE5T4oBgHgl3EQffQ_r/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1615
+ CNE0T4oBgHgl3EQfgAHQ/content/2301.02413v1.pdf filter=lfs diff=lfs merge=lfs -text
1616
+ kb_test/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1617
+ AtAyT4oBgHgl3EQf3_qJ/content/2301.00779v1.pdf filter=lfs diff=lfs merge=lfs -text
1618
+ kb_test/content/98e2f027-c8ee-45d3-9b9f-9bfd2d232293-01-2018-A[[:space:]]metagenomics[[:space:]]roadmap[[:space:]]to[[:space:]]the[[:space:]]uncultured[[:space:]]genome[[:space:]]diversity[[:space:]]in[[:space:]]hypersaline[[:space:]]soda[[:space:]]lake[[:space:]]sediments.pdf filter=lfs diff=lfs merge=lfs -text
1619
+ ltAyT4oBgHgl3EQfYfdr/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1620
+ uNE2T4oBgHgl3EQffwfX/content/2301.03931v1.pdf filter=lfs diff=lfs merge=lfs -text
1621
+ jNE1T4oBgHgl3EQfgARW/content/2301.03224v1.pdf filter=lfs diff=lfs merge=lfs -text
1622
+ jNE1T4oBgHgl3EQfgARW/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1623
+ -9FJT4oBgHgl3EQfqCwO/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1624
+ xdFIT4oBgHgl3EQf0CtU/content/2301.11367v1.pdf filter=lfs diff=lfs merge=lfs -text
1625
+ HtE3T4oBgHgl3EQfuQsq/content/2301.04682v1.pdf filter=lfs diff=lfs merge=lfs -text
1626
+ uNE2T4oBgHgl3EQffwfX/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1627
+ CNE0T4oBgHgl3EQfgAHQ/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1628
+ xdFIT4oBgHgl3EQf0CtU/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1629
+ 39E0T4oBgHgl3EQfvAGt/content/2301.02613v1.pdf filter=lfs diff=lfs merge=lfs -text
1630
+ htE3T4oBgHgl3EQfgQqz/content/2301.04560v1.pdf filter=lfs diff=lfs merge=lfs -text
1631
+ HtE3T4oBgHgl3EQfuQsq/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1632
+ d9AyT4oBgHgl3EQfjfgx/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1633
+ utAyT4oBgHgl3EQf0vkn/content/2301.00722v1.pdf filter=lfs diff=lfs merge=lfs -text
1634
+ 39FST4oBgHgl3EQfZTjC/content/2301.13791v1.pdf filter=lfs diff=lfs merge=lfs -text
1635
+ KtE1T4oBgHgl3EQfGgOV/content/2301.02915v1.pdf filter=lfs diff=lfs merge=lfs -text
1636
+ ldAzT4oBgHgl3EQfp_0o/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1637
+ o9E0T4oBgHgl3EQfqgFN/content/2301.02553v1.pdf filter=lfs diff=lfs merge=lfs -text
1638
+ qdFKT4oBgHgl3EQfHy2j/content/2301.11731v1.pdf filter=lfs diff=lfs merge=lfs -text
1639
+ N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf filter=lfs diff=lfs merge=lfs -text
1640
+ AtAyT4oBgHgl3EQf3_qJ/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1641
+ udE2T4oBgHgl3EQfgAc5/content/2301.03932v1.pdf filter=lfs diff=lfs merge=lfs -text
1642
+ ldAzT4oBgHgl3EQfp_0o/content/2301.01620v1.pdf filter=lfs diff=lfs merge=lfs -text
1643
+ gNFKT4oBgHgl3EQftS6b/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1644
+ dtE3T4oBgHgl3EQfGwnT/content/2301.04318v1.pdf filter=lfs diff=lfs merge=lfs -text
1645
+ 9NFQT4oBgHgl3EQf5jYf/content/2301.13435v1.pdf filter=lfs diff=lfs merge=lfs -text
1646
+ ntE3T4oBgHgl3EQfLAkR/content/2301.04358v1.pdf filter=lfs diff=lfs merge=lfs -text
1647
+ ntE3T4oBgHgl3EQfLAkR/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1648
+ 39FST4oBgHgl3EQfZTjC/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1649
+ WtE4T4oBgHgl3EQfNAys/content/2301.04953v1.pdf filter=lfs diff=lfs merge=lfs -text
1650
+ N9AzT4oBgHgl3EQfWfwG/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1651
+ JNE0T4oBgHgl3EQfSABV/content/2301.02215v1.pdf filter=lfs diff=lfs merge=lfs -text
1652
+ zNAzT4oBgHgl3EQfQ_ty/content/2301.01208v1.pdf filter=lfs diff=lfs merge=lfs -text
1653
+ ntE2T4oBgHgl3EQfzgi3/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1654
+ -9FST4oBgHgl3EQfczg_/content/2301.13804v1.pdf filter=lfs diff=lfs merge=lfs -text
1655
+ qtE2T4oBgHgl3EQf0whS/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1656
+ kNFPT4oBgHgl3EQfGTRY/content/2301.13003v1.pdf filter=lfs diff=lfs merge=lfs -text
1657
+ zNAzT4oBgHgl3EQfQ_ty/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1658
+ KtE1T4oBgHgl3EQfGgOV/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1659
+ 9NFQT4oBgHgl3EQf5jYf/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1660
+ odFIT4oBgHgl3EQfvCvA/content/2301.11346v1.pdf filter=lfs diff=lfs merge=lfs -text
1661
+ 5dE4T4oBgHgl3EQfbwyA/content/2301.05077v1.pdf filter=lfs diff=lfs merge=lfs -text
1662
+ qtE2T4oBgHgl3EQf0whS/content/2301.04144v1.pdf filter=lfs diff=lfs merge=lfs -text
1663
+ 5dE4T4oBgHgl3EQfbwyA/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1664
+ -9FST4oBgHgl3EQfczg_/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1665
+ MtFAT4oBgHgl3EQfxh5M/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1666
+ kNFPT4oBgHgl3EQfGTRY/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1667
+ k9E_T4oBgHgl3EQf6BwH/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1668
+ Y9AzT4oBgHgl3EQfKvuz/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1669
+ MdFLT4oBgHgl3EQfNC8e/content/2301.12018v1.pdf filter=lfs diff=lfs merge=lfs -text
1670
+ qtAzT4oBgHgl3EQfAvrv/content/2301.00933v1.pdf filter=lfs diff=lfs merge=lfs -text
1671
+ WtE4T4oBgHgl3EQfNAys/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1672
+ t9E_T4oBgHgl3EQf9xwP/content/2301.08382v1.pdf filter=lfs diff=lfs merge=lfs -text
1673
+ MdFLT4oBgHgl3EQfNC8e/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1674
+ KdAyT4oBgHgl3EQfsflO/content/2301.00577v1.pdf filter=lfs diff=lfs merge=lfs -text
1675
+ qdFKT4oBgHgl3EQfHy2j/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1676
+ DdE1T4oBgHgl3EQfqAWA/content/2301.03338v1.pdf filter=lfs diff=lfs merge=lfs -text
1677
+ JNE0T4oBgHgl3EQfSABV/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1678
+ qtAzT4oBgHgl3EQfAvrv/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1679
+ odFIT4oBgHgl3EQfvCvA/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1680
+ kdA0T4oBgHgl3EQfI_9R/content/2301.02083v1.pdf filter=lfs diff=lfs merge=lfs -text
1681
+ xNE5T4oBgHgl3EQfMw6X/content/2301.05484v1.pdf filter=lfs diff=lfs merge=lfs -text
1682
+ MtFAT4oBgHgl3EQfxh5M/content/2301.08687v1.pdf filter=lfs diff=lfs merge=lfs -text
1683
+ T9E3T4oBgHgl3EQfEQll/content/2301.04294v1.pdf filter=lfs diff=lfs merge=lfs -text
1684
+ ttAyT4oBgHgl3EQf0flC/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1685
+ T9E1T4oBgHgl3EQfIQOS/content/2301.02937v1.pdf filter=lfs diff=lfs merge=lfs -text
1686
+ CdAyT4oBgHgl3EQf4fpA/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1687
+ ktFQT4oBgHgl3EQfmza3/content/2301.13367v1.pdf filter=lfs diff=lfs merge=lfs -text
1688
+ ktFQT4oBgHgl3EQfmza3/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1689
+ y9AyT4oBgHgl3EQfn_hb/content/2301.00498v1.pdf filter=lfs diff=lfs merge=lfs -text
1690
+ 5dE3T4oBgHgl3EQfQgnL/content/2301.04414v1.pdf filter=lfs diff=lfs merge=lfs -text
1691
+ kdA0T4oBgHgl3EQfI_9R/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1692
+ xNE5T4oBgHgl3EQfMw6X/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1693
+ L9FIT4oBgHgl3EQfbiuW/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1694
+ D9E2T4oBgHgl3EQf9gn9/content/2301.04230v1.pdf filter=lfs diff=lfs merge=lfs -text
19A0T4oBgHgl3EQfMv_l/content/tmp_files/2301.02138v1.pdf.txt ADDED
@@ -0,0 +1,1192 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ arXiv:2301.02138v1 [math.CO] 5 Jan 2023
2
+ INDUCED SUBGRAPHS AND TREE DECOMPOSITIONS
3
+ VIII. EXCLUDING A FOREST IN (THETA, PRISM)-FREE GRAPHS
4
+ TARA ABRISHAMI∗†, BOGDAN ALECU∗∗¶, MARIA CHUDNOVSKY∗∐, SEPEHR HAJEBI §,
5
+ AND SOPHIE SPIRKL§∥
6
+ Abstract. Given a graph H, we prove that every (theta, prism)-free graph of sufficiently large
7
+ treewidth contains either a large clique or an induced subgraph isomorphic to H, if and only if
8
+ H is a forest.
9
+ 1. Introduction
10
+ All graphs in this paper are finite and simple unless specified otherwise. Let G, H be graphs.
11
+ We say that G contains H if G has an induced subgraph isomorphic to H, and we say G is
12
+ H-free if G does not contain H. For a family H of graphs we say G is H-free if G is H-free
13
+ for every H ∈ H. A class of graphs is hereditary if it is closed under isomorphism and taking
14
+ induced subgraphs, or equivalently, if it is the class of all H-free graphs for some other family
15
+ H of graphs.
16
+ For a graph G = (V (G), E(G)), a tree decomposition (T, χ) of G consists of a tree T and a
17
+ map χ : V (T) → 2V (G) with the following properties:
18
+ (i) For every v ∈ V (G), there exists t ∈ V (T) such that v ∈ χ(t).
19
+ (ii) For every v1v2 ∈ E(G), there exists t ∈ V (T) such that v1, v2 ∈ χ(t).
20
+ (iii) For every v ∈ V (G), the subgraph of T induced by {t ∈ V (T) | v ∈ χ(t)} is connected.
21
+ For each t ∈ V (T), we refer to χ(t) as a bag of (T, χ). The width of a tree decomposition
22
+ (T, χ), denoted by width(T, χ), is maxt∈V (T) |χ(t)| − 1. The treewidth of G, denoted by tw(G),
23
+ is the minimum width of a tree decomposition of G.
24
+ Treewidth was first popularized by Robertson and Seymour in their graph minors project,
25
+ and has attracted a great deal of interest over the past three decades. Particularly, graphs of
26
+ bounded treewidth have been shown to be well-behaved from structural [19] and algorithmic [6]
27
+ viewpoints.
28
+ This motivates investigating the structure of graphs with large treewidth, and especially,
29
+ the substructures emerging in them. The canonical result in this realm is the Grid Theorem
30
+ of Robertson and Seymour [19], the following, which describes the unavoidable subgraphs of
31
+ graphs with large treewidth. For a positive integer t, the (t × t)-wall, denoted by Wt×t, is a
32
+ planar graph with maximum degree three and treewidth t (see Figure 1; a formal definition can
33
+ be found in [3]).
34
+ ∗Princeton University, Princeton, NJ, USA
35
+ ∗∗School of Computing, University of Leeds, Leeds, UK
36
+ §Department of Combinatorics and Optimization, University of Waterloo, Waterloo, Ontario,
37
+ Canada
38
+ † Supported by NSF-EPSRC Grant DMS-2120644.
39
+ ∐ Supported by NSF-EPSRC Grant DMS-2120644 and by AFOSR grant FA9550-22-1-0083.
40
+ ¶ Supported by DMS-EPSRC Grant EP/V002813/1.
41
+ ∥ We acknowledge the support of the Natural Sciences and Engineering Research Council of
42
+ Canada (NSERC), [funding reference number RGPIN-2020-03912]. Cette recherche a été financée
43
+ par le Conseil de recherches en sciences naturelles et en génie du Canada (CRSNG), [numéro de
44
+ référence RGPIN-2020-03912]. This project was funded in part by the Government of Ontario.
45
+ Date: January 6, 2023.
46
+ 1
47
+
48
+ 2
49
+ INDUCED SUBGRAPHS AND TREE DECOMPOSITIONS VIII.
50
+ Figure 1. W5×5
51
+ Theorem 1.1 (Robertson and Seymour [19]). For every integer t ≥ 1 there exists w = w(t) ≥ 1
52
+ such that every graph of treewidth more than w contains a subdivision of Wt×t as a subgraph.
53
+ Theorem 1.1 can also be reformulated into a full characterization of unavoidable minors in
54
+ graphs of large treewidth, that every graph of sufficiently large treewidth contains any given
55
+ planar graph as a minor (and no non-planar graph has this property). In contrast, unavoidable
56
+ induced subgraphs of graphs with large treewidth are far from completely understood. There
57
+ are some natural candidates though, which we refer to as the “basic obstructions”: complete
58
+ graphs and complete bipartite graphs, subdivided walls mentioned above, and line graphs of
59
+ subdivided walls, where the line graph L(F) of a graph F is the graph with vertex set E(F),
60
+ such that two vertices of L(F) are adjacent if and only if the corresponding edges of F share an
61
+ end. Note that the complete graph Kt+1, the complete bipartite graph Kt,t, and the line graph
62
+ of every subdivision of Wt×t all have treewidth t. For a positive integer t, let us say a graph H
63
+ is a t-basic obstruction if H is one of the following graphs: Kt, Kt,t, a subdivision of Wt×t, or
64
+ the line graph of a subdivision of Wt×t. We say a graph G is t-clean if G does not contain a
65
+ t-basic obstruction.
66
+ The basic obstructions do not form a comprehensive list of induced subgraph obstructions
67
+ for bounded treewidth. Equivalently, there are t-clean graphs of arbitrarily large treewidth for
68
+ small values of t. A well-known hereditary class of graphs evidencing this fact is the class of
69
+ even-hole-free graphs, where a hole is an induced cycle on at least four vertices, the length of
70
+ a hole is its number of edges and an even hole is a hole with even length. In fact, for every
71
+ positive integer t ≥ 1, one may observe that an even-hole-free graph is t-clean if and only if it is
72
+ Kt-free. It is therefore tempting to ask whether even-hole-free graphs excluding a fixed complete
73
+ graph have bounded treewidth. Sintiari and Trotignon [20] answered this with a vehement no,
74
+ providing a construction of (even-hole, K4)-free graphs with arbitrarily large treewidth, hence
75
+ proving that there are t-clean (even-hole-free) graphs of arbitrarily large treewidth for every
76
+ fixed t ≥ 4. In addition, graphs from this construction are rather sparse, in the sense that they
77
+ exclude short holes.
78
+ Theorem 1.2 (Sintiari and Trotignon [20]). For all integers w, l ≥ 1, there exists an (even-hole,
79
+ K4)-free graph Gw,l of treewidth more than w and with no hole of length at most l.
80
+ Note that t-clean graphs for t ≤ 2 have empty vertex set or edge set. But one might still
81
+ hope for 3-clean graphs to have bounded treewidth. This is in fact supported by a result from
82
+ [7] asserting that 3-clean even-hole-free graphs have treewidth at most five. However, another
83
+ construction by Sintiari and Trotignon [20] shows that being 3-clean fails to guarantee bounded
84
+ treewidth in the more general class of theta-free graphs (see the next section for the definition of
85
+ a theta; one may check that the every t-basic obstruction for t ≥ 3 contains either a theta or a
86
+ triangle). Indeed, the treewidth of theta-free graphs remains unbounded even when forbidding
87
+ short cycles.
88
+ Theorem 1.3 (Sintiari and Trotignon [20]). For all integers w, g ≥ 1, there exists a theta-free
89
+ graph Gw,g of treewidth more than w and girth more than g.
90
+ A natural question to ask then is what further conditions must be imposed to force bounded
91
+ treewidth in even-hole-free graphs. For instance, graphs from both Theorems 1.2 and 1.3 have
92
+
93
+ INDUCED SUBGRAPHS AND TREE DECOMPOSITIONS VIII.
94
+ 3
95
+ vertices of arbitrarily large degree, and so it was conjectured in [1] that (theta, triangle)-
96
+ free graphs of bounded maximum degree have bounded treewidth and even-hole-free graphs
97
+ of bounded maximum degree have bounded treewidth. These were proved in [3] and [4], respec-
98
+ tively. In the same paper [1], a stronger conjecture was made, asserting that basic obstructions
99
+ are in fact the only obstructions to bounded treewidth in graphs of bounded maximum degree.
100
+ This was later proved in [16], which closed the line of inquiry into graph classes of bounded
101
+ maximum degree.
102
+ Theorem 1.4 (Korhonen [16]). For all integers t, δ ≥ 1, there exists w = w(t, δ) such that every
103
+ t-clean graph of maximum degree at most δ has treewidth at most w.
104
+ Despite its generality, the proof of Theorem 1.4 is surprisingly short. However, the case of
105
+ proper hereditary classes containing graphs of unbounded maximum degree seems to be much
106
+ harder. For graph classes G and H, let us say H modulates G if for every positive integer t,
107
+ there exists a positive integer w(t) (depending on G and H) such that every t-clean H-free graph
108
+ in G has treewidth at most w(t). An induced-subgraph analogue to Theorem 1.1 is therefore
109
+ equivalent to a full characterization of graph classes H which modulate the class of all graphs.
110
+ This remains out of reach, but the special case where |H| = 1 turns out to be more approachable.
111
+ For a graph H and a graph class G, let us say H modulates G if {H} modulates G. Building
112
+ on a method from [17], recently we characterized all graphs H which modulate the class of all
113
+ graphs:
114
+ Theorem 1.5 (Abrishami, Alecu, Chudnovsky, Hajebi and Spirkl [2]). Let H be a graph. Then
115
+ H modulates the class of all graphs if and only if H is a subdivided star forest, that is, a forest
116
+ in which every component has at most one vertex of degree more than two.
117
+ In general, for a hereditary class G containing t-clean graphs of arbitrarily large treewidth for
118
+ small t, one may ask for a characterization of graphs H modulating G. Given Theorem 1.2, a
119
+ natural class G to consider is the class of even-hole-free graphs. Note that Theorem 1.2 shows
120
+ that a graph H modulates even-hole-free graphs only if H is a chordal graph (that is, a graph
121
+ with no hole) of clique number at most three. As far as we know, the converse may also be
122
+ true, that every chordal graph of clique number at most three modulates even-hole-free graphs.
123
+ In fact, in this paper we narrow the gap, showing that every chordal graph of clique number at
124
+ most two, that is, every forest, modulates the class of even-hole-free graphs.
125
+ Theorem 1.6. For every forest H and every integer t ≥ 1, every even-hole-free graph of suffi-
126
+ ciently large treewidth contains either H or a clique of cardinality t.
127
+ This aligns with the observation [21] that every forest is contained in some graph Gw,l from
128
+ Theorem 1.2. As mentioned above, one way to improve on Theorem 1.6 is to push H towards
129
+ being an arbitrary chordal graph of clique number three. Another way to strengthen Theorem 1.6
130
+ is to find a superclass G of even-hole-free graphs for which forests are the only graphs modulating
131
+ G. While the former remains open, we provide an appealing answer to the latter: our main result
132
+ shows that forests are exactly the graphs which modulate the class of (theta, prism)-free graphs
133
+ (see the next section for the definition of a prism; again one may check that in (theta, prism)-free
134
+ graphs, being t-clean is equivalent to being Kt-free for every positive integer t).
135
+ Theorem 1.7. Let H be a graph. Then H modulates (theta, prism)-free graphs if and only if
136
+ H is a forest. In other words, given a graph H, for every integer t ≥ 1, every (theta, prism)-free
137
+ graph of sufficiently large treewidth contains either H or a clique of cardinality t, if and only if
138
+ H is a forest.
139
+ Let C be the class of all (theta, prism)-free graphs. It is easily seen that C contains all even-
140
+ hole-free graphs, and so Theorem 1.7 implies Theorem 1.6. Note that the “only if” direction
141
+ of Theorem 1.7 follows immediately from Theorem 1.3 as prisms contain triangles. Since every
142
+ forest is an induced subgraph of a tree, in order to prove Theorem 1.7, it suffices to prove
143
+
144
+ 4
145
+ INDUCED SUBGRAPHS AND TREE DECOMPOSITIONS VIII.
146
+ Theorem 1.8 below, which we do in Section 7. For a positive integer t and a tree F, we denote
147
+ by Ct the class of all graphs in C with no clique of cardinality t (that is, t-clean graph in C), and
148
+ by Ct(F) the class of all F-free graphs in Ct.
149
+ Theorem 1.8. For every tree F and every integer t ≥ 1, there exists an integer τ(F, t) ≥ 1
150
+ such that every graph in Ct(F) has treewidth at most τ(F, t).
151
+ We conclude this introduction by sketching our proofs (the terms we use here are defined in
152
+ later sections). The proof of Theorem 1.8 begins with a two-step preparation which culminates
153
+ in the proof of Theorem 6.2, a result we will also use in subsequent papers in this series. As the
154
+ first step, inspired by a result from [9], we show that for every graph G ∈ C which contains a
155
+ pyramid with certain conditions on the apex and its neighbors, G admits a construction which we
156
+ call a “(T, a)-strip-structure,” where a is the apex of the pyramid and T is an optimally chosen
157
+ tree. Roughly speaking, we show that G\{a} can be partitioned into two induced subgraphs H
158
+ and J where H is more or less similar to the line graph of the tree T and every vertex in J with a
159
+ neighbor in H attaches at a pyramid lurking in H in a restricted way; we call the latter vertices
160
+ “jewels”. The proof of this theorem occupies Sections 3 and 4. The second step is to employ the
161
+ previous result to show that if G ∈ Ct admits a (C, a)-strip-structure where C is a caterpillar,
162
+ then every vertex in G \ NG[a] can be separated from a by removing a few vertices (our proof
163
+ works more generally when C is any tree of bounded maximum degree, but the caterpillar case
164
+ suffices for our application). We prove this in Section 6. The central difficulty in the proof is to
165
+ deal with the jewels separately. This is surmounted in Section 5 where we prove several results
166
+ concerning the properties of jewels. Most notably, we show that jewels only attach at “local
167
+ areas of the line-graph-like part” of G, and that only a few jewels attach at each local area. This
168
+ concludes the preparation for proving Theorem 1.8.
169
+ Next, we embark on the proof of Theorem 1.8. We assume that G ∈ Ct has large treewidth,
170
+ which together with results from Section 2 implies that G contains two vertices x, y joined by
171
+ many pairwise internally disjoint induced paths P1, . . . , Pm. Now we analyze the structure of
172
+ the graph G[P1 ∪ · · · ∪ Pm]. It turns out that, if m is large enough, then either
173
+ • there are many paths among Pi’s whose union H admits a (C, x)-strip-structure for some
174
+ caterpillar C, or
175
+ • for some large value of d, G[P1 ∪ · · · ∪ Pm] contains a tree S isomorphic to the complete
176
+ bipartite graph K1,d, such that x is the vertex of degree d in S, and for every leaf l of S,
177
+ there are many pairwise internally disjoint induced paths between l and y, such that in
178
+ addition, paths corresponding to distinct leaves of S are also pairwise internally disjoint.
179
+ The former case implies that y can be separated from x by removing few vertices, which using
180
+ a result from Section 6, yields a contradiction with Menger’s theorem. The latter case is the first
181
+ step towards building the large tree in G as a subgraph. We now iterate the argument we just
182
+ described, applying it to each leaf l of S and y, obtaining larger and larger trees. The process is
183
+ stopped once we reach a sufficiently large tree as a subgraph of G. This, combined with the fact
184
+ that G ∈ Ct and a result of Kierstead and Penrice [15], yields the desired tree F as an induced
185
+ subgraph of G.
186
+ This paper is organized as follows. Section 2 covers preliminary definitions as well as some
187
+ results from the literature used in our proofs. Section 3 investigates the behavior of pyramids in
188
+ graphs from C. Section 4 is devoted to defining strip-structures and jewels, and showing how they
189
+ arise from pyramids in graphs in C. Section 5 takes a closer look at jewels for the strip-structures
190
+ obtained in Section 4. In Section 6 we show that admitting certain strip-structures weakens the
191
+ connectivity of most vertices to the apex. Finally, in Section 7, we prove Theorem 1.8.
192
+ 2. Preliminaries and results from the literature
193
+ Let G = (V (G), E(G)) be a graph. For a set X ⊆ V (G) we denote by G[X] the subgraph of
194
+ G induced by X. For X ⊆ V (G)∪E(G), G\X denotes the subgraph of G obtained by removing
195
+
196
+ INDUCED SUBGRAPHS AND TREE DECOMPOSITIONS VIII.
197
+ 5
198
+ X. Note that if X ⊆ V (G), then G \ X denotes the subgraph of G induced by V (G) \ X. In
199
+ this paper, we use induced subgraphs and their vertex sets interchangeably.
200
+ Let x ∈ G and d be a positive integer. We denote by N d
201
+ G(x) the set of all vertices in G at
202
+ distance d from some x, and by N d
203
+ G[x] the set of all vertices in G at distance at most d from x.
204
+ We write NG(x) for N 1
205
+ G(x) and NG[x] for N 1
206
+ G[x]. For an induced subgraph H of G, we define
207
+ NH(x) = NG(x) ∩ H, NH[x] = NG[x] ∩ H. Also, for X ⊆ G, we denote by NG(X) the set of all
208
+ vertices in G \ X with at least one neighbor in X, and define NG[X] = NG(X) ∪ X.
209
+ Let X, Y ⊆ G be disjoint. We say X is complete to Y if all edges with an end in X and an
210
+ end in Y are present in G, and X is anticomplete to Y if there are no edges between X and Y .
211
+ A path in G is an induced subgraph of G that is a path.
212
+ If P is a path in G, we write
213
+ P = p1- · · · -pk to mean that V (P) = {p1, . . . , pk} and pi is adjacent to pj if and only if |i−j| = 1.
214
+ We call the vertices p1 and pk the ends of P, and say that P is from p1 to pk. The interior of
215
+ P, denoted by P ∗, is the set P \ {p1, pk}. The length of a path is its number of edges (so a path
216
+ of length at most one has empty interior). Similarly, if C is a cycle, we write C = c1- · · · -ck-c1
217
+ to mean that V (C) = {c1, . . . , ck} and ci is adjacent to cj if and only if |i − j| ∈ {1, k − 1}. The
218
+ length of a cycle is its number edges (or equivalently, vertices.)
219
+ A theta is a graph Θ consisting of two non-adjacent vertices a, b, called the ends of Θ, and
220
+ three pairwise internally disjoint paths P1, P2, P3 from a to b of length at least two, called the
221
+ paths of Θ, such that P ∗
222
+ 1 , P ∗
223
+ 2 , P ∗
224
+ 3 are pairwise anticomplete to each other. For a graph G, by a
225
+ theta in G we mean an induced subgraph of G which is a theta.
226
+ A prism is a graph Π consisting of two disjoint triangles {a1, a2, a3}, {b1, b2, b3} called the
227
+ triangles of Π, and three pairwise disjoint paths P1, P2, P3 called the paths of Π, where Pi has
228
+ ends ai, bi for each i ∈ {1, 2, 3}, and for distinct i, j ∈ {1, 2, 3}, aiaj and bibj are the only edges
229
+ between Pi and Pj. For a graph G, by a prism in G we mean an induced subgraph of G which
230
+ is a prism.
231
+ A pyramid is a graph Σ consisting of a vertex a, a triangle {b1, b2, b3} and three paths P1, P2, P3
232
+ of length at least one with Pi from a to bi for each i ∈ {1, 2, 3} and otherwise pairwise disjoint,
233
+ such that for distinct i, j ∈ {1, 2, 3}, bibj is the only edge between Pi \ {a} and Pj \ {a}, and
234
+ at most one of P1, P2, P3 has length exactly one. We say that a is the apex of the pyramid and
235
+ b1b2b3 is the base of the pyramid. The pyramid Σ is said to be long if Pi has length more than
236
+ one for every i ∈ {1, 2, 3}. For a graph G, by a pyramid in G we mean an induced subgraph of
237
+ G which is a pyramid.
238
+ Figure 2. Theta, pyramid and prism. The dotted lines represent paths of
239
+ length at least one.
240
+ Let us now mention a few results from the literature which we will use in this paper. Let
241
+ G be a graph. By a separation in G we mean a triple (L, M, R) of pairwise disjoint subsets of
242
+ vertices in G with L ∪ M ∪ R = G, such that neither L nor R is empty and L is anticomplete
243
+ to R in G. Let x, y ∈ G be distinct. We say a set M ⊆ G \ {x, y} separates x and y if there
244
+ exists a separation (L, M, R) in G with x ∈ L and y ∈ R. Also, for disjoint sets X, Y ⊆ G, we
245
+ say a set M ⊆ G \ (X ∪ Y ) separates X and Y if there exists a separation (L, M, R) in G with
246
+ X ⊆ L and Y ⊆ R. If X = {x}, we say that M separates x and Y to mean M separates X and
247
+ Y . Recall the following well-known theorem of Menger [18]:
248
+
249
+ 6
250
+ INDUCED SUBGRAPHS AND TREE DECOMPOSITIONS VIII.
251
+ Theorem 2.1 (Menger [18]). Let k ≥ 1 be an integer, let G be a graph and let x, y ∈ G be
252
+ distinct and non-adjacent. Then either there exists a set M ⊆ G \ {x, y} with |M| < k such that
253
+ M separates x and y, or there are k pairwise internally disjoint paths in G from x to y.
254
+ Let k be a positive integer and let G be a graph. A strong k-block in G is a set B of at least k
255
+ vertices in G such that for every 2-subset {x, y} of B, there exists a collection P{x,y} of at least
256
+ k distinct and pairwise internally disjoint paths in G from x to y, where for every two distinct
257
+ 2-subsets {x, y}, {x′, y′} ⊆ B of G, and every choice of paths P ∈ P{x,y} and P ′ ∈ P{x′,y′}, we
258
+ have P ∩ P ′ = {x, y} ∩ {x′, y′}.
259
+ For a tree T and xy ∈ E(T), we denote by Tx,y the component of T − xy containing x. Let G
260
+ be a graph and (T, χ) be a tree decomposition for G. For every S ⊆ T, let χ(S) = �
261
+ x∈S χ(x).
262
+ By an adhesion of (T, χ) we mean the set χ(x) ∩ χ(y) = χ(Tx,y) ∩ χ(Ty,x) for some xy ∈ E(T).
263
+ For every x ∈ V (T), by the torso at x, denoted by ˆχ(x), we mean the graph obtained from
264
+ the bag χ(x) by, for each y ∈ NT (x), adding an edge between every two non-adjacent vertices
265
+ u, v ∈ χ(x, y). In [2], we used Theorem 1.4 and the following result from [13]:
266
+ Theorem 2.2 (Erde and Weißauer [13], see also [14]). Let r be a positive integer, and let G
267
+ be a graph containing no subdivision of Kr as a subgraph. Then G admits a tree decomposition
268
+ (T, χ) for which the following hold.
269
+ • Every adhesion of (T, χ) has cardinality less than r2.
270
+ • For every x ∈ V (T), either ˆχ(x) has fewer than r2 vertices of degree at least 2r4, or ˆχ(x)
271
+ has no minor isomorphic to K2r2.
272
+ to prove the following.
273
+ Theorem 2.3 (Abrishami, Alecu, Chudnovsky, Hajebi and Spirkl [2]). Let k, t ≥ 1 be integers.
274
+ Then there exists an integer w = w(k, t) ≥ 1 such that every t-clean graph with no strong k-block
275
+ has treewidth at most w.
276
+ Note that for every t ≥ 3, every subdivision of Wt×t contains a theta and the line graph of
277
+ every subdivision of Wt×t contains a prism. It follows that for every t ≥ 1, every graph in Ct is
278
+ t-clean, and so the following is immediate from Theorem 2.3:
279
+ Corollary 2.4. For all integers k, t ≥ 1, there exists an integer β = β(k, t) such that every
280
+ graph in Ct with no strong k-block has treewidth at most β(k, t).
281
+ A vertex v in a graph G is said to be a branch vertex if v has degree more than two. By
282
+ a caterpillar we mean a tree C with maximum degree three such that there is a path P in
283
+ C containing all branch vertices of C (our definition of a caterpillar is non-standard for two
284
+ reasons: a caterpillar is often allowed to be of arbitrary maximum degree, and the path P from
285
+ the definition often contains all vertices of degree more than one). By a subdivided star we mean
286
+ a graph isomorphic to a subdivision of the complete bipartite graph K1,δ for some δ ≥ 3. In
287
+ other words, a subdivided star is a tree with exactly one branch vertex, which we call its root.
288
+ For every graph H, a vertex v of H is said to be simplicial if NH(v) is a clique. We denote by
289
+ Z(H) the set of all simplicial vertices of H. Note that for every tree T, Z(T) is the set of all
290
+ leaves of T. An edge e of a tree T is said to be a leaf-edge of T if e is incident with a leaf of
291
+ T. It follows that if H is the line graph of a tree T, then Z(H) is the set of all vertices in H
292
+ corresponding to the leaf-edges of T. The following is proved in [2] based on (and refining) a
293
+ result from [11].
294
+ Theorem 2.5 (Abrishami, Alecu, Chudnovsky, Hajebi and Spirkl [2]). For every integer h ≥ 1,
295
+ there exists an integer µ = µ(h) ≥ 1 with the following property. Let G be a connected graph
296
+ with no clique of cardinality h and let S ⊆ G such that |S| ≥ µ. Then either some path in G
297
+ contains h vertices from S, or there is an induced subgraph H of G with |H ∩ S| = h for which
298
+ one of the following holds.
299
+ • H is either a caterpillar or the line graph of a caterpillar with H ∩ S = Z(H).
300
+ • H is a subdivided star with root r such that Z(H) ⊆ H ∩ S ⊆ Z(H) ∪ {r}.
301
+
302
+ INDUCED SUBGRAPHS AND TREE DECOMPOSITIONS VIII.
303
+ 7
304
+ 3. Jumps and jewels on pyramids with trapped apices
305
+ For a graph G, an induced subgraph H of G and a vertex a ∈ H, we say a is trapped in H if
306
+ • we have N 2
307
+ G[a] ⊆ H, and;
308
+ • every vertex in NH(a) = NG(a) has degree two in H (and so in G).
309
+ The goal of this section is, for a graph G ∈ C, H ⊆ G and a pyramid Σ in H, to investigate the
310
+ adjacency between Σ and a path in G \ H, assuming that the apex of Σ is trapped in H. This
311
+ will be of essential use in the next section.
312
+ We begin with a few definitions. Let G be a graph and let Σ be a pyramid in G with apex
313
+ a, base b1b2b3 and paths P1, P2, P3. A set X ⊆ Σ is said to be local (in Σ) if either X ⊆ Pi for
314
+ some i ∈ {1, 2, 3} or X ⊆ {b1, b2, b3}. Let P be a path in G \ Σ with (not necessarily distinct)
315
+ ends p1, p2. For i ∈ {1, 2, 3}, we say P is a corner path for Σ at bi if
316
+ • p1 has at least one neighbor in Pi \ {bi};
317
+ • p2 is complete to {b1, b2, b3} \ {bi}, and;
318
+ • except for the edges between {p1, p2} and Σ described in the above two bullets, there is
319
+ no edge with an end in P and an end in Σ \ {bi}.
320
+ By a corner path for Σ we mean a corner path for Σ at one of b1, b2 or b3.
321
+ Let p ∈ G \ Σ. Then p is said to be narrow for Σ if NΣ(p) is local in Σ. Otherwise, we say
322
+ p is wide for Σ. For i ∈ {1, 2, 3}, we say p is a jewel for Σ at bi if p is anticomplete to Pi (in
323
+ particular, p is anticomplete to a), and for every j ∈ {1, 2, 3} \ {i}, we have NPj(p) = NPj[bj].
324
+ By a jewel for Σ we mean a jewel for Σ at one of b1, b2 or b3. Note that if p is either a corner
325
+ path or a jewel for Σ, then p is wide for Σ. The following lemma establishes a converse to this
326
+ fact for graphs in C and pyramids with a trapped apex.
327
+ Lemma 3.1. Let G ∈ C be graph, let H ⊆ G and let a ∈ H be trapped in H. Let Σ be a pyramid
328
+ in H with apex a, base b1b2b3 and paths P1, P2, P3. Let p ∈ G \ H. Then p is wide for Σ if and
329
+ only if p is either a corner path for Σ or a jewel for Σ.
330
+ Proof. We only need to prove the “only if” direction. Assume that p ∈ G \ H is wide for Σ and
331
+ p is not a corner path for Σ. Since a is trapped in H and p ∈ G \ H, it follows that Σ is long
332
+ and p is anticomplete to NΣ[a]. First, we show that:
333
+ (1) There exists i ∈ {1, 2, 3} for which p is anticomplete to Pi.
334
+ Suppose for a contradiction that p has a neighbor in each of P1, P2, P3. Since p is wide for Σ
335
+ and p is not a corner path for Σ, we may assume without loss of generality that p has a neighbor
336
+ in P ∗
337
+ 1 and a neighbor in P ∗
338
+ 2 . For each i ∈ {1, 2, 3}, traversing Pi from a to bi, let xi be the first
339
+ neighbor of p in Pi. Since a is trapped, it follows that x1 ∈ P ∗
340
+ 1 , x2 ∈ P ∗
341
+ 2 and x3 ∈ P3\NΣ[a]. But
342
+ then there is a theta in G with ends a, p and paths a-Pi-xi-p for i ∈ {1, 2, 3}, a contradiction.
343
+ This proves (1).
344
+ By (1) and without loss of generality, we may assume that p is anticomplete to P3. Note that
345
+ since p is wide for Σ, it follows that for every j ∈ {1, 2}, p has a neighbor in Pj, and there exists
346
+ j ∈ {1, 2} for which p has a neighbor in P ∗
347
+ j . For each j ∈ {1, 2}, traversing Pj from a to bj, let xj
348
+ and yj be the first and the last neighbor of p in Pj, respectively. Then we have xj ∈ P ∗
349
+ j \NPj(a)
350
+ for some j ∈ {1, 2}. In fact, the following holds.
351
+ (2) For every j ∈ {1, 2}, we have xj ∈ P ∗
352
+ j \ NPj(a).
353
+ Suppose not. Then since p is wide for Σ, we may assume without loss of generality that p has
354
+ a neighbor in P ∗
355
+ 1 and we have x2 = y2 = b2. But now there is a theta in G with ends a, b2 and
356
+ paths a-P1-x1-p-b2, a-P2-b2 and a-P3-b3-b2, a contradiction. This proves (2).
357
+ (3) For every j ∈ {1, 2}, NPj(p) is a clique of cardinal ity two.
358
+ Suppose not. Then we may assume without loss of generality that either x1 = y1 or x1 and y1
359
+ are distinct and non-adjacent. By (2), for every j ∈ {1, 2}, we have xj ∈ P ∗
360
+ j \NPj(a). Therefore,
361
+
362
+ 8
363
+ INDUCED SUBGRAPHS AND TREE DECOMPOSITIONS VIII.
364
+ if x1 = y1, then there is a theta in G with ends a, x1 and paths a-P1-x1, a-P2-x2-p-x1 and
365
+ a-P3-b3-b1-P1-x1, which is impossible. Thus, x1 and y1 are distinct and non-adjacent. But now
366
+ there is a theta in G with ends a, p and paths a-P1-x1-p, a-P2-x2-p and a-P3-b3-b1-P1-y1-p, a
367
+ contradiction. This proves (3).
368
+ The proof is almost concluded. By (3), for every j ∈ {1, 2}, we have NPj(p) = {xj, yj} and xj
369
+ is adjacent to yj. If yj ∈ P ∗
370
+ j for some j ∈ {1, 2}, then there is a prism in G with triangles xjyjp
371
+ and b1b2b3 and paths xj-Pj-a-P3-b3, yj-Pj-bj and p-y3−j-P3−j-b3−j, a contradiction. Hence, we
372
+ have yj = bj for every j ∈ {1, 2}, and so p is a jewel corner for Σ at bi. This completes the proof
373
+ of Lemma 3.1.
374
+
375
+ We can now prove the main result of this section.
376
+ Theorem 3.2. Let G ∈ C be a graph, let H ⊆ G and let a ∈ H be trapped in H. Let Σ be a
377
+ pyramid in H with apex a, base b1b2b3 and paths P1, P2, P3. Let P be a path in G \ H. Then
378
+ one of the following holds.
379
+ • NΣ(P) is local in Σ.
380
+ • P contains a corner path for Σ.
381
+ • P contains a jewel for Σ.
382
+ Proof. Suppose for a contradiction that there exists a path P in G \ H for which none of the
383
+ outcomes of Theorem 3.2 hold. We choose such a path P with |P| as small as possible. It follows
384
+ that NΣ(P) is not local in Σ, NΣ(X) is local in Σ for every connected set X ⊊ P, P contains
385
+ no corner path for Σ and P contains no jewel for Σ. Therefore, by Lemma 3.1, we have |P| > 1.
386
+ Since a is trapped in H and P ⊆ G\H, it follows that Σ is long and P is anticomplete to NΣ[a].
387
+ For every i ∈ {1, 2, 3}, let P ′
388
+ i = Pi \ NPi[a]. Since NΣ(P) is not local and P is minimal subject
389
+ to this property, we may assume without loss of generality that
390
+ • NΣ(p1) ⊆ P ′
391
+ 1 and p1 has a neighbor in P ′
392
+ 1 \ {b1}, and;
393
+ • p2 has a neighbor in P ′
394
+ 2, and either NΣ(p2) ⊆ P ′
395
+ 2, or NΣ(p2) ⊆ {b1, b2, b3}.
396
+ It follows from the choice of P that P ∗ is anticomplete to Σ\{b1}. For each i ∈ {1, 2}, traversing
397
+ Pi from a to bi, let xi and yi be the first and the last neighbor of pi in Pi, respectively. So we
398
+ have x1 ∈ P ′
399
+ 1 \ {b1}, y1 ∈ P ′
400
+ 1 and x2, y2 ∈ P ′
401
+ 2. In fact, the following holds.
402
+ (4) We have x2 ∈ P ′
403
+ 2 \ {b2}.
404
+ Suppose not. Then we have x2 = y2 = b2, and so b2 ∈ NΣ(p2) ⊆ {b1, b2, b3}. Note that if p2
405
+ is adjacent to b3, then P is a corner path for Σ at b1, which is impossible. So p2 is not adjacent
406
+ to b3. But now there is a theta in G with ends a, b2 and paths a-P1-x1-p1-P-p2-b2, a-P2-b2 and
407
+ a-P3-b3-b2, a contradiction. This proves (4).
408
+ In view of (4) and the choice of P, we conclude that P ∗ is anticomplete to Σ, and for every
409
+ i ∈ {1, 2}, we have NΣ(pi) = NP ′
410
+ i (pi), xi ∈ P ′
411
+ i \ {bi} and yi ∈ P ′
412
+ i.
413
+ (5) For every i ∈ {1, 2}, xi and yi are distinct and adjacent.
414
+ Suppose not. Then we may assume without loss of generality that either x1 = y1 or x1 and
415
+ y1 are distinct and non-adjacent. In the former case, there is a theta in G with ends a, x1 and
416
+ paths a-P1-x1, a-P2-x2-p2-P-p1-x1 and a-P3-b3-b1-P1-x1, which is impossible. It follows that x1
417
+ and y1 are distinct and non-adjacent. But then there is a theta in G with ends a, p1 and paths
418
+ a-P1-x1-p1, a-P2-x2-p2-P-p1 and a-P3-b3-b1-P1-y1-p1, a contradiction. This proves (5).
419
+ By (5), for every i ∈ {1, 2}, we have NPi(p) = {xi, yi} and xi is adjacent to yi. But now there is
420
+ a prism in G with triangles p1x1y1 and p2x2y2 and paths P, x1-P1-a-P2-x2 and y1-P1-b1-b2-P2-y2,
421
+ a contradiction. This completes the proof of Theorem 3.2.
422
+
423
+
424
+ INDUCED SUBGRAPHS AND TREE DECOMPOSITIONS VIII.
425
+ 9
426
+ 4. Strip structures with an ornament of jewels
427
+ The main result of this section, Theorem 4.2, provides a description of the structure of graphs
428
+ in C which have an induced subgraph containing a pyramid with a trapped apex.
429
+ We first set up a framework that allows us to think of a pyramid with apex a as a special case
430
+ of a construction similar to the line graph of a tree T, which we call a “(T, a)-strip-structure.”
431
+ We start with an induced subgraph W of G that admits an “optimal” (T, a)-strip-structure in
432
+ G in a certain sense, and show that the rest of the graph fits into the same construction, except
433
+ for vertices which are jewels for certain canonically positioned pyramids in W.
434
+ First, we need to properly define a strip-structure (this is similar to [8], [9] and [10]). A
435
+ tree T is said to be smooth if T has at least three vertices and every vertex of T is either
436
+ a branch vertex or a leaf.
437
+ Let G be a graph, let a ∈ G, let T be a smooth tree, and let
438
+ η : V (T) ∪ E(T) ∪ (E(T) × V (T)) → 2G\{a} be a function. For every S ⊆ V (T), we define
439
+ η(S) = �
440
+ v∈S,e∈E(T[S])(η(v) ∪ η(e)) and η+(S) = η(S) ∪ {a}. For every vertex v ∈ V (T), we
441
+ define Bη(v) to be the union of all sets η(e, v) taken over all edges e ∈ E(T) incident with v (we
442
+ often omit the subscript η unless there is ambiguity).
443
+ The function η is said to be a (T, a)-strip-structure in G if the following conditions are satisfied.
444
+ (S1) For all distinct o, o′ ∈ V (T) ∪ E(T), we have η(o) ∩ η(o′) = ∅.
445
+ (S2) If l ∈ V (T) is a leaf of T, then η(l) is empty.
446
+ (S3) For all e ∈ E(T) and v ∈ V (T), we have η(e, v) ⊆ η(e) and η(e, v) ̸= ∅ if and only if e is
447
+ incident with v.
448
+ (S4) For all distinct edges e, f ∈ E(T) and every vertex v ∈ V (T), η(e, v) is complete to η(f, v),
449
+ and there are no other edges between η(e) and η(f). In particular, if e and f share no end,
450
+ the η(e) is anticomplete to η(f).
451
+ (S5) For every e ∈ E(T) with ends u, v, define η◦(e) = η(e) \ (η(e, u) ∪ η(e, v)). Then for every
452
+ vertex x ∈ η(e), there is a path in η(e) from x to a vertex in η(e, u) with interior contained
453
+ in η◦(e), and there is a path in η(e) from x to a vertex in η(e, v) with interior contained in
454
+ η◦(e).
455
+ (S6) For all v ∈ V (T) and e ∈ E(T), η(v) is anticomplete to η(e) \ η(e, v). In other words, we
456
+ have Nη(T)(η(v)) ⊆ Bη(v).
457
+ (S7) For every v ∈ V (T) and every connected component D of η(v), we have NBη(v)(D) ̸= ∅.
458
+ (S8) For every leaf l ∈ V (T) of T, assuming e ∈ E(T) to be the leaf-edge of T incident with l,
459
+ a is complete to η(e, l). Also, a has no other neighbors in η(T).
460
+ Let S ⊆ η(T). We say that S is local in η if S ⊆ η(e) for some e ∈ E(T) or S ⊆ Bη(v) ∪ η(v)
461
+ for some v ∈ V (T). The following lemma shows that every non-local subset contains a 2-subset
462
+ (that is, a subset of cardinality two) which is non-local.
463
+ Lemma 4.1. Let G be a graph and a ∈ G. Let T be a smooth tree and η be a (T, a)-strip-
464
+ structure in G. Assume also that C ⊆ η(T) is not local in η. Then there is a 2-subset of C
465
+ which is not local in η.
466
+ Proof. First, suppose there exists a vertex x ∈ C ∩ η◦(e) for some e ∈ E(T). Since C is not
467
+ local, there exists y ∈ C \ η(e). Now {x, y} is a 2-subset of C which is not local in η, as desired.
468
+ Therefore, we may assume that C ⊆ �
469
+ v∈V (T)(B(v) ∪ η(v)). Since the empty set is local in η,
470
+ we have C ̸= ∅; thus, we may pick x ∈ C, v ∈ V (T) and e ∈ E(T) such that x ∈ η(e, v) ∪ η(v).
471
+ If there exists a vertex y ∈ C \ (η(e) ∪ B(v) ∪ η(v)), then {x, y} is a 2-subset of C which is not
472
+ local in η, and so we are done. Consequently, we may assume that C ⊆ η(e) ∪ B(v) ∪ η(v).
473
+ Since C is not local, there exist x′ ∈ η(e) \ (B(v) ∪ η(v))) and y′ ∈ (B(v) ∪ η(v)) \ η(e) such that
474
+ {x′, y′} ⊆ C. Now {x′, y′} is a 2-subset of C which is not local in η, as required. This completes
475
+ the proof of Lemma 4.1.
476
+
477
+ In order to state and prove the main result of this section, we need to define several notions
478
+ related to strip-structures. From here until the statement of Theorem 4.2, let us fix a graph G,
479
+ a vertex a ∈ G, a smooth tree T and a (T, a)-strip-structure η in G.
480
+
481
+ 10
482
+ INDUCED SUBGRAPHS AND TREE DECOMPOSITIONS VIII.
483
+ For every edge e ∈ E(T) with ends u, v, by an η(e)-rung, we mean a path P in η(e) ⊆ η(T)
484
+ for which either |P| = 1 and P ⊆ η(e, u) ∩ η(e, v), or P has an end in η(e, u) \ η(e, v) and an
485
+ end in η(e, v) \ η(e, u) and we have P ∗ ⊆ η◦(e). Equivalently, a path P in η(e) is an η(e)-rung
486
+ if P has an end in η(e, u) and an end in η(e, v) and we have |P ∩ η(e, u)| = |P ∩ η(e, v)| = 1. It
487
+ follows from (S5) that every vertex in η(e) \ η◦(e) is contained in an η(e)-rung. In particular,
488
+ if either η(e, u) ⊆ η(e, v) or η(e, v) ⊆ η(e, u), then η(e, u) = η(e, v). An η(e)-rung is said to be
489
+ long if it is of non-zero length.
490
+ For every edge e ∈ E(T), let ˜η(e) be the set of vertices in η(e) that are not in any η(e)-rung
491
+ (so ˜η(e) ⊆ η◦(e).) We say that η is tame if
492
+ • η(v) = ∅ for every v ∈ V (T), and;
493
+ • ˜η(e) = ∅ for every e ∈ E(T).
494
+ In other words, η is tame if and only if every vertex in η(T) is in an η(e)-rung for some e ∈ E(T).
495
+ For a (T, a)-strip-structure η′ in G, we write η ≤ η′ to mean that for every o ∈ V (T)∪E(T)∪
496
+ (E(T)×V (T)), we have η(o) ⊆ η′(o). We say a (T, a)-strip-structure η is substantial if for every
497
+ e ∈ E(T), there exists a long η(e)-rung in G. Equivalently, η is substantial if for every edge
498
+ e ∈ E(T) with ends u, v, we have η(e, u) ̸= η(e, v), and so η(e, u) \ η(e, v), η(e, v) \ η(e, u) ̸= ∅.
499
+ One may observe that since T has at least three vertices, if η is substantial and η ≤ η′, then η′
500
+ is substantial too.
501
+ We say η is rich if
502
+ • a is trapped in η+(T), and;
503
+ • for every leaf l ∈ V (T) of T, assuming e ∈ E(T) to be the leaf-edge of T incident with
504
+ l, we have |η(e, l)| = 1.
505
+ It follows that if there exists a rich (T, a)-strip-structure η in G, then T has exactly |NG(a)|
506
+ leaves, and for every leaf l ∈ V (T) of T, assuming e ∈ E(T) to be the leaf-edge of T incident
507
+ with l and v ∈ V (T) to be the unique neighbor of l in T, we have η(e, v) ∩ η(e, l) = ∅.
508
+ By a seagull in T we mean a triple (v, e1, e2) where v ∈ V (T) and e1, e2 are two distinct
509
+ edges of T incident with v. By a claw in T we mean a 4-tuple (v, e1, e2, e3) where v ∈ V (T) and
510
+ e1, e2, e3 are three distinct edges of T incident with v.
511
+ Let (v, e1, e2, e3) be a claw in T. By an η-pyramid at (v, e1, e2, e3), we mean a pyramid Σ with
512
+ apex a, base b1b2b3 and paths P1, P2, P3, satisfying the following for each i ∈ {1, 2, 3}.
513
+ • bi ∈ η(ei, v).
514
+ • There exists a leaf li of T with the following properties:
515
+ (1) li belongs to the component of T \ {ei} not containing v.
516
+ (2) Let Λi be the unique path in T from v to li (so ei ∈ E(Λi)). Then Pi = Γi ∪ {a},
517
+ where Γi is a path in �
518
+ e∈E(Λi) η(e) such that Ri = Γi ∩ η(ei) is a long η(ei)-rung
519
+ and Γi ∩ η(e) is a η(e)-rung for each e ∈ E(Λi) \ {ei}.
520
+ In particular, assuming ui to be the ends of ei distinct from v and ci to be the unique vertex in
521
+ NRi(bi) = NPi(bi) for each i ∈ {1, 2, 3}, we have bi ∈ η(ei, v) \ η(ei, ui) and ci ∈ η(ei) \ η(ei, v).
522
+ For a branch vertex v ∈ V (T), by an η-pyramid at v we mean an η-pyramid at (v, e1, e2, e3) for
523
+ some claw (v, e1, e2, e3) in T. Also, by an η-pyramid we mean an η-pyramid at v for some branch
524
+ vertex v ∈ V (T). It follows that every η-pyramid is a long pyramid. Also, if η is substantial,
525
+ then for every claw (v, e1, e2, e3) in T there is a η-pyramid at (v, e1, e2, e3).
526
+ Let (v, e1, e2) be a seagull in T. A vertex p ∈ G\η+(T) is said to be a jewel for η at (v, e1, e2)
527
+ if for some edge e3 ∈ E(T)\{e1, e2} incident with v, there exists an η-pyramid Σ at (v, e1, e2, e3)
528
+ with base b1b2b3 where bi ∈ η(ei, v) for each i ∈ {1, 2, 3}, such that p is a jewel for Σ at b3. In
529
+ particular, for each i ∈ {1, 2}, p is adjacent to bi and the unique vertex ci in NPi(bi). Therefore,
530
+ since Σ is an η-pyramid at (v, e1, e2, e3), assuming ui to be the end of ei distinct from v, it
531
+ follows that p has a neighbor bi ∈ η(ei, v) \ η(ei, ui) and a neighbor ci ∈ η(ei) \ η(ei, v).
532
+ For a vertex v ∈ V (T), by a jewel for η at v we mean a jewel for η at (v, e1, e2) for some
533
+ seagull (v, e1, e2) in T. Also, by a jewel for η we mean a jewel for η at v for some branch vertex
534
+ v ∈ V (T). We denote by Jη the set of all jewels for η. It follows that Jη ⊆ G \ η+(T).
535
+
536
+ INDUCED SUBGRAPHS AND TREE DECOMPOSITIONS VIII.
537
+ 11
538
+ We are now in a position to prove the main result of this section:
539
+ Theorem 4.2. Let G ∈ C, let a ∈ G and let T be a smooth tree. Suppose that there exists
540
+ a tame, substantial and rich (T, a)-strip-structure in G. Then there is a substantial and rich
541
+ (T, a)-strip-structure ζ in G for which G \ (ζ+(T) ∪ Jζ) is anticomplete to ζ+(T).
542
+ Proof. Let η be a tame, substantial and rich (T, a)-strip-structure in G such that η(T) is maximal
543
+ with respect to inclusion. Let M = G \ (η+(T) ∪ Jη).
544
+ (6)
545
+ Let P be a path in M with ends p1 and p2 such that there exists x1 ∈ Nη(T)(p1) and
546
+ x2 ∈ Nη(T)(p2) for which {x1, x2} is not local in η, and such that |P| ≥ 1 is as small as possible
547
+ subject to this property. Then there exists {j1, j2} = {1, 2} and f = v1v2 ∈ E(T) such that
548
+ xj1 ∈ B(vj1) \ η(f) and xj2 ∈ (B(vj2) ∪ η(f)) \ B(vj1).
549
+ Suppose not. For each i ∈ {1, 2}, let ei ∈ E(T) such that xi ∈ η(ei) (hence e1 ̸= e2) and
550
+ si be an end of ei such that there exists a path Λ0 (possibly of length zero) from s1 to s2 in
551
+ T \ {e1, e2}. We claim that there is a vertex v ∈ Λ0 such that B(v) ∩ {x1, x2} = ∅. Suppose first
552
+ that s1 ̸= s2; let v1 be unique neighbor of s1 in Λ0. Then we have x1 /∈ B(v1) and x2 /∈ B(s1).
553
+ Also, since f = s1v1 does not satisfy (6), we have either x1 /∈ B(s1) or x2 /∈ B(v1). But then
554
+ either v = s1 or v = v1 satisfies the claim. Thus, we may assume that v = s1 = s2. Note
555
+ that since neither e1 nor e2 satisfies (6), we have x1 /∈ B(s1) and x2 /∈ B(s2). In other words,
556
+ we have B(v) ∩ {x1, x2} = ∅, and the claim follows. Henceforth, let v be as promised by the
557
+ above claim. For each i ∈ {1, 2}, let ui be the end of ei distinct from si (hence u1 ̸= u2). Let
558
+ Λ = u1-s1-Λ0-s2-u2 and let u′
559
+ 1, u′
560
+ 2 be the neighbors of v in Λ such that Λ traverses u1, u′
561
+ 1, v, u′
562
+ 2, u2
563
+ in this order (so either of u1 = u′
564
+ 1 and u2 = u′
565
+ 2 is possible). Let e′
566
+ i = u′
567
+ iv for each i ∈ {1, 2}. Since
568
+ T is smooth, there exists a vertex u′
569
+ 3 ∈ NT (v) \ Λ; let e′
570
+ 3 = u′
571
+ 3v. For each i ∈ {1, 2, 3}, let Ti be
572
+ the component of T \(NT (v)\{u′
573
+ i}) containing v (so e′
574
+ i ∈ E(Ti)). Then since B(v)∩{x1, x2} = ∅
575
+ and since η is tame and substantial, there exists an η-pyramid Σ at (v, e′
576
+ 1, e′
577
+ 2, e′
578
+ 3) with apex a,
579
+ base b1b2b3 and paths P1, P2, P3 such that we have
580
+ • bi ∈ η(e′
581
+ i, v) and Pi \ {a, bi} ⊆ η(Ti) \ B(v) for each i ∈ {1, 2, 3}, and;
582
+ • xi ∈ P ∗
583
+ i for each i ∈ {1, 2}.
584
+ In particular, the second bullet above implies that NΣ(P) is not local in Σ and P is not a corner
585
+ path for Σ. Since P ⊆ M, we have P ∩ Jη = ∅. Thus, Σ being an η-pyramid, it follows that
586
+ P contains no jewel for Σ. Also, since η is rich, a is trapped in η+(T). Therefore, applying
587
+ Theorem 3.2 to G, H = η+(T), a, Σ and P, we deduce that P contains a corner path for Σ.
588
+ On the other hand, note that by the second bullet above, for every vertex x ∈ Σ \ {a}, either
589
+ {x, x1} or {x, x2} is not local in η. From this, the minimality of |P| and the fact that η is rich,
590
+ it follows that P ∗ is anticomplete to Σ. But then P is a corner path for Σ, a contradiction. This
591
+ proves (6).
592
+ (7) Let P be a path in M with ends p1 and p2 such that there exists x1 ∈ Nη(T)(p1) and
593
+ x2 ∈ Nη(T)(p2) for which {x1, x2} is not local in η, and such that |P| ≥ 1 is as small as possible
594
+ subject to this property. Let f = v1v2 ∈ E(T) and {j1, j2} = {1, 2} be as guaranteed by (6) applied
595
+ to P, x1 and x2. Then we have Nη(T)(P ∗) ⊆ η(f, vj1) and Nη(T)({p1, p2}) ⊆ η(f)∪B(v1)∪B(v2).
596
+ Suppose not. Without loss of generality, we may assume that j1 = 1 and j2 = 2. Note that by
597
+ the minimality of |P|, we have Nη(T)(P ∗) ⊆ η(f, v1). Therefore, one of p1 and p2 has a neighbor
598
+ in η(T) \ (η(f) ∪ B(v1) ∪ B(v2)); say p1 is adjacent to x′
599
+ 1 ∈ η(T) \ (η(f) ∪ B(v1) ∪ B(v2)). For
600
+ each i ∈ {1, 2}, let Ti be the component of T \ {f} containing vi. It follows that there exists
601
+ j ∈ {1, 2} such that x′
602
+ 1 ∈ η(Tj) \ B(vj). Assume that |P| > 1. By the minimality of |P|, we
603
+ have j = 1. But then P, x′
604
+ 1 and x2 violate (6). We deduce that |P| = 1. But now P, x′
605
+ 1 and x3−j
606
+ violate (6). This proves (7).
607
+
608
+ 12
609
+ INDUCED SUBGRAPHS AND TREE DECOMPOSITIONS VIII.
610
+ (8) Let P be a path in M with ends p1 and p2 such that there exists x1 ∈ Nη(T)(p1) and
611
+ x2 ∈ Nη(T)(p2) for which {x1, x2} is not local in η, and such that |P| ≥ 1 is as small as
612
+ possible subject to this property. Suppose that there exist {k1, k2} = {1, 2}, f = v1v2 ∈ E(T)
613
+ and e1 ∈ E(T) \ {f} incident with vk1 such that pk1 has a neighbor in η(e1, vk1) and pk2 has a
614
+ neighbor in (B(vk2) ∪ η(f)) \ B(vk1). Then pk1 is complete to B(vk1) \ (η(e1, vk1) ∪ η(f)).
615
+ Due to symmetry, we may assume that k1 = 1 and k2 = 2. Let e3 ∈ E(T)\{e1, f} be incident
616
+ with v1 and let b3 ∈ η(e3, v1) be arbitrary. We need to show that p1 is adjacent to b3. Suppose
617
+ for a contradiction that p1 and b3 are non-adjacent. Let b1 ∈ η(e1, v1) be adjacent to p1 and let
618
+ x ∈ (B(v2) ∪ η(f)) \ B(v1) be adjacent to p2. Let T2 be the component of T \ (NT (v1) \ {v2})
619
+ containing v1 (so f ∈ E(T2)). Also, for each i ∈ {1, 3}, let ui be the end of ei distinct from v1
620
+ and let Ti be the component of T \ (NT (v1) \ {ui}) containing v1 (so ei ∈ E(Ti)). By (6) and
621
+ (7), there exists an edge f ′ = v′
622
+ 1v′
623
+ 2 ∈ E(T) such that Nη(T)({p1, p2}) ⊆ η(f ′) ∪ B(v′
624
+ 1) ∪ B(v′
625
+ 2).
626
+ This, along with the minimality of |P|, implies that p1 is anticomplete to (η(T1)∪η(T3))\B(v1),
627
+ P \ {p1} is anticomplete to η(T1) ∪ η(T3) and P \ {p2} is anticomplete to η(T2) \ B(v1). Since
628
+ p2 has a neighbor x ∈ (B(v2) ∪ η(f)) \ B(v1) and since η is tame, there exists a path P2 in G
629
+ from a to p2 with P ∗
630
+ 2 ⊆ η(T2) \ B(v1). Also, for each i ∈ {1, 3}, there exists a path Pi in G
631
+ from a to bi with P ∗
632
+ i ⊆ η(Ti) \ B(v1). Note that since η is rich, P anticomplete to NG[a]; in
633
+ particular, P1 has length at least two. But now there is a theta in G with ends a and b1 and
634
+ paths P1, a-P2-p2-P-p1-b1 and b1-b3-P3-a, a contradiction. This proves (8).
635
+ The following is immediate from (8) and the fact that T is smooth.
636
+ (9) Let P be a path in M with ends p1 and p2 such that there exists x1 ∈ Nη(T)(p1) and
637
+ x2 ∈ Nη(T)(p2) for which {x1, x2} is not local in η, and such that |P| ≥ 1 is as small as possible
638
+ subject to this property. Suppose that there exist {k1, k2} = {1, 2} and f = v1v2 ∈ E(T) such that
639
+ xk1 ∈ B(vk1) \ (η(f)) and xk2 ∈ (B(vk2) ∪ η(f)) \ B(vk1). Then pk1 is complete to B(vk1) \ η(f).
640
+ We now deduce:
641
+ (10) Let D be a component of M. Then Nη(T)(D) is local in η.
642
+ Suppose not. By Lemma 4.1, there exist x1, x2 ∈ Nη(T)(D) such that {x1, x2} is not local in η.
643
+ For each i ∈ {1, 2}, let pi be a neighbor of xi in D. Since D is connected, there exists a path P
644
+ in D ⊆ M from p1 to p2. In other words, there exists a path P in M with ends p1, p2 along with
645
+ x1 ∈ Nη(T)(p1) and x2 ∈ Nη(T)(p2) such that {x1, x2} is not local in η. Now, let P be a path in M
646
+ with ends p1 and p2 such that there exists x1 ∈ Nη(T)(p1) and x2 ∈ Nη(T)(p2) for which {x1, x2}
647
+ is not local in η, and such that |P| ≥ 1 is as small as possible subject to this property. So we can
648
+ apply (6) to P, x1 and x2; let {j1, j2} = {1, 2} and f = v1v2 ∈ E(T) be as in (6). We may assume
649
+ without loss of generality that j1 = 1 and j2 = 2; thus, v1 is a branch vertex of T. It follows from
650
+ (7) that Nη(T)(P ∗) ⊆ η(f, v1) and Nη(T)({p1, p2}) ⊆ η(f) ∪ B(v1) ∪ B(v2). By (9) applied to
651
+ k1 = 1 and k2 = 2, p1 is complete to B(v1) \ η(f). Also, from (9) applied to k1 = 2 and k2 = 1,
652
+ it follows that either p2 is complete to B(v2) \ η(f) and B(v2) \ η(f) ̸= ∅, or p2 is anticomplete
653
+ to B(v2) \ η(f). Note that if |P| > 1, then by the minimality of |P|, we have Nη(T)(p1) ⊆ B(v1)
654
+ and Nη(T)(p2) ⊆ (B(v2)∪η(f))\B(v1). Let us define η′ : V (T)∪E(T)∪(E(T)×V (T)) ⊆ 2G\{a}
655
+ as follows. Let η′(f) = η(f) ∪ P and let η′(f, v1) = η(f, v1) ∪ {p1}. Let
656
+ • η′(f, v2) = η(f, v2) ∪ {p2} if p2 is complete to B(v2) \ η(f) and B(v2) \ η(f) ̸= ∅, and;
657
+ • η′(f, v2) = η(f, v2) if p2 is anticomplete to B(v2) \ η(f).
658
+ Let η′ = η elsewhere on V (T) ∪ E(T) ∪ (E(T) × V (T)). Then since η is tame, substantial and
659
+ rich, and p2 is adjacent to x2 ∈ B(v2) ∪ η(f)) \ B(v1), it is straightforward to check that η′
660
+ is also a tame, substantial and rich (T, a)-strip-structure. But we have η′(T) = η(T) ∪ P, a
661
+ contradiction with the maximality of η(T). This proves (10).
662
+ The proof is almost concluded. Let X be the union of all the components D of M such that
663
+ D is anticomplete to η+(T). Since η is rich, it follows that for every component D of M \ X, a
664
+
665
+ INDUCED SUBGRAPHS AND TREE DECOMPOSITIONS VIII.
666
+ 13
667
+ is anticomplete to X and Nη+(T)(D) = Nη(T)(D) is non-empty. By (10), for every component D
668
+ of M \ X, Nη(T)(D) is local in η. Let D be the set of all components D of M \ X for which we
669
+ have Nη+(T)(D) ⊆ Bη(v) for some v ∈ V (T). Breaking the ties arbitrarily and by the definition
670
+ of X, we may write D = �
671
+ v∈V (T) Dv, where
672
+ • for all distinct u, v ∈ V (T), we have Du ∩ Dv = ∅, and;
673
+ • for all v ∈ V (T) and every D ∈ Dv, we have Nη+(T)(D) ⊆ Bη(v) and Nη+(T)(D) ̸= ∅.
674
+ Also, for every e = uv ∈ E(T), let De be the set of all components D of M \ X for which we
675
+ have Nη+(T)(D) ⊆ η(e) and
676
+ • either Nη(T)(D) ∩ η◦(e) ̸= ∅, or;
677
+ • Nη(T)(D) ∩ (η(e, u) \ η(e, v)) ̸= ∅ and Nη(T)(D) ∩ (η(e, v) \ η(e, v)) ̸= ∅.
678
+ From the definition of X, it follows that every component of M \ X belongs to exactly one of
679
+ the sets {Dv, De : v ∈ V (T), e ∈ E(T)} (note that since η is rich, a is anticomplete to each such
680
+ component).
681
+ Let ζ : V (T) ∪ E(T) ∪ (E(T) × V (T)) ⊆ 2G\{a} be defined as follows. For all v ∈ V (T) and
682
+ e ∈ E(T), let
683
+ • ζ(v) = �
684
+ D∈Dv D;
685
+ • ζ(e) = η(e) ∪ (�
686
+ D∈De D), and;
687
+ • ζ(e, v) = η(e, v).
688
+ It is easily seen that ζ satisfies the conditions (S1-S8) from the definition of a (T, a)-strip-
689
+ structure. In particular, since η is rich, ζ satisfies (S2), and from the definitions of X, Dv’s and
690
+ De’s, it follows that ζ satisfies (S5) and (S7). Also, we have η ≤ ζ.
691
+ Now, since η is substantial and rich, since η ≤ ζ and from the definitions of X and ζ, it follows
692
+ that ζ is a substantial and rich (T, a)-strip-structure with Jζ = Jη. Moreover, note that we have
693
+ ζ+(T) = η(T)+ ∪ (M \ X), and so G \ (ζ+(T) ∪ Jζ) = G \ (ζ+(T) ∪ Jη) = X is anticomplete to
694
+ ζ+(T). This completes the proof of Theorem 4.2.
695
+
696
+ 5. Jewels under the loupe
697
+ Here we revisit jewels for strip-structures, establishing several results about their proper-
698
+ ties in various settings. This will help attune Theorem 4.2 for its application in the proof of
699
+ Theorem 6.1.
700
+ First we need to introduce some notation. Let G be a graph and let a ∈ G. Let T be a smooth
701
+ tree and let ζ be a (T, a)-strip-structure in G. Let v ∈ V (T) and let e ∈ E(T) be incident with
702
+ v. We denote by ζe(v) the set of all components D of ζ(v) for which we have NB(v)(D) ⊆ η(e, v),
703
+ or equivalently, Nζ(T)\ζ(e,v)(D) = ∅.
704
+ Let (v, e1, e2) be a seagull in T and let ui be the end of ei distinct from v for each i ∈ {1, 2}.
705
+ We define
706
+ ζ(v, e1, e2) = ζ(e1) ∪ ζ(e2) ∪ ζe1(u1) ∪ ζe2(u2) ∪ ζ(v).
707
+ We denote by Jζ,(v,e1,e2) the set of all jewels for ζ at (v, e1, e2), and for every vertex v ∈ V (T),
708
+ Jζ,v stands for the set of all jewels for η at v. It follows that Jζ,v = ∅ if v is a leaf of T.
709
+ The first result in this section describes, for a (T, a)-strip-structure in a theta-free graph, the
710
+ attachments of jewels at a vertex of T.
711
+ Theorem 5.1. Let G be a theta-free graph and let a ∈ G. Let T be a smooth tree and let ζ be
712
+ a (T, a)-strip-structure in G. Let (v, e1, e2) be a seagull in T and let x ∈ Jζ,(v,e1,e2). Then the
713
+ following hold.
714
+ • We have Nζ+(T)(x) ⊆ ζ(v, e1, e2), and so Nζ+(T)(Jζ,(v,e1,e2)) ⊆ ζ(v, e1, e2). Consequently,
715
+ for every vertex v ∈ V (T), we have Nζ+(T)(Jζ,v) ⊆ ζ(NT [v]), and for every two distinct
716
+ vertices v, v′ ∈ V (T), we have Jζ,v ∩ Jζ,v′ = ∅.
717
+
718
+ 14
719
+ INDUCED SUBGRAPHS AND TREE DECOMPOSITIONS VIII.
720
+ • Assume that ζ is rich. Let i ∈ {1, 2} and let R be a long ζ(ei)-rung, let r be the end of
721
+ R in ζ(ei, v) and let r′ be the unique neighbor of r in R. Then either x is anticomplete
722
+ to R or NR(x) = {r, r′}.
723
+ Proof. Note that v is a branch vertex of T. For each i ∈ {1, 2}, let ui be the end of ei distinct
724
+ from v and let Ti be the component of T \(NT (v)\{ui}) containing v. Let T ′ be the component
725
+ of T \{u1, u2} containing v. Let x ∈ Jζ,(v,e1,e2). Since x ∈ Jζ,(v,e1,e2) is a jewel for ζ, there exists
726
+ an edge e3 ∈ E(T)\{e1, e2} incident with v and a ζ-pyramid Σ at (v, e1, e2, e3) with apex a, base
727
+ b1b2b3 and paths P1, P2, P3 such that x is a jewel for Σ at b3. In particular, for each j ∈ {1, 2, 3},
728
+ Pj ∩ ζ(ej) is a long ζ(ej)-rung Rj with bj as its end in ζ(ej, v).
729
+ Also, x is anticomplete to
730
+ P3 (and so x is not adjacent to a), and for each j ∈ {1, 2}, assuming cj to be the unique
731
+ vertex in NRj(bj) = NPj(bj), x is adjacent to bj ∈ ζ(ej, v) \ ζ(ej, uj) and cj ∈ ζ(ej) \ ζ(ej, v).
732
+ Therefore, there exist paths Qi, Si of length more than one in G from a to x for which we have
733
+ bi ∈ Q∗
734
+ i ⊆ (ζ(T ′) \ ζ(v)) ∪ (ζ(ei, v) \ ζ(ei, ui)) and ci ∈ S∗
735
+ i ⊆ ζ(Ti) \ (B(v) ∪ ζ(ui) ∪ ζ(v)).
736
+ To prove the first assertion of the Theorem 5.1, assume for a contradiction that x has a
737
+ neighbor y ∈ ζ+(T) \ ζ(v, e1, e2). Since x is not adjacent to a, we have y ∈ ζ(T) \ ζ(v, e1, e2).
738
+ First, assume that y ∈ ζ(T ′)\ζ(v). Then by (S5) and (S7) from the definition of a strip-structure,
739
+ there exists a path Q′ of length more than one in G from a to x with Q′∗ ⊆ ζ(T ′) \ ζ(v). But
740
+ now there is a theta in G with ends a, x and paths a-S1-x, a-S2-x and a-Q′-x, a contradiction.
741
+ It follows that y ∈ ζ(T1 ∪ T2) \ ζ(v, e1, e2).
742
+ In other words, for some i ∈ {1, 2}, we have
743
+ y ∈ ζ(Ti) \ (ζ(ei) ∪ ζei(ui) ∪ ζ(v)). As a result, by (S5) and (S7) from the definition a strip-
744
+ structure, and by the definition of ζei(ui), there exists a path S′
745
+ i of length more than one in G
746
+ from a to x with S′∗
747
+ i ⊆ ζ(Ti)\(ζ(ei)∪ζei(ui)∪ζ(v)). But now assuming i′ ∈ {1, 2} to be distinct
748
+ from i, there is a theta in G with ends a, x and paths a-Qi-x, a-S′
749
+ i-x and a-Si′-x, a contradiction.
750
+ This proves the the first assertion.
751
+ Next we prove the second assertion of Theorem 5.1. By symmetry, we may assume that i = 1.
752
+ Assume that x has a neighbor y ∈ R. Let P ′
753
+ 1 = (P1 \ R1) ∪ R. Let Σ′ be the pyramid with
754
+ apex a, base rb2b3 and paths P ′
755
+ 1, P2 and P3. Recall that since ζ is rich, a is trapped in ζ+(T).
756
+ Also, Σ′ is a pyramid in ζ+(T), x is adjacent to y ∈ P ′
757
+ 1, x is adjacent to b2, c2 ∈ P2 and x is
758
+ anticomplete to P3. It follows that x is a wide vertex for Σ′ which is not a corner path for Σ′.
759
+ Now applying Lemma 3.1 to G, a, H = ζ+(T), Σ′ and p = x, we deduce that x is a jewel for Σ′
760
+ at b3, and so NR(x) = NP ′
761
+ 1(x) = {r, r′}. This completes the proof of Theorem 5.1.
762
+
763
+ Our next goal is to show that for every rich (T, a)-strip-structure in a graph G ∈ Ct, there
764
+ are only a few jewels at each vertex of T. Let us begin with a lemma, asserting that for a rich
765
+ (T, a)-strip-structure ζ in a theta-free graph, each set Bζ(v) is almost a clique.
766
+ Lemma 5.2. Let G be a theta-free graph and a ∈ G. Let T be a smooth tree and ζ be a rich
767
+ (T, a)-strip-structure in G. Then for every v ∈ V (T), there exists at most one edge f ∈ E(T)
768
+ such that η(f, v) is not a clique.
769
+ Proof. Suppose for a contradiction that there are two distinct edges f1, f2 ∈ E(T) incident with
770
+ v, and for each i ∈ {1, 2}, there exist xi, yi ∈ ζ(fi, v) such that xi is not adjacent to yi. Then
771
+ v is not a leaf of T and H = x1-x2-y1-y2-x1 is a hole of length four in G. Since ζ is rich, a
772
+ is anticomplete to H. Let f1 = u1v. Let l1 be a leaf of T which belongs to the component of
773
+ T \ {v} containing u1, and let Λ1 be the unique path in T from v to l1 (so f1 ∈ E(Λ1)). Let
774
+ Rx1 be an ζ(f)-rung containing x1 and let Ry1 be an ζ(f)-rung containing y1. Since ζ is rich,
775
+ H1 = Rx1 ∪ Rx2 ∪ B(u1) is a connected induced subgraph of G, and so there is a path Q in H1
776
+ from x1 to y1. It follows that Q has length more than one and Q∗ ⊆ (B(u1) ∪ ζ(f1))\B(v). But
777
+ now there is a theta in G with ends x1, y1 and paths Q, x1-x2-y1 and x1-y2-y1, a contradiction.
778
+ This completes the proof of Lemma 5.2.
779
+
780
+ Recall the following classical result of Ramsey (see, for instance, [5] for an explicit bound.)
781
+
782
+ INDUCED SUBGRAPHS AND TREE DECOMPOSITIONS VIII.
783
+ 15
784
+ Theorem 5.3 (See [5]). For all integers a, b ≥ 1, there exists an integer R = R(a, b) ≥ 1 such
785
+ that every graph G on at least R(a, b) vertices contains either a clique of cardinality a or a stable
786
+ set of cardinality b.
787
+ We can now prove the second main result of this section.
788
+ Theorem 5.4. For all positive integers t, δ, there exists a positive integer j = j(t, δ) with the
789
+ following property. Let G ∈ Ct be a graph and let a ∈ G and let T be a smooth tree of maximum
790
+ degree δ. Let ζ be a rich (T, a)-strip-structure in G. Then for every vertex v ∈ V (T), we have
791
+ |Jζ,v| < j.
792
+ Proof. Let j = j(t, δ) =
793
+ �δ
794
+ 2
795
+ �R(t, 3) with R(·, ·) as in Theorem 5.3.
796
+ Then in order to prove
797
+ |Jζ,v| < j, it is enough to show that |Jζ,(v,e1,e2)| < R(t, 3) for every seagull (v, e1, e2) in T.
798
+ Suppose for a contradiction that |Jζ,(v,e1,e2)| ≥ R(t, 3) for some seagull (v, e1, e2) in T. Then v is
799
+ a branch vertex of T. For each i ∈ {1, 2}, let ui be the end of ei different from v. Since G ∈ Ct,
800
+ it follows from Theorem 5.3 that Jζ,(v,e1,e2) contains a stable set X of cardinality three. For
801
+ every x ∈ X, since x is a jewel for ζ at (v, e1, e2), it follows that for every i ∈ {1, 2}, there exists
802
+ a long ζ(ei)-rung Rx
803
+ i such that Qx
804
+ i = Rx
805
+ i \ ζ(ei, v) is a path in ζ(ei) \ ζ(ei, v) from a neighbor
806
+ of x to a vertex in ζ(ei, ui) \ ζ(ei, v); in particular, Rx
807
+ i contains a neighbor of x. Therefore, for
808
+ each i ∈ {1, 2}, we may pick a non-empty set Ri of long ζ(ei)-rungs such that every vertex in X
809
+ has a neighbor in at least one rung in Ri, and with Ri minimal with respect to inclusion. We
810
+ deduce:
811
+ (11) There exists i ∈ {1, 2} with |Ri| > 1.
812
+ Suppose not. Then for every i ∈ {1, 2}, there exists a long ζ(ei)-rung Si such that every vertex
813
+ in X has a neighbor in Si. Let si be the end of Si in ζ(ei, v) and s′
814
+ i be unique neighbor of si in
815
+ Si. By the second assertion of Theorem 5.1, X is complete to {s′
816
+ 1, s′
817
+ 2}. But now X ∪ {s′
818
+ 1, s′
819
+ 2} is
820
+ a theta in G with ends s′
821
+ 1, s′
822
+ 2, a contradiction. This proves (11).
823
+ By (11) and due to symmetry, we may assume that |R1| > 1.
824
+ This, together with the
825
+ minimality of R1, implies that there exist distinct vertices x, y ∈ X as well as distinct long
826
+ ζ(e1)-rungs Rx, Ry ∈ R1 such that x has a neighbor in Rx, y has a neighbor in Ry, x is
827
+ anticomplete to Ry, and y anticomplete to Rx. Let rx and ry be the ends of Rx and Ry in
828
+ ζ(e1, v), respectively. Let r′
829
+ x be the unique neighbor of rx in Rx and r′
830
+ y be the unique neighbor
831
+ of ry in Ry; so we have r′
832
+ x, r′
833
+ y ∈ ζ(e1) \ ζ(e1, v). By the second assertion of Theorem 5.1, we
834
+ have NRx∪Ry(x) = {rx, r′
835
+ x} and NRx∪Ry(y) = {ry, r′
836
+ y}. It follows that rx, r′
837
+ x ∈ Rx \ Ry and
838
+ ry, r′
839
+ y ∈ Ry \ Rx. Also, rx is anticomplete to Ry \ {ry}, as otherwise (Ry \ {ry}) ∪ {rx} contains
840
+ a long ζ(e1)-rung R with NR(x) = {rx}, which violates the second assertion of Theorem 5.1.
841
+ Similarly, ry is anticomplete to Rx \ {rx}.
842
+ Now, let G1 = G[(B(u1)\ζ(e1, u1))∪((Rx∪Ry)\{rx, ry})] and let G2 = G[(B(u2)\ζ(e2, u2))∪
843
+ Qx
844
+ 2 ∪ Qy
845
+ 2]. Since ζ is rich, the second bullet in the definition of a rich strip-structure implies that
846
+ G1 and G2 are connected. Consequently, there exists a path Q1 in G1 from r′
847
+ x to r′
848
+ y, and there
849
+ exists a path Q2 from x to y with Q∗
850
+ 2 ⊆ G2. Also, since v is a branch vertex of T, we may choose
851
+ an edge e3 ∈ E(T) \ {e1, e2} incident with v. By the first assertion of Theorem 5.1, {x, y} is
852
+ anticomplete to ζ(e3, v). Let Q3 be a path from rx to ry with Q∗
853
+ 3 ⊆ ζ(e3, v) (thus |Q3| ∈ {2, 3}).
854
+ But now there is a prism with triangles xrxr′
855
+ x and yryr′
856
+ y and paths Q1, Q2, Q3, a contradiction.
857
+ This completes the proof of Theorem 5.4.
858
+
859
+ Our last theorem in this section examines the connectivity within G \ ζ+(T) for a (T, a)-
860
+ strip-structure ζ arising from Theorem 4.2. We need the following lemma, the proof of which is
861
+ similar to that of Theorem 5.1.
862
+ Lemma 5.5. Let G be a theta-free graph and let a ∈ G. Let T be a smooth tree and let ζ be a
863
+ (T, a)-strip-structure in G. Let v, v′ ∈ V (T) be distinct and let P be a path in G \ ζ+(T) with
864
+
865
+ 16
866
+ INDUCED SUBGRAPHS AND TREE DECOMPOSITIONS VIII.
867
+ ends x, x′ such that x ∈ Jζ,v, x′ ∈ Jζ,v′ and P ∗ is anticomplete to ζ+(T). Then v and v′ are
868
+ adjacent in T.
869
+ Proof. Suppose not. Note that by Theorem 5.1, x and x′ are distinct. Let Λ be the path in T
870
+ from v to v′. Then Λ has length more than one, and so there are two distinct edges f, f ′ ∈ E(Λ)
871
+ such that f is incident with v and f ′ is incident with v′. Let u be the end of f distinct from
872
+ v and u′ be the end of f ′ distinct from v′. Let (v, e1, e2) and (v′, e′
873
+ 1, e′
874
+ 2) be two seagulls in G
875
+ such that x ∈ Jζ,(v,e1,e2) and x′ ∈ Jζ,(v′,e′
876
+ 1,e′
877
+ 2). For each i ∈ {1, 2}, let ui be the end of ei distinct
878
+ from v and let u′
879
+ i be the end of e′
880
+ i distinct from v′. Without loss of generality, we may assume
881
+ that u2, u′
882
+ 2 /∈ Λ. Let T2 be the component of T \ (NT (v) \ {u2}) containing v and let T ′
883
+ 2 be the
884
+ component of T \(NT (v′)\{u′
885
+ 2}) containing v′. Let T ′ be the component of T \{u′, u′
886
+ 2} containing
887
+ v′. Since x is a jewel for ζ at (v, e1, e2), it follows that x is not adjacent to a, and x has a neighbor
888
+ c ∈ ζ(e2) \ ζ(e2, v) ⊆ ζ(T2) \ (B(v) ∪ ζ(u2) ∪ ζ(v)). Therefore, there exists a path Q of length
889
+ more than one in G from a to x for which we have c ∈ Q∗ ⊆ ζ(T2) \ (B(v) ∪ ζ(u2) ∪ ζ(v)). Also,
890
+ since x′ is a jewel for ζ at (v′, e′
891
+ 1, e′
892
+ 2), it follows that x′ is not adjacent to a, and x′ has a neighbor
893
+ b′ ∈ B(v′)\(ζ(f ′, u′)∪ζ(e′
894
+ 2, v′)) and a neighbor c′ ∈ ζ(e′
895
+ 2)\ζ(e′
896
+ 2, v′) ⊆ ζ(T ′
897
+ 2)\(B(v′)∪ζ(u′
898
+ 2)∪ζ(v′)).
899
+ Therefore, there exist paths P ′, Q′ of length more than one in G from a to x′ for which we have
900
+ b′ ∈ P ′∗ ⊆ (ζ(T ′) \ ζ(v′)) ∪ (ζ(f ′, v′) \ ζ(f ′, u′)) and c′ ∈ Q′∗ ⊆ ζ(T ′
901
+ 2) \ (B(v′) ∪ ζ(u2) ∪ ζ(v′)).
902
+ But now there is a theta in G with ends a, x′ and paths a-P ′-x′, a-Q′-x′ and a-Q-x-P-x′, a
903
+ contradiction. This proves Lemma 5.5.
904
+
905
+ Theorem 5.6. Let t, δ ≥ 1 be integers and let j(t, δ) be as in Theorem 5.4. Let G ∈ Ct be a
906
+ graph and let a ∈ G. Let T be a smooth tree of maximum degree δ and let v ∈ V (T). Let ζ
907
+ be a rich (T, a)-strip-structure in G such that G \ (ζ+(T) ∪ Jζ) is anticomplete to ζ+(T). Let
908
+ x ∈ G \ (ζ+(T) ∪ Jζ). Then there exists Sx ⊆ G \ (ζ+(T) ∪ {x}) such that |Sx| < 2j(t, δ) and Sx
909
+ separates x and Jζ \ ({x} ∪ Sx) in G \ ζ+(T). Consequently, Sx separates x and ζ+(T) in G.
910
+ Proof. By Theorem 5.1, {Jζ,v : v ∈ V (T)} is a partition of Jζ. Let G′ be the graph obtained
911
+ from G\ζ+(T) by contracting the set Jζ,v into a vertex zv for each v ∈ V (T) with Jζ,v ̸= ∅, and
912
+ then adding a new vertex z such that NG′(z) = {zv : v ∈ V (T), Jζ,v ̸= ∅}. We claim that there
913
+ is a set Y ⊆ G′ \ {x, z} of cardinality at most two which separates x and z in G′. Suppose not.
914
+ By Theorem 2.1, there are three pairwise internally disjoint paths in G′ from x to z. Thus, there
915
+ exist S ⊆ T with |S| = 3 as well as three paths {Pv : v ∈ S} in G \ ζ+(T) all having x as an end
916
+ and otherwise disjoint, such that for each v ∈ S, Pv has an end yv ∈ Jζ,v distinct from x, and
917
+ we have P ∗
918
+ v ⊆ G\(ζ+(T) ∪ Jζ). As a result, for all distinct v, v′ ∈ S, Pv,v′ = yv-Pv-x-Pv′-yv′ is a
919
+ path in G\ζ+(T) from yv ∈ Jζ,v to yv′ ∈ Jζ,v′ such that P ∗
920
+ v,v′ ⊆ G\(ζ+(T)∪Jζ). In particular,
921
+ P ∗
922
+ v,v′ is anticomplete to ζ+(T). But then by Lemma 5.5, S is a clique in T, which is impossible.
923
+ The claim follows.
924
+ Let Y be as in the above claim. For each y ∈ Y , if y = zv for some v ∈ V (T), then let
925
+ Ay = Jζ,v. Otherwise, let Ay = {y}. Let Sx = �
926
+ y∈Y Ay. Then Sx ⊆ G\(ζ+(T)∪{x}) separates
927
+ x and Jζ \({x}∪Sx) in G\ζ+(T). Also, by Theorem 5.4, we have |Sx| < 2j(t, δ). This completes
928
+ the proof of Theorem 5.6.
929
+
930
+ 6. Strip structures and connectivity
931
+ In this section, we investigate the connectivity implications of the presence of certain (T, a)-
932
+ strip-structures in graphs from Ct. The main result is the following.
933
+ Theorem 6.1. For all integers t, δ ≥ 1, there exists an integer σ = σ(t, δ) ≥ 1 with the following
934
+ property. Let G ∈ Ct be a graph and let a ∈ G. Let T be a smooth tree of maximum degree δ and
935
+ let ζ be a rich (T, a)-strip-structure in G such that G \ (ζ+(T) ∪ Jζ) is anticomplete to ζ+(T).
936
+ Then for every vertex x ∈ G \ NG[a], there exists a set Sx ⊆ G \ {a, x} with |Sx| < σ such that
937
+ S separates a and x in G.
938
+
939
+ INDUCED SUBGRAPHS AND TREE DECOMPOSITIONS VIII.
940
+ 17
941
+ Proof. Let j(t, δ) be as in Theorem 5.4. We claim that
942
+ σ = σ(t, δ) = 2δ(j(t, δ) + t)
943
+ satisfies Theorem 6.1. For every vertex v ∈ V (T), we define Cv = B(v) if v is a leaf of T and
944
+ Cv = ∅ otherwise. Also, for every vertex v ∈ V (T), let Kv be a maximal clique of G contained
945
+ in B(v). Thus, we have |Kv| < t. Moreover, Lemma 5.2 along with the assumption that ζ is
946
+ rich implies if v is a leaf of T, then we have Kv = B(v) = Cv (and so |Kv| = 1), and if v is a
947
+ branch vertex of T, then Kv contains all but possibly one of the sets η(f, v) for f ∈ E(T). For
948
+ every S ⊆ T, we define
949
+ MS =
950
+
951
+ w∈NT (S)
952
+ Jη,w,
953
+ NS =
954
+
955
+ w∈NT (S)
956
+ Kw.
957
+ Also, we write Mv for M{v} and Nv for N{v}. For every v ∈ V (T), let Ov = Mv ∪ Nv. The
958
+ following is immediate from Theorems 5.1 and 5.4 and Lemma 5.5.
959
+ (12) For every v ∈ V (T), we have
960
+ • Ov ⊆ G \ (Jζ,v ∪ {a});
961
+ • |Ov| < δ(j(t, δ) + t) ≤ σ, and;
962
+ • Ov separates a and Jζ,v in G.
963
+ Now, for every x ∈ G \ NG[a], we define Sx as follows. First, assume that x ∈ ζ(T) \ NG[a].
964
+ Then either x ∈ ζ(e) for some edge e = uv ∈ E(T), or x ∈ ζ(v) for some branch vertex v ∈ V (T).
965
+ In the former case, let
966
+ Ex = Mu ∪ Mv,
967
+ Ix = N{u,v} ∪ Cu ∪ Cv.
968
+ In the latter case, let
969
+ Ex = Mv ∪ Jζ,v
970
+ Ix = Nv.
971
+ Let Sx = Ex ∪ Ix.
972
+ Observe that since x ∈ G \ NG[a], we have Sx ⊆ G \ {a, x}.
973
+ Also, by
974
+ Theorem 5.4, we have |Ex| ≤ 2δj(t, δ) and so |Sx| < 2δ(j(t, δ) + t) = σ.
975
+ Moreover, from
976
+ Theorem 5.1 and the fact that ζ is rich, it is easy to check that for every path P in G from a
977
+ to x, if P ⊆ ζ+(T), then P contains a vertex from Ix, and otherwise P contains a vertex from
978
+ either Ix or Ex. Therefore, Sx separates a and x in G.
979
+ Next, assume that x ∈ Jζ. Then by Theorem 5.1, there exists a unique vertex v ∈ V (T) such
980
+ that x ∈ Jζ,v. Let Sx = Ov. Then by (12), we have Sx ⊆ G \ {a, x}, |Sx| < σ and Sx separates
981
+ a and x in G.
982
+ Finally, assume that x ∈ G\(ζ+(T)∪Jζ). Then letting Sx to be as in Theorem 5.6, it follows
983
+ from Theorem 5.6 that Sx ⊆ G \ {a, x}, |X| < 2j(t, δ) ≤ σ and Sx separates a and x in G. This
984
+ completes the proof of Theorem 6.1.
985
+
986
+ Our application of Theorem 6.1 though is confined to the case where T is a caterpillar. More
987
+ precisely, for a graph G and a vertex a ∈ G, an induced subgraph H ⊆ G \ {a} is said to be an
988
+ a-seed in G if the following hold.
989
+ • There exists a caterpillar C such that H is the line graph of a 1-subdivision of C and
990
+ NG(a) = Z(H).
991
+ • The vertex a is trapped in H ∪ {a}.
992
+ It follows that Z(H) is the set of all degree-one vertices of H. We now combine Theorems 4.2
993
+ and 6.1 to deduce the following.
994
+
995
+ 18
996
+ INDUCED SUBGRAPHS AND TREE DECOMPOSITIONS VIII.
997
+ Theorem 6.2. For every integer t ≥ 1, there exists an integer s = s(t) ≥ 1 with the following
998
+ property. Let G ∈ Ct be a graph and a ∈ G. Assume that there is an a-seed in G. Then for
999
+ every vertex x ∈ G \ NG[a], there exists Sx ⊆ G \ {a, x} with |Sx| < s such that Sx separates a
1000
+ and x in G.
1001
+ Proof. Let σ(·, ·) be as in Theorem 6.1. We show that s = s(t) = σ(t, 3) satisfies Theorem 6.2.
1002
+ Pick an a-seed H in G. Let T be the unique smooth caterpillar with |NG(a)| leaves. Then T has
1003
+ maximum degree three. Also, one may immediately observe that there is a tame, substantial
1004
+ and rich (T, a)-strip-structure η in G with η(T) = H. Now we can apply Theorem 4.2 to G, a
1005
+ and T, deducing that there exists a substantial and rich (T, a)-strip-structure ζ in G such that
1006
+ G \ (ζ+(T) ∪ Jζ) is anticomplete to ζ+(T). Hence, by Theorem 6.1 applied to G, a, T and ζ,
1007
+ for every vertex x ∈ G \ NG[a], there exists Sx ⊆ G \ {a, x} with |Sx| < s such that Sx separates
1008
+ a and x in G. This completes the proof of Theorem 6.2.
1009
+
1010
+ 7. From blocks to trees
1011
+ In this section, we prove Theorem 1.8. We begin with a result which captures the use of
1012
+ Theorem 6.2 in the proof of Theorem 1.8. For a positive integer n, we write [n] = {1, . . . , n}.
1013
+ Theorem 7.1. For all integers ν, t ≥ 1, there exists an integer ψ = ψ(t, ν) ≥ 1 with the
1014
+ following property. Let G ∈ Ct, let a, b ∈ G be distinct and non-adjacent and let {Pi : i ∈ [ψ]}
1015
+ be a collection of ψ pairwise internally disjoint paths in G from a to b. For each i ∈ [ψ], let
1016
+ ai be the neighbor of a in Pi (so ai ̸= b). Then there exists I ⊆ [ψ] with |I| = ν for which the
1017
+ following holds.
1018
+ • {ai : i ∈ I} ∪ {b} is a stable set in G.
1019
+ • For all i, j ∈ I with i < j, ai has a neighbor in P ∗
1020
+ j \ {aj}.
1021
+ Proof. Let s = s(t) be as in Theorem 6.2 and let µ = µ(max{2s + 1, t}), where µ(·) is as in
1022
+ Theorem 2.5. Let R(·, ·) be as in Theorem 5.3. For every integer p ≥ 1, let Rtourn(p) be the
1023
+ smallest positive integer n such that every tournament on at least n vertices contains a transitive
1024
+ tournament on p vertices; the existence of Rtourn(p) follows easily from Theorem 5.3 (in fact,
1025
+ one may observe that Rtourn(p) ≤ R(p, p)). Let γ = R(Rtourn(ν + 1), µ). We prove that
1026
+ ψ = ψ(t, ν) = R(γ, t)
1027
+ satisfies Theorem 7.1. Let P1, . . . , Pψ be ψ pairwise internally disjoint paths in G from a to
1028
+ b. Since G is Kt-free, it follows from Theorem 5.3 and the definition of ψ that there exists a
1029
+ stable set N ⊆ {ai : i ∈ [ψ]} in G with |N| = γ; we may assume without loss of generality that
1030
+ N = {ai : i ∈ [γ]}.
1031
+ Let D be a directed graph with V (D) = N such that for distinct i, j ∈ [γ], there is an arc
1032
+ from ai to aj in D if and only if xi has a neighbor in P ∗
1033
+ j \ {aj}. Note that D may contain both
1034
+ arcs (ai, aj) and (aj, ai), and so the undirected underlying graph of D might not be simple. Let
1035
+ D− be the simple graph obtained from the undirected underlying graph of D by removing one
1036
+ of every two parallel edges.
1037
+ (13) D− contains no stable set of cardinality µ.
1038
+ Suppose for a contradiction that D− contains a stable set S of cardinality µ. We may assume
1039
+ without loss of generality that S = {a1, . . . , aµ}.
1040
+ Let G1 = G[(�µ
1041
+ j=1 Pj) \ {a}].
1042
+ Note that
1043
+ by the definition of D, for every i ∈ [µ], we have NG1(ai) = NPi(ai) \ {a}, and in particular
1044
+ |NG1(ai)| = 1. Since G1 is connected and Kt-free, and since and |S| = µ = µ(max{2s + 1, t}),
1045
+ we can apply Theorem 2.5 to G1 and S. Note that every vertex in S has a unique neighbor in
1046
+ G1, and so no path in G1 contains max{2s + 1, t} ≥ 3 vertices from S. Consequently, there is
1047
+ an induced subgraph H1 of G1 with |H1 ∩ S| = 2s + 1 for which one of the following holds.
1048
+ • H1 is either a caterpillar or the line graph of a caterpillar with H1 ∩ S = Z(H1).
1049
+ • H1 is a subdivided star with root r1 such that Z(H1) ⊆ H1 ∩ S ⊆ Z(H1) ∪ {r1}.
1050
+
1051
+ INDUCED SUBGRAPHS AND TREE DECOMPOSITIONS VIII.
1052
+ 19
1053
+ If H1 is a caterpillar, then G[H1∪{a}] contains a theta with ends a and a′ for every vertex a′ ∈ H1
1054
+ of degree more than two, a contradiction. Also, if the second bullet above holds, then since every
1055
+ vertex in S is of degree one in G1, we have H1 ∩ S = Z(H1), and so r1 is not adjacent to a. But
1056
+ then G[H1 ∪ {a}] contains a theta with ends x and r1, a contradiction. It follows that H1 is the
1057
+ line graph of a caterpillar with |H1 ∩ S| = 2s + 1 and H1 ∩ S = Z(H1). This, together with the
1058
+ fact that every vertex in H1 ∩ S ⊆ S has a unique neighbor in H1 ⊆ G, implies that H1 contains
1059
+ the line graph H2 of a 1-subdivision of a caterpillar with |H2 ∩ S| = s and H2 ∩ S = Z(H2).
1060
+ Let S2 = H2 ∩ S = Z(H2); then S2 is the set of all vertices of degree one in H2, and we may
1061
+ assume without loss of generality that S2 = {a1, . . . , as}. Let G2 = G[H2 ∪(�s
1062
+ j=1 Pj)]. It follows
1063
+ that G2 ∈ Ct, NG2(a) = S2 = Z(H2) and a is trapped in H2 ∪ {a}. Therefore, H2 is an a-seed
1064
+ in G2. Since b ∈ G2 \ NG2[a], applying Theorem 6.2 to G2 and a, we deduce that there exists
1065
+ Sb ⊆ G2 \{a, b} such that |Sb| < s and Sb separates a and b in G2. But P1, . . . , Ps are s pairwise
1066
+ internally disjoint paths in G2 from a to b, a contradiction with Theorem 2.1. This proves (13).
1067
+ By (13), Theorem 5.3 and the definition γ, D− contains a clique of cardinality Rtourn(ν + 1).
1068
+ This, along with the definition of Rtourn(·), implies that D contains (as a subdigraph) a transitive
1069
+ tournament K on ν + 1 vertices.
1070
+ We may assume without loss of generality that V (K) =
1071
+ {a1, . . . , aν+1} such that for distinct i, j ∈ [ν + 1], (ai, aj) is an arc in K if i < j. From the
1072
+ definition of D, it follows that {a2, . . . , aν+1, b} is a stable set in G, and for all i, j ∈ {2, . . . , ν+1}
1073
+ with i < j, ai has a neighbor in P ∗
1074
+ j \{aj}. Hence, I = {2, . . . , ν + 1} satisfies Theorem 7.1. This
1075
+ completes the proof.
1076
+
1077
+ For positive integers d and r, let T r
1078
+ d denote the rooted tree in which every leaf is at distance
1079
+ r from the root, the root has degree d, and every vertex that is neither a leaf nor the root has
1080
+ degree d + 1. We need a result from [15]:
1081
+ Theorem 7.2 (Kierstead and Penrice [15]). For all integers d, r, s, t ≥ 1, there exists an integer
1082
+ f = f(d, r, s, t) ≥ 1 such that if G contains T f
1083
+ f as a subgraph, then G contains one of Ks,s, Kt
1084
+ and T r
1085
+ d as an induced subgraph.
1086
+ The following lemma is the penultimate step in the proof of Theorem 1.8.
1087
+ Lemma 7.3. For all integers d, r, t ≥ 1, there exists an integer m = m(d, r, t) with the following
1088
+ property. Let G ∈ Ct be a graph, let a, b ∈ G be non-adjacent and let {Pi : i ∈ [m]} be a collection
1089
+ of m pairwise internally disjoint paths in G from a to b. Then G[�m
1090
+ j=1 Pj] contains a subgraph
1091
+ J isomorphic to T r
1092
+ d such that a ∈ J and a has degree d in J (that is, a is the root of J), and we
1093
+ have b /∈ J.
1094
+ Proof. Let d, t ≥ 1 be fixed. Let m1 = d. For every integer r > 1, let mr = ψ(t, (mr−1 + 1)d)
1095
+ where ψ(·, ·) is as in Theorem 7.1. We prove by induction on r ≥ 1 that m(d, r, t) = mr satisfies
1096
+ Lemma 7.3. Let P1, . . . , Pmr be mr pairwise internally disjoint paths in G from a to b. Since a
1097
+ and b are not adjacent, it follows that for each i ∈ [mr], we have P ∗
1098
+ i ̸= ∅; let ai be the neighbor
1099
+ of a in Pi. In particular, we have b /∈ {ai : i ∈ [mr]}. Suppose first that r = 1. Then we have
1100
+ |{ai : i ∈ [m1]}| = m1 = d, and so G[{ai : i ∈ [mr]} ∪ {a}] contains a (spanning) subgraph
1101
+ J isomorphic to T 1
1102
+ d such that a ∈ J and a has degree d in J, and we have b /∈ J, as desired.
1103
+ Therefore, we may assume that r ≥ 2. Since mr = ψ(t, (mr−1 + 1)d), we can apply Theorem 7.1
1104
+ to a, b and {Pi : i ∈ [mr]}, obtaining I ⊆ [mr] with |I| = (mr−1 + 1)d which satisfies the two
1105
+ outcomes of Theorem 7.1. Without loss of generality, we may assume that I = [(mr−1 + 1)d].
1106
+ It follows that {a1, · · · , a(mr−1+1)d, b} is a stable set in G, and for all i, j ∈ [(mr−1 + 1)d] with
1107
+ i < j, ai has a neighbor in P ∗
1108
+ j \ {aj}. For every i ∈ [d], let a′
1109
+ i = a(i−1)mr−1+i and let
1110
+ Ai = {(i − 1)mr−1 + i + 1, . . . , (i − 1)mr−1 + i + mr−1}.
1111
+ In particular, we have |Ai| = mr−1. Then for each i ∈ [d] and each j ∈ Ai, a′
1112
+ i has a neighbor in
1113
+ P ∗
1114
+ j \ {aj}, and so there exists a path Qj in G from a′
1115
+ i to b with Q∗
1116
+ j ⊆ P ∗
1117
+ j . Now, for every i ∈ [d],
1118
+ a′
1119
+ i and b are non-adjacent, and {Qj : j ∈ Ai} is a collection of mr−1 pairwise internally disjoint
1120
+
1121
+ 20
1122
+ INDUCED SUBGRAPHS AND TREE DECOMPOSITIONS VIII.
1123
+ paths in G from a′
1124
+ i to b. It follows from the induction hypothesis that G[�
1125
+ j∈Ai Qj] contains a
1126
+ subgraph Ji isomorphic to T r−1
1127
+ d
1128
+ such that a′
1129
+ i ∈ Ji and a′
1130
+ i has degree d in Ji, and we have b /∈ Ji.
1131
+ But now G[(�d
1132
+ i=1 V (Ji)) ∪ {a}] ⊆ G[�mr
1133
+ j=1 Pj] contains a (spanning) subgraph J isomorphic to
1134
+ T r
1135
+ d such that a ∈ J and a has degree d in J, and we have b /∈ J. This completes the proof of
1136
+ Lemma 7.3.
1137
+
1138
+ Finally, we prove Theorem 1.8, which we restate:
1139
+ Theorem 1.8. For every tree F and every integer t ≥ 1, there exists an integer τ(F, t) ≥ 1
1140
+ such that every graph in Ct(F) has treewidth at most τ(F, t).
1141
+ Proof. Let d and r be the maximum degree and the radius of F, respectively. It follows that
1142
+ T r
1143
+ d contains F as an induced subgraph.
1144
+ Let f = f(d, r, 3, t) be as in Theorem 7.2 and let
1145
+ m = m(f, f, t) be as in Lemma 7.3. Let β(·, ·) be as in Corollary 2.4. We claim that τ(F, t) =
1146
+ β(max{m, t + 1}, t) satisfies Theorem 1.8. Suppose for a contradiction that tw(G) > τ for some
1147
+ G ∈ Ct(F). By Corollary 2.4, G contains a max{m, t + 1}-block B. Consequently, since G is
1148
+ Kt-free, there are two distinct and non-adjacent vertices a, b ∈ B, and m pairwise internally
1149
+ disjoint paths P1, . . . , Pm in G from a to b. It follows from Lemma 7.3 that G contains T f
1150
+ f as a
1151
+ subgraph. Also, since G ∈ Ct(F) ⊆ Ct, G is (K3,3, Kt)-free. But now by Theorem 7.2, G contains
1152
+ T r
1153
+ d , and so F, as an induced subgraph, a contradiction. This completes the proof.
1154
+
1155
+ References
1156
+ [1] P. Aboulker, I. Adler, E. J. Kim, N. L. D. Sintiari, and N. Trotignon. “On the treewidth of even-hole-free
1157
+ graphs.” European Journal of Combinatorics 98, (2021), 103394.
1158
+ [2] T. Abrishami, B. Alecu, M. Chudnovsky, S. Hajebi, and S. Spirkl, “Induced subgraphs and tree decomposi-
1159
+ tions VII. Basic obstructions in H-free graphs.” arXiv:2212.02737, (2022).
1160
+ [3] T. Abrishami, M. Chudnovsky, C. Dibek, S. Hajebi, P. Rzążewski, S. Spirkl, and K. Vušković, “Induced
1161
+ subgraphs and tree decompositions II. Toward walls and their line graphs in graphs of bounded degree.”
1162
+ arXiv:2108.01162, (2021).
1163
+ [4] T. Abrishami, M. Chudnovsky and K. Vušković, “Induced subgraphs and tree decompositions I. Even-hole-
1164
+ free graphs of bounded degree.” J. Combin. Theory Ser. B, 157 (2022), 144-175.
1165
+ [5] M. Ajtai, J. Komlós and E. Szemerédi. “A note on Ramsey numbers.” J. Combinatorial Theory, Ser. A 29
1166
+ (1980), 354–360.
1167
+ [6] H. L. Bodlaender. “Dynamic programming on graphs with bounded treewidth.” Springer, Berlin, Heidelberg,
1168
+ (1988), pp. 105–118.
1169
+ [7] K. Cameron, M.V. da Silva, S. Huang, and K. Vušković, “Structure and algorithms for (cap, even hole)-free
1170
+ graphs.” Discrete Mathematics 341, 2 (2018), 463-473.
1171
+ [8] M. Chudnovsky, N. Robertson, P. Seymour, and R. Thomas, “The strong perfect graph theorem.” Annals of
1172
+ Math 164 (2006), 51-229.
1173
+ [9] M. Chudnovsky and P. Seymour, “Even-hole-free graphs still have bisimplicial vertices.” arXiv:1909.10967,
1174
+ (2019).
1175
+ [10] M. Chudnovsky and P. Seymour, “The three-in-a-tree problem.” Combinatorica 30, 4 (2010): 387-417.
1176
+ [11] J. Davies, “Vertex-minor-closed classes are χ-bounded.” arXiv:2008.05069, (2020).
1177
+ [12] J. Davies, appeared in an Oberwolfach technical report DOI:10.4171/OWR/2022/1.
1178
+ [13] J. Erde and D. Weißauer. “A short derivation of the structure theorem for graphs with excluded topological
1179
+ minors.” SIAM Journal of Discrete Mathematics 33, 3 (2019), 1654–1661.
1180
+ [14] M. Grohe and D. Marx. “Structure theorem and isomorphism test for graphs with excluded topological
1181
+ subgraphs,” SIAM Journal on Computing 44, 1 (2015), 114–159.
1182
+ [15] H.A. Kierstead and S. G. Penrice, “Radius two trees specify χ-bounded classes.” J. Graph Theory 18, 2
1183
+ (1994): 119–129.
1184
+ [16] T. Korhonen, “Grid Induced Minor Theorem for Graphs of Small degree.” arXiv:2203.13233, (2022).
1185
+ [17] V. Lozin and I. Razgon. “Tree-width dichotomy.” European J. Combinatorics 103 (2022): 103517.
1186
+ [18] K. Menger, “Zur allgemeinen Kurventheorie.” Fund. Math. 10, 1927, 96–115.
1187
+ [19] N. Robertson and P. Seymour. “Graph minors. V. Excluding a planar graph.” J. Combin. Theory Ser. B, 41
1188
+ (1) (1996), 92–114.
1189
+ [20] N.L.D. Sintiari and N. Trotignon. “(Theta, triangle)-free and (even-hole, K4)-free graphs. Part 1: Layered
1190
+ wheels.” J. Graph Theory 97 (4) (2021), 475-509.
1191
+ [21] N. Trotignon, private communication, 2021.
1192
+
19A0T4oBgHgl3EQfMv_l/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
1tA0T4oBgHgl3EQfMv-f/content/tmp_files/2301.02137v1.pdf.txt ADDED
@@ -0,0 +1,2100 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ arXiv:2301.02137v1 [nucl-th] 5 Jan 2023
2
+ Reduced nuclear helicity amplitudes for deuteron
3
+ electrodisintegration and other processes
4
+ J. Flores and S. S. Chabysheva
5
+ Department of Physics, University of Idaho, Moscow ID 83844 USA
6
+ J. R. Hiller
7
+ Department of Physics, University of Idaho, Moscow ID 83844 USA and
8
+ Department of Physics and Astronomy,
9
+ University of Minnesota-Duluth, Duluth, Minnesota 55812 USA
10
+ (Dated: January 6, 2023)
11
+ 1
12
+
13
+ Abstract
14
+ We extend the original idea of reduced nuclear amplitudes to capture individual helicity ampli-
15
+ tudes and discuss various applications to exclusive processes involving the deuteron. Specifically,
16
+ we consider deuteron form factors, structure functions, tensor polarization observables, photodisin-
17
+ tegration, and electrodisintegration. The basic premise is that nuclear processes at high momentum
18
+ transfer can be approximated by tree graphs for point-like nucleons supplemented by empirical form
19
+ factors for each nucleon. The latter represent the internal structure of the nucleon, and incorporate
20
+ nonperturbative physics, which can allow for early onset of scaling behavior. The nucleon form
21
+ factors are evaluated at the net momentum transfer experienced by the given nucleon, with use of
22
+ GE for a no-flip contribution and GM for a helicity-flip contribution. Results are compared with
23
+ data where available. The deuteron photodisintegration asymmetry Σ is obtained with a value of
24
+ Σ(90◦) ≃ −0.06, which is much closer to experiment than the value of -1 originally expected. The
25
+ method also provides an estimate of the momentum transfer values required for scaling onset. We
26
+ find that the deuteron structure function B is a good place to look, above momentum transfers of
27
+ 10 GeV2.
28
+ I.
29
+ INTRODUCTION
30
+ With the advent of the upgraded electron accelerator at the Thomas Jefferson National
31
+ Accelerator Facility, scattering experiments with polarized beams and targets at high energy
32
+ and high momentum transfer become possible. In the regime of high momentum transfer to
33
+ all relevant nucleons, quantum chromodynamics (QCD) implies that the internal structure of
34
+ every nucleon is important. Until ab initio QCD (lattice) calculations for nuclear scattering
35
+ processes are available for more than very simple processes, one is led to consider models
36
+ that can represent the basic physics.
37
+ One such approach is the reduced nuclear amplitude (RNA) analysis pioneered by Brod-
38
+ sky and Chertok [1]. In addition to their application to a generic deuteron form factor,
39
+ the approach has been applied to deuteron disintegration [2], pion photoproduction [3], and
40
+ photodisintegration of 3He [4]. As originally developed, a nuclear process was modeled as
41
+ a tree-level amplitude multiplied by a generic form factor for each nucleon, with each form
42
+ factor evaluated at the net momentum transferred to that nucleon. In order to model the
43
+ behavior of polarization observables [5–15], we extend this approach to a reduced nuclear
44
+ helicity amplitude (RNHA) method to combine a tree-level helicity amplitude for point-like
45
+ nucleons with the appropriate form factor for each nucleon. When the nucleon does (not)
46
+ flip its helicity, we use the electric (magnetic) form factor GEN (GMN). As a check on the
47
+ procedure, virtual photon absorption by a single nucleon in the RNHA approach is consistent
48
+ with the definitions of GEN and GMN.
49
+ A caveat in applications of the RNA approach is that the normalization is not determined
50
+ by the model and is fixed to data at infinite momentum transfer by the coefficient of the
51
+ leading power-law behavior. This means that the normalization cannot be determined in
52
+ practice; fitting to a data point at some intermediate kinematics will give the wrong nor-
53
+ malization and the wrong magnitude at higher momentum transfer. Instead, ratios need to
54
+ be considered, so that the normalization becomes irrelevant.
55
+ The primary criterion for the asymptotic region is in the momentum transfer to each
56
+ nucleon. For every nucleon in the process, the momentum transfer must be above some
57
+ common threshold, which is at least 1 GeV2. For example, for deuteron photodisintegration,
58
+ 2
59
+
60
+ the momentum transfer to a nucleon is −tN = −(pN − p/2)2, where pN is the final four-
61
+ momentum of the nucleon and p is the initial deuteron momentum. When expressed in
62
+ terms of the photon energy Eγ and the final nucleon angle θ, the constraint to be above 1
63
+ GeV2 becomes [16]
64
+ mNEγ
65
+
66
+ 1 −
67
+
68
+
69
+ mN + Eγ
70
+ | cos θ|
71
+
72
+ ≥ 1 GeV2.
73
+ (1.1)
74
+ This relationship is illustrated in Fig. 1.
75
+ Notice that away from 90◦, the lower limit is
76
+ quite high. For electrodisintegration, only the most recent data [17, 18] begins to reach this
77
+ θ (deg)
78
+ 0
79
+ 20
80
+ 40
81
+ 60
82
+ 80
83
+ 100
84
+ 120
85
+ 140
86
+ 160
87
+ 180
88
+ Eγ (GeV)
89
+ 0
90
+ 2
91
+ 4
92
+ 6
93
+ 8
94
+ 10
95
+ FIG. 1. Angular dependence of the scale for large momentum transfer in deuteron photodisinte-
96
+ gration.
97
+ threshold.
98
+ Here we will focus on deuteron processes, including photodisintegration and electrodisin-
99
+ tegration. For recent reviews of deuteron studies at high momentum transfer, see [16, 19, 20].
100
+ Elastic electron scattering data at high momentum transfer is presented in [21–25]. Recent
101
+ photodisintegration data can be found in [26–29], and for electrodisintegration data, in
102
+ [17, 18, 30–33]. Other analyses of deuteron processes include hidden-color contributions to
103
+ deuteron form factors [34], the hard rescattering mechanism [35], quark-gluon strings [36],
104
+ the Moscow NN potential [37], and AdS/QCD models [38, 39].
105
+ One recent experiment [17] used the 10.6 GeV electron beam at JLab and the Hall
106
+ C spectrometers to measure electron scattering from a liquid deuterium target. The final
107
+ electron and the proton were detected, with the kinematics restricted to the exclusive process
108
+ ed → e′pn. One spectrometer measured the final electron at a nominal 12.2◦ degrees from
109
+ the beam direction, with a momentum of 8.5-9.1 GeV such that the recorded events had a
110
+ distribution of momentum transfer squared reaching 5 GeV2. The events studied were taken
111
+ from a bin of 4.5±0.5 GeV2 in the tail of the distribution; however, the nominal transfer
112
+ was 4.2 GeV2, because the majority of the events were in the lower half of the bin.
113
+ A second spectrometer measured the proton momentum at a range of angles to the
114
+ beam direction, tuned to select events where the (missing) neutron had an angle relative to
115
+ the direction of the momentum transfer that fell within a chosen bin. In the one-photon
116
+ exchange approximation, which we assume, the momentum transferred is, of course, the
117
+ photon momentum. The published neutron angles are binned at 35◦, 45◦ and 75◦, with the
118
+ first two selected to minimize final-state interactions. For our purposes, the importance of
119
+ 3
120
+
121
+ these two angles is that the momentum transferred to the neutron reaches 1 GeV in a zero-
122
+ binding approximation, so that, rather than focus on the internal structure of the deuteron,
123
+ we can consider the response to a large momentum transfer to all the nucleons involved and
124
+ we can see that experiments may be approaching the threshold where our model can be
125
+ applied.
126
+ The RNHA model is constructed in detail in Sec. II for two-nucleon processes. In the
127
+ remainder of the paper, we consider various processes for the deuteron. In Sec. III, the
128
+ form factors,1 structure functions, and tensor polarization observables of elastic electron
129
+ scattering from the deuteron are obtained. Photodisintegration and electrodisintegration
130
+ are analyzed in Secs. IV and V. Within the zero-binding approximation, elastic scattering
131
+ and photodisintegration live at edges of the kinematic range of electrodisintegration and
132
+ are essentially special cases that provide introductory examples.
133
+ Section VI contains a
134
+ summary of the results and suggestions for additional applications. Many details of the
135
+ electrodisintegration helicity amplitudes are left to an appendix.
136
+ II.
137
+ CONSTRUCTION OF THE MODEL
138
+ The basic process for a two-nucleon system to absorb a photon and exchange momentum
139
+ between the nucleons is illustrated in Fig. 2. These diagrams are modeled on the primitive
140
+ process of γ∗ff → ff, with f representing a point-like nucleon.2 The structure of each
141
+ nucleon is then introduced by combining the Feynman amplitude for each diagram with the
142
+ appropriate form factor for each nucleon, evaluated at the net momentum transfer for that
143
+ nucleon. For a deuteron process in the zero-binding limit, the initial nucleons share the
144
+ initial deuteron momentum p equally, so that pp = pn = p/2. We also neglect the nucleon
145
+ mass difference, setting mp = mn ≡ m. The distinction between different photon-absorption
146
+ processes is then in the nature of the photon, being either real or virtual, and in the outcome
147
+ for the final nucleons, bound as a deuteron or not.
148
+ The tree-level amplitudes for the four diagrams in Fig. 2 are
149
+
150
+ a (λ′
151
+ p, λ′
152
+ n, λp, λn) = Aµν
153
+ p (p/2 + q; λ′
154
+ p, λp)
155
+ 1
156
+ (p′
157
+ n − p/2)2Bnµ(λ′
158
+ n, λn),
159
+ (2.1)
160
+
161
+ b (λ′
162
+ p, λ′
163
+ n, λp, λn) = Aνµ
164
+ p (p′
165
+ p − q; λ′
166
+ p, λp)
167
+ 1
168
+ (p′n − p/2)2Bnµ(λ′
169
+ n, λn),
170
+ (2.2)
171
+
172
+ c (λ′
173
+ p, λ′
174
+ n, λp, λn) = Aµν
175
+ n (p/2 + q; λ′
176
+ n, λn)
177
+ 1
178
+ (p′p − p/2)2Bpµ(λ′
179
+ p, λp),
180
+ (2.3)
181
+
182
+ d (λ′
183
+ p, λ′
184
+ n, λp, λn) = Aνµ
185
+ n (p′
186
+ n − q; λ′
187
+ n, λn)
188
+ 1
189
+ (p′
190
+ p − p/2)2Bpµ(λ′
191
+ p, λp),
192
+ (2.4)
193
+ where
194
+ Aµν
195
+ N (p; λ′
196
+ N, λN) = ¯u′
197
+ Nγµ ̸p + m
198
+ p2 − m2γνuN, Bµ
199
+ N(λ′
200
+ N, λN) = ¯u′
201
+ NγµuN,
202
+ (2.5)
203
+ with uN (¯u′
204
+ N) the initial (final) spinor for the nucleon N with helicity λN (λ′
205
+ N). The sub-
206
+ amplitude AN represents the fermion line that absorbs the photon, and BN represents the
207
+ 1 For discussion specifically in terms of perturbative QCD, see [34].
208
+ 2 In [2], the primitive process was γ∗q¯q → q¯q, with q corresponding to a point-like proton and ¯q to a point-
209
+ like neutron, and direct interaction of the photon with the neutron was neglected. Here we amend and
210
+ extend this, to retain information about helicity states of the fermions and include photon absorption by
211
+ the neutron.
212
+ 4
213
+
214
+ pp, λp
215
+ pn, λn
216
+ p′
217
+ p, λ′
218
+ p
219
+ p′
220
+ n, λ′
221
+ n
222
+ q, λγ
223
+ pp, λp
224
+ pn, λn
225
+ p′
226
+ p, λ′
227
+ p
228
+ p′
229
+ n, λ′
230
+ n
231
+ q, λγ
232
+ (a)
233
+ (b)
234
+ pp, λp
235
+ pn, λn
236
+ p′
237
+ p, λ′
238
+ p
239
+ p′
240
+ n, λ′
241
+ n
242
+ q, λγ
243
+ pp, λp
244
+ pn, λn
245
+ p′
246
+ p, λ′
247
+ p
248
+ p′
249
+ n, λ′
250
+ n
251
+ q, λγ
252
+ (c)
253
+ (d)
254
+ FIG. 2. Tree graphs for deuteron processes that absorb a photon of momentum q and helicity
255
+ λγ. The initial (final) nucleon momentum and helicity are pN (p′
256
+ N) and λN (λ′
257
+ N), with N = p or
258
+ n. The two nucleons exchange momentum via a vector particle. The four diagrams differ in the
259
+ nature of the photon-absorbing nucleon and the order of this absorption and momentum transfer
260
+ between nucleons.
261
+ other fermion line. Calculation of these sub-amplitudes can be checked against the trace
262
+ theorem for sums over helicities:
263
+
264
+ λN,λ′
265
+ N
266
+ Aν′µ′∗
267
+ N
268
+ (p; λ′
269
+ N, λN)Aµν
270
+ N (p; λ′
271
+ N, λN) = Tr
272
+
273
+ γν′ ̸p + m
274
+ p2 − m2γµ′(̸p′
275
+ N + m)γµ ̸p + m
276
+ p2 − m2γν(̸pN + m)
277
+
278
+ ,
279
+ (2.6)
280
+
281
+ λN,λ′
282
+ N
283
+ Bµ′∗
284
+ N (λ′
285
+ N, λN)Bµ
286
+ N(λ′
287
+ N, λN) = Tr
288
+
289
+ γµ′(̸p′
290
+ N + m)γµ(̸pN + m)
291
+
292
+ .
293
+ (2.7)
294
+ The full amplitude is constructed from the MX by combining them with form factors for
295
+ each nucleon. For a deuteron with initial helicity λd, we have
296
+ Mν(λ′
297
+ p, λ′
298
+ n, λd) =
299
+
300
+ λp,λn
301
+ Cλd
302
+ λpλn
303
+
304
+
305
+
306
+ X=a,b,c,d
307
+
308
+ X(λ′
309
+ p, λ′
310
+ n, λp, λn)
311
+
312
+  Gpλ′pλp(Q2
313
+ p)Gnλ′nλn(Q2
314
+ n),
315
+ (2.8)
316
+ 5
317
+
318
+ where Q2
319
+ N = −(p′
320
+ N − pN)2,
321
+ Cλd
322
+ λpλn =
323
+
324
+
325
+
326
+ δλp± 1
327
+ 2δλn± 1
328
+ 2,
329
+ λd = ±1
330
+ 1
331
+
332
+ 2
333
+
334
+ δλp 1
335
+ 2δλn− 1
336
+ 2 + δλp− 1
337
+ 2δλn+ 1
338
+ 2
339
+
340
+ , λd = 0,
341
+ (2.9)
342
+ and
343
+ GNλ′λ =
344
+
345
+ GEN, λ′ = λ
346
+ GMN, λ′ = −λ.
347
+ (2.10)
348
+ The form factors GEN and GMN represent the internal structure of the nucleons. They can
349
+ be represented by data or empirical fits. For simplicity, we use the fits [40]
350
+ GEp ≃
351
+
352
+ 1 + Q2
353
+ N
354
+ m2
355
+ 0
356
+ �−2
357
+ , GMp ≃ µpGEp, GMn ≃ µnGEp, GEn ≃ −
358
+ µnτ
359
+ 1 + 5.6τ GEp,
360
+ (2.11)
361
+ where m2
362
+ 0 = 0.71 GeV2, τ =
363
+ Q2
364
+ N
365
+ 4m2 , µp = 2.79, and µn = −1.91. To limit the analysis to a
366
+ single mass scale, we take the parameter m0 to be proportional to the nuclear mass, with
367
+ m2
368
+ 0 = 0.80 m2. We do not attempt to compute or assign an overall normalization to Mν,
369
+ and the running of the strong coupling constant is not included.
370
+ The initial nucleon spinor, for a deuteron traveling along the negative z direction, is [41]
371
+ uN =
372
+ ̸p/2 + m
373
+
374
+ Ed/2 + m
375
+
376
+ φ(λN)(−ˆz)
377
+ 0
378
+
379
+ ,
380
+ (2.12)
381
+ with
382
+ φ(1/2)(−ˆz) =
383
+
384
+ 0
385
+ 1
386
+
387
+ , φ(−1/2)(−ˆz) =
388
+
389
+ 1
390
+ 0
391
+
392
+ .
393
+ (2.13)
394
+ The final nucleon spinor is
395
+ u′
396
+ N = ̸p′
397
+ N + m
398
+
399
+ E′
400
+ N + m
401
+
402
+ φ(λ′
403
+ N)(ˆp′
404
+ N)
405
+ 0
406
+
407
+ ,
408
+ (2.14)
409
+ with
410
+ φ(1/2)(ˆp′
411
+ N) =
412
+
413
+ cos(θN/2)
414
+ eiφN sin(θN/2)
415
+
416
+ , φ(−1/2)(ˆp′
417
+ N) =
418
+
419
+ −e−iφN sin(θN/2)
420
+ cos(θN/2)
421
+
422
+ ,
423
+ (2.15)
424
+ where θN and φN are the polar and azimuthal angles of the outgoing momentum of the
425
+ particular nucleon.
426
+ As discussed in the Introduction, the overall normalization of the RNHA amplitude is
427
+ unknown. For comparison with data, we consider quantities which are themselves ratios or
428
+ a ratio of the model to data.
429
+ III.
430
+ ELASTIC ELECTRON SCATTERING
431
+ A.
432
+ Form factors
433
+ The three deuteron form factors, GC, GM, and GQ, are readily obtained from the hadronic
434
+ helicity amplitudes of elastic electron-deuteron scattering in the Breit frame [42]. The kine-
435
+ matics are shown in Fig. 3. The photon four-momentum is q = (0, 0, 0, qz) and the initial
436
+ 6
437
+
438
+ (final) deuteron four-momentum is p = (Ed, 0, 0, −qz/2) (p′ = (Ed, 0, 0, qz/2)), with q2
439
+ z = Q2
440
+ and Ed =
441
+
442
+ Q2/4 + m2
443
+ d. In the zero-binding limit,3 md = 2m and the individual nucleon
444
+ four-momenta are pp = pn = p/2 and p′
445
+ p = p′
446
+ n = p′/2. The hadronic matrix elements are
447
+ given by
448
+
449
+ λ′
450
+ d,λd =
451
+
452
+ λ′p,λ′n
453
+ C
454
+ λ′
455
+ d
456
+ λ′pλ′nMµ(λ′
457
+ p, λ′
458
+ n, λd).
459
+ (3.1)
460
+ The initial spinors are as in (2.12); the final spinors are specified by
461
+ u′
462
+ N =
463
+ ̸p′/2 + m
464
+
465
+ Ed/2 + m
466
+
467
+ φ(λ′
468
+ N)(ˆz)
469
+ 0
470
+
471
+ .
472
+ (3.2)
473
+ ⃗q, λγ
474
+ −⃗q/2, λd
475
+ ⃗q/2, λ′
476
+ d
477
+ z
478
+ ⃗pe, λe
479
+ ⃗p ′
480
+ e, λ′
481
+ e
482
+ FIG. 3. Kinematics for elastic electron-deuteron scattering in the Breit frame. The photon travels
483
+ along the positive z direction, and the deuteron comes from the right, along the negative z direction.
484
+ The three form factors are then extracted as [42, 43]
485
+ GC =
486
+ −1
487
+ 2md
488
+ √1 + η
489
+ G+
490
+ 00 − 2G+
491
+ +−
492
+ 3
493
+ , GM =
494
+ 2
495
+ 2md
496
+ √1 + η
497
+ Gx
498
+ +0
499
+ √2η, GQ =
500
+ −1
501
+ 2md
502
+ √1 + η
503
+ G+
504
+ 00 + G+
505
+ +−
506
+
507
+ ,
508
+ (3.3)
509
+ with η ≡
510
+ Q2
511
+ 4m2
512
+ d and the + superscript denoting the light-front sum of the 0 and z components.
513
+ For the helicity matrix elements, the model yields the following Q2 dependence:
514
+ G+
515
+ 00 = 0.5588N m
516
+ �m
517
+ Q
518
+ �9 �
519
+ 1 + 129.1m2
520
+ Q2 + O(m4
521
+ Q4 )
522
+
523
+ ,
524
+ (3.4)
525
+ G+
526
+ +− = −69.85N m
527
+ �m
528
+ Q
529
+ �11 �
530
+ 1 + 4.8m2
531
+ Q2 + O(m4
532
+ Q4 )
533
+
534
+ ,
535
+ (3.5)
536
+ Gx
537
+ +0 = 8.851N m
538
+ �m
539
+ Q
540
+ �10 �
541
+ 1 + 4.8m2
542
+ Q2 + O(m4
543
+ Q4 )
544
+
545
+ ,
546
+ (3.6)
547
+ with N the unknown normalization. The factor of m/Q associated with each helicity flip
548
+ [44] is clearly evident. For the form factors, we find
549
+ GC = − 0.5588
550
+ √1 + η
551
+ N
552
+ 12
553
+ �m
554
+ Q
555
+ �9 �
556
+ 1 + 379.1m2
557
+ Q2 + O(m4
558
+ Q4 )
559
+
560
+ ,
561
+ (3.7)
562
+ 3 The difference between the proton and neutron masses is neglected in addition to the deuteron binding
563
+ energy, the two being of the same order.
564
+ 7
565
+
566
+ GM =
567
+ 8.851
568
+
569
+ η(1 + η)
570
+ N
571
+ 2
572
+
573
+ 2
574
+ �m
575
+ Q
576
+ �10 �
577
+ 1 + 4.8m2
578
+ Q2 + O(m4
579
+ Q4 )
580
+
581
+ ,
582
+ (3.8)
583
+ GQ = − 0.5588
584
+ η√1 + η
585
+ N
586
+ 8
587
+ �m
588
+ Q
589
+ �9 �
590
+ 1 + 4.086m2
591
+ Q2 + O(m4
592
+ Q4 )
593
+
594
+ .
595
+ (3.9)
596
+ The leading ± signs are as expected for large Q2.
597
+ We have left the kinematic factor η = Q2/16m2 without substitution, because there can
598
+ be three regimes for Q2. In addition to Q2 large or small, there can be an intermediate
599
+ region where Q2 is large but η is not. Such an intermediate regime does exist for GM and
600
+ GQ, where the coefficients of the nonleading terms are small enough for this correction to
601
+ be small while η is also small. For GC, this is not the case, because the coefficient of the
602
+ nonleading term is large enough to require a Q2 value for which η is also large. In the
603
+ intermediate regime, we obtain
604
+ GM ∼
605
+ �m
606
+ Q
607
+ �11
608
+ , GQ ∼
609
+ �m
610
+ Q
611
+ �11
612
+ ,
613
+ (3.10)
614
+ and for the large-η regime
615
+ GC ∼
616
+ �m
617
+ Q
618
+ �10
619
+ , GM ∼
620
+ �m
621
+ Q
622
+ �12
623
+ , GQ ∼
624
+ �m
625
+ Q
626
+ �12
627
+ .
628
+ (3.11)
629
+ Ratios of these form factors at very large Q2 can be compared with the tree-level ratios
630
+ for a point-like spin-one particle, such as the W +, which are [43]
631
+ GC
632
+ GQ
633
+ = 2
634
+ 3η − 1,
635
+ GM
636
+ GQ
637
+ = −2.
638
+ (3.12)
639
+ Such behavior is immediately reproduced for form factors separated according to a Drell–
640
+ Yan frame [45], with the assumption of strict G+
641
+ 00 dominance [43]. In terms of our hadronic
642
+ matrix elements, we have
643
+ GC
644
+ GQ
645
+ = 2
646
+ 3η − 2η
647
+ G+
648
+ +−
649
+ G+
650
+ 00 + G+
651
+ +−
652
+ ,
653
+ GM
654
+ GQ
655
+ = −2
656
+
657
+
658
+ Gx
659
+ +0
660
+ G+
661
+ 00 + G+
662
+ +−
663
+ .
664
+ (3.13)
665
+ As already observed in [43], these Breit-frame ratios cannot both be resolved by simply
666
+ assuming G+
667
+ 00 dominance. From our model, we obtain
668
+ GC
669
+ GQ
670
+ = 2
671
+ 3η + 15.6 + O(m2
672
+ Q2 ),
673
+ GM
674
+ GQ
675
+ = −11.2 + O(m2
676
+ Q2 ).
677
+ (3.14)
678
+ The leading 2
679
+ 3η is just kinematic. The deviations of 15.6 and -11.2 from -1 and -2, respec-
680
+ tively, are due to nonleading contributions multiplied by powers of η. Similar deviations will
681
+ arise for calculations done in the Drell–Yan frame, because η factors again interfere with
682
+ strict G+
683
+ 00 dominance. Plots of these ratios are shown in Fig. 4.
684
+ 8
685
+
686
+ �����V����e/�����
687
+ V��
688
+ V��
689
+
690
+ ��
691
+ ��
692
+ ��
693
+ ��/M����0
694
+
695
+ ��
696
+ ���
697
+ FIG. 4. Ratios GC/GQ − 2η/3 (dashed) and GM/GQ (solid) for the model deuteron form factors.
698
+ B.
699
+ Structure functions
700
+ Experiments designed to extract these form factors measure cross sections and polariza-
701
+ tion observables in elastic electron-deuteron scattering. The unpolarized cross section
702
+
703
+ dΩ ∝ S, S ≡ A(Q2) + B(Q2) tan2(θe/2)
704
+ (3.15)
705
+ depends on the electron scattering angle θe and two structure functions
706
+ A(Q2) ≡ G2
707
+ C + 8
708
+ 9η2G2
709
+ Q + 2
710
+ 3ηG2
711
+ M,
712
+ (3.16)
713
+ B(Q2) ≡ 4
714
+ 3η(1 + η)G2
715
+ M.
716
+ (3.17)
717
+ These have been measured at the highest Q2 yet attained at JLab [22–24], and A has been
718
+ measured at comparable Q2 at SLAC [21]. However, these do not yet reach the Q2 values
719
+ needed for a definitive comparison. Figures 5 and 6 show plots of the data divided by the
720
+ model, including an arbitrary normalization factor.
721
+ In our model, expansions of these functions in inverse powers of Q2 are
722
+ A(Q2) = 0.1041N 2
723
+ �m
724
+ Q
725
+ �20 �
726
+ 1 + 1246m2
727
+ Q2 + O(m4
728
+ Q4 )
729
+
730
+ ,
731
+ (3.18)
732
+ B(Q2) = 13.06N 2
733
+ �m
734
+ Q
735
+ �20 �
736
+ 1 + 9.6m2
737
+ Q2 + O(m4
738
+ Q4 )
739
+
740
+ .
741
+ (3.19)
742
+ Because the expansion for GC is valid only for large η, we have used the explicit form of η in
743
+ constructing the expansion for A. The function B is independent of η; the leading factor of
744
+ 9
745
+
746
+
747
+ �l�70V�����
748
+ 5
749
+ 6
750
+ 7
751
+
752
+
753
+ �7Ql���70
754
+ 5
755
+ 6
756
+ 7
757
+
758
+
759
+
760
+
761
+
762
+ FIG. 5. Data for the deuteron structure function A(Q2) divided by the model function, including
763
+ an arbitrary normalization. Experimental values are taken from [23] (circles) and [24] (squares).
764
+ η(1+η) in its definition exactly cancels against factors in the relationship of GM to hadronic
765
+ matrix elements. The expansion for B converges much faster than the expansion for A, and
766
+ the leading Q2 behavior is dominant for Q2 ≫ 10 GeV2 only for B. For A, one must wait
767
+ until impossibly large Q2, which enters a regime where the collective quark substructure is
768
+ important, including hidden-color effects [34], and the point-like approximation used in our
769
+ model is invalid.
770
+ In [22] the large Q2 behavior of B is quoted as being Q−24 from perturbative QCD.
771
+ This faster fall off compared to A is attributed to the extra suppression of the helicity flip
772
+ involved in GM. However, there are other compensating factors, and, just as in our model,
773
+ the behavior of B should be Q−20, which is the same as A. In Fig. 7 we plot the ratio of
774
+ B to A for a large range of Q2. This ratio becomes constant at very large Q2. Although
775
+ the plots begin at low Q2, there is nothing in the model that could reproduce diffractive
776
+ minima, hence the smooth appearance.
777
+ C.
778
+ Tensor polarization observables
779
+ Experiments can also extract tensor polarization observables [20, 25]
780
+ t20 ≡ −
781
+ 1
782
+
783
+ 2S
784
+ �8
785
+ 3ηGCGQ + 8
786
+ 9η2G2
787
+ Q + 1
788
+
789
+
790
+ 1 + 2(1 + η) tan2(θe/2)
791
+
792
+ G2
793
+ M
794
+
795
+ ,
796
+ (3.20)
797
+ t21 ≡
798
+
799
+
800
+ 3S cos(θe/2)
801
+
802
+ η + η2 sin2(θe/2)GMGQ,
803
+ (3.21)
804
+ t22 ≡ −
805
+ η
806
+ 2
807
+
808
+ 3S G2
809
+ M.
810
+ (3.22)
811
+ 10
812
+
813
+
814
+ �l��-G�����
815
+ 1V �
816
+ V
817
+ V �
818
+ 3
819
+ 3 �
820
+
821
+ � �
822
+ ��Ql����-
823
+ 3
824
+ 3 �
825
+
826
+ � �
827
+
828
+ FIG. 6. Data for the deuteron structure function B(Q2) divided by the model function, including
829
+ an arbitrary normalization. Experimental values are taken from [22].
830
+
831
+ �8��15�8��1
832
+
833
+ ��
834
+ ��
835
+ ��
836
+ ��
837
+ ���
838
+ ���
839
+ ���
840
+ ��Q8����1
841
+ ���
842
+ ���
843
+ ���
844
+ ���
845
+ ���
846
+ ���
847
+ ���
848
+ FIG. 7. Ratio of B to A for the model deuteron structure functions.
849
+ The highest Q2 measurements of these were also done at JLab [25]. When η is held explicit,
850
+ expansions in m/Q are
851
+ t20 = −
852
+
853
+ 2 + 1064[1 + 2(1 + η) tan2(θe/2)]
854
+ �m
855
+ Q
856
+ �2
857
+ + O(m4
858
+ Q4 ),
859
+ (3.23)
860
+ 11
861
+
862
+ t21 = 38.8 sec(θe/2)
863
+
864
+ η + sin2(θe/2)m
865
+ Q
866
+ (3.24)
867
+ + sec(θe/2)
868
+
869
+ η + sin2(θe/2)[48606 + 77869(1 + η) tan2(θe/2)]
870
+ �m
871
+ Q
872
+ �3
873
+ + O(m4
874
+ Q4 ),
875
+ t22 = −434.5
876
+ �m
877
+ Q
878
+ �2
879
+ + [544703 + 872133(1 + η) tan2(θe/2)]
880
+ �m
881
+ Q
882
+ �4
883
+ + O(m6
884
+ Q6 ).
885
+ (3.25)
886
+ While at very large Q2, they are
887
+ t20 = −
888
+
889
+ 2 + 133 tan2(θe/2) + 1064[1 + 2 tan2(θe/2)]
890
+ �m
891
+ Q
892
+ �2
893
+ + O(m4
894
+ Q4 ),
895
+ (3.26)
896
+ t21 = 1217 sec(θe/2) sin(θe/2)[tan2(θe/2) − 0.007972] + []
897
+ �m
898
+ Q
899
+ �2
900
+ + O(m4
901
+ Q4 ),
902
+ (3.27)
903
+ t22 = −[434.5 − 54508 tan2(θe/2)]
904
+ �m
905
+ Q
906
+ �2
907
+ (3.28)
908
+ +[544703 + 872133 tan2(θe/2)]
909
+ �m
910
+ Q
911
+ �4
912
+ + O(m6
913
+ Q6 ).
914
+ The coefficients of nonleading terms are quite large. Thus, very large Q2 is required for
915
+ the leading term to be dominant, well beyond any available data. The limit of −
916
+
917
+ 2 for
918
+ t20 at θe = 0◦ was an early prediction of perturbative QCD [44, 46]. However, as argued
919
+ elsewhere [43], this value is obtained only at very large Q2, and the value is quite different for
920
+ small η. Figures 8 and 9 show plots of these observables at angles of 0◦ and 30◦, respectively.
921
+ We also compare with data [25] in Figs. 10, 11, and 12. At these ‘small’ values of Q2, only
922
+ t22 is consistent with data, something which is likely accidental with both data and model
923
+ values near zero.
924
+ IV.
925
+ PHOTODISINTEGRATION
926
+ In the photodisintegration of a deuteron, a real photon is absorbed and the two constituent
927
+ nucleons emitted. This process is depicted in Fig. 13. The initial deuteron and photon four-
928
+ momenta in the center-of-mass (c.m.) frame are p = (Ed, 0, 0, −qz) and q = (qz, 0, 0, qz),
929
+ where the incident photon is taken along the positive z axis. The final proton and neutron
930
+ four-momenta are p′
931
+ p = (E′
932
+ p, ⃗p ′
933
+ p) and p′
934
+ n = (E′
935
+ n, ⃗p ′
936
+ n), with θp and φp the polar and azimuthal
937
+ angles of the final proton.
938
+ By ignoring the nucleon mass difference, we have E′
939
+ p = E′
940
+ n,
941
+ because momentum conservation guarantees ⃗p ′
942
+ n = −⃗p ′
943
+ p in the c.m. frame.
944
+ In terms of the Mandelstam variable s, the c.m. energies and momenta are
945
+ Ed = (s + 4m2)/(2√s), qz = (s − 4m2)/(2√s), E′
946
+ p = √s/2, |⃗p ′
947
+ p| =
948
+
949
+ s − 4m2/2.
950
+ (4.1)
951
+ The photon energy in the lab frame is Eγ = (s − 4m2)/4m. We will work at large s, so that
952
+ momentum transfers are large.
953
+ The standard definition of helicity amplitudes for photodisintegration is [47]
954
+ Fi± ≡ ǫν(λγ)Mν(λ′
955
+ p, λ′
956
+ n, λd)
957
+ (4.2)
958
+ 12
959
+
960
+
961
+ ��5e0���e0���
962
+ V�)�
963
+ V�)�
964
+ V�)�
965
+ V�
966
+ V5)�
967
+ V5)�
968
+ V5)�
969
+ V5)�
970
+ 5
971
+ ��08����Q
972
+ �55
973
+ �5�
974
+ �5�
975
+ �5�
976
+ �5�
977
+ �5�
978
+ �5�
979
+ FIG. 8.
980
+ Deuteron tensor polarization observables t20 (solid), t21 (dashed), and t22 (dotted) as
981
+ computed in the model at an angle of θe = 0◦.
982
+ The asymptotic value of t20(0◦) is −
983
+
984
+ 2, as
985
+ predicted by perturbative QCD [44, 46].
986
+ with ǫ the polarization vector for a photon with helicity λγ and Mν given in (2.8). The
987
+ index i is associated with particular helicity combinations as follows:
988
+ F1± = ǫν(1)Mν(±1
989
+ 2, ±1
990
+ 2, 1), F2± = ǫν(1)Mν(±1
991
+ 2, ±1
992
+ 2, 0),
993
+ (4.3)
994
+ F3± = ǫν(1)Mν(±1
995
+ 2, ±1
996
+ 2, −1), F4± = ǫν(1)Mν(±1
997
+ 2, ∓1
998
+ 2, 1),
999
+ (4.4)
1000
+ F5± = ǫν(1)Mν(±1
1001
+ 2, ∓1
1002
+ 2, 0), F6± = ǫν(1)Mν(±1
1003
+ 2, ∓1
1004
+ 2, −1).
1005
+ (4.5)
1006
+ The other helicity combinations are related to these by parity.
1007
+ The helicity amplitudes can be used to compute various polarization observables. The
1008
+ recoil-proton polarization Py measures the asymmetry parallel/antiparallel to the normal
1009
+ ˆy ∝ ⃗q × ⃗p ′
1010
+ p to the scattering plane:
1011
+ Py = 2Im
1012
+ 3
1013
+
1014
+ i=1
1015
+ [F †
1016
+ i+Fi+3,− + F †
1017
+ i+3,+Fi−]/f(θ),
1018
+ (4.6)
1019
+ where f(θ) =
1020
+ �6
1021
+ i=1[|Fi+|2 + |Fi−|2] is the sum of all the helicity amplitudes squared. The
1022
+ transferred polarizations Cx′ and Cz′ measure asymmetries parallel/antiparallel to the ˆx′ ∝
1023
+ ⃗p ′
1024
+ p × ˆy and ˆz′ = ˆp ′
1025
+ p directions:
1026
+ Cx′ = 2Re
1027
+ 3
1028
+
1029
+ i=1
1030
+ [F †
1031
+ i+Fi+3,− + F †
1032
+ i+3,+Fi−]/f(θ),
1033
+ (4.7)
1034
+ Cz′ =
1035
+ 6
1036
+
1037
+ i=1
1038
+ [|Fi+|2 − |Fi−|2]/f(θ).
1039
+ (4.8)
1040
+ 13
1041
+
1042
+
1043
+ ���e0���e0���
1044
+ V�)�
1045
+ V�)�
1046
+ V�)�
1047
+ V�)�
1048
+ V�)�
1049
+
1050
+ ��03����Q
1051
+ ���
1052
+ ���
1053
+ ���
1054
+ ���
1055
+ ���
1056
+ ���
1057
+ ���
1058
+ FIG. 9. Same as Fig. 8 but for an angle of θe = 30◦.
1059
+ The asymmetry Σ for linearly polarized photons is given by
1060
+ Σ = −2Re
1061
+ ��
1062
+ ±
1063
+ (F †
1064
+ 1±F3∓ − F †
1065
+ 4±F6∓) − F †
1066
+ 2+F2− + F †
1067
+ 5+F5−
1068
+
1069
+ /f(θ).
1070
+ (4.9)
1071
+ Each observable is formed as a ratio, which sets aside questions of normalization.
1072
+ Because we only need to consider photons with helicity +1, the polarization vector is
1073
+ always ǫ = − 1
1074
+
1075
+ 2(0, 1, i, 0), relative to the momentum in the positive z direction. The final
1076
+ Dirac spinors are
1077
+ u′
1078
+ N = ̸p′
1079
+ N + m
1080
+
1081
+ E′
1082
+ N + m
1083
+
1084
+ φ(λ′
1085
+ N)(ˆp′
1086
+ N)
1087
+ 0
1088
+
1089
+ ,
1090
+ (4.10)
1091
+ with θn = π − θp, φn = φp + π = π, and
1092
+ φ(1/2)(ˆp′
1093
+ N) =
1094
+
1095
+ cos(θN/2)
1096
+ eiφN sin(θN/2)
1097
+
1098
+ , φ(−1/2)(ˆp′
1099
+ N) =
1100
+
1101
+ −e−iφN sin(θN/2)
1102
+ cos(θN/2)
1103
+
1104
+ .
1105
+ (4.11)
1106
+ With these spinors as input, the amplitudes ǫνMν
1107
+ X can be evaluated in terms of Dirac
1108
+ matrix and spinor products and then combined to construct the predefined amplitudes Fi±.
1109
+ At large s, these RNHA predictions for the helicity amplitudes reduce to
1110
+ F1+ ∼ 4
1111
+
1112
+ 2
1113
+ √scsc2(θp
1114
+ 2 )GEn(θp)GEp(θp), F1− ∼ 0,
1115
+ (4.12)
1116
+ F2+ ∼ 2m
1117
+ s cot3(θp
1118
+ 2 )[GEn(θp)GMp(θp) − GMn(θp)GEp(θp)],
1119
+ (4.13)
1120
+ F2− ∼ 2m
1121
+ s cot(θp
1122
+ 2 )[GMn(θp)GEp(θp) − GEn(θp)GMp(θp)],
1123
+ F3+ ∼ 0, F3− ∼ 0,
1124
+ (4.14)
1125
+ 14
1126
+
1127
+
1128
+ ���
1129
+ 1���
1130
+ 1���
1131
+ 1���
1132
+ 1���
1133
+
1134
+ ���
1135
+ ���
1136
+ ���
1137
+ ���
1138
+ ��0(����G
1139
+ ���
1140
+ ���
1141
+ ���
1142
+ ���
1143
+ ���
1144
+ ���
1145
+ ���
1146
+ FIG. 10. Plots of the tensor polarization observable t20 of the deuteron from both data [25] (circles)
1147
+ and the model (squares) considered in the text. The angle θe varies and is as follows in order of
1148
+ increasing Q2: 35.6◦, 33.4◦, 29.8◦, 27.3◦, 23.0◦, and 19.8◦.
1149
+ F4+ ∼ −4
1150
+
1151
+ 2m
1152
+ s cot(θp
1153
+ 2 )GMn(θp)GEp(θp), F4− ∼ 4
1154
+
1155
+ 2m
1156
+ s cot(θp
1157
+ 2 )GEn(θp)GMp(θp), (4.15)
1158
+ F5+ ∼ 2
1159
+ √s cot2(θp
1160
+ 2 )GEn(θp)GEp(θp), F5− ∼ 2
1161
+ √sGEn(θp)GEp(θp),
1162
+ (4.16)
1163
+ F6+ ∼ 4
1164
+
1165
+ 2m
1166
+ s cot3(θp
1167
+ 2 )GEn(θp)GMp(θp), F6− ∼ −4
1168
+
1169
+ 2m
1170
+ s cot(θp
1171
+ 2 )GMn(θp)GEp(θp).(4.17)
1172
+ From these we can calculate the various observables. Plots of the results and recent data [48–
1173
+ 50] are given in Figs. 14, 15, 16, and 17. Because the tree-level amplitudes are real, Py is
1174
+ automatically zero. That Cx′ is of order m/√s, rather than zero, is a correction to hadron
1175
+ helicity conservation [51]. Also, we find the asymmetry Σ(90◦) to be approximately -0.06,
1176
+ rather than the nominal expectation [52] of -1. In general, the trends with photon energy
1177
+ seem to be modestly consistent with data.
1178
+ V.
1179
+ ELECTRODISINTEGRATION
1180
+ The kinematics of the electrodisintegration process are shown in Fig. 18. The initial (final)
1181
+ momentum and helicity of the electron are pe (p′
1182
+ e) and λe (λ′
1183
+ e). The intermediate photon
1184
+ carries four-momentum q. The azimuthal angle φp of the proton measures the rotation of
1185
+ the hadronic reaction plane relative to the electron scattering plane.
1186
+ In the lab frame, with the z axis taken along the photon three-momentum and the electron
1187
+ mass neglected, the initial and final electron four-momenta are
1188
+ pe = (Ee, Ee sin θe, 0, Ee cos θe), p′
1189
+ e = (E′
1190
+ e, E′
1191
+ e sin θ′
1192
+ e, 0, E′
1193
+ e cos θ′
1194
+ e),
1195
+ (5.1)
1196
+ 15
1197
+
1198
+
1199
+ ���
1200
+ V�)�
1201
+ V�)�
1202
+
1203
+ �)�
1204
+ �)�
1205
+ �)�
1206
+ �)�
1207
+ �)�
1208
+ �)�
1209
+ ��1Q����
1210
+ �)�
1211
+ �)�
1212
+
1213
+ �)�
1214
+ �)�
1215
+ �)�
1216
+ �)�
1217
+ FIG. 11. Same as Fig. 10 but for t21.
1218
+
1219
+ ���
1220
+ 8�4��
1221
+ 8�4�
1222
+ 8�4��
1223
+ 8�4�
1224
+ 8�4��
1225
+
1226
+ �4��
1227
+ �4�
1228
+ �4��
1229
+ ��-G����e
1230
+ �4�
1231
+ �4�
1232
+
1233
+ �4�
1234
+ �4�
1235
+ �4�
1236
+ �4�
1237
+ FIG. 12. Same as Fig. 10 but for t22.
1238
+ with E′
1239
+ e and ˜θ = θ′
1240
+ e − θe, the angle of the scattered electron to the beam direction, being
1241
+ measured. The photon four-momentum q = (Eγ, 0, 0, qz) is just pe − p′
1242
+ e, which yields
1243
+ Q2 ≡ −q2 = 2EeE′
1244
+ e(1 − cos ˜θ), Eγ = Ee − E′
1245
+ e, qz =
1246
+
1247
+ E2γ + Q2.
1248
+ (5.2)
1249
+ The deuteron four-momentum is p = (md = 2m, 0, 0, 0), and in the zero-binding limit, the
1250
+ initial proton and neutron four-momenta are pp = pn = (m, 0, 0, 0).
1251
+ The final nucleon
1252
+ 16
1253
+
1254
+ ⃗q, λγ
1255
+ ⃗p, λd
1256
+ ⃗p ′
1257
+ p, λ′
1258
+ p
1259
+ ⃗p ′
1260
+ n, λ′
1261
+ n
1262
+ θn = π − θp
1263
+ θp
1264
+ z
1265
+ FIG. 13. Kinematics for deuteron photodisintegration in the c.m. frame, with ⃗q the photon mo-
1266
+ mentum and ⃗p = −⃗q the deuteron momentum. The final proton and neutron momenta are ⃗p ′
1267
+ p and
1268
+ ⃗p ′
1269
+ n. The λ’s are helicities. Coordinates are chosen such that the photon enters along the positive
1270
+ z direction and the azimuthal angle φp of the proton is zero.
1271
+ Eγ (GeV)
1272
+ 0
1273
+ 1
1274
+ 2
1275
+ 3
1276
+ 4
1277
+ 5
1278
+ 6
1279
+ Py (90 deg)
1280
+ -1.0
1281
+ -0.8
1282
+ -0.6
1283
+ -0.4
1284
+ -0.2
1285
+ 0.0
1286
+ 0.2
1287
+ 0.4
1288
+ 0.6
1289
+ 0.8
1290
+ 1.0
1291
+ θ (deg)
1292
+ 0
1293
+ 20
1294
+ 40
1295
+ 60
1296
+ 80
1297
+ 100
1298
+ 120
1299
+ 140
1300
+ 160
1301
+ 180
1302
+ Py (Eγ=2 GeV)
1303
+ -1.0
1304
+ -0.8
1305
+ -0.6
1306
+ -0.4
1307
+ -0.2
1308
+ 0.0
1309
+ 0.2
1310
+ 0.4
1311
+ 0.6
1312
+ 0.8
1313
+ 1.0
1314
+ (a)
1315
+ (b)
1316
+ FIG. 14. Recoil proton polarization Py as a function of (a) photon energy Eγ and (b) proton angle
1317
+ θ. For the latter, the photon energy is 2 GeV. The solid line is the RNHA prediction; the data
1318
+ points are from [48, 49].
1319
+ four-momenta are
1320
+ p′
1321
+ p = (E′
1322
+ p =
1323
+
1324
+ ⃗p ′2
1325
+ p + m2, |⃗p ′
1326
+ p| sin θp cos φp, |⃗p ′
1327
+ p| sin θp sin φp, |⃗p ′
1328
+ p| cos θp),
1329
+ (5.3)
1330
+ p′
1331
+ n = (E′
1332
+ n =
1333
+
1334
+ ⃗p ′2
1335
+ n + m2, −|⃗p ′
1336
+ n| sin θn cos φp, −|⃗p ′
1337
+ n| sin θn sin φp, |⃗p ′
1338
+ n| cos θn).
1339
+ (5.4)
1340
+ Within the one-photon-exchange approximation, the scattering amplitude is proportional
1341
+ 17
1342
+
1343
+ Eγ (GeV)
1344
+ 0
1345
+ 1
1346
+ 2
1347
+ 3
1348
+ 4
1349
+ 5
1350
+ 6
1351
+ Cx' (90 deg)
1352
+ -1.0
1353
+ -0.8
1354
+ -0.6
1355
+ -0.4
1356
+ -0.2
1357
+ 0.0
1358
+ 0.2
1359
+ 0.4
1360
+ 0.6
1361
+ 0.8
1362
+ 1.0
1363
+ θ (deg)
1364
+ 0
1365
+ 20
1366
+ 40
1367
+ 60
1368
+ 80
1369
+ 100
1370
+ 120
1371
+ 140
1372
+ 160
1373
+ 180
1374
+ Cx' (Eγ=2 GeV)
1375
+ -1.0
1376
+ -0.8
1377
+ -0.6
1378
+ -0.4
1379
+ -0.2
1380
+ 0.0
1381
+ 0.2
1382
+ 0.4
1383
+ 0.6
1384
+ 0.8
1385
+ 1.0
1386
+ (a)
1387
+ (b)
1388
+ FIG. 15. Same as Fig. 14 but for the transferred polarization Cx′.
1389
+ Eγ (GeV)
1390
+ 0
1391
+ 1
1392
+ 2
1393
+ 3
1394
+ 4
1395
+ 5
1396
+ 6
1397
+ Cz' (90 deg)
1398
+ -1.0
1399
+ -0.8
1400
+ -0.6
1401
+ -0.4
1402
+ -0.2
1403
+ 0.0
1404
+ 0.2
1405
+ 0.4
1406
+ 0.6
1407
+ 0.8
1408
+ 1.0
1409
+ θ (deg)
1410
+ 0
1411
+ 20
1412
+ 40
1413
+ 60
1414
+ 80
1415
+ 100
1416
+ 120
1417
+ 140
1418
+ 160
1419
+ 180
1420
+ Cz' (Eγ=2 GeV)
1421
+ -1.0
1422
+ -0.8
1423
+ -0.6
1424
+ -0.4
1425
+ -0.2
1426
+ 0.0
1427
+ 0.2
1428
+ 0.4
1429
+ 0.6
1430
+ 0.8
1431
+ 1.0
1432
+ (a)
1433
+ (b)
1434
+ FIG. 16. Same as Fig. 15 but for Cz′.
1435
+ to
1436
+ Med(λ′
1437
+ p, λ′
1438
+ n, λ′
1439
+ e; λd, λe) = ¯u′
1440
+ eγµue
1441
+ Dµν
1442
+ q2 Mν(λ′
1443
+ p, λ′
1444
+ n, λd),
1445
+ (5.5)
1446
+ with ue (u′
1447
+ e) the initial (final) spinor of the electron and Mν given in (2.8). The numerator
1448
+ of the photon progator is the sum over photon polarizations
1449
+ Dµν =
1450
+ 1
1451
+
1452
+ λ=−1
1453
+ (−1)λǫ∗
1454
+ µ(λ)ǫν(λ).
1455
+ (5.6)
1456
+ 18
1457
+
1458
+ Eγ (GeV)
1459
+ 0
1460
+ 1
1461
+ 2
1462
+ 3
1463
+ 4
1464
+ 5
1465
+ 6
1466
+ Σ (90 deg)
1467
+ -1.0
1468
+ -0.8
1469
+ -0.6
1470
+ -0.4
1471
+ -0.2
1472
+ 0.0
1473
+ 0.2
1474
+ 0.4
1475
+ 0.6
1476
+ 0.8
1477
+ 1.0
1478
+ θ (deg)
1479
+ 0
1480
+ 20
1481
+ 40
1482
+ 60
1483
+ 80
1484
+ 100
1485
+ 120
1486
+ 140
1487
+ 160
1488
+ 180
1489
+ Σ (Eγ=2 GeV)
1490
+ -0.10
1491
+ -0.08
1492
+ -0.06
1493
+ -0.04
1494
+ -0.02
1495
+ 0.00
1496
+ 0.02
1497
+ 0.04
1498
+ 0.06
1499
+ 0.08
1500
+ 0.10
1501
+ (a)
1502
+ (b)
1503
+ FIG. 17. Same as Fig. 14 but for the asymmetry Σ. The data points are from [50].
1504
+ The polarization four-vectors are4
1505
+ ǫ(±1) = ∓ 1
1506
+
1507
+ 2(0, 1, ±i, 0), ǫ(0) = (qz/Q, 0, 0, Eγ/Q)
1508
+ (5.7)
1509
+ relative to the photon four-momentum q = (Eγ, 0, 0, qz). Polarization observables [5–15] can
1510
+ then be computed from these helicity amplitudes.
1511
+ ⃗pe, λe
1512
+ ⃗p ′
1513
+ e, λ′
1514
+ e
1515
+ x
1516
+ ⃗q
1517
+ ⃗p ′
1518
+ p, λ′
1519
+ p
1520
+ ⃗p ′
1521
+ n, λ′
1522
+ n
1523
+ y′
1524
+ x′
1525
+ z, z′
1526
+ y
1527
+ θp
1528
+ φp
1529
+ θe
1530
+ θ′
1531
+ e
1532
+ z
1533
+ θn
1534
+ ˜θ
1535
+ FIG. 18. Kinematics for deuteron electrodisintegration. The unprimed axes are defined relative to
1536
+ the electron scattering plane, and the primed axes relative to the final nucleon momenta. The final
1537
+ proton momentum has polar angle θp and azimuthal angle φp relative to the unprimed frame.
1538
+ 4 In the hadronic c.m. frame, the longitudinal polarization vector is ǫ(0) = (q′
1539
+ z/Q, 0, 0, E′
1540
+ γ/Q).
1541
+ 19
1542
+
1543
+ In keeping with the notation of [6, 7] and [15], the differential cross section for elec-
1544
+ trodisintegration, summed over the final electron and neutron helicities in the lab frame,
1545
+ is [14, 15]5
1546
+ dσ ≡
1547
+ dσ5
1548
+ dE′dΩ′
1549
+ edΩ′
1550
+ p
1551
+ (5.8)
1552
+ = mpmn|⃗p ′
1553
+ p|
1554
+ 16π3md
1555
+ σMott
1556
+ frec
1557
+ [νLRL + νT RT + νTTRTT + νLTRLT + 2λeνLT ′TLT ′ + 2λeνT ′RT ′] ,
1558
+ where Ω′
1559
+ e (Ω′
1560
+ p) is the solid angle of the scattered electron (proton), σMott is the Mott cross
1561
+ section, frec = |1 + (Eγ|⃗p ′
1562
+ p| − E′
1563
+ pqz cos θp)/(md|⃗p ′
1564
+ p|)| is the lab recoil factor,
1565
+ νL = Q4
1566
+ q4z
1567
+ , νT = Q2
1568
+ 2q2z
1569
+ + tan2 ˜θ
1570
+ 2, νTT = Q2
1571
+ 2q2z
1572
+ , νLT =
1573
+ Q2
1574
+
1575
+ 2q2
1576
+ z
1577
+
1578
+
1579
+
1580
+ �Q2
1581
+ q2z
1582
+ + tan2 ˜θ
1583
+ 2,
1584
+ (5.9)
1585
+ νLT ′ = − Q2
1586
+
1587
+ 2q2z
1588
+ tan
1589
+ ˜θ
1590
+ 2, νT ′ = tan
1591
+ ˜θ
1592
+ 2
1593
+
1594
+
1595
+
1596
+ �Q2
1597
+ q2
1598
+ z
1599
+ + tan2 ˜θ
1600
+ 2,
1601
+ and ˜θ = θ′
1602
+ e − θe is the angle between the incoming and outgoing electron. The response
1603
+ functions RX depend upon the hadronic helicity amplitudes and the azimuthal angle φp of
1604
+ the hadronic scattering plane. The subscripts refer to the polarization of the intermediate
1605
+ photon, which enters on substitution of the polarization expansion (5.6) for the numerator
1606
+ of the photon propagator in the hadronic amplitude (5.5). The amplitude then decomposes
1607
+ into separate leptonic and hadronic factors
1608
+ Med(λ′
1609
+ p, λ′
1610
+ n, λ′
1611
+ e; λd, λe) = −
1612
+ 1
1613
+
1614
+ λ=−1
1615
+ ¯u′
1616
+ e̸ ǫ∗(λ)ue
1617
+ (−1)λ
1618
+ Q2
1619
+ ǫν(λ)Mν(λ′
1620
+ p, λ′
1621
+ n, λd).
1622
+ (5.10)
1623
+ The leptonic factors give rise to the νX coefficients, and the hadronic factors to the response
1624
+ functions in the square of the amplitude used to construct the cross section [15].
1625
+ The
1626
+ subscript L(T) indicates a purely longitudinal (transverse) contribution, while LT is a cross
1627
+ term between longitudinal and transverse photon helicities. The TT subscript marks a cross
1628
+ term between different transverse helicities. A prime indicates a different combination of
1629
+ transverse helicities.
1630
+ The response functions are computed from components of the hadronic tensor
1631
+ wλ′,λ = 2
1632
+ 3
1633
+
1634
+ λ′′p,λ′p,λ′n,λ′′
1635
+ d,λd
1636
+ ǫ∗
1637
+ ν(λ′)Mν∗(λ′′
1638
+ p, λ′
1639
+ n, λ′′
1640
+ d)ρp
1641
+ λ′′p,λ′pǫµ(λ)Mµ(λ′
1642
+ p, λ′
1643
+ n, λd)ρd
1644
+ λ′′
1645
+ d,λd,
1646
+ (5.11)
1647
+ with ρp(ρd) the density matrix for the proton (deuteron) helicity state. We construct these
1648
+ in the xyz coordinate system of the electron scattering plane. The particular components
1649
+ are [6]
1650
+ RL = w0,0, RT = w1,1 + w−1,−1, RT ′ = w1,1 − w−1,−1,
1651
+ (5.12)
1652
+ RTT = 2Rew1,−1, RLT = −2Re [w0,1 − w0,−1] , RLT ′ = −2Re [w0,1 + w0,−1] .
1653
+ 5 In [6], h is 2λe but in [15], h is just λe, which leads to additional factors of 2.
1654
+ 20
1655
+
1656
+ For an unpolarized target, the deuteron density matrix is proportional to the identity,
1657
+ ρd =
1658
+ 1
1659
+ 3I; similarly, if the proton helicity is not detected, ρp =
1660
+ 1
1661
+ 2I.
1662
+ We then have the
1663
+ unpolarized cross section [6]
1664
+ dσunpol = mpmn|⃗p ′
1665
+ p|
1666
+ 16π3md
1667
+ σMott
1668
+ frec
1669
+ σ0, σ0 ≡ νLRU
1670
+ L + νTRU
1671
+ T + νTTRU
1672
+ TT + νLTRU
1673
+ LT ,
1674
+ (5.13)
1675
+ where the RU
1676
+ X are computed with the simple density matrices. These are then computable
1677
+ in our model, with the basic computation being the evaluation of ǫ(λγ)µMµ, which differs
1678
+ from the photodisintegration calculation in only two ways: Q2 is not zero and λγ ranges
1679
+ over all three possibilities.
1680
+ The unpolarized response functions RU
1681
+ LT ′ and RU
1682
+ T ′ are identically zero. With ρd replaced
1683
+ by 1
1684
+ 3I and the form (5.7) of the polarization vectors taken into account, Rew(0, 1) is just
1685
+ the negative of Rew(0, −1), and w1,1 is equal to w−1,−1. Thus, the inputs to RU
1686
+ LT ′ and RU
1687
+ T ′,
1688
+ as given in (5.12), immediately cancel.
1689
+ The recent ed → e′pn experiment at JLab [17] does not include polarization but does
1690
+ begin to reach momentum transfers sufficient to consider the RNHA approach. Once po-
1691
+ larization data is available, the expressions developed here and in the Appendix can be
1692
+ compared.
1693
+ VI.
1694
+ SUMMARY
1695
+ We have extended the reduced nuclear amplitude approach [1, 2] to helicity amplitudes
1696
+ and applied this model to analysis of elastic electron-deuteron scattering, deuteron photo-
1697
+ disintegration, and deuteron electrodisintegration. These are just examples of the approach,
1698
+ which is generally applicable to exclusive nuclear processes. The primary limitation is that,
1699
+ for any process, the net momentum transfer to every nucleon must be large; therefore,
1700
+ as the number of nucleons increases, the required beam energy can increase dramatically.
1701
+ The primary gain is precocious scaling in the dependence on momentum transfer. What the
1702
+ model (or the original RNA approach) does not provide, though, is an overall normalization;
1703
+ comparisons must be made in terms of ratios.
1704
+ By considering helicity amplitudes, many more quantities can be studied, including po-
1705
+ larization dependence. All three of the deuteron’s electromagnetic form factors can be cal-
1706
+ culated and from there various elastic scattering observables can be constructed. In Sec. III
1707
+ we considered the standard structure functions A and B as well as the tensor polarizations
1708
+ t2m. Generally, the model implies the need for momentum transfers larger than one would
1709
+ have hoped for seeing simple perturbative QCD scaling. However, our results do imply that
1710
+ the deuteron structure function B is a good place to look, above a transfer of 10 GeV2.
1711
+ The RNHA results for polarization observables in deuteron photodisintegration, consid-
1712
+ ered in Sec. IV, are somewhat consistent with experiment. In particular, our result for the
1713
+ asymmetry Σ, with a value of Σ(90◦) ≃ −0.06, is much better than the value of -1 originally
1714
+ expected [52]. Higher photon energies would, of course, be useful.
1715
+ We have also constructed the RNHA framework for analysis of deuteron electrodisinte-
1716
+ gration, in Sec. V. This stands ready for comparison with experiment when data is available
1717
+ at sufficient energies. One aspect that does remain is to consider polarization of the outgoing
1718
+ proton, in addition to polarization of the beam and target.
1719
+ Other processes that one might consider include deeply virtual Compton scattering on
1720
+ the deuteron, pion photoproduction on the deuteron [3], and photodisintegration of 3He [4].
1721
+ 21
1722
+
1723
+ In each case, our approach can provide not only information about helicity amplitudes but
1724
+ also an analysis of nonleading momentum transfer dependence with respect to the onset of
1725
+ perturbative QCD scaling. We look forward to experiments at larger momentum transfers
1726
+ for all of these processes.
1727
+ ACKNOWLEDGMENTS
1728
+ This work began in conversations with S.J. Brodsky and D.-S. Hwang. Some calculations
1729
+ were checked by W. Miller and C. Salveson. Diagrams were drawn with use of JaxoDraw [53].
1730
+ Appendix A: Electrodisintegration with polarization
1731
+ If we consider polarization for the beam and the target,6 the proton density matrix is
1732
+ still just ρp = 1
1733
+ 2I, but the deuteron density matrix in the xyz frame is [6]
1734
+ ρd = 1
1735
+ 3
1736
+
1737
+
1738
+
1739
+
1740
+
1741
+ 1 +
1742
+
1743
+ 3
1744
+ 2T10 +
1745
+ 1
1746
+
1747
+ 2T20 −
1748
+
1749
+ 3
1750
+ 2(T ∗
1751
+ 11 + T ∗
1752
+ 21)
1753
+
1754
+ 3T ∗
1755
+ 22
1756
+
1757
+
1758
+ 3
1759
+ 2(T11 + T21)
1760
+ 1 −
1761
+
1762
+ 2T20
1763
+
1764
+
1765
+ 3
1766
+ 2(T ∗
1767
+ 11 − T ∗
1768
+ 21)
1769
+
1770
+ 3T22
1771
+
1772
+
1773
+ 3
1774
+ 2(T11 − T21) 1 −
1775
+
1776
+ 3
1777
+ 2T10 +
1778
+ 1
1779
+
1780
+ 2T20
1781
+
1782
+
1783
+
1784
+
1785
+  .
1786
+ (A1)
1787
+ For a target polarization defined relative to the beam direction, rather than the xyz system
1788
+ used above, the tensor polarization coefficients TJM are related to the coefficients ˜TJM defined
1789
+ relative to the beam [6]. If only ˜T10 and ˜T20 are nonzero,7 the nonzero TJM are
1790
+ T10 = cos ˜θ ˜T10, T11 = − 1
1791
+
1792
+ 2 sin ˜θ ˜T10,
1793
+ (A2)
1794
+ T20 = 1
1795
+ 4(1 + 3 cos 2˜θ) ˜T20, T21 = −
1796
+
1797
+ 3
1798
+ 8 sin 2˜θ ˜T20, T22 =
1799
+
1800
+ 3
1801
+ 32(1 − cos 2˜θ) ˜T20.
1802
+ The density matrix can then be written as
1803
+ ρd =
1804
+ �1
1805
+ 3I + ˜T10ρdV + ˜T20ρdT
1806
+
1807
+ ,
1808
+ (A3)
1809
+ where
1810
+ ρdV = 1
1811
+ 3
1812
+
1813
+
1814
+
1815
+
1816
+
1817
+
1818
+ 3
1819
+ 2 cos ˜θ
1820
+
1821
+ 3
1822
+ 2 sin ˜θ
1823
+ 0
1824
+
1825
+ 3
1826
+ 2 sin ˜θ
1827
+ 0
1828
+
1829
+ 3
1830
+ 2 sin ˜θ
1831
+ 0
1832
+
1833
+ 3
1834
+ 2 sin ˜θ −
1835
+
1836
+ 3
1837
+ 2 cos ˜θ
1838
+
1839
+
1840
+
1841
+
1842
+
1843
+ (A4)
1844
+ and
1845
+ ρdT = 1
1846
+ 3
1847
+
1848
+
1849
+
1850
+
1851
+ 1
1852
+ 4
1853
+
1854
+ 2(1 + 3 cos 2˜θ)
1855
+ 3
1856
+ 4 sin 2˜θ
1857
+ 3
1858
+
1859
+ 32(1 − cos 2˜θ)
1860
+ 3
1861
+ 4 sin 2˜θ
1862
+
1863
+ 1
1864
+ 2
1865
+
1866
+ 2(1 + 3 cos 2˜θ)
1867
+ −3
1868
+ 4 sin 2˜θ
1869
+ 3
1870
+
1871
+ 32(1 − cos 2˜θ)
1872
+ −3
1873
+ 4 sin 2˜θ
1874
+ 1
1875
+ 4
1876
+
1877
+ 2(1 + 3 cos 2˜θ)
1878
+
1879
+
1880
+
1881
+  .
1882
+ (A5)
1883
+ 6 For discussion of a polarized outgoing proton, see [7] and [15].
1884
+ 7 The spherical tensor moments are related to the Cartesian tensor moments as ˜T10 =
1885
+
1886
+ 3
1887
+ 2Pz and ˜T20 =
1888
+ 1
1889
+
1890
+ 2Pzz.
1891
+ 22
1892
+
1893
+ The response functions can then be separated into unpolarized, vector, and tensor contri-
1894
+ butions as RX = RU
1895
+ X + ˜T10RV
1896
+ X + ˜T20RT
1897
+ X, with RU
1898
+ X, RV
1899
+ X, and RT
1900
+ X computed with ρd replaced
1901
+ by 1
1902
+ 3I, ρdV , and ρdT , respectively.
1903
+ With dσunpol defined as the unpolarized cross section, given in (5.13), the full cross section
1904
+ can be written as
1905
+ dσ =
1906
+
1907
+ 1 + ˜T10
1908
+
1909
+ AV
1910
+ d + 2λeAV
1911
+ ed
1912
+
1913
+ + ˜T20
1914
+
1915
+ AT
1916
+ d + 2λeAT
1917
+ ed
1918
+ ��
1919
+ dσunpol,
1920
+ (A6)
1921
+ in terms of the single and double asymmetries
1922
+ AV
1923
+ d =
1924
+
1925
+ νLRV
1926
+ L + νTRV
1927
+ T + νTTRV
1928
+ TT + νLT RV
1929
+ LT
1930
+
1931
+ /σ0,
1932
+ (A7)
1933
+ AV
1934
+ ed =
1935
+
1936
+ νLT ′RV
1937
+ LT ′ + νT ′RV
1938
+ T ′
1939
+
1940
+ /σ0,
1941
+ (A8)
1942
+ AT
1943
+ d =
1944
+
1945
+ νLRT
1946
+ L + νTRT
1947
+ T + νTTRT
1948
+ TT + νLTRT
1949
+ LT
1950
+
1951
+ /σ0,
1952
+ (A9)
1953
+ AT
1954
+ ed =
1955
+
1956
+ νLT ′RT
1957
+ LT ′ + νT ′RT
1958
+ T ′
1959
+
1960
+ /σ0.
1961
+ (A10)
1962
+ For a recent summary of data, see [54].
1963
+ [1] S.J. Brodsky and B.T. Chertok, The deuteron form-factor and the short distance behavior of
1964
+ the nuclear force, Phys. Rev. Lett. 37, 269 (1976); The asymptotic form-factors of hadrons
1965
+ and nuclei and the continuity of particle and nuclear dynamics, Phys. Rev. D 14, 3003 (1976).
1966
+ [2] S.J. Brodsky and J.R. Hiller, Reduced nuclear amplitudes in Quantum Chromodynamics,
1967
+ Phys. Rev. C 28, 475 (1983); 30, 412E (1984).
1968
+ [3] S. J. Brodsky, J. R. Hiller, C. R. Ji, and G. A. Miller, Perturbative QCD and factorization of
1969
+ coherent pion photoproduction on the deuteron, Phys. Rev. C 64, 055204 (2001).
1970
+ [4] S. J. Brodsky, L. Frankfurt, R. A. Gilman, J. R. Hiller, G. A. Miller, E. Piasetzky, M. Sargsian,
1971
+ and M. Strikman, Hard photodisintegration of a proton pair in 3He, Phys. Lett. B 578, 69
1972
+ (2004).
1973
+ [5] S. Jeschonnek and J.W. Van Orden, Modeling quark-hadron duality in polarization observ-
1974
+ ables, Phys. Rev. D 71, 054019 (2005); A new calculation for D(e, e′p)n at GeV energies,
1975
+ Phys. Rev. C 78, 014007 (2008).
1976
+ [6] S. Jeschonnek and J.W. Van Orden, Target polarization for 2⃗H(e, e′p) at GeV energies, Phys.
1977
+ Rev. C 80, 054001 (2009).
1978
+ [7] S. Jeschonnek and J.W. Van Orden, Ejectile polarization for 2H(e, e′⃗p) at GeV energies, Phys.
1979
+ Rev. C 81, 014008 (2010).
1980
+ [8] W. P. Ford, S. Jeschonnek and J. W. Van Orden, 2H(e, e′p) observables using a Regge model
1981
+ parameterization of final state interactions, Phys. Rev. C 87, 054006 (2013); Momentum
1982
+ distributions for 2H(e, e′p), Phys. Rev. C 90, 064006 (2014); S. Jeschonnek and J.W. Van
1983
+ Orden, Factorization breaking of AT
1984
+ d for polarized deuteron targets in a relativistic framework,
1985
+ Phys. Rev. C 95, 044001 (2017).
1986
+ [9] J.M. Laget, The electro-disintegration of few body systems revisited, Phys. Lett. B 609, 49
1987
+ (2005).
1988
+ [10] C. Ciofi delgi Atti and L.P. Kaptari, A non factorized calculation of the process 3He(e, e′p)2H
1989
+ at medium energies, Phys. Rev. Lett. 100, 122301 (2008).
1990
+ 23
1991
+
1992
+ [11] M.M. Sargsian, Large Q2 electrodisintegration of the deuteron in virtual nucleon approxima-
1993
+ tion, Phys. Rev. C 82, 014612 (2010)
1994
+ [12] H. Arenh¨ovel, W. Leidemann, and E.L. Tomusiak, General formulae for polarization observ-
1995
+ ables in deuteron electrodisintegration and linear relations, Few Body Syst. 15, 109 (1993);
1996
+ General survey of polarization observables in deuteron electrodisintegration, Eur. Phys. J. A
1997
+ 23, 147 (2005).
1998
+ [13] G.I. Gakh, A.P. Rekalo, and E. Tomasi-Gustafsson, Relativistically invariant analysis of po-
1999
+ larization effects in exclusive deuteron electrodisintegration process, Ann. Phys. 319, 150
2000
+ (2005).
2001
+ [14] A.S. Raskin and T.W. Donnelly, Polarization in coincidence electron scattering from nuclei,
2002
+ Ann. Phys. 191, 78 (1989).
2003
+ [15] V. Dmitrasinovic and F. Gross, A Comment on general formulae for polarization observables in
2004
+ deuteron electrodisintegration and linear relations, Few Body Syst. 20, 41 (1996); Polarization
2005
+ observables in deuteron photodisintegration and electrodisintegration, Phys. Rev. C 40, 2479
2006
+ (1989); 43, 1495E (1991).
2007
+ [16] C.E. Carlson, J.R. Hiller, and R.J. Holt, Relativistic QCD view of the deuteron, Ann. Rev.
2008
+ Nucl. Part. Sci. 47, 395 (1997).
2009
+ [17] C. Yero et al., Probing the deuteron at very large internal momenta, Phys. Rev. Lett. 125,
2010
+ 262501 (2020).
2011
+ [18] C. Yero, Cross Section Measurements of Deuteron Electro-Disintegration at Very High Re-
2012
+ coil Momenta and Large 4-Momentum Transfers (Q2), Ph.D. thesis, Florida International
2013
+ University, Miami, Florida, 2020, [arXiv:2009.11343 [nucl-ex]].
2014
+ [19] W. Boeglin and M. Sargsian, Modern studies of the deuteron: From the lab frame to the light
2015
+ front, Int. J. Mod. Phys. E 24, 1530003 (2015).
2016
+ [20] R. A. Gilman and F. Gross, Electromagnetic structure of the deuteron, J. Phys. G 28, R37
2017
+ (2002).
2018
+ [21] R.G. Arnold et al., Measurement of the electron-deuteron elastic-scattering cross section in
2019
+ the range 0.8 ≤ q2 ≤ 6 GeV2, Phys. Rev. Lett. 35, 776 (1975).
2020
+ [22] P.E. Bosted et al., Measurements of the deuteron and proton magnetic form factors at large
2021
+ momentum transfers, Phys. Rev. C 42, 38 (1990).
2022
+ [23] D. Abbot et al., Precise measurement of the deuteron elastic structure function A(Q2), Phys.
2023
+ Rev. Lett. 82, 1379 (1999).
2024
+ [24] L.C. Alexa et al., Measurements of the deuteron elastic structure function A(Q2) for 0.7 ≤
2025
+ Q2 ≤ 6.0 (GeV/c)2 at Jefferson Laboratory, Phys. Rev. Lett. 82, 1374 (1999).
2026
+ [25] D. Abbot et al., Measurement of tensor polarization in elastic electron-deuteron scattering at
2027
+ large momentum transfer, Phys. Rev. Lett. 84, 5053 (2000).
2028
+ [26] C. Bochna et al., Measurements of deuteron photodisintegration up to 4.0 GeV, Phys. Rev.
2029
+ Lett. 81, 4576 (1998).
2030
+ [27] E.C. Schulte et al., Measurement of the high energy two-body deuteron photodisintegration
2031
+ differential cross section, Phys. Rev. Lett. 87, 102302 (2001).
2032
+ [28] E.C. Schulte et al., High energy angular distribution measurements of the exclusive deuteron
2033
+ photodisintegration reaction, Phys. Rev. C 66, 042201 (2002).
2034
+ [29] M. Mirazita et al,. Complete angular distribution measurements of two-body deuteron photo-
2035
+ disintegration between 0.5 and 3 GeV, Phys. Rev. C 70, 014005 (2004).
2036
+ [30] W.-J. Kasdorp et al., Deuteron electrodisintegration at high missing momenta, Few Body
2037
+ Syst. 25, 115 (1998).
2038
+ 24
2039
+
2040
+ [31] P.E. Ulmer et al., 2H(e, e′p)n reaction at high recoil momenta, Phys. Rev. Lett. 89, 062301
2041
+ (2002).
2042
+ [32] W.U. Boeglin et al., Probing the high momentum component of the deuteron at high Q2,
2043
+ Phys. Rev. Lett. 107, 262501 (2011).
2044
+ [33] K. S. Egiyan et al., Experimental study of exclusive 2H(e, e′p)n reaction mechanisms at high
2045
+ Q2, Phys. Rev. Lett. 98 262502 (2007)
2046
+ [34] S.J. Brodsky, C.-R. Ji, and G.P. Lepage, Quantum Chromodynamic predictions for the
2047
+ deuteron form factor, Phys. Rev. Lett. 51, 83 (1983).
2048
+ [35] M.M. Sargsian, Polarization observables in hard rescattering mechanism of deuteron photo-
2049
+ disintegration, Phys. Lett. B 587, 41 (2004).
2050
+ [36] V.Yu. Grishina et al, Forward-backward angle asymmetry and polarization observables in
2051
+ high-energy deuteron photodisintegration, Euro. Phys. J. A 19, 117 (2004).
2052
+ [37] V.A. Knyr, V.G. Neudachin, and N.A. Khokhlov, Description of polarization data for deuteron
2053
+ photodisintegration at photon energies in the range Eγ = 1.5-2.5 GeV on the basis of the
2054
+ Moscow potential of NN interaction, Phys. Atom. Nucl. 70, 2152 (2007).
2055
+ [38] N. Huseynova, S. Mamedov, and J. Samadov, Deuteron electromagnetic form factors
2056
+ and tensor polarization observables in the framework of the hard-wall AdS/QCD model,
2057
+ [arXiv:2204.06205 [hep-ph]].
2058
+ [39] T. Gutsche, V. E. Lyubovitskij, I. Schmidt and A. Vega, Nuclear physics in soft-wall
2059
+ AdS/QCD: Deuteron electromagnetic form factors, Phys. Rev. D 91, 114001 (2015);
2060
+ T. Gutsche, V. E. Lyubovitskij and I. Schmidt, Deuteron electromagnetic structure functions
2061
+ and polarization properties in soft-wall AdS/QCD, Phys. Rev. D 94, 116006 (2016).
2062
+ [40] S. Glaster et al., Elastic electron-deuteron scattering and the electric neutron form factor at
2063
+ four-momentum transfers 5 fm−2 < q2 < 14 fm−2, Nucl. Phys. B 32, 221 (1971); M.A. Preston
2064
+ and R.K. Bhaduri, Structure of the nucleon, (Addison-Wesley,Reading, MA, 1975).
2065
+ [41] M.D. Scadron, Advanced quantum theory and its applications through Feynman diagrams,
2066
+ (Springer, Berlin, 1991).
2067
+ [42] R.G. Arnold, C.E. Carlson, and F. Gross, Elastic electron-deuteron scattering at high-energy,
2068
+ Phys. Rev. C 21, 1426 (1980).
2069
+ [43] S.J. Brodsky and J.R. Hiller, Universal properties of the electromagnetic interactions of spin
2070
+ one systems, Phys. Rev. D 46, 2141 (1992).
2071
+ [44] C. E. Carlson and F. Gross, ‘Smoking gun’ signatures for QCD in nuclear physics, Phys. Rev.
2072
+ Lett. 53, 127 (1984).
2073
+ [45] S.D. Drell and T.M. Yan, Connection of elastic electromagnetic nucleon form-factors at large
2074
+ Q2 and deep inelastic structure functions near threshold, Phys. Rev. Lett. 24, 181 (1970).
2075
+ [46] R. Dymarz and F.C. Khanna, Tensor polarization of the deuteron in elastic e−D scattering,
2076
+ Phys. Rev. Lett. 56, 1448 (1986).
2077
+ [47] V.P. Barannik et al, Proton polarization in deuteron disintegration by linearly polarized pho-
2078
+ tons and dibaryon resonances, Nucl. Phys. A 451, 751 (1986).
2079
+ [48] K. Wijesooriya et al., Polarization measurements in high-energy deuteron photodisintegration,
2080
+ Phys. Rev. Lett. 86, 2975 (2001).
2081
+ [49] X. Jiang et al., Recoil-proton polarization in high-energy deuteron photodisintegration with
2082
+ circularly polarized photons, Phys. Rev. Lett. 98, 182302 (2007).
2083
+ [50] F. Adamian et al., Measurement of the cross-section asymmetry of deuteron photodisintegra-
2084
+ tion process by linearly polarized photons in the energy range Eγ = 0.8 GeV to 1.6 GeV, Eur.
2085
+ Phys. J. A 8, 423 (2000).
2086
+ 25
2087
+
2088
+ [51] S.J. Brodsky and G.P. Lepage, Helicity selection rules and tests of gluon spin in exclusive
2089
+ QCD processes, Phys. Rev. D 24, 2848 (1981).
2090
+ [52] S.I. Nagornyi, Yu.A. Kasatkin, and I.K. Kirichenko, Photodisintegration of the deuteron at
2091
+ Eγ > 1 GeV in the model of asymptotic amplitudes, Sov. J. Nucl. Phys. 55, 189 (1992) [Yad.
2092
+ Fiz. 55, 345 (1992)].
2093
+ [53] D. Binosi, J. Collins, C. Kaufhold, and L. Theussl, JaxoDraw: A Graphical user interface for
2094
+ drawing Feynman diagrams. Version 2.0 release notes, Comput. Phys. Commun. 180, 1709
2095
+ (2009); D. Binosi and L. Theussl, JaxoDraw: A Graphical user interface for drawing Feynman
2096
+ diagrams, Comput. Phys. Commun. 161, 76 (2004).
2097
+ [54] R. Mayer et al., Beam-target double-spin asymmetry in quasielastic electron scattering off the
2098
+ deuteron with CLAS, Phys. Rev. C 95, 024005 (2017).
2099
+ 26
2100
+
1tA0T4oBgHgl3EQfMv-f/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
39E0T4oBgHgl3EQfvAGt/content/2301.02613v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:ca22543b774078f0d57fe8548443eced6dac4817703e2756258538da100ac276
3
+ size 16972427
39FST4oBgHgl3EQfZTjC/content/2301.13791v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:768ce108945b30fbe6ec3e2ad904ed1d5d520de3b8a6a44565866b1d5aa456c1
3
+ size 2577352
39FST4oBgHgl3EQfZTjC/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:49ab50c75885b5bfd0157d45291c1afdd90f71f0da990ebf1b4887cd5fb01a8a
3
+ size 5898285
39FST4oBgHgl3EQfZTjC/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:4ba83fe2d88e850e7b0e10e749f8df85685465d5e81ac0322c187156f5247aba
3
+ size 249884
3tFST4oBgHgl3EQfZDim/content/tmp_files/2301.13790v1.pdf.txt ADDED
The diff for this file is too large to render. See raw diff
 
3tFST4oBgHgl3EQfZDim/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
49E1T4oBgHgl3EQfmQS7/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:83c50802be53408269e9fe8c7a618fe0f5dc755690384244abf0e96970ed1bc2
3
+ size 75432
59E3T4oBgHgl3EQfpgot/content/tmp_files/2301.04642v1.pdf.txt ADDED
@@ -0,0 +1,855 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Recursive Fermi-operator expansion strategies to accelerate subspace
2
+ diagonalization for large eigenvalue problems in density functional theory
3
+ Sameer Khadatkar1 and Phani Motamarri1
4
+ Indian Institute of Science, Bengaluru, India.
5
+ (*Electronic mail: [email protected])
6
+ Quantum mechanical calculations for material modeling using density functional theory (DFT) involves solving a
7
+ large-scale nonlinear eigenvalue problem. These calculations are computationally demanding and have asymptotic
8
+ cubic scaling complexity with the number of electrons in the material system. The efficient computational strategies
9
+ used to solve these large nonlinear DFT eigenvalue problems rely on iterative orthogonal projection methods. The
10
+ Rayleigh-Ritz projection step and the subspace diagonalization incur the dominant computational cost in these projec-
11
+ tion methods. In this work, we explore scalable polynomial expansion based on recursive Fermi-operator expansion
12
+ approaches using mixed-precision arithmetic as an alternative to subspace diagonalization of the projected Hamiltonian
13
+ to reduce the computational cost. The performance and accuracy of these approaches have been thoroughly assessed by
14
+ comparing them with the explicit diagonalization approach using the state-of-the-art ELPA library on both multinode
15
+ CPUs and GPUs.
16
+ I.
17
+ INTRODUCTION
18
+ Eigenvalue problems are frequently encountered in many
19
+ scientific disciplines. For instance, the accurate and efficient
20
+ computation of eigenvectors and eigenvalues is critical in the
21
+ study of resonance, understanding the stability of fluid flows
22
+ subjected to small perturbations, obtaining insights into vibra-
23
+ tional modes of lattices, dimensionality reduction, and many
24
+ more.
25
+ Another well-known and challenging application of
26
+ eigenvalue problems is in the area of quantum modeling of
27
+ materials using Kohn-Sham density functional theory (DFT)1,
28
+ which has been immensely successful in providing critical in-
29
+ sights into various ground-state material properties. To com-
30
+ pute the ground-state electronic structure in DFT, one is con-
31
+ fronted with solving a large-scale nonlinear eigenvalue prob-
32
+ lem using a self-consistent field iteration procedure (SCF) for
33
+ N smallest eigenvalue/eigenvector pairs, with N being pro-
34
+ portional to the number of electrons in the material system.
35
+ This results in asymptotic cubic complexity O(N3) with the
36
+ number of electrons for DFT, making these calculations com-
37
+ putationally demanding and often restrictive in terms of sys-
38
+ tem sizes that can be handled using widely used DFT codes.
39
+ Many of these codes employ plane-wave basis sets, which re-
40
+ strict simulation domains to periodic or atomic-orbital type
41
+ basis sets, which are not systematically convergent, and these
42
+ basis sets are not amenable for massive parallelization on par-
43
+ allel computing architectures. To extend the range of system
44
+ sizes to be studied, numerous past efforts have focused on de-
45
+ veloping systematically convergent real-space computational
46
+ methodologies 2–6 that have focused on reducing the prefac-
47
+ tor associated with the cubic computational complexity along-
48
+ side improving the parallel scalability, thereby enabling large-
49
+ scale DFT calculations up to 100,000 electrons. These real-
50
+ space DFT discretization approaches result in large sparse
51
+ Hermitian eigenvalue problems of the form Hψψψi = εh
52
+ i ψψψi to
53
+ be solved for N smallest eigenvalue/eigenvector pairs, with N
54
+ being proportional to M, the dimension of the sparse Hamil-
55
+ tonian matrix H (M ≈ 105 −107). We note that N depends on
56
+ the number of electrons in the material system and is usually
57
+ 0.1 − 0.5% of M, the degrees of freedom (DoFs) used in the
58
+ simulation.
59
+ In the electronic structure community, the most popular
60
+ eigensolver strategies employed to solve these large DFT
61
+ eigenvalue problems include the Davidson approach, Lo-
62
+ cally Optimal Block Pre-conditioned Conjugate Gradient
63
+ (LOBPCG) method, or the Chebyshev filtered subspace it-
64
+ eration (ChFSI) approach. These eigensolvers belong to the
65
+ category of iterative orthogonal projection methods (IOP)
66
+ wherein the matrix H is orthogonally projected onto a care-
67
+ fully constructed subspace rich in the wanted eigenvectors
68
+ (Rayleigh-Ritz step), and subsequently, the resulting smaller
69
+ dense projected Hamiltonian Hp is explicitly diagonalized
70
+ (subspace diagonalization) to approximate the desired eigen-
71
+ value/eigenvector pairs of the H matrix.
72
+ The cubic scal-
73
+ ing computational cost of this subspace diagonalization step
74
+ dominates for medium to large-scale material systems (N >
75
+ 20,000) in comparison to the costs associated with subspace
76
+ construction and Rayleigh-Ritz steps in IOP methods. For in-
77
+ stance, the authors6 employing the ChFSI approach have re-
78
+ ported that the subspace diagonalization constitutes roughly
79
+ 30% of the total ChFSI cost for N ≈ 30,000, whereas it ac-
80
+ counts for around 56% of the total cost for N ≈ 50,000. To
81
+ this end, the current work explores recursive polynomial ex-
82
+ pansion approaches based on Fermi-operator expansion as an
83
+ alternative to the subspace diagonalization procedure to im-
84
+ prove the computational efficiency, thereby reducing the com-
85
+ putational prefactor associated with the cubic complexity of
86
+ the subspace diagonalization approach. Furthermore, the en-
87
+ ergy efficiency and parallel scaling efficiency of these ap-
88
+ proaches is examined on both multinode CPUs and multinode
89
+ GPUs.
90
+ Recursive polynomial expansion approaches (RPE) rely
91
+ on the key idea that constructing a density matrix (projec-
92
+ tor matrix corresponding to N smallest eigenvectors) suffices
93
+ to compute ground-state electronic structure in DFT at zero-
94
+ temperature without the necessity of knowing explicit eigen-
95
+ values and eigenvectors. These RPE approaches 7–12 have
96
+ been explored in the past for conducting ground-state DFT
97
+ calculations using atomic-orbital basis. However, the compu-
98
+ tational efficiency, scaling and energy efficiency of these ap-
99
+ proaches have not been explored in comparison to subspace
100
+ arXiv:2301.04642v1 [physics.comp-ph] 11 Jan 2023
101
+
102
+ 2
103
+ diagonalization procedures for their use in iteration orthogo-
104
+ nal projection methods on multinode CPU and GPU architec-
105
+ tures. The evolving computing architectures in today’s ex-
106
+ ascale era place a heavy emphasis on scalable methodolo-
107
+ gies with a focus on reduced data movement and increased
108
+ arithmetic intensity, with an equal emphasis on using energy-
109
+ efficient algorithms. The current work assumes significance
110
+ in this regard and is useful for solving large-scale eigenvalue
111
+ problems arising from the discretization of DFT using sys-
112
+ tematically convergent basis sets employing IOP methods. To
113
+ this end, the key contributions of our current work, as de-
114
+ scribed in the subsequent sections, include – (a) efficient im-
115
+ plementation strategies of various recursive polynomial ex-
116
+ pansion (RPE) techniques based on Fermi-operator expansion
117
+ on both multinode CPU and GPU architectures for both zero-
118
+ temperature case and the finite-temperature case of Fermi-
119
+ dirac smearing of the occupancy function (b) design of mixed
120
+ precision strategies in conjunction with RPE to reduce com-
121
+ pute and data access costs (c) assessing accuracy, scaling effi-
122
+ ciency and energy efficiency of the proposed implementation
123
+ procedures by comparing it with explicit diagonalization al-
124
+ gorithms provided by state-of-the-art ELPA library13.
125
+ II.
126
+ RELATED WORK AND BACKGROUND
127
+ This section discusses key ideas central to recursive poly-
128
+ nomial expansion approaches which are used to approximate
129
+ the density matrix.
130
+ A.
131
+ Density matrix
132
+ At zero electronic temperature, the density matrix (D) can
133
+ be defined as a projector matrix corresponding to the lowest
134
+ occupied (Nocc ≤ N) eigenvectors of the Kohn-Sham Hamil-
135
+ tonian H matrix.
136
+ Mathematically, it takes the form of a
137
+ shifted Heaviside step function, θ(.), given by D = θ[µI−H].
138
+ The density matrix (D) in the case of finite-temperature is a
139
+ smeared version of zero-temperature density matrix and math-
140
+ ematically represented by a Fermi-operator matrix function
141
+ given by D = [eβ(H−µI) + I]−1, where, I denotes the identity
142
+ matrix, β = 1/(kBTe) is the inverse electronic temperature, µ
143
+ is the Fermi-energy, and H is the Hamiltonian matrix. Note
144
+ that the eigenvalues fi of D are referred to as occupancies. fi
145
+ is either 0 or 1 for a zero-temperature case whereas for the
146
+ case of a finite-temperature case, fi ∈ [0,1].
147
+ B.
148
+ Recursive polynomial expansion techniques to
149
+ approximate the density matrix
150
+ Two types of polynomial expansion schemes can be used
151
+ to approximate the density matrix – (a) Serial Fermi-operator
152
+ expansion schemes (Chebyshev Fermi-operator expansion
153
+ scheme14, Green’s function expansion scheme15, etc), (b)
154
+ Recursive Fermi-operator expansion schemes 8–12.
155
+ In this
156
+ work, we employ the latter approach i.e., the recursive Fermi-
157
+ operator expansion schemes as they are shown to be more ef-
158
+ ficient and can be used to approximate the density matrix for
159
+ both zero-temperature, and finite-temperature cases as well.
160
+ 1.
161
+ Recursive Fermi-operator expansion for zero-temperature
162
+ density matrix (Z-RFOE)
163
+ The recursive Fermi-operator expansion8 involves succes-
164
+ sive projections of a matrix Xn, where X0 = H and Xn+1 =
165
+ F(Xn). The functions F(Xn) are chosen to project the eigen-
166
+ value spectrum of Xn to eigenvalues closer either to 1 or to 0.
167
+ Mathematically this can be represented as
168
+ D = θ(µI−H) ≈ Fm(Fm−1(...F0(H)...))
169
+ (1)
170
+ One of the most efficient techniques in Z-RFOE is to use the
171
+ second-order projection polynomials (SP2) 9 given by Xn+1 =
172
+ Fn(Xn) = Xn ± (Xn − X2
173
+ n). The SP2 here are continuously
174
+ increasing and decreasing functions in the interval [0, 1]. The
175
+ ± sign is chosen to adjust the trace of Xn+1 in each projection
176
+ such that it converges to Nocc.
177
+ 2.
178
+ Accelerated recursive polynomial expansion for
179
+ zero-temperature density matrix (A-Z-RFOE)
180
+ This technique works on the concept of shifting and scaling.
181
+ In Z-RFOE, we used SP2 polynomials, which either took the
182
+ form F(X) = X2 or F(X) = 2X−X2. In A-Z-RFOE, instead
183
+ of restricting ourselves to these fixed expansion functions, we
184
+ give it some freedom to choose the expansion functions such
185
+ that it moves the eigenvalues closer to either 1 or 0 faster. To
186
+ optimize the convergence, we chose the polynomial such that
187
+ each iteration gives the highest slope of projection around the
188
+ eigenvalues, which are rescaled values of the HOMO (Highest
189
+ Occupied Molecular Orbital) and LUMO (Lowest Unoccu-
190
+ pied Molecular Orbital) eigenvalues and done such that there
191
+ is no risk of eigenvalues switching the places between the oc-
192
+ cupied and the unoccupied states10.
193
+ 3.
194
+ Recursive Fermi-operator expansion scheme for
195
+ finite-temperature cases (T-RFOE)
196
+ Finite-temperature density matrix has occupancies fi ∈
197
+ [0,1] and the SP2 recursion scheme discussed above is not
198
+ well suited for approximating density matrix with fractional
199
+ occupancies.
200
+ To this end, an intermediate function gener-
201
+ ated in Z-RFOE that is obtained before the convergence of
202
+ the algorithm to the projector matrix is used. This serves as a
203
+ smeared function to zero-temperature density matrix (Heavi-
204
+ side step function). To this end, the truncated expansion for
205
+ computing, the density matrix D can be given by the expres-
206
+ sion in (2).
207
+ Gm(H) = Fm(Fm−1(...F0(H)...))
208
+ (2)
209
+ Lower the electronic temperature Te higher will be the β value
210
+ (refer to Sec. IIA), and more recursion steps m will be re-
211
+ quired to approximate the density matrix11,12.
212
+ C.
213
+ Accuracy of the polynomial expansion procedures
214
+ The accuracy of the aforementioned polynomial expansion
215
+ procedures is given in terms of the degree npl of the polyno-
216
+ mial needed to approximate the density matrix and is given
217
+ by npl ∝ (εN −ε1) with ε1,εN being spectral bound estimates
218
+
219
+ 3
220
+ of H16. It is well known that DFT discretized Hamiltonian H
221
+ using real-space approaches has large spectral width εN − ε1
222
+ resulting in higher npl for approximating the density matrix.
223
+ Often this leads to an inefficient computational procedure to
224
+ approximate the density matrix since the dimension of H can
225
+ be of O(105 −107).
226
+ III.
227
+ COMPUTATIONAL METHODOLOGY AND
228
+ IMPLEMENTATION
229
+ A.
230
+ Proposed methodology
231
+ Due to the aforementioned limitations of employing the re-
232
+ cursive polynomial expansion procedures on the real-space
233
+ discretized DFT Hamiltonian (H), we resort to iterative or-
234
+ thogonal projection (IOP) methods of solving a large sparse
235
+ eigenvalue problem and choose to work with the smaller dense
236
+ projected Hamiltonian Hp in the subspace rich with eigenvec-
237
+ tors of H. To this end, we employ the recursive polynomial
238
+ expansion procedures on Hp to approximate the density ma-
239
+ trix in the subspace as an alternative to explicit subspace diag-
240
+ onalization. Since the spectral width of Hp is commensurate
241
+ with spectral width corresponding to occupied eigenstates, it
242
+ is small and the proposed approach is computationally effi-
243
+ cient as demonstrated subsequently.
244
+ B.
245
+ Algorithmic details
246
+ Using Hp, Z-RFOE and A-Z-RFOE schemes employing
247
+ SP2 polynomials for approximating zero-temperature density
248
+ matrix and the T-RFOE scheme for the finite-temperature den-
249
+ sity matrix have been implemented in a distributed setting.
250
+ Figure 1 shows the schematic of the RFOE algorithm imple-
251
+ mented in the current work.
252
+ Furthermore, we also explored mixed-precision strategies
253
+ in conjunction with the RFOE schemes implemented in this
254
+ work. To this end, we rely on the fact that far away from
255
+ RFOE convergence to the appropriate density matrix, the
256
+ floating point operations involved in the initial RFOE itera-
257
+ tions can be performed in single precision (FP32) and switch-
258
+ ing to FP64 operations thereafter. The criteria to decide the
259
+ number of initial FP32 iterations is linked to relative trace
260
+ change of Xn (εtr) of two successive RFOE iterations. An es-
261
+ timate of εtr could be obtained by examining the dependence
262
+ of εtr on the relative change in occupied eigensubspace be-
263
+ tween the starting matrix X0 = Hp and the intermediate ma-
264
+ trices Xn generated during the course of RFOE. Our numerical
265
+ studies on smaller size representative Hp arising in DFT show
266
+ that εtr ≈ O(10−4) gives an acceptable error of O(10−7) with
267
+ respect to fully double precision (FP64) computation of the
268
+ density matrix.
269
+ C.
270
+ Implementation details
271
+ The multinode parallel implementation of RFOE codes was
272
+ done in C++ employing Message Passing Interface (MPI)
273
+ library.
274
+ Software for Linear Algebra Targeting Exascale
275
+ (SLATE) library17 was used for storing the parallel matrices
276
+ encountered during the course of RFOE. SLATE stores the
277
+ matrix in a 2-D block-cyclic manner on both CPUs and GPUs
278
+ within a node. The tile size is the most basic parameter that
279
+ can affect the SLATE routines’ performance. Numerical ex-
280
+ periments were conducted by varying the tile size to decide
281
+ the optimal tile size.
282
+ Some of the key aspects of the implementation are high-
283
+ lighted below:
284
+ 1.
285
+ Trace Calculations
286
+ Traces of matrix squares are required during the course of
287
+ RFOE iterations and are computed by evaluating the square of
288
+ the Frobenius norm of the given symmetric matrix (Tr(A2) =
289
+ ||A||2
290
+ F). To this end, Frobenius norm function available in the
291
+ SLATE library was used. Further, the computations of matrix
292
+ traces which was required only in the beginning and end of
293
+ RFOE involved a traversal through the diagonal elements of
294
+ the global matrix and the use of an MPI collective function.
295
+ 2.
296
+ Matrix-matrix multiplication
297
+ The computationally dominant step in all the RFOE algo-
298
+ rithms implemented is the matrix-matrix multiplication step.
299
+ We used the SLATE library functions to perform this step
300
+ in parallel across multinode CPUs and GPUs. The perfor-
301
+ mance of the Communication-optimal Matrix Multiplication
302
+ (COSMA)18 and cuBLASMg (made available from CUDA
303
+ Math Library Early Access Program19) library was also ex-
304
+ plored to compute parallel matrix-matrix multiplications on
305
+ CPUs and GPUs.
306
+ Our studies indicates that COSMA was
307
+ slower in terms of computational times compared to the
308
+ SLATE library. And the cuBLASMg library is restricted to
309
+ multi-GPUs within a single node.
310
+ D.
311
+ Metrics for accuracy benchmarking of RFOE
312
+ For accuracy benchmarking of the RFOE methods imple-
313
+ mented, we computed two errors: (a) Relative error between
314
+ the exact and approximated density matrix (f(H)) using the
315
+ Frobenius norm, i.e ε1 = (||D − Dref ||F)/||Dref ||F, (b) Rela-
316
+ tive error between the trace of actual and the approximated
317
+ f(H)H, ε2 = (tr(DH) − tr(Dref H))/tr(Dref H).
318
+ Dref was
319
+ computed by explicit diagonalization using ELPA library13.
320
+ IV.
321
+ RESULTS AND DISCUSSION
322
+ In order to assess the accuracy and performance of the pro-
323
+ posed methods, we employ synthetic matrices representative
324
+ of the subspace projected Hamiltonians (Hp) arising in DFT
325
+ calculations.
326
+ To this end, the matrix Hp is constructed in
327
+ such a way that the spectral width is smaller and remains con-
328
+ stant with increase in matrix size. We choose H p
329
+ ij = H p
330
+ ji =
331
+ e−d∗|i−j| ∗ sin(i + 1), and the matrix sizes used were 8192 ×
332
+ 8192, 16384 × 16384, 32768 × 32768, and 65536 × 65536.
333
+ The multinode CPU study was done on PARAM Pravega hav-
334
+ ing Intel Xeon Cascade Lake 8268 CPU (2.9 GHz) with 48
335
+ cores (96 threads) on each node, while multinode GPU study
336
+ was done on a local lab cluster having 16x (8 on each node)
337
+ NVIDIA Tesla V100 GPUs with 32 GB of memory.
338
+
339
+ 4
340
+ FIG. 1: General implementation details flowchart for all the
341
+ RFOE codes
342
+ The performance metrics used for comparisons are:
343
+ • Node-hrs ⇒ Execution time (in hours) × the number
344
+ of nodes taken in the best scaling regime. It gives a
345
+ measure of computational efficiency on CPUs.
346
+ • GPU-hrs ⇒ Execution time (in hours) × the number
347
+ of GPUs taken in the best scaling regime. It gives a
348
+ measure of computational efficiency on GPUs.
349
+ • Minimum walltime ⇒ Least possible time for the job
350
+ execution using as many resources as possible. It is a
351
+ measure of scaling efficiency of the implementation.
352
+ • Energy consumption ⇒ Upper bound of the energy re-
353
+ quired by the job in kWh to run it on the supercomputer.
354
+ Indicative of the rupee cost required for the calculations
355
+ on the supercomputer. For the energy consumption cal-
356
+ culation we used the Thermal Design Power (TDP) rat-
357
+ ings for both CPUs and GPUs.
358
+ 1.
359
+ Multinode CPU comparisons
360
+ Figure 2 shows that, all our RFOE implementations for
361
+ zero-temperature case are better than ELPA in terms of node-
362
+ hrs, which indicates that all of our implementations are com-
363
+ putationally efficient compared to ELPA. For instance, the A-
364
+ Z-RFOE results in a speedup of around 2x in comparison to
365
+ ELPA for the 65536 size matrix. In the minimum walltime
366
+ regime, we find that ELPA is slightly faster than the RFOE im-
367
+ plementation for the matrix sizes considered. Figure 3 shows
368
+ (a)
369
+ (b)
370
+ FIG. 2: (a) Node-hrs vs. matrix size plot, and (b) Min.
371
+ walltime vs. matrix size plot (Note: c stands for CPUs, n
372
+ stands for nodes) for different implementations of RFOEs for
373
+ zero-temperature case on multinode CPUs.
374
+ that, both our T-RFOE and mixed-precision T-RFOE imple-
375
+ mentations for finite-temperature case are better than ELPA in
376
+ terms of node-hrs (4.2x speedup of mixed-precision T-RFOE
377
+ implementation over ELPA for the 65536 size matrix), which
378
+ indicates that both of our implementations are computation-
379
+ ally efficient compared to ELPA. And, even in the minimum
380
+ walltime, mixed precision T-RFOE was found to be slightly
381
+ better than ELPA. The number of CPUs on which we got min-
382
+ imum walltime for different matrix sizes is also shown on the
383
+ minimum walltime plots.
384
+ 2.
385
+ Multinode GPU comparisons
386
+ Figure 4 shows that, all our implementations for zero-
387
+ temperature case are better than ELPA up to 16384 size ma-
388
+ trix, and beyond this size, the mixed-precision Z-RFOE and
389
+ A-Z-RFOE are better than ELPA for GPU-hrs timings, which
390
+ indicates that both of our implementations are computation-
391
+ ally efficient compared to ELPA. Our A-Z-RFOE implemen-
392
+ tation gave 1.5x speedup over ELPA for the 32768 size ma-
393
+ trix. Due to the memory issue of ELPA, it does not work
394
+ on multinode GPUs up to 16 GPUs for the 65536 size ma-
395
+ trix, which indicates that the RFOE implementations use the
396
+ memory efficiently compared to ELPA. And for minimum
397
+ walltime, ELPA shows a better behaviour, suggesting that
398
+ the RFOE implementations are not scaling well on multinode
399
+ GPUs. Figure 5 shows that, our T-RFOE and mixed-precision
400
+ T-RFOE implementations for finite-temperature case are bet-
401
+
402
+ Initializations
403
+ Nocc : Occupancy number
404
+ So= Hp : Hamiltonian
405
+ (Defined on Distributed System)
406
+ Xo = WoSo+bol (on Parallel architectures)
407
+ Initial scaling using spectral bound estimates of H
408
+ Ns = Tr[Xo] (Using MPl_Allreduce)
409
+ While
410
+ (TrEr < Tolerance)
411
+ Final D Matrix
412
+ Xn = WXn-12 + bXn-1
413
+ Nx = IIXn-1ll-=2
414
+ FP32/FP64 GEMM for Xn-12
415
+ ( IIXn-1]l==[Tr[Xn-13]1/2)
416
+ Xn and Xn-1 stored in 2-D
417
+ block-cyclic manner on
418
+ CPUs/GPUs
419
+ Compute w = f(Ns, Nx, Nocc)
420
+ and b = g(Ns, Nx, Nocc)
421
+ where f() and g(.) depends on
422
+ Update Ns using Nx and Ns
423
+ the expansion scheme (Z-RFOE
424
+ TrEr = abs(Ns - Nocc)
425
+ A-Z-RFOE, T-RFOE)5
426
+ ELPA
427
+ Double-PrecisionZ-RFOE
428
+ 4
429
+ Mixed-Precision Z-RFOE
430
+ node-hrs
431
+ Double-Precision A-Z-RFOE
432
+ m
433
+ 1
434
+ 0
435
+ 8192
436
+ 16384
437
+ 32768
438
+ 65536
439
+ Matrix Size350
440
+ ELPA
441
+ (secs)
442
+ 300
443
+ Double-Precision Z-RFOE
444
+ 250
445
+ Mixed-PrecisionZ-RFOE
446
+ (6144c128n)
447
+ Double-Precision A-Z-RFOE
448
+ walltime
449
+ 200
450
+ 150
451
+ 100
452
+ Min.
453
+ (6144c 128n)
454
+ (6144c128n)
455
+ (12288c256n)
456
+ 50
457
+ (3072c64n)
458
+ ←(12288c256n)
459
+ 0
460
+ (3072c64n)
461
+ (12288c256n)
462
+ 8192
463
+ 16384
464
+ 32768
465
+ 65536
466
+ Matrix Size5
467
+ (a)
468
+ (b)
469
+ FIG. 3: (a) Node-hrs vs. matrix size plot, and (b) Min.
470
+ walltime vs. matrix size plot (Note: c stands for CPUs, n
471
+ stands for nodes) for different implementations of RFOEs for
472
+ finite-temperature case on multinode CPUs.
473
+ ter than ELPA for GPU-hrs timings (2.5x speedup of mixed-
474
+ precision T-RFOE implementation over ELPA for the 65536
475
+ size matrix), indicating that both implementations are com-
476
+ putationally efficient compared to ELPA. And, for minimum
477
+ walltime, our mixed-precision T-RFOE implementation is al-
478
+ most similar to or better than ELPA. The number of GPUs on
479
+ which we got minimum walltime for different matrix sizes is
480
+ shown on the minimum walltime plot.
481
+ 3.
482
+ Energy consumption comparisons
483
+ Figure 6 shows that, in both the regimes of node-hrs/GPU-
484
+ hrs and minimum walltime, we are better than ELPA in terms
485
+ of energy consumption for zero-temperature case. Figure 7
486
+ shows that, in both the regimes of node-hrs/GPU-hrs and min-
487
+ imum walltime case, we are better than ELPA in terms of en-
488
+ ergy consumption for finite-temperature case. This indicates
489
+ that the rupee cost required for our calculations on the super-
490
+ computer will be less than ELPA for both zero-temperature
491
+ case and finite-temperature case of approximating the density
492
+ matrix.
493
+ 4.
494
+ Accuracy benchmarking
495
+ The errors ε1 and ε2 (defined earlier) were of the O(10−10)
496
+ and O(10−09) for double-precision implementation of Z-
497
+ RFOE and A-Z-RFOE. And, were of the O(10−07) and
498
+ O(10−09) for mixed-precision implementation of Z-RFOE.
499
+ (a)
500
+ (b)
501
+ FIG. 4: (a) GPU-hrs vs. matrix size plot, and (b) Min.
502
+ walltime vs. matrix size plot for different implementations of
503
+ RFOEs for zero-temperature case on multinode GPUs.
504
+ (a)
505
+ (b)
506
+ FIG. 5: (a) GPU-hrs vs. matrix size plot, and (b) Min.
507
+ walltime vs. matrix size plot for different implementations of
508
+ RFOEs for finite-temperature case on multinode GPUs.
509
+
510
+ 5
511
+ ELPA
512
+ Double-PrecisionT-RFOE
513
+ 4
514
+ Mixed-Precision T-RFOE
515
+ node-hrs
516
+ m
517
+ N
518
+ 1
519
+ 0
520
+ 8192
521
+ 16384
522
+ 32768
523
+ 65536
524
+ Matrix Size160
525
+ ELPA
526
+ (12288c256n)
527
+ (secs)
528
+ 140
529
+ Double-Precision T-RFOE
530
+ Mixed-PrecisionT-RFOE
531
+ 120
532
+ (6144c128n)
533
+ Min. walltime
534
+ 100
535
+ 80
536
+ 60
537
+ (6144c128n)
538
+ 40
539
+ (6144c128n)
540
+ 20
541
+ (3072c 64n)
542
+ (12288c256n)
543
+ 0
544
+ (3072c64n)
545
+ (12288c256n)
546
+ 8192
547
+ 16384
548
+ 32768
549
+ 65536
550
+ Matrix Size1.75
551
+ ELPA
552
+ 1.50
553
+ Double-Precision Z-RFOE
554
+ 1.25
555
+ Mixed-PrecisionZ-RFOE
556
+ GPU-hrs
557
+ Double-Precision A-Z-RFOE
558
+ 1.00
559
+ 0.75
560
+ 0.50
561
+ 0.25
562
+ 0.00
563
+ 8192
564
+ 16384
565
+ 32768
566
+ 65536
567
+ Matrix size700
568
+ ELPA
569
+ (SDos)
570
+ Double-Precision Z-RFOE
571
+ 600
572
+ Mixed-Precision Z-RFOE
573
+ (8 GPUs)
574
+ Min. walltime
575
+ 500
576
+ Double-Precision A-Z-RFOE
577
+ 400
578
+ 300
579
+ 200
580
+ (8 GPUs)
581
+ 100
582
+ (4 GPUs)
583
+ (6 GPUs)
584
+ (16 GPUS)
585
+ 0
586
+ (6GPUS)
587
+ (16GPUs)
588
+ 8192
589
+ 16384
590
+ 32768
591
+ 65536
592
+ Matrix size0.8
593
+ ELPA
594
+ 0.7
595
+ Double-Precision T-RFOE
596
+ 0.6
597
+ Mixed-PrecisionT-RFOE
598
+ GPU-hrs
599
+ 0.5
600
+ 0.4
601
+ 0.3
602
+ 0.2
603
+ 0.1
604
+ 0.0
605
+ 8192
606
+ 16384
607
+ 32768
608
+ 65536
609
+ Matrix Size350
610
+ ELPA
611
+ (secs)
612
+ 300
613
+ Double-PrecisionT-RFOE
614
+ Mixed-Precision T-RFOE
615
+ 250
616
+ (8 GPUs)
617
+ Min. walltime
618
+ 200
619
+ 150
620
+ (8 GPUs)
621
+ 100
622
+ (6 GPUs)
623
+ 50
624
+ (4 GPUS)
625
+ (16GPUS)
626
+ 0
627
+ (6GPUs)
628
+ (16-GPUs)
629
+ 8192
630
+ 16384
631
+ 32768
632
+ 65536
633
+ Matrix size6
634
+ (a)
635
+ (b)
636
+ FIG. 6: Energy consumption (kWh) vs. matrix size plot in
637
+ terms of (a) Node-hrs/GPU-hrs, and (b) Min. walltime for the
638
+ best implementation of RFOE for zero-temperature case.
639
+ (a)
640
+ (b)
641
+ FIG. 7: Energy consumption (kWh) vs. matrix size plot in
642
+ terms of (a) Node-hrs/GPU-hrs, and (b) Min. walltime for the
643
+ best implementation of RFOE for finite-temperature case.
644
+ For T-RFOE, the error ε1 was of the O(10−03) and ε2 was
645
+ of O(10−06). The density matrix approximated by T-RFOE
646
+ has an higher error compared to the Fermi-Dirac based den-
647
+ sity matrix. However, in DFT, the computation of material
648
+ properties relies on differences in energies and hence, the T-
649
+ RFOE approach can be viewed as an alternative approach to
650
+ smearing the zero-temperature density matrix, which can be
651
+ practically helpful in approximating finite-temperature den-
652
+ sity matrix.
653
+ V.
654
+ CONCLUSIONS
655
+ RFOE schemes, as expected, had a lesser computational
656
+ prefactor which made them computationally efficient com-
657
+ pared to ELPA in the node-hrs/GPU-hrs regime. In the case of
658
+ minimum walltimings, ELPA timings were better as it scaled
659
+ better than our RFOE implementations. Energy efficiency-
660
+ wise, the RFOE implementations were better on both multin-
661
+ ode CPUs and GPUs, which is directly proportional to the cost
662
+ required for the computations. In terms of memory utiliza-
663
+ tion, multinode GPU implementations of RFOE were better
664
+ than ELPA. From all the observations we can conclude that,
665
+ these techniques can be used whenever we have fewer com-
666
+ putational resources and have cost constraints.
667
+ 1W. Kohn and L. J. Sham, “Self-consistent equations including exchange
668
+ and correlation effects,” Phys. Rev. 140, A1133–A1138 (1965).
669
+ 2L. E. Ratcliff, W. Dawson, G. Fisicaro, D. Caliste, S. Mohr, A. Degomme,
670
+ B. Videau, V. Cristiglio, M. Stella, M. D’Alessandro, S. Goedecker,
671
+ T. Nakajima, T. Deutsch, and L. Genovese, “Flexibilities of wavelets as
672
+ a computational basis set for large-scale electronic structure calculations,”
673
+ The Journal of Chemical Physics 152, 194110 (2020).
674
+ 3S. Ghosh and P. Suryanarayana, “SPARC: Accurate and efficient finite-
675
+ difference formulation and parallel implementation of density functional
676
+ theory: Isolated clusters,” Computer Physics Communications 212, 189–
677
+ 204 (2017).
678
+ 4S. Das, P. Motamarri, V. Gavini, B. Turcksin, Y. W. Li, and B. Leback,
679
+ “Fast, scalable and accurate finite-element based ab initio calculations using
680
+ mixed precision computing: 46 pflops simulation of a metallic dislocation
681
+ system,” in Proc. of the International Conference for High Performance
682
+ Computing, Networking, Storage and Analysis (2019).
683
+ 5P. Motamarri, S. Das, S. Rudraraju, K. Ghosh, D. Davydov, and V. Gavini,
684
+ “DFT-FE – a massively parallel adaptive finite-element code for large-scale
685
+ density functional theory calculations,” Computer Physics Communications
686
+ 246, 106853 (2020).
687
+ 6S. Das, P. Motamarri, V. Subramanian, D. M. Rogers, and V. Gavini, “DFT-
688
+ FE 1.0: A massively parallel hybrid cpu-gpu density functional theory code
689
+ using finite-element discretization,” (2022).
690
+ 7J. Finkelstein, J. S. Smith, S. M. Mniszewski, K. Barros, C. F. A. Negre,
691
+ E. H. Rubensson, and A. M. N. Niklasson, “Mixed precision fermi-operator
692
+ expansion on tensor cores from a machine learning perspective,” Journal of
693
+ Chemical Theory and Computation 17, 2256–2265 (2021).
694
+ 8A. M. N. Niklasson, “Expansion algorithm for the density matrix,” Phys.
695
+ Rev. B 66, 155115 (2002).
696
+ 9G. Beylkin, N. Coult,
697
+ and M. J. Mohlenkamp, “Fast spectral projec-
698
+ tion algorithms for density-matrix computations,” Journal of Computational
699
+ Physics 152, 32–54 (1999).
700
+ 10E. H. Rubensson and A. M. N. Niklasson, “Accelerated density matrix ex-
701
+ pansions for born-oppenheimer molecular dynamics,” (2013).
702
+ 11S. M. Mniszewski, R. Perriot, E. H. Rubensson, C. F. A. Negre, M. J. Cawk-
703
+ well, and A. M. N. Niklasson, “Linear scaling pseudo fermi-operator ex-
704
+ pansion for fractional occupation,” Journal of Chemical Theory and Com-
705
+ putation 15, 190–200 (2019).
706
+ 12A. M. N. Niklasson, “A note on the pulay force at finite electronic temper-
707
+ atures,” The Journal of Chemical Physics 129, 244107 (2008).
708
+ 13A. Marek, V. Blum, R. Johanni, V. Havu, B. Lang, T. Auckenthaler, A. Hei-
709
+ necke, H.-J. Bungartz, and H. Lederer, “The elpa library: Scalable parallel
710
+
711
+ 2.0
712
+ CPUELPA
713
+ CPUDouble-PrecisionA-Z-RFOE
714
+ (yM)
715
+ GPU ELPA
716
+ 1.5
717
+ GPUDouble-Precision A-Z-RFOE
718
+ Energy
719
+ 1.0
720
+ 0.5
721
+ 0.0
722
+ 8192
723
+ 16384
724
+ 32768
725
+ 65536
726
+ Matrix Size3.5
727
+ CPU ELPA
728
+ 3.0
729
+ CPUDouble-PrecisionA-Z-REOE
730
+ (kWh)
731
+ GPU ELPA
732
+ 2.5
733
+ GPUDouble-Precision A-Z-RFOE
734
+ 2.0
735
+ Energy
736
+ 1.5
737
+ 1.0
738
+ 0.5
739
+ 0.0
740
+ 8192
741
+ 16384
742
+ 32768
743
+ 65536
744
+ Matrix Size2.0
745
+ CPUELPA
746
+ CPUMixed-PrecisionT-RFOE
747
+ (yM)
748
+ GPU ELPA
749
+ 1.5
750
+ GPUMixed-Precision T-RFOE
751
+ Energy
752
+ 1.0
753
+ 0.5
754
+ 0.0
755
+ 8192
756
+ 16384
757
+ 32768
758
+ 65536
759
+ Matrix Size3.5
760
+ CPU ELPA
761
+ 3.0
762
+ CPUMixed-PrecisionT-RFOE
763
+ (kWh)
764
+ GPU ELPA
765
+ 2.5
766
+ GPUMixed-PrecisionT-RFOE
767
+ 2.0
768
+ Energy
769
+ 1.5
770
+ 1.0
771
+ 0.5
772
+ 0.0
773
+ 8192
774
+ 16384
775
+ 32768
776
+ 65536
777
+ Matrix Size7
778
+ eigenvalue solutions for electronic structure theory and computational sci-
779
+ ence,” Journal of Physics: Condensed Matter 26, 213201 (2014).
780
+ 14A. Weiße, G. Wellein, A. Alvermann, and H. Fehske, “The kernel polyno-
781
+ mial method,” Rev. Mod. Phys. 78, 275–306 (2006).
782
+ 15R. Zeller, J. Deutz, and P. Dederichs, “Application of complex energy inte-
783
+ gration to selfconsistent electronic structure calculations,” Solid State Com-
784
+ munications 44, 993–997 (1982).
785
+ 16S. Goedecker, “Linear scaling electronic structure methods,” Rev. Mod.
786
+ Phys. 71, 1085–1123 (1999).
787
+ 17M. Gates, J. Kurzak, A. Charara, A. YarKhan, and J. Dongarra, “Slate:
788
+ Design of a modern distributed and accelerated linear algebra library,” in
789
+ Proc. of the International Conference for High Performance Computing,
790
+ Networking, Storage and Analysis (2019).
791
+ 18G. Kwasniewski, M. Kabi´c, M. Besta, J. VandeVondele, R. Solcà,
792
+ and
793
+ T. Hoefler, “Red-blue pebbling revisited: Near optimal parallel matrix-
794
+ matrix multiplication,” in Proc. of the International Conference for High
795
+ Performance Computing, Networking, Storage and Analysis (2019).
796
+ 19NVIDIA, “Cuda math library early access program,” .
797
+ 20P. Motamarri, M. Nowak, K. Leiter, J. Knap, and V. Gavini, “Higher-order
798
+ adaptive finite-element methods for kohn–sham density functional theory,”
799
+ Journal of Computational Physics 253, 308–343 (2013).
800
+ 21P. Motamarri and V. Gavini, “Subquadratic-scaling subspace projection
801
+ method for large-scale kohn-sham density functional theory calculations
802
+ using spectral finite-element discretization,” Physical Review B 90 (2014).
803
+ 22R. McWeeny, “Some recent advances in density matrix theory,” Rev. Mod.
804
+ Phys. 32, 335–369 (1960).
805
+ 23A. H. R. Palser and D. E. Manolopoulos, “Canonical purification of the den-
806
+ sity matrix in electronic-structure theory,” Phys. Rev. B 58, 12704–12711
807
+ (1998).
808
+ 24T. Ozaki, “Continued fraction representation of the fermi-dirac function
809
+ for large-scale electronic structure calculations,” Phys. Rev. B 75, 035123
810
+ (2007).
811
+ 25K. Németh and G. E. Scuseria, “Linear scaling density matrix search
812
+ based on sign matrices,” The Journal of Chemical Physics 113, 6035–6041
813
+ (2000).
814
+ 26A. Holas, “Transforms for idempotency purification of density matrices in
815
+ linear-scaling electronic-structure calculations,” Chemical Physics Letters
816
+ 340, 552–558 (2001).
817
+ 27A. M. N. Niklasson, “Implicit purification for temperature-dependent den-
818
+ sity matrices,” Phys. Rev. B 68, 233104 (2003).
819
+ 28D. K. Jordan and D. A. Mazziotti, “Comparison of two genres for linear
820
+ scaling in density functional theory: Purification and density matrix mini-
821
+ mization methods,” The Journal of Chemical Physics 122, 084114 (2005).
822
+ 29E. Rudberg and E. H. Rubensson, “Assessment of density matrix meth-
823
+ ods for linear scaling electronic structure calculations,” Journal of Physics:
824
+ Condensed Matter 23, 075502 (2011).
825
+ 30P. Suryanarayana, “Optimized purification for density matrix calculation,”
826
+ Chemical Physics Letters 555, 291–295 (2013).
827
+ 31E. H. Rubensson and A. M. N. Niklasson, “Interior eigenvalues from den-
828
+ sity matrix expansions in quantum mechanical molecular dynamics,” SIAM
829
+ Journal on Scientific Computing 36, B147–B170 (2014).
830
+ 32D. Bowler and M. Gillan, “Density matrices in o(n) electronic structure
831
+ calculations: theory and applications,” Computer Physics Communications
832
+ 120, 95–108 (1999).
833
+ 33L. A. Truflandier, R. M. Dianzinga, and D. R. Bowler, “Communication:
834
+ Generalized canonical purification for density matrix minimization,” The
835
+ Journal of Chemical Physics 144, 091102 (2016).
836
+ 34R. K. Gupta and S. D. Senturia, “Pull-in time dynamics as a measure of
837
+ absolute pressure,” in Proc. IEEE International Workshop on Microelec-
838
+ tromechanical Systems (MEMS’97) (Nagoya, Japan, 1997) pp. 290–294.
839
+ 35B. D. Cullity, Introduction to Magnetic Materials (Addison-Wesley, Read-
840
+ ing, MA, 1972).
841
+ 36E. H. Rubensson, “Nonmonotonic recursive polynomial expansions for lin-
842
+ ear scaling calculation of the density matrix,” Journal of Chemical Theory
843
+ and Computation 7, 1233–1236 (2011).
844
+ 37M. Methfessel and A. T. Paxton, “High-precision sampling for brillouin-
845
+ zone integration in metals,” Phys. Rev. B 40, 3616–3621 (1989).
846
+ 38A. M. N. Niklasson, M. J. Cawkwell, E. H. Rubensson, and E. Rudberg,
847
+ “Canonical density matrix perturbation theory,” Phys. Rev. E 92, 063301
848
+ (2015).
849
+ 39M. Wegmuller, J. P. von der Weid, P. Oberson,
850
+ and N. Gisin, “High
851
+ resolution fiber distributed measurements with coherent OFDR,” in Proc.
852
+ ECOC’00 (2000) p. 109.
853
+ 40cuBLAS Library, .
854
+ 41cuSOLVER Library, .
855
+
59E3T4oBgHgl3EQfpgot/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
5NE1T4oBgHgl3EQfBAIU/content/tmp_files/2301.02845v1.pdf.txt ADDED
@@ -0,0 +1,1784 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ A one-dimensional model for axisymmetric deformations of an
2
+ inflated hyperelastic tube of finite wall thickness
3
+ Xiang Yua,˚, Yibin Fub
4
+ aSchool of Computer Science and Technology, Dongguan University of Technology, Dongguan, China
5
+ bSchool of Computing and Mathematics, Keele University, Staffordshire ST5 5BG, UK
6
+ Abstract
7
+ We derive a one-dimensional (1d) model for the analysis of bulging or necking in an inflated hyper-
8
+ elastic tube of finite wall thickness from the three-dimensional finite elasticity theory by applying
9
+ the dimension reduction methodology proposed by Audoly and Hutchinson (J. Mech. Phys. Solids,
10
+ 97, 2016). The 1d model makes it much easier to characterize fully nonlinear axisymmetric defor-
11
+ mations of a thick-walled tube using simple numerical schemes such as the finite difference method.
12
+ The new model recovers the diffuse interface model for analyzing bulging in a membrane tube and
13
+ the 1d model for investigating necking in a stretched solid cylinder as two limiting cases. It is con-
14
+ sistent with, but significantly refines, the exact linear and weakly nonlinear bifurcation analyses.
15
+ Comparisons with finite element simulations show that for the bulging problem, the 1d model is
16
+ capable of describing the entire bulging process accurately, from initiation, growth, to propagation.
17
+ The 1d model provides a stepping stone from which similar 1d models can be derived and used to
18
+ study other effects such as anisotropy and electric loading, and other phenomena such as rupture.
19
+ Keywords:
20
+ localized bulging; necking; reduced models; tubes; stability; nonlinear elasticity
21
+ 1. Introduction
22
+ Hyperelastic tubes are commonly found in various applications ranging from soft robotics (Ma
23
+ et al., 2015; Lu et al., 2015, 2020) to energy harvesting (Lu & Suo, 2012; Bucchi & Hearn, 2013;
24
+ Smith, 2016). They are also used to model human arteries in order to understand pathological
25
+ conditions such as aneurysms (Fu et al., 2012; Alhayani et al., 2014; Demirkoparan & Merodio,
26
+ 2017; Varatharajan & DasGupta, 2017; Hejazi et al., 2021). Inflation of a hyperelastic tube is one
27
+ of the few boundary value problems in nonlinear elasticity that have closed-form solutions, and it
28
+ provides the simplest setup to explain bifurcation, localization, loss of convexity, and “two-phase”
29
+ deformations. Thus, understanding this problem is not only important for applications, but may
30
+ also shed light on other more complicated stability and bifurcation problems.
31
+ ˚Corresponding author
32
+ Email address: [email protected] (Xiang Yu)
33
+ Preprint submitted to Journal of the Mechanics and Physics of Solids
34
+ January 10, 2023
35
+ arXiv:2301.02845v1 [cond-mat.soft] 7 Jan 2023
36
+
37
+ Simple inflation experiments with commercially available latex rubber tubes show that localized
38
+ bulging is the dominant deformation form. For almost all realistic constitutive models for rubber,
39
+ the pressure versus volume curve has an N shape under the condition of fixed resultant axial force
40
+ (Green & Adkins, 1960). This led Yin (1977) and Chater & Hutchinson (1984) to analyze the final
41
+ observable configuration as that corresponding to a “two-phase” deformation.
42
+ The subsequent
43
+ experimental studies carried out by Kyriakides & Chang (1990, 1991), Pamplona et al. (2006) and
44
+ Goncalves et al. (2008) have provided a clear picture on how a localized bulge initiates, grows and
45
+ then propagates under fixed axial force or fixed-ends conditions.
46
+ When the membrane assumption is made, the governing equations for tube inflation can be
47
+ viewed as a finite-dimensional spatial dynamical system that has two conservation laws/integrals
48
+ (Pipkin, 1968). This realization enabled Fu et al. (2008) to demonstrate explicitly how a localized
49
+ solution initiates as a zero-wave-number mode from the uniform deformation and how it evolves
50
+ into a “two-phase” state. The stability of bulging solutions and their sensitivity to imperfections
51
+ have been studied under the same framework (Pearce & Fu, 2010; Fu & Il’ichev, 2015; Fu & Xie,
52
+ 2010). Fresh analytical insight into the case of fixed ends has also been obtained. It is shown
53
+ that the bifurcation condition for this case corresponds to the axial force reaching a maximum at
54
+ a fixed pressure (Fu & Il’ichev, 2015); in other words, as pressure is increased, the critical pressure
55
+ is the value of pressure at which the axial force reaches a maximum when viewed as a function of
56
+ the axial stretch. Also, in contrast with the case of fixed axial force where the measured pressure
57
+ approaches a constant value (the propagation pressure), the measured pressure in the case of fixed
58
+ ends has an N shape where the right branch approaches a master curve that is independent of the
59
+ pre-axial-stretch or the tube length (Guo et al., 2022).
60
+ In some practical applications, however, the tube wall may be of moderate or even large thickness
61
+ and the membrane model no longer applies. For example, in the context of aneurysm formation,
62
+ a human artery can be as thick as a quarter of its outer radius (M¨uller et al., 2008), and fiber-
63
+ reinforcement also seems to reduce the range of validity of the membrane assumption (Wang &
64
+ Fu, 2018). Thus, recent studies have begun to consider hyperelastic tubes of finite wall thickness.
65
+ Fu et al. (2016) showed that the associated bifurcation condition for localized bulging corresponds
66
+ to the vanishing of the Jacobian determinant of the internal pressure and resultant axial force as
67
+ functions of the azimuthal stretch and the axial stretch; see also Yu & Fu (2022) for an alternative
68
+ derivation.
69
+ This provides a framework under which additional effects such as rotation (Wang
70
+ et al., 2017), double-fiber-reinforcement (Wang & Fu, 2018), bi-laying (Liu et al., 2019; Ye et al.,
71
+ 2019), torsion (Althobaiti, 2022), and surface tension (Emery & Fu, 2021a,b,c; Emery, 2023) can
72
+ be assessed in a systematic manner. Ye et al. (2020) conducted a weakly non-linear analysis and
73
+ derived the bulging solution explicitly. The analytic predictions were corroborated by numerical
74
+ simulations and experiments (Wang et al., 2019).
75
+ For tubes of finite wall thickness, the equations that govern their axisymmetric deformations
76
+ are coupled nonlinear partial differential equations. Although analytic solutions can be obtained in
77
+ 2
78
+
79
+ the near-critical regime using asymptotic methods (Ye et al., 2020), the complexity of the governing
80
+ equations forbids any further analytic attempts to understand the bulging evolution further away
81
+ from the bifurcation point. The post-bifurcation behavior in the fully nonlinear regime has so far
82
+ only been investigated by resorting to Abaqus simulations (Wang et al., 2019; Lin et al., 2020).
83
+ This is not satisfactory since the insight provided by full-scale simulations tends to be limited and
84
+ there are situations where repeated calculations of the bulging profile are required (e.g. in the
85
+ assessment of the rupture potential (Hejazi et al., 2021)).
86
+ A recent series of studies by Audoly and coworkers has opened the possibility that a 1d reduced
87
+ model can be derived to describe the fully nonlinear evolution of bulging or necking. In the first
88
+ of this series, Audoly & Hutchinson (2016), the authors derived a 1d model for tensile necking
89
+ localization in a 3d prismatic solid of arbitrary cross-section. The key idea of their derivation is a
90
+ dimension reduction assuming slow variation in the axial direction that respects self-consistency.
91
+ In terms of the language of perturbation analysis, the leading-order solution is almost correct and
92
+ higher-order terms are only added to restore self-consistency. The method was later applied by
93
+ Lestrigant and Audoly to obtain a diffuse interface model for the characterization of propagating
94
+ bulges in membrane tubes (Lestringant & Audoly, 2018) and a 1d model for predicting surface
95
+ tension-driven necking in soft elastic cylinders (Lestringant & Audoly, 2020b). It has also been
96
+ used recently to derive a 1d model for elastic ribbons (Audoly & Neukirch, 2021) and for tape springs
97
+ (Kumar et al., 2022). The systematic reduction method for deriving 1d strain-gradient models for
98
+ nonlinear slender structures was further generalized by Lestringant & Audoly (2020a). It is worth
99
+ pointing out that although the 1d models are built on the assumption that localized solutions
100
+ vary slowly in the longitudinal direction, it is surprisingly accurate, even in the region where the
101
+ localization is well developed. This is illustrated by the numeric examples in the aforementioned
102
+ work and in the comparative studies by Wang & Fu (2021) and Fu et al. (2021).
103
+ This work aims to extend the diffuse interface model of Lestringant & Audoly (2018) for mem-
104
+ brane tubes to tubes of finite wall thickness, in a similar spirit as the previous work Fu et al. (2016)
105
+ and Ye et al. (2020) that extend the bifurcation condition and the weakly nonlinear analysis from
106
+ membrane tubes to thick-walled tubes. In contrast with the case under the membrane assumption
107
+ where the original governing equations are already one-dimensional, the governing equations for the
108
+ current case are two-dimensional, and the uniformly inflated deformation is no longer homogeneous
109
+ since the solution depends on the radial variable. It will be shown that a 1d reduced model can
110
+ still be derived and simplified to the form
111
+ E1dras “
112
+ ż L
113
+ ´L
114
+ ´
115
+ Gpa, λpaqq ` 1
116
+ 2Dpaqa1pZq2¯
117
+ dZ ` Cpaqa1pZq|L
118
+ ´L,
119
+ (1.1)
120
+ where L is the initial half length, Z is the axial coordinate, apZq is the azimuthal stretch on the inner
121
+ surface (a constant multiple of the deformed inner radius ) and the expressions for Gpa, λpaqq, Dpaq
122
+ and Cpaq are given in (3.10), (4.21) and (4.22), respectively. The first term G in (1.1) corresponds
123
+ to the energy of the uniform deformation, which determines the amplitudes of the two phases in
124
+ 3
125
+
126
+ the bulge propagation stage; the second term accounts for the contribution of the strain gradient
127
+ to the total energy, which describes how these two phases are connected.
128
+ The Euler-Lagrange
129
+ equation associated with the energy functional (1.1) is a second-order nonlinear ode for apZq,
130
+ which is a drastic simplification from the original nonlinear partial differential equations. This 1d
131
+ model is validated by comparison with finite element simulations, showing excellent agreement with
132
+ numerical results even for the propagation stage.
133
+ The outline of this paper is as follows. In Sect. 2, we formulate the 3d axisymmetric finite-
134
+ strain model for a tube of finite wall thickness under inflation and axial stretching. In Sect. 3, we
135
+ summarize solutions corresponding to uniform inflation of the tube, making preparation for the
136
+ subsequent dimension reduction. In Sect. 4, we carry out the dimension reduction and derive the
137
+ above-mentioned 1d strain-gradient model. The connection of the 1d model with prior work is
138
+ given in Sect. 5. In Sect. 6, we validate the 1d model by making comparisons with finite element
139
+ simulations. Finally, concluding remarks are given in Sect. 7.
140
+ 2. Three-dimensional finite-strain model
141
+ We consider a circular cylindrical tube that has a length 2L, inner radius A and outer radius B
142
+ in its reference configuration; see Fig. 1(a). The ratio of the outer radius to the length ε “ B{2L is
143
+ assumed to be small, thus ε ! 1. The tube deforms axisymmetrically under the combined action of
144
+ an internal pressure P and a resultant axial force N, as shown in Fig. 1(b). In terms of cylindrical
145
+ coordinates, the current position vector of a representative point is given by
146
+ x “ zpZ, Rqez ` rpZ, Rqer,
147
+ (2.1)
148
+ where pR, Θ, Zq and pr, θ, zq are the coordinates of a representative point before and after defor-
149
+ mation, and per, eθ, ezq are the standard basis vectors associated with both pR, Θ, Zq and pr, θ, zq.
150
+ The deformation gradient related to (2.1) is given by
151
+ F “ r
152
+ Reθ b eθ ` zZez b ez ` zRez b er ` rZer b ez ` rRer b er,
153
+ (2.2)
154
+ where zZ :“ Bz{BZ, zR :“ Bz{BR, etc.
155
+ We assume that the tube is made of an incompressible isotropic hyperelastic material, associated
156
+ with the strain energy function Wpλ1, λ2, λ3q, where λ1, λ2, λ3 denote the three principal stretches.
157
+ Throughout this paper, we identify the indices 1, 2, 3 such that in uniform inflation they coincide
158
+ with the θ-, z- and r-directions, respectively.
159
+ The total potential energy of the tube is composed of the elastic energy and the load potential,
160
+ which reads
161
+ E “
162
+ ż L
163
+ ´L
164
+ ´ ż B
165
+ A
166
+ `
167
+ wpλ1, λ2q ´ N˚zZ
168
+ ˘
169
+ 2πR dR ´ Pπr2zZ
170
+ ˇˇ
171
+ R“A
172
+ ¯
173
+ dZ,
174
+ (2.3)
175
+ 4
176
+
177
+ m
178
+ B
179
+ G
180
+ (a)
181
+ m2
182
+ G2
183
+ H2
184
+ (b)
185
+ Figure 1: A hyperelastic cylindrical tube of finite thickness in (a) reference (undeformed) configuration and (b)
186
+ current configuration.
187
+ where wpλ1, λ2q “ Wpλ1, λ2, λ´1
188
+ 1 λ´1
189
+ 2 q is the reduced strain energy function and N˚ “ N{pπpB2 ´
190
+ A2qq is the resultant axial force per unit cross-sectional area. The elastic model governed by the
191
+ energy functional (2.3) will be used as a starting point for the subsequent dimension reduction.
192
+ The governing equations for the two unknown functions rpZ, Rq and zpZ, Rq can be derived by
193
+ setting the first variation of E to zero, but these equations are not required in the approach that
194
+ we follow.
195
+ 3. Uniform inflation
196
+ We now summarise the solution that corresponds to uniform inflation and extension of the tube.
197
+ This solution will be referred to as the uniform solution and is indicated by a superposed bar. For
198
+ a more detailed derivation, see Haughton & Ogden (1979).
199
+ First, incompressibility implies that a uniform solution must necessarily be of the form
200
+ ¯z “ λZ,
201
+ ¯r “
202
+ a
203
+ a2A2 ` λ´1pR2 ´ A2q,
204
+ (3.1)
205
+ where λ and a denote the constant axial stretch and azimuthal stretch on the inner surface, respec-
206
+ tively. The three principal stretches are simply
207
+ ¯λ1 “ ¯r
208
+ R,
209
+ ¯λ2 “ λ,
210
+ ¯λ3 “ d¯r
211
+ dR “ ¯λ´1
212
+ 1 ¯λ´1
213
+ 2 ,
214
+ (3.2)
215
+ and the azimuthal stretch on the outer surface, denoted by b, is given by
216
+ b “ ¯λ1|R“B “
217
+ a
218
+ a2A2 ` λ´1pB2 ´ A2q
219
+ B
220
+ .
221
+ (3.3)
222
+ The three associated principal Cauchy stresses ¯σ11, ¯σ22 and ¯σ33 satisfy the relations
223
+ ¯σ11 ´ ¯σ33 “ ¯λ1w1,
224
+ ¯σ22 ´ ¯σ33 “ λw2,
225
+ (3.4)
226
+ 5
227
+
228
+ where w1 “ Bwp¯λ1, ¯λ2q{B¯λ1 and w2 “ Bwp¯λ1, ¯λ2q{B¯λ2.
229
+ The only equilibrium equation that is not satisfied automatically is
230
+ d¯σ33
231
+ d¯r
232
+ “ ¯σ11 ´ ¯σ33
233
+ ¯r
234
+
235
+ ¯λ1w1
236
+ ¯r
237
+ .
238
+ (3.5)
239
+ On integrating this equation from R “ A to R “ B and making use of the boundary conditions
240
+ that ¯σ33|R“A “ ´P and ¯σ33|R“B “ 0, we obtain
241
+ P “ Qpa, λq :“
242
+ ż a
243
+ b
244
+ w1p¯λ1, λq
245
+ ¯λ2
246
+ 1λ ´ 1 d¯λ1,
247
+ (3.6)
248
+ where the second equation defines the function Qpa, λq and we have made use of the identity
249
+ d¯r
250
+ ¯r “ ´
251
+ d¯λ1
252
+ ¯λ1p¯λ2
253
+ 1λ ´ 1q,
254
+ (3.7)
255
+ which can be deduced from (3.1)2.
256
+ The overall equilibrium in the axial direction implies
257
+ Mpa, λq ´ 1
258
+ 2a2P ´
259
+ N
260
+ 2πA2 “ 0,
261
+ (3.8)
262
+ where Mpa, λq is given by
263
+ Mpa, λq :“ 1
264
+ A2
265
+ ż B
266
+ A
267
+ λ´1¯σ22R dR “
268
+ ż a
269
+ b
270
+ p¯λ2
271
+ 1 ´ a2qw1p¯λ1, λq ` 2¯λ1λpa2λ ´ 1qw2p¯λ1, λq
272
+ 2p¯λ2
273
+ 1λ ´ 1q2
274
+ d¯λ1.
275
+ (3.9)
276
+ In view of (2.3), the total potential energy of the uniform deformation (3.1) per unit reference
277
+ length, after scaling by 2π, is
278
+ Gpa, λq “
279
+ ż B
280
+ A
281
+ wp¯λ1, λq R dR ´ 1
282
+ 2PA2a2λ ´ N
283
+ 2πλ.
284
+ (3.10)
285
+ The equilibrium equations (3.6) and (3.8) can also be obtained from BG{Ba “ 0 and BG{Bλ “ 0,
286
+ respectively. Once the loads P and N are specified, the deformation parameters a and λ can be
287
+ found by solving the equilibrium equations (3.6) and (3.8).
288
+ On differentiating the left-hand side of (3.8) with respect to λ, we find that it takes the form
289
+ Hw22pa, λq{A ` OpH2q, where H “ B ´ A is the thickness of the tube. We assume that the strong
290
+ ellipticity condition is satisfied pointwise which guarantees that w22pa, λq is positive (Knowles &
291
+ Sternberg, 1976). This, combined with the implicit function theorem, implies that (3.8) can be
292
+ inverted to express λ in terms of a uniquely at least when H is small. We assume that this remains
293
+ true for arbitrary H. This enables us to view (3.8) as an implicit equation for λ “ λpaq. We remark
294
+ that λ is also dependent on P, but this dependence is not indicated explicitly for notational brevity.
295
+ Thus, by definition, λpaq is the solution to the implicit equation
296
+ Mpa, λpaqq ´ 1
297
+ 2a2P ´
298
+ N
299
+ 2πA2 “ 0.
300
+ (3.11)
301
+ 6
302
+
303
+ Since λ has been viewed as a function of a, all quantities (except ¯z which also depends on Z) related
304
+ to the uniform solution are functions of a and R. For instance, ¯r denotes the function
305
+ ¯rpa, Rq “
306
+ a
307
+ a2A2 ` λpaq´1pR2 ´ A2q.
308
+ (3.12)
309
+ We denote ¯σ33 by ´qpa, Rq so that
310
+ qpa, Rq :“ ´¯σ33 “
311
+ ż ¯λ1
312
+ b
313
+ w1p˜λ1, λq
314
+ ˜λ2
315
+ 1λ ´ 1
316
+ d˜λ1.
317
+ (3.13)
318
+ We also define another function mpa, Rq through
319
+ mpa, Rq :“ 1
320
+ R2
321
+ ż B
322
+ R
323
+ λ´1¯σ22RdR “
324
+ ż ¯λ1
325
+ b
326
+ p˜λ2
327
+ 1 ´ ¯λ2
328
+ 1qw1p˜λ1, λq ` 2˜λ1λp¯λ2
329
+ 1λ ´ 1qw2p˜λ1, λq
330
+ 2p˜λ2
331
+ 1λ ´ 1q2
332
+ d˜λ1,
333
+ (3.14)
334
+ and record the connections
335
+ qpa, Aq “ Qpa, λpaqq,
336
+ mpa, Aq “ Mpa, λpaqq.
337
+ (3.15)
338
+ The 1d reduced model to be derived in the next section will be expressed in terms of the two
339
+ functions qpa, Rq and mpa, Rq. The integrals in these two functions can be evaluated explicitly for
340
+ some commonly used strain energy functions, including the Gent material model that will be used
341
+ in our illustrative examples.
342
+ 4. Derivation of the one-dimensional model
343
+ In this section, we apply the dimension reduction methodology proposed by Audoly & Hutchin-
344
+ son (2016) to derive a one-dimensional model from the full three-dimensional theory formulated in
345
+ Sect. 2.
346
+ 4.1. Optimal correction
347
+ We start our dimension reduction by assuming that all dependent variables related to the
348
+ axisymmetric configuration vary slowly in the axial direction. More precisely, it is assumed that
349
+ all variables depend on Z through the “far distance” variable
350
+ S “ εZ.
351
+ (4.1)
352
+ Recall that ε is the ratio of the outer radius to the length, which is assumed to be small.
353
+ In
354
+ particular, we now allow a and λ to depend on S and write a “ apSq, λ “ λpapSqq. Our aim is to
355
+ derive a reduced model, an ordinary differential equation, that is satisfied by apSq. We recall that
356
+ apSq is the deformed inner radius divided by a constant (i.e. A).
357
+ A naive approach would be to use a “ apSq and λ “ λpapSqq to compute the two principal
358
+ stretches and then derive the equation satisfied by a “ apSq by minimizing the energy functional
359
+ 7
360
+
361
+ (2.3). This would yield an equation for apSq that is not self-consistent. The correct way is to allow
362
+ for higher-order correction terms by looking for an asymptotic solution of the form
363
+ zpZ, Rq “ 1
364
+ ε
365
+ ż S
366
+ 0
367
+ λpapTqq dT ` εv˚pS, Rq ` Opε3q,
368
+ rpZ, Rq “ ¯rpapSq, Rq ` ε2u˚pS, Rq ` Opε4q.
369
+ (4.2)
370
+ We note that the correction terms in zpZ, Rq and rpZ, Rq are of order ε and ε2, respectively.
371
+ This is because the Op1q-term in zpZ, Rq and the Opεq-term in rpZ, Rq correspond to a uniform
372
+ perturbation and can thus be absorbed into the leading terms.
373
+ On substituting (4.2) into (2.2) and truncating at order ε2, we obtain the deformation gradient
374
+ F “
375
+ ¨
376
+ ˚
377
+ ˝
378
+ ¯r{R ` ε2u˚{R
379
+ 0
380
+ 0
381
+ 0
382
+ λpapSqq ` ε2v˚
383
+ S
384
+ εv˚
385
+ R
386
+ 0
387
+ ε¯raa1pSq
388
+ ¯rR ` ε2u˚
389
+ R
390
+ ˛
391
+ ‹‚,
392
+ (4.3)
393
+ where the subscripts represent partial differentiation with respect to the indicated variables (in
394
+ particular ¯ra “ B¯r{Ba). Consequently, the three principal stretches are given by
395
+ λ1 “ ¯λ1 ` ε2 u˚
396
+ R ,
397
+ λ2 “ ¯λ2 ` ε2´
398
+
399
+ S ` λp¯r2
400
+ aa1pSq2 ` v˚2
401
+ R q ` 2¯λ3¯raa1pSqv˚
402
+ R
403
+ 2pλ2 ´ ¯λ3q
404
+ ¯
405
+ ,
406
+ (4.4)
407
+ where ¯λ1 and ¯λ2 are given by (3.2) but with a and λ replaced by apSq and λpapSqq, respectively.
408
+ Substituting (4.4) into (2.3) and expanding to second order, we see that E can be written, in
409
+ terms of the un-scaled variables, as
410
+ E “ 2π
411
+ ´ ż L
412
+ ´L
413
+ GpapZq, λpapZqqq dZ ` E2
414
+ ¯
415
+ ` OpLε3q,
416
+ (4.5)
417
+ where E2 represents the term of order ε2 and is given by
418
+ E2 “
419
+ ż L
420
+ ´L
421
+ ´ ż B
422
+ A
423
+ ´
424
+ pw2 ´ N˚qvZ ` w2
425
+ λp¯r2
426
+ aa12 ` v2
427
+ Rq ` 2¯λ3¯raa1vR
428
+ 2pλ2 ´ ¯λ2
429
+ 3q
430
+ ¯
431
+ R dR
432
+ `
433
+ ż B
434
+ A
435
+ w1u dR ´ 1
436
+ 2PA2a2vZ|R“A ´ PAaλu|R“A
437
+ ¯
438
+ dZ.
439
+ (4.6)
440
+ In the above expression, vpZ, Rq “ εv˚pS, Rq and upZ, Rq “ ε2u˚pS, Rq denote the unscaled dis-
441
+ placements, and here and hereafter we write apZq for apSq and so a1 now denotes a1pZq. It is seen
442
+ that the only reason for introducing S above is to identify all terms of order ε2 that should be kept
443
+ in (4.6). With this task accomplished, the scaled variable S will no longer appear in the subsequent
444
+ analysis. Also, w1 “ w1p¯λ1, λq, w2 “ w2p¯λ1, λq in which λ is a function of a and ¯λ1 is a function of
445
+ a and R.
446
+ 8
447
+
448
+ Our formulation in terms of the reduced strain energy function requires the solution (4.2) to
449
+ satisfy the incompressibility condition automatically. This can be achieved by eliminating u in
450
+ (4.6) with the use of detpF q “ 1 which takes the form
451
+ λp¯ruqR ` ¯rp¯rRvZ ´ ¯raa1vRq “ 0.
452
+ (4.7)
453
+ To this end, we make use of the equilibrium equation (3.5) and write
454
+ ż B
455
+ A
456
+ w1u dR “ λ
457
+ ż B
458
+ A
459
+ ¯σ33,R¯ru dR “ λ¯σ33¯ru|B
460
+ A ´ λ
461
+ ż B
462
+ A
463
+ ¯σ33p¯ruqR dR
464
+ “ λPAau|R“A ´
465
+ ż B
466
+ A
467
+ q¯rp¯rRvZ ´ ¯raa1vRq dR,
468
+ (4.8)
469
+ where we have replaced ¯σ33 by ´qpa, Rq (cf. (3.13)) and have used (4.7) to eliminate p¯ruqR.
470
+ On eliminating u in (4.6) with the use of (4.8), we can recast E2 in the form
471
+ E2 “
472
+ ż L
473
+ ´L
474
+ ´ ż B
475
+ A
476
+ `
477
+ pλ´1¯σ22 ´ N˚qvZ ` 1
478
+ 2ζp¯r2
479
+ aa12 ` v2
480
+ Rq ` ξ¯raa1vR
481
+ ˘
482
+ R dR
483
+ ´ 1
484
+ 2PA2a2vZ|R“A
485
+ ¯
486
+ dZ,
487
+ (4.9)
488
+ where ζ “ λw2{pλ2 ´ ¯λ2
489
+ 3q, ξ “ q¯λ1 ` ¯λ3ζ{λ, and we have made use of the connection λw2 ´ q “ ¯σ22
490
+ that follows from (3.4)2 with ¯σ33 “ ´q. Then upon using integration by parts, we obtain
491
+ E2 “
492
+ ż L
493
+ ´L
494
+ ´ ż B
495
+ A
496
+ KpR, v, vRq dR ` PA2aa1v|R“A
497
+ ¯
498
+ dZ
499
+ `
500
+ ´ ż B
501
+ A
502
+ pλ´1¯σ22 ´ N˚qvR dR ´ 1
503
+ 2PA2a2v|R“A
504
+ ¯ˇˇˇ
505
+ Z“L
506
+ Z“´L,
507
+ (4.10)
508
+ where KpR, v, vRq is given by
509
+ KpR, v, vRq “ ´pλ´1¯σ22qaa1Rv ` 1
510
+ 2Rζp¯r2
511
+ aa12 ` v2
512
+ Rq ` Rξ¯raa1vR.
513
+ (4.11)
514
+ In the last expression, pλ´1¯σ22qa denotes the partial derivative of λ´1¯σ22 with respect to a with R
515
+ fixed. To find the remaining correction field v “ vpZ, Rq, we assume that the leading-order stretch
516
+ apZq is prescribed and seek the correction v such that the total potential energy is stationary
517
+ (Audoly & Hutchinson, 2016). As a result, the optimal v satisfies the Euler-Lagrange equation and
518
+ the boundary conditions
519
+ BK
520
+ Bv ´ d
521
+ dR
522
+ ´ BK
523
+ BvR
524
+ ¯
525
+ “ 0,
526
+ A ď R ď B,
527
+ (4.12)
528
+ BK
529
+ BvR
530
+ “ PA2aa1,
531
+ R “ A,
532
+ (4.13)
533
+ BK
534
+ BvR
535
+ “ 0,
536
+ R “ B.
537
+ (4.14)
538
+ 9
539
+
540
+ Solution of the above boundary value problem requires satisfaction of the solvability condition
541
+ ż B
542
+ A
543
+ BK
544
+ Bv dR “ ´PA2aa1,
545
+ that is
546
+ ż B
547
+ A
548
+ pλ´1¯σ22qaa1R dR “ PA2aa1.
549
+ This is automatically satisfied in view of the definition (3.9) for Mpa, λq and the equilibrium con-
550
+ dition (3.8).
551
+ Written out explicitly, Eqs. (4.12) and (4.14) take the form
552
+ d
553
+ dRpRζvRq “ ´
554
+ ´
555
+ pλ´1¯σ22qaR ` d
556
+ dRpRξ¯raq
557
+ ¯
558
+ a1,
559
+ A ď R ď B,
560
+ (4.15)
561
+ RζvR “ ´Rξ¯raa1,
562
+ R “ B.
563
+ (4.16)
564
+ Integrating (4.15) subject to the boundary condition (4.16) leads to
565
+ vR “ cpa, Rqa1pZq,
566
+ (4.17)
567
+ where cpa, Rq is defined by
568
+ cpa, Rq “ ´ ¯ra
569
+ ¯λ1λ2 ` 1
570
+
571
+ ´
572
+ R2 B
573
+ Bampa, Rq ´ ¯r¯raqpa, Rq
574
+ ¯
575
+ .
576
+ (4.18)
577
+ Once vR is found, the optimal correction v can be obtained by integrating (4.17) from B to R,
578
+ which yields
579
+ v “ ´
580
+ ˆż B
581
+ R
582
+ cpa, Tq dT
583
+ ˙
584
+ a1pZq,
585
+ (4.19)
586
+ where we have neglected the function arising from integration since it can be absorbed into λpapZqq.
587
+ 4.2. One-dimensional energy functional
588
+ Substituting the correction function v found in (4.19) back into (4.10), after some simplification
589
+ (which is detailed in Appendix A), we obtain the final expression for the energy functional of the
590
+ 1d model
591
+ E1dras “
592
+ ż L
593
+ ´L
594
+ ´
595
+ Gpa, λpaqq ` 1
596
+ 2Dpaqa1pZq2¯
597
+ dZ ` Cpaqa1pZq|L
598
+ ´L,
599
+ (4.20)
600
+ where the gradient moduli D and C are given by
601
+ Dpaq “
602
+ ż B
603
+ A
604
+ Rζp¯r2
605
+ a ´ cpa, Rq2q dR,
606
+ (4.21)
607
+ Cpaq “
608
+ ż B
609
+ A
610
+ pλ´1¯σ22 ´ N˚q˜cpa, RqR dR ´ 1
611
+ 2PA2a2˜cpa, Aq,
612
+ (4.22)
613
+ 10
614
+
615
+ with ˜cpa, Rq “ ´
616
+ şB
617
+ R cpa, Tq dT.
618
+ The associated equilibrium equation is obtained by extremizing (4.20) with respect to apZq and
619
+ is found to take the form
620
+ A2aλpaqpQpa, λpaqq ´ Pq ´ 1
621
+ 2D1paqa1pZq2 ´ Dpaqa2pZq “ 0,
622
+ (4.23)
623
+ where we have used the fact that BG{Bλ “ 0 as it is used to find the implicit relation between λ and
624
+ a (see (3.11)). Since Z does not explicitly appear in the integrand of (4.20) due to the translational
625
+ invariance of the current problem in Z, by the Beltrami identity, the equilibrium equation (4.23)
626
+ admits a first integral of the form
627
+ Gpa, λpaqq ´ 1
628
+ 2Dpaqa1pZq2 “ constant.
629
+ (4.24)
630
+ We remark that the variational problem (4.20) is ill-posed due to the presence of the boundary
631
+ terms Cpaqa1pZq|L
632
+ ´L.
633
+ This is because the variational structure of the problem is broken when
634
+ higher-order terms are dropped. There are two possible ways to get around this issue (Lestringant
635
+ & Audoly, 2020a). The first one is to simply ignore the boundary terms, i.e., to set Cpaq “ 0. The
636
+ second one is to add an Opε2q-term to apZq so that the boundary terms go away, which is rigorous
637
+ but slightly more complex. It has previously been verified in Lestringant & Audoly (2020a) that
638
+ the simple and rigorous approaches yield curves that can hardly be distinguished visually in any of
639
+ the plots.
640
+ To summarize, the second-order nonlinear ordinary differential equation (4.23) is our approxi-
641
+ mate 1d model that governs the variation of the inner radius (which is A times apZq) in the axial
642
+ direction. Once apZq is determined, the 3d deformation is given by (3.1). We note that the func-
643
+ tion Qpa, λpaqq is explicit for most of the commonly used strain energy functions. The only slight
644
+ complication is that the function Dpaq is given by an integral; see (4.21), but the functions mpa, Rq,
645
+ qpa, Rq, and hence cpa, Rq and the integrand in (4.21) all have explicit expressions for most of the
646
+ commonly used strain energy functions. Thus, only one numerical integration is required. This can
647
+ easily be implemented on a symbolic manipulation platform such as Mathematica (Wolfram, 1991)
648
+ as we shall show later.
649
+ 5. Connections with previous work
650
+ We now demonstrate that the 1d model derived in Sect. 4 can recover the 1d model of Lestringant
651
+ & Audoly (2018) for membrane tubes and that of Audoly & Hutchinson (2016) for solid cylinders
652
+ under appropriate limits, and it can also reproduce the same weakly nonlinear bulging solution as
653
+ that based on the exact 3d theory (Ye et al., 2020).
654
+ 11
655
+
656
+ 5.1. Membrane limit
657
+ We first consider the reduction of the 1d model in the membrane limit when the tube thickness
658
+ H approaches zero. The general axisymmetric deformation is now described by
659
+ r “ rpZq,
660
+ θ “ Θ,
661
+ z “ zpZq,
662
+ (5.1)
663
+ and the three principal stretches are given by
664
+ λ1 “ r
665
+ R,
666
+ λ2 “
667
+ a
668
+ r12 ` z12,
669
+ λ3 “ 1{pλ1λ2q,
670
+ (5.2)
671
+ where R denotes the constant radius of the mid-surface. The total energy (2.3) reduces to
672
+ E “ 2π
673
+ ż L
674
+ ´L
675
+ ´
676
+ w ´ 1
677
+ 2P ˚λ2
678
+ 1z1 ´ N˚z1¯
679
+ dZ,
680
+ (5.3)
681
+ where P ˚ denotes the pressure scaled by H{R. Setting the first variation δE to zero then gives the
682
+ governing equations
683
+ w1 ´ R
684
+ ´w2
685
+ λ2
686
+ r1¯1
687
+ ´ P ˚λ1z1 “ 0,
688
+ (5.4)
689
+ w2
690
+ λ2
691
+ z1 ´ 1
692
+ 2P ˚λ2
693
+ 1 “ N˚.
694
+ (5.5)
695
+ Under the assumption that |r1| ! 1, we have
696
+ λ2 “ z1 ` r12
697
+ 2z1 ` ¨ ¨ ¨ .
698
+ (5.6)
699
+ As an algebraic equation for z1, Eq. (5.5) has an asymptotic solution of the form
700
+ z1 “ gpλ1q ` k1pλ1qr12 ` ¨ ¨ ¨ ,
701
+ (5.7)
702
+ where the leading-order term gpλ1q obviously satisfies the algebraic equation
703
+ w2pλ1, gpλ1qq ´ 1
704
+ 2P ˚λ2
705
+ 1 ´ N˚ “ 0,
706
+ (5.8)
707
+ and the function k1pλ1q can easily be found but is not required. Eq. (5.8) determines gpλ1q uniquely
708
+ under the assumption w22 ą 0.
709
+ With the use of (5.6) and (5.7), we may expand the integrand in (5.3) to order r12 and obtain
710
+ E “ 2π
711
+ ż L
712
+ ´L
713
+ ´
714
+ wpλ1, gpλ1qq ´ 1
715
+ 2P ˚λ2
716
+ 1gpλ1q ´ N˚gpλ1q ` 1
717
+ 2
718
+ w2pλ1, gpλ1qq
719
+ gpλ1q
720
+ r12¯
721
+ dZ.
722
+ (5.9)
723
+ This is the reduced model derived by Lestringant & Audoly (2018).
724
+ We now show that our general 1d model (4.20) can recover this 1d model under the limit H Ñ 0.
725
+ To this end, we first note that the uniformly deformed configuration is now described by
726
+ ¯r “ aR,
727
+ ¯z “ λZ.
728
+ (5.10)
729
+ 12
730
+
731
+ In particular, we have ¯ra “ R. Since qpa, Rq and mpa, Rq involve integrals from R to B, they go to
732
+ zero as H Ñ 0. Consequently, the cpa, Rq defined in (4.18) takes the simple form
733
+ cpa, Rq “ ´ R
734
+ aλ2 .
735
+ (5.11)
736
+ Taking the limit H Ñ 0 in ζ “ λw2{pλ2 ´ ¯λ2
737
+ 3q yields
738
+ ζ “ a2λ3w2
739
+ a2λ4 ´ 1.
740
+ (5.12)
741
+ Substituting (5.11) and (5.12) into (4.20), we obtain
742
+ lim
743
+ HÑ0
744
+ E1dras
745
+ RH
746
+
747
+ ż L
748
+ ´L
749
+ ´
750
+ wpa, λpaqq ´ 1
751
+ 2P ˚a2λpaq ´ N˚λpaq ` 1
752
+ 2R2 w2pa, λpaqq
753
+ λpaq
754
+ a1pZq2¯
755
+ dZ.
756
+ (5.13)
757
+ Note that the modulus Cpaq vanishes in the membrane limit because of the equilibrium in the axial
758
+ direction. The integrand on the right-hand side of (5.13) is the same as that on the right-hand side
759
+ of (5.9) if we identify λ1, gpλ1q and r1 with apZq, λpaq, and Ra1pZq, respectively.
760
+ 5.2. Solid cylinder limit
761
+ Next we consider the other extreme limit corresponding to A Ñ 0 and P Ñ 0. The uniform
762
+ solution takes the form
763
+ ¯z “ λZ,
764
+ ¯r “ aR
765
+ (5.14)
766
+ with a “ λ´1{2. The three principal stretches are
767
+ ¯λ1 “ ¯λ3 “ λ´1{2,
768
+ ¯λ2 “ λ.
769
+ (5.15)
770
+ In particular, we have
771
+ w1p¯λ1, ¯λ2q “ 0,
772
+ w2p¯λ1, ¯λ2q “ ˆw1pλq,
773
+ (5.16)
774
+ where ˆwpλq “ Wpλ´1{2, λ, λ´1{2q. It follows from (5.16)1 that qpa, Rq “ 0. Note that the deforma-
775
+ tion (5.14) is homogeneous, so (3.14) implies that
776
+ mpa, Rq “ A2pB2 ´ R2q
777
+ R2pB2 ´ A2qmpa, Aq “ A2pB2 ´ R2q
778
+ R2pB2 ´ A2qMpa, λpaqq.
779
+ Differentiating this expression with respect to a and noting (3.11), we obtain Bmpa, Rq{Ba “ 0.
780
+ Thus cpa, Rq reduces to
781
+ cpa, Rq “ ´ R
782
+ λ3{2 .
783
+ (5.17)
784
+ The elastic modulus ζ is easily calculated as
785
+ ζ “ λ2 ˆw1pλq
786
+ λ3 ´ 1 .
787
+ (5.18)
788
+ 13
789
+
790
+ Substituting (5.17) and (5.18) into (4.20), we obtain
791
+ 2πE1drλs “
792
+ ż L
793
+ ´L
794
+ ´
795
+ πB2 ˆwpλq ` πB4
796
+ 16
797
+ ˆw1pλq
798
+ λ4
799
+ λ1pZq2 ´ Nλ
800
+ ¯
801
+ dZ,
802
+ (5.19)
803
+ where we have made use of the relation a1pZq “ λ1pZq{p2λ3{2q. This recovers the 1d model of
804
+ Audoly & Hutchinson (2016) specialized to an incompressible circular cylinder.
805
+ 5.3. Comparison with exact weakly nonlinear analysis
806
+ Finally, we carry out a weakly nonlinear near-critical analysis using our 1d model and compare
807
+ the resulting amplitude equation with that obtained by Ye et al. (2020) from the exact 3d theory.
808
+ We focus on localized solutions in an infinitely long tube of finite wall thickness.
809
+ Denote by a8 the limit of apZq as Z Ñ 8 and λ8 “ λpa8q. It follows from (3.6) and (3.11)
810
+ that
811
+ P “ Qpa8, λ8q,
812
+ N “ 2πA2Fpa8, λ8q,
813
+ (5.20)
814
+ where Fpa8, λ8q is defined by
815
+ Fpa8, λ8q “ Mpa8, λ8q ´ 1
816
+ 2a2
817
+ 8Qpa8, λ8q.
818
+ (5.21)
819
+ We look for a localized solution that bifurcates from the uniform solution by writing
820
+ apZq “ a8 ` ypZq,
821
+ (5.22)
822
+ where ypZq is a small perturbation. Substituting (5.22) into the 1d equilibrium equation (4.23)
823
+ and expanding in terms of ypZq to quadratic order with the use of (5.20), we obtain
824
+ Dpa8qy2pZq “ ωpa8, λ8qypZq ` γpa8, λ8qypZq2,
825
+ (5.23)
826
+ where the two coefficient functions ωpa, λq and γpa, λq are given by
827
+ ωpa, λq “ A2
828
+ 2aλ
829
+ a2Qλ ` 2Fλ
830
+ Ωpa, λq,
831
+ (5.24)
832
+ γpa, λq “ A2 aλpa2Qa ` 2Faq
833
+ Fapa2Qλ ` 2Fλq2 Γpa, λq ` A2ψpa, λqΩpa, λq.
834
+ (5.25)
835
+ In the above expressions, Qa “ BQpa, λq{Ba, Qλ “ BQpa, λq{Bλ, etc. and Ωpa, λq and Γpa, λq are
836
+ defined by
837
+ Ωpa, λq “ BQ
838
+ Ba
839
+ BF
840
+ Bλ ´ BQ
841
+
842
+ BF
843
+ Ba ,
844
+ (5.26)
845
+ Γpa, λq “ BΩ
846
+ Ba
847
+ BF
848
+ Bλ ´ BΩ
849
+
850
+ BF
851
+ Ba ,
852
+ (5.27)
853
+ and ψpa, λq is not written out as it is not required in the weakly nonlinear analysis.
854
+ 14
855
+
856
+ The solution to the linearized equation of (5.23) changes character when the sign of ωpa8, λ8q
857
+ changes. Thus a bifurcation occurs when ωpa8, λ8q “ 0, or equivalently,
858
+ Ωpa8, λ8q “ 0.
859
+ (5.28)
860
+ Note that Qpa8, λ8q and Fpa8, λ8q represent respectively the functional dependence of P and
861
+ N on a8 and λ8. Thus the above bifurcation condition is simply the vanishing of the Jacobian
862
+ determinant of P and N as functions of a8 and λ8. This is consistent with previous work Fu et al.
863
+ (2016) and Yu & Fu (2022).
864
+ We consider two typical loading scenarios: either the resultant axial force N or the axial stretch
865
+ at infinity λ8 is fixed. The latter case is used to approximate the case of fixed axial length, which
866
+ can be realized more easily experimentally or in Abaqus simulations.
867
+ Let us first assume that the resultant axial force N “ Nc is fixed, where Nc is the prescribed
868
+ axial force. Denote by pacr, λcrq the root of the system of equations
869
+ ωpa8, λ8q “ 0,
870
+ Fpa8, λ8q “ Nc,
871
+ (5.29)
872
+ at which the bifurcation occurs according to the previous discussion. In the vicinity of the bifurca-
873
+ tion point, the amplitude equation (5.23) reduces to
874
+ Dpacrqy2pZq “ ω1pacr, λcrqpa8 ´ acrqypZq ` γpacr, λcrqypZq2,
875
+ (5.30)
876
+ where the prime on ω denotes d{da8 “ B{Ba8 ` pB{Bλ8qpdλ8{da8q. The above equation admits
877
+ a localized solution of the form
878
+ ypZq “ ´3ω1pacr, λcrq
879
+ 2γpacr, λcrq pa8 ´ acrq sech2 ´1
880
+ 2
881
+ d
882
+ ω1pacr, λcrq
883
+ Dpacrq
884
+ pa8 ´ acrqZ
885
+ ¯
886
+ .
887
+ (5.31)
888
+ On the other hand, the weakly nonlinear amplitude equation derived from the 3d theory (Ye
889
+ et al., 2020) takes the form
890
+ c2
891
+ 1pZq “ λ2
892
+ crk1pa8 ´ acrqc1pZq ` λ2
893
+ crk2c1pZq2,
894
+ (5.32)
895
+ where c1pZq and ypZq are related by
896
+ ypZq “ kc1pZq
897
+ (5.33)
898
+ with k “ ´2λpaq{λ1paq|a“acr, and k1 and k2 are constants available in Ye et al. (2020). One can
899
+ see that (5.30) and (5.32) are identical provided
900
+ k1 “ ω1pacr, λcrq
901
+ λ2crDpacrq ,
902
+ k2 “ kγpacr, λcrq
903
+ λ2crDpacrq .
904
+ (5.34)
905
+ We have verified numerically that this is indeed the case, but the current expressions on the right
906
+ hand sides of (5.34) are more compact and revealing.
907
+ 15
908
+
909
+ The case of fixed λ8 can be handled similarly. Let pacr, λcrq be the solution to the system of
910
+ equations
911
+ ωpa8, λ8q “ 0,
912
+ λ8 “ λc,
913
+ (5.35)
914
+ where λc is a given constant.
915
+ In the vicinity of the bifurcation point, the amplitude equation
916
+ parallel to (5.30) is of the form
917
+ Dpacrqy2pZq “ ω1pacr, λcrqpa8 ´ acrqypZq ` γpacr, λcrqypZq2.
918
+ (5.36)
919
+ where the prime on ω now signifies B{Ba8. Similar to the previous case, one can verify that the
920
+ above amplitude equation is the same as its counterparts in Ye et al. (2020).
921
+ 6. Comparison with Abaqus simulations
922
+ In this section, we demonstrate the power of the 1d model by applying it to investigate localized
923
+ bulging in an inflated tube of finite wall thickness in the fully nonlinear regime. Previous studies on
924
+ this problem usually treat the tube as a finite length tube, but the problem can be analyzed more
925
+ easily and very accurately by assuming the tube to be of infinite length. This assumption only fails
926
+ when the tube is very short and when bulging is no longer localized in the axial direction (Wang
927
+ & Fu, 2021). The reason is that bulging solutions decay exponentially towards the two ends. Thus
928
+ in the following analysis, we shall assume that the tube is effectively infinite and focus on solutions
929
+ subject to decaying boundary conditions. This assumption is validated by comparison with Abaqus
930
+ simulations based on tubes of finite lengths. We shall consider the two loading scenarios discussed
931
+ in Subsection 5.3 and compare the predictions of the 1d model with Abaqus simulations, which
932
+ allows us to quantify the accuracy of our 1d model and determine its range of validity.
933
+ In all numerical calculations and Abaqus simulations, we use the Gent material model
934
+ W “ ´µ
935
+ 2 Jm ln
936
+ ´
937
+ 1 ´ λ2
938
+ 1 ` λ2
939
+ 2 ` λ2
940
+ 3 ´ 3
941
+ Jm
942
+ ¯
943
+ ,
944
+ (6.1)
945
+ where µ is the shear modulus and Jm is a material constant. We take µ “ 1 which is equivalent
946
+ to scaling all stress variables by µ and Jm “ 97.2 which is typical for rubber. The geometry of the
947
+ tube is taken to be H{Rm “ 0.4 and 2L{Rm “ 40, where Rm “ pA ` Bq{2 is the average radius.
948
+ In the Abaqus simulations, to ensure that localized bulging occurs in the middle of the tube, a
949
+ small section with length 0.1L around the middle point of the tube is weakened by taking its shear
950
+ modulus to be 0.9999 times that of the rest of the tube.
951
+ The 1d differential equation (4.20) subject to appropriate end conditions (see (6.7) later) can
952
+ be solved numerically with the aid of the symbolic computation software Mathematica. Although
953
+ the gradient modulus Dpaq involves an integral that cannot be evaluated analytically, this integral
954
+ can be defined numerically in Mathematica with the built-in command ?NumericQ and can be
955
+ manipulated as elementary functions. Numerically solving the 1d equation is significantly faster
956
+ than Abaqus simulations. The 1d equation can typically be solved in a few seconds on a personal
957
+ computer.
958
+ 16
959
+
960
+ 6.1. The case of fixed axial force
961
+ We first consider the loading scenario whereby the resultant axial force N is fixed. As mentioned
962
+ earlier, we assume that the tube is infinitely long and focus on the solution that satisfies the decaying
963
+ boundary condition
964
+ lim
965
+ ZÑ8 apZq “ a8.
966
+ (6.2)
967
+ A linear analysis shows that the solution to (4.23) satisfying (6.2) decays exponentially as Z Ñ 8.
968
+ Thus we have limZÑ8 a1pZq “ 0 automatically. We assume that the bulging solution is symmetric
969
+ with respect to Z “ 0 so that a1p0q “ 0. We write λ8 “ λpa8q, a0 “ ap0q and λ0 “ λpap0qq. Since
970
+ pa8, λ8q satisfy the equations (3.6) and (3.8), we have
971
+ Mpa8, λ8q ´ 1
972
+ 2a2
973
+ 8Qpa8, λ8q ´
974
+ N
975
+ 2πA2 “ 0,
976
+ (6.3)
977
+ Qpa8, λ8q ´ P “ 0.
978
+ (6.4)
979
+ From the definition of λ0 and the conservation law (4.24), we see that pa0, λ0q satisfies
980
+ Mpa0, λ0q ´ 1
981
+ 2a2
982
+ 0Qpa8, λ8q “ Mpa8, λ8q ´ 1
983
+ 2a2
984
+ 8Qpa8, λ8q,
985
+ (6.5)
986
+ Gpa0, λ0q “ Gpa8, λ8q.
987
+ (6.6)
988
+ Either a8 or P can be taken to be the load parameter. When a8 is specified, one can first obtain
989
+ λ8 from (6.3). The associated P is computed according to (6.4). Then by solving Eqs. (6.6) and
990
+ (6.5), one obtains the “initial” values a0 and λ0. The localized solution can be found by solving
991
+ the initial value problem
992
+ A2aλpaqpQpa, λpaqq ´ Pq ´ 1
993
+ 2D1paqa1pZq2 ´ Dpaqa2pZq “ 0,
994
+ (6.7)
995
+ ap0q “ a0,
996
+ a1p0q “ 0.
997
+ (6.8)
998
+ As a first example, fixing the axial force N to be zero, we find from the bifurcation condition (5.29)
999
+ that localized bulging takes place at a8 “ acr “ 1.86 with a critical pressure Pcr “ 0.308. As we
1000
+ trace the bifurcation solution away from the bifurcation point, the pressure drops while the bulge
1001
+ grows until it has almost reached a maximum amplitude after which the bulge will propagate at a
1002
+ constant pressure. From Maxwell’s equal-areal rule, the propagation pressure is PM “ 0.197.
1003
+ Fig. 2 shows the dependence of the pressure on ap0q and the bulging amplitude on a8 based on
1004
+ Abaqus simulations and use of the 1d model. The bulging solutions given by Abaqus simulations
1005
+ and the 1d model at the four states marked in Fig. 2(a) are shown in Fig. 3. It is seen that the 1d
1006
+ solution agrees well with Abaqus simulations in the entire post-bifurcation regime. Remarkably,
1007
+ the 1d solution remains highly accurate even in the final propagation stage, as shown in Fig. 3(d).
1008
+ Note also that the Abaqus simulations and 1d calculations are conducted for 2L “ 40Rm and 8,
1009
+ respectively. This verifies our earlier claim that the tube can effectively be viewed to be infinitely
1010
+ long.
1011
+ 17
1012
+
1013
+
1014
+
1015
+
1016
+
1017
+
1018
+
1019
+
1020
+
1021
+
1022
+
1023
+
1024
+
1025
+
1026
+
1027
+
1028
+
1029
+
1030
+ ● ● ● ●
1031
+
1032
+
1033
+
1034
+ ● ● ●
1035
+
1036
+
1037
+
1038
+
1039
+ ● ●
1040
+
1041
+
1042
+
1043
+ 1d model
1044
+ Abaqus simulation
1045
+ 1
1046
+ 2
1047
+ 3
1048
+ 4
1049
+ 5
1050
+ 6
1051
+ 7 a(0)
1052
+ 0.00
1053
+ 0.05
1054
+ 0.10
1055
+ 0.15
1056
+ 0.20
1057
+ 0.25
1058
+ 0.30
1059
+ P
1060
+ a
1061
+ b
1062
+ c
1063
+ d
1064
+ (a)
1065
+
1066
+
1067
+
1068
+
1069
+
1070
+
1071
+
1072
+
1073
+
1074
+
1075
+
1076
+
1077
+
1078
+
1079
+
1080
+
1081
+
1082
+
1083
+
1084
+
1085
+
1086
+
1087
+
1088
+
1089
+
1090
+
1091
+ 1d model
1092
+ Abaqus simulation
1093
+ 1.2
1094
+ 1.3
1095
+ 1.4
1096
+ 1.5
1097
+ 1.6
1098
+ 1.7
1099
+ 1.8
1100
+ 1.9a∞
1101
+ 0
1102
+ 1
1103
+ 2
1104
+ 3
1105
+ 4
1106
+ 5
1107
+ 6
1108
+ a(0) - a∞
1109
+ (b)
1110
+ Figure 2: Dependence of (a) pressure on ap0q and (b) bulging amplitude on a8 based on Abaqus simulations and the
1111
+ 1d model for fixed N “ 0.
1112
+ Abaqus simulation
1113
+ 1d model
1114
+ 0
1115
+ 2
1116
+ 4
1117
+ 6
1118
+ 8 Z
1119
+ 1.6
1120
+ 1.7
1121
+ 1.8
1122
+ 1.9
1123
+ 2.0
1124
+ 2.1
1125
+ 2.2
1126
+ 2.3
1127
+ 2.4
1128
+ a(Z)
1129
+ (a)
1130
+ Abaqus simulation
1131
+ 1d model
1132
+ 0
1133
+ 2
1134
+ 4
1135
+ 6
1136
+ 8 Z
1137
+ 1.5
1138
+ 2.0
1139
+ 2.5
1140
+ 3.0
1141
+ 3.5
1142
+ a(Z)
1143
+ (b)
1144
+ Abaqus simulation
1145
+ 1d model
1146
+ 0
1147
+ 2
1148
+ 4
1149
+ 6
1150
+ 8 Z
1151
+ 1.5
1152
+ 2.0
1153
+ 2.5
1154
+ 3.0
1155
+ 3.5
1156
+ 4.0
1157
+ 4.5
1158
+ a(Z)
1159
+ (c)
1160
+ Abaqus simulation
1161
+ 1d model
1162
+ 0
1163
+ 2
1164
+ 4
1165
+ 6
1166
+ 8 Z
1167
+ 1
1168
+ 2
1169
+ 3
1170
+ 4
1171
+ 5
1172
+ 6
1173
+ a(Z)
1174
+ (d)
1175
+ Figure 3: Bulging solutions given by Abaqus simulations and the 1d model at the four states marked in Fig. 2(a) for
1176
+ fixed N “ 0: (a) P “ 0.3, (b) P “ 0.25, (c) P “ 0.22, (d) P “ 0.197.
1177
+ 18
1178
+
1179
+ 6.2. The case of fixed ends
1180
+ Next, we consider the loading scenario whereby the tube is first stretched to a specified length
1181
+ 2ℓ and then its two ends are fixed to prevent further axial displacement (whether the radial dis-
1182
+ placement is restricted or not at the ends is immaterial since the tube is assumed to be sufficiently
1183
+ long). In the previous subsection, we have solved the problem for a specified axial force N or
1184
+ equivalently a specified λ8. For the current problem with a given ℓ, we define λc “ ℓ{L and we
1185
+ need to find λ8 such that the following condition is satisfied:
1186
+ ż L
1187
+ 0
1188
+ λpapZqq dZ “ λcL.
1189
+ (6.9)
1190
+ This can be achieved by a shooting procedure: for each N, we compute the left-hand side using
1191
+ the procedure outlined in the previous subsection and adjust N such that the left-hand side and
1192
+ the right-hand side are equal. The procedure may be started by taking λ8 “ λc. However, solving
1193
+ the present problem by the shooting procedure requires a lot of adjustments by hand due to the
1194
+ fact that the bulging solution may start to grow after decaying for a range of Z values. To find
1195
+ solutions for the current case in a more robust way, we use the finite difference method instead.
1196
+ To implement the finite difference method, we partition the domain r0, Ls using a uniform mesh
1197
+ Z0, Z1, . . . , Zn with mesh size h “ L{n and coordinate of the j-th grid point given by Zj “ jh. We
1198
+ use aj to represent the numerical approximation of apZjq. Applying the central difference scheme,
1199
+ we discretize the differential equation (6.7) as
1200
+ A2ajλpajqpQpaj, λpajqq ´ Pq ´ 1
1201
+ 2D1pajq
1202
+ ´aj`1 ´ aj´1
1203
+ 2h
1204
+ ¯2
1205
+ ´ Dpajqaj`1 ´ 2aj ` aj´1
1206
+ h2
1207
+ “ 0,
1208
+ j “ 1, 2, . . . , n ´ 1.
1209
+ (6.10)
1210
+ The left boundary condition is given by
1211
+ a1p0q “ 0.
1212
+ (6.11)
1213
+ We see from (5.23) that the solution to (6.7) subject to (6.2) has the asymptotic behavior
1214
+ apZq „ a8 ` a1e´κZ
1215
+ as Z Ñ 8,
1216
+ (6.12)
1217
+ where a1 is a constant and
1218
+ κ “
1219
+ d
1220
+ ωpa8, λ8q
1221
+ Dpa8q
1222
+ .
1223
+ Because of this, we may replace the decaying condition boundary (6.2) by the “soft” asymptotic
1224
+ condition
1225
+ a1pLq ` κpapLq ´ a8q “ 0.
1226
+ (6.13)
1227
+ 19
1228
+
1229
+ To avoid the loss of accuracy at the two endpoints, we introduce two additional unknowns a´1 and
1230
+ an`1. Then the left and right boundary conditions yield
1231
+ a1 ´ a´1
1232
+ 2h
1233
+ “ 0,
1234
+ (6.14)
1235
+ an`1 ´ an´1
1236
+ 2h
1237
+ ` κpan ´ a8q “ 0.
1238
+ (6.15)
1239
+ Solving for a´1 and an`1 from the above equations, and substituting them into the difference
1240
+ equations (6.10) at j “ 0 and j “ n, we obtain the discrete boundary conditions with truncation
1241
+ errors of order h2:
1242
+ A2a0λpajqpQpa0, λpa0qq ´ Pq ´ 2Dpa0qa1 ´ a0
1243
+ h2
1244
+ “ 0,
1245
+ (6.16)
1246
+ A2anλpanqpQpan, λpanqq ´ Pq ´ 1
1247
+ 2D1pajqκ2pan ´ a8q2
1248
+ ´ 2Dpanqan´1 ´ an ´ hκpan ´ a8q
1249
+ h2
1250
+ “ 0.
1251
+ (6.17)
1252
+ Finally, the fixed-length restriction (6.9) gives
1253
+ 1
1254
+ 2λpa0q `
1255
+ n´1
1256
+ ÿ
1257
+ j“1
1258
+ λpajq ` 1
1259
+ 2λpanq ´ λcL
1260
+ h
1261
+ “ 0.
1262
+ (6.18)
1263
+ We use the pressure P as the loading parameter. When P is given, one can first solve (6.4) to
1264
+ express a8 as a function of λ8. Then N can be viewed as a function of λ8 due to (6.3). It follows
1265
+ that λpµq and Dpµq also depend on λ8 through their dependence on N. This implicit dependence
1266
+ should be considered when solving the above algebraic equations.
1267
+ Setting n to be a sufficiently large number, say n “ 100, and solving the system of nonlinear
1268
+ algebraic equations consisting of (6.10), (6.16), (6.17) and (6.18) for aj’s and λ8 with a suitable
1269
+ initial guess, we obtain the finite-difference solution for the present problem.
1270
+ We may use the
1271
+ weakly nonlinear solution with fixed λ8 “ λc “ ℓ{L as an initial guess in the near-critical regime
1272
+ and continue the solution to the fully nonlinear regime by always using the solution at the previous
1273
+ step as the initial guess for the current step.
1274
+ When the total length is fixed to be ℓ “ 2L, then initially λ8 “ 2 and localized bulging takes
1275
+ place at a8 “ acr “ 1.74 with a critical pressure Pcr “ 0.198 according to (5.35). In Fig. 4, we have
1276
+ shown the dependence of the pressure on ap0q and the bulging amplitude on a8 based on Abaqus
1277
+ simulations and use of the 1d model. The bulging solutions determined by Abaqus simulations
1278
+ and the 1d model at the four states indicated in Fig. 4(a) are presented in Fig. 5. It is observed
1279
+ that the agreement between the 1d model and Abaqus simulations is again excellent in the fully
1280
+ nonlinear regime.
1281
+ Finally, Fig. 6 shows the actual variation of P against ap0q predicted by the 1d model when L
1282
+ is varied and the averaged stretch λc is fixed or λc is varied but L is fixed. These results confirm
1283
+ the theoretical prediction of Guo et al. (2022) that the right branches of these curves all converge
1284
+ 20
1285
+
1286
+
1287
+
1288
+
1289
+
1290
+
1291
+
1292
+
1293
+
1294
+
1295
+
1296
+
1297
+
1298
+
1299
+
1300
+
1301
+ ● ● ●
1302
+
1303
+
1304
+ ● ●
1305
+
1306
+
1307
+ ● ● ●
1308
+ ● ● ●
1309
+
1310
+ ● ●
1311
+
1312
+
1313
+
1314
+ 1d model
1315
+ Abaqus simulation
1316
+ 0
1317
+ 1
1318
+ 2
1319
+ 3
1320
+ 4
1321
+ 5
1322
+ 6
1323
+ 7
1324
+ a(0)
1325
+ 0.00
1326
+ 0.05
1327
+ 0.10
1328
+ 0.15
1329
+ 0.20
1330
+ P
1331
+ a
1332
+ b
1333
+ c
1334
+ d
1335
+ (a)
1336
+
1337
+
1338
+
1339
+
1340
+
1341
+
1342
+
1343
+
1344
+
1345
+
1346
+
1347
+
1348
+
1349
+
1350
+
1351
+
1352
+
1353
+
1354
+
1355
+
1356
+
1357
+
1358
+
1359
+
1360
+
1361
+
1362
+
1363
+ 1d model
1364
+ Abaqus simulation
1365
+ 1.1
1366
+ 1.2
1367
+ 1.3
1368
+ 1.4
1369
+ 1.5
1370
+ 1.6
1371
+ 1.7
1372
+ 1.8a∞
1373
+ 1
1374
+ 2
1375
+ 3
1376
+ 4
1377
+ 5
1378
+ 6
1379
+ a(0) - a∞
1380
+ (b)
1381
+ Figure 4: Dependence of (a) pressure on ap0q and (b) bulging amplitude on a8 based on Abaqus simulations and
1382
+ using the 1d model for fixed length ℓ{L “ 2.
1383
+ Abaqus simulation
1384
+ 1d model
1385
+ 0
1386
+ 2
1387
+ 4
1388
+ 6
1389
+ 8
1390
+ 10
1391
+ 12Z
1392
+ 1.2
1393
+ 1.4
1394
+ 1.6
1395
+ 1.8
1396
+ 2.0
1397
+ 2.2
1398
+ 2.4
1399
+ 2.6
1400
+ 2.8
1401
+ a(Z)
1402
+ (a)
1403
+ Abaqus simulation
1404
+ 1d model
1405
+ 0
1406
+ 2
1407
+ 4
1408
+ 6
1409
+ 8
1410
+ 10
1411
+ 12Z
1412
+ 1.0
1413
+ 1.5
1414
+ 2.0
1415
+ 2.5
1416
+ 3.0
1417
+ 3.5
1418
+ a(Z)
1419
+ (b)
1420
+ Abaqus simulation
1421
+ 1d model
1422
+ 0
1423
+ 2
1424
+ 4
1425
+ 6
1426
+ 8
1427
+ 10
1428
+ 12Z
1429
+ 1
1430
+ 2
1431
+ 3
1432
+ 4
1433
+ 5
1434
+ a(Z)
1435
+ (c)
1436
+ Abaqus simulation
1437
+ 1d model
1438
+ 0
1439
+ 2
1440
+ 4
1441
+ 6
1442
+ 8
1443
+ 10
1444
+ 12Z
1445
+ 1
1446
+ 2
1447
+ 3
1448
+ 4
1449
+ 5
1450
+ 6
1451
+ 7
1452
+ a(Z)
1453
+ (d)
1454
+ Figure 5: Bulging solutions based on Abaqus simulations and the 1d model the at the four states indicated in Fig.
1455
+ 4(a) for fixed length ℓ{L “ 2: (a) P “ 0.19, (b) P “ 0.18, (c) P “ 0.173, (d) P “ 0.198.
1456
+ to a master curve that is independent of L or λc. These curves all terminate at the point where
1457
+ the axial stress near each end of the tube has become compressive enough so that secondary Euler
1458
+ buckling or axisymmetric wrinkling becomes possible.
1459
+ 21
1460
+
1461
+ L=15
1462
+ L=20
1463
+ L=40
1464
+ 0
1465
+ 1
1466
+ 2
1467
+ 3
1468
+ 4
1469
+ 5
1470
+ 6
1471
+ 7
1472
+ a(0)
1473
+ 0.12
1474
+ 0.14
1475
+ 0.16
1476
+ 0.18
1477
+ 0.20
1478
+ 0.22
1479
+ P
1480
+ (a)
1481
+ λc=1.5
1482
+ λc=2
1483
+ λc=2.8
1484
+ 0
1485
+ 1
1486
+ 2
1487
+ 3
1488
+ 4
1489
+ 5
1490
+ 6
1491
+ 7
1492
+ a(0)
1493
+ 0.00
1494
+ 0.05
1495
+ 0.10
1496
+ 0.15
1497
+ 0.20
1498
+ 0.25
1499
+ P
1500
+ (b)
1501
+ Figure 6: Variation of P against ap0q predicted by the 1d model when (a) the total length is fixed with λc “ 2 and
1502
+ L “ 15, 20 and 40, respectively and (b) L is fixed at 20 and λc “ 1.5, 2 and 2.8, respectively.
1503
+ 7. Conclusion
1504
+ We have derived a 1d model for the analysis of axisymmetric deformations of an inflated cylin-
1505
+ drical tube of finite wall thickness, and established its range of validity by comparing its predictions
1506
+ with those of Abaqus simulations for two typical loading scenarios. The comparison shows that
1507
+ the 1d model performs extremely well in both the near-critical and fully nonlinear regimes. The
1508
+ dimension reduction started from three-dimensional finite elasticity theory and is performed in
1509
+ terms of the energy functional and principal stretches. A key ingredient of the dimension reduc-
1510
+ tion is the assumption of slow variation of the leading-order solution in the axial direction without
1511
+ any restriction on its amplitude, which results in a 1d model that is simple but is still capable of
1512
+ capturing the strain-gradient effect. This is in contrast with the traditional asymptotic analysis
1513
+ where the leading order solution is assumed to be a small-amplitude perturbation from the primary
1514
+ deformation. It is because of this difference that the 1d model has a much larger range of validity
1515
+ than the expansion methods around the bifurcation point. The nonlinearity of the strain is kept
1516
+ in the 1d model, reflected by the nonlinear potential Gpa, λpaqq and the nonlinear strain gradient
1517
+ modulus Dpaq. Our expression for the strain gradient coefficient Dpaq is quite simple. For the
1518
+ Gent material model, Dpaq can be calculated by integrating once. We remark that although the
1519
+ derivation presented in this work is variational, the 1d model can also be derived by substituting
1520
+ the asymptotic solution (4.2) into the 3d governing equations and solving the resulting equations
1521
+ at successive orders.
1522
+ The 1d model is amenable to asymptotic and numerical solutions. The bifurcation condition and
1523
+ the weakly nonlinear amplitude equation predicted by the model are exact. In fact, the expressions
1524
+ (5.24) and (5.25) derived using the 1d model are more compact and more revealing than their
1525
+ counterparts in Ye et al. (2020). A major advantage of the 1d model is that the entire evolution
1526
+ process of bulging or necking can be determined using the finite difference method which is more
1527
+ accessible and much easier to implement than commercial packages such as Abaqus. This advantage
1528
+ 22
1529
+
1530
+ would become even more significant when other fields such as electric loading and residual stresses
1531
+ were also present. Such extra fields and new geometries (e.g. axisymmetric necking of a stretched
1532
+ plate (Wang et al., 2022) ) will be considered in our future studies.
1533
+ A Mathematica code that produces all the results presented in the paper is available on GitHub
1534
+ (https://github.com/yfukeele).
1535
+ Acknowledgments
1536
+ This work was supported by the National Natural Science Foundation of China (Grant No
1537
+ 12072224) and the Engineering and Physical Sciences Research Council, UK (Grant No EP/W007150/1).
1538
+ Appendix A. Simplifying the one-dimensional energy functional
1539
+ Substituting (4.19) into (4.11), we can write the integral of KpR, v, vRq as
1540
+ ż B
1541
+ A
1542
+ KpR, v, vRq dR “ pI1 ` I2 ` I3qa12,
1543
+ (A.1)
1544
+ where
1545
+ I1 “
1546
+ ż B
1547
+ A
1548
+ pλ´1¯σ22qaR
1549
+ ż B
1550
+ R
1551
+ cpa, Tq dT dR,
1552
+ (A.2)
1553
+ I2 “ 1
1554
+ 2
1555
+ ż B
1556
+ A
1557
+ Rζp¯r2
1558
+ a ` cpa, Rq2q dR,
1559
+ (A.3)
1560
+ I3 “
1561
+ ż B
1562
+ A
1563
+ Rξ¯racpa, Rq dR.
1564
+ (A.4)
1565
+ By interchanging the order of integration, we can rewrite I1 as
1566
+ I1 “
1567
+ ż B
1568
+ A
1569
+ ż B
1570
+ R
1571
+ pλ´1¯σ22qaRcpa, Tq dT dR
1572
+
1573
+ ż B
1574
+ A
1575
+ ż T
1576
+ A
1577
+ pλ´1¯σ22qaRcpa, Tq dR dT
1578
+
1579
+ ż B
1580
+ A
1581
+ cpa, Tq B
1582
+ Ba
1583
+ ´ ż T
1584
+ A
1585
+ λ´1¯σ22R dR
1586
+ ¯
1587
+ dT.
1588
+ (A.5)
1589
+ From (3.14), we have
1590
+ ż T
1591
+ A
1592
+ λ´1¯σ22R dR “ A2mpa, Aq ´ T 2mpa, Tq.
1593
+ (A.6)
1594
+ Inserting (A.6) into (A.5) and noting (3.15)2 and (3.11), we can simplify I1 as
1595
+ I1 “ PA2a
1596
+ ż B
1597
+ A
1598
+ cpa, Rq dR ´
1599
+ ż B
1600
+ A
1601
+ cpa, RqR2 B
1602
+ Bampa, Rq dR.
1603
+ (A.7)
1604
+ 23
1605
+
1606
+ Noting that ξ “ q¯λ1 ` ¯λ3ζ{λ, the integral I3 can be calculated as
1607
+ I3 “
1608
+ ż B
1609
+ A
1610
+ R
1611
+ ´
1612
+ q¯λ1 `
1613
+ ¯λ3
1614
+ λ ζ
1615
+ ¯
1616
+ ¯racpa, Rq dR “
1617
+ ż B
1618
+ A
1619
+ ´
1620
+ ¯r¯raq ` Rζ ¯ra
1621
+ ¯λ1λ2
1622
+ ¯
1623
+ cpa, Rq dR.
1624
+ (A.8)
1625
+ Adding up the three integrals, we obtain
1626
+ ż B
1627
+ A
1628
+ KpR, v, vRq dR ` PA2aa1v|R“A “pI1 ` I2 ` I3qa12 ´ PA2aa12
1629
+ ż B
1630
+ A
1631
+ cpa, Rq dR
1632
+ “a12
1633
+ ż B
1634
+ A
1635
+ ´
1636
+ ´ cpa, RqR2 B
1637
+ Bampa, Rq ` 1
1638
+ 2Rζp¯r2
1639
+ a ` cpa, Rq2q
1640
+ `
1641
+ ´
1642
+ ¯r¯raqpa, Rq ` Rζ ¯ra
1643
+ λ1λ2
1644
+ ¯
1645
+ cpa, Rq
1646
+ ¯
1647
+ dR
1648
+ “a12
1649
+ ż B
1650
+ A
1651
+ p1
1652
+ 2Rζp¯r2
1653
+ a ` cpa, Rq2q ´ Rζcpa, Rq2q dR
1654
+ “1
1655
+ 2a12
1656
+ ż B
1657
+ A
1658
+ Rζp¯r2
1659
+ a ´ cpa, Rq2q dR.
1660
+ (A.9)
1661
+ This gives the expression of the coefficient Dpaq announced in (4.21). The expression of Cpaq in
1662
+ (4.22) follows by a straightforward substitution.
1663
+ References
1664
+ Alhayani, A. A., Rodr´ıguez, J., & Merodio, J. (2014). Competition between radial expansion and
1665
+ axial propagation in bulging of inflated cylinders with application to aneurysms propagation in
1666
+ arterial wall tissue. Int. J. Eng. Sci., 85, 74–89.
1667
+ Althobaiti, A. (2022). Effect of torsion on the initiation of localized bulging in a hyperelastic tube
1668
+ of arbitrary thickness. Z. fur Angew. Math. Phys., 73, 1–11.
1669
+ Audoly, B., & Hutchinson, J. W. (2016). Analysis of necking based on a one-dimensional model.
1670
+ J. Mech. Phys. Solids, 97, 68–91.
1671
+ Audoly, B., & Neukirch, S. (2021). A one-dimensional model for elastic ribbons: a little stretching
1672
+ makes a big difference. J. Mech. Phys. Solids, 153, 104457.
1673
+ Bucchi, A., & Hearn, G. E. (2013). Delay or removal of aneurysm formation in the anaconda wave
1674
+ energy extraction device. Renewable Energy, 55, 104–119.
1675
+ Chater, E., & Hutchinson, J. W. (1984). On the propagation of bulges and buckles. ASME J.
1676
+ Appl. Mech., 51, 269–277.
1677
+ Demirkoparan, H., & Merodio, J. (2017). Bulging bifurcation of inflated circular cylinders of doubly
1678
+ fiber-reinforced hyperelastic material under axial loading and swelling. Math. Mech. Solids, 22,
1679
+ 666–682.
1680
+ 24
1681
+
1682
+ Emery, D. (2023). Elasto-capillary necking, bulging and maxwell states in soft compressible cylin-
1683
+ ders. Int. J. Non-linear Mech., 148, 104276.
1684
+ Emery, D., & Fu, Y. B. (2021a). Localised bifurcation in soft cylindrical tubes under axial stretching
1685
+ and surface tension. Int. J. Solids Struct., 219-220, 23–33.
1686
+ Emery, D., & Fu, Y. B. (2021b). Localized bifurcation in soft cylindrical tubes under axial stretching
1687
+ and surface tension. Int. J. Solids Struct., 219, 23–33.
1688
+ Emery, D., & Fu, Y. B. (2021c). Post-bifurcation behaviour of elasto-capillary necking and bulging
1689
+ in soft tubes. Proc. R. Soc. A, 477, 20210311.
1690
+ Fu, Y. B., & Il’ichev, A. T. (2015). Localized standing waves in a hyperelastic membrane tube and
1691
+ their stabilization by a mean flow. Maths Mech. Solids, 20, 1198–1214.
1692
+ Fu, Y. B., Jin, L. S., & Goriely, A. (2021). Necking, beading, and bulging in soft elastic cylinders.
1693
+ J. Mech. Phys. Solids, 147, 104250.
1694
+ Fu, Y. B., Liu, J. L., & Francisco, G. S. (2016). Localized bulging in an inflated cylindrical tube
1695
+ of arbitrary thickness–the effect of bending stiffness. J. Mech. Phys. Solids, 90, 45–60.
1696
+ Fu, Y. B., Pearce, S. P., & Liu, K.-K. (2008). Post-bifurcation analysis of a thin-walled hyperelastic
1697
+ tube under inflation. Int. J. Non-Linear Mech., 43, 697–706.
1698
+ Fu, Y. B., Rogerson, G. A., & Zhang, Y. T. (2012).
1699
+ Initiation of aneurysms as a mechanical
1700
+ bifurcation phenomenon. Int. J. Non-linear Mech., 47, 179–184.
1701
+ Fu, Y. B., & Xie, Y. X. (2010). Stability of localized bulging in inflated membrane tubes under
1702
+ volume control. Int. J. Eng. Sci., 48, 1242–1252.
1703
+ Goncalves, P. B., Pamplona, D. C., & Lopes, S. R. X. (2008). Finite deformations of an initially
1704
+ stressed cylindrical shell under internal pressure. Int. J. Mech. Sci., 50, 92–103.
1705
+ Green, A. E., & Adkins, J. E. (1960).
1706
+ Large Elastic Deformations and Non-linear Continuum
1707
+ Mechanics. Clarendon Press, Oxford.
1708
+ Guo, Z. M., Wang, S. B., & Fu, Y. B. (2022). Localised bulging of an inflated rubber tube with
1709
+ fixed ends. Proc. R. Soc. A, 380, 20210318.
1710
+ Haughton, D. M., & Ogden, R. W. (1979).
1711
+ Bifurcation of inflated circular cylinders of elastic
1712
+ material under axial loading ii. exact theory for thick-walled tubes. J. Mech. Phy. Solids, 27,
1713
+ 489–512.
1714
+ Hejazi, M., Hsiang, Y., & Srikantha Phani, A. (2021). Fate of a bulge in an inflated hyperelastic
1715
+ tube: theory and experiment. Proc. Roy. Soc. A, 477, 20200837.
1716
+ 25
1717
+
1718
+ Knowles, J. K., & Sternberg, E. (1976). On the failure of ellipticity of the equations for finite
1719
+ elastostatic plane strain. Arch. Ratl Mech. Anal., 63, 321–336.
1720
+ Kumar, A., Audoly, B., & Lestringant, C. (2022). Asymptotic derivation of a higher-order one-
1721
+ dimensional model for tape springs. hal-03765944, .
1722
+ Kyriakides, S., & Chang, Y.-C. (1990). On the inflation of a long elastic tube in the presence of
1723
+ axial load. Int. J. Solids Struct., 26, 975–991.
1724
+ Kyriakides, S., & Chang, Y.-C. (1991). The initiation and propagation of a localized instability in
1725
+ an inflated elastic tube. Int. J. Solids Struct., 27, 1085–1111.
1726
+ Lestringant, C., & Audoly, B. (2018). A diffuse interface model for the analysis of propagating
1727
+ bulges in cylindrical balloons. Proc. R. Soc. A, 474, 20180333.
1728
+ Lestringant, C., & Audoly, B. (2020a). Asymptotically exact strain-gradient models for nonlinear
1729
+ slender elastic structures: a systematic derivation method. J. Mech. Phys. Solids, 136, 103730.
1730
+ Lestringant, C., & Audoly, B. (2020b). A one-dimensional model for elasto-capillary necking. Proc.
1731
+ R. Soc. A, 476, 20200337.
1732
+ Lin, Z. H., Li, L. A., & Ye, Y. (2020). Numerical simulation of localized bulging in an inflated
1733
+ hyperelastic tube with fixed ends. Int. J. Appl. Mech., 12, 2050118.
1734
+ Liu, Y., Ye, Y., Althobaiti, A., & Xie, Y.-X. (2019). Prevention of localized bulging in an inflated
1735
+ bilayer tube. Int. J. Mech. Sci., 153, 359–368.
1736
+ Lu, T. Q., An, L., Li, J. G., Yuan, C., & Wang, T. J. (2015). Electro-mechanical coupling bifurcation
1737
+ and bulging propagation in a cylindrical dielectric elastomer tube. J. Mech. Phy. Solids, 85, 160–
1738
+ 175.
1739
+ Lu, T. Q., Ma, C., & Wang, T. J. (2020). Mechanics of dielectric elastomer structures: A review.
1740
+ Extr. Mech. Lett., 38, 100752.
1741
+ Lu, T. Q., & Suo, Z. G. (2012). Large conversion of energy in dielectric elastomers by electrome-
1742
+ chanical phase transition. Acta Mech. Sin., 28, 1106–1114.
1743
+ Ma, G. Y., Huang, X. Q., Liu, J. J., Li, T. F., Qu, S. X., & Yang, W. (2015). Dielectric elastomer
1744
+ peristaltic pump module with finite deformation. Smart Mat. Struct., 24, 075026.
1745
+ M¨uller, B., Lang, S., Dominietto, M., Rudin, M., Schulz, G., Deyhle, H., Germann, M., Pfeiffer,
1746
+ F., David, C., & Weitkamp, T. (2008). High-resolution tomographic imaging of microvessels. In
1747
+ Developments in X-ray Tomography VI (pp. 89–98). SPIE volume 7078.
1748
+ 26
1749
+
1750
+ Pamplona, D. C., Goncalves, P. B., & Lopes, S. R. X. (2006). Finite deformations of cylindrical
1751
+ membrane under internal pressure. Int. J. Mech. Sci., 48, 683–696.
1752
+ Pearce, S. P., & Fu, Y. B. (2010). Characterization and stability of localized bulging/necking in
1753
+ inflated membrane tubes. IMA J. Appl. Math., 75, 581–602.
1754
+ Pipkin, A. C. (1968). Integration of an equation in membranes theory. Z. Angew. Math. Phys., 19,
1755
+ 818–819.
1756
+ Smith, Q. R. (2016). Wave-structure interactions for the distensible tube wave energy converter.
1757
+ Proc. R. Soc. A, 472, 20160160.
1758
+ Varatharajan, N., & DasGupta, A. (2017).
1759
+ Study of bifurcation in a pressurized hyperelastic
1760
+ membrane tube enclosed by a soft substrate. Int. J. Non-linear Mech., 95, 233–241.
1761
+ Wang, J., Althobaiti, A., & Fu, Y. B. (2017). Localized bulging of rotating elastic cylinders and
1762
+ tubes. J. Mech. Mater. Struct., 12, 545–561.
1763
+ Wang, J., & Fu, Y. B. (2018). Effect of double-fibre reinforcement on localized bulging of an inflated
1764
+ cylindrical tube of arbitrary thickness. J. Eng. Math., 109, 21–30.
1765
+ Wang, M., & Fu, Y. B. (2021). Necking of a hyperelastic solid cylinder under axial stretching:
1766
+ Evaluation of the infinite-length approximation. Int. J. Eng. Sci., 159, 103432.
1767
+ Wang, M., Jin, L. S., & Fu, Y. B. (2022). Axi-symmetric necking versus treloar-kearsley instability
1768
+ in a hyperelastic sheet under equibiaxial stretching. Math. Mech. Solids, to appear.
1769
+ Wang, S. B., Guo, Z. M., Zhou, L., Li, L. A., & Fu, Y. B. (2019). An experimental study of localized
1770
+ bulging in inflated cylindrical tubes guided by newly emerged analytical results. J. Mech. Phys.
1771
+ Solids, 124, 536–554.
1772
+ Wolfram, S. (1991). Mathematica: A System for Doing Mathematics by Computer (2nd Edn).
1773
+ Addison-Wesley, California.
1774
+ Ye, Y., Liu, Y., Althobaiti, A., & Xie, Y.-X. (2019). Localized bulging in an inflated bilayer tube
1775
+ of arbitrary thickness: Effects of the stiffness ratio and constitutive model. Int. J. Solids Struct.,
1776
+ 176, 173–184.
1777
+ Ye, Y., Liu, Y., & Fu, Y. B. (2020). Weakly nonlinear analysis of localized bulging of an inflated
1778
+ hyperelastic tube of arbitrary wall thickness. J. Mech. Phys. Solids, 135, 103804.
1779
+ Yin, W.-L. (1977). Non-uniform inflation of a cylindrical elastic membrane and direct determination
1780
+ of the strain energy function. J. Elast., 7, 265–282.
1781
+ Yu, X., & Fu, Y. B. (2022). An analytic derivation of the bifurcation conditions for localization in
1782
+ hyperelastic tubes and sheets. Z. Angew. Math. Phys., 73, 1–16.
1783
+ 27
1784
+
5NE1T4oBgHgl3EQfBAIU/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
5dE3T4oBgHgl3EQfQgnL/content/2301.04414v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:681bfe8dd6075f791e2a70958be7343c1b514e7fc9ade013711bea6d0d1e30d8
3
+ size 3793444
5dE3T4oBgHgl3EQfQgnL/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:09696876e64c0f455959efc29e76beadbcbb457f80229f647f709a1b82150605
3
+ size 179314
5dE4T4oBgHgl3EQfbwyA/content/2301.05077v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:7407bf8904c45fc6a5473cfbb291c3b8f4af2a8037afbc7a549deec85b70005c
3
+ size 1348476
5dE4T4oBgHgl3EQfbwyA/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:393ece48fd74739eed728a412b4b2012d1c9861aaa90620451a8e4deaa6a48cd
3
+ size 5636141
5dE4T4oBgHgl3EQfbwyA/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:1d9248c5547385b81c5d4fc9d66fca10b2776d55393df36031bc3aaf376ed809
3
+ size 201599
5tFIT4oBgHgl3EQf8CtK/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:e83c273623c2d0f2acbda5628f65f5625a1176a006c8c4fd5d1fce952cc100f3
3
+ size 60751917
79E3T4oBgHgl3EQfRwk1/content/tmp_files/2301.04424v1.pdf.txt ADDED
@@ -0,0 +1,1399 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ RIEMANNIAN GEOMETRY AND MOLECULAR SIMILARITY II:
2
+ KÄHLER QUANTIZATION
3
+ A PREPRINT
4
+ Rachael Pirie
5
+ School of Natural and Environmental Sciences
6
+ Newcastle University
7
8
+ Stuart J. Hall
9
+ School of Mathematics, Statistics, and Physics
10
+ Newcastle University
11
12
+ Daniel J. Cole
13
+ School of Natural and Environmental Sciences
14
+ Newcastle University
15
16
+ Thomas Murphy
17
+ Department of Mathematics
18
+ California State University, Fullerton
19
20
+ January 12, 2023
21
+ ABSTRACT
22
+ Shape-similarity between molecules is a tool used by chemists for virtual screening, with the goal of
23
+ reducing the cost and duration of drug discovery campaigns. This paper reports an entirely novel
24
+ shape descriptor as an alternative to the previously described RGMolSA descriptors [1], derived from
25
+ the theory of Riemannian geometry and Kähler quantization (KQMolSA). The treatment of a molecule
26
+ as a series of intersecting spheres allows us to obtain the explicit Riemannian metric which captures
27
+ the geometry of the surface, which can in turn be used to calculate a Hermitian matrix M as a directly
28
+ comparable surface representation. The potential utility of this method is demonstrated using a series
29
+ of PDE5 inhibitors considered to have similar shape. The method shows promise in its capability to
30
+ handle different conformers, and compares well to existing shape similarity methods. The code and
31
+ data used to produce the results are available at: https://github.com/RPirie96/KQMolSA.
32
+ Keywords Riemannian Geometry · Kähler Quantization · Molecular Shape · Ligand-Based Virtual Screening
33
+ 1
34
+ Introduction and Summary of Part I
35
+ The concept that shared biological activity exists between similar molecules is used widely in drug discovery [2].
36
+ Molecules with known activity can be used as templates to screen large databases for other potential hits. This is
37
+ more efficient and allows coverage of a greater area of chemical space than is possible with experimental screening
38
+ alone [3]. Estimating similarity between molecules based on their 3D shape has gained popularity due to the
39
+ requirement for protein-drug shape complementarity to enable strong binding. However no fixed notion of shape
40
+ exists. Instead, comparison relies on mathematical approximation of the molecule’s shape based on its volume,
41
+ distribution of atomic distances or surface (most commonly treated as the van der Waals or solvent accessible surface) [4].
42
+ In the accompanying paper [1], the RGMolSA method was presented.
43
+ The descriptor developed there ap-
44
+ proximates the shape of the molecular surface using a simple nine-element vector containing the surface area and an
45
+ approximation to the first eight non-zero eigenvalues of the ordinary Laplacian. The descriptor can be viewed as an
46
+ approximation to the Riemannian metric, the underlying mathematical object that describes the shape of a surface.
47
+ In this paper we present an entirely different method of approximating the Riemannian metric by using ideas from
48
+ the theory of Kähler quantization; we call this method Kähler quantization for Molecular Surface Approximation
49
+ (KQMolSA). The theory was originally developed by mathematicians and string theorists in order to give explicit
50
+ representations of the shapes of 4-dimensional objects (Calabi–Yau manifolds) that appear in physical theories (see [5]
51
+ arXiv:2301.04424v1 [math.DG] 11 Jan 2023
52
+
53
+ Geometry and Molecular Surfaces
54
+ A PREPRINT
55
+ for the paper that pioneered its use as a numerical technique). In a nutshell, a function called the Kähler potential
56
+ is associated to the metric. We then compute something analogous to a Taylor expansion of this function with the
57
+ coefficients being stored in a Hermitian matrix. While the matrices themselves do depend upon the precise position and
58
+ parameterisation of the molecular surface in three-dimensional space R3, the dependence is easy to calculate. Hence we
59
+ can perform our calculations in the ‘quantized’ space of Hermitian matrices and assign a distance between the shapes of
60
+ two molecular surfaces this way. The final distance is independent of the position of the molecules and the choices
61
+ made in their parameterisations.
62
+ 1.1
63
+ Summary of Previous Work
64
+ As in the accompanying paper [1], our approach begins by treating the molecule as a series of intersecting spheres, with
65
+ their radii given by the van der Waals radii of the constituent atoms. The surface is assumed to have a genus of zero, so
66
+ any rings (e.g. benzene) are replaced with a single sphere of radius 2.25 Å to facilitate this. The molecular structure
67
+ is then defined by the number of spheres N (with each ring counted as a single sphere, and excluding any hydrogen
68
+ atoms), the centres ci and radii ri for each sphere and the adjacency matrix T describing intersection of spheres, where
69
+ Tij =
70
+
71
+ 1
72
+ if spheres i and j intersect
73
+ 0
74
+ otherwise (or i = j).
75
+ The surface area A of the molecule is calculated as the area of each sphere minus the “missing parts" where two spheres
76
+ intersect:
77
+ A = 2π
78
+
79
+ i
80
+
81
+ �2r2
82
+ i −
83
+
84
+ �ri
85
+
86
+ j
87
+ Tij|ri − λij|
88
+
89
+
90
+
91
+ � .
92
+ (1)
93
+ This value is used to re-scale each of the starting constructs such that the surface area of the molecule is equal to that of
94
+ a unit sphere (or 4π) to address the observation that Riemannian geometry treats two objects which differ only in size
95
+ as having equivalent shape. This re-scaling is accounted for in the final descriptors with some weighting so as not to
96
+ dominate the similarity calculation.
97
+ From the initial data, a map is constructed to ‘unwrap‘ the surface onto the complex plane C in a process
98
+ we refer to as piecewise stereographic projection. This requires an atom to be selected as a starting point from which to
99
+ construct our map, which we refer to as the base sphere. This is taken to be the atom closest to the centre of mass by
100
+ first finding the centroid of the molecule and then taking the atom with the smallest Euclidean distance from this point.
101
+ The Riemannian metric g = Φ∗
102
+ ps(gEuc) induced by the mapping Φps : C → S ⊂ R3 takes the form
103
+ g =
104
+
105
+
106
+
107
+
108
+
109
+
110
+
111
+
112
+
113
+
114
+
115
+
116
+
117
+
118
+
119
+
120
+
121
+
122
+
123
+
124
+
125
+
126
+
127
+ 4r2
128
+ B
129
+ (1+|z|2)2 (dx2 + dy2)
130
+ if z ∈ C
131
+ C1
132
+ (|z−A1|2+B1)2 (dx2 + dy2)
133
+ if z ∈ D(a1, R1),
134
+ C2
135
+ (|z−A2|2+B2)2 (dx2 + dy2)
136
+ if z ∈ D(a2, R2),
137
+ ...
138
+ ...
139
+ CN−1
140
+ (|z−AN−1|2+BN−1)2 (dx2 + dy2)
141
+ if z ∈ D(aN−1, RN−1),
142
+ (2)
143
+ where rB is the radius of the base sphere and
144
+ C = C\D(a1, R1) ∪ D(a2, R2) ∪ · · · ∪ D(aN−1, RN−1),
145
+ is the complement of the discs D(a1, R1), . . . , D(aN−1, RN−1) which corresponds to the points in the base sphere.
146
+ The RGMolSA descriptor uses the explicit form of the Riemannian metric provided by piecewise stereo-
147
+ graphic projection to approximate the low-lying eigenfunctions of the Laplacian ∆. In [1], we compared the RGMolSA
148
+ descriptor for Sildenafil, Vardenafil and Tadalafil, a series of PDE5 inhibitors that are known to occupy a similar volume
149
+ in the binding pocket of their target protein, and thus have similar shape (Figure 1) [6]. Vardenafil is a classic example
150
+ of a “me-too" drug, where only a few small modifications have been made to the structure of Sildenafil. As these are
151
+ both highly similar chemically, they would be expected to have close to the same shape. Tadalafil on the other hand is
152
+ chemically quite different from the other two, but inspection of the molecules in the pocket of PDE5 reveals they occupy
153
+ a similar binding pose, and thus would also be expected to have similar shape. In this article, for ease of compari-
154
+ son with the previous work [1], we again use these three molecules as the basis for investigating the new shape descriptor.
155
+ 2
156
+
157
+ Geometry and Molecular Surfaces
158
+ A PREPRINT
159
+ (a) Sildenafil
160
+ Pfizer
161
+ First Sold: 1998
162
+ (b) Vardenafil
163
+ Bayer
164
+ First Sold: 2003
165
+ (c) Tadalafil
166
+ Lilly
167
+ First Sold: 2003
168
+ Figure 1: PDE5 inhibitors Sildenafil, Vardenafil and Tadalafil of known shape similarity. Tadalafil (different chemical structure, similar shape) is an example of a scaffold
169
+ hop from the first in class drug Sildenafil, and offers greatly improved performance, while Vardenafil (a "me-too" follow-up drug) only offers minor improvements.
170
+ While RGMolSA was found to give a good description of shape, it has a possible deficiency due to the dependence
171
+ of the results on the choice of base sphere, which in turn determines the trial functions for calculating the integrals
172
+ used to construct the descriptor. The geometry of the surface near the base sphere is well described, but for atoms
173
+ further away a greater number of eigenvalues would be needed for accurate description of the surface. This problem is
174
+ greater for larger molecules and can lead to the introduction of numerical errors when the molecule is large enough.
175
+ We handled such errors by ignoring any contributions from regions with numerical radii less than 10−9; however, this
176
+ forces a somewhat artificial ‘locality’ upon the shape descriptor meaning that it probably only accurately captures the
177
+ shape near to the base sphere.
178
+ In the following section we outline the theory underpinning the KQMolSA descriptors, that again uses the Riemannian
179
+ metric to approximate the geometry of the surface. The resulting descriptors lie in the manifold GL(N, C)/U(N) to
180
+ give a global descriptor of molecular geometry with reduced dependence on the starting position. Figure 2 summarises
181
+ the steps in computing these, using Sildenafil as an example. While the descriptor itself does depend upon the choices
182
+ made and the position of the surface within R3, this is easily accounted for within the space GL(N, C)/U(N). This
183
+ makes computing the ‘distance’ between the shape descriptors particularly straightforward.
184
+ 2
185
+ The Mathematics of Kähler Quantization
186
+ 2.1
187
+ Overview of the Theory
188
+ We should say immediately that the theory of Kähler quantization is far too advanced to be able to detail in the current
189
+ paper. For readers with sufficient mathematical background, a good account (and the original account of its use as
190
+ a numerical technique) is given in [5]. An exposition, aimed at readers with a general scientific background, of the
191
+ mathematical theory is currently being written by two of the authors [7].
192
+ The theory is concerned with the geometry of complex manifolds (shapes that locally look like Cn); any sur-
193
+ face that sits in R3 is a complex manifold as it locally looks like a copy of the complex numbers C (i.e. n = 1). More
194
+ concretely, we will be concerned with the surfaces that are topologically equivalent to S2; in the language of complex
195
+ manifolds, the sphere is often referred to as the Riemann Sphere and denoted CP1. The restriction on the topology
196
+ of the surface is justified by the fact that chemists do not expect any activity in the centre of rings occurring in most
197
+ 3
198
+
199
+ N
200
+ N
201
+ HN
202
+ N
203
+ N
204
+ NN
205
+ HN
206
+ N
207
+ N
208
+ N
209
+ NH
210
+ N
211
+ N
212
+ N
213
+ 010000Geometry and Molecular Surfaces
214
+ A PREPRINT
215
+ Figure 2: Key steps involved in the computation of the KQMolSA surface descriptor for Sildenafil (a PDE5 inhibitor).
216
+ drug-like molecules. The exceptions to this are macrocyclic molecules (those with large rings of more than 12 atoms)
217
+ where genuine activity occurs in the centre of the ring. Such molecules are therefore excluded from comparison by both
218
+ methods proposed.
219
+ The natural class of functions to work with when dealing with complex manifolds are those that are com-
220
+ plex differentiable, often called holomorphic functions. We consider a general complex manifold X; unfortunately,
221
+ if the manifold X is compact, the only holomorphic functions f : X → C are constant. Thus we cannot hope to
222
+ understand X simply by studying the holomorphic functions on X. A generalisation of the notion of a holomorphic
223
+ function is that of a section of a holomorphic line bundle L with base X. For readers familiar with the theory, a function
224
+ is a section of the trivial bundle. A line bundle is positive if there is a Hermitian metric h on L with positive curvature.
225
+ A foundational result of Kodaira [8] says that if the line bundle L is positive then for large enough k the tensor power
226
+ Lk, has a lot of holomorphic sections. In fact, the space of all such sections, denoted H0(Lk), is a complex vector
227
+ space of dimension that has order O(kn) as k → ∞.
228
+ The curvature of a positively curved Hermitian metric h gives rise to an object called a Kähler form, ω,
229
+ which in turn gives rise to a Riemannian metric g (the mathematical object being used in [1] to describe shape). It
230
+ turns out that the set of all positively curved Hermitian metrics on a line bundle L can be identified with the set of all
231
+ real-valued functions ϕ : X → R that satisfy, in some local coordinate z, the ∂ ¯∂-equation
232
+
233
+ −1∂ ¯∂ϕ = ω − ω0
234
+ where ω is the Kähler form of the metric and ω0 is a fixed reference Kähler form. We will give more detail on the
235
+ differential operators ∂ and ¯∂ in Section 2.3; in particular, we will explain that in the molecular surface setting, the
236
+ ∂ ¯∂-equation is really just the familiar Poisson equation in the plane. The function ϕ is called a Kähler potential for
237
+ ω. The associated potential is not unique but any two differ by a constant; this does not affect the metric which is
238
+ constructed by taking two derivatives of the potential. However, we will see that the addition of a constant to a potential
239
+ will have the affect of scaling the Hermitian matrix we produce as a shape descriptor by a positive real number and we
240
+ will be required to find the ‘optimal’ rescaling in our distance calculation.
241
+ To summarise, what we have for a positive Hermitian line bundle (L, h) → X are:
242
+ • a Kähler form ω and a Kähler potential ϕ : X → R,
243
+ • a complex vector space H0(Lk).
244
+ 4
245
+
246
+ e.g. Sildenafil
247
+ Space Filling Model
248
+ Replace Rings, Base Sphere (Grey)
249
+ - AiilD
250
+ 01
251
+ Map to Complex Plane
252
+ Surface Area
253
+ Matrix of Levels
254
+ 2r?
255
+ ifz εc
256
+ (1 + [z/2)2
257
+ C1
258
+ 2.16 + 0j
259
+ -2.44 + 0.86j
260
+ 2.41 - 1.93j 1
261
+ ifz E D(ai,R1)
262
+ F(z) =
263
+ zje-kF(z)V-1dzΛdz
264
+ M
265
+ -2.44 - 0.86j
266
+ 3.01 + 0j
267
+ (lz - A1/2 + B1)2
268
+ -3.48 + 1.22j
269
+ MI
270
+ -3.48 - 1.22j
271
+ :
272
+ 2.41 + 1.93j
273
+ 4.41 + 0j
274
+ Cn-1
275
+ ifz E D(an-1,Rn-1)
276
+ (Iz - An-1/2 + Bn-1)2
277
+ Riemannian Metric
278
+ Construct Hermitian Matrix
279
+ Hermitian Matrix Shape DescriptorGeometry and Molecular Surfaces
280
+ A PREPRINT
281
+ What Kähler quantization amounts to is relating the geometry described by the Kähler potentials (an infinite dimensional
282
+ space of functions) to the finite dimensional complex vector space H0(Lk). This theme occurs throughout numerical
283
+ analysis and shape description, for example in the theories of Fourier analysis, spherical harmonics, Taylor series, all of
284
+ which produce a finite-dimensional vector space out of some infinite-dimensional set of functions.
285
+ 2.2
286
+ Quantization and Tian’s Theorem
287
+ The data (L, h) → X allows for a natural L2-inner product on the vector space of sections H0(Lk). Given sections
288
+ s1, s2 ∈ H0(Lk), we compute
289
+ ⟨s1, s2⟩ :=
290
+
291
+ X
292
+ hk(s1, s2)ωn
293
+ n! ,
294
+ where hk is the Hermitian metric induced on Lk by h, and ωn/n! is the volume element produced by the Kähler form.
295
+ It is this inner product that is the quantization of the data (L, h) → X. The space of all (Hermitian) inner products on a
296
+ complex N-dimensional vector space can be thought of as GL(N; C)/U(N). This is a negatively curved symmetric
297
+ space and has a natural notion of distance on it; it is this distance that we will use to measure shape similarity (see
298
+ Section 2.5).
299
+ To recover the geometry defined by (L, h) → X from the quantization, we choose a basis {sj} of the vec-
300
+ tor space H0(Lk) which gives rise to the matrix representation of the inner product
301
+ Mij := ⟨si, sj⟩.
302
+ If we let v be the vector of sections
303
+ v = (s1, s2, . . . sN) ,
304
+ then we can define a Kähler potential (recalling that the sections are locally defined holomorphic functions) ˜ϕ by
305
+ ˜ϕ := −1
306
+ k log
307
+
308
+ v∗M−1v
309
+
310
+ .
311
+ Theorem 2.1 (Tian, [9]). Let (X, L, h) be a complex manifold with holomorphic line bundle L and positively curved
312
+ Hermitian metric h with curvature ω. If we produce another Kähler form
313
+ �ω = ω0 +
314
+
315
+ −1∂ ¯∂ ˜ϕ,
316
+ then
317
+ ∥ω − �ω∥C0 = O(k−2).
318
+ Paraphrasing this theorem, we can say any Kähler form coming from a Kähler potential ϕ can be well approximated by
319
+ the Kähler form coming from the ‘algebraic’ function �ϕ. If we pick local complex coordinates z1, z2, . . . , zn then the
320
+ term v∗M−1v is just a power series in the coordinates. In the case of a molecular surface, we will have something like a
321
+ polynomial. This is the sense in which the function �ϕ is similar to a truncated Taylor series for the original function ϕ.
322
+ The theorem then says that this series really does converge.
323
+ Tian’s Theorem is stated for smooth metrics (those where one can take an arbitrary number of derivatives of
324
+ the Kähler potential ϕ); in practice (see Section 2.3), we will be working with metrics where the potentials are in
325
+ C2(X), that is twice continuously differentiable. The theory of approximating such metrics algebraically has not
326
+ been written down but we will demonstrate that we get a method that does produce meaningful shape comparisons.
327
+ We expect that, suitably adapted to this setting, something like Tian’s Theorem is still true; for example, the case of
328
+ potentials with lower regularity is discussed in [10].
329
+ 2.3
330
+ Implementation in Practice
331
+ As mentioned already, in practice we take X = CP1 the Riemann sphere and the line bundle to be the anticanonical
332
+ bundle K∗
333
+ CP1 = O(2). The Kähler form ω, can be explicitly constructed from the Riemannian metric g, and in the
334
+ coordinates furnished by the piecewise stereographic projection map Φps, we can use the form of the metric (2) to get
335
+ ω = F(z)
336
+
337
+ −1dz ∧ dz,
338
+ 5
339
+
340
+ Geometry and Molecular Surfaces
341
+ A PREPRINT
342
+ where F : C → R+ is the ‘metric function’ given by
343
+ F(z) =
344
+
345
+
346
+
347
+
348
+
349
+
350
+
351
+
352
+
353
+
354
+
355
+
356
+
357
+
358
+
359
+
360
+
361
+
362
+
363
+
364
+
365
+
366
+
367
+ 2r2
368
+ B
369
+ (1+|z|2)2
370
+ if z ∈ C,
371
+ C1
372
+ (|z−A1|2+B1)2
373
+ if z ∈ D(a1, R1),
374
+ C2
375
+ (|z−A2|2+B2)2
376
+ if z ∈ D(a2, R2),
377
+ ...
378
+ ...
379
+ CN−1
380
+ (|z−AN−1|2+BN−1)2
381
+ if z ∈ D(aN−1, RN−1).
382
+ (3)
383
+ Note we have replaced, in the metric g, the real symmetric 2-tensor dx2 + dy2 with the antisymmetric form
384
+ (√−1/2)dz ∧ d¯z, where dz = dx + √−1dy and d¯z = dx − √−1dy.
385
+ To find the Kähler potential ϕ : C → R, we solve the ‘∂∂-equation’
386
+ ω =
387
+
388
+ −1∂∂ϕ.
389
+ If we consider the complex differential operators
390
+
391
+ ∂z = 1
392
+ 2
393
+ � ∂
394
+ ∂x −
395
+
396
+ −1 ∂
397
+ ∂y
398
+
399
+ and
400
+
401
+ ∂z = 1
402
+ 2
403
+ � ∂
404
+ ∂x +
405
+
406
+ −1 ∂
407
+ ∂y
408
+
409
+ ,
410
+ then the ∂∂-equation is equivalent to solving the Poisson equation
411
+ ∂2ϕ
412
+ ∂z∂z = 1
413
+ 4∆Eucϕ = F,
414
+ where ∆Euc is the usual 2-dimensional Laplacian. We can solve the Poisson problem explicitly to find ϕ. The solution
415
+ can be thought of as having two parts: a ‘local’ part that is found by simply observing that
416
+ ∂2
417
+ ∂z∂z
418
+ �C log(|z − A|2 + B)
419
+ B
420
+
421
+ =
422
+ C
423
+ (|z − A|2 + B)2 ,
424
+ and a ‘correction term’, named thus as the term is needed to ensure the function is in C2(C). The correction term is a
425
+ linear combination of functions of the form
426
+ log(|αz + β|2),
427
+ where we get one term for each sphere. As each of the correction terms is a harmonic function, that is
428
+ ∆ log(|αz + β|2) = 0,
429
+ the addition of the correction terms is still a solution of the Poisson equation. It would appear the correction terms
430
+ are singular at the points z = −β/α; however, these points always lie outside the disc where the function takes this
431
+ particular form. We record the form of the potential as a theorem and refer the reader to the appendix (Section 5) for a
432
+ derivation of the solution.
433
+ Theorem 2.2 (Form of Kähler potential). Let g be of the form Equation (2). In the region associated to the ith sphere,
434
+ the Kähler potential can be written
435
+ ϕ(z) = Ci
436
+ Bi
437
+ log(|z − Ai|2 + Bi) +
438
+ N
439
+
440
+ j=1
441
+ Kij log(|αijz + βij|2),
442
+ where K ∈ M N×N(R), and α, β ∈ M N×N(C).
443
+ The matrices K, α, and β in the previous theorem are easily calculated from the geometric data associated to the
444
+ molecule and so it is straightforward to describe the Kähler potential explicitly.
445
+ The space of global sections H0(O(2k)) ∼= C2k+1 can be identified with the span of the functions
446
+ ⟨1, z, z2, . . . , z2k⟩.
447
+ Thus the shape descriptor associated to the surface is the (2k + 1) × (2k + 1) Hermitian matrix M where (considering
448
+ indices that run from 0 to 2k)
449
+ Mij =
450
+ ��
451
+ C
452
+ zizje−kϕF(z)
453
+
454
+ −1dz ∧ dz.
455
+ (4)
456
+ 6
457
+
458
+ Geometry and Molecular Surfaces
459
+ A PREPRINT
460
+ 2.4
461
+ Computing the Relevant Integrals
462
+ A naïve numerical calculation of the integrals described by Equation (4) gives rise to two obvious problems:
463
+ firstly, the domain of integration is unbounded (being the whole complex plane C); secondly, the domains and
464
+ values describing the metric and the Kähler potential ϕ could become so small that numerical instabilities start
465
+ to dominate the contribution of the associated atom.
466
+ The second problem has been discussed as a limitation
467
+ in the approximation of the spectrum of the Laplacian [1]. In this paper, we exploit the fact that the automor-
468
+ phism group of CP1 is the group of Möbius transformations, PSL(2, C); we can use elements of this group to
469
+ ensure the coordinates we perform calculations in are always in a numerically controlled region (here we use a unit disc).
470
+ Put more concretely, let m ∈ {1, 2, . . . , N} index the mth sphere making up the molecular surface, then
471
+ there is an element Tm ∈ PSL(2, C) that maps the unit disc
472
+ D = {z ∈ C | |z| < 1},
473
+ onto the region D(am, Rm) from Equation (2). We note that if the mth sphere has level l, then the pre-image of the
474
+ regions corresponding to level (l + 1) spheres which intersect the mth sphere will describe certain discs properly
475
+ contained in D. Hence the contribution of the mth sphere to the matrix described by Equation (4) is given by
476
+ ��
477
+ D− ˆ
478
+ D
479
+ (Tm(w))i(Tm(w))je−kϕ(Tm(w))F(Tm(w)) dTm(w) ∧ dTm(w),
480
+ (5)
481
+ where ˆD represents the union of the discs corresponding to the next level spheres intersecting the mth sphere. In practice,
482
+ we account for these higher-level spheres by assigning the value 0 to the volume form F(Tm(w)) dTm(w) ∧ dTm(w)
483
+ whenever w ∈ ˆD (note this produces a jump discontinuity in the volume form). Numerical calculation of integrals
484
+ of the form of Equation (5) is done by splitting into an angular and radial direction and then performing successive
485
+ applications of the trapezium rule; we choose a radial step size corresponding to nr = 15 integration points and an
486
+ angular step size corresponding to taking nθ = 10 points. This seems to achieve a reasonable accuracy; for example,
487
+ one can check the area integral for a given integration scheme. We have also determined that the distance between
488
+ shape descriptors does not seem to be significantly changed by taking smaller step sizes (Section 3.1).
489
+ 2.5
490
+ Finding the Distance Between Shape Descriptors
491
+ Given two positive definite Hermitian matrices M1, M2, such as those generated by Equation (4), there are innumerable
492
+ ways of defining a notion of distance between such matrices. With regards to the theory of Kähler quantization, it is
493
+ natural to consider M1, M2 as two Hermitian inner products on the fixed complex vector space H0(O(2k)). This space
494
+ is naturally seen as the manifold GL(2k + 1; C)/U(2k + 1). An inner product is specified by declaring a particular
495
+ basis to be orthonormal; any basis conjugate under the action of U(2k + 1) defines the same inner product. This
496
+ space has a natural distance on it; one characterisation of this distance is that shortest paths (geodesics) are given
497
+ by one-parameter subgroups of GL(2k + 1; C), that is by paths of matrices of the form exp(tA) where A is some
498
+ (2k + 1) × (2k + 1) complex matrix.
499
+ More explicitly, if {v1, v2, . . . , v2k+1} is a basis of H0(O(2k))such that both inner products are represented
500
+ by diagonal matrices
501
+ M1 = Diag
502
+
503
+ eλ1, eλ2, . . . , eλ2k+1�
504
+ ,
505
+ M2 = Diag (eµ1, eµ2, . . . , eµ2k+1) ,
506
+ then
507
+ d(M1, M2) = k− 3
508
+ 2
509
+
510
+
511
+
512
+
513
+ 2k+1
514
+
515
+ i=1
516
+ (λi − µi)2.
517
+ (6)
518
+ The factor of k−3/2 ensures that the distances stabilise as k → ∞ (see Theorem 1.1 in [11]). It will be useful to consider
519
+ the following more compact form for the distance
520
+ d(M1, M2) = k− 3
521
+ 2
522
+
523
+
524
+
525
+
526
+ 2k+1
527
+
528
+ i=1
529
+ (log(ηi))2,
530
+ (7)
531
+ where {ηi} are the eigenvalues of the matrix M−1
532
+ 1 M2.
533
+ 7
534
+
535
+ Geometry and Molecular Surfaces
536
+ A PREPRINT
537
+ It is a well-known fact that the automorphism group of the Riemann sphere CP1 is the group of Möbius
538
+ transformations PSL(2, C). Roughly speaking, the subgroup PSU(2) ⊂ PSL(2, C) corresponds to rotations of the
539
+ original surface and the remaining maps correspond to reparameterisations that preserve the complex structure. If
540
+ ϖ ∈ PSL(2, C) is an automorphism of the form
541
+ ϖ(z) = αz + β
542
+ γz + δ ,
543
+ then ϖ also acts on the vector space H0(O(2k)). In representation theoretic terms, this action is the representation
544
+ induced on Sym2k(C2) by the standard representation of SL(2, C). If we denote the element of SL(2k+1, C) by ϑ(ϖ)
545
+ (see [12], Lemma 8) and the original shape descriptor computed in the z-coordinate by M, then the shape descriptor
546
+ computed in the ϖ(z)-coordinate will be
547
+ (ϑ(ϖ))∗ M (ϑ(ϖ)) .
548
+ As mentioned in Section 2, the fact that the Kähler potential is only defined up to the addition of a constant means we
549
+ can also scale the Hermitian matrix M by a positive constant. Hence our calculation of distance between two shape
550
+ descriptors M1 and M2 becomes the concrete problem of minimising, over (p, ϑ) ∈ R × SL(2, C),
551
+ ζ(p, ϑ) =
552
+ 2k+1
553
+
554
+ i=1
555
+ (log(ηi))2,
556
+ where {ηi} are the eigenvalues of the matrix M−1
557
+ 1 ep (ϑ(ϖ))∗ M2 (ϑ(ϖ)).
558
+ It is easy to see that the value of p at a critical point of ζ is independent of the element ϑ.
559
+ Elementary
560
+ calculus yields that the value of p is given by
561
+ p = −
562
+ 1
563
+ 2k + 1
564
+ 2k+1
565
+
566
+ i=1
567
+ log(˜ηi),
568
+ where {˜ηi} are the eigenvalues of the matrix M−1
569
+ 1 M2. As the matrix (ϑ(ϖ)) has unit determinant, the value of p
570
+ does not depend up the SL(2, C) action on the Hermitian matrix M2. We thus reduce the distance calculation to a
571
+ minimisation over the six-dimensional Lie group SL(2, C).
572
+ Note that the distance between the shape descriptors given by Equation (6) is the distance between the molecular shapes
573
+ after they have been re-scaled to have area 4π. Hence the distance between two molecular surfaces S1 and S2 should
574
+ include a component to reflect the difference in area between S1 and S2. As we are interested in producing a similarity
575
+ score rather than a distance between two inputs, we do not take this point up further in the article. Our initial attempts at
576
+ creating a similarity score are detailed in the subsequent section.
577
+ The remaining minimisation over SL(2, C) is done by parameterising a generic matrix by the 6 real variables x1, ...x6
578
+ and taking
579
+ ϖ(x1, x2, . . . , x6) =
580
+
581
+ x1 + √−1x2
582
+ x3 + √−1x4
583
+ x5 + √−1x6
584
+
585
+
586
+ ,
587
+ where ∗ is chosen to ensure det(ϖ) = 1. To perform the minimisation, we use algorithms that do not require the
588
+ input of a gradient vector, such as Nelder–Mead or Powell methods [13]. These are implemented using off-the-shelf
589
+ packages in SciPy [14]. We found that for k = 1 there was very little difference between the results for either
590
+ method; the minimisation algorithm converges to produce a robust distance value. For k = 2 the minimisation
591
+ methods appear to be a little less stable and occasionally did not converge. One way around this was to use the
592
+ element of SL(2, C) found by the k = 1 minimisation as the initial guess for the k = 2 step (otherwise the identity
593
+ matrix was used). We anticipate that one might be able to improve this process; for example, by computing the
594
+ gradient of the function to be minimised explicitly and then using this in an algorithm such as conjugate gradient descent.
595
+ One further consideration in implementing the distance measure between two matrices was in shape descrip-
596
+ tors for k > 2 (and for k = 2 in some cases), where numerical instability exists within the method. Occasionally
597
+ non-positive definite matrices are produced, that cannot be compared using the above approach. As Hermitian matrices
598
+ that differ only by scale can be considered equivalent, such cases have been treated by scaling one matrix by a factor of
599
+ 10, 100 or 1000 as needed in order to bring the eigenvalues into the range required for consideration with Python.
600
+ 8
601
+
602
+ Geometry and Molecular Surfaces
603
+ A PREPRINT
604
+ 3
605
+ Initial Case Study: Phosphodiesterase 5 (PDE5) Inhibitors
606
+ 3.1
607
+ Tuning the Parameters nr and nθ
608
+ To determine the effect of varying the parameters nr and nθ (Section 2.4) on the quality of the shape descriptors
609
+ produced, we considered three sets of parameters: nr = 200 and nθ = 100; nr = 50 and nθ = 25; nr = 15 and
610
+ nθ = 10. The distances produced between the descriptor for each set and the area returned during the computation of
611
+ the relevant integrals (which should be ∼ 12.57 for an accurate descriptor, as constrained by the choice of scaling the
612
+ surface area to 4π) are reported here for Sildenafil (Table 1), Vardenafil (Table 2) and Tadalafil (Table 3).
613
+ Table 1: Computed distances between descriptors of Sildenafil generated using different values of nr and nθ for k = 1. The area reported is that returned by the
614
+ integration step.
615
+ (200, 100), area = 12.59
616
+ (50, 25), area = 12.62
617
+ (15, 10), area = 12.62
618
+ (200, 100)
619
+ -
620
+ 0.032
621
+ 0.032
622
+ (50, 25)
623
+ 0.038
624
+ -
625
+ 0.040
626
+ (15, 10)
627
+ 0.038
628
+ 0.040
629
+ -
630
+ Table 2: Computed distances between descriptors of Vardenafil generated using different values of nr and nθ for k = 1. The area reported is that returned by the
631
+ integration step.
632
+ (200, 100) area = 12.57
633
+ (50, 25), area = 12.58
634
+ (15, 10), area = 12.58
635
+ (200, 100)
636
+ -
637
+ 0.005
638
+ 0.005
639
+ (50, 25)
640
+ 0.005
641
+ -
642
+ 0.004
643
+ (15, 10)
644
+ 0.005
645
+ 0.004
646
+ -
647
+ Table 3: Computed distances between descriptors of Tadalafil generated using different values of nr and nθ for k = 1. The area reported is that returned by the
648
+ integration step.
649
+ (200, 100), area = 14.32
650
+ (50, 25), area = 14.37
651
+ (15, 10), area = 14.37
652
+ (200, 100)
653
+ -
654
+ 0.003
655
+ 0.003
656
+ (50, 25)
657
+ 0.003
658
+ -
659
+ 0.001
660
+ (15, 10)
661
+ 0.003
662
+ 0.001
663
+ -
664
+ As these distances are small in each case, there is no significant loss of quality when the number of points considered is
665
+ reduced. The areas for both Sildenafil and Vardenafil are also close to 12.57, indicating high quality descriptors. The
666
+ area for Tadalafil is overestimated slightly, however this is due to an issue with the replacement of the rings for motifs
667
+ with a 5-membered ring between two other rings rather than the choice of nr and nθ. Similar results were observed for
668
+ the consideration of k = 2. As the quality is unaffected, the minimum parameters of nr = 15 and nθ = 10 were used
669
+ in the final descriptors to increase the speed of calculation.
670
+ 3.2
671
+ Constructing a Similarity Score
672
+ In order to facilitate familiar comparison of molecules, we wish to construct a similarity score rather than simply taking
673
+ the distance between two matrices. In chemoinformatics, this score typically takes a value between 0 (no similarity)
674
+ and 1 (identical) [4]. To achieve this we take the inverse distance, and account for size by taking the ratio of two surface
675
+ areas. Equation 8 gives the similarity score between two molecular surfaces S1 and S2,
676
+ score(S1, S2) = x(Amin/Amax) + y
677
+ 1
678
+ 1 + d(M1, M2),
679
+ (8)
680
+ where Amin is the smaller of the two surface areas, and Amax is the larger, in order to give a score bounded by 0 and 1.
681
+ We therefore need to choose an appropriate set of weights x and y such that x + y = 1, and x < 0.5, to ensure the
682
+ shape is the primary contributor to the score.
683
+ Table 4 gives the resulting similarity scores for pairwise comparison of the PDE5 inhibitors. In all three cases,
684
+ the similarity increases with increasing contribution from the surface area term as expected. The increase for
685
+ Sildenafil-Vardenafil is only small, while for Tadalafil there is a greater effect of including the area. Final weights of
686
+ x = 0.3 and y = 0.7 were selected to balance the contribution of the surface area without it dominating over the shape
687
+ contribution. The PDE5 inhibitors were selected for tuning due to their known similarity, however further refinement of
688
+ 9
689
+
690
+ Geometry and Molecular Surfaces
691
+ A PREPRINT
692
+ Table 4: Similarity scores for the PDE5 inhibitors for surface area weights ranging from 0 to 0.5.
693
+ x
694
+ y
695
+ Sildenafil-Vardenafil
696
+ Sildenafil-Tadalafil
697
+ Vardenafil-Tadalafil
698
+ 0
699
+ 1
700
+ 0.884
701
+ 0.286
702
+ 0.275
703
+ 0.1
704
+ 0.9
705
+ 0.892
706
+ 0.340
707
+ 0.328
708
+ 0.2
709
+ 0.8
710
+ 0.900
711
+ 0.394
712
+ 0.380
713
+ 0.3
714
+ 0.7
715
+ 0.908
716
+ 0.449
717
+ 0.432
718
+ 0.4
719
+ 0.6
720
+ 0.916
721
+ 0.503
722
+ 0.485
723
+ 0.5
724
+ 0.5
725
+ 0.924
726
+ 0.557
727
+ 0.537
728
+ these parameters with a larger set of examples may be required for full scale virtual screening.
729
+ 3.3
730
+ Investigating Variation in 3D Conformers
731
+ As discussed in the previous work [1], consideration of the different orientations a molecule can adopt (known as
732
+ conformers) is important when using 3D shape descriptors. Conformers of the same molecule should theoretically have
733
+ scores in the range 0.7 < score < 1, as high self-similarity is expected (scores above 0.7 in chemoinformatics), while
734
+ retaining the ability to distinguish between them.
735
+ As with RGMolSA, two small sets of 10 conformers of the PDE5 inhibitors are used to investigate how KQ-
736
+ MolSA regards different conformers. One set contains 10 random conformers, in which we would expect slightly
737
+ more variance, while the other has 10 low energy conformers, for which higher similarity is expected. Both sets
738
+ were produced using the ETKDG algorithm [15] with energy optimisation using the MMFF94 force field [16], both
739
+ implemented in RDKit [17]. The minimum, maximum and average shape similarity as well as the average RMSD
740
+ (which compares conformers based on their atomic positions) for each set are given in Figure 3. The full set of RMSD
741
+ and shape similarity comparisons are available in the Supporting Data.
742
+ The RMSD and shape similarity for each set are compared in the swarm plots shown in Figure 4. For k = 1, generally
743
+ high similarity was observed, with some scores for the random conformers of Tadalafil falling slightly below 0.7.
744
+ Greater variation is observed for k = 2, where some conformer pairs have scores below 0.6. This reduction in similarity
745
+ is expected for k = 2 as the descriptors represent a more detailed approximation to the original surface than those
746
+ for k = 1 and hence will be more sensitive to differences in the geometry. However, the similarity scores obtained
747
+ were on the whole lower than for RGMolSA, where the similarity between most conformer pairs is greater than 0.8 [1].
748
+ For the random sets, the similarity between conformers showed more variation than for RGMolSA, where clusters of
749
+ similar conformers were observed. While KQMolSA does handle conformers well, RGMolSA appears to do a better
750
+ job of this, due to the insensitivity to surface deformation of the spectrum of the Laplace–Beltrami operator. For virtual
751
+ screening, this consideration of conformers as similar negates the need for a pre-alignment step prior to shape similarity
752
+ calculation, and may allow molecules that can deform to fit in the binding pocket to be identified as potential hits, where
753
+ these would otherwise be classified as the wrong shape by methods that depend on atomic coordinates.
754
+ 3.4
755
+ Comparison to Existing Methods
756
+ The PDE5 inhibitor series was also used to investigate how well KQMolSA compares to the previous work, and to
757
+ other open source shape similarity methods. Table 5 provides the shape-similarity scores observed between the PDE5
758
+ inhibitors for KQMolSA (for k = 1 and k = 2), RGMolSA [1], USRCAT [18, 17], Shape-It [19] and MolSG [20]. A
759
+ 2D representation, in the form of the 1024-bit Morgan fingerprint using radius 3, is also included. Each descriptor uses
760
+ a similarity score between 0 (different) and 1 (identical).
761
+ Table 5: Comparison of the work presented here (KQMolSA) to the previous work (RGMolSA) [1] and existing atomic-distance [18], atomic-centred [19] and molecular
762
+ surface based [20] descriptors. In all cases the similarity scores given are bound by 0 (no similarity) and 1 (identical).
763
+ KQMolSA
764
+ (k=1)
765
+ KQMolSA
766
+ (k=2)
767
+ RGMolSA
768
+ USRCAT
769
+ Shape-It
770
+ MolSG
771
+ Morgan
772
+ Fingerprint
773
+ Sildenafil-
774
+ Vardenafil
775
+ 0.907
776
+ 0.652
777
+ 0.903
778
+ 0.384
779
+ 0.388
780
+ 0.704
781
+ 0.667
782
+ Sildenafil-
783
+ Tadalafil
784
+ 0.449
785
+ 0.482
786
+ 0.809
787
+ 0.269
788
+ 0.278
789
+ 0.746
790
+ 0.201
791
+ Vardenafil-
792
+ Tadalafil
793
+ 0.432
794
+ 0.470
795
+ 0.725
796
+ 0.291
797
+ 0.353
798
+ 0.887
799
+ 0.209
800
+ 10
801
+
802
+ Geometry and Molecular Surfaces
803
+ A PREPRINT
804
+ (a) k = 1
805
+ (b) k = 2
806
+ Figure 3: Overlay of the most and least shape-similar conformers of Sildenafil, Vardenafil and Tadalafil and the average shape similarity and RMSD for each set for (a)
807
+ k = 1 and (b) k = 2. On average the conformers display a high degree of self-similarity despite the variance in atom-position similarity.
808
+ As discussed in the prequel to this paper, as Sildenafil and Vardenafil are close structural analogues they should display
809
+ both high shape and fingerprint similarity. As Tadalafil is known to occupy a similar volume in PDE5 compared to
810
+ the other inhibitors, we’d expect high shape similarity scores also, but lower 2D similarity. One conformer of each
811
+ molecule is considered for simplicity.
812
+ As for RGMolSA, Sildenafil and Vardenafil are scored as highly similar, with a score of 0.907 (k
813
+ = 1).
814
+ However Tadalafil is not scored as highly, and for KQMolSA would be classed as dissimilar if the typical threshold
815
+ of 0.7 was used. Lower similarity is observed for k = 2, which is expected as discussed previously. The similarity
816
+ score for k = 2 has a small dependence on the order of comparison (A compared to B yields a score which may
817
+ differ at the second decimal place from B compared to A, Table 6). This is due to the distance calculation involving
818
+ a numerical minimisation procedure rather than an exact expression, but this will have no practical implications in
819
+ chemoinformatics applications. Both proposed methods (RGMolSA and KQMolSA) perform well in this simple study,
820
+ with a higher predicted similarity for Sildenafil and Vardenafil than all the other 3D methods, and a more intuitive
821
+ ordering of the relative similarity measures than MolSG. However, a full scale benchmarking study will be required to
822
+ verify their performance.
823
+ 11
824
+
825
+ Geometry and Molecular Surfaces
826
+ A PREPRINT
827
+ (a) RMS Similarity
828
+ (b) Shape Similarity (k = 1)
829
+ (c) Shape Similarity (k = 2)
830
+ Figure 4: Swarm plots of the RMSD (in Å) and shape similarity for our set of conformers highlight the general trend that different conformers are classed as having
831
+ similar shape, despite significant variance in their atomic positions. Conformers with RMSD less than 1 Å are considered similar, while those over 3 Å have significant
832
+ differences.
833
+ Table 6: Similarity scores for the PDE5 inhibitors for k=2 highlighting the dependence on the order of comparison.
834
+ Sildenafil
835
+ Vardenafil
836
+ Tadalafil
837
+ Sildenafil
838
+ -
839
+ 0.652
840
+ 0.462
841
+ Vardenafil
842
+ 0.648
843
+ -
844
+ 0.470
845
+ Tadalafil
846
+ 0.482
847
+ 0.470
848
+ -
849
+ 3.5
850
+ Similarity to Potential Decoys
851
+ As for RGMolSA, we also wanted to check how the method handles molecules that should be classed as genuinely
852
+ different from the PDE5 inhibitor molecules. We therefore present a comparison to four other molecules (Figure 5):
853
+ Arginine (supplement) which has a lower molecular weight, but similar general shape (a long chain of spheres);
854
+ Lymecycline (antibiotic), with a higher molecular weight and a four-ring motif potentially giving part of the molecule a
855
+ similar shape to Sildenafil; Diflorasone (topical corticosteroid), which has a similar molecular weight and four rings, but
856
+ has a different therapeutic target/indication and S-octylglutathione (oligopeptide), which again has similar molecular
857
+ weight, but no rings and the potential for similarity due to the branching in the centre of the molecule.
858
+ The results of this comparison are presented in Figure 6. Most of the scores obtained for both k = 1 and k = 2 fall
859
+ significantly below the typical threshold of 0.7 for similarity, and as such these molecules would be classed as genuinely
860
+ different and likely inactive against PDE5. The exception is the comparison between Tadalafil and Diflorasone, where a
861
+ higher score of 0.74 (k = 1) is obtained. Due to the similarity between their structures (both contain a motif of 4 fused
862
+ rings), we would expect to see some similarity between the two. Inspection by eye of both the space filling model and
863
+ surface of the two molecules also suggests they do have genuinely similar shapes (Figure 7). These were also classed as
864
+ potentially similar by RGMolSA (similarity of 0.872).
865
+ 4
866
+ Conclusion
867
+ We have outlined the theory underpinning an entirely novel shape descriptor,
868
+ Mij =
869
+ ��
870
+ C
871
+ zizje−kϕF(z)
872
+
873
+ −1dz ∧ dz,
874
+ (9)
875
+ 12
876
+
877
+ ·····
878
+ Sildenafil Random
879
+ Sildenafil Low Energy
880
+ Vardenafil Random
881
+ Vardenafil Low Energy
882
+
883
+ Tadalafil Random
884
+ Tadalafil Low Energy
885
+ 0.0
886
+ 0.5
887
+ 1.0
888
+ 1.5
889
+ 2.0
890
+ 2.5
891
+ 3.0
892
+ 3.5
893
+ 4.0
894
+ Root Mean Square Deviation··…··…
895
+ Sildenafil Random
896
+ :8
897
+ Sildenafil Low Energy
898
+ Vardenafil Random
899
+
900
+ 8
901
+ Vardenafil Low Energy
902
+ Tadalafil Random
903
+ Tadalafil Low Energy
904
+ 0.60
905
+ 0.65
906
+ 0.70
907
+ 0.75
908
+ 0.80
909
+ 0.85
910
+ 0.90
911
+ 0.95
912
+ 1.00
913
+ Shape SimilaritySildenafil Random
914
+ Sildenafil Low Energy
915
+ Vardenafil Random
916
+ Vardenafil Low Energy
917
+ Tadalafil Random
918
+ Tadalafil Low Energy
919
+ 0.6
920
+ 0.7
921
+ 0.8
922
+ 0.9
923
+ 1.0
924
+ Shape SimilarityGeometry and Molecular Surfaces
925
+ A PREPRINT
926
+ Arginine
927
+ Lymecycline
928
+ Diflorasone
929
+ S-Octylglutathione
930
+ Figure 5: Chemical structures of potential decoy molecules.
931
+ the (2k + 1) × (2k + 1) Hermitian matrix which captures the geometry of the molecular surface. The distance between
932
+ two such matrix representations is then given as
933
+ d(M1, M2) = k− 3
934
+ 2
935
+
936
+
937
+
938
+
939
+ 2k+1
940
+
941
+ i=1
942
+ (λi − µi)2.
943
+ (10)
944
+ An overall similarity score of 1 for identical molecules and 0 for no similarity is then obtained as
945
+ score(S1, S2) = 0.3(Amin/Amax) + 0.7
946
+ 1
947
+ 1 + d(M1, M2).
948
+ (11)
949
+ As with the previously reported work, the capabilities of KQMolSA were investigated using a series of PDE5 inhibitors
950
+ known to have similar shape. The method generally handles conformers well, with similarity scores generally higher
951
+ than 0.7. The scores obtained were higher for k = 1 than k = 2, which is expected due to the greater detail leading to
952
+ more sensitivity to changes in geometry. The insensitivity to deformation of the surface lead to RGMolSA outperforming
953
+ KQMolSA in this area. KQMolSA performs relatively well compared to existing methods, identifying Sildenafil
954
+ and Vardenafil as highly similar, but assigning lower similarity scores to Tadalafil. This small study suggests that
955
+ RGMolSA might still perform better, but a full retrospective benchmarking study is required to confirm this. Compared
956
+ to RGMolSA, KQMolSA does have the advantage of a lower dependence on the choice of base sphere. There may
957
+ therefore be some instances where the use of KQMolSA is more appropriate despite its seemingly poorer performance,
958
+ for example in the consideration of long chain molecules with few rings, where numerical errors are often observed for
959
+ RGMolSA. Comparison to a set of potential decoy molecules yielded low scores for all except comparison of Tadalafil
960
+ to Diflorasone, which were also classed as similar by RGMolSA. Inspection by eye of both the space filling and surface
961
+ models of the molecules suggests that this assignment is reasonable, as they look similar in shape. Identification of such
962
+ similarity evidences the potential for scaffold hopping by these methods.
963
+ Whilst the above tests suggest that the matrix M does give a promising description of molecular shape, the method
964
+ does have some drawbacks, primarily in the calculation of the distance between two descriptors. While the notion of
965
+ the distance between two Hermitian inner products (represented by the matrices M1 and M2) is well understood, the
966
+ calculation of the distance between molecular surfaces requires the distance between a point on an SL(2, C)-orbit to be
967
+ minimised. Despite the use of existing optimised minimisation algorithms, this process is still quite slow, depending
968
+ on the extent of the required minimisation, and further does not guarantee that the global minimum has been found.
969
+ This step typically takes a few seconds per pair, compared to a near-instantaneous calculation for RGMolSA. Further
970
+ refinement of this step would be required for use of the method in screening ultra-large chemical libraries as part of a
971
+ drug discovery pipeline.
972
+ 13
973
+
974
+ NH2
975
+ H2N
976
+ N
977
+ HO
978
+ NH2OH
979
+ N
980
+ H
981
+ H
982
+ N
983
+ N
984
+ OH
985
+ OH
986
+ OH
987
+ HO
988
+ OH
989
+ NH2HO
990
+ OH
991
+ OHOH
992
+ NH
993
+ s
994
+ N
995
+ HO
996
+ H
997
+ NH2Geometry and Molecular Surfaces
998
+ A PREPRINT
999
+ Figure 6: KQMolSA similarity (for k = 1 and k = 2) of four ‘different’ molecules (blue) to the PDE5 inhibitor test series (red). The overlay of the structures was
1000
+ computed using Open3DAlign [21]
1001
+ Of course, there are many other ways of measuring the distance between two Hermitian matrices.
1002
+ One
1003
+ might hope that some form of machine learning, trained on an appropriate data set, might discern other useful
1004
+ geometries on the space of descriptors.
1005
+ The method also contains numerical instability above k = 2 (and for k = 2 in a few instances), producing Hermitian
1006
+ matrices that are not positive definite. As Hermitian matrices differing only by a scale factor can be considered
1007
+ equivalent, we have handled such cases by scaling one matrix by a factor of 10-1000 to bring the eigenvalues into the
1008
+ range of Python’s numerical tolerance.
1009
+ Along with addressing these issues, both of the methods proposed could be further improved through the consideration
1010
+ of pharmacorphoric features, such as aromatic rings, hydrogen bond donors and acceptors, alongside the shape. As
1011
+ these features are important for binding, this may lead to improved predictions compared to the consideration of shape
1012
+ alone. As for RGMolSA, there would also be scope to investigate the use the Hermitian matrix descriptors produced by
1013
+ KQMolSA as a feature descriptor in machine learning.
1014
+ 5
1015
+ Appendix: Finding the Kähler potential
1016
+ Before giving the proof of the form of the Kähler potential, we dispense with a small technical point. From the point of
1017
+ view of describing the Kähler form ω via
1018
+
1019
+ −1∂ ¯∂ϕ = ω,
1020
+ the Kähler potential ϕ is only locally defined and adding any function H satisfying √−1∂ ¯∂H = 0
1021
+ will also define a Kähler potential for ω. In our setting where the underlying complex manifold is CP1 and we are using
1022
+ the standard coordinate z, we can add any harmonic function H : C → R to obtain a valid Kähler potential.
1023
+ 14
1024
+
1025
+ Arginina
1026
+ Lymecyclina
1027
+ Diforaaone
1028
+ S-octylglubthiona
1029
+ K=1:0.469
1030
+ k=1:0.513
1031
+ k=1:0.367
1032
+ k=1:0.467
1033
+ k=2: 0.413
1034
+ k=2: 0.411
1035
+ k=2: 0.3B9
1036
+ k=2: 0.378
1037
+ sildenfl
1038
+ K=1:0.493
1039
+ K=1:0.535
1040
+ K=1:0.354
1041
+ K=1:0.467
1042
+ K=2:0.445
1043
+ K=2:0.45
1044
+ k=2: 0.377
1045
+ K=2:0.378
1046
+ Vardanafil
1047
+ K=1:0.282
1048
+ k=1:0.347
1049
+ K=1:0.74
1050
+ K=1:0.421
1051
+ k=2: 0.315
1052
+ K=2: 0.339
1053
+ k=2: 0.614
1054
+ k=2: 0.4
1055
+ dalahlGeometry and Molecular Surfaces
1056
+ A PREPRINT
1057
+ (a) Tadalafil - Space Filling Model
1058
+ (b) Diflorasone - Space Filling Model
1059
+ (c) Tadalafil - Surface
1060
+ (d) Diflorasone - Surface
1061
+ Figure 7: Comparison by eye of both the space filling model and the surface of Tadalafil and Diflorasone highlights their similarity.
1062
+ However, in Kähler Quantization, the potential ϕ actually describes a global object, the Hermitian metric h
1063
+ on the line bundle L. This means that the functions
1064
+ h(zj, zj) = e−kϕ(z)|z|2j,
1065
+ are defined over whole sphere CP1. In particular, they extend to functions over the point at infinity. For example the
1066
+ round metric has Kähler potential ϕ = −2 log(|z|2 + 1) and so, if we add a harmonic function H we require
1067
+ |z|4k
1068
+ (1 + |z|2)2k e−kH
1069
+ to be bounded. The Liouville Theorem then implies H must be constant.
1070
+ Theorem 5.1 (Form of Kähler potential). Let ω be a Kähler metric of the form given by Equation (3). If we denote the
1071
+ region corresponding to the ith sphere as Ri ⊂ C, then the Kähler potential potential ϕ, which satisfies √−1∂∂ϕ = ω,
1072
+ is of the form
1073
+ ϕ(z) = Ci
1074
+ Bi
1075
+ log(|z − Ai|2 + Bi) +
1076
+ N
1077
+
1078
+ j=1
1079
+ Kij log(|αijz + βij|2),
1080
+ where K ∈ M N×N(R), and α, β ∈ M N×N(C).
1081
+ Proof. The proof is by induction on the number of spheres N. For N = 1 the metric ω is the round metric and we can
1082
+ take K = 0. Adding a new sphere to the surface changes the metric by adding a new region Rk which is a disc where
1083
+ the metric takes the form
1084
+ ω(z)|Rk =
1085
+ Ck
1086
+ (|z − Ak|2 + Bk)2
1087
+
1088
+ −1dz ∧ dz.
1089
+ 15
1090
+
1091
+ Geometry and Molecular Surfaces
1092
+ A PREPRINT
1093
+ We can map Rk to the unit disc about the origin by a Möbius transformation M in such a way that, in the coordinate of
1094
+ the unit disc, the metric is given by
1095
+ �ω(w) =
1096
+
1097
+
1098
+
1099
+
1100
+
1101
+ F(w)√−1dw ∧ dw
1102
+ if
1103
+ |w| > 1,
1104
+ κ
1105
+ (|w|2 + ε)2
1106
+ √−1dw ∧ dw
1107
+ if
1108
+ |w| ≤ 1,
1109
+ for some function F : C → R and constants κ, ε ∈ R.
1110
+ We solve the ¯∂-equation using the Dolbeault method; for a compactly supported1 continuous function H : C → C,
1111
+ ψ(w) =
1112
+ 1
1113
+ 2π√−1
1114
+ ��
1115
+ C
1116
+ H(p)
1117
+ p − wdp ∧ dp,
1118
+ solves ∂ψ = H(w)dw. We split the integral according to the form of the metric and consider
1119
+ ψ(w) =
1120
+ 1
1121
+ 2π√−1
1122
+ ��
1123
+ D
1124
+ κ
1125
+ (|p|2 + ε)2(p − w)dp ∧ dp +
1126
+ 1
1127
+ 2π√−1
1128
+ ��
1129
+ C\D
1130
+ F(p)
1131
+ p − wdp ∧ dp.
1132
+ To compute the first integral we use the Cauchy–Pompeiu integral formula and the fact that
1133
+ κ
1134
+ (|p|2 + ε)2 = ∂
1135
+ ∂p
1136
+ � (κ/ε)p
1137
+ (|p|2 + ε)
1138
+
1139
+ ,
1140
+ to give
1141
+ 1
1142
+ 2π√−1
1143
+ ��
1144
+ D
1145
+ κ
1146
+ (|p|2 + ε)2(p − w)dp ∧ dp =
1147
+
1148
+
1149
+
1150
+
1151
+
1152
+
1153
+
1154
+
1155
+
1156
+ � (κ/ε)w
1157
+ (|w|2 + ε)
1158
+
1159
+
1160
+ 1
1161
+ 2π√−1
1162
+
1163
+ ∂D
1164
+ (κ/ε)p
1165
+ (|p|2 + ε)(p − w)dp
1166
+ if
1167
+ |w| < 1,
1168
+
1169
+ 1
1170
+ 2π√−1
1171
+
1172
+ ∂D
1173
+ (κ/ε)p
1174
+ (|p|2 + ε)(p − w)dp
1175
+ if
1176
+ |w| > 1.
1177
+ The contour integral
1178
+ 1
1179
+ 2π√−1
1180
+
1181
+ ∂D
1182
+ (κ/ε)p
1183
+ (|p|2 + B)(p − w)dp,
1184
+ can be easily computed using the Cauchy Residue Formula and this yields
1185
+ 1
1186
+ 2π√−1
1187
+
1188
+ ∂D
1189
+ (κ/ε)p
1190
+ (|p|2 + ε)(p − w)dp =
1191
+
1192
+ 0
1193
+ if |w| < 1,
1194
+ − (κ/ε)
1195
+ (1+ε)w
1196
+ if |w| > 1.
1197
+ Finally, we arrive at
1198
+ 1
1199
+ 2π√−1
1200
+ ��
1201
+ D
1202
+ κ
1203
+ (|p|2 + ε)2(p − w)dp ∧ dp =
1204
+ � �
1205
+ (κ/ε)w
1206
+ |w|2+ε
1207
+
1208
+ if |w| < 1,
1209
+ (κ/ε)
1210
+ (1+ε)w
1211
+ if |w| > 1.
1212
+ To compute the second integral, we again split the domain and consider
1213
+ 1
1214
+ 2π√−1
1215
+ ��
1216
+ C\D
1217
+ F(p)
1218
+ p − wdp ∧ dp =
1219
+ 1
1220
+ 2π√−1
1221
+ ��
1222
+ C
1223
+ F(p)
1224
+ p − wdp ∧ dp −
1225
+ 1
1226
+ 2π√−1
1227
+ ��
1228
+ D
1229
+ F(p)
1230
+ p − wdp ∧ dp.
1231
+ The integral
1232
+ S(w) =
1233
+ 1
1234
+ 2π√−1
1235
+ ��
1236
+ C
1237
+ F(p)
1238
+ p − wdp ∧ dp,
1239
+ is a solution to
1240
+ ∂S
1241
+ ∂w = F(w).
1242
+ 1Our function is not compactly supported but we could cut off at an arbitrary radius to produce such a function.
1243
+ 16
1244
+
1245
+ Geometry and Molecular Surfaces
1246
+ A PREPRINT
1247
+ In the unit disc D, F has the form
1248
+ F(w) =
1249
+ ˜κ
1250
+ (|w|2 + ˜ε)2 ,
1251
+ where ˜κ and ˜ε are positive constants. Hence
1252
+ ψ(w) =
1253
+
1254
+
1255
+
1256
+
1257
+
1258
+
1259
+
1260
+
1261
+
1262
+ S(w) +
1263
+ � (κ/ε)
1264
+ |w|2 + ε −
1265
+ (˜κ/˜ε)
1266
+ |w|2 + ˜ε
1267
+
1268
+ w
1269
+ if
1270
+ |w| < 1,
1271
+ S(w) +
1272
+ �(κ/ε)
1273
+ 1 + ε − (˜κ/˜ε)
1274
+ 1 + ˜ε
1275
+
1276
+ w−1
1277
+ if
1278
+ |w| > 1,
1279
+ solves dw ∧ ∂ψ = �ω(w).
1280
+ If Q(w) is a Kähler potential for F(w)√−1dw ∧ dw then
1281
+ �ϕ(w) =
1282
+
1283
+
1284
+
1285
+ Q(w) + (κ/ε) log(|w|2 + ε) − (˜κ/˜ε) log(|w|2 + ˜ε) − K
1286
+ if
1287
+ |w| < 1,
1288
+ Q(w) +
1289
+ �(κ/ε)
1290
+ 1 + ε − (˜κ/˜ε)
1291
+ 1 + ˜ε
1292
+
1293
+ log(|w|2)
1294
+ if
1295
+ |w| > 1,
1296
+ where
1297
+ K = (κ/ε) log(1 + ε) − (˜κ/˜ε) log(1 + ˜ε),
1298
+ is a Kähler potential for �ω. Pulling back the function �ϕ via the Möbius transformation
1299
+ M(z) = αz + β
1300
+ γz + δ
1301
+ we see
1302
+ ϕk(z) =
1303
+
1304
+
1305
+
1306
+
1307
+
1308
+
1309
+
1310
+
1311
+
1312
+
1313
+
1314
+ Q
1315
+ �αz + β
1316
+ γz + δ
1317
+
1318
+ + (κ/ε) log
1319
+ �����
1320
+ αz + β
1321
+ γz + δ
1322
+ ����
1323
+ 2
1324
+ + ε
1325
+
1326
+ − K
1327
+ if
1328
+ z ∈ Rk
1329
+ Q
1330
+ �αz + β
1331
+ γz + δ
1332
+
1333
+ +
1334
+ �(κ/ε)
1335
+ 1 + ε − (˜κ/˜ε)
1336
+ 1 + ˜ε
1337
+
1338
+ log
1339
+ �����
1340
+ αz + β
1341
+ γz + δ
1342
+ ����
1343
+ 2�
1344
+ if
1345
+ z ̸∈ Rk
1346
+ is a Kähler potential for the metric which is singular at at the point z = −δ/γ. We can replace the Q-term by the
1347
+ appropriate function for the previous ϕ and then add the appropriate multiple of log(|γz + δ|2) to produce a Kähler
1348
+ potential of the appropriate form.
1349
+ 6
1350
+ Acknowledgements
1351
+ The authors acknowledge support from an EPSRC Doctoral Training Partnership studentship (grant EP/R51309X/1),
1352
+ the Alan Turing Institute Enrichment Scheme (R.P.), and a UKRI Future Leaders Fellowship (grant MR/T019654/1)
1353
+ (D.J.C.). S.J.H. would like to thank Dr R. L. Hall for his interest and for useful conversations about the project. T.M.
1354
+ would like to thank University of California, Irvine for their hospitality whilst some of the work on this paper was
1355
+ completed.
1356
+ References
1357
+ [1] Daniel J. Cole, Stuart J. Hall, and Rachael Pirie. Riemannian geometry and molecular surfaces I: Spectrum of the
1358
+ Laplacian, (preprint), 2022.
1359
+ [2] Mark A. Johnson and Gerald M. Maggiora. Concepts and Applications of Molecular Similarity. 1990.
1360
+ [3] Sumudu P. Leelananda and Steffen Lindert. Computational methods in drug discovery. Beilstein J. Org. Chem.,
1361
+ 12:2694–2718, 2016.
1362
+ [4] Ashutosh Kumar and Kam Y. J. Zhang. Advances in the development of shape similarity methods and their
1363
+ application in drug discovery. Front. Chem., 6:1–21, 2018.
1364
+ [5] S. K. Donaldson. Some numerical results in complex differential geometry. Pure Appl. Math. Q., 5(2):571–618,
1365
+ 2009.
1366
+ 17
1367
+
1368
+ Geometry and Molecular Surfaces
1369
+ A PREPRINT
1370
+ [6] Ann E. Cleves and Ajay N. Jain. Effects of inductive bias on computational evaluations of ligand-based modelling
1371
+ and on drug discovery. J. Comput. Aided Mol. Des., 22(3):147–159, 2008.
1372
+ [7] Stuart J. Hall and Thomas Murphy. Kähler geometry of molecular surfaces, in preparation.
1373
+ [8] Phillip Griffiths and Joseph Harris. Principles of algebraic geometry. Pure and Applied Mathematics. A Wiley-
1374
+ Interscience Publication. New York etc.: John Wiley & Sons. XII, 813 p. £ 29.60; $ 58.00 (1978)., 1978.
1375
+ [9] Gang Tian. On a set of polarized Kähler metrics on algebraic manifolds. J. Differ. Geom., 32(1):99–130, 1990.
1376
+ [10] Robert Berman and Julien Keller. Bergman geodesics. In Complex Monge-Ampère equations and geodesics in the
1377
+ space of Kähler metrics. Lecture notes, pages 283–302. Berlin: Springer, 2012.
1378
+ [11] Xiuxiong Chen and Song Sun. Space of Kähler metrics (V)—Kähler quantization. In Metric and differential
1379
+ geometry, volume 297 of Progr. Math., pages 19–41. Birkhäuser/Springer, Basel, 2012.
1380
+ [12] Yoshinori Hashimoto. Quantisation of extremal Kähler metrics. J. Geom. Anal., 31(3):2970–3028, 2021.
1381
+ [13] William H. Press, Saul A. Teukolsky, William T. Vetterling, and Brian P. Flannery. Numerical recipes. Cambridge
1382
+ University Press, Cambridge, third edition, 2007. The art of scientific computing.
1383
+ [14] Pauli Virtanen et al. SciPy 1.0: Fundamental Algorithms for Scientific Computing in Python. Nature Methods,
1384
+ 17:261–272, 2020.
1385
+ [15] Sereina Riniker and Gregory A. Landrum. Better informed distance geometry: Using what we know to improve
1386
+ conformation generation. J. Chem. Inf. Model, 55(12):2562–2574, 2015.
1387
+ [16] Paolo Tosco, Nikolaus Stiefl, and Gregory Landrum. Bringing the mmff force field to the rdkit: Implementation
1388
+ and validation. J.Cheminformatics, 6(1), 2014.
1389
+ [17] Greg Landrum. Rdkit: Open-source cheminformatics software. Version 2021.09.1.
1390
+ [18] Adrian M Schreyer and Tom Blundell. USRCAT: Real-time ultrafast shape recognition with pharmacophoric
1391
+ constraints. J. Cheminform., 4:1489–1495, 2012.
1392
+ [19] Jonatan Taminau, Gert Thijs, and Hans De Winter. Pharao: Pharmacophore alignment and optimization. J. Mol.
1393
+ Graph, 27(2):161–169, 2008.
1394
+ [20] Matthew P. Seddon, David A. Cosgrove, Martin J. Packer, and Valerie J. Gillet. Alignment-free molecular shape
1395
+ comparison using spectral geometry: The framework. J. Chem. Inf. Model, 59:98–116, 2019.
1396
+ [21] Paolo Tosco, Thomas Balle, and Fereshteh Shiri. Open3dalign: an open-source software aimed at unsupervised
1397
+ ligand alignment. Journal of Computer-Aided Molecular Design, 25(8):777–783, 2011.
1398
+ 18
1399
+
79E3T4oBgHgl3EQfRwk1/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
7dE0T4oBgHgl3EQffQBI/content/tmp_files/2301.02401v1.pdf.txt ADDED
@@ -0,0 +1,1848 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ You Truly Understand What I Need
2
+ : Intellectual and Friendly Dialogue Agents grounding
3
+ Knowledge and Persona
4
+ Jungwoo Lim1, Myunghoon Kang1∗, Yuna Hur1∗, Seungwon Jung1∗, Jinsung Kim1∗,
5
+ Yoonna Jang1, Dongyub Lee3, Hyesung Ji2, Donghoon Shin2,
6
+ Seungryong Kim1§ and Heuiseok Lim1§
7
+ 1Korea University, 2Dialogue Tech Division, NCSOFT, 3Naver Corporation
8
+ {wjddn803,chaos8527,yj72722,redlion0929,jin62304,seungryong_kim,limhseok}@korea.ac.kr,
9
+ {hyesung84,dhshin}@ncsoft.com, [email protected]
10
+ Abstract
11
+ To build a conversational agent that interacts
12
+ fluently
13
+ with
14
+ humans,
15
+ previous
16
+ studies
17
+ blend knowledge or personal profile into the
18
+ pre-trained language model. However, the
19
+ model that considers knowledge and persona
20
+ at the same time is still limited, leading to
21
+ hallucination and a passive way of using
22
+ personas. We propose an effective dialogue
23
+ agent that grounds external knowledge and
24
+ persona simultaneously. The agent selects
25
+ the proper knowledge and persona to use for
26
+ generating the answers with our candidate
27
+ scoring implemented with a poly-encoder.
28
+ Then, our model generates the utterance with
29
+ lesser hallucination and more engagingness
30
+ utilizing
31
+ retrieval
32
+ augmented
33
+ generation
34
+ with
35
+ knowledge-persona
36
+ enhanced
37
+ query.
38
+ We conduct experiments on the persona-
39
+ knowledge chat and achieve state-of-the-art
40
+ performance in grounding and generation
41
+ tasks on the automatic metrics. Moreover,
42
+ we validate the answers from the models
43
+ regarding
44
+ hallucination
45
+ and
46
+ engagingness
47
+ through human evaluation and qualitative
48
+ results. We show our retriever’s effectiveness
49
+ in extracting relevant documents compared
50
+ to
51
+ the
52
+ other
53
+ previous
54
+ retrievers,
55
+ along
56
+ with the comparison of multiple candidate
57
+ scoring
58
+ methods.
59
+ Code
60
+ is
61
+ available
62
+ at
63
+ https://github.com/dlawjddn803/INFO
64
+ 1
65
+ Introduction
66
+ To
67
+ build
68
+ an
69
+ ultimate
70
+ conversational
71
+ agent
72
+ that interacts with humans fluently, previous
73
+ studies provide generative neural network-based
74
+ models (Sordoni et al., 2015; Vinyals and Le,
75
+ 2015). Although the answers generated from those
76
+ models are plausible, they lack informativeness
77
+ and engagingness resulting in bland responses
78
+ compared to humans (Li et al., 2016; Gao et al.,
79
+ *
80
+ Equal Contributors
81
+ § Corresponding author
82
+ Dialogue
83
+ Human: Is it in England?
84
+ Machine: No, it is actually in Scotland where you are going.
85
+ Human: Where in Scotland?
86
+ Human’s Persona
87
+ I will travel through North Ayrshire.
88
+ I am going to Scotland.
89
+ I like history.
90
+ I am interested in architecture.
91
+ I love to garden.
92
+ Ground Truth Knowledge
93
+ Eglinton Castle was a large Gothic castellated mansion in
94
+ Kilwinning, North Ayrshire, Scotland.
95
+ Predicted Answers
96
+ BARTbase
97
+ It is in Scotland, which is a place you love.
98
+ BARTlarge
99
+ It is in Scotland. in Scotland. in Scotland. in
100
+ Ground Truth Response
101
+ It is in North Ayrshire so you could visit when you travel through.
102
+ Table 1: Example of the generated answers from a
103
+ typical generative model, i.e., BART. We can find that
104
+ BARTbase uses different persona sentence which has
105
+ not appeared human’s personal profiles resulting in
106
+ hallucinated answer. Also, BARTlarge generates less
107
+ engaging answers by making use of the knowledge only
108
+ to answer the question. Both generated responses are in
109
+ the situation of hallucination and are less engaging.
110
+ 2018). However, for knowledgeable and attractive
111
+ conversation, people usually provide informative
112
+ replies by considering the background of the person
113
+ whom they are talking to. Towards a human-like
114
+ manner of dialogue, Ghazvininejad et al. (2018)
115
+ and Dinan et al. (2018) introduce the knowledge-
116
+ grounded conversation for the knowledgeable
117
+ and informative responses, whereas Zhang et al.
118
+ (2018a) suggest the persona-grounded dialogue for
119
+ the personalized responses to the users.
120
+ To improve the machine’s answer with the
121
+ external knowledge base, one injects the factual
122
+ knowledge into the parameters of the language
123
+ model (Raffel et al., 2020; Roberts et al., 2020).
124
+ Despite the models’ capability of utilizing external
125
+ knowledge implicitly, they produce “hallucinations”
126
+ in the responses (Marcus, 2020). The hallucination
127
+ arXiv:2301.02401v1 [cs.CL] 6 Jan 2023
128
+
129
+ in the dialogue involves the situation where
130
+ the generated output contradicts the reference
131
+ knowledge. Also, it includes the situation when
132
+ the generated output cannot be confirmed from the
133
+ knowledge source (Ji et al., 2022). To mitigate these
134
+ hallucinated answers, hybrid models employing
135
+ parametric memory with non-parametric (i.e.,
136
+ retrieval-based) memory are introduced to directly
137
+ access external memories, leading the source to be
138
+ inspected and interpreted (Karpukhin et al., 2020;
139
+ Petroni et al., 2020; Lewis et al., 2020b).
140
+ On the other hand, Zhang et al. (2018a) suggest
141
+ persona-chat dialogues with the corresponding
142
+ personal profiles of each interlocutor to avoid
143
+ general and monotonous answers from the machine.
144
+ Though See et al. (2019); Liu et al. (2020) show
145
+ comparable quality in generating personalized
146
+ conversation, the generated utterances merely
147
+ confirm each interlocutor’s persona resulting
148
+ in a passive manner of speaking such as “I
149
+ have four children”. In addition, the incoherent
150
+ topics of the dialogues lead to shallow levels
151
+ of conversation between the interlocutors. To
152
+ elaborate on this chit-chat conversation supported
153
+ by external knowledge, Jang et al. (2022) presents
154
+ a novel persona-knowledge chat with a generative
155
+ model that considers persona information and
156
+ world knowledge altogether. Despite obtaining
157
+ the knowledge and persona when generating the
158
+ answers, the generative models’ responses still
159
+ exhibit both hallucination and lesser engagingness
160
+ as in Table 1.
161
+ In this paper, we propose INFO (Intellectual
162
+ and Friendly dialOg agents) that responds with
163
+ external knowledge and persona simultaneously.
164
+ Owing to the enhanced capturing relevancy
165
+ between the context and each candidate set,
166
+ the knowledge selector and persona selector for
167
+ the grounding task are implemented with the
168
+ poly-encoder. To alleviate hallucinated responses
169
+ from the model, we adopt retrieval-augmented
170
+ generation (RAG) (Lewis et al., 2020b) by
171
+ utilizing non-parametric memory and parametric
172
+ generator in addition to the enhanced input
173
+ query. By injecting predicted sources as input
174
+ to the retrieved-augmented generator, our model
175
+ maintains consistency between grounding and
176
+ generation while training. Therefore, our model
177
+ generates more knowledgeable and engaging
178
+ answers in an active manner with less hallucination.
179
+ We show that INFO achieves the highest
180
+ scores on both grounding and generation tasks in
181
+ empirical experiments. Also, we compare diverse
182
+ candidate scoring modules including bi-encoder,
183
+ cross-encoder, and poly-encoder and demonstrate
184
+ their effect on generation. We additionally conduct
185
+ experiments to show the effectiveness of the
186
+ retriever module compared to sparse and dense
187
+ retrievers. The qualitative results and human
188
+ evaluation are also presented to validate our
189
+ model’s capability to generate human-like answers.
190
+ Our contributions are as follows:
191
+ • We propose the model that grounds persona
192
+ information and external knowledge with
193
+ lesser hallucination and adequate utilization of
194
+ persona in an active manner simultaneously.
195
+ • Our approach suggests that the generated
196
+ responses from the model are interpretable
197
+ regarding what the model refers to while
198
+ generating.
199
+ • We show that INFO achieves the SoTA
200
+ performance in all of the automatic metrics
201
+ and demonstrate its comparable quality with
202
+ human evaluation and qualitative analysis.
203
+ 2
204
+ Related Works
205
+ 2.1
206
+ Knowledge Grounded Conversation
207
+ To let the neural network models ground external
208
+ knowledge and generate informative answers,
209
+ Ghazvininejad et al. (2018) suggests a data-
210
+ driven neural conversational agent that provides
211
+ knowledgeable
212
+ answers.
213
+ Also,
214
+ Dinan
215
+ et
216
+ al.
217
+ (2018) introduces open-domain dialogue where
218
+ the two speakers are talking with Wikipedia
219
+ knowledge. To inject the external knowledge
220
+ into the pre-trained language model efficiently,
221
+ Raffel et al. (2020); Roberts et al. (2020)
222
+ success in equipping the knowledge into the
223
+ parameters and show comparable performance
224
+ in open-domain question and answering tasks.
225
+ However, the approach is not capable of expand
226
+ or revise their inherent knowledge and provides
227
+ hallucination (Marcus, 2020). To overcome the
228
+ limitations, Lewis et al. (2020b) combines a
229
+ pre-trained parametric model and non-parametric
230
+ memory for the open-domain question and
231
+ answering to reduce hallucination. Since their non-
232
+ parametric memory can be updated without extra
233
+ pre-training, revising knowledge is more efficient.
234
+ Furthermore, it is found that a retrieval-augmented
235
+
236
+ Figure 1: Overview of our method. U is the input comprises dialogue history and knowledge snippet, and cand
237
+ denotes each candidate from the grounding tasks. The grounding score is obtained through the dot product
238
+ operation with the representation of input context Udial and candidate at. The predicted sources convert into the
239
+ knowledge-persona enhanced query (KPEQ) with dialogue history and KPEQ is fed into the retrieval-augmented
240
+ generator to generate the responses.
241
+ generator also reduces hallucination in knowledge-
242
+ grounded conversation as well (Shuster et al.,
243
+ 2021), and a similar approach recently achieves
244
+ outstanding performance in knowledge-grounded
245
+ conversation (Paranjape et al., 2021).
246
+ 2.2
247
+ Persona Grounded Conversation
248
+ In order to alleviate bland and general answers
249
+ with consistent personality, Zhang et al. (2018a)
250
+ constructs a persona-chat dataset. In the dataset,
251
+ the two interlocutors chat with the persona
252
+ profile sentences. Along with this dataset, Zhang
253
+ et al. (2018a) introduces the model with a
254
+ profile memory network by considering the
255
+ dialogue history to perform attention over the
256
+ persona. They enlarge the persona-chat dataset
257
+ with Reddit corpus, and pre-trained the model
258
+ with these dataset. After that, they fine-tune pre-
259
+ trained model on the persona-chat (Mazare et al.,
260
+ 2018). Also, Liu et al. (2020) trains a receiver
261
+ to reinforce the mutual persona understanding
262
+ between interlocutors, and Wolf et al. (2019) utilize
263
+ pre-trained models (Radford et al., 2019) to build
264
+ personalized dialogue agents.
265
+ 2.3
266
+ Encoders for Sentence Scoring
267
+ There exist diverse encoder structures for sentence
268
+ scoring. Bi-encoder scores the relevance between
269
+ sentences by feeding context and candidates into
270
+ separate encoders. An example of bi-encoders
271
+ are memory networks
272
+ (Zhang et al., 2018a),
273
+ transformer memory networks (Dinan et al.,
274
+ 2018), LSTM (Lowe et al., 2015). Since bi-
275
+ encoder calculates with cached encoded sentence
276
+ representations, it is relatively fast in computation.
277
+ However, the bi-encoder has a limitation of
278
+ capturing mutual information between context
279
+ and candidates. Cross-encoder, on the other hand,
280
+ scores by aligning context and candidates in
281
+ one sequence. A type of cross-encoders is a
282
+ sequential matching network that is based on
283
+ deep matching networks (Yang et al., 2018) and
284
+ gated self-attention (Zhang et al., 2018b). Although
285
+ using a cross-encoder can achieve rich interaction
286
+ between the sentences within the encoder, the
287
+ problem of slow processing still remains. To
288
+ exploit both benefits of each model, poly-encoder
289
+ adopts attention mechanism into the bi-encoder
290
+ architecture and shows satisfactory performances
291
+ as cross-encoder with fast inference time (Humeau
292
+ et al., 2019). For the enhanced representation of
293
+ grounding knowledge and persona, we employ a
294
+ poly-encoder as a selector for each grounding task.
295
+ 3
296
+ Method
297
+ To generate more knowledgeable and engaging
298
+ dialogue, we introduce our conversational model
299
+ that grounds external knowledge and persona
300
+ information as in Figure 1. We first encode the
301
+ input with the pre-trained language model, and
302
+ then choose the proper knowledge and persona
303
+ from the given candidates for each selector. We
304
+ employ poly-encoder
305
+ (Humeau et al., 2019)
306
+ as knowledge selector and persona selector to
307
+ exploit its enhanced capability of capturing
308
+ relevance between candidate set and context (i.e.,
309
+ dialogue history). Then, the predicted persona
310
+ and knowledge are aligned into one sequence
311
+
312
+ KPEQ
313
+ Retriever(Non-Parametric)
314
+ Poly-encoder
315
+ Knowledge Selector
316
+ Document Index
317
+ Uaial
318
+ O-
319
+ Score
320
+ Poly-
321
+ U
322
+ Z1-08
323
+ encoder
324
+ Attention
325
+ Z7777
326
+ Z1-03
327
+ Z2-02
328
+ Uaial
329
+ Uaal
330
+ acand
331
+ Knowledge
332
+ Z1-01
333
+ Candidate
334
+ Z2-09
335
+ C
336
+ CM
337
+ Dialogue
338
+ Z2-05
339
+ Z2-07
340
+ Attention
341
+ Attention
342
+ Candidate Aggregator
343
+ Persona
344
+ Candidate
345
+
346
+
347
+ h1
348
+ hn
349
+ h2
350
+ a2
351
+ a1
352
+ aT
353
+ Persona Selector
354
+
355
+
356
+ Persona
357
+ Marginalize
358
+ Generator
359
+ Generated
360
+ Context Encoder
361
+ Candidate Encoder
362
+ Poly-
363
+ Level
364
+ (Parametric)
365
+ Answer
366
+
367
+ T
368
+
369
+ encoder
370
+ Indicator
371
+ U
372
+ candi
373
+ cand2
374
+ candTto the dialogue history for consistency between
375
+ grounding and generation. The sequence is defined
376
+ as a knowledge-persona enhanced query (KPEQ),
377
+ then it feeds into the retriever-augmented generator
378
+ (RAG). The generator then extracts the relevant
379
+ paragraphs to refer from the knowledge index to
380
+ reduce hallucination.
381
+ 3.1
382
+ Input Construction
383
+ The
384
+ given
385
+ dialogue
386
+ is
387
+ notated
388
+ as
389
+ {(uhm
390
+ 1 , umc
391
+ 1 ), ...(uhm
392
+ o
393
+ , umc
394
+ o )},
395
+ where
396
+ o
397
+ is
398
+ the
399
+ number of rounds. uhm and umc indicate the
400
+ utterances of human and machines, respectively.
401
+ We first take o-th round dialogue history, except
402
+ for the final machine’s reply umc
403
+ o , for the initial
404
+ input for the model. We define the clue of the
405
+ dialogue as knowledge snippet clk to inform the
406
+ machine of which topic the user is interested in.
407
+ The knowledge snippet is the name of the landmark
408
+ that the user encounters, which is given topic from
409
+ the dialogue. We then align the dialogue history
410
+ and knowledge snippet into the one sequence for
411
+ the model input as U = {uhm
412
+ 1 , umc
413
+ 1 , ...uhm
414
+ o
415
+ , clk}.
416
+ 3.2
417
+ Model Components
418
+ 3.2.1
419
+ Poly-Encoder Based Candidate Scoring
420
+ For knowledge and persona grounding tasks, we
421
+ suggest poly-encoder-based candidate scoring to
422
+ leverage the capability of capturing the semantic
423
+ similarities between the context input and the
424
+ candidates. It is employed to select proper sources
425
+ to be used when generating the utterance. When
426
+ the context input U comes in, we compute
427
+ the grounding scores of each candidate utilizing
428
+ the embeddings of context input and encoded
429
+ candidates in the poly-encoder. The grounding
430
+ score is used to select the most suitable source(s) in
431
+ the knowledge selector and persona selector, which
432
+ will be introduced in the following Section 3.2.2
433
+ and 3.2.3.
434
+ In poly-encoder architecture (Humeau et al.,
435
+ 2019), candidates are fed into the candidate
436
+ encoder and denoted as {a1, ..., aT } where T is
437
+ the number of candidates in the set. Each candidate
438
+ embedding at is the first output of the candidate
439
+ encoder, which is represented by the transformer
440
+ model. After encoding candidates, the context
441
+ input (i.e., dialogue history) is embedded with
442
+ a separate context encoder. Unlike the candidate
443
+ encoder, the context encoder embeds the dialogue
444
+ into multiple vectors through M context codes
445
+ {c1, ...cM}, which are learned for capturing diverse
446
+ aspects of a given context rather than using one
447
+ embedding. Each context code is used to extract
448
+ U m
449
+ dial by attending over all the previous layer’s
450
+ output as follows.
451
+ U m
452
+ dial =
453
+
454
+ j
455
+ wcm
456
+ j hj
457
+ (1)
458
+ Note that the h1, ..., hn is the output of the pre-
459
+ trained language model and n is the number of
460
+ tokens in the input. The weights are computed as
461
+ (wcm
462
+ 1 , ..., wcm
463
+ n ) = softmax(cm · h1, ..., cm · hn).
464
+ Then, the final attention proceeds between
465
+ the global features of the input and a given
466
+ candidate. In other words, the final dialogue feature
467
+ Udial is obtained by aggregating each dialogue
468
+ feature U m
469
+ dial, while gaining richer interactions with
470
+ context codes as in Equation 2.
471
+ Udial =
472
+
473
+ m
474
+ wmU m
475
+ dial,
476
+ (2)
477
+ where
478
+ w1, ..., wM
479
+ can
480
+ be
481
+ obtained
482
+ from
483
+ softmax(at · U 1
484
+ dial, ..., at · U M
485
+ dial).
486
+ The final predicted candidate is chosen based
487
+ on the highest score that is acquired from the dot
488
+ product operation as (Udial · at).
489
+ 3.2.2
490
+ Knowledge Selector (KS)
491
+ We build a knowledge selector for the knowledge
492
+ grounding task, employing poly-encoder-based
493
+ candidate scoring. When the grounding scores are
494
+ produced from the candidate scoring module, the
495
+ label with the highest score is selected as the
496
+ predicted knowledge.
497
+ The knowledge loss LKG for the knowledge
498
+ grounding task is computed with cross-entropy
499
+ loss (Brier et al., 1950) as in Equation 3.
500
+ LKG = −
501
+
502
+ j
503
+ klj · log ˆ
504
+ klj,
505
+ (3)
506
+ klj is the ground-truth label from the knowledge
507
+ candidates of the j-th example.
508
+ 3.2.3
509
+ Persona Selector (PS)
510
+ We also implement a persona selector for
511
+ the persona grounding task. Since multiple
512
+ personas can be chosen to generate the responses,
513
+ consideration of one or more persona sentences
514
+ are needed. Similar to the knowledge selector,
515
+ we assign the grounding score to each persona
516
+
517
+ candidate with the candidate scoring module as
518
+ in Equation 1 and 2.
519
+ When the scores of each candidate are computed
520
+ from the candidate scoring module, then the
521
+ persona level indicator classifies which the number
522
+ of the persona should be selected with the [CLS]
523
+ token of the model input U. After predicting the
524
+ level of persona-engagingness, we pick persona
525
+ sentences to be grounded according to the number
526
+ predicted. For example, if the persona level
527
+ indicator predicts 2, then top-2 persona sentences
528
+ are chosen in the persona grounding task. The
529
+ selected persona sentence(s) are marked as 1
530
+ otherwise, 0. We use binary cross-entropy loss for
531
+ persona grounding as in Equation 4.
532
+ LPG =
533
+
534
+
535
+ j
536
+ plj · log ˆ
537
+ plj + (1 − plj) · log(1 − ˆ
538
+ plj)
539
+ (4)
540
+ Note that plj is the ground-truth label from the
541
+ knowledge candidates of the j-th example.
542
+ 3.2.4
543
+ Query-Enhanced Generator
544
+ Following the works of Lewis et al. (2020b),
545
+ we exploit the retrieval augmented generation’s
546
+ capability to reduce hallucination and access the
547
+ memory directly. For a consistent way of training
548
+ while solving grounding and generation tasks,
549
+ we reconstruct the query that feeds into the
550
+ retriever. When the knowledge and persona are
551
+ predicted from each selector, we aggregate them
552
+ with dialogue history into one sequence. Then, the
553
+ final query is denoted as KPEQ = {U; ˆP; ˆK} and
554
+ defined as a knowledge-persona enhanced query. ˆP
555
+ and ˆK are predicted persona and knowledge from
556
+ each candidate set, respectively.
557
+ The retriever rη aims to search top-K latent
558
+ paragraphs with the KPEQ. We utilize a pre-
559
+ trained dense passage retriever (DPR) (Karpukhin
560
+ et
561
+ al.,
562
+ 2020)
563
+ trained
564
+ on
565
+ natural
566
+ question
567
+ dataset (Kwiatkowski et al., 2019) which has
568
+ parametric memory and bi-encoder architecture to
569
+ retrieve a latent document embedding following
570
+ Lewis et al. (2020b) :
571
+ rη(z|KPEQ) ∝ exp(d(z)⊤q(KPEQ)),
572
+ (5)
573
+ where d(·) is an embedding from a document
574
+ encoder and q(·) is a representation from query
575
+ encoder, both implemented with BERTbase. z
576
+ denotes the list of document.
577
+ With the relevant paragraphs from the retriever,
578
+ we employ RAG-Token architecture as the
579
+ generator to borrow its strength of predicting
580
+ each target token based on top-K different
581
+ paragraphs. Since RAG-Sequence, which has a
582
+ different architecture to RAG-Token, uses the same
583
+ document from the retriever to predict each token
584
+ as depicted in Equation 6, the result may opt to
585
+ depend on the retrieved document (Lewis et al.,
586
+ 2020a). The two different versions of RAGs (Lewis
587
+ et al., 2020b) are as follows:
588
+ SRS(y|x) ≈
589
+
590
+ z∈top-k(p(·|x))
591
+ rη(z|x)
592
+ N
593
+
594
+ i
595
+ gθ(yi|x, z, y1:i−1) (6)
596
+ SRT(y|x) ≈
597
+ N
598
+
599
+ i
600
+
601
+ z∈top-k(p(·|x))
602
+ rη(z|x)gθ(yi|x, z, y1:i−1),
603
+ (7)
604
+ where SRS indicates our method with RAG-
605
+ Sequence architecture and SRT denotes ours with
606
+ the RAG-Token model. x is a token of KPEQ and
607
+ yi is a single token from the ground truth responses.
608
+ Also, z is a retrieved paragraph from the retriever
609
+ and N is the maximum sequence length.
610
+ The SRT generator g(·) marginalizes the loss
611
+ from different paragraphs when generating answers.
612
+ In detail, the generator outputs a distribution
613
+ for the next token for each document before
614
+ marginalizing as in Equation 7 where η denotes
615
+ the parameter of the retriever, and θ indicates the
616
+ parameter of the generator. After that, the generator
617
+ repeats the process with the following output
618
+ token. Finally, the SRT aims to generate the next
619
+ token following an auto-regressive manner with a
620
+ standard beam search. In other words, the model
621
+ minimizes the negative marginal log-likelihood for
622
+ each input/output pair (KPEQj, yj). The language
623
+ model loss is formulated as :
624
+ LS = −
625
+
626
+ j
627
+ logp(yj|KPEQj)
628
+ (8)
629
+ 3.3
630
+ Final Objectives
631
+ We then train the full model in the multi-tasking
632
+ manner. The full objectives of the model is
633
+ indicated as Equation 9.
634
+ L = λKGLKG + λPGLPG + λSLS
635
+ (9)
636
+
637
+ Models
638
+ Generation
639
+ Grounding (Acc.)
640
+ chrF++
641
+ BLEU
642
+ R-1
643
+ R-2
644
+ R-L
645
+ BERTScore
646
+ Persona
647
+ Knowledge
648
+ GPT2small
649
+ 28.73
650
+ 11.43
651
+ 36.58
652
+ 19.44
653
+ 32.62
654
+ 88.56
655
+ 67.44
656
+ 69.59
657
+ GPT2medium
658
+ 30.12
659
+ 12.31
660
+ 38.29
661
+ 21.17
662
+ 34.12
663
+ 88.92
664
+ 67.44
665
+ 72.42
666
+ BARTbase
667
+ 29.77
668
+ 11.99
669
+ 36.24
670
+ 19.73
671
+ 32.13
672
+ 88.35
673
+ 67.45
674
+ 72.18
675
+ BARTlarge
676
+ 30.69
677
+ 11.91
678
+ 36.57
679
+ 19.83
680
+ 32.05
681
+ 88.10
682
+ 67.44
683
+ 71.01
684
+ INFO (SRS)
685
+ 51.33
686
+ 29.36
687
+ 53.36
688
+ 40.36
689
+ 51.16
690
+ 92.00
691
+ 82.70
692
+ 99.24
693
+ INFO (SRT )
694
+ 53.29
695
+ 31.46
696
+ 58.26
697
+ 42.35
698
+ 53.06
699
+ 92.29
700
+ 80.87
701
+ 99.22
702
+ Table 2: Main results on the official validation set. SRS denotes our method with RAG-Sequence architecture and
703
+ SRT indicates the model with RAG-Token model as generator. The models are evaluated by generation metrics,
704
+ including chrF++, BLEU, ROUGE-1 (R-1), ROUGE-2 (R-2), ROUGE-L (R-L), and BERTScore.
705
+ We control the proportion of each task and we
706
+ set λKG, λPG, and λS as 1:1:5 for the experiments,
707
+ respectively. We find the value of each λ with
708
+ manual search.
709
+ 4
710
+ Experiments
711
+ 4.1
712
+ Experiment Details
713
+ Dataset
714
+ FoCus (Jang et al., 2022) is the dataset
715
+ for customized dialogue benchmark, where each
716
+ conversation is directly grounded with knowledge
717
+ and persona. The dataset includes knowledge-
718
+ aware dialogue with personal profiles between
719
+ humans and machines. There are 12,484 dialogues
720
+ about 5,152 knowledge sources from Wikipedia
721
+ and 32,855 persona sentences. To validate the
722
+ knowledge grounding capability and customized
723
+ dialogue generation, we evaluate our method
724
+ with the official FoCus validation set for the
725
+ effectiveness of experiments since the result from
726
+ the official test set can be tested only through the
727
+ leaderboard*.
728
+ Experimental Setup
729
+ For each candidate scoring
730
+ module, we implement poly-encoder (Humeau
731
+ et al., 2019) with BERTlarge, and the number of
732
+ context codes is 16. For the dialogue generation, we
733
+ implement our method with Hugging Face (Wolf
734
+ et al., 2020) and use facebook/rag-token-nq as
735
+ the backbone model. We use the same architecture
736
+ of retriever and generator from RAG along
737
+ with the decoding and leverage our knowledge
738
+ index for non-parametric query-document ranking
739
+ with FAISS library (Johnson et al., 2019). The
740
+ knowledge index consists of the paragraphs from
741
+ the given Wikipedia knowledge entitled with the
742
+ name of the given landmark. We set learning rate
743
+ as 6.25e-6 with AdamW (Kingma and Ba, 2014)
744
+ *https://codalab.lisn.upsaclay.fr/competitions/3754
745
+ for the optimization. The batch size is set as 32,
746
+ and the number of dialogue history is 1. The whole
747
+ model was trained for three epochs on RTX A6000
748
+ GPU and took 8 hours per one epoch.
749
+ Baselines
750
+ We implement the baselines from
751
+ previous study (Jang et al., 2022) and we conduct
752
+ experiments with GPT-2 (Radford et al., 2019) and
753
+ BART (Lewis et al., 2020a) as well. For a fair
754
+ comparison, we demonstrate the results on GPT-
755
+ 2small, which has 12 layers, and BARTbase, which
756
+ has 6 encoders and 6 decoder layers. Also, GPT-
757
+ 2medium contains 24 layers of the decoder, and
758
+ BARTlarge possesses 12 layers for each encoder
759
+ and decoder.
760
+ 4.2
761
+ Automatic Evaluation
762
+ We show the main results on the FoCus dataset
763
+ with automatic metrics in grounding and generation
764
+ tasks. The official metrics for the benchmark are
765
+ chrF++ (Popovi´c, 2017), BLEU (Papineni et al.,
766
+ 2002), ROUGE-1, ROUGE-2, and ROUGE-L (Lin,
767
+ 2004). To consider the semantic similarity score
768
+ for each token between candidate and reference
769
+ sentences using contextual representation, we
770
+ additionally adopt BERTscore (Zhang* et al.,
771
+ 2020). For grounding task, we used accuracy for
772
+ both knowledge and persona grounding, and F1
773
+ score for the persona grounding.
774
+ In Table 2, it is found that our method shows
775
+ substantial improvements in all the metrics from
776
+ generation to grounding compared to the baselines.
777
+ Especially, the performances of INFO increase
778
+ over 18% at least regarding the generation metrics
779
+ except for BERTScore. Furthermore, our model
780
+ achieves remarkable success in persona and
781
+ knowledge accuracy. Unlike the performance in
782
+ other generation metrics, SRS demonstrates better
783
+ persona accuracy than SRT . This result might be
784
+
785
+ Model
786
+ Generation
787
+ Grounding
788
+ chrF++
789
+ BLEU
790
+ R-1
791
+ R-2
792
+ R-L
793
+ BERTScore
794
+ Persona
795
+ (Acc.)
796
+ Persona
797
+ (F1)
798
+ Knowledge
799
+ (Acc.)
800
+ SRT
801
+ Bi-encoder
802
+ 51.83
803
+ 29.51
804
+ 56.35
805
+ 40.80
806
+ 51.37
807
+ 91.86
808
+ 88.10
809
+ 38.20
810
+ 99.18
811
+ Cross-encoder
812
+ 49.90
813
+ 27.18
814
+ 53.57
815
+ 38.25
816
+ 49.29
817
+ 91.52
818
+ 87.09
819
+ 35.32
820
+ 99.49
821
+ Poly-encoder
822
+ 53.29
823
+ 31.46
824
+ 58.26
825
+ 42.35
826
+ 53.06
827
+ 92.29
828
+ 80.87
829
+ 39.56
830
+ 99.22
831
+ Table 3: Performances comparison between the encoding modules for grounding tasks
832
+ attributed to the architecture of the generator, which
833
+ is more applicable to sentence classification tasks
834
+ such as persona grounding. The official test result is
835
+ also demonstrated in Appendix A, but BERTscore
836
+ is missing due to the unreleased ground truth.
837
+ 4.3
838
+ Human Evaluation
839
+ We conduct a human evaluation to validate
840
+ the responses from our model through Amazon
841
+ Mturk services†. The assessment criteria are
842
+ fluency, adequacy, provenance, engagingness, and
843
+ hallucination. In specific, provenance is the level of
844
+ utilization of the ground truth knowledge into the
845
+ responses, whereas engagingness means how much
846
+ the answers are persona-related. Also, hallucination
847
+ indicates whether the answer contradicts the
848
+ persona and knowledge or cannot be verified
849
+ from the source content. We randomly chose 50
850
+ dialogues from the official test set, and three
851
+ workers were allocated to evaluate each dialogue
852
+ generated by our model and baselines. We asked
853
+ the workers to rank the answers according to each
854
+ criterion following Cho and May (2020). Rank is
855
+ scaled from 1 to 5, and the lower number is mapped
856
+ to the better quality except for hallucination. The
857
+ agreement between the annotators is calculated
858
+ with Fleiss’ Kappa coefficient and is 0.4185
859
+ indicating fair agreement. The relations between
860
+ the annotators hardly exist since we collect the
861
+ results from the Amazon Mturk workers.
862
+ As in Table 4, INFO surpasses BARTbase,
863
+ BARTlarge, GPT-2small and GPT-2medium in all
864
+ of the criteria. INFO achieves the highest rank in
865
+ adequacy, fluency, and provenance and generates
866
+ a more human-like response than other generative
867
+ models. Also, the workers ranked our model the
868
+ lowest when they were asked to rank the responses
869
+ in the most hallucinated order. Thus, it can be found
870
+ that INFO generates more engaging and fewer
871
+ hallucination utterances with respect to the human.
872
+ The distribution of the rank per each criterion is
873
+ illustrated in Appendix B.
874
+ †https://www.mturk.com/
875
+ Models
876
+ Avg. Rank
877
+ Ad. ↓
878
+ Fl. ↓
879
+ Prov. ↓
880
+ Eng. ↓
881
+ Hall. ↑
882
+ GPT-2small
883
+ 3.57
884
+ 3.41
885
+ 3.58
886
+ 3.46
887
+ 2.49
888
+ GPT-2medium
889
+ 3.11
890
+ 3.10
891
+ 3.04
892
+ 3.25
893
+ 3.02
894
+ BARTbase
895
+ 3.43
896
+ 3.29
897
+ 3.47
898
+ 3.22
899
+ 2.45
900
+ BARTlarge
901
+ 3.31
902
+ 3.63
903
+ 3.29
904
+ 3.44
905
+ 2.69
906
+ INFO (Ours)
907
+ 1.57
908
+ 1.57
909
+ 1.62
910
+ 1.63
911
+ 4.35
912
+ Table 4: Human evaluation. The value in the table
913
+ is the average rank of the each model’s response.
914
+ The
915
+ abbreviation
916
+ Ad.
917
+ Fl.
918
+ Prov.
919
+ Eng.
920
+ and
921
+ Hall
922
+ denote adequacy, fluency, provenance, engaginess, and
923
+ hallucination, respectively.
924
+ 5
925
+ Results and Analysis
926
+ 5.1
927
+ Variants on Candidate Scoring Module
928
+ To validate the poly-encoder as a candidate
929
+ scoring module, we apply diverse candidate scoring
930
+ modules, including the bi-encoder and cross-
931
+ encoder. From the results in Table 3, we can find
932
+ that the poly-encoder outperforms in the generation
933
+ task. In the grounding task, SRT with cross-encoder
934
+ scoring shows improved accuracy on grounding
935
+ persona and knowledge. The result seems to be
936
+ SRT with bi-encoder and cross-encoder are better
937
+ than that with poly-encoder. However, the F1
938
+ score of INFO is higher than the two candidate
939
+ scoring modules implying that low accuracy in
940
+ persona is due to the tendency of active use on the
941
+ persona in poly-encoder while the other two models
942
+ opt to predict not to use persona sentence. The
943
+ results suggest that the high accuracy of persona
944
+ not always guarantees the engagingness in the
945
+ dialogue.
946
+ 5.2
947
+ Comparison on other Retrievers
948
+ We show that INFO is effective in retrieving
949
+ knowledge compared to other sparse and dense
950
+ retrievers. We retrieve the knowledge from our
951
+ knowledge index built with Wikipedia paragraphs.
952
+ We utilize TF-IDF (Joachims, 1996), and deep
953
+ passage retrieval (DPR) (Karpukhin et al., 2020).
954
+ In the case of TF-IDF, we set the sum of query
955
+
956
+ and knowledge tokens less than or equal to
957
+ 512, which is the maximum sequence length of
958
+ DPR and INFO. We use bert-base-uncased
959
+ as the tokenizer. For DPR, we extract less than
960
+ 40 knowledge using TF-IDF due to memory
961
+ limitations. We first retrieve the five paragraphs
962
+ related to the query that comprises knowledge
963
+ snippet, dialogue history, predicted knowledge
964
+ candidate, and selected persona sentences. In Table
965
+ 5, we find that the retriever we used outperforms
966
+ compared to the TF-IDF and DPR in all the
967
+ metrics, including BERTscore. The results imply
968
+ that INFO’s retriever is suitable for extracting
969
+ similar paragraphs rather than other retrievers.
970
+ Model
971
+ chrF++
972
+ BLEU
973
+ R-1
974
+ R-2
975
+ R-L
976
+ BERTScore
977
+ TF-IDF
978
+ 19.91
979
+ 3.52
980
+ 13.91
981
+ 9.96
982
+ 12.43
983
+ 51.54
984
+ DPR
985
+ 20.57
986
+ 3.86
987
+ 12.44
988
+ 6.55
989
+ 10.20
990
+ 47.48
991
+ INFO
992
+ 26.36
993
+ 7.40
994
+ 15.48
995
+ 12.18
996
+ 14.32
997
+ 53.14
998
+ Table 5: Comparison with other retrievers
999
+ 5.3
1000
+ Effect of Selectors on Generation
1001
+ We measure each selector module’s effect on
1002
+ the generation task by changing the query which
1003
+ feds into the retriever on a validation set. The
1004
+ experimental results are shown in Table 6, where
1005
+ GTK, GTP represents ground truth knowledge and
1006
+ persona. Although the query that comprises the
1007
+ ground truth source shows the highest scores, INFO
1008
+ demonstrates comparable results on the generation
1009
+ task. From the result where the performance
1010
+ increase of INFO + GTP is larger than that of
1011
+ INFO + GTK about 2.8%p, we can identify that
1012
+ our persona selector still has more space to achieve
1013
+ its maximum level.
1014
+ Query
1015
+ chrF++
1016
+ BLEU
1017
+ R-1
1018
+ R-2
1019
+ R-L
1020
+ BERTScore
1021
+ INFO (RT)
1022
+ 53.29
1023
+ 31.46
1024
+ 58.26
1025
+ 42.35
1026
+ 53.06
1027
+ 92.29
1028
+ +GTK
1029
+ 53.35
1030
+ 31.56
1031
+ 58.31
1032
+ 42.55
1033
+ 53.18
1034
+ 92.29
1035
+ +GTP
1036
+ 56.19
1037
+ 34.39
1038
+ 61.61
1039
+ 45.46
1040
+ 56.01
1041
+ 92.79
1042
+ +GTK+GTP
1043
+ 56.40
1044
+ 34.60
1045
+ 61.88
1046
+ 45.64
1047
+ 56.16
1048
+ 92.84
1049
+ Table
1050
+ 6:
1051
+ Comparison
1052
+ between
1053
+ the
1054
+ generation
1055
+ performances based on the variants of query with
1056
+ ground truth knowledge and persona. Note that all the
1057
+ performance is evaluated with the official validation
1058
+ set.
1059
+ 5.4
1060
+ Qualitative Analysis
1061
+ In Table 7, an example from the predicted results
1062
+ is illustrated. In the case of BARTlarge, and GPT-
1063
+ 2medium, the responses only reflect the ground
1064
+ Given Landmark
1065
+ Finding Nemo Submarine Voyage
1066
+ Dialogue
1067
+ Human: What area of the park is this ride in?
1068
+ Machine: This ride is located in the Tomorrowland area of Disneyland.
1069
+ Human: Has this ride always been about Finding Nemo?
1070
+ Human’s Persona
1071
+ I’ve never been to California.
1072
+ My favorite cartoon is Finding Nemo.
1073
+ I would like to visit Disneyland.
1074
+ My favorite color is yellow.
1075
+ I enjoy swimming.
1076
+ Ground Truth Knowledge (Grounding)
1077
+ Based on the characters and settings of the 2003 Disney · Pixar, Finding
1078
+ Nemo, it is a re-theming of the classic Submarine Voyage attraction that
1079
+ operated from 1959 to 1998.
1080
+ Retrieved Knowledge (Generation)
1081
+ The original Submarine Voyage was built in 1959 as part of the then new
1082
+ Tomorrowland...
1083
+ In 2008, Finding Nemo Submarine Voyage received an award for
1084
+ outstanding achievement from the Themed Entertainment Association.
1085
+ Finding Nemo Submarine Voyage is ... which opened on June 11, 2007. ...
1086
+ it is a re-theming of the classic Submarine Voyage attraction that operated
1087
+ from 1959 to 1998.
1088
+ On July 15, 2005, two days before the 50th Anniversary of Disneyland,
1089
+ the Finding Nemo Submarine Voyage was officially announced at the
1090
+ new Turtle Talk...
1091
+ The attraction reuses the eight original 1959 Submarine Voyage through
1092
+ Liquid Space attraction...
1093
+ Predicted Answers
1094
+ BARTbase
1095
+ Yes, that’s right. You’re a fan of the “Fantasy” film,
1096
+ so I.
1097
+ BARTlarge
1098
+ Yes, the ride is based on the characters and settings
1099
+ of the 2003 Disney · Pixar film
1100
+ GPT-2small
1101
+ No, it was originally a way to show that you love
1102
+ Finding Nemo.
1103
+ GPT-2medium
1104
+ Yes, it has operated from 1959 to 1998.
1105
+ INFO (Ours)
1106
+ No, this attraction is actually a re-theme of the
1107
+ classic submarine voyage attraction that operated
1108
+ from 1959 to 1998. The attraction is based on the
1109
+ characters and settings of the 2003 Disney Pixar
1110
+ film Finding Nemo, which is your favorite cartoon.
1111
+ Ground Truth Response
1112
+ No, your favorite cartoon is a new addition to this ride. The current
1113
+ Finding Nemo ride is a re-theming of the classic “Submarine Voyage”
1114
+ attraction that operated here from 1959 to 1998.
1115
+ Table 7: Qualitative result. All the predicted results
1116
+ in grounding task are from our model, INFO and it
1117
+ predicts the correct answers in both tasks. We add other
1118
+ baselines’ responses for comparative analysis.
1119
+ truth knowledge resulting in less engaged answers
1120
+ without any persona-related phrases. Although
1121
+ BARTbase seems to employ a persona sentence in
1122
+ the form of the phrase “You’re fan of the Fantasy
1123
+ film”, its used sentence does not appear in human’s
1124
+ personal profiles. This result also indicates that
1125
+ the utterance is hard to identify its provenance
1126
+ on the knowledge source. Moreover, GPT-2small
1127
+ generates the utterance that contradicts the ground
1128
+ truth knowledge. From the result, we can find that
1129
+ the generated responses from the baselines show
1130
+ hallucinations on both persona and knowledge.
1131
+ Unlike other baselines, our model blends ground
1132
+ truth knowledge and persona sentence into the
1133
+
1134
+ response with less hallucination and engagingness.
1135
+ In addition, the retrieved knowledge source that
1136
+ our model refers to provides interpretability and
1137
+ provenance of the responses to the users. More
1138
+ examples are also depicted in Appendix C.
1139
+ 6
1140
+ Conclusions
1141
+ In this paper, we presented a conversational
1142
+ agent that generates responses grounding the
1143
+ user’s persona and external knowledge. We
1144
+ utilized poly-encoder-based candidate scoring
1145
+ for
1146
+ each
1147
+ grounding
1148
+ task.
1149
+ We
1150
+ additionally
1151
+ implement persona level indicator to consider
1152
+ multiple persona selections for delicate persona
1153
+ grounding. With predicted sources, we construct
1154
+ a
1155
+ knowledge-persona
1156
+ enhanced
1157
+ query
1158
+ to
1159
+ retrieve latent paragraphs, and they are used
1160
+ to generate informative and engaging responses by
1161
+ marginalizing loss for each token. We show that
1162
+ our method achieves the state-of-the-art (SoTA)
1163
+ score in both grounding and generation tasks in the
1164
+ persona-knowledge conversation dataset. We also
1165
+ demonstrate that the responses from INFO show
1166
+ less hallucination and more engagingness through
1167
+ human evaluation and qualitative analysis. We also
1168
+ compare the grounding modules and retrievers to
1169
+ show INFO’s effectiveness.
1170
+ 7
1171
+ Limitations
1172
+ The proposed model INFO has limitations. Given
1173
+ the INFO’s settings, the model cannot deal with
1174
+ real-world application, which means the absence
1175
+ of ground truth knowledge or persona candidates
1176
+ in the grounding task. We also conducted the
1177
+ human evaluation to evaluate the capability of
1178
+ the proposed model’s mitigating hallucination
1179
+ in dialogue generation. However, the number
1180
+ of cases is relatively small for evaluating the
1181
+ capability of mitigating hallucination. Finally,
1182
+ INFO demands high GPU computation resources,
1183
+ since it marginalizes loss at the token level.
1184
+ We plan to improve the INFO for future work.
1185
+ We will train and evaluate the INFO in open-
1186
+ domain settings as well as real-world settings for
1187
+ the applicable conversational agents. Moreover, we
1188
+ will conduct human evaluations with more cases.
1189
+ Especially, we will enhance the way of quantitative
1190
+ measurement for the model’s hallucinated answers.
1191
+ Last but not least, we will improve the generator
1192
+ of INFO with more computationally efficient
1193
+ components.
1194
+ 8
1195
+ Acknowledgement
1196
+ This
1197
+ work
1198
+ was
1199
+ supported
1200
+ by
1201
+ Institute
1202
+ of
1203
+ Information
1204
+ &
1205
+ communications
1206
+ Technology
1207
+ Planning & Evaluation(IITP) grant funded by the
1208
+ Korea government(MSIT) (No. 2020-0-00368,
1209
+ A
1210
+ Neural-Symbolic
1211
+ Model
1212
+ for
1213
+ Knowledge
1214
+ Acquisition and Inference Techniques), This
1215
+ research was supported by the MSIT(Ministry
1216
+ of
1217
+ Science
1218
+ and
1219
+ ICT),
1220
+ Korea,
1221
+ under
1222
+ the
1223
+ ITRC(Information Technology Research Center)
1224
+ support
1225
+ program(IITP-2022-2018-0-01405)
1226
+ supervised by the IITP(Institute for Information
1227
+ & Communications Technology Planning &
1228
+ Evaluation), This work was supported by Institute
1229
+ for Information & communications Technology
1230
+ Planning & Evaluation(IITP) grant funded by the
1231
+ Korea government(MSIT) (No. 2022-0-00369,
1232
+ (Part 4) Development of AI Technology to support
1233
+ Expert Decision-making that can Explain the
1234
+ Reasons/Grounds for Judgment Results based on
1235
+ Expert Knowledge)
1236
+ References
1237
+ Glenn W Brier et al. 1950. Verification of forecasts
1238
+ expressed in terms of probability. Monthly weather
1239
+ review, 78(1):1–3.
1240
+ Hyundong Cho and Jonathan May. 2020. Grounding
1241
+ conversations with improvised dialogues.
1242
+ In
1243
+ Proceedings of the 58th Annual Meeting of the
1244
+ Association for Computational Linguistics, pages
1245
+ 2398–2413, Online. Association for Computational
1246
+ Linguistics.
1247
+ Emily Dinan, Stephen Roller, Kurt Shuster, Angela
1248
+ Fan, Michael Auli, and Jason Weston. 2018. Wizard
1249
+ of wikipedia: Knowledge-powered conversational
1250
+ agents.
1251
+ In International Conference on Learning
1252
+ Representations.
1253
+ Jianfeng Gao, Michel Galley, and Lihong Li. 2018.
1254
+ Neural approaches to conversational ai. ACL 2018,
1255
+ page 2.
1256
+ Marjan Ghazvininejad, Chris Brockett, Ming-Wei
1257
+ Chang, Bill Dolan, Jianfeng Gao, Wen-tau Yih,
1258
+ and Michel Galley. 2018. A knowledge-grounded
1259
+ neural conversation model. In Thirty-Second AAAI
1260
+ Conference on Artificial Intelligence.
1261
+ Samuel Humeau, Kurt Shuster, Marie-Anne Lachaux,
1262
+ and
1263
+ Jason
1264
+ Weston.
1265
+ 2019.
1266
+ Poly-encoders:
1267
+ Architectures and pre-training strategies for fast and
1268
+ accurate multi-sentence scoring.
1269
+ In International
1270
+ Conference on Learning Representations.
1271
+ Yoonna Jang, Jungwoo Lim, Yuna Hur, Dongsuk
1272
+ Oh, Suhyune Son, Yeonsoo Lee, Donghoon Shin,
1273
+
1274
+ Seungryong Kim, and Heuiseok Lim. 2022. Call for
1275
+ customized conversation: Customized conversation
1276
+ grounding persona and knowledge. In Proceedings
1277
+ of the AAAI Conference on Artificial Intelligence,
1278
+ volume 36, pages 10803–10812.
1279
+ Ziwei Ji, Nayeon Lee, Rita Frieske, Tiezheng Yu,
1280
+ Dan Su, Yan Xu, Etsuko Ishii, Yejin Bang, Andrea
1281
+ Madotto, and Pascale Fung. 2022.
1282
+ Survey of
1283
+ hallucination in natural language generation. arXiv
1284
+ preprint arXiv:2202.03629.
1285
+ Thorsten Joachims. 1996.
1286
+ A probabilistic analysis
1287
+ of
1288
+ the
1289
+ rocchio
1290
+ algorithm
1291
+ with
1292
+ tfidf
1293
+ for
1294
+ text
1295
+ categorization.
1296
+ Technical report, Carnegie-mellon
1297
+ univ pittsburgh pa dept of computer science.
1298
+ Jeff Johnson, Matthijs Douze, and Hervé Jégou. 2019.
1299
+ Billion-scale similarity search with GPUs.
1300
+ IEEE
1301
+ Transactions on Big Data, 7(3):535–547.
1302
+ Vladimir Karpukhin, Barlas Oguz, Sewon Min, Patrick
1303
+ Lewis, Ledell Wu, Sergey Edunov, Danqi Chen, and
1304
+ Wen-tau Yih. 2020.
1305
+ Dense passage retrieval for
1306
+ open-domain question answering.
1307
+ In Proceedings
1308
+ of the 2020 Conference on Empirical Methods
1309
+ in Natural Language Processing (EMNLP), pages
1310
+ 6769–6781.
1311
+ Diederik P Kingma and Jimmy Ba. 2014. Adam: A
1312
+ method for stochastic optimization. arXiv preprint
1313
+ arXiv:1412.6980.
1314
+ Tom
1315
+ Kwiatkowski,
1316
+ Jennimaria
1317
+ Palomaki,
1318
+ Olivia
1319
+ Redfield, Michael Collins, Ankur Parikh, Chris
1320
+ Alberti, Danielle Epstein, Illia Polosukhin, Jacob
1321
+ Devlin, Kenton Lee, et al. 2019. Natural questions:
1322
+ A benchmark for question answering research.
1323
+ Transactions of the Association for Computational
1324
+ Linguistics, 7:452–466.
1325
+ Mike Lewis, Yinhan Liu, Naman Goyal, Marjan
1326
+ Ghazvininejad,
1327
+ Abdelrahman
1328
+ Mohamed,
1329
+ Omer
1330
+ Levy, Veselin Stoyanov, and Luke Zettlemoyer.
1331
+ 2020a.
1332
+ Bart: Denoising sequence-to-sequence
1333
+ pre-training
1334
+ for
1335
+ natural
1336
+ language
1337
+ generation,
1338
+ translation, and comprehension.
1339
+ In Proceedings
1340
+ of the 58th Annual Meeting of the Association for
1341
+ Computational Linguistics, pages 7871–7880.
1342
+ Patrick
1343
+ Lewis,
1344
+ Ethan
1345
+ Perez,
1346
+ Aleksandra
1347
+ Piktus,
1348
+ Fabio Petroni, Vladimir Karpukhin, Naman Goyal,
1349
+ Heinrich Küttler, Mike Lewis, Wen-tau Yih, Tim
1350
+ Rocktäschel, et al. 2020b.
1351
+ Retrieval-augmented
1352
+ generation
1353
+ for
1354
+ knowledge-intensive
1355
+ nlp
1356
+ tasks.
1357
+ Advances
1358
+ in
1359
+ Neural
1360
+ Information
1361
+ Processing
1362
+ Systems, 33:9459–9474.
1363
+ Jiwei Li, Michel Galley, Chris Brockett, Jianfeng
1364
+ Gao, and William B Dolan. 2016.
1365
+ A diversity-
1366
+ promoting objective function for neural conversation
1367
+ models.
1368
+ In Proceedings of the 2016 Conference
1369
+ of the North American Chapter of the Association
1370
+ for Computational Linguistics: Human Language
1371
+ Technologies, pages 110–119.
1372
+ Chin-Yew Lin. 2004.
1373
+ ROUGE: A package for
1374
+ automatic evaluation of summaries.
1375
+ In Text
1376
+ Summarization
1377
+ Branches
1378
+ Out,
1379
+ pages
1380
+ 74–81,
1381
+ Barcelona, Spain. Association for Computational
1382
+ Linguistics.
1383
+ Qian Liu, Yihong Chen, Bei Chen, Jian-Guang Lou,
1384
+ Zixuan Chen, Bin Zhou, and Dongmei Zhang.
1385
+ 2020.
1386
+ You impress me: Dialogue generation
1387
+ via mutual persona perception.
1388
+ In Proceedings
1389
+ of the 58th Annual Meeting of the Association
1390
+ for Computational Linguistics. Association for
1391
+ Computational Linguistics.
1392
+ Ryan Lowe, Nissan Pow, Iulian Vlad Serban, and
1393
+ Joelle Pineau. 2015. The ubuntu dialogue corpus:
1394
+ A large dataset for research in unstructured multi-
1395
+ turn dialogue systems. In Proceedings of the 16th
1396
+ Annual Meeting of the Special Interest Group on
1397
+ Discourse and Dialogue, pages 285–294.
1398
+ Gary Marcus. 2020. The next decade in ai: four steps
1399
+ towards robust artificial intelligence. arXiv preprint
1400
+ arXiv:2002.06177.
1401
+ Pierre-Emmanuel Mazare, Samuel Humeau, Martin
1402
+ Raison, and Antoine Bordes. 2018.
1403
+ Training
1404
+ millions of personalized dialogue agents.
1405
+ In
1406
+ Proceedings of the 2018 Conference on Empirical
1407
+ Methods in Natural Language Processing, pages
1408
+ 2775–2779.
1409
+ Kishore Papineni, Salim Roukos, Todd Ward, and Wei
1410
+ jing Zhu. 2002.
1411
+ Bleu: a method for automatic
1412
+ evaluation of machine translation. pages 311–318.
1413
+ Ashwin Paranjape, Omar Khattab, Christopher Potts,
1414
+ Matei Zaharia, and Christopher D Manning. 2021.
1415
+ Hindsight: Posterior-guided training of retrievers for
1416
+ improved open-ended generation. In International
1417
+ Conference on Learning Representations.
1418
+ Fabio Petroni, Patrick Lewis, Aleksandra Piktus, Tim
1419
+ Rocktäschel, Yuxiang Wu, Alexander H Miller,
1420
+ and Sebastian Riedel. 2020.
1421
+ How context affects
1422
+ language models’ factual predictions. In Automated
1423
+ Knowledge Base Construction.
1424
+ Maja
1425
+ Popovi´c.
1426
+ 2017.
1427
+ chrF++:
1428
+ words
1429
+ helping
1430
+ character
1431
+ n-grams.
1432
+ In
1433
+ Proceedings
1434
+ of
1435
+ the
1436
+ Second Conference on Machine Translation, pages
1437
+ 612–618, Copenhagen, Denmark. Association for
1438
+ Computational Linguistics.
1439
+ Alec Radford, Jeffrey Wu, Rewon Child, David Luan,
1440
+ Dario Amodei, Ilya Sutskever, et al. 2019. Language
1441
+ models are unsupervised multitask learners. OpenAI
1442
+ blog, 1(8):9.
1443
+ Colin Raffel, Noam Shazeer, Adam Roberts, Katherine
1444
+ Lee, Sharan Narang, Michael Matena, Yanqi Zhou,
1445
+ Wei Li, and Peter J Liu. 2020.
1446
+ Exploring the
1447
+ limits of transfer learning with a unified text-to-text
1448
+ transformer. Journal of Machine Learning Research,
1449
+ 21:1–67.
1450
+
1451
+ Adam Roberts, Colin Raffel, and Noam Shazeer. 2020.
1452
+ How much knowledge can you pack into the
1453
+ parameters of a language model?
1454
+ In Proceedings
1455
+ of the 2020 Conference on Empirical Methods
1456
+ in Natural Language Processing (EMNLP), pages
1457
+ 5418–5426.
1458
+ Abigail See, Stephen Roller, Douwe Kiela, and
1459
+ Jason Weston. 2019.
1460
+ What makes a good
1461
+ conversation? how controllable attributes affect
1462
+ human judgments.
1463
+ In Proceedings of the 2019
1464
+ Conference of the North American Chapter of the
1465
+ Association for Computational Linguistics: Human
1466
+ Language Technologies, Volume 1 (Long and Short
1467
+ Papers), pages 1702–1723.
1468
+ Kurt Shuster, Spencer Poff, Moya Chen, Douwe Kiela,
1469
+ and Jason Weston. 2021.
1470
+ Retrieval augmentation
1471
+ reduces hallucination in conversation. In Findings
1472
+ of the Association for Computational Linguistics:
1473
+ EMNLP 2021, pages 3784–3803.
1474
+ Alessandro Sordoni, Michel Galley, Michael Auli,
1475
+ Chris Brockett, Yangfeng Ji, Margaret Mitchell,
1476
+ Jian-Yun
1477
+ Nie,
1478
+ Jianfeng
1479
+ Gao,
1480
+ and
1481
+ William
1482
+ B
1483
+ Dolan.
1484
+ 2015.
1485
+ A
1486
+ neural
1487
+ network
1488
+ approach
1489
+ to context-sensitive generation of conversational
1490
+ responses. In Proceedings of the 2015 Conference
1491
+ of the North American Chapter of the Association
1492
+ for Computational Linguistics: Human Language
1493
+ Technologies, pages 196–205.
1494
+ Oriol
1495
+ Vinyals
1496
+ and
1497
+ Quoc
1498
+ V
1499
+ Le.
1500
+ 2015.
1501
+ A
1502
+ neural conversational model.
1503
+ arXiv preprint
1504
+ arXiv:1506.05869.
1505
+ Thomas Wolf, Lysandre Debut, Victor Sanh, Julien
1506
+ Chaumond,
1507
+ Clement
1508
+ Delangue,
1509
+ Anthony
1510
+ Moi,
1511
+ Pierric Cistac, Tim Rault, Rémi Louf, Morgan
1512
+ Funtowicz, Joe Davison, Sam Shleifer, Patrick
1513
+ von Platen, Clara Ma, Yacine Jernite, Julien Plu,
1514
+ Canwen Xu, Teven Le Scao, Sylvain Gugger,
1515
+ Mariama Drame, Quentin Lhoest, and Alexander M.
1516
+ Rush. 2020. Transformers: State-of-the-art natural
1517
+ language processing.
1518
+ In Proceedings of the 2020
1519
+ Conference on Empirical Methods in Natural
1520
+ Language
1521
+ Processing:
1522
+ System
1523
+ Demonstrations,
1524
+ pages 38–45, Online. Association for Computational
1525
+ Linguistics.
1526
+ Thomas Wolf, Victor Sanh, Julien Chaumond, and
1527
+ Clement Delangue. 2019.
1528
+ Transfertransfo: A
1529
+ transfer learning approach for neural network
1530
+ based conversational agents.
1531
+ arXiv preprint
1532
+ arXiv:1901.08149.
1533
+ Liu Yang, Minghui Qiu, Chen Qu, Jiafeng Guo,
1534
+ Yongfeng Zhang, W Bruce Croft, Jun Huang, and
1535
+ Haiqing Chen. 2018.
1536
+ Response ranking with
1537
+ deep matching networks and external knowledge in
1538
+ information-seeking conversation systems. In The
1539
+ 41st international acm sigir conference on research
1540
+ & development in information retrieval, pages 245–
1541
+ 254.
1542
+ Saizheng Zhang, Emily Dinan, Jack Urbanek, Arthur
1543
+ Szlam, Douwe Kiela, and Jason Weston. 2018a.
1544
+ Personalizing dialogue agents: I have a dog, do you
1545
+ have pets too? In Proceedings of the 56th Annual
1546
+ Meeting of the Association for Computational
1547
+ Linguistics (Volume 1: Long Papers), pages 2204–
1548
+ 2213.
1549
+ Tianyi
1550
+ Zhang*,
1551
+ Varsha
1552
+ Kishore*,
1553
+ Felix
1554
+ Wu*,
1555
+ Kilian Q. Weinberger, and Yoav Artzi. 2020.
1556
+ Bertscore:
1557
+ Evaluating
1558
+ text
1559
+ generation
1560
+ with
1561
+ bert.
1562
+ In International Conference on Learning
1563
+ Representations.
1564
+ Zhuosheng Zhang, Jiangtong Li, Pengfei Zhu, Hai
1565
+ Zhao, and Gongshen Liu. 2018b. Modeling multi-
1566
+ turn conversation with deep utterance aggregation.
1567
+ In Proceedings of the 27th International Conference
1568
+ on Computational Linguistics, pages 3740–3752.
1569
+
1570
+ A
1571
+ Automatic Evaluation on Official Test Set
1572
+ Models
1573
+ Generation
1574
+ Grounding (Acc.)
1575
+ chrF++
1576
+ BLEU
1577
+ R-1
1578
+ R-2
1579
+ R-L
1580
+ Persona
1581
+ Knowledge
1582
+ GPT2small
1583
+ 28.83
1584
+ 11.60
1585
+ 36.28
1586
+ 19.56
1587
+ 32.42
1588
+ 67.83
1589
+ 70.95
1590
+ GPT2medium
1591
+ 30.34
1592
+ 12.58
1593
+ 38.35
1594
+ 21.16
1595
+ 34.34
1596
+ 67.64
1597
+ 72.46
1598
+ BARTbase
1599
+ 29.80
1600
+ 12.15
1601
+ 36.26
1602
+ 19.73
1603
+ 32.06
1604
+ 67.66
1605
+ 72.02
1606
+ BARTlarge
1607
+ 30.63
1608
+ 11.86
1609
+ 36.36
1610
+ 19.42
1611
+ 31.73
1612
+ 67.62
1613
+ 70.53
1614
+ INFO (RS)
1615
+ 52.81
1616
+ 29.41
1617
+ 56.37
1618
+ 40.41
1619
+ 51.16
1620
+ 82.74
1621
+ 98.88
1622
+ INFO (RT)
1623
+ 54.61
1624
+ 32.33
1625
+ 58.27
1626
+ 42.39
1627
+ 53.09
1628
+ 80.83
1629
+ 99.10
1630
+ Table 8: Main results on the official test set. RT indicates the model with RAG-Token model as generator. The
1631
+ models are evaluated by generation metrics, including chrF++, BLEU, ROUGE-1 (R-1), ROUGE-2 (R-2) and
1632
+ ROUGE-L (R-L). The accuracy for persona grounding task and knowledge grounding task are also noted. Since
1633
+ BERTscore is not the official generation metric, we cannot evaluate the result on the metric as the ground truth of
1634
+ the test is not yet disclosed.
1635
+ B
1636
+ Human Evaluation Distribution on Each Criteria
1637
+ (a) Adequacy
1638
+ (b) Fluency
1639
+ Figure 2: The distribution of the rank on the adequacy and fluency criteria. Guide A to E indicates INFO, BARTbase,
1640
+ BARTlarge, GPT-2small, and GPT-2medium, in the order.
1641
+
1642
+ Guide A
1643
+ Guide B
1644
+ 100
1645
+ Guide C
1646
+ Guide D
1647
+ Guide E
1648
+ 80
1649
+ f evaluation
1650
+ 60
1651
+ of
1652
+ 40
1653
+ #
1654
+ 20
1655
+ 0
1656
+ 1
1657
+ 2
1658
+ 3
1659
+ 4
1660
+ 5
1661
+ RankGuide A
1662
+ Guide B
1663
+ 100
1664
+ Guide C
1665
+ Guide D
1666
+ Guide E
1667
+ 80
1668
+ f evaluation
1669
+ 60
1670
+ JO
1671
+ 40
1672
+ #
1673
+ 20
1674
+ 0
1675
+ 1
1676
+ 2
1677
+ 3
1678
+ 4
1679
+ 5
1680
+ Rank(a) Provenance
1681
+ (b) Engagingness
1682
+ Figure 3: The distribution of the rank on the provenance and engagingness criteria. Guide A to E indicates INFO,
1683
+ BARTbase, BARTlarge, GPT-2small, and GPT-2medium, in the order.
1684
+ Figure 4: The distribution of the rank on the less hallucination criterion. Note that the highest rank (1) means the
1685
+ most hallucinated. Guide A to E indicates INFO, BARTbase, BARTlarge, GPT-2small, and GPT-2medium, in the
1686
+ order.
1687
+
1688
+ Guide A
1689
+ Guide B
1690
+ 100
1691
+ Guide C
1692
+ Guide D
1693
+ Guide E
1694
+ 80
1695
+ f evaluation
1696
+ 60
1697
+ of
1698
+ 40
1699
+ #
1700
+ 20
1701
+ 0
1702
+ 1
1703
+ 2
1704
+ 3
1705
+ 4
1706
+ 5
1707
+ RankGuide A
1708
+ 100
1709
+ Guide B
1710
+ Guide C
1711
+ Guide D
1712
+ Guide E
1713
+ 80
1714
+ f evaluation
1715
+ 60
1716
+ of
1717
+ 40
1718
+ #
1719
+ 20
1720
+ 0
1721
+ 1
1722
+ 2
1723
+ 3
1724
+ 4
1725
+ 5
1726
+ RankGuide A
1727
+ Guide B
1728
+ 100
1729
+ Guide C
1730
+ Guide D
1731
+ Guide E
1732
+ 80
1733
+ f evaluation
1734
+ 60
1735
+ of
1736
+ 40
1737
+ #
1738
+ 20
1739
+ 0
1740
+ 2
1741
+ 3
1742
+ 5
1743
+ 1
1744
+ 4
1745
+ RankC
1746
+ Qualitative Results
1747
+ Given Landmark
1748
+ Nocton Hall
1749
+ Dialogue
1750
+ Human: I know this place, but I don’t remember the name of this place.
1751
+ Human’s Persona
1752
+ I have a hall in my house.
1753
+ I have worked with military hospital.
1754
+ I would like to go to England.
1755
+ I have heard about Frederick John Robinson.
1756
+ I have respect to American Officers.
1757
+ Ground Truth Knowledge (Grounding)
1758
+ Today the site is maintained by English Heritage.
1759
+ Retrieved Knowledge (Generation)
1760
+ “Hogesdon” is first recorded in the Domesday Book, meaning an Anglo-
1761
+ Saxon farm (or “fortified enclosure”) belonging to Hoch, or Hocq....
1762
+ By 1677, the church was in such poor structural condition that the Dean
1763
+ of Chichester convened a consistory court with three parishioners and
1764
+ asked them why repairs had not been carried out...
1765
+ he south transept had historically served as the mausoleum for the
1766
+ Cavendish family, who resided at nearby Latimer...
1767
+ Following the diminished influence of the ancient Priory, predecessor of
1768
+ the two parishes of St Bartholomew, disputes began to arise over rights
1769
+ to tithes and taxes payable by lay residents who claimed allegiance with
1770
+ the nearby and anciently associated parish of St Botolph Aldersgate -
1771
+ an unintended consequence and legacy of King Kenry VIII’s religious
1772
+ reforms.
1773
+ a wall-mounted stone pulpit, a stone altar, a series of tall, pointed
1774
+ windows high in the walls, an unadorned stone font and a short wooden
1775
+ steeple-little more than an extended belfry-extending from the nave
1776
+ roof...a wall-mounted stone pulpit, a stone altar, a series of tall, pointed
1777
+ windows high in the walls, an unadorned stone font and a short wooden
1778
+ steeple-little more than an extended belfry-extending from the nave roof...
1779
+ Predicted Answers
1780
+ BARTbase
1781
+ This is the Nocton Hall, a historic Grade II listed
1782
+ building in the village of Nocton,
1783
+ BARTlarge
1784
+ Nocton Hall is a historic Grade II listed building in
1785
+ the village of Nocton, in Lincoln
1786
+ GPT-2small
1787
+ This is Nocton Hall, a historic Grade II listed
1788
+ building in the village of Nocton, in
1789
+ GPT-2medium
1790
+ This is the Nocton Hall, a historic Grade II listed
1791
+ building in the village of Nocton,
1792
+ INFO (Ours)
1793
+ This will be a nice vision for you. Nocton Hall is
1794
+ a historic Grade II listed building in England that
1795
+ you would like to visit.
1796
+ Ground Truth Response
1797
+ You can see Nocton Hall in the village of Nocton, in Lincolnshire of
1798
+ England, the country you want to visit.
1799
+ Given Landmark
1800
+ Maiden Castle, Dorset
1801
+ Dialogue
1802
+ Human: Wow, this is amazing! What is this?
1803
+ Machine: It is Maiden Castle in Dorset. I thought you would like it since
1804
+ you are interested in historic forts.
1805
+ Human: Who owns the site today?
1806
+ Human’s Persona
1807
+ I like Britain.
1808
+ I have been to Dorset.
1809
+ I am interested in historic forts.
1810
+ I hope to work for English Heritage.
1811
+ I would like to visit an old fort.
1812
+ Ground Truth Knowledge (Grounding)
1813
+ Today the site is protected as a Scheduled Ancient Monument and is
1814
+ maintained by English Heritage.
1815
+ Retrieved Knowledge (Generation)
1816
+ Portland Castle is an artillery fort constructed by Henry VIII on the Isle
1817
+ of Portland, Dorset, between 1539 and 1541...
1818
+ this version of events, or even that the hill fort was attacked by the
1819
+ Romans...
1820
+ Between 1985 and 1986 further excavations under Niall Sharples were
1821
+ prompted by the hill fort’s deteriorating condition, partly caused by the
1822
+ large number of visitors to the site...
1823
+ a Tudor rose and the initials E.R. (Elizabeth Regina), has been preserved
1824
+ and can be seen in the inner bailey of the castle mounted on a replica
1825
+ carriage...
1826
+ Constructed on a territorial boundary in about 600 BC, the first hill fort
1827
+ at Maiden Castle was a 6.4-hectare (16-acre) area surrounded by a single
1828
+ ditch...
1829
+ Predicted Answers
1830
+ BARTbase
1831
+ The site is maintained by English Heritage, the
1832
+ country you are from.
1833
+ BARTlarge
1834
+ Today the site is owned by English Heritage.....
1835
+ GPT-2small
1836
+ Today the site is protected as a Scheduled Ancient
1837
+ Monument and is maintained by English Heritage.
1838
+ GPT-2medium
1839
+ Today the site is maintained by English Heritage.
1840
+ INFO (Ours)
1841
+ Today the site is owned by English Heritage. You
1842
+ may wish to research this further since you hope to
1843
+ work for English Heritage.
1844
+ Ground Truth Response
1845
+ It is owned by English Heritage; a company you hope to work for.
1846
+ Table 9: Qualitative results. All the predicted results in grounding task are from our model, INFO and it predicts
1847
+ the correct answers in both tasks. We add other baselines’ responses for comparative analysis.
1848
+
7dE0T4oBgHgl3EQffQBI/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
9NFQT4oBgHgl3EQf5jYf/content/2301.13435v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:bda137ef3a8f36545d66dcde9d276f814317fe7b42111521722b4ff4759ff344
3
+ size 1641344
9NFQT4oBgHgl3EQf5jYf/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:5d2687bbee34704a339ae54979fd70f79a88bdcab040ba87a271e9899cbe501f
3
+ size 8585261
9NFQT4oBgHgl3EQf5jYf/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:1f44b2bc34d59bfe025b6852a0f7c5c45471ce943f80f4cb8a5b5d41748a8778
3
+ size 269392
9dE4T4oBgHgl3EQf3Q3I/content/tmp_files/2301.05305v1.pdf.txt ADDED
@@ -0,0 +1,787 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Reinforcement Learning-based Joint Handover and
2
+ Beam Tracking in Millimeter-wave Networks
3
+ Sara Khosravi∗, Hossein S. Ghadikolaei‡, Jens Zander∗, and Marina Petrova ∗†
4
+ ∗School of EECS, KTH Royal Institute of the Technology, Stockholm, Sweden,
5
+ † Mobile Communications and Computing, RWTH Aachen University, Germany, ‡ Ericsson Research, Sweden
6
+ Email: {sarakhos, jenz, petrovam} @kth.se, [email protected]
7
+ Abstract—In this paper, we develop an algorithm for joint
8
+ handover and beam tracking in millimeter-wave (mmWave)
9
+ networks. The aim is to provide a reliable connection in terms of
10
+ the achieved throughput along the trajectory of the mobile user
11
+ while preventing frequent handovers. We model the association
12
+ problem as an optimization problem and propose a reinforcement
13
+ learning-based solution. Our approach learns whether and when
14
+ beam tracking and handover should be performed and chooses
15
+ the target base stations. In the case of beam tracking, we
16
+ propose a tracking algorithm based on measuring a small spatial
17
+ neighbourhood of the optimal beams in the previous time slot.
18
+ Simulation results in an outdoor environment show the superior
19
+ performance of our proposed solution in achievable throughput
20
+ and the number of handovers needed in comparison to a multi-
21
+ connectivity baseline and a learning-based handover baseline.
22
+ Index Terms—Millimeter-wave, user association, beam track-
23
+ ing, handover, reinforcement learning.
24
+ I. INTRODUCTION
25
+ Millimeter-wave (mmWave) is a key radio access technol-
26
+ ogy for beyond 5G communication systems, offering ultra-
27
+ high data rates due to a large amount of free spectrum [1].
28
+ However, due to the fewer scattering paths and significant
29
+ penetration loss, mmWave links are vulnerable to static or
30
+ dynamic obstacles. To overcome such severe loss, both base
31
+ station (BS) and user equipment (UE) may need directional
32
+ communication using a large number of antennas, which may
33
+ result in frequent misalignment of beams due to mobility and
34
+ blockage. Hence, finding and maintaining the optimal beam
35
+ directions (beam alignment) is necessary. The lengthy period
36
+ to achieve the beam alignment (hundreds of milliseconds
37
+ to seconds [2]) results in a high cell search time or BS
38
+ discovery time in mmWave systems. As reported in [3], the
39
+ BS discovery time which is the time required to search the
40
+ target BS when the handover command is received by the
41
+ UE is about 200 ms. Moreover, to improve the capacity and
42
+ coverage the density of the BSs is usually high in mmWave
43
+ systems [1]. Hence, conventional handover methods based on
44
+ instantaneous received signal power can cause unnecessarily
45
+ frequent handovers and a ping-pong effect. This leads to a
46
+ severe drop in service reliability. Therefore, fast BS discovery
47
+ (finding target BS in the handover process), and efficient
48
+ handover execution techniques, will be required to use the
49
+ full promise of mmWave cellular networks.
50
+ The spatial mmWave channel can be approximated by a
51
+ few dominant paths, where each path can be defined with
52
+ its angle of departure (AoD), angle of arrival (AoA) and
53
+ gain [4]. Hence, one can only estimate these path parameters
54
+ instead of a large dimensional channel matrix [5], [6]. The
55
+ process of identifying the dominant paths is called beam
56
+ training. However, due to the dynamic environment, frequent
57
+ beam training may cause high overhead1. Temporal correlation
58
+ of spatial mmWave channel can be employed to accelerate
59
+ the beam training process by tracking the variation of the
60
+ dominant path directions [6].
61
+ A. Related Work
62
+ To address the link failure and throughput degradation in
63
+ a dynamic environment, the multi-connectivity technique has
64
+ been vastly analyzed in literature [7], [8]. In this technique, the
65
+ UE keeps its connection to multiple BSs (either at mmWave
66
+ band or sub-6 GHz band). However, power consumption,
67
+ synchronization and the need for frequent tracking are the
68
+ main challenges. In the 3GPP standard (release 16) two
69
+ handover techniques are introduced to improve the link robust-
70
+ ness during mobility: dual active protocol stack (DAPS), and
71
+ conditional handover (CHO) [9]. In the DAPS, the connection
72
+ to the current serving BS is maintained until the connection
73
+ to the target BS is fully established. In the CHO, the UE is
74
+ configured with multiple target BSs. During the handover, the
75
+ UE can select one of the configured BSs as the target BS
76
+ during the RRC reconfiguration message. Although CHO can
77
+ decrease the handover failure probability, it may increase the
78
+ handover latency if the UE asks for multiple handovers during
79
+ a single RRC reconfiguration [7].
80
+ Applying machine learning as the main decision-maker tool
81
+ to make the optimal handover decision and choose the target
82
+ BS has been also studied in the literature [10], [11]. The
83
+ authors in [10] proposed a reinforcement learning (RL) based
84
+ handover policy to reduce the number of handovers while
85
+ keeping the quality of service in heterogeneous networks.
86
+ In [11] an intelligent handover method based on choosing
87
+ the backup solution for each serving link to maximize the
88
+ aggregate rate along a trajectory has been proposed.
89
+ 1Overhead depends on the training time compared with the changes in the
90
+ environment.
91
+ arXiv:2301.05305v1 [eess.SY] 12 Jan 2023
92
+
93
+ In terms of beam tracking, authors in [12] applied the
94
+ correlation of spatial mmWave channel in adjacent locations
95
+ and proposed the beam steering method based on searching
96
+ over a small angular space in the vicinity of the previously
97
+ known valid beams. The authors in [6] applied machine
98
+ learning to the tracking procedure to extract useful information
99
+ from the history of AoD tracking.
100
+ All the aforementioned works only take handover or beam
101
+ tracking issues into account. Additionally, they do not study
102
+ the impact of selecting beam tracking and handover on the
103
+ achieved throughput of the UE along its trajectory and instead
104
+ focus on the achieved rate as the primary performance metric.
105
+ B. Our Contributions
106
+ In this paper, we develop a novel joint handover and beam
107
+ tracking algorithm in a mmWave network under mobility. The
108
+ algorithm aims to associate the UEs to BSs that maximize
109
+ the sum achieved throughput along the trajectory and ensure
110
+ the achieved throughput in each location of the trajectory
111
+ is higher than a pre-defined threshold. The user association
112
+ process is defined as the process of determining whether a user
113
+ is associated with a particular BS before data transmissions
114
+ commence. In the case of handover, the UE is associated with a
115
+ new BS, whereas in the case of beam tracking, the UE remains
116
+ associated with the serving BS from the previous time slot. The
117
+ main contributions of our paper are summarized as below:
118
+ • System Modeling: We model the user association prob-
119
+ lem as a non-convex optimization problem. Unlike the
120
+ existing works in the literature, we consider achieved
121
+ throughput as the main performance metric to measure
122
+ the effect of handover or beam tracking on the UEs’
123
+ quality of service.
124
+ • Learning-based Solution: The objective function in our
125
+ proposed user association problem highly depends on the
126
+ user association mechanism. We utilize the reinforcement
127
+ learning (RL) algorithm to approximate the solution to
128
+ this problem. The aim is to decide whether to run a beam
129
+ tracking algorithm or a handover algorithm.
130
+ • Joint Handover and Beam Tracking Algorithm: In the
131
+ case of a handover decision, the target BS will be
132
+ recognized as the output of the RL algorithm. In the
133
+ case of beam tracking, the search space will be defined
134
+ based on our proposed tracking algorithm by searching
135
+ the directions in the small spatial neighbourhood of the
136
+ previously selected optimal directions.
137
+ • Empirical Evaluation: We apply ray tracing with a
138
+ real building data map as the input. The results show
139
+ the effectiveness of our proposed method in achieving
140
+ throughput along trajectories and decreasing the number
141
+ of handovers.
142
+ The rest of the paper is organized as follows. We introduce
143
+ the system model and problem formulation in Section II. In
144
+ Section III, we propose our method. We present the numerical
145
+ results in Section IV and, conclude our work in Section V.
146
+ Notations: Throughout the paper, vectors and scalars are
147
+ shown by bold lower-case (x) and non-bold (x) letters, respec-
148
+ tively. The conjugate transpose of a vector x is represented by
149
+ xH. We define set [M] := {1, 2, .., M} for any integer M. The
150
+ indicator function 1{·} equals to one if the constraint inside
151
+ {·} is satisfied.
152
+ II. SYSTEM MODEL AND PROBLEM FORMULATION
153
+ In this section, first, we introduce the mmWave channel
154
+ model. Then, we present the user association problem formu-
155
+ lation.
156
+ We consider a downlink communication with |B| mmWave
157
+ BSs, where each is equipped with NBS antennas, communi-
158
+ cating with a single antenna mobile UE. We consider analog
159
+ beamforming with a single RF chain. We assume all BSs
160
+ allocate equal resources to their serving UEs. The channel
161
+ between BS j ∈ B and its serving UE during time slot i is
162
+ [13]:
163
+ hj =
164
+ L
165
+
166
+ ℓ=1
167
+ hℓaH(φℓ, θℓ),
168
+ (1)
169
+ where L is the number of available paths. Each path ℓ has
170
+ complex gain hℓ (include path-loss) and horizontal φℓ and
171
+ vertical θℓ, AoD. Due to the notation simplicity, we drop the
172
+ index j and i from the channel parameters. The array response
173
+ vector is a(.) where its exact expression depends on the array
174
+ geometry and possible hardware impairments. The signal-to-
175
+ noise ratio (SNR) in time slot i is
176
+ SNR(i)
177
+ j
178
+ = p|hH
179
+ j fj|2
180
+ σ2
181
+ ,
182
+ (2)
183
+ where σ2 is the noise power, p is the transmit power, fj ∈ CNBS
184
+ is the beamforming vector of BS j.
185
+ We define variable x(i)
186
+ j
187
+ ∈ {0, 1} for j ∈ B as an association
188
+ indicator in time slot i, where is equal 1 if UE is associated to
189
+ the BS j and 0 otherwise. Hence, the achieved rate per second
190
+ per hertz in time slot i is
191
+ R(i) = x(i)
192
+ jS log2(1 + SNR(i)
193
+ jS ) =
194
+
195
+ j∈B
196
+ x(i)
197
+ j log2(1 + SNR(i)
198
+ j ),
199
+ where jS is the index of the serving BS of the UE during time
200
+ slot i. Here, we assume each UE is served by only one BS.
201
+ We define the achievable throughput per hertz of the UE by
202
+ multiplying its rate by the data transmission time as
203
+ Γ(i) = (1 − τ (i)
204
+ b
205
+ τc
206
+ )R(i),
207
+ (3)
208
+ where, τ (i)
209
+ b
210
+ is the beam training duration which may have a
211
+ different value in each time slot i, and τc is the duration of
212
+ the time slot that is a fixed value for all time slots, see Fig. 1.
213
+ A. Beam Training and Beam Tracking
214
+ As depicted in Fig. 1a, when the UE is connected to a
215
+ BS j ∈ B, initial beam training is performed by sending
216
+ pilots over all combination of the beam directions in the
217
+ codebook during τb. Based. on the UE’s feedback of the
218
+ received signal strength (or estimated SNR), the best beam pair
219
+ directions are selected. Then, the BS and the UE would use this
220
+
221
+ Initial beam training
222
+ Data Transmission
223
+ τb
224
+ τc
225
+ (a)
226
+ Tracking
227
+ Data Transmission
228
+ τb
229
+ (b)
230
+ Fig. 1: τc is the time slot duration. τb is (a) the initial beam
231
+ training duration when the UE is associated with the new
232
+ BS (handover case), (b) the beam tacking duration when the
233
+ serving BS is the same for the consecutive slots.
234
+ direction (φℓ⋆, θℓ⋆) during the data transmission phase. The
235
+ beamforming vector, f is chosen to maximize the achievable
236
+ rate of the UE. Due to the monotonicity of the logarithm
237
+ function, this is equivalent to maximising the SNR term in
238
+ (2). Hence
239
+ f ∗
240
+ j = arg max
241
+ fj∈F
242
+ |hH
243
+ j fj|2
244
+ (4)
245
+ where F is the beamforming codebook that contains all
246
+ the feasible beamforming vectors. The n-th element of the
247
+ codebook F is defined as f(n) = a(φn, θn), where (φn, θn)
248
+ are steering angles and a(.) is the array response vector.
249
+ When the BS continues serving the same UE in a consecu-
250
+ tive time slot, only searching the neighbouring beam directions
251
+ of the main directions can be sufficient to maintain the link
252
+ quality. This process is called beam tracking. As shown in
253
+ Fig. 1b, the duration of τb is much smaller than the initial
254
+ beam training duration.
255
+ B. Problem Formulation
256
+ The UE association depends on the channel quality between
257
+ the BS and the UE. Due to UE mobility or temporary
258
+ blockage, the channel quality changes and consequently the
259
+ UE association. Based on the UEs’ velocity, we determine how
260
+ quickly the channel quality can change and predict the time
261
+ at which the current UE association needs to be updated. We
262
+ define TA seconds as the frequency of updating the association.
263
+ Hence, we need to make the decision every TA whether to run
264
+ the handover execution or beam tracking procedure if SNR is
265
+ lower than the pre-defined SNR threshold (SNRthr). Note that
266
+ we can have an on-demand reactive handover at any time slot
267
+ if the link toward the serving BS fails abruptly. However, with
268
+ a proper choice of TA, the frequency of those reactive events
269
+ could be very small. We define the duration of the trajectory
270
+ as M and consider the discrete time index i to describe the
271
+ association update at each interval.
272
+ The goal is to maximize the aggregate throughput of the UE
273
+ along the trajectory while ensuring the achieved throughput in
274
+ each time slot i is higher than a predefined threshold. To this
275
+ end, we define functions F1 and F2 as
276
+ • F1 is the averaged throughput along the trajectory as
277
+ F1 =
278
+ M
279
+
280
+ i=1
281
+ E
282
+
283
+ Γ(i)�
284
+ ,
285
+ where the expectation is with respect to the randomness
286
+ of channel fading and the blockage, M is the duration of
287
+ the trajectory, and Γ(i) is defined in (3).
288
+ • F2 is the expected number of time slots whose throughput
289
+ is lower than the threshold (Γthr).
290
+ F2 = E
291
+ � M
292
+
293
+ i=1
294
+ 1
295
+
296
+ Γ(i) ≤ Γthr
297
+ ��
298
+ =
299
+ M
300
+
301
+ i=1
302
+ Pr
303
+
304
+ Γ(i) ≤ Γthr
305
+
306
+ .
307
+ We formulate the user association at time slot i ∈ [M]
308
+ as an optimization problem which involves finding the x(i)
309
+ j
310
+ corresponding to the association indicator as
311
+ max
312
+ {x(i)
313
+ j
314
+ }i,j
315
+ F1 − λF2
316
+ (5a)
317
+ s.t.
318
+
319
+ j∈B
320
+ x(i)
321
+ j
322
+ = 1, ∀, i ∈ [M]
323
+ (5b)
324
+ x(i)
325
+ j
326
+ ∈ {0, 1},
327
+ ∀j ∈ B, i ∈ [M]
328
+ (5c)
329
+ where λ is a large constant controlling the importance of F2.
330
+ Constraint (5b) guarantees that each UE is served by one BS.
331
+ The optimization problem (5) is nonlinear. Solving this
332
+ optimization problem requires estimating the expectation value
333
+ in F1 and F2 which requires running many realizations.
334
+ Moreover, the impact of choosing the x(i)
335
+ j
336
+ (the target BSs
337
+ in the handover case or choosing beam tracking procedure)
338
+ propagates in time and can affect the UEs’ performance in
339
+ the next time slots. Therefore, we need to consider the long-
340
+ term benefits of selecting association indicators besides their
341
+ immediate effects on the UEs’ performance. Furthermore, In
342
+ order to select the target BSs, we need to model or predict the
343
+ UEs’ performance in the next time slots, which can add more
344
+ complexity to the network due to the mobility of the UE and
345
+ obstacles in mmWave networks. These motivate us to utilize
346
+ the RL to approximate the solution of (5).
347
+ III.
348
+ PROPOSED METHOD
349
+ We transform the problem (5) to an RL problem in which
350
+ the objective function is turned into a reward function, and
351
+ the constraints are transformed into the feasible state and
352
+ action spaces. In the following, first, we start with defining
353
+ the Markov decision process, and then we will describe our
354
+ joint handover and beam tracking algorithm.
355
+ A. Markov Decision Process Formulation
356
+ RL problems are formulated based on the idea of the
357
+ Markov decision process (MDP), which is the agent’s interac-
358
+ tion with different states of the environment to maximize the
359
+ expected long-term reward. The agent is the main decision-
360
+ maker who can sit on the edge cloud. All BSs are connected
361
+ to the agent. Now, we define different elements of an MDP.
362
+
363
+ 1) State Space: The state space describes the environ-
364
+ ment by which the agent is interacting through different
365
+ actions. We define the state at time slot i as s(i)
366
+ =
367
+ (ℓ(i)), j(i)
368
+ S , SNR(i), I(i)) ∈ S, where ℓ(i) is the location index
369
+ of the UE along the trajectory 2, j(i)
370
+ S is the index of the serving
371
+ BS, SNR(i) is the SNR value of the UE with serving BS j(i)
372
+ S
373
+ in time slot i. I(i) ∈ {0, 1} is the beam tracking activation
374
+ indicator. I(i) = 1 means the i-th time slot is the tracking slot
375
+ for the UE.
376
+ 2) Action Space: The action space includes all possible
377
+ actions that can be taken by the agent. The action can change
378
+ the state of the environment from the current state to the target
379
+ state. In our problem, a(i) ∈ A = {0, 1, 2, ..., [|B|]} is the
380
+ decision regarding beam tracking (a(i) = 0) or choosing the
381
+ index of new serving BS in the case of handover decision
382
+ (a(i) ∈ [|B|]). In other words, if a(i) ̸= 0 means the handover
383
+ decision is made and the value of a(i) shows the target BS.
384
+ Hence, the action is to specify a serving BS for the UE along
385
+ its trajectory.
386
+ 3) Policy: A policy π(.) maps the state of the environment
387
+ to the action of the agent. In our case, π is a function from S
388
+ to A, i.e., π : S → {0, 1, ..., [|B|]}
389
+ 4) Rewards: The agent obtains the reward after taking an
390
+ action a(i) when current state is s(i) and moves to next state
391
+ s(i+1). Here we define reward r(s(i), a(i), s(i+1)) as
392
+ r(s(i), a(i), s(i+1)) = Γ(i) − λ1
393
+
394
+ Γ(i) ≤ Γthr
395
+
396
+ ,
397
+ (6)
398
+ where Γ(i) is defined in (3).
399
+ 5) State-action value: The function Qπ(s, a) is the long-
400
+ term reward and is defined as the expected summation of
401
+ discounted reward in the future for the action a ∈ A that
402
+ agent takes in state s under policy π. The RL algorithm aims
403
+ to choose the optimal policy π⋆ in each state s that maximizes
404
+ the Qπ(s, a). With discount factor η ∈ [0, 1], we have
405
+ Qπ(s, a) = E
406
+ ��
407
+ i
408
+ ηir(s(i), s(i), s(i+1))
409
+
410
+ ,
411
+ where the expectation is over the transition probabilities. In
412
+ our problem, transition probabilities model the SNR variations
413
+ due to the randomness of the channel fading and blockage.
414
+ We assume mobility information including the UEs’ current
415
+ location and its trajectory is known3. Therefore, the transition
416
+ to the next location is deterministic.
417
+ The optimal policy in state s ∈ S is found by
418
+ π⋆(s) = arg max
419
+ a∈A
420
+ Qπ(s, a).
421
+ (7)
422
+ Due to the continuous and large number of state spaces, we
423
+ apply deep Q-learning (DQL) [14] to solve (7). In DQL, the
424
+ state-action value function is estimated by the deep neural
425
+ network function approximators.
426
+ 2Note that, we discretize the location of the UE along the trajectory. Hence,
427
+ every location dimension (x, y) a trajectory with length M is mapped to a
428
+ location index ℓ(i) ∈ [M].
429
+ 3Note that the location information can be easily fed back through lower-
430
+ frequency links.
431
+ B. Joint Handover and Beam Tracking Algorithm
432
+ Algorithm 1 describes our proposed joint handover and
433
+ beam tracking algorithm along a trajectory with duration M.
434
+ If the current association cannot offer the required SNR level,
435
+ the decision regarding handover or beam track is made based
436
+ on a(i) as the output of the RL algorithm. In the case of the
437
+ handover decision, the value of a(i) represents the target BS.
438
+ The beam tracking algorithm based on small spatial mea-
439
+ surement in time slot i is shown in Algorithm 2. In slot i, the
440
+ algorithm starts by using the main beam of the same serving
441
+ BS in the previous time slot i − 1. If the SNR value is lower
442
+ than the threshold, then starts a small spatial measurement over
443
+ the AoD direction of the main beam. To quantify the size of the
444
+ spatial neighbourhood, we define ∆φ and ∆θ as the maximum
445
+ absolute horizontal and vertical deviation from the main AoD
446
+ direction. We define δφ and δθ as the measurement resolution
447
+ in horizontal and vertical, respectively. Inspired by [15], the
448
+ spatial neighbourhood N surrounding the main AoD direction
449
+ can be expressed using the horizontal neighbourhood Nφ and
450
+ vertical neighbourhood Nθ as
451
+ Nφ(∆φ, δφ) =
452
+
453
+ i.δφ : i ∈
454
+
455
+
456
+ �∆φ
457
+ δφ
458
+
459
+ ,
460
+ �∆φ
461
+ δφ
462
+ ���
463
+ (8)
464
+ Nθ(∆θ, δθ) =
465
+
466
+ j.δθ : j ∈
467
+
468
+
469
+ �∆θ
470
+ δθ
471
+
472
+ ,
473
+ �∆θ
474
+ δθ
475
+ ���
476
+ (9)
477
+ where ⌊.⌋ is the floor operation. The complete neighbourhood
478
+ is the Cartesian product of the horizontal and vertical neigh-
479
+ bourhoods as
480
+ N(∆φ, ∆θ, δφ, δθ) = Nφ(∆φ, δφ) × Nθ(∆θ, δθ)
481
+ = {(φ, θ) : φ ∈ Nφ(∆φ, δφ), θ ∈ Nθ(∆θ, δθ)}(10)
482
+ The spatial neighborhoods T (i) in time slot i surrounding the
483
+ main AoD directions (φ(i−1)
484
+ ℓ⋆
485
+ , θ(i−1)
486
+ ℓ⋆
487
+ ) in previous time slot is
488
+ T (i) = (φ(i−1)
489
+ ℓ⋆
490
+ , θ(i−1)
491
+ ℓ⋆
492
+ , ) + N(∆φ, ∆θ, δφ, δθ).
493
+ (11)
494
+ Now given the main AoD direction, we need to find the
495
+ transmit direction from neighbourhoods T (i) that offers the
496
+ SNR threshold. We represent the sorted direction pairs as
497
+ [T (i)]I, where I is the sorted indices. It means the directions
498
+ in [T (i)]I increase in distance from the main AoD direction.
499
+ Starting from the main AoD direction, the SNR of each trans-
500
+ mit direction in [T (i)]I is measured until a beam pair meets
501
+ the required SNR level. Afterwards, no further measurements
502
+ are required. If no direction meets the threshold, the entire
503
+ (∆φ, ∆θ)-neighbourhood is measured to find the beam pairs
504
+ that offer the SNR threshold.
505
+ Note that in the worse scenario, if the selected target BS
506
+ based on our proposed algorithm cannot offer the required
507
+ SNR level due to very sudden blockage, the conventional
508
+ handover methods based on searching over the candidate BSs
509
+ in UEs vicinity can be applied. However, as shown in the
510
+ numerical results, such extreme case is rare.
511
+
512
+ Algorithm 1 Joint handover and beam tracking
513
+ Input: Trajectory with duration M
514
+ 1: Initialization: for i = 1 set j(1)
515
+ S =1
516
+ 2: for i ∈ 1, ..., M do
517
+ 3:
518
+ if SNR(i)
519
+ jS < SNRthr then
520
+ 4:
521
+ Choose the optimal action a(i) based on current
522
+ s(i).
523
+ 5:
524
+ if a(i) ̸= 0 then.
525
+ ▷ handover execution
526
+ 6:
527
+ Set j(i)
528
+ S
529
+ = a(i) and run the initial beam training
530
+ process and compute the achieved throughput Γ(i) as (3).
531
+ 7:
532
+ else
533
+ 8:
534
+ Run Algorithm 2 and compute Γ(i).
535
+ 9:
536
+ end if
537
+ 10:
538
+ end if
539
+ 11: end for
540
+ Output: Γ(i)
541
+ Algorithm 2 Beam tracking in time slot i at the BS j
542
+ Input: [T (i)]I, SNRthr, duration of each beam pair testing (β),
543
+ cnt(i) = 0.
544
+ 1: for (φ, θ) ∈ [T ]I do
545
+ 2:
546
+ Set f (i)
547
+ j
548
+ = a(φ, θ).
549
+ 3:
550
+ Measure SNR(i)
551
+ j
552
+ as (2).
553
+ 4:
554
+ Set cnt(i) = cnt(i) + 1.
555
+ ▷ number of beam pair
556
+ testing
557
+ 5:
558
+ if SNR(i)
559
+ j
560
+ >= SNRthr then
561
+ 6:
562
+ (φ(i)
563
+ ℓ⋆ , θ(i)
564
+ ℓ⋆ ) = (φBS, θBS)
565
+ 7:
566
+ τ (i)
567
+ b
568
+ = β.cnt(i)
569
+ 8:
570
+ break;
571
+ 9:
572
+ end if
573
+ 10: end for
574
+ compute the achieved throughput Γ(i) as (3)
575
+ IV. NUMERICAL RESULTS
576
+ We evaluate the performance of the proposed method in an
577
+ urban environment using the ray tracing tool in the MATLAB
578
+ toolbox. The output of the ray tracing tool is the L available
579
+ paths between a BS and a UE in a specific location. The ray
580
+ tracing maintains the spatial consistency of mmWave channels.
581
+ As depicted in Fig. 2, we extracted the building map of Kista
582
+ in Stockholm city, Sweden and used it as the input data for
583
+ the ray tracing simulation. In our scenario, we assumed the
584
+ building material is brick and the terrain material is concrete.
585
+ We also add some random obstacles in the street with different
586
+ heights (1 m and 3 m) and widths (2 m and 4 m) as the human
587
+ bodies and various vehicles. These temporary obstacles are
588
+ distributed randomly in the street with density 10−2 per m2.
589
+ The material loss and the location of the temporary obstacles
590
+ are chosen randomly in each realization of the channel. The
591
+ BSs are located on the wall of buildings. The location of the
592
+ BSs is chosen randomly while covering the entire trajectory.
593
+ The BSs’ height is 6 m. We consider a pedestrian mobility
594
+ Fig. 2: Simulation area in Kista, Stockholm. The yellow line
595
+ shows the trajectory. Stars show the location of the BSs.
596
+ model with a speed of 1 m/s. We consider the different lengths
597
+ of the trajectories as 100TA, 200TA, 300TA, 400TA, 500TA.
598
+ The main simulation parameters are listed in Table I.
599
+ In the simulation, we consider the SNRthr = 2 dB and the
600
+ throughput threshold Γthr = 1 bit/Hz. The value of τc is 10 ms.
601
+ In the case of handover, we fix the initial beam training dura-
602
+ tion as τb = 1
603
+ 3τc. In the case of beam tracking, τb is not fixed
604
+ and equals the size of measuring neighbourhood multiplied
605
+ by the duration of each beam pair testing (β = 10 µs). We
606
+ compare the performance of our proposed method with two
607
+ baselines. To have a fair comparison, we choose two baselines
608
+ in which the target BS for the handover is pre-determined.
609
+ Hence, we do not take into account the discovery time of
610
+ finding the target BS in the baselines. Just like in our method,
611
+ the handover is triggered if SNR < SNRthr.
612
+ As Baseline 1 we consider the multi-connectivity method
613
+ [8]. We implement a scenario where the UE maintains its
614
+ connection with a nearby BS as a backup solution while
615
+ being connected to the serving BS and once it experiences the
616
+ blockage of the serving link, starts connecting to the backup
617
+ solution. As Baseline 2 we select the learning-based handover
618
+ in [11]. The method shows very good performance in maxi-
619
+ mizing the achieved rate along the trajectory. In this baseline,
620
+ the target BS during the handover process is determined by a
621
+ learning algorithm. Although the target BSs are selected based
622
+ on the long-term effect on the achieved rate, still can cause
623
+ frequent handovers and throughput degradation.
624
+ First, we fix the number of BSs to 10 (see Fig. 2). We
625
+ consider 104 different channel realization as the input of the
626
+ RL algorithm. After getting the optimal policy, we test it
627
+ over real-time measurements and report the average of the
628
+ performance over 500 channel realizations. Fig. 3 shows the
629
+ average number of locations with unmet throughput thresholds
630
+ along the trajectory with different lengths and Fig. 4 shows the
631
+ average number of handovers needed. In comparison to the
632
+ other two baselines, our method provides better throughput
633
+ results by selecting to perform either beam tracking or a
634
+ handover. Furthermore, we note that the two baselines have
635
+ a higher number of handovers than our method due to only
636
+ considering the handover solution. Hence, by considering the
637
+ joint handover and beam tracking problem our method pro-
638
+ vides better-achieved throughput while decreasing the number
639
+ of handovers.
640
+ Fig. 5 shows the average aggregate achieved
641
+
642
+ Table I: Simulation parameters.
643
+ Parameters
644
+ Values in Simulations
645
+ BS transmit power
646
+ 10 dBm
647
+ Noise power level
648
+ σ2=-174 dBm/Hz
649
+ Signal bandwidth
650
+ 100 MHz
651
+ BS antenna
652
+ 8 × 8 uniform planar array [11]
653
+ Time interval duration
654
+ TA = 1s
655
+ Neighborhood size
656
+ (∆φ, ∆θ) = (10◦, 10◦)
657
+ Measurement resolution
658
+ (δφ, δθ) = (5◦, 5◦)
659
+ Discount factor
660
+ η = 0.99
661
+ λ
662
+ 100
663
+ 100
664
+ 200
665
+ 300
666
+ 400
667
+ 500
668
+ 0
669
+ 200
670
+ 400
671
+ Trajectory length (m)
672
+ Number of locations satisfying Γthr
673
+ Our method
674
+ Baseline 1
675
+ Baseline 2
676
+ Fig. 3: The average number of locations with unmet through-
677
+ put threshold for different lengths of the trajectory.
678
+ throughput along the trajectory with length 300 m for different
679
+ numbers of BSs. By increasing the number of BSs the number
680
+ of the locations satisfying the Γthr also increases hence the
681
+ aggregate throughput along the trajectory increases. Even with
682
+ a small number of BSs, our method outperforms baselines
683
+ in aggregate throughput along the trajectory by determining
684
+ whether to use a handover or beam tracking solution.
685
+ We consider 10000 iterations during the training in our
686
+ method and Baseline 2. With the training machine MacBook
687
+ Pro 2020 M1 with a memory of 16 GB, each iteration takes
688
+ about 15 seconds. Note that the absolute value of the training
689
+ time per iteration depends on the running machine.
690
+ V. CONCLUSIONS
691
+ In this work, we proposed and studied a learning-based joint
692
+ handover and beam tracking method in a mobile mmWave
693
+ network. The aim of our algorithm is to maximize the aggre-
694
+ gate throughput of the UE along a trajectory and ensure the
695
+ achieved throughput in each location is higher than the thresh-
696
+ old. Our evaluation results showed that by making an optimal
697
+ decision regarding handover execution or beam tracking, our
698
+ method provides high achievable throughput and reduces the
699
+ number of handovers. Considering different mobility models
700
+ and studying the effect of neighbouring size can be valuable
701
+ future work.
702
+ REFERENCES
703
+ [1] T. S. Rappaport, S. Sun, R. Mayzus, H. Zhao, Y. Azar, K. Wang, G. N.
704
+ Wong, J. K. Schulz, M. Samimi, and F. Gutierrez Jr, “Millimeter wave
705
+ mobile communications for 5G cellular: It will work!” IEEE Access,
706
+ vol. 1, no. 1, pp. 335–349, May 2013.
707
+ [2] H. Hassanieh, O. Abari, M. Rodriguez, M. Abdelghany, D. Katabi,
708
+ and P. Indyk, “Fast millimeter wave beam alignment,” in Pro. ACM
709
+ SIGCOM, 2018, pp. 432–445.
710
+ 100
711
+ 200
712
+ 300
713
+ 400
714
+ 500
715
+ 0
716
+ 2
717
+ 4
718
+ 6
719
+ 8
720
+ 10
721
+ Trajectory length (m)
722
+ Number of handovers
723
+ Our method
724
+ Baseline 1
725
+ Baseline 2
726
+ Fig. 4: The average number of handovers for different lengths
727
+ of the trajectory.
728
+ 4
729
+ 6
730
+ 8
731
+ 10
732
+ 100
733
+ 150
734
+ 200
735
+ 250
736
+ 300
737
+ Number of BSs
738
+ Average aggregate Γ(bits/Hz)
739
+ Our method
740
+ Baseline 1
741
+ Baseline 2
742
+ Fig. 5: The average aggregate achieved throughput per Hz
743
+ along the trajectory with length 300 m.
744
+ [3] 3GPP, “Requirements for support of radio resource management,” Stan-
745
+ dard 3GPP TS 38.138, no. TS 36.133, v15.19.0, Sep. 2022.
746
+ [4] R. W. Heath, N. Gonzalez-Prelcic, S. Rangan, W. Roh, and A. M.
747
+ Sayeed, “An overview of signal processing techniques for millimeter
748
+ wave mimo systems,” IEEE J. Sel. Top. Signal Process., vol. 10, no. 3,
749
+ pp. 436–453, Apr. 2016.
750
+ [5] X. Sun, C. Qi, and G. Y. Li, “Beam training and allocation for multiuser
751
+ millimeter wave massive mimo systems,” IEEE Trans. Wirel. Commun.,
752
+ vol. 18, no. 2, pp. 1041–1053, 2019.
753
+ [6] D. Zhang, S. Shen, C. She, M. Xiao, Z. Pang, Y. Li, and L. Wang,
754
+ “Training beam sequence design for mmwave tracking systems with
755
+ and without environmental knowledge,” IEEE Trans. Wirel. Commun.,
756
+ 2022.
757
+ [7] M. F. ¨Ozkoc¸, A. Koutsaftis, R. Kumar, P. Liu, and S. S. Panwar, “The
758
+ impact of multi-connectivity and handover constraints on millimeter
759
+ wave and terahertz cellular networks,” IEEE J-SAC., vol. 39, no. 6, pp.
760
+ 1833–1853, 2021.
761
+ [8] M. Gapeyenko, V. Petrov, D. Moltchanov, M. R. Akdeniz, S. Andreev,
762
+ N. Himayat, and Y. Koucheryavy, “On the degree of multi-connectivity
763
+ in 5G millimeter-wave cellular urban deployments,” IEEE Trans. Veh.
764
+ Technol., vol. 68, no. 2, pp. 1973–1978, Feb. 2019.
765
+ [9] “Multi-connectivity; overall description,” Standard 3GPP, vol. v16.1.0,
766
+ no. TS 37.340, 2020.
767
+ [10] Y. Sun, G. Feng, S. Qin, Y. Liang, and T. P. Yum, “The smart handoff
768
+ policy for millimeter wave heterogeneous cellular networks,” IEEE Trans
769
+ Mob Comput., vol. 17, no. 6, pp. 1456–1468, Jun. 2018.
770
+ [11] S. Khosravi, H. S. Ghadikolaei, and M. Petrova, “Learning-based
771
+ handover in mobile millimeter-wave networks,” IEEE TCCN, vol. 7,
772
+ no. 2, pp. 663–674, 2021.
773
+ [12] A. Patra, L. Simi´c, and P. M¨ah¨onen, “Smart mm-wave beam steering
774
+ algorithm for fast link re-establishment under node mobility in 60 ghz
775
+ indoor wlans,” in Proceedings of the 13th ACM International Symposium
776
+ on Mobility Management and Wireless Access, 2015, pp. 53–62.
777
+ [13] M. R. Akdeniz, Y. Liu, M. K. Samimi, S. Sun, S. Rangan, T. S.
778
+ Rappaport, and E. Erkip, “Millimeter wave channel modeling and
779
+ cellular capacity evaluation,” IEEE J-SAC, vol. 32, no. 6, pp. 1164–
780
+ 1179, Jun. 2014.
781
+ [14] D. Bertsekas, Reinforcement Learning and optimal control.
782
+ Athena
783
+ Scientific, 2019.
784
+ [15] I. P. Roberts, A. Chopra, T. Novlan, S. Vishwanath, and J. G. Andrews,
785
+ “Steer: Beam selection for full-duplex millimeter wave communication
786
+ systems,” IEEE Trans Commun., pp. 1–1, 2022.
787
+
9dE4T4oBgHgl3EQf3Q3I/content/tmp_files/load_file.txt ADDED
@@ -0,0 +1,426 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ filepath=/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf,len=425
2
+ page_content='Reinforcement Learning-based Joint Handover and Beam Tracking in Millimeter-wave Networks Sara Khosravi∗, Hossein S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
3
+ page_content=' Ghadikolaei‡, Jens Zander∗, and Marina Petrova ∗† ∗School of EECS, KTH Royal Institute of the Technology, Stockholm, Sweden, † Mobile Communications and Computing, RWTH Aachen University, Germany, ‡ Ericsson Research, Sweden Email: {sarakhos, jenz, petrovam} @kth.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
4
+ page_content='se, hossein.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
5
+ page_content='shokri.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
6
+ page_content='ghadikolaei@ericsson.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
7
+ page_content='com Abstract—In this paper, we develop an algorithm for joint handover and beam tracking in millimeter-wave (mmWave) networks.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
8
+ page_content=' The aim is to provide a reliable connection in terms of the achieved throughput along the trajectory of the mobile user while preventing frequent handovers.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
9
+ page_content=' We model the association problem as an optimization problem and propose a reinforcement learning-based solution.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
10
+ page_content=' Our approach learns whether and when beam tracking and handover should be performed and chooses the target base stations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
11
+ page_content=' In the case of beam tracking, we propose a tracking algorithm based on measuring a small spatial neighbourhood of the optimal beams in the previous time slot.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
12
+ page_content=' Simulation results in an outdoor environment show the superior performance of our proposed solution in achievable throughput and the number of handovers needed in comparison to a multi- connectivity baseline and a learning-based handover baseline.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
13
+ page_content=' Index Terms—Millimeter-wave, user association, beam track- ing, handover, reinforcement learning.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
14
+ page_content=' I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
15
+ page_content=' INTRODUCTION Millimeter-wave (mmWave) is a key radio access technol- ogy for beyond 5G communication systems, offering ultra- high data rates due to a large amount of free spectrum [1].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
16
+ page_content=' However, due to the fewer scattering paths and significant penetration loss, mmWave links are vulnerable to static or dynamic obstacles.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
17
+ page_content=' To overcome such severe loss, both base station (BS) and user equipment (UE) may need directional communication using a large number of antennas, which may result in frequent misalignment of beams due to mobility and blockage.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
18
+ page_content=' Hence, finding and maintaining the optimal beam directions (beam alignment) is necessary.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
19
+ page_content=' The lengthy period to achieve the beam alignment (hundreds of milliseconds to seconds [2]) results in a high cell search time or BS discovery time in mmWave systems.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
20
+ page_content=' As reported in [3], the BS discovery time which is the time required to search the target BS when the handover command is received by the UE is about 200 ms.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
21
+ page_content=' Moreover, to improve the capacity and coverage the density of the BSs is usually high in mmWave systems [1].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
22
+ page_content=' Hence, conventional handover methods based on instantaneous received signal power can cause unnecessarily frequent handovers and a ping-pong effect.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
23
+ page_content=' This leads to a severe drop in service reliability.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
24
+ page_content=' Therefore, fast BS discovery (finding target BS in the handover process), and efficient handover execution techniques, will be required to use the full promise of mmWave cellular networks.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
25
+ page_content=' The spatial mmWave channel can be approximated by a few dominant paths, where each path can be defined with its angle of departure (AoD), angle of arrival (AoA) and gain [4].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
26
+ page_content=' Hence, one can only estimate these path parameters instead of a large dimensional channel matrix [5], [6].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
27
+ page_content=' The process of identifying the dominant paths is called beam training.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
28
+ page_content=' However, due to the dynamic environment, frequent beam training may cause high overhead1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
29
+ page_content=' Temporal correlation of spatial mmWave channel can be employed to accelerate the beam training process by tracking the variation of the dominant path directions [6].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
30
+ page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
31
+ page_content=' Related Work To address the link failure and throughput degradation in a dynamic environment, the multi-connectivity technique has been vastly analyzed in literature [7], [8].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
32
+ page_content=' In this technique, the UE keeps its connection to multiple BSs (either at mmWave band or sub-6 GHz band).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
33
+ page_content=' However, power consumption, synchronization and the need for frequent tracking are the main challenges.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
34
+ page_content=' In the 3GPP standard (release 16) two handover techniques are introduced to improve the link robust- ness during mobility: dual active protocol stack (DAPS), and conditional handover (CHO) [9].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
35
+ page_content=' In the DAPS, the connection to the current serving BS is maintained until the connection to the target BS is fully established.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
36
+ page_content=' In the CHO, the UE is configured with multiple target BSs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
37
+ page_content=' During the handover, the UE can select one of the configured BSs as the target BS during the RRC reconfiguration message.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
38
+ page_content=' Although CHO can decrease the handover failure probability, it may increase the handover latency if the UE asks for multiple handovers during a single RRC reconfiguration [7].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
39
+ page_content=' Applying machine learning as the main decision-maker tool to make the optimal handover decision and choose the target BS has been also studied in the literature [10], [11].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
40
+ page_content=' The authors in [10] proposed a reinforcement learning (RL) based handover policy to reduce the number of handovers while keeping the quality of service in heterogeneous networks.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
41
+ page_content=' In [11] an intelligent handover method based on choosing the backup solution for each serving link to maximize the aggregate rate along a trajectory has been proposed.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
42
+ page_content=' 1Overhead depends on the training time compared with the changes in the environment.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
43
+ page_content=' arXiv:2301.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
44
+ page_content='05305v1 [eess.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
45
+ page_content='SY] 12 Jan 2023 In terms of beam tracking, authors in [12] applied the correlation of spatial mmWave channel in adjacent locations and proposed the beam steering method based on searching over a small angular space in the vicinity of the previously known valid beams.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
46
+ page_content=' The authors in [6] applied machine learning to the tracking procedure to extract useful information from the history of AoD tracking.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
47
+ page_content=' All the aforementioned works only take handover or beam tracking issues into account.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
48
+ page_content=' Additionally, they do not study the impact of selecting beam tracking and handover on the achieved throughput of the UE along its trajectory and instead focus on the achieved rate as the primary performance metric.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
49
+ page_content=' B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
50
+ page_content=' Our Contributions In this paper, we develop a novel joint handover and beam tracking algorithm in a mmWave network under mobility.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
51
+ page_content=' The algorithm aims to associate the UEs to BSs that maximize the sum achieved throughput along the trajectory and ensure the achieved throughput in each location of the trajectory is higher than a pre-defined threshold.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
52
+ page_content=' The user association process is defined as the process of determining whether a user is associated with a particular BS before data transmissions commence.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
53
+ page_content=' In the case of handover, the UE is associated with a new BS, whereas in the case of beam tracking, the UE remains associated with the serving BS from the previous time slot.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
54
+ page_content=' The main contributions of our paper are summarized as below: System Modeling: We model the user association prob- lem as a non-convex optimization problem.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
55
+ page_content=' Unlike the existing works in the literature, we consider achieved throughput as the main performance metric to measure the effect of handover or beam tracking on the UEs’ quality of service.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
56
+ page_content=' Learning-based Solution: The objective function in our proposed user association problem highly depends on the user association mechanism.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
57
+ page_content=' We utilize the reinforcement learning (RL) algorithm to approximate the solution to this problem.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
58
+ page_content=' The aim is to decide whether to run a beam tracking algorithm or a handover algorithm.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
59
+ page_content=' Joint Handover and Beam Tracking Algorithm: In the case of a handover decision, the target BS will be recognized as the output of the RL algorithm.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
60
+ page_content=' In the case of beam tracking, the search space will be defined based on our proposed tracking algorithm by searching the directions in the small spatial neighbourhood of the previously selected optimal directions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
61
+ page_content=' Empirical Evaluation: We apply ray tracing with a real building data map as the input.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
62
+ page_content=' The results show the effectiveness of our proposed method in achieving throughput along trajectories and decreasing the number of handovers.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
63
+ page_content=' The rest of the paper is organized as follows.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
64
+ page_content=' We introduce the system model and problem formulation in Section II.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
65
+ page_content=' In Section III, we propose our method.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
66
+ page_content=' We present the numerical results in Section IV and, conclude our work in Section V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
67
+ page_content=' Notations: Throughout the paper, vectors and scalars are shown by bold lower-case (x) and non-bold (x) letters, respec- tively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
68
+ page_content=' The conjugate transpose of a vector x is represented by xH.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
69
+ page_content=' We define set [M] := {1, 2, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
70
+ page_content='., M} for any integer M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
71
+ page_content=' The indicator function 1{·} equals to one if the constraint inside {·} is satisfied.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
72
+ page_content=' II.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
73
+ page_content=' SYSTEM MODEL AND PROBLEM FORMULATION In this section, first, we introduce the mmWave channel model.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
74
+ page_content=' Then, we present the user association problem formu- lation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
75
+ page_content=' We consider a downlink communication with |B| mmWave BSs, where each is equipped with NBS antennas, communi- cating with a single antenna mobile UE.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
76
+ page_content=' We consider analog beamforming with a single RF chain.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
77
+ page_content=' We assume all BSs allocate equal resources to their serving UEs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
78
+ page_content=' The channel between BS j ∈ B and its serving UE during time slot i is [13]: hj = L � ℓ=1 hℓaH(φℓ, θℓ), (1) where L is the number of available paths.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
79
+ page_content=' Each path ℓ has complex gain hℓ (include path-loss) and horizontal φℓ and vertical θℓ, AoD.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
80
+ page_content=' Due to the notation simplicity, we drop the index j and i from the channel parameters.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
81
+ page_content=' The array response vector is a(.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
82
+ page_content=') where its exact expression depends on the array geometry and possible hardware impairments.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
83
+ page_content=' The signal-to- noise ratio (SNR) in time slot i is SNR(i) j = p|hH j fj|2 σ2 , (2) where σ2 is the noise power, p is the transmit power, fj ∈ CNBS is the beamforming vector of BS j.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
84
+ page_content=' We define variable x(i) j ∈ {0, 1} for j ∈ B as an association indicator in time slot i, where is equal 1 if UE is associated to the BS j and 0 otherwise.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
85
+ page_content=' Hence, the achieved rate per second per hertz in time slot i is R(i) = x(i) jS log2(1 + SNR(i) jS ) = � j∈B x(i) j log2(1 + SNR(i) j ), where jS is the index of the serving BS of the UE during time slot i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
86
+ page_content=' Here, we assume each UE is served by only one BS.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
87
+ page_content=' We define the achievable throughput per hertz of the UE by multiplying its rate by the data transmission time as Γ(i) = (1 − τ (i) b τc )R(i), (3) where, τ (i) b is the beam training duration which may have a different value in each time slot i, and τc is the duration of the time slot that is a fixed value for all time slots, see Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
88
+ page_content=' 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
89
+ page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
90
+ page_content=' Beam Training and Beam Tracking As depicted in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
91
+ page_content=' 1a, when the UE is connected to a BS j ∈ B, initial beam training is performed by sending pilots over all combination of the beam directions in the codebook during τb.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
92
+ page_content=' Based.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
93
+ page_content=' on the UE’s feedback of the received signal strength (or estimated SNR), the best beam pair directions are selected.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
94
+ page_content=' Then, the BS and the UE would use this Initial beam training Data Transmission τb τc (a) Tracking Data Transmission τb (b) Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
95
+ page_content=' 1: τc is the time slot duration.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
96
+ page_content=' τb is (a) the initial beam training duration when the UE is associated with the new BS (handover case), (b) the beam tacking duration when the serving BS is the same for the consecutive slots.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
97
+ page_content=' direction (φℓ⋆, θℓ⋆) during the data transmission phase.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
98
+ page_content=' The beamforming vector, f is chosen to maximize the achievable rate of the UE.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
99
+ page_content=' Due to the monotonicity of the logarithm function, this is equivalent to maximising the SNR term in (2).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
100
+ page_content=' Hence f ∗ j = arg max fj∈F |hH j fj|2 (4) where F is the beamforming codebook that contains all the feasible beamforming vectors.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
101
+ page_content=' The n-th element of the codebook F is defined as f(n) = a(φn, θn), where (φn, θn) are steering angles and a(.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
102
+ page_content=') is the array response vector.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
103
+ page_content=' When the BS continues serving the same UE in a consecu- tive time slot, only searching the neighbouring beam directions of the main directions can be sufficient to maintain the link quality.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
104
+ page_content=' This process is called beam tracking.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
105
+ page_content=' As shown in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
106
+ page_content=' 1b, the duration of τb is much smaller than the initial beam training duration.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
107
+ page_content=' B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
108
+ page_content=' Problem Formulation The UE association depends on the channel quality between the BS and the UE.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
109
+ page_content=' Due to UE mobility or temporary blockage, the channel quality changes and consequently the UE association.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
110
+ page_content=' Based on the UEs’ velocity, we determine how quickly the channel quality can change and predict the time at which the current UE association needs to be updated.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
111
+ page_content=' We define TA seconds as the frequency of updating the association.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
112
+ page_content=' Hence, we need to make the decision every TA whether to run the handover execution or beam tracking procedure if SNR is lower than the pre-defined SNR threshold (SNRthr).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
113
+ page_content=' Note that we can have an on-demand reactive handover at any time slot if the link toward the serving BS fails abruptly.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
114
+ page_content=' However, with a proper choice of TA, the frequency of those reactive events could be very small.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
115
+ page_content=' We define the duration of the trajectory as M and consider the discrete time index i to describe the association update at each interval.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
116
+ page_content=' The goal is to maximize the aggregate throughput of the UE along the trajectory while ensuring the achieved throughput in each time slot i is higher than a predefined threshold.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
117
+ page_content=' To this end, we define functions F1 and F2 as F1 is the averaged throughput along the trajectory as F1 = M � i=1 E � Γ(i)� , where the expectation is with respect to the randomness of channel fading and the blockage, M is the duration of the trajectory, and Γ(i) is defined in (3).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
118
+ page_content=' F2 is the expected number of time slots whose throughput is lower than the threshold (Γthr).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
119
+ page_content=' F2 = E � M � i=1 1 � Γ(i) ≤ Γthr �� = M � i=1 Pr � Γ(i) ≤ Γthr � .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
120
+ page_content=' We formulate the user association at time slot i ∈ [M] as an optimization problem which involves finding the x(i) j corresponding to the association indicator as max {x(i) j }i,j F1 − λF2 (5a) s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
121
+ page_content='t.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
122
+ page_content=' � j∈B x(i) j = 1, ∀, i ∈ [M] (5b) x(i) j ∈ {0, 1}, ∀j ∈ B, i ∈ [M] (5c) where λ is a large constant controlling the importance of F2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
123
+ page_content=' Constraint (5b) guarantees that each UE is served by one BS.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
124
+ page_content=' The optimization problem (5) is nonlinear.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
125
+ page_content=' Solving this optimization problem requires estimating the expectation value in F1 and F2 which requires running many realizations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
126
+ page_content=' Moreover, the impact of choosing the x(i) j (the target BSs in the handover case or choosing beam tracking procedure) propagates in time and can affect the UEs’ performance in the next time slots.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
127
+ page_content=' Therefore, we need to consider the long- term benefits of selecting association indicators besides their immediate effects on the UEs’ performance.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
128
+ page_content=' Furthermore, In order to select the target BSs, we need to model or predict the UEs’ performance in the next time slots, which can add more complexity to the network due to the mobility of the UE and obstacles in mmWave networks.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
129
+ page_content=' These motivate us to utilize the RL to approximate the solution of (5).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
130
+ page_content=' III.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
131
+ page_content=' PROPOSED METHOD We transform the problem (5) to an RL problem in which the objective function is turned into a reward function, and the constraints are transformed into the feasible state and action spaces.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
132
+ page_content=' In the following, first, we start with defining the Markov decision process, and then we will describe our joint handover and beam tracking algorithm.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
133
+ page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
134
+ page_content=' Markov Decision Process Formulation RL problems are formulated based on the idea of the Markov decision process (MDP), which is the agent’s interac- tion with different states of the environment to maximize the expected long-term reward.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
135
+ page_content=' The agent is the main decision- maker who can sit on the edge cloud.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
136
+ page_content=' All BSs are connected to the agent.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
137
+ page_content=' Now, we define different elements of an MDP.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
138
+ page_content=' 1) State Space: The state space describes the environ- ment by which the agent is interacting through different actions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
139
+ page_content=' We define the state at time slot i as s(i) = (ℓ(i)), j(i) S , SNR(i), I(i)) ∈ S, where ℓ(i) is the location index of the UE along the trajectory 2, j(i) S is the index of the serving BS, SNR(i) is the SNR value of the UE with serving BS j(i) S in time slot i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
140
+ page_content=' I(i) ∈ {0, 1} is the beam tracking activation indicator.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
141
+ page_content=' I(i) = 1 means the i-th time slot is the tracking slot for the UE.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
142
+ page_content=' 2) Action Space: The action space includes all possible actions that can be taken by the agent.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
143
+ page_content=' The action can change the state of the environment from the current state to the target state.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
144
+ page_content=' In our problem, a(i) ∈ A = {0, 1, 2, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
145
+ page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
146
+ page_content=', [|B|]} is the decision regarding beam tracking (a(i) = 0) or choosing the index of new serving BS in the case of handover decision (a(i) ∈ [|B|]).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
147
+ page_content=' In other words, if a(i) ̸= 0 means the handover decision is made and the value of a(i) shows the target BS.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
148
+ page_content=' Hence, the action is to specify a serving BS for the UE along its trajectory.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
149
+ page_content=' 3) Policy: A policy π(.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
150
+ page_content=') maps the state of the environment to the action of the agent.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
151
+ page_content=' In our case, π is a function from S to A, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
152
+ page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
153
+ page_content=', π : S → {0, 1, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
154
+ page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
155
+ page_content=', [|B|]} 4) Rewards: The agent obtains the reward after taking an action a(i) when current state is s(i) and moves to next state s(i+1).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
156
+ page_content=' Here we define reward r(s(i), a(i), s(i+1)) as r(s(i), a(i), s(i+1)) = Γ(i) − λ1 � Γ(i) ≤ Γthr � , (6) where Γ(i) is defined in (3).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
157
+ page_content=' 5) State-action value: The function Qπ(s, a) is the long- term reward and is defined as the expected summation of discounted reward in the future for the action a ∈ A that agent takes in state s under policy π.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
158
+ page_content=' The RL algorithm aims to choose the optimal policy π⋆ in each state s that maximizes the Qπ(s, a).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
159
+ page_content=' With discount factor η ∈ [0, 1], we have Qπ(s, a) = E �� i ηir(s(i), s(i), s(i+1)) � , where the expectation is over the transition probabilities.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
160
+ page_content=' In our problem, transition probabilities model the SNR variations due to the randomness of the channel fading and blockage.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
161
+ page_content=' We assume mobility information including the UEs’ current location and its trajectory is known3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
162
+ page_content=' Therefore, the transition to the next location is deterministic.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
163
+ page_content=' The optimal policy in state s ∈ S is found by π⋆(s) = arg max a∈A Qπ(s, a).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
164
+ page_content=' (7) Due to the continuous and large number of state spaces, we apply deep Q-learning (DQL) [14] to solve (7).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
165
+ page_content=' In DQL, the state-action value function is estimated by the deep neural network function approximators.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
166
+ page_content=' 2Note that, we discretize the location of the UE along the trajectory.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
167
+ page_content=' Hence, every location dimension (x, y) a trajectory with length M is mapped to a location index ℓ(i) ∈ [M].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
168
+ page_content=' 3Note that the location information can be easily fed back through lower- frequency links.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
169
+ page_content=' B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
170
+ page_content=' Joint Handover and Beam Tracking Algorithm Algorithm 1 describes our proposed joint handover and beam tracking algorithm along a trajectory with duration M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
171
+ page_content=' If the current association cannot offer the required SNR level, the decision regarding handover or beam track is made based on a(i) as the output of the RL algorithm.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
172
+ page_content=' In the case of the handover decision, the value of a(i) represents the target BS.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
173
+ page_content=' The beam tracking algorithm based on small spatial mea- surement in time slot i is shown in Algorithm 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
174
+ page_content=' In slot i, the algorithm starts by using the main beam of the same serving BS in the previous time slot i − 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
175
+ page_content=' If the SNR value is lower than the threshold, then starts a small spatial measurement over the AoD direction of the main beam.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
176
+ page_content=' To quantify the size of the spatial neighbourhood, we define ∆φ and ∆θ as the maximum absolute horizontal and vertical deviation from the main AoD direction.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
177
+ page_content=' We define δφ and δθ as the measurement resolution in horizontal and vertical, respectively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
178
+ page_content=' Inspired by [15], the spatial neighbourhood N surrounding the main AoD direction can be expressed using the horizontal neighbourhood Nφ and vertical neighbourhood Nθ as Nφ(∆φ, δφ) = � i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
179
+ page_content='δφ : i ∈ � − �∆φ δφ � , �∆φ δφ ��� (8) Nθ(∆θ, δθ) = � j.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
180
+ page_content='δθ : j ∈ � − �∆θ δθ � , �∆θ δθ ��� (9) where ⌊.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
181
+ page_content='⌋ is the floor operation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
182
+ page_content=' The complete neighbourhood is the Cartesian product of the horizontal and vertical neigh- bourhoods as N(∆φ, ∆θ, δφ, δθ) = Nφ(∆φ, δφ) × Nθ(∆θ, δθ) = {(φ, θ) : φ ∈ Nφ(∆φ, δφ), θ ∈ Nθ(∆θ, δθ)}(10) The spatial neighborhoods T (i) in time slot i surrounding the main AoD directions (φ(i−1) ℓ⋆ , θ(i−1) ℓ⋆ ) in previous time slot is T (i) = (φ(i−1) ℓ⋆ , θ(i−1) ℓ⋆ , ) + N(∆φ, ∆θ, δφ, δθ).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
183
+ page_content=' (11) Now given the main AoD direction, we need to find the transmit direction from neighbourhoods T (i) that offers the SNR threshold.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
184
+ page_content=' We represent the sorted direction pairs as [T (i)]I, where I is the sorted indices.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
185
+ page_content=' It means the directions in [T (i)]I increase in distance from the main AoD direction.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
186
+ page_content=' Starting from the main AoD direction, the SNR of each trans- mit direction in [T (i)]I is measured until a beam pair meets the required SNR level.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
187
+ page_content=' Afterwards, no further measurements are required.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
188
+ page_content=' If no direction meets the threshold, the entire (∆φ, ∆θ)-neighbourhood is measured to find the beam pairs that offer the SNR threshold.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
189
+ page_content=' Note that in the worse scenario, if the selected target BS based on our proposed algorithm cannot offer the required SNR level due to very sudden blockage, the conventional handover methods based on searching over the candidate BSs in UEs vicinity can be applied.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
190
+ page_content=' However, as shown in the numerical results, such extreme case is rare.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
191
+ page_content=' Algorithm 1 Joint handover and beam tracking Input: Trajectory with duration M 1: Initialization: for i = 1 set j(1) S =1 2: for i ∈ 1, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
192
+ page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
193
+ page_content=', M do 3: if SNR(i) jS < SNRthr then 4: Choose the optimal action a(i) based on current s(i).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
194
+ page_content=' 5: if a(i) ̸= 0 then.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
195
+ page_content=' ▷ handover execution 6: Set j(i) S = a(i) and run the initial beam training process and compute the achieved throughput Γ(i) as (3).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
196
+ page_content=' 7: else 8: Run Algorithm 2 and compute Γ(i).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
197
+ page_content=' 9: end if 10: end if 11: end for Output: Γ(i) Algorithm 2 Beam tracking in time slot i at the BS j Input: [T (i)]I, SNRthr, duration of each beam pair testing (β), cnt(i) = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
198
+ page_content=' 1: for (φ, θ) ∈ [T ]I do 2: Set f (i) j = a(φ, θ).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
199
+ page_content=' 3: Measure SNR(i) j as (2).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
200
+ page_content=' 4: Set cnt(i) = cnt(i) + 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
201
+ page_content=' ▷ number of beam pair testing 5: if SNR(i) j >= SNRthr then 6: (φ(i) ℓ⋆ , θ(i) ℓ⋆ ) = (φBS, θBS) 7: τ (i) b = β.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
202
+ page_content='cnt(i) 8: break;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
203
+ page_content=' 9: end if 10: end for compute the achieved throughput Γ(i) as (3) IV.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
204
+ page_content=' NUMERICAL RESULTS We evaluate the performance of the proposed method in an urban environment using the ray tracing tool in the MATLAB toolbox.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
205
+ page_content=' The output of the ray tracing tool is the L available paths between a BS and a UE in a specific location.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
206
+ page_content=' The ray tracing maintains the spatial consistency of mmWave channels.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
207
+ page_content=' As depicted in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
208
+ page_content=' 2, we extracted the building map of Kista in Stockholm city, Sweden and used it as the input data for the ray tracing simulation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
209
+ page_content=' In our scenario, we assumed the building material is brick and the terrain material is concrete.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
210
+ page_content=' We also add some random obstacles in the street with different heights (1 m and 3 m) and widths (2 m and 4 m) as the human bodies and various vehicles.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
211
+ page_content=' These temporary obstacles are distributed randomly in the street with density 10−2 per m2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
212
+ page_content=' The material loss and the location of the temporary obstacles are chosen randomly in each realization of the channel.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
213
+ page_content=' The BSs are located on the wall of buildings.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
214
+ page_content=' The location of the BSs is chosen randomly while covering the entire trajectory.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
215
+ page_content=' The BSs’ height is 6 m.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
216
+ page_content=' We consider a pedestrian mobility Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
217
+ page_content=' 2: Simulation area in Kista, Stockholm.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
218
+ page_content=' The yellow line shows the trajectory.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
219
+ page_content=' Stars show the location of the BSs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
220
+ page_content=' model with a speed of 1 m/s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
221
+ page_content=' We consider the different lengths of the trajectories as 100TA, 200TA, 300TA, 400TA, 500TA.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
222
+ page_content=' The main simulation parameters are listed in Table I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
223
+ page_content=' In the simulation, we consider the SNRthr = 2 dB and the throughput threshold Γthr = 1 bit/Hz.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
224
+ page_content=' The value of τc is 10 ms.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
225
+ page_content=' In the case of handover, we fix the initial beam training dura- tion as τb = 1 3τc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
226
+ page_content=' In the case of beam tracking, τb is not fixed and equals the size of measuring neighbourhood multiplied by the duration of each beam pair testing (β = 10 µs).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
227
+ page_content=' We compare the performance of our proposed method with two baselines.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
228
+ page_content=' To have a fair comparison, we choose two baselines in which the target BS for the handover is pre-determined.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
229
+ page_content=' Hence, we do not take into account the discovery time of finding the target BS in the baselines.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
230
+ page_content=' Just like in our method, the handover is triggered if SNR < SNRthr.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
231
+ page_content=' As Baseline 1 we consider the multi-connectivity method [8].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
232
+ page_content=' We implement a scenario where the UE maintains its connection with a nearby BS as a backup solution while being connected to the serving BS and once it experiences the blockage of the serving link, starts connecting to the backup solution.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
233
+ page_content=' As Baseline 2 we select the learning-based handover in [11].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
234
+ page_content=' The method shows very good performance in maxi- mizing the achieved rate along the trajectory.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
235
+ page_content=' In this baseline, the target BS during the handover process is determined by a learning algorithm.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
236
+ page_content=' Although the target BSs are selected based on the long-term effect on the achieved rate, still can cause frequent handovers and throughput degradation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
237
+ page_content=' First, we fix the number of BSs to 10 (see Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
238
+ page_content=' 2).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
239
+ page_content=' We consider 104 different channel realization as the input of the RL algorithm.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
240
+ page_content=' After getting the optimal policy, we test it over real-time measurements and report the average of the performance over 500 channel realizations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
241
+ page_content=' Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
242
+ page_content=' 3 shows the average number of locations with unmet throughput thresholds along the trajectory with different lengths and Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
243
+ page_content=' 4 shows the average number of handovers needed.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
244
+ page_content=' In comparison to the other two baselines, our method provides better throughput results by selecting to perform either beam tracking or a handover.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
245
+ page_content=' Furthermore, we note that the two baselines have a higher number of handovers than our method due to only considering the handover solution.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
246
+ page_content=' Hence, by considering the joint handover and beam tracking problem our method pro- vides better-achieved throughput while decreasing the number of handovers.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
247
+ page_content=' Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
248
+ page_content=' 5 shows the average aggregate achieved Table I: Simulation parameters.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
249
+ page_content=' Parameters Values in Simulations BS transmit power 10 dBm Noise power level σ2=-174 dBm/Hz Signal bandwidth 100 MHz BS antenna 8 × 8 uniform planar array [11] Time interval duration TA = 1s Neighborhood size (∆φ, ∆θ) = (10◦, 10◦) Measurement resolution (δφ, δθ) = (5◦, 5◦) Discount factor η = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
250
+ page_content='99 λ 100 100 200 300 400 500 0 200 400 Trajectory length (m) Number of locations satisfying Γthr Our method Baseline 1 Baseline 2 Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
251
+ page_content=' 3: The average number of locations with unmet through- put threshold for different lengths of the trajectory.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
252
+ page_content=' throughput along the trajectory with length 300 m for different numbers of BSs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
253
+ page_content=' By increasing the number of BSs the number of the locations satisfying the Γthr also increases hence the aggregate throughput along the trajectory increases.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
254
+ page_content=' Even with a small number of BSs, our method outperforms baselines in aggregate throughput along the trajectory by determining whether to use a handover or beam tracking solution.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
255
+ page_content=' We consider 10000 iterations during the training in our method and Baseline 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
256
+ page_content=' With the training machine MacBook Pro 2020 M1 with a memory of 16 GB, each iteration takes about 15 seconds.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
257
+ page_content=' Note that the absolute value of the training time per iteration depends on the running machine.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
258
+ page_content=' V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
259
+ page_content=' CONCLUSIONS In this work, we proposed and studied a learning-based joint handover and beam tracking method in a mobile mmWave network.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
260
+ page_content=' The aim of our algorithm is to maximize the aggre- gate throughput of the UE along a trajectory and ensure the achieved throughput in each location is higher than the thresh- old.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
261
+ page_content=' Our evaluation results showed that by making an optimal decision regarding handover execution or beam tracking, our method provides high achievable throughput and reduces the number of handovers.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
262
+ page_content=' Considering different mobility models and studying the effect of neighbouring size can be valuable future work.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
263
+ page_content=' REFERENCES [1] T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
264
+ page_content=' S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
265
+ page_content=' Rappaport, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
266
+ page_content=' Sun, R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
267
+ page_content=' Mayzus, H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
268
+ page_content=' Zhao, Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
269
+ page_content=' Azar, K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
270
+ page_content=' Wang, G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
271
+ page_content=' N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
272
+ page_content=' Wong, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
273
+ page_content=' K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
274
+ page_content=' Schulz, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
275
+ page_content=' Samimi, and F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
276
+ page_content=' Gutierrez Jr, “Millimeter wave mobile communications for 5G cellular: It will work!”' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
277
+ page_content=' IEEE Access, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
278
+ page_content=' 1, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
279
+ page_content=' 1, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
280
+ page_content=' 335–349, May 2013.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
281
+ page_content=' [2] H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
282
+ page_content=' Hassanieh, O.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
283
+ page_content=' Abari, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
284
+ page_content=' Rodriguez, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
285
+ page_content=' Abdelghany, D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
286
+ page_content=' Katabi, and P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
287
+ page_content=' Indyk, “Fast millimeter wave beam alignment,” in Pro.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
288
+ page_content=' ACM SIGCOM, 2018, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
289
+ page_content=' 432–445.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
290
+ page_content=' 100 200 300 400 500 0 2 4 6 8 10 Trajectory length (m) Number of handovers Our method Baseline 1 Baseline 2 Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
291
+ page_content=' 4: The average number of handovers for different lengths of the trajectory.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
292
+ page_content=' 4 6 8 10 100 150 200 250 300 Number of BSs Average aggregate Γ(bits/Hz) Our method Baseline 1 Baseline 2 Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
293
+ page_content=' 5: The average aggregate achieved throughput per Hz along the trajectory with length 300 m.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
294
+ page_content=' [3] 3GPP, “Requirements for support of radio resource management,” Stan- dard 3GPP TS 38.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
295
+ page_content='138, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
296
+ page_content=' TS 36.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
297
+ page_content='133, v15.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
298
+ page_content='19.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
299
+ page_content='0, Sep.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
300
+ page_content=' 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
301
+ page_content=' [4] R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
302
+ page_content=' W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
303
+ page_content=' Heath, N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
304
+ page_content=' Gonzalez-Prelcic, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
305
+ page_content=' Rangan, W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
306
+ page_content=' Roh, and A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
307
+ page_content=' M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
308
+ page_content=' Sayeed, “An overview of signal processing techniques for millimeter wave mimo systems,” IEEE J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
309
+ page_content=' Sel.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
310
+ page_content=' Top.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
311
+ page_content=' Signal Process.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
312
+ page_content=', vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
313
+ page_content=' 10, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
314
+ page_content=' 3, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
315
+ page_content=' 436–453, Apr.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
316
+ page_content=' 2016.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
317
+ page_content=' [5] X.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
318
+ page_content=' Sun, C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
319
+ page_content=' Qi, and G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
320
+ page_content=' Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
321
+ page_content=' Li, “Beam training and allocation for multiuser millimeter wave massive mimo systems,” IEEE Trans.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
322
+ page_content=' Wirel.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
323
+ page_content=' Commun.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
324
+ page_content=', vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
325
+ page_content=' 18, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
326
+ page_content=' 2, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
327
+ page_content=' 1041–1053, 2019.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
328
+ page_content=' [6] D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
329
+ page_content=' Zhang, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
330
+ page_content=' Shen, C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
331
+ page_content=' She, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
332
+ page_content=' Xiao, Z.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
333
+ page_content=' Pang, Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
334
+ page_content=' Li, and L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
335
+ page_content=' Wang, “Training beam sequence design for mmwave tracking systems with and without environmental knowledge,” IEEE Trans.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
336
+ page_content=' Wirel.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
337
+ page_content=' Commun.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
338
+ page_content=', 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
339
+ page_content=' [7] M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
340
+ page_content=' F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
341
+ page_content=' ¨Ozkoc¸, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
342
+ page_content=' Koutsaftis, R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
343
+ page_content=' Kumar, P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
344
+ page_content=' Liu, and S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
345
+ page_content=' S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
346
+ page_content=' Panwar, “The impact of multi-connectivity and handover constraints on millimeter wave and terahertz cellular networks,” IEEE J-SAC.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
347
+ page_content=', vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
348
+ page_content=' 39, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
349
+ page_content=' 6, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
350
+ page_content=' 1833–1853, 2021.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
351
+ page_content=' [8] M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
352
+ page_content=' Gapeyenko, V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
353
+ page_content=' Petrov, D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
354
+ page_content=' Moltchanov, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
355
+ page_content=' R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
356
+ page_content=' Akdeniz, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
357
+ page_content=' Andreev, N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
358
+ page_content=' Himayat, and Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
359
+ page_content=' Koucheryavy, “On the degree of multi-connectivity in 5G millimeter-wave cellular urban deployments,” IEEE Trans.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
360
+ page_content=' Veh.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
361
+ page_content=' Technol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
362
+ page_content=', vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
363
+ page_content=' 68, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
364
+ page_content=' 2, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
365
+ page_content=' 1973–1978, Feb.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
366
+ page_content=' 2019.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
367
+ page_content=' [9] “Multi-connectivity;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
368
+ page_content=' overall description,” Standard 3GPP, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
369
+ page_content=' v16.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
370
+ page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
371
+ page_content='0, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
372
+ page_content=' TS 37.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
373
+ page_content='340, 2020.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
374
+ page_content=' [10] Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
375
+ page_content=' Sun, G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
376
+ page_content=' Feng, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
377
+ page_content=' Qin, Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
378
+ page_content=' Liang, and T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
379
+ page_content=' P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
380
+ page_content=' Yum, “The smart handoff policy for millimeter wave heterogeneous cellular networks,” IEEE Trans Mob Comput.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
381
+ page_content=', vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
382
+ page_content=' 17, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
383
+ page_content=' 6, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
384
+ page_content=' 1456–1468, Jun.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
385
+ page_content=' 2018.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
386
+ page_content=' [11] S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
387
+ page_content=' Khosravi, H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
388
+ page_content=' S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
389
+ page_content=' Ghadikolaei, and M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
390
+ page_content=' Petrova, “Learning-based handover in mobile millimeter-wave networks,” IEEE TCCN, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
391
+ page_content=' 7, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
392
+ page_content=' 2, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
393
+ page_content=' 663–674, 2021.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
394
+ page_content=' [12] A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
395
+ page_content=' Patra, L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
396
+ page_content=' Simi´c, and P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
397
+ page_content=' M¨ah¨onen, “Smart mm-wave beam steering algorithm for fast link re-establishment under node mobility in 60 ghz indoor wlans,” in Proceedings of the 13th ACM International Symposium on Mobility Management and Wireless Access, 2015, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
398
+ page_content=' 53–62.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
399
+ page_content=' [13] M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
400
+ page_content=' R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
401
+ page_content=' Akdeniz, Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
402
+ page_content=' Liu, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
403
+ page_content=' K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
404
+ page_content=' Samimi, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
405
+ page_content=' Sun, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
406
+ page_content=' Rangan, T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
407
+ page_content=' S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
408
+ page_content=' Rappaport, and E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
409
+ page_content=' Erkip, “Millimeter wave channel modeling and cellular capacity evaluation,” IEEE J-SAC, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
410
+ page_content=' 32, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
411
+ page_content=' 6, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
412
+ page_content=' 1164– 1179, Jun.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
413
+ page_content=' 2014.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
414
+ page_content=' [14] D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
415
+ page_content=' Bertsekas, Reinforcement Learning and optimal control.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
416
+ page_content=' Athena Scientific, 2019.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
417
+ page_content=' [15] I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
418
+ page_content=' P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
419
+ page_content=' Roberts, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
420
+ page_content=' Chopra, T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
421
+ page_content=' Novlan, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
422
+ page_content=' Vishwanath, and J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
423
+ page_content=' G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
424
+ page_content=' Andrews, “Steer: Beam selection for full-duplex millimeter wave communication systems,” IEEE Trans Commun.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
425
+ page_content=', pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
426
+ page_content=' 1–1, 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/9dE4T4oBgHgl3EQf3Q3I/content/2301.05305v1.pdf'}
AtAyT4oBgHgl3EQf3_qJ/content/2301.00779v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:476cc0e9a81aa56404837a41aa2774ea843f3ccbe3eceaccc2e7d11f79b70a1a
3
+ size 325216
AtAyT4oBgHgl3EQf3_qJ/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:bfefceeb1d9d45e3ee99fb7e144d3547315cb48f878eb64043e09fbd1db2450d
3
+ size 4456493
AtAyT4oBgHgl3EQf3_qJ/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:3d3a5783ad9c688a4c328e08158987c01812132d91608777275dda702d740969
3
+ size 168344
CNE0T4oBgHgl3EQfgAHQ/content/2301.02413v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:86ef72244638733963c8f9bf3ba698741ff860778833b1ab89625c4cb7d11b08
3
+ size 1091018
CNE0T4oBgHgl3EQfgAHQ/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:8ac435ad81f3f1a3d15db2209c095e8fbc618bc66cc579cb7039d4f3eb0cefc5
3
+ size 7798829
CNE0T4oBgHgl3EQfgAHQ/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:27e3da9a49058cc5507dd9c1d49084a3bade3e414efe440329f91f85081afe1d
3
+ size 264312
CdAyT4oBgHgl3EQf4fpA/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:586f0737aea4c2fbc0f536827dbbd28cf1ebfb9deedc5fda167b50381a04a827
3
+ size 2031661
CdAyT4oBgHgl3EQf4fpA/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:b8dde3dba6f90a1c9e6506cd235a4df488f29495b2367767cc827fdb6fc0b957
3
+ size 72643
D9E2T4oBgHgl3EQf9gn9/content/2301.04230v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:a25b0e87b829576e167d617a59bc9a37132497357437329711641d3a0169875d
3
+ size 4815444
D9E2T4oBgHgl3EQf9gn9/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:055b0fa044fe24741b5c3ddb7f28f2f4116b280285624b1df65781c6d704da0f
3
+ size 1070027
D9E4T4oBgHgl3EQffA2Y/content/tmp_files/2301.05104v1.pdf.txt ADDED
@@ -0,0 +1,1218 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Learning to compile smartly for program size reduction
2
+ Youwei Liang∗ 1 Kevin Stone∗ 2 Ali Shameli 2 Chris Cummins 2 Mostafa Elhoushi 2 Jiadong Guo 2
3
+ Benoit Steiner 2 Pengtao Xie 1 Hugh Leather 2 Yuandong Tian 2
4
+ Abstract
5
+ Compiler optimization passes are an important
6
+ tool for improving program efficiency and reduc-
7
+ ing program size, but manually selecting opti-
8
+ mization passes can be time-consuming and error-
9
+ prone. While human experts have identified a few
10
+ fixed sequences of optimization passes (e.g., the
11
+ Clang -Oz passes) that perform well for a wide
12
+ variety of programs, these sequences are not con-
13
+ ditioned on specific programs. In this paper, we
14
+ propose a novel approach that learns a policy to
15
+ select passes for program size reduction, allow-
16
+ ing for customization and adaptation to specific
17
+ programs. Our approach uses a search mecha-
18
+ nism that helps identify useful pass sequences
19
+ and a GNN with customized attention that se-
20
+ lects the optimal sequence to use. Crucially it
21
+ is able to generalize to new, unseen programs,
22
+ making it more flexible and general than previ-
23
+ ous approaches. We evaluate our approach on a
24
+ range of programs and show that it leads to size
25
+ reduction compared to traditional optimization
26
+ techniques. Our results demonstrate the potential
27
+ of a single policy that is able to optimize many
28
+ programs.
29
+ 1. Introduction
30
+ Finding the right compiler optimization ordering for a given
31
+ program in order to execute them more efficiently with a
32
+ smaller amount of resources (e.g., memory, CPU and stor-
33
+ age) is an important yet challenging problem. Traditionally,
34
+ to tune configurations, human effort and expert knowledge
35
+ are needed, which is a time-consuming and error-prone
36
+ process that often yields sub-par results.
37
+ In recent years, machine learning-guided compiler optimiza-
38
+ tion has emerged as an interesting field to replace this labori-
39
+ ous process (Wang & O’Boyle, 2018). Along this line, many
40
+ *Equal contribution
41
+ 1University of California, San Diego
42
+ 2Meta AI. Correspondence to:
43
+ Kevin Stone
44
+ <kevinlee-
45
46
+ works show promising results using various machine learn-
47
+ ing (ML) techniques and optimizers (e.g., reinforcement
48
+ learning (Haj-Ali et al., 2020a), language modelling (Cum-
49
+ mins et al., 2017), evolutionary algorithms (Kulkarni &
50
+ Cavazos, 2012), etc). They focus on automatic decision-
51
+ making of specific components in compilation, e.g., op-
52
+ timizing computational graph of neural network for ML
53
+ compilers (Zhou et al., 2020), optimizing the loop structure
54
+ of neural network computations (Steiner et al., 2021), deter-
55
+ mination of a function to be inlining (MLGO) (Trofin et al.,
56
+ 2021), etc. There are only a few works targeting generic
57
+ optimization of compilation (Haj-Ali et al., 2020b; Almakki
58
+ et al., 2022).
59
+ In this work, we take a different path and explore the pos-
60
+ sibility of learning policies for more a general aspect of
61
+ compiler optimization. More specifically, we treat compila-
62
+ tion optimization as a general sequential decision process,
63
+ in which each step is to find an additional compiler pass
64
+ so that when combined with existing passes, can improve
65
+ specific metrics (e.g., the binary size / running speed of the
66
+ codebase). Our goal is to learn a policy, named pass policy,
67
+ to help quickly find the right compiler passes to be used,
68
+ given the current program and existing passes. We aim to
69
+ compare with existing handtuned policies in the compiler,
70
+ e.g., -Oz for code size reduction and “-O3” for running
71
+ speed optimization. Such policies have been tuned by the
72
+ domain experts for decades and used extensively in all the
73
+ computer systems, but are invariant to the program being
74
+ compiled.
75
+ As the first contribution, we propose a novel evaluation
76
+ protocol for compiler pass optimization, named zero-shot
77
+ generalizability (ZSG), to evaluate learned policies applied
78
+ to unseen programs. Here “zero-shot” means that each
79
+ unseen program has never been seen before in the training
80
+ process, and we allow a fixed number of optimization passes
81
+ (say 45). The policy is allowed to adjust the passes based
82
+ on previous outcomes (This includes backtracking if an
83
+ exploratory step turns out to be sub-optimal.) Compared
84
+ to previous works (e.g., Autophase (Haj-Ali et al., 2020b),
85
+ CompilerGym (Cummins et al., 2022), MLGO (Trofin et al.,
86
+ 2021), MLGoPerf (Ashouri et al., 2022)) that run adaptive
87
+ search algorithms to optimize a set of programs for many
88
+ hours, we argue that ZSG is a realistic setting for practical
89
+ arXiv:2301.05104v1 [cs.PL] 9 Jan 2023
90
+
91
+ Learning to compile smartly for program size reduction
92
+ deployment: for most programs except the critical ones,
93
+ there is a limited time budget to optimize them, and often
94
+ there is not enough computational resources to fine-tune
95
+ learned policies for each unseen task separately (e.g., fine-
96
+ tune setting in GO (Zhou et al., 2020)). While similar metric
97
+ has been used in previous works (e.g., MLGO and GO), we
98
+ are the first to test it in more general ML-guided compiler
99
+ optimizations.
100
+ With the ZSG metric, we then evaluate multiple existing
101
+ techniques applied to compiler optimization, with LLVM
102
+ compiler and on large-scale datasets provided by Compiler-
103
+ Gym (Cummins et al., 2022). We use code-size reduction
104
+ as the metric since it is a deterministic quality and relatively
105
+ easy/cheap to compute, and we leave program run-time
106
+ optimization for future work.
107
+ Given the metric, we discover a universal core subset of
108
+ LLVM pass sequences, of size 50, that leads to very strong
109
+ performance across multiple sets of programs from diverse
110
+ domains, ranging from Linux Kernel to BLAS library. The
111
+ total number of steps in the 50 pass sequences is 625 and
112
+ the average length of the sequences is 12.5. Specifically,
113
+ for one unseen program, there exists one of the 50 pass
114
+ sequences that leads to an average code size reduction of
115
+ 5.8% compared to the default -Oz setting, across 10 diverse
116
+ codebases of over one million programs. In other words,
117
+ after running trying the 625 steps on an unseen program, the
118
+ smallest code size during the compilation is 5.8% smaller
119
+ than that of -Oz. Considering the huge search space of com-
120
+ piler flags (10104), this is a very surprising finding. We find
121
+ this coreset in a training set and it can generalize reasonably
122
+ well to the evaluation set including datasets not including in
123
+ the training set.
124
+ While it can be time-consuming to find such a compiler
125
+ flag configuration with an exhaustive enumeration of the
126
+ core subset, we find that the optimal pass can be directly
127
+ predicted with high accuracy via GNN with a customized
128
+ attention layer to control information flow with the Pro-
129
+ GraML (Cummins et al., 2021) graph as the input. The
130
+ prediction top-1 and top-5 accuracy is 75% and 95%. There-
131
+ fore, we can run a few sequences selected by the model on
132
+ an unseen program to obtain a good code size reduction.
133
+ This enables us to find a good flag configuration that leads
134
+ to 4% improvement on average, with just 45 compilation
135
+ passes (this is roughly 3 sequences since the average length
136
+ of the sequences in the coreset is 12.5).
137
+ We have compared our approach with extensive baselines,
138
+ including RL-based methods such as PPO and Q-learning
139
+ and black-box optimizers such as evolutionary algorithm.
140
+ It turns out that ML approaches often suffer from severe
141
+ overfitting to the training set and does not perform well
142
+ for new program categories, even combined with heuristic
143
+ search, and optimizers may get lost in the exponential action
144
+ space due to lack of domain knowledge. In comparison, our
145
+ approach is simple, effective and generalizable to unseen
146
+ programs.
147
+ 2. Related Work
148
+ Graph structured data are present in numerous applications
149
+ and it has been shown that taking advantage of this data
150
+ can help us train very effective machine learning models.
151
+ (Brauckmann et al., 2020) use abstract syntax trees and con-
152
+ trol flow graphs for learning compiler optimization goals.
153
+ They show that using such graphs allows them to outper-
154
+ form state-of-the-art in the task of heterogeneous OpenCL
155
+ mapping. (Guo et al., 2020) uses a transformer based model
156
+ with a graph guided masked attention that incorporates the
157
+ data flow graph into the training. They achieve state of the
158
+ art performance in four tasks including code search, clone
159
+ detection, code translation, and code refinement.
160
+ As a contender to graph neural networks, (Mialon et al.,
161
+ 2021) uses transformers to process graphs. They show that
162
+ if we effectively encode positional and local sub-structures
163
+ of graphs and feed them to the transformer, then the trans-
164
+ former can outperform the classical GNN models. They
165
+ test their model on classification and regression tasks and
166
+ achieve state of the art performance.
167
+ In (Srinivas et al.,
168
+ 2020), they used an unsupervised model to learn embed-
169
+ dings of high dimensional pixel data using contrastive learn-
170
+ ing. They then use this embedding for downstream rein-
171
+ forcement learning tasks.
172
+ 3. Methodology
173
+ 3.1. Action space
174
+ The CompilerGym framework provides a convenient in-
175
+ terface for the compiler pass ordering problem. The de-
176
+ fault environment allows choosing one of 124 discrete ac-
177
+ tions at each step corresponding to running a sequence of
178
+ specific compiler pass. Given that our trajectories have a
179
+ length of 45 steps, this means we have 12445 ∼ 1.6 × 1094
180
+ possible action trajectories to explore. To find an opti-
181
+ mal action sequence for a program, we can apply some
182
+ existing reinforcement learning methods including Q learn-
183
+ ing like DQN (Mnih et al., 2015) and policy gradient like
184
+ PPO (Schulman et al., 2017).
185
+ Action Sequences However for this problem it turns out
186
+ that certain action sequences are good at optimizing many
187
+ different programs (where “good” is defined as better than
188
+ the compiler default -Oz). We found that constraining the
189
+ action space to a learned set of action sequences enables
190
+ state of the performance and also significantly reduces the
191
+ challenge of exploration. This allows us to cast the prob-
192
+ lem as one of supervised learning over this set of action
193
+
194
+ Learning to compile smartly for program size reduction
195
+ Figure 1. An example of a small action tree created by keeping
196
+ track of the common prefixes of the action sequences.
197
+ sequences. We use the following algorithm to find a good
198
+ set of action sequences.
199
+ • Random search We seed the list of candidate action
200
+ trajectories (action sequences) by running a random
201
+ policy on a subset of the training programs (N). For
202
+ each program we run M episodes and keep track of
203
+ the best action sequence for each program.
204
+ • Canonicalize During the search process we find that
205
+ trajectories often revisit the same state. Whenever this
206
+ happens we truncate all previous actions. On average
207
+ this reduces the trajectory length by a factor of 1/5.
208
+ • All-to-all We then test all N best action sequences
209
+ against all N programs. This gives us a N×N matrix
210
+ where each value is the cumulative reward (return). We
211
+ then normalize this matrix by the maximum return for
212
+ each program. A value of 1 represents that an action
213
+ sequences was optimal for a program (optimal in the
214
+ sense of this limited set of action sequences).
215
+ • Greedy assignment Many action sequences are opti-
216
+ mal for more than one program. We take advantage
217
+ of this to reduce the number of action sequences by
218
+ greedily picking action sequences that are optimal for
219
+ the the largest number of programs. This results in a
220
+ much smaller list of action sequences. We can visual-
221
+ ize this by creating a prefix tree that shows common
222
+ prefixes as single node. See Figure 1 for truncated tree
223
+ for illustration.
224
+ It is interesting to note that some actions are common across
225
+ the beginning of multiple action sequences. These popular
226
+ actions such as 27 (-reg2mem) as seen in Figure 1 are
227
+ pivotal for many programs. For a complete list of all LLVM
228
+ passes refer to Table 5.
229
+ 3.2. Offline behavior cloning methods
230
+ Normalized Value Prediction After discovering the “good”
231
+ action sequences (i.e., the coreset), we can turn the problem
232
+ of the sequential decision-making on compiler passes into a
233
+ problem of supervised classification. The target is to train
234
+ a model to predict the best action sequence conditioned on
235
+ the program, where the label of the program is the index
236
+ of the action sequence that results in the highest code size
237
+ reduction. However, one important observation we have
238
+ is that there are typically multiple action sequences in the
239
+ coreset that all result in the highest code size reduction.
240
+ Therefore, instead of using the single-class classification
241
+ method with cross entropy loss, we leverage the fact we have
242
+ access to the values for all action sequences. We predict
243
+ the softmax normalized value of each action sequence with
244
+ a cross entropy loss detailed below. We call this approach
245
+ behavior cloning (BC) over the coreset.
246
+ For a program o, we roll out all the predefined action se-
247
+ quences on it, obtaining a return ro
248
+ i for the i-th sequence
249
+ (i.e., the highest cumulative reward observed during the
250
+ rollout of the action sequence), which forms a value vec-
251
+ tor ro = [ro
252
+ 1, . . . , ro
253
+ n]. Then, the normalized values of the
254
+ action sequences are defined by
255
+ vo = Softmax(ro/T)
256
+ (1)
257
+ where T is temperature.
258
+ For an initial observation so
259
+ 0 of a program, our model out-
260
+ puts a probability distribution, p = f(so
261
+ 0), over the action
262
+ sequences. The target of the training is to make p close to
263
+ the normalized values of the action sequences. We use the
264
+ cross entropy loss to supervise the model
265
+ L(po, vo) = −
266
+ n
267
+
268
+ i
269
+ po
270
+ i log vo
271
+ i
272
+ (2)
273
+ 3.3. Program Representation
274
+ We are considering LLVM optimization passes on that op-
275
+ erate on the Intermediate Representation (IR) of a program.
276
+ The IR contains very rich structures, while its size can be
277
+ quite large for large programs. It also contains informa-
278
+ tion (e.g., strings and constants) irrelevant to the task we
279
+ are considering. We found that working with compressed
280
+ representations made this problem tractable and run in a
281
+ reasonable amount of time.
282
+ ProGraML We leverage a graph based representation that
283
+ encodes semantic information of the program covering three
284
+ layers: control flow, data flow, and data types. This rep-
285
+ resentation has the advantage that it is not a fixed size - it
286
+ does oversimplify large programs - and yet it is still a more
287
+ compact format than the original IR format.
288
+ 3.4. Network Architecture
289
+ One of the ways to model our policy function is to use a
290
+ graph neural network (GNN). To achieve this goal, we use
291
+
292
+ 53,122,31,36,111,10,97
293
+ 10
294
+ 64,31,10,52,111,116,36,40,48,54,30,53,114,29,120,10
295
+ 36,103,24,53,97,53,38,69,97,57,10,29
296
+ 39,64,55,53,38,122,31,111,64,10,39,21,105,36
297
+ 27
298
+ 104,55,57,26,103,10,29,31,36,120,102,53
299
+ root
300
+ 29
301
+ 55,39,61,27,41,36,25,103,10
302
+ 30,48,29,120,103,96,47,29,78,21,122,41,36,10
303
+ 72,55,103,36,122,59,30,65,53,10
304
+ 103,102,30,36,61,29,41,71,10,61,41,52Learning to compile smartly for program size reduction
305
+ 1
306
+ 2
307
+ 5
308
+ 3
309
+ 𝑋!"
310
+ #
311
+ 𝑋!$
312
+ #
313
+ 𝑋!%
314
+ #
315
+ 𝑋"&
316
+ #
317
+ 𝑋"!
318
+ 𝑋%!
319
+ 𝑋$!
320
+ 𝑋&"
321
+ 4
322
+ Figure 2. Graph attention. Circles denote nodes and solid arrows
323
+ denote edges. Squares are the calculated features, and dash arrows
324
+ represent feature aggregation. The orange/green squares denote the
325
+ features to be aggregated in the target/source nodes of the edges.
326
+ the ProGraML graph structure proposed in (Cummins et al.,
327
+ 2021) in which individual statements are connected to other
328
+ statements through relational dependencies. Compared to
329
+ the approach of treating the program scripts as text and
330
+ encoding the programs with a language model, using the
331
+ ProGraML graph representations and encoding them with
332
+ GNNs has several advantages. Firstly, the long-range de-
333
+ pendencies of instructions are automatically captured by
334
+ the edges in the graphs, whereas the NLP approaches need
335
+ to use an LSTM or Transformer to capture the dependen-
336
+ cies. An LSTM could lose early memory when the program
337
+ is long, and a Transformer could cause out of memory is-
338
+ sues in such cases. Secoundly, changing the names of the
339
+ variables/constants/functions/classes in a program will not
340
+ affect its ProGraML representation but will change the rep-
341
+ resentations in texts. Our goal is to use the structure and
342
+ relational dependencies of this graph to learn an embed-
343
+ ding which allows us to learn a better policy. We experi-
344
+ mented with several different architectures such as Gated
345
+ Graph Convolutions (Li et al., 2015), Graph Attention Net-
346
+ works (Veliˇckovi´c et al., 2017), as well as our own custom
347
+ variation described bellow.
348
+ Edges types ProGraML supports multiple directed edge
349
+ types representing control flow, data flow, function call, and
350
+ data type definition. The other edge features include the
351
+ integer position of an edge among all the edges pointing
352
+ to the same node, a boolean feature indicating whether the
353
+ Notation
354
+ Meaning
355
+ E
356
+ The set of edges in the graph
357
+ (i, j)
358
+ Edge from node i pointing to node j
359
+ X(t)
360
+ i
361
+ Repr. of node i at layer t
362
+ E(t)
363
+ i→j
364
+ Repr. of the edge (i, j) at layer t
365
+ X(t)
366
+ ij
367
+ Repr. for node i associated with edge (i, j)
368
+ X′(t)
369
+ ij
370
+ Repr. for node i associated with edge (j, i)
371
+ a(t)
372
+ ij
373
+ Raw attention associated with repr. X(t)
374
+ ij
375
+ a′(t)
376
+ ij
377
+ Raw attention associated with repr. X′(t)
378
+ ij
379
+ α(t)
380
+ ij
381
+ Normalized attention associated with a(t)
382
+ ij
383
+ α′(t)
384
+ ij
385
+ Normalized attention associated with a′(t)
386
+ ij
387
+ Ti
388
+ Target neighbors of node i: {j|(i, j) ∈ E}
389
+ Si
390
+ Source neighbors of node i: {j|(j, i) ∈ E}
391
+ Table 1. The notations in GNN (“Repr.” means representation)
392
+ two nodes connected by the edge are in the same LLVM
393
+ basic block, and the distance of the two nodes if they are
394
+ in the same basic block. Equipped with the rich features of
395
+ the edges in ProGraML graphs, we propose a dynamic edge
396
+ encoding approach to capture the edge representations.
397
+ Dynamic edge representation Most existing GNNs that
398
+ exploit the edge feature basically use a static edge feature,
399
+ which means the same edge feature is repeatedly used for
400
+ all layers. It turns out that it is important to use a dynamic
401
+ edge representation during graph encoding, where the edge
402
+ representation gets updated in each GNN layer. The initial
403
+ edge representations are the concatenations of the embed-
404
+ ding of edge types, edge positions, and other edge features
405
+ discussed in the last paragraph.
406
+ Attention with edge features It was also helpful to modify
407
+ the default attention mechanism to support these custom
408
+ edge types. We propose to incorporate the edge features
409
+ by encoding a triplet containing the features of two nodes
410
+ and the feature of the edge that connects them. For clar-
411
+ ity, we show a table containing the notations used in the
412
+ GNN in Table 1. Then, the feature update process can be
413
+ mathematically defined by the following equations, where
414
+ Mi, i = 1, . . . , 5 is an encoding MLP.
415
+ X′(t+1)
416
+ ij
417
+ = M1(X(t)
418
+ i , E(t)
419
+ i→j, X(t)
420
+ j ),
421
+ (3)
422
+ a′(t+1)
423
+ ij
424
+ = M2(X(t)
425
+ i , E(t)
426
+ i→j, X(t)
427
+ j ),
428
+ (4)
429
+ X(t+1)
430
+ ji
431
+ = M3(X(t)
432
+ i , E(t)
433
+ i→j, X(t)
434
+ j ),
435
+ (5)
436
+ a(t+1)
437
+ ji
438
+ = M4(X(t)
439
+ i , E(t)
440
+ i→j, X(t)
441
+ j ),
442
+ (6)
443
+ E(t+1)
444
+ i→j
445
+ = M5(X(t)
446
+ i , E(t)
447
+ i→j, X(t)
448
+ j ),
449
+ (7)
450
+ In words, the 3-tuple, (X(t)
451
+ i , E(t)
452
+ i→j, X(t)
453
+ j ), associated with
454
+
455
+ Learning to compile smartly for program size reduction
456
+ edge (i, j), is encoded by MLPs to output 5 features, includ-
457
+ ing X′(t+1)
458
+ ij
459
+ and a′(t+1)
460
+ ij
461
+ (a representation and attention to
462
+ be aggregated in node i), and X(t+1)
463
+ ji
464
+ and a(t+1)
465
+ ji
466
+ (a repre-
467
+ sentation and attention to be aggregated in node j), and the
468
+ updated edge representation E(t+1)
469
+ i→j . Note that the features
470
+ to be aggregated to a target node are marked with the ′, and
471
+ those to a source node are without the ′. After the feature
472
+ encoding, we perform an attention-weighted neighborhood
473
+ aggregation for each node, which can be mathematically
474
+ described by the following equations.
475
+
476
+ {α(t+1)
477
+ ij
478
+ }j∈Ti ∪ {α′(t+1)
479
+ ij
480
+ }j∈Si
481
+
482
+ = Softmax
483
+
484
+ {a(t+1)
485
+ ij
486
+ }j∈Ti ∪ {a′(t+1)
487
+ ij
488
+ }j∈Si
489
+
490
+ (8)
491
+ X(t+1)
492
+ i
493
+ =
494
+
495
+ j∈Ti
496
+ α(t+1)
497
+ ij
498
+ X(t+1)
499
+ ij
500
+ +
501
+
502
+ j∈Si
503
+ α′(t+1)
504
+ ij
505
+ X′(t+1)
506
+ ij
507
+ (9)
508
+ 3.5. Dataset preparation
509
+ Overfitting issues could happen if training is performed on
510
+ a small subset of programs, or the set of programs is not
511
+ diverse enough. To mitigate this we found it helpful to
512
+ create an aggregate dataset that uses many different public
513
+ datasets as curated by CompilerGym. CompilerGym gives
514
+ us access to 14 different datasets constructed using two
515
+ different methods.
516
+ • Curated These are small collections of hand-picked
517
+ programs. They are curated to be distinct from one
518
+ another, so splitting curated suites can be challenging.
519
+ Typically programs are larger as they may comprise
520
+ multiple source files combined into a single program.
521
+ These are commonly used for evaluating compiler op-
522
+ timization improvements.
523
+ • Uncurated These are comprised of individual source
524
+ files scraped from open source repositories such as
525
+ Linux, Tensorflow, or synthetically generated pro-
526
+ grams, normally targeted for compiler testing (not op-
527
+ timization). They may not be as ”representative” of
528
+ human written test programs.
529
+ For our aggregate dataset we decided to hold-out the entirety
530
+ of the four curated datasets for use as an out-of-domain test
531
+ set. This is important because they represent the types of
532
+ programs we expect to see in the wild. We also split the
533
+ uncurated datasets into train, validaton, and test programs.
534
+ 3.6. Evaluation
535
+ For all our metrics and rewards we leverage the IR instruc-
536
+ tion count as value we are trying to minimize. We also
537
+ report metrics on each CompilerGym dataset as well as
538
+ Type
539
+ Dataset
540
+ Splits
541
+ Uncurated
542
+ anghabench-v1
543
+ train,val,test
544
+ blas-v0
545
+ train,val,test
546
+ github-v0
547
+ train,val,test
548
+ linux-v0
549
+ train,val,test
550
+ opencv-v0
551
+ train,val,test
552
+ poj104-v1
553
+ train,val,test
554
+ tensorflow-v0
555
+ train,val,test
556
+ clgen-v0
557
+ train,val,test
558
+ csmith-v0
559
+ train,val,test
560
+ llvm-stress-v0
561
+ train,val,test
562
+ Curated
563
+ cbench-v1
564
+ test
565
+ chstone-v0
566
+ test
567
+ mibench-v1
568
+ test
569
+ npb-v0
570
+ test
571
+ Table 2. CompilerGym dataset types and training splits.
572
+ the mean over datasets to get a single number to compare
573
+ overall results.
574
+ • The mean percent improved over -Oz (MeanOverOz)
575
+ defined as following:
576
+ MeanOverOz :=
577
+ 1
578
+ |P|
579
+
580
+ p
581
+ IOz
582
+ p
583
+ − Iπθ
584
+ p
585
+ IOz
586
+ p
587
+ ,
588
+ (10)
589
+ where p is a specific program from the set of programs
590
+ P in the dataset. IOz
591
+ p
592
+ is the number of IR instructions
593
+ in program after running the default compiler pass -Oz.
594
+ Iπθ
595
+ p
596
+ is the number of IR instruction in the program after
597
+ applying the policy under consideration. We can think
598
+ of this as a simple average of the percent improvement
599
+ over -Oz.
600
+ • We
601
+ also
602
+ look
603
+ compare
604
+ the
605
+ geometric
606
+ mean
607
+ (GMeanOverOz) of final size relative to -Oz.
608
+ This metric is less sensitive to outliers and is used
609
+ by (Cummins et al., 2022).
610
+ GMeanOverOz :=
611
+ ��
612
+ p
613
+ IOz
614
+ p
615
+ Iπθ
616
+ p
617
+
618
+ 1
619
+ |P|
620
+ (11)
621
+ 4. Experiments
622
+ 4.1. Baselines
623
+ • Oracle-All We consider a brute-force search over the
624
+ action tree in order to find the best action sequence for
625
+ a given program. This gives us an upper-bound of the
626
+ downstream policy network. In this case the action tree
627
+ has a total of 625 nodes.
628
+
629
+ Learning to compile smartly for program size reduction
630
+ • Oracle-Top-45 We also consider how well we would
631
+ do if the oracle is only allowed to use the most popular
632
+ action sequences but limited to 45 steps. We use 45
633
+ steps because this is maximum allowed for our all other
634
+ baselines and our proposed method.
635
+ • Autophase-RL We start with the strong baseline of us-
636
+ ing Autophase features. Autophase is a mapping from
637
+ a program to fixed size feature vector of 54 dimensions.
638
+ It contains integer counts of various program proper-
639
+ ties such as number of instructions, maximum loop
640
+ depth, etc. This is used in combined with a 2-layer
641
+ MLP model and trained with the PPO algorithm. This
642
+ is the approach presented in (Haj-Ali et al., 2020b).
643
+ • Autophase-BC We also consider the performance of
644
+ using the action sequences combined with a MLP
645
+ model using Autophase features to isolate the contribu-
646
+ tion of the GNN from the action sequences search.
647
+ • GNN-RL We compare with using ProGraML features
648
+ and our GNN model, but trained with the PPO algo-
649
+ rithm. This helps motivate the reason for performing
650
+ the search for action sequences in the first phase.
651
+ 4.2. Results
652
+ In Table 3 we present the results of our experiments com-
653
+ paring our proposed model GNN-BC as compared to the
654
+ various baselines. The test programs were completely held
655
+ out during both data-driven learning phases (action sequence
656
+ search and model training).
657
+ The results show that our model achieves strong perfor-
658
+ mance over the prior method (Autophase-RL) proposed in
659
+ (Haj-Ali et al., 2020b). Additionally we can see that both
660
+ the GNN model and the action sequences were needed to
661
+ achieve our final performance. See Figure 3 for a visualiza-
662
+ tion of the improvement in program size over the 45 steps
663
+ on some of the programs from the holdout set.
664
+ The Oracle-All shows strong performance but requires a
665
+ large number of interactions with the compiler. But, this
666
+ shows that the action sequence search generalizes to new
667
+ unseen programs. This is somewhat unsurprising given that
668
+ the compilers built-in hand tuned pass list (-Oz) works
669
+ reasonably well for most programs.
670
+ The performance of Oracle-Top-45 by itself is weak show-
671
+ ing that in order to achieve good results in a reasonable
672
+ number of passes (45) we need to leverage a general pol-
673
+ icy and search to select the most likely candidate action
674
+ sequences to evaluate.
675
+ Both RL baselines using the original action space of single
676
+ passes Autophase-RL and GNN-RL performed poorly on
677
+ the generalization task. We hypothesis that this is partly
678
+ Method
679
+ Test MeanOverOz
680
+ Test GMeanOverOz
681
+ Compiler (-Oz)
682
+ 0%
683
+ 0
684
+ Autophase-RL
685
+ -16.3%
686
+ 0.960
687
+ Autophase-BC
688
+ 4.2%
689
+ 1.056
690
+ GNN-RL
691
+ -9.6%
692
+ 1.005
693
+ GNN-BC
694
+ 4.7%
695
+ 1.062
696
+ Oracle-Top-45
697
+ -7.5%
698
+ 0.992
699
+ Oracle-All
700
+ 5.8%
701
+ 1.075
702
+ Table 3. Evaluation results on held out test set averaged over all
703
+ datasets.
704
+ due to the challenging exploration problem of the large
705
+ search space (12445). This is also a very hard setting for RL
706
+ because each program has its own cumulative reward upper
707
+ bound (which is unknown even for the training set). This
708
+ makes approximating the value function very difficult for
709
+ the baseline RL methods.
710
+ References
711
+ Almakki, M., Izzeldin, A., Huang, Q., Ali, A. H., and
712
+ Cummins, C. Autophase v2: Towards function level
713
+ phase ordering optimization. In ISCA 2022 Workshop on
714
+ MLArchSys, 2022.
715
+ Ashouri, A. H., Elhoushi, M., Hua, Y., Wang, X., Manzoor,
716
+ M. A., Chan, B., and Gao, Y. Mlgoperf: An ml guided
717
+ inliner to optimize performance, 2022. URL https:
718
+ //arxiv.org/abs/2207.08389.
719
+ Brauckmann, A., Goens, A., Ertel, S., and Castrillon, J.
720
+ Compiler-based graph representations for deep learning
721
+ models of code. In CC, pp. 201–211, 2020.
722
+ Cummins, C., Petoumenos, P., Wang, Z., and Leather, H.
723
+ End-to-end deep learning of optimization heuristics. In
724
+ 26th International Conference on Parallel Architectures
725
+ and Compilation Techniques (PACT). IEEE, 2017.
726
+ Cummins, C., Fisches, Z. V., Ben-Nun, T., Hoefler, T.,
727
+ O’Boyle, M. F. P., and Leather, H. ProGraML: A Graph-
728
+ based Program Representation for Data Flow Analysis
729
+ and Compiler Optimizations. CoRR, ICML, 2021.
730
+ Cummins, C., Wasti, B., Guo, J., Cui, B., Ansel, J., Gomez,
731
+ S., Jain, S., Liu, J., Teytaud, O., Steiner, B., et al. Com-
732
+ pilergym: robust, performant compiler optimization en-
733
+ vironments for ai research. In 2022 IEEE/ACM Interna-
734
+ tional Symposium on Code Generation and Optimization
735
+ (CGO), pp. 92–105. IEEE, 2022.
736
+ Guo, D., Ren, S., Lu, S., Feng, Z., Tang, D., Liu, S., Zhou,
737
+ L., Duan, N., Svyatkovskiy, A., Fu, S., et al. Graphcode-
738
+
739
+ Learning to compile smartly for program size reduction
740
+ bert: Pre-training code representations with data flow.
741
+ arXiv preprint arXiv:2009.08366, 2020.
742
+ Haj-Ali, A., Ahmed, N. K., Willke, T., Shao, Y. S., Asanovic,
743
+ K., and Stoica, I. Neurovectorizer: End-to-end vectoriza-
744
+ tion with deep reinforcement learning. In Proceedings of
745
+ the 18th ACM/IEEE International Symposium on Code
746
+ Generation and Optimization, pp. 242–255, 2020a.
747
+ Haj-Ali, A., Huang, Q. J., Xiang, J., Moses, W., Asanovic,
748
+ K., Wawrzynek, J., and Stoica, I.
749
+ Autophase: Jug-
750
+ gling hls phase orderings in random forests with
751
+ deep reinforcement learning.
752
+ In Dhillon, I., Pa-
753
+ pailiopoulos, D., and Sze, V. (eds.), Proceedings
754
+ of Machine Learning and Systems, volume 2, pp.
755
+ 70–81, 2020b.
756
+ URL https://proceedings.
757
+ mlsys.org/paper/2020/file/
758
+ 4e732ced3463d06de0ca9a15b6153677-Paper.
759
+ pdf.
760
+ Kulkarni, S. and Cavazos, J. Mitigating the compiler opti-
761
+ mization phase-ordering problem using machine learning.
762
+ In Proceedings of the ACM international conference on
763
+ Object oriented programming systems languages and ap-
764
+ plications, pp. 147–162, 2012.
765
+ Li, Y., Tarlow, D., Brockschmidt, M., and Zemel, R.
766
+ Gated graph sequence neural networks. arXiv preprint
767
+ arXiv:1511.05493, 2015.
768
+ Mialon, G., Chen, D., Selosse, M., and Mairal, J. Graphit:
769
+ Encoding graph structure in transformers, 2021.
770
+ Mnih, V., Kavukcuoglu, K., Silver, D., Rusu, A. A., Veness,
771
+ J., Bellemare, M. G., Graves, A., Riedmiller, M., Fidje-
772
+ land, A. K., Ostrovski, G., et al. Human-level control
773
+ through deep reinforcement learning. nature, 518(7540):
774
+ 529–533, 2015.
775
+ Schulman, J., Wolski, F., Dhariwal, P., Radford, A., and
776
+ Klimov, O. Proximal policy optimization algorithms.
777
+ arXiv preprint arXiv:1707.06347, 2017.
778
+ Srinivas, A., Laskin, M., and Abbeel, P. Curl: Contrastive
779
+ unsupervised representations for reinforcement learning,
780
+ 2020.
781
+ Steiner, B., Cummins, C., He, H., and Leather, H. Value
782
+ Learning for Throughput Optimization of Deep Learning
783
+ Workloads. In MLSys, 2021.
784
+ Trofin, M., Qian, Y., Brevdo, E., Lin, Z., Choromanski,
785
+ K., and Li, D. Mlgo: a machine learning guided com-
786
+ piler optimizations framework, 2021.
787
+ URL https:
788
+ //arxiv.org/abs/2101.04808.
789
+ Veliˇckovi´c, P., Cucurull, G., Casanova, A., Romero, A.,
790
+ Lio, P., and Bengio, Y. Graph attention networks. arXiv
791
+ preprint arXiv:1710.10903, 2017.
792
+ Wang, Z. and O’Boyle, M. Machine learning in compiler
793
+ optimization. Proceedings of the IEEE, 106(11):1879–
794
+ 1901, 2018.
795
+ Zhou, Y., Roy, S., Abdolrashidi, A., Wong, D., Ma, P.,
796
+ Xu, Q., Liu, H., Phothilimtha, P., Wang, S., Goldie, A.,
797
+ et al. Transferable graph optimizers for ml compilers.
798
+ Advances in Neural Information Processing Systems, 33:
799
+ 13844–13855, 2020.
800
+
801
+ Learning to compile smartly for program size reduction
802
+ Figure 3. Program optimization example over many steps comparing the Autophase-RL (blue) approach with our GNN-BC (orange)
803
+ approach. The dashed line represents the compiler default -Oz performance and higher is better.
804
+
805
+ benchmark://cbench-v1/diikstra
806
+ benchmark://cbench-v1/stringsearch
807
+ 1.5
808
+ 1.0
809
+ 0.5
810
+ 0.0
811
+ benchmark://cbench-v1/blowifish
812
+ benchmark://cbench-v1/stringsearch2
813
+ 1.5
814
+ 1.0
815
+ 0.5
816
+ 0.0
817
+ benchmark://cbench-vl/gsort
818
+ benchmark://cbench-v1/bitcount
819
+ 1.5
820
+ 1.0
821
+ 0.5
822
+ 0.0
823
+ benchmark://cbench-y1/rindae!
824
+ benchmark://cbench-v1/sha
825
+ 1.5
826
+ 1.0
827
+ 0.5
828
+ 0.0
829
+ i
830
+ 0
831
+ 5
832
+ 10
833
+ 15
834
+ 20
835
+ 25
836
+ 30
837
+ 35
838
+ 40
839
+ 0
840
+ 5
841
+ 10
842
+ 15
843
+ 20
844
+ 25
845
+ 30
846
+ 35
847
+ 40Learning to compile smartly for program size reduction
848
+ Dataset
849
+ Oracle-All
850
+ Oracle-Top-45
851
+ Autophase-RL
852
+ Autophase-BC
853
+ GNN-RL
854
+ GNN-BC
855
+ anghabench-v1
856
+ 0.7%/1.011
857
+ -1.0%/0.996
858
+ -15.9%/0.974
859
+ -0.1%/1.002
860
+ -2.5%/0.988
861
+ -0.0%/1.003
862
+ blas-v0
863
+ 2.6%/1.028
864
+ -0.4%/0.997
865
+ -1.7%/0.984
866
+ 1.2%/1.013
867
+ -1.2%/0.989
868
+ 2.4%/1.026
869
+ cbench-v1
870
+ 3.5%/1.041
871
+ -2.4%/0.984
872
+ -10.1%/0.925
873
+ 1.5%/1.021
874
+ 2.4%/1.030
875
+ 2.2%/1.028
876
+ chstone-v0
877
+ 9.3%/1.106
878
+ 1.2%/1.016
879
+ 1.3%/1.018
880
+ 7.0%/1.079
881
+ 6.4%/1.071
882
+ 8.8%/1.101
883
+ clgen-v0
884
+ 5.4%/1.060
885
+ 3.1%/1.034
886
+ -0.5%/0.998
887
+ 4.5%/1.050
888
+ 2.2%/1.024
889
+ 5.0%/1.056
890
+ csmith-v0
891
+ 21.2%/1.320
892
+ -96.3%/0.851
893
+ -116.0%/0.954
894
+ 21.1%/1.318
895
+ -125.4%/0.994
896
+ 21.1%/1.320
897
+ github-v0
898
+ 1.0%/1.011
899
+ 0.2%/1.002
900
+ 0.1%/1.001
901
+ 0.9%/1.009
902
+ 0.1%/1.002
903
+ 0.9%/1.010
904
+ linux-v0
905
+ 0.6%/1.007
906
+ -0.4%/0.998
907
+ -0.5%/0.997
908
+ 0.6%/1.006
909
+ -0.9%/0.996
910
+ 0.6%/1.007
911
+ llvm-stress-v0
912
+ 6.3%/1.087
913
+ -18.9%/0.885
914
+ -67.0%/0.731
915
+ 1.6%/1.040
916
+ -22.0%/0.872
917
+ 2.1%/1.045
918
+ mibench-v1
919
+ 1.7%/1.020
920
+ 0.0%/1.003
921
+ -2.8%/0.976
922
+ -0.4%/0.999
923
+ 0.6%/1.008
924
+ -0.1%/1.003
925
+ npb-v0
926
+ 9.8%/1.159
927
+ 5.7%/1.085
928
+ 0.9%/1.035
929
+ 6.0%/1.088
930
+ 4.8%/1.074
931
+ 5.5%/1.085
932
+ opencv-v0
933
+ 5.2%/1.061
934
+ 1.0%/1.013
935
+ 0.5%/1.007
936
+ 4.5%/1.054
937
+ 0.7%/1.009
938
+ 4.8%/1.057
939
+ poj104-v1
940
+ 7.8%/1.105
941
+ 3.9%/1.055
942
+ -17.5%/0.876
943
+ 5.7%/1.075
944
+ 0.1%/1.014
945
+ 6.3%/1.082
946
+ tensorflow-v0
947
+ 6.1%/1.077
948
+ -0.2%/0.998
949
+ 0.2%/1.004
950
+ 5.1%/1.063
951
+ 0.8%/1.011
952
+ 5.9%/1.075
953
+ Average
954
+ 5.8%/1.075
955
+ -7.5%/0.992
956
+ -16.3%/0.960
957
+ 4.2%/1.056
958
+ -9.6%/1.005
959
+ 4.7%/1.062
960
+ Table 4. Evaluation results on held out test set averaged over all datasets.
961
+
962
+ Learning to compile smartly for program size reduction
963
+ Index
964
+ Flag
965
+ Index
966
+ Flag
967
+ Index
968
+ Flag
969
+ 0
970
+ -add-discriminators
971
+ 42
972
+ -globalsplit
973
+ 84
974
+ -lower-expect
975
+ 1
976
+ -adce
977
+ 43
978
+ -guard-widening
979
+ 85
980
+ -lower-guard-intrinsic
981
+ 2
982
+ -aggressive-instcombine
983
+ 44
984
+ -hotcoldsplit
985
+ 86
986
+ -lowerinvoke
987
+ 3
988
+ -alignment-from-assumptions
989
+ 45
990
+ -ipconstprop
991
+ 87
992
+ -lower-matrix-intrinsics
993
+ 4
994
+ -always-inline
995
+ 46
996
+ -ipsccp
997
+ 88
998
+ -lowerswitch
999
+ 5
1000
+ -argpromotion
1001
+ 47
1002
+ -indvars
1003
+ 89
1004
+ -lower-widenable-condition
1005
+ 6
1006
+ -attributor
1007
+ 48
1008
+ -irce
1009
+ 90
1010
+ -memcpyopt
1011
+ 7
1012
+ -barrier
1013
+ 49
1014
+ -infer-address-spaces
1015
+ 91
1016
+ -mergefunc
1017
+ 8
1018
+ -bdce
1019
+ 50
1020
+ -inferattrs
1021
+ 92
1022
+ -mergeicmps
1023
+ 9
1024
+ -break-crit-edges
1025
+ 51
1026
+ -inject-tli-mappings
1027
+ 93
1028
+ -mldst-motion
1029
+ 10
1030
+ -simplifycfg
1031
+ 52
1032
+ -instsimplify
1033
+ 94
1034
+ -sancov
1035
+ 11
1036
+ -callsite-splitting
1037
+ 53
1038
+ -instcombine
1039
+ 95
1040
+ -name-anon-globals
1041
+ 12
1042
+ -called-value-propagation
1043
+ 54
1044
+ -instnamer
1045
+ 96
1046
+ -nary-reassociate
1047
+ 13
1048
+ -canonicalize-aliases
1049
+ 55
1050
+ -jump-threading
1051
+ 97
1052
+ -newgvn
1053
+ 14
1054
+ -consthoist
1055
+ 56
1056
+ -lcssa
1057
+ 98
1058
+ -pgo-memop-opt
1059
+ 15
1060
+ -constmerge
1061
+ 57
1062
+ -licm
1063
+ 99
1064
+ -partial-inliner
1065
+ 16
1066
+ -constprop
1067
+ 58
1068
+ -libcalls-shrinkwrap
1069
+ 100
1070
+ -partially-inline-libcalls
1071
+ 17
1072
+ -coro-cleanup
1073
+ 59
1074
+ -load-store-vectorizer
1075
+ 101
1076
+ -post-inline-ee-instrument
1077
+ 18
1078
+ -coro-early
1079
+ 60
1080
+ -loop-data-prefetch
1081
+ 102
1082
+ -functionattrs
1083
+ 19
1084
+ -coro-elide
1085
+ 61
1086
+ -loop-deletion
1087
+ 103
1088
+ -mem2reg
1089
+ 20
1090
+ -coro-split
1091
+ 62
1092
+ -loop-distribute
1093
+ 104
1094
+ -prune-eh
1095
+ 21
1096
+ -correlated-propagation
1097
+ 63
1098
+ -loop-fusion
1099
+ 105
1100
+ -reassociate
1101
+ 22
1102
+ -cross-dso-cfi
1103
+ 64
1104
+ -loop-guard-widening
1105
+ 106
1106
+ -redundant-dbg-inst-elim
1107
+ 23
1108
+ -deadargelim
1109
+ 65
1110
+ -loop-idiom
1111
+ 107
1112
+ -rpo-functionattrs
1113
+ 24
1114
+ -dce
1115
+ 66
1116
+ -loop-instsimplify
1117
+ 108
1118
+ -rewrite-statepoints-for-gc
1119
+ 25
1120
+ -die
1121
+ 67
1122
+ -loop-interchange
1123
+ 109
1124
+ -sccp
1125
+ 26
1126
+ -dse
1127
+ 68
1128
+ -loop-load-elim
1129
+ 110
1130
+ -slp-vectorizer
1131
+ 27
1132
+ -reg2mem
1133
+ 69
1134
+ -loop-predication
1135
+ 111
1136
+ -sroa
1137
+ 28
1138
+ -div-rem-pairs
1139
+ 70
1140
+ -loop-reroll
1141
+ 112
1142
+ -scalarizer
1143
+ 29
1144
+ -early-cse-memssa
1145
+ 71
1146
+ -loop-rotate
1147
+ 113
1148
+ -separate-const-offset-from-gep
1149
+ 30
1150
+ -early-cse
1151
+ 72
1152
+ -loop-simplifycfg
1153
+ 114
1154
+ -simple-loop-unswitch
1155
+ 31
1156
+ -elim-avail-extern
1157
+ 73
1158
+ -loop-simplify
1159
+ 115
1160
+ -sink
1161
+ 32
1162
+ -ee-instrument
1163
+ 74
1164
+ -loop-sink
1165
+ 116
1166
+ -speculative-execution
1167
+ 33
1168
+ -flattencfg
1169
+ 75
1170
+ -loop-reduce
1171
+ 117
1172
+ -slsr
1173
+ 34
1174
+ -float2int
1175
+ 76
1176
+ -loop-unroll-and-jam
1177
+ 118
1178
+ -strip-dead-prototypes
1179
+ 35
1180
+ -forceattrs
1181
+ 77
1182
+ -loop-unroll
1183
+ 119
1184
+ -strip-debug-declare
1185
+ 36
1186
+ -inline
1187
+ 78
1188
+ -loop-unswitch
1189
+ 120
1190
+ -strip-nondebug
1191
+ 37
1192
+ -insert-gcov-profiling
1193
+ 79
1194
+ -loop-vectorize
1195
+ 121
1196
+ -strip
1197
+ 38
1198
+ -gvn-hoist
1199
+ 80
1200
+ -loop-versioning-licm
1201
+ 122
1202
+ -tailcallelim
1203
+ 39
1204
+ -gvn
1205
+ 81
1206
+ -loop-versioning
1207
+ 123
1208
+ -mergereturn
1209
+ 40
1210
+ -globaldce
1211
+ 82
1212
+ -loweratomic
1213
+ 41
1214
+ -globalopt
1215
+ 83
1216
+ -lower-constant-intrinsics
1217
+ Table 5. A list of LLVM compiler pass indices and their corresponding command line flag.
1218
+
D9E4T4oBgHgl3EQffA2Y/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
DdE1T4oBgHgl3EQfqAWA/content/2301.03338v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:42d085cb5f84e37209b3b601ac4ccd533ebd64364eb252aabb9745b351db2f36
3
+ size 6979065