jackkuo commited on
Commit
5e6bdf7
·
verified ·
1 Parent(s): 9eab722

Add files using upload-large-folder tool

Browse files
This view is limited to 50 files because it contains too many changes.   See raw diff
Files changed (50) hide show
  1. -NFLT4oBgHgl3EQfCi71/content/tmp_files/2301.11976v1.pdf.txt +778 -0
  2. -NFLT4oBgHgl3EQfCi71/content/tmp_files/load_file.txt +0 -0
  3. .gitattributes +69 -0
  4. 19AyT4oBgHgl3EQf1fl-/content/tmp_files/2301.00736v1.pdf.txt +0 -0
  5. 19AyT4oBgHgl3EQf1fl-/content/tmp_files/load_file.txt +0 -0
  6. 1tE4T4oBgHgl3EQfaQwc/content/2301.05062v1.pdf +3 -0
  7. 1tE4T4oBgHgl3EQfaQwc/vector_store/index.faiss +3 -0
  8. 29FIT4oBgHgl3EQf5SvC/content/tmp_files/2301.11389v1.pdf.txt +1561 -0
  9. 29FIT4oBgHgl3EQf5SvC/content/tmp_files/load_file.txt +0 -0
  10. 59FKT4oBgHgl3EQfTC3B/content/2301.11778v1.pdf +3 -0
  11. 59FKT4oBgHgl3EQfTC3B/vector_store/index.pkl +3 -0
  12. 5dE4T4oBgHgl3EQfBQvo/content/2301.04851v1.pdf +3 -0
  13. 5dE4T4oBgHgl3EQfBQvo/vector_store/index.faiss +3 -0
  14. 5dE4T4oBgHgl3EQfBQvo/vector_store/index.pkl +3 -0
  15. 5tE0T4oBgHgl3EQfvwEb/content/tmp_files/2301.02621v1.pdf.txt +1217 -0
  16. 5tE0T4oBgHgl3EQfvwEb/content/tmp_files/load_file.txt +0 -0
  17. 5tE4T4oBgHgl3EQf1g0M/content/tmp_files/2301.05290v1.pdf.txt +1569 -0
  18. 5tE4T4oBgHgl3EQf1g0M/content/tmp_files/load_file.txt +0 -0
  19. 5tE5T4oBgHgl3EQfPQ4_/content/2301.05503v1.pdf +3 -0
  20. 5tE5T4oBgHgl3EQfPQ4_/vector_store/index.pkl +3 -0
  21. 69FKT4oBgHgl3EQf_y40/content/tmp_files/2301.11963v1.pdf.txt +662 -0
  22. 6dE1T4oBgHgl3EQfTQOX/content/tmp_files/2301.03076v1.pdf.txt +362 -0
  23. 6dE1T4oBgHgl3EQfTQOX/content/tmp_files/load_file.txt +412 -0
  24. 7NE2T4oBgHgl3EQfPQZw/content/2301.03757v1.pdf +3 -0
  25. 7NE2T4oBgHgl3EQfPQZw/vector_store/index.faiss +3 -0
  26. 7tAyT4oBgHgl3EQfpvj9/vector_store/index.faiss +3 -0
  27. 8dE4T4oBgHgl3EQfdQww/content/2301.05089v1.pdf +3 -0
  28. 8dE4T4oBgHgl3EQfdQww/vector_store/index.pkl +3 -0
  29. 9tAzT4oBgHgl3EQf-_7r/content/2301.01943v1.pdf +3 -0
  30. 9tAzT4oBgHgl3EQf-_7r/vector_store/index.pkl +3 -0
  31. 9tFST4oBgHgl3EQfbTje/vector_store/index.faiss +3 -0
  32. ANAyT4oBgHgl3EQfq_kk/content/2301.00551v1.pdf +3 -0
  33. ANAyT4oBgHgl3EQfq_kk/vector_store/index.faiss +3 -0
  34. ANAyT4oBgHgl3EQfq_kk/vector_store/index.pkl +3 -0
  35. ANE3T4oBgHgl3EQfsQvt/vector_store/index.faiss +3 -0
  36. AtAzT4oBgHgl3EQfv_4W/content/tmp_files/2301.01714v1.pdf.txt +1507 -0
  37. AtAzT4oBgHgl3EQfv_4W/content/tmp_files/load_file.txt +0 -0
  38. C9E4T4oBgHgl3EQfFwy_/content/2301.04889v1.pdf +3 -0
  39. C9E4T4oBgHgl3EQfFwy_/vector_store/index.faiss +3 -0
  40. CNE1T4oBgHgl3EQfDwNk/vector_store/index.pkl +3 -0
  41. EdAyT4oBgHgl3EQfSfdI/content/2301.00086v1.pdf +3 -0
  42. EdAyT4oBgHgl3EQfSfdI/vector_store/index.faiss +3 -0
  43. EdAyT4oBgHgl3EQfSfdI/vector_store/index.pkl +3 -0
  44. EtE1T4oBgHgl3EQf-gZN/content/tmp_files/2301.03569v1.pdf.txt +0 -0
  45. EtE1T4oBgHgl3EQf-gZN/content/tmp_files/load_file.txt +0 -0
  46. F9E1T4oBgHgl3EQfqwX2/vector_store/index.pkl +3 -0
  47. FNAzT4oBgHgl3EQfUPz_/content/tmp_files/2301.01265v1.pdf.txt +1446 -0
  48. FNAzT4oBgHgl3EQfUPz_/content/tmp_files/load_file.txt +0 -0
  49. FNFRT4oBgHgl3EQfyzjn/vector_store/index.pkl +3 -0
  50. FtAzT4oBgHgl3EQfHPtI/content/2301.01041v1.pdf +3 -0
-NFLT4oBgHgl3EQfCi71/content/tmp_files/2301.11976v1.pdf.txt ADDED
@@ -0,0 +1,778 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ arXiv:2301.11976v1 [stat.ME] 27 Jan 2023
2
+ A. Philip Dawid* and Stephen Senn
3
+ Personalised Decision-Making without
4
+ Counterfactuals
5
+ Keywords: decision theory, counterfactual, potential response, intention to treat
6
+ This article is a response to recent proposals by Pearl and others for a new approach to personalised
7
+ treatment decisions, in contrast to the traditional one based on statistical decision theory. We argue that
8
+ this approach is dangerously misguided and should not be used in practice.
9
+ 1 Introduction
10
+ In recent works [1–4], Judea Pearl and collaborators have set out an approach to personalised treatment
11
+ that is radically different from that based on traditional statistical decision theory. It is based on the
12
+ conception that we should care, not only about the outcome that actually materialises, but also about
13
+ the (necessarily unobserved, counterfactual) outcome that, it is supposed, would have occurred under the
14
+ treatment that was not applied. A similar conception forms the basis of other recent work [5–7].
15
+ We consider this approach to be dangerously misguided, and believe that real harm will ensue if it
16
+ is applied in practice. We argue our case from a number of different viewpoints, and explain why this
17
+ approach should not be regarded as a viable alternative to standard statistical decision theory.
18
+ 1.1 Basic set-up
19
+ The context is that of a “target” patient suffering from a disease, for which a treatment is available. The
20
+ treatment is far from perfect, so that not all treated patients recover, while some untreated patients may
21
+ recover anyway. There is information available on recovery rates for treated and untreated patients; both
22
+ these rates may depend on measured individual patient characteristics. The basic problem is to decide, on
23
+ the basis of the target patient’s own characteristics, whether or not to treat him. A variation is how to
24
+ prioritise patients for treatment when there are limited doses available.
25
+ We introduce notation as follows:
26
+ Treatment decision Binary decision variable X, coded 1 for treat, 0 for don’t treat
27
+ Response Binary stochastic variable Y , coded 1 for recovery, 0 for no recovery
28
+ Individual background characteristics Stochastic variable L, potentially multivariate, unaffected by
29
+ the treatment decision
30
+ We suppose that there are available substantial data on (L, X, Y ), from either experimental or uncon-
31
+ founded observational studies on patients we can regard as similar to the target1, from which we can
32
+ estimate, essentially perfectly2, the distribution of Y , conditional on L, under either treatment interven-
33
+ 1 See § 7 for further discussion of this point.
34
+ 2 In a Bayesian setting it is straightforward to relax this condition, using predictive distributions based on finite
35
+ samples. However the main issues are most clearly expressed in the case of essentially known probabilities.
36
+ *Corresponding Author: A. Philip Dawid: University of Cambridge: [email protected]
37
+ Stephen Senn: Statistical Consultant, Edinburgh: [email protected]
38
+
39
+ 2
40
+ A. Philip Dawid and Stephen Senn, Personalised Decision-Making
41
+ tion. That is, we know the probability Pr(Y = 1 | L = l, X ← x), for any value l of L and x = 0 or 1.
42
+ (Here X ← x denotes an external intervention to set X to x.)
43
+ 1.2 Outline
44
+ In § 2 we recall the straightforward decision-theoretic analysis of this problem. Then in § 3 we briefly outline
45
+ the approach proposed by Pearl et al., followed by some critical comments in § 4. Section 5 describes this
46
+ approach in more detail, following a logical path that relates it to other problems, in particular the use
47
+ of general covariate information to strengthen conclusions, and the specific case of an “intention to treat”
48
+ covariate, whose properties can be identified by combining experimental and observational data. In § 6 we
49
+ give critical consideration to some examples from Mueller and Pearl [2]. Section 7 notes some important
50
+ assumptions that are implicitly made in the analysis, and points out that they are unlikely to hold in
51
+ practice. Section 8 summarises our analysis and conclusions.
52
+ 2 Decision-theoretic approach
53
+ We first describe the standard decision-theoretic (DT) approach to treatment selection.
54
+ 2.1 Single patient decision problem
55
+ Consider first the case of the single target patient. We have to decide whether to offer this patient treatment,
56
+ or not.
57
+ Having access only to the target patient’s value L = l, our objective is to choose the treatment that will
58
+ maximise the probability of recovery. We should thus treat this patient if p := Pr(Y = 1 | L = l, X ← 1) >
59
+ q := Pr(Y = 1 | L = l, X ← 0). That is, we should treat just when CATE(l) > 0, where CATE(l) = p − q
60
+ is the “conditional average treatment effect”.
61
+ If the outcome Y is not necessarily binary, for example a survival time, we need to associate a utility
62
+ U(y) with the outcome y, and treat the patient just when E{U(Y ) | L = l, X ← 1)} > E{U(Y ) | L =
63
+ l, X ← 0)}. Applied to the binary case this reduces to the prescription above (so long as U(1) > U(0)).
64
+ In [8], a companion paper to this one which treats utilities explicitly, the above is termed the inter-
65
+ ventionist utility and approach, and contrasted with the counterfactual utility and approach implicit in [2]
66
+ and explicit in [6, 7]. Here we restrict to the binary case and do not use utilities.
67
+ Faced with a large collection G of patients to treat, and unlimited supplies of the treatment, managing
68
+ each patient (each with their own value l of L) according to the above rule will maximise the number of
69
+ recoveries. That is, any other (deterministic or randomised) decision rule that uses only the information
70
+ on L would lead to fewer recoveries.
71
+ Example 1. Consider a case where
72
+ Pr(Y = 1 | L = l, X ← 1)
73
+ =
74
+ 0.49
75
+ Pr(Y = 1 | L = l, X ← 0)
76
+ =
77
+ 0.21.
78
+ The conditional average treatment effect is CATE(l) = 0.49−0.21 = 0.28. Since CATE(l) > 0, the optimal
79
+ action is to treat this patient. If we have a large collection of similar patients, with the same value L = l,
80
+ they should all be treated—in which case the overall proportion of recovered patients will be 49%. This is
81
+ the best outcome that can be achieved by any treatment strategy.
82
+
83
+ A. Philip Dawid and Stephen Senn, Personalised Decision-Making
84
+ 3
85
+ 2.1.1 Missing information
86
+ It may happen that, while we have full information on (L, X, Y ) for the study individuals, the value l of L
87
+ for the target patient is not available. In that case we can not condition on L = l, and we have no option but
88
+ to base the management of the patient on the unconditional probabilities Pr(Y = 1 | X ← x) (x = 1, 0).
89
+ Nothing is gained by, for example, trying to impute the unknown value of L. If this is not obvious (as it
90
+ should be), suppose we tried to do so. The recovery probabilities, conditional on a hypothesised value l for
91
+ L, are Pr(Y = 1 | L = l, X ← x) (x = 1, 0). But as we do not know l, we need to take the expectation
92
+ of Pr(Y = 1 | L, X ← x) over the distribution of L, when setting X ← x (which is the known marginal
93
+ distribution of L, unaffected by the intervention). And this is just the unconditional recovery probability
94
+ Pr(Y = 1 | X ← x). 3
95
+ 2.2 Unit selection
96
+ Again consider a large collection G of patients i = 1, . . . , N, with individual recovery probabilities pi =
97
+ Pr(Yi = 1 | Li = li, Xi ← 1), qi = Pr(Yi = 1 | Li = li, Xi ← 0). If we treat just those in a subset S, the
98
+ expected number of recoveries will be �
99
+ i∈S pi + �
100
+ i∈G\S qi = �
101
+ i∈G qi + �
102
+ i∈S CATEi. Consequently, to
103
+ maximise this expected number, we should choose S, subject to any constraints, to maximise �
104
+ i∈S CATEi.
105
+ If we have limited treatments available, we should thus prioritise individuals in decreasing order of their
106
+ CATE (while of course not treating any one for whom CATE < 0.) Again, any other policy (subject to the
107
+ same constraints) will have a smaller number of recoveries.
108
+ 2.3 Potential outcomes?
109
+ The “potential outcome” approach to causal inference [9] conceives of the existence, even prior to treatment
110
+ choice, of the pair of variables Y = (Y (1), Y (0)), where Y (x) denotes the value that, it is supposed, Y will
111
+ take if intervention X ← x is applied. The pretreatment variables (Y (1), Y (0), L) are supposed to have a
112
+ joint distribution, unaffected by treatment. With this interpretation, we have
113
+ Pr(Y = y, L = l | X ← x) = Pr(Y (x) = y, L = l),
114
+ (1)
115
+ and p = E{Y (1) | L = l}, q = E{Y (0) | L = l},
116
+ In this approach, inference is ideally desired for the “individual treatment effect”, ITE := Y (1) − Y (0),
117
+ which can take values +1 (treatment benefits the patient), −1 (treatment harms the patient) or 0 (treatment
118
+ has no effect). Then CATE = E(ITE | L = l). However, typically ITE is unobservable, since it is impossible
119
+ simultaneously both to treat and not to treat the same patient. In particular, no information can be gained
120
+ about the dependence between Y (1) and Y (0), nor about the distribution (marginal, or conditional on L)
121
+ of ITE. All that can be inferred is the (conditional) expectation, as above, of ITE, depending as this does
122
+ only on the individual distributions of Y (1) and Y (0), which can be identified from experimental data.
123
+ In certain very special and atypical cases, essentially those where we have a fully deterministic and
124
+ completely understood mechanistic system, it may be that the background knowledge L is detailed enough
125
+ to support perfect prediction of the eventual response, under either intervention. Then we will know, in
126
+ advance of treatment choice, both potential outcome variables. In this case p = Y (1), q = Y (0), and
127
+ CATE = ITE. Clearly we should treat as many of those who will (we know for sure) benefit from the
128
+ treatment as we can.
129
+ 3 With finite data, on taking account of known structure in the interventional distributions of (L, Y ) it may be possible
130
+ to improve the estimation of Pr(Y = 1 | X ← x). But this still remains what we need to focus on.
131
+
132
+ 4
133
+ A. Philip Dawid and Stephen Senn, Personalised Decision-Making
134
+ However, in typical cases perfect prediction is impossible, and then it is arguable whether the potential
135
+ responses even have any meaningful existence. In any case, there is nothing to be gained by trying to impute
136
+ potential responses: as in § 2.1.1 above (taking L = Y), we should again simply focus on CATE = p − q.
137
+ In summary, consideration of potential responses (even if regarded as meaningful) does not add any
138
+ value to the decision-theoretic approach.
139
+ 3 The approach of Mueller and Pearl [2]
140
+ In contrast to the above decision-theoretic approach, Mueller amd Pearl [2] (henceforth MP) opt to take
141
+ potential outcomes seriously, and focus attention on ITE = Y (1)−Y (0). They argue that we should ideally
142
+ aim to treat those patients having ITE = 1, for whom the treatment made a difference: they would not
143
+ have recovered without it. It would be wasteful to treat a patient with ITE = 0, for whome the treatment
144
+ made no difference, and positively harmful to treat a patient with ITE = −1, who would have recovered if
145
+ untreated, but not if treated.
146
+ However, this ideal is unattainable, as we will not know a patient’s ITE before treatment. Concern is
147
+ therefore transferred to the “probability of benefit”, PB = Pr(Y (1) = 1, Y (0) = 0) = Pr(ITE = 1), and
148
+ the “probability of harm”, PH = Pr(Y (1) = 0, Y (0) = 1) = Pr(ITE = −1), which are now regarded as the
149
+ criteria by which to assess any treatment strategy.
150
+ But not only can we not know a patient’s ITE before the treatment decision is made, we can not even
151
+ know it later, when the outcome Y is observed. For if we treat the patient we will observe Y = Y (1),
152
+ but can not then observe the counterfactual outcome Y (0) relevant when we don’t treat; similarly, for an
153
+ untreated patient we can observe Y (0), but not Y (1). So ITE is always unobservable. This means that,
154
+ even with extensive data on other patients, it will not be possible fully to identify PB and PH. Such data
155
+ can, however, be used to set interval bounds on these quantities. MP [2] further show how combining
156
+ experimental and observational data can narrow these bounds. In certain very special cases the bounds
157
+ narrow to a single point, leading to full identification of PB and PH.
158
+ 4 Comments on the approach
159
+ Our comments on the MP programme are arranged along several dimensions.
160
+ 4.1 Philosophy
161
+ Potential responses such as Y (0) and Y (1), first introduced by Neyman [10], have been considered as fun-
162
+ damental to the conduct of causal inference ever since reintroduced by Rubin [9]. However this conception
163
+ was challenged by Dawid [11, 12], who pointed out that, so far from being fundamental, they are entirely
164
+ unnecessary, and that a fully satisfactory theory can be based on standard decision-theoretic elements.
165
+ Indeed, there are serious philosophical objections to regarding potential responses as having real existence.
166
+ Only if we take a fully Laplacean view of the universe, in which the future of the universe is entirely
167
+ determined by its present state and the laws of Physics, does this make any sense at all—and even then, it
168
+ is difficult to incorporate the whims of an unconstrained external agent who decides whether or not to give
169
+ treatment, or to account for the effect of external conditions arising after treatment. Even under Laplacean
170
+ determinism, our ignorance of the information needed to predict the future means that we are unable to
171
+ make use of it. Whether or not we believe in a deep-down deterministic universe, our predictions of the
172
+ future can only be based on the limited information we do have at our disposal, and must necessarily be
173
+
174
+ A. Philip Dawid and Stephen Senn, Personalised Decision-Making
175
+ 5
176
+ probabilistic.4 Imagining what we could know or do, if only we had more information than we actually do
177
+ have, is just pointless.
178
+ 4.2 Applicability
179
+ Another important dimension of criticism is that the strong conditions needed for application of the MP
180
+ theory will almost never obtain in practice. See § 7 below for details.
181
+ 4.3 Helpfulness
182
+ The output of an MP analysis will, at very best, be point estimates of the probabilities of benefit and of
183
+ harm—in most cases, we won’t even get these, but can only bound these quantities within an interval. But
184
+ even when we have these quantities, it is far from clear how they help to inform treatment decisions.
185
+ 4.4 Ethics
186
+ Our final criticism is the simplest, but most incisive. The treatment decisions made using the DT approach
187
+ are guaranteed to be better than those made by any other decision rule, in the sense that they will maximise
188
+ the number of recoveries in the population. So whenever the MP approach leads to different decisions, it
189
+ will produce a decrease in the number of recoveries. We find it hard to construe this as ethical.
190
+ 5 Analysis
191
+ Here we provide a deconstruction of the analysis of MP [2]—which should not, however, be taken as
192
+ agreement with their arguments and interpretations. There are a number of crucial assumptions required,
193
+ but to avoid cluttering the argument we leave these implicit, postponing specification and discussion of
194
+ them to § 7.
195
+ We develop the story-line in a number of stages.
196
+ In § 5.1 we consider the case where we have access to experimental data on treatment X and response
197
+ Y , and show how this can be used to bound the probabilities of benefit and of harm. We also discuss the
198
+ special circumstances in which these interval bounds shrink to a point.
199
+ In § 5.2 we further suppose that we can measure additional covariate information L on individuals. If
200
+ we have these values in the experimental data, this additional information can lead to a narrowing of the
201
+ bounds for PB and PH for the target case, even when L for that case is unobserved.
202
+ Section 5.3 introduces a particular, potentially useful, covariate, “intention to treat”, X∗—the treat-
203
+ ment that a patient (or their doctor) would like to choose, if unconstrained. This may well be informative
204
+ about their state of health, and thus their outcome. In some experiments it may be possible to obtain
205
+ information about X∗, and this can then be used as L in § 5.2. However it will often not be possible to
206
+ observe X∗ in the experiment. Section 7.2 considers how this problem can be overcome by the incorpora-
207
+ tion of observational data, if we can assume that, in such data, the desired treatment was the one actually
208
+ applied, so that X∗ = X becomes observable. The combination of experimental and observational data
209
+ allows us to identify the distribution of X∗ (together with the other variables), and so once again allows
210
+ us to apply the theory of § 5.2 to obtain improved bounds for PB and PH, which are detailed in § 5.5.
211
+ 4 See Dawid [13] for an approach to understanding non-extreme probabilities based on imperfect information about a
212
+ deterministic world.
213
+
214
+ 6
215
+ A. Philip Dawid and Stephen Senn, Personalised Decision-Making
216
+ 5.1 Simplest case
217
+ We start by presenting the basis of the approach in the simplest case, where the data are experimental, and
218
+ there is no additional covariate information. We thus have access to the interventional response probabilities
219
+ Pr(Y = y | X ← x) = Pr(Y (x) = y), (x, y = 0, 1). What can be inferred, from these, about the probabilities
220
+ of benefit and of harm?
221
+ As described by Dawid and Musio [14], it is helpful to express the interventional probabilities in terms
222
+ of parameters τ and ρ, where
223
+ τ
224
+ :=
225
+ Pr(Y = 1 | X ← 1) − Pr(Y = 1 | X ← 0)
226
+ (2)
227
+ ρ
228
+ :=
229
+ Pr(Y = 1 | X ← 1) − Pr(Y = 0 | X ← 0).
230
+ (3)
231
+ Then τ is the average treatment effect, ATE, of X on Y , while ρ = Pr(Y = 1 | X ← 1) + Pr(Y = 1 | X ←
232
+ 0) − 1 is a measure of how common the outcome is.
233
+ The transition matrix (Pr(Y = y | X ← x)) from X to Y is
234
+ P = P(τ, ρ) :=
235
+
236
+ 1
237
+ 2(1 + τ + ρ)
238
+ 1
239
+ 2(1 − τ − ρ)
240
+ 1
241
+ 2(1 − τ + ρ)
242
+ 1
243
+ 2(1 + τ − ρ)
244
+
245
+ ,
246
+ (4)
247
+ where the row and column labels are implicitly 1 and 0 in that order. The necessary and sufficient condition
248
+ for all the transition probabilities to be non-negative is
249
+ |τ| + |ρ| ≤ 1.
250
+ (5)
251
+ We have equality in (5) only in the degenerate case that one of the entries of P is 0.
252
+ We can express the joint distribution for Y = (Y (1), Y (0)) as in Table 1. The margins are determined
253
+ Y (0) = 1
254
+ Y (0) = 0
255
+ Y (1) = 1
256
+ 1
257
+ 2 (1 + ρ − ξ)
258
+ 1
259
+ 2 (ξ + τ)
260
+ 1
261
+ 2 (1 + τ + ρ)
262
+ Y (1) = 0
263
+ 1
264
+ 2(ξ − τ)
265
+ 1
266
+ 2 (1 − ρ − ξ)
267
+ 1
268
+ 2 (1 − τ − ρ)
269
+ 1
270
+ 2(1 − τ + ρ)
271
+ 1
272
+ 2(1 + τ − ρ)
273
+ 1
274
+ Table 1. Joint probability distribution of (Y (1), Y (0)
275
+ by (1) (with L absent) and (4); but the internal entries are indeterminate, having one degree of freedom
276
+ crystallised in the unspecified “slack variable” ξ, which is not identified by the experimental data. The only
277
+ constraint on ξ is the logical one that all internal entries of Table 1 be non-negative. This holds if and only
278
+ if
279
+ |τ| ≤ ξ ≤ 1 − |ρ|.
280
+ (6)
281
+ This interval information is all that can be concluded about the joint distribution for Y when we have data
282
+ on the behaviour of Y under intervention on X, and no additional information.
283
+ Remark 1. The interval (6) shrinks to a point, so that the joint distribution of Y is fully determined by
284
+ the experimental data, if and only if we have equality in (5), i.e., just when P is degenerate, so that, for
285
+ some x, y = 0, 1, Pr(Y = y | X ← x) = 0. That is to say, for at least one of the interventions, the resulting
286
+ outcome Y can be predicted with certainty—a most unusual state of affairs. In this case Pr(Y (x) = y) = 0,
287
+ so that both joint events (Y (x) = y, Y (x) = 0) and (Y (x) = y, Y (x) = 1) (where x = 1−x) have probability
288
+ 0.
289
+ 5.1.1 Benefit and harm
290
+ The probability of benefit PB is the upper right entry of Table 1, PB = Pr(Y (1) = 1, Y (0) = 0) = 1
291
+ 2(ξ +τ),
292
+ which by (6) is bounded between PB− := 1
293
+ 2(|τ|+τ) = max{τ, 0} and PB+ := 1
294
+ 2(1−|ρ|+τ) = min{Pr(Y =
295
+
296
+ A. Philip Dawid and Stephen Senn, Personalised Decision-Making
297
+ 7
298
+ 1 | X ← 1), Pr(Y = 0 | X ← 0)}. The probability of harm is the lower left entry of Table 1, PH =
299
+ Pr(Y (1) = 0, Y (0) = 1) = 1
300
+ 2(ξ − τ) = PB − τ.
301
+ For the case of Example 1, we have τ = 0.28, ρ = −0.3. Without any further information, we can only
302
+ infer 0.28 ≤ PB ≤ 0.49, and correspondingly 0 ≤ PH ≤ 0.21.
303
+ 5.2 Covariate information
304
+ Now suppose that, again with experimental data, we can obtain additional information on some pre-
305
+ treatment covariate information L (for simplicity assumed discrete), unaffected by intervention (so Pr(L =
306
+ l | X ← x) = Pr(L = l), assumed known and positive). We thus have access to the conditional interventional
307
+ probabilities Pr(Y = y | L = l, X ← x).
308
+ Let τ(l), ρ(l) be defined as in (2) and (3), but with probabilities further conditioned on L = l. If,
309
+ for the target case, we observe L = l, then we simply apply the above analysis, conditional on L = l. In
310
+ particular, the joint distribution for Y, given L = l, will be as in Table 1, with ρ, τ, ξ replaced, respectively,
311
+ by ρ(l), τ(l), ξ(l), where ξ(l) is subject only to
312
+ |τ(l)| ≤ ξ(l) ≤ 1 − |ρ(l)|.
313
+ (7)
314
+ Finally, suppose that, while having access, from the experimental data, to the probabilities Pr(Y =
315
+ y | L = l, X ← x), we do not observe L for the target patient. In this case (and unlike the situation
316
+ for decision theory) the additional background knowledge can make a difference. In Table 1 we now have
317
+ ξ = �
318
+ s ξ(l) × Pr(L = l), and we get the new interval bound
319
+ L :=
320
+
321
+ s
322
+ |τ(l)| × Pr(L = l) ≤ ξ ≤ 1 −
323
+
324
+ s
325
+ |ρ(l)| × Pr(L = l) =: U.
326
+ (8)
327
+ Since τ = �
328
+ s τ(l) × Pr(L = l), ρ = 1 − �
329
+ s ρ(l) × Pr(L = l), this interval will be strictly contained in
330
+ that of (6) so long as not all the (τ(l)), or not all the (ρ(l)), have the same sign.
331
+ The probability of benefit is now bounded below by �
332
+ l PB−(l) Pr(L = l) and above by �
333
+ l PB+(l) Pr(L =
334
+ l), where PB−(l) and PB+(l) can be computed as in § 5.1.1 with τ and ρ replaced by τ(l) and ρ(l), re-
335
+ spectively.
336
+ Remark 2. Applying Remark 1, and noting |τ(l)| ≤ 1 − |ρ(l)|, all l, we see that the interval (8) will reduce
337
+ to a point, yielding full identification of the joint distribution of Y, if and only if |τ(l)| = 1 − |ρ(l)|, all l,
338
+ so that, for each l, at least one of Pr(Y = y | L = l, X ← x), for x, y = 0, 1, is zero. In this case, both
339
+ Pr(Y (x) = y, Y (x) = 0 | L = l) and Pr(Y (x) = y, Y (x) = 1 | L = l) will be 0. Knowing the value of L
340
+ will then always allow us to predict at least one of the interventional outcomes with certainty. However,
341
+ the relevant x and y may vary with l, in which case such certainty will not be possible in the absence of
342
+ knowledge of L.
343
+ 5.2.1 Observational data
344
+ Consider now the case that our data are observational, rather than experimental. Suppose we can observe
345
+ a “sufficient covariate”: a covariate L such that, conditional on L, we can assume there is no residual
346
+ confounding. That is to say, the observational probability Pr(Y = y | L = l, X = x) can be equated with
347
+ the interventional probability Pr(Y = y | L = l, X ← x). To ensure meaningful conditioning, we further
348
+ need the positivity condition: in the observational setting,
349
+ Pr(L = l, X = x) > 0
350
+ all l, and x = 0 or 1.
351
+ (9)
352
+ We can then proceed exactly as in § 5.2 above.
353
+
354
+ 8
355
+ A. Philip Dawid and Stephen Senn, Personalised Decision-Making
356
+ 5.3 Intention to treat
357
+ Allocation of treatment to patients can be usefully decomposed into two steps:
358
+ Intention The patient, or their doctor, decides on which treatment they would ideally want. This decision
359
+ will typically be related to their health status and other background information that could be predic-
360
+ tive of recovery, so that we cannot regard those who desire, and those who reject, active treatment as
361
+ comparing like with like. This is the genesis of confounding.
362
+ We introduce a binary stochastic “intention to treat” (ITT) variable X∗ to denote the treatment
363
+ desired.
364
+ Application A treatment X is imposed on the patient.
365
+ It is important to distinguish X and X∗.5 The ITT variable X∗ exists prior to application of treatment,
366
+ and can thus be regarded as independent of it:
367
+ Pr(X∗ = x∗ | X ← x) = Pr(X∗ = x∗).
368
+ (10)
369
+ This expresses the covariate nature of X∗.
370
+ We assume that, in an observational setting, the desired treatment is the one that is actually admin-
371
+ istered (there being no reason to do otherwise). Thus the received treatment X will be the same as the
372
+ desired treatment X∗. In particular, since we observe X, we can infer the value of X∗.
373
+ In an experiment, however, the treatment X will be imposed (e.g., by randomization), in a way that
374
+ will typically take no account of X∗. Even though we can still conceive of the ITT variable X∗ as existing,
375
+ it may or—more usually—may not be possible to observe it. When X∗ is observable, it can be used, just
376
+ like any other covariate, to improve decision-making, as in § 2 (when X∗ is observed for the target patient),
377
+ or, in the approach of MP, to narrow the bounds on PB and PH, as in § 5.2.
378
+ 5.3.1 ITT as a sufficient covariate
379
+ In an observational setting, where X∗ = X is observed, it is natural to assume “distributional consistency”
380
+ [12]: the distribution of Y given intended treatment X∗ = x—and so, also, given received treatment
381
+ X = x—is the same as that of Y , given X∗ = x, under an imposed intervention X ← x that happens to
382
+ coincide with the treatment that would have been chosen anyway:
383
+ Pr(Y = y | X∗ = x, X = x) = Pr(Y = y | X∗ = x, X ← x).
384
+ (11)
385
+ For x∗ ̸= x, the event (X∗ = x∗, X = x) does not occur in the observational regime, so we can interpret
386
+ Pr(Y = y | X∗ = x∗, X = x) however we want, in particular as
387
+ Pr(Y = y | X∗ = x∗, X = x) = Pr(Y = y | X∗ = x∗, X ← x),
388
+ (12)
389
+ and then (11) implies that (12) holds for all x, x∗.
390
+ Properties (10) and (12) imply that X∗, which is observed in the observational setting, behaves as a
391
+ sufficient covariate.
392
+ 5.4 Combination of data
393
+ It would be nice if, with observational data, we could profit from the fact that X∗ is a sufficient covariate,
394
+ as in § 5.2.1. However, this is not straightforward, since the positivity condition (9) fails: for x∗ ̸= x, even
395
+ 5 We should further distinguish between imposed treatment and received treatment, as in Dawid [12]. Here we notate
396
+ both as X, hoping this will cause no confusion. We write X ← x when X refers to the imposed treatment, and X = x
397
+ when X refers to the received treatment.
398
+
399
+ A. Philip Dawid and Stephen Senn, Personalised Decision-Making
400
+ 9
401
+ though we may assume Pr(Y = y | X∗ = x∗, X ← x) = Pr(Y = y | X∗ = x∗, X = x), we have no
402
+ data to estimate the latter term. Again, when our data are experimental but we can not directly observe
403
+ X∗, we can not identify Pr(Y = y | X∗ = x∗, X ← x). However, it turns out that we can do so if we
404
+ can also obtain observational data: the combination of both types of data allows us, after all, to identify
405
+ Pr(Y = y | X∗ = x∗, X ← x), even for x ̸= x∗. This we show in the following theorem.
406
+ Theorem 1. Suppose we can identify the joint distribution of X and Y in the observational context, where
407
+ 0 < Pr(X = 1) < 1, and can also identify the distribution of Y under either intervention X ← x (x = 0, 1).
408
+ Then, under conditions (10) and (11), all the probabilities Pr(Y = y | X∗ = x∗, X ← x) (x, x∗ = 0, 1) are
409
+ identified. Specifically,
410
+ Pr(Y = y | X∗ = 1, X ← 1)
411
+ =
412
+ Pr(Y = y | X = 1)
413
+ (13)
414
+ Pr(Y = y | X∗ = 0, X ← 0)
415
+ =
416
+ Pr(Y = y | X = 0)
417
+ (14)
418
+ Pr(Y = y | X∗ = 1, X ← 0)
419
+ =
420
+ Pr(Y = y | X ← 0) − Pr(Y = y, X = 0)
421
+ Pr(X = 1)
422
+ (15)
423
+ Pr(Y = y | X∗ = 0, X ← 1)
424
+ =
425
+ Pr(Y = y | X ← 1) − Pr(Y = y, X = 1)
426
+ Pr(X = 0)
427
+ .
428
+ (16)
429
+ Proof. (13) and (14) follow from (11).
430
+ To identify Pr(Y = y | X∗ = 0, X ← 1), we argue as follows. We have
431
+ Pr(Y = y | X ← 0)
432
+ =
433
+ Pr(Y = y | X∗ = 0, X ← 0) × Pr(X∗ = 0 | X ← 0)
434
+ + Pr(Y = y | X∗ = 1, X ← 0) × Pr(X∗ = 1 | X ← 0)
435
+ =
436
+ Pr(Y = y | X = 0) × Pr(X = 0)
437
+ + Pr(Y = y | X∗ = 1, X ← 0) × Pr(X = 1),
438
+ (17)
439
+ on using (10) and (11), and the fact that X∗ = X in the observational setting. Since all the other terms in
440
+ (17) are identifiable in either the observational or the experimental context, and Pr(X = 1) ̸= 0, we can
441
+ solve for Pr(Y = y | X∗ = 1, X ← 0), obtaining (15). Then (16) follows similarly.
442
+ The above proof relies on X (and so X∗) being binary, but Y need not be. Versions of this argument have
443
+ appeared in [14–17].
444
+ Corollary 1. The joint distribution of (X∗, Y ) under the intervention X ← x is then identified.
445
+ Proof. Follows since, by (10), Pr(X∗ = x∗ | X ← x) = Pr(X = x∗) is identified in the observational
446
+ context.
447
+ Remark 3. Since Pr(Y = y | X∗ = 1, X ← 0) ≥ 0, etc., we deduce from (15) and (16) the consistency
448
+ constraint Pr(Y = y | X ← x) ≥ Pr(Y = y, X = x), all x, y. When this fails, and that failure can not
449
+ be ascribed to sampling variation or bias, that is evidence of violation of the conditions of § 7 below, that
450
+ have, implicitly, been used to justify the above argument.
451
+ Theorem 1 and Corollary 1 express just what the combination of observational and experimental data is
452
+ doing for us: it allows us to identify distributions involving the ITT variable X∗.
453
+ 5.5 Benefit and harm
454
+ Taking now X∗ as our sufficient covariate L, we can apply the formulae of (13)–(16) to compute the
455
+ quantities τ(x∗), ρ(x∗) required for the analysis of § 5.2. Noting that X∗ = X in the observational regime,
456
+
457
+ 10
458
+ A. Philip Dawid and Stephen Senn, Personalised Decision-Making
459
+ so that Pr(X = x) = Pr(X∗ = x), we obtain
460
+ Pr(X∗ = 1) × τ(1)
461
+ =
462
+ Pr(Y = 1) − Pr(Y = 1 | X ← 0)
463
+ Pr(X∗ = 0) × τ(0)
464
+ =
465
+ Pr(Y = 1 | X ← 1) − Pr(Y = 1)
466
+ Pr(X∗ = 1) × ρ(1)
467
+ =
468
+ K − Pr(Y = 0 | X ← 0)
469
+ Pr(X∗ = 0) × ρ(0)
470
+ =
471
+ Pr(Y = 1 | X ← 1) − K
472
+ where K = Pr(Y = 1, X = 1) + Pr(Y = 0, X = 0). Then from (8) we bound ξ within (L, U), where
473
+ L
474
+ =
475
+ | Pr(Y = 1) − Pr(Y = 1 | X ← 0)| + | Pr(Y = 1) − Pr(Y = 1 | X ← 1)|
476
+ 1 − U
477
+ =
478
+ | Pr(Y = 0 | X ← 0) − K| + | Pr(Y = 1 | X ← 1) − K|
479
+ Then PB lies in ( 1
480
+ 2(L + τ), 1
481
+ 2(U + τ)), and PH = PB − τ lies in ( 1
482
+ 2(L − τ), 1
483
+ 2(U − τ)). Although expressed
484
+ differently, these results agree with those of MP [2].
485
+ By Remark 2, the joint distribution of Y, and in particular PB, PH, will be point identified just when,
486
+ for both x∗ = 0 and x∗ = 1, there exist x, y such that Pr(Y = y | X∗ = x∗, X ← x) = 0. In non-trivial
487
+ cases we will have Pr(Y = y | X = x) ̸= 0, in which case, by (13) and (14), this would need to happen
488
+ with x ̸= x∗. For that, by (15) and (16), we require
489
+ Pr(Y = y | X ← 0) = Pr(Y = y, X = 0)
490
+ (18)
491
+ for either y = 1 or y = 0; as well as
492
+ Pr(Y = y | X ← 1) = Pr(Y = y, X = 1)
493
+ (19)
494
+ for either y = 1 or y = 0.
495
+ 6 Examples
496
+ MP [2, Table 1] consider two cases, in both of which the interventional probabilities of recovery are as in
497
+ our Example 1, having Pr(Y = 1 | X ← 1) = 0.49, Pr(Y = 1 | X ← 0) = 0.21, and so ATE = 0.28.
498
+ However, they have different observational data. We now analyse these in detail.
499
+ Example 2. This example relates to females, for whom the observational joint probabilities are as in
500
+ Table 2.
501
+ Y = 1
502
+ Y = 0
503
+ X = 1
504
+ 0.19
505
+ 0.51
506
+ 0.70
507
+ X = 0
508
+ 0.21
509
+ 0.09
510
+ 0.30
511
+ 0.40
512
+ 0.60
513
+ 1
514
+ Table 2. Joint observational distribution of (X, Y ) for females
515
+ Applying the formulae of § 5.5 we find:
516
+ 0.7 × τ(1)
517
+ =
518
+ 0.19
519
+ 0.3 × τ(0)
520
+ =
521
+ 0.09
522
+ 0.7 × ρ(1)
523
+ =
524
+ −0.51
525
+ 0.3 × ρ(0)
526
+ =
527
+ 0.11
528
+ It follows that PB−(1) = τ(1) = 19/70. Also, PB+(1) = Pr(Y = 1 | X∗ = 1, X ← 1) = Pr(Y = 1 |
529
+ X = 1) = 19/70. Hence, given X∗ = 1, we have exact identification: PB(1) = 19/70. This occurs because
530
+
531
+ A. Philip Dawid and Stephen Senn, Personalised Decision-Making
532
+ 11
533
+ Pr(Y = 1, X = 0) = 0.21 = Pr(Y = 1 | X ← 0), implying the deterministic property Pr(Y = 1 | X∗ =
534
+ 1, X ← 0) = 0: a female who desires treatment will never recover if untreated. Consequently such a female
535
+ should be treated.
536
+ Also, PB−(0) = τ(0) = 0.3, while PB+(0) = Pr(Y = 0 | X∗ = 0, X ← 0) = Pr(Y = 0 | X = 0) = 0.3.
537
+ Given X∗ = 0, we again have exact identification: PB−(0) = 0.3. This occurs because Pr(Y = 0, X =
538
+ 1) = 0.51 = Pr(Y = 0 | X ← 1), so that Pr(Y = 0 | X∗ = 0, X ← 1) = 0: a female who does not desire
539
+ treatment will always recover if treated. Again, such a female should be treated.
540
+ Finally we obtain exact identification marginally: PB = 0.28. Correspondingly, PH = PB − τ = 0. As
541
+ there is no possibility of harm, any female should be treated.
542
+ All the above conclusions agree with the DT prescription, based on the experimental data alone: since
543
+ ATE > 0, a female should be treated.
544
+ Example 3. For males, the observational joint probabilities are as in Table 3. Proceeding similarly to
545
+ Y = 1
546
+ Y = 0
547
+ X = 1
548
+ 0.49
549
+ 0.21
550
+ 0.70
551
+ X = 0
552
+ 0.21
553
+ 0.09
554
+ 0.30
555
+ 0.70
556
+ 0.30
557
+ 1
558
+ Table 3. Joint observational distribution of (X, Y ) for males
559
+ Example 2, we find that PB and PH are again identified exactly: PB = 0.49, PH = 0.21. Indeed, Pr(Y =
560
+ 1, X = 1) = 0.49 = Pr(Y = 1 | X ← 1), implying the deterministic property Pr(Y = 1 | X∗ = 0, X ← 1) =
561
+ 0: a male who does not desire treatment will never recover if treated. Consequently such a male should not
562
+ be treated. Also, Pr(Y = 1, X = 0) = 0.21 − Pr(Y = 1 | X ← 0), so that Pr(Y = 1 | X∗ = 1, X ← 0) = 0:
563
+ a male who desires treatment will never recover if untreated, so that such a male should be treated.
564
+ However, if we do not observe X∗ for the target male patient, the above does not tell us how to proceed.
565
+ We might try to balance PH (= 0.49) and PB (= 0.21) somehow: for example, treat just when PB > λPH
566
+ for some chosen value of λ. In the light of the clinical maxim primum non nocere, a value λ = 3 might be
567
+ chosen—in which case the target male would not be treated.6
568
+ By contrast, in the absence of knowledge of X∗ for the target male, the DT approach would take no
569
+ account of the observational data, again focusing simply on ATE = 0.28—and so decide to treat. In a large
570
+ population of similar cases, this would lead to an overall recovery rate of 49%, the maximum possible;
571
+ whereas the above strategy based on balancing PB and PH would only have a 21% recovery rate. It is
572
+ difficult to see how this could be regarded as ethical.
573
+ Example 4. Consider another case. Again, the interventional probabilities are Pr(Y = 1 | X ← 1) = 0.49,
574
+ Pr(Y = 1 | X ← 0) = 0.21, with τ = 0.28. Now the observational joint probabilities are as in Table 4. We
575
+ Y = 1
576
+ Y = 0
577
+ X = 1
578
+ 0.2
579
+ 0.5
580
+ 0.7
581
+ X = 0
582
+ 0.1
583
+ 0.2
584
+ 0.3
585
+ 0.3
586
+ 0.7
587
+ 1
588
+ Table 4. Another joint observational distribution of (X, Y )
589
+ 6 This argument parallels one in MP [1], having different numbers, and λ = 2.
590
+
591
+ 12
592
+ A. Philip Dawid and Stephen Senn, Personalised Decision-Making
593
+ compute
594
+ 0.7 × τ(1)
595
+ =
596
+ 0.09
597
+ 0.3 × τ(0)
598
+ =
599
+ 0.19
600
+ 0.7 × ρ(1)
601
+ =
602
+ −0.39
603
+ 0.3 × ρ(0)
604
+ =
605
+ 0.09.
606
+ Using (8) we find 0.28 ≤ ξ ≤ 0.52, whence PB = 1
607
+ 2(ξ + τ) is bounded between 0.28 and 0.40—and so
608
+ PH = PB − τ lies between 0 and 0.12. So, even with the aid of the additional observational data, we have
609
+ not been able to identify these probabilities exactly. And even if we were to resolve the ambiguity somehow,
610
+ for example by taking the midpoints of these intervals as suggested by Li and Pearl [3], we would be no
611
+ better off than we were in Example 3, where trying to balance PB against PH could lead to a decision
612
+ opposite to the rcommendation of the simple DT analysis, so leading to fewer recoveries.
613
+ 7 Assumptions and critical comments
614
+ Here we identify and discuss some of the assumptions underlying the foregoing analyses.
615
+ 7.1 Representative data
616
+ A fundamental assumption underlying both the decision-theoretic analysis of § 2 and the alternative ap-
617
+ proach of § 3 is that the data available for estimating the interventional probabilities Pr(Y = y, L = l |
618
+ X ← x) are on individuals who can be regarded as “similar to” (“exchangeable with”) the target case, so
619
+ that these estimated probabilities are applicable to the target.7 In reality this is highly implausible. For
620
+ example, a clinical trial will have entry criteria and processes that make its subjects quite untypical of
621
+ the population from which they are drawn, or indeed of the individuals recruited into another such trial.
622
+ In any case, despite the name, entry criteria govern who does not get into a trial: they cannot guarantee
623
+ that those who enter are representative even of a target individual meeting the same criteria. A clinical
624
+ trial gains its value, not from representativeness, but from the internal randomisation that ensures that a
625
+ comparison between its treated and untreated groups is indeed a comparision of like with like, and that
626
+ valid probability statements can be made about likely differences, so enforcing internal validity. Because
627
+ of unrepresentativeness it would not be appropriate to regard Pr(Y = y, L = l | X ← x), estimated from
628
+ the data, as being directly relevant to the target case—the problem of external validity. (One cheating way
629
+ round this is to focus on a hypothetical target individual who can be regarded as exchangeable with those
630
+ in the study.) Nevertheless, it may still be reasonable to regard the estimated ATE or CATE as applying
631
+ to the target—if not in its exact numerical value, at least in its sign, which is what is required, for DT
632
+ application, to solve the single patient treatment problem; or in its ordering of the CATEi, as required to
633
+ solve the DT unit selection problem.
634
+ To underline how unreasonable the representative assumption is, it should be noted that even when
635
+ clinical trials with similar protocols are compared this assumption is not made. A striking example of its
636
+ failure for nearly identical protocols is given by the TARGET study [18], in which osteoarthritis patients in
637
+ some centres were randomised to receive either lumiracoxib or naproxen, and patients in other centres either
638
+ lumiracoxib or ibuprofen. The degree of comparability in design of the two sub-studies thus defined was
639
+ 7 For application to the MP arguments of § 3, the representativeness assumption should apparently be extended to
640
+ the (typically unidentifiable) bivariate distribution, along with the other variables, of the pair of potential responses
641
+ (Y (1), Y (0)). For the interval-valued inferences made, however, this is not crucial, since these allow for arbitrary de-
642
+ pendence in this bivariate distribution.
643
+
644
+ A. Philip Dawid and Stephen Senn, Personalised Decision-Making
645
+ 13
646
+ greater than one would typically expect between two randomised controlled trials (RCTs), and a fortiori
647
+ than between an RCT and an observational study, such as MP consider. Nevertheless, very important
648
+ differences at baseline were seen between the two sub-studies, even though within-sub-study treatment
649
+ arms were comparable. Furthermore, it was possible to demonstrate differences at outcome between the
650
+ two studies using lumiracoxib data only, a striking illustration of a study effect. It is generally accepted by
651
+ sponsors and regulators that as soon as concurrent control is abandoned the greatest of care must be taken
652
+ in drawing inferences. Modern work on using data on historical controls to try and improve the efficiency
653
+ of clinical trials takes such study-to-study variation as a given that must be allowed for [19].
654
+ 7.2 Combination of data
655
+ An essential requirement for the application of Theorem 1 is that the observational and experimental
656
+ datasets comprise similar individuals, so that the same probabilities for X, X∗, Y apply to both groups.
657
+ This is even more implausible than the representativeness of either group. In particular, the assumption of
658
+ a common distribution for the desired treatment X∗, in both datasets and in the target patient, is vital but
659
+ highly questionable. Even if we were to accept the arguments of MP [2] based on combining observational
660
+ and experimental data, without this property they are simply irrelevant.
661
+ 7.3 What do clinical trialists do in practice?
662
+ The key to using RCTs is to identify reasonable assumptions, and use theory to transfer results from trial
663
+ to practice. A striking example is given by bioequivalence studies. The subjects are usually young healthy
664
+ volunteers, frequently male. However, the results will be used to decide on appropriate treatments for
665
+ elderly frail patients, some female. There is no pretence of representativeness. Instead, tight control and
666
+ sensible scales of analysis are used. The purpose of such studies is to compare two formulations in terms of
667
+ bioavailability, and this is typically done using a cross-over trial in which each subject is their own control,
668
+ the order of administration being randomised. On separate days, concentration of the test and reference
669
+ pharmaceuticals are measured, and the ratio of the areas under the two concentration time curves (AUCs)
670
+ are calculated for each subject, then analysed over all subjects, typically after log-transformation. What is
671
+ relevant for treating an individual patient is their own AUC: too low and efficacy may be disappointing,
672
+ too high and the drug may not be tolerated. However, no inference is made from a bioequivalence study
673
+ in terms of AUCs alone, since they would be quite different in healthy volunteers and patients. Instead,
674
+ the idea is that the ratio between test and reference ought to be the same in volunteers and patients, and
675
+ this ratio can be used to make predictions as to how the test drug will behave in clinical practice. An
676
+ interesting example of such a study is reported by Shumaker and Metzler [20]. They used a more elaborate
677
+ design in which test and reference drugs were given in a double cross-over, thus permitting them to analyse
678
+ the formulation-by-subject interaction. They were able to demonstrate that there was no evidence of an
679
+ individual bioequivalence effect: although you could estimate the individual relative bioavailability, using
680
+ the average over all subjects would be superior than any such naïve estimate. This raises a further issue
681
+ with MP, who assume that individual causal effects are stable over time. Moreover, typical causal analysis
682
+ assumes an infinite sample size, but no infinities are available for individual subjects, and estimating
683
+ individual causal effects requires close attention to components of variance. Bioequivalence studies are an
684
+ extreme example, but the general idea of transferring results using a suitable scale for analysis, and back-
685
+ transforming to a scale suitable for decision analysis, is commonplace: see [21] for a general discussion and
686
+ [22] in the specific context of vaccine efficacy. Of course, as the COVID-19 pandemic has reminded us, there
687
+ are no guarantees. Things that work at one time may not do so at another. It behoves all those proposing
688
+ solutions to be cautious and humble.
689
+
690
+ 14
691
+ A. Philip Dawid and Stephen Senn, Personalised Decision-Making
692
+ 8 Summary
693
+ We have given careful accounts of the DT and MP approaches to individualised treatment choice. The DT
694
+ approach is simple in the extreme, and selects the treatment strategy that maximises the number of recov-
695
+ eries. In contrast, the MP approach fixates on philosophically questionable and unknowable counterfactual
696
+ concepts, and when its recommendations differ from those of DT will lead to fewer recoveries. This has
697
+ been illustrated in a number of examples.
698
+ One feature of the MP approach is the combination of experimental and observational data. When
699
+ some very strong, and practically implausible, conditions are satisfied, this permits identification of the
700
+ distribution of a special covariate, the intention to treat (ITT). As with any other covariate whose distri-
701
+ bution is known, this can then feed back to tighten the MP inferences. But it would be better to observe
702
+ this—or any other—covariate in the target patient, which would then lead to better results from the DT
703
+ point of view. In particular we have shown that, in just those very special cases that use of ITT leads to
704
+ point identification of the MP probabilities of benefit and of harm, knowledge of the target patient’s ITT
705
+ value allows perfect prediction of the outcome under at least one of the treatment interventions, and so to
706
+ a trivial solution to the decision problem.
707
+ The DT approach has a long history of fruitful application to an enormous variety of fields, from clinical
708
+ trials to rocket science. Attempts to replace it with another approach, based on counterfactuals, are totally
709
+ unnecessary and dangerously misguided. This approach should not be used in practice.
710
+ Acknowledgments
711
+ We have benefited greatly from discussions with Mats Stensrud and Aaron Sarvet.
712
+ Conflict of interest: Prof. Philip Dawid is a member of the Editorial Board in the Journal of Causal
713
+ Inference but was not involved in the review process of this article.
714
+ References
715
+ [1]
716
+ Scott Mueller and Judea Pearl.
717
+ Which patients are in greater need: A counterfactual analysis with reflections on
718
+ COVID-19. Blog post, April 2020.
719
+ [2]
720
+ Scott Mueller and Judea Pearl. Personalized decision making – a conceptual introduction. Technical Report 513,
721
+ Department of Computer Science, UCLA, 2022.
722
+ [3]
723
+ Ang Li and Judea Pearl. Unit selection based on counterfactual logic. In Proceedings of the Twenty-Eighth Inter-
724
+ national Joint Conference on Artificial Intelligence, IJCAI-19, pages 1793–1799. International Joint Conferences on
725
+ Artificial Intelligence Organization, 7 2019. DOI:10.24963/ijcai.2019/248.
726
+ [4]
727
+ Ang Li and Judea Pearl. Unit selection: Case study and comparison with A/B test heuristic. Preprint, UCLA, 2022.
728
+ [5]
729
+ Kosuke Imai, Zhichao Jiang, D. James Greiner, Ryan Halen, and Sooahn Shin. Experimental evaluation of algorithm-
730
+ assisted human decision-making: Application to pretrial public safety assessment (with Discussion). Journal of the
731
+ Royal Statistical Society, Series A, 2022. To appear.
732
+ [6]
733
+ Jonathan G. Richens, Rory Beard, and Daniel H. Thompson. Counterfactual harm. In Advances in Neural Information
734
+ Processing Systems 35 (NeurIPS 2022), 2022.
735
+ https://arxiv.org/abs/2204.12993.
736
+ [7]
737
+ Eli Ben-Michael, Kosuke Imai, and Zhichao Jiang. Policy learning with asymmetric utilities, 2022.
738
+ [8]
739
+ Aaron L. Sarvet and Mats J. Stensrud. Perspectives on harm in personalized medicine. Submitted to the American
740
+ Journal of Epidemiology, 2022.
741
+ [9]
742
+ Donald B. Rubin. Estimating causal effects of treatments in randomized and nonrandomized studies. Journal of
743
+ Educational Psychology, 66:688–701, 1974.
744
+
745
+ A. Philip Dawid and Stephen Senn, Personalised Decision-Making
746
+ 15
747
+ [10] Jerzy Neyman. On the application of probability theory to agricultural experiments. Essay on principles (in Polish).
748
+ Roczniki Nauk Rolniczych, X:1–51, 1923. English translation of Section 9 (D. M. Dabrowska and T. P. Speed): Sta-
749
+ tistical Science 9 (1990), 465–480.
750
+ [11] A. Philip Dawid. Causal inference without counterfactuals (with Discussion). Journal of the American Statistical
751
+ Association, 95:407–448, 2000.
752
+ [12] A. Philip Dawid. Decision-theoretic foundations for statistical causality. Journal of Causal Inference, 9:39–77, 2021.
753
+ DOI:10.1515/jci-2020-0008.
754
+ [13] A. Philip Dawid. Probability, causality and the empirical world: A Bayes/de Finetti/Popper/Borel synthesis. Statistical
755
+ Science, 19:44–57, 2004.
756
+ [14] A. Philip Dawid and Monica Musio. What can group level data tell us about individual causality? In A. Carriquiry,
757
+ J. Tanur, and W. Eddy, editors, Statistics in the Public Interest: In Memory of Stephen E. Fienberg, pages 235–256.
758
+ Springer International Publishing, 2022.
759
+ DOI: 10.1007/978-3-030-75460-0_13.
760
+ [15] James M. Robins, Tyler J. Vanderweele, and Thomas S. Richardson. Comment on “Causal effects in the presence of
761
+ non compliance: A latent variable interpretation” by Antonio Forcina. Metron, LXIV:288–298, 2007.
762
+ [16] Sara G. Geneletti and A. Philip Dawid. Defining and identifying the effect of treatment on the treated. In Phyllis M.
763
+ Illari, Federica Russo, and Jon Williamson, editors, Causality in the Sciences, pages 728–749. Oxford University Press,
764
+ 2011.
765
+ [17] Mats J. Stensrud and Aaron L. Sarvet. Optimal regimes for algorithm-assisted human decision-making. arXiv preprint
766
+ arXiv:2203.03020, 2022.
767
+ [18] Stephen Senn. Lessons from TGN1412 and TARGET: Implications for observational studies and meta-analysis. Phar-
768
+ maceutical Statistics, 7:294–301, 2008.
769
+ [19] Heinz Schmidli, Sandro Gsteiger, Satrajit Roychoudhury, Anthony O’Hagan, David Spiegelhalter, and Beat Neuen-
770
+ schwander. Robust meta-analytic-predictive priors in clinical trials with historical control information. Biometrics,
771
+ 70:1023–1032, 2014.
772
+ [20] Robert C. Shumaker and Carol M. Metzler. The phenytoin trial is a case study of “individual bioequivalence”. Drug
773
+ Information Journal, 32:1063–1072, 1998.
774
+ [21] Jacobus Lubsen and Jan G. Tijssen. Large trials with simple protocols: Indications and contraindications. Controlled
775
+ Clinical Trials, 10:151–160, 1989.
776
+ [22] Stephen Senn. The design and analysis of vaccine trials for COVID-19 for the purpose of estimating efficacy. Pharma-
777
+ ceutical Statistics, 21:790–807, 2022.
778
+
-NFLT4oBgHgl3EQfCi71/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
.gitattributes CHANGED
@@ -4058,3 +4058,72 @@ stFKT4oBgHgl3EQf1y5_/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -tex
4058
  NtE3T4oBgHgl3EQfwwva/content/2301.04706v1.pdf filter=lfs diff=lfs merge=lfs -text
4059
  a9E4T4oBgHgl3EQfoQ0b/content/2301.05182v1.pdf filter=lfs diff=lfs merge=lfs -text
4060
  9tFJT4oBgHgl3EQfoyxM/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
4058
  NtE3T4oBgHgl3EQfwwva/content/2301.04706v1.pdf filter=lfs diff=lfs merge=lfs -text
4059
  a9E4T4oBgHgl3EQfoQ0b/content/2301.05182v1.pdf filter=lfs diff=lfs merge=lfs -text
4060
  9tFJT4oBgHgl3EQfoyxM/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
4061
+ R9E4T4oBgHgl3EQfLAxE/content/2301.04934v1.pdf filter=lfs diff=lfs merge=lfs -text
4062
+ stE_T4oBgHgl3EQf8xx6/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
4063
+ ldAyT4oBgHgl3EQfk_iC/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
4064
+ k9AzT4oBgHgl3EQfNfvd/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
4065
+ RdA0T4oBgHgl3EQfDv9U/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
4066
+ xdE0T4oBgHgl3EQf-gIr/content/2301.02814v1.pdf filter=lfs diff=lfs merge=lfs -text
4067
+ 1tE4T4oBgHgl3EQfaQwc/content/2301.05062v1.pdf filter=lfs diff=lfs merge=lfs -text
4068
+ R9E4T4oBgHgl3EQfLAxE/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
4069
+ O9AyT4oBgHgl3EQftflG/content/2301.00595v1.pdf filter=lfs diff=lfs merge=lfs -text
4070
+ bNAyT4oBgHgl3EQfivjL/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
4071
+ 7NE2T4oBgHgl3EQfPQZw/content/2301.03757v1.pdf filter=lfs diff=lfs merge=lfs -text
4072
+ rdE1T4oBgHgl3EQf2wXf/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
4073
+ WNE2T4oBgHgl3EQfDgYF/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
4074
+ C9E4T4oBgHgl3EQfFwy_/content/2301.04889v1.pdf filter=lfs diff=lfs merge=lfs -text
4075
+ RdE3T4oBgHgl3EQfygvM/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
4076
+ 7tAyT4oBgHgl3EQfpvj9/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
4077
+ W9AzT4oBgHgl3EQfmf0I/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
4078
+ ANAyT4oBgHgl3EQfq_kk/content/2301.00551v1.pdf filter=lfs diff=lfs merge=lfs -text
4079
+ HtAyT4oBgHgl3EQfrvl-/content/2301.00566v1.pdf filter=lfs diff=lfs merge=lfs -text
4080
+ EdAyT4oBgHgl3EQfSfdI/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
4081
+ 1tE4T4oBgHgl3EQfaQwc/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
4082
+ K9E4T4oBgHgl3EQfiQ1n/content/2301.05132v1.pdf filter=lfs diff=lfs merge=lfs -text
4083
+ bdFST4oBgHgl3EQfCjh5/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
4084
+ rdAzT4oBgHgl3EQfcfxL/content/2301.01403v1.pdf filter=lfs diff=lfs merge=lfs -text
4085
+ mtFPT4oBgHgl3EQf4zVh/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
4086
+ HtAyT4oBgHgl3EQfrvl-/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
4087
+ iNE1T4oBgHgl3EQfzgXI/content/2301.03446v1.pdf filter=lfs diff=lfs merge=lfs -text
4088
+ 7NE2T4oBgHgl3EQfPQZw/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
4089
+ 5dE4T4oBgHgl3EQfBQvo/content/2301.04851v1.pdf filter=lfs diff=lfs merge=lfs -text
4090
+ 59FKT4oBgHgl3EQfTC3B/content/2301.11778v1.pdf filter=lfs diff=lfs merge=lfs -text
4091
+ NNE2T4oBgHgl3EQfBgZ1/content/2301.03603v1.pdf filter=lfs diff=lfs merge=lfs -text
4092
+ iNE1T4oBgHgl3EQfzgXI/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
4093
+ stE4T4oBgHgl3EQfVwwe/content/2301.05026v1.pdf filter=lfs diff=lfs merge=lfs -text
4094
+ K9E4T4oBgHgl3EQfiQ1n/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
4095
+ ytFAT4oBgHgl3EQfBBwz/content/2301.08401v1.pdf filter=lfs diff=lfs merge=lfs -text
4096
+ rdAzT4oBgHgl3EQfcfxL/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
4097
+ FtAzT4oBgHgl3EQfHPtI/content/2301.01041v1.pdf filter=lfs diff=lfs merge=lfs -text
4098
+ ANE3T4oBgHgl3EQfsQvt/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
4099
+ _NFLT4oBgHgl3EQfDi7Y/content/2301.11980v1.pdf filter=lfs diff=lfs merge=lfs -text
4100
+ XtFRT4oBgHgl3EQf-zgt/content/2301.13692v1.pdf filter=lfs diff=lfs merge=lfs -text
4101
+ 9tFST4oBgHgl3EQfbTje/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
4102
+ EdAyT4oBgHgl3EQfSfdI/content/2301.00086v1.pdf filter=lfs diff=lfs merge=lfs -text
4103
+ _NFLT4oBgHgl3EQfDi7Y/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
4104
+ 5tE5T4oBgHgl3EQfPQ4_/content/2301.05503v1.pdf filter=lfs diff=lfs merge=lfs -text
4105
+ b9AzT4oBgHgl3EQfnf2W/content/2301.01582v1.pdf filter=lfs diff=lfs merge=lfs -text
4106
+ MNAzT4oBgHgl3EQfV_xV/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
4107
+ 8dE4T4oBgHgl3EQfdQww/content/2301.05089v1.pdf filter=lfs diff=lfs merge=lfs -text
4108
+ NNE2T4oBgHgl3EQfBgZ1/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
4109
+ ctE3T4oBgHgl3EQfeAqc/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
4110
+ h9A0T4oBgHgl3EQfIP-u/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
4111
+ ANAyT4oBgHgl3EQfq_kk/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
4112
+ qdE1T4oBgHgl3EQfPgMa/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
4113
+ qdE1T4oBgHgl3EQfPgMa/content/2301.03027v1.pdf filter=lfs diff=lfs merge=lfs -text
4114
+ f9E0T4oBgHgl3EQfpAES/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
4115
+ C9E4T4oBgHgl3EQfFwy_/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
4116
+ PdFRT4oBgHgl3EQf5zjP/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
4117
+ UNAzT4oBgHgl3EQfJvtM/content/2301.01084v1.pdf filter=lfs diff=lfs merge=lfs -text
4118
+ O9AyT4oBgHgl3EQftflG/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
4119
+ FtAzT4oBgHgl3EQfHPtI/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
4120
+ b9AzT4oBgHgl3EQfnf2W/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
4121
+ stE4T4oBgHgl3EQfVwwe/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
4122
+ INA0T4oBgHgl3EQfB__n/content/2301.01985v1.pdf filter=lfs diff=lfs merge=lfs -text
4123
+ 9tAzT4oBgHgl3EQf-_7r/content/2301.01943v1.pdf filter=lfs diff=lfs merge=lfs -text
4124
+ h9A0T4oBgHgl3EQfIP-u/content/2301.02073v1.pdf filter=lfs diff=lfs merge=lfs -text
4125
+ 5dE4T4oBgHgl3EQfBQvo/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
4126
+ wdFRT4oBgHgl3EQfgjd8/content/2301.13580v1.pdf filter=lfs diff=lfs merge=lfs -text
4127
+ jtFST4oBgHgl3EQfHTjm/content/2301.13725v1.pdf filter=lfs diff=lfs merge=lfs -text
4128
+ UNAzT4oBgHgl3EQfJvtM/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
4129
+ yNFST4oBgHgl3EQfTDh5/content/2301.13768v1.pdf filter=lfs diff=lfs merge=lfs -text
19AyT4oBgHgl3EQf1fl-/content/tmp_files/2301.00736v1.pdf.txt ADDED
The diff for this file is too large to render. See raw diff
 
19AyT4oBgHgl3EQf1fl-/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
1tE4T4oBgHgl3EQfaQwc/content/2301.05062v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:18dceccfcc5b7560f7bef4c6f42f08d667bbfe42aaff31f27b8c52c659f1b27e
3
+ size 1989994
1tE4T4oBgHgl3EQfaQwc/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:ee638e5f26774acc16e856cf4bbbeebb3e79e98eb9e5e63300d5189c2547bb88
3
+ size 4849709
29FIT4oBgHgl3EQf5SvC/content/tmp_files/2301.11389v1.pdf.txt ADDED
@@ -0,0 +1,1561 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ A Symbolic Emulator for Shuffle Synthesis
2
+ on the NVIDIA PTX Code
3
+ Kazuaki Matsumura
4
+ Barcelona Supercomputing Center (BSC)
5
6
+ Simon Garcia De Gonzalo
7
+ Sandia National Laboratories
8
9
+ Antonio J. Peña
10
+ Barcelona Supercomputing Center (BSC)
11
12
+ Abstract
13
+ Various kinds of applications take advantage of GPUs
14
+ through automation tools that attempt to automatically
15
+ exploit the available performance of the GPU’s parallel
16
+ architecture. Directive-based programming models, such as
17
+ OpenACC, are one such method that easily enables parallel
18
+ computing by just adhering code annotations to code loops.
19
+ Such abstract models, however, often prevent programmers
20
+ from making additional low-level optimizations to take
21
+ advantage of the advanced architectural features of GPUs
22
+ because the actual generated computation is hidden from
23
+ the application developer.
24
+ This paper describes and implements a novel flexible
25
+ optimization technique that operates by inserting a code
26
+ emulator phase to the tail-end of the compilation pipeline.
27
+ Our tool emulates the generated code using symbolic
28
+ analysis by substituting dynamic information and thus
29
+ allowing for further low-level code optimizations to be
30
+ applied. We implement our tool to support both CUDA and
31
+ OpenACC directives as the frontend of the compilation
32
+ pipeline, thus enabling low-level GPU optimizations for
33
+ OpenACC
34
+ that
35
+ were
36
+ not
37
+ previously
38
+ possible.
39
+ We
40
+ demonstrate the capabilities of our tool by automating
41
+ warp-level shuffle instructions that are difficult to use by
42
+ even advanced GPU programmers. Lastly, evaluating our
43
+ tool with a benchmark suite and complex application code,
44
+ we provide a detailed study to assess the benefits of shuffle
45
+ instructions across four generations of GPU architectures.
46
+ CCS Concepts
47
+ • Software and its engineering →
48
+ Source code generation.
49
+ Keywords
50
+ Compiler, Symbolic Analysis, Code Generation,
51
+ GPUs, NVIDIA PTX, Program Optimization
52
+ Permission to make digital or hard copies of all or part of this work for
53
+ personal or classroom use is granted without fee provided that copies are not
54
+ made or distributed for profit or commercial advantage and that copies bear
55
+ this notice and the full citation on the first page. Copyrights for components
56
+ of this work owned by others than ACM must be honored. Abstracting with
57
+ credit is permitted. To copy otherwise, or republish, to post on servers or to
58
+ redistribute to lists, requires prior specific permission and/or a fee. Request
59
+ permissions from [email protected].
60
+ CC ’23, February 25–26, 2023, Montréal, QC, Canada
61
+ © 2023 Association for Computing Machinery.
62
+ ACM ISBN 979-8-4007-0088-0/23/02...$15.00
63
+ https://doi.org/10.1145/3578360.3580253
64
+ ACM Reference Format:
65
+ Kazuaki Matsumura, Simon Garcia De Gonzalo, and Antonio J. Peña.
66
+ 2023. A Symbolic Emulator for Shuffle Synthesis on the NVIDIA
67
+ PTX Code. In Proceedings of the 32nd ACM SIGPLAN International
68
+ Conference on Compiler Construction (CC ’23), February 25–26, 2023,
69
+ Montréal, QC, Canada. ACM, New York, NY, USA, 12 pages. https:
70
+ //doi.org/10.1145/3578360.3580253
71
+ 1
72
+ Introduction
73
+ Effectively utilizing the vast amount of computational
74
+ performance available in modern supercomputers remains a
75
+ challenge to this day. Hardware, middleware, and parallel
76
+ algorithms should be carefully orchestrated so that ideal
77
+ efficiency may be obtained for solving large real-world
78
+ problems in high-performance computing (HPC). Compiler
79
+ technologies are developed with highly-automated program
80
+ optimizations that use domain-specific knowledge and
81
+ target architecture specialization to solve a part of this
82
+ puzzle. With the end of Moore’s Law [19] approaching, the
83
+ focus on supercomputing technology is shifting toward
84
+ even more specialized accelerators, which in turn increases
85
+ their complexity. This trend further signifies the importance
86
+ of compiler technology to relieve programmers from the
87
+ burden of understanding the complex architecture of
88
+ modern accelerators to be able to efficiently optimize their
89
+ applications.
90
+ Currently, Graphics Processing Units (GPUs) are the most
91
+ widely adopted accelerator technology, as these are present
92
+ in seven out of the top 10 systems in the TOP500 list [29].
93
+ GPUs work for accelerating application execution time
94
+ through
95
+ their
96
+ highly
97
+ parallelized
98
+ yet
99
+ cooperative
100
+ architecture. To benefit the most from GPUs, however,
101
+ programmers must be proficient in writing complex
102
+ low-level GPU code, often a largely time-consuming task.
103
+ To overcome the complexity of low-level GPU code
104
+ development, pragma-based programming models such as
105
+ OpenACC/OpenMP [3, 24] have been developed or adapted
106
+ to be able to automatically retarget existing code for
107
+ acceleration. Although these automation tools have
108
+ improved the utilization of GPU acceleration by many
109
+ different types of applications, they lack the ability to
110
+ benefit from low-level architecture-specific optimizations.
111
+ One such type of optimizations is the use of warp-level
112
+ primitives, which have been available since NVIDIA Kepler
113
+ GPUs. Warp-level primitives, such as shuffle operations,
114
+ may be used to fill a gap between threads and thread-blocks
115
+ arXiv:2301.11389v1 [cs.DC] 26 Jan 2023
116
+
117
+ CC ’23, February 25–26, 2023, Montréal, QC, Canada
118
+ K. Matsumura, S. G. De Gonzalo, A. J. Peña
119
+ working as collaborative mechanisms, instead of relying on
120
+ shared and global memory accesses.
121
+ The main operation across the warp is the shuffle, which
122
+ delivers computed elements to neighbor threads to suppress
123
+ the redundancy of computation and memory accesses.
124
+ However, as many existing efforts [5, 7, 13, 25] have
125
+ demonstrated, those primitives often require non-trivial
126
+ modification of algorithms in the fundamental part of their
127
+ codes. Since the latency of the shuffle is similar to that of
128
+ shared memory loads [7] (apart from storing and
129
+ synchronization), it may serve as a cache system, holding
130
+ data in registers [5]. However, the effectiveness of this
131
+ technique is still unknown when disregarding domain-
132
+ specific knowledge.
133
+ Our work provides a middle-end environment to extend
134
+ the code of the NVIDIA GPU assembly PTX and enables, for
135
+ the first time in the literature, automatic shuffle synthesis to
136
+ explore the opportunity of this operation. Our environment,
137
+ PTXASW§ (Wrapper of PTX optimizing ASsembler),
138
+ addresses the entire computational flow of PTX, leveraging
139
+ a
140
+ symbolic
141
+ emulator
142
+ that
143
+ can
144
+ symbolically
145
+ extract
146
+ memory-access patterns. We introduce a Satisfiability
147
+ Modulo Theories (SMT) solver to prune avoidable control
148
+ flows while tracking down the register update.
149
+ Following the emulating results, PTXASW utilizes the
150
+ solver and detects the global-memory loads that are
151
+ possible to be covered by the shuffle operation. Around
152
+ those loads, additional instructions are implanted, while
153
+ supporting corner cases and circumventing overheads. We
154
+ conduct the shuffle synthesis on an OpenACC benchmark
155
+ suite, a directive-based programming model having no user
156
+ exposure to warp-level instructions. Our implementation
157
+ functions as a plugin of the compilation tool yielding
158
+ moderate overhead.
159
+ Applying our technique, we find various opportunities to
160
+ enable the shuffle over the original code of the benchmarks.
161
+ The performance improvement achieved is up to 132% with
162
+ no user intervention on the NVIDIA Maxwell GPU.
163
+ Additionally, based on the results of the experiments using
164
+ several generations of GPUs, we analyze the latency caused
165
+ for the shuffle operations to provide guidelines for shuffle
166
+ usage on each GPU architecture. In summary, the
167
+ contributions of our work are:
168
+ 1. We create a symbolic emulator to analyze and optimize
169
+ GPU computing code, equipped with an SMT solver
170
+ for the comparison of symbolic expressions, induction
171
+ variable recognition for loops, and various optimizations
172
+ to reduce overheads.
173
+ 2. Through symbolic analysis, we automatically find the
174
+ possible cases to utilize the shuffle operation, which
175
+ previously required in-depth domain knowledge to be
176
+ §The artifact is available at https://github.com/khaki3/ptxas-wrapper.
177
+ applied. Then, we synthesize those to the applications,
178
+ while avoiding expensive computation.
179
+ 3. Using a directive-based programming model, we
180
+ generate various shuffle codes on several generations
181
+ of GPUs and show the cases that attain performance
182
+ improvement with no manual effort.
183
+ 4. We show the latency breakdown of the optimization on
184
+ each GPU architecture and provide general guidelines
185
+ for the use of shuffle operations.
186
+ Our work is the first attempt at general utilization of
187
+ shuffles. Although manual warp-level operations often
188
+ contributed to domain-specific optimizations, the metrics to
189
+ be addressed by warp-level efforts have not been studied.
190
+ Even when computation or memory accesses are reducible,
191
+ the trade-offs have remained unknown to date, especially
192
+ when thread divergence is involved.
193
+ The rest of the paper is structured as follows. Section 2
194
+ provides
195
+ the
196
+ necessary
197
+ background
198
+ on
199
+ GPUs
200
+ for
201
+ general-purpose
202
+ computing,
203
+ PTX
204
+ code,
205
+ and
206
+ shuffle
207
+ operations. Section 3 provides a high-level overview of our
208
+ work. Sections 4 and 5 describe our symbolic emulator and
209
+ shuffle synthesis, while Section 6 details our overall
210
+ methodology. Sections 7 and 8 provide the results of our
211
+ experimental evaluation and in-depth analysis. Section 9
212
+ discusses previous related work and Section 10 provides
213
+ concluding remarks.
214
+ 2
215
+ Background
216
+ This section provides the necessary background on GPUs
217
+ for general-purpose computing, low-level PTX code, and
218
+ warp-level shuffle operations.
219
+ 2.1
220
+ GPUs
221
+ A Graphics Processing Unit (GPU), is a massively parallel
222
+ accelerator architecture having with several computational
223
+ and communication layers. The minimum execution unit is
224
+ a thread. Each thread can collaborate with other threads
225
+ bound to a certain thread-block and grid, through per-block
226
+ shared memory and/or grid-wise global memory. The
227
+ architecture is composed of many streaming multiprocessors
228
+ (SMs), which execute distributed thread-blocks in groups of
229
+ threads (usually 32), called warps. Using inner parallel
230
+ processing
231
+ units,
232
+ the
233
+ SM
234
+ takes
235
+ advantage
236
+ of
237
+ instruction-level parallelism (ILP), as well as parallelism
238
+ among warps and thread-blocks. Since the memory-access
239
+ latency increases through the levels of the memory
240
+ hierarchy, the concept of locality is highly respected for
241
+ performance, while locality optimizations bring additional
242
+ synchronization and resource use to programs. Warp-level
243
+ primitives, available since the NVIDIA Kepler generation of
244
+ GPUs, allow for the communication among threads within
245
+ the same warp [21], avoiding access to either shared or
246
+ global memory.
247
+
248
+ A Symbolic Emulator for Shuffle Synthesis on the NVIDIA PTX Code
249
+ CC ’23, February 25–26, 2023, Montréal, QC, Canada
250
+ All threads execute the same program code, known as
251
+ GPU kernels, customarily written in CUDA [22] for NVIDIA
252
+ GPUs, in a single-instruction multiple-data fashion. Threads
253
+ operate
254
+ on
255
+ different
256
+ data,
257
+ specified
258
+ in
259
+ kernels
260
+ by
261
+ programmers, deriving from thread and thread-block
262
+ identifiers. Kernels accept arguments, and the number of
263
+ threads and thread-blocks is specified as variables.
264
+ 2.2
265
+ NVIDIA PTX
266
+ User-level code implemented manually in CUDA or
267
+ OpenACC is brought to execution on GPUs through
268
+ NVIDIA PTX [23], a virtual machine and ISA for
269
+ general-purpose parallel thread execution. PTX programs
270
+ feature the syntax and sequential execution flow of
271
+ assembly language. Thread-specific variables are replicated
272
+ to be run over SMs in parallel using the same program but
273
+ different parameters. Since the actual machine code (SASS)
274
+ cannot be modified from official tools [35], PTX is the
275
+ nearest documented and standard GPU code layer that may
276
+ be modified.
277
+ PTX code consists of kernel and function declarations.
278
+ Those have parameters and instruction statements along
279
+ with variable declarations, labels, and predicates. Listing 2
280
+ provides the CUDA-generated PTX kernel from Listing 1.
281
+ Variable declarations from several data spaces and types
282
+ correspond to the usage of on-chip resources, especially
283
+ __global__ void add(
284
+ float *c, float *a, float *b, int *f) {
285
+ int i = threadIdx.x + blockIdx.x * blockDim.x;
286
+ if (f[i]) c[i] = a[i] + b[i];
287
+ }
288
+ Listing 1. Addition kernel in CUDA
289
+ .visible .entry add(. param .u64 c, .param .u64 a,
290
+ .param .u64 b, .param .u64 f){
291
+ /* Variable Declarations */ .reg .pred %p<2>;
292
+ .reg .f32 %f<4>;.reg .b32 %r<6>;.reg .b64 %rd <15>;
293
+ /* PTX Statements */
294
+ ld.param.u64 %rd1 , [c];
295
+ ld.param.u64 %rd2 , [a];
296
+ ld.param.u64 %rd3 , [b];
297
+ ld.param.u64 %rd4 , [f];
298
+ cvta.to.global.u64 %rd5 , %rd4;
299
+ mov.u32 %r2 , %ntid.x;
300
+ mov.u32 %r3, %ctaid.x;
301
+ mov.u32 %r4 , %tid.x; mad.lo.s32 %r1, %r3, %r2 ,%r4;
302
+ mul.wide.s32 %rd6 , %r1, 4; add.s64 %rd7 ,%rd5 ,%rd6;
303
+ // if (!f[i]) goto $LABEL_EXIT;
304
+ ld.global.u32 %r5, [%rd7]; setp.eq.s32 %p1 ,%r5 ,0;
305
+ @%p1 bra $LABEL_EXIT;
306
+ // %f3 = a[i] + b[i]
307
+ cvta.u64 %rd8 , %rd2; add.s64 %rd10 , %rd8 , %rd6;
308
+ cvta.u64 %rd11 ,%rd3; add.s64 %rd12 , %rd11 ,%rd6;
309
+ ld.global.f32 %f1, [%rd12];
310
+ ld.global.f32 %f2, [%rd10]; add.f32 %f3, %f2 , %f1;
311
+ // c[i] = %f3
312
+ cvta.u64 %rd13 ,%rd1; add.s64 %rd14 , %rd13 ,%rd6;
313
+ st.global.f32 [%rd14], %f3;
314
+ $LABEL_EXIT: ret;
315
+ }
316
+ Listing 2. Addition kernel in PTX (simplified)
317
+ registers. Accepting options and types (e.g. .eq, .s32), PTX
318
+ instructions leverage defined registers and compute results,
319
+ while some of these enable access to other resources (e.g.,
320
+ ld.global.u32). Predicates (@%p1) limit the execution of
321
+ the instructions stated under them, which may lead to
322
+ branching based on the thread-specific values, such as
323
+ thread and thread-block IDs (%tid.x, %ctaid.x). Labels
324
+ (e.g., $LABEL_EXIT) are branch targets and allow backward
325
+ jumps that may create loops.
326
+ 2.3
327
+ Shuffle Operation
328
+ In GPU architectures prior to NVIDIA Kepler, each
329
+ sequential execution of a given thread was allowed to
330
+ transfer data to another thread only through non-local
331
+ memories, accompanied by a block-level or grid-level
332
+ synchronization barrier. Modern GPU architectures now
333
+ support additional data sharing within warps. Intra-warp
334
+ communication
335
+ is performed via
336
+ shuffle operations.
337
+ Listing 3 shows the shfl.sync instruction in PTX, in which
338
+ data gets shifted unidirectionally (.up, .down) across the
339
+ threads of the warp, swapped in a butterfly way (.bfly), or
340
+ exchanged by precise indexing (.idx).
341
+ In the unidirectional shuffle, the delta part, which has no
342
+ source lane from the same warp, will be unchanged and
343
+ obtain a false value in the resultant predicate (%p1); only the
344
+ active threads (%mask) of the same control flow participate
345
+ in the same shuffle. Inactive threads or threads from
346
+ divergent flows produce neither valid results nor predicates
347
+ to destination lanes. Each operation is accompanied by the
348
+ warp-level synchronization, some of which are optimized
349
+ away during compilation. While shuffle instructions allow
350
+ for sub-warp granularity, our paper focuses on the
351
+ unidirectional instruction with 32 threads using 32-bit data,
352
+ as applying sub-warp granularity to applications tends to
353
+ feature corner cases and suffers from exception handling for
354
+ intricate patterns.
355
+ activemask.b32 %mask;
356
+ // val[warp_id] = %src; %dst = val[warp_id -%i]
357
+ shfl.sync.up.b32
358
+ %dst1|%p1 , %src , %i,
359
+ 0, %mask;
360
+ // val[warp_id] = %src; %dst = val[warp_id +%i]
361
+ shfl.sync.down.b32 %dst2|%p2 , %src , %i, 31, %mask;
362
+ // val[warp_id] = %src; %dst = val[warp_id ^%i]
363
+ shfl.sync.bfly.b32 %dst3|%p3 , %src , %i, 31, %mask;
364
+ // val[warp_id] = %src; %dst = val[%i]
365
+ shfl.sync.idx.b32
366
+ %dst4|%p4 , %src , %i, 31, %mask;
367
+ Listing 3. The use of shfl.sync in PTX
368
+ Table 1 shows the latencies (clock cycles) of shared
369
+ memory (SM; no-conflict) and L1 cache as reported by [16],
370
+ besides that of shuffle, from a microbenchmark based
371
+ on [33]. In the table, Kepler is NVIDIA Tesla K80, Maxwell
372
+ is M60, Pascal is P100 and Volta is V100, while Tesla
373
+ K40c/TITAN X are used for the shuffle of Kepler/Maxwell.
374
+ This table reveals that shuffle brings benefits over shared
375
+
376
+ CC ’23, February 25–26, 2023, Montréal, QC, Canada
377
+ K. Matsumura, S. G. De Gonzalo, A. J. Peña
378
+ NVHPC
379
+ User Program
380
+ OpenACC/OpenMP
381
+ NVCC
382
+ CUDA
383
+ PTX Code
384
+ PTXAS
385
+ Execution Binary
386
+ Compiling
387
+ Assembling
388
+ PTXAS
389
+ PTXASW
390
+ 1
391
+ Allocate symbolic
392
+ registers
393
+ 2A
394
+ Update registers through the PTX execution
395
+ 2B
396
+ Gather branch conditions & memory accesses
397
+ 3
398
+ Detect shuffle
399
+ opportunities
400
+ 4
401
+ Synthesize
402
+ shuffles
403
+ 𝑁 = ?
404
+ 𝑁 =
405
+ Figure 1. Overview of PTXASW
406
+ memory as a communication mechanism when data
407
+ movement is not redundantly performed, so storing and
408
+ synchronization are avoidable. In particular, latencies of L1
409
+ cache
410
+ on
411
+ Maxwell/Pascal
412
+ are
413
+ higher
414
+ compared
415
+ to
416
+ Kepler/Volta, which integrate shared memory with L1 cache.
417
+ Those allow the shuffle to be utilized as a register cache for
418
+ performance improvement, but the engineering efforts in
419
+ order to modify the fundamental parts of parallel
420
+ computation are considerably high.
421
+ name
422
+ Shuffle (up)
423
+ SM Read
424
+ L1 Hit
425
+ Kepler
426
+ 24
427
+ 26
428
+ 35
429
+ Maxwell
430
+ 33
431
+ 23
432
+ 82
433
+ Pascal
434
+ 33
435
+ 24
436
+ 82
437
+ Volta
438
+ 22
439
+ 19
440
+ 28
441
+ Table 1. Latencies (clock cycles) as reported by [16, 33]
442
+ 3
443
+ Overview
444
+ Our work PTXASW can substitute the original PTX
445
+ assembler, which accepts input code from arbitrary sources.
446
+ We do not rely on specific information of any certain
447
+ language or any certain generation of GPU architecture.
448
+ Figure 1 provides a high-level overview of PTXASW’s
449
+ execution flow. PTXASW primarily aims at shuffle synthesis
450
+ on PTX code. The input is produced by user-level code
451
+ compilers, while directive-based programming models
452
+ (OpenACC/OpenMP) do not expose control over warp-level
453
+ operations, and CUDA prevents code extension due to its
454
+ code complexities. Once PTXASW inserts shuffles, the
455
+ resultant code is assembled to GPU binary by the original
456
+ PTX assembler.
457
+ PTXASW emulates the PTX execution based on the input.
458
+ Since runtime information is not provided, we employ
459
+ symbolic evaluation for each operation. First, 1 register
460
+ declarations are processed to be mapped in a symbolic
461
+ register environment (described in Section 4.1). Second, 2A
462
+ for each statement of PTX instructions, a corresponding
463
+ operation is performed to update registers (Section 4.1).
464
+ While continuing the execution,
465
+ 2B PTXASW gathers
466
+ branch
467
+ conditions
468
+ for
469
+ avoiding
470
+ unrealizable
471
+ paths
472
+ (Section 4.2) and creates memory traces (Section 4.3). When
473
+ the entire emulation is finished, 3 we discover shuffle
474
+ opportunities from memory traces (Section 5.1). Finally, 4
475
+ we insert shuffle operations to the input code (Section 5.2);
476
+ then, the generated code is consumed by the original PTX
477
+ assembler.
478
+ 4
479
+ Symbolic Emulator
480
+ Analysis of high-level code has posed questions about its
481
+ applicability to abstract program structures or other
482
+ user-level languages. While high-level code analysis may
483
+ process intact code information, enormous engineering
484
+ efforts are required just for specific forms within one
485
+ language [13, 32]. Therefore, virtual machines are utilized
486
+ for providing a cushion between real architectures and user
487
+ codes. In particular, analysis and optimization of the
488
+ virtual-machine code tend to be reusable without the
489
+ restriction of input types [12, 14, 34].
490
+ Our work uses PTX as the virtual machine layer and
491
+ performs general analysis through code emulation. We
492
+ introduce symbolic emulation to encapsulate the runtime
493
+ information in symbol expressions and compute concolic
494
+ (concrete + symbolic) values for each register. Although a
495
+ number of previous work have been conducted on symbolic
496
+ emulation for the purpose of software testing [4], our work
497
+ (PTXASW) especially aims at code optimization of memory
498
+ access on GPUs, since it is often regarded as one of the
499
+ bottlenecks of GPU computing [7]. Those computed values
500
+ are utilized for code generation as described in Section 5.
501
+ 4.1
502
+ Instruction Encoding
503
+ Since the subsequent PTX assembler, while generating SASS
504
+ code, will eliminate redundant operations and resources, we
505
+ may abundantly use registers while not causing register
506
+ pressure by unnecessary data movement outside of the
507
+ static single assignment form (SSA). First, PTXASW
508
+ recognizes variable declarations and prepares a symbolic
509
+ bitvector of the corresponding size for each register. Since
510
+ arithmetic calculation and bitwise operations are supported
511
+
512
+ A Symbolic Emulator for Shuffle Synthesis on the NVIDIA PTX Code
513
+ CC ’23, February 25–26, 2023, Montréal, QC, Canada
514
+ on the combination of concrete and symbolic bitvectors, we
515
+ encode each PTX instruction as the computation over
516
+ vectors. For example, addition for 16-bit vectors is encoded
517
+ as in the following pseudocode:
518
+ a = [a_0 , a_1 , .., a_15]; //a_N is a 1-bit element
519
+ b = [b_0 , b_1 , .., b_15];
520
+ c = a + b
521
+ = [a_0 + b_0 , a_1 + b_1 , .., a_15 + b_15];
522
+ With the add instruction corresponding to the above
523
+ calculation, we detect the instruction type and source
524
+ registers (%a, %b) and compute the result:
525
+ add.u16 %c, %a, %b; // dst: %c; src: %a, %b
526
+ Then, having the binding with the name of the
527
+ destination register (%c), we keep the computed value in the
528
+ register environment. PTXASW defines each instruction to
529
+ update the destination registers according to the instruction
530
+ options and types, and those registers may be fully concrete
531
+ with the movement or computation from constant values.
532
+ Also, to support floating-point instructions, we insert the
533
+ conversion by uninterpreted functions at loading and
534
+ storing
535
+ bitvectors
536
+ to
537
+ and
538
+ from
539
+ floating-point
540
+ data.
541
+ Regarding casting operands among integer types and binary
542
+ types, truncating or extending is performed based on the
543
+ PTX specification. The computational instructions under
544
+ predicates issue conditional values in registers. Since
545
+ registers are not used before initialization, these always
546
+ have evaluated values, except for special registers, such as
547
+ thread IDs and uninterpreted functions of loops and
548
+ memory loads, which are described in following sections.
549
+ !$acc
550
+ kernels loop independent gang (65535)
551
+ !$acc& present(w0(1:nx ,1:ny), w1(1:nx ,1:ny))
552
+ do j = 2, ny -1
553
+ !$acc loop independent vector (512)
554
+ do i = 2, nx -1
555
+ w1(i,j)=c0*w0(i,j) + c1*(w0(i-1,j)+w0(i,j -1)+&
556
+ w0(i+1,j)+w0(i,j+1)) + c2*(w0(i-1,j-1)+&
557
+ w0(i-1,j+1)+w0(i+1,j-1)+w0(i+1,j+1))
558
+ enddo enddo
559
+ Listing 4. Jacobi kernel in Fortran and OpenACC
560
+ 4.2
561
+ Execution Branching
562
+ Branching is caused by jumping to labels under binary
563
+ predicates that are computed by preceding instructions.
564
+ Since inputs and several parameters are unknown at
565
+ compilation time, unsolvable values of predicates are often
566
+ observed leading to undetermined execution flows where
567
+ computation is boundless. Thus, we abstract the repeated
568
+ instructions in the same execution flow. At the entry point
569
+ to the iterative code block, we modify each iterator of the
570
+ block to have uninterpreted functions with unique identities
571
+ and perform operations only once upon those uninterpreted
572
+ functions. Since those uninterpreted functions produce
573
+ incomparable values, we clip the initial values out and add
574
+ them to registers containing uninterpreted functions at the
575
+ block entry, for better accuracy in the case of incremental
576
+ iterators
577
+ to
578
+ be
579
+ found
580
+ by
581
+ induction
582
+ variable
583
+ recognition [10, 11].
584
+ We continue each branching while duplicating the
585
+ register environment for succeeding flows. All the flows
586
+ finish at re-entry to iterative blocks or at the end of
587
+ instructions, completing their own results. The symbolic
588
+ expressions in predicates used at the prior divergence are
589
+ recorded as assumptions while updating those predicates, to
590
+ have constant booleans in the register environment, based
591
+ on whether it is assumed as true. Conflicting values in
592
+ assumptions are removed according to an SMT solver
593
+ (Z3 [9]) when new expressions are added. If the destination
594
+ of a new branch can be determined providing assumptions
595
+ to the solver, unrealizable paths are pruned for faster
596
+ emulation. Also, we skip redundant code-block entry
597
+ bringing the same register environment as other execution
598
+ flows by memoization, to force new results at each entry.
599
+ 4.3
600
+ Memory Analysis
601
+ We collect memory loads forwardly through the emulation
602
+ and express them by uninterpreted functions accepting
603
+ addresses and returning data of corresponding sizes. The
604
+ trace of memory loads is intervened by memory stores, and
605
+ both loads and assumptions are invalidated by stores that
606
+ possibly overwrite them, using the same mechanism for
607
+ conflicting assumptions mentioned in Section 4.2.
608
+ LD: 0xc + (load(param2) + ((((0x1 + %ctaid.x) * load(param6) // w0(i-1, j+1)
609
+ + ((% tid.x + %ctaid.y << 0x9) + (- load(param5 )))) + loop(0, 14)) + loop(0, 53)) << 0x2)
610
+ LD: 0xc + (load(param2) + ((( load(param6) * (0x3 + %ctaid.x) // w0(i+1, j+1)
611
+ + ((% tid.x + %ctaid.y << 0x9) + (- load(param5 )))) + loop(0, 13)) + loop(0, 52)) << 0x2)
612
+ LD: 0x4 + (load(param2) + ((((0x1 + %ctaid.x) * load(param6) // w0(i-1, j-1)
613
+ + ((% tid.x + %ctaid.y << 0x9) + (- load(param5 )))) + loop(0, 14)) + loop(0, 53)) << 0x2)
614
+ /* LD: w0(i+1, j-1), w0(i
615
+ , j+1), w0(i+1, j
616
+ ), w0(i
617
+ , j-1), w0(i-1, j
618
+ ), w0(i
619
+ , j
620
+ ) */
621
+ ST: 0x8 + (load(param3) + (((% tid.x + %ctaid.y << 0x9)
622
+ // w1(i
623
+ , j
624
+ )
625
+ + loop(0, 57)) + ((- load(param5 )) + load(param6) * ((0x2 + %ctaid.x) + loop(0, 21)))) << 0x2)
626
+ Listing 5. Global-memory trace of Jacobi kernel through the symbolic emulation in order. Sign extensions are omitted.
627
+ Numerical numbers, shown in hexadecimal, are originally in bitvectors. load/loop are uninterpreted functions for parameter
628
+ loads having addresses and loop iterators having unique identities, respectively )
629
+
630
+ CC ’23, February 25–26, 2023, Montréal, QC, Canada
631
+ K. Matsumura, S. G. De Gonzalo, A. J. Peña
632
+ Listing 4 shows a Jacobian kernel implemented in Fortran
633
+ for GPUs using OpenACC. Its memory trace is obtained as
634
+ in Listing 5 by PTXASW emulating the PTX code generated
635
+ by NVHPC compiler 22.3. The address of each load is
636
+ symbolically calculated as register values, thus containing
637
+ uninterpreted functions and special registers. In the case of
638
+ divergence, branched flows maintain such traces while
639
+ sharing the common parts of the original flow.
640
+ 5
641
+ Shuffle Synthesis
642
+ Mapping programs over thread-level parallelism, while
643
+ pursuing the performance of modern complex architectures
644
+ and ensuring correctness, is a far–from–easy task. Most
645
+ likely, existing GPU programs are already optimized in
646
+ terms of resource use and scheduling, which does not
647
+ smoothly allow for further optimization, especially at the
648
+ low-level code. The shuffle operation performs at its best
649
+ when the communication is fully utilized [25], but such
650
+ cases are not common in compiler-optimized code or even
651
+ manually-tuned code in HPC. The big trouble is corner
652
+ cases. Not only halo, but fractional threads emerged from
653
+ rounding up dynamic input sizes, demand exceptional cases
654
+ to be operated on GPUs. While the generality and
655
+ applicability of GPU shuffle instructions for all types of
656
+ applications or computational patterns are yet unknown,
657
+ the level of difficulty in manually applying shuffle
658
+ instructions in different cases adds further hardness to the
659
+ already complex task of understanding the true nature of
660
+ the performance of shuffle operations.
661
+ Hence, we implement automatic shuffle synthesis
662
+ through PTXASW to drive the lower-latency operations
663
+ seen in Section 2.3, while supporting corner cases and
664
+ covering
665
+ global-memory
666
+ loads
667
+ with
668
+ warp-level
669
+ communication. PTXASW is accordingly extended to seek
670
+ shuffle candidates among loads, and embed shuffle
671
+ instructions into code while alleviating register pressure.
672
+ 5.1
673
+ Detection
674
+ Warps are comprised of neighboring threads. We do not
675
+ consider adjacent threads in non-leading dimensions, since
676
+ those tend to generate non-sequential access patterns. Upon
677
+ finding a global-memory load, PTXAS compares its load
678
+ address to those of previous loads found through the same
679
+ execution flow and not invalidated by any store. If for all
680
+ threads in a warp the load is overlapped with existing loads,
681
+ those instructions are recorded as possible shuffle sources.
682
+ To utilize a load with an address represented as 𝐴(%tid.x)
683
+ for another having the address 𝐵(%tid.x), there must exist
684
+ an integer 𝑁 such that 𝐴(%tid.x + 𝑁) = 𝐵(%tid.x) and
685
+ −31 ⩽ 𝑁 ⩽ 31. For example, when 𝑁 = 0, the load can be
686
+ fully utilized in the same thread. When 𝑁 = 1, we can adapt
687
+ the shfl.sync.down instruction to convey existing register
688
+ values to next threads while issuing the original load for the
689
+ edge case (%warp_id = 31). In the case of the memory trace
690
+ in Listing 5, the load accesses of w0(i-1, j+1) and w0(i-1,
691
+ j-1) are uniformly aligned with the close addresses to each
692
+ other, so we can search the variable 𝑁, which satisfies the
693
+ above condition, by supplying 𝑁 along with those addresses
694
+ to the solver and find 𝑁 = −2.
695
+ We make sure that each shuffle candidate has the same 𝑁
696
+ as a shuffle delta in all the execution flows. This delta must
697
+ be constant regardless of runtime parameters. Since the steps
698
+ of loop iterators in PTX code could be any size (e.g. NVHPC
699
+ Compiler uses the thread-block size), shuffles are detected
700
+ only in straight-line flows, whereas live variable analysis is
701
+ employed to exclude the case in which source values possibly
702
+ reflect a different iteration from the destination. For faster
703
+ analysis, we construct control-flow graphs before shuffle
704
+ detection, while pruning unrelated instructions to memory
705
+ operations and branches, and at the use of the SMT solver,
706
+ uninterpreted functions are converted to unique variables.
707
+ 5.2
708
+ Code Generation
709
+ Warp divergence may be caused by various reasons,
710
+ including the dynamic nature of the program execution,
711
+ which
712
+ is
713
+ inconvenient
714
+ to
715
+ optimization,
716
+ where
717
+ the
718
+ uniformity of threads matters for collaboration. Not only
719
+ inactive threads, but an insufficient number of threads to
720
+ constitute complete warps, raises corner cases in which
721
+ original computation should be retained. Our shuffle
722
+ synthesis handles both situations by adding dynamic
723
+ checkers for uniformity.
724
+ Listing 6 presents an example of the synthesis by
725
+ PTXASW. Once all the emulation is finished, the results are
726
+ collected and filtered to satisfy all the above-mentioned
727
+ conditions. Then, PTXASW selects the possible shuffle for
728
+ each load with the smallest shuffle delta (𝑁) and allows only
729
+ the least corner cases. At the code generation, each source
730
+ load instruction is extended to be accompanied by the mov
731
+ instruction to prepare the source register (%source). The
732
+ destination load is covered with the shuffle operation and a
733
+ corner-case checker. First, we check if the thread has no
734
+ source from the same warp (%out_of_range). Second, the
735
+ ld.global.nc.f32 %f4 , [%rd31 +12]; // w0(i-1, j+1)
736
+ /* ... */
737
+ ld.global.nc.f32 %f7 , [%rd31 +4]; // w0(i-1, j-1)
738
+ ld.global.nc.f32 %f4 , [%rd31 +12];
739
+ mov.f32 %source , %f4; /* ... */
740
+ mov.u32 %wid , %tid.x; rem.u32 %wid , %wid , 32;
741
+ activemask.b32 %m; setp.ne.s32 %incomplete , %m, -1;
742
+ setp.lt.u32 %out_of_range , %wid , 2;
743
+ or.pred %pred , %incomplete , %out_of_range;
744
+ shfl.sync.up.b32 %f7 , %source , 2, 0, %mask;
745
+ @%pred ld.global.nc.f32 %f7 , [%rd31 +4];
746
+ Listing 6. Shuffle synthesis on Jacobi kernel (Upper is
747
+ original and lower is synthesized code; variable declarations
748
+ are omitted and the naming is simplified)
749
+ PTXASW
750
+
751
+ A Symbolic Emulator for Shuffle Synthesis on the NVIDIA PTX Code
752
+ CC ’23, February 25–26, 2023, Montréal, QC, Canada
753
+ incompleteness of the warp (%incomplete) is confirmed
754
+ with a warp-level querying instruction. In any case, the
755
+ shuffle operation is performed at the position of the original
756
+ load, shifting the value of the source register with the
757
+ distance of the extracted shuffle delta. Finally, only the
758
+ threads participating in an incomplete warp or assuming no
759
+ source lane execute the original load under the predicate
760
+ (%pred). When 𝑁 < 0, the shfl instruction takes the .up
761
+ option and when 𝑁 > 0, the .down option is selected. If
762
+ 𝑁 = 0, just the mov instruction is inserted instead of all the
763
+ synthesized code. In actual code, the calculation of
764
+ %warp_id is shared among shuffles and set at the beginning
765
+ of the execution to reduce the computational latency.
766
+ To preserve the original program characteristics, such as
767
+ the register use, uniformity, and ILP, following ways of
768
+ generation are avoided. We can produce the correct results
769
+ even if shfl is predicated by %incomplete, but it often
770
+ imperils the basic efficiency with an additional branch,
771
+ which limits ILP. On the other hand, our code introduces
772
+ only one predicate to each shuffle and does not leave any
773
+ new branch in the resultant SASS code. Also, we do not use
774
+ a select instruction for merging the results between shuffles
775
+ and corner cases, because it would aggravate register
776
+ pressure. The output predicate by shuffle poses execution
777
+ dependency and provides the invalid status of inactive
778
+ threads; thus, it is ignored. Moreover, we only create
779
+ shuffles from direct global-memory loads and do not
780
+ implement shuffles over shuffled elements for better ILP.
781
+ 6
782
+ Experimental Methodology
783
+ We build PTXASW using Rosette [30], a symbolic-
784
+ evaluation system upon the Racket language. PTXASW is
785
+ equipped with a PTX parser and runs the emulation of the
786
+ parsed code while expressing runtime parameters as
787
+ symbolic bitvectors provided by Rosette. Our shuffle
788
+ synthesis is caused at code generation, which prints the
789
+ assembler-readable
790
+ code.
791
+ We
792
+ evaluate
793
+ our
794
+ shuffle
795
+ mechanism with the NVHPC compiler [20] by hooking the
796
+ assembler invocation and overwriting the PTX code before
797
+ it is assembled. The NVHPC compiler accepts the
798
+ directive-based
799
+ programming
800
+ models
801
+ OpenACC
802
+ and
803
+ OpenMP to generate GPU code, which have no control over
804
+ warp-level instructions. The emulation is also tested for
805
+ GCC with OpenACC/OpenMP code and LLVM with
806
+ OpenMP code, but these use a master-worker model to
807
+ distribute computation across thread-blocks [15] and do not
808
+ directly refer to the thread ID in each thread, so mainly
809
+ ineffective results are obtained. Our synthesis is not limited
810
+ to global-memory loads and works on shared memory (such
811
+ as Halide [26]), but the performance is not improved due to
812
+ the similar latency of shared-memory loads and shuffles.
813
+ The NVHPC compiler utilizes the same style to translate
814
+ both
815
+ OpenACC
816
+ and
817
+ OpenMP
818
+ codes
819
+ written
820
+ in
821
+ C/C++/Fortran to PTX, hence supporting any combinations.
822
+ name
823
+ Lang
824
+ Shuffle/Load
825
+ Delta
826
+ Analysis
827
+ divergence
828
+ C
829
+ 1 / 6
830
+ 2.00
831
+ 4.281s
832
+ gameoflife
833
+ C
834
+ 6 / 9
835
+ 1.50
836
+ 3.470s
837
+ gaussblur
838
+ C
839
+ 20 / 25
840
+ 2.50
841
+ 7.938s
842
+ gradient
843
+ C
844
+ 1 / 6
845
+ 2.00
846
+ 4.668s
847
+ jacobi
848
+ F
849
+ 6 / 9
850
+ 1.50
851
+ 4.119s
852
+ lapgsrb
853
+ C
854
+ 12 / 25
855
+ 1.83
856
+ 14.296s
857
+ laplacian
858
+ C
859
+ 2 / 7
860
+ 1.50
861
+ 4.816s
862
+ matmul
863
+ F
864
+ 0 / 8
865
+ -
866
+ 13.971s
867
+ matvec
868
+ C
869
+ 0 / 7
870
+ -
871
+ 4.929s
872
+ sincos
873
+ F
874
+ 0 / 2
875
+ -
876
+ 1m41.424s
877
+ tricubic
878
+ C
879
+ 48 / 67
880
+ 2.00
881
+ 1m39.476s
882
+ tricubic2
883
+ C
884
+ 48 / 67
885
+ 2.00
886
+ 1m41.855s
887
+ uxx1
888
+ C
889
+ 3 / 17
890
+ 2.00
891
+ 7.466s
892
+ vecadd
893
+ C
894
+ 0 / 2
895
+ -
896
+ 3.281s
897
+ wave13pt
898
+ C
899
+ 4 / 14
900
+ 2.50
901
+ 6.967s
902
+ whispering
903
+ C
904
+ 6 / 19
905
+ 0.83
906
+ 6.288s
907
+ Table 2. The KernelGen benchmark suite. Lang indicates
908
+ the programming language used (C or Fortran). Shuffle/Load
909
+ shows the number of shuffles generated among the total
910
+ number of global-memory loads. Delta is the average shuffle
911
+ delta. Analysis is the execution time of PTXASW on Intel
912
+ Core i7-5930K
913
+ For the evaluation, we use the KernelGen benchmark
914
+ suite for OpenACC [18], shown in Table 2. Each benchmark
915
+ applies the operator indicated in the benchmark name, to
916
+ single or multiple arrays and updates different arrays. The
917
+ benchmarks gameoflife, gaussblur, jacobi, matmul,
918
+ matvec and whispering are two-dimensional, whereas
919
+ others are three-dimensional, both having a parallel loop for
920
+ each dimension, in which other loops might exist
921
+ inside—except matvec, which features only one parallel
922
+ loop. The thread-level parallelism is assigned to the
923
+ innermost parallel loop and the thread-block level
924
+ parallelism to the outermost. We show the total time of
925
+ running the shuffle-synthesized kernel ten times on Kepler
926
+ (NVIDIA Tesla K40c with Intel i7-5930K CPU), Maxwell
927
+ (TITAN X with Intel i7-5930K), Pascal (Tesla P100 PCIE with
928
+ Intel Xeon E5-2640 v3), and Volta (Tesla V100 SXM2 with
929
+ IBM POWER9 8335-GTH). We use NVHPC compiler 22.3
930
+ with CUDA 11.6 at compilation, but due to environmental
931
+ restrictions,
932
+ run
933
+ the
934
+ programs
935
+ using
936
+ CUDA
937
+ driver
938
+ 11.4/11.4/10.0/10.2
939
+ for
940
+ Kepler/Maxwell/Pascal/Volta,
941
+ respectively. The compiler options in NVHPC are "-O3
942
+ -acc -ta=nvidia:cc(35|50|60|70),cuda11.6,loadcac
943
+ he:L1". To fully utilize computation, 2D benchmarks select
944
+ 32768x32768 as their dynamic problem sizes and 3D
945
+ compute
946
+ 512x1024x1024
947
+ grids,
948
+ except
949
+ uxx1,
950
+ which
951
+ leverages 512x512x1024 datasets and whispering, where
952
+ more buffers are allocated, computing over 8192x16384 data
953
+ elements. To assess a performance breakdown, we prepare
954
+ two other versions of PTXASW: NO LOAD and NO
955
+ CORNER. The former eliminates loads that are covered by
956
+
957
+ CC ’23, February 25–26, 2023, Montréal, QC, Canada
958
+ K. Matsumura, S. G. De Gonzalo, A. J. Peña
959
+ shuffles, whereas the latter only executes shuffles instead of
960
+ original loads, without the support of corner cases.
961
+ The shuffle synthesis fails on four benchmarks. In
962
+ matmul and matvec, the innermost sequential loop
963
+ contains loads, but these do not have neighboring accesses
964
+ along the dimension of the thread ID. The benchmarks
965
+ sincos and vecadd do not have several loads sharing the
966
+ same input array.
967
+ 7
968
+ Evaluation
969
+ Figure 2 shows the speed-ups of benchmarks on each GPU
970
+ with original code and PTXASW-generated code along with
971
+ the NO LOAD and NO CORNER versions. The line plots
972
+ provide the SM occupancy of each benchmark. Since there
973
+ is no resource change other than the register use from the
974
+ original execution, the occupancy rate is directly affected by
975
+ the number of registers. The performance improvement on
976
+ Kepler/Maxwell/Pascal/Volta is confirmed with 7/6/9/4
977
+ benchmarks
978
+ showing
979
+ up
980
+ to
981
+ 16.9%/132.3%/9.1%/14.7%
982
+ performance
983
+ improvement,
984
+ respectively.
985
+ We
986
+ see
987
+ performance degradation with Volta in the case where more
988
+ than ten shuffles are generated. Other GPUs mostly gain
989
+ better performance with such cases. With increased shuffle
990
+ deltas, more corner cases are expected. Volta shows optimal
991
+ efficiency when 𝑁 ⩽ 1.5, while other GPUs benefit from the
992
+ case of 𝑁 = 2.5. For example, Maxwell attains the best
993
+ performance with gaussblur (𝑁 = 2.5), although Volta’s
994
+ performance drops by half for the same case. The average
995
+ improvement across all GPU generations is -3.3%/10.9%/
996
+ 1.8%/-15.2% for Kepler/Maxwell/Pascal/Volta, respectively.
997
+ Overall, the performance improvement by PTXASW is
998
+ found when NO LOAD and NO CORNER have sufficiently
999
+ better performance compared to the original and when the
1000
+ occupancy typically rises on Kepler/Maxwell and drops on
1001
+ Pascal/Volta. The average number of additional registers
1002
+ with NO LOAD/NO CORNER/PTXASW compared to the
1003
+ original is -6.4/-5.2/2.7 on Kepler, -6.6/-5.9/4.2 on Maxwell,
1004
+ -7.0/-5.9/3.8 on Pascal, and -6.4/6.8/9.2 on Volta.
1005
+ 8
1006
+ Analysis
1007
+ This section provides the performance detail of our shuffle
1008
+ synthesis on each GPU. Figure 3 shows the ratio of stall
1009
+ reasons sampled by the profiler for all the benchmarks. Those
1010
+ characteristics of computation appear as the results of the
1011
+ program modification (e.g. register use, shuffle delta) and the
1012
+ architecture difference (e.g. computational efficiency, cache
1013
+ latency).
1014
+ 8.1
1015
+ Kepler
1016
+ The Kepler GPU has long stalls on computational
1017
+ operations with each benchmark. The average execution
1018
+ dependency is 24.7% and pipeline busyness is 7.5% with the
1019
+ original. When we look at the memory-bound benchmarks
1020
+ such as gameoflife, gaussblur, and tricubic, NO LOAD
1021
+ significantly reduces the amounts of memory-related stalls.
1022
+ Especially, tricubic has 56.0 percentage points below
1023
+ memory throttles from the original to NO LOAD, yielding
1024
+ 2.53x performance. From NO LOAD to NO CORNER, the
1025
+ execution dependency increases by 4.0 percentage points
1026
+ and the pipeline busyness decreases by 1.6 percentage
1027
+ points on average. The performance degradation at NO
1028
+ CORNER with the memory-bound benchmarks is observed
1029
+ with the latency of the pipelines and the wait for the SM
1030
+ scheduler. PTXASW suffers from memory throttling and
1031
+ additional computation for the corner cases, which limit the
1032
+ improvement up to 16.9%.
1033
+ The memory throttling and the additional computation
1034
+ bottlenecks suffered by PTXASW may be hidden if the
1035
+ shuffle operations reduce the original computation and
1036
+ communication into just one transfer among threads,
1037
+ functioning as a warp-level cache. Otherwise, there is a
1038
+ need to face a trade-off between the redundancy of
1039
+ operations and the efficiency on the architecture. On Kepler,
1040
+ both heavy computation and memory requests are imposed
1041
+ by the corner case. Therefore, in the general use of shuffles,
1042
+ the uniformity of calculation is crucial and it requires
1043
+ domain-specific knowledge.
1044
+ 8.2
1045
+ Maxwell
1046
+ There are two obvious compute-bound benchmarks:
1047
+ gameoflife and tricubic. For these, no improvement is
1048
+ perceived with NO LOAD, and there are no particular
1049
+ changes in occupancy or stalls throughout the four different
1050
+ versions. In summary, gameoflife experiences -0.1%/5.7%/
1051
+ 6.2% lower performance and tricubic shows -1.6%/7.7%/
1052
+ 15.4% lower performance with NO LOAD/NO CORNER/
1053
+ PTXASW, respectively, compared to the original version. In
1054
+ other cases, memory dependency is dominant. However, the
1055
+ merit of NO LOAD is limited to gaussblur and lapgsrb,
1056
+ which
1057
+ experience
1058
+ large
1059
+ texture-memory
1060
+ latency
1061
+ of
1062
+ read-only cache loads, successfully replaced with shuffles by
1063
+ PTXASW. The texture stall was reduced from 47.5% to 5.3%
1064
+ in gaussblur and from 23.0% to 0.1% in lapgsrb from the
1065
+ original to PTXASW, attaining 132.2% and 36.9% higher
1066
+ throughput. Other benchmarks do not feature stalls that
1067
+ allow for clear performance improvement by NO LOAD. As
1068
+ it can be observed in Figure 3, the memory dependency
1069
+ stalls are maintained for most benchmarks, except for that
1070
+ of tricubic2, which shows 32.9 percentage points lower
1071
+ memory dependency and only 14.3% overall improvement
1072
+ with NO LOAD. Those values are mostly absorbed by the
1073
+ corner cases.
1074
+ On the Maxwell GPU, only the texture stalls are
1075
+ improvable for efficiency in the tested cases. Since we
1076
+ observe a moderate overhead of the corner cases, our
1077
+ synthesis tool may enhance the overall performance. The
1078
+ memory-dependency stalls work as a good indicator of the
1079
+ memory utilization. If, in addition, a high execution
1080
+
1081
+ A Symbolic Emulator for Shuffle Synthesis on the NVIDIA PTX Code
1082
+ CC ’23, February 25–26, 2023, Montréal, QC, Canada
1083
+ 0.0
1084
+ 1.0
1085
+ 2.0
1086
+ 3.0
1087
+ 4.0
1088
+ Speed-up
1089
+ Kepler
1090
+ 0.00
1091
+ 0.25
1092
+ 0.50
1093
+ 0.75
1094
+ 1.00
1095
+ Occupancy
1096
+ 0.0
1097
+ 1.0
1098
+ 2.0
1099
+ 3.0
1100
+ 4.0
1101
+ Maxwell
1102
+ 0.00
1103
+ 0.25
1104
+ 0.50
1105
+ 0.75
1106
+ 1.00
1107
+ 0.0
1108
+ 0.5
1109
+ 1.0
1110
+ 1.5
1111
+ 2.0
1112
+ Pascal
1113
+ 0.00
1114
+ 0.25
1115
+ 0.50
1116
+ 0.75
1117
+ 1.00
1118
+ 0.0
1119
+ 0.5
1120
+ 1.0
1121
+ 1.5
1122
+ Volta
1123
+ 0.00
1124
+ 0.33
1125
+ 0.66
1126
+ 1.00
1127
+ divergence
1128
+ gameoflife
1129
+ gaussblur
1130
+ gradient
1131
+ jacobi
1132
+ lapgsrb
1133
+ laplacian
1134
+ tricubic
1135
+ tricubic2uxx1
1136
+ wave13pt
1137
+ whispering
1138
+ Kepler
1139
+ −0.05
1140
+ 0.00
1141
+ 0.05
1142
+ Original
1143
+ NO LOAD
1144
+ NO CORNER
1145
+ PTXASW
1146
+ Figure 2. Speed-up compared to Original. NO LOAD/NO
1147
+ CORNER produce invalid results
1148
+ dependency would exist, it would provide the warp-level
1149
+ shuffle optimization the opportunity to be beneficial to
1150
+ speed up the computation.
1151
+ 8.3
1152
+ Pascal
1153
+ Even more than in Maxwell, texture stalls are found in most
1154
+ benchmarks and those produce higher throughput with NO
1155
+ LOAD.
1156
+ Especially,
1157
+ gameoflife
1158
+ and
1159
+ tricubic,
1160
+ the
1161
+ compute-bound kernels on Maxwell, become memory
1162
+ intensive on Pascal and the performance increases by 5.9%
1163
+ and 5.4% with PTXASW. The unspecific latency ("Other")
1164
+ fills many parts of computation on Pascal. Further
1165
+ investigation shows that this mainly consists of the latency
1166
+ from register bank conflicts and the instructions after
1167
+ branching. With the optimization adding a predicate to
1168
+ check the activeness of the warp (@!incomplete) before the
1169
+ shuffle and generating a uniform branch, the ratio of this
1170
+ latency improves from 34.4% to 8.6% with PTXASW at
1171
+ gameoflife, obtaining 150.8% efficiency compared to the
1172
+ original. However, as mentioned in Section 5.2, it decreases
1173
+ the average relative execution time to 0.88x slowdown.
1174
+ Since the latency of the L1 cache is higher than that of
1175
+ one shuffle operation, the computation may be hidden by
1176
+ data transfers. Once the memory-dependency stall ratio
1177
+ 0
1178
+ 25
1179
+ 50
1180
+ 75
1181
+ 100
1182
+ Stall (%)
1183
+ Kepler
1184
+ 0
1185
+ 25
1186
+ 50
1187
+ 75
1188
+ 100
1189
+ Maxwell
1190
+ 0
1191
+ 25
1192
+ 50
1193
+ 75
1194
+ 100
1195
+ Pascal
1196
+ 0
1197
+ 25
1198
+ 50
1199
+ 75
1200
+ 100
1201
+ Volta
1202
+ divergence
1203
+ gameoflife
1204
+ gaussblur
1205
+ gradient
1206
+ jacobi
1207
+ lapgsrb
1208
+ laplacian
1209
+ tricubic
1210
+ tricubic2
1211
+ uxx1
1212
+ wave13pt
1213
+ whispering
1214
+ 0.00
1215
+ −0.05
1216
+ 0.00
1217
+ 0.05
1218
+ Mem Dep
1219
+ Inst Fetch
1220
+ Mem Throtle
1221
+ Not Selected
1222
+ Exec Dep
1223
+ Texture
1224
+ Pipe Busy
1225
+ Other
1226
+ Figure 3. Stall breakdown in the order of Original/NO
1227
+ LOAD/NO CORNER/PTXASW from left to right for each
1228
+ benchmark
1229
+ increases due to replacing the texture stalls, Pascal may
1230
+ maintain the efficiency with the corner cases, resulting in
1231
+ speed-up in nine benchmarks. For shuffle instructions to be
1232
+ beneficial, the execution should be less divergent and
1233
+ careful register allocation is recommended to maximize the
1234
+ thread utilization.
1235
+ 8.4
1236
+ Volta
1237
+ On Volta, most benchmarks become memory-bound and
1238
+ memory-intensive applications become sensitive to memory
1239
+ throttles. Nevertheless, the speed-up by NO LOAD is
1240
+ limited to up to 1.35x (gameoflife), due to the highly
1241
+ efficient cache mechanism. As argued in Section 7, some of
1242
+ the benchmarks attain higher performance with NO
1243
+ CORNER than in the case of NO LOAD for the lower
1244
+ occupancy. Other than that, we observe performance
1245
+ degradation due to increased execution dependency for
1246
+ lapgsrb and tricubic with NO CORNER. Those further
1247
+ reduce the efficiency with PTXASW while featuring stalls
1248
+ for instruction fetching. Also, the memory dependency of
1249
+ tricubic develops a large latency for memory accesses with
1250
+ PTXASW even though the corner cases experience fewer
1251
+ loads. This leads to unstable speed-ups between 0.315x and
1252
+ 1.15x.
1253
+ The calculation through shuffles is expected to be
1254
+ effective depending on the utilization of communication,
1255
+ and the nonentity of warp divergence. Especially, as Volta
1256
+
1257
+ CC ’23, February 25–26, 2023, Montréal, QC, Canada
1258
+ K. Matsumura, S. G. De Gonzalo, A. J. Peña
1259
+ shows minimal latency at each operation, the penalty of
1260
+ non-aligned computation becomes apparent and must be
1261
+ avoided by the algorithm.
1262
+ 8.5
1263
+ Application Example
1264
+ We also apply PTXASW for the compilation of CUDA
1265
+ benchmarks extracted from applications. We select three
1266
+ benchmarks that appeared as complex 3D stencil operations
1267
+ in [27]: hypterm, rhs4th3fort, and derivative, to run on
1268
+ the Pascal GPU. hypterm is a routine from a compressible
1269
+ Navier-Stokes mini-app [1]. rhs4th3fort and derivative
1270
+ are
1271
+ stencils
1272
+ from
1273
+ geodynamics
1274
+ seismic
1275
+ wave
1276
+ SW4
1277
+ application code [2]. Each thread in the benchmarks
1278
+ accesses
1279
+ 152/179/166
1280
+ elements
1281
+ over
1282
+ 13/7/10
1283
+ arrays,
1284
+ respectively. We modify the execution parameters to
1285
+ execute at least 32 threads along the leading thread-block
1286
+ dimension and use the float data type. Since we saw in the
1287
+ prior section the overhead of long-distance shuffles, which
1288
+ generate many corner cases, we limited the shuffle synthesis
1289
+ to be |𝑁 | ⩽ 1 and found shuffles only with |𝑁 | = 1.
1290
+ hypterms contains three kernels that work along
1291
+ different dimensions. In the kernel for the leading
1292
+ dimension, 12 shuffles are generated over 48 loads,
1293
+ producing
1294
+ 0.48%
1295
+ improvement.
1296
+ rhs4th3fort
1297
+ and
1298
+ derivative feature a single kernel each. rhs4th3fort
1299
+ experiences 2.49% higher throughput by PTXASW while
1300
+ placing 44 shuffles among 179 loads. For derivative, having
1301
+ 52 shuffles from 166 loads, PTXASW attains 3.79% speed-up
1302
+ compared to the original execution.
1303
+ 9
1304
+ Related Work
1305
+ Ever since warp-shuffle instructions were introduced during
1306
+ the Kepler generation of GPUs, these have been the subject of
1307
+ various lines of research. Early work described their manual
1308
+ use for specific computational patterns such as reduction
1309
+ operations [17] and matrix transposition [6]. Other research
1310
+ described the use of warp-shuffle instructions in the context
1311
+ of domain-specific optimizations such as employing them
1312
+ as a register cache for stencil operations [5], or to replace
1313
+ memory access for Finite Binary Field applications [5].
1314
+ Research on the automatic generation of warp-shuffle
1315
+ instructions has been explored. Swizzle Inventor [25] helps
1316
+ programmers implement swizzle optimizations that map a
1317
+ high-level "program sketch" to low-level resources such as
1318
+ shuffle operations. The authors meticulously design the
1319
+ abstraction of shuffles, synthesize actual code roughly based
1320
+ on algorithms found in previous literature, and attain
1321
+ enhanced performance while reducing the amounts of
1322
+ computation. Tangram, a high-level kernel synthesis
1323
+ framework, has also shown the ability to automatically
1324
+ generate warp-level primitives [13]. Unlike the work
1325
+ presented in this paper, both of the above-mentioned efforts
1326
+ leverage domain-specific information to map computational
1327
+ patterns
1328
+ such
1329
+ as
1330
+ stencil,
1331
+ matrix
1332
+ transposition,
1333
+ and
1334
+ reductions to shuffle operations.
1335
+ Recent code-generation techniques allow for obtaining
1336
+ optimal SIMD code generation. Cowan et al. [8] generate
1337
+ program sketches for execution on ARM processors, by
1338
+ synthesizing additional instructions, as well as input/output
1339
+ registers, to implement the shortest possible SIMD code of
1340
+ reduction. Unlike PTXASW, which uses an SMT solver to
1341
+ find the optimal shuffle deltas,
1342
+ this work runs a
1343
+ comprehensive search of multiple possible code versions;
1344
+ thus, the search space is exponential to the number of
1345
+ instructions. VanHattum et al. [31] attain faster execution
1346
+ on digital signal processors while employing equality
1347
+ saturation [28], a modern way of optimization that
1348
+ generates possible code as much as possible from a basic
1349
+ program according to the rules of term rewriting. They
1350
+ derive shuffles along with vector I/O and computation from
1351
+ sequential C code. Their intermediate code contains
1352
+ instructions in one nested expression and the shuffle
1353
+ operation only works for memory loads that appear as
1354
+ arguments of the same vector operation. Therefore, the
1355
+ code rewriting for shuffles assumes a top-down style where
1356
+ outer expressions have to be vectorized first, in order to
1357
+ vectorize inner expressions containing shuffled loads. While
1358
+ their technique may provide a powerful method to the
1359
+ implementation of libraries, irregular patterns such as
1360
+ corner cases found in HPC applications are out of scope.
1361
+ 10
1362
+ Conclusion
1363
+ This paper introduces symbolic emulation to compiling
1364
+ GPU code in order to discover hidden opportunities for
1365
+ optimization. We employ several languages, enabling
1366
+ OpenACC directives such as in C and Fortran, for the
1367
+ frontend to generate GPU assembly code. Then, our tool
1368
+ emulates the code upon symbols that substitute dynamic
1369
+ information. While pruning control flows to reduce the
1370
+ emulation time, we automatically find possible warp-level
1371
+ shuffles that may be synthesized to assembly code to bypass
1372
+ global-memory accesses. We apply this technique to a
1373
+ benchmark suite and complex application code showing
1374
+ results that improve multiple benchmarks on several
1375
+ generations of GPUs. We also provide the latency analysis
1376
+ across multiple GPUs to identify the use case of shuffles.
1377
+ Acknowledgement
1378
+ We are funded by the EPEEC project from the European
1379
+ Union’s Horizon 2020 research and innovation program
1380
+ under grant agreement No. 801051 and the Ministerio de
1381
+ Ciencia e Innovación—Agencia Estatal de Investigación
1382
+ (PID2019-107255GB-C21/AEI/10.13039/501100011033). This
1383
+ work has been partially carried out on the ACME cluster
1384
+ owned by CIEMAT and funded by the Spanish Ministry of
1385
+ Economy
1386
+ and
1387
+ Competitiveness
1388
+ project
1389
+ CODEC-OSE
1390
+ (RTI2018-096006-B-I00).
1391
+
1392
+ A Symbolic Emulator for Shuffle Synthesis on the NVIDIA PTX Code
1393
+ CC ’23, February 25–26, 2023, Montréal, QC, Canada
1394
+ References
1395
+ [1] ExaCT 2013. 2013.
1396
+ ExaCT: Center for Exascale Simulation of
1397
+ Combustion in Turbulence: Proxy App Software.
1398
+ http://www.
1399
+ exactcodesign.org/proxy-app-software/
1400
+ [2] SW4 2014. 2014. Seismic Wave Modelling (SW4) - Computational
1401
+ Infrastructure for Geodynamics. https://geodynamics.org/resources/
1402
+ sw4
1403
+ [3] The OpenMP ARB. 1997. OpenMP. https://www.openmp.org/
1404
+ [4] Roberto Baldoni, Emilio Coppa, Daniele Cono D’elia, Camil
1405
+ Demetrescu, and Irene Finocchi. 2018. A survey of symbolic execution
1406
+ techniques. ACM Comput. Surv. 51, 3, Article 50 (may 2018), 39 pages.
1407
+ https://doi.org/10.1145/3182657
1408
+ [5] Eli Ben-Sasson, Matan Hamilis, Mark Silberstein, and Eran Tromer.
1409
+ 2016. Fast multiplication in binary fields on GPUs via register cache.
1410
+ In Proceedings of the 2016 International Conference on Supercomputing
1411
+ (ICS ’16). Association for Computing Machinery, New York, NY, USA,
1412
+ Article 35, 12 pages. https://doi.org/10.1145/2925426.2926259
1413
+ [6] Bryan Catanzaro, Alexander Keller, and Michael Garland. 2014. A
1414
+ decomposition for in-place matrix transposition. In Proceedings of the
1415
+ 19th ACM SIGPLAN Symposium on Principles and Practice of Parallel
1416
+ Programming (PPoPP ’14). Association for Computing Machinery, New
1417
+ York, NY, USA, 193–206. https://doi.org/10.1145/2555243.2555253
1418
+ [7] Peng Chen, Mohamed Wahib, Shinichiro Takizawa, Ryousei Takano,
1419
+ and Satoshi Matsuoka. 2019. A versatile software systolic execution
1420
+ model for GPU memory-bound kernels. In Proceedings of the
1421
+ International Conference for High Performance Computing, Networking,
1422
+ Storage and Analysis (SC ’19). Association for Computing Machinery,
1423
+ New York, NY, USA, Article 53, 81 pages.
1424
+ https://doi.org/10.1145/
1425
+ 3295500.3356162
1426
+ [8] Meghan Cowan, Thierry Moreau, Tianqi Chen, James Bornholt, and
1427
+ Luis Ceze. 2020. Automatic generation of high-performance quantized
1428
+ machine learning kernels. Association for Computing Machinery, New
1429
+ York, NY, USA, 305–316. https://doi.org/10.1145/3368826.3377912
1430
+ [9] Leonardo de Moura and Nikolaj Bjørner. 2008. Z3: An efficient SMT
1431
+ solver. In Tools and Algorithms for the Construction and Analysis of
1432
+ Systems. Springer Berlin Heidelberg, Berlin, Heidelberg, 337–340.
1433
+ [10] Robert van Engelen. 2000. Symbolic evaluation of chains of recurrences
1434
+ for loop optimization. Technical Report TR-000102. Computer Science
1435
+ Dept., Florida State University.
1436
+ [11] Robert van Engelen. 2001. Efficients symbolic analysis for optimizing
1437
+ compilers. In Proceedings of the 10th International Conference on
1438
+ Compiler Construction (CC ’01). Springer-Verlag, Berlin, Heidelberg,
1439
+ 118–132.
1440
+ [12] Philip Ginsbach, Toomas Remmelg, Michel Steuwer, Bruno Bodin,
1441
+ Christophe Dubach, and Michael F. P. O’Boyle. 2018.
1442
+ Automatic
1443
+ matching of legacy code to heterogeneous APIs: An idiomatic approach.
1444
+ Association for Computing Machinery, New York, NY, USA, 139–153.
1445
+ https://doi.org/10.1145/3173162.3173182
1446
+ [13] Simon Garcia De Gonzalo, Sitao Huang, Juan Gómez-Luna, Simon
1447
+ Hammond, Onur Mutlu, and Wen-mei Hwu. 2019.
1448
+ Automatic
1449
+ generation of warp-level primitives and atomic instructions for fast and
1450
+ portable parallel reduction on GPUs. In 2019 IEEE/ACM International
1451
+ Symposium on Code Generation and Optimization (CGO). 73–84. https:
1452
+ //doi.org/10.1109/CGO.2019.8661187
1453
+ [14] Tobias Grosser, Armin Groesslinger, and Christian Lengauer.
1454
+ 2012.
1455
+ Polly — Performing polyhedral optimizations on a low-
1456
+ level intermediate representation.
1457
+ Parallel Processing Letters 22,
1458
+ 04 (2012), 1250010.
1459
+ https://doi.org/10.1142/S0129626412500107
1460
+ arXiv:https://doi.org/10.1142/S0129626412500107
1461
+ [15] Arpith Chacko Jacob, Alexandre E Eichenberger, Hyojin Sung,
1462
+ Samuel F Antao, Gheorghe-Teodor Bercea, Carlo Bertolli, Alexey
1463
+ Bataev, Tian Jin, Tong Chen, Zehra Sura, Georgios Rokos, and Kevin
1464
+ O’Brien. 2017. Efficient fork-join on GPUs through warp specialization.
1465
+ In 2017 IEEE 24th International Conference on High Performance
1466
+ Computing (HiPC). 358–367. https://doi.org/10.1109/HiPC.2017.00048
1467
+ [16] Zhe Jia, Marco Maggioni, Benjamin Staiger, and Daniele P. Scarpazza.
1468
+ 2018.
1469
+ Dissecting the NVIDIA Volta GPU architecture via
1470
+ microbenchmarking. https://doi.org/10.48550/ARXIV.1804.06826
1471
+ [17] Justin Luitjens. 2014. Faster parallel reductions on Kepler.
1472
+ https:
1473
+ //developer.nvidia.com/blog/faster-parallel-reductions-kepler/
1474
+ [18] Dmitry Mikushin, Nikolay Likhogrud, Eddy Z. Zhang, and Christopher
1475
+ Bergström. 2014. KernelGen – The design and implementation of a
1476
+ next generation compiler platform for accelerating numerical models
1477
+ on GPUs. In 2014 IEEE International Parallel Distributed Processing
1478
+ Symposium Workshops. 1011–1020. https://doi.org/10.1109/IPDPSW.
1479
+ 2014.115
1480
+ [19] G. E. Moore. 1998. Cramming more components onto integrated
1481
+ circuits. Proc. IEEE 86, 1 (Jan 1998), 82–85. https://doi.org/10.1109/
1482
+ JPROC.1998.658762
1483
+ [20] NVIDIA Corporation. 2022. High Performance Computing (HPC) SDK
1484
+ | NVIDIA. https://developer.nvidia.com/hpc-sdk
1485
+ [21] NVIDIA Corporation. 2022. Kepler Tuning Guide :: CUDA Toolkit
1486
+ Documentation. https://docs.nvidia.com/cuda/kepler-tuning-guide/
1487
+ index.html
1488
+ [22] NVIDIA Corporation. 2022. Programming Guide :: CUDA Toolkit
1489
+ Documentation. https://docs.nvidia.com/cuda/cuda-c-programming-
1490
+ guide/index.html
1491
+ [23] NVIDIA Corporation. 2022. PTX ISA :: CUDA Toolkit Documentation.
1492
+ https://docs.nvidia.com/cuda/parallel-thread-execution/index.html
1493
+ [24] The OpenACC Organization. 2011. OpenACC. https://www.openacc.
1494
+ org/
1495
+ [25] Phitchaya Mangpo Phothilimthana, Archibald Samuel Elliott, An
1496
+ Wang, Abhinav Jangda, Bastian Hagedorn, Henrik Barthels, Samuel J.
1497
+ Kaufman, Vinod Grover, Emina Torlak, and Rastislav Bodik. 2019.
1498
+ Swizzle Inventor: Data movement synthesis for GPU kernels.
1499
+ In Proceedings of the Twenty-Fourth International Conference on
1500
+ Architectural Support for Programming Languages and Operating
1501
+ Systems (ASPLOS ’19). Association for Computing Machinery, New
1502
+ York, NY, USA, 65–78. https://doi.org/10.1145/3297858.3304059
1503
+ [26] Jonathan Ragan-Kelley, Connelly Barnes, Andrew Adams, Sylvain
1504
+ Paris, Frédo Durand, and Saman Amarasinghe. 2013.
1505
+ Halide: A
1506
+ language and compiler for optimizing parallelism, locality, and
1507
+ recomputation in image processing pipelines. In Proceedings of the
1508
+ 34th ACM SIGPLAN Conference on Programming Language Design and
1509
+ Implementation (PLDI ’13). Association for Computing Machinery, New
1510
+ York, NY, USA, 519–530. https://doi.org/10.1145/2491956.2462176
1511
+ [27] Prashant Singh Rawat, Fabrice Rastello, Aravind Sukumaran-Rajam,
1512
+ Louis-Noël Pouchet, Atanas Rountev, and P. Sadayappan. 2018.
1513
+ Register Optimizations for Stencils on GPUs. In Proceedings of the
1514
+ 23rd ACM SIGPLAN Symposium on Principles and Practice of Parallel
1515
+ Programming (PPoPP ’18). Association for Computing Machinery, New
1516
+ York, NY, USA, 168–182. https://doi.org/10.1145/3178487.3178500
1517
+ [28] Ross Tate, Michael Stepp, Zachary Tatlock, and Sorin Lerner. 2009.
1518
+ Equality Saturation: A new approach to optimization. In Proceedings
1519
+ of the 36th Annual ACM SIGPLAN-SIGACT Symposium on Principles
1520
+ of Programming Languages (POPL ’09). Association for Computing
1521
+ Machinery, New York, NY, USA, 264–276.
1522
+ https://doi.org/10.1145/
1523
+ 1480881.1480915
1524
+ [29] TOP500.org. 2022. November 2022 | TOP500.
1525
+ https://www.top500.
1526
+ org/lists/top500/2021/11/
1527
+ [30] Emina Torlak and Rastislav Bodik. 2013.
1528
+ Growing solver-aided
1529
+ languages with Rosette. In Proceedings of the 2013 ACM International
1530
+ Symposium on New Ideas, New Paradigms, and Reflections on
1531
+ Programming & Software (Onward! 2013). Association for Computing
1532
+ Machinery, New York, NY, USA, 135–152.
1533
+ https://doi.org/10.1145/
1534
+ 2509578.2509586
1535
+ [31] Alexa VanHattum, Rachit Nigam, Vincent T. Lee, James Bornholt, and
1536
+ Adrian Sampson. 2021. Vectorization for Digital Signal Processors
1537
+ via Equality Saturation (ASPLOS 2021). Association for Computing
1538
+
1539
+ CC ’23, February 25–26, 2023, Montréal, QC, Canada
1540
+ K. Matsumura, S. G. De Gonzalo, A. J. Peña
1541
+ Machinery, New York, NY, USA, 874–886.
1542
+ https://doi.org/10.1145/
1543
+ 3445814.3446707
1544
+ [32] Sven Verdoolaege and Tobias Grosser. 2012. Polyhedral Extraction Tool.
1545
+ In Second International Workshop on Polyhedral Compilation Techniques
1546
+ (IMPACT). Paris, France. http://impact.gforge.inria.fr/impact2012/
1547
+ [33] Henry Wong, Misel-Myrto Papadopoulou, Maryam Sadooghi-Alvandi,
1548
+ and Andreas Moshovos. 2010. Demystifying GPU microarchitecture
1549
+ through microbenchmarking. In 2010 IEEE International Symposium
1550
+ on Performance Analysis of Systems Software (ISPASS). 235–246. https:
1551
+ //doi.org/10.1109/ISPASS.2010.5452013
1552
+ [34] Xiaolong Xie, Yun Liang, Xiuhong Li, Yudong Wu, Guangyu Sun,
1553
+ Tao Wang, and Dongrui Fan. 2015. Enabling coordinated register
1554
+ allocation and thread-level parallelism optimization for GPUs. In 2015
1555
+ 48th Annual IEEE/ACM International Symposium on Microarchitecture
1556
+ (MICRO). 395–406. https://doi.org/10.1145/2830772.2830813
1557
+ [35] Da Yan, Wei Wang, and Xiaowen Chu. 2020. Optimizing batched
1558
+ Winograd convolution on GPUs. Association for Computing Machinery,
1559
+ New York, NY, USA, 32–44. https://doi.org/10.1145/3332466.3374520
1560
+ Received 2022-11-10; accepted 2022-12-19
1561
+
29FIT4oBgHgl3EQf5SvC/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
59FKT4oBgHgl3EQfTC3B/content/2301.11778v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:4b4ea09c95151afa7bd60756390caa40f14ea1a23cbc4aa8afd5e678c03d3200
3
+ size 357586
59FKT4oBgHgl3EQfTC3B/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:2e3153033b540ee9d4f049541887aa3a85355b349099c4b1653b736cca357ca4
3
+ size 131400
5dE4T4oBgHgl3EQfBQvo/content/2301.04851v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:6352d760f10794c0dec28641cee5aa2722b68d04647d999a6354134ea2b5dd46
3
+ size 1175121
5dE4T4oBgHgl3EQfBQvo/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:9d20f66dce7f94615c489cb03416e7d0c7973cf2f9f98c688f030d8bcc0d4b2f
3
+ size 3407917
5dE4T4oBgHgl3EQfBQvo/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:b820f3ea16a27243baa5c263315cc4915d2e4039fdc35db4bd26765456c35b4b
3
+ size 116659
5tE0T4oBgHgl3EQfvwEb/content/tmp_files/2301.02621v1.pdf.txt ADDED
@@ -0,0 +1,1217 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ 1
2
+ Deep leakage from gradients
3
+ Yaqiong Mu
4
+ College of Information Science and Technology, Donghua University, 201620, Shanghai China
5
6
+ Abstract. With the development of artificial intelligence technology, Federated Learning (FL)
7
+ model has been widely used in many industries for its high efficiency and confidentiality. Some
8
+ researchers have explored its confidentiality and designed some algorithms to attack training data
9
+ sets, but these algorithms all have their own limitations. Therefore, most people still believe that
10
+ local machine learning gradient information is safe and reliable. In this paper, an algorithm based on
11
+ gradient features is designed to attack the federated learning model in order to attract more attention
12
+ to the security of federated learning systems.
13
+ In federated learning system, gradient contains little information compared with the original train-
14
+ ing data set, but this project intends to restore the original training image data through gradient in-
15
+ formation. Convolutional Neural Network (CNN) has excellent performance in image processing.
16
+ Therefore, the federated learning model of this project is equipped with Convolutional Neural Net-
17
+ work structure, and the model is trained by using image data sets. The algorithm calculates the virtual
18
+ gradient by generating virtual image labels. Then the virtual gradient is matched with the real gradi-
19
+ ent to restore the original image.
20
+ This attack algorithm is written in Python language, uses cat and dog classification Kaggle data
21
+ sets, and gradually extends from the full connection layer to the convolution layer, thus improving
22
+ the universality. At present, the average squared error between the data recovered by this algorithm
23
+ and the original image information is approximately 5, and the vast majority of images can be com-
24
+ pletely restored according to the gradient information given, indicating that the gradient of federated
25
+ learning system is not absolutely safe and reliable.
26
+ Keywords: Federated Learning, CNN, reconstruction attack, Gradient feature
27
+ 1
28
+ Introduction
29
+ In modern Federated Learning (FL) systems [1-3], model updating by exchanging gra-
30
+ dient information among multiple participants is a very common approach. The user
31
+ data of each participant is always stored locally, and only the gradient information is
32
+ propagated between different models. This type of algorithm does not need to establish
33
+ a dedicated central node for data processing, which protects the privacy of users and
34
+ the local model can be fully trained with the help of a federated learning system. For
35
+ example, medical systems can share the same data model while protecting the patient's
36
+ private information [4]. Therefore, it is not easy to extract the data information of local
37
+ models from the gradient, which has long been believed to be able to be propagated
38
+ among different models without worrying about privacy leakage, but in fact, stealing
39
+ local information from the gradient is still traceable.
40
+ With the rapid development of AI technology, federation learning models are in-
41
+ creasingly used as a fundamental technique in AI technology. Federal learning keeps
42
+ the data of each participant locally, and the databases of each participant remain inde-
43
+ pendent of each other during modeling, while the information interaction during joint
44
+ training is encrypted to ensure the confidentiality and efficiency of the system. In
45
+
46
+ 2
47
+ addition, the federated learning system can guarantee that the training effect of the local
48
+ training model is almost the same as that of the original centralized training model.
49
+ Nowadays, the development of artificial intelligence and deep learning is rapidly
50
+ changing, and federated learning solves the problem that data from all parties in the
51
+ previous centralized model can only be used at the central node, and ensures the privacy
52
+ and confidentiality of users at each node. Federated learning is suitable for training
53
+ models with large volumes of data and can be applied in a variety of contexts. Nowa-
54
+ days, the concept of smart cities has gained widespread attention, and federal learning
55
+ models have greatly contributed to the construction of smart cities. In terms of economy
56
+ and finance, it can combine data from various banks to build a model of economic
57
+ fluctuation, which can better predict the future economy, etc. In terms of politics and
58
+ people's livelihood, it can build a bridge between governments at all levels and the
59
+ masses, realize effective information sharing between governments and the masses,
60
+ build a good platform for communication between the masses and the government, and
61
+ help various governments to build a good system of people's city built by the people,
62
+ so that the authorities can do their work more efficiently and the masses can do their
63
+ work more conveniently, etc. efficient, more convenient for the masses, etc.
64
+ The high efficiency and confidentiality of the federal learning system make it
65
+ more and more widely used. However, the confidentiality of the federal model needs
66
+ to be further explored, and if the data involved in the training can be restored by some
67
+ means, it proves that the system still needs to be improved. With the continuous pro-
68
+ gress of artificial intelligence, the protection of Internet privacy has gradually become
69
+ a hot topic of discussion. By studying the vulnerability of the system, the confidential-
70
+ ity of the federation learning system is gradually improved, which can also provide
71
+ some new ideas for the protection of Internet privacy nowadays.
72
+ This thesis focuses on the gradient information leakage problem in convolutional
73
+ neural network-based federal learning systems, and explores how to restore the original
74
+ data image from the gradients containing very little information. After introducing the
75
+ basic principles, the effect of Deep Leakage from Gradients (DLG) algorithm to restore
76
+ the original image is studied, and certain improvements are made based on it, and fi-
77
+ nally the corresponding conclusions are drawn by comparison.
78
+ The structure of the thesis is as follows: Chapter 1 briefly introduces the research
79
+ background, status and significance of this thesis, and briefly composes the content to
80
+ be studied in this thesis. Chapter 2 briefly introduces the federal learning system, the
81
+ structure, functions and common models of CNN, and some attack algorithms against
82
+ the federal learning system. Chapter 3 mainly introduces the general principle of local
83
+ information leakage, and the working principle and derivation process of DLG algo-
84
+ rithm. Chapter 4 mainly shows the implementation of the depth gradient algorithm,
85
+ analyzes the shortcomings of the algorithm, proposes improvement methods and com-
86
+ pares them. Chapter 5 mainly integrates and summarizes the research content of this
87
+ topic, presents the shortcomings and areas for improvement, and provides an outlook
88
+ for the gradient attack algorithm for FL.
89
+
90
+ 3
91
+ 2
92
+ Related Technologies
93
+ This section introduces the basic concepts and related techniques needed to under-
94
+ stand the reconstruction attack based on gradient features, including the introduction of
95
+ the federal learning model, the convolutional neural network structure used to train the
96
+ model, the related models, the role of the functions involved in the network, and some
97
+ methods for gradient-based attacks.
98
+ 2.1
99
+ Federal Learning Model
100
+ The system for federated learning [22] first utilizes an encryption-based user sample
101
+ alignment technique where data owners identify the common users of each party while
102
+ securing the data of their respective users in order to federate the features of these users
103
+ for modeling, and the modeling training process requires federated models to secure the
104
+ privacy of each local database. First, the federated model sends the public key to the
105
+ local database to ensure that the local place completes the local data encryption before
106
+ performing data exchange. After that, the local place transmits the data to the joint
107
+ model in encrypted form. The data has been initially calculated by the local place and
108
+ the gradient is calculated based on the tag value, and then the gradient is encrypted and
109
+ transmitted to the joint model. The joint model combines the gradients calculated by
110
+ each local model to find the total gradient value, decrypts it and sends it to each local
111
+ model, so the local model can update its own model parameters according to the new
112
+ gradient value and improve the optimized model. The above process is repeated until
113
+ the gradient is infinitely close to the set value, which completes the training of the whole
114
+ model. During the model training process, the data of each data owner is not exposed
115
+ to the federated model and other local models, and the data exchange during training
116
+ does not lead to data privacy threats. As a result, all parties are able to cooperate in
117
+ training the model with the help of the federated learning model.
118
+ 2.2
119
+ Convolutional Neural Networks
120
+ Convolutional Neural Network (CNN) is a deep learning model inspired by biologi-
121
+ cal neural networks [23], formed by interconnecting multiple layers of neurons, where
122
+ the number of input data in each layer is equal to the number of neurons in the previous
123
+ layer, and each neuron can receive multiple inputs but can only output one data. This
124
+ network is often applied in image processing, and the structure and role of each layer
125
+ will be described next [24].
126
+ Input Layer.
127
+ Convolutional neural networks first need to convert image information into input
128
+ data. The color of a color picture pixel consists of three attributes: red, green and blue,
129
+ which are called RGB three channels, and the number of pixels in each row and column
130
+ of each picture is the resolution of the picture. However, for black and white pictures,
131
+ the color of the pixels is determined only by the attribute grayscale value. Assume that
132
+ the value of each channel is between 0 and 511. A color photo with a resolution of
133
+
134
+ 4
135
+ 100×100 can be converted to a tensor of (100,100,3), and a black and white photo of
136
+ the same size can be converted to a tensor of (100,100,1).
137
+ The main work of this layer is to perform a pre-processing of the original image,
138
+ which consists of three main categories: Centering, which subtracts the average of this
139
+ dimension from each dimension of the input data, so that the center of the data lies at
140
+ the zero point. Normalization, which makes the standard deviation of the data to be 1,
141
+ reduces the effect of different values taken by the data. PCA is used to reduce the cor-
142
+ relation between the feature values and strives to eliminate the correlation between im-
143
+ age bands; and whitening, which weakens the effect of the magnitude on the feature
144
+ axis of the data.
145
+ Convolutional Layer.
146
+
147
+ Fig. 1. Two-dimensional convolution example
148
+ The three hyperparameters of the convolution kernel are Stride, Zero Padding and
149
+ Depth. Stride is the number of frames that the data frame moves, which in Figure 2-3
150
+ is equal to 1. Zero padding protects the edge information of the image from being
151
+ blurred or lost during the network training process. Depth is the number of convolution
152
+ kernels, which should be the same as the number of neurons in the next layer. The
153
+ number of neurons in the convolutional layer is calculated by subtracting the number
154
+ of neurons from the size of the convolution plus twice the sum of the zero padding,
155
+ dividing by the step size, and finally adding one to the resulting result.
156
+ Without parameter sharing, 10×64×64×5×5×3=3072000 parameters are required,
157
+ and with parameter sharing, 10×5×5×3=750 parameters are required. It can be seen that
158
+ parameter sharing reduces the number of features obtained by the convolutional nuclei,
159
+ which leads to the loss of local features if the image size is large. An effective way to
160
+ solve this problem is to set multiple convolutional kernels in each convolutional layer.
161
+
162
+ 1
163
+ 1
164
+ 1
165
+ 1
166
+ 1
167
+ -1
168
+ 0
169
+ -3
170
+ 0
171
+ 1
172
+ 1
173
+ 0
174
+ 0
175
+ 0
176
+ -2
177
+ -1
178
+ 2
179
+ 1
180
+ 1
181
+ -1
182
+ 0
183
+ 0
184
+ 0
185
+ 0
186
+ =
187
+ 2
188
+ 2
189
+ 4
190
+ ¥0
191
+ -1
192
+ 1
193
+ 2
194
+ 1
195
+ 0
196
+ 0
197
+ -1
198
+ -1
199
+ 0
200
+ 0
201
+ 1
202
+ 2
203
+ 1
204
+ 1
205
+ 15
206
+
207
+ Fig. 2. Feature Mapping
208
+ Activating Layer
209
+ The role of this layer is, as the name suggests, both to take the output of the con-
210
+ volutional layer and to process it nonlinearly. Commonly used nonlinear mapping func-
211
+ tions will be introduced in the following.
212
+ Sigmoid function
213
+ Advantages: take the value range (0, 1), simple, easy to understand.
214
+ Disadvantages: too much data may paralyze the neuron, so that the gradient infor-
215
+ mation cannot be transmitted; the function output data center point does not lie at the
216
+ zero point.
217
+
218
+ Fig. 3. Sigmoid function
219
+ Pooling Layer
220
+ The pooling layer, also called subsampling layer, is used for feature extraction, which
221
+ reduces the number of neurons to some extent and prevents the appearance of overfit-
222
+ ting. This layer removes redundant information and retains only key features, which
223
+ can improve robustness. The pooling layer, also known as the downsampling layer,
224
+ causes the features of the input information to be lost, which in turn cuts the number of
225
+
226
+ 3
227
+ N
228
+ 0
229
+ 1
230
+ 2
231
+ 3
232
+ 2
233
+ 3
234
+ 0
235
+ 1
236
+ 2
237
+ m
238
+ 16
239
+ 0
240
+ 1
241
+ x
242
+ 0
243
+ 2
244
+ m
245
+ 0
246
+ 15
247
+ 16
248
+ 3
249
+ 0
250
+ 1
251
+ 2
252
+ m
253
+ 0
254
+ 2
255
+ m
256
+ 2
257
+ 15
258
+ 16
259
+ 0
260
+ 1
261
+ 6
262
+ 15
263
+ 3
264
+ 01.0
265
+ 0.8
266
+ 0.6
267
+ 0.4
268
+ 0.2
269
+ 0.0
270
+ -
271
+ -
272
+ -8
273
+ -6
274
+ -4
275
+ -2
276
+ 0
277
+ 2
278
+ 4
279
+ 6
280
+ 86
281
+ parameters, making the network less computationally burdensome; while keeping the
282
+ important features unchanged (cropping, stretching, scaling, etc.).
283
+ One is average pooling, which requires summing the feature points in the neighbor-
284
+ hood and then dividing the total feature value equally among the feature points; the
285
+ other is maximum pooling, which, as the name implies, excludes all smaller feature
286
+ values in the domain and takes them out. The pooling often makes mistakes in obtaining
287
+ the feature values: first, the variance of the estimate increases; second, the shift of the
288
+ mean of the estimate. In terms of the prevailing theory, in image processing, the first
289
+ error handling method mostly uses the mean pooling operation to moderate the size
290
+ limitation of the domain to reduce the variance, thus making the image background
291
+ clearer; while the second error handling method mostly uses the maximum pooling op-
292
+ eration, which basically ignores the parameter error of the convolutional layer and guar-
293
+ antees the mean accuracy, thus preserving the texture of the image. Therefore, one of
294
+ these two methods is missing in convolutional neural networks.
295
+ Flatten layer and fully connected layer
296
+ The role of the flatten layer is to flatten multidimensional data into one-dimensional
297
+ data. The fully-connected layer limits the dimensionality of the data, and thus flattening
298
+ the data for re-input is essential.
299
+ The fully connected layer is often used as the closing layer in the convolutional neural
300
+ network structure, using different activation functions to match different classification
301
+ requirements.
302
+ Output Layer
303
+ The role of this layer is to output the final target result.
304
+ Structure of convolutional neural networks [26]
305
+ The layers introduced above are combined to become the complete convolutional
306
+ neural network structure [27]. Figure 4 shows the basic structure of a CNN, where each
307
+ convolutional layer applies an activation function for quadratic sampling and then two
308
+ fully connected layers to give predictions.
309
+
310
+ Fig. 4. Basic structure of CNN
311
+
312
+ C3:feature maps
313
+ S4:feature maps
314
+ 16(@10*10
315
+ S2:feature maps
316
+ 16@5*5
317
+ C5:layer
318
+ F6:layer OUTPUT
319
+ C1:feature maps
320
+ 6(@14*14
321
+ 120
322
+ O1
323
+ 6@28*28
324
+ INPUT
325
+ 32*32
326
+ Full connection
327
+ Gaussian
328
+ Convolutions
329
+ Subsampling
330
+ Convolutions
331
+ Subsampling
332
+ connections
333
+ Full connection7
334
+ 2.3
335
+ Common models of convolutional neural networks
336
+ Many models of convolutional neural networks exist, and several commonly used
337
+ models will be presented here.
338
+ LeNet
339
+ LeNet is mainly used to identify and classify non-printed fonts, and it has an accuracy
340
+ rate of 98%. As a result, the United States put this model into use in the financial in-
341
+ dustry in the late 20th century. This model is used as the basis of convolutional neural
342
+ network, with a total of six layers of network, and the convolutional kernels are all 5×5
343
+ with a step size of 1,using average pooling: conv → pool → conv → pool → conv(fc)
344
+ → fc.
345
+ AlexNet
346
+ This model uses the ReLU function as the activation function, and optimizes the
347
+ problem that the gradient of the sigmoid function is prone to be uncomputable in a
348
+ network with more layers. And some improvements are made in the final fully con-
349
+ nected layer, where only some neurons are randomly selected to participate in the com-
350
+ putation of the network, which can prevent overfitting.
351
+ Convolutional neural networks usually use average pooling and maximum pooling
352
+ alternately, but in this model, only maximum pooling is used, basically ignoring the
353
+ parameter error of the convolutional layer and the size limitation of the neighborhood.
354
+ This model reduces the step size to achieve a pooling kernel size larger than the step
355
+ size value, so the output of the pooling layer enhances the feature richness.
356
+ A local response normalization layer is created for the first time, so that the neuron
357
+ responses in this layer show bipolarity and improve generalization ability.
358
+ VGGNet.
359
+ The LRN layer used in AlexNet was not found to bring significant performance
360
+ improvement to the network in later practice, so the LRN layer in VGGNet has no
361
+ performance gain (A-LRN) and is not extended to other network models.
362
+ VGGNet increases the number of network layers compared with other previous
363
+ networks, and the number of layers in its network structure is twice or more than
364
+ AlexNet without counting the pooling and softmax layers here. The concept of convo-
365
+ lutional block is proposed for the first time, and 2~3 convolutional layers form a con-
366
+ volutional block, which can reduce the number of parameters and enhance the learning
367
+ ability by using ReLU activation function.
368
+ GoogLeNet.
369
+ Inception V1 increases the convolution module function compared to several pre-
370
+ viously proposed network structures. The previous network structure improves the
371
+ training effect, but the effect benefits from its increased number of network layers also
372
+ deepens the network depth. However, the deeper depth also brings many problems,
373
+ such as overfitting, gradient cannot be found in the network and the computational ef-
374
+ fort increases.
375
+
376
+ 8
377
+ SqueezeNet.
378
+ SqueezeNet's model compression uses 3 strategies.
379
+ (1) replacing 3×3 convolution with 1×1 convolution: the number of parameters of
380
+ convolution is reduced to 1/9 of the original one, which helps to improve the speed of
381
+ network operation; (2) reducing the number of channels of 3×3 convolution: the com-
382
+ putation of a 3×3 convolution is 3×3×a×b (where a, b are the number of channels of
383
+ input Feature Map and output Feature Map respectively), reducing the number of chan-
384
+ nels to reduce the number of parameters The number of channels is reduced to reduce
385
+ the number of parameters, which helps to simplify the operation and improve the per-
386
+ formance of the network; (3) the downsampling is set back: the larger Feature Map
387
+ contains more information, so the downsampling is moved to the classification layer.
388
+ Such an operation can improve the accuracy of the network, but it will increase the
389
+ burden of network computation.
390
+ ResNet.
391
+ Before introducing the model, it is necessary to understand the concept of residu-
392
+ als, first of all, it is necessary to distinguish between residuals and errors. The error is
393
+ the measured value minus the reference value, and the residual is the difference between
394
+ the actual observed value and the predicted value, and the residual can detect whether
395
+ the prediction is accurate or not. The function of one layer in the residual network is set
396
+ as y=F(x), and the residual model can be expressed as H(x)=G(x) + x, that is,
397
+ G(x)=H(x)-x. In the unit mapping, y=x is the actual observed value, and H(x) is the
398
+ fitted value, so G(x) corresponds to the residual, so it is called the residual network.
399
+
400
+ Fig. 5. Residual network
401
+ Losing the residuals, as shown in the connection on the left side of the figure, the
402
+ error in training and the network depth show a negative correlation as the number of
403
+ networks increases. In contrast, theoretically, the increase of network depth and the
404
+ model training effect should show a positive correlation. Theoretical and practical de-
405
+ viations often exist, and for an ordinary network without jump connections, the deeper
406
+ the depth will make the computation more complicated, and the improvement and
407
+
408
+ X
409
+ weight
410
+ G(x)
411
+ X
412
+ relu
413
+ identity
414
+ weight
415
+ G(x)+x
416
+ relu9
417
+ enhancement of the algorithm will be more difficult to achieve. Therefore, in reality,
418
+ there is a positive correlation between the depth of the network and the number of train-
419
+ ing errors.
420
+ To solve this problem, the network needs to detect the existence of redundant lay-
421
+ ers by itself, which makes the optimization algorithm complicated and does not achieve
422
+ constant mapping. The ResNet model is able to solve this problem in a very fitting way
423
+ by updating the parameters of the redundant layers with the residual G(x)=0 instead of
424
+ the fitted value H(x)=x, and by doing so, updating the parameters of the redundant lay-
425
+ ers. That is, after the network spontaneously detects and infers which layers are redun-
426
+ dant and useless, the residual function G(x)=0 makes the network of that layer, after
427
+ removing the redundant layer, match the input of the previous layer accurately. In this
428
+ way, the effect of errors caused by redundant layers is almost eliminated, effectively
429
+ solving the network degradation problem.
430
+ As an example to explore the cause of network degradation, when one designs the
431
+ network in the first place, one does not perform the actual operation to grasp the number
432
+ of layers needed for the network structure. To be on the safe side and to enable the
433
+ network to train well, people tend to set up more layers of network structure. When the
434
+ network is actually trained, it is found that only half the number of layers may be needed
435
+ to complete the task of this network, and then the extra layers are redundant. Therefore,
436
+ we hope that during the training process, the model can find out that the other half of
437
+ the layers are redundant and make a constant mapping for only half of the layers, so
438
+ that the input data will be identical to the output data after passing through the model.
439
+ But often the model is likely to learn this half of the constant mapping incorrectly,
440
+ so it may not work as well as a model with 2/3 of the original number of layers set.
441
+ Therefore, as the number of layers of the network increases, the effect of model training
442
+ may degrade, which is caused by the redundant layers learning the wrong constant map-
443
+ pings.
444
+ DenseNet.
445
+ In a comprehensive view, DenseNet has the following advantages over the previ-
446
+ ous models.
447
+ (i) the use of dense connectivity, which mainly improves the back propagation
448
+ speed of gradients to accelerate the training of convolutional neural networks. (2) The
449
+ parameters are reduced and the values are decreased to improve the efficiency of com-
450
+ putation and to reduce the feature maps specific to each layer; (3) Feature reuse is used
451
+ to reuse the low-level features for the last layer to play the role of classification.
452
+ MobileNet.
453
+ ①MobileNet-v1
454
+ In a nutshell, V1 replaces the usual convolutional layers in vgg with depth-sepa-
455
+ rable convolution, and therefore can greatly reduce the number of parameters; and adds
456
+ the hyperparameters α and β on top of vgg.
457
+ ②MobileNet-v2
458
+
459
+ 10
460
+ MobileNetV2 is proposed by Google in 2018, with better accuracy and smaller
461
+ model compared to V1. The model highlights have Inverted Residuals structure (In-
462
+ verted Residuals) and Linear bottlenecks.
463
+ Deep Residual Learning.
464
+ The core difference of this algorithm is that it proposes a new structure with a
465
+ topological spreading to form a new block structure, replacing the convolutional block
466
+ structure of the previous model, which can optimize the performance of the model pre-
467
+ diction and improve the accuracy while adding almost no new parameters. The topo-
468
+ logical spreading also reduces the number of hyperparameters and improves the gener-
469
+ ality of the model.
470
+ ShuffelNet.
471
+ ①ShuffelNet-v1
472
+ ShuffleNet is improved by two new operations: point-state group convolution and
473
+ channel scrubbing, similar to the previous model, which can ensure the accuracy of the
474
+ network structure output results and reduce the computational complexity. The basic
475
+ cell structure of the model is optimized and improved based on the residual model cells.
476
+ ②ShuffelNet-v2
477
+ The number of neurons in this model is relatively small, and the number of
478
+ branches between layers is thus reduced to speed up the model convergence. The model
479
+ input speed depends on the number of input and output feature channels, but too many
480
+ grouping parameters can affect the model convergence speed.
481
+ EfficientNet.
482
+ Convolutional neural networks are usually built after resource evaluation, and the
483
+ more resources are available, the better the performance of the network model will be.
484
+ This model delves into how to scale the model up and down and finds that making the
485
+ depth and width of the network converge across the layers or reducing the gap in reso-
486
+ lution can both improve the network's effectiveness. Therefore, a new method is pro-
487
+ posed to balance the above three characteristics of the network with composite coeffi-
488
+ cients, etc.
489
+ This model was born out of the desire to find a new balance between network
490
+ depth, width and resolution to measure the accuracy of the network. Previous models
491
+ have used only one of these aspects to evaluate the effectiveness of the network. This
492
+ model found that these three aspects together have an impact on the scaling of the net-
493
+ work, and explored the evidence of the interaction between the three, based on which
494
+ the best combination of the three was found.
495
+ 2.4
496
+ General Methods for Gradient-Based Attacks
497
+ Membership inference.
498
+ Membership inference [28] refers to speculating whether these data points have
499
+ been used in the process of training the model based on the known training model and
500
+
501
+ 11
502
+ the delimited range of data points. In federation learning, the updated gradient infor-
503
+ mation is fed back to the server every round, so the server is able to have certain local
504
+ model information. With this attack algorithm, the server is able to know whether the
505
+ delimited data points are used for model training or not. Sometimes, in certain situa-
506
+ tions, this attack can directly lead to a privacy breach. For example, if the attack learns
507
+ that a patient's clinical records are used for training a model for a particular disease, the
508
+ fact that the patient has that disease is compromised. In practice, Melis et al. demon-
509
+ strated that this attack approach is extremely accurate on the FourSquare location da-
510
+ taset [29] and can almost determine whether a particular data point data point is used
511
+ for category classification training.
512
+ Attribute inference.
513
+ Attribute inference refers to inferring whether the corresponding training set con-
514
+ tains the same labeled attributes as the known model based on the known training
515
+ model. Note that the attribute is not important in terms of its relevance to the main task.
516
+ When training a model on the LFW dataset [30] for identifying gender or race, attribute
517
+ inference can infer whether they wear a mask or not, in addition to the two known
518
+ labels. In practice, this also poses a potential risk of privacy compromise. If the patient's
519
+ age, gender, race, and whether they wear a mask or not are known, there is a high risk
520
+ that the patient's personal information will be compromised, even if the name and clin-
521
+ ical records remain confidential.
522
+ Model inversion.
523
+ Model inversion is a greater threat to the privacy of the training dataset compared
524
+ to the first two aggressive ones. Since the learning process is always ongoing, this attack
525
+ exploits this property by having the adversary train a generative adversarial network
526
+ (GAN) [31] to generate samples that match the training dataset. The results of the attack
527
+ show that the images obtained are almost identical to the original images, since the
528
+ GAN is able to create matching samples that are nearly identical to the original training
529
+ dataset. Moreover, the higher the similarity of the training set, the better the perfor-
530
+ mance of this attack.
531
+ The above three attack strategies reveal that the information in the gradient is at
532
+ risk of leakage to some extent, but each of these three attacks has its own limitations.
533
+ The membership inference attack relies on delimited data, and the attack will be much
534
+ more difficult when the input data is not textual information (e.g., images, voice). At-
535
+ tribute inference relaxes the constraint that only a label is needed to perform the attack.
536
+ However, the attack result will narrow the scope and there is no guarantee to find the
537
+ specific data. For model inversion, although it can generate synthetic images directly
538
+ from the statistical distribution of the training data, the results are similar alternatives
539
+ (rather than the original data) and only work when all class members are similar. What
540
+ will be investigated and demonstrated in this paper is how to steal the training data
541
+ completely from the gradient information without prior training data.
542
+
543
+ 12
544
+ 2.5
545
+ Summary of this chapter
546
+ This chapter introduced the types of networks and their structures used in this at-
547
+ tack. The first section starts with the federal learning system and outlines how it updates
548
+ the model by gradients; the second section describes the working principle of convolu-
549
+ tional neural networks suitable for training classification images and the structure of
550
+ each level; the third section briefly describes the commonly used convolutional neural
551
+ network models and provides the basis for the next study on how to select and apply
552
+ such models for training; the fourth section introduces the The fourth subsection intro-
553
+ duces some methods that can be used to perform gradient attacks with prior knowledge
554
+ of the training data. The theoretical foundation is laid for the subsequent research in
555
+ this paper to prove the attack algorithm based on gradient features only.
556
+ 3
557
+ Design of reconstruction attack algorithm based on gradient features
558
+ The subject under study is a reconstruction attack based on gradient features, using
559
+ a convolutional neural network for the training of a federal learning system for image
560
+ classification. In this paper, we need to use the gradient derived from the image and its
561
+ label information trained by the convolutional neural network to restore the original
562
+ information. This chapter first introduces the principle of the attack that can obtain part
563
+ of the original data, and then delves into the analysis and study of the algorithm that
564
+ restores the complete original information based on the gradient.
565
+ 3.1
566
+ Local leakage of specific layers
567
+ First, this chapter starts with a few special layers to study and optimize the attack
568
+ algorithm step by step. The first one is the fully-connected layer (FC). The fully con-
569
+ nected layer is indispensable in both neural networks and convolutional neural net-
570
+ works. For the biased fully connected layer, it is mathematically proven that the reduc-
571
+ tion of the original input data from the gradient information is done without considering
572
+ the position of this layer and the class of layers before and after this layer.
573
+ Lemma 1: Suppose a fully connected layer of a neural network contains weights and
574
+ biases with input 𝑋 ∈ ℝ𝑛 and output 𝑌 ∈ ℝ𝑚, weight 𝑊 ∈ ℝ𝑚×𝑛and bias 𝐵 ∈ ℝ𝑚,
575
+ then it is obtained
576
+
577
+ 𝑌 = 𝑊𝑋 + 𝐵
578
+ (3-1)
579
+ If there exists
580
+ 𝑑𝐿
581
+ 𝑑(𝐵𝑖) ≠ 0, then the input data X can B be reconstructed from
582
+ 𝑑𝐿
583
+ 𝑑𝑊 and
584
+ 𝑑𝐿
585
+ 𝑑𝐵. The following proof is carried out: it is known that
586
+ 𝑑𝐿
587
+ 𝑑(𝐵𝑖) =
588
+ 𝑑𝐿
589
+ 𝑑𝑌𝑖 and
590
+ 𝑑(𝑌𝑖)
591
+ 𝑑(𝑊𝑖) = 𝑋𝑇, then
592
+
593
+ 𝑑𝐿
594
+ 𝑑(𝑊𝑖) =
595
+ 𝑑𝐿
596
+ 𝑑(𝑌𝑖) ⋅
597
+ 𝑑(𝑌𝑖)
598
+ 𝑑(𝑊𝑖) =
599
+ 𝑑𝐿
600
+ 𝑑(𝐵𝑖) ⋅ 𝑋𝑇
601
+ (3-2)
602
+ where𝑌𝑖 𝑊𝑖 and𝐵𝑖 denote the ith row of output Y, weight W and bias B. Therefore,
603
+ the input X can be reconstructed from this formula as long as
604
+ 𝑑𝐿
605
+ 𝑑(𝐵𝑖) ≠ 0 is satisfied.
606
+ The derivative as well as the bias
607
+ 𝑑𝐿
608
+ 𝑑𝐵 are crucial for reconstructing the input layer. To
609
+ make the gradient attack more general, Geiping et al. delved deeper and found that if
610
+ the bias B is eliminated, the original input data can also be restored from a small amount
611
+
612
+ 13
613
+ of gradient information as long as a suitable activation function (e.g., ReLU activation
614
+ function) is found. The proof process is similar, and the reconstruction of the input data
615
+ in the fully connected layer still works well.
616
+ If the function is not derived, the input data information is still implied in the gradi-
617
+ ent. For example, in the language classification task, the federal learning system gener-
618
+ ates corresponding gradients only for the words in the input model, and the attack tells
619
+ which words and phrases were used for model training in each local data set, respec-
620
+ tively. The cross-entropy layer in the classification task, on the other hand, can only
621
+ generate negative gradients for the data with corrected completion labels. This property
622
+ gives away the true data labels to some extent.
623
+ However, there are many more factors to consider when extending from the fully
624
+ connected layer (FC) to the more complex convolutional layer (CONV), where the
625
+ number of features in the convolutional layer and the dimensionality of the input occu-
626
+ pation are much larger than the size of the gradient values. A parsing reconstruction
627
+ method like the one in Lemma 1 will no longer be applicable. Modern convolutional
628
+ neural networks require a more general attack algorithm.
629
+ 3.2
630
+ Complete leakage of the gradient
631
+ Zhu et al [33] proposed a new and improved algorithmic method that is able to
632
+ solve the above problem by using neural networks with the same structure and matching
633
+ gradients to restore the reconstructed original dataset. Thus it can ensure that the dataset
634
+ is private and non-interoperable, and the generality and attack capability of this method
635
+ are broader and more powerful than the methods in the previous subsection, and this
636
+ technique is called Deep Gradient Leakage algorithm (DLG).
637
+ DLG is a reconstruction attack based on gradient features. The attacker receives
638
+ the gradient update ∇𝑊𝑡,𝑘, k from the other participants k in round t, in order to obtain
639
+ the training set (𝑥𝑡,𝑘, 𝑦𝑡,𝑘) of participant k from the shared exchange information. Figure
640
+ 3-1 shows how it works in stealing image information: normal participants input an
641
+ image from the original private data and derive a prediction by the F-model, then use
642
+ the difference between the prediction and the labeled value to calculate the gradient,
643
+ which is returned to the participants to update the model. The algorithm first generates
644
+ a virtual pixel point image with the same size as the real image, and then initializes a
645
+ virtual label indicating the probability, such as the cat and dog classification explored
646
+ in this topic, which sets the label value of 0 for the cat and 1 for the dog. then a softmax
647
+ layer is generated. the DLG iterates the matching of the image and the label on the
648
+ intermediate local model to compute the virtual gradient. Note that most FL models
649
+ share the privacy difference module 𝐹(𝑥, 𝑊) and the weights W by default.
650
+ The loss function is set to be the difference between the true gradient and the vir-
651
+ tual gradient, and then the squared number is obtained to ensure that the loss function
652
+ is positive. The key point of this reconstruction attack is to narrow the gap between the
653
+ real gradient and the virtual gradient by continuously iterating, and then return to the
654
+ models of both parties, update their respective parameters, and retrain the attacker's
655
+ model so that the attacker's gradient value can continuously approximate the real
656
+
657
+ 14
658
+ gradient value. When the target loss function is close to zero, the virtual data image will
659
+ also be infinitely close to the original data image.
660
+
661
+ Fig. 6. DLG algorithm
662
+ In Figure 6, the variables to be updated are marked in bold blue. While the local
663
+ training model is trained using its differential privacy module and calculates the corre-
664
+ sponding 𝛻𝑊, the attacker uses its own randomly generated input images with label
665
+ values to derive the gradient 𝛻𝑊′and calculates the difference between the two gradi-
666
+ ents, which the attacker uses as a basis to adjust the parameters and computationally
667
+ update its virtual input X and label Y so that the gradient loss function converges to a
668
+ minimum. When the optimization is complete, the attacker can restore the original data
669
+ information from the local model.
670
+ The flow of the algorithm is shown next in mathematical form.
671
+ 𝐱′∗, 𝐲′∗ = arg 𝑚𝑖𝑛
672
+ 𝐱′,𝐲′  ∥∇𝑊′ − ∇𝑊∥2 = arg 𝑚𝑖𝑛
673
+ 𝐱′,𝐲′  ∥∥∥∂ℓ(𝐹(𝐱′,𝑊),𝐲′)
674
+ ∂𝑊
675
+ − ∇𝑊∥∥∥
676
+ 2
677
+ (3-3)
678
+ This equation to show how the virtual input 𝐱′∗ and the label value 𝐲′∗如 are ob-
679
+ tained from the gradient reduction.
680
+ Let the input be 𝐹(): the microscopic machine learning model; W: the parame-
681
+ ter weights; 𝛻𝑊: the gradient computed from the training data; 𝜂: the learning rate used
682
+ for DLG optimization. The outputs are the original private training data 𝑥 and the labels
683
+ 𝑦.
684
+ ① DLG algorithm(𝐹,𝑊,𝛻𝑊)
685
+ ② 𝐱′
686
+ 1 ← 𝒩(0,1), 𝐲1
687
+ ′ ← 𝒩(0,1) Initialize virtual inputs and labels.
688
+ ③ for 𝑖 ⟵ 1 to 𝑛 do
689
+ ④ 𝐋𝑖
690
+ ′ = softmax (𝐲𝑖
691
+ ′)
692
+ ⑤ ∇𝑊𝑖
693
+ ′ ← ∂ℓ(𝐹(𝐱𝑖
694
+ ′, 𝑊), 𝐋𝑖
695
+ ′)/ ∂𝑊𝑡 Calculate the virtual gradient.
696
+ ⑥ 𝔻𝑖 ← ∥∥∇𝑊𝑖
697
+ ′ − ∇𝑊∥∥2
698
+ ⑦ 𝐱𝑖+1
699
+
700
+ ⟵ 𝐱𝑖
701
+ ′ − 𝜂∇𝐱𝑖
702
+ ′𝔻𝑖
703
+ 。。。 Update the input data according to
704
+ the gradient.
705
+ ⑧ 𝐲𝑖+1
706
+
707
+ ⟵ 𝐲𝑖
708
+ ′ − 𝜂∇𝐲𝑖
709
+ ′𝔻𝑖
710
+ 。 Update the labels according to the
711
+ gradient.
712
+
713
+ 差分隐私模块
714
+ F(x,W)
715
+ Pred
716
+ LOSS
717
+ [0,1,0]
718
+ VW
719
+ Try to match
720
+ VW'
721
+ 差分隐私模块
722
+ Pred'
723
+ Loss'
724
+ [0.2,0.7,0.1]
725
+ F(x,W)
726
+ aD /ax
727
+ aDa
728
+ D=IVW.VWI215
729
+ It is important to note that the distance of the gradient, i.e., the loss function
730
+ ∥∥∇𝑊𝑖
731
+ ′ − ∇𝑊∥∥2must be derivable, so that the virtual input data 𝑥 and label 𝑦 can be op-
732
+ timized using a standard gradient-based approach. it follows that such optimization re-
733
+ quires a second-order derivable function. Here it is assumed that F is a second-order
734
+ derivable function and this algorithm is applicable to most modern AI models, most
735
+ neural networks and related tasks.
736
+ 3.3
737
+ Optimization of DLG algorithm
738
+ The DLG algorithm can restore the complete original data image in most of the scenes,
739
+ but in this topic, we found that there is a problem that some of the images cannot be
740
+ restored completely in practice, and we propose an improvement method based on this
741
+ problem.
742
+ Since the original gradient information is generated based on the pixel information
743
+ of the input image and the label through constant matching, then the richer and more
744
+ vivid the image color is, the more information the RGB three channels carry, the more
745
+ pixel information they contain, the more complex the generated gradient is, and the
746
+ more information can be obtained through the attack, and it is easier to restore the orig-
747
+ inal image. Observe the part of the image that cannot be fully converged, there are
748
+ mostly large blank areas, which contain relatively less pixel information, so the com-
749
+ plete image cannot be restored.
750
+ The uneven distribution of image pixel information and the small amount of infor-
751
+ mation in local areas lead to difficulties in image restoration. Thus, the improved algo-
752
+ rithm adds the calculation of the average value of the amount of information contained
753
+ in the image, based on which the hue of the whole image is inferred, and then the vari-
754
+ ance of each pixel point from the average value is calculated and returned to calculate
755
+ the gradient and adjust the parameters. When most of the light-colored areas exist in
756
+ the image, the average value of the image is relatively small, and after other color-rich
757
+ areas are restored, after iteration, that is, it is possible to calculate the remaining areas
758
+ based on the average value of the pixel information as light-colored, and to reduce the
759
+ frequency of random pixel points and dark pixel points to some extent.
760
+ 3.4
761
+ Summary of this chapter
762
+ Starting from the simplest fully connected layer, this chapter analyzes the principle
763
+ of reconstructing the input data from the gradient, but this method also has its limita-
764
+ tions and is not applicable on CNN networks. Then, an optimization algorithm based
765
+ on this method is introduced, which not only breaks through the original limitations,
766
+ but also is better in restoring the original data, and can completely restore the original
767
+ image and labels based on the gradient. Finally, based on the shortcomings of the DLG
768
+ algorithm, an improvement method is proposed.
769
+
770
+ 16
771
+ 4
772
+ Performance evaluation of the reconstruction attack algorithm based on
773
+ gradient features
774
+ This chapter shows the implementation of the gradient feature-based reconstruction
775
+ attack algorithm and the performance evaluation of it and the improved algorithm.
776
+ 4.1
777
+ System Environment
778
+ The implementation of the attack in this paper is based on the algorithm written in
779
+ python language, using the self-contained libraries in PyCharm to support the writing
780
+ of the program, and the libraries, versions, and configurations used are described in
781
+ Table 1 below.
782
+ Table 1. Software Configuration Description
783
+ Database
784
+ Versions
785
+ Description
786
+ opencv-python
787
+ 4.5.5.62
788
+ Converts images into pixel
789
+ information.
790
+ Pillow
791
+ 8.4.0
792
+ Image processing.
793
+ scikit-learn
794
+ 1.0.2
795
+ Contains algorithms such
796
+ as classification, regression,
797
+ clustering
798
+ scipy
799
+ 1.7.3
800
+ Differentiation, optimiza-
801
+ tion, image processing
802
+ tensorboard
803
+ 2.8.0
804
+ View training
805
+ torch
806
+ 1.10.1
807
+ Convert data units
808
+ torchvision
809
+ 0.11.2。
810
+ Process image data
811
+ The subject is trained on CPU, but the CPU is slow in training images, if conditions
812
+ allow, it is recommended to use GPU for model training to improve the training effi-
813
+ ciency.
814
+ This section will compare the DLG algorithm and its improved algorithms, using the
815
+ two metrics of intuitive image presentation and image restoration as a measure. image
816
+ restoration This paper uses the mean square error between the restored image and the
817
+ original image data.
818
+ 4.2
819
+ Implementation of reconstruction attacks based on gradient features
820
+ Dogs and cats classification dataset
821
+ The training set of this model uses the cat and dog dataset disclosed by Kaggle in
822
+ 2013, which consists of 25,000 examples, including 12,500 examples of cats and 12,500
823
+ examples of dogs. Therefore, in this paper, 20,000 images are selected as the training
824
+ dataset and 2,500 as the test dataset. The data consists of RGB three-channel images of
825
+ various sizes, in which the types of cats and dogs vary in form and the environment
826
+ they are in, and the label values of cats and dogs are set to 0 and 1, respectively.
827
+ Implementation of DLG algorithm
828
+
829
+ 17
830
+ The attack process is shown in the figure below. All DLG attacks start with a ran-
831
+ domly generated pixel point (the first image) and try to infinitely approximate the gen-
832
+ erated virtual gradient to the real gradient value. As shown in Table 4-2, the decrease
833
+ of the mean square error between the virtual image data and the original image data
834
+ indicates the degree of image convergence, reflecting that the virtual data image grad-
835
+ ually approaches the original data image.
836
+
837
+ Fig. 7. Restore to get the cat picture
838
+
839
+ Fig. 8. Restore to get the dog picture
840
+ Table 2 Mean square error of the leaked image and the original image
841
+ Number of iterations
842
+ Image
843
+ Mean square error
844
+ 20
845
+
846
+ 105.68
847
+
848
+ iter=0
849
+ iter=10
850
+ iter=20
851
+ iter=30
852
+ iter=40
853
+ iter=50
854
+ iter=60
855
+ iter=70
856
+ iter=80
857
+ iter=90
858
+ iter=100
859
+ iter=110
860
+ iter=120
861
+ iter=130
862
+ iter=140
863
+ iter=150
864
+ iter=160
865
+ iter=170
866
+ iter=180
867
+ iter=190
868
+ iter=200
869
+ iter=210
870
+ iter=220
871
+ iter=230
872
+ iter=240
873
+ iter=250
874
+ iter=260
875
+ iter=270
876
+ iter=280
877
+ iter=290iter=0
878
+ iter=10
879
+ iter=20
880
+ iter=30
881
+ iter=40
882
+ iter=50
883
+ iter=60
884
+ iter=70
885
+ iter=80
886
+ iter=90
887
+ iter=100
888
+ iter=110
889
+ iter=120
890
+ iter=130
891
+ iter=140
892
+ iter=150
893
+ iter=160
894
+ iter=170
895
+ iter=180
896
+ iter=190
897
+ iter=200
898
+ iter=210
899
+ iter=220
900
+ iter=230
901
+ iter=240
902
+ iter=250
903
+ iter=260
904
+ iter=270
905
+ iter=280
906
+ iter=29018
907
+ 40
908
+
909
+ 99.63
910
+ 50
911
+
912
+ 89.63
913
+ 80
914
+
915
+ 54.25
916
+ 200
917
+
918
+ 3.22
919
+ Improved implementation of the algorithm
920
+ Table 3 Comparison of DLG algorithm and improved algorithm
921
+ Original image
922
+ DLG algorithm
923
+ DLG
924
+ Mean Square
925
+ Error
926
+ Improved al-
927
+ gorithms
928
+ Improved algo-
929
+ rithms Mean
930
+ Square Error
931
+
932
+
933
+ 24.06
934
+
935
+ 19.54
936
+
937
+
938
+ 47.55
939
+
940
+ 42.45
941
+
942
+
943
+ 40.11
944
+
945
+ 25.36
946
+
947
+
948
+ 28.81
949
+
950
+ 24.34
951
+
952
+
953
+ 30.30
954
+
955
+ 22.41
956
+
957
+
958
+ 28.35
959
+
960
+ 15.28
961
+ From the above table, it can be seen that the number of pixel points present in the
962
+ images is positively correlated with the mean square error between the images during
963
+ the restoration of the dog and cat images. It can be visually seen from the image
964
+
965
+ 19
966
+ rendering effect that the improved algorithm has relatively fewer random pixel points
967
+ present and the mean squared error between the images and the original image is
968
+ smaller.
969
+ 4.3
970
+ Experimental results and analysis
971
+ The DLG attack algorithm used in this paper can attack and restore the vast majority
972
+ of the original cat and dog pictures based on the gradient, as shown in Figure 7 and
973
+ Figure 8. Meanwhile, as shown in Table 2, the mean square error between the original
974
+ data and the original data also tends to the minimum value, which basically stays around
975
+ 3. However, in the training of a large number of images, it was found that there existed
976
+ a part of images with poor convergence, which still left randomly generated pixel
977
+ points. Such images usually have some areas with lighter color nearly white, and after
978
+ improving the algorithm, as shown in Table 3, it can be observed that the improved
979
+ algorithm has better restoration of the lighter color areas and the mean square error
980
+ between the original pixel images is smaller. It illustrates that the reconstruction attack
981
+ based on gradient features is basically able to restore the local data images in the federal
982
+ learning system.
983
+ 4.4
984
+ Summary of this chapter
985
+ This chapter is the implementation and improvement of the gradient feature-based
986
+ reconstruction attack. The first subsection introduces the programming language used
987
+ to implement the algorithm, the programming environment, and all the libraries used;
988
+ the second subsection describes the dataset used and shows the results of the imple-
989
+ mentation of the attack algorithm in detail; the third subsection analyzes the results and
990
+ demonstrates that the gradient feature-based reconstruction attack can be a threat to the
991
+ local data of the federal learning system[34-55].
992
+ 5
993
+ Conclusion and Outlook
994
+ 5.1
995
+ Conclusion
996
+ In this paper, we study the reconstruction attack based on gradient features, mainly
997
+ using deep learning techniques and algorithms[56-62] for reconstruction attacks. This
998
+ paper investigates the mechanism of federation learning, the structural hierarchy of con-
999
+ volutional neural networks (CNNs), and the deep gradient leakage (DLG) algorithm
1000
+ that does not rely on the original dataset for the attack.
1001
+ In this paper, the cat and dog classification dataset is selected as the training model
1002
+ for federation learning, and LeNet, one of the models in CNN, is used for data training.
1003
+ The python language and various libraries in PyCharm are used to complete the recon-
1004
+ struction attack based on gradient features, and the original attack algorithm is im-
1005
+ proved to make the effect of the restored original image better, which proves that the
1006
+ federation learning gradient has the risk of information leakage.
1007
+
1008
+ 20
1009
+ 5.2
1010
+ Deficiencies and problems
1011
+ In this paper, the gradient-based attack is implemented for the gradient in the federal
1012
+ learning system using relevant techniques, but some problems are found in the imple-
1013
+ mentation and testing sessions of the attack, which need continuous improvement and
1014
+ optimization.
1015
+ (1) When trying to restore high-resolution images, the attack algorithm is not stable
1016
+ enough, the convergence speed is too slow, and the restoration effect is not good.
1017
+ (2) When the attack algorithm is applied to images containing only two colors (such
1018
+ as black and white) with large differences, it may fail to converge or converge poorly,
1019
+ and the images have a large number of random pixel points.
1020
+ (3) The attack algorithm can only do one gradient input to restore an original image
1021
+ for the time being, and cannot input multiple gradients to restore multiple images at the
1022
+ same time.
1023
+ (4) The current algorithm still has problems such as the applicability is not wide
1024
+ enough, and it cannot attack the training model of text class and so on.
1025
+ 5.3
1026
+ Outlook for follow-up work
1027
+ Federation learning system will be more widely used in future artificial intelligence
1028
+ technology, although it is not yet seen in some industries, but because of its high effi-
1029
+ ciency, it must be used more in the future to bring more convenient and fast life to
1030
+ human beings. The research in this paper raises certain questions about the confidenti-
1031
+ ality of federal learning, and this attack algorithm can be further studied and optimized
1032
+ in depth subsequently.
1033
+ (1) The DLG algorithm can restore most of the images at present, but there are still
1034
+ some problems, and the follow-up work hopes to continue to improve this algorithm,
1035
+ and improve the convergence speed and accuracy of the restoration of the algorithm.
1036
+ (2) Different training set categories and training set sizes may affect the training ef-
1037
+ fect and attack effect of the CNN network, which can be supplemented with different
1038
+ categories of images to strengthen the attack algorithm.
1039
+ (3) This attack algorithm temporarily cannot attack multiple images in batch, and the
1040
+ attack speed is slow, which can be further improved to enhance the efficiency.
1041
+ Reference
1042
+ [1]
1043
+ McMahan, H.B., Moore, E., Ramage, D., Hampson, S., et al. “Communication efficient learning of deep net-
1044
+ works from decentralized data”, Proceedings of the 20th International Conference on Artificial Intelligence
1045
+ and Statistics, 2017, PMLR 54:1273-1282.
1046
+ [2]
1047
+ Jochems, A., et al.: Developing and validating a survival prediction model for NSCLC patients through dis-
1048
+ tributed learning across 3 countries. Int. J. Radiat. Oncol. Biol. Phys. 99(2), 344–352 (2017)
1049
+ [3]
1050
+ Yang, Q., Liu, Y., Chen, T., Tong, Y.: Federated machine learning: concept and applications. ACM Trans. Intell.
1051
+ Syst. Technol. 2019, (TIST) 10(2), 1–19
1052
+ [4]
1053
+ Krizhevsky, A.: Learning multiple layers of features from tiny images. Citeseer, Technical report ,2009.
1054
+ [5]
1055
+ Yang Q, Liu Y, Chen T J, et al. Federated Machine Learning[J]. ACM Transactions on Intelligent Systems and
1056
+ Technology, 2019, 10(2): 1-19.
1057
+
1058
+ 21
1059
+ [6]
1060
+ Z Xiao, D Xiao, V Havyarimana, H Jiang, D Liu, D Wang, F Zeng. Toward accurate vehicle state estimation
1061
+ under non-Gaussian noises[J]. IEEE Internet of Things Journal, 2019, 6(6): 10652-10664.
1062
+ [7]
1063
+ P Zhang, X Chen, X Ma, Y Wu, H Jiang, D Fang, Z Tang, Y Ma. SmartMTra: Robust indoor trajectory tracing
1064
+ using smartphones[J]. IEEE Sensors Journal, 2017, 17(12): 3613-3624.
1065
+ [8]
1066
+ G. Liu, C. Wang, K. Peng, H. Huang, Y. Li and W. Cheng, "SocInf: Membership Inference Attacks on Social
1067
+ Media Health Data With Machine Learning," in IEEE Transactions on Computational Social Systems, Oct.
1068
+ 2019, vol. 6, no. 5, pp. 907-921.
1069
+ [9]
1070
+ Pan X, Zhang M, Yan Y, Zhu J, Yang M. Exploring the Security Boundary of Data Reconstruction via Neuron
1071
+ Exclusivity Analysis[J]. arXiv:2010.13356 [cs, stat], 2021.
1072
+ [10] Zhao Q, Zhao C, Cui S, Jing S, Chen Z. PrivateDL: Privacy-preserving collaborative deep learning against
1073
+ leakage from gradient sharing[J]. International Journal of Intelligent Systems, 2020, 35(8): 1262–1279.
1074
+ [11] Z. Wang, M. Song, Z. Zhang, Y. Song, Q. Wang and H. Qi, “Beyond Inferring Class Representatives:
1075
+ User-Level Privacy Leak from Federated Learning”, IEEE INFOCOM 2019 - IEEE Conference on Computer
1076
+ Communications,2019, pp. 2512-2520.
1077
+ [12] Jie Li, Fanzi Zeng, Zhu Xiao, Hongbo Jiang, Zhirun Zheng, Wenping Liu, Ju Ren. Drive2friends: Inferring
1078
+ social relationships from individual vehicle mobility data[J]. IEEE Internet of Things Journal, 2020, 7(6):
1079
+ 5116-5127.
1080
+ [13] L. Melis, C. Song, E. De Cristofaro and V. Shmatikov, “Exploiting Unintended Feature Leakage in Collabora-
1081
+ tive Learning,” 2019 IEEE Symposium on Security and Privacy (SP), 2019, pp. 691-706.
1082
+ [14] M. Nasr, R. Shokri and A. Houmansadr, “Comprehensive Privacy Analysis of Deep Learning: Passive and
1083
+ Active White-box Inference Attacks against Centralized and Federated Learning,” 2019 IEEE Symposium on
1084
+ Security and Privacy (SP), 2019, pp. 739-753.
1085
+ [15] Fredrikson, M., Jha, S., Ristenpart, T., “Model inversion attacks that exploit confidence information and basic
1086
+ countermeasures”, Proceedings of the 22nd ACMSIGSAC Conference on Computer and Communications Se-
1087
+ curity, 2015, pp. 1322–1333.
1088
+ [16] B. Hitaj, G.Ateniese, Fernando, “Deep Models Under the GAN: Information Leakage from Collaborative Deep
1089
+ Learning”, Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Secu-
1090
+ rity,2017,pp. 603–618.
1091
+ [17] Salem A, Zhang Y, Humbert M, et al. “Model and Data Independent Membership Inference Attacks and De-
1092
+ fenses on Machine Learning Models”, 2019 Network and Distributed System Security Symposium, 2019, pp.
1093
+ 1-15.
1094
+ [18] Jiahui Geng, Yongli Mou, Feifei Li, Qing Li, Oya Beyan. Towards General Deep Leakage in Federated Learn-
1095
+ ing[J/OL]. arXiv:2110.09074[cs], 2021[2022-01-04].
1096
+ [19] Zhao, B., Mopuri, K.R., Bilen, H.: iDLG: improved deep leakage from gradients. 2020, arXiv preprint
1097
+ arXiv:2001.02610
1098
+ [20] Geiping, J.; Bauermeister, H.; Dr¨oge, H.; and Moeller, M. “Inverting Gradients - How easy is it to break
1099
+ privacy in federated learning? ”, Advances in Neural Information Processing Systems 33,NeurIPS ,2020.
1100
+ [21] Hongxu Yin, Arun Mallya, Arash Vahdat, Jose M. Alvarez, Jan Kautz, Pavlo Molchanov. “See Through Gra-
1101
+ dients: Image Batch Recovery via GradInversion”, Proceedings of the IEEE/CVF Conference on Computer
1102
+ Vision and Pattern Recognition (CVPR), 2021, pp. 16337-16346
1103
+ [22] T Liu, JCS Lui, X Ma, H Jiang. Enabling relay-assisted D2D communication for cellular networks: Algorithm
1104
+ and protocols[J]. IEEE Internet of Things Journal, 2018, 5(4): 3136-3150.
1105
+ [23] D Wang, J Fan, Z Xiao, H Jiang, H Chen, F Zeng, K Li. Stop-and-wait: Discover aggregation effect based on
1106
+ private car trajectory data[J]. IEEE transactions on intelligent transportation systems, 2018, 20(10): 3623-3633.
1107
+ [24] H Jiang, W Liu, D Wang, C Tian, X Bai, X Liu, Y Wu, W Liu. CASE: Connectivity-based skeleton extraction
1108
+
1109
+ 22
1110
+ in wireless sensor networks[C]//IEEE INFOCOM 2009. IEEE, 2009: 2916-2920.
1111
+ [25] Ji S, Xu W, Yang M, et al.3D Convolutional Neural Networks for Human Action Recognition[J]. IEEE Trans-
1112
+ actions on Pattern Analysis & Machine Intelligence,2013,35(1):221-231
1113
+ [26] Tran D, Bourdev L, Fergus R, et al. “Learning Spatiotemporal Features with 3D Convolutional Network”.
1114
+ Proceedings of the IEEE International Conference on Computer Vision (ICCV), 2015, pp. 4489-4497.
1115
+ [27] X Ma, H Wang, H Li, J Liu, H Jiang. Exploring sharing patterns for video recommendation on YouTube-like
1116
+ social media[J]. Multimedia Systems, 2014, 20(6): 675-691.
1117
+ [28] Shokri, R., Stronati, M., Song, C., Shmatikov, V.“Membership inference attacks against machine learning mod-
1118
+ els”,2017 IEEE Symposium on Security and Privacy (SP), 2017, pp. 3–18 IEEE
1119
+ [29] Yang, D., Zhang, D., Yu, Z., Yu, Z.: Fine-grained preference-aware location search leveraging crowdsourced
1120
+ digital footprints from LBSNs. In: Proceedings of the 2013 ACM International Joint Conference on Pervasive
1121
+ and Ubiquitous Computing, 2013, pp.479–488
1122
+ [30] Huang, G.B., Ramesh, M., Berg, T., Learned-Miller, E.: Labeled faces in the wild: a database for studying face
1123
+ recognition in unconstrained environments. University of Massachusetts, Amherst, Technical Report 07-49,
1124
+ October 2007
1125
+ [31] Goodfellow, I., et al.: Generative adversarial nets. In: Advances in Neural Information Processing Systems,
1126
+ 2014, pp. 2672–2680
1127
+ [32] Geiping, J., Bauermeister, H., Dr¨oge, H., Moeller, M.: Inverting gradients-how easy is it to break privacy in
1128
+ federated learning? 2020, arXiv preprint arXiv:2003.14053
1129
+ [33] Zhu, L., Liu, Z., Han, S. “Deep leakage from gradients”, Annual Conference on Neural Information Processing
1130
+ Systems, (NeurIPS) (2019)
1131
+ [34] Ping Zhao, Hongbo Jiang, John C. S. Lui, Chen Wang, Fanzi Zeng, Fu Xiao, and Zhetao Li. P3-LOC: A Pri-
1132
+ vacy-Preserving Paradigm-Driven Framework for Indoor Localization. IEEE/ACM Transactions on Network-
1133
+ ing (ToN), vol. 26, no. 6, pp. 2856-2869, 2018.
1134
+ [35] Hongbo Jiang, Yuanmeng Wang, Ping Zhao, Zhu Xiao. A Utility-Aware General Framework with Quantifiable
1135
+ Privacy Preservation for Destination Prediction in LBSs. IEEE/ACM Transactions on Networking (ToN), vol.
1136
+ 29, no. 5, pp. 2228-2241, 2021.
1137
+ [36] Ping Zhao, Jiaxin Sun, and Guanglin Zhang. DAML: Practical Secure Protocol for Data Aggregation based on
1138
+ Machine Learning. ACM Transactions on Sensor Networks, vol. 16, no. 4, pp. 1-18, 2020.
1139
+ [37] Ping Zhao, Wuwu Liu, Guanglin Zhang, Zongpeng Li, and Lin Wang. Preserving Privacy in WiFi Localization
1140
+ with Plausible Dummy Locations. IEEE Transactions on Vehicular Technology, vol. 69, no. 10, pp. 11909-
1141
+ 11925, 2020.
1142
+ [38] Guanglin Zhang, Anqi Zhang, Ping Zhao, and Jiaxin Sun. Lightweight Privacy-Preserving Scheme in WiFi
1143
+ Fingerprint-Based Indoor Localization. IEEE Systems Journal, vol. 14, no. 3, pp. 4638-4647, 2020.
1144
+ [39] Ping Zhao, Jie Li, Fanzi Zeng, Fu Xiao, Chen Wang, Hongbo Jiang. ILLIA: Enabling k-Anonymity-based
1145
+ Privacy Preserving against Location Injection Attacks in continuous LBS Query. IEEE Internet of Things Jour-
1146
+ nal, vol. 5, no. 2, pp. 1033–1042, 2018.
1147
+ [40] Ping Zhao, Hongbo Jiang, Jie Li, Fanzi Zeng, Xiao Zhu, Kun Xie, and Guanglin Zhang. Synthesizing Privacy
1148
+ Preserving Traces: Enhancing Plausibility with Social Networks. IEEE/ACM Transactions on Networking
1149
+ (ToN), vol. 27, no. 6, pp. 2391 – 2404, 2019.
1150
+ [41] Ping Zhao, Jiawei Tao, Guanglin Zhang. Deep Reinforcement Learning-based Joint Optimization of Delay and
1151
+ Privacy
1152
+ in
1153
+ Multiple-User
1154
+ MEC
1155
+ Systems.
1156
+ IEEE
1157
+ Transactions
1158
+ on
1159
+ Cloud
1160
+ Computing,
1161
+ DOI:
1162
+ 10.1109/TCC.2022.3140231, 2022.
1163
+ [42] Ping Zhao, Hongbo Jiang, Jie Li, Zhu Xiao, Daibo Liu, Ju Ren, Deke Guo. Garbage in, Garbage out: Poisoning
1164
+ Attacks Disguised with Plausible Mobility in Data Aggregation. IEEE Transactions on Network Science and
1165
+
1166
+ 23
1167
+ Engineering (TNSE), vol. 8, no. 3, pp. 2679-2693, 2021.
1168
+ [43] Ping Zhao, Xiaohui Zhao, Daiyu Huang, H. Huang. Privacy-Preserving Scheme against Location Data Poi-
1169
+ soning Attacks in Mobile-Edge Computing. IEEE Transactions on Computational Social Systems, vol. 7, no.
1170
+ 3, pp. 818-826, 2020.
1171
+ [44] Ping Zhao, Chen Wang, and Hongbo Jiang. On the Performance of k -Anonymity against Inference Attacks
1172
+ with Background Information. IEEE Internet of Things Journal, vol. 6, no. 1, pp. 808–819, 2018.
1173
+ [45] Guanglin Zhang, Sifan Ni, and Ping Zhao. Enhancing Privacy Preservation in Speech Data Publishing. IEEE
1174
+ Internet of Things Journal, vol. 7, no. 8, pp. 7357-7367, 2020.
1175
+ [46] Guanglin Zhang, Anqi Zhang, Ping Zhao. LocMIA: Membership Inference Attacks against Aggregated Loca-
1176
+ tion Data. IEEE Internet of Things Journal, vol. 7, no. 12, pp. 11778-11788, 2020.
1177
+ [47] Guanglin Zhang, Sifan Ni and Ping Zhao. Learning-based Joint Optimization of Energy-Delay and Privacy in
1178
+ Multiple-User Edge-Cloud Collaboration MEC Systems. IEEE Internet of Things Journal, doi:
1179
+ 10.1109/JIOT.2021.3088607, 2021.
1180
+ [48] P. Zhao, Z. Cao, J. Jiang and F. Gao, "Practical Private Aggregation in Federated Learning Against Inference
1181
+ Attack," in IEEE Internet of Things Journal, 2022, doi: 10.1109/JIOT.2022.3201231.
1182
+ [49] Hongbo Jiang, Yu Zhang, Zhu Xiao, Ping Zhao and Arun Iyengar. An Empirical Study of Travel Behavior
1183
+ Using Private Car Trajectory Data. IEEE Transactions on Network Science and Engineering, vol. 8, no. 1, pp.
1184
+ 53-64, 2021.
1185
+ [50] H Jiang, W Liu, D Wang, C Tian, X Bai, X Liu, Y Wu, W Liu. Connectivity-based skeleton extraction in
1186
+ wireless sensor networks[J]. IEEE Transactions on Parallel and Distributed Systems, 2009, 21(5): 710-721.
1187
+ [51] H Jiang, S Jin, C Wang. Parameter-based data aggregation for statistical information extraction in wireless
1188
+ sensor networks[J]. IEEE Transactions on Vehicular Technology, 2010, 59(8): 3992-4001.
1189
+ [52] Yennun Huang, Yih-Farn Chen, Rittwik Jana, Hongbo Jiang, Michael Rabinovich, Amy Reibman, Bin Wei,
1190
+ Zhen Xiao. Capacity analysis of MediaGrid: a P2P IPTV platform for fiber to the node (FTTN) networks[J].
1191
+ IEEE Journal on Selected Areas in Communications, 2007, 25(1): 131-139.
1192
+ [53] W Liu, D Wang, H Jiang, W Liu, C Wang. Approximate convex decomposition based localization in wireless
1193
+ sensor networks[C]//2012 Proceedings IEEE INFOCOM. IEEE, 2012: 1853-1861.
1194
+ [54] C Tian, H Jiang, X Liu, X Wang, W Liu, Y Wang. Tri-message: A lightweight time synchronization protocol
1195
+ for high latency and resource-constrained networks[C]//2009 IEEE International Conference on Communica-
1196
+ tions. IEEE, 2009: 1-5.
1197
+ [55] Y Huang, Z Xiao, D Wang, H Jiang, D Wu. Exploring individual travel patterns across private car trajectory
1198
+ data[J]. IEEE Transactions on Intelligent Transportation Systems, 2019, 21(12): 5036-5050.
1199
+ [56] K Chen, C Wang, Z Yin, H Jiang, G Tan. Slide: Towards fast and accurate mobile fingerprinting for Wi-Fi
1200
+ indoor positioning systems[J]. IEEE Sensors Journal, 2017, 18(3): 1213-1223.
1201
+ [57] H Huang, H Yin, G Min, H Jiang, J Zhang, Y Wu. Data-driven information plane in software-defined network-
1202
+ ing[J]. IEEE Communications Magazine, 2017, 55(6): 218-224.
1203
+ [58] S Wang, A Vasilakos, H Jiang, X Ma, W Liu, K Peng, B Liu, Y Dong. Energy efficient broadcasting using
1204
+ network coding aware protocol in wireless ad hoc network[C]//2011 IEEE International Conference on Com-
1205
+ munications (ICC). IEEE, 2011: 1-5.
1206
+ [59] H Jiang, Z Ge, S Jin, J Wang. Network prefix-level traffic profiling: Characterizing, modeling, and evalua-
1207
+ tion[J]. Computer Networks, 2010, 54(18): 3327-3340.
1208
+ [60] H Jiang, A Iyengar, E Nahum, W Segmuller, A Tantawi, CP Wright. Load balancing for SIP server clus-
1209
+ ters[C]//IEEE INFOCOM 2009. IEEE, 2009: 2286-2294.
1210
+ [61] H Jiang, P Zhao, C Wang. RobLoP: Towards robust privacy preserving against location dependent attacks in
1211
+ continuous LBS queries[J]. IEEE/ACM Transactions on Networking, 2018, 26(2): 1018-1032.
1212
+
1213
+ 24
1214
+ [62] H Jiang, J Cheng, D Wang, C Wang, G Tan. Continuous multi-dimensional top-k query processing in sensor
1215
+ networks[C]//2011 Proceedings IEEE INFOCOM. IEEE, 2011: 793-801.
1216
+
1217
+
5tE0T4oBgHgl3EQfvwEb/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
5tE4T4oBgHgl3EQf1g0M/content/tmp_files/2301.05290v1.pdf.txt ADDED
@@ -0,0 +1,1569 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ EUROPEAN ORGANIZATION FOR NUCLEAR RESEARCH (CERN)
2
+ CERN-EP-2022-280
3
+ 2023/01/16
4
+ CMS-HIN-21-006
5
+ K0
6
+ S and Λ (Λ) two-particle femtoscopic correlations in PbPb
7
+ collisions at √sNN = 5.02 TeV
8
+ The CMS Collaboration
9
+ Abstract
10
+ Two-particle correlations are presented for K0
11
+ S, Λ, and Λ strange hadrons as a func-
12
+ tion of relative momentum in lead-lead collisions at a nucleon-nucleon center-of-mass
13
+ energy of 5.02 TeV. The dataset corresponds to an integrated luminosity of 0.607 nb−1
14
+ and was collected using the CMS detector at the CERN LHC. These correlations are
15
+ sensitive to quantum statistics and to final-state interactions between the particles.
16
+ The source size extracted from the K0
17
+ SK0
18
+ S correlations is found to decrease from 4 to
19
+ 1 fm in going from central to peripheral collisions. Strong interaction scattering pa-
20
+ rameters (i.e., scattering length and effective range) are determined from the ΛK0
21
+ S and
22
+ ΛΛ (including their charge conjugates) correlations using the Lednick´y–Lyuboshitz
23
+ model and are compared to theoretical and other experimental results.
24
+ Submitted to Physics Letters B
25
+ © 2023 CERN for the benefit of the CMS Collaboration. CC-BY-4.0 license
26
+ arXiv:2301.05290v1 [nucl-ex] 12 Jan 2023
27
+
28
+
29
+ 1
30
+ 1
31
+ Introduction
32
+ Two-particle correlations in relative momentum, so-called femtoscopic correlations, arising
33
+ from relativistic heavy ion collisions provide a powerful tool for studying both the quark-gluon
34
+ plasma (QGP) that is created in the collisions, and the subsequent interactions of the emitted
35
+ particles [1]. All two-particle correlations are affected by final-state interaction (FSI) effects,
36
+ and correlations of identical particles are also sensitive to the constraints of quantum statistics
37
+ (QS). The correlations among the neutral K0
38
+ S, Λ, and Λ particles, collectively referred to as V0
39
+ particles, are of special interest. First, they can be used to determine the space-time extent of
40
+ the QGP. In addition, information can be extracted about the strong-interaction scattering pa-
41
+ rameters, i.e., the scattering length and the effective range, that is impossible to obtain from
42
+ currently achievable scattering experiments [2–6]. Because of their relatively heavy mass and
43
+ the absence of a Coulomb interaction, femtoscopy based on K0
44
+ S particles supplements the more
45
+ commonly studied pion and charged kaon pairs [7]. The results from ΛΛ correlation studies
46
+ can help constrain baryon-baryon and, more specifically, hyperon-hyperon interaction models
47
+ that are used, for example, in modeling the composition of neutron stars [8–10].
48
+ Regarding the scattering parameters, of particular interest is establishing whether the interac-
49
+ tion between two Λ particles allows for the existence of the H-dibaryon, a bound state with
50
+ quantum numbers I = 0, JP = 0+, S = −2. In 1977, R. L. Jaffe predicted the existence of such a
51
+ six-quark (uuddss) state having a mass about 81 MeV below the threshold of twice the Λ mass
52
+ by considering the strong attraction resulting from color magnetic interactions [11]. Although
53
+ a double hypernucleus,
54
+ 6
55
+ ΛΛHe, was subsequently observed in the NAGARA event from the
56
+ E313 hybrid emulsion experiment at KEK [12, 13], the observed ΛΛ binding energy was not
57
+ consistent with the conjectured H-dibaryon [14]. A study of ΛΛ correlations may provide ad-
58
+ ditional information on whether the baryon-baryon interaction can lead to the formation of the
59
+ conjectured H-dibaryon.
60
+ Recently, the ALICE Collaboration reported on ΛK correlations in lead-lead (PbPb) collisions
61
+ at a center-of-mass energy per nucleon pair of √sNN = 2.76 TeV [15]. According to their find-
62
+ ings, the strong force is repulsive in ΛK+ interactions, yet attractive in ΛK− interactions. For
63
+ the ΛK0
64
+ S pairs, the uncertainty of the ALICE results does not permit a definite conclusion
65
+ on whether the associated strong interaction is repulsive or attractive. A more precise mea-
66
+ surement of ΛK0
67
+ S correlations should improve our understanding of the strong interaction in
68
+ baryon-meson systems.
69
+ This Letter presents K0
70
+ SK0
71
+ S, ΛK0
72
+ S, and ΛΛ femtoscopic correlations as a function of relative
73
+ momentum in PbPb collisions at √sNN = 5.02 TeV, using data recorded by the CMS experi-
74
+ ment during the 2018 LHC run. The K0
75
+ SK0
76
+ S correlations are measured in six centrality intervals
77
+ within the 0–60% range, where centrality refers to the percentage of the total inelastic hadronic
78
+ nucleus-nucleus cross section [16], and 0% corresponds to the maximum overlap of the col-
79
+ liding nuclei. The K0
80
+ SK0
81
+ S, ΛK0
82
+ S, and ΛΛ correlations are measured in an integrated centrality
83
+ range (0–80%), with the ΛΛ femtoscopic correlation measured in PbPb collisions at the LHC
84
+ for the first time. The source size and strong interaction parameters are determined using the
85
+ Lednick´y–Lyuboshitz (LL) model [17]. Unless otherwise indicated, all measurements include
86
+ the charge conjugate states, so ΛK0
87
+ S and ΛΛ include ΛK0
88
+ S and ΛΛ, respectively. Tabulated
89
+ results are provided in the HEPData record for this analysis [18].
90
+
91
+ 2
92
+ 2
93
+ Experimental setup and data sample
94
+ The central feature of the CMS apparatus is a superconducting solenoid of 6 m internal diam-
95
+ eter, providing a magnetic field of 3.8 T. Within the solenoid volume there is a silicon pixel
96
+ and strip tracker, a lead tungstate crystal electromagnetic calorimeter, and a brass and scintil-
97
+ lator hadron calorimeter, each composed of a barrel and two endcap sections. The silicon pixel
98
+ detector [19] is composed of 1856 silicon pixel modules distributed in four 54 cm long bar-
99
+ rel layers at radii of 2.9–16.0 cm plus three pairs of endcap disks covering radii of 4.5–16.1 cm
100
+ at longitudinal distances of 31–51 cm from the origin. The 15 148 silicon strip module are ar-
101
+ ranged in 10 barrel layers at radii of 20–116 cm plus 3 pairs of small and 9 pairs of large endcap
102
+ disk layers. Charged particles of pseudorapidity |η| < 3 are reconstructed with the combined
103
+ system. For particles with transverse momentum of 1 < pT < 10 GeV, the track resolutions
104
+ are typically 1.5% in pT and 20–75 µm in the transverse impact parameter [20]. The barrel and
105
+ endcap detectors are extended to the forward region with two calorimeters which use steel as
106
+ the absorber and quartz fibers as the sensitive material. These hadron forward (HF) calorime-
107
+ ters are located 11.2 m from the interaction region, one on each side, and provide coverage in
108
+ the range 3.0 < |η| < 5.2. These detectors are segmented into multiple 0.175×0.175 (∆η×∆φ)
109
+ “towers”, where φ is azimuthal angle in radians. Muons are measured in gas-ionization detec-
110
+ tors embedded in the steel flux-return yoke outside the solenoid. Events of interest are selected
111
+ using a two-tiered trigger system. The first level, composed of custom hardware processors,
112
+ uses information from the calorimeters and muon detectors to select events at a rate of around
113
+ 100 kHz within a fixed latency of about 4 µs [21]. The second level, known as the high-level
114
+ trigger, consists of a farm of processors running a version of the full event reconstruction soft-
115
+ ware optimized for fast processing, and reduces the event rate to around 1 kHz before data
116
+ storage [22]. A more detailed description of the CMS detector, together with a definition of the
117
+ coordinate system used and the relevant kinematic variables, can be found in Ref. [23].
118
+ With an integrated luminosity of 0.607 nb−1 [24, 25], this analysis uses 4.27 × 109 minimum bias
119
+ events that are triggered by requiring signals above the readout threshold of 3 GeV in each of
120
+ the HF calorimeters [22]. Background events due to beam-gas interactions and non-hadronic
121
+ collisions are filtered offline by applying the procedure described in Ref. [26]. The events used
122
+ in this analysis are required to have at least one primary interaction vertex determined using
123
+ two or more tracks [27] within a distance of 15 cm from the center of the nominal interaction
124
+ point along the beam axis and to have at least two calorimeter towers in each HF detector with
125
+ energy deposits of more than 4 GeV per tower. The shapes of the clusters in the pixel detector
126
+ are required to be compatible with those expected in PbPb collisions in order to suppress the
127
+ contamination from events with multiple collisions [28]. The combined trigger and offline
128
+ selection efficiency for inelastic events is greater than 95%. The event centrality is obtained from
129
+ the transverse energy deposited in both HF calorimeters, using the methodology described in
130
+ Ref. [29]. The analysis makes use of a minimum bias Monte Carlo PbPb sample, based on the
131
+ HYDJET 1.9 [30] event generator with a full detector simulation using GEANT4 [31].
132
+ 3
133
+ Reconstruction of K0
134
+ S and Λ candidates
135
+ The K0
136
+ S and Λ candidates, denoted as V0 candidates, used in this study are reconstructed as in
137
+ previous CMS analyses [32–34]. The V0 candidates are found by combining oppositely charged
138
+ tracks that pass criteria based on the “loose” selection discussed in Ref. [27]. The charged tracks
139
+ are assumed to be π+π− in K0
140
+ S reconstruction and π−p in Λ reconstruction. For the latter, the
141
+ higher momentum track is assumed to be a proton since the proton carries nearly all of the mo-
142
+ mentum in the Λ decay. Each of the oppositely charged tracks must have hits in at least three
143
+
144
+ 3
145
+ layers of the silicon tracker, and both tracks must have transverse and longitudinal impact pa-
146
+ rameter significances (defined as the parameter value divided by its uncertainty) with respect
147
+ to the primary vertex greater than 1. The two tracks are fitted to a common vertex and the χ2
148
+ per degree of freedom (dof) from the fit must be less than 7. The distance of closest approach
149
+ between the two tracks is required to be less than 1 cm. As a consequence of the long lifetime of
150
+ K0
151
+ S and Λ particles, the significance of the V0 decay length, which is the three-dimensional dis-
152
+ tance between the primary and V0 vertices divided by its uncertainty, is required to be greater
153
+ than 2.5 to reduce combinatorial background contributions. To remove K0
154
+ S candidates misiden-
155
+ tified as Λ particles and vice versa, the Λ (K0
156
+ S) candidates must have a corresponding ππ (pπ)
157
+ mass more than 14 (7) MeV (corresponding to approximately 3 times the average resolution)
158
+ away from the world-average value [35] of the K0
159
+ S (Λ) mass. The angle θ between the V0 mo-
160
+ mentum vector and the vector connecting the primary and V0 vertices is required to satisfy
161
+ cos θ > 0.999. This reduces the contribution from nuclear interactions, random combinations
162
+ of tracks, and Λ particles originating from weak decays of Ξ and Ω particles.
163
+ Further selection of V0 candidates is performed with a boosted decision tree (BDT) [36]. The se-
164
+ lection is optimized separately for K0
165
+ S and Λ candidates. The discriminating variables include:
166
+ the collision centrality, the V0 candidate pT and rapidity (y), the distance of closest approach
167
+ of the track pair, the three-dimensional decay length and significance, cos θ, and the V0 ver-
168
+ tex fit χ2. The included variables related to the V0 daughters are pT, uncertainty in pT, η, the
169
+ number of hits in the silicon tracker, the number of pixel detector layers with hits, and the
170
+ transverse and longitudinal impact parameter significances with respect to the primary ver-
171
+ tex. The BDT training is performed using the simulated minimum bias sample separated into
172
+ the signal and background subsamples using the generator-level information. The K0
173
+ S mesons
174
+ are selected with 1 < pT < 8.5 GeV and |y| < 1, while the Λ baryons are required to have
175
+ 1.8 < pT < 8.5 GeV and |y| < 1. The minimum pT and maximum y requirements are used to
176
+ reduce background while the maximum pT requirement is to reduce contributions from jets.
177
+ The combined V0 reconstruction and selection efficiencies are strongly dependent on the cen-
178
+ trality of the event and the pT of the V0. Integrating over the selected pT ranges, the combined
179
+ efficiencies from the most central to peripheral PbPb collisions are 1–3% for K0
180
+ S and 1–2% for
181
+ Λ. The V0 reconstruction algorithm does not prevent a track from being used for more than
182
+ one V0. While this is normally an infrequent occurrence, selecting pairs of V0 particles close
183
+ together in phase space makes it a significant contribution. To resolve this problem, for each
184
+ correlation measurement, a check of each pair of V0 candidates is performed and if two V0 can-
185
+ didates are found to share one or both daughter tracks, one of the V0 candidates is randomly
186
+ selected to be removed from the event.
187
+ Fits to the invariant mass spectrum are performed using a sum of three Gaussian functions
188
+ with a common mean to describe the signal distribution and a fourth-order polynomial to de-
189
+ scribe the background. These empirical functions were chosen to provide a good description of
190
+ the data. Peak and sideband invariant mass regions are defined to select events dominated by
191
+ signal and background, respectively. Defining σ as the average resolution based on the Gaus-
192
+ sian sum, the peak regions are selected to be within ±2σ from the nominal V0 mass and are
193
+ given by 486 < M(π+π−) < 509 MeV and 1111.5 < M(pπ−) < 1120.4 MeV for K0
194
+ S and Λ
195
+ candidates, respectively. The sideband regions are selected to be more than 4σ from the nom-
196
+ inal V0 mass and are given by 23.5 < |M(π+π−) − 497.5| < 62.5 MeV for K0
197
+ S candidates and
198
+ 1080 < M(pπ−) < 1107.5 MeV together with 1124.2 < M(pπ−) < 1160 MeV for Λ candidates.
199
+ Examples of invariant mass distributions for π+π− and pπ− pairs, and their corresponding
200
+ fits in the 0–80% centrality range, are shown in Fig. 1.
201
+
202
+ 4
203
+ 0.45
204
+ 0.5
205
+ 0.55
206
+ invariant mass (GeV)
207
+
208
+ π
209
+ +
210
+ π
211
+ 6
212
+ 10
213
+ 7
214
+ 10
215
+ 8
216
+ 10
217
+ Candidates / (0.5 MeV)
218
+ Data
219
+ Fit
220
+ Background
221
+ Peak region
222
+ Sideband region
223
+ )
224
+ -1
225
+ = 5.02 TeV (0.607 nb
226
+ NN
227
+ s
228
+ PbPb,
229
+ CMS
230
+ S
231
+ 0
232
+ K
233
+ Centrality: 0-80%
234
+ < 8.5 GeV
235
+ T
236
+ 1 < p
237
+ |y| < 1
238
+ 1.08
239
+ 1.1
240
+ 1.12
241
+ 1.14
242
+ 1.16
243
+ invariant mass (GeV)
244
+ +
245
+ π
246
+ p
247
+ +
248
+
249
+ π
250
+ p
251
+ 5
252
+ 10
253
+ 6
254
+ 10
255
+ Candidates / (0.5 MeV)
256
+ Data
257
+ Fit
258
+ Background
259
+ Peak region
260
+ Sideband region
261
+ )
262
+ -1
263
+ = 5.02 TeV (0.607 nb
264
+ NN
265
+ s
266
+ PbPb,
267
+ CMS
268
+ Λ
269
+ +
270
+ Λ
271
+ Centrality: 0-80%
272
+ < 8.5 GeV
273
+ T
274
+ 1.8 < p
275
+ |y| < 1
276
+ Figure 1: The invariant mass of K0
277
+ S (left) and Λ (right), and their corresponding fits in the 0–80%
278
+ centrality range. The circles are the data, and the fit is shown with a solid (red) line for the total
279
+ fit, and a dashed (green) line for the background fit. The vertical dashed-dotted (pink) lines
280
+ indicate the peak region and the vertical dashed (blue) lines indicate the sideband regions.
281
+ 4
282
+ Analysis method
283
+ The two-particle correlation is constructed as
284
+ Cobs(qinv) = N Aobs(qinv)
285
+ Bobs(qinv) ,
286
+ (1)
287
+ where Cobs(qinv) is the observed normalized pair yield, corrected for detector effects, as a func-
288
+ tion of the invariant relative momentum qinv, defined as [1]
289
+ qinv =
290
+
291
+ −QµQµ,
292
+ Qµ = (k1 − k2)µ − (k1 − k2)µPµ
293
+ PµPµ
294
+ Pµ,
295
+ (2)
296
+ where P = k1 + k2, and k1 and k2 are the four momenta of the V0 particles. Note that for two
297
+ particles of the same mass, the second term of Qµ is zero.
298
+ The distribution Aobs(qinv) is the signal distribution that contains femtoscopic correlations
299
+ formed by pairing the selected V0 particles from a given event. The reference distribution
300
+ Bobs(qinv) is used to correct for phase space effects, largely removing artifacts due to detector
301
+ non-uniformities in the Aobs(qinv) distribution. The Bobs(qinv) distribution is constructed by
302
+ mixing the V0 particles from different events [37]. In this procedure, the V0 particle from one
303
+ event is paired with V0 particles from 30 different events. To ensure that the 30 events used
304
+ in the mixing are similar to the signal events, the centrality and primary vertex of each mixed
305
+ event must be within 5% and 2 cm, respectively, of those in the corresponding signal event.
306
+ The normalization factor N is the ratio of the number of pairs in the reference distribution
307
+ to that in the signal distribution. Because of the background in the peak region of the invari-
308
+ ant mass distributions, the measured signal distribution (Aobs(qinv)) contains contributions
309
+ from signal-signal (Ass(qinv)), signal-background (Asb(qinv)), and background-background
310
+ (Abb(qinv)) correlations. The measured Aobs(qinv) distribution can be written as
311
+ Aobs(qinv) = f ssAss(qinv) + f sbAsb(qinv) + f bbAbb(qinv).
312
+ (3)
313
+
314
+ 5
315
+ The distributions Asb(qinv) and Abb(qinv) are obtained from the peak-sideband and sideband-
316
+ sideband combinations, respectively. The small amount of background (signal) contamination
317
+ in the signal (sideband) region has a negligible effect on the shape of Asb(qinv) (Abb(qinv)). All
318
+ distributions, Aobs(qinv), Asb(qinv), and Abb(qinv) are normalized to unity. The parameters, f ss,
319
+ f sb, and f bb are the signal-signal, signal-background, and background-background fractions,
320
+ extracted using an invariant mass fit based on combinatorial analyses with
321
+ f ss =
322
+ (s
323
+ 2)
324
+ (s+b
325
+ 2 )
326
+ ,
327
+ f bb =
328
+ (b
329
+ 2)
330
+ (s+b
331
+ 2 )
332
+ , and
333
+ f sb = 1 − f ss − f bb,
334
+ (4)
335
+ where (n
336
+ 2) = n(n−1)
337
+ 2
338
+ is the binomial coefficient, which returns the number of ways that a pair can
339
+ be chosen from n objects. The quantities s and b in the binomial coefficients are the number of
340
+ signal and background particles, respectively, obtained by integrating the appropriate function
341
+ from the fit to the invariant mass distribution.
342
+ Once we have all the distributions (Aobs(qinv), Asb(qinv), and Abb(qinv)) and the parameters
343
+ ( f ss, f sb, and f bb), the Ass(qinv) distribution can be extracted using Eq. (3), with
344
+ Ass(qinv) =
345
+
346
+ Aobs(qinv) − f sb(Asb(qinv)) − f bb(Abb(qinv))
347
+
348
+ / f ss.
349
+ (5)
350
+ The same procedure is followed for the reference distribution. After extracting the Ass(qinv)
351
+ and Bss(qinv) distributions, the correlation distribution is calculated as
352
+ Css(qinv) = N Ass(qinv)
353
+ Bss(qinv) .
354
+ (6)
355
+ While the Css(qinv) distribution is corrected for detector effects and non-V0 backgrounds, it
356
+ still includes non-femtoscopic background correlations, such as those associated with elliptic
357
+ flow [38], minijets [7], resonance decays [7], and energy-momentum conservation [39]. The
358
+ non-femtoscopic background contribution is modeled using an empirically determined double
359
+ Gaussian function
360
+ Ω(qinv) = N
361
+
362
+ 1 + α1e−q2
363
+ invR2
364
+ 1
365
+ � �
366
+ 1 − α2e−q2
367
+ invR2
368
+ 2
369
+
370
+ ,
371
+ (7)
372
+ where N, α1, α2, R1, and R2 are fit parameters. This function was selected for its reproduction
373
+ of the distributions in both real data at high qinv and simulated data that do not include the
374
+ correlations being measured.
375
+ Fits are performed to the Css(qinv) distributions to extract the source size and strong interaction
376
+ scattering parameters. As the V0 particles are neutral, the Coulomb interaction is absent. How-
377
+ ever, the correlations are sensitive to QS and FSI effects, with s-wave interactions assumed to
378
+ dominate for the small relative momenta of the particle pairs analyzed. The correlation distri-
379
+ bution for all pairs (K0
380
+ SK0
381
+ S, ΛK0
382
+ S, and ΛΛ) is interpreted in the LL model. This model relates the
383
+ two-particle correlation function to the source size and also takes into account FSI effects [17].
384
+ The general correlation function is
385
+ Ctotal(qinv) =
386
+
387
+ 1 + λ
388
+
389
+ CQS(qinv) + CFSI(qinv)
390
+ ��
391
+ Ω(qinv),
392
+ (8)
393
+
394
+ 6
395
+ where CQS(qinv) is the QS function and CFSI(qinv) is the FSI function. The parameter λ is re-
396
+ ferred to as the incoherence parameter. In the absence of FSI effects, λ equals unity for a
397
+ perfectly incoherent Gaussian source. Effects such as resonance decay violate the incoherent
398
+ source assumption and can lead to deviations of the λ parameter from the unity. Its value
399
+ can also be affected by non-Gaussian components of the correlations function and by the FSI
400
+ between particles.
401
+ Neglecting CP violation, the K0
402
+ SK0
403
+ S system can be written as
404
+ |K0
405
+ SK0
406
+ S⟩ = 1
407
+ 2
408
+
409
+ |K0K0⟩ + |K0K0⟩ + |K0K0⟩ + |K0K0⟩
410
+
411
+ .
412
+ (9)
413
+ It can be shown [17, 40] that the resulting correlations follow Bose–Einstein quantum statistics,
414
+ with
415
+ CQS(qinv) = e(−q2
416
+ invR2
417
+ inv),
418
+ (10)
419
+ where the source radius Rinv reflects the size of the region over which the particles are emitted.
420
+ The FSI for the K0
421
+ SK0
422
+ S correlations is modeled by [17, 40]
423
+ CFSI(qinv) = 1
424
+ 2
425
+ �����
426
+ f (k)
427
+ Rinv
428
+ ����
429
+ 2
430
+ + 4ℜ f (k)
431
+ √πRinv
432
+ F1(qinvRinv) − 2ℑ f (k)
433
+ Rinv
434
+ F2(qinvRinv)
435
+
436
+ ,
437
+ (11)
438
+ where
439
+ k = qinv/2,
440
+ F1(z) = 1
441
+ 2e−z2 � z
442
+ 0 ex2dx, and
443
+ F2(z) = 1 − e−z2
444
+ z
445
+ .
446
+ (12)
447
+ The function f (k) is the K0K0 s-wave scattering amplitude, with real and imaginary parts ℜ f (k)
448
+ and ℑ f (k), respectively. This amplitude is dominated by the near-threshold s-wave isoscalar
449
+ resonance f0(980) and the s-wave isovector resonance a0(980), with the total scattering ampli-
450
+ tude given by an average of these contributions: f (k) = ( ff0(980)(k) + fa0(980)(k))/2. The indi-
451
+ vidual resonance amplitudes depend on the resonance mass mr, with r = f0(980) or a0(980),
452
+ the kaon mass mK, and the resonance couplings γr (γ′
453
+ r) to the K0K0 (ππ for f0(980) and π0η
454
+ for a0(980) channels. Then, fr(k) = γr/
455
+
456
+ m2
457
+ r − ζ − iγrk − iγ′
458
+ rk′
459
+ r
460
+
461
+ , where ζ = 4(m2
462
+ K + k2) and
463
+ k′
464
+ r denotes the momentum in the second (ππ or π0η) decay channel with the corresponding
465
+ partial width Γ′ = γ′
466
+ rk′
467
+ r/mr (more details can be found in Ref. [40]). The scattering amplitude
468
+ is calculated using the resonance mass and the coupling parameters from Refs. [41–44], taken
469
+ from row C of Table 1 of Ref. [40].
470
+ For the correlations involving Λ baryons, the CQS(qinv) and CFSI(qinv) functions are [17]
471
+ CQS(qinv) = αe(−q2
472
+ invR2
473
+ inv),
474
+ and
475
+ CFSI(qinv) = (1 + α)
476
+
477
+ 1
478
+ 2
479
+ | f (k)|2
480
+ R2
481
+ inv
482
+
483
+ 1 −
484
+ 1
485
+ 2√π
486
+ d0
487
+ Rinv
488
+ � + 2ℜ f (k)
489
+ √πRinv
490
+ F1(qinvRinv) − ℑ f (k)
491
+ Rinv
492
+ F2(qinvRinv)
493
+
494
+ ,
495
+ (13)
496
+ where α = −1/2 for ΛΛ correlations for two identical fermions and α = 0 for ΛK0
497
+ S corre-
498
+ lations as there are no QS effects for non-identical particles [17]. The scattering amplitude
499
+
500
+ 7
501
+ f (k) is parameterized by a complex scattering length (f0) and an effective range (d0) with
502
+ f (k) = [1/ f0 + d0k2/2 − ik]−1 [17]. The imaginary part of f0 is responsible for inelastic pro-
503
+ cesses (annihilation). For an attractive interaction that is not strong enough to produce a bound
504
+ state, the real part of f0 is positive, while a repulsive interaction corresponds to a negative ℜ f0
505
+ of the order of the range of the repulsive potential. In the presence of a bound state, ℜ f0 is also
506
+ negative, but with a much larger magnitude. The femtoscopic sign convention and notation
507
+ for the scattering length differ from those used in nuclear physics, where the corresponding
508
+ scattering length a0 = − f0. As the ΛK0
509
+ S and ΛΛ correlations each have only one spin state that
510
+ contributes to the s-wave scattering, Eq. (13) suffices to describe the FSI effects.
511
+ Fits to the correlation distribution of all the pairs were performed using Eq. (8) with the non-
512
+ femtoscopic background parameters (N, α1, α2, R1, and R2) treated as free parameters. For
513
+ K0
514
+ SK0
515
+ S correlations, the parameters of interest are Rinv and λ, with the scattering amplitude
516
+ based on previous measurements [41–44]. The ΛK0
517
+ S and ΛΛ correlations include additional
518
+ parameters: d0, ℜ f0, and ℑ f0. The ℑ f0 term for ΛΛ correlations is set to zero since there are no
519
+ baryon-baryon annihilation processes.
520
+ Histograms of the correlation distributions are generated in the range 0 < qinv < 6 GeV with
521
+ 0.02 GeV wide bins for the K0
522
+ SK0
523
+ S and ΛK0
524
+ S correlations and 0.04 GeV wide bins for the ΛΛ cor-
525
+ relations. The fits exclude the first qinv bin to avoid a potential bias from the method used to
526
+ address cases where V0 candidates share daughter tracks. Studies using simulated events in-
527
+ dicate that only this first bin is affected by this remediation. Least-square fits are performed to
528
+ the experimental data with the uncertainties in the fit parameters calculated using the MINOS
529
+ technique [45]. Examples of correlation measurements and their fits and corresponding χ2/dof
530
+ values, are presented in Figs. 2 and 3. The K0
531
+ SK0
532
+ S correlations, shown in Fig. 2, are independently
533
+ fitted for each of the six centrality bins with 0 < kT < 2.5 GeV, where kT ≡ |⃗pT,1 + ⃗pT,2|/2 is
534
+ the average transverse momentum of the particle pair. While the LL model assumes a Gaus-
535
+ sian source function, results from charged-particle correlations have demonstrated that this
536
+ assumption breaks down for peripheral collisions [46]. This is likely the cause of the poor fit
537
+ at low qinv for centralities above 40%. The ΛK0
538
+ S (left) and ΛΛ (right) correlations, shown in
539
+ Fig. 3, involve fewer events and, therefore, only a single fit is performed for each, with the data
540
+ integrated over the centrality range 0–80% and with no restriction on kT.
541
+ 5
542
+ Systematic uncertainties
543
+ The systematic uncertainties for the fit parameters are based on the changes found in the pa-
544
+ rameter values after individually varying each of the analysis criteria, as discussed below. In
545
+ cases with more than one variation for a single source, the maximum deviation from the nom-
546
+ inal value is used. The total systematic uncertainty is obtained by adding the uncertainties
547
+ from each source in quadrature. The BDT discriminant is varied so as to adjust the signal-to-
548
+ background ratio, with the signal yield changing by ±15% in the process. The nominal method
549
+ to account for V0 candidates sharing daughter tracks is to remove one of the V0 candidates at
550
+ random, which is then not used by any pair. Two alternative approaches are used, one in which
551
+ both V0 candidates are removed and another in which, for events with multiple V0 candidate
552
+ pair combinations, only the pairs in which the two particles share a daughter are removed.
553
+ The systematic uncertainties related to V0 signal and background modeling are investigated by
554
+ varying the background shape from a fourth- to a third-order polynomial and the signal shape
555
+ from a sum of three Gaussian functions to a sum of two or four Gaussian functions. An alterna-
556
+ tive non-femtoscopic background function Ω(qinv) = N(1 + Be−|qinv/σ|2)(1 + ϵqinv) is used to
557
+ assess the uncertainty associated with the choice of the non-femtoscopic background function.
558
+
559
+ 8
560
+ )
561
+ -1
562
+ = 5.02 TeV (0.607 nb
563
+ NN
564
+ s
565
+ PbPb,
566
+ CMS
567
+ 0-10%
568
+ : 287
569
+ 2
570
+ χ
571
+ 0
572
+ S
573
+ K
574
+ 0
575
+ S
576
+ K
577
+ dof: 292
578
+ 30-40%
579
+ : 306
580
+ 2
581
+ χ
582
+ 0
583
+ S
584
+ K
585
+ 0
586
+ S
587
+ K
588
+ dof: 292
589
+ 10-20%
590
+ : 323
591
+ 2
592
+ χ
593
+ 0
594
+ S
595
+ K
596
+ 0
597
+ S
598
+ K
599
+ dof: 292
600
+ 40-50%
601
+ : 334
602
+ 2
603
+ χ
604
+ 0
605
+ S
606
+ K
607
+ 0
608
+ S
609
+ K
610
+ dof:292
611
+ 20-30%
612
+ : 312
613
+ 2
614
+ χ
615
+ 0
616
+ S
617
+ K
618
+ 0
619
+ S
620
+ K
621
+ dof: 292
622
+ 50-60%
623
+ : 353
624
+ 2
625
+ χ
626
+ 0
627
+ S
628
+ K
629
+ 0
630
+ S
631
+ K
632
+ dof: 292
633
+ < 8.5 GeV
634
+ T
635
+ 1 < p
636
+ < 2.5 GeV
637
+ T
638
+ 0 < k
639
+ Data
640
+ Full fit
641
+ Nonfemto
642
+ 0
643
+ 2
644
+ 4
645
+ 6
646
+ (GeV)
647
+ inv
648
+ q
649
+ 1
650
+ 1.5
651
+ 2
652
+ )
653
+ inv
654
+ (q
655
+ ss
656
+ C
657
+ 0
658
+ 0.1
659
+ 0.2
660
+ 0.3
661
+ 0.4
662
+ (GeV)
663
+ inv
664
+ q
665
+ 1
666
+ 1.5
667
+ 2
668
+ )
669
+ inv
670
+ (q
671
+ ss
672
+ C
673
+ : 19
674
+ 2
675
+ χ
676
+ # bins: 19
677
+ 0
678
+ 2
679
+ 4
680
+ 6
681
+ (GeV)
682
+ inv
683
+ q
684
+ 1
685
+ 1.5
686
+ 2
687
+ )
688
+ inv
689
+ (q
690
+ ss
691
+ C
692
+ 0
693
+ 0.1
694
+ 0.2
695
+ 0.3
696
+ 0.4
697
+ (GeV)
698
+ inv
699
+ q
700
+ 0.8
701
+ 1
702
+ 1.2
703
+ 1.4
704
+ )
705
+ inv
706
+ (q
707
+ ss
708
+ C
709
+ : 25
710
+ 2
711
+ χ
712
+ # bins: 19
713
+ 0
714
+ 2
715
+ 4
716
+ 6
717
+ (GeV)
718
+ inv
719
+ q
720
+ 1
721
+ 1.5
722
+ 2
723
+ )
724
+ inv
725
+ (q
726
+ ss
727
+ C
728
+ 0
729
+ 0.1
730
+ 0.2
731
+ 0.3
732
+ 0.4
733
+ (GeV)
734
+ inv
735
+ q
736
+ 1
737
+ 1.5
738
+ )
739
+ inv
740
+ (q
741
+ ss
742
+ C
743
+ : 43
744
+ 2
745
+ χ
746
+ # bins: 19
747
+ 0
748
+ 2
749
+ 4
750
+ 6
751
+ (GeV)
752
+ inv
753
+ q
754
+ 1
755
+ 1.5
756
+ 2
757
+ )
758
+ inv
759
+ (q
760
+ ss
761
+ C
762
+ 0
763
+ 0.1
764
+ 0.2
765
+ 0.3
766
+ 0.4
767
+ (GeV)
768
+ inv
769
+ q
770
+ 1
771
+ 1.5
772
+ )
773
+ inv
774
+ (q
775
+ ss
776
+ C
777
+ : 18
778
+ 2
779
+ χ
780
+ # bins: 19
781
+ 0
782
+ 2
783
+ 4
784
+ 6
785
+ (GeV)
786
+ inv
787
+ q
788
+ 1
789
+ 1.5
790
+ 2
791
+ )
792
+ inv
793
+ (q
794
+ ss
795
+ C
796
+ 0
797
+ 0.1
798
+ 0.2
799
+ 0.3
800
+ 0.4
801
+ (GeV)
802
+ inv
803
+ q
804
+ 1
805
+ 1.5
806
+ 2
807
+ 2.5
808
+ )
809
+ inv
810
+ (q
811
+ ss
812
+ C
813
+ : 40
814
+ 2
815
+ χ
816
+ # bins: 19
817
+ 0
818
+ 2
819
+ 4
820
+ 6
821
+ (GeV)
822
+ inv
823
+ q
824
+ 1
825
+ 1.5
826
+ 2
827
+ )
828
+ inv
829
+ (q
830
+ ss
831
+ C
832
+ 0
833
+ 0.1
834
+ 0.2
835
+ 0.3
836
+ 0.4
837
+ (GeV)
838
+ inv
839
+ q
840
+ 1
841
+ 1.5
842
+ )
843
+ inv
844
+ (q
845
+ ss
846
+ C
847
+ : 13
848
+ 2
849
+ χ
850
+ # bins: 19
851
+ Figure 2: The correlation distributions and fits for K0
852
+ SK0
853
+ S pairs in different centrality ranges,
854
+ starting from 0–10% centrality to 50–60% centrality, with 0 < kT < 2.5 GeV. In each plot, the
855
+ red circles are the data, the blue solid line is the fit using Eq. (8), and the green dotted line is
856
+ the non-femtoscopic background from Eq. (7). The χ2 and dof values are for the full qinv range.
857
+ The insert plots show the data and the fit for the qinv < 0.4 GeV region, with the χ2 and number
858
+ of bins evaluated in that region.
859
+ 0
860
+ 1
861
+ 2
862
+ 3
863
+ 4
864
+ 5
865
+ 6
866
+ (GeV)
867
+ inv
868
+ q
869
+ 0.7
870
+ 0.8
871
+ 0.9
872
+ 1
873
+ 1.1
874
+ 1.2
875
+ 1.3
876
+ )
877
+ inv
878
+ (q
879
+ ss
880
+ C
881
+ Data
882
+ Full fit
883
+ Non-femto
884
+ Data
885
+ Full fit
886
+ Non-femto
887
+ )
888
+ -1
889
+ = 5.02 TeV (0.607 nb
890
+ NN
891
+ s
892
+ PbPb,
893
+ CMS
894
+ S
895
+ 0
896
+ K
897
+ Λ
898
+
899
+ S
900
+ 0
901
+ K
902
+ Λ
903
+ 0-80%
904
+ < 8.5 GeV
905
+ Λ
906
+ /
907
+ Λ
908
+ T
909
+ 1.8 < p
910
+ < 8.5 GeV
911
+ S
912
+ 0
913
+ K
914
+ T
915
+ 1 < p
916
+ T
917
+ all k
918
+ : 349
919
+ 2
920
+ χ
921
+ dof: 289
922
+ 0
923
+ 0.1
924
+ 0.2
925
+ 0.3
926
+ 0.4
927
+ (GeV)
928
+ inv
929
+ q
930
+ 0.8
931
+ 0.9
932
+ 1
933
+ 1.1
934
+ )
935
+ inv
936
+ (q
937
+ ss
938
+ C
939
+ : 21
940
+ 2
941
+ χ
942
+ # bins: 19
943
+ 0
944
+ 1
945
+ 2
946
+ 3
947
+ 4
948
+ 5
949
+ 6
950
+ (GeV)
951
+ inv
952
+ q
953
+ 0.4
954
+ 0.6
955
+ 0.8
956
+ 1
957
+ 1.2
958
+ 1.4
959
+ 1.6
960
+ )
961
+ inv
962
+ (q
963
+ ss
964
+ C
965
+ Data
966
+ Full fit
967
+ Nonfemto
968
+ Data
969
+ Full fit
970
+ Nonfemto
971
+ )
972
+ -1
973
+ = 5.02 TeV (0.607 nb
974
+ NN
975
+ s
976
+ PbPb,
977
+ CMS
978
+ Λ
979
+ Λ
980
+
981
+ Λ
982
+ Λ
983
+ 0-80%
984
+ < 8.5 GeV
985
+ T
986
+ 1.8 < p
987
+ T
988
+ all k
989
+ : 124
990
+ 2
991
+ χ
992
+ dof: 140
993
+ 0
994
+ 0.1
995
+ 0.2
996
+ 0.3
997
+ 0.4
998
+ (GeV)
999
+ inv
1000
+ q
1001
+ 0.4
1002
+ 0.6
1003
+ 0.8
1004
+ 1
1005
+ )
1006
+ inv
1007
+ (q
1008
+ ss
1009
+ C
1010
+ : 5
1011
+ 2
1012
+ χ
1013
+ # bins: 9
1014
+ Figure 3: The correlation distributions and fits for ΛK0
1015
+ S (left) and ΛΛ (right) pairs with 0–80%
1016
+ centrality and no restriction on kT. In each plot, the red circles are the data, the blue solid line is
1017
+ the fit using Eq. (8), and the green dotted line is the non-femtoscopic background from Eq. (7).
1018
+ The χ2 and dof values are for the full qinv range. The insert plots show the data and the fit for
1019
+ the qinv < 0.4 GeV region, with the χ2 and number of bins evaluated in that region.
1020
+
1021
+ 9
1022
+ The selection requirements used to construct the mixed event sample are varied to require
1023
+ centrality matching of 3 and 7% instead of the nominal 5% and the primary vertex position
1024
+ matching with 1 and 3 cm instead of the nominal 2 cm. The effect of the centrality resolution
1025
+ has been checked and found to be negligible. The peak region requirement is changed from
1026
+ <2.0σ to <1.5σ and <2.5σ and the sideband region selection from >4.0σ to >3.5σ and >4.5σ.
1027
+ The upper limit of the qinv fit ranges is changed by ±1 GeV and the lower limit is changed to
1028
+ include the first bin. At low pT, the tracking efficiency is strongly dependent on pT. There-
1029
+ fore, the simulated sample is used to explore possible effects of the tracking efficiency. Based
1030
+ on these studies, it is found that the V0 reconstruction efficiency for the detection of two V0
1031
+ particles is well described by taking the product of the efficiency for each V0. It is also found
1032
+ that the fit results are only weakly affected by the V0 reconstruction efficiency. This is under-
1033
+ stood as a consequence of the signal and reference samples being similarly affected by the V0
1034
+ efficiency. Differences in the Monte Carlo and experimental pT spectra could influence the can-
1035
+ cellation of efficiency-dependent effects in the signal and background correlations. Therefore,
1036
+ a systematic uncertainty for the efficiency is assessed by comparing the results for the default
1037
+ simulated sample to one in which the V0 pT distribution is reweighted to match the data. For
1038
+ the K0
1039
+ SK0
1040
+ S correlations, an additional systematic uncertainty is found from varying the mass and
1041
+ coupling parameters for the f0(980) and a0(980) resonances by using rows A, B, and D of Table
1042
+ 1 of Ref. [40]. The systematic uncertainties are summarized in Table 1.
1043
+ Table 1: Summary of absolute systematic uncertainties in K0
1044
+ SK0
1045
+ S, ΛK0
1046
+ S and ΛΛ correlation mea-
1047
+ surements. The values for Rinv, d0, ℜ f0, and ℑ f0 are in fm.
1048
+ Uncertainty source
1049
+ K0
1050
+ SK0
1051
+ S
1052
+ ΛK0
1053
+ S
1054
+ ΛΛ
1055
+ Rinv
1056
+ λ
1057
+ Rinv
1058
+ d0
1059
+ ℜ f0 ℑ f0
1060
+ λ
1061
+ Rinv
1062
+ d0
1063
+ ℜ f0
1064
+ λ
1065
+ BDT cut
1066
+ 0.04–0.18 0.01–0.04
1067
+ 0.19 0.75 0.10 0.07 0.03
1068
+ 0.06 0.43 0.05 0.31
1069
+ Duplicate V0 removal
1070
+ 0.06–0.40 0.01–0.08
1071
+ 0.35 0.92 0.10 0.19 0.11
1072
+ 0.01 1.14 0.05 0.14
1073
+ Mass fit function
1074
+ 0.00–0.01 0.00–0.01
1075
+ 0.09 0.05 0.01 0.03 0.03
1076
+ 0.02 0.04 0.01 0.02
1077
+ Non-femtoscopic func. 0.02–0.16 0.01–0.12
1078
+ 0.02 0.17 0.05 0.07 0.03
1079
+ 0.02 1.02 0.14 0.93
1080
+ Reference sample
1081
+ 0.03–0.08 0.01–0.05
1082
+ 0.22 0.48 0.12 0.12 0.03
1083
+ 0.10 1.12 0.20 0.76
1084
+ Peak region
1085
+ 0.00–0.07 0.01–0.02
1086
+ 0.43 0.10 0.05 0.17 0.08
1087
+ 0.22 1.21 0.08 0.35
1088
+ Sideband region
1089
+ 0.00–0.03 0.00–0.01
1090
+ 0.02 0.02 0.01 0.01 0.00
1091
+ 0.01 0.03 0.01 0.04
1092
+ Fitting range
1093
+ 0.01–0.11 0.01–0.04
1094
+ 0.20 0.18 0.03 0.08 0.04
1095
+ 0.04 1.79 0.20 0.60
1096
+ Efficiency
1097
+ 0.03–0.03 0.01–0.01
1098
+ 0.08 0.29 0.06 0.09 0.03
1099
+ 0.02 0.05 0.03 0.04
1100
+ f0(980)/a0(980) param. 0.07–0.39 0.03–0.05
1101
+
1102
+
1103
+
1104
+
1105
+
1106
+
1107
+
1108
+
1109
+
1110
+ Total uncertainty
1111
+ 0.29–0.47 0.08–0.16
1112
+ 0.69 1.34 0.21 0.32 0.16
1113
+ 0.25 2.91 0.34 1.43
1114
+ 6
1115
+ Results
1116
+ The size of the particle emitting source Rinv and the λ parameter extracted from the K0
1117
+ SK0
1118
+ S cor-
1119
+ relations for 0 < kT < 2.5 GeV are shown as a function of centrality in Fig. 4. It is observed that
1120
+ the Rinv value decreases from central to peripheral events, as expected from a simple geometric
1121
+ picture of the collisions. Over the full centrality range of 0–80%, Rinv = 3.30 ± 0.10 (stat) ±
1122
+ 0.37 (syst) fm. The transverse mass can be calculated as mT =
1123
+
1124
+ (minv/2)2 + k2
1125
+ T, where minv
1126
+ is the invariant mass of the two-particle system [15]. The average ⟨mT⟩ is evaluated from the
1127
+ transverse mass distribution using two-particle pairs with qinv < 0.4 GeV, accounting for back-
1128
+ ground using the binomial analysis as done for the qinv distributions. Our results for Rinv agree
1129
+ with the ALICE K0
1130
+ SK0
1131
+ S results from PbPb collisions at √sNN = 2.76 TeV at a similar mT value [47].
1132
+ The λ parameter is seen to decrease from about 0.45 to 0.25 as the collisions become more pe-
1133
+
1134
+ 10
1135
+ ripheral. This decrease could arise from a relative increase in the contribution from resonance
1136
+ decays or a source function that becomes increasingly non-Gaussian as the collisions become
1137
+ more peripheral. The assumption of a Gaussian source function in the LL model may also be
1138
+ responsible for the relatively poor fits at low qinv for the most peripheral collisions, as seen in
1139
+ Fig. 2.
1140
+ 0
1141
+ 10
1142
+ 20
1143
+ 30
1144
+ 40
1145
+ 50
1146
+ 60
1147
+ 0
1148
+ 1
1149
+ 2
1150
+ 3
1151
+ 4
1152
+ 5
1153
+ )
1154
+ -1
1155
+ = 5.02 TeV (0.607 nb
1156
+ NN
1157
+ s
1158
+ PbPb,
1159
+ CMS
1160
+ < 8.5 GeV
1161
+ T
1162
+ 1 < p
1163
+ < 2.5 GeV
1164
+ T
1165
+ 0 < k
1166
+ Centrality (%)
1167
+ (fm)
1168
+ inv
1169
+ R
1170
+ 0
1171
+ S
1172
+ K
1173
+ 0
1174
+ S
1175
+ K
1176
+ 0
1177
+ 10
1178
+ 20
1179
+ 30
1180
+ 40
1181
+ 50
1182
+ 60
1183
+ 0
1184
+ 0.2
1185
+ 0.4
1186
+ 0.6
1187
+ 0.8
1188
+ 1
1189
+ )
1190
+ -1
1191
+ = 5.02 TeV (0.607 nb
1192
+ NN
1193
+ s
1194
+ PbPb,
1195
+ CMS
1196
+ < 8.5 GeV
1197
+ T
1198
+ 1 < p
1199
+ < 2.5 GeV
1200
+ T
1201
+ 0 < k
1202
+ Centrality (%)
1203
+ λ
1204
+ 0
1205
+ S
1206
+ K
1207
+ 0
1208
+ S
1209
+ K
1210
+ Figure 4: The Rinv (left) and λ parameter (right) as a function of centrality. For each data point,
1211
+ the line and shaded area indicate the statistical and systematic uncertainty, respectively.
1212
+ Table 2 includes the extracted Rinv and λ parameters as well as ⟨mT⟩ for K0
1213
+ SK0
1214
+ S, ΛK0
1215
+ S, and ΛΛ
1216
+ combinations in the 0–80% centrality range. A significant decrease is seen in Rinv as the ⟨mT⟩
1217
+ increases. Qualitatively similar results have been found, both for a given pair type in bins of
1218
+ mT and when comparing multiple pair types [1]. Because of the different minimum pT require-
1219
+ ments for K0
1220
+ S and Λ particles, the variation in ⟨mT⟩ includes both ⟨pT⟩ and particle mass differ-
1221
+ ences. The anticorrelation of Rinv and ⟨mT⟩ has been interpreted as indicating the presence of
1222
+ an expanding source [1].
1223
+ Table 2 also includes the strong interaction scattering parameters d0, ℜ f0, and ℑ f0 obtained
1224
+ from the ΛK0
1225
+ S and ΛΛ correlations. Figure 5 shows d0 and ℑ f0 versus ℜ f0 in the left and
1226
+ right panels, respectively, with the current results shown as red stars and squares for ΛK0
1227
+ S and
1228
+ ΛΛ, respectively. The displayed uncertainties are one-dimensional and are not based on a
1229
+ two-dimensional contour.
1230
+ Table 2: Extracted values of the Rinv, ℜ f0, ℑ f0, d0, λ, and ⟨mT⟩ parameters from the K0
1231
+ SK0
1232
+ S, ΛK0
1233
+ S,
1234
+ and ΛΛ combinations in the 0–80% centrality range. The first and second uncertainties are
1235
+ statistical and systematic, respectively.
1236
+ Parameter
1237
+ K0
1238
+ SK0
1239
+ S
1240
+ ΛK0
1241
+ S
1242
+ ΛΛ
1243
+ Rinv (fm)
1244
+ 3.30 ± 0.10 ± 0.37
1245
+ 2.1+1.4
1246
+ −0.5 ± 0.7
1247
+ 1.3+0.4
1248
+ −0.2 ± 0.3
1249
+ ℜ f0 (fm)
1250
+
1251
+ −0.76+0.29
1252
+ −0.19 ± 0.21
1253
+ 0.74+0.59
1254
+ −0.16 ± 0.34
1255
+ ℑ f0 (fm)
1256
+
1257
+ −0.07+0.48
1258
+ −0.11 ± 0.32
1259
+
1260
+ d0 (fm)
1261
+
1262
+ 2.3+0.7
1263
+ −0.5 ± 1.3
1264
+ 4.2+5.7
1265
+ −2.1 ± 2.9
1266
+ λ
1267
+ 0.38 ± 0.02 ± 0.08
1268
+ 0.34+0.41
1269
+ −0.12 ± 0.16
1270
+ 1.5+1.2
1271
+ −1.1 ± 1.4
1272
+ ⟨mT⟩ (GeV)
1273
+ 1.53
1274
+ 2.09
1275
+ 2.60
1276
+
1277
+ 11
1278
+ 2
1279
+
1280
+ 1.5
1281
+
1282
+ 1
1283
+
1284
+ 0.5
1285
+
1286
+ 0
1287
+ 0.5
1288
+ 1
1289
+ 1.5
1290
+ 2
1291
+ 15
1292
+
1293
+ 10
1294
+
1295
+ 5
1296
+
1297
+ 0
1298
+ 5
1299
+ 10
1300
+ 15
1301
+ CMS
1302
+ AA collisions
1303
+ (fm)
1304
+ 0
1305
+ f
1306
+
1307
+ (fm)
1308
+ 0
1309
+ d
1310
+ Λ
1311
+ Λ
1312
+ CMS (5.02 TeV):
1313
+ S
1314
+ 0
1315
+ K
1316
+ Λ
1317
+ CMS (5.02 TeV):
1318
+ Λ
1319
+ Λ
1320
+ STAR (200 GeV):
1321
+ S
1322
+ 0
1323
+ K
1324
+ Λ
1325
+ ALICE (2.76 TeV):
1326
+ Λ
1327
+ Λ
1328
+ PRC 91, 024916:
1329
+ Λ
1330
+ Λ
1331
+ PRC 66, 024007:
1332
+ Λ
1333
+ Λ
1334
+ NPA 707, 491:
1335
+ 1.5
1336
+
1337
+ 1
1338
+
1339
+ 0.5
1340
+
1341
+ 0
1342
+ 0.5
1343
+ 0.5
1344
+
1345
+ 0
1346
+ 0.5
1347
+ 1
1348
+ CMS
1349
+ AA collisions
1350
+ (fm)
1351
+ 0
1352
+ f
1353
+
1354
+ (fm)
1355
+ 0
1356
+ f
1357
+
1358
+ S
1359
+ 0
1360
+ K
1361
+ Λ
1362
+ CMS (5.02 TeV):
1363
+ S
1364
+ 0
1365
+ K
1366
+ Λ
1367
+ ALICE (2.76 TeV):
1368
+ Figure 5: The measured values of d0 versus ℜ f0 (left) and ℑ f0 versus ℜ f0 (right) from this
1369
+ analysis along with other measurements and predictions as described in the text. For each
1370
+ data point, the lines and the boxes indicate the (one-dimensional) statistical and systematic
1371
+ uncertainties, respectively.
1372
+ The negative value of ℜ f0 observed for the ΛK0
1373
+ S correlations, combined with its relatively small
1374
+ magnitude, suggests a repulsive ΛK0
1375
+ S interaction. The uncertainty associated with the ℑ f0
1376
+ value for the ΛK0
1377
+ S correlations prevents any claim concerning possible inelastic processes. The
1378
+ value of ℜ f0 found for ΛK0
1379
+ S correlations differs from that reported by the ALICE Collaboration
1380
+ (teal diamonds) [15], which is also for PbPb collisions but at √sNN = 2.76 TeV. The uncertainties
1381
+ are too large to determine if d0 and ℑ f0 also differ between the two results.
1382
+ The positive ℜ f0 value obtained for the ΛΛ correlations suggests an attractive interaction
1383
+ that is not strong enough to produce a bound state such as the H-dibaryon [9, 48]. This re-
1384
+ sult disagrees with the finding from the STAR Collaboration in gold-gold (AuAu) collisions at
1385
+ √sNN = 200 GeV (blue circle). The negative ℜ f0 value of −1.10 ± 0.37 (stat)+0.68
1386
+ −0.08 (syst) fm found
1387
+ by STAR, combined with its magnitude, imply a repulsive interaction. It is noted, however,
1388
+ that a theoretical study of the STAR data which considers collective flow and feed-down effects
1389
+ (shown as a shaded region at d0 ≈ 5 fm, ℜ f0 ≈ 0.9 fm) suggests that these data are consistent
1390
+ with the ΛΛ interaction being attractive [9]. An exclusion plot by the ALICE Collaboration
1391
+ for the ΛΛ scattering parameters obtained using the ΛΛ correlations from pp collisions at
1392
+ √s = 7 and 13 TeV, as well as pPb collisions at √sNN = 5.02 TeV, also suggests an attractive
1393
+ interaction [10]. In addition, our results are consistent with two theoretical calculations (black
1394
+ triangles) that reproduce the ΛΛ binding energy of
1395
+ 6
1396
+ ΛΛHe, as extracted from the NAGARA
1397
+ event [49, 50].
1398
+ 7
1399
+ Summary
1400
+ The K0
1401
+ SK0
1402
+ S, ΛK0
1403
+ S, and ΛΛ femtoscopic correlations are studied using lead-lead (PbPb) collision
1404
+ data at a center-of-mass energy per nucleon pair of √sNN = 5.02 TeV, collected by the CMS Col-
1405
+ laboration. This is the first report on ΛΛ correlations in PbPb collisions at the CERN LHC. The
1406
+ source size Rinv and the incoherence parameter λ were extracted for K0
1407
+ SK0
1408
+ S correlations in six
1409
+ centrality bins covering the 0–60% range. The value of Rinv decreases from 4 to 1 fm going from
1410
+ central to peripheral collisions and agrees with results from the ALICE Collaboration at a sim-
1411
+ ilar transverse mass. Along with the Rinv and λ parameters, the strong interaction scattering
1412
+ parameters, i.e., the complex scattering length and effective range, were extracted from ΛK0
1413
+ S
1414
+ and ΛΛ correlations in the 0–80% centrality range. These scattering parameters indicate that
1415
+
1416
+ 12
1417
+ the ΛK0
1418
+ S interaction is repulsive and that the ΛΛ interaction is attractive. The scattering param-
1419
+ eters obtained from ΛK0
1420
+ S correlations differ from those reported by the ALICE Collaboration.
1421
+ The positive real scattering length obtained from the ΛΛ correlation disfavors the existence
1422
+ of a bound H-dibaryon state. The ΛΛ scattering parameters help to constrain baryon-baryon
1423
+ and, more specifically, hyperon-hyperon interaction models. These measurements provide an
1424
+ additional input to understand the nature of the strong interaction between pairs of strange
1425
+ hadrons.
1426
+ References
1427
+ [1] M. A. Lisa, S. Pratt, R. Soltz, and U. Wiedemann, “Femtoscopy in relativistic heavy ion
1428
+ collisions: Two decades of progress”, Ann. Rev. Nucl. Part. Sci. 55 (2005) 357,
1429
+ doi:10.1146/annurev.nucl.55.090704.151533, arXiv:nucl-ex/0505014.
1430
+ [2] V. G. J. Stoks, R. A. M. Klomp, M. C. M. Rentmeester, and J. J. de Swart, “Partial-wave
1431
+ analysis of all nucleon-nucleon scattering data below 350 MeV”, Phys. Rev. C 48 (1993)
1432
+ 792, doi:10.1103/PhysRevC.48.792.
1433
+ [3] J. J. de Swart and C. Dullemond, “Effective range theory and the low energy
1434
+ hyperon-nucleon interactions”, Anna. Phys. 19 (1962) 458,
1435
+ doi:10.1016/0003-4916(62)90185-9.
1436
+ [4] R. Engelmann, H. Filthuth, V. Hepp, and E. Kluge, “Inelastic Σ− p-interactions at low
1437
+ momenta”, Phys. Lett. 21 (1966) 587, doi:10.1016/0031-9163(66)91310-2.
1438
+ [5] F. Eisele et al., “Elastic Σ± p scattering at low energies”, Phys. Lett. B 37 (1971) 204,
1439
+ doi:10.1016/0370-2693(71)90053-0.
1440
+ [6] B. Sechi-Zorn, B. Kehoe, J. Twitty, and R. A. Burnstein, “Low-energy Λ-proton elastic
1441
+ scattering”, Phys. Rev. 175 (1968) 1735, doi:10.1103/PhysRev.175.1735.
1442
+ [7] CMS Collaboration, “Bose–Einstein correlations in pp, pPb, and PbPb collisions at
1443
+ √sNN = 0.9–7 TeV”, Phys. Rev. C 97 (2018) 064912,
1444
+ doi:10.1103/PhysRevC.97.064912, arXiv:1712.07198.
1445
+ [8] J. Schaffner-Bielich, M. Hanauske, H. St¨ocker, and W. Greiner, “Phase transition to
1446
+ hyperon matter in neutron stars”, Phys. Rev. Lett. 89 (2002) 171101,
1447
+ doi:10.1103/PhysRevLett.89.171101, arXiv:astro-ph/0005490.
1448
+ [9] K. Morita, T. Furumoto, and A. Ohnishi, “ΛΛ interaction from relativistic heavy-ion
1449
+ collisions”, Phys. Rev. C 91 (2015) 024916, doi:10.1103/PhysRevC.91.024916,
1450
+ arXiv:1408.6682.
1451
+ [10] ALICE Collaboration, “Study of the Λ-Λ interaction with femtoscopy correlations in pp
1452
+ and pPb collisions at the LHC”, Phys. Lett. B 797 (2019) 134822,
1453
+ doi:10.1016/j.physletb.2019.134822, arXiv:1905.07209.
1454
+ [11] R. L. Jaffe, “Perhaps a stable dihyperon”, Phys. Rev. Lett. 38 (1977) 195,
1455
+ doi:10.1103/PhysRevLett.38.195.
1456
+ [12] H. Takahashi et al., “Observation of a
1457
+ 6
1458
+ ΛΛHe double hypernucleus”, Phys. Rev. Lett. 87
1459
+ (2001) 212502, doi:10.1103/PhysRevLett.87.212502.
1460
+
1461
+ References
1462
+ 13
1463
+ [13] K. Nakazawa and H. Takahashi, “Experimental study of double-Λ hypernuclei with
1464
+ nuclear emulsion”, Prog. Theor. Phys. Supplement 185 (2010) 335,
1465
+ doi:10.1143/PTPS.185.335.
1466
+ [14] Belle Collaboration, “Search for an H-dibaryon with a mass near 2mΛ in Υ(1S) and
1467
+ Υ(2S) decays”, Phys. Rev. Lett. 110 (2013) 222002,
1468
+ doi:10.1103/PhysRevLett.110.222002, arXiv:1302.4028.
1469
+ [15] ALICE Collaboration, “ΛK femtoscopy in Pb-Pb collisions at √sNN = 2.76 TeV”, Phys.
1470
+ Rev. C 103 (2021) 055201, doi:10.1103/PhysRevC.103.055201,
1471
+ arXiv:2005.11124.
1472
+ [16] C. Loizides, J. Kamin, and D. d’Enterria, “Improved Monte Carlo Glauber predictions at
1473
+ present and future nuclear colliders”, Phys. Rev. C 97 (2018) 054910,
1474
+ doi:10.1103/PhysRevC.97.054910, arXiv:1710.07098.
1475
+ [17] R. Lednick´y and V. L. Lyuboshitz, “Final state interaction effect on pairing correlations
1476
+ between particles with small relative momenta”, Sov. J. Nucl. Phys. 35 (1982) 770.
1477
+ [18] HEPData record for this analysis, 2022. doi:10.17182/hepdata.133573.
1478
+ [19] Tracker Group of the CMS Collaboration, “The CMS phase-1 pixel detector upgrade”,
1479
+ JINST 16 (2021) P02027, doi:10.1088/1748-0221/16/02/P02027,
1480
+ arXiv:2012.14304.
1481
+ [20] CMS Collaboration, “Track impact parameter resolution for the full pseudorapidity
1482
+ coverage in the 2017 dataset with the CMS phase-1 pixel detector”, CMS Detector
1483
+ Performance Note CMS-DP-2020-049, 2020.
1484
+ [21] CMS Collaboration, “Performance of the CMS level-1 trigger in proton-proton collisions
1485
+ at √s = 13 TeV”, JINST 15 (2020) P10017, doi:10.1088/1748-0221/15/10/P10017,
1486
+ arXiv:2006.10165.
1487
+ [22] CMS Collaboration, “The CMS trigger system”, JINST 12 (2017) 01020,
1488
+ doi:10.1088/1748-0221/12/01/P01020, arXiv:1609.02366.
1489
+ [23] CMS Collaboration, “The CMS experiment at the CERN LHC”, JINST 3 (2008) S08004,
1490
+ doi:10.1088/1748-0221/3/08/S08004.
1491
+ [24] CMS Collaboration, “Precision luminosity measurement in proton-proton collisions at
1492
+ √s = 13 TeV in 2015 and 2016 at CMS”, Eur. Phys. J. C 81 (2021) 800,
1493
+ doi:10.1140/epjc/s10052-021-09538-2, arXiv:2104.01927.
1494
+ [25] CMS Collaboration, “CMS luminosity measurement using nucleus-nucleus collisions at
1495
+ √sNN = 5.02 TeV in 2018”, CMS Physics Analysis Summary CMS-PAS-LUM-18-001, 2022.
1496
+ [26] CMS Collaboration, “Charged-particle nuclear modification factors in PbPb and pPb
1497
+ collisions at √sNN = 5.02 TeV”, JHEP 04 (2017) 039, doi:10.1007/JHEP04(2017)039,
1498
+ arXiv:1611.01664.
1499
+ [27] CMS Collaboration, “Description and performance of track and primary-vertex
1500
+ reconstruction with the CMS tracker”, JINST 9 (2014) P10009,
1501
+ doi:10.1088/1748-0221/9/10/p10009, arXiv:1405.6569.
1502
+
1503
+ 14
1504
+ [28] CMS Collaboration, “Transverse-momentum and pseudorapidity distributions of
1505
+ charged hadrons in pp collisions at √s = 0.9 and 2.36 TeV”, JHEP 02 (2010) 041,
1506
+ doi:10.1007/JHEP02(2010)041, arXiv:1002.0621.
1507
+ [29] CMS Collaboration, “Observation and studies of jet quenching in PbPb collisions at
1508
+ nucleon-nucleon √sNN = 2.76 TeV”, Phys. Rev. C 84 (2011) 024906,
1509
+ doi:10.1103/PhysRevC.84.024906, arXiv:1102.1957.
1510
+ [30] C. Gale, S. Jeon, and B. Schenke, “Hydrodynamic modeling of heavy ion collisions”, Int.
1511
+ J. Mod. Phys. A 28 (2013) 1340011, doi:10.1142/S0217751X13400113,
1512
+ arXiv:1301.5893.
1513
+ [31] GEANT4 Collaboration, “GEANT4—a simulation toolkit”, Nucl. Instrum. Meth. A 506
1514
+ (2003) 250, doi:10.1016/S0168-9002(03)01368-8.
1515
+ [32] CMS Collaboration, “Strange hadron collectivity in pPb and PbPb collisions”, 2022.
1516
+ arXiv:2205.00080.
1517
+ [33] CMS Collaboration, “Strange particle production in pp collisions at √s = 0.9 and 7 TeV”,
1518
+ JHEP 05 (2011) 064, doi:10.1007/JHEP05(2011)064, arXiv:1102.4282.
1519
+ [34] CMS Collaboration, “Long-range two-particle correlations of strange hadrons with
1520
+ charged particles in pPb and PbPb collisions at LHC energies”, Phys. Lett. B 742 (2015)
1521
+ 200, doi:10.1016/j.physletb.2015.01.034, arXiv:1409.3392.
1522
+ [35] Particle Data Group Collaboration, “Review of particle physics”, Prog. Theor. Exp. Phys.
1523
+ 2022 (2022) 083C01, doi:10.1093/ptep/ptac097.
1524
+ [36] H. Voss, A. H¨ocker, J. Stelzer, and F. Tegenfeldt, “TMVA, the toolkit for multivariate data
1525
+ analysis with ROOT”, in XIth International Workshop on Advanced Computing and Analysis
1526
+ Techniques in Physics Research (ACAT), p. 40. 2007. arXiv:physics/0703039.
1527
+ doi:10.22323/1.050.0040.
1528
+ [37] G. I. Kopylov, “Like particle correlations as a tool to study the multiple production
1529
+ mechanism”, Phys. Lett. B 50 (1974) 472, doi:10.1016/0370-2693(74)90263-9.
1530
+ [38] A. Kisiel, “Non-identical particle correlation analysis in the presence of non-femtoscopic
1531
+ correlations”, Acta Phys. Polon. B 48 (2017) 717, doi:10.5506/APhysPolB.48.717.
1532
+ [39] ALICE Collaboration, “pp, p-Λ, and Λ-Λ correlations studied via femtoscopy in pp
1533
+ reactions at √s = 7 TeV”, Phys. Rev. C 99 (2019) 024001,
1534
+ doi:10.1103/PhysRevC.99.024001, arXiv:1805.12455.
1535
+ [40] STAR Collaboration, “Neutral kaon interferometry in Au+Au collisions at
1536
+ √sNN = 200 GeV”, Phys. Rev. C 74 (2006) 054902,
1537
+ doi:10.1103/PhysRevC.74.054902, arXiv:nucl-ex/0608012.
1538
+ [41] A. D. Martin and E. N. Ozmutlu, “Analyses of KK production and scalar mesons”, Nucl.
1539
+ Phys. B 158 (1979) 520, doi:10.1016/0550-3213(79)90180-9.
1540
+ [42] A. Antonelli, “Radiative φ decays”, eConfC 020620 (2002) THAT06,
1541
+ doi:10.48550/ARXIV.HEP-EX/0209069, arXiv:hep-ex/0209069.
1542
+ [43] N. N. Achasov and V. V. Gubin, “Analysis of the nature of the φ → γπη and φ → γπ0π0
1543
+ decays”, Phys. Rev. D 63 (2001) 094007, doi:10.1103/PhysRevD.63.094007,
1544
+ arXiv:hep-ph/0101024.
1545
+
1546
+ References
1547
+ 15
1548
+ [44] N. N. Achasov and A. V. Kiselev, “New analysis of the KLOE data on the φ → ηπ0γ
1549
+ decay”, Phys. Rev. D 68 (2003) 014006, doi:10.1103/PhysRevD.68.014006,
1550
+ arXiv:hep-ph/0212153.
1551
+ [45] F. James and M. Roos, “Minuit: A system for function minimization and analysis of the
1552
+ parameter errors and correlations”, Comput. Phys. Commun. 10 (1975) 343,
1553
+ doi:10.1016/0010-4655(75)90039-9.
1554
+ [46] PHENIX Collaboration, “L´evy-stable two-pion Bose–Einstein correlations in
1555
+ √sNN = 200 GeV Au+Au collisions”, Phys. Rev. C 97 (2018) 064911,
1556
+ doi:10.1103/PhysRevC.97.064911, arXiv:1709.05649.
1557
+ [47] ALICE Collaboration, “One-dimensional pion, kaon, and proton femtoscopy in Pb-Pb
1558
+ collisions at √sNN = 2.76 TeV”, Phys. Rev. C 92 (2015) 054908,
1559
+ doi:10.1103/PhysRevC.92.054908, arXiv:1506.07884.
1560
+ [48] STAR Collaboration, “ΛΛ correlation function in Au+Au collisions at √sNN = 200 GeV”,
1561
+ Phys. Rev. Lett. 114 (2015) 022301, doi:10.1103/PhysRevLett.114.022301,
1562
+ arXiv:1408.4360.
1563
+ [49] E. Hiyama et al., “Four-body cluster structure of A = 7–10 double-Λ hypernuclei”, Phys.
1564
+ Rev. C 66 (2002) 024007, doi:10.1103/physrevc.66.024007,
1565
+ arXiv:nucl-th/0204059.
1566
+ [50] I. N. Filikhin and A. Gal, “Faddeev–Yakubovsky calculations for light ΛΛ hypernuclei”,
1567
+ Nucl. Phys. A 707 (2002) 491, doi:10.1016/s0375-9474(02)01008-4,
1568
+ arXiv:nucl-th/0203036.
1569
+
5tE4T4oBgHgl3EQf1g0M/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
5tE5T4oBgHgl3EQfPQ4_/content/2301.05503v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:966b1fb0989ac99432d40524a378c431cdf73e7cc03cc52a1621c91165212a8a
3
+ size 261178
5tE5T4oBgHgl3EQfPQ4_/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:bb377f3a2d5310d42ad841592d206638287bd2171452e6232a317b5e4d165409
3
+ size 122451
69FKT4oBgHgl3EQf_y40/content/tmp_files/2301.11963v1.pdf.txt ADDED
@@ -0,0 +1,662 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ arXiv:2301.11963v1 [hep-th] 27 Jan 2023
2
+ On 10 dimensional Exceptional Drinfel’d Algebras
3
+ Sameer Kumar1, Edvard T. Musaev2
4
+ Moscow Institute of Physics and Technology,
5
+ Institutskii pereulok 9, Dolgoprudny, 141700, Russia
6
+ Abstract
7
+ Based on the Mubarakzyanov’s classification of four-dimensional real Lie Algebras,
8
+ we classify ten-dimensional Exceptional Drinfel’d Algebras (EDA). The classifica-
9
+ tion is restricted to EDAs whose maximal isotropic (geometric) subalgebras cannot
10
+ be represented as a product of a 3D Lie algebra and a 1D abelian factor. We show
11
+ that all obtained EDAs are inequivalent and conclude that there are no Nambu-Lie
12
+ U-dualities between 11D supergravity backgrounds within 10D EDAs.
13
14
15
+
16
+ 1
17
+ Introduction
18
+ String theory is a background-dependent theory meaning that dynamics of the string is
19
+ defined on a fixed background of space-time fields including the metric, the dilaton, Kalb-
20
+ Ramond 2-form field, and Ramond-Ramond p-form fields. The moduli space of these vacua
21
+ appears to be highly degenerate due to duality symmetries of string theory. Some of them, such
22
+ as (abelian) T-dualities are exact perturbative symmetries of the superstring partition function
23
+ at all orders in α′ and gs [1–3]. This implies that physics of the string does does not change if the
24
+ underlying space-time background is transformed by T-duality. Given a non-abelian algebra of
25
+ isometries of a string background, abelian T-duality transformation rules can be generalized to
26
+ what is called non-abelian T-duality (NATD) [4]. In contrast to the abelian case NATD is not
27
+ an exact quantum symmetry of the conformal theory due to problems with definition of winding
28
+ modes [5]. However, the NATD transformation map can be corrected to be a valid symmetry
29
+ at the leading order in α′ [6,7]. Using the notion of non-commutative currents, the non-abelian
30
+ T-duality transformations can be extended to Poisson-Lie T-dualities that are symmetries of
31
+ string theory in the same sense [8,9]. While abelian T-duality starts from a background with
32
+ certain abelian isometries and preserves them, non-abelian T-duality breaks the non-abelian
33
+ algebra of initial isometries naively preventing from performing the inverse transformation.
34
+ The algebraic structure behind non-abelian T-duality symmetries, that is classical Drinfeld
35
+ algebras, reveals that the initial isometry becomes hidden inside the algebra. More specifically
36
+ classical Drinfeld algebra D is defined in terms of Manin triple (D, g, ˜g), where D is a Lie algebra
37
+ with non-degenerate quadratic form η, and g and ˜g are subalgebras maximally isotropic with
38
+ respect to the form. The algebra g is commonly referred to as the geometric subalgebra, and
39
+ is responsible for the background space, i.e.
40
+ a group manifold or a coset space, while ˜g is
41
+ commonly referred to as the dual algebra and it is responsible for conservation laws of the
42
+ sigma model. To illustrate that, denote fabc and ˜fabc as structure constants of the algebras - g
43
+ and ˜g, respectively. Then the following holds,
44
+ [va, vb] = fab
45
+ cvc,
46
+ dJa = ˜fa
47
+ bcJb ∧ Jc.
48
+ (1.1)
49
+ Here, vectors va define action of G = exp g on itself or on a coset space as δxi = vaiǫa, where
50
+ xi denote coordinates on the group (coset) manifold. Noether currents Ja = Ja idxi satisfy
51
+ the non-commutative conservation law.
52
+ When ˜fabc = 0, the currents are conserved in the
53
+ usual sense. Non-abelian T-duality simply maps g ↔ ˜g, hence vanishing ˜fabc get replaced by
54
+ 2
55
+
56
+ non-vanishing fabc and the conservation law becomes non-commutative. The initial isometry
57
+ becomes hidden in g′ = ˜g and is no longer manifest. In this language the condition for classical
58
+ equations of motion for the string to satisfy is simply the Leibniz identity
59
+ [X, [Y, Z]] = [[X, Y ], Z] + [Y, [X, Z]],
60
+ X, Y ∈ D.
61
+ (1.2)
62
+ Here, the brackets are given by the following relations in terms of the generators (Ta, ˜T a) =
63
+ bas D:
64
+ [Ta, Tb] = fab
65
+ cTc,
66
+ [ ˜T a, ˜T a] = fc
67
+ ab ˜T c,
68
+ [ ˜T a, Tb] = ˜fc
69
+ ab ˜T c + fab
70
+ cTc.
71
+ (1.3)
72
+ In terms of structure constants, Leibniz identity is equivalent to Jacobi identities for fabc and
73
+ ˜fabc along with the following mixed identity
74
+ ˜fl
75
+ jkfmi
76
+ l + ˜fm
77
+ klfli
78
+ j + ˜fi
79
+ jlflm
80
+ k + ˜fm
81
+ jlfil
82
+ k + ˜fi
83
+ klflm
84
+ j = 0.
85
+ (1.4)
86
+ For a review of the algebraic construction behind Poisson-Lie T-dualities see [10], for a review of
87
+ applications of NATD see [11,12], for formulation of Poisson-Lie T-dualities in the supergravity
88
+ language see [13,14], for geometric aspects see [15,16]
89
+ In the most general case when both sets of structure constants are non-zero, one is able
90
+ to define the so-called Poisson-Lie duality transformations. When dim g = d, these are such
91
+ O(d, d) maps CAB that preserve the structure of classical Drinfel’d double:
92
+ TA → CA
93
+ BTB,
94
+ TA = (Ta, ˜T a).
95
+ (1.5)
96
+ There is a distinguished set of such transformations called Poisson-Lie (PL) T-dualities (plu-
97
+ ralities) when the map CAB relates different realization of the same Drinfeld algebra. The
98
+ simplest example is the swapping g ↔ ˜g. For lower dimensional Lie algebras full classification
99
+ of all possible Poisson-Lie T-dualities or likewise of all equivalent Manin triples is available [17].
100
+ This is based on classification of all possible dual algebras ˜g for each g belonging to the Bianchi
101
+ classification of three-dimensional real Lie algebras (for more on classification of Lie Algebras,
102
+ see for example [18]). More generally, one may have maps CAB that relate different Drinfeld
103
+ algebras, for example, Yang-Baxter deformations that draw the interest since they preserve
104
+ integrability of the underlying sigma-model [19].
105
+ When extending abelian T-duality symmetries by S-dualities that are non-perturbative
106
+ 3
107
+
108
+ transformations exchanging gs with g−1
109
+ s , one arrives at U-duality transformations that are
110
+ symmetries of M-theory. Speaking more concretely, U-duality is a symmetry of classical field
111
+ equations of 11D supergravity compactified on a d-torus. These are known as Cremmer-Julia
112
+ symmetries and are given by the exceptional groups Ed(d) [20,21]. In M-theory, whose low-energy
113
+ approximation is given by 11D supergravity, U-duality can be thought of as symmetries of BPS
114
+ states [22] or in terms of a Buscher-like procedure for M2-brane wrapping a 4-torus [23,24]. The
115
+ algebraic structure behind Poisson-Lie T-dualities can be extended to the so-called Exceptional
116
+ Drinfeld Algebras (EDA), that include the usual abelian U-dualities (Cremmer-Julia symme-
117
+ tries) [25–27]. Keeping the more detailed description of EDAs to the next section, we mention
118
+ that these are Leibniz algebras with generators TA on which exceptional group Ed(d) acts in the
119
+ same sense as the orthogonal group O(d, d) acts on generators of the classical Drinfeld double.
120
+ Nambu-Lie U-dualities are then transformations that preserve the structure of the EDA. What
121
+ differs these from the PL T-duality case is that there is no naturally defined analogue of the
122
+ swapping g ↔ ˜g, simply due to the following two facts: i) dimension of the geometric subalgebra
123
+ g of an EDA is never half of dimension of the EDA itself, ii) orthogonal completion of g inside
124
+ the EDA is not an algebra. For this reason, searching for pairs of 11D geometries related by a
125
+ Nambu-Lie U-duality is an extremely complicated task for a general EDA. At the moment few
126
+ examples of such dualities between 11D backgrounds and solutions to Type IIB supergravity
127
+ equations are known [28, 29]. In [30] a general procedure has been suggested similar to the
128
+ natural swapping g ↔ ˜g based on external automorphisms of Ed(d) group. Further it has been
129
+ used to generate few examples of mutually dual backgrounds in [31].
130
+ In this work, we elaborate further on the results of [30,31] that in particular state that there
131
+ are no non-abelian U-dualities in the defined sense between 11D background. The narrative
132
+ we follow is along the same lines as [32] where a full classification of 6D Exceptional Drinfeld
133
+ Doubles based on 3D geometric algebras has been presented. Starting from the classification
134
+ of four-dimensional real Lie algebras [33], we construct all possible EDAs for a representative
135
+ of each class. For each pair of such obtained EDAs we search for an SL(5) transformation
136
+ relating them, that would mean existence of a Nambu-Lie U-duality between backgrounds that
137
+ geometrically realize the corresponding geometric algebras g. Restricting ourselves to only such
138
+ 4D real Lie algebras that do not contain a 1d (abelian) factor we find no such transformations.
139
+ The restriction is motivated by the interest only in dualities between 11D background as maps
140
+ from 11D→IIB are known.
141
+ The paper is structured as follows. In the beginning of Section 2 we briefly review the con-
142
+ struction of Exceptional Drinfel’s Algebras. In Section 2.1 we discuss the geometric realization
143
+ of EDAs and Nambu-Lie U-dualities. In Section 2.2, we present classification of 10D EDAs,
144
+ 4
145
+
146
+ given the conditions stated in the preceding section and state the main results of the paper
147
+ 2
148
+ Exceptional Drinfel’d Algebras
149
+ Before proceeding with the classification of 10d EDAs, let us briefly review the algebraic
150
+ construction following [25, 26]. We will be focusing on the 10d case where generators of the
151
+ exceptional Drinfeld algebra ED4 are collected into the 10-dimensional representation of the
152
+ SL(5) group basED4 = {TAB}, where A, B = 1, . . . , 5. Multiplication table is then given by
153
+ TAB ◦ TCD = i
154
+ 2FAB,CD
155
+ GHTGH.
156
+ (2.1)
157
+ The structures constants FAB,CDGH are defined by the following relations
158
+ FAB,CD
159
+ GH = 4FAB,[C
160
+ [GδH]
161
+ D]
162
+ (2.2)
163
+ FAB,C
164
+ D = 1
165
+ 2ǫABCGHZGHD + 1
166
+ 2δD
167
+ [ASB]C + 1
168
+ 3δD
169
+ [AτB]C + 1
170
+ 6δD
171
+ C τAB,
172
+ (2.3)
173
+ where τ is antisymmetric and S is a symmetric tensor, while Z[ABC] = 0. For the algebra to be an
174
+ EDA, components of the constants ZABC, SAB and τAB under decomposition SL(5) ←֓ GL(4)
175
+ must be defined as
176
+ Zabc = 1
177
+ 6ǫabcdfde
178
+ e + 1
179
+ 4ǫabeffef
180
+ c,
181
+ S5a = fab
182
+ b − 3Za,
183
+ τ5a = 9
184
+ 2Za − 1
185
+ 2fab
186
+ b
187
+ Z5[a,b] = 1
188
+ 6
189
+ ˜fc
190
+ abc,
191
+ Sab = 1
192
+ 3
193
+ ˜f(a
194
+ cdeǫb)cde,
195
+ τab = −1
196
+ 6
197
+ ˜f[a
198
+ cdeǫb]cde
199
+ Zab,5 = −Z5a,b + Z5b,a.
200
+ (2.4)
201
+ The constants FAB,CD have the same structure as the embedding tensor of [34], and in this
202
+ language the above construction implies that only the geometric flux (anholonomy coefficients)
203
+ and Q-flux are turned on. The former is given by the structure constants fabc of the geometric
204
+ subalgebra g and the latter is given by ˜fabcd. The algebra is Leibniz with the fundamental
205
+ identity given by the quadratic relations analogous to those of 7d maximal gauged SUGRA [34]:
206
+ 2F G
207
+ AB[CF I
208
+ GD],H − F I
209
+ ABGF G
210
+ CDH + F G
211
+ ABHF I
212
+ CDG = 0.
213
+ (2.5)
214
+ 5
215
+
216
+ In terms of structure constants fabc and dual constants fabcd, the conditions become
217
+ 6ff[a
218
+ [c ˜fb]
219
+ de]f + fab
220
+ f ˜ff
221
+ cde − 1
222
+ 3
223
+ ˜f[a
224
+ cdefb]f
225
+ f = 0
226
+ ˜fc
227
+ abcfbd
228
+ d = 0,
229
+ fde
230
+ a ˜f bde
231
+ c
232
+ − 1
233
+ 3
234
+ ˜fc
235
+ abdfde
236
+ e = 0
237
+ ˜fc
238
+ abg ˜fg
239
+ def − 3 ˜fc
240
+ g[de ˜fg
241
+ f]ab = 0.
242
+ (2.6)
243
+ The last of the above equations is also referred to as the dual Jacobi condition, just as the
244
+ dual conditions in the Manin triples. It describes the internal (isolated) relations between the
245
+ structure constants of the dual algebra.
246
+ As in the case of Classical Drinfeld Algebra, in general, there might exist multiple equivalent
247
+ choices of the geometric subalgebra g inside an EDA. Proper generalization of the isometry
248
+ condition to the case of exceptional structures has been given in [25,26] and can be written as
249
+ follows
250
+ ǫABCDETAB ⊗ TCD
251
+ ����
252
+ g⊗g
253
+ = 0.
254
+ (2.7)
255
+ In other words, for a given EDA, its geometric subalgebra g is spanned by such a subset of the
256
+ whole set of generators {TAB} that satisfy the above condition. For Classical Drinfel’d Double
257
+ the condition is ηABTA ⊗ TB = 0, implying that one may, for example, take bas g = {Ta},
258
+ or bas g = { ˜T a}. For EDAs, one choice is self-evident - bas g = {T5a}, while presenting an
259
+ alternative choice is usually a hard task. This implies that there is no natural generalization
260
+ of the Non-Abelian T-duality transformation swapping g ↔ ˜g in the case of EDAs, although
261
+ certain progress in defining an analogue of these swappings has been done in [30,31].
262
+ 2.1
263
+ Geometric realization and dualities
264
+ The algebraic structure of EDAs stands behind Nambu-Lie U-dualities of supergravity so-
265
+ lutions. These can map solutions to 11D supergravity equations into each other or into Type
266
+ IIB supergravity equations. Such duality transformations map the group manifolds correspond-
267
+ ing to different choices of the geometric subalgebra g into each other. For more detailed and
268
+ concrete algorithm of constructing mutually dual backgrounds see [31]. Below, we will briefly
269
+ recall the overall construction and highlight relations to Exceptional Field Theory (ExFT) that
270
+ provide convenient variables for writing such duality maps [35, 36]. These are Ed(d)-covariant
271
+ field theories defined in 11-dimensional space-time with an explicit split - 11 = D + d. The
272
+ D-dimensional space-time is usually referred to as the external, the d-dimensional space is
273
+ 6
274
+
275
+ usually referred to as internal, although no compactification is assumed. In the d = 4 case
276
+ relevant to the present discussion, field content of the theory includes the external metric gµν,
277
+ ten vector fields AµMN, five 2-form fields BµνM, and 14 scalar fields parametrized by a coset
278
+ element MMN ∈ SL(5)/SO(5). The indices µ = 0, . . . , 6 parameterize directions of the external
279
+ space-time whereas the indices M, N = 1, . . . , 5 belong to the 5 of SL(5). For more details of
280
+ the construction see [37]. Here we are interested in the special case where all fields transform-
281
+ ing in irreps of SL(5) can be decomposed in terms of matrices EABMN (generalized vielbeins)
282
+ geometrically realizing an EDA. In compact notation one writes
283
+ [EAB, ECD] = FAB,CD
284
+ EFEEF,
285
+ (2.8)
286
+ where the constants FAB,CDEF are precisely the structure constants of the EDA and the brackets
287
+ denote the so-called generalized Lie derivative of ExFT.
288
+ Generalized vielbeins are parametrized by fields of 11D supergravity in the 11 = 7 + 4 split
289
+ transforming as scalars under 7-dimensional diffeomorphisms. Introducing a unity matrix MAB
290
+ compose
291
+ MMN,KL = 2EMN
292
+ ABEKL
293
+ CDMACMBD = MMKMNL − MMLMNK.
294
+ (2.9)
295
+ The symmetric matrix
296
+ mMN = e− φ
297
+ 2
298
+
299
+ |g|− 1
300
+ 2gij
301
+ Vi
302
+ Vj
303
+ |g|
304
+ 1
305
+ 2(1 + V 2)
306
+
307
+ (2.10)
308
+ is then defined in terms of the 4d metric gmn on the group manifold, the vector V m = 1
309
+ 3!ǫmnklCnkl
310
+ and a scalar field eφ = |g7|1/7 which is the determinant |g7| of external 7 dimensional space.
311
+ The metric gmn on the group manifold is defined as usual in terms of Maurer-Cartan forms.
312
+ Let g ∈ G = exp g be an element of the group G whose Lie algebra is g, then 1-forms on the
313
+ group manifold g−1dg ∈ g. In components we have
314
+ g−1dg = rm
315
+ aTadxm,
316
+ (2.11)
317
+ where xm are some coordinates on the group manifold.
318
+ Given an EDA and a choice of the isotropic subalgebra g one can explicitly construct
319
+ the corresponding generalized vielbein. A step-by-step algorithm of this procedure based on
320
+ constructing adjoint action of eh ∈ G for some h ∈ g on an element of EDA can be found
321
+ in [38]. An alternative choice of the isotropic subalgebra, if exists, is related to the given one
322
+ by an SL(5) transformation
323
+ T ′
324
+ AB = CA
325
+ CCB
326
+ DTCD.
327
+ (2.12)
328
+ 7
329
+
330
+ If this transformation respects the structure of EDA, then the alternative isotropic subalgebra
331
+ is spanned by T ′
332
+ 5a. Structure constants of the EDA then transform as
333
+ F ′
334
+ A′B′,C′D′ = CA′ACB′BCC′CCD
335
+ D′FAB,C
336
+ D.
337
+ (2.13)
338
+ Note that not any such matrix corresponds to a Nambu-Lie U-duality transformation. Indeed,
339
+ one can always perform a GL(4) transformation on generators of a given algebra g thus changing
340
+ explicit realization of the corresponding EDA. Two EDA’s related by such transformation then
341
+ correspond to 11D backgrounds related by a coordinate transformation. Another trivial choice
342
+ is
343
+ CA
344
+ B =
345
+
346
+ 14×4
347
+ λm
348
+ 0
349
+ 1
350
+
351
+ ,
352
+ (2.14)
353
+ that corresponds to simply a gauge transformation of the 3-form Cmnk. To avoid counting
354
+ of EDA’s related by a rotation of the basis of their isotropic subalgebras we first classify
355
+ Exceptional Drinfeld Algebras using classification of 4D real Lie Algebras.
356
+ 2.2
357
+ Classification of 10 dimensional EDA’s
358
+ The main goal of this work is to investigate relations between 10d EDAs that correspond
359
+ to Nambu-Lie U-duality transformations of 11-dimensional supergravity backgrounds. For this
360
+ purpose, we start with a classification of 10D EDAs of certain class based on the classification of
361
+ 4-dimensional real Lie Algebras by Mubarakzyanov [33] (for a review in English see [18]). Since
362
+ explicit examples of Nambu-Lie U-dualities between 11D and Type IIB backgrounds are known
363
+ in the literature, we are interested here only in EDAs constructed on 4d real Lie Algebras g4
364
+ that cannot be decomposed into a sum g4 = g4 ⊕ g1, where g3 is a 3d Lie algebra and g1 is
365
+ 1-dimensional Abelan factor. We list all relevant 4d real Lie Algebras in Table 1.
366
+ g4,1
367
+ [T2, T4] = T1
368
+ [T3, T4] = T2
369
+ g4,5
370
+ [T1, T4] = AT1
371
+ [T2, T4] = BT2
372
+ [T3, T4] = CT3
373
+ ABC̸= 0
374
+ g4,9
375
+ [T2, T3] = T1
376
+ [T1, T4] = 2AT1
377
+ [T2, T4] = AT2 − T3
378
+ [T3, T4] = T2 + AT3
379
+ A > 0
380
+ g4,2
381
+ [T2, T4] = βT1
382
+ [T2, T4] = T2
383
+ [T3, T4] = T2 + T3
384
+ g4,6
385
+ [T1, T4] = AT1
386
+ [T2, T4] = BT2 − T3
387
+ [T3, T4] = T2 + BT3
388
+ A > 0
389
+ g4,10
390
+ [T1, T3] = T1
391
+ [T2, T3] = T2
392
+ [T1, T4] = −T2
393
+ [T2, T4] = T1
394
+ 8
395
+
396
+ g4,3
397
+ [T1, T4] = T1
398
+ [T3, T4] = T2
399
+ g4,7
400
+ [T2, T3] = T1
401
+ [T1, T4] = 2T1
402
+ [T2, T4] = T2
403
+ [T3, T4] = T2 + T3
404
+ 2g2,1
405
+ [T1, T2] = T1
406
+ [T3, T4] = T3
407
+ g4,4
408
+ [T1, T4] = T1
409
+ [T2, T4] = T1 + T2
410
+ [T3, T4] = T2 + T3
411
+ g4,8
412
+ [T2, T3] = T1
413
+ [T1, T4] = (1 + β)T1
414
+ [T2, T4] = T2
415
+ [T3, T4] = βT3
416
+ β ∈ [−1, 1]
417
+ Table 1: Classification of 4-dimensional indecomposable
418
+ real Lie algebras g4,n with n = 1, . . . , 10. The algebra
419
+ 2g2,1 is decomposable, however does not have a u(1) fac-
420
+ tor.
421
+ To arrive at the corresponding classification of 10d EDAs, we solve quadratic constraints
422
+ for each class in the table above to find all possible sets of the dual structure coefficients ˜fdabc.
423
+ To solve the equations we use mathematical software Mathematica , that gives us all the 4
424
+ dimensional EDAs in the chosen class.
425
+ The result is listed in Table 2, where only unique
426
+ combinations of indices are explicitly given in the coefficients of the underlying algebra. The
427
+ rest of the indices are obtained by the antisymmetric property of the structure coefficients.
428
+ EDA
429
+ Structure Constants ˜f abcd
430
+ g4,1
431
+ 1.
432
+ ˜f 1232 = ˜f 1344, ˜f 1242 = ˜f 1343
433
+ ˜f 1234 =
434
+ ˜f 1233 ˜f 1344 − ˜f 1244 ˜f 1344
435
+ 2 ˜f 1343
436
+ ˜f 1243 = ( ˜f 1244 − ˜f 1233) ˜f 1343
437
+ 2 ˜f 1344
438
+ 2.
439
+ ˜f 1232 = − ˜f 1344, ˜f 1244 = ˜f 1233, ˜f 2344 = ˜f 1231
440
+ 3.
441
+ ˜f 1242 = ˜f 1343 ˜f 1244 = ˜f 1233
442
+ 4.
443
+ ˜f 1244 = ˜f 1233, ˜f 2344 = ˜f 1231
444
+ g4,2
445
+ 5.
446
+ ˜f 1244 = −1
447
+ 3 (1 + 2β) ˜f 1233
448
+ 6
449
+ ˜f 2344 =
450
+ 1
451
+ 3β(β − 4) ˜f 1231
452
+ g4,3
453
+ 7.
454
+ ˜f 2344 = 1
455
+ 3 ˜f 1231
456
+ g4,4
457
+ 8.
458
+ ˜f 1244 = − ˜f 123
459
+ 3
460
+ g4,5
461
+ 9.
462
+ ˜f 1244 = −2A−2B+C
463
+ 3C
464
+ ˜f 1233
465
+ 9
466
+
467
+ 10.
468
+ ˜f 1344 =
469
+ 1
470
+ 3B(2A − B + 2C) ˜f 1232
471
+ 11.
472
+ ˜f 2344 =
473
+ 1
474
+ 3A(A − 2B − 2C) ˜f 1231
475
+ g4,6
476
+ 12.
477
+ ˜f 2344 =
478
+ 1
479
+ 3A(A − 2B − 2C) ˜f 1231
480
+ g4,7
481
+ 13.
482
+ ˜f 1244 = −5
483
+ 3 ˜f 1233
484
+ g4,8
485
+ 14.
486
+ ˜f 1244 = − 1
487
+ 3β(4 − β) ˜f 1233
488
+ 15.
489
+ ˜f 1344 = 1
490
+ 3(1 + 4B) ˜f 1232
491
+ g4,9
492
+ ˜f abcd = 0 or imaginary
493
+ g4,10
494
+ ˜f abcd = 0
495
+ 2g2,1
496
+ 16.
497
+ ˜f 1234 = ˜f 1232, ˜f 1342 = ˜f 1344
498
+ Table 2: All possible structure constant of 10d EDAs for
499
+ each g4,n with n = 1, . . . , 10 and 2g2,1. The constants
500
+ A, B, C, β are the same as in the previous table.
501
+ Hence, given we are interested only in real non-trivial EDAs, we end up with 16 examples.
502
+ A natural question would be: whether there exists a pair of EDAs in this set that are equivalent
503
+ up to an SL(5) transformation. This would mean that the same EDA can be generated by two
504
+ 4d Lie Algebras that belong to different classes. In the supergravity language this would mean
505
+ existence of a Nambu-Lie U-duality between 11D backgrounds geometrically realizing this pair
506
+ of 4d Lie algebras. Result of our calculations is that there are no such pairs. To arrive at this
507
+ statement we used Mathematica software and explicitly solve equations on components of the
508
+ matrix CAB for each pair of 16 algebras with no further restrictions on the coefficients. This
509
+ means, that although in Table 2 we list algebras as though all explicitly written dual structure
510
+ constants are non-vanishing, our code does not assume that [39].
511
+ 3
512
+ Discussion
513
+ In this work we obtain a classification of 10-dimensional EDA based on the classification of
514
+ 4-dimensional real Lie Algebras by Mubarakzyanov [33]. We intentionally restrict only to such
515
+ 4d algebras that cannot be decomposed into a 3d algebra and a 1d abelian factor, i.e, we are
516
+ interested in Nambu-Lie U-dualities between 11d backgrounds, rather than dualities between
517
+ 11D and Type IIB solutions. More specifically, we look only at EDAs whose isotropic (geomet-
518
+ ric) subalgebra is given by g4,n with n = 1, ..., 10 and 2g2,1 in terms of the Mubarakzyanov’s
519
+ classification. Given these restrictions the classification of EDAs is summarized in Table 2,
520
+ 10
521
+
522
+ where 16 non-trivial EDAs are listed in terms of dual structure constants ˜fabcd.
523
+ The important question we were interested in is whether there exists a Nambu-Lie U-duality
524
+ between 11D solutions and supergravity equations. Equivalently, in the algebraic language:
525
+ whether any of the sixteen exceptional Drinfeld algebras are equivalent up to an SL(5) trans-
526
+ formation? For that we computed the explicit form of all possible transformations between all
527
+ possible pairs of EDA listed in Table 2 of the form (2.13). In our findings, we discovered that
528
+ none of the EDA pairs except the (ED2, ED4) possess transformation matrices, taking the basis
529
+ of one EDA to another, with a non-zero determinant. Moreover, the transformation relating the
530
+ aforesaid algebras - ED2 and ED4 is simply a GL(4) transformation rotating the basis. Hence,
531
+ these two solutions are equivalent and their geometric realizations can be mapped into each
532
+ other by a 4D coordinate transformation. Hence, there are no Nambu-Lie U-dualities inside
533
+ SL(5) exceptional Drinfeld algebras relating 11D backgrounds. Note however, this does not
534
+ rule out transformations between 11D and Type IIB backgrounds, explicit examples of which
535
+ are known [28, 29]. Previously in [30] the same has been shown for transformations involving
536
+ external automorphisms of the algebra sl(5), suggested as the natural analogue of Non-Abelian
537
+ T-duality transformations. Here we complete the statement.
538
+ There are further directions to extend this work. The most obvious task is to complete
539
+ the classification including all 4D real Lie algebras and list sets of EDA’s mutually Nambu-
540
+ Lie U-dual. Less straightforward is to increase the dimension of the geometric subalgebra g
541
+ by one and consider 16D Exceptional Drinfeld Algebras. Unfortunately, there is no ready to
542
+ use classification of 5D real Lie algebras, but certain restricted classifications are present in
543
+ the literature. Some useful examples can be found in [40–43], for a review see [44]. Another
544
+ interesting direction of further research is to list those EDAs from our classification that can be
545
+ obtained as generalized Yang-Baxter deformations of the trivial EDA when all dual structure
546
+ constants are zero. In other words, to answer the question: for which algebras in Table 2 dual
547
+ structre constants can be represented in the form
548
+ ˜fa
549
+ bcd = re[bcfae
550
+ d],
551
+ (3.1)
552
+ where rabc is completely antisymmetric. In the case of classical Drinfeld algebras such trans-
553
+ formations are known to preserve integrability of the 2d sigma-model on the corresponding
554
+ background.
555
+ There is no analogous statement for 3d sigma-models describing membranes
556
+ propagating on 11d supergravity backgrounds. However, such defined generalized Yang-Baxter
557
+ deformations are of certain interest (see [45] for a review).
558
+ 11
559
+
560
+ Acknowledgments
561
+ This work has been supported by the Foundation for the Advancement of Theoretical
562
+ Physics and Mathematics “BASIS”, grant No 21-1-2-3-1 and by Russian Ministry of Education
563
+ and Science.
564
+ References
565
+ [1] T. H. Buscher, “A Symmetry of the String Background Field Equations,” Phys. Lett.
566
+ B194 (1987) 59–62.
567
+ [2] T. H. Buscher, “Path Integral Derivation of Quantum Duality in Nonlinear Sigma
568
+ Models,” Phys. Lett. B201 (1988) 466–472.
569
+ [3] A. Giveon, M. Porrati, and E. Rabinovici, “Target space duality in string theory,”
570
+ Phys.Rept. 244 (1994) 77–202, arXiv:hep-th/9401139 [hep-th].
571
+ [4] X. C. de la Ossa and F. Quevedo, “Duality symmetries from nonAbelian isometries in
572
+ string theory,” Nucl. Phys. B 403 (1993) 377–394, arXiv:hep-th/9210021.
573
+ [5] A. Giveon and M. Rocek, “On Nonabelian duality,” Nucl.Phys. B421 (1994) 173–190,
574
+ arXiv:hep-th/9308154 [hep-th].
575
+ [6] F. Hassler and T. Rochais, “α′-Corrected Poisson-Lie T-Duality,” Fortsch. Phys. 68
576
+ no. 9, (2020) 2000063, arXiv:2007.07897 [hep-th].
577
+ [7] R. Borsato and L. Wulff, “Quantum Correction to Generalized T Dualities,” Phys. Rev.
578
+ Lett. 125 no. 20, (2020) 201603, arXiv:2007.07902 [hep-th].
579
+ [8] C. Klimcik and P. Severa, “Dual nonAbelian duality and the Drinfeld double,” Phys.
580
+ Lett. B 351 (1995) 455–462, arXiv:hep-th/9502122.
581
+ [9] C. Klimˇc´ık and P. Severa, “Poisson-Lie T duality and loop groups of Drinfeld doubles,”
582
+ Phys. Lett. B372 (1996) 65–71, arXiv:hep-th/9512040 [hep-th].
583
+ [10] C. Klimcik, “Poisson-Lie T duality,” Nucl. Phys. B Proc. Suppl. 46 (1996) 116–121,
584
+ arXiv:hep-th/9509095.
585
+ 12
586
+
587
+ [11] K. Sfetsos, “Recent developments in non-Abelian T-duality in string theory,” Fortsch.
588
+ Phys. 59 (2011) 1149–1153, arXiv:1105.0537 [hep-th].
589
+ [12] D. C. Thompson, “An Introduction to Generalised Dualities and their Applications to
590
+ Holography and Integrability,” PoS CORFU2018 (2019) 099, arXiv:1904.11561
591
+ [hep-th].
592
+ [13] F. Hassler, “Poisson-Lie T-Duality in Double Field Theory,” Phys. Lett. B 807 (2020)
593
+ 135455, arXiv:1707.08624 [hep-th].
594
+ [14] S. Demulder, F. Hassler, and D. C. Thompson, “An invitation to Poisson-Lie T-duality
595
+ in Double Field Theory and its applications,” PoS CORFU2018 (2019) 113,
596
+ arXiv:1904.09992 [hep-th].
597
+ [15] M. Bugden, “Non-abelian T-folds,” JHEP 03 (2019) 189, arXiv:1901.03782 [hep-th].
598
+ [16] L. Hlavat´y and I. Petr, “T-folds as Poisson-Lie plurals,” arXiv:2004.08387 [hep-th].
599
+ [17] L. Hlavaty and L. Snobl, “Classification of 6-dimensional manin triples,”
600
+ arXiv:math/0202209.
601
+ [18] R. O. Popovych, V. M. Boyko, M. O. Nesterenko, and M. W. Lutfullin, “Realizations of
602
+ real low-dimensional Lie algebras,” J. Phys. A 36 (2003) 7337–7360,
603
+ arXiv:math-ph/0301029.
604
+ [19] C. Klimˇc´ık, “On integrability of the Yang-Baxter sigma-model,” J. Math. Phys. 50
605
+ (2009) 043508, arXiv:0802.3518 [hep-th].
606
+ [20] E. Cremmer and B. Julia, “The SO(8) supergravity,” Nucl.Phys. B159 (1979) 141.
607
+ [21] E. Cremmer, B. Julia, H. Lu, and C. Pope, “Dualization of dualities. 1.,” Nucl.Phys.
608
+ B523 (1998) 73–144, arXiv:hep-th/9710119 [hep-th].
609
+ [22] N. Obers and B. Pioline, “U duality and M theory,” Phys.Rept. 318 (1999) 113–225,
610
+ arXiv:hep-th/9809039 [hep-th].
611
+ [23] M. Duff, “Duality rotations in string theory,” Nucl.Phys. B335 (1990) 610.
612
+ [24] M. Duff and J. Lu, “Duality rotations in membrane theory,” Nucl.Phys. B347 (1990)
613
+ 394–419.
614
+ 13
615
+
616
+ [25] Y. Sakatani, “U-duality extension of Drinfel’d double,” PTEP 2020 no. 2, (2020)
617
+ 023B08, arXiv:1911.06320 [hep-th].
618
+ [26] E. Malek and D. C. Thompson, “Poisson-Lie U-duality in Exceptional Field Theory,”
619
+ JHEP 04 (2020) 058, arXiv:1911.07833 [hep-th].
620
+ [27] E. Malek, Y. Sakatani, and D. C. Thompson, “E6(6) exceptional Drinfel’d algebras,”
621
+ JHEP 01 (2021) 020, arXiv:2007.08510 [hep-th].
622
+ [28] C. D. A. Blair, D. C. Thompson, and S. Zhidkova, “Exploring Exceptional Drinfeld
623
+ Geometries,” JHEP 09 (2020) 151, arXiv:2006.12452 [hep-th].
624
+ [29] C. D. A. Blair and S. Zhidkova, “Generalised U-dual solutions in supergravity,” JHEP
625
+ 05 (2022) 081, arXiv:2203.01838 [hep-th].
626
+ [30] E. T. Musaev, “On non-abelian U-duality of 11D backgrounds,” arXiv:2007.01213
627
+ [hep-th].
628
+ [31] E. T. Musaev and Y. Sakatani, “Non-Abelian U duality at work,” Phys. Rev. D 104
629
+ no. 4, (2021) 046015, arXiv:2012.13263 [hep-th].
630
+ [32] L. Hlavaty, “Classification of 6D Leibniz algebras,” PTEP 2020 no. 7, (2020) 071B01,
631
+ arXiv:2003.06164 [hep-th].
632
+ [33] G. Mubarakzyanov, “On solvable Lie algebras,” Izv. Vys. Ucheb. Zaved. Matematika 1
633
+ (32) (1963) 114–123.
634
+ [34] H. Samtleben and M. Weidner, “The Maximal D=7 supergravities,” Nucl.Phys. B725
635
+ (2005) 383–419, arXiv:hep-th/0506237 [hep-th].
636
+ [35] O. Hohm and H. Samtleben, “U-duality covariant gravity,” JHEP 1309 (2013) 080,
637
+ arXiv:1307.0509 [hep-th].
638
+ [36] O. Hohm and H. Samtleben, “Exceptional Form of D=11 Supergravity,” Phys.Rev.Lett.
639
+ 111 (2013) 231601, arXiv:1308.1673 [hep-th].
640
+ [37] E. T. Musaev, “Exceptional field theory: SL(5),” JHEP 02 (2016) 012,
641
+ arXiv:1512.02163 [hep-th].
642
+ [38] Y. Sakatani, “Type II DFT solutions from Poisson-Lie T-duality/plurality,”
643
+ arXiv:1903.12175 [hep-th]. [PTEP,073B04(2019)].
644
+ 14
645
+
646
+ [39] S. Kumar and E. T. Musaev, “eda10,” 1, 2023. https://github.com/emusaev/eda10.
647
+ [40] I. Darijani and H. Usefi, “Classification of 5-dimensional restricted Lie algebras over
648
+ perfect fields, I,” Journal of Algebra 464 (2016) 97–140, arXiv:1412.8377.
649
+ [41] A. Andrada and A. Fino, “A class of Sasakian 5-manifolds,” Transformation Groups 14
650
+ (2009) 493–512, arXiv:0807.1800 [math.dg].
651
+ [42] L. Bieszk, “Classification of Five-Dimensional Lie Algebras of Class T2,” Demonstratio
652
+ Mathematica 30 no. 2, (1997) 403–424. https://doi.org/10.1515/dema-1997-0219.
653
+ [43] G. Calvaruso and A. Perrone, “Five-dimensional paracontact Lie algebras,” Differential
654
+ Geometry and its Applications 45 (2016) 115–129.
655
+ https://www.sciencedirect.com/science/article/pii/S0926224516000024.
656
+ [44] L. B. Prieto, E. M. F. Martel, J. N. Vald´es, and ´A. F. Tenorio, “A historical review of
657
+ the classifications of Lie algebras,” Revista De La Union Matematica Argentina 54
658
+ (2013) 75–99.
659
+ [45] K. Gubarev and E. Musaev, “Integrability structures in string theory,”
660
+ arXiv:2301.06486 [hep-th].
661
+ 15
662
+
6dE1T4oBgHgl3EQfTQOX/content/tmp_files/2301.03076v1.pdf.txt ADDED
@@ -0,0 +1,362 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Decomposition of the static potential in SU(3) gluodynamics
2
+ V. G. Bornyakov
3
+ NRC “Kurchatov Institute” - IHEP, Protvino, 142281 Russia
4
+ I. Kudrov
5
+ NRC “Kurchatov Institute” - IHEP, Protvino, 142281 Russia,
6
+ Moscow Institute of Physics and Technology, Institutskii per. 9, 141700, Dolgoprudny, Russia
7
+ After fixing the Maximal Abelian gauge in SU(3) lattice gluodynamics we decompose the non-
8
+ abelian gauge field into the Abelian field created by Abelian monopoles and the modified nonabelian
9
+ field with monopoles removed. We then calculate respective static potentials in the fundamental
10
+ representation and show that the sum of these potentials approximates the nonabelian static poten-
11
+ tial with good precision at all distances considered. Comparison with other ways of decomposition
12
+ is made.
13
+ PACS numbers: 11.15.Ha, 12.38.Gc, 12.38.Aw
14
+ Keywords: gauge field theory, confinement, monopoles, maximal Abelian gauge
15
+ I.
16
+ INTRODUCTION
17
+ We study numerically the lattice SU(3) gluodynamics in the Maximal Abelian gauge (MAG) and consider decom-
18
+ position of the lattice gauge field Uµ(x) ∈ SU(3)
19
+ Uµ(x) = U mod
20
+ µ
21
+ (x)U mon
22
+ µ
23
+ (x)
24
+ (1)
25
+ where U mon
26
+ µ
27
+ (x) is the component of the gauge field due to Abelian monopoles (to be defined later) and U mod
28
+ µ
29
+ (x)
30
+ is respectively the monopoleless component which we call a modified gauge field. By modification we understand
31
+ removal of the Abelian monopoles.
32
+ This kind of decomposition was studied before in SU(2) gluodynamics in [1]. It was shown that while the monopole
33
+ component U mon
34
+ µ
35
+ (x) is reproducing the linear part of the static potential, the monopoleless component U mod
36
+ µ
37
+ (x)
38
+ produces purely Coulomb potential and their sum provides a good approximation of the original unaltered static
39
+ potential at all distances:
40
+ V (R) ≈ Vmod(R) + Vmon(R)
41
+ (2)
42
+ Recently, in [2] it was shown that this approximation becomes better when the lattice spacing is decreased leaving a
43
+ possibility that relation (2) becomes exact in the continuum limit. It was also shown that (2) is satisfied in SU(2)
44
+ QCD as well. In the present work we extend the study of the decomposition (1) to the more realistic case - SU(3)
45
+ gluodynamics.
46
+ It is well known [3–7] that after performing the Abelian projection in the MAG [8, 9], the Abelian string tension
47
+ calculated from the Abelian static potential is very close to the nonabelian string tension. This observation, confirmed
48
+ in gluodynamics and in QCD, supports the concept of the Abelian dominance (for a review see e.g. [10]). It was further
49
+ discovered [5, 11, 12] that the so called monopole static potential also has string tension close to the nonabelian one.
50
+ These observations are in agreement with conjecture that monopole degrees of freedom are responsible for confinement
51
+ [13].
52
+ The interesting question is what is the role of the other, i.e. monopoleless degrees of freedom. The results obtained
53
+ in SU(2) gluodynamics suggest that they are responsible for the Coulomb part of the static potential both at small
54
+ and large distances. This suggests that while at small distances U mod
55
+ µ
56
+ (x) gives perturbative contribution into the
57
+ static potential, it provides nonperturbative contribution at large distances.
58
+ It is worth to note that the gauge covariant decomposition was introduced in Refs. [14] and [15] and developed
59
+ further in Refs. [16–18], see for review [19]. The numerical results demonstrating analogues of the Abelian dominance
60
+ and the monopole dominance within this approach were obtained in [20]. It would be interesting to check if the
61
+ decomposition into the monopole and monopoleless components works in this approach.
62
+ The decomposition different from eq. (1) was considered in SU(3) gluodynamics after fixing MAG [7]. The usual
63
+ coset decomposition of the gauge field into the Abelian and the off-diagonal components was used:
64
+ Uµ(x) = U offd
65
+ µ
66
+ (x)U Abel
67
+ µ
68
+ (x)
69
+ (3)
70
+ arXiv:2301.03076v1 [hep-lat] 8 Jan 2023
71
+
72
+ 2
73
+ and respective decomposition for the static potential was verified:
74
+ V (R) ≈ Voffd(R) + VAbel(R).
75
+ (4)
76
+ We will compare our results for decomposition (4) with results of Ref. [7] in section III.
77
+ The decomposition similar to (2) for the static potential in the maximal center gauge
78
+ V (R) ≈ Vcent(R) + Vmod,cent(R)
79
+ (5)
80
+ corresponding to the decomposition of the gauge field into the center and modified (vortex free) components:
81
+ Uµ(x) = U mod,cent
82
+ µ
83
+ (x)U cent
84
+ µ
85
+ (x) .
86
+ (6)
87
+ was first checked long ago in SU(2) gluodynamics [1] and was studied recently in QCD [21]. We will comment on
88
+ these numerical results later in section III.
89
+ II.
90
+ DECOMPOSITION OF THE GAUGE FIELD
91
+ We consider the SU(3) lattice gluodynamics after fixing MAG. We use the definition of MAG introduced for lattice
92
+ SU(N) theory in [22] and later specified for the SU(3) group in [23]. The MAG is fixed by maximizing the functional
93
+ F =
94
+ 1
95
+ 8 V
96
+
97
+ x,µ
98
+
99
+ |U (11)
100
+ µ
101
+ (x)|2 + |U (22)
102
+ µ
103
+ (x)|2 + |U (33)
104
+ µ
105
+ (x)|2 − 1
106
+
107
+ (7)
108
+ with respect to local gauge transformations g of the lattice gauge field,
109
+ Uµ(x) → U g
110
+ µ(x) = g(x)†Uµ(x)g(x + ˆµ) .
111
+ (8)
112
+ To fix MAG, the simulated annealing algorithm with three random gauge copies was used. This algorithm was first
113
+ used to fix MAG in the SU(2) case [5] and then extended to the SU(3) group in [24]. The details of implementation
114
+ of the simulated annealing algorithm in the case of SU(3) gauge group can be found in [25]. For the gauge fixing
115
+ functional F we obtained the average value < F >= 0.73388(1) to be compared with < F > 0.7322(2) quoted in [26].
116
+ The larger is the value of the maximized functional the better is the gauge fixing. The difference in < F > is due
117
+ to the Gribov copies effects and implies that there might be substantial difference between our results and results of
118
+ Ref. [26] for gauge dependent quantities like Abelian or monopole string tension as discussed in details in [25].
119
+ The Abelian projection means coset decomposition (3) of the nonabelian lattice gauge field Uµ(x) ∈ SU(3) into the
120
+ Abelian field U Abel
121
+ µ
122
+ (x) ∈ U(1) × U(1) and the coset field U offd
123
+ µ
124
+ (x) ∈ SU(3)/U(1) × U(1). The Abelian field U Abel
125
+ µ
126
+ (x)
127
+ is determined as
128
+ U Abel
129
+ µ
130
+ (x) = diag
131
+
132
+ u(1)
133
+ µ (x), u(2)
134
+ µ (x), u(3)
135
+ µ (x)
136
+
137
+ ,
138
+ (9)
139
+ where
140
+ u(a)
141
+ µ (x) = eiθ(a)
142
+ µ
143
+ (x)
144
+ (10)
145
+ with
146
+ θ(a)
147
+ µ (x) = arg (Uµ(x))a − 1
148
+ 3
149
+ 3
150
+
151
+ b=1
152
+ arg(Uµ(x))b
153
+ ��
154
+ mod 2π
155
+ (11)
156
+ such that
157
+ θ(a)
158
+ µ (x) ∈ [−4
159
+ 3π, 4
160
+ 3π] .
161
+ (12)
162
+ This definition of Abelian projection uµ(x) maximizes the expression |Tr
163
+
164
+ U †
165
+ µ(x)uµ(x)
166
+
167
+ |2 [27]. The Abelian gauge
168
+ fields can in turn be decomposed into monopole (singular) and photon (regular) parts:
169
+ θ(a)
170
+ µ (x) = θ(a) mon
171
+ µ
172
+ (x) + θ(a) ph
173
+ µ
174
+ (x) ,
175
+ (13)
176
+
177
+ 3
178
+ The monopole part is defined by [28]:
179
+ θ(a) mon
180
+ µ
181
+ (x) = 2π
182
+
183
+ y
184
+ D(x − y)∂−
185
+ α m(a)
186
+ αµ(y) ,
187
+ (14)
188
+ where integers m(a)
189
+ µν (x) denote the singular part of the Abelian plaquettes (Dirac plaquettes), ∂−
190
+ α is the backward
191
+ lattice derivative, and D(x) denotes the lattice Coulomb propagator. Then U mon
192
+ µ
193
+ (x) introduced in (1) is defined as
194
+ U mon
195
+ µ
196
+ (x) = diag
197
+
198
+ eiθ(1) mon
199
+ µ
200
+ (x), eiθ(2) mon
201
+ µ
202
+ (x), eiθ(3) mon
203
+ µ
204
+ (x)�
205
+ .
206
+ (15)
207
+ III.
208
+ THE STATIC POTENTIAL DECOMPOSITION
209
+ We calculated R × T rectangular Wilson loops W(R, T), Wmon(R, T) and Wmod(R, T) using lattice gauge fields
210
+ Uµ(x), U mon
211
+ µ
212
+ (x), U mod
213
+ µ
214
+ (x) introduced above. To extract respective static potentials V (R), Vmon(R) and Vmod(R) the
215
+ APE smearing [29] has been employed. Computations were done with the Wilson lattice action at β = 6.0 on 244
216
+ lattices using 5000) statistically independent configurations. The lattice spacing at this value of the bare coupling
217
+ constant is defined by a/r0 = 0.186(4) [30], where r0 = 0.5fm is called Sommer parameter. In Fig. 1 our results
218
+ are presented. One can see that similar to the SU(2) gluodynamics [2] the monopole potential Vmon(R) is almost
219
+ perfectly linear with small curvature at small distances while the modified field potential Vmod(R) is well described
220
+ by the Coulomb potential. It is also seen that the relation (2) is valid at all distances with most essential discrepancy
221
+ of about 10% at large distances. It is clear that this discrepancy is mostly due to rather low slope of Vmon(R). As we
222
+ have already mentioned it was found in SU(2) gluodynamics that with decreasing of the lattice spacing agreement in
223
+ relation (2) improves substantially. This should be checked in SU(3) gluodynamics in future.
224
+ FIG. 1: Comparison of the nonabelian potential V (R) (filled circles) with the sum Vmod(R)+Vmon(R) (filled triangles). Vmod(r)
225
+ (empty circles) and Vmon(r) (filled inverted triangles) are also depicted. The solid curves show the fits to the Cornell potential.
226
+ Next we come to our results for decomposition (4) considered in Ref. [7]. These results are presented in Fig. 2.
227
+ In this figure we compare the original potential V (R) with the decompositions (2) and (4). One can see that the
228
+ decomposition (2) clearly works better. Both decompositions should be checked in the continuum limit. In any case,
229
+ our results clearly contradict to the conclusion made in Ref. [7] that the relation (4) is satisfied very nicely already at
230
+ β = 6.0. Comparing our results presented here with results we obtained on 164 lattices we found that finite volume
231
+ effects are small. We should note that in [7] slightly different procedure of the Abelian projection was used but as
232
+ it was claimed in Ref. [31] the differences between these two procedures of Abelian projection are negligible. Thus
233
+ our understanding is that the reason for such discrepancy with results of Ref. [7] is the difference in the gauge fixing
234
+ quality. It was shown in the past that the Gribov copy effects for gauge non-invariant quantities might be quite
235
+ substantial [25, 31].
236
+
237
+ SU3
238
+ mon
239
+ mod
240
+ mon+mod
241
+ 5
242
+ 4
243
+ V(R)
244
+ 3
245
+ 0
246
+ 0.5
247
+ 1.0
248
+ 1.5
249
+ 2.0
250
+ R/ro4
251
+ potential
252
+ σr2
253
+ 0
254
+ α
255
+ r0V0
256
+ V (R)
257
+ 1.34(2) -0.34(1) 3.61(2)
258
+ Vmon(R)
259
+ 0.99(1) 0.09(1) -0.36(2)
260
+ Vmod(R)
261
+ 0
262
+ -0.42(1) 4.22(1)
263
+ Vmon(R) + Vmod(R) 0.94(1) -0.39(1) 3.98(2)
264
+ TABLE I: Parameters of the potentials obtained by fits to function V0 − α/R + σR.
265
+ FIG. 2: Comparison of the nonabelian potential V (R) (filled circles) with the sum Vmod(R)+Vmon(R) (filled inverted triangles)
266
+ and the sum VAbel(R) + Voffd(R) (filled squares). Voffd(r) (filled triangles) and VAbel(r) (empty circles) are also depicted. The
267
+ solid curves show the fits to the Cornell potential.
268
+ Next we wish to make a remark about the decomposition (5). This decomposition was first studied in [1] using
269
+ the Direct Central gauge in SU(2) gluodynamics. It was concluded that this decomposition holds with substantially
270
+ less precision than the decomposition (2), first of all, due to the low string tension provided by the center vortex
271
+ component. To queue the problem of low string tension obtained after the center projection the new approach to
272
+ the definition of the center gauge was formulated and successfully applied to SU(2) gluodynamics in [32]. Recently
273
+ this decomposition was studied in the lattice QCD with light quarks [21]. It was found that in this theory the center
274
+ projected string tension is in a very good agreement with the physical string tension. On the other hand, the modified
275
+ component U mod,cent
276
+ µ
277
+ (x) produces the static potential which is not compatible with the Coulomb potential. Thus, the
278
+ decomposition fails to work at small distances.
279
+ IV.
280
+ CONCLUSIONS
281
+ There are a few suggestions for the decomposition of the gauge field into components describing (mostly) either
282
+ infrared or ultra-violate physics. These include the gauge covariant Cho decomposition [14–18], two decompositions
283
+ in the MAG, eqs. (1) and (3) and one decomposition in the maximal center gauge (6). In this work we extended
284
+ our study of the decomposition in MAG into the monopole and the modified (monopoleless) components in SU(2)
285
+ gluodynamics and SU(2) QCD [2] to the case of SU(3) gluodynamics. We presented our results for one lattice spacing
286
+ to demonstrate that the decomposition works quite well. Our results obtained in [2] for SU(2) gluodynamics give
287
+ hope that the decomposition (1) will work even better when the lattice spacing will be decreased.
288
+ Our results for another MAG decomposition, 3, contradict to results from Ref. [7] and also indicate that the
289
+ decomposition 1 is superior. There is another reason to consider the decomposition 1 better motivated physically
290
+ than the decomposition 3. The decompositon 1 separates out the monopole component U mon
291
+ µ
292
+ (x) which is responsible
293
+
294
+ SU(3)
295
+ mon+mod
296
+ abel
297
+ offdiag
298
+ abel+offdiag
299
+ 5
300
+ 4
301
+ V(R)
302
+ 3
303
+ 2
304
+ 1
305
+ 0
306
+ 0.5
307
+ 1.0
308
+ 1.5
309
+ 2.0
310
+ R/ro5
311
+ for the linear part of the static potential as well as for the chiral symmetry breaking. The modified (monopoleless)
312
+ component U mod
313
+ µ
314
+ (x) produces purely Coulomb potential which is in agreement with the original Coulomb part both
315
+ at small and large distances. At the same time in the decomposition 3 the Coulomb part is distributed in an unnatural
316
+ way between two components: Abelian and off-diagonal.
317
+ It is clear that the study of both decompositions at varying lattice spacing are necessary to understand their fate
318
+ in the continuum limit. This is the subject of our future work.
319
+ [1] V. G. Bornyakov, M. I. Polikarpov, G. Schierholz, et al, Nucl. Phys. B Proc. Suppl. 153, 25-32 (2006) [arXiv:hep-
320
+ lat/0512003 [hep-lat]].
321
+ [2] V. G. Bornyakov, I. Kudrov and R. N. Rogalyov, Phys. Rev. D 105, no.5, 054519 (2022) [arXiv:2101.04196 [hep-lat]].
322
+ [3] T. Suzuki and I. Yotsuyanagi, Phys. Rev. D 42 (1990) 4257.
323
+ [4] S. Hioki, S. Kitahara, S. Kiura, et al, Phys. Lett. B 272, 326 (1991) [Erratum-ibid. B 281, 416 (1992)].
324
+ [5] G. S. Bali, V. Bornyakov, M. Muller-Preussker and K. Schilling, Phys. Rev. D 54 (1996) 2863.
325
+ [6] V. Bornyakov and M. Muller-Preussker, Nucl. Phys. Proc. Suppl. 106, 646 (2002).
326
+ [7] N. Sakumichi and H. Suganuma, Phys. Rev. D 90 (2014) no.11, 111501.
327
+ [8] A. S. Kronfeld, M. L. Laursen, G. Schierholz and U. J. Wiese, Phys. Lett. B 198, 516 (1987).
328
+ [9] G. ’t Hooft, Nucl. Phys. B 190 (1981) 455.
329
+ [10] M. N. Chernodub and M. I. Polikarpov, in ”Confinement, Duality and Non-perturbative Aspects of QCD”, p.387, Plenum
330
+ Press, 1998, hep-th/9710205; R. W. Haymaker, Phys. Rept. 315 (1999) 153; J. Greensite, Prog. Part. Nucl. Phys. 51
331
+ (2003), 1
332
+ [11] H. Shiba and T. Suzuki, Phys. Lett. B 333, 461 (1994).
333
+ [12] J. D. Stack, S. D. Neiman and R. J. Wensley, Phys. Rev. D 50, 3399 (1994).
334
+ [13] G. ’t Hooft, in High Energy Physics, ed. A. Zichichi, EPS International Conference, Palermo (1975); S. Mandelstam, Phys.
335
+ Rept. 23, 245 (1976).
336
+ [14] Y. M. Cho, Phys. Rev. D 21 (1980), 1080 doi:10.1103/PhysRevD.21.1080
337
+ [15] Y.S. Duan and M.L. Ge, Sinica Sci., 11, 1072–1081 (1979).
338
+ [16] L. Faddeev and A.J. Niemi, Phys. Rev. Lett. 82, 1624–1627 (1999); L.D. Faddeev and A.J. Niemi, Nucl. Phys. B776, 38-65
339
+ (2007).
340
+ [17] S.V. Shabanov, Phys. Lett. B458, 322–330 (1999); S.V. Shabanov, Phys. Lett. B463, 263–272 (1999).
341
+ [18] K. I. Kondo, T. Murakami and T. Shinohara, Prog. Theor. Phys. 115 (2006), 201-216; S. Kato, K. I. Kondo, T. Murakami,
342
+ A. Shibata, T. Shinohara and S. Ito, Phys. Lett. B 632 (2006), 326-332.
343
+ [19] K. I. Kondo, S. Kato, A. Shibata and T. Shinohara, Phys. Rept. 579 (2015), 1-226.
344
+ [20] S. Kato, K. I. Kondo and A. Shibata, Phys. Rev. D 91 (2015) no.3, 034506.
345
+ [21] J. C. Biddle, W. Kamleh and D. B. Leinweber, Phys. Rev. D 106 (2022) no.5, 054505 doi:10.1103/PhysRevD.106.054505
346
+ [arXiv:2206.00844 [hep-lat]].
347
+ [22] A. S. Kronfeld, G. Schierholz and U. J. Wiese, Nucl. Phys. B 293 (1987), 461-478.
348
+ [23] F. Brandstater, U. J. Wiese and G. Schierholz, Phys. Lett. B 272 (1991), 319-325.
349
+ [24] V. Bornyakov, G. Schierholz and T. Streuer, Nucl. Phys. B Proc. Suppl. 106 (2002), 676-678 doi:10.1016/S0920-
350
+ 5632(01)01813-8 [arXiv:hep-lat/0111018 [hep-lat]].
351
+ [25] V. G. Bornyakov et al. [DIK], Phys. Rev. D 70 (2004), 074511 doi:10.1103/PhysRevD.70.074511 [arXiv:hep-lat/0310011
352
+ [hep-lat]].
353
+ [26] H. Ohata and H. Suganuma, Phys. Rev. D 102 (2020) no.1, 014512.
354
+ [27] V. G. Bornyakov et al. [DIK], Phys. Rev. D 71 (2005), 114504 doi:10.1103/PhysRevD.71.114504 [arXiv:hep-lat/0401014
355
+ [hep-lat]].
356
+ [28] J. Smit and A. van der Sijs, Nucl. Phys. B 355 (1991), 603-648
357
+ [29] M. Albanese et al. [APE], Phys. Lett. B 192 (1987), 163-169
358
+ [30] S. Necco and R. Sommer, Nucl. Phys. B 622 (2002), 328-346.
359
+ [31] J. D. Stack, W. W. Tucker and R. J. Wensley, Nucl. Phys. B 639 (2002), 203-222 doi:10.1016/S0550-3213(02)00537-0
360
+ [arXiv:hep-lat/0110196 [hep-lat]].
361
+ [32] R. Golubich and M. Faber, Particles 3 (2020) no.2, 444-455.
362
+
6dE1T4oBgHgl3EQfTQOX/content/tmp_files/load_file.txt ADDED
@@ -0,0 +1,412 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ filepath=/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf,len=411
2
+ page_content='Decomposition of the static potential in SU(3) gluodynamics V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
3
+ page_content=' G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
4
+ page_content=' Bornyakov NRC “Kurchatov Institute” - IHEP, Protvino, 142281 Russia I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
5
+ page_content=' Kudrov NRC “Kurchatov Institute” - IHEP, Protvino, 142281 Russia, Moscow Institute of Physics and Technology, Institutskii per.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
6
+ page_content=' 9, 141700, Dolgoprudny, Russia After fixing the Maximal Abelian gauge in SU(3) lattice gluodynamics we decompose the non- abelian gauge field into the Abelian field created by Abelian monopoles and the modified nonabelian field with monopoles removed.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
7
+ page_content=' We then calculate respective static potentials in the fundamental representation and show that the sum of these potentials approximates the nonabelian static poten- tial with good precision at all distances considered.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
8
+ page_content=' Comparison with other ways of decomposition is made.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
9
+ page_content=' PACS numbers: 11.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
10
+ page_content='15.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
11
+ page_content='Ha, 12.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
12
+ page_content='38.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
13
+ page_content='Gc, 12.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
14
+ page_content='38.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
15
+ page_content='Aw Keywords: gauge field theory, confinement, monopoles, maximal Abelian gauge I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
16
+ page_content=' INTRODUCTION We study numerically the lattice SU(3) gluodynamics in the Maximal Abelian gauge (MAG) and consider decom- position of the lattice gauge field Uµ(x) ∈ SU(3) Uµ(x) = U mod µ (x)U mon µ (x) (1) where U mon µ (x) is the component of the gauge field due to Abelian monopoles (to be defined later) and U mod µ (x) is respectively the monopoleless component which we call a modified gauge field.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
17
+ page_content=' By modification we understand removal of the Abelian monopoles.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
18
+ page_content=' This kind of decomposition was studied before in SU(2) gluodynamics in [1].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
19
+ page_content=' It was shown that while the monopole component U mon µ (x) is reproducing the linear part of the static potential,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
20
+ page_content=' the monopoleless component U mod µ (x) produces purely Coulomb potential and their sum provides a good approximation of the original unaltered static potential at all distances: V (R) ≈ Vmod(R) + Vmon(R) (2) Recently,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
21
+ page_content=' in [2] it was shown that this approximation becomes better when the lattice spacing is decreased leaving a possibility that relation (2) becomes exact in the continuum limit.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
22
+ page_content=' It was also shown that (2) is satisfied in SU(2) QCD as well.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
23
+ page_content=' In the present work we extend the study of the decomposition (1) to the more realistic case - SU(3) gluodynamics.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
24
+ page_content=' It is well known [3–7] that after performing the Abelian projection in the MAG [8, 9], the Abelian string tension calculated from the Abelian static potential is very close to the nonabelian string tension.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
25
+ page_content=' This observation, confirmed in gluodynamics and in QCD, supports the concept of the Abelian dominance (for a review see e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
26
+ page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
27
+ page_content=' [10]).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
28
+ page_content=' It was further discovered [5, 11, 12] that the so called monopole static potential also has string tension close to the nonabelian one.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
29
+ page_content=' These observations are in agreement with conjecture that monopole degrees of freedom are responsible for confinement [13].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
30
+ page_content=' The interesting question is what is the role of the other, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
31
+ page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
32
+ page_content=' monopoleless degrees of freedom.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
33
+ page_content=' The results obtained in SU(2) gluodynamics suggest that they are responsible for the Coulomb part of the static potential both at small and large distances.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
34
+ page_content=' This suggests that while at small distances U mod µ (x) gives perturbative contribution into the static potential, it provides nonperturbative contribution at large distances.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
35
+ page_content=' It is worth to note that the gauge covariant decomposition was introduced in Refs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
36
+ page_content=' [14] and [15] and developed further in Refs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
37
+ page_content=' [16–18], see for review [19].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
38
+ page_content=' The numerical results demonstrating analogues of the Abelian dominance and the monopole dominance within this approach were obtained in [20].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
39
+ page_content=' It would be interesting to check if the decomposition into the monopole and monopoleless components works in this approach.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
40
+ page_content=' The decomposition different from eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
41
+ page_content=' (1) was considered in SU(3) gluodynamics after fixing MAG [7].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
42
+ page_content=' The usual coset decomposition of the gauge field into the Abelian and the off-diagonal components was used: Uµ(x) = U offd µ (x)U Abel µ (x) (3) arXiv:2301.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
43
+ page_content='03076v1 [hep-lat] 8 Jan 2023 2 and respective decomposition for the static potential was verified: V (R) ≈ Voffd(R) + VAbel(R).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
44
+ page_content=' (4) We will compare our results for decomposition (4) with results of Ref.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
45
+ page_content=' [7] in section III.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
46
+ page_content=' The decomposition similar to (2) for the static potential in the maximal center gauge V (R) ≈ Vcent(R) + Vmod,cent(R) (5) corresponding to the decomposition of the gauge field into the center and modified (vortex free) components: Uµ(x) = U mod,cent µ (x)U cent µ (x) .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
47
+ page_content=' (6) was first checked long ago in SU(2) gluodynamics [1] and was studied recently in QCD [21].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
48
+ page_content=' We will comment on these numerical results later in section III.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
49
+ page_content=' II.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
50
+ page_content=' DECOMPOSITION OF THE GAUGE FIELD We consider the SU(3) lattice gluodynamics after fixing MAG.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
51
+ page_content=' We use the definition of MAG introduced for lattice SU(N) theory in [22] and later specified for the SU(3) group in [23].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
52
+ page_content=' The MAG is fixed by maximizing the functional F = 1 8 V � x,µ � |U (11) µ (x)|2 + |U (22) µ (x)|2 + |U (33) µ (x)|2 − 1 � (7) with respect to local gauge transformations g of the lattice gauge field, Uµ(x) → U g µ(x) = g(x)†Uµ(x)g(x + ˆµ) .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
53
+ page_content=' (8) To fix MAG, the simulated annealing algorithm with three random gauge copies was used.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
54
+ page_content=' This algorithm was first used to fix MAG in the SU(2) case [5] and then extended to the SU(3) group in [24].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
55
+ page_content=' The details of implementation of the simulated annealing algorithm in the case of SU(3) gauge group can be found in [25].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
56
+ page_content=' For the gauge fixing functional F we obtained the average value < F >= 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
57
+ page_content='73388(1) to be compared with < F > 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
58
+ page_content='7322(2) quoted in [26].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
59
+ page_content=' The larger is the value of the maximized functional the better is the gauge fixing.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
60
+ page_content=' The difference in < F > is due to the Gribov copies effects and implies that there might be substantial difference between our results and results of Ref.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
61
+ page_content=' [26] for gauge dependent quantities like Abelian or monopole string tension as discussed in details in [25].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
62
+ page_content=' The Abelian projection means coset decomposition (3) of the nonabelian lattice gauge field Uµ(x) ∈ SU(3) into the Abelian field U Abel µ (x) ∈ U(1) × U(1) and the coset field U offd µ (x) ∈ SU(3)/U(1) × U(1).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
63
+ page_content=' The Abelian field U Abel µ (x) is determined as U Abel µ (x) = diag � u(1) µ (x), u(2) µ (x), u(3) µ (x) � , (9) where u(a) µ (x) = eiθ(a) µ (x) (10) with θ(a) µ (x) = arg (Uµ(x))a − 1 3 3 � b=1 arg(Uµ(x))b �� mod 2π (11) such that θ(a) µ (x) ∈ [−4 3π, 4 3π] .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
64
+ page_content=' (12) This definition of Abelian projection uµ(x) maximizes the expression |Tr � U † µ(x)uµ(x) � |2 [27].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
65
+ page_content=' The Abelian gauge fields can in turn be decomposed into monopole (singular) and photon (regular) parts: θ(a) µ (x) = θ(a) mon µ (x) + θ(a) ph µ (x) , (13) 3 The monopole part is defined by [28]: θ(a) mon µ (x) = 2π � y D(x − y)∂− α m(a) αµ(y) , (14) where integers m(a) µν (x) denote the singular part of the Abelian plaquettes (Dirac plaquettes), ∂− α is the backward lattice derivative, and D(x) denotes the lattice Coulomb propagator.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
66
+ page_content=' Then U mon µ (x) introduced in (1) is defined as U mon µ (x) = diag � eiθ(1) mon µ (x), eiθ(2) mon µ (x), eiθ(3) mon µ (x)� .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
67
+ page_content=' (15) III.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
68
+ page_content=' THE STATIC POTENTIAL DECOMPOSITION We calculated R × T rectangular Wilson loops W(R, T), Wmon(R, T) and Wmod(R, T) using lattice gauge fields Uµ(x), U mon µ (x), U mod µ (x) introduced above.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
69
+ page_content=' To extract respective static potentials V (R), Vmon(R) and Vmod(R) the APE smearing [29] has been employed.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
70
+ page_content=' Computations were done with the Wilson lattice action at β = 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
71
+ page_content='0 on 244 lattices using 5000) statistically independent configurations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
72
+ page_content=' The lattice spacing at this value of the bare coupling constant is defined by a/r0 = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
73
+ page_content='186(4) [30], where r0 = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
74
+ page_content='5fm is called Sommer parameter.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
75
+ page_content=' In Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
76
+ page_content=' 1 our results are presented.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
77
+ page_content=' One can see that similar to the SU(2) gluodynamics [2] the monopole potential Vmon(R) is almost perfectly linear with small curvature at small distances while the modified field potential Vmod(R) is well described by the Coulomb potential.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
78
+ page_content=' It is also seen that the relation (2) is valid at all distances with most essential discrepancy of about 10% at large distances.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
79
+ page_content=' It is clear that this discrepancy is mostly due to rather low slope of Vmon(R).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
80
+ page_content=' As we have already mentioned it was found in SU(2) gluodynamics that with decreasing of the lattice spacing agreement in relation (2) improves substantially.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
81
+ page_content=' This should be checked in SU(3) gluodynamics in future.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
82
+ page_content=' FIG.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
83
+ page_content=' 1: Comparison of the nonabelian potential V (R) (filled circles) with the sum Vmod(R)+Vmon(R) (filled triangles).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
84
+ page_content=' Vmod(r) (empty circles) and Vmon(r) (filled inverted triangles) are also depicted.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
85
+ page_content=' The solid curves show the fits to the Cornell potential.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
86
+ page_content=' Next we come to our results for decomposition (4) considered in Ref.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
87
+ page_content=' [7].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
88
+ page_content=' These results are presented in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
89
+ page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
90
+ page_content=' In this figure we compare the original potential V (R) with the decompositions (2) and (4).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
91
+ page_content=' One can see that the decomposition (2) clearly works better.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
92
+ page_content=' Both decompositions should be checked in the continuum limit.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
93
+ page_content=' In any case, our results clearly contradict to the conclusion made in Ref.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
94
+ page_content=' [7] that the relation (4) is satisfied very nicely already at β = 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
95
+ page_content='0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
96
+ page_content=' Comparing our results presented here with results we obtained on 164 lattices we found that finite volume effects are small.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
97
+ page_content=' We should note that in [7] slightly different procedure of the Abelian projection was used but as it was claimed in Ref.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
98
+ page_content=' [31] the differences between these two procedures of Abelian projection are negligible.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
99
+ page_content=' Thus our understanding is that the reason for such discrepancy with results of Ref.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
100
+ page_content=' [7] is the difference in the gauge fixing quality.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
101
+ page_content=' It was shown in the past that the Gribov copy effects for gauge non-invariant quantities might be quite substantial [25, 31].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
102
+ page_content=' SU3 mon mod mon+mod 5 4 V(R) 3 0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
103
+ page_content='5 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
104
+ page_content='0 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
105
+ page_content='5 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
106
+ page_content='0 R/ro4 potential σr2 0 α r0V0 V (R) 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
107
+ page_content='34(2) -0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
108
+ page_content='34(1) 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
109
+ page_content='61(2) Vmon(R) 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
110
+ page_content='99(1) 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
111
+ page_content='09(1) -0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
112
+ page_content='36(2) Vmod(R) 0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
113
+ page_content='42(1) 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
114
+ page_content='22(1) Vmon(R) + Vmod(R) 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
115
+ page_content='94(1) -0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
116
+ page_content='39(1) 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
117
+ page_content='98(2) TABLE I: Parameters of the potentials obtained by fits to function V0 − α/R + σR.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
118
+ page_content=' FIG.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
119
+ page_content=' 2: Comparison of the nonabelian potential V (R) (filled circles) with the sum Vmod(R)+Vmon(R) (filled inverted triangles) and the sum VAbel(R) + Voffd(R) (filled squares).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
120
+ page_content=' Voffd(r) (filled triangles) and VAbel(r) (empty circles) are also depicted.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
121
+ page_content=' The solid curves show the fits to the Cornell potential.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
122
+ page_content=' Next we wish to make a remark about the decomposition (5).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
123
+ page_content=' This decomposition was first studied in [1] using the Direct Central gauge in SU(2) gluodynamics.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
124
+ page_content=' It was concluded that this decomposition holds with substantially less precision than the decomposition (2), first of all, due to the low string tension provided by the center vortex component.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
125
+ page_content=' To queue the problem of low string tension obtained after the center projection the new approach to the definition of the center gauge was formulated and successfully applied to SU(2) gluodynamics in [32].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
126
+ page_content=' Recently this decomposition was studied in the lattice QCD with light quarks [21].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
127
+ page_content=' It was found that in this theory the center projected string tension is in a very good agreement with the physical string tension.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
128
+ page_content=' On the other hand, the modified component U mod,cent µ (x) produces the static potential which is not compatible with the Coulomb potential.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
129
+ page_content=' Thus, the decomposition fails to work at small distances.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
130
+ page_content=' IV.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
131
+ page_content=' CONCLUSIONS There are a few suggestions for the decomposition of the gauge field into components describing (mostly) either infrared or ultra-violate physics.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
132
+ page_content=' These include the gauge covariant Cho decomposition [14–18], two decompositions in the MAG, eqs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
133
+ page_content=' (1) and (3) and one decomposition in the maximal center gauge (6).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
134
+ page_content=' In this work we extended our study of the decomposition in MAG into the monopole and the modified (monopoleless) components in SU(2) gluodynamics and SU(2) QCD [2] to the case of SU(3) gluodynamics.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
135
+ page_content=' We presented our results for one lattice spacing to demonstrate that the decomposition works quite well.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
136
+ page_content=' Our results obtained in [2] for SU(2) gluodynamics give hope that the decomposition (1) will work even better when the lattice spacing will be decreased.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
137
+ page_content=' Our results for another MAG decomposition, 3, contradict to results from Ref.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
138
+ page_content=' [7] and also indicate that the decomposition 1 is superior.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
139
+ page_content=' There is another reason to consider the decomposition 1 better motivated physically than the decomposition 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
140
+ page_content=' The decompositon 1 separates out the monopole component U mon µ (x) which is responsible SU(3) mon+mod abel offdiag abel+offdiag 5 4 V(R) 3 2 1 0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
141
+ page_content='5 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
142
+ page_content='0 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
143
+ page_content='5 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
144
+ page_content='0 R/ro5 for the linear part of the static potential as well as for the chiral symmetry breaking.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
145
+ page_content=' The modified (monopoleless) component U mod µ (x) produces purely Coulomb potential which is in agreement with the original Coulomb part both at small and large distances.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
146
+ page_content=' At the same time in the decomposition 3 the Coulomb part is distributed in an unnatural way between two components: Abelian and off-diagonal.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
147
+ page_content=' It is clear that the study of both decompositions at varying lattice spacing are necessary to understand their fate in the continuum limit.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
148
+ page_content=' This is the subject of our future work.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
149
+ page_content=' [1] V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
150
+ page_content=' G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
151
+ page_content=' Bornyakov, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
152
+ page_content=' I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
153
+ page_content=' Polikarpov, G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
154
+ page_content=' Schierholz, et al, Nucl.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
155
+ page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
156
+ page_content=' B Proc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
157
+ page_content=' Suppl.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
158
+ page_content=' 153, 25-32 (2006) [arXiv:hep- lat/0512003 [hep-lat]].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
159
+ page_content=' [2] V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
160
+ page_content=' G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
161
+ page_content=' Bornyakov, I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
162
+ page_content=' Kudrov and R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
163
+ page_content=' N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
164
+ page_content=' Rogalyov, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
165
+ page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
166
+ page_content=' D 105, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
167
+ page_content='5, 054519 (2022) [arXiv:2101.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
168
+ page_content='04196 [hep-lat]].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
169
+ page_content=' [3] T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
170
+ page_content=' Suzuki and I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
171
+ page_content=' Yotsuyanagi, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
172
+ page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
173
+ page_content=' D 42 (1990) 4257.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
174
+ page_content=' [4] S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
175
+ page_content=' Hioki, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
176
+ page_content=' Kitahara, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
177
+ page_content=' Kiura, et al, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
178
+ page_content=' Lett.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
179
+ page_content=' B 272, 326 (1991) [Erratum-ibid.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
180
+ page_content=' B 281, 416 (1992)].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
181
+ page_content=' [5] G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
182
+ page_content=' S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
183
+ page_content=' Bali, V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
184
+ page_content=' Bornyakov, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
185
+ page_content=' Muller-Preussker and K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
186
+ page_content=' Schilling, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
187
+ page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
188
+ page_content=' D 54 (1996) 2863.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
189
+ page_content=' [6] V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
190
+ page_content=' Bornyakov and M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
191
+ page_content=' Muller-Preussker, Nucl.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
192
+ page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
193
+ page_content=' Proc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
194
+ page_content=' Suppl.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
195
+ page_content=' 106, 646 (2002).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
196
+ page_content=' [7] N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
197
+ page_content=' Sakumichi and H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
198
+ page_content=' Suganuma, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
199
+ page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
200
+ page_content=' D 90 (2014) no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
201
+ page_content='11, 111501.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
202
+ page_content=' [8] A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
203
+ page_content=' S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
204
+ page_content=' Kronfeld, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
205
+ page_content=' L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
206
+ page_content=' Laursen, G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
207
+ page_content=' Schierholz and U.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
208
+ page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
209
+ page_content=' Wiese, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
210
+ page_content=' Lett.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
211
+ page_content=' B 198, 516 (1987).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
212
+ page_content=' [9] G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
213
+ page_content=' ’t Hooft, Nucl.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
214
+ page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
215
+ page_content=' B 190 (1981) 455.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
216
+ page_content=' [10] M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
217
+ page_content=' N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
218
+ page_content=' Chernodub and M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
219
+ page_content=' I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
220
+ page_content=' Polikarpov, in ”Confinement, Duality and Non-perturbative Aspects of QCD”, p.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
221
+ page_content='387, Plenum Press, 1998, hep-th/9710205;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
222
+ page_content=' R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
223
+ page_content=' W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
224
+ page_content=' Haymaker, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
225
+ page_content=' Rept.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
226
+ page_content=' 315 (1999) 153;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
227
+ page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
228
+ page_content=' Greensite, Prog.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
229
+ page_content=' Part.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
230
+ page_content=' Nucl.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
231
+ page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
232
+ page_content=' 51 (2003), 1 [11] H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
233
+ page_content=' Shiba and T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
234
+ page_content=' Suzuki, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
235
+ page_content=' Lett.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
236
+ page_content=' B 333, 461 (1994).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
237
+ page_content=' [12] J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
238
+ page_content=' D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
239
+ page_content=' Stack, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
240
+ page_content=' D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
241
+ page_content=' Neiman and R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
242
+ page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
243
+ page_content=' Wensley, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
244
+ page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
245
+ page_content=' D 50, 3399 (1994).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
246
+ page_content=' [13] G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
247
+ page_content=' ’t Hooft, in High Energy Physics, ed.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
248
+ page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
249
+ page_content=' Zichichi, EPS International Conference, Palermo (1975);' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
250
+ page_content=' S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
251
+ page_content=' Mandelstam, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
252
+ page_content=' Rept.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
253
+ page_content=' 23, 245 (1976).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
254
+ page_content=' [14] Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
255
+ page_content=' M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
256
+ page_content=' Cho, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
257
+ page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
258
+ page_content=' D 21 (1980), 1080 doi:10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
259
+ page_content='1103/PhysRevD.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
260
+ page_content='21.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
261
+ page_content='1080 [15] Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
262
+ page_content='S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
263
+ page_content=' Duan and M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
264
+ page_content='L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
265
+ page_content=' Ge, Sinica Sci.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
266
+ page_content=', 11, 1072–1081 (1979).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
267
+ page_content=' [16] L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
268
+ page_content=' Faddeev and A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
269
+ page_content='J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
270
+ page_content=' Niemi, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
271
+ page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
272
+ page_content=' Lett.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
273
+ page_content=' 82, 1624–1627 (1999);' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
274
+ page_content=' L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
275
+ page_content='D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
276
+ page_content=' Faddeev and A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
277
+ page_content='J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
278
+ page_content=' Niemi, Nucl.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
279
+ page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
280
+ page_content=' B776, 38-65 (2007).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
281
+ page_content=' [17] S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
282
+ page_content='V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
283
+ page_content=' Shabanov, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
284
+ page_content=' Lett.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
285
+ page_content=' B458, 322–330 (1999);' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
286
+ page_content=' S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
287
+ page_content='V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
288
+ page_content=' Shabanov, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
289
+ page_content=' Lett.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
290
+ page_content=' B463, 263–272 (1999).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
291
+ page_content=' [18] K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
292
+ page_content=' I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
293
+ page_content=' Kondo, T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
294
+ page_content=' Murakami and T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
295
+ page_content=' Shinohara, Prog.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
296
+ page_content=' Theor.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
297
+ page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
298
+ page_content=' 115 (2006), 201-216;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
299
+ page_content=' S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
300
+ page_content=' Kato, K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
301
+ page_content=' I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
302
+ page_content=' Kondo, T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
303
+ page_content=' Murakami, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
304
+ page_content=' Shibata, T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
305
+ page_content=' Shinohara and S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
306
+ page_content=' Ito, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
307
+ page_content=' Lett.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
308
+ page_content=' B 632 (2006), 326-332.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
309
+ page_content=' [19] K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
310
+ page_content=' I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
311
+ page_content=' Kondo, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
312
+ page_content=' Kato, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
313
+ page_content=' Shibata and T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
314
+ page_content=' Shinohara, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
315
+ page_content=' Rept.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
316
+ page_content=' 579 (2015), 1-226.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
317
+ page_content=' [20] S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
318
+ page_content=' Kato, K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
319
+ page_content=' I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
320
+ page_content=' Kondo and A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
321
+ page_content=' Shibata, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
322
+ page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
323
+ page_content=' D 91 (2015) no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
324
+ page_content='3, 034506.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
325
+ page_content=' [21] J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
326
+ page_content=' C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
327
+ page_content=' Biddle, W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
328
+ page_content=' Kamleh and D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
329
+ page_content=' B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
330
+ page_content=' Leinweber, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
331
+ page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
332
+ page_content=' D 106 (2022) no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
333
+ page_content='5, 054505 doi:10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
334
+ page_content='1103/PhysRevD.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
335
+ page_content='106.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
336
+ page_content='054505 [arXiv:2206.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
337
+ page_content='00844 [hep-lat]].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
338
+ page_content=' [22] A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
339
+ page_content=' S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
340
+ page_content=' Kronfeld, G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
341
+ page_content=' Schierholz and U.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
342
+ page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
343
+ page_content=' Wiese, Nucl.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
344
+ page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
345
+ page_content=' B 293 (1987), 461-478.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
346
+ page_content=' [23] F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
347
+ page_content=' Brandstater, U.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
348
+ page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
349
+ page_content=' Wiese and G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
350
+ page_content=' Schierholz, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
351
+ page_content=' Lett.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
352
+ page_content=' B 272 (1991), 319-325.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
353
+ page_content=' [24] V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
354
+ page_content=' Bornyakov, G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
355
+ page_content=' Schierholz and T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
356
+ page_content=' Streuer, Nucl.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
357
+ page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
358
+ page_content=' B Proc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
359
+ page_content=' Suppl.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
360
+ page_content=' 106 (2002), 676-678 doi:10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
361
+ page_content='1016/S0920- 5632(01)01813-8 [arXiv:hep-lat/0111018 [hep-lat]].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
362
+ page_content=' [25] V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
363
+ page_content=' G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
364
+ page_content=' Bornyakov et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
365
+ page_content=' [DIK], Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
366
+ page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
367
+ page_content=' D 70 (2004), 074511 doi:10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
368
+ page_content='1103/PhysRevD.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
369
+ page_content='70.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
370
+ page_content='074511 [arXiv:hep-lat/0310011 [hep-lat]].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
371
+ page_content=' [26] H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
372
+ page_content=' Ohata and H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
373
+ page_content=' Suganuma, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
374
+ page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
375
+ page_content=' D 102 (2020) no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
376
+ page_content='1, 014512.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
377
+ page_content=' [27] V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
378
+ page_content=' G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
379
+ page_content=' Bornyakov et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
380
+ page_content=' [DIK], Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
381
+ page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
382
+ page_content=' D 71 (2005), 114504 doi:10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
383
+ page_content='1103/PhysRevD.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
384
+ page_content='71.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
385
+ page_content='114504 [arXiv:hep-lat/0401014 [hep-lat]].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
386
+ page_content=' [28] J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
387
+ page_content=' Smit and A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
388
+ page_content=' van der Sijs, Nucl.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
389
+ page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
390
+ page_content=' B 355 (1991), 603-648 [29] M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
391
+ page_content=' Albanese et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
392
+ page_content=' [APE], Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
393
+ page_content=' Lett.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
394
+ page_content=' B 192 (1987), 163-169 [30] S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
395
+ page_content=' Necco and R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
396
+ page_content=' Sommer, Nucl.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
397
+ page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
398
+ page_content=' B 622 (2002), 328-346.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
399
+ page_content=' [31] J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
400
+ page_content=' D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
401
+ page_content=' Stack, W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
402
+ page_content=' W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
403
+ page_content=' Tucker and R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
404
+ page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
405
+ page_content=' Wensley, Nucl.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
406
+ page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
407
+ page_content=' B 639 (2002), 203-222 doi:10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
408
+ page_content='1016/S0550-3213(02)00537-0 [arXiv:hep-lat/0110196 [hep-lat]].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
409
+ page_content=' [32] R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
410
+ page_content=' Golubich and M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
411
+ page_content=' Faber, Particles 3 (2020) no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
412
+ page_content='2, 444-455.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
7NE2T4oBgHgl3EQfPQZw/content/2301.03757v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:b536f8e97dce7f283c594d0f850710f6b71e876d6d3b1a2860ce8dcd74d60c73
3
+ size 1049349
7NE2T4oBgHgl3EQfPQZw/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:1405457915e2b3cf6a89274e132aba6dafb9c7c3e20d229241f7f5592a5e8e17
3
+ size 6225965
7tAyT4oBgHgl3EQfpvj9/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:cff00cf8648ee957a7d0d0182f53d273fe6aaac7b22279d7f5d3e308199d73e1
3
+ size 7405613
8dE4T4oBgHgl3EQfdQww/content/2301.05089v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:534f8fec39835c42758d4be798ae26edf1f285d9aaf4f88dbf539065c431d83b
3
+ size 3335719
8dE4T4oBgHgl3EQfdQww/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:2095e52d2fb3ea954e0bcd4644dd2ce1f3058dcd74ae77cfa65519d007d46a8f
3
+ size 252783
9tAzT4oBgHgl3EQf-_7r/content/2301.01943v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:145b2bd89a107dd3be3b24eac9033a2e76a75cd10ccd4291b845473412d4a013
3
+ size 3156489
9tAzT4oBgHgl3EQf-_7r/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:fcbecccc9540113ce51ed47d31d27813be4f13546267b4a2cfb19aa0b6deee3a
3
+ size 213539
9tFST4oBgHgl3EQfbTje/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:f0a36e75013c27f387872b961c2eaf10671ed789ff249c2779b8686e24a0cb80
3
+ size 10485805
ANAyT4oBgHgl3EQfq_kk/content/2301.00551v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:a4049abf017a4fde900149a33536d381c40ce49a6e3a9f987e1836bbc822e9b3
3
+ size 303896
ANAyT4oBgHgl3EQfq_kk/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:bd966eb9ffa4baf70d4e970c51a160f5688633979dcb51815eec60bacdd052eb
3
+ size 2359341
ANAyT4oBgHgl3EQfq_kk/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:19ce502891d81f5424f77b65ea479af990e45fad4ffb66245a22b36dd4bddd78
3
+ size 103604
ANE3T4oBgHgl3EQfsQvt/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:9bddfd6ed15f465b64ee1ac0497780407d34adb455f7df19150babb40b36a95a
3
+ size 4915245
AtAzT4oBgHgl3EQfv_4W/content/tmp_files/2301.01714v1.pdf.txt ADDED
@@ -0,0 +1,1507 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ arXiv:2301.01714v1 [quant-ph] 1 Jan 2023
2
+ Canonical steering ellipsoids of pure symmetric multiqubit states with two distinct
3
+ spinors and volume monogamy of steering
4
+ B. G. Divyamani,1 I. Reena,2 Prasanta K. Panigrahi,3 A. R. Usha Devi,2, 4 and Sudha5, 4, ∗
5
+ 1Tunga Mahavidyalaya, Thirthahalli-577432, Karnataka, India
6
+ 2Department of Physics, Bangalore University, Bangalore-560 056, India
7
+ 3Department of Physical Sciences, Indian Institute of Science Education
8
+ and Research Kolkata, Mohanpur-741246, West Bengal, India
9
+ 4Inspire Institute Inc., Alexandria, Virginia, 22303, USA.
10
+ 5Department of Physics, Kuvempu University, Shankaraghatta-577 451, Karnataka, India
11
+ (Dated: January 5, 2023)
12
+ Quantum steering ellipsoid formalism provides a faithful representation of all two-qubit states and
13
+ helps in obtaining correlation properties of the state through the steering ellipsoid. The steering
14
+ ellipsoids corresponding to the two-qubit subsystems of permutation symmetric N-qubit states is
15
+ analysed here. The steering ellipsoids of two-qubit states that have undergone local operations on
16
+ both the qubits so as to bring the state to its canonical form are the so-called canonical steering
17
+ ellipsoids.
18
+ We construct and analyze the geometric features of the canonical steering ellipsoids
19
+ corresponding to pure permutation symmetric N-qubit states with two distinct spinors. Depending
20
+ on the degeneracy of the two spinors in the pure symmetric N-qubit state, there arise several families
21
+ which cannot be converted into one another through Stochastic Local Operations and Classical
22
+ Communications (SLOCC). The canonical steering ellipsoids of the two-qubit states drawn from
23
+ the pure symmetric N-qubit states with two distinct spinors allow for a geometric visualization of
24
+ the SLOCC-inequivalent class of states. We show that the states belonging to the W-class correspond
25
+ to oblate spheroid centered at (0, 0, 1/(N −1)) with fixed semiaxes lengths 1/
26
+
27
+ N − 1 and 1/(N −1).
28
+ The states belonging to all other SLOCC inequivalent families correspond to ellipsoids centered at
29
+ the origin of the Bloch sphere. We also explore volume monogamy relations of states belonging to
30
+ these families, mainly the W-class of states.
31
+ PACS numbers: 03.65.Ud, 03.67.Bg
32
+ I.
33
+ INTRODUCTION
34
+ The Bloch sphere representation of a single qubit contains valuable geometric information needed for quantum
35
+ information processing tasks. A natural generalization and an analogous picture for a two-qubit system is provided by
36
+ the quantum steering ellipsoid [1–3] and is helpful in understanding correlation properties such as quantum discord [4,
37
+ 5], volume monogamy of steering [2, 3] etc., Quantum steering ellipsoid is the set of all Bloch vectors to which one
38
+ party’s qubit could be ‘steered’ when all possible measurements are carried out on the qubit belonging to other party.
39
+ The volume of the steering ellipsoids [1] corresponding to the two-qubit subsystems of an N-qubit state, N > 3, capture
40
+ monogamy properties of the state effectively [2, 3] and provides insightful information about two-qubit entanglement.
41
+ While the quantum steering ellipsoid [1–3] is the set of all Bloch vectors of first qubit steered by local operations
42
+ on second qubit, the so-called canonical steering ellipsoid [6–8] is the steering ellipsoid of a two-qubit state that has
43
+ attained a canonical form under suitable SLOCC operations on both the qubits. It has been shown that the SLOCC
44
+ canonical forms of a two-qubit state can either be a Bell diagonal form or a nondiagonal one (when the two-qubit
45
+ state is rank-deficient) [6, 8]. The canonical steering ellipsoids corresponding to the two-qubit states can thus have
46
+ only two distinct forms and provide a much simpler geometric picture representing the set of all SLOCC equivalent
47
+ two-qubit states.
48
+ The canonical steering ellipsoids corresponding to the two-qubit subsystems of pure three-qubit permutation sym-
49
+ metric states are analyzed in Ref. [9].
50
+ It has been shown that [9] the two SLOCC inequivalent families of pure
51
+ three-qubit permutation symmetric states, the W-class of states (with two distinct spinors) and the GHZ class of
52
+ states (with three distinct spinors) correspond to distinct canonical steering ellipsoids. While an ellipsoid centered at
53
+ the origin of the Bloch sphere is the canonical steering ellipsoid for the GHZ class of states, an oblate spheroid with
54
+ its center shifted along the z-axis is the one for W-class of states. Using these, the volume monogamy relations are
55
+ established and the obesity of the steering ellipsoids is made use of to obtain expressions for concurrence of states
56
+ belonging to these two SLOCC inequivalent families in Ref. [9].
57
58
+
59
+ 2
60
+ In this paper, we continue with the work in Ref. [9], authored by some of us, and extend the analysis to a class
61
+ of N-qubit pure states which are symmetric under exchange of qubits. Through the SLOCC canonical forms of the
62
+ two-qubit reduced state, extracted from pure symmetric multiqubit states with two distinct spinors and the Lorentz
63
+ canonical forms of their real representative, we examine the features of canonical steering ellipsoids associated with
64
+ them. We identify the special features of the canonical steering ellipsoid representing N-qubit states of the W-class
65
+ and these features distinguish this class from all other SLOCC inequivalent families of pure symmetric N-qubit states.
66
+ We discuss the volume monogamy of steering for pure permutation symmetric N-qubit states and obtain the volume
67
+ monogamy relation satisfied by W-class of states. An expression for obesity of the steering ellipsoid and thereby an
68
+ expression for concurrence of two-qubit subsystems of N-qubit states belonging to the W-class is obtained.
69
+ Contents of this paper are organized as follows: In Sec.II, we give a brief review on SLOCC classification of pure
70
+ permutation symmetric multiqubit states based on Majorana representation [10, 12, 13] and obtain the two-qubit
71
+ subsystems of the states belonging to SLOCC inequivalent families of pure symmetric multiqubit states with two
72
+ distinct spinors. Sec. III provides an outline of the real matrix representation of a two-qubit density matrix and their
73
+ Lorentz canonical forms under SLOCC transformation of the two-qubit density matrix. We also obtain the Lorentz
74
+ canonical forms of two-qubit subsystems corresponding to SLOCC inequivalent families, in Sec. III. In Sec.IV, we
75
+ analyse the nature of steering ellipsoids associated with the distinct Lorentz canonical forms obtained in Sec. III. The
76
+ volume monogamy of steering for pure symmetric multiqubit states with two distinct spinors is discussed along with
77
+ illustration for W-class of states, in Sec. V. Summary of our results is presented in Sec. VI.
78
+ II.
79
+ MAJORANA GEOMETRIC REPRESENTATION OF PURE SYMMETRIC N-QUBIT STATES
80
+ WITH TWO DISTINCT SPINORS
81
+ Ettore Majorana, in his novel 1932 paper [10] proposed that a pure spin j = N
82
+ 2 quantum state can be represented
83
+ as a symmetrized combination of N constituent spinors as follows:
84
+ |Ψsym⟩ = N
85
+
86
+ P
87
+ ˆP {|ǫ1, ǫ2, . . . ǫN⟩},
88
+ (1)
89
+ where
90
+ |ǫl⟩ = (cos(αl/2) |0⟩ + sin(αl/2) |1⟩) eiβl/2,
91
+ l = 1, 2, . . . , N.
92
+ (2)
93
+ The symbol ˆP corresponds to the set of all N! permutations of the spinors (qubits) and N corresponds to an overall
94
+ normalization factor. The name Majorana geometric representation is owing to the fact that it leads to an intrinsic
95
+ geometric picture of the state in terms of N-points on the unit sphere. In fact, the spinors |ǫl⟩, l = 1, 2, . . . , N
96
+ of (2) correspond geometrically to N points on the unit sphere S2, with the pair of angles (αl, βl) determining the
97
+ orientation of each point on the sphere.
98
+ The pure symmetric N-qubit states characterized by two distinct qubits are given by [11–13],
99
+ |DN−k,k⟩ = N
100
+
101
+ P
102
+ ˆP {| ǫ1, ǫ1, . . . , ǫ1
103
+
104
+ ��
105
+
106
+ N−k
107
+ ; ǫ2, ǫ2, . . . , ǫ2
108
+
109
+ ��
110
+
111
+ k
112
+ ⟩}.
113
+ (3)
114
+ Here one of the spinors say |ǫ1⟩ occurs N − k times whereas the other spinor |ǫ2⟩ occurs k times in each term of the
115
+ symmetrized combination. Under identical local unitary transformations, the pure symmetric N qubit states with
116
+ two distinct spinors can be brought to the canonical form [13],
117
+ |DN−k,k⟩ ≡
118
+ k
119
+
120
+ r=0
121
+ β(k)
122
+ r
123
+ ����
124
+ N
125
+ 2 , N
126
+ 2 − r
127
+
128
+ ,
129
+ k = 1, 2, 3, . . .
130
+ �N
131
+ 2
132
+
133
+ (4)
134
+ β(k)
135
+ r
136
+ = N
137
+
138
+ N!(N − r)!
139
+ r!
140
+ ak−r br
141
+ (N − k)!(k − r)!,
142
+ 0 ≤ a < 1,
143
+ b =
144
+
145
+ 1 − a2.
146
+ (5)
147
+ Notice that
148
+ �� N
149
+ 2 , N
150
+ 2 − r
151
+
152
+ , r = 0, 1, 2 . . . k are the Dicke states, which are common eigenstates of the collective angular
153
+ momentum operators J2 and Jz. They are the basis states of the N + 1 dimensional symmetric subspace of collective
154
+ angular momentum space. The states |DN−k,k⟩ (see (4), (5)) are characterized by only one real parameter ‘a’ and
155
+ thus form one parameter family of states {DN−k,k}.
156
+ It is important to notice that [13] in the family {DN−k,k}, different values of k, (k = 1, 2, 3, . . .
157
+ � N
158
+ 2
159
+
160
+ ), correspond to
161
+ different SLOCC inequivalent classes. That is, a state |DN−k,k⟩ cannot be converted into |DN−k′,k′⟩, k ̸= k′ through
162
+
163
+ 3
164
+ any choice of local unitary (identical) transformations. In fact, different values of k lead to different degeneracy
165
+ configurations [13] of the two spinors |ǫ1⟩, |ǫ2⟩ in the state |DN−k,k⟩. When k = 1, one gets the W-class of states
166
+ {DN−1,1} where one of the qubits say |ǫ1⟩ repeats only once in each term of the symmetrized combination (see (3))
167
+ and the other qubit |ǫ2⟩ repeating N − 1 times. The N-qubit W-state
168
+ |WN⟩ =
169
+ 1
170
+
171
+ N
172
+ [|000 . . .1⟩ + |000 . . .10⟩ + · · · + |100 . . .00⟩] ≡
173
+ ����
174
+ N
175
+ 2 , N
176
+ 2 − 1
177
+
178
+ (6)
179
+ belongs to the family {DN−1,1} and hence the name W-class of states.
180
+ A.
181
+ Two-qubit reduced density matrices of the states |DN−k, k⟩
182
+ The two-qubit marginal ρ(k) corresponding to any random pair of qubits in the pure symmetric N-qubit state
183
+ |DN−k, k⟩ ∈ {DN−k,k} is obtained by tracing over the remaining N − 2 qubits in it. In Ref. [15], it has been shown,
184
+ using the algebra of addition of angular momenta, j1 = 1 (corresponding to two-qubit marginal) and j2 = (N − 2)/2,
185
+ that the two-qubit reduced density matrix ρ(k) has the form
186
+ ρ(k) =
187
+
188
+
189
+
190
+
191
+ A(k)
192
+ B(k)
193
+ B(k)
194
+ C(k)
195
+ B(k)
196
+ D(k)
197
+ D(k)
198
+ E(k)
199
+ B(k)
200
+ D(k)
201
+ D(k)
202
+ E(k)
203
+ C(k)
204
+ E(k)
205
+ E(k)
206
+ F (k)
207
+
208
+
209
+
210
+  .
211
+ (7)
212
+ The elements A(k), B(k), C(k), D(k), E(k) and F (k) are real and are explicitly given by [15]
213
+ A(k) =
214
+ k
215
+
216
+ r=0
217
+
218
+ βk
219
+ r
220
+ �2 �
221
+ c(r)
222
+ 1
223
+ �2
224
+ , B(k) =
225
+ 1
226
+
227
+ 2
228
+ k−1
229
+
230
+ r=0
231
+ β(k)
232
+ r β(k)
233
+ r+1 c(r)
234
+ 1 c(r+1)
235
+ 0
236
+ C(k) =
237
+ k−2
238
+
239
+ r=0
240
+ β(k)
241
+ r
242
+ β(k)
243
+ r+2 c(r)
244
+ 1 c(r+2)
245
+ −1
246
+ , D(k) = 1
247
+ 2
248
+ k
249
+
250
+ r=1
251
+
252
+ β(k)
253
+ r
254
+ �2 �
255
+ c(r)
256
+ 0
257
+ �2
258
+ (8)
259
+ E(k) =
260
+ 1
261
+
262
+ 2
263
+ k−1
264
+
265
+ r=0
266
+ β(k)
267
+ r
268
+ β(k)
269
+ r+1 c(r)
270
+ 0 c(r+1)
271
+ −1
272
+ ,
273
+ F (k) =
274
+ k
275
+
276
+ r=0
277
+
278
+ β(k)
279
+ r
280
+ �2 �
281
+ c(r)
282
+ −1
283
+ �2
284
+ .
285
+ where, β(k)
286
+ r
287
+ are given as functions of the parameter ‘a’ in (5) and
288
+ c(r)
289
+ 1
290
+ =
291
+
292
+ (N − r)(N − r − 1)
293
+ N(N − 1)
294
+ ,
295
+ c(r)
296
+ −1 =
297
+
298
+ r (r − 1)
299
+ N(N − 1),
300
+ c(r)
301
+ 0
302
+ =
303
+
304
+ 2r (N − r)
305
+ N(N − 1)
306
+ (9)
307
+ are the Clebsch-Gordan coefficients c(r)
308
+ m2 = C
309
+ � N
310
+ 2 − 1, 1, N
311
+ 2 ; m − m2, m2, m
312
+
313
+ , m =
314
+ N
315
+ 2 − r, m2 = 1, 0, −1 [16]. In
316
+ particular, for W-class of states i.e., when k = 1, we have
317
+ ρ(1) = TrN−2 (|DN−1, 1⟩⟨DN−1, 1|)
318
+ =
319
+ ��
320
+ β(1)
321
+ 0
322
+ �2
323
+ +
324
+
325
+ β(1)
326
+ 1
327
+ c(1)
328
+ 1
329
+ �2�
330
+ |1, 1⟩⟨1, 1|
331
+ +
332
+
333
+ β(1)
334
+ 1
335
+ c(1)
336
+ 0
337
+ �2
338
+ |1, 0⟩⟨1, 0| + β(1)
339
+ 0 β(1)
340
+ 1
341
+ c(1)
342
+ 0 |1, 1⟩⟨1, 0|
343
+ +β(1)
344
+ 0 β(1)
345
+ 1
346
+ c(1)
347
+ 0 |1, 0⟩⟨1, 1|
348
+ (10)
349
+ Here (see (5)) we have β(1)
350
+ 0
351
+ = NN a, β(1)
352
+ 1
353
+ = N
354
+
355
+ N(1 − a2) with N =
356
+ 1
357
+
358
+ N 2 a2+N(1−a2) and the associated non-zero
359
+ Clebsch-Gordan coefficients (see (9)) are given by
360
+ c(1)
361
+ 1
362
+ =
363
+
364
+ N − 2
365
+ N
366
+ ,
367
+ c(1)
368
+ 0
369
+ =
370
+
371
+ 2
372
+ N .
373
+ (11)
374
+
375
+ 4
376
+ In the standard two-qubit basis {|0A, 0B⟩, |0A, 1B⟩, |1A, 0B⟩, |1A, 1B⟩}, the two-qubit density matrix ρ(1) drawn from
377
+ the states |DN−1,1⟩ take the form
378
+ ρ(1) =
379
+
380
+
381
+
382
+
383
+ A(1)
384
+ B(1)
385
+ B(1)
386
+ 0
387
+ B(1)
388
+ D(1)
389
+ D(1)
390
+ 0
391
+ B(1)
392
+ D(1)
393
+ D(1)
394
+ 0
395
+ 0
396
+ 0
397
+ 0
398
+ 0
399
+
400
+
401
+
402
+
403
+ (12)
404
+ where
405
+ A(1) = N 2a2 + (N − 2)(1 − a2)
406
+ N 2 a2 + N(1 − a2)
407
+ ,
408
+ B(1) =
409
+ a
410
+
411
+ 1 − a2
412
+ 1 + a2(N − 1),
413
+ D(1) =
414
+ 1 − a2
415
+ N 2 a2 + N(1 − a2),
416
+ (13)
417
+ In a similar manner, the two-qubit subsystems of pure symmetric N-qubit states |DN−k,k⟩ belonging to each SLOCC
418
+ inequivalent family {DN−k, k}, k = 2, 3, . . . ,
419
+ � N
420
+ 2
421
+
422
+ can be obtained as a function of N and ‘a’ using Eqs. (7), (8), (9).
423
+ As is shown in Refs. [8, 9], the real representative Λ(k) of the two-qubit subsystem ρ(k) and its Lorentz canonical form
424
+ �Λ(k) are essential in obtaining the geometric visualization of the states |DN−k,k⟩ for all k. We thus proceed to obtain
425
+ Λ(k) and its Lorentz canonical form �Λ(k) in the following.
426
+ III.
427
+ THE REAL REPRESENTATION OF ρ(k) AND ITS LORENTZ CANONICAL FORMS
428
+ The real representative Λ(k) of the two-qubit state ρ(k) is a 4 × 4 real matrix with its elements given by
429
+ Λ(k)
430
+ µ ν = Tr
431
+
432
+ ρ(k) (σµ ⊗ σν)
433
+
434
+ (14)
435
+ That is, Λ(k)
436
+ µ ν, µ, ν = 0, 1, 2, 3 are the coefficients of expansion of ρ(k), expanded in the Hilbert-Schmidt basis {σµ⊗σν}:
437
+ ρ(k) = 1
438
+ 4
439
+ 3
440
+
441
+ µ, ν=0
442
+ Λ(k)
443
+ µ ν (σµ ⊗ σν) ,
444
+ (15)
445
+ Here, σi, i = 1, 2, 3 are the Pauli spin matrices and σ0 is the 2 × 2 identity matrix;
446
+ σ0 =
447
+
448
+ 1 0
449
+ 0 1
450
+
451
+ ,
452
+ σ1 =
453
+
454
+ 0 1
455
+ 1 0
456
+
457
+ ,
458
+ σ2 =
459
+
460
+ 0 −i
461
+ i
462
+ 0
463
+
464
+ ,
465
+ σ3 =
466
+
467
+ 1
468
+ 0
469
+ 0 −1
470
+
471
+ .
472
+ (16)
473
+ It can be readily seen that (see (14), (15)) the real 4 × 4 matrix Λ(k) has the form
474
+ Λ(k) =
475
+
476
+
477
+
478
+ 1
479
+ r1
480
+ r2
481
+ r3
482
+ s1 t11 t12 t13
483
+ s2 t21 t22 t23
484
+ s3 t31 t32 t33
485
+
486
+
487
+  ,
488
+ (17)
489
+ where r = (r1, r2, r3)T , s = (s1, s2, s3)T are Bloch vectors of the individual qubits and T = (tij) is the correlation
490
+ matrix;
491
+ ri = Λ(k)
492
+ i 0 = Tr
493
+
494
+ ρ(k) (σi ⊗ σ0)
495
+
496
+ (18)
497
+ sj = Λ(k)
498
+ 0 j = Tr
499
+
500
+ ρ(k) (σ0 ⊗ σj)
501
+
502
+ (19)
503
+ tij = Λ(k)
504
+ i j = Tr
505
+
506
+ ρ(k) (σi ⊗ σj)
507
+
508
+ ,
509
+ i, j = 1, 2, 3.
510
+ (20)
511
+ For a symmetric two-qubit density matrix, the Bloch vectors r and s are identical and hence ri = si, i = 1, 2, 3; From
512
+ the structure of ρ(k) in (7) and using (18), (19), (20) we obtain the general form of the real matrix Λ(k) as
513
+ Λ(k) =
514
+
515
+
516
+
517
+
518
+
519
+
520
+
521
+ 1
522
+ 2(B(k)+E(k))
523
+ A(k)+2D(k)+F (k)
524
+ 0
525
+ A(k)−F (k)
526
+ A(k)+2D(k)+F (k)
527
+ 2(B(k)+E(k))
528
+ A(k)+2D(k)+F (k)
529
+ 2(C(k)+D(k))
530
+ A(k)+2D(k)+F (k)
531
+ 0
532
+ 2(B(k)−E(k))
533
+ A(k)+2D(k)+F (k)
534
+ 0
535
+ 0
536
+ 2(D(k)−C(k))
537
+ A(k)+2D(k)+F (k)
538
+ 0
539
+ A(k)−F (k)
540
+ A(k)+2D(k)+F (k)
541
+ 2(B(k)−E(k))
542
+ A(k)+2D(k)+F (k)
543
+ 0
544
+ 1 −
545
+ 4D(k)
546
+ A(k)+2D(k)+F (k)
547
+
548
+
549
+
550
+
551
+
552
+
553
+
554
+ .
555
+ (21)
556
+ The elements of Λ(k), for different k, can be evaluated using (8), (9)):
557
+
558
+ 5
559
+ A.
560
+ Lorentz canonical forms of Λ(k)
561
+ Under SLOCC transformation, the two-qubit density matrix ρ(k) transforms to �ρ(k),
562
+ ρ(k) −→ �ρ(k) = (A ⊗ B) ρ(k) (A† ⊗ B†)
563
+ Tr
564
+
565
+ ρ(k) (A† A ⊗ B† B)
566
+ �.
567
+ (22)
568
+ Here, A, B ∈ SL(2, C) denote 2 × 2 complex matrices with unit determinant. A suitable choice of A and B takes the
569
+ two-qubit density matrix ρ(k) to its canonical form �ρ(k).
570
+ Under the transformation ρ(k) −→ �ρ(k) (22) of the two-qubit state, its real representative Λ(k) transforms as [8, 9]
571
+ Λ(k) −→ �Λ(k) =
572
+ LA Λ(k) LT
573
+ B
574
+
575
+ LA Λ(k) LT
576
+ B
577
+
578
+ 00
579
+ .
580
+ (23)
581
+ Here LA, LB ∈ SO(3, 1) are 4 × 4 proper orthochronous Lorentz transformation matrices [17] corresponding respec-
582
+ tively to A, B ∈ SL(2, C) and the superscript ‘T ’ denotes transpose operation. The Lorentz canonical form �Λ(k)
583
+ of Λ(k) and thereby the SLOCC canonical form of the two-qubit density matrix ρ(k) (see (22)) can be obtained by
584
+ constructing the 4 × 4 real symmetric matrix Ω(k) = Λ(k) G
585
+
586
+ Λ(k)�T , where G = diag (1, −1, −1, −1) denotes the
587
+ Lorentz metric. Using the defining property [17] LT G L = G of Lorentz transformation L, it can be seen that Ω(k)
588
+ undergoes a Lorentz congruent transformation under SLOCC (upto an overall factor) [8] as
589
+ Ω(k) → �Ω(k)
590
+ A = �Λ(k) G
591
+
592
+ �Λ(k)�T
593
+ = LA Λ(k) LT
594
+ B G LB Λ(k)T LT
595
+ A
596
+ = LA Ω(k) LT
597
+ A.
598
+ (24)
599
+ It has been shown in Ref. [8] that �Λ(k) can either be a real 4 × 4 diagonal matrix or a nondiagonal matrix with only
600
+ one off-diagonal element, depending on the eigenvalues, eigenvectors of G Ω(k) = G
601
+
602
+ Λ(k) G
603
+
604
+ Λ(k)�T �
605
+ .
606
+ (i) The diagonal canonical form �Λ(k)
607
+ Ic results when the eigenvector X0 associated with the highest eigenvalue λ0 of
608
+ G Ω(k) obeys the Lorentz invariant condition XT
609
+ 0 G X0 > 0. The diagonal canonical form �Λ(k)
610
+ Ic is explicitly given
611
+ by
612
+ Λ(k) −→ �Λ(k)
613
+ Ic =
614
+ LA1 Λ(k) LT
615
+ B1
616
+
617
+ LA1 Λ(k) LT
618
+ B1
619
+
620
+ 00
621
+ = diag
622
+
623
+ 1,
624
+
625
+ λ1
626
+ λ0
627
+ ,
628
+
629
+ λ2
630
+ λ0
631
+ , ±
632
+
633
+ λ3
634
+ λ0
635
+
636
+ ,
637
+ (25)
638
+ where λ0 ≥ λ1 ≥ λ2 ≥ λ3 > 0 are the non-negative eigenvalues of G Ω(k).
639
+ The Lorentz transformations
640
+ LA1, LB1 ∈ SO(3, 1) in (25) respectively correspond to SL(2, C) transformation matrices A1, B1 which take the
641
+ two-qubit density matrix ρ(k) to its SLOCC canonical form �ρ(k)
642
+ Ic through the transformation (22). The diagonal
643
+ form of �Λ(k)
644
+ Ic readily leads, on using (15), to Bell-diagonal form
645
+ �ρ(k)
646
+ Ic = 1
647
+ 4
648
+
649
+ σ0 ⊗ σ0 +
650
+
651
+ i=1,2
652
+
653
+ λi
654
+ λ0
655
+ σi ⊗ σi ±
656
+
657
+ λ3
658
+ λ0
659
+ σ3 ⊗ σ3
660
+
661
+
662
+ (26)
663
+ as the canonical form of the two-qubit state ρ(k).
664
+ (ii) The Lorentz canonical form of Λ(k) turns out to be a nondiagonal matrix (with only one nondiagonal element)
665
+ given by
666
+ Λ(k) −→ �Λ(k)
667
+ IIc =
668
+ LA2 Λ(k) LT
669
+ B2
670
+
671
+ LA2 Λ(k) LT
672
+ B2
673
+
674
+ 00
675
+ =
676
+
677
+
678
+
679
+ 1
680
+ 0
681
+ 0
682
+ 0
683
+ 0
684
+ a1
685
+ 0
686
+ 0
687
+ 0
688
+ 0
689
+ −a1
690
+ 0
691
+ 1 − a0
692
+ 0
693
+ 0
694
+ a0
695
+
696
+
697
+
698
+ (27)
699
+
700
+ 6
701
+ when the non-negative eigenvalues of GΩ(k) are doubly degenerate with λ0 ≥ λ1 and the eigenvector X0
702
+ belonging to the highest eigenvalue λ0 satisfies the Lorentz invariant condition XT
703
+ 0 G X0 = 0. In Ref. [8], it
704
+ has been shown that when the maximum amongst the doubly degenerate eigenvalues of GΩ(k) possesses an
705
+ eigenvector X0 satisfying the condition XT
706
+ 0 G X0 = 0, the real symmetric matrix Ω(k) = Λ(k)G
707
+
708
+ Λ(k)�T attains
709
+ the nondiagonal Lorentz canonical form given by
710
+ Ω(k)
711
+ IIc = �Λ(k)
712
+ IIc G
713
+
714
+ �Λ(k)
715
+ IIc
716
+ �T
717
+ = LA2 Ω(k) LT
718
+ A2
719
+ =
720
+
721
+
722
+
723
+ φ0
724
+ 0
725
+ 0
726
+ φ0 − λ0
727
+ 0
728
+ −λ1
729
+ 0
730
+ 0
731
+ 0
732
+ 0
733
+ −λ1
734
+ 0
735
+ φ0 − λ0
736
+ 0
737
+ 0
738
+ φ0 − 2λ0
739
+
740
+
741
+  .
742
+ (28)
743
+ The parameters a0, a1 in (27) are related to the eigenvalues λ0, λ1 of GΩ(k) and the 00th element of �Λ(k)
744
+ IIc, the
745
+ canonical form of Ω(k) (see (28)). It can be seen that [8]
746
+ a0 = λ0
747
+ φ0
748
+ ,
749
+ a1 =
750
+
751
+ λ1
752
+ φ0
753
+ ,
754
+ where φ0 =
755
+
756
+ Ω(k)
757
+ IIc
758
+
759
+ 00 =
760
+ ��
761
+ LA2 Λ(k) LT
762
+ B2
763
+
764
+ 00
765
+ �2
766
+ .
767
+ (29)
768
+ The Lorentz matrices LA2, LB2 ∈ SO(3, 1) correspond to the SL(2,C) transformations A2, B2 which take the
769
+ density matrix ρ(k) to its SLOCC canonical form ρ(k)
770
+ IIc through the transformation (22). The nondiagonl canonical
771
+ form �Λ(k)
772
+ IIc leads to the SLOCC canonical form �ρ(k)
773
+ IIc of the two-qubit density matrix ρ(k) on using (15);
774
+ �ρ(k)
775
+ IIc = 1
776
+ 2
777
+
778
+
779
+
780
+ 1
781
+ 0
782
+ 0
783
+ a1
784
+ 0
785
+ 1 − a0 0
786
+ 0
787
+ 0
788
+ 0
789
+ 0
790
+ 0
791
+ a1
792
+ 0
793
+ 0 a0
794
+
795
+
796
+  .
797
+ (30)
798
+ B.
799
+ Lorentz canonical form of Λ(1) corresponding to W-class of states
800
+ Using the explicit structure of the two-qubit state ρ(1) given in (12), (13), its real representative Λ(1) is obtained
801
+ as (see (14))
802
+ Λ(1) =
803
+
804
+
805
+
806
+
807
+
808
+
809
+ 1
810
+ 2a
811
+
812
+ 1−a2
813
+ 1+a2(N−1)
814
+ 0
815
+ 1 +
816
+ 2a2
817
+ 1+a2(N−1) − 2
818
+ N
819
+ 2a
820
+
821
+ 1−a2
822
+ 1+a2(N−1)
823
+ 2(1−a2)
824
+ N(1+a2(N−1))
825
+ 0
826
+ 2a
827
+
828
+ 1−a2
829
+ 1+a2(N−1)
830
+ 0
831
+ 0
832
+ 2(1−a2)
833
+ N(1+a2(N−1))
834
+ 0
835
+ 1 +
836
+ 2a2
837
+ 1+a2(N−1) − 2
838
+ N
839
+ 2a
840
+
841
+ 1−a2
842
+ 1+a2(N−1)
843
+ 0
844
+ 1 +
845
+ 4a2
846
+ 1+a2(N−1) − 4
847
+ N
848
+
849
+
850
+
851
+
852
+
853
+
854
+ =
855
+
856
+ Λ(1)�T
857
+ .
858
+ (31)
859
+ We now construct the 4 × 4 symmetric matrix Ω(1) and obtain
860
+ Ω(1) = Λ(1) G
861
+
862
+ Λ(1)�T
863
+ = Λ(1) G Λ(1)
864
+ = χ
865
+
866
+
867
+
868
+ N − 1
869
+ 0
870
+ 0
871
+ N − 2
872
+ 0
873
+ −1
874
+ 0
875
+ 0
876
+ 0
877
+ 0
878
+ −1
879
+ 0
880
+ N − 2
881
+ 0
882
+ 0
883
+ N − 3
884
+
885
+
886
+  ,
887
+ χ =
888
+
889
+ 2(1 − a2)
890
+ N (1 + a2(N − 1))
891
+ �2
892
+ .
893
+ (32)
894
+ The eigenvalues of the matrix G Ω(1), G = diag (1, −1, −1, −1) are readily seen to be four-fold degenerate and are
895
+ given by
896
+ λ0 = λ1 = λ2 = λ3 = χ =
897
+
898
+ 2(1 − a2)
899
+ N (1 + a2(N − 1))
900
+ �2
901
+ .
902
+ (33)
903
+
904
+ 7
905
+ It can be seen that X0 = (1, 0, 0, −1) is an eigenvector of G Ω(1) belonging to the four-fold degenerate eigenvalue λ0
906
+ and obeys the Lorentz invariant condition XT
907
+ 0 G X0 = 0. We notice here that Ω(1) is already in the canonical form
908
+ (28). On comparing (32) with (28), we get
909
+ φ0 = (Ω(1))00 = (N − 1)χ.
910
+ (34)
911
+ On substituting the parameters a0, a1 (See (29), (33), (34) in (27), we arrive at the Lorentz canonical form of the real
912
+ matrix Λ(1) as
913
+ �Λ(1) =
914
+
915
+
916
+
917
+
918
+ 1
919
+ 0
920
+ 0
921
+ 0
922
+ 0
923
+ 1
924
+ √N−1
925
+ 0
926
+ 0
927
+ 0
928
+ 0
929
+
930
+ 1
931
+ √N−1
932
+ 0
933
+ N−2
934
+ N−1
935
+ 0
936
+ 0
937
+ 1
938
+ N−1
939
+
940
+
941
+
942
+  .
943
+ (35)
944
+ It can be readily seen that �Λ(1), the Lorentz canonical form corresponding to the W-class of states, is independent of
945
+ the parameter ‘a’.
946
+ C.
947
+ Lorentz canonical form of Λ(k), k = 2, 3, . . . ,
948
+ � N
949
+ 2
950
+
951
+ The real representative Λ(k) given in (21) can readily be evaluated for different values of k (k = 2, 3, . . . ,
952
+ � N
953
+ 2
954
+
955
+ ) on
956
+ using (8), (9). We then construct the real symmetric matrix Ω(k) = Λ(k) G
957
+
958
+ Λ(k)�T for k = 2, 3, . . . ,
959
+ � N
960
+ 2
961
+
962
+ and observe
963
+ that GΩ(k) = GΛ(k) G (Λ(k))
964
+ T has non-degenerate eigenvalues λ0 ̸= λ1 ̸= λ2 ̸= λ3 when k = 2, 3, . . . ,
965
+ � N
966
+ 2
967
+
968
+ and the
969
+ highest eigenvalue λ0 possesses a positive eigenvector X0 satisfying the relation XT
970
+ 0 G X0 > 0. The Lorentz canonical
971
+ form �Λ(k), k = 2, 3, . . . ,
972
+ � N
973
+ 2
974
+
975
+ , is thus given by the diagonal matrix (see (25)).
976
+ �Λ(k) = diag
977
+
978
+ 1,
979
+
980
+ λ1/λ0,
981
+
982
+ λ2/λ0, ±
983
+
984
+ λ3/λ0
985
+
986
+ .
987
+ The eigenvalues λµ, (µ = 0, 1, 2, 3) of GΩ(k) are dependent on the parameters ‘a’, k and N characterizing the state
988
+ |DN−k, k⟩, when k takes any of the integral values greater than 1 and less than
989
+ � N
990
+ 2
991
+
992
+ . Hence the canonical form �Λ(k),
993
+ k = 2, 3, . . . ,
994
+ � N
995
+ 2
996
+
997
+ is different for different states |DN−k, k⟩ unlike in the case of �Λ(1), the canonical form of W-class of
998
+ states, which depends only on the number of qubits N.
999
+ IV.
1000
+ GEOMETRIC REPRESENTATION OF THE STATES |DN−k,k⟩
1001
+ In this section, based on the two different canonical forms of Λ(k) obtained in Section III, we find the nature of
1002
+ canonical steering ellipsoids associated with the pure symmetric multiqubit states |DN−k,k⟩ belonging to SLOCC
1003
+ inequivalent families {DN−k, k}. To begin with, we give a brief outline [8, 9] of obtaining the steering ellipsoids of a
1004
+ two-qubit density matrix ρ(k) based on the form of its real representative Λ(k).
1005
+ In the two-qubit state ρ(k), local projective valued measurements (PVM) Q > 0, Q = �3
1006
+ µ=0 qµ σµ, q0 = 1,
1007
+ �3
1008
+ i=1 q2
1009
+ i
1010
+ = 1 on Bob’s qubit leads to collapsed state of Alice’s qubit characterized by its Bloch-vector pA =
1011
+ (p1, p2, p3)T through the transformation [8]
1012
+ (1, p1, p2, p3)T = Λ(k) (1, q1, q2, q3)T ,
1013
+ q2
1014
+ 1 + q2
1015
+ 2 + q2
1016
+ 3 = 1.
1017
+ (36)
1018
+ Notice that the vector qB = (q1, q2, q3)T , q2
1019
+ 1 + q2
1020
+ 2 + q2
1021
+ 3 = 1 represents the entire Bloch sphere and the steered Bloch
1022
+ vectors pA of Alice’s qubit constitute an ellipsoidal surface EA| B enclosed within the Bloch sphere. When Bob employs
1023
+ convex combinations of PVMs i.e., positive operator valued measures (POVMs), to steer Alice’s qubit, he can access
1024
+ the points inside the steering ellipsoid. Similar will be the case when Bob’s qubit is steered by Alice through local
1025
+ operations on her qubit.
1026
+ For the Lorentz canonical form �Λ(k)
1027
+ Ic (see (25)) of the two-qubit state �ρ(k)
1028
+ Ic , Eq. (36) leads to
1029
+ p1 =
1030
+
1031
+ λ1
1032
+ λ0
1033
+ q1,
1034
+ p2 =
1035
+
1036
+ λ2
1037
+ λ0
1038
+ q2,
1039
+ p3 = ±
1040
+
1041
+ λ3
1042
+ λ0
1043
+ q3,
1044
+ (37)
1045
+
1046
+ 8
1047
+ as steered Bloch points pA of Alice’s qubit. They are seen to obey the equation
1048
+ λ0 p2
1049
+ 1
1050
+ λ1
1051
+ + λ0 p2
1052
+ 2
1053
+ λ2
1054
+ + λ0 p2
1055
+ 3
1056
+ λ3
1057
+ = 1
1058
+ (38)
1059
+ of an ellipsoid with semiaxes (
1060
+
1061
+ λ1/λ0,
1062
+
1063
+ λ2/λ0,
1064
+
1065
+ λ3/λ0) and center (0, 0, 0) inside the Bloch sphere q2
1066
+ 1 +q2
1067
+ 2 +q2
1068
+ 3 = 1.
1069
+ We refer to this as the canonical steering ellipsoid representing the set of all two-qubit density matrices which are on
1070
+ the SLOCC orbit of the state �ρ(k)
1071
+ Ic (see (22)).
1072
+ For the second Lorentz canonical form �ΛIIc (see (27)) we get the coordinates of steered Alice’s Bloch vector pA, on
1073
+ using (36);
1074
+ p1 = a1 q1,
1075
+ p2 = −a1q2,
1076
+ p3 = (1 − a0) + a0q3,
1077
+ q2
1078
+ 1 + q2
1079
+ 2 + q2
1080
+ 3 = 1
1081
+ (39)
1082
+ and they satisfy the equation
1083
+ p2
1084
+ 1
1085
+ a2
1086
+ 1
1087
+ + p2
1088
+ 2
1089
+ a2
1090
+ 1
1091
+ + (p3 − (1 − a0))2
1092
+ a2
1093
+ 0
1094
+ = 1.
1095
+ (40)
1096
+ Eq. (40) represents the canonical steering spheroid (traced by Alice’s Bloch vector pA) inside the Bloch sphere with
1097
+ its center at (0, 0, 1 − a0) and lengths of the semiaxes given by a1 =
1098
+
1099
+ λ1/φ0, a0 =
1100
+
1101
+ λ2/φ0 (see (29)). In other
1102
+ words, a shifted spheroid inscribed within the Bloch sphere, represents two-qubit states that are SLOCC equivalent
1103
+ to �ρ(k)
1104
+ IIc.
1105
+ A.
1106
+ Canonical steering ellipsoids of W-class of states
1107
+ We have seen in Sec. III B that the Lorentz canonical form of Λ(1), the real representative of the symmetric two-
1108
+ qubit state ρ(1) drawn from the W-class of states |DN−1,1⟩ has a nondiagonal form given in Eq. (35). On comparing
1109
+ (35) with the canonical form in (27), we get
1110
+ a1 =
1111
+ 1
1112
+
1113
+ N − 1,
1114
+ a0 =
1115
+ 1
1116
+ N − 1.
1117
+ (41)
1118
+ From (40) and the discussions prior to it, it can be readily seen that the quantum steering ellipsoid associated with �Λ(1)
1119
+ in (35) is a spheroid centered at (0, 0,
1120
+ 1
1121
+ N−1) inside the Bloch sphere, with fixed semiaxes lengths (
1122
+ 1
1123
+ √N−1,
1124
+ 1
1125
+ √N−1,
1126
+ 1
1127
+ N−1)
1128
+ (see Fig. 1). It is interesting to note that the Lorentz canonical form �Λ(1) is not dependent on the state parameter
1129
+ ‘a’, 0 ≤ a < 1 and hence all states |DN−1, 1⟩ in the family {DN−1, 1} are represented by an oblate spheroid, all its
1130
+ parameters such as center, semiaxes, volume etc., dependent only on the number of qubits N.
1131
+ FIG. 1. (Colour online) Steering spheroids inscribed within the Bloch sphere representing the Lorentz canonical form �Λ(1)
1132
+ (see (35)) of W-class of states |DN−1,1⟩ for N = 4 and N = 20. The spheroids are centered (0, 0,
1133
+ 1
1134
+ N−1) and the length of the
1135
+ semi-axes are given by (
1136
+ 1
1137
+ √N−1,
1138
+ 1
1139
+ √N−1,
1140
+ 1
1141
+ N−1).
1142
+
1143
+ 9
1144
+ B.
1145
+ Canonical steering ellipsoids of the states |DN−k,k⟩, k = 2, 3, . . . ,
1146
+ � N
1147
+ 2
1148
+
1149
+ As is seen in Sec. III C, the Lorentz canonical form of Λ(k), k = 2, 3, . . . ,
1150
+ � N
1151
+ 2
1152
+
1153
+ , the real representative of the two-
1154
+ qubit states ρ(k) drawn from the pure symmetric N-qubit states |DN−k,k⟩, has the diagonal form (see (25)). The
1155
+ values of λ0, λ1, λ2, λ3, the eigenvalues of the matrix G Ωk can be evaluated for each value of k, k = 2, 3, . . . ,
1156
+ � N
1157
+ 2
1158
+
1159
+ for a chosen N. From (38) and the discussions therein, it follows that the canonical steering ellipsoids of the states
1160
+ |DN−k,k⟩, k = 2, 3, . . . ,
1161
+ � N
1162
+ 2
1163
+
1164
+ is an ellipsoid centered at the origin of the Bloch sphere with lengths of the semiaxes
1165
+ given by
1166
+
1167
+ λ1/λ0,
1168
+
1169
+ λ2/λ0,
1170
+
1171
+ λ3/λ0. The eigenvalues λµ, µ = 0, 1, 2, 3 of GΩ(k) depend on the parameter ‘a’ also,
1172
+ unlike in the case of W-class of states where they depend only on N, the number of qubits. Thus each state |DN−k,k⟩
1173
+ belonging to the family {DN−k, k}, k = 2, 3, . . . ,
1174
+ � N
1175
+ 2
1176
+
1177
+ is represented by an ellipsoid whose semiaxes depend on the
1178
+ values of k, N and ‘a’. In Fig. 2 and Fig. 3 the canonical steering ellipsoids for some chosen values of k, N and ‘a’
1179
+ are shown.
1180
+ FIG. 2. (Colour online) Steering ellipsoids centered at the origin of the Bloch sphere representing the Lorentz canonical form
1181
+ of pure symmetric multiqubit states |DN−k,k⟩ (see (3)) when (i) N = 10, k = 2, a = 0.2 and (ii) N = 10, k = 5, a = 0.2.
1182
+ FIG. 3. (Colour online) Steering ellipsoids representing the Lorentz canonical form of pure symmetric multiqubit states |DN−k,k⟩
1183
+ (see (3)) when (i) N = 100, k = 2, a = 0.2 and (ii) N = 100, k = 5, a = 0.1.
1184
+ V.
1185
+ VOLUME MONOGAMY RELATIONS FOR PURE SYMMETRIC MULTIQUBIT STATES |DN−k,k⟩
1186
+ Monogamy relations restrict shareability of quantum correlations in a multipartite state. They find potential ap-
1187
+ plications in ensuring security in quantum key distribution [18, 19]. Milne et. al. [2, 3] introduced a geometrically
1188
+ intuitive monogamy relation for the volumes of the steering ellipsoids representing the two-qubit subsystems of mul-
1189
+ tiqubit pure states, which is stronger than the well-known Coffman-Kundu-Wootters monogamy relation [20]. In this
1190
+
1191
+ 10
1192
+ section we explore how volume monogamy relation [2] imposes limits on the volumes of the quantum steering ellip-
1193
+ soids representing the two-qubit subsystems ρ(k) = TrN−2 [|DN−k,k⟩⟨DN−k,k|] of pure symmetric multiqubit states
1194
+ |DN−k,k⟩.
1195
+ For the two-qubit state ρAB(= ρ(k)) (see (15)), we denote by EA| B, the quantum steering ellipsoid containing all
1196
+ steered Bloch vectors of Alice when Bob carries out local operations on his qubit. The volume of EA| B is given by [1]
1197
+ VB|A =
1198
+ �4π
1199
+ 3
1200
+
1201
+ | det Λ|
1202
+ (1 − r2)2 ,
1203
+ (42)
1204
+ where r2 = r · r = r2
1205
+ 1 + r2
1206
+ 2 + r2
1207
+ 3 (see (18)). As the steering ellipsoid is constrained to lie within the Bloch sphere, i.e.,
1208
+ VB|A ≤ Vunit = (4π/3), one can choose to work with the normalized volumes vA|B =
1209
+ VA|B
1210
+ 4π/3 , the ratio of the volume of
1211
+ the steering ellipsoid to the volume of a unit sphere.
1212
+ The volume monogamy relation satisfied by a pure three-qubit state shared by Alice, Bob and Charlie is given
1213
+ by [1–3]
1214
+
1215
+ VA|B +
1216
+
1217
+ VC|B ≤
1218
+
1219
+
1220
+ 3 .
1221
+ (43)
1222
+ where VA|B, VC|B are respectively the volumes of the ellipsoids corresponding to steered states of Alice and Charlie
1223
+ when Bob performs all possible local measurements on his qubit. The normalized form of the volume monogmay
1224
+ relation (43) turns out to be
1225
+ √vA|B + √vC|B ≤ 1,
1226
+ (44)
1227
+ where vA|B =
1228
+ VA|B
1229
+ 4π/3 are the normalized volumes.
1230
+ The monogamy relation (44) is not, in general, satisfied by mixed three-qubit states [3] and it has been shown that
1231
+
1232
+ vA|B
1233
+ � 2
1234
+ 3 +
1235
+
1236
+ vC|B
1237
+ � 2
1238
+ 3 ≤ 1,
1239
+ (45)
1240
+ is the volume monogamy relation for pure as well as mixed three-qubit states [3].
1241
+ As there are 1
1242
+ 2(N − 2)(N − 1) three qubit subsystems in a N-qubit state, each of which obey monogamy relation
1243
+ (45), on adding these relations and simplifying, one gets [3]
1244
+
1245
+ vA|B
1246
+ � 2
1247
+ 3 +
1248
+
1249
+ vC|B
1250
+ � 2
1251
+ 3 +
1252
+
1253
+ vD|B
1254
+ � 2
1255
+ 3 + · · · ≤ N − 1
1256
+ 2
1257
+ .
1258
+ (46)
1259
+ The relation (46) is the volume monogamy relation satisfied by pure as well as mixed N-qubit states . For N = 3, it
1260
+ reduces to (45).
1261
+ For multiqubit states that are invariant under exchange of qubits, vA|B = vC|B = vD|B = · · · = vN where vN denotes
1262
+ the normalized volume of the steering ellipsoid corresponding to any of the N − 1 qubits, the steering performed by,
1263
+ say Nth qubit. Eq. (46) thus reduces to
1264
+ (N − 1) (vN)
1265
+ 2
1266
+ 3 ≤ N − 1
1267
+ 2
1268
+ =⇒ (vN)
1269
+ 2
1270
+ 3 ≤ 1
1271
+ 2
1272
+ (47)
1273
+ implying that (vN)
1274
+ 2
1275
+ 3 ≤ 1
1276
+ 2 is the volume monogamy relation for permutation symmetric multiqubit states.
1277
+ A.
1278
+ Volume monogamy relations governing the W-class of states {DN−1,1}
1279
+ On denoting the normalized volume of a steering ellipsoid corresponding to the states |DN−1,1⟩ by v(1)
1280
+ N , we have
1281
+ (see (42))
1282
+ v(1)
1283
+ N = | det Λ(1)|
1284
+ (1 − r2)2 ,
1285
+ (48)
1286
+ where Λ(1) is given in (31) and
1287
+ r1 =
1288
+ 2a
1289
+
1290
+ 1 − a2
1291
+ 1 + a2(N − 1),
1292
+ r2 = 0,
1293
+ r3 = 1 +
1294
+ 2a2
1295
+ 1 + a2(N − 1) − 2
1296
+ N
1297
+ (49)
1298
+
1299
+ 11
1300
+ Under suitable Lorentz transformations, the real matrix Λ(1) (see (31)) associated with the state ρ(1)
1301
+ 2
1302
+ gets transformed
1303
+ to its Lorentz canonical form �Λ(1) (see (35)). It follows that (see (29), (33))
1304
+
1305
+ LA Λ(1) LT
1306
+ B
1307
+
1308
+ 00 =
1309
+
1310
+ φ0 = 2
1311
+
1312
+ N − 1
1313
+
1314
+ 1 − a2
1315
+ N(1 + (N − 1) a2)
1316
+
1317
+ .
1318
+ (50)
1319
+ Using the property det LA = det LB = 1 of orthochronous proper Lorentz transformations [17] and substituting
1320
+ | det �Λ(1)| =
1321
+ 1
1322
+ (N−1)2 in (23), we obtain
1323
+ | det �Λ(1)| =
1324
+ 1
1325
+ (N − 1)2 = | det LA| | det LB|
1326
+ ����det
1327
+ � Λ(1)
1328
+ √φ0
1329
+ ����� = | det Λ(1)|
1330
+ φ2
1331
+ 0
1332
+ .
1333
+ (51)
1334
+ Eq. (51) leads to | det Λ(1)| = φ2
1335
+ 0| det �Λ(1)|. The normalized volume v(1)
1336
+ N
1337
+ of the steering ellipsoid corresponding to
1338
+ W-class of states thus becomes (see (48))
1339
+ v(1)
1340
+ N = | det �Λ(1)|
1341
+ φ2
1342
+ 0
1343
+ (1 − r2)2
1344
+ (52)
1345
+ From (49) and (50) it readily follows that φ2
1346
+ 0 = (1 − r2)2 and hence (see (52)) the simple form for the normalized
1347
+ volume of the corresponding steering ellipsoid associated with the two-qubit state ρ(1) turns out to be
1348
+ v(1)
1349
+ N =
1350
+ φ2
1351
+ 0
1352
+ (N − 1)2 (1 − r2)2 =
1353
+ 1
1354
+ (N − 1)2 .
1355
+ (53)
1356
+ The volume monogamy relation
1357
+
1358
+ v(1)
1359
+ N
1360
+ � 2
1361
+ 3 ≤ 1
1362
+ 2 (see (47)) takes the form
1363
+
1364
+ 1
1365
+ (N − 1)2
1366
+ �2/3
1367
+ ≤ 1
1368
+ 2 =⇒ 2(N − 1)
1369
+ −4
1370
+ 3 ≤ 1
1371
+ (54)
1372
+ and is readily satisfied for any N ≥ 3 as can be seen in Fig.5.
1373
+ 10
1374
+ 20
1375
+ 30
1376
+ 40
1377
+ 50
1378
+ 0.0
1379
+ 0.1
1380
+ 0.2
1381
+ 0.3
1382
+ 0.4
1383
+ N
1384
+ (N-1)
1385
+ -4
1386
+ 3
1387
+ FIG. 4. (Colour online) The LHS of the monogamy relation 2(N − 1)
1388
+ −4
1389
+ 3 ≤ 1 is seen to be less than 1 for the states |DN−1, 1⟩
1390
+ for any N ≥ 3.
1391
+ B.
1392
+ Relation between obesity of steering ellipsoids and concurrence
1393
+ We recall here that the obesity O(ρAB) = | det Λ|1/4 of the quantum steering ellipsoid [2] depicting a two-qubit state
1394
+ ρAB is an upper bound for the concurrence C(ρAB):
1395
+ C(ρAB) ≤ O(ρAB) = | det Λ|1/4.
1396
+ (55)
1397
+
1398
+ 12
1399
+ Furthermore, if ρAB −→ �ρAB = (A ⊗ B)ρAB (A† ⊗ B†)/(Tr(A† A ⊗ B†B)ρAB], A, B ∈ SL(2, C) it follows that [2]
1400
+ O(ρAB)
1401
+ C(ρAB) = O(�ρAB)
1402
+ C(�ρAB).
1403
+ (56)
1404
+ We make use of the relation (56) to obtain a relation for concurrence [21] of a pair of qubits in the symmetric N-qubit
1405
+ pure states |DN−k,k⟩, k = 1, 2, . . . ,
1406
+ � N
1407
+ 2
1408
+
1409
+ . For the states |DN−1,1⟩ belonging to W-class, we readily get (see (31), (35))
1410
+ det Λ(1) =
1411
+
1412
+ 2(1 − a2)
1413
+ N(1 + a2(N − 1))
1414
+ �4
1415
+ ,
1416
+ det �Λ(1) =
1417
+
1418
+ 1
1419
+ N − 1
1420
+ �2
1421
+ (57)
1422
+ and thereby the obesities O(ρ(1)), O(�ρ(1)):
1423
+ O(ρ(1)) =
1424
+ 2(1 − a2)
1425
+ N(1 + a2(N − 1)),
1426
+ O(�ρ(1)) =
1427
+ 1
1428
+
1429
+ N − 1
1430
+ (58)
1431
+ As the concurrence of the state �ρ(1) turns out to be
1432
+ C(�ρ(1)) = O(�ρ(1)) =
1433
+ 1
1434
+
1435
+ N − 1
1436
+ (59)
1437
+ we obtain (see (56),(59))
1438
+ C(ρ(1)) = O(ρ(1)) =
1439
+ 2(1 − a2)
1440
+ N(1 + a2(N − 1)).
1441
+ (60)
1442
+ The value of concurrence in (60) matches exactly with that obtained [21] using C(ρ(1)) = max(0, µ1 − µ2 − µ3 − µ4)
1443
+ where µ1 ≥ µ2 ≥ µ3 ≥ µ4 are square-roots of the eigenvalues of the matrix R = ρ(1) (σ2 ⊗ σ2) ρ(1)∗ (σ2 ⊗ σ2).
1444
+ We have seen that the state |DN−1, 1⟩ reduces to W-state when a = 0 and hence for the N-qubit W-state, concurrence
1445
+ of any pair of qubits is given by C(ρ(1)
1446
+ W ) = 2
1447
+ N .
1448
+ VI.
1449
+ SUMMARY
1450
+ In this work we have analyzed the canonical steering ellipsoids and volume monogamy relations of the pure symmetric
1451
+ N-qubit states characterized by two distinct Majorana spinors. We have shown that the entire W-class of states has a
1452
+ geometric representation in terms of a shifted spheroid inscribed inside the Bloch sphere. The center of the spheroid,
1453
+ the length of its semiaxes and its volume are shown to be dependent only on the number of qubits N and hence all
1454
+ states in the N-qubit W-class are characterized by a single spheroid, shifted along the polar axis of the Bloch sphere.
1455
+ All other families of pure symmetric N-qubit states with two distinct spinors which are SLOCC inequivalent to the
1456
+ W-class are geometrically represented by ellipsoids centered at the origin. A discussion on volume monogamy relations
1457
+ applicable to identical subsystems of a pure N-qubit symmetric state is given here and a volume monogamy relation
1458
+ applicable for W-class of states is obtained. A relation connecting concurrence of the two-qubit state and obesity
1459
+ of the associated quantum steering ellipsoid with its canonical counterparts is made use of to obtain concurrence of
1460
+ the states belonging to W-class. It would be interesting to examine the features of canonical steering ellipsoids and
1461
+ volume monogamy relations for the SLOCC inequivalent families of pure symmetric multiqubit states with more than
1462
+ two distinct spinors; in particular, the class of pure symmetric N-qubit states belonging to GHZ-class (with three
1463
+ distinct spinors).
1464
+ ACKNOWLEDGEMENTS
1465
+ BGD thanks IASC-INSA-NASI for the award of Summer Research Fellowship-2022, during this work.
1466
+ Sudha,
1467
+ ARU and IR are supported by the Department of Science and Technology (DST), India through Project No.
1468
+ DST/ICPS/QUST/2018/107.
1469
+ [1] Jevtic, S., Pusey, M. F., Jennings, D. and Rudolph, T.: Quantum Steering Ellipsoids. Phys. Rev. Lett. 113, 020402 (2014).
1470
+
1471
+ 13
1472
+ [2] Milne, A., Jevtic, S., Jennings, D., Wiseman, H., and Rudolph, T.: Quantum steering ellipsoids, extremal physical states
1473
+ and monogamy. New J. Phys. 16, 083017 (2014).
1474
+ [3] Cheng, S., Milne, A., Hall, M. J. W., Wiseman, H. M.: Volume monogamy of quantum steering ellipsoids for multiqubit
1475
+ systems. Phys. Rev. A., 94, 042105 (2016).
1476
+ [4] Shi, M., Jiang, F., Sun, C., and Du, J.: “Geometric picture of quantum discord for two-qubit quantum states,” New J.
1477
+ Phys. 13, 073016 (2011).
1478
+ [5] Shi, M., Yang, W., Jiang, F., and Du, J.: Quantum discord of two-qubit rank-2 states. J.Phys.A: Math Theor. 44, 415304
1479
+ (2011).
1480
+ [6] Verstraete, F., Dehaene, J., DeMoor, B.,: Local filtering operations on two qubits. Physical Review A., 64, 010101(R)
1481
+ (2001).
1482
+ [7] Verstraete, F., Quantum entanglement and quantum information,Ph.D. thesis, Katholieke Universiteit Leuven, 2002.
1483
+ [8] Sudha, Karthik, H. S., Pal, R., Akhilesh, K. S., Ghosh, S., Mallesh, K. S., Usha Devi, A. R.: Canonical forms of two-qubit
1484
+ states under local operations. Phys.Rev.A, 102, 052419 (2020).
1485
+ [9] Anjali, K, Reena, I, Sudha, Divyamani, B. G., Karthik, H. S., Mallesh, K. S., and Usha Devi, A. R., Geometric picture
1486
+ for SLOCC classification of pure permutation symmetric three-qubit states, Quantum Inf Proc. 21, 326 (2022).
1487
+ [10] Majorana, E.: Atomi Orientati in Campo Magnetico Variabile, Nuovo Cimento 9, 43 (1932).
1488
+ [11] Bastin, T., Krins, S., Mathonet, P., Godefroid, M., Lamata, L., and Solano E.: Operational Families of Entanglement
1489
+ Classes for Symmetric N-Qubit States, Phys. Rev. Lett. 103, 070503 (2009).
1490
+ [12] Mathonet, P., Krins, S., Godefroid, M., Lamata, L., Solano, E., and Bastin, T.: Entanglement equivalence of N-qubit
1491
+ symmetric states, Phys. Rev. A81, 052315 (2010).
1492
+ [13] Usha Devi, A. R., Sudha, Rajagopal, A. K.: Majorana representation of symmetric multiqubit states, Quantum Inf. Proc.
1493
+ 11 685 (2012)
1494
+ [14] Sudha, Usha Devi, A. R., Rajagopal, A. K.: Monogamy of quantum correlations in three-qubit pure states, Phys. Rev. A,
1495
+ 85, 012103 (2012).
1496
+ [15] Akhilesh, K. S., Divyamani, B. G., Sudha, Usha Devi, A. R., and Mallesh, K. S., Spin squeezing in symmetric multiqubit
1497
+ states with two non-orthogonal Majorana spinors, Quantum Inf. Proc. 18, 144 (2019).
1498
+ [16] Varshalovich, D. A., Moskalev, A. N. and Khersonskii, V. K.,: Quantum Theory of Angular Momentum, World Scientific,
1499
+ Singapore (1988).
1500
+ [17] Srinivasa Rao, K. N.: The Rotation and Lorentz groups and their representations for physicists, Wiley Eastern, New Delhi
1501
+ (1988).
1502
+ [18] Tehral, B. M.: Is entanglement monogamous? IBM J. Res. & Dev. 48, 71 (2004).
1503
+ [19] Paw�lowski, M.: Security proof for cryptographic protocols based only on the monogamy of Bell’s inequality violations.
1504
+ Phys. Rev. A. 82, 032313 (2010).
1505
+ [20] Coffman, V., Kundu, J., Wootters, W. K.: Distributed entanglement. Phys. Rev. A 61, 052306 (2000).
1506
+ [21] Wootters, W. K.: Entanglement of formation of an arbitrary state of two qubits. Phys. Rev. Lett. 80, 2245 (1998).
1507
+
AtAzT4oBgHgl3EQfv_4W/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
C9E4T4oBgHgl3EQfFwy_/content/2301.04889v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:e39a54241e3e4aa4ae2984e2897526a35e4b46946f80f5322784227acda56626
3
+ size 2707116
C9E4T4oBgHgl3EQfFwy_/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:9b281ffd0501706da70e230f66a765a6da81ac0a37e7e1c9171caa3789308cd2
3
+ size 3670061
CNE1T4oBgHgl3EQfDwNk/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:3ac8aa2ea11dd09470305d3662432ad87c9e63cb1ee5875b5cf02b46a956cb5b
3
+ size 118793
EdAyT4oBgHgl3EQfSfdI/content/2301.00086v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:ae038651361e8e1bde9639beacd0a93ee85776ce34c8105463642c16842e3189
3
+ size 2995163
EdAyT4oBgHgl3EQfSfdI/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:726e57a63b79fb8153d0498ddec8ffb7efca84dd4a0c5870b189f6937bc42741
3
+ size 3342381
EdAyT4oBgHgl3EQfSfdI/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:085690be5d7edfb51894d8fd82c234c4357d029ce27e0fa608efaef74d1ea510
3
+ size 116745
EtE1T4oBgHgl3EQf-gZN/content/tmp_files/2301.03569v1.pdf.txt ADDED
The diff for this file is too large to render. See raw diff
 
EtE1T4oBgHgl3EQf-gZN/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
F9E1T4oBgHgl3EQfqwX2/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:d32414073c0f5e0ba9b18fe7f04d44ade96c07f93fff397e6ec61f271e91ed1b
3
+ size 187269
FNAzT4oBgHgl3EQfUPz_/content/tmp_files/2301.01265v1.pdf.txt ADDED
@@ -0,0 +1,1446 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ 1
2
+
3
+ Spinel Cu-Mn-Cr Oxide Nanoparticle-Pigmented
4
+ Solar Selective Coatings Maintaining >94%
5
+ Efficiency at 750ºC
6
+ Can Xu, Xiaoxin Wang, and Jifeng Liu*
7
+ Thayer School of Engineering, Dartmouth College, 14 Engineering Drive, Hanover, New
8
+ Hampshire 03755, USA
9
+ *Corresponding Author: [email protected]
10
+ ABSTRACT
11
+ High-temperature concentrating solar power (CSP) system is capable of harvesting and storing
12
+ solar energy as heat towards cost-effective dispatchable solar electricity. Solar selective coating is
13
+ a critical component to boost its efficiency by maximizing solar absorptance and minimizing
14
+ thermal emittance losses. However, maintaining a high solar-thermal conversion efficiency >90%
15
+ for long-term operation at ≥750ºC remains a significant challenge. Herein, we report spray-coated
16
+ spinel Cu-Mn-Cr oxide nanoparticle-pigmented solar selective coatings on Inconel tube sections
17
+ maintaining ≥94% efficiency at 750ºC and ≥92.5% at 800ºC under 1000x solar concentration after
18
+ 60 simulated day-night thermal cycles in air, each cycle comprising 12h at 750ºC/800ºC and 12h
19
+ cooling to 25ºC. The solar spectral selectivity is intrinsic to the band-to-band and d-d transitions
20
+
21
+ 2
22
+
23
+ of non-stoichiometric spinel Cu-Mn-Cr oxide nanoparticles by balancing the lattice site inversion
24
+ of Cu2+ and Mn3+ on tetrahedral vs. octahedral sites. This feature offers a large fabrication tolerance
25
+ in nanoparticle volume fraction and coating thickness, facilitating low-cost and scalable spray-
26
+ coated high-efficiency solar selective absorbers for high-temperature CSP systems.
27
+ Key Words: Concentrating solar power, Solar selective absorber, Spinel oxide nanoparticle; Ionic
28
+ site inversion; d-d transition,
29
+ TOC GRAPHICS
30
+
31
+
32
+
33
+
34
+ 14um
35
+ After60day-night cycles
36
+ 13
37
+ 11
38
+ between750Cand252C
39
+ 9
40
+ 6
41
+ UV-vis)
42
+ 500μm
43
+ PigmentedNP
44
+ Siliconeresin
45
+ Coating
46
+ μm
47
+ um
48
+ Substra.e
49
+ 400
50
+ 500
51
+ 300
52
+ 400
53
+ 300
54
+ 200 100
55
+ 200
56
+ 100
57
+ Cu-Mn-Cr Oxide NPs, 750C Cycling
58
+ %
59
+ 100
60
+ 95
61
+ SpinelCu-Mn-Croxidepigmentnanoparticles(NPs)
62
+ 90
63
+ ---SolarAbsorptance
64
+ 85
65
+ .-ThermalEmittance
66
+ 80
67
+ -Thermal Efficiency
68
+ 75
69
+ @750, 1000x solar
70
+ (111)
71
+ 70
72
+ concentration
73
+ d=0.481nm
74
+ 65
75
+ 60
76
+ 55
77
+ 0
78
+ 20
79
+ 40
80
+ 60
81
+ 50nm
82
+ nm
83
+ # of simulated day/nights3
84
+
85
+ 1. Introduction
86
+ Recent years have seen a rapid growth in solar energy, currently supplying 2.8% of electricity in
87
+ the U.S. as the third largest renewable source after wind and hydropower. 1 Concentrating solar
88
+ power (CSP) system utilizes reflective mirrors (“collectors”) to concentrate solar irradiation and
89
+ heat up working fluids (e.g. molten salts) to high temperatures. 2 A great advantage compared to
90
+ photovoltaic (PV) system is that CSP is capable of storing the solar-thermal energy for >10 hours
91
+ so as to meet the peak hours of electricity consumption towards dispatchable solar electricity. 3
92
+ Solar selective coating, a critical component to boost the solar-to-thermal energy conversion
93
+ efficiency (ηtherm) by maximizing solar spectral absorption and minimizing infrared (IR) thermal
94
+ emittance losses, can reduce the levelized cost of energy (LCOE) of CSP by >12% 4 for ηtherm>90%.
95
+ Further increasing ηtherm to 95% is projected to achieve >17% LCOE cost reduction, which strongly
96
+ supports the goal of achieving $0.05/kWh solar electricity by 2030. 3 Based on Carnot Theorem,
97
+ the operation temperature of Generation 3 CSP system is being increased to 750ºC with a solar
98
+ concentration of ~1000x to achieve >50% overall power cycle efficiency in solar electricity
99
+ production. 5 Therefore, it is highly desirable to develop cost-effective and highly scalable solar
100
+ selective coatings that can maintain ηtherm ~95% at 750ºC in air.
101
+ However, currently commercial solar coating products are unable to maintain ηtherm >90% at
102
+ operating temperatures >700ºC in air. 6 The benchmark Pyromark 2500 coating suffers from a high
103
+ thermal emittance of εtherm~87% and pigment particle phase instability at 750°C, 7 limiting its ηtherm
104
+ to ~88% at 1000x solar concentration after operating at 750°C for 300 h. 8,9 Various transition
105
+ metal oxide solar absorbers have been investigated, and some of them demonstrate excellent
106
+ thermal stability at 750°C, 10,11 yet the lack of spectral selectivity limits their maximal ηtherm to
107
+ ~91% at >700°C. While dielectric selective absorber coatings based on nitrides and oxides could
108
+
109
+ 4
110
+
111
+ sustain high temperature in air and achieve some degree of solar selectivity, 12,13 the principles of
112
+ their optical design requires relatively expensive vacuum deposition for stringent thickness control.
113
+ Our previous optical design 14 based on Lorentz-Mie scattering theory and Four-Flux model has
114
+ found it feasible to achieve good solar selectivity in nanoparticle (NP)-pigmented silicone coatings
115
+ for NPs with diameters <40 nm and steep optical transition near the optimal cut-off wavelength
116
+ (λcut) between the solar spectrum and the thermal radiation spectrum. For Generation 3 CSP
117
+ systems, λcut=2475 nm for 1000x solar concentration at 750ºC. Spinel (AB2O4) NPs with intrinsic
118
+ high-temperature thermal stability is a promising candidate since their manifold compositions and
119
+ cationic valences enable a high degree of freedom to tailor the optical properties. Previously, we
120
+ have demonstrated MnFe2O4 NP-pigmented solar selective coatings maintaining ηtherm ~89%
121
+ under 1000x solar concentration after serving at 750ºC in air for 700h. 15 To further enhance the
122
+ performance, in this Paper we demonstrate spinel Cu-Mn-Cr oxide NP-pigmented silicone solar
123
+ selective coatings on Inconel tube sections with a higher solar absorbance αsolar=98.2% and a
124
+ notably reduced thermal emittance εtherm=59.4% compared to benchmark Pyromark 2500
125
+ (αsolar=96.0%; εtherm=89.5%). To the best of our knowledge, this performance leads to a record-
126
+ high ηtherm=94.50.2% for 1000x solar concentration at 750ºC in air. These coatings also maintain
127
+ ηtherm≥94% at 750ºC and ηtherm ≥92.5% at 800ºC after 60 simulated day (750ºC/800 ºC 12h) and
128
+ night (25 ºC 12h) cycles in air without degradation in surface morphology or phase stability. The
129
+ solar spectral selectivity is intrinsic to the band-to-band and d-d transitions of non-stoichiometric
130
+ spinel Cu-Mn-Cr oxide NPs. This feature offers a large fabrication tolerance in nanoparticle
131
+ volume fraction and coating thickness, greatly facilitating high-efficiency solar selective absorbers
132
+ layers via low-cost and highly scalable spray coating for high-temperature CSP systems.
133
+
134
+ 5
135
+
136
+ 2. Results and Discussions
137
+
138
+ Figure 1. (a) XRD pattern of the synthesized spinel Cu-Mn-Cr oxide NPs. A small amount of
139
+ Mn2O3 is also identified. (b) shows a TEM image of the NPs, and (c) zooms into one of the NPs
140
+ in the red box shown in (b).
141
+ Structural and Compositional Analyses of Spinel Cu-Mn-Cr Oxide NPs. We utilized co-
142
+ precipitation method to synthesize spinel oxide NPs with Cu:Mn:Cr=1:3:1 from nitrate salt
143
+ precursors (see Supporting Information Section 1). Such a nonstoichiometric ratio is selected to
144
+ optimize the solar selective absorption by engineering the valences of cations and cationic site
145
+ distribution to our advantage, as will be discussed later. These NPs are further annealed at 550°C
146
+ to enhance the crystallinity. Energy dispersive X-ray spectroscopy (EDS) analysis shows
147
+ Cu:Mn:Cr =1.00:3.33:1.17 in the synthesized NPs, close to the targeted ratio. Figure 1a shows the
148
+ X-ray diffraction (XRD) pattern of the synthesized NPs loaded on Si(100) substrate. Most of the
149
+ peaks are attributed to spinel structure with a lattice constant of a=8.307 Å, between those of cubic
150
+ CuMn2O4 (a=8.331 Å) and CuCr2O4 (a=8.270 Å) 16 as expected for spinel Cu-Mn-Cr oxide. A
151
+ couple of small peaks from Mn2O3 are also observed, consistent with the phase diagram reported
152
+ for Cu-Mn spinel oxides with Cu:Mn <1. 17 Based on XRD relative intensity ratio (RIR) analysis,
153
+ the molar ratio of Cu-Mn-Cr spinel oxide to Mn2O3 is 1:(0.142 0.018). Figures 1b and 1c further
154
+
155
+ (a)
156
+ Spinel
157
+ (b)
158
+ (c)
159
+ (311)
160
+ Mn203
161
+ Intensity
162
+ si (400)
163
+ (511)
164
+ (440)
165
+ (111)
166
+ (220)
167
+ (400)
168
+ (422)
169
+ (533)
170
+ d=0.481nm
171
+ (111)
172
+ (222)
173
+ 50nm
174
+ nm
175
+ 20
176
+ 30
177
+ 40
178
+ 50
179
+ 60
180
+ 70
181
+ 80
182
+ 2 theta (degree)6
183
+
184
+ show transmission electron microscopy (TEM) images of the NPs. The average NP diameter is
185
+ 313.6 nm (see the NP size histogram in Supporting Information Figure S1). The interplanar
186
+ spacing of {111} planes is 4.81 Å in the high-resolution TEM image in Figure 1c, fully consistent
187
+ with the XRD results.
188
+ Furthermore, X-ray photoelectron spectroscopy (XPS) analyses provide the valences and the
189
+ corresponding percentages of the cations, as summarized in Table 1 (see Supporting Information
190
+ Section 3 for data analyses). Notably, the Cu+:Cu2+ ratio is as high as 4:1. It has been reported that
191
+ Cu+ on tetrahedral A sites in spinel oxides can be stabilized by Cu2+ and Mn4+ on octahedral B
192
+ sites 17. According to ligand field theory (LFT) and the octahedral site preference energy (OSPE)
193
+ 18,19 , Cu+(3d10) and Mn2+(3d5) prefer tetrahedral sites while Cu2+, Mn3+ and Cr3+/Mn4+ are
194
+ sequentially more energetically favored to take the octahedral sites. Therefore, considering the
195
+ cation valance distribution, OSPE, and overall charge balance, the detailed formula can be written
196
+ as (Cu+0.48Mn2+0.52)Td,A(Cu2+0.12Mn2+0.07Mn3+0.65Mn4+0.46Cr3+0.70)oh,BO3.89 assuming OSPE fully
197
+ applies. Here, the subscripts “Td,A” and “Oh,B” stand for tetrahedral A site and octahedral B site,
198
+ respectively. Characteristic vibration modes corresponding to octahedral and tetrahedral sites in
199
+ spinel structures are also observed in Fourier transform IR spectroscopy (FTIR) and detailed in the
200
+ Supporting Information (Figure S3). On the other hand, even though OSPE is highly effective in
201
+ predicting cation lattice sites, we note that ~30% site inversion of Mn3+ from octahedral to
202
+ tetrahedral sites has been reported in closely related CuMn2O4 spinel structures in order to dilute
203
+ the Jahn-Teller effect. 20 Such Mn3+ site inversion can lead to strong and broad absorption bands
204
+ in the near infrared (NIR) regimes at 1000-2000 nm wavelength. 21,22 Furthermore, the deficiency
205
+ of oxygen compared to stoichiometric AB2O4 indicates oxygen vacancies, likely on the surface of
206
+ the NPs as has been reported in other spinel NP systems. 23 Oxygen vacancies are known to interact
207
+
208
+ 7
209
+
210
+ with transition metal cations and further enhanced the NIR absorption. 24 These influences on
211
+ optical properties will be discussed next.
212
+ Table 1. Cu:Mn:Cr atomic ratios and corresponding cationic valences/percentages in the synthesized NPs
213
+ comprising both spinel Cu-Mn-Cr oxide and Mn2O3 at a ratio of 1:0.142
214
+ Atomic Species
215
+ Atomic Ratio
216
+ Ionic Valence/Molar Percentage
217
+ Cu
218
+ 1.00
219
+ Cu+: 80%
220
+ Cu2+: 20%
221
+ Mn
222
+ 3.33
223
+ Mn2+: 30%
224
+ Mn3+: 47%
225
+ Mn4+: 23%
226
+ Cr
227
+ 1.17
228
+ Cr3+:100%
229
+
230
+
231
+
232
+ Figure 2. (a) Indirect bandgap Tauc plot of the spinel Cu-Mn-Cr oxide NPs (b) Absorption
233
+ spectrum beyond the indirect bandgap and the corresponding Gaussian peaks fitting. The two
234
+
235
+ (a)
236
+ (b)
237
+ 103
238
+ x104
239
+ Indirect gap absorption subtracted
240
+ IndirectBandgapTaucPlot
241
+ Overall fitting
242
+ Individual Gaussian peakfitting
243
+ 8.
244
+ 1.0
245
+ α(cm")
246
+ 6
247
+ 0.95eV
248
+ 4
249
+ 1.95,eV
250
+ 0.5
251
+ 2
252
+ 0.0-
253
+ fo
254
+ 0.51.01.52.02.53.03.5
255
+ 4.0
256
+ 0.5
257
+ 1.0
258
+ 1.5
259
+ 2.0
260
+ 2.5
261
+ 3.0
262
+ Photon Energy (eV)
263
+ Photon Energy (eV)
264
+ (c)
265
+ (d)
266
+ SolarAbsorptanceContours
267
+ Thermal EfficiencyContours
268
+ 15
269
+ 15
270
+ αsolar (%)
271
+ Thickness (um)
272
+ Ntherm (%)
273
+ 92.83
274
+ 94
275
+ 92
276
+ 95
277
+ 93.12
278
+ 90
279
+ 98.67
280
+ .34
281
+ 88
282
+ 10
283
+ 10
284
+ 90
285
+ 86
286
+ 93.41
287
+ 9o.
288
+ Coating
289
+ 28
290
+ 84
291
+ 93.70
292
+ 98.02
293
+ 85
294
+ 7397.
295
+ 93.99
296
+ 82
297
+ 97.70
298
+ 5
299
+ 5
300
+ 5
301
+ 10
302
+ 15
303
+ 5
304
+ 10
305
+ 15
306
+ NPVolumeConcentration(%)
307
+ NPVolumeConcentration(%)8
308
+
309
+ absorption bands peaked at 0.95 eV and 1.95 eV are mainly contributed by Cu2+ and Mn3+ d-d
310
+ transitions on tetrahedral and octahedral sites, respectively. (c) and (d) show theoretical modeling
311
+ of solar absorptance and thermal efficiency contour maps as a function of NP volume fraction and
312
+ coating thickness when dispersed in silicone matrix.
313
+ Optical Properties. Critical to the optical performance is the absorption spectrum of Cu-Mn-Cr
314
+ oxide NPs, as shown in the Tauc plot in Figure 2a. It reveals an indirect gap of 1.68 0.04 eV.
315
+ Remarkably, the absorption beyond the indirect gap is extended all the way to 0.5 eV with
316
+ absorption coefficients >104 cm-1 to cover the entire solar spectrum. To single out the absorption
317
+ spectrum beyond the indirect bandgap, we subtract the indirect bandgap absorption (as derived
318
+ from the Tauc plot) from Figure 2a and show the result in Figure 2b. Two broad Gaussian
319
+ absorption bands peaked at 0.95 and 1.95 eV are clearly identified, typical of d-d transitions
320
+ between the split d levels of transition metal ions induced by tetrahedral or octahedral ligand
321
+ (crystal) field. 21 The energy ratio of these two peaks is 0.48, very close to the expected ratio of
322
+ 4/9 for tetrahedral site vs. octahedral site d-d transition energies in spinel structures. 25 Therefore,
323
+ the 0.95 eV and 1.95 eV absorption bands are attributed to tetrahedral and octahedral site d-d
324
+ transitions, respectively. Note that in most of these d-d transitions, the excited electrons still remain
325
+ localized to the transition metal ion instead of becoming free electrons in the conduction band,
326
+ therefore the transition energy is lower than the bandgap. The 0.95 eV peak is between the
327
+ tetrahedral site Cu2+ absorption band peaked at ~0.8 eV 25–27 and that of Mn3+ peaked at ~1.2 eV,
328
+ 21,22 suggesting both types of ions on tetrahedral sites have contributed to this NIR d-d absorption
329
+ band. Typically, the oscillation strength of tetrahedral d-d transition is stronger than their
330
+ octahedral counterparts due to broken inversion symmetry that enables various spin-forbidden
331
+ transitions.21,25 In our case, on the other hand, the octahedral d-d absorption at 1.95 eV is ~2x
332
+
333
+ 9
334
+
335
+ stronger than tetrahedral absorption at 0.95 eV. This result indicates that a relatively small fraction
336
+ of Cu2+ and Mn3+ cations occupy tetrahedral sites compared to octahedral sites, consistent with the
337
+ prediction of OSPE discussed earlier and similar to the case of CuMn2O4 in terms of a small
338
+ fraction of site inversion.20 Such a distribution is beneficial to solar selectivity, where a decrease
339
+ in absorption beyond the optimal cut-off wavelength of 2475 nm (hv<0.5 eV) is needed, as
340
+ mentioned earlier. Since Cr3+ and Mn4+ have the strongest tendency to compete for octahedral sites
341
+ based on OSPE, tuning their percentages may further optimize Cu2+ and Mn3+ site inversion for
342
+ better solar selectivity. In addition, oxygen vacancies, as identified in our previous analyses,
343
+ further lower the ligand symmetry to enhance the oscillation strength of d-d optical absorption
344
+ especially in the NIR solar spectral regime at 0.5-1 eV, as has been reported in spinel ZnFe2O4
345
+ system.28 Therefore, these two factors work synergistically to enhance the overall solar selectivity.
346
+ Optical Modeling of Spinel Cu-Mn-Cr Oxide NP-Pigmented Solar Selective Coatings. Based
347
+ on the absorption spectra of the spinel Cu-Mn-Cr oxide NPs, we further modelled the spectrally
348
+ integrated solar absorptance αSolar and the thermal efficiency ηtherm for 1000x solar concentration
349
+ at 750ºC using Lorentz-Mie scattering theory and four-flux radiative model, as detailed in Refs.
350
+ 14 and 15. Figure 2c and d show αSolar and ηtherm contour maps, respectively, as a function of NP
351
+ volume fraction and coating thickness when dispersed in silicone matrix for the solar absorber
352
+ coating. The intrinsic solar spectral selectivity of the NPs and their nanoscale diameters (d=313.6
353
+ nm) lead to a large tolerance in coating thickness and NP volume fraction, such that αSolar>97.4%
354
+ and ηtherm>93.6% can be achieved even if the NP volume fraction varies between 7-13 vol.% and
355
+ the coating thickness varies between 6-15 μm. Such a high fabrication tolerance greatly facilitates
356
+ low-cost and highly scalable spray-coated solar selective absorbers. The green stars and red error
357
+ bars in Figures 2c and d reflect the experimentally measured coating thickness and NP volume
358
+
359
+ 10
360
+
361
+ fraction variations in our spray-coated Inconel tube section samples. From the modeling, we expect
362
+ αSolar98% and ηtherm94%.As will be detailed next, these theoretically modelled values indeed
363
+ agree very well with the experimental results.
364
+ Characterization and Optical Performance of the Spray-Coated Solar Selective Coating.
365
+ Figure 3a shows a photograph of an Inconel 625 tube section (outer diameter=76 mm) coated with
366
+ the spinel Cu-Mn-Cr oxide NP-pigmented silicone solar selective absorber and annealed in air at
367
+ 750ºC for 24h. Detailed coating procedure is discussed in Section 1 of the Supporting Information.
368
+ Figure 3b shows a digital optical microscopy image of the surface profile, indicating a surface
369
+ undulation of ~6 μm with sporadic humps reaching >10 μm in height. A focus ion beam (FIB)
370
+ cross-sectional cutting is made on a relatively flat and thin region, revealing an average thickness
371
+ of 5.5 μm as shown in Figure 3c. Using this flat region as a calibration and the surface profile in
372
+ Figure 3b, we determined that overall, the coating thickness is 8.5 3 μm. The volume fraction of
373
+ the spinel Cu-Mn-Cr oxide NPs is estimated to be 10 3 vol.%, as detailed in Section 5 of the
374
+ Supporting Information. These parameters allow us to model the expected performance of the
375
+ coating, as shown in Figures 2c and 2d. The XRD data in Figure 3d shows that the spinel structure
376
+ is well maintained and the crystallinity gets better (narrower diffraction peaks) after 750ºC
377
+ annealing for 24h in air.
378
+ Remarkably, Figure 3e and f demonstrate that the new spinel Cu-Mn-Cr oxide NP-pigmented
379
+ solar selective coating improves the solar absorptance αSolar from 96.0% to 98.2% compared to
380
+ benchmark Pyromark 2500, while simultaneously the thermal emittance εtherm is drastically
381
+ reduced from 89.5% to 59.4%. Correspondingly, ηtherm is notably increased from 90.40.3% to
382
+ 94.50.2%. As will be further discussed in Table 2, to the best of our knowledge, so far this is the
383
+
384
+ 11
385
+
386
+ highest optical-to-thermal conversion efficiency for air-stable solar selective coatings operating at
387
+ 750ºC.
388
+
389
+ Figure 3. (a) A photograph of an Inconel 625 tube section (outer diameter=76 mm) coated with
390
+ spinel Cu-Mn-Cr oxide NP-pigmented silicone solar selective absorber layer. (b) An optical
391
+ topography map of the solar selective coating, including a 3D view and a top view in the inset. (c)
392
+ FIB cross-section of the coating in a relatively flat and thin region in (b) for thickness calibration.
393
+ (d) XRD pattern of the coated sample after annealing for 24 h at 750ºC in air compared to that of
394
+ the as-synthesized particles. (e) and (f) show solar absorptance and thermal emittance spectra of
395
+ the Cu-Mn-Cr oxide NP-pigmented silicone solar selective coating compared to benchmark
396
+ Pyromark 2500.
397
+
398
+ Endurance Testing. We further performed extensive thermal cycling for endurance testing of
399
+ these high efficiency solar selective coatings. Each simulated day/night thermal cycle includes 12h
400
+ annealing at 750ºC or 800ºC and 12h cooling to 25ºC. Here thermal cycles at 800ºC (i.e., 50ºC
401
+
402
+ (a)
403
+ (b)
404
+ (c)
405
+ 11
406
+ Pt
407
+ 6
408
+ Solar coating
409
+ 4
410
+ 200μm
411
+ Cr,
412
+ InconelSubstrate
413
+ 10cm
414
+ 300
415
+ 400
416
+ 500
417
+ 400
418
+ 300200100
419
+ 200
420
+ 10μm
421
+ 100
422
+ (d)
423
+ (e)
424
+ (f) 100
425
+ 750°C24h
426
+ Spinel
427
+ 100
428
+ as-synthesized
429
+ Mn203
430
+ (%)
431
+ (311)
432
+ Inconel625
433
+ 80
434
+ Pyromark2500
435
+ 80
436
+ Thermal
437
+ larAbsorptance
438
+ Cu-Mn-Cr oxide
439
+ Emittance
440
+ EmittanceLoss
441
+ Intensity
442
+ (220)
443
+ 60
444
+ 100
445
+ 60
446
+ +(111)
447
+ (222)
448
+ (440)
449
+ (422)
450
+ 98
451
+
452
+ 15
453
+ SolarAbsorptance
454
+ 40
455
+ 96
456
+ 40
457
+ Thermal
458
+ (400)
459
+ 20
460
+ 92
461
+ 20
462
+ Pyromark2500
463
+ Sol
464
+ Cu-Mn-Croxide
465
+ 901
466
+ 500
467
+ 1000
468
+ 1500
469
+ 2000
470
+ 2500
471
+ 20
472
+ 30
473
+ 40
474
+ 50
475
+ 0
476
+ +0
477
+ 60
478
+ 500
479
+ 1000
480
+ 1500
481
+ 2000
482
+ 2500
483
+ 3000
484
+ 6000
485
+ 9000
486
+ 12000
487
+ 2 theta (degree)
488
+ Wavelength(nm)
489
+ Wavelength(nm)12
490
+
491
+ higher than the working temperature) are conducted to further confirm thermal stability and to
492
+ investigate possible degradation mechanisms at an accelerated rate. Solar coatings on Inconel 625
493
+ tube sections (with outer diameter=76 mm as shown in Figure 3) are annealed for up to 60
494
+ simulated day/night cycles in air. Comparing the surface morphology from scanning electron
495
+ microscopy (SEM) images shown in Figures 4a-c, we find no deterioration in coating integrity or
496
+ appreciable changes in morphology after 60 cycles between 750ºC/800ºC and 25ºC. The
497
+ micropores on the surface of the samples help to accommodate volume changes upon thermal
498
+ cycling, thereby stabilizing the coating against thermal stress. Such surface texture also helps to
499
+ reduce surface reflectance and enhance solar absorption, similar to the case of PV cells. XRD
500
+ analyses further show that the spinel Cu-Mn-Cr oxide NPs are thermodynamically stable upon
501
+ thermal cycling (see Section 6 of the Supporting Information). Figures 4d-f show the evolution of
502
+ solar absorptance spectra, thermal emittance spectra, and spectrally integrated solar
503
+ absorptance/thermal emittance/thermal efficiency vs. the number of thermal cycles between 750ºC
504
+ and 25ºC. The solar absorptance decreases only very slightly after 60 thermal cycles between
505
+ 750ºC and 25ºC, while the thermal emittance fluctuates around 60% during the cycling,
506
+ maintaining a record-high thermal efficiency ηtherm>94% during the entire thermal cycles. Similar
507
+ data shown in Figures 4g-i indicate a more noticeable decrease in solar absorptance when the high
508
+ temperature cycles are increased to 800ºC. Even so, a high ηtherm=92.80.3% is still maintained
509
+ after 60 thermal cycles between 800ºC and 25ºC. The increasingly wavy solar absorption spectra
510
+ upon 800ºC/25ºC thermal cycling with reduced solar absorptance closely resemble the behavior
511
+ of CuCr2O4 NP-pigmented coatings (intentionally synthesized for comparison; see Section 7 of
512
+ Supporting Information) as well as previous literature on CuCr2O4 due to Cr3+ d-d absorption bands.
513
+ 29 In fact, these peaks and valleys blueshift towards those of CuCr2O4 after more cycles. This result
514
+
515
+ 13
516
+
517
+ suggests Cr diffusion and substitution into the Cu-Mn-Cr spinel oxide NPs from the Inconel
518
+ substrate as the key mechanism for the slight solar absorptance degradation upon 800ºC/25ºC
519
+ thermal cycling. This is indeed confirmed by detailed cross-sectional EDS mapping before and
520
+ after the thermal cycling, as detailed in Section 7 of the Supporting Information. Therefore,
521
+ limiting Cr diffusion into the coating could further improve the endurance of the solar selective
522
+ coating. A possible approach is to pre-oxidize the Inconel substrate to form a Cr2O3 layer first
523
+ before spray-coating, which has proved to be an effective approach to address the Cr diffusion
524
+ issue in our previous work. 15
525
+
526
+ Figure 4. SEM surface morphology of the coatings on Inconel 625 tube sections (76 mm outer
527
+ diameter) after (a) 750ºC 24h annealing; (b) 750ºC 24h annealing plus 60 simulated day-night
528
+
529
+ 750°c.24h
530
+ 500um
531
+ After60 cyclesbetween
532
+ 500μm
533
+ After60cycles between
534
+ 500um
535
+ 750°C(12h)/25°C(12h)
536
+ 800°c(12h)/25°c(12h)
537
+ Opticalperformanceafter750°C/25°cThermal Cycling
538
+ (d)
539
+ [e)100
540
+ 100
541
+ 24h
542
+ Absorptance (%)
543
+ 80
544
+ Cycle10
545
+ 80
546
+ 90.
547
+ cycle 30
548
+ (%)
549
+ SolarAbsorptance
550
+ cycle60
551
+ Thermal Emittance
552
+ 60
553
+ 66
554
+ Emittance
555
+ 60
556
+ 80.
557
+ Thermal Efficiency
558
+ 86
559
+ 40
560
+ 40
561
+ 70.
562
+ 97
563
+ 24h
564
+ 20
565
+ 96
566
+ 20
567
+ cycle10
568
+ 60
569
+ cycle30
570
+ 95
571
+ 500
572
+ 1000
573
+ 1500
574
+ 2000
575
+ cycle60
576
+ 2500
577
+ 0.
578
+ 0.
579
+ 50
580
+ 500
581
+ 1000
582
+ 1500
583
+ 2000
584
+ 2500
585
+ 3000
586
+ 6000
587
+ 9000
588
+ 12000
589
+ 10
590
+ 20
591
+ 30
592
+ 40
593
+ 50
594
+ 60
595
+ Wavelength (nm)
596
+ Wavelength (nm)
597
+ #of Simulated Day-Night Cycles
598
+ Optical performance after 800°C/25°C Thermal Cycling
599
+ (g) 100
600
+ (h) 100
601
+ (0) 100
602
+ %
603
+ 24h
604
+ Absorptance (%)
605
+ 80
606
+ cycle 10
607
+ 80
608
+ 90-
609
+ cycle30
610
+ (%)
611
+ Solar Absorptance
612
+ cycle 60
613
+ Thermal Emittance
614
+ 60
615
+ Emittance
616
+ 100
617
+ 60
618
+ 80.
619
+ Thermal Efficiency
620
+ 98
621
+ 40
622
+ 40
623
+ 70
624
+ 96
625
+ 24h
626
+ 20
627
+ 94
628
+ 20
629
+ cycle10
630
+ 60-
631
+ cycle 30
632
+ 92
633
+ 500
634
+ 1000
635
+ 1500
636
+ 2000
637
+ 2500
638
+ cycle60
639
+ 0-
640
+ 50.
641
+ 500
642
+ 1000
643
+ 1500
644
+ 2000
645
+ 2500
646
+ 3000
647
+ 6000
648
+ 9000
649
+ 12000
650
+ 0
651
+ 10
652
+ 20
653
+ 30
654
+ 40
655
+ 50
656
+ 60
657
+ Wavelength(nm)
658
+ Wavelength (nm)
659
+ #of Simulated Day-Night Cycles14
660
+
661
+ cycles between 750 ºC and 25 ºC; (c) 750ºC 24h annealing plus 60 simulated day-night cycles
662
+ between 800 ºC and 25 ºC. (d)-(f) show the evolution of solar absorptance spectra, thermal
663
+ emittance spectra, and spectrally integrated solar absorptance/thermal emittance/thermal
664
+ efficiency vs. the number of thermal cycles between 750ºC and 25ºC. (g)-(i) show similar data for
665
+ thermal cycles between 800ºC and 25ºC
666
+ Table 2 compares the efficiency and endurance of our coating with some recent work. Most of the
667
+ previous solar coatings lack spectral selectivity with a thermal emittance ~90%, limiting their
668
+ thermal efficiency to ηtherm~90.5%. We have notably improved ηtherm to >94% by engineering and
669
+ balancing the intrinsic NIR vs. visible d-d absorption bands of Cu2+ and Mn3+ on tetrahedral vs.
670
+ octahedral sites of spinel structure. The thermal emittance is drastically reduced to ~60% while a
671
+ high solar absorptance of ~98% is maintained. To the best of our knowledge, this is the highest
672
+ efficiency demonstrated and maintained so far for 750ºC endurance testing in air. Optimizing the
673
+ extent of lattice site inversion of Cu2+ and Mn3+ on tetrahedral vs. octahedral sites by fine-tuning
674
+ Cr3+ and Mn4+ percentages may further improve the spectral selectivity towards ηtherm>95%. The
675
+ intrinsic solar spectral selectivity of the spinel Cu-Mn-Cr oxide NPs also enables an excellent
676
+ fabrication margin for cost-effective, highly scalable spray coating, as preliminary demonstrated
677
+ on a 48-inch-long tube shown in Figure S8 of the Supporting Information.
678
+ Table 2 High-temperature solar selective coatings with reported endurance test
679
+ Material System
680
+ Substrate
681
+ Fabrication Method
682
+ ηstart
683
+ ηend
684
+ T (℃)
685
+ Endurance in
686
+ Air (h/℃)
687
+ Refs.
688
+ Cu0.15Co2.84O4-SPB-SiO2
689
+ Inconel 625
690
+ Spray Coating
691
+ 0.904
692
+ 0.903
693
+ 750
694
+ 1000/750
695
+ Ref.30
696
+ Cu1.5Mn1.5O4-SPB-SiO2
697
+ Inconel 625
698
+ Spray Coating
699
+ 0.909
700
+ 0.905
701
+ 750
702
+ 1000/750
703
+ Ref.30
704
+ Porous Cu0.5Cr1.1Mn1.4O4-SiO2
705
+ Haynes 230
706
+ Spray Coating
707
+ 0.903
708
+ 0.902
709
+ 800
710
+ 2000/800
711
+ Ref.11
712
+
713
+ 15
714
+
715
+ Cu0.86Cr0.14Mn1.5Fe0.5O4-SiO2
716
+ Inconel 617
717
+ Spray Coating
718
+ ≤ 0.917
719
+ ≤ 0.894
720
+ 750
721
+ 1300/800
722
+ Ref.31
723
+ TiN/AlCrSiO(two nano-multilayers)
724
+ /AlCrSiO(amorphous)
725
+ SS
726
+ Cathode Arc Ion
727
+ Plating
728
+ ≤ 0.908
729
+ ≤ 0.867
730
+ 750
731
+ 200/700
732
+ Ref.32
733
+ Spinel Cu-Mn-Cr oxide NP-silicone
734
+ Inconel 625
735
+ Spray Coating
736
+ 0.945
737
+ 0.942
738
+ 750
739
+ 60 thermal
740
+ cycles
741
+ 750ºC/25 ºC
742
+ This
743
+ work-
744
+ 0.937
745
+ 0.928
746
+ 800
747
+ 60 thermal
748
+ cycles
749
+ 800ºC/25 ºC
750
+ This
751
+ work-
752
+
753
+ ηstart: efficiency as deposited; ηend: efficiency after annealing;
754
+ T: temperature at which thermal efficiency is evaluated.
755
+ Note that Refs. 31 and 32 only reported thermal emittance at 80ºC instead of high
756
+ temperatures >700ºC. We therefore estimated the upper limit of the thermal efficiency at high
757
+ temperatures in these cases using 80ºC thermal emittance values, considering thermal emittance
758
+ typically increases at higher temperatures.
759
+ 3. Conclusions
760
+ In conclusion, we demonstrate spray-coated spinel Cu-Mn-Cr oxide NP-pigmented solar
761
+ selective coating that maintains ηtherm >94% upon 60 simulated day-night cycles between 750ºC
762
+ and 25ºC in air. The spectral selectivity is intrinsic to the band-to-band and d-d transitions of
763
+ these non-stoichiometric spinel NPs, where Cu2+ and Mn3+ on tetrahedral sites (through spinel
764
+ site inversion) contribute to the NIR absorption band to cover the entire solar spectrum up to
765
+ 2500 nm wavelength. This feature offers a large fabrication tolerance in NP volume fraction and
766
+ coating thickness, greatly facilitating high-efficiency, high-temperature solar selective absorbers
767
+ layers via low-cost and highly scalable spray coating for Generation 3 high-temperature CSP
768
+ systems.
769
+
770
+ 16
771
+
772
+ ASSOCIATED CONTENT
773
+ Supporting Information includes experimental methods, nanoparticle size (diameter) histogram,
774
+ XPS data analyses, FTIR data analyses, volume fraction determination, XRD analyses during
775
+ thermal endurance tests, optical spectra and EDS mapping for interdiffusion investigation, and
776
+ solar selective coating on a 48-inch-long tube.
777
+ AUTHOR INFORMATION
778
+ Corresponding Author
779
+ Jifeng Liu − Thayer School of Engineering, Dartmouth College, 14 Engineering Drive, Hanover,
780
+ New Hampshire 03755, United States; Email: [email protected]
781
+ ORCID: 0000-0003-4379-2928
782
+ Authors
783
+ Can Xu − Thayer School of Engineering, Dartmouth College, 14 Engineering Drive, Hanover,
784
+ New Hampshire 03755, United States; https://orcid.org/0000-0001-5306-5367;
785
+ Xiaoxin Wang − Thayer School of Engineering, Dartmouth College, 14 Engineering Drive,
786
+ Hanover, New Hampshire 03755, United States;
787
+ Notes
788
+ The authors declare no competing financial interest.
789
+
790
+ ACKNOWLEDGMENTS
791
+ This project is funded by U.S. Department of Energy, Solar Energy Technologies Office, under
792
+ the award number DE-EE-0008530. We would like to thank Dr. Maxime J. Guinel at Dartmouth
793
+
794
+ 17
795
+
796
+ College and Dr. Jules Gardener at Harvard University for their support with electron microscopy
797
+ analyses, and Dr. Min Li at Yale University for support with XPS.
798
+ REFERENCES
799
+ (1)
800
+ EIA. What is U.S. electricity generation by energy source?
801
+ https://www.eia.gov/tools/faqs/faq.php?id=427&t=3 (accessed 2022 -04 -13).
802
+ (2)
803
+ Jacobson, M. Z.; Delucchi, M. A. Providing All Global Energy with Wind, Water, and
804
+ Solar Power, Part I: Technologies, Energy Resources, Quantities and Areas of
805
+ Infrastructure, and Materials. Energy Policy 2011, 39 (3), 1154–1169.
806
+ https://doi.org/10.1016/j.enpol.2010.11.040.
807
+ (3)
808
+ Murphy, C.; Sun, Y.; Cole, W.; Maclaurin, G.; Turchi, C.; Mehos, M.; Murphy, C.; Sun,
809
+ Y.; Cole, W.; Maclaurin, G.; Turchi, C.; Mehos, M. The Potential Role of Concentrating
810
+ Solar Power within the Context of DOE’s 2030 Solar Cost Targets; Golden, Colorado,
811
+ 2019.
812
+ (4)
813
+ Boubault, A.; Ho, C. K.; Hall, A.; Lambert, T. N.; Ambrosini, A. Levelized Cost of
814
+ Energy (LCOE) Metric to Characterize Solar Absorber Coatings for the CSP Industry.
815
+ Renew. Energy 2016, 85, 472–483. https://doi.org/10.1016/j.renene.2015.06.059.
816
+ (5)
817
+ Mehos, M.; Turchi, C.; Vidal, J.; Wagner, M.; Ma, Z.; Ho, C.; Kolb, W.; Andraka, C.;
818
+ Kruizenga, A. Concentrating Solar Power Gen3 Demonstration Roadmap; Golden,
819
+ Colorado, 2017. https://doi.org/10.2172/1338899.
820
+
821
+ 18
822
+
823
+ (6)
824
+ Suman, S.; Khan, M. K.; Pathak, M. Performance Enhancement of Solar Collectors - A
825
+ Review. Renew. Sustain. Energy Rev. 2015, 49, 192–210.
826
+ https://doi.org/10.1016/j.rser.2015.04.087.
827
+ (7)
828
+ Ho, C. K.; Ambrosini, A.; Bencomo, M.; Hall, A. C.; Lambert, T. N.; Mahoney, A. R.
829
+ Characterization of Pyromark 2500 for High-Temperature Solar Receivers. In the ASME
830
+ 2012 6th International Conference on Energy Sustainability; San Diego, CA, 2012.
831
+ (8)
832
+ Ambrosini, A. High‐Temperature Solar Selective Coating Development for Power Tower
833
+ Receivers https://www.energy.gov/sites/prod/files/2016/08/f33/R 5 - Ambrosini_CSP-
834
+ Program-Summit-SSC Presentation_to DOE.pdf.
835
+ (9)
836
+ Ambrosini, A.; Lambert, T. N.; Boubault, A.; Hunt, A.; Davis, D. J.; Adams, D.; Hall, A.
837
+ C. Thermal Stability of Oxide-Based Solar Selective Coatings for CSP Central Receivers.
838
+ In Proceedings of the ASME 2015 9th International Conference on Energy Sustainability;
839
+ San Diego, California, 2015; pp 1–10. https://doi.org/10.1115/ES2015-49706.
840
+ (10) Moon, J.; Kyoung Kim, T.; VanSaders, B.; Choi, C.; Liu, Z.; Jin, S.; Chen, R. Black
841
+ Oxide Nanoparticles as Durable Solar Absorbing Material for High-Temperature
842
+ Concentrating Solar Power System. Sol. Energy Mater. Sol. Cells 2015, 134, 417–424.
843
+ https://doi.org/10.1016/j.solmat.2014.12.004.
844
+ (11) Rubin, E. B.; Chen, Y.; Chen, R. Optical Properties and Thermal Stability of Cu Spinel
845
+ Oxide Nanoparticle Solar Absorber Coatings. Sol. Energy Mater. Sol. Cells 2019, 195
846
+ (January), 81–88. https://doi.org/10.1016/j.solmat.2019.02.032.
847
+
848
+ 19
849
+
850
+ (12) Cao, F.; McEnaney, K.; Chen, G.; Ren, Z. A Review of Cermet-Based Spectrally
851
+ Selective Solar Absorbers. Energy Environ. Sci. 2014, 7 (5), 1615–1627.
852
+ https://doi.org/10.1039/c3ee43825b.
853
+ (13) Ambrosini, A. High-Temperature Solar Selective Coating Development for Power Tower
854
+ Receivers
855
+ http://energy.gov/sites/prod/files/2014/01/f7/csp_review_meeting_042413_ambrosini.pdf.
856
+ (14) Wang, X.; Yu, X.; Fu, S.; Lee, E.; Kekalo, K.; Liu, J. Design and Optimization of
857
+ Nanoparticle-Pigmented Solar Selective Absorber Coatings for High-Temperature
858
+ Concentrating Solar Thermal Systems. J. Appl. Phys. 2018, 123 (3).
859
+ https://doi.org/10.1063/1.5009252.
860
+ (15) Wang, X.; Lee, E.; Xu, C.; Liu, J. High-Efficiency, Air-Stable Manganese–Iron Oxide
861
+ Nanoparticle-Pigmented Solar Selective Absorber Coatings toward Concentrating Solar
862
+ Power Systems Operating at 750 °C. Mater. Today Energy 2021, 19.
863
+ https://doi.org/10.1016/j.mtener.2020.100609.
864
+ (16) Brik, M. G.; Suchocki, A.; Kamińska, A. Lattice Parameters and Stability of the Spinel
865
+ Compounds in Relation to the Ionic Radii and Electronegativities of Constituting
866
+ Chemical Elements. Inorg. Chem. 2014, 53 (10), 5088–5099.
867
+ https://doi.org/10.1021/ic500200a.
868
+ (17) Vandenberghe, R. E.; Robbrecht, G. G.; Brabers, V. A. M. On the Stability of the Cubic
869
+ Spinel Structure in the System Cu-Mn-O. Mater. Res. Bull. 1973, 8 (5), 571–579.
870
+ https://doi.org/10.1016/0025-5408(73)90134-7.
871
+
872
+ 20
873
+
874
+ (18) Liu, Y.; Ying, Y.; Fei, L.; Liu, Y.; Hu, Q.; Zhang, G.; Pang, S. Y.; Lu, W.; Mak, C. L.;
875
+ Luo, X.; Zhou, L.; Wei, M.; Huang, H. Valence Engineering via Selective Atomic
876
+ Substitution on Tetrahedral Sites in Spinel Oxide for Highly Enhanced Oxygen Evolution
877
+ Catalysis. J. Am. Chem. Soc. 2020, 141 (20), 8136–8145.
878
+ https://doi.org/10.1021/jacs.8b13701.
879
+ (19) Navrotsky, A.; Kleppa, O. J. The Thermodynamics of Cation Distributions in Simple
880
+ Spinels. J. Inorg. Nucl. Chem. 1967, 29 (11), 2701–2714. https://doi.org/10.1016/0022-
881
+ 1902(67)80008-3.
882
+ (20) Shoemaker, D. P.; Li, J.; Seshadri, R. Unraveling Atomic Positions in an Oxide Spinel
883
+ with Two Jahn-Teller Ions: Local Structure Investigation of CuMn2O4. J. Am. Chem. Soc.
884
+ 2009, 131 (32), 11450–11457. https://doi.org/10.1021/ja902096h.
885
+ (21) Lakshmi, S.; Endo, T.; Siva, G. Electronic (Absorption) Spectra of 3d Transition Metal
886
+ Complexes. Adv. Asp. Spectrosc. 2012, 3–48. https://doi.org/10.5772/48089.
887
+ (22) Bosi, F.; Hålenius, U.; Andreozzi, G. B.; Skogby, H.; Lucchesi, S. Structural Refinement
888
+ and Crystal Chemistry of Mn-Doped Spinel: A Case for Tetrahedrally Coordinated Mn3+
889
+ in an Oxygen-Based Structure. Am. Mineral. 2007, 92 (1), 27–33.
890
+ https://doi.org/10.2138/am.2007.2266.
891
+ (23) Huang, R.; Ikuhara, Y. H.; Mizoguchi, T.; Findlay, S. D.; Kuwabara, A.; Fisher, C. A. J.;
892
+ Moriwake, H.; Oki, H.; Hirayama, T.; Ikuhara, Y. Oxygen-Vacancy Ordering at Surfaces
893
+ of Lithium Manganese(III,IV) Oxide Spinel Nanoparticles. Angew. Chemie - Int. Ed.
894
+ 2011, 50 (13), 3053–3057. https://doi.org/10.1002/anie.201004638.
895
+
896
+ 21
897
+
898
+ (24) Eppstein, R.; Caspary Toroker, M. On the Interplay Between Oxygen Vacancies and
899
+ Small Polarons in Manganese Iron Spinel Oxides. ACS Mater. Au 2022.
900
+ https://doi.org/10.1021/acsmaterialsau.1c00051.
901
+ (25) Le Nestour, A.; Gaudon, M.; Villeneuve, G.; Daturi, M.; Andriessen, R.; Demourgues, A.
902
+ Defects in Divided Zinc-Copper Aluminate Spinels: Structural Features and Optical
903
+ Absorption Properties. Inorg. Chem. 2007, 46 (10), 4067–4078.
904
+ https://doi.org/10.1021/ic0624064.
905
+ (26) Buvaneswari, G.; Aswathy, V.; Rajakumari, R. Comparison of Color and Optical
906
+ Absorbance Properties of Divalent Ion Substituted Cu and Zn Aluminate Spinel Oxides
907
+ Synthesized by Combustion Method towards Pigment Application. Dye. Pigment. 2015,
908
+ 123, 413–419. https://doi.org/10.1016/j.dyepig.2015.08.024.
909
+ (27) F, R. A.; B, F.; S, H.; H, U.; Aldo, B.; Orabona, E.; Bari, I.-; Università, S.; Moro, P. A.;
910
+ Roma, I.-. Cation Ordering over Short-Range and Long-Range Scales in the MgAl2O4-
911
+ CuAl2O4 Series. 2021, 97 (March), 1821–1827.
912
+ (28) Zviagin, V.; Sturm, C.; Esquinazi, P. D.; Grundmann, M.; Schmidt-Grund, R. Control of
913
+ Magnetic Properties in Spinel ZnFe2O4 Thin Films through Intrinsic Defect
914
+ Manipulation. J. Appl. Phys. 2020, 128 (16). https://doi.org/10.1063/5.0019712.
915
+ (29) Youn, Y.; Miller, J.; Nwe, K.; Hwang, K. J.; Choi, C.; Kim, Y.; Jin, S. Effects of Metal
916
+ Dopings on CuCr2O4 Pigment for Use in Concentrated Solar Power Solar Selective
917
+ Coatings. ACS Appl. Energy Mater. 2019, 2 (1), 882–888.
918
+ https://doi.org/10.1021/acsaem.8b01976.
919
+
920
+ 22
921
+
922
+ (30) Karas, D. E.; Byun, J.; Moon, J.; Jose, C. Copper-Oxide Spinel Absorber Coatings for
923
+ High-Temperature Concentrated Solar Power Systems. Sol. Energy Mater. Sol. Cells
924
+ 2018, 182 (March), 321–330. https://doi.org/10.1016/j.solmat.2018.03.025.
925
+ (31) Noč, L.; Ruiz-Zepeda, F.; Merzel, F.; Jerman, I. High-Temperature “Ion Baseball” for
926
+ Enhancing Concentrated Solar Power Efficiency. Sol. Energy Mater. Sol. Cells 2019, 200
927
+ (April). https://doi.org/10.1016/j.solmat.2019.109974.
928
+ (32) Yang, D.; Zhao, X.; Liu, Y.; Li, J.; Liu, H.; Hu, X.; Li, Z.; Zhang, J.; Guo, J.; Chen, Y.;
929
+ Yang, B. Enhanced Thermal Stability of Solar Selective Absorber Based on Nano-
930
+ Multilayered AlCrSiO Films. Sol. Energy Mater. Sol. Cells 2020, 207 (December 2019),
931
+ 110331. https://doi.org/10.1016/j.solmat.2019.110331.
932
+
933
+
934
+ 1
935
+
936
+
937
+ Supporting Information
938
+ Spinel Cu-Mn-Cr Oxide Nanoparticle-Pigmented
939
+ Solar Selective Coatings Maintaining >94%
940
+ Efficiency at 750ºC
941
+ Can Xu, Xiaoxin Wang, and Jifeng Liu*
942
+ Thayer School of Engineering, Dartmouth College, 14 Engineering Drive, Hanover, New
943
+ Hampshire 03755, USA
944
+ *Corresponding Author: [email protected]
945
+ 1. Experimental Methods
946
+ Synthesis. To obtain Cu, Mn and Cr oxide nanoparticle precursors, copper nitrate
947
+ (Cu(NO3)2·3H2O, Fisher Scientific, C99.9), manganese nitrate (Mn(NO3)2·4H2O, Sigma-Aldrich,
948
+ C99.5) and chromium nitrate (Cr(NO3)3·9H2O, Sigma-Aldrich, C99.8), were dissolved in
949
+ deionized (DI) water at a molar ratio of 1:3:1 at room temperature with an initial pH value between
950
+ 2 and 3. The aqueous solution was under vigorous magnetic stirring for homogeneity and an excess
951
+ amount of appropriate base solution, sodium hydroxide (NaOH(aq), 50%, Sigma-Aldrich, dilute
952
+
953
+ 2
954
+
955
+ to 10M) as we selected, was steadily added dropwise for precipitation until the pH of the solution
956
+ was adjusted to around 12 for a full precipitation. The stirring was kept for 1h after the
957
+ precipitation. The precipitated material was rinsed 5 times and then dried at 120 ºC overnight.
958
+ After a rough grinding step, it was further calcined at 550°C for 5h and finally ground into fine
959
+ powders.
960
+ Solar Selective Coating Fabrication. To obtain spraying precursors, 4 wt.% synthesized
961
+ nanoparticles were well dispersed in xylene diluted silicone resin (BLUESIL RES 6406XM) with
962
+ a ratio of 1:10 for an appropriate viscosity. The precursors were put in an ultrasonic bath for 30
963
+ min and then sprayed onto Inconel 625 substrate on the hot plate with a surface temperature of
964
+ about 180 ºC. The sample was settled on the hotplate for 5 min and then cooled down to room
965
+ temperature. Subsequently, the sample was put into a muffle furnace (Thermo scientific) for the
966
+ following heat treatment. The sample was first heated under 250 ºC for 2h and then ramped up to
967
+ 750 ºC at a rate of 9.1C/min. After dwelling for 24h and cooling back to room temperature, the
968
+ nanoparticle-pigmented silicone solar selective coating was formed.
969
+ Thermal test. A total of 60 simulated day-night thermal cycles (total annealing time of 720h) were
970
+ conducted for stability tests at 750 ºC and 800 ºC, respectively. Each separate cycle consisted of
971
+ 10 days. In each day, the sample was heated up to the target temperature at a rate of 9.1C/min and
972
+ dwelled for 12h. Then the sample was cooled down to room temperature until the start of the next
973
+ day.
974
+ Characterization. XRD patterns were recorded on a Rigaku 007 X-ray Diffractometer (Cu Kα1
975
+ line, λ = 1.54059 Å) operating at 40 kV/300 mA and in a 2theta angular range of 10–90 degree
976
+ with a velocity of 2 degree/min and a step size of 0.02 degree. Chemical composition was
977
+
978
+ 3
979
+
980
+ determined by X-ray Photoelectron Spectroscopy (XPS, PHI VersaProbe II, from West Campus
981
+ Materials Characterization Core at Yale University) and Energy dispersive spectroscopy (EDS,
982
+ EDAX Si (Li) detector with Genesis software). Scanning electron images were obtained by using
983
+ a TESCAN SEM operating at 20 kV in secondary electron (SE) mode and a FEI Helios 5CX
984
+ DualBeam SEM equipped with FIB was utilized for specimen preparation for cross section views.
985
+ Tecnai F20 (200 keV) TEM was utilized to collect transmission electron images and SAED
986
+ patterns. Elemental distribution was measured via JEOL 2010 FEG - TEM/STEM equipped with
987
+ an EDS detector (from Center for Nanoscale Systems at Harvard University). Vibrational signals
988
+ of bonding as well as reflectance in the mid infrared (MIR) region (λ=2.5 ~15 μm) were carried
989
+ out by a Jasco 4100 Fourier transformation IR (FTIR) spectrometer equipped with a Pike IR
990
+ integrating sphere in the range from 400 to 4000 cm-1. Jasco V-570 ultraviolet/visible/near infrared
991
+ (UV/Vis/NIR) spectrometer equipped with a Jasco ISN-470 integrating sphere was used to
992
+ characterize optical performance in the ultraviolet, visible and infrared regime, ranging from 200
993
+ nm to 2500 nm. The visualization of the surface roughness was obtained via Keyence VHX-700
994
+ Digital Microscope.
995
+ The solar-to-thermal energy conversion efficiency of the solar selective coatings is given by
996
+ 𝜂𝑡ℎ𝑒𝑟𝑚 = 𝐹𝑂𝑀 =
997
+ ∫(1−𝑅(𝜆))𝐼(𝜆)𝑑𝜆−1
998
+ 𝐶[∫(1−𝑅(𝜆))𝐵(𝜆,𝑇)𝑑𝜆]
999
+ ∫ 𝐼(𝜆)𝑑𝜆
1000
+ = 𝛼𝑠𝑜𝑙𝑎𝑟 −
1001
+ 𝜀𝑡ℎ𝑒𝑟𝑚𝜎𝑇4
1002
+ 𝐶𝐼𝑠𝑜𝑙𝑎𝑟 , (1)
1003
+ where 𝑅(𝜆) is the spectral reflectance of the solar selective coating at wavelength 𝜆 , 𝐼(𝜆)
1004
+ represents the AM 1.5 solar spectral irradiance per square meter at wavelength 𝜆, 𝐼𝑠𝑜𝑙𝑎𝑟 =
1005
+ 1000 𝑊/𝑚2 is the solar power density integrated from the spectral radiance 𝐼(𝜆), 𝐵(𝜆, 𝑇) is the
1006
+ spectral blackbody thermal emission at 𝜆 and 𝑇, 𝛼solar is the overall spectrally normalized solar
1007
+
1008
+ 4
1009
+
1010
+ absorbance, 𝜀𝑡ℎ𝑒𝑟𝑚 is the overall thermal emittance at T, and 𝜎 is the Stefan-Boltzmann constant
1011
+ of 5.67 × 10−8
1012
+ 𝑊
1013
+ 𝑚2
1014
+ 𝐾4 , and C=1000 is the solar concentration ratio of power tower CSP systems.
1015
+ 2. Nanoparticle Size (Diameter) Histogram
1016
+ 22
1017
+ 24
1018
+ 26
1019
+ 28
1020
+ 30
1021
+ 32
1022
+ 34
1023
+ 36
1024
+ 38
1025
+ 40
1026
+ 0
1027
+ 5
1028
+ 10
1029
+ 15
1030
+ 20
1031
+ 25
1032
+ Frequency (%)
1033
+ Size (nm)
1034
+
1035
+ Figure S1. Nanoparticle size distribution histogram. The average diameter is 313.6 nm.
1036
+ 3. X-ray Photoelectron Spectroscopy (XPS) Data Analyses
1037
+ Figure S2.a shows a survey spectrum of as-synthesized Cu-Mn-Cr oxide nanoparticles. Cu,
1038
+ Mn, Cr and O are detected from the surface. Figure S2.b shows the binding energies of the Cu 2p
1039
+ core levels. Two sharp peaks at about 932 eV and 952 eV are observed, corresponding to the
1040
+ significantly split spin-orbit components Cu 2p3/2 and Cu 2p1/2 respectively. Shake-up structures
1041
+ at about 945 eV and 963 eV are satellite features of Cu with oxidation states. Such two satellite
1042
+ peaks reveal the existence of Cu(II) while the relatively low intensity indicates possible mixed
1043
+ states of Cu(I) and Cu(II).
1044
+
1045
+
1046
+ 5
1047
+
1048
+
1049
+
1050
+ Figure S2. XPS spectra of Cu, Mn, and Cr ions in the synthesized spinel oxide nanoparticles.
1051
+ To further investigate the oxidation states and their compositions, principal Cu LMM Auger
1052
+ peaks (Figure S2.c) are collected as well. One deconvoluted peak with a binding energy of 916.5
1053
+ eV is assigned to Cu(I) 1 and the other one at 918.4 eV is assigned to Cu(II) 2 with an error of 1
1054
+ eV. The modified Auger parameters are calculated and compared to minimize the effect of
1055
+ charging of non-conducting specimens during the measurement. Cu in CuCr2O4 has an Auger
1056
+ parameter of nearly 1853 eV 3, close to 1852.7 eV, the value we obtained for Cu(II). Biesinger 4
1057
+ analyzed XPS data of various copper-containing species in previously published literature and
1058
+ summarized their Auger parameters. Our Cu(I) has an Auger parameter of 1848.6 eV, which lies
1059
+ in the range of several Cu(I) involved materials. In this case, Cu(I) and Cu(II) are present
1060
+
1061
+ (a)
1062
+ (b)
1063
+ (c)
1064
+ Survey
1065
+ Cu2p
1066
+ CuLMM
1067
+ Cu2p12
1068
+ Cu2p3/2
1069
+ 2p
1070
+ Mn 2p
1071
+ cu
1072
+ 01s
1073
+ Intensity(a.u.)
1074
+ Intensity(a.u.)
1075
+ Intensity(a.u.)
1076
+ Cr 2p
1077
+ Mn
1078
+ 1000
1079
+ 800
1080
+ 600
1081
+ 400
1082
+ 200
1083
+ 915916917918919920921
1084
+ B.E.(eV)
1085
+ B.E.(eV)
1086
+ K.E.(eV)
1087
+ (d)
1088
+ (e)
1089
+ (f)
1090
+ Mn2p
1091
+ Mn3s
1092
+ Cr2p
1093
+ Cr2P3/2
1094
+ Mn 2p3/2
1095
+ Intensity(a.u.)
1096
+ Mn2p1/2
1097
+ Intensity(a.u.)
1098
+ Intensity(a.u.)
1099
+ Cr 2P1/2
1100
+ 657654651648645642639
1101
+ 92
1102
+ 90
1103
+ 88
1104
+ 86
1105
+ 84
1106
+ 82
1107
+ 594591588585582579576573
1108
+ B.E.(eV)
1109
+ B.E.(eV)
1110
+ B.E.(eV)6
1111
+
1112
+ simultaneously with a ratio of about 4 : 1, taking into account both the percentage of peak areas
1113
+ and Relative Sensitivity Factors (RSF).
1114
+ Mn 2p (Figure S2.d) and Mn 3s (Figure S2.e) data are collected for quantification and
1115
+ qualification of the chemical species in the specimen. In the 2p spectrum, two peaks at about 643.0
1116
+ eV and 654.5 eV are assigned to the Mn 2p3/2 and Mn 2p1/2 components. An extremely broad and
1117
+ weak satellite peak observed at around 649.1 eV is the feature of Mn(II). Three deconvolved peaks
1118
+ represent Mn(II), Mn(III) and Mn(IV) with increasing values of binding energies. Mn 3s spectrum
1119
+ distinguishes Mn oxidation states in a more straightforward way. Based on the photoemission final
1120
+ states with the s electrons parallel or antiparallel to the 3d spin 5, the fewer and fewer 3d unpaired
1121
+ electrons in Mn(II), Mn(III) and Mn(IV) lead to the smaller and smaller magnitudes of peak
1122
+ splitting, from around 6.0 eV to 5.4 eV and to 4.7 eV for oxides 6. This assists in identifying the
1123
+ oxidation states and calculating the percentage respectively by taking the energy difference as a
1124
+ new constraint during the curve fitting. Eventually, Mn(II), Mn(III) and Mn(IV) are confirmed
1125
+ coexisting in our specimen with a percentage of 30%, 47% and 23%. Figure 2.f shows the Cr 2p
1126
+ spectrum, with Cr 2p3/2 peak at around 577.5 eV and Cr 2p1/2 peak at around 587.3 eV. Cr in
1127
+ CuCr2O4 is located at 577.3 eV 2 and that suggests the existence of Cr(III) 7,8. Three sub-peaks
1128
+ with the same full width at half maximum (FWHM) around 1.979eV are deconvoluted for Cr 2p3/2
1129
+ peak, showing the multiplet structure 9 due to the coupling effect between the unpaired core
1130
+ electron and unpaired electrons in the outer shell 10 in Cr(III).
1131
+
1132
+
1133
+
1134
+
1135
+
1136
+ 7
1137
+
1138
+ 4. Fourier Transform Infrared Spectroscopy (FTIR)
1139
+ 750
1140
+ 700
1141
+ 650
1142
+ 600
1143
+ 550
1144
+ 500
1145
+ 450
1146
+ 400
1147
+ 74
1148
+ 76
1149
+ 78
1150
+ Transmittance (%)
1151
+ Wavenumber (cm
1152
+ -1)
1153
+ Mn3+/Cr3+in either
1154
+ tetrahedron or octahedron
1155
+ Mn3+/Cr3+ in
1156
+ [MO6] octahedron
1157
+ Tetrahedral+
1158
+ Octahedral
1159
+ modes
1160
+
1161
+ Figure S3. FTIR spectrum of the Cu-Mn-Cr oxide nanoparticles showing characteristic spinel
1162
+ features.
1163
+ Characteristic IR absorption peaks are observed at ~616, 505, and 420 cm-1, close to the
1164
+ previous reports on spinel CuMn2O4 11, ZnMn2O4 12, and MnCr2O4 13. According to Ref. 13, the
1165
+ peak at ~616 cm-1 corresponds to trivalent cation vibrations in the [MO6] octahedron. In our case
1166
+ this peak is asymmetric, which can be induced by the coexistence of Mn3+ and Cr3+ as well as
1167
+ valance 2+ and 4+ cations on the octahedral sites, as revealed by the XRD, EDS and XPS analyses
1168
+ in the main text. The second peak at 505 cm-1 is attributed to trivalent ions, either on tetrahedral
1169
+ or octahedral sites. The last peak at 420 cm-1 is a complex vibrational mode involving both
1170
+ tetrahedral and octahedral sites.
1171
+
1172
+
1173
+
1174
+
1175
+ 8
1176
+
1177
+ 5. Nanoparticle Volume Fraction Estimation
1178
+
1179
+ Figure S4. EDS mapping of Mn in a cross-sectional FIB lamellar of the coating. The lamellar is
1180
+ ~150 nm thick.
1181
+ Since Mn is only present in the pigment nanoparticles and not in the silicone matrix, the
1182
+ Inconel substrate, or the TEM grid (which is used to mount the FIB sample of the coating), we can
1183
+ use Mn as a characteristic element of the NPs to derive the corresponding volume fraction by
1184
+ analyzing the EDS mapping of Mn (Figure S4). We utilized Image J to obtain the area fraction of
1185
+ Mn in the selected area. As shown in Figure S4, the yellow dots represent Mn signals and a brighter
1186
+ color reveals a higher Mn intensity in that region. The original figure was firstly converted to an
1187
+ 8-bit binary image and a threshold ranging from 51 to 255 was chosen to select the Mn pixels. Mn
1188
+ is determined to take 48.0% of the entire selected area.
1189
+ Assuming spherical nanoparticle approximation and no overlapping of the nanoparticles in
1190
+ the vertical direction, the volume fraction could be expressed as the following equation:
1191
+ 𝑓 =
1192
+ 𝑉𝑀𝑛
1193
+ 𝑉𝑡𝑜𝑡𝑎𝑙 =
1194
+ 𝐴∗𝑥
1195
+ 𝜋𝑟2×4
1196
+ 3𝜋𝑟3
1197
+ 𝐴×𝑡
1198
+ =
1199
+ 4
1200
+ 3 (
1201
+ 𝑟
1202
+ 𝑡) ∗ 𝑥 ,
1203
+
1204
+
1205
+
1206
+ (2)
1207
+
1208
+ 500nm9
1209
+
1210
+ where 𝑥 is the area fraction, 𝑟=15.51.8 nm is the radius of nanoparticles (see the histogram in
1211
+ Figure S1) and 𝑡 = 150 𝑛𝑚 is the thickness of the FIB processed lamellar. With this equation, a
1212
+ volume fraction of f ~7 vol. % was derived, which could be regarded as the lower limit since
1213
+ nanoparticles do overlap in reality.
1214
+ Another estimation was conducted according to the parameters used during the fabrication
1215
+ process, including the weight percentage of nanoparticles in the precursor, the density of each
1216
+ nonvolatile component, and the average coating thickness of 8.5 μm (as discussed in the main
1217
+ text). Assuming no excessive loss of nanoparticles during the coating process and annealing
1218
+ process, we obtain an upper limit of volume fraction f ~13 vol. %. Taking the average between the
1219
+ lower limit estimated by EDS Mn area mapping and the upper limit from chemical precursor ratios,
1220
+ it is reasonable to consider the volume fraction f=10±3 vol. % for comparison with theoretical
1221
+ modeling.
1222
+ 6. XRD Analyses during Thermal Endurance Tests
1223
+ XRD measurements were taken every 10 day-night annealing cycles, and Figures S5a and 5c
1224
+ were plotted with each intermediate state during the whole thermal cycle procedure at 750 ºC and
1225
+ 800 ºC separately to show the deviation for several important peaks. Generally, the cycled coating
1226
+ shows similar X-ray diffraction patterns while minor shifts occur. The peak position of the
1227
+ characteristic spinel (311) peak is closely examined as shown in Figure S5.b and 5d for 750 ºC and
1228
+ 800 ºC, respectively. It originally lies at 35.78° and tends to shift as the thermal cycle starts. It
1229
+ stabilizes at 35.62° for 750 ºC and 35.56° for 800 ºC after 20 day-night simulated cycles. Based
1230
+ on Bragg’s equation, the peak shift towards a smaller diffraction angle refers to a larger interplanar
1231
+ spacing, which means the lattice expands slightly.
1232
+
1233
+ 10
1234
+
1235
+
1236
+
1237
+ Figure S5. XRD patterns during thermal endurance tests at (a) 750 ºC and (b) 800 ºC, with close
1238
+ position examination of spinel (311) peak for samples through thermal cycles at (c) 750 ºC and
1239
+ (d) 800 ºC, respectively.
1240
+ From previous work published by Mikhail G. Brik 14, the lattice constants of CuMn2O4 and
1241
+ CuCr2O4 are 8.33 Å and 8.27 Å, while that of MnCr2O4 is 8.437 Å. A variation from 8.410 Å to
1242
+ 8.474 Å depending on different milling hours was reported by R. N. Bhowmik15. Considering the
1243
+ valences and atom position distributions discussed in the previous section, as more Cr ions dope
1244
+ into the spinel system and take the octahedral site, Cu and Mn ions tend to sit in the tetrahedral
1245
+ site, making it closer to the structure of CuCr2O4 and MnCr2O4. Taking into account the lattice
1246
+ parameters mentioned above and ion radius data obtained from WebElements 16, it is reasonable
1247
+
1248
+ (a)
1249
+ (q)
1250
+ Spinel
1251
+ Mn,03
1252
+ 小Inconel625
1253
+ 533
1254
+ cycle60
1255
+ (400)
1256
+ (311)
1257
+ (111)
1258
+ 077
1259
+ cycle50
1260
+ cycle40
1261
+ Intensity (a.u.)
1262
+ cycle30
1263
+ Intensity (a.u.)
1264
+ cycle 20
1265
+ cycle10
1266
+ 24h
1267
+ 20
1268
+ 30
1269
+ 40
1270
+ 50
1271
+ 60
1272
+ 70
1273
+ 80
1274
+ 34.5
1275
+ 35.0
1276
+ 35.5
1277
+ 36.0
1278
+ 36.5
1279
+ 2 theta (degree)
1280
+ 2 theta (degree)
1281
+ (c)
1282
+ (d)
1283
+ cycle60
1284
+ cycle50
1285
+ cycle40
1286
+ cycle 30
1287
+ Intensity
1288
+ cycle20
1289
+ Intensity
1290
+ cycle 10
1291
+ 24h
1292
+ 20
1293
+ 30
1294
+ 40
1295
+ 50
1296
+ 60
1297
+ 70
1298
+ 80
1299
+ 34.5
1300
+ 35.0
1301
+ 35.5
1302
+ 36.0
1303
+ 36.5
1304
+ 2 theta (degree)
1305
+ 2 theta (degree)11
1306
+
1307
+ to observe the lattice expansion. Mn ions are partially released to form Mn2O3, which is in
1308
+ agreement with a higher Mn2O3/spinel ratio (from 0.142:1 to 0.466:1, stabilizing after 30 day-night
1309
+ thermal cycles at 750 ºC) derived from XRD result.
1310
+ 7. Optical Spectra Evolution and EDS Mapping for Interdiffusion Investigation
1311
+ upon Thermal Cycling
1312
+ 500
1313
+ 1000
1314
+ 1500
1315
+ 2000
1316
+ 2500
1317
+ 85
1318
+ 90
1319
+ 95
1320
+ 100
1321
+ Absorptance (%)
1322
+ Wavelength (nm)
1323
+ 24h
1324
+ cycle 10
1325
+ cycle 20
1326
+ cycle 30
1327
+ cycle 40
1328
+ cycle 50
1329
+ cycle 60
1330
+ CuCr2O4
1331
+
1332
+ Figure S6. UV-vis-NIR absorption spectra of Cu-Mn-Cr oxide nanoparticle pigmented solar
1333
+ selective coating during thermal endurance tests at 800 ºC compared with as-coated CuCr2O4
1334
+ nanoparticle pigmented coating.
1335
+
1336
+ Figure S7. Cross-section STEM image and EDS mapping result of cross-sectional FIB cut
1337
+ specimens of Cu-Mn-Cr oxide nanoparticle pigmented solar selective coating (a) before and (b)
1338
+
1339
+ Ni
1340
+ Mn
1341
+ wrl
1342
+ um
1343
+ um
1344
+ 1um
1345
+ Ni
1346
+ Mn
1347
+ 2μm
1348
+ 2um
1349
+ 2um
1350
+ 2um12
1351
+
1352
+ after 60 day-night thermal cycles at 750 ºC. Part of the coating was damaged during the FIB milling
1353
+ processed.
1354
+ Detailed investigation in the interface between the nanoparticle-pigmented coating and the
1355
+ Inconel alloy substrate was conducted by observing the cross-sections of the specimen processed
1356
+ by FIB milling. According to the STEM image shown in Figure S7a, an oxide layer of around 100
1357
+ nm was formed after 24h annealing at 750 ºC. Further EDS mapping reveals that the oxide layer
1358
+ mainly consists of Cr based oxides. As an obvious comparison in Figure S7b, a much thicker oxide
1359
+ layer was observed for the sample that has completed 60 day-night simulated cycles at 750 ºC. It
1360
+ approximately increases to 1 μm thick after long-time thermal cycles. This is a common oxide
1361
+ scale when oxidizing Inconel alloys.
1362
+ EDS analyses of the coating were also conducted, and an increasing Cr concentration with
1363
+ thermal cycling was detected. Near the surface of the coatings, the Cr concentration increased by
1364
+ 58% after 60 day-night cycles at 750 ºC, and 117% after 60 day-night cycles at 800 ºC. This clearly
1365
+ demonstrates that Cr atoms have diffused from the Inconel substrate through the solar coating and
1366
+ emerged at the upper layers of the coating. The observed Cr diffusion into the coating is fully
1367
+ consistent with the optical absorption spectrum evolution shown in Figure S6 and the
1368
+ corresponding discussions in the main text.
1369
+
1370
+
1371
+
1372
+
1373
+
1374
+ 13
1375
+
1376
+ 8. Spray-Coated Solar Selective Coating on 48-Inch-Long Tube
1377
+
1378
+ Figure S8. A photo of spinel Cu-Mn-Cr oxide nanoparticle pigmented solar selective coating on
1379
+ a 48-inch-long tube prepared by spray coating method.
1380
+
1381
+ Reference
1382
+ (1)
1383
+ Losev, A.; Rostov, K.; Tyuliev, G. Electron Beam Induced Reduction of CuO in the
1384
+ Presence of a Surface Carbonaceous Layer: An XPS/HREELS Study. Surf. Sci. 1989, 213
1385
+ (2–3), 564–579. https://doi.org/10.1016/0039-6028(89)90313-0.
1386
+ (2)
1387
+ Capece, F. M.; Castro, V. Di; Furlani, C.; Mattogno, G.; Fragale, C.; Gargano, M.; Rossi,
1388
+ M. “Copper Chromite” Catalysts: XPS Structure Elucidation and Correlation with
1389
+ Catalytic Activity. J. Electron Spectros. Relat. Phenomena 1982, 27 (2), 119–128.
1390
+ https://doi.org/10.1016/0368-2048(82)85058-5.
1391
+ (3)
1392
+ NIST X-ray Photoelectron Spectroscopy Database, NIST Standard Reference Database
1393
+ Number 20, National Institute of Standards and Technology, Gaithersburg MD, 20899
1394
+ (2000) http://dx.doi.org/10.18434/T4T88K (accessed 2021 -10 -13).
1395
+
1396
+ 14
1397
+
1398
+ (4)
1399
+ Biesinger, M. C. Advanced Analysis of Copper X-Ray Photoelectron Spectra. Surf.
1400
+ Interface Anal. 2017, 49 (13), 1325–1334. https://doi.org/10.1002/sia.6239.
1401
+ (5)
1402
+ Waskowska, A.; Gerward, L.; Olsen, J. S.; Steenstrup, S.; Talik, E. CuMn2O4: Properties
1403
+ and the High-Pressure Induced Jahn-Teller Phase Transition. J. Phys. Condens. Matter
1404
+ 2001, 13 (11), 2549–2562. https://doi.org/10.1088/0953-8984/13/11/311.
1405
+ (6)
1406
+ Junta, J. L.; Hochella, M. F. Manganese (II) Oxidation at Mineral Surfaces: A
1407
+ Microscopic and Spectroscopic Study. Geochim. Cosmochim. Acta 1994, 58 (22), 4985–
1408
+ 4999. https://doi.org/10.1016/0016-7037(94)90226-7.
1409
+ (7)
1410
+ Biesinger, M. C.; Payne, B. P.; Grosvenor, A. P.; Lau, L. W. M.; Gerson, A. R.; Smart, R.
1411
+ S. C. Resolving Surface Chemical States in XPS Analysis of First Row Transition Metals,
1412
+ Oxides and Hydroxides: Cr, Mn, Fe, Co and Ni. Appl. Surf. Sci. 2011, 257 (7), 2717–
1413
+ 2730. https://doi.org/10.1016/j.apsusc.2010.10.051.
1414
+ (8)
1415
+ Mohamed, R. M.; Kadi, M. W. Generation of Hydrogen Gas Using CuCr2O4-g-C3N4
1416
+ Nanocomposites under Illumination by Visible Light. ACS Omega 2021, 6 (6), 4485–
1417
+ 4494. https://doi.org/10.1021/acsomega.0c06193.
1418
+ (9)
1419
+ Oladipo, A. A. Rapid Photocatalytic Treatment of High-Strength Olive Mill Wastewater
1420
+ by Sunlight and UV-Induced CuCr2O4@CaFe–LDO. J. Water Process Eng. 2021, 40
1421
+ (January), 2–6. https://doi.org/10.1016/j.jwpe.2021.101932.
1422
+ (10) Moulder, J. F.; Stickle, W. F.; E.’Sobol, P.; Bomben, K. D. Handbook of X-Ray
1423
+ Photoelectron Spectroscopy; Perkin-Elmer Corp, Eden Prairie, MN, 1992.
1424
+ https://doi.org/10.1002/0470014229.ch22.
1425
+
1426
+ 15
1427
+
1428
+ (11) Patra, P.; Naik, I.; Kaushik, S. D.; Mohanta, S. Crossover from Meta-Magnetic State to
1429
+ Spin-Glass Behaviour upon Ti-Substitution for Mn in CuMn2O4. J. Mater. Sci. Mater.
1430
+ Electron. 2021, 33 (1), 554–564. https://doi.org/10.1063/5.0017104.
1431
+ (12) Ghannam, M. M.; Heiba, Z. K.; Sanad, M. M. S.; Mohamed, M. B. Functional Properties
1432
+ of ZnMn2O4/MWCNT/Graphene Nanocomposite as Anode Material for Li-Ion Batteries.
1433
+ Appl. Phys. A Mater. Sci. Process. 2020, 126 (5), 1–9. https://doi.org/10.1007/s00339-
1434
+ 020-03513-6.
1435
+ (13) Allen, G. C.; Paul, M. Chemical Characterization of Transition Metal Spinel-Type Oxides
1436
+ by Infrared Spectroscopy. Appl. Spectrosc. 1995, 49 (4), 451–458.
1437
+ https://doi.org/10.1366/0003702953964372.
1438
+ (14) Brik, M. G.; Suchocki, A.; Kamińska, A. Lattice Parameters and Stability of the Spinel
1439
+ Compounds in Relation to the Ionic Radii and Electronegativities of Constituting
1440
+ Chemical Elements. Inorg. Chem. 2014, 53 (10), 5088–5099.
1441
+ https://doi.org/10.1021/ic500200a.
1442
+ (15) Bhowmik, R. N.; Ranganathan, R.; Nagarajan, R. Lattice Expansion and Noncollinear to
1443
+ Collinear Ferrimagnetic Order in a MnCr2O4 Nanoparticle. Phys. Rev. B - Condens.
1444
+ Matter Mater. Phys. 2006, 73 (14), 1–9. https://doi.org/10.1103/PhysRevB.73.144413.
1445
+ (16) WebElements https://www.webelements.com (accessed 2022 -01 -22).
1446
+
FNAzT4oBgHgl3EQfUPz_/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
FNFRT4oBgHgl3EQfyzjn/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:68b7d53388385d11b028dacaa6f7dc7dfa86f542c57e63bb9911ac7546fa7347
3
+ size 59899
FtAzT4oBgHgl3EQfHPtI/content/2301.01041v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:e8c3d823c8ac5fd49b027c136a032e441294cedfa23e2ca9168a5d33eb28ef01
3
+ size 652797