Add files using upload-large-folder tool
Browse filesThis view is limited to 50 files because it contains too many changes.
See raw diff
- -NFLT4oBgHgl3EQfCi71/content/tmp_files/2301.11976v1.pdf.txt +778 -0
- -NFLT4oBgHgl3EQfCi71/content/tmp_files/load_file.txt +0 -0
- .gitattributes +69 -0
- 19AyT4oBgHgl3EQf1fl-/content/tmp_files/2301.00736v1.pdf.txt +0 -0
- 19AyT4oBgHgl3EQf1fl-/content/tmp_files/load_file.txt +0 -0
- 1tE4T4oBgHgl3EQfaQwc/content/2301.05062v1.pdf +3 -0
- 1tE4T4oBgHgl3EQfaQwc/vector_store/index.faiss +3 -0
- 29FIT4oBgHgl3EQf5SvC/content/tmp_files/2301.11389v1.pdf.txt +1561 -0
- 29FIT4oBgHgl3EQf5SvC/content/tmp_files/load_file.txt +0 -0
- 59FKT4oBgHgl3EQfTC3B/content/2301.11778v1.pdf +3 -0
- 59FKT4oBgHgl3EQfTC3B/vector_store/index.pkl +3 -0
- 5dE4T4oBgHgl3EQfBQvo/content/2301.04851v1.pdf +3 -0
- 5dE4T4oBgHgl3EQfBQvo/vector_store/index.faiss +3 -0
- 5dE4T4oBgHgl3EQfBQvo/vector_store/index.pkl +3 -0
- 5tE0T4oBgHgl3EQfvwEb/content/tmp_files/2301.02621v1.pdf.txt +1217 -0
- 5tE0T4oBgHgl3EQfvwEb/content/tmp_files/load_file.txt +0 -0
- 5tE4T4oBgHgl3EQf1g0M/content/tmp_files/2301.05290v1.pdf.txt +1569 -0
- 5tE4T4oBgHgl3EQf1g0M/content/tmp_files/load_file.txt +0 -0
- 5tE5T4oBgHgl3EQfPQ4_/content/2301.05503v1.pdf +3 -0
- 5tE5T4oBgHgl3EQfPQ4_/vector_store/index.pkl +3 -0
- 69FKT4oBgHgl3EQf_y40/content/tmp_files/2301.11963v1.pdf.txt +662 -0
- 6dE1T4oBgHgl3EQfTQOX/content/tmp_files/2301.03076v1.pdf.txt +362 -0
- 6dE1T4oBgHgl3EQfTQOX/content/tmp_files/load_file.txt +412 -0
- 7NE2T4oBgHgl3EQfPQZw/content/2301.03757v1.pdf +3 -0
- 7NE2T4oBgHgl3EQfPQZw/vector_store/index.faiss +3 -0
- 7tAyT4oBgHgl3EQfpvj9/vector_store/index.faiss +3 -0
- 8dE4T4oBgHgl3EQfdQww/content/2301.05089v1.pdf +3 -0
- 8dE4T4oBgHgl3EQfdQww/vector_store/index.pkl +3 -0
- 9tAzT4oBgHgl3EQf-_7r/content/2301.01943v1.pdf +3 -0
- 9tAzT4oBgHgl3EQf-_7r/vector_store/index.pkl +3 -0
- 9tFST4oBgHgl3EQfbTje/vector_store/index.faiss +3 -0
- ANAyT4oBgHgl3EQfq_kk/content/2301.00551v1.pdf +3 -0
- ANAyT4oBgHgl3EQfq_kk/vector_store/index.faiss +3 -0
- ANAyT4oBgHgl3EQfq_kk/vector_store/index.pkl +3 -0
- ANE3T4oBgHgl3EQfsQvt/vector_store/index.faiss +3 -0
- AtAzT4oBgHgl3EQfv_4W/content/tmp_files/2301.01714v1.pdf.txt +1507 -0
- AtAzT4oBgHgl3EQfv_4W/content/tmp_files/load_file.txt +0 -0
- C9E4T4oBgHgl3EQfFwy_/content/2301.04889v1.pdf +3 -0
- C9E4T4oBgHgl3EQfFwy_/vector_store/index.faiss +3 -0
- CNE1T4oBgHgl3EQfDwNk/vector_store/index.pkl +3 -0
- EdAyT4oBgHgl3EQfSfdI/content/2301.00086v1.pdf +3 -0
- EdAyT4oBgHgl3EQfSfdI/vector_store/index.faiss +3 -0
- EdAyT4oBgHgl3EQfSfdI/vector_store/index.pkl +3 -0
- EtE1T4oBgHgl3EQf-gZN/content/tmp_files/2301.03569v1.pdf.txt +0 -0
- EtE1T4oBgHgl3EQf-gZN/content/tmp_files/load_file.txt +0 -0
- F9E1T4oBgHgl3EQfqwX2/vector_store/index.pkl +3 -0
- FNAzT4oBgHgl3EQfUPz_/content/tmp_files/2301.01265v1.pdf.txt +1446 -0
- FNAzT4oBgHgl3EQfUPz_/content/tmp_files/load_file.txt +0 -0
- FNFRT4oBgHgl3EQfyzjn/vector_store/index.pkl +3 -0
- FtAzT4oBgHgl3EQfHPtI/content/2301.01041v1.pdf +3 -0
-NFLT4oBgHgl3EQfCi71/content/tmp_files/2301.11976v1.pdf.txt
ADDED
@@ -0,0 +1,778 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
arXiv:2301.11976v1 [stat.ME] 27 Jan 2023
|
2 |
+
A. Philip Dawid* and Stephen Senn
|
3 |
+
Personalised Decision-Making without
|
4 |
+
Counterfactuals
|
5 |
+
Keywords: decision theory, counterfactual, potential response, intention to treat
|
6 |
+
This article is a response to recent proposals by Pearl and others for a new approach to personalised
|
7 |
+
treatment decisions, in contrast to the traditional one based on statistical decision theory. We argue that
|
8 |
+
this approach is dangerously misguided and should not be used in practice.
|
9 |
+
1 Introduction
|
10 |
+
In recent works [1–4], Judea Pearl and collaborators have set out an approach to personalised treatment
|
11 |
+
that is radically different from that based on traditional statistical decision theory. It is based on the
|
12 |
+
conception that we should care, not only about the outcome that actually materialises, but also about
|
13 |
+
the (necessarily unobserved, counterfactual) outcome that, it is supposed, would have occurred under the
|
14 |
+
treatment that was not applied. A similar conception forms the basis of other recent work [5–7].
|
15 |
+
We consider this approach to be dangerously misguided, and believe that real harm will ensue if it
|
16 |
+
is applied in practice. We argue our case from a number of different viewpoints, and explain why this
|
17 |
+
approach should not be regarded as a viable alternative to standard statistical decision theory.
|
18 |
+
1.1 Basic set-up
|
19 |
+
The context is that of a “target” patient suffering from a disease, for which a treatment is available. The
|
20 |
+
treatment is far from perfect, so that not all treated patients recover, while some untreated patients may
|
21 |
+
recover anyway. There is information available on recovery rates for treated and untreated patients; both
|
22 |
+
these rates may depend on measured individual patient characteristics. The basic problem is to decide, on
|
23 |
+
the basis of the target patient’s own characteristics, whether or not to treat him. A variation is how to
|
24 |
+
prioritise patients for treatment when there are limited doses available.
|
25 |
+
We introduce notation as follows:
|
26 |
+
Treatment decision Binary decision variable X, coded 1 for treat, 0 for don’t treat
|
27 |
+
Response Binary stochastic variable Y , coded 1 for recovery, 0 for no recovery
|
28 |
+
Individual background characteristics Stochastic variable L, potentially multivariate, unaffected by
|
29 |
+
the treatment decision
|
30 |
+
We suppose that there are available substantial data on (L, X, Y ), from either experimental or uncon-
|
31 |
+
founded observational studies on patients we can regard as similar to the target1, from which we can
|
32 |
+
estimate, essentially perfectly2, the distribution of Y , conditional on L, under either treatment interven-
|
33 |
+
1 See § 7 for further discussion of this point.
|
34 |
+
2 In a Bayesian setting it is straightforward to relax this condition, using predictive distributions based on finite
|
35 |
+
samples. However the main issues are most clearly expressed in the case of essentially known probabilities.
|
36 |
+
*Corresponding Author: A. Philip Dawid: University of Cambridge: [email protected]
|
37 |
+
Stephen Senn: Statistical Consultant, Edinburgh: [email protected]
|
38 |
+
|
39 |
+
2
|
40 |
+
A. Philip Dawid and Stephen Senn, Personalised Decision-Making
|
41 |
+
tion. That is, we know the probability Pr(Y = 1 | L = l, X ← x), for any value l of L and x = 0 or 1.
|
42 |
+
(Here X ← x denotes an external intervention to set X to x.)
|
43 |
+
1.2 Outline
|
44 |
+
In § 2 we recall the straightforward decision-theoretic analysis of this problem. Then in § 3 we briefly outline
|
45 |
+
the approach proposed by Pearl et al., followed by some critical comments in § 4. Section 5 describes this
|
46 |
+
approach in more detail, following a logical path that relates it to other problems, in particular the use
|
47 |
+
of general covariate information to strengthen conclusions, and the specific case of an “intention to treat”
|
48 |
+
covariate, whose properties can be identified by combining experimental and observational data. In § 6 we
|
49 |
+
give critical consideration to some examples from Mueller and Pearl [2]. Section 7 notes some important
|
50 |
+
assumptions that are implicitly made in the analysis, and points out that they are unlikely to hold in
|
51 |
+
practice. Section 8 summarises our analysis and conclusions.
|
52 |
+
2 Decision-theoretic approach
|
53 |
+
We first describe the standard decision-theoretic (DT) approach to treatment selection.
|
54 |
+
2.1 Single patient decision problem
|
55 |
+
Consider first the case of the single target patient. We have to decide whether to offer this patient treatment,
|
56 |
+
or not.
|
57 |
+
Having access only to the target patient’s value L = l, our objective is to choose the treatment that will
|
58 |
+
maximise the probability of recovery. We should thus treat this patient if p := Pr(Y = 1 | L = l, X ← 1) >
|
59 |
+
q := Pr(Y = 1 | L = l, X ← 0). That is, we should treat just when CATE(l) > 0, where CATE(l) = p − q
|
60 |
+
is the “conditional average treatment effect”.
|
61 |
+
If the outcome Y is not necessarily binary, for example a survival time, we need to associate a utility
|
62 |
+
U(y) with the outcome y, and treat the patient just when E{U(Y ) | L = l, X ← 1)} > E{U(Y ) | L =
|
63 |
+
l, X ← 0)}. Applied to the binary case this reduces to the prescription above (so long as U(1) > U(0)).
|
64 |
+
In [8], a companion paper to this one which treats utilities explicitly, the above is termed the inter-
|
65 |
+
ventionist utility and approach, and contrasted with the counterfactual utility and approach implicit in [2]
|
66 |
+
and explicit in [6, 7]. Here we restrict to the binary case and do not use utilities.
|
67 |
+
Faced with a large collection G of patients to treat, and unlimited supplies of the treatment, managing
|
68 |
+
each patient (each with their own value l of L) according to the above rule will maximise the number of
|
69 |
+
recoveries. That is, any other (deterministic or randomised) decision rule that uses only the information
|
70 |
+
on L would lead to fewer recoveries.
|
71 |
+
Example 1. Consider a case where
|
72 |
+
Pr(Y = 1 | L = l, X ← 1)
|
73 |
+
=
|
74 |
+
0.49
|
75 |
+
Pr(Y = 1 | L = l, X ← 0)
|
76 |
+
=
|
77 |
+
0.21.
|
78 |
+
The conditional average treatment effect is CATE(l) = 0.49−0.21 = 0.28. Since CATE(l) > 0, the optimal
|
79 |
+
action is to treat this patient. If we have a large collection of similar patients, with the same value L = l,
|
80 |
+
they should all be treated—in which case the overall proportion of recovered patients will be 49%. This is
|
81 |
+
the best outcome that can be achieved by any treatment strategy.
|
82 |
+
|
83 |
+
A. Philip Dawid and Stephen Senn, Personalised Decision-Making
|
84 |
+
3
|
85 |
+
2.1.1 Missing information
|
86 |
+
It may happen that, while we have full information on (L, X, Y ) for the study individuals, the value l of L
|
87 |
+
for the target patient is not available. In that case we can not condition on L = l, and we have no option but
|
88 |
+
to base the management of the patient on the unconditional probabilities Pr(Y = 1 | X ← x) (x = 1, 0).
|
89 |
+
Nothing is gained by, for example, trying to impute the unknown value of L. If this is not obvious (as it
|
90 |
+
should be), suppose we tried to do so. The recovery probabilities, conditional on a hypothesised value l for
|
91 |
+
L, are Pr(Y = 1 | L = l, X ← x) (x = 1, 0). But as we do not know l, we need to take the expectation
|
92 |
+
of Pr(Y = 1 | L, X ← x) over the distribution of L, when setting X ← x (which is the known marginal
|
93 |
+
distribution of L, unaffected by the intervention). And this is just the unconditional recovery probability
|
94 |
+
Pr(Y = 1 | X ← x). 3
|
95 |
+
2.2 Unit selection
|
96 |
+
Again consider a large collection G of patients i = 1, . . . , N, with individual recovery probabilities pi =
|
97 |
+
Pr(Yi = 1 | Li = li, Xi ← 1), qi = Pr(Yi = 1 | Li = li, Xi ← 0). If we treat just those in a subset S, the
|
98 |
+
expected number of recoveries will be �
|
99 |
+
i∈S pi + �
|
100 |
+
i∈G\S qi = �
|
101 |
+
i∈G qi + �
|
102 |
+
i∈S CATEi. Consequently, to
|
103 |
+
maximise this expected number, we should choose S, subject to any constraints, to maximise �
|
104 |
+
i∈S CATEi.
|
105 |
+
If we have limited treatments available, we should thus prioritise individuals in decreasing order of their
|
106 |
+
CATE (while of course not treating any one for whom CATE < 0.) Again, any other policy (subject to the
|
107 |
+
same constraints) will have a smaller number of recoveries.
|
108 |
+
2.3 Potential outcomes?
|
109 |
+
The “potential outcome” approach to causal inference [9] conceives of the existence, even prior to treatment
|
110 |
+
choice, of the pair of variables Y = (Y (1), Y (0)), where Y (x) denotes the value that, it is supposed, Y will
|
111 |
+
take if intervention X ← x is applied. The pretreatment variables (Y (1), Y (0), L) are supposed to have a
|
112 |
+
joint distribution, unaffected by treatment. With this interpretation, we have
|
113 |
+
Pr(Y = y, L = l | X ← x) = Pr(Y (x) = y, L = l),
|
114 |
+
(1)
|
115 |
+
and p = E{Y (1) | L = l}, q = E{Y (0) | L = l},
|
116 |
+
In this approach, inference is ideally desired for the “individual treatment effect”, ITE := Y (1) − Y (0),
|
117 |
+
which can take values +1 (treatment benefits the patient), −1 (treatment harms the patient) or 0 (treatment
|
118 |
+
has no effect). Then CATE = E(ITE | L = l). However, typically ITE is unobservable, since it is impossible
|
119 |
+
simultaneously both to treat and not to treat the same patient. In particular, no information can be gained
|
120 |
+
about the dependence between Y (1) and Y (0), nor about the distribution (marginal, or conditional on L)
|
121 |
+
of ITE. All that can be inferred is the (conditional) expectation, as above, of ITE, depending as this does
|
122 |
+
only on the individual distributions of Y (1) and Y (0), which can be identified from experimental data.
|
123 |
+
In certain very special and atypical cases, essentially those where we have a fully deterministic and
|
124 |
+
completely understood mechanistic system, it may be that the background knowledge L is detailed enough
|
125 |
+
to support perfect prediction of the eventual response, under either intervention. Then we will know, in
|
126 |
+
advance of treatment choice, both potential outcome variables. In this case p = Y (1), q = Y (0), and
|
127 |
+
CATE = ITE. Clearly we should treat as many of those who will (we know for sure) benefit from the
|
128 |
+
treatment as we can.
|
129 |
+
3 With finite data, on taking account of known structure in the interventional distributions of (L, Y ) it may be possible
|
130 |
+
to improve the estimation of Pr(Y = 1 | X ← x). But this still remains what we need to focus on.
|
131 |
+
|
132 |
+
4
|
133 |
+
A. Philip Dawid and Stephen Senn, Personalised Decision-Making
|
134 |
+
However, in typical cases perfect prediction is impossible, and then it is arguable whether the potential
|
135 |
+
responses even have any meaningful existence. In any case, there is nothing to be gained by trying to impute
|
136 |
+
potential responses: as in § 2.1.1 above (taking L = Y), we should again simply focus on CATE = p − q.
|
137 |
+
In summary, consideration of potential responses (even if regarded as meaningful) does not add any
|
138 |
+
value to the decision-theoretic approach.
|
139 |
+
3 The approach of Mueller and Pearl [2]
|
140 |
+
In contrast to the above decision-theoretic approach, Mueller amd Pearl [2] (henceforth MP) opt to take
|
141 |
+
potential outcomes seriously, and focus attention on ITE = Y (1)−Y (0). They argue that we should ideally
|
142 |
+
aim to treat those patients having ITE = 1, for whom the treatment made a difference: they would not
|
143 |
+
have recovered without it. It would be wasteful to treat a patient with ITE = 0, for whome the treatment
|
144 |
+
made no difference, and positively harmful to treat a patient with ITE = −1, who would have recovered if
|
145 |
+
untreated, but not if treated.
|
146 |
+
However, this ideal is unattainable, as we will not know a patient’s ITE before treatment. Concern is
|
147 |
+
therefore transferred to the “probability of benefit”, PB = Pr(Y (1) = 1, Y (0) = 0) = Pr(ITE = 1), and
|
148 |
+
the “probability of harm”, PH = Pr(Y (1) = 0, Y (0) = 1) = Pr(ITE = −1), which are now regarded as the
|
149 |
+
criteria by which to assess any treatment strategy.
|
150 |
+
But not only can we not know a patient’s ITE before the treatment decision is made, we can not even
|
151 |
+
know it later, when the outcome Y is observed. For if we treat the patient we will observe Y = Y (1),
|
152 |
+
but can not then observe the counterfactual outcome Y (0) relevant when we don’t treat; similarly, for an
|
153 |
+
untreated patient we can observe Y (0), but not Y (1). So ITE is always unobservable. This means that,
|
154 |
+
even with extensive data on other patients, it will not be possible fully to identify PB and PH. Such data
|
155 |
+
can, however, be used to set interval bounds on these quantities. MP [2] further show how combining
|
156 |
+
experimental and observational data can narrow these bounds. In certain very special cases the bounds
|
157 |
+
narrow to a single point, leading to full identification of PB and PH.
|
158 |
+
4 Comments on the approach
|
159 |
+
Our comments on the MP programme are arranged along several dimensions.
|
160 |
+
4.1 Philosophy
|
161 |
+
Potential responses such as Y (0) and Y (1), first introduced by Neyman [10], have been considered as fun-
|
162 |
+
damental to the conduct of causal inference ever since reintroduced by Rubin [9]. However this conception
|
163 |
+
was challenged by Dawid [11, 12], who pointed out that, so far from being fundamental, they are entirely
|
164 |
+
unnecessary, and that a fully satisfactory theory can be based on standard decision-theoretic elements.
|
165 |
+
Indeed, there are serious philosophical objections to regarding potential responses as having real existence.
|
166 |
+
Only if we take a fully Laplacean view of the universe, in which the future of the universe is entirely
|
167 |
+
determined by its present state and the laws of Physics, does this make any sense at all—and even then, it
|
168 |
+
is difficult to incorporate the whims of an unconstrained external agent who decides whether or not to give
|
169 |
+
treatment, or to account for the effect of external conditions arising after treatment. Even under Laplacean
|
170 |
+
determinism, our ignorance of the information needed to predict the future means that we are unable to
|
171 |
+
make use of it. Whether or not we believe in a deep-down deterministic universe, our predictions of the
|
172 |
+
future can only be based on the limited information we do have at our disposal, and must necessarily be
|
173 |
+
|
174 |
+
A. Philip Dawid and Stephen Senn, Personalised Decision-Making
|
175 |
+
5
|
176 |
+
probabilistic.4 Imagining what we could know or do, if only we had more information than we actually do
|
177 |
+
have, is just pointless.
|
178 |
+
4.2 Applicability
|
179 |
+
Another important dimension of criticism is that the strong conditions needed for application of the MP
|
180 |
+
theory will almost never obtain in practice. See § 7 below for details.
|
181 |
+
4.3 Helpfulness
|
182 |
+
The output of an MP analysis will, at very best, be point estimates of the probabilities of benefit and of
|
183 |
+
harm—in most cases, we won’t even get these, but can only bound these quantities within an interval. But
|
184 |
+
even when we have these quantities, it is far from clear how they help to inform treatment decisions.
|
185 |
+
4.4 Ethics
|
186 |
+
Our final criticism is the simplest, but most incisive. The treatment decisions made using the DT approach
|
187 |
+
are guaranteed to be better than those made by any other decision rule, in the sense that they will maximise
|
188 |
+
the number of recoveries in the population. So whenever the MP approach leads to different decisions, it
|
189 |
+
will produce a decrease in the number of recoveries. We find it hard to construe this as ethical.
|
190 |
+
5 Analysis
|
191 |
+
Here we provide a deconstruction of the analysis of MP [2]—which should not, however, be taken as
|
192 |
+
agreement with their arguments and interpretations. There are a number of crucial assumptions required,
|
193 |
+
but to avoid cluttering the argument we leave these implicit, postponing specification and discussion of
|
194 |
+
them to § 7.
|
195 |
+
We develop the story-line in a number of stages.
|
196 |
+
In § 5.1 we consider the case where we have access to experimental data on treatment X and response
|
197 |
+
Y , and show how this can be used to bound the probabilities of benefit and of harm. We also discuss the
|
198 |
+
special circumstances in which these interval bounds shrink to a point.
|
199 |
+
In § 5.2 we further suppose that we can measure additional covariate information L on individuals. If
|
200 |
+
we have these values in the experimental data, this additional information can lead to a narrowing of the
|
201 |
+
bounds for PB and PH for the target case, even when L for that case is unobserved.
|
202 |
+
Section 5.3 introduces a particular, potentially useful, covariate, “intention to treat”, X∗—the treat-
|
203 |
+
ment that a patient (or their doctor) would like to choose, if unconstrained. This may well be informative
|
204 |
+
about their state of health, and thus their outcome. In some experiments it may be possible to obtain
|
205 |
+
information about X∗, and this can then be used as L in § 5.2. However it will often not be possible to
|
206 |
+
observe X∗ in the experiment. Section 7.2 considers how this problem can be overcome by the incorpora-
|
207 |
+
tion of observational data, if we can assume that, in such data, the desired treatment was the one actually
|
208 |
+
applied, so that X∗ = X becomes observable. The combination of experimental and observational data
|
209 |
+
allows us to identify the distribution of X∗ (together with the other variables), and so once again allows
|
210 |
+
us to apply the theory of § 5.2 to obtain improved bounds for PB and PH, which are detailed in § 5.5.
|
211 |
+
4 See Dawid [13] for an approach to understanding non-extreme probabilities based on imperfect information about a
|
212 |
+
deterministic world.
|
213 |
+
|
214 |
+
6
|
215 |
+
A. Philip Dawid and Stephen Senn, Personalised Decision-Making
|
216 |
+
5.1 Simplest case
|
217 |
+
We start by presenting the basis of the approach in the simplest case, where the data are experimental, and
|
218 |
+
there is no additional covariate information. We thus have access to the interventional response probabilities
|
219 |
+
Pr(Y = y | X ← x) = Pr(Y (x) = y), (x, y = 0, 1). What can be inferred, from these, about the probabilities
|
220 |
+
of benefit and of harm?
|
221 |
+
As described by Dawid and Musio [14], it is helpful to express the interventional probabilities in terms
|
222 |
+
of parameters τ and ρ, where
|
223 |
+
τ
|
224 |
+
:=
|
225 |
+
Pr(Y = 1 | X ← 1) − Pr(Y = 1 | X ← 0)
|
226 |
+
(2)
|
227 |
+
ρ
|
228 |
+
:=
|
229 |
+
Pr(Y = 1 | X ← 1) − Pr(Y = 0 | X ← 0).
|
230 |
+
(3)
|
231 |
+
Then τ is the average treatment effect, ATE, of X on Y , while ρ = Pr(Y = 1 | X ← 1) + Pr(Y = 1 | X ←
|
232 |
+
0) − 1 is a measure of how common the outcome is.
|
233 |
+
The transition matrix (Pr(Y = y | X ← x)) from X to Y is
|
234 |
+
P = P(τ, ρ) :=
|
235 |
+
�
|
236 |
+
1
|
237 |
+
2(1 + τ + ρ)
|
238 |
+
1
|
239 |
+
2(1 − τ − ρ)
|
240 |
+
1
|
241 |
+
2(1 − τ + ρ)
|
242 |
+
1
|
243 |
+
2(1 + τ − ρ)
|
244 |
+
�
|
245 |
+
,
|
246 |
+
(4)
|
247 |
+
where the row and column labels are implicitly 1 and 0 in that order. The necessary and sufficient condition
|
248 |
+
for all the transition probabilities to be non-negative is
|
249 |
+
|τ| + |ρ| ≤ 1.
|
250 |
+
(5)
|
251 |
+
We have equality in (5) only in the degenerate case that one of the entries of P is 0.
|
252 |
+
We can express the joint distribution for Y = (Y (1), Y (0)) as in Table 1. The margins are determined
|
253 |
+
Y (0) = 1
|
254 |
+
Y (0) = 0
|
255 |
+
Y (1) = 1
|
256 |
+
1
|
257 |
+
2 (1 + ρ − ξ)
|
258 |
+
1
|
259 |
+
2 (ξ + τ)
|
260 |
+
1
|
261 |
+
2 (1 + τ + ρ)
|
262 |
+
Y (1) = 0
|
263 |
+
1
|
264 |
+
2(ξ − τ)
|
265 |
+
1
|
266 |
+
2 (1 − ρ − ξ)
|
267 |
+
1
|
268 |
+
2 (1 − τ − ρ)
|
269 |
+
1
|
270 |
+
2(1 − τ + ρ)
|
271 |
+
1
|
272 |
+
2(1 + τ − ρ)
|
273 |
+
1
|
274 |
+
Table 1. Joint probability distribution of (Y (1), Y (0)
|
275 |
+
by (1) (with L absent) and (4); but the internal entries are indeterminate, having one degree of freedom
|
276 |
+
crystallised in the unspecified “slack variable” ξ, which is not identified by the experimental data. The only
|
277 |
+
constraint on ξ is the logical one that all internal entries of Table 1 be non-negative. This holds if and only
|
278 |
+
if
|
279 |
+
|τ| ≤ ξ ≤ 1 − |ρ|.
|
280 |
+
(6)
|
281 |
+
This interval information is all that can be concluded about the joint distribution for Y when we have data
|
282 |
+
on the behaviour of Y under intervention on X, and no additional information.
|
283 |
+
Remark 1. The interval (6) shrinks to a point, so that the joint distribution of Y is fully determined by
|
284 |
+
the experimental data, if and only if we have equality in (5), i.e., just when P is degenerate, so that, for
|
285 |
+
some x, y = 0, 1, Pr(Y = y | X ← x) = 0. That is to say, for at least one of the interventions, the resulting
|
286 |
+
outcome Y can be predicted with certainty—a most unusual state of affairs. In this case Pr(Y (x) = y) = 0,
|
287 |
+
so that both joint events (Y (x) = y, Y (x) = 0) and (Y (x) = y, Y (x) = 1) (where x = 1−x) have probability
|
288 |
+
0.
|
289 |
+
5.1.1 Benefit and harm
|
290 |
+
The probability of benefit PB is the upper right entry of Table 1, PB = Pr(Y (1) = 1, Y (0) = 0) = 1
|
291 |
+
2(ξ +τ),
|
292 |
+
which by (6) is bounded between PB− := 1
|
293 |
+
2(|τ|+τ) = max{τ, 0} and PB+ := 1
|
294 |
+
2(1−|ρ|+τ) = min{Pr(Y =
|
295 |
+
|
296 |
+
A. Philip Dawid and Stephen Senn, Personalised Decision-Making
|
297 |
+
7
|
298 |
+
1 | X ← 1), Pr(Y = 0 | X ← 0)}. The probability of harm is the lower left entry of Table 1, PH =
|
299 |
+
Pr(Y (1) = 0, Y (0) = 1) = 1
|
300 |
+
2(ξ − τ) = PB − τ.
|
301 |
+
For the case of Example 1, we have τ = 0.28, ρ = −0.3. Without any further information, we can only
|
302 |
+
infer 0.28 ≤ PB ≤ 0.49, and correspondingly 0 ≤ PH ≤ 0.21.
|
303 |
+
5.2 Covariate information
|
304 |
+
Now suppose that, again with experimental data, we can obtain additional information on some pre-
|
305 |
+
treatment covariate information L (for simplicity assumed discrete), unaffected by intervention (so Pr(L =
|
306 |
+
l | X ← x) = Pr(L = l), assumed known and positive). We thus have access to the conditional interventional
|
307 |
+
probabilities Pr(Y = y | L = l, X ← x).
|
308 |
+
Let τ(l), ρ(l) be defined as in (2) and (3), but with probabilities further conditioned on L = l. If,
|
309 |
+
for the target case, we observe L = l, then we simply apply the above analysis, conditional on L = l. In
|
310 |
+
particular, the joint distribution for Y, given L = l, will be as in Table 1, with ρ, τ, ξ replaced, respectively,
|
311 |
+
by ρ(l), τ(l), ξ(l), where ξ(l) is subject only to
|
312 |
+
|τ(l)| ≤ ξ(l) ≤ 1 − |ρ(l)|.
|
313 |
+
(7)
|
314 |
+
Finally, suppose that, while having access, from the experimental data, to the probabilities Pr(Y =
|
315 |
+
y | L = l, X ← x), we do not observe L for the target patient. In this case (and unlike the situation
|
316 |
+
for decision theory) the additional background knowledge can make a difference. In Table 1 we now have
|
317 |
+
ξ = �
|
318 |
+
s ξ(l) × Pr(L = l), and we get the new interval bound
|
319 |
+
L :=
|
320 |
+
�
|
321 |
+
s
|
322 |
+
|τ(l)| × Pr(L = l) ≤ ξ ≤ 1 −
|
323 |
+
�
|
324 |
+
s
|
325 |
+
|ρ(l)| × Pr(L = l) =: U.
|
326 |
+
(8)
|
327 |
+
Since τ = �
|
328 |
+
s τ(l) × Pr(L = l), ρ = 1 − �
|
329 |
+
s ρ(l) × Pr(L = l), this interval will be strictly contained in
|
330 |
+
that of (6) so long as not all the (τ(l)), or not all the (ρ(l)), have the same sign.
|
331 |
+
The probability of benefit is now bounded below by �
|
332 |
+
l PB−(l) Pr(L = l) and above by �
|
333 |
+
l PB+(l) Pr(L =
|
334 |
+
l), where PB−(l) and PB+(l) can be computed as in § 5.1.1 with τ and ρ replaced by τ(l) and ρ(l), re-
|
335 |
+
spectively.
|
336 |
+
Remark 2. Applying Remark 1, and noting |τ(l)| ≤ 1 − |ρ(l)|, all l, we see that the interval (8) will reduce
|
337 |
+
to a point, yielding full identification of the joint distribution of Y, if and only if |τ(l)| = 1 − |ρ(l)|, all l,
|
338 |
+
so that, for each l, at least one of Pr(Y = y | L = l, X ← x), for x, y = 0, 1, is zero. In this case, both
|
339 |
+
Pr(Y (x) = y, Y (x) = 0 | L = l) and Pr(Y (x) = y, Y (x) = 1 | L = l) will be 0. Knowing the value of L
|
340 |
+
will then always allow us to predict at least one of the interventional outcomes with certainty. However,
|
341 |
+
the relevant x and y may vary with l, in which case such certainty will not be possible in the absence of
|
342 |
+
knowledge of L.
|
343 |
+
5.2.1 Observational data
|
344 |
+
Consider now the case that our data are observational, rather than experimental. Suppose we can observe
|
345 |
+
a “sufficient covariate”: a covariate L such that, conditional on L, we can assume there is no residual
|
346 |
+
confounding. That is to say, the observational probability Pr(Y = y | L = l, X = x) can be equated with
|
347 |
+
the interventional probability Pr(Y = y | L = l, X ← x). To ensure meaningful conditioning, we further
|
348 |
+
need the positivity condition: in the observational setting,
|
349 |
+
Pr(L = l, X = x) > 0
|
350 |
+
all l, and x = 0 or 1.
|
351 |
+
(9)
|
352 |
+
We can then proceed exactly as in § 5.2 above.
|
353 |
+
|
354 |
+
8
|
355 |
+
A. Philip Dawid and Stephen Senn, Personalised Decision-Making
|
356 |
+
5.3 Intention to treat
|
357 |
+
Allocation of treatment to patients can be usefully decomposed into two steps:
|
358 |
+
Intention The patient, or their doctor, decides on which treatment they would ideally want. This decision
|
359 |
+
will typically be related to their health status and other background information that could be predic-
|
360 |
+
tive of recovery, so that we cannot regard those who desire, and those who reject, active treatment as
|
361 |
+
comparing like with like. This is the genesis of confounding.
|
362 |
+
We introduce a binary stochastic “intention to treat” (ITT) variable X∗ to denote the treatment
|
363 |
+
desired.
|
364 |
+
Application A treatment X is imposed on the patient.
|
365 |
+
It is important to distinguish X and X∗.5 The ITT variable X∗ exists prior to application of treatment,
|
366 |
+
and can thus be regarded as independent of it:
|
367 |
+
Pr(X∗ = x∗ | X ← x) = Pr(X∗ = x∗).
|
368 |
+
(10)
|
369 |
+
This expresses the covariate nature of X∗.
|
370 |
+
We assume that, in an observational setting, the desired treatment is the one that is actually admin-
|
371 |
+
istered (there being no reason to do otherwise). Thus the received treatment X will be the same as the
|
372 |
+
desired treatment X∗. In particular, since we observe X, we can infer the value of X∗.
|
373 |
+
In an experiment, however, the treatment X will be imposed (e.g., by randomization), in a way that
|
374 |
+
will typically take no account of X∗. Even though we can still conceive of the ITT variable X∗ as existing,
|
375 |
+
it may or—more usually—may not be possible to observe it. When X∗ is observable, it can be used, just
|
376 |
+
like any other covariate, to improve decision-making, as in § 2 (when X∗ is observed for the target patient),
|
377 |
+
or, in the approach of MP, to narrow the bounds on PB and PH, as in § 5.2.
|
378 |
+
5.3.1 ITT as a sufficient covariate
|
379 |
+
In an observational setting, where X∗ = X is observed, it is natural to assume “distributional consistency”
|
380 |
+
[12]: the distribution of Y given intended treatment X∗ = x—and so, also, given received treatment
|
381 |
+
X = x—is the same as that of Y , given X∗ = x, under an imposed intervention X ← x that happens to
|
382 |
+
coincide with the treatment that would have been chosen anyway:
|
383 |
+
Pr(Y = y | X∗ = x, X = x) = Pr(Y = y | X∗ = x, X ← x).
|
384 |
+
(11)
|
385 |
+
For x∗ ̸= x, the event (X∗ = x∗, X = x) does not occur in the observational regime, so we can interpret
|
386 |
+
Pr(Y = y | X∗ = x∗, X = x) however we want, in particular as
|
387 |
+
Pr(Y = y | X∗ = x∗, X = x) = Pr(Y = y | X∗ = x∗, X ← x),
|
388 |
+
(12)
|
389 |
+
and then (11) implies that (12) holds for all x, x∗.
|
390 |
+
Properties (10) and (12) imply that X∗, which is observed in the observational setting, behaves as a
|
391 |
+
sufficient covariate.
|
392 |
+
5.4 Combination of data
|
393 |
+
It would be nice if, with observational data, we could profit from the fact that X∗ is a sufficient covariate,
|
394 |
+
as in § 5.2.1. However, this is not straightforward, since the positivity condition (9) fails: for x∗ ̸= x, even
|
395 |
+
5 We should further distinguish between imposed treatment and received treatment, as in Dawid [12]. Here we notate
|
396 |
+
both as X, hoping this will cause no confusion. We write X ← x when X refers to the imposed treatment, and X = x
|
397 |
+
when X refers to the received treatment.
|
398 |
+
|
399 |
+
A. Philip Dawid and Stephen Senn, Personalised Decision-Making
|
400 |
+
9
|
401 |
+
though we may assume Pr(Y = y | X∗ = x∗, X ← x) = Pr(Y = y | X∗ = x∗, X = x), we have no
|
402 |
+
data to estimate the latter term. Again, when our data are experimental but we can not directly observe
|
403 |
+
X∗, we can not identify Pr(Y = y | X∗ = x∗, X ← x). However, it turns out that we can do so if we
|
404 |
+
can also obtain observational data: the combination of both types of data allows us, after all, to identify
|
405 |
+
Pr(Y = y | X∗ = x∗, X ← x), even for x ̸= x∗. This we show in the following theorem.
|
406 |
+
Theorem 1. Suppose we can identify the joint distribution of X and Y in the observational context, where
|
407 |
+
0 < Pr(X = 1) < 1, and can also identify the distribution of Y under either intervention X ← x (x = 0, 1).
|
408 |
+
Then, under conditions (10) and (11), all the probabilities Pr(Y = y | X∗ = x∗, X ← x) (x, x∗ = 0, 1) are
|
409 |
+
identified. Specifically,
|
410 |
+
Pr(Y = y | X∗ = 1, X ← 1)
|
411 |
+
=
|
412 |
+
Pr(Y = y | X = 1)
|
413 |
+
(13)
|
414 |
+
Pr(Y = y | X∗ = 0, X ← 0)
|
415 |
+
=
|
416 |
+
Pr(Y = y | X = 0)
|
417 |
+
(14)
|
418 |
+
Pr(Y = y | X∗ = 1, X ← 0)
|
419 |
+
=
|
420 |
+
Pr(Y = y | X ← 0) − Pr(Y = y, X = 0)
|
421 |
+
Pr(X = 1)
|
422 |
+
(15)
|
423 |
+
Pr(Y = y | X∗ = 0, X ← 1)
|
424 |
+
=
|
425 |
+
Pr(Y = y | X ← 1) − Pr(Y = y, X = 1)
|
426 |
+
Pr(X = 0)
|
427 |
+
.
|
428 |
+
(16)
|
429 |
+
Proof. (13) and (14) follow from (11).
|
430 |
+
To identify Pr(Y = y | X∗ = 0, X ← 1), we argue as follows. We have
|
431 |
+
Pr(Y = y | X ← 0)
|
432 |
+
=
|
433 |
+
Pr(Y = y | X∗ = 0, X ← 0) × Pr(X∗ = 0 | X ← 0)
|
434 |
+
+ Pr(Y = y | X∗ = 1, X ← 0) × Pr(X∗ = 1 | X ← 0)
|
435 |
+
=
|
436 |
+
Pr(Y = y | X = 0) × Pr(X = 0)
|
437 |
+
+ Pr(Y = y | X∗ = 1, X ← 0) × Pr(X = 1),
|
438 |
+
(17)
|
439 |
+
on using (10) and (11), and the fact that X∗ = X in the observational setting. Since all the other terms in
|
440 |
+
(17) are identifiable in either the observational or the experimental context, and Pr(X = 1) ̸= 0, we can
|
441 |
+
solve for Pr(Y = y | X∗ = 1, X ← 0), obtaining (15). Then (16) follows similarly.
|
442 |
+
The above proof relies on X (and so X∗) being binary, but Y need not be. Versions of this argument have
|
443 |
+
appeared in [14–17].
|
444 |
+
Corollary 1. The joint distribution of (X∗, Y ) under the intervention X ← x is then identified.
|
445 |
+
Proof. Follows since, by (10), Pr(X∗ = x∗ | X ← x) = Pr(X = x∗) is identified in the observational
|
446 |
+
context.
|
447 |
+
Remark 3. Since Pr(Y = y | X∗ = 1, X ← 0) ≥ 0, etc., we deduce from (15) and (16) the consistency
|
448 |
+
constraint Pr(Y = y | X ← x) ≥ Pr(Y = y, X = x), all x, y. When this fails, and that failure can not
|
449 |
+
be ascribed to sampling variation or bias, that is evidence of violation of the conditions of § 7 below, that
|
450 |
+
have, implicitly, been used to justify the above argument.
|
451 |
+
Theorem 1 and Corollary 1 express just what the combination of observational and experimental data is
|
452 |
+
doing for us: it allows us to identify distributions involving the ITT variable X∗.
|
453 |
+
5.5 Benefit and harm
|
454 |
+
Taking now X∗ as our sufficient covariate L, we can apply the formulae of (13)–(16) to compute the
|
455 |
+
quantities τ(x∗), ρ(x∗) required for the analysis of § 5.2. Noting that X∗ = X in the observational regime,
|
456 |
+
|
457 |
+
10
|
458 |
+
A. Philip Dawid and Stephen Senn, Personalised Decision-Making
|
459 |
+
so that Pr(X = x) = Pr(X∗ = x), we obtain
|
460 |
+
Pr(X∗ = 1) × τ(1)
|
461 |
+
=
|
462 |
+
Pr(Y = 1) − Pr(Y = 1 | X ← 0)
|
463 |
+
Pr(X∗ = 0) × τ(0)
|
464 |
+
=
|
465 |
+
Pr(Y = 1 | X ← 1) − Pr(Y = 1)
|
466 |
+
Pr(X∗ = 1) × ρ(1)
|
467 |
+
=
|
468 |
+
K − Pr(Y = 0 | X ← 0)
|
469 |
+
Pr(X∗ = 0) × ρ(0)
|
470 |
+
=
|
471 |
+
Pr(Y = 1 | X ← 1) − K
|
472 |
+
where K = Pr(Y = 1, X = 1) + Pr(Y = 0, X = 0). Then from (8) we bound ξ within (L, U), where
|
473 |
+
L
|
474 |
+
=
|
475 |
+
| Pr(Y = 1) − Pr(Y = 1 | X ← 0)| + | Pr(Y = 1) − Pr(Y = 1 | X ← 1)|
|
476 |
+
1 − U
|
477 |
+
=
|
478 |
+
| Pr(Y = 0 | X ← 0) − K| + | Pr(Y = 1 | X ← 1) − K|
|
479 |
+
Then PB lies in ( 1
|
480 |
+
2(L + τ), 1
|
481 |
+
2(U + τ)), and PH = PB − τ lies in ( 1
|
482 |
+
2(L − τ), 1
|
483 |
+
2(U − τ)). Although expressed
|
484 |
+
differently, these results agree with those of MP [2].
|
485 |
+
By Remark 2, the joint distribution of Y, and in particular PB, PH, will be point identified just when,
|
486 |
+
for both x∗ = 0 and x∗ = 1, there exist x, y such that Pr(Y = y | X∗ = x∗, X ← x) = 0. In non-trivial
|
487 |
+
cases we will have Pr(Y = y | X = x) ̸= 0, in which case, by (13) and (14), this would need to happen
|
488 |
+
with x ̸= x∗. For that, by (15) and (16), we require
|
489 |
+
Pr(Y = y | X ← 0) = Pr(Y = y, X = 0)
|
490 |
+
(18)
|
491 |
+
for either y = 1 or y = 0; as well as
|
492 |
+
Pr(Y = y | X ← 1) = Pr(Y = y, X = 1)
|
493 |
+
(19)
|
494 |
+
for either y = 1 or y = 0.
|
495 |
+
6 Examples
|
496 |
+
MP [2, Table 1] consider two cases, in both of which the interventional probabilities of recovery are as in
|
497 |
+
our Example 1, having Pr(Y = 1 | X ← 1) = 0.49, Pr(Y = 1 | X ← 0) = 0.21, and so ATE = 0.28.
|
498 |
+
However, they have different observational data. We now analyse these in detail.
|
499 |
+
Example 2. This example relates to females, for whom the observational joint probabilities are as in
|
500 |
+
Table 2.
|
501 |
+
Y = 1
|
502 |
+
Y = 0
|
503 |
+
X = 1
|
504 |
+
0.19
|
505 |
+
0.51
|
506 |
+
0.70
|
507 |
+
X = 0
|
508 |
+
0.21
|
509 |
+
0.09
|
510 |
+
0.30
|
511 |
+
0.40
|
512 |
+
0.60
|
513 |
+
1
|
514 |
+
Table 2. Joint observational distribution of (X, Y ) for females
|
515 |
+
Applying the formulae of § 5.5 we find:
|
516 |
+
0.7 × τ(1)
|
517 |
+
=
|
518 |
+
0.19
|
519 |
+
0.3 × τ(0)
|
520 |
+
=
|
521 |
+
0.09
|
522 |
+
0.7 × ρ(1)
|
523 |
+
=
|
524 |
+
−0.51
|
525 |
+
0.3 × ρ(0)
|
526 |
+
=
|
527 |
+
0.11
|
528 |
+
It follows that PB−(1) = τ(1) = 19/70. Also, PB+(1) = Pr(Y = 1 | X∗ = 1, X ← 1) = Pr(Y = 1 |
|
529 |
+
X = 1) = 19/70. Hence, given X∗ = 1, we have exact identification: PB(1) = 19/70. This occurs because
|
530 |
+
|
531 |
+
A. Philip Dawid and Stephen Senn, Personalised Decision-Making
|
532 |
+
11
|
533 |
+
Pr(Y = 1, X = 0) = 0.21 = Pr(Y = 1 | X ← 0), implying the deterministic property Pr(Y = 1 | X∗ =
|
534 |
+
1, X ← 0) = 0: a female who desires treatment will never recover if untreated. Consequently such a female
|
535 |
+
should be treated.
|
536 |
+
Also, PB−(0) = τ(0) = 0.3, while PB+(0) = Pr(Y = 0 | X∗ = 0, X ← 0) = Pr(Y = 0 | X = 0) = 0.3.
|
537 |
+
Given X∗ = 0, we again have exact identification: PB−(0) = 0.3. This occurs because Pr(Y = 0, X =
|
538 |
+
1) = 0.51 = Pr(Y = 0 | X ← 1), so that Pr(Y = 0 | X∗ = 0, X ← 1) = 0: a female who does not desire
|
539 |
+
treatment will always recover if treated. Again, such a female should be treated.
|
540 |
+
Finally we obtain exact identification marginally: PB = 0.28. Correspondingly, PH = PB − τ = 0. As
|
541 |
+
there is no possibility of harm, any female should be treated.
|
542 |
+
All the above conclusions agree with the DT prescription, based on the experimental data alone: since
|
543 |
+
ATE > 0, a female should be treated.
|
544 |
+
Example 3. For males, the observational joint probabilities are as in Table 3. Proceeding similarly to
|
545 |
+
Y = 1
|
546 |
+
Y = 0
|
547 |
+
X = 1
|
548 |
+
0.49
|
549 |
+
0.21
|
550 |
+
0.70
|
551 |
+
X = 0
|
552 |
+
0.21
|
553 |
+
0.09
|
554 |
+
0.30
|
555 |
+
0.70
|
556 |
+
0.30
|
557 |
+
1
|
558 |
+
Table 3. Joint observational distribution of (X, Y ) for males
|
559 |
+
Example 2, we find that PB and PH are again identified exactly: PB = 0.49, PH = 0.21. Indeed, Pr(Y =
|
560 |
+
1, X = 1) = 0.49 = Pr(Y = 1 | X ← 1), implying the deterministic property Pr(Y = 1 | X∗ = 0, X ← 1) =
|
561 |
+
0: a male who does not desire treatment will never recover if treated. Consequently such a male should not
|
562 |
+
be treated. Also, Pr(Y = 1, X = 0) = 0.21 − Pr(Y = 1 | X ← 0), so that Pr(Y = 1 | X∗ = 1, X ← 0) = 0:
|
563 |
+
a male who desires treatment will never recover if untreated, so that such a male should be treated.
|
564 |
+
However, if we do not observe X∗ for the target male patient, the above does not tell us how to proceed.
|
565 |
+
We might try to balance PH (= 0.49) and PB (= 0.21) somehow: for example, treat just when PB > λPH
|
566 |
+
for some chosen value of λ. In the light of the clinical maxim primum non nocere, a value λ = 3 might be
|
567 |
+
chosen—in which case the target male would not be treated.6
|
568 |
+
By contrast, in the absence of knowledge of X∗ for the target male, the DT approach would take no
|
569 |
+
account of the observational data, again focusing simply on ATE = 0.28—and so decide to treat. In a large
|
570 |
+
population of similar cases, this would lead to an overall recovery rate of 49%, the maximum possible;
|
571 |
+
whereas the above strategy based on balancing PB and PH would only have a 21% recovery rate. It is
|
572 |
+
difficult to see how this could be regarded as ethical.
|
573 |
+
Example 4. Consider another case. Again, the interventional probabilities are Pr(Y = 1 | X ← 1) = 0.49,
|
574 |
+
Pr(Y = 1 | X ← 0) = 0.21, with τ = 0.28. Now the observational joint probabilities are as in Table 4. We
|
575 |
+
Y = 1
|
576 |
+
Y = 0
|
577 |
+
X = 1
|
578 |
+
0.2
|
579 |
+
0.5
|
580 |
+
0.7
|
581 |
+
X = 0
|
582 |
+
0.1
|
583 |
+
0.2
|
584 |
+
0.3
|
585 |
+
0.3
|
586 |
+
0.7
|
587 |
+
1
|
588 |
+
Table 4. Another joint observational distribution of (X, Y )
|
589 |
+
6 This argument parallels one in MP [1], having different numbers, and λ = 2.
|
590 |
+
|
591 |
+
12
|
592 |
+
A. Philip Dawid and Stephen Senn, Personalised Decision-Making
|
593 |
+
compute
|
594 |
+
0.7 × τ(1)
|
595 |
+
=
|
596 |
+
0.09
|
597 |
+
0.3 × τ(0)
|
598 |
+
=
|
599 |
+
0.19
|
600 |
+
0.7 × ρ(1)
|
601 |
+
=
|
602 |
+
−0.39
|
603 |
+
0.3 × ρ(0)
|
604 |
+
=
|
605 |
+
0.09.
|
606 |
+
Using (8) we find 0.28 ≤ ξ ≤ 0.52, whence PB = 1
|
607 |
+
2(ξ + τ) is bounded between 0.28 and 0.40—and so
|
608 |
+
PH = PB − τ lies between 0 and 0.12. So, even with the aid of the additional observational data, we have
|
609 |
+
not been able to identify these probabilities exactly. And even if we were to resolve the ambiguity somehow,
|
610 |
+
for example by taking the midpoints of these intervals as suggested by Li and Pearl [3], we would be no
|
611 |
+
better off than we were in Example 3, where trying to balance PB against PH could lead to a decision
|
612 |
+
opposite to the rcommendation of the simple DT analysis, so leading to fewer recoveries.
|
613 |
+
7 Assumptions and critical comments
|
614 |
+
Here we identify and discuss some of the assumptions underlying the foregoing analyses.
|
615 |
+
7.1 Representative data
|
616 |
+
A fundamental assumption underlying both the decision-theoretic analysis of § 2 and the alternative ap-
|
617 |
+
proach of § 3 is that the data available for estimating the interventional probabilities Pr(Y = y, L = l |
|
618 |
+
X ← x) are on individuals who can be regarded as “similar to” (“exchangeable with”) the target case, so
|
619 |
+
that these estimated probabilities are applicable to the target.7 In reality this is highly implausible. For
|
620 |
+
example, a clinical trial will have entry criteria and processes that make its subjects quite untypical of
|
621 |
+
the population from which they are drawn, or indeed of the individuals recruited into another such trial.
|
622 |
+
In any case, despite the name, entry criteria govern who does not get into a trial: they cannot guarantee
|
623 |
+
that those who enter are representative even of a target individual meeting the same criteria. A clinical
|
624 |
+
trial gains its value, not from representativeness, but from the internal randomisation that ensures that a
|
625 |
+
comparison between its treated and untreated groups is indeed a comparision of like with like, and that
|
626 |
+
valid probability statements can be made about likely differences, so enforcing internal validity. Because
|
627 |
+
of unrepresentativeness it would not be appropriate to regard Pr(Y = y, L = l | X ← x), estimated from
|
628 |
+
the data, as being directly relevant to the target case—the problem of external validity. (One cheating way
|
629 |
+
round this is to focus on a hypothetical target individual who can be regarded as exchangeable with those
|
630 |
+
in the study.) Nevertheless, it may still be reasonable to regard the estimated ATE or CATE as applying
|
631 |
+
to the target—if not in its exact numerical value, at least in its sign, which is what is required, for DT
|
632 |
+
application, to solve the single patient treatment problem; or in its ordering of the CATEi, as required to
|
633 |
+
solve the DT unit selection problem.
|
634 |
+
To underline how unreasonable the representative assumption is, it should be noted that even when
|
635 |
+
clinical trials with similar protocols are compared this assumption is not made. A striking example of its
|
636 |
+
failure for nearly identical protocols is given by the TARGET study [18], in which osteoarthritis patients in
|
637 |
+
some centres were randomised to receive either lumiracoxib or naproxen, and patients in other centres either
|
638 |
+
lumiracoxib or ibuprofen. The degree of comparability in design of the two sub-studies thus defined was
|
639 |
+
7 For application to the MP arguments of § 3, the representativeness assumption should apparently be extended to
|
640 |
+
the (typically unidentifiable) bivariate distribution, along with the other variables, of the pair of potential responses
|
641 |
+
(Y (1), Y (0)). For the interval-valued inferences made, however, this is not crucial, since these allow for arbitrary de-
|
642 |
+
pendence in this bivariate distribution.
|
643 |
+
|
644 |
+
A. Philip Dawid and Stephen Senn, Personalised Decision-Making
|
645 |
+
13
|
646 |
+
greater than one would typically expect between two randomised controlled trials (RCTs), and a fortiori
|
647 |
+
than between an RCT and an observational study, such as MP consider. Nevertheless, very important
|
648 |
+
differences at baseline were seen between the two sub-studies, even though within-sub-study treatment
|
649 |
+
arms were comparable. Furthermore, it was possible to demonstrate differences at outcome between the
|
650 |
+
two studies using lumiracoxib data only, a striking illustration of a study effect. It is generally accepted by
|
651 |
+
sponsors and regulators that as soon as concurrent control is abandoned the greatest of care must be taken
|
652 |
+
in drawing inferences. Modern work on using data on historical controls to try and improve the efficiency
|
653 |
+
of clinical trials takes such study-to-study variation as a given that must be allowed for [19].
|
654 |
+
7.2 Combination of data
|
655 |
+
An essential requirement for the application of Theorem 1 is that the observational and experimental
|
656 |
+
datasets comprise similar individuals, so that the same probabilities for X, X∗, Y apply to both groups.
|
657 |
+
This is even more implausible than the representativeness of either group. In particular, the assumption of
|
658 |
+
a common distribution for the desired treatment X∗, in both datasets and in the target patient, is vital but
|
659 |
+
highly questionable. Even if we were to accept the arguments of MP [2] based on combining observational
|
660 |
+
and experimental data, without this property they are simply irrelevant.
|
661 |
+
7.3 What do clinical trialists do in practice?
|
662 |
+
The key to using RCTs is to identify reasonable assumptions, and use theory to transfer results from trial
|
663 |
+
to practice. A striking example is given by bioequivalence studies. The subjects are usually young healthy
|
664 |
+
volunteers, frequently male. However, the results will be used to decide on appropriate treatments for
|
665 |
+
elderly frail patients, some female. There is no pretence of representativeness. Instead, tight control and
|
666 |
+
sensible scales of analysis are used. The purpose of such studies is to compare two formulations in terms of
|
667 |
+
bioavailability, and this is typically done using a cross-over trial in which each subject is their own control,
|
668 |
+
the order of administration being randomised. On separate days, concentration of the test and reference
|
669 |
+
pharmaceuticals are measured, and the ratio of the areas under the two concentration time curves (AUCs)
|
670 |
+
are calculated for each subject, then analysed over all subjects, typically after log-transformation. What is
|
671 |
+
relevant for treating an individual patient is their own AUC: too low and efficacy may be disappointing,
|
672 |
+
too high and the drug may not be tolerated. However, no inference is made from a bioequivalence study
|
673 |
+
in terms of AUCs alone, since they would be quite different in healthy volunteers and patients. Instead,
|
674 |
+
the idea is that the ratio between test and reference ought to be the same in volunteers and patients, and
|
675 |
+
this ratio can be used to make predictions as to how the test drug will behave in clinical practice. An
|
676 |
+
interesting example of such a study is reported by Shumaker and Metzler [20]. They used a more elaborate
|
677 |
+
design in which test and reference drugs were given in a double cross-over, thus permitting them to analyse
|
678 |
+
the formulation-by-subject interaction. They were able to demonstrate that there was no evidence of an
|
679 |
+
individual bioequivalence effect: although you could estimate the individual relative bioavailability, using
|
680 |
+
the average over all subjects would be superior than any such naïve estimate. This raises a further issue
|
681 |
+
with MP, who assume that individual causal effects are stable over time. Moreover, typical causal analysis
|
682 |
+
assumes an infinite sample size, but no infinities are available for individual subjects, and estimating
|
683 |
+
individual causal effects requires close attention to components of variance. Bioequivalence studies are an
|
684 |
+
extreme example, but the general idea of transferring results using a suitable scale for analysis, and back-
|
685 |
+
transforming to a scale suitable for decision analysis, is commonplace: see [21] for a general discussion and
|
686 |
+
[22] in the specific context of vaccine efficacy. Of course, as the COVID-19 pandemic has reminded us, there
|
687 |
+
are no guarantees. Things that work at one time may not do so at another. It behoves all those proposing
|
688 |
+
solutions to be cautious and humble.
|
689 |
+
|
690 |
+
14
|
691 |
+
A. Philip Dawid and Stephen Senn, Personalised Decision-Making
|
692 |
+
8 Summary
|
693 |
+
We have given careful accounts of the DT and MP approaches to individualised treatment choice. The DT
|
694 |
+
approach is simple in the extreme, and selects the treatment strategy that maximises the number of recov-
|
695 |
+
eries. In contrast, the MP approach fixates on philosophically questionable and unknowable counterfactual
|
696 |
+
concepts, and when its recommendations differ from those of DT will lead to fewer recoveries. This has
|
697 |
+
been illustrated in a number of examples.
|
698 |
+
One feature of the MP approach is the combination of experimental and observational data. When
|
699 |
+
some very strong, and practically implausible, conditions are satisfied, this permits identification of the
|
700 |
+
distribution of a special covariate, the intention to treat (ITT). As with any other covariate whose distri-
|
701 |
+
bution is known, this can then feed back to tighten the MP inferences. But it would be better to observe
|
702 |
+
this—or any other—covariate in the target patient, which would then lead to better results from the DT
|
703 |
+
point of view. In particular we have shown that, in just those very special cases that use of ITT leads to
|
704 |
+
point identification of the MP probabilities of benefit and of harm, knowledge of the target patient’s ITT
|
705 |
+
value allows perfect prediction of the outcome under at least one of the treatment interventions, and so to
|
706 |
+
a trivial solution to the decision problem.
|
707 |
+
The DT approach has a long history of fruitful application to an enormous variety of fields, from clinical
|
708 |
+
trials to rocket science. Attempts to replace it with another approach, based on counterfactuals, are totally
|
709 |
+
unnecessary and dangerously misguided. This approach should not be used in practice.
|
710 |
+
Acknowledgments
|
711 |
+
We have benefited greatly from discussions with Mats Stensrud and Aaron Sarvet.
|
712 |
+
Conflict of interest: Prof. Philip Dawid is a member of the Editorial Board in the Journal of Causal
|
713 |
+
Inference but was not involved in the review process of this article.
|
714 |
+
References
|
715 |
+
[1]
|
716 |
+
Scott Mueller and Judea Pearl.
|
717 |
+
Which patients are in greater need: A counterfactual analysis with reflections on
|
718 |
+
COVID-19. Blog post, April 2020.
|
719 |
+
[2]
|
720 |
+
Scott Mueller and Judea Pearl. Personalized decision making – a conceptual introduction. Technical Report 513,
|
721 |
+
Department of Computer Science, UCLA, 2022.
|
722 |
+
[3]
|
723 |
+
Ang Li and Judea Pearl. Unit selection based on counterfactual logic. In Proceedings of the Twenty-Eighth Inter-
|
724 |
+
national Joint Conference on Artificial Intelligence, IJCAI-19, pages 1793–1799. International Joint Conferences on
|
725 |
+
Artificial Intelligence Organization, 7 2019. DOI:10.24963/ijcai.2019/248.
|
726 |
+
[4]
|
727 |
+
Ang Li and Judea Pearl. Unit selection: Case study and comparison with A/B test heuristic. Preprint, UCLA, 2022.
|
728 |
+
[5]
|
729 |
+
Kosuke Imai, Zhichao Jiang, D. James Greiner, Ryan Halen, and Sooahn Shin. Experimental evaluation of algorithm-
|
730 |
+
assisted human decision-making: Application to pretrial public safety assessment (with Discussion). Journal of the
|
731 |
+
Royal Statistical Society, Series A, 2022. To appear.
|
732 |
+
[6]
|
733 |
+
Jonathan G. Richens, Rory Beard, and Daniel H. Thompson. Counterfactual harm. In Advances in Neural Information
|
734 |
+
Processing Systems 35 (NeurIPS 2022), 2022.
|
735 |
+
https://arxiv.org/abs/2204.12993.
|
736 |
+
[7]
|
737 |
+
Eli Ben-Michael, Kosuke Imai, and Zhichao Jiang. Policy learning with asymmetric utilities, 2022.
|
738 |
+
[8]
|
739 |
+
Aaron L. Sarvet and Mats J. Stensrud. Perspectives on harm in personalized medicine. Submitted to the American
|
740 |
+
Journal of Epidemiology, 2022.
|
741 |
+
[9]
|
742 |
+
Donald B. Rubin. Estimating causal effects of treatments in randomized and nonrandomized studies. Journal of
|
743 |
+
Educational Psychology, 66:688–701, 1974.
|
744 |
+
|
745 |
+
A. Philip Dawid and Stephen Senn, Personalised Decision-Making
|
746 |
+
15
|
747 |
+
[10] Jerzy Neyman. On the application of probability theory to agricultural experiments. Essay on principles (in Polish).
|
748 |
+
Roczniki Nauk Rolniczych, X:1–51, 1923. English translation of Section 9 (D. M. Dabrowska and T. P. Speed): Sta-
|
749 |
+
tistical Science 9 (1990), 465–480.
|
750 |
+
[11] A. Philip Dawid. Causal inference without counterfactuals (with Discussion). Journal of the American Statistical
|
751 |
+
Association, 95:407–448, 2000.
|
752 |
+
[12] A. Philip Dawid. Decision-theoretic foundations for statistical causality. Journal of Causal Inference, 9:39–77, 2021.
|
753 |
+
DOI:10.1515/jci-2020-0008.
|
754 |
+
[13] A. Philip Dawid. Probability, causality and the empirical world: A Bayes/de Finetti/Popper/Borel synthesis. Statistical
|
755 |
+
Science, 19:44–57, 2004.
|
756 |
+
[14] A. Philip Dawid and Monica Musio. What can group level data tell us about individual causality? In A. Carriquiry,
|
757 |
+
J. Tanur, and W. Eddy, editors, Statistics in the Public Interest: In Memory of Stephen E. Fienberg, pages 235–256.
|
758 |
+
Springer International Publishing, 2022.
|
759 |
+
DOI: 10.1007/978-3-030-75460-0_13.
|
760 |
+
[15] James M. Robins, Tyler J. Vanderweele, and Thomas S. Richardson. Comment on “Causal effects in the presence of
|
761 |
+
non compliance: A latent variable interpretation” by Antonio Forcina. Metron, LXIV:288–298, 2007.
|
762 |
+
[16] Sara G. Geneletti and A. Philip Dawid. Defining and identifying the effect of treatment on the treated. In Phyllis M.
|
763 |
+
Illari, Federica Russo, and Jon Williamson, editors, Causality in the Sciences, pages 728–749. Oxford University Press,
|
764 |
+
2011.
|
765 |
+
[17] Mats J. Stensrud and Aaron L. Sarvet. Optimal regimes for algorithm-assisted human decision-making. arXiv preprint
|
766 |
+
arXiv:2203.03020, 2022.
|
767 |
+
[18] Stephen Senn. Lessons from TGN1412 and TARGET: Implications for observational studies and meta-analysis. Phar-
|
768 |
+
maceutical Statistics, 7:294–301, 2008.
|
769 |
+
[19] Heinz Schmidli, Sandro Gsteiger, Satrajit Roychoudhury, Anthony O’Hagan, David Spiegelhalter, and Beat Neuen-
|
770 |
+
schwander. Robust meta-analytic-predictive priors in clinical trials with historical control information. Biometrics,
|
771 |
+
70:1023–1032, 2014.
|
772 |
+
[20] Robert C. Shumaker and Carol M. Metzler. The phenytoin trial is a case study of “individual bioequivalence”. Drug
|
773 |
+
Information Journal, 32:1063–1072, 1998.
|
774 |
+
[21] Jacobus Lubsen and Jan G. Tijssen. Large trials with simple protocols: Indications and contraindications. Controlled
|
775 |
+
Clinical Trials, 10:151–160, 1989.
|
776 |
+
[22] Stephen Senn. The design and analysis of vaccine trials for COVID-19 for the purpose of estimating efficacy. Pharma-
|
777 |
+
ceutical Statistics, 21:790–807, 2022.
|
778 |
+
|
-NFLT4oBgHgl3EQfCi71/content/tmp_files/load_file.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
.gitattributes
CHANGED
@@ -4058,3 +4058,72 @@ stFKT4oBgHgl3EQf1y5_/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -tex
|
|
4058 |
NtE3T4oBgHgl3EQfwwva/content/2301.04706v1.pdf filter=lfs diff=lfs merge=lfs -text
|
4059 |
a9E4T4oBgHgl3EQfoQ0b/content/2301.05182v1.pdf filter=lfs diff=lfs merge=lfs -text
|
4060 |
9tFJT4oBgHgl3EQfoyxM/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
4058 |
NtE3T4oBgHgl3EQfwwva/content/2301.04706v1.pdf filter=lfs diff=lfs merge=lfs -text
|
4059 |
a9E4T4oBgHgl3EQfoQ0b/content/2301.05182v1.pdf filter=lfs diff=lfs merge=lfs -text
|
4060 |
9tFJT4oBgHgl3EQfoyxM/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
4061 |
+
R9E4T4oBgHgl3EQfLAxE/content/2301.04934v1.pdf filter=lfs diff=lfs merge=lfs -text
|
4062 |
+
stE_T4oBgHgl3EQf8xx6/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
4063 |
+
ldAyT4oBgHgl3EQfk_iC/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
4064 |
+
k9AzT4oBgHgl3EQfNfvd/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
4065 |
+
RdA0T4oBgHgl3EQfDv9U/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
4066 |
+
xdE0T4oBgHgl3EQf-gIr/content/2301.02814v1.pdf filter=lfs diff=lfs merge=lfs -text
|
4067 |
+
1tE4T4oBgHgl3EQfaQwc/content/2301.05062v1.pdf filter=lfs diff=lfs merge=lfs -text
|
4068 |
+
R9E4T4oBgHgl3EQfLAxE/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
4069 |
+
O9AyT4oBgHgl3EQftflG/content/2301.00595v1.pdf filter=lfs diff=lfs merge=lfs -text
|
4070 |
+
bNAyT4oBgHgl3EQfivjL/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
4071 |
+
7NE2T4oBgHgl3EQfPQZw/content/2301.03757v1.pdf filter=lfs diff=lfs merge=lfs -text
|
4072 |
+
rdE1T4oBgHgl3EQf2wXf/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
4073 |
+
WNE2T4oBgHgl3EQfDgYF/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
4074 |
+
C9E4T4oBgHgl3EQfFwy_/content/2301.04889v1.pdf filter=lfs diff=lfs merge=lfs -text
|
4075 |
+
RdE3T4oBgHgl3EQfygvM/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
4076 |
+
7tAyT4oBgHgl3EQfpvj9/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
4077 |
+
W9AzT4oBgHgl3EQfmf0I/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
4078 |
+
ANAyT4oBgHgl3EQfq_kk/content/2301.00551v1.pdf filter=lfs diff=lfs merge=lfs -text
|
4079 |
+
HtAyT4oBgHgl3EQfrvl-/content/2301.00566v1.pdf filter=lfs diff=lfs merge=lfs -text
|
4080 |
+
EdAyT4oBgHgl3EQfSfdI/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
4081 |
+
1tE4T4oBgHgl3EQfaQwc/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
4082 |
+
K9E4T4oBgHgl3EQfiQ1n/content/2301.05132v1.pdf filter=lfs diff=lfs merge=lfs -text
|
4083 |
+
bdFST4oBgHgl3EQfCjh5/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
4084 |
+
rdAzT4oBgHgl3EQfcfxL/content/2301.01403v1.pdf filter=lfs diff=lfs merge=lfs -text
|
4085 |
+
mtFPT4oBgHgl3EQf4zVh/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
4086 |
+
HtAyT4oBgHgl3EQfrvl-/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
4087 |
+
iNE1T4oBgHgl3EQfzgXI/content/2301.03446v1.pdf filter=lfs diff=lfs merge=lfs -text
|
4088 |
+
7NE2T4oBgHgl3EQfPQZw/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
4089 |
+
5dE4T4oBgHgl3EQfBQvo/content/2301.04851v1.pdf filter=lfs diff=lfs merge=lfs -text
|
4090 |
+
59FKT4oBgHgl3EQfTC3B/content/2301.11778v1.pdf filter=lfs diff=lfs merge=lfs -text
|
4091 |
+
NNE2T4oBgHgl3EQfBgZ1/content/2301.03603v1.pdf filter=lfs diff=lfs merge=lfs -text
|
4092 |
+
iNE1T4oBgHgl3EQfzgXI/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
4093 |
+
stE4T4oBgHgl3EQfVwwe/content/2301.05026v1.pdf filter=lfs diff=lfs merge=lfs -text
|
4094 |
+
K9E4T4oBgHgl3EQfiQ1n/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
4095 |
+
ytFAT4oBgHgl3EQfBBwz/content/2301.08401v1.pdf filter=lfs diff=lfs merge=lfs -text
|
4096 |
+
rdAzT4oBgHgl3EQfcfxL/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
4097 |
+
FtAzT4oBgHgl3EQfHPtI/content/2301.01041v1.pdf filter=lfs diff=lfs merge=lfs -text
|
4098 |
+
ANE3T4oBgHgl3EQfsQvt/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
4099 |
+
_NFLT4oBgHgl3EQfDi7Y/content/2301.11980v1.pdf filter=lfs diff=lfs merge=lfs -text
|
4100 |
+
XtFRT4oBgHgl3EQf-zgt/content/2301.13692v1.pdf filter=lfs diff=lfs merge=lfs -text
|
4101 |
+
9tFST4oBgHgl3EQfbTje/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
4102 |
+
EdAyT4oBgHgl3EQfSfdI/content/2301.00086v1.pdf filter=lfs diff=lfs merge=lfs -text
|
4103 |
+
_NFLT4oBgHgl3EQfDi7Y/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
4104 |
+
5tE5T4oBgHgl3EQfPQ4_/content/2301.05503v1.pdf filter=lfs diff=lfs merge=lfs -text
|
4105 |
+
b9AzT4oBgHgl3EQfnf2W/content/2301.01582v1.pdf filter=lfs diff=lfs merge=lfs -text
|
4106 |
+
MNAzT4oBgHgl3EQfV_xV/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
4107 |
+
8dE4T4oBgHgl3EQfdQww/content/2301.05089v1.pdf filter=lfs diff=lfs merge=lfs -text
|
4108 |
+
NNE2T4oBgHgl3EQfBgZ1/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
4109 |
+
ctE3T4oBgHgl3EQfeAqc/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
4110 |
+
h9A0T4oBgHgl3EQfIP-u/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
4111 |
+
ANAyT4oBgHgl3EQfq_kk/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
4112 |
+
qdE1T4oBgHgl3EQfPgMa/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
4113 |
+
qdE1T4oBgHgl3EQfPgMa/content/2301.03027v1.pdf filter=lfs diff=lfs merge=lfs -text
|
4114 |
+
f9E0T4oBgHgl3EQfpAES/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
4115 |
+
C9E4T4oBgHgl3EQfFwy_/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
4116 |
+
PdFRT4oBgHgl3EQf5zjP/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
4117 |
+
UNAzT4oBgHgl3EQfJvtM/content/2301.01084v1.pdf filter=lfs diff=lfs merge=lfs -text
|
4118 |
+
O9AyT4oBgHgl3EQftflG/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
4119 |
+
FtAzT4oBgHgl3EQfHPtI/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
4120 |
+
b9AzT4oBgHgl3EQfnf2W/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
4121 |
+
stE4T4oBgHgl3EQfVwwe/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
4122 |
+
INA0T4oBgHgl3EQfB__n/content/2301.01985v1.pdf filter=lfs diff=lfs merge=lfs -text
|
4123 |
+
9tAzT4oBgHgl3EQf-_7r/content/2301.01943v1.pdf filter=lfs diff=lfs merge=lfs -text
|
4124 |
+
h9A0T4oBgHgl3EQfIP-u/content/2301.02073v1.pdf filter=lfs diff=lfs merge=lfs -text
|
4125 |
+
5dE4T4oBgHgl3EQfBQvo/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
4126 |
+
wdFRT4oBgHgl3EQfgjd8/content/2301.13580v1.pdf filter=lfs diff=lfs merge=lfs -text
|
4127 |
+
jtFST4oBgHgl3EQfHTjm/content/2301.13725v1.pdf filter=lfs diff=lfs merge=lfs -text
|
4128 |
+
UNAzT4oBgHgl3EQfJvtM/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
4129 |
+
yNFST4oBgHgl3EQfTDh5/content/2301.13768v1.pdf filter=lfs diff=lfs merge=lfs -text
|
19AyT4oBgHgl3EQf1fl-/content/tmp_files/2301.00736v1.pdf.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
19AyT4oBgHgl3EQf1fl-/content/tmp_files/load_file.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
1tE4T4oBgHgl3EQfaQwc/content/2301.05062v1.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:18dceccfcc5b7560f7bef4c6f42f08d667bbfe42aaff31f27b8c52c659f1b27e
|
3 |
+
size 1989994
|
1tE4T4oBgHgl3EQfaQwc/vector_store/index.faiss
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:ee638e5f26774acc16e856cf4bbbeebb3e79e98eb9e5e63300d5189c2547bb88
|
3 |
+
size 4849709
|
29FIT4oBgHgl3EQf5SvC/content/tmp_files/2301.11389v1.pdf.txt
ADDED
@@ -0,0 +1,1561 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
A Symbolic Emulator for Shuffle Synthesis
|
2 |
+
on the NVIDIA PTX Code
|
3 |
+
Kazuaki Matsumura
|
4 |
+
Barcelona Supercomputing Center (BSC)
|
5 | |
6 |
+
Simon Garcia De Gonzalo
|
7 |
+
Sandia National Laboratories
|
8 | |
9 |
+
Antonio J. Peña
|
10 |
+
Barcelona Supercomputing Center (BSC)
|
11 | |
12 |
+
Abstract
|
13 |
+
Various kinds of applications take advantage of GPUs
|
14 |
+
through automation tools that attempt to automatically
|
15 |
+
exploit the available performance of the GPU’s parallel
|
16 |
+
architecture. Directive-based programming models, such as
|
17 |
+
OpenACC, are one such method that easily enables parallel
|
18 |
+
computing by just adhering code annotations to code loops.
|
19 |
+
Such abstract models, however, often prevent programmers
|
20 |
+
from making additional low-level optimizations to take
|
21 |
+
advantage of the advanced architectural features of GPUs
|
22 |
+
because the actual generated computation is hidden from
|
23 |
+
the application developer.
|
24 |
+
This paper describes and implements a novel flexible
|
25 |
+
optimization technique that operates by inserting a code
|
26 |
+
emulator phase to the tail-end of the compilation pipeline.
|
27 |
+
Our tool emulates the generated code using symbolic
|
28 |
+
analysis by substituting dynamic information and thus
|
29 |
+
allowing for further low-level code optimizations to be
|
30 |
+
applied. We implement our tool to support both CUDA and
|
31 |
+
OpenACC directives as the frontend of the compilation
|
32 |
+
pipeline, thus enabling low-level GPU optimizations for
|
33 |
+
OpenACC
|
34 |
+
that
|
35 |
+
were
|
36 |
+
not
|
37 |
+
previously
|
38 |
+
possible.
|
39 |
+
We
|
40 |
+
demonstrate the capabilities of our tool by automating
|
41 |
+
warp-level shuffle instructions that are difficult to use by
|
42 |
+
even advanced GPU programmers. Lastly, evaluating our
|
43 |
+
tool with a benchmark suite and complex application code,
|
44 |
+
we provide a detailed study to assess the benefits of shuffle
|
45 |
+
instructions across four generations of GPU architectures.
|
46 |
+
CCS Concepts
|
47 |
+
• Software and its engineering →
|
48 |
+
Source code generation.
|
49 |
+
Keywords
|
50 |
+
Compiler, Symbolic Analysis, Code Generation,
|
51 |
+
GPUs, NVIDIA PTX, Program Optimization
|
52 |
+
Permission to make digital or hard copies of all or part of this work for
|
53 |
+
personal or classroom use is granted without fee provided that copies are not
|
54 |
+
made or distributed for profit or commercial advantage and that copies bear
|
55 |
+
this notice and the full citation on the first page. Copyrights for components
|
56 |
+
of this work owned by others than ACM must be honored. Abstracting with
|
57 |
+
credit is permitted. To copy otherwise, or republish, to post on servers or to
|
58 |
+
redistribute to lists, requires prior specific permission and/or a fee. Request
|
59 |
+
permissions from [email protected].
|
60 |
+
CC ’23, February 25–26, 2023, Montréal, QC, Canada
|
61 |
+
© 2023 Association for Computing Machinery.
|
62 |
+
ACM ISBN 979-8-4007-0088-0/23/02...$15.00
|
63 |
+
https://doi.org/10.1145/3578360.3580253
|
64 |
+
ACM Reference Format:
|
65 |
+
Kazuaki Matsumura, Simon Garcia De Gonzalo, and Antonio J. Peña.
|
66 |
+
2023. A Symbolic Emulator for Shuffle Synthesis on the NVIDIA
|
67 |
+
PTX Code. In Proceedings of the 32nd ACM SIGPLAN International
|
68 |
+
Conference on Compiler Construction (CC ’23), February 25–26, 2023,
|
69 |
+
Montréal, QC, Canada. ACM, New York, NY, USA, 12 pages. https:
|
70 |
+
//doi.org/10.1145/3578360.3580253
|
71 |
+
1
|
72 |
+
Introduction
|
73 |
+
Effectively utilizing the vast amount of computational
|
74 |
+
performance available in modern supercomputers remains a
|
75 |
+
challenge to this day. Hardware, middleware, and parallel
|
76 |
+
algorithms should be carefully orchestrated so that ideal
|
77 |
+
efficiency may be obtained for solving large real-world
|
78 |
+
problems in high-performance computing (HPC). Compiler
|
79 |
+
technologies are developed with highly-automated program
|
80 |
+
optimizations that use domain-specific knowledge and
|
81 |
+
target architecture specialization to solve a part of this
|
82 |
+
puzzle. With the end of Moore’s Law [19] approaching, the
|
83 |
+
focus on supercomputing technology is shifting toward
|
84 |
+
even more specialized accelerators, which in turn increases
|
85 |
+
their complexity. This trend further signifies the importance
|
86 |
+
of compiler technology to relieve programmers from the
|
87 |
+
burden of understanding the complex architecture of
|
88 |
+
modern accelerators to be able to efficiently optimize their
|
89 |
+
applications.
|
90 |
+
Currently, Graphics Processing Units (GPUs) are the most
|
91 |
+
widely adopted accelerator technology, as these are present
|
92 |
+
in seven out of the top 10 systems in the TOP500 list [29].
|
93 |
+
GPUs work for accelerating application execution time
|
94 |
+
through
|
95 |
+
their
|
96 |
+
highly
|
97 |
+
parallelized
|
98 |
+
yet
|
99 |
+
cooperative
|
100 |
+
architecture. To benefit the most from GPUs, however,
|
101 |
+
programmers must be proficient in writing complex
|
102 |
+
low-level GPU code, often a largely time-consuming task.
|
103 |
+
To overcome the complexity of low-level GPU code
|
104 |
+
development, pragma-based programming models such as
|
105 |
+
OpenACC/OpenMP [3, 24] have been developed or adapted
|
106 |
+
to be able to automatically retarget existing code for
|
107 |
+
acceleration. Although these automation tools have
|
108 |
+
improved the utilization of GPU acceleration by many
|
109 |
+
different types of applications, they lack the ability to
|
110 |
+
benefit from low-level architecture-specific optimizations.
|
111 |
+
One such type of optimizations is the use of warp-level
|
112 |
+
primitives, which have been available since NVIDIA Kepler
|
113 |
+
GPUs. Warp-level primitives, such as shuffle operations,
|
114 |
+
may be used to fill a gap between threads and thread-blocks
|
115 |
+
arXiv:2301.11389v1 [cs.DC] 26 Jan 2023
|
116 |
+
|
117 |
+
CC ’23, February 25–26, 2023, Montréal, QC, Canada
|
118 |
+
K. Matsumura, S. G. De Gonzalo, A. J. Peña
|
119 |
+
working as collaborative mechanisms, instead of relying on
|
120 |
+
shared and global memory accesses.
|
121 |
+
The main operation across the warp is the shuffle, which
|
122 |
+
delivers computed elements to neighbor threads to suppress
|
123 |
+
the redundancy of computation and memory accesses.
|
124 |
+
However, as many existing efforts [5, 7, 13, 25] have
|
125 |
+
demonstrated, those primitives often require non-trivial
|
126 |
+
modification of algorithms in the fundamental part of their
|
127 |
+
codes. Since the latency of the shuffle is similar to that of
|
128 |
+
shared memory loads [7] (apart from storing and
|
129 |
+
synchronization), it may serve as a cache system, holding
|
130 |
+
data in registers [5]. However, the effectiveness of this
|
131 |
+
technique is still unknown when disregarding domain-
|
132 |
+
specific knowledge.
|
133 |
+
Our work provides a middle-end environment to extend
|
134 |
+
the code of the NVIDIA GPU assembly PTX and enables, for
|
135 |
+
the first time in the literature, automatic shuffle synthesis to
|
136 |
+
explore the opportunity of this operation. Our environment,
|
137 |
+
PTXASW§ (Wrapper of PTX optimizing ASsembler),
|
138 |
+
addresses the entire computational flow of PTX, leveraging
|
139 |
+
a
|
140 |
+
symbolic
|
141 |
+
emulator
|
142 |
+
that
|
143 |
+
can
|
144 |
+
symbolically
|
145 |
+
extract
|
146 |
+
memory-access patterns. We introduce a Satisfiability
|
147 |
+
Modulo Theories (SMT) solver to prune avoidable control
|
148 |
+
flows while tracking down the register update.
|
149 |
+
Following the emulating results, PTXASW utilizes the
|
150 |
+
solver and detects the global-memory loads that are
|
151 |
+
possible to be covered by the shuffle operation. Around
|
152 |
+
those loads, additional instructions are implanted, while
|
153 |
+
supporting corner cases and circumventing overheads. We
|
154 |
+
conduct the shuffle synthesis on an OpenACC benchmark
|
155 |
+
suite, a directive-based programming model having no user
|
156 |
+
exposure to warp-level instructions. Our implementation
|
157 |
+
functions as a plugin of the compilation tool yielding
|
158 |
+
moderate overhead.
|
159 |
+
Applying our technique, we find various opportunities to
|
160 |
+
enable the shuffle over the original code of the benchmarks.
|
161 |
+
The performance improvement achieved is up to 132% with
|
162 |
+
no user intervention on the NVIDIA Maxwell GPU.
|
163 |
+
Additionally, based on the results of the experiments using
|
164 |
+
several generations of GPUs, we analyze the latency caused
|
165 |
+
for the shuffle operations to provide guidelines for shuffle
|
166 |
+
usage on each GPU architecture. In summary, the
|
167 |
+
contributions of our work are:
|
168 |
+
1. We create a symbolic emulator to analyze and optimize
|
169 |
+
GPU computing code, equipped with an SMT solver
|
170 |
+
for the comparison of symbolic expressions, induction
|
171 |
+
variable recognition for loops, and various optimizations
|
172 |
+
to reduce overheads.
|
173 |
+
2. Through symbolic analysis, we automatically find the
|
174 |
+
possible cases to utilize the shuffle operation, which
|
175 |
+
previously required in-depth domain knowledge to be
|
176 |
+
§The artifact is available at https://github.com/khaki3/ptxas-wrapper.
|
177 |
+
applied. Then, we synthesize those to the applications,
|
178 |
+
while avoiding expensive computation.
|
179 |
+
3. Using a directive-based programming model, we
|
180 |
+
generate various shuffle codes on several generations
|
181 |
+
of GPUs and show the cases that attain performance
|
182 |
+
improvement with no manual effort.
|
183 |
+
4. We show the latency breakdown of the optimization on
|
184 |
+
each GPU architecture and provide general guidelines
|
185 |
+
for the use of shuffle operations.
|
186 |
+
Our work is the first attempt at general utilization of
|
187 |
+
shuffles. Although manual warp-level operations often
|
188 |
+
contributed to domain-specific optimizations, the metrics to
|
189 |
+
be addressed by warp-level efforts have not been studied.
|
190 |
+
Even when computation or memory accesses are reducible,
|
191 |
+
the trade-offs have remained unknown to date, especially
|
192 |
+
when thread divergence is involved.
|
193 |
+
The rest of the paper is structured as follows. Section 2
|
194 |
+
provides
|
195 |
+
the
|
196 |
+
necessary
|
197 |
+
background
|
198 |
+
on
|
199 |
+
GPUs
|
200 |
+
for
|
201 |
+
general-purpose
|
202 |
+
computing,
|
203 |
+
PTX
|
204 |
+
code,
|
205 |
+
and
|
206 |
+
shuffle
|
207 |
+
operations. Section 3 provides a high-level overview of our
|
208 |
+
work. Sections 4 and 5 describe our symbolic emulator and
|
209 |
+
shuffle synthesis, while Section 6 details our overall
|
210 |
+
methodology. Sections 7 and 8 provide the results of our
|
211 |
+
experimental evaluation and in-depth analysis. Section 9
|
212 |
+
discusses previous related work and Section 10 provides
|
213 |
+
concluding remarks.
|
214 |
+
2
|
215 |
+
Background
|
216 |
+
This section provides the necessary background on GPUs
|
217 |
+
for general-purpose computing, low-level PTX code, and
|
218 |
+
warp-level shuffle operations.
|
219 |
+
2.1
|
220 |
+
GPUs
|
221 |
+
A Graphics Processing Unit (GPU), is a massively parallel
|
222 |
+
accelerator architecture having with several computational
|
223 |
+
and communication layers. The minimum execution unit is
|
224 |
+
a thread. Each thread can collaborate with other threads
|
225 |
+
bound to a certain thread-block and grid, through per-block
|
226 |
+
shared memory and/or grid-wise global memory. The
|
227 |
+
architecture is composed of many streaming multiprocessors
|
228 |
+
(SMs), which execute distributed thread-blocks in groups of
|
229 |
+
threads (usually 32), called warps. Using inner parallel
|
230 |
+
processing
|
231 |
+
units,
|
232 |
+
the
|
233 |
+
SM
|
234 |
+
takes
|
235 |
+
advantage
|
236 |
+
of
|
237 |
+
instruction-level parallelism (ILP), as well as parallelism
|
238 |
+
among warps and thread-blocks. Since the memory-access
|
239 |
+
latency increases through the levels of the memory
|
240 |
+
hierarchy, the concept of locality is highly respected for
|
241 |
+
performance, while locality optimizations bring additional
|
242 |
+
synchronization and resource use to programs. Warp-level
|
243 |
+
primitives, available since the NVIDIA Kepler generation of
|
244 |
+
GPUs, allow for the communication among threads within
|
245 |
+
the same warp [21], avoiding access to either shared or
|
246 |
+
global memory.
|
247 |
+
|
248 |
+
A Symbolic Emulator for Shuffle Synthesis on the NVIDIA PTX Code
|
249 |
+
CC ’23, February 25–26, 2023, Montréal, QC, Canada
|
250 |
+
All threads execute the same program code, known as
|
251 |
+
GPU kernels, customarily written in CUDA [22] for NVIDIA
|
252 |
+
GPUs, in a single-instruction multiple-data fashion. Threads
|
253 |
+
operate
|
254 |
+
on
|
255 |
+
different
|
256 |
+
data,
|
257 |
+
specified
|
258 |
+
in
|
259 |
+
kernels
|
260 |
+
by
|
261 |
+
programmers, deriving from thread and thread-block
|
262 |
+
identifiers. Kernels accept arguments, and the number of
|
263 |
+
threads and thread-blocks is specified as variables.
|
264 |
+
2.2
|
265 |
+
NVIDIA PTX
|
266 |
+
User-level code implemented manually in CUDA or
|
267 |
+
OpenACC is brought to execution on GPUs through
|
268 |
+
NVIDIA PTX [23], a virtual machine and ISA for
|
269 |
+
general-purpose parallel thread execution. PTX programs
|
270 |
+
feature the syntax and sequential execution flow of
|
271 |
+
assembly language. Thread-specific variables are replicated
|
272 |
+
to be run over SMs in parallel using the same program but
|
273 |
+
different parameters. Since the actual machine code (SASS)
|
274 |
+
cannot be modified from official tools [35], PTX is the
|
275 |
+
nearest documented and standard GPU code layer that may
|
276 |
+
be modified.
|
277 |
+
PTX code consists of kernel and function declarations.
|
278 |
+
Those have parameters and instruction statements along
|
279 |
+
with variable declarations, labels, and predicates. Listing 2
|
280 |
+
provides the CUDA-generated PTX kernel from Listing 1.
|
281 |
+
Variable declarations from several data spaces and types
|
282 |
+
correspond to the usage of on-chip resources, especially
|
283 |
+
__global__ void add(
|
284 |
+
float *c, float *a, float *b, int *f) {
|
285 |
+
int i = threadIdx.x + blockIdx.x * blockDim.x;
|
286 |
+
if (f[i]) c[i] = a[i] + b[i];
|
287 |
+
}
|
288 |
+
Listing 1. Addition kernel in CUDA
|
289 |
+
.visible .entry add(. param .u64 c, .param .u64 a,
|
290 |
+
.param .u64 b, .param .u64 f){
|
291 |
+
/* Variable Declarations */ .reg .pred %p<2>;
|
292 |
+
.reg .f32 %f<4>;.reg .b32 %r<6>;.reg .b64 %rd <15>;
|
293 |
+
/* PTX Statements */
|
294 |
+
ld.param.u64 %rd1 , [c];
|
295 |
+
ld.param.u64 %rd2 , [a];
|
296 |
+
ld.param.u64 %rd3 , [b];
|
297 |
+
ld.param.u64 %rd4 , [f];
|
298 |
+
cvta.to.global.u64 %rd5 , %rd4;
|
299 |
+
mov.u32 %r2 , %ntid.x;
|
300 |
+
mov.u32 %r3, %ctaid.x;
|
301 |
+
mov.u32 %r4 , %tid.x; mad.lo.s32 %r1, %r3, %r2 ,%r4;
|
302 |
+
mul.wide.s32 %rd6 , %r1, 4; add.s64 %rd7 ,%rd5 ,%rd6;
|
303 |
+
// if (!f[i]) goto $LABEL_EXIT;
|
304 |
+
ld.global.u32 %r5, [%rd7]; setp.eq.s32 %p1 ,%r5 ,0;
|
305 |
+
@%p1 bra $LABEL_EXIT;
|
306 |
+
// %f3 = a[i] + b[i]
|
307 |
+
cvta.u64 %rd8 , %rd2; add.s64 %rd10 , %rd8 , %rd6;
|
308 |
+
cvta.u64 %rd11 ,%rd3; add.s64 %rd12 , %rd11 ,%rd6;
|
309 |
+
ld.global.f32 %f1, [%rd12];
|
310 |
+
ld.global.f32 %f2, [%rd10]; add.f32 %f3, %f2 , %f1;
|
311 |
+
// c[i] = %f3
|
312 |
+
cvta.u64 %rd13 ,%rd1; add.s64 %rd14 , %rd13 ,%rd6;
|
313 |
+
st.global.f32 [%rd14], %f3;
|
314 |
+
$LABEL_EXIT: ret;
|
315 |
+
}
|
316 |
+
Listing 2. Addition kernel in PTX (simplified)
|
317 |
+
registers. Accepting options and types (e.g. .eq, .s32), PTX
|
318 |
+
instructions leverage defined registers and compute results,
|
319 |
+
while some of these enable access to other resources (e.g.,
|
320 |
+
ld.global.u32). Predicates (@%p1) limit the execution of
|
321 |
+
the instructions stated under them, which may lead to
|
322 |
+
branching based on the thread-specific values, such as
|
323 |
+
thread and thread-block IDs (%tid.x, %ctaid.x). Labels
|
324 |
+
(e.g., $LABEL_EXIT) are branch targets and allow backward
|
325 |
+
jumps that may create loops.
|
326 |
+
2.3
|
327 |
+
Shuffle Operation
|
328 |
+
In GPU architectures prior to NVIDIA Kepler, each
|
329 |
+
sequential execution of a given thread was allowed to
|
330 |
+
transfer data to another thread only through non-local
|
331 |
+
memories, accompanied by a block-level or grid-level
|
332 |
+
synchronization barrier. Modern GPU architectures now
|
333 |
+
support additional data sharing within warps. Intra-warp
|
334 |
+
communication
|
335 |
+
is performed via
|
336 |
+
shuffle operations.
|
337 |
+
Listing 3 shows the shfl.sync instruction in PTX, in which
|
338 |
+
data gets shifted unidirectionally (.up, .down) across the
|
339 |
+
threads of the warp, swapped in a butterfly way (.bfly), or
|
340 |
+
exchanged by precise indexing (.idx).
|
341 |
+
In the unidirectional shuffle, the delta part, which has no
|
342 |
+
source lane from the same warp, will be unchanged and
|
343 |
+
obtain a false value in the resultant predicate (%p1); only the
|
344 |
+
active threads (%mask) of the same control flow participate
|
345 |
+
in the same shuffle. Inactive threads or threads from
|
346 |
+
divergent flows produce neither valid results nor predicates
|
347 |
+
to destination lanes. Each operation is accompanied by the
|
348 |
+
warp-level synchronization, some of which are optimized
|
349 |
+
away during compilation. While shuffle instructions allow
|
350 |
+
for sub-warp granularity, our paper focuses on the
|
351 |
+
unidirectional instruction with 32 threads using 32-bit data,
|
352 |
+
as applying sub-warp granularity to applications tends to
|
353 |
+
feature corner cases and suffers from exception handling for
|
354 |
+
intricate patterns.
|
355 |
+
activemask.b32 %mask;
|
356 |
+
// val[warp_id] = %src; %dst = val[warp_id -%i]
|
357 |
+
shfl.sync.up.b32
|
358 |
+
%dst1|%p1 , %src , %i,
|
359 |
+
0, %mask;
|
360 |
+
// val[warp_id] = %src; %dst = val[warp_id +%i]
|
361 |
+
shfl.sync.down.b32 %dst2|%p2 , %src , %i, 31, %mask;
|
362 |
+
// val[warp_id] = %src; %dst = val[warp_id ^%i]
|
363 |
+
shfl.sync.bfly.b32 %dst3|%p3 , %src , %i, 31, %mask;
|
364 |
+
// val[warp_id] = %src; %dst = val[%i]
|
365 |
+
shfl.sync.idx.b32
|
366 |
+
%dst4|%p4 , %src , %i, 31, %mask;
|
367 |
+
Listing 3. The use of shfl.sync in PTX
|
368 |
+
Table 1 shows the latencies (clock cycles) of shared
|
369 |
+
memory (SM; no-conflict) and L1 cache as reported by [16],
|
370 |
+
besides that of shuffle, from a microbenchmark based
|
371 |
+
on [33]. In the table, Kepler is NVIDIA Tesla K80, Maxwell
|
372 |
+
is M60, Pascal is P100 and Volta is V100, while Tesla
|
373 |
+
K40c/TITAN X are used for the shuffle of Kepler/Maxwell.
|
374 |
+
This table reveals that shuffle brings benefits over shared
|
375 |
+
|
376 |
+
CC ’23, February 25–26, 2023, Montréal, QC, Canada
|
377 |
+
K. Matsumura, S. G. De Gonzalo, A. J. Peña
|
378 |
+
NVHPC
|
379 |
+
User Program
|
380 |
+
OpenACC/OpenMP
|
381 |
+
NVCC
|
382 |
+
CUDA
|
383 |
+
PTX Code
|
384 |
+
PTXAS
|
385 |
+
Execution Binary
|
386 |
+
Compiling
|
387 |
+
Assembling
|
388 |
+
PTXAS
|
389 |
+
PTXASW
|
390 |
+
1
|
391 |
+
Allocate symbolic
|
392 |
+
registers
|
393 |
+
2A
|
394 |
+
Update registers through the PTX execution
|
395 |
+
2B
|
396 |
+
Gather branch conditions & memory accesses
|
397 |
+
3
|
398 |
+
Detect shuffle
|
399 |
+
opportunities
|
400 |
+
4
|
401 |
+
Synthesize
|
402 |
+
shuffles
|
403 |
+
𝑁 = ?
|
404 |
+
𝑁 =
|
405 |
+
Figure 1. Overview of PTXASW
|
406 |
+
memory as a communication mechanism when data
|
407 |
+
movement is not redundantly performed, so storing and
|
408 |
+
synchronization are avoidable. In particular, latencies of L1
|
409 |
+
cache
|
410 |
+
on
|
411 |
+
Maxwell/Pascal
|
412 |
+
are
|
413 |
+
higher
|
414 |
+
compared
|
415 |
+
to
|
416 |
+
Kepler/Volta, which integrate shared memory with L1 cache.
|
417 |
+
Those allow the shuffle to be utilized as a register cache for
|
418 |
+
performance improvement, but the engineering efforts in
|
419 |
+
order to modify the fundamental parts of parallel
|
420 |
+
computation are considerably high.
|
421 |
+
name
|
422 |
+
Shuffle (up)
|
423 |
+
SM Read
|
424 |
+
L1 Hit
|
425 |
+
Kepler
|
426 |
+
24
|
427 |
+
26
|
428 |
+
35
|
429 |
+
Maxwell
|
430 |
+
33
|
431 |
+
23
|
432 |
+
82
|
433 |
+
Pascal
|
434 |
+
33
|
435 |
+
24
|
436 |
+
82
|
437 |
+
Volta
|
438 |
+
22
|
439 |
+
19
|
440 |
+
28
|
441 |
+
Table 1. Latencies (clock cycles) as reported by [16, 33]
|
442 |
+
3
|
443 |
+
Overview
|
444 |
+
Our work PTXASW can substitute the original PTX
|
445 |
+
assembler, which accepts input code from arbitrary sources.
|
446 |
+
We do not rely on specific information of any certain
|
447 |
+
language or any certain generation of GPU architecture.
|
448 |
+
Figure 1 provides a high-level overview of PTXASW’s
|
449 |
+
execution flow. PTXASW primarily aims at shuffle synthesis
|
450 |
+
on PTX code. The input is produced by user-level code
|
451 |
+
compilers, while directive-based programming models
|
452 |
+
(OpenACC/OpenMP) do not expose control over warp-level
|
453 |
+
operations, and CUDA prevents code extension due to its
|
454 |
+
code complexities. Once PTXASW inserts shuffles, the
|
455 |
+
resultant code is assembled to GPU binary by the original
|
456 |
+
PTX assembler.
|
457 |
+
PTXASW emulates the PTX execution based on the input.
|
458 |
+
Since runtime information is not provided, we employ
|
459 |
+
symbolic evaluation for each operation. First, 1 register
|
460 |
+
declarations are processed to be mapped in a symbolic
|
461 |
+
register environment (described in Section 4.1). Second, 2A
|
462 |
+
for each statement of PTX instructions, a corresponding
|
463 |
+
operation is performed to update registers (Section 4.1).
|
464 |
+
While continuing the execution,
|
465 |
+
2B PTXASW gathers
|
466 |
+
branch
|
467 |
+
conditions
|
468 |
+
for
|
469 |
+
avoiding
|
470 |
+
unrealizable
|
471 |
+
paths
|
472 |
+
(Section 4.2) and creates memory traces (Section 4.3). When
|
473 |
+
the entire emulation is finished, 3 we discover shuffle
|
474 |
+
opportunities from memory traces (Section 5.1). Finally, 4
|
475 |
+
we insert shuffle operations to the input code (Section 5.2);
|
476 |
+
then, the generated code is consumed by the original PTX
|
477 |
+
assembler.
|
478 |
+
4
|
479 |
+
Symbolic Emulator
|
480 |
+
Analysis of high-level code has posed questions about its
|
481 |
+
applicability to abstract program structures or other
|
482 |
+
user-level languages. While high-level code analysis may
|
483 |
+
process intact code information, enormous engineering
|
484 |
+
efforts are required just for specific forms within one
|
485 |
+
language [13, 32]. Therefore, virtual machines are utilized
|
486 |
+
for providing a cushion between real architectures and user
|
487 |
+
codes. In particular, analysis and optimization of the
|
488 |
+
virtual-machine code tend to be reusable without the
|
489 |
+
restriction of input types [12, 14, 34].
|
490 |
+
Our work uses PTX as the virtual machine layer and
|
491 |
+
performs general analysis through code emulation. We
|
492 |
+
introduce symbolic emulation to encapsulate the runtime
|
493 |
+
information in symbol expressions and compute concolic
|
494 |
+
(concrete + symbolic) values for each register. Although a
|
495 |
+
number of previous work have been conducted on symbolic
|
496 |
+
emulation for the purpose of software testing [4], our work
|
497 |
+
(PTXASW) especially aims at code optimization of memory
|
498 |
+
access on GPUs, since it is often regarded as one of the
|
499 |
+
bottlenecks of GPU computing [7]. Those computed values
|
500 |
+
are utilized for code generation as described in Section 5.
|
501 |
+
4.1
|
502 |
+
Instruction Encoding
|
503 |
+
Since the subsequent PTX assembler, while generating SASS
|
504 |
+
code, will eliminate redundant operations and resources, we
|
505 |
+
may abundantly use registers while not causing register
|
506 |
+
pressure by unnecessary data movement outside of the
|
507 |
+
static single assignment form (SSA). First, PTXASW
|
508 |
+
recognizes variable declarations and prepares a symbolic
|
509 |
+
bitvector of the corresponding size for each register. Since
|
510 |
+
arithmetic calculation and bitwise operations are supported
|
511 |
+
|
512 |
+
A Symbolic Emulator for Shuffle Synthesis on the NVIDIA PTX Code
|
513 |
+
CC ’23, February 25–26, 2023, Montréal, QC, Canada
|
514 |
+
on the combination of concrete and symbolic bitvectors, we
|
515 |
+
encode each PTX instruction as the computation over
|
516 |
+
vectors. For example, addition for 16-bit vectors is encoded
|
517 |
+
as in the following pseudocode:
|
518 |
+
a = [a_0 , a_1 , .., a_15]; //a_N is a 1-bit element
|
519 |
+
b = [b_0 , b_1 , .., b_15];
|
520 |
+
c = a + b
|
521 |
+
= [a_0 + b_0 , a_1 + b_1 , .., a_15 + b_15];
|
522 |
+
With the add instruction corresponding to the above
|
523 |
+
calculation, we detect the instruction type and source
|
524 |
+
registers (%a, %b) and compute the result:
|
525 |
+
add.u16 %c, %a, %b; // dst: %c; src: %a, %b
|
526 |
+
Then, having the binding with the name of the
|
527 |
+
destination register (%c), we keep the computed value in the
|
528 |
+
register environment. PTXASW defines each instruction to
|
529 |
+
update the destination registers according to the instruction
|
530 |
+
options and types, and those registers may be fully concrete
|
531 |
+
with the movement or computation from constant values.
|
532 |
+
Also, to support floating-point instructions, we insert the
|
533 |
+
conversion by uninterpreted functions at loading and
|
534 |
+
storing
|
535 |
+
bitvectors
|
536 |
+
to
|
537 |
+
and
|
538 |
+
from
|
539 |
+
floating-point
|
540 |
+
data.
|
541 |
+
Regarding casting operands among integer types and binary
|
542 |
+
types, truncating or extending is performed based on the
|
543 |
+
PTX specification. The computational instructions under
|
544 |
+
predicates issue conditional values in registers. Since
|
545 |
+
registers are not used before initialization, these always
|
546 |
+
have evaluated values, except for special registers, such as
|
547 |
+
thread IDs and uninterpreted functions of loops and
|
548 |
+
memory loads, which are described in following sections.
|
549 |
+
!$acc
|
550 |
+
kernels loop independent gang (65535)
|
551 |
+
!$acc& present(w0(1:nx ,1:ny), w1(1:nx ,1:ny))
|
552 |
+
do j = 2, ny -1
|
553 |
+
!$acc loop independent vector (512)
|
554 |
+
do i = 2, nx -1
|
555 |
+
w1(i,j)=c0*w0(i,j) + c1*(w0(i-1,j)+w0(i,j -1)+&
|
556 |
+
w0(i+1,j)+w0(i,j+1)) + c2*(w0(i-1,j-1)+&
|
557 |
+
w0(i-1,j+1)+w0(i+1,j-1)+w0(i+1,j+1))
|
558 |
+
enddo enddo
|
559 |
+
Listing 4. Jacobi kernel in Fortran and OpenACC
|
560 |
+
4.2
|
561 |
+
Execution Branching
|
562 |
+
Branching is caused by jumping to labels under binary
|
563 |
+
predicates that are computed by preceding instructions.
|
564 |
+
Since inputs and several parameters are unknown at
|
565 |
+
compilation time, unsolvable values of predicates are often
|
566 |
+
observed leading to undetermined execution flows where
|
567 |
+
computation is boundless. Thus, we abstract the repeated
|
568 |
+
instructions in the same execution flow. At the entry point
|
569 |
+
to the iterative code block, we modify each iterator of the
|
570 |
+
block to have uninterpreted functions with unique identities
|
571 |
+
and perform operations only once upon those uninterpreted
|
572 |
+
functions. Since those uninterpreted functions produce
|
573 |
+
incomparable values, we clip the initial values out and add
|
574 |
+
them to registers containing uninterpreted functions at the
|
575 |
+
block entry, for better accuracy in the case of incremental
|
576 |
+
iterators
|
577 |
+
to
|
578 |
+
be
|
579 |
+
found
|
580 |
+
by
|
581 |
+
induction
|
582 |
+
variable
|
583 |
+
recognition [10, 11].
|
584 |
+
We continue each branching while duplicating the
|
585 |
+
register environment for succeeding flows. All the flows
|
586 |
+
finish at re-entry to iterative blocks or at the end of
|
587 |
+
instructions, completing their own results. The symbolic
|
588 |
+
expressions in predicates used at the prior divergence are
|
589 |
+
recorded as assumptions while updating those predicates, to
|
590 |
+
have constant booleans in the register environment, based
|
591 |
+
on whether it is assumed as true. Conflicting values in
|
592 |
+
assumptions are removed according to an SMT solver
|
593 |
+
(Z3 [9]) when new expressions are added. If the destination
|
594 |
+
of a new branch can be determined providing assumptions
|
595 |
+
to the solver, unrealizable paths are pruned for faster
|
596 |
+
emulation. Also, we skip redundant code-block entry
|
597 |
+
bringing the same register environment as other execution
|
598 |
+
flows by memoization, to force new results at each entry.
|
599 |
+
4.3
|
600 |
+
Memory Analysis
|
601 |
+
We collect memory loads forwardly through the emulation
|
602 |
+
and express them by uninterpreted functions accepting
|
603 |
+
addresses and returning data of corresponding sizes. The
|
604 |
+
trace of memory loads is intervened by memory stores, and
|
605 |
+
both loads and assumptions are invalidated by stores that
|
606 |
+
possibly overwrite them, using the same mechanism for
|
607 |
+
conflicting assumptions mentioned in Section 4.2.
|
608 |
+
LD: 0xc + (load(param2) + ((((0x1 + %ctaid.x) * load(param6) // w0(i-1, j+1)
|
609 |
+
+ ((% tid.x + %ctaid.y << 0x9) + (- load(param5 )))) + loop(0, 14)) + loop(0, 53)) << 0x2)
|
610 |
+
LD: 0xc + (load(param2) + ((( load(param6) * (0x3 + %ctaid.x) // w0(i+1, j+1)
|
611 |
+
+ ((% tid.x + %ctaid.y << 0x9) + (- load(param5 )))) + loop(0, 13)) + loop(0, 52)) << 0x2)
|
612 |
+
LD: 0x4 + (load(param2) + ((((0x1 + %ctaid.x) * load(param6) // w0(i-1, j-1)
|
613 |
+
+ ((% tid.x + %ctaid.y << 0x9) + (- load(param5 )))) + loop(0, 14)) + loop(0, 53)) << 0x2)
|
614 |
+
/* LD: w0(i+1, j-1), w0(i
|
615 |
+
, j+1), w0(i+1, j
|
616 |
+
), w0(i
|
617 |
+
, j-1), w0(i-1, j
|
618 |
+
), w0(i
|
619 |
+
, j
|
620 |
+
) */
|
621 |
+
ST: 0x8 + (load(param3) + (((% tid.x + %ctaid.y << 0x9)
|
622 |
+
// w1(i
|
623 |
+
, j
|
624 |
+
)
|
625 |
+
+ loop(0, 57)) + ((- load(param5 )) + load(param6) * ((0x2 + %ctaid.x) + loop(0, 21)))) << 0x2)
|
626 |
+
Listing 5. Global-memory trace of Jacobi kernel through the symbolic emulation in order. Sign extensions are omitted.
|
627 |
+
Numerical numbers, shown in hexadecimal, are originally in bitvectors. load/loop are uninterpreted functions for parameter
|
628 |
+
loads having addresses and loop iterators having unique identities, respectively )
|
629 |
+
|
630 |
+
CC ’23, February 25–26, 2023, Montréal, QC, Canada
|
631 |
+
K. Matsumura, S. G. De Gonzalo, A. J. Peña
|
632 |
+
Listing 4 shows a Jacobian kernel implemented in Fortran
|
633 |
+
for GPUs using OpenACC. Its memory trace is obtained as
|
634 |
+
in Listing 5 by PTXASW emulating the PTX code generated
|
635 |
+
by NVHPC compiler 22.3. The address of each load is
|
636 |
+
symbolically calculated as register values, thus containing
|
637 |
+
uninterpreted functions and special registers. In the case of
|
638 |
+
divergence, branched flows maintain such traces while
|
639 |
+
sharing the common parts of the original flow.
|
640 |
+
5
|
641 |
+
Shuffle Synthesis
|
642 |
+
Mapping programs over thread-level parallelism, while
|
643 |
+
pursuing the performance of modern complex architectures
|
644 |
+
and ensuring correctness, is a far–from–easy task. Most
|
645 |
+
likely, existing GPU programs are already optimized in
|
646 |
+
terms of resource use and scheduling, which does not
|
647 |
+
smoothly allow for further optimization, especially at the
|
648 |
+
low-level code. The shuffle operation performs at its best
|
649 |
+
when the communication is fully utilized [25], but such
|
650 |
+
cases are not common in compiler-optimized code or even
|
651 |
+
manually-tuned code in HPC. The big trouble is corner
|
652 |
+
cases. Not only halo, but fractional threads emerged from
|
653 |
+
rounding up dynamic input sizes, demand exceptional cases
|
654 |
+
to be operated on GPUs. While the generality and
|
655 |
+
applicability of GPU shuffle instructions for all types of
|
656 |
+
applications or computational patterns are yet unknown,
|
657 |
+
the level of difficulty in manually applying shuffle
|
658 |
+
instructions in different cases adds further hardness to the
|
659 |
+
already complex task of understanding the true nature of
|
660 |
+
the performance of shuffle operations.
|
661 |
+
Hence, we implement automatic shuffle synthesis
|
662 |
+
through PTXASW to drive the lower-latency operations
|
663 |
+
seen in Section 2.3, while supporting corner cases and
|
664 |
+
covering
|
665 |
+
global-memory
|
666 |
+
loads
|
667 |
+
with
|
668 |
+
warp-level
|
669 |
+
communication. PTXASW is accordingly extended to seek
|
670 |
+
shuffle candidates among loads, and embed shuffle
|
671 |
+
instructions into code while alleviating register pressure.
|
672 |
+
5.1
|
673 |
+
Detection
|
674 |
+
Warps are comprised of neighboring threads. We do not
|
675 |
+
consider adjacent threads in non-leading dimensions, since
|
676 |
+
those tend to generate non-sequential access patterns. Upon
|
677 |
+
finding a global-memory load, PTXAS compares its load
|
678 |
+
address to those of previous loads found through the same
|
679 |
+
execution flow and not invalidated by any store. If for all
|
680 |
+
threads in a warp the load is overlapped with existing loads,
|
681 |
+
those instructions are recorded as possible shuffle sources.
|
682 |
+
To utilize a load with an address represented as 𝐴(%tid.x)
|
683 |
+
for another having the address 𝐵(%tid.x), there must exist
|
684 |
+
an integer 𝑁 such that 𝐴(%tid.x + 𝑁) = 𝐵(%tid.x) and
|
685 |
+
−31 ⩽ 𝑁 ⩽ 31. For example, when 𝑁 = 0, the load can be
|
686 |
+
fully utilized in the same thread. When 𝑁 = 1, we can adapt
|
687 |
+
the shfl.sync.down instruction to convey existing register
|
688 |
+
values to next threads while issuing the original load for the
|
689 |
+
edge case (%warp_id = 31). In the case of the memory trace
|
690 |
+
in Listing 5, the load accesses of w0(i-1, j+1) and w0(i-1,
|
691 |
+
j-1) are uniformly aligned with the close addresses to each
|
692 |
+
other, so we can search the variable 𝑁, which satisfies the
|
693 |
+
above condition, by supplying 𝑁 along with those addresses
|
694 |
+
to the solver and find 𝑁 = −2.
|
695 |
+
We make sure that each shuffle candidate has the same 𝑁
|
696 |
+
as a shuffle delta in all the execution flows. This delta must
|
697 |
+
be constant regardless of runtime parameters. Since the steps
|
698 |
+
of loop iterators in PTX code could be any size (e.g. NVHPC
|
699 |
+
Compiler uses the thread-block size), shuffles are detected
|
700 |
+
only in straight-line flows, whereas live variable analysis is
|
701 |
+
employed to exclude the case in which source values possibly
|
702 |
+
reflect a different iteration from the destination. For faster
|
703 |
+
analysis, we construct control-flow graphs before shuffle
|
704 |
+
detection, while pruning unrelated instructions to memory
|
705 |
+
operations and branches, and at the use of the SMT solver,
|
706 |
+
uninterpreted functions are converted to unique variables.
|
707 |
+
5.2
|
708 |
+
Code Generation
|
709 |
+
Warp divergence may be caused by various reasons,
|
710 |
+
including the dynamic nature of the program execution,
|
711 |
+
which
|
712 |
+
is
|
713 |
+
inconvenient
|
714 |
+
to
|
715 |
+
optimization,
|
716 |
+
where
|
717 |
+
the
|
718 |
+
uniformity of threads matters for collaboration. Not only
|
719 |
+
inactive threads, but an insufficient number of threads to
|
720 |
+
constitute complete warps, raises corner cases in which
|
721 |
+
original computation should be retained. Our shuffle
|
722 |
+
synthesis handles both situations by adding dynamic
|
723 |
+
checkers for uniformity.
|
724 |
+
Listing 6 presents an example of the synthesis by
|
725 |
+
PTXASW. Once all the emulation is finished, the results are
|
726 |
+
collected and filtered to satisfy all the above-mentioned
|
727 |
+
conditions. Then, PTXASW selects the possible shuffle for
|
728 |
+
each load with the smallest shuffle delta (𝑁) and allows only
|
729 |
+
the least corner cases. At the code generation, each source
|
730 |
+
load instruction is extended to be accompanied by the mov
|
731 |
+
instruction to prepare the source register (%source). The
|
732 |
+
destination load is covered with the shuffle operation and a
|
733 |
+
corner-case checker. First, we check if the thread has no
|
734 |
+
source from the same warp (%out_of_range). Second, the
|
735 |
+
ld.global.nc.f32 %f4 , [%rd31 +12]; // w0(i-1, j+1)
|
736 |
+
/* ... */
|
737 |
+
ld.global.nc.f32 %f7 , [%rd31 +4]; // w0(i-1, j-1)
|
738 |
+
ld.global.nc.f32 %f4 , [%rd31 +12];
|
739 |
+
mov.f32 %source , %f4; /* ... */
|
740 |
+
mov.u32 %wid , %tid.x; rem.u32 %wid , %wid , 32;
|
741 |
+
activemask.b32 %m; setp.ne.s32 %incomplete , %m, -1;
|
742 |
+
setp.lt.u32 %out_of_range , %wid , 2;
|
743 |
+
or.pred %pred , %incomplete , %out_of_range;
|
744 |
+
shfl.sync.up.b32 %f7 , %source , 2, 0, %mask;
|
745 |
+
@%pred ld.global.nc.f32 %f7 , [%rd31 +4];
|
746 |
+
Listing 6. Shuffle synthesis on Jacobi kernel (Upper is
|
747 |
+
original and lower is synthesized code; variable declarations
|
748 |
+
are omitted and the naming is simplified)
|
749 |
+
PTXASW
|
750 |
+
|
751 |
+
A Symbolic Emulator for Shuffle Synthesis on the NVIDIA PTX Code
|
752 |
+
CC ’23, February 25–26, 2023, Montréal, QC, Canada
|
753 |
+
incompleteness of the warp (%incomplete) is confirmed
|
754 |
+
with a warp-level querying instruction. In any case, the
|
755 |
+
shuffle operation is performed at the position of the original
|
756 |
+
load, shifting the value of the source register with the
|
757 |
+
distance of the extracted shuffle delta. Finally, only the
|
758 |
+
threads participating in an incomplete warp or assuming no
|
759 |
+
source lane execute the original load under the predicate
|
760 |
+
(%pred). When 𝑁 < 0, the shfl instruction takes the .up
|
761 |
+
option and when 𝑁 > 0, the .down option is selected. If
|
762 |
+
𝑁 = 0, just the mov instruction is inserted instead of all the
|
763 |
+
synthesized code. In actual code, the calculation of
|
764 |
+
%warp_id is shared among shuffles and set at the beginning
|
765 |
+
of the execution to reduce the computational latency.
|
766 |
+
To preserve the original program characteristics, such as
|
767 |
+
the register use, uniformity, and ILP, following ways of
|
768 |
+
generation are avoided. We can produce the correct results
|
769 |
+
even if shfl is predicated by %incomplete, but it often
|
770 |
+
imperils the basic efficiency with an additional branch,
|
771 |
+
which limits ILP. On the other hand, our code introduces
|
772 |
+
only one predicate to each shuffle and does not leave any
|
773 |
+
new branch in the resultant SASS code. Also, we do not use
|
774 |
+
a select instruction for merging the results between shuffles
|
775 |
+
and corner cases, because it would aggravate register
|
776 |
+
pressure. The output predicate by shuffle poses execution
|
777 |
+
dependency and provides the invalid status of inactive
|
778 |
+
threads; thus, it is ignored. Moreover, we only create
|
779 |
+
shuffles from direct global-memory loads and do not
|
780 |
+
implement shuffles over shuffled elements for better ILP.
|
781 |
+
6
|
782 |
+
Experimental Methodology
|
783 |
+
We build PTXASW using Rosette [30], a symbolic-
|
784 |
+
evaluation system upon the Racket language. PTXASW is
|
785 |
+
equipped with a PTX parser and runs the emulation of the
|
786 |
+
parsed code while expressing runtime parameters as
|
787 |
+
symbolic bitvectors provided by Rosette. Our shuffle
|
788 |
+
synthesis is caused at code generation, which prints the
|
789 |
+
assembler-readable
|
790 |
+
code.
|
791 |
+
We
|
792 |
+
evaluate
|
793 |
+
our
|
794 |
+
shuffle
|
795 |
+
mechanism with the NVHPC compiler [20] by hooking the
|
796 |
+
assembler invocation and overwriting the PTX code before
|
797 |
+
it is assembled. The NVHPC compiler accepts the
|
798 |
+
directive-based
|
799 |
+
programming
|
800 |
+
models
|
801 |
+
OpenACC
|
802 |
+
and
|
803 |
+
OpenMP to generate GPU code, which have no control over
|
804 |
+
warp-level instructions. The emulation is also tested for
|
805 |
+
GCC with OpenACC/OpenMP code and LLVM with
|
806 |
+
OpenMP code, but these use a master-worker model to
|
807 |
+
distribute computation across thread-blocks [15] and do not
|
808 |
+
directly refer to the thread ID in each thread, so mainly
|
809 |
+
ineffective results are obtained. Our synthesis is not limited
|
810 |
+
to global-memory loads and works on shared memory (such
|
811 |
+
as Halide [26]), but the performance is not improved due to
|
812 |
+
the similar latency of shared-memory loads and shuffles.
|
813 |
+
The NVHPC compiler utilizes the same style to translate
|
814 |
+
both
|
815 |
+
OpenACC
|
816 |
+
and
|
817 |
+
OpenMP
|
818 |
+
codes
|
819 |
+
written
|
820 |
+
in
|
821 |
+
C/C++/Fortran to PTX, hence supporting any combinations.
|
822 |
+
name
|
823 |
+
Lang
|
824 |
+
Shuffle/Load
|
825 |
+
Delta
|
826 |
+
Analysis
|
827 |
+
divergence
|
828 |
+
C
|
829 |
+
1 / 6
|
830 |
+
2.00
|
831 |
+
4.281s
|
832 |
+
gameoflife
|
833 |
+
C
|
834 |
+
6 / 9
|
835 |
+
1.50
|
836 |
+
3.470s
|
837 |
+
gaussblur
|
838 |
+
C
|
839 |
+
20 / 25
|
840 |
+
2.50
|
841 |
+
7.938s
|
842 |
+
gradient
|
843 |
+
C
|
844 |
+
1 / 6
|
845 |
+
2.00
|
846 |
+
4.668s
|
847 |
+
jacobi
|
848 |
+
F
|
849 |
+
6 / 9
|
850 |
+
1.50
|
851 |
+
4.119s
|
852 |
+
lapgsrb
|
853 |
+
C
|
854 |
+
12 / 25
|
855 |
+
1.83
|
856 |
+
14.296s
|
857 |
+
laplacian
|
858 |
+
C
|
859 |
+
2 / 7
|
860 |
+
1.50
|
861 |
+
4.816s
|
862 |
+
matmul
|
863 |
+
F
|
864 |
+
0 / 8
|
865 |
+
-
|
866 |
+
13.971s
|
867 |
+
matvec
|
868 |
+
C
|
869 |
+
0 / 7
|
870 |
+
-
|
871 |
+
4.929s
|
872 |
+
sincos
|
873 |
+
F
|
874 |
+
0 / 2
|
875 |
+
-
|
876 |
+
1m41.424s
|
877 |
+
tricubic
|
878 |
+
C
|
879 |
+
48 / 67
|
880 |
+
2.00
|
881 |
+
1m39.476s
|
882 |
+
tricubic2
|
883 |
+
C
|
884 |
+
48 / 67
|
885 |
+
2.00
|
886 |
+
1m41.855s
|
887 |
+
uxx1
|
888 |
+
C
|
889 |
+
3 / 17
|
890 |
+
2.00
|
891 |
+
7.466s
|
892 |
+
vecadd
|
893 |
+
C
|
894 |
+
0 / 2
|
895 |
+
-
|
896 |
+
3.281s
|
897 |
+
wave13pt
|
898 |
+
C
|
899 |
+
4 / 14
|
900 |
+
2.50
|
901 |
+
6.967s
|
902 |
+
whispering
|
903 |
+
C
|
904 |
+
6 / 19
|
905 |
+
0.83
|
906 |
+
6.288s
|
907 |
+
Table 2. The KernelGen benchmark suite. Lang indicates
|
908 |
+
the programming language used (C or Fortran). Shuffle/Load
|
909 |
+
shows the number of shuffles generated among the total
|
910 |
+
number of global-memory loads. Delta is the average shuffle
|
911 |
+
delta. Analysis is the execution time of PTXASW on Intel
|
912 |
+
Core i7-5930K
|
913 |
+
For the evaluation, we use the KernelGen benchmark
|
914 |
+
suite for OpenACC [18], shown in Table 2. Each benchmark
|
915 |
+
applies the operator indicated in the benchmark name, to
|
916 |
+
single or multiple arrays and updates different arrays. The
|
917 |
+
benchmarks gameoflife, gaussblur, jacobi, matmul,
|
918 |
+
matvec and whispering are two-dimensional, whereas
|
919 |
+
others are three-dimensional, both having a parallel loop for
|
920 |
+
each dimension, in which other loops might exist
|
921 |
+
inside—except matvec, which features only one parallel
|
922 |
+
loop. The thread-level parallelism is assigned to the
|
923 |
+
innermost parallel loop and the thread-block level
|
924 |
+
parallelism to the outermost. We show the total time of
|
925 |
+
running the shuffle-synthesized kernel ten times on Kepler
|
926 |
+
(NVIDIA Tesla K40c with Intel i7-5930K CPU), Maxwell
|
927 |
+
(TITAN X with Intel i7-5930K), Pascal (Tesla P100 PCIE with
|
928 |
+
Intel Xeon E5-2640 v3), and Volta (Tesla V100 SXM2 with
|
929 |
+
IBM POWER9 8335-GTH). We use NVHPC compiler 22.3
|
930 |
+
with CUDA 11.6 at compilation, but due to environmental
|
931 |
+
restrictions,
|
932 |
+
run
|
933 |
+
the
|
934 |
+
programs
|
935 |
+
using
|
936 |
+
CUDA
|
937 |
+
driver
|
938 |
+
11.4/11.4/10.0/10.2
|
939 |
+
for
|
940 |
+
Kepler/Maxwell/Pascal/Volta,
|
941 |
+
respectively. The compiler options in NVHPC are "-O3
|
942 |
+
-acc -ta=nvidia:cc(35|50|60|70),cuda11.6,loadcac
|
943 |
+
he:L1". To fully utilize computation, 2D benchmarks select
|
944 |
+
32768x32768 as their dynamic problem sizes and 3D
|
945 |
+
compute
|
946 |
+
512x1024x1024
|
947 |
+
grids,
|
948 |
+
except
|
949 |
+
uxx1,
|
950 |
+
which
|
951 |
+
leverages 512x512x1024 datasets and whispering, where
|
952 |
+
more buffers are allocated, computing over 8192x16384 data
|
953 |
+
elements. To assess a performance breakdown, we prepare
|
954 |
+
two other versions of PTXASW: NO LOAD and NO
|
955 |
+
CORNER. The former eliminates loads that are covered by
|
956 |
+
|
957 |
+
CC ’23, February 25–26, 2023, Montréal, QC, Canada
|
958 |
+
K. Matsumura, S. G. De Gonzalo, A. J. Peña
|
959 |
+
shuffles, whereas the latter only executes shuffles instead of
|
960 |
+
original loads, without the support of corner cases.
|
961 |
+
The shuffle synthesis fails on four benchmarks. In
|
962 |
+
matmul and matvec, the innermost sequential loop
|
963 |
+
contains loads, but these do not have neighboring accesses
|
964 |
+
along the dimension of the thread ID. The benchmarks
|
965 |
+
sincos and vecadd do not have several loads sharing the
|
966 |
+
same input array.
|
967 |
+
7
|
968 |
+
Evaluation
|
969 |
+
Figure 2 shows the speed-ups of benchmarks on each GPU
|
970 |
+
with original code and PTXASW-generated code along with
|
971 |
+
the NO LOAD and NO CORNER versions. The line plots
|
972 |
+
provide the SM occupancy of each benchmark. Since there
|
973 |
+
is no resource change other than the register use from the
|
974 |
+
original execution, the occupancy rate is directly affected by
|
975 |
+
the number of registers. The performance improvement on
|
976 |
+
Kepler/Maxwell/Pascal/Volta is confirmed with 7/6/9/4
|
977 |
+
benchmarks
|
978 |
+
showing
|
979 |
+
up
|
980 |
+
to
|
981 |
+
16.9%/132.3%/9.1%/14.7%
|
982 |
+
performance
|
983 |
+
improvement,
|
984 |
+
respectively.
|
985 |
+
We
|
986 |
+
see
|
987 |
+
performance degradation with Volta in the case where more
|
988 |
+
than ten shuffles are generated. Other GPUs mostly gain
|
989 |
+
better performance with such cases. With increased shuffle
|
990 |
+
deltas, more corner cases are expected. Volta shows optimal
|
991 |
+
efficiency when 𝑁 ⩽ 1.5, while other GPUs benefit from the
|
992 |
+
case of 𝑁 = 2.5. For example, Maxwell attains the best
|
993 |
+
performance with gaussblur (𝑁 = 2.5), although Volta’s
|
994 |
+
performance drops by half for the same case. The average
|
995 |
+
improvement across all GPU generations is -3.3%/10.9%/
|
996 |
+
1.8%/-15.2% for Kepler/Maxwell/Pascal/Volta, respectively.
|
997 |
+
Overall, the performance improvement by PTXASW is
|
998 |
+
found when NO LOAD and NO CORNER have sufficiently
|
999 |
+
better performance compared to the original and when the
|
1000 |
+
occupancy typically rises on Kepler/Maxwell and drops on
|
1001 |
+
Pascal/Volta. The average number of additional registers
|
1002 |
+
with NO LOAD/NO CORNER/PTXASW compared to the
|
1003 |
+
original is -6.4/-5.2/2.7 on Kepler, -6.6/-5.9/4.2 on Maxwell,
|
1004 |
+
-7.0/-5.9/3.8 on Pascal, and -6.4/6.8/9.2 on Volta.
|
1005 |
+
8
|
1006 |
+
Analysis
|
1007 |
+
This section provides the performance detail of our shuffle
|
1008 |
+
synthesis on each GPU. Figure 3 shows the ratio of stall
|
1009 |
+
reasons sampled by the profiler for all the benchmarks. Those
|
1010 |
+
characteristics of computation appear as the results of the
|
1011 |
+
program modification (e.g. register use, shuffle delta) and the
|
1012 |
+
architecture difference (e.g. computational efficiency, cache
|
1013 |
+
latency).
|
1014 |
+
8.1
|
1015 |
+
Kepler
|
1016 |
+
The Kepler GPU has long stalls on computational
|
1017 |
+
operations with each benchmark. The average execution
|
1018 |
+
dependency is 24.7% and pipeline busyness is 7.5% with the
|
1019 |
+
original. When we look at the memory-bound benchmarks
|
1020 |
+
such as gameoflife, gaussblur, and tricubic, NO LOAD
|
1021 |
+
significantly reduces the amounts of memory-related stalls.
|
1022 |
+
Especially, tricubic has 56.0 percentage points below
|
1023 |
+
memory throttles from the original to NO LOAD, yielding
|
1024 |
+
2.53x performance. From NO LOAD to NO CORNER, the
|
1025 |
+
execution dependency increases by 4.0 percentage points
|
1026 |
+
and the pipeline busyness decreases by 1.6 percentage
|
1027 |
+
points on average. The performance degradation at NO
|
1028 |
+
CORNER with the memory-bound benchmarks is observed
|
1029 |
+
with the latency of the pipelines and the wait for the SM
|
1030 |
+
scheduler. PTXASW suffers from memory throttling and
|
1031 |
+
additional computation for the corner cases, which limit the
|
1032 |
+
improvement up to 16.9%.
|
1033 |
+
The memory throttling and the additional computation
|
1034 |
+
bottlenecks suffered by PTXASW may be hidden if the
|
1035 |
+
shuffle operations reduce the original computation and
|
1036 |
+
communication into just one transfer among threads,
|
1037 |
+
functioning as a warp-level cache. Otherwise, there is a
|
1038 |
+
need to face a trade-off between the redundancy of
|
1039 |
+
operations and the efficiency on the architecture. On Kepler,
|
1040 |
+
both heavy computation and memory requests are imposed
|
1041 |
+
by the corner case. Therefore, in the general use of shuffles,
|
1042 |
+
the uniformity of calculation is crucial and it requires
|
1043 |
+
domain-specific knowledge.
|
1044 |
+
8.2
|
1045 |
+
Maxwell
|
1046 |
+
There are two obvious compute-bound benchmarks:
|
1047 |
+
gameoflife and tricubic. For these, no improvement is
|
1048 |
+
perceived with NO LOAD, and there are no particular
|
1049 |
+
changes in occupancy or stalls throughout the four different
|
1050 |
+
versions. In summary, gameoflife experiences -0.1%/5.7%/
|
1051 |
+
6.2% lower performance and tricubic shows -1.6%/7.7%/
|
1052 |
+
15.4% lower performance with NO LOAD/NO CORNER/
|
1053 |
+
PTXASW, respectively, compared to the original version. In
|
1054 |
+
other cases, memory dependency is dominant. However, the
|
1055 |
+
merit of NO LOAD is limited to gaussblur and lapgsrb,
|
1056 |
+
which
|
1057 |
+
experience
|
1058 |
+
large
|
1059 |
+
texture-memory
|
1060 |
+
latency
|
1061 |
+
of
|
1062 |
+
read-only cache loads, successfully replaced with shuffles by
|
1063 |
+
PTXASW. The texture stall was reduced from 47.5% to 5.3%
|
1064 |
+
in gaussblur and from 23.0% to 0.1% in lapgsrb from the
|
1065 |
+
original to PTXASW, attaining 132.2% and 36.9% higher
|
1066 |
+
throughput. Other benchmarks do not feature stalls that
|
1067 |
+
allow for clear performance improvement by NO LOAD. As
|
1068 |
+
it can be observed in Figure 3, the memory dependency
|
1069 |
+
stalls are maintained for most benchmarks, except for that
|
1070 |
+
of tricubic2, which shows 32.9 percentage points lower
|
1071 |
+
memory dependency and only 14.3% overall improvement
|
1072 |
+
with NO LOAD. Those values are mostly absorbed by the
|
1073 |
+
corner cases.
|
1074 |
+
On the Maxwell GPU, only the texture stalls are
|
1075 |
+
improvable for efficiency in the tested cases. Since we
|
1076 |
+
observe a moderate overhead of the corner cases, our
|
1077 |
+
synthesis tool may enhance the overall performance. The
|
1078 |
+
memory-dependency stalls work as a good indicator of the
|
1079 |
+
memory utilization. If, in addition, a high execution
|
1080 |
+
|
1081 |
+
A Symbolic Emulator for Shuffle Synthesis on the NVIDIA PTX Code
|
1082 |
+
CC ’23, February 25–26, 2023, Montréal, QC, Canada
|
1083 |
+
0.0
|
1084 |
+
1.0
|
1085 |
+
2.0
|
1086 |
+
3.0
|
1087 |
+
4.0
|
1088 |
+
Speed-up
|
1089 |
+
Kepler
|
1090 |
+
0.00
|
1091 |
+
0.25
|
1092 |
+
0.50
|
1093 |
+
0.75
|
1094 |
+
1.00
|
1095 |
+
Occupancy
|
1096 |
+
0.0
|
1097 |
+
1.0
|
1098 |
+
2.0
|
1099 |
+
3.0
|
1100 |
+
4.0
|
1101 |
+
Maxwell
|
1102 |
+
0.00
|
1103 |
+
0.25
|
1104 |
+
0.50
|
1105 |
+
0.75
|
1106 |
+
1.00
|
1107 |
+
0.0
|
1108 |
+
0.5
|
1109 |
+
1.0
|
1110 |
+
1.5
|
1111 |
+
2.0
|
1112 |
+
Pascal
|
1113 |
+
0.00
|
1114 |
+
0.25
|
1115 |
+
0.50
|
1116 |
+
0.75
|
1117 |
+
1.00
|
1118 |
+
0.0
|
1119 |
+
0.5
|
1120 |
+
1.0
|
1121 |
+
1.5
|
1122 |
+
Volta
|
1123 |
+
0.00
|
1124 |
+
0.33
|
1125 |
+
0.66
|
1126 |
+
1.00
|
1127 |
+
divergence
|
1128 |
+
gameoflife
|
1129 |
+
gaussblur
|
1130 |
+
gradient
|
1131 |
+
jacobi
|
1132 |
+
lapgsrb
|
1133 |
+
laplacian
|
1134 |
+
tricubic
|
1135 |
+
tricubic2uxx1
|
1136 |
+
wave13pt
|
1137 |
+
whispering
|
1138 |
+
Kepler
|
1139 |
+
−0.05
|
1140 |
+
0.00
|
1141 |
+
0.05
|
1142 |
+
Original
|
1143 |
+
NO LOAD
|
1144 |
+
NO CORNER
|
1145 |
+
PTXASW
|
1146 |
+
Figure 2. Speed-up compared to Original. NO LOAD/NO
|
1147 |
+
CORNER produce invalid results
|
1148 |
+
dependency would exist, it would provide the warp-level
|
1149 |
+
shuffle optimization the opportunity to be beneficial to
|
1150 |
+
speed up the computation.
|
1151 |
+
8.3
|
1152 |
+
Pascal
|
1153 |
+
Even more than in Maxwell, texture stalls are found in most
|
1154 |
+
benchmarks and those produce higher throughput with NO
|
1155 |
+
LOAD.
|
1156 |
+
Especially,
|
1157 |
+
gameoflife
|
1158 |
+
and
|
1159 |
+
tricubic,
|
1160 |
+
the
|
1161 |
+
compute-bound kernels on Maxwell, become memory
|
1162 |
+
intensive on Pascal and the performance increases by 5.9%
|
1163 |
+
and 5.4% with PTXASW. The unspecific latency ("Other")
|
1164 |
+
fills many parts of computation on Pascal. Further
|
1165 |
+
investigation shows that this mainly consists of the latency
|
1166 |
+
from register bank conflicts and the instructions after
|
1167 |
+
branching. With the optimization adding a predicate to
|
1168 |
+
check the activeness of the warp (@!incomplete) before the
|
1169 |
+
shuffle and generating a uniform branch, the ratio of this
|
1170 |
+
latency improves from 34.4% to 8.6% with PTXASW at
|
1171 |
+
gameoflife, obtaining 150.8% efficiency compared to the
|
1172 |
+
original. However, as mentioned in Section 5.2, it decreases
|
1173 |
+
the average relative execution time to 0.88x slowdown.
|
1174 |
+
Since the latency of the L1 cache is higher than that of
|
1175 |
+
one shuffle operation, the computation may be hidden by
|
1176 |
+
data transfers. Once the memory-dependency stall ratio
|
1177 |
+
0
|
1178 |
+
25
|
1179 |
+
50
|
1180 |
+
75
|
1181 |
+
100
|
1182 |
+
Stall (%)
|
1183 |
+
Kepler
|
1184 |
+
0
|
1185 |
+
25
|
1186 |
+
50
|
1187 |
+
75
|
1188 |
+
100
|
1189 |
+
Maxwell
|
1190 |
+
0
|
1191 |
+
25
|
1192 |
+
50
|
1193 |
+
75
|
1194 |
+
100
|
1195 |
+
Pascal
|
1196 |
+
0
|
1197 |
+
25
|
1198 |
+
50
|
1199 |
+
75
|
1200 |
+
100
|
1201 |
+
Volta
|
1202 |
+
divergence
|
1203 |
+
gameoflife
|
1204 |
+
gaussblur
|
1205 |
+
gradient
|
1206 |
+
jacobi
|
1207 |
+
lapgsrb
|
1208 |
+
laplacian
|
1209 |
+
tricubic
|
1210 |
+
tricubic2
|
1211 |
+
uxx1
|
1212 |
+
wave13pt
|
1213 |
+
whispering
|
1214 |
+
0.00
|
1215 |
+
−0.05
|
1216 |
+
0.00
|
1217 |
+
0.05
|
1218 |
+
Mem Dep
|
1219 |
+
Inst Fetch
|
1220 |
+
Mem Throtle
|
1221 |
+
Not Selected
|
1222 |
+
Exec Dep
|
1223 |
+
Texture
|
1224 |
+
Pipe Busy
|
1225 |
+
Other
|
1226 |
+
Figure 3. Stall breakdown in the order of Original/NO
|
1227 |
+
LOAD/NO CORNER/PTXASW from left to right for each
|
1228 |
+
benchmark
|
1229 |
+
increases due to replacing the texture stalls, Pascal may
|
1230 |
+
maintain the efficiency with the corner cases, resulting in
|
1231 |
+
speed-up in nine benchmarks. For shuffle instructions to be
|
1232 |
+
beneficial, the execution should be less divergent and
|
1233 |
+
careful register allocation is recommended to maximize the
|
1234 |
+
thread utilization.
|
1235 |
+
8.4
|
1236 |
+
Volta
|
1237 |
+
On Volta, most benchmarks become memory-bound and
|
1238 |
+
memory-intensive applications become sensitive to memory
|
1239 |
+
throttles. Nevertheless, the speed-up by NO LOAD is
|
1240 |
+
limited to up to 1.35x (gameoflife), due to the highly
|
1241 |
+
efficient cache mechanism. As argued in Section 7, some of
|
1242 |
+
the benchmarks attain higher performance with NO
|
1243 |
+
CORNER than in the case of NO LOAD for the lower
|
1244 |
+
occupancy. Other than that, we observe performance
|
1245 |
+
degradation due to increased execution dependency for
|
1246 |
+
lapgsrb and tricubic with NO CORNER. Those further
|
1247 |
+
reduce the efficiency with PTXASW while featuring stalls
|
1248 |
+
for instruction fetching. Also, the memory dependency of
|
1249 |
+
tricubic develops a large latency for memory accesses with
|
1250 |
+
PTXASW even though the corner cases experience fewer
|
1251 |
+
loads. This leads to unstable speed-ups between 0.315x and
|
1252 |
+
1.15x.
|
1253 |
+
The calculation through shuffles is expected to be
|
1254 |
+
effective depending on the utilization of communication,
|
1255 |
+
and the nonentity of warp divergence. Especially, as Volta
|
1256 |
+
|
1257 |
+
CC ’23, February 25–26, 2023, Montréal, QC, Canada
|
1258 |
+
K. Matsumura, S. G. De Gonzalo, A. J. Peña
|
1259 |
+
shows minimal latency at each operation, the penalty of
|
1260 |
+
non-aligned computation becomes apparent and must be
|
1261 |
+
avoided by the algorithm.
|
1262 |
+
8.5
|
1263 |
+
Application Example
|
1264 |
+
We also apply PTXASW for the compilation of CUDA
|
1265 |
+
benchmarks extracted from applications. We select three
|
1266 |
+
benchmarks that appeared as complex 3D stencil operations
|
1267 |
+
in [27]: hypterm, rhs4th3fort, and derivative, to run on
|
1268 |
+
the Pascal GPU. hypterm is a routine from a compressible
|
1269 |
+
Navier-Stokes mini-app [1]. rhs4th3fort and derivative
|
1270 |
+
are
|
1271 |
+
stencils
|
1272 |
+
from
|
1273 |
+
geodynamics
|
1274 |
+
seismic
|
1275 |
+
wave
|
1276 |
+
SW4
|
1277 |
+
application code [2]. Each thread in the benchmarks
|
1278 |
+
accesses
|
1279 |
+
152/179/166
|
1280 |
+
elements
|
1281 |
+
over
|
1282 |
+
13/7/10
|
1283 |
+
arrays,
|
1284 |
+
respectively. We modify the execution parameters to
|
1285 |
+
execute at least 32 threads along the leading thread-block
|
1286 |
+
dimension and use the float data type. Since we saw in the
|
1287 |
+
prior section the overhead of long-distance shuffles, which
|
1288 |
+
generate many corner cases, we limited the shuffle synthesis
|
1289 |
+
to be |𝑁 | ⩽ 1 and found shuffles only with |𝑁 | = 1.
|
1290 |
+
hypterms contains three kernels that work along
|
1291 |
+
different dimensions. In the kernel for the leading
|
1292 |
+
dimension, 12 shuffles are generated over 48 loads,
|
1293 |
+
producing
|
1294 |
+
0.48%
|
1295 |
+
improvement.
|
1296 |
+
rhs4th3fort
|
1297 |
+
and
|
1298 |
+
derivative feature a single kernel each. rhs4th3fort
|
1299 |
+
experiences 2.49% higher throughput by PTXASW while
|
1300 |
+
placing 44 shuffles among 179 loads. For derivative, having
|
1301 |
+
52 shuffles from 166 loads, PTXASW attains 3.79% speed-up
|
1302 |
+
compared to the original execution.
|
1303 |
+
9
|
1304 |
+
Related Work
|
1305 |
+
Ever since warp-shuffle instructions were introduced during
|
1306 |
+
the Kepler generation of GPUs, these have been the subject of
|
1307 |
+
various lines of research. Early work described their manual
|
1308 |
+
use for specific computational patterns such as reduction
|
1309 |
+
operations [17] and matrix transposition [6]. Other research
|
1310 |
+
described the use of warp-shuffle instructions in the context
|
1311 |
+
of domain-specific optimizations such as employing them
|
1312 |
+
as a register cache for stencil operations [5], or to replace
|
1313 |
+
memory access for Finite Binary Field applications [5].
|
1314 |
+
Research on the automatic generation of warp-shuffle
|
1315 |
+
instructions has been explored. Swizzle Inventor [25] helps
|
1316 |
+
programmers implement swizzle optimizations that map a
|
1317 |
+
high-level "program sketch" to low-level resources such as
|
1318 |
+
shuffle operations. The authors meticulously design the
|
1319 |
+
abstraction of shuffles, synthesize actual code roughly based
|
1320 |
+
on algorithms found in previous literature, and attain
|
1321 |
+
enhanced performance while reducing the amounts of
|
1322 |
+
computation. Tangram, a high-level kernel synthesis
|
1323 |
+
framework, has also shown the ability to automatically
|
1324 |
+
generate warp-level primitives [13]. Unlike the work
|
1325 |
+
presented in this paper, both of the above-mentioned efforts
|
1326 |
+
leverage domain-specific information to map computational
|
1327 |
+
patterns
|
1328 |
+
such
|
1329 |
+
as
|
1330 |
+
stencil,
|
1331 |
+
matrix
|
1332 |
+
transposition,
|
1333 |
+
and
|
1334 |
+
reductions to shuffle operations.
|
1335 |
+
Recent code-generation techniques allow for obtaining
|
1336 |
+
optimal SIMD code generation. Cowan et al. [8] generate
|
1337 |
+
program sketches for execution on ARM processors, by
|
1338 |
+
synthesizing additional instructions, as well as input/output
|
1339 |
+
registers, to implement the shortest possible SIMD code of
|
1340 |
+
reduction. Unlike PTXASW, which uses an SMT solver to
|
1341 |
+
find the optimal shuffle deltas,
|
1342 |
+
this work runs a
|
1343 |
+
comprehensive search of multiple possible code versions;
|
1344 |
+
thus, the search space is exponential to the number of
|
1345 |
+
instructions. VanHattum et al. [31] attain faster execution
|
1346 |
+
on digital signal processors while employing equality
|
1347 |
+
saturation [28], a modern way of optimization that
|
1348 |
+
generates possible code as much as possible from a basic
|
1349 |
+
program according to the rules of term rewriting. They
|
1350 |
+
derive shuffles along with vector I/O and computation from
|
1351 |
+
sequential C code. Their intermediate code contains
|
1352 |
+
instructions in one nested expression and the shuffle
|
1353 |
+
operation only works for memory loads that appear as
|
1354 |
+
arguments of the same vector operation. Therefore, the
|
1355 |
+
code rewriting for shuffles assumes a top-down style where
|
1356 |
+
outer expressions have to be vectorized first, in order to
|
1357 |
+
vectorize inner expressions containing shuffled loads. While
|
1358 |
+
their technique may provide a powerful method to the
|
1359 |
+
implementation of libraries, irregular patterns such as
|
1360 |
+
corner cases found in HPC applications are out of scope.
|
1361 |
+
10
|
1362 |
+
Conclusion
|
1363 |
+
This paper introduces symbolic emulation to compiling
|
1364 |
+
GPU code in order to discover hidden opportunities for
|
1365 |
+
optimization. We employ several languages, enabling
|
1366 |
+
OpenACC directives such as in C and Fortran, for the
|
1367 |
+
frontend to generate GPU assembly code. Then, our tool
|
1368 |
+
emulates the code upon symbols that substitute dynamic
|
1369 |
+
information. While pruning control flows to reduce the
|
1370 |
+
emulation time, we automatically find possible warp-level
|
1371 |
+
shuffles that may be synthesized to assembly code to bypass
|
1372 |
+
global-memory accesses. We apply this technique to a
|
1373 |
+
benchmark suite and complex application code showing
|
1374 |
+
results that improve multiple benchmarks on several
|
1375 |
+
generations of GPUs. We also provide the latency analysis
|
1376 |
+
across multiple GPUs to identify the use case of shuffles.
|
1377 |
+
Acknowledgement
|
1378 |
+
We are funded by the EPEEC project from the European
|
1379 |
+
Union’s Horizon 2020 research and innovation program
|
1380 |
+
under grant agreement No. 801051 and the Ministerio de
|
1381 |
+
Ciencia e Innovación—Agencia Estatal de Investigación
|
1382 |
+
(PID2019-107255GB-C21/AEI/10.13039/501100011033). This
|
1383 |
+
work has been partially carried out on the ACME cluster
|
1384 |
+
owned by CIEMAT and funded by the Spanish Ministry of
|
1385 |
+
Economy
|
1386 |
+
and
|
1387 |
+
Competitiveness
|
1388 |
+
project
|
1389 |
+
CODEC-OSE
|
1390 |
+
(RTI2018-096006-B-I00).
|
1391 |
+
|
1392 |
+
A Symbolic Emulator for Shuffle Synthesis on the NVIDIA PTX Code
|
1393 |
+
CC ’23, February 25–26, 2023, Montréal, QC, Canada
|
1394 |
+
References
|
1395 |
+
[1] ExaCT 2013. 2013.
|
1396 |
+
ExaCT: Center for Exascale Simulation of
|
1397 |
+
Combustion in Turbulence: Proxy App Software.
|
1398 |
+
http://www.
|
1399 |
+
exactcodesign.org/proxy-app-software/
|
1400 |
+
[2] SW4 2014. 2014. Seismic Wave Modelling (SW4) - Computational
|
1401 |
+
Infrastructure for Geodynamics. https://geodynamics.org/resources/
|
1402 |
+
sw4
|
1403 |
+
[3] The OpenMP ARB. 1997. OpenMP. https://www.openmp.org/
|
1404 |
+
[4] Roberto Baldoni, Emilio Coppa, Daniele Cono D’elia, Camil
|
1405 |
+
Demetrescu, and Irene Finocchi. 2018. A survey of symbolic execution
|
1406 |
+
techniques. ACM Comput. Surv. 51, 3, Article 50 (may 2018), 39 pages.
|
1407 |
+
https://doi.org/10.1145/3182657
|
1408 |
+
[5] Eli Ben-Sasson, Matan Hamilis, Mark Silberstein, and Eran Tromer.
|
1409 |
+
2016. Fast multiplication in binary fields on GPUs via register cache.
|
1410 |
+
In Proceedings of the 2016 International Conference on Supercomputing
|
1411 |
+
(ICS ’16). Association for Computing Machinery, New York, NY, USA,
|
1412 |
+
Article 35, 12 pages. https://doi.org/10.1145/2925426.2926259
|
1413 |
+
[6] Bryan Catanzaro, Alexander Keller, and Michael Garland. 2014. A
|
1414 |
+
decomposition for in-place matrix transposition. In Proceedings of the
|
1415 |
+
19th ACM SIGPLAN Symposium on Principles and Practice of Parallel
|
1416 |
+
Programming (PPoPP ’14). Association for Computing Machinery, New
|
1417 |
+
York, NY, USA, 193–206. https://doi.org/10.1145/2555243.2555253
|
1418 |
+
[7] Peng Chen, Mohamed Wahib, Shinichiro Takizawa, Ryousei Takano,
|
1419 |
+
and Satoshi Matsuoka. 2019. A versatile software systolic execution
|
1420 |
+
model for GPU memory-bound kernels. In Proceedings of the
|
1421 |
+
International Conference for High Performance Computing, Networking,
|
1422 |
+
Storage and Analysis (SC ’19). Association for Computing Machinery,
|
1423 |
+
New York, NY, USA, Article 53, 81 pages.
|
1424 |
+
https://doi.org/10.1145/
|
1425 |
+
3295500.3356162
|
1426 |
+
[8] Meghan Cowan, Thierry Moreau, Tianqi Chen, James Bornholt, and
|
1427 |
+
Luis Ceze. 2020. Automatic generation of high-performance quantized
|
1428 |
+
machine learning kernels. Association for Computing Machinery, New
|
1429 |
+
York, NY, USA, 305–316. https://doi.org/10.1145/3368826.3377912
|
1430 |
+
[9] Leonardo de Moura and Nikolaj Bjørner. 2008. Z3: An efficient SMT
|
1431 |
+
solver. In Tools and Algorithms for the Construction and Analysis of
|
1432 |
+
Systems. Springer Berlin Heidelberg, Berlin, Heidelberg, 337–340.
|
1433 |
+
[10] Robert van Engelen. 2000. Symbolic evaluation of chains of recurrences
|
1434 |
+
for loop optimization. Technical Report TR-000102. Computer Science
|
1435 |
+
Dept., Florida State University.
|
1436 |
+
[11] Robert van Engelen. 2001. Efficients symbolic analysis for optimizing
|
1437 |
+
compilers. In Proceedings of the 10th International Conference on
|
1438 |
+
Compiler Construction (CC ’01). Springer-Verlag, Berlin, Heidelberg,
|
1439 |
+
118–132.
|
1440 |
+
[12] Philip Ginsbach, Toomas Remmelg, Michel Steuwer, Bruno Bodin,
|
1441 |
+
Christophe Dubach, and Michael F. P. O’Boyle. 2018.
|
1442 |
+
Automatic
|
1443 |
+
matching of legacy code to heterogeneous APIs: An idiomatic approach.
|
1444 |
+
Association for Computing Machinery, New York, NY, USA, 139–153.
|
1445 |
+
https://doi.org/10.1145/3173162.3173182
|
1446 |
+
[13] Simon Garcia De Gonzalo, Sitao Huang, Juan Gómez-Luna, Simon
|
1447 |
+
Hammond, Onur Mutlu, and Wen-mei Hwu. 2019.
|
1448 |
+
Automatic
|
1449 |
+
generation of warp-level primitives and atomic instructions for fast and
|
1450 |
+
portable parallel reduction on GPUs. In 2019 IEEE/ACM International
|
1451 |
+
Symposium on Code Generation and Optimization (CGO). 73–84. https:
|
1452 |
+
//doi.org/10.1109/CGO.2019.8661187
|
1453 |
+
[14] Tobias Grosser, Armin Groesslinger, and Christian Lengauer.
|
1454 |
+
2012.
|
1455 |
+
Polly — Performing polyhedral optimizations on a low-
|
1456 |
+
level intermediate representation.
|
1457 |
+
Parallel Processing Letters 22,
|
1458 |
+
04 (2012), 1250010.
|
1459 |
+
https://doi.org/10.1142/S0129626412500107
|
1460 |
+
arXiv:https://doi.org/10.1142/S0129626412500107
|
1461 |
+
[15] Arpith Chacko Jacob, Alexandre E Eichenberger, Hyojin Sung,
|
1462 |
+
Samuel F Antao, Gheorghe-Teodor Bercea, Carlo Bertolli, Alexey
|
1463 |
+
Bataev, Tian Jin, Tong Chen, Zehra Sura, Georgios Rokos, and Kevin
|
1464 |
+
O’Brien. 2017. Efficient fork-join on GPUs through warp specialization.
|
1465 |
+
In 2017 IEEE 24th International Conference on High Performance
|
1466 |
+
Computing (HiPC). 358–367. https://doi.org/10.1109/HiPC.2017.00048
|
1467 |
+
[16] Zhe Jia, Marco Maggioni, Benjamin Staiger, and Daniele P. Scarpazza.
|
1468 |
+
2018.
|
1469 |
+
Dissecting the NVIDIA Volta GPU architecture via
|
1470 |
+
microbenchmarking. https://doi.org/10.48550/ARXIV.1804.06826
|
1471 |
+
[17] Justin Luitjens. 2014. Faster parallel reductions on Kepler.
|
1472 |
+
https:
|
1473 |
+
//developer.nvidia.com/blog/faster-parallel-reductions-kepler/
|
1474 |
+
[18] Dmitry Mikushin, Nikolay Likhogrud, Eddy Z. Zhang, and Christopher
|
1475 |
+
Bergström. 2014. KernelGen – The design and implementation of a
|
1476 |
+
next generation compiler platform for accelerating numerical models
|
1477 |
+
on GPUs. In 2014 IEEE International Parallel Distributed Processing
|
1478 |
+
Symposium Workshops. 1011–1020. https://doi.org/10.1109/IPDPSW.
|
1479 |
+
2014.115
|
1480 |
+
[19] G. E. Moore. 1998. Cramming more components onto integrated
|
1481 |
+
circuits. Proc. IEEE 86, 1 (Jan 1998), 82–85. https://doi.org/10.1109/
|
1482 |
+
JPROC.1998.658762
|
1483 |
+
[20] NVIDIA Corporation. 2022. High Performance Computing (HPC) SDK
|
1484 |
+
| NVIDIA. https://developer.nvidia.com/hpc-sdk
|
1485 |
+
[21] NVIDIA Corporation. 2022. Kepler Tuning Guide :: CUDA Toolkit
|
1486 |
+
Documentation. https://docs.nvidia.com/cuda/kepler-tuning-guide/
|
1487 |
+
index.html
|
1488 |
+
[22] NVIDIA Corporation. 2022. Programming Guide :: CUDA Toolkit
|
1489 |
+
Documentation. https://docs.nvidia.com/cuda/cuda-c-programming-
|
1490 |
+
guide/index.html
|
1491 |
+
[23] NVIDIA Corporation. 2022. PTX ISA :: CUDA Toolkit Documentation.
|
1492 |
+
https://docs.nvidia.com/cuda/parallel-thread-execution/index.html
|
1493 |
+
[24] The OpenACC Organization. 2011. OpenACC. https://www.openacc.
|
1494 |
+
org/
|
1495 |
+
[25] Phitchaya Mangpo Phothilimthana, Archibald Samuel Elliott, An
|
1496 |
+
Wang, Abhinav Jangda, Bastian Hagedorn, Henrik Barthels, Samuel J.
|
1497 |
+
Kaufman, Vinod Grover, Emina Torlak, and Rastislav Bodik. 2019.
|
1498 |
+
Swizzle Inventor: Data movement synthesis for GPU kernels.
|
1499 |
+
In Proceedings of the Twenty-Fourth International Conference on
|
1500 |
+
Architectural Support for Programming Languages and Operating
|
1501 |
+
Systems (ASPLOS ’19). Association for Computing Machinery, New
|
1502 |
+
York, NY, USA, 65–78. https://doi.org/10.1145/3297858.3304059
|
1503 |
+
[26] Jonathan Ragan-Kelley, Connelly Barnes, Andrew Adams, Sylvain
|
1504 |
+
Paris, Frédo Durand, and Saman Amarasinghe. 2013.
|
1505 |
+
Halide: A
|
1506 |
+
language and compiler for optimizing parallelism, locality, and
|
1507 |
+
recomputation in image processing pipelines. In Proceedings of the
|
1508 |
+
34th ACM SIGPLAN Conference on Programming Language Design and
|
1509 |
+
Implementation (PLDI ’13). Association for Computing Machinery, New
|
1510 |
+
York, NY, USA, 519–530. https://doi.org/10.1145/2491956.2462176
|
1511 |
+
[27] Prashant Singh Rawat, Fabrice Rastello, Aravind Sukumaran-Rajam,
|
1512 |
+
Louis-Noël Pouchet, Atanas Rountev, and P. Sadayappan. 2018.
|
1513 |
+
Register Optimizations for Stencils on GPUs. In Proceedings of the
|
1514 |
+
23rd ACM SIGPLAN Symposium on Principles and Practice of Parallel
|
1515 |
+
Programming (PPoPP ’18). Association for Computing Machinery, New
|
1516 |
+
York, NY, USA, 168–182. https://doi.org/10.1145/3178487.3178500
|
1517 |
+
[28] Ross Tate, Michael Stepp, Zachary Tatlock, and Sorin Lerner. 2009.
|
1518 |
+
Equality Saturation: A new approach to optimization. In Proceedings
|
1519 |
+
of the 36th Annual ACM SIGPLAN-SIGACT Symposium on Principles
|
1520 |
+
of Programming Languages (POPL ’09). Association for Computing
|
1521 |
+
Machinery, New York, NY, USA, 264–276.
|
1522 |
+
https://doi.org/10.1145/
|
1523 |
+
1480881.1480915
|
1524 |
+
[29] TOP500.org. 2022. November 2022 | TOP500.
|
1525 |
+
https://www.top500.
|
1526 |
+
org/lists/top500/2021/11/
|
1527 |
+
[30] Emina Torlak and Rastislav Bodik. 2013.
|
1528 |
+
Growing solver-aided
|
1529 |
+
languages with Rosette. In Proceedings of the 2013 ACM International
|
1530 |
+
Symposium on New Ideas, New Paradigms, and Reflections on
|
1531 |
+
Programming & Software (Onward! 2013). Association for Computing
|
1532 |
+
Machinery, New York, NY, USA, 135–152.
|
1533 |
+
https://doi.org/10.1145/
|
1534 |
+
2509578.2509586
|
1535 |
+
[31] Alexa VanHattum, Rachit Nigam, Vincent T. Lee, James Bornholt, and
|
1536 |
+
Adrian Sampson. 2021. Vectorization for Digital Signal Processors
|
1537 |
+
via Equality Saturation (ASPLOS 2021). Association for Computing
|
1538 |
+
|
1539 |
+
CC ’23, February 25–26, 2023, Montréal, QC, Canada
|
1540 |
+
K. Matsumura, S. G. De Gonzalo, A. J. Peña
|
1541 |
+
Machinery, New York, NY, USA, 874–886.
|
1542 |
+
https://doi.org/10.1145/
|
1543 |
+
3445814.3446707
|
1544 |
+
[32] Sven Verdoolaege and Tobias Grosser. 2012. Polyhedral Extraction Tool.
|
1545 |
+
In Second International Workshop on Polyhedral Compilation Techniques
|
1546 |
+
(IMPACT). Paris, France. http://impact.gforge.inria.fr/impact2012/
|
1547 |
+
[33] Henry Wong, Misel-Myrto Papadopoulou, Maryam Sadooghi-Alvandi,
|
1548 |
+
and Andreas Moshovos. 2010. Demystifying GPU microarchitecture
|
1549 |
+
through microbenchmarking. In 2010 IEEE International Symposium
|
1550 |
+
on Performance Analysis of Systems Software (ISPASS). 235–246. https:
|
1551 |
+
//doi.org/10.1109/ISPASS.2010.5452013
|
1552 |
+
[34] Xiaolong Xie, Yun Liang, Xiuhong Li, Yudong Wu, Guangyu Sun,
|
1553 |
+
Tao Wang, and Dongrui Fan. 2015. Enabling coordinated register
|
1554 |
+
allocation and thread-level parallelism optimization for GPUs. In 2015
|
1555 |
+
48th Annual IEEE/ACM International Symposium on Microarchitecture
|
1556 |
+
(MICRO). 395–406. https://doi.org/10.1145/2830772.2830813
|
1557 |
+
[35] Da Yan, Wei Wang, and Xiaowen Chu. 2020. Optimizing batched
|
1558 |
+
Winograd convolution on GPUs. Association for Computing Machinery,
|
1559 |
+
New York, NY, USA, 32–44. https://doi.org/10.1145/3332466.3374520
|
1560 |
+
Received 2022-11-10; accepted 2022-12-19
|
1561 |
+
|
29FIT4oBgHgl3EQf5SvC/content/tmp_files/load_file.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
59FKT4oBgHgl3EQfTC3B/content/2301.11778v1.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:4b4ea09c95151afa7bd60756390caa40f14ea1a23cbc4aa8afd5e678c03d3200
|
3 |
+
size 357586
|
59FKT4oBgHgl3EQfTC3B/vector_store/index.pkl
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:2e3153033b540ee9d4f049541887aa3a85355b349099c4b1653b736cca357ca4
|
3 |
+
size 131400
|
5dE4T4oBgHgl3EQfBQvo/content/2301.04851v1.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:6352d760f10794c0dec28641cee5aa2722b68d04647d999a6354134ea2b5dd46
|
3 |
+
size 1175121
|
5dE4T4oBgHgl3EQfBQvo/vector_store/index.faiss
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:9d20f66dce7f94615c489cb03416e7d0c7973cf2f9f98c688f030d8bcc0d4b2f
|
3 |
+
size 3407917
|
5dE4T4oBgHgl3EQfBQvo/vector_store/index.pkl
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:b820f3ea16a27243baa5c263315cc4915d2e4039fdc35db4bd26765456c35b4b
|
3 |
+
size 116659
|
5tE0T4oBgHgl3EQfvwEb/content/tmp_files/2301.02621v1.pdf.txt
ADDED
@@ -0,0 +1,1217 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
1
|
2 |
+
Deep leakage from gradients
|
3 |
+
Yaqiong Mu
|
4 |
+
College of Information Science and Technology, Donghua University, 201620, Shanghai China
|
5 | |
6 |
+
Abstract. With the development of artificial intelligence technology, Federated Learning (FL)
|
7 |
+
model has been widely used in many industries for its high efficiency and confidentiality. Some
|
8 |
+
researchers have explored its confidentiality and designed some algorithms to attack training data
|
9 |
+
sets, but these algorithms all have their own limitations. Therefore, most people still believe that
|
10 |
+
local machine learning gradient information is safe and reliable. In this paper, an algorithm based on
|
11 |
+
gradient features is designed to attack the federated learning model in order to attract more attention
|
12 |
+
to the security of federated learning systems.
|
13 |
+
In federated learning system, gradient contains little information compared with the original train-
|
14 |
+
ing data set, but this project intends to restore the original training image data through gradient in-
|
15 |
+
formation. Convolutional Neural Network (CNN) has excellent performance in image processing.
|
16 |
+
Therefore, the federated learning model of this project is equipped with Convolutional Neural Net-
|
17 |
+
work structure, and the model is trained by using image data sets. The algorithm calculates the virtual
|
18 |
+
gradient by generating virtual image labels. Then the virtual gradient is matched with the real gradi-
|
19 |
+
ent to restore the original image.
|
20 |
+
This attack algorithm is written in Python language, uses cat and dog classification Kaggle data
|
21 |
+
sets, and gradually extends from the full connection layer to the convolution layer, thus improving
|
22 |
+
the universality. At present, the average squared error between the data recovered by this algorithm
|
23 |
+
and the original image information is approximately 5, and the vast majority of images can be com-
|
24 |
+
pletely restored according to the gradient information given, indicating that the gradient of federated
|
25 |
+
learning system is not absolutely safe and reliable.
|
26 |
+
Keywords: Federated Learning, CNN, reconstruction attack, Gradient feature
|
27 |
+
1
|
28 |
+
Introduction
|
29 |
+
In modern Federated Learning (FL) systems [1-3], model updating by exchanging gra-
|
30 |
+
dient information among multiple participants is a very common approach. The user
|
31 |
+
data of each participant is always stored locally, and only the gradient information is
|
32 |
+
propagated between different models. This type of algorithm does not need to establish
|
33 |
+
a dedicated central node for data processing, which protects the privacy of users and
|
34 |
+
the local model can be fully trained with the help of a federated learning system. For
|
35 |
+
example, medical systems can share the same data model while protecting the patient's
|
36 |
+
private information [4]. Therefore, it is not easy to extract the data information of local
|
37 |
+
models from the gradient, which has long been believed to be able to be propagated
|
38 |
+
among different models without worrying about privacy leakage, but in fact, stealing
|
39 |
+
local information from the gradient is still traceable.
|
40 |
+
With the rapid development of AI technology, federation learning models are in-
|
41 |
+
creasingly used as a fundamental technique in AI technology. Federal learning keeps
|
42 |
+
the data of each participant locally, and the databases of each participant remain inde-
|
43 |
+
pendent of each other during modeling, while the information interaction during joint
|
44 |
+
training is encrypted to ensure the confidentiality and efficiency of the system. In
|
45 |
+
|
46 |
+
2
|
47 |
+
addition, the federated learning system can guarantee that the training effect of the local
|
48 |
+
training model is almost the same as that of the original centralized training model.
|
49 |
+
Nowadays, the development of artificial intelligence and deep learning is rapidly
|
50 |
+
changing, and federated learning solves the problem that data from all parties in the
|
51 |
+
previous centralized model can only be used at the central node, and ensures the privacy
|
52 |
+
and confidentiality of users at each node. Federated learning is suitable for training
|
53 |
+
models with large volumes of data and can be applied in a variety of contexts. Nowa-
|
54 |
+
days, the concept of smart cities has gained widespread attention, and federal learning
|
55 |
+
models have greatly contributed to the construction of smart cities. In terms of economy
|
56 |
+
and finance, it can combine data from various banks to build a model of economic
|
57 |
+
fluctuation, which can better predict the future economy, etc. In terms of politics and
|
58 |
+
people's livelihood, it can build a bridge between governments at all levels and the
|
59 |
+
masses, realize effective information sharing between governments and the masses,
|
60 |
+
build a good platform for communication between the masses and the government, and
|
61 |
+
help various governments to build a good system of people's city built by the people,
|
62 |
+
so that the authorities can do their work more efficiently and the masses can do their
|
63 |
+
work more conveniently, etc. efficient, more convenient for the masses, etc.
|
64 |
+
The high efficiency and confidentiality of the federal learning system make it
|
65 |
+
more and more widely used. However, the confidentiality of the federal model needs
|
66 |
+
to be further explored, and if the data involved in the training can be restored by some
|
67 |
+
means, it proves that the system still needs to be improved. With the continuous pro-
|
68 |
+
gress of artificial intelligence, the protection of Internet privacy has gradually become
|
69 |
+
a hot topic of discussion. By studying the vulnerability of the system, the confidential-
|
70 |
+
ity of the federation learning system is gradually improved, which can also provide
|
71 |
+
some new ideas for the protection of Internet privacy nowadays.
|
72 |
+
This thesis focuses on the gradient information leakage problem in convolutional
|
73 |
+
neural network-based federal learning systems, and explores how to restore the original
|
74 |
+
data image from the gradients containing very little information. After introducing the
|
75 |
+
basic principles, the effect of Deep Leakage from Gradients (DLG) algorithm to restore
|
76 |
+
the original image is studied, and certain improvements are made based on it, and fi-
|
77 |
+
nally the corresponding conclusions are drawn by comparison.
|
78 |
+
The structure of the thesis is as follows: Chapter 1 briefly introduces the research
|
79 |
+
background, status and significance of this thesis, and briefly composes the content to
|
80 |
+
be studied in this thesis. Chapter 2 briefly introduces the federal learning system, the
|
81 |
+
structure, functions and common models of CNN, and some attack algorithms against
|
82 |
+
the federal learning system. Chapter 3 mainly introduces the general principle of local
|
83 |
+
information leakage, and the working principle and derivation process of DLG algo-
|
84 |
+
rithm. Chapter 4 mainly shows the implementation of the depth gradient algorithm,
|
85 |
+
analyzes the shortcomings of the algorithm, proposes improvement methods and com-
|
86 |
+
pares them. Chapter 5 mainly integrates and summarizes the research content of this
|
87 |
+
topic, presents the shortcomings and areas for improvement, and provides an outlook
|
88 |
+
for the gradient attack algorithm for FL.
|
89 |
+
|
90 |
+
3
|
91 |
+
2
|
92 |
+
Related Technologies
|
93 |
+
This section introduces the basic concepts and related techniques needed to under-
|
94 |
+
stand the reconstruction attack based on gradient features, including the introduction of
|
95 |
+
the federal learning model, the convolutional neural network structure used to train the
|
96 |
+
model, the related models, the role of the functions involved in the network, and some
|
97 |
+
methods for gradient-based attacks.
|
98 |
+
2.1
|
99 |
+
Federal Learning Model
|
100 |
+
The system for federated learning [22] first utilizes an encryption-based user sample
|
101 |
+
alignment technique where data owners identify the common users of each party while
|
102 |
+
securing the data of their respective users in order to federate the features of these users
|
103 |
+
for modeling, and the modeling training process requires federated models to secure the
|
104 |
+
privacy of each local database. First, the federated model sends the public key to the
|
105 |
+
local database to ensure that the local place completes the local data encryption before
|
106 |
+
performing data exchange. After that, the local place transmits the data to the joint
|
107 |
+
model in encrypted form. The data has been initially calculated by the local place and
|
108 |
+
the gradient is calculated based on the tag value, and then the gradient is encrypted and
|
109 |
+
transmitted to the joint model. The joint model combines the gradients calculated by
|
110 |
+
each local model to find the total gradient value, decrypts it and sends it to each local
|
111 |
+
model, so the local model can update its own model parameters according to the new
|
112 |
+
gradient value and improve the optimized model. The above process is repeated until
|
113 |
+
the gradient is infinitely close to the set value, which completes the training of the whole
|
114 |
+
model. During the model training process, the data of each data owner is not exposed
|
115 |
+
to the federated model and other local models, and the data exchange during training
|
116 |
+
does not lead to data privacy threats. As a result, all parties are able to cooperate in
|
117 |
+
training the model with the help of the federated learning model.
|
118 |
+
2.2
|
119 |
+
Convolutional Neural Networks
|
120 |
+
Convolutional Neural Network (CNN) is a deep learning model inspired by biologi-
|
121 |
+
cal neural networks [23], formed by interconnecting multiple layers of neurons, where
|
122 |
+
the number of input data in each layer is equal to the number of neurons in the previous
|
123 |
+
layer, and each neuron can receive multiple inputs but can only output one data. This
|
124 |
+
network is often applied in image processing, and the structure and role of each layer
|
125 |
+
will be described next [24].
|
126 |
+
Input Layer.
|
127 |
+
Convolutional neural networks first need to convert image information into input
|
128 |
+
data. The color of a color picture pixel consists of three attributes: red, green and blue,
|
129 |
+
which are called RGB three channels, and the number of pixels in each row and column
|
130 |
+
of each picture is the resolution of the picture. However, for black and white pictures,
|
131 |
+
the color of the pixels is determined only by the attribute grayscale value. Assume that
|
132 |
+
the value of each channel is between 0 and 511. A color photo with a resolution of
|
133 |
+
|
134 |
+
4
|
135 |
+
100×100 can be converted to a tensor of (100,100,3), and a black and white photo of
|
136 |
+
the same size can be converted to a tensor of (100,100,1).
|
137 |
+
The main work of this layer is to perform a pre-processing of the original image,
|
138 |
+
which consists of three main categories: Centering, which subtracts the average of this
|
139 |
+
dimension from each dimension of the input data, so that the center of the data lies at
|
140 |
+
the zero point. Normalization, which makes the standard deviation of the data to be 1,
|
141 |
+
reduces the effect of different values taken by the data. PCA is used to reduce the cor-
|
142 |
+
relation between the feature values and strives to eliminate the correlation between im-
|
143 |
+
age bands; and whitening, which weakens the effect of the magnitude on the feature
|
144 |
+
axis of the data.
|
145 |
+
Convolutional Layer.
|
146 |
+
|
147 |
+
Fig. 1. Two-dimensional convolution example
|
148 |
+
The three hyperparameters of the convolution kernel are Stride, Zero Padding and
|
149 |
+
Depth. Stride is the number of frames that the data frame moves, which in Figure 2-3
|
150 |
+
is equal to 1. Zero padding protects the edge information of the image from being
|
151 |
+
blurred or lost during the network training process. Depth is the number of convolution
|
152 |
+
kernels, which should be the same as the number of neurons in the next layer. The
|
153 |
+
number of neurons in the convolutional layer is calculated by subtracting the number
|
154 |
+
of neurons from the size of the convolution plus twice the sum of the zero padding,
|
155 |
+
dividing by the step size, and finally adding one to the resulting result.
|
156 |
+
Without parameter sharing, 10×64×64×5×5×3=3072000 parameters are required,
|
157 |
+
and with parameter sharing, 10×5×5×3=750 parameters are required. It can be seen that
|
158 |
+
parameter sharing reduces the number of features obtained by the convolutional nuclei,
|
159 |
+
which leads to the loss of local features if the image size is large. An effective way to
|
160 |
+
solve this problem is to set multiple convolutional kernels in each convolutional layer.
|
161 |
+
|
162 |
+
1
|
163 |
+
1
|
164 |
+
1
|
165 |
+
1
|
166 |
+
1
|
167 |
+
-1
|
168 |
+
0
|
169 |
+
-3
|
170 |
+
0
|
171 |
+
1
|
172 |
+
1
|
173 |
+
0
|
174 |
+
0
|
175 |
+
0
|
176 |
+
-2
|
177 |
+
-1
|
178 |
+
2
|
179 |
+
1
|
180 |
+
1
|
181 |
+
-1
|
182 |
+
0
|
183 |
+
0
|
184 |
+
0
|
185 |
+
0
|
186 |
+
=
|
187 |
+
2
|
188 |
+
2
|
189 |
+
4
|
190 |
+
¥0
|
191 |
+
-1
|
192 |
+
1
|
193 |
+
2
|
194 |
+
1
|
195 |
+
0
|
196 |
+
0
|
197 |
+
-1
|
198 |
+
-1
|
199 |
+
0
|
200 |
+
0
|
201 |
+
1
|
202 |
+
2
|
203 |
+
1
|
204 |
+
1
|
205 |
+
15
|
206 |
+
|
207 |
+
Fig. 2. Feature Mapping
|
208 |
+
Activating Layer
|
209 |
+
The role of this layer is, as the name suggests, both to take the output of the con-
|
210 |
+
volutional layer and to process it nonlinearly. Commonly used nonlinear mapping func-
|
211 |
+
tions will be introduced in the following.
|
212 |
+
Sigmoid function
|
213 |
+
Advantages: take the value range (0, 1), simple, easy to understand.
|
214 |
+
Disadvantages: too much data may paralyze the neuron, so that the gradient infor-
|
215 |
+
mation cannot be transmitted; the function output data center point does not lie at the
|
216 |
+
zero point.
|
217 |
+
|
218 |
+
Fig. 3. Sigmoid function
|
219 |
+
Pooling Layer
|
220 |
+
The pooling layer, also called subsampling layer, is used for feature extraction, which
|
221 |
+
reduces the number of neurons to some extent and prevents the appearance of overfit-
|
222 |
+
ting. This layer removes redundant information and retains only key features, which
|
223 |
+
can improve robustness. The pooling layer, also known as the downsampling layer,
|
224 |
+
causes the features of the input information to be lost, which in turn cuts the number of
|
225 |
+
|
226 |
+
3
|
227 |
+
N
|
228 |
+
0
|
229 |
+
1
|
230 |
+
2
|
231 |
+
3
|
232 |
+
2
|
233 |
+
3
|
234 |
+
0
|
235 |
+
1
|
236 |
+
2
|
237 |
+
m
|
238 |
+
16
|
239 |
+
0
|
240 |
+
1
|
241 |
+
x
|
242 |
+
0
|
243 |
+
2
|
244 |
+
m
|
245 |
+
0
|
246 |
+
15
|
247 |
+
16
|
248 |
+
3
|
249 |
+
0
|
250 |
+
1
|
251 |
+
2
|
252 |
+
m
|
253 |
+
0
|
254 |
+
2
|
255 |
+
m
|
256 |
+
2
|
257 |
+
15
|
258 |
+
16
|
259 |
+
0
|
260 |
+
1
|
261 |
+
6
|
262 |
+
15
|
263 |
+
3
|
264 |
+
01.0
|
265 |
+
0.8
|
266 |
+
0.6
|
267 |
+
0.4
|
268 |
+
0.2
|
269 |
+
0.0
|
270 |
+
-
|
271 |
+
-
|
272 |
+
-8
|
273 |
+
-6
|
274 |
+
-4
|
275 |
+
-2
|
276 |
+
0
|
277 |
+
2
|
278 |
+
4
|
279 |
+
6
|
280 |
+
86
|
281 |
+
parameters, making the network less computationally burdensome; while keeping the
|
282 |
+
important features unchanged (cropping, stretching, scaling, etc.).
|
283 |
+
One is average pooling, which requires summing the feature points in the neighbor-
|
284 |
+
hood and then dividing the total feature value equally among the feature points; the
|
285 |
+
other is maximum pooling, which, as the name implies, excludes all smaller feature
|
286 |
+
values in the domain and takes them out. The pooling often makes mistakes in obtaining
|
287 |
+
the feature values: first, the variance of the estimate increases; second, the shift of the
|
288 |
+
mean of the estimate. In terms of the prevailing theory, in image processing, the first
|
289 |
+
error handling method mostly uses the mean pooling operation to moderate the size
|
290 |
+
limitation of the domain to reduce the variance, thus making the image background
|
291 |
+
clearer; while the second error handling method mostly uses the maximum pooling op-
|
292 |
+
eration, which basically ignores the parameter error of the convolutional layer and guar-
|
293 |
+
antees the mean accuracy, thus preserving the texture of the image. Therefore, one of
|
294 |
+
these two methods is missing in convolutional neural networks.
|
295 |
+
Flatten layer and fully connected layer
|
296 |
+
The role of the flatten layer is to flatten multidimensional data into one-dimensional
|
297 |
+
data. The fully-connected layer limits the dimensionality of the data, and thus flattening
|
298 |
+
the data for re-input is essential.
|
299 |
+
The fully connected layer is often used as the closing layer in the convolutional neural
|
300 |
+
network structure, using different activation functions to match different classification
|
301 |
+
requirements.
|
302 |
+
Output Layer
|
303 |
+
The role of this layer is to output the final target result.
|
304 |
+
Structure of convolutional neural networks [26]
|
305 |
+
The layers introduced above are combined to become the complete convolutional
|
306 |
+
neural network structure [27]. Figure 4 shows the basic structure of a CNN, where each
|
307 |
+
convolutional layer applies an activation function for quadratic sampling and then two
|
308 |
+
fully connected layers to give predictions.
|
309 |
+
|
310 |
+
Fig. 4. Basic structure of CNN
|
311 |
+
|
312 |
+
C3:feature maps
|
313 |
+
S4:feature maps
|
314 |
+
16(@10*10
|
315 |
+
S2:feature maps
|
316 |
+
16@5*5
|
317 |
+
C5:layer
|
318 |
+
F6:layer OUTPUT
|
319 |
+
C1:feature maps
|
320 |
+
6(@14*14
|
321 |
+
120
|
322 |
+
O1
|
323 |
+
6@28*28
|
324 |
+
INPUT
|
325 |
+
32*32
|
326 |
+
Full connection
|
327 |
+
Gaussian
|
328 |
+
Convolutions
|
329 |
+
Subsampling
|
330 |
+
Convolutions
|
331 |
+
Subsampling
|
332 |
+
connections
|
333 |
+
Full connection7
|
334 |
+
2.3
|
335 |
+
Common models of convolutional neural networks
|
336 |
+
Many models of convolutional neural networks exist, and several commonly used
|
337 |
+
models will be presented here.
|
338 |
+
LeNet
|
339 |
+
LeNet is mainly used to identify and classify non-printed fonts, and it has an accuracy
|
340 |
+
rate of 98%. As a result, the United States put this model into use in the financial in-
|
341 |
+
dustry in the late 20th century. This model is used as the basis of convolutional neural
|
342 |
+
network, with a total of six layers of network, and the convolutional kernels are all 5×5
|
343 |
+
with a step size of 1,using average pooling: conv → pool → conv → pool → conv(fc)
|
344 |
+
→ fc.
|
345 |
+
AlexNet
|
346 |
+
This model uses the ReLU function as the activation function, and optimizes the
|
347 |
+
problem that the gradient of the sigmoid function is prone to be uncomputable in a
|
348 |
+
network with more layers. And some improvements are made in the final fully con-
|
349 |
+
nected layer, where only some neurons are randomly selected to participate in the com-
|
350 |
+
putation of the network, which can prevent overfitting.
|
351 |
+
Convolutional neural networks usually use average pooling and maximum pooling
|
352 |
+
alternately, but in this model, only maximum pooling is used, basically ignoring the
|
353 |
+
parameter error of the convolutional layer and the size limitation of the neighborhood.
|
354 |
+
This model reduces the step size to achieve a pooling kernel size larger than the step
|
355 |
+
size value, so the output of the pooling layer enhances the feature richness.
|
356 |
+
A local response normalization layer is created for the first time, so that the neuron
|
357 |
+
responses in this layer show bipolarity and improve generalization ability.
|
358 |
+
VGGNet.
|
359 |
+
The LRN layer used in AlexNet was not found to bring significant performance
|
360 |
+
improvement to the network in later practice, so the LRN layer in VGGNet has no
|
361 |
+
performance gain (A-LRN) and is not extended to other network models.
|
362 |
+
VGGNet increases the number of network layers compared with other previous
|
363 |
+
networks, and the number of layers in its network structure is twice or more than
|
364 |
+
AlexNet without counting the pooling and softmax layers here. The concept of convo-
|
365 |
+
lutional block is proposed for the first time, and 2~3 convolutional layers form a con-
|
366 |
+
volutional block, which can reduce the number of parameters and enhance the learning
|
367 |
+
ability by using ReLU activation function.
|
368 |
+
GoogLeNet.
|
369 |
+
Inception V1 increases the convolution module function compared to several pre-
|
370 |
+
viously proposed network structures. The previous network structure improves the
|
371 |
+
training effect, but the effect benefits from its increased number of network layers also
|
372 |
+
deepens the network depth. However, the deeper depth also brings many problems,
|
373 |
+
such as overfitting, gradient cannot be found in the network and the computational ef-
|
374 |
+
fort increases.
|
375 |
+
|
376 |
+
8
|
377 |
+
SqueezeNet.
|
378 |
+
SqueezeNet's model compression uses 3 strategies.
|
379 |
+
(1) replacing 3×3 convolution with 1×1 convolution: the number of parameters of
|
380 |
+
convolution is reduced to 1/9 of the original one, which helps to improve the speed of
|
381 |
+
network operation; (2) reducing the number of channels of 3×3 convolution: the com-
|
382 |
+
putation of a 3×3 convolution is 3×3×a×b (where a, b are the number of channels of
|
383 |
+
input Feature Map and output Feature Map respectively), reducing the number of chan-
|
384 |
+
nels to reduce the number of parameters The number of channels is reduced to reduce
|
385 |
+
the number of parameters, which helps to simplify the operation and improve the per-
|
386 |
+
formance of the network; (3) the downsampling is set back: the larger Feature Map
|
387 |
+
contains more information, so the downsampling is moved to the classification layer.
|
388 |
+
Such an operation can improve the accuracy of the network, but it will increase the
|
389 |
+
burden of network computation.
|
390 |
+
ResNet.
|
391 |
+
Before introducing the model, it is necessary to understand the concept of residu-
|
392 |
+
als, first of all, it is necessary to distinguish between residuals and errors. The error is
|
393 |
+
the measured value minus the reference value, and the residual is the difference between
|
394 |
+
the actual observed value and the predicted value, and the residual can detect whether
|
395 |
+
the prediction is accurate or not. The function of one layer in the residual network is set
|
396 |
+
as y=F(x), and the residual model can be expressed as H(x)=G(x) + x, that is,
|
397 |
+
G(x)=H(x)-x. In the unit mapping, y=x is the actual observed value, and H(x) is the
|
398 |
+
fitted value, so G(x) corresponds to the residual, so it is called the residual network.
|
399 |
+
|
400 |
+
Fig. 5. Residual network
|
401 |
+
Losing the residuals, as shown in the connection on the left side of the figure, the
|
402 |
+
error in training and the network depth show a negative correlation as the number of
|
403 |
+
networks increases. In contrast, theoretically, the increase of network depth and the
|
404 |
+
model training effect should show a positive correlation. Theoretical and practical de-
|
405 |
+
viations often exist, and for an ordinary network without jump connections, the deeper
|
406 |
+
the depth will make the computation more complicated, and the improvement and
|
407 |
+
|
408 |
+
X
|
409 |
+
weight
|
410 |
+
G(x)
|
411 |
+
X
|
412 |
+
relu
|
413 |
+
identity
|
414 |
+
weight
|
415 |
+
G(x)+x
|
416 |
+
relu9
|
417 |
+
enhancement of the algorithm will be more difficult to achieve. Therefore, in reality,
|
418 |
+
there is a positive correlation between the depth of the network and the number of train-
|
419 |
+
ing errors.
|
420 |
+
To solve this problem, the network needs to detect the existence of redundant lay-
|
421 |
+
ers by itself, which makes the optimization algorithm complicated and does not achieve
|
422 |
+
constant mapping. The ResNet model is able to solve this problem in a very fitting way
|
423 |
+
by updating the parameters of the redundant layers with the residual G(x)=0 instead of
|
424 |
+
the fitted value H(x)=x, and by doing so, updating the parameters of the redundant lay-
|
425 |
+
ers. That is, after the network spontaneously detects and infers which layers are redun-
|
426 |
+
dant and useless, the residual function G(x)=0 makes the network of that layer, after
|
427 |
+
removing the redundant layer, match the input of the previous layer accurately. In this
|
428 |
+
way, the effect of errors caused by redundant layers is almost eliminated, effectively
|
429 |
+
solving the network degradation problem.
|
430 |
+
As an example to explore the cause of network degradation, when one designs the
|
431 |
+
network in the first place, one does not perform the actual operation to grasp the number
|
432 |
+
of layers needed for the network structure. To be on the safe side and to enable the
|
433 |
+
network to train well, people tend to set up more layers of network structure. When the
|
434 |
+
network is actually trained, it is found that only half the number of layers may be needed
|
435 |
+
to complete the task of this network, and then the extra layers are redundant. Therefore,
|
436 |
+
we hope that during the training process, the model can find out that the other half of
|
437 |
+
the layers are redundant and make a constant mapping for only half of the layers, so
|
438 |
+
that the input data will be identical to the output data after passing through the model.
|
439 |
+
But often the model is likely to learn this half of the constant mapping incorrectly,
|
440 |
+
so it may not work as well as a model with 2/3 of the original number of layers set.
|
441 |
+
Therefore, as the number of layers of the network increases, the effect of model training
|
442 |
+
may degrade, which is caused by the redundant layers learning the wrong constant map-
|
443 |
+
pings.
|
444 |
+
DenseNet.
|
445 |
+
In a comprehensive view, DenseNet has the following advantages over the previ-
|
446 |
+
ous models.
|
447 |
+
(i) the use of dense connectivity, which mainly improves the back propagation
|
448 |
+
speed of gradients to accelerate the training of convolutional neural networks. (2) The
|
449 |
+
parameters are reduced and the values are decreased to improve the efficiency of com-
|
450 |
+
putation and to reduce the feature maps specific to each layer; (3) Feature reuse is used
|
451 |
+
to reuse the low-level features for the last layer to play the role of classification.
|
452 |
+
MobileNet.
|
453 |
+
①MobileNet-v1
|
454 |
+
In a nutshell, V1 replaces the usual convolutional layers in vgg with depth-sepa-
|
455 |
+
rable convolution, and therefore can greatly reduce the number of parameters; and adds
|
456 |
+
the hyperparameters α and β on top of vgg.
|
457 |
+
②MobileNet-v2
|
458 |
+
|
459 |
+
10
|
460 |
+
MobileNetV2 is proposed by Google in 2018, with better accuracy and smaller
|
461 |
+
model compared to V1. The model highlights have Inverted Residuals structure (In-
|
462 |
+
verted Residuals) and Linear bottlenecks.
|
463 |
+
Deep Residual Learning.
|
464 |
+
The core difference of this algorithm is that it proposes a new structure with a
|
465 |
+
topological spreading to form a new block structure, replacing the convolutional block
|
466 |
+
structure of the previous model, which can optimize the performance of the model pre-
|
467 |
+
diction and improve the accuracy while adding almost no new parameters. The topo-
|
468 |
+
logical spreading also reduces the number of hyperparameters and improves the gener-
|
469 |
+
ality of the model.
|
470 |
+
ShuffelNet.
|
471 |
+
①ShuffelNet-v1
|
472 |
+
ShuffleNet is improved by two new operations: point-state group convolution and
|
473 |
+
channel scrubbing, similar to the previous model, which can ensure the accuracy of the
|
474 |
+
network structure output results and reduce the computational complexity. The basic
|
475 |
+
cell structure of the model is optimized and improved based on the residual model cells.
|
476 |
+
②ShuffelNet-v2
|
477 |
+
The number of neurons in this model is relatively small, and the number of
|
478 |
+
branches between layers is thus reduced to speed up the model convergence. The model
|
479 |
+
input speed depends on the number of input and output feature channels, but too many
|
480 |
+
grouping parameters can affect the model convergence speed.
|
481 |
+
EfficientNet.
|
482 |
+
Convolutional neural networks are usually built after resource evaluation, and the
|
483 |
+
more resources are available, the better the performance of the network model will be.
|
484 |
+
This model delves into how to scale the model up and down and finds that making the
|
485 |
+
depth and width of the network converge across the layers or reducing the gap in reso-
|
486 |
+
lution can both improve the network's effectiveness. Therefore, a new method is pro-
|
487 |
+
posed to balance the above three characteristics of the network with composite coeffi-
|
488 |
+
cients, etc.
|
489 |
+
This model was born out of the desire to find a new balance between network
|
490 |
+
depth, width and resolution to measure the accuracy of the network. Previous models
|
491 |
+
have used only one of these aspects to evaluate the effectiveness of the network. This
|
492 |
+
model found that these three aspects together have an impact on the scaling of the net-
|
493 |
+
work, and explored the evidence of the interaction between the three, based on which
|
494 |
+
the best combination of the three was found.
|
495 |
+
2.4
|
496 |
+
General Methods for Gradient-Based Attacks
|
497 |
+
Membership inference.
|
498 |
+
Membership inference [28] refers to speculating whether these data points have
|
499 |
+
been used in the process of training the model based on the known training model and
|
500 |
+
|
501 |
+
11
|
502 |
+
the delimited range of data points. In federation learning, the updated gradient infor-
|
503 |
+
mation is fed back to the server every round, so the server is able to have certain local
|
504 |
+
model information. With this attack algorithm, the server is able to know whether the
|
505 |
+
delimited data points are used for model training or not. Sometimes, in certain situa-
|
506 |
+
tions, this attack can directly lead to a privacy breach. For example, if the attack learns
|
507 |
+
that a patient's clinical records are used for training a model for a particular disease, the
|
508 |
+
fact that the patient has that disease is compromised. In practice, Melis et al. demon-
|
509 |
+
strated that this attack approach is extremely accurate on the FourSquare location da-
|
510 |
+
taset [29] and can almost determine whether a particular data point data point is used
|
511 |
+
for category classification training.
|
512 |
+
Attribute inference.
|
513 |
+
Attribute inference refers to inferring whether the corresponding training set con-
|
514 |
+
tains the same labeled attributes as the known model based on the known training
|
515 |
+
model. Note that the attribute is not important in terms of its relevance to the main task.
|
516 |
+
When training a model on the LFW dataset [30] for identifying gender or race, attribute
|
517 |
+
inference can infer whether they wear a mask or not, in addition to the two known
|
518 |
+
labels. In practice, this also poses a potential risk of privacy compromise. If the patient's
|
519 |
+
age, gender, race, and whether they wear a mask or not are known, there is a high risk
|
520 |
+
that the patient's personal information will be compromised, even if the name and clin-
|
521 |
+
ical records remain confidential.
|
522 |
+
Model inversion.
|
523 |
+
Model inversion is a greater threat to the privacy of the training dataset compared
|
524 |
+
to the first two aggressive ones. Since the learning process is always ongoing, this attack
|
525 |
+
exploits this property by having the adversary train a generative adversarial network
|
526 |
+
(GAN) [31] to generate samples that match the training dataset. The results of the attack
|
527 |
+
show that the images obtained are almost identical to the original images, since the
|
528 |
+
GAN is able to create matching samples that are nearly identical to the original training
|
529 |
+
dataset. Moreover, the higher the similarity of the training set, the better the perfor-
|
530 |
+
mance of this attack.
|
531 |
+
The above three attack strategies reveal that the information in the gradient is at
|
532 |
+
risk of leakage to some extent, but each of these three attacks has its own limitations.
|
533 |
+
The membership inference attack relies on delimited data, and the attack will be much
|
534 |
+
more difficult when the input data is not textual information (e.g., images, voice). At-
|
535 |
+
tribute inference relaxes the constraint that only a label is needed to perform the attack.
|
536 |
+
However, the attack result will narrow the scope and there is no guarantee to find the
|
537 |
+
specific data. For model inversion, although it can generate synthetic images directly
|
538 |
+
from the statistical distribution of the training data, the results are similar alternatives
|
539 |
+
(rather than the original data) and only work when all class members are similar. What
|
540 |
+
will be investigated and demonstrated in this paper is how to steal the training data
|
541 |
+
completely from the gradient information without prior training data.
|
542 |
+
|
543 |
+
12
|
544 |
+
2.5
|
545 |
+
Summary of this chapter
|
546 |
+
This chapter introduced the types of networks and their structures used in this at-
|
547 |
+
tack. The first section starts with the federal learning system and outlines how it updates
|
548 |
+
the model by gradients; the second section describes the working principle of convolu-
|
549 |
+
tional neural networks suitable for training classification images and the structure of
|
550 |
+
each level; the third section briefly describes the commonly used convolutional neural
|
551 |
+
network models and provides the basis for the next study on how to select and apply
|
552 |
+
such models for training; the fourth section introduces the The fourth subsection intro-
|
553 |
+
duces some methods that can be used to perform gradient attacks with prior knowledge
|
554 |
+
of the training data. The theoretical foundation is laid for the subsequent research in
|
555 |
+
this paper to prove the attack algorithm based on gradient features only.
|
556 |
+
3
|
557 |
+
Design of reconstruction attack algorithm based on gradient features
|
558 |
+
The subject under study is a reconstruction attack based on gradient features, using
|
559 |
+
a convolutional neural network for the training of a federal learning system for image
|
560 |
+
classification. In this paper, we need to use the gradient derived from the image and its
|
561 |
+
label information trained by the convolutional neural network to restore the original
|
562 |
+
information. This chapter first introduces the principle of the attack that can obtain part
|
563 |
+
of the original data, and then delves into the analysis and study of the algorithm that
|
564 |
+
restores the complete original information based on the gradient.
|
565 |
+
3.1
|
566 |
+
Local leakage of specific layers
|
567 |
+
First, this chapter starts with a few special layers to study and optimize the attack
|
568 |
+
algorithm step by step. The first one is the fully-connected layer (FC). The fully con-
|
569 |
+
nected layer is indispensable in both neural networks and convolutional neural net-
|
570 |
+
works. For the biased fully connected layer, it is mathematically proven that the reduc-
|
571 |
+
tion of the original input data from the gradient information is done without considering
|
572 |
+
the position of this layer and the class of layers before and after this layer.
|
573 |
+
Lemma 1: Suppose a fully connected layer of a neural network contains weights and
|
574 |
+
biases with input 𝑋 ∈ ℝ𝑛 and output 𝑌 ∈ ℝ𝑚, weight 𝑊 ∈ ℝ𝑚×𝑛and bias 𝐵 ∈ ℝ𝑚,
|
575 |
+
then it is obtained
|
576 |
+
|
577 |
+
𝑌 = 𝑊𝑋 + 𝐵
|
578 |
+
(3-1)
|
579 |
+
If there exists
|
580 |
+
𝑑𝐿
|
581 |
+
𝑑(𝐵𝑖) ≠ 0, then the input data X can B be reconstructed from
|
582 |
+
𝑑𝐿
|
583 |
+
𝑑𝑊 and
|
584 |
+
𝑑𝐿
|
585 |
+
𝑑𝐵. The following proof is carried out: it is known that
|
586 |
+
𝑑𝐿
|
587 |
+
𝑑(𝐵𝑖) =
|
588 |
+
𝑑𝐿
|
589 |
+
𝑑𝑌𝑖 and
|
590 |
+
𝑑(𝑌𝑖)
|
591 |
+
𝑑(𝑊𝑖) = 𝑋𝑇, then
|
592 |
+
|
593 |
+
𝑑𝐿
|
594 |
+
𝑑(𝑊𝑖) =
|
595 |
+
𝑑𝐿
|
596 |
+
𝑑(𝑌𝑖) ⋅
|
597 |
+
𝑑(𝑌𝑖)
|
598 |
+
𝑑(𝑊𝑖) =
|
599 |
+
𝑑𝐿
|
600 |
+
𝑑(𝐵𝑖) ⋅ 𝑋𝑇
|
601 |
+
(3-2)
|
602 |
+
where𝑌𝑖 𝑊𝑖 and𝐵𝑖 denote the ith row of output Y, weight W and bias B. Therefore,
|
603 |
+
the input X can be reconstructed from this formula as long as
|
604 |
+
𝑑𝐿
|
605 |
+
𝑑(𝐵𝑖) ≠ 0 is satisfied.
|
606 |
+
The derivative as well as the bias
|
607 |
+
𝑑𝐿
|
608 |
+
𝑑𝐵 are crucial for reconstructing the input layer. To
|
609 |
+
make the gradient attack more general, Geiping et al. delved deeper and found that if
|
610 |
+
the bias B is eliminated, the original input data can also be restored from a small amount
|
611 |
+
|
612 |
+
13
|
613 |
+
of gradient information as long as a suitable activation function (e.g., ReLU activation
|
614 |
+
function) is found. The proof process is similar, and the reconstruction of the input data
|
615 |
+
in the fully connected layer still works well.
|
616 |
+
If the function is not derived, the input data information is still implied in the gradi-
|
617 |
+
ent. For example, in the language classification task, the federal learning system gener-
|
618 |
+
ates corresponding gradients only for the words in the input model, and the attack tells
|
619 |
+
which words and phrases were used for model training in each local data set, respec-
|
620 |
+
tively. The cross-entropy layer in the classification task, on the other hand, can only
|
621 |
+
generate negative gradients for the data with corrected completion labels. This property
|
622 |
+
gives away the true data labels to some extent.
|
623 |
+
However, there are many more factors to consider when extending from the fully
|
624 |
+
connected layer (FC) to the more complex convolutional layer (CONV), where the
|
625 |
+
number of features in the convolutional layer and the dimensionality of the input occu-
|
626 |
+
pation are much larger than the size of the gradient values. A parsing reconstruction
|
627 |
+
method like the one in Lemma 1 will no longer be applicable. Modern convolutional
|
628 |
+
neural networks require a more general attack algorithm.
|
629 |
+
3.2
|
630 |
+
Complete leakage of the gradient
|
631 |
+
Zhu et al [33] proposed a new and improved algorithmic method that is able to
|
632 |
+
solve the above problem by using neural networks with the same structure and matching
|
633 |
+
gradients to restore the reconstructed original dataset. Thus it can ensure that the dataset
|
634 |
+
is private and non-interoperable, and the generality and attack capability of this method
|
635 |
+
are broader and more powerful than the methods in the previous subsection, and this
|
636 |
+
technique is called Deep Gradient Leakage algorithm (DLG).
|
637 |
+
DLG is a reconstruction attack based on gradient features. The attacker receives
|
638 |
+
the gradient update ∇𝑊𝑡,𝑘, k from the other participants k in round t, in order to obtain
|
639 |
+
the training set (𝑥𝑡,𝑘, 𝑦𝑡,𝑘) of participant k from the shared exchange information. Figure
|
640 |
+
3-1 shows how it works in stealing image information: normal participants input an
|
641 |
+
image from the original private data and derive a prediction by the F-model, then use
|
642 |
+
the difference between the prediction and the labeled value to calculate the gradient,
|
643 |
+
which is returned to the participants to update the model. The algorithm first generates
|
644 |
+
a virtual pixel point image with the same size as the real image, and then initializes a
|
645 |
+
virtual label indicating the probability, such as the cat and dog classification explored
|
646 |
+
in this topic, which sets the label value of 0 for the cat and 1 for the dog. then a softmax
|
647 |
+
layer is generated. the DLG iterates the matching of the image and the label on the
|
648 |
+
intermediate local model to compute the virtual gradient. Note that most FL models
|
649 |
+
share the privacy difference module 𝐹(𝑥, 𝑊) and the weights W by default.
|
650 |
+
The loss function is set to be the difference between the true gradient and the vir-
|
651 |
+
tual gradient, and then the squared number is obtained to ensure that the loss function
|
652 |
+
is positive. The key point of this reconstruction attack is to narrow the gap between the
|
653 |
+
real gradient and the virtual gradient by continuously iterating, and then return to the
|
654 |
+
models of both parties, update their respective parameters, and retrain the attacker's
|
655 |
+
model so that the attacker's gradient value can continuously approximate the real
|
656 |
+
|
657 |
+
14
|
658 |
+
gradient value. When the target loss function is close to zero, the virtual data image will
|
659 |
+
also be infinitely close to the original data image.
|
660 |
+
|
661 |
+
Fig. 6. DLG algorithm
|
662 |
+
In Figure 6, the variables to be updated are marked in bold blue. While the local
|
663 |
+
training model is trained using its differential privacy module and calculates the corre-
|
664 |
+
sponding 𝛻𝑊, the attacker uses its own randomly generated input images with label
|
665 |
+
values to derive the gradient 𝛻𝑊′and calculates the difference between the two gradi-
|
666 |
+
ents, which the attacker uses as a basis to adjust the parameters and computationally
|
667 |
+
update its virtual input X and label Y so that the gradient loss function converges to a
|
668 |
+
minimum. When the optimization is complete, the attacker can restore the original data
|
669 |
+
information from the local model.
|
670 |
+
The flow of the algorithm is shown next in mathematical form.
|
671 |
+
𝐱′∗, 𝐲′∗ = arg 𝑚𝑖𝑛
|
672 |
+
𝐱′,𝐲′ ∥∇𝑊′ − ∇𝑊∥2 = arg 𝑚𝑖𝑛
|
673 |
+
𝐱′,𝐲′ ∥∥∥∂ℓ(𝐹(𝐱′,𝑊),𝐲′)
|
674 |
+
∂𝑊
|
675 |
+
− ∇𝑊∥∥∥
|
676 |
+
2
|
677 |
+
(3-3)
|
678 |
+
This equation to show how the virtual input 𝐱′∗ and the label value 𝐲′∗如 are ob-
|
679 |
+
tained from the gradient reduction.
|
680 |
+
Let the input be 𝐹(): the microscopic machine learning model; W: the parame-
|
681 |
+
ter weights; 𝛻𝑊: the gradient computed from the training data; 𝜂: the learning rate used
|
682 |
+
for DLG optimization. The outputs are the original private training data 𝑥 and the labels
|
683 |
+
𝑦.
|
684 |
+
① DLG algorithm(𝐹,𝑊,𝛻𝑊)
|
685 |
+
② 𝐱′
|
686 |
+
1 ← 𝒩(0,1), 𝐲1
|
687 |
+
′ ← 𝒩(0,1) Initialize virtual inputs and labels.
|
688 |
+
③ for 𝑖 ⟵ 1 to 𝑛 do
|
689 |
+
④ 𝐋𝑖
|
690 |
+
′ = softmax (𝐲𝑖
|
691 |
+
′)
|
692 |
+
⑤ ∇𝑊𝑖
|
693 |
+
′ ← ∂ℓ(𝐹(𝐱𝑖
|
694 |
+
′, 𝑊), 𝐋𝑖
|
695 |
+
′)/ ∂𝑊𝑡 Calculate the virtual gradient.
|
696 |
+
⑥ 𝔻𝑖 ← ∥∥∇𝑊𝑖
|
697 |
+
′ − ∇𝑊∥∥2
|
698 |
+
⑦ 𝐱𝑖+1
|
699 |
+
′
|
700 |
+
⟵ 𝐱𝑖
|
701 |
+
′ − 𝜂∇𝐱𝑖
|
702 |
+
′𝔻𝑖
|
703 |
+
。。。 Update the input data according to
|
704 |
+
the gradient.
|
705 |
+
⑧ 𝐲𝑖+1
|
706 |
+
′
|
707 |
+
⟵ 𝐲𝑖
|
708 |
+
′ − 𝜂∇𝐲𝑖
|
709 |
+
′𝔻𝑖
|
710 |
+
。 Update the labels according to the
|
711 |
+
gradient.
|
712 |
+
|
713 |
+
差分隐私模块
|
714 |
+
F(x,W)
|
715 |
+
Pred
|
716 |
+
LOSS
|
717 |
+
[0,1,0]
|
718 |
+
VW
|
719 |
+
Try to match
|
720 |
+
VW'
|
721 |
+
差分隐私模块
|
722 |
+
Pred'
|
723 |
+
Loss'
|
724 |
+
[0.2,0.7,0.1]
|
725 |
+
F(x,W)
|
726 |
+
aD /ax
|
727 |
+
aDa
|
728 |
+
D=IVW.VWI215
|
729 |
+
It is important to note that the distance of the gradient, i.e., the loss function
|
730 |
+
∥∥∇𝑊𝑖
|
731 |
+
′ − ∇𝑊∥∥2must be derivable, so that the virtual input data 𝑥 and label 𝑦 can be op-
|
732 |
+
timized using a standard gradient-based approach. it follows that such optimization re-
|
733 |
+
quires a second-order derivable function. Here it is assumed that F is a second-order
|
734 |
+
derivable function and this algorithm is applicable to most modern AI models, most
|
735 |
+
neural networks and related tasks.
|
736 |
+
3.3
|
737 |
+
Optimization of DLG algorithm
|
738 |
+
The DLG algorithm can restore the complete original data image in most of the scenes,
|
739 |
+
but in this topic, we found that there is a problem that some of the images cannot be
|
740 |
+
restored completely in practice, and we propose an improvement method based on this
|
741 |
+
problem.
|
742 |
+
Since the original gradient information is generated based on the pixel information
|
743 |
+
of the input image and the label through constant matching, then the richer and more
|
744 |
+
vivid the image color is, the more information the RGB three channels carry, the more
|
745 |
+
pixel information they contain, the more complex the generated gradient is, and the
|
746 |
+
more information can be obtained through the attack, and it is easier to restore the orig-
|
747 |
+
inal image. Observe the part of the image that cannot be fully converged, there are
|
748 |
+
mostly large blank areas, which contain relatively less pixel information, so the com-
|
749 |
+
plete image cannot be restored.
|
750 |
+
The uneven distribution of image pixel information and the small amount of infor-
|
751 |
+
mation in local areas lead to difficulties in image restoration. Thus, the improved algo-
|
752 |
+
rithm adds the calculation of the average value of the amount of information contained
|
753 |
+
in the image, based on which the hue of the whole image is inferred, and then the vari-
|
754 |
+
ance of each pixel point from the average value is calculated and returned to calculate
|
755 |
+
the gradient and adjust the parameters. When most of the light-colored areas exist in
|
756 |
+
the image, the average value of the image is relatively small, and after other color-rich
|
757 |
+
areas are restored, after iteration, that is, it is possible to calculate the remaining areas
|
758 |
+
based on the average value of the pixel information as light-colored, and to reduce the
|
759 |
+
frequency of random pixel points and dark pixel points to some extent.
|
760 |
+
3.4
|
761 |
+
Summary of this chapter
|
762 |
+
Starting from the simplest fully connected layer, this chapter analyzes the principle
|
763 |
+
of reconstructing the input data from the gradient, but this method also has its limita-
|
764 |
+
tions and is not applicable on CNN networks. Then, an optimization algorithm based
|
765 |
+
on this method is introduced, which not only breaks through the original limitations,
|
766 |
+
but also is better in restoring the original data, and can completely restore the original
|
767 |
+
image and labels based on the gradient. Finally, based on the shortcomings of the DLG
|
768 |
+
algorithm, an improvement method is proposed.
|
769 |
+
|
770 |
+
16
|
771 |
+
4
|
772 |
+
Performance evaluation of the reconstruction attack algorithm based on
|
773 |
+
gradient features
|
774 |
+
This chapter shows the implementation of the gradient feature-based reconstruction
|
775 |
+
attack algorithm and the performance evaluation of it and the improved algorithm.
|
776 |
+
4.1
|
777 |
+
System Environment
|
778 |
+
The implementation of the attack in this paper is based on the algorithm written in
|
779 |
+
python language, using the self-contained libraries in PyCharm to support the writing
|
780 |
+
of the program, and the libraries, versions, and configurations used are described in
|
781 |
+
Table 1 below.
|
782 |
+
Table 1. Software Configuration Description
|
783 |
+
Database
|
784 |
+
Versions
|
785 |
+
Description
|
786 |
+
opencv-python
|
787 |
+
4.5.5.62
|
788 |
+
Converts images into pixel
|
789 |
+
information.
|
790 |
+
Pillow
|
791 |
+
8.4.0
|
792 |
+
Image processing.
|
793 |
+
scikit-learn
|
794 |
+
1.0.2
|
795 |
+
Contains algorithms such
|
796 |
+
as classification, regression,
|
797 |
+
clustering
|
798 |
+
scipy
|
799 |
+
1.7.3
|
800 |
+
Differentiation, optimiza-
|
801 |
+
tion, image processing
|
802 |
+
tensorboard
|
803 |
+
2.8.0
|
804 |
+
View training
|
805 |
+
torch
|
806 |
+
1.10.1
|
807 |
+
Convert data units
|
808 |
+
torchvision
|
809 |
+
0.11.2。
|
810 |
+
Process image data
|
811 |
+
The subject is trained on CPU, but the CPU is slow in training images, if conditions
|
812 |
+
allow, it is recommended to use GPU for model training to improve the training effi-
|
813 |
+
ciency.
|
814 |
+
This section will compare the DLG algorithm and its improved algorithms, using the
|
815 |
+
two metrics of intuitive image presentation and image restoration as a measure. image
|
816 |
+
restoration This paper uses the mean square error between the restored image and the
|
817 |
+
original image data.
|
818 |
+
4.2
|
819 |
+
Implementation of reconstruction attacks based on gradient features
|
820 |
+
Dogs and cats classification dataset
|
821 |
+
The training set of this model uses the cat and dog dataset disclosed by Kaggle in
|
822 |
+
2013, which consists of 25,000 examples, including 12,500 examples of cats and 12,500
|
823 |
+
examples of dogs. Therefore, in this paper, 20,000 images are selected as the training
|
824 |
+
dataset and 2,500 as the test dataset. The data consists of RGB three-channel images of
|
825 |
+
various sizes, in which the types of cats and dogs vary in form and the environment
|
826 |
+
they are in, and the label values of cats and dogs are set to 0 and 1, respectively.
|
827 |
+
Implementation of DLG algorithm
|
828 |
+
|
829 |
+
17
|
830 |
+
The attack process is shown in the figure below. All DLG attacks start with a ran-
|
831 |
+
domly generated pixel point (the first image) and try to infinitely approximate the gen-
|
832 |
+
erated virtual gradient to the real gradient value. As shown in Table 4-2, the decrease
|
833 |
+
of the mean square error between the virtual image data and the original image data
|
834 |
+
indicates the degree of image convergence, reflecting that the virtual data image grad-
|
835 |
+
ually approaches the original data image.
|
836 |
+
|
837 |
+
Fig. 7. Restore to get the cat picture
|
838 |
+
|
839 |
+
Fig. 8. Restore to get the dog picture
|
840 |
+
Table 2 Mean square error of the leaked image and the original image
|
841 |
+
Number of iterations
|
842 |
+
Image
|
843 |
+
Mean square error
|
844 |
+
20
|
845 |
+
|
846 |
+
105.68
|
847 |
+
|
848 |
+
iter=0
|
849 |
+
iter=10
|
850 |
+
iter=20
|
851 |
+
iter=30
|
852 |
+
iter=40
|
853 |
+
iter=50
|
854 |
+
iter=60
|
855 |
+
iter=70
|
856 |
+
iter=80
|
857 |
+
iter=90
|
858 |
+
iter=100
|
859 |
+
iter=110
|
860 |
+
iter=120
|
861 |
+
iter=130
|
862 |
+
iter=140
|
863 |
+
iter=150
|
864 |
+
iter=160
|
865 |
+
iter=170
|
866 |
+
iter=180
|
867 |
+
iter=190
|
868 |
+
iter=200
|
869 |
+
iter=210
|
870 |
+
iter=220
|
871 |
+
iter=230
|
872 |
+
iter=240
|
873 |
+
iter=250
|
874 |
+
iter=260
|
875 |
+
iter=270
|
876 |
+
iter=280
|
877 |
+
iter=290iter=0
|
878 |
+
iter=10
|
879 |
+
iter=20
|
880 |
+
iter=30
|
881 |
+
iter=40
|
882 |
+
iter=50
|
883 |
+
iter=60
|
884 |
+
iter=70
|
885 |
+
iter=80
|
886 |
+
iter=90
|
887 |
+
iter=100
|
888 |
+
iter=110
|
889 |
+
iter=120
|
890 |
+
iter=130
|
891 |
+
iter=140
|
892 |
+
iter=150
|
893 |
+
iter=160
|
894 |
+
iter=170
|
895 |
+
iter=180
|
896 |
+
iter=190
|
897 |
+
iter=200
|
898 |
+
iter=210
|
899 |
+
iter=220
|
900 |
+
iter=230
|
901 |
+
iter=240
|
902 |
+
iter=250
|
903 |
+
iter=260
|
904 |
+
iter=270
|
905 |
+
iter=280
|
906 |
+
iter=29018
|
907 |
+
40
|
908 |
+
|
909 |
+
99.63
|
910 |
+
50
|
911 |
+
|
912 |
+
89.63
|
913 |
+
80
|
914 |
+
|
915 |
+
54.25
|
916 |
+
200
|
917 |
+
|
918 |
+
3.22
|
919 |
+
Improved implementation of the algorithm
|
920 |
+
Table 3 Comparison of DLG algorithm and improved algorithm
|
921 |
+
Original image
|
922 |
+
DLG algorithm
|
923 |
+
DLG
|
924 |
+
Mean Square
|
925 |
+
Error
|
926 |
+
Improved al-
|
927 |
+
gorithms
|
928 |
+
Improved algo-
|
929 |
+
rithms Mean
|
930 |
+
Square Error
|
931 |
+
|
932 |
+
|
933 |
+
24.06
|
934 |
+
|
935 |
+
19.54
|
936 |
+
|
937 |
+
|
938 |
+
47.55
|
939 |
+
|
940 |
+
42.45
|
941 |
+
|
942 |
+
|
943 |
+
40.11
|
944 |
+
|
945 |
+
25.36
|
946 |
+
|
947 |
+
|
948 |
+
28.81
|
949 |
+
|
950 |
+
24.34
|
951 |
+
|
952 |
+
|
953 |
+
30.30
|
954 |
+
|
955 |
+
22.41
|
956 |
+
|
957 |
+
|
958 |
+
28.35
|
959 |
+
|
960 |
+
15.28
|
961 |
+
From the above table, it can be seen that the number of pixel points present in the
|
962 |
+
images is positively correlated with the mean square error between the images during
|
963 |
+
the restoration of the dog and cat images. It can be visually seen from the image
|
964 |
+
|
965 |
+
19
|
966 |
+
rendering effect that the improved algorithm has relatively fewer random pixel points
|
967 |
+
present and the mean squared error between the images and the original image is
|
968 |
+
smaller.
|
969 |
+
4.3
|
970 |
+
Experimental results and analysis
|
971 |
+
The DLG attack algorithm used in this paper can attack and restore the vast majority
|
972 |
+
of the original cat and dog pictures based on the gradient, as shown in Figure 7 and
|
973 |
+
Figure 8. Meanwhile, as shown in Table 2, the mean square error between the original
|
974 |
+
data and the original data also tends to the minimum value, which basically stays around
|
975 |
+
3. However, in the training of a large number of images, it was found that there existed
|
976 |
+
a part of images with poor convergence, which still left randomly generated pixel
|
977 |
+
points. Such images usually have some areas with lighter color nearly white, and after
|
978 |
+
improving the algorithm, as shown in Table 3, it can be observed that the improved
|
979 |
+
algorithm has better restoration of the lighter color areas and the mean square error
|
980 |
+
between the original pixel images is smaller. It illustrates that the reconstruction attack
|
981 |
+
based on gradient features is basically able to restore the local data images in the federal
|
982 |
+
learning system.
|
983 |
+
4.4
|
984 |
+
Summary of this chapter
|
985 |
+
This chapter is the implementation and improvement of the gradient feature-based
|
986 |
+
reconstruction attack. The first subsection introduces the programming language used
|
987 |
+
to implement the algorithm, the programming environment, and all the libraries used;
|
988 |
+
the second subsection describes the dataset used and shows the results of the imple-
|
989 |
+
mentation of the attack algorithm in detail; the third subsection analyzes the results and
|
990 |
+
demonstrates that the gradient feature-based reconstruction attack can be a threat to the
|
991 |
+
local data of the federal learning system[34-55].
|
992 |
+
5
|
993 |
+
Conclusion and Outlook
|
994 |
+
5.1
|
995 |
+
Conclusion
|
996 |
+
In this paper, we study the reconstruction attack based on gradient features, mainly
|
997 |
+
using deep learning techniques and algorithms[56-62] for reconstruction attacks. This
|
998 |
+
paper investigates the mechanism of federation learning, the structural hierarchy of con-
|
999 |
+
volutional neural networks (CNNs), and the deep gradient leakage (DLG) algorithm
|
1000 |
+
that does not rely on the original dataset for the attack.
|
1001 |
+
In this paper, the cat and dog classification dataset is selected as the training model
|
1002 |
+
for federation learning, and LeNet, one of the models in CNN, is used for data training.
|
1003 |
+
The python language and various libraries in PyCharm are used to complete the recon-
|
1004 |
+
struction attack based on gradient features, and the original attack algorithm is im-
|
1005 |
+
proved to make the effect of the restored original image better, which proves that the
|
1006 |
+
federation learning gradient has the risk of information leakage.
|
1007 |
+
|
1008 |
+
20
|
1009 |
+
5.2
|
1010 |
+
Deficiencies and problems
|
1011 |
+
In this paper, the gradient-based attack is implemented for the gradient in the federal
|
1012 |
+
learning system using relevant techniques, but some problems are found in the imple-
|
1013 |
+
mentation and testing sessions of the attack, which need continuous improvement and
|
1014 |
+
optimization.
|
1015 |
+
(1) When trying to restore high-resolution images, the attack algorithm is not stable
|
1016 |
+
enough, the convergence speed is too slow, and the restoration effect is not good.
|
1017 |
+
(2) When the attack algorithm is applied to images containing only two colors (such
|
1018 |
+
as black and white) with large differences, it may fail to converge or converge poorly,
|
1019 |
+
and the images have a large number of random pixel points.
|
1020 |
+
(3) The attack algorithm can only do one gradient input to restore an original image
|
1021 |
+
for the time being, and cannot input multiple gradients to restore multiple images at the
|
1022 |
+
same time.
|
1023 |
+
(4) The current algorithm still has problems such as the applicability is not wide
|
1024 |
+
enough, and it cannot attack the training model of text class and so on.
|
1025 |
+
5.3
|
1026 |
+
Outlook for follow-up work
|
1027 |
+
Federation learning system will be more widely used in future artificial intelligence
|
1028 |
+
technology, although it is not yet seen in some industries, but because of its high effi-
|
1029 |
+
ciency, it must be used more in the future to bring more convenient and fast life to
|
1030 |
+
human beings. The research in this paper raises certain questions about the confidenti-
|
1031 |
+
ality of federal learning, and this attack algorithm can be further studied and optimized
|
1032 |
+
in depth subsequently.
|
1033 |
+
(1) The DLG algorithm can restore most of the images at present, but there are still
|
1034 |
+
some problems, and the follow-up work hopes to continue to improve this algorithm,
|
1035 |
+
and improve the convergence speed and accuracy of the restoration of the algorithm.
|
1036 |
+
(2) Different training set categories and training set sizes may affect the training ef-
|
1037 |
+
fect and attack effect of the CNN network, which can be supplemented with different
|
1038 |
+
categories of images to strengthen the attack algorithm.
|
1039 |
+
(3) This attack algorithm temporarily cannot attack multiple images in batch, and the
|
1040 |
+
attack speed is slow, which can be further improved to enhance the efficiency.
|
1041 |
+
Reference
|
1042 |
+
[1]
|
1043 |
+
McMahan, H.B., Moore, E., Ramage, D., Hampson, S., et al. “Communication efficient learning of deep net-
|
1044 |
+
works from decentralized data”, Proceedings of the 20th International Conference on Artificial Intelligence
|
1045 |
+
and Statistics, 2017, PMLR 54:1273-1282.
|
1046 |
+
[2]
|
1047 |
+
Jochems, A., et al.: Developing and validating a survival prediction model for NSCLC patients through dis-
|
1048 |
+
tributed learning across 3 countries. Int. J. Radiat. Oncol. Biol. Phys. 99(2), 344–352 (2017)
|
1049 |
+
[3]
|
1050 |
+
Yang, Q., Liu, Y., Chen, T., Tong, Y.: Federated machine learning: concept and applications. ACM Trans. Intell.
|
1051 |
+
Syst. Technol. 2019, (TIST) 10(2), 1–19
|
1052 |
+
[4]
|
1053 |
+
Krizhevsky, A.: Learning multiple layers of features from tiny images. Citeseer, Technical report ,2009.
|
1054 |
+
[5]
|
1055 |
+
Yang Q, Liu Y, Chen T J, et al. Federated Machine Learning[J]. ACM Transactions on Intelligent Systems and
|
1056 |
+
Technology, 2019, 10(2): 1-19.
|
1057 |
+
|
1058 |
+
21
|
1059 |
+
[6]
|
1060 |
+
Z Xiao, D Xiao, V Havyarimana, H Jiang, D Liu, D Wang, F Zeng. Toward accurate vehicle state estimation
|
1061 |
+
under non-Gaussian noises[J]. IEEE Internet of Things Journal, 2019, 6(6): 10652-10664.
|
1062 |
+
[7]
|
1063 |
+
P Zhang, X Chen, X Ma, Y Wu, H Jiang, D Fang, Z Tang, Y Ma. SmartMTra: Robust indoor trajectory tracing
|
1064 |
+
using smartphones[J]. IEEE Sensors Journal, 2017, 17(12): 3613-3624.
|
1065 |
+
[8]
|
1066 |
+
G. Liu, C. Wang, K. Peng, H. Huang, Y. Li and W. Cheng, "SocInf: Membership Inference Attacks on Social
|
1067 |
+
Media Health Data With Machine Learning," in IEEE Transactions on Computational Social Systems, Oct.
|
1068 |
+
2019, vol. 6, no. 5, pp. 907-921.
|
1069 |
+
[9]
|
1070 |
+
Pan X, Zhang M, Yan Y, Zhu J, Yang M. Exploring the Security Boundary of Data Reconstruction via Neuron
|
1071 |
+
Exclusivity Analysis[J]. arXiv:2010.13356 [cs, stat], 2021.
|
1072 |
+
[10] Zhao Q, Zhao C, Cui S, Jing S, Chen Z. PrivateDL: Privacy-preserving collaborative deep learning against
|
1073 |
+
leakage from gradient sharing[J]. International Journal of Intelligent Systems, 2020, 35(8): 1262–1279.
|
1074 |
+
[11] Z. Wang, M. Song, Z. Zhang, Y. Song, Q. Wang and H. Qi, “Beyond Inferring Class Representatives:
|
1075 |
+
User-Level Privacy Leak from Federated Learning”, IEEE INFOCOM 2019 - IEEE Conference on Computer
|
1076 |
+
Communications,2019, pp. 2512-2520.
|
1077 |
+
[12] Jie Li, Fanzi Zeng, Zhu Xiao, Hongbo Jiang, Zhirun Zheng, Wenping Liu, Ju Ren. Drive2friends: Inferring
|
1078 |
+
social relationships from individual vehicle mobility data[J]. IEEE Internet of Things Journal, 2020, 7(6):
|
1079 |
+
5116-5127.
|
1080 |
+
[13] L. Melis, C. Song, E. De Cristofaro and V. Shmatikov, “Exploiting Unintended Feature Leakage in Collabora-
|
1081 |
+
tive Learning,” 2019 IEEE Symposium on Security and Privacy (SP), 2019, pp. 691-706.
|
1082 |
+
[14] M. Nasr, R. Shokri and A. Houmansadr, “Comprehensive Privacy Analysis of Deep Learning: Passive and
|
1083 |
+
Active White-box Inference Attacks against Centralized and Federated Learning,” 2019 IEEE Symposium on
|
1084 |
+
Security and Privacy (SP), 2019, pp. 739-753.
|
1085 |
+
[15] Fredrikson, M., Jha, S., Ristenpart, T., “Model inversion attacks that exploit confidence information and basic
|
1086 |
+
countermeasures”, Proceedings of the 22nd ACMSIGSAC Conference on Computer and Communications Se-
|
1087 |
+
curity, 2015, pp. 1322–1333.
|
1088 |
+
[16] B. Hitaj, G.Ateniese, Fernando, “Deep Models Under the GAN: Information Leakage from Collaborative Deep
|
1089 |
+
Learning”, Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Secu-
|
1090 |
+
rity,2017,pp. 603–618.
|
1091 |
+
[17] Salem A, Zhang Y, Humbert M, et al. “Model and Data Independent Membership Inference Attacks and De-
|
1092 |
+
fenses on Machine Learning Models”, 2019 Network and Distributed System Security Symposium, 2019, pp.
|
1093 |
+
1-15.
|
1094 |
+
[18] Jiahui Geng, Yongli Mou, Feifei Li, Qing Li, Oya Beyan. Towards General Deep Leakage in Federated Learn-
|
1095 |
+
ing[J/OL]. arXiv:2110.09074[cs], 2021[2022-01-04].
|
1096 |
+
[19] Zhao, B., Mopuri, K.R., Bilen, H.: iDLG: improved deep leakage from gradients. 2020, arXiv preprint
|
1097 |
+
arXiv:2001.02610
|
1098 |
+
[20] Geiping, J.; Bauermeister, H.; Dr¨oge, H.; and Moeller, M. “Inverting Gradients - How easy is it to break
|
1099 |
+
privacy in federated learning? ”, Advances in Neural Information Processing Systems 33,NeurIPS ,2020.
|
1100 |
+
[21] Hongxu Yin, Arun Mallya, Arash Vahdat, Jose M. Alvarez, Jan Kautz, Pavlo Molchanov. “See Through Gra-
|
1101 |
+
dients: Image Batch Recovery via GradInversion”, Proceedings of the IEEE/CVF Conference on Computer
|
1102 |
+
Vision and Pattern Recognition (CVPR), 2021, pp. 16337-16346
|
1103 |
+
[22] T Liu, JCS Lui, X Ma, H Jiang. Enabling relay-assisted D2D communication for cellular networks: Algorithm
|
1104 |
+
and protocols[J]. IEEE Internet of Things Journal, 2018, 5(4): 3136-3150.
|
1105 |
+
[23] D Wang, J Fan, Z Xiao, H Jiang, H Chen, F Zeng, K Li. Stop-and-wait: Discover aggregation effect based on
|
1106 |
+
private car trajectory data[J]. IEEE transactions on intelligent transportation systems, 2018, 20(10): 3623-3633.
|
1107 |
+
[24] H Jiang, W Liu, D Wang, C Tian, X Bai, X Liu, Y Wu, W Liu. CASE: Connectivity-based skeleton extraction
|
1108 |
+
|
1109 |
+
22
|
1110 |
+
in wireless sensor networks[C]//IEEE INFOCOM 2009. IEEE, 2009: 2916-2920.
|
1111 |
+
[25] Ji S, Xu W, Yang M, et al.3D Convolutional Neural Networks for Human Action Recognition[J]. IEEE Trans-
|
1112 |
+
actions on Pattern Analysis & Machine Intelligence,2013,35(1):221-231
|
1113 |
+
[26] Tran D, Bourdev L, Fergus R, et al. “Learning Spatiotemporal Features with 3D Convolutional Network”.
|
1114 |
+
Proceedings of the IEEE International Conference on Computer Vision (ICCV), 2015, pp. 4489-4497.
|
1115 |
+
[27] X Ma, H Wang, H Li, J Liu, H Jiang. Exploring sharing patterns for video recommendation on YouTube-like
|
1116 |
+
social media[J]. Multimedia Systems, 2014, 20(6): 675-691.
|
1117 |
+
[28] Shokri, R., Stronati, M., Song, C., Shmatikov, V.“Membership inference attacks against machine learning mod-
|
1118 |
+
els”,2017 IEEE Symposium on Security and Privacy (SP), 2017, pp. 3–18 IEEE
|
1119 |
+
[29] Yang, D., Zhang, D., Yu, Z., Yu, Z.: Fine-grained preference-aware location search leveraging crowdsourced
|
1120 |
+
digital footprints from LBSNs. In: Proceedings of the 2013 ACM International Joint Conference on Pervasive
|
1121 |
+
and Ubiquitous Computing, 2013, pp.479–488
|
1122 |
+
[30] Huang, G.B., Ramesh, M., Berg, T., Learned-Miller, E.: Labeled faces in the wild: a database for studying face
|
1123 |
+
recognition in unconstrained environments. University of Massachusetts, Amherst, Technical Report 07-49,
|
1124 |
+
October 2007
|
1125 |
+
[31] Goodfellow, I., et al.: Generative adversarial nets. In: Advances in Neural Information Processing Systems,
|
1126 |
+
2014, pp. 2672–2680
|
1127 |
+
[32] Geiping, J., Bauermeister, H., Dr¨oge, H., Moeller, M.: Inverting gradients-how easy is it to break privacy in
|
1128 |
+
federated learning? 2020, arXiv preprint arXiv:2003.14053
|
1129 |
+
[33] Zhu, L., Liu, Z., Han, S. “Deep leakage from gradients”, Annual Conference on Neural Information Processing
|
1130 |
+
Systems, (NeurIPS) (2019)
|
1131 |
+
[34] Ping Zhao, Hongbo Jiang, John C. S. Lui, Chen Wang, Fanzi Zeng, Fu Xiao, and Zhetao Li. P3-LOC: A Pri-
|
1132 |
+
vacy-Preserving Paradigm-Driven Framework for Indoor Localization. IEEE/ACM Transactions on Network-
|
1133 |
+
ing (ToN), vol. 26, no. 6, pp. 2856-2869, 2018.
|
1134 |
+
[35] Hongbo Jiang, Yuanmeng Wang, Ping Zhao, Zhu Xiao. A Utility-Aware General Framework with Quantifiable
|
1135 |
+
Privacy Preservation for Destination Prediction in LBSs. IEEE/ACM Transactions on Networking (ToN), vol.
|
1136 |
+
29, no. 5, pp. 2228-2241, 2021.
|
1137 |
+
[36] Ping Zhao, Jiaxin Sun, and Guanglin Zhang. DAML: Practical Secure Protocol for Data Aggregation based on
|
1138 |
+
Machine Learning. ACM Transactions on Sensor Networks, vol. 16, no. 4, pp. 1-18, 2020.
|
1139 |
+
[37] Ping Zhao, Wuwu Liu, Guanglin Zhang, Zongpeng Li, and Lin Wang. Preserving Privacy in WiFi Localization
|
1140 |
+
with Plausible Dummy Locations. IEEE Transactions on Vehicular Technology, vol. 69, no. 10, pp. 11909-
|
1141 |
+
11925, 2020.
|
1142 |
+
[38] Guanglin Zhang, Anqi Zhang, Ping Zhao, and Jiaxin Sun. Lightweight Privacy-Preserving Scheme in WiFi
|
1143 |
+
Fingerprint-Based Indoor Localization. IEEE Systems Journal, vol. 14, no. 3, pp. 4638-4647, 2020.
|
1144 |
+
[39] Ping Zhao, Jie Li, Fanzi Zeng, Fu Xiao, Chen Wang, Hongbo Jiang. ILLIA: Enabling k-Anonymity-based
|
1145 |
+
Privacy Preserving against Location Injection Attacks in continuous LBS Query. IEEE Internet of Things Jour-
|
1146 |
+
nal, vol. 5, no. 2, pp. 1033–1042, 2018.
|
1147 |
+
[40] Ping Zhao, Hongbo Jiang, Jie Li, Fanzi Zeng, Xiao Zhu, Kun Xie, and Guanglin Zhang. Synthesizing Privacy
|
1148 |
+
Preserving Traces: Enhancing Plausibility with Social Networks. IEEE/ACM Transactions on Networking
|
1149 |
+
(ToN), vol. 27, no. 6, pp. 2391 – 2404, 2019.
|
1150 |
+
[41] Ping Zhao, Jiawei Tao, Guanglin Zhang. Deep Reinforcement Learning-based Joint Optimization of Delay and
|
1151 |
+
Privacy
|
1152 |
+
in
|
1153 |
+
Multiple-User
|
1154 |
+
MEC
|
1155 |
+
Systems.
|
1156 |
+
IEEE
|
1157 |
+
Transactions
|
1158 |
+
on
|
1159 |
+
Cloud
|
1160 |
+
Computing,
|
1161 |
+
DOI:
|
1162 |
+
10.1109/TCC.2022.3140231, 2022.
|
1163 |
+
[42] Ping Zhao, Hongbo Jiang, Jie Li, Zhu Xiao, Daibo Liu, Ju Ren, Deke Guo. Garbage in, Garbage out: Poisoning
|
1164 |
+
Attacks Disguised with Plausible Mobility in Data Aggregation. IEEE Transactions on Network Science and
|
1165 |
+
|
1166 |
+
23
|
1167 |
+
Engineering (TNSE), vol. 8, no. 3, pp. 2679-2693, 2021.
|
1168 |
+
[43] Ping Zhao, Xiaohui Zhao, Daiyu Huang, H. Huang. Privacy-Preserving Scheme against Location Data Poi-
|
1169 |
+
soning Attacks in Mobile-Edge Computing. IEEE Transactions on Computational Social Systems, vol. 7, no.
|
1170 |
+
3, pp. 818-826, 2020.
|
1171 |
+
[44] Ping Zhao, Chen Wang, and Hongbo Jiang. On the Performance of k -Anonymity against Inference Attacks
|
1172 |
+
with Background Information. IEEE Internet of Things Journal, vol. 6, no. 1, pp. 808–819, 2018.
|
1173 |
+
[45] Guanglin Zhang, Sifan Ni, and Ping Zhao. Enhancing Privacy Preservation in Speech Data Publishing. IEEE
|
1174 |
+
Internet of Things Journal, vol. 7, no. 8, pp. 7357-7367, 2020.
|
1175 |
+
[46] Guanglin Zhang, Anqi Zhang, Ping Zhao. LocMIA: Membership Inference Attacks against Aggregated Loca-
|
1176 |
+
tion Data. IEEE Internet of Things Journal, vol. 7, no. 12, pp. 11778-11788, 2020.
|
1177 |
+
[47] Guanglin Zhang, Sifan Ni and Ping Zhao. Learning-based Joint Optimization of Energy-Delay and Privacy in
|
1178 |
+
Multiple-User Edge-Cloud Collaboration MEC Systems. IEEE Internet of Things Journal, doi:
|
1179 |
+
10.1109/JIOT.2021.3088607, 2021.
|
1180 |
+
[48] P. Zhao, Z. Cao, J. Jiang and F. Gao, "Practical Private Aggregation in Federated Learning Against Inference
|
1181 |
+
Attack," in IEEE Internet of Things Journal, 2022, doi: 10.1109/JIOT.2022.3201231.
|
1182 |
+
[49] Hongbo Jiang, Yu Zhang, Zhu Xiao, Ping Zhao and Arun Iyengar. An Empirical Study of Travel Behavior
|
1183 |
+
Using Private Car Trajectory Data. IEEE Transactions on Network Science and Engineering, vol. 8, no. 1, pp.
|
1184 |
+
53-64, 2021.
|
1185 |
+
[50] H Jiang, W Liu, D Wang, C Tian, X Bai, X Liu, Y Wu, W Liu. Connectivity-based skeleton extraction in
|
1186 |
+
wireless sensor networks[J]. IEEE Transactions on Parallel and Distributed Systems, 2009, 21(5): 710-721.
|
1187 |
+
[51] H Jiang, S Jin, C Wang. Parameter-based data aggregation for statistical information extraction in wireless
|
1188 |
+
sensor networks[J]. IEEE Transactions on Vehicular Technology, 2010, 59(8): 3992-4001.
|
1189 |
+
[52] Yennun Huang, Yih-Farn Chen, Rittwik Jana, Hongbo Jiang, Michael Rabinovich, Amy Reibman, Bin Wei,
|
1190 |
+
Zhen Xiao. Capacity analysis of MediaGrid: a P2P IPTV platform for fiber to the node (FTTN) networks[J].
|
1191 |
+
IEEE Journal on Selected Areas in Communications, 2007, 25(1): 131-139.
|
1192 |
+
[53] W Liu, D Wang, H Jiang, W Liu, C Wang. Approximate convex decomposition based localization in wireless
|
1193 |
+
sensor networks[C]//2012 Proceedings IEEE INFOCOM. IEEE, 2012: 1853-1861.
|
1194 |
+
[54] C Tian, H Jiang, X Liu, X Wang, W Liu, Y Wang. Tri-message: A lightweight time synchronization protocol
|
1195 |
+
for high latency and resource-constrained networks[C]//2009 IEEE International Conference on Communica-
|
1196 |
+
tions. IEEE, 2009: 1-5.
|
1197 |
+
[55] Y Huang, Z Xiao, D Wang, H Jiang, D Wu. Exploring individual travel patterns across private car trajectory
|
1198 |
+
data[J]. IEEE Transactions on Intelligent Transportation Systems, 2019, 21(12): 5036-5050.
|
1199 |
+
[56] K Chen, C Wang, Z Yin, H Jiang, G Tan. Slide: Towards fast and accurate mobile fingerprinting for Wi-Fi
|
1200 |
+
indoor positioning systems[J]. IEEE Sensors Journal, 2017, 18(3): 1213-1223.
|
1201 |
+
[57] H Huang, H Yin, G Min, H Jiang, J Zhang, Y Wu. Data-driven information plane in software-defined network-
|
1202 |
+
ing[J]. IEEE Communications Magazine, 2017, 55(6): 218-224.
|
1203 |
+
[58] S Wang, A Vasilakos, H Jiang, X Ma, W Liu, K Peng, B Liu, Y Dong. Energy efficient broadcasting using
|
1204 |
+
network coding aware protocol in wireless ad hoc network[C]//2011 IEEE International Conference on Com-
|
1205 |
+
munications (ICC). IEEE, 2011: 1-5.
|
1206 |
+
[59] H Jiang, Z Ge, S Jin, J Wang. Network prefix-level traffic profiling: Characterizing, modeling, and evalua-
|
1207 |
+
tion[J]. Computer Networks, 2010, 54(18): 3327-3340.
|
1208 |
+
[60] H Jiang, A Iyengar, E Nahum, W Segmuller, A Tantawi, CP Wright. Load balancing for SIP server clus-
|
1209 |
+
ters[C]//IEEE INFOCOM 2009. IEEE, 2009: 2286-2294.
|
1210 |
+
[61] H Jiang, P Zhao, C Wang. RobLoP: Towards robust privacy preserving against location dependent attacks in
|
1211 |
+
continuous LBS queries[J]. IEEE/ACM Transactions on Networking, 2018, 26(2): 1018-1032.
|
1212 |
+
|
1213 |
+
24
|
1214 |
+
[62] H Jiang, J Cheng, D Wang, C Wang, G Tan. Continuous multi-dimensional top-k query processing in sensor
|
1215 |
+
networks[C]//2011 Proceedings IEEE INFOCOM. IEEE, 2011: 793-801.
|
1216 |
+
|
1217 |
+
|
5tE0T4oBgHgl3EQfvwEb/content/tmp_files/load_file.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
5tE4T4oBgHgl3EQf1g0M/content/tmp_files/2301.05290v1.pdf.txt
ADDED
@@ -0,0 +1,1569 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
EUROPEAN ORGANIZATION FOR NUCLEAR RESEARCH (CERN)
|
2 |
+
CERN-EP-2022-280
|
3 |
+
2023/01/16
|
4 |
+
CMS-HIN-21-006
|
5 |
+
K0
|
6 |
+
S and Λ (Λ) two-particle femtoscopic correlations in PbPb
|
7 |
+
collisions at √sNN = 5.02 TeV
|
8 |
+
The CMS Collaboration
|
9 |
+
Abstract
|
10 |
+
Two-particle correlations are presented for K0
|
11 |
+
S, Λ, and Λ strange hadrons as a func-
|
12 |
+
tion of relative momentum in lead-lead collisions at a nucleon-nucleon center-of-mass
|
13 |
+
energy of 5.02 TeV. The dataset corresponds to an integrated luminosity of 0.607 nb−1
|
14 |
+
and was collected using the CMS detector at the CERN LHC. These correlations are
|
15 |
+
sensitive to quantum statistics and to final-state interactions between the particles.
|
16 |
+
The source size extracted from the K0
|
17 |
+
SK0
|
18 |
+
S correlations is found to decrease from 4 to
|
19 |
+
1 fm in going from central to peripheral collisions. Strong interaction scattering pa-
|
20 |
+
rameters (i.e., scattering length and effective range) are determined from the ΛK0
|
21 |
+
S and
|
22 |
+
ΛΛ (including their charge conjugates) correlations using the Lednick´y–Lyuboshitz
|
23 |
+
model and are compared to theoretical and other experimental results.
|
24 |
+
Submitted to Physics Letters B
|
25 |
+
© 2023 CERN for the benefit of the CMS Collaboration. CC-BY-4.0 license
|
26 |
+
arXiv:2301.05290v1 [nucl-ex] 12 Jan 2023
|
27 |
+
|
28 |
+
|
29 |
+
1
|
30 |
+
1
|
31 |
+
Introduction
|
32 |
+
Two-particle correlations in relative momentum, so-called femtoscopic correlations, arising
|
33 |
+
from relativistic heavy ion collisions provide a powerful tool for studying both the quark-gluon
|
34 |
+
plasma (QGP) that is created in the collisions, and the subsequent interactions of the emitted
|
35 |
+
particles [1]. All two-particle correlations are affected by final-state interaction (FSI) effects,
|
36 |
+
and correlations of identical particles are also sensitive to the constraints of quantum statistics
|
37 |
+
(QS). The correlations among the neutral K0
|
38 |
+
S, Λ, and Λ particles, collectively referred to as V0
|
39 |
+
particles, are of special interest. First, they can be used to determine the space-time extent of
|
40 |
+
the QGP. In addition, information can be extracted about the strong-interaction scattering pa-
|
41 |
+
rameters, i.e., the scattering length and the effective range, that is impossible to obtain from
|
42 |
+
currently achievable scattering experiments [2–6]. Because of their relatively heavy mass and
|
43 |
+
the absence of a Coulomb interaction, femtoscopy based on K0
|
44 |
+
S particles supplements the more
|
45 |
+
commonly studied pion and charged kaon pairs [7]. The results from ΛΛ correlation studies
|
46 |
+
can help constrain baryon-baryon and, more specifically, hyperon-hyperon interaction models
|
47 |
+
that are used, for example, in modeling the composition of neutron stars [8–10].
|
48 |
+
Regarding the scattering parameters, of particular interest is establishing whether the interac-
|
49 |
+
tion between two Λ particles allows for the existence of the H-dibaryon, a bound state with
|
50 |
+
quantum numbers I = 0, JP = 0+, S = −2. In 1977, R. L. Jaffe predicted the existence of such a
|
51 |
+
six-quark (uuddss) state having a mass about 81 MeV below the threshold of twice the Λ mass
|
52 |
+
by considering the strong attraction resulting from color magnetic interactions [11]. Although
|
53 |
+
a double hypernucleus,
|
54 |
+
6
|
55 |
+
ΛΛHe, was subsequently observed in the NAGARA event from the
|
56 |
+
E313 hybrid emulsion experiment at KEK [12, 13], the observed ΛΛ binding energy was not
|
57 |
+
consistent with the conjectured H-dibaryon [14]. A study of ΛΛ correlations may provide ad-
|
58 |
+
ditional information on whether the baryon-baryon interaction can lead to the formation of the
|
59 |
+
conjectured H-dibaryon.
|
60 |
+
Recently, the ALICE Collaboration reported on ΛK correlations in lead-lead (PbPb) collisions
|
61 |
+
at a center-of-mass energy per nucleon pair of √sNN = 2.76 TeV [15]. According to their find-
|
62 |
+
ings, the strong force is repulsive in ΛK+ interactions, yet attractive in ΛK− interactions. For
|
63 |
+
the ΛK0
|
64 |
+
S pairs, the uncertainty of the ALICE results does not permit a definite conclusion
|
65 |
+
on whether the associated strong interaction is repulsive or attractive. A more precise mea-
|
66 |
+
surement of ΛK0
|
67 |
+
S correlations should improve our understanding of the strong interaction in
|
68 |
+
baryon-meson systems.
|
69 |
+
This Letter presents K0
|
70 |
+
SK0
|
71 |
+
S, ΛK0
|
72 |
+
S, and ΛΛ femtoscopic correlations as a function of relative
|
73 |
+
momentum in PbPb collisions at √sNN = 5.02 TeV, using data recorded by the CMS experi-
|
74 |
+
ment during the 2018 LHC run. The K0
|
75 |
+
SK0
|
76 |
+
S correlations are measured in six centrality intervals
|
77 |
+
within the 0–60% range, where centrality refers to the percentage of the total inelastic hadronic
|
78 |
+
nucleus-nucleus cross section [16], and 0% corresponds to the maximum overlap of the col-
|
79 |
+
liding nuclei. The K0
|
80 |
+
SK0
|
81 |
+
S, ΛK0
|
82 |
+
S, and ΛΛ correlations are measured in an integrated centrality
|
83 |
+
range (0–80%), with the ΛΛ femtoscopic correlation measured in PbPb collisions at the LHC
|
84 |
+
for the first time. The source size and strong interaction parameters are determined using the
|
85 |
+
Lednick´y–Lyuboshitz (LL) model [17]. Unless otherwise indicated, all measurements include
|
86 |
+
the charge conjugate states, so ΛK0
|
87 |
+
S and ΛΛ include ΛK0
|
88 |
+
S and ΛΛ, respectively. Tabulated
|
89 |
+
results are provided in the HEPData record for this analysis [18].
|
90 |
+
|
91 |
+
2
|
92 |
+
2
|
93 |
+
Experimental setup and data sample
|
94 |
+
The central feature of the CMS apparatus is a superconducting solenoid of 6 m internal diam-
|
95 |
+
eter, providing a magnetic field of 3.8 T. Within the solenoid volume there is a silicon pixel
|
96 |
+
and strip tracker, a lead tungstate crystal electromagnetic calorimeter, and a brass and scintil-
|
97 |
+
lator hadron calorimeter, each composed of a barrel and two endcap sections. The silicon pixel
|
98 |
+
detector [19] is composed of 1856 silicon pixel modules distributed in four 54 cm long bar-
|
99 |
+
rel layers at radii of 2.9–16.0 cm plus three pairs of endcap disks covering radii of 4.5–16.1 cm
|
100 |
+
at longitudinal distances of 31–51 cm from the origin. The 15 148 silicon strip module are ar-
|
101 |
+
ranged in 10 barrel layers at radii of 20–116 cm plus 3 pairs of small and 9 pairs of large endcap
|
102 |
+
disk layers. Charged particles of pseudorapidity |η| < 3 are reconstructed with the combined
|
103 |
+
system. For particles with transverse momentum of 1 < pT < 10 GeV, the track resolutions
|
104 |
+
are typically 1.5% in pT and 20–75 µm in the transverse impact parameter [20]. The barrel and
|
105 |
+
endcap detectors are extended to the forward region with two calorimeters which use steel as
|
106 |
+
the absorber and quartz fibers as the sensitive material. These hadron forward (HF) calorime-
|
107 |
+
ters are located 11.2 m from the interaction region, one on each side, and provide coverage in
|
108 |
+
the range 3.0 < |η| < 5.2. These detectors are segmented into multiple 0.175×0.175 (∆η×∆φ)
|
109 |
+
“towers”, where φ is azimuthal angle in radians. Muons are measured in gas-ionization detec-
|
110 |
+
tors embedded in the steel flux-return yoke outside the solenoid. Events of interest are selected
|
111 |
+
using a two-tiered trigger system. The first level, composed of custom hardware processors,
|
112 |
+
uses information from the calorimeters and muon detectors to select events at a rate of around
|
113 |
+
100 kHz within a fixed latency of about 4 µs [21]. The second level, known as the high-level
|
114 |
+
trigger, consists of a farm of processors running a version of the full event reconstruction soft-
|
115 |
+
ware optimized for fast processing, and reduces the event rate to around 1 kHz before data
|
116 |
+
storage [22]. A more detailed description of the CMS detector, together with a definition of the
|
117 |
+
coordinate system used and the relevant kinematic variables, can be found in Ref. [23].
|
118 |
+
With an integrated luminosity of 0.607 nb−1 [24, 25], this analysis uses 4.27 × 109 minimum bias
|
119 |
+
events that are triggered by requiring signals above the readout threshold of 3 GeV in each of
|
120 |
+
the HF calorimeters [22]. Background events due to beam-gas interactions and non-hadronic
|
121 |
+
collisions are filtered offline by applying the procedure described in Ref. [26]. The events used
|
122 |
+
in this analysis are required to have at least one primary interaction vertex determined using
|
123 |
+
two or more tracks [27] within a distance of 15 cm from the center of the nominal interaction
|
124 |
+
point along the beam axis and to have at least two calorimeter towers in each HF detector with
|
125 |
+
energy deposits of more than 4 GeV per tower. The shapes of the clusters in the pixel detector
|
126 |
+
are required to be compatible with those expected in PbPb collisions in order to suppress the
|
127 |
+
contamination from events with multiple collisions [28]. The combined trigger and offline
|
128 |
+
selection efficiency for inelastic events is greater than 95%. The event centrality is obtained from
|
129 |
+
the transverse energy deposited in both HF calorimeters, using the methodology described in
|
130 |
+
Ref. [29]. The analysis makes use of a minimum bias Monte Carlo PbPb sample, based on the
|
131 |
+
HYDJET 1.9 [30] event generator with a full detector simulation using GEANT4 [31].
|
132 |
+
3
|
133 |
+
Reconstruction of K0
|
134 |
+
S and Λ candidates
|
135 |
+
The K0
|
136 |
+
S and Λ candidates, denoted as V0 candidates, used in this study are reconstructed as in
|
137 |
+
previous CMS analyses [32–34]. The V0 candidates are found by combining oppositely charged
|
138 |
+
tracks that pass criteria based on the “loose” selection discussed in Ref. [27]. The charged tracks
|
139 |
+
are assumed to be π+π− in K0
|
140 |
+
S reconstruction and π−p in Λ reconstruction. For the latter, the
|
141 |
+
higher momentum track is assumed to be a proton since the proton carries nearly all of the mo-
|
142 |
+
mentum in the Λ decay. Each of the oppositely charged tracks must have hits in at least three
|
143 |
+
|
144 |
+
3
|
145 |
+
layers of the silicon tracker, and both tracks must have transverse and longitudinal impact pa-
|
146 |
+
rameter significances (defined as the parameter value divided by its uncertainty) with respect
|
147 |
+
to the primary vertex greater than 1. The two tracks are fitted to a common vertex and the χ2
|
148 |
+
per degree of freedom (dof) from the fit must be less than 7. The distance of closest approach
|
149 |
+
between the two tracks is required to be less than 1 cm. As a consequence of the long lifetime of
|
150 |
+
K0
|
151 |
+
S and Λ particles, the significance of the V0 decay length, which is the three-dimensional dis-
|
152 |
+
tance between the primary and V0 vertices divided by its uncertainty, is required to be greater
|
153 |
+
than 2.5 to reduce combinatorial background contributions. To remove K0
|
154 |
+
S candidates misiden-
|
155 |
+
tified as Λ particles and vice versa, the Λ (K0
|
156 |
+
S) candidates must have a corresponding ππ (pπ)
|
157 |
+
mass more than 14 (7) MeV (corresponding to approximately 3 times the average resolution)
|
158 |
+
away from the world-average value [35] of the K0
|
159 |
+
S (Λ) mass. The angle θ between the V0 mo-
|
160 |
+
mentum vector and the vector connecting the primary and V0 vertices is required to satisfy
|
161 |
+
cos θ > 0.999. This reduces the contribution from nuclear interactions, random combinations
|
162 |
+
of tracks, and Λ particles originating from weak decays of Ξ and Ω particles.
|
163 |
+
Further selection of V0 candidates is performed with a boosted decision tree (BDT) [36]. The se-
|
164 |
+
lection is optimized separately for K0
|
165 |
+
S and Λ candidates. The discriminating variables include:
|
166 |
+
the collision centrality, the V0 candidate pT and rapidity (y), the distance of closest approach
|
167 |
+
of the track pair, the three-dimensional decay length and significance, cos θ, and the V0 ver-
|
168 |
+
tex fit χ2. The included variables related to the V0 daughters are pT, uncertainty in pT, η, the
|
169 |
+
number of hits in the silicon tracker, the number of pixel detector layers with hits, and the
|
170 |
+
transverse and longitudinal impact parameter significances with respect to the primary ver-
|
171 |
+
tex. The BDT training is performed using the simulated minimum bias sample separated into
|
172 |
+
the signal and background subsamples using the generator-level information. The K0
|
173 |
+
S mesons
|
174 |
+
are selected with 1 < pT < 8.5 GeV and |y| < 1, while the Λ baryons are required to have
|
175 |
+
1.8 < pT < 8.5 GeV and |y| < 1. The minimum pT and maximum y requirements are used to
|
176 |
+
reduce background while the maximum pT requirement is to reduce contributions from jets.
|
177 |
+
The combined V0 reconstruction and selection efficiencies are strongly dependent on the cen-
|
178 |
+
trality of the event and the pT of the V0. Integrating over the selected pT ranges, the combined
|
179 |
+
efficiencies from the most central to peripheral PbPb collisions are 1–3% for K0
|
180 |
+
S and 1–2% for
|
181 |
+
Λ. The V0 reconstruction algorithm does not prevent a track from being used for more than
|
182 |
+
one V0. While this is normally an infrequent occurrence, selecting pairs of V0 particles close
|
183 |
+
together in phase space makes it a significant contribution. To resolve this problem, for each
|
184 |
+
correlation measurement, a check of each pair of V0 candidates is performed and if two V0 can-
|
185 |
+
didates are found to share one or both daughter tracks, one of the V0 candidates is randomly
|
186 |
+
selected to be removed from the event.
|
187 |
+
Fits to the invariant mass spectrum are performed using a sum of three Gaussian functions
|
188 |
+
with a common mean to describe the signal distribution and a fourth-order polynomial to de-
|
189 |
+
scribe the background. These empirical functions were chosen to provide a good description of
|
190 |
+
the data. Peak and sideband invariant mass regions are defined to select events dominated by
|
191 |
+
signal and background, respectively. Defining σ as the average resolution based on the Gaus-
|
192 |
+
sian sum, the peak regions are selected to be within ±2σ from the nominal V0 mass and are
|
193 |
+
given by 486 < M(π+π−) < 509 MeV and 1111.5 < M(pπ−) < 1120.4 MeV for K0
|
194 |
+
S and Λ
|
195 |
+
candidates, respectively. The sideband regions are selected to be more than 4σ from the nom-
|
196 |
+
inal V0 mass and are given by 23.5 < |M(π+π−) − 497.5| < 62.5 MeV for K0
|
197 |
+
S candidates and
|
198 |
+
1080 < M(pπ−) < 1107.5 MeV together with 1124.2 < M(pπ−) < 1160 MeV for Λ candidates.
|
199 |
+
Examples of invariant mass distributions for π+π− and pπ− pairs, and their corresponding
|
200 |
+
fits in the 0–80% centrality range, are shown in Fig. 1.
|
201 |
+
|
202 |
+
4
|
203 |
+
0.45
|
204 |
+
0.5
|
205 |
+
0.55
|
206 |
+
invariant mass (GeV)
|
207 |
+
−
|
208 |
+
π
|
209 |
+
+
|
210 |
+
π
|
211 |
+
6
|
212 |
+
10
|
213 |
+
7
|
214 |
+
10
|
215 |
+
8
|
216 |
+
10
|
217 |
+
Candidates / (0.5 MeV)
|
218 |
+
Data
|
219 |
+
Fit
|
220 |
+
Background
|
221 |
+
Peak region
|
222 |
+
Sideband region
|
223 |
+
)
|
224 |
+
-1
|
225 |
+
= 5.02 TeV (0.607 nb
|
226 |
+
NN
|
227 |
+
s
|
228 |
+
PbPb,
|
229 |
+
CMS
|
230 |
+
S
|
231 |
+
0
|
232 |
+
K
|
233 |
+
Centrality: 0-80%
|
234 |
+
< 8.5 GeV
|
235 |
+
T
|
236 |
+
1 < p
|
237 |
+
|y| < 1
|
238 |
+
1.08
|
239 |
+
1.1
|
240 |
+
1.12
|
241 |
+
1.14
|
242 |
+
1.16
|
243 |
+
invariant mass (GeV)
|
244 |
+
+
|
245 |
+
π
|
246 |
+
p
|
247 |
+
+
|
248 |
+
−
|
249 |
+
π
|
250 |
+
p
|
251 |
+
5
|
252 |
+
10
|
253 |
+
6
|
254 |
+
10
|
255 |
+
Candidates / (0.5 MeV)
|
256 |
+
Data
|
257 |
+
Fit
|
258 |
+
Background
|
259 |
+
Peak region
|
260 |
+
Sideband region
|
261 |
+
)
|
262 |
+
-1
|
263 |
+
= 5.02 TeV (0.607 nb
|
264 |
+
NN
|
265 |
+
s
|
266 |
+
PbPb,
|
267 |
+
CMS
|
268 |
+
Λ
|
269 |
+
+
|
270 |
+
Λ
|
271 |
+
Centrality: 0-80%
|
272 |
+
< 8.5 GeV
|
273 |
+
T
|
274 |
+
1.8 < p
|
275 |
+
|y| < 1
|
276 |
+
Figure 1: The invariant mass of K0
|
277 |
+
S (left) and Λ (right), and their corresponding fits in the 0–80%
|
278 |
+
centrality range. The circles are the data, and the fit is shown with a solid (red) line for the total
|
279 |
+
fit, and a dashed (green) line for the background fit. The vertical dashed-dotted (pink) lines
|
280 |
+
indicate the peak region and the vertical dashed (blue) lines indicate the sideband regions.
|
281 |
+
4
|
282 |
+
Analysis method
|
283 |
+
The two-particle correlation is constructed as
|
284 |
+
Cobs(qinv) = N Aobs(qinv)
|
285 |
+
Bobs(qinv) ,
|
286 |
+
(1)
|
287 |
+
where Cobs(qinv) is the observed normalized pair yield, corrected for detector effects, as a func-
|
288 |
+
tion of the invariant relative momentum qinv, defined as [1]
|
289 |
+
qinv =
|
290 |
+
�
|
291 |
+
−QµQµ,
|
292 |
+
Qµ = (k1 − k2)µ − (k1 − k2)µPµ
|
293 |
+
PµPµ
|
294 |
+
Pµ,
|
295 |
+
(2)
|
296 |
+
where P = k1 + k2, and k1 and k2 are the four momenta of the V0 particles. Note that for two
|
297 |
+
particles of the same mass, the second term of Qµ is zero.
|
298 |
+
The distribution Aobs(qinv) is the signal distribution that contains femtoscopic correlations
|
299 |
+
formed by pairing the selected V0 particles from a given event. The reference distribution
|
300 |
+
Bobs(qinv) is used to correct for phase space effects, largely removing artifacts due to detector
|
301 |
+
non-uniformities in the Aobs(qinv) distribution. The Bobs(qinv) distribution is constructed by
|
302 |
+
mixing the V0 particles from different events [37]. In this procedure, the V0 particle from one
|
303 |
+
event is paired with V0 particles from 30 different events. To ensure that the 30 events used
|
304 |
+
in the mixing are similar to the signal events, the centrality and primary vertex of each mixed
|
305 |
+
event must be within 5% and 2 cm, respectively, of those in the corresponding signal event.
|
306 |
+
The normalization factor N is the ratio of the number of pairs in the reference distribution
|
307 |
+
to that in the signal distribution. Because of the background in the peak region of the invari-
|
308 |
+
ant mass distributions, the measured signal distribution (Aobs(qinv)) contains contributions
|
309 |
+
from signal-signal (Ass(qinv)), signal-background (Asb(qinv)), and background-background
|
310 |
+
(Abb(qinv)) correlations. The measured Aobs(qinv) distribution can be written as
|
311 |
+
Aobs(qinv) = f ssAss(qinv) + f sbAsb(qinv) + f bbAbb(qinv).
|
312 |
+
(3)
|
313 |
+
|
314 |
+
5
|
315 |
+
The distributions Asb(qinv) and Abb(qinv) are obtained from the peak-sideband and sideband-
|
316 |
+
sideband combinations, respectively. The small amount of background (signal) contamination
|
317 |
+
in the signal (sideband) region has a negligible effect on the shape of Asb(qinv) (Abb(qinv)). All
|
318 |
+
distributions, Aobs(qinv), Asb(qinv), and Abb(qinv) are normalized to unity. The parameters, f ss,
|
319 |
+
f sb, and f bb are the signal-signal, signal-background, and background-background fractions,
|
320 |
+
extracted using an invariant mass fit based on combinatorial analyses with
|
321 |
+
f ss =
|
322 |
+
(s
|
323 |
+
2)
|
324 |
+
(s+b
|
325 |
+
2 )
|
326 |
+
,
|
327 |
+
f bb =
|
328 |
+
(b
|
329 |
+
2)
|
330 |
+
(s+b
|
331 |
+
2 )
|
332 |
+
, and
|
333 |
+
f sb = 1 − f ss − f bb,
|
334 |
+
(4)
|
335 |
+
where (n
|
336 |
+
2) = n(n−1)
|
337 |
+
2
|
338 |
+
is the binomial coefficient, which returns the number of ways that a pair can
|
339 |
+
be chosen from n objects. The quantities s and b in the binomial coefficients are the number of
|
340 |
+
signal and background particles, respectively, obtained by integrating the appropriate function
|
341 |
+
from the fit to the invariant mass distribution.
|
342 |
+
Once we have all the distributions (Aobs(qinv), Asb(qinv), and Abb(qinv)) and the parameters
|
343 |
+
( f ss, f sb, and f bb), the Ass(qinv) distribution can be extracted using Eq. (3), with
|
344 |
+
Ass(qinv) =
|
345 |
+
�
|
346 |
+
Aobs(qinv) − f sb(Asb(qinv)) − f bb(Abb(qinv))
|
347 |
+
�
|
348 |
+
/ f ss.
|
349 |
+
(5)
|
350 |
+
The same procedure is followed for the reference distribution. After extracting the Ass(qinv)
|
351 |
+
and Bss(qinv) distributions, the correlation distribution is calculated as
|
352 |
+
Css(qinv) = N Ass(qinv)
|
353 |
+
Bss(qinv) .
|
354 |
+
(6)
|
355 |
+
While the Css(qinv) distribution is corrected for detector effects and non-V0 backgrounds, it
|
356 |
+
still includes non-femtoscopic background correlations, such as those associated with elliptic
|
357 |
+
flow [38], minijets [7], resonance decays [7], and energy-momentum conservation [39]. The
|
358 |
+
non-femtoscopic background contribution is modeled using an empirically determined double
|
359 |
+
Gaussian function
|
360 |
+
Ω(qinv) = N
|
361 |
+
�
|
362 |
+
1 + α1e−q2
|
363 |
+
invR2
|
364 |
+
1
|
365 |
+
� �
|
366 |
+
1 − α2e−q2
|
367 |
+
invR2
|
368 |
+
2
|
369 |
+
�
|
370 |
+
,
|
371 |
+
(7)
|
372 |
+
where N, α1, α2, R1, and R2 are fit parameters. This function was selected for its reproduction
|
373 |
+
of the distributions in both real data at high qinv and simulated data that do not include the
|
374 |
+
correlations being measured.
|
375 |
+
Fits are performed to the Css(qinv) distributions to extract the source size and strong interaction
|
376 |
+
scattering parameters. As the V0 particles are neutral, the Coulomb interaction is absent. How-
|
377 |
+
ever, the correlations are sensitive to QS and FSI effects, with s-wave interactions assumed to
|
378 |
+
dominate for the small relative momenta of the particle pairs analyzed. The correlation distri-
|
379 |
+
bution for all pairs (K0
|
380 |
+
SK0
|
381 |
+
S, ΛK0
|
382 |
+
S, and ΛΛ) is interpreted in the LL model. This model relates the
|
383 |
+
two-particle correlation function to the source size and also takes into account FSI effects [17].
|
384 |
+
The general correlation function is
|
385 |
+
Ctotal(qinv) =
|
386 |
+
�
|
387 |
+
1 + λ
|
388 |
+
�
|
389 |
+
CQS(qinv) + CFSI(qinv)
|
390 |
+
��
|
391 |
+
Ω(qinv),
|
392 |
+
(8)
|
393 |
+
|
394 |
+
6
|
395 |
+
where CQS(qinv) is the QS function and CFSI(qinv) is the FSI function. The parameter λ is re-
|
396 |
+
ferred to as the incoherence parameter. In the absence of FSI effects, λ equals unity for a
|
397 |
+
perfectly incoherent Gaussian source. Effects such as resonance decay violate the incoherent
|
398 |
+
source assumption and can lead to deviations of the λ parameter from the unity. Its value
|
399 |
+
can also be affected by non-Gaussian components of the correlations function and by the FSI
|
400 |
+
between particles.
|
401 |
+
Neglecting CP violation, the K0
|
402 |
+
SK0
|
403 |
+
S system can be written as
|
404 |
+
|K0
|
405 |
+
SK0
|
406 |
+
S⟩ = 1
|
407 |
+
2
|
408 |
+
�
|
409 |
+
|K0K0⟩ + |K0K0⟩ + |K0K0⟩ + |K0K0⟩
|
410 |
+
�
|
411 |
+
.
|
412 |
+
(9)
|
413 |
+
It can be shown [17, 40] that the resulting correlations follow Bose–Einstein quantum statistics,
|
414 |
+
with
|
415 |
+
CQS(qinv) = e(−q2
|
416 |
+
invR2
|
417 |
+
inv),
|
418 |
+
(10)
|
419 |
+
where the source radius Rinv reflects the size of the region over which the particles are emitted.
|
420 |
+
The FSI for the K0
|
421 |
+
SK0
|
422 |
+
S correlations is modeled by [17, 40]
|
423 |
+
CFSI(qinv) = 1
|
424 |
+
2
|
425 |
+
�����
|
426 |
+
f (k)
|
427 |
+
Rinv
|
428 |
+
����
|
429 |
+
2
|
430 |
+
+ 4ℜ f (k)
|
431 |
+
√πRinv
|
432 |
+
F1(qinvRinv) − 2ℑ f (k)
|
433 |
+
Rinv
|
434 |
+
F2(qinvRinv)
|
435 |
+
�
|
436 |
+
,
|
437 |
+
(11)
|
438 |
+
where
|
439 |
+
k = qinv/2,
|
440 |
+
F1(z) = 1
|
441 |
+
2e−z2 � z
|
442 |
+
0 ex2dx, and
|
443 |
+
F2(z) = 1 − e−z2
|
444 |
+
z
|
445 |
+
.
|
446 |
+
(12)
|
447 |
+
The function f (k) is the K0K0 s-wave scattering amplitude, with real and imaginary parts ℜ f (k)
|
448 |
+
and ℑ f (k), respectively. This amplitude is dominated by the near-threshold s-wave isoscalar
|
449 |
+
resonance f0(980) and the s-wave isovector resonance a0(980), with the total scattering ampli-
|
450 |
+
tude given by an average of these contributions: f (k) = ( ff0(980)(k) + fa0(980)(k))/2. The indi-
|
451 |
+
vidual resonance amplitudes depend on the resonance mass mr, with r = f0(980) or a0(980),
|
452 |
+
the kaon mass mK, and the resonance couplings γr (γ′
|
453 |
+
r) to the K0K0 (ππ for f0(980) and π0η
|
454 |
+
for a0(980) channels. Then, fr(k) = γr/
|
455 |
+
�
|
456 |
+
m2
|
457 |
+
r − ζ − iγrk − iγ′
|
458 |
+
rk′
|
459 |
+
r
|
460 |
+
�
|
461 |
+
, where ζ = 4(m2
|
462 |
+
K + k2) and
|
463 |
+
k′
|
464 |
+
r denotes the momentum in the second (ππ or π0η) decay channel with the corresponding
|
465 |
+
partial width Γ′ = γ′
|
466 |
+
rk′
|
467 |
+
r/mr (more details can be found in Ref. [40]). The scattering amplitude
|
468 |
+
is calculated using the resonance mass and the coupling parameters from Refs. [41–44], taken
|
469 |
+
from row C of Table 1 of Ref. [40].
|
470 |
+
For the correlations involving Λ baryons, the CQS(qinv) and CFSI(qinv) functions are [17]
|
471 |
+
CQS(qinv) = αe(−q2
|
472 |
+
invR2
|
473 |
+
inv),
|
474 |
+
and
|
475 |
+
CFSI(qinv) = (1 + α)
|
476 |
+
�
|
477 |
+
1
|
478 |
+
2
|
479 |
+
| f (k)|2
|
480 |
+
R2
|
481 |
+
inv
|
482 |
+
�
|
483 |
+
1 −
|
484 |
+
1
|
485 |
+
2√π
|
486 |
+
d0
|
487 |
+
Rinv
|
488 |
+
� + 2ℜ f (k)
|
489 |
+
√πRinv
|
490 |
+
F1(qinvRinv) − ℑ f (k)
|
491 |
+
Rinv
|
492 |
+
F2(qinvRinv)
|
493 |
+
�
|
494 |
+
,
|
495 |
+
(13)
|
496 |
+
where α = −1/2 for ΛΛ correlations for two identical fermions and α = 0 for ΛK0
|
497 |
+
S corre-
|
498 |
+
lations as there are no QS effects for non-identical particles [17]. The scattering amplitude
|
499 |
+
|
500 |
+
7
|
501 |
+
f (k) is parameterized by a complex scattering length (f0) and an effective range (d0) with
|
502 |
+
f (k) = [1/ f0 + d0k2/2 − ik]−1 [17]. The imaginary part of f0 is responsible for inelastic pro-
|
503 |
+
cesses (annihilation). For an attractive interaction that is not strong enough to produce a bound
|
504 |
+
state, the real part of f0 is positive, while a repulsive interaction corresponds to a negative ℜ f0
|
505 |
+
of the order of the range of the repulsive potential. In the presence of a bound state, ℜ f0 is also
|
506 |
+
negative, but with a much larger magnitude. The femtoscopic sign convention and notation
|
507 |
+
for the scattering length differ from those used in nuclear physics, where the corresponding
|
508 |
+
scattering length a0 = − f0. As the ΛK0
|
509 |
+
S and ΛΛ correlations each have only one spin state that
|
510 |
+
contributes to the s-wave scattering, Eq. (13) suffices to describe the FSI effects.
|
511 |
+
Fits to the correlation distribution of all the pairs were performed using Eq. (8) with the non-
|
512 |
+
femtoscopic background parameters (N, α1, α2, R1, and R2) treated as free parameters. For
|
513 |
+
K0
|
514 |
+
SK0
|
515 |
+
S correlations, the parameters of interest are Rinv and λ, with the scattering amplitude
|
516 |
+
based on previous measurements [41–44]. The ΛK0
|
517 |
+
S and ΛΛ correlations include additional
|
518 |
+
parameters: d0, ℜ f0, and ℑ f0. The ℑ f0 term for ΛΛ correlations is set to zero since there are no
|
519 |
+
baryon-baryon annihilation processes.
|
520 |
+
Histograms of the correlation distributions are generated in the range 0 < qinv < 6 GeV with
|
521 |
+
0.02 GeV wide bins for the K0
|
522 |
+
SK0
|
523 |
+
S and ΛK0
|
524 |
+
S correlations and 0.04 GeV wide bins for the ΛΛ cor-
|
525 |
+
relations. The fits exclude the first qinv bin to avoid a potential bias from the method used to
|
526 |
+
address cases where V0 candidates share daughter tracks. Studies using simulated events in-
|
527 |
+
dicate that only this first bin is affected by this remediation. Least-square fits are performed to
|
528 |
+
the experimental data with the uncertainties in the fit parameters calculated using the MINOS
|
529 |
+
technique [45]. Examples of correlation measurements and their fits and corresponding χ2/dof
|
530 |
+
values, are presented in Figs. 2 and 3. The K0
|
531 |
+
SK0
|
532 |
+
S correlations, shown in Fig. 2, are independently
|
533 |
+
fitted for each of the six centrality bins with 0 < kT < 2.5 GeV, where kT ≡ |⃗pT,1 + ⃗pT,2|/2 is
|
534 |
+
the average transverse momentum of the particle pair. While the LL model assumes a Gaus-
|
535 |
+
sian source function, results from charged-particle correlations have demonstrated that this
|
536 |
+
assumption breaks down for peripheral collisions [46]. This is likely the cause of the poor fit
|
537 |
+
at low qinv for centralities above 40%. The ΛK0
|
538 |
+
S (left) and ΛΛ (right) correlations, shown in
|
539 |
+
Fig. 3, involve fewer events and, therefore, only a single fit is performed for each, with the data
|
540 |
+
integrated over the centrality range 0–80% and with no restriction on kT.
|
541 |
+
5
|
542 |
+
Systematic uncertainties
|
543 |
+
The systematic uncertainties for the fit parameters are based on the changes found in the pa-
|
544 |
+
rameter values after individually varying each of the analysis criteria, as discussed below. In
|
545 |
+
cases with more than one variation for a single source, the maximum deviation from the nom-
|
546 |
+
inal value is used. The total systematic uncertainty is obtained by adding the uncertainties
|
547 |
+
from each source in quadrature. The BDT discriminant is varied so as to adjust the signal-to-
|
548 |
+
background ratio, with the signal yield changing by ±15% in the process. The nominal method
|
549 |
+
to account for V0 candidates sharing daughter tracks is to remove one of the V0 candidates at
|
550 |
+
random, which is then not used by any pair. Two alternative approaches are used, one in which
|
551 |
+
both V0 candidates are removed and another in which, for events with multiple V0 candidate
|
552 |
+
pair combinations, only the pairs in which the two particles share a daughter are removed.
|
553 |
+
The systematic uncertainties related to V0 signal and background modeling are investigated by
|
554 |
+
varying the background shape from a fourth- to a third-order polynomial and the signal shape
|
555 |
+
from a sum of three Gaussian functions to a sum of two or four Gaussian functions. An alterna-
|
556 |
+
tive non-femtoscopic background function Ω(qinv) = N(1 + Be−|qinv/σ|2)(1 + ϵqinv) is used to
|
557 |
+
assess the uncertainty associated with the choice of the non-femtoscopic background function.
|
558 |
+
|
559 |
+
8
|
560 |
+
)
|
561 |
+
-1
|
562 |
+
= 5.02 TeV (0.607 nb
|
563 |
+
NN
|
564 |
+
s
|
565 |
+
PbPb,
|
566 |
+
CMS
|
567 |
+
0-10%
|
568 |
+
: 287
|
569 |
+
2
|
570 |
+
χ
|
571 |
+
0
|
572 |
+
S
|
573 |
+
K
|
574 |
+
0
|
575 |
+
S
|
576 |
+
K
|
577 |
+
dof: 292
|
578 |
+
30-40%
|
579 |
+
: 306
|
580 |
+
2
|
581 |
+
χ
|
582 |
+
0
|
583 |
+
S
|
584 |
+
K
|
585 |
+
0
|
586 |
+
S
|
587 |
+
K
|
588 |
+
dof: 292
|
589 |
+
10-20%
|
590 |
+
: 323
|
591 |
+
2
|
592 |
+
χ
|
593 |
+
0
|
594 |
+
S
|
595 |
+
K
|
596 |
+
0
|
597 |
+
S
|
598 |
+
K
|
599 |
+
dof: 292
|
600 |
+
40-50%
|
601 |
+
: 334
|
602 |
+
2
|
603 |
+
χ
|
604 |
+
0
|
605 |
+
S
|
606 |
+
K
|
607 |
+
0
|
608 |
+
S
|
609 |
+
K
|
610 |
+
dof:292
|
611 |
+
20-30%
|
612 |
+
: 312
|
613 |
+
2
|
614 |
+
χ
|
615 |
+
0
|
616 |
+
S
|
617 |
+
K
|
618 |
+
0
|
619 |
+
S
|
620 |
+
K
|
621 |
+
dof: 292
|
622 |
+
50-60%
|
623 |
+
: 353
|
624 |
+
2
|
625 |
+
χ
|
626 |
+
0
|
627 |
+
S
|
628 |
+
K
|
629 |
+
0
|
630 |
+
S
|
631 |
+
K
|
632 |
+
dof: 292
|
633 |
+
< 8.5 GeV
|
634 |
+
T
|
635 |
+
1 < p
|
636 |
+
< 2.5 GeV
|
637 |
+
T
|
638 |
+
0 < k
|
639 |
+
Data
|
640 |
+
Full fit
|
641 |
+
Nonfemto
|
642 |
+
0
|
643 |
+
2
|
644 |
+
4
|
645 |
+
6
|
646 |
+
(GeV)
|
647 |
+
inv
|
648 |
+
q
|
649 |
+
1
|
650 |
+
1.5
|
651 |
+
2
|
652 |
+
)
|
653 |
+
inv
|
654 |
+
(q
|
655 |
+
ss
|
656 |
+
C
|
657 |
+
0
|
658 |
+
0.1
|
659 |
+
0.2
|
660 |
+
0.3
|
661 |
+
0.4
|
662 |
+
(GeV)
|
663 |
+
inv
|
664 |
+
q
|
665 |
+
1
|
666 |
+
1.5
|
667 |
+
2
|
668 |
+
)
|
669 |
+
inv
|
670 |
+
(q
|
671 |
+
ss
|
672 |
+
C
|
673 |
+
: 19
|
674 |
+
2
|
675 |
+
χ
|
676 |
+
# bins: 19
|
677 |
+
0
|
678 |
+
2
|
679 |
+
4
|
680 |
+
6
|
681 |
+
(GeV)
|
682 |
+
inv
|
683 |
+
q
|
684 |
+
1
|
685 |
+
1.5
|
686 |
+
2
|
687 |
+
)
|
688 |
+
inv
|
689 |
+
(q
|
690 |
+
ss
|
691 |
+
C
|
692 |
+
0
|
693 |
+
0.1
|
694 |
+
0.2
|
695 |
+
0.3
|
696 |
+
0.4
|
697 |
+
(GeV)
|
698 |
+
inv
|
699 |
+
q
|
700 |
+
0.8
|
701 |
+
1
|
702 |
+
1.2
|
703 |
+
1.4
|
704 |
+
)
|
705 |
+
inv
|
706 |
+
(q
|
707 |
+
ss
|
708 |
+
C
|
709 |
+
: 25
|
710 |
+
2
|
711 |
+
χ
|
712 |
+
# bins: 19
|
713 |
+
0
|
714 |
+
2
|
715 |
+
4
|
716 |
+
6
|
717 |
+
(GeV)
|
718 |
+
inv
|
719 |
+
q
|
720 |
+
1
|
721 |
+
1.5
|
722 |
+
2
|
723 |
+
)
|
724 |
+
inv
|
725 |
+
(q
|
726 |
+
ss
|
727 |
+
C
|
728 |
+
0
|
729 |
+
0.1
|
730 |
+
0.2
|
731 |
+
0.3
|
732 |
+
0.4
|
733 |
+
(GeV)
|
734 |
+
inv
|
735 |
+
q
|
736 |
+
1
|
737 |
+
1.5
|
738 |
+
)
|
739 |
+
inv
|
740 |
+
(q
|
741 |
+
ss
|
742 |
+
C
|
743 |
+
: 43
|
744 |
+
2
|
745 |
+
χ
|
746 |
+
# bins: 19
|
747 |
+
0
|
748 |
+
2
|
749 |
+
4
|
750 |
+
6
|
751 |
+
(GeV)
|
752 |
+
inv
|
753 |
+
q
|
754 |
+
1
|
755 |
+
1.5
|
756 |
+
2
|
757 |
+
)
|
758 |
+
inv
|
759 |
+
(q
|
760 |
+
ss
|
761 |
+
C
|
762 |
+
0
|
763 |
+
0.1
|
764 |
+
0.2
|
765 |
+
0.3
|
766 |
+
0.4
|
767 |
+
(GeV)
|
768 |
+
inv
|
769 |
+
q
|
770 |
+
1
|
771 |
+
1.5
|
772 |
+
)
|
773 |
+
inv
|
774 |
+
(q
|
775 |
+
ss
|
776 |
+
C
|
777 |
+
: 18
|
778 |
+
2
|
779 |
+
χ
|
780 |
+
# bins: 19
|
781 |
+
0
|
782 |
+
2
|
783 |
+
4
|
784 |
+
6
|
785 |
+
(GeV)
|
786 |
+
inv
|
787 |
+
q
|
788 |
+
1
|
789 |
+
1.5
|
790 |
+
2
|
791 |
+
)
|
792 |
+
inv
|
793 |
+
(q
|
794 |
+
ss
|
795 |
+
C
|
796 |
+
0
|
797 |
+
0.1
|
798 |
+
0.2
|
799 |
+
0.3
|
800 |
+
0.4
|
801 |
+
(GeV)
|
802 |
+
inv
|
803 |
+
q
|
804 |
+
1
|
805 |
+
1.5
|
806 |
+
2
|
807 |
+
2.5
|
808 |
+
)
|
809 |
+
inv
|
810 |
+
(q
|
811 |
+
ss
|
812 |
+
C
|
813 |
+
: 40
|
814 |
+
2
|
815 |
+
χ
|
816 |
+
# bins: 19
|
817 |
+
0
|
818 |
+
2
|
819 |
+
4
|
820 |
+
6
|
821 |
+
(GeV)
|
822 |
+
inv
|
823 |
+
q
|
824 |
+
1
|
825 |
+
1.5
|
826 |
+
2
|
827 |
+
)
|
828 |
+
inv
|
829 |
+
(q
|
830 |
+
ss
|
831 |
+
C
|
832 |
+
0
|
833 |
+
0.1
|
834 |
+
0.2
|
835 |
+
0.3
|
836 |
+
0.4
|
837 |
+
(GeV)
|
838 |
+
inv
|
839 |
+
q
|
840 |
+
1
|
841 |
+
1.5
|
842 |
+
)
|
843 |
+
inv
|
844 |
+
(q
|
845 |
+
ss
|
846 |
+
C
|
847 |
+
: 13
|
848 |
+
2
|
849 |
+
χ
|
850 |
+
# bins: 19
|
851 |
+
Figure 2: The correlation distributions and fits for K0
|
852 |
+
SK0
|
853 |
+
S pairs in different centrality ranges,
|
854 |
+
starting from 0–10% centrality to 50–60% centrality, with 0 < kT < 2.5 GeV. In each plot, the
|
855 |
+
red circles are the data, the blue solid line is the fit using Eq. (8), and the green dotted line is
|
856 |
+
the non-femtoscopic background from Eq. (7). The χ2 and dof values are for the full qinv range.
|
857 |
+
The insert plots show the data and the fit for the qinv < 0.4 GeV region, with the χ2 and number
|
858 |
+
of bins evaluated in that region.
|
859 |
+
0
|
860 |
+
1
|
861 |
+
2
|
862 |
+
3
|
863 |
+
4
|
864 |
+
5
|
865 |
+
6
|
866 |
+
(GeV)
|
867 |
+
inv
|
868 |
+
q
|
869 |
+
0.7
|
870 |
+
0.8
|
871 |
+
0.9
|
872 |
+
1
|
873 |
+
1.1
|
874 |
+
1.2
|
875 |
+
1.3
|
876 |
+
)
|
877 |
+
inv
|
878 |
+
(q
|
879 |
+
ss
|
880 |
+
C
|
881 |
+
Data
|
882 |
+
Full fit
|
883 |
+
Non-femto
|
884 |
+
Data
|
885 |
+
Full fit
|
886 |
+
Non-femto
|
887 |
+
)
|
888 |
+
-1
|
889 |
+
= 5.02 TeV (0.607 nb
|
890 |
+
NN
|
891 |
+
s
|
892 |
+
PbPb,
|
893 |
+
CMS
|
894 |
+
S
|
895 |
+
0
|
896 |
+
K
|
897 |
+
Λ
|
898 |
+
⊕
|
899 |
+
S
|
900 |
+
0
|
901 |
+
K
|
902 |
+
Λ
|
903 |
+
0-80%
|
904 |
+
< 8.5 GeV
|
905 |
+
Λ
|
906 |
+
/
|
907 |
+
Λ
|
908 |
+
T
|
909 |
+
1.8 < p
|
910 |
+
< 8.5 GeV
|
911 |
+
S
|
912 |
+
0
|
913 |
+
K
|
914 |
+
T
|
915 |
+
1 < p
|
916 |
+
T
|
917 |
+
all k
|
918 |
+
: 349
|
919 |
+
2
|
920 |
+
χ
|
921 |
+
dof: 289
|
922 |
+
0
|
923 |
+
0.1
|
924 |
+
0.2
|
925 |
+
0.3
|
926 |
+
0.4
|
927 |
+
(GeV)
|
928 |
+
inv
|
929 |
+
q
|
930 |
+
0.8
|
931 |
+
0.9
|
932 |
+
1
|
933 |
+
1.1
|
934 |
+
)
|
935 |
+
inv
|
936 |
+
(q
|
937 |
+
ss
|
938 |
+
C
|
939 |
+
: 21
|
940 |
+
2
|
941 |
+
χ
|
942 |
+
# bins: 19
|
943 |
+
0
|
944 |
+
1
|
945 |
+
2
|
946 |
+
3
|
947 |
+
4
|
948 |
+
5
|
949 |
+
6
|
950 |
+
(GeV)
|
951 |
+
inv
|
952 |
+
q
|
953 |
+
0.4
|
954 |
+
0.6
|
955 |
+
0.8
|
956 |
+
1
|
957 |
+
1.2
|
958 |
+
1.4
|
959 |
+
1.6
|
960 |
+
)
|
961 |
+
inv
|
962 |
+
(q
|
963 |
+
ss
|
964 |
+
C
|
965 |
+
Data
|
966 |
+
Full fit
|
967 |
+
Nonfemto
|
968 |
+
Data
|
969 |
+
Full fit
|
970 |
+
Nonfemto
|
971 |
+
)
|
972 |
+
-1
|
973 |
+
= 5.02 TeV (0.607 nb
|
974 |
+
NN
|
975 |
+
s
|
976 |
+
PbPb,
|
977 |
+
CMS
|
978 |
+
Λ
|
979 |
+
Λ
|
980 |
+
⊕
|
981 |
+
Λ
|
982 |
+
Λ
|
983 |
+
0-80%
|
984 |
+
< 8.5 GeV
|
985 |
+
T
|
986 |
+
1.8 < p
|
987 |
+
T
|
988 |
+
all k
|
989 |
+
: 124
|
990 |
+
2
|
991 |
+
χ
|
992 |
+
dof: 140
|
993 |
+
0
|
994 |
+
0.1
|
995 |
+
0.2
|
996 |
+
0.3
|
997 |
+
0.4
|
998 |
+
(GeV)
|
999 |
+
inv
|
1000 |
+
q
|
1001 |
+
0.4
|
1002 |
+
0.6
|
1003 |
+
0.8
|
1004 |
+
1
|
1005 |
+
)
|
1006 |
+
inv
|
1007 |
+
(q
|
1008 |
+
ss
|
1009 |
+
C
|
1010 |
+
: 5
|
1011 |
+
2
|
1012 |
+
χ
|
1013 |
+
# bins: 9
|
1014 |
+
Figure 3: The correlation distributions and fits for ΛK0
|
1015 |
+
S (left) and ΛΛ (right) pairs with 0–80%
|
1016 |
+
centrality and no restriction on kT. In each plot, the red circles are the data, the blue solid line is
|
1017 |
+
the fit using Eq. (8), and the green dotted line is the non-femtoscopic background from Eq. (7).
|
1018 |
+
The χ2 and dof values are for the full qinv range. The insert plots show the data and the fit for
|
1019 |
+
the qinv < 0.4 GeV region, with the χ2 and number of bins evaluated in that region.
|
1020 |
+
|
1021 |
+
9
|
1022 |
+
The selection requirements used to construct the mixed event sample are varied to require
|
1023 |
+
centrality matching of 3 and 7% instead of the nominal 5% and the primary vertex position
|
1024 |
+
matching with 1 and 3 cm instead of the nominal 2 cm. The effect of the centrality resolution
|
1025 |
+
has been checked and found to be negligible. The peak region requirement is changed from
|
1026 |
+
<2.0σ to <1.5σ and <2.5σ and the sideband region selection from >4.0σ to >3.5σ and >4.5σ.
|
1027 |
+
The upper limit of the qinv fit ranges is changed by ±1 GeV and the lower limit is changed to
|
1028 |
+
include the first bin. At low pT, the tracking efficiency is strongly dependent on pT. There-
|
1029 |
+
fore, the simulated sample is used to explore possible effects of the tracking efficiency. Based
|
1030 |
+
on these studies, it is found that the V0 reconstruction efficiency for the detection of two V0
|
1031 |
+
particles is well described by taking the product of the efficiency for each V0. It is also found
|
1032 |
+
that the fit results are only weakly affected by the V0 reconstruction efficiency. This is under-
|
1033 |
+
stood as a consequence of the signal and reference samples being similarly affected by the V0
|
1034 |
+
efficiency. Differences in the Monte Carlo and experimental pT spectra could influence the can-
|
1035 |
+
cellation of efficiency-dependent effects in the signal and background correlations. Therefore,
|
1036 |
+
a systematic uncertainty for the efficiency is assessed by comparing the results for the default
|
1037 |
+
simulated sample to one in which the V0 pT distribution is reweighted to match the data. For
|
1038 |
+
the K0
|
1039 |
+
SK0
|
1040 |
+
S correlations, an additional systematic uncertainty is found from varying the mass and
|
1041 |
+
coupling parameters for the f0(980) and a0(980) resonances by using rows A, B, and D of Table
|
1042 |
+
1 of Ref. [40]. The systematic uncertainties are summarized in Table 1.
|
1043 |
+
Table 1: Summary of absolute systematic uncertainties in K0
|
1044 |
+
SK0
|
1045 |
+
S, ΛK0
|
1046 |
+
S and ΛΛ correlation mea-
|
1047 |
+
surements. The values for Rinv, d0, ℜ f0, and ℑ f0 are in fm.
|
1048 |
+
Uncertainty source
|
1049 |
+
K0
|
1050 |
+
SK0
|
1051 |
+
S
|
1052 |
+
ΛK0
|
1053 |
+
S
|
1054 |
+
ΛΛ
|
1055 |
+
Rinv
|
1056 |
+
λ
|
1057 |
+
Rinv
|
1058 |
+
d0
|
1059 |
+
ℜ f0 ℑ f0
|
1060 |
+
λ
|
1061 |
+
Rinv
|
1062 |
+
d0
|
1063 |
+
ℜ f0
|
1064 |
+
λ
|
1065 |
+
BDT cut
|
1066 |
+
0.04–0.18 0.01–0.04
|
1067 |
+
0.19 0.75 0.10 0.07 0.03
|
1068 |
+
0.06 0.43 0.05 0.31
|
1069 |
+
Duplicate V0 removal
|
1070 |
+
0.06–0.40 0.01–0.08
|
1071 |
+
0.35 0.92 0.10 0.19 0.11
|
1072 |
+
0.01 1.14 0.05 0.14
|
1073 |
+
Mass fit function
|
1074 |
+
0.00–0.01 0.00–0.01
|
1075 |
+
0.09 0.05 0.01 0.03 0.03
|
1076 |
+
0.02 0.04 0.01 0.02
|
1077 |
+
Non-femtoscopic func. 0.02–0.16 0.01–0.12
|
1078 |
+
0.02 0.17 0.05 0.07 0.03
|
1079 |
+
0.02 1.02 0.14 0.93
|
1080 |
+
Reference sample
|
1081 |
+
0.03–0.08 0.01–0.05
|
1082 |
+
0.22 0.48 0.12 0.12 0.03
|
1083 |
+
0.10 1.12 0.20 0.76
|
1084 |
+
Peak region
|
1085 |
+
0.00–0.07 0.01–0.02
|
1086 |
+
0.43 0.10 0.05 0.17 0.08
|
1087 |
+
0.22 1.21 0.08 0.35
|
1088 |
+
Sideband region
|
1089 |
+
0.00–0.03 0.00–0.01
|
1090 |
+
0.02 0.02 0.01 0.01 0.00
|
1091 |
+
0.01 0.03 0.01 0.04
|
1092 |
+
Fitting range
|
1093 |
+
0.01–0.11 0.01–0.04
|
1094 |
+
0.20 0.18 0.03 0.08 0.04
|
1095 |
+
0.04 1.79 0.20 0.60
|
1096 |
+
Efficiency
|
1097 |
+
0.03–0.03 0.01–0.01
|
1098 |
+
0.08 0.29 0.06 0.09 0.03
|
1099 |
+
0.02 0.05 0.03 0.04
|
1100 |
+
f0(980)/a0(980) param. 0.07–0.39 0.03–0.05
|
1101 |
+
—
|
1102 |
+
—
|
1103 |
+
—
|
1104 |
+
—
|
1105 |
+
—
|
1106 |
+
—
|
1107 |
+
—
|
1108 |
+
—
|
1109 |
+
—
|
1110 |
+
Total uncertainty
|
1111 |
+
0.29–0.47 0.08–0.16
|
1112 |
+
0.69 1.34 0.21 0.32 0.16
|
1113 |
+
0.25 2.91 0.34 1.43
|
1114 |
+
6
|
1115 |
+
Results
|
1116 |
+
The size of the particle emitting source Rinv and the λ parameter extracted from the K0
|
1117 |
+
SK0
|
1118 |
+
S cor-
|
1119 |
+
relations for 0 < kT < 2.5 GeV are shown as a function of centrality in Fig. 4. It is observed that
|
1120 |
+
the Rinv value decreases from central to peripheral events, as expected from a simple geometric
|
1121 |
+
picture of the collisions. Over the full centrality range of 0–80%, Rinv = 3.30 ± 0.10 (stat) ±
|
1122 |
+
0.37 (syst) fm. The transverse mass can be calculated as mT =
|
1123 |
+
√
|
1124 |
+
(minv/2)2 + k2
|
1125 |
+
T, where minv
|
1126 |
+
is the invariant mass of the two-particle system [15]. The average ⟨mT⟩ is evaluated from the
|
1127 |
+
transverse mass distribution using two-particle pairs with qinv < 0.4 GeV, accounting for back-
|
1128 |
+
ground using the binomial analysis as done for the qinv distributions. Our results for Rinv agree
|
1129 |
+
with the ALICE K0
|
1130 |
+
SK0
|
1131 |
+
S results from PbPb collisions at √sNN = 2.76 TeV at a similar mT value [47].
|
1132 |
+
The λ parameter is seen to decrease from about 0.45 to 0.25 as the collisions become more pe-
|
1133 |
+
|
1134 |
+
10
|
1135 |
+
ripheral. This decrease could arise from a relative increase in the contribution from resonance
|
1136 |
+
decays or a source function that becomes increasingly non-Gaussian as the collisions become
|
1137 |
+
more peripheral. The assumption of a Gaussian source function in the LL model may also be
|
1138 |
+
responsible for the relatively poor fits at low qinv for the most peripheral collisions, as seen in
|
1139 |
+
Fig. 2.
|
1140 |
+
0
|
1141 |
+
10
|
1142 |
+
20
|
1143 |
+
30
|
1144 |
+
40
|
1145 |
+
50
|
1146 |
+
60
|
1147 |
+
0
|
1148 |
+
1
|
1149 |
+
2
|
1150 |
+
3
|
1151 |
+
4
|
1152 |
+
5
|
1153 |
+
)
|
1154 |
+
-1
|
1155 |
+
= 5.02 TeV (0.607 nb
|
1156 |
+
NN
|
1157 |
+
s
|
1158 |
+
PbPb,
|
1159 |
+
CMS
|
1160 |
+
< 8.5 GeV
|
1161 |
+
T
|
1162 |
+
1 < p
|
1163 |
+
< 2.5 GeV
|
1164 |
+
T
|
1165 |
+
0 < k
|
1166 |
+
Centrality (%)
|
1167 |
+
(fm)
|
1168 |
+
inv
|
1169 |
+
R
|
1170 |
+
0
|
1171 |
+
S
|
1172 |
+
K
|
1173 |
+
0
|
1174 |
+
S
|
1175 |
+
K
|
1176 |
+
0
|
1177 |
+
10
|
1178 |
+
20
|
1179 |
+
30
|
1180 |
+
40
|
1181 |
+
50
|
1182 |
+
60
|
1183 |
+
0
|
1184 |
+
0.2
|
1185 |
+
0.4
|
1186 |
+
0.6
|
1187 |
+
0.8
|
1188 |
+
1
|
1189 |
+
)
|
1190 |
+
-1
|
1191 |
+
= 5.02 TeV (0.607 nb
|
1192 |
+
NN
|
1193 |
+
s
|
1194 |
+
PbPb,
|
1195 |
+
CMS
|
1196 |
+
< 8.5 GeV
|
1197 |
+
T
|
1198 |
+
1 < p
|
1199 |
+
< 2.5 GeV
|
1200 |
+
T
|
1201 |
+
0 < k
|
1202 |
+
Centrality (%)
|
1203 |
+
λ
|
1204 |
+
0
|
1205 |
+
S
|
1206 |
+
K
|
1207 |
+
0
|
1208 |
+
S
|
1209 |
+
K
|
1210 |
+
Figure 4: The Rinv (left) and λ parameter (right) as a function of centrality. For each data point,
|
1211 |
+
the line and shaded area indicate the statistical and systematic uncertainty, respectively.
|
1212 |
+
Table 2 includes the extracted Rinv and λ parameters as well as ⟨mT⟩ for K0
|
1213 |
+
SK0
|
1214 |
+
S, ΛK0
|
1215 |
+
S, and ΛΛ
|
1216 |
+
combinations in the 0–80% centrality range. A significant decrease is seen in Rinv as the ⟨mT⟩
|
1217 |
+
increases. Qualitatively similar results have been found, both for a given pair type in bins of
|
1218 |
+
mT and when comparing multiple pair types [1]. Because of the different minimum pT require-
|
1219 |
+
ments for K0
|
1220 |
+
S and Λ particles, the variation in ⟨mT⟩ includes both ⟨pT⟩ and particle mass differ-
|
1221 |
+
ences. The anticorrelation of Rinv and ⟨mT⟩ has been interpreted as indicating the presence of
|
1222 |
+
an expanding source [1].
|
1223 |
+
Table 2 also includes the strong interaction scattering parameters d0, ℜ f0, and ℑ f0 obtained
|
1224 |
+
from the ΛK0
|
1225 |
+
S and ΛΛ correlations. Figure 5 shows d0 and ℑ f0 versus ℜ f0 in the left and
|
1226 |
+
right panels, respectively, with the current results shown as red stars and squares for ΛK0
|
1227 |
+
S and
|
1228 |
+
ΛΛ, respectively. The displayed uncertainties are one-dimensional and are not based on a
|
1229 |
+
two-dimensional contour.
|
1230 |
+
Table 2: Extracted values of the Rinv, ℜ f0, ℑ f0, d0, λ, and ⟨mT⟩ parameters from the K0
|
1231 |
+
SK0
|
1232 |
+
S, ΛK0
|
1233 |
+
S,
|
1234 |
+
and ΛΛ combinations in the 0–80% centrality range. The first and second uncertainties are
|
1235 |
+
statistical and systematic, respectively.
|
1236 |
+
Parameter
|
1237 |
+
K0
|
1238 |
+
SK0
|
1239 |
+
S
|
1240 |
+
ΛK0
|
1241 |
+
S
|
1242 |
+
ΛΛ
|
1243 |
+
Rinv (fm)
|
1244 |
+
3.30 ± 0.10 ± 0.37
|
1245 |
+
2.1+1.4
|
1246 |
+
−0.5 ± 0.7
|
1247 |
+
1.3+0.4
|
1248 |
+
−0.2 ± 0.3
|
1249 |
+
ℜ f0 (fm)
|
1250 |
+
—
|
1251 |
+
−0.76+0.29
|
1252 |
+
−0.19 ± 0.21
|
1253 |
+
0.74+0.59
|
1254 |
+
−0.16 ± 0.34
|
1255 |
+
ℑ f0 (fm)
|
1256 |
+
—
|
1257 |
+
−0.07+0.48
|
1258 |
+
−0.11 ± 0.32
|
1259 |
+
—
|
1260 |
+
d0 (fm)
|
1261 |
+
—
|
1262 |
+
2.3+0.7
|
1263 |
+
−0.5 ± 1.3
|
1264 |
+
4.2+5.7
|
1265 |
+
−2.1 ± 2.9
|
1266 |
+
λ
|
1267 |
+
0.38 ± 0.02 ± 0.08
|
1268 |
+
0.34+0.41
|
1269 |
+
−0.12 ± 0.16
|
1270 |
+
1.5+1.2
|
1271 |
+
−1.1 ± 1.4
|
1272 |
+
⟨mT⟩ (GeV)
|
1273 |
+
1.53
|
1274 |
+
2.09
|
1275 |
+
2.60
|
1276 |
+
|
1277 |
+
11
|
1278 |
+
2
|
1279 |
+
−
|
1280 |
+
1.5
|
1281 |
+
−
|
1282 |
+
1
|
1283 |
+
−
|
1284 |
+
0.5
|
1285 |
+
−
|
1286 |
+
0
|
1287 |
+
0.5
|
1288 |
+
1
|
1289 |
+
1.5
|
1290 |
+
2
|
1291 |
+
15
|
1292 |
+
−
|
1293 |
+
10
|
1294 |
+
−
|
1295 |
+
5
|
1296 |
+
−
|
1297 |
+
0
|
1298 |
+
5
|
1299 |
+
10
|
1300 |
+
15
|
1301 |
+
CMS
|
1302 |
+
AA collisions
|
1303 |
+
(fm)
|
1304 |
+
0
|
1305 |
+
f
|
1306 |
+
ℜ
|
1307 |
+
(fm)
|
1308 |
+
0
|
1309 |
+
d
|
1310 |
+
Λ
|
1311 |
+
Λ
|
1312 |
+
CMS (5.02 TeV):
|
1313 |
+
S
|
1314 |
+
0
|
1315 |
+
K
|
1316 |
+
Λ
|
1317 |
+
CMS (5.02 TeV):
|
1318 |
+
Λ
|
1319 |
+
Λ
|
1320 |
+
STAR (200 GeV):
|
1321 |
+
S
|
1322 |
+
0
|
1323 |
+
K
|
1324 |
+
Λ
|
1325 |
+
ALICE (2.76 TeV):
|
1326 |
+
Λ
|
1327 |
+
Λ
|
1328 |
+
PRC 91, 024916:
|
1329 |
+
Λ
|
1330 |
+
Λ
|
1331 |
+
PRC 66, 024007:
|
1332 |
+
Λ
|
1333 |
+
Λ
|
1334 |
+
NPA 707, 491:
|
1335 |
+
1.5
|
1336 |
+
−
|
1337 |
+
1
|
1338 |
+
−
|
1339 |
+
0.5
|
1340 |
+
−
|
1341 |
+
0
|
1342 |
+
0.5
|
1343 |
+
0.5
|
1344 |
+
−
|
1345 |
+
0
|
1346 |
+
0.5
|
1347 |
+
1
|
1348 |
+
CMS
|
1349 |
+
AA collisions
|
1350 |
+
(fm)
|
1351 |
+
0
|
1352 |
+
f
|
1353 |
+
ℜ
|
1354 |
+
(fm)
|
1355 |
+
0
|
1356 |
+
f
|
1357 |
+
ℑ
|
1358 |
+
S
|
1359 |
+
0
|
1360 |
+
K
|
1361 |
+
Λ
|
1362 |
+
CMS (5.02 TeV):
|
1363 |
+
S
|
1364 |
+
0
|
1365 |
+
K
|
1366 |
+
Λ
|
1367 |
+
ALICE (2.76 TeV):
|
1368 |
+
Figure 5: The measured values of d0 versus ℜ f0 (left) and ℑ f0 versus ℜ f0 (right) from this
|
1369 |
+
analysis along with other measurements and predictions as described in the text. For each
|
1370 |
+
data point, the lines and the boxes indicate the (one-dimensional) statistical and systematic
|
1371 |
+
uncertainties, respectively.
|
1372 |
+
The negative value of ℜ f0 observed for the ΛK0
|
1373 |
+
S correlations, combined with its relatively small
|
1374 |
+
magnitude, suggests a repulsive ΛK0
|
1375 |
+
S interaction. The uncertainty associated with the ℑ f0
|
1376 |
+
value for the ΛK0
|
1377 |
+
S correlations prevents any claim concerning possible inelastic processes. The
|
1378 |
+
value of ℜ f0 found for ΛK0
|
1379 |
+
S correlations differs from that reported by the ALICE Collaboration
|
1380 |
+
(teal diamonds) [15], which is also for PbPb collisions but at √sNN = 2.76 TeV. The uncertainties
|
1381 |
+
are too large to determine if d0 and ℑ f0 also differ between the two results.
|
1382 |
+
The positive ℜ f0 value obtained for the ΛΛ correlations suggests an attractive interaction
|
1383 |
+
that is not strong enough to produce a bound state such as the H-dibaryon [9, 48]. This re-
|
1384 |
+
sult disagrees with the finding from the STAR Collaboration in gold-gold (AuAu) collisions at
|
1385 |
+
√sNN = 200 GeV (blue circle). The negative ℜ f0 value of −1.10 ± 0.37 (stat)+0.68
|
1386 |
+
−0.08 (syst) fm found
|
1387 |
+
by STAR, combined with its magnitude, imply a repulsive interaction. It is noted, however,
|
1388 |
+
that a theoretical study of the STAR data which considers collective flow and feed-down effects
|
1389 |
+
(shown as a shaded region at d0 ≈ 5 fm, ℜ f0 ≈ 0.9 fm) suggests that these data are consistent
|
1390 |
+
with the ΛΛ interaction being attractive [9]. An exclusion plot by the ALICE Collaboration
|
1391 |
+
for the ΛΛ scattering parameters obtained using the ΛΛ correlations from pp collisions at
|
1392 |
+
√s = 7 and 13 TeV, as well as pPb collisions at √sNN = 5.02 TeV, also suggests an attractive
|
1393 |
+
interaction [10]. In addition, our results are consistent with two theoretical calculations (black
|
1394 |
+
triangles) that reproduce the ΛΛ binding energy of
|
1395 |
+
6
|
1396 |
+
ΛΛHe, as extracted from the NAGARA
|
1397 |
+
event [49, 50].
|
1398 |
+
7
|
1399 |
+
Summary
|
1400 |
+
The K0
|
1401 |
+
SK0
|
1402 |
+
S, ΛK0
|
1403 |
+
S, and ΛΛ femtoscopic correlations are studied using lead-lead (PbPb) collision
|
1404 |
+
data at a center-of-mass energy per nucleon pair of √sNN = 5.02 TeV, collected by the CMS Col-
|
1405 |
+
laboration. This is the first report on ΛΛ correlations in PbPb collisions at the CERN LHC. The
|
1406 |
+
source size Rinv and the incoherence parameter λ were extracted for K0
|
1407 |
+
SK0
|
1408 |
+
S correlations in six
|
1409 |
+
centrality bins covering the 0–60% range. The value of Rinv decreases from 4 to 1 fm going from
|
1410 |
+
central to peripheral collisions and agrees with results from the ALICE Collaboration at a sim-
|
1411 |
+
ilar transverse mass. Along with the Rinv and λ parameters, the strong interaction scattering
|
1412 |
+
parameters, i.e., the complex scattering length and effective range, were extracted from ΛK0
|
1413 |
+
S
|
1414 |
+
and ΛΛ correlations in the 0–80% centrality range. These scattering parameters indicate that
|
1415 |
+
|
1416 |
+
12
|
1417 |
+
the ΛK0
|
1418 |
+
S interaction is repulsive and that the ΛΛ interaction is attractive. The scattering param-
|
1419 |
+
eters obtained from ΛK0
|
1420 |
+
S correlations differ from those reported by the ALICE Collaboration.
|
1421 |
+
The positive real scattering length obtained from the ΛΛ correlation disfavors the existence
|
1422 |
+
of a bound H-dibaryon state. The ΛΛ scattering parameters help to constrain baryon-baryon
|
1423 |
+
and, more specifically, hyperon-hyperon interaction models. These measurements provide an
|
1424 |
+
additional input to understand the nature of the strong interaction between pairs of strange
|
1425 |
+
hadrons.
|
1426 |
+
References
|
1427 |
+
[1] M. A. Lisa, S. Pratt, R. Soltz, and U. Wiedemann, “Femtoscopy in relativistic heavy ion
|
1428 |
+
collisions: Two decades of progress”, Ann. Rev. Nucl. Part. Sci. 55 (2005) 357,
|
1429 |
+
doi:10.1146/annurev.nucl.55.090704.151533, arXiv:nucl-ex/0505014.
|
1430 |
+
[2] V. G. J. Stoks, R. A. M. Klomp, M. C. M. Rentmeester, and J. J. de Swart, “Partial-wave
|
1431 |
+
analysis of all nucleon-nucleon scattering data below 350 MeV”, Phys. Rev. C 48 (1993)
|
1432 |
+
792, doi:10.1103/PhysRevC.48.792.
|
1433 |
+
[3] J. J. de Swart and C. Dullemond, “Effective range theory and the low energy
|
1434 |
+
hyperon-nucleon interactions”, Anna. Phys. 19 (1962) 458,
|
1435 |
+
doi:10.1016/0003-4916(62)90185-9.
|
1436 |
+
[4] R. Engelmann, H. Filthuth, V. Hepp, and E. Kluge, “Inelastic Σ− p-interactions at low
|
1437 |
+
momenta”, Phys. Lett. 21 (1966) 587, doi:10.1016/0031-9163(66)91310-2.
|
1438 |
+
[5] F. Eisele et al., “Elastic Σ± p scattering at low energies”, Phys. Lett. B 37 (1971) 204,
|
1439 |
+
doi:10.1016/0370-2693(71)90053-0.
|
1440 |
+
[6] B. Sechi-Zorn, B. Kehoe, J. Twitty, and R. A. Burnstein, “Low-energy Λ-proton elastic
|
1441 |
+
scattering”, Phys. Rev. 175 (1968) 1735, doi:10.1103/PhysRev.175.1735.
|
1442 |
+
[7] CMS Collaboration, “Bose–Einstein correlations in pp, pPb, and PbPb collisions at
|
1443 |
+
√sNN = 0.9–7 TeV”, Phys. Rev. C 97 (2018) 064912,
|
1444 |
+
doi:10.1103/PhysRevC.97.064912, arXiv:1712.07198.
|
1445 |
+
[8] J. Schaffner-Bielich, M. Hanauske, H. St¨ocker, and W. Greiner, “Phase transition to
|
1446 |
+
hyperon matter in neutron stars”, Phys. Rev. Lett. 89 (2002) 171101,
|
1447 |
+
doi:10.1103/PhysRevLett.89.171101, arXiv:astro-ph/0005490.
|
1448 |
+
[9] K. Morita, T. Furumoto, and A. Ohnishi, “ΛΛ interaction from relativistic heavy-ion
|
1449 |
+
collisions”, Phys. Rev. C 91 (2015) 024916, doi:10.1103/PhysRevC.91.024916,
|
1450 |
+
arXiv:1408.6682.
|
1451 |
+
[10] ALICE Collaboration, “Study of the Λ-Λ interaction with femtoscopy correlations in pp
|
1452 |
+
and pPb collisions at the LHC”, Phys. Lett. B 797 (2019) 134822,
|
1453 |
+
doi:10.1016/j.physletb.2019.134822, arXiv:1905.07209.
|
1454 |
+
[11] R. L. Jaffe, “Perhaps a stable dihyperon”, Phys. Rev. Lett. 38 (1977) 195,
|
1455 |
+
doi:10.1103/PhysRevLett.38.195.
|
1456 |
+
[12] H. Takahashi et al., “Observation of a
|
1457 |
+
6
|
1458 |
+
ΛΛHe double hypernucleus”, Phys. Rev. Lett. 87
|
1459 |
+
(2001) 212502, doi:10.1103/PhysRevLett.87.212502.
|
1460 |
+
|
1461 |
+
References
|
1462 |
+
13
|
1463 |
+
[13] K. Nakazawa and H. Takahashi, “Experimental study of double-Λ hypernuclei with
|
1464 |
+
nuclear emulsion”, Prog. Theor. Phys. Supplement 185 (2010) 335,
|
1465 |
+
doi:10.1143/PTPS.185.335.
|
1466 |
+
[14] Belle Collaboration, “Search for an H-dibaryon with a mass near 2mΛ in Υ(1S) and
|
1467 |
+
Υ(2S) decays”, Phys. Rev. Lett. 110 (2013) 222002,
|
1468 |
+
doi:10.1103/PhysRevLett.110.222002, arXiv:1302.4028.
|
1469 |
+
[15] ALICE Collaboration, “ΛK femtoscopy in Pb-Pb collisions at √sNN = 2.76 TeV”, Phys.
|
1470 |
+
Rev. C 103 (2021) 055201, doi:10.1103/PhysRevC.103.055201,
|
1471 |
+
arXiv:2005.11124.
|
1472 |
+
[16] C. Loizides, J. Kamin, and D. d’Enterria, “Improved Monte Carlo Glauber predictions at
|
1473 |
+
present and future nuclear colliders”, Phys. Rev. C 97 (2018) 054910,
|
1474 |
+
doi:10.1103/PhysRevC.97.054910, arXiv:1710.07098.
|
1475 |
+
[17] R. Lednick´y and V. L. Lyuboshitz, “Final state interaction effect on pairing correlations
|
1476 |
+
between particles with small relative momenta”, Sov. J. Nucl. Phys. 35 (1982) 770.
|
1477 |
+
[18] HEPData record for this analysis, 2022. doi:10.17182/hepdata.133573.
|
1478 |
+
[19] Tracker Group of the CMS Collaboration, “The CMS phase-1 pixel detector upgrade”,
|
1479 |
+
JINST 16 (2021) P02027, doi:10.1088/1748-0221/16/02/P02027,
|
1480 |
+
arXiv:2012.14304.
|
1481 |
+
[20] CMS Collaboration, “Track impact parameter resolution for the full pseudorapidity
|
1482 |
+
coverage in the 2017 dataset with the CMS phase-1 pixel detector”, CMS Detector
|
1483 |
+
Performance Note CMS-DP-2020-049, 2020.
|
1484 |
+
[21] CMS Collaboration, “Performance of the CMS level-1 trigger in proton-proton collisions
|
1485 |
+
at √s = 13 TeV”, JINST 15 (2020) P10017, doi:10.1088/1748-0221/15/10/P10017,
|
1486 |
+
arXiv:2006.10165.
|
1487 |
+
[22] CMS Collaboration, “The CMS trigger system”, JINST 12 (2017) 01020,
|
1488 |
+
doi:10.1088/1748-0221/12/01/P01020, arXiv:1609.02366.
|
1489 |
+
[23] CMS Collaboration, “The CMS experiment at the CERN LHC”, JINST 3 (2008) S08004,
|
1490 |
+
doi:10.1088/1748-0221/3/08/S08004.
|
1491 |
+
[24] CMS Collaboration, “Precision luminosity measurement in proton-proton collisions at
|
1492 |
+
√s = 13 TeV in 2015 and 2016 at CMS”, Eur. Phys. J. C 81 (2021) 800,
|
1493 |
+
doi:10.1140/epjc/s10052-021-09538-2, arXiv:2104.01927.
|
1494 |
+
[25] CMS Collaboration, “CMS luminosity measurement using nucleus-nucleus collisions at
|
1495 |
+
√sNN = 5.02 TeV in 2018”, CMS Physics Analysis Summary CMS-PAS-LUM-18-001, 2022.
|
1496 |
+
[26] CMS Collaboration, “Charged-particle nuclear modification factors in PbPb and pPb
|
1497 |
+
collisions at √sNN = 5.02 TeV”, JHEP 04 (2017) 039, doi:10.1007/JHEP04(2017)039,
|
1498 |
+
arXiv:1611.01664.
|
1499 |
+
[27] CMS Collaboration, “Description and performance of track and primary-vertex
|
1500 |
+
reconstruction with the CMS tracker”, JINST 9 (2014) P10009,
|
1501 |
+
doi:10.1088/1748-0221/9/10/p10009, arXiv:1405.6569.
|
1502 |
+
|
1503 |
+
14
|
1504 |
+
[28] CMS Collaboration, “Transverse-momentum and pseudorapidity distributions of
|
1505 |
+
charged hadrons in pp collisions at √s = 0.9 and 2.36 TeV”, JHEP 02 (2010) 041,
|
1506 |
+
doi:10.1007/JHEP02(2010)041, arXiv:1002.0621.
|
1507 |
+
[29] CMS Collaboration, “Observation and studies of jet quenching in PbPb collisions at
|
1508 |
+
nucleon-nucleon √sNN = 2.76 TeV”, Phys. Rev. C 84 (2011) 024906,
|
1509 |
+
doi:10.1103/PhysRevC.84.024906, arXiv:1102.1957.
|
1510 |
+
[30] C. Gale, S. Jeon, and B. Schenke, “Hydrodynamic modeling of heavy ion collisions”, Int.
|
1511 |
+
J. Mod. Phys. A 28 (2013) 1340011, doi:10.1142/S0217751X13400113,
|
1512 |
+
arXiv:1301.5893.
|
1513 |
+
[31] GEANT4 Collaboration, “GEANT4—a simulation toolkit”, Nucl. Instrum. Meth. A 506
|
1514 |
+
(2003) 250, doi:10.1016/S0168-9002(03)01368-8.
|
1515 |
+
[32] CMS Collaboration, “Strange hadron collectivity in pPb and PbPb collisions”, 2022.
|
1516 |
+
arXiv:2205.00080.
|
1517 |
+
[33] CMS Collaboration, “Strange particle production in pp collisions at √s = 0.9 and 7 TeV”,
|
1518 |
+
JHEP 05 (2011) 064, doi:10.1007/JHEP05(2011)064, arXiv:1102.4282.
|
1519 |
+
[34] CMS Collaboration, “Long-range two-particle correlations of strange hadrons with
|
1520 |
+
charged particles in pPb and PbPb collisions at LHC energies”, Phys. Lett. B 742 (2015)
|
1521 |
+
200, doi:10.1016/j.physletb.2015.01.034, arXiv:1409.3392.
|
1522 |
+
[35] Particle Data Group Collaboration, “Review of particle physics”, Prog. Theor. Exp. Phys.
|
1523 |
+
2022 (2022) 083C01, doi:10.1093/ptep/ptac097.
|
1524 |
+
[36] H. Voss, A. H¨ocker, J. Stelzer, and F. Tegenfeldt, “TMVA, the toolkit for multivariate data
|
1525 |
+
analysis with ROOT”, in XIth International Workshop on Advanced Computing and Analysis
|
1526 |
+
Techniques in Physics Research (ACAT), p. 40. 2007. arXiv:physics/0703039.
|
1527 |
+
doi:10.22323/1.050.0040.
|
1528 |
+
[37] G. I. Kopylov, “Like particle correlations as a tool to study the multiple production
|
1529 |
+
mechanism”, Phys. Lett. B 50 (1974) 472, doi:10.1016/0370-2693(74)90263-9.
|
1530 |
+
[38] A. Kisiel, “Non-identical particle correlation analysis in the presence of non-femtoscopic
|
1531 |
+
correlations”, Acta Phys. Polon. B 48 (2017) 717, doi:10.5506/APhysPolB.48.717.
|
1532 |
+
[39] ALICE Collaboration, “pp, p-Λ, and Λ-Λ correlations studied via femtoscopy in pp
|
1533 |
+
reactions at √s = 7 TeV”, Phys. Rev. C 99 (2019) 024001,
|
1534 |
+
doi:10.1103/PhysRevC.99.024001, arXiv:1805.12455.
|
1535 |
+
[40] STAR Collaboration, “Neutral kaon interferometry in Au+Au collisions at
|
1536 |
+
√sNN = 200 GeV”, Phys. Rev. C 74 (2006) 054902,
|
1537 |
+
doi:10.1103/PhysRevC.74.054902, arXiv:nucl-ex/0608012.
|
1538 |
+
[41] A. D. Martin and E. N. Ozmutlu, “Analyses of KK production and scalar mesons”, Nucl.
|
1539 |
+
Phys. B 158 (1979) 520, doi:10.1016/0550-3213(79)90180-9.
|
1540 |
+
[42] A. Antonelli, “Radiative φ decays”, eConfC 020620 (2002) THAT06,
|
1541 |
+
doi:10.48550/ARXIV.HEP-EX/0209069, arXiv:hep-ex/0209069.
|
1542 |
+
[43] N. N. Achasov and V. V. Gubin, “Analysis of the nature of the φ → γπη and φ → γπ0π0
|
1543 |
+
decays”, Phys. Rev. D 63 (2001) 094007, doi:10.1103/PhysRevD.63.094007,
|
1544 |
+
arXiv:hep-ph/0101024.
|
1545 |
+
|
1546 |
+
References
|
1547 |
+
15
|
1548 |
+
[44] N. N. Achasov and A. V. Kiselev, “New analysis of the KLOE data on the φ → ηπ0γ
|
1549 |
+
decay”, Phys. Rev. D 68 (2003) 014006, doi:10.1103/PhysRevD.68.014006,
|
1550 |
+
arXiv:hep-ph/0212153.
|
1551 |
+
[45] F. James and M. Roos, “Minuit: A system for function minimization and analysis of the
|
1552 |
+
parameter errors and correlations”, Comput. Phys. Commun. 10 (1975) 343,
|
1553 |
+
doi:10.1016/0010-4655(75)90039-9.
|
1554 |
+
[46] PHENIX Collaboration, “L´evy-stable two-pion Bose–Einstein correlations in
|
1555 |
+
√sNN = 200 GeV Au+Au collisions”, Phys. Rev. C 97 (2018) 064911,
|
1556 |
+
doi:10.1103/PhysRevC.97.064911, arXiv:1709.05649.
|
1557 |
+
[47] ALICE Collaboration, “One-dimensional pion, kaon, and proton femtoscopy in Pb-Pb
|
1558 |
+
collisions at √sNN = 2.76 TeV”, Phys. Rev. C 92 (2015) 054908,
|
1559 |
+
doi:10.1103/PhysRevC.92.054908, arXiv:1506.07884.
|
1560 |
+
[48] STAR Collaboration, “ΛΛ correlation function in Au+Au collisions at √sNN = 200 GeV”,
|
1561 |
+
Phys. Rev. Lett. 114 (2015) 022301, doi:10.1103/PhysRevLett.114.022301,
|
1562 |
+
arXiv:1408.4360.
|
1563 |
+
[49] E. Hiyama et al., “Four-body cluster structure of A = 7–10 double-Λ hypernuclei”, Phys.
|
1564 |
+
Rev. C 66 (2002) 024007, doi:10.1103/physrevc.66.024007,
|
1565 |
+
arXiv:nucl-th/0204059.
|
1566 |
+
[50] I. N. Filikhin and A. Gal, “Faddeev–Yakubovsky calculations for light ΛΛ hypernuclei”,
|
1567 |
+
Nucl. Phys. A 707 (2002) 491, doi:10.1016/s0375-9474(02)01008-4,
|
1568 |
+
arXiv:nucl-th/0203036.
|
1569 |
+
|
5tE4T4oBgHgl3EQf1g0M/content/tmp_files/load_file.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
5tE5T4oBgHgl3EQfPQ4_/content/2301.05503v1.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:966b1fb0989ac99432d40524a378c431cdf73e7cc03cc52a1621c91165212a8a
|
3 |
+
size 261178
|
5tE5T4oBgHgl3EQfPQ4_/vector_store/index.pkl
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:bb377f3a2d5310d42ad841592d206638287bd2171452e6232a317b5e4d165409
|
3 |
+
size 122451
|
69FKT4oBgHgl3EQf_y40/content/tmp_files/2301.11963v1.pdf.txt
ADDED
@@ -0,0 +1,662 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
arXiv:2301.11963v1 [hep-th] 27 Jan 2023
|
2 |
+
On 10 dimensional Exceptional Drinfel’d Algebras
|
3 |
+
Sameer Kumar1, Edvard T. Musaev2
|
4 |
+
Moscow Institute of Physics and Technology,
|
5 |
+
Institutskii pereulok 9, Dolgoprudny, 141700, Russia
|
6 |
+
Abstract
|
7 |
+
Based on the Mubarakzyanov’s classification of four-dimensional real Lie Algebras,
|
8 |
+
we classify ten-dimensional Exceptional Drinfel’d Algebras (EDA). The classifica-
|
9 |
+
tion is restricted to EDAs whose maximal isotropic (geometric) subalgebras cannot
|
10 |
+
be represented as a product of a 3D Lie algebra and a 1D abelian factor. We show
|
11 |
+
that all obtained EDAs are inequivalent and conclude that there are no Nambu-Lie
|
12 |
+
U-dualities between 11D supergravity backgrounds within 10D EDAs.
|
13 | |
14 | |
15 |
+
|
16 |
+
1
|
17 |
+
Introduction
|
18 |
+
String theory is a background-dependent theory meaning that dynamics of the string is
|
19 |
+
defined on a fixed background of space-time fields including the metric, the dilaton, Kalb-
|
20 |
+
Ramond 2-form field, and Ramond-Ramond p-form fields. The moduli space of these vacua
|
21 |
+
appears to be highly degenerate due to duality symmetries of string theory. Some of them, such
|
22 |
+
as (abelian) T-dualities are exact perturbative symmetries of the superstring partition function
|
23 |
+
at all orders in α′ and gs [1–3]. This implies that physics of the string does does not change if the
|
24 |
+
underlying space-time background is transformed by T-duality. Given a non-abelian algebra of
|
25 |
+
isometries of a string background, abelian T-duality transformation rules can be generalized to
|
26 |
+
what is called non-abelian T-duality (NATD) [4]. In contrast to the abelian case NATD is not
|
27 |
+
an exact quantum symmetry of the conformal theory due to problems with definition of winding
|
28 |
+
modes [5]. However, the NATD transformation map can be corrected to be a valid symmetry
|
29 |
+
at the leading order in α′ [6,7]. Using the notion of non-commutative currents, the non-abelian
|
30 |
+
T-duality transformations can be extended to Poisson-Lie T-dualities that are symmetries of
|
31 |
+
string theory in the same sense [8,9]. While abelian T-duality starts from a background with
|
32 |
+
certain abelian isometries and preserves them, non-abelian T-duality breaks the non-abelian
|
33 |
+
algebra of initial isometries naively preventing from performing the inverse transformation.
|
34 |
+
The algebraic structure behind non-abelian T-duality symmetries, that is classical Drinfeld
|
35 |
+
algebras, reveals that the initial isometry becomes hidden inside the algebra. More specifically
|
36 |
+
classical Drinfeld algebra D is defined in terms of Manin triple (D, g, ˜g), where D is a Lie algebra
|
37 |
+
with non-degenerate quadratic form η, and g and ˜g are subalgebras maximally isotropic with
|
38 |
+
respect to the form. The algebra g is commonly referred to as the geometric subalgebra, and
|
39 |
+
is responsible for the background space, i.e.
|
40 |
+
a group manifold or a coset space, while ˜g is
|
41 |
+
commonly referred to as the dual algebra and it is responsible for conservation laws of the
|
42 |
+
sigma model. To illustrate that, denote fabc and ˜fabc as structure constants of the algebras - g
|
43 |
+
and ˜g, respectively. Then the following holds,
|
44 |
+
[va, vb] = fab
|
45 |
+
cvc,
|
46 |
+
dJa = ˜fa
|
47 |
+
bcJb ∧ Jc.
|
48 |
+
(1.1)
|
49 |
+
Here, vectors va define action of G = exp g on itself or on a coset space as δxi = vaiǫa, where
|
50 |
+
xi denote coordinates on the group (coset) manifold. Noether currents Ja = Ja idxi satisfy
|
51 |
+
the non-commutative conservation law.
|
52 |
+
When ˜fabc = 0, the currents are conserved in the
|
53 |
+
usual sense. Non-abelian T-duality simply maps g ↔ ˜g, hence vanishing ˜fabc get replaced by
|
54 |
+
2
|
55 |
+
|
56 |
+
non-vanishing fabc and the conservation law becomes non-commutative. The initial isometry
|
57 |
+
becomes hidden in g′ = ˜g and is no longer manifest. In this language the condition for classical
|
58 |
+
equations of motion for the string to satisfy is simply the Leibniz identity
|
59 |
+
[X, [Y, Z]] = [[X, Y ], Z] + [Y, [X, Z]],
|
60 |
+
X, Y ∈ D.
|
61 |
+
(1.2)
|
62 |
+
Here, the brackets are given by the following relations in terms of the generators (Ta, ˜T a) =
|
63 |
+
bas D:
|
64 |
+
[Ta, Tb] = fab
|
65 |
+
cTc,
|
66 |
+
[ ˜T a, ˜T a] = fc
|
67 |
+
ab ˜T c,
|
68 |
+
[ ˜T a, Tb] = ˜fc
|
69 |
+
ab ˜T c + fab
|
70 |
+
cTc.
|
71 |
+
(1.3)
|
72 |
+
In terms of structure constants, Leibniz identity is equivalent to Jacobi identities for fabc and
|
73 |
+
˜fabc along with the following mixed identity
|
74 |
+
˜fl
|
75 |
+
jkfmi
|
76 |
+
l + ˜fm
|
77 |
+
klfli
|
78 |
+
j + ˜fi
|
79 |
+
jlflm
|
80 |
+
k + ˜fm
|
81 |
+
jlfil
|
82 |
+
k + ˜fi
|
83 |
+
klflm
|
84 |
+
j = 0.
|
85 |
+
(1.4)
|
86 |
+
For a review of the algebraic construction behind Poisson-Lie T-dualities see [10], for a review of
|
87 |
+
applications of NATD see [11,12], for formulation of Poisson-Lie T-dualities in the supergravity
|
88 |
+
language see [13,14], for geometric aspects see [15,16]
|
89 |
+
In the most general case when both sets of structure constants are non-zero, one is able
|
90 |
+
to define the so-called Poisson-Lie duality transformations. When dim g = d, these are such
|
91 |
+
O(d, d) maps CAB that preserve the structure of classical Drinfel’d double:
|
92 |
+
TA → CA
|
93 |
+
BTB,
|
94 |
+
TA = (Ta, ˜T a).
|
95 |
+
(1.5)
|
96 |
+
There is a distinguished set of such transformations called Poisson-Lie (PL) T-dualities (plu-
|
97 |
+
ralities) when the map CAB relates different realization of the same Drinfeld algebra. The
|
98 |
+
simplest example is the swapping g ↔ ˜g. For lower dimensional Lie algebras full classification
|
99 |
+
of all possible Poisson-Lie T-dualities or likewise of all equivalent Manin triples is available [17].
|
100 |
+
This is based on classification of all possible dual algebras ˜g for each g belonging to the Bianchi
|
101 |
+
classification of three-dimensional real Lie algebras (for more on classification of Lie Algebras,
|
102 |
+
see for example [18]). More generally, one may have maps CAB that relate different Drinfeld
|
103 |
+
algebras, for example, Yang-Baxter deformations that draw the interest since they preserve
|
104 |
+
integrability of the underlying sigma-model [19].
|
105 |
+
When extending abelian T-duality symmetries by S-dualities that are non-perturbative
|
106 |
+
3
|
107 |
+
|
108 |
+
transformations exchanging gs with g−1
|
109 |
+
s , one arrives at U-duality transformations that are
|
110 |
+
symmetries of M-theory. Speaking more concretely, U-duality is a symmetry of classical field
|
111 |
+
equations of 11D supergravity compactified on a d-torus. These are known as Cremmer-Julia
|
112 |
+
symmetries and are given by the exceptional groups Ed(d) [20,21]. In M-theory, whose low-energy
|
113 |
+
approximation is given by 11D supergravity, U-duality can be thought of as symmetries of BPS
|
114 |
+
states [22] or in terms of a Buscher-like procedure for M2-brane wrapping a 4-torus [23,24]. The
|
115 |
+
algebraic structure behind Poisson-Lie T-dualities can be extended to the so-called Exceptional
|
116 |
+
Drinfeld Algebras (EDA), that include the usual abelian U-dualities (Cremmer-Julia symme-
|
117 |
+
tries) [25–27]. Keeping the more detailed description of EDAs to the next section, we mention
|
118 |
+
that these are Leibniz algebras with generators TA on which exceptional group Ed(d) acts in the
|
119 |
+
same sense as the orthogonal group O(d, d) acts on generators of the classical Drinfeld double.
|
120 |
+
Nambu-Lie U-dualities are then transformations that preserve the structure of the EDA. What
|
121 |
+
differs these from the PL T-duality case is that there is no naturally defined analogue of the
|
122 |
+
swapping g ↔ ˜g, simply due to the following two facts: i) dimension of the geometric subalgebra
|
123 |
+
g of an EDA is never half of dimension of the EDA itself, ii) orthogonal completion of g inside
|
124 |
+
the EDA is not an algebra. For this reason, searching for pairs of 11D geometries related by a
|
125 |
+
Nambu-Lie U-duality is an extremely complicated task for a general EDA. At the moment few
|
126 |
+
examples of such dualities between 11D backgrounds and solutions to Type IIB supergravity
|
127 |
+
equations are known [28, 29]. In [30] a general procedure has been suggested similar to the
|
128 |
+
natural swapping g ↔ ˜g based on external automorphisms of Ed(d) group. Further it has been
|
129 |
+
used to generate few examples of mutually dual backgrounds in [31].
|
130 |
+
In this work, we elaborate further on the results of [30,31] that in particular state that there
|
131 |
+
are no non-abelian U-dualities in the defined sense between 11D background. The narrative
|
132 |
+
we follow is along the same lines as [32] where a full classification of 6D Exceptional Drinfeld
|
133 |
+
Doubles based on 3D geometric algebras has been presented. Starting from the classification
|
134 |
+
of four-dimensional real Lie algebras [33], we construct all possible EDAs for a representative
|
135 |
+
of each class. For each pair of such obtained EDAs we search for an SL(5) transformation
|
136 |
+
relating them, that would mean existence of a Nambu-Lie U-duality between backgrounds that
|
137 |
+
geometrically realize the corresponding geometric algebras g. Restricting ourselves to only such
|
138 |
+
4D real Lie algebras that do not contain a 1d (abelian) factor we find no such transformations.
|
139 |
+
The restriction is motivated by the interest only in dualities between 11D background as maps
|
140 |
+
from 11D→IIB are known.
|
141 |
+
The paper is structured as follows. In the beginning of Section 2 we briefly review the con-
|
142 |
+
struction of Exceptional Drinfel’s Algebras. In Section 2.1 we discuss the geometric realization
|
143 |
+
of EDAs and Nambu-Lie U-dualities. In Section 2.2, we present classification of 10D EDAs,
|
144 |
+
4
|
145 |
+
|
146 |
+
given the conditions stated in the preceding section and state the main results of the paper
|
147 |
+
2
|
148 |
+
Exceptional Drinfel’d Algebras
|
149 |
+
Before proceeding with the classification of 10d EDAs, let us briefly review the algebraic
|
150 |
+
construction following [25, 26]. We will be focusing on the 10d case where generators of the
|
151 |
+
exceptional Drinfeld algebra ED4 are collected into the 10-dimensional representation of the
|
152 |
+
SL(5) group basED4 = {TAB}, where A, B = 1, . . . , 5. Multiplication table is then given by
|
153 |
+
TAB ◦ TCD = i
|
154 |
+
2FAB,CD
|
155 |
+
GHTGH.
|
156 |
+
(2.1)
|
157 |
+
The structures constants FAB,CDGH are defined by the following relations
|
158 |
+
FAB,CD
|
159 |
+
GH = 4FAB,[C
|
160 |
+
[GδH]
|
161 |
+
D]
|
162 |
+
(2.2)
|
163 |
+
FAB,C
|
164 |
+
D = 1
|
165 |
+
2ǫABCGHZGHD + 1
|
166 |
+
2δD
|
167 |
+
[ASB]C + 1
|
168 |
+
3δD
|
169 |
+
[AτB]C + 1
|
170 |
+
6δD
|
171 |
+
C τAB,
|
172 |
+
(2.3)
|
173 |
+
where τ is antisymmetric and S is a symmetric tensor, while Z[ABC] = 0. For the algebra to be an
|
174 |
+
EDA, components of the constants ZABC, SAB and τAB under decomposition SL(5) ←֓ GL(4)
|
175 |
+
must be defined as
|
176 |
+
Zabc = 1
|
177 |
+
6ǫabcdfde
|
178 |
+
e + 1
|
179 |
+
4ǫabeffef
|
180 |
+
c,
|
181 |
+
S5a = fab
|
182 |
+
b − 3Za,
|
183 |
+
τ5a = 9
|
184 |
+
2Za − 1
|
185 |
+
2fab
|
186 |
+
b
|
187 |
+
Z5[a,b] = 1
|
188 |
+
6
|
189 |
+
˜fc
|
190 |
+
abc,
|
191 |
+
Sab = 1
|
192 |
+
3
|
193 |
+
˜f(a
|
194 |
+
cdeǫb)cde,
|
195 |
+
τab = −1
|
196 |
+
6
|
197 |
+
˜f[a
|
198 |
+
cdeǫb]cde
|
199 |
+
Zab,5 = −Z5a,b + Z5b,a.
|
200 |
+
(2.4)
|
201 |
+
The constants FAB,CD have the same structure as the embedding tensor of [34], and in this
|
202 |
+
language the above construction implies that only the geometric flux (anholonomy coefficients)
|
203 |
+
and Q-flux are turned on. The former is given by the structure constants fabc of the geometric
|
204 |
+
subalgebra g and the latter is given by ˜fabcd. The algebra is Leibniz with the fundamental
|
205 |
+
identity given by the quadratic relations analogous to those of 7d maximal gauged SUGRA [34]:
|
206 |
+
2F G
|
207 |
+
AB[CF I
|
208 |
+
GD],H − F I
|
209 |
+
ABGF G
|
210 |
+
CDH + F G
|
211 |
+
ABHF I
|
212 |
+
CDG = 0.
|
213 |
+
(2.5)
|
214 |
+
5
|
215 |
+
|
216 |
+
In terms of structure constants fabc and dual constants fabcd, the conditions become
|
217 |
+
6ff[a
|
218 |
+
[c ˜fb]
|
219 |
+
de]f + fab
|
220 |
+
f ˜ff
|
221 |
+
cde − 1
|
222 |
+
3
|
223 |
+
˜f[a
|
224 |
+
cdefb]f
|
225 |
+
f = 0
|
226 |
+
˜fc
|
227 |
+
abcfbd
|
228 |
+
d = 0,
|
229 |
+
fde
|
230 |
+
a ˜f bde
|
231 |
+
c
|
232 |
+
− 1
|
233 |
+
3
|
234 |
+
˜fc
|
235 |
+
abdfde
|
236 |
+
e = 0
|
237 |
+
˜fc
|
238 |
+
abg ˜fg
|
239 |
+
def − 3 ˜fc
|
240 |
+
g[de ˜fg
|
241 |
+
f]ab = 0.
|
242 |
+
(2.6)
|
243 |
+
The last of the above equations is also referred to as the dual Jacobi condition, just as the
|
244 |
+
dual conditions in the Manin triples. It describes the internal (isolated) relations between the
|
245 |
+
structure constants of the dual algebra.
|
246 |
+
As in the case of Classical Drinfeld Algebra, in general, there might exist multiple equivalent
|
247 |
+
choices of the geometric subalgebra g inside an EDA. Proper generalization of the isometry
|
248 |
+
condition to the case of exceptional structures has been given in [25,26] and can be written as
|
249 |
+
follows
|
250 |
+
ǫABCDETAB ⊗ TCD
|
251 |
+
����
|
252 |
+
g⊗g
|
253 |
+
= 0.
|
254 |
+
(2.7)
|
255 |
+
In other words, for a given EDA, its geometric subalgebra g is spanned by such a subset of the
|
256 |
+
whole set of generators {TAB} that satisfy the above condition. For Classical Drinfel’d Double
|
257 |
+
the condition is ηABTA ⊗ TB = 0, implying that one may, for example, take bas g = {Ta},
|
258 |
+
or bas g = { ˜T a}. For EDAs, one choice is self-evident - bas g = {T5a}, while presenting an
|
259 |
+
alternative choice is usually a hard task. This implies that there is no natural generalization
|
260 |
+
of the Non-Abelian T-duality transformation swapping g ↔ ˜g in the case of EDAs, although
|
261 |
+
certain progress in defining an analogue of these swappings has been done in [30,31].
|
262 |
+
2.1
|
263 |
+
Geometric realization and dualities
|
264 |
+
The algebraic structure of EDAs stands behind Nambu-Lie U-dualities of supergravity so-
|
265 |
+
lutions. These can map solutions to 11D supergravity equations into each other or into Type
|
266 |
+
IIB supergravity equations. Such duality transformations map the group manifolds correspond-
|
267 |
+
ing to different choices of the geometric subalgebra g into each other. For more detailed and
|
268 |
+
concrete algorithm of constructing mutually dual backgrounds see [31]. Below, we will briefly
|
269 |
+
recall the overall construction and highlight relations to Exceptional Field Theory (ExFT) that
|
270 |
+
provide convenient variables for writing such duality maps [35, 36]. These are Ed(d)-covariant
|
271 |
+
field theories defined in 11-dimensional space-time with an explicit split - 11 = D + d. The
|
272 |
+
D-dimensional space-time is usually referred to as the external, the d-dimensional space is
|
273 |
+
6
|
274 |
+
|
275 |
+
usually referred to as internal, although no compactification is assumed. In the d = 4 case
|
276 |
+
relevant to the present discussion, field content of the theory includes the external metric gµν,
|
277 |
+
ten vector fields AµMN, five 2-form fields BµνM, and 14 scalar fields parametrized by a coset
|
278 |
+
element MMN ∈ SL(5)/SO(5). The indices µ = 0, . . . , 6 parameterize directions of the external
|
279 |
+
space-time whereas the indices M, N = 1, . . . , 5 belong to the 5 of SL(5). For more details of
|
280 |
+
the construction see [37]. Here we are interested in the special case where all fields transform-
|
281 |
+
ing in irreps of SL(5) can be decomposed in terms of matrices EABMN (generalized vielbeins)
|
282 |
+
geometrically realizing an EDA. In compact notation one writes
|
283 |
+
[EAB, ECD] = FAB,CD
|
284 |
+
EFEEF,
|
285 |
+
(2.8)
|
286 |
+
where the constants FAB,CDEF are precisely the structure constants of the EDA and the brackets
|
287 |
+
denote the so-called generalized Lie derivative of ExFT.
|
288 |
+
Generalized vielbeins are parametrized by fields of 11D supergravity in the 11 = 7 + 4 split
|
289 |
+
transforming as scalars under 7-dimensional diffeomorphisms. Introducing a unity matrix MAB
|
290 |
+
compose
|
291 |
+
MMN,KL = 2EMN
|
292 |
+
ABEKL
|
293 |
+
CDMACMBD = MMKMNL − MMLMNK.
|
294 |
+
(2.9)
|
295 |
+
The symmetric matrix
|
296 |
+
mMN = e− φ
|
297 |
+
2
|
298 |
+
�
|
299 |
+
|g|− 1
|
300 |
+
2gij
|
301 |
+
Vi
|
302 |
+
Vj
|
303 |
+
|g|
|
304 |
+
1
|
305 |
+
2(1 + V 2)
|
306 |
+
�
|
307 |
+
(2.10)
|
308 |
+
is then defined in terms of the 4d metric gmn on the group manifold, the vector V m = 1
|
309 |
+
3!ǫmnklCnkl
|
310 |
+
and a scalar field eφ = |g7|1/7 which is the determinant |g7| of external 7 dimensional space.
|
311 |
+
The metric gmn on the group manifold is defined as usual in terms of Maurer-Cartan forms.
|
312 |
+
Let g ∈ G = exp g be an element of the group G whose Lie algebra is g, then 1-forms on the
|
313 |
+
group manifold g−1dg ∈ g. In components we have
|
314 |
+
g−1dg = rm
|
315 |
+
aTadxm,
|
316 |
+
(2.11)
|
317 |
+
where xm are some coordinates on the group manifold.
|
318 |
+
Given an EDA and a choice of the isotropic subalgebra g one can explicitly construct
|
319 |
+
the corresponding generalized vielbein. A step-by-step algorithm of this procedure based on
|
320 |
+
constructing adjoint action of eh ∈ G for some h ∈ g on an element of EDA can be found
|
321 |
+
in [38]. An alternative choice of the isotropic subalgebra, if exists, is related to the given one
|
322 |
+
by an SL(5) transformation
|
323 |
+
T ′
|
324 |
+
AB = CA
|
325 |
+
CCB
|
326 |
+
DTCD.
|
327 |
+
(2.12)
|
328 |
+
7
|
329 |
+
|
330 |
+
If this transformation respects the structure of EDA, then the alternative isotropic subalgebra
|
331 |
+
is spanned by T ′
|
332 |
+
5a. Structure constants of the EDA then transform as
|
333 |
+
F ′
|
334 |
+
A′B′,C′D′ = CA′ACB′BCC′CCD
|
335 |
+
D′FAB,C
|
336 |
+
D.
|
337 |
+
(2.13)
|
338 |
+
Note that not any such matrix corresponds to a Nambu-Lie U-duality transformation. Indeed,
|
339 |
+
one can always perform a GL(4) transformation on generators of a given algebra g thus changing
|
340 |
+
explicit realization of the corresponding EDA. Two EDA’s related by such transformation then
|
341 |
+
correspond to 11D backgrounds related by a coordinate transformation. Another trivial choice
|
342 |
+
is
|
343 |
+
CA
|
344 |
+
B =
|
345 |
+
�
|
346 |
+
14×4
|
347 |
+
λm
|
348 |
+
0
|
349 |
+
1
|
350 |
+
�
|
351 |
+
,
|
352 |
+
(2.14)
|
353 |
+
that corresponds to simply a gauge transformation of the 3-form Cmnk. To avoid counting
|
354 |
+
of EDA’s related by a rotation of the basis of their isotropic subalgebras we first classify
|
355 |
+
Exceptional Drinfeld Algebras using classification of 4D real Lie Algebras.
|
356 |
+
2.2
|
357 |
+
Classification of 10 dimensional EDA’s
|
358 |
+
The main goal of this work is to investigate relations between 10d EDAs that correspond
|
359 |
+
to Nambu-Lie U-duality transformations of 11-dimensional supergravity backgrounds. For this
|
360 |
+
purpose, we start with a classification of 10D EDAs of certain class based on the classification of
|
361 |
+
4-dimensional real Lie Algebras by Mubarakzyanov [33] (for a review in English see [18]). Since
|
362 |
+
explicit examples of Nambu-Lie U-dualities between 11D and Type IIB backgrounds are known
|
363 |
+
in the literature, we are interested here only in EDAs constructed on 4d real Lie Algebras g4
|
364 |
+
that cannot be decomposed into a sum g4 = g4 ⊕ g1, where g3 is a 3d Lie algebra and g1 is
|
365 |
+
1-dimensional Abelan factor. We list all relevant 4d real Lie Algebras in Table 1.
|
366 |
+
g4,1
|
367 |
+
[T2, T4] = T1
|
368 |
+
[T3, T4] = T2
|
369 |
+
g4,5
|
370 |
+
[T1, T4] = AT1
|
371 |
+
[T2, T4] = BT2
|
372 |
+
[T3, T4] = CT3
|
373 |
+
ABC̸= 0
|
374 |
+
g4,9
|
375 |
+
[T2, T3] = T1
|
376 |
+
[T1, T4] = 2AT1
|
377 |
+
[T2, T4] = AT2 − T3
|
378 |
+
[T3, T4] = T2 + AT3
|
379 |
+
A > 0
|
380 |
+
g4,2
|
381 |
+
[T2, T4] = βT1
|
382 |
+
[T2, T4] = T2
|
383 |
+
[T3, T4] = T2 + T3
|
384 |
+
g4,6
|
385 |
+
[T1, T4] = AT1
|
386 |
+
[T2, T4] = BT2 − T3
|
387 |
+
[T3, T4] = T2 + BT3
|
388 |
+
A > 0
|
389 |
+
g4,10
|
390 |
+
[T1, T3] = T1
|
391 |
+
[T2, T3] = T2
|
392 |
+
[T1, T4] = −T2
|
393 |
+
[T2, T4] = T1
|
394 |
+
8
|
395 |
+
|
396 |
+
g4,3
|
397 |
+
[T1, T4] = T1
|
398 |
+
[T3, T4] = T2
|
399 |
+
g4,7
|
400 |
+
[T2, T3] = T1
|
401 |
+
[T1, T4] = 2T1
|
402 |
+
[T2, T4] = T2
|
403 |
+
[T3, T4] = T2 + T3
|
404 |
+
2g2,1
|
405 |
+
[T1, T2] = T1
|
406 |
+
[T3, T4] = T3
|
407 |
+
g4,4
|
408 |
+
[T1, T4] = T1
|
409 |
+
[T2, T4] = T1 + T2
|
410 |
+
[T3, T4] = T2 + T3
|
411 |
+
g4,8
|
412 |
+
[T2, T3] = T1
|
413 |
+
[T1, T4] = (1 + β)T1
|
414 |
+
[T2, T4] = T2
|
415 |
+
[T3, T4] = βT3
|
416 |
+
β ∈ [−1, 1]
|
417 |
+
Table 1: Classification of 4-dimensional indecomposable
|
418 |
+
real Lie algebras g4,n with n = 1, . . . , 10. The algebra
|
419 |
+
2g2,1 is decomposable, however does not have a u(1) fac-
|
420 |
+
tor.
|
421 |
+
To arrive at the corresponding classification of 10d EDAs, we solve quadratic constraints
|
422 |
+
for each class in the table above to find all possible sets of the dual structure coefficients ˜fdabc.
|
423 |
+
To solve the equations we use mathematical software Mathematica , that gives us all the 4
|
424 |
+
dimensional EDAs in the chosen class.
|
425 |
+
The result is listed in Table 2, where only unique
|
426 |
+
combinations of indices are explicitly given in the coefficients of the underlying algebra. The
|
427 |
+
rest of the indices are obtained by the antisymmetric property of the structure coefficients.
|
428 |
+
EDA
|
429 |
+
Structure Constants ˜f abcd
|
430 |
+
g4,1
|
431 |
+
1.
|
432 |
+
˜f 1232 = ˜f 1344, ˜f 1242 = ˜f 1343
|
433 |
+
˜f 1234 =
|
434 |
+
˜f 1233 ˜f 1344 − ˜f 1244 ˜f 1344
|
435 |
+
2 ˜f 1343
|
436 |
+
˜f 1243 = ( ˜f 1244 − ˜f 1233) ˜f 1343
|
437 |
+
2 ˜f 1344
|
438 |
+
2.
|
439 |
+
˜f 1232 = − ˜f 1344, ˜f 1244 = ˜f 1233, ˜f 2344 = ˜f 1231
|
440 |
+
3.
|
441 |
+
˜f 1242 = ˜f 1343 ˜f 1244 = ˜f 1233
|
442 |
+
4.
|
443 |
+
˜f 1244 = ˜f 1233, ˜f 2344 = ˜f 1231
|
444 |
+
g4,2
|
445 |
+
5.
|
446 |
+
˜f 1244 = −1
|
447 |
+
3 (1 + 2β) ˜f 1233
|
448 |
+
6
|
449 |
+
˜f 2344 =
|
450 |
+
1
|
451 |
+
3β(β − 4) ˜f 1231
|
452 |
+
g4,3
|
453 |
+
7.
|
454 |
+
˜f 2344 = 1
|
455 |
+
3 ˜f 1231
|
456 |
+
g4,4
|
457 |
+
8.
|
458 |
+
˜f 1244 = − ˜f 123
|
459 |
+
3
|
460 |
+
g4,5
|
461 |
+
9.
|
462 |
+
˜f 1244 = −2A−2B+C
|
463 |
+
3C
|
464 |
+
˜f 1233
|
465 |
+
9
|
466 |
+
|
467 |
+
10.
|
468 |
+
˜f 1344 =
|
469 |
+
1
|
470 |
+
3B(2A − B + 2C) ˜f 1232
|
471 |
+
11.
|
472 |
+
˜f 2344 =
|
473 |
+
1
|
474 |
+
3A(A − 2B − 2C) ˜f 1231
|
475 |
+
g4,6
|
476 |
+
12.
|
477 |
+
˜f 2344 =
|
478 |
+
1
|
479 |
+
3A(A − 2B − 2C) ˜f 1231
|
480 |
+
g4,7
|
481 |
+
13.
|
482 |
+
˜f 1244 = −5
|
483 |
+
3 ˜f 1233
|
484 |
+
g4,8
|
485 |
+
14.
|
486 |
+
˜f 1244 = − 1
|
487 |
+
3β(4 − β) ˜f 1233
|
488 |
+
15.
|
489 |
+
˜f 1344 = 1
|
490 |
+
3(1 + 4B) ˜f 1232
|
491 |
+
g4,9
|
492 |
+
˜f abcd = 0 or imaginary
|
493 |
+
g4,10
|
494 |
+
˜f abcd = 0
|
495 |
+
2g2,1
|
496 |
+
16.
|
497 |
+
˜f 1234 = ˜f 1232, ˜f 1342 = ˜f 1344
|
498 |
+
Table 2: All possible structure constant of 10d EDAs for
|
499 |
+
each g4,n with n = 1, . . . , 10 and 2g2,1. The constants
|
500 |
+
A, B, C, β are the same as in the previous table.
|
501 |
+
Hence, given we are interested only in real non-trivial EDAs, we end up with 16 examples.
|
502 |
+
A natural question would be: whether there exists a pair of EDAs in this set that are equivalent
|
503 |
+
up to an SL(5) transformation. This would mean that the same EDA can be generated by two
|
504 |
+
4d Lie Algebras that belong to different classes. In the supergravity language this would mean
|
505 |
+
existence of a Nambu-Lie U-duality between 11D backgrounds geometrically realizing this pair
|
506 |
+
of 4d Lie algebras. Result of our calculations is that there are no such pairs. To arrive at this
|
507 |
+
statement we used Mathematica software and explicitly solve equations on components of the
|
508 |
+
matrix CAB for each pair of 16 algebras with no further restrictions on the coefficients. This
|
509 |
+
means, that although in Table 2 we list algebras as though all explicitly written dual structure
|
510 |
+
constants are non-vanishing, our code does not assume that [39].
|
511 |
+
3
|
512 |
+
Discussion
|
513 |
+
In this work we obtain a classification of 10-dimensional EDA based on the classification of
|
514 |
+
4-dimensional real Lie Algebras by Mubarakzyanov [33]. We intentionally restrict only to such
|
515 |
+
4d algebras that cannot be decomposed into a 3d algebra and a 1d abelian factor, i.e, we are
|
516 |
+
interested in Nambu-Lie U-dualities between 11d backgrounds, rather than dualities between
|
517 |
+
11D and Type IIB solutions. More specifically, we look only at EDAs whose isotropic (geomet-
|
518 |
+
ric) subalgebra is given by g4,n with n = 1, ..., 10 and 2g2,1 in terms of the Mubarakzyanov’s
|
519 |
+
classification. Given these restrictions the classification of EDAs is summarized in Table 2,
|
520 |
+
10
|
521 |
+
|
522 |
+
where 16 non-trivial EDAs are listed in terms of dual structure constants ˜fabcd.
|
523 |
+
The important question we were interested in is whether there exists a Nambu-Lie U-duality
|
524 |
+
between 11D solutions and supergravity equations. Equivalently, in the algebraic language:
|
525 |
+
whether any of the sixteen exceptional Drinfeld algebras are equivalent up to an SL(5) trans-
|
526 |
+
formation? For that we computed the explicit form of all possible transformations between all
|
527 |
+
possible pairs of EDA listed in Table 2 of the form (2.13). In our findings, we discovered that
|
528 |
+
none of the EDA pairs except the (ED2, ED4) possess transformation matrices, taking the basis
|
529 |
+
of one EDA to another, with a non-zero determinant. Moreover, the transformation relating the
|
530 |
+
aforesaid algebras - ED2 and ED4 is simply a GL(4) transformation rotating the basis. Hence,
|
531 |
+
these two solutions are equivalent and their geometric realizations can be mapped into each
|
532 |
+
other by a 4D coordinate transformation. Hence, there are no Nambu-Lie U-dualities inside
|
533 |
+
SL(5) exceptional Drinfeld algebras relating 11D backgrounds. Note however, this does not
|
534 |
+
rule out transformations between 11D and Type IIB backgrounds, explicit examples of which
|
535 |
+
are known [28, 29]. Previously in [30] the same has been shown for transformations involving
|
536 |
+
external automorphisms of the algebra sl(5), suggested as the natural analogue of Non-Abelian
|
537 |
+
T-duality transformations. Here we complete the statement.
|
538 |
+
There are further directions to extend this work. The most obvious task is to complete
|
539 |
+
the classification including all 4D real Lie algebras and list sets of EDA’s mutually Nambu-
|
540 |
+
Lie U-dual. Less straightforward is to increase the dimension of the geometric subalgebra g
|
541 |
+
by one and consider 16D Exceptional Drinfeld Algebras. Unfortunately, there is no ready to
|
542 |
+
use classification of 5D real Lie algebras, but certain restricted classifications are present in
|
543 |
+
the literature. Some useful examples can be found in [40–43], for a review see [44]. Another
|
544 |
+
interesting direction of further research is to list those EDAs from our classification that can be
|
545 |
+
obtained as generalized Yang-Baxter deformations of the trivial EDA when all dual structure
|
546 |
+
constants are zero. In other words, to answer the question: for which algebras in Table 2 dual
|
547 |
+
structre constants can be represented in the form
|
548 |
+
˜fa
|
549 |
+
bcd = re[bcfae
|
550 |
+
d],
|
551 |
+
(3.1)
|
552 |
+
where rabc is completely antisymmetric. In the case of classical Drinfeld algebras such trans-
|
553 |
+
formations are known to preserve integrability of the 2d sigma-model on the corresponding
|
554 |
+
background.
|
555 |
+
There is no analogous statement for 3d sigma-models describing membranes
|
556 |
+
propagating on 11d supergravity backgrounds. However, such defined generalized Yang-Baxter
|
557 |
+
deformations are of certain interest (see [45] for a review).
|
558 |
+
11
|
559 |
+
|
560 |
+
Acknowledgments
|
561 |
+
This work has been supported by the Foundation for the Advancement of Theoretical
|
562 |
+
Physics and Mathematics “BASIS”, grant No 21-1-2-3-1 and by Russian Ministry of Education
|
563 |
+
and Science.
|
564 |
+
References
|
565 |
+
[1] T. H. Buscher, “A Symmetry of the String Background Field Equations,” Phys. Lett.
|
566 |
+
B194 (1987) 59–62.
|
567 |
+
[2] T. H. Buscher, “Path Integral Derivation of Quantum Duality in Nonlinear Sigma
|
568 |
+
Models,” Phys. Lett. B201 (1988) 466–472.
|
569 |
+
[3] A. Giveon, M. Porrati, and E. Rabinovici, “Target space duality in string theory,”
|
570 |
+
Phys.Rept. 244 (1994) 77–202, arXiv:hep-th/9401139 [hep-th].
|
571 |
+
[4] X. C. de la Ossa and F. Quevedo, “Duality symmetries from nonAbelian isometries in
|
572 |
+
string theory,” Nucl. Phys. B 403 (1993) 377–394, arXiv:hep-th/9210021.
|
573 |
+
[5] A. Giveon and M. Rocek, “On Nonabelian duality,” Nucl.Phys. B421 (1994) 173–190,
|
574 |
+
arXiv:hep-th/9308154 [hep-th].
|
575 |
+
[6] F. Hassler and T. Rochais, “α′-Corrected Poisson-Lie T-Duality,” Fortsch. Phys. 68
|
576 |
+
no. 9, (2020) 2000063, arXiv:2007.07897 [hep-th].
|
577 |
+
[7] R. Borsato and L. Wulff, “Quantum Correction to Generalized T Dualities,” Phys. Rev.
|
578 |
+
Lett. 125 no. 20, (2020) 201603, arXiv:2007.07902 [hep-th].
|
579 |
+
[8] C. Klimcik and P. Severa, “Dual nonAbelian duality and the Drinfeld double,” Phys.
|
580 |
+
Lett. B 351 (1995) 455–462, arXiv:hep-th/9502122.
|
581 |
+
[9] C. Klimˇc´ık and P. Severa, “Poisson-Lie T duality and loop groups of Drinfeld doubles,”
|
582 |
+
Phys. Lett. B372 (1996) 65–71, arXiv:hep-th/9512040 [hep-th].
|
583 |
+
[10] C. Klimcik, “Poisson-Lie T duality,” Nucl. Phys. B Proc. Suppl. 46 (1996) 116–121,
|
584 |
+
arXiv:hep-th/9509095.
|
585 |
+
12
|
586 |
+
|
587 |
+
[11] K. Sfetsos, “Recent developments in non-Abelian T-duality in string theory,” Fortsch.
|
588 |
+
Phys. 59 (2011) 1149–1153, arXiv:1105.0537 [hep-th].
|
589 |
+
[12] D. C. Thompson, “An Introduction to Generalised Dualities and their Applications to
|
590 |
+
Holography and Integrability,” PoS CORFU2018 (2019) 099, arXiv:1904.11561
|
591 |
+
[hep-th].
|
592 |
+
[13] F. Hassler, “Poisson-Lie T-Duality in Double Field Theory,” Phys. Lett. B 807 (2020)
|
593 |
+
135455, arXiv:1707.08624 [hep-th].
|
594 |
+
[14] S. Demulder, F. Hassler, and D. C. Thompson, “An invitation to Poisson-Lie T-duality
|
595 |
+
in Double Field Theory and its applications,” PoS CORFU2018 (2019) 113,
|
596 |
+
arXiv:1904.09992 [hep-th].
|
597 |
+
[15] M. Bugden, “Non-abelian T-folds,” JHEP 03 (2019) 189, arXiv:1901.03782 [hep-th].
|
598 |
+
[16] L. Hlavat´y and I. Petr, “T-folds as Poisson-Lie plurals,” arXiv:2004.08387 [hep-th].
|
599 |
+
[17] L. Hlavaty and L. Snobl, “Classification of 6-dimensional manin triples,”
|
600 |
+
arXiv:math/0202209.
|
601 |
+
[18] R. O. Popovych, V. M. Boyko, M. O. Nesterenko, and M. W. Lutfullin, “Realizations of
|
602 |
+
real low-dimensional Lie algebras,” J. Phys. A 36 (2003) 7337–7360,
|
603 |
+
arXiv:math-ph/0301029.
|
604 |
+
[19] C. Klimˇc´ık, “On integrability of the Yang-Baxter sigma-model,” J. Math. Phys. 50
|
605 |
+
(2009) 043508, arXiv:0802.3518 [hep-th].
|
606 |
+
[20] E. Cremmer and B. Julia, “The SO(8) supergravity,” Nucl.Phys. B159 (1979) 141.
|
607 |
+
[21] E. Cremmer, B. Julia, H. Lu, and C. Pope, “Dualization of dualities. 1.,” Nucl.Phys.
|
608 |
+
B523 (1998) 73–144, arXiv:hep-th/9710119 [hep-th].
|
609 |
+
[22] N. Obers and B. Pioline, “U duality and M theory,” Phys.Rept. 318 (1999) 113–225,
|
610 |
+
arXiv:hep-th/9809039 [hep-th].
|
611 |
+
[23] M. Duff, “Duality rotations in string theory,” Nucl.Phys. B335 (1990) 610.
|
612 |
+
[24] M. Duff and J. Lu, “Duality rotations in membrane theory,” Nucl.Phys. B347 (1990)
|
613 |
+
394–419.
|
614 |
+
13
|
615 |
+
|
616 |
+
[25] Y. Sakatani, “U-duality extension of Drinfel’d double,” PTEP 2020 no. 2, (2020)
|
617 |
+
023B08, arXiv:1911.06320 [hep-th].
|
618 |
+
[26] E. Malek and D. C. Thompson, “Poisson-Lie U-duality in Exceptional Field Theory,”
|
619 |
+
JHEP 04 (2020) 058, arXiv:1911.07833 [hep-th].
|
620 |
+
[27] E. Malek, Y. Sakatani, and D. C. Thompson, “E6(6) exceptional Drinfel’d algebras,”
|
621 |
+
JHEP 01 (2021) 020, arXiv:2007.08510 [hep-th].
|
622 |
+
[28] C. D. A. Blair, D. C. Thompson, and S. Zhidkova, “Exploring Exceptional Drinfeld
|
623 |
+
Geometries,” JHEP 09 (2020) 151, arXiv:2006.12452 [hep-th].
|
624 |
+
[29] C. D. A. Blair and S. Zhidkova, “Generalised U-dual solutions in supergravity,” JHEP
|
625 |
+
05 (2022) 081, arXiv:2203.01838 [hep-th].
|
626 |
+
[30] E. T. Musaev, “On non-abelian U-duality of 11D backgrounds,” arXiv:2007.01213
|
627 |
+
[hep-th].
|
628 |
+
[31] E. T. Musaev and Y. Sakatani, “Non-Abelian U duality at work,” Phys. Rev. D 104
|
629 |
+
no. 4, (2021) 046015, arXiv:2012.13263 [hep-th].
|
630 |
+
[32] L. Hlavaty, “Classification of 6D Leibniz algebras,” PTEP 2020 no. 7, (2020) 071B01,
|
631 |
+
arXiv:2003.06164 [hep-th].
|
632 |
+
[33] G. Mubarakzyanov, “On solvable Lie algebras,” Izv. Vys. Ucheb. Zaved. Matematika 1
|
633 |
+
(32) (1963) 114–123.
|
634 |
+
[34] H. Samtleben and M. Weidner, “The Maximal D=7 supergravities,” Nucl.Phys. B725
|
635 |
+
(2005) 383–419, arXiv:hep-th/0506237 [hep-th].
|
636 |
+
[35] O. Hohm and H. Samtleben, “U-duality covariant gravity,” JHEP 1309 (2013) 080,
|
637 |
+
arXiv:1307.0509 [hep-th].
|
638 |
+
[36] O. Hohm and H. Samtleben, “Exceptional Form of D=11 Supergravity,” Phys.Rev.Lett.
|
639 |
+
111 (2013) 231601, arXiv:1308.1673 [hep-th].
|
640 |
+
[37] E. T. Musaev, “Exceptional field theory: SL(5),” JHEP 02 (2016) 012,
|
641 |
+
arXiv:1512.02163 [hep-th].
|
642 |
+
[38] Y. Sakatani, “Type II DFT solutions from Poisson-Lie T-duality/plurality,”
|
643 |
+
arXiv:1903.12175 [hep-th]. [PTEP,073B04(2019)].
|
644 |
+
14
|
645 |
+
|
646 |
+
[39] S. Kumar and E. T. Musaev, “eda10,” 1, 2023. https://github.com/emusaev/eda10.
|
647 |
+
[40] I. Darijani and H. Usefi, “Classification of 5-dimensional restricted Lie algebras over
|
648 |
+
perfect fields, I,” Journal of Algebra 464 (2016) 97–140, arXiv:1412.8377.
|
649 |
+
[41] A. Andrada and A. Fino, “A class of Sasakian 5-manifolds,” Transformation Groups 14
|
650 |
+
(2009) 493–512, arXiv:0807.1800 [math.dg].
|
651 |
+
[42] L. Bieszk, “Classification of Five-Dimensional Lie Algebras of Class T2,” Demonstratio
|
652 |
+
Mathematica 30 no. 2, (1997) 403–424. https://doi.org/10.1515/dema-1997-0219.
|
653 |
+
[43] G. Calvaruso and A. Perrone, “Five-dimensional paracontact Lie algebras,” Differential
|
654 |
+
Geometry and its Applications 45 (2016) 115–129.
|
655 |
+
https://www.sciencedirect.com/science/article/pii/S0926224516000024.
|
656 |
+
[44] L. B. Prieto, E. M. F. Martel, J. N. Vald´es, and ´A. F. Tenorio, “A historical review of
|
657 |
+
the classifications of Lie algebras,” Revista De La Union Matematica Argentina 54
|
658 |
+
(2013) 75–99.
|
659 |
+
[45] K. Gubarev and E. Musaev, “Integrability structures in string theory,”
|
660 |
+
arXiv:2301.06486 [hep-th].
|
661 |
+
15
|
662 |
+
|
6dE1T4oBgHgl3EQfTQOX/content/tmp_files/2301.03076v1.pdf.txt
ADDED
@@ -0,0 +1,362 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
Decomposition of the static potential in SU(3) gluodynamics
|
2 |
+
V. G. Bornyakov
|
3 |
+
NRC “Kurchatov Institute” - IHEP, Protvino, 142281 Russia
|
4 |
+
I. Kudrov
|
5 |
+
NRC “Kurchatov Institute” - IHEP, Protvino, 142281 Russia,
|
6 |
+
Moscow Institute of Physics and Technology, Institutskii per. 9, 141700, Dolgoprudny, Russia
|
7 |
+
After fixing the Maximal Abelian gauge in SU(3) lattice gluodynamics we decompose the non-
|
8 |
+
abelian gauge field into the Abelian field created by Abelian monopoles and the modified nonabelian
|
9 |
+
field with monopoles removed. We then calculate respective static potentials in the fundamental
|
10 |
+
representation and show that the sum of these potentials approximates the nonabelian static poten-
|
11 |
+
tial with good precision at all distances considered. Comparison with other ways of decomposition
|
12 |
+
is made.
|
13 |
+
PACS numbers: 11.15.Ha, 12.38.Gc, 12.38.Aw
|
14 |
+
Keywords: gauge field theory, confinement, monopoles, maximal Abelian gauge
|
15 |
+
I.
|
16 |
+
INTRODUCTION
|
17 |
+
We study numerically the lattice SU(3) gluodynamics in the Maximal Abelian gauge (MAG) and consider decom-
|
18 |
+
position of the lattice gauge field Uµ(x) ∈ SU(3)
|
19 |
+
Uµ(x) = U mod
|
20 |
+
µ
|
21 |
+
(x)U mon
|
22 |
+
µ
|
23 |
+
(x)
|
24 |
+
(1)
|
25 |
+
where U mon
|
26 |
+
µ
|
27 |
+
(x) is the component of the gauge field due to Abelian monopoles (to be defined later) and U mod
|
28 |
+
µ
|
29 |
+
(x)
|
30 |
+
is respectively the monopoleless component which we call a modified gauge field. By modification we understand
|
31 |
+
removal of the Abelian monopoles.
|
32 |
+
This kind of decomposition was studied before in SU(2) gluodynamics in [1]. It was shown that while the monopole
|
33 |
+
component U mon
|
34 |
+
µ
|
35 |
+
(x) is reproducing the linear part of the static potential, the monopoleless component U mod
|
36 |
+
µ
|
37 |
+
(x)
|
38 |
+
produces purely Coulomb potential and their sum provides a good approximation of the original unaltered static
|
39 |
+
potential at all distances:
|
40 |
+
V (R) ≈ Vmod(R) + Vmon(R)
|
41 |
+
(2)
|
42 |
+
Recently, in [2] it was shown that this approximation becomes better when the lattice spacing is decreased leaving a
|
43 |
+
possibility that relation (2) becomes exact in the continuum limit. It was also shown that (2) is satisfied in SU(2)
|
44 |
+
QCD as well. In the present work we extend the study of the decomposition (1) to the more realistic case - SU(3)
|
45 |
+
gluodynamics.
|
46 |
+
It is well known [3–7] that after performing the Abelian projection in the MAG [8, 9], the Abelian string tension
|
47 |
+
calculated from the Abelian static potential is very close to the nonabelian string tension. This observation, confirmed
|
48 |
+
in gluodynamics and in QCD, supports the concept of the Abelian dominance (for a review see e.g. [10]). It was further
|
49 |
+
discovered [5, 11, 12] that the so called monopole static potential also has string tension close to the nonabelian one.
|
50 |
+
These observations are in agreement with conjecture that monopole degrees of freedom are responsible for confinement
|
51 |
+
[13].
|
52 |
+
The interesting question is what is the role of the other, i.e. monopoleless degrees of freedom. The results obtained
|
53 |
+
in SU(2) gluodynamics suggest that they are responsible for the Coulomb part of the static potential both at small
|
54 |
+
and large distances. This suggests that while at small distances U mod
|
55 |
+
µ
|
56 |
+
(x) gives perturbative contribution into the
|
57 |
+
static potential, it provides nonperturbative contribution at large distances.
|
58 |
+
It is worth to note that the gauge covariant decomposition was introduced in Refs. [14] and [15] and developed
|
59 |
+
further in Refs. [16–18], see for review [19]. The numerical results demonstrating analogues of the Abelian dominance
|
60 |
+
and the monopole dominance within this approach were obtained in [20]. It would be interesting to check if the
|
61 |
+
decomposition into the monopole and monopoleless components works in this approach.
|
62 |
+
The decomposition different from eq. (1) was considered in SU(3) gluodynamics after fixing MAG [7]. The usual
|
63 |
+
coset decomposition of the gauge field into the Abelian and the off-diagonal components was used:
|
64 |
+
Uµ(x) = U offd
|
65 |
+
µ
|
66 |
+
(x)U Abel
|
67 |
+
µ
|
68 |
+
(x)
|
69 |
+
(3)
|
70 |
+
arXiv:2301.03076v1 [hep-lat] 8 Jan 2023
|
71 |
+
|
72 |
+
2
|
73 |
+
and respective decomposition for the static potential was verified:
|
74 |
+
V (R) ≈ Voffd(R) + VAbel(R).
|
75 |
+
(4)
|
76 |
+
We will compare our results for decomposition (4) with results of Ref. [7] in section III.
|
77 |
+
The decomposition similar to (2) for the static potential in the maximal center gauge
|
78 |
+
V (R) ≈ Vcent(R) + Vmod,cent(R)
|
79 |
+
(5)
|
80 |
+
corresponding to the decomposition of the gauge field into the center and modified (vortex free) components:
|
81 |
+
Uµ(x) = U mod,cent
|
82 |
+
µ
|
83 |
+
(x)U cent
|
84 |
+
µ
|
85 |
+
(x) .
|
86 |
+
(6)
|
87 |
+
was first checked long ago in SU(2) gluodynamics [1] and was studied recently in QCD [21]. We will comment on
|
88 |
+
these numerical results later in section III.
|
89 |
+
II.
|
90 |
+
DECOMPOSITION OF THE GAUGE FIELD
|
91 |
+
We consider the SU(3) lattice gluodynamics after fixing MAG. We use the definition of MAG introduced for lattice
|
92 |
+
SU(N) theory in [22] and later specified for the SU(3) group in [23]. The MAG is fixed by maximizing the functional
|
93 |
+
F =
|
94 |
+
1
|
95 |
+
8 V
|
96 |
+
�
|
97 |
+
x,µ
|
98 |
+
�
|
99 |
+
|U (11)
|
100 |
+
µ
|
101 |
+
(x)|2 + |U (22)
|
102 |
+
µ
|
103 |
+
(x)|2 + |U (33)
|
104 |
+
µ
|
105 |
+
(x)|2 − 1
|
106 |
+
�
|
107 |
+
(7)
|
108 |
+
with respect to local gauge transformations g of the lattice gauge field,
|
109 |
+
Uµ(x) → U g
|
110 |
+
µ(x) = g(x)†Uµ(x)g(x + ˆµ) .
|
111 |
+
(8)
|
112 |
+
To fix MAG, the simulated annealing algorithm with three random gauge copies was used. This algorithm was first
|
113 |
+
used to fix MAG in the SU(2) case [5] and then extended to the SU(3) group in [24]. The details of implementation
|
114 |
+
of the simulated annealing algorithm in the case of SU(3) gauge group can be found in [25]. For the gauge fixing
|
115 |
+
functional F we obtained the average value < F >= 0.73388(1) to be compared with < F > 0.7322(2) quoted in [26].
|
116 |
+
The larger is the value of the maximized functional the better is the gauge fixing. The difference in < F > is due
|
117 |
+
to the Gribov copies effects and implies that there might be substantial difference between our results and results of
|
118 |
+
Ref. [26] for gauge dependent quantities like Abelian or monopole string tension as discussed in details in [25].
|
119 |
+
The Abelian projection means coset decomposition (3) of the nonabelian lattice gauge field Uµ(x) ∈ SU(3) into the
|
120 |
+
Abelian field U Abel
|
121 |
+
µ
|
122 |
+
(x) ∈ U(1) × U(1) and the coset field U offd
|
123 |
+
µ
|
124 |
+
(x) ∈ SU(3)/U(1) × U(1). The Abelian field U Abel
|
125 |
+
µ
|
126 |
+
(x)
|
127 |
+
is determined as
|
128 |
+
U Abel
|
129 |
+
µ
|
130 |
+
(x) = diag
|
131 |
+
�
|
132 |
+
u(1)
|
133 |
+
µ (x), u(2)
|
134 |
+
µ (x), u(3)
|
135 |
+
µ (x)
|
136 |
+
�
|
137 |
+
,
|
138 |
+
(9)
|
139 |
+
where
|
140 |
+
u(a)
|
141 |
+
µ (x) = eiθ(a)
|
142 |
+
µ
|
143 |
+
(x)
|
144 |
+
(10)
|
145 |
+
with
|
146 |
+
θ(a)
|
147 |
+
µ (x) = arg (Uµ(x))a − 1
|
148 |
+
3
|
149 |
+
3
|
150 |
+
�
|
151 |
+
b=1
|
152 |
+
arg(Uµ(x))b
|
153 |
+
��
|
154 |
+
mod 2π
|
155 |
+
(11)
|
156 |
+
such that
|
157 |
+
θ(a)
|
158 |
+
µ (x) ∈ [−4
|
159 |
+
3π, 4
|
160 |
+
3π] .
|
161 |
+
(12)
|
162 |
+
This definition of Abelian projection uµ(x) maximizes the expression |Tr
|
163 |
+
�
|
164 |
+
U †
|
165 |
+
µ(x)uµ(x)
|
166 |
+
�
|
167 |
+
|2 [27]. The Abelian gauge
|
168 |
+
fields can in turn be decomposed into monopole (singular) and photon (regular) parts:
|
169 |
+
θ(a)
|
170 |
+
µ (x) = θ(a) mon
|
171 |
+
µ
|
172 |
+
(x) + θ(a) ph
|
173 |
+
µ
|
174 |
+
(x) ,
|
175 |
+
(13)
|
176 |
+
|
177 |
+
3
|
178 |
+
The monopole part is defined by [28]:
|
179 |
+
θ(a) mon
|
180 |
+
µ
|
181 |
+
(x) = 2π
|
182 |
+
�
|
183 |
+
y
|
184 |
+
D(x − y)∂−
|
185 |
+
α m(a)
|
186 |
+
αµ(y) ,
|
187 |
+
(14)
|
188 |
+
where integers m(a)
|
189 |
+
µν (x) denote the singular part of the Abelian plaquettes (Dirac plaquettes), ∂−
|
190 |
+
α is the backward
|
191 |
+
lattice derivative, and D(x) denotes the lattice Coulomb propagator. Then U mon
|
192 |
+
µ
|
193 |
+
(x) introduced in (1) is defined as
|
194 |
+
U mon
|
195 |
+
µ
|
196 |
+
(x) = diag
|
197 |
+
�
|
198 |
+
eiθ(1) mon
|
199 |
+
µ
|
200 |
+
(x), eiθ(2) mon
|
201 |
+
µ
|
202 |
+
(x), eiθ(3) mon
|
203 |
+
µ
|
204 |
+
(x)�
|
205 |
+
.
|
206 |
+
(15)
|
207 |
+
III.
|
208 |
+
THE STATIC POTENTIAL DECOMPOSITION
|
209 |
+
We calculated R × T rectangular Wilson loops W(R, T), Wmon(R, T) and Wmod(R, T) using lattice gauge fields
|
210 |
+
Uµ(x), U mon
|
211 |
+
µ
|
212 |
+
(x), U mod
|
213 |
+
µ
|
214 |
+
(x) introduced above. To extract respective static potentials V (R), Vmon(R) and Vmod(R) the
|
215 |
+
APE smearing [29] has been employed. Computations were done with the Wilson lattice action at β = 6.0 on 244
|
216 |
+
lattices using 5000) statistically independent configurations. The lattice spacing at this value of the bare coupling
|
217 |
+
constant is defined by a/r0 = 0.186(4) [30], where r0 = 0.5fm is called Sommer parameter. In Fig. 1 our results
|
218 |
+
are presented. One can see that similar to the SU(2) gluodynamics [2] the monopole potential Vmon(R) is almost
|
219 |
+
perfectly linear with small curvature at small distances while the modified field potential Vmod(R) is well described
|
220 |
+
by the Coulomb potential. It is also seen that the relation (2) is valid at all distances with most essential discrepancy
|
221 |
+
of about 10% at large distances. It is clear that this discrepancy is mostly due to rather low slope of Vmon(R). As we
|
222 |
+
have already mentioned it was found in SU(2) gluodynamics that with decreasing of the lattice spacing agreement in
|
223 |
+
relation (2) improves substantially. This should be checked in SU(3) gluodynamics in future.
|
224 |
+
FIG. 1: Comparison of the nonabelian potential V (R) (filled circles) with the sum Vmod(R)+Vmon(R) (filled triangles). Vmod(r)
|
225 |
+
(empty circles) and Vmon(r) (filled inverted triangles) are also depicted. The solid curves show the fits to the Cornell potential.
|
226 |
+
Next we come to our results for decomposition (4) considered in Ref. [7]. These results are presented in Fig. 2.
|
227 |
+
In this figure we compare the original potential V (R) with the decompositions (2) and (4). One can see that the
|
228 |
+
decomposition (2) clearly works better. Both decompositions should be checked in the continuum limit. In any case,
|
229 |
+
our results clearly contradict to the conclusion made in Ref. [7] that the relation (4) is satisfied very nicely already at
|
230 |
+
β = 6.0. Comparing our results presented here with results we obtained on 164 lattices we found that finite volume
|
231 |
+
effects are small. We should note that in [7] slightly different procedure of the Abelian projection was used but as
|
232 |
+
it was claimed in Ref. [31] the differences between these two procedures of Abelian projection are negligible. Thus
|
233 |
+
our understanding is that the reason for such discrepancy with results of Ref. [7] is the difference in the gauge fixing
|
234 |
+
quality. It was shown in the past that the Gribov copy effects for gauge non-invariant quantities might be quite
|
235 |
+
substantial [25, 31].
|
236 |
+
|
237 |
+
SU3
|
238 |
+
mon
|
239 |
+
mod
|
240 |
+
mon+mod
|
241 |
+
5
|
242 |
+
4
|
243 |
+
V(R)
|
244 |
+
3
|
245 |
+
0
|
246 |
+
0.5
|
247 |
+
1.0
|
248 |
+
1.5
|
249 |
+
2.0
|
250 |
+
R/ro4
|
251 |
+
potential
|
252 |
+
σr2
|
253 |
+
0
|
254 |
+
α
|
255 |
+
r0V0
|
256 |
+
V (R)
|
257 |
+
1.34(2) -0.34(1) 3.61(2)
|
258 |
+
Vmon(R)
|
259 |
+
0.99(1) 0.09(1) -0.36(2)
|
260 |
+
Vmod(R)
|
261 |
+
0
|
262 |
+
-0.42(1) 4.22(1)
|
263 |
+
Vmon(R) + Vmod(R) 0.94(1) -0.39(1) 3.98(2)
|
264 |
+
TABLE I: Parameters of the potentials obtained by fits to function V0 − α/R + σR.
|
265 |
+
FIG. 2: Comparison of the nonabelian potential V (R) (filled circles) with the sum Vmod(R)+Vmon(R) (filled inverted triangles)
|
266 |
+
and the sum VAbel(R) + Voffd(R) (filled squares). Voffd(r) (filled triangles) and VAbel(r) (empty circles) are also depicted. The
|
267 |
+
solid curves show the fits to the Cornell potential.
|
268 |
+
Next we wish to make a remark about the decomposition (5). This decomposition was first studied in [1] using
|
269 |
+
the Direct Central gauge in SU(2) gluodynamics. It was concluded that this decomposition holds with substantially
|
270 |
+
less precision than the decomposition (2), first of all, due to the low string tension provided by the center vortex
|
271 |
+
component. To queue the problem of low string tension obtained after the center projection the new approach to
|
272 |
+
the definition of the center gauge was formulated and successfully applied to SU(2) gluodynamics in [32]. Recently
|
273 |
+
this decomposition was studied in the lattice QCD with light quarks [21]. It was found that in this theory the center
|
274 |
+
projected string tension is in a very good agreement with the physical string tension. On the other hand, the modified
|
275 |
+
component U mod,cent
|
276 |
+
µ
|
277 |
+
(x) produces the static potential which is not compatible with the Coulomb potential. Thus, the
|
278 |
+
decomposition fails to work at small distances.
|
279 |
+
IV.
|
280 |
+
CONCLUSIONS
|
281 |
+
There are a few suggestions for the decomposition of the gauge field into components describing (mostly) either
|
282 |
+
infrared or ultra-violate physics. These include the gauge covariant Cho decomposition [14–18], two decompositions
|
283 |
+
in the MAG, eqs. (1) and (3) and one decomposition in the maximal center gauge (6). In this work we extended
|
284 |
+
our study of the decomposition in MAG into the monopole and the modified (monopoleless) components in SU(2)
|
285 |
+
gluodynamics and SU(2) QCD [2] to the case of SU(3) gluodynamics. We presented our results for one lattice spacing
|
286 |
+
to demonstrate that the decomposition works quite well. Our results obtained in [2] for SU(2) gluodynamics give
|
287 |
+
hope that the decomposition (1) will work even better when the lattice spacing will be decreased.
|
288 |
+
Our results for another MAG decomposition, 3, contradict to results from Ref. [7] and also indicate that the
|
289 |
+
decomposition 1 is superior. There is another reason to consider the decomposition 1 better motivated physically
|
290 |
+
than the decomposition 3. The decompositon 1 separates out the monopole component U mon
|
291 |
+
µ
|
292 |
+
(x) which is responsible
|
293 |
+
|
294 |
+
SU(3)
|
295 |
+
mon+mod
|
296 |
+
abel
|
297 |
+
offdiag
|
298 |
+
abel+offdiag
|
299 |
+
5
|
300 |
+
4
|
301 |
+
V(R)
|
302 |
+
3
|
303 |
+
2
|
304 |
+
1
|
305 |
+
0
|
306 |
+
0.5
|
307 |
+
1.0
|
308 |
+
1.5
|
309 |
+
2.0
|
310 |
+
R/ro5
|
311 |
+
for the linear part of the static potential as well as for the chiral symmetry breaking. The modified (monopoleless)
|
312 |
+
component U mod
|
313 |
+
µ
|
314 |
+
(x) produces purely Coulomb potential which is in agreement with the original Coulomb part both
|
315 |
+
at small and large distances. At the same time in the decomposition 3 the Coulomb part is distributed in an unnatural
|
316 |
+
way between two components: Abelian and off-diagonal.
|
317 |
+
It is clear that the study of both decompositions at varying lattice spacing are necessary to understand their fate
|
318 |
+
in the continuum limit. This is the subject of our future work.
|
319 |
+
[1] V. G. Bornyakov, M. I. Polikarpov, G. Schierholz, et al, Nucl. Phys. B Proc. Suppl. 153, 25-32 (2006) [arXiv:hep-
|
320 |
+
lat/0512003 [hep-lat]].
|
321 |
+
[2] V. G. Bornyakov, I. Kudrov and R. N. Rogalyov, Phys. Rev. D 105, no.5, 054519 (2022) [arXiv:2101.04196 [hep-lat]].
|
322 |
+
[3] T. Suzuki and I. Yotsuyanagi, Phys. Rev. D 42 (1990) 4257.
|
323 |
+
[4] S. Hioki, S. Kitahara, S. Kiura, et al, Phys. Lett. B 272, 326 (1991) [Erratum-ibid. B 281, 416 (1992)].
|
324 |
+
[5] G. S. Bali, V. Bornyakov, M. Muller-Preussker and K. Schilling, Phys. Rev. D 54 (1996) 2863.
|
325 |
+
[6] V. Bornyakov and M. Muller-Preussker, Nucl. Phys. Proc. Suppl. 106, 646 (2002).
|
326 |
+
[7] N. Sakumichi and H. Suganuma, Phys. Rev. D 90 (2014) no.11, 111501.
|
327 |
+
[8] A. S. Kronfeld, M. L. Laursen, G. Schierholz and U. J. Wiese, Phys. Lett. B 198, 516 (1987).
|
328 |
+
[9] G. ’t Hooft, Nucl. Phys. B 190 (1981) 455.
|
329 |
+
[10] M. N. Chernodub and M. I. Polikarpov, in ”Confinement, Duality and Non-perturbative Aspects of QCD”, p.387, Plenum
|
330 |
+
Press, 1998, hep-th/9710205; R. W. Haymaker, Phys. Rept. 315 (1999) 153; J. Greensite, Prog. Part. Nucl. Phys. 51
|
331 |
+
(2003), 1
|
332 |
+
[11] H. Shiba and T. Suzuki, Phys. Lett. B 333, 461 (1994).
|
333 |
+
[12] J. D. Stack, S. D. Neiman and R. J. Wensley, Phys. Rev. D 50, 3399 (1994).
|
334 |
+
[13] G. ’t Hooft, in High Energy Physics, ed. A. Zichichi, EPS International Conference, Palermo (1975); S. Mandelstam, Phys.
|
335 |
+
Rept. 23, 245 (1976).
|
336 |
+
[14] Y. M. Cho, Phys. Rev. D 21 (1980), 1080 doi:10.1103/PhysRevD.21.1080
|
337 |
+
[15] Y.S. Duan and M.L. Ge, Sinica Sci., 11, 1072–1081 (1979).
|
338 |
+
[16] L. Faddeev and A.J. Niemi, Phys. Rev. Lett. 82, 1624–1627 (1999); L.D. Faddeev and A.J. Niemi, Nucl. Phys. B776, 38-65
|
339 |
+
(2007).
|
340 |
+
[17] S.V. Shabanov, Phys. Lett. B458, 322–330 (1999); S.V. Shabanov, Phys. Lett. B463, 263–272 (1999).
|
341 |
+
[18] K. I. Kondo, T. Murakami and T. Shinohara, Prog. Theor. Phys. 115 (2006), 201-216; S. Kato, K. I. Kondo, T. Murakami,
|
342 |
+
A. Shibata, T. Shinohara and S. Ito, Phys. Lett. B 632 (2006), 326-332.
|
343 |
+
[19] K. I. Kondo, S. Kato, A. Shibata and T. Shinohara, Phys. Rept. 579 (2015), 1-226.
|
344 |
+
[20] S. Kato, K. I. Kondo and A. Shibata, Phys. Rev. D 91 (2015) no.3, 034506.
|
345 |
+
[21] J. C. Biddle, W. Kamleh and D. B. Leinweber, Phys. Rev. D 106 (2022) no.5, 054505 doi:10.1103/PhysRevD.106.054505
|
346 |
+
[arXiv:2206.00844 [hep-lat]].
|
347 |
+
[22] A. S. Kronfeld, G. Schierholz and U. J. Wiese, Nucl. Phys. B 293 (1987), 461-478.
|
348 |
+
[23] F. Brandstater, U. J. Wiese and G. Schierholz, Phys. Lett. B 272 (1991), 319-325.
|
349 |
+
[24] V. Bornyakov, G. Schierholz and T. Streuer, Nucl. Phys. B Proc. Suppl. 106 (2002), 676-678 doi:10.1016/S0920-
|
350 |
+
5632(01)01813-8 [arXiv:hep-lat/0111018 [hep-lat]].
|
351 |
+
[25] V. G. Bornyakov et al. [DIK], Phys. Rev. D 70 (2004), 074511 doi:10.1103/PhysRevD.70.074511 [arXiv:hep-lat/0310011
|
352 |
+
[hep-lat]].
|
353 |
+
[26] H. Ohata and H. Suganuma, Phys. Rev. D 102 (2020) no.1, 014512.
|
354 |
+
[27] V. G. Bornyakov et al. [DIK], Phys. Rev. D 71 (2005), 114504 doi:10.1103/PhysRevD.71.114504 [arXiv:hep-lat/0401014
|
355 |
+
[hep-lat]].
|
356 |
+
[28] J. Smit and A. van der Sijs, Nucl. Phys. B 355 (1991), 603-648
|
357 |
+
[29] M. Albanese et al. [APE], Phys. Lett. B 192 (1987), 163-169
|
358 |
+
[30] S. Necco and R. Sommer, Nucl. Phys. B 622 (2002), 328-346.
|
359 |
+
[31] J. D. Stack, W. W. Tucker and R. J. Wensley, Nucl. Phys. B 639 (2002), 203-222 doi:10.1016/S0550-3213(02)00537-0
|
360 |
+
[arXiv:hep-lat/0110196 [hep-lat]].
|
361 |
+
[32] R. Golubich and M. Faber, Particles 3 (2020) no.2, 444-455.
|
362 |
+
|
6dE1T4oBgHgl3EQfTQOX/content/tmp_files/load_file.txt
ADDED
@@ -0,0 +1,412 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
filepath=/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf,len=411
|
2 |
+
page_content='Decomposition of the static potential in SU(3) gluodynamics V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
3 |
+
page_content=' G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
4 |
+
page_content=' Bornyakov NRC “Kurchatov Institute” - IHEP, Protvino, 142281 Russia I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
5 |
+
page_content=' Kudrov NRC “Kurchatov Institute” - IHEP, Protvino, 142281 Russia, Moscow Institute of Physics and Technology, Institutskii per.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
6 |
+
page_content=' 9, 141700, Dolgoprudny, Russia After fixing the Maximal Abelian gauge in SU(3) lattice gluodynamics we decompose the non- abelian gauge field into the Abelian field created by Abelian monopoles and the modified nonabelian field with monopoles removed.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
7 |
+
page_content=' We then calculate respective static potentials in the fundamental representation and show that the sum of these potentials approximates the nonabelian static poten- tial with good precision at all distances considered.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
8 |
+
page_content=' Comparison with other ways of decomposition is made.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
9 |
+
page_content=' PACS numbers: 11.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
10 |
+
page_content='15.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
11 |
+
page_content='Ha, 12.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
12 |
+
page_content='38.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
13 |
+
page_content='Gc, 12.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
14 |
+
page_content='38.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
15 |
+
page_content='Aw Keywords: gauge field theory, confinement, monopoles, maximal Abelian gauge I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
16 |
+
page_content=' INTRODUCTION We study numerically the lattice SU(3) gluodynamics in the Maximal Abelian gauge (MAG) and consider decom- position of the lattice gauge field Uµ(x) ∈ SU(3) Uµ(x) = U mod µ (x)U mon µ (x) (1) where U mon µ (x) is the component of the gauge field due to Abelian monopoles (to be defined later) and U mod µ (x) is respectively the monopoleless component which we call a modified gauge field.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
17 |
+
page_content=' By modification we understand removal of the Abelian monopoles.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
18 |
+
page_content=' This kind of decomposition was studied before in SU(2) gluodynamics in [1].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
19 |
+
page_content=' It was shown that while the monopole component U mon µ (x) is reproducing the linear part of the static potential,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
20 |
+
page_content=' the monopoleless component U mod µ (x) produces purely Coulomb potential and their sum provides a good approximation of the original unaltered static potential at all distances: V (R) ≈ Vmod(R) + Vmon(R) (2) Recently,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
21 |
+
page_content=' in [2] it was shown that this approximation becomes better when the lattice spacing is decreased leaving a possibility that relation (2) becomes exact in the continuum limit.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
22 |
+
page_content=' It was also shown that (2) is satisfied in SU(2) QCD as well.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
23 |
+
page_content=' In the present work we extend the study of the decomposition (1) to the more realistic case - SU(3) gluodynamics.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
24 |
+
page_content=' It is well known [3–7] that after performing the Abelian projection in the MAG [8, 9], the Abelian string tension calculated from the Abelian static potential is very close to the nonabelian string tension.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
25 |
+
page_content=' This observation, confirmed in gluodynamics and in QCD, supports the concept of the Abelian dominance (for a review see e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
26 |
+
page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
27 |
+
page_content=' [10]).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
28 |
+
page_content=' It was further discovered [5, 11, 12] that the so called monopole static potential also has string tension close to the nonabelian one.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
29 |
+
page_content=' These observations are in agreement with conjecture that monopole degrees of freedom are responsible for confinement [13].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
30 |
+
page_content=' The interesting question is what is the role of the other, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
31 |
+
page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
32 |
+
page_content=' monopoleless degrees of freedom.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
33 |
+
page_content=' The results obtained in SU(2) gluodynamics suggest that they are responsible for the Coulomb part of the static potential both at small and large distances.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
34 |
+
page_content=' This suggests that while at small distances U mod µ (x) gives perturbative contribution into the static potential, it provides nonperturbative contribution at large distances.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
35 |
+
page_content=' It is worth to note that the gauge covariant decomposition was introduced in Refs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
36 |
+
page_content=' [14] and [15] and developed further in Refs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
37 |
+
page_content=' [16–18], see for review [19].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
38 |
+
page_content=' The numerical results demonstrating analogues of the Abelian dominance and the monopole dominance within this approach were obtained in [20].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
39 |
+
page_content=' It would be interesting to check if the decomposition into the monopole and monopoleless components works in this approach.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
40 |
+
page_content=' The decomposition different from eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
41 |
+
page_content=' (1) was considered in SU(3) gluodynamics after fixing MAG [7].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
42 |
+
page_content=' The usual coset decomposition of the gauge field into the Abelian and the off-diagonal components was used: Uµ(x) = U offd µ (x)U Abel µ (x) (3) arXiv:2301.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
43 |
+
page_content='03076v1 [hep-lat] 8 Jan 2023 2 and respective decomposition for the static potential was verified: V (R) ≈ Voffd(R) + VAbel(R).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
44 |
+
page_content=' (4) We will compare our results for decomposition (4) with results of Ref.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
45 |
+
page_content=' [7] in section III.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
46 |
+
page_content=' The decomposition similar to (2) for the static potential in the maximal center gauge V (R) ≈ Vcent(R) + Vmod,cent(R) (5) corresponding to the decomposition of the gauge field into the center and modified (vortex free) components: Uµ(x) = U mod,cent µ (x)U cent µ (x) .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
47 |
+
page_content=' (6) was first checked long ago in SU(2) gluodynamics [1] and was studied recently in QCD [21].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
48 |
+
page_content=' We will comment on these numerical results later in section III.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
49 |
+
page_content=' II.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
50 |
+
page_content=' DECOMPOSITION OF THE GAUGE FIELD We consider the SU(3) lattice gluodynamics after fixing MAG.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
51 |
+
page_content=' We use the definition of MAG introduced for lattice SU(N) theory in [22] and later specified for the SU(3) group in [23].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
52 |
+
page_content=' The MAG is fixed by maximizing the functional F = 1 8 V � x,µ � |U (11) µ (x)|2 + |U (22) µ (x)|2 + |U (33) µ (x)|2 − 1 � (7) with respect to local gauge transformations g of the lattice gauge field, Uµ(x) → U g µ(x) = g(x)†Uµ(x)g(x + ˆµ) .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
53 |
+
page_content=' (8) To fix MAG, the simulated annealing algorithm with three random gauge copies was used.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
54 |
+
page_content=' This algorithm was first used to fix MAG in the SU(2) case [5] and then extended to the SU(3) group in [24].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
55 |
+
page_content=' The details of implementation of the simulated annealing algorithm in the case of SU(3) gauge group can be found in [25].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
56 |
+
page_content=' For the gauge fixing functional F we obtained the average value < F >= 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
57 |
+
page_content='73388(1) to be compared with < F > 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
58 |
+
page_content='7322(2) quoted in [26].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
59 |
+
page_content=' The larger is the value of the maximized functional the better is the gauge fixing.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
60 |
+
page_content=' The difference in < F > is due to the Gribov copies effects and implies that there might be substantial difference between our results and results of Ref.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
61 |
+
page_content=' [26] for gauge dependent quantities like Abelian or monopole string tension as discussed in details in [25].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
62 |
+
page_content=' The Abelian projection means coset decomposition (3) of the nonabelian lattice gauge field Uµ(x) ∈ SU(3) into the Abelian field U Abel µ (x) ∈ U(1) × U(1) and the coset field U offd µ (x) ∈ SU(3)/U(1) × U(1).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
63 |
+
page_content=' The Abelian field U Abel µ (x) is determined as U Abel µ (x) = diag � u(1) µ (x), u(2) µ (x), u(3) µ (x) � , (9) where u(a) µ (x) = eiθ(a) µ (x) (10) with θ(a) µ (x) = arg (Uµ(x))a − 1 3 3 � b=1 arg(Uµ(x))b �� mod 2π (11) such that θ(a) µ (x) ∈ [−4 3π, 4 3π] .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
64 |
+
page_content=' (12) This definition of Abelian projection uµ(x) maximizes the expression |Tr � U † µ(x)uµ(x) � |2 [27].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
65 |
+
page_content=' The Abelian gauge fields can in turn be decomposed into monopole (singular) and photon (regular) parts: θ(a) µ (x) = θ(a) mon µ (x) + θ(a) ph µ (x) , (13) 3 The monopole part is defined by [28]: θ(a) mon µ (x) = 2π � y D(x − y)∂− α m(a) αµ(y) , (14) where integers m(a) µν (x) denote the singular part of the Abelian plaquettes (Dirac plaquettes), ∂− α is the backward lattice derivative, and D(x) denotes the lattice Coulomb propagator.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
66 |
+
page_content=' Then U mon µ (x) introduced in (1) is defined as U mon µ (x) = diag � eiθ(1) mon µ (x), eiθ(2) mon µ (x), eiθ(3) mon µ (x)� .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
67 |
+
page_content=' (15) III.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
68 |
+
page_content=' THE STATIC POTENTIAL DECOMPOSITION We calculated R × T rectangular Wilson loops W(R, T), Wmon(R, T) and Wmod(R, T) using lattice gauge fields Uµ(x), U mon µ (x), U mod µ (x) introduced above.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
69 |
+
page_content=' To extract respective static potentials V (R), Vmon(R) and Vmod(R) the APE smearing [29] has been employed.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
70 |
+
page_content=' Computations were done with the Wilson lattice action at β = 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
71 |
+
page_content='0 on 244 lattices using 5000) statistically independent configurations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
72 |
+
page_content=' The lattice spacing at this value of the bare coupling constant is defined by a/r0 = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
73 |
+
page_content='186(4) [30], where r0 = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
74 |
+
page_content='5fm is called Sommer parameter.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
75 |
+
page_content=' In Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
76 |
+
page_content=' 1 our results are presented.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
77 |
+
page_content=' One can see that similar to the SU(2) gluodynamics [2] the monopole potential Vmon(R) is almost perfectly linear with small curvature at small distances while the modified field potential Vmod(R) is well described by the Coulomb potential.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
78 |
+
page_content=' It is also seen that the relation (2) is valid at all distances with most essential discrepancy of about 10% at large distances.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
79 |
+
page_content=' It is clear that this discrepancy is mostly due to rather low slope of Vmon(R).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
80 |
+
page_content=' As we have already mentioned it was found in SU(2) gluodynamics that with decreasing of the lattice spacing agreement in relation (2) improves substantially.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
81 |
+
page_content=' This should be checked in SU(3) gluodynamics in future.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
82 |
+
page_content=' FIG.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
83 |
+
page_content=' 1: Comparison of the nonabelian potential V (R) (filled circles) with the sum Vmod(R)+Vmon(R) (filled triangles).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
84 |
+
page_content=' Vmod(r) (empty circles) and Vmon(r) (filled inverted triangles) are also depicted.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
85 |
+
page_content=' The solid curves show the fits to the Cornell potential.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
86 |
+
page_content=' Next we come to our results for decomposition (4) considered in Ref.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
87 |
+
page_content=' [7].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
88 |
+
page_content=' These results are presented in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
89 |
+
page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
90 |
+
page_content=' In this figure we compare the original potential V (R) with the decompositions (2) and (4).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
91 |
+
page_content=' One can see that the decomposition (2) clearly works better.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
92 |
+
page_content=' Both decompositions should be checked in the continuum limit.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
93 |
+
page_content=' In any case, our results clearly contradict to the conclusion made in Ref.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
94 |
+
page_content=' [7] that the relation (4) is satisfied very nicely already at β = 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
95 |
+
page_content='0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
96 |
+
page_content=' Comparing our results presented here with results we obtained on 164 lattices we found that finite volume effects are small.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
97 |
+
page_content=' We should note that in [7] slightly different procedure of the Abelian projection was used but as it was claimed in Ref.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
98 |
+
page_content=' [31] the differences between these two procedures of Abelian projection are negligible.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
99 |
+
page_content=' Thus our understanding is that the reason for such discrepancy with results of Ref.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
100 |
+
page_content=' [7] is the difference in the gauge fixing quality.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
101 |
+
page_content=' It was shown in the past that the Gribov copy effects for gauge non-invariant quantities might be quite substantial [25, 31].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
102 |
+
page_content=' SU3 mon mod mon+mod 5 4 V(R) 3 0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
103 |
+
page_content='5 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
104 |
+
page_content='0 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
105 |
+
page_content='5 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
106 |
+
page_content='0 R/ro4 potential σr2 0 α r0V0 V (R) 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
107 |
+
page_content='34(2) -0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
108 |
+
page_content='34(1) 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
109 |
+
page_content='61(2) Vmon(R) 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
110 |
+
page_content='99(1) 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
111 |
+
page_content='09(1) -0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
112 |
+
page_content='36(2) Vmod(R) 0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
113 |
+
page_content='42(1) 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
114 |
+
page_content='22(1) Vmon(R) + Vmod(R) 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
115 |
+
page_content='94(1) -0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
116 |
+
page_content='39(1) 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
117 |
+
page_content='98(2) TABLE I: Parameters of the potentials obtained by fits to function V0 − α/R + σR.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
118 |
+
page_content=' FIG.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
119 |
+
page_content=' 2: Comparison of the nonabelian potential V (R) (filled circles) with the sum Vmod(R)+Vmon(R) (filled inverted triangles) and the sum VAbel(R) + Voffd(R) (filled squares).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
120 |
+
page_content=' Voffd(r) (filled triangles) and VAbel(r) (empty circles) are also depicted.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
121 |
+
page_content=' The solid curves show the fits to the Cornell potential.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
122 |
+
page_content=' Next we wish to make a remark about the decomposition (5).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
123 |
+
page_content=' This decomposition was first studied in [1] using the Direct Central gauge in SU(2) gluodynamics.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
124 |
+
page_content=' It was concluded that this decomposition holds with substantially less precision than the decomposition (2), first of all, due to the low string tension provided by the center vortex component.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
125 |
+
page_content=' To queue the problem of low string tension obtained after the center projection the new approach to the definition of the center gauge was formulated and successfully applied to SU(2) gluodynamics in [32].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
126 |
+
page_content=' Recently this decomposition was studied in the lattice QCD with light quarks [21].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
127 |
+
page_content=' It was found that in this theory the center projected string tension is in a very good agreement with the physical string tension.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
128 |
+
page_content=' On the other hand, the modified component U mod,cent µ (x) produces the static potential which is not compatible with the Coulomb potential.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
129 |
+
page_content=' Thus, the decomposition fails to work at small distances.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
130 |
+
page_content=' IV.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
131 |
+
page_content=' CONCLUSIONS There are a few suggestions for the decomposition of the gauge field into components describing (mostly) either infrared or ultra-violate physics.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
132 |
+
page_content=' These include the gauge covariant Cho decomposition [14–18], two decompositions in the MAG, eqs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
133 |
+
page_content=' (1) and (3) and one decomposition in the maximal center gauge (6).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
134 |
+
page_content=' In this work we extended our study of the decomposition in MAG into the monopole and the modified (monopoleless) components in SU(2) gluodynamics and SU(2) QCD [2] to the case of SU(3) gluodynamics.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
135 |
+
page_content=' We presented our results for one lattice spacing to demonstrate that the decomposition works quite well.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
136 |
+
page_content=' Our results obtained in [2] for SU(2) gluodynamics give hope that the decomposition (1) will work even better when the lattice spacing will be decreased.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
137 |
+
page_content=' Our results for another MAG decomposition, 3, contradict to results from Ref.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
138 |
+
page_content=' [7] and also indicate that the decomposition 1 is superior.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
139 |
+
page_content=' There is another reason to consider the decomposition 1 better motivated physically than the decomposition 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
140 |
+
page_content=' The decompositon 1 separates out the monopole component U mon µ (x) which is responsible SU(3) mon+mod abel offdiag abel+offdiag 5 4 V(R) 3 2 1 0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
141 |
+
page_content='5 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
142 |
+
page_content='0 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
143 |
+
page_content='5 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
144 |
+
page_content='0 R/ro5 for the linear part of the static potential as well as for the chiral symmetry breaking.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
145 |
+
page_content=' The modified (monopoleless) component U mod µ (x) produces purely Coulomb potential which is in agreement with the original Coulomb part both at small and large distances.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
146 |
+
page_content=' At the same time in the decomposition 3 the Coulomb part is distributed in an unnatural way between two components: Abelian and off-diagonal.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
147 |
+
page_content=' It is clear that the study of both decompositions at varying lattice spacing are necessary to understand their fate in the continuum limit.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
148 |
+
page_content=' This is the subject of our future work.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
149 |
+
page_content=' [1] V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
150 |
+
page_content=' G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
151 |
+
page_content=' Bornyakov, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
152 |
+
page_content=' I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
153 |
+
page_content=' Polikarpov, G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
154 |
+
page_content=' Schierholz, et al, Nucl.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
155 |
+
page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
156 |
+
page_content=' B Proc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
157 |
+
page_content=' Suppl.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
158 |
+
page_content=' 153, 25-32 (2006) [arXiv:hep- lat/0512003 [hep-lat]].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
159 |
+
page_content=' [2] V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
160 |
+
page_content=' G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
161 |
+
page_content=' Bornyakov, I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
162 |
+
page_content=' Kudrov and R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
163 |
+
page_content=' N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
164 |
+
page_content=' Rogalyov, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
165 |
+
page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
166 |
+
page_content=' D 105, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
167 |
+
page_content='5, 054519 (2022) [arXiv:2101.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
168 |
+
page_content='04196 [hep-lat]].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
169 |
+
page_content=' [3] T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
170 |
+
page_content=' Suzuki and I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
171 |
+
page_content=' Yotsuyanagi, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
172 |
+
page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
173 |
+
page_content=' D 42 (1990) 4257.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
174 |
+
page_content=' [4] S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
175 |
+
page_content=' Hioki, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
176 |
+
page_content=' Kitahara, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
177 |
+
page_content=' Kiura, et al, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
178 |
+
page_content=' Lett.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
179 |
+
page_content=' B 272, 326 (1991) [Erratum-ibid.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
180 |
+
page_content=' B 281, 416 (1992)].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
181 |
+
page_content=' [5] G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
182 |
+
page_content=' S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
183 |
+
page_content=' Bali, V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
184 |
+
page_content=' Bornyakov, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
185 |
+
page_content=' Muller-Preussker and K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
186 |
+
page_content=' Schilling, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
187 |
+
page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
188 |
+
page_content=' D 54 (1996) 2863.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
189 |
+
page_content=' [6] V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
190 |
+
page_content=' Bornyakov and M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
191 |
+
page_content=' Muller-Preussker, Nucl.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
192 |
+
page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
193 |
+
page_content=' Proc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
194 |
+
page_content=' Suppl.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
195 |
+
page_content=' 106, 646 (2002).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
196 |
+
page_content=' [7] N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
197 |
+
page_content=' Sakumichi and H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
198 |
+
page_content=' Suganuma, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
199 |
+
page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
200 |
+
page_content=' D 90 (2014) no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
201 |
+
page_content='11, 111501.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
202 |
+
page_content=' [8] A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
203 |
+
page_content=' S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
204 |
+
page_content=' Kronfeld, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
205 |
+
page_content=' L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
206 |
+
page_content=' Laursen, G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
207 |
+
page_content=' Schierholz and U.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
208 |
+
page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
209 |
+
page_content=' Wiese, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
210 |
+
page_content=' Lett.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
211 |
+
page_content=' B 198, 516 (1987).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
212 |
+
page_content=' [9] G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
213 |
+
page_content=' ’t Hooft, Nucl.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
214 |
+
page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
215 |
+
page_content=' B 190 (1981) 455.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
216 |
+
page_content=' [10] M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
217 |
+
page_content=' N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
218 |
+
page_content=' Chernodub and M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
219 |
+
page_content=' I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
220 |
+
page_content=' Polikarpov, in ”Confinement, Duality and Non-perturbative Aspects of QCD”, p.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
221 |
+
page_content='387, Plenum Press, 1998, hep-th/9710205;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
222 |
+
page_content=' R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
223 |
+
page_content=' W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
224 |
+
page_content=' Haymaker, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
225 |
+
page_content=' Rept.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
226 |
+
page_content=' 315 (1999) 153;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
227 |
+
page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
228 |
+
page_content=' Greensite, Prog.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
229 |
+
page_content=' Part.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
230 |
+
page_content=' Nucl.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
231 |
+
page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
232 |
+
page_content=' 51 (2003), 1 [11] H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
233 |
+
page_content=' Shiba and T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
234 |
+
page_content=' Suzuki, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
235 |
+
page_content=' Lett.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
236 |
+
page_content=' B 333, 461 (1994).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
237 |
+
page_content=' [12] J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
238 |
+
page_content=' D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
239 |
+
page_content=' Stack, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
240 |
+
page_content=' D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
241 |
+
page_content=' Neiman and R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
242 |
+
page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
243 |
+
page_content=' Wensley, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
244 |
+
page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
245 |
+
page_content=' D 50, 3399 (1994).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
246 |
+
page_content=' [13] G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
247 |
+
page_content=' ’t Hooft, in High Energy Physics, ed.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
248 |
+
page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
249 |
+
page_content=' Zichichi, EPS International Conference, Palermo (1975);' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
250 |
+
page_content=' S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
251 |
+
page_content=' Mandelstam, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
252 |
+
page_content=' Rept.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
253 |
+
page_content=' 23, 245 (1976).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
254 |
+
page_content=' [14] Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
255 |
+
page_content=' M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
256 |
+
page_content=' Cho, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
257 |
+
page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
258 |
+
page_content=' D 21 (1980), 1080 doi:10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
259 |
+
page_content='1103/PhysRevD.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
260 |
+
page_content='21.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
261 |
+
page_content='1080 [15] Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
262 |
+
page_content='S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
263 |
+
page_content=' Duan and M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
264 |
+
page_content='L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
265 |
+
page_content=' Ge, Sinica Sci.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
266 |
+
page_content=', 11, 1072–1081 (1979).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
267 |
+
page_content=' [16] L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
268 |
+
page_content=' Faddeev and A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
269 |
+
page_content='J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
270 |
+
page_content=' Niemi, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
271 |
+
page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
272 |
+
page_content=' Lett.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
273 |
+
page_content=' 82, 1624–1627 (1999);' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
274 |
+
page_content=' L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
275 |
+
page_content='D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
276 |
+
page_content=' Faddeev and A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
277 |
+
page_content='J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
278 |
+
page_content=' Niemi, Nucl.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
279 |
+
page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
280 |
+
page_content=' B776, 38-65 (2007).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
281 |
+
page_content=' [17] S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
282 |
+
page_content='V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
283 |
+
page_content=' Shabanov, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
284 |
+
page_content=' Lett.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
285 |
+
page_content=' B458, 322–330 (1999);' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
286 |
+
page_content=' S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
287 |
+
page_content='V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
288 |
+
page_content=' Shabanov, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
289 |
+
page_content=' Lett.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
290 |
+
page_content=' B463, 263–272 (1999).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
291 |
+
page_content=' [18] K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
292 |
+
page_content=' I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
293 |
+
page_content=' Kondo, T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
294 |
+
page_content=' Murakami and T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
295 |
+
page_content=' Shinohara, Prog.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
296 |
+
page_content=' Theor.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
297 |
+
page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
298 |
+
page_content=' 115 (2006), 201-216;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
299 |
+
page_content=' S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
300 |
+
page_content=' Kato, K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
301 |
+
page_content=' I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
302 |
+
page_content=' Kondo, T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
303 |
+
page_content=' Murakami, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
304 |
+
page_content=' Shibata, T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
305 |
+
page_content=' Shinohara and S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
306 |
+
page_content=' Ito, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
307 |
+
page_content=' Lett.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
308 |
+
page_content=' B 632 (2006), 326-332.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
309 |
+
page_content=' [19] K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
310 |
+
page_content=' I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
311 |
+
page_content=' Kondo, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
312 |
+
page_content=' Kato, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
313 |
+
page_content=' Shibata and T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
314 |
+
page_content=' Shinohara, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
315 |
+
page_content=' Rept.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
316 |
+
page_content=' 579 (2015), 1-226.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
317 |
+
page_content=' [20] S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
318 |
+
page_content=' Kato, K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
319 |
+
page_content=' I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
320 |
+
page_content=' Kondo and A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
321 |
+
page_content=' Shibata, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
322 |
+
page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
323 |
+
page_content=' D 91 (2015) no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
324 |
+
page_content='3, 034506.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
325 |
+
page_content=' [21] J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
326 |
+
page_content=' C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
327 |
+
page_content=' Biddle, W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
328 |
+
page_content=' Kamleh and D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
329 |
+
page_content=' B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
330 |
+
page_content=' Leinweber, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
331 |
+
page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
332 |
+
page_content=' D 106 (2022) no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
333 |
+
page_content='5, 054505 doi:10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
334 |
+
page_content='1103/PhysRevD.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
335 |
+
page_content='106.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
336 |
+
page_content='054505 [arXiv:2206.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
337 |
+
page_content='00844 [hep-lat]].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
338 |
+
page_content=' [22] A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
339 |
+
page_content=' S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
340 |
+
page_content=' Kronfeld, G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
341 |
+
page_content=' Schierholz and U.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
342 |
+
page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
343 |
+
page_content=' Wiese, Nucl.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
344 |
+
page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
345 |
+
page_content=' B 293 (1987), 461-478.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
346 |
+
page_content=' [23] F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
347 |
+
page_content=' Brandstater, U.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
348 |
+
page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
349 |
+
page_content=' Wiese and G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
350 |
+
page_content=' Schierholz, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
351 |
+
page_content=' Lett.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
352 |
+
page_content=' B 272 (1991), 319-325.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
353 |
+
page_content=' [24] V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
354 |
+
page_content=' Bornyakov, G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
355 |
+
page_content=' Schierholz and T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
356 |
+
page_content=' Streuer, Nucl.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
357 |
+
page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
358 |
+
page_content=' B Proc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
359 |
+
page_content=' Suppl.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
360 |
+
page_content=' 106 (2002), 676-678 doi:10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
361 |
+
page_content='1016/S0920- 5632(01)01813-8 [arXiv:hep-lat/0111018 [hep-lat]].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
362 |
+
page_content=' [25] V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
363 |
+
page_content=' G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
364 |
+
page_content=' Bornyakov et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
365 |
+
page_content=' [DIK], Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
366 |
+
page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
367 |
+
page_content=' D 70 (2004), 074511 doi:10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
368 |
+
page_content='1103/PhysRevD.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
369 |
+
page_content='70.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
370 |
+
page_content='074511 [arXiv:hep-lat/0310011 [hep-lat]].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
371 |
+
page_content=' [26] H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
372 |
+
page_content=' Ohata and H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
373 |
+
page_content=' Suganuma, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
374 |
+
page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
375 |
+
page_content=' D 102 (2020) no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
376 |
+
page_content='1, 014512.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
377 |
+
page_content=' [27] V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
378 |
+
page_content=' G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
379 |
+
page_content=' Bornyakov et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
380 |
+
page_content=' [DIK], Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
381 |
+
page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
382 |
+
page_content=' D 71 (2005), 114504 doi:10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
383 |
+
page_content='1103/PhysRevD.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
384 |
+
page_content='71.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
385 |
+
page_content='114504 [arXiv:hep-lat/0401014 [hep-lat]].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
386 |
+
page_content=' [28] J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
387 |
+
page_content=' Smit and A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
388 |
+
page_content=' van der Sijs, Nucl.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
389 |
+
page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
390 |
+
page_content=' B 355 (1991), 603-648 [29] M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
391 |
+
page_content=' Albanese et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
392 |
+
page_content=' [APE], Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
393 |
+
page_content=' Lett.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
394 |
+
page_content=' B 192 (1987), 163-169 [30] S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
395 |
+
page_content=' Necco and R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
396 |
+
page_content=' Sommer, Nucl.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
397 |
+
page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
398 |
+
page_content=' B 622 (2002), 328-346.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
399 |
+
page_content=' [31] J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
400 |
+
page_content=' D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
401 |
+
page_content=' Stack, W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
402 |
+
page_content=' W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
403 |
+
page_content=' Tucker and R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
404 |
+
page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
405 |
+
page_content=' Wensley, Nucl.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
406 |
+
page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
407 |
+
page_content=' B 639 (2002), 203-222 doi:10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
408 |
+
page_content='1016/S0550-3213(02)00537-0 [arXiv:hep-lat/0110196 [hep-lat]].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
409 |
+
page_content=' [32] R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
410 |
+
page_content=' Golubich and M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
411 |
+
page_content=' Faber, Particles 3 (2020) no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
412 |
+
page_content='2, 444-455.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6dE1T4oBgHgl3EQfTQOX/content/2301.03076v1.pdf'}
|
7NE2T4oBgHgl3EQfPQZw/content/2301.03757v1.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:b536f8e97dce7f283c594d0f850710f6b71e876d6d3b1a2860ce8dcd74d60c73
|
3 |
+
size 1049349
|
7NE2T4oBgHgl3EQfPQZw/vector_store/index.faiss
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:1405457915e2b3cf6a89274e132aba6dafb9c7c3e20d229241f7f5592a5e8e17
|
3 |
+
size 6225965
|
7tAyT4oBgHgl3EQfpvj9/vector_store/index.faiss
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:cff00cf8648ee957a7d0d0182f53d273fe6aaac7b22279d7f5d3e308199d73e1
|
3 |
+
size 7405613
|
8dE4T4oBgHgl3EQfdQww/content/2301.05089v1.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:534f8fec39835c42758d4be798ae26edf1f285d9aaf4f88dbf539065c431d83b
|
3 |
+
size 3335719
|
8dE4T4oBgHgl3EQfdQww/vector_store/index.pkl
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:2095e52d2fb3ea954e0bcd4644dd2ce1f3058dcd74ae77cfa65519d007d46a8f
|
3 |
+
size 252783
|
9tAzT4oBgHgl3EQf-_7r/content/2301.01943v1.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:145b2bd89a107dd3be3b24eac9033a2e76a75cd10ccd4291b845473412d4a013
|
3 |
+
size 3156489
|
9tAzT4oBgHgl3EQf-_7r/vector_store/index.pkl
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:fcbecccc9540113ce51ed47d31d27813be4f13546267b4a2cfb19aa0b6deee3a
|
3 |
+
size 213539
|
9tFST4oBgHgl3EQfbTje/vector_store/index.faiss
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:f0a36e75013c27f387872b961c2eaf10671ed789ff249c2779b8686e24a0cb80
|
3 |
+
size 10485805
|
ANAyT4oBgHgl3EQfq_kk/content/2301.00551v1.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:a4049abf017a4fde900149a33536d381c40ce49a6e3a9f987e1836bbc822e9b3
|
3 |
+
size 303896
|
ANAyT4oBgHgl3EQfq_kk/vector_store/index.faiss
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:bd966eb9ffa4baf70d4e970c51a160f5688633979dcb51815eec60bacdd052eb
|
3 |
+
size 2359341
|
ANAyT4oBgHgl3EQfq_kk/vector_store/index.pkl
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:19ce502891d81f5424f77b65ea479af990e45fad4ffb66245a22b36dd4bddd78
|
3 |
+
size 103604
|
ANE3T4oBgHgl3EQfsQvt/vector_store/index.faiss
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:9bddfd6ed15f465b64ee1ac0497780407d34adb455f7df19150babb40b36a95a
|
3 |
+
size 4915245
|
AtAzT4oBgHgl3EQfv_4W/content/tmp_files/2301.01714v1.pdf.txt
ADDED
@@ -0,0 +1,1507 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
arXiv:2301.01714v1 [quant-ph] 1 Jan 2023
|
2 |
+
Canonical steering ellipsoids of pure symmetric multiqubit states with two distinct
|
3 |
+
spinors and volume monogamy of steering
|
4 |
+
B. G. Divyamani,1 I. Reena,2 Prasanta K. Panigrahi,3 A. R. Usha Devi,2, 4 and Sudha5, 4, ∗
|
5 |
+
1Tunga Mahavidyalaya, Thirthahalli-577432, Karnataka, India
|
6 |
+
2Department of Physics, Bangalore University, Bangalore-560 056, India
|
7 |
+
3Department of Physical Sciences, Indian Institute of Science Education
|
8 |
+
and Research Kolkata, Mohanpur-741246, West Bengal, India
|
9 |
+
4Inspire Institute Inc., Alexandria, Virginia, 22303, USA.
|
10 |
+
5Department of Physics, Kuvempu University, Shankaraghatta-577 451, Karnataka, India
|
11 |
+
(Dated: January 5, 2023)
|
12 |
+
Quantum steering ellipsoid formalism provides a faithful representation of all two-qubit states and
|
13 |
+
helps in obtaining correlation properties of the state through the steering ellipsoid. The steering
|
14 |
+
ellipsoids corresponding to the two-qubit subsystems of permutation symmetric N-qubit states is
|
15 |
+
analysed here. The steering ellipsoids of two-qubit states that have undergone local operations on
|
16 |
+
both the qubits so as to bring the state to its canonical form are the so-called canonical steering
|
17 |
+
ellipsoids.
|
18 |
+
We construct and analyze the geometric features of the canonical steering ellipsoids
|
19 |
+
corresponding to pure permutation symmetric N-qubit states with two distinct spinors. Depending
|
20 |
+
on the degeneracy of the two spinors in the pure symmetric N-qubit state, there arise several families
|
21 |
+
which cannot be converted into one another through Stochastic Local Operations and Classical
|
22 |
+
Communications (SLOCC). The canonical steering ellipsoids of the two-qubit states drawn from
|
23 |
+
the pure symmetric N-qubit states with two distinct spinors allow for a geometric visualization of
|
24 |
+
the SLOCC-inequivalent class of states. We show that the states belonging to the W-class correspond
|
25 |
+
to oblate spheroid centered at (0, 0, 1/(N −1)) with fixed semiaxes lengths 1/
|
26 |
+
√
|
27 |
+
N − 1 and 1/(N −1).
|
28 |
+
The states belonging to all other SLOCC inequivalent families correspond to ellipsoids centered at
|
29 |
+
the origin of the Bloch sphere. We also explore volume monogamy relations of states belonging to
|
30 |
+
these families, mainly the W-class of states.
|
31 |
+
PACS numbers: 03.65.Ud, 03.67.Bg
|
32 |
+
I.
|
33 |
+
INTRODUCTION
|
34 |
+
The Bloch sphere representation of a single qubit contains valuable geometric information needed for quantum
|
35 |
+
information processing tasks. A natural generalization and an analogous picture for a two-qubit system is provided by
|
36 |
+
the quantum steering ellipsoid [1–3] and is helpful in understanding correlation properties such as quantum discord [4,
|
37 |
+
5], volume monogamy of steering [2, 3] etc., Quantum steering ellipsoid is the set of all Bloch vectors to which one
|
38 |
+
party’s qubit could be ‘steered’ when all possible measurements are carried out on the qubit belonging to other party.
|
39 |
+
The volume of the steering ellipsoids [1] corresponding to the two-qubit subsystems of an N-qubit state, N > 3, capture
|
40 |
+
monogamy properties of the state effectively [2, 3] and provides insightful information about two-qubit entanglement.
|
41 |
+
While the quantum steering ellipsoid [1–3] is the set of all Bloch vectors of first qubit steered by local operations
|
42 |
+
on second qubit, the so-called canonical steering ellipsoid [6–8] is the steering ellipsoid of a two-qubit state that has
|
43 |
+
attained a canonical form under suitable SLOCC operations on both the qubits. It has been shown that the SLOCC
|
44 |
+
canonical forms of a two-qubit state can either be a Bell diagonal form or a nondiagonal one (when the two-qubit
|
45 |
+
state is rank-deficient) [6, 8]. The canonical steering ellipsoids corresponding to the two-qubit states can thus have
|
46 |
+
only two distinct forms and provide a much simpler geometric picture representing the set of all SLOCC equivalent
|
47 |
+
two-qubit states.
|
48 |
+
The canonical steering ellipsoids corresponding to the two-qubit subsystems of pure three-qubit permutation sym-
|
49 |
+
metric states are analyzed in Ref. [9].
|
50 |
+
It has been shown that [9] the two SLOCC inequivalent families of pure
|
51 |
+
three-qubit permutation symmetric states, the W-class of states (with two distinct spinors) and the GHZ class of
|
52 |
+
states (with three distinct spinors) correspond to distinct canonical steering ellipsoids. While an ellipsoid centered at
|
53 |
+
the origin of the Bloch sphere is the canonical steering ellipsoid for the GHZ class of states, an oblate spheroid with
|
54 |
+
its center shifted along the z-axis is the one for W-class of states. Using these, the volume monogamy relations are
|
55 |
+
established and the obesity of the steering ellipsoids is made use of to obtain expressions for concurrence of states
|
56 |
+
belonging to these two SLOCC inequivalent families in Ref. [9].
|
57 | |
58 |
+
|
59 |
+
2
|
60 |
+
In this paper, we continue with the work in Ref. [9], authored by some of us, and extend the analysis to a class
|
61 |
+
of N-qubit pure states which are symmetric under exchange of qubits. Through the SLOCC canonical forms of the
|
62 |
+
two-qubit reduced state, extracted from pure symmetric multiqubit states with two distinct spinors and the Lorentz
|
63 |
+
canonical forms of their real representative, we examine the features of canonical steering ellipsoids associated with
|
64 |
+
them. We identify the special features of the canonical steering ellipsoid representing N-qubit states of the W-class
|
65 |
+
and these features distinguish this class from all other SLOCC inequivalent families of pure symmetric N-qubit states.
|
66 |
+
We discuss the volume monogamy of steering for pure permutation symmetric N-qubit states and obtain the volume
|
67 |
+
monogamy relation satisfied by W-class of states. An expression for obesity of the steering ellipsoid and thereby an
|
68 |
+
expression for concurrence of two-qubit subsystems of N-qubit states belonging to the W-class is obtained.
|
69 |
+
Contents of this paper are organized as follows: In Sec.II, we give a brief review on SLOCC classification of pure
|
70 |
+
permutation symmetric multiqubit states based on Majorana representation [10, 12, 13] and obtain the two-qubit
|
71 |
+
subsystems of the states belonging to SLOCC inequivalent families of pure symmetric multiqubit states with two
|
72 |
+
distinct spinors. Sec. III provides an outline of the real matrix representation of a two-qubit density matrix and their
|
73 |
+
Lorentz canonical forms under SLOCC transformation of the two-qubit density matrix. We also obtain the Lorentz
|
74 |
+
canonical forms of two-qubit subsystems corresponding to SLOCC inequivalent families, in Sec. III. In Sec.IV, we
|
75 |
+
analyse the nature of steering ellipsoids associated with the distinct Lorentz canonical forms obtained in Sec. III. The
|
76 |
+
volume monogamy of steering for pure symmetric multiqubit states with two distinct spinors is discussed along with
|
77 |
+
illustration for W-class of states, in Sec. V. Summary of our results is presented in Sec. VI.
|
78 |
+
II.
|
79 |
+
MAJORANA GEOMETRIC REPRESENTATION OF PURE SYMMETRIC N-QUBIT STATES
|
80 |
+
WITH TWO DISTINCT SPINORS
|
81 |
+
Ettore Majorana, in his novel 1932 paper [10] proposed that a pure spin j = N
|
82 |
+
2 quantum state can be represented
|
83 |
+
as a symmetrized combination of N constituent spinors as follows:
|
84 |
+
|Ψsym⟩ = N
|
85 |
+
�
|
86 |
+
P
|
87 |
+
ˆP {|ǫ1, ǫ2, . . . ǫN⟩},
|
88 |
+
(1)
|
89 |
+
where
|
90 |
+
|ǫl⟩ = (cos(αl/2) |0⟩ + sin(αl/2) |1⟩) eiβl/2,
|
91 |
+
l = 1, 2, . . . , N.
|
92 |
+
(2)
|
93 |
+
The symbol ˆP corresponds to the set of all N! permutations of the spinors (qubits) and N corresponds to an overall
|
94 |
+
normalization factor. The name Majorana geometric representation is owing to the fact that it leads to an intrinsic
|
95 |
+
geometric picture of the state in terms of N-points on the unit sphere. In fact, the spinors |ǫl⟩, l = 1, 2, . . . , N
|
96 |
+
of (2) correspond geometrically to N points on the unit sphere S2, with the pair of angles (αl, βl) determining the
|
97 |
+
orientation of each point on the sphere.
|
98 |
+
The pure symmetric N-qubit states characterized by two distinct qubits are given by [11–13],
|
99 |
+
|DN−k,k⟩ = N
|
100 |
+
�
|
101 |
+
P
|
102 |
+
ˆP {| ǫ1, ǫ1, . . . , ǫ1
|
103 |
+
�
|
104 |
+
��
|
105 |
+
�
|
106 |
+
N−k
|
107 |
+
; ǫ2, ǫ2, . . . , ǫ2
|
108 |
+
�
|
109 |
+
��
|
110 |
+
�
|
111 |
+
k
|
112 |
+
⟩}.
|
113 |
+
(3)
|
114 |
+
Here one of the spinors say |ǫ1⟩ occurs N − k times whereas the other spinor |ǫ2⟩ occurs k times in each term of the
|
115 |
+
symmetrized combination. Under identical local unitary transformations, the pure symmetric N qubit states with
|
116 |
+
two distinct spinors can be brought to the canonical form [13],
|
117 |
+
|DN−k,k⟩ ≡
|
118 |
+
k
|
119 |
+
�
|
120 |
+
r=0
|
121 |
+
β(k)
|
122 |
+
r
|
123 |
+
����
|
124 |
+
N
|
125 |
+
2 , N
|
126 |
+
2 − r
|
127 |
+
�
|
128 |
+
,
|
129 |
+
k = 1, 2, 3, . . .
|
130 |
+
�N
|
131 |
+
2
|
132 |
+
�
|
133 |
+
(4)
|
134 |
+
β(k)
|
135 |
+
r
|
136 |
+
= N
|
137 |
+
�
|
138 |
+
N!(N − r)!
|
139 |
+
r!
|
140 |
+
ak−r br
|
141 |
+
(N − k)!(k − r)!,
|
142 |
+
0 ≤ a < 1,
|
143 |
+
b =
|
144 |
+
�
|
145 |
+
1 − a2.
|
146 |
+
(5)
|
147 |
+
Notice that
|
148 |
+
�� N
|
149 |
+
2 , N
|
150 |
+
2 − r
|
151 |
+
�
|
152 |
+
, r = 0, 1, 2 . . . k are the Dicke states, which are common eigenstates of the collective angular
|
153 |
+
momentum operators J2 and Jz. They are the basis states of the N + 1 dimensional symmetric subspace of collective
|
154 |
+
angular momentum space. The states |DN−k,k⟩ (see (4), (5)) are characterized by only one real parameter ‘a’ and
|
155 |
+
thus form one parameter family of states {DN−k,k}.
|
156 |
+
It is important to notice that [13] in the family {DN−k,k}, different values of k, (k = 1, 2, 3, . . .
|
157 |
+
� N
|
158 |
+
2
|
159 |
+
�
|
160 |
+
), correspond to
|
161 |
+
different SLOCC inequivalent classes. That is, a state |DN−k,k⟩ cannot be converted into |DN−k′,k′⟩, k ̸= k′ through
|
162 |
+
|
163 |
+
3
|
164 |
+
any choice of local unitary (identical) transformations. In fact, different values of k lead to different degeneracy
|
165 |
+
configurations [13] of the two spinors |ǫ1⟩, |ǫ2⟩ in the state |DN−k,k⟩. When k = 1, one gets the W-class of states
|
166 |
+
{DN−1,1} where one of the qubits say |ǫ1⟩ repeats only once in each term of the symmetrized combination (see (3))
|
167 |
+
and the other qubit |ǫ2⟩ repeating N − 1 times. The N-qubit W-state
|
168 |
+
|WN⟩ =
|
169 |
+
1
|
170 |
+
√
|
171 |
+
N
|
172 |
+
[|000 . . .1⟩ + |000 . . .10⟩ + · · · + |100 . . .00⟩] ≡
|
173 |
+
����
|
174 |
+
N
|
175 |
+
2 , N
|
176 |
+
2 − 1
|
177 |
+
�
|
178 |
+
(6)
|
179 |
+
belongs to the family {DN−1,1} and hence the name W-class of states.
|
180 |
+
A.
|
181 |
+
Two-qubit reduced density matrices of the states |DN−k, k⟩
|
182 |
+
The two-qubit marginal ρ(k) corresponding to any random pair of qubits in the pure symmetric N-qubit state
|
183 |
+
|DN−k, k⟩ ∈ {DN−k,k} is obtained by tracing over the remaining N − 2 qubits in it. In Ref. [15], it has been shown,
|
184 |
+
using the algebra of addition of angular momenta, j1 = 1 (corresponding to two-qubit marginal) and j2 = (N − 2)/2,
|
185 |
+
that the two-qubit reduced density matrix ρ(k) has the form
|
186 |
+
ρ(k) =
|
187 |
+
|
188 |
+
|
189 |
+
|
190 |
+
|
191 |
+
A(k)
|
192 |
+
B(k)
|
193 |
+
B(k)
|
194 |
+
C(k)
|
195 |
+
B(k)
|
196 |
+
D(k)
|
197 |
+
D(k)
|
198 |
+
E(k)
|
199 |
+
B(k)
|
200 |
+
D(k)
|
201 |
+
D(k)
|
202 |
+
E(k)
|
203 |
+
C(k)
|
204 |
+
E(k)
|
205 |
+
E(k)
|
206 |
+
F (k)
|
207 |
+
|
208 |
+
|
209 |
+
|
210 |
+
.
|
211 |
+
(7)
|
212 |
+
The elements A(k), B(k), C(k), D(k), E(k) and F (k) are real and are explicitly given by [15]
|
213 |
+
A(k) =
|
214 |
+
k
|
215 |
+
�
|
216 |
+
r=0
|
217 |
+
�
|
218 |
+
βk
|
219 |
+
r
|
220 |
+
�2 �
|
221 |
+
c(r)
|
222 |
+
1
|
223 |
+
�2
|
224 |
+
, B(k) =
|
225 |
+
1
|
226 |
+
√
|
227 |
+
2
|
228 |
+
k−1
|
229 |
+
�
|
230 |
+
r=0
|
231 |
+
β(k)
|
232 |
+
r β(k)
|
233 |
+
r+1 c(r)
|
234 |
+
1 c(r+1)
|
235 |
+
0
|
236 |
+
C(k) =
|
237 |
+
k−2
|
238 |
+
�
|
239 |
+
r=0
|
240 |
+
β(k)
|
241 |
+
r
|
242 |
+
β(k)
|
243 |
+
r+2 c(r)
|
244 |
+
1 c(r+2)
|
245 |
+
−1
|
246 |
+
, D(k) = 1
|
247 |
+
2
|
248 |
+
k
|
249 |
+
�
|
250 |
+
r=1
|
251 |
+
�
|
252 |
+
β(k)
|
253 |
+
r
|
254 |
+
�2 �
|
255 |
+
c(r)
|
256 |
+
0
|
257 |
+
�2
|
258 |
+
(8)
|
259 |
+
E(k) =
|
260 |
+
1
|
261 |
+
√
|
262 |
+
2
|
263 |
+
k−1
|
264 |
+
�
|
265 |
+
r=0
|
266 |
+
β(k)
|
267 |
+
r
|
268 |
+
β(k)
|
269 |
+
r+1 c(r)
|
270 |
+
0 c(r+1)
|
271 |
+
−1
|
272 |
+
,
|
273 |
+
F (k) =
|
274 |
+
k
|
275 |
+
�
|
276 |
+
r=0
|
277 |
+
�
|
278 |
+
β(k)
|
279 |
+
r
|
280 |
+
�2 �
|
281 |
+
c(r)
|
282 |
+
−1
|
283 |
+
�2
|
284 |
+
.
|
285 |
+
where, β(k)
|
286 |
+
r
|
287 |
+
are given as functions of the parameter ‘a’ in (5) and
|
288 |
+
c(r)
|
289 |
+
1
|
290 |
+
=
|
291 |
+
�
|
292 |
+
(N − r)(N − r − 1)
|
293 |
+
N(N − 1)
|
294 |
+
,
|
295 |
+
c(r)
|
296 |
+
−1 =
|
297 |
+
�
|
298 |
+
r (r − 1)
|
299 |
+
N(N − 1),
|
300 |
+
c(r)
|
301 |
+
0
|
302 |
+
=
|
303 |
+
�
|
304 |
+
2r (N − r)
|
305 |
+
N(N − 1)
|
306 |
+
(9)
|
307 |
+
are the Clebsch-Gordan coefficients c(r)
|
308 |
+
m2 = C
|
309 |
+
� N
|
310 |
+
2 − 1, 1, N
|
311 |
+
2 ; m − m2, m2, m
|
312 |
+
�
|
313 |
+
, m =
|
314 |
+
N
|
315 |
+
2 − r, m2 = 1, 0, −1 [16]. In
|
316 |
+
particular, for W-class of states i.e., when k = 1, we have
|
317 |
+
ρ(1) = TrN−2 (|DN−1, 1⟩⟨DN−1, 1|)
|
318 |
+
=
|
319 |
+
��
|
320 |
+
β(1)
|
321 |
+
0
|
322 |
+
�2
|
323 |
+
+
|
324 |
+
�
|
325 |
+
β(1)
|
326 |
+
1
|
327 |
+
c(1)
|
328 |
+
1
|
329 |
+
�2�
|
330 |
+
|1, 1⟩⟨1, 1|
|
331 |
+
+
|
332 |
+
�
|
333 |
+
β(1)
|
334 |
+
1
|
335 |
+
c(1)
|
336 |
+
0
|
337 |
+
�2
|
338 |
+
|1, 0⟩⟨1, 0| + β(1)
|
339 |
+
0 β(1)
|
340 |
+
1
|
341 |
+
c(1)
|
342 |
+
0 |1, 1⟩⟨1, 0|
|
343 |
+
+β(1)
|
344 |
+
0 β(1)
|
345 |
+
1
|
346 |
+
c(1)
|
347 |
+
0 |1, 0⟩⟨1, 1|
|
348 |
+
(10)
|
349 |
+
Here (see (5)) we have β(1)
|
350 |
+
0
|
351 |
+
= NN a, β(1)
|
352 |
+
1
|
353 |
+
= N
|
354 |
+
�
|
355 |
+
N(1 − a2) with N =
|
356 |
+
1
|
357 |
+
√
|
358 |
+
N 2 a2+N(1−a2) and the associated non-zero
|
359 |
+
Clebsch-Gordan coefficients (see (9)) are given by
|
360 |
+
c(1)
|
361 |
+
1
|
362 |
+
=
|
363 |
+
�
|
364 |
+
N − 2
|
365 |
+
N
|
366 |
+
,
|
367 |
+
c(1)
|
368 |
+
0
|
369 |
+
=
|
370 |
+
�
|
371 |
+
2
|
372 |
+
N .
|
373 |
+
(11)
|
374 |
+
|
375 |
+
4
|
376 |
+
In the standard two-qubit basis {|0A, 0B⟩, |0A, 1B⟩, |1A, 0B⟩, |1A, 1B⟩}, the two-qubit density matrix ρ(1) drawn from
|
377 |
+
the states |DN−1,1⟩ take the form
|
378 |
+
ρ(1) =
|
379 |
+
|
380 |
+
|
381 |
+
|
382 |
+
|
383 |
+
A(1)
|
384 |
+
B(1)
|
385 |
+
B(1)
|
386 |
+
0
|
387 |
+
B(1)
|
388 |
+
D(1)
|
389 |
+
D(1)
|
390 |
+
0
|
391 |
+
B(1)
|
392 |
+
D(1)
|
393 |
+
D(1)
|
394 |
+
0
|
395 |
+
0
|
396 |
+
0
|
397 |
+
0
|
398 |
+
0
|
399 |
+
|
400 |
+
|
401 |
+
|
402 |
+
|
403 |
+
(12)
|
404 |
+
where
|
405 |
+
A(1) = N 2a2 + (N − 2)(1 − a2)
|
406 |
+
N 2 a2 + N(1 − a2)
|
407 |
+
,
|
408 |
+
B(1) =
|
409 |
+
a
|
410 |
+
√
|
411 |
+
1 − a2
|
412 |
+
1 + a2(N − 1),
|
413 |
+
D(1) =
|
414 |
+
1 − a2
|
415 |
+
N 2 a2 + N(1 − a2),
|
416 |
+
(13)
|
417 |
+
In a similar manner, the two-qubit subsystems of pure symmetric N-qubit states |DN−k,k⟩ belonging to each SLOCC
|
418 |
+
inequivalent family {DN−k, k}, k = 2, 3, . . . ,
|
419 |
+
� N
|
420 |
+
2
|
421 |
+
�
|
422 |
+
can be obtained as a function of N and ‘a’ using Eqs. (7), (8), (9).
|
423 |
+
As is shown in Refs. [8, 9], the real representative Λ(k) of the two-qubit subsystem ρ(k) and its Lorentz canonical form
|
424 |
+
�Λ(k) are essential in obtaining the geometric visualization of the states |DN−k,k⟩ for all k. We thus proceed to obtain
|
425 |
+
Λ(k) and its Lorentz canonical form �Λ(k) in the following.
|
426 |
+
III.
|
427 |
+
THE REAL REPRESENTATION OF ρ(k) AND ITS LORENTZ CANONICAL FORMS
|
428 |
+
The real representative Λ(k) of the two-qubit state ρ(k) is a 4 × 4 real matrix with its elements given by
|
429 |
+
Λ(k)
|
430 |
+
µ ν = Tr
|
431 |
+
�
|
432 |
+
ρ(k) (σµ ⊗ σν)
|
433 |
+
�
|
434 |
+
(14)
|
435 |
+
That is, Λ(k)
|
436 |
+
µ ν, µ, ν = 0, 1, 2, 3 are the coefficients of expansion of ρ(k), expanded in the Hilbert-Schmidt basis {σµ⊗σν}:
|
437 |
+
ρ(k) = 1
|
438 |
+
4
|
439 |
+
3
|
440 |
+
�
|
441 |
+
µ, ν=0
|
442 |
+
Λ(k)
|
443 |
+
µ ν (σµ ⊗ σν) ,
|
444 |
+
(15)
|
445 |
+
Here, σi, i = 1, 2, 3 are the Pauli spin matrices and σ0 is the 2 × 2 identity matrix;
|
446 |
+
σ0 =
|
447 |
+
�
|
448 |
+
1 0
|
449 |
+
0 1
|
450 |
+
�
|
451 |
+
,
|
452 |
+
σ1 =
|
453 |
+
�
|
454 |
+
0 1
|
455 |
+
1 0
|
456 |
+
�
|
457 |
+
,
|
458 |
+
σ2 =
|
459 |
+
�
|
460 |
+
0 −i
|
461 |
+
i
|
462 |
+
0
|
463 |
+
�
|
464 |
+
,
|
465 |
+
σ3 =
|
466 |
+
�
|
467 |
+
1
|
468 |
+
0
|
469 |
+
0 −1
|
470 |
+
�
|
471 |
+
.
|
472 |
+
(16)
|
473 |
+
It can be readily seen that (see (14), (15)) the real 4 × 4 matrix Λ(k) has the form
|
474 |
+
Λ(k) =
|
475 |
+
|
476 |
+
|
477 |
+
|
478 |
+
1
|
479 |
+
r1
|
480 |
+
r2
|
481 |
+
r3
|
482 |
+
s1 t11 t12 t13
|
483 |
+
s2 t21 t22 t23
|
484 |
+
s3 t31 t32 t33
|
485 |
+
|
486 |
+
|
487 |
+
,
|
488 |
+
(17)
|
489 |
+
where r = (r1, r2, r3)T , s = (s1, s2, s3)T are Bloch vectors of the individual qubits and T = (tij) is the correlation
|
490 |
+
matrix;
|
491 |
+
ri = Λ(k)
|
492 |
+
i 0 = Tr
|
493 |
+
�
|
494 |
+
ρ(k) (σi ⊗ σ0)
|
495 |
+
�
|
496 |
+
(18)
|
497 |
+
sj = Λ(k)
|
498 |
+
0 j = Tr
|
499 |
+
�
|
500 |
+
ρ(k) (σ0 ⊗ σj)
|
501 |
+
�
|
502 |
+
(19)
|
503 |
+
tij = Λ(k)
|
504 |
+
i j = Tr
|
505 |
+
�
|
506 |
+
ρ(k) (σi ⊗ σj)
|
507 |
+
�
|
508 |
+
,
|
509 |
+
i, j = 1, 2, 3.
|
510 |
+
(20)
|
511 |
+
For a symmetric two-qubit density matrix, the Bloch vectors r and s are identical and hence ri = si, i = 1, 2, 3; From
|
512 |
+
the structure of ρ(k) in (7) and using (18), (19), (20) we obtain the general form of the real matrix Λ(k) as
|
513 |
+
Λ(k) =
|
514 |
+
|
515 |
+
|
516 |
+
|
517 |
+
|
518 |
+
|
519 |
+
|
520 |
+
|
521 |
+
1
|
522 |
+
2(B(k)+E(k))
|
523 |
+
A(k)+2D(k)+F (k)
|
524 |
+
0
|
525 |
+
A(k)−F (k)
|
526 |
+
A(k)+2D(k)+F (k)
|
527 |
+
2(B(k)+E(k))
|
528 |
+
A(k)+2D(k)+F (k)
|
529 |
+
2(C(k)+D(k))
|
530 |
+
A(k)+2D(k)+F (k)
|
531 |
+
0
|
532 |
+
2(B(k)−E(k))
|
533 |
+
A(k)+2D(k)+F (k)
|
534 |
+
0
|
535 |
+
0
|
536 |
+
2(D(k)−C(k))
|
537 |
+
A(k)+2D(k)+F (k)
|
538 |
+
0
|
539 |
+
A(k)−F (k)
|
540 |
+
A(k)+2D(k)+F (k)
|
541 |
+
2(B(k)−E(k))
|
542 |
+
A(k)+2D(k)+F (k)
|
543 |
+
0
|
544 |
+
1 −
|
545 |
+
4D(k)
|
546 |
+
A(k)+2D(k)+F (k)
|
547 |
+
|
548 |
+
|
549 |
+
|
550 |
+
|
551 |
+
|
552 |
+
|
553 |
+
|
554 |
+
.
|
555 |
+
(21)
|
556 |
+
The elements of Λ(k), for different k, can be evaluated using (8), (9)):
|
557 |
+
|
558 |
+
5
|
559 |
+
A.
|
560 |
+
Lorentz canonical forms of Λ(k)
|
561 |
+
Under SLOCC transformation, the two-qubit density matrix ρ(k) transforms to �ρ(k),
|
562 |
+
ρ(k) −→ �ρ(k) = (A ⊗ B) ρ(k) (A† ⊗ B†)
|
563 |
+
Tr
|
564 |
+
�
|
565 |
+
ρ(k) (A† A ⊗ B† B)
|
566 |
+
�.
|
567 |
+
(22)
|
568 |
+
Here, A, B ∈ SL(2, C) denote 2 × 2 complex matrices with unit determinant. A suitable choice of A and B takes the
|
569 |
+
two-qubit density matrix ρ(k) to its canonical form �ρ(k).
|
570 |
+
Under the transformation ρ(k) −→ �ρ(k) (22) of the two-qubit state, its real representative Λ(k) transforms as [8, 9]
|
571 |
+
Λ(k) −→ �Λ(k) =
|
572 |
+
LA Λ(k) LT
|
573 |
+
B
|
574 |
+
�
|
575 |
+
LA Λ(k) LT
|
576 |
+
B
|
577 |
+
�
|
578 |
+
00
|
579 |
+
.
|
580 |
+
(23)
|
581 |
+
Here LA, LB ∈ SO(3, 1) are 4 × 4 proper orthochronous Lorentz transformation matrices [17] corresponding respec-
|
582 |
+
tively to A, B ∈ SL(2, C) and the superscript ‘T ’ denotes transpose operation. The Lorentz canonical form �Λ(k)
|
583 |
+
of Λ(k) and thereby the SLOCC canonical form of the two-qubit density matrix ρ(k) (see (22)) can be obtained by
|
584 |
+
constructing the 4 × 4 real symmetric matrix Ω(k) = Λ(k) G
|
585 |
+
�
|
586 |
+
Λ(k)�T , where G = diag (1, −1, −1, −1) denotes the
|
587 |
+
Lorentz metric. Using the defining property [17] LT G L = G of Lorentz transformation L, it can be seen that Ω(k)
|
588 |
+
undergoes a Lorentz congruent transformation under SLOCC (upto an overall factor) [8] as
|
589 |
+
Ω(k) → �Ω(k)
|
590 |
+
A = �Λ(k) G
|
591 |
+
�
|
592 |
+
�Λ(k)�T
|
593 |
+
= LA Λ(k) LT
|
594 |
+
B G LB Λ(k)T LT
|
595 |
+
A
|
596 |
+
= LA Ω(k) LT
|
597 |
+
A.
|
598 |
+
(24)
|
599 |
+
It has been shown in Ref. [8] that �Λ(k) can either be a real 4 × 4 diagonal matrix or a nondiagonal matrix with only
|
600 |
+
one off-diagonal element, depending on the eigenvalues, eigenvectors of G Ω(k) = G
|
601 |
+
�
|
602 |
+
Λ(k) G
|
603 |
+
�
|
604 |
+
Λ(k)�T �
|
605 |
+
.
|
606 |
+
(i) The diagonal canonical form �Λ(k)
|
607 |
+
Ic results when the eigenvector X0 associated with the highest eigenvalue λ0 of
|
608 |
+
G Ω(k) obeys the Lorentz invariant condition XT
|
609 |
+
0 G X0 > 0. The diagonal canonical form �Λ(k)
|
610 |
+
Ic is explicitly given
|
611 |
+
by
|
612 |
+
Λ(k) −→ �Λ(k)
|
613 |
+
Ic =
|
614 |
+
LA1 Λ(k) LT
|
615 |
+
B1
|
616 |
+
�
|
617 |
+
LA1 Λ(k) LT
|
618 |
+
B1
|
619 |
+
�
|
620 |
+
00
|
621 |
+
= diag
|
622 |
+
�
|
623 |
+
1,
|
624 |
+
�
|
625 |
+
λ1
|
626 |
+
λ0
|
627 |
+
,
|
628 |
+
�
|
629 |
+
λ2
|
630 |
+
λ0
|
631 |
+
, ±
|
632 |
+
�
|
633 |
+
λ3
|
634 |
+
λ0
|
635 |
+
�
|
636 |
+
,
|
637 |
+
(25)
|
638 |
+
where λ0 ≥ λ1 ≥ λ2 ≥ λ3 > 0 are the non-negative eigenvalues of G Ω(k).
|
639 |
+
The Lorentz transformations
|
640 |
+
LA1, LB1 ∈ SO(3, 1) in (25) respectively correspond to SL(2, C) transformation matrices A1, B1 which take the
|
641 |
+
two-qubit density matrix ρ(k) to its SLOCC canonical form �ρ(k)
|
642 |
+
Ic through the transformation (22). The diagonal
|
643 |
+
form of �Λ(k)
|
644 |
+
Ic readily leads, on using (15), to Bell-diagonal form
|
645 |
+
�ρ(k)
|
646 |
+
Ic = 1
|
647 |
+
4
|
648 |
+
|
649 |
+
σ0 ⊗ σ0 +
|
650 |
+
�
|
651 |
+
i=1,2
|
652 |
+
�
|
653 |
+
λi
|
654 |
+
λ0
|
655 |
+
σi ⊗ σi ±
|
656 |
+
�
|
657 |
+
λ3
|
658 |
+
λ0
|
659 |
+
σ3 ⊗ σ3
|
660 |
+
|
661 |
+
|
662 |
+
(26)
|
663 |
+
as the canonical form of the two-qubit state ρ(k).
|
664 |
+
(ii) The Lorentz canonical form of Λ(k) turns out to be a nondiagonal matrix (with only one nondiagonal element)
|
665 |
+
given by
|
666 |
+
Λ(k) −→ �Λ(k)
|
667 |
+
IIc =
|
668 |
+
LA2 Λ(k) LT
|
669 |
+
B2
|
670 |
+
�
|
671 |
+
LA2 Λ(k) LT
|
672 |
+
B2
|
673 |
+
�
|
674 |
+
00
|
675 |
+
=
|
676 |
+
|
677 |
+
|
678 |
+
|
679 |
+
1
|
680 |
+
0
|
681 |
+
0
|
682 |
+
0
|
683 |
+
0
|
684 |
+
a1
|
685 |
+
0
|
686 |
+
0
|
687 |
+
0
|
688 |
+
0
|
689 |
+
−a1
|
690 |
+
0
|
691 |
+
1 − a0
|
692 |
+
0
|
693 |
+
0
|
694 |
+
a0
|
695 |
+
|
696 |
+
|
697 |
+
|
698 |
+
(27)
|
699 |
+
|
700 |
+
6
|
701 |
+
when the non-negative eigenvalues of GΩ(k) are doubly degenerate with λ0 ≥ λ1 and the eigenvector X0
|
702 |
+
belonging to the highest eigenvalue λ0 satisfies the Lorentz invariant condition XT
|
703 |
+
0 G X0 = 0. In Ref. [8], it
|
704 |
+
has been shown that when the maximum amongst the doubly degenerate eigenvalues of GΩ(k) possesses an
|
705 |
+
eigenvector X0 satisfying the condition XT
|
706 |
+
0 G X0 = 0, the real symmetric matrix Ω(k) = Λ(k)G
|
707 |
+
�
|
708 |
+
Λ(k)�T attains
|
709 |
+
the nondiagonal Lorentz canonical form given by
|
710 |
+
Ω(k)
|
711 |
+
IIc = �Λ(k)
|
712 |
+
IIc G
|
713 |
+
�
|
714 |
+
�Λ(k)
|
715 |
+
IIc
|
716 |
+
�T
|
717 |
+
= LA2 Ω(k) LT
|
718 |
+
A2
|
719 |
+
=
|
720 |
+
|
721 |
+
|
722 |
+
|
723 |
+
φ0
|
724 |
+
0
|
725 |
+
0
|
726 |
+
φ0 − λ0
|
727 |
+
0
|
728 |
+
−λ1
|
729 |
+
0
|
730 |
+
0
|
731 |
+
0
|
732 |
+
0
|
733 |
+
−λ1
|
734 |
+
0
|
735 |
+
φ0 − λ0
|
736 |
+
0
|
737 |
+
0
|
738 |
+
φ0 − 2λ0
|
739 |
+
|
740 |
+
|
741 |
+
.
|
742 |
+
(28)
|
743 |
+
The parameters a0, a1 in (27) are related to the eigenvalues λ0, λ1 of GΩ(k) and the 00th element of �Λ(k)
|
744 |
+
IIc, the
|
745 |
+
canonical form of Ω(k) (see (28)). It can be seen that [8]
|
746 |
+
a0 = λ0
|
747 |
+
φ0
|
748 |
+
,
|
749 |
+
a1 =
|
750 |
+
�
|
751 |
+
λ1
|
752 |
+
φ0
|
753 |
+
,
|
754 |
+
where φ0 =
|
755 |
+
�
|
756 |
+
Ω(k)
|
757 |
+
IIc
|
758 |
+
�
|
759 |
+
00 =
|
760 |
+
��
|
761 |
+
LA2 Λ(k) LT
|
762 |
+
B2
|
763 |
+
�
|
764 |
+
00
|
765 |
+
�2
|
766 |
+
.
|
767 |
+
(29)
|
768 |
+
The Lorentz matrices LA2, LB2 ∈ SO(3, 1) correspond to the SL(2,C) transformations A2, B2 which take the
|
769 |
+
density matrix ρ(k) to its SLOCC canonical form ρ(k)
|
770 |
+
IIc through the transformation (22). The nondiagonl canonical
|
771 |
+
form �Λ(k)
|
772 |
+
IIc leads to the SLOCC canonical form �ρ(k)
|
773 |
+
IIc of the two-qubit density matrix ρ(k) on using (15);
|
774 |
+
�ρ(k)
|
775 |
+
IIc = 1
|
776 |
+
2
|
777 |
+
|
778 |
+
|
779 |
+
|
780 |
+
1
|
781 |
+
0
|
782 |
+
0
|
783 |
+
a1
|
784 |
+
0
|
785 |
+
1 − a0 0
|
786 |
+
0
|
787 |
+
0
|
788 |
+
0
|
789 |
+
0
|
790 |
+
0
|
791 |
+
a1
|
792 |
+
0
|
793 |
+
0 a0
|
794 |
+
|
795 |
+
|
796 |
+
.
|
797 |
+
(30)
|
798 |
+
B.
|
799 |
+
Lorentz canonical form of Λ(1) corresponding to W-class of states
|
800 |
+
Using the explicit structure of the two-qubit state ρ(1) given in (12), (13), its real representative Λ(1) is obtained
|
801 |
+
as (see (14))
|
802 |
+
Λ(1) =
|
803 |
+
|
804 |
+
|
805 |
+
|
806 |
+
|
807 |
+
|
808 |
+
|
809 |
+
1
|
810 |
+
2a
|
811 |
+
√
|
812 |
+
1−a2
|
813 |
+
1+a2(N−1)
|
814 |
+
0
|
815 |
+
1 +
|
816 |
+
2a2
|
817 |
+
1+a2(N−1) − 2
|
818 |
+
N
|
819 |
+
2a
|
820 |
+
√
|
821 |
+
1−a2
|
822 |
+
1+a2(N−1)
|
823 |
+
2(1−a2)
|
824 |
+
N(1+a2(N−1))
|
825 |
+
0
|
826 |
+
2a
|
827 |
+
√
|
828 |
+
1−a2
|
829 |
+
1+a2(N−1)
|
830 |
+
0
|
831 |
+
0
|
832 |
+
2(1−a2)
|
833 |
+
N(1+a2(N−1))
|
834 |
+
0
|
835 |
+
1 +
|
836 |
+
2a2
|
837 |
+
1+a2(N−1) − 2
|
838 |
+
N
|
839 |
+
2a
|
840 |
+
√
|
841 |
+
1−a2
|
842 |
+
1+a2(N−1)
|
843 |
+
0
|
844 |
+
1 +
|
845 |
+
4a2
|
846 |
+
1+a2(N−1) − 4
|
847 |
+
N
|
848 |
+
|
849 |
+
|
850 |
+
|
851 |
+
|
852 |
+
|
853 |
+
|
854 |
+
=
|
855 |
+
�
|
856 |
+
Λ(1)�T
|
857 |
+
.
|
858 |
+
(31)
|
859 |
+
We now construct the 4 × 4 symmetric matrix Ω(1) and obtain
|
860 |
+
Ω(1) = Λ(1) G
|
861 |
+
�
|
862 |
+
Λ(1)�T
|
863 |
+
= Λ(1) G Λ(1)
|
864 |
+
= χ
|
865 |
+
|
866 |
+
|
867 |
+
|
868 |
+
N − 1
|
869 |
+
0
|
870 |
+
0
|
871 |
+
N − 2
|
872 |
+
0
|
873 |
+
−1
|
874 |
+
0
|
875 |
+
0
|
876 |
+
0
|
877 |
+
0
|
878 |
+
−1
|
879 |
+
0
|
880 |
+
N − 2
|
881 |
+
0
|
882 |
+
0
|
883 |
+
N − 3
|
884 |
+
|
885 |
+
|
886 |
+
,
|
887 |
+
χ =
|
888 |
+
�
|
889 |
+
2(1 − a2)
|
890 |
+
N (1 + a2(N − 1))
|
891 |
+
�2
|
892 |
+
.
|
893 |
+
(32)
|
894 |
+
The eigenvalues of the matrix G Ω(1), G = diag (1, −1, −1, −1) are readily seen to be four-fold degenerate and are
|
895 |
+
given by
|
896 |
+
λ0 = λ1 = λ2 = λ3 = χ =
|
897 |
+
�
|
898 |
+
2(1 − a2)
|
899 |
+
N (1 + a2(N − 1))
|
900 |
+
�2
|
901 |
+
.
|
902 |
+
(33)
|
903 |
+
|
904 |
+
7
|
905 |
+
It can be seen that X0 = (1, 0, 0, −1) is an eigenvector of G Ω(1) belonging to the four-fold degenerate eigenvalue λ0
|
906 |
+
and obeys the Lorentz invariant condition XT
|
907 |
+
0 G X0 = 0. We notice here that Ω(1) is already in the canonical form
|
908 |
+
(28). On comparing (32) with (28), we get
|
909 |
+
φ0 = (Ω(1))00 = (N − 1)χ.
|
910 |
+
(34)
|
911 |
+
On substituting the parameters a0, a1 (See (29), (33), (34) in (27), we arrive at the Lorentz canonical form of the real
|
912 |
+
matrix Λ(1) as
|
913 |
+
�Λ(1) =
|
914 |
+
|
915 |
+
|
916 |
+
|
917 |
+
|
918 |
+
1
|
919 |
+
0
|
920 |
+
0
|
921 |
+
0
|
922 |
+
0
|
923 |
+
1
|
924 |
+
√N−1
|
925 |
+
0
|
926 |
+
0
|
927 |
+
0
|
928 |
+
0
|
929 |
+
−
|
930 |
+
1
|
931 |
+
√N−1
|
932 |
+
0
|
933 |
+
N−2
|
934 |
+
N−1
|
935 |
+
0
|
936 |
+
0
|
937 |
+
1
|
938 |
+
N−1
|
939 |
+
|
940 |
+
|
941 |
+
|
942 |
+
.
|
943 |
+
(35)
|
944 |
+
It can be readily seen that �Λ(1), the Lorentz canonical form corresponding to the W-class of states, is independent of
|
945 |
+
the parameter ‘a’.
|
946 |
+
C.
|
947 |
+
Lorentz canonical form of Λ(k), k = 2, 3, . . . ,
|
948 |
+
� N
|
949 |
+
2
|
950 |
+
�
|
951 |
+
The real representative Λ(k) given in (21) can readily be evaluated for different values of k (k = 2, 3, . . . ,
|
952 |
+
� N
|
953 |
+
2
|
954 |
+
�
|
955 |
+
) on
|
956 |
+
using (8), (9). We then construct the real symmetric matrix Ω(k) = Λ(k) G
|
957 |
+
�
|
958 |
+
Λ(k)�T for k = 2, 3, . . . ,
|
959 |
+
� N
|
960 |
+
2
|
961 |
+
�
|
962 |
+
and observe
|
963 |
+
that GΩ(k) = GΛ(k) G (Λ(k))
|
964 |
+
T has non-degenerate eigenvalues λ0 ̸= λ1 ̸= λ2 ̸= λ3 when k = 2, 3, . . . ,
|
965 |
+
� N
|
966 |
+
2
|
967 |
+
�
|
968 |
+
and the
|
969 |
+
highest eigenvalue λ0 possesses a positive eigenvector X0 satisfying the relation XT
|
970 |
+
0 G X0 > 0. The Lorentz canonical
|
971 |
+
form �Λ(k), k = 2, 3, . . . ,
|
972 |
+
� N
|
973 |
+
2
|
974 |
+
�
|
975 |
+
, is thus given by the diagonal matrix (see (25)).
|
976 |
+
�Λ(k) = diag
|
977 |
+
�
|
978 |
+
1,
|
979 |
+
�
|
980 |
+
λ1/λ0,
|
981 |
+
�
|
982 |
+
λ2/λ0, ±
|
983 |
+
�
|
984 |
+
λ3/λ0
|
985 |
+
�
|
986 |
+
.
|
987 |
+
The eigenvalues λµ, (µ = 0, 1, 2, 3) of GΩ(k) are dependent on the parameters ‘a’, k and N characterizing the state
|
988 |
+
|DN−k, k⟩, when k takes any of the integral values greater than 1 and less than
|
989 |
+
� N
|
990 |
+
2
|
991 |
+
�
|
992 |
+
. Hence the canonical form �Λ(k),
|
993 |
+
k = 2, 3, . . . ,
|
994 |
+
� N
|
995 |
+
2
|
996 |
+
�
|
997 |
+
is different for different states |DN−k, k⟩ unlike in the case of �Λ(1), the canonical form of W-class of
|
998 |
+
states, which depends only on the number of qubits N.
|
999 |
+
IV.
|
1000 |
+
GEOMETRIC REPRESENTATION OF THE STATES |DN−k,k⟩
|
1001 |
+
In this section, based on the two different canonical forms of Λ(k) obtained in Section III, we find the nature of
|
1002 |
+
canonical steering ellipsoids associated with the pure symmetric multiqubit states |DN−k,k⟩ belonging to SLOCC
|
1003 |
+
inequivalent families {DN−k, k}. To begin with, we give a brief outline [8, 9] of obtaining the steering ellipsoids of a
|
1004 |
+
two-qubit density matrix ρ(k) based on the form of its real representative Λ(k).
|
1005 |
+
In the two-qubit state ρ(k), local projective valued measurements (PVM) Q > 0, Q = �3
|
1006 |
+
µ=0 qµ σµ, q0 = 1,
|
1007 |
+
�3
|
1008 |
+
i=1 q2
|
1009 |
+
i
|
1010 |
+
= 1 on Bob’s qubit leads to collapsed state of Alice’s qubit characterized by its Bloch-vector pA =
|
1011 |
+
(p1, p2, p3)T through the transformation [8]
|
1012 |
+
(1, p1, p2, p3)T = Λ(k) (1, q1, q2, q3)T ,
|
1013 |
+
q2
|
1014 |
+
1 + q2
|
1015 |
+
2 + q2
|
1016 |
+
3 = 1.
|
1017 |
+
(36)
|
1018 |
+
Notice that the vector qB = (q1, q2, q3)T , q2
|
1019 |
+
1 + q2
|
1020 |
+
2 + q2
|
1021 |
+
3 = 1 represents the entire Bloch sphere and the steered Bloch
|
1022 |
+
vectors pA of Alice’s qubit constitute an ellipsoidal surface EA| B enclosed within the Bloch sphere. When Bob employs
|
1023 |
+
convex combinations of PVMs i.e., positive operator valued measures (POVMs), to steer Alice’s qubit, he can access
|
1024 |
+
the points inside the steering ellipsoid. Similar will be the case when Bob’s qubit is steered by Alice through local
|
1025 |
+
operations on her qubit.
|
1026 |
+
For the Lorentz canonical form �Λ(k)
|
1027 |
+
Ic (see (25)) of the two-qubit state �ρ(k)
|
1028 |
+
Ic , Eq. (36) leads to
|
1029 |
+
p1 =
|
1030 |
+
�
|
1031 |
+
λ1
|
1032 |
+
λ0
|
1033 |
+
q1,
|
1034 |
+
p2 =
|
1035 |
+
�
|
1036 |
+
λ2
|
1037 |
+
λ0
|
1038 |
+
q2,
|
1039 |
+
p3 = ±
|
1040 |
+
�
|
1041 |
+
λ3
|
1042 |
+
λ0
|
1043 |
+
q3,
|
1044 |
+
(37)
|
1045 |
+
|
1046 |
+
8
|
1047 |
+
as steered Bloch points pA of Alice’s qubit. They are seen to obey the equation
|
1048 |
+
λ0 p2
|
1049 |
+
1
|
1050 |
+
λ1
|
1051 |
+
+ λ0 p2
|
1052 |
+
2
|
1053 |
+
λ2
|
1054 |
+
+ λ0 p2
|
1055 |
+
3
|
1056 |
+
λ3
|
1057 |
+
= 1
|
1058 |
+
(38)
|
1059 |
+
of an ellipsoid with semiaxes (
|
1060 |
+
�
|
1061 |
+
λ1/λ0,
|
1062 |
+
�
|
1063 |
+
λ2/λ0,
|
1064 |
+
�
|
1065 |
+
λ3/λ0) and center (0, 0, 0) inside the Bloch sphere q2
|
1066 |
+
1 +q2
|
1067 |
+
2 +q2
|
1068 |
+
3 = 1.
|
1069 |
+
We refer to this as the canonical steering ellipsoid representing the set of all two-qubit density matrices which are on
|
1070 |
+
the SLOCC orbit of the state �ρ(k)
|
1071 |
+
Ic (see (22)).
|
1072 |
+
For the second Lorentz canonical form �ΛIIc (see (27)) we get the coordinates of steered Alice’s Bloch vector pA, on
|
1073 |
+
using (36);
|
1074 |
+
p1 = a1 q1,
|
1075 |
+
p2 = −a1q2,
|
1076 |
+
p3 = (1 − a0) + a0q3,
|
1077 |
+
q2
|
1078 |
+
1 + q2
|
1079 |
+
2 + q2
|
1080 |
+
3 = 1
|
1081 |
+
(39)
|
1082 |
+
and they satisfy the equation
|
1083 |
+
p2
|
1084 |
+
1
|
1085 |
+
a2
|
1086 |
+
1
|
1087 |
+
+ p2
|
1088 |
+
2
|
1089 |
+
a2
|
1090 |
+
1
|
1091 |
+
+ (p3 − (1 − a0))2
|
1092 |
+
a2
|
1093 |
+
0
|
1094 |
+
= 1.
|
1095 |
+
(40)
|
1096 |
+
Eq. (40) represents the canonical steering spheroid (traced by Alice’s Bloch vector pA) inside the Bloch sphere with
|
1097 |
+
its center at (0, 0, 1 − a0) and lengths of the semiaxes given by a1 =
|
1098 |
+
�
|
1099 |
+
λ1/φ0, a0 =
|
1100 |
+
�
|
1101 |
+
λ2/φ0 (see (29)). In other
|
1102 |
+
words, a shifted spheroid inscribed within the Bloch sphere, represents two-qubit states that are SLOCC equivalent
|
1103 |
+
to �ρ(k)
|
1104 |
+
IIc.
|
1105 |
+
A.
|
1106 |
+
Canonical steering ellipsoids of W-class of states
|
1107 |
+
We have seen in Sec. III B that the Lorentz canonical form of Λ(1), the real representative of the symmetric two-
|
1108 |
+
qubit state ρ(1) drawn from the W-class of states |DN−1,1⟩ has a nondiagonal form given in Eq. (35). On comparing
|
1109 |
+
(35) with the canonical form in (27), we get
|
1110 |
+
a1 =
|
1111 |
+
1
|
1112 |
+
√
|
1113 |
+
N − 1,
|
1114 |
+
a0 =
|
1115 |
+
1
|
1116 |
+
N − 1.
|
1117 |
+
(41)
|
1118 |
+
From (40) and the discussions prior to it, it can be readily seen that the quantum steering ellipsoid associated with �Λ(1)
|
1119 |
+
in (35) is a spheroid centered at (0, 0,
|
1120 |
+
1
|
1121 |
+
N−1) inside the Bloch sphere, with fixed semiaxes lengths (
|
1122 |
+
1
|
1123 |
+
√N−1,
|
1124 |
+
1
|
1125 |
+
√N−1,
|
1126 |
+
1
|
1127 |
+
N−1)
|
1128 |
+
(see Fig. 1). It is interesting to note that the Lorentz canonical form �Λ(1) is not dependent on the state parameter
|
1129 |
+
‘a’, 0 ≤ a < 1 and hence all states |DN−1, 1⟩ in the family {DN−1, 1} are represented by an oblate spheroid, all its
|
1130 |
+
parameters such as center, semiaxes, volume etc., dependent only on the number of qubits N.
|
1131 |
+
FIG. 1. (Colour online) Steering spheroids inscribed within the Bloch sphere representing the Lorentz canonical form �Λ(1)
|
1132 |
+
(see (35)) of W-class of states |DN−1,1⟩ for N = 4 and N = 20. The spheroids are centered (0, 0,
|
1133 |
+
1
|
1134 |
+
N−1) and the length of the
|
1135 |
+
semi-axes are given by (
|
1136 |
+
1
|
1137 |
+
√N−1,
|
1138 |
+
1
|
1139 |
+
√N−1,
|
1140 |
+
1
|
1141 |
+
N−1).
|
1142 |
+
|
1143 |
+
9
|
1144 |
+
B.
|
1145 |
+
Canonical steering ellipsoids of the states |DN−k,k⟩, k = 2, 3, . . . ,
|
1146 |
+
� N
|
1147 |
+
2
|
1148 |
+
�
|
1149 |
+
As is seen in Sec. III C, the Lorentz canonical form of Λ(k), k = 2, 3, . . . ,
|
1150 |
+
� N
|
1151 |
+
2
|
1152 |
+
�
|
1153 |
+
, the real representative of the two-
|
1154 |
+
qubit states ρ(k) drawn from the pure symmetric N-qubit states |DN−k,k⟩, has the diagonal form (see (25)). The
|
1155 |
+
values of λ0, λ1, λ2, λ3, the eigenvalues of the matrix G Ωk can be evaluated for each value of k, k = 2, 3, . . . ,
|
1156 |
+
� N
|
1157 |
+
2
|
1158 |
+
�
|
1159 |
+
for a chosen N. From (38) and the discussions therein, it follows that the canonical steering ellipsoids of the states
|
1160 |
+
|DN−k,k⟩, k = 2, 3, . . . ,
|
1161 |
+
� N
|
1162 |
+
2
|
1163 |
+
�
|
1164 |
+
is an ellipsoid centered at the origin of the Bloch sphere with lengths of the semiaxes
|
1165 |
+
given by
|
1166 |
+
�
|
1167 |
+
λ1/λ0,
|
1168 |
+
�
|
1169 |
+
λ2/λ0,
|
1170 |
+
�
|
1171 |
+
λ3/λ0. The eigenvalues λµ, µ = 0, 1, 2, 3 of GΩ(k) depend on the parameter ‘a’ also,
|
1172 |
+
unlike in the case of W-class of states where they depend only on N, the number of qubits. Thus each state |DN−k,k⟩
|
1173 |
+
belonging to the family {DN−k, k}, k = 2, 3, . . . ,
|
1174 |
+
� N
|
1175 |
+
2
|
1176 |
+
�
|
1177 |
+
is represented by an ellipsoid whose semiaxes depend on the
|
1178 |
+
values of k, N and ‘a’. In Fig. 2 and Fig. 3 the canonical steering ellipsoids for some chosen values of k, N and ‘a’
|
1179 |
+
are shown.
|
1180 |
+
FIG. 2. (Colour online) Steering ellipsoids centered at the origin of the Bloch sphere representing the Lorentz canonical form
|
1181 |
+
of pure symmetric multiqubit states |DN−k,k⟩ (see (3)) when (i) N = 10, k = 2, a = 0.2 and (ii) N = 10, k = 5, a = 0.2.
|
1182 |
+
FIG. 3. (Colour online) Steering ellipsoids representing the Lorentz canonical form of pure symmetric multiqubit states |DN−k,k⟩
|
1183 |
+
(see (3)) when (i) N = 100, k = 2, a = 0.2 and (ii) N = 100, k = 5, a = 0.1.
|
1184 |
+
V.
|
1185 |
+
VOLUME MONOGAMY RELATIONS FOR PURE SYMMETRIC MULTIQUBIT STATES |DN−k,k⟩
|
1186 |
+
Monogamy relations restrict shareability of quantum correlations in a multipartite state. They find potential ap-
|
1187 |
+
plications in ensuring security in quantum key distribution [18, 19]. Milne et. al. [2, 3] introduced a geometrically
|
1188 |
+
intuitive monogamy relation for the volumes of the steering ellipsoids representing the two-qubit subsystems of mul-
|
1189 |
+
tiqubit pure states, which is stronger than the well-known Coffman-Kundu-Wootters monogamy relation [20]. In this
|
1190 |
+
|
1191 |
+
10
|
1192 |
+
section we explore how volume monogamy relation [2] imposes limits on the volumes of the quantum steering ellip-
|
1193 |
+
soids representing the two-qubit subsystems ρ(k) = TrN−2 [|DN−k,k⟩⟨DN−k,k|] of pure symmetric multiqubit states
|
1194 |
+
|DN−k,k⟩.
|
1195 |
+
For the two-qubit state ρAB(= ρ(k)) (see (15)), we denote by EA| B, the quantum steering ellipsoid containing all
|
1196 |
+
steered Bloch vectors of Alice when Bob carries out local operations on his qubit. The volume of EA| B is given by [1]
|
1197 |
+
VB|A =
|
1198 |
+
�4π
|
1199 |
+
3
|
1200 |
+
�
|
1201 |
+
| det Λ|
|
1202 |
+
(1 − r2)2 ,
|
1203 |
+
(42)
|
1204 |
+
where r2 = r · r = r2
|
1205 |
+
1 + r2
|
1206 |
+
2 + r2
|
1207 |
+
3 (see (18)). As the steering ellipsoid is constrained to lie within the Bloch sphere, i.e.,
|
1208 |
+
VB|A ≤ Vunit = (4π/3), one can choose to work with the normalized volumes vA|B =
|
1209 |
+
VA|B
|
1210 |
+
4π/3 , the ratio of the volume of
|
1211 |
+
the steering ellipsoid to the volume of a unit sphere.
|
1212 |
+
The volume monogamy relation satisfied by a pure three-qubit state shared by Alice, Bob and Charlie is given
|
1213 |
+
by [1–3]
|
1214 |
+
�
|
1215 |
+
VA|B +
|
1216 |
+
�
|
1217 |
+
VC|B ≤
|
1218 |
+
�
|
1219 |
+
4π
|
1220 |
+
3 .
|
1221 |
+
(43)
|
1222 |
+
where VA|B, VC|B are respectively the volumes of the ellipsoids corresponding to steered states of Alice and Charlie
|
1223 |
+
when Bob performs all possible local measurements on his qubit. The normalized form of the volume monogmay
|
1224 |
+
relation (43) turns out to be
|
1225 |
+
√vA|B + √vC|B ≤ 1,
|
1226 |
+
(44)
|
1227 |
+
where vA|B =
|
1228 |
+
VA|B
|
1229 |
+
4π/3 are the normalized volumes.
|
1230 |
+
The monogamy relation (44) is not, in general, satisfied by mixed three-qubit states [3] and it has been shown that
|
1231 |
+
�
|
1232 |
+
vA|B
|
1233 |
+
� 2
|
1234 |
+
3 +
|
1235 |
+
�
|
1236 |
+
vC|B
|
1237 |
+
� 2
|
1238 |
+
3 ≤ 1,
|
1239 |
+
(45)
|
1240 |
+
is the volume monogamy relation for pure as well as mixed three-qubit states [3].
|
1241 |
+
As there are 1
|
1242 |
+
2(N − 2)(N − 1) three qubit subsystems in a N-qubit state, each of which obey monogamy relation
|
1243 |
+
(45), on adding these relations and simplifying, one gets [3]
|
1244 |
+
�
|
1245 |
+
vA|B
|
1246 |
+
� 2
|
1247 |
+
3 +
|
1248 |
+
�
|
1249 |
+
vC|B
|
1250 |
+
� 2
|
1251 |
+
3 +
|
1252 |
+
�
|
1253 |
+
vD|B
|
1254 |
+
� 2
|
1255 |
+
3 + · · · ≤ N − 1
|
1256 |
+
2
|
1257 |
+
.
|
1258 |
+
(46)
|
1259 |
+
The relation (46) is the volume monogamy relation satisfied by pure as well as mixed N-qubit states . For N = 3, it
|
1260 |
+
reduces to (45).
|
1261 |
+
For multiqubit states that are invariant under exchange of qubits, vA|B = vC|B = vD|B = · · · = vN where vN denotes
|
1262 |
+
the normalized volume of the steering ellipsoid corresponding to any of the N − 1 qubits, the steering performed by,
|
1263 |
+
say Nth qubit. Eq. (46) thus reduces to
|
1264 |
+
(N − 1) (vN)
|
1265 |
+
2
|
1266 |
+
3 ≤ N − 1
|
1267 |
+
2
|
1268 |
+
=⇒ (vN)
|
1269 |
+
2
|
1270 |
+
3 ≤ 1
|
1271 |
+
2
|
1272 |
+
(47)
|
1273 |
+
implying that (vN)
|
1274 |
+
2
|
1275 |
+
3 ≤ 1
|
1276 |
+
2 is the volume monogamy relation for permutation symmetric multiqubit states.
|
1277 |
+
A.
|
1278 |
+
Volume monogamy relations governing the W-class of states {DN−1,1}
|
1279 |
+
On denoting the normalized volume of a steering ellipsoid corresponding to the states |DN−1,1⟩ by v(1)
|
1280 |
+
N , we have
|
1281 |
+
(see (42))
|
1282 |
+
v(1)
|
1283 |
+
N = | det Λ(1)|
|
1284 |
+
(1 − r2)2 ,
|
1285 |
+
(48)
|
1286 |
+
where Λ(1) is given in (31) and
|
1287 |
+
r1 =
|
1288 |
+
2a
|
1289 |
+
√
|
1290 |
+
1 − a2
|
1291 |
+
1 + a2(N − 1),
|
1292 |
+
r2 = 0,
|
1293 |
+
r3 = 1 +
|
1294 |
+
2a2
|
1295 |
+
1 + a2(N − 1) − 2
|
1296 |
+
N
|
1297 |
+
(49)
|
1298 |
+
|
1299 |
+
11
|
1300 |
+
Under suitable Lorentz transformations, the real matrix Λ(1) (see (31)) associated with the state ρ(1)
|
1301 |
+
2
|
1302 |
+
gets transformed
|
1303 |
+
to its Lorentz canonical form �Λ(1) (see (35)). It follows that (see (29), (33))
|
1304 |
+
�
|
1305 |
+
LA Λ(1) LT
|
1306 |
+
B
|
1307 |
+
�
|
1308 |
+
00 =
|
1309 |
+
�
|
1310 |
+
φ0 = 2
|
1311 |
+
√
|
1312 |
+
N − 1
|
1313 |
+
�
|
1314 |
+
1 − a2
|
1315 |
+
N(1 + (N − 1) a2)
|
1316 |
+
�
|
1317 |
+
.
|
1318 |
+
(50)
|
1319 |
+
Using the property det LA = det LB = 1 of orthochronous proper Lorentz transformations [17] and substituting
|
1320 |
+
| det �Λ(1)| =
|
1321 |
+
1
|
1322 |
+
(N−1)2 in (23), we obtain
|
1323 |
+
| det �Λ(1)| =
|
1324 |
+
1
|
1325 |
+
(N − 1)2 = | det LA| | det LB|
|
1326 |
+
����det
|
1327 |
+
� Λ(1)
|
1328 |
+
√φ0
|
1329 |
+
����� = | det Λ(1)|
|
1330 |
+
φ2
|
1331 |
+
0
|
1332 |
+
.
|
1333 |
+
(51)
|
1334 |
+
Eq. (51) leads to | det Λ(1)| = φ2
|
1335 |
+
0| det �Λ(1)|. The normalized volume v(1)
|
1336 |
+
N
|
1337 |
+
of the steering ellipsoid corresponding to
|
1338 |
+
W-class of states thus becomes (see (48))
|
1339 |
+
v(1)
|
1340 |
+
N = | det �Λ(1)|
|
1341 |
+
φ2
|
1342 |
+
0
|
1343 |
+
(1 − r2)2
|
1344 |
+
(52)
|
1345 |
+
From (49) and (50) it readily follows that φ2
|
1346 |
+
0 = (1 − r2)2 and hence (see (52)) the simple form for the normalized
|
1347 |
+
volume of the corresponding steering ellipsoid associated with the two-qubit state ρ(1) turns out to be
|
1348 |
+
v(1)
|
1349 |
+
N =
|
1350 |
+
φ2
|
1351 |
+
0
|
1352 |
+
(N − 1)2 (1 − r2)2 =
|
1353 |
+
1
|
1354 |
+
(N − 1)2 .
|
1355 |
+
(53)
|
1356 |
+
The volume monogamy relation
|
1357 |
+
�
|
1358 |
+
v(1)
|
1359 |
+
N
|
1360 |
+
� 2
|
1361 |
+
3 ≤ 1
|
1362 |
+
2 (see (47)) takes the form
|
1363 |
+
�
|
1364 |
+
1
|
1365 |
+
(N − 1)2
|
1366 |
+
�2/3
|
1367 |
+
≤ 1
|
1368 |
+
2 =⇒ 2(N − 1)
|
1369 |
+
−4
|
1370 |
+
3 ≤ 1
|
1371 |
+
(54)
|
1372 |
+
and is readily satisfied for any N ≥ 3 as can be seen in Fig.5.
|
1373 |
+
10
|
1374 |
+
20
|
1375 |
+
30
|
1376 |
+
40
|
1377 |
+
50
|
1378 |
+
0.0
|
1379 |
+
0.1
|
1380 |
+
0.2
|
1381 |
+
0.3
|
1382 |
+
0.4
|
1383 |
+
N
|
1384 |
+
(N-1)
|
1385 |
+
-4
|
1386 |
+
3
|
1387 |
+
FIG. 4. (Colour online) The LHS of the monogamy relation 2(N − 1)
|
1388 |
+
−4
|
1389 |
+
3 ≤ 1 is seen to be less than 1 for the states |DN−1, 1⟩
|
1390 |
+
for any N ≥ 3.
|
1391 |
+
B.
|
1392 |
+
Relation between obesity of steering ellipsoids and concurrence
|
1393 |
+
We recall here that the obesity O(ρAB) = | det Λ|1/4 of the quantum steering ellipsoid [2] depicting a two-qubit state
|
1394 |
+
ρAB is an upper bound for the concurrence C(ρAB):
|
1395 |
+
C(ρAB) ≤ O(ρAB) = | det Λ|1/4.
|
1396 |
+
(55)
|
1397 |
+
|
1398 |
+
12
|
1399 |
+
Furthermore, if ρAB −→ �ρAB = (A ⊗ B)ρAB (A† ⊗ B†)/(Tr(A† A ⊗ B†B)ρAB], A, B ∈ SL(2, C) it follows that [2]
|
1400 |
+
O(ρAB)
|
1401 |
+
C(ρAB) = O(�ρAB)
|
1402 |
+
C(�ρAB).
|
1403 |
+
(56)
|
1404 |
+
We make use of the relation (56) to obtain a relation for concurrence [21] of a pair of qubits in the symmetric N-qubit
|
1405 |
+
pure states |DN−k,k⟩, k = 1, 2, . . . ,
|
1406 |
+
� N
|
1407 |
+
2
|
1408 |
+
�
|
1409 |
+
. For the states |DN−1,1⟩ belonging to W-class, we readily get (see (31), (35))
|
1410 |
+
det Λ(1) =
|
1411 |
+
�
|
1412 |
+
2(1 − a2)
|
1413 |
+
N(1 + a2(N − 1))
|
1414 |
+
�4
|
1415 |
+
,
|
1416 |
+
det �Λ(1) =
|
1417 |
+
�
|
1418 |
+
1
|
1419 |
+
N − 1
|
1420 |
+
�2
|
1421 |
+
(57)
|
1422 |
+
and thereby the obesities O(ρ(1)), O(�ρ(1)):
|
1423 |
+
O(ρ(1)) =
|
1424 |
+
2(1 − a2)
|
1425 |
+
N(1 + a2(N − 1)),
|
1426 |
+
O(�ρ(1)) =
|
1427 |
+
1
|
1428 |
+
√
|
1429 |
+
N − 1
|
1430 |
+
(58)
|
1431 |
+
As the concurrence of the state �ρ(1) turns out to be
|
1432 |
+
C(�ρ(1)) = O(�ρ(1)) =
|
1433 |
+
1
|
1434 |
+
√
|
1435 |
+
N − 1
|
1436 |
+
(59)
|
1437 |
+
we obtain (see (56),(59))
|
1438 |
+
C(ρ(1)) = O(ρ(1)) =
|
1439 |
+
2(1 − a2)
|
1440 |
+
N(1 + a2(N − 1)).
|
1441 |
+
(60)
|
1442 |
+
The value of concurrence in (60) matches exactly with that obtained [21] using C(ρ(1)) = max(0, µ1 − µ2 − µ3 − µ4)
|
1443 |
+
where µ1 ≥ µ2 ≥ µ3 ≥ µ4 are square-roots of the eigenvalues of the matrix R = ρ(1) (σ2 ⊗ σ2) ρ(1)∗ (σ2 ⊗ σ2).
|
1444 |
+
We have seen that the state |DN−1, 1⟩ reduces to W-state when a = 0 and hence for the N-qubit W-state, concurrence
|
1445 |
+
of any pair of qubits is given by C(ρ(1)
|
1446 |
+
W ) = 2
|
1447 |
+
N .
|
1448 |
+
VI.
|
1449 |
+
SUMMARY
|
1450 |
+
In this work we have analyzed the canonical steering ellipsoids and volume monogamy relations of the pure symmetric
|
1451 |
+
N-qubit states characterized by two distinct Majorana spinors. We have shown that the entire W-class of states has a
|
1452 |
+
geometric representation in terms of a shifted spheroid inscribed inside the Bloch sphere. The center of the spheroid,
|
1453 |
+
the length of its semiaxes and its volume are shown to be dependent only on the number of qubits N and hence all
|
1454 |
+
states in the N-qubit W-class are characterized by a single spheroid, shifted along the polar axis of the Bloch sphere.
|
1455 |
+
All other families of pure symmetric N-qubit states with two distinct spinors which are SLOCC inequivalent to the
|
1456 |
+
W-class are geometrically represented by ellipsoids centered at the origin. A discussion on volume monogamy relations
|
1457 |
+
applicable to identical subsystems of a pure N-qubit symmetric state is given here and a volume monogamy relation
|
1458 |
+
applicable for W-class of states is obtained. A relation connecting concurrence of the two-qubit state and obesity
|
1459 |
+
of the associated quantum steering ellipsoid with its canonical counterparts is made use of to obtain concurrence of
|
1460 |
+
the states belonging to W-class. It would be interesting to examine the features of canonical steering ellipsoids and
|
1461 |
+
volume monogamy relations for the SLOCC inequivalent families of pure symmetric multiqubit states with more than
|
1462 |
+
two distinct spinors; in particular, the class of pure symmetric N-qubit states belonging to GHZ-class (with three
|
1463 |
+
distinct spinors).
|
1464 |
+
ACKNOWLEDGEMENTS
|
1465 |
+
BGD thanks IASC-INSA-NASI for the award of Summer Research Fellowship-2022, during this work.
|
1466 |
+
Sudha,
|
1467 |
+
ARU and IR are supported by the Department of Science and Technology (DST), India through Project No.
|
1468 |
+
DST/ICPS/QUST/2018/107.
|
1469 |
+
[1] Jevtic, S., Pusey, M. F., Jennings, D. and Rudolph, T.: Quantum Steering Ellipsoids. Phys. Rev. Lett. 113, 020402 (2014).
|
1470 |
+
|
1471 |
+
13
|
1472 |
+
[2] Milne, A., Jevtic, S., Jennings, D., Wiseman, H., and Rudolph, T.: Quantum steering ellipsoids, extremal physical states
|
1473 |
+
and monogamy. New J. Phys. 16, 083017 (2014).
|
1474 |
+
[3] Cheng, S., Milne, A., Hall, M. J. W., Wiseman, H. M.: Volume monogamy of quantum steering ellipsoids for multiqubit
|
1475 |
+
systems. Phys. Rev. A., 94, 042105 (2016).
|
1476 |
+
[4] Shi, M., Jiang, F., Sun, C., and Du, J.: “Geometric picture of quantum discord for two-qubit quantum states,” New J.
|
1477 |
+
Phys. 13, 073016 (2011).
|
1478 |
+
[5] Shi, M., Yang, W., Jiang, F., and Du, J.: Quantum discord of two-qubit rank-2 states. J.Phys.A: Math Theor. 44, 415304
|
1479 |
+
(2011).
|
1480 |
+
[6] Verstraete, F., Dehaene, J., DeMoor, B.,: Local filtering operations on two qubits. Physical Review A., 64, 010101(R)
|
1481 |
+
(2001).
|
1482 |
+
[7] Verstraete, F., Quantum entanglement and quantum information,Ph.D. thesis, Katholieke Universiteit Leuven, 2002.
|
1483 |
+
[8] Sudha, Karthik, H. S., Pal, R., Akhilesh, K. S., Ghosh, S., Mallesh, K. S., Usha Devi, A. R.: Canonical forms of two-qubit
|
1484 |
+
states under local operations. Phys.Rev.A, 102, 052419 (2020).
|
1485 |
+
[9] Anjali, K, Reena, I, Sudha, Divyamani, B. G., Karthik, H. S., Mallesh, K. S., and Usha Devi, A. R., Geometric picture
|
1486 |
+
for SLOCC classification of pure permutation symmetric three-qubit states, Quantum Inf Proc. 21, 326 (2022).
|
1487 |
+
[10] Majorana, E.: Atomi Orientati in Campo Magnetico Variabile, Nuovo Cimento 9, 43 (1932).
|
1488 |
+
[11] Bastin, T., Krins, S., Mathonet, P., Godefroid, M., Lamata, L., and Solano E.: Operational Families of Entanglement
|
1489 |
+
Classes for Symmetric N-Qubit States, Phys. Rev. Lett. 103, 070503 (2009).
|
1490 |
+
[12] Mathonet, P., Krins, S., Godefroid, M., Lamata, L., Solano, E., and Bastin, T.: Entanglement equivalence of N-qubit
|
1491 |
+
symmetric states, Phys. Rev. A81, 052315 (2010).
|
1492 |
+
[13] Usha Devi, A. R., Sudha, Rajagopal, A. K.: Majorana representation of symmetric multiqubit states, Quantum Inf. Proc.
|
1493 |
+
11 685 (2012)
|
1494 |
+
[14] Sudha, Usha Devi, A. R., Rajagopal, A. K.: Monogamy of quantum correlations in three-qubit pure states, Phys. Rev. A,
|
1495 |
+
85, 012103 (2012).
|
1496 |
+
[15] Akhilesh, K. S., Divyamani, B. G., Sudha, Usha Devi, A. R., and Mallesh, K. S., Spin squeezing in symmetric multiqubit
|
1497 |
+
states with two non-orthogonal Majorana spinors, Quantum Inf. Proc. 18, 144 (2019).
|
1498 |
+
[16] Varshalovich, D. A., Moskalev, A. N. and Khersonskii, V. K.,: Quantum Theory of Angular Momentum, World Scientific,
|
1499 |
+
Singapore (1988).
|
1500 |
+
[17] Srinivasa Rao, K. N.: The Rotation and Lorentz groups and their representations for physicists, Wiley Eastern, New Delhi
|
1501 |
+
(1988).
|
1502 |
+
[18] Tehral, B. M.: Is entanglement monogamous? IBM J. Res. & Dev. 48, 71 (2004).
|
1503 |
+
[19] Paw�lowski, M.: Security proof for cryptographic protocols based only on the monogamy of Bell’s inequality violations.
|
1504 |
+
Phys. Rev. A. 82, 032313 (2010).
|
1505 |
+
[20] Coffman, V., Kundu, J., Wootters, W. K.: Distributed entanglement. Phys. Rev. A 61, 052306 (2000).
|
1506 |
+
[21] Wootters, W. K.: Entanglement of formation of an arbitrary state of two qubits. Phys. Rev. Lett. 80, 2245 (1998).
|
1507 |
+
|
AtAzT4oBgHgl3EQfv_4W/content/tmp_files/load_file.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
C9E4T4oBgHgl3EQfFwy_/content/2301.04889v1.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:e39a54241e3e4aa4ae2984e2897526a35e4b46946f80f5322784227acda56626
|
3 |
+
size 2707116
|
C9E4T4oBgHgl3EQfFwy_/vector_store/index.faiss
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:9b281ffd0501706da70e230f66a765a6da81ac0a37e7e1c9171caa3789308cd2
|
3 |
+
size 3670061
|
CNE1T4oBgHgl3EQfDwNk/vector_store/index.pkl
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:3ac8aa2ea11dd09470305d3662432ad87c9e63cb1ee5875b5cf02b46a956cb5b
|
3 |
+
size 118793
|
EdAyT4oBgHgl3EQfSfdI/content/2301.00086v1.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:ae038651361e8e1bde9639beacd0a93ee85776ce34c8105463642c16842e3189
|
3 |
+
size 2995163
|
EdAyT4oBgHgl3EQfSfdI/vector_store/index.faiss
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:726e57a63b79fb8153d0498ddec8ffb7efca84dd4a0c5870b189f6937bc42741
|
3 |
+
size 3342381
|
EdAyT4oBgHgl3EQfSfdI/vector_store/index.pkl
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:085690be5d7edfb51894d8fd82c234c4357d029ce27e0fa608efaef74d1ea510
|
3 |
+
size 116745
|
EtE1T4oBgHgl3EQf-gZN/content/tmp_files/2301.03569v1.pdf.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
EtE1T4oBgHgl3EQf-gZN/content/tmp_files/load_file.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
F9E1T4oBgHgl3EQfqwX2/vector_store/index.pkl
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:d32414073c0f5e0ba9b18fe7f04d44ade96c07f93fff397e6ec61f271e91ed1b
|
3 |
+
size 187269
|
FNAzT4oBgHgl3EQfUPz_/content/tmp_files/2301.01265v1.pdf.txt
ADDED
@@ -0,0 +1,1446 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
1
|
2 |
+
|
3 |
+
Spinel Cu-Mn-Cr Oxide Nanoparticle-Pigmented
|
4 |
+
Solar Selective Coatings Maintaining >94%
|
5 |
+
Efficiency at 750ºC
|
6 |
+
Can Xu, Xiaoxin Wang, and Jifeng Liu*
|
7 |
+
Thayer School of Engineering, Dartmouth College, 14 Engineering Drive, Hanover, New
|
8 |
+
Hampshire 03755, USA
|
9 |
+
*Corresponding Author: [email protected]
|
10 |
+
ABSTRACT
|
11 |
+
High-temperature concentrating solar power (CSP) system is capable of harvesting and storing
|
12 |
+
solar energy as heat towards cost-effective dispatchable solar electricity. Solar selective coating is
|
13 |
+
a critical component to boost its efficiency by maximizing solar absorptance and minimizing
|
14 |
+
thermal emittance losses. However, maintaining a high solar-thermal conversion efficiency >90%
|
15 |
+
for long-term operation at ≥750ºC remains a significant challenge. Herein, we report spray-coated
|
16 |
+
spinel Cu-Mn-Cr oxide nanoparticle-pigmented solar selective coatings on Inconel tube sections
|
17 |
+
maintaining ≥94% efficiency at 750ºC and ≥92.5% at 800ºC under 1000x solar concentration after
|
18 |
+
60 simulated day-night thermal cycles in air, each cycle comprising 12h at 750ºC/800ºC and 12h
|
19 |
+
cooling to 25ºC. The solar spectral selectivity is intrinsic to the band-to-band and d-d transitions
|
20 |
+
|
21 |
+
2
|
22 |
+
|
23 |
+
of non-stoichiometric spinel Cu-Mn-Cr oxide nanoparticles by balancing the lattice site inversion
|
24 |
+
of Cu2+ and Mn3+ on tetrahedral vs. octahedral sites. This feature offers a large fabrication tolerance
|
25 |
+
in nanoparticle volume fraction and coating thickness, facilitating low-cost and scalable spray-
|
26 |
+
coated high-efficiency solar selective absorbers for high-temperature CSP systems.
|
27 |
+
Key Words: Concentrating solar power, Solar selective absorber, Spinel oxide nanoparticle; Ionic
|
28 |
+
site inversion; d-d transition,
|
29 |
+
TOC GRAPHICS
|
30 |
+
|
31 |
+
|
32 |
+
|
33 |
+
|
34 |
+
14um
|
35 |
+
After60day-night cycles
|
36 |
+
13
|
37 |
+
11
|
38 |
+
between750Cand252C
|
39 |
+
9
|
40 |
+
6
|
41 |
+
UV-vis)
|
42 |
+
500μm
|
43 |
+
PigmentedNP
|
44 |
+
Siliconeresin
|
45 |
+
Coating
|
46 |
+
μm
|
47 |
+
um
|
48 |
+
Substra.e
|
49 |
+
400
|
50 |
+
500
|
51 |
+
300
|
52 |
+
400
|
53 |
+
300
|
54 |
+
200 100
|
55 |
+
200
|
56 |
+
100
|
57 |
+
Cu-Mn-Cr Oxide NPs, 750C Cycling
|
58 |
+
%
|
59 |
+
100
|
60 |
+
95
|
61 |
+
SpinelCu-Mn-Croxidepigmentnanoparticles(NPs)
|
62 |
+
90
|
63 |
+
---SolarAbsorptance
|
64 |
+
85
|
65 |
+
.-ThermalEmittance
|
66 |
+
80
|
67 |
+
-Thermal Efficiency
|
68 |
+
75
|
69 |
+
@750, 1000x solar
|
70 |
+
(111)
|
71 |
+
70
|
72 |
+
concentration
|
73 |
+
d=0.481nm
|
74 |
+
65
|
75 |
+
60
|
76 |
+
55
|
77 |
+
0
|
78 |
+
20
|
79 |
+
40
|
80 |
+
60
|
81 |
+
50nm
|
82 |
+
nm
|
83 |
+
# of simulated day/nights3
|
84 |
+
|
85 |
+
1. Introduction
|
86 |
+
Recent years have seen a rapid growth in solar energy, currently supplying 2.8% of electricity in
|
87 |
+
the U.S. as the third largest renewable source after wind and hydropower. 1 Concentrating solar
|
88 |
+
power (CSP) system utilizes reflective mirrors (“collectors”) to concentrate solar irradiation and
|
89 |
+
heat up working fluids (e.g. molten salts) to high temperatures. 2 A great advantage compared to
|
90 |
+
photovoltaic (PV) system is that CSP is capable of storing the solar-thermal energy for >10 hours
|
91 |
+
so as to meet the peak hours of electricity consumption towards dispatchable solar electricity. 3
|
92 |
+
Solar selective coating, a critical component to boost the solar-to-thermal energy conversion
|
93 |
+
efficiency (ηtherm) by maximizing solar spectral absorption and minimizing infrared (IR) thermal
|
94 |
+
emittance losses, can reduce the levelized cost of energy (LCOE) of CSP by >12% 4 for ηtherm>90%.
|
95 |
+
Further increasing ηtherm to 95% is projected to achieve >17% LCOE cost reduction, which strongly
|
96 |
+
supports the goal of achieving $0.05/kWh solar electricity by 2030. 3 Based on Carnot Theorem,
|
97 |
+
the operation temperature of Generation 3 CSP system is being increased to 750ºC with a solar
|
98 |
+
concentration of ~1000x to achieve >50% overall power cycle efficiency in solar electricity
|
99 |
+
production. 5 Therefore, it is highly desirable to develop cost-effective and highly scalable solar
|
100 |
+
selective coatings that can maintain ηtherm ~95% at 750ºC in air.
|
101 |
+
However, currently commercial solar coating products are unable to maintain ηtherm >90% at
|
102 |
+
operating temperatures >700ºC in air. 6 The benchmark Pyromark 2500 coating suffers from a high
|
103 |
+
thermal emittance of εtherm~87% and pigment particle phase instability at 750°C, 7 limiting its ηtherm
|
104 |
+
to ~88% at 1000x solar concentration after operating at 750°C for 300 h. 8,9 Various transition
|
105 |
+
metal oxide solar absorbers have been investigated, and some of them demonstrate excellent
|
106 |
+
thermal stability at 750°C, 10,11 yet the lack of spectral selectivity limits their maximal ηtherm to
|
107 |
+
~91% at >700°C. While dielectric selective absorber coatings based on nitrides and oxides could
|
108 |
+
|
109 |
+
4
|
110 |
+
|
111 |
+
sustain high temperature in air and achieve some degree of solar selectivity, 12,13 the principles of
|
112 |
+
their optical design requires relatively expensive vacuum deposition for stringent thickness control.
|
113 |
+
Our previous optical design 14 based on Lorentz-Mie scattering theory and Four-Flux model has
|
114 |
+
found it feasible to achieve good solar selectivity in nanoparticle (NP)-pigmented silicone coatings
|
115 |
+
for NPs with diameters <40 nm and steep optical transition near the optimal cut-off wavelength
|
116 |
+
(λcut) between the solar spectrum and the thermal radiation spectrum. For Generation 3 CSP
|
117 |
+
systems, λcut=2475 nm for 1000x solar concentration at 750ºC. Spinel (AB2O4) NPs with intrinsic
|
118 |
+
high-temperature thermal stability is a promising candidate since their manifold compositions and
|
119 |
+
cationic valences enable a high degree of freedom to tailor the optical properties. Previously, we
|
120 |
+
have demonstrated MnFe2O4 NP-pigmented solar selective coatings maintaining ηtherm ~89%
|
121 |
+
under 1000x solar concentration after serving at 750ºC in air for 700h. 15 To further enhance the
|
122 |
+
performance, in this Paper we demonstrate spinel Cu-Mn-Cr oxide NP-pigmented silicone solar
|
123 |
+
selective coatings on Inconel tube sections with a higher solar absorbance αsolar=98.2% and a
|
124 |
+
notably reduced thermal emittance εtherm=59.4% compared to benchmark Pyromark 2500
|
125 |
+
(αsolar=96.0%; εtherm=89.5%). To the best of our knowledge, this performance leads to a record-
|
126 |
+
high ηtherm=94.50.2% for 1000x solar concentration at 750ºC in air. These coatings also maintain
|
127 |
+
ηtherm≥94% at 750ºC and ηtherm ≥92.5% at 800ºC after 60 simulated day (750ºC/800 ºC 12h) and
|
128 |
+
night (25 ºC 12h) cycles in air without degradation in surface morphology or phase stability. The
|
129 |
+
solar spectral selectivity is intrinsic to the band-to-band and d-d transitions of non-stoichiometric
|
130 |
+
spinel Cu-Mn-Cr oxide NPs. This feature offers a large fabrication tolerance in nanoparticle
|
131 |
+
volume fraction and coating thickness, greatly facilitating high-efficiency solar selective absorbers
|
132 |
+
layers via low-cost and highly scalable spray coating for high-temperature CSP systems.
|
133 |
+
|
134 |
+
5
|
135 |
+
|
136 |
+
2. Results and Discussions
|
137 |
+
|
138 |
+
Figure 1. (a) XRD pattern of the synthesized spinel Cu-Mn-Cr oxide NPs. A small amount of
|
139 |
+
Mn2O3 is also identified. (b) shows a TEM image of the NPs, and (c) zooms into one of the NPs
|
140 |
+
in the red box shown in (b).
|
141 |
+
Structural and Compositional Analyses of Spinel Cu-Mn-Cr Oxide NPs. We utilized co-
|
142 |
+
precipitation method to synthesize spinel oxide NPs with Cu:Mn:Cr=1:3:1 from nitrate salt
|
143 |
+
precursors (see Supporting Information Section 1). Such a nonstoichiometric ratio is selected to
|
144 |
+
optimize the solar selective absorption by engineering the valences of cations and cationic site
|
145 |
+
distribution to our advantage, as will be discussed later. These NPs are further annealed at 550°C
|
146 |
+
to enhance the crystallinity. Energy dispersive X-ray spectroscopy (EDS) analysis shows
|
147 |
+
Cu:Mn:Cr =1.00:3.33:1.17 in the synthesized NPs, close to the targeted ratio. Figure 1a shows the
|
148 |
+
X-ray diffraction (XRD) pattern of the synthesized NPs loaded on Si(100) substrate. Most of the
|
149 |
+
peaks are attributed to spinel structure with a lattice constant of a=8.307 Å, between those of cubic
|
150 |
+
CuMn2O4 (a=8.331 Å) and CuCr2O4 (a=8.270 Å) 16 as expected for spinel Cu-Mn-Cr oxide. A
|
151 |
+
couple of small peaks from Mn2O3 are also observed, consistent with the phase diagram reported
|
152 |
+
for Cu-Mn spinel oxides with Cu:Mn <1. 17 Based on XRD relative intensity ratio (RIR) analysis,
|
153 |
+
the molar ratio of Cu-Mn-Cr spinel oxide to Mn2O3 is 1:(0.142 0.018). Figures 1b and 1c further
|
154 |
+
|
155 |
+
(a)
|
156 |
+
Spinel
|
157 |
+
(b)
|
158 |
+
(c)
|
159 |
+
(311)
|
160 |
+
Mn203
|
161 |
+
Intensity
|
162 |
+
si (400)
|
163 |
+
(511)
|
164 |
+
(440)
|
165 |
+
(111)
|
166 |
+
(220)
|
167 |
+
(400)
|
168 |
+
(422)
|
169 |
+
(533)
|
170 |
+
d=0.481nm
|
171 |
+
(111)
|
172 |
+
(222)
|
173 |
+
50nm
|
174 |
+
nm
|
175 |
+
20
|
176 |
+
30
|
177 |
+
40
|
178 |
+
50
|
179 |
+
60
|
180 |
+
70
|
181 |
+
80
|
182 |
+
2 theta (degree)6
|
183 |
+
|
184 |
+
show transmission electron microscopy (TEM) images of the NPs. The average NP diameter is
|
185 |
+
313.6 nm (see the NP size histogram in Supporting Information Figure S1). The interplanar
|
186 |
+
spacing of {111} planes is 4.81 Å in the high-resolution TEM image in Figure 1c, fully consistent
|
187 |
+
with the XRD results.
|
188 |
+
Furthermore, X-ray photoelectron spectroscopy (XPS) analyses provide the valences and the
|
189 |
+
corresponding percentages of the cations, as summarized in Table 1 (see Supporting Information
|
190 |
+
Section 3 for data analyses). Notably, the Cu+:Cu2+ ratio is as high as 4:1. It has been reported that
|
191 |
+
Cu+ on tetrahedral A sites in spinel oxides can be stabilized by Cu2+ and Mn4+ on octahedral B
|
192 |
+
sites 17. According to ligand field theory (LFT) and the octahedral site preference energy (OSPE)
|
193 |
+
18,19 , Cu+(3d10) and Mn2+(3d5) prefer tetrahedral sites while Cu2+, Mn3+ and Cr3+/Mn4+ are
|
194 |
+
sequentially more energetically favored to take the octahedral sites. Therefore, considering the
|
195 |
+
cation valance distribution, OSPE, and overall charge balance, the detailed formula can be written
|
196 |
+
as (Cu+0.48Mn2+0.52)Td,A(Cu2+0.12Mn2+0.07Mn3+0.65Mn4+0.46Cr3+0.70)oh,BO3.89 assuming OSPE fully
|
197 |
+
applies. Here, the subscripts “Td,A” and “Oh,B” stand for tetrahedral A site and octahedral B site,
|
198 |
+
respectively. Characteristic vibration modes corresponding to octahedral and tetrahedral sites in
|
199 |
+
spinel structures are also observed in Fourier transform IR spectroscopy (FTIR) and detailed in the
|
200 |
+
Supporting Information (Figure S3). On the other hand, even though OSPE is highly effective in
|
201 |
+
predicting cation lattice sites, we note that ~30% site inversion of Mn3+ from octahedral to
|
202 |
+
tetrahedral sites has been reported in closely related CuMn2O4 spinel structures in order to dilute
|
203 |
+
the Jahn-Teller effect. 20 Such Mn3+ site inversion can lead to strong and broad absorption bands
|
204 |
+
in the near infrared (NIR) regimes at 1000-2000 nm wavelength. 21,22 Furthermore, the deficiency
|
205 |
+
of oxygen compared to stoichiometric AB2O4 indicates oxygen vacancies, likely on the surface of
|
206 |
+
the NPs as has been reported in other spinel NP systems. 23 Oxygen vacancies are known to interact
|
207 |
+
|
208 |
+
7
|
209 |
+
|
210 |
+
with transition metal cations and further enhanced the NIR absorption. 24 These influences on
|
211 |
+
optical properties will be discussed next.
|
212 |
+
Table 1. Cu:Mn:Cr atomic ratios and corresponding cationic valences/percentages in the synthesized NPs
|
213 |
+
comprising both spinel Cu-Mn-Cr oxide and Mn2O3 at a ratio of 1:0.142
|
214 |
+
Atomic Species
|
215 |
+
Atomic Ratio
|
216 |
+
Ionic Valence/Molar Percentage
|
217 |
+
Cu
|
218 |
+
1.00
|
219 |
+
Cu+: 80%
|
220 |
+
Cu2+: 20%
|
221 |
+
Mn
|
222 |
+
3.33
|
223 |
+
Mn2+: 30%
|
224 |
+
Mn3+: 47%
|
225 |
+
Mn4+: 23%
|
226 |
+
Cr
|
227 |
+
1.17
|
228 |
+
Cr3+:100%
|
229 |
+
|
230 |
+
|
231 |
+
|
232 |
+
Figure 2. (a) Indirect bandgap Tauc plot of the spinel Cu-Mn-Cr oxide NPs (b) Absorption
|
233 |
+
spectrum beyond the indirect bandgap and the corresponding Gaussian peaks fitting. The two
|
234 |
+
|
235 |
+
(a)
|
236 |
+
(b)
|
237 |
+
103
|
238 |
+
x104
|
239 |
+
Indirect gap absorption subtracted
|
240 |
+
IndirectBandgapTaucPlot
|
241 |
+
Overall fitting
|
242 |
+
Individual Gaussian peakfitting
|
243 |
+
8.
|
244 |
+
1.0
|
245 |
+
α(cm")
|
246 |
+
6
|
247 |
+
0.95eV
|
248 |
+
4
|
249 |
+
1.95,eV
|
250 |
+
0.5
|
251 |
+
2
|
252 |
+
0.0-
|
253 |
+
fo
|
254 |
+
0.51.01.52.02.53.03.5
|
255 |
+
4.0
|
256 |
+
0.5
|
257 |
+
1.0
|
258 |
+
1.5
|
259 |
+
2.0
|
260 |
+
2.5
|
261 |
+
3.0
|
262 |
+
Photon Energy (eV)
|
263 |
+
Photon Energy (eV)
|
264 |
+
(c)
|
265 |
+
(d)
|
266 |
+
SolarAbsorptanceContours
|
267 |
+
Thermal EfficiencyContours
|
268 |
+
15
|
269 |
+
15
|
270 |
+
αsolar (%)
|
271 |
+
Thickness (um)
|
272 |
+
Ntherm (%)
|
273 |
+
92.83
|
274 |
+
94
|
275 |
+
92
|
276 |
+
95
|
277 |
+
93.12
|
278 |
+
90
|
279 |
+
98.67
|
280 |
+
.34
|
281 |
+
88
|
282 |
+
10
|
283 |
+
10
|
284 |
+
90
|
285 |
+
86
|
286 |
+
93.41
|
287 |
+
9o.
|
288 |
+
Coating
|
289 |
+
28
|
290 |
+
84
|
291 |
+
93.70
|
292 |
+
98.02
|
293 |
+
85
|
294 |
+
7397.
|
295 |
+
93.99
|
296 |
+
82
|
297 |
+
97.70
|
298 |
+
5
|
299 |
+
5
|
300 |
+
5
|
301 |
+
10
|
302 |
+
15
|
303 |
+
5
|
304 |
+
10
|
305 |
+
15
|
306 |
+
NPVolumeConcentration(%)
|
307 |
+
NPVolumeConcentration(%)8
|
308 |
+
|
309 |
+
absorption bands peaked at 0.95 eV and 1.95 eV are mainly contributed by Cu2+ and Mn3+ d-d
|
310 |
+
transitions on tetrahedral and octahedral sites, respectively. (c) and (d) show theoretical modeling
|
311 |
+
of solar absorptance and thermal efficiency contour maps as a function of NP volume fraction and
|
312 |
+
coating thickness when dispersed in silicone matrix.
|
313 |
+
Optical Properties. Critical to the optical performance is the absorption spectrum of Cu-Mn-Cr
|
314 |
+
oxide NPs, as shown in the Tauc plot in Figure 2a. It reveals an indirect gap of 1.68 0.04 eV.
|
315 |
+
Remarkably, the absorption beyond the indirect gap is extended all the way to 0.5 eV with
|
316 |
+
absorption coefficients >104 cm-1 to cover the entire solar spectrum. To single out the absorption
|
317 |
+
spectrum beyond the indirect bandgap, we subtract the indirect bandgap absorption (as derived
|
318 |
+
from the Tauc plot) from Figure 2a and show the result in Figure 2b. Two broad Gaussian
|
319 |
+
absorption bands peaked at 0.95 and 1.95 eV are clearly identified, typical of d-d transitions
|
320 |
+
between the split d levels of transition metal ions induced by tetrahedral or octahedral ligand
|
321 |
+
(crystal) field. 21 The energy ratio of these two peaks is 0.48, very close to the expected ratio of
|
322 |
+
4/9 for tetrahedral site vs. octahedral site d-d transition energies in spinel structures. 25 Therefore,
|
323 |
+
the 0.95 eV and 1.95 eV absorption bands are attributed to tetrahedral and octahedral site d-d
|
324 |
+
transitions, respectively. Note that in most of these d-d transitions, the excited electrons still remain
|
325 |
+
localized to the transition metal ion instead of becoming free electrons in the conduction band,
|
326 |
+
therefore the transition energy is lower than the bandgap. The 0.95 eV peak is between the
|
327 |
+
tetrahedral site Cu2+ absorption band peaked at ~0.8 eV 25–27 and that of Mn3+ peaked at ~1.2 eV,
|
328 |
+
21,22 suggesting both types of ions on tetrahedral sites have contributed to this NIR d-d absorption
|
329 |
+
band. Typically, the oscillation strength of tetrahedral d-d transition is stronger than their
|
330 |
+
octahedral counterparts due to broken inversion symmetry that enables various spin-forbidden
|
331 |
+
transitions.21,25 In our case, on the other hand, the octahedral d-d absorption at 1.95 eV is ~2x
|
332 |
+
|
333 |
+
9
|
334 |
+
|
335 |
+
stronger than tetrahedral absorption at 0.95 eV. This result indicates that a relatively small fraction
|
336 |
+
of Cu2+ and Mn3+ cations occupy tetrahedral sites compared to octahedral sites, consistent with the
|
337 |
+
prediction of OSPE discussed earlier and similar to the case of CuMn2O4 in terms of a small
|
338 |
+
fraction of site inversion.20 Such a distribution is beneficial to solar selectivity, where a decrease
|
339 |
+
in absorption beyond the optimal cut-off wavelength of 2475 nm (hv<0.5 eV) is needed, as
|
340 |
+
mentioned earlier. Since Cr3+ and Mn4+ have the strongest tendency to compete for octahedral sites
|
341 |
+
based on OSPE, tuning their percentages may further optimize Cu2+ and Mn3+ site inversion for
|
342 |
+
better solar selectivity. In addition, oxygen vacancies, as identified in our previous analyses,
|
343 |
+
further lower the ligand symmetry to enhance the oscillation strength of d-d optical absorption
|
344 |
+
especially in the NIR solar spectral regime at 0.5-1 eV, as has been reported in spinel ZnFe2O4
|
345 |
+
system.28 Therefore, these two factors work synergistically to enhance the overall solar selectivity.
|
346 |
+
Optical Modeling of Spinel Cu-Mn-Cr Oxide NP-Pigmented Solar Selective Coatings. Based
|
347 |
+
on the absorption spectra of the spinel Cu-Mn-Cr oxide NPs, we further modelled the spectrally
|
348 |
+
integrated solar absorptance αSolar and the thermal efficiency ηtherm for 1000x solar concentration
|
349 |
+
at 750ºC using Lorentz-Mie scattering theory and four-flux radiative model, as detailed in Refs.
|
350 |
+
14 and 15. Figure 2c and d show αSolar and ηtherm contour maps, respectively, as a function of NP
|
351 |
+
volume fraction and coating thickness when dispersed in silicone matrix for the solar absorber
|
352 |
+
coating. The intrinsic solar spectral selectivity of the NPs and their nanoscale diameters (d=313.6
|
353 |
+
nm) lead to a large tolerance in coating thickness and NP volume fraction, such that αSolar>97.4%
|
354 |
+
and ηtherm>93.6% can be achieved even if the NP volume fraction varies between 7-13 vol.% and
|
355 |
+
the coating thickness varies between 6-15 μm. Such a high fabrication tolerance greatly facilitates
|
356 |
+
low-cost and highly scalable spray-coated solar selective absorbers. The green stars and red error
|
357 |
+
bars in Figures 2c and d reflect the experimentally measured coating thickness and NP volume
|
358 |
+
|
359 |
+
10
|
360 |
+
|
361 |
+
fraction variations in our spray-coated Inconel tube section samples. From the modeling, we expect
|
362 |
+
αSolar98% and ηtherm94%.As will be detailed next, these theoretically modelled values indeed
|
363 |
+
agree very well with the experimental results.
|
364 |
+
Characterization and Optical Performance of the Spray-Coated Solar Selective Coating.
|
365 |
+
Figure 3a shows a photograph of an Inconel 625 tube section (outer diameter=76 mm) coated with
|
366 |
+
the spinel Cu-Mn-Cr oxide NP-pigmented silicone solar selective absorber and annealed in air at
|
367 |
+
750ºC for 24h. Detailed coating procedure is discussed in Section 1 of the Supporting Information.
|
368 |
+
Figure 3b shows a digital optical microscopy image of the surface profile, indicating a surface
|
369 |
+
undulation of ~6 μm with sporadic humps reaching >10 μm in height. A focus ion beam (FIB)
|
370 |
+
cross-sectional cutting is made on a relatively flat and thin region, revealing an average thickness
|
371 |
+
of 5.5 μm as shown in Figure 3c. Using this flat region as a calibration and the surface profile in
|
372 |
+
Figure 3b, we determined that overall, the coating thickness is 8.5 3 μm. The volume fraction of
|
373 |
+
the spinel Cu-Mn-Cr oxide NPs is estimated to be 10 3 vol.%, as detailed in Section 5 of the
|
374 |
+
Supporting Information. These parameters allow us to model the expected performance of the
|
375 |
+
coating, as shown in Figures 2c and 2d. The XRD data in Figure 3d shows that the spinel structure
|
376 |
+
is well maintained and the crystallinity gets better (narrower diffraction peaks) after 750ºC
|
377 |
+
annealing for 24h in air.
|
378 |
+
Remarkably, Figure 3e and f demonstrate that the new spinel Cu-Mn-Cr oxide NP-pigmented
|
379 |
+
solar selective coating improves the solar absorptance αSolar from 96.0% to 98.2% compared to
|
380 |
+
benchmark Pyromark 2500, while simultaneously the thermal emittance εtherm is drastically
|
381 |
+
reduced from 89.5% to 59.4%. Correspondingly, ηtherm is notably increased from 90.40.3% to
|
382 |
+
94.50.2%. As will be further discussed in Table 2, to the best of our knowledge, so far this is the
|
383 |
+
|
384 |
+
11
|
385 |
+
|
386 |
+
highest optical-to-thermal conversion efficiency for air-stable solar selective coatings operating at
|
387 |
+
750ºC.
|
388 |
+
|
389 |
+
Figure 3. (a) A photograph of an Inconel 625 tube section (outer diameter=76 mm) coated with
|
390 |
+
spinel Cu-Mn-Cr oxide NP-pigmented silicone solar selective absorber layer. (b) An optical
|
391 |
+
topography map of the solar selective coating, including a 3D view and a top view in the inset. (c)
|
392 |
+
FIB cross-section of the coating in a relatively flat and thin region in (b) for thickness calibration.
|
393 |
+
(d) XRD pattern of the coated sample after annealing for 24 h at 750ºC in air compared to that of
|
394 |
+
the as-synthesized particles. (e) and (f) show solar absorptance and thermal emittance spectra of
|
395 |
+
the Cu-Mn-Cr oxide NP-pigmented silicone solar selective coating compared to benchmark
|
396 |
+
Pyromark 2500.
|
397 |
+
|
398 |
+
Endurance Testing. We further performed extensive thermal cycling for endurance testing of
|
399 |
+
these high efficiency solar selective coatings. Each simulated day/night thermal cycle includes 12h
|
400 |
+
annealing at 750ºC or 800ºC and 12h cooling to 25ºC. Here thermal cycles at 800ºC (i.e., 50ºC
|
401 |
+
|
402 |
+
(a)
|
403 |
+
(b)
|
404 |
+
(c)
|
405 |
+
11
|
406 |
+
Pt
|
407 |
+
6
|
408 |
+
Solar coating
|
409 |
+
4
|
410 |
+
200μm
|
411 |
+
Cr,
|
412 |
+
InconelSubstrate
|
413 |
+
10cm
|
414 |
+
300
|
415 |
+
400
|
416 |
+
500
|
417 |
+
400
|
418 |
+
300200100
|
419 |
+
200
|
420 |
+
10μm
|
421 |
+
100
|
422 |
+
(d)
|
423 |
+
(e)
|
424 |
+
(f) 100
|
425 |
+
750°C24h
|
426 |
+
Spinel
|
427 |
+
100
|
428 |
+
as-synthesized
|
429 |
+
Mn203
|
430 |
+
(%)
|
431 |
+
(311)
|
432 |
+
Inconel625
|
433 |
+
80
|
434 |
+
Pyromark2500
|
435 |
+
80
|
436 |
+
Thermal
|
437 |
+
larAbsorptance
|
438 |
+
Cu-Mn-Cr oxide
|
439 |
+
Emittance
|
440 |
+
EmittanceLoss
|
441 |
+
Intensity
|
442 |
+
(220)
|
443 |
+
60
|
444 |
+
100
|
445 |
+
60
|
446 |
+
+(111)
|
447 |
+
(222)
|
448 |
+
(440)
|
449 |
+
(422)
|
450 |
+
98
|
451 |
+
小
|
452 |
+
15
|
453 |
+
SolarAbsorptance
|
454 |
+
40
|
455 |
+
96
|
456 |
+
40
|
457 |
+
Thermal
|
458 |
+
(400)
|
459 |
+
20
|
460 |
+
92
|
461 |
+
20
|
462 |
+
Pyromark2500
|
463 |
+
Sol
|
464 |
+
Cu-Mn-Croxide
|
465 |
+
901
|
466 |
+
500
|
467 |
+
1000
|
468 |
+
1500
|
469 |
+
2000
|
470 |
+
2500
|
471 |
+
20
|
472 |
+
30
|
473 |
+
40
|
474 |
+
50
|
475 |
+
0
|
476 |
+
+0
|
477 |
+
60
|
478 |
+
500
|
479 |
+
1000
|
480 |
+
1500
|
481 |
+
2000
|
482 |
+
2500
|
483 |
+
3000
|
484 |
+
6000
|
485 |
+
9000
|
486 |
+
12000
|
487 |
+
2 theta (degree)
|
488 |
+
Wavelength(nm)
|
489 |
+
Wavelength(nm)12
|
490 |
+
|
491 |
+
higher than the working temperature) are conducted to further confirm thermal stability and to
|
492 |
+
investigate possible degradation mechanisms at an accelerated rate. Solar coatings on Inconel 625
|
493 |
+
tube sections (with outer diameter=76 mm as shown in Figure 3) are annealed for up to 60
|
494 |
+
simulated day/night cycles in air. Comparing the surface morphology from scanning electron
|
495 |
+
microscopy (SEM) images shown in Figures 4a-c, we find no deterioration in coating integrity or
|
496 |
+
appreciable changes in morphology after 60 cycles between 750ºC/800ºC and 25ºC. The
|
497 |
+
micropores on the surface of the samples help to accommodate volume changes upon thermal
|
498 |
+
cycling, thereby stabilizing the coating against thermal stress. Such surface texture also helps to
|
499 |
+
reduce surface reflectance and enhance solar absorption, similar to the case of PV cells. XRD
|
500 |
+
analyses further show that the spinel Cu-Mn-Cr oxide NPs are thermodynamically stable upon
|
501 |
+
thermal cycling (see Section 6 of the Supporting Information). Figures 4d-f show the evolution of
|
502 |
+
solar absorptance spectra, thermal emittance spectra, and spectrally integrated solar
|
503 |
+
absorptance/thermal emittance/thermal efficiency vs. the number of thermal cycles between 750ºC
|
504 |
+
and 25ºC. The solar absorptance decreases only very slightly after 60 thermal cycles between
|
505 |
+
750ºC and 25ºC, while the thermal emittance fluctuates around 60% during the cycling,
|
506 |
+
maintaining a record-high thermal efficiency ηtherm>94% during the entire thermal cycles. Similar
|
507 |
+
data shown in Figures 4g-i indicate a more noticeable decrease in solar absorptance when the high
|
508 |
+
temperature cycles are increased to 800ºC. Even so, a high ηtherm=92.80.3% is still maintained
|
509 |
+
after 60 thermal cycles between 800ºC and 25ºC. The increasingly wavy solar absorption spectra
|
510 |
+
upon 800ºC/25ºC thermal cycling with reduced solar absorptance closely resemble the behavior
|
511 |
+
of CuCr2O4 NP-pigmented coatings (intentionally synthesized for comparison; see Section 7 of
|
512 |
+
Supporting Information) as well as previous literature on CuCr2O4 due to Cr3+ d-d absorption bands.
|
513 |
+
29 In fact, these peaks and valleys blueshift towards those of CuCr2O4 after more cycles. This result
|
514 |
+
|
515 |
+
13
|
516 |
+
|
517 |
+
suggests Cr diffusion and substitution into the Cu-Mn-Cr spinel oxide NPs from the Inconel
|
518 |
+
substrate as the key mechanism for the slight solar absorptance degradation upon 800ºC/25ºC
|
519 |
+
thermal cycling. This is indeed confirmed by detailed cross-sectional EDS mapping before and
|
520 |
+
after the thermal cycling, as detailed in Section 7 of the Supporting Information. Therefore,
|
521 |
+
limiting Cr diffusion into the coating could further improve the endurance of the solar selective
|
522 |
+
coating. A possible approach is to pre-oxidize the Inconel substrate to form a Cr2O3 layer first
|
523 |
+
before spray-coating, which has proved to be an effective approach to address the Cr diffusion
|
524 |
+
issue in our previous work. 15
|
525 |
+
|
526 |
+
Figure 4. SEM surface morphology of the coatings on Inconel 625 tube sections (76 mm outer
|
527 |
+
diameter) after (a) 750ºC 24h annealing; (b) 750ºC 24h annealing plus 60 simulated day-night
|
528 |
+
|
529 |
+
750°c.24h
|
530 |
+
500um
|
531 |
+
After60 cyclesbetween
|
532 |
+
500μm
|
533 |
+
After60cycles between
|
534 |
+
500um
|
535 |
+
750°C(12h)/25°C(12h)
|
536 |
+
800°c(12h)/25°c(12h)
|
537 |
+
Opticalperformanceafter750°C/25°cThermal Cycling
|
538 |
+
(d)
|
539 |
+
[e)100
|
540 |
+
100
|
541 |
+
24h
|
542 |
+
Absorptance (%)
|
543 |
+
80
|
544 |
+
Cycle10
|
545 |
+
80
|
546 |
+
90.
|
547 |
+
cycle 30
|
548 |
+
(%)
|
549 |
+
SolarAbsorptance
|
550 |
+
cycle60
|
551 |
+
Thermal Emittance
|
552 |
+
60
|
553 |
+
66
|
554 |
+
Emittance
|
555 |
+
60
|
556 |
+
80.
|
557 |
+
Thermal Efficiency
|
558 |
+
86
|
559 |
+
40
|
560 |
+
40
|
561 |
+
70.
|
562 |
+
97
|
563 |
+
24h
|
564 |
+
20
|
565 |
+
96
|
566 |
+
20
|
567 |
+
cycle10
|
568 |
+
60
|
569 |
+
cycle30
|
570 |
+
95
|
571 |
+
500
|
572 |
+
1000
|
573 |
+
1500
|
574 |
+
2000
|
575 |
+
cycle60
|
576 |
+
2500
|
577 |
+
0.
|
578 |
+
0.
|
579 |
+
50
|
580 |
+
500
|
581 |
+
1000
|
582 |
+
1500
|
583 |
+
2000
|
584 |
+
2500
|
585 |
+
3000
|
586 |
+
6000
|
587 |
+
9000
|
588 |
+
12000
|
589 |
+
10
|
590 |
+
20
|
591 |
+
30
|
592 |
+
40
|
593 |
+
50
|
594 |
+
60
|
595 |
+
Wavelength (nm)
|
596 |
+
Wavelength (nm)
|
597 |
+
#of Simulated Day-Night Cycles
|
598 |
+
Optical performance after 800°C/25°C Thermal Cycling
|
599 |
+
(g) 100
|
600 |
+
(h) 100
|
601 |
+
(0) 100
|
602 |
+
%
|
603 |
+
24h
|
604 |
+
Absorptance (%)
|
605 |
+
80
|
606 |
+
cycle 10
|
607 |
+
80
|
608 |
+
90-
|
609 |
+
cycle30
|
610 |
+
(%)
|
611 |
+
Solar Absorptance
|
612 |
+
cycle 60
|
613 |
+
Thermal Emittance
|
614 |
+
60
|
615 |
+
Emittance
|
616 |
+
100
|
617 |
+
60
|
618 |
+
80.
|
619 |
+
Thermal Efficiency
|
620 |
+
98
|
621 |
+
40
|
622 |
+
40
|
623 |
+
70
|
624 |
+
96
|
625 |
+
24h
|
626 |
+
20
|
627 |
+
94
|
628 |
+
20
|
629 |
+
cycle10
|
630 |
+
60-
|
631 |
+
cycle 30
|
632 |
+
92
|
633 |
+
500
|
634 |
+
1000
|
635 |
+
1500
|
636 |
+
2000
|
637 |
+
2500
|
638 |
+
cycle60
|
639 |
+
0-
|
640 |
+
50.
|
641 |
+
500
|
642 |
+
1000
|
643 |
+
1500
|
644 |
+
2000
|
645 |
+
2500
|
646 |
+
3000
|
647 |
+
6000
|
648 |
+
9000
|
649 |
+
12000
|
650 |
+
0
|
651 |
+
10
|
652 |
+
20
|
653 |
+
30
|
654 |
+
40
|
655 |
+
50
|
656 |
+
60
|
657 |
+
Wavelength(nm)
|
658 |
+
Wavelength (nm)
|
659 |
+
#of Simulated Day-Night Cycles14
|
660 |
+
|
661 |
+
cycles between 750 ºC and 25 ºC; (c) 750ºC 24h annealing plus 60 simulated day-night cycles
|
662 |
+
between 800 ºC and 25 ºC. (d)-(f) show the evolution of solar absorptance spectra, thermal
|
663 |
+
emittance spectra, and spectrally integrated solar absorptance/thermal emittance/thermal
|
664 |
+
efficiency vs. the number of thermal cycles between 750ºC and 25ºC. (g)-(i) show similar data for
|
665 |
+
thermal cycles between 800ºC and 25ºC
|
666 |
+
Table 2 compares the efficiency and endurance of our coating with some recent work. Most of the
|
667 |
+
previous solar coatings lack spectral selectivity with a thermal emittance ~90%, limiting their
|
668 |
+
thermal efficiency to ηtherm~90.5%. We have notably improved ηtherm to >94% by engineering and
|
669 |
+
balancing the intrinsic NIR vs. visible d-d absorption bands of Cu2+ and Mn3+ on tetrahedral vs.
|
670 |
+
octahedral sites of spinel structure. The thermal emittance is drastically reduced to ~60% while a
|
671 |
+
high solar absorptance of ~98% is maintained. To the best of our knowledge, this is the highest
|
672 |
+
efficiency demonstrated and maintained so far for 750ºC endurance testing in air. Optimizing the
|
673 |
+
extent of lattice site inversion of Cu2+ and Mn3+ on tetrahedral vs. octahedral sites by fine-tuning
|
674 |
+
Cr3+ and Mn4+ percentages may further improve the spectral selectivity towards ηtherm>95%. The
|
675 |
+
intrinsic solar spectral selectivity of the spinel Cu-Mn-Cr oxide NPs also enables an excellent
|
676 |
+
fabrication margin for cost-effective, highly scalable spray coating, as preliminary demonstrated
|
677 |
+
on a 48-inch-long tube shown in Figure S8 of the Supporting Information.
|
678 |
+
Table 2 High-temperature solar selective coatings with reported endurance test
|
679 |
+
Material System
|
680 |
+
Substrate
|
681 |
+
Fabrication Method
|
682 |
+
ηstart
|
683 |
+
ηend
|
684 |
+
T (℃)
|
685 |
+
Endurance in
|
686 |
+
Air (h/℃)
|
687 |
+
Refs.
|
688 |
+
Cu0.15Co2.84O4-SPB-SiO2
|
689 |
+
Inconel 625
|
690 |
+
Spray Coating
|
691 |
+
0.904
|
692 |
+
0.903
|
693 |
+
750
|
694 |
+
1000/750
|
695 |
+
Ref.30
|
696 |
+
Cu1.5Mn1.5O4-SPB-SiO2
|
697 |
+
Inconel 625
|
698 |
+
Spray Coating
|
699 |
+
0.909
|
700 |
+
0.905
|
701 |
+
750
|
702 |
+
1000/750
|
703 |
+
Ref.30
|
704 |
+
Porous Cu0.5Cr1.1Mn1.4O4-SiO2
|
705 |
+
Haynes 230
|
706 |
+
Spray Coating
|
707 |
+
0.903
|
708 |
+
0.902
|
709 |
+
800
|
710 |
+
2000/800
|
711 |
+
Ref.11
|
712 |
+
|
713 |
+
15
|
714 |
+
|
715 |
+
Cu0.86Cr0.14Mn1.5Fe0.5O4-SiO2
|
716 |
+
Inconel 617
|
717 |
+
Spray Coating
|
718 |
+
≤ 0.917
|
719 |
+
≤ 0.894
|
720 |
+
750
|
721 |
+
1300/800
|
722 |
+
Ref.31
|
723 |
+
TiN/AlCrSiO(two nano-multilayers)
|
724 |
+
/AlCrSiO(amorphous)
|
725 |
+
SS
|
726 |
+
Cathode Arc Ion
|
727 |
+
Plating
|
728 |
+
≤ 0.908
|
729 |
+
≤ 0.867
|
730 |
+
750
|
731 |
+
200/700
|
732 |
+
Ref.32
|
733 |
+
Spinel Cu-Mn-Cr oxide NP-silicone
|
734 |
+
Inconel 625
|
735 |
+
Spray Coating
|
736 |
+
0.945
|
737 |
+
0.942
|
738 |
+
750
|
739 |
+
60 thermal
|
740 |
+
cycles
|
741 |
+
750ºC/25 ºC
|
742 |
+
This
|
743 |
+
work-
|
744 |
+
0.937
|
745 |
+
0.928
|
746 |
+
800
|
747 |
+
60 thermal
|
748 |
+
cycles
|
749 |
+
800ºC/25 ºC
|
750 |
+
This
|
751 |
+
work-
|
752 |
+
|
753 |
+
ηstart: efficiency as deposited; ηend: efficiency after annealing;
|
754 |
+
T: temperature at which thermal efficiency is evaluated.
|
755 |
+
Note that Refs. 31 and 32 only reported thermal emittance at 80ºC instead of high
|
756 |
+
temperatures >700ºC. We therefore estimated the upper limit of the thermal efficiency at high
|
757 |
+
temperatures in these cases using 80ºC thermal emittance values, considering thermal emittance
|
758 |
+
typically increases at higher temperatures.
|
759 |
+
3. Conclusions
|
760 |
+
In conclusion, we demonstrate spray-coated spinel Cu-Mn-Cr oxide NP-pigmented solar
|
761 |
+
selective coating that maintains ηtherm >94% upon 60 simulated day-night cycles between 750ºC
|
762 |
+
and 25ºC in air. The spectral selectivity is intrinsic to the band-to-band and d-d transitions of
|
763 |
+
these non-stoichiometric spinel NPs, where Cu2+ and Mn3+ on tetrahedral sites (through spinel
|
764 |
+
site inversion) contribute to the NIR absorption band to cover the entire solar spectrum up to
|
765 |
+
2500 nm wavelength. This feature offers a large fabrication tolerance in NP volume fraction and
|
766 |
+
coating thickness, greatly facilitating high-efficiency, high-temperature solar selective absorbers
|
767 |
+
layers via low-cost and highly scalable spray coating for Generation 3 high-temperature CSP
|
768 |
+
systems.
|
769 |
+
|
770 |
+
16
|
771 |
+
|
772 |
+
ASSOCIATED CONTENT
|
773 |
+
Supporting Information includes experimental methods, nanoparticle size (diameter) histogram,
|
774 |
+
XPS data analyses, FTIR data analyses, volume fraction determination, XRD analyses during
|
775 |
+
thermal endurance tests, optical spectra and EDS mapping for interdiffusion investigation, and
|
776 |
+
solar selective coating on a 48-inch-long tube.
|
777 |
+
AUTHOR INFORMATION
|
778 |
+
Corresponding Author
|
779 |
+
Jifeng Liu − Thayer School of Engineering, Dartmouth College, 14 Engineering Drive, Hanover,
|
780 |
+
New Hampshire 03755, United States; Email: [email protected]
|
781 |
+
ORCID: 0000-0003-4379-2928
|
782 |
+
Authors
|
783 |
+
Can Xu − Thayer School of Engineering, Dartmouth College, 14 Engineering Drive, Hanover,
|
784 |
+
New Hampshire 03755, United States; https://orcid.org/0000-0001-5306-5367;
|
785 |
+
Xiaoxin Wang − Thayer School of Engineering, Dartmouth College, 14 Engineering Drive,
|
786 |
+
Hanover, New Hampshire 03755, United States;
|
787 |
+
Notes
|
788 |
+
The authors declare no competing financial interest.
|
789 |
+
|
790 |
+
ACKNOWLEDGMENTS
|
791 |
+
This project is funded by U.S. Department of Energy, Solar Energy Technologies Office, under
|
792 |
+
the award number DE-EE-0008530. We would like to thank Dr. Maxime J. Guinel at Dartmouth
|
793 |
+
|
794 |
+
17
|
795 |
+
|
796 |
+
College and Dr. Jules Gardener at Harvard University for their support with electron microscopy
|
797 |
+
analyses, and Dr. Min Li at Yale University for support with XPS.
|
798 |
+
REFERENCES
|
799 |
+
(1)
|
800 |
+
EIA. What is U.S. electricity generation by energy source?
|
801 |
+
https://www.eia.gov/tools/faqs/faq.php?id=427&t=3 (accessed 2022 -04 -13).
|
802 |
+
(2)
|
803 |
+
Jacobson, M. Z.; Delucchi, M. A. Providing All Global Energy with Wind, Water, and
|
804 |
+
Solar Power, Part I: Technologies, Energy Resources, Quantities and Areas of
|
805 |
+
Infrastructure, and Materials. Energy Policy 2011, 39 (3), 1154–1169.
|
806 |
+
https://doi.org/10.1016/j.enpol.2010.11.040.
|
807 |
+
(3)
|
808 |
+
Murphy, C.; Sun, Y.; Cole, W.; Maclaurin, G.; Turchi, C.; Mehos, M.; Murphy, C.; Sun,
|
809 |
+
Y.; Cole, W.; Maclaurin, G.; Turchi, C.; Mehos, M. The Potential Role of Concentrating
|
810 |
+
Solar Power within the Context of DOE’s 2030 Solar Cost Targets; Golden, Colorado,
|
811 |
+
2019.
|
812 |
+
(4)
|
813 |
+
Boubault, A.; Ho, C. K.; Hall, A.; Lambert, T. N.; Ambrosini, A. Levelized Cost of
|
814 |
+
Energy (LCOE) Metric to Characterize Solar Absorber Coatings for the CSP Industry.
|
815 |
+
Renew. Energy 2016, 85, 472–483. https://doi.org/10.1016/j.renene.2015.06.059.
|
816 |
+
(5)
|
817 |
+
Mehos, M.; Turchi, C.; Vidal, J.; Wagner, M.; Ma, Z.; Ho, C.; Kolb, W.; Andraka, C.;
|
818 |
+
Kruizenga, A. Concentrating Solar Power Gen3 Demonstration Roadmap; Golden,
|
819 |
+
Colorado, 2017. https://doi.org/10.2172/1338899.
|
820 |
+
|
821 |
+
18
|
822 |
+
|
823 |
+
(6)
|
824 |
+
Suman, S.; Khan, M. K.; Pathak, M. Performance Enhancement of Solar Collectors - A
|
825 |
+
Review. Renew. Sustain. Energy Rev. 2015, 49, 192–210.
|
826 |
+
https://doi.org/10.1016/j.rser.2015.04.087.
|
827 |
+
(7)
|
828 |
+
Ho, C. K.; Ambrosini, A.; Bencomo, M.; Hall, A. C.; Lambert, T. N.; Mahoney, A. R.
|
829 |
+
Characterization of Pyromark 2500 for High-Temperature Solar Receivers. In the ASME
|
830 |
+
2012 6th International Conference on Energy Sustainability; San Diego, CA, 2012.
|
831 |
+
(8)
|
832 |
+
Ambrosini, A. High‐Temperature Solar Selective Coating Development for Power Tower
|
833 |
+
Receivers https://www.energy.gov/sites/prod/files/2016/08/f33/R 5 - Ambrosini_CSP-
|
834 |
+
Program-Summit-SSC Presentation_to DOE.pdf.
|
835 |
+
(9)
|
836 |
+
Ambrosini, A.; Lambert, T. N.; Boubault, A.; Hunt, A.; Davis, D. J.; Adams, D.; Hall, A.
|
837 |
+
C. Thermal Stability of Oxide-Based Solar Selective Coatings for CSP Central Receivers.
|
838 |
+
In Proceedings of the ASME 2015 9th International Conference on Energy Sustainability;
|
839 |
+
San Diego, California, 2015; pp 1–10. https://doi.org/10.1115/ES2015-49706.
|
840 |
+
(10) Moon, J.; Kyoung Kim, T.; VanSaders, B.; Choi, C.; Liu, Z.; Jin, S.; Chen, R. Black
|
841 |
+
Oxide Nanoparticles as Durable Solar Absorbing Material for High-Temperature
|
842 |
+
Concentrating Solar Power System. Sol. Energy Mater. Sol. Cells 2015, 134, 417–424.
|
843 |
+
https://doi.org/10.1016/j.solmat.2014.12.004.
|
844 |
+
(11) Rubin, E. B.; Chen, Y.; Chen, R. Optical Properties and Thermal Stability of Cu Spinel
|
845 |
+
Oxide Nanoparticle Solar Absorber Coatings. Sol. Energy Mater. Sol. Cells 2019, 195
|
846 |
+
(January), 81–88. https://doi.org/10.1016/j.solmat.2019.02.032.
|
847 |
+
|
848 |
+
19
|
849 |
+
|
850 |
+
(12) Cao, F.; McEnaney, K.; Chen, G.; Ren, Z. A Review of Cermet-Based Spectrally
|
851 |
+
Selective Solar Absorbers. Energy Environ. Sci. 2014, 7 (5), 1615–1627.
|
852 |
+
https://doi.org/10.1039/c3ee43825b.
|
853 |
+
(13) Ambrosini, A. High-Temperature Solar Selective Coating Development for Power Tower
|
854 |
+
Receivers
|
855 |
+
http://energy.gov/sites/prod/files/2014/01/f7/csp_review_meeting_042413_ambrosini.pdf.
|
856 |
+
(14) Wang, X.; Yu, X.; Fu, S.; Lee, E.; Kekalo, K.; Liu, J. Design and Optimization of
|
857 |
+
Nanoparticle-Pigmented Solar Selective Absorber Coatings for High-Temperature
|
858 |
+
Concentrating Solar Thermal Systems. J. Appl. Phys. 2018, 123 (3).
|
859 |
+
https://doi.org/10.1063/1.5009252.
|
860 |
+
(15) Wang, X.; Lee, E.; Xu, C.; Liu, J. High-Efficiency, Air-Stable Manganese–Iron Oxide
|
861 |
+
Nanoparticle-Pigmented Solar Selective Absorber Coatings toward Concentrating Solar
|
862 |
+
Power Systems Operating at 750 °C. Mater. Today Energy 2021, 19.
|
863 |
+
https://doi.org/10.1016/j.mtener.2020.100609.
|
864 |
+
(16) Brik, M. G.; Suchocki, A.; Kamińska, A. Lattice Parameters and Stability of the Spinel
|
865 |
+
Compounds in Relation to the Ionic Radii and Electronegativities of Constituting
|
866 |
+
Chemical Elements. Inorg. Chem. 2014, 53 (10), 5088–5099.
|
867 |
+
https://doi.org/10.1021/ic500200a.
|
868 |
+
(17) Vandenberghe, R. E.; Robbrecht, G. G.; Brabers, V. A. M. On the Stability of the Cubic
|
869 |
+
Spinel Structure in the System Cu-Mn-O. Mater. Res. Bull. 1973, 8 (5), 571–579.
|
870 |
+
https://doi.org/10.1016/0025-5408(73)90134-7.
|
871 |
+
|
872 |
+
20
|
873 |
+
|
874 |
+
(18) Liu, Y.; Ying, Y.; Fei, L.; Liu, Y.; Hu, Q.; Zhang, G.; Pang, S. Y.; Lu, W.; Mak, C. L.;
|
875 |
+
Luo, X.; Zhou, L.; Wei, M.; Huang, H. Valence Engineering via Selective Atomic
|
876 |
+
Substitution on Tetrahedral Sites in Spinel Oxide for Highly Enhanced Oxygen Evolution
|
877 |
+
Catalysis. J. Am. Chem. Soc. 2020, 141 (20), 8136–8145.
|
878 |
+
https://doi.org/10.1021/jacs.8b13701.
|
879 |
+
(19) Navrotsky, A.; Kleppa, O. J. The Thermodynamics of Cation Distributions in Simple
|
880 |
+
Spinels. J. Inorg. Nucl. Chem. 1967, 29 (11), 2701–2714. https://doi.org/10.1016/0022-
|
881 |
+
1902(67)80008-3.
|
882 |
+
(20) Shoemaker, D. P.; Li, J.; Seshadri, R. Unraveling Atomic Positions in an Oxide Spinel
|
883 |
+
with Two Jahn-Teller Ions: Local Structure Investigation of CuMn2O4. J. Am. Chem. Soc.
|
884 |
+
2009, 131 (32), 11450–11457. https://doi.org/10.1021/ja902096h.
|
885 |
+
(21) Lakshmi, S.; Endo, T.; Siva, G. Electronic (Absorption) Spectra of 3d Transition Metal
|
886 |
+
Complexes. Adv. Asp. Spectrosc. 2012, 3–48. https://doi.org/10.5772/48089.
|
887 |
+
(22) Bosi, F.; Hålenius, U.; Andreozzi, G. B.; Skogby, H.; Lucchesi, S. Structural Refinement
|
888 |
+
and Crystal Chemistry of Mn-Doped Spinel: A Case for Tetrahedrally Coordinated Mn3+
|
889 |
+
in an Oxygen-Based Structure. Am. Mineral. 2007, 92 (1), 27–33.
|
890 |
+
https://doi.org/10.2138/am.2007.2266.
|
891 |
+
(23) Huang, R.; Ikuhara, Y. H.; Mizoguchi, T.; Findlay, S. D.; Kuwabara, A.; Fisher, C. A. J.;
|
892 |
+
Moriwake, H.; Oki, H.; Hirayama, T.; Ikuhara, Y. Oxygen-Vacancy Ordering at Surfaces
|
893 |
+
of Lithium Manganese(III,IV) Oxide Spinel Nanoparticles. Angew. Chemie - Int. Ed.
|
894 |
+
2011, 50 (13), 3053–3057. https://doi.org/10.1002/anie.201004638.
|
895 |
+
|
896 |
+
21
|
897 |
+
|
898 |
+
(24) Eppstein, R.; Caspary Toroker, M. On the Interplay Between Oxygen Vacancies and
|
899 |
+
Small Polarons in Manganese Iron Spinel Oxides. ACS Mater. Au 2022.
|
900 |
+
https://doi.org/10.1021/acsmaterialsau.1c00051.
|
901 |
+
(25) Le Nestour, A.; Gaudon, M.; Villeneuve, G.; Daturi, M.; Andriessen, R.; Demourgues, A.
|
902 |
+
Defects in Divided Zinc-Copper Aluminate Spinels: Structural Features and Optical
|
903 |
+
Absorption Properties. Inorg. Chem. 2007, 46 (10), 4067–4078.
|
904 |
+
https://doi.org/10.1021/ic0624064.
|
905 |
+
(26) Buvaneswari, G.; Aswathy, V.; Rajakumari, R. Comparison of Color and Optical
|
906 |
+
Absorbance Properties of Divalent Ion Substituted Cu and Zn Aluminate Spinel Oxides
|
907 |
+
Synthesized by Combustion Method towards Pigment Application. Dye. Pigment. 2015,
|
908 |
+
123, 413–419. https://doi.org/10.1016/j.dyepig.2015.08.024.
|
909 |
+
(27) F, R. A.; B, F.; S, H.; H, U.; Aldo, B.; Orabona, E.; Bari, I.-; Università, S.; Moro, P. A.;
|
910 |
+
Roma, I.-. Cation Ordering over Short-Range and Long-Range Scales in the MgAl2O4-
|
911 |
+
CuAl2O4 Series. 2021, 97 (March), 1821–1827.
|
912 |
+
(28) Zviagin, V.; Sturm, C.; Esquinazi, P. D.; Grundmann, M.; Schmidt-Grund, R. Control of
|
913 |
+
Magnetic Properties in Spinel ZnFe2O4 Thin Films through Intrinsic Defect
|
914 |
+
Manipulation. J. Appl. Phys. 2020, 128 (16). https://doi.org/10.1063/5.0019712.
|
915 |
+
(29) Youn, Y.; Miller, J.; Nwe, K.; Hwang, K. J.; Choi, C.; Kim, Y.; Jin, S. Effects of Metal
|
916 |
+
Dopings on CuCr2O4 Pigment for Use in Concentrated Solar Power Solar Selective
|
917 |
+
Coatings. ACS Appl. Energy Mater. 2019, 2 (1), 882–888.
|
918 |
+
https://doi.org/10.1021/acsaem.8b01976.
|
919 |
+
|
920 |
+
22
|
921 |
+
|
922 |
+
(30) Karas, D. E.; Byun, J.; Moon, J.; Jose, C. Copper-Oxide Spinel Absorber Coatings for
|
923 |
+
High-Temperature Concentrated Solar Power Systems. Sol. Energy Mater. Sol. Cells
|
924 |
+
2018, 182 (March), 321–330. https://doi.org/10.1016/j.solmat.2018.03.025.
|
925 |
+
(31) Noč, L.; Ruiz-Zepeda, F.; Merzel, F.; Jerman, I. High-Temperature “Ion Baseball” for
|
926 |
+
Enhancing Concentrated Solar Power Efficiency. Sol. Energy Mater. Sol. Cells 2019, 200
|
927 |
+
(April). https://doi.org/10.1016/j.solmat.2019.109974.
|
928 |
+
(32) Yang, D.; Zhao, X.; Liu, Y.; Li, J.; Liu, H.; Hu, X.; Li, Z.; Zhang, J.; Guo, J.; Chen, Y.;
|
929 |
+
Yang, B. Enhanced Thermal Stability of Solar Selective Absorber Based on Nano-
|
930 |
+
Multilayered AlCrSiO Films. Sol. Energy Mater. Sol. Cells 2020, 207 (December 2019),
|
931 |
+
110331. https://doi.org/10.1016/j.solmat.2019.110331.
|
932 |
+
|
933 |
+
|
934 |
+
1
|
935 |
+
|
936 |
+
|
937 |
+
Supporting Information
|
938 |
+
Spinel Cu-Mn-Cr Oxide Nanoparticle-Pigmented
|
939 |
+
Solar Selective Coatings Maintaining >94%
|
940 |
+
Efficiency at 750ºC
|
941 |
+
Can Xu, Xiaoxin Wang, and Jifeng Liu*
|
942 |
+
Thayer School of Engineering, Dartmouth College, 14 Engineering Drive, Hanover, New
|
943 |
+
Hampshire 03755, USA
|
944 |
+
*Corresponding Author: [email protected]
|
945 |
+
1. Experimental Methods
|
946 |
+
Synthesis. To obtain Cu, Mn and Cr oxide nanoparticle precursors, copper nitrate
|
947 |
+
(Cu(NO3)2·3H2O, Fisher Scientific, C99.9), manganese nitrate (Mn(NO3)2·4H2O, Sigma-Aldrich,
|
948 |
+
C99.5) and chromium nitrate (Cr(NO3)3·9H2O, Sigma-Aldrich, C99.8), were dissolved in
|
949 |
+
deionized (DI) water at a molar ratio of 1:3:1 at room temperature with an initial pH value between
|
950 |
+
2 and 3. The aqueous solution was under vigorous magnetic stirring for homogeneity and an excess
|
951 |
+
amount of appropriate base solution, sodium hydroxide (NaOH(aq), 50%, Sigma-Aldrich, dilute
|
952 |
+
|
953 |
+
2
|
954 |
+
|
955 |
+
to 10M) as we selected, was steadily added dropwise for precipitation until the pH of the solution
|
956 |
+
was adjusted to around 12 for a full precipitation. The stirring was kept for 1h after the
|
957 |
+
precipitation. The precipitated material was rinsed 5 times and then dried at 120 ºC overnight.
|
958 |
+
After a rough grinding step, it was further calcined at 550°C for 5h and finally ground into fine
|
959 |
+
powders.
|
960 |
+
Solar Selective Coating Fabrication. To obtain spraying precursors, 4 wt.% synthesized
|
961 |
+
nanoparticles were well dispersed in xylene diluted silicone resin (BLUESIL RES 6406XM) with
|
962 |
+
a ratio of 1:10 for an appropriate viscosity. The precursors were put in an ultrasonic bath for 30
|
963 |
+
min and then sprayed onto Inconel 625 substrate on the hot plate with a surface temperature of
|
964 |
+
about 180 ºC. The sample was settled on the hotplate for 5 min and then cooled down to room
|
965 |
+
temperature. Subsequently, the sample was put into a muffle furnace (Thermo scientific) for the
|
966 |
+
following heat treatment. The sample was first heated under 250 ºC for 2h and then ramped up to
|
967 |
+
750 ºC at a rate of 9.1C/min. After dwelling for 24h and cooling back to room temperature, the
|
968 |
+
nanoparticle-pigmented silicone solar selective coating was formed.
|
969 |
+
Thermal test. A total of 60 simulated day-night thermal cycles (total annealing time of 720h) were
|
970 |
+
conducted for stability tests at 750 ºC and 800 ºC, respectively. Each separate cycle consisted of
|
971 |
+
10 days. In each day, the sample was heated up to the target temperature at a rate of 9.1C/min and
|
972 |
+
dwelled for 12h. Then the sample was cooled down to room temperature until the start of the next
|
973 |
+
day.
|
974 |
+
Characterization. XRD patterns were recorded on a Rigaku 007 X-ray Diffractometer (Cu Kα1
|
975 |
+
line, λ = 1.54059 Å) operating at 40 kV/300 mA and in a 2theta angular range of 10–90 degree
|
976 |
+
with a velocity of 2 degree/min and a step size of 0.02 degree. Chemical composition was
|
977 |
+
|
978 |
+
3
|
979 |
+
|
980 |
+
determined by X-ray Photoelectron Spectroscopy (XPS, PHI VersaProbe II, from West Campus
|
981 |
+
Materials Characterization Core at Yale University) and Energy dispersive spectroscopy (EDS,
|
982 |
+
EDAX Si (Li) detector with Genesis software). Scanning electron images were obtained by using
|
983 |
+
a TESCAN SEM operating at 20 kV in secondary electron (SE) mode and a FEI Helios 5CX
|
984 |
+
DualBeam SEM equipped with FIB was utilized for specimen preparation for cross section views.
|
985 |
+
Tecnai F20 (200 keV) TEM was utilized to collect transmission electron images and SAED
|
986 |
+
patterns. Elemental distribution was measured via JEOL 2010 FEG - TEM/STEM equipped with
|
987 |
+
an EDS detector (from Center for Nanoscale Systems at Harvard University). Vibrational signals
|
988 |
+
of bonding as well as reflectance in the mid infrared (MIR) region (λ=2.5 ~15 μm) were carried
|
989 |
+
out by a Jasco 4100 Fourier transformation IR (FTIR) spectrometer equipped with a Pike IR
|
990 |
+
integrating sphere in the range from 400 to 4000 cm-1. Jasco V-570 ultraviolet/visible/near infrared
|
991 |
+
(UV/Vis/NIR) spectrometer equipped with a Jasco ISN-470 integrating sphere was used to
|
992 |
+
characterize optical performance in the ultraviolet, visible and infrared regime, ranging from 200
|
993 |
+
nm to 2500 nm. The visualization of the surface roughness was obtained via Keyence VHX-700
|
994 |
+
Digital Microscope.
|
995 |
+
The solar-to-thermal energy conversion efficiency of the solar selective coatings is given by
|
996 |
+
𝜂𝑡ℎ𝑒𝑟𝑚 = 𝐹𝑂𝑀 =
|
997 |
+
∫(1−𝑅(𝜆))𝐼(𝜆)𝑑𝜆−1
|
998 |
+
𝐶[∫(1−𝑅(𝜆))𝐵(𝜆,𝑇)𝑑𝜆]
|
999 |
+
∫ 𝐼(𝜆)𝑑𝜆
|
1000 |
+
= 𝛼𝑠𝑜𝑙𝑎𝑟 −
|
1001 |
+
𝜀𝑡ℎ𝑒𝑟𝑚𝜎𝑇4
|
1002 |
+
𝐶𝐼𝑠𝑜𝑙𝑎𝑟 , (1)
|
1003 |
+
where 𝑅(𝜆) is the spectral reflectance of the solar selective coating at wavelength 𝜆 , 𝐼(𝜆)
|
1004 |
+
represents the AM 1.5 solar spectral irradiance per square meter at wavelength 𝜆, 𝐼𝑠𝑜𝑙𝑎𝑟 =
|
1005 |
+
1000 𝑊/𝑚2 is the solar power density integrated from the spectral radiance 𝐼(𝜆), 𝐵(𝜆, 𝑇) is the
|
1006 |
+
spectral blackbody thermal emission at 𝜆 and 𝑇, 𝛼solar is the overall spectrally normalized solar
|
1007 |
+
|
1008 |
+
4
|
1009 |
+
|
1010 |
+
absorbance, 𝜀𝑡ℎ𝑒𝑟𝑚 is the overall thermal emittance at T, and 𝜎 is the Stefan-Boltzmann constant
|
1011 |
+
of 5.67 × 10−8
|
1012 |
+
𝑊
|
1013 |
+
𝑚2
|
1014 |
+
𝐾4 , and C=1000 is the solar concentration ratio of power tower CSP systems.
|
1015 |
+
2. Nanoparticle Size (Diameter) Histogram
|
1016 |
+
22
|
1017 |
+
24
|
1018 |
+
26
|
1019 |
+
28
|
1020 |
+
30
|
1021 |
+
32
|
1022 |
+
34
|
1023 |
+
36
|
1024 |
+
38
|
1025 |
+
40
|
1026 |
+
0
|
1027 |
+
5
|
1028 |
+
10
|
1029 |
+
15
|
1030 |
+
20
|
1031 |
+
25
|
1032 |
+
Frequency (%)
|
1033 |
+
Size (nm)
|
1034 |
+
|
1035 |
+
Figure S1. Nanoparticle size distribution histogram. The average diameter is 313.6 nm.
|
1036 |
+
3. X-ray Photoelectron Spectroscopy (XPS) Data Analyses
|
1037 |
+
Figure S2.a shows a survey spectrum of as-synthesized Cu-Mn-Cr oxide nanoparticles. Cu,
|
1038 |
+
Mn, Cr and O are detected from the surface. Figure S2.b shows the binding energies of the Cu 2p
|
1039 |
+
core levels. Two sharp peaks at about 932 eV and 952 eV are observed, corresponding to the
|
1040 |
+
significantly split spin-orbit components Cu 2p3/2 and Cu 2p1/2 respectively. Shake-up structures
|
1041 |
+
at about 945 eV and 963 eV are satellite features of Cu with oxidation states. Such two satellite
|
1042 |
+
peaks reveal the existence of Cu(II) while the relatively low intensity indicates possible mixed
|
1043 |
+
states of Cu(I) and Cu(II).
|
1044 |
+
|
1045 |
+
|
1046 |
+
5
|
1047 |
+
|
1048 |
+
|
1049 |
+
|
1050 |
+
Figure S2. XPS spectra of Cu, Mn, and Cr ions in the synthesized spinel oxide nanoparticles.
|
1051 |
+
To further investigate the oxidation states and their compositions, principal Cu LMM Auger
|
1052 |
+
peaks (Figure S2.c) are collected as well. One deconvoluted peak with a binding energy of 916.5
|
1053 |
+
eV is assigned to Cu(I) 1 and the other one at 918.4 eV is assigned to Cu(II) 2 with an error of 1
|
1054 |
+
eV. The modified Auger parameters are calculated and compared to minimize the effect of
|
1055 |
+
charging of non-conducting specimens during the measurement. Cu in CuCr2O4 has an Auger
|
1056 |
+
parameter of nearly 1853 eV 3, close to 1852.7 eV, the value we obtained for Cu(II). Biesinger 4
|
1057 |
+
analyzed XPS data of various copper-containing species in previously published literature and
|
1058 |
+
summarized their Auger parameters. Our Cu(I) has an Auger parameter of 1848.6 eV, which lies
|
1059 |
+
in the range of several Cu(I) involved materials. In this case, Cu(I) and Cu(II) are present
|
1060 |
+
|
1061 |
+
(a)
|
1062 |
+
(b)
|
1063 |
+
(c)
|
1064 |
+
Survey
|
1065 |
+
Cu2p
|
1066 |
+
CuLMM
|
1067 |
+
Cu2p12
|
1068 |
+
Cu2p3/2
|
1069 |
+
2p
|
1070 |
+
Mn 2p
|
1071 |
+
cu
|
1072 |
+
01s
|
1073 |
+
Intensity(a.u.)
|
1074 |
+
Intensity(a.u.)
|
1075 |
+
Intensity(a.u.)
|
1076 |
+
Cr 2p
|
1077 |
+
Mn
|
1078 |
+
1000
|
1079 |
+
800
|
1080 |
+
600
|
1081 |
+
400
|
1082 |
+
200
|
1083 |
+
915916917918919920921
|
1084 |
+
B.E.(eV)
|
1085 |
+
B.E.(eV)
|
1086 |
+
K.E.(eV)
|
1087 |
+
(d)
|
1088 |
+
(e)
|
1089 |
+
(f)
|
1090 |
+
Mn2p
|
1091 |
+
Mn3s
|
1092 |
+
Cr2p
|
1093 |
+
Cr2P3/2
|
1094 |
+
Mn 2p3/2
|
1095 |
+
Intensity(a.u.)
|
1096 |
+
Mn2p1/2
|
1097 |
+
Intensity(a.u.)
|
1098 |
+
Intensity(a.u.)
|
1099 |
+
Cr 2P1/2
|
1100 |
+
657654651648645642639
|
1101 |
+
92
|
1102 |
+
90
|
1103 |
+
88
|
1104 |
+
86
|
1105 |
+
84
|
1106 |
+
82
|
1107 |
+
594591588585582579576573
|
1108 |
+
B.E.(eV)
|
1109 |
+
B.E.(eV)
|
1110 |
+
B.E.(eV)6
|
1111 |
+
|
1112 |
+
simultaneously with a ratio of about 4 : 1, taking into account both the percentage of peak areas
|
1113 |
+
and Relative Sensitivity Factors (RSF).
|
1114 |
+
Mn 2p (Figure S2.d) and Mn 3s (Figure S2.e) data are collected for quantification and
|
1115 |
+
qualification of the chemical species in the specimen. In the 2p spectrum, two peaks at about 643.0
|
1116 |
+
eV and 654.5 eV are assigned to the Mn 2p3/2 and Mn 2p1/2 components. An extremely broad and
|
1117 |
+
weak satellite peak observed at around 649.1 eV is the feature of Mn(II). Three deconvolved peaks
|
1118 |
+
represent Mn(II), Mn(III) and Mn(IV) with increasing values of binding energies. Mn 3s spectrum
|
1119 |
+
distinguishes Mn oxidation states in a more straightforward way. Based on the photoemission final
|
1120 |
+
states with the s electrons parallel or antiparallel to the 3d spin 5, the fewer and fewer 3d unpaired
|
1121 |
+
electrons in Mn(II), Mn(III) and Mn(IV) lead to the smaller and smaller magnitudes of peak
|
1122 |
+
splitting, from around 6.0 eV to 5.4 eV and to 4.7 eV for oxides 6. This assists in identifying the
|
1123 |
+
oxidation states and calculating the percentage respectively by taking the energy difference as a
|
1124 |
+
new constraint during the curve fitting. Eventually, Mn(II), Mn(III) and Mn(IV) are confirmed
|
1125 |
+
coexisting in our specimen with a percentage of 30%, 47% and 23%. Figure 2.f shows the Cr 2p
|
1126 |
+
spectrum, with Cr 2p3/2 peak at around 577.5 eV and Cr 2p1/2 peak at around 587.3 eV. Cr in
|
1127 |
+
CuCr2O4 is located at 577.3 eV 2 and that suggests the existence of Cr(III) 7,8. Three sub-peaks
|
1128 |
+
with the same full width at half maximum (FWHM) around 1.979eV are deconvoluted for Cr 2p3/2
|
1129 |
+
peak, showing the multiplet structure 9 due to the coupling effect between the unpaired core
|
1130 |
+
electron and unpaired electrons in the outer shell 10 in Cr(III).
|
1131 |
+
|
1132 |
+
|
1133 |
+
|
1134 |
+
|
1135 |
+
|
1136 |
+
7
|
1137 |
+
|
1138 |
+
4. Fourier Transform Infrared Spectroscopy (FTIR)
|
1139 |
+
750
|
1140 |
+
700
|
1141 |
+
650
|
1142 |
+
600
|
1143 |
+
550
|
1144 |
+
500
|
1145 |
+
450
|
1146 |
+
400
|
1147 |
+
74
|
1148 |
+
76
|
1149 |
+
78
|
1150 |
+
Transmittance (%)
|
1151 |
+
Wavenumber (cm
|
1152 |
+
-1)
|
1153 |
+
Mn3+/Cr3+in either
|
1154 |
+
tetrahedron or octahedron
|
1155 |
+
Mn3+/Cr3+ in
|
1156 |
+
[MO6] octahedron
|
1157 |
+
Tetrahedral+
|
1158 |
+
Octahedral
|
1159 |
+
modes
|
1160 |
+
|
1161 |
+
Figure S3. FTIR spectrum of the Cu-Mn-Cr oxide nanoparticles showing characteristic spinel
|
1162 |
+
features.
|
1163 |
+
Characteristic IR absorption peaks are observed at ~616, 505, and 420 cm-1, close to the
|
1164 |
+
previous reports on spinel CuMn2O4 11, ZnMn2O4 12, and MnCr2O4 13. According to Ref. 13, the
|
1165 |
+
peak at ~616 cm-1 corresponds to trivalent cation vibrations in the [MO6] octahedron. In our case
|
1166 |
+
this peak is asymmetric, which can be induced by the coexistence of Mn3+ and Cr3+ as well as
|
1167 |
+
valance 2+ and 4+ cations on the octahedral sites, as revealed by the XRD, EDS and XPS analyses
|
1168 |
+
in the main text. The second peak at 505 cm-1 is attributed to trivalent ions, either on tetrahedral
|
1169 |
+
or octahedral sites. The last peak at 420 cm-1 is a complex vibrational mode involving both
|
1170 |
+
tetrahedral and octahedral sites.
|
1171 |
+
|
1172 |
+
|
1173 |
+
|
1174 |
+
|
1175 |
+
8
|
1176 |
+
|
1177 |
+
5. Nanoparticle Volume Fraction Estimation
|
1178 |
+
|
1179 |
+
Figure S4. EDS mapping of Mn in a cross-sectional FIB lamellar of the coating. The lamellar is
|
1180 |
+
~150 nm thick.
|
1181 |
+
Since Mn is only present in the pigment nanoparticles and not in the silicone matrix, the
|
1182 |
+
Inconel substrate, or the TEM grid (which is used to mount the FIB sample of the coating), we can
|
1183 |
+
use Mn as a characteristic element of the NPs to derive the corresponding volume fraction by
|
1184 |
+
analyzing the EDS mapping of Mn (Figure S4). We utilized Image J to obtain the area fraction of
|
1185 |
+
Mn in the selected area. As shown in Figure S4, the yellow dots represent Mn signals and a brighter
|
1186 |
+
color reveals a higher Mn intensity in that region. The original figure was firstly converted to an
|
1187 |
+
8-bit binary image and a threshold ranging from 51 to 255 was chosen to select the Mn pixels. Mn
|
1188 |
+
is determined to take 48.0% of the entire selected area.
|
1189 |
+
Assuming spherical nanoparticle approximation and no overlapping of the nanoparticles in
|
1190 |
+
the vertical direction, the volume fraction could be expressed as the following equation:
|
1191 |
+
𝑓 =
|
1192 |
+
𝑉𝑀𝑛
|
1193 |
+
𝑉𝑡𝑜𝑡𝑎𝑙 =
|
1194 |
+
𝐴∗𝑥
|
1195 |
+
𝜋𝑟2×4
|
1196 |
+
3𝜋𝑟3
|
1197 |
+
𝐴×𝑡
|
1198 |
+
=
|
1199 |
+
4
|
1200 |
+
3 (
|
1201 |
+
𝑟
|
1202 |
+
𝑡) ∗ 𝑥 ,
|
1203 |
+
|
1204 |
+
|
1205 |
+
|
1206 |
+
(2)
|
1207 |
+
|
1208 |
+
500nm9
|
1209 |
+
|
1210 |
+
where 𝑥 is the area fraction, 𝑟=15.51.8 nm is the radius of nanoparticles (see the histogram in
|
1211 |
+
Figure S1) and 𝑡 = 150 𝑛𝑚 is the thickness of the FIB processed lamellar. With this equation, a
|
1212 |
+
volume fraction of f ~7 vol. % was derived, which could be regarded as the lower limit since
|
1213 |
+
nanoparticles do overlap in reality.
|
1214 |
+
Another estimation was conducted according to the parameters used during the fabrication
|
1215 |
+
process, including the weight percentage of nanoparticles in the precursor, the density of each
|
1216 |
+
nonvolatile component, and the average coating thickness of 8.5 μm (as discussed in the main
|
1217 |
+
text). Assuming no excessive loss of nanoparticles during the coating process and annealing
|
1218 |
+
process, we obtain an upper limit of volume fraction f ~13 vol. %. Taking the average between the
|
1219 |
+
lower limit estimated by EDS Mn area mapping and the upper limit from chemical precursor ratios,
|
1220 |
+
it is reasonable to consider the volume fraction f=10±3 vol. % for comparison with theoretical
|
1221 |
+
modeling.
|
1222 |
+
6. XRD Analyses during Thermal Endurance Tests
|
1223 |
+
XRD measurements were taken every 10 day-night annealing cycles, and Figures S5a and 5c
|
1224 |
+
were plotted with each intermediate state during the whole thermal cycle procedure at 750 ºC and
|
1225 |
+
800 ºC separately to show the deviation for several important peaks. Generally, the cycled coating
|
1226 |
+
shows similar X-ray diffraction patterns while minor shifts occur. The peak position of the
|
1227 |
+
characteristic spinel (311) peak is closely examined as shown in Figure S5.b and 5d for 750 ºC and
|
1228 |
+
800 ºC, respectively. It originally lies at 35.78° and tends to shift as the thermal cycle starts. It
|
1229 |
+
stabilizes at 35.62° for 750 ºC and 35.56° for 800 ºC after 20 day-night simulated cycles. Based
|
1230 |
+
on Bragg’s equation, the peak shift towards a smaller diffraction angle refers to a larger interplanar
|
1231 |
+
spacing, which means the lattice expands slightly.
|
1232 |
+
|
1233 |
+
10
|
1234 |
+
|
1235 |
+
|
1236 |
+
|
1237 |
+
Figure S5. XRD patterns during thermal endurance tests at (a) 750 ºC and (b) 800 ºC, with close
|
1238 |
+
position examination of spinel (311) peak for samples through thermal cycles at (c) 750 ºC and
|
1239 |
+
(d) 800 ºC, respectively.
|
1240 |
+
From previous work published by Mikhail G. Brik 14, the lattice constants of CuMn2O4 and
|
1241 |
+
CuCr2O4 are 8.33 Å and 8.27 Å, while that of MnCr2O4 is 8.437 Å. A variation from 8.410 Å to
|
1242 |
+
8.474 Å depending on different milling hours was reported by R. N. Bhowmik15. Considering the
|
1243 |
+
valences and atom position distributions discussed in the previous section, as more Cr ions dope
|
1244 |
+
into the spinel system and take the octahedral site, Cu and Mn ions tend to sit in the tetrahedral
|
1245 |
+
site, making it closer to the structure of CuCr2O4 and MnCr2O4. Taking into account the lattice
|
1246 |
+
parameters mentioned above and ion radius data obtained from WebElements 16, it is reasonable
|
1247 |
+
|
1248 |
+
(a)
|
1249 |
+
(q)
|
1250 |
+
Spinel
|
1251 |
+
Mn,03
|
1252 |
+
小Inconel625
|
1253 |
+
533
|
1254 |
+
cycle60
|
1255 |
+
(400)
|
1256 |
+
(311)
|
1257 |
+
(111)
|
1258 |
+
077
|
1259 |
+
cycle50
|
1260 |
+
cycle40
|
1261 |
+
Intensity (a.u.)
|
1262 |
+
cycle30
|
1263 |
+
Intensity (a.u.)
|
1264 |
+
cycle 20
|
1265 |
+
cycle10
|
1266 |
+
24h
|
1267 |
+
20
|
1268 |
+
30
|
1269 |
+
40
|
1270 |
+
50
|
1271 |
+
60
|
1272 |
+
70
|
1273 |
+
80
|
1274 |
+
34.5
|
1275 |
+
35.0
|
1276 |
+
35.5
|
1277 |
+
36.0
|
1278 |
+
36.5
|
1279 |
+
2 theta (degree)
|
1280 |
+
2 theta (degree)
|
1281 |
+
(c)
|
1282 |
+
(d)
|
1283 |
+
cycle60
|
1284 |
+
cycle50
|
1285 |
+
cycle40
|
1286 |
+
cycle 30
|
1287 |
+
Intensity
|
1288 |
+
cycle20
|
1289 |
+
Intensity
|
1290 |
+
cycle 10
|
1291 |
+
24h
|
1292 |
+
20
|
1293 |
+
30
|
1294 |
+
40
|
1295 |
+
50
|
1296 |
+
60
|
1297 |
+
70
|
1298 |
+
80
|
1299 |
+
34.5
|
1300 |
+
35.0
|
1301 |
+
35.5
|
1302 |
+
36.0
|
1303 |
+
36.5
|
1304 |
+
2 theta (degree)
|
1305 |
+
2 theta (degree)11
|
1306 |
+
|
1307 |
+
to observe the lattice expansion. Mn ions are partially released to form Mn2O3, which is in
|
1308 |
+
agreement with a higher Mn2O3/spinel ratio (from 0.142:1 to 0.466:1, stabilizing after 30 day-night
|
1309 |
+
thermal cycles at 750 ºC) derived from XRD result.
|
1310 |
+
7. Optical Spectra Evolution and EDS Mapping for Interdiffusion Investigation
|
1311 |
+
upon Thermal Cycling
|
1312 |
+
500
|
1313 |
+
1000
|
1314 |
+
1500
|
1315 |
+
2000
|
1316 |
+
2500
|
1317 |
+
85
|
1318 |
+
90
|
1319 |
+
95
|
1320 |
+
100
|
1321 |
+
Absorptance (%)
|
1322 |
+
Wavelength (nm)
|
1323 |
+
24h
|
1324 |
+
cycle 10
|
1325 |
+
cycle 20
|
1326 |
+
cycle 30
|
1327 |
+
cycle 40
|
1328 |
+
cycle 50
|
1329 |
+
cycle 60
|
1330 |
+
CuCr2O4
|
1331 |
+
|
1332 |
+
Figure S6. UV-vis-NIR absorption spectra of Cu-Mn-Cr oxide nanoparticle pigmented solar
|
1333 |
+
selective coating during thermal endurance tests at 800 ºC compared with as-coated CuCr2O4
|
1334 |
+
nanoparticle pigmented coating.
|
1335 |
+
|
1336 |
+
Figure S7. Cross-section STEM image and EDS mapping result of cross-sectional FIB cut
|
1337 |
+
specimens of Cu-Mn-Cr oxide nanoparticle pigmented solar selective coating (a) before and (b)
|
1338 |
+
|
1339 |
+
Ni
|
1340 |
+
Mn
|
1341 |
+
wrl
|
1342 |
+
um
|
1343 |
+
um
|
1344 |
+
1um
|
1345 |
+
Ni
|
1346 |
+
Mn
|
1347 |
+
2μm
|
1348 |
+
2um
|
1349 |
+
2um
|
1350 |
+
2um12
|
1351 |
+
|
1352 |
+
after 60 day-night thermal cycles at 750 ºC. Part of the coating was damaged during the FIB milling
|
1353 |
+
processed.
|
1354 |
+
Detailed investigation in the interface between the nanoparticle-pigmented coating and the
|
1355 |
+
Inconel alloy substrate was conducted by observing the cross-sections of the specimen processed
|
1356 |
+
by FIB milling. According to the STEM image shown in Figure S7a, an oxide layer of around 100
|
1357 |
+
nm was formed after 24h annealing at 750 ºC. Further EDS mapping reveals that the oxide layer
|
1358 |
+
mainly consists of Cr based oxides. As an obvious comparison in Figure S7b, a much thicker oxide
|
1359 |
+
layer was observed for the sample that has completed 60 day-night simulated cycles at 750 ºC. It
|
1360 |
+
approximately increases to 1 μm thick after long-time thermal cycles. This is a common oxide
|
1361 |
+
scale when oxidizing Inconel alloys.
|
1362 |
+
EDS analyses of the coating were also conducted, and an increasing Cr concentration with
|
1363 |
+
thermal cycling was detected. Near the surface of the coatings, the Cr concentration increased by
|
1364 |
+
58% after 60 day-night cycles at 750 ºC, and 117% after 60 day-night cycles at 800 ºC. This clearly
|
1365 |
+
demonstrates that Cr atoms have diffused from the Inconel substrate through the solar coating and
|
1366 |
+
emerged at the upper layers of the coating. The observed Cr diffusion into the coating is fully
|
1367 |
+
consistent with the optical absorption spectrum evolution shown in Figure S6 and the
|
1368 |
+
corresponding discussions in the main text.
|
1369 |
+
|
1370 |
+
|
1371 |
+
|
1372 |
+
|
1373 |
+
|
1374 |
+
13
|
1375 |
+
|
1376 |
+
8. Spray-Coated Solar Selective Coating on 48-Inch-Long Tube
|
1377 |
+
|
1378 |
+
Figure S8. A photo of spinel Cu-Mn-Cr oxide nanoparticle pigmented solar selective coating on
|
1379 |
+
a 48-inch-long tube prepared by spray coating method.
|
1380 |
+
|
1381 |
+
Reference
|
1382 |
+
(1)
|
1383 |
+
Losev, A.; Rostov, K.; Tyuliev, G. Electron Beam Induced Reduction of CuO in the
|
1384 |
+
Presence of a Surface Carbonaceous Layer: An XPS/HREELS Study. Surf. Sci. 1989, 213
|
1385 |
+
(2–3), 564–579. https://doi.org/10.1016/0039-6028(89)90313-0.
|
1386 |
+
(2)
|
1387 |
+
Capece, F. M.; Castro, V. Di; Furlani, C.; Mattogno, G.; Fragale, C.; Gargano, M.; Rossi,
|
1388 |
+
M. “Copper Chromite” Catalysts: XPS Structure Elucidation and Correlation with
|
1389 |
+
Catalytic Activity. J. Electron Spectros. Relat. Phenomena 1982, 27 (2), 119–128.
|
1390 |
+
https://doi.org/10.1016/0368-2048(82)85058-5.
|
1391 |
+
(3)
|
1392 |
+
NIST X-ray Photoelectron Spectroscopy Database, NIST Standard Reference Database
|
1393 |
+
Number 20, National Institute of Standards and Technology, Gaithersburg MD, 20899
|
1394 |
+
(2000) http://dx.doi.org/10.18434/T4T88K (accessed 2021 -10 -13).
|
1395 |
+
|
1396 |
+
14
|
1397 |
+
|
1398 |
+
(4)
|
1399 |
+
Biesinger, M. C. Advanced Analysis of Copper X-Ray Photoelectron Spectra. Surf.
|
1400 |
+
Interface Anal. 2017, 49 (13), 1325–1334. https://doi.org/10.1002/sia.6239.
|
1401 |
+
(5)
|
1402 |
+
Waskowska, A.; Gerward, L.; Olsen, J. S.; Steenstrup, S.; Talik, E. CuMn2O4: Properties
|
1403 |
+
and the High-Pressure Induced Jahn-Teller Phase Transition. J. Phys. Condens. Matter
|
1404 |
+
2001, 13 (11), 2549–2562. https://doi.org/10.1088/0953-8984/13/11/311.
|
1405 |
+
(6)
|
1406 |
+
Junta, J. L.; Hochella, M. F. Manganese (II) Oxidation at Mineral Surfaces: A
|
1407 |
+
Microscopic and Spectroscopic Study. Geochim. Cosmochim. Acta 1994, 58 (22), 4985–
|
1408 |
+
4999. https://doi.org/10.1016/0016-7037(94)90226-7.
|
1409 |
+
(7)
|
1410 |
+
Biesinger, M. C.; Payne, B. P.; Grosvenor, A. P.; Lau, L. W. M.; Gerson, A. R.; Smart, R.
|
1411 |
+
S. C. Resolving Surface Chemical States in XPS Analysis of First Row Transition Metals,
|
1412 |
+
Oxides and Hydroxides: Cr, Mn, Fe, Co and Ni. Appl. Surf. Sci. 2011, 257 (7), 2717–
|
1413 |
+
2730. https://doi.org/10.1016/j.apsusc.2010.10.051.
|
1414 |
+
(8)
|
1415 |
+
Mohamed, R. M.; Kadi, M. W. Generation of Hydrogen Gas Using CuCr2O4-g-C3N4
|
1416 |
+
Nanocomposites under Illumination by Visible Light. ACS Omega 2021, 6 (6), 4485–
|
1417 |
+
4494. https://doi.org/10.1021/acsomega.0c06193.
|
1418 |
+
(9)
|
1419 |
+
Oladipo, A. A. Rapid Photocatalytic Treatment of High-Strength Olive Mill Wastewater
|
1420 |
+
by Sunlight and UV-Induced CuCr2O4@CaFe–LDO. J. Water Process Eng. 2021, 40
|
1421 |
+
(January), 2–6. https://doi.org/10.1016/j.jwpe.2021.101932.
|
1422 |
+
(10) Moulder, J. F.; Stickle, W. F.; E.’Sobol, P.; Bomben, K. D. Handbook of X-Ray
|
1423 |
+
Photoelectron Spectroscopy; Perkin-Elmer Corp, Eden Prairie, MN, 1992.
|
1424 |
+
https://doi.org/10.1002/0470014229.ch22.
|
1425 |
+
|
1426 |
+
15
|
1427 |
+
|
1428 |
+
(11) Patra, P.; Naik, I.; Kaushik, S. D.; Mohanta, S. Crossover from Meta-Magnetic State to
|
1429 |
+
Spin-Glass Behaviour upon Ti-Substitution for Mn in CuMn2O4. J. Mater. Sci. Mater.
|
1430 |
+
Electron. 2021, 33 (1), 554–564. https://doi.org/10.1063/5.0017104.
|
1431 |
+
(12) Ghannam, M. M.; Heiba, Z. K.; Sanad, M. M. S.; Mohamed, M. B. Functional Properties
|
1432 |
+
of ZnMn2O4/MWCNT/Graphene Nanocomposite as Anode Material for Li-Ion Batteries.
|
1433 |
+
Appl. Phys. A Mater. Sci. Process. 2020, 126 (5), 1–9. https://doi.org/10.1007/s00339-
|
1434 |
+
020-03513-6.
|
1435 |
+
(13) Allen, G. C.; Paul, M. Chemical Characterization of Transition Metal Spinel-Type Oxides
|
1436 |
+
by Infrared Spectroscopy. Appl. Spectrosc. 1995, 49 (4), 451–458.
|
1437 |
+
https://doi.org/10.1366/0003702953964372.
|
1438 |
+
(14) Brik, M. G.; Suchocki, A.; Kamińska, A. Lattice Parameters and Stability of the Spinel
|
1439 |
+
Compounds in Relation to the Ionic Radii and Electronegativities of Constituting
|
1440 |
+
Chemical Elements. Inorg. Chem. 2014, 53 (10), 5088–5099.
|
1441 |
+
https://doi.org/10.1021/ic500200a.
|
1442 |
+
(15) Bhowmik, R. N.; Ranganathan, R.; Nagarajan, R. Lattice Expansion and Noncollinear to
|
1443 |
+
Collinear Ferrimagnetic Order in a MnCr2O4 Nanoparticle. Phys. Rev. B - Condens.
|
1444 |
+
Matter Mater. Phys. 2006, 73 (14), 1–9. https://doi.org/10.1103/PhysRevB.73.144413.
|
1445 |
+
(16) WebElements https://www.webelements.com (accessed 2022 -01 -22).
|
1446 |
+
|
FNAzT4oBgHgl3EQfUPz_/content/tmp_files/load_file.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
FNFRT4oBgHgl3EQfyzjn/vector_store/index.pkl
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:68b7d53388385d11b028dacaa6f7dc7dfa86f542c57e63bb9911ac7546fa7347
|
3 |
+
size 59899
|
FtAzT4oBgHgl3EQfHPtI/content/2301.01041v1.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:e8c3d823c8ac5fd49b027c136a032e441294cedfa23e2ca9168a5d33eb28ef01
|
3 |
+
size 652797
|