jackkuo commited on
Commit
6fa45de
·
verified ·
1 Parent(s): f4114cf

Add files using upload-large-folder tool

Browse files
This view is limited to 50 files because it contains too many changes.   See raw diff
Files changed (50) hide show
  1. .gitattributes +57 -0
  2. 0tE4T4oBgHgl3EQfzA1I/vector_store/index.faiss +3 -0
  3. 1NFAT4oBgHgl3EQfjx2F/content/2301.08607v1.pdf +3 -0
  4. 1NFAT4oBgHgl3EQfjx2F/vector_store/index.pkl +3 -0
  5. 1NFKT4oBgHgl3EQfOi14/content/2301.11759v1.pdf +3 -0
  6. 1NFKT4oBgHgl3EQfOi14/vector_store/index.pkl +3 -0
  7. 1dFST4oBgHgl3EQfWjig/content/tmp_files/2301.13781v1.pdf.txt +2499 -0
  8. 1dFST4oBgHgl3EQfWjig/content/tmp_files/load_file.txt +0 -0
  9. 1tFST4oBgHgl3EQfWzjN/vector_store/index.faiss +3 -0
  10. 2NAyT4oBgHgl3EQfPvY8/content/tmp_files/2301.00029v1.pdf.txt +408 -0
  11. 2NAyT4oBgHgl3EQfPvY8/content/tmp_files/load_file.txt +210 -0
  12. 2NE3T4oBgHgl3EQfnwo5/content/2301.04627v1.pdf +3 -0
  13. 2NE3T4oBgHgl3EQfnwo5/vector_store/index.pkl +3 -0
  14. 3NFLT4oBgHgl3EQfri9A/content/tmp_files/2301.12144v1.pdf.txt +1925 -0
  15. 3NFLT4oBgHgl3EQfri9A/content/tmp_files/load_file.txt +0 -0
  16. 5tE2T4oBgHgl3EQf6wj3/content/2301.04204v1.pdf +3 -0
  17. 5tE2T4oBgHgl3EQf6wj3/vector_store/index.faiss +3 -0
  18. 5tE2T4oBgHgl3EQf6wj3/vector_store/index.pkl +3 -0
  19. 6tE0T4oBgHgl3EQffABm/content/2301.02398v1.pdf +3 -0
  20. 6tE0T4oBgHgl3EQffABm/vector_store/index.pkl +3 -0
  21. 89E4T4oBgHgl3EQfdgwn/vector_store/index.faiss +3 -0
  22. 8NA0T4oBgHgl3EQfOf_i/content/tmp_files/2301.02163v1.pdf.txt +2215 -0
  23. 8NA0T4oBgHgl3EQfOf_i/content/tmp_files/load_file.txt +0 -0
  24. 8dFQT4oBgHgl3EQfIDXU/content/tmp_files/2301.13251v1.pdf.txt +1494 -0
  25. 8dFQT4oBgHgl3EQfIDXU/content/tmp_files/load_file.txt +0 -0
  26. 9dAyT4oBgHgl3EQf3Pmp/content/tmp_files/2301.00766v1.pdf.txt +809 -0
  27. 9dAyT4oBgHgl3EQf3Pmp/content/tmp_files/load_file.txt +0 -0
  28. 9dE4T4oBgHgl3EQfdwwo/vector_store/index.pkl +3 -0
  29. BtFJT4oBgHgl3EQfsi1r/content/tmp_files/2301.11613v1.pdf.txt +1445 -0
  30. BtFJT4oBgHgl3EQfsi1r/content/tmp_files/load_file.txt +0 -0
  31. CdE4T4oBgHgl3EQf5g79/vector_store/index.faiss +3 -0
  32. CtE0T4oBgHgl3EQfyQKJ/vector_store/index.pkl +3 -0
  33. CtE1T4oBgHgl3EQfWAR_/vector_store/index.faiss +3 -0
  34. CtE4T4oBgHgl3EQfFwxN/content/tmp_files/2301.04888v1.pdf.txt +1034 -0
  35. CtE4T4oBgHgl3EQfFwxN/content/tmp_files/load_file.txt +0 -0
  36. DNAzT4oBgHgl3EQfGfv5/content/2301.01031v1.pdf +3 -0
  37. DNAzT4oBgHgl3EQfGfv5/vector_store/index.pkl +3 -0
  38. DtE0T4oBgHgl3EQfygLM/content/tmp_files/2301.02661v1.pdf.txt +1275 -0
  39. DtE0T4oBgHgl3EQfygLM/content/tmp_files/load_file.txt +0 -0
  40. FdE3T4oBgHgl3EQftAvj/content/2301.04673v1.pdf +3 -0
  41. FtFJT4oBgHgl3EQfDSx3/vector_store/index.pkl +3 -0
  42. GtE3T4oBgHgl3EQftwtJ/content/2301.04678v1.pdf +3 -0
  43. GtE3T4oBgHgl3EQftwtJ/vector_store/index.faiss +3 -0
  44. GtE3T4oBgHgl3EQftwtJ/vector_store/index.pkl +3 -0
  45. HdAyT4oBgHgl3EQfS_fF/vector_store/index.faiss +3 -0
  46. IdFJT4oBgHgl3EQfvS1K/vector_store/index.faiss +3 -0
  47. KtE0T4oBgHgl3EQfigGw/content/2301.02447v1.pdf +3 -0
  48. KtE0T4oBgHgl3EQfigGw/vector_store/index.faiss +3 -0
  49. LtAyT4oBgHgl3EQfT_ca/content/tmp_files/2301.00115v1.pdf.txt +1296 -0
  50. LtAyT4oBgHgl3EQfT_ca/content/tmp_files/load_file.txt +0 -0
.gitattributes CHANGED
@@ -6844,3 +6844,60 @@ _tFIT4oBgHgl3EQf-Cuq/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -tex
6844
  V9AyT4oBgHgl3EQfu_l-/content/2301.00623v1.pdf filter=lfs diff=lfs merge=lfs -text
6845
  tNAzT4oBgHgl3EQf6f7D/content/2301.01877v1.pdf filter=lfs diff=lfs merge=lfs -text
6846
  tNAzT4oBgHgl3EQf6f7D/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
6844
  V9AyT4oBgHgl3EQfu_l-/content/2301.00623v1.pdf filter=lfs diff=lfs merge=lfs -text
6845
  tNAzT4oBgHgl3EQf6f7D/content/2301.01877v1.pdf filter=lfs diff=lfs merge=lfs -text
6846
  tNAzT4oBgHgl3EQf6f7D/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
6847
+ CdE4T4oBgHgl3EQf5g79/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
6848
+ s9AzT4oBgHgl3EQfrv3p/content/2301.01650v1.pdf filter=lfs diff=lfs merge=lfs -text
6849
+ q9E1T4oBgHgl3EQfiwR1/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
6850
+ mtE5T4oBgHgl3EQfjA_C/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
6851
+ i9AyT4oBgHgl3EQf-_q2/content/2301.00902v1.pdf filter=lfs diff=lfs merge=lfs -text
6852
+ gNE4T4oBgHgl3EQfqw2j/content/2301.05203v1.pdf filter=lfs diff=lfs merge=lfs -text
6853
+ HdAyT4oBgHgl3EQfS_fF/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
6854
+ uNA0T4oBgHgl3EQfLv9Z/content/2301.02122v1.pdf filter=lfs diff=lfs merge=lfs -text
6855
+ ZdFOT4oBgHgl3EQf-zSY/content/2301.12975v1.pdf filter=lfs diff=lfs merge=lfs -text
6856
+ otFKT4oBgHgl3EQfGC3m/content/2301.11724v1.pdf filter=lfs diff=lfs merge=lfs -text
6857
+ 89E4T4oBgHgl3EQfdgwn/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
6858
+ cdAzT4oBgHgl3EQfZvzP/content/2301.01358v1.pdf filter=lfs diff=lfs merge=lfs -text
6859
+ WNE1T4oBgHgl3EQfbQTu/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
6860
+ DNAzT4oBgHgl3EQfGfv5/content/2301.01031v1.pdf filter=lfs diff=lfs merge=lfs -text
6861
+ k9E0T4oBgHgl3EQfYwBU/content/2301.02311v1.pdf filter=lfs diff=lfs merge=lfs -text
6862
+ ltE3T4oBgHgl3EQfKAnG/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
6863
+ U9E4T4oBgHgl3EQfnA2j/content/2301.05173v1.pdf filter=lfs diff=lfs merge=lfs -text
6864
+ 1NFKT4oBgHgl3EQfOi14/content/2301.11759v1.pdf filter=lfs diff=lfs merge=lfs -text
6865
+ ytE4T4oBgHgl3EQfyA1G/content/2301.05262v1.pdf filter=lfs diff=lfs merge=lfs -text
6866
+ otFKT4oBgHgl3EQfGC3m/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
6867
+ KtE0T4oBgHgl3EQfigGw/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
6868
+ lNE1T4oBgHgl3EQf0gXc/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
6869
+ FdE3T4oBgHgl3EQftAvj/content/2301.04673v1.pdf filter=lfs diff=lfs merge=lfs -text
6870
+ cNAyT4oBgHgl3EQfwfkz/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
6871
+ w9E2T4oBgHgl3EQf3QiM/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
6872
+ 1tFST4oBgHgl3EQfWzjN/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
6873
+ U9E4T4oBgHgl3EQfnA2j/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
6874
+ KtE0T4oBgHgl3EQfigGw/content/2301.02447v1.pdf filter=lfs diff=lfs merge=lfs -text
6875
+ YdE4T4oBgHgl3EQfNwz6/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
6876
+ 0tE4T4oBgHgl3EQfzA1I/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
6877
+ GtE3T4oBgHgl3EQftwtJ/content/2301.04678v1.pdf filter=lfs diff=lfs merge=lfs -text
6878
+ w9E2T4oBgHgl3EQf3QiM/content/2301.04169v1.pdf filter=lfs diff=lfs merge=lfs -text
6879
+ CtE1T4oBgHgl3EQfWAR_/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
6880
+ k9E0T4oBgHgl3EQfYwBU/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
6881
+ IdFJT4oBgHgl3EQfvS1K/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
6882
+ ONE3T4oBgHgl3EQfCAkU/content/2301.04271v1.pdf filter=lfs diff=lfs merge=lfs -text
6883
+ 1NFAT4oBgHgl3EQfjx2F/content/2301.08607v1.pdf filter=lfs diff=lfs merge=lfs -text
6884
+ pdE0T4oBgHgl3EQfaACR/content/2301.02329v1.pdf filter=lfs diff=lfs merge=lfs -text
6885
+ 5tE2T4oBgHgl3EQf6wj3/content/2301.04204v1.pdf filter=lfs diff=lfs merge=lfs -text
6886
+ k9AyT4oBgHgl3EQf_fqZ/content/2301.00910v1.pdf filter=lfs diff=lfs merge=lfs -text
6887
+ GtE3T4oBgHgl3EQftwtJ/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
6888
+ R9FQT4oBgHgl3EQfbDai/content/2301.13322v1.pdf filter=lfs diff=lfs merge=lfs -text
6889
+ ftE4T4oBgHgl3EQfRQzA/content/2301.04989v1.pdf filter=lfs diff=lfs merge=lfs -text
6890
+ 2NE3T4oBgHgl3EQfnwo5/content/2301.04627v1.pdf filter=lfs diff=lfs merge=lfs -text
6891
+ k9AyT4oBgHgl3EQf_fqZ/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
6892
+ gtE3T4oBgHgl3EQf3wvW/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
6893
+ NtE2T4oBgHgl3EQfqwjT/content/2301.04043v1.pdf filter=lfs diff=lfs merge=lfs -text
6894
+ 6tE0T4oBgHgl3EQffABm/content/2301.02398v1.pdf filter=lfs diff=lfs merge=lfs -text
6895
+ jtE1T4oBgHgl3EQf0AX0/content/2301.03452v1.pdf filter=lfs diff=lfs merge=lfs -text
6896
+ qtE1T4oBgHgl3EQf2gXF/content/2301.03480v1.pdf filter=lfs diff=lfs merge=lfs -text
6897
+ udE0T4oBgHgl3EQfsQEM/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
6898
+ ltFKT4oBgHgl3EQfDi1s/content/2301.11712v1.pdf filter=lfs diff=lfs merge=lfs -text
6899
+ rNAzT4oBgHgl3EQfA_pb/content/2301.00935v1.pdf filter=lfs diff=lfs merge=lfs -text
6900
+ QdFQT4oBgHgl3EQfZTb8/content/2301.13316v1.pdf filter=lfs diff=lfs merge=lfs -text
6901
+ ytE4T4oBgHgl3EQfyA1G/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
6902
+ 5tE2T4oBgHgl3EQf6wj3/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
6903
+ QdFQT4oBgHgl3EQfZTb8/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
0tE4T4oBgHgl3EQfzA1I/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:39e7b1f8e872dd4feecbbdd1ad471727a43823c3c08a28682d67ea76b065d7d0
3
+ size 2359341
1NFAT4oBgHgl3EQfjx2F/content/2301.08607v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:52a3f568591d1ef9bcbf7b1ecfb881500d9c6280967dfee9b324ef6a51782482
3
+ size 482206
1NFAT4oBgHgl3EQfjx2F/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:fe9010687d2e984c9947926701d7dcc16b94787a3c4d814f9cfa4f27d48a1b3a
3
+ size 40078
1NFKT4oBgHgl3EQfOi14/content/2301.11759v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:45ffd2e17c16c798ed4b968cb97d14ad23dd98315e163994c3887ccd96e3e92b
3
+ size 411521
1NFKT4oBgHgl3EQfOi14/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:6895adf7928c6831ae58b3d124100ecd1d1e1c64f034f62305e0bab19d2ad362
3
+ size 116145
1dFST4oBgHgl3EQfWjig/content/tmp_files/2301.13781v1.pdf.txt ADDED
@@ -0,0 +1,2499 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ SCALING LIMITS FOR FRACTIONAL POLYHARMONIC GAUSSIAN FIELDS
2
+ NICOLA DE NITTI AND FLORIAN SCHWEIGER
3
+ Abstract. This work is concerned with fractional Gaussian fields, i.e. Gaussian fields whose covari-
4
+ ance operator is given by the inverse fractional Laplacian (−∆)−s (where, in particular, we include
5
+ the case s > 1). We define a lattice discretization of these fields and show that their scaling limits –
6
+ with respect to the optimal Besov space topology – are the original continuous fields. As a byproduct,
7
+ in dimension d < 2s, we prove the convergence in distribution of the maximum of the fields. A key
8
+ tool in the proof is a sharp error estimate for the natural finite difference scheme for (−∆)s under
9
+ minimal regularity assumptions, which is also of independent interest.
10
+ Contents
11
+ 1.
12
+ Introduction
13
+ 1
14
+ 1.1.
15
+ Fractional Gaussian Fields
16
+ 1
17
+ 1.2.
18
+ Finite difference schemes for fractional operators
19
+ 3
20
+ 1.3.
21
+ Main results
22
+ 4
23
+ 1.4.
24
+ Future work
25
+ 6
26
+ 2.
27
+ Fractional polyharmonic Gaussian fields
28
+ 7
29
+ 2.1.
30
+ The (continuous) fractional Gaussian field
31
+ 7
32
+ 2.2.
33
+ The (discrete) fractional Gaussian field
34
+ 9
35
+ 3.
36
+ Rigorous estimates for the finite difference scheme
37
+ 10
38
+ 4.
39
+ Proofs of the scaling limits
40
+ 13
41
+ 4.1.
42
+ Scaling limit in the space of distributions
43
+ 13
44
+ 4.2.
45
+ Scaling limit in Besov, Sobolev and Hölder spaces
46
+ 15
47
+ Appendix A.
48
+ Technical lemmas
49
+ 21
50
+ A.1.
51
+ Discretization and restriction
52
+ 21
53
+ A.2.
54
+ Discrete inequalities
55
+ 21
56
+ Appendix B.
57
+ Fractional Gaussian Fields via eigenfunctions
58
+ 23
59
+ Acknowledgments
60
+ 25
61
+ References
62
+ 25
63
+ 1. Introduction
64
+ 1.1. Fractional Gaussian Fields. Fractional Gaussian fields form a natural one-parameter family
65
+ of Gaussian interface models.
66
+ For a fixed parameter s ≥ 0, the s-fractional Gaussian field is the
67
+ Gaussian field whose covariance operator is (−∆)−s, the inverse of the fractional Laplacian of order
68
+ s. We emphasize right away that we do not assume s ∈ [0, 1], and in fact our main interest is in the
69
+ polyharmonic case s > 1. A purely formal and non-rigorous way to define the s-fractional Gaussian
70
+ field on some domain Ω ⊂ Rd is to set
71
+ P(dϕ) = 1
72
+ Z exp
73
+
74
+ −1
75
+ 2
76
+
77
+
78
+ ϕ(x)((−∆)sϕ)(x) dx
79
+
80
+ dϕ.
81
+ (1.1)
82
+ This cannot be taken as a rigorous definition, as dϕ refers to the Lebesgue measure on the infinite-
83
+ dimensional space RΩ, which does not exist.
84
+ 1
85
+ arXiv:2301.13781v1 [math.PR] 31 Jan 2023
86
+
87
+ 2
88
+ N. DE NITTI AND F. SCHWEIGER
89
+ (a) s = 0 (white noise)
90
+ (b) s = 0.5
91
+ (c) s = 1 (Gaussian free field)
92
+ (d) s = 1.5
93
+ (e) s = 2 (membrane model)
94
+ (f) s = 2.5
95
+ (g) s = 3
96
+ (h) s = 3.5
97
+ (i) s = 4
98
+ Figure 1.1. Surface plots of discrete fractional polyharmonic Gaussian fields on Ω :=
99
+ (0, 1)2 ∩
100
+ 1
101
+ 100Z2 with zero boundary conditions. These discrete random functions are
102
+ linearly interpolated. See also [15, Fig. 1.1] for further numerical experiments.
103
+ There are also other issues with (1.1): namely, one needs to decide how to define (−∆)s for functions
104
+ ϕ: Ω → R and (closely related to that issue) one needs to decide on boundary values of ϕ. For these
105
+ questions, we have a clear answer, though. We take 0 boundary values (i.e., we take ϕ to be extended
106
+ by 0 to the whole Rd), and we let (−∆)s be the fractional Laplacian on the full space Rd, which is
107
+ defined by using the Fourier transform1. That is, for any ξ ∈ Rd,
108
+ F [(−∆)su] (ξ) = |ξ|2sF[u](ξ)
109
+ with
110
+ F[u](ξ) =
111
+
112
+ Rd e−iξ·xu(x) dx.
113
+ These choices are natural from a probabilistic point of view, as we will explain in Remark 2.2, and
114
+ they can be implemented to provide a rigorous meaning to (1.1), for example, as a probability measure
115
+ on the space of tempered distributions. This is discussed in detail in the excellent survey [15] and in
116
+ Section 2.1 we recall the points which are important for us.
117
+ 1An equivalent hypersingular integral formulation of the polyharmonic fractional operator of order s ∈ (0, m), for
118
+ any m ∈ N, is given by
119
+ (−∆)su(x) := Cd,m,s
120
+
121
+ Rd
122
+ �m
123
+ j=−m(−1)j
124
+ � 2m
125
+ m − j
126
+
127
+ u(x + jy)
128
+ |y|d+2s
129
+ dy,
130
+ where
131
+ Cd,m,s :=
132
+
133
+
134
+
135
+
136
+
137
+
138
+
139
+
140
+
141
+
142
+
143
+
144
+
145
+
146
+
147
+ 22sΓ(n/2 + s)
148
+ πn/2Γ(−s)
149
+
150
+
151
+ m
152
+
153
+ j=1
154
+ (−1)j
155
+
156
+ 2m
157
+ m − j
158
+
159
+ j2s
160
+
161
+
162
+ −1
163
+ if s ∈ (0, m)\N,
164
+ 22sΓ(n/2 + s)s!
165
+ 2πn/2
166
+
167
+
168
+ m
169
+
170
+ j=2
171
+ (−1)j
172
+
173
+ 2m
174
+ m − j
175
+
176
+ j2s ln j
177
+
178
+
179
+ −1
180
+ if s ∈ (0, m) ∩ N.
181
+ We refer to [1] and references therein for further information on the theory of higher-order fractional Laplacians.
182
+
183
+ SCALING LIMITS FOR FRACTIONAL POLYHARMONIC GAUSSIAN FIELDS
184
+ 3
185
+ The main goal of the present work is to define a discrete version ϕh of the s-fractional Gaussian field
186
+ ϕ on a lattice Ωh = Ω ∩ hZd and to study its properties. It is not immediately obvious how one should
187
+ define this discrete version, but we will argue that our definition is quite natural. Certainly, one would
188
+ expect that in the limit h → 0 the discrete s-fractional Gaussian field converges in law, with respect
189
+ to a suitable topology, to the (continuous) s-fractional Gaussian field. Our main result is that, with
190
+ our definition of a s-fractional Gaussian field, this convergence holds in a rather strong sense, namely
191
+ in law with respect to the topology of Besov spaces for the optimal range of parameters.
192
+ Similar problems have been studied before for specific values of s. If s = 1, the field is the Gaussian
193
+ free field and the convergence of the discrete Gaussian free field to its continuous variant is folklore
194
+ (see [20, Section 4] for related results). The proof relies on the fact that covariances of the discrete
195
+ Gaussian free field can be represented using simple random walk, which in the scaling limit becomes
196
+ Brownian motion. The case 0 ≤ s < 1 is addressed in [15, Section 12]2, and the proof of the scaling
197
+ limit follows a similar strategy as for the case s = 1, just with the 2s-stable Lévy process taking the
198
+ place of Brownian motion.
199
+ These results for s ≤ 1 all rely on some form of a random walk representation. For s > 1 and for our
200
+ choice of boundary values, there is no such random walk representation and so proofs become much
201
+ more difficult.3 The only existing result in this regime is for s = 2, where the s-fractional Gaussian field
202
+ is the so-called membrane model. In [7], it was proven that this field is the scaling limit of its discrete
203
+ version. The main ingredient in the proof were estimates for finite difference schemes for (−∆)2 from
204
+ [22], and estimates for its Green’s function from [16].
205
+ Thus, previous work was restricted to s ∈ [0, 1] ∪ {2}, while our results cover the entire range
206
+ s ∈ [0, ∞). Even in the case s ∈ [0, 1] ∪ {2}, our results improve upon the previous work. Namely, the
207
+ convergence in [15, Section 12] is with respect to the topology of distributions and the convergence in
208
+ [7] is with respect to the topology of some negative Sobolev space (for non-optimal parameters). As
209
+ an easy corollary of our result with respect to the Besov-space topology, one obtains convergence with
210
+ respect to the Sobolev-topology and also with respect to the Hölder topology (both with the optimal
211
+ range of parameters).
212
+ Our method of proof uses estimates for finite difference schemes like [7], but of a different flavor. In-
213
+ stead of the estimate from [22] used in [7] (that needs Ck-regularity of the function to be approximated
214
+ by the scheme), we establish an estimate that needs only minimal regularity assumptions (essentially
215
+ just Hs+ε-regularity for some ε > 0). This is the main technical result of the paper and we will discuss
216
+ it and its context next.
217
+ 1.2. Finite difference schemes for fractional operators. There is a close relation between discrete
218
+ versions of Gaussian fields and finite difference approximations of the corresponding operator. Indeed,
219
+ if we want to define a lattice version of (1.1) that is suitably close to (1.1) itself, then we need a lattice
220
+ approximation of (−∆)s; the better this approximation, the closer the resulting lattice field will be to
221
+ its continuous version.
222
+ Before discussing finite difference schemes, let us mention that there has been work on finite element
223
+ approaches to the fractional Laplacian (at least for s ≤ 1). We cannot cover the whole body of relevant
224
+ literature here, but we refer to the very recent survey [3].
225
+ Let us now turn to finite difference schemes. The subject of finite difference schemes for the fractional
226
+ Laplacian (−∆)s has been studied before and various schemes have been proposed. However, the main
227
+ focus has been on the case s < 1 and often also d = 1. We refer to the survey [13] and the references
228
+ therein for an overview.
229
+ The main challenge when constructing a finite difference scheme for the
230
+ 2There, a definition of the discrete FGF that is slightly different from ours is used; the proof, however, should apply
231
+ to all reasonable discretizations including ours.
232
+ 3If one uses another definition of the fractional Gaussian field in terms of spectral powers of the ordinary Laplacian
233
+ (the so-called eigenfunction FGF from [15, Section 9]), one retains a random walk representations and it is comparably
234
+ easy to establish a scaling limit. In fact, in [2], this is done not in the lattice case, but in the more complicated case of
235
+ a Sierpinski gasket.
236
+
237
+ 4
238
+ N. DE NITTI AND F. SCHWEIGER
239
+ fractional Laplacian is that it is given by convolution with a singular integral kernel, and a naive
240
+ discretization of this kernel might not capture its behavior near the singularity.
241
+ Our preferred way to construct a finite difference scheme arises naturally when working in Fourier
242
+ space. Let us consider first the usual Laplacian, i.e. the case s = 1. Its symbol is |ξ|2 and its standard
243
+ finite difference approximation (the 2d + 1-point stencil in dimension d) has symbol
244
+ (1.2)
245
+ Mh(ξ)2 :=
246
+ d
247
+
248
+ j=1
249
+ 4
250
+ h2 sin2
251
+ �ξjh
252
+ 2
253
+
254
+ .
255
+ So, for the fractional Laplacian (−∆)s with symbol |ξ|2s, a natural way to define a finite difference
256
+ scheme is to take the finite difference operator with symbol Mh(ξ)2s. That is, we define
257
+ Fh [(−∆h)suh] (ξ) = Mh(ξ)2sFh[uh](ξ)
258
+ with
259
+ Fh[uh](ξ) = hd �
260
+ x∈hZd
261
+ e−iξ·xuh(x).
262
+ We can also use Mh(ξ)2s as a continuous Fourier multiplier and thereby understand (−∆h)s also as a
263
+ continuous operator. This is consistent with the previous definitions, as pointed out in Lemma A.1.
264
+ This scheme for s ≤ 1 (but general d) has already been studied in [12] (and the special case d = 1
265
+ already in [13, Section 4.2] and, in more detail, in [6]) and has many desirable properties. First of all,
266
+ for s ∈ N, we recover the standard schemes for polyharmonic Laplacians. We also have the property
267
+ that (−∆h)s(−∆h)s′ = (−∆h)s+s′. Moreover, while for other schemes the accuracy often degenerates
268
+ as s ↗ 1, our scheme has accuracy h2 uniformly in s (as follows from Theorem 1.3). In Remark 3.2
269
+ below, we comment on how this scheme might work in practice.
270
+ Now that we have chosen our scheme, let us discuss rigorous estimates for its approximation quality.
271
+ In the literature on finite difference schemes, it is common to derive pointwise estimates on the error
272
+ under a strong regularity assumption (Ck or Ck,α for a large enough k). In fact, for d ∈ {1, 2} and
273
+ s ≤ 1, there are two such results in the literature: in [6], pointwise estimates for the approximation
274
+ error for functions in Hölder spaces (at least C0,2s+ε) are shown and, in [12], such pointwise estimates
275
+ are shown under the assumption that the 2s + ε-th derivative has integrable Fourier transform (which,
276
+ roughly speaking, again corresponds to C0,2s+ε).
277
+ However, as already mentioned in the previous subsection, our interest is more in estimates under
278
+ low-regularity assumptions, i.e. in a Sobolev scale. To the best of our knowledge, such estimates are
279
+ new (even in the case d = 1, s < 1). For the case of the Laplacian or Bilaplacian, though, such results
280
+ are classical (see the textbook [14] or a recent refinement for the Bilaplacian in [19]), and our result is
281
+ inspired by the latter. However, the proof is quite different. Namely, the proof of [19, Theorem 2.3]
282
+ relied on the Bramble-Hilbert lemma and thereby used that s ∈ N. In our general setting, we use a
283
+ different approach, based on the Poisson summation formula and a lengthy estimate of various error
284
+ terms in Fourier space.
285
+ 1.3. Main results. Let us now state our main results more precisely. We consider the discrete FGF
286
+ ϕh and the continuous FGF ϕ, as introduced informally in Section 1.1. As the rigorous definitions are
287
+ quite technical, we postpone them to Sections 2.2 and 2.1, respectively.
288
+ We claim that the scaling limit of ϕh in an appropriate sense is ϕ. However, ϕh is defined only
289
+ on hZd, so we need to interpolate it to a function on Rd first. For that purpose, we fix a compactly
290
+ supported function Θ ∈ S(Rd) with
291
+
292
+ Rd Θ(x) dx = 1 and define Θh(x) =
293
+ 1
294
+ hd Θ
295
+ � x
296
+ h
297
+
298
+ .
299
+ Using Θh, we can define the interpolated field
300
+ Ihϕh(x) :=
301
+
302
+ y∈hZd
303
+ hdϕh(y)Θh(x − y)
304
+ as a random element of S′(Rd).
305
+ Some of the results below also hold if Θ is just a tempered distribution (and, in fact, in [7] only the
306
+ choice Θ = δ0 was used). However, if we hope to find a scaling limit in some Banach space of optimal
307
+
308
+ SCALING LIMITS FOR FRACTIONAL POLYHARMONIC GAUSSIAN FIELDS
309
+ 5
310
+ regularity, we need to consider more regular Θ (as otherwise Ihϕh might not even be an element of
311
+ the Banach space in question); so, to avoid unneccessarily complicated notations, we directly assume
312
+ that Θ is a measurable function.
313
+ As a first result, we claim that, for any Θ chosen as above, the interpolated fields Ihϕh converge in
314
+ the sense of distributions. Note that our definition of ϕh is made in such a way that we do not need
315
+ to rescale it with some power of h to obtain a scaling limit. Indeed, we have the following result.
316
+ Theorem 1.1 (Scaling limit in the space of distributions). Let Ω ⊂ Rd be a bounded domain with
317
+ Lipschitz boundary, and let s ≥ 0.
318
+ Let Θ be a compactly supported function with integral 1. Then Ihϕh converges in law with respect to
319
+ the topology of S′(Rd) to ϕ. That is, for any f ∈ S(Rd), the random variable (Ihϕh, f)L2
320
+ h(hZd)converges
321
+ in law to (ϕ, f)L2(Rd).
322
+ In Theorem 1.1, we established a scaling limit in the space of distributions. However, as we discuss
323
+ in detail in Section 2, the continuous FGF is defined not just as a distribution-valued random variable,
324
+ but actually has a certain Besov-, Sobolev- and Hölder-regularity. Hence, it is natural that we can
325
+ take the scaling limit of the ϕh also in these spaces. In order to do so, however, we need some further
326
+ assumptions on the regularization Θ (otherwise the interpolated field Ihϕh might not even be an
327
+ element of the space). The result now is the following.
328
+ Theorem 1.2 (Scaling limits in Sobolev and Hölder Spaces). Let Ω ⊂ Rd be a bounded domain with
329
+ Lipschitz boundary and let s ≥ 0. Let Θ be a compactly supported function with integral 1, and suppose
330
+ that there is some k with k > s + d
331
+ 2 such that
332
+ (1.3)
333
+ |FΘ(ξ)| ≤ C
334
+ (�d
335
+ j=1 sin2(ξj))k/2
336
+ |ξ|k
337
+ for all ξ.
338
+ Let s′ < s − d
339
+ 2, p, q ∈ [1, ∞]. Then the interpolated fields Ihϕh converge in law with respect to the
340
+ topology of ˆBs′
341
+ p,q(Rd) to ϕ.
342
+ Moreover, for any fixed bounded domain ˆΩ with Lipschitz boundary such that Ω ⋐ ˆΩ, Ihϕh are
343
+ supported in ˆΩ for h sufficiently small. For any s′ < s − d
344
+ 2, the interpolated fields Ihϕh converge in
345
+ law with respect to the topology of ˙Hs′(ˆΩ) to ϕ. In addition, if H := s − d
346
+ 2 > 0, m = ⌈H⌉ − 1, and
347
+ 0 < α < H − m, then Ihϕh converges in law with respect to the topology of Cm,α(Rd) to ϕ.
348
+ Here, ˆBs′
349
+ p,q(Rd) is, up to a minor technicality that we again discuss in Section 2, equal to the standard
350
+ Besov space Bs′
351
+ p,q(Rd).
352
+ Several remarks are in order. First of all, a convenient example of a function satisfying (1.3) for
353
+ some k ∈ N is given by the centered B-spline of order k (see, e.g., [14, Section 1.9.4] for a summary of
354
+ their properties).
355
+ Next, the restriction to s′ < s − d
356
+ 2 cannot be avoided as the continuous FGF is not in ˆBs−d/2
357
+ p,q
358
+ for
359
+ any p, q. Thus, the range of allowed s′ is optimal.
360
+ Regarding the convergence in Sobolev spaces, we cannot expect convergence with respect to the
361
+ topology of ˙Hs′(Ω) for the simple reason that, because of the mollification, Ihϕh need not have zero
362
+ boundary values outside of Ω.
363
+ A fundamental step in the proof of the results above is establishing the following error estimate for
364
+ a fractional Poisson equation (which is of interest in itself). Our goal is to compare the solutions of
365
+ (−∆)su = f and of (−∆h)suh = f and we will estimate the error u − uh in the (discrete) energy norm
366
+ ∥ · ∥ ˙Hs
367
+ h. As we work under minimal regularity assumptions on u, the precise result is somewhat more
368
+ technical. Namely, in general u and f might not be continuous functions and so it is not clear how to
369
+ restrict them to the lattice. We circumvent this by introducing two additional mollifiers.
370
+ The result then takes the following shape.
371
+ Theorem 1.3 (Error estimate on the discrete approximation). Let Ω ⊂ Rd be an open bounded set
372
+ with Lipschitz boundary. Let Θ: Rd → R and θ: Rd → R be mollifiers that are compactly supported,
373
+
374
+ 6
375
+ N. DE NITTI AND F. SCHWEIGER
376
+ symmetric around 0, and have integral 1. Furthermore, let us assume that there exist k, l ≥ 0 such
377
+ that
378
+ |FΘ(ξ)| ≤ C
379
+ (�d
380
+ j=1 sin2(ξj))k/2
381
+ |ξ|k
382
+ ,
383
+ |Fθ(ξ)| ≤ C 1
384
+ |ξ|l ,
385
+ and define Θh(x) =
386
+ 1
387
+ hd Θ
388
+ � x
389
+ h
390
+
391
+ , θh(x) =
392
+ 1
393
+ hd θ
394
+ � x
395
+ h
396
+
397
+ .
398
+ Let 0 < s < t and let u ∈ Ht(Rd) be the solution of
399
+
400
+ (−∆)su(x) = f(x),
401
+ x ∈ Ω,
402
+ u(x) = 0,
403
+ x ∈ Rd \ Ω,
404
+ for some f ∈ Ht−2s(Rd), and uh : hZd → R be the solution of
405
+
406
+ (−∆h)suh(x) = Θh ∗ f(x),
407
+ x ∈ hZd ∩ Ω,
408
+ uh(x) = 0,
409
+ x ∈ hZd \ Ω.
410
+ Then, if h ≤ 1, k ≥ s, k > d
411
+ 2 + 2s − t, l > d
412
+ 2 − t, and t − s ≤ 2, we have the estimate
413
+ ∥θh ∗ u − uh∥ ˙Hs
414
+ h(hZd) ≤ Cht−s∥u∥ ˙Ht(Rd),
415
+ where C > 0 does not depend on h.
416
+ Here (as in the rest of the paper) C denotes some generic constant that might change from line to
417
+ line, but is always independent of h.
418
+ Let us give some explanations regarding the linear constraints on the parameters in this result. The
419
+ most important constraint is t − s ≤ 2. It arises from the fact that the proposed finite difference
420
+ scheme is of second order (see [13, Section 5.2]), so that the accurary of our scheme saturates at h2.
421
+ The condition k > d
422
+ 2 + 2s − t is needed in order for Θh ∗ f to be continuous (so that it has a well-
423
+ defined restriction to the lattice). Similarly, the condition l > d
424
+ 2 − t is needed in order for θh ∗ u to be
425
+ continuous.
426
+ As mentioned in Section 1.2, this is the first rigorous estimate for a finite difference scheme for
427
+ (−∆)s under low regularity assumptions. For finite elements, a result that is similar in spirit can
428
+ be found in [3, Theorem 2.6]. There an estimate for piecewise linear finite elements is shown that is
429
+ similar to our result (albeit with the additional restriction t − s ≤ 1
430
+ 2 instead of t − s ≤ 2). The method
431
+ of proof is very different.
432
+ 1.4. Future work. The most well-studied discrete Gaussian interface model is certainly the discrete
433
+ Gaussian free field (corresponding to s = 1 in our notation). In recent years there has been a lot
434
+ of activity to extend results known for the discrete Gaussian free field to other discrete (Gaussian or
435
+ non-Gaussian) interface models, and this work is a first step to include the discrete FGFs in the latter
436
+ class.
437
+ Let us highlight one such question, namely regarding the maximum of the field. In case of the
438
+ discrete Gaussian free field, this is well-understood. In the subcritical dimension (d = 1), the field
439
+ is nothing but a random walk bridge, so it is easy to see that the rescaled maximum converges to a
440
+ non-degenerate random variable. In supercritical dimensions (d ≥ 3), correlations decay so rapidly
441
+ that the maximum behaves as if the field values were independent [5]. The most interesting case is the
442
+ critical case, d = 2, where the field is log-correlated and obtains the typical second-order correction
443
+ [4].
444
+ These results have already been extended to the case of the membrane model (corresponding to
445
+ s = 2). The subcritical case (d ≤ 3) was studied in [7] using results from [16], the supercritical case
446
+ in [5], and finally the critical case in [19]. An important tool in the latter proof was an estimate for
447
+ finite difference schemes very similar to the one in Theorem 1.3.
448
+
449
+ SCALING LIMITS FOR FRACTIONAL POLYHARMONIC GAUSSIAN FIELDS
450
+ 7
451
+ For general s, it is very likely that similar results hold true. In fact, in the subcritical case d < 2s,
452
+ convergence of the rescaled maximum is a straightforward corollary of Theorem 1.2.
453
+ Corollary 1.4 (Convergence of the maximum for d < 2s). Let d < 2s, Ω ⊂ Rd be a fixed bounded
454
+ domain with Lipschitz boundary, and consider the family ϕh of s-FGF on Ωh = Ω∩hZd as h → 0. Then
455
+ the random variables maxx∈Ωh ϕh(x) converge in distribution to a non-degenerate random variable.
456
+ While this corollary covers the subcritical case, the critical case (d = 2s) and the supercritical case
457
+ (d > 2s) remain open, and we hope to address them in the future.
458
+ In particular, a study of the
459
+ critical case would be very interesting, as most existing examples of discrete log-correlated fields in the
460
+ literature are in d = 2 or some other even dimension while the 3
461
+ 2-discrete FGF, for instance, would be
462
+ a natural example of a log-correlated field in odd dimensions.
463
+ 2. Fractional polyharmonic Gaussian fields
464
+ In this section, we give precise definitions for the continuous and discrete FGF. For the continuous
465
+ FGF, we follow [15]. The major difference is that we only require Lipschitz continuity of the boundary
466
+ of our domain Ω (and hence our results cover in particular the important special case Ω = (0, 1)d).
467
+ Because of this, several functional-analytic statements require extra attention and we give precise
468
+ references for the results we use.
469
+ 2.1. The (continuous) fractional Gaussian field. We first fix our conventions for the Fourier
470
+ transform, and then use it to define some relevant function spaces.
471
+ For a function u: Rd → R, we let F[u](ξ): Rd → R, defined by
472
+ F[u](ξ) =
473
+
474
+ Rd e−iξ·xu(x) dx,
475
+ be its continuous Fourier transform. Then, we have the Fourier inversion formula,
476
+ u(x) = F−1[F[u]](x) =
477
+ 1
478
+ (2π)d
479
+
480
+ Rd eiξ·xF[u](ξ) dξ,
481
+ and Plancherel’s theorem,
482
+
483
+ Rd |u(x)|2 dx =
484
+ 1
485
+ (2π)d
486
+
487
+ Rd |F[u](ξ)|2 dξ.
488
+ We can also define the Sobolev norms
489
+ ∥u∥2
490
+ ˙Hs(Rd) =
491
+
492
+ Rd |ξ|2s|F[u](ξ)|2 dξ,
493
+ ∥u∥2
494
+ Hs(Rd) =
495
+
496
+ Rd(1 + |ξ|2)s|F[u](ξ)|2 dξ,
497
+ where |ξ|2 is the Fourier multiplier of the Laplacian −∆.
498
+ Let Ω ⊂ Rd be a bounded domain with Lipschitz boundary and let S′(Rd) be the space of tempered
499
+ distributions on Rd. In what follows, we collect some results on fractional Sobolev spaces on Ω. If Ω
500
+ has a smooth boundary, all of them are well-known (and [23, Chapter 4] is a comprehensive reference).
501
+ If Ω has merely Lipschitz boundary, the situation is slightly more complicated and we rely on the
502
+ reference [24]. A brief version of some of these results is also contained in [15, Section 4.1], but some
503
+ of them are not made explicit there.
504
+ For s ≥ 0, let ˙˜Hs(Ω) be the closure of C∞
505
+ c (Ω) with respect to the norm ∥· ∥ ˙Hs(Rd)
506
+ 4 and let ˙H−s(Ω)
507
+ be its dual space. The space ˙H−s(Ω) can alternatively be described as follows. Let
508
+ ∥u∥ ˙H−s(Ω) =
509
+ inf
510
+ v∈ ˙H−s(Rd)
511
+ u=v in Ω
512
+ ∥v∥ ˙H−s(Rd)
513
+ 4In [15] this space is denoted Hs
514
+ 0(Ω). However, more commonly ˙Hs
515
+ 0(Ω) is defined as the closure of C∞
516
+ c (Ω) with respect
517
+ to the norm ∥ · ∥ ˙Hs(Ω), while our space ˙˜Hs(Ω) is equal to the Lions-Magenes space (which is also denoted by ˙Hs
518
+ 00(Ω)).
519
+ The two spaces are different whenever s ∈ N + 1
520
+ 2 . Our notation is based on the one in [23, Chapter 4].
521
+
522
+ 8
523
+ N. DE NITTI AND F. SCHWEIGER
524
+ for u ∈ S(Rd). Then if S(Ω) is the quotient of S(Rd) under the equivalence relation that identifies
525
+ functions when they agree in Ω, we have that ˙H−s(Ω) is the closure of S(Ω) with respect to the norm
526
+ ∥ · ∥ ˙H−s(Ω) (this follows from [24, Theorem 3.5 (i)] upon observing that our spaces ˙˜Hs(Ω), for s ≥ 0,
527
+ and ˙H−s(Ω), for s < 0, are equal to Triebel’s ¯Bs
528
+ 2,2(Ω) by [24, Proposition 3.1]).
529
+ From the Lax-Milgram lemma (and the fact that C∞
530
+ c (Ω) is dense in ˙˜Hs(Ω)) we also obtain that
531
+ (−∆)s is an isometry from ˙˜Hs(Ω) to ˙H−s(Ω).
532
+ For convenience (and with a slight abuse of notation) we define
533
+ ˙Hs(Ω) =
534
+ � ˙˜Hs(Ω)
535
+ if s ≥ 0,
536
+ ˙Hs(Ω)
537
+ if s < 0.
538
+ This scale of Hilbert spaces has various desirable properties. For any s < t, the embedding from ˙Ht(Ω)
539
+ to ˙Hs(Ω) is compact (cf. [24, Theorem 2.7]). Even more importantly, the spaces form an interpolation
540
+ scale with respect to complex (or equivalently real) interpolation (cf. [24, Theorem 3.5 (iv)]).
541
+ In [15, Section 4.2], the continuous FGF is defined as a probability measure P on S′(Rd). More
542
+ precisely, it is defined such that when ϕ is distributed according to P, then for every Schwartz function
543
+ f ∈ S(Rd) we have that (ϕ, f) is a centered Gaussian with variance ∥f∥2
544
+ ˙H−s(Ω). By [15, Theorem 2.3
545
+ and Proposition 2.4], this property defines P as a probability measure on S′(Rd) uniquely.
546
+ Let us remark that one can one alternatively define the FGF as a random sum of eigenfunctions of
547
+ (−∆)s. We give details on this in Appendix B.
548
+ The regularity of ϕ is best measured in Besov spaces. For s′ ∈ R, p, q ∈ [1, ∞], we let ∥ · ∥Bs′
549
+ p,q(Rd)
550
+ be the usual Besov norm (defined, e.g., via Littlewood-Paley decomposition or via wavelets; see,
551
+ for example, [23, Chapter 2]) and let ˆBs′
552
+ p,q(Rd) be the closure of C∞
553
+ c (Rd) with respect to the norm
554
+ ∥ · ∥Bs′
555
+ p,q(Rd)
556
+ 5.
557
+ Then we have the following regularity results for ϕ.
558
+ Proposition 2.1 (Regularity of the FGF). Let Ω ⊂ Rd be a bounded domain with Lipschitz boundary
559
+ and let s ≥ 0. For any s′ < s − d
560
+ 2 and p, q ∈ [1, ∞], the FGF on Ω is P-almost surely an element of
561
+ ˆBs′
562
+ p,q(Rd).
563
+ In particular, for any s′ < s − d
564
+ 2 the FGF on Ω is P-almost surely an element of ˙Hs′(Ω).
565
+ Moreover, if H := s − d
566
+ 2 > 0, then the FGF on Ω is also P-almost surely an element of Cm,α
567
+ loc (Rd)
568
+ for m = ⌈H⌉ − 1 and any 0 < α < H − m.
569
+ Proof. The Besov regularity could be shown using the tightness criterion in Lemma 4.1 below applied
570
+ to the constant sequence ϕ(m) = ϕ. However, according to Theorem 1.2 we have the much stronger
571
+ statement that the FGF is the limit (with respect to the ˆBs′
572
+ p,q(Rd)-topology) of the discrete fractional
573
+ Gaussian fields, suitably interpolated; so we do not give details for the proof of the Besov regularity
574
+ here.
575
+ It is well-known that ˆBs′
576
+ 2,2(Rd) = Hs′(Rd) and ˆBs′
577
+ ∞,∞(Rd) �→ Cs′(Rd), where Cs′(Rd) is the Hölder-
578
+ Zygmund space, which embeds into the classical Hölder space C⌊s′′⌋,s′′−⌊s′′⌋ for any 0 < s′′ < s′ (see
579
+ [24, Section 2.1]). These results together with the fact that the FGF is supported in Ω easily imply
580
+ the Sobolev and Hölder regularity results in the proposition.
581
+ Let us remark that the Sobolev regularity alternatively follows from the fact the random series defin-
582
+ ing ˜ϕ converges in ˙Hs′(Ω) almost surely, while the Hölder regularity also follows from [15, Proposition
583
+ 6.2 and Theorem 8.3]6.
584
+
585
+ 5Note that the Besov space Bs′
586
+ p,q(Rd) commonly defined as the set of all tempered distributions for which ∥·∥Bs′
587
+ p,q(Rd)
588
+ is finite. Clearly ˆBs′
589
+ p,q(Rd) ⊂ Bs′
590
+ p,q(Rd), and the inclusion is strict if p = ∞ or q = ∞.
591
+ 6N.B. There is a typo in the statement of [15, Proposition 6.2]: it should read H − k instead of H − ⌈H⌉.
592
+
593
+ SCALING LIMITS FOR FRACTIONAL POLYHARMONIC GAUSSIAN FIELDS
594
+ 9
595
+ 2.2. The (discrete) fractional Gaussian field. Our definition of the discrete FGF follows the one
596
+ of the continuous FGF as closely as possibly. Let us again begin by fixing our conventions for discrete
597
+ Fourier transforms and discrete function spaces.
598
+ For a function uh : hZd → R, we let Fh[uh](ξ): Rd → R, defined by
599
+ Fh[uh](ξ) = hd �
600
+ x∈hZd
601
+ e−iξ·xuh(x),
602
+ be its discrete Fourier transform (note that this function is 2π
603
+ h -periodic). Then we have the discrete
604
+ Fourier inversion formula,
605
+ uh(x) = F−1
606
+ h [Fh[uh]](x) =
607
+ 1
608
+ (2π)d
609
+
610
+ (− π
611
+ h , π
612
+ h)
613
+ d eiξ·xFh[uh](ξ) dξ,
614
+ and Plancherel’s theorem,
615
+ hd �
616
+ x∈hZd
617
+ |uh(x)|2 =
618
+ 1
619
+ (2π)d
620
+
621
+ (− π
622
+ h , π
623
+ h)
624
+ d |Fh[uh](ξ)|2.
625
+ We can define the discrete Sobolev norms
626
+ ∥uh∥2
627
+ ˙Hs
628
+ h(hZd) =
629
+
630
+ (− π
631
+ h , π
632
+ h)
633
+ d Mh(ξ)2s|Fh[uh](ξ)|2 dξ,
634
+ ∥uh∥2
635
+ Hs
636
+ h(hZd) =
637
+
638
+ (− π
639
+ h , π
640
+ h)
641
+ d(1 + Mh(ξ)2)s|Fh[uh](ξ)|2 dξ,
642
+ where Mh(ξ)2 := �d
643
+ j=1
644
+ 4
645
+ h2 sin2 �
646
+ ξjh
647
+ 2
648
+
649
+ is the discrete Fourier multiplier of the discrete Laplacian.
650
+ Let Ω be as before and let Ωh = Ω ∩ hZd. Similarly as in the continuous setting, we define the
651
+ space ˙˜Hs(Ωh) as the space of functions hZd → R that vanish outside of Ωh (equipped with the norm
652
+ induced by ∥ · ∥ ˙Hs
653
+ h(hZd)). We let ˙H−s(Ωh) be its dual space, and define
654
+ ˙Hs(Ω) =
655
+ � ˙˜Hs
656
+ h(Ωh)
657
+ if s ≥ 0,
658
+ ˙Hs
659
+ h(Ωh)
660
+ if s < 0.
661
+ We define the discrete FGF as a probability measure on ˙˜Hs(Ωh). More precisely, we consider the
662
+ measure
663
+ Ph( dϕh) = 1
664
+ Zh
665
+ exp
666
+
667
+ −1
668
+ 2∥ϕh∥2
669
+ ˙Hs
670
+ h(hZd)
671
+ � �
672
+ x∈Ωh
673
+ dϕh(x)
674
+
675
+ x∈hZd\Ωh
676
+ δ0( dϕh(x))
677
+ = 1
678
+ Zh
679
+ exp
680
+
681
+ −1
682
+ 2
683
+
684
+ x∈Ωh
685
+ hdϕh(x)(−∆h)sϕh(x)
686
+ � �
687
+ x∈Ωh
688
+ dϕh(x)
689
+
690
+ x∈hZd\Ωh
691
+ δ0( dϕh(x)).
692
+ This is a well-defined Gaussian measure with mean 0, and variance
693
+ Eh(ϕh, fh)2
694
+ L2
695
+ h(hZ)d = ∥fh∥2
696
+ ˙H−s
697
+ h
698
+ (Ωh)
699
+ (2.1)
700
+ for any fh : hZd → R.
701
+ Remark 2.2 (Boundary values). Let us comment on our choice of boundary values. The main advantage
702
+ of our definition is the fact that it is consistent with projections. Namely, let Ω ⊂ ˜Ω be open sets
703
+ and consider the discrete FGF ˜ϕh on ˜Ωh. Then, the restriction of ˜ϕh to Ωh is equal in distribution to
704
+ the sum of the (−∆h)s-harmonic extension of ˜ϕh from hZd \ Ωh to Ωh and of an independent discrete
705
+ FGF ϕh on Ωh 7. In particular, even if we had started with a field without boundary values (i.e., with
706
+ 7If s = 1, this reduces to the familiar domain Markov property for the discrete Gaussian free field: the field in a
707
+ subdomain is equal in distribution to the harmonic extension of its boundary values plus an independent zero-boundary
708
+ field.
709
+
710
+ 10
711
+ N. DE NITTI AND F. SCHWEIGER
712
+ ˜Ω = Rd), then looking at the field on a subset naturally leads to consider fields with zero boundary
713
+ values outside that subset.
714
+ 3. Rigorous estimates for the finite difference scheme
715
+ In this section, we present the proof of Theorem 1.3. As mentioned in Section 1.2, the proof of
716
+ the analogous statement for s = 2 in [19, Theorem 2.3] was based on the Bramble-Hilbert lemma to
717
+ estimate various error terms. Thus it relied on the fact that (−∆h)2 (and hence the finite difference
718
+ scheme) is local in that case.
719
+ In the generic case s ̸∈ N, however, (−∆h)s is not local, and so this proof strategy can no longer
720
+ be applied. Instead, we use the fact that both (−∆)s and (−∆h)s are defined via Fourier multipliers
721
+ and directly estimate all relevant error terms in Fourier space. However, this requires extra care as we
722
+ need to switch from discrete Fourier space to continuous Fourier space at some point. In fact, we need
723
+ a way to compare Fh and F. Fortunately, the following Poisson-type summation formula enables us
724
+ to do so easily.
725
+ Lemma 3.1 (Poisson-type summation formula). Suppose that g: Rd → R is a Schwartz function.
726
+ Then we have the identity
727
+ Fh[g](ξ) =
728
+
729
+ ζ∈ 2π
730
+ h Zd
731
+ F[g](ξ + ζ).
732
+ Proof. By the Poisson summation formula (see, e.g., [18, Chapter 4.4]), for any Schwartz function f
733
+ we have
734
+ hd �
735
+ x∈hZd
736
+ f(x) =
737
+
738
+ ζ∈ 2π
739
+ h Zd
740
+ F[f](ζ).
741
+ Applying this to f(x) = e−iξ·xg(x), we find
742
+ hd �
743
+ x∈hZd
744
+ e−iξ·xg(x) =
745
+
746
+ ζ∈ 2π
747
+ h Zd
748
+ F[e−iξ·g](ζ) =
749
+
750
+ ζ∈ 2π
751
+ h Zd
752
+ F[g](ξ + ζ),
753
+ which implies the claim.
754
+
755
+ Using Lemma 3.1, we can now turn to the proof of our estimate on finite difference schemes.
756
+ Proof of Theorem 1.3. By density, we can assume that u is smooth; then, in particular, u is a Schwartz
757
+ function and F[u] is a Schwartz function as well. Therefore, all integrals and sums below will be well-
758
+ defined.
759
+ Step 1: Representation of the error. From the definitions we have
760
+ (3.1)
761
+ ∥u − uh∥ ˙Hs
762
+ h(hZd) = ∥(−∆h)s(θh ∗ u − uh)∥ ˙H−s
763
+ h
764
+ (Ωh) =
765
+ inf
766
+ v : hZd→R
767
+ v=(−∆h)s(θh∗u−uh) in Ωh
768
+ ∥v∥ ˙H−s
769
+ h
770
+ (hZd).
771
+ Using Lemma A.1, we can also rewrite, for x ∈ Ωh,
772
+ (−∆h)s(θh ∗ u − uh)(x)
773
+ = (−∆h)s(θh ∗ u)(x) − Θh ∗ f(x)
774
+ = (−∆h)s(θh ∗ u)(x) − Θh ∗ (−∆)su(x)
775
+ =
776
+ 1
777
+ (2π)d
778
+
779
+ (− π
780
+ h , π
781
+ h)
782
+ d eiξ·xMh(ξ)2sFh[θh ∗ u](ξ) dξ −
783
+ 1
784
+ (2π)d
785
+
786
+ Rd eiξ·x|ξ|2sF[Θh](ξ)F[u](ξ) dξ
787
+ = I1 + I2 + I3 + I4 + I5,
788
+ where
789
+ I1(x) :=
790
+ 1
791
+ (2π)d
792
+
793
+ (− π
794
+ h , π
795
+ h)
796
+ d eiξ·xMh(ξ)2s (Fh[θh ∗ u](ξ) − F[θ ∗ u](ξ)) dξ,
797
+ I2(x) :=
798
+ 1
799
+ (2π)d
800
+
801
+ (− π
802
+ h , π
803
+ h)
804
+ d eiξ·xMh(ξ)2s (F[θh ∗ u](ξ) − F[u](ξ)) dξ,
805
+
806
+ SCALING LIMITS FOR FRACTIONAL POLYHARMONIC GAUSSIAN FIELDS
807
+ 11
808
+ I3(x) :=
809
+ 1
810
+ (2π)d
811
+
812
+ (− π
813
+ h , π
814
+ h)
815
+ d eiξ·x (1 − F[Θh](ξ)) Mh(ξ)2sF[u](ξ) dξ,
816
+ I4(x) :=
817
+ 1
818
+ (2π)d
819
+
820
+ (− π
821
+ h , π
822
+ h)
823
+ d eiξ·x �
824
+ Mh(ξ)2s − |ξ|2s�
825
+ F[Θh](ξ)F[u](ξ) dξ,
826
+ I5(x) := −
827
+ 1
828
+ (2π)d
829
+
830
+ Rd\(− π
831
+ h , π
832
+ h)
833
+ d eiξ·x|ξ|2sF[Θh](ξ)F[u](ξ) dξ.
834
+ To conclude the proof, we need to show that
835
+ ∥Ij∥ ˙H−s
836
+ h
837
+ (hZd) ≤ Cht−s∥u∥ ˙Ht(Rd)
838
+ holds for each j ∈ {1, 2, 3, 4, 5}.
839
+ Step 2: Estimate of I2. Directly from the definition, we see that
840
+ Fh[I2](ξ) = Mh(ξ)2s (F[θh ∗ u](ξ) − F[u](ξ)) = Mh(ξ)2s (F[θh](ξ) − 1) F[u](ξ).
841
+ As F[θh](ξ) = F[θ](hξ), our assumption on θ implies that F[θh](ξ) ≤
842
+ C
843
+ hl|ξ|l ≤ C for ξ ∈
844
+
845
+ − π
846
+ h, π
847
+ h
848
+ �d.
849
+ Therefore
850
+ ∥I2∥2
851
+ ˙H−s
852
+ h
853
+ (hZd) =
854
+
855
+ (− π
856
+ h , π
857
+ h)
858
+ d Mh(ξ)−2s|Fh[I2](ξ)|2 dξ
859
+ =
860
+
861
+ (− π
862
+ h , π
863
+ h)
864
+ d Mh(ξ)2s |F[θh](ξ) − 1|2 |F[u](ξ)|2 dξ
865
+ ≤ C
866
+
867
+ (− π
868
+ h , π
869
+ h)
870
+ d |ξ|2s|F[u](ξ)|2 dξ
871
+ ≤ C
872
+
873
+ (− π
874
+ h , π
875
+ h)
876
+ d |ξ|2(t−s)h2(t−s)|F[u](ξ)|2 dξ
877
+ ≤ Ch2(t−s)∥u∥2
878
+ ˙Ht(Rd).
879
+ Step 3: Estimate of I3. The estimate of I3 is quite similar: again, we have that
880
+ Fh[I3](ξ) = (1 − F[Θh](ξ)) Mh(ξ)2sF[u](ξ).
881
+ The assumptions on Θ imply that FΘ(0) = 1 and ∇FΘ(0) = 1. Furthermore, FΘ is a Schwartz
882
+ function. So, by Taylor’s theorem, there is a constant C such that |1 − FΘ(ξ)| ≤ C|ξ|2. This implies
883
+ |1 − F[Θh](ξ)| ≤ Ch2|ξ|2. We can now estimate
884
+ ∥I3∥2
885
+ ˙H−s
886
+ h
887
+ (hZd) =
888
+
889
+ (− π
890
+ h , π
891
+ h)
892
+ d Mh(ξ)−2s|Fh[I3](ξ)|2 dξ
893
+ =
894
+
895
+ (− π
896
+ h , π
897
+ h)
898
+ d Mh(ξ)2s(1 − F[Θh](ξ))2|F[u](ξ)|2 dξ
899
+ ≤ C
900
+
901
+ (− π
902
+ h , π
903
+ h)
904
+ d |ξ|2sh4|ξ|4|F[u](ξ)|2 dξ
905
+ ≤ C
906
+
907
+ (− π
908
+ h , π
909
+ h)
910
+ d |ξ|2(t−s)h2(t−s)|F[u](ξ)|2 dξ
911
+ ≤ Ch2(t−s)∥u∥2
912
+ ˙Ht(Rd).
913
+ Step 4:
914
+ Estimate of I4.
915
+ The argument for I4 is very similar to that for I3:
916
+ we use that
917
+ ��Mh(ξ)2s − |ξ|2s�� ≤ Ch2|ξ|2 and proceed as for I3.
918
+ Step 5: Estimate of I1. From the definition and Lemma 3.1, we have that
919
+ Fh[I1](ξ) = Mh(ξ)2s (Fh[θh ∗ u](ξ) − F[θh ∗ u](ξ))
920
+
921
+ 12
922
+ N. DE NITTI AND F. SCHWEIGER
923
+ = Mh(ξ)2s
924
+
925
+ ζ∈ 2π
926
+ h Zd\{0}
927
+ F[θh ∗ u](ξ + ζ)
928
+ = Mh(ξ)2s
929
+
930
+ ζ∈ 2π
931
+ h Zd\{0}
932
+ F[θh](ξ + ζ)F[u](ξ + ζ).
933
+ The Cauchy-Schwartz inequality then yields
934
+ ∥I1∥2
935
+ ˙H−s
936
+ h
937
+ (hZd) =
938
+
939
+ (− π
940
+ h , π
941
+ h)
942
+ d Mh(ξ)−2s|Fh[I1](ξ)|2 dξ
943
+ =
944
+
945
+ (− π
946
+ h , π
947
+ h)
948
+ d Mh(ξ)2s
949
+ ������
950
+
951
+ ζ∈ 2π
952
+ h Zd\{0}
953
+ F[θh](ξ + ζ)F[u](ξ + ζ)
954
+ ������
955
+ 2
956
+
957
+
958
+
959
+ (− π
960
+ h , π
961
+ h)
962
+ d Mh(ξ)2s
963
+
964
+
965
+
966
+ ζ∈ 2π
967
+ h Zd\{0}
968
+ |ξ + ζ|2t|F[u](ξ + ζ)|2
969
+
970
+
971
+
972
+
973
+
974
+ ζ∈ 2π
975
+ h Zd\{0}
976
+ F[θh](ξ + ζ)
977
+ |ξ + ζ|2t
978
+
979
+ � dξ.
980
+ We know that F[θh](ξ + ζ) ≤
981
+ C
982
+ hl|ξ+ζ|l . As 2(t + l) > d, we can bound
983
+ sup
984
+ ξ∈(− π
985
+ h , π
986
+ h)
987
+ d
988
+
989
+ ζ∈ 2π
990
+ h Zd\{0}
991
+ F[θh](ξ + ζ)
992
+ |ξ + ζ|2t
993
+
994
+ sup
995
+ ξ∈(− π
996
+ h , π
997
+ h)
998
+ d
999
+
1000
+ ζ∈ 2π
1001
+ h Zd\{0}
1002
+ 1
1003
+ h2l|ξ + ζ|2(t+l)
1004
+ ≤ C
1005
+
1006
+ ζ∈ 2π
1007
+ h Zd\{0}
1008
+ 1
1009
+ h2l|ζ|2(t+l)
1010
+ ≤ Ch2t
1011
+ and deduce
1012
+ ∥I1∥2
1013
+ ˙H−s
1014
+ h
1015
+ (hZd) ≤ C 1
1016
+ h2s h2t
1017
+
1018
+ (− π
1019
+ h , π
1020
+ h)
1021
+ d
1022
+
1023
+ ζ∈ 2π
1024
+ h Zd\{0}
1025
+ |ξ + ζ|2t|F[u](ξ + ζ)|2 dξ
1026
+ ≤ Ch2(t−s)
1027
+
1028
+ Rd |ξ2t|F[u](ξ)|2 dξ
1029
+ ≤ Ch2(t−s)∥u∥2
1030
+ ˙Ht(Rd).
1031
+ Step 6: Estimate of I5. We see that
1032
+ F[I5](ξ) = |ξ|2sF[Θh](ξ)F[u](ξ)χRd\(− π
1033
+ h , π
1034
+ h)
1035
+ d(ξ),
1036
+ where χA is the indicator function of the set A. Lemma 3.1 then implies that, for ξ ∈
1037
+
1038
+ − π
1039
+ h, π
1040
+ h
1041
+ �d,
1042
+ Fh[I5](ξ) =
1043
+
1044
+ ζ∈ 2π
1045
+ h Zd
1046
+ F[I5](ξ + ζ)
1047
+ =
1048
+
1049
+ ζ∈ 2π
1050
+ h Zd
1051
+ |ξ + ζ|2sF[Θh](ξ + ζ)F[u](ξ)χRd\(− π
1052
+ h , π
1053
+ h)
1054
+ d(ξ + ζ)
1055
+ =
1056
+
1057
+ ζ∈ 2π
1058
+ h Zd\{0}
1059
+ |ξ + ζ|2sF[Θh](ξ + ζ)F[u](ξ + ζ)
1060
+ and therefore (recalling that Mh(ξ) is 2π
1061
+ h -periodic)
1062
+ ∥I5∥2
1063
+ ˙H−s
1064
+ h
1065
+ (hZd)
1066
+ =
1067
+
1068
+ (− π
1069
+ h , π
1070
+ h)
1071
+ d Mh(ξ)−2s|Fh[I5](ξ)|2 dξ
1072
+
1073
+ SCALING LIMITS FOR FRACTIONAL POLYHARMONIC GAUSSIAN FIELDS
1074
+ 13
1075
+ =
1076
+
1077
+ (− π
1078
+ h , π
1079
+ h)
1080
+ d Mh(ξ)−2s
1081
+ ������
1082
+
1083
+ ζ∈ 2π
1084
+ h Zd\{0}
1085
+ |ξ + ζ|2sF[Θh](ξ + ζ)F[u](ξ + ζ)
1086
+ ������
1087
+ 2
1088
+
1089
+ =
1090
+
1091
+ (− π
1092
+ h , π
1093
+ h)
1094
+ d
1095
+ ������
1096
+
1097
+ ζ∈ 2π
1098
+ h Zd\{0}
1099
+ |ξ + ζ|2s
1100
+ Mh(ξ + ζ)s F[Θh](ξ + ζ)F[u](ξ + ζ)
1101
+ ������
1102
+ 2
1103
+
1104
+
1105
+
1106
+ (− π
1107
+ h , π
1108
+ h)
1109
+ d
1110
+
1111
+
1112
+
1113
+ ζ∈ 2π
1114
+ h Zd\{0}
1115
+ |ξ + ζ|2t|F[u](ξ + ζ)|2
1116
+
1117
+
1118
+
1119
+
1120
+
1121
+ ζ∈ 2π
1122
+ h Zd\{0}
1123
+ |F[Θh](ξ + ζ)|2
1124
+ Mh(ξ + ζ)2s|ξ + ζ|2(t−2s)
1125
+
1126
+ � dξ.
1127
+ Note that F[Θh](ξ) = F[Θ](hξ) and so |F[Θh](ξ)| ≤ C
1128
+ (�d
1129
+ j=1 sin2(hξj))k/2
1130
+ hk|ξ|k
1131
+ ; moreover,
1132
+ (�d
1133
+ j=1 sin2(hξj))1/2
1134
+ Mh(ξ)
1135
+
1136
+ Ch. Since k ≥ s, Mh(ξ + ζ)2s is controlled by the sin-terms from |F[Θh](ξ + ζ)|2 and so we can bound
1137
+ sup
1138
+ ξ∈(− π
1139
+ h , π
1140
+ h)
1141
+ d
1142
+
1143
+ ζ∈ 2π
1144
+ h Zd\{0}
1145
+ |F[Θh](ξ + ζ)|2
1146
+ Mh(ξ + ζ)2s|ξ + ζ|2t−4s ≤ C
1147
+ sup
1148
+ ξ∈(− π
1149
+ h , π
1150
+ h)
1151
+ d
1152
+
1153
+ ζ∈ 2π
1154
+ h Zd\{0}
1155
+ h2s
1156
+ h2k|ξ + ζ|2(t+k−2s)
1157
+ ≤ C
1158
+
1159
+ ζ∈ 2π
1160
+ h Zd\{0}
1161
+ 1
1162
+ h2(k−s)|ζ|2(t+k−2s)
1163
+ ≤ Ch2(t−s),
1164
+ where we used the fact that 2(t + k − 2s) > d. Hence,
1165
+ ∥I5∥2
1166
+ ˙H−s
1167
+ h
1168
+ (hZd) ≤ Ch2(t−s)
1169
+
1170
+ (− π
1171
+ h , π
1172
+ h)
1173
+ d
1174
+
1175
+ ζ∈ 2π
1176
+ h Zd\{0}
1177
+ |ξ + ζ|2t|F[u](ξ + ζ)|2 dξ
1178
+ ≤ Ch2(t−s)
1179
+
1180
+ Rd |ξ|2t|F[u](ξ)|2 dξ
1181
+ ≤ Ch2(t−s)∥u∥2
1182
+ ˙Ht(Rd).
1183
+ This completes the proof.
1184
+
1185
+ Remark 3.2 (Usage of the finite difference scheme). So far we have not said much regarding the
1186
+ practical applications of the finite difference scheme in Theorem 1.3. It would go beyond the scope of
1187
+ this work to report on some practical experiments, but let us make a few comments.
1188
+ In order to use the scheme to approximate a solution of (−∆)su = f, a first challenge is to compute
1189
+ the entries of ((−∆h)s)x,y∈Ωh. Even using the translation-invariance of (−∆h)s, we need to compute
1190
+ O
1191
+ � 1
1192
+ h2
1193
+
1194
+ entries, where each is given as a singular integral. This is quite costly, but avoids introduction
1195
+ of additional error. In fact, the pictures in Figure 1.1 were computed using this method.
1196
+ If one is willing to accept an additional error term, then a more efficient way to compute an
1197
+ approximation to the entries of ((−∆h)s)x,y∈Ωh was suggested in [12]: choose a parameter h′ ≤ h, and
1198
+ approximate the integral over
1199
+
1200
+ − π
1201
+ h, π
1202
+ h
1203
+ �d appearing in the definition of (−∆h)s by a Riemann sum on
1204
+ a lattice of width h′
1205
+ h . The advantage is that this Riemann sum can be computed very efficiently using
1206
+ the fast Fourier transform. Moreover, in [12, Section 4.2], it is suggested that this should lead to an
1207
+ additional error of order O
1208
+
1209
+ h′d+2s
1210
+ h2s
1211
+
1212
+ . In other words, if we choose h′ ≤ h(2s+2)/(2s+d), the error should
1213
+ be of order h2 and thus not bigger than the error in Theorem 1.3. While the error estimate in [12,
1214
+ Section 4.2] is not rigorous, it should be possible to give a full proof.
1215
+ 4. Proofs of the scaling limits
1216
+ 4.1. Scaling limit in the space of distributions. With Theorem 1.3 in hand, we are ready to
1217
+ prove that ϕ is indeed the scaling limit of the ϕh. First, we study the scaling limit in the space of
1218
+ distributions, Theorem 1.1.
1219
+
1220
+ 14
1221
+ N. DE NITTI AND F. SCHWEIGER
1222
+ Proof of Theorem 1.1. Step 1: Characterization of the convergence. Let us consider some f ∈ S(Rd).
1223
+ Both (Ihϕh, f)L2(Rd) and (ϕ, f)L2(Rd) are centered Gaussian random variables and so it suffices to
1224
+ prove that their variances converge. We have that
1225
+ Eh(Ihϕh, f)2 = Eh
1226
+
1227
+
1228
+
1229
+ Rd
1230
+
1231
+ y∈hZd
1232
+ hdϕh(y)Θh(x − y)f(x) dx
1233
+
1234
+
1235
+ 2
1236
+ = Eh
1237
+
1238
+ � �
1239
+ y∈hZd
1240
+ hdϕh(y)
1241
+
1242
+ Rd Θh(x − y)f(x) dx
1243
+
1244
+
1245
+ 2
1246
+ = Eh(ϕh, Θh ∗ f)2
1247
+ L2
1248
+ h(hZd)
1249
+ = ∥Θh ∗ f∥2
1250
+ ˙H−s
1251
+ h
1252
+ (Ωh)
1253
+ (4.1)
1254
+ and so we only need to prove that
1255
+ (4.2)
1256
+ lim
1257
+ h→∞ ∥Θh ∗ f∥2
1258
+ ˙H−s
1259
+ h
1260
+ (Ωh) = ∥f∥2
1261
+ ˙H−s(Ω).
1262
+ Step 2: Representation of the error. For each h > 0, let uh : hZd → R be the solution of
1263
+
1264
+ (−∆h)suh(x) = Θh ∗ f(x),
1265
+ x ∈ hZd ∩ Ω,
1266
+ uh(x) = 0,
1267
+ x ∈ hZd \ Ω
1268
+ and let u ∈ Hs(Rd) be the solution of
1269
+
1270
+ (−∆)su(x) = f(x),
1271
+ x ∈ Ω,
1272
+ u(x) = 0,
1273
+ x ∈ Rd \ Ω.
1274
+ Moreover, let ˜Θ, ˜θ be functions satisfying the assumptions of Theorem 1.3 with k := max
1275
+ � d
1276
+ 2 + s, s
1277
+
1278
+ and l := max
1279
+ � d
1280
+ 2 − s, 0
1281
+
1282
+ ; for example, let us take ˜Θ to be a B-spline of order ⌈k⌉ and ˜θ any smooth
1283
+ mollifier. Then, let us define ˜Θh and ˜θh as before and let ˜uh : hZd → R be the solution of
1284
+
1285
+ (−∆h)s˜uh(x) = ˜Θh ∗ f(x),
1286
+ x ∈ hZd ∩ Ω,
1287
+ ˜uh(x) = 0,
1288
+ x ∈ hZd \ Ω.
1289
+ Then, we can write
1290
+ ∥Θh ∗ f∥2
1291
+ ˙H−s
1292
+ h
1293
+ (Ωh) − ∥f∥2
1294
+ ˙H−s(Ω) = (Θh ∗ f, uh)L2
1295
+ h(hZd) − (f, u)L2(Rd)
1296
+ = J1 + J2 + J3 + J4 + J5,
1297
+ (4.3)
1298
+ where
1299
+ J1 := (Θh ∗ f, uh)L2
1300
+ h(hZd) − (Θh ∗ f, ˜uh)L2
1301
+ h(hZd),
1302
+ J2 := (Θh ∗ f, ˜uh)L2
1303
+ h(hZd) − (Θh ∗ f, ˜θh ∗ u)L2
1304
+ h(hZd),
1305
+ J3 := (Θh ∗ f, ˜θh ∗ u)L2
1306
+ h(hZd) − (f, ˜θh ∗ u)L2
1307
+ h(hZd),
1308
+ J4 := (f, ˜θh ∗ u)L2
1309
+ h(hZd) − (f, ˜θh ∗ u)L2(Rd),
1310
+ J5 := (f, ˜θh ∗ u)L2(Rd) − (f, u)L2(Rd).
1311
+ We need to show that Ji → 0 as h → 0. This implies (4.2), as required. The most important term is
1312
+ J2, for which we shall need to use Theorem 1.3; the other terms will be straightforward to control.
1313
+ Step 3: Estimate of J2. Let t > s be a constant to be chosen later. Our choices of k, l ensure that
1314
+ the assumptions of Theorem 1.3 are all satisfied. Theorem 1.3 and the discrete Poincaré inequality
1315
+ (see Lemma A.2) then imply that
1316
+ J2 = (Θh ∗ f, ˜uh − ˜θh ∗ u)L2
1317
+ h(hZd)
1318
+
1319
+ SCALING LIMITS FOR FRACTIONAL POLYHARMONIC GAUSSIAN FIELDS
1320
+ 15
1321
+ ≤ ∥Θh ∗ f∥L2
1322
+ h(hZd)∥˜uh − ˜θh ∗ u∥L2
1323
+ h(hZd)
1324
+ ≤ C∥Θh ∗ f∥L2
1325
+ h(hZd)∥˜uh − ˜θh ∗ u∥ ˙Hs
1326
+ h(hZd)
1327
+ ≤ C∥f∥L∞(Rd)ht−s∥u∥ ˙Ht(Rd).
1328
+ For t−s small enough (depending on s and Ω), Lemma A.4 implies that we have Ht-regularity-estimates
1329
+ on Ω and hence in particular ∥u∥ ˙Ht(Rd) < ∞. Thus J2 → 0 as h → 0.
1330
+ Step 3: Estimate of J1, J3, J4, J5. For J1, using again the discrete Poincaré inequality, we estimate
1331
+ J1 = (Θh ∗ f, uh − ˜uh)L2
1332
+ h(hZd)
1333
+ ≤ ∥Θh ∗ f∥L2
1334
+ h(hZ)d∥uh − ˜uh∥L2
1335
+ h(hZd)
1336
+ ≤ C∥f∥L∞(Rd)∥uh − ˜uh∥ ˙Hs
1337
+ h(Ωh)
1338
+ ≤ C∥f∥L∞(Rd)∥Θh ∗ f − ˜Θh ∗ f∥ ˙H−s
1339
+ h
1340
+ (Ωh)
1341
+ ≤ C∥f∥L∞(Rd)∥Θh ∗ f − ˜Θh ∗ f∥L2
1342
+ h(Ωh)
1343
+ ≤ Ch∥f∥L∞(Rd)∥∇f∥L∞(Rd);
1344
+ where the right-hand side tends to 0 as h → 0. The same argument also applies to J3.
1345
+ For J5, it suffices to observe that ˜θh ∗ u tends to u in L2(Rd). Finally, for J4, we use the fact that
1346
+ ˜θh ∗ u is continuous (and thus f · (˜θh ∗ u) is continuous), and so
1347
+ lim
1348
+ h→0(f, ˜θh ∗ u)L2
1349
+ h(hZd) = (f, u)L2(Rd)
1350
+ as a Riemann sum.
1351
+
1352
+ 4.2. Scaling limit in Besov, Sobolev and Hölder spaces. We now turn to the proof of the scaling
1353
+ limit in Besov spaces (which then implies the result in Sobolev and Hölder spaces as well). As we have
1354
+ already established convergence of the fields in the space of distributions, the main challenge is to
1355
+ prove tightness in Besov spaces. To this end, we use a very convenient criterion from [9]. As in our
1356
+ case we do not need to worry about boundary issues, we do not the full generality of that criterion.
1357
+ Let us state the version that we will use.
1358
+ Lemma 4.1 (Tightness criterion). Let r ∈ N and let ˆΩ ⊂ Rd be an open bounded set. Then there
1359
+ exist functions f, (gj)2d−1
1360
+ j=1
1361
+ ∈ Cr
1362
+ c (Rd) such that, for any multi-index m ∈ Nd with |m| < r and any
1363
+ j ∈ {1, . . . , 2d − 1}, we have
1364
+ (4.4)
1365
+
1366
+ Rd xmgj(x) dx = 0
1367
+ and such that the following statement holds. Let (φn)n∈N be a family of random linear forms on Cr
1368
+ c (Rd)
1369
+ with support in ˆΩ. Let t, t′ ∈ R with t < t′, |t|, |t′| < r and let p ∈ [1, ∞), q ∈ [1, ∞]. Let us suppose
1370
+ that there exists a constant C such that
1371
+ (4.5)
1372
+ lim sup
1373
+ n→∞
1374
+ sup
1375
+ x∈Rd (E |⟨φn, f(· − x)⟩|p)1/p < ∞
1376
+ and
1377
+ (4.6)
1378
+ lim sup
1379
+ n→∞
1380
+ sup
1381
+ k∈N
1382
+ sup
1383
+ x∈Rd
1384
+ max
1385
+ 1≤j≤2d−1 (E |⟨φn, gj(2a(· − x))⟩|p)1/p ≤
1386
+ C
1387
+ 2a(d+t′) .
1388
+ Then the family (φn)n∈N is tight in ˆBt
1389
+ p,q(Rd). If t < t′ − d
1390
+ p, it is also tight in ˆBt
1391
+ ∞,q(Rd).
1392
+ Proof. This is essentially [9, Theorem 2.30]. There a local version of the theorem is given. The global
1393
+ version presented here is obtained by choosing U = Rd, ˆΩ ⊂ K1 ⊂ K2 ⊂ . . . such that already K1 is far
1394
+ larger than ˆΩ, k1 = k2 = . . . = 0 and observing that, for functions with uniformly compact support,
1395
+ the local and global Besov spaces agree.
1396
+
1397
+ 16
1398
+ N. DE NITTI AND F. SCHWEIGER
1399
+ We also used lim supn→∞ instead of supn∈N in (4.5) and (4.6), but this clearly does not make a
1400
+ difference. Finally, the assertion that
1401
+
1402
+ Rd xmgj(x) dx = 0 is stated in [9, Equation (2.2)].
1403
+
1404
+ Proof of Theorem 1.2. Step 1: Simplifications. It suffices to prove tightness of Ihϕh in the corre-
1405
+ sponding spaces; the convergence then follows easily from Theorem 1.1 by the same argument as in
1406
+ [7, Proof of Theorem 3.11]. In order to prove tightness, we will apply Lemma 4.1. We fix some open
1407
+ bounded set ˆΩ ⋑ Ω and note that for h small enough Ihϕh is supported in ˆΩ. Let us fix some r ∈ N
1408
+ with r >
1409
+ ��s − d
1410
+ 2
1411
+ �� and let f, (gj) be as in the lemma. We claim that, for any p′ < ∞,
1412
+ lim sup
1413
+ h→0
1414
+ sup
1415
+ x∈Rd Eh
1416
+ ���(Ihϕh, f(· − x))Lp′(Rd)
1417
+ ���
1418
+ p′
1419
+ < ∞,
1420
+ (4.7)
1421
+ lim sup
1422
+ h→0
1423
+ sup
1424
+ a∈N
1425
+ sup
1426
+ x∈Rd
1427
+ max
1428
+ 1≤j≤2d−1 Eh
1429
+ ���(Ihϕh, gj(2a(· − x)))Lp′(Rd)
1430
+ ���
1431
+ p′
1432
+
1433
+ C
1434
+ 2a(d+2s) .
1435
+ (4.8)
1436
+ Once we have verified this, Lemma 4.1 (with t′ = s − d
1437
+ 2) directly implies tightness in ˆBs′
1438
+ p,q(Rd) for any
1439
+ p ∈ [1, ∞), q ∈ [1, ∞], and choosing p′ sufficiently large such that s′ < t′ − d
1440
+ p′ we cover the case p = ∞
1441
+ as well. Once we know tightness in Besov spaces, the tightness in Sobolev- and Hölder spaces follows
1442
+ directly from Besov embedding.
1443
+ Regarding (4.5) and (4.6), we can make some immediate simplifications. First of all, it suffices to
1444
+ check the two estimates for p′ ∈ 2N (the result for other p′ then follows from Jensen’s inequality).
1445
+ In addition, as ϕh is a Gaussian random variable, all even functions of linear functionals of ϕh are
1446
+ controlled by its second moment. This means that we only need to consider p′ = 2. That is, we
1447
+ actually only need to verify that
1448
+ lim sup
1449
+ h→0
1450
+ sup
1451
+ x∈Rd Eh
1452
+ ��(Ihϕh, f(· − x))L2(Rd)
1453
+ ��2 < ∞,
1454
+ (4.9)
1455
+ lim sup
1456
+ h→0
1457
+ sup
1458
+ k∈N
1459
+ sup
1460
+ x∈Rd
1461
+ max
1462
+ 1≤j≤2d−1 Eh
1463
+ ��(Ihϕh, gj(2a(· − x)))L2(Rd)
1464
+ ��2 ≤
1465
+ C
1466
+ 22a(d+t′) =
1467
+ C
1468
+ 2a(d+2s) .
1469
+ (4.10)
1470
+ The estimate (4.10) is the crucial one. So we give its proof in detail, and then explain how to prove
1471
+ (4.9) as well.
1472
+ Step 2: Proof of (4.10). Let us fix some h ≤ 1, a ∈ N, x ∈ Rd, and abbreviate ˜g(a)
1473
+ j
1474
+ (y) := gj(−2ay).
1475
+ A computation similar to the one in (4.1) shows that
1476
+ Eh
1477
+ ��(Ihϕh, gj(2a(· − x)))L2(Rd)
1478
+ ��2 = Eh
1479
+ ������
1480
+
1481
+ y∈Rd
1482
+
1483
+ z∈hZd
1484
+ hdϕh(z)Θh(y − z)gj(2a(y − x)) dy
1485
+ ������
1486
+ 2
1487
+ = Eh
1488
+
1489
+ � �
1490
+ z∈hZd
1491
+ hdϕh(z)
1492
+
1493
+ y∈Rd Θh(y − z) ˜f (a)
1494
+ j
1495
+ (x − y) dy
1496
+
1497
+
1498
+ 2
1499
+ = Eh
1500
+
1501
+ ϕh, (Θh ∗ ˜g(a)
1502
+ j
1503
+ )(x − ·)
1504
+ �2
1505
+ L2
1506
+ h(Ωh)
1507
+ = ∥(Θh ∗ ˜g(a)
1508
+ j
1509
+ )(x − ·)∥2
1510
+ ˙H−s
1511
+ h
1512
+ (Ωh)
1513
+ ≤ ∥(Θh ∗ ˜g(a)
1514
+ j
1515
+ )(x − ·)∥2
1516
+ ˙H−s
1517
+ h
1518
+ (hZd).
1519
+ (4.11)
1520
+ We estimate the right-hand side of (4.11) by arguing in Fourier space (similarly as in the proof of
1521
+ Theorem 1.3). Namely, using Lemma 3.1 and the fact that the Fourier transform of a convolution is
1522
+ the product of the Fourier transforms, we compute
1523
+ Eh
1524
+ ��(Ihϕh, gj(2a(· − x)))L2(Rd)
1525
+ ��2
1526
+
1527
+
1528
+ (− π
1529
+ h , π
1530
+ h)
1531
+ d Mh(ξ)−2s|Fh[(Θh ∗ ˜g(a)
1532
+ j
1533
+ )(x − ·)](ξ)|2 dξ
1534
+
1535
+ SCALING LIMITS FOR FRACTIONAL POLYHARMONIC GAUSSIAN FIELDS
1536
+ 17
1537
+ =
1538
+
1539
+ (− π
1540
+ h , π
1541
+ h)
1542
+ d Mh(ξ)−2s
1543
+ ������
1544
+
1545
+ ζ∈ 2π
1546
+ h Zd
1547
+ F[(Θh ∗ ˜g(a)
1548
+ j
1549
+ )(x − ·)](ξ + ζ)
1550
+ ������
1551
+ 2
1552
+
1553
+ =
1554
+
1555
+ (− π
1556
+ h , π
1557
+ h)
1558
+ d Mh(ξ)−2s
1559
+ ������
1560
+
1561
+ ζ∈ 2π
1562
+ h Zd
1563
+ F[(Θh(x − ·)](ξ + ζ)F[˜g(a)
1564
+ j
1565
+ (x − ·)](ξ + ζ)
1566
+ ������
1567
+ 2
1568
+ dξ.
1569
+ Next, we fix some t with d
1570
+ 2 < t < k − s and use the Cauchy-Schwarz inequality (as in the proof of
1571
+ Theorem 1.3) to rewrite this as
1572
+ Eh
1573
+ ��(Ihϕh, gj(2a(· − x)))L2(Rd)
1574
+ ��2
1575
+
1576
+
1577
+ (− π
1578
+ h , π
1579
+ h)
1580
+ d Mh(ξ)−2s
1581
+
1582
+ � �
1583
+ ζ∈ 2π
1584
+ h Zd
1585
+ � 1
1586
+ h + |ξ + ζ|
1587
+ �2t
1588
+ |F[Θh(x − ·)](ξ + ζ)|2|F[˜g(a)
1589
+ j
1590
+ (x − ·)](ξ + ζ)|2
1591
+
1592
+
1593
+ ×
1594
+
1595
+ � �
1596
+ ζ∈ 2π
1597
+ h Zd
1598
+ 1
1599
+ � 1
1600
+ h + |ξ + ζ|
1601
+ �2t
1602
+
1603
+ � dξ.
1604
+ (4.12)
1605
+ Observing that
1606
+ sup
1607
+ ξ∈(− π
1608
+ h , π
1609
+ h)
1610
+ d
1611
+
1612
+ ζ∈ 2π
1613
+ h Zd
1614
+ 1
1615
+ � 1
1616
+ h + |ξ + ζ|
1617
+ �2t ≤ C
1618
+
1619
+ ζ∈ 2π
1620
+ h Zd
1621
+ h2t
1622
+ (1 + h|ζ|)2t ≤ Ch2t
1623
+ as well as the fact that Mh(ξ) is 2π
1624
+ h -periodic, we can rewrite (4.12) as
1625
+ Eh
1626
+ ��(Ihϕh, gj(2a(· − x)))L2(Rd)
1627
+ ���2
1628
+ ≤ Ch2t
1629
+
1630
+ (− π
1631
+ h , π
1632
+ h)
1633
+ d Mh(ξ + ζ)−2s
1634
+
1635
+ ζ∈ 2π
1636
+ h Zd
1637
+ � 1
1638
+ h + |ξ + ζ|
1639
+ �2t
1640
+ |F[Θh(x − ·)](ξ + ζ)|2|F[˜g(a)
1641
+ j
1642
+ (x − ·)](ξ + ζ)|2 dξ
1643
+ = Ch2t
1644
+
1645
+ Rd Mh(ξ)−2s
1646
+ � 1
1647
+ h + |ξ|
1648
+ �2t
1649
+ |F[Θh(x − ·)](ξ)|2|F[˜g(a)
1650
+ j
1651
+ (x − ·)](ξ)|2 dξ.
1652
+ (4.13)
1653
+ After all these manipulations, we have rewritten the term to be estimated as an integral involving the
1654
+ absolute values of the Fourier transforms of Θh, ˜g(a)
1655
+ j
1656
+ . To complete the proof, we use our assumptions
1657
+ on Θh, ˜g(a)
1658
+ j
1659
+ to bound these Fourier transforms.
1660
+ Regarding Θh, we know that F[Θh](ξ) = F[Θ](hξ); so assumption (1.3) implies that |F[Θh](ξ)| ≤
1661
+ C
1662
+ (�d
1663
+ j=1 sin2(hξj))k/2
1664
+ hk|ξ|k
1665
+ and
1666
+ (4.14)
1667
+ |F[Θh(x·)](ξ)| ≤ C
1668
+ (�d
1669
+ j=1 sin2(hξj))k/2
1670
+ hk|ξ|k
1671
+ .
1672
+ Regarding ˜g(a)
1673
+ j
1674
+ , we first note that F[˜g(a)
1675
+ j
1676
+ ](ξ) = F[gj(−2a·)](ξ) =
1677
+ 1
1678
+ 2ad F[gj]
1679
+
1680
+ − ξ
1681
+ 2a
1682
+
1683
+ . As gj ∈ Cr
1684
+ c (Rd), we
1685
+ know that F[gj] is smooth and decays at least like
1686
+ 1
1687
+ |ξ|r as ξ → ∞. On the other hand, the moments of
1688
+ gj up to order r − 1 vanish by (4.4) and so ∇mF[gj](0) = 0 for any m ≤ r − 1. By Taylor’s theorem,
1689
+ this implies |F[gj](ξ)| ≤ C|ξ|r. Altogether, we conclude that |F[gj](ξ)| ≤ C
1690
+ |ξ|r
1691
+ (1+|ξ|)2r and thus also
1692
+ |F[˜g(a)
1693
+ j
1694
+ ](ξ)| ≤ C 1
1695
+ 2ad
1696
+ ��� ξ
1697
+ 2a
1698
+ ���
1699
+ r
1700
+
1701
+ 1 +
1702
+ ��� ξ
1703
+ 2a
1704
+ ���
1705
+ �2r =
1706
+ C|ξ|r
1707
+ 2a(d+r)(1 + 2−a|ξ|)2r
1708
+
1709
+ 18
1710
+ N. DE NITTI AND F. SCHWEIGER
1711
+ and
1712
+ (4.15)
1713
+ |F[˜g(a)
1714
+ j
1715
+ (x − ·)](ξ)| ≤
1716
+ C|ξ|r
1717
+ 2a(d+r)(1 + 2−a|ξ|)2r .
1718
+ Returning to (4.13), we obtain that
1719
+ Eh
1720
+ ��(Ihϕh, gj(2a(· − x)))L2(Rd)
1721
+ ��2
1722
+ ≤ Ch2t
1723
+
1724
+ Rd
1725
+ h2s
1726
+ �d
1727
+ j=1 sin2(hξj))s
1728
+ (1 + h|ξ|)2t
1729
+ h2t
1730
+ �����
1731
+ (�d
1732
+ j=1 sin2(hξj))k/2
1733
+ hk|ξ|k
1734
+ �����
1735
+ 2 ����
1736
+ |ξ|r
1737
+ 2a(d+r)(1 + 2−a|ξ|)2r
1738
+ ����
1739
+ 2
1740
+
1741
+ ≤ C h2(s−k)
1742
+ 22a(d+r)
1743
+
1744
+ Rd
1745
+ (1 + h|ξ|)2t(�d
1746
+ j=1 sin2(hξj))k−s
1747
+ |ξ|2(k−r)(1 + 2−a|ξ|)4r
1748
+ dξ.
1749
+ (4.16)
1750
+ In particular, the integrand decays like
1751
+ 1
1752
+ |ξ|2(k+r−t) and so our assumptions t < k − s and r >
1753
+ ��s − d
1754
+ 2
1755
+ �� ≥
1756
+ d
1757
+ 2 − s ensure its integrability.
1758
+ We distinguish the two cases whether h < 2−a or h ≥ 2−a. In the former case, we can bound the
1759
+ integral on the right-hand side of (4.16) as
1760
+
1761
+ Rd
1762
+ (1 + h|ξ|)2t(�d
1763
+ j=1 sin2(hξj))k−s
1764
+ |ξ|2(k−r)(1 + 2−a|ξ|)4r
1765
+
1766
+ ≤ C
1767
+
1768
+ |ξ|≤2a
1769
+ 1 · (h|ξ|)2(k−s)
1770
+ |ξ|2(k−r) · 1
1771
+ dξ + C
1772
+
1773
+ 2a<|ξ|≤1/h
1774
+ 1 · (h|ξ|)2(k−s)
1775
+ |ξ|2(k−r) · (2−a|ξ|)4r + C
1776
+
1777
+ |ξ|>1/h
1778
+ (h|ξ|)2t · 1
1779
+ |ξ|2(k−r)(2−a|ξ|)4r dξ
1780
+ ≤ C2adh2(k−s)22a(r−s) + C 1
1781
+ hd 24arh2(k−s)h2(r+s) + C 1
1782
+ hd 24arh2th2(k+r−t)
1783
+ ≤ C2a(d+2r−2s)h2(k−s) �
1784
+ 1 + 2a(2r+2s−d)h2r+2s−d + 2a(2r+2s−d)h2r+2s−d�
1785
+ ≤ C2a(d+2r−2s)h2(k−s),
1786
+ where in the last step we used that 2ah < 1 and 2r + 2s − d > 0. In case h ≥ 2−a, we can similarly
1787
+ estimate the integral by
1788
+
1789
+ Rd
1790
+ (1 + h|ξ|)2t(�d
1791
+ j=1 sin2(hξj))k−s
1792
+ |ξ|2(k−r)(1 + 2−a|ξ|)4r
1793
+
1794
+ ≤ C
1795
+
1796
+ |ξ|≤1/h
1797
+ 1 · (h|ξ|)2(k−s)
1798
+ |ξ|2(k−r) · 1
1799
+ dξ + C
1800
+
1801
+ 1/h<|ξ|≤2a
1802
+ (h|ξ|)2t · 1
1803
+ |ξ|2(k−r) · 1 + C
1804
+
1805
+ |ξ|>2a
1806
+ (h|ξ|)2t · 1
1807
+ |ξ|2(k−r)(2−a|ξ|)4r dξ
1808
+ ≤ C 1
1809
+ hd h2(k−s)h2(s−r) + C2adh2t22a(−k+r+t) + C2ad24arh2t22a(−k−r+t)
1810
+ ≤ C2a(d+2r−2s)h2(k−s) �
1811
+ 2a(−d−2r+2s)h−d−2r+2s + 22a(−k+s+t)h2(−k+s+t + 22a(−k+s+t)h2(−k+s+t)�
1812
+ ≤ C2a(d+2r−2s)h2(k−s).
1813
+ Thus, in any case, the integral on the right-hand side of (4.16) is bounded by C2a(d+2r−2s)h2(k−s).
1814
+ Using this, (4.16) implies (4.10).
1815
+ Step 3: Proof of (4.9). The proof of (4.9) is similar. One difference is that we no longer need to
1816
+ prove decay of the term in question, only boundedness. On the other hand, the function f does not
1817
+ satisfy a moment bound like (4.4) and so we have less control over the behavior of F[f] near 0. To
1818
+ deal with the latter problem, we will use the Poincaré inequality on a suitable bounded domain ˜˜Ωh
1819
+ right in the beginning of the argument to replace the term
1820
+ 1
1821
+ Mh(ξ)2s with
1822
+ 1
1823
+ (1+Mh(ξ)2)s and thereby make
1824
+ sure there is no singularity at 0.
1825
+
1826
+ SCALING LIMITS FOR FRACTIONAL POLYHARMONIC GAUSSIAN FIELDS
1827
+ 19
1828
+ In more detail, let us fix some bounded domain ˜Ω ⋑ ˆΩ such that supp(f(x − ·)) ⊂ ˜Ω whenever
1829
+ x ∈ ˆΩ. Then (4.9) vanishes for x ̸∈ ˜Ω, and we can restrict attention to x ∈ ˜Ω. Let us fix yet another
1830
+ bounded domain ˜˜Ω such that supp(f(x − ·)) ⊂ ˜˜Ω when x ∈ ˜Ω, and let ˜˜Ωh = ˜˜Ω ∩ hZd.
1831
+ We also abbreviate ˜f(y) = f(−y). Arguing as for (4.10) we find that, for x ∈ ˜Ω and h ≤ 1,
1832
+ Eh
1833
+ ��(Ihϕh, f(2a(· − x)))L2(Rd)
1834
+ ��2 ≤ ∥(Θh ∗ ˜f (a))(x − ·)∥2
1835
+ ˙H−s
1836
+ h
1837
+ (Ωh) ≤ ∥(Θh ∗ ˜f (a))(x − ·)∥2
1838
+ ˙H−s
1839
+ h
1840
+ (˜˜Ωh).
1841
+ Since supp(f(x−·))∗Ωh ⊂ ˜˜Ω, we use Poincaré’s inequality on ˜˜Ωh to deduce that the ∥·∥ ˙H−s
1842
+ h
1843
+ (˜˜Ωh)-norm
1844
+ is bounded by a multiple of the ∥ · ∥H−s
1845
+ h
1846
+ (˜˜Ωh)-norm. Using this, we can now continue with a calculation
1847
+ similar as the one for (4.10) to obtain
1848
+ Eh
1849
+ ��(Ihϕh, f(2a(· − x)))L2(Rd)
1850
+ ��2
1851
+ ≤ ∥(Θh ∗ ˜f)(x − ·)∥2
1852
+ H−s
1853
+ h
1854
+ (˜˜Ωh)
1855
+ ≤ ∥(Θh ∗ ˜f)(x − ·)∥2
1856
+ H−s
1857
+ h
1858
+ (hZd)
1859
+ =
1860
+
1861
+ (− π
1862
+ h , π
1863
+ h)
1864
+ d(1 + Mh(ξ)2)−s
1865
+ ������
1866
+
1867
+ ζ∈ 2π
1868
+ h Zd
1869
+ F[(Θh(x − ·)](ξ + ζ)F[ ˜f(x − ·)](ξ + ζ)
1870
+ ������
1871
+ 2
1872
+
1873
+ ≤ Ch2t
1874
+
1875
+ Rd(1 + Mh(ξ)2)−s
1876
+ � 1
1877
+ h + |ξ|
1878
+ �2t
1879
+ |F[(Θh(x − ·)](ξ)|2|F[ ˜f(x − ·)](ξ)|2 dξ.
1880
+ Using the bound (4.14) for F[Θh] as well as the estimate
1881
+ |F[ ˜f(x − ·)](ξ)| ≤
1882
+ C
1883
+ (1 + |ξ|)r
1884
+ (the analogue of (4.15)), we obtain that
1885
+ Eh
1886
+ ��(Ihϕh, f(2a(· − x)))L2(Rd)
1887
+ ��2 ≤ Ch2(s−k)
1888
+
1889
+ Rd
1890
+ (1 + h|ξ|)2t(�d
1891
+ j=1 sin2(hξj))k
1892
+ (h2 + (�d
1893
+ j=1 sin2(hξj))2)s|ξ|2k(1 + |ξ|)2r dξ
1894
+ and (splitting the integral into three integrals over |ξ| ≤ 1, 1 < |ξ| ≤ 1/h, and 1/h < |ξ|) we see as
1895
+ before that the right-hand side is indeed bounded by a constant.
1896
+
1897
+ Finally, let us give the argument for convergence of the maximum of the subcritical discrete FGF.
1898
+ Some technicalities arise because Theorem 1.2 applies to Ihϕh while we are interested in ϕh itself. So
1899
+ we need to argue that the regularity of Ihϕh implies that ϕh is necessarily close to Ihϕh.
1900
+ Proof of Corollary 1.4. Step 1: Consequences of Theorem 1.2. Let k = d > s + d
1901
+ 2 and take Θ to be a
1902
+ product of one-dimensional B-splines of order k, i.e.
1903
+ F[Θ](ξ) =
1904
+ d
1905
+
1906
+ j=1
1907
+ �sin(ξ)
1908
+ ξ
1909
+ �k
1910
+ .
1911
+ This Θ is a compactly supported non-negative mollifier that satisfies the assumptions of Theorem 1.2.
1912
+ Moreover, let us fix some α with 0 < α < min
1913
+
1914
+ s − d
1915
+ 2, 1
1916
+
1917
+ . Theorem 1.2 implies that Ihϕh converges to
1918
+ ϕ in law with respect to the topology of C0,α(Rd). This directly implies that the maximum of Ihϕh
1919
+ converges in distribution to the maximum of ϕ. Therefore, it suffices to prove that the maximum of
1920
+ ϕh is close enough to the maximum of Ihϕh in the sense that
1921
+ (4.17)
1922
+ max
1923
+ x∈Ωh ϕh(x) − max
1924
+ y∈Rd Ihϕh(y) → 0
1925
+ in probability as h → 0.
1926
+
1927
+ 20
1928
+ N. DE NITTI AND F. SCHWEIGER
1929
+ Step 2: Regularity of ϕh. In order to prove (4.17), we need to quantify the regularity of ϕh. The
1930
+ idea here is that if ϕh oscillates a lot, then also Ihϕh oscillates a lot and hence have large C0,α-norm,
1931
+ which is unlikely. In making this rigorous, we use our choice of Θ, which simplifies some calculations.
1932
+ The function Θh has support precisely
1933
+
1934
+ − hk
1935
+ 2 , hk
1936
+ 2
1937
+ �d and is piecewise a polynomial of degree at most
1938
+ k − 1 in each variable.
1939
+ Let us take x ∈ hZd and consider an arbitrary fh : hZd → R. Then Ihfh ↾x+(0,h/2)2 is a polynomial of
1940
+ degree at most k−1 in each variable, which depends precisely on the values of fh in x+
1941
+
1942
+ − hk
1943
+ 2 , − h(k+1)
1944
+ 2
1945
+
1946
+
1947
+ hZd.
1948
+ The space of polynomials of degree at most k − 1 in each variable is an R-vector space of dimension
1949
+ exactly kd. The same holds true for the space of functions from x +
1950
+
1951
+ − hk
1952
+ 2 , − h(k+1)
1953
+ 2
1954
+
1955
+ ∩ hZd to R.
1956
+ This means that Ihfh induces a linear map between two finite-dimensional vector spaces of the same
1957
+ dimension. By standard properties of B-splines, this map is surjective and hence, in fact, bijective.
1958
+ As all norms on a finite-dimensional R-vector space are equivalent, we conclude that
1959
+ max
1960
+ y∈x+(− hk
1961
+ 2 ,− h(k+1)
1962
+ 2
1963
+ )∩hZd fh(y) ≤ C
1964
+ max
1965
+ z∈x+(0,h/2)d Ihfh(z)
1966
+ and (quotienting out constant functions) also
1967
+ max
1968
+ y,y′∈x+(− hk
1969
+ 2 ,− h(k+1)
1970
+ 2
1971
+ )∩hZd |fh(y) − fh(y′)|
1972
+ ≤ C
1973
+ max
1974
+ z,z′∈x+(0,h/2)d Ihfh(z) − Ihfh(z′) ≤ Chα∥Ihfh∥C0,α(x+(0,h/2)d).
1975
+ The constant in the latter estimate is independent of x. This means that we actually obtain
1976
+ (4.18)
1977
+ max
1978
+ y,y′∈hZd
1979
+ |y−y′|y∞≤kh
1980
+ |fh(y) − fh(y′)| ≤ Chα∥Ihfh∥C0,α(Rd).
1981
+ We know that Ihϕh converges in C0,α(Rd) and so it is, in particular, tight in that space. This means
1982
+ that, if we define
1983
+ EM =
1984
+
1985
+ [Ihϕh]C0,α(Rd)
1986
+
1987
+ ,
1988
+ then limM→∞ limh→0 P(EM) = 1. On the other hand, (4.18) implies that, on the event EM, we have
1989
+ (4.19)
1990
+ max
1991
+ y,y′∈hZd
1992
+ |y−y′|y∞≤kh
1993
+ |ϕh(y) − ϕh(y′)| ≤ CMhα.
1994
+ This is the desired regularity estimate for ϕh.
1995
+ Step 3: Completion of the proof. Our specific choice of Θ has the property that �
1996
+ x∈hZd hdΘh(y −
1997
+ x) = 1 for any y ∈ Rd. This means that Ihϕh(y) is a convex combination of the ϕh(x) with |x− y|∞ <
1998
+ hk
1999
+ 2 , and so we have
2000
+ max
2001
+ x∈Ωh ϕh(x) ≥ max
2002
+ y∈Rd Ihϕh(y),
2003
+ which implies the lower bound in (4.17). For the upper bound we need to use (4.19). As Ihϕh(y) is
2004
+ a convex combination of the ϕh(x) with |x − y|∞ < hk
2005
+ 2 , (4.19) implies that on the event EM we have
2006
+ |ϕh(x) − Ihϕ(x)| ≤ CMhα for any x ∈ hZd. Therefore, on the event EM we have
2007
+ max
2008
+ x∈Ωh ϕh(x) ≤ max
2009
+ x∈Ωh Ihϕh(x) + CMhα ≤ max
2010
+ y∈Rd Ihϕh(y) + CMhα.
2011
+ Putting these considerations together, we conclude that
2012
+ lim
2013
+ M→∞ lim
2014
+ h→0 P
2015
+
2016
+ max
2017
+ y∈Rd Ihϕh(y) ≤ max
2018
+ x∈Ωh ϕh(x) ≤ max
2019
+ y∈Rd Ihϕh(y) + CMhα
2020
+
2021
+ ,
2022
+ which yields (4.17).
2023
+
2024
+
2025
+ SCALING LIMITS FOR FRACTIONAL POLYHARMONIC GAUSSIAN FIELDS
2026
+ 21
2027
+ Appendix A. Technical lemmas
2028
+ In this appendix, we provide the proof of several technical results that have been used throughout
2029
+ the paper.
2030
+ A.1. Discretization and restriction. We start by proving that the applications of restricting to
2031
+ hZd and applying (−∆h)s commute.
2032
+ Lemma A.1 (Discretization and restriction). Let u: Rd → R be a Schwartz function. Then, restricting
2033
+ to hZd and applying (−∆h)s commute: i.e.,
2034
+ ((−∆h)su)↾hZd= (−∆h)s (u↾hZd) .
2035
+ This allows us to be rather careless about when we restrict functions to hZd. In fact, we will omit
2036
+ writing ↾hZd when (because of Lemma A.1) there is no ambiguity.
2037
+ Proof. The crucial fact here is that Mh(ξ) is 2π
2038
+ h -periodic. Using this, we compute that, for x ∈ hZd,
2039
+ ((−∆h)su) (x) =
2040
+
2041
+ Rd Mh(ξ)2sF[u](ξ) dξ
2042
+ =
2043
+
2044
+ ζ∈ 2π
2045
+ h Zd
2046
+
2047
+ (− π
2048
+ h , π
2049
+ h)
2050
+ d Mh(ξ + ζ)2sF[u](ξ + ζ) dξ
2051
+ =
2052
+
2053
+ (− π
2054
+ h , π
2055
+ h)
2056
+ d Mh(ξ)2s
2057
+
2058
+ ζ∈ 2π
2059
+ h Zd
2060
+ F[u](ξ + ζ) dξ.
2061
+ Using Lemma 3.1, we can rewrite this as
2062
+ ((−∆h)su) (x) =
2063
+
2064
+ (− π
2065
+ h , π
2066
+ h)
2067
+ d Mh(ξ)2sFh[u](ξ) dξ
2068
+ = (−∆h)s (u↾hZd) ,
2069
+ which is what we wanted to show.
2070
+
2071
+ A.2. Discrete inequalities. Let us state the discrete Poincaré inequality that we used in the proof.
2072
+ Lemma A.2. Let Ω ⊂ Rd be a bounded domain with Lipschitz boundary and let s > 0. Then, there
2073
+ exists a constant C such that, for any uh : hZd → R that vanishes outside of Ωh, we have
2074
+ ∥uh∥L2(Ωh) ≤ C∥uh∥ ˙Hs
2075
+ h(Ω).
2076
+ Proof. We shall present a discrete version of the proof in [8, Theorem 3.7]. The key idea is to use
2077
+ Plancherel’s theorem and split low and high frequencies as follows:
2078
+ ∥uh∥2
2079
+ L2(Ω) =
2080
+
2081
+ Bϵ(0)
2082
+ |Fhuh(ξ)|2 dξ +
2083
+
2084
+ (−π/h,π/h)d\Bϵ(0)
2085
+ |Fhuh(ξ)|2 dξ
2086
+ =: I1 + I2,
2087
+ where ϵ > 0 is to be fixed later on.
2088
+ Step 1. Low-frequencies. For the low-frequency part, I1, Hölder’s inequality yields
2089
+ |Fhuh(ξ)| ≤ ∥uh∥L1(Ωh) ≤ |Ωh|1/2hd/2∥uh∥L2(Ωh),
2090
+ where we used the notation
2091
+ ∥uh∥Lp
2092
+ h(Ωh) :=
2093
+ � �
2094
+ x∈Ωh
2095
+ hd|uh|p
2096
+ � 1
2097
+ p
2098
+ ,
2099
+ p ∈ [1, +∞).
2100
+ Therefore, we have
2101
+ I1 ≤ ϵdB1(0)|Ωh|hd∥uh∥2
2102
+ L2
2103
+ h(Ωh).
2104
+
2105
+ 22
2106
+ N. DE NITTI AND F. SCHWEIGER
2107
+ Step 2. High-frequencies. For the high-frequency part, I2, we compute
2108
+
2109
+ (−π/h,π/h)d\Bϵ(0)
2110
+ |Fhuh(ξ)|2 dξ =
2111
+
2112
+ (−π/h,π/h)d\Bϵ(0)
2113
+ Mh(ξ)2s|Fhuh(ξ)|2
2114
+ Mh(ξ)2s
2115
+
2116
+ ≤ ϵ−2s∥(−∆h)s/2uh∥2
2117
+ L2
2118
+ h(Rd).
2119
+ Step 3. Conclusion. Choosing 0 < ϵ < (|Ωh|hd|B1(0)|)−1/d, we conclude
2120
+ ∥uh∥L2(Ωh) ≤
2121
+ ϵ−s
2122
+
2123
+ 1 − ϵd|Ωh|hd|B1(0)|
2124
+ ∥uh∥Hs
2125
+ h(Ω).
2126
+ By considering a square of side L ≥ diam(Ω) (containing Ωh), we deduce that |Ωh| ≤ C
2127
+ hd (note that is
2128
+ holds even if h ≫ diam(Ω)). This means that Ωh|hd|B1(0)| ≤ C, and so we can make a choice of ε > 0
2129
+ independent of h. This concludes the proof.
2130
+
2131
+ Remark A.3 (Generalized Poincaré inequality). Let s ≥ t ≥ 0. Arguing as in [8, Theorem 1.5], Lemma
2132
+ A.2 also implies that, for u ∈ ˜Hs(Ω), there exists a constant c = c(d, Ω, s) > 0 such that
2133
+ ∥(−∆h)t/2uh∥L2(Ωh) ≤ c∥(−∆h)s/2uh∥L2(Ωh)).
2134
+ Indeed,
2135
+ ∥(−∆h)t/2uh∥L2(Ω) = ∥uh∥ ˙Ht
2136
+ h(Ω) ≤ ∥uh∥Ht
2137
+ h(Ω) ≤ ∥uh∥Hs
2138
+ h(Ω) ≤ 2
2139
+ s+1
2140
+ 2 (∥uh∥L2(Ωh) + ∥uh∥ ˙Hs
2141
+ h(Ω))
2142
+ ≤ 2
2143
+ s+1
2144
+ 2 (c∥(−∆h)s/2uh∥L2(Ωh) + ∥(−∆h)s/2uh∥L2(Ωh))
2145
+ = c∥(−∆h)s/2uh∥L2(Ωh).
2146
+ We also used the fact that solutions of the Dirichlet problem for (−∆)s have a little bit of additional
2147
+ regularity.
2148
+ Lemma A.4. Let Ω ⊂ Rd be a bounded domain with Lipschitz boundary and let s ≥ 0. Then, there
2149
+ exists κ0 > 0 with the following property. If 0 ≤ κ ≤ κ0, then, for each f ∈ H−s+κ(Ω), there exists
2150
+ a unique u ∈ ˙Hs+κ(Ω) such that (−∆)su = f in the sense of distributions; moreover, we have the
2151
+ estimate
2152
+ ∥u∥ ˙Hs+κ(Ω) ≤ Cκ∥f∥ ˙H−s+κ(Ω)
2153
+ for a constant Cκ depending only on κ.
2154
+ Let us remark that according to [3, Theorem 2.3] one can take any κ0 < 1
2155
+ 2 here. The argument,
2156
+ however, is rather complicated; so we prefer to present an easy perturbative argument that gives
2157
+ existence of some κ0 > 0 (which is enough for our purposes).
2158
+ Proof. We adapt the argument used in [19, Theorem 3.3] for the biharmonic operator to the fractional
2159
+ case.
2160
+ We first show that the claimed estimate holds for κ = 0. To do so, we test the equation with u and
2161
+ deduce
2162
+ ∥(−∆)s/2u∥2
2163
+ L2(Ω) = (u, (−∆)su)L2(Ω) = (u, f)L2(Ω) ≤ ∥u∥ ˙Hs(Ω)∥f∥ ˙H−s(Ω).
2164
+ Using Poincaré’s inequality, we see that indeed
2165
+ ∥u∥ ˙Hs(Ω) ≤ Cκ∥f∥ ˙H−s(Ω)
2166
+ To show that we also can take some κ > 0, we use a stability result for analytic families
2167
+ of operators on Banach spaces:
2168
+ The spaces
2169
+ ˙Hs(Ω) form an interpolation family with respect to
2170
+ complex interpolation; thus, by [21, Proposition 4.1], the set of those α for which the operator
2171
+ (−∆)s :
2172
+ ˙Hα(Ω) →
2173
+ ˙Hα−2s(Ω) has a bounded inverse is open. We have seen that this set contains
2174
+ s, so the existence of κ0 as in the statement of the theorem follows.
2175
+
2176
+
2177
+ SCALING LIMITS FOR FRACTIONAL POLYHARMONIC GAUSSIAN FIELDS
2178
+ 23
2179
+ Appendix B. Fractional Gaussian Fields via eigenfunctions
2180
+ In this appendix, we shall present an alternate description of the continuous FGF. As remarked in
2181
+ Section 2.1, (−∆)s is an isometry from ˙Hs(Ω) to ˙H−s(Ω). Its inverse, restricted to L2(Ω), is a positive-
2182
+ definitive compact operator on L2(Ω); so, by the spectral theorem, there exists an orthonormal basis
2183
+ (v1, v2, . . .) of L2(Ω) consisting of eigenfunctions of (−∆)s with associated eigenvalues 0 < λ1 ≤ λ2 ≤
2184
+ . . .. Let Xj be a collection of independent standard Gaussians, and let ˜ϕ be the random variable
2185
+ ˜ϕ = �∞
2186
+ j=1
2187
+ Xj
2188
+
2189
+ λj vj.
2190
+ According to Lemma B.1 below, this sum converges almost surely in ˙Hs′(Ω) ⊂ ˙Hs′(Rd) for any
2191
+ s′ < s − d
2192
+ 2. Therefore, ˜ϕ is a well-defined random variable on ˙Hs′(Ω) ⊂ ˙Hs′(Rd). Every element of
2193
+ ˙Hs′(Rd) induces an element of S′(Rd) and so we can think of ˜ϕ as a random element of S′(Rd). Again,
2194
+ according to Lemma B.1, for any f ∈ S(Rd) we have that ( ˜ϕ, f) is a centered Gaussian with variance
2195
+ ∥f∥ ˙H−s(Ω). This means that ˜ϕ has the law P on S′(Rd) and so we can identify ϕ and ˜ϕ.
2196
+ Let us present the aforementioned lemma.
2197
+ Lemma B.1. Let Ω ⊂ Rd be a bounded domain with Lipschitz boundary. Let s ≥ 0 and s′ < s − d
2198
+ 2 be
2199
+ arbitrary.
2200
+ (i) The series
2201
+ ˜ϕ :=
2202
+
2203
+
2204
+ j=1
2205
+ Xj
2206
+
2207
+ λj
2208
+ vj
2209
+ converges almost surely in ˙Hs′(Ω).
2210
+ (ii) For any f ∈ S(Rd), we have
2211
+ E( ˜ϕ, f)2 = ∥f∥2
2212
+ ˙H−s(Ω).
2213
+ For the proof, we need a sharp estimate on the eigenfunction expansion of a function.
2214
+ Lemma B.2. Let Ω ⊂ Rd be a bounded domain with Lipschitz boundary. Let s ≥ 0 and s′ ≤ s be
2215
+ arbitrary. Then, for any f ∈ ˙Hs′(Ω), we have
2216
+ (B.1)
2217
+ ∥f∥2
2218
+ ˙Hs′(Ω) ≤ C
2219
+
2220
+
2221
+ j=1
2222
+ λs′/s
2223
+ j
2224
+ (f, vj)2
2225
+ L2(Rd).
2226
+ Note that we make no claim about the ˙Hs′-regularity for s′ > s.
2227
+ Proof. For s′ ∈ {−s, 0, s} the estimate (B.1) follows directly from the definition. We next claim that
2228
+ (B.1) holds whenever −s ≤ s′ ≤ s. To see this, we adapt the argument in [17, Corollary 1]. Namely
2229
+ take first 0 < s′ < s. Consider (−∆)s restricted to functions in
2230
+ ˙Hs(Ω) and let ((−∆)s)s′/s
2231
+ N
2232
+ be its
2233
+ (spectral) s′
2234
+ s -th power. Explicitly,
2235
+ ((−∆)s)s′/s
2236
+ N
2237
+ f =
2238
+
2239
+
2240
+ j=1
2241
+ λs′/s
2242
+ j
2243
+ (f, vj)L2(Rd)vj
2244
+ Note that, if we define ˙Hs′(Ω) to be the space of functions in L2(Ω) such that this quantity is finite,
2245
+ then the domain of ((−∆)s)s′/s
2246
+ N
2247
+ is exactly ˙Hs′(Ω). According to the theory of interpolation of fractional
2248
+ powers of self-adjoint operators (see, e.g., [23, Section 1.18.10]), the Hilbert spaces
2249
+ ˙Hs′(Ω) form an
2250
+ interpolation scale. However, we know that the same holds true for the Hilbert spaces ˙Hs′(Ω), and
2251
+ moreover ˙Hs′(Ω) = ˙Hs′(Ω) (with equivalent norms) for s′ ∈ {0, s}, and so we have actually have this
2252
+ equality for any s′ with 0 ≤ s′ ≤ s. So, for 0 ≤ s′ ≤ s, there is some C > 0 such that
2253
+ 1
2254
+ C
2255
+
2256
+
2257
+ j=1
2258
+ λs′/s
2259
+ j
2260
+ (f, vj)2
2261
+ L2(Rd) ≤ ∥f∥2
2262
+ ˙Hs′(Ω) ≤ C
2263
+
2264
+
2265
+ j=1
2266
+ λs′/s
2267
+ j
2268
+ (f, vj)2
2269
+ L2(Rd)
2270
+
2271
+ 24
2272
+ N. DE NITTI AND F. SCHWEIGER
2273
+ By duality, the same holds true for −s ≤ s′ ≤ 0. Putting these considerations together, we obtain a
2274
+ statement even stronger than (B.1).
2275
+ It remains to study the case that s′ < −s. We proceed inductively. Let us suppose that we know
2276
+ that (B.1) holds for s′ ≥ −(2k − 1)s, for some k ∈ N, and let us consider some s′ with −(2k + 1)s ≤
2277
+ s′ ≤ −(2k − 1)s. We have that
2278
+ ∥f∥2
2279
+ ˙Hs′(Ω) =
2280
+ inf
2281
+ g∈ ˙Hs′(Rd)
2282
+ f=g in Ω
2283
+ ∥g∥2
2284
+ ˙H−s(Rd).
2285
+ Let u be such that
2286
+
2287
+ (−∆)su(x) = f(x),
2288
+ x ∈ Ω,
2289
+ u(x) = 0,
2290
+ x ∈ Rd \ Ω.
2291
+ We can choose g = (−∆)su and obtain, using the induction hypothesis, that
2292
+ ∥f∥2
2293
+ ˙Hs′(Ω) ≤ ∥(−∆)su∥2
2294
+ ˙Hs′(Rd)
2295
+ ≤ ∥u∥2
2296
+ ˙Hs′+2s(Rd)
2297
+ ≤ C
2298
+
2299
+
2300
+ j=1
2301
+ λ(s′+2s)/s
2302
+ j
2303
+ (u, vj)2
2304
+ L2(Rd)
2305
+ = C
2306
+
2307
+
2308
+ j=1
2309
+ λ(s′+2s)/s
2310
+ j
2311
+
2312
+ u, (−∆)svj
2313
+ λj
2314
+ �2
2315
+ L2(Rd)
2316
+ = C
2317
+
2318
+
2319
+ j=1
2320
+ λs′/s
2321
+ j
2322
+ ((−∆)su, vj)2
2323
+ L2(Rd)
2324
+ = C
2325
+
2326
+
2327
+ j=1
2328
+ λs′/s
2329
+ j
2330
+ (f, vj)2
2331
+ L2(Rd) .
2332
+ This completes the induction step.
2333
+
2334
+ Proof of Lemma B.1. Claim (i). By the Hilbert-space-valued version of Kolmogorov’s two series the-
2335
+ orem (see e.g. [11, Corollary on p. 386]), the series
2336
+
2337
+
2338
+ j=1
2339
+ Xj
2340
+
2341
+ λj
2342
+ vj
2343
+ converges almost surely in ˙Hs′(Ω) if
2344
+
2345
+
2346
+ j=1
2347
+ �����
2348
+ 1
2349
+
2350
+ λj
2351
+ uj
2352
+ �����
2353
+ 2
2354
+ ˙Hs′(Ω)
2355
+ < ∞.
2356
+ From Lemma B.2, we know in particular that
2357
+ ∥vj∥2
2358
+ ˙Hs′(Ω) ≤ λs′/s
2359
+ j
2360
+ .
2361
+ Moreover, by Weyl’s law for the operator (−∆)s restricted to ˙Hs(Ω) (as follows, e.g., from the main
2362
+ result of [10]), we have that
2363
+ λj ≍ j2s/d.
2364
+ Therefore,
2365
+
2366
+
2367
+ j=1
2368
+ �����
2369
+ 1
2370
+
2371
+ λj
2372
+ vj
2373
+ �����
2374
+ 2
2375
+ ˙Hs′(Ω)
2376
+
2377
+
2378
+
2379
+ j=1
2380
+ λs′/s−1
2381
+ j
2382
+
2383
+ SCALING LIMITS FOR FRACTIONAL POLYHARMONIC GAUSSIAN FIELDS
2384
+ 25
2385
+
2386
+
2387
+
2388
+ j=1
2389
+ (cj)2s/d·(s′/s−1) ≤ C
2390
+
2391
+
2392
+ j=1
2393
+ j2(s′−s)/d,
2394
+ and this sum is indeed convergent if s′ − s < − d
2395
+ 2.
2396
+ Claim (ii). Let f ∈ S(Rd). The functions vj are by definition orthonormal in L2(Ω), and the Xj
2397
+ are independent. So we can calculate that
2398
+ E( ˜ϕ, f)2 = E
2399
+
2400
+
2401
+
2402
+
2403
+ j=1
2404
+ Xj
2405
+
2406
+ λj
2407
+ (vj, f)
2408
+
2409
+
2410
+ 2
2411
+ =
2412
+
2413
+
2414
+ j=1
2415
+ 1
2416
+ λj
2417
+ (vj, f)2 =
2418
+
2419
+ �f,
2420
+
2421
+
2422
+ j=1
2423
+ 1
2424
+ λj
2425
+ (vj, f)vj
2426
+
2427
+
2428
+ =
2429
+
2430
+ f, (−∆)−sf
2431
+
2432
+ = ∥f∥2
2433
+ H−s(Ω).
2434
+
2435
+ Acknowledgments
2436
+ N. De Nitti is a member of the Gruppo Nazionale per l’Analisi Matematica, la Probabilità e le
2437
+ loro Applicazioni (GNAMPA) of the Istituto Nazionale di Alta Matematica (INdAM). He has been
2438
+ supported by the Alexander von Humboldt Foundation and by the TRR-154 project of the Deutsche
2439
+ Forschungsgemeinschaft (DFG, German Research Foundation).
2440
+ F. Schweiger is supported by the Foreign Postdoctoral Fellowship Program of the Israel Academy
2441
+ of Sciences and Humanities, and partially by ISF grant No. 421/20.
2442
+ We thank O. Zeitouni and E. Zuazua for helpful comments on the topic of this work.
2443
+ References
2444
+ [1] N. Abatangelo. Higher-order fractional Laplacians:
2445
+ An overview. Bruno Pini Mathematical Analysis Seminar,
2446
+ 12(1):53–80, 2021.
2447
+ [2] F. Baudoin and L. Chen. Dirichlet fractional Gaussian fields on the Sierpinski gasket and their discrete graph
2448
+ approximations. ArXiv:2201.03970, 2022.
2449
+ [3] J. P. Borthagaray, W. Li, and R. H. Nochetto. Fractional elliptic problems on Lipschitz domains: Regularity and
2450
+ approximation. ArXiv:2212.14070, 2022.
2451
+ [4] M. Bramson, J. Ding, and O. Zeitouni. Convergence in law of the maximum of the two-dimensional discrete Gaussian
2452
+ free field. Comm. Pure Appl. Math., 69(1):62–123, 2016.
2453
+ [5] A. Chiarini, A. Cipriani, and R. S. Hazra. Extremes of some Gaussian random interfaces. J. Stat. Phys., 165(3):521–
2454
+ 544, 2016.
2455
+ [6] O. Ciaurri, L. Roncal, P. R. Stinga, J. L. Torrea, and J. L. Varona. Nonlocal discrete diffusion equations and the
2456
+ fractional discrete Laplacian, regularity and applications. Adv. Math., 330:688–738, 2018.
2457
+ [7] A. Cipriani, B. Dan, and R. S. Hazra. The scaling limit of the membrane model. Ann. Probab., 47(6):3963–4001,
2458
+ 2019.
2459
+ [8] G. Covi, K. Mönkkönen, and J. Railo. Unique continuation property and Poincaré inequality for higher order
2460
+ fractional Laplacians with applications in inverse problems. Inverse Probl. Imaging, 15(4):641–681, 2021.
2461
+ [9] M. Furlan and J.-C. Mourrat. A tightness criterion for random fields, with application to the Ising model. Electron.
2462
+ J. Probab., 22:Paper No. 97, 29, 2017.
2463
+ [10] L. Geisinger. A short proof of Weyl’s law for fractional differential operators. J. Math. Phys., 55(1):011504, 7, 2014.
2464
+ [11] I. I. Gikhman and A. V. Skorokhod. The theory of stochastic processes. I. Classics in Mathematics. Springer-Verlag,
2465
+ Berlin, 2004. Translated from the Russian by S. Kotz, Reprint of the 1974 edition.
2466
+ [12] Z. Hao, Z. Zhang, and R. Du. Fractional centered difference scheme for high-dimensional integral fractional Lapla-
2467
+ cian. J. Comput. Phys., 424:Paper No. 109851, 17, 2021.
2468
+ [13] Y. Huang and A. Oberman. Finite difference methods for fractional Laplacians. ArXiv:1611.00164, 2016.
2469
+ [14] B. S. Jovanović and E. Süli. Analysis of finite difference schemes, volume 46 of Springer Series in Computational
2470
+ Mathematics. Springer, London, 2014. For linear partial differential equations with generalized solutions.
2471
+
2472
+ 26
2473
+ N. DE NITTI AND F. SCHWEIGER
2474
+ [15] A. Lodhia, S. Sheffield, X. Sun, and S. S. Watson. Fractional Gaussian fields: a survey. Probab. Surv., 13:1–56,
2475
+ 2016.
2476
+ [16] S. Müller and F. Schweiger. Estimates for the Green’s function of the discrete bilaplacian in dimensions 2 and 3.
2477
+ Vietnam J. Math., 47(1):133–181, 2019.
2478
+ [17] R. Musina and A. I. Nazarov. On fractional Laplacians. Comm. Partial Differential Equations, 39(9):1780–1790,
2479
+ 2014.
2480
+ [18] M. A. Pinsky. Introduction to Fourier analysis and wavelets, volume 102 of Graduate Studies in Mathematics.
2481
+ American Mathematical Society, Providence, RI, 2009. Reprint of the 2002 original.
2482
+ [19] F. Schweiger. The maximum of the four-dimensional membrane model. Ann. Probab., 48(2):714–741, 2020.
2483
+ [20] S. Sheffield. Gaussian free fields for mathematicians. Probab. Theory Related Fields, 139(3-4):521–541, 2007.
2484
+ [21] A. Tabacco Vignati and M. Vignati. Spectral theory and complex interpolation. J. Funct. Anal., 80(2):383–397,
2485
+ 1988.
2486
+ [22] V. Thomée. Elliptic difference operators and Dirichlet’s problem. Contributions to Differential Equations, 3:301–324,
2487
+ 1964.
2488
+ [23] H. Triebel. Interpolation theory, function spaces, differential operators, volume 18 of North-Holland Mathematical
2489
+ Library. North-Holland Publishing Co., Amsterdam-New York, 1978.
2490
+ [24] H. Triebel. Function spaces in Lipschitz domains and on Lipschitz manifolds. Characteristic functions as pointwise
2491
+ multipliers. Rev. Mat. Complut., 15(2):475–524, 2002.
2492
+ (N. De Nitti) Friedrich-Alexander-Universität Erlangen-Nürnberg, Department of Data Science, Chair
2493
+ for Dynamics, Control and Numerics (Alexander von Humboldt Professorship), Cauerstr.
2494
+ 11, 91058
2495
+ Erlangen, Germany.
2496
+ Email address: [email protected]
2497
+ (F. Schweiger) Weizmann Institute of Science, Department of Mathematics, Rehovot 7610001, Israel.
2498
+ Email address: [email protected]
2499
+
1dFST4oBgHgl3EQfWjig/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
1tFST4oBgHgl3EQfWzjN/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:e0391595b492961764aa0433a07af0e0ccdf77f459d9f45a9f691e8cb3f9fc7e
3
+ size 5832749
2NAyT4oBgHgl3EQfPvY8/content/tmp_files/2301.00029v1.pdf.txt ADDED
@@ -0,0 +1,408 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ arXiv:2301.00029v1 [math-ph] 31 Dec 2022
2
+ Generalized conformal maps as classical symmetries of
3
+ Yang-Mills fields
4
+ Edward B. Baker III∗
5
+ January 3, 2023
6
+ We show that a class of previously defined maps, called causal and
7
+ self-dual morphisms, form classical symmetries of Yang-Mills fields
8
+ in four complex dimensions. These maps generalize conformal trans-
9
+ formations, and admit a nonlocal pullback connection that preserves
10
+ the equations of the theory. First it is shown that self-dual mor-
11
+ phisms form symmetries of the anti-self-dual Yang-Mills equations
12
+ under this pullback. Then a supersymmetric generalization of causal
13
+ morphisms is defined which preserves solutions of the field equations
14
+ for N=3 supersymmetric Yang-Mills theory. As a special case, this
15
+ implies that a modified definition of causal morphisms form sym-
16
+ metries for the ordinary Yang-Mills field equations.
17
+ 1
18
+ Introduction
19
+ Hidden symmetries have played an important role in the study of Yang-Mills (YM) theory.
20
+ As an example, the anti-self dual Yang Mills (ASDYM) equations have an infinite class
21
+ of hidden symmetries which bear some resemblance to the infinite-dimensional conformal
22
+ group in two dimensions [1][2][3]. In addition, an extended conformal symmetry called
23
+ dual superconformal invariance has been uncovered in the study of N=4 supersymmetric
24
+ Yang-Mills (SYM) theory [4][5], leading to an infinite dimensional Yangian symmetry [6].
25
+ This and other advances have led to powerful tools for the study of N=4 SYM.
26
+ Many of these results can be understood best with the use of twistor and ambitwistor
27
+ methods, which have been used extensively in the study of Yang-Mills fields. For example,
28
+ the Penrose-Ward correspondence reformulates the ASDYM equations in Twistor space,
29
30
+ 1
31
+
32
+ which leads to the ADHM construction of instantons [7][8][9]. This construction was gen-
33
+ eralized to a geometric formulation of the Yang-Mills field equations in ambitwistor space,
34
+ with a natural interpretation in superspace [10][11][12][13]. More recently, twistor and am-
35
+ bitwistor methods have been used in string theory to understand Yang-Mills scattering
36
+ amplitudes and their properties [14][15].
37
+ In this paper we investigate a previously defined class of generalized maps [16] in
38
+ the context of Yang-Mills theory. These maps are motivated by twistor and ambitwistor
39
+ theory, and are called self-dual and causal morphisms, respectively. Under certain as-
40
+ sumptions, one can define a non-local pullback connection under these transformations
41
+ that preserves integrability on certain subspaces. In the case of self-dual morphisms, the
42
+ maps preserve integrability on self-dual planes which imply that they are symmetries of
43
+ the ASDYM equations. A supersymmetric generalization of causal morphisms is then
44
+ developed which preserves integrability on super null lines, implying that these maps are
45
+ symmetries of the N=3 SYM field equations. This fact is used to show that a modified
46
+ version of causal morphisms are symmetries of the YM field equations as a special case.
47
+ It is likely that some of these symmetries are related to known hidden symmetries for
48
+ the different cases, but characterizing these relationships will be left as a topic of future
49
+ investigation.
50
+ 2
51
+ Self-dual morphisms as symmetries of ASDYM
52
+ Self-dual morphisms were introduced in a previous paper, where they were defined using
53
+ maps on null surfaces [16]. Here we provide a self contained summary of these results,
54
+ using different but equivalent definitions. To begin, define the twistor correspondence
55
+ space F = C4 × CP1 with the usual double fibration [17][18]
56
+ C4
57
+ π1
58
+ ←− F
59
+ π2
60
+ −→ PT ,
61
+ (1)
62
+ where PT = CP3 is the projective twistor space of C4. Now define a self-dual embedding
63
+ as a totally null holomorphic embedding χ : C2 → C4, which means that vectors at a
64
+ point t ∈ C2 are mapped under χ⋆ to vectors of the form vα ˙α = λα˜λ ˙α for ˜λ ˙α fixed. We
65
+ will call the image of such a map a self-dual surface. If ˜λ is independent of t then this
66
+ surface maps to a self-dual plane (or α-plane) Z. Furthermore, for any point on a self-dual
67
+ embedding there is a tangent α-plane passing through χ(t) that is characterized by ˜λ(t).
68
+ For brevity, we say that χ is tangent to ˜λ at t. Now define the self-dual prolongation
69
+ jsχ : C2 → F by jsχ = (χ, ˜λ), where dependence on t is suppressed. The prolongation
70
+ satisfies a contact condition, that χ is tangent to ˜λ for all t ∈ C2. Conversely, given a
71
+ surface ψ : C2 → F, we say that it satisfies the contact condition if ψ = jsχ for some
72
+ self-dual embedding χ. A map f : F → F is said to preserve the contact condition if
73
+ 2
74
+
75
+ f ◦ jsχ satisfies the contact condition for any χ.1 We then define
76
+ Definition 1. A self-dual morphism is a holomorphic map f : F → F which preserves
77
+ the contact condition.
78
+ Defined in this way, a self-dual morphism naturally induces maps on self-dual embed-
79
+ dings and self-dual planes
80
+ Definition 2. Given a self-dual morphism f and a self-dual embedding χ, define the
81
+ contraction map f⌟χ := π1 ◦ f ◦ jsχ. Furthermore, for a self-dual plane Z tangent to ˜λ,
82
+ define f⌟Z : Z → C4 by f⌟Z(x) = π1 ◦ f(x, ˜λ) where x ∈ Z.
83
+ This map on surfaces was the starting point for the definitions in the previous paper,
84
+ and the two definitions are equivalent.
85
+ Now consider a GL(n, C) connection with vector potential A satisfying the ASDYM
86
+ equations on MC = C4. Given a self-dual morphism f, there is a natural definition for
87
+ a pullback connection f ∗A. To see this, first restrict to a self-dual plane Z, which can
88
+ be parameterized linearly by coordinates on C2. The contraction map f⌟Z then gives
89
+ a self-dual embedding, and the pullback connection (f⌟Z)∗A is integrable on Z because
90
+ the curvature of A vanishes on the self-dual planes tangent to f⌟Z as a consequence
91
+ of ASDYM. By varying Z this allows us to define the bundle of parallel sections on
92
+ the twistor space, and to use the Penrose-Ward procedure to define a connection on
93
+ the pullback bundle, which defines the pullback connection f ∗A and gives a solution of
94
+ ASDYM. This requires that the bundle of parallel sections is trivial for points x ∈ C4,
95
+ which will be shown with an explicit construction of f ∗A.
96
+ For the construction, consider two points x1, x2 ∈ Z and their images yi = f⌟Z(xi).
97
+ Define a Wilson line for the pullback connection by
98
+ W ∗
99
+ Z(x1, x2) = Wf⌟Z(y1, y2) = P exp
100
+ ��
101
+ γ
102
+ Aµdxµ
103
+
104
+ .
105
+ (2)
106
+ Here the path of integration is any path γ confined to the image of f⌟Z starting at y1
107
+ and ending at y2. The Wilson line is independent of path due to the integrability of the
108
+ connection on self-dual surfaces. We can then define the patching matrix used in the
109
+ Penrose-Ward correspondence by
110
+ G = W ∗
111
+ Z(q, p) = ˜HH−1
112
+ (3)
113
+ where
114
+ H = W ∗
115
+ Z(p, x),
116
+ ˜H = W ∗
117
+ Z(q, x).
118
+ (4)
119
+ 1These constructions are all assumed to be local and defined in some neighborhood, but are written
120
+ globally for ease of notation.
121
+ 3
122
+
123
+ Here p and q are the points of intersection between Z and self-dual planes P and Q with
124
+ twistor coordinates ˆP = (0, 0, 1, 0) and ˆQ = (0, 0, 0, 1), as defined in the usual patching
125
+ construction. The patching matrix descends to the twistor space, and the splitting formula
126
+ guarantees that the bundle is trivial, so the bundle satisfies the conditions of the Penrose-
127
+ Ward correspondence. We therefore can recover a self-dual pullback connection f ∗A. This
128
+ all assumes that the integrals are non-singular, which depends on the details of the maps,
129
+ connections and domains under consideration.
130
+ To gain intuition for this construction, it is useful to derive an explicit formula for f ∗A.
131
+ To this end, restrict to a self-dual plane Z and use the formula ˜λ ˙αf ∗Aα ˙α = H−1˜λ ˙α∂α ˙αH
132
+ from the Penrose-Ward correspondence, in addition to equation (4), to find
133
+ v · f ∗A|x= (f⌟Z)∗v · A|f⌟Z(x),
134
+ x ∈ Z, v ∈ TxZ.
135
+ (5)
136
+ By varying the self-dual plane through a fixed point x this gives the value for null vectors
137
+ v ∈ TxC4, and the value on other vectors can be recovered from linearity of the connection.
138
+ Linearity and self-duality follow from the Penrose-Ward construction, but it is instructive
139
+ to derive these results directly from equation (5), which can be expanded as
140
+ (f⌟Z)∗v · A|f⌟Z(x)= vα ˙α�∂yβ ˙β
141
+ ∂xα ˙α Aβ ˙β
142
+ ����
143
+ f⌟Z(x), x ∈ Z, v ∈ TxZ,
144
+ (6)
145
+ where yβ ˙β = f⌟Z(x)β ˙β. This equation is degree one in both λ and ˜λ and globally holo-
146
+ morphic on CP 1 × CP 1, and so is linear by Liouville’s theorem. Self-duality is equivalent
147
+ to the connection being integrable on self-dual planes, which follows from using equa-
148
+ tion (5) to show that [v1 · D∗, v2 · D⋆] = 0, where v1,2 ∈ TxZ are linearly independent
149
+ vectors tangent to a self-dual plane Z. These arguments generalize well to the N = 3
150
+ supersymmetric case.
151
+ 3
152
+ Super causal morphisms and N=3 SYM
153
+ In this section we will define a super causal morphism, which is an extension of the pre-
154
+ viously defined causal morphisms to superspace. The supersymmetric generalization is
155
+ useful because of an interpretation of the N=3 SYM field equations as an integrability
156
+ condition on supersymmetric null lines [10][12]. This interpretation allows for a gener-
157
+ alization of the arguments of the previous section to the N = 3 SYM field equations.
158
+ Furthermore, solutions of the usual YM field equations are special cases of the supersym-
159
+ metric solutions, and this will be used to show that a modified version of causal morphisms
160
+ are also symmetries of the ordinary YM field equations.
161
+ The definition of super causal morphisms follows closely to the previous definitions.
162
+ To begin, consider the superspace C4|4N with coordinates zA = (xα ˙α, θiα, ˜θ ˙α
163
+ j ) and super-
164
+ symmetry generators qiα =
165
+
166
+ ∂θiα + i˜θ ˙α
167
+ i
168
+
169
+ ∂xα ˙α and ˜qi
170
+ ˙α =
171
+
172
+ ∂˜θ ˙α
173
+ i + iθiα
174
+
175
+ ∂xα ˙α. The lightlike lines
176
+ 4
177
+
178
+ through z ∈ C4|4N and tangent to (λ, ˜λ) are generated by fermionic translation operators
179
+ Ti = λαqαi and ˜T i = ˜λ ˙α˜qi
180
+ ˙α which satisfy the algebra
181
+ {Ti, Tj} = { ˜T i, ˜T j} = 0,
182
+ {Ti, ˜T j} = 2iδj
183
+ i D,
184
+ (7)
185
+ where D = λα˜λ ˙α∂α ˙α. Define the correspondence space (F 6|4N, π1, C4|4N) as the bundle
186
+ over superspace whose fiber at a point z is the set of super null lines that intersect z.
187
+ These fibers are isomorphic to CP 1 ×CP 1, corresponding to the projective spinors λ and
188
+ ˜λ that generate bosonic translations along a given null line.
189
+ The super null lines described above have one complex dimension and 2N fermionic
190
+ dimensions, which can be parameterized by coordinates σ = (s, ξi, ˜ξj) ∈ C1|2N.
191
+ The
192
+ supersymmetry generators on this line are ∂s, qi = ∂ξi + i˜ξi∂s and ˜qi = ∂˜ξi + iξi∂s. More
193
+ generally, we can also consider a super null curve, which is a morphism χ : C1|2N → C4|4N
194
+ whose pushforward χ∗ takes the form
195
+ (∂s, qi, ˜qk) → (∂, Mj
196
+ i tj, ˜
197
+ Mk
198
+ l ˜tl),
199
+ (8)
200
+ at every point σ, where the operators (∂, tj, ˜tl) are defined for a super null line that is
201
+ tangent to χ at χ(σ). As with the self-dual case, we can then define the prolongation
202
+ jcχ : C1|2N → F 6|4N by jcχ = (χ, λ, ˜λ), and given a curve ψ : C1|2N → F 6|4N we say that
203
+ it satisfies the contact condition if ψ = jcχ for some nonsingular null curve χ. As before,
204
+ a map f : F 6|4N → F 6|4N preserves the contact condition if f ◦ jcχ satisfies the contact
205
+ condition for any χ. Furthermore, for a super null line L tangent to (λ, ˜λ), we also define
206
+ f⌟L(z) = π1 ◦ f(z, λ, ˜λ) ∀z ∈ L as before.
207
+ In the supersymmetric case there is an extra consideration necessary to ensure inte-
208
+ grability of the pullback connection. To see this, consider a morphism f : F 6|4N → F 6|4N
209
+ which preserves the contact condition. Given a super null line L, we want to demand
210
+ that the supersymmetry relations (7) are preserved under (f⌟L)∗. By construction, this
211
+ pushforward takes the form of equation (8), where the coordinates on L are also chosen
212
+ to satisfy the supersymmetry relations. To preserve these relations, we must demand
213
+ Mi
214
+ j ˜
215
+ Mj
216
+ k = δi
217
+ k.
218
+ (9)
219
+ This condition must be satisfied for every super null line L, which is the condition that
220
+ must be satisfied for integrability.
221
+ We can now define
222
+ Definition 3. A super causal morphism is a holomorphic map f : F 6|4N → F 6|4N which
223
+ preserves the contact condition, and preserves the supersymmetry relations (7) under
224
+ (f⌟L)⋆ for tangent vectors to any super null line L.
225
+ Now consider an N=3 supersymmetric Yang-Mills field satisfying the field equations
226
+ on C4|12. This field can be defined by a superconnection characterized by a one form Φ
227
+ with components ΦA = (ωiα, ˜ωi
228
+ ˙α, Aα ˙α), which defines covariant derivative operators
229
+ Qiα = qiα + ωiα, ˜Qi
230
+ ˙α = qi
231
+ ˙α + ˜ωi
232
+ ˙α, Dα ˙α = ∂α ˙α + Aα ˙α.
233
+ (10)
234
+ 5
235
+
236
+ The field equations are equivalent to integrability on super null lines [12], which for a
237
+ given line L tangent to vα ˙α = λα˜λ ˙α are given by equations (7) for the translation operators
238
+ Ti = λαQiα, ˜T i = ˜λ ˙α ˜Qi
239
+ ˙α and D = λα˜λ ˙αDα ˙α.
240
+ Now, given a super causal morphism f, we can define the pullback connection f ∗Φ
241
+ similarly to the self-dual case.
242
+ To do so, consider a super null line L, and the super
243
+ null curve f⌟L it generates. The bundle of parallel sections on these super null lines
244
+ then generates a pullback connection in the usual manner. To calculate this pullback
245
+ connection, we can directly generalize equation (5) to
246
+ v · f ∗Φ|z= (f⌟L)∗v · Φ|f⌟L(z),
247
+ z ∈ L, v ∈ TxL.
248
+ (11)
249
+ As in the previous section, linearity of the pullback connection follows from a variant
250
+ of Liouville’s theorem. Integrability on lines follows from writing (7) for the pullback
251
+ translation operators defined on L, and then using (11) and the assumption that Φ is
252
+ integrable on lines.
253
+ This implies that super causal morphisms are symmetries of the
254
+ N = 3 SYM field equations.
255
+ 4
256
+ Reduction to Yang-Mills field equations
257
+ The geometric interpretation of the YM field equations using field extensions can be
258
+ naturally understood by viewing these equations as a special case of the N=3 SYM field
259
+ equations for a Yang-Mills super multiplet with the scalar and spinor fields set to zero
260
+ [10][12][13][19]. In a similar spirit, it is possible to use a modified definition of causal
261
+ morphisms to generate an N=3 super causal morphism which preserves the property that
262
+ the scalar and spinor fields equal zero, thus forming a symmetry of the YM field equations.
263
+ A causal morphism can be defined as an N = 0 super causal morphism, or a map
264
+ f : G → G that preserves the contact condition, where G = F 4|0 is the usual ambitwistor
265
+ correspondence space. Given such a function, we can construct an extended morphism
266
+ ˆf : F 6|4N → F 6|4N given by
267
+ ˆf(g, θiα, ˜θ ˙α
268
+ j ) = (f(g), [V −1]α
269
+ βθiβ, [ ˜V −1] ˙α
270
+ ˙β ˜θ
271
+ ˙β
272
+ j ), g ∈ G,
273
+ (12)
274
+ where V , ˜V are invertible matrix functions of g. Now restrict to a super null line L tangent
275
+ to a null vector vα ˙α = λα˜λ ˙α. Along L, the supersymmetry relations (7) are preserved if
276
+ and only if
277
+ vβ ˙βV α
278
+ β ˜V ˙α
279
+ ˙β = ((f⌟L0)∗v)α ˙α,
280
+ (13)
281
+ where L0 is the bosonic projection of L. The existence of holomorphically varying matrix
282
+ functions V and ˜V satisfying this condition is the extra modification necessary to extend
283
+ a causal morphism f to ˆf, and will be assumed.
284
+ The above construction yields a symmetry of the N = 3 SYM field equations, but we
285
+ must also show that solutions of the YM field equations, with scalar and spinor fields set
286
+ 6
287
+
288
+ to zero, are preserved by these extended causal morphisms. To do so, we will use two
289
+ results proved by Harnad et. al. [13]. In that paper, theorem 3.3 characterizes the form
290
+ of the superconnection induced from a solution of the YM field equations when embedded
291
+ as a gauge fixed N=3 SYM connection, which is
292
+ ωiα = ˜θ ˙α
293
+ i hα ˙α(xβ ˙β, τ β ˙β),
294
+ ˜ωi
295
+ α = θiα˜hα ˙α(xβ ˙β, τ β ˙β),
296
+ (14)
297
+ where τ β ˙β = �
298
+ i θiβ ˜θ
299
+ ˙β
300
+ i , Aα ˙α = Aα ˙α(xβ ˙β, τ β ˙β), and the gauge condition is θiαωiα+˜θi
301
+ ˙α˜ω ˙α
302
+ i = 0.
303
+ Conversely, corollary 4.3 shows that a gauge-fixed connection that is integrable on super
304
+ null lines and takes the above form corresponds to an N = 3 extended solution of the YM
305
+ field equations.
306
+ Based on these considerations, showing that the extended causal morphisms preserve
307
+ the form of equation (14) and the gauge condition implies that they preserve solutions
308
+ of the YM field equations. To show this, restrict to a super null line L and use (11) to
309
+ compute the pullback connection of (14), which gives
310
+ λα ˆf ∗ωiα(z) = ˜θ
311
+ ˙β
312
+ i λα �
313
+ V β
314
+ α hβ ˙β(x′, τ ′)
315
+
316
+ ,
317
+ ˜λ ˙α ˆf ∗˜ωi
318
+ ˙α(z) = θiβ˜λ ˙α �
319
+ ˜V
320
+ ˙β
321
+ ˙α ˜hβ ˙β(x′, τ ′)
322
+
323
+ ,
324
+ (15)
325
+ where x′, τ ′ are evaluated at ˆf⌟L(z).
326
+ Now consider two points z1, z2 ∈ C4|4N with
327
+ x1 = x2 and τ1 = τ2, lying on two parallel lines. Under ˆf⌟L, τ transforms as τ α ˙α →
328
+ [V −1]α
329
+ β[ ˜V −1] ˙α
330
+ ˙βτ β ˙β, so the quantities in parentheses are the same for these two points and
331
+ parallel lines, but the line can be varied, so this is true for any (λ, ˜λ). We therefore see
332
+ that the connection has the form of equation (14), as desired. Furthermore, the gauge
333
+ condition can be written τ α ˙α(hα ˙α + ˜hα ˙α) = 0. For τ α ˙α proportional to a null vector this
334
+ condition is preserved, but this must be true for any null line, so by linearity the gauge
335
+ condition is preserved. This implies that the pullback connection corresponds to an N = 3
336
+ extended solution of the YM field equations.
337
+ 5
338
+ Discussion
339
+ We have shown that self-dual, N = 3 super causal and causal morphisms yield symmetries
340
+ of the ASDYM, N = 3 SYM and YM field equations, respectively. To further understand
341
+ these symmetries, it will be necessary to classify their solutions and to investigate their
342
+ action on concrete examples of YM fields. Some partial results were found in the previous
343
+ paper [16], where examples of self-dual morphisms were constructed from holomorphic
344
+ endomorphisms of twistor space. A method was also developed to construct causal mor-
345
+ phisms from these self-dual morphisms. Although these constructions provide examples
346
+ of solutions, it will be important to find a more complete classification. In particular, it is
347
+ likely that there are more general examples than those constructed from endomorphisms
348
+ 7
349
+
350
+ of the twistor space, or super ambitwistor space, which could be analogous to holomorphic
351
+ functions that preserve the real line in two dimensions. This preliminary interpretation
352
+ is based on the CR ambitwistor space used in [20], but will require further investigation
353
+ to make precise. It will also be important to understand how these maps are related to
354
+ other well known hidden symmetries for these equations.
355
+ There are many additional avenues of further research. Here the action of these maps
356
+ was only considered for classical Yang-Mills fields, but the ultimate goal is to further
357
+ understand the quantum theory.
358
+ Furthermore, it will be interesting to consider how
359
+ gravitational fields transform under these maps. In this vein, one could define a causal
360
+ manifold with coordinate transformations that are morphisms of these types, in analogy
361
+ to the definition of Riemann surfaces for holomorphic functions. Due to the nonlocal
362
+ nature of these maps, the theory could lead to interesting new mathematics.
363
+ References
364
+ [1] L. Dolan, A new symmetry group of real self-dual yang-mills theory,
365
+ Physics Letters B 113 (1982) 387.
366
+ [2] L.-L. Chau, G. Mo-Lin, A. Sinha and W. Yong-Shi, Hidden-symmetry algebra for
367
+ the self-dual yang-mills equation, Physics Letters B 121 (1983) 391.
368
+ [3] A.D. Popov, Self-dual yang-mills: Symmetries and moduli space,
369
+ Reviews in Mathematical Physics 11 (1999) 1091.
370
+ [4] L. Mason and D. Skinner, Dual superconformal invariance, momentum twistors and
371
+ grassmannians, Journal of High Energy Physics 2009 (2009) 045.
372
+ [5] N. Arkani-Hamed, F. Cachazo and C. Cheung, The grassmannian origin of dual
373
+ superconformal invariance, Journal of High Energy Physics 2010 (2010) .
374
+ [6] J. Drummond, J. Henn and J. Plefka, Yangian symmetry of scattering amplitudes
375
+ in n = 4 super yang-mills theory, Journal of High Energy Physics 2009 (2009) 046.
376
+ [7] R.S. Ward, On self-dual gauge fields, Physics Letters A 61 (1977) 81.
377
+ [8] M. Atiyah, N. Hitchin, V. Drinfeld and Y. Manin, Construction of instantons,
378
+ Physics Letters A 65 (1978) 185 .
379
+ [9] M. Atiyah, A. nazionale dei Lincei and S. normale superiore (Italy), Geometry of
380
+ Yang-Mills fields, Lezioni fermiane, Scuola normale superiore (1979).
381
+ [10] E. Witten, An interpretation of classical yang-mills theory,
382
+ Physics Letters B 77 (1978) 394 .
383
+ 8
384
+
385
+ [11] J. Isenberg, P.B. Yasskin and P.S. Green, Non-self-dual gauge fields,
386
+ Physics Letters B 78 (1978) 462 .
387
+ [12] J. Harnad, J. Hurtubise, M. Legare and S. Shnider, Constraint equations and field
388
+ equations in supersymmetric n = 3 yang-mills theory,
389
+ Nuclear Physics B 256 (1985) 609.
390
+ [13] J. Harnad, J. Hurtubise and S. Shnider, Supersymmetric yang-mills equations and
391
+ supertwistors, Annals of Physics 193 (1989) 40.
392
+ [14] E. Witten, Perturbative gauge theory as a string theory in twistor space,
393
+ Communications in Mathematical Physics 252 (2004) 189.
394
+ [15] M. Atiyah, M. Dunajski and L.J. Mason, Twistor theory at fifty: from contour
395
+ integrals to twistor strings, Proceedings of the Royal Society A: Mathematical,
396
+ Physical and Engineering Sciences 473 (2017) 20170530.
397
+ [16] E.B. Baker, Causal and self-dual morphisms in four complex dimensions, 2022.
398
+ 10.48550/ARXIV.2203.07952.
399
+ [17] M. Dunajski, Solitons, Instantons, and Twistors, Oxford Graduate Texts in
400
+ Mathematics, OUP Oxford (2010).
401
+ [18] R. Ward and R. Wells, Twistor Geometry and Field Theory, Cambridge
402
+ Monographs on Mathematical Physics, Cambridge University Press (1991).
403
+ [19] M. Eastwood, Supersymmetry, twistors, and the yang-mills equations, Transactions
404
+ of the American Mathematical Society 301 (1987) 615.
405
+ [20] L. Mason and D. Skinner, An ambitwistor yang–mills lagrangian,
406
+ Physics Letters B 636 (2006) 60.
407
+ 9
408
+
2NAyT4oBgHgl3EQfPvY8/content/tmp_files/load_file.txt ADDED
@@ -0,0 +1,210 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ filepath=/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf,len=209
2
+ page_content='arXiv:2301.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
3
+ page_content='00029v1 [math-ph] 31 Dec 2022 Generalized conformal maps as classical symmetries of Yang-Mills fields Edward B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
4
+ page_content=' Baker III∗ January 3, 2023 We show that a class of previously defined maps, called causal and self-dual morphisms, form classical symmetries of Yang-Mills fields in four complex dimensions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
5
+ page_content=' These maps generalize conformal trans- formations, and admit a nonlocal pullback connection that preserves the equations of the theory.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
6
+ page_content=' First it is shown that self-dual mor- phisms form symmetries of the anti-self-dual Yang-Mills equations under this pullback.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
7
+ page_content=' Then a supersymmetric generalization of causal morphisms is defined which preserves solutions of the field equations for N=3 supersymmetric Yang-Mills theory.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
8
+ page_content=' As a special case, this implies that a modified definition of causal morphisms form sym- metries for the ordinary Yang-Mills field equations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
9
+ page_content=' 1 Introduction Hidden symmetries have played an important role in the study of Yang-Mills (YM) theory.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
10
+ page_content=' As an example, the anti-self dual Yang Mills (ASDYM) equations have an infinite class of hidden symmetries which bear some resemblance to the infinite-dimensional conformal group in two dimensions [1][2][3].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
11
+ page_content=' In addition, an extended conformal symmetry called dual superconformal invariance has been uncovered in the study of N=4 supersymmetric Yang-Mills (SYM) theory [4][5], leading to an infinite dimensional Yangian symmetry [6].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
12
+ page_content=' This and other advances have led to powerful tools for the study of N=4 SYM.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
13
+ page_content=' Many of these results can be understood best with the use of twistor and ambitwistor methods, which have been used extensively in the study of Yang-Mills fields.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
14
+ page_content=' For example, the Penrose-Ward correspondence reformulates the ASDYM equations in Twistor space, ∗edwardbaker86@gmail.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
15
+ page_content='com 1 which leads to the ADHM construction of instantons [7][8][9].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
16
+ page_content=' This construction was gen- eralized to a geometric formulation of the Yang-Mills field equations in ambitwistor space, with a natural interpretation in superspace [10][11][12][13].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
17
+ page_content=' More recently, twistor and am- bitwistor methods have been used in string theory to understand Yang-Mills scattering amplitudes and their properties [14][15].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
18
+ page_content=' In this paper we investigate a previously defined class of generalized maps [16] in the context of Yang-Mills theory.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
19
+ page_content=' These maps are motivated by twistor and ambitwistor theory, and are called self-dual and causal morphisms, respectively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
20
+ page_content=' Under certain as- sumptions, one can define a non-local pullback connection under these transformations that preserves integrability on certain subspaces.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
21
+ page_content=' In the case of self-dual morphisms, the maps preserve integrability on self-dual planes which imply that they are symmetries of the ASDYM equations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
22
+ page_content=' A supersymmetric generalization of causal morphisms is then developed which preserves integrability on super null lines, implying that these maps are symmetries of the N=3 SYM field equations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
23
+ page_content=' This fact is used to show that a modified version of causal morphisms are symmetries of the YM field equations as a special case.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
24
+ page_content=' It is likely that some of these symmetries are related to known hidden symmetries for the different cases, but characterizing these relationships will be left as a topic of future investigation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
25
+ page_content=' 2 Self-dual morphisms as symmetries of ASDYM Self-dual morphisms were introduced in a previous paper, where they were defined using maps on null surfaces [16].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
26
+ page_content=' Here we provide a self contained summary of these results, using different but equivalent definitions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
27
+ page_content=' To begin, define the twistor correspondence space F = C4 × CP1 with the usual double fibration [17][18] C4 π1 ←− F π2 −→ PT , (1) where PT = CP3 is the projective twistor space of C4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
28
+ page_content=' Now define a self-dual embedding as a totally null holomorphic embedding χ : C2 → C4, which means that vectors at a point t ∈ C2 are mapped under χ⋆ to vectors of the form vα ˙α = λα˜λ ˙α for ˜λ ˙α fixed.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
29
+ page_content=' We will call the image of such a map a self-dual surface.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
30
+ page_content=' If ˜λ is independent of t then this surface maps to a self-dual plane (or α-plane) Z.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
31
+ page_content=' Furthermore, for any point on a self-dual embedding there is a tangent α-plane passing through χ(t) that is characterized by ˜λ(t).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
32
+ page_content=' For brevity, we say that χ is tangent to ˜λ at t.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
33
+ page_content=' Now define the self-dual prolongation jsχ : C2 → F by jsχ = (χ, ˜λ), where dependence on t is suppressed.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
34
+ page_content=' The prolongation satisfies a contact condition, that χ is tangent to ˜λ for all t ∈ C2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
35
+ page_content=' Conversely, given a surface ψ : C2 → F, we say that it satisfies the contact condition if ψ = jsχ for some self-dual embedding χ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
36
+ page_content=' A map f : F → F is said to preserve the contact condition if 2 f ◦ jsχ satisfies the contact condition for any χ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
37
+ page_content='1 We then define Definition 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
38
+ page_content=' A self-dual morphism is a holomorphic map f : F → F which preserves the contact condition.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
39
+ page_content=' Defined in this way, a self-dual morphism naturally induces maps on self-dual embed- dings and self-dual planes Definition 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
40
+ page_content=' Given a self-dual morphism f and a self-dual embedding χ, define the contraction map f⌟χ := π1 ◦ f ◦ jsχ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
41
+ page_content=' Furthermore, for a self-dual plane Z tangent to ˜λ, define f⌟Z : Z → C4 by f⌟Z(x) = π1 ◦ f(x, ˜λ) where x ∈ Z.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
42
+ page_content=' This map on surfaces was the starting point for the definitions in the previous paper, and the two definitions are equivalent.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
43
+ page_content=' Now consider a GL(n, C) connection with vector potential A satisfying the ASDYM equations on MC = C4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
44
+ page_content=' Given a self-dual morphism f, there is a natural definition for a pullback connection f ∗A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
45
+ page_content=' To see this, first restrict to a self-dual plane Z, which can be parameterized linearly by coordinates on C2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
46
+ page_content=' The contraction map f⌟Z then gives a self-dual embedding, and the pullback connection (f⌟Z)∗A is integrable on Z because the curvature of A vanishes on the self-dual planes tangent to f⌟Z as a consequence of ASDYM.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
47
+ page_content=' By varying Z this allows us to define the bundle of parallel sections on the twistor space, and to use the Penrose-Ward procedure to define a connection on the pullback bundle, which defines the pullback connection f ∗A and gives a solution of ASDYM.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
48
+ page_content=' This requires that the bundle of parallel sections is trivial for points x ∈ C4, which will be shown with an explicit construction of f ∗A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
49
+ page_content=' For the construction, consider two points x1, x2 ∈ Z and their images yi = f⌟Z(xi).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
50
+ page_content=' Define a Wilson line for the pullback connection by W ∗ Z(x1, x2) = Wf⌟Z(y1, y2) = P exp �� γ Aµdxµ � .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
51
+ page_content=' (2) Here the path of integration is any path γ confined to the image of f⌟Z starting at y1 and ending at y2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
52
+ page_content=' The Wilson line is independent of path due to the integrability of the connection on self-dual surfaces.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
53
+ page_content=' We can then define the patching matrix used in the Penrose-Ward correspondence by G = W ∗ Z(q, p) = ˜HH−1 (3) where H = W ∗ Z(p, x), ˜H = W ∗ Z(q, x).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
54
+ page_content=' (4) 1These constructions are all assumed to be local and defined in some neighborhood, but are written globally for ease of notation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
55
+ page_content=' 3 Here p and q are the points of intersection between Z and self-dual planes P and Q with twistor coordinates ˆP = (0, 0, 1, 0) and ˆQ = (0, 0, 0, 1), as defined in the usual patching construction.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
56
+ page_content=' The patching matrix descends to the twistor space, and the splitting formula guarantees that the bundle is trivial, so the bundle satisfies the conditions of the Penrose- Ward correspondence.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
57
+ page_content=' We therefore can recover a self-dual pullback connection f ∗A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
58
+ page_content=' This all assumes that the integrals are non-singular, which depends on the details of the maps, connections and domains under consideration.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
59
+ page_content=' To gain intuition for this construction, it is useful to derive an explicit formula for f ∗A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
60
+ page_content=' To this end, restrict to a self-dual plane Z and use the formula ˜λ ˙αf ∗Aα ˙α = H−1˜λ ˙α∂α ˙αH from the Penrose-Ward correspondence, in addition to equation (4), to find v · f ∗A|x= (f⌟Z)∗v · A|f⌟Z(x), x ∈ Z, v ∈ TxZ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
61
+ page_content=' (5) By varying the self-dual plane through a fixed point x this gives the value for null vectors v ∈ TxC4, and the value on other vectors can be recovered from linearity of the connection.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
62
+ page_content=' Linearity and self-duality follow from the Penrose-Ward construction, but it is instructive to derive these results directly from equation (5), which can be expanded as (f⌟Z)∗v · A|f⌟Z(x)= vα ˙α�∂yβ ˙β ∂xα ˙α Aβ ˙β ���� f⌟Z(x), x ∈ Z, v ∈ TxZ, (6) where yβ ˙β = f⌟Z(x)β ˙β.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
63
+ page_content=' This equation is degree one in both λ and ˜λ and globally holo- morphic on CP 1 × CP 1, and so is linear by Liouville’s theorem.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
64
+ page_content=' Self-duality is equivalent to the connection being integrable on self-dual planes, which follows from using equa- tion (5) to show that [v1 · D∗, v2 · D⋆] = 0, where v1,2 ∈ TxZ are linearly independent vectors tangent to a self-dual plane Z.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
65
+ page_content=' These arguments generalize well to the N = 3 supersymmetric case.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
66
+ page_content=' 3 Super causal morphisms and N=3 SYM In this section we will define a super causal morphism, which is an extension of the pre- viously defined causal morphisms to superspace.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
67
+ page_content=' The supersymmetric generalization is useful because of an interpretation of the N=3 SYM field equations as an integrability condition on supersymmetric null lines [10][12].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
68
+ page_content=' This interpretation allows for a gener- alization of the arguments of the previous section to the N = 3 SYM field equations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
69
+ page_content=' Furthermore, solutions of the usual YM field equations are special cases of the supersym- metric solutions, and this will be used to show that a modified version of causal morphisms are also symmetries of the ordinary YM field equations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
70
+ page_content=' The definition of super causal morphisms follows closely to the previous definitions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
71
+ page_content=' To begin, consider the superspace C4|4N with coordinates zA = (xα ˙α, θiα, ˜θ ˙α j ) and super- symmetry generators qiα = ∂ ∂θiα + i˜θ ˙α i ∂ ∂xα ˙α and ˜qi ˙α = ∂ ∂˜θ ˙α i + iθiα ∂ ∂xα ˙α.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
72
+ page_content=' The lightlike lines 4 through z ∈ C4|4N and tangent to (λ, ˜λ) are generated by fermionic translation operators Ti = λαqαi and ˜T i = ˜λ ˙α˜qi ˙α which satisfy the algebra {Ti, Tj} = { ˜T i, ˜T j} = 0, {Ti, ˜T j} = 2iδj i D, (7) where D = λα˜λ ˙α∂α ˙α.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
73
+ page_content=' Define the correspondence space (F 6|4N, π1, C4|4N) as the bundle over superspace whose fiber at a point z is the set of super null lines that intersect z.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
74
+ page_content=' These fibers are isomorphic to CP 1 ×CP 1, corresponding to the projective spinors λ and ˜λ that generate bosonic translations along a given null line.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
75
+ page_content=' The super null lines described above have one complex dimension and 2N fermionic dimensions, which can be parameterized by coordinates σ = (s, ξi, ˜ξj) ∈ C1|2N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
76
+ page_content=' The supersymmetry generators on this line are ∂s, qi = ∂ξi + i˜ξi∂s and ˜qi = ∂˜ξi + iξi∂s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
77
+ page_content=' More generally, we can also consider a super null curve, which is a morphism χ : C1|2N → C4|4N whose pushforward χ∗ takes the form (∂s, qi, ˜qk) → (∂, Mj i tj, ˜ Mk l ˜tl), (8) at every point σ, where the operators (∂, tj, ˜tl) are defined for a super null line that is tangent to χ at χ(σ).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
78
+ page_content=' As with the self-dual case, we can then define the prolongation jcχ : C1|2N → F 6|4N by jcχ = (χ, λ, ˜λ), and given a curve ψ : C1|2N → F 6|4N we say that it satisfies the contact condition if ψ = jcχ for some nonsingular null curve χ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
79
+ page_content=' As before, a map f : F 6|4N → F 6|4N preserves the contact condition if f ◦ jcχ satisfies the contact condition for any χ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
80
+ page_content=' Furthermore, for a super null line L tangent to (λ, ˜λ), we also define f⌟L(z) = π1 ◦ f(z, λ, ˜λ) ∀z ∈ L as before.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
81
+ page_content=' In the supersymmetric case there is an extra consideration necessary to ensure inte- grability of the pullback connection.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
82
+ page_content=' To see this, consider a morphism f : F 6|4N → F 6|4N which preserves the contact condition.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
83
+ page_content=' Given a super null line L, we want to demand that the supersymmetry relations (7) are preserved under (f⌟L)∗.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
84
+ page_content=' By construction, this pushforward takes the form of equation (8), where the coordinates on L are also chosen to satisfy the supersymmetry relations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
85
+ page_content=' To preserve these relations, we must demand Mi j ˜ Mj k = δi k.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
86
+ page_content=' (9) This condition must be satisfied for every super null line L, which is the condition that must be satisfied for integrability.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
87
+ page_content=' We can now define Definition 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
88
+ page_content=' A super causal morphism is a holomorphic map f : F 6|4N → F 6|4N which preserves the contact condition, and preserves the supersymmetry relations (7) under (f⌟L)⋆ for tangent vectors to any super null line L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
89
+ page_content=' Now consider an N=3 supersymmetric Yang-Mills field satisfying the field equations on C4|12.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
90
+ page_content=' This field can be defined by a superconnection characterized by a one form Φ with components ΦA = (ωiα, ˜ωi ˙α, Aα ˙α), which defines covariant derivative operators Qiα = qiα + ωiα, ˜Qi ˙α = qi ˙α + ˜ωi ˙α, Dα ˙α = ∂α ˙α + Aα ˙α.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
91
+ page_content=' (10) 5 The field equations are equivalent to integrability on super null lines [12], which for a given line L tangent to vα ˙α = λα˜λ ˙α are given by equations (7) for the translation operators Ti = λαQiα, ˜T i = ˜λ ˙α ˜Qi ˙α and D = λα˜λ ˙αDα ˙α.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
92
+ page_content=' Now, given a super causal morphism f, we can define the pullback connection f ∗Φ similarly to the self-dual case.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
93
+ page_content=' To do so, consider a super null line L, and the super null curve f⌟L it generates.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
94
+ page_content=' The bundle of parallel sections on these super null lines then generates a pullback connection in the usual manner.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
95
+ page_content=' To calculate this pullback connection, we can directly generalize equation (5) to v · f ∗Φ|z= (f⌟L)∗v · Φ|f⌟L(z), z ∈ L, v ∈ TxL.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
96
+ page_content=' (11) As in the previous section, linearity of the pullback connection follows from a variant of Liouville’s theorem.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
97
+ page_content=' Integrability on lines follows from writing (7) for the pullback translation operators defined on L, and then using (11) and the assumption that Φ is integrable on lines.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
98
+ page_content=' This implies that super causal morphisms are symmetries of the N = 3 SYM field equations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
99
+ page_content=' 4 Reduction to Yang-Mills field equations The geometric interpretation of the YM field equations using field extensions can be naturally understood by viewing these equations as a special case of the N=3 SYM field equations for a Yang-Mills super multiplet with the scalar and spinor fields set to zero [10][12][13][19].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
100
+ page_content=' In a similar spirit, it is possible to use a modified definition of causal morphisms to generate an N=3 super causal morphism which preserves the property that the scalar and spinor fields equal zero, thus forming a symmetry of the YM field equations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
101
+ page_content=' A causal morphism can be defined as an N = 0 super causal morphism, or a map f : G → G that preserves the contact condition, where G = F 4|0 is the usual ambitwistor correspondence space.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
102
+ page_content=' Given such a function, we can construct an extended morphism ˆf : F 6|4N → F 6|4N given by ˆf(g, θiα, ˜θ ˙α j ) = (f(g), [V −1]α βθiβ, [ ˜V −1] ˙α ˙β ˜θ ˙β j ), g ∈ G, (12) where V , ˜V are invertible matrix functions of g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
103
+ page_content=' Now restrict to a super null line L tangent to a null vector vα ˙α = λα˜λ ˙α.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
104
+ page_content=' Along L, the supersymmetry relations (7) are preserved if and only if vβ ˙βV α β ˜V ˙α ˙β = ((f⌟L0)∗v)α ˙α, (13) where L0 is the bosonic projection of L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
105
+ page_content=' The existence of holomorphically varying matrix functions V and ˜V satisfying this condition is the extra modification necessary to extend a causal morphism f to ˆf, and will be assumed.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
106
+ page_content=' The above construction yields a symmetry of the N = 3 SYM field equations, but we must also show that solutions of the YM field equations, with scalar and spinor fields set 6 to zero, are preserved by these extended causal morphisms.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
107
+ page_content=' To do so, we will use two results proved by Harnad et.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
108
+ page_content=' al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
109
+ page_content=' [13].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
110
+ page_content=' In that paper, theorem 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
111
+ page_content='3 characterizes the form of the superconnection induced from a solution of the YM field equations when embedded as a gauge fixed N=3 SYM connection, which is ωiα = ˜θ ˙α i hα ˙α(xβ ˙β, τ β ˙β), ˜ωi α = θiα˜hα ˙α(xβ ˙β, τ β ˙β), (14) where τ β ˙β = � i θiβ ˜θ ˙β i , Aα ˙α = Aα ˙α(xβ ˙β, τ β ˙β), and the gauge condition is θiαωiα+˜θi ˙α˜ω ˙α i = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
112
+ page_content=' Conversely, corollary 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
113
+ page_content='3 shows that a gauge-fixed connection that is integrable on super null lines and takes the above form corresponds to an N = 3 extended solution of the YM field equations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
114
+ page_content=' Based on these considerations, showing that the extended causal morphisms preserve the form of equation (14) and the gauge condition implies that they preserve solutions of the YM field equations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
115
+ page_content=' To show this, restrict to a super null line L and use (11) to compute the pullback connection of (14), which gives λα ˆf ∗ωiα(z) = ˜θ ˙β i λα � V β α hβ ˙β(x′, τ ′) � , ˜λ ˙α ˆf ∗˜ωi ˙α(z) = θiβ˜λ ˙α � ˜V ˙β ˙α ˜hβ ˙β(x′, τ ′) � , (15) where x′, τ ′ are evaluated at ˆf⌟L(z).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
116
+ page_content=' Now consider two points z1, z2 ∈ C4|4N with x1 = x2 and τ1 = τ2, lying on two parallel lines.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
117
+ page_content=' Under ˆf⌟L, τ transforms as τ α ˙α → [V −1]α β[ ˜V −1] ˙α ˙βτ β ˙β, so the quantities in parentheses are the same for these two points and parallel lines, but the line can be varied, so this is true for any (λ, ˜λ).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
118
+ page_content=' We therefore see that the connection has the form of equation (14), as desired.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
119
+ page_content=' Furthermore, the gauge condition can be written τ α ˙α(hα ˙α + ˜hα ˙α) = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
120
+ page_content=' For τ α ˙α proportional to a null vector this condition is preserved, but this must be true for any null line, so by linearity the gauge condition is preserved.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
121
+ page_content=' This implies that the pullback connection corresponds to an N = 3 extended solution of the YM field equations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
122
+ page_content=' 5 Discussion We have shown that self-dual, N = 3 super causal and causal morphisms yield symmetries of the ASDYM, N = 3 SYM and YM field equations, respectively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
123
+ page_content=' To further understand these symmetries, it will be necessary to classify their solutions and to investigate their action on concrete examples of YM fields.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
124
+ page_content=' Some partial results were found in the previous paper [16], where examples of self-dual morphisms were constructed from holomorphic endomorphisms of twistor space.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
125
+ page_content=' A method was also developed to construct causal mor- phisms from these self-dual morphisms.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
126
+ page_content=' Although these constructions provide examples of solutions, it will be important to find a more complete classification.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
127
+ page_content=' In particular, it is likely that there are more general examples than those constructed from endomorphisms 7 of the twistor space, or super ambitwistor space, which could be analogous to holomorphic functions that preserve the real line in two dimensions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
128
+ page_content=' This preliminary interpretation is based on the CR ambitwistor space used in [20], but will require further investigation to make precise.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
129
+ page_content=' It will also be important to understand how these maps are related to other well known hidden symmetries for these equations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
130
+ page_content=' There are many additional avenues of further research.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
131
+ page_content=' Here the action of these maps was only considered for classical Yang-Mills fields, but the ultimate goal is to further understand the quantum theory.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
132
+ page_content=' Furthermore, it will be interesting to consider how gravitational fields transform under these maps.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
133
+ page_content=' In this vein, one could define a causal manifold with coordinate transformations that are morphisms of these types, in analogy to the definition of Riemann surfaces for holomorphic functions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
134
+ page_content=' Due to the nonlocal nature of these maps, the theory could lead to interesting new mathematics.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
135
+ page_content=' References [1] L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
136
+ page_content=' Dolan, A new symmetry group of real self-dual yang-mills theory, Physics Letters B 113 (1982) 387.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
137
+ page_content=' [2] L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
138
+ page_content='-L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
139
+ page_content=' Chau, G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
140
+ page_content=' Mo-Lin, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
141
+ page_content=' Sinha and W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
142
+ page_content=' Yong-Shi, Hidden-symmetry algebra for the self-dual yang-mills equation, Physics Letters B 121 (1983) 391.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
143
+ page_content=' [3] A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
144
+ page_content='D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
145
+ page_content=' Popov, Self-dual yang-mills: Symmetries and moduli space, Reviews in Mathematical Physics 11 (1999) 1091.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
146
+ page_content=' [4] L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
147
+ page_content=' Mason and D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
148
+ page_content=' Skinner, Dual superconformal invariance, momentum twistors and grassmannians, Journal of High Energy Physics 2009 (2009) 045.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
149
+ page_content=' [5] N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
150
+ page_content=' Arkani-Hamed, F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
151
+ page_content=' Cachazo and C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
152
+ page_content=' Cheung, The grassmannian origin of dual superconformal invariance, Journal of High Energy Physics 2010 (2010) .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
153
+ page_content=' [6] J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
154
+ page_content=' Drummond, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
155
+ page_content=' Henn and J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
156
+ page_content=' Plefka, Yangian symmetry of scattering amplitudes in n = 4 super yang-mills theory, Journal of High Energy Physics 2009 (2009) 046.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
157
+ page_content=' [7] R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
158
+ page_content='S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
159
+ page_content=' Ward, On self-dual gauge fields, Physics Letters A 61 (1977) 81.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
160
+ page_content=' [8] M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
161
+ page_content=' Atiyah, N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
162
+ page_content=' Hitchin, V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
163
+ page_content=' Drinfeld and Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
164
+ page_content=' Manin, Construction of instantons, Physics Letters A 65 (1978) 185 .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
165
+ page_content=' [9] M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
166
+ page_content=' Atiyah, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
167
+ page_content=' nazionale dei Lincei and S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
168
+ page_content=' normale superiore (Italy), Geometry of Yang-Mills fields, Lezioni fermiane, Scuola normale superiore (1979).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
169
+ page_content=' [10] E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
170
+ page_content=' Witten, An interpretation of classical yang-mills theory, Physics Letters B 77 (1978) 394 .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
171
+ page_content=' 8 [11] J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
172
+ page_content=' Isenberg, P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
173
+ page_content='B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
174
+ page_content=' Yasskin and P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
175
+ page_content='S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
176
+ page_content=' Green, Non-self-dual gauge fields, Physics Letters B 78 (1978) 462 .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
177
+ page_content=' [12] J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
178
+ page_content=' Harnad, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
179
+ page_content=' Hurtubise, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
180
+ page_content=' Legare and S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
181
+ page_content=' Shnider, Constraint equations and field equations in supersymmetric n = 3 yang-mills theory, Nuclear Physics B 256 (1985) 609.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
182
+ page_content=' [13] J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
183
+ page_content=' Harnad, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
184
+ page_content=' Hurtubise and S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
185
+ page_content=' Shnider, Supersymmetric yang-mills equations and supertwistors, Annals of Physics 193 (1989) 40.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
186
+ page_content=' [14] E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
187
+ page_content=' Witten, Perturbative gauge theory as a string theory in twistor space, Communications in Mathematical Physics 252 (2004) 189.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
188
+ page_content=' [15] M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
189
+ page_content=' Atiyah, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
190
+ page_content=' Dunajski and L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
191
+ page_content='J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
192
+ page_content=' Mason, Twistor theory at fifty: from contour integrals to twistor strings, Proceedings of the Royal Society A: Mathematical, Physical and Engineering Sciences 473 (2017) 20170530.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
193
+ page_content=' [16] E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
194
+ page_content='B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
195
+ page_content=' Baker, Causal and self-dual morphisms in four complex dimensions, 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
196
+ page_content=' 10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
197
+ page_content='48550/ARXIV.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
198
+ page_content='2203.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
199
+ page_content='07952.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
200
+ page_content=' [17] M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
201
+ page_content=' Dunajski, Solitons, Instantons, and Twistors, Oxford Graduate Texts in Mathematics, OUP Oxford (2010).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
202
+ page_content=' [18] R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
203
+ page_content=' Ward and R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
204
+ page_content=' Wells, Twistor Geometry and Field Theory, Cambridge Monographs on Mathematical Physics, Cambridge University Press (1991).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
205
+ page_content=' [19] M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
206
+ page_content=' Eastwood, Supersymmetry, twistors, and the yang-mills equations, Transactions of the American Mathematical Society 301 (1987) 615.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
207
+ page_content=' [20] L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
208
+ page_content=' Mason and D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
209
+ page_content=' Skinner, An ambitwistor yang–mills lagrangian, Physics Letters B 636 (2006) 60.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
210
+ page_content=' 9' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2NAyT4oBgHgl3EQfPvY8/content/2301.00029v1.pdf'}
2NE3T4oBgHgl3EQfnwo5/content/2301.04627v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:5313fea08c1a72370a0ca1a28d388714657372907ddada53621093a33dcbe6d0
3
+ size 129208
2NE3T4oBgHgl3EQfnwo5/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:d4d03fba125391b06231f7202559a9e13e8fcb6fb5d256d9d29e18a94875b439
3
+ size 29047
3NFLT4oBgHgl3EQfri9A/content/tmp_files/2301.12144v1.pdf.txt ADDED
@@ -0,0 +1,1925 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ 1
2
+ On the Mutual Information of Multi-RIS
3
+ Assisted MIMO: From Operator-Valued Free
4
+ Probability Aspect
5
+ Zhong Zheng, Member, IEEE, Siqiang Wang, Zesong Fei, Senior Member, IEEE,
6
+ Zhi Sun, Senior Member, IEEE, Jinhong Yuan, Fellow, IEEE
7
+ Abstract
8
+ The reconfigurable intelligent surface (RIS) is useful to effectively improve the coverage and data rate
9
+ of end-to-end communications. In contrast to the well-studied coverage-extension use case, in this paper,
10
+ multiple RIS panels are introduced, aiming to enhance the data rate of multi-input multi-output (MIMO)
11
+ channels in presence of insufficient scattering. Specifically, via the operator-valued free probability theory,
12
+ the asymptotic mutual information of the large-dimensional RIS-assisted MIMO channel is obtained
13
+ under the Rician fading with Weichselberger’s correlation structure, in presence of both the direct and
14
+ the reflected links. Although the mutual information of Rician MIMO channels scales linearly as the
15
+ number of antennas and the signal-to-noise ratio (SNR) in decibels, numerical results show that it requires
16
+ sufficiently large SNR, proportional to the Rician factor, in order to obtain the theoretically guaranteed
17
+ linear improvement. This paper shows that the proposed multi-RIS deployment is especially effective to
18
+ improve the mutual information of MIMO channels under the large Rician factor conditions. When the
19
+ reflected links have similar arriving and departing angles across the RIS panels, a small number of RIS
20
+ panels are sufficient to harness the spatial degree of freedom of the multi-RIS assisted MIMO channels.
21
+ Z. Zheng, S. Wang, and Z. Fei are with the School of Information and Electronics, Beijing Institute of Technology, Beijing,
22
+ China. Z. Sun is with the Department of Electronic Engineering, Tsinghua University, Beijing, China. J. Yuan is with the School
23
+ of Electrical Engineering and Telecommunications, UNSW Sydney, Sydney, Australia.
24
+ DRAFT
25
+ arXiv:2301.12144v1 [cs.IT] 28 Jan 2023
26
+
27
+ 2
28
+ Index Terms
29
+ Reconfigurable intelligent surface, MIMO, Rician channel, mutual information, operator-valued free
30
+ probability.
31
+ I. INTRODUCTION
32
+ In both the current and forthcoming generations of mobile communication systems, multi-input multi-
33
+ output (MIMO) is one of the mainstream physical-layer techniques to improve the spectral efficiency
34
+ and the reliability of the wireless communications [1]. In the favorable environments with rich scattering,
35
+ MIMO is able to increase the achievable data rate linearly with the number of antennas [2]. However,
36
+ when the wireless systems operate in higher frequencies with larger bandwidth, such as the millimeter
37
+ wave and terahertz bands, the radio signals are easily attenuated due to absorption and blockage. In this
38
+ case, the MIMO channels typically have only a few dominating propagation paths and/or limited angular
39
+ spread, which causes rank deficiency in the channel matrix that significantly degrades the MIMO channel
40
+ capacity [3].
41
+ Recently, reconfigurable intelligent surface (RIS) has attracted substantial attentions and is foreseen
42
+ to be an important component in the future communication systems [4]. A typical RIS consists of
43
+ a large number of low-power integrated electronic circuits, which can be programmed to modify the
44
+ electromagnetic properties of the incoming radio waves in the desired frequency band [5], such as the
45
+ phase and amplitude of the reflected signals from each programmable circuit. Therefore, by deploying
46
+ some RIS panels in the environment, the signal’s radiation pattern within the operating spectrum bands
47
+ of the communication systems can be reconfigured to increase the number of independent paths with
48
+ diversified angular spreads, thus increasing the rank of the MIMO channels. As an example, Fig. 1
49
+ illustrates the transmissions between a base station (BS) and a user equipment (UE) in an urban canyon.
50
+ In this scenario, without RIS deployment, the signals have to propagate through a scattering-limited area,
51
+ where the direct propagation link F0 dominates the end-to-end channel, while other scattered/reflected
52
+ components are severally attenuated by the building materials. In comparison, RIS panels are able to
53
+ actively and effectively reflect the signals to increase the number of independent specular components,
54
+ DRAFT
55
+
56
+ 3
57
+ • • • 
58
+ UE
59
+ BS
60
+ RIS K
61
+ RIS 1
62
+ F0
63
+ F1
64
+ FK
65
+ G1
66
+ GK
67
+ Fig. 1.
68
+ Multi-RIS assisted MIMO communications.
69
+ resulting in a total number of K +1 propagation links, including the direct link F0 and K reflected links
70
+ that consist of channels {Fk}1≤k≤K between BS and RIS panels and channels {Gk}1≤k≤K between RIS
71
+ panels and UE.
72
+ There exist a number of studies focusing on the performance evaluation of the end-to-end communi-
73
+ cations assisted by a single or multiple RIS panels. When both the transmitter and receiver are equipped
74
+ with a single antenna and a single RIS is deployed, the signal-to-noise-ratio (SNR) of such RIS-assisted
75
+ single-input single-output (SISO) channel is proportional to the squared amplitude of the end-to-end
76
+ effective channel. There are two typical theoretic frameworks to analyze the statistical properties of
77
+ the SNR: One is based on the Meijer’s G- and Fox’s H-function systems [6], which result in exact
78
+ but rather complicated expressions. The other is to match the moments of the effective channel with
79
+ classical random variables [7]–[10]. In particular, when the direct link is blocked, the SNR distribution and
80
+ the corresponding outage probability of the RIS-assisted communications are approximated by Gamma
81
+ random variables, when the component channels are independently Rayleigh-faded [7], independently
82
+ Rician-faded [8], correlated Rician-faded [9], and independently Nakagami-faded [10], respectively. When
83
+ both the direct and the reflected links exist, the Gamma-approximated SNR distribution and the finite
84
+ block-length rate of the RIS-assisted channel are obtained in [11], when all component channels are
85
+ DRAFT
86
+
87
+ 4
88
+ Rayleigh-faded.
89
+ When multiple RIS panels are deployed in the network, the RIS panels either work in exhaustive mode
90
+ to jointly assist the end-to-end communications [12], or work in opportunistic mode, where only the RIS
91
+ with maximum channel gains is selected [13]. In the former case, the end-to-end SNR is approximated
92
+ by a Gaussian random variable due to the central limit theorem. The SNR and the average symbol error
93
+ probability are derived for the phase shift keying signaling. In the latter case, the SNR of each reflected
94
+ link corresponding to one RIS panel is approximated as a Gaussian random variable and the order-statistics
95
+ is then obtained for the optimally selected RIS-assisting channel. In [14], a comprehensive performance
96
+ comparison of those two operation modes is provided, under the scenario of multi-RIS assisted SISO
97
+ channels assuming Nakagami-faded direct and reflected links.
98
+ In the case of MIMO systems, the available performance analysis of RIS-assisted communications is
99
+ rather limited due to the challenge of understanding the statistical distribution of matrix-valued prop-
100
+ agation channels, and results only exist for the single-RIS deployment. In [15], the authors consider
101
+ the RIS-assisted MIMO communications, where the direct link is blocked and the reflected link is the
102
+ concatenated Rayleigh-faded MIMO channels with single-sided correlation. The exact outage probability
103
+ of such channel is derived by using the Mellin transform [16]. The result is expressed as the integration
104
+ of product of multiple Meijer’s G-functions, which is difficult to solve in practice. When the reflected
105
+ link is the concatenated millimeter wave MIMO channels assuming Saleh-Valenzuela model [17], an
106
+ upper bound of the ergodic achievable rate is derived in [18] using majorization theory and Jensen’s
107
+ inequality. In the RIS-assisted uplink multiple access channel, the asymptotic ergodic sum rate of the
108
+ multi-user MIMO system is derived in [19] by using the replica method, assuming that the reflected links
109
+ are Rician-faded MIMO channels with Kronecker’s correlation. In the same channel model as [19], the
110
+ finite-SNR diversity-multiplexing tradeoff (DMT) of the RIS-assisted MIMO channel is analyzed in [20]
111
+ by the martingale method. When both the direct and the reflected links exist, the asymptotic achievable
112
+ rate of the single-RIS assisted MIMO channel is derived in [21] via replica method, assuming that all
113
+ the component channels are Rician fading with Kronecker’s correlation and all the channel dimensions
114
+ grow to infinity.
115
+ DRAFT
116
+
117
+ 5
118
+ Although the RIS-assisted MIMO communications have been investigated in [15], [18]–[21], the results
119
+ therein are obtained for the single-RIS deployment under certain MIMO channel configurations. In
120
+ contrast, this paper aims to provide the theoretic framework that analyzes the general multi-RIS assisted
121
+ MIMO communications under arbitrary Rician fading with Weichselberger’s correlation structure [22].
122
+ Such a model fits a wider range of realistic MIMO channels compared to the conventional Kronecker’s
123
+ correlation structure. Based on the above system settings, we first embed the component MIMO channel
124
+ matrices into a large block matrix. Then, an operator-valued probability space over the algebra of the
125
+ constructed block matrices is defined, where the operator-valued Cauchy transform is defined and is shown
126
+ to be closely related to the classic Cauchy transform of the channel Gram matrix. The operator-valued
127
+ Cauchy transform is then derived by leveraging the freeness over the defined probability space and the
128
+ additive free convolution machinery. Based on the obtained Cauchy transform, the probability distribution
129
+ of the eigenvalue of the channel Gram matrix as well as the mutual information of the multi-RIS assisted
130
+ MIMO channel can be calculated, which avoids time-consuming Monte Carlo simulations. Numerical
131
+ results show that in presence of strong line-of-sight conditions, although the mutual information could
132
+ scale linearly as the number of antennas and the SNRs (in decibels), the SNR has to be sufficiently large
133
+ in order to exhibit such linear scaling law. On the other hand, deploying additional RIS panels could
134
+ effectively improve the channel’s mutual information and thus, alleviate the SNR requirement.
135
+ The rest of this article is organized as follows. The signal model, the channel model, and the mutual
136
+ information of the MIMO channel under consideration are introduced in Section II. In Section III, the
137
+ operator-valued probability space is introduced and the main result of the Cauchy transform of the channel
138
+ Gram matrix is given. Numerical simulation results on the spectral distribution and the mutual information
139
+ of the MIMO channels are in Section IV. Section V concludes the main findings of this article.
140
+ Notations. Throughout the paper, vectors and matrices are represented by lower-case and upper-case
141
+ bold-face letters, respectively. The complex column vector with length n is denoted as Cn. We use
142
+ CN(0, A) to denote the zero-mean complex Gaussian vector with covariance matrix A and In is an
143
+ n × n identity matrix. The superscript (·)† denotes the matrix conjugate-transpose operation and (·)T
144
+ is matrix transpose. We denote Tr(A) as the trace of n × n matrix A. The notation E[·] denotes the
145
+ DRAFT
146
+
147
+ 6
148
+ expectation, and det(·) denotes the matrix determinant.
149
+ II. SYSTEM MODEL
150
+ A. Signal Model
151
+ Consider a MIMO communication channel between a transmitter equipped with T antennas and a
152
+ receiver equipped with R antennas. The transmissions are assisted by K RIS panels, which reflect the
153
+ impinging signals via their reflecting elements and each RIS panel is equipped with Lk reflecting elements,
154
+ 1 ≤ k ≤ K. For notational simplicity, we define R = L0 and use these two symbols interchangeably.
155
+ Denote the transmitted signal as x ∈ CT and the additive noise at the receiver as n ∈ CR. The received
156
+ signal y ∈ CR is expressed as
157
+ y =
158
+
159
+ F0 +
160
+ K
161
+
162
+ k=1
163
+ √ρkGkFk
164
+
165
+ x + n,
166
+ (1)
167
+ where the R × T matrix F0 denotes the direct channel between transmitter and receiver, the Lk × T
168
+ matrix Fk denotes the channels between the transmitter and the k-th RIS panel, and 0 < ρk ≤ 1 denotes
169
+ the relative channel gain of the k-th reflected channel via the k-th RIS, compared to the direct channel.
170
+ The R × Lk matrix Gk denotes phase-shifted reflected channel between the k-th RIS and the receiver,
171
+ modeled as
172
+ Gk = RkΘk,
173
+ (2)
174
+ where the R×Lk matrix Rk denotes the channel coefficients, and the diagonal matrix Θk = diag
175
+
176
+ eiφk,1, . . . , eiφk,Lk�
177
+ contains the phase-shifts of the reflecting elements, where 0 ≤ φk,l ≤ 2π denotes the phase-shift of the
178
+ l-th element of the k-th RIS.
179
+ We adopt the following assumptions on the signal and the channels:
180
+ (A1) The signal x is Gaussian distributed with uniform power allocation, i.e., x ∼ CN(0T , PIT ), where
181
+ P is the average power of the signals from each transmit antenna;
182
+ (A2) The noise n is assumed to be a white Gaussian random vector with i.i.d. zero-mean entries, i.e.,
183
+ n ∼ CN(0R, σ2IR), where σ2 denotes the variance of the noise;
184
+ DRAFT
185
+
186
+ 7
187
+ (A3) The channel coefficients {Fk}0≤k≤K and {Rk}1≤k≤K are block-faded, which keeps constant within
188
+ the coherence time, while changing randomly and independently in the next coherence time. The
189
+ phase shifts {Θk}1≤k≤K are assumed to be fixed.
190
+ Note that without the direct link F0, channel models similar to (1) have been also studied in [3],
191
+ [23], [24] for the keyhole channel, the Rayleigh-product channel, and the double-scattering channel,
192
+ respectively, by using different theoretic techniques, which cannot be applied here.
193
+ B. Channel Model
194
+ In order to characterize the directivity and the spatial correlation of the channels between antenna
195
+ arrays, we adopt the non-central Weichselberger’s MIMO model for each component links [22], such
196
+ that
197
+ Fk = Fk + �Fk = Fk + Uk(Mk ⊙ Xk)V†
198
+ k,
199
+ 0 ≤ k ≤ K,
200
+ (3)
201
+ Gk = Gk + �Gk = Gk +
202
+ 1
203
+ √rk
204
+ Wk(Nk ⊙ Yk)S†
205
+ k,
206
+ 1 ≤ k ≤ K,
207
+ (4)
208
+ where Fk and Gk are the fixed specular components of Fk and Gk, respectively. The random scattering
209
+ components are captured by �Fk and �Gk, where Uk, Vk, Wk, and Sk are deterministic unitary matrices.
210
+ The deterministic matrices Mk and Nk represent the variance profiles of �Fk and �Gk, respectively, each
211
+ having non-negative real elements. The Lk × T random matrix Xk and the R × Lk random matrix Yk
212
+ are i.i.d. complex Gaussian distributed with entries having zero mean and variance 1/T, i.e., [Xk]i,j ∼
213
+ CN(0, 1/T) and [Yk]i,j ∼ CN(0, 1/T). We denote rk as the ratio between Lk and T, i.e., rk = Lk/T,
214
+ 1 ≤ k ≤ K. The operator ⊙ denotes the element-wise matrix multiplication. Note that the phase-shift
215
+ matrix Θk, 1 ≤ k ≤ K, is also unitary and can be absorbed into the deterministic matrices Gk and
216
+ Sk. The ratio between the power of fixed specular component and the random scattering component is
217
+ defined as the Rician factor of the MIMO channel, i.e.,
218
+ κ(F)
219
+ k
220
+ = ||Fk||2
221
+ F
222
+ E[||�F||2
223
+ F]
224
+ , and κ(G)
225
+ k
226
+ = ||Gk||2
227
+ F
228
+ E[|| �G||2
229
+ F]
230
+ ,
231
+ (5)
232
+ where || · ||F denotes the Frobenius norm of a matrix.
233
+ DRAFT
234
+
235
+ 8
236
+ For the correlated MIMO channel Gk, the one-sided correlation function ηk(�C) = E[ �G†
237
+ k �C �Gk] param-
238
+ eterized by an Hermitian matrix �C is given by [22, Thm. 1] as
239
+ ηk(�C) = E[ �G†
240
+ k �C �Gk] = 1
241
+ Lk
242
+ SkΠk(�C)S†
243
+ k,
244
+ 1 ≤ k ≤ K,
245
+ (6)
246
+ where the Lk × Lk diagonal matrix Πk(�C) contains the diagonal entries
247
+
248
+ Πk(�C)
249
+
250
+ i,i =
251
+ R
252
+
253
+ j=1
254
+ ([Nk]j,i)2 �
255
+ W†
256
+ k �CWk
257
+
258
+ j,j ,
259
+ 1 ≤ i ≤ Lk.
260
+ (7)
261
+ The other one-sided correlation function �ηk(Ck) = E[ �GkCk �G†
262
+ k] parameterized by Ck is given by
263
+ �ηk(Ck) = E[ �GkCk �G†
264
+ k] = 1
265
+ Lk
266
+ Wk �Πk(Ck)W†
267
+ k,
268
+ 1 ≤ k ≤ K,
269
+ (8)
270
+ where the R × R diagonal matrix �Πk(Ck) contains the diagonal entries
271
+
272
+ �Πk(Ck)
273
+
274
+ i,i =
275
+ Lk
276
+
277
+ j=1
278
+ ([Nk]i,j)2 �
279
+ S†
280
+ kCkSk
281
+
282
+ j,j ,
283
+ 1 ≤ i ≤ R.
284
+ (9)
285
+ Similarly, for 0 ≤ k ≤ K, the two parameterized one-sided correlation functions of the matrix �Fk are
286
+ given by:
287
+ ζk(Dk) = E[�F†
288
+ kDk�Fk] = 1
289
+ T VkΣk(Dk)V†
290
+ k,
291
+ (10)
292
+ �ζk( �D) = E[�Fk �D�F†
293
+ k] = 1
294
+ T Uk �Σk( �D)U†
295
+ k,
296
+ (11)
297
+ where the T × T diagonal matrix Σk(Dk) and the Lk × Lk diagonal matrix �Σk( �D) respectively contain
298
+ the diagonal entries
299
+ [Σk(Dk)]i,i =
300
+ Lk
301
+
302
+ j=1
303
+ ([Mk]j,i)2 �
304
+ U†
305
+ kDkUk
306
+
307
+ j,j ,
308
+ 1 ≤ i ≤ T,
309
+ (12)
310
+
311
+ �Σk( �D)
312
+
313
+ i,i =
314
+ T
315
+
316
+ j=1
317
+ ([Mk]i,j)2 �
318
+ V†
319
+ k �DVk
320
+
321
+ j,j ,
322
+ 1 ≤ i ≤ Lk.
323
+ (13)
324
+ In addition, since the channels {Fk}0≤k≤K and {Gk}1≤k≤K are spatially separated, channels corre-
325
+ spond to different links are assumed to be independent.
326
+ DRAFT
327
+
328
+ 9
329
+ C. Mutual Information of Multi-RIS MIMO Channel
330
+ Due to the assumptions (A1)-(A3), the channel (1) is a Gaussian MIMO channel and its mutual
331
+ information is given by the well-known Telatar’s formula [2] as
332
+ I(γ) = log det
333
+
334
+ IR + γHH†�
335
+ ,
336
+ (14)
337
+ where γ = P/σ2 is the average SNR, and the end-to-end channel H is given by
338
+ H = F0 +
339
+ K
340
+
341
+ k=1
342
+ √ρkGkFk.
343
+ (15)
344
+ The channel H can be factorized as the product of two matrices G and F as
345
+ H = GF =
346
+
347
+ IR
348
+ √ρ1G1
349
+ . . .
350
+ √ρKGK
351
+
352
+
353
+ ���������
354
+ F0
355
+ F1
356
+ ...
357
+ FK
358
+
359
+ ���������
360
+ .
361
+ (16)
362
+ Denoting L = �K
363
+ k=0 Lk, G =
364
+
365
+ IR
366
+ √ρ1G1
367
+ . . .
368
+ √ρKGK
369
+
370
+ is a R × L block matrix and F =
371
+
372
+ FT
373
+ 0 , . . . , FT
374
+ K
375
+ �T is a L × T block matrices.
376
+ Letting B = HH† = GFF†G†, the mutual information (14) can be rewritten as
377
+ I(γ) = R VB(γ) = R
378
+ ˆ ∞
379
+ 0
380
+ log(1 + γt)fB(t)dt,
381
+ (17)
382
+ where VB(x) is the Shannon transform of the matrix B [25], and fB(t) is the probability density function
383
+ (PDF) of the eigenvalue of B. Applying the relation between the Shannon transform and the corresponding
384
+ Cauchy transform [25], the mutual information (17) can be rewritten as
385
+ I(γ) = R
386
+ ˆ γ
387
+ 0
388
+ �1
389
+ t + 1
390
+ t2 GB
391
+
392
+ −1
393
+ t
394
+ ��
395
+ dt,
396
+ (18)
397
+ where GB(z) is the Cauchy transform of B and is defined as
398
+ GB(z) =
399
+ ˆ ∞
400
+ 0
401
+ 1
402
+ z − tfB(t)dt = 1
403
+ RTr ◦ E
404
+
405
+ (zI − B)−1�
406
+ = τR
407
+
408
+ (zI − B)−1�
409
+ .
410
+ (19)
411
+ Here, τR(X) is the composite function 1
412
+ RTr◦E[X]. Note that the PDF fB(t) has an one-to-one mapping
413
+ with the Cauchy transform GB(z) via the inverse transform
414
+ fB(t) = − 1
415
+ π lim
416
+ ϵ→0 ℑ(GB(t + iϵ)),
417
+ (20)
418
+ DRAFT
419
+
420
+ 10
421
+ where ℑ(·) denotes the imaginary part of the complex number. Therefore, the problem of finding the
422
+ mutual information I(γ) and the PDF fB(t) are amount to finding the Cauchy transform GB(z) of
423
+ product of matrices B = GFF†G†. In the next section, we will resort to a linearization trick and the
424
+ operator-valued free probability theory to derive the expression of GB(z).
425
+ III. ASYMPTOTIC EIGENVALUE DISTRIBUTION VIA OPERATOR-VALUED FREE PROBABILITY
426
+ THEORY
427
+ In the classic free probability theory, it is common to combine the Cauchy transform and the free
428
+ multiplicative convolution to obtain the limiting spectral distribution of product of random matrices. For
429
+ example, in [26], the limiting spectral distribution of the concatenated MIMO channels of the form
430
+ � K
431
+
432
+ k=1
433
+ Hk
434
+ � � K
435
+
436
+ k=1
437
+ Hk
438
+ �†
439
+ (21)
440
+ is derived, where Hk is Nk × Nk−1 random matrix and has i.i.d. zero-mean entries, unitarily invariant,
441
+ and independent of each other. Such assumptions, in the language of free probability theory, is equivalent
442
+ to requiring freeness among families of random variables as specified below.
443
+ Let A be a unital algebra and B ⊂ A be a unital subalgebra. For H ∈ A, a linear map EB[H] : A → B
444
+ is a B-valued conditional expectation, if EB[b] = b for all b ∈ B, and EB[b1Hb2] = b1EB[H]b2 for all
445
+ H ∈ A and b1, b2 ∈ B. Then, a B-valued probability space is denoted as (A, EB, B), consisting of B ⊂ A
446
+ and the linear functional EB. In addition, let A1, . . . , AK be the subalgebras of A with B ⊂ Ak for all
447
+ 1 ≤ k ≤ K. We also let {Hk ∈ Ak, 1 ≤ k ≤ K} denote a family of operator-valued random variables,
448
+ which are free with amalgamation over B according to the following definition.
449
+ Definition 1. Let n be an arbitrary integer. The families of random variables {H1, . . . , HK} are free
450
+ with amalgamation over B, if for every family of index {k1, . . . , kn} ⊂ {1, . . . , K} with k1 ̸= k2, . . . ,
451
+ kn−1 ̸= kn, and every family of polynomials {P1, . . . , Pn} satisfying EB[Pj(Hkj)] = 0, j ∈ {1, . . . , n},
452
+ we have EB
453
+ ��n
454
+ j=1 Pj(Hkj)
455
+
456
+ = 0.
457
+ In order to observe the freeness among families of random matrices {Hk, H†
458
+ k}1≤k≤K in (21), we
459
+ can construct the random variable Hk as Hk = HkH†
460
+ k. Let C denote the algebra of complex random
461
+ DRAFT
462
+
463
+ 11
464
+ variables. We define Ak = MNk(C) as the algebra of Nk × Nk complex Hermitian matrices, B = C and
465
+ the linear functional EB as EB =
466
+ 1
467
+ Nk Tr ◦ E. Then, as specified in Definition 1, the asymptotic freeness
468
+ among {Hk}1≤k≤K over C has been established in some of the classic free probability theory, such as
469
+ in [28], which further enables one to apply free multiplicative convolution [26] to obtain the limiting
470
+ spectral distribution of the concatenated MIMO channels.
471
+ However, in the considered problem with B = GFF†G†, both G and F are non-central and with
472
+ non-trivial spatial correlations, and thus, are not free over C in the classic free probability aspect. More
473
+ precisely, GG† and FF† are not free with respect to the linear functional τR = 1
474
+ RTr ◦ E. Yet, as will be
475
+ shown in the remaining of this section, via a linearization trick, the random matrix B of interest can be
476
+ embedded into a larger block matrix, which can be then separated as the sum of a deterministic matrix
477
+ and a random matrix. Instead of invoking the classic freeness over C, we are able to elevate them as the
478
+ operator-valued variables, which are shown to be asymptotically free in the operator-valued probability
479
+ space. The limiting spectral distribution of their sum can be then obtained by using the operator-valued
480
+ free additive convolution.
481
+ A. Linearization Trick and Operator-Valued Probability Space
482
+ Let n denote 2L + R + T and M = Mn(C) denote the algebra of n × n complex random matrices.
483
+ Although the original formulation of B is in the form of product of two random matrices that are not free
484
+ with respect to τR, we could instead construct a block matrix L ∈ M, whose operator-valued Cauchy
485
+ transform can be properly defined and is directly related to the conventional Cauchy transform of B.
486
+ By using the Anderson’s linearization trick as described in [30, Prop. 3.4], we can construct a block
487
+ matrix L ∈ M as follows
488
+ L =
489
+
490
+ ��
491
+ L(1,1)
492
+ L(1,2)
493
+ L(2,1)
494
+ L(2,2)
495
+
496
+ �� =
497
+
498
+ ���������
499
+ 0R×R
500
+ 0R×L
501
+ 0R×T
502
+ G
503
+ 0L×R
504
+ 0L×L
505
+ F
506
+ −IL
507
+ 0T×R
508
+ F†
509
+ −IT
510
+ 0T×L
511
+ G†
512
+ −IL
513
+ 0L×T
514
+ 0L×L
515
+
516
+ ���������
517
+ ,
518
+ (22)
519
+ DRAFT
520
+
521
+ 12
522
+ where the matrix blocks
523
+
524
+ L(i,j)�
525
+ correspond to the partitions shown on the right-hand-side (RHS) of (22).
526
+ In addition, let us consider the sub-algebra D ⊂ M as the n×n block diagonal matrix. For each K ∈ D,
527
+ it is defined as
528
+ K = blkdiag
529
+
530
+ �C, D, �D, C
531
+
532
+ ,
533
+ (23)
534
+ where �C is a R × R sub-matrix and �D is a T × T sub-matrix. The L × L block diagonal matrices C
535
+ and D are defined as C = blkdiag {C0, . . . , CK} and D = blkdiag {D0, . . . , DK}, respectively, where
536
+ Ck and Dk are Lk × Lk sub-matrices. In (23), all the involved sub-matrices �C, �D, {Ck}0≤k≤K, and
537
+ {Dk}0≤k≤K are Hermitian matrices.
538
+ For X ∈ M, we define X �C, X �D, {XCk}0≤k≤K, and {XDk}0≤k≤K as the sub-blocks of X, corre-
539
+ sponding to the same diagonal sub-blocks �C, �D, {Ck}0≤k≤K, and {Dk}0≤k≤K in the matrix K. Then,
540
+ we define the linear functional τD : M → D as
541
+ τD(X) = id ◦ ED [X] ,
542
+ (24)
543
+ where id denotes the identity operator on a Hilbert space and the expectation ED [X] is defined as
544
+ ED [X] =
545
+
546
+ ���������
547
+ E[X �C]
548
+ E[XD]
549
+ E[X �D]
550
+ E[XC]
551
+
552
+ ���������
553
+ ,
554
+ (25)
555
+ and E[XC] = blkdiag {E[XC0], . . . , E[XCK]}, E[XD] = blkdiag {E[XD0], . . . , E[XDK]}. Then, we
556
+ can define an operator-valued probability space (M, τD, D). For the M-valued random variable L ∈
557
+ (M, τD, D), its D-valued Cauchy transform is defined as
558
+ GD
559
+ L (Λ(z)) = id ◦ ED
560
+
561
+ (Λ(z) − L)−1�
562
+ = τD
563
+
564
+ (Λ(z) − L)−1�
565
+ ,
566
+ (26)
567
+ where Λ(z) ∈ M denotes the n × n diagonal matrix as
568
+ Λ(z) =
569
+
570
+ ��
571
+ zIR
572
+ 0R×(2L+T)
573
+ 0(2L+T)×R
574
+ 0(2L+T)×(2L+T)
575
+
576
+ �� .
577
+ (27)
578
+ DRAFT
579
+
580
+ 13
581
+ By substituting (22) and (27) into (26) and invoking Lemma 2 in the Appendix A, we obtain
582
+ GD
583
+ L (Λ(z)) = id ◦ ED
584
+
585
+ ��
586
+
587
+ zIR + L(1,2) �
588
+ L(2,2)�−1 L(2,1)�−1
589
+ −L(1,2) �
590
+ zL(2,2) + L(2,1)L(1,2)�−1
591
+
592
+
593
+ zL(2,2) + L(2,1)L(1,2)�−1 L(2,1)
594
+
595
+
596
+ L(2,2) + z−1L(2,1)L(1,2)�−1
597
+
598
+ �� . (28)
599
+ In particular, the upper-left block of (28) can be explicitly written as
600
+
601
+ zIR + L(1,2) �
602
+ L(2,2)�−1
603
+ L(2,1)
604
+ �−1
605
+ =
606
+
607
+ zIR − GFF†G†�−1
608
+ .
609
+ (29)
610
+ Therefore, the Cauchy transform of B over C is related to the D-valued Cauchy transform of L as
611
+ GB(z) = 1
612
+ RTr
613
+ ��
614
+ GD
615
+ L (Λ(z))
616
+ �(1,1)�
617
+ ,
618
+ (30)
619
+ where {·}(1,1) denotes the upper-left R × R matrix block.
620
+ B. Operator-Valued Free Additive Convolution
621
+ Let us introduce the following notations:
622
+ G =
623
+
624
+ IR
625
+ √ρ1G1
626
+ . . .
627
+ √ρKGK
628
+
629
+ ,
630
+ (31)
631
+ �G =
632
+
633
+ 0R
634
+ √ρ1 �G1
635
+ . . .
636
+ √ρK �GK
637
+
638
+ ,
639
+ (32)
640
+ F =
641
+
642
+ F
643
+ T
644
+ 0
645
+ . . .
646
+ F
647
+ T
648
+ K
649
+ �T
650
+ ,
651
+ (33)
652
+ �F =
653
+
654
+ �FT
655
+ 0
656
+ . . .
657
+ �FT
658
+ K
659
+ �T
660
+ .
661
+ (34)
662
+ The linearization matrix L can be further expressed as
663
+ L = L + �L,
664
+ (35)
665
+ where L and �L contain the deterministic and the random parts of L, respectively, and are given as follows:
666
+ L =
667
+
668
+ ���������
669
+ G
670
+ F
671
+ −IL
672
+ F
673
+
674
+ −IT
675
+ G
676
+
677
+ −IL
678
+
679
+ ���������
680
+ ,
681
+ (36)
682
+ DRAFT
683
+
684
+ 14
685
+ �L =
686
+
687
+ ���������
688
+ �G
689
+ �F
690
+ �F†
691
+ �G†
692
+
693
+ ���������
694
+ ,
695
+ (37)
696
+ where we omit the all-zero matrix blocks.
697
+ The advantage of working with L as well as its D-valued Cauchy transform GD
698
+ L is that the elements
699
+ of �L are monomials of �G, �G†, �F, and �F†, which are decoupled from each other. This is in contrast
700
+ to the Cauchy transform of B over C, where the random variables are mixed together. Then, following
701
+ similar steps as in [32], �L is shown to be an operator-valued semicircular variable and is free from the
702
+ deterministic matrix L over D. Thus, the limiting spectral distribution of L can be determined by the
703
+ operator-valued free additive convolution of L and �L, over the sub-algebra D, which are summarized in
704
+ the following propositions.
705
+ Proposition 1. The random variable �L is semicircular and is free from L over D.
706
+ Proof: The proof of Proposition 1 is given in Appendix B.
707
+ Due to Proposition 1, the operator-valued Cauchy transform of L in (30) can be calculated as the free
708
+ additive convolution between �L and L, by using a subordination formula [30] as follows:
709
+ GD
710
+ L (Λ(z)) = GD
711
+ L
712
+
713
+ Λ(z) − RD
714
+ �L
715
+
716
+ GD
717
+ L (Λ(z))
718
+ ��
719
+ = ED
720
+ ��
721
+ Λ(z) − RD
722
+ �L
723
+
724
+ GD
725
+ L (Λ(z))
726
+
727
+ − L
728
+ �−1�
729
+ ,
730
+ (38)
731
+ where RD
732
+ �L (·) denotes the operator-valued R-transform of L over D. Then, GB(z) can be determined by
733
+ the following proposition.
734
+ Proposition 2. The Cauchy transform of B, with z ∈ C+, is given by
735
+ GB(z) = 1
736
+ RTr
737
+ ��
738
+ �Ψ(z) − GΞ(z)−1G
739
+ †�−1�
740
+ ,
741
+ (39)
742
+ where
743
+ Ξ(z) = Ψ(z) −
744
+
745
+ �Φ(z) − FΦ(z)−1F
746
+ †�−1
747
+ .
748
+ (40)
749
+ DRAFT
750
+
751
+ 15
752
+ The matrix-valued function �Ψ(z), Ψ(z), �Φ(z), Φ(z) satisfy the following fixed-point equations
753
+ �Ψ(z) = zIR −
754
+ K
755
+
756
+ k=1
757
+ �ηk(GCk(z)),
758
+ (41)
759
+ Ψ(z) = blkdiag
760
+
761
+ 0R, −η1(G �C(z)), . . . , −ηK(G �C(z))
762
+
763
+ ,
764
+ (42)
765
+ �Φ(z) = blkdiag
766
+
767
+ −�ζ0(G �D(z)), −�ζ1(G �D(z)), . . . , −�ζK(G �D(z))
768
+
769
+ ,
770
+ (43)
771
+ Φ(z) = IT −
772
+ K
773
+
774
+ k=0
775
+ ζk(GDk(z)),
776
+ (44)
777
+ where blkdiag {A1, . . . , An} constructs a block diagonal matrix with square matrices A1, . . . , An being
778
+ the diagonal blocks, and G �C(z), GCk(z), G �D(z), GDk(z) are given by
779
+ G �C(z) =
780
+
781
+ �Ψ(z) − GΞ(z)−1G
782
+ †�−1
783
+ ,
784
+ (45)
785
+ GCk(z) =
786
+ ��
787
+ Ψ(z) − G
788
+ † �Ψ(z)−1G −
789
+
790
+ �Φ(z) − FΦ(z)−1F
791
+ †�−1�−1�
792
+ k+1
793
+ ,
794
+ 1 ≤ k ≤ K,
795
+ (46)
796
+ G �D(z) =
797
+
798
+ Φ(z) − F
799
+
800
+
801
+ �Φ(z) −
802
+
803
+ Ψ(z) − G
804
+ † �Ψ(z)−1G
805
+ �−1�−1
806
+ F
807
+ �−1
808
+ ,
809
+ (47)
810
+ GDk(z) =
811
+ ��
812
+ �Φ(z) − FΦ(z)−1F
813
+ † −
814
+
815
+ Ψ(z) − G
816
+ † �Ψ(z)−1G
817
+ �−1�−1�
818
+ k+1
819
+ ,
820
+ 0 ≤ k ≤ K.
821
+ (48)
822
+ The notation {A}k+1 with n × n matrix A denotes the (k + 1)-th diagonal matrix block containing
823
+ entries from �k−1
824
+ i=0 Li + 1 to �k
825
+ i=0 Li rows and columns of A.
826
+ Proof: The proof of Proposition 2 is given in Appendix C.
827
+ As indicated by Proposition 2, the Cauchy transform GB(z) as well as the matrix-valued functions
828
+ �Ψ(z), Ψ(z), �Φ(z), Φ(z) can be determined by solving the fixed-point equations. The numerical value
829
+ of GB(z) can be obtained by iterating the set of equations (41)-(44) and (45)-(48).
830
+ IV. NUMERICAL RESULTS
831
+ In this section, numerical simulations are conducted to study the spectral distribution of the RIS-assisted
832
+ MIMO channel as well as its mutual information. In particular, we examine the impacts of the number of
833
+ RIS panels, the number of antennas at the transceivers, and the Rician factor of the propagation channels
834
+ DRAFT
835
+
836
+ 16
837
+ on the mutual information. The mutual information I(γ) and the eigenvalue PDF fB(t) are calculated
838
+ by (17) and (20), respectively, where the involved Cauchy transform GB(z) is given in Proposition 2. In
839
+ each simulation case, the MIMO system without RIS deployment is included for comparison, i.e., K = 0,
840
+ where the eigenvalue PDF and the Cauchy transform can be calculated by using existing result from [32,
841
+ Thm. 2]. Each simulation curve is obtained by averaging over 106 independent channel realizations.
842
+ In the simulations, the antenna elements of the transceivers and the reflecting elements of the RIS
843
+ panels are arranged as the uniform planar arrays (UPAs). Denote T = T (H) × T (V ), R = R(H) × R(V ),
844
+ and Lk = L(H)
845
+ k
846
+ × L(V )
847
+ k
848
+ , where the numbers with the superscripts H and V represent the numbers of
849
+ elements aligned in the horizontal and vertical dimensions, respectively. The specular component of each
850
+ channel is the line-of-sight propagation component between two uniform planar arrays (UPAs), i.e.,
851
+ Fk = a
852
+
853
+ ϕ(F)
854
+ k
855
+ , ν(F)
856
+ k
857
+ , L(H)
858
+ k
859
+ , L(V )
860
+ k
861
+
862
+ a† �
863
+ θ(F)
864
+ k
865
+ , φ(F)
866
+ k
867
+ , T (H), T (V )�
868
+ ,
869
+ 0 ≤ k ≤ K,
870
+ (49)
871
+ Gk = a
872
+
873
+ ϕ(G)
874
+ k
875
+ , ν(G)
876
+ k
877
+ , R(H), R(V )�
878
+ a† �
879
+ θ(G)
880
+ k
881
+ , φ(G)
882
+ k
883
+ , L(H)
884
+ k
885
+ , L(V )
886
+ k
887
+
888
+ ,
889
+ 1 ≤ k ≤ K,
890
+ (50)
891
+ where θ(i)
892
+ k
893
+ and φ(i)
894
+ k
895
+ are the azimuth and elevation angles of the k-th departing UPA, while ϕ(i)
896
+ k
897
+ and ν(i)
898
+ k
899
+ are the azimuth and elevation angles of the k-th arriving UPA, i ∈ {F, G}. The function a(·) denotes
900
+ the steering vector of an M × N UPA and is defined as
901
+ a(α, β, M, N) =
902
+
903
+ 1, . . . , eiπ(n sin(α) sin(β)+m cos(β)), . . . , eiπ((N−1) sin(α) sin(β)+(M−1) cos(β))�T
904
+ ,
905
+ (51)
906
+ where 0 ≤ m ≤ M − 1 and 0 ≤ n ≤ N − 1.
907
+ Fig. 2 shows the empirical and asymptotic eigenvalue PDF of the RIS-assisted MIMO channels HH†,
908
+ assuming the number of RIS panels is K = 0, 1, 2, and 4, respectively. In all the cases, the numbers of
909
+ transmit and receive antennas are set to T = R = 64, and the number of reflecting elements in each RIS
910
+ panel is set to 144. The channel statistics, such as Fk, Uk, Vk, Mk in (3), and Gk, Wk, Sk, Nk in
911
+ (4) are randomly generated but fix for the Monte Carlo simulations. The numerical results show that the
912
+ asymptotic PDF calculated by (20) provides an excellent approximation to the simulated PDF for all the
913
+ considered parameter configurations. By increasing the number of deployed RIS panels, it is possible to
914
+ increase the maximum eigenvalue, therefore, improve amplitude of the eigen-channels.
915
+ DRAFT
916
+
917
+ 17
918
+ 0
919
+ 1
920
+ 2
921
+ 3
922
+ 4
923
+ 5
924
+ 0
925
+ 0.5
926
+ 1
927
+ 1.5
928
+ PDF
929
+ (a) K = 0
930
+ 0
931
+ 1
932
+ 2
933
+ 3
934
+ 4
935
+ 5
936
+ 6
937
+ 7
938
+ 8
939
+ 0
940
+ 0.1
941
+ 0.2
942
+ 0.3
943
+ 0.4
944
+ 0.5
945
+ 0.6
946
+ 0.7
947
+ 0.8
948
+ 0.9
949
+ 1
950
+ PDF
951
+ (b) K = 1
952
+ 0
953
+ 1
954
+ 2
955
+ 3
956
+ 4
957
+ 5
958
+ 6
959
+ 7
960
+ 8
961
+ 9
962
+ 10
963
+ 0
964
+ 0.1
965
+ 0.2
966
+ 0.3
967
+ 0.4
968
+ 0.5
969
+ 0.6
970
+ 0.7
971
+ 0.8
972
+ 0.9
973
+ 1
974
+ PDF
975
+ (c) K = 2
976
+ 0
977
+ 2
978
+ 4
979
+ 6
980
+ 8
981
+ 10
982
+ 12
983
+ 0
984
+ 0.1
985
+ 0.2
986
+ 0.3
987
+ 0.4
988
+ 0.5
989
+ 0.6
990
+ 0.7
991
+ PDF
992
+ (d) K = 4
993
+ Fig. 2.
994
+ Comparisons of empirical and asymptotic eigenvalue PDFs of the RIS-assisted MIMO channels HH† with different
995
+ numbers of RIS panels. The numbers of transmit and receive antennas are set to T = R = 64, and the number of reflecting
996
+ elements of each RIS panel is set to 144.
997
+ In Fig. 3, we investigate the impacts of the SNR, the number of antennas, and the Rician factors
998
+ on the mutual information of the RIS-assisted MIMO channels. Equal number of antennas is set at the
999
+ transmitter and the receiver, where T = R = 4 in Fig. 3 (a) and T = R = 8 in Fig. 3 (b), respectively.
1000
+ The MIMO communication is assisted by K = 6 RIS panels, and each RIS panel is composed of
1001
+ 16 reflecting elements. Compared to the direct link F0, the relative channel gains [ρ1, . . . , ρ6] in (15)
1002
+ corresponding to the reflected links are configured as [0.9, 0.8, 0.7, 0.5, 0.3, 0.1]. All the Rician factors
1003
+ are set equal as κ = κ(F)
1004
+ k
1005
+ = κ(G)
1006
+ k
1007
+ , where κ is set to 1, 10, or 100. In presence of non-degenerate random
1008
+ DRAFT
1009
+
1010
+ 18
1011
+ scattering components �Fk in (3) and �Gk in (4), the RIS-assisted MIMO channels are full-rank, and the
1012
+ mutual information at large SNR linearly increases as min{T, R}/10 log10(e) nats/s/Hz for every 1 dB
1013
+ SNR improvement, depicted as the dashed lines in Fig. 3. However, as the Rician factor becomes large,
1014
+ although the mutual information has the same scaling law, it requires larger SNR levels to exhibit the
1015
+ linear improvement. This is illustrated in the insets of Fig. 3. When the Rician factors are κ = 1, 10,
1016
+ and 100, the asymptotic mutual information has at least 5% deviation from the high-SNR scaling law at
1017
+ SNRs 20.8 dB, 27.5 dB, and 34.2 dB when T = R = 4, and at SNRs 23.7 dB, 29.8 dB, and 36.1 dB
1018
+ when T = R = 8, respectively. This is due to the fact that as the Rician factor increases, the random
1019
+ scattering components to maintain the rank of the channel have less contributions to the overall MIMO
1020
+ channels.
1021
+ To further investigate the impacts of the Rician factor on the mutual information of the MIMO channels,
1022
+ we plot Fig. 4 to show the mutual information as a function of κ, with the numbers of RIS panels K
1023
+ set to 0, 1, 2, and 4, respectively. The number of transmit and receive antennas are set to T = 16 and
1024
+ R = 8, while the performance of the MIMO system is evaluated at SNR γ = 10 dB. It is observed that
1025
+ when κ is less than 1, the mutual information can be improved as κ increases, while it monotonically
1026
+ decreases for κ > 1 in all the considered cases. When the number of RIS panels is larger, the mutual
1027
+ information degradation is less prominent as each RIS provides independent reflected link, which increases
1028
+ the richness of the MIMO channels.
1029
+ In Fig. 5, the impact of the numbers of RIS panels is investigated in more details, when the mutual
1030
+ information is evaluated for different transmit antennas T = 8, 16, 32, and 64. The number of receive
1031
+ antennas is fixed to R = 10, and each RIS panel has 8 reflecting elements. In this simulation setting, we
1032
+ consider the urban canyon communication scenario as depicted in Fig. 1, where the specular components
1033
+ of {Fk} channels and of {Gk} channels have relatively small angular variations. That is, in (49)
1034
+ and (50), we assume that the departing angles
1035
+
1036
+ θ(F)
1037
+ k
1038
+ , φ(F)
1039
+ k
1040
+
1041
+ 0≤k≤K of the transmitter UPA and the
1042
+ arriving angles
1043
+
1044
+ ϕ(G)
1045
+ k
1046
+ , ν(G)
1047
+ k
1048
+
1049
+ 1≤k≤K of the receiver UPA are uniformly and randomly generated in some
1050
+ fixed intervals having length 0.05π. The departing angles
1051
+
1052
+ θ(G)
1053
+ k
1054
+ , φ(G)
1055
+ k
1056
+
1057
+ 1≤k≤K and the arriving angles
1058
+ DRAFT
1059
+
1060
+ 19
1061
+ 0
1062
+ 10
1063
+ 20
1064
+ 30
1065
+ 40
1066
+ 5
1067
+ 10
1068
+ 15
1069
+ 20
1070
+ 25
1071
+ 30
1072
+ 35
1073
+ 40
1074
+ Mutual information (nats/s/Hz)
1075
+ Asymptotic MI
1076
+ High-SNR MI
1077
+ Simulation
1078
+ 20
1079
+ 25
1080
+ 30
1081
+ 35
1082
+ 15
1083
+ 16
1084
+ 17
1085
+ 18
1086
+ = 1, 10, 100
1087
+ (a) T = R = 4
1088
+ 0
1089
+ 10
1090
+ 20
1091
+ 30
1092
+ 40
1093
+ 50
1094
+ 0
1095
+ 10
1096
+ 20
1097
+ 30
1098
+ 40
1099
+ 50
1100
+ 60
1101
+ 70
1102
+ 80
1103
+ Mutual information (nats/s/Hz)
1104
+ Asymptotic MI
1105
+ High-SNR MI
1106
+ Simulation
1107
+ 22
1108
+ 24
1109
+ 26
1110
+ 28
1111
+ 30
1112
+ 32
1113
+ 34
1114
+ 36
1115
+ 38
1116
+ 26
1117
+ 28
1118
+ 30
1119
+ 32
1120
+ 34
1121
+ = 1, 10, 100
1122
+ (b) T = R = 8
1123
+ Fig. 3.
1124
+ Mutual information of RIS-assisted MIMO channels at varying SNR γ, when the number of antennas at the transceivers
1125
+ is T = R = 4 in (a) and T = R = 8 in (b), respectively. In each case, the Rician factor of the component channels is set equal
1126
+ to κ = 1, 10, or 100. There are K = 6 deployed RIS panels, each of which has 16 reflecting elements. Insets show the 5%
1127
+ deviations of the asymptotic mutual information from the high-SNR scaling law.
1128
+ DRAFT
1129
+
1130
+ 20
1131
+ 0
1132
+ 2
1133
+ 4
1134
+ 6
1135
+ 8
1136
+ 10
1137
+ 12
1138
+ 14
1139
+ 4
1140
+ 6
1141
+ 8
1142
+ 10
1143
+ 12
1144
+ 14
1145
+ 16
1146
+ Mutual information (nat/s/Hz)
1147
+ Fig. 4. Mutual information of RIS-assisted MIMO channel for varying Rician factor κ. The number of antennas at the transmitter
1148
+ and the receiver are T = 16 and R = 8, respectively, and each RIS panel has 8 reflecting elements. The SNR of the end-to-end
1149
+ channel is set to γ = 10 dB.
1150
+
1151
+ ϕ(F)
1152
+ k
1153
+ , ν(F)
1154
+ k
1155
+
1156
+ 1≤k≤K of the RIS panels are randomly generated in some fixed intervals having length
1157
+ 0.1π. As K increases, Fig. 5 shows that the mutual information first improves at a larger rate between
1158
+ 0 ≤ K ≤ 5, and then becomes slower thereafter. This is due to the fact that the richness of the channels
1159
+ can be improved more efficiently when the number of reflected links is small. Since the angular ranges
1160
+ are restricted, the added RIS panels have similar reflected links that cannot provide additional richness.
1161
+ Therefore, it is less effective to deploy more RIS panels to improve the mutual information. Finally, as
1162
+ shown in Figs. 3-5, the mutual information calculated by (17) via the Cauchy transform (39) achieves a
1163
+ good agreement with the simulation in all the considered simulation cases, and thus, can be applied to
1164
+ evaluate the performance of the RIS-assisted MIMO channels.
1165
+ V. CONCLUSIONS
1166
+ This paper studies the information-theoretic data rate of the RIS-assisted MIMO systems, where
1167
+ multiple RIS panels are deployed to improve the scattering-limited MIMO channels. By using the
1168
+ DRAFT
1169
+
1170
+ 21
1171
+ 0
1172
+ 5
1173
+ 10
1174
+ 15
1175
+ 6
1176
+ 7
1177
+ 8
1178
+ 9
1179
+ 10
1180
+ 11
1181
+ 12
1182
+ 13
1183
+ Mutual information (nat/s/Hz)
1184
+ Fig. 5.
1185
+ Mutual information of RIS-assisted MIMO channel for varying numbers of RIS panels K. The number of receive
1186
+ antennas is R = 8, the number of elements in each RIS panel is 8, and the SNR of the channel is γ = 10 dB.
1187
+ operator-valued free probability theory, the Cauchy transform of the MIMO matrix is obtained using
1188
+ the general Rician MIMO model with Weichselberger’s correlation structure. Based on this result, the
1189
+ asymptotic eigenvalue distribution of the channel matrix as well as the mutual information of the MIMO
1190
+ channel are calculated, which closely match the corresponding simulation results for practical system
1191
+ configurations. Numerical results show that the additional reflected links created by the RIS panels can
1192
+ increase the range of eigenvalues of the channel matrix, which can be leveraged to improve the amplitude
1193
+ of the eigen-channels. In the MIMO communications, the negative impact of a large Rician factor on the
1194
+ mutual information can be partly alleviated by deploying more RIS panels. However, the performance
1195
+ improvement of the multi-RIS deployment slows down when the added reflected links have similar
1196
+ arriving and departing angles.
1197
+ DRAFT
1198
+
1199
+ 22
1200
+ APPENDIX A
1201
+ SOME USEFUL MATRIX INVERSION IDENTITIES
1202
+ For the sake of completeness, the following matrix inversion identities are summarized in Lemmas 1-3,
1203
+ which are repeatedly applied throughout this paper. For notational simplicity, in this appendix, we use
1204
+ italic bold symbols to define matrices, which are different from those used in the main sections.
1205
+ Lemma 1. (Woodbury matrix inversion identity [31, Eq. (0.7.4.1)].) Let A denote a m × m invertible
1206
+ matrix, D denote a k × k matrix, B and C denote m × k and k × m matrices, respectively. Then the
1207
+ following identity holds
1208
+ (A + BDC)−1 = A−1 − A−1B
1209
+
1210
+ D−1 + CA−1B
1211
+ �−1 CA−1.
1212
+ (52)
1213
+ Lemma 2. (2 × 2 block matrix inversion identity [31, Eq. (0.7.3.1)].) Let A, B, C, and D be defined
1214
+ as in Lemma 1, the inversion identity of the following 2 × 2 block matrix holds
1215
+
1216
+ ��
1217
+ A
1218
+ B
1219
+ C
1220
+ D
1221
+
1222
+ ��
1223
+ −1
1224
+ =
1225
+
1226
+ ��
1227
+ A−1 + A−1B(D − CA−1B)−1CA−1
1228
+ −A−1B(D − CA−1B)−1
1229
+ −(D − CA−1B)−1CA−1
1230
+ (D − CA−1B)−1
1231
+
1232
+ ��
1233
+ =
1234
+
1235
+ ��
1236
+ (A − BD−1C)−1
1237
+ −A−1B(D − CA−1B)−1
1238
+ −(D − CA−1B)−1CA−1
1239
+ (D − CA−1B)−1
1240
+
1241
+ �� ,
1242
+ (53)
1243
+ where the second equality holds when D is also invertible.
1244
+ Lemma 3. (3 × 3 block matrix inversion identity.) Let the matrices E, F , G, H, J, K, L, M, and N
1245
+ be the conformable partitions of the following 3 × 3 block matrix X
1246
+ X =
1247
+
1248
+ ������
1249
+ E
1250
+ F
1251
+ G
1252
+ H
1253
+ J
1254
+ K
1255
+ L
1256
+ M
1257
+ N
1258
+
1259
+ ������
1260
+ .
1261
+ DRAFT
1262
+
1263
+ 23
1264
+ When E is invertible, the inversion of X is given by
1265
+ X−1 =
1266
+
1267
+ ������
1268
+ E−1 + E−1(F A−1H + US−1V )E−1
1269
+ −E−1(F − US−1C)A−1
1270
+ −E−1US−1
1271
+ −A−1(H − BS−1V )E−1
1272
+ A−1 + A−1BS−1CA−1
1273
+ −A−1BS−1
1274
+ −S−1V E−1
1275
+ −S−1CA−1
1276
+ S−1
1277
+
1278
+ ������
1279
+ ,
1280
+ where
1281
+ A = J − HE−1F ,
1282
+ B = K − HE−1G,
1283
+ C = M − LE−1F ,
1284
+ D = N − LE−1G,
1285
+ (54)
1286
+ U = G − F A−1B,
1287
+ V = L − CA−1H,
1288
+ (55)
1289
+ S = D − CA−1B.
1290
+ (56)
1291
+ Proof: Apply Lemma 2 to the inversion of X that is partitioned into a 2 × 2 block matrix as
1292
+ X−1 =
1293
+
1294
+ ������
1295
+ E
1296
+ F
1297
+ G
1298
+ H
1299
+ J
1300
+ K
1301
+ L
1302
+ M
1303
+ N
1304
+
1305
+ ������
1306
+ −1
1307
+ =
1308
+
1309
+ ��
1310
+ P
1311
+ Q
1312
+ R
1313
+ Z−1
1314
+
1315
+ �� ,
1316
+ (57)
1317
+ where the matrix blocks P , Q, and R are given by
1318
+ P = E−1 + E−1
1319
+
1320
+ F
1321
+ G
1322
+
1323
+ Z−1
1324
+
1325
+ ��
1326
+ H
1327
+ L
1328
+
1329
+ �� E−1,
1330
+ (58)
1331
+ Q = −E−1
1332
+
1333
+ F
1334
+ G
1335
+
1336
+ Z−1,
1337
+ (59)
1338
+ R = −Z−1
1339
+
1340
+ ��
1341
+ H
1342
+ L
1343
+
1344
+ �� E−1,
1345
+ (60)
1346
+ and the matrix Z is a 2 × 2 block matrix such that
1347
+ Z =
1348
+
1349
+ ��
1350
+ J
1351
+ K
1352
+ M
1353
+ N
1354
+
1355
+ �� −
1356
+
1357
+ ��
1358
+ H
1359
+ L
1360
+
1361
+ �� E−1
1362
+
1363
+ F
1364
+ G
1365
+
1366
+ =
1367
+
1368
+ ��
1369
+ A
1370
+ B
1371
+ C
1372
+ D
1373
+
1374
+ �� ,
1375
+ (61)
1376
+ where A, B, C, and D are given in (54).
1377
+ Applying again Lemma 2 to the inversion of Z, we obtain
1378
+ Z−1 =
1379
+
1380
+ ��
1381
+ A−1 + A−1BS−1CA−1
1382
+ −A−1BS−1
1383
+ −S−1CA−1
1384
+ S−1
1385
+
1386
+ �� ,
1387
+ (62)
1388
+ DRAFT
1389
+
1390
+ 24
1391
+ where S is given in (56). Substituting (62) into (58), P can be rewritten as
1392
+ P = E−1 + E−1
1393
+
1394
+ F A−1 − US−1CA−1
1395
+ US−1
1396
+
1397
+
1398
+ ��
1399
+ H
1400
+ L
1401
+
1402
+ �� E−1
1403
+ = E−1 + E−1 �
1404
+ F A−1H + US−1V
1405
+
1406
+ E−1,
1407
+ (63)
1408
+ where U and V are defined in (55). Similarly, Q and R can be obtained as
1409
+ Q =
1410
+
1411
+ −E−1 �
1412
+ F − (G − F A−1B)S−1C
1413
+
1414
+ A−1
1415
+ −E−1 �
1416
+ G − F A−1B
1417
+
1418
+ S−1
1419
+
1420
+ =
1421
+
1422
+ −E−1 �
1423
+ F − US−1C
1424
+
1425
+ A−1
1426
+ −E−1US−1
1427
+
1428
+ ,
1429
+ (64)
1430
+ R =
1431
+
1432
+ ��
1433
+ −A−1HE−1 + A−1BS−1(L − CA−1H)E−1
1434
+ −S−1(L − CA−1H)E−1
1435
+
1436
+ �� =
1437
+
1438
+ ��
1439
+ −A−1(H − BS−1V )E−1
1440
+ −S−1V E−1
1441
+
1442
+ �� .
1443
+ (65)
1444
+ Finally, substituting (62)-(65) into (57) completes the proof of Lemma 3.
1445
+ APPENDIX B
1446
+ PROOF OF PROPOSITION 1
1447
+ A random variable �L ∈ M is said to be D-valued semicircular if the free cumulant
1448
+ κD
1449
+ m(�Lb1, �Lb2, . . . , �Lbm−1, �L) = 0,
1450
+ (66)
1451
+ for all n ̸= 2, and all b1, . . . , bn−1 ∈ D. The free cumulant κD
1452
+ m is a mapping from Mm to D and we
1453
+ refer the reader to [29] for detailed explanations on this topic. The proof is followed by expanding �L
1454
+ into a sum of n × n matrices, such that
1455
+ �L =
1456
+ K
1457
+
1458
+ k=0
1459
+ �L(F)
1460
+ k
1461
+ +
1462
+ K
1463
+
1464
+ k=1
1465
+ �L(G)
1466
+ k
1467
+ ,
1468
+ (67)
1469
+ DRAFT
1470
+
1471
+ 25
1472
+ where the matrices �L(F)
1473
+ k
1474
+ and �L(G)
1475
+ k
1476
+ are given by
1477
+ �L(F)
1478
+ k
1479
+ =
1480
+
1481
+ ���������
1482
+ 0R×L
1483
+ �Fk
1484
+ �F†
1485
+ k
1486
+ 0L×R
1487
+
1488
+ ���������
1489
+ ,
1490
+ (68)
1491
+ �L(G)
1492
+ k
1493
+ =
1494
+
1495
+ ���������
1496
+ �Gk
1497
+ 0L×T
1498
+ 0T×L
1499
+ �G†
1500
+ k
1501
+
1502
+ ���������
1503
+ ,
1504
+ (69)
1505
+ where �Fk and �Gk are L × T and R × L matrices, respectively, and are given by
1506
+ �Fk =
1507
+
1508
+ 0T×L0
1509
+ . . .
1510
+ �F†
1511
+ k
1512
+ . . .
1513
+ 0T×LK
1514
+ �†
1515
+ ,
1516
+ 0 ≤ k ≤ K,
1517
+ (70)
1518
+ �Gk =
1519
+
1520
+ 0R×R
1521
+ 0R×L1
1522
+ . . .
1523
+ √ρk �Gk
1524
+ . . .
1525
+ 0R×LK
1526
+
1527
+ ,
1528
+ 1 ≤ k ≤ K.
1529
+ (71)
1530
+ Recalling the definitions of �Fk and �Gk in (3) and (4), we have
1531
+ �L(F)
1532
+ k
1533
+ = A(F)
1534
+ k
1535
+ �X kA(F)†
1536
+ k
1537
+ ,
1538
+ (72)
1539
+ �L(G)
1540
+ k
1541
+ = A(G)
1542
+ k
1543
+ �YkA(G)†
1544
+ k
1545
+ ,
1546
+ (73)
1547
+ where the matrix �X k has the same structure as the block matrix �L(F)
1548
+ k
1549
+ in (68) while replacing �Fk in (70)
1550
+ with �Xk = Mk ⊙ Xk, and �Yk has the same structure as the block matrix �L(G)
1551
+ k
1552
+ in (69) while replacing
1553
+ �Gk in (71) with �Yk =
1554
+ 1
1555
+ √rk Nk ⊙ Yk. The n × n matrices A(F)
1556
+ k
1557
+ and A(G)
1558
+ k
1559
+ are given by
1560
+ A(F)
1561
+ k
1562
+ =
1563
+
1564
+ ��
1565
+ �Uk
1566
+ 0(R+L)×(T+L)
1567
+ 0(T+L)×(R+L)
1568
+ �Vk
1569
+
1570
+ �� ,
1571
+ (74)
1572
+ A(G)
1573
+ k
1574
+ =
1575
+
1576
+ ��
1577
+
1578
+ Wk
1579
+ 0(R+L)×(T+L)
1580
+ 0(T+L)×(R+L)
1581
+ �Sk
1582
+
1583
+ �� ,
1584
+ (75)
1585
+ DRAFT
1586
+
1587
+ 26
1588
+ where �Uk, �Vk, �
1589
+ Wk, �Sk are deterministic diagonal block matrices and are given by
1590
+ �Uk = blkdiag(0R, 0L0, . . . , Uk, . . . , 0LK),
1591
+ (76)
1592
+ �Vk = blkdiag(Vk, 0L),
1593
+ (77)
1594
+
1595
+ Wk = blkdiag(Wk, 0L),
1596
+ (78)
1597
+ �Sk = blkdiag(0T , 0L0, . . . , Sk, . . . , 0LK).
1598
+ (79)
1599
+ Since { �X k}0≤k≤K, {�Yk}1≤k≤K are Wigner matrices and independent from each other, they are semi-
1600
+ circular and free over the sub-algebra Dn ⊂ M of n × n diagonal matrices. Then, following the same
1601
+ arguments as in [32, Appendix B], {�L(F)
1602
+ k
1603
+ }0≤k≤K and {�L(G)
1604
+ k
1605
+ }1≤k≤K are semicircular and free over sub-
1606
+ algebra of block diagonal matrices D. Therefore, the sum of �L(F)
1607
+ k
1608
+ and �L(G)
1609
+ k
1610
+ is also semicircular over D
1611
+ and is free from any deterministic matrix from M.
1612
+ APPENDIX C
1613
+ PROOF OF PROPOSITION 2
1614
+ Since �L is an operator-valued semicircular variable over D and �L are free from L over D, the
1615
+ limiting spectral distribution of L is a free additive convolution of the limiting spectral distributions of
1616
+ �L and L. Specifically, the operator-valued Cauchy transform GD
1617
+ L can be calculated via the subordination
1618
+ formula (38). Recall that the R-transform RD
1619
+ �L (·) is the free cumulant generating function of �L with the
1620
+ following formal power series expansion:
1621
+ RD
1622
+ �L (K) = κD
1623
+ 1 ( �K) + κD
1624
+ 2 (�LK, �L) + κD
1625
+ 3 (�LK, �LK, �L) + · · · ,
1626
+ (80)
1627
+ where κD
1628
+ i denotes the i-th free cumulant of �L over D. In addition, since �L is semicircular over D, all
1629
+ its cumulants in (80) except κD
1630
+ 2 are zero. Therefore, the R-transform RD
1631
+ �L (K) reduces to the covariance
1632
+ DRAFT
1633
+
1634
+ 27
1635
+ function of �L over D parameterized by K, i.e.,
1636
+ RD
1637
+ �L(K) = ED
1638
+
1639
+ �LK�L
1640
+
1641
+ =
1642
+
1643
+ ���������
1644
+ �K
1645
+ k=1 �ηk(Ck)
1646
+ �ζ( �D)
1647
+ �K
1648
+ k=0 ζk(Dk)
1649
+ η(�C)
1650
+
1651
+ ���������
1652
+ ,
1653
+ (81)
1654
+ where �ζ( �D) = blkdiag
1655
+
1656
+ �ζ0( �D), . . . , �ζK( �D)
1657
+
1658
+ and η(�C) = blkdiag
1659
+
1660
+ 0R, η1(�C), . . . , ηK(�C)
1661
+
1662
+ .
1663
+ Since GD
1664
+ L (Λ(z)) ∈ D, by same matrix partitioning as in (23), GD
1665
+ L (Λ(z)) is partitioned into
1666
+ GD
1667
+ L (Λ(z)) = blkdiag
1668
+
1669
+ G �C(z), GD(z), G �D(z), GC(z)
1670
+
1671
+ ,
1672
+ (82)
1673
+ where GD(z) = blkdiag {GD0(z), . . . , GDK(z)} and GC(z) = blkdiag {0R, GC1(z), . . . , GCK(z)}. Note
1674
+ that the upper-left block
1675
+
1676
+ GD
1677
+ L (Λ(z))
1678
+ �(1,1) = G �C(z), which is then used to compute GB(z) = 1
1679
+ RTr(G �C(z)).
1680
+ By replacing K in (81) with GD
1681
+ L (Λ(z)) in (82), and substituting L and RD
1682
+ �L with (36) and (81),
1683
+ respectively, we obtain GD
1684
+ L (Λ(z)) as
1685
+ GD
1686
+ L (Λ(z)) =
1687
+
1688
+ ���������
1689
+ G �C(z)
1690
+ GD(z)
1691
+ G �D(z)
1692
+ GC(z)
1693
+
1694
+ ���������
1695
+ = ED
1696
+
1697
+
1698
+
1699
+
1700
+
1701
+
1702
+
1703
+
1704
+
1705
+
1706
+ �Ψ(z)
1707
+ 0
1708
+ 0
1709
+ −G
1710
+ 0
1711
+ �Φ(z)
1712
+ −F
1713
+ IL
1714
+ 0
1715
+ −F
1716
+
1717
+ Φ(z)
1718
+ 0
1719
+ −G
1720
+
1721
+ IL
1722
+ 0
1723
+ Ψ(z)
1724
+
1725
+
1726
+
1727
+
1728
+
1729
+
1730
+
1731
+
1732
+
1733
+
1734
+ −1
1735
+ ,
1736
+ (83)
1737
+ where �Ψ(z), Ψ(z), �Φ(z), and Φ(z) are given in (41)-(44). By invoking Lemma 2 to the RHS of (83)
1738
+ and taking expectation over D, the matrix-valued function G �C(z) = A−1
1739
+ 1 , and GD(z), G �D(z), GC(z) are
1740
+ DRAFT
1741
+
1742
+ 28
1743
+ the diagonal blocks of the matrix A−1
1744
+ 2 , where A1 and A2 are given by
1745
+ A1 = �Ψ(z) −
1746
+
1747
+ 0
1748
+ 0
1749
+ G
1750
+
1751
+
1752
+ ������
1753
+ �Φ(z)
1754
+ −F
1755
+ IL
1756
+ −F
1757
+
1758
+ Φ(z)
1759
+ 0
1760
+ IL
1761
+ 0
1762
+ Ψ(z)
1763
+
1764
+ ������
1765
+ −1 �
1766
+ ������
1767
+ 0
1768
+ 0
1769
+ G
1770
+
1771
+
1772
+ ������
1773
+ ,
1774
+ (84)
1775
+ A2 =
1776
+
1777
+ ������
1778
+ �Φ(z)
1779
+ −F
1780
+ IL
1781
+ −F
1782
+
1783
+ Φ(z)
1784
+ 0
1785
+ IL
1786
+ 0
1787
+ Ψ(z)
1788
+
1789
+ ������
1790
+
1791
+
1792
+ ������
1793
+ 0
1794
+ 0
1795
+ G
1796
+
1797
+
1798
+ ������
1799
+ �Ψ(z)−1
1800
+
1801
+ 0
1802
+ 0
1803
+ G
1804
+
1805
+ .
1806
+ (85)
1807
+ Applying Lemma 3, the RHS of (84) can be further derived as
1808
+ A1 = �Ψ(z) − GS−1G
1809
+ †,
1810
+ (86)
1811
+ where S = Ξ(z) and is calculated in (56) as
1812
+ S = Ξ(z) = Ψ(z) − �Φ(z)−1 − �Φ(z)−1F
1813
+
1814
+ Φ(z) − F
1815
+ † �Φ(z)−1F
1816
+ �−1
1817
+ F
1818
+ † �Φ(z)−1
1819
+ = Ψ(z) −
1820
+
1821
+ �Φ(z) − FΦ(z)−1F
1822
+ †�−1
1823
+ .
1824
+ (87)
1825
+ The second equality of (87) is obtained by applying Lemma 1. Then, (45) is established by combining
1826
+ (86) and (87).
1827
+ The inverse of A2 can be explicitly calculated via Lemma 3, where E = �Φ(z), F = H† = −F,
1828
+ G = L = IL, J = Φ(z), K = M = 0, and N = Ψ(z) − G
1829
+ † �Ψ(z)−1G. We further let T =
1830
+ Φ(z)−F
1831
+ † �Φ(z)−1F and �T = �Φ(z)−FΦ(z)−1F
1832
+ †. Then, the matrix-valued functions GD(z), G �D(z), and
1833
+ GC(z), being the diagonal blocks of A−1
1834
+ 2 , are given by
1835
+ GD(z) = �Φ(z)−1 + �Φ(z)−1FT −1F
1836
+ † �Φ(z)−1 + �T −1 �
1837
+ N − �T −1�−1 �T −1,
1838
+ (88)
1839
+ G �D(z) = T −1 + T −1F
1840
+ † �Φ(z)−1 �
1841
+ N − �T −1�−1 �Φ(z)−1F T −1,
1842
+ (89)
1843
+ GC(z) =
1844
+
1845
+ N −
1846
+
1847
+ �Φ(z)−1 + �Φ(z)−1FT −1F
1848
+ † �Φ(z)−1��−1
1849
+ .
1850
+ (90)
1851
+ Finally, applying Lemma 1 to (88)-(90), we obtain GD(z), G �D(z), and GC(z) as in (46)-(48).
1852
+ DRAFT
1853
+
1854
+ 29
1855
+ REFERENCES
1856
+ [1] W. Saad, M. Bennis, and M. Chen, “A vision of 6G wireless systems: Applications, trends, technologies, and open research
1857
+ problems,” IEEE Netw., vol. 34, no. 3, pp. 134–142, May 2020.
1858
+ [2] I. E. Telatar, “Capacity of multi-antenna Gaussian channels,” Eur. Trans. Telecommun., vol. 10, no. 6, pp. 585–595, 1999.
1859
+ [3] H. Shin and J. H. Lee, “Capacity of multiple-antenna fading channels: Spatial fading correlation, double scattering, and
1860
+ keyhole,” IEEE Trans. Inf. Theory, vol. 49, no. 10, pp. 2636–2647, Oct. 2003.
1861
+ [4] C. Pan, H. Ren, K. Wang, J. F. Kolb, M. Elkashlan, M. Chen, M. Di Renzo, Y. Hao, J. Wang, and A. L. Swindlehurst,
1862
+ “Reconfigurable intelligent surfaces for 6G systems: Principles, applications, and research directions,” IEEE Commun.
1863
+ Mag., vol. 59, no. 6, pp. 14–20, June 2021.
1864
+ [5] Q. Wu and R. Zhang, “Towards smart and reconfigurable environment: Intelligent reflecting surface aided wireless network,”
1865
+ IEEE Commun. Mag., vol. 58, no. 1, pp. 106–112, Jan. 2020.
1866
+ [6] Y. Zhang, J. Zhang, M. Di Renzo, H. Xiao, and B. Ai, “Performance analysis of RIS-aided systems with practical phase
1867
+ shift and amplitude response,” IEEE Trans. Veh. Technol., vol. 70, no. 5, pp. 4501–4511, May 2021.
1868
+ [7] L. Yang, F. Meng, Q. Wu, D. B. Da Costa, and M.-S. Alouini, “Accurate closed-form approximations to channel distributions
1869
+ of RIS-aided wireless systems,” IEEE Wireless Commun. Lett., vol. 9, no. 11, pp. 1985–1989, Nov. 2020.
1870
+ [8] A. M. Salhab and M. H. Samuh, “Accurate performance analysis of reconfigurable intelligent surfaces over Rician fading
1871
+ channels,” IEEE Wireless Commun. Lett., vol. 10, no. 5, pp. 1051–1055, May 2021.
1872
+ [9] S. P. Dash, S. Joshi, and S. Aissa, “Envelope distribution of two correlated complex Gaussian random variables and
1873
+ application to the performance evaluation of RIS-assisted communications,” IEEE Commun. Lett., vol. 26, no. 9, pp.
1874
+ 2018-2022, Sept. 2022.
1875
+ [10] Z. Xie, W. Yi, X. Wu, Y. Liu, and A. Nallanathan, “Downlink multi-RIS aided transmission in backhaul limited networks,”
1876
+ IEEE Wireless Commun. Lett., vol. 11, no. 7, pp. 1458–1462, July 2022.
1877
+ [11] R. Hashemi, S. Ali, N. H. Mahmood, and M. Latva-aho, “Average rate and error probability analysis in short packet
1878
+ communications over RIS-aided URLLC systems,” IEEE Trans. Veh. Technol., vol. 70, no. 10, pp. 10320–10334, Oct.
1879
+ 2021.
1880
+ [12] I. Yildirim, A. Uyrus, and E. Basar, “Modeling and analysis of reconfigurable intelligent surfaces for indoor and outdoor
1881
+ applications in future wireless networks,” IEEE Trans. Commun., vol. 69, no. 2, pp. 1290–1301, Feb. 2021.
1882
+ [13] L. Yang, Y. Yang, D. B. Da Costa, and I. Trigui, “Outage probability and capacity scaling law of multiple RIS-aided
1883
+ networks,” IEEE Wireless Commun. Lett., vol. 10, no. 2, pp. 256–260, Feb. 2021.
1884
+ [14] T. N. Do, G. Kaddoum, T. L. Nguyen, D. B. Da Costa, and Z. J. Haas, “Multi-RIS-aided wireless systems: Statistical
1885
+ characterization and performance analysis,” IEEE Trans. Commun., vol. 69, no. 12, pp. 8641–8658, Dec. 2021.
1886
+ [15] Z. Shi, H. Wang, Y. Fu, G. Yang, S. Ma, and F. Gao, “Outage analysis of reconfigurable intelligent surface aided MIMO
1887
+ communications with statistical CSI,” IEEE Trans. Wireless Commun., vol. 21, no. 2, pp. 823–839, Feb. 2022.
1888
+ DRAFT
1889
+
1890
+ 30
1891
+ [16] B. D. Carter and M. D. Springer, “The distribution of products, quotients and powers of independent H-function variates,”
1892
+ SIAM J. Applied Maths., vol. 33, no. 4, pp. 542–558, Dec. 1977.
1893
+ [17] O. E. Ayach, S. Rajagopal, S. Abu-Surra, Z. Pi, and R. W. Heath, “Spatially sparse precoding in millimeter wave MIMO
1894
+ systems,” IEEE Trans. Wireless Commun., vol. 13, no. 3, pp. 1499–1513, Mar. 2014.
1895
+ [18] R. Li, S. Sun, Y. Chen, C. Han, and M. Tao, “Ergodic achievable rate analysis and optimization of RIS-assisted millimeter-
1896
+ wave MIMO communication systems,” IEEE Trans. Wireless Commun., in press.
1897
+ [19] K. Xu, J. Zhang, X. Yang, S. Ma, and G. Yang, “On the sum-rate of RIS-assisted MIMO multiple-access channels over
1898
+ spatially correlated Rician fading,” IEEE Trans. Commun., vol. 69, no. 12, pp. 8228–8241, Dec. 2021.
1899
+ [20] X. Zhang, X. Yu, and S. H. Song, “Outage probability and finite-SNR DMT analysis for IRS-aided MIMO systems: How
1900
+ large IRSs need to be?,” IEEE J. Sel. Top. Signal Process., vol. 16, no. 5, pp. 1070–1085, Aug. 2022.
1901
+ [21] J. Zhang, J. Liu, S. Ma, C.-K. Wen, and S. Jin, “Large system achievable rate analysis of RIS-assisted MIMO wireless
1902
+ communication with statistical CSIT,” IEEE Trans. Wireless Commun., vol. 20, no. 9, pp. 5572–5585, Sept. 2021.
1903
+ [22] W. Weichselberger, M. Herdin, H. ¨Ozcelik, and E. Bonek, “A stochastic MIMO channel model with joint correlation of
1904
+ both link ends,” IEEE Trans. Wireless Commun., vol. 5, no. 1, pp. 90-100, Jan. 2006.
1905
+ [23] Z. Zheng, L. Wei, R. Speicher, R. R. M¨uller, J. H¨am¨al¨ainen, and J. Corander, “Asymptotic analysis of Rayleigh product
1906
+ channels: A free probability approach,” IEEE Trans. Inf. Theory, vol. 63, no. 3, pp. 1731–1745, Mar. 2017.
1907
+ [24] R. R. M¨uller, “A random matrix model of communication via antenna arrays,” IEEE Trans. Inf. Theory, vol. 48, no. 9, pp.
1908
+ 2495–2506, Sept. 2002.
1909
+ [25] R. Couillet and M. Debbah, Random Matrix Methods for Wireless Communications. Cambridge: Cambridge University
1910
+ Press, 2011.
1911
+ [26] R. R. M¨uller, “On the asymptotic eigenvalue distribution of concatenated vector-valued fading channels,” IEEE Trans. Inf.
1912
+ Theory, vol. 48, no. 7, pp. 2086-2091, July 2002.
1913
+ [27] F. Benaych-Georges, “Rectangular random matrices, related free entropy and free Fischer’s information,” J. Operator Th.,
1914
+ vol. 62, no. 2, pp. 371-419, 2009.
1915
+ [28] M. Capitaine and C. Donati-Martin, “Strong asymptotic freeness for Wigner and Wishart matrices,” Indiana Univ. Math.
1916
+ J., vol. 56, no. 2, pp. 767-803, 2007.
1917
+ [29] J. A. Mingo and R. Speicher, Free Probability and Random Matrices. New York: Springer, 2017.
1918
+ [30] S. T. Belinschi, T. Mai, and R. Speicher, “Analytic subordination theory of operator-valued free additive convolution and
1919
+ the solution of a general random matrix problem,” J. Reine Angew. Math. (Crelles J.), vol. 2017, no. 732, pp. 21–53, Apr.
1920
+ 2017.
1921
+ [31] R. A. Horn and C. R. Johnson, Matrix Analysis. New York: Cambridge University Press, 2013.
1922
+ [32] A.-A. Lu, X. Gao, and C. Xiao, “Free deterministic equivalents for the analysis of MIMO multiple access channel,” IEEE
1923
+ Trans. Inf. Theory, vol. 62, no. 8, pp. 4604-4629, Aug. 2016.
1924
+ DRAFT
1925
+
3NFLT4oBgHgl3EQfri9A/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
5tE2T4oBgHgl3EQf6wj3/content/2301.04204v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:d9a5edd14e7945e3caf1971ed25a16708c4995cd23539d5fcf04790d185d6dbd
3
+ size 686996
5tE2T4oBgHgl3EQf6wj3/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:87a787f8d81cb1942aef083bf52bdff7c8cbeb2d5191704a7d51014a0d317952
3
+ size 7667757
5tE2T4oBgHgl3EQf6wj3/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:a555174228f3bda255cb9ef5f1e61eb1f0b23226a20c4fcce277938b5af8e423
3
+ size 291632
6tE0T4oBgHgl3EQffABm/content/2301.02398v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:6b0a5629a4f87f0a550796c3f32568c5e0943eca142a74c4b6e4628bf5a18b78
3
+ size 573619
6tE0T4oBgHgl3EQffABm/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:dcaa810008b6916a10fcf3ad45ec55fd3bc9cb173c42eb053d62dfb6198fa05e
3
+ size 93030
89E4T4oBgHgl3EQfdgwn/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:baaadf8a1f508c060ec3629e2fb7c9ab4a78dba1244166809f07ccafd988b558
3
+ size 2687021
8NA0T4oBgHgl3EQfOf_i/content/tmp_files/2301.02163v1.pdf.txt ADDED
@@ -0,0 +1,2215 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Resonant triad interactions of gravity waves
2
+ in cylindrical basins
3
+ Matthew Durey1 and Paul A. Milewski2
4
+ 1School of Mathematics and Statistics, University of Glasgow, University Place, Glasgow G12 8QQ, UK
5
+ 2Department of Mathematical Sciences, University of Bath, Claverton Down, Bath BA2 7AY, UK
6
+ Abstract
7
+ We present the results of a theoretical investigation into the existence, evolution and ex-
8
+ citation of resonant triads of nonlinear free-surface gravity waves confined to a cylinder of
9
+ finite depth. It is well known that resonant triads are impossible for gravity waves in laterally
10
+ unbounded domains; we demonstrate, however, that horizontal confinement of the fluid may
11
+ induce resonant triads for particular fluid depths. For any three correlated wave modes arising
12
+ in a cylinder of arbitrary cross-section, we prove necessary and sufficient conditions for the
13
+ existence of a depth at which nonlinear resonance may arise, and show that the resultant crit-
14
+ ical depth is unique. We enumerate the low-frequency triads for circular cylinders, including
15
+ a new class of resonances between standing and counter-propagating waves, and also briefly
16
+ discuss annular and rectangular cylinders. Upon deriving the triad amplitude equations for a
17
+ finite-depth cylinder of arbitrary cross-section, we deduce that the triad evolution is always
18
+ periodic, and determine parameters controlling the efficiency of energy exchange. In order to
19
+ excite a particular triad, we explore the influence of external forcing; in this case, the triad
20
+ evolution may be periodic, quasi-periodic, or chaotic. Finally, our results have potential im-
21
+ plications on resonant water waves in man-made and natural basins, such as industrial-scale
22
+ fluid tanks, harbours and bays.
23
+ 1
24
+ Introduction
25
+ Nonlinear resonance is a mechanism by which energy is continuously transferred between a small
26
+ number of linear wave modes. This phenomenon, first observed in Wilton’s analysis of gravity-
27
+ capillary wave trains [63], has been the subject of frequent investigation over the past century
28
+ [36, 37, 38, 54, 52, 19, 15]; indeed, nonlinear resonance has since observed for wave trains in a
29
+ growing number of dispersive wave systems, including gravity waves [48, 21, 33, 2], acoustic-gravity
30
+ waves [27, 26], flexural-gravity waves [58], two-layer flows [1, 25, 53], and atmospheric flows [51, 50].
31
+ Whilst the aforementioned studies typically consider nonlinear resonance for laterally unbounded
32
+ domains, the purpose of this study is to demonstrate that energy exchange between free-surface
33
+ gravity waves may be induced and accentuated by horizontal confinement.
34
+ We focus our study on the collective resonance of three linear wave modes, henceforth referred to
35
+ as a triad [5]. In laterally unbounded domains, the monotonic and concave form of the dispersion
36
+ curve precludes the existence of resonant triads for gravity wave trains at finite depth [48, 21],
37
+ with resonant quartets instead being the smallest possible collective resonant interaction [2, 33, 4].
38
+ However, confinement of the fluid to a vertical cylinder results in linear wave modes that differ in
39
+ 1
40
+ arXiv:2301.02163v1 [physics.flu-dyn] 5 Jan 2023
41
+
42
+ form to sinusoidal plane waves (except for a rectangular cylinder), so the preclusion of resonant
43
+ triads no longer applies. Indeed, our study demonstrates that, under certain conditions, resonant
44
+ triads may arise in cylinders of arbitrary cross-section for specific values of the fluid depth. As
45
+ resonant triads evolve over a much faster time scale than that of resonant quartets, the exchange
46
+ of energy in gravity waves is thus more efficient under the influence of lateral confinement [40],
47
+ with potential implications on resonant sloshing in man-made and natural basins [8].
48
+ Prior investigations of confined resonant free-surface gravity waves have predominantly focused
49
+ on the so-called 1:2 resonance, which arises when two of the three linear wave modes comprising
50
+ a triad coincide. For axisymmetric standing waves in a circular cylinder, Mack [34] determined a
51
+ condition for the existence of critical depth-to-radius ratios at which a 1:2 resonance may arise, a
52
+ result later generalised to cylinders of arbitrary cross-section [44]. Miles [42, 43] then characterised
53
+ the weakly nonlinear evolution of such internal resonances, demonstrating that a 1:2 resonance is
54
+ impossible in a rectangular cylinder [42]. Although Miles’ seminal results provide an informative
55
+ view of the weakly nonlinear dynamics, the influence of fully nonlinear effects was later assessed
56
+ by Bryant [8] and Yang et al. [64]. For the case of a circular cylinder of finite depth, Bryant [8]
57
+ and Yang et al. [64] both characterised new steadily propagating nonlinear waves arising in the
58
+ vicinity of a 1:2 resonance, and Yang et al. [64] also computed nonlinear near-resonant axisymmetric
59
+ standing waves. Finally, broader mathematical properties of water waves exhibiting O(2) symmetry
60
+ (of which a circular cylinder is one example) were analysed by Bridges & Dias [6] and Chossat &
61
+ Dias [12].
62
+ Given the restrictive set of critical depths at which a 1:2 resonance may arise [8, 64], it is
63
+ natural to explore the possibility of nonlinear resonance in cylinders whose depth departs from the
64
+ depths that trigger a 1:2 resonance. To the best of our knowledge, the first and only such study
65
+ was the seminal experimental investigation performed by Michel [40], who focused on resonant
66
+ triads arising for free-surface gravity waves confined to a finite-depth circular cylinder. Notably,
67
+ the cylinder depth in Michel’s experiment was judiciously chosen so as to isolate a specific triad.
68
+ Michel utilised bandlimited random horizontal vibration so as to excite two members of the triad,
69
+ whose nonlinear interaction led to the growth of the third mode. Significantly, the energy of the
70
+ third mode was, on average, the product of the energies of the remaining two modes, thereby
71
+ satisfying the quadratic energy exchange typical of resonant triads.
72
+ In order to exemplify the mechanism of nonlinear resonance, Michel [40] also calculated the
73
+ response of a child mode due to the nonlinear interaction between two parent modes (where all
74
+ three wave modes comprise the triad). Notably, Michel’s calculation is restricted to the early stages
75
+ of growth and to particular relative phases of the wave modes. In addition Michel considered a
76
+ fluid of infinite depth for all but the resonance conditions, for which finite-depth corrections were
77
+ included. In contrast, we consider general resonances in arbitrary cylinders of finite depth and
78
+ derive equations for the triad evolution over long time-scales. We also believe some nonlinear
79
+ contributions to the interactions were omitted from Michel’s calculation, resulting in quantitative
80
+ differences (see §4.3).
81
+ The goal of our study is to unify the existence and evolution of 1:2 and triadic resonances
82
+ into a single mathematical framework, effectively characterising all triad interactions of this type.
83
+ Based on existing theory, it is unclear how the existence of resonant triads depends on the form
84
+ of the cylinder cross-section, and which combinations of wave modes are permissible for judicious
85
+ choice of the fluid depth. Furthermore, the range of depths that may excite a particular triad
86
+ is uncertain, with 1:2 resonances only excited in a very narrow window about each critical depth
87
+ [34, 44]. Once a particular triad is excited, one anticipates that the triad evolution will be governed
88
+ by the canonical triad equations [5, 15]; however, quantifying the triad evolution and relative energy
89
+ 2
90
+
91
+ exchange requires computation of the triad coupling coefficients. Finally, it is unclear how best to
92
+ excite triads in arbitrary cylinders, both with and without external forcing.
93
+ We here present a relatively comprehensive characterisation of the existence, evolution and
94
+ excitation of resonant triads for gravity waves confined to a cylinder of arbitrary cross-section
95
+ and finite depth. In order to reduce the problem to its key components, we first truncate the
96
+ Euler equations, recasting the fluid evolution in terms of a finite-depth Benney-Luke equation
97
+ (§2), incorporating only the nonlinear interactions necessary for resonant triads. In §3, we prove
98
+ necessary and sufficient conditions for there to exist a finite depth at which three linear wave
99
+ modes may form a resonant triad. In particular, we prove that resonant triads are impossible
100
+ for rectangular cylinders, yet there is an abundance of resonant triads for circular cylinders. We
101
+ then use multiple-scales analysis to determine the long-time evolution of a triad in a cylinder of
102
+ arbitrary cross-section (§4), from which we characterise the relative coupling of different triads.
103
+ Finally, we explore the excitation of resonant triads (§5), and discuss the potential extension of
104
+ our theoretical developments to the cases of applied forcing and two-layer flows (§6).
105
+ 2
106
+ Formulation
107
+ We consider the irrotational flow of an inviscid, incompressible liquid that is bounded above by
108
+ a free surface, confined laterally by the vertical walls of a cylinder whose horizontal cross-section,
109
+ D, is enclosed by the curve ∂D, and bounded below by a rigid horizontal plane lying a distance H
110
+ below the undisturbed free surface; see figure 1. We consider the fluid evolution in dimensionless
111
+ variables, taking the cylinder’s typical horizontal extent, a, as the unit of length, and
112
+
113
+ ag−1 as
114
+ the unit of time, where g is the acceleration due to gravity. It follows that the dimensionless
115
+ free-surface elevation, η(x, t), and velocity potential, φ(x, z, t), evolve according to the equations
116
+ ∆φ + φzz = 0
117
+ for x ∈ D,
118
+ −h < z < ϵη,
119
+ (1a)
120
+ φt + η + ϵ
121
+ 2
122
+
123
+ |∇φ|2 + φ2
124
+ z
125
+
126
+ = 0
127
+ for x ∈ D,
128
+ z = ϵη,
129
+ (1b)
130
+ ηt + ϵ∇φ · ∇η = φz
131
+ for x ∈ D,
132
+ z = ϵη,
133
+ (1c)
134
+ n · ∇φ = 0
135
+ for x ∈ ∂D,
136
+ −h < z < ϵη,
137
+ (1d)
138
+ φz = 0
139
+ for x ∈ D,
140
+ z = −h,
141
+ (1e)
142
+ corresponding to the continuity equation, dynamic and kinematic boundary conditions, and no-
143
+ flux through the vertical walls and horizontal base, respectively. In equation (1), the dimensionless
144
+ parameter ϵ is proportional to the typical wave slope, h = H/a is the ratio of the fluid depth to
145
+ the typical horizontal extent, n is a unit vector normal to the boundary ∂D, and the operators ∇
146
+ and ∆ denote the horizontal gradient and Laplacian, respectively. Moreover, conservation of mass
147
+ implies that the free surface satisfies
148
+ ��
149
+ D η dA = 0 for all time. Finally, in dimensional variables,
150
+ ax is the two-dimensional horizontal coordinate, az is the upward-pointing vertical coordinate,
151
+
152
+ ag−1t denotes time, ϵaη is the free-surface displacement, and ϵa√agφ is the velocity potential.
153
+ We aim to develop a broad framework for understanding resonant triads in a cylinder of finite
154
+ depth; however, care must be taken when modelling fluid-boundary interactions and determining
155
+ the class of permissible cylinder cross-sections.
156
+ From a modelling perspective, we employ an
157
+ assumption generally implicit to the water-wave problem in bounded domains; specifically, we
158
+ neglect the meniscus and dissipation arising near the vertical walls [41], thus determining that
159
+ the free surface intersects the boundary normally, i.e. n · ∇η = 0 for x ∈ ∂D [46]. In order to
160
+ 3
161
+
162
+ Figure 1: Schematic diagram of the cylindrical tank (with cross-section D and boundary ∂D)
163
+ partially filled with liquid. The undisturbed free surface (dashed lines) lies on z = 0, a distance H
164
+ above the rigid bottom plane (grey). The disturbed free surface is sketched in dash-dotted lines.
165
+ maximise the generality of our investigation, we allow the cylinder cross-section, D, to be fairly
166
+ arbitrary; however, the mathematical developments presented herein require D to be bounded
167
+ with a piecewise-smooth boundary, thereby allowing us to utilise the spectral theorem for compact
168
+ self-adjoint operators [29] and the divergence theorem. As most cylinders of practical interest
169
+ consist of a piecewise-smooth boundary, this mathematical restriction fails to limit the breadth of
170
+ our study.
171
+ 2.1
172
+ Derivation of the Benney-Luke equation
173
+ As our study is focused on the weakly nonlinear evolution of small-amplitude waves, we proceed
174
+ to simplify (1) in the case 0 < ϵ ≪ 1 and h = O(1). We begin by expanding the dynamic and
175
+ kinematic boundary conditions (equations (1b)–(1c)) about z = 0 in powers of ϵ, which, upon
176
+ eliminating η, gives rise to the equation [2, 47]
177
+ φtt + φz = ϵ
178
+
179
+ ∂t(φtzφt) + φzzφt − ∂t(|∇φ|2) − φzφzt
180
+
181
+ + O(ϵ2)
182
+ for
183
+ x ∈ D,
184
+ z = 0.
185
+ (2)
186
+ To reduce the fluid evolution to the dynamics arising on the linearised free surface, z = 0, we
187
+ define the Dirichlet-to-Neumann operator, L , so that L φ|z=0 = φz|z=0. Here φ satisfies Laplace’s
188
+ equation (1a) over the linearised domain −h < z < 0, with ∂zφ = 0 on z = −h (see equation (1e))
189
+ and n·∇φ = 0 for x ∈ ∂D (see equation (1d)). Notably, the Dirichlet-to-Neumann operator may be
190
+ defined in terms of its spectral representation, as detailed in §2.2. By denoting u(x, t) = φ(x, 0, t),
191
+ we finally obtain the finite-depth Benney-Luke equation [2, 3, 47]
192
+ utt + L u + ϵ
193
+
194
+ ut
195
+
196
+ L 2 + ∆
197
+
198
+ u + ∂
199
+ ∂t
200
+
201
+ (L u)2 + |∇u|2��
202
+ = O(ϵ2)
203
+ for
204
+ x ∈ D,
205
+ (3)
206
+ where we have simplified the nonlinear terms in equation (2) using φzz = −∆φ and utt = −L u +
207
+ O(ϵ).
208
+ 4
209
+
210
+ H
211
+ DThe remainder of our investigation will be focused on the evolution of resonant triads governed
212
+ by the Benney-Luke equation (3). As resonant triads arising in confined geometries are governed
213
+ primarily by quadratic nonlinearities, it is sufficient to neglect terms of size O(ϵ2) in equation
214
+ (3); however, higher-order corrections to the Benney-Luke equation may be derived by following
215
+ a similar expansion procedure [2, 47, 4].
216
+ Although our investigation is mainly focused on the
217
+ evolution of the velocity potential, u, one may recover the leading-order free-surface elevation from
218
+ the dynamic boundary condition (1b), namely η = −ut + O(ϵ).
219
+ 2.2
220
+ Spectral representation of the Dirichlet-to-Neumann operator
221
+ The Dirichlet-to-Neumann operator, L , may be understood in terms of the discrete set of orthog-
222
+ onal eigenfunctions of the horizontal Laplacian operator [29]. Specifically, we consider the set of
223
+ real-valued eigenfunctions, Φn(x), satisfying
224
+ −∆Φn = k2
225
+ nΦn for n = 0, 1, . . . ,
226
+ where the corresponding eigenvalues, k2
227
+ n, are ordered so that 0 = k0 < k1 ≤ k2 ≤ . . .. Moreover,
228
+ each eigenfunction satisfies the boundary condition n · ∇Φn = 0 on ∂D, as motivated by the no-
229
+ flux condition (1d). Finally, the orthogonal eigenfunctions are normalised so that ⟨Φm, Φn⟩ = δmn,
230
+ where
231
+ ⟨f, g⟩ = 1
232
+ S
233
+ ��
234
+ D
235
+ fg dA
236
+ defines an inner product for real functions f and g, S is the area of D, and δmn is the Kronecker
237
+ delta. Notably, Φ0(x) = 1 is the constant eigenfunction, with corresponding eigenvalue k0 = 0.
238
+ To determine the Dirichlet-to-Neumann operator for sufficiently smooth φ, we first substitute
239
+ the series expansion φ(x, z) = �∞
240
+ n=0 φn(z)Φn(x) into Laplace’s equation (1a), where we have
241
+ temporally omitted the time dependence. We then solve the resulting equation for φn(z) over the
242
+ linearised domain −h < z < 0, in conjunction with the no-flux condition on z = −h (see equation
243
+ (1e)). It follows that ∂zφn(0) =
244
+ ˆ
245
+ Lnφn(0), where
246
+ ˆ
247
+ Ln = kn tanh(knh)
248
+ (4)
249
+ is the spectral multiplier of the Dirichlet-to-Neumann operator, L .
250
+ By expressing the time-
251
+ dependent free-surface velocity potential, u = φ|z=0, in terms of the basis expansion u(x, t) =
252
+ �∞
253
+ n=0 un(t)Φn(x), it follows that the Dirichlet-to-Neumann map has the spectral representation
254
+ L u = �∞
255
+ n=0
256
+ ˆ
257
+ LnunΦn.
258
+ 3
259
+ The existence of resonant triads
260
+ Resonant triads arise due to the exchange of energy between linear wave modes, an effect induced
261
+ by nonlinear wave interactions. In order to define resonant triads mathematically, it is necessary
262
+ to first determine the angular frequency associated with each linear wave mode. In the limit ϵ → 0,
263
+ the Benney-Luke equation (3) reduces to the linear equation utt + L u = 0. By seeking a solution
264
+ to the linearised Benney-Luke equation of the form u(x, t) = Φn(x)e−iωnt, we conclude that the
265
+ angular frequency, ωn, satisfies ω2
266
+ n =
267
+ ˆ
268
+ Ln, or the more familiar [32]
269
+ ω2
270
+ n = kn tanh(knh).
271
+ (5)
272
+ 5
273
+
274
+ As we will see, a crucial aspect of the following analysis is that the angular frequency depends on
275
+ the fluid depth, i.e. ωn(h). Finally, we note that the angular frequency is larger for more oscillatory
276
+ eigenfunctions (i.e. for larger values of kn); by analogy to the evolution of plane gravity waves, we
277
+ refer to kn as a ‘wavenumber’ henceforth.
278
+ We proceed by considering three linear wave modes, enumerated n1, n2 and n3, where we denote
279
+ Ωj = ωnj,
280
+ Kj = knj,
281
+ and
282
+ Ψj(x) = Φnj(x)
283
+ for j = 1, 2, 3.
284
+ Notably, we exclude the wavenumber k0 = 0 from consideration as the corresponding eigenmode,
285
+ Φ0, simply reflects the invariance of the Benney-Luke equation (3) under the mapping u �→ u +
286
+ constant; henceforth, we consider only wavenumbers Kj > 0. The three linear wave modes form a
287
+ resonant triad if there is a critical fluid depth, hc, satisfying
288
+ Ω1(hc) ± Ω2(hc) ± Ω3(hc) = 0,
289
+ (6)
290
+ where all four sign combinations are permissible (we consider Ωj > 0 without loss of generality).
291
+ To simplify notation in the following arguments, we restrict our attention to the particular case
292
+ Ω1(hc) + Ω2(hc) = Ω3(hc),
293
+ (7)
294
+ where the other three sign combinations in equation (6) may be recovered by suitable re-indexing
295
+ of the Ωj terms. However, as we will see in §4, an additional constraint necessary for triads to
296
+ exist is the eigenmode correlation condition,
297
+ ��
298
+ D
299
+ Ψ1Ψ2Ψ3 dA ̸= 0,
300
+ (8)
301
+ which implies that the product of any two eigenmodes is non-orthogonal to the remaining eigen-
302
+ mode.
303
+ 3.1
304
+ The existence of a critical depth
305
+ We proceed to determine necessary and sufficient conditions on the wavenumbers, Kj, for there
306
+ to exist a depth, hc, at which a resonant triad forms, where such a critical depth is unique. We
307
+ summarise our results in terms of the following theorem.
308
+ Theorem 1. There exists a positive and finite value of h such that Ω1 + Ω2 = Ω3 if and only if
309
+ K1 + K2 < K3 <
310
+ ��
311
+ K1 +
312
+
313
+ K2
314
+ �2.
315
+ (9)
316
+ When this pair of inequalities is satisfied, the corresponding value of h is unique.
317
+ We briefly sketch the proof of Theorem 1, with full details presented in appendix A.
318
+ We
319
+ first demonstrate that no solutions to Ω1 + Ω2 = Ω3 are possible when the bounds in equation
320
+ (9) are violated, i.e. when K1 + K2 ≥ K3 or when √K1 + √K2 ≤ √K3. We then consider the
321
+ case where the inequalities (9) are satisfied and determine the existence of positive roots to the
322
+ function F(h) = (Ω1(h) + Ω2(h))/Ω3(h) − 1. In this case, we demonstrate that limh→0 F(h) < 0
323
+ and limh→∞ F(h) > 0, from which we conclude that F(h) has at least one root (by continuity of
324
+ F). Finally, we deduce that this root is unique by proving that F(h) is a strictly monotonically
325
+ increasing function of h when the inequalities (9) are satisfied.
326
+ 6
327
+
328
+ Two important conclusions may be deduced from Theorem 1. First, it follows from equation (9)
329
+ that the wavenumber, K3, corresponding to the largest angular frequency, Ω3, is larger than both
330
+ the other two wavenumbers (K1 and K2), but it cannot be arbitrarily large (as supplied by the
331
+ upper bound). For a given pair of eigenmodes (say Ψ1 and Ψ2), we conclude that there are likely
332
+ to be only finitely many eigenmodes that can resonate with this pair (indeed, that number might
333
+ fairly small, or even zero). Second, when modes 1 and 2 coincide (a 1:2 resonance), one deduces
334
+ that Ω1 = Ω2 and K1 = K2; as such, the existence bounds (9) simplify to 2K1 < K3 < 4K1, or
335
+ 2 < K3/K1 < 4 [34, 44].
336
+ 3.2
337
+ Determining the critical depth
338
+ Although Theorem 1 determines necessary and sufficient conditions on the wavenumbers, Kj, for
339
+ there to be a critical depth, hc, at which a resonant triad exists, the critical depth remains to be
340
+ determined. In general, the critical depth must be computed numerically (being the unique root
341
+ of the nonlinear function F(h)); however, we demonstrate that useful quantitative and qualitative
342
+ information may be obtained via asymptotic analysis. For the remainder of this section, we consider
343
+ the rescaled wavenumbers, ξ1 = K1/K3 and ξ2 = K2/K3, and the rescaled depth, ζ = K3h; it
344
+ remains to determine the root, ζc, of
345
+ F(ζ) =
346
+
347
+ ξ1 tanh(ξ1ζ)
348
+ tanh(ζ)
349
+ +
350
+
351
+ ξ2 tanh(ξ2ζ)
352
+ tanh(ζ)
353
+ − 1
354
+ (10)
355
+ when ξ1, ξ2 > 0 satisfy
356
+ ξ1 + ξ2 < 1 <
357
+
358
+ ξ1 +
359
+
360
+ ξ2.
361
+ (11)
362
+ In figure 2(a), we present contours of the critical rescaled depth, ζc, in the (ξ1, ξ2)-plane, restricted
363
+ to the region demarcated by equation (11). Consistent with the limits limζ→0 F(ζ) = ξ1 + ξ2 − 1
364
+ and limζ→∞ F(ζ) = √ξ1+√ξ2−1, we observe that the root, ζc, tends to zero at the line ξ1+ξ2 = 1,
365
+ and approaches infinity at the curve √ξ1 + √ξ2 = 1. Furthermore, the uniqueness of the root of
366
+ F for given (ξ1, ξ2) is reflected in the observation that the contours of ζc do not cross. Finally, we
367
+ note that the contours are symmetric about the line ξ1 = ξ2, which is a direct consequence of the
368
+ invariance of F(ζ) under the mapping ξ1 ↔ ξ2 (see equation (10)).
369
+ Although we are primarily interested in the physically relevant case for which the cylinder’s
370
+ depth-to-width ratio, h, is of size O(1), an informative analytic result may be obtained by consid-
371
+ ering F(ζ) in the limit ζ ≪ 1 (or K3h ≪ 1). By utilising the Taylor expansion
372
+
373
+ tanh(x) ∼ √x
374
+
375
+ 1 − x2
376
+ 6 + 19
377
+ 360x4 + O
378
+
379
+ x6��
380
+ ,
381
+ we obtain
382
+
383
+ ξ1 tanh(ξ1ζ)+
384
+
385
+ ξ2 tanh(ξ2ζ)−
386
+
387
+ tanh(ζ) ∼
388
+
389
+ ζ
390
+ ��
391
+ ξ1 +ξ2 −1
392
+
393
+ − ζ2
394
+ 6
395
+
396
+ ξ3
397
+ 1 +ξ3
398
+ 2 −1
399
+
400
+ +O(ζ4)
401
+
402
+ (12)
403
+ for 0 < ζ ≪ 1. Whilst deriving equation (12), we have utilised the bound ξ1, ξ2 < 1 (see equation
404
+ (11)), which additionally ensures that 0 < ξjζ ≪ 1 for j = 1, 2. We note that the left-hand side of
405
+ equation (12) is equal to F(ζ) tanh(ζ), so ζc satisfies
406
+ ξ1 + ξ2 − 1 − ζ2
407
+ c
408
+ 6
409
+
410
+ ξ3
411
+ 1 + ξ3
412
+ 2 − 1
413
+
414
+ = O(ζ4
415
+ c ),
416
+ (13)
417
+ 7
418
+
419
+ Figure 2: Contours of the rescaled critical depth, ζc = hcK3, as a function of the rescaled wavenum-
420
+ bers, ξ1 = K1/K3 and ξ2 = K2/K3. (a) The contours computed numerically from equation (10).
421
+ The black lines indicate the limiting cases of ζc → 0 (at ξ1+ξ2 = 1) and ζc → ∞ (at √ξ1+√ξ2 = 1).
422
+ (b) The contours are overlaid by the leading-order approximation (equation (17); circles) and the
423
+ higher-order correction (equation (18); diamonds) for ζc equal to 0.5, 1, 1.5 and 2.
424
+ provided that 0 < ζc ≪ 1. By neglecting terms of size O(ζ4
425
+ c ) in equation (13), one may then easily
426
+ solve for ζc in terms of ξ1 and ξ2.
427
+ Alternatively, a more succinct expression for ζc may be found by first noting that
428
+ ξ3
429
+ 1 + ξ3
430
+ 2 = (ξ1 + ξ2)3 − 3ξ1ξ2(ξ1 + ξ2) = 1 − 3ξ1ξ2 + O(ζ2
431
+ c ),
432
+ (14)
433
+ where we have utilised the leading-order approximation ξ1 + ξ2 = 1 + O(ζ2
434
+ c ) (see equation (13)) to
435
+ determine the second equality. Upon substituting equation (14) into equation (13), we find that
436
+ ξ1, ξ2 and ζc are now related by the notably simpler expression
437
+ ξ1 + ξ2 − 1 + ζ2
438
+ c
439
+ 2 ξ1ξ2 = O(ζ4
440
+ c ).
441
+ (15)
442
+ By neglecting terms of O(ζ4
443
+ c ), the leading-order approximation for the rescaled critical depth, ζc,
444
+ is given by
445
+ ζc ∼
446
+
447
+ 2(1 − ξ1 − ξ2)
448
+ ξ1ξ2
449
+ ,
450
+ (16)
451
+ an expression valid when 0 < ζc ≪ 1 and ξ1 + ξ2 < 1 (see equation (11)). Alternatively, one may
452
+ deduce from equation (15) that the contours of ζc satisfy the approximate form
453
+ ξ2 ∼
454
+ 1 − ξ1
455
+ 1 + 1
456
+ 2ζ2
457
+ c ξ1
458
+ ,
459
+ (17)
460
+ where the term in the denominator is responsible for the increased ‘bending’ of the contours as
461
+ ζc becomes progressively larger (see figure 2). We note that the additional simplification afforded
462
+ 8
463
+
464
+ (a)
465
+ (b)
466
+ hcK3 = 0.5
467
+ Leading-order approx.
468
+ hcK3 = 1
469
+ Higher-order correction
470
+ hcK3 = 1.5
471
+ 0.8
472
+ 0.8
473
+ hcK3 = 2
474
+ hcK3 = 3
475
+ hcK3 = 5
476
+ 0.6
477
+ 0.6
478
+ K2
479
+ hc
480
+ hcK3 = 10
481
+
482
+ K3
483
+ 0.4
484
+ 0.4
485
+ 3
486
+ 0.2
487
+ 0.2
488
+ 8
489
+ 0
490
+ 0
491
+ 0.2
492
+ 0.4
493
+ 0.6
494
+ 0.8
495
+ 0.2
496
+ 0.4
497
+ 0.6
498
+ 0.8
499
+ 0
500
+ 1
501
+ 0
502
+ 1
503
+ Ki/K3
504
+ Ki/K3by equation (14) allows for a far more tractable representation of the contours relative to solving
505
+ equation (13) directly for ξ2 given ξ1 and ζc.
506
+ Despite being derived under the assumption 0 < ζc ≪ 1, we see in figure 2(b) that the contours
507
+ given by equation (17) agree favorably with the numerical solution even up to ζc ≈ 1. However, it
508
+ is readily verified from equation (16) that the asymptotic approximation of each contour crosses
509
+ the boundary curve √ξ1 + √ξ2 = 1 at ζc = 4 (for which ξ1 = ξ2 = 1
510
+ 4), thereby demonstrating
511
+ that the reduced asymptotic form has limited applicability (even in a qualitative sense) for slightly
512
+ larger values of ζc. One may further improve the quantitative (and, to an extent, qualitative)
513
+ agreement between the asymptotic analysis and numerical computation by including terms of size
514
+ O(ζ4) in equation (12); indeed, an analogous calculation gives rise to the following higher-order
515
+ correction to equation (15):
516
+ ξ1 + ξ2 − 1 + ζ2
517
+ c
518
+ 2 ξ1ξ2 + ζ4
519
+ c
520
+ 72ξ1ξ2
521
+
522
+ ξ1ξ2 − 1
523
+
524
+ = O(ζ6
525
+ c ).
526
+ (18)
527
+ Although one may then solve for ζc given ξ1 and ξ2 (or, alternatively, determine the contours of
528
+ ζc) by truncating terms of O(ζ6
529
+ c ) in equation (18), the resulting algebraic expressions yield little
530
+ qualitative information. However, one may, in principle, use this reduced form as a reasonable
531
+ initial guess for a numerical root-finding algorithm for determining the root of F(ζ), provided that
532
+ ζc is not too large.
533
+ 3.3
534
+ Example cavities
535
+ Our investigation into the emergence of resonant triads has been focused, thus far, on finite-depth
536
+ cylinders with arbitrary horizontal cross-section. However, it is convenient to understand how
537
+ the results of Theorem 1 influence the formation (or not) of resonant triads for some specific
538
+ cross-sections, namely rectangular, circular, and annular cylinders.
539
+ 3.3.1
540
+ Rectangular cylinder
541
+ It is well known that resonant triads are impossible for plane gravity waves evolving across an
542
+ unbounded horizontal domain of finite depth [48, 21]. 1 We now utilise Theorem 1 to demonstrate
543
+ a similar result: resonant triads are impossible for gravity waves evolving within a rectangular
544
+ cylinder of finite depth. Our result generalises the special case of a 1:2 resonance, for which the
545
+ impossibility of internal resonance in a rectangular cylinder was demonstrated by Miles [42].
546
+ To proceed, we consider a rectangular cylinder with side lengths Lx and Ly. By orientating the
547
+ Cartesian coordinate system, x = (x, y), so that the cylinder cross-section is defined by the region
548
+ 0 < x < Lx and 0 < y < Ly, the eigenmodes are of the form
549
+ Φmn(x, y) =
550
+ 1
551
+ Nmn
552
+ cos(pmx) cos(qny),
553
+ where Nmn > 0 is a normalisation constant.
554
+ Notably, the wavenumbers pm = mπ/Lx and
555
+ qn = nπ/Ly are chosen so that the no-flux condition is satisfied (see equation (1d)). For a triad de-
556
+ termined by the non-negative integers mj and nj (for j = 1, 2, 3), the corresponding wavenumbers,
557
+ Pj = pmj and Qj = qnj, must satisfy P1 + P2 = P3 and Q1 + Q2 = Q3 (under suitable reordering
558
+ 1Weak interactions are possible, however, in the shallow-water limit, Kjh → 0, for which tanh(Kjh) in the
559
+ dispersion relation (5) is replaced by its leading-order approximation, Kjh [48, 7, 42].
560
+ 9
561
+
562
+ of the subscripts) in order for the eigenmode correlation condition (8) to be satisfied. By defining
563
+ the wave vector kj = (Pj, Qj), the conditions on Pj and Qj simplify to the single requirement
564
+ k1 + k2 = k3, where the triangle inequality supplies that |k3| ≤ |k1| + |k2|. As the eigenvalues,
565
+ K2
566
+ j , of the negative Laplacian operator are related to the wave vectors via Kj = |kj|, we deduce
567
+ that K3 ≤ K1 + K2. Owing to the violation of the left-hand bound in equation (9), we conclude
568
+ that resonant triads cannot exist in a rectangular cylinder of finite depth.
569
+ 3.3.2
570
+ Circular cylinder
571
+ We consider a circular cylinder of unit radius in dimensionless variables (i.e. the dimensional radius
572
+ is equal to a; see §2). For polar coordinates x = (r, θ), it is well known that the corresponding
573
+ (complex-valued) eigenmodes may be expressed in the form
574
+ Φmn(r, θ) =
575
+ 1
576
+ Nmn
577
+ Jm(kmnr)eimθ,
578
+ where
579
+ Nmn =
580
+ ��Jm(kmn)
581
+ ��
582
+
583
+ 1 − m2
584
+ k2
585
+ mn
586
+ (19)
587
+ is the normalisation factor and m is the azimuthal wavenumber (an integer). Furthermore, the
588
+ no-flux condition (1d) determines that the radial wavenumbers, denoted kmn, satisfy J′
589
+ m(kmn) =
590
+ 0, where 0 < km1 < km2 < . . . (we exclude k00 = 0 from consideration; see §3).
591
+ Notably,
592
+ the eigenvalues of the negative Laplacian operator are precisely the squared wavenumbers, k2
593
+ mn;
594
+ consequently, the antinodes of each Bessel function play a pivotal role in determining the existence
595
+ of resonant triads.
596
+ Akin to the rectangular cylinder, we find that the eigenmode correlation condition imparts
597
+ an important restriction on the combination of eigenmodes that may resonate.
598
+ For given mj
599
+ and nj (for j = 1, 2, 3), we denote Kj = kmjnj, Ψj = Φmjnj and Nj = Nmjnj. Although the
600
+ correlation condition given in equation (8) is defined for real eigenmodes, a similar condition holds
601
+ for complex-valued eigenmodes, namely
602
+ ��
603
+ D Ψ1Ψ2Ψ∗
604
+ 3 dA ̸= 0. By considering the quantity
605
+ ��
606
+ D
607
+ Ψ1Ψ2Ψ∗
608
+ 3 dA =
609
+ 1
610
+ N1N2N3
611
+ � � 1
612
+ 0
613
+ rJm1(K1r)Jm2(K2r)Jm3(K3r) dr
614
+ �� � 2π
615
+ 0
616
+ ei(m1+m2−m3)θ dθ
617
+
618
+ ,
619
+ we deduce from the azimuthal integral that a necessary condition for the correlation integral to
620
+ be nonzero is m1 + m2 = m3 [40]. This condition thus restricts the permissible combinations of
621
+ angular wavenumbers in a manner similar to the restriction on the permissible planar wavenumbers
622
+ for the case of a rectangular cylinder. Unlike rectangular cylinders, however, we demonstrate that
623
+ resonant triads are possible in a circular cylinder.
624
+ Despite the apparent restriction of the Bessel antinodes, Kj, and summation condition on the
625
+ azimuthal wavenumbers, mj, Theorem 1 determines that a vast array of resonant triads may be
626
+ excited for judicious choices of the fluid depth. In table 1, we list a small number of resonant
627
+ triads and their corresponding critical depth, hc, subject to the restrictions |mj| ≤ 3 and nj ≤ 3;
628
+ for larger values of |mj| and nj, the corresponding wave field becomes increasingly oscillatory, to
629
+ the extent that the effects of surface tension and dissipation may become appreciable. Moreover,
630
+ even marginally relaxing the upper bounds on |mj| and nj vastly increases the number of resonant
631
+ triads; indeed, the restriction |mj| ≤ 4 and nj ≤ 4 introduces 70 additional resonant triads relative
632
+ to table 1. As the upper bounds for |mj| and nj are further increased, the typical difference between
633
+ the various critical depths decreases. Finally, the correlation condition,
634
+ ��
635
+ D Ψ1Ψ2Ψ∗
636
+ 3 dA ̸= 0, is
637
+ satisfied for each triad; however, the integral is very close to zero in some cases (e.g. triad 18),
638
+ corresponding to an elongation of the triad evolution time-scale (see §4.1).
639
+ 10
640
+
641
+ No.
642
+ m1
643
+ m2
644
+ m3
645
+ n1
646
+ n2
647
+ n3
648
+ K1
649
+ K2
650
+ K3
651
+ hc
652
+ ��
653
+ D Ψ1Ψ2Ψ∗
654
+ 3 dA
655
+ 1
656
+ -3
657
+ 3
658
+ 0
659
+ 1
660
+ 1
661
+ 3
662
+ 4.201
663
+ 4.201
664
+ 10.173
665
+ 0.14591
666
+ 0.19061
667
+ 2
668
+ -2
669
+ 2
670
+ 0
671
+ 1
672
+ 1
673
+ 2
674
+ 3.054
675
+ 3.054
676
+ 7.016
677
+ 0.17030
678
+ 0.46429
679
+ 3
680
+ -2
681
+ 2
682
+ 0
683
+ 1
684
+ 1
685
+ 3
686
+ 3.054
687
+ 3.054
688
+ 10.173
689
+ 0.39129
690
+ -0.03050
691
+ 4
692
+ -2
693
+ 2
694
+ 0
695
+ 1
696
+ 2
697
+ 3
698
+ 3.054
699
+ 6.706
700
+ 10.173
701
+ 0.06331
702
+ 0.68257
703
+ 5
704
+ -1
705
+ 1
706
+ 0
707
+ 1
708
+ 1
709
+ 1
710
+ 1.841
711
+ 1.841
712
+ 3.832
713
+ 0.15227
714
+ 1.28795
715
+ 6
716
+ -1
717
+ 1
718
+ 0
719
+ 1
720
+ 1
721
+ 2
722
+ 1.841
723
+ 1.841
724
+ 7.016
725
+ 1.00970
726
+ -0.02032
727
+ 7
728
+ -1
729
+ 1
730
+ 0
731
+ 1
732
+ 2
733
+ 3
734
+ 1.841
735
+ 5.331
736
+ 10.173
737
+ 0.30197
738
+ -0.00603
739
+ 8
740
+ 0
741
+ 0
742
+ 0
743
+ 1
744
+ 1
745
+ 3
746
+ 3.832
747
+ 3.832
748
+ 10.173
749
+ 0.19814
750
+ 0.03327
751
+ 9
752
+ -2
753
+ 3
754
+ 1
755
+ 1
756
+ 1
757
+ 3
758
+ 3.054
759
+ 4.201
760
+ 8.536
761
+ 0.15767
762
+ 0.30704
763
+ 10
764
+ -1
765
+ 2
766
+ 1
767
+ 1
768
+ 1
769
+ 2
770
+ 1.841
771
+ 3.054
772
+ 5.331
773
+ 0.17266
774
+ 0.85581
775
+ 11
776
+ -1
777
+ 2
778
+ 1
779
+ 1
780
+ 1
781
+ 3
782
+ 1.841
783
+ 3.054
784
+ 8.536
785
+ 0.60375
786
+ -0.02595
787
+ 12
788
+ -1
789
+ 2
790
+ 1
791
+ 2
792
+ 1
793
+ 3
794
+ 5.331
795
+ 3.054
796
+ 8.536
797
+ 0.04664
798
+ 0.99088
799
+ 13
800
+ 0
801
+ 1
802
+ 1
803
+ 1
804
+ 1
805
+ 3
806
+ 3.832
807
+ 1.841
808
+ 8.536
809
+ 0.38516
810
+ 0.00542
811
+ 14
812
+ -1
813
+ 3
814
+ 2
815
+ 1
816
+ 1
817
+ 2
818
+ 1.841
819
+ 4.201
820
+ 6.706
821
+ 0.16313
822
+ 0.64211
823
+ 15
824
+ -1
825
+ 3
826
+ 2
827
+ 1
828
+ 1
829
+ 3
830
+ 1.841
831
+ 4.201
832
+ 9.969
833
+ 0.48152
834
+ -0.02717
835
+ 16
836
+ -1
837
+ 3
838
+ 2
839
+ 1
840
+ 2
841
+ 3
842
+ 1.841
843
+ 8.015
844
+ 9.969
845
+ 0.03928
846
+ 1.08903
847
+ 17
848
+ -1
849
+ 3
850
+ 2
851
+ 2
852
+ 1
853
+ 3
854
+ 5.331
855
+ 4.201
856
+ 9.969
857
+ 0.06286
858
+ 0.66930
859
+ 18
860
+ 0
861
+ 2
862
+ 2
863
+ 1
864
+ 1
865
+ 3
866
+ 3.832
867
+ 3.054
868
+ 9.969
869
+ 0.26387
870
+ -0.00087
871
+ 19
872
+ 1
873
+ 1
874
+ 2
875
+ 1
876
+ 1
877
+ 2
878
+ 1.841
879
+ 1.841
880
+ 6.706
881
+ 0.83138
882
+ 0.02801
883
+ 20
884
+ 1
885
+ 1
886
+ 2
887
+ 1
888
+ 2
889
+ 3
890
+ 1.841
891
+ 5.331
892
+ 9.969
893
+ 0.28691
894
+ 0.01818
895
+ 21
896
+ 0
897
+ 3
898
+ 3
899
+ 1
900
+ 1
901
+ 3
902
+ 3.832
903
+ 4.201
904
+ 11.346
905
+ 0.21395
906
+ -0.00640
907
+ 22
908
+ 0
909
+ 3
910
+ 3
911
+ 2
912
+ 1
913
+ 3
914
+ 7.016
915
+ 4.201
916
+ 11.346
917
+ 0.02782
918
+ 1.00669
919
+ 23
920
+ 1
921
+ 2
922
+ 3
923
+ 1
924
+ 1
925
+ 2
926
+ 1.841
927
+ 3.054
928
+ 8.015
929
+ 0.50595
930
+ 0.03712
931
+ 24
932
+ 1
933
+ 2
934
+ 3
935
+ 1
936
+ 2
937
+ 3
938
+ 1.841
939
+ 6.706
940
+ 11.346
941
+ 0.23678
942
+ 0.02590
943
+ 25
944
+ 1
945
+ 2
946
+ 3
947
+ 2
948
+ 1
949
+ 3
950
+ 5.331
951
+ 3.054
952
+ 11.346
953
+ 0.19839
954
+ 0.01522
955
+ Table 1: Combinations of the angular wavenumbers, mj, and radial mode indices, nj, that form
956
+ a resonant triad (m1 + m2 = m3 and Ω1 + Ω2 = Ω3) at critical depth, hc, in a circular cylinder
957
+ of unit radius. For each triad, the corresponding wavenumbers, Kj = kmjnj, satisfy (9), and the
958
+ correlation condition,
959
+ ��
960
+ D Ψ1Ψ2Ψ∗
961
+ 3 dA ̸= 0, is met. The list is restricted to resonant triads arising
962
+ for |mj|, nj ≤ 3, and we consider m1 ≤ m2 and m3 ≥ 0 without loss of generality. We have omitted
963
+ resonances that give rise to the same critical depth, but with the roles of modes 1 and 2 swapped.
964
+ The triad numbers (left column) and shaded rows are referenced in the text.
965
+ 11
966
+
967
+ At this juncture, it is informative to assess how the triads listed in table 1 relate to the
968
+ resonances explored in prior investigations. First, triad 7 in table 1 (dark grey row) was explored
969
+ by Michel [40] for a circular cylinder of radius 9.45 cm and an approximate fluid depth of 3 cm; it
970
+ follows that the depth-to-radius ratio in Michel’s experiment was approximately 0.317, close to the
971
+ value of 0.30197 reported in table 1. Furthermore, table 1 (grey rows) incorporates two well-known
972
+ examples of a 1:2 resonance, for which modes 1 and 2 coincide: (i) the critical depth hc = 0.83138
973
+ (triad 19) corresponds to the second-harmonic resonance with the fundamental mode [42, 43, 8, 64];
974
+ (ii) the critical depth hc = 0.19814 (triad 8) corresponds to a standing wave composed of two
975
+ resonant axisymmetric modes [34, 64]. Finally, triads 1, 2, 3, 5 and 6 (table 1, light grey rows)
976
+ form an interesting class of resonant triad, for which an axisymmetric mode (m3 = 0) interacts
977
+ with two identical counter-propagating non-axisymmetric modes (m1 = −m2 ̸= 0 and n1 = n2).
978
+ In fact, our investigation in §5.1 demonstrates that the axisymmetric mode is the so-called pump
979
+ mode, and may thus excite the non-axisymmetric modes, even when the initial energy in each
980
+ non-axisymmetric mode is negligible. We draw an analogy between this novel class of resonant
981
+ triad and the excitation of beach edge waves [18] in §6.
982
+ We conclude our exploration of resonant triads arising in a circular cylinder by remarking
983
+ that the fluid depth may, in some cases, be judiciously chosen so as to excite multiple triads. In
984
+ general, the condition on the angular frequencies, Ω1 + Ω2 = Ω3 (see equation (7)), cannot be
985
+ satisfied for two distinct triads at the same fluid depth; however, nonlinear resonance may persist
986
+ for both triads provided that each condition on the angular frequencies is approximately satisfied
987
+ [5, 39, 15], at the cost of weak detuning (see §4.3.1 for further details). Specifically, if triads 1 and
988
+ 2 have critical depths hc,1 and hc,2, respectively, then there is potential excitement of both triads
989
+ when the fluid depth, h, satisfies |h−hc,j| = O(ϵ) for j = 1, 2 (where 0 < ϵ ≪ 1 is the typical wave
990
+ slope; see §2), giving rise to the approximation Ω1 + Ω2 − Ω3 = O(ϵ) for each triad. For example,
991
+ if 0 < hc,2 − hc,1 ≪ 1, then it may be sufficient to excite both triads at an intermediate depth,
992
+ hc,1 ≤ h ≤ hc,2. We note, however, that the excitation of multiple triads at a single fluid depth is
993
+ not possible when the depth discrepancy, |h− hc,j|, becomes too large (relative to the typical wave
994
+ slope) for any of the triads under consideration.
995
+ To demonstrate the potential for the simultaneous excitation of two triads within a circular
996
+ cylinder of finite depth, we consider two scenarios: (i) the excitation of two triads that share a
997
+ common wave mode; and (ii) the excitation of two triads that do not share any common wave
998
+ modes. Heuristically, case (ii) is more common than case (i) owing to the number of similar fluid
999
+ depths in table 1; however, case (i) will likely generate a far richer set of dynamics owing to
1000
+ the nonlinear interaction between the two triads [35, 15, 13, 11]. As an example of case (i), we
1001
+ consider triads 21 and 24 in table 1, with nearby critical depths hc,1 = 0.21395 and hc,2 = 0.23678,
1002
+ respectively. As mode (m3, n3) = (3, 3) is common to both triads, inter-triad resonance may arise
1003
+ at an intermediate depth, e.g. h = 0.225. Finally, an example of case (ii) arises for triads 8 and 25
1004
+ in table 1, with nearby critical depths hc,1 = 0.19814 and hc,2 = 0.19839. Neither of these triads
1005
+ share a common wave mode, so one would not expect the inter-triad energy exchange discussed
1006
+ in case (i). Nevertheless, one might anticipate a signature of these two triads to be visible in
1007
+ the surface evolution for an intermediate depth, e.g. h = 0.19825. The theoretical and numerical
1008
+ exploration of coupled triads in a circular cylinder will be the focus of future investigation.
1009
+ 3.3.3
1010
+ Annular cylinder
1011
+ A natural variation upon a circular cylinder is an annulus of inner radius r0 ∈ (0, 1) and outer
1012
+ radius 1. By varying r0, the annulus approaches a circular cylinder as r0 → 0+, and a quasi-one-
1013
+ 12
1014
+
1015
+ 0
1016
+ 0.5
1017
+ 1
1018
+ 0
1019
+ 0.5
1020
+ 1
1021
+ 0
1022
+ 0.5
1023
+ 1
1024
+ 0
1025
+ 2
1026
+ 4
1027
+ 6
1028
+ 0
1029
+ 0.5
1030
+ 1
1031
+ 0
1032
+ 0.5
1033
+ 1
1034
+ Figure 3: The existence and predominant characteristics of a triad in an annular cylinder with inner
1035
+ radius r0 and outer radius 1. The triad bifurcates from the critical depth hc = 0.17266 as r0 → 0
1036
+ (the limiting case of a circular cylinder), with corresponding wavenumbers presented in table 1
1037
+ (see triad 10). (a) The critical depth, hc (blue curve), with hc → ∞ as r0 → rc, where rc ≈ 0.57
1038
+ (black line). (b) The corresponding wavenumbers, Kj, all of which remain finite for r0 < rc (black
1039
+ line). (c) The normalised wavenumbers, K1/K3 and K2/K3, parametrised by increasing r0 (blue
1040
+ arrow), with the limiting case r0 → 0 denoted by the white dot. The wavenumbers leave the triad
1041
+ existence region (see Theorem 1) via the left-hand boundary (black curve) as r0 → r−
1042
+ c .
1043
+ dimensional periodic ring as r0 → 1−. Notably, resonant triads are impossible for a one-dimensional
1044
+ periodic ring, as can be shown by modifying the arguments presented for the case of a rectangular
1045
+ cylinder (see §3.3.1). Thus, one might anticipate that the existence of triads in an annular cylinder
1046
+ depends critically on the inner radius, r0. Rather than enumerating some possible triads for given
1047
+ values of r0, we instead track the corresponding critical depth, hc, for the triads identified for a
1048
+ circular cylinder (see table 1) as r0 is progressively increased from zero. Of particular interest is
1049
+ determining whether a given triad exists for all r0 < 1, or whether there is some critical inner
1050
+ radius, rc, beyond which the triad ceases to exist, with either hc → 0 or hc → ∞ as r0 → r−
1051
+ c .
1052
+ The (complex-valued) eigenmodes in an annular domain are cylinder functions of the form
1053
+ Φmn(r, θ) =
1054
+ 1
1055
+ Nmn
1056
+
1057
+ Jm(kmnr) cos(γmnπ) + Ym(kmnr) sin(γmnπ)
1058
+
1059
+ eimθ,
1060
+ (20)
1061
+ where Nmn > 0 is a normalisation constant, Ym is the Bessel function of the second kind with
1062
+ order m (an integer), and γmn ∈ [0, 1] determines the weighting between the two Bessel functions.
1063
+ As shown in appendix B, the no-flux condition (see equation (1d)) on the inner and outer walls
1064
+ determines that the wavenumbers, kmn(r0), satisfy the equation
1065
+ J′
1066
+ m(kmnr0)Y′
1067
+ m(kmn) − J′
1068
+ m(kmn)Y′
1069
+ m(kmnr0) = 0.
1070
+ (21)
1071
+ A formula for the corresponding value of γmn is determined in appendix B.
1072
+ Once again, the
1073
+ wavenumbers, kmn, are ordered so that 0 < km1 < km2 < . . . (excluding k00 = 0) and satisfy
1074
+ −∆Φmn = k2
1075
+ mnΦmn. Three correlated wave modes may form a resonant triad (for a judicious
1076
+ choice of the fluid depth) provided that the corresponding wavenumbers, Kj, which depend on the
1077
+ channel width, 1 − r0, satisfy the bounds given in Theorem 1.
1078
+ Bifurcating from the limiting case of a circular cylinder, we track the critical depth (when such
1079
+ a depth exists) of different triads as r0 is progressively increased. The predominant behaviour is
1080
+ 13
1081
+
1082
+ characterised by the example presented in figure 3, for which we consider the triad whose critical
1083
+ depth is hc = 0.17266 as r0 → 0+ (see triad 10 in table 1). Given that hc is fairly small in this limit,
1084
+ one might anticipate that the triad ceases to exist with hc → 0; somewhat surprisingly, however,
1085
+ the opposite scenario arises, with hc → ∞ as r0 → r−
1086
+ c (rc ≈ 0.57 in this example). It follows,
1087
+ therefore, that the triad may persist for narrow channels only when the fluid is sufficiently deep.
1088
+ We note, however, that there exist (at least) two relatively rare transitions for increasing r0, which
1089
+ we briefly describe as follows: (i) the triad ceases to exist when hc → 0 as r0 → r−
1090
+ c , which may
1091
+ arise when bifurcating from a sufficiently shallow circular cylinder (e.g. triad 22 in table 1); and (ii)
1092
+ the triad continues to exist for all r0 < 1, with hc → 0 and Kj → ∞ as r0 → 1, yet the normalised
1093
+ depth, hcK3, remains finite, and the normalised wavenumbers, K1/K3 and K2/K3, remain within
1094
+ the triad existence region (e.g. triad 8 in table 1). Owing to the appreciable influence of viscous
1095
+ effects for relatively shallow fluids, the physical relevance of these latter two scenarios is somewhat
1096
+ nebulous, however.
1097
+ 4
1098
+ The evolution of resonant triads
1099
+ Having established the existence of resonant triads, we now determine the long-time triad evolution,
1100
+ utilising the method of multiple scales. Ostensibly, the calculations necessary for determining the
1101
+ triad equations are a variation upon the pioneering work of McGoldrick [36, 37, 38] in the absence
1102
+ of surface tension. However, the confinement of the fluid to a cylinder imposes some additional
1103
+ considerations, the salient details of which we outline below. Finally, we note that an alternative
1104
+ approach to multiple scales is Whitham’s technique of averaging the system’s Lagrangian [59,
1105
+ 60, 61, 62], which has the advantage of streamlining some algebraic calculations [54, 42, 43];
1106
+ nevertheless, multiple-scales analysis is sufficient for our purposes and allows for the possible
1107
+ inclusion of higher-order corrections in the asymptotic expansion [38].
1108
+ In a manner similar to §3, we consider three linear wave modes (with real-valued eigenfunctions),
1109
+ enumerated n1, n2 and n3, where we denote
1110
+ Ωj = ωnj,
1111
+ Kj = knj,
1112
+ Lj =
1113
+ ˆ
1114
+ Lnj,
1115
+ and
1116
+ Ψj(x) = Φnj(x)
1117
+ for j = 1, 2, 3.
1118
+ In contrast to §3, however, we now allow each (nonzero) angular frequency to be either negative
1119
+ or positive: the resonance condition on the angular frequencies is henceforth defined
1120
+ Ω1 + Ω2 + Ω3 = 0.
1121
+ (22)
1122
+ The modified requirement on the angular frequencies (equation (22)) is not restrictive on the
1123
+ possible triad combinations; one may recover equation (7) by mapping Ω3 �→ −Ω3, for example.
1124
+ The decision behind the summation condition on the angular frequencies is motivated by the
1125
+ cyclical symmetry of equation (22), a property that will be inherited by the resultant amplitude
1126
+ equations [54]. As a consequence, one need only derive the amplitude equation for one of the wave
1127
+ modes; the amplitude equations for the remaining two wave modes follow by cyclic permutation
1128
+ of the subscripts (1, 2, 3).
1129
+ Before embarking on the multiple-scales analysis presented in §4.1, we remark upon two caveats.
1130
+ First, we note that equation (22) corresponds to an exact resonance, for which the fluid depth, h,
1131
+ is chosen to be precisely equal to the critical depth, hc. In practice, however, there may be a small
1132
+ discrepancy between h and hc, resulting in a the sum of the angular frequencies being slightly
1133
+ offset from zero. When the frequency detuning is sufficiently weak, e.g. Ω1 + Ω2 + Ω3 = O(ϵ), one
1134
+ 14
1135
+
1136
+ may modify the following asymptotic analysis to derive a similar set of amplitude equations (see
1137
+ §4.3.1). Second, our analysis in §4.1 is not valid when two of the wave modes coincide. This case
1138
+ corresponds to a 1:2 resonance, for which the corresponding evolution equations were derived by
1139
+ Miles [42] using Whitham modulation theory (as summarised in §4.3.2).
1140
+ 4.1
1141
+ Multiple-scales analysis
1142
+ In order to determine the evolution of each of the three dominant wave modes involved in an exact
1143
+ resonance, we utilise the method of multiple scales [28, 55]. Specifically, we seek a perturbation
1144
+ solution to the Benney-Luke equation (3) of the form u ∼ u0+ϵu1+O(ϵ2). The leading-order terms
1145
+ in equation (3) determine that u0 satisfies ∂ttu0 + L u0 = 0; we choose to consider a leading-order
1146
+ solution comprised only of the three triad modes (all other modes are assumed to be smaller in
1147
+ magnitude and appear at higher order), giving rise to the leading-order form
1148
+ u0(x, t, τ) =
1149
+ 3
1150
+
1151
+ j=1
1152
+
1153
+ Aj(τ)Ψj(x)e−iΩjt + c.c.
1154
+
1155
+ .
1156
+ (23)
1157
+ In equation (23), we have introduced the slow time-scale τ = ϵt, which governs the evolution of
1158
+ each complex amplitude, Aj. As ϵ and t are both independent variables, we treat τ and t as
1159
+ independent time-scales, giving rise to the transformation of derivatives ∂t �→ ∂t + ϵ∂τ. Finally,
1160
+ c.c. denotes the complex conjugate of the preceding term, a contribution necessary for real u0.
1161
+ So as to determine coupled evolution equations for each complex amplitude, Aj, we consider
1162
+ terms of O(ϵ) in the Benney-Luke equation (3). By substituting the leading-order solution, u0,
1163
+ into the nonlinear terms and applying the triad condition for the angular frequencies (equation
1164
+ (22)), we obtain the following problem for u1:
1165
+ ∂ttu1 + L u1 = −
1166
+
1167
+ 3
1168
+
1169
+ j=1
1170
+ fj(x, τ)e−iΩjt + c.c.
1171
+
1172
+ + nonresonant terms.
1173
+ (24)
1174
+ As we will see below, each of the functions fj(x, τ) appearing on the right-hand side of equation
1175
+ (24) will play a fundamental role when determining the amplitude equations; specifically,
1176
+ f1 = −2iΩ1
1177
+ dA1
1178
+ dτ Ψ1 + iA∗
1179
+ 2A∗
1180
+ 3
1181
+ ��
1182
+ Ω2
1183
+
1184
+ L2
1185
+ 3 − K2
1186
+ 3
1187
+
1188
+ + Ω3
1189
+
1190
+ L2
1191
+ 2 − K2
1192
+ 2
1193
+
1194
+ − 2Ω1L2L3
1195
+
1196
+ Ψ2Ψ3 − 2Ω1∇Ψ2 · ∇Ψ3
1197
+
1198
+ ,
1199
+ where f2 and f3 follow upon cyclic permutation of the subscripts (1, 2, 3). Finally, we note that
1200
+ the ‘nonresonant terms’ in equation (24) are of the general form p(x, τ)eiςt, where we assume that
1201
+ the angular frequency, ς, is not equal (or close) to any of the angular frequencies, ±ωn, associated
1202
+ with linear wave modes (see §3).
1203
+ We proceed by projecting equation (24) onto each of the three wave modes, giving rise to
1204
+ differential equations of the form (for j = 1, 2, 3)
1205
+ ∂ttˆu1,j + Ljˆu1,j = −
1206
+
1207
+ ⟨Ψj, fj⟩e−iΩjt + c.c.
1208
+
1209
+ + nonresonant terms,
1210
+ (25)
1211
+ where ˆu1,j = ⟨Ψj, u1⟩ is the projection of u1 onto the mode Ψj. By recalling that Lj = Ω2
1212
+ j, we
1213
+ immediately see that the term in square brackets in equation (25) is itself a solution to the linear
1214
+ operator ∂tt+Ω2
1215
+ j. It follows that the solution of equation (25) comprises of particular solutions that
1216
+ 15
1217
+
1218
+ have temporal dependence te±iΩjt, leading to an ill-posed asymptotic expansion when ϵt = O(1).
1219
+ The resolution to this problem is achieved via the solubility condition ⟨Ψj, fj⟩ = 0, which suppresses
1220
+ the secular growth.
1221
+ By applying the solubility condition ⟨Ψj, fj⟩ = 0 for j = 1, 2, 3, we conclude that the com-
1222
+ plex amplitude, Aj(τ), of each wave mode, Ψj(x)e−iΩjt, evolves according to the triad system of
1223
+ canonical form [5, 15]
1224
+ dA1
1225
+ dτ = α1A∗
1226
+ 2A∗
1227
+ 3,
1228
+ dA2
1229
+ dτ = α2A∗
1230
+ 1A∗
1231
+ 3,
1232
+ dA3
1233
+ dτ = α3A∗
1234
+ 1A∗
1235
+ 2,
1236
+ (26)
1237
+ where
1238
+ α1 =
1239
+ 1
1240
+ 2Ω1
1241
+ ��
1242
+ Ω2
1243
+
1244
+ L2
1245
+ 3 − K2
1246
+ 3
1247
+
1248
+ + Ω3
1249
+
1250
+ L2
1251
+ 2 − K2
1252
+ 2
1253
+
1254
+ − 2Ω1L2L3
1255
+
1256
+ C − 2Ω1
1257
+
1258
+ Ψ1, ∇Ψ2 · ∇Ψ3
1259
+ ��
1260
+ ,
1261
+ (27)
1262
+ while α2 and α3 follow by cyclic coefficient of the subscripts (1, 2, 3). Furthermore, the correlation
1263
+ integral, C , is defined
1264
+ C = 1
1265
+ S
1266
+ ��
1267
+ D
1268
+ Ψ1Ψ2Ψ3 dA,
1269
+ (28)
1270
+ where we recall that S is the area of the cylinder cross-section (see §2.2). As the triad equations
1271
+ (26) are valid for τ = O(1) (or t = O(1/ϵ)), their dynamics yield an informative view of the
1272
+ long-time evolution of the resonant triad.
1273
+ In order to assess the influence of the triad coefficients on the triad evolution (see §4.2), we first
1274
+ simplify the algebraic form given in equation (27). As shown by Miles [42], one may simplify the
1275
+ inner product ⟨Ψ1, ∇Ψ2 · ∇Ψ3⟩ by repeated application of the divergence theorem and utilisation
1276
+ of the relationship −∆Ψj = K2
1277
+ j Ψj; it follows that
1278
+
1279
+ Ψ1, ∇Ψ2 · ∇Ψ3
1280
+
1281
+ = 1
1282
+ 2
1283
+
1284
+ K2
1285
+ 2 + K2
1286
+ 3 − K2
1287
+ 1
1288
+
1289
+ C ,
1290
+ (29)
1291
+ where C is the correlation integral defined in equation (28). We then substitute equation (29) into
1292
+ equation (27) and simplify using the relation Ω1 + Ω2 + Ω3 = 0. After some algebra, we derive the
1293
+ reduced expression
1294
+ α1 = C
1295
+ 2Ω1
1296
+
1297
+ Ω2L2
1298
+ 3 + Ω3L2
1299
+ 2 − 2Ω1L2L3 +
1300
+ 3
1301
+
1302
+ l=1
1303
+ ΩlK2
1304
+ l
1305
+
1306
+ ,
1307
+ (30)
1308
+ where α2 and α3 follow similarly. Finally, we demonstrate in appendix C that the algebraic form
1309
+ of the triad coefficients may be further reduced to
1310
+ αj = C β
1311
+ 2Ωj
1312
+ for
1313
+ j = 1, 2, 3,
1314
+ (31)
1315
+ where
1316
+ β =
1317
+ 3
1318
+
1319
+ l=1
1320
+ ΩlK2
1321
+ l − 1
1322
+ 2Ω1Ω2Ω3
1323
+
1324
+ Ω2
1325
+ 1 + Ω2
1326
+ 2 + Ω2
1327
+ 3
1328
+
1329
+ .
1330
+ (32)
1331
+ Equations (26), (28), (31) and (32) constitute the triad equations for resonant gravity waves
1332
+ confined to a cylinder of finite depth. Although the triad equations are of canonical form [5],
1333
+ the novelty of our investigation is the computation of the coefficients, αj, whose algebraic form is
1334
+ specific to our system.
1335
+ 16
1336
+
1337
+ Figure 4: Contours of β/K2
1338
+ 3 (see equation (32)) for the case Ω1, Ω2 > 0 and Ω3 < 0 (with
1339
+ Ω1 + Ω2 + Ω3 = 0), for which β < 0 (see equation (33)).
1340
+ 4.2
1341
+ Properties of the triad coefficients
1342
+ The simplified form of the coefficients, αj (equation (31)), allows for some important theoretical
1343
+ observations that were obfuscated by the more complicated expressions for αj given in equations
1344
+ (27) and (30). In particular, as exactly two of the angular frequencies, Ωj, have the same sign, we
1345
+ deduce from equation (31) that the two corresponding coefficients, αj, also have the same sign,
1346
+ with the third coefficient having the opposite sign. By utilising the well-known results pertaining
1347
+ to the canonical triad equations, we conclude that all solutions to the triad equations (26) are
1348
+ periodic in time, with solutions expressible in terms of elliptic functions [1, 5, 54, 15]. Typically,
1349
+ these solutions result in an exchange of energy between the comprising modes, although there is a
1350
+ class of periodic solution that, perhaps counter-intuitively, results in zero energy exchange for all
1351
+ time [9, 10]. Moreover, it is readily verified that the leading-order energy density, E1 + E2 + E3, is
1352
+ conserved, where Ej = Ω2
1353
+ j|Aj|2, consistent with the Hamiltonian structure of the Euler equations
1354
+ [5, 15]. The reader is directed to the work of Craik [15] for a more detailed account of the various
1355
+ properties of the canonical triad equations.
1356
+ Of particular relevance to the evolution of the triad is the quantity β (see equation (32)), which,
1357
+ together with C , determines the time scale over which energy exchange arises. In particular, we
1358
+ present the form of β in figure 4 for the case Ω1, Ω2 > 0 and Ω3 < 0. As we will demonstrate
1359
+ below, β < 0 in this case; in general, the sign of β is the same as the sign of the largest (in
1360
+ magnitude) angular frequency, Ωj. Notably, |β| decreases sharply towards zero as K1 + K2 → K3,
1361
+ corresponding to the limit hc → 0. Similarly, |β| approaches zero in the limiting cases K1 ≪
1362
+ K3 or K2 ≪ K3, corresponding to one low-oscillatory wave mode interacting with two highly-
1363
+ oscillatory wave modes. Away from these limiting cases, however, |β| depends only weakly on
1364
+ the wavenumbers, Kj, suggesting that the correlation integral, C , predominantly controls the
1365
+ time-scale of the triad evolution. Finally, we observe that β is symmetric about the line K1 = K2,
1366
+ consistent with the invariance of equation (32) under the mapping K1 ↔ K2 (and hence, Ω1 ↔ Ω2).
1367
+ 17
1368
+
1369
+ 0
1370
+ -0.1
1371
+ 0.8
1372
+ -0.2
1373
+ 0.6
1374
+ -0.3
1375
+ K2
1376
+ K3
1377
+ -0.4
1378
+ 0.4
1379
+ -0.5
1380
+ 0.2
1381
+ -0.6
1382
+ -0.7
1383
+ 0
1384
+ 0
1385
+ 0.2
1386
+ 0.4
1387
+ 0.6
1388
+ 0.8
1389
+ 1
1390
+ Ki/K3We conclude this section by proving that β < 0 in the case Ω1, Ω2 > 0 and Ω3 < 0. By
1391
+ comparing the forms of equations (32) and (30), and then permuting the subscripts (1, 2, 3) �→
1392
+ (3, 1, 2), we first note that β may be equivalently expressed as
1393
+ β = Ω1L2
1394
+ 2 + Ω2L2
1395
+ 1 − 2Ω3L1L2 +
1396
+ 3
1397
+
1398
+ l=1
1399
+ ΩlK2
1400
+ l ,
1401
+ or
1402
+ β = Ω1(L2
1403
+ 2 + K2
1404
+ 1) + Ω2(L2
1405
+ 1 + K2
1406
+ 2) + |Ω3|(2L1L2 − K2
1407
+ 3).
1408
+ By bounding Lj = Kj tanh(Kjhc) < Kj for 0 < hc < ∞ and utilising the relation Ω1 + Ω2 = |Ω3|,
1409
+ we obtain
1410
+ β < |Ω3|
1411
+
1412
+ K2
1413
+ 1 + K2
1414
+ 2 + 2K1K2 − K2
1415
+ 3
1416
+
1417
+ = |Ω3|
1418
+
1419
+ (K1 + K2)2 − K2
1420
+ 3
1421
+
1422
+ .
1423
+ (33)
1424
+ As resonant triads exist only when K1 + K2 < K3 (see Theorem 1), we conclude that β < 0 in this
1425
+ case.
1426
+ 4.3
1427
+ Summary
1428
+ To summarise our theoretical developments, the velocity potential, u, at the fluid rest level (z = 0)
1429
+ evolves according to
1430
+ u(x, t) ∼
1431
+ 3
1432
+
1433
+ j=1
1434
+
1435
+ Aj(τ)Ψj(x)e−iΩjt + c.c.
1436
+
1437
+ + O(ϵ),
1438
+ (34)
1439
+ where the complex amplitudes, Aj(τ), evolve over the slow time-scale, τ = ϵt, according to the triad
1440
+ equations (26). In particular, the triad coefficients, αj (see equation (31)), are defined in terms
1441
+ of the correlation integral, C (equation (28)), and the coefficient β (equation (32)). Notably, we
1442
+ assume that C is nonzero; if this condition were violated then all three of the triad coefficients, αj,
1443
+ would be equal to zero, giving rise to non-interacting wave modes at leading order (contradicting
1444
+ the notion of a triad).
1445
+ Indeed, the condition C ̸= 0 is identical to the correlation condition
1446
+ detailed in equation (8), the origins of which we have now justified. Finally, the evolution of the
1447
+ free surface, η, may be recovered by recalling that η = −ut + O(ϵ): we conclude that η(x, t) has
1448
+ a similar leading-order form to u(x, t), but each complex amplitude, Aj(τ), in (34) is replaced by
1449
+ iΩjAj(τ) (see equation (37) below).
1450
+ We briefly contrast our investigation of triad interaction with the early-time calculation of
1451
+ Michel [40], who characterised the initial linear growth of a child mode induced by the nonlinear
1452
+ interaction of two parent modes (where all three modes comprise the triad).
1453
+ If modes 1 and
1454
+ 2 are the parent modes and mode 3 is the child mode, then the initial linear growth may be
1455
+ deduced directly from triad equations (26) in the limit |A3| ≪ |A1| ∼ |A2|. Specifically, the initial
1456
+ variation of A1 and A2 is slow relative to that of A3, which has the approximate early-time form
1457
+ A3(τ) ≈ α3C∗
1458
+ 1C∗
1459
+ 2τ + C3, where Cj = Aj(0). Notably, the linear growth rate of the child mode
1460
+ depends on the corresponding triad coefficient, α3, and the product of the initial amplitudes of the
1461
+ two parent modes. However, our result for circular cylinders differs to that of Michel; we believe
1462
+ that the author neglected some important nonlinear contributions (compare Michel’s equation
1463
+ (A2) to equations (2.4) and (2.4a) of Longuet-Higgins [33]). As Michel’s experiment verified the
1464
+ scaling of the interaction only up to a proportionality constant, this discrepancy was not captured.
1465
+ 18
1466
+
1467
+ 4.3.1
1468
+ The influence of weak detuning
1469
+ As discussed earlier in §4, the analysis in §§4.1 and 4.2 does not account for weak detuning of the
1470
+ angular frequencies, as might arise when the fluid depth, h, differs slightly from the critical depth,
1471
+ hc. We now briefly consider the case of weak detuning, for which equation (22) is replaced by the
1472
+ condition Ω1 +Ω2 +Ω3 = ϵσ (see §3.3.2); here ϵ is the small parameter representative of the typical
1473
+ wave slope (see §2) and σ = O(1) determines the extent of the detuning [5, 39]. By following
1474
+ a very similar multiple-scales procedure to the case σ = 0, we obtain amplitude equations that
1475
+ are now augmented by a time-dependent modulation. Specifically, each complex amplitude now
1476
+ evolves according to
1477
+ dA1
1478
+ dτ = α1A∗
1479
+ 2A∗
1480
+ 3eiστ,
1481
+ dA2
1482
+ dτ = α2A∗
1483
+ 1A∗
1484
+ 3eiστ,
1485
+ dA3
1486
+ dτ = α3A∗
1487
+ 1A∗
1488
+ 2eiστ,
1489
+ where each coefficient, αj, is defined in equation (31). Although detuning yields non-autonomous
1490
+ amplitude equations, autonomous equations may be derived by mapping Aj(τ) �→ Aj(τ)eiστ/3 for
1491
+ all j = 1, 2, 3 [15]. Finally, we note that the energy, E1 + E2 + E3, is not exactly conserved when
1492
+ considering the effects of detuning; instead, the energy slowly oscillates about a constant value
1493
+ [15].
1494
+ 4.3.2
1495
+ The case of a 1:2 resonance
1496
+ A 1:2 resonance is a resonant triad for which two modes comprising the triad coincide. For this
1497
+ case, we define two angular frequencies, Ω1 and Ω2, so that Ω2 = 2Ω1 [42], where the connection
1498
+ to resonant triads is clear when writing Ω1 + Ω1 = Ω2. By following a very similar multiple-scales
1499
+ procedure to that outlined in §4.1, we obtain
1500
+ u(x, t) ∼
1501
+ 2
1502
+
1503
+ j=1
1504
+
1505
+ Aj(τ)Ψj(x)e−iΩjt + c.c.
1506
+
1507
+ + O(ϵ),
1508
+ where
1509
+ dA1
1510
+ dτ = −γA∗
1511
+ 1A2
1512
+ and
1513
+ dA2
1514
+ dτ = γ
1515
+ 4A2
1516
+ 1.
1517
+ (35)
1518
+ In particular, the evolution of the amplitude equations (35) depends on the coefficient γ = C
1519
+
1520
+ K2
1521
+ 2 −
1522
+ K2
1523
+ 1 − 3Ω4
1524
+ 1
1525
+
1526
+ , where C = 1
1527
+ S
1528
+ ��
1529
+ D Ψ2
1530
+ 1Ψ2 dA is the correlation integral. Indeed, the amplitude equations
1531
+ (35) and coefficient, γ, are consistent with the results of Miles [42] when expressing the evolution
1532
+ of each complex amplitude, Aj, in polar form (with appropriate rescaling). Finally, we note that a
1533
+ weak detuning (see §4.3.1) may also be incorporated within the amplitude equations (35), thereby
1534
+ accounting for a slight mismatch between the fluid depth, h, and the corresponding critical depth,
1535
+ hc [42].
1536
+ Of particular interest is the evolution of weakly nonlinear waves steadily propagating around
1537
+ a circular cylinder of unit radius, focusing on the case where the fluid depth is precisely equal to
1538
+ the critical depth of a 1:2 resonance [64]. For the complex-valued eigenmodes defined in equation
1539
+ (19), the correlation condition,
1540
+ ��
1541
+ D Ψ2
1542
+ 1Ψ∗
1543
+ 2 dA ̸= 0, determines that the angular wavenumbers satisfy
1544
+ m2 = 2m1 [12, 64]. By expressing the complex wave amplitudes in polar form, Aj(τ) = aj(τ)eiθj(τ)
1545
+ (for j = 1, 2), equation (35) may be recast as [42]
1546
+ da1
1547
+ dτ = −γa1a2 cos Θ,
1548
+ da2
1549
+ dτ = γ
1550
+ 4a2
1551
+ 1 cos Θ,
1552
+
1553
+ dτ = 2γa2
1554
+
1555
+ 1 − a2
1556
+ 1
1557
+ 8a2
1558
+ 2
1559
+
1560
+ sin Θ,
1561
+ 19
1562
+
1563
+ where Θ(τ) = θ2(τ) − 2θ1(τ) is the time-dependent phase shift.
1564
+ Steadily propagating waves
1565
+ correspond to time-independent solutions for a1, a2 (both nonzero) and Θ, from which we deduce
1566
+ that cos Θ = 0 and a1/a2 = 2
1567
+
1568
+ 2.
1569
+ Indeed, it is remarkable that the amplitude ratio of the
1570
+ two dominant (normalised) wave modes is independent of the angular wavenumbers, mj, the
1571
+ radial wavenumbers, Kj, and the corresponding angular frequencies, Ωj (see §3.3.2 for details).
1572
+ Furthermore, one may readily determine the relationship between the angular velocity of the
1573
+ steady wave rotation and the corresponding wave amplitude, which may then be compared to the
1574
+ numerical solution of the full Euler equations [64]. This comparison, as well as a comparison to
1575
+ steadily propagating waves computed from various truncations of the Euler equations, will be the
1576
+ subject of future investigation.
1577
+ 5
1578
+ The excitation of resonant triads
1579
+ Having established the existence and evolution of resonant triads, we now focus on the excitation
1580
+ of a particular triad via external forcing. So as to motivate the method of excitation, we first
1581
+ recall (§5.1) the well-known result that one mode in the triad may, or may not, excite the other
1582
+ two modes [16, 22, 54]; in the case of excitation, the initial mode is referred to as the pump mode
1583
+ [15]. We will then utilise the criterion of the pump mode to excite all three modes in the triad via
1584
+ a pulsating pressure source (§5.2). Throughout this section, we continue with the convention that
1585
+ the triad angular frequencies satisfy Ω1 + Ω2 + Ω3 = 0, as set forth in §4.
1586
+ 5.1
1587
+ Excitation via the triad pump mode
1588
+ To first identify the triad pump mode and then characterise the resultant excitation, we consider
1589
+ the case for which A3, say, is much larger in magnitude than the other two mode amplitudes, so
1590
+ |A1|, |A2| ≪ |A3| [16, 22, 54]. By linearising the triad equations (26), we obtain
1591
+ dA1
1592
+ dτ = α1A∗
1593
+ 2A∗
1594
+ 3,
1595
+ dA2
1596
+ dτ = α2A∗
1597
+ 1A∗
1598
+ 3,
1599
+ dA3
1600
+ dτ = 0,
1601
+ (36)
1602
+ from which we immediately conclude that A3 is constant (whilst the linearisation assumption
1603
+ holds); we denote A3(τ) = C for some given complex number C. By considering second derivatives
1604
+ of A1 and A2, we deduce the linearised evolution equations [15]
1605
+ d2A1
1606
+ dτ 2 = α1α2|C|2A1
1607
+ and
1608
+ d2A2
1609
+ dτ 2 = α1α2|C|2A2,
1610
+ where α1α2 = C 2β2/(4Ω1Ω2) (see equation (31)). We conclude that A1(τ) and A2(τ) grow ex-
1611
+ ponentially in time (whilst the linearisation approximation holds) when Ω1Ω2 > 0, and exhibit
1612
+ sinusoidal oscillations when Ω1Ω2 < 0 [16, 22, 15].
1613
+ Thus, mode 3 may excite modes 1 and 2
1614
+ when Ω1 and Ω2 have the same sign (and likewise for other mode permutations). As one angular
1615
+ frequency must have a different sign from the other two (so as to satisfy Ω1 + Ω2 + Ω3 = 0), we
1616
+ conclude that the mode whose angular frequency is largest in magnitude (i.e. differs in sign) is the
1617
+ triad pump mode [15]. Equivalently, the pump mode is the mode with largest wavenumber, Kj.
1618
+ To visualise the influence of the pump mode on the resultant free-surface pattern, we present the
1619
+ solution of the triad equations (26) and the corresponding pump-mode approximation (equation
1620
+ (36)) in figure 5. By recalling that the free surface satisfies η = −ut + O(ϵ), we first deduce that
1621
+ η(x, t) ∼
1622
+ 3
1623
+
1624
+ j=1
1625
+
1626
+ iΩjAj(τ)Ψj(x)e−iΩjt + c.c.
1627
+
1628
+ + O(ϵ).
1629
+ (37)
1630
+ 20
1631
+
1632
+ Figure 5: Excitation of a triad via its pump mode for the case of a circular cylinder. We consider
1633
+ triad 24 in table 1, but with m3 �→ −m3. We choose Ω1, Ω2 > 0 and Ω3 < 0, so that mode 3
1634
+ is the pump mode. (a) Evolution of the free-surface, η ∼ −ut, over the slow time-scale, τ = ϵt,
1635
+ with ϵ = 10−3. (b) The evolution of the wave amplitudes, |Aj|, according to the triad equations
1636
+ (equation (26), solid curves) and the pump-mode approximation (equation (36), dashed-dotted
1637
+ curves). Insets: modes 1 (blue), 2 (red) and 3 (gold) at τ = 0; all three modes rotate counter-
1638
+ clockwise. The simulations were initialised from A1(0) = 0.01 and A2(0) = 0.01i, where A3(0) was
1639
+ chosen to be the positive real number satisfying E1 + E2 + E3 = 1, with Ej = Ω2
1640
+ j|Aj|2 (see §4.2).
1641
+ 21
1642
+
1643
+ T=O
1644
+ 8
1645
+ T= 16
1646
+ 24
1647
+ T川
1648
+ a
1649
+ (6)
1650
+ 0.6
1651
+ 0.5
1652
+ 0.4
1653
+ 0.3
1654
+ 0.2
1655
+ 0.1
1656
+ 0
1657
+ 0
1658
+ 5
1659
+ 10
1660
+ 15
1661
+ 20
1662
+ 25
1663
+ 30
1664
+ =For the case of a circular cylinder, we utilise the complex-valued eigenmodes defined in equation
1665
+ (19), corresponding to the superposition of steadily propagating waves for mj ̸= 0 (the rotation di-
1666
+ rection depends on the sign of Ωj/mj). Upon initialising the system so that the energy is primarily
1667
+ within the pump mode (mode 3), modes 1 and 2 are gradually excited due to nonlinear interaction,
1668
+ with exponential growth evident for τ ≲ 10. As time further increases, the dynamics depart from
1669
+ the pump-mode approximation: the energy in the pump mode appreciably decreases, whilst the
1670
+ energy in modes 1 and 2 saturates. The free surface varies qualitatively during this evolution, with
1671
+ an appreciable change in pattern structure visible by τ = 24 (primarily a superposition of modes 1
1672
+ and 2). Notably, the system evolution is periodic, which becomes apparent over longer time scales.
1673
+ 5.2
1674
+ Excitation via an applied pressure source
1675
+ Based on the ideas of the previous section, we consider a methodology for exciting the pump
1676
+ mode of a triad, which will subsequently excite the remaining two modes (provided that the initial
1677
+ disturbance of each of the remaining modes is nonzero). Notably, several methods for exciting
1678
+ internal resonances have been considered in prior investigations, primarily focusing on imposed
1679
+ motion of the fluid vessel via horizontal [42, 45] or vertical vibration [42, 44, 46, 24]. Furthermore,
1680
+ one may, in principle, utilise sinusoidal paddles or plungers to excite a particular triad’s pump
1681
+ mode for a given geometry (similar wave makers are used in rectangular wave tanks [37, 23]).
1682
+ However, for large-scale fluid tanks, imposed motion of the vessel may be impractical (if the tank
1683
+ were set in a concrete base, for example), and it may be challenging to determine the correct
1684
+ paddle motion necessary to excite a chosen pump mode for geometrically complex cylinders. We
1685
+ choose, therefore, to consider a slightly different approach: we instead excite the pump mode via
1686
+ a pulsating pressure source located just above the free surface (e.g. an air blower).
1687
+ In order to incorporate a pressure source within our mathematical framework, we first refor-
1688
+ mulate the dimensionless dynamic boundary condition (equation (1b)) as
1689
+ φt + η + ϵ
1690
+ 2
1691
+
1692
+ |∇φ|2 + φ2
1693
+ z
1694
+
1695
+ + ϵP(x, t) = 0
1696
+ for
1697
+ x ∈ D,
1698
+ z = ϵη,
1699
+ where the dimensional pressure is ϵ2aρgP for fluid density ρ (P = 0 corresponds to atmospheric
1700
+ pressure). The pressure source is chosen to be small in magnitude so that the resultant wave
1701
+ excitation arises over the slow time-scale, τ = ϵt, and may thus be saturated by weakly nonlinear
1702
+ effects. By modifying the developments outlined in §2.1, we derive the forced Benney-Luke equation
1703
+ utt + L u + ϵ
1704
+
1705
+ ut
1706
+
1707
+ L 2 + ∆
1708
+
1709
+ u + ∂
1710
+ ∂t
1711
+
1712
+ (L u)2 + |∇u|2�
1713
+ + ∂tP
1714
+
1715
+ = O(ϵ2)
1716
+ for
1717
+ x ∈ D,
1718
+ (38)
1719
+ which will be the starting point for the asymptotic analysis.
1720
+ Before proceeding further, we first describe two forms of the pressure source relevant to our
1721
+ investigation. For a stationary pressure source oscillating periodically over the fast time-scale, t,
1722
+ we express P(x, t) = f(τ)s(x)e−iΩpt + c.c., where s(x) is a fixed spatial profile (generally spanning
1723
+ the cavity), f(τ) accounts for a slow modulation in the magnitude of the pressure, and Ωp is the
1724
+ pulsation angular frequency. We choose Ωp to be close to the angular frequency of the pump
1725
+ mode, which, without loss of generality, we assume to be mode 3 (i.e. Ω3 has the opposite sign
1726
+ from Ω1 and Ω2). We denote, therefore, Ωp = Ω3 + ϵµ, where µ = O(1) determines the extent
1727
+ of the frequency mismatch. For a pressure source orbiting the centre of a circular cylinder at a
1728
+ constant angular velocity, we instead posit that P has the form P(r, θ, t) = f(τ)s(r, θ−Ωpt), where
1729
+ 22
1730
+
1731
+ 0
1732
+ 5
1733
+ 10
1734
+ 1
1735
+ 2
1736
+ 3
1737
+ 4
1738
+ 0
1739
+ 20
1740
+ 40
1741
+ 60
1742
+ 80
1743
+ 100
1744
+ 0
1745
+ 1
1746
+ 2
1747
+ 3
1748
+ 4
1749
+ 0
1750
+ 50
1751
+ 100
1752
+ 150
1753
+ 200
1754
+ 250
1755
+ 300
1756
+ 1
1757
+ 2
1758
+ 3
1759
+ 4
1760
+ 5
1761
+ Figure 6: Evolution of the forced triad equations (39) for σ = µ = 0 and constant f. We consider
1762
+ the same triad as figure 5, with s3f = 0.1. In all three panels, A1(0) = 0.02i and A2(0) = 0.01.
1763
+ For A3(0) = 0.01, we observe (a) the initial excitation of the triad and (b) the resultant periodic
1764
+ dynamics (the initial growth is highlighted within the grey box). (c) For A3(0) = 0.01i, the triad
1765
+ evolution is chaotic.
1766
+ Ωp = (Ω3 + ϵµ)/m3 is the angular velocity of the pressure source (assuming that the pump mode
1767
+ is non-axisymmetric, i.e. m3 ̸= 0).
1768
+ For both standing and orbiting pressure sources, we now follow a similar multiple-scales pro-
1769
+ cedure to that outlined in §4.1, starting from the forced Benney-Luke equation (38). So as to
1770
+ discount the possibility that the pressure source excites more than one mode in the triad, we
1771
+ assume that neither |Ω1| or |Ω2| are close to |Ω3|. Furthermore, we incorporate a weak detuning
1772
+ in the triad angular frequencies, denoting Ω1 + Ω2 + Ω3 = ϵσ (see §4.3.1). It follows that each
1773
+ complex amplitude, Aj(τ), evolves according to
1774
+ dA1
1775
+ dτ = α1A∗
1776
+ 2A∗
1777
+ 3eiστ,
1778
+ dA2
1779
+ dτ = α2A∗
1780
+ 1A∗
1781
+ 3eiστ,
1782
+ dA3
1783
+ dτ = α3A∗
1784
+ 1A∗
1785
+ 2eiστ − Ω3s3f(τ)e−iµτ,
1786
+ (39)
1787
+ where the coefficients, αj, are defined in equation (31). Notably, the pump mode may only be
1788
+ excited provided that the corresponding eigenmode is non-orthogonal to the pressure source, cor-
1789
+ responding to a nonzero projection, i.e. s3 ̸= 0, where s3 = ⟨Ψ3, s⟩. Similar equations describing
1790
+ the evolution of forced resonant triads have been explored by McEwan et al. [35] (with the inclusion
1791
+ of linear damping) and Raupp & Silva Dias [50].
1792
+ In the special case of time-independent forcing (f constant) and no frequency detuning (σ =
1793
+ µ = 0), the dynamics of the forced triad equations has been analysed by Harris et al. [20], with
1794
+ both periodic and quasi-periodic dynamics reported. We also consider this case, leaving the effects
1795
+ of detuning and variable forcing for future investigation. In this setting, when |A1|, |A2| and |A3|
1796
+ 23
1797
+
1798
+ are initially small relative to the magnitude of the forcing, |Ω3s3f|, the initial growth in A3 is
1799
+ approximately linear (see figure 6(a)). As mode 3 is the pump mode, the growth in A3 excites A1
1800
+ and A2, thus activating the triad. The conservation laws of the forced triad equations [20] result
1801
+ in a temporary diminution of mode 3, which is later augmented by the external forcing; whence
1802
+ the process repeats. In some parameter regimes, the resulting evolution of the forced triad is
1803
+ periodic in time (see figure 6(b) and Raupp & Silva Dias [50]); in contrast to the findings of Harris
1804
+ et al. [20], however, we also identify initial conditions (with all other parameters unchanged) that
1805
+ result in hitherto unidentified chaotic dynamics (see figure 6(c)). The chaotic nature of this latter
1806
+ example may be verified via estimation of the maximal Lyapunov exponent [55], which is found
1807
+ to be positive (i.e. initially adjacent trajectories diverge exponentially in phase space); however, a
1808
+ more thorough investigation of the chaotic dynamics of the forced triad equations, and the subtle
1809
+ dependence on initial conditions, will be presented elsewhere.
1810
+ 6
1811
+ Discussion
1812
+ We have performed a systematic investigation into nonlinear resonant triads of free-surface gravity
1813
+ waves confined to a cylinder of finite depth; previously studied 1:2 resonances are obtained as
1814
+ special cases. A key result of our study is Theorem 1, which determines whether there exists
1815
+ a fluid depth at which three given wave modes resonate due to the nonlinear evolution of the
1816
+ fluid. Equipped with this result, we determined the long-time fluid evolution using multiple-scales
1817
+ analysis, from which we deduced that all solutions to the triad equations are periodic in time.
1818
+ Finally, we determined that a given triad may be excited via external forcing of the triad’s pump
1819
+ mode, thereby providing a mechanism for exciting a given triad in a wave tank. All our results
1820
+ are derived for cylinders of arbitrary cross-section (barring some technical assumptions; see §2),
1821
+ thus forming a broad framework for characterising nonlinear resonance of confined free-surface
1822
+ gravity waves. In particular, our theoretical developments buttress experimental observations [40]
1823
+ and demonstrate the potential generality of confinement as a mechanism for promoting nonlinear
1824
+ resonance.
1825
+ A second fundamental component of our study is the influence of the cylinder cross-section
1826
+ on the existence of resonant triads; for example, resonant triads are impossible in rectangular
1827
+ cylinders, yet abundant within circular and annular cylinders (for particular fluid depths). Of the
1828
+ vast array of resonances arising in a circular cylinder, triads consisting of an axisymmetric pump
1829
+ mode and two identical counter-propagating waves are of notable interest. This combination of
1830
+ axisymmetric and non-axisymmetric modes possesses an interesting analogy to the excitation of
1831
+ counter-propagating subharmonic beach edge waves due to a normally incident standing wave
1832
+ [18]. Specifically, the wave crests of the standing axisymmetric mode are always parallel to the
1833
+ bounding wall of the circular cylinder, and may excite steadily propagating waves that are periodic
1834
+ in the azimuthal direction. For the special case for which the amplitudes of the two counter-
1835
+ propagating modes coincide, one observes the resonant interaction of standing axisymmetric and
1836
+ non-axisymmetric waves.
1837
+ So as to gain a deeper insight into the influence of nonlinearity on resonant triads, a primary
1838
+ focus for future investigations will be the simulation of the Euler equations within a cylindrical
1839
+ domain, with consideration of various truncated systems [14, 47, 4, 57]. From a computational
1840
+ perspective, the most natural geometry to consider is a circular cylinder [49]; this geometry has
1841
+ been previously explored in the context of steadily propagating nonlinear waves in the vicinity of
1842
+ a 1:2 resonance [8, 64], but it remains to assess the efficacy of the amplitude equations (26) for
1843
+ 24
1844
+
1845
+ predicting the evolution of nonlinear triads. Indeed, exploration of the nonlinear dynamics may
1846
+ reveal additional resonant triads arising beyond the small-wave-amplitude limit explored herein.
1847
+ Of similar interest is the fluid evolution when multiple triads are excited at a single depth, with
1848
+ the potential for energy exchange via triad-triad interactions [35, 15, 13, 11]. The simulation of
1849
+ free-surface gravity waves in non-circular cylinders presents a more formidable challenge, however,
1850
+ except for cylinder cross-sections that possess a tractable eigenmode decomposition.
1851
+ A second natural avenue for future investigation is to characterise the influence of applied
1852
+ forcing on resonant triads. For example, when the fluid bath is subjected to sufficiently vigorous
1853
+ vertical vibration, Faraday waves [17, 30] may appear on the free surface; although this scenario
1854
+ has been studied in the case of a 1:2 internal resonance [44, 46, 24], resonant triads may give rise to
1855
+ the formation of more exotic free-surface patterns, particularly at fluid depths that differ from that
1856
+ of a 1:2 resonance. In a similar vein, horizontal vibration [42, 45] or a pulsating pressure source
1857
+ at the frequency of the triad’s pump mode may lead to a wealth of periodic and quasi-periodic
1858
+ dynamics, as predicted by the forced triad equations [20].
1859
+ Our study has indicated, however,
1860
+ that chaotic dynamics are also possible in some parameter regimes, and might thus be excited in
1861
+ numerical simulation or experiments. Lastly, our study has focused on flat-bottomed cylinders; it
1862
+ seems plausible, however, that submerged topography may enhance or mitigate certain resonances,
1863
+ which may be an important consideration in the design of industrial-scale fluid tanks.
1864
+ Finally, our study has focused on the special case of a liquid-air interface, for which the dynamics
1865
+ of the air are neglected within the Euler equations. It is natural, however, to extend our formulation
1866
+ to the case of two-layer flows (in the absence of surface tension), with two immiscible fluids (e.g.
1867
+ air and water) confined within a cylinder whose lid and base are both rigid. In this setting, the
1868
+ density difference across the fluid-fluid interface has a strong influence of the system dynamics; it
1869
+ seems plausible, therefore, that additional resonances may be excited in this configuration, relative
1870
+ to the liquid-air interface considered herein. Notably, the anticipated resonances would arise across
1871
+ a single interface, in contrast to the cross-interface resonances explored in previous investigations
1872
+ [1, 54, 25, 53, 56, 11].
1873
+ Finally, exploring the influence of parametric forcing [31] on resonant
1874
+ triads arising for two-layer flows opens up exciting new vistas in nonlinear resonance induced by
1875
+ confinement.
1876
+ A
1877
+ Proof of Theorem 1
1878
+ Proof. To prove Theorem 1, we first show that there are no values of h ∈ (0, ∞) satisfying Ω1+Ω2 =
1879
+ Ω3 when K1+K2 ≥ K3 or when √K1+√K2 ≤ √K3, where we recall that Ωj(h) =
1880
+
1881
+ Kj tanh(Kjh)
1882
+ and Kj > 0 for j = 1, 2, 3. We then prove that there exists a solution to Ω1 + Ω2 = Ω3 when
1883
+ K1 + K2 < K3 < (√K1 + √K2)2, and that this solution is unique.
1884
+ In the case K1 + K2 ≥ K3, we first define χ(K; h) =
1885
+
1886
+ K tanh(Kh). For fixed h > 0, we
1887
+ observe that
1888
+ χ(K3; h) ≤ χ(K1 + K2; h) < χ(K1; h) + χ(K2; h),
1889
+ where we have utilised that χ(K; h) is a positive, monotonically increasing, concave function of
1890
+ K > 0. We conclude that Ω3 < Ω1 + Ω2 for any h > 0, so there are no values of h for which
1891
+ Ω1 + Ω2 = Ω3.
1892
+ In the case √K1 + √K2 ≤ √K3, we first note that the lower bound Kj > 0 (for j = 1, 2, 3)
1893
+ implies that K1 < K3 and K2 < K3.
1894
+ Furthermore, as tanh(x) is a monotonically increasing
1895
+ function for x > 0, we conclude that tanh(Kjh) < tanh(K3h) for j = 1, 2 and all h > 0. We now
1896
+ 25
1897
+
1898
+ utilise this property to deduce that
1899
+
1900
+ K1 tanh(K1h) +
1901
+
1902
+ K2 tanh(K2h) <
1903
+ ��
1904
+ K1 +
1905
+
1906
+ K2
1907
+ ��
1908
+ tanh(K3h) ≤
1909
+
1910
+ K3 tanh(K3h).
1911
+ We conclude that Ω3 > Ω1 + Ω2 for any h > 0, so there are no values of h for which Ω1 + Ω2 = Ω3.
1912
+ For the remainder of the proof, we consider the case
1913
+ K1 + K2 < K3
1914
+ and
1915
+
1916
+ K3 <
1917
+
1918
+ K1 +
1919
+
1920
+ K2,
1921
+ (40)
1922
+ which is equivalent to the pair of inequalities given by equation (9). Indeed, we will show that there
1923
+ exists a unique value of h > 0 satisfying Ω1 + Ω2 = Ω3 in this case. Equivalently, we demonstrate
1924
+ that F(h) =
1925
+
1926
+ Ω1(h) + Ω2(h)
1927
+
1928
+ /Ω3(h) − 1 has a unique positive root, where we express
1929
+ F(h) =
1930
+
1931
+ ψ1(h) +
1932
+
1933
+ ψ2(h) − 1,
1934
+ with the positive functions ψ1 and ψ2 defined
1935
+ ψj(h) = Kj tanh(Kjh)
1936
+ K3 tanh(K3h)
1937
+ for j = 1, 2.
1938
+ In order to show the existence of a root of F(h), we first note that
1939
+ lim
1940
+ h→0 F(h) = K1 + K2
1941
+ K3
1942
+ − 1 < 0
1943
+ and
1944
+ lim
1945
+ h→∞ F(h) =
1946
+ √K1 + √K2
1947
+ √K3
1948
+ − 1 > 0,
1949
+ where we have used the limits limx→0(tanh(x)/x) = 1 and limx→∞ tanh(x) = 1, respectively,
1950
+ and implemented the inequalities given in equation (40). As F(h) is a continuous function, the
1951
+ intermediate-value theorem determines that F(h) has at least one positive root.
1952
+ To prove that such a root is unique, we demonstrate that F(h) is a strictly monotonically
1953
+ increasing function for h > 0. Specifically, we note that (for j = 1, 2)
1954
+ dψj
1955
+ dh = 2K3ψj(h)
1956
+ �Kj
1957
+ K3
1958
+ cosech(2Kjh) − cosech(2K3h)
1959
+
1960
+ > 0
1961
+ for 0 < Kj < K3,
1962
+ where the inequality follows from the convexity of cosech(x) for x > 0, i.e. b cosech(bx) > cosech(x)
1963
+ for 0 < b < 1 and all x > 0 (associating x = 2K3h and b = Kj/K3). As the bounds K1 < K3
1964
+ and K2 < K3 incorporate the region determined by equation (40), we deduce that F(h) is strictly
1965
+ monotonically increasing. We conclude, therefore, that the root of F(h) must be unique, thereby
1966
+ completing the proof.
1967
+ B
1968
+ Wavenumbers in an annulus
1969
+ The no-flux condition (equation (1d)) on the inner and outer radii of an annulus requires that
1970
+ ∂rΦmn(r0, θ) = 0 and ∂rΦmn(1, θ) = 0 for all θ, where Φmn(r, θ) is the cylinder function defined
1971
+ in equation (20). It follows, therefore, that the corresponding wavenumber, kmn, and weighting
1972
+ factor, γmn, satisfy the equations
1973
+ J′(kmnr0) cos(γmnπ) + Y′
1974
+ m(kmnr0) sin(γmnπ) = 0,
1975
+ (41a)
1976
+ J′(kmn) cos(γmnπ) + Y′
1977
+ m(kmn) sin(γmnπ) = 0.
1978
+ (41b)
1979
+ 26
1980
+
1981
+ By rearranging equation (41), we determine the following expressions for tan(γmnπ):
1982
+ tan(γmnπ) = − J′
1983
+ m(kmnr0)
1984
+ Y′
1985
+ m(kmnr0)
1986
+ and
1987
+ tan(γmnπ) = − J′
1988
+ m(kmn)
1989
+ Y′
1990
+ m(kmn).
1991
+ (42)
1992
+ By eliminating tan(γmnπ) and rearranging, we find that kmn > 0 satisfies equation (21). Upon
1993
+ computing kmn, one may then determine γmn ∈ [0, 1] using either of the equivalent expressions for
1994
+ tan(γmnπ) given in equation (42).
1995
+ C
1996
+ Reduction of the triad coefficients
1997
+ As motivated by the form of α1 given in equation (30), we demonstrate that
1998
+ Ω2L2
1999
+ 3 + Ω3L2
2000
+ 2 − 2Ω1L2L3 = −1
2001
+ 2Ω1Ω2Ω3
2002
+
2003
+ Ω2
2004
+ 1 + Ω2
2005
+ 2 + Ω2
2006
+ 3
2007
+
2008
+ ,
2009
+ (43)
2010
+ where we recall that Ω1 + Ω2 + Ω3 = 0 and Lj = Ω2
2011
+ j. In fact, the equality given in equation
2012
+ (43) holds under cyclic permutation of the indices (1, 2, 3) (as is necessary when defining α2 and
2013
+ α3), where we note that the right-hand side is unchanged under such permutations. We conclude
2014
+ that α2 and α3 may be simplified in a similar manner, with the right-hand side of equation (43)
2015
+ appearing as a constant term in all three coefficients (see §4.2).
2016
+ We now detail the algebraic manipulations necessary to transform the left-hand side of equation
2017
+ (43) into the right-hand side. By substituting Lj = Ω2
2018
+ j into the left-hand side of equation (43) and
2019
+ factorising, we obtain
2020
+ Ω2L2
2021
+ 3 + Ω3L2
2022
+ 2 − 2Ω1L2L3 = Ω4
2023
+ 2Ω3 + Ω2Ω2
2024
+ 3
2025
+
2026
+ Ω2
2027
+ 3 − 2Ω1Ω2
2028
+
2029
+ .
2030
+ (44)
2031
+ Next, we substitute
2032
+ Ω2
2033
+ 3 = (Ω2
2034
+ 1 + Ω2
2035
+ 2) = Ω2
2036
+ 1 + 2Ω1Ω2 + Ω2
2037
+ 2
2038
+ (45)
2039
+ into equation (44), yielding
2040
+ Ω2L2
2041
+ 3 + Ω3L2
2042
+ 2 − 2Ω1L2L3 = Ω2Ω3
2043
+
2044
+ Ω3
2045
+ 2 + Ω3
2046
+
2047
+ Ω2
2048
+ 1 + Ω2
2049
+ 2
2050
+ ��
2051
+ .
2052
+ (46)
2053
+ We proceed by substituting Ω3 = −(Ω1 + Ω2) within the square brackets in equation (46); by
2054
+ distributing and cancelling common terms, we obtain
2055
+ Ω2L2
2056
+ 3 + Ω3L2
2057
+ 2 − 2Ω1L2L3 = −Ω1Ω2Ω3
2058
+
2059
+ Ω2
2060
+ 1 + Ω1Ω2 + Ω2
2061
+ 2
2062
+
2063
+ .
2064
+ (47)
2065
+ Finally, we rearrange equation (45) to give
2066
+ Ω1Ω2 = 1
2067
+ 2
2068
+
2069
+ Ω2
2070
+ 3 − Ω2
2071
+ 1 − Ω2
2072
+ 2
2073
+
2074
+ ,
2075
+ which, upon substitution into equation (47), supplies the required result (equation (43)).
2076
+ 27
2077
+
2078
+ References
2079
+ [1] F. K. Ball. Energy transfer between external and internal gravity waves. J. Fluid Mech.,
2080
+ 19(3):465–478, 1964.
2081
+ [2] D. J. Benney. Non-linear gravity wave interactions. J. Fluid Mech., 14(4):577–584, 1962.
2082
+ [3] D. J. Benney and J. C. Luke. On the Interactions of Permanent Waves of Finite Amplitude.
2083
+ J. Math. Phys., 43:309–313, 1964.
2084
+ [4] K. M. Berger and P. A. Milewski. Simulation of Wave Interactions and Turbulence in One-
2085
+ Dimensional Water Waves. SIAM J. Appl. Math., 63(4):1121–1140, 2003.
2086
+ [5] F. Bretherton. Resonant interactions between waves. the case of discrete oscillations. J. Fluid
2087
+ Mech., 20(3):457–479, 1964.
2088
+ [6] T. J. Bridges and F. Dias. An analysis of two-dimensional water waves based on O(2) sym-
2089
+ metry. Nonlinear Anal. Theory Methods Appl., 14(9):733–764, 1990.
2090
+ [7] P. J. Bryant. Periodic waves in shallow water. J. Fluid Mech., 59(4):625–644, 1973.
2091
+ [8] P. J. Bryant. Nonlinear progressive free waves in a circular basin. J. Fluid Mech., 205:453–467,
2092
+ 1989.
2093
+ [9] K. M. Case and S. C. Chiu. Three-wave resonant interactions of gravity-capillary waves. Phys.
2094
+ Fluids, 20:742, 1977.
2095
+ [10] M. Chabane and W. Choi. On resonant interactions of gravity-capillary waves without energy
2096
+ exchange. Stud. Appl. Math., 142:528–550, 2019.
2097
+ [11] W. Choi, M. Chabane, and T. M. A. Taklo. Two-dimensional resonant triad interactions in
2098
+ a two-layer system. J. Fluid Mech., 907:A5, 2021.
2099
+ [12] P. Chossat and F. Dias. The 1:2 Resonance with O(2) Symmetry and Its Applications in
2100
+ Hydrodynamics. J. Nonlinear Sci., 5:105–129, 1995.
2101
+ [13] C. Chow, D. Henderson, and H. Segur. A generalized stability criterion for resonant triad
2102
+ interactions. J. Fluid Mech., 319:67–76, 1996.
2103
+ [14] W. Craig and C. Sulem. Numerical Simulation of Gravity Waves. J. Comp. Phys., 108(1):73–
2104
+ 83, 1993.
2105
+ [15] A. D. D. Craik. Wave interactions and fluid flows. Cambridge Monographs on Mechanics.
2106
+ Cambridge University Press, 1986.
2107
+ [16] R. E. Davis and A. Acrivos.
2108
+ The stability of oscillatory internal waves.
2109
+ J. Fluid Mech.,
2110
+ 30(4):723–736, 1967.
2111
+ [17] M. Faraday. On a Peculiar Class of Acoustical Figures; and on Certain Forms Assumed by
2112
+ Groups of Particles upon Vibrating Elastic Surfaces. Philos. Trans. R. Soc., 121:299–340,
2113
+ 1831.
2114
+ 28
2115
+
2116
+ [18] R. T. Guza and R. E. Davis. Excitation of Edge Waves by Waves Incident on a Beach. J.
2117
+ Geophys. Res., 79(9):1285– 1291, 1974.
2118
+ [19] J. L. Hammack and D. M. Henderson. Resonant Interactions Among Surface Water Waves.
2119
+ Annu. Rev. Fluid Mech., 25(1):55–97, 1993.
2120
+ [20] J. Harris, M. D. Bustamante, and C. Connaughton. Externally forced triads of resonantly
2121
+ interacting waves: Boundedness and integrability properties. Commun. Nonlinear Sci. Numer.
2122
+ Simulat., 17:4988–5006, 2012.
2123
+ [21] K. Hasselmann. On the non-linear energy transfer in a gravity-wave spectrum Part 1. General
2124
+ theory. J. Fluid Mech., 12(4):481–500, 1961.
2125
+ [22] K. Hasselmann. A criterion for nonlinear wave stability. J. Fluid Mech., 30(4):737–739, 1967.
2126
+ [23] D. M. Henderson and J. L. Hammack. Experiments on ripple instabilities. Part 1. Resonant
2127
+ triads. J. Fluid Mech., 184:15–41, 1987.
2128
+ [24] D. M. Henderson and J. W. Miles. Faraday waves in 2:1 internal resonance. J. Fluid Mech.,
2129
+ 222:449–470, 1991.
2130
+ [25] T. M. Joyce. Nonlinear interactions among standing surface and internal gravity waves. J.
2131
+ Fluid Mech., 63(4):801–825, 1974.
2132
+ [26] U. Kadri and T. R. Akylas. On resonant triad interactions of acoustic-gravity waves. J. Fluid
2133
+ Mech., 788:R1, 2016.
2134
+ [27] U. Kadri and M. Stiassnie. Generation of an acoustic-gravity wave by two gravity waves, and
2135
+ their subsequent mutual interaction. J. Fluid Mech., 735:R6, 2013.
2136
+ [28] J. K. Kevorkian and J. D. Cole. Multiple Scale and Singular Perturbation Methods, volume
2137
+ 114 of Appl. Math. Sci. Springer, New York, 1996.
2138
+ [29] E. Kreyszig. Introductory Functional Analysis with Applications. John Wiley & Sons, 1989.
2139
+ [30] K. Kumar. Linear theory of Faraday instability in viscous fluids. Proc. R. Soc. Lond. A,
2140
+ 452:1113–1126, 1996.
2141
+ [31] K. Kumar and L. S. Tuckerman. Parametric instability of the interface between two fluids.
2142
+ J. Fluid Mech., 279:49–68, 1994.
2143
+ [32] H. Lamb. Hydrodynamics (6th ed.). Dover Publications, 1932.
2144
+ [33] M. S. Longuet-Higgins. Resonant interactions between two trains of gravity waves. J. Fluid
2145
+ Mech., 12(3):321–332, 1962.
2146
+ [34] L. R. Mack.
2147
+ Periodic, finite-amplitude, axisymmetric gravity waves.
2148
+ J. Geophys. Res.,
2149
+ 67(2):829–843, 1962.
2150
+ [35] A. McEwan, D. Mander, and R. Smith. Forced resonant second-order interaction between
2151
+ damped internal waves. J. Fluid Mech., 55(4):589–608, 1972.
2152
+ 29
2153
+
2154
+ [36] L. F. McGoldrick.
2155
+ Resonant interactions among capillary-gravity waves.
2156
+ J. Fluid Mech.,
2157
+ 21(2):305–331, 1965.
2158
+ [37] L. F. McGoldrick. An experiment on second-order capillary gravity resonant wave interactions.
2159
+ J. Fluid Mech., 40(2):251–271, 1970.
2160
+ [38] L. F. McGoldrick. On Wilton’s ripples: a special case of resonant interactions. J. Fluid Mech.,
2161
+ 42(1):193–200, 1970.
2162
+ [39] L. F. McGoldrick. On the rippling of small waves: a harmonic nonlinear nearly resonant
2163
+ interaction. J. Fluid Mech., 52(4):725–751, 1972.
2164
+ [40] G. Michel. Three-wave interactions among surface gravity waves in a cylindrical container.
2165
+ Phys. Rev. Fluids, 4:012801(R), 2019.
2166
+ [41] J. W. Miles. Surface-wave damping in closed basins. Proc. Roy. Soc. A, 297(1451):459–475,
2167
+ 1967.
2168
+ [42] J. W. Miles. Nonlinear surface waves in closed basins. J. Fluid Mech., 75(3):419–448, 1976.
2169
+ [43] J. W. Miles. Internally resonant surface waves in a circular cylinder. J. Fluid Mech., 149:1–14,
2170
+ 1984.
2171
+ [44] J. W. Miles. Nonlinear Faraday resonance. J. Fluid Mech., 146:285–302, 1984.
2172
+ [45] J. W. Miles. Resonantly forced surface waves in a circular cylinder. J. Fluid Mech., 149:15–31,
2173
+ 1984.
2174
+ [46] J. W. Miles and D. M. Henderson. Parametrically forced surface waves. Annu. Rev. Fluid
2175
+ Mech., 22:143–165, 1990.
2176
+ [47] P. A. Milewski and J. B. Keller. Three-Dimensional Water Waves. Stud. Appl. Math., 97:149–
2177
+ 166, 1996.
2178
+ [48] O. M. Phillips. On the dynamics of unsteady gravity waves of finite amplitude Part 1. The
2179
+ elementary interactions. J. Fluid Mech., 9(2):193–217, 1960.
2180
+ [49] S. Qadeer and J. A. Wilkening. Computing the Dirichlet–Neumann Operator on a Cylinder.
2181
+ SIAM J. Numer. Anal., 57(3):1183–1204, 2019.
2182
+ [50] C. F. M. Raupp and P. L. Silva Dias.
2183
+ Resonant Wave Interactions in the Presence of a
2184
+ Diurnally Varying Heat Source. J. Atmos. Sci., 66(10):3165–3183, 2009.
2185
+ [51] C. F. M. Raupp, P. L. Silva Dias, E. G. Tabak, and P. A. Milewski. Resonant wave interactions
2186
+ in the equatorial waveguide. J. Atmos. Sci., 65(11):3398–3418, 2008.
2187
+ [52] L. Schwartz and J.-M. Vanden-Broeck. Numerical solution of the exact equations for capil-
2188
+ lary–gravity waves. J. Fluid Mech., 95(1):119–139, 1979.
2189
+ [53] H. Segur. Resonant interactions of surface and internal gravity waves. Phys. Fluids, 23:2556,
2190
+ 1980.
2191
+ 30
2192
+
2193
+ [54] W. F. Simmons. A variational method for weak resonant wave interactions. Proc. Roy. Soc.
2194
+ Lond. A, 309(1499):551–577, 1969.
2195
+ [55] S. H. Strogatz.
2196
+ Nonlinear Dynamics and Chaos: With Applications to Physics, Biology,
2197
+ Chemistry and Engineering (2nd ed.). CRC Press, 2015.
2198
+ [56] T. M. A. Taklo and W. Choi. Group resonant interactions between surface and internal gravity
2199
+ waves in a two-layer system. J. Fluid Mech., 892:A14, 2020.
2200
+ [57] Z. Wang and P. A. Milewski. Dynamics of gravity-capillary solitary waves in deep water. J.
2201
+ Fluid Mech., 708:480–501, 2012.
2202
+ [58] Z. Wang, J.-M. Vanden-Broeck, and P. A. Milewski. Two-dimensional flexural–gravity waves
2203
+ of finite amplitude in deep water. IMA J. App. Math., 78(4):750–761, 2013.
2204
+ [59] G. B. Whitham. A general approach to linear and non-linear dispersive waves using a La-
2205
+ grangian. J. Fluid Mech., 22(2):273–283, 1965.
2206
+ [60] G. B. Whitham. Non-Linear Dispersive Waves. Proc. Roy. Soc. Lond. A, 283(1393):238–261,
2207
+ 1965.
2208
+ [61] G. B. Whitham. Non-linear dispersion of water waves. J. Fluid Mech., 27(2):399–412, 1967.
2209
+ [62] G. B. Whitham. Variational methods and applications to water waves. Proc. Roy. Soc. Lond.
2210
+ A, 299:6–25, 1967.
2211
+ [63] J. R. Wilton. On ripples. Phil. Mag. Ser. 6, 29(173):688–700, 1915.
2212
+ [64] X. Yang, F. Dias, Z. Liu, and S. Liao. Finite-amplitude steady-state resonant waves in a
2213
+ circular basin. J. Fluid Mech., 915:A136, 2021.
2214
+ 31
2215
+
8NA0T4oBgHgl3EQfOf_i/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
8dFQT4oBgHgl3EQfIDXU/content/tmp_files/2301.13251v1.pdf.txt ADDED
@@ -0,0 +1,1494 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Bohm - de Broglie Cycles
2
+ To my beloved Izabel
3
+ Olivier Piguet∗
4
+ January 30, 2023
5
+ Abstract
6
+ In the de Broglie-Bohm quantum theory, particles describe trajectories determined
7
+ by the flux associated with their wave function. These trajectories are studied here for
8
+ relativistic spin-one-half particles. Based in explicit numerical calculations for the case of
9
+ a massless particle in dimension three space-time, it is shown that if the wave function
10
+ is an eigenfunction of the total angular momentum, the trajectories begin as circles of
11
+ slowly increasing radius until a transition time at which they tend to follow straight lines.
12
+ Arrival times at some detector, as well as their probability distribution are calculated,
13
+ too. The chosen energy and momentum parameters are of the orders of magnitude met
14
+ in graphene’s physics.
15
+ Keywords: Bohm - de Broglie, Quantum Mechanics, Transport properties, Graphene.
16
+ 1
17
+ Introduction
18
+ Since its beginning in the first decades of XXth century [3]-[9] Quantum Mechanics and its
19
+ extension in the form of Quantum Field Theory led to an accurate description of atomic and
20
+ subatomic phenomena, confirmed in an extraordinarily precise way by countless experiments.
21
+ However, there is no such a broad consensus about its interpretation. Various ones are present
22
+ in the literature, such as the Copenhagen [10], the Many-World [11], the Relational [12] or the
23
+ de Broglie-Bohm (dBB) one. We will deal here with the latter interpretation, first proposed by
24
+ Louis de Broglie [6] as the ”Pilot Wave Theory”, later on formulated by David Bohm [13, 14]
25
+ as the ”Ontological Interpretation of Quantum Theory” and finally, critically defended by John
26
+ ∗Pra¸ca Graccho Cardoso, 76/504, 45015-180 Aracaju, SE, Brazil, E-mail: [email protected]
27
+ 1
28
+ arXiv:2301.13251v1 [quant-ph] 30 Jan 2023
29
+
30
+ Bell in a series of papers reproduced in [15]. This interpretation of Quantum Mechanics differs
31
+ essentially from the largely more widespread Copenhagen interpretation by taking particle
32
+ trajectories as elements of reality, i.e., a particle really follows a trajectory, the latter being
33
+ defined by “guying conditions” first proposed by de Broglie. A probabilistic interpretation is
34
+ maintained, but now in the sense of classical statistical mechanics. The trajectory followed by
35
+ a particle is fully defined by giving boundary conditions such as, e.g., the coordinates of its
36
+ initial position. The probability distribution of the particle following a particular trajectory
37
+ is then given by the value of the squared modulus of the wave function taken at the initial
38
+ time and position.
39
+ Since this statistical distribution is equal to the “usual” (Copenhagen)
40
+ quantum probability distribution and in particular satisfies the same conservation conditions,
41
+ mean values of beables1 evolve identically in both interpretations of Quantum Mechanics. On
42
+ the other side, the possibility of observable consequences of the existence of trajectories remains
43
+ an open question. Let us however mention an experimental proposal [17, 18] on the measure
44
+ of the times of arrival at a detector for a particle prepared in some initial state.
45
+ The first aim of the present paper is to introduce the reader to the dBB theory by treat-
46
+ ing simple physical examples. Since the main peculiarity of this interpretation is the factual
47
+ existence of trajectories, some effort will be made in the study of their trajectories, looking for
48
+ situations in which dBB could make a difference.
49
+ The dBB trajectories we will calculate are those of a relativistic2, massive or massless, spin
50
+ one half particle in dimension 3 space-time. Its quantum state will be supposed to be described
51
+ by an eigenfunction of the total angular momentum J defined relatively to some space point3.
52
+ Stationary as well as packets of stationary wave functions will be considered. The main result
53
+ for the latter is that the dBB trajectories consist of an initial phase of quasi circles whose
54
+ radius increases till a critical time at which the trajectory begins tending to a straight line –
55
+ the straight line expected for a classical particle with definite angular momentum.
56
+ The paper begins in Section 2 with an introduction to the dBB formalism and in Section
57
+ 3 for its application to the relativistic spin one half particle described by the Dirac equation.
58
+ Numerical computations of dBB trajectories and arrival times for electrons in the context of
59
+ graphene’s transport properties are presented in Section 3.3. Final considerations are given in
60
+ the Conclusion Section.
61
+ Most analytic and numerical calculations are made with the help of the software Mathe-
62
+ matica [22].
63
+ 1Following John Bell [16], I use here the term ”beable“ , instead of the usual term “observable” which is
64
+ somewhat related to the Copenhagen interpretation and to its postulate of the “wave function reduction”.
65
+ 2Only the theory of a single particle is considered here. See [2, 19, 20] for a discussion of the N-particle
66
+ relativistic case.
67
+ 3See [21] for the calculation of such states in the case of the non-relativistic free particle.
68
+ 2
69
+
70
+ 2
71
+ Summary of the de Broglie-Bohm theory
72
+ In the ”usual” (i.e., Copenhagen) interpretation of Quantum Mechanics [10], the state of a
73
+ physical system constituted of a single particle is described, in the Schr¨odinger picture, by a
74
+ wave equation
75
+ iℏ∂ψ(x, t)
76
+ ∂t
77
+ = ˆHψ(x, t),
78
+ (2.1)
79
+ where ˆH is a self-adjoint partial derivative operator acting on a N-components wave function
80
+ ψ(x, t) =
81
+
82
+
83
+ ψ1(x, t)
84
+ · · ·
85
+ ψN(x, t)
86
+
87
+ � ,
88
+ (2.2)
89
+ belonging to a Hilbert space, with scalar product and norm defined by4
90
+ ⟨ψ|Φ⟩ =
91
+
92
+ Rdddx ψ†(x, t)φ(x, t) =
93
+
94
+ Rdddx
95
+ N
96
+
97
+ α=1
98
+ ψ∗
99
+ αφα(x, t),
100
+ ||ψ|| = ⟨ψ|ψ⟩
101
+ 1
102
+ 2 .
103
+ (2.3)
104
+ x = (xi, i = 1, · · · , d) are the space coordinates, d the space dimension and †, ∗ denote the
105
+ hermitian and complex conjugate, respectively. The number of components, N, depends on the
106
+ particle’s spin and on the space dimension d. E.g., N = 1 for a scalar (spin 0) particle, N = 2
107
+ for a non-relativistic particle of spin 1/2 in any dimension, N = 2 for a relativistic particle of
108
+ spin 1/2 in 2 dimensions, N = 4 for the same in 3 dimensions, etc [23].
109
+ The wave equation (2.1) implies the existence of a non-negative density
110
+ ρ(x, t) = ψ†(x, t)ψ(x, t),
111
+ (2.4)
112
+ and an associate d-current density5 j(x, t) obeying a continuity equation
113
+ ∂tρ + ∇j = 0,
114
+ (2.5)
115
+ which assures the constancy of the norm defined in (2.3). Normalizing the norm to 1, one
116
+ interprets ρ as a probability density and j as a probability flux.
117
+ In the Copenhagen theory, the state of the system is completely characterized by the wave
118
+ function ψ, solution of the wave equation (2.1), with an arbitrarily given initial wave function
119
+ ψ(x, 0) = ψ0(x). The de Broglie-Bohm (dBB) theory completes the characterization of the
120
+ state of the system by postulating the existence of a trajectory of the system (the particle,
121
+ here), determined by the de Broglie “guidance conditions” [6] for the particle’s velocity
122
+ v(x, t) = j(x, t)/ρ(x, t),
123
+ (2.6)
124
+ 4This holds e.g., for a non-relativistic particle in general, or a spin 1/2 relativistic one. We do not consider
125
+ here cases such as the relativistic spin zero particle described by the Klein-Gordon equation.
126
+ 5Its explicit form will be given below for the cases studied there.
127
+ 3
128
+
129
+ the dBB trajectory xB(x0, t) being then a solution of the set of differential of equations
130
+ ∂xB(x0, t)
131
+ ∂t
132
+ = v(xB(x0, t), t),
133
+ (2.7)
134
+ with an arbitrarily given initial position xB(x0, 0) = x0. In other word, the possible trajectories
135
+ are the integral lines of the dBB vector field v(x, t), labelled by their initial position x0. Since
136
+ the flux j and the density ρ turn out to be bilinear in ψ and ψ† (see later on), the dBB
137
+ trajectories do not depend on the “intensity” of the wave function, but only on its “form”.
138
+ Recall that, in the quantum probabilistic interpretation of Copenhagen, the density ρ repre-
139
+ sents the probability of experimentally finding the particle at a given place at a given time. On
140
+ the other hand, the dBB theory treats this density in a more “classical statistical mechanics”
141
+ way: Trajectories “really happen”, and their probability distribution, which amounts to the
142
+ probability distribution of their initial positions x0, is given [24] by the density ρ(x0, 0). The
143
+ latter represents our lack of knowledge of the precise initial position. Thanks to the continuity
144
+ equation (2.5), the probability for the particle being inside a co-moving volume6 V (t) is con-
145
+ stant in time, which sustains this statistical interpretation, called “thermal equilibrium” in the
146
+ literature [24].
147
+ Such a formulation is called a theory with “hidden variables”, the hidden variables of the
148
+ present one being, e.g., the components of the initial position x0.
149
+ A heuristic justification for the guiding condition (2.6) may be found in analogy with fluid
150
+ mechanics, considering ρ and v as the fluid mass density and velocity field, respectively. With
151
+ j = ρv, Eq. (2.5) has the form of the continuity equation expressing the conservation of the
152
+ fluid mass.
153
+ Now, granted the existence of a trajectory, one can define properties of the particle along
154
+ it, such as energy, spin, etc. , in the following way. First, given an “observable” A represented
155
+ by a self-adjoint operator ˆA, one defines the associated beable field (See footnote 1)
156
+ A(x, t) = ψ†(x, t) ˆA ψ(x, t)/ρ(x, t),
157
+ (2.8)
158
+ where ρ is the probability density (2.4). One then defines the instantaneous value of A, i.e., its
159
+ value when the particle is at point xB(x0, t) at time t:
160
+ AB(x0, t) = A(xB(x0, t), t).
161
+ (2.9)
162
+ Note that these definitions are independent of the normalization of the wave function. Their
163
+ justification is obvious in the case of ˆA being the multiplication by a function fA(x, t), since
164
+ in this case A(x, t) = fA(x, t). For the general case, including that of a matricidal and/or
165
+ differential operator, one derives from (2.8) the identity
166
+
167
+ ddx ρ(x, t)A(x, t) =
168
+
169
+ ddx ψ†(x, t) ˆA ψ(x, t) = ⟨A⟩ (t).
170
+ (2.10)
171
+ 6I.e., a volume whose boundary points move along the dBB trajectories.
172
+ 4
173
+
174
+ The first integral is an expectation value in the dBB theory sense, i.e., in the “classical statisti-
175
+ cal mechanical” sense, whereas the second one gives it in the conventional quantum mechanical
176
+ sense. Their equality indeed shows the equivalence of both theories for what concerns expecta-
177
+ tion values of observables.
178
+ To summarize, the dBB theory proposes the existence of:
179
+ 1. A wave function or ”guidance field” (2.2), solution of the Schr¨odinger-like wave equation
180
+ (2.1).
181
+ 2. A statistical ensemble of particle’s trajectories xB(x0, t) as the integral lines of the dBB
182
+ vector field (2.6), solutions of the differential equations (2.7) parametrized by the value
183
+ of the initial position.
184
+ 3. Beable fields and beable instantaneous values, defined by (2.8) and (2.9). Such beables
185
+ may be energy, momentum, angular momentum, spin, etc.
186
+ All considerations made in this subsection generalize easily to systems of N particles, x
187
+ denoting a point of the d × N dimensional configuration space7.
188
+ 3
189
+ Free relativistic spin one half particle in 3-dimensional
190
+ space-time
191
+ 3.1
192
+ Dirac equation
193
+ A free, spin 1/2 relativistic particle of mass m in 3-dimensional space-time is described in the
194
+ usual theory by a 2-components spinor wave function
195
+ ψ(x) =
196
+ � ψ1(x)
197
+ ψ2(x)
198
+
199
+ ,
200
+ (3.1)
201
+ solution of the free Dirac equation
202
+ iℏcγµ∂µψ(x) − mc2ψ(x) = 0,
203
+ (3.2)
204
+ where x = (xµ, µ = 0, 1, 2) are the space-time coordinates space-time, whose metric is ηµν =
205
+ diag(1, −1, −1). The Dirac matrices obey the anticommutation rules {γµ, γν} = 2ηµν. Our
206
+ choice for them is given in Appendix A. c, ℏ are the speed of light and the reduced Planck
207
+ constant, respectively. The Dirac equation may be cast in the form8 of (2.1):
208
+ iℏ∂ψ(x, t)
209
+ ∂t
210
+ = ˆHψ(x, t),
211
+ (3.3)
212
+ 7At least in the non-relativistic case. See footnote 2.
213
+ 8In fact Dirac’s original form, reduced to 3 space-time dimensions.
214
+ 5
215
+
216
+ with
217
+ ˆH = −iℏc αi∂i + mc2 β,
218
+ (3.4)
219
+ with αi = γ0γi and β = γ0 (see Appendix A). The density and the flux obeying the continuity
220
+ equation (2.5) are given by
221
+ ρ = ψ†ψ,
222
+ ji = c ψ†αiψ.
223
+ (3.5)
224
+ The theory is relativistic: cρ and ji are the time and space components of the space-time
225
+ 3-vector jµ = ¯ψγµψ, and the continuity equation reads ∂µjµ = 0.
226
+ Another relativistic object is the scalar density
227
+ σ(x, t) = 1
228
+ 2
229
+ ¯ψψ = 1
230
+ 2ψ†βψ.
231
+ (3.6)
232
+ jµ and σ fulfil the identity
233
+ jµjµ = 4σ2,
234
+ (3.7)
235
+ consequence of the Pauli matrices identity
236
+ 3
237
+
238
+ i=1
239
+ σi
240
+ αβσi
241
+ γδ = 2δαδδβγ − δαβδγδ.
242
+ (3.8)
243
+ Let us go now to the dBB theory. The identity (3.7) allows one to define the time-like 3-velocity
244
+ field’
245
+ uµ = jµ
246
+ 2|σ|,
247
+ uµuµ = 1,
248
+ u0 > 0.
249
+ (3.9)
250
+ The relativistic form of the dBB guidance equation (2.7) then reads9
251
+ dxµ(λ)
252
+
253
+ = uµ(x(λ)),
254
+ (3.10)
255
+ with λ as curve’s parameter. This equation is equivalent to (2.7) and defines the space-time
256
+ trajectories of the particle.
257
+ In the same way as one defines the dBB velocity field (2.6) or (3.9), one can define a dBB
258
+ spin field
259
+ S(x, t) = ℏ σ(x, t)/ρ(x, t),
260
+ (3.11)
261
+ which takes values between −ℏ/2 and ℏ/2. The beable S(x, t) can thus be interpreted as the
262
+ field associated to the spin operator
263
+ ˆS = ℏ
264
+ 2σz,
265
+ (3.12)
266
+ according to the definition (2.8). Note that, in the instantaneous rest frame of the particle
267
+ guided by the wave, where vi = ji = 0, the identity (3.7) implies S = ±ℏ/2, in agreement with
268
+ the interpretation of S as the intrinsic angular momentum of a spin one half particle. One then
269
+ gets the instantaneous spin of the particle according to (2.9):
270
+ SB(x0, t) = S(xB(x0, t), t).
271
+ (3.13)
272
+ 9The present discussion is the reduction to 3-dimensional space-time of the one made by [1, 2] in 4 dimensions.
273
+ 6
274
+
275
+ 3.2
276
+ Eigenstates of the angular momentum and of the energy
277
+ We will look for the solutions of the Dirac equation which are eigenfunctions of the total angular
278
+ momentum and Hamiltonian operators. It will be useful to work in polar coordinates r, φ:
279
+ x = r cos φ,
280
+ y = r sin φ.
281
+ In these coordinates, the Hamiltonian operator (3.4) reads
282
+ ˆH = −iℏc
283
+ ��
284
+ α1 cos φ + α2 sin φ
285
+
286
+ ∂r + 1
287
+ r
288
+
289
+ α2 cos φ − α1 sin φ
290
+
291
+ ∂φ
292
+
293
+ + mc2β.
294
+ (3.14)
295
+ One easily checks, using the algebra of the Pauli matrices, that the total angular momentum
296
+ operator with respect to the origin, which has a single component in the two-dimensional space’s
297
+ case,
298
+ ˆJ = −iℏ∂φ + ℏ
299
+ 2β,
300
+ (3.15)
301
+ commutes with the Hamiltonian operator. Spinor eigenfunctions of ˆJ with eigenvalue j are
302
+ readily found to be of the form
303
+ ψ(r, φ, t) =
304
+ � ei(j− 1
305
+ 2 )φf1(r, t),
306
+ ei(j+ 1
307
+ 2 )φf2(r, t)
308
+
309
+ .
310
+ (3.16)
311
+ One directly sees that the uniformity of the wave function requires j to be half-integer. With
312
+ the result (3.16), solving the Dirac equation (3.2) amounts to solving the two radial equations
313
+ for the functions f1(r, t) and f2(r, t):
314
+ i��
315
+
316
+ r (∂tf1 + c ∂rf2) + c(j + 1
317
+ 2) f2
318
+
319
+ − mc2r f1 = 0,
320
+ iℏ
321
+
322
+ r (∂tf2 + c ∂rf1) − c(j − 1
323
+ 2) f1
324
+
325
+ + mc2r f2 = 0.
326
+ (3.17)
327
+ In terms of the radial functions fα, the probability density ρ, the flux j and the scalar density
328
+ σ defined by (3.5), (3.6) read:
329
+ ρ(r, t) = |f1(r, t)|2 + |f2(r, t)|2,
330
+ jx(r, φ, t) = c
331
+
332
+ eiφf ∗
333
+ 1(r, t)f2(r, t) + e−iφf ∗
334
+ 2(r, t)f1(r, t)
335
+
336
+ ,
337
+ jy(r, φ, t) = ic
338
+
339
+ −eiφf ∗
340
+ 1f2(r, t) + e−iφf ∗
341
+ 2(r, t)f1(r, t)
342
+
343
+ ,
344
+ σ(r, t) = 1
345
+ 2 (|f1(r, t)|2 − |f2(r, t)|2) .
346
+ (3.18)
347
+ ρ and σ, as well as the radial and azimuthal components of the flux j,
348
+ jr(r, t) = cos φ jx(r, φ, t) + sin φ jy(r, φ, t) = c (f ∗
349
+ 1(r, t)f2(r, t) + f ∗
350
+ 2(r, t)f1(r, t)) ,
351
+ jφ(r, t) = − sin φ jx(r, φ, t) + cos φ jy(r, φ, t) = ic (−f ∗
352
+ 1(r, t)f2(r, t) + f ∗
353
+ 2(r, t)f1(r, t)) ,
354
+ (3.19)
355
+ turn out to be independent of the angular coordinate.
356
+ 7
357
+
358
+ 3.2.1
359
+ Instantaneous values of energy, spin and orbital angular momentum
360
+ Before going to our main task, i.e., the concrete study of the dBB trajectories, let us look at
361
+ the expressions of the instant values of energy, spin and orbital angular momentum, namely
362
+ EB(x0, t), SB(x0, t) and LB(x0, t) along a dBB trajectory xB(x0, t) fixed by the initial position
363
+ x0. They are generated by the corresponding fields E(x, t), S(x, t) and L(x, t) according to
364
+ (2.9). One obtains
365
+ E(x, t) = ψ†(x, t) ˆHψ(x, t)/ρ(x, t) = iℏ(f ∗
366
+ 1(r, t)∂tf1(r, t) + f ∗
367
+ 2(r, t)∂tf2(r, t))/ρ(r, t),
368
+ EB(x0, , t) = E(xB(x0, t), t),
369
+ (3.20)
370
+ where f1, f2 are the radial components defined by (3.16)
371
+ and ˆH is the Hamilton operator, the validity of the Schr¨odinger-like equation (2.1) being
372
+ assumed;
373
+ S(x, t) = ψ†(x, t) ˆSψ(x, t)/ρ(x, t) = 1
374
+ 2(f ∗
375
+ 1(r, t)f1(r, t) − f ∗
376
+ 2(r, t)f2(r, t))/ρ(r, t),
377
+ SB(x0, t) = S(xB(x0, t), t),
378
+ (3.21)
379
+ where ˆS is the spin operator (3.12);
380
+ L(x, t) = ψ†(x, t)ˆLψ(x, t)/ρ(x, t) = ℏ(j − S(x, t)),
381
+ LB(x0, t) = L(xB(x0, t), t) = ℏ(j − S(x0, t)),
382
+ (3.22)
383
+ where ˆL is the orbital angular momentum operator (in Cartesian and polar coordinates)
384
+ ˆL = −i (x∂y − y∂x) = −iℏ ∂φ.
385
+ (3.23)
386
+ Use has been made in (3.22) of the fact that ˆL = ˆJ − ˆS and of the wave function being an
387
+ eigenfunction of the total angular momentum ˆJ with eigenvalue j.
388
+ 3.2.2
389
+ Stationary solutions:
390
+ Since the Hamiltonian (3.14) and the total angular momentum (3.15) commute, we can impose
391
+ the stationarity condition
392
+ ˆHψ = ℏωp ψ.
393
+ (3.24)
394
+ Thus the radial wave functions fα(r, t) take the form
395
+ f p, stat
396
+ α
397
+ (r, t) = e−iωpt hp, stat
398
+ α
399
+ (r),
400
+ α = 1, 2,
401
+ (3.25)
402
+ ℏωp being the energy of the stationary state. This leads to a pair of equations for the function
403
+ hp, stat
404
+ α
405
+ (r), derived from (3.17) by substituting i∂t by ωp. The general solution of these equa-
406
+ tions is a superposition of the Bessel functions of the first and second kind, Jj±1/2(pr/ℏ) and
407
+ Yj±1/2(pr/ℏ), with p a function of ωp defined as the positive solution for p of
408
+ ωp = 1
409
+
410
+
411
+ m2c4 + p2c2.
412
+ (3.26)
413
+ 8
414
+
415
+ Square integrability of the wave function at r = 0 leads us to discard the solutions involving
416
+ Yj±1/2 because of the latter’s singularity at the origin (see (B.3) in Appendix B). The regular
417
+ solution thus is
418
+ hp, stat
419
+ 1
420
+ (r) = icp Jj−1/2(pr/ℏ),
421
+ hp, stat
422
+ 2
423
+ (r) = −(ℏωp − mc2)Jj+1/2(pr/ℏ).
424
+ (3.27)
425
+ The general stationary solution of the Dirac equation for angular momentum eigenstates, non-
426
+ singular at the origin, then reads
427
+ ψp, stat(r, φ, t) =
428
+
429
+ � ei(j− 1
430
+ 2 )φf p, stat
431
+ 1
432
+ (r, t),
433
+ ei(j+ 1
434
+ 2 )φf p, stat
435
+ 2
436
+ (r, t)
437
+
438
+
439
+ = e−iωpt
440
+
441
+ icp ei(j−1/2)φJj−1/2(pr/ℏ),
442
+ −(ℏωp − mc2)ei(j+1/2)φJj+1/2(pr/ℏ)
443
+
444
+ ,
445
+ (3.28)
446
+ with ωp given by (3.26). These spinors form a basis for the solutions of the Dirac equation,
447
+ however an improper one since they are not square integrable due to the asymptotic behaviour
448
+ of the Bessel functions shown in (B.4) of Appendix B.
449
+ We can nevertheless apply the dBB guidance principle, expressed in Eqs, (2.6) and (2.7),
450
+ to such a basis element. From the result (3.28) we can compute explicitly the density ρ given
451
+ in (3.18):
452
+ ρp, stat(r) = c2p2J2
453
+ j−1/2(pr/ℏ) + (ℏωp − mc2)2J2
454
+ j+1/2(pr/ℏ),
455
+ (3.29)
456
+ as well as the flux components (3.19) which, divided through ρ according to the dBB condition,
457
+ yields the radial and azimuthal components of the velocity vector field:
458
+ vp, stat
459
+ r
460
+ (r) = 0
461
+ vp, stat
462
+ φ
463
+ (r) = 2c
464
+ cp(ℏωp − mc2)Jj−1/2(pr/ℏ)Jj+1/2(pr/ℏ)
465
+ (cp)2J2
466
+ j−1/2(pr/ℏ) + (ℏωp − mc2)2J2
467
+ j+1/2(pr/ℏ).
468
+ (3.30)
469
+ Obviously all these expressions are time independent due to the stationarity condition. One sees
470
+ that the radial component of the velocity field is vanishing and that its azimuthal component
471
+ does not depend on the polar angle. Thus the dBB trajectories of the particle, defined as the
472
+ integral curves of the velocity vector field, are circles of radius r centred at the origin travelled
473
+ at a constant velocity vφ and whose radius dependent value is bounded by c, in the massive
474
+ as well as in the massless case. In all cases the bound c is effectively reached, for a discrete
475
+ set of values of the radius. Fig. 1 in Subsection 3.3 shows a typical behaviour of the azimuthal
476
+ velocity vp, stat
477
+ φ
478
+ (r) in the massless particle’s case.
479
+ One may observe that, in the massless case, in which ℏωp = pc, changing the sign of the
480
+ total angular momentum implies a change of sign of the velocity field: vp, stat
481
+ φ
482
+ (r) → −vp, stat
483
+ φ
484
+ (r),
485
+ hence of the orientation of the trajectories. However this does not hold for the massive case,
486
+ and also not for the more general wave packets examined in Subsection (3.2.3).
487
+ 9
488
+
489
+ 3.2.3
490
+ Gaussian wave packet
491
+ The general solution of the Dirac equation for angular momentum eigenstates, non-singular at
492
+ the origin, reads
493
+ ψ(x, t) =
494
+ � ∞
495
+ 0
496
+ dp a(p)ψp, stat(x, t),
497
+ (3.31)
498
+ where ψp, stat is the stationary solution (3.28) of energy10 ℏωp given by (3.26), and the amplitude
499
+ a(p) is an arbitrary complex function, but constrained by the requirement of ψ(x, t) to be a
500
+ square integrable function of x.
501
+ The angular momentum eigenstates we will consider in the following are described by the
502
+ spinor wave functions of the form (3.31), with a(p) the Gaussian amplitude
503
+ a(p) = √p e
504
+ −(p − p0)2
505
+ 2Σ2
506
+ .
507
+ (3.32)
508
+ Here and in the rest of this paper we consider only positive energy solutions of the Dirac
509
+ equations.
510
+ 3.2.4
511
+ Mean values
512
+ We recall that mean values of observables obtained from the dBB or from the Copenhagen
513
+ theory coincide.
514
+ The wave functions (3.31) are normalizable and we can calculate the square norm ||ψ||2 in
515
+ the following way:
516
+ ∥ψ∥2 =
517
+ � 2π
518
+ 0
519
+
520
+ � ∞
521
+ 0
522
+ dr r ρ(r, t),
523
+ with ρ(r, t) the density (3.5). From (3.31) we get
524
+ ∥ψ∥2 = 2π
525
+ � ∞
526
+ 0
527
+ dr r
528
+ � ∞
529
+ 0
530
+ dp
531
+ � ∞
532
+ 0
533
+ dp′ a(p)a(p′)
534
+ 2
535
+
536
+ α=1
537
+ f p, stat
538
+ α
539
+ (r, t)∗f p′, stat
540
+ α
541
+ (r, t)
542
+ = 2π
543
+ � ∞
544
+ 0
545
+ dp
546
+ � ∞
547
+ 0
548
+ dp′ a(p)a(p′)ei(ωp−ωp′)
549
+ � ∞
550
+ 0
551
+ dr r
552
+
553
+ (mc2 + ℏωp)(mc2 + ℏωp′)Jj−1/2(pr/ℏ)Jj−1/2(pr′/ℏ) + ℏ2pp′Jj+1/2(pr/ℏ)Jj+1/2(pr′/ℏ)
554
+
555
+ .
556
+ From (3.32) and the completeness identity [25] for the Bessel functions:
557
+ � ∞
558
+ 0
559
+ dr r Jl(kr)Jl(k′r) = 1
560
+ kδ(k − k′),
561
+ one gets
562
+ ∥ψ∥2 = 2πℏ2
563
+ � ∞
564
+ 0
565
+ dp 1
566
+ pa2(p)
567
+
568
+ c2p2 + (ℏωp − mc2)2�
569
+ .
570
+ (3.33)
571
+ 10We restrict to positive energy contributions.
572
+ 10
573
+
574
+ In the same way one establishes expressions for the mean energy:
575
+ ⟨E⟩ =
576
+ � 2π
577
+ 0
578
+
579
+ � ∞
580
+ 0
581
+ dr r ψ†(r, φ, t) ˆH ψ(r, φ, t) / ∥ψ∥2,
582
+ where ˆH is the Hamiltonian operator (3.4), and for the standard energy deviation
583
+ ∆E =
584
+
585
+ ⟨E2⟩ − ⟨E⟩2.
586
+ The result is
587
+ ⟨E⟩ = 2πℏ2
588
+ ∥ψ∥2
589
+ � ∞
590
+ 0
591
+ dp 1
592
+ pa2(p)
593
+
594
+ c2p2 + (ℏωp − mc2)2�
595
+ ℏωp,
596
+ ∆E =
597
+ �2πℏ2
598
+ ∥ψ∥2
599
+ � ∞
600
+ 0
601
+ dp 1
602
+ pa2(p)
603
+
604
+ c2p2 + (ℏωp − mc2)2�
605
+ (ℏωp)2 − ⟨E⟩2
606
+ � 1
607
+ 2
608
+ .
609
+ (3.34)
610
+ Finally, a computation of the mean value of the spin operator (3.12) yields
611
+ ⟨S⟩ = πℏ3
612
+ ∥ψ∥2
613
+ � ∞
614
+ 0
615
+ dp 1
616
+ pa2(p)
617
+
618
+ −c2p2 + (ℏωp − mc2)2�
619
+ .
620
+ (3.35)
621
+ Substituting ∥ψ∥2 in the denominator by its expression (3.33), one sees that this mean value
622
+ obeys the bounds −ℏ/2 < ⟨S⟩ < ℏ/2.
623
+ All these integrals can be computed analytically in the massless case m = 0 for the amplitude
624
+ given by (3.32). One gets
625
+ ∥ψ∥2 = πℏ2c2Σ3 �√π(1 + 2z2)(1 + erf(z)) + 2ze−z2�
626
+ ,
627
+ ⟨E⟩ = cp0
628
+ √πz(3 + 2z2) (1 + erf(z)) + 2(1 + z2)e−z2
629
+ z(√π(1 + 2z2)(1 + erf(z)) + 2ze−z2)
630
+ ,
631
+ (3.36)
632
+ ∆E = cp0
633
+
634
+ π(3 + 4z4)(1 + erf(z))2 + 8√πz(−1 + z2)(1 + erf(z))e−z2 + 4(−2 + z2)e−2z2
635
+ 2z2(π(1 + 2z2)2(1 + erf(z))2 + 4√πz(1 + 2z2)(1 + erf(z))e−z2 + 4z2e−2z2)
636
+ (3.37)
637
+ where we have set
638
+ z = p0
639
+ Σ ,
640
+ (3.38)
641
+ and erf(z) is the error function [26].
642
+ Finally, the mean spin is null in this massless case:
643
+ ⟨S⟩ = 0,
644
+ (3.39)
645
+ 11
646
+
647
+ which implies ⟨L⟩ = ℏj for the orbital angular momentum since the states considered are
648
+ eigenstates of the total angular momentum with eigenvalue ℏj. Associated to this mean orbital
649
+ angular momentum, we can define an L-radius
650
+ rL = ⟨L⟩
651
+ ⟨p⟩ = c ℏ j
652
+ ⟨E⟩ ,
653
+ (3.40)
654
+ where ⟨p⟩ is the mean value of the momentum p, equal to ⟨E⟩ /c in the present massless
655
+ case. This definition mimics the classical relation between angular momentum and radius for
656
+ a uniform circular motion.
657
+ As one may expect, in the case of a very narrow width of the amplitude (3.32), i.e., z ≫ 1,
658
+ the energy and the energy uncertainty approximate to the values
659
+ ⟨E⟩ ≃ cp0,
660
+ ∆E ≃
661
+ c
662
+
663
+ 2Σ.
664
+ (3.41)
665
+ The results (3.34) and (3.35) allow us to identify the expression
666
+ ˜ρ(p) = a2(p)c2p2 + (ℏωp − mc2)2
667
+ p2
668
+ (3.42)
669
+ up to a due normalization, as the probability density in p-space, conjugate to the x-space
670
+ probability defined in (3.5).
671
+ 3.3
672
+ j - electrons in graphene
673
+ Let us denote free electrons in eigenstates of the total angular momentum with eigenvalue j as
674
+ “j-electrons”. Free electrons in monolayer graphene [27] with energy less than Ecrit ≈ 160 meV
675
+ obey approximatively a relativistic-like massless dispersion law E ≈ p c, where p is the linear
676
+ momentum and the “velocity of light”11 c ≈ 106 m s−1. The dynamics of these electron is that
677
+ of free massless particles in dimension three space-time with pseudo-spin 1/2 obeying the Dirac
678
+ equation (3.2) with m = 0 [28]. Pseudo-spin is a chirality effect due to the peculiar crystalline
679
+ structure of graphene and should not be confused with the usual spin. Nevertheless, since the
680
+ wave function obeys the Dirac equation (3.2), the pseudo-spin adds itself to the orbital angular
681
+ momentum yielding the conserved total angular momentum j (3.15) as explained in Subsection
682
+ 3.2.
683
+ We will consider first stationary states and then states defined by Gaussian-like wave pack-
684
+ ets. Conventions and units used in the following are described in Appendix A.
685
+ 3.3.1
686
+ Stationary states in graphene
687
+ As already shown in Subsection 3.2.2, the dBB trajectories associated to the stationary wave
688
+ functions (3.28) are circles centred at the origin, travelled at a constant dBB velocity vp, stat
689
+ φ
690
+ 11This is the so-called critical velocity, which we will denote by c.
691
+ 12
692
+
693
+ 20
694
+ 40
695
+ 60
696
+ 80
697
+ 100
698
+ r
699
+ 1000
700
+ 2000
701
+ 3000
702
+ ρp,stat (r)
703
+ 20
704
+ 40
705
+ 60
706
+ 80
707
+ 100
708
+ r
709
+ -1.0
710
+ -0.5
711
+ 0.5
712
+ 1.0
713
+
714
+ p,stat (r)/c
715
+ Figure 1: Stationary case: density ρp, stat(r) and azimuthal velocity vp, stat
716
+ φ
717
+ (r)/c for j = 5/2,
718
+ p = 10−4 meV/c (E = 100 meV).
719
+ j
720
+ 1/2
721
+ 3/2
722
+ 5/2
723
+ 7/2
724
+ 9/2
725
+ 11/2
726
+ 13/2
727
+ 15/2
728
+ 17/2
729
+ αj
730
+ 0
731
+ 2.19
732
+ 3.45
733
+ 4.61
734
+ 5.74
735
+ 6.84
736
+ 7.93
737
+ 9.01
738
+ 10.08
739
+ Table 1: Coefficients αj of Eq. (3.45) in function of the angular momentum j.
740
+ which depends on the radius r according to (3.30). For m = 0, this velocity reads
741
+ vp, stat
742
+ φ
743
+ (r) = 2c Jj−1/2(pr/ℏ)Jj+1/2(pr/ℏ)
744
+ J2
745
+ j−1/2(pr/ℏ) + J2
746
+ j+1/2(pr/ℏ).
747
+ (3.43)
748
+ The dBB velocity value oscillates between −c and c. A typical behaviour, in function of the
749
+ radius, of the probability density and of the dBB velocity, which depend on the energy E = c p
750
+ and on the angular momentum j, is shown in Fig. 1 for j = 5/2 and E = 100 meV. The most
751
+ probable radius ˆrj, is given by the position of the first maximum of the probability density
752
+ ρp, stat (3.29) (See Fig. 1), which for m = 0 reads
753
+ ρp, stat(r) = c2p2 �
754
+ J2
755
+ j−1/2(pr/ℏ) + J2
756
+ j+1/2(pr/ℏ)
757
+
758
+ .
759
+ (3.44)
760
+ Since r appears in the combination pr/ℏ, the most probable radius ˆrj may be written as a
761
+ function of p:
762
+ ˆrj(p) = αj
763
+
764
+ p,
765
+ (3.45)
766
+ the j-dependent coefficients αj being shown in Table 1 for some values of j. These results can
767
+ be taken as an approximation for the more realistic case of a wave packet with a very small
768
+ energy width.
769
+ 13
770
+
771
+ 0.002
772
+ 0.004
773
+ 0.006
774
+ 0.008
775
+ 0.010
776
+ t
777
+ 40
778
+ 60
779
+ 80
780
+ 100
781
+ 120
782
+ rB
783
+ (a)
784
+ 0.002
785
+ 0.004
786
+ 0.006
787
+ 0.008
788
+ 0.010
789
+ t
790
+ -250
791
+ -200
792
+ -150
793
+ -100
794
+ -50
795
+ ϕB
796
+ (b)
797
+ -50
798
+ 50
799
+ xB
800
+ -50
801
+ 50
802
+ 100
803
+ yB
804
+ (c)
805
+ Figure 2: The most probable dBB tractory xB(ˆr0, t) for Gaussian wave packet parameters
806
+ j = 5/2, p0 = 10−4 meV/c (Peak energy E0 = 100 meV), and Σ = 10−7 meV/c.
807
+ This
808
+ trajectory is fixed by the initial condition parameter = ˆr0 = 22.7. ˆr0 is the position of the peak
809
+ of the probability density ρ at t = 0 (the blue point in Fig. 4a.)
810
+ (a) Radial coordinate rB(ˆr0, t).
811
+ (b) Azimuthal coordinate φB(ˆr0t).
812
+ (c) dBB trajectory in the (x, y) plane for 0 ≤ t ≤ 0.010 ns. The trajectory performs 38 loops
813
+ before the critical time (decay time) τ ∼ 0.006 ns.
814
+ 14
815
+
816
+ 0.002 0.004 0.006 0.008 0.010 0.012 0.014
817
+ t
818
+ 500
819
+ 1000
820
+ 1500
821
+ rB
822
+ (a)
823
+ 0.002 0.004 0.006 0.008 0.010 0.012 0.014
824
+ t
825
+ -250
826
+ -200
827
+ -150
828
+ -100
829
+ -50
830
+ ϕB
831
+ (b)
832
+ 500
833
+ 1000
834
+ 1500
835
+ xB
836
+ -100
837
+ 100
838
+ 200
839
+ 300
840
+ 400
841
+ 500
842
+ yB
843
+ (c)
844
+ Figure 3: dBB tractories for Gaussian wave packet: same parametrization as in Fig. 2, but
845
+ with the larger time scale 0 ≤ t ≤ 0.015 ns.
846
+ 3.3.2
847
+ Gaussian wave packets in graphene
848
+ We turn now to the Gaussian wave functions defined by (3.31) and (3.32), which are normal-
849
+ izable. We shall denote by
850
+ xB(r0, t) = (rB(r0, t), φB(r0, t)) ,
851
+ 20
852
+ 40
853
+ 60
854
+ 80
855
+ 100
856
+ r0
857
+ 5.×10-7
858
+ 1.×10-6
859
+ 1.5×10-6
860
+ 2.×10-6
861
+ ρ(r0,0)
862
+ (a)
863
+ 0.002
864
+ 0.004
865
+ 0.006
866
+ 0.008
867
+ 0.010
868
+ 0.012
869
+ t
870
+ 200
871
+ 400
872
+ 600
873
+ 800
874
+ rB
875
+ (b)
876
+ 0.002
877
+ 0.004
878
+ 0.006
879
+ 0.008
880
+ 0.010
881
+ 0.012
882
+ t
883
+ -600
884
+ -500
885
+ -400
886
+ -300
887
+ -200
888
+ -100
889
+ ϕB
890
+ (c)
891
+ 200
892
+ 400
893
+ 600
894
+ 800
895
+ xB
896
+ -300
897
+ -200
898
+ -100
899
+ 100
900
+ yB
901
+ (d)
902
+ Figure 4: dBB tractories for Gaussian wave packet: same parametrization as in Figs. 2 and
903
+ 3, but with five trajectories corresponding to the initial radial positions r0 = 10, 17, 22.7,
904
+ 30 and 35 nm. The respective numbers of trajectory’s closed loops are 93, 66, 38, 10 and 1.
905
+ Their respective relative probabilities are proportional to the heights of the coloured dots in
906
+ the subfigure (a) showing the initial probability density ρ(r0, 0) in function of the initial radial
907
+ position r0.
908
+ 15
909
+
910
+ the (polar) coordinates of the dBB trajectory solution of the trajectory equation (2.7), fixed
911
+ by the initial position
912
+ xB(r0, 0) = (rB(r0, 0), φB(r0, 0) = (r0, 0).
913
+ (3.46)
914
+ We have made explicit, in our notation, the dependence on the trajectory parameter r0.
915
+ Figs. 2 and 3 show the most probable dBB trajectory xB(ˆr0, t) for a particular wave func-
916
+ tion’s parametrization in which the energy dispersion is very small, i.e., Σ ≪ p0.
917
+ “Most
918
+ probable” means that the initial particle’s position parameter ˆr0 is the value of the radial co-
919
+ ordinate r which maximizes the initial probability density ρ(r, 0) This value, equal to 22.7 nm
920
+ in the present example12 corresponds to the blue dot in Fig. 4a. Thus, the behaviour of this
921
+ trajectory, shown by Figs. 2c or 3c in the (x, y)-plane, is very similar to the circular one shown
922
+ in the corresponding stationary solution, but only up to a certain critical “decay time” τobs,
923
+ approximately equal to 0.006 ns in this example. For later times the trajectory tends to a
924
+ straight line, reproducing the expected classical behaviour. This is best observed in Figs. 2b or
925
+ 3b which show the time behaviour of the azimuthal angle φ: the angular velocity is almost con-
926
+ stant until the time τobs, and almost vanishes thereafter. This decay time marks the transition
927
+ from the almost circular regime to an almost straight-way, classical-like, regime.
928
+ A theoretical lower bound for the decay time τ may be computed from the quantum ”time-
929
+ energy uncertainty principle” [29]:
930
+ τ ≥ τmin =
931
+
932
+ 2 ∆E ,
933
+ (3.47)
934
+ where ∆E is the quantum energy uncertainty given by (3.34) taken with m = 0.
935
+ In our
936
+ example, τmin = 0.00465 ns: this is the order of magnitude of the observed decay time for the
937
+ most probable trajectory, τobs ∼ 0.006 nm, and the uncertainty inequality (3.47) is obeyed.
938
+ Table 2 displays, for certain values of the wave parameters p0, Σ and j, quantities of interest
939
+ such as mean energy ⟨E⟩ (3.36), standard energy deviation ∆E (3.37), τmin (3.47), (which are
940
+ usual quantum theory quantities), and also, specifically concerning the most probable dBB
941
+ trajectory, its approximate observed decay time τobs, its L-radius rL (3.40), its initial radial
942
+ coordinate ˆr0 (see (3.46)) which fixes it and the number of closed loops, Nloops,’ it performs
943
+ before passing to the straight-way regime.
944
+ One can make the following remarks about the items of Table 2.
945
+ 1. The mean values ⟨E⟩, ∆E, hence τmin, do not depend on the quantum number j, which is
946
+ obvious from the explicit expressions (3.36) and (3.37). ⟨E⟩ and ∆E tend towards their
947
+ limit values (3.41) as the width Σ becomes narrower, as can be seen in the Table.
948
+ 2. The observed decay time τobs seen in the behaviour of the azimuthal angle φB shown, e.g.,
949
+ in Figs. 4c or 4d, depends on the specific trajectory: it diminishes when the value of the
950
+ 12This value is very near of the one corresponding to the stationary wave function with same j = 5/2 and p
951
+ equal to the momentum parameter p0 = 10−4. Indeed, Eq. (3.45) together with Table 1 yield ˆr= 22.6.
952
+ 16
953
+
954
+ p0( meV
955
+ c
956
+ )
957
+ Σ( meV
958
+ c
959
+ )
960
+ ⟨E⟩ (meV)
961
+ ∆E(meV)
962
+ τmin(ns)
963
+ τobs(ns)
964
+ rL(nm)
965
+ ˆr0(nm)
966
+ Nloops
967
+ j
968
+ 0.3
969
+ 32.91
970
+ 0
971
+ 757
972
+ 1/2
973
+ 10−8
974
+ 10.0000
975
+ 0.00707
976
+ 0.0465
977
+ 0.06
978
+ 164.6
979
+ 227
980
+ 39
981
+ 5/2
982
+ 0.05
983
+ 362.0
984
+ 450
985
+ 20
986
+ 11/2
987
+ 10−5
988
+ 0.05
989
+ 3258.
990
+ 3450
991
+ 3
992
+ 99/2
993
+ 0.001
994
+ 32.59
995
+ 0
996
+ 3
997
+ 1/2
998
+ 10−6
999
+ 10.0995
1000
+ 0.704
1001
+ 0.000468
1002
+
1003
+ 162.9
1004
+ 220
1005
+ < 1
1006
+ 5/2
1007
+
1008
+ 358.4
1009
+ 435
1010
+ < 1
1011
+ 11/2
1012
+
1013
+ 3226.
1014
+ 3250
1015
+ < 1
1016
+ 99/2
1017
+ 0.027
1018
+ 3.291
1019
+ 0
1020
+ 676
1021
+ 1/2
1022
+ 10−7
1023
+ 100.000
1024
+ 0.0707
1025
+ 0.00465
1026
+ 0.006
1027
+ 16.46
1028
+ 22.7
1029
+ 39
1030
+ 5/2
1031
+ 0.006
1032
+ 36.20
1033
+ 45.0
1034
+ 20
1035
+ 11/2
1036
+ 10−4
1037
+ 0.005
1038
+ 325.8
1039
+ 345
1040
+ 3
1041
+ 99/2
1042
+ 0.0001
1043
+ 3.259
1044
+ 0
1045
+ 2
1046
+ 1/2
1047
+ 10−5
1048
+ 100.995
1049
+ 7.04
1050
+ 0.0000468
1051
+
1052
+ 16.29
1053
+ 22.0
1054
+ < 1
1055
+ 5/2
1056
+
1057
+ 35.84
1058
+ 43.5
1059
+ < 1
1060
+ 11/2
1061
+
1062
+ 322.6
1063
+ 325
1064
+ < 1
1065
+ 99/2
1066
+ Table 2: Mean energy ⟨E⟩, standard energy deviation ∆E, decay time lower bound τmin,
1067
+ observed decay time τobs, L-radius rL, initial radial coordinate ˆr0 and number of trajectory
1068
+ loops Nloops for some values of the wave packet parameters p0, Σ and j. Trajectories concerned
1069
+ in columns 6 to 9 are the most probable ones.
1070
+ initial radial coordinate rB(r0, 0) = r0 augments. On the other hand, its value does not
1071
+ depend sensibly on the quantum number j, as can be seen in the table.
1072
+ 3. Except for j = 1/2, the L-radius rL (3.40) is near of the value of the initial radial
1073
+ coordinate ˆr0 of the most probable trajectory.
1074
+ This is what can be expected for the
1075
+ nearly circular motion which takes place at times t < τobs.
1076
+ 4. The number of revolutions also tends to decrease with increasing initial position r0, as
1077
+ shown in the example of Fig.
1078
+ 4, which shows five trajectories corresponding to five
1079
+ different initial radial positions.
1080
+ 5. The behaviours observed in these examples are generic, this being confirmed by all other
1081
+ cases we have numerically studied.
1082
+ Concluding this subsection, an important observation can be made. Although the minimum
1083
+ value for the decay-time τ was inferred from the usual quantum theoretical uncertainty principle
1084
+ for time-energy (3.47), it appears difficult to interpret τ in this framework. But it looks quite
1085
+ 17
1086
+
1087
+ natural in the dBB scheme, namely as a property of the dBB trajectories.
1088
+ May one even
1089
+ imagine an experimental way of discriminating the dBB trajectories by measuring it?
1090
+ 3.3.3
1091
+ Instantaneous beables
1092
+ 0.005
1093
+ 0.010
1094
+ 0.015
1095
+ 0.020
1096
+ 0.025
1097
+ 0.030
1098
+ t
1099
+ 99.9999
1100
+ 100.0000
1101
+ 100.0000
1102
+ 100.0000
1103
+ 100.0000
1104
+ E
1105
+ (a)
1106
+ 0.005
1107
+ 0.010
1108
+ 0.015
1109
+ 0.020
1110
+ 0.025
1111
+ 0.030
1112
+ t
1113
+ -0.4
1114
+ -0.2
1115
+ 0.2
1116
+ 0.4
1117
+ spin
1118
+ (b)
1119
+ 0.005
1120
+ 0.010
1121
+ 0.015
1122
+ 0.020
1123
+ 0.025
1124
+ 0.030
1125
+ t
1126
+ 200000
1127
+ 400000
1128
+ 600000
1129
+ 800000
1130
+ 1×106
1131
+ |v|
1132
+ (c)
1133
+ Figure 5: Instaneous energy (subfigure (a)), spin (subfigure (b)) and absolute velocity (subfigure
1134
+ (c)) in function of t for the solution shown in Figs. 2, 3 and 4. Colors correspond to the five
1135
+ different trajectories exhibited in 4
1136
+ Fig. 5 shows the time evolution of the instantaneous energy E(r0, t) (3.20), spin S(r0, t)
1137
+ (3.21) and absolute velocity |v|(r0, t) for the state already exhibited in the figures of the former
1138
+ subsection. The quantities are shown for five dBB trajectories, caracterized by their initial
1139
+ position parameter r0, and graphically by colours as in Fig. 4.
1140
+ Note the striking similarity between the time behaviours of both energy and spin.
1141
+ One further observes that, for a given trajectory, all three quantities tend to constant values
1142
+ above a certain threshold. E.g., for the blue one, which corresponds to the initial radial position
1143
+ r0 = 22.7, the threshold is at t ∼ 0.019 ns for the energy and spin, and at at t ∼ 0.017 ns for
1144
+ the velocity. This threshold is substantially higher than the decay time τ (∼ 0.006 ns here).
1145
+ The energy tends to its mean value ⟨E⟩ (∼ 100 meV here), the spin to its mean value 0 and the
1146
+ absolute velocity to the ”velocity of light” c = 106 ms−1. Note in particular that the energy is
1147
+ not conserved13 and that the velocity stays inferior to c before the time threshold, after which
1148
+ it goes rapidly to its asymptotic value c.
1149
+ 3.3.4
1150
+ Times of flight
1151
+ The dBB theory offers a very natural way to define the time of flight of a particle which has
1152
+ followed a dBB trajectory xB(x0, t) from its initial position x0 to some target, e.g., consisting
1153
+ 13This is a general feature of the dBB theory.
1154
+ Think of the obvious time dependence of the ”quantum
1155
+ potential” which defines the quantum contribution to the particle’s motion of a non-relativistic particle (see Eq.
1156
+ (3.6) of Ref. [14]).
1157
+ 18
1158
+
1159
+ of a detector. In our case, one can think of a detector occupying a circle centred at the origin
1160
+ and of radius R. This time of flight is then the solution tflight(R, r0) of the equation
1161
+ rB(r0, tflight) − R = 0,
1162
+ (3.48)
1163
+ where rB(r0, t) is the radial coordinate of the considered trajectory, characterized by its initial
1164
+ radial coordinate r0. In case the solution is not unique, one has to take the lowest one, corre-
1165
+ sponding to the first hit of the particle to the target [17, 18].However, this precaution is not
1166
+ needed in all cases we have investigated, where rB(r0, t) is a monotonically increasing function
1167
+ of t.
1168
+ The outcome of such an experiment is a probability distribution Π(τ), in terms of the time
1169
+ of flight tflight = τ, given by Eq. (9) of [17] and taking the form, in our context:
1170
+ Π(τ) = N2π
1171
+ � ∞
1172
+ 0 dr0 r0 ρ(r0, 0) δ (tflight(R, r0) − τ)
1173
+ = N2πr0(R, τ) ρ(r0(R, τ), 0) |∂r0tflight(R, r0(R, τ))| ,
1174
+ (3.49)
1175
+ where r0(R, τ) is the inverse of the time of flight function tflight(R, r0), i.e., the solution (unique,
1176
+ here) of (3.48) for r0 in terms of R and tflight = τ. Recall that ρ(r0, 0) represents the probability
1177
+ distribution for the trajectory defined by its initial radial coordinate r0. N is a normalization
1178
+ factor ensuring the normaliztion condition
1179
+ � τmax
1180
+ 0
1181
+ dτ Π(τ) = 1.
1182
+ (3.50)
1183
+ If the probability flux through the detector’s entry is always positive, which is the case in our
1184
+ examples, an alternative expression for the probability distribution is given by [30]
1185
+ ΠFlux(τ) = N
1186
+
1187
+ Σ
1188
+ ds · j(x, τ)
1189
+ =
1190
+ (here) N2πRjr(R, τ),
1191
+ (3.51)
1192
+ where j is the probability flux and Σ the detector entry’s surface. This result was proved in a
1193
+ scattering context by [30], and more generally, but in the one-dimensional case, by [31], and
1194
+ by [32] in the case of a spinless non-relativistic particle. We have checked numerically the
1195
+ equivalence of both formulae (3.49) and (3.51) in our specific situation for various parametriza-
1196
+ tions of the wave function.
1197
+ Figs. 6 and 7 show the time of flight in function of the trajectory
1198
+ parameter r0 and the corresponding probability distribution (3.49) at a circular target of radius
1199
+ 30 and 500 nm, respectively.
1200
+ 4
1201
+ Conclusion
1202
+ The trajectories predicted by the de Broglie-Bohm (dBB) quantum theory were calculated for
1203
+ the case of a guiding wave function being solution of the two-dimensional free Dirac equation,
1204
+ a solution constrained to be an eigenfunction of the total angular momentum operator relative
1205
+ 19
1206
+
1207
+ 5
1208
+ 10
1209
+ 15
1210
+ 20
1211
+ 25
1212
+ 30
1213
+ r0
1214
+ 0.005
1215
+ 0.010
1216
+ 0.015
1217
+ 0.020
1218
+ 0.025
1219
+ tflight
1220
+ (a)
1221
+ 0.005
1222
+ 0.010
1223
+ 0.015
1224
+ 0.020
1225
+ 0.025
1226
+ tflight
1227
+ 20
1228
+ 40
1229
+ 60
1230
+ 80
1231
+ 100
1232
+ 120
1233
+ Π
1234
+ (b)
1235
+ Figure 6: Times of flight tflight solutions of (3.48) and values of their probability density Π(tflight)
1236
+ (3.49) for the dBB trajectories shown in Fig. 4. The wave function parameters are the same
1237
+ as those in Figs. 2 to 5. The target is a circle centred at the origin, with radius R = 30 nm.
1238
+ The initial radial coordinate r0 varies between 2 and 30 nm.
1239
+ (a) Values of the time of flight for each dBB trajectory. The dots represent the numerically
1240
+ calculated values, and the continuous line an interpolation used for the calculation of the
1241
+ probability distribution.
1242
+ (b) Values of the corresponding probability density. Use of Eq. (3.51) has been made.
1243
+ 100
1244
+ 200
1245
+ 300
1246
+ 400
1247
+ 500
1248
+ r0
1249
+ 0.005
1250
+ 0.010
1251
+ 0.015
1252
+ tflight
1253
+ (a)
1254
+ 0.005
1255
+ 0.010
1256
+ 0.015
1257
+ tflight
1258
+ 20
1259
+ 40
1260
+ 60
1261
+ 80
1262
+ 100
1263
+ 120
1264
+ Π
1265
+ (b)
1266
+ Figure 7: Same as Fig. 6, but with target’s radius R = 500 nm and initial radial coordinate r0
1267
+ in the interval 10 to 500 nm.
1268
+ to a given origin point of space. Numerical results have being provided for the case of massless
1269
+ particles with momentum-energy specifications corresponding to those of free electrons in mono-
1270
+ layer graphene.
1271
+ The trajectories corresponding to stationary wave functions turn out to be circles travelled
1272
+ at a constant speed. For Gaussian-like wave packets, the trajectories begin as quasi circles of
1273
+ 20
1274
+
1275
+ slowly increasing radius till a critical time at which they tend to straight lines approximating
1276
+ the behaviour expected for a classical free particle. This transition time decreases when the
1277
+ value of the initial radial coordinate which labels a particular trajectory increases, but appears
1278
+ to be insensible to the chosen value of the total angular momentum. It is worth noting that
1279
+ the transition time obtained in each example is of the order of magnitude of, but greater than,
1280
+ the lower bound given by the ”time-energy uncertainty principle”. Although the nature of this
1281
+ lower bound is of course purely quantum mechanical, a theory such as the dBB one appears
1282
+ necessary in order to interpret it. More, it is the use of the dBB theory which has allowed us
1283
+ to evidenciate this phenomenon.
1284
+ Given a wave function, the possible times of arrival of the particle at some region have
1285
+ also been calculated in function of its initial position for the same examples, taking profit
1286
+ of the objective reality of the trajectories in the dBB theory. The corresponding probability
1287
+ distribution of these arrival times has been calculated using the Das-D¨urr formula based on the
1288
+ dBB theory and also using the conventional quantum theory formula involving the probability
1289
+ flux. Both calculation’s results coincide, as can be expected from the equivalence’s proof given
1290
+ in [31] for the spin one-half particle in one-dimensional space and by [32] for the non-relativistic
1291
+ spinless particle. Note that this equivalence holds if the flux on any target is always positive
1292
+ – which is true in our examples. The importance of this probability distribution is that the
1293
+ latter may in principle be measured in a suitable physical context such as, e.g., the monolayer
1294
+ graphene.
1295
+ Acknowledgements
1296
+ I would like to thank Siddhant Das for the indication of interesting references and for his
1297
+ valuable comments.
1298
+ Appendices
1299
+ A
1300
+ Notations and conventions
1301
+ Units used in this paper are adapted to the physics of graphene. Length, time and energy are
1302
+ given in nm, ns and meV, respectively. The critical velocity and the Planck constant take the
1303
+ values
1304
+ c = 106 nm ns−1,
1305
+ ℏ = 6.5821 × 10−4 meV ns.
1306
+ (A.1)
1307
+ Space-time coordinate are denoted by xµ, µ = 0, 1, 2, space coordinates by x = (x, y), or (r, φ).
1308
+ Space-time metric is ηµν = diag(1, −1, −1)
1309
+ Dirac matrices are chosen in terms of the Pauli matrices as
1310
+ γ0 = σz,
1311
+ γ1 = γ0σx,
1312
+ γ2 = γ0σy.
1313
+ (A.2)
1314
+ 21
1315
+
1316
+ The Dirac matrices used in the non-relativistic formulation are
1317
+ α1 = σx,
1318
+ α2 = σy,
1319
+ β = σz.
1320
+ (A.3)
1321
+ B
1322
+ Some useful properties of the Bessel functions
1323
+ The general solution of the Bessel equation [33]
1324
+ z2f ′′(z) + zf ′(z) + (z2 − n2)f(z) = 0,
1325
+ (B.1)
1326
+ has the form
1327
+ f(z) = C1Jn(z) + C2Yn(z),
1328
+ (B.2)
1329
+ where Jn and Yn are the Bessel functions of the first [33], resp. second [33] kind, and C1, C2
1330
+ are two arbitrary complex constants. We shall restrict ourselves to an integer index n.
1331
+ The asymptotic behaviors of the Bessel functions at the origin are given by
1332
+ Jn(x) ∼ 1
1333
+ n!
1334
+ �x
1335
+ 2
1336
+ �n
1337
+ (0 < x ≪ 1, n ≥ 0),
1338
+ Yn(x) ∼ −(n − 1)!
1339
+ π
1340
+ �2
1341
+ x
1342
+ �n
1343
+ (0 < x ≪ 1, n ≥ 1),
1344
+ Y0(x) ∼ 2
1345
+ π log
1346
+ �x
1347
+ 2
1348
+
1349
+ (0 < x ≪ 1),
1350
+ (B.3)
1351
+ and at infinity by
1352
+ Jn(x) ∼
1353
+
1354
+ 2
1355
+ πx cos
1356
+
1357
+ x − (n + 1
1358
+ 2)π
1359
+ 2
1360
+
1361
+ (x ≫ 1, n ≥ 0),
1362
+ Yn(x) ∼
1363
+
1364
+ 2
1365
+ πx sin
1366
+
1367
+ x − (n + 1
1368
+ 2)π
1369
+ 2
1370
+
1371
+ (x ≫ 1, n ≥ 0).
1372
+ (B.4)
1373
+ Functions with a negative index are related to those with a positive one by the identities
1374
+ J−n(z) = (−1)nJn(z),
1375
+ Y−n(z) = (−1)nYn(z).
1376
+ (B.5)
1377
+ Under parity z → −z, the function Jn transforms as
1378
+ Jn(−z) = (−1)nJn(z).
1379
+ (B.6)
1380
+ An interesting orthogonality property is given by [33]
1381
+ � R
1382
+ 0
1383
+ dr r Jn
1384
+ �zn,α r
1385
+ R
1386
+
1387
+ Jn
1388
+ �zn,β r
1389
+ R
1390
+
1391
+ = R2
1392
+ 2 (Jn+1(zn,α)2 δαβ,
1393
+ (B.7)
1394
+ for n ≥ 0, where zn,α is the αth positive zero of the Bessel function Jn(z) [34]. Moreover, any
1395
+ function f(r) defined in the interval 0 ≤ r ≤ R with bounded variation and vanishing at the
1396
+ end point r = R can be represented as a “Fourier Bessel series” [35] as
1397
+ f(r) =
1398
+
1399
+
1400
+ α=1
1401
+ cαJn
1402
+ �zn,α r
1403
+ R
1404
+
1405
+ ,
1406
+ (B.8)
1407
+ for any n ≥ 0. The coefficients cα can be calculated using the orthogonality formula (B.7).
1408
+ 22
1409
+
1410
+ References
1411
+ [1] P.R. Holland, “The Dirac equation in the de Broglie-Bohm theory of motion”, Found.
1412
+ Phys. 22 (1992) 1287.
1413
+ [2] Peter R. Holland, “The quantum theory of motion”, Revised ed., Cambridge University
1414
+ Press (1995).
1415
+ [3] Max Planck, “Ueber das Gesetz der Energieverteilung im Normalspectrum” (English
1416
+ translation), Annalen der Physik 4 (1901) 553.
1417
+ [4] Niels Bohr, “On the Constitution of Atoms and Molecules”, Philos. Mag. 26 (1913) 1 and
1418
+ 476.
1419
+ [5] Albert Einstein, “Concerning an Heuristic Point of View Toward the Emission and Trans-
1420
+ formation of Light”, Annalen der Physik 17 (1905) 132.
1421
+ [6] Louis de Broglie, “Recherches sur la th´eorie des quanta”, Thesis (Paris), 1924;
1422
+ Louis de Broglie, Ann. Phys. (Paris) 3, 22 (1925). Reprint in Ann. Found. Louis de
1423
+ Broglie 17 (1992) p. 22;
1424
+ Louis De Broglie, “La m´ecanique ondulatoire et la structure atomique de la mati`ere et du
1425
+ rayonnement”, J. Phys. Radium 8 (1927) 225, DOI 10.1051/jphysrad:0192700805022500.
1426
+ [7] Erwin Schr¨odinger, “Quantisierung als Eigenwertproblem”, Annalen der Physik 79 (1926),
1427
+ 361, Annalen der Physik 79 (1926) 489, Annalen der Physik 80 (1926) 437, Annalen der
1428
+ Physik 81 (1926) 109.
1429
+ [8] Werner Heisenberg, ҬUber quantentheoretische Umdeutung kinematischer und mechanis-
1430
+ cher Beziehungen”, Z. Phys. 33 (1925) 879.
1431
+ [9] Paul A.M. Dirac, “The quantum theory of the electron”, Proc. R. Soc. A 117 (1928) 610
1432
+ and 118 (1928) 351.
1433
+ [10] Niels Bohr, “The Quantum Postulate and the Recent Development of Atomic Theory”,
1434
+ Supplement to ”Nature April 14 (1928) 580;
1435
+ Werner Heisenberg, “Physics and Philosophy”, Harper, New York (1958),
1436
+ [11] Hugh Everett, “Relative State Formulation of Quantum Mechanics”,
1437
+ Rev. Mod. Phys. 29 (1957) 454.
1438
+ [12] Carlo Rovelli, “Relational quantum mechanics”,
1439
+ Int. J. Theor. Phys. 35 (1996) 1637 e-Print: quant-ph/9609002 [quant-ph];
1440
+ Andrea Di Biagio and Carlo Rovelli, “Stable Facts, Relative Facts”,
1441
+ Found. Phys. (2021) 51:30.
1442
+ [13] David Bohm, “A Suggested interpretation of the quantum theory in terms of hidden
1443
+ variables 1, 2.”, Phys. Rev. 85 (1952) 166, 180.
1444
+ 23
1445
+
1446
+ [14] D. Bohm and B.J. Hiley, ”The Undivided Universe”, Routledge, London and New York
1447
+ (1995).
1448
+ [15] John S. Bell, “Speakable and Unspeakable in Quantum Mechanics”, Cambridge University
1449
+ Press, New York (2010).
1450
+ [16] John S. Bell, “Beables for quantum field theory”, preprint CERN TH-4035/84 (1984),
1451
+ reprinted in Cap. 19 of [15].
1452
+ [17] Siddhant Das and Detlef D¨urr, ”Arrival time distributions of spin-1/2 particles, Nature
1453
+ Scient. Rep. 9 (2019) 2242.
1454
+ [18] Siddhant Das, Markus N¨oth and Detlef D¨urr, “Exotic arrival times of spin-1/2 particles
1455
+ I - An analytical treatment”, Phys. Rev. A99 (2019) 052124.
1456
+ [19] Detlef D¨urr, Sheldon Goldstein, Travis Norsen, Ward Struyve and Nino Zangh`ı, “Can
1457
+ Bohmian mechanics be made relativistic?” Proc. R. Soc. A 470 (2013) 20130699
1458
+ [20] Roderich Tumulka, “On Bohmian Mechanics, Particle Creation, and Relativistic Space-
1459
+ Time: Happy 100th Birthday, David Bohm!”, Entropy 20 (2018) 462.
1460
+ [21] Dario Bressanini and Alessandro Ponti, “Angular Momentum and the Two-Dimensional
1461
+ Free Particle´´, J. Chem. Educ. 75 (1998) 916.
1462
+ [22] Wolfram Research, Inc., Mathematica, Champaign, IL.
1463
+ [23] Abraham Pais, “On Spinors in n Dimensions”, J. Math. Phys. 3 (1962) 1135; doi:
1464
+ 10.1063/1.1703856.
1465
+ [24] D. D¨urr D., S. Goldstein and N. Zanghi, “Quantum equilibrium and the origin of absolute
1466
+ uncertainty”, J. Stat. Phys. 67 (1992) 843.
1467
+ [25] The Wolfram Functions Site,
1468
+ https://functions.wolfram.com/Bessel-TypeFunctions/BesselJ/21/02/02/
1469
+ [26] WolframMathWorld,
1470
+ https://functions.wolfram.com/GammaBetaErf/Erf/
1471
+ [27] Mikhail I. Katsnelson, “The Physics of Graphene” 2nd Edition, Cambridge University
1472
+ Press, Cambridge (2020).
1473
+ [28] S. Das Sarma, Shaffique Adam, E. H. Hwang and Enrico Rossi, “Electronic transport
1474
+ in two-dimensional graphene”, Rev. Mod. Phys. 83 (2011) 407, e-Print: arXiv:1003.4731
1475
+ (cond-mat.mtrl-sci).
1476
+ [29] Albert Messiah, “Quantum Mechanics”, Vol. 1, Section VIII-13, Dover Publications, New
1477
+ York (2014) (English translation of “M´ecanique Quantique”, Dunod, Paris, (1962)).
1478
+ [30] M. Daumer, D. D¨urr, S. Goldstein and N. Zanghi, “On the Quantum Probability Flux
1479
+ Through Surfaces”, J. Stat. Phys. 88 (1997) 967.
1480
+ 24
1481
+
1482
+ [31] C. Richard Leavens, “Bohm Trajectory Approach to Timing Electrons”, p. 129 of “Time
1483
+ in Quantum Mechanics - Vol.1”, 2d Ed., J.G. Muga, R. Sala Mayato, ´I.L. Egusquiza
1484
+ (Eds.), Lecture Notes in Physics 734, Springer, Heidelberg, 2008.
1485
+ [32] Siddhant Das and Markus N¨oth, Times of arrival and gauge invariance, Proc. R. Soc. A
1486
+ 477 (2021) 20210101, https://doi.org/10.1098/rspa.2021.0101.
1487
+ [33] WolframMathWorld, “Bessel function”,
1488
+ https://mathworld.wolfram.com/topics/BesselFunctions.html.
1489
+ [34] WolframMathWorld,
1490
+ https://mathworld.wolfram.com/BesselFunctionZeros.html
1491
+ [35] Eric W. Weisstein, “Fourier-Bessel Series.” From MathWorld–A Wolfram Web Resource.
1492
+ https://mathworld.wolfram.com/Fourier-BesselSeries.html
1493
+ 25
1494
+
8dFQT4oBgHgl3EQfIDXU/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
9dAyT4oBgHgl3EQf3Pmp/content/tmp_files/2301.00766v1.pdf.txt ADDED
@@ -0,0 +1,809 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Examination of saturation coverage of short polymers using
2
+ random sequential adsorption algorithm
3
+ Aref Abbasi Moud1*
4
+ 1 Department of Chemical and Petroleum Engineering, University of Calgary, 2500 University Dr NW,
5
+ Calgary, AB, T2N 1N4, Canada
6
+ *Author to whom correspondence should be addressed; electronic mail: [email protected]
7
+ Abstract: We filled a void with a regular or asymmetric pattern without overlap using a time-dependent
8
+ packing method termed random sequential adsorption (RSA). In the infinite-time limit, the density of
9
+ coverage frequently hits a limit. This study focused on the saturation packing of squares and their dimers,
10
+ trimers, tetramers, pentamers, and hexamers, all of which were orientated in two randomly chosen
11
+ orientations (vertical and horizontal). Our results concurred with those of previous extrapolation-based
12
+ research1. We used the "separating axis theorem" to detect if freshly added polygons and previously put
13
+ ones overlapped. When RSA insertion became disproportionately sluggish, we concluded that saturation
14
+ had been attained. We also discovered that the system's capacity to fill the area decreased as squares were
15
+ stretched into dimers and trimmers. The microstructure of the resultant saturation was also thoroughly
16
+ investigated, including block function and the structural arrangement of dimers and trimers.
17
+ Keywords: RSA, short polymers, separating axis theorem, trimers, and dimers
18
+ 1. Introduction
19
+
20
+ One of the most popular nonequilibrium packing models is the random sequential addition (RSA) packing
21
+ method, which is a time-dependent process. Unpredictable sphere packings are created using a method
22
+ similar to earlier established techniques; see References2-3. The RSA packing process in the three spatial
23
+ dimensions4 has been used to represent a range of scenarios, including protein adsorption5, polymer
24
+ oxidation, particles in cell membranes, and ion implantation in semiconductors2.
25
+ Euclidean space (d-dimensional) particles with certain shapes are randomly and progressively introduced
26
+ into the volume subject with the restriction that they do not overlap to carry out the simulation starting from
27
+ a big, vacant zone. The freshly created particles are only maintained if they do not overlap any already
28
+ existing particles; otherwise, they are deleted. After the simulation has begun, this procedure can be stopped
29
+ at any time, making the density that has been acquired time dependent. Density reaches a "saturation" or
30
+ "jamming" limit as time goes on6.
31
+ In its simplest form, an RSA sphere packing may be obtained by randomly, irreversibly, and sequentially
32
+ adding nonoverlapping objects into a huge volume that is initially empty of spheres. A further attempt is
33
+ made until the sphere can be added without doing so if an attempt to add a sphere (or any other polygon) at
34
+ time t overlaps with a sphere that is already present in the packing. An RSA configuration with a time-
35
+ dependent packing fraction can be created by selecting any moment in finite time t as the process' endpoint.
36
+ The maximum saturation packing fraction, which occurs at the infinite-time and thermodynamic limits,
37
+ prevents this figure from becoming higher.
38
+ RSA implementations fall into two groups. The two fundamental categories into which the RSA models
39
+ may be split are continuum and lattice models. Based on object kinds, they are further split into two groups:
40
+ RSA of finite (nonzero) area objects and RSA of zero area objects. Things having finite area in this sense
41
+ are those that enclose a certain amount of space, whereas those with zero area lack this geometric feature
42
+
43
+ of enclosure. Therefore, upon adsorption on the substrate, items with finite area take up some space,
44
+ whereas those with zero area take up no space. Lattice models are defined by the realisation of the jammed
45
+ state7, regardless of the item types.
46
+ In general, in case of RSA of finite area objects, the approach of instantaneous coverage 𝜃(𝑡) to the jammed
47
+ state coverage 𝜃𝑚𝑎𝑥 is found to follow a power law 𝜃𝑚𝑎𝑥 − 𝜃(𝑡)~𝑡−𝑝. Researchers have proposed certain
48
+ laws about the value of the exponents p by researching the RSA of objects with a variety of geometries,
49
+ including circular, elliptical, rectangular, and sphero-cylindrical. Feder 8 is credited with being the first to
50
+ link the observed value of the exponent p in the RSA of circular objects in two dimensions to the object
51
+ dimensionality and to propose the general rule that p = 1/D for d-dimensional circles on a two-dimensional
52
+ continuum platform. Swendsen 9 subsequently demonstrated that, if the items are placed with random
53
+ orientations, the same ought to apply for RSA of items of any arbitrary form.
54
+ Since its invention by Feder 8 , Random Sequential Adsorption (RSA) has gained widespread acceptance
55
+ as a technique for simulating adsorption characteristics, particularly for spherical molecules. However,
56
+ employing RSA to replicate the adsorption of more complex particles like polymers or proteins raises
57
+ concerns about how RSA's inherent features alter when non-spherical molecules are involved. For simple
58
+ forms like spheroids, spherocylinders, rectangles, needles, and others, the subject has already been
59
+ addressed10-12. Recent research, however, indicates that these geometries are insufficient for simulating the
60
+ adsorption of common proteins, such as fibrinogen, for instance13. As a result, researchers' focus has
61
+ recently turned to coarse-grained modelling of complex biomolecules and polymers14-16.
62
+ In 1-D case, the saturation packing fraction can be obtained analytically as 0.747597920 17 however for 2-
63
+ D and 3-D the saturation packing fraction for discs and spheres has been estimated only through numerical
64
+ simulations; the most precise ones are 0.5470735 ± 0.0000028 for 2-d and 0.3841307 ± 0.000002 for 3-D
65
+ cases2.
66
+ Other
67
+ figures
68
+ reported
69
+ for
70
+ 2-D
71
+ simulations
72
+ of
73
+ discs
74
+ are
75
+ 0.54707352, 0.54706718, 0.54707019, 0.547069020, 0.5470021,
76
+ 0.5471122, 0.547223,
77
+ 0.5478,
78
+ 0.547924.
79
+ Similarly for 2-D aligned squares saturation coverage reported in the literature is 0.56200925, 0.562324,
80
+ 0.5628, 0.556526, 0.562527, 0.544428, 0.562929, 0.56230.
81
+ In this study, we used the RSA technique to determine the saturation packing limit for squares and its dimer
82
+ and trimers. As the length of square increases, the results indicated that samples eventually generated
83
+ structures with less and less packing. In this study, the "separating axis theorem" approach was used to
84
+ detect whether there was a collision between two polygons; more information on the procedure is provided
85
+ in the following sections. Polygons here refer to squares that encompasses its polymers as well as a
86
+ constructing monomer. Our preliminary findings on RSA packing with respect to polygons, which we just
87
+ published31, are the basis for this study, which extends that work by extending the polygon (square) into its
88
+ polymers.
89
+ 2. Model and simulation procedure
90
+
91
+ When colloidal particles or molecules are being adsorbed, they frequently diffuse close to the surface. This
92
+ process might lead to the formation of a film consisting of molecules that were randomly adsorbed because
93
+ of adhesion. Here, we focus on adsorbate monolayers formed by irreversible adsorption. The most
94
+ straightforward technique for quantitatively modelling these processes is molecular dynamics (MD). The
95
+ advantages of MD include accurate forecasting and management of most environmental factors, such as
96
+ temperature and the diffusion constant. The main issue is the performance deficiency. As a result, we
97
+ decided to utilise a new method, continuum Random Sequential Adsorption (RSA), which has been
98
+ successfully employed to investigate colloidal and other systems32.
99
+
100
+ To simulate, a virtual particle was created (square, its polymers), and its location on an area was chosen at
101
+ random based on a uniform probability distribution.
102
+ - The overlap with the previously adsorbed nearest neighbours of a virtual particle was tested (the topic of
103
+ the next section). The result of this test tells us whether the surface-to-surface distance of a particle is greater
104
+ than zero.
105
+ - If there was no overlap, the virtual particle was adsorbed and added to an existing covering layer.
106
+ - If there was overlap, the virtual particle was dropped and abandoned.
107
+ 2.1 Proposed algorithm
108
+
109
+ Numerous methods may be used to determine if two polygons intersect or not. One method for determining
110
+ if two polygons are overlapping uses mathematical equations and is known as the "separating axis
111
+ theorem"33.
112
+ The separating axis theorem states that if a line divides two convex polygons, they cannot intersect. The
113
+ separation axis, which is a line, may be thought of as the normal to one of the edges of each polygon.
114
+ Using the separating axis theorem, the following procedures can be used to determine if two polygons cross:
115
+
116
+ Determine each polygon A edge's edge normal, then project both polygons onto that value.
117
+
118
+
119
+ Establish the minimum and maximum projections of each polygon onto the normal.
120
+
121
+
122
+ If the maximum projection of polygon A is less than the minimum projection of polygon B, or the
123
+ other way around, the polygons do not overlap.
124
+
125
+
126
+ If the projections overlap, repeat the procedure for each edge in polygon B.
127
+
128
+
129
+ If the projections of the polygons onto the separating axes do not overlap, the polygons are
130
+ connected.
131
+ It is likely that non-convex polygons or polygons with holes will not be covered by this theorem, even
132
+ though the separating axis theory may be used to determine if two convex polygons overlap. In some
133
+ situations, it could be necessary to verify for intersection using alternative techniques.
134
+ 3. Results and discussion
135
+
136
+ We construct saturated RSA configurations of polymers (dimer to hexamer) and compare saturation
137
+ packing with other findings reported in the literature, particularly in ref2, where authors employed a
138
+ different approach and orientation was random, to show the precision and utility of our algorithm. We
139
+ generate 1000 variations for each particle form using the system size that results in the fastest and densest
140
+ packing.
141
+
142
+
143
+ Figure 1. Typical monolayer samples (from trimer’s sample) for three different coverages: θ = 0.1, θ = 0.3,
144
+ θ = 0.4 and θ = 0.5 for trimers. The collector side length was equal to 50[-]. Fixed boundary conditions
145
+ were used. Figure shows truncated images of the distribution for a better visibility (20 by 20).
146
+ Using the greatest area (50 by 50) with fixed bounds, most of the results presented later in the study were
147
+ achieved. We made sure that the adoption of periodic boundary conditions had no discernible impact on
148
+ the results that were made (Equivalent of periodic and fixed boundary condition). Figure 1 shows the
149
+ outcomes of one of the simulations, in which trimers are placed in an area measuring 20 by 20 with a
150
+ monomer having a side length of 0.5 units. Particles are gradually added to the surface as the simulation
151
+ progresses.
152
+
153
+
154
+ 0=10%
155
+ 0=30%
156
+ 0=40%
157
+ 0=50%
158
+ Figure 2. Hexamer units put irrevocably inside a 50 by 50 space are the focus of the RSA algorithm. (a)
159
+ Asymptotic observation of coverage as a function of total simulation duration indicated by t. (b) The
160
+ instantaneous time τ determined by based on coverage. The line represents an exponential fit.
161
+ To look at the development in more details, surface coverage was depicted as a function of simulation time
162
+ to the power of 𝑡−1/3 and results are shown in Figure 2a. Clearly at long simulation times of ~104 coverage
163
+ very slowly reaches its asymptotic limit that is 0.4968±0.0011. Similarly using same schemes, we arrived
164
+ at 0.5631±0.0002 surface coverage for squares. This surface coverage corresponds very well with the results
165
+ reported in the literature for squares 8, 24-30.
166
+ The number of attempts needed to add a new particle to the grid (or collector both terms in congruency with
167
+ literature has been used here interchangeably) can be known, and this information can be used to model the
168
+ blocking of further adsorption through monitoring time. Clearly, as more of the surface is covered, adding
169
+ new particles should be more difficult, which can be represented by a lower probability (See Figure 2b)
170
+ that is it takes considerably more amount of time for a particle to be added. Adsorption kinetics in a real
171
+ experiment typically depends on two variables: the effectiveness of the transport process (primarily
172
+ diffusion or convection depending on the experimental setup) that moves the adsorbate from the bulk to the
173
+ surface, and the likelihood of catching particles that are nearby 34-39. Authors in other reports40 have
174
+ concentrated on the second aspect in this case, which is defined by the blocking function, also known as
175
+ the available surface function (ASF). The simulation makes it simple to obtain it as a ratio of successful
176
+ attempts to all RSA attempts. Equivalent to available surface function that is represented in shape of time
177
+ simulation is presented in Figure 2b. Figure 2b shows simulation time as a function of coverage;
178
+ statistically, it is evident that more trials are required to attain adsorption because the surface is already
179
+ rather packed. The exponential fit is, τ = 0.0006 exp (24.03 𝜃), thus describing increasing time required to
180
+ place an additional point onto the grid. Discussion on ASF is subject of next section.
181
+ The main objectives of this work were to determine the maximum random adsorption ratio for squares and
182
+ their polymers and compare it to the results for hard circles (spheres). That ratio ought to be provided for
183
+ an infinite grid area and adsorption duration. Although one must deal with constrained simulation durations,
184
+ one must also manage the accuracy issue brought on by the finite grid size. Because it is unclear if there
185
+ would be any possibility of adsorption after the simulation time, particularly in the case of large grids, the
186
+ determination of maximal coverage depends on the RSA kinetics model. As a result of prior research in the
187
+ region 9, 41-42, there have been a number of works in the area, and asymptotically:
188
+ 𝜃𝑚𝑎𝑥 − 𝜃(𝑡)~𝑡−1
189
+ 𝐷 eq.1
190
+
191
+ 0.5
192
+ 4000
193
+ 0.45
194
+ 3000
195
+ 0.4
196
+ 2000
197
+ 0.35
198
+ 1000
199
+ 0.3
200
+ 0.01
201
+ 0.02
202
+ 0.03Regarding the irreversible deposition of discs or squares that are not orientated (formerly known as p = -
203
+ 1/D). Despite controversy, D here specifies the grid's dimension9. When adsorbed particles are organised,
204
+ the situation is altered9, 42. Figure 2a previously in this post showed an example of the results of fitting
205
+ Equation 1. Asymptotic observations of coverage for squares seem to neatly match Equation 1. Although
206
+ Equation 1 hasn't been definitively proved, its validity has been vigorously defended12 by analytical and
207
+ numerical grounds. It should be noted that Equation 1 simplifies to the standard Feder's law8 for isotropic
208
+ objects since n equals the number of dimensions.
209
+ For instance, RSA of discs on a two-dimensional plane has D = 2, whereas RSA of rectangles, ellipses, and
210
+ other rigid but noticeably anisotropic structures has D = 3 37, 43. It appears that parameter D generally
211
+ correlates to the degrees of freedom of a number of packed objects, which has been validated for the random
212
+ packing of hyperspheres in higher dimensions 2, 21, not only the integral ones44-45. The power law (Equation
213
+ 1) is satisfied for the RSA of polymers examined here, however the exponent -1/D strongly relies on a
214
+ polymer length. The parameter D is about equivalent to 3, which is the value recognised for anisotropic
215
+ molecules, for a small number of vertexes such as pentagon and squares. However, as number of vertices
216
+ increases parameter D converges to 2. This finding is consistent with those made for the RSA of spherical
217
+ beads examined in Ref.46. However, unlike what was shown in the cases of spherical beads46 or generalized
218
+ dimers 40, there is no abrupt transition between these two limitations.
219
+ The results are averaged across 10 simulation runs with time t in the order of 5 × 108 for each run in order
220
+ to determine parameter D for different polymers. These runs' data are not displayed here, and we will go
221
+ into more depth about the outcomes in our upcoming paper.
222
+
223
+ 3.1 RSA for polymers
224
+
225
+ In the last part, we laid the foundation for using the RSA approach to create oriented squares and trimmers.
226
+ Results showing the behaviour of adsorption at asymptotic limits, the kinetics of the adsorption index (p),
227
+ and the relationship between simulation time and coverage were given. Additionally, results and discs were
228
+ compared. Utilizing the extrapolation method shown in Figure 2a previously, Table 1 generates
229
+ saturation densities for various polymer lengths. Figure 3 displays a sample of saturation densities for
230
+ various forms.
231
+ To arrive at the values reported in Table 1 following equation has been used:
232
+ 𝜃(𝑡) = 𝜃𝑚𝑎𝑥 + 𝑏/𝑡𝑝 eq.2
233
+ When arriving at the values shown in table 1, we gave the data from longer simulation times more weight.
234
+ The approach's possible downside is that each data point is given the same weighting factor, assuming all
235
+ values are given the same weight. Because there are a lot more of these points in the higher part of the
236
+ asymptotic area, it is sort of underweighted. Therefore, we investigated a novel strategy that introduces a
237
+ bias favouring the longer durations. These changes are in line with the accounts in ref12.
238
+ Table 1. Saturation density, index, for square-based polymers with a monomer to simulation box length
239
+ ratio of 0.01 and their respective 95% confidence intervals.
240
+ Shape (oriented)
241
+ 𝜃𝑚𝑎𝑥 [-] (95% confidence
242
+ bounds)
243
+ p [-]
244
+ (95%
245
+ confidence
246
+ bounds)
247
+ b [-]
248
+ (95%
249
+ confidence
250
+ bounds)
251
+ Square
252
+ 0.5631(0.5629, 0.5633)
253
+ 0.5138 (0.5125, 0.5151)
254
+ -4.226 (-4.475, -4.561)
255
+
256
+ Dimer
257
+ 0.57 (0.5697, 0.5704)
258
+ 0.4599 (0.4595, 0.4603)
259
+ -4.805 (-4.819, -4.792)
260
+ Trimers
261
+ 0.5621 (0.5612, 0.5629)
262
+ 0.466 (0.4652, 0.4668)
263
+ -8.003 (-8.066, -7.941)
264
+ Tetramer
265
+ 0.5558 (0.5539, 0.5577)
266
+ 0.4998 (0.499, 0.5007)
267
+ -6.046 (-6.15, -5.942)
268
+ Pentamer
269
+ 0.5504 (0.5481, 0.5527)
270
+ 0.46 (0.4576, 0.4624)
271
+ -5.007 (-5.122, -4.892)
272
+ Hexamer
273
+ 0.4968 (0.4949, 0.4987)
274
+ 0.5 (0.499, 0.501)
275
+ -6.264 (-6.458, -6.069)
276
+ Discs
277
+ 0.5470732
278
+ -
279
+ -
280
+
281
+ As outlined in introduction section, similarly for 2-D aligned squares saturation coverage reported in the
282
+ literature is 0.56200925, 0.562324, 0.5628, 0.556526, 0.562527, 0.544428, 0.562929, 0.56230. Our values for
283
+ square are very well within range of values reported elsewhere. However, as particles get longer and become
284
+ Trimers, saturation has dropped since longer particles require more accessible area for deposition. For dimer
285
+ and trimer, the greater aspect ratio of the dimer is projected to result in somewhat higher saturation for
286
+ dimers. These findings are crucial because they suggest that it gets progressively harder for molecules to
287
+ adhere to surfaces as they become longer; an example of superiority of simulation over experiment in giving
288
+ researcher a tool to examine parameters hard to measure through experiments.
289
+ Results from this study can also be extrapolated to higher dimensions. For instance, the efficiency of a
290
+ sequential adsorption process with hard materials decreases with increasing size. It is noteworthy to note
291
+ that, as a general rule, the saturation coverage in D dimensions is very well estimated by that in one
292
+ dimension raised to power D (for the RSA of spherical particles, 𝜃𝑚𝑎𝑥≃ 0.75 for D = 1, 𝜃𝑚𝑎𝑥≃ 0.55 for D
293
+ = 2, 𝜃𝑚𝑎𝑥 ≃ 0.38 for D = 3, etc)47. Therefore, results obtained here can be extended to 1-D and 3-D cases
294
+ with good approximation, for instance for squares for cubes is predicted to lie around 0.38 and in 1-D case
295
+ around 0.73.
296
+
297
+
298
+ Figure 3. Square, dimers, and trimers near saturation points for samples with monomer’s side length of 0.5
299
+ and distributed within area of 50 by 50. Fixed boundary condition has been applied. Figure shows truncated
300
+ images of the distribution for a better visibility (20 by 20). For improved visibility, the horizontally oriented
301
+ polymers have been coloured blue, while the vertically oriented ones have been painted red.
302
+ Clearly visually samples experience a bit higher coverage for dimers and less coverage for trimers.
303
+
304
+
305
+ Square
306
+ Dimers
307
+ Trimers
308
+ Figure 4. RSA saturation density for polymers, with a line created to guide the viewer's eyes. Each data
309
+ point has an almost imperceptible error bar. For discs, RSA saturation density (red dotted line). All the
310
+ polymers in Table 1's saturation density changes as a function of simulation duration (a) The dependence
311
+ of 𝜃𝑚𝑎𝑥 on length of the polymer (c) Kinetic index as a function of the monomer length.
312
+ Figure 4 shows the RSA saturation density as a function of polymer length together with an eye-guiding
313
+ line. The saturation density coverage first increases somewhat as the polymer's length rises, but as it
314
+ continues to grow, it starts to decline. This outcome is in line with the outcomes for rectangles with various
315
+ aspect ratios and ellipses that have been reported in the literature5, 48. Additionally, we discovered that
316
+ saturation is somewhat lower for polymers with aspect ratios longer than 2, and we hypothesise that this is
317
+ because, as was already noted, longer particles are more difficult to pack efficiently.
318
+ The random coverage ratio dropped exponentially with polymer size in earlier investigations refs43, 49. On
319
+ a continuous surface, at least two competing variables can affect the maximum random coverage ratio.
320
+ First, there is less chance of finding a large enough uncovered section to place on a collector, making it
321
+ harder to separate larger particles than in the lattice case. The second point is that a polymer globule is more
322
+ likely to form a cluster when necessary because it has a greater monomer packing ratio than a group of
323
+ individual monomers. For continuous collectors as opposed to lattice ones, this second element is more
324
+ important.
325
+
326
+ 0.6
327
+ 0.65
328
+ 0.5
329
+ 0.6
330
+ 0.4
331
+ 0.55
332
+ Sguare
333
+ 0.3
334
+ 0.5
335
+ Dimer
336
+ Trimer
337
+ 0.2
338
+ 0.45
339
+ Tetramer
340
+ A
341
+ Hexame
342
+ 0.4
343
+ a
344
+ b
345
+ 0.35
346
+ 3
347
+ 4
348
+ 5
349
+ 2
350
+ X10 4
351
+ 0.65
352
+ Monomerlength
353
+ 0.6
354
+ DiscS
355
+ 0.55
356
+ 0.5
357
+ 0.45
358
+ 0.4
359
+ 0.35
360
+ 3.2 Block function
361
+
362
+ Knowing how many tries are necessary to add a new particle to the grid allows us to simulate how further
363
+ adsorption is blocked over time. It is obvious that when more of the surface is covered, adding more
364
+ particles should become more challenging, which may be represented by a decreased probability (as shown
365
+ in Figure 2b, which depicts the same trend with time as the dependent variable)
366
+
367
+
368
+
369
+ Figure 5. The ratio of successful attempts to blocking attempts versus coverage. The green line represents
370
+ simulation data in b and the dotted line represent polynomial fit.; details of the fits are given in table 2.
371
+
372
+ Equation 3 describe the function with a simple second order polynomial perfectly describing the decreasing
373
+ trend in probability of a successful adsorption.
374
+
375
+ 𝐴𝑆𝐹(𝜑) = 𝐶1𝜃2 + 𝐶2𝜃 + 𝐶3 eq.3
376
+
377
+ In which C1, C2 and C3 are pre-factors. Details of the fit of equation 3 is given in the Table 2. Figure 5
378
+ shows that the likelihood of adsorption for trimers drops more quickly than for dimers and squares, and the
379
+ dimer with respect to the square exhibits the same pattern. This is because consecutive adsorption is much
380
+ less likely to occur quickly in trimers and dimers than in squares due to their greater aspect ratio and unusual
381
+ orientation.
382
+
383
+ Table 2. Represents polynomial fit to the data in Figure 5 along with corresponding 95% confidence
384
+ bounds.
385
+
386
+ Shape (oriented)
387
+ C1 [-] (95% confidence
388
+ bounds)
389
+ C2 [-]
390
+ (95%
391
+ confidence
392
+ bounds)
393
+ C3 [-]
394
+ (95%
395
+ confidence
396
+ bounds)
397
+ Square
398
+ 0.5439 (0.5296, 0.5582)
399
+ -2.244 (-2.252, -2.237)
400
+ 1.008 (1.007, 1.009)
401
+ Dimer
402
+ 2.508 (2.484, 2.532)
403
+ -3.18 (-3.194, -3.167)
404
+ 0.9796 (0.978, 0.9811)
405
+ Trimers
406
+ 5.483 (5.382, 5.585)
407
+ -4.463 (-4.511, -4.414)
408
+ 0.9623 (0.9574, 0.9671)
409
+ Tetramer
410
+ 5.359 (5.176, 5.543)
411
+ -4.338 (-4.437, -4.238)
412
+ 0.8921 (0.8809, 0.9034)
413
+ Pentamer
414
+ 6.352 (6.063, 6.641)
415
+ -4.828 (-4.94, -4.715)
416
+ 0.97 (0.9621, 0.9779)
417
+
418
+ 1.5
419
+ b
420
+ a
421
+ Square
422
+ Square
423
+ • Dimer
424
+ Fit
425
+ Trimer
426
+ 0.5
427
+ 0.5
428
+ 0.2
429
+ 0.4
430
+ 0.6
431
+ 0.2
432
+ 0.4
433
+ 0.6Hexamer
434
+ 6.572 (6.359, 6.785)
435
+ -5.038 (-5.116, -4.961)
436
+ 0.9933 (0.9881, 0.9986)
437
+
438
+ In the case of square, dimers, trimers simulations show that C1 = 0.5439-6.572 and C2 =-2.244-5.038,
439
+ whereas those parameters for hard circles adsorption are analytically derived as C2 =-4 and C1 = 3.3150 (we
440
+ obtained coefficients of C1=2.426 (1.071, 3.782) and C2=-2.907 (-3.644, -2.169) with aid of our
441
+ simulation) . Contrary to discs, the coefficient for squares suggests that they have an easier time adhering
442
+ to the surface. Higher saturation coverage for squares is another manifestation of this phenomenon.
443
+ Therefore, dimers values are very close to the values reported for hard discs.
444
+
445
+
446
+ According to Figure 5, as coverage levels increase, we get closer to the asymptotic phase, where dynamics
447
+ are well understood, and finally the jamming limit. Thus, the RSA procedure has now been completely
448
+ explained. Since it is challenging to conduct adsorption investigations near to the jamming limit51,
449
+ measuring the terms of the RSA process is the most effective technique to show that adsorption follows an
450
+ RSA process. It's crucial to remember that words up to 𝜃2 don't reveal anything about the properties of the
451
+ adsorption process (i.e., the degree of irreversibility). This implies that any experiment that involves the
452
+ adsorption of particles that resemble hard discs is susceptible to such an extension (to second order). Our
453
+ strategy is also applicable to combinations and non-circular particles.
454
+
455
+ 3.3 Ordering and orientation
456
+
457
+
458
+ We study the presence of any orientational order in a monolayer using the amorphous form of a polymer.
459
+ Although most of these studies have used a collector surface lattice structure, as in ref. 52, such ordering has
460
+ been well investigated. It could also have an impact on the RSA kinetics mentioned before. Based on the
461
+ polymer structure, we offer the following function to measure orientational order in our continuous system:
462
+
463
+ 𝑆(𝜑) =
464
+ 1
465
+ 𝑁 ∑
466
+ (𝑥𝑖 cos(𝜑) + 𝑦𝑖 sin(𝜑))
467
+ 𝑁
468
+ 𝑖=1
469
+ eq.4
470
+
471
+ where (xi, yi) are positions along the i-th molecule in a layer for a unit vector. It is clear that 𝑆(𝜑) is an
472
+ average scalar product between both the orientation of molecules and the direction determined by an angle.
473
+ As a result, for a perfectly aligned layer, 𝑆(𝜑) will swing between 0 and 1, with highest values for angles
474
+ parallel to molecules and minimum values for angles perpendicular to the alignment direction. 𝑆(𝜑) will
475
+ always be a constant and equal to 0.5 for pure random alignment.
476
+
477
+ For trimers as coverage increases across simulation time, ordering hovered 0.49, 0.53,0.50,0.51 as surface
478
+ coverage increased from 10 to 30, 40 and 50%. Clearly ordering in trimer population is very close to random
479
+ due to simulation being designed to give equal chance to parallel or vertical orientation of trimers as shown
480
+ in Figure 3. Situation is very similar for dimers as well.
481
+
482
+ Figure 4 illustrates how ordering in trimers may be further examined as a function of the radius of the
483
+ particle neighbours. Figure 4 was made using a similar idea to the pair correlation function by treating the
484
+ trimer centre as a circle with a radius of 0.25. 𝑆(𝜑) fluctuates in small regions because dense clusters of
485
+ horizontally or vertically oriented trimers are more likely to form, but as the sweeping radius grows, this
486
+ fluctuation decreases to a value that is very similar to a randomly oriented arrangement. Dimers also face a
487
+ similar set of circumstances. As a result, at r5, local order in each system vanishes. Small amplitude
488
+ fluctuations continue after r=5, although their amplitudes and frequency are higher for trimers.
489
+
490
+
491
+
492
+ Figure 4. Local ordering as a function of radius for two RSA packings made with dimers and trimers near
493
+ their saturation coverage. (a) dimers (b) trimers.
494
+
495
+
496
+ Similar trends are expected for tetramers due to similarity of behavior we have refrained from exploring
497
+ them further here. As an example, liquid crystals are one type of orientationally organised structure that an
498
+ elongated particle (such as polymers here with aspect ratio>2) can produce. When particle orientations are
499
+ chosen at random using a uniform probability distribution for RSA on an infinite collector, the global
500
+ orientational order is not expected to exist. However, since parallelly aligned particles take up less space,
501
+ the formation of local ordered domains is feasible53-54.
502
+
503
+ 3.4 Radial distribution function
504
+
505
+ The radial distribution function (G(r)), also known as the pair correlation function, in a system of particles
506
+ (such as atoms, molecules, colloids, etc.) explains how density changes in response to distance from a
507
+ reference particle. G(r) is the radial distribution function 55 obtained from following equation:
508
+
509
+ 𝐺(𝑟) =
510
+ 1
511
+ 𝜌 〈∑
512
+ 𝛿(𝑟 − 𝑟𝑖)
513
+ 𝑖≠0
514
+ 〉 eq.5
515
+
516
+
517
+ The monolayer's first crucial characteristic is the particle autocorrelation. Squares are assumed to have a
518
+ radius of 0.25 and to be treated equally regardless of whether they are made of the same polymer or a
519
+ different one in order to compute G(r). Figure 5 displays the average structures seen by various RSA
520
+ packings. We consistently saw a peak at a distance of r=0.5 (right on the edge of the particles). In other
521
+ words, the function reaches its maximum for the closest neighbour, r = 0.5, and then begins to degrade
522
+ because of the volume that is lacking. The similar trend is seen in the trimer and hexamer, but there are
523
+ more peaks. Hexamer contains additional peaks, for instance, at r=1, 1.5, and 2, while the trimer exhibits
524
+ an additional peak at 1.
525
+
526
+ As the radius gets bigger, these peaks get weaker. Due to the coverage's randomness, these oscillations
527
+ superexponentially vanish21, and after normalisation, the function stabilises at a value of 1. In addition,
528
+ when the number of monomers inside the polymer rises, the first peak corresponding to the nearest
529
+ neighbour grows progressively sharper. According to this behaviour, particles that may be seen as a chain
530
+ of squares pack more well even if the saturation coverage is smaller for monomers (squares) and short
531
+ oligomers (dimers).
532
+
533
+ .5
534
+ 1.5
535
+ b
536
+ a
537
+ S( Φ),Dimers
538
+ .- S( Φ),Trimers
539
+ 0.5
540
+ +
541
+ 0.5
542
+ :
543
+ .
544
+ L
545
+ 10
546
+ 15
547
+ 20
548
+ 25
549
+ 5
550
+ 10
551
+ 15
552
+ 20
553
+ 25
554
+ Figure 5. Functions of autocorrelation. Behavior autocorrelation function is depicted as a function of radius
555
+ for square, dimer, trimer, tetramer, pentamer and hexamer.
556
+
557
+ The average structure seen by a generic particle of the system described by G(r) displayed in Figure 5,
558
+ shows a full agreement with the predicted theoretical regimes found in literature 56-57. In all cases, we
559
+ observe a pronounced peak at a distance r~0.5, with the sphere diameter that corresponds to the distance of
560
+ the nearest neighbors in contact. For r larger than the diameter, the probability to find neighbors decreases.
561
+ In fluid-like systems, theoretically for 𝜑 ≲ 0.55, 56-58 the G(r) is known to oscillate with decreasing
562
+ amplitude.
563
+
564
+ Conclusions
565
+
566
+ For a range of stiff polymers produced using squared monomers, we show the maximum random coverage
567
+ or saturation coverage in this paper and contrast our findings with those reported in the literature. In order
568
+ to do this, we enhanced an algorithm that was described in Ref 32. We prove the validity of our method by
569
+ calculating the RSA saturation densities of polymers (dimer, trimer, and tetramer) and showing their
570
+ consistency with prior findings in the literature.
571
+ The RSA model shown here may be extended to squares that may change into rectangles with larger aspect
572
+ ratios to incorporate anisotropic particles in future research. Moreover, like ref43 it can also include branched
573
+ or more flexible polymers. Biological molecules are usually non-spherical, as seen by the previous example,
574
+ and when their surface area in contact with the substrate is greatest, they firmly cling. According to
575
+ experimental results, Schaaf et al. 59 discovered that the maximum substrate coverage they were able to
576
+ achieve during the adsorption of fibrinogen—a non-spherical protein with an aspect ratio of roughly 7.5—
577
+ was only about 40%, which was lower than the absorption coverage predicted by the RSA of hard discs—
578
+ which is around 55%—and seen in experiments involving reasonably spherical globular proteins8 (A similar
579
+ impact was noted for albumin adsorption 60 ).
580
+ Here are some pertinent queries:
581
+ How does increasing the aspect ratio affect the saturation coverage of the substrate?
582
+ How does the particle shape impact the kinetics over both short and long time periods?
583
+
584
+ Square
585
+ 5
586
+ . Trimer
587
+ .Hexamer
588
+ 6
589
+ 8What are the similarities and differences between equilibrium configurations produced by RSA and
590
+ configurations with equivalent surface coverage?
591
+ These questions will get their solutions in upcoming publications. This study's findings are pertinent since
592
+ they considered a variety of particle morphologies, including those of asphaltene, graphene, cellulose
593
+ nanocrystals, and kaolinite, among others 61-64.
594
+ The findings are important because they might help to understand how polymers behave when they are
595
+ close to surfaces. For instance, numerous biological processes depend on proteins adhering to different
596
+ surfaces. Understanding and having control over how protein molecules attach to surfaces and interact with
597
+ them is essential when creating biomaterials. For instance, among other things, the production of
598
+ biocompatible materials requires decreasing the adsorption of blood proteins to the material's surface. It is
599
+ generally known that platelet adhesion followed by blood protein adsorption can result in surface-induced
600
+ thrombosis. When protein adsorption is prevented or diminished, there is very little platelet adhesion to the
601
+ surface. Eliminating lysozyme buildup from the surface of contact lenses is another illustration. In other
602
+ circumstances, we would like to promote the adsorption of some proteins while inhibiting the adsorption
603
+ of others.
604
+ Conflict of interest statement: Author declares no conflict of interest
605
+
606
+ Data availability statement: The datasets generated during and/or analysed during the current study are
607
+ not publicly available but are available from the corresponding author on reasonable request.
608
+
609
+ References
610
+
611
+ 1.
612
+ Zhang, G., Precise algorithm to generate random sequential adsorption of hard polygons at
613
+ saturation. Physical Review E 2018, 97 (4), 043311.
614
+ 2.
615
+ Zhang, G.; Torquato, S., Precise algorithm to generate random sequential addition of hard
616
+ hyperspheres at saturation. Physical Review E 2013, 88 (5), 053312.
617
+ 3.
618
+ Zhang, G.; Stillinger, F. H.; Torquato, S., Transport, geometrical, and topological properties of
619
+ stealthy disordered hyperuniform two-phase systems. the J. Chem. Phys. 2016, 145 (24), 244109.
620
+ 4.
621
+ Torquato, S., Perspective: Basic understanding of condensed phases of matter via packing models.
622
+ the J. Chem. Phys. 2018, 149 (2), 020901.
623
+ 5.
624
+ Petrone, L.; Cieśla, M., Random sequential adsorption of oriented rectangles with random aspect
625
+ ratio. Physical Review E 2021, 104 (3), 034903.
626
+ 6.
627
+ Abbasi Moud, A., Colloidal and Sedimentation Behavior of Kaolinite Suspension in Presence of
628
+ Non-Ionic Polyacrylamide (PAM). Gels 2022, 8 (12), 807.
629
+ 7.
630
+ Shelke, P. B., Random sequential adsorption of n-star objects. Surface Science 2016, 644, 34-40.
631
+ 8.
632
+ Feder, J.; Giaever, I., Adsorption of ferritin. journal colloid interface sci. 1980, 78 (1), 144-154.
633
+ 9.
634
+ Swendsen, R. H., Dynamics of random sequential adsorption. Physical Review A 1981, 24 (1), 504.
635
+ 10.
636
+ Talbot, J.; Tarjus, G.; Schaaf, P., Unexpected asymptotic behavior in random sequential adsorption
637
+ of nonspherical particles. Physical Review A 1989, 40 (8), 4808.
638
+ 11.
639
+ Vigil, R. D.; Ziff, R. M., Random sequential adsorption of unoriented rectangles onto a plane. the
640
+ J. Chem. Phys. 1989, 91 (4), 2599-2602.
641
+ 12.
642
+ Viot, P.; Tarjus, G., Random sequential addition of unoriented squares: breakdown of Swendsen's
643
+ conjecture. EPL (Europhysics Letters) 1990, 13 (4), 295.
644
+ 13.
645
+ Adamczyk, Z.; Barbasz, J.; Cieśla, M., Kinetics of fibrinogen adsorption on hydrophilic substrates.
646
+ Langmuir 2010, 26 (14), 11934-11945.
647
+
648
+ 14.
649
+ Adamczyk, Z.; Barbasz, J.; Cieśla, M., Mechanisms of fibrinogen adsorption at solid substrates.
650
+ Langmuir 2011, 27 (11), 6868-6878.
651
+ 15.
652
+ Rabe, M.; Verdes, D.; Seeger, S., Understanding protein adsorption phenomena at solid surfaces.
653
+ advances Colloid Interface Sci. 2011, 162 (1-2), 87-106.
654
+ 16.
655
+ Finch, C. A.; Hickman, J. J. In A continuum hard-sphere model of protein adsorption, Proceedings
656
+ of the ACM Conference on Bioinformatics, Computational Biology and Biomedicine, 2012; pp 573-575.
657
+ 17.
658
+ Rényi, A., On a one-dimensional problem concerning space-filling. Publ. Math. Inst. Hungar.
659
+ Acad. Sci. 1958, 3, 109-127.
660
+ 18.
661
+ Cieśla, M.; Ziff, R. M., Boundary conditions in random sequential adsorption. Journal of Statistical
662
+ Mechanics: Theory and Experiment 2018, 2018 (4), 043302.
663
+ 19.
664
+ Cieśla, M.; Nowak, A., Managing numerical errors in random sequential adsorption. Surface
665
+ Science 2016, 651, 182-186.
666
+ 20.
667
+ Wang, J.-S., A fast algorithm for random sequential adsorption of discs. International Journal of
668
+ Modern Physics C 1994, 5 (04), 707-715.
669
+ 21.
670
+ Torquato, S.; Uche, O.; Stillinger, F., Random sequential addition of hard spheres in high Euclidean
671
+ dimensions. Physical Review E 2006, 74 (6), 061308.
672
+ 22.
673
+ Chen, E. R.; Holmes-Cerfon, M., Random sequential adsorption of discs on constant-curvature
674
+ surfaces: plane, sphere, hyperboloid, and projective plane. arXiv preprint arXiv:1709.05029 2017.
675
+ 23.
676
+ Hinrichsen, E. L.; Feder, J.; Jøssang, T., Random packing of disks in two dimensions. Physical
677
+ Review A 1990, 41 (8), 4199.
678
+ 24.
679
+ Wang, J.-S., Series expansion and computer simulation studies of random sequential adsorption.
680
+ colloids Surf. Physicochem. Eng. Asp. 2000, 165 (1-3), 325-343.
681
+ 25.
682
+ Brosilow, B. J.; Ziff, R. M.; Vigil, R. D., Random sequential adsorption of parallel squares.
683
+ Physical Review A 1991, 43 (2), 631.
684
+ 26.
685
+ Blaisdell, B. E.; Solomon, H., On random sequential packing in the plane and a conjecture of
686
+ Palasti. Journal of Applied Probability 1970, 7 (3), 667-698.
687
+ 27.
688
+ Dickman, R.; Wang, J. S.; Jensen, I., Random sequential adsorption: Series and virial expansions.
689
+ the J. Chem. Phys. 1991, 94 (12), 8252-8257.
690
+ 28.
691
+ Tory, E. M.; Jodrey, W.; Pickard, D., Simulation of random sequential adsorption: Efficient
692
+ methods and resolution of conflicting results. Journal of Theoretical Biology 1983, 102 (3), 439-445.
693
+ 29.
694
+ Akeda, Y.; Hori, M., On random sequential packing in two and three dimensions. Biometrika 1976,
695
+ 63 (2), 361-366.
696
+ 30.
697
+ Jodrey, W.; Tory, E., Random sequential packing in Rn. Journal of statistical computation and
698
+ simulation 1980, 10 (2), 87-93.
699
+ 31.
700
+ Moud, A. A., Examination of saturation coverage of polygons using random sequential adsorption
701
+ algorithm. arXiv preprint arXiv:2212.13849 2022.
702
+ 32.
703
+ Adamczyk, Z.; Siwek, B.; Zembala, M.; Weroński, P., Influence of polydispersity on random
704
+ sequential adsorption of spherical particles. journal colloid interface sci. 1997, 185 (1), 236-244.
705
+ 33.
706
+ Gottschalk, S.; Lin, M. C.; Manocha, D. In OBBTree: A hierarchical structure for rapid
707
+ interference detection, Proceedings of the 23rd annual conference on Computer graphics and interactive
708
+ techniques, 1996; pp 171-180.
709
+ 34.
710
+ Adamczyk, Z.; Weroński, P., Random sequential adsorption of spheroidal particles: kinetics and
711
+ jamming limit. the J. Chem. Phys. 1996, 105 (13), 5562-5573.
712
+ 35.
713
+ Schaaf, P.; Talbot, J., Surface exclusion effects in adsorption processes. the J. Chem. Phys. 1989,
714
+ 91 (7), 4401-4409.
715
+ 36.
716
+ Adamczyk, Z.; Siwek, B.; Zembala, M., Kinetics of localized adsorption of particles on
717
+ homogeneous surfaces. journal colloid interface sci. 1992, 151 (2), 351-369.
718
+ 37.
719
+ Viot, P.; Tarjus, G.; Ricci, S.; Talbot, J., Random sequential adsorption of anisotropic particles. I.
720
+ Jamming limit and asymptotic behavior. the J. Chem. Phys. 1992, 97 (7), 5212-5218.
721
+ 38.
722
+ Evans, J. W., Random and cooperative sequential adsorption. Reviews of modern physics 1993, 65
723
+ (4), 1281.
724
+
725
+ 39.
726
+ Talbot, J.; Tarjus, G.; Van Tassel, P.; Viot, P., From car parking to protein adsorption: an overview
727
+ of sequential adsorption processes. colloids Surf. Physicochem. Eng. Asp. 2000, 165 (1-3), 287-324.
728
+ 40.
729
+ Cieśla, M., Properties of random sequential adsorption of generalized dimers. Physical Review E
730
+ 2014, 89 (4), 042404.
731
+ 41.
732
+ Hinrichsen, E. L.; Feder, J.; Jøssang, T., Geometry of random sequential adsorption. Journal of
733
+ statistical physics 1986, 44 (5), 793-827.
734
+ 42.
735
+ Privman, V.; Wang, J.-S.; Nielaba, P., Continuum limit in random sequential adsorption. Physical
736
+ Review B 1991, 43 (4), 3366.
737
+ 43.
738
+ Cieśla, M., Continuum random sequential adsorption of polymer on a flat and homogeneous
739
+ surface. Physical Review E 2013, 87 (5), 052401.
740
+ 44.
741
+ Ciesla, M.; Barbasz, J., Random sequential adsorption on fractals. the J. Chem. Phys. 2012, 137
742
+ (4), 044706.
743
+ 45.
744
+ Cieśla, M.; Barbasz, J., Random packing of spheres in Menger sponge. the J. Chem. Phys. 2013,
745
+ 138 (21), 214704.
746
+ 46.
747
+ Cieśla, M.; Barbasz, J., Kinetics of random sequential adsorption of nearly spherically symmetric
748
+ particles. Physical Review E 2014, 89 (2), 022401.
749
+ 47.
750
+ Palásti, I., On some random space filling problems. Publ. Math. Inst. Hung. Acad. Sci 1960, 5, 353-
751
+ 359.
752
+ 48.
753
+ Shelke, P. B.; Limaye, A., Dynamics of Random Sequential Adsorption (RSA) of linear chains
754
+ consisting of n circular discs—Role of aspect ratio and departure from convexity. Surface Science 2015,
755
+ 637, 1-4.
756
+ 49.
757
+ Budinski-Petković, L.; Kozmidis-Luburić, U., Jamming configurations for irreversible deposition
758
+ on a square lattice. Physica A: Statistical Mechanics and its Applications 1997, 236 (3-4), 211-219.
759
+ 50.
760
+ Schaaf, P.; Talbot, J., Kinetics of random sequential adsorption. physical rev. lett. 1989, 62 (2),
761
+ 175.
762
+ 51.
763
+ Speedy, R. J., Accurate theory of the hard sphere fluid. Journal of the Chemical Society, Faraday
764
+ Transactions 2: Molecular and Chemical Physics 1977, 73 (5), 714-721.
765
+ 52.
766
+ Lebovka, N. I.; Karmazina, N. N.; Tarasevich, Y. Y.; Laptev, V. V., Random sequential adsorption
767
+ of partially oriented linear k-mers on a square lattice. Physical Review E 2011, 84 (6), 061603.
768
+ 53.
769
+ Cieśla, M.; Barbasz, J., Ordering in fibrinogen layers: A numerical study. colloids Surf. B
770
+ Biointerfaces 2013, 110, 178-182.
771
+ 54.
772
+ Barbasz, J.; Cieśla, M., Domain structure created by irreversible adsorption of dimers. arXiv
773
+ preprint arXiv:1301.4697 2013.
774
+ 55.
775
+ Hansen, J.-P.; McDonald, I. R., Theory of simple liquids: with applications to soft matter.
776
+ Academic press: 2013.
777
+ 56.
778
+ Richard, P.; Oger, L.; Troadec, J.-P.; Gervois, A., Geometrical characterization of hard-sphere
779
+ systems. Physical Review E 1999, 60 (4), 4551.
780
+ 57.
781
+ Donev, A.; Torquato, S.; Stillinger, F. H., Pair correlation function characteristics of nearly jammed
782
+ disordered and ordered hard-sphere packings. Physical Review E 2005, 71 (1), 011105.
783
+ 58.
784
+ Aste, T.; Di Matteo, T., Structural transitions in granular packs: statistical mechanics and statistical
785
+ geometry investigations. The European Physical Journal B 2008, 64 (3), 511-517.
786
+ 59.
787
+ Schaaf, P.; Déjardin, P.; Johner, A.; Schmitt, A., Characteristic time scales for the adsorption
788
+ process for fibrinogen on silica. Langmuir 1992, 8 (2), 514-517.
789
+ 60.
790
+ Mura-Galelli, M.; Voegel, J.; Behr, S.; Bres, E.; Schaaf, P., Adsorption/desorption of human serum
791
+ albumin on hydroxyapatite: a critical analysis of the Langmuir model. Proceedings of the National Academy
792
+ of Sciences 1991, 88 (13), 5557-5561.
793
+ 61.
794
+ Moud, A. A., Asphaltene induced changes in rheological properties: A review. Fuel 2022, 316,
795
+ 123372.
796
+ 62.
797
+ Abbasi Moud, A.; Hatzikiriakos, S. G., Kaolinite colloidal suspensions under the influence of
798
+ sodium dodecyl sulfate. physics Fluid 2022, 34 (1), 013107.
799
+
800
+ 63.
801
+ Moud, A. A., Recent advances in utility of artificial intelligence towards multiscale colloidal based
802
+ materials design. colloid Interface Sci. Commun. 2022, 47, 100595.
803
+ 64.
804
+ Piette, J.; Moud, A. A.; Poisson, J.; Derakhshandeh, B.; Hudson, Z. M.; Hatzikiriakos, S. G.,
805
+ Rheology of mature fine tailings. physics Fluid 2022, 34 (6), 063104.
806
+
807
+
808
+
809
+
9dAyT4oBgHgl3EQf3Pmp/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
9dE4T4oBgHgl3EQfdwwo/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:7c3111bd9ab83e126d326f84d3d1f8bdc48f27052c7fb3e8f825615f6f4970be
3
+ size 180911
BtFJT4oBgHgl3EQfsi1r/content/tmp_files/2301.11613v1.pdf.txt ADDED
@@ -0,0 +1,1445 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Broadband three-mode converter and multiplexer based on
2
+ cascaded symmetric Y-junctions and subwavelength engineered
3
+ MMI and phase shifters
4
+ David González-Andradea,*, Irene Olivaresb, Raquel Fernández de Caboc, Jaime Vilasb, Antonio
5
+ Diasb, Aitor V. Velascoc
6
+ a Centre de Nanosciences et de Nanotechnologies, CNRS, Université Paris-Saclay, Palaiseau 91120, France
7
+ b Alcyon Photonics S.L., Madrid 28004, Spain
8
+ c Instituto de Óptica Daza de Valdés, Consejo Superior de Investigaciones Científicas (CSIC), Madrid 28006, Spain
9
+ * Corresponding author: [email protected]
10
+ ARTICLE INFO
11
+
12
+ Keywords:
13
+ Silicon photonics
14
+ Mode-division
15
+ multiplexing
16
+ Subwavelength
17
+ metamaterial
18
+ MMI coupler
19
+ Phase shifter
20
+ Y-junction
21
+ ABSTRACT
22
+
23
+ Mode-division multiplexing has emerged as a promising route for increasing
24
+ transmission capacity while maintaining the same level of on-chip integration. Despite
25
+ the large number of on-chip mode converters and multiplexers reported for the silicon-
26
+ on-insulator platform, scaling the number of multiplexed modes is still a critical
27
+ challenge. In this paper, we present a novel three-mode architecture based on
28
+ multimode interference couplers, passive phase shifters and cascaded symmetric Y-
29
+ junctions. This architecture can readily operate up to the third-order mode by including
30
+ a single switchable phase shifter. Moreover, we exploit subwavelength grating
31
+ metamaterials to overcome bandwidth limitations of multimode interference couplers
32
+ and phase shifters, resulting in a simulated bandwidth of 161 nm with insertion loss
33
+ and crosstalk below 1.18 dB and -20 dB, respectively.
34
+ 1. Introduction
35
+ The relentless growth of global Internet traffic has been
36
+ driven in recent years by the emergence of data-hungry
37
+ services and their mass adoption by an increasingly
38
+ interconnected society [1-3]. Moreover, the cloud nature
39
+ of many new applications such as machine learning or
40
+ artificial intelligence require large data sets to be
41
+ processed on internal servers or transferred between data
42
+ centers. This resource-intensive paradigm for accessing,
43
+ computing, and storing data has led to the creation of
44
+ hyperscale data centers consisting of thousands of
45
+ servers located in the same physical facility [4]. To cope
46
+ with the resulting zetta scale of annual data flow, modern
47
+ data centers have been relying on optical technologies for
48
+ both long-haul and few-meter interconnects. Compared
49
+ to
50
+ their
51
+ electronic
52
+ counterparts,
53
+ these
54
+ optical
55
+ technologies offer higher processing speeds, broader
56
+ bandwidths and lower latency and energy consumption.
57
+ Silicon photonics, leveraging the mature fabrication
58
+ facilities of the microelectronics industry, plays a key
59
+ role in the optical interconnect industry due to its
60
+ capacity for high-yield and low-cost mass production of
61
+ high-performance optoelectronic circuits [5,6].
62
+ However, the development of next-generation
63
+ datacenters for Tbps communications and exascale
64
+ computing systems
65
+ is not feasible by scaling
66
+ infrastructures alone and requires increasingly efficient
67
+ optical interconnects for short-reach distances [7]. As
68
+ single-mode transmission approaches its fundamental
69
+ limits, space-division multiplexing has emerged as a
70
+ promising way to further improve the transmission
71
+ capacity of optical interconnects through the use of
72
+ multicore or multimode waveguides [8]. The latter,
73
+ which is also called mode-division multiplexing (MDM),
74
+ has attracted an increasing interest as it leverages the
75
+ orthogonality of the eigenmodes supported by a single
76
+ multimode waveguide, thus allowing to maintain the
77
+ same level of on-chip integration [9,10]. That is, MDM
78
+ enables encoding different data channels into specific
79
+ spatial modes, increasing capacity proportionally to the
80
+ number of modes used.
81
+ Numerous
82
+ on-chip
83
+ mode
84
+ converters
85
+ and
86
+ multiplexers/demultiplexers
87
+ (MCMD)
88
+ have
89
+ been
90
+ proposed for the silicon-on-insulator (SOI) platform to
91
+ date. Asymmetric Y-junctions are based on the principle
92
+ of mode evolution in adiabatic structures, which results
93
+ in broad operating bandwidths but also in long device
94
+ lengths [11-13]. The minimum feature size of current
95
+ lithography processes also has a significant impact in
96
+ these devices, since the finite resolution at which the tip
97
+ can be fabricated severely hampers their performance.
98
+ Asymmetric directional couplers (ADCs) [14], relying
99
+ on evanescent coupling between adjacent waveguides,
100
+ are well suited for implementing high-channel count
101
+ MDM systems, but they typically exhibit narrow
102
+ bandwidths, and their performance is highly susceptible
103
+ to fabrication errors. Adiabatic tapers have been
104
+ employed in the coupling region of ADCs to improve the
105
+ bandwidth and the resilience against fabrication
106
+ deviations [15]. MCMDs building upon multimode
107
+ interference (MMI) couplers and other auxiliary
108
+
109
+ components such as phase shifters (PSs) and symmetric
110
+ Y-junctions have been proposed as well [16,17], yielding
111
+ low losses and low crosstalk over a relatively broad
112
+ wavelength range (~100 nm).
113
+ The patterning of silicon at the subwavelength scale
114
+ has proven to be a simple yet powerful tool to tailor the
115
+ medium optical properties while inhibiting diffractive
116
+ effects [35]. More specifically, subwavelength (SWG)
117
+ metamaterials
118
+ can
119
+ behave
120
+ as
121
+ a
122
+ homogeneous
123
+ metamaterial that provides flexible dispersion and
124
+ anisotropy engineering, non-feasible in conventional
125
+ strip and rib waveguides. These properties have led to the
126
+ realization
127
+ of
128
+ Si
129
+ devices
130
+ with
131
+ unprecedented
132
+ performance over the past 15 years [36-38]. In the MDM
133
+ field, MCMDs based on subwavelength pixelated
134
+ structures have demonstrated ultra-compact footprints
135
+ [18]. SWGs have also been applied to ADCs and triple-
136
+ waveguide couplers to improve fabrication tolerances
137
+ and extend the operation bandwidth of conventional
138
+ counterparts [19-21]. Furthermore, low losses and low
139
+ crosstalk within ultra-broad bandwidths have also been
140
+ reported using subwavelength engineered MMI couplers
141
+ and PSs, and SWG-slot-assisted adiabatic couplers [22-
142
+ 26].
143
+ Despite the large number of available two-mode
144
+ MCMDs, scaling the number of multiplexed modes
145
+ beyond the fundamental and first-order modes is of great
146
+ importance to multiply the capacity of next-generation
147
+ datacom systems. Although it is fairly straightforward to
148
+ extend operation to a larger number of modes in
149
+ asymmetric Y-junctions and conventional and tapered
150
+ ADCs [27], three- and four-mode MCMD based on MMI
151
+ couplers have only recently been reported [28-32].
152
+ However, the proposed architectures are still limited by
153
+ narrow operating bandwidths and high crosstalk values.
154
+ In this work, we propose a novel MCMD architecture
155
+ based on a 4×4 MMI, three phase shifters and four
156
+ symmetric 1×2 Y-junctions arranged in a conventional
157
+ cascaded configuration. The device operates as a three-
158
+ mode MCDM with passive phase shifters but can readily
159
+ convert up to the third-order mode by including a single
160
+ switchable phase shifter. Moreover, we demonstrate loss
161
+ and crosstalk reduction in a broad bandwidth by SWG-
162
+ engineering of both the MMI coupler and phase shifters.
163
+ Simulations show operation bandwidth of 161 nm with
164
+ insertion loss and crosstalk below 1.18 dB and -20 dB,
165
+ respectively.
166
+ 2. Principle of operation and device design
167
+ To explain the operation principle and the device design,
168
+ let us first focus on the nanophotonic structure shown in
169
+ Fig. 1(a) consisting of a conventional 4×4 MMI, three
170
+ phase shifters (PS1, PS2 and PS3) and four symmetric
171
+ 1×2 Y-junctions (three identical Y1 and a different one
172
+ Y2). SWG enhancement of the proposed architecture,
173
+ shown in Fig. 1(b) and Fig. 1(d) will be discussed in
174
+ epigraphs 4 and 5. An SOI platform with a thin Si wire
175
+ surrounded by SiO2 bottom layer and upper cladding are
176
+ considered. A schematic view of the waveguide cross-
177
+ section is shown in Fig. 1(c) for clarity.
178
+ In order to illustrate the operation of the MCMD, let
179
+ us focus on the mode evolution and phase relations in
180
+ each individual constituent of the MCMD. Here, we aim
181
+
182
+ Fig. 1. Three-dimensional schematic of the proposed three-mode converter and multiplexer/demultiplexer comprising a 4×4 MMI, three
183
+ phase shifters and four symmetric Y-junctions implemented with (a) conventional homogeneous and (b) SWG metamaterial waveguides.
184
+ (c) Cross-sectional view of the SOI strip waveguides with a SiO2 cladding. (c) Top view of the SWG waveguides with their main
185
+ geometrical parameters.
186
+
187
+ (a)
188
+ Wi
189
+ MMI
190
+ PS2
191
+ W
192
+ Y1
193
+ 3.
194
+ 2W,
195
+ WA
196
+ Y2
197
+ Wps
198
+ tWs
199
+ Y1
200
+ 2W,
201
+ P
202
+ 2
203
+ PS1<Lpsi
204
+ WMMI
205
+ Y1
206
+ 4W1
207
+ LpS2
208
+ 4
209
+ 2 W,
210
+ PS3
211
+ + Lyl
212
+ LpS3
213
+ 1
214
+ Ly2
215
+ Wi
216
+ Wi
217
+ Lyl
218
+ Li
219
+ LMMI
220
+ PS3
221
+ Z
222
+ X
223
+ (b)
224
+ SWG MMI Ws
225
+ WI+
226
+ SPS2
227
+ SPS3
228
+ WR3
229
+ Y1
230
+ D2
231
+ 2Wi
232
+ 3
233
+ Y2
234
+ Y1
235
+ D
236
+ 2W,
237
+ 2
238
+ WR2
239
+ Y1
240
+ 4WI
241
+ WRI
242
+ 4
243
+ 2Wi
244
+ Lyl
245
+ Ly2
246
+ Wi
247
+ Ly1
248
+ SPS1
249
+ LsT LsMMI
250
+ LSPS3
251
+ 1
252
+ (c)
253
+ (d)
254
+ D
255
+ Si
256
+ H
257
+ Z4
258
+ yt
259
+ SiO2
260
+ y
261
+ W
262
+ xat mode conversion and multiplexing of the first four
263
+ modes for transverse-electric (TE) polarization, that is,
264
+ the fundamental mode (TE0), the first-order mode (TE1),
265
+ the second-order mode (TE2) and the third-order mode
266
+ (TE3).
267
+ Our MCMD includes two types of symmetric
268
+ multimode 1×2 Y-junctions: Y1, with a stem supporting
269
+ up to two modes; and Y2, with a wider stem supporting
270
+ up to four modes. In general, multimode symmetric 1×2
271
+ Y-junctions transform the two in-phase 𝑚𝑡ℎ-order modes
272
+ in the arms into the (2𝑚)𝑡ℎ-order mode in the stem when
273
+ 𝑚 is even, and into the (2𝑚 + 1)𝑡ℎ-order mode in the
274
+ steam when 𝑚 is odd [33]. Likewise, two anti-phase
275
+ 𝑚𝑡ℎ-order modes in the arms are transformed into the
276
+ (2𝑚 + 1)𝑡ℎ-order mode in the stem when 𝑚 is even, and
277
+ into the (2𝑚)𝑡ℎ-order mode in the stem when 𝑚 is odd.
278
+ Figure 2(a) illustrates how this principle affects Y1
279
+ operation. Since only two modes are supported by the Y1
280
+ stem, a TE0 (red) mode at the stem results in two in-phase
281
+ TE0 modes at the arms, whereas TE1 (orange) mode at
282
+ the stem results in two anti-phase TE0 modes at the arms.
283
+ Figure 2(b) shows the extension of this behavior to four
284
+ mode operation in Y2. Operation for TE0 (red) and TE1
285
+ (orange) is the same as in Y1, whereas injection of TE2
286
+ (green) and TE3 (purple) modes through the stem
287
+ waveguide generates two anti-phase TE1 or two in-phase
288
+ TE1 modes at the arms, respectively. Therefore, by
289
+ cascading Y1 and Y2, and judiciously tailoring the phase
290
+ relations induced by the rest of the MCMD, mode
291
+ conversion and multiplexing between up to four modes
292
+ can be achieved. We will hence study the phase shift
293
+ induced by the 4×4 MMI coupler, and subsequently
294
+ design a phase shifter architecture that satisfies the phase
295
+ distributions imposed by the cascaded Y-junctions.
296
+ Bachmann et al. already derived a set of equations to
297
+ calculate the phase relations of 𝑁×𝑁 MMI couplers [34].
298
+ At this point, it is important to mention that the definition
299
+ of the phase in this work is 𝜑 = 𝛽𝑥 − 𝜔𝑡, where 𝛽 is the
300
+ phase constant (also known as propagation constant), 𝑥
301
+ is the propagation direction and the term −𝜔𝑡
302
+ corresponds to the temporal dependence. As in [34] the
303
+ authors used the opposite phase convention, i.e., = 𝜔𝑡 −
304
+ 𝛽𝑥, equations can be rewritten as follows:
305
+ 𝑖 + 𝑗 even: 𝜑𝑖𝑗 = −𝜑0 − 𝜋 −
306
+ 𝜋(𝑗−𝑖)(2𝑁−𝑗+𝑖)
307
+ 4𝑁
308
+ ,
309
+ (1)
310
+ 𝑖 + 𝑗 odd: 𝜑𝑖𝑗 = −𝜑0 −
311
+ 𝜋(𝑗+𝑖−1)(2𝑁−𝑗−𝑖+1)
312
+ 4𝑁
313
+ ,
314
+ (2)
315
+ where 𝜑0 is a constant phase, 𝑖 and 𝑗 are the indices of
316
+ the 𝑁 inputs and outputs, respectively. Using Eqs. (1) and
317
+ (2), the phase relations of a 4×4 MMI coupler can be
318
+ calculated as shown in Table 1. Please note the input and
319
+ output numbering in Fig. 3.
320
+ Table 1
321
+ Calculated phase relations 𝝋𝒊𝒋 of a 4×4 MMI coupler.
322
+ 𝒋
323
+ 𝒊
324
+ 1
325
+ 2
326
+ 3
327
+ 4
328
+ 1
329
+ −𝜋
330
+ −3𝜋 4
331
+
332
+ −7𝜋 4
333
+
334
+ −𝜋
335
+ 2
336
+ −3𝜋 4
337
+
338
+ −𝜋
339
+ −𝜋
340
+ −7𝜋 4
341
+
342
+ 3
343
+ 𝜋 4
344
+
345
+ −𝜋
346
+ −𝜋
347
+ −3𝜋 4
348
+
349
+ 4
350
+ −𝜋
351
+ 𝜋 4
352
+
353
+ −3𝜋 4
354
+
355
+ −𝜋
356
+
357
+ We then calculate, for each input port, the resulting
358
+ phase difference at the two upper output ports (∆𝜑12) and
359
+ the two lower ports (∆𝜑34) as:
360
+ ∆𝜑12 = 𝜑𝑖1 − 𝜑𝑖2,
361
+ (3)
362
+ ∆𝜑34 = 𝜑𝑖3 − 𝜑𝑖4,
363
+ (4)
364
+ Calculated phase differences are shown in Table 2.
365
+ Since phase evolution at both the MMIs and Y-splitters
366
+ are fixed, we then need to design a combination of PSs
367
+ (placement and phase shift values), that results in the
368
+ required phase relations. As shown in Figure 1(a), we
369
+ achieve this goal by including a first phase shifter (PS1)
370
+ between inputs 3 and 2 of the MMI, with a phase shift of
371
+ 𝜋 2
372
+ ⁄ ; a second phase shifter (PS2) between outputs 2 and
373
+ 1, with a phase shift of − 𝜋 4
374
+ ⁄ ; and a third phase shifter
375
+ (PS3) between outputs 3 and 4 with a phase shift of
376
+ 3 𝜋 4
377
+ ⁄ . An additional two-mode Y-junction (Y1) is
378
+ included at MCMD port 2 to satisfy even-order modes
379
+ phase conditions, as discussed hereunder.
380
+ Figure 4 shows the operation of the device working
381
+ in multiplexer configuration, including the value of the
382
+ phase relations at different locations for clarity. It should
383
+ be noted that phase values have been calculated with
384
+
385
+
386
+ Fig. 2. Schematic and principle of operation of a multimode
387
+ symmetric 1×2 Y-junction for (a) a two-mode stem, and (b) a
388
+ four-mode stem.
389
+
390
+ Fig. 3. Schematic of a 4×4 MMI coupler, illustrating port and
391
+ phase notations.
392
+
393
+ (a)
394
+ TEo TEo
395
+ TEo
396
+ Y1
397
+ TE1
398
+ TEo TEo
399
+ y4
400
+ x
401
+ (b)
402
+ TE, TEo
403
+ TE2 TEo
404
+ TE TEo
405
+ Y2
406
+ TE, TEo
407
+ TE,
408
+ TE1
409
+ TE, TEo
410
+ yt
411
+ xInputs (i)
412
+ Outputs (i)
413
+ 4
414
+ 3
415
+ 4×4 MMI
416
+ 2
417
+ △34Table 2
418
+ Calculated phase differences between MMI output pairs for each input.
419
+ 𝒊
420
+ ∆𝝋𝟏𝟐
421
+ ∆𝝋𝟑𝟒
422
+ 1
423
+ −𝜋 4
424
+
425
+ −3𝜋 4
426
+
427
+ 2
428
+ 𝜋 4
429
+
430
+ 3𝜋 4
431
+
432
+ 3
433
+ 5𝜋 4
434
+
435
+ −𝜋 4
436
+
437
+ 4
438
+ −5𝜋 4
439
+
440
+ 𝜋 4
441
+
442
+
443
+ with respect to the mode phase at the input ports, which
444
+ is considered to be zero for simplicity. When light is
445
+ injected through MCMD port 1 [Fig. 4(a)], the
446
+ combination of all the aforementioned phase relations
447
+ results in all modes arriving in-phase at the arms of the
448
+ cascaded Y-junctions. Thus, two in-phase TE0 modes are
449
+ coupled into Y1 stems, which subsequently generate the
450
+ desired TE0 mode at the multimode stem waveguide of
451
+ Y2 (MCMD port 4).
452
+ When light is injected through MCMD port 2 [Fig.
453
+ 4(b)], the combination of Y1 and PS1 results in
454
+ simultaneous light coupling to MMI input ports 2 and 3,
455
+ but with a 𝜋 2
456
+ ⁄ phase difference. This in turn generates
457
+ in-phase modes in the upper arms that are in anti-phase
458
+ with the two in-phase modes in the lower arms at their
459
+ arrival at the cascaded Y-junctions. This combination
460
+ results in TE1 generation at the MCMD output.
461
+ Finally, when light is injected through MCMD port 3
462
+ [Fig. 4(c)], that is, MMI input port 4, in-phase modes are
463
+ generated in the middle arms, which are in anti-phase
464
+ with the two in-phase modes generated in the top and
465
+ bottom arms, before the cascaded Y-junctions. This
466
+ results in anti-phase TE1 modes at the output of Y1
467
+ stems, which subsequently generate the TE2 mode at the
468
+ MCDM output.
469
+ So far, we have only considered passive PSs, that is,
470
+ PSs with a fixed phase shift. However, if the phase
471
+ introduced by PS1 is 3𝜋 2
472
+ ⁄ instead of 𝜋 2
473
+ ⁄ , it is possible
474
+ to generate the TE3 mode at MCMD output [Fig. 4(d)].
475
+ For illustrative purposes, we represent this phase shift by
476
+ switching the position of the tapers in PS1. This feature
477
+ opens the possibility of extending MCMD operation to
478
+ four modes using a single switchable PS.
479
+ 3. Proof-of-concept results
480
+ To verify the principle of operation explained in the
481
+ previous section, we firstly optimized each constituent
482
+ (i.e., MMI, phase shifters and Y-junctions) for a design
483
+ wavelength of 1550 nm. We chose a standard silicon
484
+ thickness of 𝐻 = 220 nm and an interconnection
485
+ waveguide width of 𝑊𝐼 = 400 nm. Thus, symmetric Y-
486
+ junctions are designed with stem widths of 2𝑊𝐼 =
487
+ 800 nm for Y1 and 4𝑊𝐼 = 1600 nm for Y2.
488
+ Geometrical parameters of the 4×4 MMI coupler, the
489
+ phase shifters and the symmetric Y-junction are
490
+ summarized in Table 3.
491
+ In order to evaluate the performance of each
492
+ constituent element, the figures of merit for the MMI are
493
+ the excess loss (EL), imbalance (IB) and phase error
494
+ (PE):
495
+ EL𝑖 [dB] = −10log10 (∑ |S𝑗𝑖|
496
+ 2
497
+ 𝑗
498
+ ),
499
+ (5)
500
+ IB𝑖
501
+ 𝑗𝑘 [dB] = 10log10 (|S𝑗𝑖|
502
+ 2 |S𝑘𝑖|2
503
+
504
+ ),
505
+ (6)
506
+ PE𝑖
507
+ 𝑗𝑘[°] = [∠(S𝑗𝑖 S𝑘𝑖
508
+
509
+ ) − 𝜑𝑖𝑑𝑒𝑎𝑙] · 180 π
510
+ ⁄ ,
511
+ (7)
512
+ where S𝑗𝑖 and S𝑘𝑖 are the scattering parameters for input
513
+ 𝑖 and outputs 𝑗 and 𝑘, and 𝜑𝑖𝑑𝑒𝑎𝑙 is the ideal phase
514
+ relation depending on selected input and output ports as
515
+ shown in Table 1. The designed 4×4 MMI exhibits EL <
516
+
517
+ Table 3
518
+ Geometrical parameters of the three-mode converter and
519
+ multiplexer/demultiplexer with homogeneous waveguides.
520
+ Constituent
521
+ Parameter
522
+
523
+ Value
524
+ Waveguides
525
+ Width
526
+ 𝑊𝐼
527
+ 400 nm
528
+ MMI
529
+ Separation
530
+ 𝑊𝑆
531
+ 500 nm
532
+ Access width
533
+ 𝑊𝐴
534
+ 1.3 µm
535
+ Taper length
536
+ 𝐿𝑇
537
+ 6 µm
538
+ MMI width
539
+ 𝑊𝑀𝑀𝐼 7.2 µm
540
+ MMI length
541
+ 𝐿𝑀𝑀𝐼 91 µm
542
+ Y1
543
+ Arm width
544
+ 𝑊𝐼
545
+ 400 nm
546
+ Arm length
547
+ 𝐿𝑌1
548
+ 5 µm
549
+ Stem width
550
+ 2𝑊𝐼
551
+ 800 nm
552
+ Y2
553
+ Arm width
554
+ 2𝑊𝐼
555
+ 800 nm
556
+ Arm length
557
+ 𝐿𝑌2
558
+ 20 µm
559
+ Stem width
560
+ 4𝑊𝐼
561
+ 1.6 µm
562
+ PS1
563
+ PS width
564
+ 𝑊𝑃𝑆1 600 nm
565
+ PS length
566
+ 𝐿𝑃𝑆1
567
+ 2.41 µm
568
+ PS2
569
+ PS width
570
+ 𝑊𝑃𝑆2 600 nm
571
+ PS length
572
+ 𝐿𝑃𝑆2
573
+ 8.38 µm
574
+ PS3
575
+ PS width
576
+ 𝑊𝑃𝑆3 600 nm
577
+ PS length
578
+ 𝐿𝑃𝑆3
579
+ 3.61 µm
580
+
581
+ Fig. 4. Principle of operation of the proposed three-mode
582
+ converter and multiplexer/demultiplexer for (a) TE0, (b) TE1,
583
+ (c) TE2 and (d) TE3 mode multiplexing.
584
+
585
+ (a)
586
+ TE, multiplexing
587
+ 3
588
+ TEo
589
+ -T元
590
+ 一元
591
+ T
592
+ 2
593
+ 3元/4-元
594
+ f
595
+ F7元/4
596
+ TEo
597
+ T
598
+ .
599
+ (b)
600
+ TE, multiplexing
601
+ 3
602
+ T
603
+ TE,
604
+
605
+ T
606
+ 元/2
607
+ 3元/4 一元
608
+ TEo
609
+ 0
610
+ 0
611
+ 3元/4
612
+ 0
613
+ 1
614
+ 0
615
+ 0
616
+ (c)
617
+ TE, multiplexing
618
+ TE2
619
+ 3
620
+ TEo
621
+ 一元
622
+ 2
623
+ 元/4
624
+ 0
625
+ 0
626
+
627
+ 3元/40
628
+ 1
629
+ T
630
+ (d)
631
+ TE, multiplexing
632
+ 0
633
+ TE3
634
+ 3
635
+ 0
636
+ 0
637
+ 0
638
+ F3元/4—元
639
+ TEo
640
+ 0
641
+ 0
642
+ 元/2
643
+ 3元/4
644
+ 1
645
+
646
+ yt
647
+ x0.54 dB, IB < ±0.4 dB
648
+ and PE < ±0.32°
649
+ at
650
+ the
651
+ wavelength of 𝜆0 = 1550 nm. Regarding the spectral
652
+ response,
653
+ EL < 2.15 dB,
654
+ IB < ±8.1 dB
655
+ and PE <
656
+ ±46.03° are attained in the entire simulated wavelength
657
+ range (1.45 – 1.65 µm).
658
+ Designed phase shifters introduce small phase
659
+ deviations of only 0.12° for PS1, 0.13° for PS2 and
660
+ 0.16° for PS3, with respect to their target phase
661
+ difference at 1550 nm. However, considering the
662
+ simulated bandwidth of 200 nm, phase errors increase up
663
+ to 9.84° for PS1, 22.28° for PS2, and 12.12° for PS3.
664
+ Symmetric Y-junctions Y1 and Y2 were also
665
+ designed showing negligible excess losses and power
666
+ imbalance between output ports at the design
667
+ wavelength. More specifically, Y1 losses are lower than
668
+ 0.01 dB for both TE0 and TE1 mode operation in the 1.45
669
+ – 1.65 µm wavelength range. Conversely, calculated
670
+ excess losses for Y2 are below 0.15 dB for TE0, TE1, TE2
671
+ and TE3 mode operation within the same bandwidth.
672
+ Once all elements were optimized, two-dimensional
673
+ finite-difference time-domain (FDTD) simulations of the
674
+ whole MCMD were performed by applying the effective
675
+ index method to the original three-dimensional structure
676
+ [see Fig. 1(a)]. The simulated field distribution of the
677
+ three-mode MCMD is shown in Fig. 5(a)-(d),
678
+ demonstrating the successful implementation of the
679
+ phase relations described in section 2.
680
+ Some ripples can be observed for TE0 and TE2 mode
681
+ multiplexing in the stem waveguide of Y-junction Y2
682
+ [see Figs. 5(a) and 5(c)], which we attribute to a higher
683
+ crosstalk between both modes compared to TE1 and TE3
684
+ mode multiplexing.
685
+ The transmittance as a function of the wavelength
686
+ was computed for the complete MCMD [see Fig.5(e)-
687
+ (h)]. At the central wavelength of 𝜆0 = 1550 nm,
688
+ insertion losses are lower than 0.53 dB, 0.79 dB and 0.59
689
+ dB for the generation of TE0, TE1 and TE2 modes in the
690
+ stem waveguide, respectively. Our device also exhibits a
691
+ low crosstalk at the same wavelength with values below
692
+ -21.61 dB for TE0, -28.94 dB for TE1 and -21.11 dB for
693
+ TE2.
694
+ By tuning the value of PS1 to 3 𝜋 2
695
+ ⁄ , TE3 mode
696
+ (instead of TE1 mode) can be generated. In this case,
697
+ insertion losses are below 0.75 dB, and the crosstalk is
698
+ better than -28.79 dB, both at 1550 nm. These results
699
+ corroborate the higher crosstalk for TE2 mode operation,
700
+ which leads to a slight ripple in the field distribution at
701
+ port 4.
702
+ Regarding performance across the spectrum, insertion
703
+ losses lower than 1 dB are attained for a 55 nm
704
+ bandwidth (1542 – 1597 nm), whereas the crosstalk is
705
+ below -20 dB for a 60 nm bandwidth (1537 –1597 nm)
706
+ as shown with vertical lines in Fig. 5. These results prove
707
+ the correct operation of the proposed architecture, but the
708
+ overall bandwidth is significantly limited by the narrow
709
+ spectral response of both the MMI and PSs.
710
+ 4. SWG performance enhancement
711
+ To overcome these bandwidth limitations, we
712
+ propose the MCMD with SWG metamaterials shown in
713
+ Fig. 1(b). The design of each of the constituents of the
714
+ SWG MCMD was performed by individual three-
715
+ dimensional FDTD simulations. The three symmetric Y-
716
+ junction labeled Y1 maintain the same geometrical
717
+ dimensions as those used for the conventional
718
+ multiplexer for the arm and stem widths (see Table 3),
719
+ but arm length was shortened to 𝐿𝑌1 = 2 µm. Y-junction
720
+ Y2 was slightly redesigned to reduce the crosstalk
721
+ between TE0 and TE2 modes by increasing the length of
722
+ the arms to 𝐿𝑌2 = 40 μm.
723
+ A procedure similar to those already reported in
724
+ [39,40] was followed for the optimization of the 4×4
725
+ SWG MMI. We restrict the value of the duty cycle (DC =
726
+ 𝑎 Λ
727
+ ⁄ ) to 0.5 in order to maximize the minimum feature
728
+ size for a given period (Λ) [see Fig.1(d)]. We explored
729
+ then different periods and found that Λ = 222 nm
730
+ significantly flattens the beat length across the spectrum.
731
+ Compared to the conventional MMI section design, the
732
+ width 𝑊𝑆𝑀𝑀𝐼 is increased by 0.8 µm but the length 𝐿𝑆𝑀𝑀𝐼
733
+ is reduced by more than half to ~41.3 µm. To increase
734
+ the quality of the interferometric patterns formed in the
735
+ MMI, the access width is 𝑊𝐵 = 1.7 µm and the
736
+
737
+ Fig. 5. Electric field amplitude |𝐸| in the XY plane at the middle
738
+ of the silicon layer for (a) TE0, (b) TE1, (c) TE2 and (d) TE3
739
+ mode multiplexing. Simulated transmittance to output port 4 as
740
+ a function of the wavelength when TE0 mode is launched into
741
+ (e) input port 1, (f) input port 2 with PS1 = 𝜋 2
742
+ ⁄ , (g) input port
743
+ 3 and (h) input port 2 with PS1 = 3𝜋 2
744
+ ⁄ . Vertical lines indicate
745
+ the bandwidth where IL < 1 dB (55 nm) and XT < −20 dB (60
746
+ nm) are achieved for all modes simultaneously.
747
+
748
+ (a)
749
+ (b)
750
+ (c)
751
+ (d)
752
+ 200
753
+ 0.8
754
+ 150
755
+ 0.6
756
+ X
757
+ 0.4
758
+ 50
759
+ 0.2
760
+ 0
761
+ 420-2-4 420-2-4420-2-4420-2-4
762
+ y (μm)
763
+ y (μm)
764
+ y (μm)
765
+ y (μm)
766
+ (e)
767
+ Input 1
768
+ (G)
769
+ Input 2 (PS1 = π/2)
770
+ (dB)
771
+ 0
772
+ (dB)
773
+ 55 nm
774
+ 55nm
775
+ Transmittance
776
+ Transmittance
777
+ 60 nm
778
+ 60 nm
779
+ -20
780
+ -20
781
+ 40
782
+ TE
783
+ 40
784
+ TE
785
+ 1.45
786
+ 1.5
787
+ 1.55
788
+ 1.6
789
+ 1.65
790
+ 1.45
791
+ 1.5
792
+ 1.551.61.65
793
+ Wavelength (um)
794
+ Wavelength (um)
795
+ (g)
796
+ (h)
797
+ Input 3
798
+ Input2(PS1=3元/2)
799
+ (dB)
800
+ 0
801
+ (dB)
802
+ 55 nm
803
+ 55 nm
804
+ Transmittance
805
+ Transmittance
806
+ 60 nm
807
+ 60 nm
808
+ -20
809
+ 20
810
+ TE,
811
+ TE
812
+ -40
813
+ 40
814
+ TE
815
+ TE
816
+ TE3
817
+ 1.45
818
+ 1.5
819
+ 1.55
820
+ 1.6
821
+ 1.65
822
+ 1.45
823
+ 1.5
824
+ 1.551.6
825
+ 51.65
826
+ Wavelength(um
827
+ Wavelength (um)separation is reduced to 𝑊𝑅 = 0.3 µm. The transition
828
+ between
829
+ the
830
+ interconnection
831
+ waveguides
832
+ (𝑊𝐼 =
833
+ 400 nm) and the access to the MMI section (𝑊𝐵) is
834
+ performed by means of adiabatic SWG tapers with a
835
+ length 𝐿𝑆𝑇 = 13.32 µm. The performance of the 4×4
836
+ SWG MMI is shown in Fig. 6(a)-(c). Owing to the
837
+ symmetry of the structure, only the results obtained when
838
+ injecting light into input ports 1 and 2 are depicted. It is
839
+ observed that the device exhibits EL < 0.77 dB, IB <
840
+ ±1 dB and PE < ±8.02° within a broad bandwidth of
841
+ 200 nm (1.45 – 1.65 µm).
842
+ To drastically extend the operating bandwidth of the
843
+
844
+ nanophotonic phase shifters, we build upon the strategy
845
+ we recently reported in [41] to develop SWG phase
846
+ shifters SPS1, SPS2 and SPS3. Notwithstanding, here we
847
+ employ four parallel SWG waveguides of two different
848
+ widths to implement SPS2 and SPS3. That is, each PS
849
+ has three identical reference SWG waveguides with
850
+ width 𝑊𝐷, and one dissimilar SWG waveguide with
851
+ width 𝑊𝑅. Both the reference and dissimilar waveguides
852
+ have a length of LSPS. Note that for SPS1 this
853
+ configuration is not necessary as only two MMI inputs
854
+ are illuminated for TE1 and TE3 mode generation.
855
+ Analogous to the 4×4 SWG MMI, a flat phase shift can
856
+ be achieved by judicious selecting the SWG period and
857
+ duty cycle. A duty cycle of 0.5 was fixed to maximize
858
+ MFS, while a period of 200 nm resulted in minimum
859
+ phase shift deviation. In order to induce 𝜋 4
860
+ ⁄ , 𝜋 2
861
+ ⁄ , and
862
+ 3𝜋 4
863
+ ⁄ phase shifts, we selected respectively 𝑊𝐷2 =
864
+ 1.8 µm, 𝑊𝑅2 = 1.6 µm, 𝐿𝑆𝑃𝑆2 = 6.2 µm and 𝐿𝑆𝑇2 =
865
+ 3.0 µm for SPS2; 𝑊𝐷1 = 1.8 µm, 𝑊𝑅1 = 1.6 µm,
866
+ 𝐿𝑆𝑃𝑆1 = 16.8 µm and 𝐿𝑆𝑇1 = 3.0 µm for SPS1; and
867
+ 𝑊𝐷3 = 1.8 µm, 𝑊𝑅3 = 1.6 µm, 𝐿𝑆𝑃𝑆3 = 28.2 µm and
868
+ 𝐿𝑆𝑇3 = 3.0 µm for SPS3. The simulated phase shifts are
869
+ shown in Fig. 6(d). Negligible deviations can be
870
+ appreciated with phase shift errors as small as 2.29° for
871
+ SPS1, and 1.15° for SPS2 and SPS3 within the entire
872
+ 1.45 – 1.65 µm wavelength range.
873
+ 5. SWG results
874
+ The simulation of the entire MCMD is quite
875
+ resource-intensive and time-consuming due to the device
876
+ footprint and the need for a fine mesh to simulate SWG-
877
+ based devices. Thus, instead of performing the full
878
+ device simulation, we leverage the S-parameter matrices
879
+ calculated during the design process and concatenate all
880
+ of them using a circuit simulator to obtain the S-
881
+
882
+ Fig. 7. Simulated transmittance as a function of the wavelength of the MCMD with SWG metamaterials when TE0 mode is launched
883
+ into (a) input port 1, (b) input port 2 with SPS1 = 𝜋 2
884
+ ⁄ , (c) input port 3 and (d) input port 2 with SPS1 = 3𝜋 2
885
+ ⁄ . Vertical lines indicate
886
+ the bandwidth where IL < 1 dB (183 nm) and XT < −20 dB (161 nm) are achieved for all modes simultaneously.
887
+
888
+ Fig. 6. Simulated performance of the 4×4 SWG MMI including
889
+ (a) excess loss, (b) imbalance and (c) phase error between
890
+ output ports. (d) Phase error of each SWG PSs as a function of
891
+ the wavelength.
892
+
893
+ (a)
894
+ Input 1
895
+ (b)
896
+ Input 2 (SPS1 = π/2)
897
+ 0
898
+ (dB)
899
+ (dB)
900
+ 0
901
+ 183 nm
902
+ 183 nm
903
+ 161 nm
904
+ 161 nm
905
+ 20
906
+ Transmittance
907
+ Transmittance
908
+ 20
909
+ TE
910
+ TEo
911
+ -40
912
+ 40
913
+ TE,
914
+ TE,
915
+ -60
916
+ TE,
917
+ -60
918
+ T-80
919
+ TE
920
+ -80
921
+ TE
922
+ 1.45
923
+ 1.5
924
+ 1.55
925
+ 1.6
926
+ 1.65
927
+ 1.45
928
+ 1.5
929
+ 1.55
930
+ 1.6
931
+ 1.65
932
+ Wavelength (μm)
933
+ Wavelength (um)
934
+ (c)
935
+ Input 3
936
+ (d)
937
+ Input 2 (SPS1 = 3π/2)
938
+ (dB)
939
+ 183 nm
940
+ (dB)
941
+ 0
942
+ 183 nm
943
+ 161 nm
944
+ 161 nm
945
+ -20
946
+ 20
947
+ Transmittance
948
+ 40
949
+ 4
950
+ TE
951
+ -60
952
+ TE
953
+ 60
954
+ TH
955
+ TE
956
+ TE
957
+ TE.
958
+ -80
959
+ 1.45
960
+ 1.5
961
+ 1.55
962
+ 1.6
963
+ 1.65
964
+ 1.45
965
+ 1.5
966
+ 1.55
967
+ 1.6
968
+ 1.65
969
+ Wavelength (um)
970
+ Wavelength (um)(a)
971
+ (b)
972
+ (dB)
973
+ Input1 (EL)
974
+ (dB)
975
+ —Input 1: 0,/02 (IB12)
976
+ Input2(EL2)
977
+ Input 1: O3/O4 (IB24)
978
+ Imbalance (
979
+ Input 2: O,/0, (IB22)
980
+ 2
981
+ Input 2:0,/04 (IB34)
982
+ 0
983
+ 1.45
984
+ 1.5
985
+ 1.55
986
+ 1.6
987
+ 1.65
988
+ 1.45
989
+ 1.5
990
+ 1.551.6
991
+ 1.65
992
+ Wavelength (μm)
993
+ Wavelength (um)
994
+ (c)
995
+ (d)
996
+ 10
997
+ Input1:012
998
+ 10
999
+ SPS2 (元/4rad)
1000
+ Input 1: Ap
1001
+ SPS1 (元/2rad)
1002
+ error
1003
+ error
1004
+ 5
1005
+ 0
1006
+ Phase
1007
+ Input 2: A934
1008
+ -5
1009
+ SPS1 (3元/2rad)
1010
+ Input2:012
1011
+ -SPS3 (3元/4rad)
1012
+ -10
1013
+ -10
1014
+ 1.45
1015
+ 1.5
1016
+ 1.551.6
1017
+ 1.65
1018
+ 1.45
1019
+ 1.5
1020
+ 1.551.61.65
1021
+ Wavelength (um)
1022
+ Wavelength (um)parameter matrix and hence the spectral response of the
1023
+ complete device. The circuit simulator enables
1024
+ bidirectional signals to be accurately simulated,
1025
+ including coupling of modes in the single elements.
1026
+ Figure 7 shows the overall transmittance of the SWG
1027
+ MCMD. Insertion losses (ILs) are lower than 0.37 dB,
1028
+ 0.47 dB and 0.37 dB for TE0, TE1 and TE2 multiplexing,
1029
+ respectively, at the central wavelength of 𝜆0 =
1030
+ 1550 nm. Moreover, low crosstalk (XT) is achieved at
1031
+ the same wavelength with values below -21.54 dB for
1032
+ TE0, -32.89 dB for TE1 and -21.24 dB for TE2
1033
+ multiplexing.
1034
+ When SPS1 takes the value of 3 𝜋 4
1035
+ ⁄ , insertion losses
1036
+ for TE3 multiplexing reach a low value of 0.47 dB at
1037
+ 1550 nm, while crosstalk values are lower than -39.48 dB
1038
+ for the same wavelength.
1039
+ This design also shows an excellent performance
1040
+ over a broad bandwidth (BW) of 200 nm with insertion
1041
+ loss lower than 1.18 dB and crosstalk below -16.53 dB.
1042
+ Insertion losses decrease to 1 dB when the bandwidth is
1043
+ restricted to 183 nm (1450 – 1633 nm), whereas a
1044
+ crosstalk below -20 dB is achieved over a 161 nm
1045
+ bandwidth (1489 – 1650 nm). For the sake of
1046
+ comparison, Table 4 summarizes the performance of
1047
+ other three- and four-mode MCMD that are based on
1048
+ MMI couplers and have been reported in the state of the
1049
+ art. To the best of our knowledge, it is the first time such
1050
+ low losses and crosstalk are achieved in an outstanding
1051
+ 161 nm wavelength range.
1052
+
1053
+ 6. Conclusions
1054
+ In this work, we have proposed a novel architecture to
1055
+ scale the number of multiplexed modes of mode
1056
+ converters and multiplexer based on MMI couplers.
1057
+ Unlike
1058
+ other
1059
+ reported
1060
+ architectures
1061
+ that
1062
+ use
1063
+ unconventional 1×4 Y-junctions or 1×3 Ψ-junctions,
1064
+ here we employ symmetric 1×2 Y-junctions arranged in
1065
+ a conventional cascaded configuration. The design
1066
+ methodology was proposed on the basis of a two-
1067
+ dimensional model with conventional homogenous
1068
+ components (i.e., without patterning the silicon
1069
+ waveguide). The conventional mode converter and
1070
+ multiplexer features sub-decibel insertion loss and
1071
+ crosstalk better than -20 dB in the 1542 – 1597 nm
1072
+ wavelength range. Once the principle of operation was
1073
+ verified, we redesigned and optimized the mode
1074
+ converter
1075
+ and
1076
+ multiplexer
1077
+ by
1078
+ incorporating
1079
+ subwavelength grating metamaterials to leverage the
1080
+ additional degrees of freedom they introduced into the
1081
+ design. A broad design bandwidth of 161 nm for
1082
+ insertion losses below 1.18 dB and crosstalk lower than
1083
+ -20 dB was confirmed by 3D FDTD simulations,
1084
+ comparing very favorably to state-of-the-art three- and
1085
+ four-mode converters and multiplexers. The crosstalk
1086
+ between TE0 and TE1 modes could be further reduced by
1087
+ including optimized Y-junction geometries that mitigate
1088
+ the effect of the non-perfect tip at the junction [42-44].
1089
+ We believe that our design strategy will open promising
1090
+ prospects for the development of high-performance
1091
+ mode converters and multiplexer based on MMI couplers
1092
+ with a high channel count.
1093
+ Credit authorship contribution statement
1094
+ David
1095
+ González-Andrade:
1096
+ Conceptualization,
1097
+ Methodology, Software, Validation, Formal analysis,
1098
+ Investigation, Data curation, Writing – original draft,
1099
+ Visualization. Irene Olivares: Methodology, Software,
1100
+ Validation, Formal analysis, Data curation, Writing –
1101
+ review & editing. Raquel Fernández de Cabo:
1102
+ Software, Validation, Data curation, Writing – review &
1103
+ editing. Jaime Vilas: Writing – review & editing.
1104
+ Antonio Dias: Resources, Writing – review & editing,
1105
+ Project administration, Funding acquisition. Aitor V.
1106
+ Velasco: Resources, Writing – review & editing,
1107
+ Supervision,
1108
+ Project
1109
+ administration,
1110
+ Funding
1111
+ acquisition.
1112
+ Declaration of Competing Interest
1113
+ The authors declare that they have no known competing
1114
+ financial interests or personal relationships that could
1115
+ have appeared to influence the work reported in this
1116
+ paper.
1117
+ Acknowledgements
1118
+ This work has been funded in part by the Spanish
1119
+ Ministry of Science and Innovation (MICINN) under
1120
+ grants RTI2018-097957-B-C33, PID2020-115353RA-
1121
+ I00;
1122
+ the
1123
+ Spanish
1124
+ State
1125
+ Research
1126
+ Agency
1127
+ (MCIN/AEI/10.13039/501100011033); the Community
1128
+ of Madrid – FEDER funds (S2018/NMT-4326); the
1129
+ European Union – NextGenerationEU through the
1130
+ Recovery,
1131
+ Transformation
1132
+ and
1133
+ Resilience
1134
+ Plan
1135
+ (DIN2020-011488,
1136
+ PTQ2021-011974);
1137
+ and
1138
+ the
1139
+ European Union's Horizon Europe research and
1140
+ innovation program under the Marie Sklodowska-Curie
1141
+ grant agreement Nº 101062518.
1142
+ References
1143
+ [1]
1144
+ R. Sabella, Silicon photonics for 5G and future networks, IEEE
1145
+ J. Sel. Top. Quantum Electron. 26 (2020) 8301611.
1146
+ [2]
1147
+ I. Demirkol, D. Camps-Mur, J. Paradells, M. Combalia, W.
1148
+ Popoola, H. Haas, Powering the Internet of things through light
1149
+ communication, IEEE Commun. Mag. 57 (2019) 107-113.
1150
+ [3]
1151
+ M Filer, J. Gaudette, Y. Yin, Z. Bakhtiari, J. L. Cox, Low-argin
1152
+ optical networking at cloud scale, J. Opt. Commun. Netw. 11
1153
+ (2019) C94-C105.
1154
+ Table 4
1155
+ Performance comparison of state-of-the-art three- and
1156
+ four-MCMD based on MMI couplers.
1157
+ Ref.
1158
+ IL
1159
+ [dB]
1160
+ XT
1161
+ [dB]
1162
+ BW
1163
+ [nm]
1164
+ Length
1165
+ [µm]
1166
+ No. of
1167
+ modes
1168
+ [28]
1169
+ <0.71
1170
+ <-18
1171
+ 100
1172
+ 400
1173
+ 3
1174
+ [29]
1175
+ <0.9
1176
+ <-17
1177
+ 40
1178
+ 400
1179
+ 3
1180
+ [30]
1181
+ <1.1
1182
+ <-10
1183
+ 90
1184
+ 17.05
1185
+ 3
1186
+ [31]
1187
+ <1.3
1188
+ <-15
1189
+ 40
1190
+ 120
1191
+ 3
1192
+ [32]
1193
+ <3.3
1194
+ <-14
1195
+ 70
1196
+ 173
1197
+ 4
1198
+ [32]
1199
+ <2.25
1200
+ <-15
1201
+ 140
1202
+ 123
1203
+ 4
1204
+ This work
1205
+ <1.18
1206
+ <-20
1207
+ 161
1208
+ 181.14
1209
+ 3
1210
+
1211
+
1212
+ [4]
1213
+ Q. Cheng, M. Bahadori, M. Glick, S. Rumley, K. Bergman
1214
+ Recent advances in optical technologies for data centers: a
1215
+ review, Optica 5 (2018) 1354-1370.
1216
+ [5]
1217
+ D. Thomson, A. Zilkie, J. E. Bowers, T. Komljenovic, G. T.
1218
+ Reed, L. Vivien, D. Marris-Morini, E. Cassan, L. Virot, J.-M.
1219
+ Fédeli, J.-M. Hartmann, J. H. Schmid, D. X. Xu, F. Boeuf, P.
1220
+ O'Brien, G. Z. Mashanovich, M. Nedeljkovic, Roadmap on
1221
+ silicon photonics, J. Opt. 18 (2016) 073003.
1222
+ [6]
1223
+ X. Chen, M. M. Milosevic, S. Stanković, S. Reynolds, T.
1224
+ Domínguez-Bucio, K. Li, D. J. Thomson, F. Gardes, G. T. Reed,
1225
+ The emergence of silicon photonics as a flexible technology
1226
+ platform, Proc. IEEE 106 (2018) 2101-2116.
1227
+ [7]
1228
+ S. Bernabé, Q. Wilmart, K. Hasharoni, K. Hassan, Y Thonnart,
1229
+ P. Tissier, Y. Désières, S. Olivier, T. Tekin, B. Szelag, Silicon
1230
+ photonics for terabit/s communication in data centers and
1231
+ exascale computers, Solid State Electron. 179 (2021) 107928.
1232
+ [8]
1233
+ W. Shi, Y. Tian, A. Gervais, Scaling capacity of fiber-optic
1234
+ transmission systems via silicon photonics, Nanophotonics 9
1235
+ (2020) 4629-4663.
1236
+ [9]
1237
+ C. Li, D. Liu, D. Dai, Multimode silicon photonics,
1238
+ Nanophotonics 8 (2018) 227-247.
1239
+ [10]
1240
+ I. Cristiani, C. Lacava, G. Rademacher, B. J. Puttnam, R. S.
1241
+ Luìs, C. Antonelli, A. Mecozzi, M. Shtaif, D. Cozzolino, L. K.
1242
+ Oxenløwe, J. Wang, Y. Jung, D. J. Richardson, S.
1243
+ Ramachandran, M. Guasoni, K. Krupa, D. Kharenko, A.
1244
+ Tonello, S. Wabnitz, D. B. Philips, D. Faccio, T. G. Eurser, S.
1245
+ Xie, P. St. J. Russell, D. Dai, Y. Yu, P. Petropoulos, F. Gardes,
1246
+ F. Parmiagiani, Roadmap on multimode photonics, J. Opt. 24
1247
+ (2022) 083001.
1248
+ [11]
1249
+ J. B. Driscoll, R. R. Grote, B. Souhan, J. I. Dadap, M. Lu, R. M.
1250
+ Osgood, Asymmetric Y junctions in silicon waveguides for on-
1251
+ chip mode-division multiplexing, Opt. Lett. 38 (2013) 1854-
1252
+ 1856.
1253
+ [12]
1254
+ W. Chen, P. Wang, T. Yang, G. Wang, T. Dai, Y. Zhang, L.
1255
+ Zhou, X. Jiang, J. Yang, Silicon three-mode (de)multiplexer
1256
+ based on cascaded asymmetric Y junctions, Opt. Lett. 41 (2016)
1257
+ 2851-2854.
1258
+ [13]
1259
+ T. A. Tran, H. D. T. Nguyen, C. D. Truong, H. T. Nguyen, Y.
1260
+ V. Vu, D. H. Tran, Three-mode multiplexed device based on
1261
+ tilted- branch bus structure using silicon waveguide, Photonics
1262
+ Nanostructures – Fundam. Appl. 35 (2019) 100709.
1263
+ [14]
1264
+ D. Dai, J. Wang, Y. Shi, Silicon mode (de)multiplexer enabling
1265
+ high capacity photonic networks-on-chip with a single-
1266
+ wavelength carrier light, Opt. Lett. 38 (2013) 1422-1424.
1267
+ [15]
1268
+ J. Wang, Y. Xuan, M. Qi, H. Huang, Y. Li, M. Li, X. Chen, Z.
1269
+ Sheng, A. Wu, W. Li, X. Wang S. Zou, F. Gan, Broadband and
1270
+ fabrication-tolerant
1271
+ on-chip
1272
+ scalable
1273
+ mode-division
1274
+ multiplexing
1275
+ based
1276
+ on
1277
+ mode-evolution
1278
+ counter-tapered
1279
+ couplers, Opt. Lett. 40 (2015) 1956-1959.
1280
+ [16]
1281
+ T. Uematsu, Y. Ishizaka, Y. Kawaguchi, K. Saitoh, M. Koshiba,
1282
+ Design of a compact two-mode multi/demultiplexer consisting
1283
+ of multimode interference waveguides and a wavelength-
1284
+ insensitive phase shifter for mode-division multiplexing
1285
+ transmission, J. Lightwave Technol. 30 (2012) 2421-2426.
1286
+ [17]
1287
+ Y. Li, C. Li, C. Li, B. Cheng, C. Xue, Compact two-mode (de)
1288
+ multiplexer based on symmetric Y-junction and multimode
1289
+ interference waveguides, Opt. Express 22 (2014) 5781-5786.
1290
+ [18]
1291
+ L. F. Frellsen, Y. Ding, O. Sigmund, L. H. Frandsen, Topology
1292
+ optimized mode multiplexing in silicon-on-insulator photonic
1293
+ wire waveguides, Opt. Express 24 (2016) 16866-16873.
1294
+ [19]
1295
+ Z. Jafari, A. Zarifkar, M. Miri, Compact fabrication-tolerant
1296
+ subwavelength-grating-based
1297
+ two-mode
1298
+ division
1299
+ (de)multiplexer, Appl. Opt. 56 (2017) 7311-7319.
1300
+ [20]
1301
+ W. Jiang, J. Hu, S. Mao, H. Zhang, L. Zhou, B. M. A. Rahman,
1302
+ Broadband
1303
+ silicon
1304
+ four-mode
1305
+ (de)multiplexer
1306
+ using
1307
+ subwavelength grating-assisted triple-waveguide couplers, J.
1308
+ Lightwave Technol. 39 (2021) 5042-5047.
1309
+ [21]
1310
+ Y. He, Y. Zhang, Q. Zhu, S. An, R. Cao, X. Guo, C. Qiu, Y. Su,
1311
+ Silicon high-order mode (de)multiplexer on single polarization,
1312
+ J. Lightwave Technol. 36 (2018) 5746-5753.
1313
+ [22]
1314
+ D. González-Andrade, J. G. Wangüemert-Pérez, A. V. Velasco,
1315
+ A. Ortega-Moñux, A. Herrero-Bermello, I. Molina-Fernández,
1316
+ R. Halir, P. Cheben, Ultra-broadband mode converter and
1317
+ multiplexer based on sub-wavelength structures, IEEE
1318
+ Photonics J. 10 (2018) 2201010.
1319
+ [23]
1320
+ D. González-Andrade, A. Dias, J. G. Wangüemert-Pérez, A.
1321
+ Ortega-Moñux, Í. Molina-Fernández, R. Halir, P. Cheben, A. V.
1322
+ Velasco, Experimental demonstration of a broadband mode
1323
+ converter and multiplexer based on subwavelength grating
1324
+ waveguides, Opt. Laser Technol. 129 (2020) 106297.
1325
+ [24]
1326
+ L. Xu, Y. Wang, D. Mao, J. Zhang, Z. Xing, E. El-Fiky, Md. G.
1327
+ Saber, A. Kumar, Y. D’Mello, M. Jacques, D. V. Plant, Ultra-
1328
+ broadband and compact two-mode multiplexer based on
1329
+ subwavelength-grating-slot-assisted adiabatic coupler for the
1330
+ silicon-on-insulator platform, J. Lightwave Technol. 37 (2019)
1331
+ 5790-5800.
1332
+ [25]
1333
+ L. Zhang, J. Xiao, Compact and broadband mode demultiplexer
1334
+ using a subwavelength grating engineered MMI coupler, J. Opt.
1335
+ Soc. Am. B 38 (2021) 2830-2836.
1336
+ [26]
1337
+ D. González-Andrade, R. Fernández de Cabo, J. Vilas, I.
1338
+ Olivares, A. Dias, J. M. Luque-González, J. G. Wangüemert-
1339
+ Pérez, A. Ortega-Moñux, Í. Molina-Fernández, R. Halir, P.
1340
+ Cheben, A. V. Velasco, Mode converter and multiplexer with a
1341
+ subwavelength phase shifter for extended broadband operation,
1342
+ IEEE Photonics Technol. Lett. 33 (2021) 1262-1265.
1343
+ [27]
1344
+ J. Wang, P. Chen, S. Chen, Y. Shi, D. Dai, Improved 8-channel
1345
+ silicon mode demultiplexer with grating polarizers, Opt.
1346
+ Express 22 (2014) 12799.
1347
+ [28]
1348
+ A. T. Tran, D. C. Truong, H. T. Nguyen, Y. V. Vu, A new
1349
+ simulation design of three-mode division (de)multiplexer based
1350
+ on a trident coupler and two cascaded 3×3 MMI silicon
1351
+ waveguides, Opt. Quantum Electron. 50 (2018) 426.
1352
+ [29]
1353
+ C. D. Truong, T. H. Nguyen, Q. T. Pham, M. T. Trinh, K. Vu,
1354
+ Three-mode multiplexer and demultiplexer utilizing trident and
1355
+ multimode couplers, Opt. Commun. 435 (2019) 334-340.
1356
+ [30]
1357
+ Z. Wang, C. Yao, Y. Zhang, Y. Su, Compact silicon three-mode
1358
+ multiplexer by refractive-index manipulation on a multi-mode
1359
+ interferometer, Opt. Express 29 (2021) 13899-13907.
1360
+ [31]
1361
+ Z. L. Hussain, R. S. Fyath, Design and simulation of a compact
1362
+ three-mode (de)multiplexer based on a subwavelength grating
1363
+ multimode interference coupler, Photonics Nanostructures –
1364
+ Fudam. Appl. 47 (2021) 100966.
1365
+ [32]
1366
+ Z. L. Hussain, R. S. Fyath, Design and simulation of 4-mode
1367
+ (de)multiplexers
1368
+ implemented
1369
+ in
1370
+ conventional
1371
+ and
1372
+ subwavelength grating Si/SiO2 platforms, Optik 251 (2022)
1373
+ 168449.
1374
+ [33]
1375
+ L. Lu, D. Liu, M. Yan, M. Zhang, On-chip mode converter
1376
+ based
1377
+ on
1378
+ cross-connected
1379
+ subwavelength
1380
+ Y-junctions,
1381
+ Photonics Res. 9 (2021) 43-48.
1382
+ [34]
1383
+ M. Bachmann, P. A. Besse, H Melchior, General self-imaging
1384
+ properties in N×N multimode interference couplers including
1385
+ phase relations, Appl. Opt. 33 (1994) 3905-3911.
1386
+ [35]
1387
+ P. Cheben, R. Halir, J. H. Schmid, H. A. Atwater, D. R. Smith,
1388
+ Subwavelength integrated photonics, Nature 560 (2018) 565-
1389
+ 572.
1390
+ [36]
1391
+ P. Cheben, D.-X. Xu, S. Janz, A. Densmore, Subwavelength
1392
+ waveguide grating for mode conversion and light coupling in
1393
+ integrated optics, Opt. Express 14 (2006) 4695-4702.
1394
+ [37]
1395
+ R. Halir, P. J. Bock, P. Cheben, A. Ortega-Moñux, C. Alonso-
1396
+ Ramos, J. H. Schmid, J. Lapointe, D.-X. Xu, J. G. Wangüemert-
1397
+ Pérez, Í. Molina-Fernández, S. Janz, Waveguide sub-
1398
+
1399
+ wavelength structures: a review of principles and applications,
1400
+ Laser Photonics Rev. 9 (2015) 25-49.
1401
+ [38]
1402
+ J. M. Luque-González, A. Sánchez-Postigo, A. Hadij-ElHouati,
1403
+ A. Ortega-Moñux, J. G. Wangüemert-Pérez, J. H. Schmid, P.
1404
+ Cheben, Í. Molina-Fernández, R. Halir, A review of silicon
1405
+ subwavelength gratings: building break-through devices with
1406
+ anisotropic metamaterials, Nanophotonics 10 (2021) 2765-
1407
+ 2797.
1408
+ [39]
1409
+ R. Halir, P. Cheben, J. M. Luque-González, J. D. Sarmiento-
1410
+ Merenguel, J. H. Schmid, G. Wangüemert-Pérez, D.-X. Xu, S.
1411
+ Wang, A. Ortega-Moñux, Í. Molina-Fernández, Ultra-
1412
+ broadband nanophotonic beamsplitter using an anisotropic sub-
1413
+ wavelength metamaterial, Laser Photonics Rev. 10 (2016)
1414
+ 1039-1046.
1415
+ [40]
1416
+ L. Xu, Y. Wang, D. Patel, M. Morsy-Osman, R. Li, M. Hui, M.
1417
+ Parvizi, N. Ben-Hamida, D. V. Plant, Ultra-broadband and ultra-
1418
+ compact optical 90° hybrid based on 2×4 MMI coupler with
1419
+ subwavelength gratings on silicon-on-insulator, Optical Fiber
1420
+ Communication Conference (2018), p. M3I.7.
1421
+ [41]
1422
+ D.
1423
+ González-Andrade,
1424
+ J. M. Luque-González,
1425
+ J.
1426
+ G.
1427
+ Wangüemert-Pérez, A. Ortega-Moñux, P. Cheben, Í. Molina-
1428
+ Fernández, A. V. Velasco, Ultra-broadband nanophotonic phase
1429
+ shifter based on subwavelength metamaterial waveguides,
1430
+ Photonics Res. 8 (2020), 359-367.
1431
+ [42]
1432
+ R. Fernández de Cabo, D. González-Andrade, P. Cheben, A. V.
1433
+ Velasco, High-performance on-chip silicon beamsplitter based
1434
+ on subwavelength metamaterials for enhanced fabrication
1435
+ tolerance, Nanomaterials 11 (2021) 1304.
1436
+ [43]
1437
+ L. Lu, D. Liu, M. Yan, M. Zhang, Subwavelength adiabatic
1438
+ multimode Y-junctions, Opt. Lett. 44 (2019) 4729-4732.
1439
+ [44]
1440
+ R. Fernández de Cabo, J. Vilas, P. Cheben, A. V. Velasco, D.
1441
+ González-Andrade, Experimental characterization of an ultra-
1442
+ broadband dual-mode symmetric Y-junction based on
1443
+ metamaterial waveguides, Opt. Laser Technol. 157 (2023)
1444
+ 108742.
1445
+
BtFJT4oBgHgl3EQfsi1r/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
CdE4T4oBgHgl3EQf5g79/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:9bd190d28c50f78ced046aa6ded7a0eee5513d72c5b1e0a5b8a7806cc1ce2bb0
3
+ size 1703981
CtE0T4oBgHgl3EQfyQKJ/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:2793babee27b9d2b85acc0a4b967c18ea421f474c7836c12d29afebff3883dd0
3
+ size 162321
CtE1T4oBgHgl3EQfWAR_/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:7f166ab856f3aea851c9c51da74c62576f7d5d3f8742a8379ceaf380d2e1b6b4
3
+ size 3538989
CtE4T4oBgHgl3EQfFwxN/content/tmp_files/2301.04888v1.pdf.txt ADDED
@@ -0,0 +1,1034 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Code-based Cryptography in IoT:
2
+ A HW/SW Co-Design of HQC
3
+ Maximilian Sch¨offel
4
+ Microelectronic Design Research Group
5
+ University of Kaiserslautern
6
+ Kaiserslautern, Germany
7
8
+ Johannes Feldmann
9
+ Microelectronic Design Research Group
10
+ University of Kaiserslautern
11
+ Kaiserslautern, Germany
12
13
+ Norbert Wehn
14
+ Microelectronic Design Research Group
15
+ University of Kaiserslautern
16
+ Kaiserslautern, Germany
17
18
+ Abstract—Recent advances in quantum computing pose a
19
+ serious threat on the security of widely used public-key cryp-
20
+ tosystems. Thus, new post-quantum cryptographic algorithms
21
+ have been proposed as part of the associated US NIST process to
22
+ enable secure, encrypted communication in the age of quantum
23
+ computing. Many hardware accelerators for structured lattice-
24
+ based algorithms have already been published to meet the strict
25
+ power, area and latency requirements of low-power IoT edge de-
26
+ vices. However, the security of these algorithms is still uncertain.
27
+ Currently, many new attacks against the lattice structure are
28
+ investigated to judge on their security. In contrast, code-based
29
+ algorithms, which rely on deeply explored security metrics and
30
+ are appealing candidates in the NIST process, have not yet been
31
+ investigated to the same depth in the context of IoT due to the
32
+ computational complexity and memory footprint of state-of-the-
33
+ art software implementations.
34
+ In this paper, we present to the best of our knowledge
35
+ the first HW/SW co-design based implementation of the code-
36
+ based Hamming Quasi Cyclic Key-Encapsulation Mechanism.
37
+ We profile and evaluate this algorithm in order to explore
38
+ the trade-off between software optimizations, tightly coupled
39
+ hardware acceleration by instruction set extension and modular,
40
+ loosely coupled accelerators. We provide detailed results on
41
+ the energy consumption and performance of our design and
42
+ compare it to existing implementations of lattice- and code-based
43
+ algorithms. The design was implemented in two technologies:
44
+ FPGA and ASIC. Our results show that code-based algorithms
45
+ are valid alternatives in low-power IoT from an implementation
46
+ perspective.
47
+ Index Terms—Post Quantum Cryptography; Key Encapsu-
48
+ lation Mechanism; IoT; Security; RISC-V; ASIC; Hardware
49
+ Implementation; HW/SW co-design; HQC
50
+ I. INTRODUCTION
51
+ Privacy and data integrity are a key requirement in the In-
52
+ ternet of Things (IoT). In many applications such as industrial
53
+ IoT (IIoT), medical and healthcare, online banking, and even
54
+ smart homes, highly sensitive data that should not be altered
55
+ or made available to the public is transmitted over the Internet.
56
+ In the vast majority of cases, the required security is provided
57
+ by a combination of symmetric cryptography and Public Key
58
+ Cryptography (PKC). However, recent advances in quantum
59
+ computing severely compromise the security of the State-of-
60
+ the-Art (SoA) PKC. While they are intractable on conven-
61
+ tional computers, the underlying mathematical problems can
62
+ be solved in polynomial time using Shor’s Algorithms [1]
63
+ once large scale quantum computers become available. This is
64
+ expected to be the case by the end of this decade [2] and thus,
65
+ the US NIST is currently conducting a standardization process
66
+ to find new post-quantum cryptographic (PQC) algorithms.
67
+ The Key Encapsulation Mechanisms (KEMs) in the current,
68
+ third round of the US NIST PQC standardization process rely
69
+ on assumptions about the computational hardness of lattice-,
70
+ code-, or isogeny-based problems. Among these, the structured
71
+ lattice-based algorithms are considered as most promising can-
72
+ didates for future standardization and for IoT applications due
73
+ to their low-complexity computations. However, the structure
74
+ of the lattices used is still the subject of cryptanalysis, and the
75
+ security claims of the developers remain controversial [3].
76
+ Due to the novelty of these algorithms, crypto-agility, i.e.
77
+ the ability to seamlessly replace cryptographic algorithms in
78
+ case that they are vulnerable, is even more important for PQC
79
+ than for SoA cryptography. Code-based algorithms are based
80
+ on different, well studied security assumptions, but have a
81
+ higher computational complexity and larger memory footprints
82
+ than lattice-based algorithms in state-of-the-art implementa-
83
+ tions [4]. To determine if they are a viable alternative in low-
84
+ power IoT environments in case that lattice-based algorithms
85
+ turn out to be vulnerable, hardware implementations are essen-
86
+ tial for a conclusive evaluation and have also been requested
87
+ by the US NIST [5].
88
+ Therefore, in this work we present to the best of our
89
+ knowledge the first HW/SW co-design based implementation
90
+ of the code-based Hamming Quasi Cyclic KEM (HQC) [4].
91
+ Our design deploys a custom RISC-V processor and was im-
92
+ plemented as an application-specific integrated circuit (ASIC)
93
+ and field programmable gate array (FPGA). In summary, the
94
+ new contributions of this work are:
95
+ 1) We provide the first ASIC implementation of a code-
96
+ based KEM from the US NIST standardization process,
97
+ which is fully compatible with the NIST C reference
98
+ implementation.
99
+ 2) We identify the bottlenecks of the PQC algorithm and
100
+ investigate for each bottleneck the best implementation
101
+ method. We develop and implement software optimiza-
102
+ tions, instruction set extensions, and loosely coupled
103
+ accelerators and provide detailed information about their
104
+ individual benefits and overhead.
105
+ arXiv:2301.04888v1 [cs.CR] 12 Jan 2023
106
+
107
+ 3) We compare the energy consumption, hardware require-
108
+ ments, and latency of our design to SoA implementa-
109
+ tions of lattice- and code-based primitives.
110
+ The results show that our implementation is the most
111
+ efficient design. Furthermore, we show that HQC can be
112
+ implemented with a similar resource utilization as lattice-based
113
+ algorithms while achieving viable performance.
114
+ This paper is structured as follows. In Section II, we briefly
115
+ introduce the working principle of KEMs in general and HQC.
116
+ In Section III, we provide an overview of the related work
117
+ and of the SoA. In Section IV, we identify and evaluate the
118
+ computational bottlenecks of HQC in software. In Section
119
+ V, we present the IoT processing system and the hardware
120
+ implementation of the different accelerators. In Section VI, we
121
+ compare our results with the SoA. In Section VII, we draw a
122
+ conclusion.
123
+ II. BACKGROUND
124
+ KEMs form a public key cryptosystem that is build out
125
+ of three algorithms, Key-Generation (KeyGen), Encapsula-
126
+ tion (Encaps) and Decapsulation (Decaps). Unlike general
127
+ purpose Public Key Encryption Schemes (PKEs), KEMs are
128
+ not thought to perform any application data encryption, but
129
+ are designed to establish a randomly generated shared secret
130
+ between communication partners in cryptographic protocols
131
+ like Transport Layer Security (TLS) similar to the state-of-the-
132
+ art Diffie-Hellmann Key-Exchange. Afterwards, this shared
133
+ secret is used to derive a secret key for de- and encryption of
134
+ application data with fast symmetric cryptographic algorithms
135
+ like Advanced Encryption Standard (AES). KEMs are often
136
+ build out of existing PKEs using transformations like the
137
+ Fujisaki-Okamoto Transform.
138
+ The first code-based PKE was introduced by McEliece in
139
+ 1978 and is based on the assumption that the error-correction
140
+ code used is indistinguishable from random codes [6]. Al-
141
+ though the original McEliece cryptosystem, which relied on
142
+ Goppa codes, remains secure to this day, the method of hiding
143
+ the generator matrix of the code in the public key carries
144
+ a potential vulnerability. Attempts to reduce the key size
145
+ by using more structured codes than the original McEliece
146
+ approach have shown that this vulnerability can be exploited
147
+ to crack the cryptosystems in 0.06 seconds [7].
148
+ Therefore, the authors of HQC proposed a novel approach
149
+ which combines two different types of codes:
150
+ 1) A decodable [n, k] code C with a fixed, publicly known
151
+ generator matrix G ∈ Fk×n
152
+ 2
153
+ and the error correction
154
+ capability δ based on concatenated Reed-Muller (RM)
155
+ and Reed-Solomon (RS) codes.
156
+ 2) A random double-circulant [2n, n] code with a publicly
157
+ known parity check matrix h.
158
+ This design rational allows HQC to use significantly smaller
159
+ keys than the other code-based KEM Classic McEliece (2 KB
160
+ vs 255 KB public key size) while still achieving the same
161
+ security metrics.
162
+ Fig. 1 shows how the shared secret ss is established between
163
+ the communication partners using the HQC KEM. HQC uses
164
+ Alice
165
+ Bob
166
+ KeyGen():
167
+ 1. h
168
+ $
169
+
170
+ − R
171
+ 2. sk = (x, y)
172
+ $
173
+
174
+ − R2
175
+ 3. pk = (h, s = x + h · y)
176
+ Send pk
177
+ Encaps(pk):
178
+ 4. m
179
+ $
180
+
181
+ − Fk
182
+ 2
183
+ 5. θ ← G(m)
184
+ 6. e
185
+ $
186
+
187
+ − R
188
+ 7. (r1, r2)
189
+ $
190
+
191
+ − R2
192
+ 8. u = r1 + h · r2
193
+ 9. v = mG + s · r2 + e
194
+ 10. c ← (u, v)
195
+ 11. d ← H(m)
196
+ 12. ss ← K(m, c)
197
+ Send ct = (c, d)
198
+ Decaps(sk,ct)
199
+ 13. m′ = C.Decode(v − u · y)
200
+ 14. θ′ ← G(m′)
201
+ 15. c′ = Encrypt(pk, m′, θ′)
202
+ 16. If c ̸= c′or d ̸= H(m′)abort
203
+ 17. ss ← K(m′, c)
204
+ Encrypt(pk, m, θ)
205
+ Fig. 1. HQC KEM as defined in [4] with R = F2[X]/(Xn − 1), the hash
206
+ functions G, H, K, the sampling operator
207
+ $
208
+ ←− and the KEM’s public key pk,
209
+ private key sk, ciphertext ct and shared secret ss. θ is the seed for the pseudo-
210
+ random number generation during the encryption in Encaps() and Decaps().
211
+ the Keccak-based extendable output function SHAKE as a
212
+ seedexpander of a random generated seed as the scheme
213
+ requires a large amount of random bytes (n = 17669 for the
214
+ smallest parameter set HQC-128). Furthermore, the Keccak-
215
+ based Secure Hash Alorithm 3 (SHA3) [8] is used for the G, H
216
+ and K functions which are required due to the KEM-DEM
217
+ transformation in HQC to construct an IND-CCA2 secure
218
+ KEM.
219
+ The procedure of HQC in short is as follows, a detailed
220
+ description can be found in [4]. First, Alice randomly gener-
221
+ ates the parity check matrix h and the private key sk, from
222
+ which the public key pk is constructed. Here, the polynomials
223
+ x and y which build the secret key are hidden in the public
224
+ key by multiplying h with y and adding x in R. Bob uses
225
+ pk to encrypt his randomly generated message m, which is
226
+ the basis for the shared secret ss. During this encryption, the
227
+ randomly generated vectors r1, r2 and e which have a fixed,
228
+ predefined hamming weight are used to disguise m further.
229
+ The hamming weights are selected in a way such that they
230
+ still allow a correct decryption of m by Alice with respect to
231
+ δ with a very high probability. The ciphertext ct is sent back to
232
+ Alice, who decrypts the message m′ and calculates ss based
233
+ on it.
234
+ The HQC algorithm is available in 3 different parameter
235
+ sets. This paper is focused on the NIST level 1 parameter set
236
+ HQC-128.
237
+
238
+ III. STATE OF THE ART
239
+ Many works have been published which deal with hard-
240
+ ware accelerations of new PQC primitives. Among these
241
+ publications, the vast majority is focused on accelerators for
242
+ lattice-based algorithms. A cryptographic co-processor was
243
+ implemented in [9] as an ASIC to support various lattice
244
+ based NIST schemes. Fritzmann et al. developed a HW/SW
245
+ based co-design on a RISCV core for the lattice-based scheme
246
+ NewHope [10]. In [11], FrodoKEM, an algorithm which has
247
+ a high security confidentiality due to its less structured lattice,
248
+ was accelerated by using a HW/SW co-design approach.
249
+ In contrast, the code-based KEMs have not yet been in-
250
+ vestigated to the same depth. For BIKE, another code-based
251
+ candidate with a comparable key size to HQC, an FPGA
252
+ implementation has been proposed in [12]. So far, the only
253
+ hardware implementation for HQC was presented by the
254
+ original authors of HQC in [4] and is based on FPGA HLS.
255
+ Therefore, in this work, we present the first HW/SW co-design
256
+ approach of HQC and implement our design both as ASIC and
257
+ FPGA.
258
+ IV. HW/SW CO-DESIGN
259
+ There are three possibilities for implementation:
260
+ 1) Software.
261
+ 2) Custom processor instructions.
262
+ 3) Loosely coupled accelerators.
263
+ In a first step, the execution of the NIST reference software
264
+ was profiled to determine the computational bottlenecks and
265
+ the memory footprint. In a second step, we investigated for
266
+ each bottleneck the most suitable approach to find the optimum
267
+ trade-off between the area, latency, memory footprint, and
268
+ energy consumption. The highest priority was assigned to
269
+ software optimization, as it offers high flexibility without
270
+ additional costs. Then, if this is not efficient, custom processor
271
+ instructions were considered as a second option, since they are
272
+ still flexible and require little additional hardware. Only when
273
+ these two approaches were found to be ineffective a loosely-
274
+ coupled accelerator was considered.
275
+ A. IoT Processing System (IoT-PS)
276
+ Our methodology requires a processing system that allows
277
+ instruction set extensions and the efficient interfacing of
278
+ loosely-coupled accelerators. Therefore, we chose an adaptive
279
+ platform that includes a RISC-V core whose instruction set
280
+ architecture provides the ability to add custom instructions.
281
+ Fig. 2 shows the final architecture of the IoT-PS. Our custom,
282
+ area optimized RISC-V core supports the RV32IC instruction
283
+ set which features additional compressed instructions and,
284
+ therefore, significantly reduces the program size. The Direct
285
+ Memory Access (DMA) controller features a memory copy
286
+ (memcpy) and memory initialization (memset) function, of
287
+ which both are able to operate on byte, half-word, and
288
+ word granularity. The JTAG module provides access to the
289
+ memories and the register file of the RISC-V core. It also can
290
+ be used to start, stop, and reset the IoT-PS. Depending on
291
+ the target platform, the data memory module was either based
292
+ on an SRAM hard macro cell (ASIC) or Block RAM (Xilinx
293
+ FPGA). Block RAM was also used for the instruction memory
294
+ in case of an FPGA implementation. However, for the ASIC
295
+ implementation we used a ROM macro cell, thus the program
296
+ code is available after reset and does not need to be loaded
297
+ via JTAG. The IoT-PS features no peripheral units except the
298
+ I/O controller which is used to communicate via pin toggling.
299
+ RISC-V
300
+ JTAG
301
+ DMA
302
+ HQC Accelerator
303
+ 20 KB Instruction Memory
304
+ 32 KB Data Memory
305
+ I/O Controller
306
+ AXI4-Lite Interconnect
307
+ Fig. 2. Architecture Overview
308
+ B. Profiling of HQC-128
309
+ The US NIST C reference implementation was used to
310
+ identify the bottlenecks of the HQC-128 execution in our
311
+ setup. The code was compiled with optimization level 2 (O2)
312
+ and simulated cycle-accurately with the RTL model of our
313
+ IoT-PS. Compared to Fig. 2, the size of ROM and RAM had
314
+ to be increased for the analysis due to the large requirements
315
+ of the reference implementation.
316
+ The simulation results are shown in Table I. The specified
317
+ clock cycles in the table refer to the processor cycles that
318
+ the RISC-V core spends within the respective C function
319
+ and excluding the time spent in sub-functions, e.g., gf mul is
320
+ called during the computation of RS-Encode, but not included
321
+ in its reported cycles. For all three KEM-functions, (1) the
322
+ arithmetic in R, (2) the SHAKE-based hashing and (3) mem-
323
+ ory operations are the main contributors to the total execution
324
+ time. On top of that, the sampling operation, the RM-Decoding
325
+ algorithm (4) and the finite field multiplication (5) are further
326
+ contributors to the computation time. The unsigned division,
327
+ which is performed in software, is mostly used during the
328
+ polynomial multiplication in (1).
329
+ In (1), the largest part is accounted by the multiplication of
330
+ the large polynomials (n = 17669 for HQC-128), which are
331
+ represented as bit vectors. This includes the subsequent reduc-
332
+ tion by Xn − 1 of the intermediate result, and is performed,
333
+ for example, in steps 3., 8. and 9. in Fig. 1. The multiplication
334
+ complexity is reduced by the fact that one of the vectors is
335
+ sparse and has a small, known hamming weight w ≤ 75,
336
+ which allows to consider only the non-zero coefficients in
337
+ the sparse polynomial during processing. The execution of the
338
+ multiplication consists mostly of XOR operations for adding
339
+ the binary coefficients of the same degrees and SHIFT / AND
340
+ operations to determine the degree of the intermediate results.
341
+ Due to the high degree of the polynomials, a large number
342
+ of LOAD and STORE instructions is required during the
343
+ computation.
344
+
345
+ TABLE I
346
+ TOTAL CYCLE COUNT AND SHARE OF IMPORTANT FUNCTIONS OF THE NIST C REFERENCE IMPLEMENTATION ON THE RISC-V, N.A. (NOT
347
+ APPLICABLE) REFERS TO FUNCTIONS WHICH ARE NOT USED IN THIS STEP.
348
+ Function
349
+ Keygen Cycles
350
+ Encaps Cycles
351
+ Decaps Cycles
352
+ Total
353
+ 5609k
354
+ 13850k
355
+ 19903k
356
+ Arithmetic in R
357
+ 1540k (27.46%)
358
+ 3448k (24.9%)
359
+ 4989k (25.1%)
360
+ - Vect Mul
361
+ 1528k
362
+ 3413k
363
+ 4942k
364
+ - Vect Add
365
+ 12k
366
+ 35k
367
+ 47k
368
+ SHAKE
369
+ 1854k (33.05%)
370
+ 5007k (36.15%)
371
+ 5414k (27.2%)
372
+ - Keccak State Permute
373
+ 1744k
374
+ 4626k
375
+ 5005k
376
+ - Keccak Inc Squeeze
377
+ 103k
378
+ 131k
379
+ 154k
380
+ - Keccak Inc Absorb
381
+ 7k
382
+ 250k
383
+ 255k
384
+ RS-RM Code
385
+ n.A.
386
+ 26k (0.18%)
387
+ 1440k (7.24%)
388
+ - RS-Encode
389
+ n.A.
390
+ 26k
391
+ 26k
392
+ - RS-Decode
393
+ n.A.
394
+ n.A.
395
+ 56k
396
+ - RM-Decode
397
+ n.A.
398
+ n.A.
399
+ 1358k
400
+ Sampling
401
+ 81k (1.44%)
402
+ 155k (1.1%)
403
+ 236k (1.18%)
404
+ Memory-Operation
405
+ 2071k (36.92%)
406
+ 5068k (36.59%)
407
+ 7175k (36.05%)
408
+ - memcpy
409
+ 2045k
410
+ 5021k
411
+ 7092k
412
+ - memset
413
+ 26k
414
+ 47k
415
+ 83k
416
+ Rest
417
+ 63k (1.12%)
418
+ 146k (2.17%)
419
+ 649k (3.26%)
420
+ - unsigned division
421
+ 49k
422
+ 100k
423
+ 151k
424
+ - gf mul
425
+ n.A.
426
+ 20k
427
+ 162k
428
+ Keccak’s permutation function in (2) is the computational
429
+ core of the sponge construction in SHA3 and consists of
430
+ bitwise AND, XOR, and rotate operations on the 25 lanes
431
+ of 64 bits each. The major bottleneck in this permutation is
432
+ the interdependence of the intermediate results which causes
433
+ the contents of the processor registers to be swapped with the
434
+ main memory multiple times during the execution of one of
435
+ the 24 rounds.
436
+ The large overhead of the memory operations in (3) is driven
437
+ by two reasons. First, the RISC-V core supports only one
438
+ outstanding memory read or write access at a time. It waits
439
+ for a slave response before continuing the program execution.
440
+ Second, the reference implementation is not optimized for
441
+ low memory usage, e.g., it often stores multiple copies of
442
+ temporary results, initializes a larger number of arrays, or
443
+ copies parts of arrays to different memory locations.
444
+ TABLE II
445
+ STACK MEMORY AND CODE-SIZE OF THE NIST C REFERENCE
446
+ IMPLEMENTATION OF HQC-128 ON OUR RISC-V CORE.
447
+ Keygen
448
+ Encaps
449
+ Decaps
450
+ Code Size
451
+ 10.798 KB
452
+ 17.015 KB
453
+ 22.378 KB
454
+ Stack Memory
455
+ 53.018 KB
456
+ 68.714 KB
457
+ 77.762 KB
458
+ C. Software Optimization
459
+ In multiple functions, the reference implementation uses
460
+ non-optimal data-types which increases the number of required
461
+ memory accesses and processor instructions. An example of
462
+ this is the comparisons in Step 16 of Fig. 1, which are
463
+ performed on a byte boundary rather than a processor word
464
+ boundary. The memory footprint and computation time was
465
+ further improved by removing redundant arrays which often
466
+ get initialized with zeroes or are the target of memcpy
467
+ operations. The operations are performed with pointers in-
468
+ stead. For the remaining memory operations, the time required
469
+ for memcpy and for array initialization via memset were
470
+ accelerated by using the DMA controller of the platform.
471
+ D. Instruction Set Extension
472
+ The bottleneck of RS-Encoding and -Decoding is caused
473
+ by the multiplication in F28. This operation has only three
474
+ operands, including the generator polynomial, and one return
475
+ value with the size of one byte each. A F28-Unit is added to
476
+ the RISC-V core which is able to perform the operation shown
477
+ in Equation 1, where a = (a15, · · · , a0) and b = (b7, · · · , b0)
478
+ are the input operands, and d = (d14, · · · , d0) is the output.
479
+ This unit is made accessible via both an R-type and an I-type
480
+ custom instruction, where register rs1 is used as operand a,
481
+ register rs2 respectively the immediate value imm is used as
482
+ operand b, and the output d is stored in register rd.
483
+ (a15 · x7 + · · · + a8 · x0) · (b7 · x7 + · · · + b0 · x0)
484
+ +(a7 · x7 + · · · + a0 · x0) ⇒ (d14 · x14 + · · · + d0 · x0) (1)
485
+ Using these custom instructions, a multiplication in F28 is
486
+ performed within four clock cycles.
487
+ E. Loosely-Coupled Accelerators
488
+ Fig. 4 shows the block diagram of the loosely-coupled
489
+ HQC accelerators. To enable parallel calculations between
490
+ the processor and the accelerator, the accelerator has both
491
+ an AXI slave and an AXI master interface and fetches its
492
+ calculation inputs (e.g. the polynomials) from the processor’s
493
+
494
+ Dense Polynomial
495
+ Sparse Polynomial
496
+ coord0
497
+ coord1
498
+ coordw-1
499
+ . . .
500
+ . . .
501
+ word0
502
+ 0
503
+ 63
504
+ word1
505
+ 64
506
+ 127
507
+ wordN
508
+ 17664
509
+ 17228
510
+ . . .
511
+ word0
512
+ coord0
513
+ coord0+63
514
+ wordN
515
+ coord0
516
+ + 17664
517
+ coord0
518
+ +17228
519
+ . . .
520
+ word0
521
+ coord1
522
+ coord1+63
523
+ wordN
524
+ coord1
525
+ + 17664
526
+ coord1
527
+ +17228
528
+ . . .
529
+ word0
530
+ coordw-1
531
+ Coordw-1+63
532
+ wordN
533
+ coordw-1
534
+ + 17664
535
+ coordw-1
536
+ +17228
537
+ . . .
538
+ XOR
539
+ XOR
540
+ XOR
541
+ Intermediate Result
542
+ Fig. 3. Working principle of the polynomial multiplication in R with n = 17669 and 64-bit memory words.
543
+ main memory via the master interface, according to the
544
+ processor command which was previously received via the
545
+ slave interface. Due to the data dependencies between the steps
546
+ in the HQC-KEM, and based on the previous observation that
547
+ the bottleneck in the HQC is driven by memory accesses, we
548
+ decided that enabling parallel read/read or read/write accesses
549
+ is more beneficial than running the dedicated compute units
550
+ in parallel. Therefore, only two SRAMs are used and shared
551
+ between the compute units, and only one of the compute units
552
+ is processing at the same time. The access to the SRAMs and
553
+ the operation mode of the compute units are managed by one
554
+ control unit.
555
+ AXI4-Lite Interconnect
556
+ HQC Control Unit
557
+ SRAM0
558
+ (288 x
559
+ 64 Bit)
560
+ SRAM1
561
+ (566 x
562
+ 64 Bit)
563
+ R-Unit
564
+ Sampling-Unit
565
+ RM-Decoder
566
+ Keccak-IP
567
+ AXI-Slave
568
+ AXI-Master
569
+ Fig. 4. HQC hardware accelerator.
570
+ The R-Unit implements the addition, multiplication and
571
+ reduction of the polynomials in R. Fig. 3 shows the working
572
+ principle of the polynomial multiplication. The values of
573
+ the sparse polynomial contain the locations of its non-zero
574
+ coordinates. In our implementation, we iterate through the
575
+ multiplication by a word-by-word shift of the dense polyno-
576
+ mial by the coordinates given in the sparse polynomial.
577
+ After the shift, the interim result is XOR-ed with the word
578
+ that is currently stored at the respective location in memory
579
+ and the carry out with respect to the word alignment of the
580
+ memory is calculated. The R-Unit is designed such that only
581
+ two cycles are necessary for calculating a resulting word. In
582
+ the first cycle the address of the dense polynomial and the
583
+ intermediate polynomial are calculated and read based on the
584
+ coordinate, while in the second cycle the new value and the
585
+ carry-out are calculated and written to memory.
586
+ The Sampling-Unit combines the sponge functions squeeze
587
+ and absorb of the incremental version of SHAKE, the permu-
588
+ tation function of Keccak and the rejection-based sampling,
589
+ during which SHAKE functions are used as extendable output
590
+ functions (XOF). For the permutation function, a highspeed
591
+ open-source implementation by the original authors of Kec-
592
+ cak was used, which executes the permutation in 24 clock
593
+ cycles [13].
594
+ As shown in Table I, the vast majority of decoding time
595
+ is spent on the RM-Codes, which employs a Maximum
596
+ Likelihood (ML) algorithm based on the Hadamard Transform
597
+ and a subsequent peak-search for the highest value in the
598
+ transformed codeword. Because HQC uses duplicated RM
599
+ codes, the decoding algorithm must be preceded by another
600
+ transformation function [4]. This transform requires many
601
+ single-bit operations, and thus, the implementation in soft-
602
+ ware is not efficient. Therefore, we adapted the transform
603
+ and the subsequent decoding steps to an efficient hardware-
604
+ implementation.
605
+ V. RESULTS AND COMPARISON
606
+ The IoT-PS presented was implemented in a 22 nm FD-SOI
607
+ technology from GlobalFoundries under worst case Process,
608
+ Voltage and Temperature (PVT) conditions (125 °C, 0.72 V for
609
+ timing; 25 °C, 0.8 V for power). Synthesis is performed with
610
+ the Synopsys DesignCompiler, Place&Route is carried out
611
+ with the Synopsys IC-Compiler. The SRAMs were generated
612
+ by the INVECAS Memory Compiler. Power numbers are
613
+ calculated with back-annotated wiring data. The layout of
614
+ ASIC IP core presented in this work can be seen in Figure 5
615
+ has a size of 0.12 mm2 with an aspect ratio of 1.77 and a
616
+ maximum frequency of 700 MHz. The IoT-PS presented was
617
+ also implemented on a Xilinx Artix xc7a100tcsg324-3 using
618
+ Xilinx Vivado for a better comparison to existing work.
619
+
620
+ TABLE III
621
+ CYCLE COUNT OF THE HQC-KEM IN OUR SETUP WITH THE DIFFERENT HARDWARE MODULES. THE IMPROVEMENT REFERS TO SPEEDUP WITH
622
+ RESPECT TO THE NIST C REFERENCE IMPLEMENTATION WITHOUT ANY HARDWARE ACCELERATORS.
623
+ Keygen
624
+ Encaps
625
+ Decaps
626
+ Cycles
627
+ Improvement
628
+ Cycles
629
+ Improvement
630
+ Cycles
631
+ Improvement
632
+ Reference
633
+ 5609k
634
+ -
635
+ 13850k
636
+ 19903k
637
+ -
638
+ DMA + SW OPT
639
+ 3587k
640
+ 36.0%
641
+ 7044k
642
+ 49.1%
643
+ 10851k
644
+ 45.5%
645
+ + R-Unit
646
+ 1862k
647
+ 66.8%
648
+ 5183k
649
+ 62.6%
650
+ 7245k
651
+ 63.6%
652
+ + Sampling-Unit
653
+ 1623k
654
+ 71.1%
655
+ 1955k
656
+ 85.9%
657
+ 5176k
658
+ 74.0%
659
+ + RM-Decoder
660
+ n.A.
661
+ n.A.
662
+ n.A.
663
+ n.A.
664
+ 9636k
665
+ 51.6%
666
+ + F28-Instruction
667
+ n.A.
668
+ n.A.
669
+ 7028k
670
+ 49.3%
671
+ 10722k
672
+ 46.1%
673
+ + All Modules
674
+ 56k
675
+ 98.9%
676
+ 131k
677
+ 99%
678
+ 557k
679
+ 97.2%
680
+ Code Size
681
+ 1.5 KB
682
+ 86.1%
683
+ 6.6 KB
684
+ 61.2%
685
+ 13.362 KB
686
+ 40.3%
687
+ Stack Memory
688
+ 10 KB
689
+ 81.1%
690
+ 24 KB
691
+ 65.7%
692
+ 31 KB
693
+ 60.1%
694
+ A. Impact of individual optimizations on the overall run time
695
+ Table III shows the extent to which the presented hardware
696
+ modules accelerate the computation time of the three KEM
697
+ functions. As illustrated, the use of a DMA and the software
698
+ optimization already provide a significant speed up between
699
+ 36% and 49% over the reference implementation. This shows
700
+ that the NIST C reference implementation is not meant to
701
+ be used in IoT devices without optimizations. The loosely
702
+ coupled Sampling-Unit is the accelerator that provides the a
703
+ runtime reduction of at least 50% compared to the optimized
704
+ software implementation with DMA in all KEM functions. The
705
+ R-Unit, however, reduces the runtime only between 26.5%
706
+ and 48% depending on the KEM function. The RM-Decoder
707
+ has the least impact on the performance since it is only used
708
+ in Decaps. Also it is able to achieve a runtime reduction of
709
+ 11.2%. The F28-Instructions give only a minor speedup on its
710
+ own, but shows its potential in combination with all loosely
711
+ coupled accelerators.
712
+ B. Resource distribution of the individual hardware modules
713
+ Figure 5 shows a qualitative area distribution of the distinct
714
+ modules for ASIC, while Table IV shows a quantitative
715
+ distribution for FPGA. The R-Unit shows the highest area
716
+ efficiency among all loosely coupled accelerators. Although
717
+ this unit has a lower runtime reduction compared to the
718
+ Fig. 5.
719
+ Layout; RISC-V - blue; JTAG - cyan; Interconnect - lime; I/O
720
+ Controller - purple; DMA - pink; Sampling Unit - red; RM-Decoder - orange;
721
+ R-Unit - yellow; HQC Control Unit, SRAM0, SRAM1 - green; ROM - white,
722
+ horizontal strips; RAM - white, cross pattern
723
+ Sampling-Unit, it needs less than 10% of its FPGA resources.
724
+ The RM-Decoder, however, requires fewer resources than the
725
+ R-Unit, but also offers the least performance gain and is only
726
+ used in Decaps. Therefore, it is far less efficient compared to
727
+ both R-Unit and Sampling-Unit. The F28-Unit, which is used
728
+ by the custom instructions, requires only negligible resources.
729
+ However, the decoding of these instructions as well as the
730
+ controlling of the unit requires additional resources which are
731
+ hidden inside the RISC-V core.
732
+ TABLE IV
733
+ RESOURCE UTILIZATION ON FPGA (ARTIX7)
734
+ LUTs
735
+ Registers
736
+ Block RAM
737
+ RISC-V
738
+ 2210
739
+ 1682
740
+ 0
741
+ ⌞ F28-Unit
742
+ 27
743
+ 0
744
+ 0
745
+ Interconnect
746
+ 2775
747
+ 1919
748
+ 0
749
+ Memories
750
+ 53
751
+ 6
752
+ 24
753
+ HQC Accelerator
754
+ 7920
755
+ 2370
756
+ 3
757
+ ⊢ R-Unit
758
+ 565
759
+ 117
760
+ 0
761
+ ⊢RM-Decoder
762
+ 435
763
+ 63
764
+ 0
765
+ ⌞Sampling Unit
766
+ 5610
767
+ 1814
768
+ 0
769
+ ⌞Keccak Permute
770
+ 4685
771
+ 1622
772
+ 0
773
+ DMA
774
+ 489
775
+ 412
776
+ 0
777
+ JTAG
778
+ 452
779
+ 546
780
+ 0
781
+ I/O Controller
782
+ 41
783
+ 68
784
+ 0
785
+ IoT-PS
786
+ 13934
787
+ 7003
788
+ 27
789
+ C. Comparison to State of the Art
790
+ Table V presents the required clock cycles for the different
791
+ KEM functions of SoA implementations and of our work. We
792
+ use the number of clock cycles as metric rather than absolute
793
+ computation time. This is, for our our work, a pessimistic
794
+ comparison due to the high achievable clock frequency. How-
795
+ ever, even under this assumption, our implementation requires
796
+ a comparable number of clock cycles as the low-latency HQC
797
+ implementation, while it requires less hardware than its low
798
+ area hardware implementation. Compared to BIKE, the other
799
+ code-based KEM, our implementation requires about the same
800
+ amount of clock cycles like the low latency implementation
801
+ while using significantly less hardware resources. The imple-
802
+ mentation of FrodoKEM, which would be an alternative if
803
+ structured lattice-based KEMs like Kyber and NewHope are
804
+
805
+ .TABLE V
806
+ COMPARISON OF CLOCK CYCLES, FREQUNCY AND FPGA RESOURCES FOR DIFFERENT STATE-OF-THE-ART IMPLEMENTATIONS. HW/SW REFERS TO
807
+ IMPLEMENTATIONS BASED ON HW/SW CO-DESIGN, FULL REFERS TO FULL HARDWARE IMPLEMENTATIONS OF THE RESPECTIVE SCHEME. NEWHOPE
808
+ AND KYBER ARE STRUCTURED-LATTICE BASED ALGORITHMS, FRODOKEM IS BASED ON LESS-STRUCTURED LATTICES, AND THE REMAINING
809
+ IMPLEMENTATIONS ARE BASED ON CODES.
810
+ Implementation
811
+ Keygen
812
+ Encaps
813
+ Decaps
814
+ Frequency
815
+ FPGA Resources
816
+ Target Plattform
817
+ Cycles
818
+ Cycles
819
+ Cycles
820
+ MHz
821
+ LUTs
822
+ FFs
823
+ BRAMs
824
+ HQC (low area, HW) [4]
825
+ 630k
826
+ 1500k
827
+ 2100k
828
+ 132
829
+ 8.9k
830
+ 4k
831
+ 14
832
+ FPGA (Xilinx Artix-7)
833
+ HQC (low latency, HW) [4]
834
+ 40k
835
+ 89k
836
+ 190k
837
+ 148
838
+ 20k
839
+ 16k
840
+ 12.5
841
+ FPGA (Xilinx Artix-7)
842
+ BIKE (low area, HW) [12]
843
+ 2671k
844
+ 153k
845
+ 1628k
846
+ 121
847
+ 13k
848
+ 5k
849
+ 17
850
+ FPGA (Xilinx Artix-7)
851
+ BIKE (low latency, HW) [12]
852
+ 259k
853
+ 12k
854
+ 189k
855
+ 96
856
+ 53k
857
+ 7k
858
+ 49
859
+ FPGA (Xilinx Artix-7)
860
+ NewHope (HW/SW) [10]
861
+ 357k
862
+ 590k
863
+ 167k
864
+ n.A.
865
+ 11k
866
+ 5k
867
+ 1
868
+ FPGA (Xilinx Zynq-7000)
869
+ FrodoKEM (HW/SW) [11]
870
+ 23.4M
871
+ 25.5M
872
+ 25.3M
873
+ 100
874
+ 5.6k
875
+ 1.1k
876
+ 0
877
+ FPGA (Xilinx Zynq Ultrascale+)
878
+ Kyber (HW/SW) [9]
879
+ 75k
880
+ 132k
881
+ 142k
882
+ 72
883
+ n.A.
884
+ n.A.
885
+ n.A.
886
+ ASIC (40nm)
887
+ HQC on Cortex M4 (SW)
888
+ 1048k
889
+ 2436k
890
+ 4001k
891
+ 64
892
+ n.A.
893
+ n.A.
894
+ n.A.
895
+ nRF52840
896
+ This Work HQC (DMA+SW OPT)
897
+ 3587k
898
+ 7044k
899
+ 10851k
900
+ 700
901
+ n.A.
902
+ n.A.
903
+ n.A.
904
+ ASIC (22nm)
905
+ This Work HQC (HW/SW)
906
+ 56k
907
+ 131k
908
+ 557k
909
+ 700
910
+ n.A.
911
+ n.A.
912
+ n.A.
913
+ ASIC (22nm)
914
+ This Work HQC (HW/SW)
915
+ 56k
916
+ 131k
917
+ 557k
918
+ 100
919
+ 8k
920
+ 2.4k
921
+ 3
922
+ FPGA (Xilinx Artix-7)
923
+ proven to be vulnerable to attacks, is overall 100 times slower
924
+ than our work.
925
+ Table VI shows the energy consumption of our implementa-
926
+ tion, of HQC on a Cortex M4 processor and of the structured
927
+ lattice-based KYBER, also implemented as an ASIC. As
928
+ can be seen, our implementation requires considerably less
929
+ energy than the pure software on the Cortex M4 and also less
930
+ than KYBER’s ASIC implementation, which, however, was
931
+ implemented on a larger technology node.
932
+ TABLE VI
933
+ COMPARISON OF ENERGY CONSUMPTION. FOR A TRADE-OFF BETWEEN
934
+ POWER AND LATENCY, OUR DESIGN WAS IMPLEMENTED AND SIMULATED
935
+ WITH A 200 MHZ CLOCK.
936
+ Implementation
937
+ Keygen
938
+ Encaps
939
+ Decaps
940
+ µJ
941
+ µJ
942
+ µJ
943
+ Kyber (HW/SW) [9]
944
+ 5.97
945
+ 9.37
946
+ 11.25
947
+ HQC on Cortex M4 (SW)
948
+ 500
949
+ 1184
950
+ 1872
951
+ This Work HQC (HW/SW)
952
+ 1.02
953
+ 2.41
954
+ 7.1
955
+ VI. CONCLUSION
956
+ In this work, we investigated the performance of the code-
957
+ based post-quantum KEM HQC in the context of low power
958
+ IoT system. We presented the first ASIC implementation of a
959
+ code-based US NIST PQC candidate. With a combination of
960
+ software optimizations, instruction set extensions, and loosely
961
+ coupled hardware accelerators, we achieve similar perfor-
962
+ mance to the full SoA hardware implementation of HQC, but
963
+ require significantly less hardware resources and provide more
964
+ flexibility. Compared to SoA implementations of lattice-based
965
+ algorithms, we have shown that code-based algorithms are
966
+ promising alternatives in IoT based applications in terms of
967
+ energy efficiency, computation time, and required hardware.
968
+ ACKNOWLEDGEMENT
969
+ This paper was partly founded by the German Federal
970
+ Ministry of Education and Research as part of the project
971
+ “SIKRIN-KRYPTOV” (16KIS1069).
972
+ REFERENCES
973
+ [1] P. W. Shor, “Algorithms for quantum computation: Discrete logarithms
974
+ and factoring,” in Proceedings of the 35th Annual Symposium on
975
+ Foundations of Computer Science.
976
+ IEEE Computer Society, 1994, p.
977
+ 124–134.
978
+ [2] M. Mosca, “Cybersecurity in an Era with Quantum Computers: Will We
979
+ Be Ready?” IEEE Security & Privacy, vol. 16, no. 5, pp. 38–41, 2018.
980
+ [3] Peikert,
981
+ Christopher
982
+ J.
983
+ and
984
+ Bernstein,
985
+ D.J.,
986
+ “CRYSTALS-
987
+ KYBER:
988
+ Round
989
+ 3
990
+ Official
991
+ Comments,”
992
+ https://csrc.nist.gov/
993
+ CSRC/media/Projects/post-quantum-cryptography/documents/round-3/
994
+ official-comments/CRYSTALS-KYBER-round3-official-comment.pdf,
995
+ 2022, Retrieved 2022-06-07.
996
+ [4] C. A. Melchor, N. Aragon, S. Bettaieb, L. Bidoux, O. Blazy, J.-
997
+ C. Deneuville, P. Gaborit, E. Persichetti, G. Z´emor, and I. Bourges,
998
+ “Hamming Quasi-Cyclic (HQC),” 2021.
999
+ [5] G. Alagic, J. Alperin-Sheriff, D. Apon, D. Cooper, Q. Dang, J. Kelsey,
1000
+ Y.-K. Liu, C. Miller, D. Moody, R. Peralta et al., “Status Report on the
1001
+ Second Round of the NIST Post-Quantum Cryptography Standardization
1002
+ Process,” NIST, Tech. Rep., July, 2020.
1003
+ [6] R. J. McEliece, “A public-key cryptosystem based on algebraic coding
1004
+ theory,” The Deep Space Network Progress Report, vol. 42-44, pp. 114–
1005
+ 116, 1978.
1006
+ [7] J.-C. Faugere, A. Otmani, L. Perret, and J.-P. Tillich, “Algebraic crypt-
1007
+ analysis of McEliece variants with compact keys,” in Annual Interna-
1008
+ tional Conference on the Theory and Applications of Cryptographic
1009
+ Techniques.
1010
+ Springer, 2010, pp. 279–298.
1011
+ [8] National Institute of Standards and Technology, “FIPS PUB 202
1012
+ -SHA-3 Standard: Permutation-Based Hash and Extendable-Output
1013
+ Functions,”
1014
+ https://csrc.nist.gov/Projects/post-quantum-cryptography,
1015
+ Retrieved 2022-02-17.
1016
+ [9] U. Banerjee, T. S. Ukyab, and A. P. Chandrakasan, “Sapphire: A Con-
1017
+ figurable Crypto-Processor for Post-Quantum Lattice-Based Protocols,”
1018
+ arXiv preprint arXiv:1910.07557, 2019.
1019
+ [10] T. Fritzmann, U. Sharif, D. M¨uller-Gritschneder, C. Reinbrecht,
1020
+ U. Schlichtmann, and J. Sepulveda, “Towards Reliable and Secure Post-
1021
+ Quantum Co-Processors based on RISC-V,” in 2019 Design, Automation
1022
+ & Test in Europe Conference & Exhibition (DATE), 2019, pp. 1148–
1023
+ 1153.
1024
+ [11] P. Karl, T. Fritzmann, and G. Sigl, “Hardware Accelerated FrodoKEM
1025
+ on RISC-V,” in 2022 25th International Symposium on Design and
1026
+ Diagnostics of Electronic Circuits and Systems (DDECS), 2022, pp.
1027
+ 154–159.
1028
+ [12] J. Richter-Brockmann, J. Mono, and T. Guneysu, “Folding BIKE:
1029
+ Scalable Hardware Implementation for Reconfigurable Devices,” IEEE
1030
+ Transactions on Computers, vol. 71, no. 5, pp. 1204-1215, 2022.
1031
+ [13] Bertoni, G. and Daemen, J. and Peeters, M. and Van Assche, G., “Keccak
1032
+ in VHDL,” https://keccak.team/hardware.html, 2022, Retrieved 2022-06-
1033
+ 07.
1034
+
CtE4T4oBgHgl3EQfFwxN/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
DNAzT4oBgHgl3EQfGfv5/content/2301.01031v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:1b272cc23dae58a0b440e0fb367a770bc39421780a1a1ec517262a9171c12a51
3
+ size 756772
DNAzT4oBgHgl3EQfGfv5/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:f7dcfb241c1078aa097102eb6ee8b5f695c5b7a0e5dd82c1c04670a84ea5b5d4
3
+ size 66081
DtE0T4oBgHgl3EQfygLM/content/tmp_files/2301.02661v1.pdf.txt ADDED
@@ -0,0 +1,1275 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ arXiv:2301.02661v1 [q-bio.QM] 5 Jan 2023
2
+ Evaluating Evasion Strategies in Zebrafish Larvae
3
+ Yusheng Jiaoa, Brendan Colverta,b, Yi Mana,c, Matthew J. McHenryd, and Eva Kanso∗a,*
4
+ aAerospace and Mechanical Engineering, University of Southern California, 854 Downey way, Los Angeles, California 90089, USA
5
+ bDepartment of Bioengineering, University of California, San Diego, 9500 Gilman Dr, La Jolla, CA 92093, USA
6
+ cDepartment of Mechanics and Engineering Science at College of Engineering and LTCS, Peking University, Beijing 100871, P. R. China.
7
+ dDepartment of Ecology and Evolutionary Biology, University of California, Irvine, 321 Steinhaus Hall, Irvine, CA 92697, USA
8
+ January 10, 2023
9
+ Abstract
10
+ An effective evasion strategy allows prey to survive encoun-
11
+ ters with predators.
12
+ Prey are generally thought to escape
13
+ in a direction that is either random or serves to maximize
14
+ the minimum distance from the predator.
15
+ Here we intro-
16
+ duce a comprehensive approach to determine the most likely
17
+ evasion strategy among multiple hypotheses and the role of
18
+ biomechanical constraints on the escape response of prey fish.
19
+ Through a consideration of six strategies with sensorimo-
20
+ tor noise and previous kinematic measurements, our analy-
21
+ sis shows that zebrafish larvae generally escape in a direc-
22
+ tion orthogonal to the predator’s heading. By sensing only
23
+ the predator’s heading, this orthogonal strategy maximizes
24
+ the distance from fast-moving predators, and, when operating
25
+ within the biomechanical constraints of the escape response,
26
+ it provides the best predictions of prey behavior among all
27
+ alternatives. This work demonstrates a framework for resolv-
28
+ ing the strategic basis of evastion in predator-prey interac-
29
+ tions, which could be applied to a broad diversity of animals.
30
+ Keywords— Predator-prey interactions | Probabilistic modeling |
31
+ Inference | Fish C-start | Fluid-structure interactions | Hydrody-
32
+ namics
33
+ Author contributions: EK secured funds and designed and supervised
34
+ research.
35
+ YJ, BC, YM, and EK performed research.
36
+ YJ, BC, YM,
37
+ MJM, and EK analyzed results. YJ, YM, and EK wrote the paper and
38
+ YJ, BC, YM, MJM, and EK revised and edited it.
39
+ Author declaration: The authors declare no conflict of interest.
40
+ Introduction
41
+ The abilities to sense and evade predators are central to the survival
42
+ of a diversity of prey species. The timing, speed, and direction of
43
+ a prey’s escape reflect the animal’s evasion strategy, which is form-
44
+ ulated by its neurophysiology and biomechanics [1]. Despite the
45
+ fundamental importance of predator encounters, resolving a prey’s
46
+ strategy is experimentally challenging due to the variability inher-
47
+ ent to animal behavior. Predators vary in their approach toward
48
+ prey and the ability of the prey to respond is filtered through the
49
+ environment and the animal’s physiology, which may additionally
50
+ introduce noise in sensing, integration, and motor response. The
51
+ aims of the present study are to develop an analytical approach
52
+ that is capable of resolving prey strategy from kinematic measure-
53
+ ments and to use that approach to test classic theory on strategy
54
+ in fish predator-prey interactions.
55
+ The interactions between an individual predator fish and prey
56
+ fish offer a classic system for the study of evasion strategy. Fish
57
+ evade predators with a stereotypical ‘C-start’ response, character-
58
+ ized by the fish body bending into a preparatory ‘C’ shape, followed
59
+ by a rapid acceleration as the body unfolds with largely planar mo-
60
+ tion [2]. Fish escape behavior inspired an application of differential
61
+ game theory to determine the optimal strategy of prey [3]. The
62
+ distance-optimal strategy is the solution to the ‘homicidal chauf-
63
+ feur’ game where prey move in the direction that maximizes the
64
+ ∗To
65
+ whom
66
+ correspondence
67
+ should
68
+ be
69
+ addressed.
70
+ E-mail:
71
72
+ closest distance achieved by a predator that maintains a constant
73
+ velocity [4]. The distance-optimal strategy has been invoked to ex-
74
+ plain the escape responses in animals as divergent as cockroaches
75
+ [5], crickets [6], shrimp [7], frogs [8], salamanders [9], crabs [10],
76
+ and a variety of fish species [11, 12]. This strategy is generally con-
77
+ sidered the primary alternative to escaping in a random direction,
78
+ known as the protean strategy, which offers the tactical benefit of
79
+ confusing the predator [13, 14, 15, 16].
80
+ The present study con-
81
+ siders whether previously-measured escape kinematics in zebrafish
82
+ larvae [17, 18] are consistent with distance-optimal, pure-protean,
83
+ or alternative strategies.
84
+ The zebrafish (Danio rerio) larva is a compelling system for
85
+ investigating evasion because it has served as a model for the neu-
86
+ rophysiology and biomechanics of the C-start. Its small size, lack
87
+ of pigmentation, and amenability to genetic manipulation have fa-
88
+ cilitated applications of functional imaging and optogenetics in ze-
89
+ brafish to observe and manipulate the sensory and motor circuits
90
+ responsible for visually-mediated escapes [19, 20, 21].
91
+ A combi-
92
+ nation of high-speed kinematics, flow visualization, and computa-
93
+ tional fluid dynamics have revealed a comprehensive accounting of
94
+ the fluid forces that propel the escape response of zebrafish lar-
95
+ vae [22, 23, 24, 25, 26]. We incorporate these findings into a con-
96
+ sideration of the biomechanical constraints on the escape strategy.
97
+ We adopt a multi-pronged approach for testing the evasion
98
+ strategy in larval zebrafish. Using a strong-inference technique [27],
99
+ we mathematically define models for six strategies, both with and
100
+ without sensorimotor noise (Fig. 1). We then proceed to evaluate
101
+ these model predictions against previous measurements of escape
102
+ kinematics [17] to determine the strategy that most-likely describes
103
+ those observations. Finally, a consideration of the escape hydro-
104
+ dynamics and fluid-structure interactions allows us to evaluate the
105
+ constraints on these strategies. These measures combine to offer
106
+ a general framework for evaluating evasion strategies in predator-
107
+ prey encounters.
108
+ Results
109
+ Our description of the major results is organized around four main
110
+ themes: (1) experimental data of the evasion kinematics of larval
111
+ zebrafish and their descriptive statistics, (2) mathematical defini-
112
+ tions of the evasion strategies, (3) formulation of the analytical
113
+ approach and testing of evasion strategies, with and without sen-
114
+ sorimotor noise, and (4) evaluation of the effects of biomechanical
115
+ constraints on evasion.
116
+ Experimental measurements of escape kinematics
117
+ We analyzed anew a large experimental dataset for the kinematics
118
+ of escape responses in zebrafish larvae that were previously pub-
119
+ lished [17, 18]. Larvae were exposed to a robotic predator, consist-
120
+ ing of a sacrificed adult zebrafish (of fixed size) controlled with a
121
+ motor to move through an aquarium of otherwise still water. As
122
+ detailed previously [17, 18], larvae were largely motionless prior to
123
+ the escape response that was stimulated by the presentation of the
124
+ predator.
125
+ The recorded responses of larvae were compiled from
126
+ numerous experiments, each of which elicited a modest number
127
+ 1
128
+
129
+ V
130
+ −λ
131
+ d
132
+ φ
133
+ prey frame of reference
134
+ predator
135
+ prey
136
+ Contralateral
137
+ θ
138
+ Orthogonal
139
+ θ
140
+ Distance-optimal
141
+ θ
142
+ Parallel
143
+ θ
144
+ Antipodal
145
+ θ
146
+ ψ
147
+ B
148
+ A
149
+ Fig. 1. Evasion strategies. (A) Schematic shows the predator position (d, φ) and heading ψ in the prey’s frame of reference. (B) The change θ in prey heading direction
150
+ at evasion as predicted by five evasion strategies: distance-optimal, prey makes a turn that maximizes the shortest distance from predator; orthogonal, prey turns to the
151
+ direction orthogonal to the predator heading in order to flee the path of the predator; parallel, prey turns to align with the predator heading direction; antipodal, prey turns in the
152
+ opposite direction of the predator angular position; and contralateral, prey turns left or right by 90◦ depending on the predator angular position. Strategies are distinguished
153
+ by color.
154
+ of responses. Larvae were excluded from the analysis if they re-
155
+ sponded within a few body lengths, or a few seconds after, another
156
+ responding larva. The 3D kinematics of larvae were compiled in the
157
+ predator’s frame-of-reference to yield a cloud of responses anterior
158
+ to the robotic predator.
159
+ The speed of the robotic predator was set to a constant equal to
160
+ 2, 11, or 20 cm·s−1 to reflect the speed range of a typical foraging
161
+ predator [22]. This ensured a repeatable stimulus that elicited a
162
+ fast C-start response from the larvae [18, 17]. High-speed kinemat-
163
+ ics recorded a total of 699 evasion instances: Nslow = 251 for the
164
+ slow-moving predator, Nmid = 233 for the mid-speed predator, and
165
+ Nfast = 215 for the fast-moving predator (Fig. 2).
166
+ Experimental analysis
167
+ From the previous kinematic measurements, we presently calcu-
168
+ lated the predator distance d, angular position φ ∈ [0, 2π), and
169
+ heading ψ ∈ [−π, π) in the prey’s frame of reference at the onset of
170
+ the C-start escape response, and we calculated the change in the
171
+ prey’s orientation θ ∈ [−π, π) as it completed the C-start escape
172
+ response (Fig. 1A and SI, Fig. S1B). In our analysis, θ captures the
173
+ rotation of the entire fish body, that is, the change in prey heading,
174
+ which is not the same as the change in the body angular position
175
+ employed previously [17, 18]. We clearly distinguish between the
176
+ prey’s sensing of the predator angular position φ and heading ψ,
177
+ which are often confused in empirical studies of evasion [28, 29, 12].
178
+ In addition to the predator’s actual heading direction ψ, we con-
179
+ sidered that the prey perceives λ, the deviation of the predator’s
180
+ heading from the angular position φ, given by λ = ψ − (φ + π),
181
+ λ ∈ [−π, π) (see Fig. 1A and SI, Fig. S1B, C). The predatory stim-
182
+ ulus is said to be sinistral if λ > 0, that is, predator is headed to
183
+ the left of where it appears in the prey’s visual field, and dextral
184
+ otherwise.
185
+ Table 1. Sensory Requirements of Evasion Strategies
186
+ Predator state
187
+ angular
188
+ heading
189
+ Complexity
190
+ position
191
+ heading
192
+ deviation
193
+ speed
194
+ of sensing
195
+ φ
196
+ ψ
197
+ λ
198
+ V
199
+ Distance-optimal
200
+ ·
201
+
202
+
203
+
204
+ most
205
+ Orthogonal
206
+ ·
207
+
208
+
209
+ ·
210
+ Parallel
211
+ ·
212
+
213
+ ·
214
+ ·
215
+ �
216
+ Antipodal
217
+
218
+ ·
219
+ ·
220
+ ·
221
+ Contralateral
222
+
223
+ ·
224
+ ·
225
+ ·
226
+ least
227
+ ⃝ exact value
228
+ ◦ interval value
229
+ · not needed
230
+ Descriptive statistics of kinematic measurements
231
+ We found no correlation between the prey’s escape direction θ and
232
+ its distance d from the predator at the onset of evasion (SI, Fig.
233
+ S3). However, we did find a clear correlation between the escape
234
+ direction θ and the angular position φ in instances where the preda-
235
+ tor appears in the prey’s visual field (SI, Fig. S5). The data also
236
+ showed a correlation between θ and the predator heading ψ, when
237
+ partitioned based on whether the predator’s heading is sinistral
238
+ (λ > 0) or dextral (λ < 0), relative to its angular position φ (SI,
239
+ Fig. S7). Importantly, although the distributions of φ, ψ, and θ
240
+ varied with predator speed V , the correlations between θ and φ
241
+ and between θ and ψ were qualitatively similar for all V (SI, Figs.
242
+ S5 and S7), suggesting that for the range of speeds considered, V
243
+ can be treated as a model parameter, rather than a variable that
244
+ fundamentally changed the evasion behavior.
245
+ In sum, our statistical analysis (SI, Figs. S2-S7, Table S1) in-
246
+ dicates that the escape direction θ depends on the prey’s sensing
247
+ of the predator’s angular position φ, heading ψ, and deviation be-
248
+ tween them λ, but does not disambiguate which stimuli determine
249
+ the escape direction and the behavioral rules that best explain the
250
+ data.
251
+ Definition of evasion strategies
252
+ We next define the six fish evasion strategies: distance-optimal, or-
253
+ thogonal, parallel, antipodal, contralateral, and pure-protean. We
254
+ index these strategies with an integer n = 1, . . . , 6 in the order listed
255
+ above. In all strategies, we ignore the prey biomechanics and treat
256
+ both the predator and prey as point masses equipped with head-
257
+ ing directions. Therefore, the prey’s strategy is demonstrated by
258
+ the direction of its escape θ. However, these escape direction vary
259
+ among the strategies depending on the relative position and head-
260
+ ing of predator (Fig. 1B). We rate the strategies by their complexity
261
+ of sensing (Table 1), which is a relative measure that increases with
262
+ the number of geometric parameters that must be accurately de-
263
+ termined to execute the escape in the direction predicted by the
264
+ strategy. By this metric, the sensing of exact quantities is more
265
+ complex than interval quantities.
266
+ Distance-optimal evasion strategy
267
+ A distance-optimal evasion strategy considers that the prey’s ob-
268
+ jective, once it detects the predator, is to maximize its minimum
269
+ future distance from the predator [3, 30].
270
+ Accordingly, the prey
271
+ should head in the direction θ relative to its pre-evasion heading
272
+ (see SI, section 2),
273
+ θ = f(1)(ψ, λ; χ) =
274
+ � ψ − χ,
275
+ sinistral: λ ∈ [0, π),
276
+ ψ + χ,
277
+ dextral: λ ∈ (−π, 0),
278
+ (1)
279
+ where χ = cos−1(U/V ) is an angle that depends on the ratio U/V
280
+ of prey speed U to predator speed V . For U > V , χ = 0. We treat χ
281
+ 2
282
+
283
+ 2cm/s
284
+ 11cm/s
285
+ 20cm/s
286
+ head
287
+ tail
288
+ before
289
+ after
290
+ 1cm
291
+ slow predator
292
+ mid-speed predator
293
+ fast predator
294
+ Fig. 2. Experimental measurements of zebrafish larvae evasion in response to robotic predator. Zebrafish larvae were randomly placed in a tank with an approaching robotic
295
+ predator driven at three speeds: V = 2, 11 and 20 cm·s−1. They were mostly straight and motionless until exhibiting a fast C-start evasion response to the predator [17, 18].
296
+ Each experiment involved a single predator-prey encounter. The experiment was repeated to collect three large datasets of size Nslow = 251, Nmid = 233, Nfast = 215
297
+ for the slow, mid-speed, and fast moving predator, respectively. Evasion instances are superimposed for visualization purposes. For each evasion instance, we calculated,
298
+ in the predator frame of reference, the position and orientation of the prey at the onset of evasion (gray macebells where the head represents the prey’s position and spike
299
+ represents its orientation). The change in prey’s orientation θ induced by the C-start evasion response (see inset) is shown in colored macebells. Color is used only for
300
+ illustration purposes and not to be confused with the color code used in Figs. 1, 3, 4, 6 to distinguish between evasion strategies.
301
+ as a model parameter rather than a variable. This distinction may
302
+ not be important for the prey, but it is relevant for our subsequent
303
+ analysis of this strategy.
304
+ Orthogonal evasion strategy
305
+ We propose a simpler evasion strategy where the prey turns 90o
306
+ away from the heading direction ψ of the predator,
307
+ θ = f(2)(ψ, λ) =
308
+ � ψ − π/2,
309
+ sinistral: λ ∈ [0, π),
310
+ ψ + π/2,
311
+ dextral: λ ∈ (−π, 0).
312
+ (2)
313
+ This strategy is equivalent to the distance-optimal strategy in the
314
+ fast predator limit U/V → 0, but may determine θ without the
315
+ need to sense the predator speed V .
316
+ Parallel evasion strategy
317
+ For a slow predator U/V
318
+ ≥ 1, the optimal strategy is for the
319
+ prey to reorient itself in the direction of the predator heading,
320
+ θ = f(3)(ψ) = ψ, which can be readily deduced by setting χ = 0
321
+ in (1).
322
+ The major disadvantage of this strategy is that it could
323
+ place the predator in the blind spot of the prey’s visual field.
324
+ Antipodal evasion strategy
325
+ Empirical observations [31, 28] suggest that the prey might follow
326
+ an antipodal strategy by reorienting its heading θ in the direction
327
+ opposite to the angular position φ where the predator appears in
328
+ its visual field, without any account for the predator heading ψ,
329
+ θ = f(4)(φ) =
330
+ � φ + π,
331
+ left stimulus: φ ∈ [0, π),
332
+ φ − π,
333
+ right stimulus: φ ∈ (π, 2π).
334
+ (3)
335
+ Contralateral evasion strategy
336
+ A similar but simpler strategy, called contralateral, was suggested
337
+ in [17] when the prey is approached by the predator from either
338
+ side. Accordingly, the prey escapes by turning 90o either to the
339
+ ‘left’ or ‘right’ of its own pre-evasion heading,
340
+ θ = f(5)(φ) =
341
+ � −π/2,
342
+ left stimulus: φ ∈ [0, π),
343
+ π/2,
344
+ right stimulus: φ ∈ (π, 2π).
345
+ (4)
346
+ Pure-protean evasion strategy
347
+ The pure-protean strategy suggests that the evasion response θ is
348
+ random, independent of the predator state, with a uniform prob-
349
+ ability of moving in any particular direction.
350
+ This strategy is
351
+ best expressed in a probabilistic manner, where the probability
352
+ density function (PDF) is uniform with equal probability density
353
+ p(6)(θ) = 1/(2π) of obtaining any change in orientation θ.
354
+ Testing evasion strategies
355
+ We developed a method for evaluating evasion strategies in terms
356
+ of their ability to explain the experimental observations (Fig. 2).
357
+ Although the pure-protean strategy is not supported by our exper-
358
+ imental data (see SI, Figs. S5-S7), the data exhibits some level of
359
+ randomness, as indicated by the variability in the location of the
360
+ predator at the onset of evasion, but potentially also due to inher-
361
+ ent sensorimotor noise in the prey’s perception of the predator and
362
+ its execution of the evasion response. Our approach accounts for
363
+ this variation in evaluating, comparing, and ranking the hypotheti-
364
+ cal evasion strategies. To emphasize the generality of our approach,
365
+ we express it in terms of a generic stimulus s and response r, with-
366
+ out reference to the specific degrees of freedom that these vectors
367
+ encompass.
368
+ For the zebrafish larvae, r is simply θ, but s varies
369
+ depending on the strategy; theoretically, it could encompass all or
370
+ any combination of the variables that define the predator state d,
371
+ φ, ψ, λ and V .
372
+ To examine how well the probabilistic strategy models fit the
373
+ experimental data, we interpreted the latter from a probabilistic
374
+ perspective. An experimental dataset generates N samples (si, ri),
375
+ i = 1, . . . N, from a joint PDF, denoted by po(s, r), whose exact
376
+ form is unknown. An evasion behavior follows a conditional PDF
377
+ po(r|s) = po(s, r)/po(s), which is related to the joint PDF po(s, r)
378
+ and the PDF po(s) of stimuli that elicit an escape response via the
379
+ Law of Total Probability [32]. Unfortunately, po(s, r) and po(s) are
380
+ unknown, and only discrete samples of these PDFs are available
381
+ from experiments, thus the need for further modeling and analysis.
382
+ Probabilistic models under precise vs. noisy sensing
383
+ and response
384
+ We distinguish between the actual predator state s and the prey’s
385
+ sensing ˆs of the predator state. Similarly, we distinguish between
386
+ 3
387
+
388
+ strategy
389
+ r=f(n)(s)
390
+ perception
391
+ noise σS
392
+ response
393
+ noise σR
394
+ predator
395
+ state
396
+ s
397
+ prey
398
+ response
399
+ r
400
+ ˆs
401
+ ˆr
402
+ ˆ
403
+ ˆ
404
+ prey response θ
405
+ predator angle φ
406
+ predator angle φ
407
+ predator angle φ
408
+ predator angle φ
409
+ predator angle φ
410
+ prey response θ
411
+ 180◦
412
+ −180◦
413
+ 0◦
414
+ 360◦
415
+ 0◦
416
+ 180◦
417
+ φ
418
+ Experiment
419
+ frequency
420
+ 0
421
+ max
422
+ Probablistic models
423
+ 180◦
424
+ −180◦
425
+ 0◦
426
+ 0◦
427
+ 360◦
428
+ 180◦
429
+ 0◦
430
+ 360◦
431
+ 180◦
432
+ 0◦
433
+ 360◦
434
+ 180◦
435
+ 0◦
436
+ 360◦
437
+ 180◦
438
+ 0◦
439
+ 360◦
440
+ 180◦
441
+ Contralateral
442
+ Antipodal
443
+ Parallel
444
+ Distance-optimal
445
+ Orthogonal
446
+ B
447
+ C
448
+ A
449
+ D
450
+ Fig. 3. Model predictions in response to experimentally observed predator states. (A) Bivariate histogram of (φ, θ) from experimental data. Darker color means larger
451
+ fraction of data points in that area of the (φ, θ) space. (B) Bivariate histogram based on the evasion models (Eqs 1–4) with no noise; model predictions θi in response to
452
+ experimentally observed predator states φi, ψi, λi, i = 1 . . . , N, where N = 699 is the size of the combined data. (C) Schematic illustration of how noise in sensing and
453
+ response is built into the evasion models. (D) Bivariate histogram using realizations from the noisy evasion models (Eq. 5) under optimal noise levels.
454
+ the actual escape heading r and the prey’s desired escape heading
455
+ ˆr. If the prey’s sensing and response are precise, we get ˆs = s and
456
+ ˆr = r. However, the sensorimotor modalities underlying evasion
457
+ are often noisy: the prey may perceive a noisy version ˆs of the
458
+ predator’s state s and its desired response ˆr may be altered by
459
+ noisy execution or environmental conditions to yield r.
460
+ Each evasion strategy n, save the pure-protean, defines a desired
461
+ escape response ˆr given a perceived predatory stimulus ˆs and can
462
+ be expressed as a conditional PDF using the Dirac-delta function
463
+ p(n)(ˆr|ˆs) = δ �
464
+ ˆr − f (n)(ˆs)�
465
+ . The joint PDF p(n)(s, r) formed based
466
+ on evasion strategy n follows from the Law of Total Probability
467
+ p(n)(s, r) =
468
+ � �
469
+ p(r|ˆr)p(n)(ˆr|ˆs)p(ˆs|s)po(s)dˆs dˆr.
470
+ (5)
471
+ Here, p(ˆs|s) and p(r|ˆr) model the noise in the prey’s sensing and
472
+ response. In the case of precise sensing and response, (5) reduces
473
+ to
474
+ p(n)(s, r) = δ �
475
+ r − f (n)(s)�
476
+ po(s).
477
+ (6)
478
+ In the following, we treat each case separately.
479
+ Evaluating evasion strategies under precise sensing
480
+ and response
481
+ To obtain samples of the evasion response predicted by (6), we use
482
+ as input the distribution of the empirically-observed stimuli si, and
483
+ we construct a dataset (si, r(n)
484
+ i
485
+ = f (n)(si)) for each strategy. For
486
+ each predator speed, we arrive at five datasets representing theo-
487
+ retical predictions of the prey’s evasion response according to the
488
+ distance-optimal, orthogonal, parallel, antipodal, and contralat-
489
+ eral strategies.
490
+ Bivariate histograms in the (φ, θ)-plane for each
491
+ strategy based on the dataset combining all predator speeds are
492
+ shown in Fig. 3B. The histograms represent discrete cross-sections
493
+ of p(n)(s, r) and can be used to estimate the joint probability of
494
+ obtaining a predatory stimulus φi and prey response θi.
495
+ Com-
496
+ pared to the histogram obtained from experiments (Fig. 3A), the
497
+ contralateral and antipodal strategies form straight lines because
498
+ the predicted θ(n)
499
+ i
500
+ are uniquely determined by the predator angu-
501
+ lar position φi, while the other distributions are spread out due to
502
+ their dependency on the predator heading ψi and λi.
503
+ To measure the difference between model predictions and exper-
504
+ imental data, we estimated numerically the Kullback-Leibler (K-L)
505
+ divergence DKL, which quantifies the entropy of p(n)(s, r) relative
506
+ to po(s, r), using the method in [33]; see SI, S5.
507
+ Results of the
508
+ K-L divergence are shown in Fig. 4A for all five strategies applied
509
+ to the slow, mid-speed, and fast predator, as well as the combined
510
+ data. The actual K-L divergence is always non-negative; the nega-
511
+ tive values are due to discrete estimation of the PDF. In each of the
512
+ four datasets, the distance-optimal and orthogonal strategies yield
513
+ the lowest estimates of the K-L divergence, implying that, of all
514
+ five evasion strategies, they give the closest predictions of the prey
515
+ escape response. The distance-optimal strategy performs slightly
516
+ better for the slow and mid-speed predator while the orthogonal is
517
+ more advantageous for the fast predator and when considering all
518
+ data combined. The antipodal strategy also gives relatively low K-
519
+ L divergence estimates. The parallel and contralateral strategies,
520
+ whose K-L divergence estimates are significantly higher than the
521
+ other strategies, have the worst fit to experimental data across all
522
+ predator speeds.
523
+ Modeling noise in sensing and response
524
+ We next introduced sensing and response noise according to (5).
525
+ To model sensing noise, we considered ˆs to be normally-distributed
526
+ around the actual state of the predator s, with dispersion σS, and
527
+ to model response noise, we considered r to be normally-distributed
528
+ around the desired response ˆr, with dispersion σR. Substituting
529
+ the noise models p(ˆs|s; σS) and p(r|ˆr; σR) into (5), and recalling
530
+ that p(n)(ˆr|ˆs) = δ �
531
+ ˆr − f (n)(ˆs)�
532
+ , we arrived, for each evasion strat-
533
+ egy n, at a probabilistic model that depends on the noise parame-
534
+ ters σ = {σS, σR} (see SI, section 4). Specifically, we used a von
535
+ Mises distribution (normal distribution on the circle) for θ, φ and λ
536
+ with noise parameters σΘ, σΦ and σΛ; we let the noise on ψ follow
537
+ from ψ = φ + λ + π (see SI, section 4).
538
+ At zero noise, the von
539
+ Mises distribution converges to a Dirac-delta function at the mean
540
+ value; when the noise level is high, it approaches a circular uniform
541
+ distribution with constant PDF 1/(2π) in any escape direction.
542
+ Limit of high noise levels
543
+ If the response noise σΘ is large, any evasion direction is predicted
544
+ with equal probability density 1/(2π), irrespective of the strat-
545
+ egy or the sensing noise, that is, all strategies become essentially
546
+ equivalent to the pure-protean strategy. On the other hand, if the
547
+ response is precise σΘ = 0, but the noise in sensing the preda-
548
+ tor’s angular position σΦ is large, all strategies, except the con-
549
+ tralateral, converge to the pure-protean strategy; the contralateral
550
+ strategy predicts θ = ±π/2 with equal probability. If the prey’s
551
+ 4
552
+
553
+ all
554
+ slow
555
+ mid-speed
556
+ fast
557
+ K-L divergence estimate
558
+ 0
559
+ 1
560
+ 2
561
+ 1.5
562
+ 0.5
563
+ ∆AIC/N
564
+ all
565
+ slow
566
+ mid-speed
567
+ fast
568
+ −0.2
569
+ 0.8
570
+ 0.6
571
+ 0.4
572
+ 0.2
573
+ 0
574
+ Contralateral
575
+ Orthogonal
576
+ Antipodal
577
+ Parallel
578
+ Distance-optimal
579
+ A
580
+ B
581
+ Fig. 4. Evaluation of precise and noisy evasion strategies. (A) K-L divergence estimate from precise model predictions to experiment data is computed separately for each
582
+ dataset (slow, mid-speed and fast predator) and for all data combined. The K-L values for the distance-optimal and orthogonal strategies are the lowest, indicating better fit
583
+ to data. (B) AIC difference (∆AIC = AIC-AICmin), normalized by the respective sample size of each dataset. For each dataset, we used bootstrap method to construct 200
584
+ distinct datasets (by sampling with repetition) of equal size to the original dataset. We optimized each of 200 sets, evaluated the corresponding AIC, and computed the mean
585
+ and standard deviation of ∆AIC. The orthogonal strategy has the lowest ∆AIC, indicating that it is the most parsimonious strategy and best explains the data.
586
+ α1
587
+ −α2
588
+ β
589
+ b2 b1
590
+ A
591
+ C
592
+ Nair et al. 2015
593
+ model (massless)
594
+ model (neutral)
595
+ time
596
+ 0
597
+ 0.25T
598
+ 0.5T
599
+ 0.75T
600
+ T
601
+ 0◦
602
+ middle link orientation β
603
+ 20◦
604
+ 40◦
605
+ 60◦
606
+ 80◦
607
+ −20◦
608
+ head/tail angles
609
+ 0◦
610
+ α2
611
+ α1
612
+ 90◦
613
+ 135◦
614
+ 45◦
615
+ −45◦
616
+ −90◦
617
+ stage 1
618
+ stage 2
619
+ stage 3
620
+ B
621
+ maximum
622
+ bending αmax
623
+ D
624
+ Voesenek et al. 2019
625
+ model (massless)
626
+ model (neutral)
627
+ prey response θ
628
+ maximum bending angle αmax
629
+ 100◦
630
+ 50◦
631
+ 0◦
632
+ 25◦
633
+ 75◦
634
+ 125◦
635
+ Nair et al. 2015
636
+ E
637
+ 180◦
638
+ −180◦
639
+ 180◦
640
+ −180◦
641
+ deformation angle α1
642
+ deformation angle α2
643
+ 0◦
644
+ 0◦
645
+ stage 2
646
+ stage 1
647
+ αmax
648
+ A
649
+ B
650
+ F
651
+ 0
652
+ 1
653
+ −1
654
+ Fig. 5. Biomechanics of fish C-start response. (A) Larval zebrafish bends its body into a C-shape to initiate a fast start. (B) Three fish model, with α1 and α2 representing
655
+ the fish body shape and β the overall body orientation relative to the straight pre-evasion direction. (C) Experimental data of shape changes of larval zebrafish during evasion
656
+ taken from Ref.[34] and processed to represent body deformations in terms of head and tail rotations α1, α2 (gray dots) then fitted by third-order fourier series (black lines).
657
+ (D) Experimental data of overall body rotation for the same evasion instance shown in C (gray dots and black line). Predictions based on fish model, taking as input the
658
+ shape changes in C are shown in blue lines (solid line for massless and dashed line for neutrally-buoyant fish). (E) The sequence of shape changes in C forms a curve C
659
+ in the shape space (α1, α2) (black line). The experimental curve C is approximated by an ellipse (red) of axes A, B along α1 = ±α2 directions. Colormap represents
660
+ curl2[A1, A2] of fish model, which predicts larger turns for curves that encompass solely positive (orange) or negative (blue) values. (F) By varying A and calculating B that
661
+ maximizes the turn, we get a mapping from maximum bending angle αmax =
662
+
663
+ 2A to turning angle θ for massless and neutrally buoyant fish (blue lines) that form an upper
664
+ and lower bounds on the experimental data set of Ref. [23]. Both numerical and experimental data show that the C-start mechanics limits larval zebrafish to turning angles
665
+ θ ≲ 100◦.
666
+ response and sensing of the predator angular position are both pre-
667
+ cise σΘ = σΦ = 0, but the prey’s sensing of the predator’s heading
668
+ is very noisy (σΛ large), the antipodal and contralateral strategies
669
+ do not get affected while the parallel strategy becomes protean.
670
+ Interestingly, in this case, the distance-optimal strategy predicts
671
+ higher probability of evasion in directions opposite to the predator
672
+ location spanning a range of 2χ (see SI, section 4, Fig. S9). That
673
+ is, the distance-optimal strategy becomes a noisy variant of the an-
674
+ tipodal strategy. For χ = π/2, the orthogonal strategy with large
675
+ noise on λ converges to the antipodal strategy with uniform noise
676
+ spanning a range of π on either φ or θ.
677
+ Optimizing noise levels in sensing and response
678
+ For each noisy evasion strategy, we calculated the noise parame-
679
+ ters σ = {σS, σR} that maximize the total likelihood L of the
680
+ model given an experimental dataset, or equivalently minimize the
681
+ negative log-likelihood function NLL (see SI, section 6)
682
+ NLL = − ln L (σ|(r|s); n) = −
683
+
684
+ i
685
+ ln p(n)(ri|si; σ),
686
+ (7)
687
+ where p(n)(ri|si; σ) is the conditional PDF of obtaining a response
688
+ ri given stimulus si for strategy n at noise level σ. The optimal
689
+ noise parameters σ∗ are given by
690
+ σ∗ = arg min
691
+ σ NLL.
692
+ (8)
693
+ 5
694
+
695
+ We solved this optimization problem numerically in the range
696
+ σΦ, σΛ, σΘ ∈ (0, π) (SI, Fig. S6). In Fig. 3D, we plot realizations
697
+ generated from the five probabilistic evasion models p(n)(s, r; σ∗)
698
+ at the optimal noise values corresponding to the dataset of all
699
+ predator speeds combined.
700
+ Compared to the deterministic pre-
701
+ dictions in Fig. 3B, all five distributions appear closer to the ex-
702
+ perimental data in Fig. 3A.
703
+ Evaluating strategies under optimal noise parameters
704
+ To evaluate how well each optimized strategy describes the exper-
705
+ imental data, we applied the Akaike information criterion (AIC)
706
+ defined as [35]
707
+ AIC = 2K − 2 ln L(σ∗|(s, r); n)
708
+ (9)
709
+ where K is the number of model parameters in each strategy. AIC
710
+ considers both the goodness of fit represented by the likelihood
711
+ function, and the complexity of the model: if two models have
712
+ the same likelihood to explain the data, the criterion favors the
713
+ simpler model. For example, for the antipodal strategy, we have
714
+ two noise parameters σS ≡ {σΦ} and σR ≡ {σΘ}, thus K = 2;
715
+ whereas for the orthogonal strategy, we have three noise parameters
716
+ σS ≡ {σΦ, σΛ} and σR ≡ {σΘ}, and the orthogonal strategy is
717
+ deemed more complex than the antipodal strategy.
718
+ We used bootstrapping to probe the accuracy of our evaluation
719
+ of the noisy strategies.
720
+ Starting from each dataset (e.g., that of
721
+ the fast predator), we constructed 200 distinct datasets of equal
722
+ size to the original dataset (e.g., Nfast) by random sampling with
723
+ repetition. We solved the optimization problem 200 times and ob-
724
+ tained 200 values of σ∗ per strategy for each dataset. We calculated
725
+ the likelihood value L and evaluated the AIC for all 200 optimal
726
+ noise values, thus obtaining a distribution of AIC values for each
727
+ strategy and predator speed. The mean and standard deviation of
728
+ the distributions of AIC values, minus the lowest mean value and
729
+ normalized by the size of the respective dataset (Fig. 4B) show
730
+ that strategies with lower mean values of the AIC better fit the
731
+ experimental data.
732
+ The results based on the AIC evaluation of the probabilis-
733
+ tic strategies in the presence of sensory and response noise are
734
+ mostly consistent with the results based on the K-L divergence
735
+ (Fig. 4A) for precise sensing and response, but with marked differ-
736
+ ences. The orthogonal strategy ranks the highest in every dataset;
737
+ the distance-optimal strategy is slightly behind, in second place, in
738
+ all but the slow predator dataset where the antipodal strategy ranks
739
+ second. The difference between the orthogonal, distance-optimal,
740
+ and antipodal strategies is most distinguishable in the case of the
741
+ fast predator. The contralateral and parallel strategies come last
742
+ in all datasets and are least descriptive of experimental data.
743
+ Further analysis of distance-optimal strategy
744
+ While the predator speed was controlled at V = 2, 11, 20 cm s−1,
745
+ the zebrafish larvae were almost identical in all experiments, im-
746
+ plying that the speed ratio U/V varied drastically between evasion
747
+ instances: for the fast predator, this ratio is up to 10 times that of
748
+ the slow predator. If the prey were to sense and use the speed ratio
749
+ to implement the distance-optimal strategy, we would expect the
750
+ best performance to appear at different values of χ = cos−1(U/V )
751
+ depending on predator speed. To test this, we evaluated this strat-
752
+ egy for the slow, mid, and fast predator as a function of χ ∈ [0, 90◦]
753
+ under both precise and noisy sensing and response (SI, section 7,
754
+ Fig.
755
+ S14).
756
+ We found that the K-L divergence decreased as χ
757
+ increased and reached a minimum near χ = 75◦ independent of
758
+ predator speed. Similarly, the NLL dropped as χ increased until it
759
+ reached a minimum at, or close to, χ = 90◦. These results suggest
760
+ that, even if following the distance-optimal strategy, the prey does
761
+ not rely on real-time and accurate measurements of the speed ratio
762
+ U/V , but favors the limit of large predator speed (χ → 90◦), where
763
+ the distance-optimal strategy converges to the orthogonal strategy.
764
+ The same conclusion can be reached by examining the values
765
+ of the optimized noise parameters. In the range 20◦ ≲ χ ≲ 75◦,
766
+ the optimizer mostly selects the largest possible value of σΛ = π to
767
+ best fit the data. This high level of optimized noise indicates that
768
+ λ is not an effective sensory cue in the distance-optimal strategy,
769
+ and that the prey is unlikely to use this strategy at moderate χ
770
+ values (see SI, section7, Fig. S14).
771
+ Evaluating the biomechanical constraints on es-
772
+ cape strategy
773
+ To complete our evaluation of fish evasion strategies, we consid-
774
+ ered the biomechanics of the C-start response. In [34], the motion
775
+ of a zebrafish larvae undergoing a C-start maneuver starting from
776
+ a straight motionless configuration was recorded using high-speed
777
+ photography, and the time evolution of each segment of the fish
778
+ body from the onset of evasion at time t = 0 to after the com-
779
+ pletion of the C-start response at t = T = 25ms was measured.
780
+ We developed a mathematical model of the biomechanics of these
781
+ events and incorporated that model into our analysis.
782
+ We reinterpreted the experimental measurements in the context
783
+ of a three-link fish, head, middle, and tail (Fig. 5B), and we ex-
784
+ tracted from experimental measurements the fish orientation β(t)
785
+ and rotations α1(t) and α2(t) of the head and tail relative to the
786
+ middle segment (see SI, section 8-9).
787
+ The time evolution of the
788
+ zebrafish body during evasion follows the three archetypal stages
789
+ of the C-start response: in stage 1, the fish curls its body to one
790
+ side, rapidly unfurls its body in stage 2, and begins its undulatory
791
+ swimming in stage 3 (Fig. 5C-D).
792
+ A larger number of C-start maneuvers were recorded in [23],
793
+ albeit only measuring the maximum degree of body bending αmax
794
+ and the net change in heading θ = β(T) − β(0) induced by the
795
+ C-start maneuver (Fig. 5F). These results show that the change
796
+ in heading direction θ correlates strongly with the degree of body
797
+ bending [23]. In all recorded maneuvers, the change in body orien-
798
+ tation barely reaches 100◦.
799
+ Physics-based modeling of the C-start response
800
+ To shed light on the relationship between body deformations and
801
+ change in heading θ during evasion, we employed a physics-based
802
+ model of a three-link fish in potential flow [36, 37]. Experimen-
803
+ tal and computational flow analysis had shown that the C-start
804
+ maneuver is dominated by unsteady, pressure-based exchange of
805
+ momentum between the fish and surrounding fluid, with negligible
806
+ contributions from fluid viscosity and shed vorticity [26, 38]. The
807
+ potential flow model captures these unsteady pressure forces via
808
+ the added mass effect (see SI, S8). The fish model is composed of
809
+ three identical prolate spheroids (of major and minor axes a and b)
810
+ such that the head and tail are free to rotate relative to the middle
811
+ link (Fig. 5B); as before, body deformations are described by the
812
+ angles α1(t), α2(t) representing the relative head and tail rotations
813
+ as a function of time t, and body orientation β(t) is the angle be-
814
+ tween the middle section and an inertial direction taken along the
815
+ direction of the initially-straight fish.
816
+ From consideration of momentum balance on the fish-fluid sys-
817
+ tem, we arrived at an equation governing the rate of change of body
818
+ orientation [39, 40, 37] (see SI, section 8)
819
+ ˙β = A1(α1, α2) ˙α1 + A2(α1, α2) ˙α2,
820
+ (10)
821
+ where A1 and A2 are nonlinear functions of body deformations
822
+ α1(t), α2(t); A1 and A2 also depend on fish geometry and fluid
823
+ and body densities (ρf and ρb). For ρb = ρf, the fish is neutrally-
824
+ buoyant. When the fluid forces are dominate, the fish can be con-
825
+ sidered massless and ρb is set to zero. Body rotations are propor-
826
+ tional to the line integral of (10) over a curve C describing body
827
+ deformations in the shape space (α1, α2). For a closed curve C,
828
+ this line integral can be rewritten, using Stokes theorem, as an
829
+ area integral over the region of the (α1, α2) space enclosed by C,
830
+ θ = β(T) − β(0) =
831
+ � � �∂A2
832
+ ∂α1
833
+ − ∂A1
834
+ ∂α2
835
+
836
+ dα1dα2.
837
+ (11)
838
+ The scalar field curl2([A1, A2]) ≡ ∂A2/∂α1 − ∂A1/∂α2 is shown
839
+ in Fig. 5E as a colormap over the entire shape space (α1, α2). To
840
+ maximize the turning angle θ, a straight fish should deform its body
841
+ following a closed curve C that encompasses either non-positive or
842
+ non-negative values of curl2([A1, A2]), i.e., either blue or orange
843
+ regions of the shape space. Closed curves in the orange region lead
844
+ 6
845
+
846
+ −0.2
847
+ 0.6
848
+ 0.2
849
+ 0
850
+ −0.4
851
+ 0.4
852
+ 0.8
853
+ K-L divergence estimate
854
+ combined
855
+ slow
856
+ mid-speed
857
+ fast
858
+ ∆AIC/N
859
+ −0.2
860
+ 0.5
861
+ 0.4
862
+ 0.2
863
+ 0.1
864
+ 0
865
+ 0.3
866
+ −0.1
867
+ combined
868
+ slow
869
+ mid-speed
870
+ fast
871
+ Orthogonal
872
+ Distance-optimal
873
+ original
874
+ constrained
875
+ Antipodal
876
+ B
877
+ A
878
+ Fig. 6. Evaluation of the constrained strategies that consider the physical constraint on turning. Results are shown for the three best-performing models. (A) The
879
+ K-L divergence estimates of the constrained models with precise sensing and response (hollow bars), shown with the results of the original models (solid bars, from Fig. 4A).
880
+ In all four datasets, the constrained models provide discernibly lower K-L divergence estimates, thus better fit to experimental data than the original models, except the
881
+ distance-optimal strategy for the mid-speed predator. The orthogonal strategy improved the most after imposing the constraint, making it fit the data best in all datasets.
882
+ (B) The normalized relative AIC for the constrained models with optimized noise in sensing and response, compared to results using the original models in Fig. 4B. The
883
+ orthogonal strategy still provides best fit to all datasets, marked by the lowest AIC scores, and its advantage over the second best model is more noticeable after imposing
884
+ the constraint. The constrained antipodal strategy performs comparable to or even better than the constrained distance-optimal strategy.
885
+ to turning counter-clockwise.
886
+ By symmetry, diagonally-opposite
887
+ curves in the blue region lead to turning clockwise. Theoretically,
888
+ the simplest curve for turning is a circle or an ellipse in the shape
889
+ space of major axis A aligned with α1 = α2, for which the maxi-
890
+ mum bending angle is αmax =
891
+
892
+ 2A (Fig. 5E). Corresponding fish
893
+ shape deformations and body rotations β(t) are discussed in SI
894
+ (S8-9, Figs. S15-S16).
895
+ Comparing
896
+ model predictions
897
+ to
898
+ C-start
899
+ induced
900
+ turning of the fish body
901
+ We represented the empirical time evolution of shape deformations
902
+ (α1(t), α2(t)) (Fig. 5C) onto the shape space (Fig. 5E). Interest-
903
+ ingly, the curve C (black line) traced by the actual fish follows
904
+ closely the elliptic curve (red line) predicted by the model as best
905
+ for turning. Moreover, when taking the empirical values of α1(t)
906
+ and α2(t) as input to the physics-based model in (10), the resulting
907
+ predictions of β(t) (blue lines in Fig. 5D) follow closely the empiri-
908
+ cal values of β(t) (black line), especially during the first stage of the
909
+ C-start response, where vorticity is negligible; note that while the
910
+ neutrally buoyant model (dashed blue line) deviates slightly from
911
+ empirical observations in stage 2, the massless fish model (solid blue
912
+ line) performs remarkably well way into stage 3, indicating that in-
913
+ deed unsteady pressure forces dominate the C-start maneuver, as
914
+ previously predicted [26].
915
+ We next considered a family of shape changes following the el-
916
+ liptic curve in Fig. 5E by varying A such that αmax =
917
+
918
+ 2A varied
919
+ from 0 to 120◦. This upper limit on αmax corresponds to a maxi-
920
+ mum bending angle without causing the head and tail of the model
921
+ fish to cross each other, and is consistent with the experimental
922
+ observations of [23]. Using (11), we computed, for each αmax, the
923
+ value of B that optimizes the change in orientation θ, thus creating
924
+ a map from αmax to θ. We compare these model-predictions (blue
925
+ lines) to experimental data [23] (black dots) in Fig. 5F. As before,
926
+ we considered massless and neutrally-buoyant fish. The theoretical
927
+ predictions behave nearly as upper and lower limits to experimen-
928
+ tal data.
929
+ As observed previously [23], turning in the model fish
930
+ barely reaches 100◦ even when the three-link fish bends its body
931
+ to the extreme of the head and tail touching. This indicates that
932
+ the biomechanics of the C-start maneuver imposes an upper limit
933
+ on achievable heading directions θ.
934
+ Constrained evasion strategies
935
+ We next incorporated the physical constraints on θ imposed by the
936
+ C-start biomechanics into our evasion strategies. To this end, we
937
+ mapped the response angle θ(n)
938
+ i
939
+ predicted by evasion strategy n
940
+ onto the interval [0, 100◦] using the quadratic mapping
941
+ θ →
942
+
943
+ 1 −
944
+
945
+ 1 − θmax
946
+ π
947
+ � |θ|
948
+ π
949
+
950
+ θ.
951
+ (12)
952
+ Small turns get less constrained whereas large turns are limited
953
+ to the maximum angle θmax = 100◦ allowable by the fish biome-
954
+ chanics.
955
+ We applied this constraint to the three most plausible
956
+ strategies: distance-optimal, orthogonal, and antipodal. For each
957
+ constrained strategy, we repeated the analysis presented above un-
958
+ der precise and noisy sensing and response. Results of the K-L di-
959
+ vergence and AIC analysis for the constrained strategies are shown
960
+ in Fig. 6.
961
+ Compared to the unconstrained strategies, penalizing
962
+ large turns makes all three strategies fit better the experimental
963
+ data across all datasets, with or without added noise, with the ex-
964
+ ception of the distance-optimal strategy for the mid-speed preda-
965
+ tor. Under precise sensing and response, the relative ranking of the
966
+ constrained strategies (Fig. 6A) is similar to the original ranking
967
+ (Fig. 4A), with the distinction that the orthogonal strategy at slow
968
+ and mid-speed predator speed surpasses the distance-optimal strat-
969
+ egy and becomes the best ranking model. Under noisy sensing and
970
+ response, the antipodal strategy ranks higher than the distance-
971
+ optimal strategy in all but the slow predator dataset (Fig. 6B).
972
+ Importantly, whether precise or noisy, the orthogonal strategy fits
973
+ the experimental data better than the other two in all datasets.
974
+ Discussion
975
+ We developed a comprehensive framework for resolving evasion
976
+ strategy from kinematic measurements.
977
+ Our approach considers
978
+ multiple hypotheses, each defined mathematically (Fig. 1), that
979
+ address the role of sensorimotor noise (Fig.
980
+ 3) and incorporate
981
+ the effects of biomechanical constraints (Figs. 5–6). Importantly,
982
+ our approach provides a rigorous methodology, rooted in strong-
983
+ inference principles [27], for revealing the strategy that best fits pre-
984
+ vious kinematic measurements of zebrafish larvae. This approach
985
+ eliminates bias towards a particular hypothetical strategy, as done
986
+ in a previous study that favored the contralateral strategy from the
987
+ dataset presently analyzed [17].
988
+ We found that the responses of zebrafish larvae to evade a preda-
989
+ tor are best-characterized by the orthogonal strategy (Fig. 4). This
990
+ finding challenges the notion that a prey aims either to solely con-
991
+ fuse, or maximize its distance from, the predator with its escape
992
+ [16]. The kinematics of zebrafish do not exhibit the uniform distri-
993
+ bution of escape direction θ characteristic of a pure-protean strat-
994
+ egy (SI, Fig. S2E) [13, 14, 15]. Instead, larvae exhibited correla-
995
+ tions between θ and predator state, including angular position φ
996
+ (SI, Fig. S5) and heading ψ (SI, Fig. S7). The distance-optimal
997
+ strategy is more predictive of zebrafish kinematics, but is inferior
998
+ to the orthogonal strategy, based on K-L divergence and the AIC
999
+ scores (Figs. 4 and 6). Therefore, zebrafish larvae do not conform
1000
+ to the classic dichotomy of models for prey strategy. Although the
1001
+ prevailing patterns favor an orthogonal strategy, variation about
1002
+ the predictions for this hypothesis allows for the possibility of a
1003
+ mixed strategy that could hinder a predator’s ability to anticipate
1004
+ 7
1005
+
1006
+ the prey’s direction.
1007
+ These results are relevant to predator-prey
1008
+ encounters, and hence the ecology, of fish species and reflect the ad-
1009
+ vantages and constraints of the prey’s neurophysiology and biome-
1010
+ chanics.
1011
+ The distance-optimal strategy requires sensing that may exceed
1012
+ the abilities of larval fish. This strategy requires detection of the
1013
+ speed of the approaching predator (Table 1), but larval fish possess
1014
+ poor visual acuity, compared to adult fish, due to a relatively small
1015
+ number of retinal cells [41].
1016
+ It has been demonstrated that the
1017
+ escape is triggered by a threshold diameter of a looming visual
1018
+ stimulus, which may be simulated as a circle with an expanding
1019
+ diameter [19]. A looming stimulus alone does not offer the means
1020
+ to differentiate between threats that are small and fast or large and
1021
+ slow. Therefore, the visual system of larval fish may offer a sensory
1022
+ constraint on its ability to perform the distance-optimal strategy.
1023
+ A more sophisticated visual system could allow for additional cues
1024
+ to gauge the speed or size of a predator, but the processing time
1025
+ necessary to formulate a distance-optimal response may still pose
1026
+ a liability in evasion speed compared with the orthogonal strategy.
1027
+ The orthogonal strategy merely requires an estimate of the
1028
+ predator’s heading and offers tactical benefits relative to many of
1029
+ the alternatives. This strategy is equivalent to the distance-optimal
1030
+ strategy for a high-speed approach (U/V ≪ 1) and therefore suc-
1031
+ ceeds in maximizing the prey’s distance from a fast predator at
1032
+ reduced sensing requirements (Table 1). It is the fastest predators
1033
+ that likely present the greatest threat to the prey. The orthogo-
1034
+ nal strategy offers an additional tactical advantage by evading in
1035
+ a direction that is challenging for a fast-approaching predator to
1036
+ follow because, in order for the predator to execute such large turn
1037
+ at high speed, it needs a large turning radius, which could increase
1038
+ its distance from the prey even further.
1039
+ The predictions of the orthogonal strategy improved in their fit
1040
+ to measured kinematics when we considered constraints imposed by
1041
+ the biomechanics of the C-start (Fig. 6). In particular, our model
1042
+ of a three-link fish in potential flow accurately describes the rela-
1043
+ tionship between the change in fish shape and its turning motion
1044
+ during evasion (Fig. 5). By mapping maximum bending angle to
1045
+ turning angle, the model predicted an upper limit (around 100◦) on
1046
+ achievable turning motion, consistent with the maximum angle ob-
1047
+ served in zebrafish exposed to a lateral looming stimulus [19, 23].
1048
+ The improvement in model predictions that included mechanics
1049
+ demonstrates the influence of the constraints imposed by the prey
1050
+ biomechanics and its interaction with the fluid environment on the
1051
+ evasion strategy of zebrafish larvae.
1052
+ Comparing the K-L divergence and AIC values across slow, in-
1053
+ termediate, and fast predators, the prevalence of the orthogonal
1054
+ strategy is clearest in the case of the fast predator (Fig. 4 and
1055
+ Fig. 6). This feature can be related to the fact that a weak stimu-
1056
+ lus (slow predator) is more likely to trigger an escape response via
1057
+ the less predictable, long-latency neural pathway [42, 43], as op-
1058
+ posed to the fast pathway with minimal latency between perceived
1059
+ danger and motor response [44]. An untangling of these features
1060
+ requires a deeper investigation of how our analytical framework
1061
+ relates to the neurophysiology underlying zebrafish evasion.
1062
+ Our study combined tools from information theory and proba-
1063
+ bilistic methods with behavioral evasion models and physics-based
1064
+ models of the C-start biomechanics to develop a comprehensive
1065
+ analytical approach and thereby determine the evasion strategy of
1066
+ zebrafish larvae. Aside from the details of the biomechanics model,
1067
+ nothing about our approach is specific to the study of fish. Our
1068
+ analysis could be applied to the myriad of studies that have mea-
1069
+ sured escape responses relative to a predator’s approach in a diver-
1070
+ sity of animals [5, 6, 7, 8, 9, 10]. This approach may therefore be
1071
+ applied broadly to the study of predator-prey encounters to reveal
1072
+ the strategic basis of this fundamental aspect of animal behavior.
1073
+ Acknowledgement
1074
+ E.K. acknowledges support from the Of-
1075
+ fice of Naval Research (ONR) Grants N00014-22-1-2655, N00014-
1076
+ 19-1-2035, N00014-17-1-2062, and N00014-14-1-0421; the National
1077
+ Science Foundation (NSF) Grants RAISE IOS-2034043, CBET-
1078
+ 2100209, and INSPIRE MCB-1608744; the National Institutes of
1079
+ Health (NIH) Grant R01 HL 153622-01A1; the Army Research Of-
1080
+ fice (ARO) Grant W911NF-16-1-0074.
1081
+ This research started in
1082
+ summer 2018 at the Summer Graduate School on Mathematical
1083
+ Analysis of Behavior organized by Ann Hermundstad, Vivek Ja-
1084
+ yaraman, Eva Kanso, and L. Mahadevan. The school was jointly
1085
+ supported by the Mathematical Science Research Institute (MSRI)
1086
+ and the Howard-Hugh Medical Institute (HHMI) Janelia Research
1087
+ Campus, and was held at Janelia. BC, YM, and EK acknowledge
1088
+ support from Janelia and would like to thank Sashank Pisupati and
1089
+ Ann Hermundstad for helpful discussions.
1090
+ References
1091
+ [1] Jos. J. Schall and Eric R. Pianka. Evolution of escape behavior
1092
+ diversity. The American Naturalist, 115(4):551–566, 1980.
1093
+ [2] D Weihs.
1094
+ The mechanism of rapid starting of slender fish.
1095
+ Biorheology, 10(3):343–350, 1973.
1096
+ [3] D. Weihs and P.W. Webb.
1097
+ Optimal avoidance and evasion
1098
+ tactics in predator-prey interactions. Journal of Theoretical
1099
+ Biology, 106(2):189 – 206, 1984.
1100
+ [4] Rufus Isaacs. Differential games: a mathematical theory with
1101
+ applications to warfare and pursuit, control and optimization.
1102
+ Courier Corporation, 1999.
1103
+ [5] Paolo Domenici, David Booth, Jonathan M Blagburn, and
1104
+ Jonathan P Bacon. Cockroaches keep predators guessing by
1105
+ using preferred escape trajectories. Curr. Biol., 18(22):1792–
1106
+ 1796, 2008.
1107
+ [6] Jérôme Casas and Thomas Steinmann.
1108
+ Predator-induced
1109
+ flow disturbances alert prey, from the onset of an attack.
1110
+ Proceedings of the Royal Society B: Biological Sciences,
1111
+ 281(1790):20141083, 2014.
1112
+ [7] Stephen A Arnott, DOUGLAS M Neil, and Alan D Ansell.
1113
+ Escape trajectories of the brown shrimp crangon crangon, and
1114
+ a theoretical consideration of initial escape angles from preda-
1115
+ tors. J. Exp. Biol., 202(2):193–209, 1999.
1116
+ [8] Rafe M Brown and Douglas H Taylor. Compensatory escape
1117
+ mode trade-offs between swimming performance and maneu-
1118
+ vering behavior through larval ontogeny of the wood frog, rana
1119
+ sylvatica. Copeia, pages 1–7, 1995.
1120
+ [9] Emanuel Azizi and Tobias Landberg. Effects of metamorphosis
1121
+ on the aquatic escape response of the two-lined salamander
1122
+ (eurycea bislineata). J. Exp. Biol., 205(6):841–849, 2002.
1123
+ [10] Patrick B Woodbury.
1124
+ The geometry of predator avoidance
1125
+ by the blue crab, callinectes sapidus rathbun.
1126
+ Ani. Behav.,
1127
+ 34:28–37, 1986.
1128
+ [11] José E Trujillo, Ian Bouyoucos, William J Rayment, Paolo
1129
+ Domenici, Serge Planes, Jodie L Rummer, and Bridie JM Al-
1130
+ lan.
1131
+ Escape response kinematics in two species of tropical
1132
+ shark: short escape latencies and high turning performance.
1133
+ Journal of Experimental Biology, 225(22):jeb243973, 2022.
1134
+ [12] Paolo Domenici. The visually mediated escape response in fish:
1135
+ predicting prey responsiveness and the locomotor behaviour
1136
+ of predators and prey. Marine and Freshwater Behaviour and
1137
+ Physiology, 35(1-2):87–110, 2002.
1138
+ [13] D. A. Humphries and P. M. Driver. Protean defence by prey
1139
+ animals. Oecologia, 5(4):285–302, 1970.
1140
+ [14] Peter M Driver and David Andrew Humphries. Protean be-
1141
+ haviour. Clarendon Press, 1988.
1142
+ [15] Talia Y Moore, Kimberly L Cooper, Andrew A Biewener, and
1143
+ Ramanarayan Vasudevan. Unpredictability of escape trajec-
1144
+ tory explains predator evasion ability and microhabitat pref-
1145
+ erence of desert rodents. Nature comm., 8(1):1–9, 2017.
1146
+ [16] Paolo Domenici, Jonathan M Blagburn, and Jonathan P Ba-
1147
+ con.
1148
+ Animal escapology ii:
1149
+ escape trajectory case studies.
1150
+ Journal of Experimental biology, 214(15):2474–2494, 2011.
1151
+ [17] Arjun Nair, Kelsey Changsing,
1152
+ William J. Stewart,
1153
+ and
1154
+ Matthew J. McHenry.
1155
+ Fish prey change strategy with the
1156
+ direction of a threat. Proceedings of the Royal Society B: Bi-
1157
+ ological Sciences, 284(1857):20170393, 2017.
1158
+ 8
1159
+
1160
+ [18] William
1161
+ J.
1162
+ Stewart,
1163
+ Arjun
1164
+ Nair,
1165
+ Houshuo
1166
+ Jiang,
1167
+ and
1168
+ Matthew J. McHenry.
1169
+ Prey fish escape by sensing the
1170
+ bow wave of a predator.
1171
+ Journal of Experimental Biology,
1172
+ 217(24):4328–4336, 2014.
1173
+ [19] Timothy W Dunn, Christoph Gebhardt, Eva A Naumann,
1174
+ Clemens Riegler, Misha B Ahrens, Florian Engert, and Filippo
1175
+ Del Bene. Neural circuits underlying visually evoked escapes
1176
+ in larval zebrafish. Neuron, 89(3):613–628, 2016.
1177
+ [20] Alix MB Lacoste, David Schoppik, Drew N Robson, Martin
1178
+ Haesemeyer, Ruben Portugues, Jennifer M Li, Owen Randlett,
1179
+ Caroline L Wee, Florian Engert, and Alexander F Schier. A
1180
+ convergent and essential interneuron pathway for mauthner-
1181
+ cell-mediated escapes. Curr. Biol., 25(11):1526–1534, 2015.
1182
+ [21] Shin-ichi Higashijima, Mark A Masino, Gail Mandel, and
1183
+ Joseph R Fetcho. Imaging neuronal activity during zebrafish
1184
+ behavior with a genetically encoded calcium indicator. J. neu-
1185
+ rophysiol., 90(6):3986–3997, 2003.
1186
+ [22] William J. Stewart, Gilberto S. Cardenas, and Matthew J.
1187
+ McHenry. Zebrafish larvae evade predators by sensing water
1188
+ flow. Journal of Experimental Biology, 216(3):388–398, 2013.
1189
+ [23] Cees J. Voesenek, Remco P. M. Pieters, Florian T. Muijres,
1190
+ and Johan L. van Leeuwen. Reorientation and propulsion in
1191
+ fast-starting zebrafish larvae: an inverse dynamics analysis.
1192
+ Journal of Experimental Biology, 222(14), 2019.
1193
+ [24] Cees J. Voesenek, Florian T. Muijres, and Johan L. van
1194
+ Leeuwen. Biomechanics of swimming in developing larval fish.
1195
+ Journal of Experimental Biology, 221(1), 2018.
1196
+ [25] Ulrike K. Müller and Johan L. van Leeuwen.
1197
+ Swimming of
1198
+ larval zebrafish: ontogeny of body waves and implications for
1199
+ locomotory development.
1200
+ Journal of Experimental Biology,
1201
+ 207(5):853–868, 2004.
1202
+ [26] M. Gazzola, W. M. Van Rees, and P. Koumoutsakos.
1203
+ C-
1204
+ start: optimal start of larval fish. Journal of Fluid Mechanics,
1205
+ 698:5–18, 2012.
1206
+ [27] John R Platt. Strong inference: Certain systematic methods
1207
+ of scientific thinking may produce much more rapid progress
1208
+ than others. Science, 146(3642):347–353, 1964.
1209
+ [28] PAOLO Domenici and ROBERT W Blake. Escape trajectories
1210
+ in angelfish (pterophyllum eimekei). Journal of Experimental
1211
+ Biology, 177(1):253–272, 1993.
1212
+ [29] Robert C Eaton and Deanna S Emberley. How stimulus di-
1213
+ rection determines the trajectory of the mauthner-initiated es-
1214
+ cape response in a teleost fish. Journal of Experimental Biol-
1215
+ ogy, 161(1):469–487, 1991.
1216
+ [30] Alberto Soto, William J. Stewart, and Matthew J. McHenry.
1217
+ When Optimal Strategy Matters to Prey Fish.
1218
+ Int. Comp.
1219
+ Biol., 55(1):110–120, 05 2015.
1220
+ [31] Robert C Eaton, William A Lavender, and Chris M Wieland.
1221
+ Identification of mauthner-initiated response patterns in gold-
1222
+ fish: evidence from simultaneous cinematography and electro-
1223
+ physiology. Journal of Comparative Physiology, 144(4):521–
1224
+ 531, 1981.
1225
+ [32] Mark J Schervish. Theory of statistics. Springer Science &
1226
+ Business Media, 2012.
1227
+ [33] F. Perez-Cruz. Kullback-leibler divergence estimation of con-
1228
+ tinuous distributions. In 2008 IEEE International Symposium
1229
+ on Information Theory, pages 1666–1670, 2008.
1230
+ [34] Arjun Nair, Grigor Azatian, and Matthew J. McHenry. The
1231
+ kinematics of directional control in the fast start of zebrafish
1232
+ larvae. Journal of Experimental Biology, 218(24):3996–4004,
1233
+ 2015.
1234
+ [35] H. Akaike.
1235
+ A new look at the statistical model identifica-
1236
+ tion.
1237
+ IEEE Transactions on Automatic Control, 19(6):716–
1238
+ 723, 1974.
1239
+ [36] Eva Kanso and Jerrold E Marsden.
1240
+ Optimal motion of an
1241
+ articulated body in a perfect fluid. In Proceedings of the 44th
1242
+ IEEE Conference on Decision and Control, pages 2511–2516.
1243
+ IEEE, 2005.
1244
+ [37] Yusheng Jiao, Feng Ling, Sina Heydari, Nicolas Heess, Josh
1245
+ Merel, and Eva Kanso. Learning to swim in potential flow.
1246
+ Physical Review Fluids, 6(5):050505, 2021.
1247
+ [38] Ulrike K Muller, Jos GM van den Boogaart, and Johan L van
1248
+ Leeuwen. Flow patterns of larval fish: undulatory swimming
1249
+ in the intermediate flow regime. Journal of Experimental Bi-
1250
+ ology, 211(2):196–205, 2008.
1251
+ [39] Eva Kanso, Jerrold E Marsden, Clarence W Rowley, and
1252
+ Juan B Melli-Huber. Locomotion of articulated bodies in a
1253
+ perfect fluid.
1254
+ Journal of Nonlinear Science, 15(4):255–289,
1255
+ 2005.
1256
+ [40] Ross L Hatton and Howie Choset. Connection vector fields
1257
+ and optimized coordinates for swimming systems at low and
1258
+ high reynolds numbers. In ASME 2010 Dynamic Systems and
1259
+ Control Conference, pages 817–824. American Society of Me-
1260
+ chanical Engineers Digital Collection, 2010.
1261
+ [41] Marion F Haug, Oliver Biehlmaier, Kaspar P Mueller, and
1262
+ Stephan CF Neuhauss. Visual acuity in larval zebrafish: be-
1263
+ havior and histology. Front. Zool., 7(1):1–7, 2010.
1264
+ [42] Harold A Burgess and Michael Granato.
1265
+ Sensorimotor gat-
1266
+ ing in larval zebrafish. Journal of Neuroscience, 27(18):4984–
1267
+ 4994, 2007.
1268
+ [43] Gwyneth M Card. Escape behaviors in insects. Current Opin-
1269
+ ion in Neurobiology, 22(2):180–186, 2012. Neuroethology.
1270
+ [44] J. A. WALKER, C. K. GHALAMBOR, O. L. GRISET,
1271
+ D. McKENNEY, and D. N. REZNICK. Do faster starts in-
1272
+ crease the probability of evading predators? Functional Ecol-
1273
+ ogy, 19(5):808–815, 2005.
1274
+ 9
1275
+
DtE0T4oBgHgl3EQfygLM/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
FdE3T4oBgHgl3EQftAvj/content/2301.04673v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:e8bf95cb60fe3b072dac25b238acbc11db080b67757bfd77660f876686466005
3
+ size 1912672
FtFJT4oBgHgl3EQfDSx3/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:215f341db076f3bd248c35b216a2b3d8301166a9fc3ae8d2b8df9793009ee821
3
+ size 236401
GtE3T4oBgHgl3EQftwtJ/content/2301.04678v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:1ff401fd1037bfac809ce4cb5a668645b04fd6d3a93ec36a7a782a179cdbe312
3
+ size 1231707
GtE3T4oBgHgl3EQftwtJ/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:e1ac24270800454be879a873af698df301f7bc00c851a60a70fcd6485bba1015
3
+ size 11206701
GtE3T4oBgHgl3EQftwtJ/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:1ef89af7b06b73c17a94a4b12b99e2f45714fe657b58574a2f95a7cd7f52960b
3
+ size 398733
HdAyT4oBgHgl3EQfS_fF/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:3bf6be21b277827fcc9e0bfc37de6637aebabb931d72d5e9990fada33843d7b1
3
+ size 3080237
IdFJT4oBgHgl3EQfvS1K/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:0fe3f00ea1c33c610b6e67d7870406acfe41ed09cb080ab353413451f077b29b
3
+ size 1900589
KtE0T4oBgHgl3EQfigGw/content/2301.02447v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:6b757fbcb0aeadec4be32e19cbd89c1503f5f37baff5cafdcdee177deb0f6067
3
+ size 256225
KtE0T4oBgHgl3EQfigGw/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:6c081e65dc64f27cdebe44ea0a7a1f9e584a90355d3a678c73850aa44aba7834
3
+ size 2883629
LtAyT4oBgHgl3EQfT_ca/content/tmp_files/2301.00115v1.pdf.txt ADDED
@@ -0,0 +1,1296 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ LONGTIME DYNAMICS OF IRROTATIONAL SPHERICAL WATER DROPS: INITIAL
2
+ NOTES
3
+ CHENGYANG SHAO
4
+ In this note, we propose several unsolved problems concerning the irrotational oscillation of a water
5
+ droplet under zero gravity. We will derive the governing equation of this physical model, and convert it
6
+ to a quasilinear dispersive partial differential equation defined on the sphere, which formally resembles the
7
+ capillary water waves equation but describes oscillation defined on curved manifold instead. Three types of
8
+ unsolved mathematical problems related to this model will be discussed in observation of hydrodynamical
9
+ experiments under zero gravity1: (1) Strichartz type inequalities for the linearized problem (2) existence of
10
+ periodic solutons (3) normal form reduction and generic lifespan estimate. It is pointed out that all of these
11
+ problems are closely related to certain Diophantine equations, especially the third one.
12
+ 1. Capillary Spherical Water Waves Equation: Derivation
13
+ 1.1. Water Waves Equation for a Bounded Water Drop. Comparing to gravity water waves problems,
14
+ the governing equation for a spherical droplet of water under zero gravity takes a very different form. At
15
+ a first glance it looks similar to the water waves systems as mentioned above, but some crucial differences
16
+ do arise after careful analysis. To the author’s knowledge, besides those dealing with generic free-boundary
17
+ Euler equation ( [14], [36]), the only reference on this problem is Beyer-G¨unther [9], in which the local
18
+ well-posedness of the equation is proved using a Nash-Moser type implicit function theorem. We will briefly
19
+ discribe known results for gravity water waves problems in the next subsection.
20
+ To start with, let us pose the following assumptions on the fluid motion that we try to describe:
21
+ • (A1) The perfect, irrotational fluid of constant density ρ0 occupies a smooth, compact region in R3.
22
+ • (A2) There is no gravity or any other external force in presence.
23
+ • (A3) The air-fluid interface is governed by the Young-Laplace law, and the effect of air flow is
24
+ neglected.
25
+ We assume that the boundary of the fluid region has the topological type of a smooth compact orientable
26
+ surface M, and is described by a time-dependent embedding ι(t, ·) : M → R3. We will denote a point on M
27
+ by x, the image of M under ι(t, ·) by Mt, and the region enclosed by Mt by Ωt. The outer normal will be
28
+ denoted by N(ι). We also write ¯∇ for the flat connection on R3.
29
+ Adopting assumption (A3), we have the Young-Laplace equation:
30
+ σ0H(ι) = pi − pe,
31
+ where H(ι) is the (scalar) mean curvature of the embedding, σ0 is the surface tension coefficient (which is
32
+ assumed to be a constant), and pi, pe are respectively the inner and exterior air pressure at the boundary;
33
+ they are scalar functions on the boundary and we assume that pe is a constant. Under assumptions (A1) and
34
+ (A2), we obtain Bernoulli’s equation, sometimes referred as the pressure balance condition, on the evolving
35
+ 1There are numbers of visual materials on such experiments conducted by astronauts. See for example https://www.youtube.
36
+ com/watch?v=H_qPWZbxFl8&t or https://www.youtube.com/watch?v=e6Faq1AmISI&t.
37
+ 1
38
+ arXiv:2301.00115v1 [math.AP] 31 Dec 2022
39
+
40
+ 2
41
+ CHENGYANG SHAO
42
+ surface:
43
+ (1.1)
44
+ ∂Φ
45
+ ∂t
46
+ ����
47
+ Mt
48
+ + 1
49
+ 2| ¯∇Φ|Mt|2 − pe = −σ0
50
+ ρ0
51
+ H(ι),
52
+ where Φ is the velocity potential of the velocity field of the air. Note that Φ is determined up to a function in
53
+ t, so we shall leave the constant pe around for convenience reason that will be explained shortly. According
54
+ to assumption (A1), the function Φ is a harmonic function within the region Ωt, so it is uniquely determined
55
+ by its boundary value, and the velocity field within Ωt is ¯∇Φ. The kinematic equation on the free boundary
56
+ Mt is naturally obtained as
57
+ (1.2)
58
+ ∂ι
59
+ ∂t · N(ι) = ¯∇Φ|Mt · N(ι).
60
+ Finally, we would like to discuss the conservation laws for (1.1)-(1.2). The preservation of volume Vol(Ωt) =
61
+ Vol(Ω0) is a consequence of incompressibility. The system describes an Eulerian flow without any external
62
+ force, so the center of mass moves at a uniform speed along a fixed direction, i.e.
63
+ (1.3)
64
+ 1
65
+ Vol(Ω0)
66
+
67
+ Ωt
68
+ PdVol(P) = V0t + C0,
69
+ with Vol being the Lebesgue measure, P marking points in R3, V0 and C0 being the velocity and starting
70
+ position of center of mass respectively. Furthermore, the total momentum is conserved, and since the flow is
71
+ a potential incompressible one, the conservation of total momentum is expressed as
72
+ (1.4)
73
+
74
+ Mt
75
+ ρ0ΦN(ι)dArea(Mt) ≡ ρ0Vol(Ω0)V0.
76
+ Most importantly, it is not surprising that (1.1)-(1.2) is a Hamilton system (the Zakharov formulation for
77
+ water waves; see Zakharov [43]), with Hamiltonian
78
+ (1.5)
79
+ σ0Area(ι) + 1
80
+ 2
81
+
82
+ Ωt
83
+ ρ0| ¯∇Φ|2dVol = σ0Area(Mt) + 1
84
+ 2
85
+
86
+ Mt
87
+ ρ0Φ|Mt
88
+ � ¯∇Φ|Mt · N(ι)
89
+
90
+ dArea,
91
+ i.e. potential proportional to surface area plus kinetic energy of the fluid.
92
+ 1.2. Converting to a Differential System. It is not hard to verify that the system (1.1)-(1.2) is invariant
93
+ if ι is composed with a diffeomorphism of M; we may thus regard it as a geometric flow. If we are only
94
+ interested in perturbation near a given configuration, we may reduce system (1.1)-(1.2) to a non-degenerate
95
+ dispersive differential system concerning two scalar functions defined on M, just as Beyer and G¨unther did
96
+ in [9]. In fact, during a short time of evolution, the interface can be represented as the graph of a function
97
+ defined on the initial surface: if ι0 : M → R3 is a fixed embedding close to the initial embedding ι(0, x), we
98
+ may assume that ι(t, x) = ι0(x) + ζ(t, x)N0(x), where ζ is a scalar “height” function defined on M0 and N0
99
+ is the outer normal vector field of M0.
100
+ With this observation, we shall transform the system (1.1)&(1.2) into a non-local system of two real scalar
101
+ functions (ζ, φ) defined on M, where ζ is the “height” function described as above, and φ(t, x) = Φ(t, ι(t, x))
102
+ is the boundary value of the velocity potential, pulled back to the underlying manifold M.
103
+ The operator
104
+ Bζ : φ → ¯∇Φ|Mt
105
+ maps the pulled-back Dirichlet boundary value φ to the boundary value of the gradient of Φ. We shall write
106
+ (D[ζ]φ)N(ι)
107
+
108
+ LONGTIME DYNAMICS OF IRROTATIONAL SPHERICAL WATER DROPS: INITIAL NOTES
109
+ 3
110
+ Figure 1. The shape of the surface
111
+ for its normal part, where D[ζ] is the Dirichlet-Neumann operator corresponding to the region enclosed by
112
+ the image of ι0 + ζN0. Thus
113
+ ∂ζ
114
+ ∂t N0 · N(ι) = D[ζ]φ.
115
+ We also need to calculate the restriction of ∂tΦ on Mt in terms of φ and ι. By the chain rule,
116
+ ∂Φ
117
+ ∂t
118
+ ����
119
+ Mt
120
+ = ∂φ
121
+ ∂t − ¯∇Φ|Mt · ∂ι
122
+ ∂t
123
+ = ∂φ
124
+ ∂t −
125
+ � ¯∇Φ|Mt · N0
126
+ � ∂ζ
127
+ ∂t
128
+ = ∂φ
129
+ ∂t −
130
+ 1
131
+ N0 · N(ι)
132
+ � ¯∇Φ|Mt · N0
133
+
134
+ · D[ζ]φ.
135
+ We thus arrive at the following nonlinear system:
136
+ (EQ(M))
137
+
138
+
139
+
140
+
141
+
142
+
143
+
144
+ ∂ζ
145
+ ∂t =
146
+ 1
147
+ N0 · N(ι)D[ζ]φ,
148
+ ∂φ
149
+ ∂t =
150
+ 1
151
+ N0 · N(ι) (Bζφ · N0) · D[ζ]φ − 1
152
+ 2|Bζφ|2 − σ0
153
+ ρ0
154
+ H(ι) + pe,
155
+ where ι = ι0 + ζN0.
156
+ Remark 1.
157
+ We may obtain an explicit expression of Bζφ = ¯∇Φ|Mt in terms of φ (together with the
158
+ connection ∇0 on the fixed embedding ι0(M)), just as standard references did for Euclidean or periodic
159
+ water waves, but that is not necessary for our discussion at the moment. It is important to keep in mind
160
+ that the preservation of volume and conservation of total momentum (1.3)-(1.4) convert to integral equalities
161
+ of (ζ, φ). These additional restrictions are not obvious from the differential equations (EQ(M)), though they
162
+ can be deduced from (EQ(M)) since they are just rephrase of the original physical laws (1.1)-(1.2).
163
+ For M = S2, the case that we shall discuss in detail, we refer to the system as the capillary spherical water
164
+ waves equation. To simplify our discussion, we shall be working under the center of mass frame, and require
165
+ the eigenmode Π(0)φ to vanish for all t. This could be easily accomplished by absorbing the eigenmode
166
+ into φ since the equation is invariant by a shift of φ. In a word, from now on, we will be focusing on the
167
+
168
+ NS+ 0
169
+ 1
170
+ 1
171
+ 1
172
+ -
173
+ -
174
+ -
175
+ -
176
+ 1
177
+ -
178
+ -
179
+ y4
180
+ CHENGYANG SHAO
181
+ non-dimensional capillary spherical water waves equation
182
+ (EQ)
183
+
184
+
185
+
186
+
187
+
188
+
189
+
190
+ ∂ζ
191
+ ∂t =
192
+ 1
193
+ N0 · N(ι)D[ζ]φ,
194
+ ∂φ
195
+ ∂t =
196
+ 1
197
+ N0 · N(ι) (Bζφ · N0) · D[ζ]φ − 1
198
+ 2|Bζφ|2 − H(ι),
199
+ where ι = (1 + ζ)ι0, and Π(0)φ ≡ 0. We assume that the total volume of the fluid is 4π/3, so that the
200
+ preservation of volume is expressed as
201
+ (1.6)
202
+ 1
203
+ 3
204
+
205
+ S2(1 + ζ)3dµ0 ≡ 4π
206
+ 3 ,
207
+ where µ0 is the standard measure on S2. The inertial movement of center of mass (1.3) and conservation of
208
+ total momentum (1.4) under our center of mass frame are expressed respectively as
209
+ (1.7)
210
+
211
+ S2(1 + ζ)4N0dµ0 = 0,
212
+
213
+ S2 φN(ι)dµ(ι) = 0,
214
+ where µ(ι) is the induced surface measure. Further, the Hamiltonian of the system is
215
+ (1.8)
216
+ H[ζ, φ] = Area(ι) + 1
217
+ 2
218
+
219
+ S2 φ · D[ζ]φ · dµ(ι),
220
+ and for a solution (ζ, φ) there holds H[ζ, φ] ≡ 4π.
221
+ Up to this point, we are still working within the realm of well-established frameworks. We already know
222
+ that the general free-boundary Euler equation is locally well-posed due to the work of [14] or [36], and due
223
+ to the curl equation the curl free condition persists during the evolution. On the other hand, the Cauchy
224
+ problem of system (1.1) and (1.2) is known to be locally well-posed, due to Beyer and G¨unther in [9].
225
+ They used an iteration argument very similar to a Nash-Moser type argument in the sense that it involves
226
+ multiple scales of Banach spaces and “tame” maps in a certain sense. Finally, it is not hard to transplant
227
+ the potential-theoretic argument of Wu [40] to prove the local well-posedness.
228
+ To sum up, we already know that the system (EQ(M)) for a compact orientable surface M (hence (EQ)
229
+ specifically) is locally well-posed. But this is all we can assert for the motion of a water droplet under zero
230
+ gravity. In the following part of this note, we will propose several questions and conjectures concerning the
231
+ long-time behaviour of water droplets under zero gravity.
232
+ 1.3. Previous Works on Water Waves. There has already been several different approaches to describe
233
+ the motion of perfect fluid with free boundary. One is to consider the motion of perfect fluid occupying an
234
+ arbitrary domain in R2 or R3, either with or without surface tension. The motion is described by a free
235
+ boundary value problem of Euler equation. This generic approach was employed by Countand-Shkoller [14]
236
+ and Shatah-Zeng [36]. Both groups proved the local-wellposedness of the problem. This approach has the
237
+ advantage of being very general, applicable to all geometric shapes of the fluid.
238
+ On the other hand, when coming to potential flows of a perfect fluid, the curl free property results in dis-
239
+ persive nature of the problem. The motion of a curl free perfect fluid under gravity and a free boundary value
240
+ condition is usually referred to as the gravity water waves problem. The first breakthroughs in understanding
241
+ local well-posedness were works of Wu [39] [40], who proved local well-posedness of the gravity water waves
242
+ equation without any smallness assumption. Lannes [27] extended this to more generic bottom shapes. Taking
243
+ surface tension into account, the problem becomes gravity-capillary water waves. Schweizer [32] proved local
244
+ well-posedness with small Cauchy data of the gravity-capillary water waves problem, and Ming-Zhang [30]
245
+ proved local well-posedness without smallness assumption. Alazard-Metevier [2] and Alazard-Burq-Zuily [3]
246
+
247
+ LONGTIME DYNAMICS OF IRROTATIONAL SPHERICAL WATER DROPS: INITIAL NOTES
248
+ 5
249
+ used para-differential calculus to obtain the optimal regularity for local well-posedness of the water waves
250
+ equation, either with or without surface tension.
251
+ For discussion of long time behavior, it is important to take into account the dispersive nature of the
252
+ problem. For linear dispersive properties, there has been work of Christianson-Hur-Staffilani [13]. For gravity
253
+ water waves living in R2, works on lifespan estimate include Wu [41] and Hunter-Ifrim-Tataru [22] (almost
254
+ global result), Ionescu-Pusateri [24] and Alazard-Delort [4] and Ifrim-Tataru [23] (global result). For gravity
255
+ water waves living in R3, there are works of Germain-Masmoudi-Shatah [18] and Wu [42] (no surface tension),
256
+ Germain-Masmoudi-Shatah [19] (no gravity), Deng-Ionescu-Pausader-Pusateri [15] (gravity-capillary water
257
+ waves) and Wang [38] (gravity-capillary water waves with finite depth). These results all employed different
258
+ forms of decay estimates derived from dispersive properties.
259
+ As for long time behavior of periodic water waves, Berti-Delort [6] considered gravity-capillary water waves
260
+ defined on T1, Berti-Feola-Pusateri [7] considered gravity water waves defined on T1, Ionescu-Pusateri [26]
261
+ considered gravity-capillary water waves defined on T2, and obtained an estimate on the lifespan beyond
262
+ standard energy method. All of the three groups used para-differential calculus and suitable normal form
263
+ reduction; the results of Berti-Delort and Ionescu-Pusateri were proved for physical data of full Lebesgue
264
+ measure.
265
+ To sum up, all results on the gravity water waves problem listed above are concerned with an equation for
266
+ two scalar functions defined on a fixed flat manifold, being one of the following: R1, R2, T1, T2, sometimes
267
+ called the “bottom” of the fluid. These two functions represents the geometry of the liquid-gas interface and
268
+ the boundary value of the velocity potential, respectively. The manifold itself is considered as the bottom
269
+ of the container in which all dynamics are performed. We observe that the differential equation (EQ(M)) is,
270
+ mathematically, fundamentally different from the water waves equations that have been well-studied.
271
+ 2. Initial Notes on Unsolved Problems
272
+ In this section, we propose unsolved problems related to the spherical capillary water waves system
273
+ (EQ(M)) with M = S2. Not surprisingly, these problems all have deep backgrounds in number theory.
274
+ 2.1. Linearization Around the Static Solution. We are mostly interested in the stability of the static
275
+ solution of (EQ(M)). A static solution should be a fluid region whose shape stays still, with motion being
276
+ a mere shift within the space.
277
+ In this case, we have pe = 0 since the reference is relatively static with
278
+ respect to the air. Moreover, the velocity field ¯∇Φ and “potential of acceleration” ∂Φ/∂t must both be
279
+ spatially uniform, so that the left-hand-side of the pressure balance condition (1.1) is a function of t alone.
280
+ It follows that ι(M) is always a compact embedded surface of constant mean curvature, hence in fact always
281
+ an Euclidean sphere by the Alexandrov sphere theorem (see [29]), and we may just take M = S2. Moreover,
282
+ since ι(S2) should enclose a constant volume by incompressibility, the radius of that sphere does not change.
283
+ After suitable scaling, we may assume that the radius is always 1, and ρ0 = 1, σ0 = 1, to make (1.1)-(1.2)
284
+ non-dimensional. Finally, by choosing the center of mass frame, we may simply assume that the spatial shift
285
+ is always zero, so that the velocity potential Φ ≡ Φ0, a real constant. It is harmless to fix it to be zero.
286
+ Thus, under our convention, a static solution of (1.1)-(1.2) takes the form
287
+ (2.1)
288
+
289
+ ι(t, x)
290
+ Φ(t, x)
291
+
292
+ =
293
+
294
+ ι0(x)
295
+ 0
296
+
297
+ ,
298
+ where a ∈ R3 is a constant vector, and ι0 is the standard embedding of S2 as ∂B(0, 1) ⊂ R3. Equivalently,
299
+ this means that a static solution of (EQ(M)) under our convention must be (ζ, φ) = (0, 0). Note here that
300
+ the Gauss map of ι0 coincides with itself.
301
+
302
+ 6
303
+ CHENGYANG SHAO
304
+ We can now start our perturbation analysis around a static solution at the linear level. Let E(n) be the
305
+ space of spherical harmonics of order n, normalized according to the standard surface measure on S2. In
306
+ particular, E(1) is spanned by three components of N0. Let Π(n) be the orthogonal projection on L2(S2)
307
+ onto E(n), Π≤n be the orthogonal projection on L2(S2) onto �
308
+ k≤n E(k), Π≥n be the orthogonal projection
309
+ on L2(S2) onto �
310
+ k≥n E(k). For ι = (1 + ζ)ι0, the linearization of −H(ι) around the sphere ζ ≡ 0 is ∆ζ + 2ζ,
311
+ where ∆ is the Laplacian on the sphere S2; cf. the standard formula for the second variation of area in [5].
312
+ Then H′(ι0) acts on E(n) as the multiplier −(n − 1)(n + 2). Note that even if we consider the dimensional
313
+ form of (EQ), there will only be an additional scaling factor σ0/(ρ0R2), where R is the radius of the sphere.
314
+ On the other hand, the following solution formula for the Dirichlet problem on B(0, 1) is well-known: if
315
+ f ∈ L2(S2), then the harmonic function in B(0, 1) with Dirichlet boundary value f is determined by
316
+ u(r, ω) =
317
+
318
+ n≥0
319
+ rn(Π(n)f)(ω),
320
+ where (r, ω) is the spherical coordinate in R3. Thus the Dirichlet-Neumann operator D[ι0] acts on E(n) as the
321
+ multiplier n. Note again that even if we consider the dimensional form (EQ), there will only be an additional
322
+ scaling factor R−1.
323
+ Thus, setting
324
+ u = Π(0)ζ + Π(1)ζ +
325
+
326
+ n≥2
327
+
328
+ (n − 1)(n + 2) · Π(n)ζ + i
329
+
330
+ n≥1
331
+ √n · Π(n)φ,
332
+ we find that the linearization of (EQ) around the static solution (2.1) is a linear dispersive equation
333
+ (2.2)
334
+ ∂u
335
+ ∂t + iΛu = 0,
336
+ where the 3/2-order elliptic operator Λ is given by a multiplier
337
+ Λ =
338
+
339
+ n≥2
340
+
341
+ n(n − 1)(n + 2) · Π(n) =:
342
+
343
+ n≥0
344
+ Λ(n)Π(n).
345
+ Note that (ζ, φ) is completely determined by u. At the linear level, there must hold Π(0)u ≡ 0 because the
346
+ first variation of volume must be zero; and Π(1)u ≡ 0 because of the conservation laws (1.7).
347
+ Let us also re-write the original nonlinear system (EQ) into a form that better illustrates its perturbative
348
+ nature. For simplicity, we use O(u⊗k) to abbreviate a quantity that can be controlled by k-linear expressions
349
+ in u, and disregard its continuity properties for the moment. For example, ∥u∥2
350
+ H1 + ∥u∥4
351
+ H2 is an expression
352
+ of order O(u⊗2) when u → 0.
353
+ Since the operator Λ acts degenerately on E(0) ⊕ E(1), we should be more careful about the eigenmodes
354
+ Π(0)u and Π(1)u. The volume preservation equation (1.6) implies ∂tΠ(0)ζ = O(u⊗2). Projecting (EQ) to
355
+ E(1), which is spanned by the components of N0, we obtain ∂tΠ(1)ζ = Π(1)φ + O(u⊗2) = O(u⊗2) since the
356
+ conservation law (1.7) implies Π(1)φ = O(u⊗2); and ∂tΠ(1)φ = O(u⊗2) since H′(ι0) = −∆ − 2 annihilates
357
+ E(1). We can thus formally re-write the nonlinear system (EQ) as the following:
358
+ (2.3)
359
+ ∂u
360
+ ∂t + iΛu = N(u),
361
+ with N(u) = O(u⊗2) vanishing quadratically as u → 0. Note that we are disregarding all regularity problems
362
+ at the moment.
363
+ 2.2. Question at Linear Level. At the linear level, our first unanswered question is
364
+
365
+ LONGTIME DYNAMICS OF IRROTATIONAL SPHERICAL WATER DROPS: INITIAL NOTES
366
+ 7
367
+ Question 1. Does the solution of the linear capillary spherical water waves equation (2.2) satisfy a Strichartz
368
+ type estimate of the form
369
+ ∥eitΛf∥Lp
370
+ T Lq
371
+ x ≲T ∥f∥Hs,
372
+ where Lp
373
+ T Lq
374
+ x = Lp([0, T]; Lq(S2)), and the admissible indices (p, q) and s should be determined?
375
+ Answer to Question 1 should be important in understanding the dispersive nature of linear capillary
376
+ spherical water waves. For Schr¨odinger equation on a compact manifold, a widly cited result was obtained
377
+ by Burq-G´erard-Tzvetkov [12]:
378
+ Theorem 2.1. On a general compact Riemannian manifold (M d, g), there holds
379
+ ∥eit∆gf∥Lp
380
+ t Lq
381
+ x([0,T ]×M) ≲T ∥f∥H1/p(M),
382
+ where
383
+ 2
384
+ p + d
385
+ q = d
386
+ 2,
387
+ p > 2.
388
+ The authors used a time-localization argument for the parametrix of ∂t − i∆g to prove this result. For the
389
+ sphere Sd, this inequality is not optimal. The authors further used a Bourgain space argument to obtain the
390
+ optimal Strichartz inequality:
391
+ Theorem 2.2. Let (Sd, g) be the standard n-dimensional sphere. For a function f ∈ C∞(Sd), there holds
392
+ the Strichartz inequality
393
+ ∥eit∆gf∥Lp
394
+ t Lq
395
+ x([0,T ]×M) ≲T ∥f∥Hs(M),
396
+ s > s0(d)
397
+ where
398
+ s0(2) = 1
399
+ 8,
400
+ s0(d) = d
401
+ 4 − 1
402
+ 2, d ≥ 3.
403
+ Furthermore these inequalities are optimal in the sense that the Sobolev index s cannot be less than or equal
404
+ to s0(d).
405
+ The proof is the consequence of two propositions. The first one is the “decoupling inequality on compact
406
+ manifolds”, in particular the following result proved by Sogge [33]:
407
+ Proposition 2.1. Let Πk be the spectral projection to eigenspaces with eigenvalues in [k2, (k + 1)2] on Sd.
408
+ Then there holds
409
+ ∥Πk∥L2→Lq ≤ Cqns(q),
410
+ where
411
+ s(q) =
412
+
413
+ d−1
414
+ 2
415
+
416
+ 1
417
+ 2 − 1
418
+ 2q
419
+
420
+ ,
421
+ 2 ≤ q ≤ 2(d+1)
422
+ d−1
423
+ d−1
424
+ 2
425
+ − d
426
+ q ,
427
+ 2(d+1)
428
+ d−1
429
+ ≤ q ≤ ∞.
430
+ These estimates are sharp in the following sense: if hk is a zonal spherical harmonic function of degree k on
431
+ Sd, then as k → ∞,
432
+ ∥hk∥Lq ≃ Cqks(q)∥hk∥L2.
433
+ The second one is a Bourgain space embedding result:
434
+ Proposition 2.2. For a function f ∈ C∞
435
+ 0 (R × Sd), define the Bourgain space norm
436
+ ∥f(t, x)∥Xs,b :=
437
+ ��⟨∂t + i∆g⟩bf(t, x)
438
+ ��
439
+ L2
440
+ t Hsx .
441
+ Then for b > 1/2 and s > s0(d), there holds
442
+ ∥f∥L4(R×Sd) ≤ Cs,b∥f∥Xs,b.
443
+
444
+ 8
445
+ CHENGYANG SHAO
446
+ The key ingredient for proving this proposition is the following number-theoretic result:
447
+ #{(p, q) ∈ N2 : p2 + q2 = A} = O(Aε).
448
+ As for optimality of the Strichartz inequality, the authors of [12] implemented standard results of Gauss
449
+ sums.
450
+ The parametrix and Bourgain space argument can be repeated without essential change for the linear
451
+ capillary spherical water waves equation (2.2), but this time the Bourgain space argument would be more
452
+ complicated: the Bourgain space norm is now
453
+ ∥f(t, x)∥Xs,b :=
454
+ ��⟨∂t + iΛ⟩bf(t, x)
455
+ ��
456
+ L2
457
+ t Hsx ,
458
+ and the embedding result becomes
459
+ ∥f∥L4(R×S2) ≤ Cs,b∥f∥Xs,b
460
+ for f ∈ C∞
461
+ 0 (R × S2) and all s > 3ρ/8 + 1/8, b > 1/2, where ρ is the infimum of all exponents ρ′ such that
462
+ when A → ∞, the number
463
+ #
464
+
465
+ (n1, n2) ∈ N2 : 1
466
+ 2 ≤ n2
467
+ n1
468
+ ≤ 2, |Λ(n1) + Λ(n2) − A| ≤ 1
469
+ 2
470
+
471
+ ≤ Cρ′Aρ′.
472
+ Some basic analytic number theory implies ρ = 1/3, and thus the range of s is s > 1/4. Surprisingly this
473
+ index is not better than that predicted by the parametrix method. It remains unknown whether this index
474
+ could be further optimized.
475
+ To close this subsection, we note that the capillary spherical water wave lives on a compact region, so the
476
+ dispersion does not take away energy from a locality to infinity. This is a crucial difference between waves
477
+ on compact regions and waves in Euclidean spaces. In particular, we do not expect decay estimate for eitΛf.
478
+ For the nonlinear problem (EQ), techniques like vector field method (Klainerman-Sobolev type inequalities)
479
+ do not apply.
480
+ 2.3. Rotationally Symmetric Solutions: Bifurcation Analysis. Illuminated by observations in hydro-
481
+ dynamical experiments under zero gravity, and suggested by the existence of standing gravity capillary water
482
+ waves due to Alazard-Baldi [1], we propose the following conjecture:
483
+ Conjecture 2.1. There is a Cantor family of small amplitude periodic solutions to the spherical capillary
484
+ water waves system (EQ).
485
+ Let us conduct the bifurcation analysis that suggests why this conjecture should be true. By time rescaling,
486
+ we aim to find solution (ζ, φ, ω0) of the following system that is 2π-peiodic in t:
487
+ (2.4)
488
+
489
+
490
+
491
+
492
+
493
+
494
+
495
+ ω0
496
+ ∂ζ
497
+ ∂t =
498
+ 1
499
+ N0 · N(ι)D[ζ]φ,
500
+ ω0
501
+ ∂φ
502
+ ∂t =
503
+ 1
504
+ N0 · N(ι) (Bζφ · N0) · D[ζ]φ − 1
505
+ 2|Bζφ|2 − H(ι),
506
+ together with the conservation laws (1.6)-(1.8). Here we refer ω0 > 0 as the fundamental frequency. The
507
+ linearization of this system at the equilibrium (ζ, φ) = (0, 0) is
508
+ (2.5)
509
+ Lω0
510
+
511
+ ζ
512
+ φ
513
+
514
+ :=
515
+
516
+ ω0∂t
517
+ −D[0]
518
+ −∆ − 2
519
+ ω0∂t
520
+ � �
521
+ ζ
522
+ φ
523
+
524
+ = 0,
525
+ Π(0)ζ = Π(1)ζ = Π(1)φ = 0.
526
+ We restrict to rotationally symmetric solutions of the system: that is, water droplets which are always
527
+ rotationally symmetric with a fixed axis. In addition, we require ζ to be even in t and φ to be odd in t. The
528
+
529
+ LONGTIME DYNAMICS OF IRROTATIONAL SPHERICAL WATER DROPS: INITIAL NOTES
530
+ 9
531
+ solution thus should take the form
532
+ ζ(t, x) =
533
+
534
+ j,n≥0
535
+ ζjn cos(jt)Yn(x),
536
+ φ(t, x) =
537
+
538
+ j≥1,n≥0
539
+ φjn sin(jt)Yn(x),
540
+ where Yn is the n’th zonal spherical harmonic, i.e. the (unique) normalized spherical harmonic of degree n
541
+ that is axially symmetric. In spherical coordinates this means that Yn(θ, ϕ) = Pn(cos θ), where Pn is the
542
+ n’th Legendre polynomial. Since φ0n are irrelevant we fix them to be 0. Then
543
+ Lω0
544
+
545
+ ζ
546
+ φ
547
+
548
+ =
549
+
550
+ j,n≥0
551
+
552
+ (−ω0jζjn − nφjn) sin(jt)Yn(x)
553
+ ((n − 1)(n + 2)ζjn + ω0jφjn) cos(jt)Yn(x)
554
+
555
+ .
556
+ In order that (ζ, φ)T ∈ KerLω0, at the level n = 0, we must have ζj0 = φj0 = 0 for all j ≥ 0. At the level
557
+ n = 1, we have ζ01 = φ01 = 0, and for j ≥ 1 there holds ω0jζj1 − φj1 = 0 and ω0jφj1 = 0, so ζj1 = φj1 = 0
558
+ for all j ≥ 0. Hence ζjn, φjn can be nonzero only for j ≥ 1 and n ≥ 2.
559
+ Consequently, Lω0 has a one-dimensional kernel if and only if the Diophantine equation
560
+ (2.6)
561
+ ω2
562
+ 0j2 = n(n − 1)(n + 2),
563
+ j ≥ 1, n ≥ 2
564
+ has exactly one solution (j0, n0). If ω0 has this property, then at the linear level, the lowest frequency of
565
+ oscillation is
566
+ ω0j0 =
567
+
568
+ n0(n0 − 1)(n0 + 2).
569
+ We look into this Diophantine equation. Obviously ω2
570
+ 0 has to be a rational number. The equation is
571
+ closely related to a family of elliptic curves over Q:
572
+ Ec : y2 = x(x − c)(x + 2c) = x3 + c2x2 − 2c2x,
573
+ c ∈ N.
574
+ If we set a/b = ω2
575
+ 0 (irreducible fraction), then integral solutions of (2.6) are in 1-1 correspondence with
576
+ integral points with natural number coordinates on the elliptic curve Eab, under the following map:
577
+ (j0, n0) → (abn0, a2bj0) ∈ Eab.
578
+ Thus we just need to find natural numbers a, b such that there is a unique (up to negation) integral point
579
+ (x, y) ∈ Eab, where x > 0 is divided by ab, and y is divided by a2b. We seek for n0 as small as possible with
580
+ such property, which gives lowest frequency of oscillation as small as possible. For ab = 1, · · · , 50, we find
581
+ that if ab = 15, then the integral points on elliptic curve E15 (up to negation of Mordel-Weil group) are
582
+ (−30, 0), (−5, 50), (0, 0), (15, 0), (24, 108), (90, 900).
583
+ The only point (x, y) with ab|x and ab2|y is (90,900), which gives n0 = 6, and the lowest frequency Λ(n0) =
584
+
585
+ n0(n0 − 1)(n0 + 2) of oscillation is 4
586
+
587
+ 15 ≃ 15.49 · · · .
588
+ There are other choices of a, b. We list down the value of ab below 50, the corresponding n0 and the lowest
589
+ frequency Λ(n0):
590
+ ab
591
+ n0
592
+ Λ(n0)
593
+ 15
594
+ 6
595
+ 4
596
+
597
+ 15
598
+ 17
599
+ 49
600
+ 4
601
+
602
+ 323
603
+ 22
604
+ 9
605
+ 6
606
+
607
+ 22
608
+ 26
609
+ 50
610
+ 15
611
+
612
+ 78
613
+ 42
614
+ 7
615
+ 3
616
+
617
+ 42
618
+ 46
619
+ 576
620
+ 2040
621
+
622
+ 46
623
+ 50
624
+ 25
625
+ 90
626
+
627
+ 2
628
+
629
+ 10
630
+ CHENGYANG SHAO
631
+ See Appendix A for the MAGMA code used to find these values. This list suggests that n0 = 6 might
632
+ be the smallest order that meets the requirement, but this remains unproved. We summarize these into the
633
+ following number-theoretic question:
634
+ Question 2. For the family of elliptic curves
635
+ Eab : y2 = x(x − ab)(x + 2ab),
636
+ a, b ∈ N,
637
+ how many choices of a, b ∈ N are there such that, there is exactly one integral point (x, y) ∈ Eab with x, y > 0
638
+ and ab|x, a2b|y? For such a, b and integral point (x, y), is the minimal value of x/(ab) exactly 6, or is it
639
+ smaller?
640
+ Of course, a complete answer of Question 2 should imply very clear understanding of periodic solutions
641
+ of the spherical capillary water waves equation constructed using bifurcation analysis. But at this moment
642
+ we are satisfied with existence, so we may pick any ω0 = a/b and (j0, n0) that meets the requirement, for
643
+ example the simplest case n0 = 6, and any of the following choices of ω0 and j0:
644
+ ω0 =
645
+
646
+ 15, j0 = 4;
647
+ ω0 =
648
+
649
+ 1
650
+ 15, j0 = 60;
651
+ ω0 =
652
+
653
+ 3
654
+ 5, j0 = 20;
655
+ ω0 =
656
+
657
+ 5
658
+ 3, j0 = 12.
659
+ We thus refine our conjecture as follows:
660
+ Conjecture 2.2. Let (n0, j0) be a pair of natural numbers with n0 ≥ 2, j0 ≥ 1, and set ω0 =
661
+
662
+ Λ(n0)/j0.
663
+ Suppose that the only natural number solution of the Diophantine equation
664
+ ω2
665
+ 0j0 = Λ(n0)2 = n0(n0 − 1)(n0 + 1)
666
+ is (j0, n0). Then there is a Cantor set with positive measure of parameters ω, clustered near ω0, such that
667
+ the spherical capillary water waves equation (2.4) admits small amplitude periodic solution with frequency ω.
668
+ The counterpart of Conjecture 2.2 for gravity capillary standing water waves was proved by Alazard-
669
+ Baldi [1] using a Nash-Moser type theorem. The key technique in their proof was to find a conjugation of
670
+ the linearized operator of the gravity capillary water waves system on T1 to an operator of the form
671
+ ω∂t + iT + iλ1|Dx|1/2 + iλ−1|Dx|−1/2 + Operator of order ≤ −3
672
+ 2,
673
+ where T is an elliptic Fourier multiplier of order 3/2, and λ1, λ−1 are real constants. The frequency ω lives
674
+ in a Cantor type set that clusters around a given frequency so that the kernel of the linearized operator
675
+ is 1-dimensional. With this conjugation, they were able to find periodic solutions of linearized problems
676
+ required by Nash-Moser iteration.
677
+ It is expected that this technique could be transplanted to the equation (2.4), since our analysis for (2.6)
678
+ suggests that the 1-dimensional kernel requirement for bifurcation analysis is met. It seems that the greatest
679
+ technical issue is to find a suitable conjugation that takes the linearized operator of (2.4) to an operator of
680
+ the form
681
+ ω∂t + i(T3/2 + T1/2 + T−1/2) + Operator of order ≤ −3
682
+ 2,
683
+ where each Tk is a real Fourier multiplier acting on spherical harmonics. The difficulty is that, since we are
684
+ working with pseudo-differential operators on S2, the formulas of symbolic calculus are not as neat as those
685
+ on flat spaces. It seems necessary to implement some global harmonic analysis for compact homogeneous
686
+ spaces, e.g. extension of results collected in Ruzhansky-Turunen [31]. Unfortunately, those results do not
687
+ include pseudo-differential operators with “rough coefficients” and para-differential operators, so it seems
688
+ necessary to re-write the whole theory.
689
+
690
+ LONGTIME DYNAMICS OF IRROTATIONAL SPHERICAL WATER DROPS: INITIAL NOTES
691
+ 11
692
+ 2.4. Number-Theoretic Obstruction with Normal Form Reduction. As pointed out in Section 1,
693
+ the system (2.3) is locally well-posed due to a result in [9]. General well-posedness results [14], [36] for free
694
+ boundary value problem of Euler equation also apply. As for lifespan estimate for initial data ε-close to
695
+ the static solution (2.1), it should not be hard to conclude that the lifespan should be bounded below by
696
+ 1/ε. The result relates to the fact that the sphere is a stable critical point of the area functional, cf. [5].
697
+ This is nothing new: a suitable energy inequality should imply it. However, although the clue is clear, the
698
+ implementation is far from standard since we are working on a compact manifold. A rigorous proof still calls
699
+ for hard technicalities.
700
+ Now we will be looking into the nonlinear equation (2.3) for its longer time behavior. Although appearing
701
+ similar to the well-studied water waves equation in e.g. [26], [27], [39], [40], there is a crucial difference between
702
+ the dispersive relation in (2.3) and the well-studied water waves equations: the dispersive relation exhibits
703
+ a strong rigidity property, i.e. the arbitrary physical constants enter into the dispersive relation Λ only as
704
+ scaling factors. For the gravity-capillary water waves, the linear dispersive relation reads
705
+
706
+ g|∇| + σ|∇|3,
707
+ where g is the gravitational constant and σ is the surface tension coefficient. For the Klein-Gordon equation
708
+ on a Riemannian manifold, the linear dispersive relation reads
709
+
710
+ −∆ + m2,
711
+ where m is the mass. In [26], Ionescu and Pusateri referred such dispersive relations as having non-degenerate
712
+ dependence on physical parameter, while in our context it is appropriate to refer to the dependence as
713
+ degenerate. We will see that this crucial difference brings about severe obstructions for the long-time well-
714
+ posedness of the system.
715
+ Following the idea of Delort and Szeftel [16], we look for a normal form reduction of (2.3) and explain
716
+ why the rigidity property could cause obstructions. Not surprisingly, the obstruction is due to resonances,
717
+ and strongly relates to the solvablity of a Diophantine equation. Delort and Szeftel cast a normal form
718
+ reduction to the small-initial-data problem of quasilinear Klein-Gordon equation on the sphere and obtained
719
+ an estimate on the lifespan longer than the one provided by standard energy method. After their work, normal
720
+ form reduction has been used by mathematicians to understand water waves on flat tori, for example [6], [7]
721
+ and [26]. The idea was inspired by the normal form reduction method introduced by Shatah [35]: for a
722
+ quadratic perturbation of a linear dispersive equation
723
+ ∂tu + iLu = N(u) = O(u⊗2),
724
+ using a new variable u + B(u, ¯u) with a suitably chosen quadratic addendum B(u, ¯u) can possibly eliminate
725
+ the quadratic part of N, thus extending the lifespan estimate beyond the standard 1/ε.
726
+ So we shall write the quadraticr part of N(u) as
727
+
728
+ n3≥0
729
+ Π(n3)
730
+
731
+ � �
732
+ n1≥0
733
+
734
+ n2≥0
735
+ M1
736
+
737
+ Π(n1)u, Π(n2)u
738
+
739
+ + M2
740
+
741
+ Π(n1)u, Π(n2)¯u
742
+
743
+ + M3
744
+
745
+ Π(n1)¯u, Π(n2)¯u
746
+
747
+
748
+ � ,
749
+ where M1, M2, M3 are complex bi-linear operators, following the argument of Section 4 in [16]. They are
750
+ independent of t since the right-hand-side of the equation does not depend on t explicitly. Let’s look for a
751
+ diffeomorphism
752
+ u → v := u + B[u, u]
753
+
754
+ 12
755
+ CHENGYANG SHAO
756
+ in the function space C∞(S2), where B is a bilinear operator, so that the equation (2.3) with quadratic
757
+ nonlinearity reduces to an equation with cubic nonlinearity.
758
+ The B[u, u] is supposed to take the form
759
+ B[u, u] = B1[u, u] + B2[u, u] + B3[u, u], with
760
+ B1[u, u] =
761
+
762
+ n3≥0
763
+
764
+ n1,n2≥0
765
+ b1(n1, n2, n3)Π(n3)M1
766
+
767
+ Π(n1)u, Π(n2)u
768
+
769
+ ,
770
+ B2[u, u] =
771
+
772
+ n3≥0
773
+
774
+ n1,n2≥0
775
+ b2(n1, n2, n3)Π(n3)M2
776
+
777
+ Π(n1)u, Π(n2)¯u
778
+
779
+ ,
780
+ B3[u, u] =
781
+
782
+ n3≥0
783
+
784
+ n1,n2≥0
785
+ b3(n1, n2, n3)Π(n3)M3
786
+
787
+ Π(n1)¯u, Π(n2)¯u
788
+
789
+ ,
790
+ where the bj(n1, n2, n3)’s are complex numbers to be determined. Implementing (2.3), we find
791
+ (∂t + iΛ)(u + B[u, u])
792
+ = N(u) +
793
+
794
+ n3≥0
795
+
796
+ n1,n2≥0
797
+ b1(n1, n2, n3)Π(n3)M1
798
+
799
+ Π(n1)∂tu, Π(n2)u
800
+
801
+ +
802
+
803
+ n3≥0
804
+
805
+ n1,n2≥0
806
+ b1(n1, n2, n3)Π(n3)M1
807
+
808
+ Π(n1)u, Π(n2)∂tu
809
+
810
+ + (similar terms)
811
+ +
812
+
813
+ n3≥0
814
+
815
+ n1,n2≥0
816
+ iΛ(n3)b1(n1, n2, n3)Π(n3)M1
817
+
818
+ Π(n1)u, Π(n2)u
819
+
820
+ = N(u) +
821
+
822
+ n3≥0
823
+
824
+ min(n1,n2)≤1
825
+ i [Λ(n3) − Λ(n1) − Λ(n2)] b1(n1, n2, n3)Π(n3)M1
826
+
827
+ Π(n1)u, Π(n2)u
828
+
829
+ +
830
+
831
+ n3≥0
832
+
833
+ n1,n2≥2
834
+ i [Λ(n3) − Λ(n1) − Λ(n2)] b1(n1, n2, n3)Π(n3)M1
835
+
836
+ Π(n1)u, Π(n2)u
837
+
838
+ + (similar terms) + O(u⊗3).
839
+ We aim to eliminate most of the second order portions of N(u). The coefficients bj(n1, n2, n3) are fixed as
840
+ follows:
841
+ (2.7)
842
+ b1(n1, n2, n3) = i [Λ(n3) − Λ(n1) − Λ(n2)]−1 ,
843
+ n1, n2, n3 ≥ 2
844
+ b2(n1, n2, n3) = i [Λ(n3) − Λ(n1) + Λ(n2)]−1 ,
845
+ n1, n2, n3 ≥ 2
846
+ b3(n1, n2, n3) = i [Λ(n3) + Λ(n1) + Λ(n2)]−1 ,
847
+ n1, n2, n3 ≥ 2
848
+ b1,2,3(n1, n2, n3) = 0,
849
+ if Λ(n3) ± Λ(n1) ± Λ(n2) = 0 or min(n1, n2, n3) ≤ 1,
850
+ then a large portion of the second order part of Π≥2N (u) will be eliminated. In fact, for n1, n2, n3 ≥ 2, if
851
+ Λ(n3) ± Λ(n1) ± Λ(n2) ̸= 0, then the term
852
+ Π(n3)
853
+
854
+ � �
855
+ n1,n2≥2
856
+ M1
857
+
858
+ Π(n1)u, Π(n2)u
859
+
860
+ + M2
861
+
862
+ Π(n1)u, Π(n2)¯u
863
+
864
+ + M3
865
+
866
+ Π(n1)¯u, Π(n2)¯u
867
+
868
+
869
+
870
+ is cancelled out. On the other hand, by the volume preservation equality (1.6) and conservation law (1.7),
871
+ there holds Π(0)u = O(u⊗2), Π(1)u = O(u⊗2), so the low-low interaction
872
+ Π≥2
873
+
874
+
875
+
876
+ min(n1,n2)≤1
877
+ M1
878
+
879
+ Π(n1)u, Π(n2)u
880
+
881
+ + M2
882
+
883
+ Π(n1)u, Π(n2)¯u
884
+
885
+ + M3
886
+
887
+ Π(n1)¯u, Π(n2)¯u
888
+
889
+
890
+
891
+ is automatically O(u⊗3).
892
+
893
+ LONGTIME DYNAMICS OF IRROTATIONAL SPHERICAL WATER DROPS: INITIAL NOTES
894
+ 13
895
+ Thus the existence and continuity of the normal form B[u, u] depends on the property of the 3-way
896
+ resonance equation
897
+ (2.8)
898
+ Λ(n3) − Λ(n1) − Λ(n2) = 0,
899
+ n1, n2, n3 ≥ 2.
900
+ which is equivalent to the Diophantine equation
901
+ (2.9)
902
+ [F(n1) + F(n2) − F(n3)]2 − 4F(n1)F(n2) = 0,
903
+ n1, n2, n3 ≥ 2,
904
+ where F(X) = X(X − 1)(X + 2).
905
+ If the tuple (n1, n2, n3) is non-resonant, i.e. it is such that b1,2,3(n1, n2, n3) ̸= 0, then some elementary
906
+ number theoretic argument will give a lower bound on |b1,2,3(n1, n2, n3)| in terms of a negative power (can
907
+ be fixed as −9/2) of n1, n2, n3. This is usually referred as small divisor estimate.
908
+ To study the distribution of resonant frequencies, we propose the following unsolved question:
909
+ Question 3. Does the Diophantine equation (2.9) have finitely many solutions?
910
+ However, the Diophantine equation (2.9) does admit non-trivial solutions (5, 5, 8) and (10, 10, 16). In other
911
+ words, the second order terms e.g.
912
+ Π(8)M1(Π(5)u · Π(5)u),
913
+ Π(5)M1(Π(8)u · Π(5)¯u),
914
+ in the quadratic part of N(u) cannot be eliminated by normal form reduction. On the other hand, it seems
915
+ to be very hard to determine whether (2.9) still admits any other solution. We have the following proposition
916
+ (the author would like to thank Professor Bjorn Poonen for the proof):
917
+ Proposition 2.3. The Diophantine equation (2.9) has no solution with n1 ≤ 104 other than (5, 5, 8) and
918
+ (10, 10, 16).
919
+ The proof of this proposition is computer-aided. The key point is to use the so-called Runge’s method to
920
+ show that if (n1, n2, n3) is a solution, then there must hold n2 = O(n2
921
+ 1). For a given n1, this reduces the proof
922
+ to numerical verification for finitely many possibilities. The algorithm can of course be further optimized,
923
+ but due to some algebraic geometric considerations, it is reasonable to conjecture that the solution of (2.9)
924
+ should be very rare. In fact, there are two ways of viewing the problem. We observe that if (n1, n2, n3) is
925
+ a solution, then F(n1)F(n2) must be a square, and the square free part of F(n1), F(n2), F(n3) must be the
926
+ same. Further reduction turns the problem into finding integral points on a family of elliptic curves
927
+ Y 2 = cF(X),
928
+ c is square-free,
929
+ which is of course difficult, but since Siegel’s theorem asserts that there are only finitely many integer points
930
+ on an elliptic curve over Q, it is reasonable to conjecture that there are not “too many” solutions to (2.9).
931
+ We may also view the problem as finding integral (rational) points on a given algebraic surface. The complex
932
+ projective surface corresponding to (2.9) is given by
933
+ V : [X(X − W)(X + 2W) + Y (Y − W)(Y + 2W) − Z(Z − W)(Z + 2W)]2
934
+ = 4X(X − W)(X + 2W)Y (Y − W)(Y + 2W),
935
+ where [X, Y, Z, W] is the homogeneous coordinate on CP3. With the aid of computer, we obtain
936
+ Proposition 2.4. The complex projective surface V ⊂ CP3 has Kodaira dimension 2 (i.e. it is of general
937
+ type under Kodaira-Enriquez classification), and its first Betti number is 0.
938
+ See Appendix A for the code.
939
+
940
+ 14
941
+ CHENGYANG SHAO
942
+ The first part of the proposition suggests that the rational points of V should be localized on finitely
943
+ many algebraic curves laying on V; nevertheless, this seemingly simple suggestion is indeed a special case of
944
+ the Bomberi-Lang conjecture, a hard problem in number theory (its planar case is known as the celebrated
945
+ Faltings’s theorem). The second part suggests that the rational points of V should be rare since its Albanese
946
+ variety is a single point. But these are just heuristics that solutions to (2.9) should be rare. In general,
947
+ determining the solvability of a given Diophantine equation is very difficult 2, as number theorists and
948
+ arithmetic geometers generally believe.
949
+ The reason that such issues do not occur for water waves in the flat setting or nonlinear Klein-Gordon
950
+ equations is twofold. First of all, the resonance equation is easily understood even in the degenerate case in
951
+ the flat setting. For example, the capillary water waves without gravity on T2 has dispersive relation |∇|1/2,
952
+ and the 3-way resonance equation is
953
+ 4�
954
+ k2
955
+ 1 + k2
956
+ 2 +
957
+ 4�
958
+ l2
959
+ 1 + l2
960
+ 2 =
961
+ 4�
962
+ m2
963
+ 1 + m2
964
+ 2,
965
+ with the additional requirement m = k + l. We already know that the resonance equation has no non-trivial
966
+ solution at all, cf. [7]. But even without using m = k +l, we would be able to conclude that there are at most
967
+ finitely many non-trivial solutions from the celebrated Faltings’s theorem on rational points on high-genus
968
+ algebraic projective curves (although this is like using a sledge hammer to crack a nut). Secondly, for the non-
969
+ degenrate case, for example the gravity-capillary waves, the dispersive relation reads
970
+
971
+ g|∇| + σ|∇|3, so if the
972
+ ratio σ/g is a transcedental number then the 3-way resonance equation has no solution. Furthermore, using
973
+ some elementary calculus and a measure-theoretic argument, it can be shown, not without technicalities, that
974
+ the resonances admit certain small-divisor estimates for almost all parameters. This is exactly the argument
975
+ employed by Delort-Szeftle [16], Berti-Delort [6] and Ionescu-Pusateri [26], so that their results were stated for
976
+ almost all parameters. These parameters are, roughly speaking, badly approximated by algebraic numbers.
977
+ However, the resonance equation (2.8) is inhomogeneous and allows no arbitrary physical parameter at
978
+ all. Furthermore, since product of spherical harmonics are no longer spherical harmonics in general, Fourier
979
+ series techniques employed by [7] [6] [26] that works for the torus are never valid for S2; for example, we
980
+ cannot simply assume n3 = n1 + n2 in (2.8), as already illustrated by the solutions (5,5,8) (10,10,16). These
981
+ are the crucial differences between the capillary spherical water waves and all known results for water waves
982
+ in the flat setting.
983
+ 2.5. Heuristics for Lifespan Estimate. To summarize, almost global lifespan estimate of (2.3) depends
984
+ on the difficult number theoretic question 3. Before it is fully resolved, we can only expect partial results
985
+ regarding the normal form transformation.
986
+ If there are only finitely many solutions to the Diophantine equation (2.9), then under the normal form
987
+ reduction u → v = u + B[u, u] with coefficients given by (2.7), the equation (2.3) is transformed into the
988
+ following system:
989
+
990
+ ∂tΠcv = O(v⊗2),
991
+
992
+ ∂t(1 − Πc)v = O(v⊗3),
993
+ where Πc is the orthogonal projection to �
994
+ n3 E(n3) ⊂ L2(S2), with n3 being either 0 or 1, or exhausting the
995
+ third component of all nontrivial solutions of (2.9).
996
+ 2For example, the seemingly simple Diophantine equation x3 + y3 + z3
997
+ =
998
+ 42 is in fact a puzzle of more than 60
999
+ years, and its first solution was found recently by Booker-Sutherland [11].
1000
+ It is of extremely large magnitude:
1001
+ 42 =
1002
+ (−80 538 738 812 075 974)3 + 80 435 758 145 817 5153 + 12 602 123 297 335 6313.
1003
+ Another example is the equation of
1004
+ same type x3 + y3 + z3 = 3. Beyond the easily found solutions (1, 1, 1), (4, 4, -5), (4, -5, 4), (-5, 4, 4), the next solution reads
1005
+ (569 936 821 221 962 380 720, −569 936 821 113 563 493 509, −472 715 493 453 327 032).
1006
+
1007
+ LONGTIME DYNAMICS OF IRROTATIONAL SPHERICAL WATER DROPS: INITIAL NOTES
1008
+ 15
1009
+ There is no reasonable assertion to be made if the conjecture fails. However, if the conjecture does hold
1010
+ true, then we can expect that the lifespan estimate for ε-Cauchy data of (EQ) goes beyond ε−1, as what we
1011
+ expect for gravity water waves in the periodic setting, e.g. in [26]:
1012
+ Conjecture 2.3. If the Diophantine equation (2.9) has only finitely many solutions, then there is some
1013
+ α > 0 such that for ε-Cauchy data of (EQ), the lifespan goes beyond ε−(1+α) as ε → 0.
1014
+ Let’s explain the heuristic as follows. The argument we aim to implement is the standard “continuous
1015
+ induction method”, i.e. for some suitably large s and K and suitable α > 0, assuming T = ε−(1+α) and
1016
+ supt∈[0,T ] ∥v∥Hs(g0) ≤ Kε, we try to prove a better bound supt∈[0,T ] ∥v∥Hs(g0) ≤ Kε/2.
1017
+ Here g0 is the
1018
+ standard metric on S2. It is intuitive to expect such a result for the cubic equation ∂t(1−Πc)v = O(v⊗3). As
1019
+ for the quadratic equation ∂tΠcv = O(v⊗2), it is crucial to implement the conservation of energy H[ζ, φ] ≡ 4π
1020
+ for a solution. We summarize it as
1021
+ Proposition 2.5. Fix T > 0. Let u be a smooth solution of (2.3) and v = u + B[u, u] be as above. Suppose
1022
+ for some suitably large s and K, there holds
1023
+ sup
1024
+ t∈[0,T ]
1025
+ ∥v∥Hs(g0) ≤ Kε
1026
+ with ε sufficiently small. Then there is in fact a better bound for the low frequency part Πcv:
1027
+ sup
1028
+ t∈[0,T ]
1029
+ ∥Πcv∥Hs(g0) ≤ Kε/4.
1030
+ Proof. We consider the “approximate” energy functional
1031
+ H0[ζ, φ] = 4π +
1032
+
1033
+ S2 2ζ · dµ0 + 1
1034
+ 2
1035
+
1036
+ S2(|∇0ζ|2 + 2|ζ|2)dµ0 + 1
1037
+ 2
1038
+
1039
+ S2
1040
+ ���|∇1/2
1041
+ 0
1042
+
1043
+ ���
1044
+ 2
1045
+ dµ0,
1046
+ where µ0 is the standard area measure on S2 and ∇0 is the standard connection on S2. This is nothing but
1047
+ the quadratic approximation to H[ζ, φ] in (1.8) at (0, 0), so there holds H0[ζ, φ] = H[ζ, φ] + O(u⊗3). Using
1048
+ volume preservation (1.6), we obtain
1049
+
1050
+ S2 ζdµ0 = −∥ζ∥2
1051
+ L2(g0) + O(ζ⊗3), so summarizing we have
1052
+ (2.10)
1053
+ 1
1054
+ 2
1055
+
1056
+ S2(|∇0ζ|2 − 2|ζ|2)dµ0 + 1
1057
+ 2
1058
+
1059
+ S2
1060
+ ���|∇1/2
1061
+ 0
1062
+
1063
+ ���
1064
+ 2
1065
+ dµ0 = O(u⊗3).
1066
+ Note that we used the conservation law H[ζ, φ] ≡ 4π. By spectral calculus on S2, we have
1067
+ ∥ζ∥2
1068
+ H1(g0) ≃ ∥Π(0)ζ��2
1069
+ L2(g0) + ∥Π(1)ζ∥2
1070
+ L2(g0) +
1071
+
1072
+ S2(|∇0ζ|2 − 2|ζ|2)dµ0,
1073
+ and by volume preservation and conservation of momentum (1.7) we find
1074
+ (2.11)
1075
+ ∥ζ∥2
1076
+ H1(g0) ≃
1077
+
1078
+ S2(|∇0ζ|2 − 2|ζ|2)dµ0 + O(ζ⊗4).
1079
+ Now, for some N0 > 0 relating to the loss of regularity caused by B, we may choose s >> 2N0. Then if
1080
+ ∥v∥Hs(g0) ≤ Kε, it follows that ∥u∥Hs−N0(g0) ≤ K′ε, so by (2.10) and (2.11) we have
1081
+ ∥u∥2
1082
+ L2(g0) ≃ ∥ζ∥2
1083
+ H1(g0) + ∥φ∥2
1084
+ H1/2(g0) ≤ K′ε3.
1085
+ Thus
1086
+ ∥v∥L2(g0) ≤ C∥u∥L2(g0) + C∥u∥2
1087
+ HN0(g0)
1088
+ ≤ Cε3/2 + K′ε2.
1089
+ Since the spectrum of Πcv is bounded, by Bernstein type inequality we have
1090
+ ∥Πcv∥Hs(g0) ≤ C∥v∥L2(g0) ≤ K′ε3/2(1 + ε1/2).
1091
+
1092
+ 16
1093
+ CHENGYANG SHAO
1094
+ If ε is sufficiently small then this implies ∥Πcv∥Hs(g0) ≤ Kε/4.
1095
+
1096
+ We point out that the above proof is independent from the magnitude of the lifespan T, so it is always
1097
+ applicable as long as the cubic equation ∂t(1 − Πc)v = O(v⊗3) is well-understood. There are two crucial
1098
+ points in the proof of Proposition 2.5: the conservation of energy, and that the projection Πc is of finite
1099
+ rank, so that a Bernstein type inequality holds. The last fact holds only if there are finitely many 3-way
1100
+ resonances, i.e. there are only finitely many solutions to the Diophantine equation (2.8).
1101
+ Finally, we propose an even more ambitious conjecture concerning global dynamical properties of spherical
1102
+ water droplets, which is again illuminated by observation in hydrodynamical experiments under zero gravity,
1103
+ and also suggested by the results of Berti-Montalto [8]:
1104
+ Conjecture 2.4. If the Diophantine equation (2.9) has only finitely many solutions, then a KAM type result
1105
+ holds for (EQ): there is a family of infinitely many quasi-periodic solutions of (EQ), depending on a parameter
1106
+ which takes value in a Cantor-type set.
1107
+ Appendix A. MAGMA Code
1108
+ MAGMA is a large, well-supported software package designed for computations in algebra, number theory,
1109
+ algebraic geometry, and algebraic combinatorics. In this appendix, we give the MAGMA code used to conduct
1110
+ computations on Diophantine equations related to the spherical capillary water waves system.
1111
+ A.1. Integral Points on Elliptic Curve. We can find all integral points on a given elliptic curve over
1112
+ Q using MAGMA. For a monic cubic polynomial f(x), the function EllipticCurve(f) creates the elliptic
1113
+ curve
1114
+ E : y2 = f(x),
1115
+ and the function IntegralPoints(E) returns a sequence containing all the integral points on E under the
1116
+ homogeneous coordinate of QP2, modulo negation. We use this to find out all integral points on the elliptic
1117
+ curve
1118
+ Ec : y2 = x3 + cx2 − 2c2x = x(x − c)(x + 2c).
1119
+ for natural number c ≤ 50. The MAGMA code is listed below, which excludes all the c’s such that there are
1120
+ only trivial integral points {(−c, 0), (0, 0), (c, 0)} on Ec.
1121
+ > Qx<x> := PolynomialRing(Rationals());
1122
+ > for c in [1..50] do
1123
+ > E := EllipticCurve(x^3+c*x^2-2*c^2*x);
1124
+ > S, reps := IntegralPoints(E);
1125
+ > if # S gt 3 then
1126
+ > print c, E;
1127
+ > print S;
1128
+ > end if;
1129
+ > end for;
1130
+ 2 Elliptic Curve defined by y^2 = x^3 + 2*x^2 - 8*x over Rational Field
1131
+ [ (-4 : 0 : 1), (-2 : 4 : 1), (-1 : -3 : 1), (0 : 0 : 1), (2 : 0 : 1), (4 : 8 : 1), (8 : -24
1132
+ : 1), (50 : 360 : 1) ]
1133
+ 8 Elliptic Curve defined by y^2 = x^3 + 8*x^2 - 128*x over Rational Field
1134
+ [ (-16 : 0 : 1), (-8 : 32 : 1), (-4 : -24 : 1), (0 : 0 : 1), (8 : 0 : 1), (9 : -15 : 1), (16
1135
+ : 64 : 1), (32 : -192 : 1), (200 : 2880 : 1) ]
1136
+
1137
+ LONGTIME DYNAMICS OF IRROTATIONAL SPHERICAL WATER DROPS: INITIAL NOTES
1138
+ 17
1139
+ 13 Elliptic Curve defined by y^2 = x^3 + 13*x^2 - 338*x over Rational Field
1140
+ [ (-26 : 0 : 1), (0 : 0 : 1), (13 : 0 : 1), (121 : 1386 : 1) ]
1141
+ 15 Elliptic Curve defined by y^2 = x^3 + 15*x^2 - 450*x over Rational Field
1142
+ [ (-30 : 0 : 1), (-5 : -50 : 1), (0 : 0 : 1), (15 : 0 : 1), (24 : 108 : 1), (90 : -900 : 1)
1143
+ ]
1144
+ 17 Elliptic Curve defined by y^2 = x^3 + 17*x^2 - 578*x over Rational Field
1145
+ [ (-34 : 0 : 1), (-32 : -56 : 1), (0 : 0 : 1), (17 : 0 : 1), (833 : 24276 : 1) ]
1146
+ 18 Elliptic Curve defined by y^2 = x^3 + 18*x^2 - 648*x over Rational Field
1147
+ [ (-36 : 0 : 1), (-32 : -80 : 1), (-18 : 108 : 1), (-9 : -81 : 1), (0 : 0 : 1), (18 : 0 : 1),
1148
+ (36 : 216 : 1), (72 : -648 : 1), (450 : 9720 : 1) ]
1149
+ 22 Elliptic Curve defined by y^2 = x^3 + 22*x^2 - 968*x over Rational Field
1150
+ [ (-44 : 0 : 1), (-32 : -144 : 1), (0 : 0 : 1), (22 : 0 : 1), (198 : 2904 : 1) ]
1151
+ 23 Elliptic Curve defined by y^2 = x^3 + 23*x^2 - 1058*x over Rational Field
1152
+ [ (-46 : 0 : 1), (0 : 0 : 1), (23 : 0 : 1), (50 : -360 : 1) ]
1153
+ 26 Elliptic Curve defined by y^2 = x^3 + 26*x^2 - 1352*x over Rational Field
1154
+ [ (-52 : 0 : 1), (-49 : -105 : 1), (0 : 0 : 1), (26 : 0 : 1), (1300 : 47320 : 1) ]
1155
+ 30 Elliptic Curve defined by y^2 = x^3 + 30*x^2 - 1800*x over Rational Field
1156
+ [ (-60 : 0 : 1), (-50 : 200 : 1), (-45 : -225 : 1), (-24 : -216 : 1), (-20 : 200 : 1), (-6
1157
+ : 108 : 1), (0 : 0 : 1), (30 : 0 : 1), (36 : 144 : 1), (40 : -200 :
1158
+ 1), (75 : -675 : 1), (90 : 900 : 1), (300 : 5400 : 1), (324 : -6048 : 1), (480 : -10800 : 1),
1159
+ (7290 : 623700 : 1), (10830 : -1128600 : 1), (226875 : 108070875 : 1) ]
1160
+ 32 Elliptic Curve defined by y^2 = x^3 + 32*x^2 - 2048*x over Rational Field
1161
+ [ (-64 : 0 : 1), (-32 : 256 : 1), (-16 : -192 : 1), (0 : 0 : 1), (32 : 0 : 1), (36 : -120 :
1162
+ 1), (64 : 512 : 1), (128 : -1536 : 1), (800 : 23040 : 1) ]
1163
+ 33 Elliptic Curve defined by y^2 = x^3 + 33*x^2 - 2178*x over Rational Field
1164
+ [ (-66 : 0 : 1), (0 : 0 : 1), (33 : 0 : 1), (81 : -756 : 1) ]
1165
+ 35 Elliptic Curve defined by y^2 = x^3 + 35*x^2 - 2450*x over Rational Field
1166
+ [ (-70 : 0 : 1), (-49 : 294 : 1), (-45 : -300 : 1), (-40 : 300 : 1), (-14 : -196 : 1), (0 :
1167
+ 0 : 1), (35 : 0 : 1), (50 : 300 : 1), (175 : -2450 : 1), (224 : 3528 : 1), (280 : -4900 : 1),
1168
+ (4410 : -294000 : 1), (14450 : -1739100 : 1) ]
1169
+ 39 Elliptic Curve defined by y^2 = x^3 + 39*x^2 - 3042*x over Rational Field
1170
+ [ (-78 : 0 : 1), (0 : 0 : 1), (39 : 0 : 1), (147 : -1890 : 1) ]
1171
+ 42 Elliptic Curve defined by y^2 = x^3 + 42*x^2 - 3528*x over Rational Field
1172
+ [ (-84 : 0 : 1), (-56 : -392 : 1), (-12 : 216 : 1), (0 : 0 : 1), (42 : 0 : 1), (63 : -441 :
1173
+ 1), (294 : 5292 : 1) ]
1174
+ 43 Elliptic Curve defined by y^2 = x^3 + 43*x^2 - 3698*x over Rational Field
1175
+ [ (-86 : 0 : 1), (-32 : -360 : 1), (0 : 0 : 1), (43 : 0 : 1) ]
1176
+ 46 Elliptic Curve defined by y^2 = x^3 + 46*x^2 - 4232*x over Rational Field
1177
+ [ (-92 : 0 : 1), (0 : 0 : 1), (46 : 0 : 1), (26496 : 4316640 : 1) ]
1178
+ 50 Elliptic Curve defined by y^2 = x^3 + 50*x^2 - 5000*x over Rational Field
1179
+ [ (-100 : 0 : 1), (-50 : 500 : 1), (-25 : -375 : 1), (-4 : 144 : 1), (0 : 0 : 1), (50 : 0 :
1180
+ 1), (100 : 1000 : 1), (200 : -3000 : 1), (1250 : 45000 : 1) ]
1181
+ Running Magma V2.27-7.
1182
+ Seed: 821911319; Total time: 2.430 seconds; Total memory usage: 85.16MB.
1183
+
1184
+ 18
1185
+ CHENGYANG SHAO
1186
+ A.2. Classification of Projective Surface. Some basic geometric parameters of the complex projective
1187
+ surface
1188
+ V : [X(X − W)(X + 2W) + Y (Y − W)(Y + 2W) − Z(Z − W)(Z + 2W)]2
1189
+ = 4X(X − W)(X + 2W)Y (Y − W)(Y + 2W)
1190
+ in CP3 can be computed using MAGMA. The author would like to thank Professor Bjorn Poonen for intro-
1191
+ ducing MAGMA and providing the code listed below.
1192
+ > Q:=Rationals();
1193
+ > P<x,y,z,t>:=ProjectiveSpace(Q,3);
1194
+ > fx:=x*(x-t)*(x+2*t);
1195
+ > fy:=y*(y-t)*(y+2*t);
1196
+ > fz:=z*(z-t)*(z+2*t);
1197
+ > V:=Surface(P,(fz-fx-fy)^2-4*fx*fy);
1198
+ > KodairaEnriquesType(V);
1199
+ 2 0 General type
1200
+ Running Magma V2.27-7.
1201
+ Seed: 989287753; Total time: 0.650 seconds; Total memory usage: 32.09MB.
1202
+ Note that the Kodaira dimension is invariant regardless of the choice of base field, so it is legitimate to
1203
+ choose the base field to be Q in the above code. The variable t is used to homogenize the equation. The
1204
+ function KodairaEnriquesType(V) returns three values for the given projective surface V : the first is the
1205
+ Kodaira dimension, the second is irrelevant when the Kodaira dimension is not −∞, 1 or 0, and the third is
1206
+ the Kodaira-Enriquez classification of the surface X.
1207
+ References
1208
+ [1] Alazard, T., & Baldi, P. (2015). Gravity capillary standing water waves. Archive for Rational Mechanics and Analysis,
1209
+ 217(3), 741-830.
1210
+ [2] Alazard, T., & M´etivier, G. (2009). Paralinearization of the Dirichlet to Neumann operator, and regularity of three-
1211
+ dimensional water waves. Communications in Partial Differential Equations, 34(12), 1632-1704.
1212
+ [3] Alazard, T., Burq, N., & Zuily, C.. (2011). On the water-wave equations with surface tension. Duke Mathematical Journal,
1213
+ 158(3), 413-499.
1214
+ [4] Alazard, D. & Delort, J. (2015). Global solutions and asymptotic behavior for two dimensional gravity water waves. Ann.
1215
+ Sci. ´Ec. Norm. Sup´er., 48, (2015), no. 5, 1149-1238.
1216
+ [5] Barbosa, J. L., & do Carmo, M. (2012). Stability of hypersurfaces with constant mean curvature. In Manfredo P. do
1217
+ Carmo–Selected Papers (pp. 221-235). Springer, Berlin, Heidelberg.
1218
+ [6] Berti, M., & Delort, J. M. (2018). Almost global solutions of capillary-gravity water waves equations on the circle. Springer
1219
+ International Publishing.
1220
+ [7] Berti M, Feola R, Pusateri F., Birkhoff normal form and long time existence for periodic gravity water waves. arXiv preprint,
1221
+ arXiv:1810.11549. 2018 Oct 26.
1222
+ [8] Berti, M., & Montalto, R. (2020). Quasi-periodic standing wave solutions of gravity-capillary water waves (Vol. 263, No.
1223
+ 1273). American mathematical society.
1224
+ [9] Beyer, K., & G¨unther, M. (1998). On the Cauchy problem for a capillary drop. Part I: irrotational motion. Mathematical
1225
+ methods in the applied sciences, 21(12), 1149-1183.
1226
+ [10] Bombieri, E.,& Pila, J. (1989). The number of integral points on arcs and ovals. Duke Mathematical Journal, 59(2), 337–357.
1227
+ [11] Booker, A. R., & Sutherland, A. V. (2021). On a question of Mordell. Proceedings of the National Academy of Sciences,
1228
+ 118(11).
1229
+ [12] Burq N, G´erard P, & Tzvetkov N. Strichartz inequalities and the nonlinear Schr¨odinger equation on compact manifolds.
1230
+ American Journal of Mathematics. 2004;126(3):569-605.
1231
+ [13] Christianson, H., Hur, V.M. & Staffilani, G. (2010). Strichartz estimates for the water-wave problem with surface tension.
1232
+ Communications in Partial Differential Equations, 35(12), pp.2195-2252.
1233
+
1234
+ LONGTIME DYNAMICS OF IRROTATIONAL SPHERICAL WATER DROPS: INITIAL NOTES
1235
+ 19
1236
+ [14] Coutand, D., & Shkoller, S. (2007). Well-posedness of the free-surface incompressible Euler equations with or without
1237
+ surface tension. Journal of the American Mathematical Society, 20(3), 829-930.
1238
+ [15] Deng, Y., Ionescu, A. D., Pausader, B., & Pusateri, F. (2017). Global solutions of the gravity-capillary water-wave system
1239
+ in three dimensions. Acta Mathematica, 219(2), 213-402.
1240
+ [16] Delort, J.-M., & Szeftel, J. (2004). Long-time existence for small data nonlinear klein-gordon equations on tori and spheres.
1241
+ International Mathematics Research Notices (37), 1897-1966.
1242
+ [17] Delort, J. M., & Imekraz, R. (2017). Long-time existence for the semilinear Klein–Gordon equation on a compact boundary-
1243
+ less Riemannian manifold. Communications in Partial Differential Equations, 42(3), 388-416.
1244
+ [18] Germain, P., Masmoudi, N., & Shatah, J. (2012). Global solutions for the gravity water waves equation in dimension 3.
1245
+ Annals of Mathematics, 175: 691–754, 2012.
1246
+ [19] Germain, P., Masmoudi, N., & Shatah, J. (2015). Global solutions for capillary waves equation in dimension 3. Comm.
1247
+ Pure Appl. Math., 68(4): 625–687, 2015
1248
+ [20] H¨ormander, L. (1988). Pseudo-differential operaors of type 1, 1. Communications in partial differential equations, 13(9),
1249
+ 1085-1111.
1250
+ [21] H¨ormander, L. (1997). Lectures on nonlinear hyperbolic differential equations (Vol. 26). Springer Science & Business Media.
1251
+ [22] Hunter, J. K., Ifrim, M., & Tataru, D. (2016). Two dimensional water waves in holomorphic coordinates. Communications
1252
+ in Mathematical Physics, 346(2), 483-552.
1253
+ [23] Ifrim, M., & Tataru, D. (2014). Two dimensional water waves in holomorphic coordinates II: global solutions. arXiv preprint
1254
+ arXiv:1404.7583.
1255
+ [24] Ionescu, A. D., & Pusateri, F. (2015). Global solutions for the gravity water waves system in 2d. Inventiones mathematicae,
1256
+ 199(3), 653-804.
1257
+ [25] Ionescu, A. D., & Pusateri, F. (2018). Recent advances on the global regularity for irrotational water waves. Philosophical
1258
+ Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences, 376(2111), 20170089.
1259
+ [26] Ionescu, A. D., & Pusateri, F. (2019). Long-time existence for multi-dimensional periodic water waves. Geometric and
1260
+ Functional Analysis, 29(3), 811-870.
1261
+ [27] Lannes, D. (2005). Well-posedness of the water-waves equations. Journal of the American Mathematical Society, 18(3),
1262
+ 605-654.
1263
+ [28] Lannes, D. (2013). The water waves problem. Mathematical analysis and asymptotics. Mathematical Surveys and Mono-
1264
+ graphs, Vol. 188. American Mathematical Society, Providence, RI, 2013.
1265
+ [29] Magnanini, R., & Poggesi, G. (2019). On the stability for Alexandrov’s Soap Bubble theorem. Journal d’Analyse
1266
+ Math´ematique, 139(1), 179-205.
1267
+ [30] Ming M, & Zhang Z. Well-posedness of the water-wave problem with surface tension. Journal de math´ematiques pures et
1268
+ appliqu´ees. 2009 Nov 1;92(5):429-55.
1269
+ [31] Ruzhansky, M., & Turunen, V. (2009). Pseudo-differential operators and symmetries: background analysis and advanced
1270
+ topics (Vol. 2). Springer Science & Business Media.
1271
+ [32] Schweizer, B. (2005). On the three-dimensional Euler equations with a free boundary subject to surface tension. Annales
1272
+ de l’institut Henri Poincar´e C, Analyse non lin´eaire, 22(6), 753-781.
1273
+ [33] Sogge, C. D. (1988). Concerning the Lp norm of spectral clusters for second-order elliptic operators on compact manifolds.
1274
+ Journal of functional analysis, 77(1), 123-138.
1275
+ [34] Shao, C. (2020). Long Time Behavior of a Quasilinear Hyperbolic System Modelling Elastic Membranes. https://arxiv.
1276
+ org/abs/2010.10663.
1277
+ [35] Shatah, J. (1985) Normal forms and quadratic Klein-Gordon equations, Comm. Pure Appl. Math. 38, 685-696.
1278
+ [36] Shatah, J., & Zeng, C. (2008). Geometry and a priori estimates for free boundary problems of the Euler’s equation.
1279
+ Communications on Pure and Applied Mathematics: A Journal Issued by the Courant Institute of Mathematical Sciences,
1280
+ 61(5), 698-744.
1281
+ [37] Taylor, M. (2013). Partial differential equations II: Qualitative studies of linear equations (Vol. 116). Springer Science &
1282
+ Business Media.
1283
+ [38] Wang, X. (2020) Global regularity for the 3d finite depth capillary water waves. Annales Scientifiques de l’´Ecole Normale
1284
+ Sup´erieure, 53(4): 847–943, 2020.
1285
+ [39] Wu, S. (1997). Well-posedness in Sobolev spaces of the full water wave problem in 2-D. Inventiones mathematicae, 130(1),
1286
+ 39-72.
1287
+ [40] Wu, S. (1999). Well-posedness in Sobolev spaces of the full water wave problem in 3-D. Journal of the American Mathe-
1288
+ matical Society, 12(2), 445-495.
1289
+
1290
+ 20
1291
+ CHENGYANG SHAO
1292
+ [41] Wu, S. (2009). Almost global wellposedness of the 2-D full water wave problem. Inventiones mathematicae, 177(1), pp.45-135.
1293
+ [42] Wu, S. (2011). Global wellposedness of the 3-D full water wave problem. Inventiones mathematicae, 184(1), 125-220.
1294
+ [43] Zakharov, V. E. (1968). Stability of periodic waves of finite amplitude on the surface of a deep fluid. Journal of Applied
1295
+ Mechanics and Technical Physics, 9(2), 190-194.
1296
+
LtAyT4oBgHgl3EQfT_ca/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff