Add files using upload-large-folder tool
Browse filesThis view is limited to 50 files because it contains too many changes.
See raw diff
- -NE4T4oBgHgl3EQf3w1M/content/2301.05308v1.pdf +3 -0
- -NE4T4oBgHgl3EQf3w1M/vector_store/index.faiss +3 -0
- -NE4T4oBgHgl3EQf3w1M/vector_store/index.pkl +3 -0
- -dE1T4oBgHgl3EQfUgPr/content/2301.03092v1.pdf +3 -0
- -dE1T4oBgHgl3EQfUgPr/vector_store/index.faiss +3 -0
- .gitattributes +68 -0
- 0dAyT4oBgHgl3EQfbfdc/content/2301.00263v1.pdf +3 -0
- 0dAyT4oBgHgl3EQfbfdc/vector_store/index.faiss +3 -0
- 0dAyT4oBgHgl3EQfbfdc/vector_store/index.pkl +3 -0
- 19FAT4oBgHgl3EQfkR2N/content/tmp_files/2301.08610v1.pdf.txt +1284 -0
- 19FAT4oBgHgl3EQfkR2N/content/tmp_files/load_file.txt +0 -0
- 1dAzT4oBgHgl3EQfRfuL/content/2301.01217v1.pdf +3 -0
- 1dAzT4oBgHgl3EQfRfuL/vector_store/index.faiss +3 -0
- 1dAzT4oBgHgl3EQfRfuL/vector_store/index.pkl +3 -0
- 29E1T4oBgHgl3EQf5wUG/content/2301.03514v1.pdf +3 -0
- 29E1T4oBgHgl3EQf5wUG/vector_store/index.pkl +3 -0
- 2dFAT4oBgHgl3EQfDhxB/content/2301.08416v1.pdf +3 -0
- 2dFAT4oBgHgl3EQfDhxB/vector_store/index.faiss +3 -0
- 2tAzT4oBgHgl3EQf9P4T/content/tmp_files/2301.01915v1.pdf.txt +1992 -0
- 2tAzT4oBgHgl3EQf9P4T/content/tmp_files/load_file.txt +0 -0
- 2tAzT4oBgHgl3EQffPw3/content/2301.01448v1.pdf +3 -0
- 2tAzT4oBgHgl3EQffPw3/vector_store/index.pkl +3 -0
- 39AyT4oBgHgl3EQfo_il/vector_store/index.faiss +3 -0
- 49FKT4oBgHgl3EQfSC3u/content/tmp_files/2301.11774v1.pdf.txt +1133 -0
- 49FKT4oBgHgl3EQfSC3u/content/tmp_files/load_file.txt +0 -0
- 4NAzT4oBgHgl3EQfD_rN/content/tmp_files/2301.00987v1.pdf.txt +0 -0
- 4NAzT4oBgHgl3EQfD_rN/content/tmp_files/load_file.txt +0 -0
- 4dFIT4oBgHgl3EQf6yuB/vector_store/index.faiss +3 -0
- 4dFIT4oBgHgl3EQf6yuB/vector_store/index.pkl +3 -0
- 6tAzT4oBgHgl3EQfgPwz/content/2301.01464v1.pdf +3 -0
- 6tE2T4oBgHgl3EQfkwcv/content/tmp_files/2301.03981v1.pdf.txt +617 -0
- 6tE2T4oBgHgl3EQfkwcv/content/tmp_files/load_file.txt +0 -0
- 89FJT4oBgHgl3EQfoCxt/content/tmp_files/2301.11594v1.pdf.txt +0 -0
- 89FJT4oBgHgl3EQfoCxt/content/tmp_files/load_file.txt +0 -0
- 9dE4T4oBgHgl3EQfDQsU/content/2301.04867v1.pdf +3 -0
- 9dE4T4oBgHgl3EQfDQsU/vector_store/index.pkl +3 -0
- AtE2T4oBgHgl3EQfRQeF/content/2301.03779v1.pdf +3 -0
- AtE2T4oBgHgl3EQfRQeF/vector_store/index.faiss +3 -0
- AtE2T4oBgHgl3EQfRQeF/vector_store/index.pkl +3 -0
- BNE1T4oBgHgl3EQfpQVQ/content/2301.03329v1.pdf +3 -0
- BNE1T4oBgHgl3EQfpQVQ/vector_store/index.faiss +3 -0
- BtAzT4oBgHgl3EQfwP4g/vector_store/index.pkl +3 -0
- CNE3T4oBgHgl3EQfUQpw/content/2301.04449v1.pdf +3 -0
- CNE3T4oBgHgl3EQfUQpw/vector_store/index.faiss +3 -0
- CtFJT4oBgHgl3EQfAiym/content/2301.11421v1.pdf +3 -0
- CtFJT4oBgHgl3EQfAiym/vector_store/index.faiss +3 -0
- E9AzT4oBgHgl3EQfiv2Y/content/tmp_files/2301.01505v1.pdf.txt +1036 -0
- E9AzT4oBgHgl3EQfiv2Y/content/tmp_files/load_file.txt +0 -0
- EtE0T4oBgHgl3EQfgwHQ/vector_store/index.pkl +3 -0
- G9FAT4oBgHgl3EQfth4f/content/tmp_files/2301.08664v1.pdf.txt +1252 -0
-NE4T4oBgHgl3EQf3w1M/content/2301.05308v1.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:cb15380bf1e3a1f8b4416919b9927e7bcb47ccc4dcb9bffe0be81d0de553810b
|
3 |
+
size 779413
|
-NE4T4oBgHgl3EQf3w1M/vector_store/index.faiss
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:f4cf06bc7a7b29a8407541611429447a83bf44cc1a24c9b6a02750faf8545093
|
3 |
+
size 5046317
|
-NE4T4oBgHgl3EQf3w1M/vector_store/index.pkl
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:c1b0b8b531133787518bb2e2a7ab8a9d041ae4994a35c9e1de01834d921c76ce
|
3 |
+
size 198552
|
-dE1T4oBgHgl3EQfUgPr/content/2301.03092v1.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:963ff41fd0c03920ac247feda7e3de266016de0759e6387e397ed24092f0a1c1
|
3 |
+
size 2498776
|
-dE1T4oBgHgl3EQfUgPr/vector_store/index.faiss
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:7025cfd42d584d682d8af5cc1bc49556918e3d3157010e9a7c7a21eaa300214e
|
3 |
+
size 3473453
|
.gitattributes
CHANGED
@@ -8591,3 +8591,71 @@ HdE1T4oBgHgl3EQfXgSr/content/2301.03128v1.pdf filter=lfs diff=lfs merge=lfs -tex
|
|
8591 |
adFPT4oBgHgl3EQfvjWp/content/2301.13160v1.pdf filter=lfs diff=lfs merge=lfs -text
|
8592 |
UdE0T4oBgHgl3EQf2gJy/content/2301.02713v1.pdf filter=lfs diff=lfs merge=lfs -text
|
8593 |
T9AyT4oBgHgl3EQf8fpt/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
8591 |
adFPT4oBgHgl3EQfvjWp/content/2301.13160v1.pdf filter=lfs diff=lfs merge=lfs -text
|
8592 |
UdE0T4oBgHgl3EQf2gJy/content/2301.02713v1.pdf filter=lfs diff=lfs merge=lfs -text
|
8593 |
T9AyT4oBgHgl3EQf8fpt/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
8594 |
+
CtFJT4oBgHgl3EQfAiym/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
8595 |
+
HdE1T4oBgHgl3EQfXgSr/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
8596 |
+
2dFAT4oBgHgl3EQfDhxB/content/2301.08416v1.pdf filter=lfs diff=lfs merge=lfs -text
|
8597 |
+
ZtAzT4oBgHgl3EQfK_te/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
8598 |
+
adFPT4oBgHgl3EQfvjWp/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
8599 |
+
CtFJT4oBgHgl3EQfAiym/content/2301.11421v1.pdf filter=lfs diff=lfs merge=lfs -text
|
8600 |
+
CNE3T4oBgHgl3EQfUQpw/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
8601 |
+
PtAzT4oBgHgl3EQfWvyr/content/2301.01307v1.pdf filter=lfs diff=lfs merge=lfs -text
|
8602 |
+
2dFAT4oBgHgl3EQfDhxB/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
8603 |
+
m9AzT4oBgHgl3EQfqP2M/content/2301.01626v1.pdf filter=lfs diff=lfs merge=lfs -text
|
8604 |
+
PNE0T4oBgHgl3EQf1AIP/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
8605 |
+
hdAyT4oBgHgl3EQfkPgm/content/2301.00428v1.pdf filter=lfs diff=lfs merge=lfs -text
|
8606 |
+
39AyT4oBgHgl3EQfo_il/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
8607 |
+
wtFPT4oBgHgl3EQfPjQO/content/2301.13038v1.pdf filter=lfs diff=lfs merge=lfs -text
|
8608 |
+
9dE4T4oBgHgl3EQfDQsU/content/2301.04867v1.pdf filter=lfs diff=lfs merge=lfs -text
|
8609 |
+
-NE4T4oBgHgl3EQf3w1M/content/2301.05308v1.pdf filter=lfs diff=lfs merge=lfs -text
|
8610 |
+
f9A0T4oBgHgl3EQfHv-A/content/2301.02065v1.pdf filter=lfs diff=lfs merge=lfs -text
|
8611 |
+
lNE2T4oBgHgl3EQfIwaA/content/2301.03684v1.pdf filter=lfs diff=lfs merge=lfs -text
|
8612 |
+
y9FLT4oBgHgl3EQfnS-e/content/2301.12127v1.pdf filter=lfs diff=lfs merge=lfs -text
|
8613 |
+
v9E4T4oBgHgl3EQfXQwv/content/2301.05039v1.pdf filter=lfs diff=lfs merge=lfs -text
|
8614 |
+
4dFIT4oBgHgl3EQf6yuB/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
8615 |
+
-dE1T4oBgHgl3EQfUgPr/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
8616 |
+
WNFRT4oBgHgl3EQf9DhY/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
8617 |
+
0dAyT4oBgHgl3EQfbfdc/content/2301.00263v1.pdf filter=lfs diff=lfs merge=lfs -text
|
8618 |
+
6tAzT4oBgHgl3EQfgPwz/content/2301.01464v1.pdf filter=lfs diff=lfs merge=lfs -text
|
8619 |
+
wtFPT4oBgHgl3EQfPjQO/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
8620 |
+
R9E0T4oBgHgl3EQfUgAs/content/2301.02250v1.pdf filter=lfs diff=lfs merge=lfs -text
|
8621 |
+
p9AzT4oBgHgl3EQfOvtl/content/2301.01171v1.pdf filter=lfs diff=lfs merge=lfs -text
|
8622 |
+
rNFQT4oBgHgl3EQftzab/content/2301.13393v1.pdf filter=lfs diff=lfs merge=lfs -text
|
8623 |
+
b9AzT4oBgHgl3EQf2_6M/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
8624 |
+
PtAzT4oBgHgl3EQfWvyr/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
8625 |
+
hdE5T4oBgHgl3EQfFQ6l/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
8626 |
+
0dAyT4oBgHgl3EQfbfdc/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
8627 |
+
K9FAT4oBgHgl3EQfwR5T/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
8628 |
+
ZtAzT4oBgHgl3EQfK_te/content/2301.01106v1.pdf filter=lfs diff=lfs merge=lfs -text
|
8629 |
+
K9AzT4oBgHgl3EQfkP22/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
8630 |
+
NdFOT4oBgHgl3EQf2jRR/content/2301.12942v1.pdf filter=lfs diff=lfs merge=lfs -text
|
8631 |
+
fdA0T4oBgHgl3EQfHf_u/content/2301.02063v1.pdf filter=lfs diff=lfs merge=lfs -text
|
8632 |
+
2tAzT4oBgHgl3EQffPw3/content/2301.01448v1.pdf filter=lfs diff=lfs merge=lfs -text
|
8633 |
+
K9FAT4oBgHgl3EQfwR5T/content/2301.08680v1.pdf filter=lfs diff=lfs merge=lfs -text
|
8634 |
+
1dAzT4oBgHgl3EQfRfuL/content/2301.01217v1.pdf filter=lfs diff=lfs merge=lfs -text
|
8635 |
+
ndAyT4oBgHgl3EQf__rr/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
8636 |
+
fdA0T4oBgHgl3EQfHf_u/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
8637 |
+
V9AzT4oBgHgl3EQfmP0G/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
8638 |
+
1dAzT4oBgHgl3EQfRfuL/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
8639 |
+
rNFQT4oBgHgl3EQftzab/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
8640 |
+
AtE2T4oBgHgl3EQfRQeF/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
8641 |
+
-dE1T4oBgHgl3EQfUgPr/content/2301.03092v1.pdf filter=lfs diff=lfs merge=lfs -text
|
8642 |
+
b9AzT4oBgHgl3EQf2_6M/content/2301.01823v1.pdf filter=lfs diff=lfs merge=lfs -text
|
8643 |
+
AtE2T4oBgHgl3EQfRQeF/content/2301.03779v1.pdf filter=lfs diff=lfs merge=lfs -text
|
8644 |
+
MdE1T4oBgHgl3EQfZQR8/content/2301.03148v1.pdf filter=lfs diff=lfs merge=lfs -text
|
8645 |
+
V9AzT4oBgHgl3EQfmP0G/content/2301.01558v1.pdf filter=lfs diff=lfs merge=lfs -text
|
8646 |
+
BNE1T4oBgHgl3EQfpQVQ/content/2301.03329v1.pdf filter=lfs diff=lfs merge=lfs -text
|
8647 |
+
nNAzT4oBgHgl3EQfN_vv/content/2301.01160v1.pdf filter=lfs diff=lfs merge=lfs -text
|
8648 |
+
a9E4T4oBgHgl3EQfPAy5/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
8649 |
+
-NE4T4oBgHgl3EQf3w1M/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
8650 |
+
WdFIT4oBgHgl3EQfhytq/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
8651 |
+
tNE1T4oBgHgl3EQfjgS9/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
8652 |
+
p9AzT4oBgHgl3EQfOvtl/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
8653 |
+
StE0T4oBgHgl3EQfUwAJ/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
8654 |
+
mtFLT4oBgHgl3EQffC-V/content/2301.12093v1.pdf filter=lfs diff=lfs merge=lfs -text
|
8655 |
+
29E1T4oBgHgl3EQf5wUG/content/2301.03514v1.pdf filter=lfs diff=lfs merge=lfs -text
|
8656 |
+
BNE1T4oBgHgl3EQfpQVQ/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
8657 |
+
tNE1T4oBgHgl3EQfjgS9/content/2301.03264v1.pdf filter=lfs diff=lfs merge=lfs -text
|
8658 |
+
m9AzT4oBgHgl3EQfqP2M/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
8659 |
+
CNE3T4oBgHgl3EQfUQpw/content/2301.04449v1.pdf filter=lfs diff=lfs merge=lfs -text
|
8660 |
+
QNFJT4oBgHgl3EQfJSzf/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
8661 |
+
a9AyT4oBgHgl3EQfiviR/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
0dAyT4oBgHgl3EQfbfdc/content/2301.00263v1.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:383d104b63d3c704f0d7a1730b5560ad914a6d87b986501fedfa9d25fa348190
|
3 |
+
size 212710
|
0dAyT4oBgHgl3EQfbfdc/vector_store/index.faiss
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:886c731c1cd7d302dcf5a5f6f276cbb90134c04516ea93377d8cf5bd5af30fb5
|
3 |
+
size 2818093
|
0dAyT4oBgHgl3EQfbfdc/vector_store/index.pkl
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:e3c8a04fe5dd497b18de5fba25ecb2361cfcb4708379b4f3c58ed77913246e4c
|
3 |
+
size 106120
|
19FAT4oBgHgl3EQfkR2N/content/tmp_files/2301.08610v1.pdf.txt
ADDED
@@ -0,0 +1,1284 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
Platform for Probing Radiation Transport Properties of Hydrogen at Conditions
|
2 |
+
Found in the Deep Interiors of Red Dwarfs
|
3 |
+
J. Lütgert,1, 2, 3, ∗ M. Bethkenhagen,4 B. Bachmann,5 L. Divol,5 D. O. Gericke,6 S. H. Glenzer,7
|
4 |
+
G. N. Hall,5 N. Izumi,5 S. F. Khan,5 O. L. Landen,5 S. A. MacLaren,5 L. Masse,5, 8
|
5 |
+
R. Redmer,1 M. Schörner,1 M. O. Schölmerich,5 S. Schumacher,1 N. R. Shaffer,9
|
6 |
+
C. E. Starrett,10 P. A. Sterne,5 C. Trosseille,5 T. Döppner,5 and D. Kraus1, 2, †
|
7 |
+
1Institut für Physik, Universität Rostock, Albert-Einstein-Str. 23, 18059 Rostock, Germany
|
8 |
+
2Helmholtz-Zentrum Dresden-Rossendorf, Bautzner Landstrasse 400, 01328 Dresden, Germany
|
9 |
+
3Institute of Nuclear and Particle Physics, Technische Universität Dresden, 01069 Dresden, Germany
|
10 |
+
4École Normale Supérieure de Lyon, Université Lyon 1,
|
11 |
+
Laboratoire de Géologie de Lyon, CNRS UMR 5276, 69364 Lyon Cedex 07, France
|
12 |
+
5Lawrence Livermore National Laboratory, Livermore, CA 94550, USA
|
13 |
+
6Centre for Fusion, Space and Astrophysics, Department of Physics,
|
14 |
+
University of Warwick, Coventry CV4 7AL, United Kingdom
|
15 |
+
7SLAC National Accelerator Laboratory, Menlo Park, CA 94309, USA
|
16 |
+
8CEA-DAM, DIF, F-91297 Arpajon, France
|
17 |
+
9Laboratory for Laser Energetics, University of Rochester,
|
18 |
+
250 East River Road, Rochester, NY 14623, USA
|
19 |
+
10Los Alamos National Laboratory, P.O. Box 1663, Los Alamos, NM 87545, USA
|
20 |
+
(Dated: January 23, 2023)
|
21 |
+
We describe an experimental concept at the National Ignition Facility for specifically tailored
|
22 |
+
spherical implosions to compress hydrogen to extreme densities (up to ∼ 800× solid density,
|
23 |
+
electron number density ne ∼ 4 × 1025 cm−3) at moderate temperatures (T ∼ 200 eV), i.e., to
|
24 |
+
conditions, which are relevant to the interiors of red dwarf stars. The dense plasma will be probed
|
25 |
+
by laser-generated x-ray radiation of different photon energy to determine the plasma opacity due
|
26 |
+
to collisional (free-free) absorption and Thomson scattering. The obtained results will benchmark
|
27 |
+
radiation transport models, which in the case for free-free absorption show strong deviations at
|
28 |
+
conditions relevant to red dwarfs. This very first experimental test of free-free opacity models at
|
29 |
+
these extreme states will help to constrain where inside those celestial objects energy transport is
|
30 |
+
dominated by radiation or convection. Moreover, our study will inform models for other important
|
31 |
+
processes in dense plasmas, which are based on electron-ion collisions, e.g., stopping of swift ions or
|
32 |
+
electron-ion temperature relaxation.
|
33 |
+
I.
|
34 |
+
INTRODUCTION
|
35 |
+
Red dwarfs (M dwarfs) are the lightest and coolest
|
36 |
+
main sequence stars and make up ∼ 70 % of all stars
|
37 |
+
in the Sun’s neighborhood. [1, 2] Prominent examples
|
38 |
+
are our nearest neighbor Proxima Centauri (0.12 M⊙)
|
39 |
+
or TRAPPIST-1 (0.089 M⊙),
|
40 |
+
which is only slightly
|
41 |
+
larger than Jupiter, but much more massive.
|
42 |
+
The
|
43 |
+
interiors of red dwarfs mainly consist of hydrogen-
|
44 |
+
helium mixtures, which are progressively shaped by
|
45 |
+
screening effects, ion-ion correlations, and degeneracy
|
46 |
+
as temperature decreases and density increases. [3]
|
47 |
+
These many-particle effects are challenging to model, in
|
48 |
+
particular, for calculations of radiation transport, which
|
49 |
+
plays a major role in modeling of sub-stellar objects and
|
50 |
+
stars. From the solar abundance problem, we know that
|
51 |
+
∼ 20 % changes in opacity have paramount impact on
|
52 |
+
our understanding of stellar interiors. [4, 5] Whether
|
53 |
+
energy can effectively be transported via radiation or,
|
54 |
+
if radiation is not sufficient, convection sets in, is a
|
55 | |
56 | |
57 |
+
property that is particularly influenced by stellar opacity.
|
58 |
+
In general, the physics of red dwarfs is poorly understood
|
59 |
+
in comparison with the hotter interior of the Sun, which
|
60 |
+
is much closer to the ideal plasma state.
|
61 |
+
Figure 1 shows simulated pressure-temperature profiles
|
62 |
+
of stars on the main sequence, demonstrating the extreme
|
63 |
+
plasma conditions present inside those celestial objects.
|
64 |
+
The curves were obtained using the MESA code for
|
65 |
+
stellar evolution [6–10] (see the appendix for details on
|
66 |
+
these simulations).
|
67 |
+
The inset illustrates the schematic
|
68 |
+
interiors of stars from the core (m/M = 0) to the
|
69 |
+
photosphere (m/M = 1) divided into radiative and
|
70 |
+
convective zones for stars with a solar composition of
|
71 |
+
elements.
|
72 |
+
Red dwarfs are characterized by masses
|
73 |
+
between 0.075 and 0.5 solar masses so that their typical
|
74 |
+
mass-temperature ratios overall place red dwarfs in a
|
75 |
+
regime, where convection dominates the outer regions.
|
76 |
+
Depending on the size of the individual object, a more or
|
77 |
+
less developed radiative core is present.
|
78 |
+
The smallest
|
79 |
+
red dwarfs (M
|
80 |
+
≲
|
81 |
+
0.2 M⊙) are thought to be fully
|
82 |
+
convective.
|
83 |
+
In this case, the fusion reactions in the
|
84 |
+
core are permanently re-fueled by hydrogen from the
|
85 |
+
outer layers. Combined with the low fusion rates due to
|
86 |
+
the relatively low core temperatures, convection possibly
|
87 |
+
arXiv:2301.08610v1 [physics.plasm-ph] 20 Jan 2023
|
88 |
+
|
89 |
+
2
|
90 |
+
FIG. 1.
|
91 |
+
Pressure-temperature profiles for various celestial
|
92 |
+
objects calculated using the MESA package. [6–10] Solid
|
93 |
+
lines denote convective regions while dots indicate a layer of
|
94 |
+
radiative energy transport. The gray shaded area shows the
|
95 |
+
conditions, which we intent to generate in our experiment.
|
96 |
+
Inset: Mass coordinate m/M along stellar interior profiles for
|
97 |
+
objects with solar composition divided into radiative (white,
|
98 |
+
dotted lines) and convective (gray, solid curves) regions over
|
99 |
+
total object mass M relative to the Sun’s mass M⊙. The gray-
|
100 |
+
scale dataset was published by Kippenhahn et al. [11] while
|
101 |
+
the colored lines show the MESA calculations of the main
|
102 |
+
figure.
|
103 |
+
allows some red dwarfs to last trillions of years until
|
104 |
+
all hydrogen fuel is exhausted. However, even a small
|
105 |
+
radiative core can strongly change this behavior and
|
106 |
+
its existence crucially depends on the effectiveness of
|
107 |
+
radiation transport in highly compressed matter.
|
108 |
+
Moreover, the internal structure of a star has a
|
109 |
+
major impact on the activity of its surface. [12] The
|
110 |
+
boundary between a radiative core and a convective
|
111 |
+
layer can lead to strong magnetic fields and a turbulent
|
112 |
+
atmosphere, [1, 13, 14] including radiative and plasma
|
113 |
+
outbursts that may threaten life on nearby planets.
|
114 |
+
Therefore, understanding the radiative properties of the
|
115 |
+
complex plasmas within a host star is crucial when
|
116 |
+
judging the possibility of an exoplanet to host life –
|
117 |
+
especially for red dwarfs where the habitable zone is
|
118 |
+
thought to be found relatively close to the star itself due
|
119 |
+
to the low surface temperature. [15]
|
120 |
+
For red dwarf stars, the thermodynamic conditions
|
121 |
+
at the boundary between radiative core and convective
|
122 |
+
envelope are estimated to be in a pressure regime of few
|
123 |
+
Gbars and temperatures of few million Kelvin. [1, 11]
|
124 |
+
Corresponding free electron densities are in the range of
|
125 |
+
few 1025 cm−3, which results in Fermi energies of similar
|
126 |
+
order as the thermal energy of the free electrons. The
|
127 |
+
energy transport in this so-called warm dense matter
|
128 |
+
regime [16] is extremely difficult to calculate, which gives
|
129 |
+
rise to significant uncertainties in modeling the energy
|
130 |
+
transport inside red dwarfs.
|
131 |
+
II.
|
132 |
+
THEORY
|
133 |
+
For stellar interiors, the radiative opacity κrad is
|
134 |
+
usually divided into three contributions: [17]
|
135 |
+
κrad = κbf + κff + κT ,
|
136 |
+
(1)
|
137 |
+
where κbf is the opacity contribution by bound-free
|
138 |
+
absorption, κff denotes the free-free contribution and
|
139 |
+
κT = ZσT /mi the absorption due to Thomson scattering
|
140 |
+
from free electrons, which is solely dependent on the
|
141 |
+
Thomson scattering transport cross section σT , [18, 19]
|
142 |
+
the average ion charge state Z and the average ion mass
|
143 |
+
mi of the plasma. While Rayleigh scattering might be of
|
144 |
+
interest for the atmosphere of K and M class stars, [20]
|
145 |
+
the high ionization in hotter photospheres and deep
|
146 |
+
within even the smallest stars often justifies to neglect its
|
147 |
+
contribution to κrad. For the solar abundance problem,
|
148 |
+
the bound-free opacity of metals is probably most
|
149 |
+
relevant, but deep in the solar radiation zone as well as for
|
150 |
+
many red dwarfs, particularly those with low metallicity,
|
151 |
+
hydrogen free-free opacity, i.e., absorption due to inverse
|
152 |
+
bremsstrahlung, is the dominant absorption mechanism
|
153 |
+
of radiation. [17] For these red dwarfs, the absolute values
|
154 |
+
for free-free absorption determine where convection
|
155 |
+
or radiation will be the dominant energy transport
|
156 |
+
mechanism.
|
157 |
+
Figure 2 shows a density-temperature diagram of
|
158 |
+
dominating
|
159 |
+
absorption
|
160 |
+
mechanisms
|
161 |
+
thought
|
162 |
+
to
|
163 |
+
be
|
164 |
+
present for the composition of population I stars in
|
165 |
+
comparison with red dwarf interiors and the Sun. While
|
166 |
+
bound-free transitions dominate at low densities and
|
167 |
+
temperatures, free-free absorption starts to outrun the
|
168 |
+
bound-free opacity with the increase in density due to
|
169 |
+
increasing electron-ion collision rates as well as pressure
|
170 |
+
ionization of heavier elements. [21] At the highest
|
171 |
+
densities, conduction by degenerate electrons becomes
|
172 |
+
more efficient than radiation transport, whereas for low
|
173 |
+
densities and highest temperatures, photon scattering
|
174 |
+
from electrons (Thomson or Compton, depending on
|
175 |
+
photon energy) is most significant.
|
176 |
+
A.
|
177 |
+
Analytical models
|
178 |
+
A classical
|
179 |
+
treatment of
|
180 |
+
the spectral absorption
|
181 |
+
coefficient due to inverse bremsstrahlung, derived from
|
182 |
+
the description of electron-ion collisions in a weakly
|
183 |
+
coupled plasma environment, yields for the absorption
|
184 |
+
coefficient αff, [22]
|
185 |
+
αff(ν) = ρκff(ν) ∝ Z2neni
|
186 |
+
ν3√
|
187 |
+
T
|
188 |
+
�
|
189 |
+
1 − exp
|
190 |
+
�
|
191 |
+
− hν
|
192 |
+
kBT
|
193 |
+
��
|
194 |
+
gff(ν, T),
|
195 |
+
(2)
|
196 |
+
|
197 |
+
.3
|
198 |
+
FIG. 2.
|
199 |
+
Dominating opacities in different regimes of the
|
200 |
+
density-temperature diagram for a composition of elements as
|
201 |
+
in population I stars. [17] The colored lines show densities and
|
202 |
+
temperatures realized within main-sequence stars according
|
203 |
+
to the “MESA” stellar evolution code [6–10] with solid lines
|
204 |
+
representing convective layers. The proposed experiments will
|
205 |
+
probe conditions similar to the interiors of red dwarf stars
|
206 |
+
where free-free absorption is expected to dominate (indicated
|
207 |
+
by the shaded region).
|
208 |
+
where ν denotes the x-ray frequency, ρ is the mass
|
209 |
+
density, Z is the average degree of ionization, ne is
|
210 |
+
the free electron number density, ni is the ion number
|
211 |
+
density, T is the plasma temperature, h is Planck’s
|
212 |
+
constant, and kB is Boltzmann’s constant.
|
213 |
+
Additional
|
214 |
+
corrections due to quantum and correlation effects are
|
215 |
+
accounted for in a frequency-dependent correction factor
|
216 |
+
gff(ν, T), the so-called Gaunt factor. [23] For a weakly
|
217 |
+
coupled ideal plasma, the Gaunt factor can be interpreted
|
218 |
+
as the logarithm of the ratio of maximum impact
|
219 |
+
parameter bmax and minimum impact parameter bmin
|
220 |
+
in the corresponding electron-ion collision (the so-called
|
221 |
+
Coulomb logarithm [24]):
|
222 |
+
gff(ν, T) =
|
223 |
+
√
|
224 |
+
3
|
225 |
+
π ln
|
226 |
+
�bmax
|
227 |
+
bmin
|
228 |
+
�
|
229 |
+
.
|
230 |
+
(3)
|
231 |
+
This formalism is equivalent to the classical treatment
|
232 |
+
of several other important plasma effects that involve
|
233 |
+
Coulomb collisions of electrons and ions, e.g., stopping
|
234 |
+
power of ions or electron-ion temperature equilibration
|
235 |
+
in dense plasmas. [25] The maximum impact parameter
|
236 |
+
bmax is usually given by min(ve/2πν, λs) where ve is the
|
237 |
+
average velocity of the electrons, ν is the x-ray frequency,
|
238 |
+
and λs is the screening length due to the surrounding
|
239 |
+
plasma. On the other hand, bmin can be expressed as
|
240 |
+
max(b⊥, λth), where b⊥ = Ze2/(4πϵ0mev2
|
241 |
+
e) is the impact
|
242 |
+
parameter for an electron being deflected perpendicular
|
243 |
+
to its direction of incidence and λth denotes the thermal
|
244 |
+
de Broglie wavelength of the electrons.
|
245 |
+
However, for conditions relevant to the interiors of
|
246 |
+
red dwarfs [e.g., ne ∼ few 1025 cm−3, Te ∼ few 100 eV
|
247 |
+
(Ref. [3])], we find ve/2πν
|
248 |
+
<
|
249 |
+
λth, i.e., a negative
|
250 |
+
Coulomb logarithm for x-ray frequencies larger than the
|
251 |
+
plasma frequency. Thus, this simple classical treatment
|
252 |
+
assuming a weakly coupled plasma is not appropriate
|
253 |
+
for
|
254 |
+
such
|
255 |
+
conditions.
|
256 |
+
Indeed,
|
257 |
+
more
|
258 |
+
sophisticated
|
259 |
+
approaches have been developed to accommodate these
|
260 |
+
conditions. [26, 27]
|
261 |
+
B.
|
262 |
+
Average Atom and Density Functional Theory
|
263 |
+
calculations
|
264 |
+
Figure 3 shows Average Atom calculations with a
|
265 |
+
Mean Force potential (AA-MF) [28] and state-of-the-
|
266 |
+
art Density Functional Theory Molecular Dynamics
|
267 |
+
(DFT-MD) simulations [29] compared to the analytical
|
268 |
+
model for the free-free opacity with constant Gaunt
|
269 |
+
factor and calculations by van Hoof et al. [30, 31]
|
270 |
+
The
|
271 |
+
first
|
272 |
+
two
|
273 |
+
simulation
|
274 |
+
methods
|
275 |
+
have
|
276 |
+
previously
|
277 |
+
been applied successfully for calculating the equation-
|
278 |
+
of-state
|
279 |
+
(EOS)
|
280 |
+
and
|
281 |
+
transport
|
282 |
+
properties
|
283 |
+
of
|
284 |
+
dense
|
285 |
+
plasmas. [28, 32–34] The DFT-MD simulations were
|
286 |
+
performed
|
287 |
+
with
|
288 |
+
up
|
289 |
+
to
|
290 |
+
256
|
291 |
+
hydrogen
|
292 |
+
atoms
|
293 |
+
using
|
294 |
+
the program package VASP. [35–38] Our considered
|
295 |
+
density range spans 20 −150 g cm−3 at 100, 150, and
|
296 |
+
200 eV. The simulations use the Baldereschi mean value
|
297 |
+
point [39] and the Coulomb potential with an energy
|
298 |
+
cutoff of 10 000 eV.
|
299 |
+
Each DFT-MD point was run for
|
300 |
+
20 000 time steps with a time step size between 3 as
|
301 |
+
(attoseconds) and 8 as depending on the thermodynamic
|
302 |
+
conditions.
|
303 |
+
The temperature was controlled with
|
304 |
+
a Nosé-Hoover thermostat. [40] Subsequently,
|
305 |
+
10 –
|
306 |
+
20 snapshots were selected from each trajectory to
|
307 |
+
calculate the electrical conductivity and opacity applying
|
308 |
+
the
|
309 |
+
Kubo-Greenwood
|
310 |
+
formalism
|
311 |
+
[41,
|
312 |
+
42]
|
313 |
+
and
|
314 |
+
the
|
315 |
+
Kramers-Kronig relation.
|
316 |
+
For details on the AA-
|
317 |
+
MF calculations (which were performed for identical
|
318 |
+
temperatures
|
319 |
+
and
|
320 |
+
pressures),
|
321 |
+
we
|
322 |
+
refer
|
323 |
+
to
|
324 |
+
previous
|
325 |
+
publications. [28, 43–46]
|
326 |
+
While the DFT-MD simulation naturally includes
|
327 |
+
many-body effects in the description of wavefunctions
|
328 |
+
and the density of states due to the multiple ions included
|
329 |
+
in the simulation, the AA-MF approach, which is strictly
|
330 |
+
speaking also DFT-based, simplifies the calculation by
|
331 |
+
exclusively relying on the atom-in-jellium model. Either
|
332 |
+
of the two formulations calculates opacity from the real
|
333 |
+
part of the electrical conductivity.
|
334 |
+
Both approaches
|
335 |
+
agree on the quantity of extinction remarkably well,
|
336 |
+
supporting each other.
|
337 |
+
This result is particularly
|
338 |
+
noteworthy as the similarity of the AA-MF calculation
|
339 |
+
with DFT-MD – for the specific case of hydrogen –
|
340 |
+
is highly desired:
|
341 |
+
While DFT-MD is generally more
|
342 |
+
accurate, AA-MF is computationally significantly less
|
343 |
+
expensive and should be favored if benchmarks can
|
344 |
+
show good agreement between the two methods.
|
345 |
+
At
|
346 |
+
the same time, the consistency of the computed opacity
|
347 |
+
illustrates impressively that extreme states of matter
|
348 |
+
can be treated by DFT-MD nowadays with the increase
|
349 |
+
|
350 |
+
:4
|
351 |
+
FIG. 3. Opacity for a (25 %/75 %) HT mixture at an electron
|
352 |
+
density ne = 5 × 1025 cm−3 and a temperature of T
|
353 |
+
=
|
354 |
+
100 eV (solid and dotted lines) or T
|
355 |
+
= 150 eV (dashed),
|
356 |
+
respectively, according to different models.
|
357 |
+
The blue and
|
358 |
+
purple lines depict DFT-MD and AA-MF calculations. The
|
359 |
+
other solid curves show the analytical model for free-free
|
360 |
+
extinction [Eq. (2)] with a Gaunt factor equal to unity
|
361 |
+
(black line) or values calculated by van Hoof et al. [30, 31]
|
362 |
+
(red). For comparison, the opacity due to Thomson scattering
|
363 |
+
for a temperature of T = 100 eV is shown as the dotted
|
364 |
+
black line.
|
365 |
+
The AA-MF calculation at 150 eV and the
|
366 |
+
inset depicting the relative difference between the two results
|
367 |
+
[∆κAA = 2(κ150 eV
|
368 |
+
AA
|
369 |
+
− κ100 eV
|
370 |
+
AA
|
371 |
+
)/(κ150 eV
|
372 |
+
AA
|
373 |
+
+ κ100 eV
|
374 |
+
AA
|
375 |
+
)] show that
|
376 |
+
the temperature influence is very small for photon energies
|
377 |
+
above 3 keV due to the degenerate conditions.
|
378 |
+
in computational power and, hence, number of energy
|
379 |
+
bands included in the calculation.
|
380 |
+
Both methods show a discrepancy to the calculation
|
381 |
+
of the free-free opacity from the semi-classical formula
|
382 |
+
[Eq. (2)], as it can be seen in Fig. 3.
|
383 |
+
The simplest
|
384 |
+
approach of setting the Gaunt factor to unity reproduces
|
385 |
+
the classical result of Kramers. [22] Introducing quantum-
|
386 |
+
mechanical corrections, van Hoof et al. [30, 31] provide
|
387 |
+
easily applicable, tabulated values for gff by following
|
388 |
+
the seminal work of Karzas and Latter. [47] However, this
|
389 |
+
calculation is requiring more assumptions than the AA-
|
390 |
+
MF or the DFT-MD model, e.g., the velocity distribution
|
391 |
+
of the electrons (with is assumed to be Maxwellian) in
|
392 |
+
order to calculate thermally averaged free-free Gaunt
|
393 |
+
factors and from these opacities. [30, 31] Other authors
|
394 |
+
perform similar calculations but integrate over the Fermi
|
395 |
+
distribution of a degenerate electron gas. [24]
|
396 |
+
In fact, for dense plasma conditions comparable to
|
397 |
+
the interiors of main sequence stars, even advanced
|
398 |
+
calculations of the Gaunt factor vary by more than 50 %
|
399 |
+
for frequencies larger than the plasma frequency. [27] In
|
400 |
+
particular, the specific treatment of dynamic screening,
|
401 |
+
strong collisions, and re-normalization due to higher
|
402 |
+
moments can make a significant difference in comparison
|
403 |
+
to widely-used Born approximation treatments of the
|
404 |
+
Gaunt factor. [27] Deviations are particularly significant
|
405 |
+
in the photon energy regime from ∼ 500 eV to few keV,
|
406 |
+
which is the dominant contribution when calculating the
|
407 |
+
Rosseland mean opacity for the Sun and smaller stars.
|
408 |
+
Indeed, varying the opacity by 50 % can change the radii
|
409 |
+
of the boundaries between convection and radiation zone
|
410 |
+
by up to 10 %, which, given the underlying density and
|
411 |
+
temperature gradients, would significantly impact our
|
412 |
+
general understanding of stars. [5, 48]
|
413 |
+
III.
|
414 |
+
EXPERIMENTAL CONCEPT
|
415 |
+
Using the largest laser system in the world, namely, the
|
416 |
+
National Ignition Facility (NIF) at Lawrence Livermore
|
417 |
+
National Laboratory, [49] it is now possible to create
|
418 |
+
and probe matter states relevant to stellar interiors in
|
419 |
+
the laboratory. [50, 51] To address the questions raised
|
420 |
+
above, we have developed a concept to leverage NIF’s
|
421 |
+
unique capabilities to create relevant conditions and
|
422 |
+
obtain a very first test of free-free opacity models in
|
423 |
+
this very important plasma regime via x-ray absorption
|
424 |
+
measurements of highly compressed hydrogen during
|
425 |
+
the stagnation phase of layered capsule implosions. In
|
426 |
+
this way, not only the various existing models and
|
427 |
+
resulting tables for the Gaunt factor will be tested, but
|
428 |
+
also modern DFT-MD and AA-MF simulations, which
|
429 |
+
provide the absorption coefficient, can be benchmarked.
|
430 |
+
Finally, due to the equivalent physics involved (electron-
|
431 |
+
ion collisions in dense plasma environments [26]), our
|
432 |
+
results on free-free absorption will inform models for
|
433 |
+
swift ion stopping in warm dense matter as well as
|
434 |
+
corresponding electron-ion equilibration times.
|
435 |
+
A.
|
436 |
+
Experimental setup
|
437 |
+
A sketch of the experimental setup is shown in Fig. 4.
|
438 |
+
We will use 184 out of the 192 NIF laser beams to heat
|
439 |
+
a gold Hohlraum creating a quasi-thermal radiation field
|
440 |
+
that implodes a layered fuel capsule at the center of the
|
441 |
+
Hohlraum.
|
442 |
+
The capsule is comprised of a 57 µm thick
|
443 |
+
beryllium ablator shell, containing a 83 µm thick layer of
|
444 |
+
cryogenic solid hydrogen.
|
445 |
+
The temporally shaped radiation field created by the
|
446 |
+
laser drive will ablate the Be shell and, hence, accelerate
|
447 |
+
the payload inward.
|
448 |
+
Upon stagnation, a high density
|
449 |
+
hydrogen layer with ρ > 100 g cm−3 is formed while most
|
450 |
+
of the Be ablator has been ablated.
|
451 |
+
The
|
452 |
+
implosion
|
453 |
+
design
|
454 |
+
is
|
455 |
+
derived
|
456 |
+
from
|
457 |
+
inertial
|
458 |
+
confinement fusion (ICF) implosions at the NIF [54]
|
459 |
+
and applies a well-tested model that matched a variety
|
460 |
+
of spherical DT implosion experiments in NIF’s ICF
|
461 |
+
|
462 |
+
5
|
463 |
+
FIG. 4. Schematic of the experimental setup. Using NIF’s
|
464 |
+
laser beams, a nearly Planckian x-ray bath (see bottom right)
|
465 |
+
is created by heating a gold Hohlraum with a fuel capsule
|
466 |
+
at its center. Upon stagnation, the solid hydrogen layer is
|
467 |
+
compressed to mass densities larger than 100 g cm−3.
|
468 |
+
Two
|
469 |
+
Hohlraum windows allow for measuring the transmission of
|
470 |
+
high density hydrogen using x rays created in a stagnating
|
471 |
+
plasma inside the backlighter tube. Fielding NIF’s Crystal
|
472 |
+
Backlighter Imager [52] and the single line-of-sight (SLOS)
|
473 |
+
detector [53] enables us to acquire narrow bandwidth high-
|
474 |
+
resolution radiography images of the implosion.
|
475 |
+
program. [54, 55] In contrast to ICF implosions aiming for
|
476 |
+
high neutron yield,[56] the peak radiation temperature
|
477 |
+
of our Hohlraum drive (Trad = 170 eV) is significantly
|
478 |
+
reduced, deliberately slowing down the implosion to ∼
|
479 |
+
200 km s−1 with the goal of creating extreme densities
|
480 |
+
(∼ 150 g cm−3) at moderate temperatures (∼ 200 eV)
|
481 |
+
while reducing x-ray and neutron-related background
|
482 |
+
signals near stagnation that would affect the radiography
|
483 |
+
measurement. These conditions are directly relevant to
|
484 |
+
the interiors of red dwarfs.
|
485 |
+
The dense plasma states will be probed by x-ray line
|
486 |
+
emission, which is created by the eight remaining NIF
|
487 |
+
beams that heat a backlighter tube.
|
488 |
+
We will perform
|
489 |
+
2D-imaging radiography of the implosion and stagnation
|
490 |
+
phase using two different photon energies by varying
|
491 |
+
the backlighter tube material. Vanadium will result in
|
492 |
+
5.2 keV line emission from 1s2p→1s2 (He-α) transitions
|
493 |
+
of helium-like ions. In the same way, helium-like cobalt
|
494 |
+
ions will produce 7.2 keV photons.
|
495 |
+
NIF’s Crystal Backlighter Imager (CBI) system [52]
|
496 |
+
will allow for high-resolution, nearly monochromatic
|
497 |
+
radiography images of the imploding and stagnating
|
498 |
+
sphere. A gated single-line-of-sight (SLOS) detector [53]
|
499 |
+
will provide four images per implosion with a time delay
|
500 |
+
of ∼ 100 ps between consecutive images.
|
501 |
+
From the
|
502 |
+
radiography images, we will infer radial profiles of the
|
503 |
+
opacity through Abel inversion [57, 58] and forward
|
504 |
+
fitting methods.
|
505 |
+
FIG.
|
506 |
+
5.
|
507 |
+
(a)
|
508 |
+
1D
|
509 |
+
radiation-hydrodynamics
|
510 |
+
simulations
|
511 |
+
performed using the HYDRA code, [59] showing the mass
|
512 |
+
density ρ at a given radius r and time t.
|
513 |
+
Our experiment
|
514 |
+
intends
|
515 |
+
to
|
516 |
+
probe
|
517 |
+
around
|
518 |
+
stagnation
|
519 |
+
when
|
520 |
+
the
|
521 |
+
highest
|
522 |
+
fuel compression is predicted.
|
523 |
+
Density, temperature, and
|
524 |
+
ionization profiles around this time (∼ 11.5 ns after the start
|
525 |
+
of the drive laser) are plotted in (b) and predict hydrogen
|
526 |
+
mass densities in excess of 150 g cm−3 in the HT mixture with
|
527 |
+
a molar mass of 2.5 g mol−1.
|
528 |
+
B.
|
529 |
+
Radiation hydrodynamic simulations
|
530 |
+
The reduced implosion velocity minimizes the hot
|
531 |
+
spot x-ray emission at stagnation to improve the signal-
|
532 |
+
to-noise ratio of the physics measurements.
|
533 |
+
For the
|
534 |
+
same reason, we use a (25 %/75 %) HT mixture (which
|
535 |
+
is hydrodynamically equivalent to 50 %/50 % DT) for
|
536 |
+
the ice layer to minimize the neutron yield and the
|
537 |
+
related background signals.
|
538 |
+
Tritium is required to
|
539 |
+
enable the hydrogen ice layer formation through beta
|
540 |
+
layering, where self-heating from beta decay leads to
|
541 |
+
a redistribution of HT ice with time. [60–62] Figure 5
|
542 |
+
shows an overview of the ∼ 11 ns implosion trajectory
|
543 |
+
simulated with HYDRA-1D. [59] Compared to previous
|
544 |
+
ICF experiments with Be shells, [54] the ablator thickness
|
545 |
+
is reduced to 57 µm to decrease the remaining ablator
|
546 |
+
mass to near zero, which will maximize the radiography
|
547 |
+
contrast of the hydrogen layer.
|
548 |
+
Figure 5(b) illustrates
|
549 |
+
examples of radial density, ionization, and temperature
|
550 |
+
profiles predicted by hydrodynamic simulations.
|
551 |
+
The
|
552 |
+
high-density portion of the profiles consists of hydrogen
|
553 |
+
(HT) only.
|
554 |
+
Our simulations predict that the material
|
555 |
+
is compressed to mass densities exceeding 150 g cm−3,
|
556 |
+
which corresponds to electron densities of 3.6×1025 cm−3,
|
557 |
+
|
558 |
+
6
|
559 |
+
FIG. 6. Beryllium content of the capsule close to stagnation
|
560 |
+
as a function of time t and radius r. The dash-dotted dark
|
561 |
+
line shows the interface of ablator and fuel for a simulation
|
562 |
+
without mixing. The dashed lines depict contours of constant
|
563 |
+
density in the highly compressed HT. For the times we intend
|
564 |
+
to probe (around −0.4 ns to −0.2 ns), the Be is not predicted
|
565 |
+
to contaminate this dense part of the fuel. The values on the
|
566 |
+
abscissa are given relative to the time where the rebounding
|
567 |
+
shock wave coincides with the fuel-ablator interface.
|
568 |
+
at a temperature of ∼ 200 eV. These parameters result in
|
569 |
+
Fermi energies of ∼ 400 eV and, thus, ∼ 2× larger than
|
570 |
+
the thermal energies. Hence, we will probe degenerate
|
571 |
+
plasma conditions as expected in the interiors of red
|
572 |
+
dwarf stars. In addition, these conditions are expected
|
573 |
+
to limit the influence of temperature on the free-free
|
574 |
+
absorption, since the 1/
|
575 |
+
√
|
576 |
+
T term in the expression for
|
577 |
+
the inverse bremsstrahlung [Eq. (2)] can be replaced
|
578 |
+
approximately by 1/√TF , where TF denotes the Fermi
|
579 |
+
temperature. This behavior is supported by the results
|
580 |
+
from DFT-MD and the Average Atom Compared to
|
581 |
+
previous ICF experiments with Be shells, [54] the ablator
|
582 |
+
thickness is reduced to 57 µm to decrease the remaining
|
583 |
+
ablator mass to near zero, model, which indicates that
|
584 |
+
the opacity is more sensitive to the Fermi temperature
|
585 |
+
than the electronic temperature under dense degenerate
|
586 |
+
plasma conditions (see Fig. 3 and inset).
|
587 |
+
The weak
|
588 |
+
dependence on T is highly beneficial for the analysis and
|
589 |
+
interpretation of our data, as we can determine opacity
|
590 |
+
and from there infer density, while a direct measurement
|
591 |
+
of temperature would require additional diagnostics – for
|
592 |
+
example x-ray Thomson scattering. [63]
|
593 |
+
Reducing the ablator shell thickness and decreasing
|
594 |
+
the remaining mass at stagnation might come with
|
595 |
+
increased
|
596 |
+
risk
|
597 |
+
of
|
598 |
+
hydrodynamic
|
599 |
+
instability
|
600 |
+
at
|
601 |
+
the
|
602 |
+
ablator-ice interface and ablator material mixing into
|
603 |
+
the compressed ice layer.
|
604 |
+
For a more quantitative
|
605 |
+
estimate of mixing, we have performed 1D capsule-only
|
606 |
+
simulations using a buoyancy-drag mix model, [64] which
|
607 |
+
was successful in explaining experimental performance
|
608 |
+
observations of previous layered Be implosions. [54] In
|
609 |
+
addition, more recently the buoyancy-drag mix model has
|
610 |
+
been calibrated in a focused series of experiments using a
|
611 |
+
thin ice layer of varying thickness and detecting neutronic
|
612 |
+
signatures of deuterated plastic, originally located near
|
613 |
+
the inside of a plastic shell, mixing through the ice
|
614 |
+
layer into the hot spot. [65] Figure 6 shows the results
|
615 |
+
for our significantly slower implosion design in terms of
|
616 |
+
atomic Be fraction as function of radius and time. The
|
617 |
+
demarcation line between the Be ablator and the HT ice
|
618 |
+
is indicated as a dot-dashed line. We have labeled the
|
619 |
+
time of minimum radius of this interface by tmin, which
|
620 |
+
coincides with the time when the rebounding shock wave,
|
621 |
+
which leads to the formation of the high-compression
|
622 |
+
HT ice, passes this interface.
|
623 |
+
Our simulations clearly
|
624 |
+
show that Be does not mix into the high-compression
|
625 |
+
HT ice layer. The radiography measurements are aimed
|
626 |
+
to record transmission images between 400 and 200 ps
|
627 |
+
before tmin, which, hence, is not affected by Be mixing
|
628 |
+
into the high compression HT ice layer.
|
629 |
+
IV.
|
630 |
+
SIMULATED RADIOGRAPHY SIGNAL
|
631 |
+
Synthetic radiography images (see Fig. 7 and the
|
632 |
+
appendix for more details) show a clear limb feature at
|
633 |
+
the boundary of the central hydrogen and the beryllium
|
634 |
+
layer. Applying mass conservation, this feature will be
|
635 |
+
used as constraint for the density of the encapsulated
|
636 |
+
hydrogen at smaller radii as the total initial fuel mass can
|
637 |
+
be accurately characterized. Toward the outer edges of
|
638 |
+
the radiography field-of-view of 600×600 µm2, we expect
|
639 |
+
the plasma to become fully transmissive to the probe
|
640 |
+
radiation, which will be used to normalize the opacities
|
641 |
+
measured at smaller radii and obtain absolute values of
|
642 |
+
the radial absorption coefficient.
|
643 |
+
In the investigated density and temperature regime,
|
644 |
+
opacity due to Thomson scattering is expected to reach
|
645 |
+
similar values as free-free absorption. As absorption due
|
646 |
+
to Thomson scattering scales linearly with ne and free-
|
647 |
+
free opacity with n2
|
648 |
+
e, this effect can become particularly
|
649 |
+
significant in the lower density regions of the imploded
|
650 |
+
capsule.
|
651 |
+
To disentangle both mechanisms, we will
|
652 |
+
perform the absorption measurements at two photon
|
653 |
+
energies (5.2 keV and 7.2 keV as described above). While
|
654 |
+
disagreeing in the actual magnitude, all but the classical
|
655 |
+
approach (gff = 1) presented in Fig. 3 find the same
|
656 |
+
proportionality of the free-free opacity with ∼ 1/(hν)(7/2)
|
657 |
+
for high photon energies hν. Classically, the Thomson
|
658 |
+
cross-section is in fist order independent of probing
|
659 |
+
frequency and temperature, which would allow us to
|
660 |
+
separate the two contributions to the signal. While this
|
661 |
+
assumption might give a reasonable first estimate, our
|
662 |
+
AA-MF simulations (see Fig. 3) indicate in accordance
|
663 |
+
with previous calculations by Boercker [18] that this
|
664 |
+
description as a constant is not applicable at the extreme
|
665 |
+
conditions we intend to probe.
|
666 |
+
However, models of
|
667 |
+
the Thomson scattering have to provide only the ratio
|
668 |
+
between the cross-section at the two backlighter energies
|
669 |
+
|
670 |
+
7
|
671 |
+
FIG. 7.
|
672 |
+
(a) Simulated detector image including free-free
|
673 |
+
(AA-MF calculations) and bound-free [66] absorption as well
|
674 |
+
as Thomson scattering [18] for 5.2 keV (top) and 7.2 keV
|
675 |
+
(bottom) backlighter energy.
|
676 |
+
The colorbar indicates the
|
677 |
+
expected number of photons per pixel.
|
678 |
+
Albeit the limited
|
679 |
+
temporal and spatial resolution of the detector, the interface
|
680 |
+
between the HT mixture and the beryllium ablator is
|
681 |
+
predicted to be visible at least for the lower energy.
|
682 |
+
(c)
|
683 |
+
Absorption coefficient profiles and (b) integrated total capsule
|
684 |
+
transmission T for a 5.2 keV backlighter close to the time
|
685 |
+
where the highest density in the hydrogen is reached. As the
|
686 |
+
lower figure shows, different models for the free-free opacity
|
687 |
+
result in notable changes of the total transmission.
|
688 |
+
All
|
689 |
+
presented plots assume a perfectly symmetrical implosion, no
|
690 |
+
mixing between fuel and ablator and a beryllium layer without
|
691 |
+
impurities.
|
692 |
+
to enable us to differentiate the former from inverse
|
693 |
+
bremsstrahlung.
|
694 |
+
Regardless of the model applied, the
|
695 |
+
Thomson scattering’s contribution to the overall opacity
|
696 |
+
might also be used as an additional density constraint
|
697 |
+
next to measuring the ablator-hydrogen interface and
|
698 |
+
applying mass conservation.
|
699 |
+
Further constraints on the implosion parameters will
|
700 |
+
be deduced from measuring multiple absorption images
|
701 |
+
at different times during the implosion in one shot. The
|
702 |
+
stagnation phase is usually well modeled by a self-similar
|
703 |
+
description of the conservation laws, [67] which only
|
704 |
+
allows certain shapes and time evolutions of the density
|
705 |
+
profiles.
|
706 |
+
V.
|
707 |
+
CONCLUSIONS
|
708 |
+
In summary, we presented a concept to leverage
|
709 |
+
NIF’s unique capabilities to investigate the deep interiors
|
710 |
+
of red dwarf stars in the laboratory and shed light
|
711 |
+
on their internal energy transports mechanisms.
|
712 |
+
The
|
713 |
+
proposed experiment has been accepted within NIF’s
|
714 |
+
Discovery Science Program for upcoming shot days in
|
715 |
+
2022 and 2023.
|
716 |
+
The resulting measurement of free-
|
717 |
+
free absorption and opacity will provide a benchmark
|
718 |
+
for numerical and analytical approaches, which will in
|
719 |
+
turn yield an improved description of the Gaunt factor.
|
720 |
+
Finally, interior structure models for massive hydrogen-
|
721 |
+
rich astrophysical objects, such as red dwarfs, can be
|
722 |
+
revisited on the basis of the new opacity constraint.
|
723 |
+
ACKNOWLEDGMENTS
|
724 |
+
M.B.
|
725 |
+
was
|
726 |
+
supported
|
727 |
+
by
|
728 |
+
the
|
729 |
+
European
|
730 |
+
Horizon
|
731 |
+
2020 programme within the Marie Skłodowska-Curie
|
732 |
+
actions (xICE grant number 894725).
|
733 |
+
J.L. and D.K.
|
734 |
+
acknowledge support by the Helmholtz Association
|
735 |
+
under VH-NG-1141 and by GSI Helmholtzzentrum
|
736 |
+
für Schwerionenforschung, Darmstadt as part of the
|
737 |
+
R&D project SI-URDK2224 with the University of
|
738 |
+
Rostock.
|
739 |
+
The work of S.S. and D.K. was supported
|
740 |
+
by Deutsche Forschungsgemeinschaft (DFG – German
|
741 |
+
Research Foundation) project no. 495324226. The work
|
742 |
+
of B.B., L.D., G.N.H., S.F.K., N.I., O.L.L., S.A.M,
|
743 |
+
L.M., M.O.S., P.A.S. and T.D. was performed under the
|
744 |
+
auspices of the DOE by Lawrence Livermore National
|
745 |
+
Laboratory under Contract No. DE-AC52-07NA27344.
|
746 |
+
R.R. and M.S. acknowledge support from the DFG via
|
747 |
+
the Research Unit FOR 2440. The DFT-MD calculations
|
748 |
+
were performed at the North-German Supercomputing
|
749 |
+
Alliance (HLRN) facilities and at the IT- and Media
|
750 |
+
Center of the University of Rostock.
|
751 |
+
AUTHOR DECLARATIONS
|
752 |
+
Conflict of interest
|
753 |
+
The authors have no conflicts of interest.
|
754 |
+
|
755 |
+
8
|
756 |
+
DATA AVAILABILITY
|
757 |
+
The data that support the findings of this study
|
758 |
+
are available from the corresponding authors upon
|
759 |
+
reasonable request.
|
760 |
+
Appendix A: MESA Simulations
|
761 |
+
Profiles of temperature, density, and pressure inside
|
762 |
+
stars with various masses were calculated using the
|
763 |
+
“Modules for Experiments in Stellar Astrophysics” code
|
764 |
+
(MESA, release r15140). [6–10] We used the default
|
765 |
+
MESA equation-of-state (EOS) which is a blend of
|
766 |
+
the OPAL, [68] SCVH, [69] FreeEOS, [70] HELM, [71]
|
767 |
+
and PC [72] EOSes.
|
768 |
+
Radiative opacities are primarily
|
769 |
+
from OPAL, [73, 74] with low-temperature data from
|
770 |
+
Ferguson et al. [75] and the high-temperature, Compton-
|
771 |
+
scattering dominated regime by Buchler and Yueh. [76]
|
772 |
+
Electron conduction opacities are from Cassisi et al.. [77]
|
773 |
+
Nuclear reaction rates are from JINA REACLIB [78]
|
774 |
+
plus additional tabulated weak reaction rates. [79–81]
|
775 |
+
Screening is included via the prescription of Chugunov
|
776 |
+
et al.. [82] Thermal neutrino loss rates are from Itoh et
|
777 |
+
al.. [83]
|
778 |
+
A pre-main-sequence model has been calculated from
|
779 |
+
initial parameters of helium mass fraction Yi = 0.2744,
|
780 |
+
metallicity Zi
|
781 |
+
= 1 − Xi − Yi
|
782 |
+
= 0.01913 (with Xi
|
783 |
+
being the initial mass fraction of hydrogen), mixing
|
784 |
+
length parameter αMLT = 1.9179, and including element
|
785 |
+
diffusion, which has been found to reproduce the solar
|
786 |
+
model well. [6] The ratio of elements heavier than helium
|
787 |
+
was taken from Grevesse and Sauval. [84] The time span
|
788 |
+
of the simulation was chosen so that the star spent a
|
789 |
+
considerable amount of time on the main sequence. For
|
790 |
+
stars smaller than the Sun, 10 times the age of the star
|
791 |
+
when the main sequence was entered has been chosen;
|
792 |
+
masses M > M⊙ were evolved until tnuc/2 was reached,
|
793 |
+
were tnuc = (M/M⊙)−2.9 ×1010 a is an approximation for
|
794 |
+
the lifetime of star on the main sequence. [85]
|
795 |
+
The decision whether regions of a star were considered
|
796 |
+
convective or radiative was based on the Schwarzschild
|
797 |
+
criterion.
|
798 |
+
Appendix B: Comparing radiative and conductive
|
799 |
+
opacities
|
800 |
+
The relation between thermal conductivity through
|
801 |
+
photon transport (radiation) λrad and the opacity κrad
|
802 |
+
is given by
|
803 |
+
λrad = 4acT 3
|
804 |
+
3ρκrad
|
805 |
+
(B1)
|
806 |
+
where T is the temperature, ρ is the density, a = 7.5657×
|
807 |
+
10−16 Jm−3K−4 is the radiation density constant, and c is
|
808 |
+
the speed of light. [17, 85] Eq. (B1) can be used to define
|
809 |
+
a conductive opacity κc from the thermal conductivity
|
810 |
+
due to electrons λc by analogy.
|
811 |
+
This quantity – as
|
812 |
+
calculated by Hayashi et al.
|
813 |
+
who reproduce the work
|
814 |
+
of Mestel [86] and Lee [87] – has been plotted in Fig. 2
|
815 |
+
to compare it with radiative opacities.
|
816 |
+
As
|
817 |
+
the
|
818 |
+
two
|
819 |
+
contributions
|
820 |
+
to
|
821 |
+
the
|
822 |
+
full
|
823 |
+
thermal
|
824 |
+
conductivity are additive, the total opacity κtot is given
|
825 |
+
by 1/κtot = 1/κrad + 1/κc, i.e., in order for κc being the
|
826 |
+
dominant contribution to the total opacity (see the high
|
827 |
+
density and low temperature corner of Fig. 2), the former
|
828 |
+
quantity has to be small compared to κrad. [85]
|
829 |
+
Appendix C: Radiography predictions
|
830 |
+
In order to generate the transmission profiles [see
|
831 |
+
Fig. 7 (b)] from extinction coefficient line-outs [Fig. 7 (c)],
|
832 |
+
we assumed a perfect, spherically symmetric implosion
|
833 |
+
and a uniform and monochromatic backlighter emitting
|
834 |
+
parallel x rays. We calculated
|
835 |
+
Tν = exp
|
836 |
+
�
|
837 |
+
−
|
838 |
+
�
|
839 |
+
dxκν(x)ρ(x)
|
840 |
+
�
|
841 |
+
(C1)
|
842 |
+
where the integral runs over the path of the light
|
843 |
+
and might, therefore, probe different temperature and
|
844 |
+
density conditions. To account for the limited temporal
|
845 |
+
resolution of the detector, a series of one-dimensional
|
846 |
+
transmission profiles at different times was convolved
|
847 |
+
with a Gaussian gate-function (35 ps FWHM). The
|
848 |
+
resulting line-out has been rotated,
|
849 |
+
and a spatial
|
850 |
+
blur in the form of a two-dimensional Gaussian with
|
851 |
+
10 µm FWHM in both directions was applied before
|
852 |
+
the transmission has been multiplied with the expected
|
853 |
+
backlighter photon flux (240 µm−2 ps−1 (Eph = 5.2 keV)
|
854 |
+
or 288 µm−2 ps−1 (Eph
|
855 |
+
=
|
856 |
+
7.2 keV) at the target’s
|
857 |
+
position), corrected for attenuators shielding various
|
858 |
+
components and re-binned to the pixel-size of the
|
859 |
+
detector.
|
860 |
+
In a last step, noise proportional to the
|
861 |
+
individual pixels’ intensity has been applied to the data.
|
862 |
+
[1] I. N. Reid and S. L. Hawley, New Light on Dark Stars
|
863 |
+
(Springer Berlin-Heidelberg, 2005).
|
864 |
+
[2] M. J. Heath, L. R. Doyle, M. M. Joshi,
|
865 |
+
and R. M.
|
866 |
+
Haberle, Origins of Life and Evolution of the Biosphere
|
867 |
+
|
868 |
+
9
|
869 |
+
29, 405 (1999).
|
870 |
+
[3] D. E. Osterbrock, Astrophysical Journal 118, 529 (1953).
|
871 |
+
[4] J. E. Bailey, T. Nagayama, G. P. Loisel, G. A. Rochau,
|
872 |
+
C. Blancard, J. Colgan, P. Cosse, G. Faussurier, C. J.
|
873 |
+
Fontes, F. Gilleron, I. Golovkin, S. B. Hansen, C. A.
|
874 |
+
Iglesias, D. P. Kilcrease, J. J. MacFarlane, R. C. Mancini,
|
875 |
+
S. N. Nahar, C. Orban, J. C. Pain, A. K. Pradhan,
|
876 |
+
M. Sherrill, and B. G. Wilson, Nature 517, 56 (2015).
|
877 |
+
[5] N. Vinyoles, A. M. Serenelli, F. L. Villante, S. Basu,
|
878 |
+
J. Bergström,
|
879 |
+
M. C. Gonzalez-Garcia,
|
880 |
+
M. Maltoni,
|
881 |
+
C. Peña Garay, and N. Song, Astrophysical Journal 835,
|
882 |
+
202 (2017).
|
883 |
+
[6] B. Paxton, L. Bildsten, A. Dotter, F. Herwig, P. Lesaffre,
|
884 |
+
and F. Timmes, ApJS 192, 3 (2011).
|
885 |
+
[7] B. Paxton, M. Cantiello, P. Arras, L. Bildsten, E. F.
|
886 |
+
Brown, A. Dotter, C. Mankovich, M. H. Montgomery,
|
887 |
+
D. Stello, F. X. Timmes, and R. Townsend, ApJS 208,
|
888 |
+
4 (2013).
|
889 |
+
[8] B. Paxton, P. Marchant, J. Schwab, E. B. Bauer,
|
890 |
+
L. Bildsten, M. Cantiello, L. Dessart, R. Farmer, H. Hu,
|
891 |
+
N. Langer, R. H. D. Townsend, D. M. Townsley,
|
892 |
+
and
|
893 |
+
F. X. Timmes, ApJS 220, 15 (2015).
|
894 |
+
[9] B. Paxton,
|
895 |
+
J. Schwab,
|
896 |
+
E. B. Bauer,
|
897 |
+
L. Bildsten,
|
898 |
+
S. Blinnikov, P. Duffell, R. Farmer, J. A. Goldberg,
|
899 |
+
P. Marchant, E. Sorokina, A. Thoul, R. H. D. Townsend,
|
900 |
+
and F. X. Timmes, ApJS 234, 34 (2018).
|
901 |
+
[10] B.
|
902 |
+
Paxton,
|
903 |
+
R.
|
904 |
+
Smolec,
|
905 |
+
J.
|
906 |
+
Schwab,
|
907 |
+
A.
|
908 |
+
Gautschy,
|
909 |
+
L. Bildsten, M. Cantiello, A. Dotter, R. Farmer, J. A.
|
910 |
+
Goldberg, A. S. Jermyn, S. M. Kanbur, P. Marchant,
|
911 |
+
A. Thoul, R. H. D. Townsend, W. M. Wolf, M. Zhang,
|
912 |
+
and F. X. Timmes, ApJS 243, 10 (2019).
|
913 |
+
[11] R. Kippenhahn, A. Weigert,
|
914 |
+
and A. Weiss, Stellar
|
915 |
+
Structure
|
916 |
+
and
|
917 |
+
Evolution
|
918 |
+
(Springer
|
919 |
+
Berlin-Heidelber,
|
920 |
+
2012).
|
921 |
+
[12] H. W. Babcock, The Astrophysical Journal 133, 572
|
922 |
+
(1961).
|
923 |
+
[13] E. N. Parker, The Astrophysical Journal 198, 205 (1975).
|
924 |
+
[14] M. Route, The Astrophysical Journal 830, L27 (2016).
|
925 |
+
[15] R. O. P. Loyd, E. L. Shkolnik, A. C. Schneider, T. S.
|
926 |
+
Barman, V. S. Meadows, I. Pagano,
|
927 |
+
and S. Peacock,
|
928 |
+
The Astrophysical Journal 867, 70 (2018).
|
929 |
+
[16] F.
|
930 |
+
Graziani,
|
931 |
+
M.
|
932 |
+
P.
|
933 |
+
Desjarlais,
|
934 |
+
R.
|
935 |
+
Redmer,
|
936 |
+
and
|
937 |
+
S. B. Trickey, eds., Frontiers and Challenges in Warm
|
938 |
+
Dense Matter (Springer Cham, Heidelberg, New York,
|
939 |
+
Dordrecht, London, 2014).
|
940 |
+
[17] C. Hayashi, R. Hoshi,
|
941 |
+
and D. Sugimoto, Progress of
|
942 |
+
Theoretical Physics Supplements 22, 1 (1962).
|
943 |
+
[18] D. B. Boercker, The Astrophysical Journal 316, L95
|
944 |
+
(1987).
|
945 |
+
[19] W. D. Watson, The Astrophysical Journal 158, 303
|
946 |
+
(1969).
|
947 |
+
[20] I. Hubeny and D. Mihalas, Theory of stellar atmospheres:
|
948 |
+
An introduction to astrophysical non-equilibrium quanti-
|
949 |
+
tative spectroscopic analysis (Princeton University Press,
|
950 |
+
2014).
|
951 |
+
[21] D. D. Clayton, Principles of Stellar Evolution and
|
952 |
+
Nucleosynthesis
|
953 |
+
(The
|
954 |
+
University
|
955 |
+
of
|
956 |
+
Chicago
|
957 |
+
Press,
|
958 |
+
Chicago and London, 1983).
|
959 |
+
[22] H. A. Kramers, Philosophical Magazine 46, 836 (1923).
|
960 |
+
[23] J. A. Gaunt, Philosophical Transactions of the Royal
|
961 |
+
Society A 229, 163 (1930).
|
962 |
+
[24] J. Meyer-ter Vehn and R. Ramis, Physics of Plasmas 26,
|
963 |
+
113301 (2019).
|
964 |
+
[25] D. O. Gericke, M. S. Murillo, and M. Schlanges, Physical
|
965 |
+
Review E 65, 036418 (2002).
|
966 |
+
[26] A. Grinenko and D. O. Gericke, Physical Review Letters
|
967 |
+
103, 065005 (2009).
|
968 |
+
[27] A. Wierling, T. Millat, G. Röpke,
|
969 |
+
and R. Redmer,
|
970 |
+
Physics of Plasmas 8, 3810 (2001).
|
971 |
+
[28] C. E. Starrett, High Energy Density Physics 25, 8 (2017).
|
972 |
+
[29] M.
|
973 |
+
Bethkenhagen,
|
974 |
+
B.
|
975 |
+
B.
|
976 |
+
L.
|
977 |
+
Witte,
|
978 |
+
M.
|
979 |
+
Schörner,
|
980 |
+
G. Röpke, T. Döppner, D. Kraus, S. H. Glenzer, P. A.
|
981 |
+
Sterne,
|
982 |
+
and R. Redmer, Physical Review Research 2,
|
983 |
+
023260 (2020).
|
984 |
+
[30] P. A. M. van Hoof,
|
985 |
+
R. J. R. Williams,
|
986 |
+
K. Volk,
|
987 |
+
M. Chatzikos, G. J. Ferland, M. Lykins, R. L. Porter,
|
988 |
+
and Y. Wang, Monthly Notices of the Royal Astronomical
|
989 |
+
Society 444, 420 (2014).
|
990 |
+
[31] P. A. M. van Hoof, G. J. Ferland, R. J. R. Williams,
|
991 |
+
K. Volk, M. Chatzikos, M. Lykins,
|
992 |
+
and R. L. Porter,
|
993 |
+
Monthly Notices of the Royal Astronomical Society 449,
|
994 |
+
2112 (2015).
|
995 |
+
[32] A. Becker, W. Lorenzen, J. J. Fortney, N. Nettelmann,
|
996 |
+
M. Schöttler,
|
997 |
+
and R. Redmer, Astrophysical Journal
|
998 |
+
Supplement Series 215, 21 (2014).
|
999 |
+
[33] A. Becker, M. Bethkenhagen, C. Kellermann, J. Wicht,
|
1000 |
+
and R. Redmer, Astron. J. 156, 149 (2018).
|
1001 |
+
[34] B. Holst, M. French, and R. Redmer, Phys. Rev. B 83,
|
1002 |
+
235120 (2011).
|
1003 |
+
[35] G. Kresse and J. Hafner, Physical Review B 47, 558
|
1004 |
+
(1993).
|
1005 |
+
[36] G. Kresse and J. Hafner, Physical Review B 49, 14251
|
1006 |
+
(1994).
|
1007 |
+
[37] G. Kresse and J. Furthmüller, Computational Materials
|
1008 |
+
Science 6, 15 (1996).
|
1009 |
+
[38] G. Kresse and J. Furthmüller, Phys. Rev. B 54, 11169
|
1010 |
+
(1996).
|
1011 |
+
[39] A. Baldereschi, Physical Review B 7, 5212 (1973).
|
1012 |
+
[40] S. Nosé, J. Chem. Phys. 81, 511 (1984).
|
1013 |
+
[41] R. Kubo, J. Phys. Soc. Jpn. 12, 570 (1957).
|
1014 |
+
[42] D. A. Greenwood, Proc. Phys. Soc. 71, 585 (1958).
|
1015 |
+
[43] C. E. Starrett and D. Saumon, Physical Review E 87,
|
1016 |
+
013104 (2013).
|
1017 |
+
[44] C. E. Starrett, J. Daligault,
|
1018 |
+
and D. Saumon, Physical
|
1019 |
+
Review E 91, 013104 (2015).
|
1020 |
+
[45] C. E. Starrett and D. Saumon, Physical Review E 93,
|
1021 |
+
063206 (2016).
|
1022 |
+
[46] N. Shaffer, N. Ferris, J. Colgan, D. Kilcrease,
|
1023 |
+
and
|
1024 |
+
C. Starrett, High Energy Density Physics 23, 31 (2017).
|
1025 |
+
[47] W. J. Karzas and R. Latter, The Astrophysical Journal
|
1026 |
+
Supplement Series 6, 167 (1961).
|
1027 |
+
[48] A. M. Serenelli, W. C. Haxton,
|
1028 |
+
and C. Peña Garay,
|
1029 |
+
Astrophysical Journal 743, 24 (2011).
|
1030 |
+
[49] E. I. Moses, R. N. Boyd, B. A. Remington, C. J. Keane,
|
1031 |
+
and R. Al-Ayat, Physics of Plasmas 16, 041006 (2009).
|
1032 |
+
[50] A. L. Kritcher, D. C. Swift, T. Döppner, B. Bachmann,
|
1033 |
+
L. X. Benedict, G. W. Collins, J. L. DuBois, F. Elsner,
|
1034 |
+
G. Fontaine, J. A. Gaffney, S. Hamel, A. Lazicki, W. R.
|
1035 |
+
Johnson, N. Kostinski, D. Kraus, M. J. MacDonald,
|
1036 |
+
B. Maddox, M. E. Martin, P. Neumayer, A. Nikroo,
|
1037 |
+
J. Nilsen, B. A. Remington, D. Saumon, P. A. Sterne,
|
1038 |
+
W. Sweet, A. A. Correa, H. D. Whitley, R. W. Falcone,
|
1039 |
+
and S. H. Glenzer, Nature 584, 51 (2020).
|
1040 |
+
[51] D. Kraus, T. Döppner, A. L. Kritcher, A. Yi, K. Boehm,
|
1041 |
+
B. Bachmann, L. Divol, L. B. Fletcher, S. H. Glenzer,
|
1042 |
+
O. L. Landen, N. Masters, A. M. Saunders, C. Weber,
|
1043 |
+
R. W. Falcone,
|
1044 |
+
and P. Neumayer, J. Phys. Conf. Ser.
|
1045 |
+
|
1046 |
+
10
|
1047 |
+
717, 012067 (2016).
|
1048 |
+
[52] G. N. Hall, C. M. Krauland, M. S. Schollmeier, G. E.
|
1049 |
+
Kemp, J. G. Buscho, R. Hibbard, N. Thompson, E. R.
|
1050 |
+
Casco, M. J. Ayers, S. L. Ayers, N. B. Meezan, L. F. B.
|
1051 |
+
Hopkins, R. Nora, B. A. Hammel, L. Masse, J. E. Field,
|
1052 |
+
D. K. Bradley, P. Bell, O. L. Landen, J. D. Kilkenny,
|
1053 |
+
D. Mariscal, J. Park, T. J. McCarville, R. Lowe-Webb,
|
1054 |
+
D. Kalantar, T. Kohut,
|
1055 |
+
and K. Piston, Review of
|
1056 |
+
Scientific Instruments 90, 013702 (2019).
|
1057 |
+
[53] K. Engelhorn, T. J. Hilsabeck, J. Kilkenny, D. Morris,
|
1058 |
+
T. M. Chung, A. Dymoke-Bradshaw, J. D. Hares, P. Bell,
|
1059 |
+
D. Bradley, A. C. Carpenter, M. Dayton, S. R. Nagel,
|
1060 |
+
L. Claus, J. Porter, G. Rochau, M. Sanchez, S. Ivancic,
|
1061 |
+
C. Sorce,
|
1062 |
+
and W. Theobald, Review of Scientific
|
1063 |
+
Instruments 89, 10g123 (2018).
|
1064 |
+
[54] A. B. Zylstra,
|
1065 |
+
S. MacLaren,
|
1066 |
+
S. A. Yi,
|
1067 |
+
J. Kline,
|
1068 |
+
D. Callahan, O. Hurricane, B. Bachmann, G. Kyrala,
|
1069 |
+
L. Masse, P. Patel, J. E. Ralph, J. Salmonson, P. Volegov,
|
1070 |
+
and C. Wilde, Physics of Plasmas 26, 052707 (2019).
|
1071 |
+
[55] A. L. Kritcher, D. Clark, S. Haan, S. A. Yi, A. B. Zylstra,
|
1072 |
+
D. A. Callahan, D. E. Hinkel, L. F. Berzak Hopkins, O. A.
|
1073 |
+
Hurricane, O. L. Landen, S. A. MacLaren, N. B. Meezan,
|
1074 |
+
P. K. Patel, J. Ralph, C. A. Thomas, R. Town, and M. J.
|
1075 |
+
Edwards, Phys. Plasmas 25, 056309 (2018).
|
1076 |
+
[56] A. B. Zylstra, O. A. Hurricane, D. A. Callahan, A. L.
|
1077 |
+
Kritcher,
|
1078 |
+
J. E. Ralph,
|
1079 |
+
H. F. Robey,
|
1080 |
+
J. S. Ross,
|
1081 |
+
C. V. Young, K. L. Baker, D. T. Casey, T. Döppner,
|
1082 |
+
L. Divol, M. Hohenberger, S. Le Pape, A. Pak, P. K.
|
1083 |
+
Patel, R. Tommasini, S. J. Ali, P. A. Amendt, L. J.
|
1084 |
+
Atherton, B. Bachmann, D. Bailey, L. R. Benedetti,
|
1085 |
+
L. Berzak Hopkins, R. Betti, S. D. Bhandarkar, J. Biener,
|
1086 |
+
R. M. Bionta,
|
1087 |
+
N. W. Birge,
|
1088 |
+
E. J. Bond,
|
1089 |
+
D. K.
|
1090 |
+
Bradley,
|
1091 |
+
T. Braun,
|
1092 |
+
T. M. Briggs,
|
1093 |
+
M. W. Bruhn,
|
1094 |
+
P. M. Celliers,
|
1095 |
+
B. Chang,
|
1096 |
+
T. Chapman,
|
1097 |
+
H. Chen,
|
1098 |
+
C. Choate, A. R. Christopherson, D. S. Clark, J. W.
|
1099 |
+
Crippen, E. L. Dewald, T. R. Dittrich, M. J. Edwards,
|
1100 |
+
W. A. Farmer, J. E. Field, D. Fittinghoff, J. Frenje,
|
1101 |
+
J. Gaffney, M. Gatu Johnson, S. H. Glenzer, G. P.
|
1102 |
+
Grim, S. Haan, K. D. Hahn, G. N. Hall, B. A. Hammel,
|
1103 |
+
J. Harte, E. Hartouni, J. E. Heebner, V. J. Hernandez,
|
1104 |
+
H. Herrmann, M. C. Herrmann, D. E. Hinkel, D. D.
|
1105 |
+
Ho, J. P. Holder, W. W. Hsing, H. Huang, K. D.
|
1106 |
+
Humbird, N. Izumi, L. C. Jarrott, J. Jeet, O. Jones, G. D.
|
1107 |
+
Kerbel, S. M. Kerr, S. F. Khan, J. Kilkenny, Y. Kim,
|
1108 |
+
H. Geppert Kleinrath, V. Geppert Kleinrath, C. Kong,
|
1109 |
+
J. M. Koning, J. J. Kroll, M. K. G. Kruse, B. Kustowski,
|
1110 |
+
O. L. Landen, S. Langer, D. Larson, N. C. Lemos,
|
1111 |
+
J. D. Lindl, T. Ma, M. J. MacDonald, B. J. MacGowan,
|
1112 |
+
A. J. Mackinnon, S. A. MacLaren, A. G. MacPhee,
|
1113 |
+
M. M. Marinak, D. A. Mariscal, E. V. Marley, L. Masse,
|
1114 |
+
K. Meaney, N. B. Meezan, P. A. Michel, M. Millot, J. L.
|
1115 |
+
Milovich, J. D. Moody, A. S. Moore, J. W. Morton,
|
1116 |
+
T. Murphy, K. Newman, J.-M. G. Di Nicola, A. Nikroo,
|
1117 |
+
R. Nora, M. V. Patel, L. J. Pelz, J. L. Peterson, Y. Ping,
|
1118 |
+
B. B. Pollock, M. Ratledge, N. G. Rice, H. Rinderknecht,
|
1119 |
+
M. Rosen, M. S. Rubery, J. D. Salmonson, J. Sater,
|
1120 |
+
S. Schiaffino, D. J. Schlossberg, M. B. Schneider, C. R.
|
1121 |
+
Schroeder, H. A. Scott, S. M. Sepke, K. Sequoia, M. W.
|
1122 |
+
Sherlock, S. Shin, V. A. Smalyuk, B. K. Spears, P. T.
|
1123 |
+
Springer, M. Stadermann, S. Stoupin, D. J. Strozzi, L. J.
|
1124 |
+
Suter, C. A. Thomas, R. P. J. Town, E. R. Tubman,
|
1125 |
+
C. Trosseille, P. L. Volegov, C. R. Weber, K. Widmann,
|
1126 |
+
C. Wild, C. H. Wilde, B. M. Van Wonterghem, D. T.
|
1127 |
+
Woods, B. N. Woodworth, M. Yamaguchi, S. T. Yang,
|
1128 |
+
and G. B. Zimmerman, Nature 601, 542 (2022).
|
1129 |
+
[57] K. Hanson, Lect. Notes in Pure and Appl. Math. 115,
|
1130 |
+
363 (1989).
|
1131 |
+
[58] M. Howard, M. Fowler, A. Luttman, S. E. Mitchell, and
|
1132 |
+
M. C. Hock, SIAM Journal on Scientific Computing 38,
|
1133 |
+
B396 (2016).
|
1134 |
+
[59] M. M. Marinak, G. D. Kerbel, N. A. Gentile, O. Jones,
|
1135 |
+
D. Munro, S. Pollaine, T. R. Dittrich, and S. W. Haan,
|
1136 |
+
Physics of Plasmas 8, 2275 (2001).
|
1137 |
+
[60] S. H. Glenzer,
|
1138 |
+
D. A. Callahan,
|
1139 |
+
A. J. MacKinnon,
|
1140 |
+
J. L. Kline, G. Grim, E. T. Alger, R. L. Berger,
|
1141 |
+
L.
|
1142 |
+
A.
|
1143 |
+
Bernstein,
|
1144 |
+
R.
|
1145 |
+
Betti,
|
1146 |
+
D.
|
1147 |
+
L.
|
1148 |
+
Bleuel,
|
1149 |
+
T.
|
1150 |
+
R.
|
1151 |
+
Boehly,
|
1152 |
+
D. K. Bradley,
|
1153 |
+
S. C. Burkhart,
|
1154 |
+
R. Burr,
|
1155 |
+
J. A. Caggiano, C. Castro, D. T. Casey, C. Choate,
|
1156 |
+
D. S. Clark, P. Celliers, C. J. Cerjan, G. W. Collins,
|
1157 |
+
E. L. Dewald, P. DiNicola, J. M. DiNicola, L. Divol,
|
1158 |
+
S. Dixit, T. Döppner, R. Dylla-Spears, E. Dzenitis,
|
1159 |
+
M. Eckart, G. Erbert, D. Farley, J. Fair, D. Fittinghoff,
|
1160 |
+
M. Frank, L. J. A. Frenje, S. Friedrich, D. T. Casey,
|
1161 |
+
M. Gatu Johnson, C. Gibson, E. Giraldez, V. Glebov,
|
1162 |
+
S. Glenn, N. Guler, S. W. Haan, B. J. Haid, B. A.
|
1163 |
+
Hammel, A. V. Hamza, C. A. Haynam, G. M. Heestand,
|
1164 |
+
M. Hermann, H. W. Hermann, D. G. Hicks, D. E. Hinkel,
|
1165 |
+
J. P. Holder, D. M. Holunda, J. B. Horner, W. W.
|
1166 |
+
Hsing, H. Huang, N. Izumi, M. Jackson, O. S. Jones,
|
1167 |
+
D. H. Kalantar, R. Kauffman, J. D. Kilkenny, R. K.
|
1168 |
+
Kirkwood, J. Klingmann, T. Kohut, J. P. Knauer, J. A.
|
1169 |
+
Koch, B. Kozioziemki, G. A. Kyrala, A. L. Kritcher,
|
1170 |
+
J. Kroll, K. La Fortune, L. Lagin, O. L. Landen, D. W.
|
1171 |
+
Larson, D. LaTray, R. J. Leeper, S. Le Pape, J. D. Lindl,
|
1172 |
+
R. Lowe-Webb, T. Ma, J. McNaney, A. G. MacPhee,
|
1173 |
+
T. N. Malsbury, E. Mapoles, C. D. Marshall, N. B.
|
1174 |
+
Meezan, F. Merrill, P. Michel, J. D. Moody, A. S.
|
1175 |
+
Moore, M. Moran, K. A. Moreno, D. H. Munro, B. R.
|
1176 |
+
Nathan, A. Nikroo, R. E. Olson, C. D. Orth, A. E.
|
1177 |
+
Pak, P. K. Patel, T. Parham, R. Petrasso, J. E. Ralph,
|
1178 |
+
H. Rinderknecht, S. P. Regan, H. F. Robey, J. S. Ross,
|
1179 |
+
M. D. Rosen, R. Sacks, J. D. Salmonson, R. Saunders,
|
1180 |
+
J. Sater, C. Sangster, M. B. Schneider, F. H. Séguin,
|
1181 |
+
M. J. Shaw, B. K. Spears, P. T. Springer, W. Stoeffl,
|
1182 |
+
L. J. Suter, C. A. Thomas, R. Tommasini, R. P. J. Town,
|
1183 |
+
C. Walters, S. Weaver, S. V. Weber, P. J. Wegner, P. K.
|
1184 |
+
Whitman, K. Widmann, C. C. Widmayer, C. H. Wilde,
|
1185 |
+
D. C. Wilson, B. Van Wonterghem, B. J. MacGowan,
|
1186 |
+
L. J. Atherton, M. J. Edwards, and E. I. Moses, Physics
|
1187 |
+
of Plasmas 19, 056318 (2012).
|
1188 |
+
[61] A. J. Martin, R. J. Simms,
|
1189 |
+
and R. B. Jacobs, Journal
|
1190 |
+
of Vacuum Science & Technology A: Vacuum, Surfaces,
|
1191 |
+
and Films 6, 1885 (1988).
|
1192 |
+
[62] M. T. Mruzek, D. L. Musinski, and J. S. Ankney, Journal
|
1193 |
+
of Applied Physics 63, 2217 (1988).
|
1194 |
+
[63] S. H. Glenzer and R. Redmer, Reviews of Modern Physics
|
1195 |
+
81, 1625 (2009).
|
1196 |
+
[64] G. Dimonte, Physics of Plasmas 7, 2255 (2000).
|
1197 |
+
[65] B. Bachmann, S. A. MacLaren, S. Bhandarkar, T. Briggs,
|
1198 |
+
D.
|
1199 |
+
Casey,
|
1200 |
+
L.
|
1201 |
+
Divol,
|
1202 |
+
T.
|
1203 |
+
Döppner,
|
1204 |
+
D.
|
1205 |
+
Fittinghoff,
|
1206 |
+
M.
|
1207 |
+
Freeman,
|
1208 |
+
S.
|
1209 |
+
Haan,
|
1210 |
+
G.
|
1211 |
+
Hall,
|
1212 |
+
B.
|
1213 |
+
Hammel,
|
1214 |
+
E. Hartouni, N. Izumi, V. Geppert-Kleinrath, S. Khan,
|
1215 |
+
B. Kozioziemski, C. Krauland, O. Landen, D. Mariscal,
|
1216 |
+
E. Marley, L. Masse, K. Meaney, A. Moore, A. Pak,
|
1217 |
+
P. Patel, M. Ratledge, N. Rice, M. Rubery, J. Salmonson,
|
1218 |
+
J. Sater, D. Schlossberg, M. Schneider, V. A. Smalyuk,
|
1219 |
+
C. Trosseille, P. Volegov, C. Weber, J. Williams,
|
1220 |
+
and
|
1221 |
+
A. Wray, submitted (2022).
|
1222 |
+
|
1223 |
+
11
|
1224 |
+
[66] D. A. Verner and D. G. Yakovlev, Astronomy and
|
1225 |
+
Astrophysics Supplement Series 109, 125 (1995).
|
1226 |
+
[67] S. Atzeni and J. Meyer-ter Vehn, eds., The Physics of
|
1227 |
+
Inertial Fusion (Clarendon Press, Oxford, 2004).
|
1228 |
+
[68] F. J. Rogers and A. Nayfonov, The Astrophysical Journal
|
1229 |
+
576, 1064 (2002).
|
1230 |
+
[69] D. Saumon, G. Chabrier,
|
1231 |
+
and H. M. van Horn, The
|
1232 |
+
Astrophysical Journal Supplement Series 99, 713 (1995).
|
1233 |
+
[70] A. W. Irwin, “The FreeEOS code for calculating the
|
1234 |
+
equation of state for stellar interiors,” (2004).
|
1235 |
+
[71] F. X. Timmes and F. D. Swesty, The Astrophysical
|
1236 |
+
Journal Supplement Series 126, 501 (2000).
|
1237 |
+
[72] A. Y. Potekhin and G. Chabrier, Contributions to
|
1238 |
+
Plasma Physics 50, 82 (2010).
|
1239 |
+
[73] C. A. Iglesias and F. J. Rogers, The Astrophysical
|
1240 |
+
Journal 412, 752 (1993).
|
1241 |
+
[74] C. A. Iglesias and F. J. Rogers, The Astrophysical
|
1242 |
+
Journal 464, 943 (1996).
|
1243 |
+
[75] J. W. Ferguson, D. R. Alexander, F. Allard, T. Barman,
|
1244 |
+
J. G. Bodnarik, P. H. Hauschildt, A. Heffner-Wong, and
|
1245 |
+
A. Tamanai, The Astrophysical Journal 623, 585 (2005).
|
1246 |
+
[76] J. R. Buchler and W. R. Yueh, The Astrophysical Journal
|
1247 |
+
210, 440 (1976).
|
1248 |
+
[77] S. Cassisi, A. Y. Potekhin, A. Pietrinferni, M. Catelan,
|
1249 |
+
and M. Salaris, The Astrophysical Journal 661, 1094
|
1250 |
+
(2007).
|
1251 |
+
[78] R. H. Cyburt, A. M. Amthor, R. Ferguson, Z. Meisel,
|
1252 |
+
K. Smith,
|
1253 |
+
S. Warren,
|
1254 |
+
A. Heger,
|
1255 |
+
R. D. Hoffman,
|
1256 |
+
T. Rauscher, A. Sakharuk, H. Schatz, F. K. Thielemann,
|
1257 |
+
and M. Wiescher, The Astrophysical Journal Supplement
|
1258 |
+
Series 189, 240 (2010).
|
1259 |
+
[79] G. M. Fuller, W. A. Fowler,
|
1260 |
+
and M. J. Newman, The
|
1261 |
+
Astrophysical Journal 293, 1 (1985).
|
1262 |
+
[80] T. Oda, M. Hino, K. Muto, M. Takahara, and K. Sato,
|
1263 |
+
Atomic Data and Nuclear Data Tables 56, 231 (1994).
|
1264 |
+
[81] K. Langanke and G. Martínez-Pinedo, Nuclear Physics
|
1265 |
+
A 673, 481 (2000).
|
1266 |
+
[82] A. I. Chugunov, H. E. Dewitt,
|
1267 |
+
and D. G. Yakovlev,
|
1268 |
+
Physical Review D 76, 025028 (2007).
|
1269 |
+
[83] N. Itoh, H. Hayashi, A. Nishikawa,
|
1270 |
+
and Y. Kohyama,
|
1271 |
+
The Astrophysical Journal Supplement Series 102, 411
|
1272 |
+
(1996).
|
1273 |
+
[84] N. Grevesse and A. J. Sauval, Space Science Reviews 85,
|
1274 |
+
161 (1998).
|
1275 |
+
[85] C. Hansen,
|
1276 |
+
S. Kawaler,
|
1277 |
+
and V. Trimble, Stellar
|
1278 |
+
Interiors: Physical Principles, Structure, and Evolution,
|
1279 |
+
Astronomy and Astrophysics Library (Springer New
|
1280 |
+
York, 2004).
|
1281 |
+
[86] L. Mestel, Mathematical Proceedings of the Cambridge
|
1282 |
+
Philosophical Society 46, 331 (1950).
|
1283 |
+
[87] T. D. Lee, The Astrophysical Journal 111, 625 (1950).
|
1284 |
+
|
19FAT4oBgHgl3EQfkR2N/content/tmp_files/load_file.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
1dAzT4oBgHgl3EQfRfuL/content/2301.01217v1.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:eaf060e6bbbe047d158937323204b8227f55c6c9c8afa89bce6e446ab6bed709
|
3 |
+
size 1257432
|
1dAzT4oBgHgl3EQfRfuL/vector_store/index.faiss
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:f46a98e5a5b9a5433f7298c2c62f13c0847b1e1cd7d595f91613db6b3f12d08a
|
3 |
+
size 3211309
|
1dAzT4oBgHgl3EQfRfuL/vector_store/index.pkl
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:e1126aed6c3c7bf7ef5d49949ed5281e2c255f6682ac71ce44995c435ccf7795
|
3 |
+
size 125118
|
29E1T4oBgHgl3EQf5wUG/content/2301.03514v1.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:c210ac11556216d3310828e94044130ff2845027612479b55e0ced6b3f65e037
|
3 |
+
size 515253
|
29E1T4oBgHgl3EQf5wUG/vector_store/index.pkl
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:70e2d0cedfd091cab91f624c8bf91cef27a2b0ef26c95401367bdbca96bebfb0
|
3 |
+
size 124722
|
2dFAT4oBgHgl3EQfDhxB/content/2301.08416v1.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:b4e49ed0fcd8cbc68b1ec7260e4e205bb33b4d983783e0b47b52f34c36f310be
|
3 |
+
size 1308603
|
2dFAT4oBgHgl3EQfDhxB/vector_store/index.faiss
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:472eeac83328726ee5e0e9275323be9e06f1aeb44a169620c8f4e559c06963b8
|
3 |
+
size 2752557
|
2tAzT4oBgHgl3EQf9P4T/content/tmp_files/2301.01915v1.pdf.txt
ADDED
@@ -0,0 +1,1992 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
arXiv:2301.01915v1 [cs.IT] 5 Jan 2023
|
2 |
+
CHINA COMMUNICATIONS
|
3 |
+
Sum-Rate Maximization in Active RIS-Assisted Multi-Antenna
|
4 |
+
WPCN
|
5 |
+
Jie Jiang, Bin Lyu, Pengcheng Chen, and Zhen Yang
|
6 |
+
School of Communications and Information Engineering, Nanjing University of Posts and Telecommunications, Nanjing 210003, China
|
7 |
+
Abstract:
|
8 |
+
In this paper, we propose an active re-
|
9 |
+
configurable intelligent surface (RIS) enabled hybrid
|
10 |
+
relaying scheme for a multi-antenna wireless pow-
|
11 |
+
ered communication network (WPCN), where the ac-
|
12 |
+
tive RIS is employed to assist both wireless energy
|
13 |
+
transfer (WET) from the power station (PS) to energy-
|
14 |
+
constrained users and wireless information transmis-
|
15 |
+
sion (WIT) from users to the receiving station (RS).
|
16 |
+
For further performance enhancement, we propose to
|
17 |
+
employ both transmit beamforming at the PS and re-
|
18 |
+
ceive beamforming at the RS. We formulate a sum-
|
19 |
+
rate maximization problem by jointly optimizing the
|
20 |
+
RIS phase shifts and amplitude reflection coefficients
|
21 |
+
for both the WET and the WIT, transmit and receive
|
22 |
+
beamforming vectors, and network resource alloca-
|
23 |
+
tion. To solve this non-convex problem, we propose an
|
24 |
+
efficient alternating optimization algorithm with linear
|
25 |
+
minimum mean squared error criterion, semi-definite
|
26 |
+
relaxation (SDR) and successive convex approxima-
|
27 |
+
tion techniques. Specifically, the tightness of apply-
|
28 |
+
ing the SDR is proved.
|
29 |
+
Simulation results demon-
|
30 |
+
strate that our proposed scheme with 10 reflecting el-
|
31 |
+
ements (REs) and 4 antennas can achieve 17.78% and
|
32 |
+
415.48% performance gains compared to the single-
|
33 |
+
antenna scheme with 10 REs and passive RIS scheme
|
34 |
+
with 100 REs, respectively.
|
35 |
+
Keywords: Wireless powered communication net-
|
36 |
+
work, active reconfigurable intelligent surface, beam-
|
37 |
+
forming, sum-rate maximization.
|
38 |
+
Received: XX
|
39 |
+
Revised: XX
|
40 |
+
Editor: XX
|
41 |
+
I. INTRODUCTION
|
42 |
+
With the development of the Internet-of-Things (IoT),
|
43 |
+
an intelligent society with ubiquitous interconnections
|
44 |
+
and deep coverage will be truly realized. However,
|
45 |
+
wireless devices (WDs) in IoT networks are generally
|
46 |
+
energy-constrained and suffer from limited lifetime
|
47 |
+
[1], which fundamentally limits the performance of
|
48 |
+
communication networks. Traditional ways of chang-
|
49 |
+
ing or recharging the batteries manually are impossi-
|
50 |
+
ble and unacceptable, especially when the number of
|
51 |
+
WDs is numerous. Therefore, how to tackle this issue
|
52 |
+
is a critical problem in the widespread development of
|
53 |
+
IoT. Wireless powered communication has been pro-
|
54 |
+
posed as a prospective technology for enhancing the
|
55 |
+
energy sustainability of WDs, which can be classified
|
56 |
+
into two directions based on application scenarios [2–
|
57 |
+
4]. The first one focuses on investigating simultane-
|
58 |
+
ous wireless information and power transfer (SWIPT),
|
59 |
+
where the base station (BS) simultaneously transfers
|
60 |
+
energy and information signals to energy receivers
|
61 |
+
and information receivers via the common radio fre-
|
62 |
+
quency (RF) signals in the downlink (DL), resulting
|
63 |
+
in a pivotal tradeoff between the achievable rate and
|
64 |
+
harvested energy [5]. In contrast to the SWIPT, wire-
|
65 |
+
less powered communication network (WPCN) has
|
66 |
+
been proposed as a novel type of wireless network di-
|
67 |
+
agram to improve the lifetime of WDs and enhance
|
68 |
+
the deployment flexibility of IoT. In a WPCN, energy-
|
69 |
+
constrained WDs first harvest energy in the DL and
|
70 |
+
then use the harvested energy to transmit independent
|
71 |
+
information in the uplink (UL) based on the widely
|
72 |
+
used harvest-then-transmit (HTT) protocol [6].
|
73 |
+
WPCN has been widely investigated in the literature
|
74 |
+
China Communications
|
75 |
+
1
|
76 |
+
|
77 |
+
[6–9], which promotes the development of WPCN.
|
78 |
+
However, WPCN generally suffers from the “doubly
|
79 |
+
near-far” phenomenon if the power station (PS) and
|
80 |
+
the receiving station (RS) are co-located at the hybrid
|
81 |
+
access point (HAP) [6, 8]. Specifically, a WD located
|
82 |
+
far away from the HAP harvesting less energy in the
|
83 |
+
DL has to transmit information with more power in
|
84 |
+
the UL, which results in an unfair time and resource
|
85 |
+
allocation among the WDs. To deal with the issue, a
|
86 |
+
promising way is to deploy the PS and RS separately
|
87 |
+
[10, 11]. In [10], multiple users harvest energy from a
|
88 |
+
dedicated PS and then communicate with an informa-
|
89 |
+
tion RS following the HTT protocol. In this scenario,
|
90 |
+
a user physically close to the PS is naturally far away
|
91 |
+
from the RS, and vice versa. Considering a similar
|
92 |
+
scenario, a user-centric energy-efficient (EE) problem
|
93 |
+
in WPCN is investigated in [11]. However, the perfor-
|
94 |
+
mance of WPCN is still limited due to the low efficien-
|
95 |
+
cies caused by the severe path-loss, which seriously
|
96 |
+
affects its practical applications.
|
97 |
+
Recently, reconfigurable intelligent surface (RIS),
|
98 |
+
with the unprecedented ability to reshape the wireless
|
99 |
+
transmission environment, has drawn widespread at-
|
100 |
+
tentions from academia and industry [12–18]. RIS is
|
101 |
+
comprised of a large number of programmable reflect-
|
102 |
+
ing elements (REs), which can alter the phase shifts
|
103 |
+
and amplitudes of incident signals. As such, RIS can
|
104 |
+
adaptively modify the impinging radio waves towards
|
105 |
+
the appropriate direction [13]. According to the re-
|
106 |
+
flection patterns, RIS can be classified as passive RIS
|
107 |
+
and active RIS. Without the property of power amplifi-
|
108 |
+
cation, the independent diffusive scatterer-based (IDS)
|
109 |
+
model accounts for the basic properties of passive RIS,
|
110 |
+
which has been widely adopted in RIS-assisted wire-
|
111 |
+
less communications [18]. The passive RIS is only
|
112 |
+
equipped with the phase-shift controller, while the ac-
|
113 |
+
tive RIS contains both the phase-shift controller and
|
114 |
+
the active reflection-type amplifier. Hence, the active
|
115 |
+
RIS can alter both the phase shifts and amplitudes of
|
116 |
+
the incident signals. It is worth noting that the active
|
117 |
+
RIS with its novel hardware structure and signal model
|
118 |
+
has been proposed in [19, 20].
|
119 |
+
Different from the
|
120 |
+
full-duplex amplify-and-forward (FD-AF) relay that
|
121 |
+
requires power-consuming RF chains, the active RIS
|
122 |
+
can directly reflect and amplify the incident signals in
|
123 |
+
the EM level in a FD manner without reception. In this
|
124 |
+
way, the active RIS exhibits promising qualities, such
|
125 |
+
as a low power consumption, light weight, conformal
|
126 |
+
geometry and high flexibility for practical deployment.
|
127 |
+
Currently, the passive RIS has been widely applied
|
128 |
+
in WPCNs for performance enhancement [21–24]. In
|
129 |
+
[21], the passive RIS is employed between the HAP
|
130 |
+
and users to improve both DL WET and UL WIT effi-
|
131 |
+
ciencies in single-input-single-output (SISO) WPCN.
|
132 |
+
To achieve further performance improvement, the
|
133 |
+
multi-antenna technique is employed in [22], where
|
134 |
+
the HAP with multi-antenna transmits energy signals
|
135 |
+
to users in the DL and receives information from users
|
136 |
+
in the UL by employing transmit bemforming and re-
|
137 |
+
ceive beamforming, respectively.
|
138 |
+
In [23], the fully
|
139 |
+
dynamic RIS beamforming scheme is proposed for
|
140 |
+
WPCN, for which the phase shift vectors are indepen-
|
141 |
+
dently designed over different time slots. However,
|
142 |
+
in the above works [21–23], the PS and RS are also
|
143 |
+
co-located at the HAP, which results in performance
|
144 |
+
unfair among users.
|
145 |
+
To address this issue, the au-
|
146 |
+
thors in [24] consider the scenario where the PS and
|
147 |
+
RS are separately deployed, for which the locations of
|
148 |
+
RIS and users can be carefully considered to achieve a
|
149 |
+
fair performance among users. However, as mentioned
|
150 |
+
above, the passive RIS can only reflect incident signals
|
151 |
+
without amplification, which leads to the limited per-
|
152 |
+
formance enhancement due to the double-fading ef-
|
153 |
+
fect suffered by the reflecting links. Thus, the energy-
|
154 |
+
constrained users still need to consume much time for
|
155 |
+
harvesting energy in the DL and have less time for in-
|
156 |
+
formation transmission.
|
157 |
+
Inspired by the amplification characteristic of the
|
158 |
+
active RIS, the active RIS is confirmed to be superior
|
159 |
+
to the passive RIS in terms of performance enhance-
|
160 |
+
ment, and thus has been considered a promising tech-
|
161 |
+
nique for IoT networks [19, 20, 25–29]. The authors
|
162 |
+
in [19] compare the capacity improvement achieved
|
163 |
+
by the active RIS to the passive RIS, which demon-
|
164 |
+
strats that the active RIS can fundamentally mitigate
|
165 |
+
the double-fading effect. In [20], an active RIS is ap-
|
166 |
+
plied in single input multiple output (SIMO) systems,
|
167 |
+
for which the joint optimization of phase shifts ma-
|
168 |
+
trix and receive beamforming is considered to obtain
|
169 |
+
the maximum achievable rate. In [25], the placement
|
170 |
+
of the active RIS is optimized to enhance SISO sys-
|
171 |
+
tems’ performance. The authors in [26] propose to use
|
172 |
+
the active RIS to achieve secure transmission, which
|
173 |
+
not only establishes the reliable link from the trans-
|
174 |
+
mitter to the receiver but also prevents the confidential
|
175 |
+
information intercepted by the eavesdropper. The ac-
|
176 |
+
2
|
177 |
+
China Communications
|
178 |
+
|
179 |
+
tive RIS-aided multiuser MISO PS-SWIPT is studied
|
180 |
+
in [27] to minimize the base station transmit power,
|
181 |
+
which shows significant improvements compared to
|
182 |
+
the passive RIS-aided system. Similarly, in [28], an
|
183 |
+
active RIS is employed to assist SWIPT to boost the
|
184 |
+
efficiency of both WET and WIT, while the conclu-
|
185 |
+
sions and approaches are inapplicable to the WPCN
|
186 |
+
system because of thire different system models.
|
187 |
+
Although the active RIS has received a lot of inter-
|
188 |
+
ests for wireless communication networks, the appli-
|
189 |
+
cations of active RIS in WPCN is still at the very early
|
190 |
+
stage and has not been well studied in the literature.
|
191 |
+
To the best of our knowledge, there exists only one
|
192 |
+
paper investigating the usage of active RIS in WPCN
|
193 |
+
[29]. Specifically, the authors in [29] investigate the
|
194 |
+
weight sum-rate maximization problem in the active
|
195 |
+
RIS assisted single-antenna WPCN, where the PS and
|
196 |
+
RS is co-located at the HAP. As a result, similar to
|
197 |
+
[21–23], a part of WDs in [29] still suffer from the
|
198 |
+
“doubly near-far” phenomenon, which is not suitable
|
199 |
+
for practical applications with high requirement of per-
|
200 |
+
formance fairness. Moreover, the authors consider a
|
201 |
+
certain simplified communication scenario where both
|
202 |
+
the HAP and the WDs have single antenna each. The
|
203 |
+
transmit beamforming and receive beamforming can-
|
204 |
+
not be exploited, which is also a key technology for
|
205 |
+
performance enhancement.
|
206 |
+
Motivated by the observations above, we propose
|
207 |
+
an active RIS enabled hybrid relaying scheme for the
|
208 |
+
multi-antenna WPCN, where the active RIS is em-
|
209 |
+
ployed to facilitate both the WET from the PS to
|
210 |
+
energy-constrained users and the WIT from users to
|
211 |
+
the RS, which is shown in Figure 1. Compared with
|
212 |
+
the existing works which used the passive RIS in
|
213 |
+
WPCN [21–24], our proposed active RIS scheme can
|
214 |
+
amplify the energy signals and information signals to
|
215 |
+
achieve a satisfying system performance.
|
216 |
+
Different
|
217 |
+
from the single-antenna scenario considered in [29],
|
218 |
+
we propose to employ multi-antenna at both the PS
|
219 |
+
and RS, which can construct the transmit beamform-
|
220 |
+
ing and receive beamforming for further performance
|
221 |
+
enhancement. Specifically, the transmit beamforming
|
222 |
+
at the PS can be used to enhance the WPT efficiency
|
223 |
+
from the PS to users. In the meanwhile, the receive
|
224 |
+
beamforming at the RS can be used to exploit the an-
|
225 |
+
tenna gain and eliminate the noise caused by the ac-
|
226 |
+
tive RIS. In the considered system setup, we aim to
|
227 |
+
maximize the sum-rate problem by jointly optimiz-
|
228 |
+
ing the transmit beamforming at the PS, the receive
|
229 |
+
beamforming at the RS, the reflecting coefficients at
|
230 |
+
the RIS, and network resource allocation. It should
|
231 |
+
be noted that compared to [21–24, 29], our formulated
|
232 |
+
problem is much more challenging to solve and the
|
233 |
+
proposed algorithms in [21–24, 29] cannot be used to
|
234 |
+
solve our formulated problem. Thus, we propose an
|
235 |
+
efficient algorithm to solve the formulated problem.
|
236 |
+
The main contributions of this paper are summarized
|
237 |
+
as follows:
|
238 |
+
• We propose an active RIS assisted multi-antenna
|
239 |
+
WPCN for performance enhancement, where the
|
240 |
+
active RIS is served as a hybrid relay to achieve
|
241 |
+
two purposes, i.e., the first one is to assist the
|
242 |
+
WET from the PS to users, and the second one
|
243 |
+
is to aid the WIT from users to the RS. To fur-
|
244 |
+
ther improve system performance, both trans-
|
245 |
+
mit beamforming and receive beamforming tech-
|
246 |
+
niques are respectively considered at the PS and
|
247 |
+
RS.
|
248 |
+
• We investigate the sum-rate maximization prob-
|
249 |
+
lem by jointly optimizing transmit beamforming
|
250 |
+
vector at the PS, receive beamforming vectors at
|
251 |
+
the RS, phase shifts and amplitude reflection coef-
|
252 |
+
ficients at the RIS for both the WET and the WIT,
|
253 |
+
and network resource allocation. To deal with the
|
254 |
+
non-convexity of the formulated problem, we pro-
|
255 |
+
pose an efficient alternating optimization (AO) al-
|
256 |
+
gorithm. Specifically, the original problem can be
|
257 |
+
divided into four sub-problems, which are solved
|
258 |
+
sequentially in an alternating manner until con-
|
259 |
+
vergence is achieved.
|
260 |
+
• For designing the receive beamforming, we apply
|
261 |
+
the linear minimum mean squared error (MMSE)
|
262 |
+
criterion and obtain the closed-form expression.
|
263 |
+
For the optimization of the transmit beamform-
|
264 |
+
ing and RIS reflecting coefficient matrices for
|
265 |
+
the WET, the semidefinite relaxation (SDR) tech-
|
266 |
+
nique is adopted and the tightness of applying the
|
267 |
+
SDR is proved. For the optimization of RIS re-
|
268 |
+
flecting coefficients for the WIT, we obtain the
|
269 |
+
optimal phase shifts in a closed-form and propose
|
270 |
+
a successive convex approximation (SCA) algo-
|
271 |
+
rithm to determine the optimal amplitude reflec-
|
272 |
+
tion coefficients. In addition, the convergence of
|
273 |
+
proposed problem is analyzed and confirmed via
|
274 |
+
numerical simulations.
|
275 |
+
China Communications
|
276 |
+
3
|
277 |
+
|
278 |
+
• Finally, numerical results are provided to evaluate
|
279 |
+
the performance of proposed scheme, which indi-
|
280 |
+
cates that compared to the single-antenna scheme
|
281 |
+
with 10 REs and the passive-RIS scheme with 100
|
282 |
+
REs, the proposed scheme with 4 antennas and 10
|
283 |
+
REs can achieve 17.78% and 415.48% sum-rate
|
284 |
+
gain, respectively.
|
285 |
+
The rest of this paper is organized as follows. Sec-
|
286 |
+
tion II describes the system model of the active RIS-
|
287 |
+
assisted multi-antenna WPCN. The sum-rate maxi-
|
288 |
+
mization problem is formulated in Section III and
|
289 |
+
solved in Section IV, respectively. In Section V, per-
|
290 |
+
formance is evaluated by numerical results. Finally,
|
291 |
+
this paper is concluded in Section VI.
|
292 |
+
Notations: In this paper, vectors and matrices are
|
293 |
+
denoted by boldface lowercase and uppercase letters,
|
294 |
+
respectively. The operators ( · )T, ( · )H, | · | and ∥ · ∥
|
295 |
+
denote the transpose, conjugate transpose, absolute
|
296 |
+
value and the Euclidean norm, respectively. Tr( · ) and
|
297 |
+
rank( · ) denote the trace and rank of a matrix, respec-
|
298 |
+
tively. X ⪰ 0 represents that X is a positive semidef-
|
299 |
+
inite matrix. E[ · ] stands for the statistical expecta-
|
300 |
+
tion. IN denotes the N-dimensional identity matrix.
|
301 |
+
0 denotes the zero matrix/vector with appropriate size.
|
302 |
+
CN×M denotes the set of all N × M complex-valued
|
303 |
+
matrices. HM denotes the set of all M ×M Hermitian
|
304 |
+
matrices. RN×1 represents the set of all N × 1 real-
|
305 |
+
valued vectors. CN
|
306 |
+
�
|
307 |
+
µ, σ2�
|
308 |
+
denotes the distribution of
|
309 |
+
a circularly symmetric complex Gaussian random vec-
|
310 |
+
tor with mean µ and variance σ2. arg( · ) denotes the
|
311 |
+
phase extraction operation. diag(x) denotes a diago-
|
312 |
+
nal matrix whose diagonal elements are from vector x.
|
313 |
+
Im( · ) and Re( · ) respectively denotes the imaginary
|
314 |
+
part and real part of a complex number.
|
315 |
+
II. SYSTEM MODEL
|
316 |
+
As shown in Figure 1, we consider an active RIS-aided
|
317 |
+
multi-antenna WPCN, which consists of a PS with M
|
318 |
+
antennas, a RS with L antennas, an active RIS, and
|
319 |
+
K energy-constrained users each with single antenna.
|
320 |
+
We assume that each user is equipped with an energy
|
321 |
+
harvesting (EH) circuit for harvesting energy, where
|
322 |
+
a rectifier is used to convert the received RF signals
|
323 |
+
to direct current (DC) signals. Then, the net energy
|
324 |
+
harvested from the DC signals can be stored in the
|
325 |
+
rechargeable battery. The active RIS consists of N
|
326 |
+
active REs, which can steer the reflected signals in
|
327 |
+
��,�
|
328 |
+
�
|
329 |
+
��,�
|
330 |
+
�
|
331 |
+
��,�
|
332 |
+
��,�
|
333 |
+
��
|
334 |
+
��
|
335 |
+
PS
|
336 |
+
RS
|
337 |
+
��
|
338 |
+
Active RIS
|
339 |
+
Energy transfer
|
340 |
+
Information transmission
|
341 |
+
EH circuit
|
342 |
+
Rectifier
|
343 |
+
RF signal
|
344 |
+
Rechargeable
|
345 |
+
battery
|
346 |
+
DC signal
|
347 |
+
Figure 1.
|
348 |
+
System model for an active RIS-assisted multi-
|
349 |
+
antenna WPCN.
|
350 |
+
a specific direction and also amplify them by the ac-
|
351 |
+
tive loads (negative resistance) [20]. In contrast to the
|
352 |
+
passive RE, each active RE is equipped with an addi-
|
353 |
+
tionally integrated active reflection-type amplifier sup-
|
354 |
+
ported by a power supply. By appropriately setting the
|
355 |
+
effective resistance, it is reasonable to assume that the
|
356 |
+
reflection amplitude and phase of each element is inde-
|
357 |
+
pendently [19, 20, 25–29]. To power the operations of
|
358 |
+
active RIS and users, the PS is equipped with a stable
|
359 |
+
energy source. In addition, the PS has the capability
|
360 |
+
for performing computational tasks [21]. In particu-
|
361 |
+
lar, the users first harvest energy from the RF signals
|
362 |
+
transmitted by the PS and then use the harvested en-
|
363 |
+
ergy to deliver information to the RS. To allievate the
|
364 |
+
severe path-loss suffered by the reflecting links, the ac-
|
365 |
+
tive RIS is employed to improve the WET efficiency
|
366 |
+
from the PS to users and the WIT efficiency from the
|
367 |
+
users to the RS.
|
368 |
+
The channels are assumed to follow a quasi-static
|
369 |
+
flat-fading model.
|
370 |
+
That is, all channel coefficients
|
371 |
+
are constant throughout each transmission block but
|
372 |
+
vary from block to block [30]. The downlink base-
|
373 |
+
band equivalent channels of PS-to-RIS, RIS-to-Uk,
|
374 |
+
and PS-to-Uk links are denoted by Hr ∈ CN×M,
|
375 |
+
hH
|
376 |
+
u,k ∈ C1×N, and hH
|
377 |
+
d,k ∈ C1×M, respectively, where
|
378 |
+
Uk denotes the k-th user. Similarly, the uplink base-
|
379 |
+
band equivalent channels of Uk-to-RIS, RIS-to-RS,
|
380 |
+
and Uk-to-RS links are respectively denoted by gu,k ∈
|
381 |
+
CN×1, Gr ∈ CL×N, and gd,k ∈ CL×1, respectively.
|
382 |
+
Since there have been many efficient channel estima-
|
383 |
+
4
|
384 |
+
China Communications
|
385 |
+
|
386 |
+
用tion techniques proposed for RIS systems [31–34], we
|
387 |
+
assume the perfect channel state information can be
|
388 |
+
available in advance, which is a common assumption
|
389 |
+
considered in [21, 22, 35] and a prerequisite for inves-
|
390 |
+
tigating the upper-bound of system performance. It
|
391 |
+
should be noted that the channel estimation error is
|
392 |
+
generally inevitable [31]. However, the effect of chan-
|
393 |
+
nel estimation error on system performance degrada-
|
394 |
+
tion is out the scope of this paper.
|
395 |
+
According to the HTT protocol [6], the normalized
|
396 |
+
transmission block of interest is divided into K + 1
|
397 |
+
time slots. The first time slot with duration of τ0 ∈
|
398 |
+
[0, 1] is a dedicated slot for WET, in which all users
|
399 |
+
harvest energy from the PS with the assistance of
|
400 |
+
active RIS. The remaining K time slots denoted by
|
401 |
+
τ = [τ1, . . . , τK], are used for UL WIT via the time di-
|
402 |
+
vision multiple access (TDMA) scheme. Specifically,
|
403 |
+
during τk, k = 1, · · · , K, Uk delivers its information
|
404 |
+
to the RS. Without loss of generality, the whole oper-
|
405 |
+
ation time period is set to a normalized transmission
|
406 |
+
block. The network time scheduling constraint is thus
|
407 |
+
given by
|
408 |
+
τ0 +
|
409 |
+
K
|
410 |
+
�
|
411 |
+
k=1
|
412 |
+
τk ≤ 1, ∀k.
|
413 |
+
(1)
|
414 |
+
2.1 Wireless Energy Transfer Phase
|
415 |
+
In the WET phase, the PS transmits energy signals to
|
416 |
+
all users with the assistance of the active RIS. Denote
|
417 |
+
the transmitted signal as s = w0s, where s is the
|
418 |
+
pseudo-random baseband signal transmitted by the PS,
|
419 |
+
and w0 ∈ CM×1 is the transmit beamforming vector.
|
420 |
+
The energy constraint at the PS is expressed as
|
421 |
+
E
|
422 |
+
�
|
423 |
+
|s|2�
|
424 |
+
= Tr
|
425 |
+
�
|
426 |
+
w0wH
|
427 |
+
0
|
428 |
+
�
|
429 |
+
≤ P0,
|
430 |
+
(2)
|
431 |
+
where P0 denotes the maximum transmit power at the
|
432 |
+
PS.
|
433 |
+
The reflecting coefficient matrix of the active
|
434 |
+
RIS in the WET phase is denoted by Φ0
|
435 |
+
=
|
436 |
+
diag {φ0,1, . . . , φ0,N}
|
437 |
+
∈
|
438 |
+
CN×N
|
439 |
+
with
|
440 |
+
φ0,n
|
441 |
+
=
|
442 |
+
a0,nejθ0,n, n = 1, . . . , N, where a0,n and θ0,n rep-
|
443 |
+
resent the amplitude reflection coefficient and phase
|
444 |
+
shift of the n-th RE, respectively. Without loss of gen-
|
445 |
+
erality, we suppose each active RE has the following
|
446 |
+
constraints
|
447 |
+
a0,n ≤ an,max, 0 ≤ θ0,n ≤ 2π, ∀n,
|
448 |
+
(3)
|
449 |
+
where an,max is the maximum amplitude reflection co-
|
450 |
+
efficient of n-th RE. It is worth noting that an,max can
|
451 |
+
be greater than 1 [25], which is a main characteris-
|
452 |
+
tic distinguishing the active RIS from the passive RIS
|
453 |
+
since the active load can amplify the reflected signals.
|
454 |
+
The received signal at Uk during τ0 is given by
|
455 |
+
yu,k = hH
|
456 |
+
d,ks
|
457 |
+
� �� �
|
458 |
+
direct link
|
459 |
+
+ hH
|
460 |
+
u,kΦ0 (Hrs + nv)
|
461 |
+
�
|
462 |
+
��
|
463 |
+
�
|
464 |
+
RIS-aided link
|
465 |
+
+nu,k, ∀k,
|
466 |
+
(4)
|
467 |
+
where nu,k ∈ C and nv ∈ CN×1 represent the ad-
|
468 |
+
ditive white Gaussian noise (AWGN) at Uk and the
|
469 |
+
RIS, respectively. Without loss of generality, we as-
|
470 |
+
sume nu,k ∼ CN
|
471 |
+
�
|
472 |
+
0, σ2
|
473 |
+
u,k
|
474 |
+
�
|
475 |
+
and nv ∼ CN
|
476 |
+
�
|
477 |
+
0, σ2
|
478 |
+
vIN
|
479 |
+
�
|
480 |
+
.
|
481 |
+
Denote the equivalent downlink channel as hH
|
482 |
+
k
|
483 |
+
=
|
484 |
+
hH
|
485 |
+
u,kΦ0Hr + hH
|
486 |
+
d,k ∈ C1×M and (4) can be rewritten
|
487 |
+
as
|
488 |
+
yu,k = hH
|
489 |
+
k w0s + hH
|
490 |
+
u,kΦ0nv + nu,k, ∀k.
|
491 |
+
(5)
|
492 |
+
Due to the fact that the active RIS not only amplifies
|
493 |
+
the desired signal, i.e., s, but also amplifies the input
|
494 |
+
noise, i.e., nv, it is reasonable to consider the second
|
495 |
+
term of (4) for computing the amount of harvested en-
|
496 |
+
ergy accurately [20]. However, the noise at Uk is gen-
|
497 |
+
erally quite small and can be negligible. Accordingly,
|
498 |
+
the harvested energy by Uk, denoted by Ek, is given
|
499 |
+
by
|
500 |
+
Ek = β
|
501 |
+
��hH
|
502 |
+
k w0
|
503 |
+
��2τ0 + β
|
504 |
+
��hH
|
505 |
+
u,kΦ0
|
506 |
+
��2σ2
|
507 |
+
vτ0, ∀k,
|
508 |
+
(6)
|
509 |
+
where β ∈ (0, 1] denotes the energy conversion effi-
|
510 |
+
ciency of each user. It is practical for us to consider
|
511 |
+
the linear EH model here, which is also a common as-
|
512 |
+
sumption in the literature [6, 8, 11, 10, 22, 29].
|
513 |
+
It is worth noting that the active RIS can allocate
|
514 |
+
the available reflecting power to amplify the incident
|
515 |
+
signals with active loads [20]. In the DL WET phase,
|
516 |
+
the amplification power of s and nv is limited by the
|
517 |
+
RIS power budget, which is shown by the following
|
518 |
+
constraint
|
519 |
+
P0 ∥Φ0Hr∥2 + σ2
|
520 |
+
v ∥Φ0IN∥2 ≤ Pr,
|
521 |
+
(7)
|
522 |
+
where Pr is the maximum reflecting power for ampli-
|
523 |
+
fication at the active RIS and substantially lower than
|
524 |
+
that of an active RF amplifier [25].
|
525 |
+
China Communications
|
526 |
+
5
|
527 |
+
|
528 |
+
2.2 Wireless Information Transmission Phase
|
529 |
+
In the WIT phase, the users utilize the harvested en-
|
530 |
+
ergy to transmit information to the RS via a TDMA
|
531 |
+
manner. Let fk denotes the information-carrying sig-
|
532 |
+
nal of Uk with unit power and then the transmit signal
|
533 |
+
during τk is denoted by xk = √pkfk, where pk is the
|
534 |
+
transmit power at Uk. We assume that all the harvested
|
535 |
+
energy at Uk in the WET phase is used for delivering
|
536 |
+
its own information. Let p = [p1, . . . , pK] ∈ R1×K,
|
537 |
+
which satisfies
|
538 |
+
pkτk ≤ Ek, ∀k.
|
539 |
+
(8)
|
540 |
+
Similarly, the reflecting coefficient matrix at the
|
541 |
+
active RIS for the WIT during τk is denoted by
|
542 |
+
Φk = diag {φk,1, . . . , φk,N} ∈ CN×N, where φk,n =
|
543 |
+
ak,nejθk,n, ak,n and θk,n have the following constraints
|
544 |
+
ak,n ≤ an,max, 0 ≤ θk,n ≤ 2π, ∀k, ∀n.
|
545 |
+
(9)
|
546 |
+
The received signal at the RS from Uk with the as-
|
547 |
+
sistance of active RIS during τk is written as
|
548 |
+
yr,k = gH
|
549 |
+
d,kxk
|
550 |
+
� �� �
|
551 |
+
direct link
|
552 |
+
+ GrΦk (gu,kxk + nv)
|
553 |
+
�
|
554 |
+
��
|
555 |
+
�
|
556 |
+
RIS-aided link
|
557 |
+
+nr, ∀k,
|
558 |
+
(10)
|
559 |
+
where nr ∈ CL×1 represents the AWGN at the RS and
|
560 |
+
satisfies nr ∼ CN
|
561 |
+
�
|
562 |
+
0, σ2
|
563 |
+
rIN
|
564 |
+
�
|
565 |
+
.
|
566 |
+
In the UL WIT phase, we also have the amplification
|
567 |
+
power constraint at the active RIS as follows
|
568 |
+
pk ∥Φkgu,k∥2 + σ2
|
569 |
+
v ∥ΦkIN∥2 ≤ Pr, ∀k.
|
570 |
+
(11)
|
571 |
+
Denote the receive beamforming vector at the RS
|
572 |
+
during τk as wk ∈ CL×1, which can be used to ex-
|
573 |
+
tract the desired signal and suppress interference and
|
574 |
+
noises. Let the equivalent uplink channel be gk =
|
575 |
+
gd,k + GrΦkgu,k, ∀k. The estimated signal at the RS
|
576 |
+
during τk is expressed as
|
577 |
+
uk =wH
|
578 |
+
k yr,k
|
579 |
+
=wH
|
580 |
+
k gkxk + wH
|
581 |
+
k GrΦknv + wH
|
582 |
+
k nr, ∀k.
|
583 |
+
(12)
|
584 |
+
Then, the signal-noise-ratio (SNR) at the RS during
|
585 |
+
τk is written as
|
586 |
+
γk = pk
|
587 |
+
��wH
|
588 |
+
k (GrΦkgu,k + gd,k)
|
589 |
+
��2
|
590 |
+
��wH
|
591 |
+
k GrΦk
|
592 |
+
��2 σ2v + ∥wk∥2 σ2r
|
593 |
+
, ∀k.
|
594 |
+
(13)
|
595 |
+
Denote the achievable rate from Uk to the RS as Rk,
|
596 |
+
which is formulated as
|
597 |
+
Rk = τk log (1 + γk) , ∀k.
|
598 |
+
(14)
|
599 |
+
III. PROBLEM FORMULATION
|
600 |
+
In this section, we formulate the system sum-rate max-
|
601 |
+
imization problem by jointly optimizing the reflecting
|
602 |
+
coefficients for both the WET and the WIT at the ac-
|
603 |
+
tive RIS, the transmit beamforming at the PS, the re-
|
604 |
+
ceive beamforming at the RS, the transmit power at
|
605 |
+
each user, and the network time scheduling. The opti-
|
606 |
+
mization problem is formulated as
|
607 |
+
(P1)
|
608 |
+
max
|
609 |
+
τ0,τ,Φ0,Φk,w0,p,wk
|
610 |
+
K
|
611 |
+
�
|
612 |
+
k=1
|
613 |
+
Rk
|
614 |
+
(15)
|
615 |
+
s.t.
|
616 |
+
(1), (2), (3), (7), (8), (9) and (11),
|
617 |
+
τ0 ≥ 0, τk ≥ 0, pk ≥ 0, ∀k.
|
618 |
+
(16)
|
619 |
+
where (16) indicates that the time and power variables
|
620 |
+
are all nonnegative.
|
621 |
+
One can observe that the objective function in (15)
|
622 |
+
is a non-concave function due to the coupled of vari-
|
623 |
+
ables. In addition, there exists several non-convex con-
|
624 |
+
straints, i.e., (2), (7), (8) and (11). It is thus challeng-
|
625 |
+
ing to solve P1 directly by standard optimization tech-
|
626 |
+
niques. In the next section, we propose an AO algo-
|
627 |
+
rithm to solve it efficiently.
|
628 |
+
IV. ALTERNATING OPTIMIZATION SO-
|
629 |
+
LUTION
|
630 |
+
In this section, an efficient AO algorithm is proposed
|
631 |
+
to solve P1. In particular, we decompose P1 into sev-
|
632 |
+
eral subproblems and iteratively solve them in an al-
|
633 |
+
ternating manner. To show the procedure of AO algo-
|
634 |
+
rithm, we summarize a flow chart in Figure 2. Specif-
|
635 |
+
ically, the variables are partitioned into four blocks,
|
636 |
+
{wk}, {w0, τ, p}, {Φ0, τ0, τ, p}, and {Φk}. Then,
|
637 |
+
the variables in each block are alternately solved by
|
638 |
+
6
|
639 |
+
China Communications
|
640 |
+
|
641 |
+
Linear MMSE-based Receive
|
642 |
+
Beamforming Optimization
|
643 |
+
SDP-based Transmit
|
644 |
+
Beamforming Optimization
|
645 |
+
SDP-based RIS Reflecting Coefficients for the
|
646 |
+
WET and Resource Allocation Optimization
|
647 |
+
SCA-based RIS Reflecting Coefficients
|
648 |
+
Optimization for the WIT
|
649 |
+
System Variables
|
650 |
+
�, �, �� , ��
|
651 |
+
��, ��, ��
|
652 |
+
�, {��}
|
653 |
+
{��}
|
654 |
+
�� , �� , ��, ��
|
655 |
+
��
|
656 |
+
�, �
|
657 |
+
Discarding
|
658 |
+
��, �� , ��
|
659 |
+
��, ��,
|
660 |
+
�, �
|
661 |
+
�, ��
|
662 |
+
��
|
663 |
+
AO iteration flow
|
664 |
+
Update
|
665 |
+
Input
|
666 |
+
Figure 2. A flow chart of the proposed algorithm.
|
667 |
+
its corresponding sub-problem with the other blocks
|
668 |
+
fixed until the convergence is achieved.
|
669 |
+
4.1 Linear MMSE-based Receive Beamform-
|
670 |
+
ing Optimization
|
671 |
+
With the other variables fixed, we first design the re-
|
672 |
+
ceive beamforming vectors {wk}. To cope with the
|
673 |
+
interference caused by nv and nr in (13), we apply
|
674 |
+
the linear MMSE criterion here. Based on this crite-
|
675 |
+
rion, the MMSE-based receive beamforming is given
|
676 |
+
by
|
677 |
+
w∗
|
678 |
+
k =
|
679 |
+
�
|
680 |
+
gkgH
|
681 |
+
k + σ2
|
682 |
+
v
|
683 |
+
pk
|
684 |
+
GrΦkΦH
|
685 |
+
k GH
|
686 |
+
r + σ2
|
687 |
+
r
|
688 |
+
pk
|
689 |
+
IL
|
690 |
+
�−1
|
691 |
+
gk, ∀k.
|
692 |
+
(17)
|
693 |
+
4.2 SDP-based Transmit Beamforming Opti-
|
694 |
+
mization
|
695 |
+
We then proceed to optimize {w0, τ, p} with the other
|
696 |
+
variables {wk, Φ0, τ0, Φk} fixed. Letting ek = pkτk
|
697 |
+
and e = [e1, . . . , eK] and applying the obtained results
|
698 |
+
in (17), P1 can be simplified as follows
|
699 |
+
(P2) max
|
700 |
+
w0,τ,e
|
701 |
+
K
|
702 |
+
�
|
703 |
+
k=1
|
704 |
+
τk log
|
705 |
+
�
|
706 |
+
1 + ǫk
|
707 |
+
ek
|
708 |
+
τk
|
709 |
+
�
|
710 |
+
(18)
|
711 |
+
s.t.
|
712 |
+
ek ≤ Ek, ∀k,
|
713 |
+
(19)
|
714 |
+
τk ≥ 0, ek ≥ 0, ∀k,
|
715 |
+
(20)
|
716 |
+
(1), (2) and (11),
|
717 |
+
where ǫk
|
718 |
+
=
|
719 |
+
|(w∗
|
720 |
+
k)H(GrΦkgu,k+gd,k)|
|
721 |
+
2
|
722 |
+
∥(w∗
|
723 |
+
k)HGrΦk∥
|
724 |
+
2σ2v+∥w∗
|
725 |
+
k∥
|
726 |
+
2σ2r , ∀k.
|
727 |
+
It
|
728 |
+
can be found that P2 is highly non-convex.
|
729 |
+
To
|
730 |
+
solve it efficiently, the SDR technique [36] is em-
|
731 |
+
ployed.
|
732 |
+
Define Hk
|
733 |
+
=
|
734 |
+
hkhH
|
735 |
+
k , and Gu,k
|
736 |
+
=
|
737 |
+
diag
|
738 |
+
�
|
739 |
+
|gu,k,1|2 , |gu,k,2|2 , . . . , |gu,k,N|2�
|
740 |
+
,
|
741 |
+
∀k.
|
742 |
+
Let
|
743 |
+
W0
|
744 |
+
=
|
745 |
+
w0wH
|
746 |
+
0 , which satisfies W0
|
747 |
+
⪰
|
748 |
+
0 and
|
749 |
+
rank(W0) = 1. Then, (19) is rewritten as
|
750 |
+
ek ≤ βτ0[Tr (HkW0) +
|
751 |
+
��hH
|
752 |
+
u,kΦ0
|
753 |
+
��2 σ2
|
754 |
+
v], ∀k.
|
755 |
+
(21)
|
756 |
+
Denote the RIS reflecting coefficient vector for the
|
757 |
+
WET as ϕk = [φk,1, φk,2, . . . , φk,N]T, ∀k, (11) can
|
758 |
+
be recast as
|
759 |
+
ekϕH
|
760 |
+
k Gu,kϕk + τkσ2
|
761 |
+
vϕH
|
762 |
+
k ϕk ≤ τkPr, ∀k.
|
763 |
+
(22)
|
764 |
+
Then, P2 can be equivalently transformed into
|
765 |
+
(P2-1) max
|
766 |
+
W0,τ,e
|
767 |
+
K
|
768 |
+
�
|
769 |
+
k=1
|
770 |
+
τk log
|
771 |
+
�
|
772 |
+
1 + ǫk
|
773 |
+
ek
|
774 |
+
τk
|
775 |
+
�
|
776 |
+
(23)
|
777 |
+
s.t.
|
778 |
+
Tr (W0) ≤ P0,
|
779 |
+
(24)
|
780 |
+
W0 ⪰ 0,
|
781 |
+
(25)
|
782 |
+
rank(W0) = 1,
|
783 |
+
(26)
|
784 |
+
(1), (20), (21) and (22).
|
785 |
+
Since the rank-one constraint in (26) is non-convex,
|
786 |
+
we employ the SDR technique to relax it. Thus, P2-1
|
787 |
+
becomes to be a convex semidefinite program (SDP)
|
788 |
+
and can be solved with the interior-point method [37].
|
789 |
+
Proposition 1. The optimal transmit beamforming
|
790 |
+
matrix obtained by solving the relaxed version of P2-1,
|
791 |
+
denoted by W ∗
|
792 |
+
0 , is rank-one.
|
793 |
+
Proof. Please refer to Appendix A.
|
794 |
+
According to Proposition 1, the tightness of SDR
|
795 |
+
is guaranteed. Hence, we can employ Cholesky de-
|
796 |
+
composition to obtain the optimal energy beamform-
|
797 |
+
ing vector w∗
|
798 |
+
0.
|
799 |
+
4.3 SDP-based RIS Reflecting Coefficients for
|
800 |
+
the WET and Resource Allocation Opti-
|
801 |
+
mization
|
802 |
+
In this sub-section, we focus on optimizing the re-
|
803 |
+
flecting beamforming at the RIS in the WET phase,
|
804 |
+
the transmit power at each user, and the network
|
805 |
+
time scheduling.
|
806 |
+
Since τ0 and Φ0 are coupled,
|
807 |
+
we first optimize {Φ0, τ, p} with τ0 given. Define
|
808 |
+
Ψ0 = ˜ϕ0 ˜ϕH
|
809 |
+
0 with Ψ0 ⪰ 0 and rank(Ψ0) = 1,
|
810 |
+
where ˜ϕ0 = [ϕH
|
811 |
+
0 , 1]H and ϕ0 = [φ0,1, . . . , φ0,N]T .
|
812 |
+
China Communications
|
813 |
+
7
|
814 |
+
|
815 |
+
Let Hu,k = diag {hu,k,1, . . . , hu,k,N} and Qu,k =
|
816 |
+
diag
|
817 |
+
�
|
818 |
+
|hu,k,1|2 , . . . , |hu,k,N|2 , 1
|
819 |
+
�
|
820 |
+
. Then, (7) and (19)
|
821 |
+
are respectively reformulated as
|
822 |
+
P0Tr( ˜
|
823 |
+
HrΨ0) + σ2
|
824 |
+
vTr(Ψ0) ≤ Pr,
|
825 |
+
(27)
|
826 |
+
ek ≤ βτ0Tr[(V + σ2
|
827 |
+
vQu,k)Ψ0] − βτ0σ2
|
828 |
+
v, ∀k, (28)
|
829 |
+
where
|
830 |
+
V =
|
831 |
+
�HH
|
832 |
+
u,kHrW0HH
|
833 |
+
r Hu,k
|
834 |
+
HH
|
835 |
+
u,kHrW0hd,k
|
836 |
+
hH
|
837 |
+
d,kW0HH
|
838 |
+
r Hu,k
|
839 |
+
hH
|
840 |
+
d,kW0hd,k
|
841 |
+
�
|
842 |
+
,
|
843 |
+
and
|
844 |
+
˜
|
845 |
+
Hr =
|
846 |
+
�HrHH
|
847 |
+
r
|
848 |
+
0
|
849 |
+
0
|
850 |
+
0
|
851 |
+
�
|
852 |
+
.
|
853 |
+
With the obtained solutions in Sections 4.1 and 4.2,
|
854 |
+
P1 can be equivalently written as
|
855 |
+
(P2-2) max
|
856 |
+
Ψ0,τ,e
|
857 |
+
K
|
858 |
+
�
|
859 |
+
k=1
|
860 |
+
τk log
|
861 |
+
�
|
862 |
+
1 + ǫk
|
863 |
+
ek
|
864 |
+
τk
|
865 |
+
�
|
866 |
+
(29)
|
867 |
+
s.t.
|
868 |
+
Ψ0 ⪰ 0, rank(Ψ0) = 1,
|
869 |
+
(30)
|
870 |
+
[Ψ0]n,n ≤ a2
|
871 |
+
max, ∀n,
|
872 |
+
(31)
|
873 |
+
[Ψ0]N+1,N+1 = 1,
|
874 |
+
(32)
|
875 |
+
(1), (20), (22), (27) and (28).
|
876 |
+
Similarly, after the relaxation of the rank-one con-
|
877 |
+
straint in (30), P2-2 is also an SDP and can be solved
|
878 |
+
by the interior-point method. Recall that the tightness
|
879 |
+
of optimizing W0 by SDR can be guaranteed, we can
|
880 |
+
also prove that the obtained solution Ψ0 is rank-one.
|
881 |
+
Then, ˜ϕ0 can be recovered by implementing Cholesky
|
882 |
+
decomposition of Ψ0, and the optimal reflection co-
|
883 |
+
efficient vector for the WET ϕ∗
|
884 |
+
0 can be obtanied by
|
885 |
+
linear operation from ˜ϕ0. Subsequently, the optimal
|
886 |
+
RIS reflecting coefficient matrix Φ∗
|
887 |
+
0 can be obtained
|
888 |
+
by Φ∗
|
889 |
+
0 = diag((ϕH
|
890 |
+
0 )∗).
|
891 |
+
Finally, we continue to update the optimal energy
|
892 |
+
transmission time τ0 ∈ [0, 1] by the one-dimensional
|
893 |
+
search method. Thus, the maximum sum-rate of this
|
894 |
+
sub-problem is achieved with the optimal solution
|
895 |
+
{Φ∗
|
896 |
+
0, τ ∗
|
897 |
+
0 , τ ∗, p∗}. The procedure is summarized in Al-
|
898 |
+
gorithm 1.
|
899 |
+
Algorithm 1. SDP-based RIS reflecting coefficients for the WET
|
900 |
+
and resource allocation optimization
|
901 |
+
Input: w0, {wk}, {Φk}, ∀k
|
902 |
+
Output: Φ∗
|
903 |
+
0, τ ∗
|
904 |
+
0 , τ ∗, p∗
|
905 |
+
1: Initialization: The maximum objective function
|
906 |
+
value Rmax = 0 and the step size δ.
|
907 |
+
2: for τ0 = 0 : δ : 1 do
|
908 |
+
3:
|
909 |
+
Given w0, {wk}, {Φk}, we obtain τ ′
|
910 |
+
0, Ψ′
|
911 |
+
0, τ ′
|
912 |
+
k,
|
913 |
+
e′
|
914 |
+
k, ∀k by solving P2-2.
|
915 |
+
4:
|
916 |
+
Calculate R = �K
|
917 |
+
k=1 τ ′
|
918 |
+
k log
|
919 |
+
�
|
920 |
+
1 + ǫk
|
921 |
+
e′
|
922 |
+
k
|
923 |
+
τ ′
|
924 |
+
k
|
925 |
+
�
|
926 |
+
.
|
927 |
+
5:
|
928 |
+
if R > Rmax then
|
929 |
+
6:
|
930 |
+
Update Rmax ← R.
|
931 |
+
7:
|
932 |
+
Update τ0 ← τ ′
|
933 |
+
0, Ψ0 ← Ψ′
|
934 |
+
0, τk ← τ ′
|
935 |
+
k, ek ←
|
936 |
+
e′
|
937 |
+
k.
|
938 |
+
8:
|
939 |
+
end if
|
940 |
+
9: end for
|
941 |
+
10: Obtain ˜ϕ0 from Ψ0 by Cholesky decomposition.
|
942 |
+
11: Obtain ϕ0 from ˜ϕ0.
|
943 |
+
12: Set Φ∗
|
944 |
+
0 = diag((ϕH
|
945 |
+
0 )∗).
|
946 |
+
13: Calculate p∗
|
947 |
+
k = e∗
|
948 |
+
k/τ ∗
|
949 |
+
k.
|
950 |
+
14: return Φ∗
|
951 |
+
0, τ ∗
|
952 |
+
0 , τ ∗, p∗.
|
953 |
+
4.4 SCA-based RIS Reflecting Coefficients
|
954 |
+
Optimization for the WIT
|
955 |
+
In this sub-section, we investigate the optimization of
|
956 |
+
RIS reflecting coefficient matrix Φk in the WIT phase,
|
957 |
+
which is given by
|
958 |
+
(P3) max
|
959 |
+
Φk
|
960 |
+
K
|
961 |
+
�
|
962 |
+
k=1
|
963 |
+
Rk
|
964 |
+
(33)
|
965 |
+
s.t.
|
966 |
+
(9) and (11).
|
967 |
+
Note that P3 is still a non-convex optimization prob-
|
968 |
+
lem as the active RIS introduces additional noise term
|
969 |
+
in the denominator of the objective function, which re-
|
970 |
+
sults in a quadratic fractional programming problem.
|
971 |
+
In fact, the RIS reflecting coefficients include ampli-
|
972 |
+
tude reflection coefficients and phase shifts. To sim-
|
973 |
+
plify this problem, we derive the optimal phase shifts
|
974 |
+
in the closed-form and then exploit an SCA algorithm
|
975 |
+
to obtain the near-optimal amplitude reflection coeffi-
|
976 |
+
cients according to [20].
|
977 |
+
It is worth noting that P3 can be decomposed into K
|
978 |
+
8
|
979 |
+
China Communications
|
980 |
+
|
981 |
+
independent subproblems, each of which maximizes
|
982 |
+
the SNR of Uk at the RS during τk with respect to the
|
983 |
+
RIS reflection coefficient vector ϕk. Specifically, with
|
984 |
+
w∗
|
985 |
+
k obtained in (17) and introducing some new aux-
|
986 |
+
iliary variables, the k-th SNR maximization problem
|
987 |
+
can be formulated as
|
988 |
+
γk = pk
|
989 |
+
��bH
|
990 |
+
k ϕk + gd,k
|
991 |
+
��2
|
992 |
+
ϕH
|
993 |
+
k Qrϕkσ2v + σ2r
|
994 |
+
,
|
995 |
+
(34)
|
996 |
+
where gd,k
|
997 |
+
=
|
998 |
+
wH
|
999 |
+
k gd,k, gH
|
1000 |
+
r,k
|
1001 |
+
=
|
1002 |
+
wH
|
1003 |
+
k Gr, bH
|
1004 |
+
k
|
1005 |
+
=
|
1006 |
+
gH
|
1007 |
+
r,kdiag (gu,k), Qr = diag
|
1008 |
+
�
|
1009 |
+
|gr,k,1|2 , . . . , |gr,k,N|2�
|
1010 |
+
,
|
1011 |
+
∀k. Let Fk = pkGu,k + σ2
|
1012 |
+
vIN, ∀k. The subproblem
|
1013 |
+
can be expressed as
|
1014 |
+
(P4) max
|
1015 |
+
ϕk
|
1016 |
+
γk
|
1017 |
+
(35)
|
1018 |
+
s.t.
|
1019 |
+
ϕH
|
1020 |
+
k Fkϕk ≤ Pr, ∀k,
|
1021 |
+
(36)
|
1022 |
+
(9).
|
1023 |
+
To solve P4, we decompose the optimization of RIS
|
1024 |
+
reflecting coefficient vector ϕk into two sub-problems
|
1025 |
+
for the amplitude reflection coefficient design and the
|
1026 |
+
optimal phase shift design, respectively. Let ϕk =
|
1027 |
+
Θk ¯ϕk, where Θk
|
1028 |
+
=
|
1029 |
+
diag
|
1030 |
+
�
|
1031 |
+
ejθk,1, . . . , ejθk,N�
|
1032 |
+
∈
|
1033 |
+
CN×N and ¯ϕk = [ak,1, . . . , ak,N]T ∈ RN×1.
|
1034 |
+
4.4.1 Optimization of phase shifts for the WIT
|
1035 |
+
The optimal design of phase shifts is given in the fol-
|
1036 |
+
lowing proposition.
|
1037 |
+
Proposition 2. The optimal RIS phase shift of the n-th
|
1038 |
+
RE for the WIT during τk is derived as
|
1039 |
+
θ∗
|
1040 |
+
k,n = arg(gd,k) − arg(gu,k,n) + arg(gr,k,n), (37)
|
1041 |
+
∀k, ∀n,
|
1042 |
+
where gu,k,n and gr,k,n denote the n-th element of the
|
1043 |
+
vector gu,k and gr,k, respectively.
|
1044 |
+
Proof. Please refer to Appendix B.
|
1045 |
+
4.4.2 Optimization of amplitude reflection coeffi-
|
1046 |
+
cients for the WIT
|
1047 |
+
For P4, the optimal design of phase shifts shown in
|
1048 |
+
Proposition 2 holds because the value of the ampli-
|
1049 |
+
fication power in (9) and (36) and the noise power
|
1050 |
+
in the denominator of (34) are independent with the
|
1051 |
+
phase shift of each RE. In addition, optimizing θk,n
|
1052 |
+
is equivalent to maximizing the objective function in
|
1053 |
+
(34) [20]. With the optimal phase shifts in Proposition
|
1054 |
+
2, we proceed to optimize the RIS amplitude reflec-
|
1055 |
+
tion coefficients for the WIT. In particular, P4 can be
|
1056 |
+
simplified as
|
1057 |
+
(P4-1) max
|
1058 |
+
¯ϕk
|
1059 |
+
¯γk = pk
|
1060 |
+
��¯bH
|
1061 |
+
k ¯ϕk + |gd,k|
|
1062 |
+
��2
|
1063 |
+
¯ϕH
|
1064 |
+
k Qr ¯ϕkσ2v + σ2r
|
1065 |
+
(38)
|
1066 |
+
s.t.
|
1067 |
+
¯ϕH
|
1068 |
+
k Fk ¯ϕk ≤ Pr, ∀k,
|
1069 |
+
(39)
|
1070 |
+
ak,n ≤ an,max, ∀k, ∀n,
|
1071 |
+
(40)
|
1072 |
+
where ¯γk = |γk|, and ¯bk is element-wise modulus
|
1073 |
+
of bk. To deal with the non-convexity of the objec-
|
1074 |
+
tive function (38), we introduce a new auxiliary vari-
|
1075 |
+
able nk = ¯ϕH
|
1076 |
+
k Qr ¯ϕkσ2
|
1077 |
+
v + σ2
|
1078 |
+
r, which denotes the noise
|
1079 |
+
power received at the RIS. Then, P4-1 can be con-
|
1080 |
+
verted into the following equivalent form
|
1081 |
+
(P4-2) max
|
1082 |
+
¯γk,nk, ¯ϕk ¯γk
|
1083 |
+
(41)
|
1084 |
+
s.t.√pk
|
1085 |
+
�¯bH
|
1086 |
+
k ¯ϕk + |gd,k|
|
1087 |
+
�
|
1088 |
+
≥ √nk¯γk, ∀k,
|
1089 |
+
(42)
|
1090 |
+
¯ϕH
|
1091 |
+
k Qr ¯ϕkσ2
|
1092 |
+
v + σ2
|
1093 |
+
r ≤ nk, ∀k,
|
1094 |
+
(43)
|
1095 |
+
(39) and (40).
|
1096 |
+
However, the constraint (42) is still non-convex. To
|
1097 |
+
solve P4-1 efficiently, we exploit the SCA algorithm to
|
1098 |
+
approximate the square root by a convex upper-bound
|
1099 |
+
in each iteration. Define ¯γk(t) and nk(t) as the iter-
|
1100 |
+
ative optimization variables after the t-th step itera-
|
1101 |
+
tion. In terms of {¯γk (t) , nk (t)}, the first-order Tay-
|
1102 |
+
lor polynomial is used to approximate √nk¯γk, which
|
1103 |
+
is given by
|
1104 |
+
√nk¯γk ≤G(¯γk, nk; t)
|
1105 |
+
=
|
1106 |
+
�
|
1107 |
+
¯γk(t)nk(t) + 1
|
1108 |
+
2
|
1109 |
+
�nk(t)
|
1110 |
+
¯γk(t)
|
1111 |
+
� 1
|
1112 |
+
2
|
1113 |
+
[ ¯γk − ¯γk(t)]
|
1114 |
+
+ 1
|
1115 |
+
2
|
1116 |
+
� ¯γk(t)
|
1117 |
+
nk(t)
|
1118 |
+
� 1
|
1119 |
+
2
|
1120 |
+
[n − nk(t)] .
|
1121 |
+
(44)
|
1122 |
+
Based on (44), (42) can be rewritten as
|
1123 |
+
√pk
|
1124 |
+
�¯bH
|
1125 |
+
k ¯ϕk + |gd,k|
|
1126 |
+
�
|
1127 |
+
≥ G(¯γk, nk; t), ∀k.
|
1128 |
+
(45)
|
1129 |
+
China Communications
|
1130 |
+
9
|
1131 |
+
|
1132 |
+
Then, P4-2 can be reformulated as the following
|
1133 |
+
problem
|
1134 |
+
(P4-3) max
|
1135 |
+
¯γk,nk, ¯ϕk ¯γk,
|
1136 |
+
(46)
|
1137 |
+
s.t.(39), (40), (43) and (45).
|
1138 |
+
As P4-3 is convex and can be solved by the inter-
|
1139 |
+
point method. We then discuss the initialization of
|
1140 |
+
¯γk(t) and nk(t). First, we propose an initial solution
|
1141 |
+
¯ϕk(0) by solving a simple feasible version of problem
|
1142 |
+
P4-1, i.e., ¯ϕk(0), satisfying the constraints (39) and
|
1143 |
+
(40). Then, the reasonable initialization of ¯γk(0) and
|
1144 |
+
nk(0) is given by
|
1145 |
+
¯γk(0) = pk
|
1146 |
+
��¯bH
|
1147 |
+
k ¯ϕk(0) + |gd,k|
|
1148 |
+
��2
|
1149 |
+
σ2v ¯ϕH
|
1150 |
+
k (0)Qr ¯ϕk(0) + σ2r
|
1151 |
+
,
|
1152 |
+
(47)
|
1153 |
+
nk(0) = σ2
|
1154 |
+
v ¯ϕH
|
1155 |
+
k (0)Qr ¯ϕk(0) + σ2
|
1156 |
+
r.
|
1157 |
+
(48)
|
1158 |
+
With the initialization described in (47) and (48), the
|
1159 |
+
optimal amplitude reflection coefficients for the WIT,
|
1160 |
+
denoted by ¯ϕ∗
|
1161 |
+
k, can be obtained by iteratively solving
|
1162 |
+
P4-3 until the convergence is achieved. As a result, the
|
1163 |
+
RIS reflecting coefficients during τk can be calculated
|
1164 |
+
by
|
1165 |
+
Φ∗
|
1166 |
+
k = diag (Θ∗
|
1167 |
+
k ¯ϕ∗
|
1168 |
+
k) , ∀k,
|
1169 |
+
(49)
|
1170 |
+
where Θ∗
|
1171 |
+
k = diag{ejθ∗
|
1172 |
+
k,1, . . . , ejθ∗
|
1173 |
+
k,N}.
|
1174 |
+
The detailed description of optimizing the RIS re-
|
1175 |
+
flecting coefficients in P3 is summarized in the Algo-
|
1176 |
+
rithm 2.
|
1177 |
+
Algorithm 2. SCA-based RIS reflecting coefficients for the WIT
|
1178 |
+
Input: {wk}, p, ∀k
|
1179 |
+
Output: {Φ∗
|
1180 |
+
k}, ∀k
|
1181 |
+
1: Initialization: ¯γk(t), nk(t), ¯ϕk(t), and t = 0.
|
1182 |
+
2: Obtain θ∗
|
1183 |
+
k,n in Proposition 2 and have Θ∗
|
1184 |
+
k.
|
1185 |
+
3: repeat
|
1186 |
+
4:
|
1187 |
+
t = t + 1.
|
1188 |
+
5:
|
1189 |
+
Update ¯γk(t), nk(t), ¯ϕk(t) by solving P4-3.
|
1190 |
+
6: until the convergence is achieved.
|
1191 |
+
7: Obtain Φ∗
|
1192 |
+
k = diag (Θ∗
|
1193 |
+
k ¯ϕ∗
|
1194 |
+
k), where ¯ϕ∗
|
1195 |
+
k = ¯ϕk(t).
|
1196 |
+
8: return {Φ∗
|
1197 |
+
k}.
|
1198 |
+
4.5 Algorithm Summarization and Analysis
|
1199 |
+
Based on the above analysis, the algorithm for solving
|
1200 |
+
P1 is summarized in Algorithm 3. Based on the opti-
|
1201 |
+
mality analysis,the objective function of P1 is a non-
|
1202 |
+
decreasing function. Due to the power budget con-
|
1203 |
+
straint (2), (7) and (11), the optimal objective value
|
1204 |
+
of problem P1 is bounded. Hence, the convergence
|
1205 |
+
of Algorithm 2 can be thus guaranteed, which will be
|
1206 |
+
also confirmed by numerical simulations in Section V.
|
1207 |
+
4.5.1 Complexity Analysis
|
1208 |
+
The computational complexity of our proposed AO
|
1209 |
+
algorithm is analyzed as follows, which contains
|
1210 |
+
the linear MMSE-based receive beamforming cal-
|
1211 |
+
culation, the SDR algorithm and the SCA algo-
|
1212 |
+
rithm in each iteration.
|
1213 |
+
For the linear MMSE-
|
1214 |
+
based receive beamforming optimization, we derive
|
1215 |
+
a closed-form solution to the (17), and the approx-
|
1216 |
+
imate worst-case computational complexity is given
|
1217 |
+
by O
|
1218 |
+
�
|
1219 |
+
KL max(N, L)2�
|
1220 |
+
.
|
1221 |
+
According to [36], for
|
1222 |
+
the subproblem of SDP-based transmit beamform-
|
1223 |
+
ing optimization, the worst-case computational com-
|
1224 |
+
plexity is O
|
1225 |
+
�
|
1226 |
+
max(K, M)4.5 log(1/ǫ)
|
1227 |
+
�
|
1228 |
+
, where ǫ is the
|
1229 |
+
computational accuracy of the interior-point method
|
1230 |
+
in CVX. Similarly, for the SDP-based RIS reflect-
|
1231 |
+
ing coefficients for the WET and resource alloca-
|
1232 |
+
tion optimization, the worst-case computational com-
|
1233 |
+
plexity is O
|
1234 |
+
�
|
1235 |
+
Iτ max(N, K)4.5 log(1/ǫ)
|
1236 |
+
�
|
1237 |
+
, where Iτ
|
1238 |
+
is the iteration number for updating τ0.
|
1239 |
+
For the
|
1240 |
+
SCA-based RIS reflecting coefficients optimization in
|
1241 |
+
the WIT, the computational complexity is less than
|
1242 |
+
O
|
1243 |
+
�
|
1244 |
+
ISKN 3.5 log(N/ǫ)
|
1245 |
+
�
|
1246 |
+
, where IS is the iteration
|
1247 |
+
number for the SCA algorithm. Thus, the computa-
|
1248 |
+
tional complexity of the overall AO algorithm is given
|
1249 |
+
by
|
1250 |
+
O
|
1251 |
+
�
|
1252 |
+
IA
|
1253 |
+
�
|
1254 |
+
KL max(N, L)2 + max(K, M)4.5 log(1/ǫ)
|
1255 |
+
+Iτ max(N, K)4.5 log(1/ǫ) + ISKN 3.5 log(N/ǫ)
|
1256 |
+
��
|
1257 |
+
,
|
1258 |
+
(50)
|
1259 |
+
where IA denotes the number of iterations required for
|
1260 |
+
convergence.
|
1261 |
+
4.5.2 Optimality Analysis
|
1262 |
+
As the formulated problem P1 is extremely non-
|
1263 |
+
convex, it is very difficult to obtain the globally op-
|
1264 |
+
timal solution. To solve P1 efficiently, we propose
|
1265 |
+
10
|
1266 |
+
China Communications
|
1267 |
+
|
1268 |
+
an efficient AO algorithm to obtain the suboptimal so-
|
1269 |
+
lutions. Firstly, we obtain the optimal receive beam-
|
1270 |
+
forming {wk} in a closed-form, which are the globally
|
1271 |
+
optimal solutions. With the obtained receive beam-
|
1272 |
+
forming solutions, the formulated problem can be sim-
|
1273 |
+
plified but is still non-convex.
|
1274 |
+
Secondly, the SDR
|
1275 |
+
technique is adopted to optimize the transmit beam-
|
1276 |
+
forming, the RIS reflecting coefficient matrices for
|
1277 |
+
the WET phase, the transmit power at each user, and
|
1278 |
+
the network time scheduling. In particular, we prove
|
1279 |
+
the obtained solutions of P2-1 and P2-2 are rank-one.
|
1280 |
+
Since the tightness of applying SDR can be guaran-
|
1281 |
+
teed, the obtained solutions {w0, Φ0, τ, p} are glob-
|
1282 |
+
ally optimal [23]. Then, we use the one-dimensional
|
1283 |
+
search method to exploit the optimal energy trans-
|
1284 |
+
mission time τ0 by setting an appropriate step size.
|
1285 |
+
Thirdly, for the optimization of RIS reflecting coef-
|
1286 |
+
ficients for the WIT phase, we decompose P4 into two
|
1287 |
+
sub-problems. On the one hand, the optimal phase
|
1288 |
+
shifts have been derived in a closed-form which has
|
1289 |
+
been proved. On the other hand, P4-1 is solved by
|
1290 |
+
Algorithm 2, which obtains the reflection amplitudes
|
1291 |
+
of {Φk} are near-optima of the original problem [38].
|
1292 |
+
Hence, Algorithm 3 can be used to obtain the near-
|
1293 |
+
optimal solutions to P1 with a high accuracy.
|
1294 |
+
Algorithm 3. AO algorithm for P1
|
1295 |
+
1: Initialization: w0, {wk}, Φ0, {Φk}, τ0, τ, p, ∀k.
|
1296 |
+
2: repeat
|
1297 |
+
3:
|
1298 |
+
Given Φk and p, update {wk} by (17).
|
1299 |
+
4:
|
1300 |
+
Given Φ0, τ0, {Φk}, {wk}, update w0 with by
|
1301 |
+
solving P2-1.
|
1302 |
+
5:
|
1303 |
+
Given w0, {wk}, {Φk}, update Φ0, τ0, τ and p
|
1304 |
+
by Algorithm 1.
|
1305 |
+
6:
|
1306 |
+
Given {wk} and p, update {Φk} by Algorithm
|
1307 |
+
2.
|
1308 |
+
7: until �K
|
1309 |
+
k=1 Rk converged.
|
1310 |
+
8: return w∗
|
1311 |
+
0, {w∗
|
1312 |
+
k}, Φ∗
|
1313 |
+
0, {Φ∗
|
1314 |
+
k}, τ ∗
|
1315 |
+
0 , τ ∗, p∗.
|
1316 |
+
V. NUMERICAL RESULTS
|
1317 |
+
In this section, numerical results are presented to eval-
|
1318 |
+
uate the performance of the proposed scheme.
|
1319 |
+
As
|
1320 |
+
shown in Figure 3, we consider that the simulated net-
|
1321 |
+
work deployment is a 2-D coordinate system, where
|
1322 |
+
���
|
1323 |
+
��
|
1324 |
+
(!)
|
1325 |
+
(0,0)
|
1326 |
+
( ", 0)
|
1327 |
+
( #, 0)
|
1328 |
+
$(!)
|
1329 |
+
( %, &)
|
1330 |
+
���������
|
1331 |
+
��
|
1332 |
+
Figure 3. Placement model of simulation setup.
|
1333 |
+
the coordinates of the PS, the RIS, and the RS are
|
1334 |
+
given as (0,0), (xr, 0), and (xs,0), respectively, the
|
1335 |
+
users are randomly deployed within a circular area
|
1336 |
+
centered at (xu, xh) with radius 1m. We follow the
|
1337 |
+
channel model considered in [29]. In particular, the
|
1338 |
+
large-scale path-loss is modeled as L = A(d/d0)−α,
|
1339 |
+
where A is the path-loss at the reference distance
|
1340 |
+
d0 = 1m and set as A = −30dB, d denotes the dis-
|
1341 |
+
tance between two nodes, and α is the path-loss expo-
|
1342 |
+
nent. For the RIS related links, the path-loss exponent
|
1343 |
+
is set as 2.2 since the location of RIS can be carefully
|
1344 |
+
designed to avoid the severe signal blockage. While
|
1345 |
+
the path-loss exponents for the RIS unrelated links are
|
1346 |
+
set as 3.5 due to the users’ random deployment. We
|
1347 |
+
assume the direct link channels follow Rayleigh fad-
|
1348 |
+
ing but the RIS related channels follow Rician fading.
|
1349 |
+
Specifically, the small-scale channel from the PS to the
|
1350 |
+
RIS can be expressed as
|
1351 |
+
Hr =
|
1352 |
+
��
|
1353 |
+
βr
|
1354 |
+
βr + 1
|
1355 |
+
¯
|
1356 |
+
HLoS
|
1357 |
+
r
|
1358 |
+
+
|
1359 |
+
�
|
1360 |
+
1
|
1361 |
+
βr + 1
|
1362 |
+
¯
|
1363 |
+
HNLoS
|
1364 |
+
r
|
1365 |
+
�
|
1366 |
+
(51)
|
1367 |
+
where βr is the Rician factor for the PS-RIS link,
|
1368 |
+
¯
|
1369 |
+
HLoS
|
1370 |
+
r
|
1371 |
+
denotes the deterministic line of sight (LoS)
|
1372 |
+
component, and ¯
|
1373 |
+
HNLoS
|
1374 |
+
r
|
1375 |
+
denotes the non-LoS compo-
|
1376 |
+
tent with circularly symmetric complex Gaussian ran-
|
1377 |
+
dom variables with zero mean and unit variance. The
|
1378 |
+
other channels can be similarly defined. Unless oth-
|
1379 |
+
erwise stated, other parameters are given as follows:
|
1380 |
+
βr = 10 [39], ρ = 0.8, σ2
|
1381 |
+
v = σ2
|
1382 |
+
r = −90dBm,
|
1383 |
+
P0 = 20dBm [20], Pr = 20dBm, amax = 25dB
|
1384 |
+
[40], N = 10, K = 4, M = 4, L = 4, xr = 10m,
|
1385 |
+
xu = 10m, xs = 20m, and xh = 2m.
|
1386 |
+
For comparisons, we also evaluate the performance
|
1387 |
+
of the following benchmark schemes:
|
1388 |
+
(1) Active RIS-aided single-antenna WPCN scheme
|
1389 |
+
(Active-SA).
|
1390 |
+
China Communications
|
1391 |
+
11
|
1392 |
+
|
1393 |
+
(2) Passive RIS-aided multi-antenna WPCN scheme
|
1394 |
+
(Passive-MA).
|
1395 |
+
(3) Active RIS-aided multi-antenna WPCN with uni-
|
1396 |
+
form energy beamforming scheme (Active-MA-
|
1397 |
+
UEBF).
|
1398 |
+
Notice that for the multi-antenna schemes, the num-
|
1399 |
+
ber of antennas is set as 4 in the PS and RS. In addition,
|
1400 |
+
we set the number of REs in the Passive-MA scheme
|
1401 |
+
as N = 100 to show the superiority of the proposed
|
1402 |
+
scheme.
|
1403 |
+
Before performance comparisons, we first show the
|
1404 |
+
convergence performance of the proposed AO algo-
|
1405 |
+
rithm in Figure 4. One can observe that as the num-
|
1406 |
+
ber of iterations increases, the sum-rate first increases
|
1407 |
+
but finally converges to a constant after nearly 8 iter-
|
1408 |
+
ations. This demonstrates that the convergence of the
|
1409 |
+
proposed scheme can be achieved quickly. The other
|
1410 |
+
observation is that the effect of the parameter setting
|
1411 |
+
on convergence is limited.
|
1412 |
+
2
|
1413 |
+
4
|
1414 |
+
6
|
1415 |
+
8
|
1416 |
+
10
|
1417 |
+
12
|
1418 |
+
Number of iterations
|
1419 |
+
13
|
1420 |
+
14
|
1421 |
+
15
|
1422 |
+
16
|
1423 |
+
17
|
1424 |
+
18
|
1425 |
+
19
|
1426 |
+
20
|
1427 |
+
21
|
1428 |
+
22
|
1429 |
+
23
|
1430 |
+
Sum rate (bps/Hz)
|
1431 |
+
N=10, M=L=4
|
1432 |
+
N=10, M=L=8
|
1433 |
+
N=20, M=L=4
|
1434 |
+
N=20, M=L=8
|
1435 |
+
N=30, M=L=4
|
1436 |
+
N=30, M=L=8
|
1437 |
+
Figure 4.
|
1438 |
+
Convergence behavior of the proposed scheme
|
1439 |
+
under different parameter settings.
|
1440 |
+
Figure 5 shows the impact of the transmit power
|
1441 |
+
at the PS (i.e., P0) on the sum-rate when the RIS’s
|
1442 |
+
maximum reflecting power Pr = 10, 20 dBm and
|
1443 |
+
the RIS’s maximum amplitude reflection coefficient
|
1444 |
+
amax = 10, 25 dB, respectively. In general, the pro-
|
1445 |
+
posed scheme outperforms the Active-SA scheme with
|
1446 |
+
the same parameters, which confirms that the assis-
|
1447 |
+
tance of multiple antennas can achieve a significant
|
1448 |
+
performance gain by constructing the transmit beam-
|
1449 |
+
forming at the PS and the receive beamforming at the
|
1450 |
+
RS. For a given amax = 25 dB, our proposed scheme
|
1451 |
+
with 10 REs can achieve 415.48% performance gain
|
1452 |
+
5
|
1453 |
+
10
|
1454 |
+
15
|
1455 |
+
20
|
1456 |
+
25
|
1457 |
+
30
|
1458 |
+
35
|
1459 |
+
40
|
1460 |
+
45
|
1461 |
+
Transmit power at the PS(dBm)
|
1462 |
+
0
|
1463 |
+
5
|
1464 |
+
10
|
1465 |
+
15
|
1466 |
+
20
|
1467 |
+
25
|
1468 |
+
30
|
1469 |
+
35
|
1470 |
+
Sum rate (bps/Hz)
|
1471 |
+
Proposed, Pr=20, amax=25
|
1472 |
+
Proposed, Pr=20, amax=10
|
1473 |
+
Proposed, Pr=10, amax=25
|
1474 |
+
Proposed, Pr=10, amax=10
|
1475 |
+
Active-SA, Pr=20, amax=25
|
1476 |
+
Active-SA, Pr=20, amax=10
|
1477 |
+
Passive-MA, N=100
|
1478 |
+
Figure 5. Sum-rate versus the transmit power at the PS.
|
1479 |
+
compared to the passive RIS scheme with 100 REs
|
1480 |
+
when P0 = 20 dBm. Indeed, the active RIS can con-
|
1481 |
+
siderably make use of its amplification characteristic
|
1482 |
+
to amplify the energy signals at low transmit power
|
1483 |
+
and thereby realize a superior capability at the cost of
|
1484 |
+
additional power consumption. For a given amax = 10
|
1485 |
+
dB, it can be seen that the sum-rates achieved by the
|
1486 |
+
proposed scheme with Pr = 20 dBm and Pr = 10
|
1487 |
+
dBm are almost the same, which implies that the am-
|
1488 |
+
plification power constraints defined in (7) and (11)
|
1489 |
+
are inactive since amax is limited for the small trans-
|
1490 |
+
mit power. Note that, the performance gap is signif-
|
1491 |
+
icant between the scheme with amax = 25 dB and
|
1492 |
+
amax = 10 dB because amax directly limits the ampli-
|
1493 |
+
tude reflection coefficient of the active RIS. In addi-
|
1494 |
+
tion, the sum-rate of the passive-MA scheme is gener-
|
1495 |
+
ally lower than the active RIS schemes with the same
|
1496 |
+
REs and the passive RIS needs to be equipped with
|
1497 |
+
more REs (e.g., 100 REs) to achieve the similar per-
|
1498 |
+
formance.
|
1499 |
+
In Figure 6, we evaluate the sum-rate versus the
|
1500 |
+
number of reflecting elements at the RIS. It can be
|
1501 |
+
seen that the proposed schemes can achieve a higher
|
1502 |
+
performance gain compared with the other benchmark
|
1503 |
+
schemes. With an increasing number of reflecting ele-
|
1504 |
+
ments, the sum-rate increases due to the fact that more
|
1505 |
+
transmission links can be provided for both the WET
|
1506 |
+
and the WIT. In addition, to investigate the best system
|
1507 |
+
performance, the maximum number of users is set to
|
1508 |
+
be equal to the number of REs. Since the active RIS
|
1509 |
+
can amplify the incident signals, a limited number of
|
1510 |
+
REs is sufficient to reach the desired SNR. Therefore,
|
1511 |
+
the size of active RIS can be reduced, making it ap-
|
1512 |
+
12
|
1513 |
+
China Communications
|
1514 |
+
|
1515 |
+
5
|
1516 |
+
10
|
1517 |
+
15
|
1518 |
+
20
|
1519 |
+
25
|
1520 |
+
30
|
1521 |
+
35
|
1522 |
+
Number of REs
|
1523 |
+
10
|
1524 |
+
12
|
1525 |
+
14
|
1526 |
+
16
|
1527 |
+
18
|
1528 |
+
20
|
1529 |
+
22
|
1530 |
+
24
|
1531 |
+
Sum rate (bps/Hz)
|
1532 |
+
Proposed, K=4
|
1533 |
+
Proposed, K=N
|
1534 |
+
Active-SA, K=4
|
1535 |
+
Active-SA, K=N
|
1536 |
+
Active-MA-UEBF, K=4
|
1537 |
+
Active-MA-UEBF, K=N
|
1538 |
+
Figure 6. Sum-rate versus number of reflecting elements at
|
1539 |
+
the RIS.
|
1540 |
+
2
|
1541 |
+
3
|
1542 |
+
4
|
1543 |
+
5
|
1544 |
+
6
|
1545 |
+
7
|
1546 |
+
8
|
1547 |
+
9
|
1548 |
+
10
|
1549 |
+
Number of Users
|
1550 |
+
2
|
1551 |
+
4
|
1552 |
+
6
|
1553 |
+
8
|
1554 |
+
10
|
1555 |
+
12
|
1556 |
+
14
|
1557 |
+
16
|
1558 |
+
18
|
1559 |
+
20
|
1560 |
+
Sum rate (bps/Hz)
|
1561 |
+
Proposed
|
1562 |
+
Active-SA
|
1563 |
+
Active-MA-UEBF
|
1564 |
+
Passive-MA
|
1565 |
+
Figure 7. Sum-rate versus the number of users.
|
1566 |
+
plicable to the scenario where the space for the RIS
|
1567 |
+
deployment is limited.
|
1568 |
+
In Figure 7, we study the effect of number of user
|
1569 |
+
on the sum-rate. As the number of users increases,
|
1570 |
+
the total amount of harvested energy by users im-
|
1571 |
+
proves, which results in a higher sum-rate. Nonethe-
|
1572 |
+
less, when the number of users reaches a threshold,
|
1573 |
+
e.g.
|
1574 |
+
K = 8, the sum-rate achieved by our pro-
|
1575 |
+
posed scheme becomes to be saturated. This is due
|
1576 |
+
to the fact that the increment of number of users re-
|
1577 |
+
duces the energy transfer duration and the time allo-
|
1578 |
+
cated to each user for information transmission, which
|
1579 |
+
makes the sum-rate converge to a constant. Again,
|
1580 |
+
our proposed scheme notably outperforms the other
|
1581 |
+
benchmark schemes.
|
1582 |
+
For example, when the num-
|
1583 |
+
ber of users is K = 4, our proposed scheme can
|
1584 |
+
achieve 17.78% and 415.48% performance gain com-
|
1585 |
+
1
|
1586 |
+
2.5
|
1587 |
+
4
|
1588 |
+
5.5
|
1589 |
+
7
|
1590 |
+
8.5
|
1591 |
+
10
|
1592 |
+
11.5
|
1593 |
+
13
|
1594 |
+
14.5
|
1595 |
+
16
|
1596 |
+
17.5
|
1597 |
+
19
|
1598 |
+
Location of RIS
|
1599 |
+
0
|
1600 |
+
5
|
1601 |
+
10
|
1602 |
+
15
|
1603 |
+
20
|
1604 |
+
25
|
1605 |
+
Sum rate (bps/Hz)
|
1606 |
+
Proposed
|
1607 |
+
Active-SA
|
1608 |
+
Active-MA-UEBF
|
1609 |
+
Passive-MA
|
1610 |
+
Figure 8. Sum-rate versus x-coordinate of the RIS.
|
1611 |
+
pared with the Active-SA scheme and the Passive-MA
|
1612 |
+
scheme with 100 REs, respectively.
|
1613 |
+
In Figure 8, we plot the sum-rate versus the hori-
|
1614 |
+
zontal ordinate of the RIS. As xr varies, the sum-rates
|
1615 |
+
of all schemes first increase but then decrease. Com-
|
1616 |
+
pared to the scenario that the RIS is close to the RS,
|
1617 |
+
by deploying the RIS near the PS, e.g., xr = 1, the
|
1618 |
+
sum-rate can be improved.
|
1619 |
+
It is because the users
|
1620 |
+
can harvest more energy assisted by the active RIS.
|
1621 |
+
Moreover, we can observe that the sum-rate is maxi-
|
1622 |
+
mized at xr = 10, where the reflecting link between
|
1623 |
+
the active RIS and each user is strongest so the users
|
1624 |
+
can benefit from a larger amplification and reflection
|
1625 |
+
gain. However, when the RIS is neither close to the
|
1626 |
+
PS nor the users, both the PS-RIS link and the RIS-
|
1627 |
+
users links become weak, which results in the reduce
|
1628 |
+
of harvested energy. Furthermore, since the Active-
|
1629 |
+
MA-UEBF scheme adopts the uniform energy beam-
|
1630 |
+
forming, the energy signals cannot adaptively align
|
1631 |
+
with the direction of the desired channels, which re-
|
1632 |
+
sults in a low WET efficiency. In addition, the schemes
|
1633 |
+
with the active RIS can achieve a much better perfor-
|
1634 |
+
mance than the passive RIS scheme, which demon-
|
1635 |
+
strates that the active RIS with the amplification func-
|
1636 |
+
tionality can significantly mitigates the double-fading
|
1637 |
+
effect. The above observation demonstrates that the lo-
|
1638 |
+
cation of the active RIS should be carefully designed.
|
1639 |
+
VI. CONCLUSIONS
|
1640 |
+
In this paper, we have proposed an active RIS as-
|
1641 |
+
sisted relaying scheme to enhance the performance
|
1642 |
+
of multiuser multi-antenna WPCN, which is involved
|
1643 |
+
China Communications
|
1644 |
+
13
|
1645 |
+
|
1646 |
+
in both the WET from the PS to users and the WIT
|
1647 |
+
from users to the RS. To further enhance system per-
|
1648 |
+
formance, both transmit beamforming at the PS and
|
1649 |
+
receive beamforming at the RS have been designed.
|
1650 |
+
We have formulated a system sum-rate maximization
|
1651 |
+
problem by jointly optimizing the RIS reflection coef-
|
1652 |
+
ficients for both the WET and the WIT, transmit and
|
1653 |
+
receive beamforming vectors, transmit power at each
|
1654 |
+
user, and network time scheduling. As the formulated
|
1655 |
+
problem is non-convex, we have proposed an AO al-
|
1656 |
+
gorithm with linear MMSE, SDR and SCA techniques
|
1657 |
+
to solve it efficiently. Finally, numerical results have
|
1658 |
+
been provided to confirm the performance superiority
|
1659 |
+
of the proposed scheme.
|
1660 |
+
APPENDIX
|
1661 |
+
A. Proof of Proposition 1
|
1662 |
+
The Lagrangian function of P2-1 can be expressed as
|
1663 |
+
L =
|
1664 |
+
K
|
1665 |
+
�
|
1666 |
+
k=1
|
1667 |
+
λkβTr(Hd,kW0) − ξTr(W0)
|
1668 |
+
+ Tr(ΩW) + δ, ∀k,
|
1669 |
+
(52)
|
1670 |
+
where λk ≥ 0, ξ ≥ 0, and Ω ∈ HM are the Lagrange
|
1671 |
+
multipliers associated with constraints (21), (22), and
|
1672 |
+
(24), respectively, δ denotes the term unrelated with
|
1673 |
+
W0. The Karush-Kuhn-Tucker (KKT) conditions of
|
1674 |
+
P2-1 are given as follows
|
1675 |
+
∂L
|
1676 |
+
∂W0
|
1677 |
+
=
|
1678 |
+
K
|
1679 |
+
�
|
1680 |
+
k=1
|
1681 |
+
λ∗
|
1682 |
+
kβHd,k − ξ∗IM + Ω∗ = 0,
|
1683 |
+
(53)
|
1684 |
+
Ω∗W ∗
|
1685 |
+
0 = 0,
|
1686 |
+
(54)
|
1687 |
+
where λ∗
|
1688 |
+
k, ξ∗ and Ω∗ are the optimal Lagrangian mul-
|
1689 |
+
tipliers for the dual problem of P2-1. It can be proved
|
1690 |
+
that λ∗
|
1691 |
+
k > 0 and ξ∗ > 0 since the constraints (21) and
|
1692 |
+
(22)are equalities in the optimal condition. Based on
|
1693 |
+
(53) and (54), it is straightforward to obtain the fol-
|
1694 |
+
lowing equality
|
1695 |
+
(ξ∗IM −
|
1696 |
+
K
|
1697 |
+
�
|
1698 |
+
k=1
|
1699 |
+
λ∗
|
1700 |
+
kβHd,k)W ∗
|
1701 |
+
0 = 0
|
1702 |
+
(55)
|
1703 |
+
According to [41], rank(ξ∗IM −�K
|
1704 |
+
k=1 λ∗
|
1705 |
+
kβHd,k) ≥
|
1706 |
+
M − 1 due to the fact that Hd,k for ∀k are indepen-
|
1707 |
+
dently distributed. Thus, from (55), we can obtain that
|
1708 |
+
rank(W0) ≤ 1. It is obvious that W0 = 0 is not
|
1709 |
+
the optimal solution to P2-1. Hence, we derive that
|
1710 |
+
rank(W0) = 1, which thus proves Proposition 1.
|
1711 |
+
B. Proof of Proposition 2
|
1712 |
+
Since Qr and Fk are diagonal matrices, we observe
|
1713 |
+
that the noise power in the denominator of (35) and the
|
1714 |
+
amplification power in (9) and (36) are independent
|
1715 |
+
of the phase shift of each RE. Therefore, maximizing
|
1716 |
+
γk with respect to Θk is equivalent to the following
|
1717 |
+
optimization problem
|
1718 |
+
(P4-4) max
|
1719 |
+
Θk
|
1720 |
+
��bH
|
1721 |
+
k Θk ¯ϕk + gd,k
|
1722 |
+
��2
|
1723 |
+
(56)
|
1724 |
+
s.t.
|
1725 |
+
|Θk,n| = 1, ∀k, ∀n.
|
1726 |
+
(57)
|
1727 |
+
We rewrite the objective function as
|
1728 |
+
��bH
|
1729 |
+
k Θk ¯ϕk
|
1730 |
+
��2 + |gd,k|2 + 2
|
1731 |
+
��bH
|
1732 |
+
k Θk ¯ϕk
|
1733 |
+
�� |gd,k| cos α,
|
1734 |
+
(58)
|
1735 |
+
where α = arctan Im(bH
|
1736 |
+
k Θk ¯ϕk)
|
1737 |
+
Re(bH
|
1738 |
+
k Θk ¯ϕk) − arctan Im(gd,k)
|
1739 |
+
Re(gd,k).
|
1740 |
+
Obviously, the maximum of
|
1741 |
+
��bH
|
1742 |
+
k Θk ¯ϕk + gd,k
|
1743 |
+
��2 is
|
1744 |
+
achieved when arg(bH
|
1745 |
+
k Θk ¯ϕk) = arg(gd,k) ≜ ω.
|
1746 |
+
Let vk = [vk,1, vk,2, ..., vk,N]T ∈ RN×1 and ξk =
|
1747 |
+
diag(bH
|
1748 |
+
k ) ¯ϕk.
|
1749 |
+
As bH
|
1750 |
+
k Θk ¯ϕk = vH
|
1751 |
+
k ξk, P4-4 can be
|
1752 |
+
rewritten as
|
1753 |
+
(P4-5) max
|
1754 |
+
vk
|
1755 |
+
��vH
|
1756 |
+
k ξk
|
1757 |
+
��2
|
1758 |
+
(59)
|
1759 |
+
s.t.
|
1760 |
+
|vk,n| = 1, ∀k, ∀n,
|
1761 |
+
(60)
|
1762 |
+
arg(vH
|
1763 |
+
k ξk) = ω, ∀k.
|
1764 |
+
(61)
|
1765 |
+
Based on [12],
|
1766 |
+
the optimal solution to P4-
|
1767 |
+
5 can be expressed as v∗
|
1768 |
+
k
|
1769 |
+
=
|
1770 |
+
ej(ω−arg(ξk))
|
1771 |
+
=
|
1772 |
+
ej(ω−arg(diag(bH
|
1773 |
+
k ) ¯ϕk)).
|
1774 |
+
Then, the optimal RIS phase
|
1775 |
+
shift for the n-th RE is expressed as θk,n
|
1776 |
+
=
|
1777 |
+
arg(gd,k) − arg(bH
|
1778 |
+
k,n) − arg( ¯ϕk,n). Finally, we ob-
|
1779 |
+
tain that θk,n = arg(gd,k)−arg(gu,k,n)+arg(gr,k,n),
|
1780 |
+
∀k, ∀n. This completes the proof of Proposition 2.
|
1781 |
+
References
|
1782 |
+
[1] SOMOV A, GIAFFREDA R. Powering IoT de-
|
1783 |
+
vices: Technologies and opportunities[J]. IEEE
|
1784 |
+
IoT Newsletter, 2015.
|
1785 |
+
[2] VARSHNEY L R. Transporting information and
|
1786 |
+
energy simultaneously[C]//2008 IEEE Interna-
|
1787 |
+
14
|
1788 |
+
China Communications
|
1789 |
+
|
1790 |
+
tional Symposium on Information Theory. IEEE,
|
1791 |
+
2008: 1612-1616.
|
1792 |
+
[3] ZHONG C, SURAWEERA H A, ZHENG G,
|
1793 |
+
et al. Wireless information and power transfer
|
1794 |
+
with full duplex relaying[J]. IEEE Transactions
|
1795 |
+
on Communications, 2014, 62(10): 3447-3461.
|
1796 |
+
[4] WU Q, GUAN X, ZHANG R. Intelligent reflect-
|
1797 |
+
ing surface-aided wireless energy and informa-
|
1798 |
+
tion transmission: An overview[J]. Proceedings
|
1799 |
+
of the IEEE, 2021.
|
1800 |
+
[5] ZHANG R, HO C K.
|
1801 |
+
MIMO broadcasting
|
1802 |
+
for simultaneous wireless information and power
|
1803 |
+
transfer[J]. IEEE Transactions on Wireless Com-
|
1804 |
+
munications, 2013, 12(5): 1989-2001.
|
1805 |
+
[6] JU H, ZHANG R.
|
1806 |
+
Throughput maximization
|
1807 |
+
in wireless powered communication networks
|
1808 |
+
[J]. IEEE Transactions on Wireless Communi-
|
1809 |
+
cations, 2013, 13(1): 418-428.
|
1810 |
+
[7] JU H, ZHANG R.
|
1811 |
+
User cooperation in
|
1812 |
+
wireless powered communication networks[C]//
|
1813 |
+
2014 IEEE Global Communications Conference.
|
1814 |
+
IEEE, 2014: 1430-1435.
|
1815 |
+
[8] JU H, ZHANG R. Optimal resource allocation
|
1816 |
+
in full-duplex wireless-powered communication
|
1817 |
+
network[J]. IEEE Transactions on Communica-
|
1818 |
+
tions, 2014, 62(10): 3528-3540.
|
1819 |
+
[9] KIM J, LEE H, SONG C, et al. Sum through-
|
1820 |
+
put maximization for multi-user MIMO cogni-
|
1821 |
+
tive wireless powered communication networks
|
1822 |
+
[J]. IEEE Transactions on Wireless Communica-
|
1823 |
+
tions, 2016, 16(2): 913-923.
|
1824 |
+
[10] WU Q, TAO M, NG D W K, et al.
|
1825 |
+
Energy-
|
1826 |
+
efficient resource allocation for wireless pow-
|
1827 |
+
ered communication networks[J]. IEEE Trans-
|
1828 |
+
actions on Wireless Communications, 2015, 15
|
1829 |
+
(3): 2312-2327.
|
1830 |
+
[11] WU Q, CHEN W, LI J. Wireless powered com-
|
1831 |
+
munications with initial energy: QoS guaranteed
|
1832 |
+
energy-efficient resource allocation[J].
|
1833 |
+
IEEE
|
1834 |
+
Communications Letters, 2015, 19(12): 2278-
|
1835 |
+
2281.
|
1836 |
+
[12] WU Q, ZHANG R. Intelligent Reflecting Sur-
|
1837 |
+
face Enhanced Wireless Network via Joint Ac-
|
1838 |
+
tive and Passive Beamforming[J]. IEEE Trans-
|
1839 |
+
actions on Wireless Communications, 2019, 18
|
1840 |
+
(11): 5394-5409.
|
1841 |
+
[13] DI RENZO M, ZAPPONE A, DEBBAH M, et al.
|
1842 |
+
Smart radio environments empowered by recon-
|
1843 |
+
figurable intelligent surfaces: How it works, state
|
1844 |
+
of research, and the road ahead[J]. IEEE journal
|
1845 |
+
on selected areas in communications, 2020, 38
|
1846 |
+
(11): 2450-2525.
|
1847 |
+
[14] KUNDU N K, MCKAY M R.
|
1848 |
+
RIS-Assisted
|
1849 |
+
MISO Communication:
|
1850 |
+
Optimal Beamform-
|
1851 |
+
ers and Performance Analysis[C]//2020 IEEE
|
1852 |
+
Globecom Workshops (GC Wkshps. Taipei, Tai-
|
1853 |
+
wan: IEEE, 2020: 1-6.
|
1854 |
+
[15] ZOU Y, GONG S, XU J, et al. Wireless pow-
|
1855 |
+
ered intelligent reflecting surfaces for enhancing
|
1856 |
+
wireless communications[J]. IEEE Transactions
|
1857 |
+
on Vehicular Technology, 2020, 69(10): 12369-
|
1858 |
+
12373.
|
1859 |
+
[16] ZHANG Z, DAI L. A joint precoding framework
|
1860 |
+
for wideband reconfigurable intelligent surface-
|
1861 |
+
aided cell-free network[J]. IEEE Transactions on
|
1862 |
+
Signal Processing, 2021, 69: 4085-4101.
|
1863 |
+
[17] LIANG Y C, CHEN J, LONG R, et al. Recon-
|
1864 |
+
figurable intelligent surfaces for smart wireless
|
1865 |
+
environments: Channel estimation, system de-
|
1866 |
+
sign and applications in 6G networks[J]. Science
|
1867 |
+
China Information Sciences, 2021, 64(10): 1-21.
|
1868 |
+
[18] YU X, JAMALI V, XU D, et al. Smart and recon-
|
1869 |
+
figurable wireless communications: From IRS
|
1870 |
+
modeling to algorithm design[J]. IEEE Wireless
|
1871 |
+
Communications, 2021, 28(6): 118-125.
|
1872 |
+
[19] ZHANG Z, DAI L, CHEN X, et al. Active RIS
|
1873 |
+
vs. passive RIS: Which will prevail in 6G?[A].
|
1874 |
+
2021. arXiv: 2103.15154.
|
1875 |
+
[20] LONG R, LIANG Y C, PEI Y, et al.
|
1876 |
+
Active
|
1877 |
+
reconfigurable intelligent surface-aided wireless
|
1878 |
+
communications[J]. IEEE Transactions on Wire-
|
1879 |
+
less Communications, 2021, 20(8): 4962-4975.
|
1880 |
+
[21] LYU B, RAMEZANI P, HOANG D T, et al.
|
1881 |
+
Optimized Energy and Information Relaying
|
1882 |
+
in Self-Sustainable IRS-Empowered WPCN[J].
|
1883 |
+
IEEE TRANSACTIONS ON COMMUNICA-
|
1884 |
+
TIONS, 2021, 69(1): 15.
|
1885 |
+
[22] ZHENG Y, BI S, ZHANG Y J A, et al. Joint
|
1886 |
+
beamforming and power control for throughput
|
1887 |
+
maximization in IRS-assisted MISO WPCNs[J].
|
1888 |
+
IEEE Internet of Things Journal, 2021, 8(10):
|
1889 |
+
8399-8410.
|
1890 |
+
[23] HUA M, WU Q, POOR H V. Power-Efficient
|
1891 |
+
Passive Beamforming and Resource Allocation
|
1892 |
+
for IRS-Aided WPCNs[J]. IEEE Transactions on
|
1893 |
+
Communications, 2022.
|
1894 |
+
China Communications
|
1895 |
+
15
|
1896 |
+
|
1897 |
+
[24] XU Y, GAO Z, WANG Z, et al. RIS-enhanced
|
1898 |
+
WPCNs: Joint radio resource allocation and pas-
|
1899 |
+
sive beamforming optimization[J]. IEEE Trans-
|
1900 |
+
actions on Vehicular Technology, 2021, 70(8):
|
1901 |
+
7980-7991.
|
1902 |
+
[25] YOU C, ZHANG R. Wireless communication
|
1903 |
+
aided by intelligent reflecting surface: Active
|
1904 |
+
or passive?[J]. IEEE Wireless Communications
|
1905 |
+
Letters, 2021, 10(12): 2659-2663.
|
1906 |
+
[26] DONG L, WANG H M, BAI J.
|
1907 |
+
Active Re-
|
1908 |
+
configurable Intelligent Surface Aided Secure
|
1909 |
+
Transmission[J]. IEEE Transactions on Vehic-
|
1910 |
+
ular Technology, 2021.
|
1911 |
+
[27] ZARGARI S, HAKIMI A, TELLAMBURA C,
|
1912 |
+
et al. Multiuser MISO PS-SWIPT Systems: Ac-
|
1913 |
+
tive or Passive RIS?[J]. IEEE Wireless Commu-
|
1914 |
+
nications Letters, 2022.
|
1915 |
+
[28] GAO Y, WU Q, ZHANG G, et al. Beamform-
|
1916 |
+
ing Optimization for Active Intelligent Reflect-
|
1917 |
+
ing Surface-Aided SWIPT[A].
|
1918 |
+
2022.
|
1919 |
+
arXiv:
|
1920 |
+
2203.16093.
|
1921 |
+
[29] ZENG P, QIAO D, WU Q, et al.
|
1922 |
+
Throughput
|
1923 |
+
Maximization for Active Intelligent Reflecting
|
1924 |
+
Surface Aided Wireless Powered Communica-
|
1925 |
+
tions[J].
|
1926 |
+
IEEE Wireless Communications Let-
|
1927 |
+
ters, 2022.
|
1928 |
+
[30] WU Q, ZHANG R. Weighted Sum Power Maxi-
|
1929 |
+
mization for Intelligent Reflecting Surface Aided
|
1930 |
+
SWIPT[J]. IEEE WIRELESS COMMUNICA-
|
1931 |
+
TIONS LETTERS, 2020, 9(5): 5.
|
1932 |
+
[31] HU S, WEI Z, CAI Y, et al.
|
1933 |
+
Robust and se-
|
1934 |
+
cure sum-rate maximization for multiuser MISO
|
1935 |
+
downlink systems with self-sustainable IRS[J].
|
1936 |
+
IEEE Transactions on Communications, 2021,
|
1937 |
+
69(10): 7032-7049.
|
1938 |
+
[32] ZHENG B, ZHANG R.
|
1939 |
+
Intelligent reflect-
|
1940 |
+
ing surface-enhanced OFDM: Channel estima-
|
1941 |
+
tion and reflection optimization[J]. IEEE Wire-
|
1942 |
+
less Communications Letters, 2019, 9(4): 518-
|
1943 |
+
522.
|
1944 |
+
[33] WU Q, ZHANG S, ZHENG B, et al.
|
1945 |
+
Intel-
|
1946 |
+
ligent reflecting surface-aided wireless commu-
|
1947 |
+
nications: A tutorial[J]. IEEE Transactions on
|
1948 |
+
Communications, 2021, 69(5): 3313-3351.
|
1949 |
+
[34] WANG Z, LIU L, CUI S.
|
1950 |
+
Channel Estima-
|
1951 |
+
tion for Intelligent Reflecting Surface Assisted
|
1952 |
+
Multiuser Communications: Framework, Algo-
|
1953 |
+
rithms, and Analysis[J]. IEEE Transactions on
|
1954 |
+
Wireless Communications, 2020, 19(10): 6607-
|
1955 |
+
6620.
|
1956 |
+
[35] ZHENG Y, BI S, ZHANG Y J, et al.
|
1957 |
+
Intel-
|
1958 |
+
ligent reflecting surface enhanced user cooper-
|
1959 |
+
ation in wireless powered communication net-
|
1960 |
+
works[J]. IEEE Wireless Communications Let-
|
1961 |
+
ters, 2020, 9(6): 901-905.
|
1962 |
+
[36] LUO Z Q, MA W K, SO A, et al. Semidefinite
|
1963 |
+
Relaxation of Quadratic Optimization Problems
|
1964 |
+
[J]. IEEE Signal Processing Magazine, 2010, 27
|
1965 |
+
(3): 20-34.
|
1966 |
+
[37] BOYD S, BOYD S P, VANDENBERGHE L.
|
1967 |
+
Convex optimization[M]. Cambridge university
|
1968 |
+
press, 2004.
|
1969 |
+
[38] RAZAVIYAYN M. Successive Convex Approx-
|
1970 |
+
imation: Analysis and Applications[D]. Univer-
|
1971 |
+
sity of Minnesota, 2014.
|
1972 |
+
[39] GUO H, LIANG Y C, CHEN J, et al. Weighted
|
1973 |
+
Sum-Rate Maximization for Reconfigurable In-
|
1974 |
+
telligent Surface Aided Wireless Networks[J].
|
1975 |
+
IEEE Transactions on Wireless Communica-
|
1976 |
+
tions, 2020, 19(5): 3064-3076.
|
1977 |
+
[40] AMATO F, PETERSON C W, DEGNAN B P,
|
1978 |
+
et al. Tunneling RFID tags for long-range and
|
1979 |
+
low-power microwave applications[J].
|
1980 |
+
IEEE
|
1981 |
+
Journal of Radio Frequency Identification, 2018,
|
1982 |
+
2(2): 93-103.
|
1983 |
+
[41] XU X, LIANG Y C, YANG G, et al.
|
1984 |
+
Recon-
|
1985 |
+
figurable intelligent surface empowered symbi-
|
1986 |
+
otic radio over broadcasting signals[J].
|
1987 |
+
IEEE
|
1988 |
+
Transactions on Communications, 2021, 69(10):
|
1989 |
+
7003-7016.
|
1990 |
+
16
|
1991 |
+
China Communications
|
1992 |
+
|
2tAzT4oBgHgl3EQf9P4T/content/tmp_files/load_file.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
2tAzT4oBgHgl3EQffPw3/content/2301.01448v1.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:52e3119012d28abcb3e31e3a4c4d7e3c4ce978b7eca9465e40953ebdeae5f93c
|
3 |
+
size 2705653
|
2tAzT4oBgHgl3EQffPw3/vector_store/index.pkl
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:d2e0733b8a2cae6fef03ecad865e1bb553559562789b707c812a45b8511caeba
|
3 |
+
size 262850
|
39AyT4oBgHgl3EQfo_il/vector_store/index.faiss
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:a9e9abf03196fda13fc079c01130ca85a966551d2fb0c027572d70be6b148f08
|
3 |
+
size 3670061
|
49FKT4oBgHgl3EQfSC3u/content/tmp_files/2301.11774v1.pdf.txt
ADDED
@@ -0,0 +1,1133 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
Reinforcement Learning from Diverse Human Preferences
|
2 |
+
Wanqi Xue * 1 Bo An 1 Shuicheng Yan 2 Zhongwen Xu 2
|
3 |
+
Abstract
|
4 |
+
The complexity of designing reward functions
|
5 |
+
has been a major obstacle to the wide application
|
6 |
+
of deep reinforcement learning (RL) techniques.
|
7 |
+
Describing an agent’s desired behaviors and prop-
|
8 |
+
erties can be difficult, even for experts. A new
|
9 |
+
paradigm called reinforcement learning from hu-
|
10 |
+
man preferences (or preference-based RL) has
|
11 |
+
emerged as a promising solution, in which reward
|
12 |
+
functions are learned from human preference la-
|
13 |
+
bels among behavior trajectories. However, ex-
|
14 |
+
isting methods for preference-based RL are lim-
|
15 |
+
ited by the need for accurate oracle preference
|
16 |
+
labels. This paper addresses this limitation by de-
|
17 |
+
veloping a method for crowd-sourcing preference
|
18 |
+
labels and learning from diverse human prefer-
|
19 |
+
ences. The key idea is to stabilize reward learning
|
20 |
+
through regularization and correction in a latent
|
21 |
+
space. To ensure temporal consistency, a strong
|
22 |
+
constraint is imposed on the reward model that
|
23 |
+
forces its latent space to be close to the prior distri-
|
24 |
+
bution. Additionally, a confidence-based reward
|
25 |
+
model ensembling method is designed to generate
|
26 |
+
more stable and reliable predictions. The pro-
|
27 |
+
posed method is tested on a variety of tasks in
|
28 |
+
DMcontrol and Meta-world and has shown con-
|
29 |
+
sistent and significant improvements over existing
|
30 |
+
preference-based RL algorithms when learning
|
31 |
+
from diverse feedback, paving the way for real-
|
32 |
+
world applications of RL methods.
|
33 |
+
1. Introduction
|
34 |
+
Recent advances in reinforcement learning (RL) have
|
35 |
+
achieved remarkable success in simulated environments
|
36 |
+
such as board games (Silver et al., 2016; 2018; Moravˇc´ık
|
37 |
+
et al., 2017) and video games (Mnih et al., 2015; Vinyals
|
38 |
+
et al., 2019; Wurman et al., 2022). However, the application
|
39 |
+
*This work was done during an internship at Sea AI
|
40 |
+
Lab, Singapore 1Nanyang Technological University, Singapore
|
41 |
+
2Sea AI Lab, Singapore.
|
42 |
+
Correspondence to:
|
43 |
+
Wanqi Xue
|
44 |
+
<[email protected]>, Zhongwen Xu <[email protected]>.
|
45 |
+
Preprint.
|
46 |
+
of RL to real-world problems remains a challenge due to
|
47 |
+
the lack of a suitable reward function (Leike et al., 2018).
|
48 |
+
On the one hand, designing a reward function to provide
|
49 |
+
dense and instructive learning signals is difficult in complex
|
50 |
+
real-world tasks (Christiano et al., 2017; Lee et al., 2021b).
|
51 |
+
On the other hand, RL agents are likely to exploit a reward
|
52 |
+
function by achieving high return in an unexpected and un-
|
53 |
+
intended manner (Leike et al., 2018; Ouyang et al., 2022).
|
54 |
+
To alleviate the problems, preference-based RL is proposed
|
55 |
+
to convey human-preferred objectives to agents (Christiano
|
56 |
+
et al., 2017; Stiennon et al., 2020), in which a (human)
|
57 |
+
teacher is requested to provide his/her preferences over pairs
|
58 |
+
of agents’ historical trajectories. Based on human feedback,
|
59 |
+
a reward model is learned and applied to provide learning
|
60 |
+
signals to agents (see Fig. 1(a)). Preference-based RL pro-
|
61 |
+
vides an effective way to learn from human intentions, rather
|
62 |
+
than explicitly designed rewards, and has demonstrated its
|
63 |
+
effectiveness in areas such as robotics control (Lee et al.,
|
64 |
+
2021b) and dialogue systems (Ouyang et al., 2022).
|
65 |
+
Though promising, the learning of preference-based RL
|
66 |
+
heavily relies on plenty of expert feedback, which could
|
67 |
+
be prohibitively expensive. Existing works typically focus
|
68 |
+
on feedback-efficient algorithms. They investigate several
|
69 |
+
sampling and exploration strategies with the aim of finding
|
70 |
+
the most deserving queries to be labelled (Biyik & Sadigh,
|
71 |
+
2018; Lee et al., 2021a; Liang et al., 2022). Some other
|
72 |
+
works improve feedback efficiency by learning good policy
|
73 |
+
initialization with imitation learning (Ibarz et al., 2018) and
|
74 |
+
unsupervised pre-training (Lee et al., 2021b). In addition,
|
75 |
+
semi-supervised reward learning is also used for better effi-
|
76 |
+
ciency (Park et al., 2022). Although these methods reduce
|
77 |
+
the demand for human feedback, scaling preference-based
|
78 |
+
RL to large-scale real-world problems is still difficult be-
|
79 |
+
cause the need for feedback increases significantly with the
|
80 |
+
complexity of problems.
|
81 |
+
Recently, there has been a trend to replace expensive expert
|
82 |
+
feedback with crowd-sourced data for scalability (Gerst-
|
83 |
+
grasser et al., 2022; Ouyang et al., 2022). For example,
|
84 |
+
in ChatGPT, a group of annotators are hired for providing
|
85 |
+
affordable human feedback to RL agents. The impressive
|
86 |
+
results show that preference-based RL has great potential
|
87 |
+
when sufficient human feedback is provided. Obtaining hu-
|
88 |
+
man feedback from various sources can effectively address
|
89 |
+
the issue of data scarcity in preference-based RL. However,
|
90 |
+
arXiv:2301.11774v1 [cs.LG] 27 Jan 2023
|
91 |
+
|
92 |
+
Reinforcement Learning from Diverse Human Preferences
|
93 |
+
Annotation
|
94 |
+
Reward learning
|
95 |
+
Encoder
|
96 |
+
Decoder
|
97 |
+
(a)
|
98 |
+
(b)
|
99 |
+
Figure 1. Illustration of our method. (a) There is a team of different annotators with bounded rationality to provide their preferences.
|
100 |
+
Based on the preference data, a reward model is learned and used to provide rewards to an RL agent for policy optimization. (b) The
|
101 |
+
reward models encode an input into a latent space where a strong distribution constraint is applied to address inconsistency issues.
|
102 |
+
Following that, a novel reward model ensembling method is applied to the decoders to aggregate their predictions.
|
103 |
+
this approach also brings some challenges, as the collected
|
104 |
+
preferences may be unreliable, inconsistent, or even adver-
|
105 |
+
sarial, making it difficult to optimize the policy. The diverse
|
106 |
+
nature of the feedback can make it challenging to deter-
|
107 |
+
mine the true underlying preferences and to learn from them
|
108 |
+
effectively.
|
109 |
+
In this paper, we propose a simple yet effective method to
|
110 |
+
help existing preference-based RL algorithms learn from
|
111 |
+
diverse human preferences. The key idea is to stabilize the
|
112 |
+
reward learning by regularizing and correcting its predic-
|
113 |
+
tions in a latent space. Concretely, we first map the inputs
|
114 |
+
of the reward model to a latent space, enabling the predicted
|
115 |
+
rewards to be easily manipulated by varying them in this
|
116 |
+
space. Second, to ensure temporal consistency throughout
|
117 |
+
the learning process, we impose a strong constraint on the
|
118 |
+
latent space by forcing it to be close to a prior distribution.
|
119 |
+
This prior distribution serves as a reference point, providing
|
120 |
+
a way to measure the consistency of the predicted rewards
|
121 |
+
over time. Lastly, we measure the confidence of the re-
|
122 |
+
ward model in its predictions by calculating the divergence
|
123 |
+
between its latent space and the prior distribution. Based
|
124 |
+
on this divergence, we design a confidence-based reward
|
125 |
+
model ensembling method to generate more stable and reli-
|
126 |
+
able predictions. We demonstrate the effectiveness of our
|
127 |
+
method on a variety of complex locomotion and robotic
|
128 |
+
manipulation tasks from DeepMind Control Suite (DM-
|
129 |
+
Control) (Tassa et al., 2018; Tunyasuvunakool et al., 2020)
|
130 |
+
and Meta-world (Yu et al., 2020). The results show that
|
131 |
+
our method is able to effectively recover the performance
|
132 |
+
of existing preference-based RL algorithms under diverse
|
133 |
+
preferences in all the tasks.
|
134 |
+
2. Preliminaries
|
135 |
+
We consider the reinforcement learning (RL) framework
|
136 |
+
which is defined as a Markov Decision Process (MDP). For-
|
137 |
+
mally, an MDP is defined by a tuple ⟨S, A, r, P, γ⟩, where
|
138 |
+
S and A denote the state and action space, r(s, a) is the
|
139 |
+
reward function, P(s′|s, a) denotes the transition dynam-
|
140 |
+
ics, and γ ∈ [0, 1) is the discount factor. At each timestep
|
141 |
+
t, the agent receives the current state st ∈ S from the
|
142 |
+
environment and makes an action at ∈ A based on its
|
143 |
+
policy π(at|st). Subsequently, the environment returns a
|
144 |
+
reward rt and the next state st+1 to the agent. RL seeks
|
145 |
+
to learn a policy such that the expected cumulative return,
|
146 |
+
E
|
147 |
+
��∞
|
148 |
+
k=0 γkr(st+k, at+k)
|
149 |
+
�
|
150 |
+
, is maximized.
|
151 |
+
In realistic applications, designing the reward function to
|
152 |
+
capture human intent is rather difficult. Preference-based
|
153 |
+
RL is therefore proposed to address this issue by learning
|
154 |
+
a reward function from human preferences (Akrour et al.,
|
155 |
+
2011; Wilson et al., 2012; Christiano et al., 2017; Ibarz
|
156 |
+
et al., 2018). Specifically, there is a human teacher indi-
|
157 |
+
cating his/her preferences over pairs of segments (σ0, σ1),
|
158 |
+
where a segment is a part of the trajectory of length H, i.e.,
|
159 |
+
σ = {(s1, a1), . . . , (sH, aH)}. The preferences y could
|
160 |
+
be (0, 1), (1, 0) and (0.5, 0.5), where (0, 1) indicates σ1 is
|
161 |
+
preferred to σ0, i.e., σ1 ≻ σ0; (1, 0) indicates σ0 ≻ σ1;
|
162 |
+
and (0.5, 0.5) implies an equally preferable case. Each feed-
|
163 |
+
back is stored as a triple (σ0, σ1, y) in a preference buffer
|
164 |
+
Dp = {((σ0, σ1, y))i}N
|
165 |
+
i=1.
|
166 |
+
To learn a reward function ˆr from the labeled preferences,
|
167 |
+
similar to most prior work (Ibarz et al., 2018; Lee et al.,
|
168 |
+
2021b;a; Liang et al., 2022; Park et al., 2022; Hejna III &
|
169 |
+
Sadigh, 2022), we define a preference predictor by following
|
170 |
+
|
171 |
+
(s, a, r(s, a), s')(s, a, s')AReinforcement Learning from Diverse Human Preferences
|
172 |
+
the Bradley-Terry model (Bradley & Terry, 1952):
|
173 |
+
Pψ
|
174 |
+
�
|
175 |
+
σ1 ≻ σ0�
|
176 |
+
=
|
177 |
+
exp
|
178 |
+
��H
|
179 |
+
t=1 ˆr
|
180 |
+
�
|
181 |
+
s1
|
182 |
+
t, a1
|
183 |
+
t; ψ
|
184 |
+
��
|
185 |
+
�
|
186 |
+
i∈{0,1} exp
|
187 |
+
��H
|
188 |
+
t=1 ˆr
|
189 |
+
�
|
190 |
+
si
|
191 |
+
t, ai
|
192 |
+
t; ψ
|
193 |
+
��.
|
194 |
+
(1)
|
195 |
+
Given the preference buffer Dp, we can train the reward
|
196 |
+
function ˆr by minimizing the cross-entropy loss between the
|
197 |
+
preference predictor and the actually labeled preferences:
|
198 |
+
Ls = −
|
199 |
+
E
|
200 |
+
(σ0,σ1,y)∼Dp
|
201 |
+
�
|
202 |
+
y(0) log Pψ
|
203 |
+
�
|
204 |
+
σ0 ≻ σ1�
|
205 |
+
+ y(1) log Pψ
|
206 |
+
�
|
207 |
+
σ1 ≻ σ0��
|
208 |
+
.
|
209 |
+
(2)
|
210 |
+
where y(0) and y(1) are the first and second element of y,
|
211 |
+
respectively. With the learned rewards, we can optimize a
|
212 |
+
policy π using any RL algorithm to maximize the expected
|
213 |
+
return (Christiano et al., 2017).
|
214 |
+
3. Preference-based Reinforcement Learning
|
215 |
+
from Diverse Human Feedback
|
216 |
+
Preference-based RL provides an effective framework to
|
217 |
+
deliver human intentions to RL agents. In this section, we
|
218 |
+
present our algorithm which helps RL agents to learn from
|
219 |
+
human preferences that possess high diversity and incon-
|
220 |
+
sistency. The key idea of our algorithm is to stabilize the
|
221 |
+
reward learning by regularizing and correcting it in a latent
|
222 |
+
space. Specifically, we first map the input of the reward
|
223 |
+
model to a latent space so that the predicted reward can
|
224 |
+
be easily manipulated by modifying it in the latent space.
|
225 |
+
Second, to achieve temporal consistency throughout the
|
226 |
+
learning process, we impose a strong constraint on the latent
|
227 |
+
space by forcing it to be close to a prior distribution. Last,
|
228 |
+
we measure the confidence of a reward model in its predic-
|
229 |
+
tion by calculating the divergence between its latent space
|
230 |
+
and the prior distribution. Based on the divergence, we de-
|
231 |
+
sign a confidence-based reward model ensembling method
|
232 |
+
to generate more reliable and stable predictions. The overall
|
233 |
+
framework of our algorithm is presented in Figure 1.
|
234 |
+
3.1. Manipulating Rewards within a Latent Space
|
235 |
+
Reward learning is a key problem in preference-based RL
|
236 |
+
because RL agents rely on the guidance of the learned re-
|
237 |
+
ward model for policy optimization (Silver et al., 2021).
|
238 |
+
However, learning an instructive and stable reward model
|
239 |
+
is rather difficult when human preferences possess high
|
240 |
+
diversity. If we simply minimize the loss in Eq. 2, the
|
241 |
+
generated rewards will have severe fluctuations and incon-
|
242 |
+
sistencies because the supervised signal, i.e., the collected
|
243 |
+
preferences (y), can be noisy, self-contradictory, or even
|
244 |
+
adversarial. As a result, RL agents cannot converge to a rea-
|
245 |
+
sonable policy since the learning objectives always change.
|
246 |
+
Algorithm 1 RL from Diverse Human Preferences
|
247 |
+
1: Input: Strength of constraint φ, number of reward mod-
|
248 |
+
els N, frequency of feedback session K
|
249 |
+
2: Initialize parameters of policy π(s, a) and the reward
|
250 |
+
model ˆr(s, a; ψ)
|
251 |
+
3: Initialize preferences buffer Dp ← ∅ and replay buffer
|
252 |
+
Dr ← ∅
|
253 |
+
4: for each iteration do
|
254 |
+
5:
|
255 |
+
if iteration % K == 0 then
|
256 |
+
6:
|
257 |
+
Sample (σ0, σ1) and query annotators for y
|
258 |
+
7:
|
259 |
+
Store preference Dp ← Dp ∪ {(σ0, σ1, y)}
|
260 |
+
8:
|
261 |
+
for each reward model updating step do
|
262 |
+
9:
|
263 |
+
Sample a minibatch of preferences (σ0, σ1, y)
|
264 |
+
10:
|
265 |
+
Optimize the reward model (Eq. 7)
|
266 |
+
11:
|
267 |
+
end for
|
268 |
+
12:
|
269 |
+
end if
|
270 |
+
13:
|
271 |
+
for each timestep do
|
272 |
+
14:
|
273 |
+
Collect s′ by taking action a ∼ π(s, a)
|
274 |
+
15:
|
275 |
+
Store transition Dr ← Dr ∪ {(s, a, s′)}
|
276 |
+
16:
|
277 |
+
end for
|
278 |
+
17:
|
279 |
+
for each policy updating step do
|
280 |
+
18:
|
281 |
+
Sample a minibatch of transitions (s, a, s′).
|
282 |
+
19:
|
283 |
+
Measure the confidence of reward models (Eq. 8)
|
284 |
+
20:
|
285 |
+
Relabel the transitions with ˆr(s, a; ψ) (Eq. 9)
|
286 |
+
21:
|
287 |
+
Update the policy π(s, a) on {(s, a, ˆr(s, a), s′)}
|
288 |
+
22:
|
289 |
+
end for
|
290 |
+
23: end for
|
291 |
+
To deal with the problem, an intuitive solution is to correct
|
292 |
+
the predicted rewards before feeding them to the agent. Con-
|
293 |
+
ventionally, methods such as reward shaping involve adding
|
294 |
+
additional rewards or penalties to the original rewards to
|
295 |
+
guide the agent toward the desired behavior. However, the
|
296 |
+
added rewards usually introduce unintended side effects or
|
297 |
+
inconsistencies in the learning process. As a mitigation, we
|
298 |
+
propose to manipulate the rewards within a latent space,
|
299 |
+
which avoids directly changing the predictions. We adopt
|
300 |
+
an encoder-decoder structure where the encoder is used to
|
301 |
+
map the input, i.e., a state-action pair, to latent space. After
|
302 |
+
sampling a representation vector from the latent space, the
|
303 |
+
decoder is applied to map the vector back to a reward.
|
304 |
+
Formally, the encoder p(z|s, a; ψe), parameterized by ψe, is
|
305 |
+
in the form of
|
306 |
+
p(z|s, a; ψe) = N(z|f µ(s, a; ψe), f Σ(s, a; ψe)),
|
307 |
+
(3)
|
308 |
+
where N(µ, Σ) denotes a Gaussian distribution with mean
|
309 |
+
vector µ and covariance matrix Σ. The encoder consists of
|
310 |
+
two multi-layer perceptrons (MLPs) whose output gener-
|
311 |
+
ates the K-dimensional mean µ and the K × K covariance
|
312 |
+
matrix Σ, respectively. The decoder d(r|z; ψd), with pa-
|
313 |
+
rameters ψd, takes as input a sampled latent variable z and
|
314 |
+
outputs a reward. Such an encoder-decoder structure enjoys
|
315 |
+
|
316 |
+
Reinforcement Learning from Diverse Human Preferences
|
317 |
+
Figure 2. Examples for locomotion tasks and robotic manipulation
|
318 |
+
tasks we test on.
|
319 |
+
benefits under diverse human preferences: i) we can control
|
320 |
+
the fluctuations of the rewards by adjusting the distribution
|
321 |
+
of the latent space; ii) the confidence of the reward model
|
322 |
+
to its predictions can be easily measured by calculating the
|
323 |
+
divergence between different latent spaces. In the following
|
324 |
+
sections, we will elaborate on how to leverage the aforemen-
|
325 |
+
tioned advantages.
|
326 |
+
3.2. Achieving Consistency by Imposing a Strong
|
327 |
+
Constraint
|
328 |
+
As previously mentioned, the reward model is learned under
|
329 |
+
the supervision of human feedback, which could have high
|
330 |
+
diversity if they are collected from different crowds. As a
|
331 |
+
consequence, the rewards will demonstrate severe fluctua-
|
332 |
+
tions and inconsistencies throughout the learning process.
|
333 |
+
For example, at the beginning of the training, the reward
|
334 |
+
model learns some patterns, and the policy is optimized to-
|
335 |
+
ward the corresponding objective. As the training processes,
|
336 |
+
more labeled preferences are added to the dataset and the
|
337 |
+
updated reward model can be completely different. As a
|
338 |
+
result, the reward model will make distinct predictions for
|
339 |
+
the same input at the different training stages. We found
|
340 |
+
that it is the temporal inconsistency that causes the collapse
|
341 |
+
of a policy. To alleviate the problem, we propose to impose
|
342 |
+
a constraint on the latent space so that the reward model
|
343 |
+
has a fixed optimization direction throughout the training
|
344 |
+
process. Concretely, we assume that the latent space fol-
|
345 |
+
lows a prior distribution r(z), and we try to minimize the
|
346 |
+
Kullback-Leibler (KL) divergence between the latent space
|
347 |
+
and its prior:
|
348 |
+
Lc = E(s,a)
|
349 |
+
�
|
350 |
+
KL(p(z|s, a; ψe)||r(z))
|
351 |
+
�
|
352 |
+
.
|
353 |
+
(4)
|
354 |
+
Since r(z) is pre-defined, the optimization of the encoder
|
355 |
+
will be guided toward a fixed direction, independent of how
|
356 |
+
diverse the human preferences are.
|
357 |
+
Remark 3.1. Minimizing the loss in Eq. 4 is equivalent to
|
358 |
+
minimizing the mutual information between (S, A) and Z,
|
359 |
+
which leads to a concise representation of the input.
|
360 |
+
Proof: To simplify the notation, we let variable X denote the
|
361 |
+
input pairs (S, A). Then by the definition of KL-divergence:
|
362 |
+
Lc =
|
363 |
+
��
|
364 |
+
dx dz p(x)
|
365 |
+
�
|
366 |
+
p(z|x) log p(z|x)
|
367 |
+
r(z)
|
368 |
+
�
|
369 |
+
=
|
370 |
+
��
|
371 |
+
dx dz p(x, z) log p(z|x) −
|
372 |
+
�
|
373 |
+
dz p(z) log r(z).
|
374 |
+
(5)
|
375 |
+
Since KL(p(z)|r(z)) ≥ 0, we have
|
376 |
+
�
|
377 |
+
dz p(z) log p(z) ≥
|
378 |
+
�
|
379 |
+
dz p(z) log r(z). As a result,
|
380 |
+
Lc ≥
|
381 |
+
��
|
382 |
+
dx dz p(x, z) log p(z|x) −
|
383 |
+
�
|
384 |
+
dz p(z) log p(z)
|
385 |
+
= I(Z, X).
|
386 |
+
(6)
|
387 |
+
Eq. 6 shows that minimizing Lc is equivalent to minimizing
|
388 |
+
an upper bound of I(Z, X).
|
389 |
+
Overall, the loss function for the reward model is
|
390 |
+
L = φ ∗ Lc + Ls,
|
391 |
+
(7)
|
392 |
+
where φ is a parameter controlling the strength of the con-
|
393 |
+
straint. Conventionally, φ is set as a small value to confirm
|
394 |
+
that the supervised signals will not be dominated. However,
|
395 |
+
counterintuitively, we found that a large φ is crucial for
|
396 |
+
good performance. Larger φ will lead to a stronger con-
|
397 |
+
straint on the latent space. As a result, the latent space for
|
398 |
+
different inputs will be similar, and the predicted rewards
|
399 |
+
will be controlled into a smaller range. Considering that it
|
400 |
+
is relative values of rewards, not absolute values, that affect
|
401 |
+
a policy, a reward model with a smaller value range can
|
402 |
+
lead to more accurate, stable, and effective outcomes, and
|
403 |
+
therefore benefit the learning process.
|
404 |
+
3.3. Confidence-based Reward Model Ensembling
|
405 |
+
It is common that diverse human preferences contain out-
|
406 |
+
lier data. To reduce the influence of a single data point on
|
407 |
+
the reward model, we adopt reward model ensembling to
|
408 |
+
reduce overfitting and improve stability (Lee et al., 2021b;
|
409 |
+
Liang et al., 2022). Instead of simply averaging, we design
|
410 |
+
a confidence-based ensembling mechanism to improve per-
|
411 |
+
formance. The key idea is to aggregate the predicted results
|
412 |
+
by up-weighting the reward models with higher confidence
|
413 |
+
and down-weighting those with less confidence. We first
|
414 |
+
measure the confidence level of each reward model and then
|
415 |
+
perform a weighted summation to generate the final result.
|
416 |
+
Specifically, the confidence of a reward model is measured
|
417 |
+
by calculating the KL divergence from the predicted latent
|
418 |
+
space to its prior distribution. If the KL divergence is small
|
419 |
+
which means the reward model cannot tell too much input-
|
420 |
+
specific information, the reward model has low confidence
|
421 |
+
about the input (a model tends to output the prior directly
|
422 |
+
|
423 |
+
Reinforcement Learning from Diverse Human Preferences
|
424 |
+
0
|
425 |
+
0.1M
|
426 |
+
0.2M
|
427 |
+
0.3M
|
428 |
+
0.4M
|
429 |
+
0.5M
|
430 |
+
Environment Steps
|
431 |
+
0
|
432 |
+
250
|
433 |
+
500
|
434 |
+
750
|
435 |
+
1000
|
436 |
+
Episode Return
|
437 |
+
Walker
|
438 |
+
0
|
439 |
+
0.2M
|
440 |
+
0.4M
|
441 |
+
0.6M
|
442 |
+
0.8M
|
443 |
+
1.0M
|
444 |
+
Environment Steps
|
445 |
+
0
|
446 |
+
200
|
447 |
+
400
|
448 |
+
600
|
449 |
+
Cheetah
|
450 |
+
0
|
451 |
+
0.2M
|
452 |
+
0.4M
|
453 |
+
0.6M
|
454 |
+
0.8M
|
455 |
+
1.0M
|
456 |
+
Environment Steps
|
457 |
+
0
|
458 |
+
200
|
459 |
+
400
|
460 |
+
600
|
461 |
+
800
|
462 |
+
Quadruped
|
463 |
+
0
|
464 |
+
0.2M
|
465 |
+
0.4M
|
466 |
+
0.6M
|
467 |
+
0.8M
|
468 |
+
1.0M
|
469 |
+
Environment Steps
|
470 |
+
0
|
471 |
+
25
|
472 |
+
50
|
473 |
+
75
|
474 |
+
100
|
475 |
+
Success Rate (%)
|
476 |
+
Button Press
|
477 |
+
0
|
478 |
+
0.2M
|
479 |
+
0.4M
|
480 |
+
0.6M
|
481 |
+
0.8M
|
482 |
+
1.0M
|
483 |
+
Environment Steps
|
484 |
+
0
|
485 |
+
25
|
486 |
+
50
|
487 |
+
75
|
488 |
+
100
|
489 |
+
Sweep Into
|
490 |
+
0
|
491 |
+
0.2M
|
492 |
+
0.4M
|
493 |
+
0.6M
|
494 |
+
0.8M
|
495 |
+
1.0M
|
496 |
+
Environment Steps
|
497 |
+
0
|
498 |
+
25
|
499 |
+
50
|
500 |
+
75
|
501 |
+
100
|
502 |
+
Hammer
|
503 |
+
Oracle
|
504 |
+
Ours
|
505 |
+
PEBBLE
|
506 |
+
Figure 3. Learning curves on locomotion tasks (first row) and robotic manipulation tasks (second row). The locomotion tasks are measured
|
507 |
+
on the ground truth episode return while the robotic manipulation tasks are measured on the success rate. The solid line and shaded
|
508 |
+
regions represent the mean and standard deviation, respectively, across five runs.
|
509 |
+
if it knows nothing about the input). On the contrary, a
|
510 |
+
large KL divergence indicates a high confidence level. We
|
511 |
+
assume that the confidence is proportional to the exponent
|
512 |
+
of the KL divergence:
|
513 |
+
Gi(s, a) =
|
514 |
+
exp(KL(pi(z|s, a)||r(z)))
|
515 |
+
�N
|
516 |
+
j=1 exp(KL(pj(z|s, a)||r(z)))
|
517 |
+
,
|
518 |
+
(8)
|
519 |
+
where Gi(s, a) denotes the confidence of the i-th reward
|
520 |
+
model to an input (s, a), N is the number of reward mod-
|
521 |
+
els. After determining the confidence of each model, we
|
522 |
+
calculate the reward by:
|
523 |
+
ˆr(s, a; ψ) =
|
524 |
+
N
|
525 |
+
�
|
526 |
+
i=1
|
527 |
+
Gi(s, a) ×
|
528 |
+
�
|
529 |
+
di ◦ qi(r|s, a)
|
530 |
+
�
|
531 |
+
,
|
532 |
+
(9)
|
533 |
+
where di and qi are the decoder and the encoder of the i-th
|
534 |
+
reward model, respectively. With the reword model, we
|
535 |
+
can use any preference-based RL algorithm to learn the
|
536 |
+
policy. The full procedure of our method is summarized in
|
537 |
+
Algorithm 1.
|
538 |
+
4. Experiments
|
539 |
+
We conduct experiments to answer the following questions:
|
540 |
+
Q1: Whether the proposed method can effectively help ex-
|
541 |
+
isting preference-based RL algorithms to learn from
|
542 |
+
diverse preferences?
|
543 |
+
Q2: How does each component of the method contribute to
|
544 |
+
the effectiveness?
|
545 |
+
Q3: How will latent spaces affect the predicted rewards?
|
546 |
+
Q4: How will the method be affected by the number of
|
547 |
+
annotators?
|
548 |
+
4.1. Setup
|
549 |
+
We evaluate our method on several complex locomotion
|
550 |
+
tasks and robotic manipulation tasks from DeepMind Con-
|
551 |
+
trol Suite (DMControl) (Tassa et al., 2018; Tunyasuvu-
|
552 |
+
nakool et al., 2020) and Meta-world (Yu et al., 2020), respec-
|
553 |
+
tively (see Fig. 2). In order to justify the effectiveness of our
|
554 |
+
method, we train an agent to solve the tasks without observ-
|
555 |
+
ing the true rewards from the environment. Instead, several
|
556 |
+
scripted annotators are generated to provide their prefer-
|
557 |
+
ences between two trajectory segments for the agent to learn
|
558 |
+
its policy. Unlike existing preference-based RL algorithms
|
559 |
+
which interact with a single perfect scripted teacher (Chris-
|
560 |
+
tiano et al., 2017; Lee et al., 2021b; Park et al., 2022), we
|
561 |
+
consider the situation where there is a team of different an-
|
562 |
+
notators with bounded rationality to provide the preferences.
|
563 |
+
Despite being imperfect, the annotators’ preferences are
|
564 |
+
also calculated from ground truth rewards. Therefore, we
|
565 |
+
can quantitatively evaluate the method by measuring the
|
566 |
+
true episode return or success rate from the environments.
|
567 |
+
Our method can be integrated into any preference-based
|
568 |
+
RL algorithm to recover their performance under diverse
|
569 |
+
preferences. In our experiments, we choose one of the most
|
570 |
+
popular approaches, PEBBLE (Lee et al., 2021b), as the
|
571 |
+
backbone algorithm. We examine the performance of PEB-
|
572 |
+
BLE under i) a perfect scripted teacher who provides the
|
573 |
+
ground true feedback (oracle); ii) a team of randomly sam-
|
574 |
+
pled annotators whose feedback is imperfect and anisotropic.
|
575 |
+
The goal of our method is to recover the performance of
|
576 |
+
PEBBLE under the annotators as much as possible, to ap-
|
577 |
+
|
578 |
+
Reinforcement Learning from Diverse Human Preferences
|
579 |
+
0
|
580 |
+
0.1M
|
581 |
+
0.2M
|
582 |
+
0.3M
|
583 |
+
0.4M
|
584 |
+
0.5M
|
585 |
+
Environment Steps
|
586 |
+
0
|
587 |
+
500
|
588 |
+
1000
|
589 |
+
Episode Return
|
590 |
+
Walker
|
591 |
+
0
|
592 |
+
0.2M
|
593 |
+
0.4M
|
594 |
+
0.6M
|
595 |
+
0.8M
|
596 |
+
1.0M
|
597 |
+
Environment Steps
|
598 |
+
0
|
599 |
+
200
|
600 |
+
400
|
601 |
+
600
|
602 |
+
Cheetah
|
603 |
+
0
|
604 |
+
0.2M
|
605 |
+
0.4M
|
606 |
+
0.6M
|
607 |
+
0.8M
|
608 |
+
1.0M
|
609 |
+
Environment Steps
|
610 |
+
0
|
611 |
+
200
|
612 |
+
400
|
613 |
+
600
|
614 |
+
Quadruped
|
615 |
+
0
|
616 |
+
0.2M
|
617 |
+
0.4M
|
618 |
+
0.6M
|
619 |
+
0.8M
|
620 |
+
1.0M
|
621 |
+
Environment Steps
|
622 |
+
0
|
623 |
+
25
|
624 |
+
50
|
625 |
+
75
|
626 |
+
100
|
627 |
+
Success Rate (%)
|
628 |
+
Button Press
|
629 |
+
0
|
630 |
+
0.2M
|
631 |
+
0.4M
|
632 |
+
0.6M
|
633 |
+
0.8M
|
634 |
+
1.0M
|
635 |
+
Environment Steps
|
636 |
+
0
|
637 |
+
25
|
638 |
+
50
|
639 |
+
75
|
640 |
+
100
|
641 |
+
Sweep Into
|
642 |
+
0
|
643 |
+
0.2M
|
644 |
+
0.4M
|
645 |
+
0.6M
|
646 |
+
0.8M
|
647 |
+
1.0M
|
648 |
+
Environment Steps
|
649 |
+
0
|
650 |
+
25
|
651 |
+
50
|
652 |
+
75
|
653 |
+
100
|
654 |
+
Hammer
|
655 |
+
= 1
|
656 |
+
= 10
|
657 |
+
= 100
|
658 |
+
Figure 4. Ablation study on the strength of the latent space constraint. The locomotion tasks (first row) are measured on the ground
|
659 |
+
truth episode return while the robotic manipulation (second row) tasks are measured on the success rate. The results show the mean and
|
660 |
+
standard deviation averaged over five runs.
|
661 |
+
proach the oracle case.
|
662 |
+
Simulating the annotators. We generate the bounded ratio-
|
663 |
+
nal scripted annotators by following the previous stochastic
|
664 |
+
preference model (Lee et al., 2021a):
|
665 |
+
P
|
666 |
+
�
|
667 |
+
σ1 ≻ σ0�
|
668 |
+
=
|
669 |
+
exp
|
670 |
+
�
|
671 |
+
β �H
|
672 |
+
t=1 γH−tr
|
673 |
+
�
|
674 |
+
s1
|
675 |
+
t, a1
|
676 |
+
t
|
677 |
+
��
|
678 |
+
�
|
679 |
+
i∈{0,1} exp
|
680 |
+
�
|
681 |
+
β �H
|
682 |
+
t=1 γH−tr
|
683 |
+
�
|
684 |
+
si
|
685 |
+
t, ai
|
686 |
+
t
|
687 |
+
��.
|
688 |
+
(10)
|
689 |
+
r(s, a) is the ground truth reward provided by the envi-
|
690 |
+
ronment. A scripted annotator is determined by a tuple
|
691 |
+
⟨β, γ, ϵ, δequal⟩: β is the temperature parameter that con-
|
692 |
+
trols the randomness of the stochastic preference model.
|
693 |
+
An annotator becomes perfectly rational and deterministic
|
694 |
+
as β → ∞, whereas β = 0 produces uniformly random
|
695 |
+
choices. γ controls the myopic (short-sighted) behavior of
|
696 |
+
an annotator. Annotators with small γ will emphasize more
|
697 |
+
on immediate rewards and down-weight long-term return. ϵ
|
698 |
+
describes the probability that an annotator makes a mistake,
|
699 |
+
i.e., we flip the preference with the probability of ϵ. δequal de-
|
700 |
+
notes the threshold that an annotator marks the segments as
|
701 |
+
equally preferable, i.e., an annotator provides (0.5, 0.5) as a
|
702 |
+
response if | �
|
703 |
+
t r(s1
|
704 |
+
t, a1
|
705 |
+
t) − �
|
706 |
+
t r(s0
|
707 |
+
t, a0
|
708 |
+
t)| ≤ δequal. Practi-
|
709 |
+
cally, we sample a tuple from β ∈ {∞, 1, 5}, γ ∼ U(0.8, 1),
|
710 |
+
ϵ ∼ U(0, 0.2), δequal ∼ U(0, 0.2) to generate a scripted an-
|
711 |
+
notator. For each task, we randomly generate 100 annotators
|
712 |
+
to provide feedback. Each annotator has the same probabil-
|
713 |
+
ity of being selected for annotation.
|
714 |
+
Implementation details. For all tasks, we use the same
|
715 |
+
hyperparameters used by PEBBLE, such as learning rates,
|
716 |
+
architectures of the neuron networks, and reward model
|
717 |
+
updating frequency. We adopt an uniform sampling strat-
|
718 |
+
egy, which selects queries with the same probability. At
|
719 |
+
each feedback session, a batch of 256 trajectory segments
|
720 |
+
(σ0, σ1) is sampled for annotation. The strength of con-
|
721 |
+
straint φ is set as 100 for all tasks. For simplicity, we set the
|
722 |
+
prior distribution of the latent space as standard Gaussian
|
723 |
+
where the KL-divergence from a latent space to its prior can
|
724 |
+
be easily calculated. All experimental results are reported
|
725 |
+
with the mean and standard deviation across five runs.
|
726 |
+
4.2. Experimental Results
|
727 |
+
Locomotion tasks from DMControl.
|
728 |
+
We select three
|
729 |
+
complex environments from DMControl,
|
730 |
+
which are
|
731 |
+
Walker walk, Cheetah run, and Quadruped walk, to eval-
|
732 |
+
uate our method. As previously mentioned, PEBBLE is
|
733 |
+
used as the backbone algorithm and our method is com-
|
734 |
+
bined with PEBBLE to recover its performance under di-
|
735 |
+
verse human preferences. The first row of Fig. 3 shows the
|
736 |
+
learning curves of PEBBLE and our method when learning
|
737 |
+
from bounded rational annotators. We can find that, com-
|
738 |
+
pared to learning from a single perfect teacher (oracle), the
|
739 |
+
performance of PEBBLE (measure on true episode return)
|
740 |
+
decreases dramatically in all three tasks. For example, in
|
741 |
+
Walker walk, PEBBLE is able to achieve 1000 scores if
|
742 |
+
it learns from a single expert, whereas the value is nearly
|
743 |
+
half of the preferences are from different annotators. Such
|
744 |
+
failures show that existing preference-based RL algorithms
|
745 |
+
do not work well when the provided preferences contain
|
746 |
+
diversity and inconsistency. After integrating our method
|
747 |
+
(the red line), we can find significant performance increases
|
748 |
+
in all three tasks: our method is able to achieve almost the
|
749 |
+
same performance as the oracle in Walker walk, while the
|
750 |
+
performance gap between our method and its upper bound
|
751 |
+
|
752 |
+
Reinforcement Learning from Diverse Human Preferences
|
753 |
+
Figure 5. Analysis about the influence of φ on the reward model. First row: increasing the strength of the constraint will narrow the
|
754 |
+
value range of the predicted rewards. The reward model will also generate more distinct predictions if φ is large. Second row: the t-SNE
|
755 |
+
visualization of the latent vectors. A large φ leads to a more compact and concise pattern.
|
756 |
+
(oracle) is very narrow in Cheetah run. In Quadruped walk,
|
757 |
+
PEBBLE is unable to learn a feasible policy, while our
|
758 |
+
proposed method still achieves near-optimal performance.
|
759 |
+
Robotic manipulation tasks from Meta-world.
|
760 |
+
Meta-
|
761 |
+
world consists of 50 tasks that cover a range of fundamental
|
762 |
+
robotic manipulation skills. We consider three challenging
|
763 |
+
environments to evaluate the effectiveness of our method.
|
764 |
+
The performance is measured on success rate, i.e., if the
|
765 |
+
trained agent is able to successfully finish a task or not. Fig 3
|
766 |
+
(second row) shows the learning curves of our method as
|
767 |
+
the baselines. We can find that there is a significant perfor-
|
768 |
+
mance increase after integrating our method into PEBBLE.
|
769 |
+
The performance can be almost restored to approach the
|
770 |
+
oracles in Button Press and Hammer, while in Sweep Into,
|
771 |
+
the improvement is also non-trivial. These results again
|
772 |
+
demonstrate that our proposed method is able to effectively
|
773 |
+
help the existing preference-based RL algorithms learn from
|
774 |
+
diverse preferences.
|
775 |
+
4.3. Ablation and Analysis
|
776 |
+
Effects of the latent space constraint. As previously in-
|
777 |
+
troduced, to achieve temporal consistency and set a fixed
|
778 |
+
optimization direction for the reward model, our method
|
779 |
+
imposes a constraint on the latent space by forcing its dis-
|
780 |
+
tribution to be close to the prior. To justify the effect of
|
781 |
+
the constraint, we implement our method with different
|
782 |
+
strengths of constraint on all six tasks. As shown in Fig. 4,
|
783 |
+
there is a significant and consistent improvement in all the
|
784 |
+
tasks as we gradually increase the strength of the constraint.
|
785 |
+
For example, in Cheetah run, when we set the strength of
|
786 |
+
0
|
787 |
+
100K
|
788 |
+
200K
|
789 |
+
300K
|
790 |
+
400K
|
791 |
+
500K
|
792 |
+
Environment Steps
|
793 |
+
0
|
794 |
+
200
|
795 |
+
400
|
796 |
+
600
|
797 |
+
800
|
798 |
+
1000
|
799 |
+
Episode Return
|
800 |
+
w/ ensembling
|
801 |
+
w/o ensembling
|
802 |
+
0
|
803 |
+
100K
|
804 |
+
200K
|
805 |
+
300K
|
806 |
+
400K
|
807 |
+
500K
|
808 |
+
Environment Steps
|
809 |
+
0
|
810 |
+
200
|
811 |
+
400
|
812 |
+
600
|
813 |
+
800
|
814 |
+
1000
|
815 |
+
KL-based
|
816 |
+
mean
|
817 |
+
Figure 6. Ablation study on reward model ensembling.
|
818 |
+
Left:
|
819 |
+
Learning curves of Walker walk with and without reward model
|
820 |
+
ensembling. Right: Learning curves of Walker walk with KL-
|
821 |
+
based model ensembling and simply averaging. The results show
|
822 |
+
the mean and standard deviation averaged over five runs.
|
823 |
+
constraint ψ to 1, 10, and 100, the performance increases
|
824 |
+
from around 200 to 400 and finally reaches near 600. This
|
825 |
+
phenomenon is a little bit counter-intuitive because, con-
|
826 |
+
ventionally, a too strong constraint is likely to misguide
|
827 |
+
the reward model and prevent it from learning from super-
|
828 |
+
vised signals. However, we found that a strong constraint on
|
829 |
+
the latent space is compulsory to help an agent learn from
|
830 |
+
diverse feedback.
|
831 |
+
Analysis about the reward model. To understand why a
|
832 |
+
strong constraint is crucial for the performance, we ana-
|
833 |
+
lyze the effect of the latent space constraint on the reward
|
834 |
+
model. Specifically, we collect 100,000 state-action pairs
|
835 |
+
from Cheetah run at different training stages and use the
|
836 |
+
reward model trained with different strengths of constraint
|
837 |
+
to predict the rewards. The predictions are presented in
|
838 |
+
|
839 |
+
Φ=l
|
840 |
+
Φ=10
|
841 |
+
Φ= 100
|
842 |
+
Predicted Rewards
|
843 |
+
0.2
|
844 |
+
0.0
|
845 |
+
0.0
|
846 |
+
0.0
|
847 |
+
-0.2
|
848 |
+
-0.2
|
849 |
+
-0.2
|
850 |
+
-0.4
|
851 |
+
-0.4
|
852 |
+
-0.4
|
853 |
+
-0.6
|
854 |
+
-0.6
|
855 |
+
100
|
856 |
+
100
|
857 |
+
100
|
858 |
+
50
|
859 |
+
50
|
860 |
+
50
|
861 |
+
tSNE2
|
862 |
+
0
|
863 |
+
0
|
864 |
+
-50
|
865 |
+
-50
|
866 |
+
-50
|
867 |
+
-100
|
868 |
+
-100
|
869 |
+
-100
|
870 |
+
-100
|
871 |
+
-50
|
872 |
+
0
|
873 |
+
50
|
874 |
+
100
|
875 |
+
-100
|
876 |
+
-50
|
877 |
+
50
|
878 |
+
100
|
879 |
+
-100
|
880 |
+
-50
|
881 |
+
0
|
882 |
+
50
|
883 |
+
100
|
884 |
+
0
|
885 |
+
tSNE1
|
886 |
+
tSNE1
|
887 |
+
tSNE1Reinforcement Learning from Diverse Human Preferences
|
888 |
+
0
|
889 |
+
0.2M
|
890 |
+
0.4M
|
891 |
+
0.6M
|
892 |
+
0.8M
|
893 |
+
1.0M
|
894 |
+
Environment Steps
|
895 |
+
0
|
896 |
+
200
|
897 |
+
400
|
898 |
+
600
|
899 |
+
800
|
900 |
+
Episode Return
|
901 |
+
Num_annotators=1
|
902 |
+
0
|
903 |
+
0.2M
|
904 |
+
0.4M
|
905 |
+
0.6M
|
906 |
+
0.8M
|
907 |
+
1.0M
|
908 |
+
Environment Steps
|
909 |
+
0
|
910 |
+
200
|
911 |
+
400
|
912 |
+
600
|
913 |
+
800
|
914 |
+
Num_annotators=10
|
915 |
+
0
|
916 |
+
0.2M
|
917 |
+
0.4M
|
918 |
+
0.6M
|
919 |
+
0.8M
|
920 |
+
1.0M
|
921 |
+
Environment Steps
|
922 |
+
0
|
923 |
+
200
|
924 |
+
400
|
925 |
+
600
|
926 |
+
800
|
927 |
+
Num_annotators=100
|
928 |
+
Oracle
|
929 |
+
Ours
|
930 |
+
PEBBLE
|
931 |
+
Figure 7. Learning curves of Cheetah run (a locomotion task) with preferences provided by a different number of annotators. The results
|
932 |
+
are measured on the ground truth episode return, with the solid line and shaded regions representing the mean and standard deviation,
|
933 |
+
respectively, across five runs.
|
934 |
+
the first row of Fig. 5. We can find that as we increase the
|
935 |
+
strength of constraint, the range of reward values decreases
|
936 |
+
gradually. For example, when φ = 1, the predicted rewards
|
937 |
+
are between -0.6 and 0.15, while the range is narrowed to
|
938 |
+
[−0.5, 0] when we set φ = 100. Moreover, the predicted
|
939 |
+
rewards are more distinct when φ becomes larger, which
|
940 |
+
indicates that only really good state-action pairs are given
|
941 |
+
high rewards. We also use t-SNE (Van der Maaten & Hin-
|
942 |
+
ton, 2008) to visualize the latent vector of those state-action
|
943 |
+
pairs. As in Fig. 5 (second row), the distribution of the
|
944 |
+
embeddings becomes more compact as we increase φ. Fur-
|
945 |
+
thermore, the pattern of the embeddings is more clear and
|
946 |
+
more concise when φ is large.
|
947 |
+
Effects of reward model ensembling. We investigate how
|
948 |
+
well the reward ensembling affects the performance of
|
949 |
+
our method. Fig. 6 (left) shows the learning curves of
|
950 |
+
Walker walk with and without reward model ensembling.
|
951 |
+
We can find that there is a clear performance drop if using a
|
952 |
+
single reward model. The results demonstrate that ensem-
|
953 |
+
bling the predictions of several models is helpful to stabilize
|
954 |
+
the training process if the preferences are diverse. We fur-
|
955 |
+
ther investigate whether the proposed KL-based aggregation
|
956 |
+
method is better than simply averaging. As shown in Fig. 6
|
957 |
+
(right), simply averaging will suffer severe fluctuations in
|
958 |
+
the training process, while the performance of our method
|
959 |
+
is significantly more stable and consistent.
|
960 |
+
Responses to the number of annotators. To examine how
|
961 |
+
will our algorithm respond to the number of annotators, we
|
962 |
+
implement Cheetah run with preferences provided by dif-
|
963 |
+
ferent numbers of annotators. As shown in Fig 7, when
|
964 |
+
there is only one annotator which is bounded rational, both
|
965 |
+
PEBBLE and our method perform worse than the oracle. In
|
966 |
+
these cases, the preferences are not diverse but just partially
|
967 |
+
correct. If we slightly increase the number of annotators
|
968 |
+
to ten, which introduces some diversity, our method is able
|
969 |
+
to achieve obvious improvement over PEBBLE. The per-
|
970 |
+
formance gain becomes quite significant when there are
|
971 |
+
one hundred annotators. The experiments demonstrate that
|
972 |
+
our method is suitable for situations where the provided
|
973 |
+
preferences are diverse.
|
974 |
+
5. Related Work
|
975 |
+
The main focus in the paper is on one promising direction
|
976 |
+
which utilizes human preferences (Akrour et al., 2011; Chris-
|
977 |
+
tiano et al., 2017; Ibarz et al., 2018; Leike et al., 2018; Lee
|
978 |
+
et al., 2021b; Ouyang et al., 2022; Park et al., 2022; Liang
|
979 |
+
et al., 2022) to perform policy optimization. Christiano
|
980 |
+
et al. (2017) introduced modern deep learning techniques
|
981 |
+
to preference-based learning. Since the learning of the re-
|
982 |
+
ward function, modeled by deep neural networks, requires
|
983 |
+
a large number of preferences, recent works have typically
|
984 |
+
focused on improving the feedback efficiency of a method.
|
985 |
+
PEBBLE (Lee et al., 2021b) proposed a novel unsupervised
|
986 |
+
exploration method to pre-train the policy. SURF (Park
|
987 |
+
et al., 2022) adopted a semi-supervised reward learning
|
988 |
+
framework to leverage a large number of unlabeled samples.
|
989 |
+
Some other works improved data efficiency by introducing
|
990 |
+
additional types of feedback such as demonstrations (Ibarz
|
991 |
+
et al., 2018) or non-binary rankings (Cao et al., 2021). In
|
992 |
+
addition to that, designing intrinsic rewards to encourage
|
993 |
+
effective exploration is also investigated (Liang et al., 2022).
|
994 |
+
Despite being efficient, previous methods mainly focus on
|
995 |
+
learning from a single expert, which will severely limit the
|
996 |
+
scalability of an algorithm. In this work, we focus on learn-
|
997 |
+
ing from human preferences collected from different types
|
998 |
+
of annotators. Our method emphasizes addressing the issue
|
999 |
+
of diversity rather than feedback efficiency.
|
1000 |
+
6. Conclusion
|
1001 |
+
In this work, we propose a simple yet effective method
|
1002 |
+
to improve the performance of preference-based RL algo-
|
1003 |
+
rithms under diverse feedback. The method maps inputs to
|
1004 |
+
a latent space imposes a constraint on the latent space to
|
1005 |
+
|
1006 |
+
Reinforcement Learning from Diverse Human Preferences
|
1007 |
+
maintain temporal consistency, and uses a confidence-based
|
1008 |
+
ensembling method to generate more stable predictions. Ex-
|
1009 |
+
tensive experiments are conducted in various environments.
|
1010 |
+
The results show that our method can significantly improve
|
1011 |
+
performance under diverse preferences in all the tasks.
|
1012 |
+
References
|
1013 |
+
Akrour, R., Schoenauer, M., and Sebag, M. Preference-
|
1014 |
+
based policy learning. In Joint European Conference
|
1015 |
+
on Machine Learning and Knowledge Discovery in
|
1016 |
+
Databases, pp. 12–27. Springer, 2011.
|
1017 |
+
Biyik, E. and Sadigh, D. Batch active preference-based
|
1018 |
+
learning of reward functions. In Conference on Robot
|
1019 |
+
Learning, pp. 519–528. PMLR, 2018.
|
1020 |
+
Bradley, R. A. and Terry, M. E. Rank analysis of incom-
|
1021 |
+
plete block designs: I. the method of paired comparisons.
|
1022 |
+
Biometrika, 39(3/4):324–345, 1952.
|
1023 |
+
Cao, Z., Wong, K., and Lin, C.-T. Weak human preference
|
1024 |
+
supervision for deep reinforcement learning. IEEE Trans-
|
1025 |
+
actions on Neural Networks and Learning Systems, 32
|
1026 |
+
(12):5369–5378, 2021.
|
1027 |
+
Christiano, P. F., Leike, J., Brown, T., Martic, M., Legg,
|
1028 |
+
S., and Amodei, D. Deep reinforcement learning from
|
1029 |
+
human preferences. Advances in neural information pro-
|
1030 |
+
cessing systems, 30, 2017.
|
1031 |
+
Gerstgrasser, M., Trivedi, R., and Parkes, D. C. Crowdplay:
|
1032 |
+
Crowdsourcing human demonstrations for offline learn-
|
1033 |
+
ing. In International Conference on Learning Represen-
|
1034 |
+
tations, 2022. URL https://openreview.net/
|
1035 |
+
forum?id=qyTBxTztIpQ.
|
1036 |
+
Hejna III, D. J. and Sadigh, D. Few-shot preference learning
|
1037 |
+
for human-in-the-loop rl. In 6th Annual Conference on
|
1038 |
+
Robot Learning, 2022.
|
1039 |
+
Ibarz, B., Leike, J., Pohlen, T., Irving, G., Legg, S., and
|
1040 |
+
Amodei, D. Reward learning from human preferences and
|
1041 |
+
demonstrations in atari. Advances in Neural Information
|
1042 |
+
Processing Systems, 31, 2018.
|
1043 |
+
Lee, K., Smith, L., Dragan, A., and Abbeel, P. B-pref:
|
1044 |
+
Benchmarking preference-based reinforcement learning.
|
1045 |
+
In Thirty-fifth Conference on Neural Information Process-
|
1046 |
+
ing Systems Datasets and Benchmarks Track (Round 1),
|
1047 |
+
2021a.
|
1048 |
+
Lee, K., Smith, L. M., and Abbeel, P. Pebble: Feedback-
|
1049 |
+
efficient interactive reinforcement learning via relabeling
|
1050 |
+
experience and unsupervised pre-training. In Proceed-
|
1051 |
+
ings of the 38th International Conference on Machine
|
1052 |
+
Learning, pp. 6152–6163, 2021b.
|
1053 |
+
Leike, J., Krueger, D., Everitt, T., Martic, M., Maini, V., and
|
1054 |
+
Legg, S. Scalable agent alignment via reward modeling:
|
1055 |
+
a research direction. arXiv preprint arXiv:1811.07871,
|
1056 |
+
2018.
|
1057 |
+
Liang, X., Shu, K., Lee, K., and Abbeel, P. Reward uncer-
|
1058 |
+
tainty for exploration in preference-based reinforcement
|
1059 |
+
learning. In International Conference on Learning Rep-
|
1060 |
+
resentations, 2022.
|
1061 |
+
Mnih, V., Kavukcuoglu, K., Silver, D., Rusu, A. A., Veness,
|
1062 |
+
J., Bellemare, M. G., Graves, A., Riedmiller, M., Fidje-
|
1063 |
+
land, A. K., Ostrovski, G., et al. Human-level control
|
1064 |
+
through deep reinforcement learning. Nature, 518(7540):
|
1065 |
+
529–533, 2015.
|
1066 |
+
Moravˇc´ık, M., Schmid, M., Burch, N., Lis`y, V., Morrill, D.,
|
1067 |
+
Bard, N., Davis, T., Waugh, K., Johanson, M., and Bowl-
|
1068 |
+
ing, M. Deepstack: Expert-level artificial intelligence in
|
1069 |
+
heads-up no-limit poker. Science, 356(6337):508–513,
|
1070 |
+
2017.
|
1071 |
+
Ouyang, L., Wu, J., Jiang, X., Almeida, D., Wainwright,
|
1072 |
+
C. L., Mishkin, P., Zhang, C., Agarwal, S., Slama,
|
1073 |
+
K., Ray, A., et al.
|
1074 |
+
Training language models to fol-
|
1075 |
+
low instructions with human feedback. arXiv preprint
|
1076 |
+
arXiv:2203.02155, 2022.
|
1077 |
+
Park, J., Seo, Y., Shin, J., Lee, H., Abbeel, P., and Lee,
|
1078 |
+
K. SURF: Semi-supervised reward learning with data
|
1079 |
+
augmentation for feedback-efficient preference-based re-
|
1080 |
+
inforcement learning. In International Conference on
|
1081 |
+
Learning Representations, 2022.
|
1082 |
+
Silver, D., Huang, A., Maddison, C. J., Guez, A., Sifre, L.,
|
1083 |
+
Van Den Driessche, G., Schrittwieser, J., Antonoglou, I.,
|
1084 |
+
Panneershelvam, V., Lanctot, M., et al. Mastering the
|
1085 |
+
game of go with deep neural networks and tree search.
|
1086 |
+
Nature, 529(7587):484–489, 2016.
|
1087 |
+
Silver, D., Hubert, T., Schrittwieser, J., Antonoglou, I., Lai,
|
1088 |
+
M., Guez, A., Lanctot, M., Sifre, L., Kumaran, D., Grae-
|
1089 |
+
pel, T., et al. A general reinforcement learning algorithm
|
1090 |
+
that masters chess, shogi, and go through self-play. Sci-
|
1091 |
+
ence, 362(6419):1140–1144, 2018.
|
1092 |
+
Silver, D., Singh, S., Precup, D., and Sutton, R. S. Reward
|
1093 |
+
is enough. Artificial Intelligence, 299:103535, 2021.
|
1094 |
+
Stiennon, N., Ouyang, L., Wu, J., Ziegler, D., Lowe, R.,
|
1095 |
+
Voss, C., Radford, A., Amodei, D., and Christiano,
|
1096 |
+
P. F. Learning to summarize with human feedback. Ad-
|
1097 |
+
vances in Neural Information Processing Systems, 33:
|
1098 |
+
3008–3021, 2020.
|
1099 |
+
Tassa, Y., Doron, Y., Muldal, A., Erez, T., Li, Y., Casas, D.
|
1100 |
+
d. L., Budden, D., Abdolmaleki, A., Merel, J., Lefrancq,
|
1101 |
+
A., et al.
|
1102 |
+
Deepmind control suite.
|
1103 |
+
arXiv preprint
|
1104 |
+
arXiv:1801.00690, 2018.
|
1105 |
+
|
1106 |
+
Reinforcement Learning from Diverse Human Preferences
|
1107 |
+
Tunyasuvunakool, S., Muldal, A., Doron, Y., Liu, S., Bohez,
|
1108 |
+
S., Merel, J., Erez, T., Lillicrap, T., Heess, N., and Tassa,
|
1109 |
+
Y. dm control: Software and tasks for continuous control.
|
1110 |
+
Software Impacts, 6:100022, 2020.
|
1111 |
+
Van der Maaten, L. and Hinton, G. Visualizing data using
|
1112 |
+
t-sne. Journal of Machine Learning Research, 9(11),
|
1113 |
+
2008.
|
1114 |
+
Vinyals, O., Babuschkin, I., Czarnecki, W. M., Mathieu, M.,
|
1115 |
+
Dudzik, A., Chung, J., Choi, D. H., Powell, R., Ewalds,
|
1116 |
+
T., Georgiev, P., et al. Grandmaster level in starcraft ii
|
1117 |
+
using multi-agent reinforcement learning. Nature, 575
|
1118 |
+
(7782):350–354, 2019.
|
1119 |
+
Wilson, A., Fern, A., and Tadepalli, P. A bayesian approach
|
1120 |
+
for policy learning from trajectory preference queries.
|
1121 |
+
Advances in Neural Information Processing Systems, 25,
|
1122 |
+
2012.
|
1123 |
+
Wurman, P. R., Barrett, S., Kawamoto, K., MacGlashan, J.,
|
1124 |
+
Subramanian, K., Walsh, T. J., Capobianco, R., Devlic,
|
1125 |
+
A., Eckert, F., Fuchs, F., et al. Outracing champion gran
|
1126 |
+
turismo drivers with deep reinforcement learning. Nature,
|
1127 |
+
602(7896):223–228, 2022.
|
1128 |
+
Yu, T., Quillen, D., He, Z., Julian, R., Hausman, K., Finn,
|
1129 |
+
C., and Levine, S. Meta-world: A benchmark and evalua-
|
1130 |
+
tion for multi-task and meta reinforcement learning. In
|
1131 |
+
Conference on Robot Learning, pp. 1094–1100. PMLR,
|
1132 |
+
2020.
|
1133 |
+
|
49FKT4oBgHgl3EQfSC3u/content/tmp_files/load_file.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
4NAzT4oBgHgl3EQfD_rN/content/tmp_files/2301.00987v1.pdf.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
4NAzT4oBgHgl3EQfD_rN/content/tmp_files/load_file.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
4dFIT4oBgHgl3EQf6yuB/vector_store/index.faiss
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:7171eb31177c26face7730f48e1ed5fa2620a66adc313299de2a4a108019b08b
|
3 |
+
size 2687021
|
4dFIT4oBgHgl3EQf6yuB/vector_store/index.pkl
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:f2b5f7bd73608b6c809b18475017412a0ffc26099289425272a1c9399086a900
|
3 |
+
size 87709
|
6tAzT4oBgHgl3EQfgPwz/content/2301.01464v1.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:3a0d78a16f9953dcd882e3e89995f1fd2f7a19bdf1f6878d74db9a1132c8949d
|
3 |
+
size 1108418
|
6tE2T4oBgHgl3EQfkwcv/content/tmp_files/2301.03981v1.pdf.txt
ADDED
@@ -0,0 +1,617 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
The Lüscher scattering formalism on the 𝒕-channel cut
|
2 |
+
André Baião Raposo𝑎,∗ and Maxwell T. Hansen𝑎
|
3 |
+
𝑎Higgs Centre for Theoretical Physics, School of Physics and Astronomy,
|
4 |
+
The University of Edinburgh, Edinburgh EH9 3FD, UK
|
5 |
+
E-mail: [email protected], [email protected]
|
6 |
+
The Lüscher scattering formalism, the standard approach for relating the discrete finite-volume
|
7 |
+
energy spectrum to two-to-two scattering amplitudes, fails when analytically continued so far below
|
8 |
+
the infinite-volume two-particle threshold that one encounters the 𝑡-channel cut. This is relevant,
|
9 |
+
especially in baryon-baryon scattering applications, as finite-volume energies can be observed in
|
10 |
+
this below-threshold regime, and it is not clear how to make use of them. In this talk, we present a
|
11 |
+
generalization of the scattering formalism that resolves this issue, allowing one to also constrain
|
12 |
+
scattering amplitudes on the 𝑡-channel cut.
|
13 |
+
39th International Symposium on Lattice Field Theory - Lattice2022
|
14 |
+
8-13 August 2022
|
15 |
+
Bonn, Germany
|
16 |
+
∗Speaker
|
17 |
+
© Copyright owned by the author(s) under the terms of the Creative Commons
|
18 |
+
Attribution-NonCommercial-NoDerivatives 4.0 International License (CC BY-NC-ND 4.0).
|
19 |
+
https://pos.sissa.it/
|
20 |
+
arXiv:2301.03981v1 [hep-lat] 10 Jan 2023
|
21 |
+
|
22 |
+
The Lüscher scattering formalism on the 𝑡-channel cut
|
23 |
+
André Baião Raposo
|
24 |
+
1.
|
25 |
+
Introduction & motivation
|
26 |
+
In recent years, there has been considerable progress in the determination of two-nucleon and
|
27 |
+
other two-baryon scattering amplitudes using numerical lattice QCD [1–9]. One of the leading
|
28 |
+
methods in these calculations is to first extract the finite-volume energy spectrum and subsequently
|
29 |
+
the scattering amplitudes via the Lüscher formalism and its extensions [10–20]. In such calculations,
|
30 |
+
each finite-volume energy level constrains or predicts the scattering matrix for all multi-hadron
|
31 |
+
channels that can physically propagate at that energy.
|
32 |
+
One limitation in all finite-volume formalisms published to date is the neglect of volume effects
|
33 |
+
associated with the 𝑡-channel (also called left-hand) cuts.1 This is most obviously a problem when
|
34 |
+
the lattice calculation predicts energies that are on top of the cut, as has recently been seen in
|
35 |
+
ref. [7]. The finite-volume formalism is manifestly not applicable here, as it leads to predictions of a
|
36 |
+
real-valued K-matrix (equivalently, a real-valued scattering phase shift) in a region where the latter
|
37 |
+
is known to be complex.
|
38 |
+
In this proceedings, we present an extension of the original formalism that can be applied on
|
39 |
+
the left-hand cut. We begin with a brief review of infinite-volume scattering theory as well as the
|
40 |
+
standard Lüscher formalism, in sections 2 and 3, respectively. In section 4, we illustrate how the
|
41 |
+
𝑡-channel cut becomes an issue and, in section 5, we briefly describe our approach to a solution, the
|
42 |
+
full details of which will be presented in a publication (to appear). Conclusions and an outlook are
|
43 |
+
given in section 6.
|
44 |
+
2.
|
45 |
+
Two-to-two scattering in infinite-volume
|
46 |
+
We start by reviewing a few properties of scattering amplitudes in the infinite-volume context,
|
47 |
+
making no reference yet to the finite-volume formalism. Considering two-to-two elastic scattering
|
48 |
+
of non-identical mass-degenerate spin-zero particles with physical mass 𝑀, we write the total
|
49 |
+
four-momentum in a given frame as 𝑃 = (𝐸, 𝑷) and introduce the standard Mandelstam invariants
|
50 |
+
𝑠 and 𝑡. Mandelstam 𝑠 satisfies 𝑠 = 𝑃2 = 𝐸2 − 𝑷2 = (𝐸★)2, where 𝐸★ denotes the centre-of-mass
|
51 |
+
frame energy. Note we will use ★ to denote quantities boosted to the centre-of-mass frame.
|
52 |
+
The scattering amplitude, which we write M(𝑠, 𝑡), can be formally expressed as the sum of
|
53 |
+
all connected and amputated two-to-two Feynman diagrams, with legs amputated and set on the
|
54 |
+
mass shell (i.e. with external momenta 𝑝 having 𝑝2 = (𝑝0)2 − 𝒑2 = 𝑀2). This all-orders sum can
|
55 |
+
be organized by introducing the Bethe-Salpeter kernel, defined as the sum of all connected and
|
56 |
+
amputated two-to-two diagrams that are two-particle irreducible in the 𝑠-channel2. The amplitude
|
57 |
+
is then expressible in terms of the Bethe-Salpeter kernels and pairs of dressed propagators of the
|
58 |
+
scattering scalars, as shown in figure 1. Note that all propagators considered are taken with the
|
59 |
+
standard 𝑖𝜖 prescription, and all loop momenta are integrated over all components.
|
60 |
+
1For ref. [21], the issue of the cut may be circumvented by working in the plane-wave basis, but this is not specifically
|
61 |
+
discussed in those proceedings.
|
62 |
+
2In other words, the Bethe-Salpeter kernel is built from diagrams that cannot be separated into two pieces by cutting
|
63 |
+
through two propagators whose momenta sum to the total four-momentum 𝑃 = (𝐸, 𝑷).
|
64 |
+
2
|
65 |
+
|
66 |
+
The Lüscher scattering formalism on the 𝑡-channel cut
|
67 |
+
André Baião Raposo
|
68 |
+
Figure 1: (a) Diagrammatic representation of the two-to-two scattering amplitude using Bethe-Salpeter
|
69 |
+
kernels and dressed propagators. (b) De��nition of the Bethe-Salpeter kernel as the sum of all connected
|
70 |
+
and amputated two-to-two diagrams which are two-particle irreducible in the 𝑠-channel; we assume that
|
71 |
+
self-interactions of the scattering particles are Z2-invariant, such that we consider vertices with even number
|
72 |
+
of legs only, while dashed lines denote other particles that might couple to the scattering channels of interest.
|
73 |
+
(c) Definition of the dressed propagator in terms of bare propagators and self-energy kernels. (d) Definition of
|
74 |
+
the self-energy as the sum of all one-particle irreducible diagrams, with dashed lines again denoting other
|
75 |
+
particle types that can couple to the scattering particles.
|
76 |
+
It is also instructive to define partial-wave amplitudes according to
|
77 |
+
M(𝑠, 𝑡) =
|
78 |
+
∞
|
79 |
+
∑︁
|
80 |
+
ℓ=0
|
81 |
+
𝑃ℓ(cos 𝜃★)Mℓ(𝑠) ,
|
82 |
+
(1)
|
83 |
+
where 𝑃ℓ is a Legendre polynomial and 𝜃★ is the scattering angle in the centre-of-mass frame,
|
84 |
+
satisfying sin2(𝜃★/2) = −𝑡/(𝑠 − 4𝑀2).
|
85 |
+
Using the all-orders Bethe-Salpeter representation (as discussed below) or constraints based
|
86 |
+
on the unitarity of the scattering matrix, one can show that the imaginary part of Mℓ(𝑠)−1 is
|
87 |
+
independent of the details of particle interactions. The real part is then typically parameterized using
|
88 |
+
the scattering phase shift 𝛿ℓ(𝑠). We may write
|
89 |
+
Im Mℓ(𝑠)−1 = −𝜌(𝑠) Θ(𝐸★ − 2𝑀) ,
|
90 |
+
(2)
|
91 |
+
Re Mℓ(𝑠)−1 = 𝜌(𝑠) cot 𝛿ℓ(𝑠) ≡ Kℓ(𝑠)−1 ,
|
92 |
+
(3)
|
93 |
+
where 𝜌(𝑠) ≡
|
94 |
+
𝑝★
|
95 |
+
8𝜋𝐸★ is the phase-space factor for non-identical particles, with 𝑝★ ≡ 1
|
96 |
+
2
|
97 |
+
√
|
98 |
+
𝑠 − 4𝑀2
|
99 |
+
denoting each particle’s centre-of-mass spatial momentum magnitude, and we have defined the
|
100 |
+
K-matrix Kℓ(𝑠). This leads to the standard form of the partial-wave amplitude
|
101 |
+
Mℓ(𝑠) =
|
102 |
+
1
|
103 |
+
Kℓ(𝑠)−1 − 𝑖𝜌(𝑠) =
|
104 |
+
8𝜋𝐸★
|
105 |
+
𝑝★ cot 𝛿ℓ − 𝑖𝑝★ .
|
106 |
+
(4)
|
107 |
+
One can also reach these results via the Bethe-Salpeter series of figure 1 if one defines the
|
108 |
+
K-matrix K by the same series as the amplitude M, but in which all two-particle loops are evaluated
|
109 |
+
with a principal-value prescription instead of the 𝑖𝜖 prescription. The definitions of M and K can
|
110 |
+
3
|
111 |
+
|
112 |
+
The Lüscher scattering formalism on the 𝑡-channel cut
|
113 |
+
André Baião Raposo
|
114 |
+
then be related by writing each 𝑖𝜖-loop in terms of its real and imaginary parts. The former coincides
|
115 |
+
with the principal-value loop integral, and the latter leads to a Dirac delta function, allowing the
|
116 |
+
loop integral to be exactly evaluated.
|
117 |
+
We should emphasize that these relations hold only for (2𝑀)2 < 𝑠 < (𝐸★
|
118 |
+
inel.)2 where 𝐸inel. is
|
119 |
+
the energy of the lowest-lying inelastic threshold coupling to the channel of interest. This fact has
|
120 |
+
received significant attention for energies above 𝐸inel. (in the form of three-particle finite-volume
|
121 |
+
formalisms [22–27]), but in this work we are concerned with the range 𝑠 < (2𝑀)2. For these
|
122 |
+
sub-threshold energies, one can analytically continue the amplitude by taking −𝑖𝜌(𝑠) → |𝜌(𝑠)| in
|
123 |
+
order to remain on the physical Riemann sheet.
|
124 |
+
Such analytic continuation leads to a real-valued scattering amplitude, provided that the K-matrix
|
125 |
+
is real. When, however, we have a lighter particle that couples to the scattering channel of interest,
|
126 |
+
the K-matrix partial waves become complex-valued due to a sub-threshold branch cut, the so-called
|
127 |
+
𝑡-channel or left-hand cut. Before turning to the consequences of the cut, we review the standard
|
128 |
+
finite-volume formalism of Lüscher and show that a real-valued K-matrix is implicitly assumed in
|
129 |
+
the sub-threshold analytic continuation, and thus that the formalism is not applicable on the left-hand
|
130 |
+
cut.
|
131 |
+
3.
|
132 |
+
Review of the Lüscher formalism
|
133 |
+
In this section, we review the derivation of the Lüscher quantization condition [10], which has
|
134 |
+
been subsequently extended in refs. [11–20] to include all types of coupled two-particle channels.
|
135 |
+
We focus here on the case of a single channel with two mass-degenerate but non-identical spin-zero
|
136 |
+
particles.
|
137 |
+
Consider a quantum field theory defined in a finite cubic spatial volume of side-length 𝐿, with
|
138 |
+
periodic boundary conditions. This system then has a discrete 𝐿-dependent energy spectrum, and
|
139 |
+
the energies lying below the lowest-lying three- or four-particle threshold can be used to extract the
|
140 |
+
elastic two-to-two scattering amplitude. We follow closely the derivation of Kim, Sachrajda and
|
141 |
+
Sharpe [13], also used in refs. [17, 28–30]. We begin by defining a two-point correlation function
|
142 |
+
𝐶𝐿(𝐸, 𝑷) =
|
143 |
+
∫
|
144 |
+
𝑑𝑥0
|
145 |
+
∫
|
146 |
+
𝐿
|
147 |
+
𝑑3𝒙 𝑒−𝑖𝐸𝑥0𝑒𝑖𝑷·𝒙⟨0|TA(𝑥)A†(0)|0⟩𝐿 ,
|
148 |
+
(5)
|
149 |
+
where the subscript 𝐿 in
|
150 |
+
∫
|
151 |
+
𝐿 𝑑3𝒙 indicates that the integral runs over the finite volume, 𝐸 denotes the
|
152 |
+
total energy, 𝑷 is the total spatial momentum, and A(𝑥) and A†(𝑥) are annihilation and creation
|
153 |
+
operators carrying the quantum numbers of the scattering channel of interest.
|
154 |
+
One can construct a diagrammatic representation for this correlator using the ingredients already
|
155 |
+
introduced in the previous section, the Bethe-Salpeter kernel and the dressed propagator pairs. This
|
156 |
+
is known as the skeleton expansion for the correlator and is shown in figure 2. In finite volume,
|
157 |
+
spatial loop momenta are discretized as 𝒌 = 2𝜋
|
158 |
+
𝐿 𝒏, with 𝒏 ∈ Z3, and we have spatial loop momentum
|
159 |
+
sums instead of integrals, i.e. we replace
|
160 |
+
∫
|
161 |
+
𝑑3𝒌
|
162 |
+
(2𝜋)3 →
|
163 |
+
1
|
164 |
+
𝐿3
|
165 |
+
�
|
166 |
+
𝒌 ∈(2𝜋/𝐿)Z3 in all loops.
|
167 |
+
The key observation for deriving the Lüscher formalism is that not all loops have the same
|
168 |
+
volume dependence: loops with intermediate states that cannot go on shell in the energy range
|
169 |
+
considered have exponentially suppressed volume effects O(𝑒−𝑚𝐿), with 𝑚 being the mass of the
|
170 |
+
lightest particle coupled to the system, while loops with intermediate states that can go on shell
|
171 |
+
4
|
172 |
+
|
173 |
+
The Lüscher scattering formalism on the 𝑡-channel cut
|
174 |
+
André Baião Raposo
|
175 |
+
Figure 2: Skeleton-expansion representation of the finite-volume correlator 𝐶𝐿(𝐸, 𝑷), in terms of Bethe-
|
176 |
+
Salpeter kernels and dressed propagators, as defined in figure 1. The end-cap “blobs” stand for functions
|
177 |
+
in momentum-space originating from the Fourier transforms of the creation and annihilation operators. As
|
178 |
+
discussed, one can take the kernels and dressed propagators in the expansion to be the infinite-volume objects,
|
179 |
+
as the difference between these and their finite-volume counterparts is exponentially suppressed, and thus only
|
180 |
+
the loops explicitly shown need to be treated as finite-volume loops.
|
181 |
+
receive power-like effects O(𝐿−𝑛), for some non-negative integer 𝑛. In the elastic regime, i.e. for
|
182 |
+
centre-of-mass frame energies above the two-particle threshold but below the thresholds of all other
|
183 |
+
channels, on-shell states come precisely from the loops left explicit in the skeleton expansion shown
|
184 |
+
in figure 2. Every other loop, implicitly included in either the Bethe-Salpeter kernels or the dressed
|
185 |
+
propagators, may be replaced by its infinite-volume counterpart, as the difference, which we neglect,
|
186 |
+
is exponentially suppressed in 𝐿. Thus, we effectively replace the finite-volume Bethe-Salpeter
|
187 |
+
kernels and dressed propagators with their infinite-volume counterparts.
|
188 |
+
Consider one of the two-particle loops shown in the expansion of figure 2. Its contribution can
|
189 |
+
be written as
|
190 |
+
𝐶loop
|
191 |
+
𝐿
|
192 |
+
(𝑃) =
|
193 |
+
∫
|
194 |
+
𝑑𝑘0
|
195 |
+
2𝜋
|
196 |
+
1
|
197 |
+
𝐿3
|
198 |
+
∑︁
|
199 |
+
𝒌
|
200 |
+
L(𝑃, 𝑘) Δ(𝑘) Δ(𝑃 − 𝑘) R∗(𝑃, 𝑘) ,
|
201 |
+
(6)
|
202 |
+
with 𝑃 ≡ (𝐸, 𝑷) and loop momentum 𝑘 ≡ (𝑘0, 𝒌). The functions L and R∗ stand for the objects
|
203 |
+
before and after the given loop, Δ is a fully dressed scalar propagator (defined to have unit residue at
|
204 |
+
each pole). Performing the 𝑘0-integral and decomposing L and R in spherical harmonics with 𝑘
|
205 |
+
individually put on shell, i.e. setting 𝑘 = (𝜔(𝒌), 𝒌) with 𝜔(𝒌) ≡
|
206 |
+
√︁
|
207 |
+
𝒌2 + 𝑀2, we can obtain
|
208 |
+
𝐶loop
|
209 |
+
𝐿
|
210 |
+
(𝑃) = 1
|
211 |
+
𝐿3
|
212 |
+
∑︁
|
213 |
+
𝒌
|
214 |
+
Lℓ𝑚(𝑃, |𝒌★|) 𝑖Sℓ𝑚;ℓ′𝑚′(𝑃, 𝒌; 𝐿) R∗
|
215 |
+
ℓ′𝑚′(𝑃, |𝒌★|) + 𝑟(𝑃) ,
|
216 |
+
(7)
|
217 |
+
where we have introduced
|
218 |
+
Sℓ𝑚;ℓ′𝑚′(𝑃, 𝒌; 𝐿) ≡
|
219 |
+
4𝜋𝑌ℓ𝑚( ˆ𝒌★) 𝑌∗
|
220 |
+
ℓ′𝑚′( ˆ𝒌★) 𝐻(𝒌★)
|
221 |
+
2𝜔(𝒌) 2𝜔(𝑷 − 𝒌) (𝐸 − 𝜔(𝒌) − 𝜔(𝑷 − 𝒌))
|
222 |
+
� |𝒌★|
|
223 |
+
𝑘★
|
224 |
+
os
|
225 |
+
�ℓ+ℓ′
|
226 |
+
,
|
227 |
+
(8)
|
228 |
+
for later convenience. Note also that sums over the repeated indices ℓ, 𝑚 and ℓ′, 𝑚′ are implied.
|
229 |
+
The term 𝑟(𝑃) in eq. (7) is a sum over a smooth summand, leading to exponentially suppressed
|
230 |
+
finite-volume corrections, which we may neglect. The summand in the first term and, more
|
231 |
+
specifically, the quantities Sℓ𝑚;ℓ′𝑚′(𝑃, 𝒌; 𝐿), contain the pole corresponding to the two-particle
|
232 |
+
intermediate state going on-shell, as can be seen explicitly in eq. (8), and thus this term contains all
|
233 |
+
the power-like volume dependence arising from the loop we are considering.
|
234 |
+
In eq. (8), we use the notation 𝑘★
|
235 |
+
os for the value of |𝒌★| which satisfies the intermediate
|
236 |
+
two-particle state on-shell condition 𝐸★ = 2𝜔(𝒌★), equivalent to 𝐸 = 𝜔(𝒌) + 𝜔(𝑷 − 𝒌), given by
|
237 |
+
the simple relation
|
238 |
+
𝑘★
|
239 |
+
os ≡ 1
|
240 |
+
2
|
241 |
+
√︁
|
242 |
+
𝑠 − 4𝑀2 = 1
|
243 |
+
2
|
244 |
+
√︁
|
245 |
+
𝐸2 − 𝑷2 − 4𝑀2 .
|
246 |
+
(9)
|
247 |
+
5
|
248 |
+
|
249 |
+
The Lüscher scattering formalism on the 𝑡-channel cut
|
250 |
+
André Baião Raposo
|
251 |
+
Note that this relation fixes the magnitude of 𝒌★ at the pole, but not its direction. The barrier
|
252 |
+
factor �|𝒌★|/𝑘★
|
253 |
+
os
|
254 |
+
�ℓ+ℓ′
|
255 |
+
is introduced to ensure that no singularities arise from the spherical harmonics
|
256 |
+
𝑌ℓ𝑚( ˆ𝒌★) and 𝑌∗
|
257 |
+
ℓ′𝑚′( ˆ𝒌★).
|
258 |
+
The function 𝐻(𝒌★) is a regulator function that takes a value of 1 for 4𝜔(𝒌★)2 = 4(|𝒌★|2+𝑀2) <
|
259 |
+
(𝐸★
|
260 |
+
inel.)2 and of 0 for 4𝜔(𝒌★)2 = 4(|𝒌★|2 + 𝑀2) > (𝐸★
|
261 |
+
uv)2, where again 𝐸inel. is the lowest lying three-
|
262 |
+
or four-particle threshold, and 𝐸★
|
263 |
+
uv is some chosen high ultraviolet cut-off. In the region between,
|
264 |
+
𝐻(𝒌★) interpolates smoothly between the two values. This regulator function is similar to the one
|
265 |
+
found in the three-body scattering formalism of refs. [22, 23], and corresponds to a separation of
|
266 |
+
low-energy and high-energy parts of the sum, such that both parts are regulated and kept finite.3
|
267 |
+
We next reduce eq. (7) by expanding the functions Lℓ𝑚(𝑃, |𝒌★|) and R∗
|
268 |
+
ℓ′𝑚′(𝑃, |𝒌★|) about
|
269 |
+
|𝒌★| = 𝑘★
|
270 |
+
os and subtracting and adding an integral to reach
|
271 |
+
𝐶loop
|
272 |
+
𝐿
|
273 |
+
(𝑃) = Lℓ𝑚(𝑃, 𝑘★
|
274 |
+
os) 𝑖𝐹ℓ𝑚;ℓ′𝑚′(𝑃; 𝐿) R∗
|
275 |
+
ℓ′𝑚′(𝑃, 𝑘★
|
276 |
+
os) + 𝑟′(𝑃) ,
|
277 |
+
= Los(𝑃) 𝑖𝐹(𝑃; 𝐿) R†
|
278 |
+
os(𝑃) + 𝑟′(𝑃) ,
|
279 |
+
(10)
|
280 |
+
where we introduce the sum-integral difference
|
281 |
+
𝐹ℓ𝑚;ℓ′𝑚′(𝑃; 𝐿) =
|
282 |
+
�
|
283 |
+
1
|
284 |
+
𝐿3
|
285 |
+
∑︁
|
286 |
+
𝒌
|
287 |
+
− p.v.
|
288 |
+
∫
|
289 |
+
𝑑3𝒌
|
290 |
+
(2𝜋)3
|
291 |
+
�
|
292 |
+
Sℓ𝑚;ℓ′𝑚′(𝑃, 𝒌; 𝐿) .
|
293 |
+
(11)
|
294 |
+
Here, p.v. means the integral is evaluated using a principal-value prescription. The remainder term
|
295 |
+
𝑟′(𝑃) differs from 𝑟(𝑃), but still has the property that it contains the sum of a smooth summand
|
296 |
+
together with integrals. In the second line of eq. (10), we have defined a compact vector-matrix
|
297 |
+
notation in the angular-momentum index space.
|
298 |
+
Applying this procedure iteratively to all loops in the skeleton expansion diagrams, it can be
|
299 |
+
shown that we may write the finite-volume correlator in the form:
|
300 |
+
𝐶𝐿(𝑃) =
|
301 |
+
∞
|
302 |
+
∑︁
|
303 |
+
𝑛=0
|
304 |
+
𝐴(𝑃) 𝑖𝐹(𝑃; 𝐿) [𝑖K(𝑃) 𝑖𝐹(𝑃; 𝐿)]𝑛 𝐴†(𝑃) + 𝐶∞(𝑃) .
|
305 |
+
(12)
|
306 |
+
The quantities in the first term are vectors or matrices in angular momentum index space: 𝐴(𝑃) and
|
307 |
+
𝐴†(𝑃) are smooth vectors loosely corresponding to the source and sink operators and K(𝑃) is the
|
308 |
+
K-matrix introduced in the previous section (note that K is an infinite-volume scalar, and thus only
|
309 |
+
depends on 𝑠 = 𝑃2, but we keep 𝑃 as an argument for compactness of notation). Noting that the
|
310 |
+
above is a geometric series, we can sum it to obtain
|
311 |
+
𝐶𝐿(𝑃) = 𝐴(𝑃)
|
312 |
+
𝑖
|
313 |
+
𝐹−1(𝑃; 𝐿) + K(𝑃) 𝐴†(𝑃) + 𝐶∞(𝑃) .
|
314 |
+
(13)
|
315 |
+
Given that we neglect exponentially suppressed volume effects, the volume dependence is entirely
|
316 |
+
contained in the 𝐹(𝑃; 𝐿) matrix.
|
317 |
+
3It should be emphasized that we have renormalization and regularization schemes keeping the overall result finite, the
|
318 |
+
regulator function here simply ensures we have a separation of high-energy and low-energy contributions to the sum such
|
319 |
+
that both parts are finite and that the low-energy part, which contains the relevant singular behaviour, is tractable when
|
320 |
+
implemented numerically. 𝐸uv will simply be a scheme-dependence of the formalism, but should be kept high, as setting
|
321 |
+
it too low will lead to enhanced finite-volume effects.
|
322 |
+
6
|
323 |
+
|
324 |
+
The Lüscher scattering formalism on the 𝑡-channel cut
|
325 |
+
André Baião Raposo
|
326 |
+
Using a spectral representation of the correlator, it is straightforward to show that it must have
|
327 |
+
poles at the energy levels of the finite-volume spectrum 𝐸𝑛(𝑷; 𝐿). These poles in 𝐶𝐿(𝐸, 𝑷) can
|
328 |
+
only arise from the 𝐿-dependent part of the first term, meaning that we must have
|
329 |
+
det
|
330 |
+
�
|
331 |
+
𝐹−1(𝐸𝑛(𝑷; 𝐿), 𝑷; 𝐿) + K(𝐸𝑛(𝑷; 𝐿), 𝑷)
|
332 |
+
�
|
333 |
+
= 0 ,
|
334 |
+
(14)
|
335 |
+
at all finite-volume energy levels. This is called the Lüscher quantization condition, and it can be
|
336 |
+
used to determine K, and hence the scattering amplitude M, from the knowledge of the finite-volume
|
337 |
+
spectrum. The matrices involved in the condition (14) are formally infinite-dimensional, since the
|
338 |
+
set of possible angular momentum indices ℓ𝑚 is infinite. For practical use, we must truncate them to
|
339 |
+
the lowest harmonics, making the approximation that K vanishes for ℓ > ℓmax. We should note that
|
340 |
+
this relies on a fast convergence of the partial-wave expansion of the amplitude, such that keeping
|
341 |
+
the lowest harmonics still leads to a reasonable reconstruction of the amplitude.
|
342 |
+
4.
|
343 |
+
The 𝑡-channel problem
|
344 |
+
The finite-volume spectrum can sometimes include energy levels that drop below the infinite-
|
345 |
+
volume elastic threshold at 𝑠 = (2𝑀)2. This can occur due to the appearance of a bound state (such
|
346 |
+
that the 𝐿 → ∞ limit gives the bound-state mass) as well as to an attractive scattering state (such that
|
347 |
+
the energy approaches 2𝑀 for 𝐿 → ∞). In many cases, the Lüscher formalism can be analytically
|
348 |
+
continued from 𝑠 > (2𝑀)2 and the sub-threshold finite-volume energy then provides an important
|
349 |
+
constraint on the K-matrix below threshold.
|
350 |
+
A subtlety arises, however, when the sub-threshold two-to-two scattering amplitude M(𝑠, 𝑡), and
|
351 |
+
therefore also the K-matrix, has a nearby 𝑡-channel cut. This is generically the case in baryon-baryon
|
352 |
+
systems, for example, where a light meson can be exchanged in the 𝑡-channel as shown in figure 3.
|
353 |
+
Taking 𝑚 and 𝑀 to be the meson and baryon masses, respectively, and assuming 𝑚 ≪ 𝑀, one finds
|
354 |
+
that a pole arises in M(𝑠, 𝑡) at 𝑡 = 𝑚2. Then, for a given fixed choice of the centre-of-mass frame
|
355 |
+
scattering angle 𝜃★, this leads to a pole in 𝑠 at
|
356 |
+
𝑠 = 4𝑀2 −
|
357 |
+
𝑡
|
358 |
+
sin2(𝜃★/2)
|
359 |
+
����
|
360 |
+
𝑡=𝑚2 = 4𝑀2 −
|
361 |
+
𝑚2
|
362 |
+
sin2(𝜃★/2)
|
363 |
+
.
|
364 |
+
(15)
|
365 |
+
The analytic structure of the scattering amplitude for such systems is shown in figure 4(a). From
|
366 |
+
the expression, one sees that the pole position in 𝑠 varies from 𝑠 = 4𝑀2 − 𝑚2 to 𝑠 = −∞ as 𝜃★ is
|
367 |
+
varied from 0 to 𝜋. As a result, the angular-momentum projection of the scattering amplitude leads
|
368 |
+
to a branch cut running over this interval as shown in figure 4(b). Multiple meson exchanges can
|
369 |
+
also occur, leading to additional cuts in both the fixed-𝜃★ and the angular-momentum projected
|
370 |
+
amplitudes. In the latter case, these run along 𝑠 ≤ (2𝑀)2 − (𝑛𝑚)2 for 𝑛 exchanged mesons.
|
371 |
+
As stressed above, finite-volume energies can arise in the region of the branch cuts (as has
|
372 |
+
recently been identified in ref. [7]) and a naive application of the analytically continued Lüscher
|
373 |
+
formalism fails. In this work we restrict attention to the region (2𝑀)2 − (2𝑚)2 < 𝑠 < (2𝑀)2 − 𝑚2
|
374 |
+
in which only the single-meson cut arises and derive a modified version of the scattering formalism
|
375 |
+
that resolves this limitation.
|
376 |
+
7
|
377 |
+
|
378 |
+
The Lüscher scattering formalism on the 𝑡-channel cut
|
379 |
+
André Baião Raposo
|
380 |
+
Figure 3: Meson exchanges contributing to the baryon-baryon scattering amplitude, expressed diagrammati-
|
381 |
+
cally as a dressed 𝑡-channel meson propagator (with time flowing horizontally). The exchanged meson is a
|
382 |
+
pion in the case of 𝑁𝑁 scattering or an 𝜂 meson in the case of ΛΛ scattering. In the latter case this is not the
|
383 |
+
nearest singularity for physical quark masses but can become so for heavier-than-physical masses.
|
384 |
+
Figure 4: (a) Analytic structure of the two-to-two scattering amplitude M(𝑠, 𝑡) in the complex-𝑠 plane,
|
385 |
+
for fixed centre-of-mass scattering angle 𝜃★, in the case where a lighter particle of mass 𝑚 couples to the
|
386 |
+
scattering particles of mass 𝑀. We show the infinite-volume elastic threshold (at 𝑠 = (2𝑀)2) and inelastic
|
387 |
+
threshold (at 𝑠 = (2𝑀 + 𝑚)2) and corresponding branch cuts. Below threshold, we see the 𝑡-channel exchange
|
388 |
+
pole, corresponding to 𝑡 = 𝑚2, and a lower branch cut, corresponding to two mesons being exchanged in
|
389 |
+
the 𝑡 channel. (b) Analytic structure of the amplitude when projected to definite angular momentum. The
|
390 |
+
so-called 𝑡-channel or left-hand cut, which runs down from the branch point at 𝑠 = (2𝑀)2 − 𝑚2, arises from
|
391 |
+
the 𝑡-channel pole above.
|
392 |
+
5.
|
393 |
+
Proposed solution
|
394 |
+
The origin of the breakdown in the original formalism can be traced back to the steps between
|
395 |
+
eq. (7) and (10) in the review of section 3. In the step of replacing Lℓ𝑚(𝑃, |𝒌★|) and R∗
|
396 |
+
ℓ′𝑚′(𝑃, |𝒌★|)
|
397 |
+
with the on-shell quantities Lℓ𝑚(𝑃, 𝑘★
|
398 |
+
os) and R∗
|
399 |
+
ℓ′𝑚′(𝑃, 𝑘★
|
400 |
+
os), the derivation assumes that the product
|
401 |
+
of the two-particle pole and a given difference, e.g. Lℓ𝑚(𝑃, |𝒌★|)−Lℓ𝑚(𝑃, 𝑘★
|
402 |
+
os), is a smooth function
|
403 |
+
of 𝒌★. This step fails in the sub-threshold region due to the 𝑡-channel cut.
|
404 |
+
To handle this issue, we separate out the problematic 𝑡-channel exchanges from the Bethe-Salpeter
|
405 |
+
kernel. We define
|
406 |
+
𝑖𝑔2𝑇(𝒌★, 𝒌′★) ≡ −𝑖𝑔2
|
407 |
+
1
|
408 |
+
−(𝒌★ − 𝒌′★)2 − 𝑚2 + 𝑖𝜖 ,
|
409 |
+
(16)
|
410 |
+
and define a modified kernel by subtracting this from the full Bethe-Salpeter kernel as shown in
|
411 |
+
figure 5. Here, 𝑔 denotes the effective baryon-meson-baryon coupling. We emphasize that 𝑚 is the
|
412 |
+
physical mass of the meson, and thus that −𝑖𝑇 corresponds to the singular part of the fully-dressed
|
413 |
+
meson propagator. The difference between the bare and fully dressed propagators is smooth, and is
|
414 |
+
simply absorbed into the modified kernel.
|
415 |
+
8
|
416 |
+
|
417 |
+
The Lüscher scattering formalism on the 𝑡-channel cut
|
418 |
+
André Baião Raposo
|
419 |
+
Figure 5: Separation of the standard Bethe-Salpeter kernel into a modified kernel (square box), which is safe
|
420 |
+
to put on shell, and the problematic 𝑡-channel meson exchange, represented by a meson propagator at physical
|
421 |
+
mass.
|
422 |
+
Examining the modified kernel using, for instance, the cutting rules of time-ordered perturbation
|
423 |
+
theory, shows that it can be safely evaluated at |𝒌★| = 𝑘★
|
424 |
+
os and does not possess a singularity or cut in
|
425 |
+
the region (2𝑀)2 − (2𝑚)2 < 𝑠 < (2𝑀)2 − 𝑚2. Crucially, we also note that the exchange 𝑖𝑔2𝑇 is safe
|
426 |
+
if kept partially off shell, namely if we keep at least one of the magnitudes |𝒌★| and |𝒌′★| to be real.
|
427 |
+
Recalling the expression (10) for the contribution of a skeleton expansion loop, we again
|
428 |
+
emphasize that the finite-volume frame momentum 𝒌, and hence its centre-of-mass frame counterpart
|
429 |
+
𝒌★, are discretized and can be indexed by 𝒏 ∈ Z3. Thus, we can then treat 𝒌★ as an extra index,
|
430 |
+
writing L𝒌★ℓ𝑚 ≡ Lℓ𝑚(𝑃, |𝒌★|), R𝒌★ℓ𝑚 ≡ Rℓ𝑚(𝑃, |𝒌★|) and defining
|
431 |
+
𝑆𝒌★ℓ𝑚;𝒌′★ℓ′𝑚′(𝑃; 𝐿) ≡ 1
|
432 |
+
𝐿3 𝛿𝒌★𝒌′★Sℓ𝑚;ℓ′𝑚′(𝑃, 𝒌; 𝐿) ,
|
433 |
+
(17)
|
434 |
+
such that we may rewrite (10) as:
|
435 |
+
𝐶loop
|
436 |
+
𝐿
|
437 |
+
(𝑃) = L𝒌★ℓ𝑚(𝑃) 𝑖𝑆𝒌★ℓ𝑚;𝒌′★ℓ′𝑚′(𝑃) R𝒌′★ℓ′𝑚′(𝑃; 𝐿) + 𝑟(𝑃) ,
|
438 |
+
(18)
|
439 |
+
= L(𝑃) 𝑖𝑆(𝑃; 𝐿) R(𝑃) + 𝑟(𝑃) .
|
440 |
+
(19)
|
441 |
+
Note that, in the first line, we are now also implicitly summing over the momentum indices. In the
|
442 |
+
second line, we again employ a compact vector-matrix notation, but now in the angular momentum
|
443 |
+
plus spatial loop momentum index space.
|
444 |
+
Applying this to all loops in the skeleton expansion diagrams and rearranging by factors of
|
445 |
+
𝑆(𝑃; 𝐿), we obtain the finite-volume correlator in the form
|
446 |
+
𝐶𝐿(𝑃) =
|
447 |
+
∞
|
448 |
+
∑︁
|
449 |
+
𝑛=0
|
450 |
+
𝐴(𝑃) 𝑖𝑆(𝑃; 𝐿)
|
451 |
+
�
|
452 |
+
(𝑖 ¯𝐾 + 𝑖𝑔2𝑇(𝑃)) 𝑖𝑆(𝑃; 𝐿)
|
453 |
+
�𝑛 𝐴†(𝑃) + 𝐶 (𝑖)
|
454 |
+
∞ (𝑃) ,
|
455 |
+
(20)
|
456 |
+
where all quantities in the first term are vectors or matrices in the angular momentum plus loop
|
457 |
+
momentum index space. Note that 𝐴(𝑃) and 𝐴†(𝑃) are different from those in (10). The matrix
|
458 |
+
𝑖𝑔2𝑇 is the matrix of angular momentum projections of the 𝑡-channel exchange defined in (16), and
|
459 |
+
¯𝐾(𝑃) is the sum of all possible smooth contributions one can obtain between 𝑆(𝑃; 𝐿) matrices. The
|
460 |
+
second term 𝐶 (𝑖)
|
461 |
+
∞ (𝑃) is a collection of 𝐿-independent terms.
|
462 |
+
From the discussion above, we know it is safe to set |𝒌★| = 𝑘★
|
463 |
+
os for ¯𝐾(𝑃) and, therefore,
|
464 |
+
we can expand ¯𝐾(𝑃) about the on-shell point. We implement this by making use of a trivial
|
465 |
+
vector 𝑢 in the momentum index space, whose elements are 𝑢𝒌★ = 1, and making the substitution
|
466 |
+
¯𝐾(𝑃) = 𝑢 ¯K(𝑃)𝑢† +
|
467 |
+
� ¯𝐾(𝑃) − 𝑢 ¯K(𝑃)𝑢†�. The matrix ¯K(𝑃) is a matrix in the angular momentum
|
468 |
+
index space only and corresponds to ¯𝐾(𝑃) with the dependence on the magnitude of spatial
|
469 |
+
momentum (through the momentum index) set to the on-shell momentum, i.e. with |𝒌★| = 𝑘★
|
470 |
+
os. The
|
471 |
+
9
|
472 |
+
|
473 |
+
The Lüscher scattering formalism on the 𝑡-channel cut
|
474 |
+
André Baião Raposo
|
475 |
+
different terms in brackets lead to terms that are sums of smooth summands and can be shuffled into
|
476 |
+
the remainder term. This yields the following expressions for the correlator:
|
477 |
+
𝐶𝐿(𝑃) =
|
478 |
+
∞
|
479 |
+
∑︁
|
480 |
+
𝑛=0
|
481 |
+
𝐴(𝑃) 𝑖𝑆(𝑃; 𝐿)
|
482 |
+
�
|
483 |
+
(𝑖𝑢 ¯K(𝑃)𝑢† + 𝑖𝑔2𝑇(𝑃)) 𝑖𝑆(𝑃; 𝐿)
|
484 |
+
�𝑛 𝐴†(𝑃) + 𝐶 (𝑖𝑖)
|
485 |
+
∞ (𝑃) ,
|
486 |
+
(21)
|
487 |
+
= 𝐴(𝑃)
|
488 |
+
𝑖
|
489 |
+
𝑆−1(𝑃; 𝐿) + 𝑢 ¯K(𝑃)𝑢† + 𝑔2𝑇(𝑃)
|
490 |
+
𝐴†(𝑃) + 𝐶 (𝑖𝑖)
|
491 |
+
∞ (𝑃) .
|
492 |
+
(22)
|
493 |
+
Using the same arguments as in the standard derivation, we can derive a modified quantization
|
494 |
+
condition:
|
495 |
+
det
|
496 |
+
�
|
497 |
+
𝑆−1(𝐸𝑛(𝑷, 𝐿), 𝑷) + 𝑢 ¯K(𝐸𝑛(𝑷, 𝐿), 𝑷)𝑢† + 𝑔2𝑇(𝐸𝑛(𝑷, 𝐿), 𝑷)
|
498 |
+
�
|
499 |
+
= 0 ,
|
500 |
+
(23)
|
501 |
+
at all finite-volume energy levels 𝐸𝑛(𝑷, 𝐿). Given that 𝑆−1(𝐸𝑛(𝑷, 𝐿), 𝑷) and 𝑇(𝐸𝑛(𝑷, 𝐿), 𝑷) can
|
502 |
+
be calculated numerically, one can use the knowledge of the finite-volume spectrum to obtain
|
503 |
+
¯K(𝐸𝑛(𝑷, 𝐿), 𝑷) as well as the coupling 𝑔. This object can then be linked back to the two-to-
|
504 |
+
two scattering amplitude via integral equations, in a similar vein to the procedure used for the
|
505 |
+
three-particle scattering formalism refs. [22, 23, 31]. We leave further discussion to the upcoming
|
506 |
+
paper.
|
507 |
+
6.
|
508 |
+
Summary & Outlook
|
509 |
+
In this proceedings, we have described our progress in addressing issues arising in the Lüscher
|
510 |
+
finite-volume scattering formalism [10] and extensions [11–20] in the case of sub-threshold finite-
|
511 |
+
volume energies appearing on the 𝑡-channel cut. This work is motivated by recent lattice calculations
|
512 |
+
in baryon-baryon systems that have observed such energy levels [7].
|
513 |
+
To present the extension we first reviewed the standard derivation, following the method of Kim,
|
514 |
+
Sachrajda, and Sharpe [13] for the case on non-identical spin-zero particles. We then identified
|
515 |
+
the step in the derivation that fails to correctly account for the sub-threshold cut and provided a
|
516 |
+
modification to address the issue. Our main result is an adapted quantization condition that applies
|
517 |
+
above and below elastic threshold, including on the cut associated with single-meson exchange,
|
518 |
+
though not on lower cuts arising from the exchange of multiple mesons.
|
519 |
+
As we have in mind applications to baryon-baryon scattering, the next step, currently ongoing,
|
520 |
+
is generalizing the derivation to particles with arbitrary intrinsic spin. Once the theoretical work is
|
521 |
+
concluded, future directions include numerical tests on mock data (e.g. in the spirit of refs. [19, 32])
|
522 |
+
and eventually applications to lattice QCD baryon-baryon data.
|
523 |
+
Acknowledgements
|
524 |
+
The authors thank Raúl Briceño, John Bulava, Evgeny Epelbaum, Drew Hanlon, Arkaitz Rodas,
|
525 |
+
Fernando Romero-López, Maxim Mai, Steve Sharpe, and Hartmut Wittig for useful discussions
|
526 |
+
including those in the context of the Bethe Forum on Multihadron Dynamics in a Box that took place
|
527 |
+
at the Bethe Center for Theoretical Physics in Bonn, Germany. M.T.H. is supported by UKRI Future
|
528 |
+
Leader Fellowship MR/T019956/1, and both M.T.H and A.B.R. are partly supported by UK STFC
|
529 |
+
grant ST/P000630/1.
|
530 |
+
10
|
531 |
+
|
532 |
+
The Lüscher scattering formalism on the 𝑡-channel cut
|
533 |
+
André Baião Raposo
|
534 |
+
References
|
535 |
+
[1] (HAL QCD), T. Inoue, S. Aoki, T. Doi, T. Hatsuda, Y. Ikeda, N. Ishii et al., Two-Baryon
|
536 |
+
Potentials and H-Dibaryon from 3-flavor Lattice QCD Simulations, Nucl. Phys. A 881 (2012)
|
537 |
+
28–43, [1112.5926].
|
538 |
+
[2] E. Berkowitz, T. Kurth, A. Nicholson, B. Joo, E. Rinaldi, M. Strother et al., Two-Nucleon
|
539 |
+
Higher Partial-Wave Scattering from Lattice QCD, Phys. Lett. B 765 (2017) 285–292,
|
540 |
+
[1508.00886].
|
541 |
+
[3] M. L. Wagman, F. Winter, E. Chang, Z. Davoudi, W. Detmold, K. Orginos et al.,
|
542 |
+
Baryon-Baryon Interactions and Spin-Flavor Symmetry from Lattice Quantum
|
543 |
+
Chromodynamics, Phys. Rev. D 96 (2017) 114510, [1706.06550].
|
544 |
+
[4] A. Francis, J. R. Green, P. M. Junnarkar, C. Miao, T. D. Rae and H. Wittig, Lattice QCD study
|
545 |
+
of the 𝐻 dibaryon using hexaquark and two-baryon interpolators, Phys. Rev. D 99 (2019)
|
546 |
+
074505, [1805.03966].
|
547 |
+
[5] (HAL QCD), T. Iritani, S. Aoki, T. Doi, T. Hatsuda, Y. Ikeda, T. Inoue et al., Consistency
|
548 |
+
between Lüscher’s finite volume method and HAL QCD method for two-baryon systems in
|
549 |
+
lattice QCD, JHEP 03 (2019) 007, [1812.08539].
|
550 |
+
[6] B. Hörz et al., Two-nucleon S-wave interactions at the 𝑆𝑈(3) flavor-symmetric point with
|
551 |
+
𝑚𝑢𝑑 ≃ 𝑚phys
|
552 |
+
𝑠
|
553 |
+
: A first lattice QCD calculation with the stochastic Laplacian Heaviside method,
|
554 |
+
Phys. Rev. C 103 (2021) 014003, [2009.11825].
|
555 |
+
[7] J. R. Green, A. D. Hanlon, P. M. Junnarkar and H. Wittig, Weakly bound 𝐻 dibaryon from
|
556 |
+
SU(3)-flavor-symmetric QCD, Phys. Rev. Lett. 127 (2021) 242003, [2103.01054].
|
557 |
+
[8] S. Amarasinghe, R. Baghdadi, Z. Davoudi, W. Detmold, M. Illa, A. Parreno et al., A
|
558 |
+
variational study of two-nucleon systems with lattice QCD, 2108.10835.
|
559 |
+
[9] Y. Lyu, H. Tong, T. Sugiura, S. Aoki, T. Doi, T. Hatsuda et al., Optimized two-baryon
|
560 |
+
operators in lattice QCD, Phys. Rev. D 105 (2022) 074512, [2201.02782].
|
561 |
+
[10] M. Luscher, Volume Dependence of the Energy Spectrum in Massive Quantum Field Theories.
|
562 |
+
2. Scattering States, Commun. Math. Phys. 105 (1986) 153–188.
|
563 |
+
[11] K. Rummukainen and S. A. Gottlieb, Resonance scattering phase shifts on a nonrest frame
|
564 |
+
lattice, Nucl. Phys. B 450 (1995) 397–436, [hep-lat/9503028].
|
565 |
+
[12] S. He, X. Feng and C. Liu, Two particle states and the S-matrix elements in multi-channel
|
566 |
+
scattering, JHEP 07 (2005) 011, [hep-lat/0504019].
|
567 |
+
[13] C. H. Kim, C. T. Sachrajda and S. R. Sharpe, Finite-volume effects for two-hadron states in
|
568 |
+
moving frames, Nucl. Phys. B 727 (2005) 218–243, [hep-lat/0507006].
|
569 |
+
[14] M. Lage, U.-G. Meißner and A. Rusetsky, A Method to measure the antikaon-nucleon
|
570 |
+
scattering length in lattice QCD, Phys. Lett. B681 (2009) 439–443, [0905.0069].
|
571 |
+
11
|
572 |
+
|
573 |
+
The Lüscher scattering formalism on the 𝑡-channel cut
|
574 |
+
André Baião Raposo
|
575 |
+
[15] V. Bernard, M. Lage, U. G. Meißner and A. Rusetsky, Scalar mesons in a finite volume, JHEP
|
576 |
+
01 (2011) 019, [1010.6018].
|
577 |
+
[16] Z. Fu, Rummukainen-Gottlieb’s formula on two-particle system with different mass, Phys. Rev.
|
578 |
+
D85 (2012) 014506, [1110.0319].
|
579 |
+
[17] M. T. Hansen and S. R. Sharpe, Multiple-channel generalization of Lellouch-Luscher formula,
|
580 |
+
Phys. Rev. D 86 (2012) 016007, [1204.0826].
|
581 |
+
[18] R. A. Briceño and Z. Davoudi, Moving multichannel systems in a finite volume with
|
582 |
+
application to proton-proton fusion, Phys. Rev. D88 (2013) 094507, [1204.1110].
|
583 |
+
[19] P. Guo, J. Dudek, R. Edwards and A. P. Szczepaniak, Coupled-channel scattering on a torus,
|
584 |
+
Phys. Rev. D 88 (2013) 014501, [1211.0929].
|
585 |
+
[20] R. A. Briceño, Two-particle multichannel systems in a finite volume with arbitrary spin, Phys.
|
586 |
+
Rev. D89 (2014) 074507, [1401.3312].
|
587 |
+
[21] L. Meng and E. Epelbaum, Quantization conditions in the finite volume within the plane wave
|
588 |
+
basis expansion, PoS LATTICE2021 (2022) 361.
|
589 |
+
[22] M. T. Hansen and S. R. Sharpe, Relativistic, model-independent, three-particle quantization
|
590 |
+
condition, Phys. Rev. D 90 (2014) 116003, [1408.5933].
|
591 |
+
[23] M. T. Hansen and S. R. Sharpe, Expressing the three-particle finite-volume spectrum in terms
|
592 |
+
of the three-to-three scattering amplitude, Phys. Rev. D 92 (2015) 114509, [1504.04248].
|
593 |
+
[24] H. W. Hammer, J. Y. Pang and A. Rusetsky, Three particle quantization condition in a finite
|
594 |
+
volume: 2. general formalism and the analysis of data, JHEP 10 (2017) 115, [1707.02176].
|
595 |
+
[25] M. Döring, H. W. Hammer, M. Mai, J. Y. Pang, t. A. Rusetsky and J. Wu, Three-body spectrum
|
596 |
+
in a finite volume: the role of cubic symmetry, Phys. Rev. D 97 (2018) 114508, [1802.03362].
|
597 |
+
[26] M. Mai and M. Döring, Three-body Unitarity in the Finite Volume, Eur. Phys. J. A 53 (2017)
|
598 |
+
240, [1709.08222].
|
599 |
+
[27] M. Mai and M. Doring, Finite-Volume Spectrum of 𝜋+𝜋+ and 𝜋+𝜋+𝜋+ Systems, Phys. Rev. Lett.
|
600 |
+
122 (2019) 062503, [1807.04746].
|
601 |
+
[28] R. A. Briceño and M. T. Hansen, Multichannel 0 → 2 and 1 → 2 transition amplitudes for
|
602 |
+
arbitrary spin particles in a finite volume, Phys. Rev. D 92 (2015) 074509, [1502.04314].
|
603 |
+
[29] R. A. Briceño and M. T. Hansen, Relativistic, model-independent, multichannel 2 → 2
|
604 |
+
transition amplitudes in a finite volume, Phys. Rev. D 94 (2016) 013008, [1509.08507].
|
605 |
+
[30] R. A. Briceno, J. J. Dudek and R. D. Young, Scattering processes and resonances from lattice
|
606 |
+
QCD, Rev. Mod. Phys. 90 (2018) 025001, [1706.06223].
|
607 |
+
12
|
608 |
+
|
609 |
+
The Lüscher scattering formalism on the 𝑡-channel cut
|
610 |
+
André Baião Raposo
|
611 |
+
[31] R. A. Briceño, M. T. Hansen and S. R. Sharpe, Numerical study of the relativistic three-body
|
612 |
+
quantization condition in the isotropic approximation, Phys. Rev. D 98 (2018) 014506,
|
613 |
+
[1803.04169].
|
614 |
+
[32] R. A. Briceño, J. J. Dudek and L. Leskovec, Constraining 1 + J → 2 coupled-channel
|
615 |
+
amplitudes in finite-volume, Phys. Rev. D 104 (2021) 054509, [2105.02017].
|
616 |
+
13
|
617 |
+
|
6tE2T4oBgHgl3EQfkwcv/content/tmp_files/load_file.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
89FJT4oBgHgl3EQfoCxt/content/tmp_files/2301.11594v1.pdf.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
89FJT4oBgHgl3EQfoCxt/content/tmp_files/load_file.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
9dE4T4oBgHgl3EQfDQsU/content/2301.04867v1.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:2fb9efd2868bc37c46b350ac1bfc493d500429886a408e72284e719006e68316
|
3 |
+
size 279238
|
9dE4T4oBgHgl3EQfDQsU/vector_store/index.pkl
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:0fa3e2fb0218e59e8c12f5aabb14ea97b6de4720987cafd6c5b9581cec5d531a
|
3 |
+
size 147089
|
AtE2T4oBgHgl3EQfRQeF/content/2301.03779v1.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:b3ec8d45db5029d28e2b7b4df284da5d45b066448e9cd8012aca82a1f4f1cd00
|
3 |
+
size 364045
|
AtE2T4oBgHgl3EQfRQeF/vector_store/index.faiss
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:ec011ed714740effe3358d266f860932a78c051d1b43a3413efdce837353bd71
|
3 |
+
size 786477
|
AtE2T4oBgHgl3EQfRQeF/vector_store/index.pkl
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:f721cc91a09cfeb866e065fc80e4fc94c32005bb7fb3c3ec1f4f5dd3992a409b
|
3 |
+
size 37959
|
BNE1T4oBgHgl3EQfpQVQ/content/2301.03329v1.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:b7fcea1d1a97a1b86ae095d144d6fbcbd83f07281b35ae6a28a211d77ad7f00e
|
3 |
+
size 193529
|
BNE1T4oBgHgl3EQfpQVQ/vector_store/index.faiss
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:3960113452c58eb4b75306660e4f73b43e742864e741db9110b440ce73c029f7
|
3 |
+
size 2162733
|
BtAzT4oBgHgl3EQfwP4g/vector_store/index.pkl
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:da97ed4206bd45bea3b7fd376d12810115cfc6b8dc8e0a55c1a5e996a6b47dec
|
3 |
+
size 175103
|
CNE3T4oBgHgl3EQfUQpw/content/2301.04449v1.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:f639744157191dae28ecf3346ced098d3313480d076fc50600f10b72f791b369
|
3 |
+
size 1893644
|
CNE3T4oBgHgl3EQfUQpw/vector_store/index.faiss
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:38e80dcc02740486d1a6b2f8909a58811bbcec501068f680c51c82e43bec74dc
|
3 |
+
size 5308461
|
CtFJT4oBgHgl3EQfAiym/content/2301.11421v1.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:4996fc0398b8a08613a4307c19af922c7f28e05923732f9bcf79498bcf15a343
|
3 |
+
size 3221931
|
CtFJT4oBgHgl3EQfAiym/vector_store/index.faiss
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:5b6c2ca1b800f5bd8c42e5a69a8349423452461abda0195b5604ac9cfe51e086
|
3 |
+
size 2490413
|
E9AzT4oBgHgl3EQfiv2Y/content/tmp_files/2301.01505v1.pdf.txt
ADDED
@@ -0,0 +1,1036 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
Privacy Considerations for Risk-Based Authentication Systems
|
2 |
+
Stephan Wiefling∗, Jan Tolsdorf, and Luigi Lo Iacono
|
3 |
+
H-BRS University of Applied Sciences, Sankt Augustin, Germany
|
4 |
+
∗Ruhr University Bochum, Bochum, Germany
|
5 |
+
{stephan.wiefling,jan.tolsdorf,luigi.lo iacono}@h-brs.de
|
6 |
+
2021 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)
|
7 |
+
© 2022 Stephan Wiefling, Jan Tolsdorf, Luigi Lo Iacono
|
8 |
+
Open Access version of a paper published at IWPE ’21.
|
9 |
+
DOI: 10.1109/EuroSPW54576.2021.00040
|
10 |
+
Abstract—Risk-based authentication (RBA) extends authen-
|
11 |
+
tication mechanisms to make them more robust against ac-
|
12 |
+
count takeover attacks, such as those using stolen passwords.
|
13 |
+
RBA is recommended by NIST and NCSC to strengthen
|
14 |
+
password-based authentication, and is already used by major
|
15 |
+
online services. Also, users consider RBA to be more usable
|
16 |
+
than two-factor authentication and just as secure. However,
|
17 |
+
users currently obtain RBA’s high security and usability
|
18 |
+
benefits at the cost of exposing potentially sensitive personal
|
19 |
+
data (e.g., IP address or browser information). This conflicts
|
20 |
+
with user privacy and requires to consider user rights
|
21 |
+
regarding the processing of personal data.
|
22 |
+
We outline potential privacy challenges regarding differ-
|
23 |
+
ent attacker models and propose improvements to balance
|
24 |
+
privacy in RBA systems. To estimate the properties of the
|
25 |
+
privacy-preserving RBA enhancements in practical environ-
|
26 |
+
ments, we evaluated a subset of them with long-term data
|
27 |
+
from 780 users of a real-world online service. Our results
|
28 |
+
show the potential to increase privacy in RBA solutions.
|
29 |
+
However, it is limited to certain parameters that should guide
|
30 |
+
RBA design to protect privacy. We outline research directions
|
31 |
+
that need to be considered to achieve a widespread adoption
|
32 |
+
of privacy preserving RBA with high user acceptance.
|
33 |
+
Index Terms—Password, Risk-based Authentication, Usable
|
34 |
+
Security and Privacy, Big Data Analysis
|
35 |
+
1. Introduction
|
36 |
+
Passwords are still predominant for authentication with
|
37 |
+
online services [25], although new threats are constantly
|
38 |
+
emerging. Credential stuffing and password spraying at-
|
39 |
+
tacks [14] use leaked login credentials (username and
|
40 |
+
password) sourced from data breaches, and try them
|
41 |
+
in some way on (other) online services. These attacks
|
42 |
+
are very popular today [2] since attackers can automate
|
43 |
+
them with little effort. Major online services responded
|
44 |
+
to this threat with implementing risk-based authentication
|
45 |
+
(RBA) [36], aiming to strengthen password-based authen-
|
46 |
+
tication with little impact on the user.
|
47 |
+
Risk-Based Authentication (RBA). RBA determines
|
48 |
+
whether a login attempt is a legitimate one or an account
|
49 |
+
takeover attempt. To do so, RBA monitors additional
|
50 |
+
features when users submit their login credentials. Popular
|
51 |
+
features range from network (e.g., IP address), device
|
52 |
+
This research was supported by the research training group “Human
|
53 |
+
Centered Systems Security” (NERD.NRW) sponsored by the state of
|
54 |
+
North Rhine-Westphalia.
|
55 |
+
(e.g., smartphone model and operating system), or client
|
56 |
+
(e.g., browser vendor and version), to (behavioral) biomet-
|
57 |
+
ric information (e.g., login time) [34], [36]. Based on the
|
58 |
+
feature values and those of previous logins, RBA calcu-
|
59 |
+
lates a risk score. An access threshold typically classifies
|
60 |
+
the score into low, medium, and high risk [12], [15], [21].
|
61 |
+
On a low risk (e.g., usual device and location), the RBA
|
62 |
+
system grants access with no further intervention. On a
|
63 |
+
medium or higher risk (e.g., unusual device and location),
|
64 |
+
RBA requests additional information from the user, e.g.,
|
65 |
+
verifying the email address. After providing the correct
|
66 |
+
proof, access is granted.
|
67 |
+
RBA is considered a scalable interim solution when
|
68 |
+
passwords cannot simply be replaced by more secure
|
69 |
+
authentication methods in many cases [34], [35]. The
|
70 |
+
National Institute of Standards and Technology (NIST,
|
71 |
+
USA) and National Cyber Security Centre (NCSC, UK)
|
72 |
+
recommend RBA to mitigate attacks involving stolen pass-
|
73 |
+
words [13], [23]. Beyond that, users found RBA more
|
74 |
+
usable than equivalent two-factor authentication (2FA)
|
75 |
+
variants and comparably secure [35]. Also, in contrast to
|
76 |
+
2FA, RBA both offers good security and rarely requests
|
77 |
+
additional authentication in practice [34], reducing the
|
78 |
+
burden on users.
|
79 |
+
Research Questions. However, users obtain the security
|
80 |
+
and usability gain of RBA at the cost of disclosing more
|
81 |
+
potentially sensitive data with a personal reference, such
|
82 |
+
as IP addresses and browser identifiers. Therefore, user
|
83 |
+
privacy is at risk when RBA databases are forwarded
|
84 |
+
or breached, as additional data besides usernames would
|
85 |
+
potentially allow to identify individuals.
|
86 |
+
More and more data protection laws aim to protect
|
87 |
+
users from massive data collection by online services.
|
88 |
+
Considering that, we wondered whether and to what extent
|
89 |
+
the integration of RBA systems complies with the princi-
|
90 |
+
ples of modern data protection. We also wondered which
|
91 |
+
trade-offs are possible to balance security and privacy
|
92 |
+
goals.
|
93 |
+
To further investigate RBA’s privacy aspects, we for-
|
94 |
+
mulated the following research questions:
|
95 |
+
RQ1: a) In what ways can RBA features be stored to
|
96 |
+
increase the user privacy?
|
97 |
+
b) How can RBA features be stored to protect user
|
98 |
+
privacy in terms of data breaches?
|
99 |
+
RQ2: To what extent can a RBA feature maintain good
|
100 |
+
security while preserving privacy in practice?
|
101 |
+
Contributions. We propose and discuss five privacy en-
|
102 |
+
hancements that can be used by RBA models used by the
|
103 |
+
arXiv:2301.01505v1 [cs.CR] 4 Jan 2023
|
104 |
+
|
105 |
+
majority of deployments found in practice. To estimate
|
106 |
+
their usefulness in practice, we evaluated a subset of these
|
107 |
+
enhancements on a RBA feature that is highly relevant
|
108 |
+
in terms of security and privacy, i.e., the IP address. We
|
109 |
+
evaluated with a data set containing the login history of
|
110 |
+
780 users on a real-world online service for over 1.8 years.
|
111 |
+
Our results show for the first time that it is possible to
|
112 |
+
increase feature privacy while maintaining RBA’s security
|
113 |
+
and usability properties. However, increasing privacy is
|
114 |
+
limited to certain conditions that need to be considered
|
115 |
+
while designing the RBA system. We also identified future
|
116 |
+
challenges and research directions that might arise with a
|
117 |
+
widespread RBA adoption in the future.
|
118 |
+
The results support service owners to provide data pro-
|
119 |
+
tection compliant RBA solutions. They assist developers
|
120 |
+
in designing RBA implementations with increased privacy.
|
121 |
+
Researchers gain insights on how RBA can become more
|
122 |
+
privacy friendly, and further research directions.
|
123 |
+
2. Background
|
124 |
+
In the following section, we provide a brief introduc-
|
125 |
+
tion to RBA and explain how the use of RBA correlates
|
126 |
+
with the several privacy principles defined by industry
|
127 |
+
standards and legislation.
|
128 |
+
2.1. RBA Model
|
129 |
+
Since RBA is not a standardized procedure, multiple
|
130 |
+
solutions exist in practice. We focus on the implementa-
|
131 |
+
tion by Freeman et al. [12], since it performed best in a
|
132 |
+
previous study [34]. Also, this RBA model is known to be
|
133 |
+
widely used, e.g., by popular online services like Amazon,
|
134 |
+
Google, and LinkedIn [34], [36].
|
135 |
+
The model calculates the risk score S for a user u and
|
136 |
+
a set of feature values (FV 1, ..., FV d) with d features as:
|
137 |
+
Su(FV ) =
|
138 |
+
� d
|
139 |
+
�
|
140 |
+
k=1
|
141 |
+
p(FV k)
|
142 |
+
p(FV k|u, legit)
|
143 |
+
�
|
144 |
+
p(u|attack)
|
145 |
+
p(u|legit)
|
146 |
+
(1)
|
147 |
+
S has the probabilities p(FV k) that a feature value
|
148 |
+
appears in the global login history of all users, and
|
149 |
+
p(FV k|u, legit) that a legitimate user has this feature
|
150 |
+
value in its own login history. The probability p(u|attack)
|
151 |
+
describes how likely the user is being attacked, and
|
152 |
+
p(u|legit) describes how likely the legitimate user is
|
153 |
+
logging in.
|
154 |
+
2.2. Regulatory Foundations
|
155 |
+
In the past few years, the introduction of new data
|
156 |
+
protection laws, such as the General Data Protection Reg-
|
157 |
+
ulation (GDPR) [8] and the California Consumer Privacy
|
158 |
+
Act (CCPA) [30], dramatically changed the way online
|
159 |
+
services (i.e., data controllers) process their users’ data.
|
160 |
+
Formerly loose recommendations on handling user data
|
161 |
+
have been replaced by clear and binding data protec-
|
162 |
+
tion principles, which data controllers must adhere to.
|
163 |
+
However, the details and scope of the principles vary
|
164 |
+
between jurisdictions. For internationally operating data
|
165 |
+
controllers, this poses the problem that their data process-
|
166 |
+
ing operations must be designed to be compatible with
|
167 |
+
different requirements. Fortunately, the privacy framework
|
168 |
+
specified in ISO 29100:2011 [16] already compiles an
|
169 |
+
intersection of privacy principles from data protection
|
170 |
+
laws worldwide. Thus, it provides data controllers a solid
|
171 |
+
basis for designing legally compliant data processing op-
|
172 |
+
erations that can be tailored to the details of different
|
173 |
+
jurisdictions. We outline the requirements for the design
|
174 |
+
of RBA systems based on the privacy principles defined
|
175 |
+
in ISO 29100:2011, aiming at compatibility with different
|
176 |
+
jurisdictions.
|
177 |
+
Applicability of Privacy Principles. Generally speaking,
|
178 |
+
the privacy principles defined in established privacy laws
|
179 |
+
and frameworks aim to protect the privacy of individuals.
|
180 |
+
Thus, they only apply to data with a personal reference.
|
181 |
+
Such data are called, e.g., “personal data” (GDPR [8]),
|
182 |
+
“personal information” (CCPA [30]), or “personally iden-
|
183 |
+
tifiable information” (PII) (ISO [16]). The definitions are
|
184 |
+
very similar and usually refer to “any information that
|
185 |
+
(a) can be used to identify [an individual] to whom such
|
186 |
+
information relates, or (b) is or might be directly or
|
187 |
+
indirectly linked to [an individual]” [16].
|
188 |
+
The data processed by RBA certainly fall within this
|
189 |
+
definition, since implementations rely on features that
|
190 |
+
already serve as (unique) identifiers by themselves (e.g.,
|
191 |
+
IP address) [36]. Also, the risk score calculated by RBA
|
192 |
+
represents an identifier by itself, as it constitutes a set
|
193 |
+
of characteristics that uniquely identifies an individual.
|
194 |
+
Therefore, RBA has to comply with ISO 29100:2011’s
|
195 |
+
privacy principles discussed below.
|
196 |
+
Consent and Choice. In general, data controllers must
|
197 |
+
ensure the lawfulness of data processing. While most
|
198 |
+
jurisdictions recognize user consent as a lawful basis,
|
199 |
+
applicable laws may allow processing without consent.
|
200 |
+
Depending on the assets associated with a user account,
|
201 |
+
data controllers may argue that RBA use is required to
|
202 |
+
comply with the obligation to implement appropriate tech-
|
203 |
+
nical safeguards against unauthorized access. Nonetheless,
|
204 |
+
to ensure compliance, providers should design RBA mech-
|
205 |
+
anisms with consent in mind and provide their users with
|
206 |
+
clear and easy-to-understand explanations.
|
207 |
+
Collection Limitation and Data Minimization. Data
|
208 |
+
controllers must limit the PII collection and processing
|
209 |
+
to what is necessary for the specified purposes. RBA
|
210 |
+
feature sets should therefore be reviewed for suitability
|
211 |
+
with redundant or inappropriate features removed [34].
|
212 |
+
This includes considering using pseudonymized data for
|
213 |
+
RBA and disposing of the feature values when they are
|
214 |
+
no longer useful for the purpose of RBA. In practice, this
|
215 |
+
creates the challenge to not reduce a risk score’s reliability.
|
216 |
+
Use, Retention, and Disclosure Limitation. The data
|
217 |
+
processing must be limited to purposes specified by the
|
218 |
+
data controller, and data must not be disclosed to recipi-
|
219 |
+
ents other than specified. RBA should ensure that features
|
220 |
+
cannot be used for purposes other than the calculation
|
221 |
+
of risk scores. Moreover, after a feature value becomes
|
222 |
+
outdated, it should be securely destroyed or anonymized.
|
223 |
+
We would point out that privacy laws do not apply to
|
224 |
+
anonymized data and could therefore serve data controllers
|
225 |
+
for developing and testing purposes beyond the retention
|
226 |
+
period specified in their privacy statements.
|
227 |
+
Accuracy and Quality. Data controllers must ensure that
|
228 |
+
2
|
229 |
+
|
230 |
+
the processed data are accurate and of quality. This is
|
231 |
+
not only due to their own business interests, but also
|
232 |
+
because data subjects have a right to expect their data
|
233 |
+
being correct. This directly affects RBA, since it has the
|
234 |
+
power to deny a significant benefit to users (i.e., access to
|
235 |
+
their user account) with potentially significant harm. Data
|
236 |
+
controllers must hence ensure by appropriate means that
|
237 |
+
the stored feature values are correct and valid.
|
238 |
+
Individual Participation and Access. Data controllers
|
239 |
+
must allow data subjects to access and review their PII.
|
240 |
+
For RBA, this means that users should be allowed to be
|
241 |
+
provided with a copy of the feature values used.
|
242 |
+
Information Security. Data controllers are obliged to
|
243 |
+
protect PII with appropriate controls at the operational,
|
244 |
+
functional, and strategic level against risks. These include,
|
245 |
+
but are not limited to, risks associated with unauthorized
|
246 |
+
access or processing and denial of service. Privacy laws
|
247 |
+
demand extensive protections in this regard, “taking into
|
248 |
+
account the state of the art, the costs of implementation
|
249 |
+
and the nature, scope, context and purposes of processing
|
250 |
+
as well as the risk of varying likelihood and severity for
|
251 |
+
the rights and freedoms of natural persons” (Art. 32 (1)
|
252 |
+
GDPR). Since RBA risk scores do not necessarily rely
|
253 |
+
on evaluating plain text feature values [34], the collected
|
254 |
+
data should be stored in an appropriate pseudonymized,
|
255 |
+
masked, truncated, or encrypted form, depending on the
|
256 |
+
RBA implementation. Moreover, data controllers should
|
257 |
+
implement additional technical and organizational mea-
|
258 |
+
sures as needed, and be able to ensure the integrity,
|
259 |
+
availability, and resilience of RBA.
|
260 |
+
Accountability and Privacy Compliance. Data con-
|
261 |
+
trollers should inform data subjects about privacy-related
|
262 |
+
policies, transfers of PII to other countries, and data
|
263 |
+
breaches. Data controllers should also implement organi-
|
264 |
+
zational measures to help them verify and demonstrate le-
|
265 |
+
gal compliance. These include, but are not limited to, risk
|
266 |
+
assessments and recovery procedures. RBA implementa-
|
267 |
+
tions should therefore consider the worth of RBA features
|
268 |
+
to both attackers and data subjects, and the recovery from
|
269 |
+
data breaches. This is crucial in order not to undermine
|
270 |
+
the security of user accounts and their associated assets.
|
271 |
+
3. Privacy Enhancements (RQ1)
|
272 |
+
To comply with the privacy principles and derived data
|
273 |
+
protection requirements, service owners should consider
|
274 |
+
mechanisms to increase privacy in their RBA implemen-
|
275 |
+
tations. In the following, we introduce threats and their
|
276 |
+
mitigation to increase privacy properties of RBA features.
|
277 |
+
3.1. Feature Sensitivity and Impact Level
|
278 |
+
RBA feature sets always intend to distinguish attack-
|
279 |
+
ers from legitimate users. In doing so, the features may
|
280 |
+
contain sensitive PII. However, not only do users per-
|
281 |
+
ceive such PII differently regarding their sensitivity [28].
|
282 |
+
Their (unintended) disclosure could also have far-reaching
|
283 |
+
negative consequences for user privacy. Developers and
|
284 |
+
providers should therefore determine the impact from a
|
285 |
+
loss of confidentiality of the RBA feature values. Specif-
|
286 |
+
ically, the following aspects need consideration [20]:
|
287 |
+
Identifiability and Linkability. RBA feature sets should
|
288 |
+
be evaluated regarding their ability to identify natural
|
289 |
+
persons behind them. In particular, RBA systems that rely
|
290 |
+
on intrusive online tracking methods, such as browser
|
291 |
+
fingerprinting, store sensitive browser-specific information
|
292 |
+
that form a linked identifier. In the event of losing confi-
|
293 |
+
dentiality, the features would allow clear linkage between
|
294 |
+
profiles at different online services, despite users using
|
295 |
+
different login credentials or pseudonyms. Depending on
|
296 |
+
the service, this could result in negative social or le-
|
297 |
+
gal consequences for individuals. It could also enable
|
298 |
+
more extensive and unintended activity tracking, and de-
|
299 |
+
anonymizing information associated with user accounts.
|
300 |
+
Previous work found that powerful RBA feature sets do
|
301 |
+
not require to uniquely identify users when focusing on the
|
302 |
+
detection of account takeover attempts [34]. Also, users
|
303 |
+
are more willing to accept the processing of sensitive
|
304 |
+
information when they are certain that it is anonymous
|
305 |
+
and does not allow them to be identified [18], [29]. Thus,
|
306 |
+
the use of non-intrusive features may increase user trust
|
307 |
+
in online services, too.
|
308 |
+
Feature Values Sensitivity. Aside from identifying in-
|
309 |
+
dividuals by RBA feature sets, the individual feature
|
310 |
+
values may already contain sensitive PII. Sensitive PII
|
311 |
+
in the scope of RBA may be feature values that are
|
312 |
+
easily spoofable and can be misused to attack other online
|
313 |
+
services in the event of a data breach. Sensitive PII may
|
314 |
+
also refer to data perceived as sensitive by online users.
|
315 |
+
For example, the most important feature of current RBA
|
316 |
+
methods, namely the IP address [12], [15], [31], [34], [36],
|
317 |
+
is perceived as highly sensitive by online users of diverse
|
318 |
+
cultural backgrounds [3], [19], [28]. Since users are gen-
|
319 |
+
erally less willing to share data with increased sensitivity,
|
320 |
+
RBA feature sets should limit the use of sensitive data if
|
321 |
+
possible, in order to meet user interests.
|
322 |
+
3.2. Threats
|
323 |
+
RBA features may contain personal sensitive data,
|
324 |
+
which has to be protected against attackers. To support
|
325 |
+
online services in their protection efforts, we introduce
|
326 |
+
three privacy threat types. We based the threats on those
|
327 |
+
found in literature and our own observations in practice.
|
328 |
+
Data Misuse. Online services could misuse their own
|
329 |
+
RBA feature data for unintended purposes, such as user
|
330 |
+
tracking, profiling, or advertising [5]. This type of misuse
|
331 |
+
previously happened with phone numbers stored for 2FA
|
332 |
+
purposes [33]. While users have to trust online services to
|
333 |
+
not misuse their data, responsible online services should
|
334 |
+
also take precautions to minimize chances for miuse sce-
|
335 |
+
narios or unintended processing, e.g., by internal miscon-
|
336 |
+
duct or after the company changed the ownership.
|
337 |
+
Data Forwarding. Online services can be requested or
|
338 |
+
forced to hand out stored feature data, e.g., to state actors,
|
339 |
+
advertising networks, or other third parties. Especially
|
340 |
+
IP addresses are commonly requested [9]. When such
|
341 |
+
data are forwarded to third parties, the users’ privacy is
|
342 |
+
breached. For instance, the IP address could be used to
|
343 |
+
reveal the user’s geolocation or even their identity.
|
344 |
+
Data Breach. Attackers obtained the database containing
|
345 |
+
the feature values, e.g., by hacking the online service. As a
|
346 |
+
3
|
347 |
+
|
348 |
+
result, online services lost control over their data. Attack-
|
349 |
+
ers can try to re-identify users based on the feature values,
|
350 |
+
e.g., by combining them with other data sets. They can
|
351 |
+
further try to reproduce the feature values and try account
|
352 |
+
takeover attacks on a large scale, similar to credential
|
353 |
+
stuffing. On success, they could access sensitive user data
|
354 |
+
stored on the online service, e.g., private messages.
|
355 |
+
3.3. Mitigation
|
356 |
+
Online services can implement several measures to
|
357 |
+
mitigate the outlined privacy threats. We propose five
|
358 |
+
measures that are based on methods found in related
|
359 |
+
research fields, as well as privacy regulations and our own
|
360 |
+
observations with the selected RBA model (see Section 2).
|
361 |
+
Based on the introduced RBA model, we considered all
|
362 |
+
feature values as categorical data, in order to calculate the
|
363 |
+
probabilities. When this condition is met, the proposed
|
364 |
+
measures are also applicable to other RBA models [34].
|
365 |
+
As an example for practical solutions, we describe how
|
366 |
+
the considerations can be applied to the IP address feature,
|
367 |
+
with regard to the IPv4 address. We chose this feature
|
368 |
+
since it is both considered the most important RBA feature
|
369 |
+
in terms of security to date and sensitive re-linkable data
|
370 |
+
in terms of privacy (see Section 3.1).
|
371 |
+
3.3.1. Aggregating. The RBA model only depends on
|
372 |
+
feature value frequencies. To minimize data and limit
|
373 |
+
misuse [16], we can aggregate or reorder feature data
|
374 |
+
in the login history without affecting the results. The
|
375 |
+
data set would then reveal how often a feature combina-
|
376 |
+
tion occurred, but not its chronological order. Removing
|
377 |
+
this information can mitigate re-identification in login
|
378 |
+
sequences.
|
379 |
+
3.3.2. Hashing. A cryptographic hash function, such as
|
380 |
+
SHA-256, transforms a data input of arbitrary value to an
|
381 |
+
output of fixed length. As inverting a hash function is not
|
382 |
+
possible in theory, attackers need to recalculate all possible
|
383 |
+
hashing values to restore the input values [17]. Assuming
|
384 |
+
that the hashes are practically collision-free, using hashed
|
385 |
+
feature values will produce the same RBA results as with
|
386 |
+
the original values. This is the case, because the feature
|
387 |
+
values are only transformed into a different representation.
|
388 |
+
Therefore, this could be a solution to protect feature data
|
389 |
+
in terms of the outlined threats.
|
390 |
+
However, the IPv4 address has 32 bit limited input
|
391 |
+
values, where some addresses have a specific semantic
|
392 |
+
and purpose, and cannot be assigned to devices. Thus,
|
393 |
+
attackers can simply hash all 232 − 1 values to restore the
|
394 |
+
correct IP address. To counteract this problem, we can
|
395 |
+
append a large random string (salt) to the input value:
|
396 |
+
H(192.168.1.166 || salt) = 243916...aad132
|
397 |
+
(2)
|
398 |
+
Attackers need to guess the salt correctly, which is high
|
399 |
+
effort when the salt is large. Thus, this mitigation strategy
|
400 |
+
increases the required guessing time for each feature
|
401 |
+
value. Taking it a step further, we can even hash the results
|
402 |
+
multiple times to increase the computation time:
|
403 |
+
H(H(...H(192.168.1.166 || salt))) = [hash]
|
404 |
+
(3)
|
405 |
+
This is similar to key derivation strategies used in pass-
|
406 |
+
word databases [22]. However, we can only use a global
|
407 |
+
salt for all database entries, as RBA mechanisms need to
|
408 |
+
be able to identify identical feature values across users
|
409 |
+
in the database. By increasing the computational cost,
|
410 |
+
attackers cannot scale attacks as they would have with
|
411 |
+
the unhashed feature values.
|
412 |
+
3.3.3. Truncation. A more destructive approach to in-
|
413 |
+
crease privacy for RBA features is to change or remove
|
414 |
+
details from their data values. This can reduce the number
|
415 |
+
of records with unique quasi identifiers. Since the feature
|
416 |
+
data then becomes less useful for other use cases like
|
417 |
+
tracking or re-identification, we consider it a measure to
|
418 |
+
mitigate the privacy threats. Regarding the IP address, we
|
419 |
+
could set the last bits to zero. For truncating the last eight
|
420 |
+
bits, for example, this would result in:
|
421 |
+
Truncate(192.168.1.166, 8 Bit) = 192.168.1.0
|
422 |
+
(4)
|
423 |
+
This mechanism is known from IP address anonymization
|
424 |
+
strategies [6], [7]. However, we can also apply it on other
|
425 |
+
features, e.g., reducing timing precision or coarse-graining
|
426 |
+
browser version number in the user agent string [24].
|
427 |
+
Since we remove information that could potentially iden-
|
428 |
+
tify an individual, e.g., the device’s internet connection,
|
429 |
+
this can potentially increase privacy. However, this can
|
430 |
+
also influence the RBA results, as there are fewer feature
|
431 |
+
values for attackers to guess.
|
432 |
+
3.3.4. K-Anonymity.
|
433 |
+
The k-anonymity privacy con-
|
434 |
+
cept [32] ensures that at least k entries in a data set
|
435 |
+
have the same quasi identifier values. If attackers obtained
|
436 |
+
the data set and know a victim’s IP address, they would
|
437 |
+
not be able to distinguish the person from k other users.
|
438 |
+
This makes it an effective countermeasure against re-
|
439 |
+
identification in case of data forwarding and data breaches.
|
440 |
+
To achieve k-anonymity for RBA, at least k users need
|
441 |
+
to have the same feature value. To ensure this, we added
|
442 |
+
potentially missing entries to the RBA login history after
|
443 |
+
each successful login. We added these entries to random
|
444 |
+
users to only affect the global login history probabilities
|
445 |
+
in order to keep a high security level. We created these
|
446 |
+
users just for this purpose. To retain the global data set
|
447 |
+
properties, the user count increased gradually to have the
|
448 |
+
same mean number of login attempts per user.
|
449 |
+
3.3.5. Login History Minimization. Another approach
|
450 |
+
is to limit the login history, in terms of the amount of
|
451 |
+
features and entries, for a number of entries or a constant
|
452 |
+
time period [16]. A study already showed that few entries
|
453 |
+
are sufficient to achieve a high RBA protection [34]. In so
|
454 |
+
doing, we mitigate tracking users for an extended period
|
455 |
+
of time. However, this can affect the RBA performance
|
456 |
+
based on the usage pattern of the corresponding online
|
457 |
+
service. Especially when it is a less-than-monthly-use
|
458 |
+
online service, we assume that features need to be stored
|
459 |
+
for a longer period than for daily use websites to achieve
|
460 |
+
a comparable RBA performance.
|
461 |
+
4. Case Study Evaluation (RQ2)
|
462 |
+
Aggregating and hashing, when collision-free, does
|
463 |
+
not affect the RBA results, as they only change the data
|
464 |
+
representation for the RBA model. The other approaches,
|
465 |
+
however, potentially could. To assess their impact on
|
466 |
+
4
|
467 |
+
|
468 |
+
RBA behavior in practice, we studied truncation and k-
|
469 |
+
anonymity using real-world login data. The properties and
|
470 |
+
limited size of our data set did not allow to reliably test
|
471 |
+
the login history minimization approach, so we left it
|
472 |
+
for future work. Nevertheless, we outlined this relevant
|
473 |
+
privacy consideration for the sake of completeness. We
|
474 |
+
used the IP address feature as in the other examples.
|
475 |
+
4.1. Data Set
|
476 |
+
For the evaluation, we used our long-term RBA data
|
477 |
+
set, including features of 780 users collected on a real-
|
478 |
+
world online service [34]. The online service collected
|
479 |
+
the users’ features after each successful login. The users
|
480 |
+
signed in 9555 times in total between August 2018 to
|
481 |
+
June 2020. They mostly logged in daily (44.3%) or several
|
482 |
+
times a week (39.2%), with a mean of 12.25 times in total.
|
483 |
+
To improve data quality and validity, we removed all users
|
484 |
+
who noticed an illegitimate login in their account. The
|
485 |
+
online service was an e-learning website, which students
|
486 |
+
used to exercise for study courses and exams. As the
|
487 |
+
users were mostly located in the same city, it is a very
|
488 |
+
challenging data set for RBA. They could get similar IP
|
489 |
+
addresses with higher probability. Therefore, it is impor-
|
490 |
+
tant to evaluate how the RBA protection changes in such
|
491 |
+
a challenging scenario.
|
492 |
+
4.1.1. Legal and Ethical Considerations. The study
|
493 |
+
participants [34] signed a consent form agreeing to the
|
494 |
+
data collection and use for study purposes. They were
|
495 |
+
always able to view a copy of their data and delete it on
|
496 |
+
request. The collected data were stored on encrypted hard
|
497 |
+
drives and only the researchers had access to it.
|
498 |
+
We do not have a formal IRB process at our university.
|
499 |
+
Still, we made sure to minimize potential harm by com-
|
500 |
+
plying with the ethics code of the German Sociological
|
501 |
+
Association (DGS) and the standards of good scientific
|
502 |
+
practice of the German Research Foundation (DFG). We
|
503 |
+
also made sure to comply with the GDPR.
|
504 |
+
4.1.2. Limitations. Our results are limited to the data
|
505 |
+
set and the users who participated in the study. They
|
506 |
+
are limited to the population of a certain region of a
|
507 |
+
certain country. They are not representative for large-scale
|
508 |
+
online services, but show a typical use case scenario of a
|
509 |
+
daily to weekly use website. As in similar studies, we can
|
510 |
+
never fully exclude that intelligent attackers targeted the
|
511 |
+
website. However, multiple countermeasures minimized
|
512 |
+
the possibility that the website was infiltrated [34].
|
513 |
+
4.2. Attacker Models
|
514 |
+
We evaluated the privacy enhancements using three
|
515 |
+
RBA attacker models found in related literature [12], [34].
|
516 |
+
All attackers possess the login credentials of the target.
|
517 |
+
Naive attackers try to log in from a random Internet
|
518 |
+
Service Providers (ISP) from somewhere in the world. We
|
519 |
+
simulated these attackers by using IP addresses sourced
|
520 |
+
from real-world attacks on online services [11].
|
521 |
+
VPN attackers know the country of the victim. There-
|
522 |
+
fore, we simulated these attackers with IP addresses from
|
523 |
+
real-world attackers located in the victim’s country [11].
|
524 |
+
Targeted attackers know the city, browser, and device
|
525 |
+
of the victim. Therefore, they choose similar feature val-
|
526 |
+
ues, including similar ISPs. We simulated these attackers
|
527 |
+
with our data set, with the unique feature combinations
|
528 |
+
from all users except the victim. Since the IP addresses
|
529 |
+
of our data set were in close proximity to each other, our
|
530 |
+
simulated attacker was aware of these circumstances and
|
531 |
+
chose them in a similar way.
|
532 |
+
4.3. Methodology
|
533 |
+
In order to test our privacy enhancements in terms
|
534 |
+
of practical RBA solutions, we defined a set of desired
|
535 |
+
properties. Our enhancements need to: (A) Keep the
|
536 |
+
percentage of blocked attackers: The ability to block a
|
537 |
+
high number of attackers should not decrease when using
|
538 |
+
the privacy enhancements. This is necessary to keep the
|
539 |
+
security properties of the RBA system. (B) Retain differ-
|
540 |
+
entiation between legitimate users and attackers: When
|
541 |
+
applied, the risk score differences between legitimate users
|
542 |
+
and attackers should only change within a very small
|
543 |
+
range. Otherwise, the usability and security properties of
|
544 |
+
the RBA system would decrease.
|
545 |
+
We outline the tests to evaluate the privacy enhance-
|
546 |
+
ments below. Based on the method in Wiefling et al. [34],
|
547 |
+
we reproduced the login behavior for attackers and legit-
|
548 |
+
imate users by replaying the user sessions. We integrated
|
549 |
+
truncation and k-anonymity in the reproduction process,
|
550 |
+
to test the countermeasures.
|
551 |
+
The RBA model used the IP address and user agent
|
552 |
+
string as features, since this can be considered the RBA
|
553 |
+
state of practice [34], [36]. We truncated the IP addresses
|
554 |
+
in ranges from 0 to 24 bits, to observe the effects on
|
555 |
+
the RBA performance. We assume that cutting more than
|
556 |
+
25 bits will not allow to reliably detect attackers. We also
|
557 |
+
tested k-anonymity with the IP address feature until k = 6.
|
558 |
+
As US government agencies consider less than five entries
|
559 |
+
to be sensitive [10], we chose to cover this threshold.
|
560 |
+
4.3.1. Test A: Percentage of Blocked Attackers. To
|
561 |
+
compare the RBA performance regarding all three attacker
|
562 |
+
models, we calculated the percentage of how many attack-
|
563 |
+
ers would be blocked. We call this percentage the true
|
564 |
+
positive rate (TPR), as previous work did [12], [34]. For
|
565 |
+
a fair comparison, we observed how the TPR changed
|
566 |
+
when aiming to block 99.5% of attackers. We chose this
|
567 |
+
TPR baseline since it showed good performance regarding
|
568 |
+
usability and security properties in a previous study [34].
|
569 |
+
To ease comparison, we adjusted the TPR for each
|
570 |
+
truncation or k-anonymity step xi as percentage differ-
|
571 |
+
ences to the baseline without modifications (relative TPR):
|
572 |
+
TPRrelativexi = TPRxi − TPRbaseline
|
573 |
+
TPRbaseline
|
574 |
+
(5)
|
575 |
+
Following that, TPRrelativexi < 0.0 means that the TPR
|
576 |
+
decreased compared to the baseline.
|
577 |
+
4.3.2. Test B: Risk Score Changes. To determine the
|
578 |
+
degree that attackers and legitimate users can be differ-
|
579 |
+
entiated in the RBA model, we calculated the risk score
|
580 |
+
relation (RSR) [34]. It is the relation between the mean
|
581 |
+
risk scores for attackers and legitimate users:
|
582 |
+
RSRbasic =
|
583 |
+
mean attacker risk score
|
584 |
+
mean legitimate risk score
|
585 |
+
(6)
|
586 |
+
5
|
587 |
+
|
588 |
+
To ease comparison, we normalized each RSR for every
|
589 |
+
truncation or k-anonymity step xi as percentage differ-
|
590 |
+
ences to the baseline (relative RSR). The baseline is the
|
591 |
+
IP address without modifications:
|
592 |
+
RSRrelativexi =
|
593 |
+
RSRbasicxi − RSRbaseline
|
594 |
+
RSRbaseline
|
595 |
+
(7)
|
596 |
+
As a result, RSRrelativexi < 0.0 signals that attackers and
|
597 |
+
legitimate users can no longer be distinguished as good
|
598 |
+
as they were before introducing the privacy enhancing
|
599 |
+
measures.
|
600 |
+
4.3.3. Limit Extraction. For each test, we defined the
|
601 |
+
following thresholds to extract limits that do not degrade
|
602 |
+
RBA performance to an acceptable extent.
|
603 |
+
(Test A) We require the RBA performance to remain
|
604 |
+
constant. Thus, we selected the reasonable limit as the
|
605 |
+
point at which the relative TPR decreases compared to
|
606 |
+
the baseline, i.e., attackers cannot be blocked as good
|
607 |
+
as before any more. (Test B) Unlike tracking, RBA uses
|
608 |
+
the feature information in addition to an already verified
|
609 |
+
identifier, e.g., passwords. Thus, we consider it feasible
|
610 |
+
to reduce the RSR slightly for the sake of privacy. Based
|
611 |
+
on our observations, RSR changes below 0.01 can be
|
612 |
+
tolerable for our case study evaluation. Thus, we chose
|
613 |
+
the reasonable limit as the point at which the relative RSR
|
614 |
+
is lower than 0.01.
|
615 |
+
4.4. Results
|
616 |
+
In the following, we present the results for all attacker
|
617 |
+
models. We discuss the results after this section. We used
|
618 |
+
a high performance computing cluster using more than
|
619 |
+
2000 cores for the evaluation. This was necessary since
|
620 |
+
calculating the results with the simulated attackers was
|
621 |
+
computationally intensive.
|
622 |
+
For statistical testing, we used Kruskal-Wallis tests
|
623 |
+
for the omnibus cases and Dunn’s multiple comparison
|
624 |
+
test with Bonferroni correction for post-hoc analysis. We
|
625 |
+
considered p-values less than 0.05 to be significant.
|
626 |
+
4.4.1. Truncation. Figure 1 shows the truncation test
|
627 |
+
results for all attackers. The TPR differences between
|
628 |
+
the targeted attacker and both remaining attackers were
|
629 |
+
significant
|
630 |
+
(Targeted/Naive:
|
631 |
+
p=0.0151,
|
632 |
+
Targeted/VPN:
|
633 |
+
p<0.0001). The TPRs exceeded the limit after 20 bits for
|
634 |
+
naive, 3 bits for VPN, and 14 bits for targeted attackers.
|
635 |
+
Regarding the relative RSRs, there are significant
|
636 |
+
differences between VPN and both remaining attackers
|
637 |
+
(p<0.0001). The RSRs exceeded the limit after 3 bits for
|
638 |
+
naive, 21 bits for VPN, and 3 bits for targeted attackers.
|
639 |
+
Combining both results, the accepted truncation limits
|
640 |
+
based on our criteria were 3 bits for all attacker models.
|
641 |
+
4.4.2. K-Anonymity. Figure 2 shows the combined k-
|
642 |
+
anonymity test results for the three attacker models. The
|
643 |
+
relative TPR decreased after k = 1 for targeted attack-
|
644 |
+
ers, k = 2 for naive attackers, and not at all for VPN
|
645 |
+
attackers until at least k = 6. There were significant TPR
|
646 |
+
differences between naive and VPN attackers (p=0.0066).
|
647 |
+
The relative RSR did not decrease for all attacker types
|
648 |
+
and there were no significant differences.
|
649 |
+
0.0010
|
650 |
+
0.0005
|
651 |
+
0.0000
|
652 |
+
0.0005
|
653 |
+
0.0010
|
654 |
+
0.0015
|
655 |
+
Relative TPR
|
656 |
+
Attacker
|
657 |
+
Targeted
|
658 |
+
VPN
|
659 |
+
Naive
|
660 |
+
0
|
661 |
+
2
|
662 |
+
4
|
663 |
+
6
|
664 |
+
8
|
665 |
+
10 12 14 16 18 20 22 24
|
666 |
+
Truncated IP Address Bits
|
667 |
+
0.3
|
668 |
+
0.2
|
669 |
+
0.1
|
670 |
+
0.0
|
671 |
+
0.1
|
672 |
+
0.2
|
673 |
+
Relative Risk
|
674 |
+
Score Relation
|
675 |
+
Attacker
|
676 |
+
Targeted
|
677 |
+
VPN
|
678 |
+
Naive
|
679 |
+
Figure 1. Results for truncating the IP address. Top: Relative TPR (Test
|
680 |
+
A). There were significant differences between targeted and both VPN
|
681 |
+
and naive attackers. Bottom: Relative RSR (Test B). The differences
|
682 |
+
between VPN and both targeted and naive attackers were significant.
|
683 |
+
0.0010
|
684 |
+
0.0005
|
685 |
+
0.0000
|
686 |
+
0.0005
|
687 |
+
0.0010
|
688 |
+
0.0015
|
689 |
+
Relative TPR
|
690 |
+
Attacker
|
691 |
+
Targeted
|
692 |
+
VPN
|
693 |
+
Naive
|
694 |
+
1
|
695 |
+
2
|
696 |
+
3
|
697 |
+
4
|
698 |
+
5
|
699 |
+
6
|
700 |
+
k
|
701 |
+
0.0
|
702 |
+
0.1
|
703 |
+
0.2
|
704 |
+
0.3
|
705 |
+
0.4
|
706 |
+
0.5
|
707 |
+
0.6
|
708 |
+
0.7
|
709 |
+
Relative Risk
|
710 |
+
Score Relation
|
711 |
+
Attacker
|
712 |
+
Targeted
|
713 |
+
VPN
|
714 |
+
Naive
|
715 |
+
Figure 2. Results for k-anonymity regarding the IP address. Top: Relative
|
716 |
+
TPR (Test A). Differences between naive and VPN attackers were
|
717 |
+
significant. Bottom: Relative RSR (Test B). There were no significant
|
718 |
+
differences.
|
719 |
+
Combining the results, the acceptable k levels based
|
720 |
+
on our criteria were k = 1 for targeted attackers, k = 2
|
721 |
+
for naive attackers, and at least k = 6 for VPN attackers.
|
722 |
+
5. Discussion
|
723 |
+
Our results show that IP address truncation signifi-
|
724 |
+
cantly affects the RBA risk score and reduces the proba-
|
725 |
+
bility of attack detection. The truncation for VPN attackers
|
726 |
+
resulted in a local maximum of the RSR at 12 bits, and
|
727 |
+
thus apparently improved detection. However, this was due
|
728 |
+
to the fact that the VPN attacker only had an IP address
|
729 |
+
range limited to the VPN service’s server locations. Since
|
730 |
+
the first IP address bits correspond to a node’s geolocation,
|
731 |
+
they were mostly distinct from legitimate users residing in
|
732 |
+
different areas. Thus, truncating increased the risk scores
|
733 |
+
for VPN attackers until 12 bit, as the probability for the
|
734 |
+
global login history p(FV k) decreased but the one for
|
735 |
+
the local history p(FV k|u, legit) remained constant. In
|
736 |
+
contrast to that, targeted attackers also had a limited IP
|
737 |
+
address range, but they were located in the same region as
|
738 |
+
the legitimate users. Also, naive attackers had a large IP
|
739 |
+
address range. Thus, in both cases, the differences between
|
740 |
+
p(FV k) and p(FV k|u, legit) remained constant to similar
|
741 |
+
levels until 12 bits.
|
742 |
+
Following that, and what our evaluation indicates, we
|
743 |
+
6
|
744 |
+
|
745 |
+
TABLE 1. OVERHEAD CREATED BY ADDITIONAL LOGIN ENTRIES TO
|
746 |
+
ACHIEVE K-ANONYMITY
|
747 |
+
k
|
748 |
+
Additional Entries
|
749 |
+
Increase to Baseline
|
750 |
+
1
|
751 |
+
0
|
752 |
+
0.0
|
753 |
+
2
|
754 |
+
3928
|
755 |
+
0.41
|
756 |
+
3
|
757 |
+
7965
|
758 |
+
0.83
|
759 |
+
4
|
760 |
+
12013
|
761 |
+
1.26
|
762 |
+
5
|
763 |
+
16065
|
764 |
+
1.68
|
765 |
+
6
|
766 |
+
20120
|
767 |
+
2.11
|
768 |
+
do not recommend truncating more than three bits for a
|
769 |
+
stable RBA performance in our case study scenario.
|
770 |
+
K-anonymity increased the distinguishability between
|
771 |
+
legitimate users and attackers, i.e., the RSR. This was
|
772 |
+
due to the fact that this mechanism added new entries
|
773 |
+
to the global login history. As a result, the overall prob-
|
774 |
+
ability for unknown feature values in the global login
|
775 |
+
history p(FV k) decreased, making it harder for attackers
|
776 |
+
to achieve a low risk score. However, this also decreased
|
777 |
+
the detection of attackers, i.e., the TPR, in most cases,
|
778 |
+
since k more users had similar feature values in the data
|
779 |
+
set. As a side effect of these results, unique feature values
|
780 |
+
got less unique in total. Thus, due to the determined limit
|
781 |
+
of k = 1, k-anonymity for targeted attackers can only be
|
782 |
+
achieved with degraded RBA performance.
|
783 |
+
The overhead produced by the additional entries in-
|
784 |
+
creased with each k (see Table 1). It was even more
|
785 |
+
than the data set itself at k>3, which makes the current
|
786 |
+
mechanism impractical for very large online services. To
|
787 |
+
mitigate this issue, mechanisms could be introduced which
|
788 |
+
remove some additional login entries when k-anonymity
|
789 |
+
can be fulfilled after some time.
|
790 |
+
K-anonymity is not scalable with an increasing num-
|
791 |
+
ber of features [1], while the other approaches are. Thus,
|
792 |
+
sensible RBA privacy enhancements might be a combina-
|
793 |
+
tion of all outlined countermeasures, to ensure scalability.
|
794 |
+
Based on our results, we discuss privacy challenges
|
795 |
+
and further research directions in the following.
|
796 |
+
5.1. Privacy Challenges
|
797 |
+
When integrating privacy into RBA systems, there are
|
798 |
+
several challenges that should be considered in practice.
|
799 |
+
We describe them below.
|
800 |
+
Role of the IP Address Feature. Using a combination
|
801 |
+
of privacy enhancements for the IP address might be
|
802 |
+
sufficient for some applications. However, this feature
|
803 |
+
is still sensitive information. Thus, the question arises
|
804 |
+
whether online services should consider privacy enhancing
|
805 |
+
alternatives instead of storing the IP address. One alterna-
|
806 |
+
tive could be to derive only the region and ASN from the
|
807 |
+
IP address, and discard the rest. Other approaches even
|
808 |
+
enable identifying network anomalies, e.g., IP spoofing
|
809 |
+
using a VPN connection, without having to rely on the IP
|
810 |
+
address at all. For example, the server-originated round-
|
811 |
+
trip time (RTT) [34] can be used to estimate the distance
|
812 |
+
between the user’s device and the server location and may
|
813 |
+
replace IP addresses as RBA features. As the RTTs vary
|
814 |
+
based on the server location, they become useless for most
|
815 |
+
re-identification attacks using leaked databases, as server
|
816 |
+
locations are distributed in practice. They can even be
|
817 |
+
enriched with random noise to further enhance privacy.
|
818 |
+
Risk of Feature Stuffing. Such considerations can be
|
819 |
+
more and more important with widespread RBA adop-
|
820 |
+
tion in the future. We assume that when databases with
|
821 |
+
RBA feature values got stolen, this might have serious
|
822 |
+
consequences for other services using RBA. In contrast
|
823 |
+
to passwords, behavioral RBA feature values cannot be
|
824 |
+
changed after compromise. Attackers can attempt to auto-
|
825 |
+
matically reproduce these feature values on other websites.
|
826 |
+
Thus, more privacy preserving alternatives that are hard
|
827 |
+
to spoof for attackers might be crucial to mitigate largely
|
828 |
+
scalable “feature stuffing” attacks.
|
829 |
+
Handling Data Deletion Requests. Further conflicts
|
830 |
+
could arise with data protection regulations. Users are
|
831 |
+
legally permitted to request data deletion. So when they
|
832 |
+
request online services to delete their RBA feature data,
|
833 |
+
they might lose RBA protection on their user accounts.
|
834 |
+
5.2. Research Directions
|
835 |
+
Our case study evaluation provided first insights on
|
836 |
+
truncating feature values to increase privacy. As the results
|
837 |
+
showed that this is possible to a certain degree while main-
|
838 |
+
taining RBA performance, further work can investigate it
|
839 |
+
for other types of features, e.g., the user agent string.
|
840 |
+
The proposed k-anonymity mechanism can increase
|
841 |
+
privacy regarding unique entries in the data set. However,
|
842 |
+
users might still be identifiable when they have a combi-
|
843 |
+
nation of typical feature values, e.g., a home and a work
|
844 |
+
IP address. This non-trivial task had been addressed in
|
845 |
+
dynamic databases [27], [37]. Future work may investigate
|
846 |
+
whether such mechanisms are also applicable to RBA.
|
847 |
+
As we could not reliably test the login history mini-
|
848 |
+
mization approach with our data set, future work should
|
849 |
+
investigate this on a medium to large-scale online service
|
850 |
+
with regular use.
|
851 |
+
6. Related Work
|
852 |
+
Burkhard et al. [6] investigated truncating IP addresses
|
853 |
+
in anomaly detection systems. They found that truncating
|
854 |
+
more than four bits degraded the performance of these
|
855 |
+
systems. Chew et al. [7] further evaluated IP truncation
|
856 |
+
in intrusion detection systems. Their results showed that
|
857 |
+
the detection accuracy in many of the tested classifiers
|
858 |
+
decreased after removing more than 8 bits. Our study
|
859 |
+
showed that three bits could be removed from the IP
|
860 |
+
address to maintain RBA performance at the same time.
|
861 |
+
Both Safa et al. [26], and Blanco-Justicia and
|
862 |
+
Domingo-Ferrer [4] proposed privacy-preserving authen-
|
863 |
+
tication models for implicit authentication using mobile
|
864 |
+
devices. Their models relied on client-originated features,
|
865 |
+
and the former also calculated risk scores on the client’s
|
866 |
+
device. However, this is not applicable to our RBA use
|
867 |
+
case, as it relies on server-originated features and risk
|
868 |
+
scores to prevent client-side spoofing.
|
869 |
+
To the best of our knowledge, there were no studies in-
|
870 |
+
vestigating privacy enhancements in RBA systems. How-
|
871 |
+
ever, some literature touched on privacy aspects related
|
872 |
+
to RBA. Bonneau et al. [5] discussed privacy concerns of
|
873 |
+
using additional features for authentication. They found
|
874 |
+
that privacy preserving techniques might mitigate these
|
875 |
+
concerns, but these had not been deployed in practice. We
|
876 |
+
7
|
877 |
+
|
878 |
+
proposed and tested some techniques for the first time in
|
879 |
+
our case study. Wiefling et al. [35] investigated RBA’s
|
880 |
+
usability and security perceptions. The results showed
|
881 |
+
that users tended to reject providing phone numbers to
|
882 |
+
online services for privacy reasons. They further studied
|
883 |
+
RBA characteristics on a real-world online service [34],
|
884 |
+
showing that the feature set can be very small to achieve
|
885 |
+
good RBA performance. We demonstrated that the privacy
|
886 |
+
can be further enhanced through different mechanisms.
|
887 |
+
7. Conclusion
|
888 |
+
With a widespread use of RBA to protect users against
|
889 |
+
attacks involving stolen credentials, more and more online
|
890 |
+
services will potentially store sensitive feature data of their
|
891 |
+
users, like IP addresses and browser identifiers, for long
|
892 |
+
periods of time. Whenever such information is forwarded
|
893 |
+
or leaked, it poses a potential threat to user privacy. To
|
894 |
+
mitigate such threats, the design of RBA systems must
|
895 |
+
balance security and privacy.
|
896 |
+
Our study results provide a first indication that RBA
|
897 |
+
implementations used in current practice can be designed
|
898 |
+
to become more privacy friendly. However, there are still
|
899 |
+
challenges that have not been resolved in research to
|
900 |
+
date. An important question is, e.g., how the IP address
|
901 |
+
feature can be replaced with more privacy preserving
|
902 |
+
alternatives. On the one hand, we assume that the IP
|
903 |
+
address is very relevant for re-identification attacks [9].
|
904 |
+
Discarding it from the RBA login history can therefore
|
905 |
+
increase privacy protection. On the other hand, the IP
|
906 |
+
address is a feature providing strong security [34]. Future
|
907 |
+
research must carefully identify and analyze such trade-
|
908 |
+
offs, so that RBA’s user acceptance does not drop with
|
909 |
+
the first data breach.
|
910 |
+
References
|
911 |
+
[1]
|
912 |
+
C. C. Aggarwal, “On k-Anonymity and the Curse of Dimension-
|
913 |
+
ality,” in VLDB ’05.
|
914 |
+
VLDB Endowment, Aug. 2005.
|
915 |
+
[2]
|
916 |
+
Akamai, “Loyalty for Sale – Retail and Hospitality Fraud,” [state
|
917 |
+
of the internet] / security, vol. 6, no. 3, Oct. 2020.
|
918 |
+
[3]
|
919 |
+
K. Almotairi and B. Bataineh, “Perception of Information Sensi-
|
920 |
+
tivity for Internet Users in Saudi Arabia,” AIP, vol. 9, no. 2, 2020.
|
921 |
+
[4]
|
922 |
+
A. Blanco-Justicia and J. Domingo-Ferrer, “Efficient privacy-
|
923 |
+
preserving implicit authentication,” Computer Communications,
|
924 |
+
vol. 125, Jul. 2018.
|
925 |
+
[5]
|
926 |
+
J. Bonneau, E. W. Felten, P. Mittal, and A. Narayanan, “Privacy
|
927 |
+
concerns of implicit secondary factors for web authentication,” in
|
928 |
+
WAY ’14, Jul. 2014.
|
929 |
+
[6]
|
930 |
+
M. Burkhart, D. Brauckhoff, M. May, and E. Boschi, “The risk-
|
931 |
+
utility tradeoff for IP address truncation,” in NDA ’08.
|
932 |
+
ACM,
|
933 |
+
2008.
|
934 |
+
[7]
|
935 |
+
Y. J. Chew, S. Y. Ooi, K.-S. Wong, and Y. H. Pang, “Privacy
|
936 |
+
Preserving of IP Address through Truncation Method in Network-
|
937 |
+
based Intrusion Detection System,” in ICSCA ’19.
|
938 |
+
ACM, 2019.
|
939 |
+
[8]
|
940 |
+
European Union, “General Data Protection Regulation,” May 2016,
|
941 |
+
Regulation (EU) 2016/679.
|
942 |
+
[9]
|
943 |
+
Europol, “SIRIUS EU Digital Evidence Situation Report 2019,”
|
944 |
+
Dec. 2019.
|
945 |
+
[10] Federal Committee on Statistical Methodology, “Report on Statis-
|
946 |
+
tical Disclosure,” Dec. 2005.
|
947 |
+
[11] FireHOL,
|
948 |
+
“All
|
949 |
+
cybercrime
|
950 |
+
ip
|
951 |
+
feeds,”
|
952 |
+
Aug.
|
953 |
+
2020.
|
954 |
+
[Online].
|
955 |
+
Available: http://iplists.firehol.org/?ipset=firehol level4
|
956 |
+
[12] D. Freeman, S. Jain, M. D¨urmuth, B. Biggio, and G. Giacinto,
|
957 |
+
“Who Are You? A Statistical Approach to Measuring User Au-
|
958 |
+
thenticity,” in NDSS ’16.
|
959 |
+
Internet Society, Feb. 2016.
|
960 |
+
[13] P. A. Grassi et al., “Digital identity guidelines: authentication
|
961 |
+
and lifecycle management,” National Institute of Standards and
|
962 |
+
Technology, Tech. Rep. NIST SP 800-63b, Jun. 2017.
|
963 |
+
[14] M. J. Haber, “Attack Vectors,” in Privileged Attack Vectors: Build-
|
964 |
+
ing Effective Cyber-Defense Strategies to Protect Organizations.
|
965 |
+
Apress, 2020.
|
966 |
+
[15] A. Hurkała and J. Hurkała, “Architecture of context-risk-aware
|
967 |
+
authentication system for web environments,” in ICIEIS ’14, 2014.
|
968 |
+
[16] ISO, ISO/IEC 29100:2011(E): Information Technology — Security
|
969 |
+
Techniques — Privacy Framework.
|
970 |
+
ISO/IEC, 2011.
|
971 |
+
[17] D. Llewellyn-Jones and G. Rymer, “Cracking PwdHash: A Brute-
|
972 |
+
force Attack on Client-side Password Hashing.”
|
973 |
+
Apollo, 2017.
|
974 |
+
[18] E. Markos, L. I. Labrecque, and G. R. Milne, “A New Information
|
975 |
+
Lens: The Self-concept and Exchange Context as a Means to
|
976 |
+
Understand Information Sensitivity of Anonymous and Personal
|
977 |
+
Identifying Information,” JIM, vol. 42, 2018.
|
978 |
+
[19] E. Markos, G. R. Milne, and J. W. Peltier, “Information Sensitivity
|
979 |
+
and Willingness to Provide Continua: A Comparative Privacy Study
|
980 |
+
of the United States and Brazil,” JPP&M, 2017.
|
981 |
+
[20] E. McCallister, T. Grance, and K. A. Scarfone, “Guide to protecting
|
982 |
+
the confidentiality of Personally Identifiable Information (PII),”
|
983 |
+
Tech. Rep. NIST SP 800-122, 2010.
|
984 |
+
[21] I. Molloy, L. Dickens, C. Morisset, P.-C. Cheng, J. Lobo, and
|
985 |
+
A. Russo, “Risk-based Security Decisions Under Uncertainty,” in
|
986 |
+
CODASPY ’12.
|
987 |
+
ACM, Feb. 2012.
|
988 |
+
[22] K. Moriarty, B. Kaliski, and A. Rusch, “Pkcs #5: Password-based
|
989 |
+
cryptography specification version 2.1,” RFC 8018, January 2017.
|
990 |
+
[23] National Cyber Security Centre, “Cloud security guidance: 10,
|
991 |
+
Identity and authentication,” Tech. Rep., Nov. 2018.
|
992 |
+
[24] G. Pugliese, C. Riess, F. Gassmann, and Z. Benenson, “Long-Term
|
993 |
+
Observation on Browser Fingerprinting: Users’ Trackability and
|
994 |
+
Perspective,” PoPETS, vol. 2020, no. 2, Apr. 2020.
|
995 |
+
[25] N. Quermann, M. Harbach, and M. D¨urmuth, “The State of User
|
996 |
+
Authentication in the Wild,” in WAY ’18, Aug. 2018.
|
997 |
+
[26] N. A. Safa, R. Safavi-Naini, and S. F. Shahandashti, “Privacy-
|
998 |
+
Preserving Implicit Authentication,” in IFIP SEC ’14.
|
999 |
+
Springer,
|
1000 |
+
2014.
|
1001 |
+
[27] J. Salas and V. Torra, “A General Algorithm for k-anonymity on
|
1002 |
+
Dynamic Databases,” in DPM ’18.
|
1003 |
+
Springer, 2018.
|
1004 |
+
[28] E.-M. Schomakers, C. Lidynia, D. M¨ullmann, and M. Ziefle,
|
1005 |
+
“Internet users’ perceptions of information sensitivity – insights
|
1006 |
+
from Germany,” IJIM, vol. 46, Jun. 2019.
|
1007 |
+
[29] E.-M. Schomakers, C. Lidynia, and M. Ziefle, “All of me? Users’
|
1008 |
+
preferences for privacy-preserving data markets and the importance
|
1009 |
+
of anonymity,” Electronic Markets, vol. 30, no. 3, Feb. 2020.
|
1010 |
+
[30] State of California, “California Consumer Privacy Act,” Jun. 2018,
|
1011 |
+
Assembly Bill No. 375.
|
1012 |
+
[31] R. H. Steinegger, D. Deckers, P. Giessler, and S. Abeck, “Risk-
|
1013 |
+
based authenticator for web applications,” in EuroPlop ’16. ACM,
|
1014 |
+
Jun. 2016.
|
1015 |
+
[32] L. Sweeney, “k-anonymity: A model for protecting privacy,”
|
1016 |
+
IJUFKS, vol. 10, no. 05, Oct. 2002.
|
1017 |
+
[33] G. Venkatadri, E. Lucherini, P. Sapiezynski, and A. Mislove, “In-
|
1018 |
+
vestigating sources of PII used in Facebook’s targeted advertising,”
|
1019 |
+
PoPETS, vol. 2019, Jan. 2019.
|
1020 |
+
[34] S. Wiefling, M. D¨urmuth, and L. Lo Iacono, “What’s in Score
|
1021 |
+
for Website Users: A Data-driven Long-term Study on Risk-based
|
1022 |
+
Authentication Characteristics,” in FC ’21.
|
1023 |
+
Springer, Mar. 2021.
|
1024 |
+
[35] S. Wiefling, M. D¨urmuth, and L. Lo Iacono, “More Than Just
|
1025 |
+
Good Passwords? A Study on Usability and Security Perceptions
|
1026 |
+
of Risk-based Authentication,” in ACSAC ’20.
|
1027 |
+
ACM, Dec. 2020.
|
1028 |
+
[36] S. Wiefling, L. Lo Iacono, and M. D¨urmuth, “Is This Really You?
|
1029 |
+
An Empirical Study on Risk-Based Authentication Applied in the
|
1030 |
+
Wild,” in IFIP SEC ’19.
|
1031 |
+
Springer, Jun. 2019.
|
1032 |
+
[37] X. Xiao and Y. Tao, “M-invariance: towards privacy preserving re-
|
1033 |
+
publication of dynamic datasets,” in SIGMOD ’07.
|
1034 |
+
ACM, 2007.
|
1035 |
+
8
|
1036 |
+
|
E9AzT4oBgHgl3EQfiv2Y/content/tmp_files/load_file.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
EtE0T4oBgHgl3EQfgwHQ/vector_store/index.pkl
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:81e48d057ddff13a6d3ddef3c62ec5d7a7869a967dd183d4316157360cf4581a
|
3 |
+
size 262721
|
G9FAT4oBgHgl3EQfth4f/content/tmp_files/2301.08664v1.pdf.txt
ADDED
@@ -0,0 +1,1252 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
AccDecoder: Accelerated Decoding for
|
2 |
+
Neural-enhanced Video Analytics
|
3 |
+
Tingting Yuan†§, Liang Mi‡§, Weijun Wang†‡, Haipeng Dai‡∗, Xiaoming Fu†
|
4 |
+
†University of G¨ottingen, Germany; ‡Nanjing University, China
|
5 |
+
{tingting.yuan,weijun.wang,fu}@cs.uni-goettingen.de, [email protected], [email protected]
|
6 |
+
Abstract—The quality of the video stream is key to neural
|
7 |
+
network-based video analytics. However, low-quality video is
|
8 |
+
inevitably collected by existing surveillance systems because of
|
9 |
+
poor quality cameras or over-compressed/pruned video streaming
|
10 |
+
protocols, e.g., as a result of upstream bandwidth limit. To ad-
|
11 |
+
dress this issue, existing studies use quality enhancers (e.g., neural
|
12 |
+
super-resolution) to improve the quality of videos (e.g., resolution)
|
13 |
+
and eventually ensure inference accuracy. Nevertheless, directly
|
14 |
+
applying quality enhancers does not work in practice because
|
15 |
+
it will introduce unacceptable latency. In this paper, we present
|
16 |
+
AccDecoder, a novel accelerated decoder for real-time and neural-
|
17 |
+
enhanced video analytics. AccDecoder can select a few frames
|
18 |
+
adaptively via Deep Reinforcement Learning (DRL) to enhance
|
19 |
+
the quality by neural super-resolution and then up-scale the
|
20 |
+
unselected frames that reference them, which leads to 6-21%
|
21 |
+
accuracy improvement. AccDecoder provides efficient inference
|
22 |
+
capability via filtering important frames using DRL for DNN-
|
23 |
+
based inference and reusing the results for the other frames via
|
24 |
+
extracting the reference relationship among frames and blocks,
|
25 |
+
which results in a latency reduction of 20-80% than baselines.
|
26 |
+
Index Terms—Video analytics, super-resolution, deep rein-
|
27 |
+
forcement learning
|
28 |
+
I. INTRODUCTION
|
29 |
+
Advances in computer vision offer tremendous opportunities
|
30 |
+
for autonomous analytics of videos generated by pervasive
|
31 |
+
video cameras. Deep Neural Networks (DNNs) [1]–[4] have
|
32 |
+
been developed to dramatically improve the accuracy for
|
33 |
+
various vision tasks, while introducing stringent demands
|
34 |
+
on computational resources. Due to the compute-resource
|
35 |
+
shortage of commercial cameras, videos need to be streamed
|
36 |
+
to powerful servers for inference, which is called distributed
|
37 |
+
video analytics pipeline (VAP) [5], [6].
|
38 |
+
Nevertheless, providing highly accurate video analytics re-
|
39 |
+
mains challenging for the state-of-the-art distributed VAPs.
|
40 |
+
Since most methods for video analytics currently rely on high-
|
41 |
+
resolution videos, it is difficult to analyze low-quality videos,
|
42 |
+
such as object detection at low resolutions. For example, the
|
43 |
+
accuracy of Faster R-CNN [3], a modern DNN-based inference
|
44 |
+
method, can only achieve around 56% accuracy for videos
|
45 |
+
in 360p and 61% accuracy for videos in 540p which are
|
46 |
+
collected by [7]. However, low-quality videos are inevitably
|
47 |
+
collected by existing surveillance systems. One of the reasons
|
48 |
+
is that existing low-quality collectors can only capture low-
|
49 |
+
resolution frames. For example, New York city’s department
|
50 |
+
of transportation [8] has made videos from all 752 traffic
|
51 |
+
cameras to the public; however, the videos are transmitted
|
52 |
+
*Corresponding author. §Equal contributors.
|
53 |
+
at an extremely low resolution (240p) due to the default
|
54 |
+
configuration of cameras [9]. Another reason is that current
|
55 |
+
video streaming protocols over-compress/prune videos due to
|
56 |
+
upstream bandwidth limitations. For example, AWStream [10]
|
57 |
+
aggressively reduces the resolution of the video from 540p to
|
58 |
+
360p and the frame rate from 1 to 0.83. It eventually brings
|
59 |
+
about a 66% saving of bandwidth with a reduced accuracy
|
60 |
+
from 61% to 54%.
|
61 |
+
To address this challenge, some VAPs [11], [12] try to
|
62 |
+
utilize image enhancement models like Super Resolution (SR)
|
63 |
+
[2], [13] and Generative Adversarial Network (GAN) [14]
|
64 |
+
to enhance frames in videos before feeding them into the
|
65 |
+
inference model. This idea is inspired by the observation from
|
66 |
+
the computer vision community – running object recognition-
|
67 |
+
related tasks on high-resolution images can largely improve
|
68 |
+
the detection accuracy [13]. However, the video enhancement
|
69 |
+
via DNN-aware image enhancement models introduces extra
|
70 |
+
latency, resulting in around 500 ms end-to-end latency [15]
|
71 |
+
for each frame, which is far from the real-time requirement
|
72 |
+
(e.g., less than 15-30 ms for real-time object recognition [6]).
|
73 |
+
Although existing DNN-aware video enhancement provides
|
74 |
+
a promising way to improve the inference accuracy [16],
|
75 |
+
there is still much room for improvement. First, prior video
|
76 |
+
enhancement mechanisms are largely agnostic to video con-
|
77 |
+
tents, treating each received frame equally, but not all the
|
78 |
+
frames need to be enhanced. For example, only the frames
|
79 |
+
containing vehicles are valuable for traffic flow analysis; on
|
80 |
+
the contrary, enhancing frames with empty streets is worthless
|
81 |
+
but only increases system latency. Therefore, content-agnostic
|
82 |
+
enhancement mechanisms cannot avoid being suboptimal.
|
83 |
+
Second, although new DNN frameworks are designed to
|
84 |
+
accurately recognize important frames (e.g., [17], [18]), they
|
85 |
+
are too heavy to achieve low latency. Third, decoding all the
|
86 |
+
frames for analytics is computationally intensive and time-
|
87 |
+
consuming, and video encoding contains plenty of unexploited
|
88 |
+
but handy information to capture the important frames, such as
|
89 |
+
motion vectors (MVs) and residuals. We argue that the codec
|
90 |
+
information, although inaccurate, is valuable to reveal which
|
91 |
+
content is important, thereby speeding up video analytics.
|
92 |
+
Motivated by the above insights, we present AccDecoder,
|
93 |
+
a novel accelerated video streaming decoder for real-time and
|
94 |
+
neural-enhanced video analytics. AccDecoder is a content-
|
95 |
+
aware DNN-integrated video decoder utilizing codec informa-
|
96 |
+
tion to select a few frames for quality enhancement, which
|
97 |
+
is called as anchor frames and some frames for DNN-aware
|
98 |
+
arXiv:2301.08664v1 [cs.CV] 20 Jan 2023
|
99 |
+
|
100 |
+
0.2
|
101 |
+
0.4
|
102 |
+
0.6
|
103 |
+
0.8
|
104 |
+
F1-score
|
105 |
+
0
|
106 |
+
15
|
107 |
+
30
|
108 |
+
45
|
109 |
+
FPS
|
110 |
+
AccDec.
|
111 |
+
DDS
|
112 |
+
Reducto
|
113 |
+
Glimpse
|
114 |
+
AWStream
|
115 |
+
Better
|
116 |
+
Fig. 1: Example results of AccDecoder vs. baselines.
|
117 |
+
inference, which is called as inference frames. In particular,
|
118 |
+
AccDecoder applies SR to anchor frames and transfers the
|
119 |
+
high quality of frames/blocks to benefit the entire video via
|
120 |
+
extracting the frame and block reference relationships; it
|
121 |
+
further leverages codec information to reuse the results of
|
122 |
+
inference frames for acceleration.
|
123 |
+
Challenge and solution. AccDecoder needs to adapt to
|
124 |
+
various quality of videos to enable robust and real-time
|
125 |
+
video analytics. Since SR and DNN-based inference is time-
|
126 |
+
consuming, an accuracy-latency tradeoff must be made care-
|
127 |
+
fully to keep low latency without drastically compromising the
|
128 |
+
accuracy. Our preliminary study (see more in Section II and
|
129 |
+
III) shows that AccDecoder needs adaptive metrics for anchor
|
130 |
+
and inference frame selection according to factors like video
|
131 |
+
content and quality. In other words, various videos (or even
|
132 |
+
different chunks of the same video) demand different settings
|
133 |
+
for frame selection, but a static setting is not adaptive to the
|
134 |
+
varying contents of videos. To address this issue, we leverage
|
135 |
+
deep reinforcement learning (DRL) [19]–[21], which has been
|
136 |
+
widely used to solve dynamic and sequential problems [22],
|
137 |
+
[23]. Specifically, AccDecode enables adaptive settings via
|
138 |
+
DRL in frame selection to accelerate the video analytics and
|
139 |
+
achieve a good tradeoff between accuracy and latency.
|
140 |
+
Our contributions are summarized as follows.
|
141 |
+
• We design a novel content-aware DNN integrated video
|
142 |
+
decoder that is resilient and robust to the quality of videos.
|
143 |
+
For example, for a 540p crossroad video collected by [7],
|
144 |
+
AccDecoder can improve 10-38% accuracy compared with
|
145 |
+
the state-of-the-art VAPs (see Fig. 1).
|
146 |
+
• We exploit temporal redundancies within a video and codec
|
147 |
+
information to drastically increase the speed of analytics.
|
148 |
+
For example, AccDecoder performs 1.5-8.0 times faster
|
149 |
+
compared with AWStream [10], DDS [5], and Glimpse [24]
|
150 |
+
(see Fig. 1).
|
151 |
+
The rest of the paper is organized as follows. We first
|
152 |
+
present the background and motivation in Section II. Then we
|
153 |
+
discuss AccDecoder’s key design in Section III, followed by
|
154 |
+
our implementation in Section IV. The experimental studies
|
155 |
+
are demonstrated in Section V. In Section VI, we introduce
|
156 |
+
some related work. We conclude this paper in Section VII.
|
157 |
+
II. BACKGROUND AND MOTIVATION
|
158 |
+
We introduce distributed VAPs and video codec, followed
|
159 |
+
by performance requirements of VAPs that drive our design
|
160 |
+
(i.e., high accuracy, low end-to-end latency, and low over-
|
161 |
+
heads). We then elaborate on why prior solutions struggle to
|
162 |
+
meet the three requirements simultaneously.
|
163 |
+
A. Background
|
164 |
+
Distributed Video Analytics. The proliferation of video an-
|
165 |
+
alytics is facilitated by the advances of deep learning and
|
166 |
+
the low prices of high-resolution network-connected cam-
|
167 |
+
eras. However, the accuracy improvement from deep learning
|
168 |
+
comes at a high computational cost. Although state-of-the-
|
169 |
+
art smart cameras can support deep learning methods, the
|
170 |
+
current surveillance and traffic cameras show only suboptimal
|
171 |
+
use of resources. For example, DNNCam [25] that ships with
|
172 |
+
a high-end embedded NVIDIA TX2 GPU [26] costs more
|
173 |
+
than $2000 while the price of deployed traffic cameras today
|
174 |
+
ranges $40-$200. These cameras are typically loaded with a
|
175 |
+
single-core CPU, only providing scarce compute resources.
|
176 |
+
Because of this huge gap, typical VAPs follow a distributed
|
177 |
+
architecture. A typical distributed VAP architecture includes a
|
178 |
+
filter and an encoder on the camera side and a decoder and
|
179 |
+
an inference model on the server side, as illustrated in Fig.
|
180 |
+
2. In live analytics, video frames are continuously encoded
|
181 |
+
and sent to a remote server that runs the inference DNN to
|
182 |
+
analyze the video in an online fashion. For example, a vehicle
|
183 |
+
detection pipeline consists of a front-end traffic camera (which
|
184 |
+
compresses and streams live videos to a compute-powerful
|
185 |
+
edge/cloud GPU server upon wire/wireless networks) and a
|
186 |
+
back-end server (which decodes received video into frames
|
187 |
+
and feeds them into inference models like Faster R-CNN [3]
|
188 |
+
to detect vehicles). Such an architecture brings challenges in
|
189 |
+
bandwidth cost, and thus some schemes rely on aggressively
|
190 |
+
pruning videos (via e.g., reconfiguration, filtering) to meet
|
191 |
+
upstream bandwidth limitations.
|
192 |
+
frames
|
193 |
+
bits
|
194 |
+
stream
|
195 |
+
feedback
|
196 |
+
Server
|
197 |
+
frames
|
198 |
+
inference
|
199 |
+
results
|
200 |
+
decoder
|
201 |
+
encoder
|
202 |
+
filter
|
203 |
+
Camera
|
204 |
+
Fig. 2: Distributed video analytics pipeline.
|
205 |
+
Video codec is the key technology in distributed VAPs. It
|
206 |
+
comprises an encoder and a decoder, a software/hardware
|
207 |
+
program used to compress/decompress video files for easier
|
208 |
+
storage or network delivery. The encoder compresses video
|
209 |
+
data and wraps them into common video formats (e.g., H.264
|
210 |
+
[27]), while the decoder decompresses the compressed video
|
211 |
+
data into frames before post-processing (e.g., playback or
|
212 |
+
analysis). This compression process is usually lossy, which
|
213 |
+
strikes a balance between the video quality and the com-
|
214 |
+
pression ratio according to the self-preference of codecs and
|
215 |
+
encoding settings of users (e.g., bitrate, frame rate, and group
|
216 |
+
of pictures). We take H.264, one of the most popular codecs,
|
217 |
+
as an example to explain the compression process. During
|
218 |
+
encoding, each video frame is first divided into non-overlapped
|
219 |
+
macroblocks (16×16 pixels), then to each macroblock, the
|
220 |
+
|
221 |
+
encoder searches for the optimal compression method (in-
|
222 |
+
cluding the block division types and encoding types of each
|
223 |
+
block) according to the pixel-level similarity and encoding
|
224 |
+
settings. One macroblock may be further divided into non-
|
225 |
+
overlapped blocks (8×8 or 8×16 pixels) encoded with intra-
|
226 |
+
or inter-frame types. The intra-coded block is encoded using
|
227 |
+
the reference block with the most pixel-value similarity, and
|
228 |
+
the offset between these two blocks is encoded into an MV
|
229 |
+
with a residual. With the same procedure, the inter-coded
|
230 |
+
block locates the most pixel-value similar block searched by
|
231 |
+
the reference index and the MV from other frames. An MV
|
232 |
+
indicates the spatial offset between the target block and its
|
233 |
+
reference, while the difference in pixel values of two blocks
|
234 |
+
is encoded as the residual for decoding.
|
235 |
+
An ideal distributed VAP should meet three goals:
|
236 |
+
• High accuracy. Inspired by the success of image enhance-
|
237 |
+
ment methods in video streaming for QoE improvement
|
238 |
+
[28]–[31], researchers try to use image enhancement for
|
239 |
+
machine-centric video analytics [15], [31], [32]. For ex-
|
240 |
+
ample, [15] leverages SR to enhance image details for
|
241 |
+
robotics applications, while [31] embeds GAN on Google
|
242 |
+
Glasses to generate facial features for face recognition. The
|
243 |
+
experimental results from [15], [31] demonstrate that image
|
244 |
+
enhancement improves inference accuracy.
|
245 |
+
• Low latency. The latency of decoding the video (i.e.,
|
246 |
+
decoding latency), inference, and streaming the video to
|
247 |
+
the server (i.e., streaming latency) should be low. Previous
|
248 |
+
works focus on reducing the size of streaming to reduce the
|
249 |
+
streaming latency (e.g., Reducto [3]), learning and filtering
|
250 |
+
key frames for inference, and utilizing MVs to reuse the
|
251 |
+
other frames.
|
252 |
+
• Low bandwidth cost. We define the total size of a video
|
253 |
+
file delivered from the camera to the server of each VAP as
|
254 |
+
its bandwidth cost.
|
255 |
+
B. Motivation
|
256 |
+
Limitations
|
257 |
+
of
|
258 |
+
previous
|
259 |
+
work. Although a couple of
|
260 |
+
bandwidth-saving and accuracy-improvement approaches have
|
261 |
+
been developed, three significant limitations remain.
|
262 |
+
• Adaptive encoding in cameras. A camera may leverage
|
263 |
+
light-weight DNN [33] or heuristic methods (e.g., inter-
|
264 |
+
frame pixel-level difference [24]) to distinguish and prune
|
265 |
+
frames/regions without labelled information. However, these
|
266 |
+
cheap methods may cause false positive (e.g., pixel-level
|
267 |
+
distance changes by background may trigger a camera to
|
268 |
+
send many frames) and false negative (e.g., cheap object
|
269 |
+
detection model may miss small appeared objects), thus in-
|
270 |
+
creasing bandwidth cost or reducing the inference accuracy.
|
271 |
+
Server-side decision-making controls the camera’s actions
|
272 |
+
with feedback from the cloud. For example, according to
|
273 |
+
the servers’ instruction, the camera in [5] iteratively delivers
|
274 |
+
the region of interest in a higher resolution. The server-side
|
275 |
+
decision-making introduces extra latency, especially due to
|
276 |
+
the information delivery between the camera and the cloud
|
277 |
+
crossing a wide area network.
|
278 |
+
• Image enhancement in servers. Image enhancement con-
|
279 |
+
tributes to higher accuracy but also causes higher latency.
|
280 |
+
Although recent studies have successfully leveraged image
|
281 |
+
enhancement to increase QoE and inference accuracy, they
|
282 |
+
still suffer from high latency. The root cause is that image
|
283 |
+
enhancement models are much heavier than other computer
|
284 |
+
vision models. For instance, the complexity of the SR model
|
285 |
+
is as high as 1000× heavier than image classification, and
|
286 |
+
object detection models in terms of MultAdds [12], as SR
|
287 |
+
outputs high-resolution (HR) images whereas others output
|
288 |
+
labels or Bounding boxes (Bbox). In other words, naively
|
289 |
+
enhancing each frame is not practical in real-time video
|
290 |
+
analytics applications.
|
291 |
+
Fig. 3: Accuracy and latency using different schemes.
|
292 |
+
As shown in Fig. 3, our preliminary study confirms the
|
293 |
+
challenge in the tradeoff between accuracy and latency in
|
294 |
+
video analytics. Due to resource restrictions, to use existing
|
295 |
+
techniques in real-time and provide high accuracy, servers
|
296 |
+
need to adaptively shift multiple pipelines, including inference
|
297 |
+
after SR using HR frames, inference with low-resolution
|
298 |
+
frames (LR), and reuse the last inference results. However,
|
299 |
+
conventional algorithms (e.g., k-nearest neighbor (KNN) used
|
300 |
+
in [6]) are largely suboptimal as they ignore the temporal
|
301 |
+
relationship among frames and the possibility of transferring
|
302 |
+
high-quality frames to the whole video. Therefore, we aim to
|
303 |
+
design an efficient decoder to schedule the multiple pipelines
|
304 |
+
for video analytics adaptively.
|
305 |
+
III. SYSTEM DESIGN
|
306 |
+
In this section, we present the design goals and our solution
|
307 |
+
details of AccDecoder.
|
308 |
+
Design goals. We take a pragmatic stance to focus on the
|
309 |
+
server-side decoder because most of the installed surveil-
|
310 |
+
lance or traffic cameras only have cheap CPUs without pro-
|
311 |
+
grammable ability [6]; besides, rich information that may
|
312 |
+
improve VAPs’ performance in the decoder has not been
|
313 |
+
excavated. In this context, we propose AccDecoder, a portable
|
314 |
+
tool/decoder which can be plugged into any VAPs for video
|
315 |
+
streaming analytics to achieve high accuracy, limited latency
|
316 |
+
(e.g., 30 ms), and low-resource goals simultaneously. As
|
317 |
+
illustrated in Fig. 4, AccDecoder achieves these goals via the
|
318 |
+
following three mechanisms: 1) Pipeline leverages SR model
|
319 |
+
enhancing a small set of LR anchor frames to HR ones to
|
320 |
+
achieve high accuracy. 2) Pipeline and Pipeline extract the
|
321 |
+
codec information (e.g., frames reference relationship, MVs,
|
322 |
+
and residuals) from the decoder, then utilize them to transfer
|
323 |
+
the gains of enhanced anchor frames and reuse DNN inference
|
324 |
+
|
325 |
+
results (e.g.. Bbox in object detection) onto the entire video
|
326 |
+
respectively. Transfer and reuse amortize the computational
|
327 |
+
overhead of SR and inference across the entire video and thus
|
328 |
+
achieve low latency. 3) The scheduler classifies all frames into
|
329 |
+
three subsets, and each executes one of three pipelines. It can
|
330 |
+
greatly reduce latency and computational cost by exploiting
|
331 |
+
the content features of the key frames (e.g., the intra-coded
|
332 |
+
frame) and the change of codec information (e.g., residuals of
|
333 |
+
continuous frames).
|
334 |
+
content
|
335 |
+
feature
|
336 |
+
DRL
|
337 |
+
reuse
|
338 |
+
SR
|
339 |
+
key frame
|
340 |
+
residuals
|
341 |
+
results
|
342 |
+
AccDecoder
|
343 |
+
HR
|
344 |
+
inference
|
345 |
+
LR
|
346 |
+
HR
|
347 |
+
bits stream
|
348 |
+
motion
|
349 |
+
vectors
|
350 |
+
diff
|
351 |
+
extractor
|
352 |
+
decode
|
353 |
+
decode
|
354 |
+
scheduler
|
355 |
+
transfer
|
356 |
+
Fig. 4: Architecture of AccDecoder.
|
357 |
+
Path towards the goal. We seek answers to the following
|
358 |
+
pivotal questions, which lead to our key design choices. Q1
|
359 |
+
— How to effectively transfer the gains of SR to up-scale non-
|
360 |
+
anchor frames? Q2 — How to reuse the results of inference to
|
361 |
+
the other frames? Q3 — How to assign appropriate decoding
|
362 |
+
pipelines to frames in a fine spatial granularity to achieve a
|
363 |
+
better accuracy-latency tradeoff than baselines?
|
364 |
+
Q1 – How to transfer gains of SR to non-anchor frames?
|
365 |
+
Approach: Pipeline + . To make the best of reuse,
|
366 |
+
AccDecoder enhances anchor frames with the SR model and
|
367 |
+
caches the output (see in Fig. 5); then it transfers the
|
368 |
+
enhancement benefit to non-anchor frames with the reference
|
369 |
+
information and the cached outputs (see in Fig. 5). This
|
370 |
+
approach follows the same findings in [2] and [30], where most
|
371 |
+
of the latency of SR occurs at the last couple of layers. Namely,
|
372 |
+
caching and reusing the final output (i.e., high-resolution
|
373 |
+
images) is most effective in achieving low latency.
|
374 |
+
bits stream
|
375 |
+
cache
|
376 |
+
anchor frames
|
377 |
+
motion
|
378 |
+
vector
|
379 |
+
scaling
|
380 |
+
motion
|
381 |
+
compensation
|
382 |
+
residual
|
383 |
+
interpolation
|
384 |
+
SR transfer
|
385 |
+
non-anchor
|
386 |
+
frame
|
387 |
+
SR
|
388 |
+
reference
|
389 |
+
SR caching
|
390 |
+
Fig. 5: Process of SR gain transfer inspired by [30] and [27].
|
391 |
+
Fig. 5 illustrates the process of transferring SR gains to a
|
392 |
+
non-anchored frame for the inter-coded type. Modern video
|
393 |
+
codec encodes/decodes frames on the basis of non-overlapped
|
394 |
+
inter- and intra-coded blocks (§II-A). AccDecoder uses the
|
395 |
+
reference index, MVs, and the residual in the codec infor-
|
396 |
+
mation to decode a target block. The process is the same as
|
397 |
+
normal decoding except for the additional SR, scaling, and in-
|
398 |
+
terpolation modules (blue boxes in Fig. 5). First, AccDecoder
|
399 |
+
selects the reference blocks among cached anchor frames
|
400 |
+
following the inference index. Next, AccDecoder up-scales the
|
401 |
+
MV with the same amplification factor as SR (e.g., from 270p
|
402 |
+
to 1080 is 4). Following the MV, AccDecoder transfers the
|
403 |
+
SR gain from the reference block in the cached frame to the
|
404 |
+
target one. At last, AccDecoder up-scales the residual by light-
|
405 |
+
weight interpolation (e.g., bilinear or bicubic), accumulates it
|
406 |
+
to the transferred block to output the HR block, and pastes on
|
407 |
+
the non-anchor frame. To the intra-coded blocks without the
|
408 |
+
cached reference anchor frame, AccDecoder directly decodes
|
409 |
+
and up-scales then by interpolation. Fortunately, with our
|
410 |
+
carefully designed scheduler, most intra-coded blocks are
|
411 |
+
assigned to the SR pipeline; the impact of the minority of
|
412 |
+
interpolated intra-coded blocks can be negligible.
|
413 |
+
Q2 — How to reuse inference results for non-inference frames?
|
414 |
+
Approach: Pipeline . AccDecoder infers inference frames
|
415 |
+
using the inference model and caches the results; then, it uses
|
416 |
+
the MVs and cached results to infer non-inference frames (see
|
417 |
+
in Fig. 4). MV indicates the offset between the target and
|
418 |
+
reference blocks (§II-A). Here we use the object detection
|
419 |
+
task as an example, which aims to identify objects (i.e., their
|
420 |
+
locations and classes) on each frame in videos. Fig. 6 reveals
|
421 |
+
that the MVs between the last inference frame and the current
|
422 |
+
frame can perfect match the movement of objects’ Bboxes
|
423 |
+
(i.e., the results of object detection).
|
424 |
+
Fig. 6: Relation between MVs and Bboxes.
|
425 |
+
The Reuse module in Pipeline gets the result of the last
|
426 |
+
inference frame (dotted line in Fig. 4), calculates the mean of
|
427 |
+
all MVs that reside in each Bbox, and uses it to shift each Bbox
|
428 |
+
to the current position. MV, as the block-level offset, is hard to
|
429 |
+
express any semantic meaning (e.g., object moving) [34]. Our
|
430 |
+
preliminary study implies that the accuracy of reuse degrades
|
431 |
+
significantly after the MV, which spans multiple reference
|
432 |
+
frames (e.g., over 7-10 frames in [7], [35], [36]).
|
433 |
+
Optimization. AccDecoder uses two techniques to improve
|
434 |
+
the accuracy of the reuse of inference results. First, it filters the
|
435 |
+
noisy MVs from static backgrounds and outliers. Empirically,
|
436 |
+
AccDecoder filters the MV whose value is equal to zero or
|
437 |
+
greater than the mean plus 0.8 times the standard deviation in
|
438 |
+
the Bbox to which it belongs. Second, to cope with the change
|
439 |
+
in Bbox size due to the object’s movement, AccDecoder
|
440 |
+
|
441 |
+
Motionvector
|
442 |
+
Bbox of last inference frame
|
443 |
+
口
|
444 |
+
Bbox of current frameCON3a:8CON3a:CONexpands the MV calculation region to each direction by one
|
445 |
+
macroblock (16 pixels). Note that the reuse module is not
|
446 |
+
necessary to tackle but only remit this erosion because the
|
447 |
+
scheduler module in (Q3) effectively controls it by judiciously
|
448 |
+
distributing inference frames.
|
449 |
+
Progress beyond the state of the art. Some prior work (e.g.,
|
450 |
+
[37]–[39]) leverages lightweight MV-based methods to reuse
|
451 |
+
analytics results and speed up inference. However, rather than
|
452 |
+
calculating MV between continuous frames in the playback
|
453 |
+
order like them, reuse in AccDecoder works in compressed-
|
454 |
+
video space. That is, the reference blocks used to calculate
|
455 |
+
the target block’s MV can be distributed throughout the video
|
456 |
+
(the target block can even refer to future frames under the
|
457 |
+
playback sequence, which is called backward reference)1, but
|
458 |
+
the inference results should output in the playback order. To
|
459 |
+
tackle this mismatch, we maintain a graph to map the coding
|
460 |
+
order to the playback order and accumulate the MVs along the
|
461 |
+
edges. Via statistical experiments on large-scale datasets, we
|
462 |
+
find that the number of forwarding and backward references
|
463 |
+
is less than 4 and 3 frames, respectively, so it is not time-
|
464 |
+
consuming to search and calculate MVs in the graph.
|
465 |
+
Q3 — How to guarantee accuracy-latency balance?
|
466 |
+
Approach: Scheduler. The key to the accuracy-latency trade-
|
467 |
+
off is how to optimally assign decoding pipelines (i.e., SR,
|
468 |
+
inference, and reuse) to frames in fine spatial granularity.
|
469 |
+
As analyzed in Fig. 3, different pipelines for frame decoding
|
470 |
+
and analytics lead to different levels of accuracy and latency.
|
471 |
+
For each frame in an SR class, selected anchor frames are
|
472 |
+
enhanced by the SR model; after this, the scheduler feeds the
|
473 |
+
up-scaling frame into the inference DNN for inference (e.g.,
|
474 |
+
object detection). The frames in the inference class enjoy the
|
475 |
+
benefits from the SR frames following the references in Fig. 5,
|
476 |
+
and then are fed into the inference DNN model for inference.
|
477 |
+
Their accuracy still increases due to the benefits transferred
|
478 |
+
from the SR frames. Note that the transfer is quite fast (the
|
479 |
+
time cost is the same as normal frame decoding) as it only
|
480 |
+
includes additional bicubic interpolation on residual per frame
|
481 |
+
compared to normal frame decoding. For those frames in the
|
482 |
+
reuse class, e.g., object detection, we get the Bbox of each
|
483 |
+
object in the last (playback order) detected frame, calculate
|
484 |
+
the mean of all MVs that reside in the Bbox, and use it to
|
485 |
+
shift the previous position to the current position.
|
486 |
+
Model for pipeline selection. We formulate the adaptive
|
487 |
+
pipeline selection problem to maximize the accuracy under the
|
488 |
+
latency constraint. Given a video containing the set of frames
|
489 |
+
F, one of the three pipelines is selected for each frame, which
|
490 |
+
can be expressed as follows.
|
491 |
+
max
|
492 |
+
x
|
493 |
+
�
|
494 |
+
f∈F
|
495 |
+
Acc(xf)
|
496 |
+
s.t.
|
497 |
+
�
|
498 |
+
f∈F
|
499 |
+
Latency(xf) ≤ τ,
|
500 |
+
(1)
|
501 |
+
1Modern video codecs aim at reducing video size; they only consider how
|
502 |
+
to reduce the volume without caring whether the encoding obeys the playback
|
503 |
+
order; thus coding order is very different from the playback order.
|
504 |
+
where x = {x1, ..., xF } is the selection set and xf ∈ {1, 2, 3}
|
505 |
+
is for pipeline selection, Acc is the accuracy of a frame,
|
506 |
+
Latency is the latency of a frame given the selected pipeline,
|
507 |
+
and τ is latency tolerant of frames F.
|
508 |
+
(a) Correlations
|
509 |
+
Frame
|
510 |
+
34%
|
511 |
+
(b) Time cost
|
512 |
+
Fig. 7: Frame vs. residual in correlations between the dif-
|
513 |
+
ference values and the changes of Bboxes, and time cost in
|
514 |
+
feature extraction.
|
515 |
+
Finding the optimal pipeline selection is tricky due to the
|
516 |
+
large searching space 3|F |. Inspired by Reducto [6] which
|
517 |
+
adaptively filters frame via setting a threshold on frame
|
518 |
+
differencing, we introduce two thresholds tr1 and tr2 on frame
|
519 |
+
differencing to cluster frames into tree pipelines. When the
|
520 |
+
frame difference is greater than tr1, the frame will enter
|
521 |
+
the pipeline , and similarly, tr2 is the threshold for the
|
522 |
+
pipeline . If the difference of a frame is greater than both
|
523 |
+
of them, it will enter the pipeline. The constraint of real-
|
524 |
+
time video analytics (e.g., speed of analytics ≥30fps) restricts
|
525 |
+
us from extracting the light-weighted features to categorize
|
526 |
+
frames. Different from [6], we find out the Laplacian (i.e.,
|
527 |
+
edge features) on the residual and the frames have a high
|
528 |
+
correlation with the inference accuracy (see Fig. 7(a)). At the
|
529 |
+
same time, executing the Laplacian operator on the residual
|
530 |
+
can save 34% time than that on frame (see Fig. 7(b)). One
|
531 |
+
intuitive reason is that information on residuals is sparse and
|
532 |
+
de-redundant. It preserves differences among frames but is not
|
533 |
+
too dense to process, thus providing a good opportunity to
|
534 |
+
categorize frames efficiently.
|
535 |
+
best threshold
|
536 |
+
<latexit sha1_base64="fVM29horhdM2tsOP41vyKZWto=">AB63icbVBNSwMxEJ3Ur1q/qh69BIvgqeyKqMeiF
|
537 |
+
48V7Ae0S8m2TY0yS5JVihL/4IXD4p49Q9589+YbvegrQ8GHu/NMDMvTAQ31vO+UWltfWNzq7xd2dnd2z+oHh61TZxqylo0FrHuhsQwRVrW4F6yaERkK1gknd3O/8S04bF6tNOEBZKMFI84JTaX9MAfVGte3cuBV4lfkBoUaA6qX/1hTFPJlK
|
538 |
+
WCGNPzvcQGdGWU8FmlX5qWELohIxYz1FJDNBlt86w2dOGeIo1q6Uxbn6eyIj0pipDF2nJHZslr25+J/XS210E2RcJali4WRanANsbzx/GQa0atmDpCqObuVkzHRBNqXTwVF4K/PIqaV/U/av65cNlrXFbxFGEziFc/DhGhpwD01oAYUxPM
|
539 |
+
rvCGJXtA7+li0lAxcwx/gD5/ANuOjiE=</latexit>tr1
|
540 |
+
<latexit sha1_base64="X7iO0S9KhHRkdM5ypW+Kp675Nrs=">AB63icbVBNS8NAEJ3Ur1q/qh69LBbBU0lKUY9FL
|
541 |
+
x4r2A9oQ9lsN+3S3U3Y3Qgl9C948aCIV/+QN/+NmzQHbX0w8Hhvhpl5QcyZNq7ZQ2Nre2d8q7lb39g8Oj6vFJV0eJIrRDIh6pfoA15UzSjmG036sKBYBp71gdpf5vSeqNIvko5nH1Bd4IlnICDa5pEaNUbXm1t0caJ14BalBgfao+jUcRyQRVB
|
542 |
+
rCsdYDz42Nn2JlGOF0URkmsaYzPCEDiyVWFDtp/mtC3RhlTEKI2VLGpSrvydSLSei8B2CmymetXLxP+8QWLCGz9lMk4MlWS5KEw4MhHKHkdjpigxfG4JorZWxGZYoWJsfFUbAje6svrpNuoe1f15kOz1rot4ijDGZzDJXhwDS24hzZ0gMAUnuE
|
543 |
+
V3hzhvDjvzseyteQUM6fwB87nD90SjiI=</latexit>tr2
|
544 |
+
(a) Video of crossroad
|
545 |
+
best threshold
|
546 |
+
<latexit sha1_base64="fVM29horhdM2tsOP41vyKZWto=">AB63icbVBNSwMxEJ3Ur1q/qh69BIvgqeyKqMeiF
|
547 |
+
48V7Ae0S8m2TY0yS5JVihL/4IXD4p49Q9589+YbvegrQ8GHu/NMDMvTAQ31vO+UWltfWNzq7xd2dnd2z+oHh61TZxqylo0FrHuhsQwRVrW4F6yaERkK1gknd3O/8S04bF6tNOEBZKMFI84JTaX9MAfVGte3cuBV4lfkBoUaA6qX/1hTFPJlK
|
548 |
+
WCGNPzvcQGdGWU8FmlX5qWELohIxYz1FJDNBlt86w2dOGeIo1q6Uxbn6eyIj0pipDF2nJHZslr25+J/XS210E2RcJali4WRanANsbzx/GQa0atmDpCqObuVkzHRBNqXTwVF4K/PIqaV/U/av65cNlrXFbxFGEziFc/DhGhpwD01oAYUxPM
|
549 |
+
rvCGJXtA7+li0lAxcwx/gD5/ANuOjiE=</latexit>tr1
|
550 |
+
<latexit sha1_base64="X7iO0S9KhHRkdM5ypW+Kp675Nrs=">AB63icbVBNS8NAEJ3Ur1q/qh69LBbBU0lKUY9FLx4r2A9oQ9lsN+3S3U3Y3Qgl9C948aCIV/+QN/+NmzQHbX0w8Hhvhpl5QcyZNq7ZQ2Nre2d8q7lb39g8Oj6vFJV0eJI
|
551 |
+
rRDIh6pfoA15UzSjmG036sKBYBp71gdpf5vSeqNIvko5nH1Bd4IlnICDa5pEaNUbXm1t0caJ14BalBgfao+jUcRyQRVBrCsdYDz42Nn2JlGOF0URkmsaYzPCEDiyVWFDtp/mtC3RhlTEKI2VLGpSrvydSLSei8B2CmymetXLxP+8QWLCGz9lMk4MlWS5KEw4MhHKHkdjpigxfG4JorZWxGZYoWJsfFUbAje6svrpNuoe1f15kOz1rot4ijDGZzDJXhwDS24hzZ0gMAUnuEV3hzhvDjvzseyteQUM6fwB87nD90SjiI=</latexit>tr2
|
552 |
+
(b) Video of highway
|
553 |
+
Fig. 8: Best thresholds for pipeline selection vary across
|
554 |
+
videos.
|
555 |
+
Solution. Categorizing frames into three classes for pipelines
|
556 |
+
|
557 |
+
is not trivial. Across various videos, their best threshold
|
558 |
+
combination differs (as shown in Fig. 8). Furthermore, the
|
559 |
+
optimal thresholds for frame feature differences (e.g., pixel
|
560 |
+
and residual differences) among chunks in one video vary
|
561 |
+
greatly. Fig. 9 plots the best thresholds on the videos in [35],
|
562 |
+
which implies we should dynamically adjust the threshold for
|
563 |
+
each chunk. Therefore, the scheduler needs to offer adaptive
|
564 |
+
threshold settings.
|
565 |
+
|
566 |
+
<latexit sha1_base6
|
567 |
+
4="fVM29horhdM2tsOP41vyKZWto=">AB
|
568 |
+
63icbVBNSwMxEJ3Ur1q/qh69BIvgqeyKqMeiF
|
569 |
+
48V7Ae0S8m2TY0yS5JVihL/4IXD4p49Q9589
|
570 |
+
+YbvegrQ8GHu/NMDMvTAQ31vO+UWltfWNzq7x
|
571 |
+
d2dnd2z+oHh61TZxqylo0FrHuhsQwRVrW4F6
|
572 |
+
yaERkK1gknd3O/8S04bF6tNOEBZKMFI84JT
|
573 |
+
aX9MAfVGte3cuBV4lfkBoUaA6qX/1hTFPJlKW
|
574 |
+
CGNPzvcQGdGWU8FmlX5qWELohIxYz1FJDNB
|
575 |
+
lt86w2dOGeIo1q6Uxbn6eyIj0pipDF2nJHZsl
|
576 |
+
r25+J/XS210E2RcJali4WRanANsbzx/GQa0
|
577 |
+
atmDpCqObuVkzHRBNqXTwVF4K/PIqaV/U/av
|
578 |
+
65cNlrXFbxFGEziFc/DhGhpwD01oAYUxPMr
|
579 |
+
vCGJXtA7+li0lAxcwx/gD5/ANuOjiE=</lat
|
580 |
+
exit>tr1
|
581 |
+
|
582 |
+
<latexit sha1_base64="X7iO0S9KhHRkdM5y
|
583 |
+
pW+Kp675Nrs=">AB63icbVBNS8NAEJ3Ur1q/qh69LBbBU0lKUY9FLx4r2A9oQ9lsN+3S3U3Y
|
584 |
+
3Qgl9C948aCIV/+QN/+NmzQHbX0w8Hhvhpl5QcyZNq7ZQ2Nre2d8q7lb39g8Oj6vFJV0eJIr
|
585 |
+
RDIh6pfoA15UzSjmG036sKBYBp71gdpf5vSeqNIvko5nH1Bd4IlnICDa5pEaNUbXm1t0caJ14
|
586 |
+
BalBgfao+jUcRyQRVBrCsdYDz42Nn2JlGOF0URkmsaYzPCEDiyVWFDtp/mtC3RhlTEKI2VLGp
|
587 |
+
SrvydSLSei8B2CmymetXLxP+8QWLCGz9lMk4MlWS5KEw4MhHKHkdjpigxfG4JorZWxGZYoWJs
|
588 |
+
fFUbAje6svrpNuoe1f15kOz1rot4ijDGZzDJXhwDS24hzZ0gMAUnuEV3hzhvDjvzseyteQUM6f
|
589 |
+
wB87nD90SjiI=</latexit>tr2
|
590 |
+
Chunk Index
|
591 |
+
Inference Threshold
|
592 |
+
SR Threshold
|
593 |
+
Fig. 9: Best thresholds vary across chunks (even adjacent).
|
594 |
+
To adaptively set the thresholds, we formulate this problem
|
595 |
+
as a Markov decision process (MDP) where the scheduler
|
596 |
+
makes the threshold setting decision in AccDecoder. The MDP
|
597 |
+
is a discrete-time stochastic process, which can be defined by
|
598 |
+
a quad-tuple < S, A, R, P >. In this tuple, S is the set of
|
599 |
+
states, A is the set of actions, R is the set of rewards, and P
|
600 |
+
is the probability of transition from state S to state S′ based
|
601 |
+
on action A. While processing frames, the scheduler’s goal
|
602 |
+
is to cluster them into three pipelines (i.e., the action A) to
|
603 |
+
maximize its expected long-run reward E[Ri]. We define how
|
604 |
+
the MDP is parameterized as follows.
|
605 |
+
• State: The state consists of two components: the content
|
606 |
+
feature of the key frame and the differencing features
|
607 |
+
including inter-frame differences and difference between the
|
608 |
+
key frame and the last inference frame. First, the features
|
609 |
+
of the key frame (i.e., the first frame of the current chunk)
|
610 |
+
are extracted through the 1x1x1000 fully connected FC-
|
611 |
+
1000 layer of VGG16 [40]. Since the dimension of this
|
612 |
+
feature is too large, we use principal component analysis
|
613 |
+
(PCA) to reduce it to 128 dimensions. Next, we compute the
|
614 |
+
inter-frame differences between every two frames of each
|
615 |
+
chunk, which is the difference of edge features (i.e., apply
|
616 |
+
the Laplacian operator to the residual of each frame) as
|
617 |
+
discussed in Section III. Considering that there is continuity
|
618 |
+
between chunks, it is also necessary to add information
|
619 |
+
about inter-chunk, that is, the difference of edge features
|
620 |
+
between the key frame and the last inference frame in the
|
621 |
+
previous chunk.
|
622 |
+
• Action: The action is to set two thresholds tr1 and tr2 for
|
623 |
+
each chunk. The first threshold tr1 is applied to these frames
|
624 |
+
to select anchor frames for SR and transfer their quality to
|
625 |
+
the others for scale-up. The second one tr2 is to select
|
626 |
+
inference frames that need to be analyzed by inference
|
627 |
+
DNN. Then, the rest of the frames reuses the inference
|
628 |
+
results by exploring frame reference. It is challenge to
|
629 |
+
make accurate decisions for a large space of actions [41].
|
630 |
+
Therefore, we discretize the action space to reduce the
|
631 |
+
search space, i.e., tr1 ∈ {0.05, 0.10, 0.15, ..., 0.75} and
|
632 |
+
tr2 ∈ {0.5, 1.0, ..., 2.5}.
|
633 |
+
• Reward: Given that AccDecoder aims to maximize the
|
634 |
+
inference accuracy within a tolerable latency. Therefore,
|
635 |
+
the reward is designed to include two aspects, namely, the
|
636 |
+
average accuracy of the chunk and the latency required
|
637 |
+
to obtain the inference results for the chunk. Our goal is
|
638 |
+
to achieve real-time inference, so the chunk needs to be
|
639 |
+
analyzed before the arrival of the next chunk (e.g., within 1s
|
640 |
+
for each chunk); otherwise, there is a penalty for exceeding
|
641 |
+
the specified time. The reward for each chunk t is defined
|
642 |
+
as follows.
|
643 |
+
rt = α1
|
644 |
+
|Ft|
|
645 |
+
�
|
646 |
+
f∈Ft
|
647 |
+
Accf(trt,1, trt,2) − α2Pt(trt,1, trt,2), (2)
|
648 |
+
where α1 and α2 are the weight factors to balance the pref-
|
649 |
+
erence for latency and accuracy. The value of α in reward
|
650 |
+
can be adjusted based on different service preferences and
|
651 |
+
requirements. Pt is a penalty function of chunk t for latency
|
652 |
+
exceeding the tolerance τ.
|
653 |
+
Pt(trt,1, trt,2) =
|
654 |
+
�
|
655 |
+
1
|
656 |
+
if Latency(trt,1, trt,2) > τ,
|
657 |
+
0
|
658 |
+
others.
|
659 |
+
(3)
|
660 |
+
The process of DRL in frame selection is shown below. At
|
661 |
+
each chunk t, the agent observes the current state st and gives
|
662 |
+
an action at according to its policy. Then, the environment
|
663 |
+
returns reward rt as feedback, and moves to the next state
|
664 |
+
st+1 according to the transition probability P(st+1|st, at).
|
665 |
+
The goal to find an optimal policy can thus be formulated
|
666 |
+
as the mathematical problem of maximizing the expectation
|
667 |
+
of cumulative discounted return Rt = �T
|
668 |
+
k=t γk−trk, where
|
669 |
+
γ ∈ [0, 1] is a discount factor for future rewards to dampen
|
670 |
+
the effect of future rewards on the action; rk is the reward of
|
671 |
+
each step, and T is the number of chunks in the video.
|
672 |
+
Computational complexity. The searching space of the op-
|
673 |
+
timal pipeline selection for a chunk is O(3k), where k is
|
674 |
+
the number of frames in the chunk. The searching space of
|
675 |
+
AccDecoder’s scheduler is O(|a|), where |a| is the number of
|
676 |
+
possible actions. As we discretize the action space, therefore,
|
677 |
+
the complexity of AccDecoder is much less than that of
|
678 |
+
optimal pipeline selection.
|
679 |
+
IV. IMPLEMENTATION
|
680 |
+
We implement AccDecoder as an intelligent decoder in
|
681 |
+
both simulation and prototype. We first introduce the system
|
682 |
+
settings of the experiment and the setup of the dataset and the
|
683 |
+
baselines. Next, we introduce the training setup of AccDecoder
|
684 |
+
on neural networks of DRL, SR, and inference.
|
685 |
+
A. System Settings, Dataset, and Baselines
|
686 |
+
System settings. The server component runs on an Ubuntu
|
687 |
+
18.04 instance with Intel(R) Xeon(R) Gold 6226R CPU at
|
688 |
+
2.90GHz and 1 NVIDIA GeForce RTX 3070 GPU. AccDe-
|
689 |
+
coder is built on H.264 codec [42], JM 19.0 version open
|
690 |
+
source code [43], with 2470 LoC changes. In practice, there
|
691 |
+
are several video codecs besides H.264, but they have a high
|
692 |
+
|
693 |
+
degree of similarity. For example, they share the same abstracts
|
694 |
+
(i.e., reference index, MV, and residual), which are essential
|
695 |
+
information to transfer neural super-resolution outputs to non-
|
696 |
+
anchor frames. Their difference is in low-level compression
|
697 |
+
algorithms (e.g., the number of reference frames and the
|
698 |
+
size of blocks). Thus, while we only use H.264 to validate
|
699 |
+
AccDecoder’s design, we believe the design is generic enough
|
700 |
+
to accommodate different codecs.
|
701 |
+
Dataset. Our video dataset mainly contains public data streams
|
702 |
+
from real-time surveillance cameras deployed worldwide. We
|
703 |
+
collected video clips of different scenes and times from differ-
|
704 |
+
ent camera data sources. Thus, video datasets with different
|
705 |
+
properties (e.g., time, illumination, vehicle and pedestrian
|
706 |
+
density, road type, and direction) are obtained. All of our
|
707 |
+
videos are available by searching on YouTube [35], [44], [45]
|
708 |
+
and Yoda [7], [36], [46]. The videos are in 30fps, of which
|
709 |
+
each chunk includes 30 frames (i.e., k = 30). In particular,
|
710 |
+
VisDrone dataset [47] is used to train SR model. We use
|
711 |
+
CityScapes [48] as dataset and results of ERFNet [49] to
|
712 |
+
calculate inference loss for training.
|
713 |
+
Baselines. We compare AccDecoder’s performance with the
|
714 |
+
following four baselines: (1) Glimpse [24] filters frames by
|
715 |
+
comparing pixel-level frame differences against a static thresh-
|
716 |
+
old. (2) AWStream [10] adapts encoding parameters (i.e.,
|
717 |
+
quantization parameter (QP), resolution, and frame rate) of the
|
718 |
+
underlying codec to cope with different available bandwidth;
|
719 |
+
(3) DDS [5] applies different quality encodings to different
|
720 |
+
regions via region proposal network (RPN) [3], which can
|
721 |
+
offer trade-off accuracy and latency. (4) Reducto [6] filters
|
722 |
+
unnecessary frames in its encoder via a dynamic setting
|
723 |
+
threshold given by the server to save bandwidth in uploading.
|
724 |
+
B. DNN Implementation
|
725 |
+
DRL settings. In the experiments, we set α1 = α2 = 0.5 and
|
726 |
+
τ = 1s for each chunk according to our practical experience
|
727 |
+
and requirements of services. We use an Adam optimizer
|
728 |
+
with a learning rate of 0.0001. The discount factor for reward
|
729 |
+
gamma is 0.99. We use a two-layer MLP with 128 units to
|
730 |
+
implement the policy networks in DRL. The neural networks
|
731 |
+
use ReLU as activation functions. The capacity of the replay
|
732 |
+
buffer is 105, and we take a minibatch of 256 to update the
|
733 |
+
network parameters.
|
734 |
+
SR model. For object detection, we train the detection-driven
|
735 |
+
SR model based on EDSR [50] following the analytics aware
|
736 |
+
loss function (i.e., a weighted addition of visual quality loss
|
737 |
+
and object detection inference loss) in [15]. We use VisDrone
|
738 |
+
dataset [47] as the training set to train our model; use testing
|
739 |
+
set from VisDrone, video set from DDS [5] and Reducto [6] to
|
740 |
+
evaluate its performance. The visual quality loss comes from
|
741 |
+
the pair of original and down sampling frames; the object
|
742 |
+
detection inference loss comes from the results of YOLOv4 [1]
|
743 |
+
detecting on reconstructed frames (from the down sampling
|
744 |
+
frames) and the labels. The initial weights of EDSR and
|
745 |
+
YOLOv4 are provided by authoritative implementations [1],
|
746 |
+
[51]. The weights of EDSR are updated during our training,
|
747 |
+
but the one of YOLOv4 keeps static.
|
748 |
+
Inference DNN settings. We mainly evaluate AccDecoder’s
|
749 |
+
performance on object detection. Here, we list the different
|
750 |
+
DNNs used by AccDecoder for object detection. We choose
|
751 |
+
two object detection models with different architectures in-
|
752 |
+
cluding Faster R-CNN [3], YoLov5 [52]. We pre-trained both
|
753 |
+
models using the COCO dataset [53].
|
754 |
+
V. EVALUATION
|
755 |
+
To demonstrate AccDecoder delivers significant quality im-
|
756 |
+
provement, we compare AccDecoder with baselines in terms
|
757 |
+
of inference accuracy and latency.
|
758 |
+
A. Overall performance of AccDecoder
|
759 |
+
Video quality improvement. We illustrate the performance
|
760 |
+
of SR via Fig. 10, which shows the visual object detection
|
761 |
+
results. The results vary in the original 1080p images with
|
762 |
+
ground truth labels, inference results of low resolution (in
|
763 |
+
270p), and inference results of up-scaled images by SR from
|
764 |
+
270p. From the results, we can see SR delivers more detailed
|
765 |
+
information to the DNN inference model, thus bounding more
|
766 |
+
small objects and improving accuracy in object detection.
|
767 |
+
(a) Ground truth (1080p)
|
768 |
+
(b) Low resolution (270p)
|
769 |
+
(c) Super resolution
|
770 |
+
Fig. 10: SR can improve inference accuracy by enhancing
|
771 |
+
resolution of frames in videos.
|
772 |
+
Accuracy and latency. We demonstrate that AccDecoder
|
773 |
+
can effectively improve accuracy-latency trade-off via adaptive
|
774 |
+
pipeline assignment. Fig. 11 shows the per-chunk of pipeline
|
775 |
+
assignment, accuracy (i.e., f1-score as a measure of accuracy),
|
776 |
+
and speed of analytics, respectively. AccDecoder clusters
|
777 |
+
frames into three types: 1) anchor frames (around 6%) are
|
778 |
+
|
779 |
+
selected for pipeline with SR; 2) inference frames (11%)
|
780 |
+
are analyzed by inference DNNs in pipeline and , in which
|
781 |
+
5% frames are for pipeline ; 3) non-inference and non-anchor
|
782 |
+
frames (around 89%) are selected for pipeline . Furthermore,
|
783 |
+
AccDecoder and Reducto can achieve a higher frame rate than
|
784 |
+
the basic requirement (i.e., 30fps), whereas other baselines
|
785 |
+
offer a lower rate. AccDecoder can also achieve higher and
|
786 |
+
more stable accuracy than the baselines. It is worth noting
|
787 |
+
that from the 35th chunk, the density and velocity of vehicles
|
788 |
+
increase significantly (i.e., 3x and 2.7x, respectively) so that
|
789 |
+
the inferred rate is adjusted to a higher level, which ultimately
|
790 |
+
maintains a good accuracy and frame rate.
|
791 |
+
Pipeline
|
792 |
+
Pipeline
|
793 |
+
Pipeline
|
794 |
+
> 85%
|
795 |
+
density 3x
|
796 |
+
velocity 2.7x
|
797 |
+
base fps
|
798 |
+
Chunk Index
|
799 |
+
Fraction
|
800 |
+
Chunk index
|
801 |
+
0.00
|
802 |
+
0.08
|
803 |
+
0.16
|
804 |
+
0.24
|
805 |
+
0.80
|
806 |
+
1.00
|
807 |
+
AccDec.
|
808 |
+
DDS
|
809 |
+
Reducto
|
810 |
+
Glimpse
|
811 |
+
Awstream
|
812 |
+
Fig. 11: Pipeline assignment ratio, analytics speed, and infer-
|
813 |
+
ence accuracy of chunks.
|
814 |
+
B. Component-wise Analysis
|
815 |
+
Performance breakdown. We break down the accuracy and
|
816 |
+
the latency to show the impact of each pipeline illustrated in
|
817 |
+
Fig. 12. Firstly, Fig. 12(a) breakdowns the accuracy in transfer
|
818 |
+
of anchor frames, reuse of the inference frames, and SR. The
|
819 |
+
impact of reuse and SR on accuracy is obvious, while the
|
820 |
+
impact of transfer is relatively small. The main reason is that
|
821 |
+
the transfer has less improvement on small objects due to
|
822 |
+
blur caused by interpolation, which will be one of our future
|
823 |
+
works. Secondly, Fig. 12(b) shows the latency breakdown
|
824 |
+
in processing each chunk, where we use videos in 270p,
|
825 |
+
360p, and 540p, respectively. AccDecoder needs more time
|
826 |
+
when processing and analyzing high-resolution videos, i.e.,
|
827 |
+
the overall latency in ms. Specifically, SR (∼40%), inference
|
828 |
+
(∼30%), and reuse (∼20%) take up most of the latency, while
|
829 |
+
DRL-based scheduling and feature extraction only occupy
|
830 |
+
around 5%, which can be omitted. SR is time-consuming,
|
831 |
+
although only 6% of frames are assigned to pipeline .
|
832 |
+
Besides, inferring pipeline and for around 11% of frames
|
833 |
+
also takes a latency that cannot be ignored. Although the time
|
834 |
+
cost of reuse per frame is small, the time cost of reuse requires
|
835 |
+
(a) Accuracy breakdown
|
836 |
+
1%
|
837 |
+
36%
|
838 |
+
29%
|
839 |
+
42%
|
840 |
+
6%
|
841 |
+
22%
|
842 |
+
1%
|
843 |
+
27%
|
844 |
+
49%
|
845 |
+
5%
|
846 |
+
18%
|
847 |
+
1%
|
848 |
+
40%
|
849 |
+
5%
|
850 |
+
18%
|
851 |
+
Resolution
|
852 |
+
1%
|
853 |
+
36%
|
854 |
+
29%
|
855 |
+
42%
|
856 |
+
6%
|
857 |
+
22%
|
858 |
+
1%
|
859 |
+
27%
|
860 |
+
49%
|
861 |
+
5%
|
862 |
+
18%
|
863 |
+
1%
|
864 |
+
40%
|
865 |
+
5%
|
866 |
+
18%
|
867 |
+
DRL
|
868 |
+
Infer
|
869 |
+
SR
|
870 |
+
Feature
|
871 |
+
Reuse
|
872 |
+
Resolution
|
873 |
+
Latency (ms)
|
874 |
+
270p
|
875 |
+
360p
|
876 |
+
540p
|
877 |
+
800
|
878 |
+
600
|
879 |
+
400
|
880 |
+
200
|
881 |
+
0
|
882 |
+
(b) Latency breakdown
|
883 |
+
Fig. 12: Performance breakdown on accuracy and latency.
|
884 |
+
20% latency in total due to more than 85% frames belonging
|
885 |
+
to pipeline .
|
886 |
+
AccDecoder schedulers. We evaluate the scheduler’s per-
|
887 |
+
formance in AccDecoder, including DRL-based schemes and
|
888 |
+
KNN, as illustrated in Fig. 13. We choose three well-known
|
889 |
+
DRL schemes for training: Asynchronous Advantage Actor-
|
890 |
+
Critic (A3C) [54], Soft Actor-Critic (SAC) [55], and Proximal
|
891 |
+
Policy Optimization (PPO) [56]. Through effective explo-
|
892 |
+
ration, we find A3C can receive a satisfactory and stable
|
893 |
+
cumulative reward, which was about 11.42% higher than the
|
894 |
+
cumulative reward received by KNN and PPO. From the final
|
895 |
+
cumulative reward value in the figure, the cumulative rewards
|
896 |
+
of A3C and SAC are higher. Considering the advantages of
|
897 |
+
A3C, we choose A3C for the training of the scheduler.
|
898 |
+
0
|
899 |
+
500
|
900 |
+
1000
|
901 |
+
1500
|
902 |
+
2000
|
903 |
+
2500
|
904 |
+
3000
|
905 |
+
Episodes
|
906 |
+
30
|
907 |
+
32
|
908 |
+
34
|
909 |
+
36
|
910 |
+
38
|
911 |
+
40
|
912 |
+
Reward
|
913 |
+
A3C
|
914 |
+
PPO
|
915 |
+
SAC
|
916 |
+
KNN
|
917 |
+
Fig. 13: Comparison of different schemes for the scheduler
|
918 |
+
in AccDecoder. DRL is better than KNN, and A3C achieves
|
919 |
+
better learning performance than the others.
|
920 |
+
|
921 |
+
1.00
|
922 |
+
0.80.
|
923 |
+
raction
|
924 |
+
0.24
|
925 |
+
0.16
|
926 |
+
F
|
927 |
+
0.08C. AccDecoder vs. Existing VAPs
|
928 |
+
AccDecoder vs. baselines. We show the advantage of AccDe-
|
929 |
+
coder in accuracy and speed of analytics compared with the
|
930 |
+
baselines. Fig. 14 compares the performance distribution of
|
931 |
+
AccDecoder with the baseline over different DNNs (YOLOv5
|
932 |
+
and Faster R-CNN with Resnet50) and various types of videos
|
933 |
+
(i.e., highways and crossroads). It can be seen that AccDecoder
|
934 |
+
is better than the baseline in terms of speed and accuracy of
|
935 |
+
analytics. In terms of speed, AccDecoder’s analytics speed is
|
936 |
+
around 35fps, which meets the penalty threshold we set for
|
937 |
+
DRL training. In terms of accuracy, AccDecoder can keep
|
938 |
+
relatively higher accuracy compared with the baselines.
|
939 |
+
0.2
|
940 |
+
0.4
|
941 |
+
0.6
|
942 |
+
0.8
|
943 |
+
F1-score
|
944 |
+
0
|
945 |
+
15
|
946 |
+
30
|
947 |
+
45
|
948 |
+
FPS
|
949 |
+
AccDec.
|
950 |
+
DDS
|
951 |
+
Reducto
|
952 |
+
Glimpse
|
953 |
+
AWStream
|
954 |
+
Better
|
955 |
+
(a) Faster R-CNN (highways)
|
956 |
+
0.2
|
957 |
+
0.4
|
958 |
+
0.6
|
959 |
+
0.8
|
960 |
+
F1-score
|
961 |
+
0
|
962 |
+
15
|
963 |
+
30
|
964 |
+
45
|
965 |
+
FPS
|
966 |
+
AccDec.
|
967 |
+
DDS
|
968 |
+
Reducto
|
969 |
+
Glimpse
|
970 |
+
AWStream
|
971 |
+
Better
|
972 |
+
(b) Yolov5 (highways)
|
973 |
+
0.2
|
974 |
+
0.4
|
975 |
+
0.6
|
976 |
+
0.8
|
977 |
+
F1-score
|
978 |
+
0
|
979 |
+
15
|
980 |
+
30
|
981 |
+
45
|
982 |
+
FPS
|
983 |
+
AccDec.
|
984 |
+
DDS
|
985 |
+
Reducto
|
986 |
+
Glimpse
|
987 |
+
AWStream
|
988 |
+
Better
|
989 |
+
(c) Faster R-CNN (crossroad)
|
990 |
+
0.2
|
991 |
+
0.4
|
992 |
+
0.6
|
993 |
+
0.8
|
994 |
+
F1-score
|
995 |
+
0
|
996 |
+
15
|
997 |
+
30
|
998 |
+
45
|
999 |
+
FPS
|
1000 |
+
AccDec.
|
1001 |
+
DDS
|
1002 |
+
Reducto
|
1003 |
+
Glimpse
|
1004 |
+
AWStream
|
1005 |
+
Better
|
1006 |
+
(d) Yolov5 (crossroad)
|
1007 |
+
Fig. 14: AccDecoder vs. baselines in terms of the speed of
|
1008 |
+
analytics and inference accuracy on various video datasets (in
|
1009 |
+
parentheses) and different DNN models (i.e., Faster R-CNN
|
1010 |
+
and Yolov5). AccDecoder achieves 6-38% higher inference
|
1011 |
+
accuracy than the baselines and 20-80% lower latency than
|
1012 |
+
the baselines except for Reducto.
|
1013 |
+
VI. RELATED WORKS
|
1014 |
+
Video analytics pipeline. Many computer vision tasks are
|
1015 |
+
considered in VAPs, such as traffic control [57], surveillance
|
1016 |
+
and security [11]. We consider the following task as a running
|
1017 |
+
example — object detection. Object detection aims to identify
|
1018 |
+
objects of interest (i.e., their locations and classes) in each
|
1019 |
+
frame in the video. Selecting this task has two major reasons:
|
1020 |
+
first, it plays a core role in the computer vision community
|
1021 |
+
because a wide range of high-level tasks (e.g., autonomous
|
1022 |
+
driving) is built on it; second, we seek to keep consistent
|
1023 |
+
with prior video analytics work [5], [58]–[60] to allow a
|
1024 |
+
straightforward performance comparison.
|
1025 |
+
Deep
|
1026 |
+
reinforcement
|
1027 |
+
learning. DRL is well suited to
|
1028 |
+
tackle problems requiring longer-term planning using high-
|
1029 |
+
dimensional observations, which is the case of dynamic
|
1030 |
+
pipeline selection. There is a variety of DRL-based algorithms.
|
1031 |
+
Value-based algorithms, e.g., Deep Q-Networks (DQN) [61],
|
1032 |
+
use a deep neural network to learn the action-value function.
|
1033 |
+
However, they do not support continuous action space like the
|
1034 |
+
one in our problem. Policy-based algorithms, e.g., Policy Gra-
|
1035 |
+
dient (PG) [62], explicitly build a representation of a policy.
|
1036 |
+
However, evaluating a policy without action-value estimation
|
1037 |
+
is typically inefficient and causes high variance. Actor-critic
|
1038 |
+
algorithms learn the value function (critic) in addition to the
|
1039 |
+
policy (actor) since knowing the value function can assist
|
1040 |
+
policy updates, for example, by reducing variance in policy
|
1041 |
+
gradients. Many existing approaches are based on actor-critic,
|
1042 |
+
for example, PPO [56], A3C [54], and SAC [55]. A3C, an
|
1043 |
+
asynchronous algorithm, can enable multiple worker agents to
|
1044 |
+
train in parallel, allowing faster training.
|
1045 |
+
VII. CONCLUSION AND DISCUSSION
|
1046 |
+
In this paper, we propose AccDecoder to eliminate the
|
1047 |
+
dependence of existing VAPs on video quality. AccDecoder
|
1048 |
+
is a new universal video stream decoder that uses a super-
|
1049 |
+
resolution deep neural network to enhance video quality for
|
1050 |
+
video analytics. To accelerate analytics, AccDecoder applies
|
1051 |
+
DRL for adaptive frame selection for quality enhancement
|
1052 |
+
or/and DNN-based inference. It is a new way to address the
|
1053 |
+
key challenge of accuracy-latency tradeoff in distributed VAPs.
|
1054 |
+
We show that AccDecoder can substantially improve state-of-
|
1055 |
+
the-art VAPs by speeding up analytics (3-7x) and achieving
|
1056 |
+
accuracy improvements (6-21%).
|
1057 |
+
In future work, we plan to explore DRL for macroblock
|
1058 |
+
selection to offer finer-grained scheduling and joint adaptation
|
1059 |
+
encoding and decoding to further improve the accuracy and
|
1060 |
+
speed of analytics.
|
1061 |
+
ACKNOWLEDGMENT
|
1062 |
+
This work has been partly funded by EU H2020 COSAFE
|
1063 |
+
(Grant 824019) and Horizon CODECO projects (Grant
|
1064 |
+
101092696), the Alexander von Humboldt Foundation, and
|
1065 |
+
the National Natural Science Foundation of China under Grant
|
1066 |
+
61872178, 62272223, and Grant 61832005.
|
1067 |
+
REFERENCES
|
1068 |
+
[1] A. Bochkovskiy, C.-Y. Wang, and H.-Y. M. Liao, “Yolov4: Optimal
|
1069 |
+
speed and accuracy of object detection,” in arXiv:2004.10934, 2020.
|
1070 |
+
[2] N. Ahn, B. Kang, and K.-A. Sohn, “Fast, accurate, and lightweight
|
1071 |
+
super-resolution with cascading residual network,” in Proc. of ECCV,
|
1072 |
+
2018, pp. 252–268.
|
1073 |
+
[3] S. Ren, K. He, R. Girshick, and J. Sun, “Faster R-CNN: Towards
|
1074 |
+
real-time object detection with region proposal networks,” Advances in
|
1075 |
+
Neural Information Processing Systems, vol. 28, 2015.
|
1076 |
+
[4] H. Wang, X. Jiang, H. Ren, Y. Hu, and S. Bai, “Swiftnet: Real-time
|
1077 |
+
video object segmentation,” in Proc. of CVPR, 2021, pp. 1296–1305.
|
1078 |
+
[5] K. Du, A. Pervaiz, X. Yuan, A. Chowdhery, Q. Zhang, H. Hoffmann, and
|
1079 |
+
J. Jiang, “Server-driven video streaming for deep learning inference,” in
|
1080 |
+
Proc. of ACM SIGCOMM, 2020, pp. 557–570.
|
1081 |
+
[6] Y. Li, A. Padmanabhan, P. Zhao, Y. Wang, G. H. Xu, and R. Netravali,
|
1082 |
+
“Reducto: On-camera filtering for resource-efficient real-time video
|
1083 |
+
analytics,” in Proc. of ACM SIGCOMM, 2020, pp. 359–376.
|
1084 |
+
[7] Yoda,
|
1085 |
+
“Crossroad
|
1086 |
+
video,”
|
1087 |
+
https://yoda.cs.uchicago.edu/videos/
|
1088 |
+
cross-road.mp4.
|
1089 |
+
[8] New York City Department of Transportation, “Real time traffic infor-
|
1090 |
+
mation,” https://webcams.nyctmc.org/, Mar. 2020.
|
1091 |
+
|
1092 |
+
[9] P. Wei, H. Shi, J. Yang, J. Qian, Y. Ji, and X. Jiang, “City-scale vehicle
|
1093 |
+
tracking and traffic flow estimation using low frame-rate traffic cameras,”
|
1094 |
+
in Proc. of UbiComp/ISWC, 2019, pp. 602–610.
|
1095 |
+
[10] B. Zhang, X. Jin, S. Ratnasamy, J. Wawrzynek, and E. A. Lee,
|
1096 |
+
“Awstream: Adaptive wide-area streaming analytics.” in Proc. of ACM
|
1097 |
+
SIGCOMM, 2018, pp. 236–252.
|
1098 |
+
[11] J. Yi, S. Choi, and Y. Lee, “EagleEye: Wearable camera-based person
|
1099 |
+
identification in crowded urban spaces,” in Proc. of MobiCom, 2020.
|
1100 |
+
[12] J. Yi, S. Kim, J. Kim, and S. Choi, “Supremo: Cloud-assisted low-
|
1101 |
+
latency super-resolution in mobile devices,” IEEE Transactions on
|
1102 |
+
Mobile Computing, pp. 1847–1860, 2020.
|
1103 |
+
[13] J. Huang, V. Rathod, C. Sun, M. Zhu, A. Korattikara, A. Fathi, I. Fischer,
|
1104 |
+
Z. Wojna, Y. Song, S. Guadarrama et al., “Speed/accuracy trade-offs
|
1105 |
+
for modern convolutional object detectors,” in Proc. of CVPR, 2017, pp.
|
1106 |
+
7310–7311.
|
1107 |
+
[14] Y. Chen, Y. Tai, X. Liu, C. Shen, and J. Yang, “Fsrnet: End-to-end
|
1108 |
+
learning face super-resolution with facial priors,” in Proc. of CVPR,
|
1109 |
+
2018.
|
1110 |
+
[15] Y. Wang, W. Wang, D. Liu, X. Jin, J. Jiang, and K. Chen, “Enabling
|
1111 |
+
edge-cloud video analytics for robotics applications,” in Proc. of IEEE
|
1112 |
+
INFOCOM, 2022, pp. 1–10.
|
1113 |
+
[16] Z. Zou, Z. Shi, Y. Guo, and J. Ye, “Object detection in 20 years: A
|
1114 |
+
survey,” arXiv:1905.05055, 2019.
|
1115 |
+
[17] A. Ghodrati, B. E. Bejnordi, and A. Habibian, “Frameexit: Conditional
|
1116 |
+
early exiting for efficient video recognition,” in Proc. of CVPR, 2021,
|
1117 |
+
pp. 15 608–15 618.
|
1118 |
+
[18] A. Habibian, D. Abati, T. S. Cohen, and B. E. Bejnordi, “Skip-
|
1119 |
+
convolutions for efficient video processing,” in Proc. of CVPR, 2021,
|
1120 |
+
pp. 2695–2704.
|
1121 |
+
[19] N. C. Luong, D. T. Hoang, S. Gong, D. Niyato, P. Wang, Y.-C.
|
1122 |
+
Liang, and D. I. Kim, “Applications of deep reinforcement learning
|
1123 |
+
in communications and networking: A survey,” IEEE Communications
|
1124 |
+
Surveys & Tutorials, vol. 21, no. 4, pp. 3133–3174, 2019.
|
1125 |
+
[20] K. Arulkumaran, M. P. Deisenroth, M. Brundage, and A. A. Bharath, “A
|
1126 |
+
brief survey of deep reinforcement learning,” IEEE Signal Processing
|
1127 |
+
Magazine, vol. 34, no. 6, 2017.
|
1128 |
+
[21] T. Yuan, H.-M. Chung, J. Yuan, and X. Fu, “DACOM: Learning delay-
|
1129 |
+
aware communication for multi-agent reinforcement learning,” in Proc.
|
1130 |
+
of AAAI, 2023.
|
1131 |
+
[22] T. Yuan, C. E. Rothenberg, K. Obraczka, C. Barakat, and T. Turletti,
|
1132 |
+
“Harnessing UAVs for fair 5G bandwidth allocation in vehicular com-
|
1133 |
+
munication via deep reinforcement learning,” IEEE Transactions on
|
1134 |
+
Network and Service Management, vol. 18, no. 4, pp. 4063–4074, 2021.
|
1135 |
+
[23] T. Yuan, W. da Rocha Neto, C. E. Rothenberg, K. Obraczka, C. Barakat,
|
1136 |
+
and T. Turletti, “Dynamic controller assignment in software defined
|
1137 |
+
internet of vehicles through multi-agent deep reinforcement learning,”
|
1138 |
+
IEEE Transactions on Network and Service Management, vol. 18, no. 1,
|
1139 |
+
pp. 585–596, 2020.
|
1140 |
+
[24] T. Y.-H. Chen, L. Ravindranath, S. Deng, P. Bahl, and H. Balakrishnan,
|
1141 |
+
“Glimpse: Continuous, real-time object recognition on mobile devices,”
|
1142 |
+
in Proc. of SenSys, 2015, pp. 155–168.
|
1143 |
+
[25] Boulder AI, “Dnncam ai camera,” https://groupgets.com/campaigns/
|
1144 |
+
429-dnncam-ai-camera.
|
1145 |
+
[26] NVIDIA,
|
1146 |
+
“Jetson
|
1147 |
+
tx2,”
|
1148 |
+
https://www.nvidia.com/de-de/
|
1149 |
+
autonomous-machines/embedded-systems/jetson-tx2.
|
1150 |
+
[27] T. Wiegand, G. J. Sullivan, G. Bjontegaard, and A. Luthra, “Overview of
|
1151 |
+
the H. 264/AVC video coding standard,” IEEE Transactions on Circuits
|
1152 |
+
and Systems for Video Technology, vol. 13, no. 7, pp. 560–576, 2003.
|
1153 |
+
[28] M. Dasari, A. Bhattacharya, S. Vargas, P. Sahu, A. Balasubramanian,
|
1154 |
+
and S. R. Das, “Streaming 360-degree videos using super-resolution,”
|
1155 |
+
in Proc. of IEEE INFOCOM, 2020, pp. 1977–1986.
|
1156 |
+
[29] J. Kim, Y. Jung, H. Yeo, J. Ye, and D. Han, “Neural-enhanced live
|
1157 |
+
streaming: Improving live video ingest via online learning,” in Proc. of
|
1158 |
+
ACM SIGCOMM, 2020, pp. 107–125.
|
1159 |
+
[30] H. Yeo, C. J. Chong, Y. Jung, J. Ye, and D. Han, “Nemo: enabling neural-
|
1160 |
+
enhanced video streaming on commodity mobile devices,” in Proc. of
|
1161 |
+
MobiCom, 2020, pp. 1–14.
|
1162 |
+
[31] H. Yeo, Y. Jung, J. Kim, J. Shin, and D. Han, “Neural adaptive content-
|
1163 |
+
aware internet video delivery,” in Proc. of OSDI 18, 2018, pp. 645–661.
|
1164 |
+
[32] Y. Wang, W. Wang, J. Zhang, J. Jiang, and K. Chen, “Bridging the
|
1165 |
+
edge-cloud barrier for real-time advanced vision analytics,” in Proc. of
|
1166 |
+
HotCloud, 2019.
|
1167 |
+
[33] T. Zhang, A. Chowdhery, P. Bahl, K. Jamieson, and S. Banerjee, “The
|
1168 |
+
design and implementation of a wireless video surveillance system,” in
|
1169 |
+
Proc. of MobiCom, 2015, pp. 426–438.
|
1170 |
+
[34] H. Yeo, S. Do, and D. Han, “How will deep learning change internet
|
1171 |
+
video delivery?” in Proc. of ACM HotNets, 2017, pp. 57–64.
|
1172 |
+
[35] Youtube, “Gebhardt insurance traffic cam round trip bike shop,” https:
|
1173 |
+
//www.youtube.com/watch?v= XBMMTQVj68.
|
1174 |
+
[36] Yoda, “Highway video,” https://yoda.cs.uchicago.edu/videos/highway.
|
1175 |
+
mp4.
|
1176 |
+
[37] J. Zhang, D. Zhang, X. Xu, F. Jia, Y. Liu, X. Liu, J. Ren, and Y. Zhang,
|
1177 |
+
“MobiPose: Real-time multi-person pose estimation on mobile devices,”
|
1178 |
+
in Proc. of SenSys, 2020, pp. 136–149.
|
1179 |
+
[38] R. Xu, C.-l. Zhang, P. Wang, J. Lee, S. Mitra, S. Chaterji, Y. Li,
|
1180 |
+
and S. Bagchi, “ApproxDet: content and contention-aware approximate
|
1181 |
+
object detection for mobiles,” in Proc. of SenSys, 2020, pp. 449–462.
|
1182 |
+
[39] L. Liu, H. Li, and M. Gruteser, “Edge assisted real-time object detection
|
1183 |
+
for mobile augmented reality,” in Proc. of MobiCom, 2019, pp. 1–16.
|
1184 |
+
[40] K. Simonyan and A. Zisserman, “Very deep convolutional networks for
|
1185 |
+
large-scale image recognition,” in Proc. of ICLR, 2015, pp. 602–610.
|
1186 |
+
[41] S. Yan, X. Wang, X. Zheng, Y. Xia, D. Liu, and W. Deng, “ACC:
|
1187 |
+
Automatic ECN tuning for high-speed datacenter networks,” in Proc. of
|
1188 |
+
ACM SIGCOMM, 2021, pp. 384–397.
|
1189 |
+
[42] Google,
|
1190 |
+
“libvpx
|
1191 |
+
official
|
1192 |
+
github
|
1193 |
+
repository,”
|
1194 |
+
https://github.com/
|
1195 |
+
webmproject/libvpx/.
|
1196 |
+
[43] Open Source, “Jm 19.0,” https://iphome.hhi.de/suehring/.
|
1197 |
+
[44] Youtube, “Jackson hole wyoming usa town square live cam,” https://
|
1198 |
+
www.youtube.com/watch?v=1EiC9bvVGnk.
|
1199 |
+
[45] Youtube, “City of auburn toomer’s corner webcam,” https://www.
|
1200 |
+
youtube.com/watch?v=hMYIc5ZPJL4.
|
1201 |
+
[46] Yoda, “Motorway video,” https://yoda.cs.uchicago.edu/videos/motorway.
|
1202 |
+
mp4.
|
1203 |
+
[47] H. Fan, D. Du, L. Wen, P. Zhu, Q. Hu, H. Ling, M. Shah, J. Pan,
|
1204 |
+
A. Schumann, B. Dong et al., “Visdrone-mot2020: The vision meets
|
1205 |
+
drone multiple object tracking challenge results,” in Proc. of ECCV,
|
1206 |
+
2020, pp. 713–727.
|
1207 |
+
[48] M. Cordts, M. Omran, S. Ramos, T. Rehfeld, M. Enzweiler, R. Be-
|
1208 |
+
nenson, U. Franke, S. Roth, and B. Schiele, “The cityscapes dataset
|
1209 |
+
for semantic urban scene understanding,” in Proc. of CVPR, 2016, pp.
|
1210 |
+
3213–3223.
|
1211 |
+
[49] E. Romera, J. M. Alvarez, L. M. Bergasa, and R. Arroyo, “Erfnet: Effi-
|
1212 |
+
cient residual factorized convnet for real-time semantic segmentation,”
|
1213 |
+
IEEE Transactions on Intelligent Transportation Systems, vol. 19, no. 1,
|
1214 |
+
pp. 263–272, 2017.
|
1215 |
+
[50] B. Lim, S. Son, H. Kim, S. Nah, and K. Mu Lee, “Enhanced deep
|
1216 |
+
residual networks for single image super-resolution,” in Proc. of CVPR,
|
1217 |
+
2017, pp. 136–144.
|
1218 |
+
[51] B. Lim, S. Son, H. Kim, S. Nah, and K. M. Lee, “Enhanced deep residual
|
1219 |
+
networks for single image super-resolution,” in Proc. of CVPR, 2017.
|
1220 |
+
[52] J. Redmon and A. Farhadi, “Yolo9000: better, faster, stronger.” in Proc.
|
1221 |
+
of CVPR, 2017.
|
1222 |
+
[53] C. dataset, “highway video,” https://cocodataset.org/.
|
1223 |
+
[54] V. Mnih, A. P. Badia, M. Mirza, A. Graves, T. Lillicrap, T. Harley,
|
1224 |
+
D. Silver, and K. Kavukcuoglu, “Asynchronous methods for deep
|
1225 |
+
reinforcement learning,” in Proc. of ICML, 2016.
|
1226 |
+
[55] T. Haarnoja, A. Zhou, P. Abbeel, and S. Levine, “Soft actor-critic: Off-
|
1227 |
+
policy maximum entropy deep reinforcement learning with a stochastic
|
1228 |
+
actor,” in Proc. of ICML, 2018, pp. 1861–1870.
|
1229 |
+
[56] J. Schulman, F. Wolski, P. Dhariwal, A. Radford, and O. Klimov,
|
1230 |
+
“Proximal policy optimization algorithms,” arXiv:1707.06347, 2017.
|
1231 |
+
[57] G. Ananthanarayanan, P. Bahl, P. Bod´ık, K. Chintalapudi, M. Philipose,
|
1232 |
+
L. Ravindranath, and S. Sinha, “Real-time video analytics: The killer
|
1233 |
+
app for edge computing,” IEEE Computer, vol. 50, no. 10, pp. 58–67,
|
1234 |
+
2017.
|
1235 |
+
[58] J. Jiang, G. Ananthanarayanan, P. Bodik, S. Sen, and I. Stoica,
|
1236 |
+
“Chameleon: scalable adaptation of video analytics,” in Proc. of ACM
|
1237 |
+
SIGCOMM, 2018, pp. 253–266.
|
1238 |
+
[59] S. Jain, X. Zhang, Y. Zhou, G. Ananthanarayanan, J. Jiang, Y. Shu,
|
1239 |
+
V. Bahl, and J. Gonzalez, “Spatula: Efficient cross-camera video analyt-
|
1240 |
+
ics on large camera networks,” in Proc. ACM SEC, 2020, pp. 110–124.
|
1241 |
+
[60] Y. Yuan, W. Wang, Y. Wang, S. S. Adhatarao, B. Ren, K. Zheng, and
|
1242 |
+
X. Fu, “VSiM: Improving QoE fairness for video streaming in mobile
|
1243 |
+
environments,” in Proc. of IEEE INFOCOM, 2022, pp. 1309–1318.
|
1244 |
+
|
1245 |
+
[61] V. Mnih, K. Kavukcuoglu, D. Silver, A. A. Rusu, J. Veness, M. G.
|
1246 |
+
Bellemare, A. Graves, M. Riedmiller, A. K. Fidjeland, G. Ostrovski
|
1247 |
+
et al., “Human-level control through deep reinforcement learning,”
|
1248 |
+
Nature, vol. 518, no. 7540, pp. 529–533, 2015.
|
1249 |
+
[62] R. S. Sutton, D. A. McAllester, S. P. Singh, Y. Mansour et al., “Policy
|
1250 |
+
gradient methods for reinforcement learning with function approxima-
|
1251 |
+
tion.” in Proc. of NIPS, vol. 99, 1999, pp. 1057–1063.
|
1252 |
+
|