jackkuo commited on
Commit
7499db0
·
verified ·
1 Parent(s): f0210e2

Add files using upload-large-folder tool

Browse files
This view is limited to 50 files because it contains too many changes.   See raw diff
Files changed (50) hide show
  1. -NE4T4oBgHgl3EQf3w1M/content/2301.05308v1.pdf +3 -0
  2. -NE4T4oBgHgl3EQf3w1M/vector_store/index.faiss +3 -0
  3. -NE4T4oBgHgl3EQf3w1M/vector_store/index.pkl +3 -0
  4. -dE1T4oBgHgl3EQfUgPr/content/2301.03092v1.pdf +3 -0
  5. -dE1T4oBgHgl3EQfUgPr/vector_store/index.faiss +3 -0
  6. .gitattributes +68 -0
  7. 0dAyT4oBgHgl3EQfbfdc/content/2301.00263v1.pdf +3 -0
  8. 0dAyT4oBgHgl3EQfbfdc/vector_store/index.faiss +3 -0
  9. 0dAyT4oBgHgl3EQfbfdc/vector_store/index.pkl +3 -0
  10. 19FAT4oBgHgl3EQfkR2N/content/tmp_files/2301.08610v1.pdf.txt +1284 -0
  11. 19FAT4oBgHgl3EQfkR2N/content/tmp_files/load_file.txt +0 -0
  12. 1dAzT4oBgHgl3EQfRfuL/content/2301.01217v1.pdf +3 -0
  13. 1dAzT4oBgHgl3EQfRfuL/vector_store/index.faiss +3 -0
  14. 1dAzT4oBgHgl3EQfRfuL/vector_store/index.pkl +3 -0
  15. 29E1T4oBgHgl3EQf5wUG/content/2301.03514v1.pdf +3 -0
  16. 29E1T4oBgHgl3EQf5wUG/vector_store/index.pkl +3 -0
  17. 2dFAT4oBgHgl3EQfDhxB/content/2301.08416v1.pdf +3 -0
  18. 2dFAT4oBgHgl3EQfDhxB/vector_store/index.faiss +3 -0
  19. 2tAzT4oBgHgl3EQf9P4T/content/tmp_files/2301.01915v1.pdf.txt +1992 -0
  20. 2tAzT4oBgHgl3EQf9P4T/content/tmp_files/load_file.txt +0 -0
  21. 2tAzT4oBgHgl3EQffPw3/content/2301.01448v1.pdf +3 -0
  22. 2tAzT4oBgHgl3EQffPw3/vector_store/index.pkl +3 -0
  23. 39AyT4oBgHgl3EQfo_il/vector_store/index.faiss +3 -0
  24. 49FKT4oBgHgl3EQfSC3u/content/tmp_files/2301.11774v1.pdf.txt +1133 -0
  25. 49FKT4oBgHgl3EQfSC3u/content/tmp_files/load_file.txt +0 -0
  26. 4NAzT4oBgHgl3EQfD_rN/content/tmp_files/2301.00987v1.pdf.txt +0 -0
  27. 4NAzT4oBgHgl3EQfD_rN/content/tmp_files/load_file.txt +0 -0
  28. 4dFIT4oBgHgl3EQf6yuB/vector_store/index.faiss +3 -0
  29. 4dFIT4oBgHgl3EQf6yuB/vector_store/index.pkl +3 -0
  30. 6tAzT4oBgHgl3EQfgPwz/content/2301.01464v1.pdf +3 -0
  31. 6tE2T4oBgHgl3EQfkwcv/content/tmp_files/2301.03981v1.pdf.txt +617 -0
  32. 6tE2T4oBgHgl3EQfkwcv/content/tmp_files/load_file.txt +0 -0
  33. 89FJT4oBgHgl3EQfoCxt/content/tmp_files/2301.11594v1.pdf.txt +0 -0
  34. 89FJT4oBgHgl3EQfoCxt/content/tmp_files/load_file.txt +0 -0
  35. 9dE4T4oBgHgl3EQfDQsU/content/2301.04867v1.pdf +3 -0
  36. 9dE4T4oBgHgl3EQfDQsU/vector_store/index.pkl +3 -0
  37. AtE2T4oBgHgl3EQfRQeF/content/2301.03779v1.pdf +3 -0
  38. AtE2T4oBgHgl3EQfRQeF/vector_store/index.faiss +3 -0
  39. AtE2T4oBgHgl3EQfRQeF/vector_store/index.pkl +3 -0
  40. BNE1T4oBgHgl3EQfpQVQ/content/2301.03329v1.pdf +3 -0
  41. BNE1T4oBgHgl3EQfpQVQ/vector_store/index.faiss +3 -0
  42. BtAzT4oBgHgl3EQfwP4g/vector_store/index.pkl +3 -0
  43. CNE3T4oBgHgl3EQfUQpw/content/2301.04449v1.pdf +3 -0
  44. CNE3T4oBgHgl3EQfUQpw/vector_store/index.faiss +3 -0
  45. CtFJT4oBgHgl3EQfAiym/content/2301.11421v1.pdf +3 -0
  46. CtFJT4oBgHgl3EQfAiym/vector_store/index.faiss +3 -0
  47. E9AzT4oBgHgl3EQfiv2Y/content/tmp_files/2301.01505v1.pdf.txt +1036 -0
  48. E9AzT4oBgHgl3EQfiv2Y/content/tmp_files/load_file.txt +0 -0
  49. EtE0T4oBgHgl3EQfgwHQ/vector_store/index.pkl +3 -0
  50. G9FAT4oBgHgl3EQfth4f/content/tmp_files/2301.08664v1.pdf.txt +1252 -0
-NE4T4oBgHgl3EQf3w1M/content/2301.05308v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:cb15380bf1e3a1f8b4416919b9927e7bcb47ccc4dcb9bffe0be81d0de553810b
3
+ size 779413
-NE4T4oBgHgl3EQf3w1M/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:f4cf06bc7a7b29a8407541611429447a83bf44cc1a24c9b6a02750faf8545093
3
+ size 5046317
-NE4T4oBgHgl3EQf3w1M/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:c1b0b8b531133787518bb2e2a7ab8a9d041ae4994a35c9e1de01834d921c76ce
3
+ size 198552
-dE1T4oBgHgl3EQfUgPr/content/2301.03092v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:963ff41fd0c03920ac247feda7e3de266016de0759e6387e397ed24092f0a1c1
3
+ size 2498776
-dE1T4oBgHgl3EQfUgPr/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:7025cfd42d584d682d8af5cc1bc49556918e3d3157010e9a7c7a21eaa300214e
3
+ size 3473453
.gitattributes CHANGED
@@ -8591,3 +8591,71 @@ HdE1T4oBgHgl3EQfXgSr/content/2301.03128v1.pdf filter=lfs diff=lfs merge=lfs -tex
8591
  adFPT4oBgHgl3EQfvjWp/content/2301.13160v1.pdf filter=lfs diff=lfs merge=lfs -text
8592
  UdE0T4oBgHgl3EQf2gJy/content/2301.02713v1.pdf filter=lfs diff=lfs merge=lfs -text
8593
  T9AyT4oBgHgl3EQf8fpt/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
8591
  adFPT4oBgHgl3EQfvjWp/content/2301.13160v1.pdf filter=lfs diff=lfs merge=lfs -text
8592
  UdE0T4oBgHgl3EQf2gJy/content/2301.02713v1.pdf filter=lfs diff=lfs merge=lfs -text
8593
  T9AyT4oBgHgl3EQf8fpt/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8594
+ CtFJT4oBgHgl3EQfAiym/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8595
+ HdE1T4oBgHgl3EQfXgSr/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8596
+ 2dFAT4oBgHgl3EQfDhxB/content/2301.08416v1.pdf filter=lfs diff=lfs merge=lfs -text
8597
+ ZtAzT4oBgHgl3EQfK_te/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8598
+ adFPT4oBgHgl3EQfvjWp/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8599
+ CtFJT4oBgHgl3EQfAiym/content/2301.11421v1.pdf filter=lfs diff=lfs merge=lfs -text
8600
+ CNE3T4oBgHgl3EQfUQpw/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8601
+ PtAzT4oBgHgl3EQfWvyr/content/2301.01307v1.pdf filter=lfs diff=lfs merge=lfs -text
8602
+ 2dFAT4oBgHgl3EQfDhxB/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8603
+ m9AzT4oBgHgl3EQfqP2M/content/2301.01626v1.pdf filter=lfs diff=lfs merge=lfs -text
8604
+ PNE0T4oBgHgl3EQf1AIP/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8605
+ hdAyT4oBgHgl3EQfkPgm/content/2301.00428v1.pdf filter=lfs diff=lfs merge=lfs -text
8606
+ 39AyT4oBgHgl3EQfo_il/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8607
+ wtFPT4oBgHgl3EQfPjQO/content/2301.13038v1.pdf filter=lfs diff=lfs merge=lfs -text
8608
+ 9dE4T4oBgHgl3EQfDQsU/content/2301.04867v1.pdf filter=lfs diff=lfs merge=lfs -text
8609
+ -NE4T4oBgHgl3EQf3w1M/content/2301.05308v1.pdf filter=lfs diff=lfs merge=lfs -text
8610
+ f9A0T4oBgHgl3EQfHv-A/content/2301.02065v1.pdf filter=lfs diff=lfs merge=lfs -text
8611
+ lNE2T4oBgHgl3EQfIwaA/content/2301.03684v1.pdf filter=lfs diff=lfs merge=lfs -text
8612
+ y9FLT4oBgHgl3EQfnS-e/content/2301.12127v1.pdf filter=lfs diff=lfs merge=lfs -text
8613
+ v9E4T4oBgHgl3EQfXQwv/content/2301.05039v1.pdf filter=lfs diff=lfs merge=lfs -text
8614
+ 4dFIT4oBgHgl3EQf6yuB/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8615
+ -dE1T4oBgHgl3EQfUgPr/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8616
+ WNFRT4oBgHgl3EQf9DhY/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8617
+ 0dAyT4oBgHgl3EQfbfdc/content/2301.00263v1.pdf filter=lfs diff=lfs merge=lfs -text
8618
+ 6tAzT4oBgHgl3EQfgPwz/content/2301.01464v1.pdf filter=lfs diff=lfs merge=lfs -text
8619
+ wtFPT4oBgHgl3EQfPjQO/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8620
+ R9E0T4oBgHgl3EQfUgAs/content/2301.02250v1.pdf filter=lfs diff=lfs merge=lfs -text
8621
+ p9AzT4oBgHgl3EQfOvtl/content/2301.01171v1.pdf filter=lfs diff=lfs merge=lfs -text
8622
+ rNFQT4oBgHgl3EQftzab/content/2301.13393v1.pdf filter=lfs diff=lfs merge=lfs -text
8623
+ b9AzT4oBgHgl3EQf2_6M/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8624
+ PtAzT4oBgHgl3EQfWvyr/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8625
+ hdE5T4oBgHgl3EQfFQ6l/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8626
+ 0dAyT4oBgHgl3EQfbfdc/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8627
+ K9FAT4oBgHgl3EQfwR5T/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8628
+ ZtAzT4oBgHgl3EQfK_te/content/2301.01106v1.pdf filter=lfs diff=lfs merge=lfs -text
8629
+ K9AzT4oBgHgl3EQfkP22/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8630
+ NdFOT4oBgHgl3EQf2jRR/content/2301.12942v1.pdf filter=lfs diff=lfs merge=lfs -text
8631
+ fdA0T4oBgHgl3EQfHf_u/content/2301.02063v1.pdf filter=lfs diff=lfs merge=lfs -text
8632
+ 2tAzT4oBgHgl3EQffPw3/content/2301.01448v1.pdf filter=lfs diff=lfs merge=lfs -text
8633
+ K9FAT4oBgHgl3EQfwR5T/content/2301.08680v1.pdf filter=lfs diff=lfs merge=lfs -text
8634
+ 1dAzT4oBgHgl3EQfRfuL/content/2301.01217v1.pdf filter=lfs diff=lfs merge=lfs -text
8635
+ ndAyT4oBgHgl3EQf__rr/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8636
+ fdA0T4oBgHgl3EQfHf_u/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8637
+ V9AzT4oBgHgl3EQfmP0G/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8638
+ 1dAzT4oBgHgl3EQfRfuL/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8639
+ rNFQT4oBgHgl3EQftzab/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8640
+ AtE2T4oBgHgl3EQfRQeF/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8641
+ -dE1T4oBgHgl3EQfUgPr/content/2301.03092v1.pdf filter=lfs diff=lfs merge=lfs -text
8642
+ b9AzT4oBgHgl3EQf2_6M/content/2301.01823v1.pdf filter=lfs diff=lfs merge=lfs -text
8643
+ AtE2T4oBgHgl3EQfRQeF/content/2301.03779v1.pdf filter=lfs diff=lfs merge=lfs -text
8644
+ MdE1T4oBgHgl3EQfZQR8/content/2301.03148v1.pdf filter=lfs diff=lfs merge=lfs -text
8645
+ V9AzT4oBgHgl3EQfmP0G/content/2301.01558v1.pdf filter=lfs diff=lfs merge=lfs -text
8646
+ BNE1T4oBgHgl3EQfpQVQ/content/2301.03329v1.pdf filter=lfs diff=lfs merge=lfs -text
8647
+ nNAzT4oBgHgl3EQfN_vv/content/2301.01160v1.pdf filter=lfs diff=lfs merge=lfs -text
8648
+ a9E4T4oBgHgl3EQfPAy5/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8649
+ -NE4T4oBgHgl3EQf3w1M/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8650
+ WdFIT4oBgHgl3EQfhytq/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8651
+ tNE1T4oBgHgl3EQfjgS9/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8652
+ p9AzT4oBgHgl3EQfOvtl/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8653
+ StE0T4oBgHgl3EQfUwAJ/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8654
+ mtFLT4oBgHgl3EQffC-V/content/2301.12093v1.pdf filter=lfs diff=lfs merge=lfs -text
8655
+ 29E1T4oBgHgl3EQf5wUG/content/2301.03514v1.pdf filter=lfs diff=lfs merge=lfs -text
8656
+ BNE1T4oBgHgl3EQfpQVQ/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8657
+ tNE1T4oBgHgl3EQfjgS9/content/2301.03264v1.pdf filter=lfs diff=lfs merge=lfs -text
8658
+ m9AzT4oBgHgl3EQfqP2M/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8659
+ CNE3T4oBgHgl3EQfUQpw/content/2301.04449v1.pdf filter=lfs diff=lfs merge=lfs -text
8660
+ QNFJT4oBgHgl3EQfJSzf/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8661
+ a9AyT4oBgHgl3EQfiviR/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
0dAyT4oBgHgl3EQfbfdc/content/2301.00263v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:383d104b63d3c704f0d7a1730b5560ad914a6d87b986501fedfa9d25fa348190
3
+ size 212710
0dAyT4oBgHgl3EQfbfdc/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:886c731c1cd7d302dcf5a5f6f276cbb90134c04516ea93377d8cf5bd5af30fb5
3
+ size 2818093
0dAyT4oBgHgl3EQfbfdc/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:e3c8a04fe5dd497b18de5fba25ecb2361cfcb4708379b4f3c58ed77913246e4c
3
+ size 106120
19FAT4oBgHgl3EQfkR2N/content/tmp_files/2301.08610v1.pdf.txt ADDED
@@ -0,0 +1,1284 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Platform for Probing Radiation Transport Properties of Hydrogen at Conditions
2
+ Found in the Deep Interiors of Red Dwarfs
3
+ J. Lütgert,1, 2, 3, ∗ M. Bethkenhagen,4 B. Bachmann,5 L. Divol,5 D. O. Gericke,6 S. H. Glenzer,7
4
+ G. N. Hall,5 N. Izumi,5 S. F. Khan,5 O. L. Landen,5 S. A. MacLaren,5 L. Masse,5, 8
5
+ R. Redmer,1 M. Schörner,1 M. O. Schölmerich,5 S. Schumacher,1 N. R. Shaffer,9
6
+ C. E. Starrett,10 P. A. Sterne,5 C. Trosseille,5 T. Döppner,5 and D. Kraus1, 2, †
7
+ 1Institut für Physik, Universität Rostock, Albert-Einstein-Str. 23, 18059 Rostock, Germany
8
+ 2Helmholtz-Zentrum Dresden-Rossendorf, Bautzner Landstrasse 400, 01328 Dresden, Germany
9
+ 3Institute of Nuclear and Particle Physics, Technische Universität Dresden, 01069 Dresden, Germany
10
+ 4École Normale Supérieure de Lyon, Université Lyon 1,
11
+ Laboratoire de Géologie de Lyon, CNRS UMR 5276, 69364 Lyon Cedex 07, France
12
+ 5Lawrence Livermore National Laboratory, Livermore, CA 94550, USA
13
+ 6Centre for Fusion, Space and Astrophysics, Department of Physics,
14
+ University of Warwick, Coventry CV4 7AL, United Kingdom
15
+ 7SLAC National Accelerator Laboratory, Menlo Park, CA 94309, USA
16
+ 8CEA-DAM, DIF, F-91297 Arpajon, France
17
+ 9Laboratory for Laser Energetics, University of Rochester,
18
+ 250 East River Road, Rochester, NY 14623, USA
19
+ 10Los Alamos National Laboratory, P.O. Box 1663, Los Alamos, NM 87545, USA
20
+ (Dated: January 23, 2023)
21
+ We describe an experimental concept at the National Ignition Facility for specifically tailored
22
+ spherical implosions to compress hydrogen to extreme densities (up to ∼ 800× solid density,
23
+ electron number density ne ∼ 4 × 1025 cm−3) at moderate temperatures (T ∼ 200 eV), i.e., to
24
+ conditions, which are relevant to the interiors of red dwarf stars. The dense plasma will be probed
25
+ by laser-generated x-ray radiation of different photon energy to determine the plasma opacity due
26
+ to collisional (free-free) absorption and Thomson scattering. The obtained results will benchmark
27
+ radiation transport models, which in the case for free-free absorption show strong deviations at
28
+ conditions relevant to red dwarfs. This very first experimental test of free-free opacity models at
29
+ these extreme states will help to constrain where inside those celestial objects energy transport is
30
+ dominated by radiation or convection. Moreover, our study will inform models for other important
31
+ processes in dense plasmas, which are based on electron-ion collisions, e.g., stopping of swift ions or
32
+ electron-ion temperature relaxation.
33
+ I.
34
+ INTRODUCTION
35
+ Red dwarfs (M dwarfs) are the lightest and coolest
36
+ main sequence stars and make up ∼ 70 % of all stars
37
+ in the Sun’s neighborhood. [1, 2] Prominent examples
38
+ are our nearest neighbor Proxima Centauri (0.12 M⊙)
39
+ or TRAPPIST-1 (0.089 M⊙),
40
+ which is only slightly
41
+ larger than Jupiter, but much more massive.
42
+ The
43
+ interiors of red dwarfs mainly consist of hydrogen-
44
+ helium mixtures, which are progressively shaped by
45
+ screening effects, ion-ion correlations, and degeneracy
46
+ as temperature decreases and density increases. [3]
47
+ These many-particle effects are challenging to model, in
48
+ particular, for calculations of radiation transport, which
49
+ plays a major role in modeling of sub-stellar objects and
50
+ stars. From the solar abundance problem, we know that
51
+ ∼ 20 % changes in opacity have paramount impact on
52
+ our understanding of stellar interiors. [4, 5] Whether
53
+ energy can effectively be transported via radiation or,
54
+ if radiation is not sufficient, convection sets in, is a
55
56
57
+ property that is particularly influenced by stellar opacity.
58
+ In general, the physics of red dwarfs is poorly understood
59
+ in comparison with the hotter interior of the Sun, which
60
+ is much closer to the ideal plasma state.
61
+ Figure 1 shows simulated pressure-temperature profiles
62
+ of stars on the main sequence, demonstrating the extreme
63
+ plasma conditions present inside those celestial objects.
64
+ The curves were obtained using the MESA code for
65
+ stellar evolution [6–10] (see the appendix for details on
66
+ these simulations).
67
+ The inset illustrates the schematic
68
+ interiors of stars from the core (m/M = 0) to the
69
+ photosphere (m/M = 1) divided into radiative and
70
+ convective zones for stars with a solar composition of
71
+ elements.
72
+ Red dwarfs are characterized by masses
73
+ between 0.075 and 0.5 solar masses so that their typical
74
+ mass-temperature ratios overall place red dwarfs in a
75
+ regime, where convection dominates the outer regions.
76
+ Depending on the size of the individual object, a more or
77
+ less developed radiative core is present.
78
+ The smallest
79
+ red dwarfs (M
80
+
81
+ 0.2 M⊙) are thought to be fully
82
+ convective.
83
+ In this case, the fusion reactions in the
84
+ core are permanently re-fueled by hydrogen from the
85
+ outer layers. Combined with the low fusion rates due to
86
+ the relatively low core temperatures, convection possibly
87
+ arXiv:2301.08610v1 [physics.plasm-ph] 20 Jan 2023
88
+
89
+ 2
90
+ FIG. 1.
91
+ Pressure-temperature profiles for various celestial
92
+ objects calculated using the MESA package. [6–10] Solid
93
+ lines denote convective regions while dots indicate a layer of
94
+ radiative energy transport. The gray shaded area shows the
95
+ conditions, which we intent to generate in our experiment.
96
+ Inset: Mass coordinate m/M along stellar interior profiles for
97
+ objects with solar composition divided into radiative (white,
98
+ dotted lines) and convective (gray, solid curves) regions over
99
+ total object mass M relative to the Sun’s mass M⊙. The gray-
100
+ scale dataset was published by Kippenhahn et al. [11] while
101
+ the colored lines show the MESA calculations of the main
102
+ figure.
103
+ allows some red dwarfs to last trillions of years until
104
+ all hydrogen fuel is exhausted. However, even a small
105
+ radiative core can strongly change this behavior and
106
+ its existence crucially depends on the effectiveness of
107
+ radiation transport in highly compressed matter.
108
+ Moreover, the internal structure of a star has a
109
+ major impact on the activity of its surface. [12] The
110
+ boundary between a radiative core and a convective
111
+ layer can lead to strong magnetic fields and a turbulent
112
+ atmosphere, [1, 13, 14] including radiative and plasma
113
+ outbursts that may threaten life on nearby planets.
114
+ Therefore, understanding the radiative properties of the
115
+ complex plasmas within a host star is crucial when
116
+ judging the possibility of an exoplanet to host life –
117
+ especially for red dwarfs where the habitable zone is
118
+ thought to be found relatively close to the star itself due
119
+ to the low surface temperature. [15]
120
+ For red dwarf stars, the thermodynamic conditions
121
+ at the boundary between radiative core and convective
122
+ envelope are estimated to be in a pressure regime of few
123
+ Gbars and temperatures of few million Kelvin. [1, 11]
124
+ Corresponding free electron densities are in the range of
125
+ few 1025 cm−3, which results in Fermi energies of similar
126
+ order as the thermal energy of the free electrons. The
127
+ energy transport in this so-called warm dense matter
128
+ regime [16] is extremely difficult to calculate, which gives
129
+ rise to significant uncertainties in modeling the energy
130
+ transport inside red dwarfs.
131
+ II.
132
+ THEORY
133
+ For stellar interiors, the radiative opacity κrad is
134
+ usually divided into three contributions: [17]
135
+ κrad = κbf + κff + κT ,
136
+ (1)
137
+ where κbf is the opacity contribution by bound-free
138
+ absorption, κff denotes the free-free contribution and
139
+ κT = ZσT /mi the absorption due to Thomson scattering
140
+ from free electrons, which is solely dependent on the
141
+ Thomson scattering transport cross section σT , [18, 19]
142
+ the average ion charge state Z and the average ion mass
143
+ mi of the plasma. While Rayleigh scattering might be of
144
+ interest for the atmosphere of K and M class stars, [20]
145
+ the high ionization in hotter photospheres and deep
146
+ within even the smallest stars often justifies to neglect its
147
+ contribution to κrad. For the solar abundance problem,
148
+ the bound-free opacity of metals is probably most
149
+ relevant, but deep in the solar radiation zone as well as for
150
+ many red dwarfs, particularly those with low metallicity,
151
+ hydrogen free-free opacity, i.e., absorption due to inverse
152
+ bremsstrahlung, is the dominant absorption mechanism
153
+ of radiation. [17] For these red dwarfs, the absolute values
154
+ for free-free absorption determine where convection
155
+ or radiation will be the dominant energy transport
156
+ mechanism.
157
+ Figure 2 shows a density-temperature diagram of
158
+ dominating
159
+ absorption
160
+ mechanisms
161
+ thought
162
+ to
163
+ be
164
+ present for the composition of population I stars in
165
+ comparison with red dwarf interiors and the Sun. While
166
+ bound-free transitions dominate at low densities and
167
+ temperatures, free-free absorption starts to outrun the
168
+ bound-free opacity with the increase in density due to
169
+ increasing electron-ion collision rates as well as pressure
170
+ ionization of heavier elements. [21] At the highest
171
+ densities, conduction by degenerate electrons becomes
172
+ more efficient than radiation transport, whereas for low
173
+ densities and highest temperatures, photon scattering
174
+ from electrons (Thomson or Compton, depending on
175
+ photon energy) is most significant.
176
+ A.
177
+ Analytical models
178
+ A classical
179
+ treatment of
180
+ the spectral absorption
181
+ coefficient due to inverse bremsstrahlung, derived from
182
+ the description of electron-ion collisions in a weakly
183
+ coupled plasma environment, yields for the absorption
184
+ coefficient αff, [22]
185
+ αff(ν) = ρκff(ν) ∝ Z2neni
186
+ ν3√
187
+ T
188
+
189
+ 1 − exp
190
+
191
+ − hν
192
+ kBT
193
+ ��
194
+ gff(ν, T),
195
+ (2)
196
+
197
+ .3
198
+ FIG. 2.
199
+ Dominating opacities in different regimes of the
200
+ density-temperature diagram for a composition of elements as
201
+ in population I stars. [17] The colored lines show densities and
202
+ temperatures realized within main-sequence stars according
203
+ to the “MESA” stellar evolution code [6–10] with solid lines
204
+ representing convective layers. The proposed experiments will
205
+ probe conditions similar to the interiors of red dwarf stars
206
+ where free-free absorption is expected to dominate (indicated
207
+ by the shaded region).
208
+ where ν denotes the x-ray frequency, ρ is the mass
209
+ density, Z is the average degree of ionization, ne is
210
+ the free electron number density, ni is the ion number
211
+ density, T is the plasma temperature, h is Planck’s
212
+ constant, and kB is Boltzmann’s constant.
213
+ Additional
214
+ corrections due to quantum and correlation effects are
215
+ accounted for in a frequency-dependent correction factor
216
+ gff(ν, T), the so-called Gaunt factor. [23] For a weakly
217
+ coupled ideal plasma, the Gaunt factor can be interpreted
218
+ as the logarithm of the ratio of maximum impact
219
+ parameter bmax and minimum impact parameter bmin
220
+ in the corresponding electron-ion collision (the so-called
221
+ Coulomb logarithm [24]):
222
+ gff(ν, T) =
223
+
224
+ 3
225
+ π ln
226
+ �bmax
227
+ bmin
228
+
229
+ .
230
+ (3)
231
+ This formalism is equivalent to the classical treatment
232
+ of several other important plasma effects that involve
233
+ Coulomb collisions of electrons and ions, e.g., stopping
234
+ power of ions or electron-ion temperature equilibration
235
+ in dense plasmas. [25] The maximum impact parameter
236
+ bmax is usually given by min(ve/2πν, λs) where ve is the
237
+ average velocity of the electrons, ν is the x-ray frequency,
238
+ and λs is the screening length due to the surrounding
239
+ plasma. On the other hand, bmin can be expressed as
240
+ max(b⊥, λth), where b⊥ = Ze2/(4πϵ0mev2
241
+ e) is the impact
242
+ parameter for an electron being deflected perpendicular
243
+ to its direction of incidence and λth denotes the thermal
244
+ de Broglie wavelength of the electrons.
245
+ However, for conditions relevant to the interiors of
246
+ red dwarfs [e.g., ne ∼ few 1025 cm−3, Te ∼ few 100 eV
247
+ (Ref. [3])], we find ve/2πν
248
+ <
249
+ λth, i.e., a negative
250
+ Coulomb logarithm for x-ray frequencies larger than the
251
+ plasma frequency. Thus, this simple classical treatment
252
+ assuming a weakly coupled plasma is not appropriate
253
+ for
254
+ such
255
+ conditions.
256
+ Indeed,
257
+ more
258
+ sophisticated
259
+ approaches have been developed to accommodate these
260
+ conditions. [26, 27]
261
+ B.
262
+ Average Atom and Density Functional Theory
263
+ calculations
264
+ Figure 3 shows Average Atom calculations with a
265
+ Mean Force potential (AA-MF) [28] and state-of-the-
266
+ art Density Functional Theory Molecular Dynamics
267
+ (DFT-MD) simulations [29] compared to the analytical
268
+ model for the free-free opacity with constant Gaunt
269
+ factor and calculations by van Hoof et al. [30, 31]
270
+ The
271
+ first
272
+ two
273
+ simulation
274
+ methods
275
+ have
276
+ previously
277
+ been applied successfully for calculating the equation-
278
+ of-state
279
+ (EOS)
280
+ and
281
+ transport
282
+ properties
283
+ of
284
+ dense
285
+ plasmas. [28, 32–34] The DFT-MD simulations were
286
+ performed
287
+ with
288
+ up
289
+ to
290
+ 256
291
+ hydrogen
292
+ atoms
293
+ using
294
+ the program package VASP. [35–38] Our considered
295
+ density range spans 20 −150 g cm−3 at 100, 150, and
296
+ 200 eV. The simulations use the Baldereschi mean value
297
+ point [39] and the Coulomb potential with an energy
298
+ cutoff of 10 000 eV.
299
+ Each DFT-MD point was run for
300
+ 20 000 time steps with a time step size between 3 as
301
+ (attoseconds) and 8 as depending on the thermodynamic
302
+ conditions.
303
+ The temperature was controlled with
304
+ a Nosé-Hoover thermostat. [40] Subsequently,
305
+ 10 –
306
+ 20 snapshots were selected from each trajectory to
307
+ calculate the electrical conductivity and opacity applying
308
+ the
309
+ Kubo-Greenwood
310
+ formalism
311
+ [41,
312
+ 42]
313
+ and
314
+ the
315
+ Kramers-Kronig relation.
316
+ For details on the AA-
317
+ MF calculations (which were performed for identical
318
+ temperatures
319
+ and
320
+ pressures),
321
+ we
322
+ refer
323
+ to
324
+ previous
325
+ publications. [28, 43–46]
326
+ While the DFT-MD simulation naturally includes
327
+ many-body effects in the description of wavefunctions
328
+ and the density of states due to the multiple ions included
329
+ in the simulation, the AA-MF approach, which is strictly
330
+ speaking also DFT-based, simplifies the calculation by
331
+ exclusively relying on the atom-in-jellium model. Either
332
+ of the two formulations calculates opacity from the real
333
+ part of the electrical conductivity.
334
+ Both approaches
335
+ agree on the quantity of extinction remarkably well,
336
+ supporting each other.
337
+ This result is particularly
338
+ noteworthy as the similarity of the AA-MF calculation
339
+ with DFT-MD – for the specific case of hydrogen –
340
+ is highly desired:
341
+ While DFT-MD is generally more
342
+ accurate, AA-MF is computationally significantly less
343
+ expensive and should be favored if benchmarks can
344
+ show good agreement between the two methods.
345
+ At
346
+ the same time, the consistency of the computed opacity
347
+ illustrates impressively that extreme states of matter
348
+ can be treated by DFT-MD nowadays with the increase
349
+
350
+ :4
351
+ FIG. 3. Opacity for a (25 %/75 %) HT mixture at an electron
352
+ density ne = 5 × 1025 cm−3 and a temperature of T
353
+ =
354
+ 100 eV (solid and dotted lines) or T
355
+ = 150 eV (dashed),
356
+ respectively, according to different models.
357
+ The blue and
358
+ purple lines depict DFT-MD and AA-MF calculations. The
359
+ other solid curves show the analytical model for free-free
360
+ extinction [Eq. (2)] with a Gaunt factor equal to unity
361
+ (black line) or values calculated by van Hoof et al. [30, 31]
362
+ (red). For comparison, the opacity due to Thomson scattering
363
+ for a temperature of T = 100 eV is shown as the dotted
364
+ black line.
365
+ The AA-MF calculation at 150 eV and the
366
+ inset depicting the relative difference between the two results
367
+ [∆κAA = 2(κ150 eV
368
+ AA
369
+ − κ100 eV
370
+ AA
371
+ )/(κ150 eV
372
+ AA
373
+ + κ100 eV
374
+ AA
375
+ )] show that
376
+ the temperature influence is very small for photon energies
377
+ above 3 keV due to the degenerate conditions.
378
+ in computational power and, hence, number of energy
379
+ bands included in the calculation.
380
+ Both methods show a discrepancy to the calculation
381
+ of the free-free opacity from the semi-classical formula
382
+ [Eq. (2)], as it can be seen in Fig. 3.
383
+ The simplest
384
+ approach of setting the Gaunt factor to unity reproduces
385
+ the classical result of Kramers. [22] Introducing quantum-
386
+ mechanical corrections, van Hoof et al. [30, 31] provide
387
+ easily applicable, tabulated values for gff by following
388
+ the seminal work of Karzas and Latter. [47] However, this
389
+ calculation is requiring more assumptions than the AA-
390
+ MF or the DFT-MD model, e.g., the velocity distribution
391
+ of the electrons (with is assumed to be Maxwellian) in
392
+ order to calculate thermally averaged free-free Gaunt
393
+ factors and from these opacities. [30, 31] Other authors
394
+ perform similar calculations but integrate over the Fermi
395
+ distribution of a degenerate electron gas. [24]
396
+ In fact, for dense plasma conditions comparable to
397
+ the interiors of main sequence stars, even advanced
398
+ calculations of the Gaunt factor vary by more than 50 %
399
+ for frequencies larger than the plasma frequency. [27] In
400
+ particular, the specific treatment of dynamic screening,
401
+ strong collisions, and re-normalization due to higher
402
+ moments can make a significant difference in comparison
403
+ to widely-used Born approximation treatments of the
404
+ Gaunt factor. [27] Deviations are particularly significant
405
+ in the photon energy regime from ∼ 500 eV to few keV,
406
+ which is the dominant contribution when calculating the
407
+ Rosseland mean opacity for the Sun and smaller stars.
408
+ Indeed, varying the opacity by 50 % can change the radii
409
+ of the boundaries between convection and radiation zone
410
+ by up to 10 %, which, given the underlying density and
411
+ temperature gradients, would significantly impact our
412
+ general understanding of stars. [5, 48]
413
+ III.
414
+ EXPERIMENTAL CONCEPT
415
+ Using the largest laser system in the world, namely, the
416
+ National Ignition Facility (NIF) at Lawrence Livermore
417
+ National Laboratory, [49] it is now possible to create
418
+ and probe matter states relevant to stellar interiors in
419
+ the laboratory. [50, 51] To address the questions raised
420
+ above, we have developed a concept to leverage NIF’s
421
+ unique capabilities to create relevant conditions and
422
+ obtain a very first test of free-free opacity models in
423
+ this very important plasma regime via x-ray absorption
424
+ measurements of highly compressed hydrogen during
425
+ the stagnation phase of layered capsule implosions. In
426
+ this way, not only the various existing models and
427
+ resulting tables for the Gaunt factor will be tested, but
428
+ also modern DFT-MD and AA-MF simulations, which
429
+ provide the absorption coefficient, can be benchmarked.
430
+ Finally, due to the equivalent physics involved (electron-
431
+ ion collisions in dense plasma environments [26]), our
432
+ results on free-free absorption will inform models for
433
+ swift ion stopping in warm dense matter as well as
434
+ corresponding electron-ion equilibration times.
435
+ A.
436
+ Experimental setup
437
+ A sketch of the experimental setup is shown in Fig. 4.
438
+ We will use 184 out of the 192 NIF laser beams to heat
439
+ a gold Hohlraum creating a quasi-thermal radiation field
440
+ that implodes a layered fuel capsule at the center of the
441
+ Hohlraum.
442
+ The capsule is comprised of a 57 µm thick
443
+ beryllium ablator shell, containing a 83 µm thick layer of
444
+ cryogenic solid hydrogen.
445
+ The temporally shaped radiation field created by the
446
+ laser drive will ablate the Be shell and, hence, accelerate
447
+ the payload inward.
448
+ Upon stagnation, a high density
449
+ hydrogen layer with ρ > 100 g cm−3 is formed while most
450
+ of the Be ablator has been ablated.
451
+ The
452
+ implosion
453
+ design
454
+ is
455
+ derived
456
+ from
457
+ inertial
458
+ confinement fusion (ICF) implosions at the NIF [54]
459
+ and applies a well-tested model that matched a variety
460
+ of spherical DT implosion experiments in NIF’s ICF
461
+
462
+ 5
463
+ FIG. 4. Schematic of the experimental setup. Using NIF’s
464
+ laser beams, a nearly Planckian x-ray bath (see bottom right)
465
+ is created by heating a gold Hohlraum with a fuel capsule
466
+ at its center. Upon stagnation, the solid hydrogen layer is
467
+ compressed to mass densities larger than 100 g cm−3.
468
+ Two
469
+ Hohlraum windows allow for measuring the transmission of
470
+ high density hydrogen using x rays created in a stagnating
471
+ plasma inside the backlighter tube. Fielding NIF’s Crystal
472
+ Backlighter Imager [52] and the single line-of-sight (SLOS)
473
+ detector [53] enables us to acquire narrow bandwidth high-
474
+ resolution radiography images of the implosion.
475
+ program. [54, 55] In contrast to ICF implosions aiming for
476
+ high neutron yield,[56] the peak radiation temperature
477
+ of our Hohlraum drive (Trad = 170 eV) is significantly
478
+ reduced, deliberately slowing down the implosion to ∼
479
+ 200 km s−1 with the goal of creating extreme densities
480
+ (∼ 150 g cm−3) at moderate temperatures (∼ 200 eV)
481
+ while reducing x-ray and neutron-related background
482
+ signals near stagnation that would affect the radiography
483
+ measurement. These conditions are directly relevant to
484
+ the interiors of red dwarfs.
485
+ The dense plasma states will be probed by x-ray line
486
+ emission, which is created by the eight remaining NIF
487
+ beams that heat a backlighter tube.
488
+ We will perform
489
+ 2D-imaging radiography of the implosion and stagnation
490
+ phase using two different photon energies by varying
491
+ the backlighter tube material. Vanadium will result in
492
+ 5.2 keV line emission from 1s2p→1s2 (He-α) transitions
493
+ of helium-like ions. In the same way, helium-like cobalt
494
+ ions will produce 7.2 keV photons.
495
+ NIF’s Crystal Backlighter Imager (CBI) system [52]
496
+ will allow for high-resolution, nearly monochromatic
497
+ radiography images of the imploding and stagnating
498
+ sphere. A gated single-line-of-sight (SLOS) detector [53]
499
+ will provide four images per implosion with a time delay
500
+ of ∼ 100 ps between consecutive images.
501
+ From the
502
+ radiography images, we will infer radial profiles of the
503
+ opacity through Abel inversion [57, 58] and forward
504
+ fitting methods.
505
+ FIG.
506
+ 5.
507
+ (a)
508
+ 1D
509
+ radiation-hydrodynamics
510
+ simulations
511
+ performed using the HYDRA code, [59] showing the mass
512
+ density ρ at a given radius r and time t.
513
+ Our experiment
514
+ intends
515
+ to
516
+ probe
517
+ around
518
+ stagnation
519
+ when
520
+ the
521
+ highest
522
+ fuel compression is predicted.
523
+ Density, temperature, and
524
+ ionization profiles around this time (∼ 11.5 ns after the start
525
+ of the drive laser) are plotted in (b) and predict hydrogen
526
+ mass densities in excess of 150 g cm−3 in the HT mixture with
527
+ a molar mass of 2.5 g mol−1.
528
+ B.
529
+ Radiation hydrodynamic simulations
530
+ The reduced implosion velocity minimizes the hot
531
+ spot x-ray emission at stagnation to improve the signal-
532
+ to-noise ratio of the physics measurements.
533
+ For the
534
+ same reason, we use a (25 %/75 %) HT mixture (which
535
+ is hydrodynamically equivalent to 50 %/50 % DT) for
536
+ the ice layer to minimize the neutron yield and the
537
+ related background signals.
538
+ Tritium is required to
539
+ enable the hydrogen ice layer formation through beta
540
+ layering, where self-heating from beta decay leads to
541
+ a redistribution of HT ice with time. [60–62] Figure 5
542
+ shows an overview of the ∼ 11 ns implosion trajectory
543
+ simulated with HYDRA-1D. [59] Compared to previous
544
+ ICF experiments with Be shells, [54] the ablator thickness
545
+ is reduced to 57 µm to decrease the remaining ablator
546
+ mass to near zero, which will maximize the radiography
547
+ contrast of the hydrogen layer.
548
+ Figure 5(b) illustrates
549
+ examples of radial density, ionization, and temperature
550
+ profiles predicted by hydrodynamic simulations.
551
+ The
552
+ high-density portion of the profiles consists of hydrogen
553
+ (HT) only.
554
+ Our simulations predict that the material
555
+ is compressed to mass densities exceeding 150 g cm−3,
556
+ which corresponds to electron densities of 3.6×1025 cm−3,
557
+
558
+ 6
559
+ FIG. 6. Beryllium content of the capsule close to stagnation
560
+ as a function of time t and radius r. The dash-dotted dark
561
+ line shows the interface of ablator and fuel for a simulation
562
+ without mixing. The dashed lines depict contours of constant
563
+ density in the highly compressed HT. For the times we intend
564
+ to probe (around −0.4 ns to −0.2 ns), the Be is not predicted
565
+ to contaminate this dense part of the fuel. The values on the
566
+ abscissa are given relative to the time where the rebounding
567
+ shock wave coincides with the fuel-ablator interface.
568
+ at a temperature of ∼ 200 eV. These parameters result in
569
+ Fermi energies of ∼ 400 eV and, thus, ∼ 2× larger than
570
+ the thermal energies. Hence, we will probe degenerate
571
+ plasma conditions as expected in the interiors of red
572
+ dwarf stars. In addition, these conditions are expected
573
+ to limit the influence of temperature on the free-free
574
+ absorption, since the 1/
575
+
576
+ T term in the expression for
577
+ the inverse bremsstrahlung [Eq. (2)] can be replaced
578
+ approximately by 1/√TF , where TF denotes the Fermi
579
+ temperature. This behavior is supported by the results
580
+ from DFT-MD and the Average Atom Compared to
581
+ previous ICF experiments with Be shells, [54] the ablator
582
+ thickness is reduced to 57 µm to decrease the remaining
583
+ ablator mass to near zero, model, which indicates that
584
+ the opacity is more sensitive to the Fermi temperature
585
+ than the electronic temperature under dense degenerate
586
+ plasma conditions (see Fig. 3 and inset).
587
+ The weak
588
+ dependence on T is highly beneficial for the analysis and
589
+ interpretation of our data, as we can determine opacity
590
+ and from there infer density, while a direct measurement
591
+ of temperature would require additional diagnostics – for
592
+ example x-ray Thomson scattering. [63]
593
+ Reducing the ablator shell thickness and decreasing
594
+ the remaining mass at stagnation might come with
595
+ increased
596
+ risk
597
+ of
598
+ hydrodynamic
599
+ instability
600
+ at
601
+ the
602
+ ablator-ice interface and ablator material mixing into
603
+ the compressed ice layer.
604
+ For a more quantitative
605
+ estimate of mixing, we have performed 1D capsule-only
606
+ simulations using a buoyancy-drag mix model, [64] which
607
+ was successful in explaining experimental performance
608
+ observations of previous layered Be implosions. [54] In
609
+ addition, more recently the buoyancy-drag mix model has
610
+ been calibrated in a focused series of experiments using a
611
+ thin ice layer of varying thickness and detecting neutronic
612
+ signatures of deuterated plastic, originally located near
613
+ the inside of a plastic shell, mixing through the ice
614
+ layer into the hot spot. [65] Figure 6 shows the results
615
+ for our significantly slower implosion design in terms of
616
+ atomic Be fraction as function of radius and time. The
617
+ demarcation line between the Be ablator and the HT ice
618
+ is indicated as a dot-dashed line. We have labeled the
619
+ time of minimum radius of this interface by tmin, which
620
+ coincides with the time when the rebounding shock wave,
621
+ which leads to the formation of the high-compression
622
+ HT ice, passes this interface.
623
+ Our simulations clearly
624
+ show that Be does not mix into the high-compression
625
+ HT ice layer. The radiography measurements are aimed
626
+ to record transmission images between 400 and 200 ps
627
+ before tmin, which, hence, is not affected by Be mixing
628
+ into the high compression HT ice layer.
629
+ IV.
630
+ SIMULATED RADIOGRAPHY SIGNAL
631
+ Synthetic radiography images (see Fig. 7 and the
632
+ appendix for more details) show a clear limb feature at
633
+ the boundary of the central hydrogen and the beryllium
634
+ layer. Applying mass conservation, this feature will be
635
+ used as constraint for the density of the encapsulated
636
+ hydrogen at smaller radii as the total initial fuel mass can
637
+ be accurately characterized. Toward the outer edges of
638
+ the radiography field-of-view of 600×600 µm2, we expect
639
+ the plasma to become fully transmissive to the probe
640
+ radiation, which will be used to normalize the opacities
641
+ measured at smaller radii and obtain absolute values of
642
+ the radial absorption coefficient.
643
+ In the investigated density and temperature regime,
644
+ opacity due to Thomson scattering is expected to reach
645
+ similar values as free-free absorption. As absorption due
646
+ to Thomson scattering scales linearly with ne and free-
647
+ free opacity with n2
648
+ e, this effect can become particularly
649
+ significant in the lower density regions of the imploded
650
+ capsule.
651
+ To disentangle both mechanisms, we will
652
+ perform the absorption measurements at two photon
653
+ energies (5.2 keV and 7.2 keV as described above). While
654
+ disagreeing in the actual magnitude, all but the classical
655
+ approach (gff = 1) presented in Fig. 3 find the same
656
+ proportionality of the free-free opacity with ∼ 1/(hν)(7/2)
657
+ for high photon energies hν. Classically, the Thomson
658
+ cross-section is in fist order independent of probing
659
+ frequency and temperature, which would allow us to
660
+ separate the two contributions to the signal. While this
661
+ assumption might give a reasonable first estimate, our
662
+ AA-MF simulations (see Fig. 3) indicate in accordance
663
+ with previous calculations by Boercker [18] that this
664
+ description as a constant is not applicable at the extreme
665
+ conditions we intend to probe.
666
+ However, models of
667
+ the Thomson scattering have to provide only the ratio
668
+ between the cross-section at the two backlighter energies
669
+
670
+ 7
671
+ FIG. 7.
672
+ (a) Simulated detector image including free-free
673
+ (AA-MF calculations) and bound-free [66] absorption as well
674
+ as Thomson scattering [18] for 5.2 keV (top) and 7.2 keV
675
+ (bottom) backlighter energy.
676
+ The colorbar indicates the
677
+ expected number of photons per pixel.
678
+ Albeit the limited
679
+ temporal and spatial resolution of the detector, the interface
680
+ between the HT mixture and the beryllium ablator is
681
+ predicted to be visible at least for the lower energy.
682
+ (c)
683
+ Absorption coefficient profiles and (b) integrated total capsule
684
+ transmission T for a 5.2 keV backlighter close to the time
685
+ where the highest density in the hydrogen is reached. As the
686
+ lower figure shows, different models for the free-free opacity
687
+ result in notable changes of the total transmission.
688
+ All
689
+ presented plots assume a perfectly symmetrical implosion, no
690
+ mixing between fuel and ablator and a beryllium layer without
691
+ impurities.
692
+ to enable us to differentiate the former from inverse
693
+ bremsstrahlung.
694
+ Regardless of the model applied, the
695
+ Thomson scattering’s contribution to the overall opacity
696
+ might also be used as an additional density constraint
697
+ next to measuring the ablator-hydrogen interface and
698
+ applying mass conservation.
699
+ Further constraints on the implosion parameters will
700
+ be deduced from measuring multiple absorption images
701
+ at different times during the implosion in one shot. The
702
+ stagnation phase is usually well modeled by a self-similar
703
+ description of the conservation laws, [67] which only
704
+ allows certain shapes and time evolutions of the density
705
+ profiles.
706
+ V.
707
+ CONCLUSIONS
708
+ In summary, we presented a concept to leverage
709
+ NIF’s unique capabilities to investigate the deep interiors
710
+ of red dwarf stars in the laboratory and shed light
711
+ on their internal energy transports mechanisms.
712
+ The
713
+ proposed experiment has been accepted within NIF’s
714
+ Discovery Science Program for upcoming shot days in
715
+ 2022 and 2023.
716
+ The resulting measurement of free-
717
+ free absorption and opacity will provide a benchmark
718
+ for numerical and analytical approaches, which will in
719
+ turn yield an improved description of the Gaunt factor.
720
+ Finally, interior structure models for massive hydrogen-
721
+ rich astrophysical objects, such as red dwarfs, can be
722
+ revisited on the basis of the new opacity constraint.
723
+ ACKNOWLEDGMENTS
724
+ M.B.
725
+ was
726
+ supported
727
+ by
728
+ the
729
+ European
730
+ Horizon
731
+ 2020 programme within the Marie Skłodowska-Curie
732
+ actions (xICE grant number 894725).
733
+ J.L. and D.K.
734
+ acknowledge support by the Helmholtz Association
735
+ under VH-NG-1141 and by GSI Helmholtzzentrum
736
+ für Schwerionenforschung, Darmstadt as part of the
737
+ R&D project SI-URDK2224 with the University of
738
+ Rostock.
739
+ The work of S.S. and D.K. was supported
740
+ by Deutsche Forschungsgemeinschaft (DFG – German
741
+ Research Foundation) project no. 495324226. The work
742
+ of B.B., L.D., G.N.H., S.F.K., N.I., O.L.L., S.A.M,
743
+ L.M., M.O.S., P.A.S. and T.D. was performed under the
744
+ auspices of the DOE by Lawrence Livermore National
745
+ Laboratory under Contract No. DE-AC52-07NA27344.
746
+ R.R. and M.S. acknowledge support from the DFG via
747
+ the Research Unit FOR 2440. The DFT-MD calculations
748
+ were performed at the North-German Supercomputing
749
+ Alliance (HLRN) facilities and at the IT- and Media
750
+ Center of the University of Rostock.
751
+ AUTHOR DECLARATIONS
752
+ Conflict of interest
753
+ The authors have no conflicts of interest.
754
+
755
+ 8
756
+ DATA AVAILABILITY
757
+ The data that support the findings of this study
758
+ are available from the corresponding authors upon
759
+ reasonable request.
760
+ Appendix A: MESA Simulations
761
+ Profiles of temperature, density, and pressure inside
762
+ stars with various masses were calculated using the
763
+ “Modules for Experiments in Stellar Astrophysics” code
764
+ (MESA, release r15140). [6–10] We used the default
765
+ MESA equation-of-state (EOS) which is a blend of
766
+ the OPAL, [68] SCVH, [69] FreeEOS, [70] HELM, [71]
767
+ and PC [72] EOSes.
768
+ Radiative opacities are primarily
769
+ from OPAL, [73, 74] with low-temperature data from
770
+ Ferguson et al. [75] and the high-temperature, Compton-
771
+ scattering dominated regime by Buchler and Yueh. [76]
772
+ Electron conduction opacities are from Cassisi et al.. [77]
773
+ Nuclear reaction rates are from JINA REACLIB [78]
774
+ plus additional tabulated weak reaction rates. [79–81]
775
+ Screening is included via the prescription of Chugunov
776
+ et al.. [82] Thermal neutrino loss rates are from Itoh et
777
+ al.. [83]
778
+ A pre-main-sequence model has been calculated from
779
+ initial parameters of helium mass fraction Yi = 0.2744,
780
+ metallicity Zi
781
+ = 1 − Xi − Yi
782
+ = 0.01913 (with Xi
783
+ being the initial mass fraction of hydrogen), mixing
784
+ length parameter αMLT = 1.9179, and including element
785
+ diffusion, which has been found to reproduce the solar
786
+ model well. [6] The ratio of elements heavier than helium
787
+ was taken from Grevesse and Sauval. [84] The time span
788
+ of the simulation was chosen so that the star spent a
789
+ considerable amount of time on the main sequence. For
790
+ stars smaller than the Sun, 10 times the age of the star
791
+ when the main sequence was entered has been chosen;
792
+ masses M > M⊙ were evolved until tnuc/2 was reached,
793
+ were tnuc = (M/M⊙)−2.9 ×1010 a is an approximation for
794
+ the lifetime of star on the main sequence. [85]
795
+ The decision whether regions of a star were considered
796
+ convective or radiative was based on the Schwarzschild
797
+ criterion.
798
+ Appendix B: Comparing radiative and conductive
799
+ opacities
800
+ The relation between thermal conductivity through
801
+ photon transport (radiation) λrad and the opacity κrad
802
+ is given by
803
+ λrad = 4acT 3
804
+ 3ρκrad
805
+ (B1)
806
+ where T is the temperature, ρ is the density, a = 7.5657×
807
+ 10−16 Jm−3K−4 is the radiation density constant, and c is
808
+ the speed of light. [17, 85] Eq. (B1) can be used to define
809
+ a conductive opacity κc from the thermal conductivity
810
+ due to electrons λc by analogy.
811
+ This quantity – as
812
+ calculated by Hayashi et al.
813
+ who reproduce the work
814
+ of Mestel [86] and Lee [87] – has been plotted in Fig. 2
815
+ to compare it with radiative opacities.
816
+ As
817
+ the
818
+ two
819
+ contributions
820
+ to
821
+ the
822
+ full
823
+ thermal
824
+ conductivity are additive, the total opacity κtot is given
825
+ by 1/κtot = 1/κrad + 1/κc, i.e., in order for κc being the
826
+ dominant contribution to the total opacity (see the high
827
+ density and low temperature corner of Fig. 2), the former
828
+ quantity has to be small compared to κrad. [85]
829
+ Appendix C: Radiography predictions
830
+ In order to generate the transmission profiles [see
831
+ Fig. 7 (b)] from extinction coefficient line-outs [Fig. 7 (c)],
832
+ we assumed a perfect, spherically symmetric implosion
833
+ and a uniform and monochromatic backlighter emitting
834
+ parallel x rays. We calculated
835
+ Tν = exp
836
+
837
+
838
+
839
+ dxκν(x)ρ(x)
840
+
841
+ (C1)
842
+ where the integral runs over the path of the light
843
+ and might, therefore, probe different temperature and
844
+ density conditions. To account for the limited temporal
845
+ resolution of the detector, a series of one-dimensional
846
+ transmission profiles at different times was convolved
847
+ with a Gaussian gate-function (35 ps FWHM). The
848
+ resulting line-out has been rotated,
849
+ and a spatial
850
+ blur in the form of a two-dimensional Gaussian with
851
+ 10 µm FWHM in both directions was applied before
852
+ the transmission has been multiplied with the expected
853
+ backlighter photon flux (240 µm−2 ps−1 (Eph = 5.2 keV)
854
+ or 288 µm−2 ps−1 (Eph
855
+ =
856
+ 7.2 keV) at the target’s
857
+ position), corrected for attenuators shielding various
858
+ components and re-binned to the pixel-size of the
859
+ detector.
860
+ In a last step, noise proportional to the
861
+ individual pixels’ intensity has been applied to the data.
862
+ [1] I. N. Reid and S. L. Hawley, New Light on Dark Stars
863
+ (Springer Berlin-Heidelberg, 2005).
864
+ [2] M. J. Heath, L. R. Doyle, M. M. Joshi,
865
+ and R. M.
866
+ Haberle, Origins of Life and Evolution of the Biosphere
867
+
868
+ 9
869
+ 29, 405 (1999).
870
+ [3] D. E. Osterbrock, Astrophysical Journal 118, 529 (1953).
871
+ [4] J. E. Bailey, T. Nagayama, G. P. Loisel, G. A. Rochau,
872
+ C. Blancard, J. Colgan, P. Cosse, G. Faussurier, C. J.
873
+ Fontes, F. Gilleron, I. Golovkin, S. B. Hansen, C. A.
874
+ Iglesias, D. P. Kilcrease, J. J. MacFarlane, R. C. Mancini,
875
+ S. N. Nahar, C. Orban, J. C. Pain, A. K. Pradhan,
876
+ M. Sherrill, and B. G. Wilson, Nature 517, 56 (2015).
877
+ [5] N. Vinyoles, A. M. Serenelli, F. L. Villante, S. Basu,
878
+ J. Bergström,
879
+ M. C. Gonzalez-Garcia,
880
+ M. Maltoni,
881
+ C. Peña Garay, and N. Song, Astrophysical Journal 835,
882
+ 202 (2017).
883
+ [6] B. Paxton, L. Bildsten, A. Dotter, F. Herwig, P. Lesaffre,
884
+ and F. Timmes, ApJS 192, 3 (2011).
885
+ [7] B. Paxton, M. Cantiello, P. Arras, L. Bildsten, E. F.
886
+ Brown, A. Dotter, C. Mankovich, M. H. Montgomery,
887
+ D. Stello, F. X. Timmes, and R. Townsend, ApJS 208,
888
+ 4 (2013).
889
+ [8] B. Paxton, P. Marchant, J. Schwab, E. B. Bauer,
890
+ L. Bildsten, M. Cantiello, L. Dessart, R. Farmer, H. Hu,
891
+ N. Langer, R. H. D. Townsend, D. M. Townsley,
892
+ and
893
+ F. X. Timmes, ApJS 220, 15 (2015).
894
+ [9] B. Paxton,
895
+ J. Schwab,
896
+ E. B. Bauer,
897
+ L. Bildsten,
898
+ S. Blinnikov, P. Duffell, R. Farmer, J. A. Goldberg,
899
+ P. Marchant, E. Sorokina, A. Thoul, R. H. D. Townsend,
900
+ and F. X. Timmes, ApJS 234, 34 (2018).
901
+ [10] B.
902
+ Paxton,
903
+ R.
904
+ Smolec,
905
+ J.
906
+ Schwab,
907
+ A.
908
+ Gautschy,
909
+ L. Bildsten, M. Cantiello, A. Dotter, R. Farmer, J. A.
910
+ Goldberg, A. S. Jermyn, S. M. Kanbur, P. Marchant,
911
+ A. Thoul, R. H. D. Townsend, W. M. Wolf, M. Zhang,
912
+ and F. X. Timmes, ApJS 243, 10 (2019).
913
+ [11] R. Kippenhahn, A. Weigert,
914
+ and A. Weiss, Stellar
915
+ Structure
916
+ and
917
+ Evolution
918
+ (Springer
919
+ Berlin-Heidelber,
920
+ 2012).
921
+ [12] H. W. Babcock, The Astrophysical Journal 133, 572
922
+ (1961).
923
+ [13] E. N. Parker, The Astrophysical Journal 198, 205 (1975).
924
+ [14] M. Route, The Astrophysical Journal 830, L27 (2016).
925
+ [15] R. O. P. Loyd, E. L. Shkolnik, A. C. Schneider, T. S.
926
+ Barman, V. S. Meadows, I. Pagano,
927
+ and S. Peacock,
928
+ The Astrophysical Journal 867, 70 (2018).
929
+ [16] F.
930
+ Graziani,
931
+ M.
932
+ P.
933
+ Desjarlais,
934
+ R.
935
+ Redmer,
936
+ and
937
+ S. B. Trickey, eds., Frontiers and Challenges in Warm
938
+ Dense Matter (Springer Cham, Heidelberg, New York,
939
+ Dordrecht, London, 2014).
940
+ [17] C. Hayashi, R. Hoshi,
941
+ and D. Sugimoto, Progress of
942
+ Theoretical Physics Supplements 22, 1 (1962).
943
+ [18] D. B. Boercker, The Astrophysical Journal 316, L95
944
+ (1987).
945
+ [19] W. D. Watson, The Astrophysical Journal 158, 303
946
+ (1969).
947
+ [20] I. Hubeny and D. Mihalas, Theory of stellar atmospheres:
948
+ An introduction to astrophysical non-equilibrium quanti-
949
+ tative spectroscopic analysis (Princeton University Press,
950
+ 2014).
951
+ [21] D. D. Clayton, Principles of Stellar Evolution and
952
+ Nucleosynthesis
953
+ (The
954
+ University
955
+ of
956
+ Chicago
957
+ Press,
958
+ Chicago and London, 1983).
959
+ [22] H. A. Kramers, Philosophical Magazine 46, 836 (1923).
960
+ [23] J. A. Gaunt, Philosophical Transactions of the Royal
961
+ Society A 229, 163 (1930).
962
+ [24] J. Meyer-ter Vehn and R. Ramis, Physics of Plasmas 26,
963
+ 113301 (2019).
964
+ [25] D. O. Gericke, M. S. Murillo, and M. Schlanges, Physical
965
+ Review E 65, 036418 (2002).
966
+ [26] A. Grinenko and D. O. Gericke, Physical Review Letters
967
+ 103, 065005 (2009).
968
+ [27] A. Wierling, T. Millat, G. Röpke,
969
+ and R. Redmer,
970
+ Physics of Plasmas 8, 3810 (2001).
971
+ [28] C. E. Starrett, High Energy Density Physics 25, 8 (2017).
972
+ [29] M.
973
+ Bethkenhagen,
974
+ B.
975
+ B.
976
+ L.
977
+ Witte,
978
+ M.
979
+ Schörner,
980
+ G. Röpke, T. Döppner, D. Kraus, S. H. Glenzer, P. A.
981
+ Sterne,
982
+ and R. Redmer, Physical Review Research 2,
983
+ 023260 (2020).
984
+ [30] P. A. M. van Hoof,
985
+ R. J. R. Williams,
986
+ K. Volk,
987
+ M. Chatzikos, G. J. Ferland, M. Lykins, R. L. Porter,
988
+ and Y. Wang, Monthly Notices of the Royal Astronomical
989
+ Society 444, 420 (2014).
990
+ [31] P. A. M. van Hoof, G. J. Ferland, R. J. R. Williams,
991
+ K. Volk, M. Chatzikos, M. Lykins,
992
+ and R. L. Porter,
993
+ Monthly Notices of the Royal Astronomical Society 449,
994
+ 2112 (2015).
995
+ [32] A. Becker, W. Lorenzen, J. J. Fortney, N. Nettelmann,
996
+ M. Schöttler,
997
+ and R. Redmer, Astrophysical Journal
998
+ Supplement Series 215, 21 (2014).
999
+ [33] A. Becker, M. Bethkenhagen, C. Kellermann, J. Wicht,
1000
+ and R. Redmer, Astron. J. 156, 149 (2018).
1001
+ [34] B. Holst, M. French, and R. Redmer, Phys. Rev. B 83,
1002
+ 235120 (2011).
1003
+ [35] G. Kresse and J. Hafner, Physical Review B 47, 558
1004
+ (1993).
1005
+ [36] G. Kresse and J. Hafner, Physical Review B 49, 14251
1006
+ (1994).
1007
+ [37] G. Kresse and J. Furthmüller, Computational Materials
1008
+ Science 6, 15 (1996).
1009
+ [38] G. Kresse and J. Furthmüller, Phys. Rev. B 54, 11169
1010
+ (1996).
1011
+ [39] A. Baldereschi, Physical Review B 7, 5212 (1973).
1012
+ [40] S. Nosé, J. Chem. Phys. 81, 511 (1984).
1013
+ [41] R. Kubo, J. Phys. Soc. Jpn. 12, 570 (1957).
1014
+ [42] D. A. Greenwood, Proc. Phys. Soc. 71, 585 (1958).
1015
+ [43] C. E. Starrett and D. Saumon, Physical Review E 87,
1016
+ 013104 (2013).
1017
+ [44] C. E. Starrett, J. Daligault,
1018
+ and D. Saumon, Physical
1019
+ Review E 91, 013104 (2015).
1020
+ [45] C. E. Starrett and D. Saumon, Physical Review E 93,
1021
+ 063206 (2016).
1022
+ [46] N. Shaffer, N. Ferris, J. Colgan, D. Kilcrease,
1023
+ and
1024
+ C. Starrett, High Energy Density Physics 23, 31 (2017).
1025
+ [47] W. J. Karzas and R. Latter, The Astrophysical Journal
1026
+ Supplement Series 6, 167 (1961).
1027
+ [48] A. M. Serenelli, W. C. Haxton,
1028
+ and C. Peña Garay,
1029
+ Astrophysical Journal 743, 24 (2011).
1030
+ [49] E. I. Moses, R. N. Boyd, B. A. Remington, C. J. Keane,
1031
+ and R. Al-Ayat, Physics of Plasmas 16, 041006 (2009).
1032
+ [50] A. L. Kritcher, D. C. Swift, T. Döppner, B. Bachmann,
1033
+ L. X. Benedict, G. W. Collins, J. L. DuBois, F. Elsner,
1034
+ G. Fontaine, J. A. Gaffney, S. Hamel, A. Lazicki, W. R.
1035
+ Johnson, N. Kostinski, D. Kraus, M. J. MacDonald,
1036
+ B. Maddox, M. E. Martin, P. Neumayer, A. Nikroo,
1037
+ J. Nilsen, B. A. Remington, D. Saumon, P. A. Sterne,
1038
+ W. Sweet, A. A. Correa, H. D. Whitley, R. W. Falcone,
1039
+ and S. H. Glenzer, Nature 584, 51 (2020).
1040
+ [51] D. Kraus, T. Döppner, A. L. Kritcher, A. Yi, K. Boehm,
1041
+ B. Bachmann, L. Divol, L. B. Fletcher, S. H. Glenzer,
1042
+ O. L. Landen, N. Masters, A. M. Saunders, C. Weber,
1043
+ R. W. Falcone,
1044
+ and P. Neumayer, J. Phys. Conf. Ser.
1045
+
1046
+ 10
1047
+ 717, 012067 (2016).
1048
+ [52] G. N. Hall, C. M. Krauland, M. S. Schollmeier, G. E.
1049
+ Kemp, J. G. Buscho, R. Hibbard, N. Thompson, E. R.
1050
+ Casco, M. J. Ayers, S. L. Ayers, N. B. Meezan, L. F. B.
1051
+ Hopkins, R. Nora, B. A. Hammel, L. Masse, J. E. Field,
1052
+ D. K. Bradley, P. Bell, O. L. Landen, J. D. Kilkenny,
1053
+ D. Mariscal, J. Park, T. J. McCarville, R. Lowe-Webb,
1054
+ D. Kalantar, T. Kohut,
1055
+ and K. Piston, Review of
1056
+ Scientific Instruments 90, 013702 (2019).
1057
+ [53] K. Engelhorn, T. J. Hilsabeck, J. Kilkenny, D. Morris,
1058
+ T. M. Chung, A. Dymoke-Bradshaw, J. D. Hares, P. Bell,
1059
+ D. Bradley, A. C. Carpenter, M. Dayton, S. R. Nagel,
1060
+ L. Claus, J. Porter, G. Rochau, M. Sanchez, S. Ivancic,
1061
+ C. Sorce,
1062
+ and W. Theobald, Review of Scientific
1063
+ Instruments 89, 10g123 (2018).
1064
+ [54] A. B. Zylstra,
1065
+ S. MacLaren,
1066
+ S. A. Yi,
1067
+ J. Kline,
1068
+ D. Callahan, O. Hurricane, B. Bachmann, G. Kyrala,
1069
+ L. Masse, P. Patel, J. E. Ralph, J. Salmonson, P. Volegov,
1070
+ and C. Wilde, Physics of Plasmas 26, 052707 (2019).
1071
+ [55] A. L. Kritcher, D. Clark, S. Haan, S. A. Yi, A. B. Zylstra,
1072
+ D. A. Callahan, D. E. Hinkel, L. F. Berzak Hopkins, O. A.
1073
+ Hurricane, O. L. Landen, S. A. MacLaren, N. B. Meezan,
1074
+ P. K. Patel, J. Ralph, C. A. Thomas, R. Town, and M. J.
1075
+ Edwards, Phys. Plasmas 25, 056309 (2018).
1076
+ [56] A. B. Zylstra, O. A. Hurricane, D. A. Callahan, A. L.
1077
+ Kritcher,
1078
+ J. E. Ralph,
1079
+ H. F. Robey,
1080
+ J. S. Ross,
1081
+ C. V. Young, K. L. Baker, D. T. Casey, T. Döppner,
1082
+ L. Divol, M. Hohenberger, S. Le Pape, A. Pak, P. K.
1083
+ Patel, R. Tommasini, S. J. Ali, P. A. Amendt, L. J.
1084
+ Atherton, B. Bachmann, D. Bailey, L. R. Benedetti,
1085
+ L. Berzak Hopkins, R. Betti, S. D. Bhandarkar, J. Biener,
1086
+ R. M. Bionta,
1087
+ N. W. Birge,
1088
+ E. J. Bond,
1089
+ D. K.
1090
+ Bradley,
1091
+ T. Braun,
1092
+ T. M. Briggs,
1093
+ M. W. Bruhn,
1094
+ P. M. Celliers,
1095
+ B. Chang,
1096
+ T. Chapman,
1097
+ H. Chen,
1098
+ C. Choate, A. R. Christopherson, D. S. Clark, J. W.
1099
+ Crippen, E. L. Dewald, T. R. Dittrich, M. J. Edwards,
1100
+ W. A. Farmer, J. E. Field, D. Fittinghoff, J. Frenje,
1101
+ J. Gaffney, M. Gatu Johnson, S. H. Glenzer, G. P.
1102
+ Grim, S. Haan, K. D. Hahn, G. N. Hall, B. A. Hammel,
1103
+ J. Harte, E. Hartouni, J. E. Heebner, V. J. Hernandez,
1104
+ H. Herrmann, M. C. Herrmann, D. E. Hinkel, D. D.
1105
+ Ho, J. P. Holder, W. W. Hsing, H. Huang, K. D.
1106
+ Humbird, N. Izumi, L. C. Jarrott, J. Jeet, O. Jones, G. D.
1107
+ Kerbel, S. M. Kerr, S. F. Khan, J. Kilkenny, Y. Kim,
1108
+ H. Geppert Kleinrath, V. Geppert Kleinrath, C. Kong,
1109
+ J. M. Koning, J. J. Kroll, M. K. G. Kruse, B. Kustowski,
1110
+ O. L. Landen, S. Langer, D. Larson, N. C. Lemos,
1111
+ J. D. Lindl, T. Ma, M. J. MacDonald, B. J. MacGowan,
1112
+ A. J. Mackinnon, S. A. MacLaren, A. G. MacPhee,
1113
+ M. M. Marinak, D. A. Mariscal, E. V. Marley, L. Masse,
1114
+ K. Meaney, N. B. Meezan, P. A. Michel, M. Millot, J. L.
1115
+ Milovich, J. D. Moody, A. S. Moore, J. W. Morton,
1116
+ T. Murphy, K. Newman, J.-M. G. Di Nicola, A. Nikroo,
1117
+ R. Nora, M. V. Patel, L. J. Pelz, J. L. Peterson, Y. Ping,
1118
+ B. B. Pollock, M. Ratledge, N. G. Rice, H. Rinderknecht,
1119
+ M. Rosen, M. S. Rubery, J. D. Salmonson, J. Sater,
1120
+ S. Schiaffino, D. J. Schlossberg, M. B. Schneider, C. R.
1121
+ Schroeder, H. A. Scott, S. M. Sepke, K. Sequoia, M. W.
1122
+ Sherlock, S. Shin, V. A. Smalyuk, B. K. Spears, P. T.
1123
+ Springer, M. Stadermann, S. Stoupin, D. J. Strozzi, L. J.
1124
+ Suter, C. A. Thomas, R. P. J. Town, E. R. Tubman,
1125
+ C. Trosseille, P. L. Volegov, C. R. Weber, K. Widmann,
1126
+ C. Wild, C. H. Wilde, B. M. Van Wonterghem, D. T.
1127
+ Woods, B. N. Woodworth, M. Yamaguchi, S. T. Yang,
1128
+ and G. B. Zimmerman, Nature 601, 542 (2022).
1129
+ [57] K. Hanson, Lect. Notes in Pure and Appl. Math. 115,
1130
+ 363 (1989).
1131
+ [58] M. Howard, M. Fowler, A. Luttman, S. E. Mitchell, and
1132
+ M. C. Hock, SIAM Journal on Scientific Computing 38,
1133
+ B396 (2016).
1134
+ [59] M. M. Marinak, G. D. Kerbel, N. A. Gentile, O. Jones,
1135
+ D. Munro, S. Pollaine, T. R. Dittrich, and S. W. Haan,
1136
+ Physics of Plasmas 8, 2275 (2001).
1137
+ [60] S. H. Glenzer,
1138
+ D. A. Callahan,
1139
+ A. J. MacKinnon,
1140
+ J. L. Kline, G. Grim, E. T. Alger, R. L. Berger,
1141
+ L.
1142
+ A.
1143
+ Bernstein,
1144
+ R.
1145
+ Betti,
1146
+ D.
1147
+ L.
1148
+ Bleuel,
1149
+ T.
1150
+ R.
1151
+ Boehly,
1152
+ D. K. Bradley,
1153
+ S. C. Burkhart,
1154
+ R. Burr,
1155
+ J. A. Caggiano, C. Castro, D. T. Casey, C. Choate,
1156
+ D. S. Clark, P. Celliers, C. J. Cerjan, G. W. Collins,
1157
+ E. L. Dewald, P. DiNicola, J. M. DiNicola, L. Divol,
1158
+ S. Dixit, T. Döppner, R. Dylla-Spears, E. Dzenitis,
1159
+ M. Eckart, G. Erbert, D. Farley, J. Fair, D. Fittinghoff,
1160
+ M. Frank, L. J. A. Frenje, S. Friedrich, D. T. Casey,
1161
+ M. Gatu Johnson, C. Gibson, E. Giraldez, V. Glebov,
1162
+ S. Glenn, N. Guler, S. W. Haan, B. J. Haid, B. A.
1163
+ Hammel, A. V. Hamza, C. A. Haynam, G. M. Heestand,
1164
+ M. Hermann, H. W. Hermann, D. G. Hicks, D. E. Hinkel,
1165
+ J. P. Holder, D. M. Holunda, J. B. Horner, W. W.
1166
+ Hsing, H. Huang, N. Izumi, M. Jackson, O. S. Jones,
1167
+ D. H. Kalantar, R. Kauffman, J. D. Kilkenny, R. K.
1168
+ Kirkwood, J. Klingmann, T. Kohut, J. P. Knauer, J. A.
1169
+ Koch, B. Kozioziemki, G. A. Kyrala, A. L. Kritcher,
1170
+ J. Kroll, K. La Fortune, L. Lagin, O. L. Landen, D. W.
1171
+ Larson, D. LaTray, R. J. Leeper, S. Le Pape, J. D. Lindl,
1172
+ R. Lowe-Webb, T. Ma, J. McNaney, A. G. MacPhee,
1173
+ T. N. Malsbury, E. Mapoles, C. D. Marshall, N. B.
1174
+ Meezan, F. Merrill, P. Michel, J. D. Moody, A. S.
1175
+ Moore, M. Moran, K. A. Moreno, D. H. Munro, B. R.
1176
+ Nathan, A. Nikroo, R. E. Olson, C. D. Orth, A. E.
1177
+ Pak, P. K. Patel, T. Parham, R. Petrasso, J. E. Ralph,
1178
+ H. Rinderknecht, S. P. Regan, H. F. Robey, J. S. Ross,
1179
+ M. D. Rosen, R. Sacks, J. D. Salmonson, R. Saunders,
1180
+ J. Sater, C. Sangster, M. B. Schneider, F. H. Séguin,
1181
+ M. J. Shaw, B. K. Spears, P. T. Springer, W. Stoeffl,
1182
+ L. J. Suter, C. A. Thomas, R. Tommasini, R. P. J. Town,
1183
+ C. Walters, S. Weaver, S. V. Weber, P. J. Wegner, P. K.
1184
+ Whitman, K. Widmann, C. C. Widmayer, C. H. Wilde,
1185
+ D. C. Wilson, B. Van Wonterghem, B. J. MacGowan,
1186
+ L. J. Atherton, M. J. Edwards, and E. I. Moses, Physics
1187
+ of Plasmas 19, 056318 (2012).
1188
+ [61] A. J. Martin, R. J. Simms,
1189
+ and R. B. Jacobs, Journal
1190
+ of Vacuum Science & Technology A: Vacuum, Surfaces,
1191
+ and Films 6, 1885 (1988).
1192
+ [62] M. T. Mruzek, D. L. Musinski, and J. S. Ankney, Journal
1193
+ of Applied Physics 63, 2217 (1988).
1194
+ [63] S. H. Glenzer and R. Redmer, Reviews of Modern Physics
1195
+ 81, 1625 (2009).
1196
+ [64] G. Dimonte, Physics of Plasmas 7, 2255 (2000).
1197
+ [65] B. Bachmann, S. A. MacLaren, S. Bhandarkar, T. Briggs,
1198
+ D.
1199
+ Casey,
1200
+ L.
1201
+ Divol,
1202
+ T.
1203
+ Döppner,
1204
+ D.
1205
+ Fittinghoff,
1206
+ M.
1207
+ Freeman,
1208
+ S.
1209
+ Haan,
1210
+ G.
1211
+ Hall,
1212
+ B.
1213
+ Hammel,
1214
+ E. Hartouni, N. Izumi, V. Geppert-Kleinrath, S. Khan,
1215
+ B. Kozioziemski, C. Krauland, O. Landen, D. Mariscal,
1216
+ E. Marley, L. Masse, K. Meaney, A. Moore, A. Pak,
1217
+ P. Patel, M. Ratledge, N. Rice, M. Rubery, J. Salmonson,
1218
+ J. Sater, D. Schlossberg, M. Schneider, V. A. Smalyuk,
1219
+ C. Trosseille, P. Volegov, C. Weber, J. Williams,
1220
+ and
1221
+ A. Wray, submitted (2022).
1222
+
1223
+ 11
1224
+ [66] D. A. Verner and D. G. Yakovlev, Astronomy and
1225
+ Astrophysics Supplement Series 109, 125 (1995).
1226
+ [67] S. Atzeni and J. Meyer-ter Vehn, eds., The Physics of
1227
+ Inertial Fusion (Clarendon Press, Oxford, 2004).
1228
+ [68] F. J. Rogers and A. Nayfonov, The Astrophysical Journal
1229
+ 576, 1064 (2002).
1230
+ [69] D. Saumon, G. Chabrier,
1231
+ and H. M. van Horn, The
1232
+ Astrophysical Journal Supplement Series 99, 713 (1995).
1233
+ [70] A. W. Irwin, “The FreeEOS code for calculating the
1234
+ equation of state for stellar interiors,” (2004).
1235
+ [71] F. X. Timmes and F. D. Swesty, The Astrophysical
1236
+ Journal Supplement Series 126, 501 (2000).
1237
+ [72] A. Y. Potekhin and G. Chabrier, Contributions to
1238
+ Plasma Physics 50, 82 (2010).
1239
+ [73] C. A. Iglesias and F. J. Rogers, The Astrophysical
1240
+ Journal 412, 752 (1993).
1241
+ [74] C. A. Iglesias and F. J. Rogers, The Astrophysical
1242
+ Journal 464, 943 (1996).
1243
+ [75] J. W. Ferguson, D. R. Alexander, F. Allard, T. Barman,
1244
+ J. G. Bodnarik, P. H. Hauschildt, A. Heffner-Wong, and
1245
+ A. Tamanai, The Astrophysical Journal 623, 585 (2005).
1246
+ [76] J. R. Buchler and W. R. Yueh, The Astrophysical Journal
1247
+ 210, 440 (1976).
1248
+ [77] S. Cassisi, A. Y. Potekhin, A. Pietrinferni, M. Catelan,
1249
+ and M. Salaris, The Astrophysical Journal 661, 1094
1250
+ (2007).
1251
+ [78] R. H. Cyburt, A. M. Amthor, R. Ferguson, Z. Meisel,
1252
+ K. Smith,
1253
+ S. Warren,
1254
+ A. Heger,
1255
+ R. D. Hoffman,
1256
+ T. Rauscher, A. Sakharuk, H. Schatz, F. K. Thielemann,
1257
+ and M. Wiescher, The Astrophysical Journal Supplement
1258
+ Series 189, 240 (2010).
1259
+ [79] G. M. Fuller, W. A. Fowler,
1260
+ and M. J. Newman, The
1261
+ Astrophysical Journal 293, 1 (1985).
1262
+ [80] T. Oda, M. Hino, K. Muto, M. Takahara, and K. Sato,
1263
+ Atomic Data and Nuclear Data Tables 56, 231 (1994).
1264
+ [81] K. Langanke and G. Martínez-Pinedo, Nuclear Physics
1265
+ A 673, 481 (2000).
1266
+ [82] A. I. Chugunov, H. E. Dewitt,
1267
+ and D. G. Yakovlev,
1268
+ Physical Review D 76, 025028 (2007).
1269
+ [83] N. Itoh, H. Hayashi, A. Nishikawa,
1270
+ and Y. Kohyama,
1271
+ The Astrophysical Journal Supplement Series 102, 411
1272
+ (1996).
1273
+ [84] N. Grevesse and A. J. Sauval, Space Science Reviews 85,
1274
+ 161 (1998).
1275
+ [85] C. Hansen,
1276
+ S. Kawaler,
1277
+ and V. Trimble, Stellar
1278
+ Interiors: Physical Principles, Structure, and Evolution,
1279
+ Astronomy and Astrophysics Library (Springer New
1280
+ York, 2004).
1281
+ [86] L. Mestel, Mathematical Proceedings of the Cambridge
1282
+ Philosophical Society 46, 331 (1950).
1283
+ [87] T. D. Lee, The Astrophysical Journal 111, 625 (1950).
1284
+
19FAT4oBgHgl3EQfkR2N/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
1dAzT4oBgHgl3EQfRfuL/content/2301.01217v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:eaf060e6bbbe047d158937323204b8227f55c6c9c8afa89bce6e446ab6bed709
3
+ size 1257432
1dAzT4oBgHgl3EQfRfuL/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:f46a98e5a5b9a5433f7298c2c62f13c0847b1e1cd7d595f91613db6b3f12d08a
3
+ size 3211309
1dAzT4oBgHgl3EQfRfuL/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:e1126aed6c3c7bf7ef5d49949ed5281e2c255f6682ac71ce44995c435ccf7795
3
+ size 125118
29E1T4oBgHgl3EQf5wUG/content/2301.03514v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:c210ac11556216d3310828e94044130ff2845027612479b55e0ced6b3f65e037
3
+ size 515253
29E1T4oBgHgl3EQf5wUG/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:70e2d0cedfd091cab91f624c8bf91cef27a2b0ef26c95401367bdbca96bebfb0
3
+ size 124722
2dFAT4oBgHgl3EQfDhxB/content/2301.08416v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:b4e49ed0fcd8cbc68b1ec7260e4e205bb33b4d983783e0b47b52f34c36f310be
3
+ size 1308603
2dFAT4oBgHgl3EQfDhxB/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:472eeac83328726ee5e0e9275323be9e06f1aeb44a169620c8f4e559c06963b8
3
+ size 2752557
2tAzT4oBgHgl3EQf9P4T/content/tmp_files/2301.01915v1.pdf.txt ADDED
@@ -0,0 +1,1992 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ arXiv:2301.01915v1 [cs.IT] 5 Jan 2023
2
+ CHINA COMMUNICATIONS
3
+ Sum-Rate Maximization in Active RIS-Assisted Multi-Antenna
4
+ WPCN
5
+ Jie Jiang, Bin Lyu, Pengcheng Chen, and Zhen Yang
6
+ School of Communications and Information Engineering, Nanjing University of Posts and Telecommunications, Nanjing 210003, China
7
+ Abstract:
8
+ In this paper, we propose an active re-
9
+ configurable intelligent surface (RIS) enabled hybrid
10
+ relaying scheme for a multi-antenna wireless pow-
11
+ ered communication network (WPCN), where the ac-
12
+ tive RIS is employed to assist both wireless energy
13
+ transfer (WET) from the power station (PS) to energy-
14
+ constrained users and wireless information transmis-
15
+ sion (WIT) from users to the receiving station (RS).
16
+ For further performance enhancement, we propose to
17
+ employ both transmit beamforming at the PS and re-
18
+ ceive beamforming at the RS. We formulate a sum-
19
+ rate maximization problem by jointly optimizing the
20
+ RIS phase shifts and amplitude reflection coefficients
21
+ for both the WET and the WIT, transmit and receive
22
+ beamforming vectors, and network resource alloca-
23
+ tion. To solve this non-convex problem, we propose an
24
+ efficient alternating optimization algorithm with linear
25
+ minimum mean squared error criterion, semi-definite
26
+ relaxation (SDR) and successive convex approxima-
27
+ tion techniques. Specifically, the tightness of apply-
28
+ ing the SDR is proved.
29
+ Simulation results demon-
30
+ strate that our proposed scheme with 10 reflecting el-
31
+ ements (REs) and 4 antennas can achieve 17.78% and
32
+ 415.48% performance gains compared to the single-
33
+ antenna scheme with 10 REs and passive RIS scheme
34
+ with 100 REs, respectively.
35
+ Keywords: Wireless powered communication net-
36
+ work, active reconfigurable intelligent surface, beam-
37
+ forming, sum-rate maximization.
38
+ Received: XX
39
+ Revised: XX
40
+ Editor: XX
41
+ I. INTRODUCTION
42
+ With the development of the Internet-of-Things (IoT),
43
+ an intelligent society with ubiquitous interconnections
44
+ and deep coverage will be truly realized. However,
45
+ wireless devices (WDs) in IoT networks are generally
46
+ energy-constrained and suffer from limited lifetime
47
+ [1], which fundamentally limits the performance of
48
+ communication networks. Traditional ways of chang-
49
+ ing or recharging the batteries manually are impossi-
50
+ ble and unacceptable, especially when the number of
51
+ WDs is numerous. Therefore, how to tackle this issue
52
+ is a critical problem in the widespread development of
53
+ IoT. Wireless powered communication has been pro-
54
+ posed as a prospective technology for enhancing the
55
+ energy sustainability of WDs, which can be classified
56
+ into two directions based on application scenarios [2–
57
+ 4]. The first one focuses on investigating simultane-
58
+ ous wireless information and power transfer (SWIPT),
59
+ where the base station (BS) simultaneously transfers
60
+ energy and information signals to energy receivers
61
+ and information receivers via the common radio fre-
62
+ quency (RF) signals in the downlink (DL), resulting
63
+ in a pivotal tradeoff between the achievable rate and
64
+ harvested energy [5]. In contrast to the SWIPT, wire-
65
+ less powered communication network (WPCN) has
66
+ been proposed as a novel type of wireless network di-
67
+ agram to improve the lifetime of WDs and enhance
68
+ the deployment flexibility of IoT. In a WPCN, energy-
69
+ constrained WDs first harvest energy in the DL and
70
+ then use the harvested energy to transmit independent
71
+ information in the uplink (UL) based on the widely
72
+ used harvest-then-transmit (HTT) protocol [6].
73
+ WPCN has been widely investigated in the literature
74
+ China Communications
75
+ 1
76
+
77
+ [6–9], which promotes the development of WPCN.
78
+ However, WPCN generally suffers from the “doubly
79
+ near-far” phenomenon if the power station (PS) and
80
+ the receiving station (RS) are co-located at the hybrid
81
+ access point (HAP) [6, 8]. Specifically, a WD located
82
+ far away from the HAP harvesting less energy in the
83
+ DL has to transmit information with more power in
84
+ the UL, which results in an unfair time and resource
85
+ allocation among the WDs. To deal with the issue, a
86
+ promising way is to deploy the PS and RS separately
87
+ [10, 11]. In [10], multiple users harvest energy from a
88
+ dedicated PS and then communicate with an informa-
89
+ tion RS following the HTT protocol. In this scenario,
90
+ a user physically close to the PS is naturally far away
91
+ from the RS, and vice versa. Considering a similar
92
+ scenario, a user-centric energy-efficient (EE) problem
93
+ in WPCN is investigated in [11]. However, the perfor-
94
+ mance of WPCN is still limited due to the low efficien-
95
+ cies caused by the severe path-loss, which seriously
96
+ affects its practical applications.
97
+ Recently, reconfigurable intelligent surface (RIS),
98
+ with the unprecedented ability to reshape the wireless
99
+ transmission environment, has drawn widespread at-
100
+ tentions from academia and industry [12–18]. RIS is
101
+ comprised of a large number of programmable reflect-
102
+ ing elements (REs), which can alter the phase shifts
103
+ and amplitudes of incident signals. As such, RIS can
104
+ adaptively modify the impinging radio waves towards
105
+ the appropriate direction [13]. According to the re-
106
+ flection patterns, RIS can be classified as passive RIS
107
+ and active RIS. Without the property of power amplifi-
108
+ cation, the independent diffusive scatterer-based (IDS)
109
+ model accounts for the basic properties of passive RIS,
110
+ which has been widely adopted in RIS-assisted wire-
111
+ less communications [18]. The passive RIS is only
112
+ equipped with the phase-shift controller, while the ac-
113
+ tive RIS contains both the phase-shift controller and
114
+ the active reflection-type amplifier. Hence, the active
115
+ RIS can alter both the phase shifts and amplitudes of
116
+ the incident signals. It is worth noting that the active
117
+ RIS with its novel hardware structure and signal model
118
+ has been proposed in [19, 20].
119
+ Different from the
120
+ full-duplex amplify-and-forward (FD-AF) relay that
121
+ requires power-consuming RF chains, the active RIS
122
+ can directly reflect and amplify the incident signals in
123
+ the EM level in a FD manner without reception. In this
124
+ way, the active RIS exhibits promising qualities, such
125
+ as a low power consumption, light weight, conformal
126
+ geometry and high flexibility for practical deployment.
127
+ Currently, the passive RIS has been widely applied
128
+ in WPCNs for performance enhancement [21–24]. In
129
+ [21], the passive RIS is employed between the HAP
130
+ and users to improve both DL WET and UL WIT effi-
131
+ ciencies in single-input-single-output (SISO) WPCN.
132
+ To achieve further performance improvement, the
133
+ multi-antenna technique is employed in [22], where
134
+ the HAP with multi-antenna transmits energy signals
135
+ to users in the DL and receives information from users
136
+ in the UL by employing transmit bemforming and re-
137
+ ceive beamforming, respectively.
138
+ In [23], the fully
139
+ dynamic RIS beamforming scheme is proposed for
140
+ WPCN, for which the phase shift vectors are indepen-
141
+ dently designed over different time slots. However,
142
+ in the above works [21–23], the PS and RS are also
143
+ co-located at the HAP, which results in performance
144
+ unfair among users.
145
+ To address this issue, the au-
146
+ thors in [24] consider the scenario where the PS and
147
+ RS are separately deployed, for which the locations of
148
+ RIS and users can be carefully considered to achieve a
149
+ fair performance among users. However, as mentioned
150
+ above, the passive RIS can only reflect incident signals
151
+ without amplification, which leads to the limited per-
152
+ formance enhancement due to the double-fading ef-
153
+ fect suffered by the reflecting links. Thus, the energy-
154
+ constrained users still need to consume much time for
155
+ harvesting energy in the DL and have less time for in-
156
+ formation transmission.
157
+ Inspired by the amplification characteristic of the
158
+ active RIS, the active RIS is confirmed to be superior
159
+ to the passive RIS in terms of performance enhance-
160
+ ment, and thus has been considered a promising tech-
161
+ nique for IoT networks [19, 20, 25–29]. The authors
162
+ in [19] compare the capacity improvement achieved
163
+ by the active RIS to the passive RIS, which demon-
164
+ strats that the active RIS can fundamentally mitigate
165
+ the double-fading effect. In [20], an active RIS is ap-
166
+ plied in single input multiple output (SIMO) systems,
167
+ for which the joint optimization of phase shifts ma-
168
+ trix and receive beamforming is considered to obtain
169
+ the maximum achievable rate. In [25], the placement
170
+ of the active RIS is optimized to enhance SISO sys-
171
+ tems’ performance. The authors in [26] propose to use
172
+ the active RIS to achieve secure transmission, which
173
+ not only establishes the reliable link from the trans-
174
+ mitter to the receiver but also prevents the confidential
175
+ information intercepted by the eavesdropper. The ac-
176
+ 2
177
+ China Communications
178
+
179
+ tive RIS-aided multiuser MISO PS-SWIPT is studied
180
+ in [27] to minimize the base station transmit power,
181
+ which shows significant improvements compared to
182
+ the passive RIS-aided system. Similarly, in [28], an
183
+ active RIS is employed to assist SWIPT to boost the
184
+ efficiency of both WET and WIT, while the conclu-
185
+ sions and approaches are inapplicable to the WPCN
186
+ system because of thire different system models.
187
+ Although the active RIS has received a lot of inter-
188
+ ests for wireless communication networks, the appli-
189
+ cations of active RIS in WPCN is still at the very early
190
+ stage and has not been well studied in the literature.
191
+ To the best of our knowledge, there exists only one
192
+ paper investigating the usage of active RIS in WPCN
193
+ [29]. Specifically, the authors in [29] investigate the
194
+ weight sum-rate maximization problem in the active
195
+ RIS assisted single-antenna WPCN, where the PS and
196
+ RS is co-located at the HAP. As a result, similar to
197
+ [21–23], a part of WDs in [29] still suffer from the
198
+ “doubly near-far” phenomenon, which is not suitable
199
+ for practical applications with high requirement of per-
200
+ formance fairness. Moreover, the authors consider a
201
+ certain simplified communication scenario where both
202
+ the HAP and the WDs have single antenna each. The
203
+ transmit beamforming and receive beamforming can-
204
+ not be exploited, which is also a key technology for
205
+ performance enhancement.
206
+ Motivated by the observations above, we propose
207
+ an active RIS enabled hybrid relaying scheme for the
208
+ multi-antenna WPCN, where the active RIS is em-
209
+ ployed to facilitate both the WET from the PS to
210
+ energy-constrained users and the WIT from users to
211
+ the RS, which is shown in Figure 1. Compared with
212
+ the existing works which used the passive RIS in
213
+ WPCN [21–24], our proposed active RIS scheme can
214
+ amplify the energy signals and information signals to
215
+ achieve a satisfying system performance.
216
+ Different
217
+ from the single-antenna scenario considered in [29],
218
+ we propose to employ multi-antenna at both the PS
219
+ and RS, which can construct the transmit beamform-
220
+ ing and receive beamforming for further performance
221
+ enhancement. Specifically, the transmit beamforming
222
+ at the PS can be used to enhance the WPT efficiency
223
+ from the PS to users. In the meanwhile, the receive
224
+ beamforming at the RS can be used to exploit the an-
225
+ tenna gain and eliminate the noise caused by the ac-
226
+ tive RIS. In the considered system setup, we aim to
227
+ maximize the sum-rate problem by jointly optimiz-
228
+ ing the transmit beamforming at the PS, the receive
229
+ beamforming at the RS, the reflecting coefficients at
230
+ the RIS, and network resource allocation. It should
231
+ be noted that compared to [21–24, 29], our formulated
232
+ problem is much more challenging to solve and the
233
+ proposed algorithms in [21–24, 29] cannot be used to
234
+ solve our formulated problem. Thus, we propose an
235
+ efficient algorithm to solve the formulated problem.
236
+ The main contributions of this paper are summarized
237
+ as follows:
238
+ • We propose an active RIS assisted multi-antenna
239
+ WPCN for performance enhancement, where the
240
+ active RIS is served as a hybrid relay to achieve
241
+ two purposes, i.e., the first one is to assist the
242
+ WET from the PS to users, and the second one
243
+ is to aid the WIT from users to the RS. To fur-
244
+ ther improve system performance, both trans-
245
+ mit beamforming and receive beamforming tech-
246
+ niques are respectively considered at the PS and
247
+ RS.
248
+ • We investigate the sum-rate maximization prob-
249
+ lem by jointly optimizing transmit beamforming
250
+ vector at the PS, receive beamforming vectors at
251
+ the RS, phase shifts and amplitude reflection coef-
252
+ ficients at the RIS for both the WET and the WIT,
253
+ and network resource allocation. To deal with the
254
+ non-convexity of the formulated problem, we pro-
255
+ pose an efficient alternating optimization (AO) al-
256
+ gorithm. Specifically, the original problem can be
257
+ divided into four sub-problems, which are solved
258
+ sequentially in an alternating manner until con-
259
+ vergence is achieved.
260
+ • For designing the receive beamforming, we apply
261
+ the linear minimum mean squared error (MMSE)
262
+ criterion and obtain the closed-form expression.
263
+ For the optimization of the transmit beamform-
264
+ ing and RIS reflecting coefficient matrices for
265
+ the WET, the semidefinite relaxation (SDR) tech-
266
+ nique is adopted and the tightness of applying the
267
+ SDR is proved. For the optimization of RIS re-
268
+ flecting coefficients for the WIT, we obtain the
269
+ optimal phase shifts in a closed-form and propose
270
+ a successive convex approximation (SCA) algo-
271
+ rithm to determine the optimal amplitude reflec-
272
+ tion coefficients. In addition, the convergence of
273
+ proposed problem is analyzed and confirmed via
274
+ numerical simulations.
275
+ China Communications
276
+ 3
277
+
278
+ • Finally, numerical results are provided to evaluate
279
+ the performance of proposed scheme, which indi-
280
+ cates that compared to the single-antenna scheme
281
+ with 10 REs and the passive-RIS scheme with 100
282
+ REs, the proposed scheme with 4 antennas and 10
283
+ REs can achieve 17.78% and 415.48% sum-rate
284
+ gain, respectively.
285
+ The rest of this paper is organized as follows. Sec-
286
+ tion II describes the system model of the active RIS-
287
+ assisted multi-antenna WPCN. The sum-rate maxi-
288
+ mization problem is formulated in Section III and
289
+ solved in Section IV, respectively. In Section V, per-
290
+ formance is evaluated by numerical results. Finally,
291
+ this paper is concluded in Section VI.
292
+ Notations: In this paper, vectors and matrices are
293
+ denoted by boldface lowercase and uppercase letters,
294
+ respectively. The operators ( · )T, ( · )H, | · | and ∥ · ∥
295
+ denote the transpose, conjugate transpose, absolute
296
+ value and the Euclidean norm, respectively. Tr( · ) and
297
+ rank( · ) denote the trace and rank of a matrix, respec-
298
+ tively. X ⪰ 0 represents that X is a positive semidef-
299
+ inite matrix. E[ · ] stands for the statistical expecta-
300
+ tion. IN denotes the N-dimensional identity matrix.
301
+ 0 denotes the zero matrix/vector with appropriate size.
302
+ CN×M denotes the set of all N × M complex-valued
303
+ matrices. HM denotes the set of all M ×M Hermitian
304
+ matrices. RN×1 represents the set of all N × 1 real-
305
+ valued vectors. CN
306
+
307
+ µ, σ2�
308
+ denotes the distribution of
309
+ a circularly symmetric complex Gaussian random vec-
310
+ tor with mean µ and variance σ2. arg( · ) denotes the
311
+ phase extraction operation. diag(x) denotes a diago-
312
+ nal matrix whose diagonal elements are from vector x.
313
+ Im( · ) and Re( · ) respectively denotes the imaginary
314
+ part and real part of a complex number.
315
+ II. SYSTEM MODEL
316
+ As shown in Figure 1, we consider an active RIS-aided
317
+ multi-antenna WPCN, which consists of a PS with M
318
+ antennas, a RS with L antennas, an active RIS, and
319
+ K energy-constrained users each with single antenna.
320
+ We assume that each user is equipped with an energy
321
+ harvesting (EH) circuit for harvesting energy, where
322
+ a rectifier is used to convert the received RF signals
323
+ to direct current (DC) signals. Then, the net energy
324
+ harvested from the DC signals can be stored in the
325
+ rechargeable battery. The active RIS consists of N
326
+ active REs, which can steer the reflected signals in
327
+ ��,�
328
+
329
+ ��,�
330
+
331
+ ��,�
332
+ ��,�
333
+ ��
334
+ ��
335
+ PS
336
+ RS
337
+ ��
338
+ Active RIS
339
+ Energy transfer
340
+ Information transmission
341
+ EH circuit
342
+ Rectifier
343
+ RF signal
344
+ Rechargeable
345
+ battery
346
+ DC signal
347
+ Figure 1.
348
+ System model for an active RIS-assisted multi-
349
+ antenna WPCN.
350
+ a specific direction and also amplify them by the ac-
351
+ tive loads (negative resistance) [20]. In contrast to the
352
+ passive RE, each active RE is equipped with an addi-
353
+ tionally integrated active reflection-type amplifier sup-
354
+ ported by a power supply. By appropriately setting the
355
+ effective resistance, it is reasonable to assume that the
356
+ reflection amplitude and phase of each element is inde-
357
+ pendently [19, 20, 25–29]. To power the operations of
358
+ active RIS and users, the PS is equipped with a stable
359
+ energy source. In addition, the PS has the capability
360
+ for performing computational tasks [21]. In particu-
361
+ lar, the users first harvest energy from the RF signals
362
+ transmitted by the PS and then use the harvested en-
363
+ ergy to deliver information to the RS. To allievate the
364
+ severe path-loss suffered by the reflecting links, the ac-
365
+ tive RIS is employed to improve the WET efficiency
366
+ from the PS to users and the WIT efficiency from the
367
+ users to the RS.
368
+ The channels are assumed to follow a quasi-static
369
+ flat-fading model.
370
+ That is, all channel coefficients
371
+ are constant throughout each transmission block but
372
+ vary from block to block [30]. The downlink base-
373
+ band equivalent channels of PS-to-RIS, RIS-to-Uk,
374
+ and PS-to-Uk links are denoted by Hr ∈ CN×M,
375
+ hH
376
+ u,k ∈ C1×N, and hH
377
+ d,k ∈ C1×M, respectively, where
378
+ Uk denotes the k-th user. Similarly, the uplink base-
379
+ band equivalent channels of Uk-to-RIS, RIS-to-RS,
380
+ and Uk-to-RS links are respectively denoted by gu,k ∈
381
+ CN×1, Gr ∈ CL×N, and gd,k ∈ CL×1, respectively.
382
+ Since there have been many efficient channel estima-
383
+ 4
384
+ China Communications
385
+
386
+ 用tion techniques proposed for RIS systems [31–34], we
387
+ assume the perfect channel state information can be
388
+ available in advance, which is a common assumption
389
+ considered in [21, 22, 35] and a prerequisite for inves-
390
+ tigating the upper-bound of system performance. It
391
+ should be noted that the channel estimation error is
392
+ generally inevitable [31]. However, the effect of chan-
393
+ nel estimation error on system performance degrada-
394
+ tion is out the scope of this paper.
395
+ According to the HTT protocol [6], the normalized
396
+ transmission block of interest is divided into K + 1
397
+ time slots. The first time slot with duration of τ0 ∈
398
+ [0, 1] is a dedicated slot for WET, in which all users
399
+ harvest energy from the PS with the assistance of
400
+ active RIS. The remaining K time slots denoted by
401
+ τ = [τ1, . . . , τK], are used for UL WIT via the time di-
402
+ vision multiple access (TDMA) scheme. Specifically,
403
+ during τk, k = 1, · · · , K, Uk delivers its information
404
+ to the RS. Without loss of generality, the whole oper-
405
+ ation time period is set to a normalized transmission
406
+ block. The network time scheduling constraint is thus
407
+ given by
408
+ τ0 +
409
+ K
410
+
411
+ k=1
412
+ τk ≤ 1, ∀k.
413
+ (1)
414
+ 2.1 Wireless Energy Transfer Phase
415
+ In the WET phase, the PS transmits energy signals to
416
+ all users with the assistance of the active RIS. Denote
417
+ the transmitted signal as s = w0s, where s is the
418
+ pseudo-random baseband signal transmitted by the PS,
419
+ and w0 ∈ CM×1 is the transmit beamforming vector.
420
+ The energy constraint at the PS is expressed as
421
+ E
422
+
423
+ |s|2�
424
+ = Tr
425
+
426
+ w0wH
427
+ 0
428
+
429
+ ≤ P0,
430
+ (2)
431
+ where P0 denotes the maximum transmit power at the
432
+ PS.
433
+ The reflecting coefficient matrix of the active
434
+ RIS in the WET phase is denoted by Φ0
435
+ =
436
+ diag {φ0,1, . . . , φ0,N}
437
+
438
+ CN×N
439
+ with
440
+ φ0,n
441
+ =
442
+ a0,nejθ0,n, n = 1, . . . , N, where a0,n and θ0,n rep-
443
+ resent the amplitude reflection coefficient and phase
444
+ shift of the n-th RE, respectively. Without loss of gen-
445
+ erality, we suppose each active RE has the following
446
+ constraints
447
+ a0,n ≤ an,max, 0 ≤ θ0,n ≤ 2π, ∀n,
448
+ (3)
449
+ where an,max is the maximum amplitude reflection co-
450
+ efficient of n-th RE. It is worth noting that an,max can
451
+ be greater than 1 [25], which is a main characteris-
452
+ tic distinguishing the active RIS from the passive RIS
453
+ since the active load can amplify the reflected signals.
454
+ The received signal at Uk during τ0 is given by
455
+ yu,k = hH
456
+ d,ks
457
+ � �� �
458
+ direct link
459
+ + hH
460
+ u,kΦ0 (Hrs + nv)
461
+
462
+ ��
463
+
464
+ RIS-aided link
465
+ +nu,k, ∀k,
466
+ (4)
467
+ where nu,k ∈ C and nv ∈ CN×1 represent the ad-
468
+ ditive white Gaussian noise (AWGN) at Uk and the
469
+ RIS, respectively. Without loss of generality, we as-
470
+ sume nu,k ∼ CN
471
+
472
+ 0, σ2
473
+ u,k
474
+
475
+ and nv ∼ CN
476
+
477
+ 0, σ2
478
+ vIN
479
+
480
+ .
481
+ Denote the equivalent downlink channel as hH
482
+ k
483
+ =
484
+ hH
485
+ u,kΦ0Hr + hH
486
+ d,k ∈ C1×M and (4) can be rewritten
487
+ as
488
+ yu,k = hH
489
+ k w0s + hH
490
+ u,kΦ0nv + nu,k, ∀k.
491
+ (5)
492
+ Due to the fact that the active RIS not only amplifies
493
+ the desired signal, i.e., s, but also amplifies the input
494
+ noise, i.e., nv, it is reasonable to consider the second
495
+ term of (4) for computing the amount of harvested en-
496
+ ergy accurately [20]. However, the noise at Uk is gen-
497
+ erally quite small and can be negligible. Accordingly,
498
+ the harvested energy by Uk, denoted by Ek, is given
499
+ by
500
+ Ek = β
501
+ ��hH
502
+ k w0
503
+ ��2τ0 + β
504
+ ��hH
505
+ u,kΦ0
506
+ ��2σ2
507
+ vτ0, ∀k,
508
+ (6)
509
+ where β ∈ (0, 1] denotes the energy conversion effi-
510
+ ciency of each user. It is practical for us to consider
511
+ the linear EH model here, which is also a common as-
512
+ sumption in the literature [6, 8, 11, 10, 22, 29].
513
+ It is worth noting that the active RIS can allocate
514
+ the available reflecting power to amplify the incident
515
+ signals with active loads [20]. In the DL WET phase,
516
+ the amplification power of s and nv is limited by the
517
+ RIS power budget, which is shown by the following
518
+ constraint
519
+ P0 ∥Φ0Hr∥2 + σ2
520
+ v ∥Φ0IN∥2 ≤ Pr,
521
+ (7)
522
+ where Pr is the maximum reflecting power for ampli-
523
+ fication at the active RIS and substantially lower than
524
+ that of an active RF amplifier [25].
525
+ China Communications
526
+ 5
527
+
528
+ 2.2 Wireless Information Transmission Phase
529
+ In the WIT phase, the users utilize the harvested en-
530
+ ergy to transmit information to the RS via a TDMA
531
+ manner. Let fk denotes the information-carrying sig-
532
+ nal of Uk with unit power and then the transmit signal
533
+ during τk is denoted by xk = √pkfk, where pk is the
534
+ transmit power at Uk. We assume that all the harvested
535
+ energy at Uk in the WET phase is used for delivering
536
+ its own information. Let p = [p1, . . . , pK] ∈ R1×K,
537
+ which satisfies
538
+ pkτk ≤ Ek, ∀k.
539
+ (8)
540
+ Similarly, the reflecting coefficient matrix at the
541
+ active RIS for the WIT during τk is denoted by
542
+ Φk = diag {φk,1, . . . , φk,N} ∈ CN×N, where φk,n =
543
+ ak,nejθk,n, ak,n and θk,n have the following constraints
544
+ ak,n ≤ an,max, 0 ≤ θk,n ≤ 2π, ∀k, ∀n.
545
+ (9)
546
+ The received signal at the RS from Uk with the as-
547
+ sistance of active RIS during τk is written as
548
+ yr,k = gH
549
+ d,kxk
550
+ � �� �
551
+ direct link
552
+ + GrΦk (gu,kxk + nv)
553
+
554
+ ��
555
+
556
+ RIS-aided link
557
+ +nr, ∀k,
558
+ (10)
559
+ where nr ∈ CL×1 represents the AWGN at the RS and
560
+ satisfies nr ∼ CN
561
+
562
+ 0, σ2
563
+ rIN
564
+
565
+ .
566
+ In the UL WIT phase, we also have the amplification
567
+ power constraint at the active RIS as follows
568
+ pk ∥Φkgu,k∥2 + σ2
569
+ v ∥ΦkIN∥2 ≤ Pr, ∀k.
570
+ (11)
571
+ Denote the receive beamforming vector at the RS
572
+ during τk as wk ∈ CL×1, which can be used to ex-
573
+ tract the desired signal and suppress interference and
574
+ noises. Let the equivalent uplink channel be gk =
575
+ gd,k + GrΦkgu,k, ∀k. The estimated signal at the RS
576
+ during τk is expressed as
577
+ uk =wH
578
+ k yr,k
579
+ =wH
580
+ k gkxk + wH
581
+ k GrΦknv + wH
582
+ k nr, ∀k.
583
+ (12)
584
+ Then, the signal-noise-ratio (SNR) at the RS during
585
+ τk is written as
586
+ γk = pk
587
+ ��wH
588
+ k (GrΦkgu,k + gd,k)
589
+ ��2
590
+ ��wH
591
+ k GrΦk
592
+ ��2 σ2v + ∥wk∥2 σ2r
593
+ , ∀k.
594
+ (13)
595
+ Denote the achievable rate from Uk to the RS as Rk,
596
+ which is formulated as
597
+ Rk = τk log (1 + γk) , ∀k.
598
+ (14)
599
+ III. PROBLEM FORMULATION
600
+ In this section, we formulate the system sum-rate max-
601
+ imization problem by jointly optimizing the reflecting
602
+ coefficients for both the WET and the WIT at the ac-
603
+ tive RIS, the transmit beamforming at the PS, the re-
604
+ ceive beamforming at the RS, the transmit power at
605
+ each user, and the network time scheduling. The opti-
606
+ mization problem is formulated as
607
+ (P1)
608
+ max
609
+ τ0,τ,Φ0,Φk,w0,p,wk
610
+ K
611
+
612
+ k=1
613
+ Rk
614
+ (15)
615
+ s.t.
616
+ (1), (2), (3), (7), (8), (9) and (11),
617
+ τ0 ≥ 0, τk ≥ 0, pk ≥ 0, ∀k.
618
+ (16)
619
+ where (16) indicates that the time and power variables
620
+ are all nonnegative.
621
+ One can observe that the objective function in (15)
622
+ is a non-concave function due to the coupled of vari-
623
+ ables. In addition, there exists several non-convex con-
624
+ straints, i.e., (2), (7), (8) and (11). It is thus challeng-
625
+ ing to solve P1 directly by standard optimization tech-
626
+ niques. In the next section, we propose an AO algo-
627
+ rithm to solve it efficiently.
628
+ IV. ALTERNATING OPTIMIZATION SO-
629
+ LUTION
630
+ In this section, an efficient AO algorithm is proposed
631
+ to solve P1. In particular, we decompose P1 into sev-
632
+ eral subproblems and iteratively solve them in an al-
633
+ ternating manner. To show the procedure of AO algo-
634
+ rithm, we summarize a flow chart in Figure 2. Specif-
635
+ ically, the variables are partitioned into four blocks,
636
+ {wk}, {w0, τ, p}, {Φ0, τ0, τ, p}, and {Φk}. Then,
637
+ the variables in each block are alternately solved by
638
+ 6
639
+ China Communications
640
+
641
+ Linear MMSE-based Receive
642
+ Beamforming Optimization
643
+ SDP-based Transmit
644
+ Beamforming Optimization
645
+ SDP-based RIS Reflecting Coefficients for the
646
+ WET and Resource Allocation Optimization
647
+ SCA-based RIS Reflecting Coefficients
648
+ Optimization for the WIT
649
+ System Variables
650
+ �, �, �� , ��
651
+ ��, ��, ��
652
+ �, {��}
653
+ {��}
654
+ �� , �� , ��, ��
655
+ ��
656
+ �, �
657
+ Discarding
658
+ ��, �� , ��
659
+ ��, ��,
660
+ �, �
661
+ �, ��
662
+ ��
663
+ AO iteration flow
664
+ Update
665
+ Input
666
+ Figure 2. A flow chart of the proposed algorithm.
667
+ its corresponding sub-problem with the other blocks
668
+ fixed until the convergence is achieved.
669
+ 4.1 Linear MMSE-based Receive Beamform-
670
+ ing Optimization
671
+ With the other variables fixed, we first design the re-
672
+ ceive beamforming vectors {wk}. To cope with the
673
+ interference caused by nv and nr in (13), we apply
674
+ the linear MMSE criterion here. Based on this crite-
675
+ rion, the MMSE-based receive beamforming is given
676
+ by
677
+ w∗
678
+ k =
679
+
680
+ gkgH
681
+ k + σ2
682
+ v
683
+ pk
684
+ GrΦkΦH
685
+ k GH
686
+ r + σ2
687
+ r
688
+ pk
689
+ IL
690
+ �−1
691
+ gk, ∀k.
692
+ (17)
693
+ 4.2 SDP-based Transmit Beamforming Opti-
694
+ mization
695
+ We then proceed to optimize {w0, τ, p} with the other
696
+ variables {wk, Φ0, τ0, Φk} fixed. Letting ek = pkτk
697
+ and e = [e1, . . . , eK] and applying the obtained results
698
+ in (17), P1 can be simplified as follows
699
+ (P2) max
700
+ w0,τ,e
701
+ K
702
+
703
+ k=1
704
+ τk log
705
+
706
+ 1 + ǫk
707
+ ek
708
+ τk
709
+
710
+ (18)
711
+ s.t.
712
+ ek ≤ Ek, ∀k,
713
+ (19)
714
+ τk ≥ 0, ek ≥ 0, ∀k,
715
+ (20)
716
+ (1), (2) and (11),
717
+ where ǫk
718
+ =
719
+ |(w∗
720
+ k)H(GrΦkgu,k+gd,k)|
721
+ 2
722
+ ∥(w∗
723
+ k)HGrΦk∥
724
+ 2σ2v+∥w∗
725
+ k∥
726
+ 2σ2r , ∀k.
727
+ It
728
+ can be found that P2 is highly non-convex.
729
+ To
730
+ solve it efficiently, the SDR technique [36] is em-
731
+ ployed.
732
+ Define Hk
733
+ =
734
+ hkhH
735
+ k , and Gu,k
736
+ =
737
+ diag
738
+
739
+ |gu,k,1|2 , |gu,k,2|2 , . . . , |gu,k,N|2�
740
+ ,
741
+ ∀k.
742
+ Let
743
+ W0
744
+ =
745
+ w0wH
746
+ 0 , which satisfies W0
747
+
748
+ 0 and
749
+ rank(W0) = 1. Then, (19) is rewritten as
750
+ ek ≤ βτ0[Tr (HkW0) +
751
+ ��hH
752
+ u,kΦ0
753
+ ��2 σ2
754
+ v], ∀k.
755
+ (21)
756
+ Denote the RIS reflecting coefficient vector for the
757
+ WET as ϕk = [φk,1, φk,2, . . . , φk,N]T, ∀k, (11) can
758
+ be recast as
759
+ ekϕH
760
+ k Gu,kϕk + τkσ2
761
+ vϕH
762
+ k ϕk ≤ τkPr, ∀k.
763
+ (22)
764
+ Then, P2 can be equivalently transformed into
765
+ (P2-1) max
766
+ W0,τ,e
767
+ K
768
+
769
+ k=1
770
+ τk log
771
+
772
+ 1 + ǫk
773
+ ek
774
+ τk
775
+
776
+ (23)
777
+ s.t.
778
+ Tr (W0) ≤ P0,
779
+ (24)
780
+ W0 ⪰ 0,
781
+ (25)
782
+ rank(W0) = 1,
783
+ (26)
784
+ (1), (20), (21) and (22).
785
+ Since the rank-one constraint in (26) is non-convex,
786
+ we employ the SDR technique to relax it. Thus, P2-1
787
+ becomes to be a convex semidefinite program (SDP)
788
+ and can be solved with the interior-point method [37].
789
+ Proposition 1. The optimal transmit beamforming
790
+ matrix obtained by solving the relaxed version of P2-1,
791
+ denoted by W ∗
792
+ 0 , is rank-one.
793
+ Proof. Please refer to Appendix A.
794
+ According to Proposition 1, the tightness of SDR
795
+ is guaranteed. Hence, we can employ Cholesky de-
796
+ composition to obtain the optimal energy beamform-
797
+ ing vector w∗
798
+ 0.
799
+ 4.3 SDP-based RIS Reflecting Coefficients for
800
+ the WET and Resource Allocation Opti-
801
+ mization
802
+ In this sub-section, we focus on optimizing the re-
803
+ flecting beamforming at the RIS in the WET phase,
804
+ the transmit power at each user, and the network
805
+ time scheduling.
806
+ Since τ0 and Φ0 are coupled,
807
+ we first optimize {Φ0, τ, p} with τ0 given. Define
808
+ Ψ0 = ˜ϕ0 ˜ϕH
809
+ 0 with Ψ0 ⪰ 0 and rank(Ψ0) = 1,
810
+ where ˜ϕ0 = [ϕH
811
+ 0 , 1]H and ϕ0 = [φ0,1, . . . , φ0,N]T .
812
+ China Communications
813
+ 7
814
+
815
+ Let Hu,k = diag {hu,k,1, . . . , hu,k,N} and Qu,k =
816
+ diag
817
+
818
+ |hu,k,1|2 , . . . , |hu,k,N|2 , 1
819
+
820
+ . Then, (7) and (19)
821
+ are respectively reformulated as
822
+ P0Tr( ˜
823
+ HrΨ0) + σ2
824
+ vTr(Ψ0) ≤ Pr,
825
+ (27)
826
+ ek ≤ βτ0Tr[(V + σ2
827
+ vQu,k)Ψ0] − βτ0σ2
828
+ v, ∀k, (28)
829
+ where
830
+ V =
831
+ �HH
832
+ u,kHrW0HH
833
+ r Hu,k
834
+ HH
835
+ u,kHrW0hd,k
836
+ hH
837
+ d,kW0HH
838
+ r Hu,k
839
+ hH
840
+ d,kW0hd,k
841
+
842
+ ,
843
+ and
844
+ ˜
845
+ Hr =
846
+ �HrHH
847
+ r
848
+ 0
849
+ 0
850
+ 0
851
+
852
+ .
853
+ With the obtained solutions in Sections 4.1 and 4.2,
854
+ P1 can be equivalently written as
855
+ (P2-2) max
856
+ Ψ0,τ,e
857
+ K
858
+
859
+ k=1
860
+ τk log
861
+
862
+ 1 + ǫk
863
+ ek
864
+ τk
865
+
866
+ (29)
867
+ s.t.
868
+ Ψ0 ⪰ 0, rank(Ψ0) = 1,
869
+ (30)
870
+ [Ψ0]n,n ≤ a2
871
+ max, ∀n,
872
+ (31)
873
+ [Ψ0]N+1,N+1 = 1,
874
+ (32)
875
+ (1), (20), (22), (27) and (28).
876
+ Similarly, after the relaxation of the rank-one con-
877
+ straint in (30), P2-2 is also an SDP and can be solved
878
+ by the interior-point method. Recall that the tightness
879
+ of optimizing W0 by SDR can be guaranteed, we can
880
+ also prove that the obtained solution Ψ0 is rank-one.
881
+ Then, ˜ϕ0 can be recovered by implementing Cholesky
882
+ decomposition of Ψ0, and the optimal reflection co-
883
+ efficient vector for the WET ϕ∗
884
+ 0 can be obtanied by
885
+ linear operation from ˜ϕ0. Subsequently, the optimal
886
+ RIS reflecting coefficient matrix Φ∗
887
+ 0 can be obtained
888
+ by Φ∗
889
+ 0 = diag((ϕH
890
+ 0 )∗).
891
+ Finally, we continue to update the optimal energy
892
+ transmission time τ0 ∈ [0, 1] by the one-dimensional
893
+ search method. Thus, the maximum sum-rate of this
894
+ sub-problem is achieved with the optimal solution
895
+ {Φ∗
896
+ 0, τ ∗
897
+ 0 , τ ∗, p∗}. The procedure is summarized in Al-
898
+ gorithm 1.
899
+ Algorithm 1. SDP-based RIS reflecting coefficients for the WET
900
+ and resource allocation optimization
901
+ Input: w0, {wk}, {Φk}, ∀k
902
+ Output: Φ∗
903
+ 0, τ ∗
904
+ 0 , τ ∗, p∗
905
+ 1: Initialization: The maximum objective function
906
+ value Rmax = 0 and the step size δ.
907
+ 2: for τ0 = 0 : δ : 1 do
908
+ 3:
909
+ Given w0, {wk}, {Φk}, we obtain τ ′
910
+ 0, Ψ′
911
+ 0, τ ′
912
+ k,
913
+ e′
914
+ k, ∀k by solving P2-2.
915
+ 4:
916
+ Calculate R = �K
917
+ k=1 τ ′
918
+ k log
919
+
920
+ 1 + ǫk
921
+ e′
922
+ k
923
+ τ ′
924
+ k
925
+
926
+ .
927
+ 5:
928
+ if R > Rmax then
929
+ 6:
930
+ Update Rmax ← R.
931
+ 7:
932
+ Update τ0 ← τ ′
933
+ 0, Ψ0 ← Ψ′
934
+ 0, τk ← τ ′
935
+ k, ek ←
936
+ e′
937
+ k.
938
+ 8:
939
+ end if
940
+ 9: end for
941
+ 10: Obtain ˜ϕ0 from Ψ0 by Cholesky decomposition.
942
+ 11: Obtain ϕ0 from ˜ϕ0.
943
+ 12: Set Φ∗
944
+ 0 = diag((ϕH
945
+ 0 )∗).
946
+ 13: Calculate p∗
947
+ k = e∗
948
+ k/τ ∗
949
+ k.
950
+ 14: return Φ∗
951
+ 0, τ ∗
952
+ 0 , τ ∗, p∗.
953
+ 4.4 SCA-based RIS Reflecting Coefficients
954
+ Optimization for the WIT
955
+ In this sub-section, we investigate the optimization of
956
+ RIS reflecting coefficient matrix Φk in the WIT phase,
957
+ which is given by
958
+ (P3) max
959
+ Φk
960
+ K
961
+
962
+ k=1
963
+ Rk
964
+ (33)
965
+ s.t.
966
+ (9) and (11).
967
+ Note that P3 is still a non-convex optimization prob-
968
+ lem as the active RIS introduces additional noise term
969
+ in the denominator of the objective function, which re-
970
+ sults in a quadratic fractional programming problem.
971
+ In fact, the RIS reflecting coefficients include ampli-
972
+ tude reflection coefficients and phase shifts. To sim-
973
+ plify this problem, we derive the optimal phase shifts
974
+ in the closed-form and then exploit an SCA algorithm
975
+ to obtain the near-optimal amplitude reflection coeffi-
976
+ cients according to [20].
977
+ It is worth noting that P3 can be decomposed into K
978
+ 8
979
+ China Communications
980
+
981
+ independent subproblems, each of which maximizes
982
+ the SNR of Uk at the RS during τk with respect to the
983
+ RIS reflection coefficient vector ϕk. Specifically, with
984
+ w∗
985
+ k obtained in (17) and introducing some new aux-
986
+ iliary variables, the k-th SNR maximization problem
987
+ can be formulated as
988
+ γk = pk
989
+ ��bH
990
+ k ϕk + gd,k
991
+ ��2
992
+ ϕH
993
+ k Qrϕkσ2v + σ2r
994
+ ,
995
+ (34)
996
+ where gd,k
997
+ =
998
+ wH
999
+ k gd,k, gH
1000
+ r,k
1001
+ =
1002
+ wH
1003
+ k Gr, bH
1004
+ k
1005
+ =
1006
+ gH
1007
+ r,kdiag (gu,k), Qr = diag
1008
+
1009
+ |gr,k,1|2 , . . . , |gr,k,N|2�
1010
+ ,
1011
+ ∀k. Let Fk = pkGu,k + σ2
1012
+ vIN, ∀k. The subproblem
1013
+ can be expressed as
1014
+ (P4) max
1015
+ ϕk
1016
+ γk
1017
+ (35)
1018
+ s.t.
1019
+ ϕH
1020
+ k Fkϕk ≤ Pr, ∀k,
1021
+ (36)
1022
+ (9).
1023
+ To solve P4, we decompose the optimization of RIS
1024
+ reflecting coefficient vector ϕk into two sub-problems
1025
+ for the amplitude reflection coefficient design and the
1026
+ optimal phase shift design, respectively. Let ϕk =
1027
+ Θk ¯ϕk, where Θk
1028
+ =
1029
+ diag
1030
+
1031
+ ejθk,1, . . . , ejθk,N�
1032
+
1033
+ CN×N and ¯ϕk = [ak,1, . . . , ak,N]T ∈ RN×1.
1034
+ 4.4.1 Optimization of phase shifts for the WIT
1035
+ The optimal design of phase shifts is given in the fol-
1036
+ lowing proposition.
1037
+ Proposition 2. The optimal RIS phase shift of the n-th
1038
+ RE for the WIT during τk is derived as
1039
+ θ∗
1040
+ k,n = arg(gd,k) − arg(gu,k,n) + arg(gr,k,n), (37)
1041
+ ∀k, ∀n,
1042
+ where gu,k,n and gr,k,n denote the n-th element of the
1043
+ vector gu,k and gr,k, respectively.
1044
+ Proof. Please refer to Appendix B.
1045
+ 4.4.2 Optimization of amplitude reflection coeffi-
1046
+ cients for the WIT
1047
+ For P4, the optimal design of phase shifts shown in
1048
+ Proposition 2 holds because the value of the ampli-
1049
+ fication power in (9) and (36) and the noise power
1050
+ in the denominator of (34) are independent with the
1051
+ phase shift of each RE. In addition, optimizing θk,n
1052
+ is equivalent to maximizing the objective function in
1053
+ (34) [20]. With the optimal phase shifts in Proposition
1054
+ 2, we proceed to optimize the RIS amplitude reflec-
1055
+ tion coefficients for the WIT. In particular, P4 can be
1056
+ simplified as
1057
+ (P4-1) max
1058
+ ¯ϕk
1059
+ ¯γk = pk
1060
+ ��¯bH
1061
+ k ¯ϕk + |gd,k|
1062
+ ��2
1063
+ ¯ϕH
1064
+ k Qr ¯ϕkσ2v + σ2r
1065
+ (38)
1066
+ s.t.
1067
+ ¯ϕH
1068
+ k Fk ¯ϕk ≤ Pr, ∀k,
1069
+ (39)
1070
+ ak,n ≤ an,max, ∀k, ∀n,
1071
+ (40)
1072
+ where ¯γk = |γk|, and ¯bk is element-wise modulus
1073
+ of bk. To deal with the non-convexity of the objec-
1074
+ tive function (38), we introduce a new auxiliary vari-
1075
+ able nk = ¯ϕH
1076
+ k Qr ¯ϕkσ2
1077
+ v + σ2
1078
+ r, which denotes the noise
1079
+ power received at the RIS. Then, P4-1 can be con-
1080
+ verted into the following equivalent form
1081
+ (P4-2) max
1082
+ ¯γk,nk, ¯ϕk ¯γk
1083
+ (41)
1084
+ s.t.√pk
1085
+ �¯bH
1086
+ k ¯ϕk + |gd,k|
1087
+
1088
+ ≥ √nk¯γk, ∀k,
1089
+ (42)
1090
+ ¯ϕH
1091
+ k Qr ¯ϕkσ2
1092
+ v + σ2
1093
+ r ≤ nk, ∀k,
1094
+ (43)
1095
+ (39) and (40).
1096
+ However, the constraint (42) is still non-convex. To
1097
+ solve P4-1 efficiently, we exploit the SCA algorithm to
1098
+ approximate the square root by a convex upper-bound
1099
+ in each iteration. Define ¯γk(t) and nk(t) as the iter-
1100
+ ative optimization variables after the t-th step itera-
1101
+ tion. In terms of {¯γk (t) , nk (t)}, the first-order Tay-
1102
+ lor polynomial is used to approximate √nk¯γk, which
1103
+ is given by
1104
+ √nk¯γk ≤G(¯γk, nk; t)
1105
+ =
1106
+
1107
+ ¯γk(t)nk(t) + 1
1108
+ 2
1109
+ �nk(t)
1110
+ ¯γk(t)
1111
+ � 1
1112
+ 2
1113
+ [ ¯γk − ¯γk(t)]
1114
+ + 1
1115
+ 2
1116
+ � ¯γk(t)
1117
+ nk(t)
1118
+ � 1
1119
+ 2
1120
+ [n − nk(t)] .
1121
+ (44)
1122
+ Based on (44), (42) can be rewritten as
1123
+ √pk
1124
+ �¯bH
1125
+ k ¯ϕk + |gd,k|
1126
+
1127
+ ≥ G(¯γk, nk; t), ∀k.
1128
+ (45)
1129
+ China Communications
1130
+ 9
1131
+
1132
+ Then, P4-2 can be reformulated as the following
1133
+ problem
1134
+ (P4-3) max
1135
+ ¯γk,nk, ¯ϕk ¯γk,
1136
+ (46)
1137
+ s.t.(39), (40), (43) and (45).
1138
+ As P4-3 is convex and can be solved by the inter-
1139
+ point method. We then discuss the initialization of
1140
+ ¯γk(t) and nk(t). First, we propose an initial solution
1141
+ ¯ϕk(0) by solving a simple feasible version of problem
1142
+ P4-1, i.e., ¯ϕk(0), satisfying the constraints (39) and
1143
+ (40). Then, the reasonable initialization of ¯γk(0) and
1144
+ nk(0) is given by
1145
+ ¯γk(0) = pk
1146
+ ��¯bH
1147
+ k ¯ϕk(0) + |gd,k|
1148
+ ��2
1149
+ σ2v ¯ϕH
1150
+ k (0)Qr ¯ϕk(0) + σ2r
1151
+ ,
1152
+ (47)
1153
+ nk(0) = σ2
1154
+ v ¯ϕH
1155
+ k (0)Qr ¯ϕk(0) + σ2
1156
+ r.
1157
+ (48)
1158
+ With the initialization described in (47) and (48), the
1159
+ optimal amplitude reflection coefficients for the WIT,
1160
+ denoted by ¯ϕ∗
1161
+ k, can be obtained by iteratively solving
1162
+ P4-3 until the convergence is achieved. As a result, the
1163
+ RIS reflecting coefficients during τk can be calculated
1164
+ by
1165
+ Φ∗
1166
+ k = diag (Θ∗
1167
+ k ¯ϕ∗
1168
+ k) , ∀k,
1169
+ (49)
1170
+ where Θ∗
1171
+ k = diag{ejθ∗
1172
+ k,1, . . . , ejθ∗
1173
+ k,N}.
1174
+ The detailed description of optimizing the RIS re-
1175
+ flecting coefficients in P3 is summarized in the Algo-
1176
+ rithm 2.
1177
+ Algorithm 2. SCA-based RIS reflecting coefficients for the WIT
1178
+ Input: {wk}, p, ∀k
1179
+ Output: {Φ∗
1180
+ k}, ∀k
1181
+ 1: Initialization: ¯γk(t), nk(t), ¯ϕk(t), and t = 0.
1182
+ 2: Obtain θ∗
1183
+ k,n in Proposition 2 and have Θ∗
1184
+ k.
1185
+ 3: repeat
1186
+ 4:
1187
+ t = t + 1.
1188
+ 5:
1189
+ Update ¯γk(t), nk(t), ¯ϕk(t) by solving P4-3.
1190
+ 6: until the convergence is achieved.
1191
+ 7: Obtain Φ∗
1192
+ k = diag (Θ∗
1193
+ k ¯ϕ∗
1194
+ k), where ¯ϕ∗
1195
+ k = ¯ϕk(t).
1196
+ 8: return {Φ∗
1197
+ k}.
1198
+ 4.5 Algorithm Summarization and Analysis
1199
+ Based on the above analysis, the algorithm for solving
1200
+ P1 is summarized in Algorithm 3. Based on the opti-
1201
+ mality analysis,the objective function of P1 is a non-
1202
+ decreasing function. Due to the power budget con-
1203
+ straint (2), (7) and (11), the optimal objective value
1204
+ of problem P1 is bounded. Hence, the convergence
1205
+ of Algorithm 2 can be thus guaranteed, which will be
1206
+ also confirmed by numerical simulations in Section V.
1207
+ 4.5.1 Complexity Analysis
1208
+ The computational complexity of our proposed AO
1209
+ algorithm is analyzed as follows, which contains
1210
+ the linear MMSE-based receive beamforming cal-
1211
+ culation, the SDR algorithm and the SCA algo-
1212
+ rithm in each iteration.
1213
+ For the linear MMSE-
1214
+ based receive beamforming optimization, we derive
1215
+ a closed-form solution to the (17), and the approx-
1216
+ imate worst-case computational complexity is given
1217
+ by O
1218
+
1219
+ KL max(N, L)2�
1220
+ .
1221
+ According to [36], for
1222
+ the subproblem of SDP-based transmit beamform-
1223
+ ing optimization, the worst-case computational com-
1224
+ plexity is O
1225
+
1226
+ max(K, M)4.5 log(1/ǫ)
1227
+
1228
+ , where ǫ is the
1229
+ computational accuracy of the interior-point method
1230
+ in CVX. Similarly, for the SDP-based RIS reflect-
1231
+ ing coefficients for the WET and resource alloca-
1232
+ tion optimization, the worst-case computational com-
1233
+ plexity is O
1234
+
1235
+ Iτ max(N, K)4.5 log(1/ǫ)
1236
+
1237
+ , where Iτ
1238
+ is the iteration number for updating τ0.
1239
+ For the
1240
+ SCA-based RIS reflecting coefficients optimization in
1241
+ the WIT, the computational complexity is less than
1242
+ O
1243
+
1244
+ ISKN 3.5 log(N/ǫ)
1245
+
1246
+ , where IS is the iteration
1247
+ number for the SCA algorithm. Thus, the computa-
1248
+ tional complexity of the overall AO algorithm is given
1249
+ by
1250
+ O
1251
+
1252
+ IA
1253
+
1254
+ KL max(N, L)2 + max(K, M)4.5 log(1/ǫ)
1255
+ +Iτ max(N, K)4.5 log(1/ǫ) + ISKN 3.5 log(N/ǫ)
1256
+ ��
1257
+ ,
1258
+ (50)
1259
+ where IA denotes the number of iterations required for
1260
+ convergence.
1261
+ 4.5.2 Optimality Analysis
1262
+ As the formulated problem P1 is extremely non-
1263
+ convex, it is very difficult to obtain the globally op-
1264
+ timal solution. To solve P1 efficiently, we propose
1265
+ 10
1266
+ China Communications
1267
+
1268
+ an efficient AO algorithm to obtain the suboptimal so-
1269
+ lutions. Firstly, we obtain the optimal receive beam-
1270
+ forming {wk} in a closed-form, which are the globally
1271
+ optimal solutions. With the obtained receive beam-
1272
+ forming solutions, the formulated problem can be sim-
1273
+ plified but is still non-convex.
1274
+ Secondly, the SDR
1275
+ technique is adopted to optimize the transmit beam-
1276
+ forming, the RIS reflecting coefficient matrices for
1277
+ the WET phase, the transmit power at each user, and
1278
+ the network time scheduling. In particular, we prove
1279
+ the obtained solutions of P2-1 and P2-2 are rank-one.
1280
+ Since the tightness of applying SDR can be guaran-
1281
+ teed, the obtained solutions {w0, Φ0, τ, p} are glob-
1282
+ ally optimal [23]. Then, we use the one-dimensional
1283
+ search method to exploit the optimal energy trans-
1284
+ mission time τ0 by setting an appropriate step size.
1285
+ Thirdly, for the optimization of RIS reflecting coef-
1286
+ ficients for the WIT phase, we decompose P4 into two
1287
+ sub-problems. On the one hand, the optimal phase
1288
+ shifts have been derived in a closed-form which has
1289
+ been proved. On the other hand, P4-1 is solved by
1290
+ Algorithm 2, which obtains the reflection amplitudes
1291
+ of {Φk} are near-optima of the original problem [38].
1292
+ Hence, Algorithm 3 can be used to obtain the near-
1293
+ optimal solutions to P1 with a high accuracy.
1294
+ Algorithm 3. AO algorithm for P1
1295
+ 1: Initialization: w0, {wk}, Φ0, {Φk}, τ0, τ, p, ∀k.
1296
+ 2: repeat
1297
+ 3:
1298
+ Given Φk and p, update {wk} by (17).
1299
+ 4:
1300
+ Given Φ0, τ0, {Φk}, {wk}, update w0 with by
1301
+ solving P2-1.
1302
+ 5:
1303
+ Given w0, {wk}, {Φk}, update Φ0, τ0, τ and p
1304
+ by Algorithm 1.
1305
+ 6:
1306
+ Given {wk} and p, update {Φk} by Algorithm
1307
+ 2.
1308
+ 7: until �K
1309
+ k=1 Rk converged.
1310
+ 8: return w∗
1311
+ 0, {w∗
1312
+ k}, Φ∗
1313
+ 0, {Φ∗
1314
+ k}, τ ∗
1315
+ 0 , τ ∗, p∗.
1316
+ V. NUMERICAL RESULTS
1317
+ In this section, numerical results are presented to eval-
1318
+ uate the performance of the proposed scheme.
1319
+ As
1320
+ shown in Figure 3, we consider that the simulated net-
1321
+ work deployment is a 2-D coordinate system, where
1322
+ ���
1323
+ ��
1324
+ (!)
1325
+ (0,0)
1326
+ ( ", 0)
1327
+ ( #, 0)
1328
+ $(!)
1329
+ ( %, &)
1330
+ ���������
1331
+ ��
1332
+ Figure 3. Placement model of simulation setup.
1333
+ the coordinates of the PS, the RIS, and the RS are
1334
+ given as (0,0), (xr, 0), and (xs,0), respectively, the
1335
+ users are randomly deployed within a circular area
1336
+ centered at (xu, xh) with radius 1m. We follow the
1337
+ channel model considered in [29]. In particular, the
1338
+ large-scale path-loss is modeled as L = A(d/d0)−α,
1339
+ where A is the path-loss at the reference distance
1340
+ d0 = 1m and set as A = −30dB, d denotes the dis-
1341
+ tance between two nodes, and α is the path-loss expo-
1342
+ nent. For the RIS related links, the path-loss exponent
1343
+ is set as 2.2 since the location of RIS can be carefully
1344
+ designed to avoid the severe signal blockage. While
1345
+ the path-loss exponents for the RIS unrelated links are
1346
+ set as 3.5 due to the users’ random deployment. We
1347
+ assume the direct link channels follow Rayleigh fad-
1348
+ ing but the RIS related channels follow Rician fading.
1349
+ Specifically, the small-scale channel from the PS to the
1350
+ RIS can be expressed as
1351
+ Hr =
1352
+ ��
1353
+ βr
1354
+ βr + 1
1355
+ ¯
1356
+ HLoS
1357
+ r
1358
+ +
1359
+
1360
+ 1
1361
+ βr + 1
1362
+ ¯
1363
+ HNLoS
1364
+ r
1365
+
1366
+ (51)
1367
+ where βr is the Rician factor for the PS-RIS link,
1368
+ ¯
1369
+ HLoS
1370
+ r
1371
+ denotes the deterministic line of sight (LoS)
1372
+ component, and ¯
1373
+ HNLoS
1374
+ r
1375
+ denotes the non-LoS compo-
1376
+ tent with circularly symmetric complex Gaussian ran-
1377
+ dom variables with zero mean and unit variance. The
1378
+ other channels can be similarly defined. Unless oth-
1379
+ erwise stated, other parameters are given as follows:
1380
+ βr = 10 [39], ρ = 0.8, σ2
1381
+ v = σ2
1382
+ r = −90dBm,
1383
+ P0 = 20dBm [20], Pr = 20dBm, amax = 25dB
1384
+ [40], N = 10, K = 4, M = 4, L = 4, xr = 10m,
1385
+ xu = 10m, xs = 20m, and xh = 2m.
1386
+ For comparisons, we also evaluate the performance
1387
+ of the following benchmark schemes:
1388
+ (1) Active RIS-aided single-antenna WPCN scheme
1389
+ (Active-SA).
1390
+ China Communications
1391
+ 11
1392
+
1393
+ (2) Passive RIS-aided multi-antenna WPCN scheme
1394
+ (Passive-MA).
1395
+ (3) Active RIS-aided multi-antenna WPCN with uni-
1396
+ form energy beamforming scheme (Active-MA-
1397
+ UEBF).
1398
+ Notice that for the multi-antenna schemes, the num-
1399
+ ber of antennas is set as 4 in the PS and RS. In addition,
1400
+ we set the number of REs in the Passive-MA scheme
1401
+ as N = 100 to show the superiority of the proposed
1402
+ scheme.
1403
+ Before performance comparisons, we first show the
1404
+ convergence performance of the proposed AO algo-
1405
+ rithm in Figure 4. One can observe that as the num-
1406
+ ber of iterations increases, the sum-rate first increases
1407
+ but finally converges to a constant after nearly 8 iter-
1408
+ ations. This demonstrates that the convergence of the
1409
+ proposed scheme can be achieved quickly. The other
1410
+ observation is that the effect of the parameter setting
1411
+ on convergence is limited.
1412
+ 2
1413
+ 4
1414
+ 6
1415
+ 8
1416
+ 10
1417
+ 12
1418
+ Number of iterations
1419
+ 13
1420
+ 14
1421
+ 15
1422
+ 16
1423
+ 17
1424
+ 18
1425
+ 19
1426
+ 20
1427
+ 21
1428
+ 22
1429
+ 23
1430
+ Sum rate (bps/Hz)
1431
+ N=10, M=L=4
1432
+ N=10, M=L=8
1433
+ N=20, M=L=4
1434
+ N=20, M=L=8
1435
+ N=30, M=L=4
1436
+ N=30, M=L=8
1437
+ Figure 4.
1438
+ Convergence behavior of the proposed scheme
1439
+ under different parameter settings.
1440
+ Figure 5 shows the impact of the transmit power
1441
+ at the PS (i.e., P0) on the sum-rate when the RIS’s
1442
+ maximum reflecting power Pr = 10, 20 dBm and
1443
+ the RIS’s maximum amplitude reflection coefficient
1444
+ amax = 10, 25 dB, respectively. In general, the pro-
1445
+ posed scheme outperforms the Active-SA scheme with
1446
+ the same parameters, which confirms that the assis-
1447
+ tance of multiple antennas can achieve a significant
1448
+ performance gain by constructing the transmit beam-
1449
+ forming at the PS and the receive beamforming at the
1450
+ RS. For a given amax = 25 dB, our proposed scheme
1451
+ with 10 REs can achieve 415.48% performance gain
1452
+ 5
1453
+ 10
1454
+ 15
1455
+ 20
1456
+ 25
1457
+ 30
1458
+ 35
1459
+ 40
1460
+ 45
1461
+ Transmit power at the PS(dBm)
1462
+ 0
1463
+ 5
1464
+ 10
1465
+ 15
1466
+ 20
1467
+ 25
1468
+ 30
1469
+ 35
1470
+ Sum rate (bps/Hz)
1471
+ Proposed, Pr=20, amax=25
1472
+ Proposed, Pr=20, amax=10
1473
+ Proposed, Pr=10, amax=25
1474
+ Proposed, Pr=10, amax=10
1475
+ Active-SA, Pr=20, amax=25
1476
+ Active-SA, Pr=20, amax=10
1477
+ Passive-MA, N=100
1478
+ Figure 5. Sum-rate versus the transmit power at the PS.
1479
+ compared to the passive RIS scheme with 100 REs
1480
+ when P0 = 20 dBm. Indeed, the active RIS can con-
1481
+ siderably make use of its amplification characteristic
1482
+ to amplify the energy signals at low transmit power
1483
+ and thereby realize a superior capability at the cost of
1484
+ additional power consumption. For a given amax = 10
1485
+ dB, it can be seen that the sum-rates achieved by the
1486
+ proposed scheme with Pr = 20 dBm and Pr = 10
1487
+ dBm are almost the same, which implies that the am-
1488
+ plification power constraints defined in (7) and (11)
1489
+ are inactive since amax is limited for the small trans-
1490
+ mit power. Note that, the performance gap is signif-
1491
+ icant between the scheme with amax = 25 dB and
1492
+ amax = 10 dB because amax directly limits the ampli-
1493
+ tude reflection coefficient of the active RIS. In addi-
1494
+ tion, the sum-rate of the passive-MA scheme is gener-
1495
+ ally lower than the active RIS schemes with the same
1496
+ REs and the passive RIS needs to be equipped with
1497
+ more REs (e.g., 100 REs) to achieve the similar per-
1498
+ formance.
1499
+ In Figure 6, we evaluate the sum-rate versus the
1500
+ number of reflecting elements at the RIS. It can be
1501
+ seen that the proposed schemes can achieve a higher
1502
+ performance gain compared with the other benchmark
1503
+ schemes. With an increasing number of reflecting ele-
1504
+ ments, the sum-rate increases due to the fact that more
1505
+ transmission links can be provided for both the WET
1506
+ and the WIT. In addition, to investigate the best system
1507
+ performance, the maximum number of users is set to
1508
+ be equal to the number of REs. Since the active RIS
1509
+ can amplify the incident signals, a limited number of
1510
+ REs is sufficient to reach the desired SNR. Therefore,
1511
+ the size of active RIS can be reduced, making it ap-
1512
+ 12
1513
+ China Communications
1514
+
1515
+ 5
1516
+ 10
1517
+ 15
1518
+ 20
1519
+ 25
1520
+ 30
1521
+ 35
1522
+ Number of REs
1523
+ 10
1524
+ 12
1525
+ 14
1526
+ 16
1527
+ 18
1528
+ 20
1529
+ 22
1530
+ 24
1531
+ Sum rate (bps/Hz)
1532
+ Proposed, K=4
1533
+ Proposed, K=N
1534
+ Active-SA, K=4
1535
+ Active-SA, K=N
1536
+ Active-MA-UEBF, K=4
1537
+ Active-MA-UEBF, K=N
1538
+ Figure 6. Sum-rate versus number of reflecting elements at
1539
+ the RIS.
1540
+ 2
1541
+ 3
1542
+ 4
1543
+ 5
1544
+ 6
1545
+ 7
1546
+ 8
1547
+ 9
1548
+ 10
1549
+ Number of Users
1550
+ 2
1551
+ 4
1552
+ 6
1553
+ 8
1554
+ 10
1555
+ 12
1556
+ 14
1557
+ 16
1558
+ 18
1559
+ 20
1560
+ Sum rate (bps/Hz)
1561
+ Proposed
1562
+ Active-SA
1563
+ Active-MA-UEBF
1564
+ Passive-MA
1565
+ Figure 7. Sum-rate versus the number of users.
1566
+ plicable to the scenario where the space for the RIS
1567
+ deployment is limited.
1568
+ In Figure 7, we study the effect of number of user
1569
+ on the sum-rate. As the number of users increases,
1570
+ the total amount of harvested energy by users im-
1571
+ proves, which results in a higher sum-rate. Nonethe-
1572
+ less, when the number of users reaches a threshold,
1573
+ e.g.
1574
+ K = 8, the sum-rate achieved by our pro-
1575
+ posed scheme becomes to be saturated. This is due
1576
+ to the fact that the increment of number of users re-
1577
+ duces the energy transfer duration and the time allo-
1578
+ cated to each user for information transmission, which
1579
+ makes the sum-rate converge to a constant. Again,
1580
+ our proposed scheme notably outperforms the other
1581
+ benchmark schemes.
1582
+ For example, when the num-
1583
+ ber of users is K = 4, our proposed scheme can
1584
+ achieve 17.78% and 415.48% performance gain com-
1585
+ 1
1586
+ 2.5
1587
+ 4
1588
+ 5.5
1589
+ 7
1590
+ 8.5
1591
+ 10
1592
+ 11.5
1593
+ 13
1594
+ 14.5
1595
+ 16
1596
+ 17.5
1597
+ 19
1598
+ Location of RIS
1599
+ 0
1600
+ 5
1601
+ 10
1602
+ 15
1603
+ 20
1604
+ 25
1605
+ Sum rate (bps/Hz)
1606
+ Proposed
1607
+ Active-SA
1608
+ Active-MA-UEBF
1609
+ Passive-MA
1610
+ Figure 8. Sum-rate versus x-coordinate of the RIS.
1611
+ pared with the Active-SA scheme and the Passive-MA
1612
+ scheme with 100 REs, respectively.
1613
+ In Figure 8, we plot the sum-rate versus the hori-
1614
+ zontal ordinate of the RIS. As xr varies, the sum-rates
1615
+ of all schemes first increase but then decrease. Com-
1616
+ pared to the scenario that the RIS is close to the RS,
1617
+ by deploying the RIS near the PS, e.g., xr = 1, the
1618
+ sum-rate can be improved.
1619
+ It is because the users
1620
+ can harvest more energy assisted by the active RIS.
1621
+ Moreover, we can observe that the sum-rate is maxi-
1622
+ mized at xr = 10, where the reflecting link between
1623
+ the active RIS and each user is strongest so the users
1624
+ can benefit from a larger amplification and reflection
1625
+ gain. However, when the RIS is neither close to the
1626
+ PS nor the users, both the PS-RIS link and the RIS-
1627
+ users links become weak, which results in the reduce
1628
+ of harvested energy. Furthermore, since the Active-
1629
+ MA-UEBF scheme adopts the uniform energy beam-
1630
+ forming, the energy signals cannot adaptively align
1631
+ with the direction of the desired channels, which re-
1632
+ sults in a low WET efficiency. In addition, the schemes
1633
+ with the active RIS can achieve a much better perfor-
1634
+ mance than the passive RIS scheme, which demon-
1635
+ strates that the active RIS with the amplification func-
1636
+ tionality can significantly mitigates the double-fading
1637
+ effect. The above observation demonstrates that the lo-
1638
+ cation of the active RIS should be carefully designed.
1639
+ VI. CONCLUSIONS
1640
+ In this paper, we have proposed an active RIS as-
1641
+ sisted relaying scheme to enhance the performance
1642
+ of multiuser multi-antenna WPCN, which is involved
1643
+ China Communications
1644
+ 13
1645
+
1646
+ in both the WET from the PS to users and the WIT
1647
+ from users to the RS. To further enhance system per-
1648
+ formance, both transmit beamforming at the PS and
1649
+ receive beamforming at the RS have been designed.
1650
+ We have formulated a system sum-rate maximization
1651
+ problem by jointly optimizing the RIS reflection coef-
1652
+ ficients for both the WET and the WIT, transmit and
1653
+ receive beamforming vectors, transmit power at each
1654
+ user, and network time scheduling. As the formulated
1655
+ problem is non-convex, we have proposed an AO al-
1656
+ gorithm with linear MMSE, SDR and SCA techniques
1657
+ to solve it efficiently. Finally, numerical results have
1658
+ been provided to confirm the performance superiority
1659
+ of the proposed scheme.
1660
+ APPENDIX
1661
+ A. Proof of Proposition 1
1662
+ The Lagrangian function of P2-1 can be expressed as
1663
+ L =
1664
+ K
1665
+
1666
+ k=1
1667
+ λkβTr(Hd,kW0) − ξTr(W0)
1668
+ + Tr(ΩW) + δ, ∀k,
1669
+ (52)
1670
+ where λk ≥ 0, ξ ≥ 0, and Ω ∈ HM are the Lagrange
1671
+ multipliers associated with constraints (21), (22), and
1672
+ (24), respectively, δ denotes the term unrelated with
1673
+ W0. The Karush-Kuhn-Tucker (KKT) conditions of
1674
+ P2-1 are given as follows
1675
+ ∂L
1676
+ ∂W0
1677
+ =
1678
+ K
1679
+
1680
+ k=1
1681
+ λ∗
1682
+ kβHd,k − ξ∗IM + Ω∗ = 0,
1683
+ (53)
1684
+ Ω∗W ∗
1685
+ 0 = 0,
1686
+ (54)
1687
+ where λ∗
1688
+ k, ξ∗ and Ω∗ are the optimal Lagrangian mul-
1689
+ tipliers for the dual problem of P2-1. It can be proved
1690
+ that λ∗
1691
+ k > 0 and ξ∗ > 0 since the constraints (21) and
1692
+ (22)are equalities in the optimal condition. Based on
1693
+ (53) and (54), it is straightforward to obtain the fol-
1694
+ lowing equality
1695
+ (ξ∗IM −
1696
+ K
1697
+
1698
+ k=1
1699
+ λ∗
1700
+ kβHd,k)W ∗
1701
+ 0 = 0
1702
+ (55)
1703
+ According to [41], rank(ξ∗IM −�K
1704
+ k=1 λ∗
1705
+ kβHd,k) ≥
1706
+ M − 1 due to the fact that Hd,k for ∀k are indepen-
1707
+ dently distributed. Thus, from (55), we can obtain that
1708
+ rank(W0) ≤ 1. It is obvious that W0 = 0 is not
1709
+ the optimal solution to P2-1. Hence, we derive that
1710
+ rank(W0) = 1, which thus proves Proposition 1.
1711
+ B. Proof of Proposition 2
1712
+ Since Qr and Fk are diagonal matrices, we observe
1713
+ that the noise power in the denominator of (35) and the
1714
+ amplification power in (9) and (36) are independent
1715
+ of the phase shift of each RE. Therefore, maximizing
1716
+ γk with respect to Θk is equivalent to the following
1717
+ optimization problem
1718
+ (P4-4) max
1719
+ Θk
1720
+ ��bH
1721
+ k Θk ¯ϕk + gd,k
1722
+ ��2
1723
+ (56)
1724
+ s.t.
1725
+ |Θk,n| = 1, ∀k, ∀n.
1726
+ (57)
1727
+ We rewrite the objective function as
1728
+ ��bH
1729
+ k Θk ¯ϕk
1730
+ ��2 + |gd,k|2 + 2
1731
+ ��bH
1732
+ k Θk ¯ϕk
1733
+ �� |gd,k| cos α,
1734
+ (58)
1735
+ where α = arctan Im(bH
1736
+ k Θk ¯ϕk)
1737
+ Re(bH
1738
+ k Θk ¯ϕk) − arctan Im(gd,k)
1739
+ Re(gd,k).
1740
+ Obviously, the maximum of
1741
+ ��bH
1742
+ k Θk ¯ϕk + gd,k
1743
+ ��2 is
1744
+ achieved when arg(bH
1745
+ k Θk ¯ϕk) = arg(gd,k) ≜ ω.
1746
+ Let vk = [vk,1, vk,2, ..., vk,N]T ∈ RN×1 and ξk =
1747
+ diag(bH
1748
+ k ) ¯ϕk.
1749
+ As bH
1750
+ k Θk ¯ϕk = vH
1751
+ k ξk, P4-4 can be
1752
+ rewritten as
1753
+ (P4-5) max
1754
+ vk
1755
+ ��vH
1756
+ k ξk
1757
+ ��2
1758
+ (59)
1759
+ s.t.
1760
+ |vk,n| = 1, ∀k, ∀n,
1761
+ (60)
1762
+ arg(vH
1763
+ k ξk) = ω, ∀k.
1764
+ (61)
1765
+ Based on [12],
1766
+ the optimal solution to P4-
1767
+ 5 can be expressed as v∗
1768
+ k
1769
+ =
1770
+ ej(ω−arg(ξk))
1771
+ =
1772
+ ej(ω−arg(diag(bH
1773
+ k ) ¯ϕk)).
1774
+ Then, the optimal RIS phase
1775
+ shift for the n-th RE is expressed as θk,n
1776
+ =
1777
+ arg(gd,k) − arg(bH
1778
+ k,n) − arg( ¯ϕk,n). Finally, we ob-
1779
+ tain that θk,n = arg(gd,k)−arg(gu,k,n)+arg(gr,k,n),
1780
+ ∀k, ∀n. This completes the proof of Proposition 2.
1781
+ References
1782
+ [1] SOMOV A, GIAFFREDA R. Powering IoT de-
1783
+ vices: Technologies and opportunities[J]. IEEE
1784
+ IoT Newsletter, 2015.
1785
+ [2] VARSHNEY L R. Transporting information and
1786
+ energy simultaneously[C]//2008 IEEE Interna-
1787
+ 14
1788
+ China Communications
1789
+
1790
+ tional Symposium on Information Theory. IEEE,
1791
+ 2008: 1612-1616.
1792
+ [3] ZHONG C, SURAWEERA H A, ZHENG G,
1793
+ et al. Wireless information and power transfer
1794
+ with full duplex relaying[J]. IEEE Transactions
1795
+ on Communications, 2014, 62(10): 3447-3461.
1796
+ [4] WU Q, GUAN X, ZHANG R. Intelligent reflect-
1797
+ ing surface-aided wireless energy and informa-
1798
+ tion transmission: An overview[J]. Proceedings
1799
+ of the IEEE, 2021.
1800
+ [5] ZHANG R, HO C K.
1801
+ MIMO broadcasting
1802
+ for simultaneous wireless information and power
1803
+ transfer[J]. IEEE Transactions on Wireless Com-
1804
+ munications, 2013, 12(5): 1989-2001.
1805
+ [6] JU H, ZHANG R.
1806
+ Throughput maximization
1807
+ in wireless powered communication networks
1808
+ [J]. IEEE Transactions on Wireless Communi-
1809
+ cations, 2013, 13(1): 418-428.
1810
+ [7] JU H, ZHANG R.
1811
+ User cooperation in
1812
+ wireless powered communication networks[C]//
1813
+ 2014 IEEE Global Communications Conference.
1814
+ IEEE, 2014: 1430-1435.
1815
+ [8] JU H, ZHANG R. Optimal resource allocation
1816
+ in full-duplex wireless-powered communication
1817
+ network[J]. IEEE Transactions on Communica-
1818
+ tions, 2014, 62(10): 3528-3540.
1819
+ [9] KIM J, LEE H, SONG C, et al. Sum through-
1820
+ put maximization for multi-user MIMO cogni-
1821
+ tive wireless powered communication networks
1822
+ [J]. IEEE Transactions on Wireless Communica-
1823
+ tions, 2016, 16(2): 913-923.
1824
+ [10] WU Q, TAO M, NG D W K, et al.
1825
+ Energy-
1826
+ efficient resource allocation for wireless pow-
1827
+ ered communication networks[J]. IEEE Trans-
1828
+ actions on Wireless Communications, 2015, 15
1829
+ (3): 2312-2327.
1830
+ [11] WU Q, CHEN W, LI J. Wireless powered com-
1831
+ munications with initial energy: QoS guaranteed
1832
+ energy-efficient resource allocation[J].
1833
+ IEEE
1834
+ Communications Letters, 2015, 19(12): 2278-
1835
+ 2281.
1836
+ [12] WU Q, ZHANG R. Intelligent Reflecting Sur-
1837
+ face Enhanced Wireless Network via Joint Ac-
1838
+ tive and Passive Beamforming[J]. IEEE Trans-
1839
+ actions on Wireless Communications, 2019, 18
1840
+ (11): 5394-5409.
1841
+ [13] DI RENZO M, ZAPPONE A, DEBBAH M, et al.
1842
+ Smart radio environments empowered by recon-
1843
+ figurable intelligent surfaces: How it works, state
1844
+ of research, and the road ahead[J]. IEEE journal
1845
+ on selected areas in communications, 2020, 38
1846
+ (11): 2450-2525.
1847
+ [14] KUNDU N K, MCKAY M R.
1848
+ RIS-Assisted
1849
+ MISO Communication:
1850
+ Optimal Beamform-
1851
+ ers and Performance Analysis[C]//2020 IEEE
1852
+ Globecom Workshops (GC Wkshps. Taipei, Tai-
1853
+ wan: IEEE, 2020: 1-6.
1854
+ [15] ZOU Y, GONG S, XU J, et al. Wireless pow-
1855
+ ered intelligent reflecting surfaces for enhancing
1856
+ wireless communications[J]. IEEE Transactions
1857
+ on Vehicular Technology, 2020, 69(10): 12369-
1858
+ 12373.
1859
+ [16] ZHANG Z, DAI L. A joint precoding framework
1860
+ for wideband reconfigurable intelligent surface-
1861
+ aided cell-free network[J]. IEEE Transactions on
1862
+ Signal Processing, 2021, 69: 4085-4101.
1863
+ [17] LIANG Y C, CHEN J, LONG R, et al. Recon-
1864
+ figurable intelligent surfaces for smart wireless
1865
+ environments: Channel estimation, system de-
1866
+ sign and applications in 6G networks[J]. Science
1867
+ China Information Sciences, 2021, 64(10): 1-21.
1868
+ [18] YU X, JAMALI V, XU D, et al. Smart and recon-
1869
+ figurable wireless communications: From IRS
1870
+ modeling to algorithm design[J]. IEEE Wireless
1871
+ Communications, 2021, 28(6): 118-125.
1872
+ [19] ZHANG Z, DAI L, CHEN X, et al. Active RIS
1873
+ vs. passive RIS: Which will prevail in 6G?[A].
1874
+ 2021. arXiv: 2103.15154.
1875
+ [20] LONG R, LIANG Y C, PEI Y, et al.
1876
+ Active
1877
+ reconfigurable intelligent surface-aided wireless
1878
+ communications[J]. IEEE Transactions on Wire-
1879
+ less Communications, 2021, 20(8): 4962-4975.
1880
+ [21] LYU B, RAMEZANI P, HOANG D T, et al.
1881
+ Optimized Energy and Information Relaying
1882
+ in Self-Sustainable IRS-Empowered WPCN[J].
1883
+ IEEE TRANSACTIONS ON COMMUNICA-
1884
+ TIONS, 2021, 69(1): 15.
1885
+ [22] ZHENG Y, BI S, ZHANG Y J A, et al. Joint
1886
+ beamforming and power control for throughput
1887
+ maximization in IRS-assisted MISO WPCNs[J].
1888
+ IEEE Internet of Things Journal, 2021, 8(10):
1889
+ 8399-8410.
1890
+ [23] HUA M, WU Q, POOR H V. Power-Efficient
1891
+ Passive Beamforming and Resource Allocation
1892
+ for IRS-Aided WPCNs[J]. IEEE Transactions on
1893
+ Communications, 2022.
1894
+ China Communications
1895
+ 15
1896
+
1897
+ [24] XU Y, GAO Z, WANG Z, et al. RIS-enhanced
1898
+ WPCNs: Joint radio resource allocation and pas-
1899
+ sive beamforming optimization[J]. IEEE Trans-
1900
+ actions on Vehicular Technology, 2021, 70(8):
1901
+ 7980-7991.
1902
+ [25] YOU C, ZHANG R. Wireless communication
1903
+ aided by intelligent reflecting surface: Active
1904
+ or passive?[J]. IEEE Wireless Communications
1905
+ Letters, 2021, 10(12): 2659-2663.
1906
+ [26] DONG L, WANG H M, BAI J.
1907
+ Active Re-
1908
+ configurable Intelligent Surface Aided Secure
1909
+ Transmission[J]. IEEE Transactions on Vehic-
1910
+ ular Technology, 2021.
1911
+ [27] ZARGARI S, HAKIMI A, TELLAMBURA C,
1912
+ et al. Multiuser MISO PS-SWIPT Systems: Ac-
1913
+ tive or Passive RIS?[J]. IEEE Wireless Commu-
1914
+ nications Letters, 2022.
1915
+ [28] GAO Y, WU Q, ZHANG G, et al. Beamform-
1916
+ ing Optimization for Active Intelligent Reflect-
1917
+ ing Surface-Aided SWIPT[A].
1918
+ 2022.
1919
+ arXiv:
1920
+ 2203.16093.
1921
+ [29] ZENG P, QIAO D, WU Q, et al.
1922
+ Throughput
1923
+ Maximization for Active Intelligent Reflecting
1924
+ Surface Aided Wireless Powered Communica-
1925
+ tions[J].
1926
+ IEEE Wireless Communications Let-
1927
+ ters, 2022.
1928
+ [30] WU Q, ZHANG R. Weighted Sum Power Maxi-
1929
+ mization for Intelligent Reflecting Surface Aided
1930
+ SWIPT[J]. IEEE WIRELESS COMMUNICA-
1931
+ TIONS LETTERS, 2020, 9(5): 5.
1932
+ [31] HU S, WEI Z, CAI Y, et al.
1933
+ Robust and se-
1934
+ cure sum-rate maximization for multiuser MISO
1935
+ downlink systems with self-sustainable IRS[J].
1936
+ IEEE Transactions on Communications, 2021,
1937
+ 69(10): 7032-7049.
1938
+ [32] ZHENG B, ZHANG R.
1939
+ Intelligent reflect-
1940
+ ing surface-enhanced OFDM: Channel estima-
1941
+ tion and reflection optimization[J]. IEEE Wire-
1942
+ less Communications Letters, 2019, 9(4): 518-
1943
+ 522.
1944
+ [33] WU Q, ZHANG S, ZHENG B, et al.
1945
+ Intel-
1946
+ ligent reflecting surface-aided wireless commu-
1947
+ nications: A tutorial[J]. IEEE Transactions on
1948
+ Communications, 2021, 69(5): 3313-3351.
1949
+ [34] WANG Z, LIU L, CUI S.
1950
+ Channel Estima-
1951
+ tion for Intelligent Reflecting Surface Assisted
1952
+ Multiuser Communications: Framework, Algo-
1953
+ rithms, and Analysis[J]. IEEE Transactions on
1954
+ Wireless Communications, 2020, 19(10): 6607-
1955
+ 6620.
1956
+ [35] ZHENG Y, BI S, ZHANG Y J, et al.
1957
+ Intel-
1958
+ ligent reflecting surface enhanced user cooper-
1959
+ ation in wireless powered communication net-
1960
+ works[J]. IEEE Wireless Communications Let-
1961
+ ters, 2020, 9(6): 901-905.
1962
+ [36] LUO Z Q, MA W K, SO A, et al. Semidefinite
1963
+ Relaxation of Quadratic Optimization Problems
1964
+ [J]. IEEE Signal Processing Magazine, 2010, 27
1965
+ (3): 20-34.
1966
+ [37] BOYD S, BOYD S P, VANDENBERGHE L.
1967
+ Convex optimization[M]. Cambridge university
1968
+ press, 2004.
1969
+ [38] RAZAVIYAYN M. Successive Convex Approx-
1970
+ imation: Analysis and Applications[D]. Univer-
1971
+ sity of Minnesota, 2014.
1972
+ [39] GUO H, LIANG Y C, CHEN J, et al. Weighted
1973
+ Sum-Rate Maximization for Reconfigurable In-
1974
+ telligent Surface Aided Wireless Networks[J].
1975
+ IEEE Transactions on Wireless Communica-
1976
+ tions, 2020, 19(5): 3064-3076.
1977
+ [40] AMATO F, PETERSON C W, DEGNAN B P,
1978
+ et al. Tunneling RFID tags for long-range and
1979
+ low-power microwave applications[J].
1980
+ IEEE
1981
+ Journal of Radio Frequency Identification, 2018,
1982
+ 2(2): 93-103.
1983
+ [41] XU X, LIANG Y C, YANG G, et al.
1984
+ Recon-
1985
+ figurable intelligent surface empowered symbi-
1986
+ otic radio over broadcasting signals[J].
1987
+ IEEE
1988
+ Transactions on Communications, 2021, 69(10):
1989
+ 7003-7016.
1990
+ 16
1991
+ China Communications
1992
+
2tAzT4oBgHgl3EQf9P4T/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
2tAzT4oBgHgl3EQffPw3/content/2301.01448v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:52e3119012d28abcb3e31e3a4c4d7e3c4ce978b7eca9465e40953ebdeae5f93c
3
+ size 2705653
2tAzT4oBgHgl3EQffPw3/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:d2e0733b8a2cae6fef03ecad865e1bb553559562789b707c812a45b8511caeba
3
+ size 262850
39AyT4oBgHgl3EQfo_il/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:a9e9abf03196fda13fc079c01130ca85a966551d2fb0c027572d70be6b148f08
3
+ size 3670061
49FKT4oBgHgl3EQfSC3u/content/tmp_files/2301.11774v1.pdf.txt ADDED
@@ -0,0 +1,1133 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Reinforcement Learning from Diverse Human Preferences
2
+ Wanqi Xue * 1 Bo An 1 Shuicheng Yan 2 Zhongwen Xu 2
3
+ Abstract
4
+ The complexity of designing reward functions
5
+ has been a major obstacle to the wide application
6
+ of deep reinforcement learning (RL) techniques.
7
+ Describing an agent’s desired behaviors and prop-
8
+ erties can be difficult, even for experts. A new
9
+ paradigm called reinforcement learning from hu-
10
+ man preferences (or preference-based RL) has
11
+ emerged as a promising solution, in which reward
12
+ functions are learned from human preference la-
13
+ bels among behavior trajectories. However, ex-
14
+ isting methods for preference-based RL are lim-
15
+ ited by the need for accurate oracle preference
16
+ labels. This paper addresses this limitation by de-
17
+ veloping a method for crowd-sourcing preference
18
+ labels and learning from diverse human prefer-
19
+ ences. The key idea is to stabilize reward learning
20
+ through regularization and correction in a latent
21
+ space. To ensure temporal consistency, a strong
22
+ constraint is imposed on the reward model that
23
+ forces its latent space to be close to the prior distri-
24
+ bution. Additionally, a confidence-based reward
25
+ model ensembling method is designed to generate
26
+ more stable and reliable predictions. The pro-
27
+ posed method is tested on a variety of tasks in
28
+ DMcontrol and Meta-world and has shown con-
29
+ sistent and significant improvements over existing
30
+ preference-based RL algorithms when learning
31
+ from diverse feedback, paving the way for real-
32
+ world applications of RL methods.
33
+ 1. Introduction
34
+ Recent advances in reinforcement learning (RL) have
35
+ achieved remarkable success in simulated environments
36
+ such as board games (Silver et al., 2016; 2018; Moravˇc´ık
37
+ et al., 2017) and video games (Mnih et al., 2015; Vinyals
38
+ et al., 2019; Wurman et al., 2022). However, the application
39
+ *This work was done during an internship at Sea AI
40
+ Lab, Singapore 1Nanyang Technological University, Singapore
41
+ 2Sea AI Lab, Singapore.
42
+ Correspondence to:
43
+ Wanqi Xue
44
45
+ Preprint.
46
+ of RL to real-world problems remains a challenge due to
47
+ the lack of a suitable reward function (Leike et al., 2018).
48
+ On the one hand, designing a reward function to provide
49
+ dense and instructive learning signals is difficult in complex
50
+ real-world tasks (Christiano et al., 2017; Lee et al., 2021b).
51
+ On the other hand, RL agents are likely to exploit a reward
52
+ function by achieving high return in an unexpected and un-
53
+ intended manner (Leike et al., 2018; Ouyang et al., 2022).
54
+ To alleviate the problems, preference-based RL is proposed
55
+ to convey human-preferred objectives to agents (Christiano
56
+ et al., 2017; Stiennon et al., 2020), in which a (human)
57
+ teacher is requested to provide his/her preferences over pairs
58
+ of agents’ historical trajectories. Based on human feedback,
59
+ a reward model is learned and applied to provide learning
60
+ signals to agents (see Fig. 1(a)). Preference-based RL pro-
61
+ vides an effective way to learn from human intentions, rather
62
+ than explicitly designed rewards, and has demonstrated its
63
+ effectiveness in areas such as robotics control (Lee et al.,
64
+ 2021b) and dialogue systems (Ouyang et al., 2022).
65
+ Though promising, the learning of preference-based RL
66
+ heavily relies on plenty of expert feedback, which could
67
+ be prohibitively expensive. Existing works typically focus
68
+ on feedback-efficient algorithms. They investigate several
69
+ sampling and exploration strategies with the aim of finding
70
+ the most deserving queries to be labelled (Biyik & Sadigh,
71
+ 2018; Lee et al., 2021a; Liang et al., 2022). Some other
72
+ works improve feedback efficiency by learning good policy
73
+ initialization with imitation learning (Ibarz et al., 2018) and
74
+ unsupervised pre-training (Lee et al., 2021b). In addition,
75
+ semi-supervised reward learning is also used for better effi-
76
+ ciency (Park et al., 2022). Although these methods reduce
77
+ the demand for human feedback, scaling preference-based
78
+ RL to large-scale real-world problems is still difficult be-
79
+ cause the need for feedback increases significantly with the
80
+ complexity of problems.
81
+ Recently, there has been a trend to replace expensive expert
82
+ feedback with crowd-sourced data for scalability (Gerst-
83
+ grasser et al., 2022; Ouyang et al., 2022). For example,
84
+ in ChatGPT, a group of annotators are hired for providing
85
+ affordable human feedback to RL agents. The impressive
86
+ results show that preference-based RL has great potential
87
+ when sufficient human feedback is provided. Obtaining hu-
88
+ man feedback from various sources can effectively address
89
+ the issue of data scarcity in preference-based RL. However,
90
+ arXiv:2301.11774v1 [cs.LG] 27 Jan 2023
91
+
92
+ Reinforcement Learning from Diverse Human Preferences
93
+ Annotation
94
+ Reward learning
95
+ Encoder
96
+ Decoder
97
+ (a)
98
+ (b)
99
+ Figure 1. Illustration of our method. (a) There is a team of different annotators with bounded rationality to provide their preferences.
100
+ Based on the preference data, a reward model is learned and used to provide rewards to an RL agent for policy optimization. (b) The
101
+ reward models encode an input into a latent space where a strong distribution constraint is applied to address inconsistency issues.
102
+ Following that, a novel reward model ensembling method is applied to the decoders to aggregate their predictions.
103
+ this approach also brings some challenges, as the collected
104
+ preferences may be unreliable, inconsistent, or even adver-
105
+ sarial, making it difficult to optimize the policy. The diverse
106
+ nature of the feedback can make it challenging to deter-
107
+ mine the true underlying preferences and to learn from them
108
+ effectively.
109
+ In this paper, we propose a simple yet effective method to
110
+ help existing preference-based RL algorithms learn from
111
+ diverse human preferences. The key idea is to stabilize the
112
+ reward learning by regularizing and correcting its predic-
113
+ tions in a latent space. Concretely, we first map the inputs
114
+ of the reward model to a latent space, enabling the predicted
115
+ rewards to be easily manipulated by varying them in this
116
+ space. Second, to ensure temporal consistency throughout
117
+ the learning process, we impose a strong constraint on the
118
+ latent space by forcing it to be close to a prior distribution.
119
+ This prior distribution serves as a reference point, providing
120
+ a way to measure the consistency of the predicted rewards
121
+ over time. Lastly, we measure the confidence of the re-
122
+ ward model in its predictions by calculating the divergence
123
+ between its latent space and the prior distribution. Based
124
+ on this divergence, we design a confidence-based reward
125
+ model ensembling method to generate more stable and reli-
126
+ able predictions. We demonstrate the effectiveness of our
127
+ method on a variety of complex locomotion and robotic
128
+ manipulation tasks from DeepMind Control Suite (DM-
129
+ Control) (Tassa et al., 2018; Tunyasuvunakool et al., 2020)
130
+ and Meta-world (Yu et al., 2020). The results show that
131
+ our method is able to effectively recover the performance
132
+ of existing preference-based RL algorithms under diverse
133
+ preferences in all the tasks.
134
+ 2. Preliminaries
135
+ We consider the reinforcement learning (RL) framework
136
+ which is defined as a Markov Decision Process (MDP). For-
137
+ mally, an MDP is defined by a tuple ⟨S, A, r, P, γ⟩, where
138
+ S and A denote the state and action space, r(s, a) is the
139
+ reward function, P(s′|s, a) denotes the transition dynam-
140
+ ics, and γ ∈ [0, 1) is the discount factor. At each timestep
141
+ t, the agent receives the current state st ∈ S from the
142
+ environment and makes an action at ∈ A based on its
143
+ policy π(at|st). Subsequently, the environment returns a
144
+ reward rt and the next state st+1 to the agent. RL seeks
145
+ to learn a policy such that the expected cumulative return,
146
+ E
147
+ ��∞
148
+ k=0 γkr(st+k, at+k)
149
+
150
+ , is maximized.
151
+ In realistic applications, designing the reward function to
152
+ capture human intent is rather difficult. Preference-based
153
+ RL is therefore proposed to address this issue by learning
154
+ a reward function from human preferences (Akrour et al.,
155
+ 2011; Wilson et al., 2012; Christiano et al., 2017; Ibarz
156
+ et al., 2018). Specifically, there is a human teacher indi-
157
+ cating his/her preferences over pairs of segments (σ0, σ1),
158
+ where a segment is a part of the trajectory of length H, i.e.,
159
+ σ = {(s1, a1), . . . , (sH, aH)}. The preferences y could
160
+ be (0, 1), (1, 0) and (0.5, 0.5), where (0, 1) indicates σ1 is
161
+ preferred to σ0, i.e., σ1 ≻ σ0; (1, 0) indicates σ0 ≻ σ1;
162
+ and (0.5, 0.5) implies an equally preferable case. Each feed-
163
+ back is stored as a triple (σ0, σ1, y) in a preference buffer
164
+ Dp = {((σ0, σ1, y))i}N
165
+ i=1.
166
+ To learn a reward function ˆr from the labeled preferences,
167
+ similar to most prior work (Ibarz et al., 2018; Lee et al.,
168
+ 2021b;a; Liang et al., 2022; Park et al., 2022; Hejna III &
169
+ Sadigh, 2022), we define a preference predictor by following
170
+
171
+ (s, a, r(s, a), s')(s, a, s')AReinforcement Learning from Diverse Human Preferences
172
+ the Bradley-Terry model (Bradley & Terry, 1952):
173
+
174
+
175
+ σ1 ≻ σ0�
176
+ =
177
+ exp
178
+ ��H
179
+ t=1 ˆr
180
+
181
+ s1
182
+ t, a1
183
+ t; ψ
184
+ ��
185
+
186
+ i∈{0,1} exp
187
+ ��H
188
+ t=1 ˆr
189
+
190
+ si
191
+ t, ai
192
+ t; ψ
193
+ ��.
194
+ (1)
195
+ Given the preference buffer Dp, we can train the reward
196
+ function ˆr by minimizing the cross-entropy loss between the
197
+ preference predictor and the actually labeled preferences:
198
+ Ls = −
199
+ E
200
+ (σ0,σ1,y)∼Dp
201
+
202
+ y(0) log Pψ
203
+
204
+ σ0 ≻ σ1�
205
+ + y(1) log Pψ
206
+
207
+ σ1 ≻ σ0��
208
+ .
209
+ (2)
210
+ where y(0) and y(1) are the first and second element of y,
211
+ respectively. With the learned rewards, we can optimize a
212
+ policy π using any RL algorithm to maximize the expected
213
+ return (Christiano et al., 2017).
214
+ 3. Preference-based Reinforcement Learning
215
+ from Diverse Human Feedback
216
+ Preference-based RL provides an effective framework to
217
+ deliver human intentions to RL agents. In this section, we
218
+ present our algorithm which helps RL agents to learn from
219
+ human preferences that possess high diversity and incon-
220
+ sistency. The key idea of our algorithm is to stabilize the
221
+ reward learning by regularizing and correcting it in a latent
222
+ space. Specifically, we first map the input of the reward
223
+ model to a latent space so that the predicted reward can
224
+ be easily manipulated by modifying it in the latent space.
225
+ Second, to achieve temporal consistency throughout the
226
+ learning process, we impose a strong constraint on the latent
227
+ space by forcing it to be close to a prior distribution. Last,
228
+ we measure the confidence of a reward model in its predic-
229
+ tion by calculating the divergence between its latent space
230
+ and the prior distribution. Based on the divergence, we de-
231
+ sign a confidence-based reward model ensembling method
232
+ to generate more reliable and stable predictions. The overall
233
+ framework of our algorithm is presented in Figure 1.
234
+ 3.1. Manipulating Rewards within a Latent Space
235
+ Reward learning is a key problem in preference-based RL
236
+ because RL agents rely on the guidance of the learned re-
237
+ ward model for policy optimization (Silver et al., 2021).
238
+ However, learning an instructive and stable reward model
239
+ is rather difficult when human preferences possess high
240
+ diversity. If we simply minimize the loss in Eq. 2, the
241
+ generated rewards will have severe fluctuations and incon-
242
+ sistencies because the supervised signal, i.e., the collected
243
+ preferences (y), can be noisy, self-contradictory, or even
244
+ adversarial. As a result, RL agents cannot converge to a rea-
245
+ sonable policy since the learning objectives always change.
246
+ Algorithm 1 RL from Diverse Human Preferences
247
+ 1: Input: Strength of constraint φ, number of reward mod-
248
+ els N, frequency of feedback session K
249
+ 2: Initialize parameters of policy π(s, a) and the reward
250
+ model ˆr(s, a; ψ)
251
+ 3: Initialize preferences buffer Dp ← ∅ and replay buffer
252
+ Dr ← ∅
253
+ 4: for each iteration do
254
+ 5:
255
+ if iteration % K == 0 then
256
+ 6:
257
+ Sample (σ0, σ1) and query annotators for y
258
+ 7:
259
+ Store preference Dp ← Dp ∪ {(σ0, σ1, y)}
260
+ 8:
261
+ for each reward model updating step do
262
+ 9:
263
+ Sample a minibatch of preferences (σ0, σ1, y)
264
+ 10:
265
+ Optimize the reward model (Eq. 7)
266
+ 11:
267
+ end for
268
+ 12:
269
+ end if
270
+ 13:
271
+ for each timestep do
272
+ 14:
273
+ Collect s′ by taking action a ∼ π(s, a)
274
+ 15:
275
+ Store transition Dr ← Dr ∪ {(s, a, s′)}
276
+ 16:
277
+ end for
278
+ 17:
279
+ for each policy updating step do
280
+ 18:
281
+ Sample a minibatch of transitions (s, a, s′).
282
+ 19:
283
+ Measure the confidence of reward models (Eq. 8)
284
+ 20:
285
+ Relabel the transitions with ˆr(s, a; ψ) (Eq. 9)
286
+ 21:
287
+ Update the policy π(s, a) on {(s, a, ˆr(s, a), s′)}
288
+ 22:
289
+ end for
290
+ 23: end for
291
+ To deal with the problem, an intuitive solution is to correct
292
+ the predicted rewards before feeding them to the agent. Con-
293
+ ventionally, methods such as reward shaping involve adding
294
+ additional rewards or penalties to the original rewards to
295
+ guide the agent toward the desired behavior. However, the
296
+ added rewards usually introduce unintended side effects or
297
+ inconsistencies in the learning process. As a mitigation, we
298
+ propose to manipulate the rewards within a latent space,
299
+ which avoids directly changing the predictions. We adopt
300
+ an encoder-decoder structure where the encoder is used to
301
+ map the input, i.e., a state-action pair, to latent space. After
302
+ sampling a representation vector from the latent space, the
303
+ decoder is applied to map the vector back to a reward.
304
+ Formally, the encoder p(z|s, a; ψe), parameterized by ψe, is
305
+ in the form of
306
+ p(z|s, a; ψe) = N(z|f µ(s, a; ψe), f Σ(s, a; ψe)),
307
+ (3)
308
+ where N(µ, Σ) denotes a Gaussian distribution with mean
309
+ vector µ and covariance matrix Σ. The encoder consists of
310
+ two multi-layer perceptrons (MLPs) whose output gener-
311
+ ates the K-dimensional mean µ and the K × K covariance
312
+ matrix Σ, respectively. The decoder d(r|z; ψd), with pa-
313
+ rameters ψd, takes as input a sampled latent variable z and
314
+ outputs a reward. Such an encoder-decoder structure enjoys
315
+
316
+ Reinforcement Learning from Diverse Human Preferences
317
+ Figure 2. Examples for locomotion tasks and robotic manipulation
318
+ tasks we test on.
319
+ benefits under diverse human preferences: i) we can control
320
+ the fluctuations of the rewards by adjusting the distribution
321
+ of the latent space; ii) the confidence of the reward model
322
+ to its predictions can be easily measured by calculating the
323
+ divergence between different latent spaces. In the following
324
+ sections, we will elaborate on how to leverage the aforemen-
325
+ tioned advantages.
326
+ 3.2. Achieving Consistency by Imposing a Strong
327
+ Constraint
328
+ As previously mentioned, the reward model is learned under
329
+ the supervision of human feedback, which could have high
330
+ diversity if they are collected from different crowds. As a
331
+ consequence, the rewards will demonstrate severe fluctua-
332
+ tions and inconsistencies throughout the learning process.
333
+ For example, at the beginning of the training, the reward
334
+ model learns some patterns, and the policy is optimized to-
335
+ ward the corresponding objective. As the training processes,
336
+ more labeled preferences are added to the dataset and the
337
+ updated reward model can be completely different. As a
338
+ result, the reward model will make distinct predictions for
339
+ the same input at the different training stages. We found
340
+ that it is the temporal inconsistency that causes the collapse
341
+ of a policy. To alleviate the problem, we propose to impose
342
+ a constraint on the latent space so that the reward model
343
+ has a fixed optimization direction throughout the training
344
+ process. Concretely, we assume that the latent space fol-
345
+ lows a prior distribution r(z), and we try to minimize the
346
+ Kullback-Leibler (KL) divergence between the latent space
347
+ and its prior:
348
+ Lc = E(s,a)
349
+
350
+ KL(p(z|s, a; ψe)||r(z))
351
+
352
+ .
353
+ (4)
354
+ Since r(z) is pre-defined, the optimization of the encoder
355
+ will be guided toward a fixed direction, independent of how
356
+ diverse the human preferences are.
357
+ Remark 3.1. Minimizing the loss in Eq. 4 is equivalent to
358
+ minimizing the mutual information between (S, A) and Z,
359
+ which leads to a concise representation of the input.
360
+ Proof: To simplify the notation, we let variable X denote the
361
+ input pairs (S, A). Then by the definition of KL-divergence:
362
+ Lc =
363
+ ��
364
+ dx dz p(x)
365
+
366
+ p(z|x) log p(z|x)
367
+ r(z)
368
+
369
+ =
370
+ ��
371
+ dx dz p(x, z) log p(z|x) −
372
+
373
+ dz p(z) log r(z).
374
+ (5)
375
+ Since KL(p(z)|r(z)) ≥ 0, we have
376
+
377
+ dz p(z) log p(z) ≥
378
+
379
+ dz p(z) log r(z). As a result,
380
+ Lc ≥
381
+ ��
382
+ dx dz p(x, z) log p(z|x) −
383
+
384
+ dz p(z) log p(z)
385
+ = I(Z, X).
386
+ (6)
387
+ Eq. 6 shows that minimizing Lc is equivalent to minimizing
388
+ an upper bound of I(Z, X).
389
+ Overall, the loss function for the reward model is
390
+ L = φ ∗ Lc + Ls,
391
+ (7)
392
+ where φ is a parameter controlling the strength of the con-
393
+ straint. Conventionally, φ is set as a small value to confirm
394
+ that the supervised signals will not be dominated. However,
395
+ counterintuitively, we found that a large φ is crucial for
396
+ good performance. Larger φ will lead to a stronger con-
397
+ straint on the latent space. As a result, the latent space for
398
+ different inputs will be similar, and the predicted rewards
399
+ will be controlled into a smaller range. Considering that it
400
+ is relative values of rewards, not absolute values, that affect
401
+ a policy, a reward model with a smaller value range can
402
+ lead to more accurate, stable, and effective outcomes, and
403
+ therefore benefit the learning process.
404
+ 3.3. Confidence-based Reward Model Ensembling
405
+ It is common that diverse human preferences contain out-
406
+ lier data. To reduce the influence of a single data point on
407
+ the reward model, we adopt reward model ensembling to
408
+ reduce overfitting and improve stability (Lee et al., 2021b;
409
+ Liang et al., 2022). Instead of simply averaging, we design
410
+ a confidence-based ensembling mechanism to improve per-
411
+ formance. The key idea is to aggregate the predicted results
412
+ by up-weighting the reward models with higher confidence
413
+ and down-weighting those with less confidence. We first
414
+ measure the confidence level of each reward model and then
415
+ perform a weighted summation to generate the final result.
416
+ Specifically, the confidence of a reward model is measured
417
+ by calculating the KL divergence from the predicted latent
418
+ space to its prior distribution. If the KL divergence is small
419
+ which means the reward model cannot tell too much input-
420
+ specific information, the reward model has low confidence
421
+ about the input (a model tends to output the prior directly
422
+
423
+ Reinforcement Learning from Diverse Human Preferences
424
+ 0
425
+ 0.1M
426
+ 0.2M
427
+ 0.3M
428
+ 0.4M
429
+ 0.5M
430
+ Environment Steps
431
+ 0
432
+ 250
433
+ 500
434
+ 750
435
+ 1000
436
+ Episode Return
437
+ Walker
438
+ 0
439
+ 0.2M
440
+ 0.4M
441
+ 0.6M
442
+ 0.8M
443
+ 1.0M
444
+ Environment Steps
445
+ 0
446
+ 200
447
+ 400
448
+ 600
449
+ Cheetah
450
+ 0
451
+ 0.2M
452
+ 0.4M
453
+ 0.6M
454
+ 0.8M
455
+ 1.0M
456
+ Environment Steps
457
+ 0
458
+ 200
459
+ 400
460
+ 600
461
+ 800
462
+ Quadruped
463
+ 0
464
+ 0.2M
465
+ 0.4M
466
+ 0.6M
467
+ 0.8M
468
+ 1.0M
469
+ Environment Steps
470
+ 0
471
+ 25
472
+ 50
473
+ 75
474
+ 100
475
+ Success Rate (%)
476
+ Button Press
477
+ 0
478
+ 0.2M
479
+ 0.4M
480
+ 0.6M
481
+ 0.8M
482
+ 1.0M
483
+ Environment Steps
484
+ 0
485
+ 25
486
+ 50
487
+ 75
488
+ 100
489
+ Sweep Into
490
+ 0
491
+ 0.2M
492
+ 0.4M
493
+ 0.6M
494
+ 0.8M
495
+ 1.0M
496
+ Environment Steps
497
+ 0
498
+ 25
499
+ 50
500
+ 75
501
+ 100
502
+ Hammer
503
+ Oracle
504
+ Ours
505
+ PEBBLE
506
+ Figure 3. Learning curves on locomotion tasks (first row) and robotic manipulation tasks (second row). The locomotion tasks are measured
507
+ on the ground truth episode return while the robotic manipulation tasks are measured on the success rate. The solid line and shaded
508
+ regions represent the mean and standard deviation, respectively, across five runs.
509
+ if it knows nothing about the input). On the contrary, a
510
+ large KL divergence indicates a high confidence level. We
511
+ assume that the confidence is proportional to the exponent
512
+ of the KL divergence:
513
+ Gi(s, a) =
514
+ exp(KL(pi(z|s, a)||r(z)))
515
+ �N
516
+ j=1 exp(KL(pj(z|s, a)||r(z)))
517
+ ,
518
+ (8)
519
+ where Gi(s, a) denotes the confidence of the i-th reward
520
+ model to an input (s, a), N is the number of reward mod-
521
+ els. After determining the confidence of each model, we
522
+ calculate the reward by:
523
+ ˆr(s, a; ψ) =
524
+ N
525
+
526
+ i=1
527
+ Gi(s, a) ×
528
+
529
+ di ◦ qi(r|s, a)
530
+
531
+ ,
532
+ (9)
533
+ where di and qi are the decoder and the encoder of the i-th
534
+ reward model, respectively. With the reword model, we
535
+ can use any preference-based RL algorithm to learn the
536
+ policy. The full procedure of our method is summarized in
537
+ Algorithm 1.
538
+ 4. Experiments
539
+ We conduct experiments to answer the following questions:
540
+ Q1: Whether the proposed method can effectively help ex-
541
+ isting preference-based RL algorithms to learn from
542
+ diverse preferences?
543
+ Q2: How does each component of the method contribute to
544
+ the effectiveness?
545
+ Q3: How will latent spaces affect the predicted rewards?
546
+ Q4: How will the method be affected by the number of
547
+ annotators?
548
+ 4.1. Setup
549
+ We evaluate our method on several complex locomotion
550
+ tasks and robotic manipulation tasks from DeepMind Con-
551
+ trol Suite (DMControl) (Tassa et al., 2018; Tunyasuvu-
552
+ nakool et al., 2020) and Meta-world (Yu et al., 2020), respec-
553
+ tively (see Fig. 2). In order to justify the effectiveness of our
554
+ method, we train an agent to solve the tasks without observ-
555
+ ing the true rewards from the environment. Instead, several
556
+ scripted annotators are generated to provide their prefer-
557
+ ences between two trajectory segments for the agent to learn
558
+ its policy. Unlike existing preference-based RL algorithms
559
+ which interact with a single perfect scripted teacher (Chris-
560
+ tiano et al., 2017; Lee et al., 2021b; Park et al., 2022), we
561
+ consider the situation where there is a team of different an-
562
+ notators with bounded rationality to provide the preferences.
563
+ Despite being imperfect, the annotators’ preferences are
564
+ also calculated from ground truth rewards. Therefore, we
565
+ can quantitatively evaluate the method by measuring the
566
+ true episode return or success rate from the environments.
567
+ Our method can be integrated into any preference-based
568
+ RL algorithm to recover their performance under diverse
569
+ preferences. In our experiments, we choose one of the most
570
+ popular approaches, PEBBLE (Lee et al., 2021b), as the
571
+ backbone algorithm. We examine the performance of PEB-
572
+ BLE under i) a perfect scripted teacher who provides the
573
+ ground true feedback (oracle); ii) a team of randomly sam-
574
+ pled annotators whose feedback is imperfect and anisotropic.
575
+ The goal of our method is to recover the performance of
576
+ PEBBLE under the annotators as much as possible, to ap-
577
+
578
+ Reinforcement Learning from Diverse Human Preferences
579
+ 0
580
+ 0.1M
581
+ 0.2M
582
+ 0.3M
583
+ 0.4M
584
+ 0.5M
585
+ Environment Steps
586
+ 0
587
+ 500
588
+ 1000
589
+ Episode Return
590
+ Walker
591
+ 0
592
+ 0.2M
593
+ 0.4M
594
+ 0.6M
595
+ 0.8M
596
+ 1.0M
597
+ Environment Steps
598
+ 0
599
+ 200
600
+ 400
601
+ 600
602
+ Cheetah
603
+ 0
604
+ 0.2M
605
+ 0.4M
606
+ 0.6M
607
+ 0.8M
608
+ 1.0M
609
+ Environment Steps
610
+ 0
611
+ 200
612
+ 400
613
+ 600
614
+ Quadruped
615
+ 0
616
+ 0.2M
617
+ 0.4M
618
+ 0.6M
619
+ 0.8M
620
+ 1.0M
621
+ Environment Steps
622
+ 0
623
+ 25
624
+ 50
625
+ 75
626
+ 100
627
+ Success Rate (%)
628
+ Button Press
629
+ 0
630
+ 0.2M
631
+ 0.4M
632
+ 0.6M
633
+ 0.8M
634
+ 1.0M
635
+ Environment Steps
636
+ 0
637
+ 25
638
+ 50
639
+ 75
640
+ 100
641
+ Sweep Into
642
+ 0
643
+ 0.2M
644
+ 0.4M
645
+ 0.6M
646
+ 0.8M
647
+ 1.0M
648
+ Environment Steps
649
+ 0
650
+ 25
651
+ 50
652
+ 75
653
+ 100
654
+ Hammer
655
+ = 1
656
+ = 10
657
+ = 100
658
+ Figure 4. Ablation study on the strength of the latent space constraint. The locomotion tasks (first row) are measured on the ground
659
+ truth episode return while the robotic manipulation (second row) tasks are measured on the success rate. The results show the mean and
660
+ standard deviation averaged over five runs.
661
+ proach the oracle case.
662
+ Simulating the annotators. We generate the bounded ratio-
663
+ nal scripted annotators by following the previous stochastic
664
+ preference model (Lee et al., 2021a):
665
+ P
666
+
667
+ σ1 ≻ σ0�
668
+ =
669
+ exp
670
+
671
+ β �H
672
+ t=1 γH−tr
673
+
674
+ s1
675
+ t, a1
676
+ t
677
+ ��
678
+
679
+ i∈{0,1} exp
680
+
681
+ β �H
682
+ t=1 γH−tr
683
+
684
+ si
685
+ t, ai
686
+ t
687
+ ��.
688
+ (10)
689
+ r(s, a) is the ground truth reward provided by the envi-
690
+ ronment. A scripted annotator is determined by a tuple
691
+ ⟨β, γ, ϵ, δequal⟩: β is the temperature parameter that con-
692
+ trols the randomness of the stochastic preference model.
693
+ An annotator becomes perfectly rational and deterministic
694
+ as β → ∞, whereas β = 0 produces uniformly random
695
+ choices. γ controls the myopic (short-sighted) behavior of
696
+ an annotator. Annotators with small γ will emphasize more
697
+ on immediate rewards and down-weight long-term return. ϵ
698
+ describes the probability that an annotator makes a mistake,
699
+ i.e., we flip the preference with the probability of ϵ. δequal de-
700
+ notes the threshold that an annotator marks the segments as
701
+ equally preferable, i.e., an annotator provides (0.5, 0.5) as a
702
+ response if | �
703
+ t r(s1
704
+ t, a1
705
+ t) − �
706
+ t r(s0
707
+ t, a0
708
+ t)| ≤ δequal. Practi-
709
+ cally, we sample a tuple from β ∈ {∞, 1, 5}, γ ∼ U(0.8, 1),
710
+ ϵ ∼ U(0, 0.2), δequal ∼ U(0, 0.2) to generate a scripted an-
711
+ notator. For each task, we randomly generate 100 annotators
712
+ to provide feedback. Each annotator has the same probabil-
713
+ ity of being selected for annotation.
714
+ Implementation details. For all tasks, we use the same
715
+ hyperparameters used by PEBBLE, such as learning rates,
716
+ architectures of the neuron networks, and reward model
717
+ updating frequency. We adopt an uniform sampling strat-
718
+ egy, which selects queries with the same probability. At
719
+ each feedback session, a batch of 256 trajectory segments
720
+ (σ0, σ1) is sampled for annotation. The strength of con-
721
+ straint φ is set as 100 for all tasks. For simplicity, we set the
722
+ prior distribution of the latent space as standard Gaussian
723
+ where the KL-divergence from a latent space to its prior can
724
+ be easily calculated. All experimental results are reported
725
+ with the mean and standard deviation across five runs.
726
+ 4.2. Experimental Results
727
+ Locomotion tasks from DMControl.
728
+ We select three
729
+ complex environments from DMControl,
730
+ which are
731
+ Walker walk, Cheetah run, and Quadruped walk, to eval-
732
+ uate our method. As previously mentioned, PEBBLE is
733
+ used as the backbone algorithm and our method is com-
734
+ bined with PEBBLE to recover its performance under di-
735
+ verse human preferences. The first row of Fig. 3 shows the
736
+ learning curves of PEBBLE and our method when learning
737
+ from bounded rational annotators. We can find that, com-
738
+ pared to learning from a single perfect teacher (oracle), the
739
+ performance of PEBBLE (measure on true episode return)
740
+ decreases dramatically in all three tasks. For example, in
741
+ Walker walk, PEBBLE is able to achieve 1000 scores if
742
+ it learns from a single expert, whereas the value is nearly
743
+ half of the preferences are from different annotators. Such
744
+ failures show that existing preference-based RL algorithms
745
+ do not work well when the provided preferences contain
746
+ diversity and inconsistency. After integrating our method
747
+ (the red line), we can find significant performance increases
748
+ in all three tasks: our method is able to achieve almost the
749
+ same performance as the oracle in Walker walk, while the
750
+ performance gap between our method and its upper bound
751
+
752
+ Reinforcement Learning from Diverse Human Preferences
753
+ Figure 5. Analysis about the influence of φ on the reward model. First row: increasing the strength of the constraint will narrow the
754
+ value range of the predicted rewards. The reward model will also generate more distinct predictions if φ is large. Second row: the t-SNE
755
+ visualization of the latent vectors. A large φ leads to a more compact and concise pattern.
756
+ (oracle) is very narrow in Cheetah run. In Quadruped walk,
757
+ PEBBLE is unable to learn a feasible policy, while our
758
+ proposed method still achieves near-optimal performance.
759
+ Robotic manipulation tasks from Meta-world.
760
+ Meta-
761
+ world consists of 50 tasks that cover a range of fundamental
762
+ robotic manipulation skills. We consider three challenging
763
+ environments to evaluate the effectiveness of our method.
764
+ The performance is measured on success rate, i.e., if the
765
+ trained agent is able to successfully finish a task or not. Fig 3
766
+ (second row) shows the learning curves of our method as
767
+ the baselines. We can find that there is a significant perfor-
768
+ mance increase after integrating our method into PEBBLE.
769
+ The performance can be almost restored to approach the
770
+ oracles in Button Press and Hammer, while in Sweep Into,
771
+ the improvement is also non-trivial. These results again
772
+ demonstrate that our proposed method is able to effectively
773
+ help the existing preference-based RL algorithms learn from
774
+ diverse preferences.
775
+ 4.3. Ablation and Analysis
776
+ Effects of the latent space constraint. As previously in-
777
+ troduced, to achieve temporal consistency and set a fixed
778
+ optimization direction for the reward model, our method
779
+ imposes a constraint on the latent space by forcing its dis-
780
+ tribution to be close to the prior. To justify the effect of
781
+ the constraint, we implement our method with different
782
+ strengths of constraint on all six tasks. As shown in Fig. 4,
783
+ there is a significant and consistent improvement in all the
784
+ tasks as we gradually increase the strength of the constraint.
785
+ For example, in Cheetah run, when we set the strength of
786
+ 0
787
+ 100K
788
+ 200K
789
+ 300K
790
+ 400K
791
+ 500K
792
+ Environment Steps
793
+ 0
794
+ 200
795
+ 400
796
+ 600
797
+ 800
798
+ 1000
799
+ Episode Return
800
+ w/ ensembling
801
+ w/o ensembling
802
+ 0
803
+ 100K
804
+ 200K
805
+ 300K
806
+ 400K
807
+ 500K
808
+ Environment Steps
809
+ 0
810
+ 200
811
+ 400
812
+ 600
813
+ 800
814
+ 1000
815
+ KL-based
816
+ mean
817
+ Figure 6. Ablation study on reward model ensembling.
818
+ Left:
819
+ Learning curves of Walker walk with and without reward model
820
+ ensembling. Right: Learning curves of Walker walk with KL-
821
+ based model ensembling and simply averaging. The results show
822
+ the mean and standard deviation averaged over five runs.
823
+ constraint ψ to 1, 10, and 100, the performance increases
824
+ from around 200 to 400 and finally reaches near 600. This
825
+ phenomenon is a little bit counter-intuitive because, con-
826
+ ventionally, a too strong constraint is likely to misguide
827
+ the reward model and prevent it from learning from super-
828
+ vised signals. However, we found that a strong constraint on
829
+ the latent space is compulsory to help an agent learn from
830
+ diverse feedback.
831
+ Analysis about the reward model. To understand why a
832
+ strong constraint is crucial for the performance, we ana-
833
+ lyze the effect of the latent space constraint on the reward
834
+ model. Specifically, we collect 100,000 state-action pairs
835
+ from Cheetah run at different training stages and use the
836
+ reward model trained with different strengths of constraint
837
+ to predict the rewards. The predictions are presented in
838
+
839
+ Φ=l
840
+ Φ=10
841
+ Φ= 100
842
+ Predicted Rewards
843
+ 0.2
844
+ 0.0
845
+ 0.0
846
+ 0.0
847
+ -0.2
848
+ -0.2
849
+ -0.2
850
+ -0.4
851
+ -0.4
852
+ -0.4
853
+ -0.6
854
+ -0.6
855
+ 100
856
+ 100
857
+ 100
858
+ 50
859
+ 50
860
+ 50
861
+ tSNE2
862
+ 0
863
+ 0
864
+ -50
865
+ -50
866
+ -50
867
+ -100
868
+ -100
869
+ -100
870
+ -100
871
+ -50
872
+ 0
873
+ 50
874
+ 100
875
+ -100
876
+ -50
877
+ 50
878
+ 100
879
+ -100
880
+ -50
881
+ 0
882
+ 50
883
+ 100
884
+ 0
885
+ tSNE1
886
+ tSNE1
887
+ tSNE1Reinforcement Learning from Diverse Human Preferences
888
+ 0
889
+ 0.2M
890
+ 0.4M
891
+ 0.6M
892
+ 0.8M
893
+ 1.0M
894
+ Environment Steps
895
+ 0
896
+ 200
897
+ 400
898
+ 600
899
+ 800
900
+ Episode Return
901
+ Num_annotators=1
902
+ 0
903
+ 0.2M
904
+ 0.4M
905
+ 0.6M
906
+ 0.8M
907
+ 1.0M
908
+ Environment Steps
909
+ 0
910
+ 200
911
+ 400
912
+ 600
913
+ 800
914
+ Num_annotators=10
915
+ 0
916
+ 0.2M
917
+ 0.4M
918
+ 0.6M
919
+ 0.8M
920
+ 1.0M
921
+ Environment Steps
922
+ 0
923
+ 200
924
+ 400
925
+ 600
926
+ 800
927
+ Num_annotators=100
928
+ Oracle
929
+ Ours
930
+ PEBBLE
931
+ Figure 7. Learning curves of Cheetah run (a locomotion task) with preferences provided by a different number of annotators. The results
932
+ are measured on the ground truth episode return, with the solid line and shaded regions representing the mean and standard deviation,
933
+ respectively, across five runs.
934
+ the first row of Fig. 5. We can find that as we increase the
935
+ strength of constraint, the range of reward values decreases
936
+ gradually. For example, when φ = 1, the predicted rewards
937
+ are between -0.6 and 0.15, while the range is narrowed to
938
+ [−0.5, 0] when we set φ = 100. Moreover, the predicted
939
+ rewards are more distinct when φ becomes larger, which
940
+ indicates that only really good state-action pairs are given
941
+ high rewards. We also use t-SNE (Van der Maaten & Hin-
942
+ ton, 2008) to visualize the latent vector of those state-action
943
+ pairs. As in Fig. 5 (second row), the distribution of the
944
+ embeddings becomes more compact as we increase φ. Fur-
945
+ thermore, the pattern of the embeddings is more clear and
946
+ more concise when φ is large.
947
+ Effects of reward model ensembling. We investigate how
948
+ well the reward ensembling affects the performance of
949
+ our method. Fig. 6 (left) shows the learning curves of
950
+ Walker walk with and without reward model ensembling.
951
+ We can find that there is a clear performance drop if using a
952
+ single reward model. The results demonstrate that ensem-
953
+ bling the predictions of several models is helpful to stabilize
954
+ the training process if the preferences are diverse. We fur-
955
+ ther investigate whether the proposed KL-based aggregation
956
+ method is better than simply averaging. As shown in Fig. 6
957
+ (right), simply averaging will suffer severe fluctuations in
958
+ the training process, while the performance of our method
959
+ is significantly more stable and consistent.
960
+ Responses to the number of annotators. To examine how
961
+ will our algorithm respond to the number of annotators, we
962
+ implement Cheetah run with preferences provided by dif-
963
+ ferent numbers of annotators. As shown in Fig 7, when
964
+ there is only one annotator which is bounded rational, both
965
+ PEBBLE and our method perform worse than the oracle. In
966
+ these cases, the preferences are not diverse but just partially
967
+ correct. If we slightly increase the number of annotators
968
+ to ten, which introduces some diversity, our method is able
969
+ to achieve obvious improvement over PEBBLE. The per-
970
+ formance gain becomes quite significant when there are
971
+ one hundred annotators. The experiments demonstrate that
972
+ our method is suitable for situations where the provided
973
+ preferences are diverse.
974
+ 5. Related Work
975
+ The main focus in the paper is on one promising direction
976
+ which utilizes human preferences (Akrour et al., 2011; Chris-
977
+ tiano et al., 2017; Ibarz et al., 2018; Leike et al., 2018; Lee
978
+ et al., 2021b; Ouyang et al., 2022; Park et al., 2022; Liang
979
+ et al., 2022) to perform policy optimization. Christiano
980
+ et al. (2017) introduced modern deep learning techniques
981
+ to preference-based learning. Since the learning of the re-
982
+ ward function, modeled by deep neural networks, requires
983
+ a large number of preferences, recent works have typically
984
+ focused on improving the feedback efficiency of a method.
985
+ PEBBLE (Lee et al., 2021b) proposed a novel unsupervised
986
+ exploration method to pre-train the policy. SURF (Park
987
+ et al., 2022) adopted a semi-supervised reward learning
988
+ framework to leverage a large number of unlabeled samples.
989
+ Some other works improved data efficiency by introducing
990
+ additional types of feedback such as demonstrations (Ibarz
991
+ et al., 2018) or non-binary rankings (Cao et al., 2021). In
992
+ addition to that, designing intrinsic rewards to encourage
993
+ effective exploration is also investigated (Liang et al., 2022).
994
+ Despite being efficient, previous methods mainly focus on
995
+ learning from a single expert, which will severely limit the
996
+ scalability of an algorithm. In this work, we focus on learn-
997
+ ing from human preferences collected from different types
998
+ of annotators. Our method emphasizes addressing the issue
999
+ of diversity rather than feedback efficiency.
1000
+ 6. Conclusion
1001
+ In this work, we propose a simple yet effective method
1002
+ to improve the performance of preference-based RL algo-
1003
+ rithms under diverse feedback. The method maps inputs to
1004
+ a latent space imposes a constraint on the latent space to
1005
+
1006
+ Reinforcement Learning from Diverse Human Preferences
1007
+ maintain temporal consistency, and uses a confidence-based
1008
+ ensembling method to generate more stable predictions. Ex-
1009
+ tensive experiments are conducted in various environments.
1010
+ The results show that our method can significantly improve
1011
+ performance under diverse preferences in all the tasks.
1012
+ References
1013
+ Akrour, R., Schoenauer, M., and Sebag, M. Preference-
1014
+ based policy learning. In Joint European Conference
1015
+ on Machine Learning and Knowledge Discovery in
1016
+ Databases, pp. 12–27. Springer, 2011.
1017
+ Biyik, E. and Sadigh, D. Batch active preference-based
1018
+ learning of reward functions. In Conference on Robot
1019
+ Learning, pp. 519–528. PMLR, 2018.
1020
+ Bradley, R. A. and Terry, M. E. Rank analysis of incom-
1021
+ plete block designs: I. the method of paired comparisons.
1022
+ Biometrika, 39(3/4):324–345, 1952.
1023
+ Cao, Z., Wong, K., and Lin, C.-T. Weak human preference
1024
+ supervision for deep reinforcement learning. IEEE Trans-
1025
+ actions on Neural Networks and Learning Systems, 32
1026
+ (12):5369–5378, 2021.
1027
+ Christiano, P. F., Leike, J., Brown, T., Martic, M., Legg,
1028
+ S., and Amodei, D. Deep reinforcement learning from
1029
+ human preferences. Advances in neural information pro-
1030
+ cessing systems, 30, 2017.
1031
+ Gerstgrasser, M., Trivedi, R., and Parkes, D. C. Crowdplay:
1032
+ Crowdsourcing human demonstrations for offline learn-
1033
+ ing. In International Conference on Learning Represen-
1034
+ tations, 2022. URL https://openreview.net/
1035
+ forum?id=qyTBxTztIpQ.
1036
+ Hejna III, D. J. and Sadigh, D. Few-shot preference learning
1037
+ for human-in-the-loop rl. In 6th Annual Conference on
1038
+ Robot Learning, 2022.
1039
+ Ibarz, B., Leike, J., Pohlen, T., Irving, G., Legg, S., and
1040
+ Amodei, D. Reward learning from human preferences and
1041
+ demonstrations in atari. Advances in Neural Information
1042
+ Processing Systems, 31, 2018.
1043
+ Lee, K., Smith, L., Dragan, A., and Abbeel, P. B-pref:
1044
+ Benchmarking preference-based reinforcement learning.
1045
+ In Thirty-fifth Conference on Neural Information Process-
1046
+ ing Systems Datasets and Benchmarks Track (Round 1),
1047
+ 2021a.
1048
+ Lee, K., Smith, L. M., and Abbeel, P. Pebble: Feedback-
1049
+ efficient interactive reinforcement learning via relabeling
1050
+ experience and unsupervised pre-training. In Proceed-
1051
+ ings of the 38th International Conference on Machine
1052
+ Learning, pp. 6152–6163, 2021b.
1053
+ Leike, J., Krueger, D., Everitt, T., Martic, M., Maini, V., and
1054
+ Legg, S. Scalable agent alignment via reward modeling:
1055
+ a research direction. arXiv preprint arXiv:1811.07871,
1056
+ 2018.
1057
+ Liang, X., Shu, K., Lee, K., and Abbeel, P. Reward uncer-
1058
+ tainty for exploration in preference-based reinforcement
1059
+ learning. In International Conference on Learning Rep-
1060
+ resentations, 2022.
1061
+ Mnih, V., Kavukcuoglu, K., Silver, D., Rusu, A. A., Veness,
1062
+ J., Bellemare, M. G., Graves, A., Riedmiller, M., Fidje-
1063
+ land, A. K., Ostrovski, G., et al. Human-level control
1064
+ through deep reinforcement learning. Nature, 518(7540):
1065
+ 529–533, 2015.
1066
+ Moravˇc´ık, M., Schmid, M., Burch, N., Lis`y, V., Morrill, D.,
1067
+ Bard, N., Davis, T., Waugh, K., Johanson, M., and Bowl-
1068
+ ing, M. Deepstack: Expert-level artificial intelligence in
1069
+ heads-up no-limit poker. Science, 356(6337):508–513,
1070
+ 2017.
1071
+ Ouyang, L., Wu, J., Jiang, X., Almeida, D., Wainwright,
1072
+ C. L., Mishkin, P., Zhang, C., Agarwal, S., Slama,
1073
+ K., Ray, A., et al.
1074
+ Training language models to fol-
1075
+ low instructions with human feedback. arXiv preprint
1076
+ arXiv:2203.02155, 2022.
1077
+ Park, J., Seo, Y., Shin, J., Lee, H., Abbeel, P., and Lee,
1078
+ K. SURF: Semi-supervised reward learning with data
1079
+ augmentation for feedback-efficient preference-based re-
1080
+ inforcement learning. In International Conference on
1081
+ Learning Representations, 2022.
1082
+ Silver, D., Huang, A., Maddison, C. J., Guez, A., Sifre, L.,
1083
+ Van Den Driessche, G., Schrittwieser, J., Antonoglou, I.,
1084
+ Panneershelvam, V., Lanctot, M., et al. Mastering the
1085
+ game of go with deep neural networks and tree search.
1086
+ Nature, 529(7587):484–489, 2016.
1087
+ Silver, D., Hubert, T., Schrittwieser, J., Antonoglou, I., Lai,
1088
+ M., Guez, A., Lanctot, M., Sifre, L., Kumaran, D., Grae-
1089
+ pel, T., et al. A general reinforcement learning algorithm
1090
+ that masters chess, shogi, and go through self-play. Sci-
1091
+ ence, 362(6419):1140–1144, 2018.
1092
+ Silver, D., Singh, S., Precup, D., and Sutton, R. S. Reward
1093
+ is enough. Artificial Intelligence, 299:103535, 2021.
1094
+ Stiennon, N., Ouyang, L., Wu, J., Ziegler, D., Lowe, R.,
1095
+ Voss, C., Radford, A., Amodei, D., and Christiano,
1096
+ P. F. Learning to summarize with human feedback. Ad-
1097
+ vances in Neural Information Processing Systems, 33:
1098
+ 3008–3021, 2020.
1099
+ Tassa, Y., Doron, Y., Muldal, A., Erez, T., Li, Y., Casas, D.
1100
+ d. L., Budden, D., Abdolmaleki, A., Merel, J., Lefrancq,
1101
+ A., et al.
1102
+ Deepmind control suite.
1103
+ arXiv preprint
1104
+ arXiv:1801.00690, 2018.
1105
+
1106
+ Reinforcement Learning from Diverse Human Preferences
1107
+ Tunyasuvunakool, S., Muldal, A., Doron, Y., Liu, S., Bohez,
1108
+ S., Merel, J., Erez, T., Lillicrap, T., Heess, N., and Tassa,
1109
+ Y. dm control: Software and tasks for continuous control.
1110
+ Software Impacts, 6:100022, 2020.
1111
+ Van der Maaten, L. and Hinton, G. Visualizing data using
1112
+ t-sne. Journal of Machine Learning Research, 9(11),
1113
+ 2008.
1114
+ Vinyals, O., Babuschkin, I., Czarnecki, W. M., Mathieu, M.,
1115
+ Dudzik, A., Chung, J., Choi, D. H., Powell, R., Ewalds,
1116
+ T., Georgiev, P., et al. Grandmaster level in starcraft ii
1117
+ using multi-agent reinforcement learning. Nature, 575
1118
+ (7782):350–354, 2019.
1119
+ Wilson, A., Fern, A., and Tadepalli, P. A bayesian approach
1120
+ for policy learning from trajectory preference queries.
1121
+ Advances in Neural Information Processing Systems, 25,
1122
+ 2012.
1123
+ Wurman, P. R., Barrett, S., Kawamoto, K., MacGlashan, J.,
1124
+ Subramanian, K., Walsh, T. J., Capobianco, R., Devlic,
1125
+ A., Eckert, F., Fuchs, F., et al. Outracing champion gran
1126
+ turismo drivers with deep reinforcement learning. Nature,
1127
+ 602(7896):223–228, 2022.
1128
+ Yu, T., Quillen, D., He, Z., Julian, R., Hausman, K., Finn,
1129
+ C., and Levine, S. Meta-world: A benchmark and evalua-
1130
+ tion for multi-task and meta reinforcement learning. In
1131
+ Conference on Robot Learning, pp. 1094–1100. PMLR,
1132
+ 2020.
1133
+
49FKT4oBgHgl3EQfSC3u/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
4NAzT4oBgHgl3EQfD_rN/content/tmp_files/2301.00987v1.pdf.txt ADDED
The diff for this file is too large to render. See raw diff
 
4NAzT4oBgHgl3EQfD_rN/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
4dFIT4oBgHgl3EQf6yuB/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:7171eb31177c26face7730f48e1ed5fa2620a66adc313299de2a4a108019b08b
3
+ size 2687021
4dFIT4oBgHgl3EQf6yuB/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:f2b5f7bd73608b6c809b18475017412a0ffc26099289425272a1c9399086a900
3
+ size 87709
6tAzT4oBgHgl3EQfgPwz/content/2301.01464v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:3a0d78a16f9953dcd882e3e89995f1fd2f7a19bdf1f6878d74db9a1132c8949d
3
+ size 1108418
6tE2T4oBgHgl3EQfkwcv/content/tmp_files/2301.03981v1.pdf.txt ADDED
@@ -0,0 +1,617 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ The Lüscher scattering formalism on the 𝒕-channel cut
2
+ André Baião Raposo𝑎,∗ and Maxwell T. Hansen𝑎
3
+ 𝑎Higgs Centre for Theoretical Physics, School of Physics and Astronomy,
4
+ The University of Edinburgh, Edinburgh EH9 3FD, UK
5
6
+ The Lüscher scattering formalism, the standard approach for relating the discrete finite-volume
7
+ energy spectrum to two-to-two scattering amplitudes, fails when analytically continued so far below
8
+ the infinite-volume two-particle threshold that one encounters the 𝑡-channel cut. This is relevant,
9
+ especially in baryon-baryon scattering applications, as finite-volume energies can be observed in
10
+ this below-threshold regime, and it is not clear how to make use of them. In this talk, we present a
11
+ generalization of the scattering formalism that resolves this issue, allowing one to also constrain
12
+ scattering amplitudes on the 𝑡-channel cut.
13
+ 39th International Symposium on Lattice Field Theory - Lattice2022
14
+ 8-13 August 2022
15
+ Bonn, Germany
16
+ ∗Speaker
17
+ © Copyright owned by the author(s) under the terms of the Creative Commons
18
+ Attribution-NonCommercial-NoDerivatives 4.0 International License (CC BY-NC-ND 4.0).
19
+ https://pos.sissa.it/
20
+ arXiv:2301.03981v1 [hep-lat] 10 Jan 2023
21
+
22
+ The Lüscher scattering formalism on the 𝑡-channel cut
23
+ André Baião Raposo
24
+ 1.
25
+ Introduction & motivation
26
+ In recent years, there has been considerable progress in the determination of two-nucleon and
27
+ other two-baryon scattering amplitudes using numerical lattice QCD [1–9]. One of the leading
28
+ methods in these calculations is to first extract the finite-volume energy spectrum and subsequently
29
+ the scattering amplitudes via the Lüscher formalism and its extensions [10–20]. In such calculations,
30
+ each finite-volume energy level constrains or predicts the scattering matrix for all multi-hadron
31
+ channels that can physically propagate at that energy.
32
+ One limitation in all finite-volume formalisms published to date is the neglect of volume effects
33
+ associated with the 𝑡-channel (also called left-hand) cuts.1 This is most obviously a problem when
34
+ the lattice calculation predicts energies that are on top of the cut, as has recently been seen in
35
+ ref. [7]. The finite-volume formalism is manifestly not applicable here, as it leads to predictions of a
36
+ real-valued K-matrix (equivalently, a real-valued scattering phase shift) in a region where the latter
37
+ is known to be complex.
38
+ In this proceedings, we present an extension of the original formalism that can be applied on
39
+ the left-hand cut. We begin with a brief review of infinite-volume scattering theory as well as the
40
+ standard Lüscher formalism, in sections 2 and 3, respectively. In section 4, we illustrate how the
41
+ 𝑡-channel cut becomes an issue and, in section 5, we briefly describe our approach to a solution, the
42
+ full details of which will be presented in a publication (to appear). Conclusions and an outlook are
43
+ given in section 6.
44
+ 2.
45
+ Two-to-two scattering in infinite-volume
46
+ We start by reviewing a few properties of scattering amplitudes in the infinite-volume context,
47
+ making no reference yet to the finite-volume formalism. Considering two-to-two elastic scattering
48
+ of non-identical mass-degenerate spin-zero particles with physical mass 𝑀, we write the total
49
+ four-momentum in a given frame as 𝑃 = (𝐸, 𝑷) and introduce the standard Mandelstam invariants
50
+ 𝑠 and 𝑡. Mandelstam 𝑠 satisfies 𝑠 = 𝑃2 = 𝐸2 − 𝑷2 = (𝐸★)2, where 𝐸★ denotes the centre-of-mass
51
+ frame energy. Note we will use ★ to denote quantities boosted to the centre-of-mass frame.
52
+ The scattering amplitude, which we write M(𝑠, 𝑡), can be formally expressed as the sum of
53
+ all connected and amputated two-to-two Feynman diagrams, with legs amputated and set on the
54
+ mass shell (i.e. with external momenta 𝑝 having 𝑝2 = (𝑝0)2 − 𝒑2 = 𝑀2). This all-orders sum can
55
+ be organized by introducing the Bethe-Salpeter kernel, defined as the sum of all connected and
56
+ amputated two-to-two diagrams that are two-particle irreducible in the 𝑠-channel2. The amplitude
57
+ is then expressible in terms of the Bethe-Salpeter kernels and pairs of dressed propagators of the
58
+ scattering scalars, as shown in figure 1. Note that all propagators considered are taken with the
59
+ standard 𝑖𝜖 prescription, and all loop momenta are integrated over all components.
60
+ 1For ref. [21], the issue of the cut may be circumvented by working in the plane-wave basis, but this is not specifically
61
+ discussed in those proceedings.
62
+ 2In other words, the Bethe-Salpeter kernel is built from diagrams that cannot be separated into two pieces by cutting
63
+ through two propagators whose momenta sum to the total four-momentum 𝑃 = (𝐸, 𝑷).
64
+ 2
65
+
66
+ The Lüscher scattering formalism on the 𝑡-channel cut
67
+ André Baião Raposo
68
+ Figure 1: (a) Diagrammatic representation of the two-to-two scattering amplitude using Bethe-Salpeter
69
+ kernels and dressed propagators. (b) De��nition of the Bethe-Salpeter kernel as the sum of all connected
70
+ and amputated two-to-two diagrams which are two-particle irreducible in the 𝑠-channel; we assume that
71
+ self-interactions of the scattering particles are Z2-invariant, such that we consider vertices with even number
72
+ of legs only, while dashed lines denote other particles that might couple to the scattering channels of interest.
73
+ (c) Definition of the dressed propagator in terms of bare propagators and self-energy kernels. (d) Definition of
74
+ the self-energy as the sum of all one-particle irreducible diagrams, with dashed lines again denoting other
75
+ particle types that can couple to the scattering particles.
76
+ It is also instructive to define partial-wave amplitudes according to
77
+ M(𝑠, 𝑡) =
78
+
79
+ ∑︁
80
+ ℓ=0
81
+ 𝑃ℓ(cos 𝜃★)Mℓ(𝑠) ,
82
+ (1)
83
+ where 𝑃ℓ is a Legendre polynomial and 𝜃★ is the scattering angle in the centre-of-mass frame,
84
+ satisfying sin2(𝜃★/2) = −𝑡/(𝑠 − 4𝑀2).
85
+ Using the all-orders Bethe-Salpeter representation (as discussed below) or constraints based
86
+ on the unitarity of the scattering matrix, one can show that the imaginary part of Mℓ(𝑠)−1 is
87
+ independent of the details of particle interactions. The real part is then typically parameterized using
88
+ the scattering phase shift 𝛿ℓ(𝑠). We may write
89
+ Im Mℓ(𝑠)−1 = −𝜌(𝑠) Θ(𝐸★ − 2𝑀) ,
90
+ (2)
91
+ Re Mℓ(𝑠)−1 = 𝜌(𝑠) cot 𝛿ℓ(𝑠) ≡ Kℓ(𝑠)−1 ,
92
+ (3)
93
+ where 𝜌(𝑠) ≡
94
+ 𝑝★
95
+ 8𝜋𝐸★ is the phase-space factor for non-identical particles, with 𝑝★ ≡ 1
96
+ 2
97
+
98
+ 𝑠 − 4𝑀2
99
+ denoting each particle’s centre-of-mass spatial momentum magnitude, and we have defined the
100
+ K-matrix Kℓ(𝑠). This leads to the standard form of the partial-wave amplitude
101
+ Mℓ(𝑠) =
102
+ 1
103
+ Kℓ(𝑠)−1 − 𝑖𝜌(𝑠) =
104
+ 8𝜋𝐸★
105
+ 𝑝★ cot 𝛿ℓ − 𝑖𝑝★ .
106
+ (4)
107
+ One can also reach these results via the Bethe-Salpeter series of figure 1 if one defines the
108
+ K-matrix K by the same series as the amplitude M, but in which all two-particle loops are evaluated
109
+ with a principal-value prescription instead of the 𝑖𝜖 prescription. The definitions of M and K can
110
+ 3
111
+
112
+ The Lüscher scattering formalism on the 𝑡-channel cut
113
+ André Baião Raposo
114
+ then be related by writing each 𝑖𝜖-loop in terms of its real and imaginary parts. The former coincides
115
+ with the principal-value loop integral, and the latter leads to a Dirac delta function, allowing the
116
+ loop integral to be exactly evaluated.
117
+ We should emphasize that these relations hold only for (2𝑀)2 < 𝑠 < (𝐸★
118
+ inel.)2 where 𝐸inel. is
119
+ the energy of the lowest-lying inelastic threshold coupling to the channel of interest. This fact has
120
+ received significant attention for energies above 𝐸inel. (in the form of three-particle finite-volume
121
+ formalisms [22–27]), but in this work we are concerned with the range 𝑠 < (2𝑀)2. For these
122
+ sub-threshold energies, one can analytically continue the amplitude by taking −𝑖𝜌(𝑠) → |𝜌(𝑠)| in
123
+ order to remain on the physical Riemann sheet.
124
+ Such analytic continuation leads to a real-valued scattering amplitude, provided that the K-matrix
125
+ is real. When, however, we have a lighter particle that couples to the scattering channel of interest,
126
+ the K-matrix partial waves become complex-valued due to a sub-threshold branch cut, the so-called
127
+ 𝑡-channel or left-hand cut. Before turning to the consequences of the cut, we review the standard
128
+ finite-volume formalism of Lüscher and show that a real-valued K-matrix is implicitly assumed in
129
+ the sub-threshold analytic continuation, and thus that the formalism is not applicable on the left-hand
130
+ cut.
131
+ 3.
132
+ Review of the Lüscher formalism
133
+ In this section, we review the derivation of the Lüscher quantization condition [10], which has
134
+ been subsequently extended in refs. [11–20] to include all types of coupled two-particle channels.
135
+ We focus here on the case of a single channel with two mass-degenerate but non-identical spin-zero
136
+ particles.
137
+ Consider a quantum field theory defined in a finite cubic spatial volume of side-length 𝐿, with
138
+ periodic boundary conditions. This system then has a discrete 𝐿-dependent energy spectrum, and
139
+ the energies lying below the lowest-lying three- or four-particle threshold can be used to extract the
140
+ elastic two-to-two scattering amplitude. We follow closely the derivation of Kim, Sachrajda and
141
+ Sharpe [13], also used in refs. [17, 28–30]. We begin by defining a two-point correlation function
142
+ 𝐶𝐿(𝐸, 𝑷) =
143
+
144
+ 𝑑𝑥0
145
+
146
+ 𝐿
147
+ 𝑑3𝒙 𝑒−𝑖𝐸𝑥0𝑒𝑖𝑷·𝒙⟨0|TA(𝑥)A†(0)|0⟩𝐿 ,
148
+ (5)
149
+ where the subscript 𝐿 in
150
+
151
+ 𝐿 𝑑3𝒙 indicates that the integral runs over the finite volume, 𝐸 denotes the
152
+ total energy, 𝑷 is the total spatial momentum, and A(𝑥) and A†(𝑥) are annihilation and creation
153
+ operators carrying the quantum numbers of the scattering channel of interest.
154
+ One can construct a diagrammatic representation for this correlator using the ingredients already
155
+ introduced in the previous section, the Bethe-Salpeter kernel and the dressed propagator pairs. This
156
+ is known as the skeleton expansion for the correlator and is shown in figure 2. In finite volume,
157
+ spatial loop momenta are discretized as 𝒌 = 2𝜋
158
+ 𝐿 𝒏, with 𝒏 ∈ Z3, and we have spatial loop momentum
159
+ sums instead of integrals, i.e. we replace
160
+
161
+ 𝑑3𝒌
162
+ (2𝜋)3 →
163
+ 1
164
+ 𝐿3
165
+
166
+ 𝒌 ∈(2𝜋/𝐿)Z3 in all loops.
167
+ The key observation for deriving the Lüscher formalism is that not all loops have the same
168
+ volume dependence: loops with intermediate states that cannot go on shell in the energy range
169
+ considered have exponentially suppressed volume effects O(𝑒−𝑚𝐿), with 𝑚 being the mass of the
170
+ lightest particle coupled to the system, while loops with intermediate states that can go on shell
171
+ 4
172
+
173
+ The Lüscher scattering formalism on the 𝑡-channel cut
174
+ André Baião Raposo
175
+ Figure 2: Skeleton-expansion representation of the finite-volume correlator 𝐶𝐿(𝐸, 𝑷), in terms of Bethe-
176
+ Salpeter kernels and dressed propagators, as defined in figure 1. The end-cap “blobs” stand for functions
177
+ in momentum-space originating from the Fourier transforms of the creation and annihilation operators. As
178
+ discussed, one can take the kernels and dressed propagators in the expansion to be the infinite-volume objects,
179
+ as the difference between these and their finite-volume counterparts is exponentially suppressed, and thus only
180
+ the loops explicitly shown need to be treated as finite-volume loops.
181
+ receive power-like effects O(𝐿−𝑛), for some non-negative integer 𝑛. In the elastic regime, i.e. for
182
+ centre-of-mass frame energies above the two-particle threshold but below the thresholds of all other
183
+ channels, on-shell states come precisely from the loops left explicit in the skeleton expansion shown
184
+ in figure 2. Every other loop, implicitly included in either the Bethe-Salpeter kernels or the dressed
185
+ propagators, may be replaced by its infinite-volume counterpart, as the difference, which we neglect,
186
+ is exponentially suppressed in 𝐿. Thus, we effectively replace the finite-volume Bethe-Salpeter
187
+ kernels and dressed propagators with their infinite-volume counterparts.
188
+ Consider one of the two-particle loops shown in the expansion of figure 2. Its contribution can
189
+ be written as
190
+ 𝐶loop
191
+ 𝐿
192
+ (𝑃) =
193
+
194
+ 𝑑𝑘0
195
+ 2𝜋
196
+ 1
197
+ 𝐿3
198
+ ∑︁
199
+ 𝒌
200
+ L(𝑃, 𝑘) Δ(𝑘) Δ(𝑃 − 𝑘) R∗(𝑃, 𝑘) ,
201
+ (6)
202
+ with 𝑃 ≡ (𝐸, 𝑷) and loop momentum 𝑘 ≡ (𝑘0, 𝒌). The functions L and R∗ stand for the objects
203
+ before and after the given loop, Δ is a fully dressed scalar propagator (defined to have unit residue at
204
+ each pole). Performing the 𝑘0-integral and decomposing L and R in spherical harmonics with 𝑘
205
+ individually put on shell, i.e. setting 𝑘 = (𝜔(𝒌), 𝒌) with 𝜔(𝒌) ≡
206
+ √︁
207
+ 𝒌2 + 𝑀2, we can obtain
208
+ 𝐶loop
209
+ 𝐿
210
+ (𝑃) = 1
211
+ 𝐿3
212
+ ∑︁
213
+ 𝒌
214
+ Lℓ𝑚(𝑃, |𝒌★|) 𝑖Sℓ𝑚;ℓ′𝑚′(𝑃, 𝒌; 𝐿) R∗
215
+ ℓ′𝑚′(𝑃, |𝒌★|) + 𝑟(𝑃) ,
216
+ (7)
217
+ where we have introduced
218
+ Sℓ𝑚;ℓ′𝑚′(𝑃, 𝒌; 𝐿) ≡
219
+ 4𝜋𝑌ℓ𝑚( ˆ𝒌★) 𝑌∗
220
+ ℓ′𝑚′( ˆ𝒌★) 𝐻(𝒌★)
221
+ 2𝜔(𝒌) 2𝜔(𝑷 − 𝒌) (𝐸 − 𝜔(𝒌) − 𝜔(𝑷 − 𝒌))
222
+ � |𝒌★|
223
+ 𝑘★
224
+ os
225
+ �ℓ+ℓ′
226
+ ,
227
+ (8)
228
+ for later convenience. Note also that sums over the repeated indices ℓ, 𝑚 and ℓ′, 𝑚′ are implied.
229
+ The term 𝑟(𝑃) in eq. (7) is a sum over a smooth summand, leading to exponentially suppressed
230
+ finite-volume corrections, which we may neglect. The summand in the first term and, more
231
+ specifically, the quantities Sℓ𝑚;ℓ′𝑚′(𝑃, 𝒌; 𝐿), contain the pole corresponding to the two-particle
232
+ intermediate state going on-shell, as can be seen explicitly in eq. (8), and thus this term contains all
233
+ the power-like volume dependence arising from the loop we are considering.
234
+ In eq. (8), we use the notation 𝑘★
235
+ os for the value of |𝒌★| which satisfies the intermediate
236
+ two-particle state on-shell condition 𝐸★ = 2𝜔(𝒌★), equivalent to 𝐸 = 𝜔(𝒌) + 𝜔(𝑷 − 𝒌), given by
237
+ the simple relation
238
+ 𝑘★
239
+ os ≡ 1
240
+ 2
241
+ √︁
242
+ 𝑠 − 4𝑀2 = 1
243
+ 2
244
+ √︁
245
+ 𝐸2 − 𝑷2 − 4𝑀2 .
246
+ (9)
247
+ 5
248
+
249
+ The Lüscher scattering formalism on the 𝑡-channel cut
250
+ André Baião Raposo
251
+ Note that this relation fixes the magnitude of 𝒌★ at the pole, but not its direction. The barrier
252
+ factor �|𝒌★|/𝑘★
253
+ os
254
+ �ℓ+ℓ′
255
+ is introduced to ensure that no singularities arise from the spherical harmonics
256
+ 𝑌ℓ𝑚( ˆ𝒌★) and 𝑌∗
257
+ ℓ′𝑚′( ˆ𝒌★).
258
+ The function 𝐻(𝒌★) is a regulator function that takes a value of 1 for 4𝜔(𝒌★)2 = 4(|𝒌★|2+𝑀2) <
259
+ (𝐸★
260
+ inel.)2 and of 0 for 4𝜔(𝒌★)2 = 4(|𝒌★|2 + 𝑀2) > (𝐸★
261
+ uv)2, where again 𝐸inel. is the lowest lying three-
262
+ or four-particle threshold, and 𝐸★
263
+ uv is some chosen high ultraviolet cut-off. In the region between,
264
+ 𝐻(𝒌★) interpolates smoothly between the two values. This regulator function is similar to the one
265
+ found in the three-body scattering formalism of refs. [22, 23], and corresponds to a separation of
266
+ low-energy and high-energy parts of the sum, such that both parts are regulated and kept finite.3
267
+ We next reduce eq. (7) by expanding the functions Lℓ𝑚(𝑃, |𝒌★|) and R∗
268
+ ℓ′𝑚′(𝑃, |𝒌★|) about
269
+ |𝒌★| = 𝑘★
270
+ os and subtracting and adding an integral to reach
271
+ 𝐶loop
272
+ 𝐿
273
+ (𝑃) = Lℓ𝑚(𝑃, 𝑘★
274
+ os) 𝑖𝐹ℓ𝑚;ℓ′𝑚′(𝑃; 𝐿) R∗
275
+ ℓ′𝑚′(𝑃, 𝑘★
276
+ os) + 𝑟′(𝑃) ,
277
+ = Los(𝑃) 𝑖𝐹(𝑃; 𝐿) R†
278
+ os(𝑃) + 𝑟′(𝑃) ,
279
+ (10)
280
+ where we introduce the sum-integral difference
281
+ 𝐹ℓ𝑚;ℓ′𝑚′(𝑃; 𝐿) =
282
+
283
+ 1
284
+ 𝐿3
285
+ ∑︁
286
+ 𝒌
287
+ − p.v.
288
+
289
+ 𝑑3𝒌
290
+ (2𝜋)3
291
+
292
+ Sℓ𝑚;ℓ′𝑚′(𝑃, 𝒌; 𝐿) .
293
+ (11)
294
+ Here, p.v. means the integral is evaluated using a principal-value prescription. The remainder term
295
+ 𝑟′(𝑃) differs from 𝑟(𝑃), but still has the property that it contains the sum of a smooth summand
296
+ together with integrals. In the second line of eq. (10), we have defined a compact vector-matrix
297
+ notation in the angular-momentum index space.
298
+ Applying this procedure iteratively to all loops in the skeleton expansion diagrams, it can be
299
+ shown that we may write the finite-volume correlator in the form:
300
+ 𝐶𝐿(𝑃) =
301
+
302
+ ∑︁
303
+ 𝑛=0
304
+ 𝐴(𝑃) 𝑖𝐹(𝑃; 𝐿) [𝑖K(𝑃) 𝑖𝐹(𝑃; 𝐿)]𝑛 𝐴†(𝑃) + 𝐶∞(𝑃) .
305
+ (12)
306
+ The quantities in the first term are vectors or matrices in angular momentum index space: 𝐴(𝑃) and
307
+ 𝐴†(𝑃) are smooth vectors loosely corresponding to the source and sink operators and K(𝑃) is the
308
+ K-matrix introduced in the previous section (note that K is an infinite-volume scalar, and thus only
309
+ depends on 𝑠 = 𝑃2, but we keep 𝑃 as an argument for compactness of notation). Noting that the
310
+ above is a geometric series, we can sum it to obtain
311
+ 𝐶𝐿(𝑃) = 𝐴(𝑃)
312
+ 𝑖
313
+ 𝐹−1(𝑃; 𝐿) + K(𝑃) 𝐴†(𝑃) + 𝐶∞(𝑃) .
314
+ (13)
315
+ Given that we neglect exponentially suppressed volume effects, the volume dependence is entirely
316
+ contained in the 𝐹(𝑃; 𝐿) matrix.
317
+ 3It should be emphasized that we have renormalization and regularization schemes keeping the overall result finite, the
318
+ regulator function here simply ensures we have a separation of high-energy and low-energy contributions to the sum such
319
+ that both parts are finite and that the low-energy part, which contains the relevant singular behaviour, is tractable when
320
+ implemented numerically. 𝐸uv will simply be a scheme-dependence of the formalism, but should be kept high, as setting
321
+ it too low will lead to enhanced finite-volume effects.
322
+ 6
323
+
324
+ The Lüscher scattering formalism on the 𝑡-channel cut
325
+ André Baião Raposo
326
+ Using a spectral representation of the correlator, it is straightforward to show that it must have
327
+ poles at the energy levels of the finite-volume spectrum 𝐸𝑛(𝑷; 𝐿). These poles in 𝐶𝐿(𝐸, 𝑷) can
328
+ only arise from the 𝐿-dependent part of the first term, meaning that we must have
329
+ det
330
+
331
+ 𝐹−1(𝐸𝑛(𝑷; 𝐿), 𝑷; 𝐿) + K(𝐸𝑛(𝑷; 𝐿), 𝑷)
332
+
333
+ = 0 ,
334
+ (14)
335
+ at all finite-volume energy levels. This is called the Lüscher quantization condition, and it can be
336
+ used to determine K, and hence the scattering amplitude M, from the knowledge of the finite-volume
337
+ spectrum. The matrices involved in the condition (14) are formally infinite-dimensional, since the
338
+ set of possible angular momentum indices ℓ𝑚 is infinite. For practical use, we must truncate them to
339
+ the lowest harmonics, making the approximation that K vanishes for ℓ > ℓmax. We should note that
340
+ this relies on a fast convergence of the partial-wave expansion of the amplitude, such that keeping
341
+ the lowest harmonics still leads to a reasonable reconstruction of the amplitude.
342
+ 4.
343
+ The 𝑡-channel problem
344
+ The finite-volume spectrum can sometimes include energy levels that drop below the infinite-
345
+ volume elastic threshold at 𝑠 = (2𝑀)2. This can occur due to the appearance of a bound state (such
346
+ that the 𝐿 → ∞ limit gives the bound-state mass) as well as to an attractive scattering state (such that
347
+ the energy approaches 2𝑀 for 𝐿 → ∞). In many cases, the Lüscher formalism can be analytically
348
+ continued from 𝑠 > (2𝑀)2 and the sub-threshold finite-volume energy then provides an important
349
+ constraint on the K-matrix below threshold.
350
+ A subtlety arises, however, when the sub-threshold two-to-two scattering amplitude M(𝑠, 𝑡), and
351
+ therefore also the K-matrix, has a nearby 𝑡-channel cut. This is generically the case in baryon-baryon
352
+ systems, for example, where a light meson can be exchanged in the 𝑡-channel as shown in figure 3.
353
+ Taking 𝑚 and 𝑀 to be the meson and baryon masses, respectively, and assuming 𝑚 ≪ 𝑀, one finds
354
+ that a pole arises in M(𝑠, 𝑡) at 𝑡 = 𝑚2. Then, for a given fixed choice of the centre-of-mass frame
355
+ scattering angle 𝜃★, this leads to a pole in 𝑠 at
356
+ 𝑠 = 4𝑀2 −
357
+ 𝑡
358
+ sin2(𝜃★/2)
359
+ ����
360
+ 𝑡=𝑚2 = 4𝑀2 −
361
+ 𝑚2
362
+ sin2(𝜃★/2)
363
+ .
364
+ (15)
365
+ The analytic structure of the scattering amplitude for such systems is shown in figure 4(a). From
366
+ the expression, one sees that the pole position in 𝑠 varies from 𝑠 = 4𝑀2 − 𝑚2 to 𝑠 = −∞ as 𝜃★ is
367
+ varied from 0 to 𝜋. As a result, the angular-momentum projection of the scattering amplitude leads
368
+ to a branch cut running over this interval as shown in figure 4(b). Multiple meson exchanges can
369
+ also occur, leading to additional cuts in both the fixed-𝜃★ and the angular-momentum projected
370
+ amplitudes. In the latter case, these run along 𝑠 ≤ (2𝑀)2 − (𝑛𝑚)2 for 𝑛 exchanged mesons.
371
+ As stressed above, finite-volume energies can arise in the region of the branch cuts (as has
372
+ recently been identified in ref. [7]) and a naive application of the analytically continued Lüscher
373
+ formalism fails. In this work we restrict attention to the region (2𝑀)2 − (2𝑚)2 < 𝑠 < (2𝑀)2 − 𝑚2
374
+ in which only the single-meson cut arises and derive a modified version of the scattering formalism
375
+ that resolves this limitation.
376
+ 7
377
+
378
+ The Lüscher scattering formalism on the 𝑡-channel cut
379
+ André Baião Raposo
380
+ Figure 3: Meson exchanges contributing to the baryon-baryon scattering amplitude, expressed diagrammati-
381
+ cally as a dressed 𝑡-channel meson propagator (with time flowing horizontally). The exchanged meson is a
382
+ pion in the case of 𝑁𝑁 scattering or an 𝜂 meson in the case of ΛΛ scattering. In the latter case this is not the
383
+ nearest singularity for physical quark masses but can become so for heavier-than-physical masses.
384
+ Figure 4: (a) Analytic structure of the two-to-two scattering amplitude M(𝑠, 𝑡) in the complex-𝑠 plane,
385
+ for fixed centre-of-mass scattering angle 𝜃★, in the case where a lighter particle of mass 𝑚 couples to the
386
+ scattering particles of mass 𝑀. We show the infinite-volume elastic threshold (at 𝑠 = (2𝑀)2) and inelastic
387
+ threshold (at 𝑠 = (2𝑀 + 𝑚)2) and corresponding branch cuts. Below threshold, we see the 𝑡-channel exchange
388
+ pole, corresponding to 𝑡 = 𝑚2, and a lower branch cut, corresponding to two mesons being exchanged in
389
+ the 𝑡 channel. (b) Analytic structure of the amplitude when projected to definite angular momentum. The
390
+ so-called 𝑡-channel or left-hand cut, which runs down from the branch point at 𝑠 = (2𝑀)2 − 𝑚2, arises from
391
+ the 𝑡-channel pole above.
392
+ 5.
393
+ Proposed solution
394
+ The origin of the breakdown in the original formalism can be traced back to the steps between
395
+ eq. (7) and (10) in the review of section 3. In the step of replacing Lℓ𝑚(𝑃, |𝒌★|) and R∗
396
+ ℓ′𝑚′(𝑃, |𝒌★|)
397
+ with the on-shell quantities Lℓ𝑚(𝑃, 𝑘★
398
+ os) and R∗
399
+ ℓ′𝑚′(𝑃, 𝑘★
400
+ os), the derivation assumes that the product
401
+ of the two-particle pole and a given difference, e.g. Lℓ𝑚(𝑃, |𝒌★|)−Lℓ𝑚(𝑃, 𝑘★
402
+ os), is a smooth function
403
+ of 𝒌★. This step fails in the sub-threshold region due to the 𝑡-channel cut.
404
+ To handle this issue, we separate out the problematic 𝑡-channel exchanges from the Bethe-Salpeter
405
+ kernel. We define
406
+ 𝑖𝑔2𝑇(𝒌★, 𝒌′★) ≡ −𝑖𝑔2
407
+ 1
408
+ −(𝒌★ − 𝒌′★)2 − 𝑚2 + 𝑖𝜖 ,
409
+ (16)
410
+ and define a modified kernel by subtracting this from the full Bethe-Salpeter kernel as shown in
411
+ figure 5. Here, 𝑔 denotes the effective baryon-meson-baryon coupling. We emphasize that 𝑚 is the
412
+ physical mass of the meson, and thus that −𝑖𝑇 corresponds to the singular part of the fully-dressed
413
+ meson propagator. The difference between the bare and fully dressed propagators is smooth, and is
414
+ simply absorbed into the modified kernel.
415
+ 8
416
+
417
+ The Lüscher scattering formalism on the 𝑡-channel cut
418
+ André Baião Raposo
419
+ Figure 5: Separation of the standard Bethe-Salpeter kernel into a modified kernel (square box), which is safe
420
+ to put on shell, and the problematic 𝑡-channel meson exchange, represented by a meson propagator at physical
421
+ mass.
422
+ Examining the modified kernel using, for instance, the cutting rules of time-ordered perturbation
423
+ theory, shows that it can be safely evaluated at |𝒌★| = 𝑘★
424
+ os and does not possess a singularity or cut in
425
+ the region (2𝑀)2 − (2𝑚)2 < 𝑠 < (2𝑀)2 − 𝑚2. Crucially, we also note that the exchange 𝑖𝑔2𝑇 is safe
426
+ if kept partially off shell, namely if we keep at least one of the magnitudes |𝒌★| and |𝒌′★| to be real.
427
+ Recalling the expression (10) for the contribution of a skeleton expansion loop, we again
428
+ emphasize that the finite-volume frame momentum 𝒌, and hence its centre-of-mass frame counterpart
429
+ 𝒌★, are discretized and can be indexed by 𝒏 ∈ Z3. Thus, we can then treat 𝒌★ as an extra index,
430
+ writing L𝒌★ℓ𝑚 ≡ Lℓ𝑚(𝑃, |𝒌★|), R𝒌★ℓ𝑚 ≡ Rℓ𝑚(𝑃, |𝒌★|) and defining
431
+ 𝑆𝒌★ℓ𝑚;𝒌′★ℓ′𝑚′(𝑃; 𝐿) ≡ 1
432
+ 𝐿3 𝛿𝒌★𝒌′★Sℓ𝑚;ℓ′𝑚′(𝑃, 𝒌; 𝐿) ,
433
+ (17)
434
+ such that we may rewrite (10) as:
435
+ 𝐶loop
436
+ 𝐿
437
+ (𝑃) = L𝒌★ℓ𝑚(𝑃) 𝑖𝑆𝒌★ℓ𝑚;𝒌′★ℓ′𝑚′(𝑃) R𝒌′★ℓ′𝑚′(𝑃; 𝐿) + 𝑟(𝑃) ,
438
+ (18)
439
+ = L(𝑃) 𝑖𝑆(𝑃; 𝐿) R(𝑃) + 𝑟(𝑃) .
440
+ (19)
441
+ Note that, in the first line, we are now also implicitly summing over the momentum indices. In the
442
+ second line, we again employ a compact vector-matrix notation, but now in the angular momentum
443
+ plus spatial loop momentum index space.
444
+ Applying this to all loops in the skeleton expansion diagrams and rearranging by factors of
445
+ 𝑆(𝑃; 𝐿), we obtain the finite-volume correlator in the form
446
+ 𝐶𝐿(𝑃) =
447
+
448
+ ∑︁
449
+ 𝑛=0
450
+ 𝐴(𝑃) 𝑖𝑆(𝑃; 𝐿)
451
+
452
+ (𝑖 ¯𝐾 + 𝑖𝑔2𝑇(𝑃)) 𝑖𝑆(𝑃; 𝐿)
453
+ �𝑛 𝐴†(𝑃) + 𝐶 (𝑖)
454
+ ∞ (𝑃) ,
455
+ (20)
456
+ where all quantities in the first term are vectors or matrices in the angular momentum plus loop
457
+ momentum index space. Note that 𝐴(𝑃) and 𝐴†(𝑃) are different from those in (10). The matrix
458
+ 𝑖𝑔2𝑇 is the matrix of angular momentum projections of the 𝑡-channel exchange defined in (16), and
459
+ ¯𝐾(𝑃) is the sum of all possible smooth contributions one can obtain between 𝑆(𝑃; 𝐿) matrices. The
460
+ second term 𝐶 (𝑖)
461
+ ∞ (𝑃) is a collection of 𝐿-independent terms.
462
+ From the discussion above, we know it is safe to set |𝒌★| = 𝑘★
463
+ os for ¯𝐾(𝑃) and, therefore,
464
+ we can expand ¯𝐾(𝑃) about the on-shell point. We implement this by making use of a trivial
465
+ vector 𝑢 in the momentum index space, whose elements are 𝑢𝒌★ = 1, and making the substitution
466
+ ¯𝐾(𝑃) = 𝑢 ¯K(𝑃)𝑢† +
467
+ � ¯𝐾(𝑃) − 𝑢 ¯K(𝑃)𝑢†�. The matrix ¯K(𝑃) is a matrix in the angular momentum
468
+ index space only and corresponds to ¯𝐾(𝑃) with the dependence on the magnitude of spatial
469
+ momentum (through the momentum index) set to the on-shell momentum, i.e. with |𝒌★| = 𝑘★
470
+ os. The
471
+ 9
472
+
473
+ The Lüscher scattering formalism on the 𝑡-channel cut
474
+ André Baião Raposo
475
+ different terms in brackets lead to terms that are sums of smooth summands and can be shuffled into
476
+ the remainder term. This yields the following expressions for the correlator:
477
+ 𝐶𝐿(𝑃) =
478
+
479
+ ∑︁
480
+ 𝑛=0
481
+ 𝐴(𝑃) 𝑖𝑆(𝑃; 𝐿)
482
+
483
+ (𝑖𝑢 ¯K(𝑃)𝑢† + 𝑖𝑔2𝑇(𝑃)) 𝑖𝑆(𝑃; 𝐿)
484
+ �𝑛 𝐴†(𝑃) + 𝐶 (𝑖𝑖)
485
+ ∞ (𝑃) ,
486
+ (21)
487
+ = 𝐴(𝑃)
488
+ 𝑖
489
+ 𝑆−1(𝑃; 𝐿) + 𝑢 ¯K(𝑃)𝑢† + 𝑔2𝑇(𝑃)
490
+ 𝐴†(𝑃) + 𝐶 (𝑖𝑖)
491
+ ∞ (𝑃) .
492
+ (22)
493
+ Using the same arguments as in the standard derivation, we can derive a modified quantization
494
+ condition:
495
+ det
496
+
497
+ 𝑆−1(𝐸𝑛(𝑷, 𝐿), 𝑷) + 𝑢 ¯K(𝐸𝑛(𝑷, 𝐿), 𝑷)𝑢† + 𝑔2𝑇(𝐸𝑛(𝑷, 𝐿), 𝑷)
498
+
499
+ = 0 ,
500
+ (23)
501
+ at all finite-volume energy levels 𝐸𝑛(𝑷, 𝐿). Given that 𝑆−1(𝐸𝑛(𝑷, 𝐿), 𝑷) and 𝑇(𝐸𝑛(𝑷, 𝐿), 𝑷) can
502
+ be calculated numerically, one can use the knowledge of the finite-volume spectrum to obtain
503
+ ¯K(𝐸𝑛(𝑷, 𝐿), 𝑷) as well as the coupling 𝑔. This object can then be linked back to the two-to-
504
+ two scattering amplitude via integral equations, in a similar vein to the procedure used for the
505
+ three-particle scattering formalism refs. [22, 23, 31]. We leave further discussion to the upcoming
506
+ paper.
507
+ 6.
508
+ Summary & Outlook
509
+ In this proceedings, we have described our progress in addressing issues arising in the Lüscher
510
+ finite-volume scattering formalism [10] and extensions [11–20] in the case of sub-threshold finite-
511
+ volume energies appearing on the 𝑡-channel cut. This work is motivated by recent lattice calculations
512
+ in baryon-baryon systems that have observed such energy levels [7].
513
+ To present the extension we first reviewed the standard derivation, following the method of Kim,
514
+ Sachrajda, and Sharpe [13] for the case on non-identical spin-zero particles. We then identified
515
+ the step in the derivation that fails to correctly account for the sub-threshold cut and provided a
516
+ modification to address the issue. Our main result is an adapted quantization condition that applies
517
+ above and below elastic threshold, including on the cut associated with single-meson exchange,
518
+ though not on lower cuts arising from the exchange of multiple mesons.
519
+ As we have in mind applications to baryon-baryon scattering, the next step, currently ongoing,
520
+ is generalizing the derivation to particles with arbitrary intrinsic spin. Once the theoretical work is
521
+ concluded, future directions include numerical tests on mock data (e.g. in the spirit of refs. [19, 32])
522
+ and eventually applications to lattice QCD baryon-baryon data.
523
+ Acknowledgements
524
+ The authors thank Raúl Briceño, John Bulava, Evgeny Epelbaum, Drew Hanlon, Arkaitz Rodas,
525
+ Fernando Romero-López, Maxim Mai, Steve Sharpe, and Hartmut Wittig for useful discussions
526
+ including those in the context of the Bethe Forum on Multihadron Dynamics in a Box that took place
527
+ at the Bethe Center for Theoretical Physics in Bonn, Germany. M.T.H. is supported by UKRI Future
528
+ Leader Fellowship MR/T019956/1, and both M.T.H and A.B.R. are partly supported by UK STFC
529
+ grant ST/P000630/1.
530
+ 10
531
+
532
+ The Lüscher scattering formalism on the 𝑡-channel cut
533
+ André Baião Raposo
534
+ References
535
+ [1] (HAL QCD), T. Inoue, S. Aoki, T. Doi, T. Hatsuda, Y. Ikeda, N. Ishii et al., Two-Baryon
536
+ Potentials and H-Dibaryon from 3-flavor Lattice QCD Simulations, Nucl. Phys. A 881 (2012)
537
+ 28–43, [1112.5926].
538
+ [2] E. Berkowitz, T. Kurth, A. Nicholson, B. Joo, E. Rinaldi, M. Strother et al., Two-Nucleon
539
+ Higher Partial-Wave Scattering from Lattice QCD, Phys. Lett. B 765 (2017) 285–292,
540
+ [1508.00886].
541
+ [3] M. L. Wagman, F. Winter, E. Chang, Z. Davoudi, W. Detmold, K. Orginos et al.,
542
+ Baryon-Baryon Interactions and Spin-Flavor Symmetry from Lattice Quantum
543
+ Chromodynamics, Phys. Rev. D 96 (2017) 114510, [1706.06550].
544
+ [4] A. Francis, J. R. Green, P. M. Junnarkar, C. Miao, T. D. Rae and H. Wittig, Lattice QCD study
545
+ of the 𝐻 dibaryon using hexaquark and two-baryon interpolators, Phys. Rev. D 99 (2019)
546
+ 074505, [1805.03966].
547
+ [5] (HAL QCD), T. Iritani, S. Aoki, T. Doi, T. Hatsuda, Y. Ikeda, T. Inoue et al., Consistency
548
+ between Lüscher’s finite volume method and HAL QCD method for two-baryon systems in
549
+ lattice QCD, JHEP 03 (2019) 007, [1812.08539].
550
+ [6] B. Hörz et al., Two-nucleon S-wave interactions at the 𝑆𝑈(3) flavor-symmetric point with
551
+ 𝑚𝑢𝑑 ≃ 𝑚phys
552
+ 𝑠
553
+ : A first lattice QCD calculation with the stochastic Laplacian Heaviside method,
554
+ Phys. Rev. C 103 (2021) 014003, [2009.11825].
555
+ [7] J. R. Green, A. D. Hanlon, P. M. Junnarkar and H. Wittig, Weakly bound 𝐻 dibaryon from
556
+ SU(3)-flavor-symmetric QCD, Phys. Rev. Lett. 127 (2021) 242003, [2103.01054].
557
+ [8] S. Amarasinghe, R. Baghdadi, Z. Davoudi, W. Detmold, M. Illa, A. Parreno et al., A
558
+ variational study of two-nucleon systems with lattice QCD, 2108.10835.
559
+ [9] Y. Lyu, H. Tong, T. Sugiura, S. Aoki, T. Doi, T. Hatsuda et al., Optimized two-baryon
560
+ operators in lattice QCD, Phys. Rev. D 105 (2022) 074512, [2201.02782].
561
+ [10] M. Luscher, Volume Dependence of the Energy Spectrum in Massive Quantum Field Theories.
562
+ 2. Scattering States, Commun. Math. Phys. 105 (1986) 153–188.
563
+ [11] K. Rummukainen and S. A. Gottlieb, Resonance scattering phase shifts on a nonrest frame
564
+ lattice, Nucl. Phys. B 450 (1995) 397–436, [hep-lat/9503028].
565
+ [12] S. He, X. Feng and C. Liu, Two particle states and the S-matrix elements in multi-channel
566
+ scattering, JHEP 07 (2005) 011, [hep-lat/0504019].
567
+ [13] C. H. Kim, C. T. Sachrajda and S. R. Sharpe, Finite-volume effects for two-hadron states in
568
+ moving frames, Nucl. Phys. B 727 (2005) 218–243, [hep-lat/0507006].
569
+ [14] M. Lage, U.-G. Meißner and A. Rusetsky, A Method to measure the antikaon-nucleon
570
+ scattering length in lattice QCD, Phys. Lett. B681 (2009) 439–443, [0905.0069].
571
+ 11
572
+
573
+ The Lüscher scattering formalism on the 𝑡-channel cut
574
+ André Baião Raposo
575
+ [15] V. Bernard, M. Lage, U. G. Meißner and A. Rusetsky, Scalar mesons in a finite volume, JHEP
576
+ 01 (2011) 019, [1010.6018].
577
+ [16] Z. Fu, Rummukainen-Gottlieb’s formula on two-particle system with different mass, Phys. Rev.
578
+ D85 (2012) 014506, [1110.0319].
579
+ [17] M. T. Hansen and S. R. Sharpe, Multiple-channel generalization of Lellouch-Luscher formula,
580
+ Phys. Rev. D 86 (2012) 016007, [1204.0826].
581
+ [18] R. A. Briceño and Z. Davoudi, Moving multichannel systems in a finite volume with
582
+ application to proton-proton fusion, Phys. Rev. D88 (2013) 094507, [1204.1110].
583
+ [19] P. Guo, J. Dudek, R. Edwards and A. P. Szczepaniak, Coupled-channel scattering on a torus,
584
+ Phys. Rev. D 88 (2013) 014501, [1211.0929].
585
+ [20] R. A. Briceño, Two-particle multichannel systems in a finite volume with arbitrary spin, Phys.
586
+ Rev. D89 (2014) 074507, [1401.3312].
587
+ [21] L. Meng and E. Epelbaum, Quantization conditions in the finite volume within the plane wave
588
+ basis expansion, PoS LATTICE2021 (2022) 361.
589
+ [22] M. T. Hansen and S. R. Sharpe, Relativistic, model-independent, three-particle quantization
590
+ condition, Phys. Rev. D 90 (2014) 116003, [1408.5933].
591
+ [23] M. T. Hansen and S. R. Sharpe, Expressing the three-particle finite-volume spectrum in terms
592
+ of the three-to-three scattering amplitude, Phys. Rev. D 92 (2015) 114509, [1504.04248].
593
+ [24] H. W. Hammer, J. Y. Pang and A. Rusetsky, Three particle quantization condition in a finite
594
+ volume: 2. general formalism and the analysis of data, JHEP 10 (2017) 115, [1707.02176].
595
+ [25] M. Döring, H. W. Hammer, M. Mai, J. Y. Pang, t. A. Rusetsky and J. Wu, Three-body spectrum
596
+ in a finite volume: the role of cubic symmetry, Phys. Rev. D 97 (2018) 114508, [1802.03362].
597
+ [26] M. Mai and M. Döring, Three-body Unitarity in the Finite Volume, Eur. Phys. J. A 53 (2017)
598
+ 240, [1709.08222].
599
+ [27] M. Mai and M. Doring, Finite-Volume Spectrum of 𝜋+𝜋+ and 𝜋+𝜋+𝜋+ Systems, Phys. Rev. Lett.
600
+ 122 (2019) 062503, [1807.04746].
601
+ [28] R. A. Briceño and M. T. Hansen, Multichannel 0 → 2 and 1 → 2 transition amplitudes for
602
+ arbitrary spin particles in a finite volume, Phys. Rev. D 92 (2015) 074509, [1502.04314].
603
+ [29] R. A. Briceño and M. T. Hansen, Relativistic, model-independent, multichannel 2 → 2
604
+ transition amplitudes in a finite volume, Phys. Rev. D 94 (2016) 013008, [1509.08507].
605
+ [30] R. A. Briceno, J. J. Dudek and R. D. Young, Scattering processes and resonances from lattice
606
+ QCD, Rev. Mod. Phys. 90 (2018) 025001, [1706.06223].
607
+ 12
608
+
609
+ The Lüscher scattering formalism on the 𝑡-channel cut
610
+ André Baião Raposo
611
+ [31] R. A. Briceño, M. T. Hansen and S. R. Sharpe, Numerical study of the relativistic three-body
612
+ quantization condition in the isotropic approximation, Phys. Rev. D 98 (2018) 014506,
613
+ [1803.04169].
614
+ [32] R. A. Briceño, J. J. Dudek and L. Leskovec, Constraining 1 + J → 2 coupled-channel
615
+ amplitudes in finite-volume, Phys. Rev. D 104 (2021) 054509, [2105.02017].
616
+ 13
617
+
6tE2T4oBgHgl3EQfkwcv/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
89FJT4oBgHgl3EQfoCxt/content/tmp_files/2301.11594v1.pdf.txt ADDED
The diff for this file is too large to render. See raw diff
 
89FJT4oBgHgl3EQfoCxt/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
9dE4T4oBgHgl3EQfDQsU/content/2301.04867v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:2fb9efd2868bc37c46b350ac1bfc493d500429886a408e72284e719006e68316
3
+ size 279238
9dE4T4oBgHgl3EQfDQsU/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:0fa3e2fb0218e59e8c12f5aabb14ea97b6de4720987cafd6c5b9581cec5d531a
3
+ size 147089
AtE2T4oBgHgl3EQfRQeF/content/2301.03779v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:b3ec8d45db5029d28e2b7b4df284da5d45b066448e9cd8012aca82a1f4f1cd00
3
+ size 364045
AtE2T4oBgHgl3EQfRQeF/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:ec011ed714740effe3358d266f860932a78c051d1b43a3413efdce837353bd71
3
+ size 786477
AtE2T4oBgHgl3EQfRQeF/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:f721cc91a09cfeb866e065fc80e4fc94c32005bb7fb3c3ec1f4f5dd3992a409b
3
+ size 37959
BNE1T4oBgHgl3EQfpQVQ/content/2301.03329v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:b7fcea1d1a97a1b86ae095d144d6fbcbd83f07281b35ae6a28a211d77ad7f00e
3
+ size 193529
BNE1T4oBgHgl3EQfpQVQ/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:3960113452c58eb4b75306660e4f73b43e742864e741db9110b440ce73c029f7
3
+ size 2162733
BtAzT4oBgHgl3EQfwP4g/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:da97ed4206bd45bea3b7fd376d12810115cfc6b8dc8e0a55c1a5e996a6b47dec
3
+ size 175103
CNE3T4oBgHgl3EQfUQpw/content/2301.04449v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:f639744157191dae28ecf3346ced098d3313480d076fc50600f10b72f791b369
3
+ size 1893644
CNE3T4oBgHgl3EQfUQpw/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:38e80dcc02740486d1a6b2f8909a58811bbcec501068f680c51c82e43bec74dc
3
+ size 5308461
CtFJT4oBgHgl3EQfAiym/content/2301.11421v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:4996fc0398b8a08613a4307c19af922c7f28e05923732f9bcf79498bcf15a343
3
+ size 3221931
CtFJT4oBgHgl3EQfAiym/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:5b6c2ca1b800f5bd8c42e5a69a8349423452461abda0195b5604ac9cfe51e086
3
+ size 2490413
E9AzT4oBgHgl3EQfiv2Y/content/tmp_files/2301.01505v1.pdf.txt ADDED
@@ -0,0 +1,1036 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Privacy Considerations for Risk-Based Authentication Systems
2
+ Stephan Wiefling∗, Jan Tolsdorf, and Luigi Lo Iacono
3
+ H-BRS University of Applied Sciences, Sankt Augustin, Germany
4
+ ∗Ruhr University Bochum, Bochum, Germany
5
+ {stephan.wiefling,jan.tolsdorf,luigi.lo iacono}@h-brs.de
6
+ 2021 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)
7
+ © 2022 Stephan Wiefling, Jan Tolsdorf, Luigi Lo Iacono
8
+ Open Access version of a paper published at IWPE ’21.
9
+ DOI: 10.1109/EuroSPW54576.2021.00040
10
+ Abstract—Risk-based authentication (RBA) extends authen-
11
+ tication mechanisms to make them more robust against ac-
12
+ count takeover attacks, such as those using stolen passwords.
13
+ RBA is recommended by NIST and NCSC to strengthen
14
+ password-based authentication, and is already used by major
15
+ online services. Also, users consider RBA to be more usable
16
+ than two-factor authentication and just as secure. However,
17
+ users currently obtain RBA’s high security and usability
18
+ benefits at the cost of exposing potentially sensitive personal
19
+ data (e.g., IP address or browser information). This conflicts
20
+ with user privacy and requires to consider user rights
21
+ regarding the processing of personal data.
22
+ We outline potential privacy challenges regarding differ-
23
+ ent attacker models and propose improvements to balance
24
+ privacy in RBA systems. To estimate the properties of the
25
+ privacy-preserving RBA enhancements in practical environ-
26
+ ments, we evaluated a subset of them with long-term data
27
+ from 780 users of a real-world online service. Our results
28
+ show the potential to increase privacy in RBA solutions.
29
+ However, it is limited to certain parameters that should guide
30
+ RBA design to protect privacy. We outline research directions
31
+ that need to be considered to achieve a widespread adoption
32
+ of privacy preserving RBA with high user acceptance.
33
+ Index Terms—Password, Risk-based Authentication, Usable
34
+ Security and Privacy, Big Data Analysis
35
+ 1. Introduction
36
+ Passwords are still predominant for authentication with
37
+ online services [25], although new threats are constantly
38
+ emerging. Credential stuffing and password spraying at-
39
+ tacks [14] use leaked login credentials (username and
40
+ password) sourced from data breaches, and try them
41
+ in some way on (other) online services. These attacks
42
+ are very popular today [2] since attackers can automate
43
+ them with little effort. Major online services responded
44
+ to this threat with implementing risk-based authentication
45
+ (RBA) [36], aiming to strengthen password-based authen-
46
+ tication with little impact on the user.
47
+ Risk-Based Authentication (RBA). RBA determines
48
+ whether a login attempt is a legitimate one or an account
49
+ takeover attempt. To do so, RBA monitors additional
50
+ features when users submit their login credentials. Popular
51
+ features range from network (e.g., IP address), device
52
+ This research was supported by the research training group “Human
53
+ Centered Systems Security” (NERD.NRW) sponsored by the state of
54
+ North Rhine-Westphalia.
55
+ (e.g., smartphone model and operating system), or client
56
+ (e.g., browser vendor and version), to (behavioral) biomet-
57
+ ric information (e.g., login time) [34], [36]. Based on the
58
+ feature values and those of previous logins, RBA calcu-
59
+ lates a risk score. An access threshold typically classifies
60
+ the score into low, medium, and high risk [12], [15], [21].
61
+ On a low risk (e.g., usual device and location), the RBA
62
+ system grants access with no further intervention. On a
63
+ medium or higher risk (e.g., unusual device and location),
64
+ RBA requests additional information from the user, e.g.,
65
+ verifying the email address. After providing the correct
66
+ proof, access is granted.
67
+ RBA is considered a scalable interim solution when
68
+ passwords cannot simply be replaced by more secure
69
+ authentication methods in many cases [34], [35]. The
70
+ National Institute of Standards and Technology (NIST,
71
+ USA) and National Cyber Security Centre (NCSC, UK)
72
+ recommend RBA to mitigate attacks involving stolen pass-
73
+ words [13], [23]. Beyond that, users found RBA more
74
+ usable than equivalent two-factor authentication (2FA)
75
+ variants and comparably secure [35]. Also, in contrast to
76
+ 2FA, RBA both offers good security and rarely requests
77
+ additional authentication in practice [34], reducing the
78
+ burden on users.
79
+ Research Questions. However, users obtain the security
80
+ and usability gain of RBA at the cost of disclosing more
81
+ potentially sensitive data with a personal reference, such
82
+ as IP addresses and browser identifiers. Therefore, user
83
+ privacy is at risk when RBA databases are forwarded
84
+ or breached, as additional data besides usernames would
85
+ potentially allow to identify individuals.
86
+ More and more data protection laws aim to protect
87
+ users from massive data collection by online services.
88
+ Considering that, we wondered whether and to what extent
89
+ the integration of RBA systems complies with the princi-
90
+ ples of modern data protection. We also wondered which
91
+ trade-offs are possible to balance security and privacy
92
+ goals.
93
+ To further investigate RBA’s privacy aspects, we for-
94
+ mulated the following research questions:
95
+ RQ1: a) In what ways can RBA features be stored to
96
+ increase the user privacy?
97
+ b) How can RBA features be stored to protect user
98
+ privacy in terms of data breaches?
99
+ RQ2: To what extent can a RBA feature maintain good
100
+ security while preserving privacy in practice?
101
+ Contributions. We propose and discuss five privacy en-
102
+ hancements that can be used by RBA models used by the
103
+ arXiv:2301.01505v1 [cs.CR] 4 Jan 2023
104
+
105
+ majority of deployments found in practice. To estimate
106
+ their usefulness in practice, we evaluated a subset of these
107
+ enhancements on a RBA feature that is highly relevant
108
+ in terms of security and privacy, i.e., the IP address. We
109
+ evaluated with a data set containing the login history of
110
+ 780 users on a real-world online service for over 1.8 years.
111
+ Our results show for the first time that it is possible to
112
+ increase feature privacy while maintaining RBA’s security
113
+ and usability properties. However, increasing privacy is
114
+ limited to certain conditions that need to be considered
115
+ while designing the RBA system. We also identified future
116
+ challenges and research directions that might arise with a
117
+ widespread RBA adoption in the future.
118
+ The results support service owners to provide data pro-
119
+ tection compliant RBA solutions. They assist developers
120
+ in designing RBA implementations with increased privacy.
121
+ Researchers gain insights on how RBA can become more
122
+ privacy friendly, and further research directions.
123
+ 2. Background
124
+ In the following section, we provide a brief introduc-
125
+ tion to RBA and explain how the use of RBA correlates
126
+ with the several privacy principles defined by industry
127
+ standards and legislation.
128
+ 2.1. RBA Model
129
+ Since RBA is not a standardized procedure, multiple
130
+ solutions exist in practice. We focus on the implementa-
131
+ tion by Freeman et al. [12], since it performed best in a
132
+ previous study [34]. Also, this RBA model is known to be
133
+ widely used, e.g., by popular online services like Amazon,
134
+ Google, and LinkedIn [34], [36].
135
+ The model calculates the risk score S for a user u and
136
+ a set of feature values (FV 1, ..., FV d) with d features as:
137
+ Su(FV ) =
138
+ � d
139
+
140
+ k=1
141
+ p(FV k)
142
+ p(FV k|u, legit)
143
+
144
+ p(u|attack)
145
+ p(u|legit)
146
+ (1)
147
+ S has the probabilities p(FV k) that a feature value
148
+ appears in the global login history of all users, and
149
+ p(FV k|u, legit) that a legitimate user has this feature
150
+ value in its own login history. The probability p(u|attack)
151
+ describes how likely the user is being attacked, and
152
+ p(u|legit) describes how likely the legitimate user is
153
+ logging in.
154
+ 2.2. Regulatory Foundations
155
+ In the past few years, the introduction of new data
156
+ protection laws, such as the General Data Protection Reg-
157
+ ulation (GDPR) [8] and the California Consumer Privacy
158
+ Act (CCPA) [30], dramatically changed the way online
159
+ services (i.e., data controllers) process their users’ data.
160
+ Formerly loose recommendations on handling user data
161
+ have been replaced by clear and binding data protec-
162
+ tion principles, which data controllers must adhere to.
163
+ However, the details and scope of the principles vary
164
+ between jurisdictions. For internationally operating data
165
+ controllers, this poses the problem that their data process-
166
+ ing operations must be designed to be compatible with
167
+ different requirements. Fortunately, the privacy framework
168
+ specified in ISO 29100:2011 [16] already compiles an
169
+ intersection of privacy principles from data protection
170
+ laws worldwide. Thus, it provides data controllers a solid
171
+ basis for designing legally compliant data processing op-
172
+ erations that can be tailored to the details of different
173
+ jurisdictions. We outline the requirements for the design
174
+ of RBA systems based on the privacy principles defined
175
+ in ISO 29100:2011, aiming at compatibility with different
176
+ jurisdictions.
177
+ Applicability of Privacy Principles. Generally speaking,
178
+ the privacy principles defined in established privacy laws
179
+ and frameworks aim to protect the privacy of individuals.
180
+ Thus, they only apply to data with a personal reference.
181
+ Such data are called, e.g., “personal data” (GDPR [8]),
182
+ “personal information” (CCPA [30]), or “personally iden-
183
+ tifiable information” (PII) (ISO [16]). The definitions are
184
+ very similar and usually refer to “any information that
185
+ (a) can be used to identify [an individual] to whom such
186
+ information relates, or (b) is or might be directly or
187
+ indirectly linked to [an individual]” [16].
188
+ The data processed by RBA certainly fall within this
189
+ definition, since implementations rely on features that
190
+ already serve as (unique) identifiers by themselves (e.g.,
191
+ IP address) [36]. Also, the risk score calculated by RBA
192
+ represents an identifier by itself, as it constitutes a set
193
+ of characteristics that uniquely identifies an individual.
194
+ Therefore, RBA has to comply with ISO 29100:2011’s
195
+ privacy principles discussed below.
196
+ Consent and Choice. In general, data controllers must
197
+ ensure the lawfulness of data processing. While most
198
+ jurisdictions recognize user consent as a lawful basis,
199
+ applicable laws may allow processing without consent.
200
+ Depending on the assets associated with a user account,
201
+ data controllers may argue that RBA use is required to
202
+ comply with the obligation to implement appropriate tech-
203
+ nical safeguards against unauthorized access. Nonetheless,
204
+ to ensure compliance, providers should design RBA mech-
205
+ anisms with consent in mind and provide their users with
206
+ clear and easy-to-understand explanations.
207
+ Collection Limitation and Data Minimization. Data
208
+ controllers must limit the PII collection and processing
209
+ to what is necessary for the specified purposes. RBA
210
+ feature sets should therefore be reviewed for suitability
211
+ with redundant or inappropriate features removed [34].
212
+ This includes considering using pseudonymized data for
213
+ RBA and disposing of the feature values when they are
214
+ no longer useful for the purpose of RBA. In practice, this
215
+ creates the challenge to not reduce a risk score’s reliability.
216
+ Use, Retention, and Disclosure Limitation. The data
217
+ processing must be limited to purposes specified by the
218
+ data controller, and data must not be disclosed to recipi-
219
+ ents other than specified. RBA should ensure that features
220
+ cannot be used for purposes other than the calculation
221
+ of risk scores. Moreover, after a feature value becomes
222
+ outdated, it should be securely destroyed or anonymized.
223
+ We would point out that privacy laws do not apply to
224
+ anonymized data and could therefore serve data controllers
225
+ for developing and testing purposes beyond the retention
226
+ period specified in their privacy statements.
227
+ Accuracy and Quality. Data controllers must ensure that
228
+ 2
229
+
230
+ the processed data are accurate and of quality. This is
231
+ not only due to their own business interests, but also
232
+ because data subjects have a right to expect their data
233
+ being correct. This directly affects RBA, since it has the
234
+ power to deny a significant benefit to users (i.e., access to
235
+ their user account) with potentially significant harm. Data
236
+ controllers must hence ensure by appropriate means that
237
+ the stored feature values are correct and valid.
238
+ Individual Participation and Access. Data controllers
239
+ must allow data subjects to access and review their PII.
240
+ For RBA, this means that users should be allowed to be
241
+ provided with a copy of the feature values used.
242
+ Information Security. Data controllers are obliged to
243
+ protect PII with appropriate controls at the operational,
244
+ functional, and strategic level against risks. These include,
245
+ but are not limited to, risks associated with unauthorized
246
+ access or processing and denial of service. Privacy laws
247
+ demand extensive protections in this regard, “taking into
248
+ account the state of the art, the costs of implementation
249
+ and the nature, scope, context and purposes of processing
250
+ as well as the risk of varying likelihood and severity for
251
+ the rights and freedoms of natural persons” (Art. 32 (1)
252
+ GDPR). Since RBA risk scores do not necessarily rely
253
+ on evaluating plain text feature values [34], the collected
254
+ data should be stored in an appropriate pseudonymized,
255
+ masked, truncated, or encrypted form, depending on the
256
+ RBA implementation. Moreover, data controllers should
257
+ implement additional technical and organizational mea-
258
+ sures as needed, and be able to ensure the integrity,
259
+ availability, and resilience of RBA.
260
+ Accountability and Privacy Compliance. Data con-
261
+ trollers should inform data subjects about privacy-related
262
+ policies, transfers of PII to other countries, and data
263
+ breaches. Data controllers should also implement organi-
264
+ zational measures to help them verify and demonstrate le-
265
+ gal compliance. These include, but are not limited to, risk
266
+ assessments and recovery procedures. RBA implementa-
267
+ tions should therefore consider the worth of RBA features
268
+ to both attackers and data subjects, and the recovery from
269
+ data breaches. This is crucial in order not to undermine
270
+ the security of user accounts and their associated assets.
271
+ 3. Privacy Enhancements (RQ1)
272
+ To comply with the privacy principles and derived data
273
+ protection requirements, service owners should consider
274
+ mechanisms to increase privacy in their RBA implemen-
275
+ tations. In the following, we introduce threats and their
276
+ mitigation to increase privacy properties of RBA features.
277
+ 3.1. Feature Sensitivity and Impact Level
278
+ RBA feature sets always intend to distinguish attack-
279
+ ers from legitimate users. In doing so, the features may
280
+ contain sensitive PII. However, not only do users per-
281
+ ceive such PII differently regarding their sensitivity [28].
282
+ Their (unintended) disclosure could also have far-reaching
283
+ negative consequences for user privacy. Developers and
284
+ providers should therefore determine the impact from a
285
+ loss of confidentiality of the RBA feature values. Specif-
286
+ ically, the following aspects need consideration [20]:
287
+ Identifiability and Linkability. RBA feature sets should
288
+ be evaluated regarding their ability to identify natural
289
+ persons behind them. In particular, RBA systems that rely
290
+ on intrusive online tracking methods, such as browser
291
+ fingerprinting, store sensitive browser-specific information
292
+ that form a linked identifier. In the event of losing confi-
293
+ dentiality, the features would allow clear linkage between
294
+ profiles at different online services, despite users using
295
+ different login credentials or pseudonyms. Depending on
296
+ the service, this could result in negative social or le-
297
+ gal consequences for individuals. It could also enable
298
+ more extensive and unintended activity tracking, and de-
299
+ anonymizing information associated with user accounts.
300
+ Previous work found that powerful RBA feature sets do
301
+ not require to uniquely identify users when focusing on the
302
+ detection of account takeover attempts [34]. Also, users
303
+ are more willing to accept the processing of sensitive
304
+ information when they are certain that it is anonymous
305
+ and does not allow them to be identified [18], [29]. Thus,
306
+ the use of non-intrusive features may increase user trust
307
+ in online services, too.
308
+ Feature Values Sensitivity. Aside from identifying in-
309
+ dividuals by RBA feature sets, the individual feature
310
+ values may already contain sensitive PII. Sensitive PII
311
+ in the scope of RBA may be feature values that are
312
+ easily spoofable and can be misused to attack other online
313
+ services in the event of a data breach. Sensitive PII may
314
+ also refer to data perceived as sensitive by online users.
315
+ For example, the most important feature of current RBA
316
+ methods, namely the IP address [12], [15], [31], [34], [36],
317
+ is perceived as highly sensitive by online users of diverse
318
+ cultural backgrounds [3], [19], [28]. Since users are gen-
319
+ erally less willing to share data with increased sensitivity,
320
+ RBA feature sets should limit the use of sensitive data if
321
+ possible, in order to meet user interests.
322
+ 3.2. Threats
323
+ RBA features may contain personal sensitive data,
324
+ which has to be protected against attackers. To support
325
+ online services in their protection efforts, we introduce
326
+ three privacy threat types. We based the threats on those
327
+ found in literature and our own observations in practice.
328
+ Data Misuse. Online services could misuse their own
329
+ RBA feature data for unintended purposes, such as user
330
+ tracking, profiling, or advertising [5]. This type of misuse
331
+ previously happened with phone numbers stored for 2FA
332
+ purposes [33]. While users have to trust online services to
333
+ not misuse their data, responsible online services should
334
+ also take precautions to minimize chances for miuse sce-
335
+ narios or unintended processing, e.g., by internal miscon-
336
+ duct or after the company changed the ownership.
337
+ Data Forwarding. Online services can be requested or
338
+ forced to hand out stored feature data, e.g., to state actors,
339
+ advertising networks, or other third parties. Especially
340
+ IP addresses are commonly requested [9]. When such
341
+ data are forwarded to third parties, the users’ privacy is
342
+ breached. For instance, the IP address could be used to
343
+ reveal the user’s geolocation or even their identity.
344
+ Data Breach. Attackers obtained the database containing
345
+ the feature values, e.g., by hacking the online service. As a
346
+ 3
347
+
348
+ result, online services lost control over their data. Attack-
349
+ ers can try to re-identify users based on the feature values,
350
+ e.g., by combining them with other data sets. They can
351
+ further try to reproduce the feature values and try account
352
+ takeover attacks on a large scale, similar to credential
353
+ stuffing. On success, they could access sensitive user data
354
+ stored on the online service, e.g., private messages.
355
+ 3.3. Mitigation
356
+ Online services can implement several measures to
357
+ mitigate the outlined privacy threats. We propose five
358
+ measures that are based on methods found in related
359
+ research fields, as well as privacy regulations and our own
360
+ observations with the selected RBA model (see Section 2).
361
+ Based on the introduced RBA model, we considered all
362
+ feature values as categorical data, in order to calculate the
363
+ probabilities. When this condition is met, the proposed
364
+ measures are also applicable to other RBA models [34].
365
+ As an example for practical solutions, we describe how
366
+ the considerations can be applied to the IP address feature,
367
+ with regard to the IPv4 address. We chose this feature
368
+ since it is both considered the most important RBA feature
369
+ in terms of security to date and sensitive re-linkable data
370
+ in terms of privacy (see Section 3.1).
371
+ 3.3.1. Aggregating. The RBA model only depends on
372
+ feature value frequencies. To minimize data and limit
373
+ misuse [16], we can aggregate or reorder feature data
374
+ in the login history without affecting the results. The
375
+ data set would then reveal how often a feature combina-
376
+ tion occurred, but not its chronological order. Removing
377
+ this information can mitigate re-identification in login
378
+ sequences.
379
+ 3.3.2. Hashing. A cryptographic hash function, such as
380
+ SHA-256, transforms a data input of arbitrary value to an
381
+ output of fixed length. As inverting a hash function is not
382
+ possible in theory, attackers need to recalculate all possible
383
+ hashing values to restore the input values [17]. Assuming
384
+ that the hashes are practically collision-free, using hashed
385
+ feature values will produce the same RBA results as with
386
+ the original values. This is the case, because the feature
387
+ values are only transformed into a different representation.
388
+ Therefore, this could be a solution to protect feature data
389
+ in terms of the outlined threats.
390
+ However, the IPv4 address has 32 bit limited input
391
+ values, where some addresses have a specific semantic
392
+ and purpose, and cannot be assigned to devices. Thus,
393
+ attackers can simply hash all 232 − 1 values to restore the
394
+ correct IP address. To counteract this problem, we can
395
+ append a large random string (salt) to the input value:
396
+ H(192.168.1.166 || salt) = 243916...aad132
397
+ (2)
398
+ Attackers need to guess the salt correctly, which is high
399
+ effort when the salt is large. Thus, this mitigation strategy
400
+ increases the required guessing time for each feature
401
+ value. Taking it a step further, we can even hash the results
402
+ multiple times to increase the computation time:
403
+ H(H(...H(192.168.1.166 || salt))) = [hash]
404
+ (3)
405
+ This is similar to key derivation strategies used in pass-
406
+ word databases [22]. However, we can only use a global
407
+ salt for all database entries, as RBA mechanisms need to
408
+ be able to identify identical feature values across users
409
+ in the database. By increasing the computational cost,
410
+ attackers cannot scale attacks as they would have with
411
+ the unhashed feature values.
412
+ 3.3.3. Truncation. A more destructive approach to in-
413
+ crease privacy for RBA features is to change or remove
414
+ details from their data values. This can reduce the number
415
+ of records with unique quasi identifiers. Since the feature
416
+ data then becomes less useful for other use cases like
417
+ tracking or re-identification, we consider it a measure to
418
+ mitigate the privacy threats. Regarding the IP address, we
419
+ could set the last bits to zero. For truncating the last eight
420
+ bits, for example, this would result in:
421
+ Truncate(192.168.1.166, 8 Bit) = 192.168.1.0
422
+ (4)
423
+ This mechanism is known from IP address anonymization
424
+ strategies [6], [7]. However, we can also apply it on other
425
+ features, e.g., reducing timing precision or coarse-graining
426
+ browser version number in the user agent string [24].
427
+ Since we remove information that could potentially iden-
428
+ tify an individual, e.g., the device’s internet connection,
429
+ this can potentially increase privacy. However, this can
430
+ also influence the RBA results, as there are fewer feature
431
+ values for attackers to guess.
432
+ 3.3.4. K-Anonymity.
433
+ The k-anonymity privacy con-
434
+ cept [32] ensures that at least k entries in a data set
435
+ have the same quasi identifier values. If attackers obtained
436
+ the data set and know a victim’s IP address, they would
437
+ not be able to distinguish the person from k other users.
438
+ This makes it an effective countermeasure against re-
439
+ identification in case of data forwarding and data breaches.
440
+ To achieve k-anonymity for RBA, at least k users need
441
+ to have the same feature value. To ensure this, we added
442
+ potentially missing entries to the RBA login history after
443
+ each successful login. We added these entries to random
444
+ users to only affect the global login history probabilities
445
+ in order to keep a high security level. We created these
446
+ users just for this purpose. To retain the global data set
447
+ properties, the user count increased gradually to have the
448
+ same mean number of login attempts per user.
449
+ 3.3.5. Login History Minimization. Another approach
450
+ is to limit the login history, in terms of the amount of
451
+ features and entries, for a number of entries or a constant
452
+ time period [16]. A study already showed that few entries
453
+ are sufficient to achieve a high RBA protection [34]. In so
454
+ doing, we mitigate tracking users for an extended period
455
+ of time. However, this can affect the RBA performance
456
+ based on the usage pattern of the corresponding online
457
+ service. Especially when it is a less-than-monthly-use
458
+ online service, we assume that features need to be stored
459
+ for a longer period than for daily use websites to achieve
460
+ a comparable RBA performance.
461
+ 4. Case Study Evaluation (RQ2)
462
+ Aggregating and hashing, when collision-free, does
463
+ not affect the RBA results, as they only change the data
464
+ representation for the RBA model. The other approaches,
465
+ however, potentially could. To assess their impact on
466
+ 4
467
+
468
+ RBA behavior in practice, we studied truncation and k-
469
+ anonymity using real-world login data. The properties and
470
+ limited size of our data set did not allow to reliably test
471
+ the login history minimization approach, so we left it
472
+ for future work. Nevertheless, we outlined this relevant
473
+ privacy consideration for the sake of completeness. We
474
+ used the IP address feature as in the other examples.
475
+ 4.1. Data Set
476
+ For the evaluation, we used our long-term RBA data
477
+ set, including features of 780 users collected on a real-
478
+ world online service [34]. The online service collected
479
+ the users’ features after each successful login. The users
480
+ signed in 9555 times in total between August 2018 to
481
+ June 2020. They mostly logged in daily (44.3%) or several
482
+ times a week (39.2%), with a mean of 12.25 times in total.
483
+ To improve data quality and validity, we removed all users
484
+ who noticed an illegitimate login in their account. The
485
+ online service was an e-learning website, which students
486
+ used to exercise for study courses and exams. As the
487
+ users were mostly located in the same city, it is a very
488
+ challenging data set for RBA. They could get similar IP
489
+ addresses with higher probability. Therefore, it is impor-
490
+ tant to evaluate how the RBA protection changes in such
491
+ a challenging scenario.
492
+ 4.1.1. Legal and Ethical Considerations. The study
493
+ participants [34] signed a consent form agreeing to the
494
+ data collection and use for study purposes. They were
495
+ always able to view a copy of their data and delete it on
496
+ request. The collected data were stored on encrypted hard
497
+ drives and only the researchers had access to it.
498
+ We do not have a formal IRB process at our university.
499
+ Still, we made sure to minimize potential harm by com-
500
+ plying with the ethics code of the German Sociological
501
+ Association (DGS) and the standards of good scientific
502
+ practice of the German Research Foundation (DFG). We
503
+ also made sure to comply with the GDPR.
504
+ 4.1.2. Limitations. Our results are limited to the data
505
+ set and the users who participated in the study. They
506
+ are limited to the population of a certain region of a
507
+ certain country. They are not representative for large-scale
508
+ online services, but show a typical use case scenario of a
509
+ daily to weekly use website. As in similar studies, we can
510
+ never fully exclude that intelligent attackers targeted the
511
+ website. However, multiple countermeasures minimized
512
+ the possibility that the website was infiltrated [34].
513
+ 4.2. Attacker Models
514
+ We evaluated the privacy enhancements using three
515
+ RBA attacker models found in related literature [12], [34].
516
+ All attackers possess the login credentials of the target.
517
+ Naive attackers try to log in from a random Internet
518
+ Service Providers (ISP) from somewhere in the world. We
519
+ simulated these attackers by using IP addresses sourced
520
+ from real-world attacks on online services [11].
521
+ VPN attackers know the country of the victim. There-
522
+ fore, we simulated these attackers with IP addresses from
523
+ real-world attackers located in the victim’s country [11].
524
+ Targeted attackers know the city, browser, and device
525
+ of the victim. Therefore, they choose similar feature val-
526
+ ues, including similar ISPs. We simulated these attackers
527
+ with our data set, with the unique feature combinations
528
+ from all users except the victim. Since the IP addresses
529
+ of our data set were in close proximity to each other, our
530
+ simulated attacker was aware of these circumstances and
531
+ chose them in a similar way.
532
+ 4.3. Methodology
533
+ In order to test our privacy enhancements in terms
534
+ of practical RBA solutions, we defined a set of desired
535
+ properties. Our enhancements need to: (A) Keep the
536
+ percentage of blocked attackers: The ability to block a
537
+ high number of attackers should not decrease when using
538
+ the privacy enhancements. This is necessary to keep the
539
+ security properties of the RBA system. (B) Retain differ-
540
+ entiation between legitimate users and attackers: When
541
+ applied, the risk score differences between legitimate users
542
+ and attackers should only change within a very small
543
+ range. Otherwise, the usability and security properties of
544
+ the RBA system would decrease.
545
+ We outline the tests to evaluate the privacy enhance-
546
+ ments below. Based on the method in Wiefling et al. [34],
547
+ we reproduced the login behavior for attackers and legit-
548
+ imate users by replaying the user sessions. We integrated
549
+ truncation and k-anonymity in the reproduction process,
550
+ to test the countermeasures.
551
+ The RBA model used the IP address and user agent
552
+ string as features, since this can be considered the RBA
553
+ state of practice [34], [36]. We truncated the IP addresses
554
+ in ranges from 0 to 24 bits, to observe the effects on
555
+ the RBA performance. We assume that cutting more than
556
+ 25 bits will not allow to reliably detect attackers. We also
557
+ tested k-anonymity with the IP address feature until k = 6.
558
+ As US government agencies consider less than five entries
559
+ to be sensitive [10], we chose to cover this threshold.
560
+ 4.3.1. Test A: Percentage of Blocked Attackers. To
561
+ compare the RBA performance regarding all three attacker
562
+ models, we calculated the percentage of how many attack-
563
+ ers would be blocked. We call this percentage the true
564
+ positive rate (TPR), as previous work did [12], [34]. For
565
+ a fair comparison, we observed how the TPR changed
566
+ when aiming to block 99.5% of attackers. We chose this
567
+ TPR baseline since it showed good performance regarding
568
+ usability and security properties in a previous study [34].
569
+ To ease comparison, we adjusted the TPR for each
570
+ truncation or k-anonymity step xi as percentage differ-
571
+ ences to the baseline without modifications (relative TPR):
572
+ TPRrelativexi = TPRxi − TPRbaseline
573
+ TPRbaseline
574
+ (5)
575
+ Following that, TPRrelativexi < 0.0 means that the TPR
576
+ decreased compared to the baseline.
577
+ 4.3.2. Test B: Risk Score Changes. To determine the
578
+ degree that attackers and legitimate users can be differ-
579
+ entiated in the RBA model, we calculated the risk score
580
+ relation (RSR) [34]. It is the relation between the mean
581
+ risk scores for attackers and legitimate users:
582
+ RSRbasic =
583
+ mean attacker risk score
584
+ mean legitimate risk score
585
+ (6)
586
+ 5
587
+
588
+ To ease comparison, we normalized each RSR for every
589
+ truncation or k-anonymity step xi as percentage differ-
590
+ ences to the baseline (relative RSR). The baseline is the
591
+ IP address without modifications:
592
+ RSRrelativexi =
593
+ RSRbasicxi − RSRbaseline
594
+ RSRbaseline
595
+ (7)
596
+ As a result, RSRrelativexi < 0.0 signals that attackers and
597
+ legitimate users can no longer be distinguished as good
598
+ as they were before introducing the privacy enhancing
599
+ measures.
600
+ 4.3.3. Limit Extraction. For each test, we defined the
601
+ following thresholds to extract limits that do not degrade
602
+ RBA performance to an acceptable extent.
603
+ (Test A) We require the RBA performance to remain
604
+ constant. Thus, we selected the reasonable limit as the
605
+ point at which the relative TPR decreases compared to
606
+ the baseline, i.e., attackers cannot be blocked as good
607
+ as before any more. (Test B) Unlike tracking, RBA uses
608
+ the feature information in addition to an already verified
609
+ identifier, e.g., passwords. Thus, we consider it feasible
610
+ to reduce the RSR slightly for the sake of privacy. Based
611
+ on our observations, RSR changes below 0.01 can be
612
+ tolerable for our case study evaluation. Thus, we chose
613
+ the reasonable limit as the point at which the relative RSR
614
+ is lower than 0.01.
615
+ 4.4. Results
616
+ In the following, we present the results for all attacker
617
+ models. We discuss the results after this section. We used
618
+ a high performance computing cluster using more than
619
+ 2000 cores for the evaluation. This was necessary since
620
+ calculating the results with the simulated attackers was
621
+ computationally intensive.
622
+ For statistical testing, we used Kruskal-Wallis tests
623
+ for the omnibus cases and Dunn’s multiple comparison
624
+ test with Bonferroni correction for post-hoc analysis. We
625
+ considered p-values less than 0.05 to be significant.
626
+ 4.4.1. Truncation. Figure 1 shows the truncation test
627
+ results for all attackers. The TPR differences between
628
+ the targeted attacker and both remaining attackers were
629
+ significant
630
+ (Targeted/Naive:
631
+ p=0.0151,
632
+ Targeted/VPN:
633
+ p<0.0001). The TPRs exceeded the limit after 20 bits for
634
+ naive, 3 bits for VPN, and 14 bits for targeted attackers.
635
+ Regarding the relative RSRs, there are significant
636
+ differences between VPN and both remaining attackers
637
+ (p<0.0001). The RSRs exceeded the limit after 3 bits for
638
+ naive, 21 bits for VPN, and 3 bits for targeted attackers.
639
+ Combining both results, the accepted truncation limits
640
+ based on our criteria were 3 bits for all attacker models.
641
+ 4.4.2. K-Anonymity. Figure 2 shows the combined k-
642
+ anonymity test results for the three attacker models. The
643
+ relative TPR decreased after k = 1 for targeted attack-
644
+ ers, k = 2 for naive attackers, and not at all for VPN
645
+ attackers until at least k = 6. There were significant TPR
646
+ differences between naive and VPN attackers (p=0.0066).
647
+ The relative RSR did not decrease for all attacker types
648
+ and there were no significant differences.
649
+ 0.0010
650
+ 0.0005
651
+ 0.0000
652
+ 0.0005
653
+ 0.0010
654
+ 0.0015
655
+ Relative TPR
656
+ Attacker
657
+ Targeted
658
+ VPN
659
+ Naive
660
+ 0
661
+ 2
662
+ 4
663
+ 6
664
+ 8
665
+ 10 12 14 16 18 20 22 24
666
+ Truncated IP Address Bits
667
+ 0.3
668
+ 0.2
669
+ 0.1
670
+ 0.0
671
+ 0.1
672
+ 0.2
673
+ Relative Risk
674
+ Score Relation
675
+ Attacker
676
+ Targeted
677
+ VPN
678
+ Naive
679
+ Figure 1. Results for truncating the IP address. Top: Relative TPR (Test
680
+ A). There were significant differences between targeted and both VPN
681
+ and naive attackers. Bottom: Relative RSR (Test B). The differences
682
+ between VPN and both targeted and naive attackers were significant.
683
+ 0.0010
684
+ 0.0005
685
+ 0.0000
686
+ 0.0005
687
+ 0.0010
688
+ 0.0015
689
+ Relative TPR
690
+ Attacker
691
+ Targeted
692
+ VPN
693
+ Naive
694
+ 1
695
+ 2
696
+ 3
697
+ 4
698
+ 5
699
+ 6
700
+ k
701
+ 0.0
702
+ 0.1
703
+ 0.2
704
+ 0.3
705
+ 0.4
706
+ 0.5
707
+ 0.6
708
+ 0.7
709
+ Relative Risk
710
+ Score Relation
711
+ Attacker
712
+ Targeted
713
+ VPN
714
+ Naive
715
+ Figure 2. Results for k-anonymity regarding the IP address. Top: Relative
716
+ TPR (Test A). Differences between naive and VPN attackers were
717
+ significant. Bottom: Relative RSR (Test B). There were no significant
718
+ differences.
719
+ Combining the results, the acceptable k levels based
720
+ on our criteria were k = 1 for targeted attackers, k = 2
721
+ for naive attackers, and at least k = 6 for VPN attackers.
722
+ 5. Discussion
723
+ Our results show that IP address truncation signifi-
724
+ cantly affects the RBA risk score and reduces the proba-
725
+ bility of attack detection. The truncation for VPN attackers
726
+ resulted in a local maximum of the RSR at 12 bits, and
727
+ thus apparently improved detection. However, this was due
728
+ to the fact that the VPN attacker only had an IP address
729
+ range limited to the VPN service’s server locations. Since
730
+ the first IP address bits correspond to a node’s geolocation,
731
+ they were mostly distinct from legitimate users residing in
732
+ different areas. Thus, truncating increased the risk scores
733
+ for VPN attackers until 12 bit, as the probability for the
734
+ global login history p(FV k) decreased but the one for
735
+ the local history p(FV k|u, legit) remained constant. In
736
+ contrast to that, targeted attackers also had a limited IP
737
+ address range, but they were located in the same region as
738
+ the legitimate users. Also, naive attackers had a large IP
739
+ address range. Thus, in both cases, the differences between
740
+ p(FV k) and p(FV k|u, legit) remained constant to similar
741
+ levels until 12 bits.
742
+ Following that, and what our evaluation indicates, we
743
+ 6
744
+
745
+ TABLE 1. OVERHEAD CREATED BY ADDITIONAL LOGIN ENTRIES TO
746
+ ACHIEVE K-ANONYMITY
747
+ k
748
+ Additional Entries
749
+ Increase to Baseline
750
+ 1
751
+ 0
752
+ 0.0
753
+ 2
754
+ 3928
755
+ 0.41
756
+ 3
757
+ 7965
758
+ 0.83
759
+ 4
760
+ 12013
761
+ 1.26
762
+ 5
763
+ 16065
764
+ 1.68
765
+ 6
766
+ 20120
767
+ 2.11
768
+ do not recommend truncating more than three bits for a
769
+ stable RBA performance in our case study scenario.
770
+ K-anonymity increased the distinguishability between
771
+ legitimate users and attackers, i.e., the RSR. This was
772
+ due to the fact that this mechanism added new entries
773
+ to the global login history. As a result, the overall prob-
774
+ ability for unknown feature values in the global login
775
+ history p(FV k) decreased, making it harder for attackers
776
+ to achieve a low risk score. However, this also decreased
777
+ the detection of attackers, i.e., the TPR, in most cases,
778
+ since k more users had similar feature values in the data
779
+ set. As a side effect of these results, unique feature values
780
+ got less unique in total. Thus, due to the determined limit
781
+ of k = 1, k-anonymity for targeted attackers can only be
782
+ achieved with degraded RBA performance.
783
+ The overhead produced by the additional entries in-
784
+ creased with each k (see Table 1). It was even more
785
+ than the data set itself at k>3, which makes the current
786
+ mechanism impractical for very large online services. To
787
+ mitigate this issue, mechanisms could be introduced which
788
+ remove some additional login entries when k-anonymity
789
+ can be fulfilled after some time.
790
+ K-anonymity is not scalable with an increasing num-
791
+ ber of features [1], while the other approaches are. Thus,
792
+ sensible RBA privacy enhancements might be a combina-
793
+ tion of all outlined countermeasures, to ensure scalability.
794
+ Based on our results, we discuss privacy challenges
795
+ and further research directions in the following.
796
+ 5.1. Privacy Challenges
797
+ When integrating privacy into RBA systems, there are
798
+ several challenges that should be considered in practice.
799
+ We describe them below.
800
+ Role of the IP Address Feature. Using a combination
801
+ of privacy enhancements for the IP address might be
802
+ sufficient for some applications. However, this feature
803
+ is still sensitive information. Thus, the question arises
804
+ whether online services should consider privacy enhancing
805
+ alternatives instead of storing the IP address. One alterna-
806
+ tive could be to derive only the region and ASN from the
807
+ IP address, and discard the rest. Other approaches even
808
+ enable identifying network anomalies, e.g., IP spoofing
809
+ using a VPN connection, without having to rely on the IP
810
+ address at all. For example, the server-originated round-
811
+ trip time (RTT) [34] can be used to estimate the distance
812
+ between the user’s device and the server location and may
813
+ replace IP addresses as RBA features. As the RTTs vary
814
+ based on the server location, they become useless for most
815
+ re-identification attacks using leaked databases, as server
816
+ locations are distributed in practice. They can even be
817
+ enriched with random noise to further enhance privacy.
818
+ Risk of Feature Stuffing. Such considerations can be
819
+ more and more important with widespread RBA adop-
820
+ tion in the future. We assume that when databases with
821
+ RBA feature values got stolen, this might have serious
822
+ consequences for other services using RBA. In contrast
823
+ to passwords, behavioral RBA feature values cannot be
824
+ changed after compromise. Attackers can attempt to auto-
825
+ matically reproduce these feature values on other websites.
826
+ Thus, more privacy preserving alternatives that are hard
827
+ to spoof for attackers might be crucial to mitigate largely
828
+ scalable “feature stuffing” attacks.
829
+ Handling Data Deletion Requests. Further conflicts
830
+ could arise with data protection regulations. Users are
831
+ legally permitted to request data deletion. So when they
832
+ request online services to delete their RBA feature data,
833
+ they might lose RBA protection on their user accounts.
834
+ 5.2. Research Directions
835
+ Our case study evaluation provided first insights on
836
+ truncating feature values to increase privacy. As the results
837
+ showed that this is possible to a certain degree while main-
838
+ taining RBA performance, further work can investigate it
839
+ for other types of features, e.g., the user agent string.
840
+ The proposed k-anonymity mechanism can increase
841
+ privacy regarding unique entries in the data set. However,
842
+ users might still be identifiable when they have a combi-
843
+ nation of typical feature values, e.g., a home and a work
844
+ IP address. This non-trivial task had been addressed in
845
+ dynamic databases [27], [37]. Future work may investigate
846
+ whether such mechanisms are also applicable to RBA.
847
+ As we could not reliably test the login history mini-
848
+ mization approach with our data set, future work should
849
+ investigate this on a medium to large-scale online service
850
+ with regular use.
851
+ 6. Related Work
852
+ Burkhard et al. [6] investigated truncating IP addresses
853
+ in anomaly detection systems. They found that truncating
854
+ more than four bits degraded the performance of these
855
+ systems. Chew et al. [7] further evaluated IP truncation
856
+ in intrusion detection systems. Their results showed that
857
+ the detection accuracy in many of the tested classifiers
858
+ decreased after removing more than 8 bits. Our study
859
+ showed that three bits could be removed from the IP
860
+ address to maintain RBA performance at the same time.
861
+ Both Safa et al. [26], and Blanco-Justicia and
862
+ Domingo-Ferrer [4] proposed privacy-preserving authen-
863
+ tication models for implicit authentication using mobile
864
+ devices. Their models relied on client-originated features,
865
+ and the former also calculated risk scores on the client’s
866
+ device. However, this is not applicable to our RBA use
867
+ case, as it relies on server-originated features and risk
868
+ scores to prevent client-side spoofing.
869
+ To the best of our knowledge, there were no studies in-
870
+ vestigating privacy enhancements in RBA systems. How-
871
+ ever, some literature touched on privacy aspects related
872
+ to RBA. Bonneau et al. [5] discussed privacy concerns of
873
+ using additional features for authentication. They found
874
+ that privacy preserving techniques might mitigate these
875
+ concerns, but these had not been deployed in practice. We
876
+ 7
877
+
878
+ proposed and tested some techniques for the first time in
879
+ our case study. Wiefling et al. [35] investigated RBA’s
880
+ usability and security perceptions. The results showed
881
+ that users tended to reject providing phone numbers to
882
+ online services for privacy reasons. They further studied
883
+ RBA characteristics on a real-world online service [34],
884
+ showing that the feature set can be very small to achieve
885
+ good RBA performance. We demonstrated that the privacy
886
+ can be further enhanced through different mechanisms.
887
+ 7. Conclusion
888
+ With a widespread use of RBA to protect users against
889
+ attacks involving stolen credentials, more and more online
890
+ services will potentially store sensitive feature data of their
891
+ users, like IP addresses and browser identifiers, for long
892
+ periods of time. Whenever such information is forwarded
893
+ or leaked, it poses a potential threat to user privacy. To
894
+ mitigate such threats, the design of RBA systems must
895
+ balance security and privacy.
896
+ Our study results provide a first indication that RBA
897
+ implementations used in current practice can be designed
898
+ to become more privacy friendly. However, there are still
899
+ challenges that have not been resolved in research to
900
+ date. An important question is, e.g., how the IP address
901
+ feature can be replaced with more privacy preserving
902
+ alternatives. On the one hand, we assume that the IP
903
+ address is very relevant for re-identification attacks [9].
904
+ Discarding it from the RBA login history can therefore
905
+ increase privacy protection. On the other hand, the IP
906
+ address is a feature providing strong security [34]. Future
907
+ research must carefully identify and analyze such trade-
908
+ offs, so that RBA’s user acceptance does not drop with
909
+ the first data breach.
910
+ References
911
+ [1]
912
+ C. C. Aggarwal, “On k-Anonymity and the Curse of Dimension-
913
+ ality,” in VLDB ’05.
914
+ VLDB Endowment, Aug. 2005.
915
+ [2]
916
+ Akamai, “Loyalty for Sale – Retail and Hospitality Fraud,” [state
917
+ of the internet] / security, vol. 6, no. 3, Oct. 2020.
918
+ [3]
919
+ K. Almotairi and B. Bataineh, “Perception of Information Sensi-
920
+ tivity for Internet Users in Saudi Arabia,” AIP, vol. 9, no. 2, 2020.
921
+ [4]
922
+ A. Blanco-Justicia and J. Domingo-Ferrer, “Efficient privacy-
923
+ preserving implicit authentication,” Computer Communications,
924
+ vol. 125, Jul. 2018.
925
+ [5]
926
+ J. Bonneau, E. W. Felten, P. Mittal, and A. Narayanan, “Privacy
927
+ concerns of implicit secondary factors for web authentication,” in
928
+ WAY ’14, Jul. 2014.
929
+ [6]
930
+ M. Burkhart, D. Brauckhoff, M. May, and E. Boschi, “The risk-
931
+ utility tradeoff for IP address truncation,” in NDA ’08.
932
+ ACM,
933
+ 2008.
934
+ [7]
935
+ Y. J. Chew, S. Y. Ooi, K.-S. Wong, and Y. H. Pang, “Privacy
936
+ Preserving of IP Address through Truncation Method in Network-
937
+ based Intrusion Detection System,” in ICSCA ’19.
938
+ ACM, 2019.
939
+ [8]
940
+ European Union, “General Data Protection Regulation,” May 2016,
941
+ Regulation (EU) 2016/679.
942
+ [9]
943
+ Europol, “SIRIUS EU Digital Evidence Situation Report 2019,”
944
+ Dec. 2019.
945
+ [10] Federal Committee on Statistical Methodology, “Report on Statis-
946
+ tical Disclosure,” Dec. 2005.
947
+ [11] FireHOL,
948
+ “All
949
+ cybercrime
950
+ ip
951
+ feeds,”
952
+ Aug.
953
+ 2020.
954
+ [Online].
955
+ Available: http://iplists.firehol.org/?ipset=firehol level4
956
+ [12] D. Freeman, S. Jain, M. D¨urmuth, B. Biggio, and G. Giacinto,
957
+ “Who Are You? A Statistical Approach to Measuring User Au-
958
+ thenticity,” in NDSS ’16.
959
+ Internet Society, Feb. 2016.
960
+ [13] P. A. Grassi et al., “Digital identity guidelines: authentication
961
+ and lifecycle management,” National Institute of Standards and
962
+ Technology, Tech. Rep. NIST SP 800-63b, Jun. 2017.
963
+ [14] M. J. Haber, “Attack Vectors,” in Privileged Attack Vectors: Build-
964
+ ing Effective Cyber-Defense Strategies to Protect Organizations.
965
+ Apress, 2020.
966
+ [15] A. Hurkała and J. Hurkała, “Architecture of context-risk-aware
967
+ authentication system for web environments,” in ICIEIS ’14, 2014.
968
+ [16] ISO, ISO/IEC 29100:2011(E): Information Technology — Security
969
+ Techniques — Privacy Framework.
970
+ ISO/IEC, 2011.
971
+ [17] D. Llewellyn-Jones and G. Rymer, “Cracking PwdHash: A Brute-
972
+ force Attack on Client-side Password Hashing.”
973
+ Apollo, 2017.
974
+ [18] E. Markos, L. I. Labrecque, and G. R. Milne, “A New Information
975
+ Lens: The Self-concept and Exchange Context as a Means to
976
+ Understand Information Sensitivity of Anonymous and Personal
977
+ Identifying Information,” JIM, vol. 42, 2018.
978
+ [19] E. Markos, G. R. Milne, and J. W. Peltier, “Information Sensitivity
979
+ and Willingness to Provide Continua: A Comparative Privacy Study
980
+ of the United States and Brazil,” JPP&M, 2017.
981
+ [20] E. McCallister, T. Grance, and K. A. Scarfone, “Guide to protecting
982
+ the confidentiality of Personally Identifiable Information (PII),”
983
+ Tech. Rep. NIST SP 800-122, 2010.
984
+ [21] I. Molloy, L. Dickens, C. Morisset, P.-C. Cheng, J. Lobo, and
985
+ A. Russo, “Risk-based Security Decisions Under Uncertainty,” in
986
+ CODASPY ’12.
987
+ ACM, Feb. 2012.
988
+ [22] K. Moriarty, B. Kaliski, and A. Rusch, “Pkcs #5: Password-based
989
+ cryptography specification version 2.1,” RFC 8018, January 2017.
990
+ [23] National Cyber Security Centre, “Cloud security guidance: 10,
991
+ Identity and authentication,” Tech. Rep., Nov. 2018.
992
+ [24] G. Pugliese, C. Riess, F. Gassmann, and Z. Benenson, “Long-Term
993
+ Observation on Browser Fingerprinting: Users’ Trackability and
994
+ Perspective,” PoPETS, vol. 2020, no. 2, Apr. 2020.
995
+ [25] N. Quermann, M. Harbach, and M. D¨urmuth, “The State of User
996
+ Authentication in the Wild,” in WAY ’18, Aug. 2018.
997
+ [26] N. A. Safa, R. Safavi-Naini, and S. F. Shahandashti, “Privacy-
998
+ Preserving Implicit Authentication,” in IFIP SEC ’14.
999
+ Springer,
1000
+ 2014.
1001
+ [27] J. Salas and V. Torra, “A General Algorithm for k-anonymity on
1002
+ Dynamic Databases,” in DPM ’18.
1003
+ Springer, 2018.
1004
+ [28] E.-M. Schomakers, C. Lidynia, D. M¨ullmann, and M. Ziefle,
1005
+ “Internet users’ perceptions of information sensitivity – insights
1006
+ from Germany,” IJIM, vol. 46, Jun. 2019.
1007
+ [29] E.-M. Schomakers, C. Lidynia, and M. Ziefle, “All of me? Users’
1008
+ preferences for privacy-preserving data markets and the importance
1009
+ of anonymity,” Electronic Markets, vol. 30, no. 3, Feb. 2020.
1010
+ [30] State of California, “California Consumer Privacy Act,” Jun. 2018,
1011
+ Assembly Bill No. 375.
1012
+ [31] R. H. Steinegger, D. Deckers, P. Giessler, and S. Abeck, “Risk-
1013
+ based authenticator for web applications,” in EuroPlop ’16. ACM,
1014
+ Jun. 2016.
1015
+ [32] L. Sweeney, “k-anonymity: A model for protecting privacy,”
1016
+ IJUFKS, vol. 10, no. 05, Oct. 2002.
1017
+ [33] G. Venkatadri, E. Lucherini, P. Sapiezynski, and A. Mislove, “In-
1018
+ vestigating sources of PII used in Facebook’s targeted advertising,”
1019
+ PoPETS, vol. 2019, Jan. 2019.
1020
+ [34] S. Wiefling, M. D¨urmuth, and L. Lo Iacono, “What’s in Score
1021
+ for Website Users: A Data-driven Long-term Study on Risk-based
1022
+ Authentication Characteristics,” in FC ’21.
1023
+ Springer, Mar. 2021.
1024
+ [35] S. Wiefling, M. D¨urmuth, and L. Lo Iacono, “More Than Just
1025
+ Good Passwords? A Study on Usability and Security Perceptions
1026
+ of Risk-based Authentication,” in ACSAC ’20.
1027
+ ACM, Dec. 2020.
1028
+ [36] S. Wiefling, L. Lo Iacono, and M. D¨urmuth, “Is This Really You?
1029
+ An Empirical Study on Risk-Based Authentication Applied in the
1030
+ Wild,” in IFIP SEC ’19.
1031
+ Springer, Jun. 2019.
1032
+ [37] X. Xiao and Y. Tao, “M-invariance: towards privacy preserving re-
1033
+ publication of dynamic datasets,” in SIGMOD ’07.
1034
+ ACM, 2007.
1035
+ 8
1036
+
E9AzT4oBgHgl3EQfiv2Y/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
EtE0T4oBgHgl3EQfgwHQ/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:81e48d057ddff13a6d3ddef3c62ec5d7a7869a967dd183d4316157360cf4581a
3
+ size 262721
G9FAT4oBgHgl3EQfth4f/content/tmp_files/2301.08664v1.pdf.txt ADDED
@@ -0,0 +1,1252 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ AccDecoder: Accelerated Decoding for
2
+ Neural-enhanced Video Analytics
3
+ Tingting Yuan†§, Liang Mi‡§, Weijun Wang†‡, Haipeng Dai‡∗, Xiaoming Fu†
4
+ †University of G¨ottingen, Germany; ‡Nanjing University, China
5
+ {tingting.yuan,weijun.wang,fu}@cs.uni-goettingen.de, [email protected], [email protected]
6
+ Abstract—The quality of the video stream is key to neural
7
+ network-based video analytics. However, low-quality video is
8
+ inevitably collected by existing surveillance systems because of
9
+ poor quality cameras or over-compressed/pruned video streaming
10
+ protocols, e.g., as a result of upstream bandwidth limit. To ad-
11
+ dress this issue, existing studies use quality enhancers (e.g., neural
12
+ super-resolution) to improve the quality of videos (e.g., resolution)
13
+ and eventually ensure inference accuracy. Nevertheless, directly
14
+ applying quality enhancers does not work in practice because
15
+ it will introduce unacceptable latency. In this paper, we present
16
+ AccDecoder, a novel accelerated decoder for real-time and neural-
17
+ enhanced video analytics. AccDecoder can select a few frames
18
+ adaptively via Deep Reinforcement Learning (DRL) to enhance
19
+ the quality by neural super-resolution and then up-scale the
20
+ unselected frames that reference them, which leads to 6-21%
21
+ accuracy improvement. AccDecoder provides efficient inference
22
+ capability via filtering important frames using DRL for DNN-
23
+ based inference and reusing the results for the other frames via
24
+ extracting the reference relationship among frames and blocks,
25
+ which results in a latency reduction of 20-80% than baselines.
26
+ Index Terms—Video analytics, super-resolution, deep rein-
27
+ forcement learning
28
+ I. INTRODUCTION
29
+ Advances in computer vision offer tremendous opportunities
30
+ for autonomous analytics of videos generated by pervasive
31
+ video cameras. Deep Neural Networks (DNNs) [1]–[4] have
32
+ been developed to dramatically improve the accuracy for
33
+ various vision tasks, while introducing stringent demands
34
+ on computational resources. Due to the compute-resource
35
+ shortage of commercial cameras, videos need to be streamed
36
+ to powerful servers for inference, which is called distributed
37
+ video analytics pipeline (VAP) [5], [6].
38
+ Nevertheless, providing highly accurate video analytics re-
39
+ mains challenging for the state-of-the-art distributed VAPs.
40
+ Since most methods for video analytics currently rely on high-
41
+ resolution videos, it is difficult to analyze low-quality videos,
42
+ such as object detection at low resolutions. For example, the
43
+ accuracy of Faster R-CNN [3], a modern DNN-based inference
44
+ method, can only achieve around 56% accuracy for videos
45
+ in 360p and 61% accuracy for videos in 540p which are
46
+ collected by [7]. However, low-quality videos are inevitably
47
+ collected by existing surveillance systems. One of the reasons
48
+ is that existing low-quality collectors can only capture low-
49
+ resolution frames. For example, New York city’s department
50
+ of transportation [8] has made videos from all 752 traffic
51
+ cameras to the public; however, the videos are transmitted
52
+ *Corresponding author. §Equal contributors.
53
+ at an extremely low resolution (240p) due to the default
54
+ configuration of cameras [9]. Another reason is that current
55
+ video streaming protocols over-compress/prune videos due to
56
+ upstream bandwidth limitations. For example, AWStream [10]
57
+ aggressively reduces the resolution of the video from 540p to
58
+ 360p and the frame rate from 1 to 0.83. It eventually brings
59
+ about a 66% saving of bandwidth with a reduced accuracy
60
+ from 61% to 54%.
61
+ To address this challenge, some VAPs [11], [12] try to
62
+ utilize image enhancement models like Super Resolution (SR)
63
+ [2], [13] and Generative Adversarial Network (GAN) [14]
64
+ to enhance frames in videos before feeding them into the
65
+ inference model. This idea is inspired by the observation from
66
+ the computer vision community – running object recognition-
67
+ related tasks on high-resolution images can largely improve
68
+ the detection accuracy [13]. However, the video enhancement
69
+ via DNN-aware image enhancement models introduces extra
70
+ latency, resulting in around 500 ms end-to-end latency [15]
71
+ for each frame, which is far from the real-time requirement
72
+ (e.g., less than 15-30 ms for real-time object recognition [6]).
73
+ Although existing DNN-aware video enhancement provides
74
+ a promising way to improve the inference accuracy [16],
75
+ there is still much room for improvement. First, prior video
76
+ enhancement mechanisms are largely agnostic to video con-
77
+ tents, treating each received frame equally, but not all the
78
+ frames need to be enhanced. For example, only the frames
79
+ containing vehicles are valuable for traffic flow analysis; on
80
+ the contrary, enhancing frames with empty streets is worthless
81
+ but only increases system latency. Therefore, content-agnostic
82
+ enhancement mechanisms cannot avoid being suboptimal.
83
+ Second, although new DNN frameworks are designed to
84
+ accurately recognize important frames (e.g., [17], [18]), they
85
+ are too heavy to achieve low latency. Third, decoding all the
86
+ frames for analytics is computationally intensive and time-
87
+ consuming, and video encoding contains plenty of unexploited
88
+ but handy information to capture the important frames, such as
89
+ motion vectors (MVs) and residuals. We argue that the codec
90
+ information, although inaccurate, is valuable to reveal which
91
+ content is important, thereby speeding up video analytics.
92
+ Motivated by the above insights, we present AccDecoder,
93
+ a novel accelerated video streaming decoder for real-time and
94
+ neural-enhanced video analytics. AccDecoder is a content-
95
+ aware DNN-integrated video decoder utilizing codec informa-
96
+ tion to select a few frames for quality enhancement, which
97
+ is called as anchor frames and some frames for DNN-aware
98
+ arXiv:2301.08664v1 [cs.CV] 20 Jan 2023
99
+
100
+ 0.2
101
+ 0.4
102
+ 0.6
103
+ 0.8
104
+ F1-score
105
+ 0
106
+ 15
107
+ 30
108
+ 45
109
+ FPS
110
+ AccDec.
111
+ DDS
112
+ Reducto
113
+ Glimpse
114
+ AWStream
115
+ Better
116
+ Fig. 1: Example results of AccDecoder vs. baselines.
117
+ inference, which is called as inference frames. In particular,
118
+ AccDecoder applies SR to anchor frames and transfers the
119
+ high quality of frames/blocks to benefit the entire video via
120
+ extracting the frame and block reference relationships; it
121
+ further leverages codec information to reuse the results of
122
+ inference frames for acceleration.
123
+ Challenge and solution. AccDecoder needs to adapt to
124
+ various quality of videos to enable robust and real-time
125
+ video analytics. Since SR and DNN-based inference is time-
126
+ consuming, an accuracy-latency tradeoff must be made care-
127
+ fully to keep low latency without drastically compromising the
128
+ accuracy. Our preliminary study (see more in Section II and
129
+ III) shows that AccDecoder needs adaptive metrics for anchor
130
+ and inference frame selection according to factors like video
131
+ content and quality. In other words, various videos (or even
132
+ different chunks of the same video) demand different settings
133
+ for frame selection, but a static setting is not adaptive to the
134
+ varying contents of videos. To address this issue, we leverage
135
+ deep reinforcement learning (DRL) [19]–[21], which has been
136
+ widely used to solve dynamic and sequential problems [22],
137
+ [23]. Specifically, AccDecode enables adaptive settings via
138
+ DRL in frame selection to accelerate the video analytics and
139
+ achieve a good tradeoff between accuracy and latency.
140
+ Our contributions are summarized as follows.
141
+ • We design a novel content-aware DNN integrated video
142
+ decoder that is resilient and robust to the quality of videos.
143
+ For example, for a 540p crossroad video collected by [7],
144
+ AccDecoder can improve 10-38% accuracy compared with
145
+ the state-of-the-art VAPs (see Fig. 1).
146
+ • We exploit temporal redundancies within a video and codec
147
+ information to drastically increase the speed of analytics.
148
+ For example, AccDecoder performs 1.5-8.0 times faster
149
+ compared with AWStream [10], DDS [5], and Glimpse [24]
150
+ (see Fig. 1).
151
+ The rest of the paper is organized as follows. We first
152
+ present the background and motivation in Section II. Then we
153
+ discuss AccDecoder’s key design in Section III, followed by
154
+ our implementation in Section IV. The experimental studies
155
+ are demonstrated in Section V. In Section VI, we introduce
156
+ some related work. We conclude this paper in Section VII.
157
+ II. BACKGROUND AND MOTIVATION
158
+ We introduce distributed VAPs and video codec, followed
159
+ by performance requirements of VAPs that drive our design
160
+ (i.e., high accuracy, low end-to-end latency, and low over-
161
+ heads). We then elaborate on why prior solutions struggle to
162
+ meet the three requirements simultaneously.
163
+ A. Background
164
+ Distributed Video Analytics. The proliferation of video an-
165
+ alytics is facilitated by the advances of deep learning and
166
+ the low prices of high-resolution network-connected cam-
167
+ eras. However, the accuracy improvement from deep learning
168
+ comes at a high computational cost. Although state-of-the-
169
+ art smart cameras can support deep learning methods, the
170
+ current surveillance and traffic cameras show only suboptimal
171
+ use of resources. For example, DNNCam [25] that ships with
172
+ a high-end embedded NVIDIA TX2 GPU [26] costs more
173
+ than $2000 while the price of deployed traffic cameras today
174
+ ranges $40-$200. These cameras are typically loaded with a
175
+ single-core CPU, only providing scarce compute resources.
176
+ Because of this huge gap, typical VAPs follow a distributed
177
+ architecture. A typical distributed VAP architecture includes a
178
+ filter and an encoder on the camera side and a decoder and
179
+ an inference model on the server side, as illustrated in Fig.
180
+ 2. In live analytics, video frames are continuously encoded
181
+ and sent to a remote server that runs the inference DNN to
182
+ analyze the video in an online fashion. For example, a vehicle
183
+ detection pipeline consists of a front-end traffic camera (which
184
+ compresses and streams live videos to a compute-powerful
185
+ edge/cloud GPU server upon wire/wireless networks) and a
186
+ back-end server (which decodes received video into frames
187
+ and feeds them into inference models like Faster R-CNN [3]
188
+ to detect vehicles). Such an architecture brings challenges in
189
+ bandwidth cost, and thus some schemes rely on aggressively
190
+ pruning videos (via e.g., reconfiguration, filtering) to meet
191
+ upstream bandwidth limitations.
192
+ frames
193
+ bits
194
+ stream
195
+ feedback
196
+ Server
197
+ frames
198
+ inference
199
+ results
200
+ decoder
201
+ encoder
202
+ filter
203
+ Camera
204
+ Fig. 2: Distributed video analytics pipeline.
205
+ Video codec is the key technology in distributed VAPs. It
206
+ comprises an encoder and a decoder, a software/hardware
207
+ program used to compress/decompress video files for easier
208
+ storage or network delivery. The encoder compresses video
209
+ data and wraps them into common video formats (e.g., H.264
210
+ [27]), while the decoder decompresses the compressed video
211
+ data into frames before post-processing (e.g., playback or
212
+ analysis). This compression process is usually lossy, which
213
+ strikes a balance between the video quality and the com-
214
+ pression ratio according to the self-preference of codecs and
215
+ encoding settings of users (e.g., bitrate, frame rate, and group
216
+ of pictures). We take H.264, one of the most popular codecs,
217
+ as an example to explain the compression process. During
218
+ encoding, each video frame is first divided into non-overlapped
219
+ macroblocks (16×16 pixels), then to each macroblock, the
220
+
221
+ encoder searches for the optimal compression method (in-
222
+ cluding the block division types and encoding types of each
223
+ block) according to the pixel-level similarity and encoding
224
+ settings. One macroblock may be further divided into non-
225
+ overlapped blocks (8×8 or 8×16 pixels) encoded with intra-
226
+ or inter-frame types. The intra-coded block is encoded using
227
+ the reference block with the most pixel-value similarity, and
228
+ the offset between these two blocks is encoded into an MV
229
+ with a residual. With the same procedure, the inter-coded
230
+ block locates the most pixel-value similar block searched by
231
+ the reference index and the MV from other frames. An MV
232
+ indicates the spatial offset between the target block and its
233
+ reference, while the difference in pixel values of two blocks
234
+ is encoded as the residual for decoding.
235
+ An ideal distributed VAP should meet three goals:
236
+ • High accuracy. Inspired by the success of image enhance-
237
+ ment methods in video streaming for QoE improvement
238
+ [28]–[31], researchers try to use image enhancement for
239
+ machine-centric video analytics [15], [31], [32]. For ex-
240
+ ample, [15] leverages SR to enhance image details for
241
+ robotics applications, while [31] embeds GAN on Google
242
+ Glasses to generate facial features for face recognition. The
243
+ experimental results from [15], [31] demonstrate that image
244
+ enhancement improves inference accuracy.
245
+ • Low latency. The latency of decoding the video (i.e.,
246
+ decoding latency), inference, and streaming the video to
247
+ the server (i.e., streaming latency) should be low. Previous
248
+ works focus on reducing the size of streaming to reduce the
249
+ streaming latency (e.g., Reducto [3]), learning and filtering
250
+ key frames for inference, and utilizing MVs to reuse the
251
+ other frames.
252
+ • Low bandwidth cost. We define the total size of a video
253
+ file delivered from the camera to the server of each VAP as
254
+ its bandwidth cost.
255
+ B. Motivation
256
+ Limitations
257
+ of
258
+ previous
259
+ work. Although a couple of
260
+ bandwidth-saving and accuracy-improvement approaches have
261
+ been developed, three significant limitations remain.
262
+ • Adaptive encoding in cameras. A camera may leverage
263
+ light-weight DNN [33] or heuristic methods (e.g., inter-
264
+ frame pixel-level difference [24]) to distinguish and prune
265
+ frames/regions without labelled information. However, these
266
+ cheap methods may cause false positive (e.g., pixel-level
267
+ distance changes by background may trigger a camera to
268
+ send many frames) and false negative (e.g., cheap object
269
+ detection model may miss small appeared objects), thus in-
270
+ creasing bandwidth cost or reducing the inference accuracy.
271
+ Server-side decision-making controls the camera’s actions
272
+ with feedback from the cloud. For example, according to
273
+ the servers’ instruction, the camera in [5] iteratively delivers
274
+ the region of interest in a higher resolution. The server-side
275
+ decision-making introduces extra latency, especially due to
276
+ the information delivery between the camera and the cloud
277
+ crossing a wide area network.
278
+ • Image enhancement in servers. Image enhancement con-
279
+ tributes to higher accuracy but also causes higher latency.
280
+ Although recent studies have successfully leveraged image
281
+ enhancement to increase QoE and inference accuracy, they
282
+ still suffer from high latency. The root cause is that image
283
+ enhancement models are much heavier than other computer
284
+ vision models. For instance, the complexity of the SR model
285
+ is as high as 1000× heavier than image classification, and
286
+ object detection models in terms of MultAdds [12], as SR
287
+ outputs high-resolution (HR) images whereas others output
288
+ labels or Bounding boxes (Bbox). In other words, naively
289
+ enhancing each frame is not practical in real-time video
290
+ analytics applications.
291
+ Fig. 3: Accuracy and latency using different schemes.
292
+ As shown in Fig. 3, our preliminary study confirms the
293
+ challenge in the tradeoff between accuracy and latency in
294
+ video analytics. Due to resource restrictions, to use existing
295
+ techniques in real-time and provide high accuracy, servers
296
+ need to adaptively shift multiple pipelines, including inference
297
+ after SR using HR frames, inference with low-resolution
298
+ frames (LR), and reuse the last inference results. However,
299
+ conventional algorithms (e.g., k-nearest neighbor (KNN) used
300
+ in [6]) are largely suboptimal as they ignore the temporal
301
+ relationship among frames and the possibility of transferring
302
+ high-quality frames to the whole video. Therefore, we aim to
303
+ design an efficient decoder to schedule the multiple pipelines
304
+ for video analytics adaptively.
305
+ III. SYSTEM DESIGN
306
+ In this section, we present the design goals and our solution
307
+ details of AccDecoder.
308
+ Design goals. We take a pragmatic stance to focus on the
309
+ server-side decoder because most of the installed surveil-
310
+ lance or traffic cameras only have cheap CPUs without pro-
311
+ grammable ability [6]; besides, rich information that may
312
+ improve VAPs’ performance in the decoder has not been
313
+ excavated. In this context, we propose AccDecoder, a portable
314
+ tool/decoder which can be plugged into any VAPs for video
315
+ streaming analytics to achieve high accuracy, limited latency
316
+ (e.g., 30 ms), and low-resource goals simultaneously. As
317
+ illustrated in Fig. 4, AccDecoder achieves these goals via the
318
+ following three mechanisms: 1) Pipeline ‚ leverages SR model
319
+ enhancing a small set of LR anchor frames to HR ones to
320
+ achieve high accuracy. 2) Pipeline ƒ and Pipeline „ extract the
321
+ codec information (e.g., frames reference relationship, MVs,
322
+ and residuals) from the decoder, then utilize them to transfer
323
+ the gains of enhanced anchor frames and reuse DNN inference
324
+
325
+ results (e.g.. Bbox in object detection) onto the entire video
326
+ respectively. Transfer and reuse amortize the computational
327
+ overhead of SR and inference across the entire video and thus
328
+ achieve low latency. 3) The scheduler classifies all frames into
329
+ three subsets, and each executes one of three pipelines. It can
330
+ greatly reduce latency and computational cost by exploiting
331
+ the content features of the key frames (e.g., the intra-coded
332
+ frame) and the change of codec information (e.g., residuals of
333
+ continuous frames).
334
+ content
335
+ feature
336
+ DRL
337
+ reuse
338
+ SR
339
+ key frame
340
+ residuals
341
+ results
342
+ AccDecoder
343
+ HR
344
+ inference
345
+ LR
346
+ HR
347
+ bits stream
348
+ motion
349
+ vectors
350
+ diff
351
+ extractor
352
+ decode
353
+ decode
354
+ scheduler
355
+ transfer
356
+ Fig. 4: Architecture of AccDecoder.
357
+ Path towards the goal. We seek answers to the following
358
+ pivotal questions, which lead to our key design choices. Q1
359
+ — How to effectively transfer the gains of SR to up-scale non-
360
+ anchor frames? Q2 — How to reuse the results of inference to
361
+ the other frames? Q3 — How to assign appropriate decoding
362
+ pipelines to frames in a fine spatial granularity to achieve a
363
+ better accuracy-latency tradeoff than baselines?
364
+ Q1 – How to transfer gains of SR to non-anchor frames?
365
+ Approach: Pipeline ‚ + ƒ. To make the best of reuse,
366
+ AccDecoder enhances anchor frames with the SR model and
367
+ caches the output (see ‚ in Fig. 5); then it transfers the
368
+ enhancement benefit to non-anchor frames with the reference
369
+ information and the cached outputs (see ƒ in Fig. 5). This
370
+ approach follows the same findings in [2] and [30], where most
371
+ of the latency of SR occurs at the last couple of layers. Namely,
372
+ caching and reusing the final output (i.e., high-resolution
373
+ images) is most effective in achieving low latency.
374
+ bits stream
375
+ cache
376
+ anchor frames
377
+ motion
378
+ vector
379
+ scaling
380
+ motion
381
+ compensation
382
+ residual
383
+ interpolation
384
+ SR transfer
385
+ non-anchor
386
+ frame
387
+ SR
388
+ reference
389
+ SR caching
390
+ Fig. 5: Process of SR gain transfer inspired by [30] and [27].
391
+ Fig. 5 illustrates the process of transferring SR gains to a
392
+ non-anchored frame for the inter-coded type. Modern video
393
+ codec encodes/decodes frames on the basis of non-overlapped
394
+ inter- and intra-coded blocks (§II-A). AccDecoder uses the
395
+ reference index, MVs, and the residual in the codec infor-
396
+ mation to decode a target block. The process is the same as
397
+ normal decoding except for the additional SR, scaling, and in-
398
+ terpolation modules (blue boxes in Fig. 5). First, AccDecoder
399
+ selects the reference blocks among cached anchor frames
400
+ following the inference index. Next, AccDecoder up-scales the
401
+ MV with the same amplification factor as SR (e.g., from 270p
402
+ to 1080 is 4). Following the MV, AccDecoder transfers the
403
+ SR gain from the reference block in the cached frame to the
404
+ target one. At last, AccDecoder up-scales the residual by light-
405
+ weight interpolation (e.g., bilinear or bicubic), accumulates it
406
+ to the transferred block to output the HR block, and pastes on
407
+ the non-anchor frame. To the intra-coded blocks without the
408
+ cached reference anchor frame, AccDecoder directly decodes
409
+ and up-scales then by interpolation. Fortunately, with our
410
+ carefully designed scheduler, most intra-coded blocks are
411
+ assigned to the SR pipeline; the impact of the minority of
412
+ interpolated intra-coded blocks can be negligible.
413
+ Q2 — How to reuse inference results for non-inference frames?
414
+ Approach: Pipeline „. AccDecoder infers inference frames
415
+ using the inference model and caches the results; then, it uses
416
+ the MVs and cached results to infer non-inference frames (see
417
+ „ in Fig. 4). MV indicates the offset between the target and
418
+ reference blocks (§II-A). Here we use the object detection
419
+ task as an example, which aims to identify objects (i.e., their
420
+ locations and classes) on each frame in videos. Fig. 6 reveals
421
+ that the MVs between the last inference frame and the current
422
+ frame can perfect match the movement of objects’ Bboxes
423
+ (i.e., the results of object detection).
424
+ Fig. 6: Relation between MVs and Bboxes.
425
+ The Reuse module in Pipeline „ gets the result of the last
426
+ inference frame (dotted line in Fig. 4), calculates the mean of
427
+ all MVs that reside in each Bbox, and uses it to shift each Bbox
428
+ to the current position. MV, as the block-level offset, is hard to
429
+ express any semantic meaning (e.g., object moving) [34]. Our
430
+ preliminary study implies that the accuracy of reuse degrades
431
+ significantly after the MV, which spans multiple reference
432
+ frames (e.g., over 7-10 frames in [7], [35], [36]).
433
+ Optimization. AccDecoder uses two techniques to improve
434
+ the accuracy of the reuse of inference results. First, it filters the
435
+ noisy MVs from static backgrounds and outliers. Empirically,
436
+ AccDecoder filters the MV whose value is equal to zero or
437
+ greater than the mean plus 0.8 times the standard deviation in
438
+ the Bbox to which it belongs. Second, to cope with the change
439
+ in Bbox size due to the object’s movement, AccDecoder
440
+
441
+ Motionvector
442
+ Bbox of last inference frame
443
+
444
+ Bbox of current frameCON3a:8CON3a:CONexpands the MV calculation region to each direction by one
445
+ macroblock (16 pixels). Note that the reuse module is not
446
+ necessary to tackle but only remit this erosion because the
447
+ scheduler module in (Q3) effectively controls it by judiciously
448
+ distributing inference frames.
449
+ Progress beyond the state of the art. Some prior work (e.g.,
450
+ [37]–[39]) leverages lightweight MV-based methods to reuse
451
+ analytics results and speed up inference. However, rather than
452
+ calculating MV between continuous frames in the playback
453
+ order like them, reuse in AccDecoder works in compressed-
454
+ video space. That is, the reference blocks used to calculate
455
+ the target block’s MV can be distributed throughout the video
456
+ (the target block can even refer to future frames under the
457
+ playback sequence, which is called backward reference)1, but
458
+ the inference results should output in the playback order. To
459
+ tackle this mismatch, we maintain a graph to map the coding
460
+ order to the playback order and accumulate the MVs along the
461
+ edges. Via statistical experiments on large-scale datasets, we
462
+ find that the number of forwarding and backward references
463
+ is less than 4 and 3 frames, respectively, so it is not time-
464
+ consuming to search and calculate MVs in the graph.
465
+ Q3 — How to guarantee accuracy-latency balance?
466
+ Approach: Scheduler. The key to the accuracy-latency trade-
467
+ off is how to optimally assign decoding pipelines (i.e., SR,
468
+ inference, and reuse) to frames in fine spatial granularity.
469
+ As analyzed in Fig. 3, different pipelines for frame decoding
470
+ and analytics lead to different levels of accuracy and latency.
471
+ For each frame in an SR class, selected anchor frames are
472
+ enhanced by the SR model; after this, the scheduler feeds the
473
+ up-scaling frame into the inference DNN for inference (e.g.,
474
+ object detection). The frames in the inference class enjoy the
475
+ benefits from the SR frames following the references in Fig. 5,
476
+ and then are fed into the inference DNN model for inference.
477
+ Their accuracy still increases due to the benefits transferred
478
+ from the SR frames. Note that the transfer is quite fast (the
479
+ time cost is the same as normal frame decoding) as it only
480
+ includes additional bicubic interpolation on residual per frame
481
+ compared to normal frame decoding. For those frames in the
482
+ reuse class, e.g., object detection, we get the Bbox of each
483
+ object in the last (playback order) detected frame, calculate
484
+ the mean of all MVs that reside in the Bbox, and use it to
485
+ shift the previous position to the current position.
486
+ Model for pipeline selection. We formulate the adaptive
487
+ pipeline selection problem to maximize the accuracy under the
488
+ latency constraint. Given a video containing the set of frames
489
+ F, one of the three pipelines is selected for each frame, which
490
+ can be expressed as follows.
491
+ max
492
+ x
493
+
494
+ f∈F
495
+ Acc(xf)
496
+ s.t.
497
+
498
+ f∈F
499
+ Latency(xf) ≤ τ,
500
+ (1)
501
+ 1Modern video codecs aim at reducing video size; they only consider how
502
+ to reduce the volume without caring whether the encoding obeys the playback
503
+ order; thus coding order is very different from the playback order.
504
+ where x = {x1, ..., xF } is the selection set and xf ∈ {1, 2, 3}
505
+ is for pipeline selection, Acc is the accuracy of a frame,
506
+ Latency is the latency of a frame given the selected pipeline,
507
+ and τ is latency tolerant of frames F.
508
+ (a) Correlations
509
+ Frame
510
+ 34%
511
+ (b) Time cost
512
+ Fig. 7: Frame vs. residual in correlations between the dif-
513
+ ference values and the changes of Bboxes, and time cost in
514
+ feature extraction.
515
+ Finding the optimal pipeline selection is tricky due to the
516
+ large searching space 3|F |. Inspired by Reducto [6] which
517
+ adaptively filters frame via setting a threshold on frame
518
+ differencing, we introduce two thresholds tr1 and tr2 on frame
519
+ differencing to cluster frames into tree pipelines. When the
520
+ frame difference is greater than tr1, the frame will enter
521
+ the pipeline ‚, and similarly, tr2 is the threshold for the
522
+ pipeline ƒ. If the difference of a frame is greater than both
523
+ of them, it will enter the pipeline‚. The constraint of real-
524
+ time video analytics (e.g., speed of analytics ≥30fps) restricts
525
+ us from extracting the light-weighted features to categorize
526
+ frames. Different from [6], we find out the Laplacian (i.e.,
527
+ edge features) on the residual and the frames have a high
528
+ correlation with the inference accuracy (see Fig. 7(a)). At the
529
+ same time, executing the Laplacian operator on the residual
530
+ can save 34% time than that on frame (see Fig. 7(b)). One
531
+ intuitive reason is that information on residuals is sparse and
532
+ de-redundant. It preserves differences among frames but is not
533
+ too dense to process, thus providing a good opportunity to
534
+ categorize frames efficiently.
535
+ best threshold
536
+ <latexit sha1_base64="fVM29horhdM2tsOP41vyKZWto=">AB63icbVBNSwMxEJ3Ur1q/qh69BIvgqeyKqMeiF
537
+ 48V7Ae0S8m2TY0yS5JVihL/4IXD4p49Q9589+YbvegrQ8GHu/NMDMvTAQ31vO+UWltfWNzq7xd2dnd2z+oHh61TZxqylo0FrHuhsQwRVrW4F6yaERkK1gknd3O/8S04bF6tNOEBZKMFI84JTaX9MAfVGte3cuBV4lfkBoUaA6qX/1hTFPJlK
538
+ WCGNPzvcQGdGWU8FmlX5qWELohIxYz1FJDNBlt86w2dOGeIo1q6Uxbn6eyIj0pipDF2nJHZslr25+J/XS210E2RcJali4WRanANsbzx/GQa0atmDpCqObuVkzHRBNqXTwVF4K/PIqaV/U/av65cNlrXFbxFGEziFc/DhGhpwD01oAYUxPM
539
+ rvCGJXtA7+li0lAxcwx/gD5/ANuOjiE=</latexit>tr1
540
+ <latexit sha1_base64="X7iO0S9KhHRkdM5ypW+Kp675Nrs=">AB63icbVBNS8NAEJ3Ur1q/qh69LBbBU0lKUY9FL
541
+ x4r2A9oQ9lsN+3S3U3Y3Qgl9C948aCIV/+QN/+NmzQHbX0w8Hhvhpl5QcyZNq7ZQ2Nre2d8q7lb39g8Oj6vFJV0eJIrRDIh6pfoA15UzSjmG036sKBYBp71gdpf5vSeqNIvko5nH1Bd4IlnICDa5pEaNUbXm1t0caJ14BalBgfao+jUcRyQRVB
542
+ rCsdYDz42Nn2JlGOF0URkmsaYzPCEDiyVWFDtp/mtC3RhlTEKI2VLGpSrvydSLSei8B2CmymetXLxP+8QWLCGz9lMk4MlWS5KEw4MhHKHkdjpigxfG4JorZWxGZYoWJsfFUbAje6svrpNuoe1f15kOz1rot4ijDGZzDJXhwDS24hzZ0gMAUnuE
543
+ V3hzhvDjvzseyteQUM6fwB87nD90SjiI=</latexit>tr2
544
+ (a) Video of crossroad
545
+ best threshold
546
+ <latexit sha1_base64="fVM29horhdM2tsOP41vyKZWto=">AB63icbVBNSwMxEJ3Ur1q/qh69BIvgqeyKqMeiF
547
+ 48V7Ae0S8m2TY0yS5JVihL/4IXD4p49Q9589+YbvegrQ8GHu/NMDMvTAQ31vO+UWltfWNzq7xd2dnd2z+oHh61TZxqylo0FrHuhsQwRVrW4F6yaERkK1gknd3O/8S04bF6tNOEBZKMFI84JTaX9MAfVGte3cuBV4lfkBoUaA6qX/1hTFPJlK
548
+ WCGNPzvcQGdGWU8FmlX5qWELohIxYz1FJDNBlt86w2dOGeIo1q6Uxbn6eyIj0pipDF2nJHZslr25+J/XS210E2RcJali4WRanANsbzx/GQa0atmDpCqObuVkzHRBNqXTwVF4K/PIqaV/U/av65cNlrXFbxFGEziFc/DhGhpwD01oAYUxPM
549
+ rvCGJXtA7+li0lAxcwx/gD5/ANuOjiE=</latexit>tr1
550
+ <latexit sha1_base64="X7iO0S9KhHRkdM5ypW+Kp675Nrs=">AB63icbVBNS8NAEJ3Ur1q/qh69LBbBU0lKUY9FLx4r2A9oQ9lsN+3S3U3Y3Qgl9C948aCIV/+QN/+NmzQHbX0w8Hhvhpl5QcyZNq7ZQ2Nre2d8q7lb39g8Oj6vFJV0eJI
551
+ rRDIh6pfoA15UzSjmG036sKBYBp71gdpf5vSeqNIvko5nH1Bd4IlnICDa5pEaNUbXm1t0caJ14BalBgfao+jUcRyQRVBrCsdYDz42Nn2JlGOF0URkmsaYzPCEDiyVWFDtp/mtC3RhlTEKI2VLGpSrvydSLSei8B2CmymetXLxP+8QWLCGz9lMk4MlWS5KEw4MhHKHkdjpigxfG4JorZWxGZYoWJsfFUbAje6svrpNuoe1f15kOz1rot4ijDGZzDJXhwDS24hzZ0gMAUnuEV3hzhvDjvzseyteQUM6fwB87nD90SjiI=</latexit>tr2
552
+ (b) Video of highway
553
+ Fig. 8: Best thresholds for pipeline selection vary across
554
+ videos.
555
+ Solution. Categorizing frames into three classes for pipelines
556
+
557
+ is not trivial. Across various videos, their best threshold
558
+ combination differs (as shown in Fig. 8). Furthermore, the
559
+ optimal thresholds for frame feature differences (e.g., pixel
560
+ and residual differences) among chunks in one video vary
561
+ greatly. Fig. 9 plots the best thresholds on the videos in [35],
562
+ which implies we should dynamically adjust the threshold for
563
+ each chunk. Therefore, the scheduler needs to offer adaptive
564
+ threshold settings.
565
+
566
+ <latexit sha1_base6
567
+ 4="fVM29horhdM2tsOP41vyKZWto=">AB
568
+ 63icbVBNSwMxEJ3Ur1q/qh69BIvgqeyKqMeiF
569
+ 48V7Ae0S8m2TY0yS5JVihL/4IXD4p49Q9589
570
+ +YbvegrQ8GHu/NMDMvTAQ31vO+UWltfWNzq7x
571
+ d2dnd2z+oHh61TZxqylo0FrHuhsQwRVrW4F6
572
+ yaERkK1gknd3O/8S04bF6tNOEBZKMFI84JT
573
+ aX9MAfVGte3cuBV4lfkBoUaA6qX/1hTFPJlKW
574
+ CGNPzvcQGdGWU8FmlX5qWELohIxYz1FJDNB
575
+ lt86w2dOGeIo1q6Uxbn6eyIj0pipDF2nJHZsl
576
+ r25+J/XS210E2RcJali4WRanANsbzx/GQa0
577
+ atmDpCqObuVkzHRBNqXTwVF4K/PIqaV/U/av
578
+ 65cNlrXFbxFGEziFc/DhGhpwD01oAYUxPMr
579
+ vCGJXtA7+li0lAxcwx/gD5/ANuOjiE=</lat
580
+ exit>tr1
581
+
582
+ <latexit sha1_base64="X7iO0S9KhHRkdM5y
583
+ pW+Kp675Nrs=">AB63icbVBNS8NAEJ3Ur1q/qh69LBbBU0lKUY9FLx4r2A9oQ9lsN+3S3U3Y
584
+ 3Qgl9C948aCIV/+QN/+NmzQHbX0w8Hhvhpl5QcyZNq7ZQ2Nre2d8q7lb39g8Oj6vFJV0eJIr
585
+ RDIh6pfoA15UzSjmG036sKBYBp71gdpf5vSeqNIvko5nH1Bd4IlnICDa5pEaNUbXm1t0caJ14
586
+ BalBgfao+jUcRyQRVBrCsdYDz42Nn2JlGOF0URkmsaYzPCEDiyVWFDtp/mtC3RhlTEKI2VLGp
587
+ SrvydSLSei8B2CmymetXLxP+8QWLCGz9lMk4MlWS5KEw4MhHKHkdjpigxfG4JorZWxGZYoWJs
588
+ fFUbAje6svrpNuoe1f15kOz1rot4ijDGZzDJXhwDS24hzZ0gMAUnuEV3hzhvDjvzseyteQUM6f
589
+ wB87nD90SjiI=</latexit>tr2
590
+ Chunk Index
591
+ Inference Threshold
592
+ SR Threshold
593
+ Fig. 9: Best thresholds vary across chunks (even adjacent).
594
+ To adaptively set the thresholds, we formulate this problem
595
+ as a Markov decision process (MDP) where the scheduler
596
+ makes the threshold setting decision in AccDecoder. The MDP
597
+ is a discrete-time stochastic process, which can be defined by
598
+ a quad-tuple < S, A, R, P >. In this tuple, S is the set of
599
+ states, A is the set of actions, R is the set of rewards, and P
600
+ is the probability of transition from state S to state S′ based
601
+ on action A. While processing frames, the scheduler’s goal
602
+ is to cluster them into three pipelines (i.e., the action A) to
603
+ maximize its expected long-run reward E[Ri]. We define how
604
+ the MDP is parameterized as follows.
605
+ • State: The state consists of two components: the content
606
+ feature of the key frame and the differencing features
607
+ including inter-frame differences and difference between the
608
+ key frame and the last inference frame. First, the features
609
+ of the key frame (i.e., the first frame of the current chunk)
610
+ are extracted through the 1x1x1000 fully connected FC-
611
+ 1000 layer of VGG16 [40]. Since the dimension of this
612
+ feature is too large, we use principal component analysis
613
+ (PCA) to reduce it to 128 dimensions. Next, we compute the
614
+ inter-frame differences between every two frames of each
615
+ chunk, which is the difference of edge features (i.e., apply
616
+ the Laplacian operator to the residual of each frame) as
617
+ discussed in Section III. Considering that there is continuity
618
+ between chunks, it is also necessary to add information
619
+ about inter-chunk, that is, the difference of edge features
620
+ between the key frame and the last inference frame in the
621
+ previous chunk.
622
+ • Action: The action is to set two thresholds tr1 and tr2 for
623
+ each chunk. The first threshold tr1 is applied to these frames
624
+ to select anchor frames for SR and transfer their quality to
625
+ the others for scale-up. The second one tr2 is to select
626
+ inference frames that need to be analyzed by inference
627
+ DNN. Then, the rest of the frames reuses the inference
628
+ results by exploring frame reference. It is challenge to
629
+ make accurate decisions for a large space of actions [41].
630
+ Therefore, we discretize the action space to reduce the
631
+ search space, i.e., tr1 ∈ {0.05, 0.10, 0.15, ..., 0.75} and
632
+ tr2 ∈ {0.5, 1.0, ..., 2.5}.
633
+ • Reward: Given that AccDecoder aims to maximize the
634
+ inference accuracy within a tolerable latency. Therefore,
635
+ the reward is designed to include two aspects, namely, the
636
+ average accuracy of the chunk and the latency required
637
+ to obtain the inference results for the chunk. Our goal is
638
+ to achieve real-time inference, so the chunk needs to be
639
+ analyzed before the arrival of the next chunk (e.g., within 1s
640
+ for each chunk); otherwise, there is a penalty for exceeding
641
+ the specified time. The reward for each chunk t is defined
642
+ as follows.
643
+ rt = α1
644
+ |Ft|
645
+
646
+ f∈Ft
647
+ Accf(trt,1, trt,2) − α2Pt(trt,1, trt,2), (2)
648
+ where α1 and α2 are the weight factors to balance the pref-
649
+ erence for latency and accuracy. The value of α in reward
650
+ can be adjusted based on different service preferences and
651
+ requirements. Pt is a penalty function of chunk t for latency
652
+ exceeding the tolerance τ.
653
+ Pt(trt,1, trt,2) =
654
+
655
+ 1
656
+ if Latency(trt,1, trt,2) > τ,
657
+ 0
658
+ others.
659
+ (3)
660
+ The process of DRL in frame selection is shown below. At
661
+ each chunk t, the agent observes the current state st and gives
662
+ an action at according to its policy. Then, the environment
663
+ returns reward rt as feedback, and moves to the next state
664
+ st+1 according to the transition probability P(st+1|st, at).
665
+ The goal to find an optimal policy can thus be formulated
666
+ as the mathematical problem of maximizing the expectation
667
+ of cumulative discounted return Rt = �T
668
+ k=t γk−trk, where
669
+ γ ∈ [0, 1] is a discount factor for future rewards to dampen
670
+ the effect of future rewards on the action; rk is the reward of
671
+ each step, and T is the number of chunks in the video.
672
+ Computational complexity. The searching space of the op-
673
+ timal pipeline selection for a chunk is O(3k), where k is
674
+ the number of frames in the chunk. The searching space of
675
+ AccDecoder’s scheduler is O(|a|), where |a| is the number of
676
+ possible actions. As we discretize the action space, therefore,
677
+ the complexity of AccDecoder is much less than that of
678
+ optimal pipeline selection.
679
+ IV. IMPLEMENTATION
680
+ We implement AccDecoder as an intelligent decoder in
681
+ both simulation and prototype. We first introduce the system
682
+ settings of the experiment and the setup of the dataset and the
683
+ baselines. Next, we introduce the training setup of AccDecoder
684
+ on neural networks of DRL, SR, and inference.
685
+ A. System Settings, Dataset, and Baselines
686
+ System settings. The server component runs on an Ubuntu
687
+ 18.04 instance with Intel(R) Xeon(R) Gold 6226R CPU at
688
+ 2.90GHz and 1 NVIDIA GeForce RTX 3070 GPU. AccDe-
689
+ coder is built on H.264 codec [42], JM 19.0 version open
690
+ source code [43], with 2470 LoC changes. In practice, there
691
+ are several video codecs besides H.264, but they have a high
692
+
693
+ degree of similarity. For example, they share the same abstracts
694
+ (i.e., reference index, MV, and residual), which are essential
695
+ information to transfer neural super-resolution outputs to non-
696
+ anchor frames. Their difference is in low-level compression
697
+ algorithms (e.g., the number of reference frames and the
698
+ size of blocks). Thus, while we only use H.264 to validate
699
+ AccDecoder’s design, we believe the design is generic enough
700
+ to accommodate different codecs.
701
+ Dataset. Our video dataset mainly contains public data streams
702
+ from real-time surveillance cameras deployed worldwide. We
703
+ collected video clips of different scenes and times from differ-
704
+ ent camera data sources. Thus, video datasets with different
705
+ properties (e.g., time, illumination, vehicle and pedestrian
706
+ density, road type, and direction) are obtained. All of our
707
+ videos are available by searching on YouTube [35], [44], [45]
708
+ and Yoda [7], [36], [46]. The videos are in 30fps, of which
709
+ each chunk includes 30 frames (i.e., k = 30). In particular,
710
+ VisDrone dataset [47] is used to train SR model. We use
711
+ CityScapes [48] as dataset and results of ERFNet [49] to
712
+ calculate inference loss for training.
713
+ Baselines. We compare AccDecoder’s performance with the
714
+ following four baselines: (1) Glimpse [24] filters frames by
715
+ comparing pixel-level frame differences against a static thresh-
716
+ old. (2) AWStream [10] adapts encoding parameters (i.e.,
717
+ quantization parameter (QP), resolution, and frame rate) of the
718
+ underlying codec to cope with different available bandwidth;
719
+ (3) DDS [5] applies different quality encodings to different
720
+ regions via region proposal network (RPN) [3], which can
721
+ offer trade-off accuracy and latency. (4) Reducto [6] filters
722
+ unnecessary frames in its encoder via a dynamic setting
723
+ threshold given by the server to save bandwidth in uploading.
724
+ B. DNN Implementation
725
+ DRL settings. In the experiments, we set α1 = α2 = 0.5 and
726
+ τ = 1s for each chunk according to our practical experience
727
+ and requirements of services. We use an Adam optimizer
728
+ with a learning rate of 0.0001. The discount factor for reward
729
+ gamma is 0.99. We use a two-layer MLP with 128 units to
730
+ implement the policy networks in DRL. The neural networks
731
+ use ReLU as activation functions. The capacity of the replay
732
+ buffer is 105, and we take a minibatch of 256 to update the
733
+ network parameters.
734
+ SR model. For object detection, we train the detection-driven
735
+ SR model based on EDSR [50] following the analytics aware
736
+ loss function (i.e., a weighted addition of visual quality loss
737
+ and object detection inference loss) in [15]. We use VisDrone
738
+ dataset [47] as the training set to train our model; use testing
739
+ set from VisDrone, video set from DDS [5] and Reducto [6] to
740
+ evaluate its performance. The visual quality loss comes from
741
+ the pair of original and down sampling frames; the object
742
+ detection inference loss comes from the results of YOLOv4 [1]
743
+ detecting on reconstructed frames (from the down sampling
744
+ frames) and the labels. The initial weights of EDSR and
745
+ YOLOv4 are provided by authoritative implementations [1],
746
+ [51]. The weights of EDSR are updated during our training,
747
+ but the one of YOLOv4 keeps static.
748
+ Inference DNN settings. We mainly evaluate AccDecoder’s
749
+ performance on object detection. Here, we list the different
750
+ DNNs used by AccDecoder for object detection. We choose
751
+ two object detection models with different architectures in-
752
+ cluding Faster R-CNN [3], YoLov5 [52]. We pre-trained both
753
+ models using the COCO dataset [53].
754
+ V. EVALUATION
755
+ To demonstrate AccDecoder delivers significant quality im-
756
+ provement, we compare AccDecoder with baselines in terms
757
+ of inference accuracy and latency.
758
+ A. Overall performance of AccDecoder
759
+ Video quality improvement. We illustrate the performance
760
+ of SR via Fig. 10, which shows the visual object detection
761
+ results. The results vary in the original 1080p images with
762
+ ground truth labels, inference results of low resolution (in
763
+ 270p), and inference results of up-scaled images by SR from
764
+ 270p. From the results, we can see SR delivers more detailed
765
+ information to the DNN inference model, thus bounding more
766
+ small objects and improving accuracy in object detection.
767
+ (a) Ground truth (1080p)
768
+ (b) Low resolution (270p)
769
+ (c) Super resolution
770
+ Fig. 10: SR can improve inference accuracy by enhancing
771
+ resolution of frames in videos.
772
+ Accuracy and latency. We demonstrate that AccDecoder
773
+ can effectively improve accuracy-latency trade-off via adaptive
774
+ pipeline assignment. Fig. 11 shows the per-chunk of pipeline
775
+ assignment, accuracy (i.e., f1-score as a measure of accuracy),
776
+ and speed of analytics, respectively. AccDecoder clusters
777
+ frames into three types: 1) anchor frames (around 6%) are
778
+
779
+ selected for pipeline ‚ with SR; 2) inference frames (11%)
780
+ are analyzed by inference DNNs in pipeline ‚ and ƒ, in which
781
+ 5% frames are for pipeline ƒ; 3) non-inference and non-anchor
782
+ frames (around 89%) are selected for pipeline „. Furthermore,
783
+ AccDecoder and Reducto can achieve a higher frame rate than
784
+ the basic requirement (i.e., 30fps), whereas other baselines
785
+ offer a lower rate. AccDecoder can also achieve higher and
786
+ more stable accuracy than the baselines. It is worth noting
787
+ that from the 35th chunk, the density and velocity of vehicles
788
+ increase significantly (i.e., 3x and 2.7x, respectively) so that
789
+ the inferred rate is adjusted to a higher level, which ultimately
790
+ maintains a good accuracy and frame rate.
791
+ Pipeline
792
+ Pipeline
793
+ Pipeline
794
+ > 85%
795
+ density 3x
796
+ velocity 2.7x
797
+ base fps
798
+ Chunk Index
799
+ Fraction
800
+ Chunk index
801
+ 0.00
802
+ 0.08
803
+ 0.16
804
+ 0.24
805
+ 0.80
806
+ 1.00
807
+ AccDec.
808
+ DDS
809
+ Reducto
810
+ Glimpse
811
+ Awstream
812
+ Fig. 11: Pipeline assignment ratio, analytics speed, and infer-
813
+ ence accuracy of chunks.
814
+ B. Component-wise Analysis
815
+ Performance breakdown. We break down the accuracy and
816
+ the latency to show the impact of each pipeline illustrated in
817
+ Fig. 12. Firstly, Fig. 12(a) breakdowns the accuracy in transfer
818
+ of anchor frames, reuse of the inference frames, and SR. The
819
+ impact of reuse and SR on accuracy is obvious, while the
820
+ impact of transfer is relatively small. The main reason is that
821
+ the transfer has less improvement on small objects due to
822
+ blur caused by interpolation, which will be one of our future
823
+ works. Secondly, Fig. 12(b) shows the latency breakdown
824
+ in processing each chunk, where we use videos in 270p,
825
+ 360p, and 540p, respectively. AccDecoder needs more time
826
+ when processing and analyzing high-resolution videos, i.e.,
827
+ the overall latency in ms. Specifically, SR (∼40%), inference
828
+ (∼30%), and reuse (∼20%) take up most of the latency, while
829
+ DRL-based scheduling and feature extraction only occupy
830
+ around 5%, which can be omitted. SR is time-consuming,
831
+ although only 6% of frames are assigned to pipeline ‚.
832
+ Besides, inferring pipeline ‚ and ƒ for around 11% of frames
833
+ also takes a latency that cannot be ignored. Although the time
834
+ cost of reuse per frame is small, the time cost of reuse requires
835
+ (a) Accuracy breakdown
836
+ 1%
837
+ 36%
838
+ 29%
839
+ 42%
840
+ 6%
841
+ 22%
842
+ 1%
843
+ 27%
844
+ 49%
845
+ 5%
846
+ 18%
847
+ 1%
848
+ 40%
849
+ 5%
850
+ 18%
851
+ Resolution
852
+ 1%
853
+ 36%
854
+ 29%
855
+ 42%
856
+ 6%
857
+ 22%
858
+ 1%
859
+ 27%
860
+ 49%
861
+ 5%
862
+ 18%
863
+ 1%
864
+ 40%
865
+ 5%
866
+ 18%
867
+ DRL
868
+ Infer
869
+ SR
870
+ Feature
871
+ Reuse
872
+ Resolution
873
+ Latency (ms)
874
+ 270p
875
+ 360p
876
+ 540p
877
+ 800
878
+ 600
879
+ 400
880
+ 200
881
+ 0
882
+ (b) Latency breakdown
883
+ Fig. 12: Performance breakdown on accuracy and latency.
884
+ 20% latency in total due to more than 85% frames belonging
885
+ to pipeline „.
886
+ AccDecoder schedulers. We evaluate the scheduler’s per-
887
+ formance in AccDecoder, including DRL-based schemes and
888
+ KNN, as illustrated in Fig. 13. We choose three well-known
889
+ DRL schemes for training: Asynchronous Advantage Actor-
890
+ Critic (A3C) [54], Soft Actor-Critic (SAC) [55], and Proximal
891
+ Policy Optimization (PPO) [56]. Through effective explo-
892
+ ration, we find A3C can receive a satisfactory and stable
893
+ cumulative reward, which was about 11.42% higher than the
894
+ cumulative reward received by KNN and PPO. From the final
895
+ cumulative reward value in the figure, the cumulative rewards
896
+ of A3C and SAC are higher. Considering the advantages of
897
+ A3C, we choose A3C for the training of the scheduler.
898
+ 0
899
+ 500
900
+ 1000
901
+ 1500
902
+ 2000
903
+ 2500
904
+ 3000
905
+ Episodes
906
+ 30
907
+ 32
908
+ 34
909
+ 36
910
+ 38
911
+ 40
912
+ Reward
913
+ A3C
914
+ PPO
915
+ SAC
916
+ KNN
917
+ Fig. 13: Comparison of different schemes for the scheduler
918
+ in AccDecoder. DRL is better than KNN, and A3C achieves
919
+ better learning performance than the others.
920
+
921
+ 1.00
922
+ 0.80.
923
+ raction
924
+ 0.24
925
+ 0.16
926
+ F
927
+ 0.08C. AccDecoder vs. Existing VAPs
928
+ AccDecoder vs. baselines. We show the advantage of AccDe-
929
+ coder in accuracy and speed of analytics compared with the
930
+ baselines. Fig. 14 compares the performance distribution of
931
+ AccDecoder with the baseline over different DNNs (YOLOv5
932
+ and Faster R-CNN with Resnet50) and various types of videos
933
+ (i.e., highways and crossroads). It can be seen that AccDecoder
934
+ is better than the baseline in terms of speed and accuracy of
935
+ analytics. In terms of speed, AccDecoder’s analytics speed is
936
+ around 35fps, which meets the penalty threshold we set for
937
+ DRL training. In terms of accuracy, AccDecoder can keep
938
+ relatively higher accuracy compared with the baselines.
939
+ 0.2
940
+ 0.4
941
+ 0.6
942
+ 0.8
943
+ F1-score
944
+ 0
945
+ 15
946
+ 30
947
+ 45
948
+ FPS
949
+ AccDec.
950
+ DDS
951
+ Reducto
952
+ Glimpse
953
+ AWStream
954
+ Better
955
+ (a) Faster R-CNN (highways)
956
+ 0.2
957
+ 0.4
958
+ 0.6
959
+ 0.8
960
+ F1-score
961
+ 0
962
+ 15
963
+ 30
964
+ 45
965
+ FPS
966
+ AccDec.
967
+ DDS
968
+ Reducto
969
+ Glimpse
970
+ AWStream
971
+ Better
972
+ (b) Yolov5 (highways)
973
+ 0.2
974
+ 0.4
975
+ 0.6
976
+ 0.8
977
+ F1-score
978
+ 0
979
+ 15
980
+ 30
981
+ 45
982
+ FPS
983
+ AccDec.
984
+ DDS
985
+ Reducto
986
+ Glimpse
987
+ AWStream
988
+ Better
989
+ (c) Faster R-CNN (crossroad)
990
+ 0.2
991
+ 0.4
992
+ 0.6
993
+ 0.8
994
+ F1-score
995
+ 0
996
+ 15
997
+ 30
998
+ 45
999
+ FPS
1000
+ AccDec.
1001
+ DDS
1002
+ Reducto
1003
+ Glimpse
1004
+ AWStream
1005
+ Better
1006
+ (d) Yolov5 (crossroad)
1007
+ Fig. 14: AccDecoder vs. baselines in terms of the speed of
1008
+ analytics and inference accuracy on various video datasets (in
1009
+ parentheses) and different DNN models (i.e., Faster R-CNN
1010
+ and Yolov5). AccDecoder achieves 6-38% higher inference
1011
+ accuracy than the baselines and 20-80% lower latency than
1012
+ the baselines except for Reducto.
1013
+ VI. RELATED WORKS
1014
+ Video analytics pipeline. Many computer vision tasks are
1015
+ considered in VAPs, such as traffic control [57], surveillance
1016
+ and security [11]. We consider the following task as a running
1017
+ example — object detection. Object detection aims to identify
1018
+ objects of interest (i.e., their locations and classes) in each
1019
+ frame in the video. Selecting this task has two major reasons:
1020
+ first, it plays a core role in the computer vision community
1021
+ because a wide range of high-level tasks (e.g., autonomous
1022
+ driving) is built on it; second, we seek to keep consistent
1023
+ with prior video analytics work [5], [58]–[60] to allow a
1024
+ straightforward performance comparison.
1025
+ Deep
1026
+ reinforcement
1027
+ learning. DRL is well suited to
1028
+ tackle problems requiring longer-term planning using high-
1029
+ dimensional observations, which is the case of dynamic
1030
+ pipeline selection. There is a variety of DRL-based algorithms.
1031
+ Value-based algorithms, e.g., Deep Q-Networks (DQN) [61],
1032
+ use a deep neural network to learn the action-value function.
1033
+ However, they do not support continuous action space like the
1034
+ one in our problem. Policy-based algorithms, e.g., Policy Gra-
1035
+ dient (PG) [62], explicitly build a representation of a policy.
1036
+ However, evaluating a policy without action-value estimation
1037
+ is typically inefficient and causes high variance. Actor-critic
1038
+ algorithms learn the value function (critic) in addition to the
1039
+ policy (actor) since knowing the value function can assist
1040
+ policy updates, for example, by reducing variance in policy
1041
+ gradients. Many existing approaches are based on actor-critic,
1042
+ for example, PPO [56], A3C [54], and SAC [55]. A3C, an
1043
+ asynchronous algorithm, can enable multiple worker agents to
1044
+ train in parallel, allowing faster training.
1045
+ VII. CONCLUSION AND DISCUSSION
1046
+ In this paper, we propose AccDecoder to eliminate the
1047
+ dependence of existing VAPs on video quality. AccDecoder
1048
+ is a new universal video stream decoder that uses a super-
1049
+ resolution deep neural network to enhance video quality for
1050
+ video analytics. To accelerate analytics, AccDecoder applies
1051
+ DRL for adaptive frame selection for quality enhancement
1052
+ or/and DNN-based inference. It is a new way to address the
1053
+ key challenge of accuracy-latency tradeoff in distributed VAPs.
1054
+ We show that AccDecoder can substantially improve state-of-
1055
+ the-art VAPs by speeding up analytics (3-7x) and achieving
1056
+ accuracy improvements (6-21%).
1057
+ In future work, we plan to explore DRL for macroblock
1058
+ selection to offer finer-grained scheduling and joint adaptation
1059
+ encoding and decoding to further improve the accuracy and
1060
+ speed of analytics.
1061
+ ACKNOWLEDGMENT
1062
+ This work has been partly funded by EU H2020 COSAFE
1063
+ (Grant 824019) and Horizon CODECO projects (Grant
1064
+ 101092696), the Alexander von Humboldt Foundation, and
1065
+ the National Natural Science Foundation of China under Grant
1066
+ 61872178, 62272223, and Grant 61832005.
1067
+ REFERENCES
1068
+ [1] A. Bochkovskiy, C.-Y. Wang, and H.-Y. M. Liao, “Yolov4: Optimal
1069
+ speed and accuracy of object detection,” in arXiv:2004.10934, 2020.
1070
+ [2] N. Ahn, B. Kang, and K.-A. Sohn, “Fast, accurate, and lightweight
1071
+ super-resolution with cascading residual network,” in Proc. of ECCV,
1072
+ 2018, pp. 252–268.
1073
+ [3] S. Ren, K. He, R. Girshick, and J. Sun, “Faster R-CNN: Towards
1074
+ real-time object detection with region proposal networks,” Advances in
1075
+ Neural Information Processing Systems, vol. 28, 2015.
1076
+ [4] H. Wang, X. Jiang, H. Ren, Y. Hu, and S. Bai, “Swiftnet: Real-time
1077
+ video object segmentation,” in Proc. of CVPR, 2021, pp. 1296–1305.
1078
+ [5] K. Du, A. Pervaiz, X. Yuan, A. Chowdhery, Q. Zhang, H. Hoffmann, and
1079
+ J. Jiang, “Server-driven video streaming for deep learning inference,” in
1080
+ Proc. of ACM SIGCOMM, 2020, pp. 557–570.
1081
+ [6] Y. Li, A. Padmanabhan, P. Zhao, Y. Wang, G. H. Xu, and R. Netravali,
1082
+ “Reducto: On-camera filtering for resource-efficient real-time video
1083
+ analytics,” in Proc. of ACM SIGCOMM, 2020, pp. 359–376.
1084
+ [7] Yoda,
1085
+ “Crossroad
1086
+ video,”
1087
+ https://yoda.cs.uchicago.edu/videos/
1088
+ cross-road.mp4.
1089
+ [8] New York City Department of Transportation, “Real time traffic infor-
1090
+ mation,” https://webcams.nyctmc.org/, Mar. 2020.
1091
+
1092
+ [9] P. Wei, H. Shi, J. Yang, J. Qian, Y. Ji, and X. Jiang, “City-scale vehicle
1093
+ tracking and traffic flow estimation using low frame-rate traffic cameras,”
1094
+ in Proc. of UbiComp/ISWC, 2019, pp. 602–610.
1095
+ [10] B. Zhang, X. Jin, S. Ratnasamy, J. Wawrzynek, and E. A. Lee,
1096
+ “Awstream: Adaptive wide-area streaming analytics.” in Proc. of ACM
1097
+ SIGCOMM, 2018, pp. 236–252.
1098
+ [11] J. Yi, S. Choi, and Y. Lee, “EagleEye: Wearable camera-based person
1099
+ identification in crowded urban spaces,” in Proc. of MobiCom, 2020.
1100
+ [12] J. Yi, S. Kim, J. Kim, and S. Choi, “Supremo: Cloud-assisted low-
1101
+ latency super-resolution in mobile devices,” IEEE Transactions on
1102
+ Mobile Computing, pp. 1847–1860, 2020.
1103
+ [13] J. Huang, V. Rathod, C. Sun, M. Zhu, A. Korattikara, A. Fathi, I. Fischer,
1104
+ Z. Wojna, Y. Song, S. Guadarrama et al., “Speed/accuracy trade-offs
1105
+ for modern convolutional object detectors,” in Proc. of CVPR, 2017, pp.
1106
+ 7310–7311.
1107
+ [14] Y. Chen, Y. Tai, X. Liu, C. Shen, and J. Yang, “Fsrnet: End-to-end
1108
+ learning face super-resolution with facial priors,” in Proc. of CVPR,
1109
+ 2018.
1110
+ [15] Y. Wang, W. Wang, D. Liu, X. Jin, J. Jiang, and K. Chen, “Enabling
1111
+ edge-cloud video analytics for robotics applications,” in Proc. of IEEE
1112
+ INFOCOM, 2022, pp. 1–10.
1113
+ [16] Z. Zou, Z. Shi, Y. Guo, and J. Ye, “Object detection in 20 years: A
1114
+ survey,” arXiv:1905.05055, 2019.
1115
+ [17] A. Ghodrati, B. E. Bejnordi, and A. Habibian, “Frameexit: Conditional
1116
+ early exiting for efficient video recognition,” in Proc. of CVPR, 2021,
1117
+ pp. 15 608–15 618.
1118
+ [18] A. Habibian, D. Abati, T. S. Cohen, and B. E. Bejnordi, “Skip-
1119
+ convolutions for efficient video processing,” in Proc. of CVPR, 2021,
1120
+ pp. 2695–2704.
1121
+ [19] N. C. Luong, D. T. Hoang, S. Gong, D. Niyato, P. Wang, Y.-C.
1122
+ Liang, and D. I. Kim, “Applications of deep reinforcement learning
1123
+ in communications and networking: A survey,” IEEE Communications
1124
+ Surveys & Tutorials, vol. 21, no. 4, pp. 3133–3174, 2019.
1125
+ [20] K. Arulkumaran, M. P. Deisenroth, M. Brundage, and A. A. Bharath, “A
1126
+ brief survey of deep reinforcement learning,” IEEE Signal Processing
1127
+ Magazine, vol. 34, no. 6, 2017.
1128
+ [21] T. Yuan, H.-M. Chung, J. Yuan, and X. Fu, “DACOM: Learning delay-
1129
+ aware communication for multi-agent reinforcement learning,” in Proc.
1130
+ of AAAI, 2023.
1131
+ [22] T. Yuan, C. E. Rothenberg, K. Obraczka, C. Barakat, and T. Turletti,
1132
+ “Harnessing UAVs for fair 5G bandwidth allocation in vehicular com-
1133
+ munication via deep reinforcement learning,” IEEE Transactions on
1134
+ Network and Service Management, vol. 18, no. 4, pp. 4063–4074, 2021.
1135
+ [23] T. Yuan, W. da Rocha Neto, C. E. Rothenberg, K. Obraczka, C. Barakat,
1136
+ and T. Turletti, “Dynamic controller assignment in software defined
1137
+ internet of vehicles through multi-agent deep reinforcement learning,”
1138
+ IEEE Transactions on Network and Service Management, vol. 18, no. 1,
1139
+ pp. 585–596, 2020.
1140
+ [24] T. Y.-H. Chen, L. Ravindranath, S. Deng, P. Bahl, and H. Balakrishnan,
1141
+ “Glimpse: Continuous, real-time object recognition on mobile devices,”
1142
+ in Proc. of SenSys, 2015, pp. 155–168.
1143
+ [25] Boulder AI, “Dnncam ai camera,” https://groupgets.com/campaigns/
1144
+ 429-dnncam-ai-camera.
1145
+ [26] NVIDIA,
1146
+ “Jetson
1147
+ tx2,”
1148
+ https://www.nvidia.com/de-de/
1149
+ autonomous-machines/embedded-systems/jetson-tx2.
1150
+ [27] T. Wiegand, G. J. Sullivan, G. Bjontegaard, and A. Luthra, “Overview of
1151
+ the H. 264/AVC video coding standard,” IEEE Transactions on Circuits
1152
+ and Systems for Video Technology, vol. 13, no. 7, pp. 560–576, 2003.
1153
+ [28] M. Dasari, A. Bhattacharya, S. Vargas, P. Sahu, A. Balasubramanian,
1154
+ and S. R. Das, “Streaming 360-degree videos using super-resolution,”
1155
+ in Proc. of IEEE INFOCOM, 2020, pp. 1977–1986.
1156
+ [29] J. Kim, Y. Jung, H. Yeo, J. Ye, and D. Han, “Neural-enhanced live
1157
+ streaming: Improving live video ingest via online learning,” in Proc. of
1158
+ ACM SIGCOMM, 2020, pp. 107–125.
1159
+ [30] H. Yeo, C. J. Chong, Y. Jung, J. Ye, and D. Han, “Nemo: enabling neural-
1160
+ enhanced video streaming on commodity mobile devices,” in Proc. of
1161
+ MobiCom, 2020, pp. 1–14.
1162
+ [31] H. Yeo, Y. Jung, J. Kim, J. Shin, and D. Han, “Neural adaptive content-
1163
+ aware internet video delivery,” in Proc. of OSDI 18, 2018, pp. 645–661.
1164
+ [32] Y. Wang, W. Wang, J. Zhang, J. Jiang, and K. Chen, “Bridging the
1165
+ edge-cloud barrier for real-time advanced vision analytics,” in Proc. of
1166
+ HotCloud, 2019.
1167
+ [33] T. Zhang, A. Chowdhery, P. Bahl, K. Jamieson, and S. Banerjee, “The
1168
+ design and implementation of a wireless video surveillance system,” in
1169
+ Proc. of MobiCom, 2015, pp. 426–438.
1170
+ [34] H. Yeo, S. Do, and D. Han, “How will deep learning change internet
1171
+ video delivery?” in Proc. of ACM HotNets, 2017, pp. 57–64.
1172
+ [35] Youtube, “Gebhardt insurance traffic cam round trip bike shop,” https:
1173
+ //www.youtube.com/watch?v= XBMMTQVj68.
1174
+ [36] Yoda, “Highway video,” https://yoda.cs.uchicago.edu/videos/highway.
1175
+ mp4.
1176
+ [37] J. Zhang, D. Zhang, X. Xu, F. Jia, Y. Liu, X. Liu, J. Ren, and Y. Zhang,
1177
+ “MobiPose: Real-time multi-person pose estimation on mobile devices,”
1178
+ in Proc. of SenSys, 2020, pp. 136–149.
1179
+ [38] R. Xu, C.-l. Zhang, P. Wang, J. Lee, S. Mitra, S. Chaterji, Y. Li,
1180
+ and S. Bagchi, “ApproxDet: content and contention-aware approximate
1181
+ object detection for mobiles,” in Proc. of SenSys, 2020, pp. 449–462.
1182
+ [39] L. Liu, H. Li, and M. Gruteser, “Edge assisted real-time object detection
1183
+ for mobile augmented reality,” in Proc. of MobiCom, 2019, pp. 1–16.
1184
+ [40] K. Simonyan and A. Zisserman, “Very deep convolutional networks for
1185
+ large-scale image recognition,” in Proc. of ICLR, 2015, pp. 602–610.
1186
+ [41] S. Yan, X. Wang, X. Zheng, Y. Xia, D. Liu, and W. Deng, “ACC:
1187
+ Automatic ECN tuning for high-speed datacenter networks,” in Proc. of
1188
+ ACM SIGCOMM, 2021, pp. 384–397.
1189
+ [42] Google,
1190
+ “libvpx
1191
+ official
1192
+ github
1193
+ repository,”
1194
+ https://github.com/
1195
+ webmproject/libvpx/.
1196
+ [43] Open Source, “Jm 19.0,” https://iphome.hhi.de/suehring/.
1197
+ [44] Youtube, “Jackson hole wyoming usa town square live cam,” https://
1198
+ www.youtube.com/watch?v=1EiC9bvVGnk.
1199
+ [45] Youtube, “City of auburn toomer’s corner webcam,” https://www.
1200
+ youtube.com/watch?v=hMYIc5ZPJL4.
1201
+ [46] Yoda, “Motorway video,” https://yoda.cs.uchicago.edu/videos/motorway.
1202
+ mp4.
1203
+ [47] H. Fan, D. Du, L. Wen, P. Zhu, Q. Hu, H. Ling, M. Shah, J. Pan,
1204
+ A. Schumann, B. Dong et al., “Visdrone-mot2020: The vision meets
1205
+ drone multiple object tracking challenge results,” in Proc. of ECCV,
1206
+ 2020, pp. 713–727.
1207
+ [48] M. Cordts, M. Omran, S. Ramos, T. Rehfeld, M. Enzweiler, R. Be-
1208
+ nenson, U. Franke, S. Roth, and B. Schiele, “The cityscapes dataset
1209
+ for semantic urban scene understanding,” in Proc. of CVPR, 2016, pp.
1210
+ 3213–3223.
1211
+ [49] E. Romera, J. M. Alvarez, L. M. Bergasa, and R. Arroyo, “Erfnet: Effi-
1212
+ cient residual factorized convnet for real-time semantic segmentation,”
1213
+ IEEE Transactions on Intelligent Transportation Systems, vol. 19, no. 1,
1214
+ pp. 263–272, 2017.
1215
+ [50] B. Lim, S. Son, H. Kim, S. Nah, and K. Mu Lee, “Enhanced deep
1216
+ residual networks for single image super-resolution,” in Proc. of CVPR,
1217
+ 2017, pp. 136–144.
1218
+ [51] B. Lim, S. Son, H. Kim, S. Nah, and K. M. Lee, “Enhanced deep residual
1219
+ networks for single image super-resolution,” in Proc. of CVPR, 2017.
1220
+ [52] J. Redmon and A. Farhadi, “Yolo9000: better, faster, stronger.” in Proc.
1221
+ of CVPR, 2017.
1222
+ [53] C. dataset, “highway video,” https://cocodataset.org/.
1223
+ [54] V. Mnih, A. P. Badia, M. Mirza, A. Graves, T. Lillicrap, T. Harley,
1224
+ D. Silver, and K. Kavukcuoglu, “Asynchronous methods for deep
1225
+ reinforcement learning,” in Proc. of ICML, 2016.
1226
+ [55] T. Haarnoja, A. Zhou, P. Abbeel, and S. Levine, “Soft actor-critic: Off-
1227
+ policy maximum entropy deep reinforcement learning with a stochastic
1228
+ actor,” in Proc. of ICML, 2018, pp. 1861–1870.
1229
+ [56] J. Schulman, F. Wolski, P. Dhariwal, A. Radford, and O. Klimov,
1230
+ “Proximal policy optimization algorithms,” arXiv:1707.06347, 2017.
1231
+ [57] G. Ananthanarayanan, P. Bahl, P. Bod´ık, K. Chintalapudi, M. Philipose,
1232
+ L. Ravindranath, and S. Sinha, “Real-time video analytics: The killer
1233
+ app for edge computing,” IEEE Computer, vol. 50, no. 10, pp. 58–67,
1234
+ 2017.
1235
+ [58] J. Jiang, G. Ananthanarayanan, P. Bodik, S. Sen, and I. Stoica,
1236
+ “Chameleon: scalable adaptation of video analytics,” in Proc. of ACM
1237
+ SIGCOMM, 2018, pp. 253–266.
1238
+ [59] S. Jain, X. Zhang, Y. Zhou, G. Ananthanarayanan, J. Jiang, Y. Shu,
1239
+ V. Bahl, and J. Gonzalez, “Spatula: Efficient cross-camera video analyt-
1240
+ ics on large camera networks,” in Proc. ACM SEC, 2020, pp. 110–124.
1241
+ [60] Y. Yuan, W. Wang, Y. Wang, S. S. Adhatarao, B. Ren, K. Zheng, and
1242
+ X. Fu, “VSiM: Improving QoE fairness for video streaming in mobile
1243
+ environments,” in Proc. of IEEE INFOCOM, 2022, pp. 1309–1318.
1244
+
1245
+ [61] V. Mnih, K. Kavukcuoglu, D. Silver, A. A. Rusu, J. Veness, M. G.
1246
+ Bellemare, A. Graves, M. Riedmiller, A. K. Fidjeland, G. Ostrovski
1247
+ et al., “Human-level control through deep reinforcement learning,”
1248
+ Nature, vol. 518, no. 7540, pp. 529–533, 2015.
1249
+ [62] R. S. Sutton, D. A. McAllester, S. P. Singh, Y. Mansour et al., “Policy
1250
+ gradient methods for reinforcement learning with function approxima-
1251
+ tion.” in Proc. of NIPS, vol. 99, 1999, pp. 1057–1063.
1252
+