jackkuo commited on
Commit
8bad820
·
verified ·
1 Parent(s): 474558a

Add files using upload-large-folder tool

Browse files
This view is limited to 50 files because it contains too many changes.   See raw diff
Files changed (50) hide show
  1. -NFIT4oBgHgl3EQf8ysQ/content/tmp_files/load_file.txt +0 -0
  2. -dAyT4oBgHgl3EQfdfdm/content/tmp_files/2301.00303v1.pdf.txt +1483 -0
  3. -dAyT4oBgHgl3EQfdfdm/content/tmp_files/load_file.txt +0 -0
  4. -tE3T4oBgHgl3EQfrgrp/content/tmp_files/2301.04661v1.pdf.txt +0 -0
  5. -tE3T4oBgHgl3EQfrgrp/content/tmp_files/load_file.txt +0 -0
  6. .gitattributes +50 -0
  7. 19E4T4oBgHgl3EQfzg22/vector_store/index.faiss +3 -0
  8. 1NFQT4oBgHgl3EQf1DYE/content/2301.13418v1.pdf +3 -0
  9. 4NFKT4oBgHgl3EQfRi0P/content/2301.11771v1.pdf +3 -0
  10. 5NE5T4oBgHgl3EQfPA41/content/tmp_files/2301.05501v1.pdf.txt +1580 -0
  11. 5NE5T4oBgHgl3EQfPA41/content/tmp_files/load_file.txt +0 -0
  12. 6dE1T4oBgHgl3EQf7AUK/content/tmp_files/2301.03528v1.pdf.txt +717 -0
  13. 6dE1T4oBgHgl3EQf7AUK/content/tmp_files/load_file.txt +0 -0
  14. 8tE2T4oBgHgl3EQflgdv/content/2301.03989v1.pdf +3 -0
  15. 8tE2T4oBgHgl3EQflgdv/vector_store/index.faiss +3 -0
  16. 99E1T4oBgHgl3EQfCgIZ/vector_store/index.faiss +3 -0
  17. ANAzT4oBgHgl3EQfTPxG/content/tmp_files/2301.01245v1.pdf.txt +934 -0
  18. ANAzT4oBgHgl3EQfTPxG/content/tmp_files/load_file.txt +0 -0
  19. BNAzT4oBgHgl3EQfhv2_/content/2301.01490v1.pdf +3 -0
  20. BtE4T4oBgHgl3EQfFQxm/content/tmp_files/2301.04884v1.pdf.txt +1067 -0
  21. BtE4T4oBgHgl3EQfFQxm/content/tmp_files/load_file.txt +0 -0
  22. F9E1T4oBgHgl3EQf-wbm/content/tmp_files/2301.03574v1.pdf.txt +1963 -0
  23. F9E1T4oBgHgl3EQf-wbm/content/tmp_files/load_file.txt +0 -0
  24. F9FKT4oBgHgl3EQfbS5P/vector_store/index.faiss +3 -0
  25. G9E4T4oBgHgl3EQfgQ3v/vector_store/index.pkl +3 -0
  26. HtE2T4oBgHgl3EQf_AnW/vector_store/index.faiss +3 -0
  27. I9AyT4oBgHgl3EQffvhT/vector_store/index.faiss +3 -0
  28. IdE2T4oBgHgl3EQfUQce/content/tmp_files/2301.03810v1.pdf.txt +0 -0
  29. IdE2T4oBgHgl3EQfUQce/content/tmp_files/load_file.txt +0 -0
  30. ItE3T4oBgHgl3EQfXAqD/content/2301.04475v1.pdf +3 -0
  31. ItE3T4oBgHgl3EQfXAqD/vector_store/index.pkl +3 -0
  32. ItFJT4oBgHgl3EQfFyzw/vector_store/index.faiss +3 -0
  33. JdAzT4oBgHgl3EQfH_vd/content/tmp_files/2301.01056v1.pdf.txt +0 -0
  34. JdAzT4oBgHgl3EQfH_vd/content/tmp_files/load_file.txt +0 -0
  35. KdAyT4oBgHgl3EQff_ia/vector_store/index.faiss +3 -0
  36. KdAyT4oBgHgl3EQff_ia/vector_store/index.pkl +3 -0
  37. LNE1T4oBgHgl3EQfGwM1/content/tmp_files/2301.02917v1.pdf.txt +539 -0
  38. LNE1T4oBgHgl3EQfGwM1/content/tmp_files/load_file.txt +372 -0
  39. LNFAT4oBgHgl3EQfwR78/content/2301.08681v1.pdf +3 -0
  40. LNFAT4oBgHgl3EQfwR78/vector_store/index.pkl +3 -0
  41. LNFQT4oBgHgl3EQfUDZM/vector_store/index.pkl +3 -0
  42. MNE0T4oBgHgl3EQf0AKB/content/tmp_files/2301.02680v1.pdf.txt +0 -0
  43. MNE0T4oBgHgl3EQf0AKB/content/tmp_files/load_file.txt +0 -0
  44. MtFOT4oBgHgl3EQf1jQj/content/tmp_files/2301.12939v1.pdf.txt +666 -0
  45. MtFOT4oBgHgl3EQf1jQj/content/tmp_files/load_file.txt +0 -0
  46. N9AyT4oBgHgl3EQftPlh/content/tmp_files/2301.00591v1.pdf.txt +704 -0
  47. N9AyT4oBgHgl3EQftPlh/content/tmp_files/load_file.txt +405 -0
  48. O9FJT4oBgHgl3EQf1S22/content/2301.11651v1.pdf +3 -0
  49. O9FJT4oBgHgl3EQf1S22/vector_store/index.pkl +3 -0
  50. Q9E4T4oBgHgl3EQf_A6p/content/tmp_files/2301.05368v1.pdf.txt +883 -0
-NFIT4oBgHgl3EQf8ysQ/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
-dAyT4oBgHgl3EQfdfdm/content/tmp_files/2301.00303v1.pdf.txt ADDED
@@ -0,0 +1,1483 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Rethinking with Retrieval: Faithful Large Language Model Inference
2
+ Hangfeng He†∗
3
+ Hongming Zhang‡
4
+ Dan Roth§
5
+ †University of Rochester
6
+ ‡Tencent AI Lab, Seattle
7
+ §University of Pennsylvania
8
9
10
+ Abstract
11
+ Despite the success of large language mod-
12
+ els (LLMs) in various natural language pro-
13
+ cessing (NLP) tasks, the stored knowledge
14
+ in these models may inevitably be incom-
15
+ plete, out-of-date, or incorrect.
16
+ This mo-
17
+ tivates the need to utilize external knowl-
18
+ edge to assist LLMs. Unfortunately, current
19
+ methods for incorporating external knowl-
20
+ edge often require additional training or
21
+ fine-tuning, which can be costly and may
22
+ not be feasible for LLMs. To address this
23
+ issue, we propose a novel post-processing
24
+ approach, rethinking with retrieval (RR),
25
+ which retrieves relevant external knowledge
26
+ based on the decomposed reasoning steps
27
+ obtained from the chain-of-thought (CoT)
28
+ prompting. This lightweight approach does
29
+ not require additional training or fine-tuning
30
+ and is not limited by the input length of
31
+ LLMs. We evaluate the effectiveness of RR
32
+ through extensive experiments with GPT-3
33
+ on three complex reasoning tasks: common-
34
+ sense reasoning, temporal reasoning, and
35
+ tabular reasoning. Our results show that RR
36
+ can produce more faithful explanations and
37
+ improve the performance of LLMs.1
38
+ 1
39
+ Introduction
40
+ Large language models (LLMs) have shown
41
+ exceptional performance across various tasks
42
+ through in-context learning without task-specific
43
+ training or fine-tuning (Brown et al., 2020;
44
+ Chowdhery et al., 2022; Zhang et al., 2022;
45
+ Ouyang et al., 2022). Recent progress in prompt-
46
+ ing (Wei et al., 2022; Zhou et al., 2022; Kojima
47
+ et al., 2022) and decoding (Wang et al., 2022) has
48
+ made it feasible for LLMs to tackle tasks that de-
49
+ mand complex reasoning.
50
+ ∗Part of this work was done while the author was at the
51
+ University of Pennsylvania.
52
+ 1Our code is publicly available at https://github.
53
+ com/HornHehhf/RR.
54
+ Query
55
+ Prediction
56
+ LLM
57
+ Query
58
+ Explanation + Prediction
59
+ LLM
60
+ Query
61
+ Explanation + Prediction
62
+ LLM
63
+ (a)
64
+ (b)
65
+ (c)
66
+ Knowledge
67
+ Chain of thought
68
+ Chain of thought
69
+ Retrieval
70
+ Rethinking
71
+ Figure 1: An overview of three approaches for using
72
+ LLMs: (a) Standard prompting for generating a pre-
73
+ diction in response to a query. (b) Chain-of-thought
74
+ prompting for generating both an explanation and a
75
+ prediction in response to a query. (c) Rethinking with
76
+ retrieval, our proposed approach for using the decom-
77
+ posed reasoning steps obtained from chain-of-thought
78
+ prompting to retrieve relevant external knowledge for
79
+ LLMs, leading to more faithful explanations and im-
80
+ proved predictions in response to a query.
81
+ However, the knowledge stored in LLMs might
82
+ inevitably be incomplete, out-of-date, or incorrect.
83
+ As a result, external sources of knowledge, such
84
+ as Wikipedia, may be essential for the success-
85
+ ful deployment of LLMs for real-world applica-
86
+ tions. Previously, people tried to utilize knowl-
87
+ edge for smaller language models (LMs), such
88
+ as T5 (Raffel et al., 2020), BERT (Devlin et al.,
89
+ 2019), and RoBERTa (Liu et al., 2019). However,
90
+ these methods often require additional training or
91
+ fine-tuning, which can be costly and thus imprac-
92
+ tical for LLMs.
93
+ In this paper, we present a post-processing
94
+ approach called rethinking with retrieval (RR)
95
+ for utilizing external knowledge in LLMs. Our
96
+ method begins by using the chain-of-thought
97
+ (CoT) prompting method (Wei et al., 2022) to gen-
98
+ erate a diverse set of reasoning paths, as described
99
+ in Wang et al. (2022).
100
+ We then use each rea-
101
+ soning step in those paths to retrieve relevant ex-
102
+ ternal knowledge, which enables RR to provide
103
+ arXiv:2301.00303v1 [cs.CL] 31 Dec 2022
104
+
105
+ more faithful explanations and more accurate pre-
106
+ dictions, as illustrated in Figure 1.
107
+ We evaluate the effectiveness of our proposed
108
+ method, RR, on three complex reasoning tasks:
109
+ commonsense reasoning, temporal reasoning, and
110
+ tabular reasoning, using GPT-3 175B (Brown
111
+ et al., 2020) and different external knowledge
112
+ sources:
113
+ Wikipedia, Wikidata (Vrandeˇci´c and
114
+ Krötzsch, 2014), WordNet (Miller, 1995), and
115
+ Conceptnet (Speer et al., 2017).
116
+ The results
117
+ demonstrate that RR consistently outperforms all
118
+ baselines on all three tasks without requiring ad-
119
+ ditional training or fine-tuning, indicating the su-
120
+ periority of our approach in leveraging external
121
+ knowledge to enhance the performance of LLMs.
122
+ 2
123
+ Related Work
124
+ Enhancing LMs through retrieval.
125
+ Retrieval-
126
+ enhanced LMs have received significant attention
127
+ as a means of improving performance through the
128
+ incorporation of external knowledge. For exam-
129
+ ple, the k-most similar training contexts can be re-
130
+ trieved to improve the estimation of the next word
131
+ distribution in both the training stage (Borgeaud
132
+ et al., 2021) and the inference stage (Khandelwal
133
+ et al., 2020). Furthermore, search query genera-
134
+ tors have been adopted to generate search queries
135
+ for search engines to retrieve relevant documents
136
+ (Komeili et al., 2022; Shuster et al., 2022; Thop-
137
+ pilan et al., 2022).
138
+ Other approaches have uti-
139
+ lized retrieved documents as the additional con-
140
+ text in generation tasks (Joshi et al., 2020; Guu
141
+ et al., 2020; Lewis et al., 2020). Nakano et al.
142
+ (2021) instead use human feedback in a text-based
143
+ web-browsing environment.
144
+ Among these pre-
145
+ vious works, Khandelwal et al. (2020) is most
146
+ closely related to our approach.
147
+ However, they
148
+ focus on improving local inference by using the
149
+ nearest neighbor datastore constructed from train-
150
+ ing data, whereas we focus on conducting faith-
151
+ ful inference using external knowledge. In con-
152
+ trast to other aforementioned approaches, which
153
+ require training or fine-tuning to incorporate re-
154
+ trieved knowledge, we propose a post-processing
155
+ method for leveraging retrieved knowledge with-
156
+ out additional training or fine-tuning.
157
+ Incorporating external knowledge into LMs.
158
+ Significant effort has been devoted to leveraging
159
+ external knowledge to improve the reasoning abil-
160
+ ity of LMs. Previous work has incorporated exter-
161
+ nal knowledge sources such as WordNet (Miller,
162
+ 1995) and ConceptNet (Speer et al., 2017) to en-
163
+ hance LMs for tabular reasoning tasks (Neeraja
164
+ et al., 2021; Varun et al., 2022).
165
+ Explicit rules
166
+ have also been added to inputs to improve rea-
167
+ soning ability over implicit knowledge (Talmor
168
+ et al., 2020). In addition, explicit knowledge from
169
+ Wikidata (Vrandeˇci´c and Krötzsch, 2014) and im-
170
+ plicit knowledge in LLMs have been integrated
171
+ into a transformer (Vaswani et al., 2017) for vi-
172
+ sual question answering (Gui et al., 2021). Nye
173
+ et al. (2021) instead introduces a symbolic reason-
174
+ ing module to improve coherence and consistency
175
+ in LLMs. Among these previous works, Nye et al.
176
+ (2021) is the most relevant to our approach. Still,
177
+ they focus on incorporating logical constraints to
178
+ improve coherence and consistency, whereas we
179
+ aim to improve the faithfulness of explanations
180
+ through the use of external knowledge. In con-
181
+ trast to other aforementioned approaches that in-
182
+ corporate external knowledge before generation
183
+ and require additional training or fine-tuning, our
184
+ proposal leverages external knowledge in a post-
185
+ processing manner to enhance LMs without addi-
186
+ tional training or fine-tuning.
187
+ Uncovering latent Knowledge in LLMs.
188
+ There
189
+ has been a line of work exploring the knowledge
190
+ hidden within LLMs for reasoning. This has in-
191
+ cluded the use of careful prompting to encourage
192
+ LLMs to generate explanations in the reasoning
193
+ process, such as through chain of thought prompt-
194
+ ing in few-shot (Wei et al., 2022) or zero-shot
195
+ (Kojima et al., 2022) learning, or through the use
196
+ of scratchpads for intermediate computation (Nye
197
+ et al., 2022). In addition, various methods based
198
+ on sampling a diverse set of reasoning paths in
199
+ LLMs have been proposed, including training ver-
200
+ ifiers to judge the correctness of model comple-
201
+ tions (Cobbe et al., 2021), calibrating model pre-
202
+ dictions based on the reliability of the explana-
203
+ tions (Ye and Durrett, 2022), and promoting self-
204
+ consistency over diverse reasoning paths (Wang
205
+ et al., 2022). Zelikman et al. (2022) instead it-
206
+ eratively bootstrap the ability of LLMs to gener-
207
+ ate high-quality rationales from a few initial ex-
208
+ amples. Liu et al. (2022) further propose generat-
209
+ ing knowledge from LLMs, which is then used as
210
+ additional input to improve commonsense reason-
211
+ ing. In contrast to this line of work, our proposal
212
+ focuses on leveraging external knowledge to en-
213
+ hance LLMs, while they aim to explore the knowl-
214
+ edge hidden within LLMs.
215
+
216
+ 3
217
+ Rethinking with Retrieval
218
+ LLMs have been shown to generate incorrect sup-
219
+ porting facts from time to time, even when they ac-
220
+ curately capture the perspective needed to answer
221
+ a question. This phenomenon highlights intrinsic
222
+ issues in the way LLMs store and retrieve knowl-
223
+ edge, including (1) the presence of out-of-date,
224
+ incorrect, or missing relevant knowledge in the
225
+ pre-training corpus; (2) incorrect memorization of
226
+ relevant knowledge during pre-training; and (3)
227
+ incorrect retrieval of relevant knowledge during
228
+ the inference stage. To address these issues, we
229
+ propose the use of RR, which leverages external
230
+ knowledge through the retrieval of relevant infor-
231
+ mation based on decomposed reasoning steps.
232
+ Overview.
233
+ Given a query Q, we utilize chain-of-
234
+ thought prompting to generate a diverse set of rea-
235
+ soning paths R1, R2, · · · RN, where each reason-
236
+ ing path Ri consists of an explanation Ei followed
237
+ by a prediction Pi. After that, we retrieve relevant
238
+ knowledge K1, · · · KM from a suitable knowledge
239
+ base KB to support the explanation in each reason-
240
+ ing path, and select the prediction ˆP that is most
241
+ faithful to this knowledge. To better illustrate our
242
+ proposal, we use “Did Aristotle use a laptop?” as
243
+ a running example in this work.
244
+ Chain-of-thought prompting.
245
+ In contrast to
246
+ standard prompting, CoT prompting (Wei et al.,
247
+ 2022) includes demonstrations of step-by-step rea-
248
+ soning examples in the prompt to produce a series
249
+ of short sentences that capture the reasoning pro-
250
+ cess. For instance, given the question “Did Aris-
251
+ totle use a laptop?”, CoT prompting aims to gen-
252
+ erate the complete reasoning path “Aristotle died
253
+ in 322 BC. The first laptop was invented in 1980.
254
+ Thus, Aristotle did not use a laptop. So the answer
255
+ is no.” rather than simply outputs “No.” Empirical
256
+ results show that CoT prompting significantly im-
257
+ proves the performance of LLMs on many multi-
258
+ step reasoning tasks. Therefore, we adopt CoT
259
+ prompting to obtain both explanation E and pre-
260
+ diction P for the query Q.
261
+ Sampling diverse reasoning paths.
262
+ Similar to
263
+ Wang et al. (2022), we sample a diverse set of rea-
264
+ soning paths R1, R2, · · · RN rather than only con-
265
+ sidering the greedy path as in Wei et al. (2022).
266
+ For the question “Did Aristotle use a laptop?”, the
267
+ potential reasoning paths can be as follows:
268
+ (R1) Aristotle died in 2000. The first laptop was
269
+ invented in 1980. Thus, Aristotle used a lap-
270
+ top. So the answer is yes.
271
+ (R2) Aristotle died in 322BC. The first laptop was
272
+ invented in 2000. Thus, Aristotle did not use
273
+ a laptop. So the answer is no.
274
+ (R3) Aristotle died in 322BC. The first laptop was
275
+ invented in 1980. Thus, Aristotle did not use
276
+ a laptop. So the answer is no.
277
+ Knowledge
278
+ retrieval.
279
+ Different
280
+ knowledge
281
+ bases can be used to address different tasks. For
282
+ example, to address the question “Did Aristotle
283
+ use a laptop?”, we can use Wikipedia as the ex-
284
+ ternal knowledge base KB. Information retrieval
285
+ techniques can be applied to retrieve the relevant
286
+ knowledge K1, · · · KM from Wikipedia based
287
+ on the decomposed reasoning steps. Ideally, we
288
+ would obtain the following two paragraphs from
289
+ Wikipedia for this question:
290
+ (K1) Aristotle (384–322 BC) was a Greek philoso-
291
+ pher and polymath during the Classical pe-
292
+ riod in Ancient Greece. ...
293
+ (K2) The Epson HX-20, the first laptop computer,
294
+ was invented in 1980. ...
295
+ Faithful inference.
296
+ The faithfulness of each rea-
297
+ soning path Ri can be estimated using a function
298
+ fKB(Ri), which is based on relevant knowledge
299
+ K1, · · · , KM retrieved from the knowledge base
300
+ KB. The final prediction is obtained through the
301
+ application of the following inference procedure2:
302
+ ˆP =
303
+ arg max
304
+ Pi∈{P1,··· ,PN}
305
+ N
306
+
307
+ i=1
308
+ 1(Pi = P)fKB(Ri), (1)
309
+ where Pi denotes the corresponding prediction in
310
+ the reasoning path Ri. This inference procedure
311
+ is designed to identify the most faithful prediction
312
+ ˆP to the knowledge base among all predictions in
313
+ the N reasoning paths. For instance, in the run-
314
+ ning example, given reasoning paths R1, R2, R3
315
+ and the retrieved knowledge K1, K2, the above in-
316
+ ference procedure would output the prediction “So
317
+ the answer is no.”, as it is supported by both R2
318
+ and R3 and has a higher faithfulness score com-
319
+ pared to the prediction “So the answer is yes.”,
320
+ which is only supported by R1.
321
+ 2Note that this is the basic version of faithful inference,
322
+ and further variations can be found in Section 5.3.
323
+
324
+ 4
325
+ Experiments
326
+ In this section, we present the evaluation of our
327
+ proposed method, RR, on three complex reason-
328
+ ing tasks: commonsense reasoning, temporal rea-
329
+ soning, and tabular reasoning.
330
+ 4.1
331
+ Baselines
332
+ We compare with the following baselines.
333
+ Zero-shot/few-shot prompting.
334
+ In our experi-
335
+ ments, we consider GPT-3 with standard zero-
336
+ shot/few-shot prompting as baselines, following
337
+ the approach described in Brown et al. (2020), in
338
+ which zero or few in-context exemplars of input-
339
+ output pairs are provided in the prompt.
340
+ Chain-of-thought prompting.
341
+ In addition to
342
+ the standard zero-shot/few-shot prompting, we
343
+ also consider GPT-3 with the CoT prompting pro-
344
+ posed in (Wei et al., 2022) as a baseline in our ex-
345
+ periments. This approach involves feeding LLMs
346
+ step-by-step reasoning examples instead of stan-
347
+ dard input-output examples.
348
+ Self-consistency.
349
+ In addition, we also consider
350
+ self-consistency (Wang et al., 2022) as a baseline
351
+ in our experiments. This approach, proposed as an
352
+ alternative to the naive greedy decoding used in
353
+ CoT prompting (Wei et al., 2022), involves sam-
354
+ pling a diverse set of reasoning paths and select-
355
+ ing the most consistent answer by marginalizing
356
+ the sampled paths.
357
+ 4.2
358
+ Commonsense Reasoning
359
+ Dataset description.
360
+ For commonsense reason-
361
+ ing, we consider the StrategyQA dataset (Geva
362
+ et al., 2021), which includes questions that require
363
+ implicit reasoning strategies.
364
+ For example, the
365
+ question “Did Aristotle use a laptop?” requires
366
+ implicit decomposition into reasoning steps, while
367
+ the question “Was Aristotle alive when the laptop
368
+ was invented?” explicitly specifies the reasoning
369
+ process. The StrategyQA dataset includes 2, 290
370
+ training examples, each consisting of a question
371
+ (Q), a yes/no answer (A), a decomposition (D),
372
+ evidence paragraphs (E), and supporting facts (F).
373
+ On average, each question requires about 2.93 rea-
374
+ soning steps and 2.33 evidence paragraphs. In ad-
375
+ dition, a development set is constructed by ran-
376
+ domly sampling 10% of the training examples
377
+ (i.e., 229 examples). The answer distribution is
378
+ roughly balanced, with approximately 47% "yes"
379
+ questions in both the training and development
380
+ sets. Unless otherwise specified, the models are
381
+ evaluated on the development set3 for StrategyQA.
382
+ Implementation details.
383
+ In this part, we uti-
384
+ lize Wikipedia as the external knowledge base
385
+ KB. For each sentence in the explanation of ev-
386
+ ery reasoning path, we first apply BM25 (Robert-
387
+ son et al., 2009) to retrieve the top 10 most rele-
388
+ vant paragraphs from Wikipedia. In particular, we
389
+ use the re-implementation of the sparse retrieval
390
+ BM254 in Karpukhin et al. (2020) from Pyserini
391
+ (Lin et al., 2021). Subsequently, we use the pre-
392
+ trained MPNet model (Song et al., 2020) to se-
393
+ lect the most similar paragraph based on the cosine
394
+ similarity between the sentence embeddings of the
395
+ retrieved paragraph and the sentence.
396
+ We then
397
+ employ a pre-trained natural language inference
398
+ (NLI) model (Nie et al., 2020) to obtain the en-
399
+ tailment and contradiction scores for the sentence,
400
+ treating the most similar paragraph as the premise.
401
+ The faithfulness of each reasoning path is then
402
+ calculated using fKB(·) based on the entailment
403
+ scores, contradiction scores, and MPNet similari-
404
+ ties of all sentences in the explanation of the rea-
405
+ soning path. The final prediction for each ques-
406
+ tion is obtained through faithful inference (Equa-
407
+ tion 1). More details about fKB(·) can be found in
408
+ Appendix A.2.
409
+ 4.3
410
+ Temporal Reasoning
411
+ Dataset description.
412
+ In this experiment, we use
413
+ the TempQuestions dataset (Jia et al., 2018) to
414
+ investigate temporal reasoning. This dataset in-
415
+ cludes 1, 271 temporal questions that are divided
416
+ into four classes: explicit temporal, implicit tem-
417
+ poral, temporal answer, and ordinal constraints.
418
+ The questions are paired with their answers from
419
+ Freebase (Bollacker et al., 2008). To examine the
420
+ most challenging aspect of temporal reasoning, we
421
+ focus on the set of implicit temporal questions,
422
+ which contain implicit temporal expressions, in-
423
+ cluding free-text temporal expressions.
424
+ For ex-
425
+ ample, the question “who was governor of oregon
426
+ when shanghai noon was released?” is an implicit
427
+ temporal question. To facilitate our analysis, we
428
+ only consider questions with a single answer, re-
429
+ sulting in a total of 175 examples. Of these ex-
430
+ 3As the annotations for the test set are not publicly avail-
431
+ able, we use the development set for evaluation. This allows
432
+ us to perform a more comprehensive analysis.
433
+ 4We also experimented with DPR and BM25+DPR, and
434
+ found that BM25 outperformed these methods in our experi-
435
+ ments. More details can be found in Appendix A.3.
436
+
437
+ Methods
438
+ Commonsense
439
+ Temporal
440
+ Tabular
441
+ GPT-3
442
+ Zero-shot prompting
443
+ 58.08
444
+ 28.40
445
+ 82.00
446
+ Few-shot prompting
447
+ 63.32
448
+ 29.59
449
+ 83.08
450
+ Chain-of-thought prompting
451
+ 65.94
452
+ 33.14
453
+ 83.33
454
+ Self-consistency
455
+ 73.36
456
+ 37.28
457
+ 84.00
458
+ Rethinking with retrieval
459
+ 77.73
460
+ 39.05
461
+ 84.83
462
+ Table 1: Performance of different methods using GPT-3 on three reasoning tasks.
463
+ amples, the first 6 are used for prompting, and the
464
+ remaining 169 are used for evaluation.
465
+ Implementation details.
466
+ In this part, we utilize
467
+ Wikidata (Vrandeˇci´c and Krötzsch, 2014) as the
468
+ external knowledge base KB, as it is the largest
469
+ publicly available knowledge graph, and the data
470
+ from Freebase has been migrated to Wikidata. To
471
+ incorporate this knowledge into our system, we
472
+ apply an entity linking system5 to each sentence
473
+ in the explanation of each reasoning path to iden-
474
+ tify the corresponding Wikidata pages for all enti-
475
+ ties in the sentence. Next, we extract all temporal
476
+ relations from these relevant Wikidata pages and
477
+ use templates to convert these temporal relations
478
+ into sentences. This step generates a set of rele-
479
+ vant knowledge sentences for each sentence in the
480
+ explanation of each reasoning path. The final pre-
481
+ diction is then obtained by applying the procedure
482
+ described in Section 4.2, in which the retrieved
483
+ paragraphs are replaced with the relevant knowl-
484
+ edge sentences from the current part.
485
+ 4.4
486
+ Tabular Reasoning
487
+ Dataset
488
+ description.
489
+ We
490
+ consider
491
+ the
492
+ IN-
493
+ FOTABS dataset (Gupta et al., 2020) for tabu-
494
+ lar reasoning, which consists of 23, 738 human-
495
+ written textual hypotheses based on premises in
496
+ the form of tables extracted from 2, 540 unique
497
+ Wikipedia info-boxes. We focus on the develop-
498
+ ment set, which includes 1, 800 hypotheses based
499
+ on 200 tables, and only consider entailed and con-
500
+ tradictory hypotheses as it is tricky to write CoT
501
+ demonstrations for neutral hypotheses. This re-
502
+ sults in a total of 1, 200 hypotheses based on 200
503
+ tables for evaluation, with an equal number of en-
504
+ tailed and contradictory hypotheses.
505
+ Implementation details.
506
+ In this part, we utilize
507
+ WordNet (Miller, 1995) and ConceptNet (Speer
508
+ 5We use the spacy entity linker: https://pypi.org/
509
+ project/spacy-entity-linker/.
510
+ et al., 2017) as external knowledge bases. To con-
511
+ vert tables into textual premises, we follow the
512
+ same technique as in Varun et al. (2022). For each
513
+ premise-hypothesis pair, we follow the procedure
514
+ outlined in Varun et al. (2022) to retrieve rele-
515
+ vant word relation triples that connect the premise
516
+ and hypothesis words, such as “married” RelatedTo
517
+ ←−−−−→
518
+ “spouse”.
519
+ These triples are then converted into
520
+ sentences using some simple templates. The re-
521
+ sulting sentences, along with the textual premises
522
+ from the tables, serve as relevant knowledge for
523
+ each sentence in the explanation of each reasoning
524
+ path. To obtain the final prediction, the procedure
525
+ described in Section 4.2 is applied, whereby the
526
+ retrieved paragraphs in Section 4.2 are replaced
527
+ with the relevant knowledge from the current part.
528
+ 4.5
529
+ Evaluation
530
+ Experimental settings.
531
+ In all experiments, we
532
+ utilize GPT-3 text-davinci-002 unless oth-
533
+ erwise stated. The maximum number of tokens for
534
+ generation during completion is set to 256. For
535
+ zero-shot, few-shot, and chain-of-thought prompt-
536
+ ing, the temperature is fixed at 0.
537
+ For self-
538
+ consistency and rethinking with retrieval, we ran-
539
+ domly sample 10 outputs6 with temperature 0.7.
540
+ Detailed prompts can be found in Appendix A.1.
541
+ We evaluate the performance of different methods
542
+ on commonsense and tabular reasoning using ac-
543
+ curacy, and on temporal reasoning using the exact
544
+ match metric as defined in Rajpurkar et al. (2016).
545
+ Results.
546
+ As shown in Table 1, our proposed
547
+ method, rethinking with retrieval, consistently
548
+ outperforms all baselines on all three reasoning
549
+ tasks without requiring additional training or fine-
550
+ tuning. The results highlight the effectiveness of
551
+ our approach in leveraging external knowledge to
552
+ improve the performance of LLMs.
553
+ 6For commonsense reasoning, we sample 9 outputs, as we
554
+ have found that odd numbers of outputs tend to yield better
555
+ voting performance for self-consistency on StrategyQA.
556
+
557
+ Wrong supporting facts
558
+ Wrong inference
559
+ Question
560
+ Was Lil Jon’s top ranked Billboard song a
561
+ collaboration with a member of The Lox?
562
+ Would the top of Mount Fuji stick out of
563
+ the Sea of Japan?
564
+ Answer
565
+ No
566
+ Yes
567
+ Facts
568
+ Lil Jon’s highest ranked billboard song
569
+ was Yeah; Yeah was a collaboration be-
570
+ tween Lil Jon, Usher, and Ludacris; The
571
+ Lox is a rap trio consisting of: Styles P,
572
+ Sheek Louch, and Jadakiss.
573
+ The average depth of the Sea of Japan is
574
+ 5,748 feet (1,752 metres) and its maxi-
575
+ mum depth is 12,276 feet (3,742 metres);
576
+ Mount Fuji is 3,776.24 metres (12,389.2
577
+ ft) tall.
578
+ GPT-3
579
+ Lil Jon’s top ranked Billboard song was
580
+ "Get Low" with the East Side Boyz. The
581
+ Lox is not a member of the East Side
582
+ Boyz.
583
+ Thus, Lil Jon’s top ranked Bill-
584
+ board song was not a collaboration with
585
+ a member of The Lox. So the answer is
586
+ no.
587
+ Mount Fuji is 3,776 meters tall.
588
+ The
589
+ Sea of Japan is about 3,741 meters deep.
590
+ Thus, the top of Mount Fuji would not
591
+ stick out of the Sea of Japan. So the an-
592
+ swer is no.
593
+ Table 2: Examples of incorrect outputs from GPT-3 with CoT prompting.
594
+ 5
595
+ Analysis
596
+ In this section, we perform a thorough analysis to
597
+ gain a deeper understanding of RR.
598
+ 5.1
599
+ Limitations of LLMs in Reasoning
600
+ In this subsection, we present an analysis of GPT-
601
+ 3 with CoT prompting on the StrategyQA dataset.
602
+ Upon closer examination of the outputs of GPT-
603
+ 3, we observed that it can provide reasonable ex-
604
+ planations and correct predictions for a number
605
+ of questions. For example, when given the ques-
606
+ tion “Will the Albany in Georgia reach a hundred
607
+ thousand occupants before the one in New York?”,
608
+ GPT-3 produced the following output:
609
+ The Albany in New York has a pop-
610
+ ulation of about 98,000.
611
+ The Albany
612
+ in Georgia has a population of about
613
+ 77,000. Thus, the Albany in New York
614
+ is more populous than the Albany in
615
+ Georgia. So the answer is no.
616
+ The above output consists of three components:
617
+ (1) supporting facts (in cyan) that are based on a
618
+ particular perspective, (2) chaining arguments (in
619
+ orange), and (3) a prediction (in green).
620
+ Com-
621
+ ponents (1) and (2) contribute to the explanation.
622
+ Overall, the output exhibits a high level of quality.
623
+ However, we also observed that GPT-3 may occa-
624
+ sionally produce incorrect supporting facts for its
625
+ explanations or make incorrect inferences for its
626
+ Retrieval
627
+ Commonsense
628
+ Tabular
629
+ Query-based
630
+ 73.36
631
+ 36.69
632
+ Decomposition-based
633
+ 77.73
634
+ 39.05
635
+ Table
636
+ 3:
637
+ Comparison
638
+ of
639
+ query-based
640
+ and
641
+ decomposition-based
642
+ retrieval
643
+ on
644
+ commonsense
645
+ and tabular reasoning.
646
+ predictions, despite generally being able to iden-
647
+ tify suitable perspectives.
648
+ Wrong supporting facts.
649
+ As shown in Table 2,
650
+ GPT-3 provides the incorrect supporting fact for
651
+ Lil Jon’s top-ranked Billboard song, stating that
652
+ it was “Get Low” instead of the correct answer,
653
+ “Yeah”. However, it does have the correct per-
654
+ spective on how to answer the question, “Was Lil
655
+ Jon’s top ranked Billboard song a collaboration
656
+ with a member of The Lox?”.
657
+ Wrong inference.
658
+ As shown in Table 2, GPT-3
659
+ makes an incorrect inference, stating that the top
660
+ of Mount Fuji “would not stick out” of the Sea of
661
+ Japan, rather than the correct answer, “would stick
662
+ out”. However, it does provide correct supporting
663
+ facts based on the appropriate perspective for the
664
+ question, “Would the top of Mount Fuji stick out of
665
+ the Sea of Japan?”.
666
+ 5.2
667
+ Ablation Study
668
+ Importance of decomposition-based retrieval.
669
+ In our proposed method, we retrieve relevant ex-
670
+
671
+ Knowledge
672
+ Tabular
673
+ External
674
+ 79.92
675
+ Background
676
+ 84.75
677
+ Background + External
678
+ 84.83
679
+ Table 4: Performance of RR with different types of
680
+ knowledge on tabular reasoning: external only, back-
681
+ ground only, and a combination of both.
682
+ External
683
+ knowledge refers to WordNet and ConceptNet, while
684
+ background knowledge refers to the tables.
685
+ ternal knowledge based on the decomposed rea-
686
+ soning steps rather than the original query. To fur-
687
+ ther investigate the impact of this choice, we con-
688
+ ducted additional experiments in which we used
689
+ the original query for knowledge retrieval while
690
+ keeping other aspects of our method unchanged.
691
+ As shown in Table 3, the results for these experi-
692
+ ments are poor for both commonsense and tempo-
693
+ ral reasoning, indicating the importance of using
694
+ decomposition-based retrieval in our approach.
695
+ The impact of different types of knowledge.
696
+ For tabular reasoning, we use both external knowl-
697
+ edge (WordNet and ConceptNet) and background
698
+ knowledge (tables) in our experiments.
699
+ In this
700
+ section, we further examine the effect of differ-
701
+ ent types of knowledge on the performance of our
702
+ proposed method. As shown in Table 4, the addi-
703
+ tional improvement gained by incorporating Wiki-
704
+ data and ConceptNet in addition to tables is lim-
705
+ ited, indicating that GPT-3 already captures many
706
+ word-level relations in these external knowledge
707
+ sources. In addition, the observed significant im-
708
+ provement in tabular reasoning from using tables
709
+ alone suggests that our proposed method can also
710
+ effectively leverage background knowledge.
711
+ 5.3
712
+ Variations of the Proposed Approach
713
+ Basic approach: Weighting outputs.
714
+ In Sec-
715
+ tion 3, we present a basic version of our proposal
716
+ for taking advantage of external knowledge. Our
717
+ basic approach involves weighting outputs as indi-
718
+ vidual units and using a voting mechanism to se-
719
+ lect the best-supported prediction. We can also di-
720
+ rectly choose the best-supported output, which in-
721
+ cludes both an explanation and a prediction, with-
722
+ out using voting.
723
+ For example, in the running
724
+ example of “Did Aristotle use a laptop?”
725
+ (see
726
+ more in Section 3), the third reasoning path R3 is
727
+ the output most supported by the knowledge para-
728
+ graphs K1 and K2.
729
+ Variant I: Fact selection.
730
+ The first variant of
731
+ our approach involves selecting facts from the out-
732
+ puts of LLMs based on external knowledge. For
733
+ example, consider the running example of “Did
734
+ Aristotle use a laptop?”, where we only have ac-
735
+ cess to the first two reasoning paths, R1 and R2.
736
+ In this case, the first sentence in R2 and the sec-
737
+ ond sentence in R1 are supported by knowledge
738
+ K1 and K2, respectively. Therefore, the first vari-
739
+ ant would output the first sentence in R2 and the
740
+ second sentence in R1 as the supporting facts.
741
+ Variant II: Fact generation.
742
+ The second vari-
743
+ ant of our approach involves generating facts
744
+ based on both the outputs of LLMs and external
745
+ knowledge. For example, consider the running ex-
746
+ ample of “Did Aristotle use a laptop?”, where we
747
+ only have access to the first reasoning path R1.
748
+ The second sentence in R1 is supported by the sec-
749
+ ond knowledge paragraph K2. However, the first
750
+ sentence is not supported by any evidence para-
751
+ graphs. We can generate questions about the first
752
+ sentence, such as “When did Aristotle die?” and
753
+ use the first knowledge paragraph K1 to generate
754
+ a new fact: “Aristotle died in 322BC.”. As a result,
755
+ the second variant would output the generated fact
756
+ “Aristotle died in 322 BC.” and the second sen-
757
+ tence in R1 as the supporting facts.
758
+ Inference with supporting facts.
759
+ For the two
760
+ variants of our approach, we only have the sup-
761
+ porting facts and need to perform a final inference
762
+ step to obtain the corresponding prediction. One
763
+ option for this inference is to use LLMs, but they
764
+ can be costly (Brown et al., 2020) or difficult to
765
+ use (Zhang et al., 2022). An alternative is to use an
766
+ off-the-shelf model for inference with supporting
767
+ facts, such as UnifiedQA (Khashabi et al., 2020,
768
+ 2022). As discussed in Appendix A.5, UnifiedQA
769
+ is more robust to noisy supporting facts than GPT-
770
+ 3. We thus use the second version of UnifiedQA,
771
+ UnifiedQA-v2 (Khashabi et al., 2022), for the final
772
+ step of inference.
773
+ Experimental settings.
774
+ In this part, we focus
775
+ on commonsense reasoning and use the evidence
776
+ paragraphs provided in StrategyQA as the rele-
777
+ vant knowledge, rather than the retrieved para-
778
+ graphs discussed in Section 4.2. To evaluate the
779
+ quality of the explanations, we adopt the best met-
780
+ ric for factual consistency evaluation in Honovich
781
+
782
+ 1.3B
783
+ 2.7B
784
+ 6.7B
785
+ 13B
786
+ 30B
787
+ 175B
788
+ Model Size
789
+ 0
790
+ 20
791
+ 40
792
+ 60
793
+ 80
794
+ Accuracy (%)
795
+ Chain-of-thought prompting
796
+ Rethinking with retrieval
797
+ (a) Accuracy of predictions
798
+ 1.3B
799
+ 2.7B
800
+ 6.7B
801
+ 13B
802
+ 30B
803
+ 175B
804
+ Model Size
805
+ 20
806
+ 25
807
+ 30
808
+ 35
809
+ 40
810
+ 45
811
+ 50
812
+ 55
813
+ Factuality (%)
814
+ Chain-of-thought prompting
815
+ Rethinking with retrieval
816
+ (b) Faithfulness of explanations
817
+ Figure 2: The effect of LM size on the performance of our proposed method (Variant II) and CoT prompting. We
818
+ use various sizes of OPT models, with the exception of the 175B model, which is GPT-3.
819
+ Methods
820
+ Accuracy (%)
821
+ Faithfulness (%)
822
+ CoT prompting
823
+ 65.94
824
+ 38.73
825
+ Basic (w/o voting)
826
+ 76.86
827
+ 50.02
828
+ Variant I
829
+ 78.60
830
+ 54.11
831
+ Variant II
832
+ 78.60
833
+ 54.54
834
+ Table 5: Comparison of various variations of RR and
835
+ the CoT prompting baseline on StrategyQA using evi-
836
+ dence paragraphs.
837
+ et al. (2022). For simplicity, we use the pre-trained
838
+ NLI model released by Nie et al. (2020) to com-
839
+ pute the NLI-based metric, rather than fine-tuning
840
+ T5-11B (Raffel et al., 2020) ourselves. The imple-
841
+ mentation details of the two variants can be found
842
+ in Appendix A.4.
843
+ Results.
844
+ Table 5 illustrates that the fact selec-
845
+ tion and fact generation variants of our proposal
846
+ improve the faithfulness of the supporting facts in
847
+ explanations, leading to increased prediction ac-
848
+ curacy compared to the basic approach without
849
+ voting. Across all variations of our proposal, we
850
+ observe significant improvements in both predic-
851
+ tion accuracy and the faithfulness of explanations
852
+ when compared to the CoT prompting baseline.
853
+ The incorporation of a voting mechanism leads
854
+ to an increased prediction accuracy of 79.91% for
855
+ the basic approach. Comparison with the perfor-
856
+ mance (i.e., 77.73%) of the same approach us-
857
+ ing retrieved paragraphs rather than evidence para-
858
+ graphs in Table 1 demonstrates that retrieved para-
859
+ graphs are also effective for our proposal, as both
860
+ significantly outperform the voting baseline, self-
861
+ consistency (i.e., 73.36%), as shown in Table 1.
862
+ It is noteworthy that UnifiedQA performs
863
+ poorly on StrategyQA, achieving an accuracy of
864
+ only 58.95%.
865
+ However, when provided with
866
+ gold supporting facts in StrategyQA, UnifiedQA
867
+ demonstrates excellent performance with an accu-
868
+ racy of 90.83%. This suggests that UnifiedQA is
869
+ suitable for last-step inference, but not effective
870
+ for answering questions in StrategyQA.
871
+ 5.4
872
+ Impact of the Size of LMs
873
+ In this subsection, we examine the effect of the
874
+ size of LMs on the performance of our proposed
875
+ method, specifically in the context of the fact gen-
876
+ eration variant. We compare the performance of
877
+ our method using various sizes of OPT models
878
+ (Zhang et al., 2022) in addition to GPT-3 (175B)
879
+ using the same experimental setup as in Sec-
880
+ tion 5.3.
881
+ As shown in Figure 2, our proposed
882
+ method (Variant II) consistently outperforms CoT
883
+ prompting in terms of both prediction accuracy
884
+ and the faithfulness of explanations, even when
885
+ using smaller LMs.
886
+ 6
887
+ Conclusion
888
+ In conclusion, the proposed approach is a promis-
889
+ ing solution for utilizing external knowledge to as-
890
+ sist LLMs. Unlike traditional methods, RR does
891
+ not require additional training or fine-tuning, mak-
892
+ ing it a lightweight and feasible option for LLMs.
893
+ Through extensive experiments on three reason-
894
+ ing tasks using GPT-3, we have shown that RR is
895
+ able to produce more faithful explanations and im-
896
+ prove the performance of LLMs. In the future, we
897
+ plan to investigate various variations of RR to en-
898
+ hance its effectiveness and efficiency in augment-
899
+ ing LLMs with external knowledge.
900
+
901
+ References
902
+ Kurt Bollacker, Colin Evans, Praveen Paritosh,
903
+ Tim Sturge, and Jamie Taylor. 2008. Freebase:
904
+ a collaboratively created graph database for
905
+ structuring human knowledge. In Proceedings
906
+ of the 2008 ACM SIGMOD international con-
907
+ ference on Management of data, pages 1247–
908
+ 1250.
909
+ Sebastian Borgeaud, Arthur Mensch, Jordan Hoff-
910
+ mann, Trevor Cai, Eliza Rutherford, Katie Mil-
911
+ lican, George van den Driessche, Jean-Baptiste
912
+ Lespiau, Bogdan Damoc, Aidan Clark, et al.
913
+ 2021. Improving language models by retriev-
914
+ ing from trillions of tokens.
915
+ arXiv preprint
916
+ arXiv:2112.04426.
917
+ Tom Brown,
918
+ Benjamin Mann,
919
+ Nick Ryder,
920
+ Melanie Subbiah, Jared D Kaplan, Prafulla
921
+ Dhariwal, Arvind Neelakantan, Pranav Shyam,
922
+ Girish Sastry, Amanda Askell, et al. 2020.
923
+ Language models are few-shot learners.
924
+ Ad-
925
+ vances in neural information processing sys-
926
+ tems, 33:1877–1901.
927
+ Aakanksha Chowdhery, Sharan Narang, Jacob De-
928
+ vlin, Maarten Bosma, Gaurav Mishra, Adam
929
+ Roberts, Paul Barham, Hyung Won Chung,
930
+ Charles Sutton, Sebastian Gehrmann, et al.
931
+ 2022. Palm: Scaling language modeling with
932
+ pathways. arXiv preprint arXiv:2204.02311.
933
+ Karl Cobbe, Vineet Kosaraju, Mohammad Bavar-
934
+ ian, Jacob Hilton, Reiichiro Nakano, Christo-
935
+ pher Hesse, and John Schulman. 2021. Training
936
+ verifiers to solve math word problems. arXiv
937
+ preprint arXiv:2110.14168.
938
+ Ido
939
+ Dagan,
940
+ Oren
941
+ Glickman,
942
+ and
943
+ Bernardo
944
+ Magnini. 2005.
945
+ The pascal recognising tex-
946
+ tual entailment challenge. In Machine learning
947
+ challenges workshop, pages 177–190. Springer.
948
+ Daniel Deutsch, Tania Bedrax-Weiss, and Dan
949
+ Roth. 2021.
950
+ Towards question-answering as
951
+ an automatic metric for evaluating the content
952
+ quality of a summary. Transactions of the Asso-
953
+ ciation for Computational Linguistics, 9:774–
954
+ 789.
955
+ Jacob Devlin, Ming-Wei Chang, Kenton Lee, and
956
+ Kristina Toutanova. 2019. BERT: Pre-training
957
+ of deep bidirectional transformers for language
958
+ understanding.
959
+ In Proceedings of the 2019
960
+ Conference of the North American Chapter
961
+ of the Association for Computational Linguis-
962
+ tics: Human Language Technologies, Volume 1
963
+ (Long and Short Papers), pages 4171–4186.
964
+ Alexander R Fabbri, Chien-Sheng Wu, Wenhao
965
+ Liu, and Caiming Xiong. 2021.
966
+ Qafacte-
967
+ val:
968
+ Improved qa-based factual consistency
969
+ evaluation for summarization.
970
+ arXiv preprint
971
+ arXiv:2112.08542.
972
+ Mor Geva, Daniel Khashabi, Elad Segal, Tushar
973
+ Khot, Dan Roth, and Jonathan Berant. 2021.
974
+ Did aristotle use a laptop? a question answer-
975
+ ing benchmark with implicit reasoning strate-
976
+ gies. Transactions of the Association for Com-
977
+ putational Linguistics, 9:346–361.
978
+ Liangke Gui, Borui Wang, Qiuyuan Huang, Alex
979
+ Hauptmann, Yonatan Bisk, and Jianfeng Gao.
980
+ 2021.
981
+ Kat: A knowledge augmented trans-
982
+ former for vision-and-language. arXiv preprint
983
+ arXiv:2112.08614.
984
+ Vivek Gupta, Maitrey Mehta, Pegah Nokhiz, and
985
+ Vivek Srikumar. 2020. Infotabs: Inference on
986
+ tables as semi-structured data.
987
+ In Proceed-
988
+ ings of the 58th Annual Meeting of the As-
989
+ sociation for Computational Linguistics, pages
990
+ 2309–2324.
991
+ Kelvin Guu, Kenton Lee, Zora Tung, Panupong
992
+ Pasupat, and Mingwei Chang. 2020. Retrieval
993
+ augmented language model pre-training. In In-
994
+ ternational Conference on Machine Learning,
995
+ pages 3929–3938. PMLR.
996
+ Or Honovich, Roee Aharoni, Jonathan Herzig,
997
+ Hagai Taitelbaum, Doron Kukliansy, Vered Co-
998
+ hen, Thomas Scialom, Idan Szpektor, Avinatan
999
+ Hassidim, and Yossi Matias. 2022. True: Re-
1000
+ evaluating factual consistency evaluation.
1001
+ In
1002
+ Proceedings of the Second DialDoc Workshop
1003
+ on Document-grounded Dialogue and Conver-
1004
+ sational Question Answering, pages 161–175.
1005
+ Or Honovich, Leshem Choshen, Roee Aharoni,
1006
+ Ella Neeman, Idan Szpektor, and Omri Abend.
1007
+ 2021.
1008
+ Q2::
1009
+ Evaluating factual consistency
1010
+ in knowledge-grounded dialogues via question
1011
+ generation and question answering.
1012
+ In Pro-
1013
+ ceedings of the 2021 Conference on Empiri-
1014
+ cal Methods in Natural Language Processing,
1015
+ pages 7856–7870.
1016
+
1017
+ Zhen
1018
+ Jia,
1019
+ Abdalghani
1020
+ Abujabal,
1021
+ Rishiraj
1022
+ Saha Roy,
1023
+ Jannik Strötgen,
1024
+ and Gerhard
1025
+ Weikum. 2018. Tempquestions: A benchmark
1026
+ for temporal question answering. In Compan-
1027
+ ion Proceedings of the The Web Conference
1028
+ 2018, pages 1057–1062.
1029
+ Mandar Joshi, Kenton Lee, Yi Luan, and Kristina
1030
+ Toutanova. 2020.
1031
+ Contextualized representa-
1032
+ tions using textual encyclopedic knowledge.
1033
+ arXiv preprint arXiv:2004.12006.
1034
+ Vladimir Karpukhin, Barlas Oguz, Sewon Min,
1035
+ Patrick Lewis, Ledell Wu, Sergey Edunov,
1036
+ Danqi Chen, and Wen-tau Yih. 2020.
1037
+ Dense
1038
+ passage retrieval for open-domain question an-
1039
+ swering. In Proceedings of the 2020 Confer-
1040
+ ence on Empirical Methods in Natural Lan-
1041
+ guage Processing (EMNLP), pages 6769–6781.
1042
+ Urvashi Khandelwal, Omer Levy, Dan Juraf-
1043
+ sky, Luke Zettlemoyer, and Mike Lewis. 2020.
1044
+ Generalization through memorization: Nearest
1045
+ neighbor language models.
1046
+ In International
1047
+ Conference on Learning Representations.
1048
+ Daniel Khashabi, Yeganeh Kordi, and Hannaneh
1049
+ Hajishirzi. 2022. Unifiedqa-v2: Stronger gen-
1050
+ eralization via broader cross-format training.
1051
+ arXiv preprint arXiv:2202.12359.
1052
+ Daniel Khashabi,
1053
+ Sewon Min,
1054
+ Tushar Khot,
1055
+ Ashish Sabharwal, Oyvind Tafjord, Peter Clark,
1056
+ and Hannaneh Hajishirzi. 2020.
1057
+ Unifiedqa:
1058
+ Crossing format boundaries with a single qa
1059
+ system. In Findings of the Association for Com-
1060
+ putational Linguistics:
1061
+ EMNLP 2020, pages
1062
+ 1896–1907.
1063
+ Takeshi Kojima, Shixiang Shane Gu, Machel
1064
+ Reid, Yutaka Matsuo, and Yusuke Iwasawa.
1065
+ 2022. Large language models are zero-shot rea-
1066
+ soners. arXiv preprint arXiv:2205.11916.
1067
+ Mojtaba Komeili, Kurt Shuster, and Jason Weston.
1068
+ 2022. Internet-augmented dialogue generation.
1069
+ In Proceedings of the 60th Annual Meeting of
1070
+ the Association for Computational Linguistics
1071
+ (Volume 1: Long Papers), pages 8460–8478.
1072
+ Patrick Lewis, Ethan Perez, Aleksandra Piktus,
1073
+ Fabio Petroni, Vladimir Karpukhin, Naman
1074
+ Goyal, Heinrich Küttler, Mike Lewis, Wen-tau
1075
+ Yih, Tim Rocktäschel, et al. 2020. Retrieval-
1076
+ augmented generation for knowledge-intensive
1077
+ nlp tasks. Advances in Neural Information Pro-
1078
+ cessing Systems, 33:9459–9474.
1079
+ Jimmy Lin, Xueguang Ma, Sheng-Chieh Lin,
1080
+ Jheng-Hong Yang, Ronak Pradeep, and Rodrigo
1081
+ Nogueira. 2021. Pyserini: A Python toolkit for
1082
+ reproducible information retrieval research with
1083
+ sparse and dense representations. In Proceed-
1084
+ ings of the 44th Annual International ACM SI-
1085
+ GIR Conference on Research and Development
1086
+ in Information Retrieval (SIGIR 2021), pages
1087
+ 2356–2362.
1088
+ Jiacheng Liu,
1089
+ Alisa Liu,
1090
+ Ximing Lu,
1091
+ Sean
1092
+ Welleck, Peter West, Ronan Le Bras, Yejin
1093
+ Choi, and Hannaneh Hajishirzi. 2022.
1094
+ Gen-
1095
+ erated knowledge prompting for commonsense
1096
+ reasoning. In Proceedings of the 60th Annual
1097
+ Meeting of the Association for Computational
1098
+ Linguistics (Volume 1:
1099
+ Long Papers), pages
1100
+ 3154–3169.
1101
+ Yinhan Liu, Myle Ott, Naman Goyal, Jingfei
1102
+ Du, Mandar Joshi, Danqi Chen, Omer Levy,
1103
+ Mike Lewis, Luke Zettlemoyer, and Veselin
1104
+ Stoyanov. 2019.
1105
+ Roberta:
1106
+ A robustly opti-
1107
+ mized bert pretraining approach. arXiv preprint
1108
+ arXiv:1907.11692.
1109
+ George A Miller. 1995.
1110
+ Wordnet:
1111
+ a lexical
1112
+ database for english.
1113
+ Communications of the
1114
+ ACM, 38(11):39–41.
1115
+ Reiichiro Nakano, Jacob Hilton, Suchir Bal-
1116
+ aji, Jeff Wu, Long Ouyang, Christina Kim,
1117
+ Christopher Hesse,
1118
+ Shantanu Jain,
1119
+ Vineet
1120
+ Kosaraju, William Saunders, et al. 2021. We-
1121
+ bgpt:
1122
+ Browser-assisted
1123
+ question-answering
1124
+ with
1125
+ human
1126
+ feedback.
1127
+ arXiv
1128
+ preprint
1129
+ arXiv:2112.09332.
1130
+ J Neeraja, Vivek Gupta, and Vivek Srikumar.
1131
+ 2021. Incorporating external knowledge to en-
1132
+ hance tabular reasoning. In Proceedings of the
1133
+ 2021 Conference of the North American Chap-
1134
+ ter of the Association for Computational Lin-
1135
+ guistics: Human Language Technologies, pages
1136
+ 2799–2809.
1137
+ Yixin Nie, Adina Williams, Emily Dinan, Mohit
1138
+ Bansal, Jason Weston, and Douwe Kiela. 2020.
1139
+ Adversarial nli: A new benchmark for natu-
1140
+ ral language understanding. In Proceedings of
1141
+ the 58th Annual Meeting of the Association for
1142
+ Computational Linguistics, pages 4885–4901.
1143
+
1144
+ Maxwell Nye, Anders Johan Andreassen, Guy
1145
+ Gur-Ari, Henryk Michalewski, Jacob Austin,
1146
+ David Bieber, David Dohan, Aitor Lewkowycz,
1147
+ Maarten Bosma, David Luan, et al. 2022. Show
1148
+ your work: Scratchpads for intermediate com-
1149
+ putation with language models. In Deep Learn-
1150
+ ing for Code Workshop.
1151
+ Maxwell Nye, Michael Tessler, Josh Tenenbaum,
1152
+ and Brenden M Lake. 2021. Improving coher-
1153
+ ence and consistency in neural sequence mod-
1154
+ els with dual-system, neuro-symbolic reason-
1155
+ ing. Advances in Neural Information Process-
1156
+ ing Systems, 34:25192–25204.
1157
+ Long Ouyang, Jeff Wu, Xu Jiang, Diogo Almeida,
1158
+ Carroll L Wainwright, Pamela Mishkin, Chong
1159
+ Zhang, Sandhini Agarwal, Katarina Slama,
1160
+ Alex Ray, et al. 2022. Training language mod-
1161
+ els to follow instructions with human feedback.
1162
+ arXiv preprint arXiv:2203.02155.
1163
+ Colin Raffel, Noam Shazeer, Adam Roberts,
1164
+ Katherine
1165
+ Lee,
1166
+ Sharan
1167
+ Narang,
1168
+ Michael
1169
+ Matena, Yanqi Zhou, Wei Li, and Peter J Liu.
1170
+ 2020. Exploring the limits of transfer learning
1171
+ with a unified text-to-text transformer. Journal
1172
+ of Machine Learning Research, 21:1–67.
1173
+ Pranav Rajpurkar, Jian Zhang, Konstantin Lopy-
1174
+ rev, and Percy Liang. 2016. Squad: 100,000+
1175
+ questions for machine comprehension of text.
1176
+ In Proceedings of the 2016 Conference on Em-
1177
+ pirical Methods in Natural Language Process-
1178
+ ing, pages 2383–2392.
1179
+ Stephen Robertson, Hugo Zaragoza, et al. 2009.
1180
+ The probabilistic relevance framework: Bm25
1181
+ and beyond. Foundations and Trends® in In-
1182
+ formation Retrieval, 3(4):333–389.
1183
+ Kurt Shuster, Mojtaba Komeili, Leonard Adolphs,
1184
+ Stephen Roller, Arthur Szlam, and Jason We-
1185
+ ston. 2022.
1186
+ Language models that seek for
1187
+ knowledge:
1188
+ Modular search & generation
1189
+ for dialogue and prompt completion.
1190
+ arXiv
1191
+ preprint arXiv:2203.13224.
1192
+ Kaitao Song, Xu Tan, Tao Qin, Jianfeng Lu,
1193
+ and Tie-Yan Liu. 2020.
1194
+ Mpnet: Masked and
1195
+ permuted pre-training for language understand-
1196
+ ing. Advances in Neural Information Process-
1197
+ ing Systems, 33:16857–16867.
1198
+ Robyn Speer, Joshua Chin, and Catherine Havasi.
1199
+ 2017.
1200
+ Conceptnet 5.5: An open multilingual
1201
+ graph of general knowledge.
1202
+ In Thirty-first
1203
+ AAAI conference on artificial intelligence.
1204
+ Alon Talmor, Oyvind Tafjord, Peter Clark, Yoav
1205
+ Goldberg, and Jonathan Berant. 2020.
1206
+ Leap-
1207
+ of-thought:
1208
+ Teaching pre-trained models to
1209
+ systematically reason over implicit knowledge.
1210
+ Advances in Neural Information Processing
1211
+ Systems, 33:20227–20237.
1212
+ Romal Thoppilan, Daniel De Freitas, Jamie Hall,
1213
+ Noam Shazeer, Apoorv Kulshreshtha, Heng-
1214
+ Tze Cheng, Alicia Jin, Taylor Bos, Leslie
1215
+ Baker, Yu Du, et al. 2022. Lamda: Language
1216
+ models for dialog applications. arXiv preprint
1217
+ arXiv:2201.08239.
1218
+ Yerram Varun, Aayush Sharma, and Vivek Gupta.
1219
+ 2022.
1220
+ Trans-kblstm: An external knowledge
1221
+ enhanced transformer bilstm model for tabular
1222
+ reasoning. In Proceedings of Deep Learning In-
1223
+ side Out (DeeLIO 2022): The 3rd Workshop on
1224
+ Knowledge Extraction and Integration for Deep
1225
+ Learning Architectures, pages 62–78.
1226
+ Ashish Vaswani, Noam Shazeer, Niki Parmar,
1227
+ Jakob Uszkoreit, Llion Jones, Aidan N Gomez,
1228
+ Łukasz Kaiser, and Illia Polosukhin. 2017. At-
1229
+ tention is all you need. Advances in neural in-
1230
+ formation processing systems, 30.
1231
+ Denny Vrandeˇci´c and Markus Krötzsch. 2014.
1232
+ Wikidata: a free collaborative knowledgebase.
1233
+ Communications of the ACM, 57(10):78–85.
1234
+ Xuezhi Wang, Jason Wei, Dale Schuurmans, Quoc
1235
+ Le, Ed Chi, and Denny Zhou. 2022.
1236
+ Self-
1237
+ consistency improves chain of thought rea-
1238
+ soning in language models.
1239
+ arXiv preprint
1240
+ arXiv:2203.11171.
1241
+ Jason Wei, Xuezhi Wang, Dale Schuurmans,
1242
+ Maarten Bosma, Ed Chi, Quoc Le, and Denny
1243
+ Zhou. 2022. Chain of thought prompting elic-
1244
+ its reasoning in large language models. arXiv
1245
+ preprint arXiv:2201.11903.
1246
+ Thomas Wolf, Lysandre Debut, Victor Sanh,
1247
+ Julien Chaumond, Clement Delangue, Anthony
1248
+ Moi, Pierric Cistac, Tim Rault, Rémi Louf,
1249
+ Morgan Funtowicz, et al. 2020. Transformers:
1250
+ State-of-the-art natural language processing. In
1251
+
1252
+ Proceedings of the 2020 conference on empir-
1253
+ ical methods in natural language processing:
1254
+ system demonstrations, pages 38–45.
1255
+ Xi Ye and Greg Durrett. 2022. The unreliability
1256
+ of explanations in few-shot in-context learning.
1257
+ arXiv preprint arXiv:2205.03401.
1258
+ Eric Zelikman, Yuhuai Wu, and Noah D Good-
1259
+ man. 2022. Star: Bootstrapping reasoning with
1260
+ reasoning. arXiv preprint arXiv:2203.14465.
1261
+ Susan Zhang, Stephen Roller, Naman Goyal,
1262
+ Mikel Artetxe, Moya Chen, Shuohui Chen,
1263
+ Christopher Dewan, Mona Diab, Xian Li,
1264
+ Xi Victoria Lin, et al. 2022. Opt: Open pre-
1265
+ trained transformer language models.
1266
+ arXiv
1267
+ preprint arXiv:2205.01068.
1268
+ Denny Zhou, Nathanael Schärli, Le Hou, Ja-
1269
+ son Wei, Nathan Scales, Xuezhi Wang, Dale
1270
+ Schuurmans, Olivier Bousquet, Quoc Le, and
1271
+ Ed Chi. 2022. Least-to-most prompting enables
1272
+ complex reasoning in large language models.
1273
+ arXiv preprint arXiv:2205.10625.
1274
+
1275
+ A
1276
+ Appendix
1277
+ In this section, we provide additional details on
1278
+ our experimental setup. Further information can
1279
+ be found in our code.
1280
+ A.1
1281
+ Detailed Prompts
1282
+ We adopt the same CoT prompt for commonsense
1283
+ reasoning (i.e., StrategyQA) as those presented in
1284
+ Wei et al. (2022). The CoT prompt for tempo-
1285
+ ral reasoning is provided in Table 6. For tabular
1286
+ reasoning, we adopt the method of Brown et al.
1287
+ (2020) for converting NLI into QA for RTE (Da-
1288
+ gan et al., 2005), and randomly sample 6 examples
1289
+ from the training data to construct the prompt, as
1290
+ shown in Table 8. The few-shot prompt utilizes
1291
+ the same exemplars as the CoT prompt and does
1292
+ not involve CoT reasoning processes.
1293
+ A.2
1294
+ Description of Faithfulness Functions
1295
+ For a sentence s, we denote its MPNet similarity,
1296
+ entailment score, and contradiction score as M(s),
1297
+ E(s), and C(s), respectively. In our experiments,
1298
+ the corresponding thresholds for these scores are
1299
+ Tm = 0.5, Te = 0.6, and Tc = 0.99. Given the
1300
+ entailment scores, contradiction scores, and MP-
1301
+ Net similarities of all supporting facts (denoted as
1302
+ S) in the explanation of a reasoning path R, differ-
1303
+ ent faithfulness functions fKB(·) can be adopted in
1304
+ different settings as follows:
1305
+ (1) fKB(R) = �
1306
+ s∈S[M(s)×(M(s) >= Tm)+
1307
+ E(s) × (M(s) < Tm) − C(s)]
1308
+ (2) fKB(R) = �
1309
+ s∈S[M(s) + E(s)]
1310
+ (3) fKB(R) = �
1311
+ s∈S[E(s) × (E(s) >= Te) −
1312
+ C(s) × (C(s) >= Tc)]
1313
+ In Section 4, we employ function (1) for com-
1314
+ monsense and tabular reasoning. For temporal rea-
1315
+ soning, we use function (2) as the distinct nature of
1316
+ sentences converted from temporal relations leads
1317
+ to unreliable contradiction scores. In Sections 5.3-
1318
+ 5.4, we use function (3) for commonsense reason-
1319
+ ing with evidence paragraphs, as the high quality
1320
+ of the relevant knowledge negates the need for the
1321
+ complementary use of the MPNet similarity to im-
1322
+ prove the entailment score.
1323
+ A.3
1324
+ Comparison of Retrieval Systems
1325
+ For commonsense reasoning, we utilized different
1326
+ retrieval systems in Karpukhin et al. (2020) to re-
1327
+ trieve relevant paragraphs from Wikipedia. The
1328
+ performance of BM25, DPR, and BM25+DPR
1329
+ were 77.73%, 58.52%, and 77.29%, respectively,
1330
+ indicating that BM25 is the best choice in our case.
1331
+ A.4
1332
+ Implementation Details for the Two
1333
+ Variants of RR
1334
+ Fact selection implementation details.
1335
+ In this
1336
+ work, we utilize the information present in the top-
1337
+ ranked output produced by our basic approach as
1338
+ a guide. To this end, we apply a greedy clustering
1339
+ algorithm to group the sentences from all outputs
1340
+ into distinct topic categories based on the cosine
1341
+ similarity of their MPNet sentence embeddings.
1342
+ For each fact in the top-ranked output of our ba-
1343
+ sic approach, we identify the fact with the highest
1344
+ faithfulness within the same topic group and re-
1345
+ place it in the output. The faithfulness of a fact is
1346
+ calculated using the fKB function by replacing the
1347
+ supporting facts with a single fact.
1348
+ Fact generation implementation details.
1349
+ In
1350
+ this part, we generate questions for the named en-
1351
+ tities present in each fact of the top-ranked output
1352
+ produced by our basic approach, and retrieve the
1353
+ corresponding answers from the evidence para-
1354
+ graphs using UnifiedQA. We employ the ques-
1355
+ tion generation model described in Deutsch et al.
1356
+ (2021), which has been shown to be more ex-
1357
+ tractive compared to other models as demon-
1358
+ strated in Fabbri et al. (2021).
1359
+ We adopt the
1360
+ question filtering approach proposed in Honovich
1361
+ et al. (2021) using an off-the-shelf extractive
1362
+ QA model (ktrapeznikov/albert-xlarge-v2-squad-
1363
+ v2 from Hugging Face (Wolf et al., 2020)). We
1364
+ then use an off-the-shelf model (MarkS/bart-base-
1365
+ qa2d from Hugging Face) to convert the generated
1366
+ QA pairs into declarative sentences.
1367
+ We apply
1368
+ simple rules based on the entailment and contra-
1369
+ diction scores of the selected facts from the fact se-
1370
+ lection variant and the generated declarative sen-
1371
+ tences to obtain the final generated facts.
1372
+ A.5
1373
+ Comparison of Different Inference
1374
+ Methods with Supporting Facts
1375
+ In our experiments, we utilize UnifiedQA for the
1376
+ final step of inference in both variants. However,
1377
+ it is worth noting that GPT-3 could also be used
1378
+ for this purpose. As shown in Table 7, we observe
1379
+ that UnifiedQA performs better at inference with
1380
+ generated facts, while GPT-3 with CoT prompt-
1381
+ ing performs better with empty or gold facts. This
1382
+ suggests that UnifiedQA is more robust to noisy
1383
+
1384
+ Q: who was governor of minnesota when maathaad maathaadu mallige was released?
1385
+ A: Maathaad Maathaadu Mallige was released on 24 August 2007. Tim Pawlenty served as the 39th gov-
1386
+ ernor of Minnesota from 2003 to 2011. Thus, Tim Pawlenty was governor of minnesota when maathaad
1387
+ maathaadu mallige was released. So the answer is Tim Pawlenty.
1388
+ Q: who was us president during the costa rican civil war?
1389
+ A: The Costa Rican civil war was a civil war in Costa Rica from 12 March to 24 April 1948. Harry S.
1390
+ Truman was the 33rd president of the United States, serving from 1945 to 1953. Thus, Harry S. Truman
1391
+ was us president during the costa rican civil war. So the answer is Harry S. Truman.
1392
+ Q: who was governor of oregon when the collector was released?
1393
+ A: The Collector premiered at the Cannes Film Festival on May 20, 1965. Mark Hatfield served as the
1394
+ 29th governor of Oregon from 1959 to 1967. Thus, Mark Hatfield was governor of oregon when the
1395
+ collector was released. So the answer is Mark Hatfield.
1396
+ Q: who was governor of oregon when shanghai noon was released?
1397
+ A: Shanghai Noon was released on May 26, 2000. John Kitzhaber served as the 35th governor of Oregon
1398
+ from 1995 to 2003. Thus, John Kitzhaber was governor of oregon when shanghai noon was released. So
1399
+ the answer is John Kitzhaber.
1400
+ Q: who was us president when john andrew shulze was a teenager?
1401
+ A: John Andrew Shulze was born on July 19, 1775. A teenager is someone who is between 13 and 19
1402
+ years old. George Washington served as the first president of the United States from 1789 to 1797. Thus,
1403
+ George Washington was us president when john andrew shulze was a teenager. So the answer is George
1404
+ Washington.
1405
+ Q: who was us president during the seventh coalition?
1406
+ A: The War of the Seventh Coalition was from 20 March to 8 July 1815. James Madison served as the
1407
+ fourth president of the United States from 1809 to 1817. Thus, James Madison was us president during
1408
+ the seventh coalition. So the answer is James Madison.
1409
+ Table 6: The CoT prompt for temporal reasoning.
1410
+ Methods
1411
+ Accuracy (%)
1412
+ Empty facts
1413
+ GPT-3 (zero-shot)
1414
+ 58.08
1415
+ GPT-3 (CoT)
1416
+ 65.94
1417
+ UnifiedQA
1418
+ 58.95
1419
+ Gold facts
1420
+ GPT-3 (zero-shot)
1421
+ 81.66
1422
+ GPT-3 (CoT)
1423
+ 91.70
1424
+ UnifiedQA
1425
+ 90.83
1426
+ Generated facts
1427
+ GPT-3 (zero-shot)
1428
+ 69.87
1429
+ GPT-3 (CoT)
1430
+ 76.42
1431
+ UnifiedQA
1432
+ 78.60
1433
+ Table 7: Comparison of different inference methods on
1434
+ empty, gold, and generated facts.
1435
+ inputs compared to GPT-3.
1436
+ Additionally, both
1437
+ UnifiedQA and GPT-3 with CoT prompting signif-
1438
+ icantly outperform GPT-3 with zero-shot prompt-
1439
+ ing, indicating that the CoT prompting is also ben-
1440
+ eficial for the final step of inference.
1441
+
1442
+ Charles Sumner Tainter was Born on April 25, 1854 ( 1854-04-25 ) Watertown, Massachusetts, U.S..
1443
+ Charles Sumner Tainter was Died on April 20, 1940 ( 1940-04-21 ) (aged 85) San Diego, California,
1444
+ U.S.. The Nationality of Charles Sumner Tainter are American. The Known for of Charles Sumner
1445
+ Tainter are Photophone, phonograph Father Of The Speaking Machine.
1446
+ Question: Charles Sumner Tainter never left the state of Massachusetts. True or False?
1447
+ Answer: Charles Sumner Tainter was died in San Diego, California, U.S.. California is a state. Thus,
1448
+ Charles Sumner Tainter has left the state of Massachusetts. So the answer is false.
1449
+ The Region of Curitiba are South. The Elevation of Curitiba are 934.6 m (3,066.3 ft). The Density of
1450
+ Curitiba are 4,062/km 2 (10,523/sq mi). The Metro density of Curitiba are 210.9/km 2 (546.2/sq mi).
1451
+ Question: Curitiba is above sea level. True or False?
1452
+ Answer: The elevation of Curitiba are 934.6 m (3,066.3 ft). Elevation is a hypernym of level. Thus,
1453
+ Curitiba is above sea level. So the answer is true.
1454
+ Charles (Prince of Wales) was Born on 14 November 1948 ( 1948-11-14 ) (age 70) Buckingham Palace,
1455
+ London, England. The Spouse of Charles (Prince of Wales) are Lady Diana Spencer ( m. 1981 ; div.
1456
+ 1996 ) , and Camilla Parker Bowles ( m. 2005 ). The Issue of Charles (Prince of Wales) are Prince
1457
+ William, Duke of Cambridge , and Prince Harry, Duke of Sussex.
1458
+ Question: Charles was born in 1948 and has been married twice. True or False?
1459
+ Answer: Charles (Prince of Wales) was Born on 14 November 1948. The Spouse of Charles (Prince of
1460
+ Wales) are Lady Diana Spencer ( m. 1981 ; div. 1996 ) , and Camilla Parker Bowles ( m. 2005 ). Married
1461
+ is related to spouse. Thus, Charles was born in 1948 and has been married twice. So the answer is true.
1462
+ The Born of Idris Elba are 6 September 1972 (age 46) Hackney, London, England. The Residence of
1463
+ Idris Elba are London. The Other names of Idris Elba are DJ Big Driis, Big Driis the Londoner, Big
1464
+ Driis, and 7 Dub. The Occupation of Idris Elba are Actor, producer, director, musician, and DJ.
1465
+ Question: Idris Elba is an English entertainer. True or False?
1466
+ Answer: The residence of Idris Elba is London. English is related to London. The occupation of Idris
1467
+ Elba are actor, producer, director, musician, and DJ. Actor is a hyponym of entertainer. Musician is a
1468
+ hyponym of entertainer. DJ is an entertainer. Thus, Idris Elba is an English entertainer. So the answer
1469
+ is true.
1470
+ The Breed of Jean, the Vitagraph Dog are Scotch Collie. The Sex of Jean, the Vitagraph Dog are Female.
1471
+ The Born of Jean, the Vitagraph Dog are 1902 Eastport, Maine. The Years active of Jean, the Vitagraph
1472
+ Dog are 1909 - 1916.
1473
+ Question: Jean, the Vitagraph Dog was a Golden Retriever which perform in circus. True or False?
1474
+ Answer: The Breed of Jean, the Vitagraph Dog are Scotch Collie. Collie is a hyponym of dog. Retriever
1475
+ is a hyponym of dog. Thus, Jean, the Vitagraph Dog was not a Golden Retriever which perform in circus.
1476
+ So the answer is false.
1477
+ The Studio of Hydrograd are Sphere Studios, North Hollywood, Los Angeles. The Genre of Hydrograd
1478
+ are Hard rock. The Label of Hydrograd are Roadrunner. The Producer of Hydrograd are Jay Ruston.
1479
+ Question: Hydrograd is in the rap genre. True or False?
1480
+ Answer: The Genre of Hydrograd are Hard rock. Rap is distinct from rock. Thus, Hydrograd is not in
1481
+ the rap genre. So the answer is false.
1482
+ Table 8: The CoT prompt for tabular reasoning.
1483
+
-dAyT4oBgHgl3EQfdfdm/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
-tE3T4oBgHgl3EQfrgrp/content/tmp_files/2301.04661v1.pdf.txt ADDED
The diff for this file is too large to render. See raw diff
 
-tE3T4oBgHgl3EQfrgrp/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
.gitattributes CHANGED
@@ -2929,3 +2929,53 @@ CdFQT4oBgHgl3EQf_DcV/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -tex
2929
  a9AyT4oBgHgl3EQfW_fi/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
2930
  4NFKT4oBgHgl3EQfRi0P/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
2931
  y9E4T4oBgHgl3EQfyA3N/content/2301.05263v1.pdf filter=lfs diff=lfs merge=lfs -text
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
2929
  a9AyT4oBgHgl3EQfW_fi/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
2930
  4NFKT4oBgHgl3EQfRi0P/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
2931
  y9E4T4oBgHgl3EQfyA3N/content/2301.05263v1.pdf filter=lfs diff=lfs merge=lfs -text
2932
+ 1NFQT4oBgHgl3EQf1DYE/content/2301.13418v1.pdf filter=lfs diff=lfs merge=lfs -text
2933
+ F9FKT4oBgHgl3EQfbS5P/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
2934
+ ItFJT4oBgHgl3EQfFyzw/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
2935
+ d9FRT4oBgHgl3EQfUTfv/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
2936
+ xNE3T4oBgHgl3EQf_QuN/content/2301.04833v1.pdf filter=lfs diff=lfs merge=lfs -text
2937
+ utAzT4oBgHgl3EQf6_5m/content/2301.01883v1.pdf filter=lfs diff=lfs merge=lfs -text
2938
+ XNE1T4oBgHgl3EQfJQOq/content/2301.02950v1.pdf filter=lfs diff=lfs merge=lfs -text
2939
+ t9FJT4oBgHgl3EQfdywM/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
2940
+ 19E4T4oBgHgl3EQfzg22/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
2941
+ HtE2T4oBgHgl3EQf_AnW/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
2942
+ KdAyT4oBgHgl3EQff_ia/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
2943
+ I9AyT4oBgHgl3EQffvhT/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
2944
+ nNFPT4oBgHgl3EQf5TUv/content/2301.13196v1.pdf filter=lfs diff=lfs merge=lfs -text
2945
+ htE4T4oBgHgl3EQfrg2l/content/2301.05209v1.pdf filter=lfs diff=lfs merge=lfs -text
2946
+ 8tE2T4oBgHgl3EQflgdv/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
2947
+ h9AzT4oBgHgl3EQf4v4M/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
2948
+ d9FRT4oBgHgl3EQfUTfv/content/2301.13536v1.pdf filter=lfs diff=lfs merge=lfs -text
2949
+ ytE0T4oBgHgl3EQftgFE/content/2301.02592v1.pdf filter=lfs diff=lfs merge=lfs -text
2950
+ htE4T4oBgHgl3EQfrg2l/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
2951
+ y9E4T4oBgHgl3EQfyA3N/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
2952
+ ztAyT4oBgHgl3EQfbPfN/content/2301.00260v1.pdf filter=lfs diff=lfs merge=lfs -text
2953
+ XNE1T4oBgHgl3EQfJQOq/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
2954
+ _dAzT4oBgHgl3EQfhPzZ/content/2301.01483v1.pdf filter=lfs diff=lfs merge=lfs -text
2955
+ tNE2T4oBgHgl3EQffgdg/content/2301.03927v1.pdf filter=lfs diff=lfs merge=lfs -text
2956
+ BNAzT4oBgHgl3EQfhv2_/content/2301.01490v1.pdf filter=lfs diff=lfs merge=lfs -text
2957
+ 8tE2T4oBgHgl3EQflgdv/content/2301.03989v1.pdf filter=lfs diff=lfs merge=lfs -text
2958
+ ptFST4oBgHgl3EQfNzhl/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
2959
+ LNFAT4oBgHgl3EQfwR78/content/2301.08681v1.pdf filter=lfs diff=lfs merge=lfs -text
2960
+ 4NFKT4oBgHgl3EQfRi0P/content/2301.11771v1.pdf filter=lfs diff=lfs merge=lfs -text
2961
+ tNE2T4oBgHgl3EQffgdg/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
2962
+ WdAyT4oBgHgl3EQfu_n3/content/2301.00625v1.pdf filter=lfs diff=lfs merge=lfs -text
2963
+ ytE0T4oBgHgl3EQftgFE/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
2964
+ VNAzT4oBgHgl3EQfJ_sw/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
2965
+ U9AzT4oBgHgl3EQf1P4j/content/2301.01795v1.pdf filter=lfs diff=lfs merge=lfs -text
2966
+ 99E1T4oBgHgl3EQfCgIZ/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
2967
+ pdE1T4oBgHgl3EQfiQRF/content/2301.03249v1.pdf filter=lfs diff=lfs merge=lfs -text
2968
+ VdE4T4oBgHgl3EQfnQ2t/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
2969
+ ItE3T4oBgHgl3EQfXAqD/content/2301.04475v1.pdf filter=lfs diff=lfs merge=lfs -text
2970
+ VNAzT4oBgHgl3EQfJ_sw/content/2301.01088v1.pdf filter=lfs diff=lfs merge=lfs -text
2971
+ ldFAT4oBgHgl3EQfbh3i/content/2301.08559v1.pdf filter=lfs diff=lfs merge=lfs -text
2972
+ xNAzT4oBgHgl3EQfQfuL/content/2301.01200v1.pdf filter=lfs diff=lfs merge=lfs -text
2973
+ xNAzT4oBgHgl3EQfQfuL/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
2974
+ WdAyT4oBgHgl3EQfu_n3/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
2975
+ odE3T4oBgHgl3EQfLQlL/content/2301.04361v1.pdf filter=lfs diff=lfs merge=lfs -text
2976
+ ptAzT4oBgHgl3EQf5v4s/content/2301.01863v1.pdf filter=lfs diff=lfs merge=lfs -text
2977
+ ldFAT4oBgHgl3EQfbh3i/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
2978
+ O9FJT4oBgHgl3EQf1S22/content/2301.11651v1.pdf filter=lfs diff=lfs merge=lfs -text
2979
+ utAzT4oBgHgl3EQf6_5m/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
2980
+ ZdFLT4oBgHgl3EQfWC9a/content/2301.12055v1.pdf filter=lfs diff=lfs merge=lfs -text
2981
+ YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf filter=lfs diff=lfs merge=lfs -text
19E4T4oBgHgl3EQfzg22/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:c4f96ea874e96776c37c78cea2fc122f2b0e00854eb86e78f3e33e0475f388d5
3
+ size 4063277
1NFQT4oBgHgl3EQf1DYE/content/2301.13418v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:5524eab9698a1f69d210e8bfc676704563a0cef63f17b7d22f7b3cf5479a657c
3
+ size 4862595
4NFKT4oBgHgl3EQfRi0P/content/2301.11771v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:1151bca4f060499cba2dbd7ebf30f0b3c7385aeb31df04cd2ca8ef686626ea94
3
+ size 3950996
5NE5T4oBgHgl3EQfPA41/content/tmp_files/2301.05501v1.pdf.txt ADDED
@@ -0,0 +1,1580 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ MNRAS 000, 1–9 (2015)
2
+ Preprint 16 January 2023
3
+ Compiled using MNRAS LATEX style file v3.0
4
+ The rebrightening of a ROSAT-selected tidal disruption event: repeated
5
+ weak partial disruption flares from a quiescent galaxy?
6
+ A. Malyali1★, Z. Liu1, A. Rau1, I. Grotova1, A. Merloni1, A. J. Goodwin2, G. E. Anderson2,
7
+ J. C. A. Miller-Jones2, A. Kawka2, R. Arcodia1, J. Buchner1, K. Nandra1, D. Homan3, M. Krumpe3
8
+ 1Max-Planck-Institut für extraterrestrische Physik, Giessenbachstrasse 1, 85748 Garching, Germany
9
+ 2International Centre for Radio Astronomy Research, Curtin University, GPO Box U1987, Perth, WA 6845, Australia
10
+ 3Leibniz-Institut für Astrophysik Potsdam, An der Sternwarte 16, 14482 Potsdam, Germany
11
+ Accepted XXX. Received YYY; in original form ZZZ
12
+ ABSTRACT
13
+ The ROSAT-selected tidal disruption event (TDE) candidate RX J133157.6-324319.7 (J1331), was detected in 1993 as a
14
+ bright (0.2–2 keV flux of (1.0 ± 0.1) × 10−12 erg s−1 cm−2), ultra-soft (𝑘𝑇 = 0.11 ± 0.03 keV) X-ray flare from a quiescent
15
+ galaxy (𝑧 = 0.05189). During its fifth All-Sky survey (eRASS5) in 2022, SRG/eROSITA detected the repeated flaring of
16
+ J1331, where it had rebrightened to an observed 0.2–2 keV flux of (6.0 ± 0.7) × 10−13 erg s−1 cm−2, with spectral properties
17
+ (𝑘𝑇 = 0.115 ± 0.007 keV) consistent with the ROSAT-observed flare ∼30 years earlier. In this work, we report on X-ray, UV,
18
+ optical, and radio observations of this system. During a pointed XMM observation ∼17 days after the eRASS5 detection, J1331
19
+ was not detected in the 0.2–2 keV band, constraining the 0.2–2 keV flux to have decayed by a factor of ≳40 over this period.
20
+ Given the extremely low probability (∼ 5 × 10−6) of observing two independent full TDEs from the same galaxy over a 30 year
21
+ period, we consider the variability seen in J1331 to be likely caused by two partial TDEs involving a star on an elliptical orbit
22
+ around a black hole. J1331-like flares show faster rise and decay timescales (O(days)) compared to standard TDE candidates,
23
+ with neglible ongoing accretion at late times post-disruption between outbursts.
24
+ Key words: accretion, accretion discs – galaxies: nuclei – black hole physics – transients: tidal disruption events
25
+ 1 INTRODUCTION
26
+ Benefitting from the latest generation of time-domain surveys, the
27
+ past decade has seen a vast growth in the diversity of observed tran-
28
+ sients originating from galactic nuclei. These events can be crudely
29
+ divided into, and described as, either ‘one-off’ or ‘repeating’ events,
30
+ depending on the observed evolution of their lightcurves.
31
+ ‘One-off’ events, characterised by a single epoch of major tran-
32
+ sient behaviour over an observed monitoring campaign, comprise the
33
+ majority of newly reported nuclear transients. These include systems
34
+ where the variability is likely linked to changes in the accretion pro-
35
+ cess onto a supermassive black hole, such as has been reported in
36
+ previously known AGN (e.g. changing-state AGN; Frederick et al.
37
+ 2019; Trakhtenbrot et al. 2019b; Ricci et al. 2020, 2021; Frederick
38
+ et al. 2021; short-rise, slowed-decay Bowen accretion flares, Trakht-
39
+ enbrot et al. 2019a), or due to stellar tidal disruption events (TDEs) in
40
+ quiescent galaxies1 (see Saxton et al. 2020; van Velzen et al. 2020,
41
+ 2021a; Alexander et al. 2020 for recent reviews of X-ray, optical,
42
+ infrared and radio observations of TDEs, respectively). Other tran-
43
+ sients, which may occur so close to the centres of galaxies that they
44
+ are astrometically indistinguishable from SMBH accretion, have also
45
+ ★ E-mail: [email protected]
46
+ 1 Strong TDE candidates have also been reported in galaxies showing signs
47
+ of previous AGN activity (e.g. Merloni et al. 2015; Blanchard et al. 2017;
48
+ Liu et al. 2020).
49
+ been reported (e.g. supernovae exploding in the narrow-line region of
50
+ AGN, Drake et al. 2011), or predicted to exist (e.g. stellar collisions
51
+ in nuclear star clusters; Dale et al. 2009).
52
+ Even more recently, the population of known ‘repeating’ events
53
+ has expanded. Several TDE candidates have now shown multiple
54
+ major outbursts, either through their strong, double-peaked optical
55
+ lightcurves (AT 2019avd, Malyali et al. 2021; Chen et al. 2022),
56
+ repeated X-ray outbursts (IC 3599, Grupe et al. 1995, 2001, 2015;
57
+ Campana et al. 2015; eRASSt J045650.3-203750, Liu et al. 2022;
58
+ AT 2018fyk, Wevers et al. 2022), or quasi-periodic optical outbursts
59
+ potentially associated with repeated partial TDEs (ASASSN-14ko,
60
+ Payne et al. 2021). Towards the more extreme end of known re-
61
+ peating transients lie the recently-discovered class of quasi-periodic
62
+ eruptions (QPEs; Miniutti et al. 2019; Giustini et al. 2020; Arcodia
63
+ et al. 2021, 2022), which show large amplitude, ultra-soft X-ray out-
64
+ bursts, with flare duration of the order of hours, and which recur over
65
+ timescales of hours to days.
66
+ In this work, we report on the SRG/eROSITA (Sunyaev et al. 2021;
67
+ Predehl et al. 2021) detection of the repeated flaring of a previously
68
+ reported, ROSAT-selected TDE candidate, RXJ133157.6-324319.7
69
+ (Reiprich & Greiner 2001; Hampel et al. 2022), originating from
70
+ a quiescent galaxy at 𝑧 = 0.05189 (Moretti et al. 2017). In Sec-
71
+ tion 2, we report on the detection of this system with eROSITA and
72
+ follow-up observations performed with NICER (Section 2.2), XMM
73
+ (Section 2.3), and Swift XRT (Section 2.4), as well as archival X-ray
74
+ © 2015 The Authors
75
+ arXiv:2301.05501v1 [astro-ph.HE] 13 Jan 2023
76
+
77
+ 2
78
+ Adam Malyali et al.
79
+ observations (Section 2.5), UV, optical and mid-infrared photometry
80
+ (Section 2.6) and radio observations (Section 2.7). We discuss the
81
+ nature of the system in Section 3, before providing a summary in
82
+ Section 4.
83
+ All magnitudes are reported in the AB system and corrected for
84
+ Galactic extinction using 𝐴V = 0.142 mag, obtained from (Schlafly
85
+ & Finkbeiner 2011), 𝑅V = 3.1 and a Cardelli extinction law (Cardelli
86
+ et al. 1989), unless otherwise stated. The effective wavelength for
87
+ each filter was retrieved from the SVO Filter Profile Service2. All
88
+ dates/times will be reported in universal time (UT).
89
+ 2 RE-DISCOVERY AND FOLLOW-UP
90
+ eRASSt J133157.9-324321 (herein J1331) was detected on 2022-01-
91
+ 20 as a bright new X-ray point source in a systematic search for TDE
92
+ candidates during the fifth eROSITA All-Sky survey (eRASS5). The
93
+ eROSITA Science Analysis Software (eSASS; Brunner et al. 2022)
94
+ inferred source position was (RAJ2000, DecJ2000)=(13h31m57.9s, -
95
+ 32◦43′21.2′′), with a 1𝜎 positional uncertainty of 1.6′′. No X-ray
96
+ point source was detected within 60" of this position in each of the
97
+ previous four eRASS. The eROSITA source position is consistent
98
+ with a quiescent host galaxy at 𝑧 = 0.05189, with total stellar mass,
99
+ log(𝑀★/𝑀⊙) = 10.15 ± 0.09, and an inferred black hole mass,
100
+ log(𝑀BH/𝑀⊙) = 6.5 ± 0.2 (appendix A). The quiescent nature of
101
+ the host is suggested by both the optical spectrum of its host galaxy
102
+ (appendix B; see also Hampel et al. 2022) and its AllWISE (Wright
103
+ et al. 2010; Mainzer et al. 2014) mid-infrared colour, W1-W2=0.05±
104
+ 0.05 mag, far below the threshold of ≳0.7 for mid-infrared AGN
105
+ selection (Stern et al. 2012; Assef et al. 2018). After selecting J1331
106
+ as a promising TDE candidate, it was also realised that the host galaxy
107
+ of J1331 was the same as that identified for the ROSAT-selected
108
+ TDE candidate, RXJ133157.6324319.7, first detected in outburst
109
+ in 1993, and recently presented in Hampel et al. (2022), with the
110
+ finder chart for these transients presented in Fig. A1. The eRASS5
111
+ detection of J1331 thus suggested the remarkable rebrightening of
112
+ a previously known TDE candidate, ∼29 years after the outburst
113
+ detected by ROSAT.
114
+ 2.1 eROSITA
115
+ Using the eSASS task SRCTOOL (eSASSusers_211214; Brunner et al.
116
+ 2022), source (and background) spectra and lightcurves were ex-
117
+ tracted from a 60" radius source region centred on the eRASS5
118
+ inferred position, with background counts extracted from a circular
119
+ annulus with inner and outer radii of 140" and 240", respectively.
120
+ eROSITA scanned the position of J1331 eight times during
121
+ eRASS5, with each scan separated by ∼4 hours, thus spanning a
122
+ ∼28 hour window in total. During this time, J1331 was observed
123
+ to be persistently bright (Fig. D2), as opposed to showing a short-
124
+ lived flaring, and was clearly detected above background in each
125
+ observation.
126
+ The eRASS5 X-ray spectra were then fitted using the Bayesian X-
127
+ ray Analysis software (BXA; Buchner et al. 2014), which connects
128
+ the nested sampling algorithm UltraNest (Buchner 2021) with the
129
+ fitting environment XSPEC (Arnaud 1996). The source and back-
130
+ ground spectra were jointly fit with a source plus background model,
131
+ with the latter using the Principal Component Analysis (PCA) back-
132
+ ground modelling first described in Simmonds et al. (2018), and as
133
+ 2 http://svo2.cab.inta-csic.es/theory/fps/
134
+ also applied to AT 2019avd in Malyali et al. (2021). The eRASS5
135
+ spectrum is well fitted by a tbabs*zbbody model (Fig. D1), with the
136
+ Galactic equivalent neutral hydrogen column density, 𝑁H, fixed to
137
+ 3.84 × 1020 cm−2, the value along the line of sight to J1331 in HI4PI
138
+ Collaboration: et al. (2016), and 𝑘𝑇 = 0.115+0.007
139
+ −0.007 keV. A fit with a
140
+ power-law (tbabs*zpowerlaw) leaves large residuals between the
141
+ observed data and model above 1 keV. When using the best fitting
142
+ tbabs*zbbody model described above, the eRASS5 observed (un-
143
+ absorbed) 0.2–2 keV flux for J1331 is (6.0±0.7)×10−13 erg s−1 cm−2
144
+ ((8 ± 1) × 10−13 erg s−1 cm−2), translating to an unabsorbed 0.2–
145
+ 2 keV luminosity of (5.5 ± 0.7) × 1042 erg s−1.
146
+ J1331 was not detected in eRASS1–4, with 2𝜎 upper limits on
147
+ the 0.2–2 keV count rate of 0.016, 0.03, 0.07 and 0.03 cts s−1 in
148
+ each successive eRASS (see Table D1 for a full log of the X-ray
149
+ observations of J1331). These count rate upper limits were then
150
+ converted to 0.2–2 keV flux upper limits using the best fitting spectral
151
+ parameters to the eRASS5 spectrum described above.
152
+ 2.2 NICER XTI
153
+ Follow-up observations of J1331 were obtained with the X-ray Tim-
154
+ ing Instrument (XTI) on board the Neutron Star Interior Composition
155
+ Explorer observatory (NICER; Gendreau et al. 2016) through pre-
156
+ approved ToOs (PI: Z. Liu). NICER observations commenced ∼4
157
+ days after the last eRASS5 observation, and continued for the next
158
+ 15 days on a near daily basis (Table D1). We first generated cleaned
159
+ and screened event files using the nicerl2 task (with default recom-
160
+ mended parameters), before using nibackgen3C50 (Remillard et al.
161
+ 2022) to generate total and background spectra for each observation
162
+ ID (GTIs were filtered out using hbgcut=0.05 and s0cut=2, as
163
+ recommended in Remillard et al. 2022). ARF and RMF files were
164
+ subsequently generated using the tasks nicerarf and nicerrmf,
165
+ and the X-ray spectra were binned using the Kaastra & Bleeker
166
+ (2016) method to a minimum of 20 counts per bin. The total and
167
+ background count rates were then estimated in the 0.4–2 keV band3.
168
+ J1331 is not detected at 2 sigma above background in each OBSID
169
+ (Fig. D3), with 2𝜎 upper limits on the source count rates, inferred
170
+ using 𝐶𝑅tot +2𝜎, with 𝐶𝑅tot the total measured count rate, and 𝜎 the
171
+ estimated error on 𝐶𝑅tot. The 0.4–2 keV count rates were converted
172
+ to 0.2–2 keV fluxes (Table D1) assuming the eRASS5 spectral model
173
+ (section 2.1). NICER observations rule out a further brightening be-
174
+ yond eRASS5, or a persistently bright source that rapidly ‘cuts-off’
175
+ in brightness by the time of the XMM observation (section 2.3).
176
+ 2.3 XMM
177
+ J1331 was later observed by XMM (P.I. Z. Liu) on 2022-02-07 (de-
178
+ noted XMM1), ∼16 days after the last eRASS5 observation, and
179
+ also on 2022-08-06 (denoted XMM2). Observations were carried
180
+ out with the medium filter on PN, MOS1 and MOS2. The XMM data
181
+ were reduced using HEASOFT v6.29, SAS version 20211130_0941,
182
+ and the latest calibration data files (CALDB v20210915). Follow-
183
+ ing standard XMM data reduction procedures, calibrated event files
184
+ were first generated from the Observation Data Files (ODF) using
185
+ the SAS tasks emproc and epproc for the MOS and PN cameras
186
+ respectively. Then, periods of high background flaring were filtered
187
+ 3 The 0.4 keV lower bound here was chosen to reduce contamination from
188
+ any incompletely modelled optical loading.
189
+ MNRAS 000, 1–9 (2015)
190
+
191
+ Repeated partial tidal disruption flares from a quiescent galaxy
192
+ 3
193
+ 10
194
+ 41
195
+ 10
196
+ 42
197
+ 10
198
+ 43
199
+ LX [erg s
200
+ 1]
201
+ 48000
202
+ 50000
203
+ 52000
204
+ 54000
205
+ 56000
206
+ 58000
207
+ 60000
208
+ MJD
209
+ 10
210
+ 14
211
+ 10
212
+ 13
213
+ 10
214
+ 12
215
+ FX [erg s
216
+ 1 cm
217
+ 2]
218
+ 49005
219
+ 49010
220
+ 49015
221
+ 10
222
+ 13
223
+ 10
224
+ 12
225
+ 1992
226
+ 1996
227
+ 2000
228
+ 2004
229
+ 2008
230
+ 2012
231
+ 2016
232
+ 2020
233
+ Year
234
+ ROSAT
235
+ XRT
236
+ eROSITA
237
+ XMM
238
+ Figure 1. Long-term 0.2–2 keV lightcurve of J1331, with circular and triangle markers representing observed fluxes and 2𝜎 upper limits, respectively. The
239
+ initial outburst was detected by ROSAT in 1993, before being observed by eROSITA in 2022 to have rebrightened to a similar 0.2–2 keV observed flux. The
240
+ X-ray spectra remained ultra-soft in each observation where the source was detected. For plotting clarity, we include the time-averaged flux measurement for
241
+ eRASS5, and omit the NICER upper limits.
242
+ out4. For XMM1 (XMM2), this resulted in only 4.1ks (25.7 ks),
243
+ 12.8 ks (30.7 ks) and 11.8 ks (30.2 ks) of usable exposure time
244
+ for PN, MOS1 and MOS2, respectively. In the subsequent analysis,
245
+ only events with PATTERN<=4 and FLAG==0 were extracted for PN,
246
+ whilst PATTERN<=12 and FLAG==0 filtering was applied for MOS1
247
+ and MOS2.
248
+ For XMM1, no source is detected within 30" of the host galaxy
249
+ position in PN and MOS1 with detection likelihood, DETML, above
250
+ 3, when running the standard XMM source detection pipeline in the
251
+ 0.2–2 keV band on the PN, MOS1, and MOS2 images. However, a
252
+ source was detected in MOS2 at (RAJ2000, DecJ2000)=(13h31m58s,
253
+ -32◦43′19′′), with a 1𝜎 positional uncertainty of 2′′, consistent with
254
+ the ROSAT and eROSITA positions (Fig. A1). The DETML for this
255
+ source is low (10.3), and the estimated observed 0.2–2 keV flux in
256
+ the emldetect output is (8±3) ×10−15 erg s−1 cm−2, ∼75× fainter
257
+ than the eRASS5 observed flux.
258
+ Given the uncertain detection of the system across all three EPIC
259
+ cameras, we computed a 2𝜎 upper limit on the 0.2–2 keV count
260
+ rate using the SAS task eupper. This was done using the 0.2–2 keV
261
+ band images, exposure and background maps for each camera, and
262
+ a 30" radius circular extraction region for the source counts (centred
263
+ on the Gaia position of the host galaxy). For XMM1, this yielded
264
+ upper limits of 0.006 ct s−1, 0.0014 ct s−1 and 0.002 ct s−1 for
265
+ PN, MOS1 and MOS2, respectively. We conservatively estimate the
266
+ upper limit for the XMM observation to that inferred from the MOS2
267
+ data, which corresponds to a 0.2–2 keV observed (unabsorbed) flux
268
+ of 1 × 10−14 erg s−1 cm−2 (2 × 10−14 erg s−1 cm−2), assuming the
269
+ 4 https://www.cosmos.esa.int/web/xmm-newton/
270
+ sas-thread-epic-filterbackground
271
+ spectral model inferred from the eRASS5 observation. The same
272
+ procedure was repeated for XMM2, where we inferred upper limits
273
+ of 0.003 ct s−1, 0.0014 ct s−1 and 0.0010 ct s−1 for PN, MOS1 and
274
+ MOS2, respectively, translating to 2𝜎 upper limits on the observed
275
+ (unobserved) flux of 6×10−15 erg s−1 cm−2 (1×1014 erg s−1 cm−2).
276
+ 2.4 Swift XRT
277
+ Additional Swift XRT (Burrows et al. 2005) observations of J1331
278
+ were performed between 2022-02-27 and 2022-08-245. The XRT
279
+ observations were performed in photon counting mode, with the
280
+ data analysed using the UK Swift Science Data Centre’s (UKSSDC)
281
+ online XRT product building tool (Evans et al. 2007, 2009). No
282
+ source was detected in the 0.3–2 keV band at the position of J1331 in
283
+ any follow-up observation.The 0.3–2 keV count rates were converted
284
+ to 0.2–2 keV fluxes using webPIMMs6, assuming the same spectral
285
+ model as from the eROSITA eRASS5 detection, with the fluxes
286
+ presented in Table D1.
287
+ 2.5 Archival X-ray observations
288
+ A
289
+ detailed
290
+ analysis
291
+ of
292
+ the
293
+ ultra-soft
294
+ outburst
295
+ from
296
+ RXJ133157.6324319.7,
297
+ detected
298
+ by
299
+ pointed
300
+ ROSAT
301
+ PSPC
302
+ observations in the early 1990s, was previously performed in
303
+ Hampel et al. (2022). In summary, the flare was characterised by an
304
+ 5 The delay between the eRASS5 and Swift observations stemmed from the
305
+ January 2022 reaction wheel failure on-board the Swift observatory.
306
+ 6 https://heasarc.gsfc.nasa.gov/cgi-bin/Tools/w3pimms/
307
+ w3pimms.pl
308
+ MNRAS 000, 1–9 (2015)
309
+
310
+ 4
311
+ Adam Malyali et al.
312
+ 8x increase in the 0.1–2.4 keV flux, relative to a 2𝜎 upper limit, over
313
+ an 8 day period (and a net increase in the same band by a factor of
314
+ at least 40 relative to the deepest upper limit available). The X-ray
315
+ spectrum at peak observed brightness was well fitted by a blackbody
316
+ with 𝑘𝑇 = 0.11 ± 0.03 keV. The system was then not detected in two
317
+ PSPC observations ∼165 days later, where it had faded by a factor
318
+ of at least 30 relative to the peak observed ROSAT flux.
319
+ To construct a long-term 0.2–2 keV lightcurve, the 0.1–2.4 keV
320
+ ROSAT PSPC lightcurve data in Table 1 of Hampel et al. (2022) was
321
+ converted into 0.2–2 keV band fluxes using webPIMMS, assuming
322
+ the best fitting spectral model to the ROSAT spectrum found in
323
+ Hampel et al. (2022). Then, the 2𝜎 upper limits from ROSAT Survey,
324
+ XMM Slew and Swift XRT observations were computed using the
325
+ High-Energy Lightcurve Generator server (HILIGT; Saxton et al.
326
+ 2021; König et al. 2021); the archival fluxes are presented in Fig. 1
327
+ and Table D1.
328
+ 2.6 UV, optical and mid-infrared photometry
329
+ J1331 was observed both before (Section 2.5) and after (Section 2.4)
330
+ the eRASS5-detected outburst by Swift XRT and UVOT (UVM2
331
+ filter; Roming et al. 2005). To search for transient UV emission,
332
+ aperture photometry was performed on the level 2 UVOT sky im-
333
+ ages (downloaded from the UKSSDC) using the uvotsource task
334
+ (HEASOFT v6.29, CALDB v20201215). Source counts were ex-
335
+ tracted from a circular aperture of 5′′ radius, centred on the Gaia
336
+ position of the host of J1331, and background counts were extracted
337
+ from a source-free region of radius 15′′. The measured UVM2 mag-
338
+ nitudes in the follow-up observations are consistent with the archival
339
+ measured UVM2 magnitudes on the 2018-04-18, 2018-04-22, 2018-
340
+ 04-26 (Table E1).
341
+ No significant optical variability is seen in the ∼6 years before
342
+ the eRASS5 outburst (57500≲ MJD ≲59500) in the forced photom-
343
+ etry lightcurve provided by ATLAS (Tonry et al. 2018) (Fig. E1).
344
+ Lastly, we note that no major variability is detected above the host
345
+ galaxy emission within the NEOWISE mid-infrared lightcurve be-
346
+ tween MJD∼56680 and 59400 (Fig. E1), which was generated using
347
+ the procedure described in section 3.2 of Malyali et al. (2021).
348
+ 2.7 Radio
349
+ We observed the coordinates of J1331 on 2022 Mar 02 with the
350
+ Australia Telescope Compact Array (ATCA) radio telescope in 6 km
351
+ configuration, using the 4cm dual receiver with central frequencies
352
+ 5.5/9 GHz, each with a 2 GHz bandwidth split into 2049×1 MHz
353
+ spectral channels, and for a total of 150 min on source. Data were
354
+ reduced following standard procedures in the Common Astronomy
355
+ Software Applications (McMullin et al. 2007; CASA-TEAM et al.
356
+ 2022). We used 1934-638 for flux and bandpass calibration and 1336-
357
+ 260 for phase calibration. Images of the target field were created using
358
+ the CASA task tclean. No source was detected at the location of
359
+ J1331 at either frequency band with a 3𝜎 upper limit of 73.5𝜇Jy/bm
360
+ at 5.5 GHz and 54𝜇Jy/bm at 9 GHz. Additionally, no source was
361
+ detected in a stacked 5.5 and 9 GHz image, with a 3𝜎 upper limit of
362
+ 57.9𝜇Jy/bm at a central frequency of 7.3 GHz.
363
+ 3 DISCUSSION
364
+ Comparing the X-ray lightcurve of J1331 with other ultra-soft nu-
365
+ clear transients (Fig. D4) from galaxies that were recently quiescent,
366
+ or hosted low luminosity AGN, then J1331 decays faster than the
367
+ majority of other X-ray bright TDEs7, but decays over much longer
368
+ timescales than the bursts typically seen in QPEs (burst durations
369
+ ≲30 ks, or ≲0.3 days; Miniutti et al. 2019; Giustini et al. 2020;
370
+ Arcodia et al. 2021, 2022).
371
+ Given the quiescent nature of the host galaxy, and the ultra-soft
372
+ X-ray spectrum, an AGN origin for J1331 is disfavoured. We also
373
+ rule out a mechanism similar to that producing the X-ray flares ob-
374
+ served in Sgr A* (e.g. Neilsen et al. 2013; Ponti et al. 2015; Yuan &
375
+ Wang 2016; Ponti et al. 2017; Mossoux et al. 2020), as the latter are
376
+ clearly observationally distinct to J1331, with respect to the flaring
377
+ timescales (Sgr A* flare durations ≲ 104 s; Mossoux et al. 2020),
378
+ spectral properties (flaring X-ray emission in Sgr A* is hard and
379
+ likely synchrotron, e.g. Ponti et al. 2017), and peak observed lumi-
380
+ nosity (bolometric luminosity of Sgr A* is ∼ 1036 erg s−1; Genzel
381
+ et al. 2010). Arguments against a Galactic origin for this system have
382
+ previously been presented in Hampel et al. (2022).
383
+ Ultra-soft X-ray flares from quiescent galaxies have previously
384
+ been considered as a reliable signature of a TDE (e.g. Zabludoff et al.
385
+ 2021). However, the current theoretically predicted TDE rates are
386
+ ≳ 10−4 yr−1 galaxy−1 (Stone et al. 2020), so it would be exceptionally
387
+ unlikely to have observed two independent tidal disruption flares
388
+ occuring within the same galaxy over a ∼30 year timescale (Poisson
389
+ probability ∼ 5 × 10−6; Fig. C2); a more exotic class of TDE would
390
+ need to be invoked to explain J1331.
391
+ One such possibility, discussed in Hampel et al. (2022), is that
392
+ J1331 was produced by a TDE involving a supermassive black hole
393
+ binary (SMBHB). This scenario was partly proposed in an attempt
394
+ to explain the fast X-ray brightening observed by ROSAT, since
395
+ such TDEs may have highly non-monotonic decays of their X-ray
396
+ lightcurves. This stems from the gravitational interaction between
397
+ the companion BH and the debris streams, which may cause large
398
+ perturbations to the orbits of the less bound debris and cause their
399
+ chaotic evolution, as well as a complex evolution of the accretion
400
+ rate over time. Liu et al. (2014); Ricarte et al. (2016); Coughlin et al.
401
+ (2017) predict these systems to show sharp dips and rises in the X-
402
+ ray lightcurve rate (of ∼1–2 orders of magnitude), on timescales of
403
+ the order of the binary orbital period (Liu et al. 2014; Ricarte et al.
404
+ 2016), although Coughlin et al. (2017) find highly variable accretion
405
+ rates between different simulation runs and over timescales shorter
406
+ than the SMBHB orbital periods (i.e. there still seems to be quite
407
+ large uncertainties in the theoretically predicted lightcurves of TDEs
408
+ involving SMBHBs).
409
+ Under the SMBHB scenario, both the eROSITA and ROSAT obser-
410
+ vations would have had to have sampled a ‘dipping’, or ‘brightening
411
+ from a dip’, phase of the X-ray lightcurve, respectively. For binary
412
+ orbital periods of the order of ∼months, assuming ∼mpc binary sep-
413
+ aration as in Liu et al. (2014), then it would be quite fortuitous for us
414
+ to have observed such behaviour. Furthermore, there is importantly
415
+ no evidence for late time X-ray rebrightening episodes in the months
416
+ after each outburst, as seen by XMM and Swift (Fig. 1), which one
417
+ might expect to have observed given that the accretion rate is pre-
418
+ dicted to eventually revert back to the 𝑡−5/3 decay following ‘dips’
419
+ (e.g. Fig. 12 in Coughlin et al. 2017). We would therefore disfavour
420
+ J1331 being caused by a full TDE around a SMBHB, given the fine
421
+ tuning needed in order to match observations.
422
+ A more feasible scenario is that both outbursts were driven by a
423
+ partial tidal disruption event (pTDE), potentially of the same object.
424
+ Unless the pTDE rate is orders of magnitude larger than currently
425
+ 7 Ignoring short timescale flaring behaviour seen in some TDE candidates,
426
+ such as AT 2019ehz (van Velzen et al. 2021b).
427
+ MNRAS 000, 1–9 (2015)
428
+
429
+ Repeated partial tidal disruption flares from a quiescent galaxy
430
+ 5
431
+ 10
432
+ 40
433
+ 10
434
+ 41
435
+ 10
436
+ 42
437
+ 10
438
+ 43
439
+ LX [erg s
440
+ 1]
441
+ 10
442
+ 1
443
+ 10
444
+ 2
445
+ MJD - 59581
446
+ 10
447
+ 15
448
+ 10
449
+ 14
450
+ 10
451
+ 13
452
+ 10
453
+ 12
454
+ FX [erg s
455
+ 1 cm
456
+ 2]
457
+ t
458
+ 5/3
459
+ t
460
+ 9/4
461
+ t
462
+ 4
463
+ Figure 2. Zoom-in on the first eROSITA-detected outburst in 2022, along
464
+ with multiple power-law decay slopes plotted in grey dashed lines. The decay
465
+ slope appears to be much steeper than the canonical 𝑡−5/3 decay predicted
466
+ for TDEs with a uniform distribution of specific energies, and appears more
467
+ consistent with a 𝑡−4 decay, as predicted in Ryu et al. (2020). We assume a
468
+ peak MJD of 59593 for the X-ray outburst, and roughly estimate the MJD of
469
+ disruption to be 59581 (section C). The markers follow the same legend as
470
+ for Fig. 1.
471
+ estimated in the literature (Stone & Metzger 2016; Chen & Shen
472
+ 2021; Zhong et al. 2022), then both outbursts would likely be re-
473
+ lated to the same star being disrupted by the same black hole (i.e.
474
+ the star should have survived the initial encounter). Considering that
475
+ the recurrence timescale of J1331 is ≲ 30 years, then it is also diffi-
476
+ cult to reconcile this with theoretical predictions for the recurrence
477
+ timescales of flares in pTDEs where the star was initially scattered
478
+ onto a parabolic orbit around the black hole (≳ 400 years, e.g. Ryu
479
+ et al. 2020). Instead, the flaring may have been driven by the repeated
480
+ stripping of a star on an elliptical orbit by the disrupting SMBH (see
481
+ Hayasaki et al. 2013 for a discussion on potential origins for such
482
+ stars). This scenario would be further supported by both the relatively
483
+ small amount of inferred energy emitted in the eROSITA-detected
484
+ outburst8 of (5+6
485
+ −3) × 1049 erg, corresponding to an accreted mass of
486
+ (5+7
487
+ −2) × 10−4(𝜖/0.05)−1 M⊙, where 𝜖 is the radiative efficiency of
488
+ accretion, and also by the extremely low 𝐿X at late-times (as sug-
489
+ gested by the non-detection and deep upper limits in XMM2), since
490
+ elliptical TDEs are predicted to produce short-lived, finite accretion
491
+ bursts (Hayasaki et al. 2013). Given this, and that the radio obser-
492
+ vations were taken ∼40 days after the eRASS5 flare (section 2.7),
493
+ then we note that we may have missed any associated jet or out-
494
+ flow launched in this event, as seen in other TDE candidates (e.g.
495
+ Goodwin et al. 2022).
496
+ The case for a repeated pTDE is further enhanced by the fast rise
497
+ and decay timescales seen with ROSAT and eROSITA. Compared
498
+ with full disruptions, pTDEs only strip the outermost layers of the
499
+ star, with the specific energy distribution of the debris, d𝑀/d𝐸,
500
+ differing from full TDEs (e.g. Coughlin & Nixon 2019; Miles et al.
501
+ 2020; Ryu et al. 2020). Since the mass fallback rate, �𝑀fb(𝑡), scales
502
+ ∝ d𝑀/d𝐸, then �𝑀fb(𝑡) is also predicted to differ between full and
503
+ pTDEs. Ryu et al. (2020) find that the narrower spreads in d𝑀/d𝐸
504
+ for pTDEs can yield �𝑀fb(𝑡) ∝ 𝑡−𝑝, where 𝑝 ∼ 2−5, more consistent
505
+ with what is observed in J1331 (Fig. 2), and much steeper than a
506
+ canonical 𝑡−5/3 decline predicted for the mass fallback rate in full
507
+ TDEs (Rees 1988; Phinney 1989).
508
+ Lastly, although the mass fallback in weak pTDEs may evolve
509
+ over shorter timescales relative to full TDEs, the viscous timescale,
510
+ 8 Assuming a similar temporal evolution for both the eROSITA-detected and
511
+ ROSAT-detected outbursts- see section C.
512
+ 𝑡visc, still needs to be shorter than the minimum orbital period of the
513
+ stellar debris so that the X-ray luminosity traces the mass fallback
514
+ rate (assuming a constant radiative efficiency, negligible obscuration
515
+ of the soft X-rays, and negligible disc cooling). Considering 𝑡visc ∼
516
+ 𝛼−1(𝐻/𝑅)−2Ω−1(𝑟), where 𝛼 is the viscosity parameter (Shakura
517
+ & Sunyaev 1973), 𝐻 and 𝑅 the scale height and width of the disc,
518
+ and Ω−1(𝑟) the orbital period at distance 𝑟 from the black hole,
519
+ then 𝑡visc ∼ 0.4(𝛼/0.1)−1(𝐻/𝑅)−2 days at the circularisation radius
520
+ (∼ 2𝑅tidal/𝛽, where 𝑅tidal and 𝛽 are the tidal radius and impact
521
+ parameter for the disruption). A geometrically thick disc (𝐻/𝑅 ∼ 1),
522
+ as may be expected to form for super-Eddington mass fallback rates,
523
+ would be needed to reproduce accretion timescales of the order ∼days
524
+ as seen in J1331. However, it is currently unclear how the stellar
525
+ debris might circularise so efficiently in a weak pTDE (see Bonnerot
526
+ & Stone 2021 for a review on accretion flow formation in TDEs),
527
+ and we also highlight here that similar concerns have recently been
528
+ raised for explaining the short X-ray flare durations observed in QPEs
529
+ via an accretion origin (e.g. Krolik & Linial 2022; Lu & Quataert
530
+ 2022). Although future simulations would likely be needed to explore
531
+ the debris circularisation in J1331-like events, alternative origins for
532
+ the X-ray emission may be from compression shocks of the debris
533
+ streams at pericentre (e.g. Steinberg & Stone 2022), or circularisation
534
+ shocks from debris stream collisions (Krolik & Linial 2022; Lu &
535
+ Quataert 2022).
536
+ 4 SUMMARY
537
+ J1331 is a repeating X-ray transient associated to a quiescent galaxy
538
+ at 𝑧 = 0.05189, which we consider to be consistent with a scenario
539
+ involving two weak pTDEs. Whilst several previously reported pTDE
540
+ candidates have occurred in galaxies hosting an AGN, we highlight
541
+ that the host of J1331 is quiescent. The main properties of J1331 can
542
+ be summarised as follows:
543
+ (i) J1331 was first detected by ROSAT in 1993 (Hampel et al.
544
+ 2022), where it had shown an ultra-soft (𝑘𝑇 = 0.11 ± 0.03 keV)
545
+ flaring by a factor of at least 40 relative to a previous 2𝜎 upper limit.
546
+ The outburst also showed a fast rise, where it had brightened by a
547
+ factor of eight over an 8 day period. The system was subsequently not
548
+ detected in a deep pointed ROSAT observation ∼165 days afterwards,
549
+ as well as in XMM Slew, and Swift XRT observations performed
550
+ between 2006 and 2018 (Table D1).
551
+ (ii) After not being detected by eROSITA in its first four eRASS,
552
+ J1331 was observed to have brightened in eRASS5 to a 0.2–2 keV
553
+ flux of (6.0 ± 0.7) × 10−13 erg s−1 cm−2. The eRASS5 spectrum
554
+ is ultra-soft (𝑘𝑇 = 0.115+0.007
555
+ −0.007 keV), and is consistent with the 𝑘𝑇
556
+ inferred from the ROSAT-observed flare in 1993.
557
+ (iii) J1331 was not detected during pointed XMM observations
558
+ and Swift XRT observations when followed up after the eRASS5
559
+ detection; the first (second) XMM observation constrains the 0.2–
560
+ 2 keV flux to decay by a factor of ≳40 (≳100) over a 17 (∼200)
561
+ day period after the eRASS5 observation. The faint 0.2–2 keV X-ray
562
+ luminosities (< 7×1040 erg s−1, unabsorbed) at ∼ 200 days post-peak
563
+ brightness, inferred via the second XMM observation (Table D1),
564
+ may be due to a late-time drop off in the mass fallback rate once the
565
+ disruption episode is over.
566
+ (iv) Combined with the fast rise timescale seen by ROSAT, then
567
+ J1331-like outbursts are short lived (rise and decay timescales of
568
+ 6+1
569
+ −1 days and 3.9+0.1
570
+ −0.1 days, respectively; appendix C) and evolve over
571
+ shorter timescales relative to full TDEs.
572
+ (v) J1331 has only been observed to show transient emission in
573
+ MNRAS 000, 1–9 (2015)
574
+
575
+ 6
576
+ Adam Malyali et al.
577
+ the 0.2–2 keV band, with no transient optical, UV, or radio emission
578
+ observed in follow-up observations.
579
+ We conclude by noting that J1331 appears to fill in the continuum
580
+ of observed soft X-ray outbursts from quiescent galaxies, lying in be-
581
+ tween QPEs and TDEs with respect to its rise and decay timescales
582
+ (Fig. D4), although the recurrence timescales are much longer than
583
+ in the current sample of QPEs. Additional follow-up observations
584
+ will be scheduled in order to more tightly constrain the recurrence
585
+ timescales of outbursts from J1331. Future planned X-ray missions
586
+ geared towards exploiting the X-ray transient sky, such as the Einstein
587
+ Probe (Yuan et al. 2018), will likely be sensitive towards detecting
588
+ similar partial disruptions; for these missions, the eROSITA All-Sky
589
+ survey data may play an important role by providing a long-term
590
+ baseline towards which new candidates can be identified. Given the
591
+ faster decay timescales of J1331-like systems, then we would advo-
592
+ cate promptly triggering high-cadence X-ray follow-up in order to
593
+ better constrain the evolution of the accretion rate in future candi-
594
+ dates.
595
+ ACKNOWLEDGEMENTS
596
+ AM thanks Taeho Ryu for very useful discussions whilst preparing
597
+ the manuscript. AM acknowledges support by DLR under the grant
598
+ 50 QR 2110 (XMM_NuTra, PI: Z. Liu). This work was supported by
599
+ the Australian government through the Australian Research Council’s
600
+ Discovery Projects funding scheme (DP200102471). We would like
601
+ to thank the referee for a constructive report that improved the quality
602
+ of the paper.
603
+ This work is based on data from eROSITA, the soft X-ray instru-
604
+ ment aboard SRG, a joint Russian-German science mission supported
605
+ by the Russian Space Agency (Roskosmos), in the interests of the
606
+ Russian Academy of Sciences represented by its Space Research In-
607
+ stitute (IKI), and the Deutsches Zentrum für Luft- und Raumfahrt
608
+ (DLR). The SRG spacecraft was built by Lavochkin Association
609
+ (NPOL) and its subcontractors, and is operated by NPOL with sup-
610
+ port from the Max Planck Institute for Extraterrestrial Physics (MPE).
611
+ The development and construction of the eROSITA X-ray instru-
612
+ ment was led by MPE, with contributions from the Dr. Karl Re-
613
+ meis Observatory Bamberg & ECAP (FAU Erlangen-Nuernberg),
614
+ the University of Hamburg Observatory, the Leibniz Institute for
615
+ Astrophysics Potsdam (AIP), and the Institute for Astronomy and
616
+ Astrophysics of the University of Tübingen, with the support of DLR
617
+ and the Max Planck Society. The Argelander Institute for Astronomy
618
+ of the University of Bonn and the Ludwig Maximilians Universität
619
+ Munich also participated in the science preparation for eROSITA.
620
+ The eROSITA data shown here were processed using the eSASS
621
+ software system developed by the German eROSITA consortium.
622
+ This work made use of data supplied by the UK Swift Science
623
+ Data Centre at the University of Leicester.
624
+ The Australia Telescope Compact Array is part of the Aus-
625
+ tralia Telescope National Facility (https://ror.org/05qajvd42)
626
+ which is funded by the Australian Government for operation as a
627
+ National Facility managed by CSIRO. We acknowledge the Gomeroi
628
+ people as the traditional owners of the Observatory site.
629
+ The Legacy Surveys consist of three individual and complemen-
630
+ tary projects: the Dark Energy Camera Legacy Survey (DECaLS;
631
+ Proposal ID 2014B-0404; PIs: David Schlegel and Arjun Dey), the
632
+ Beijing-Arizona Sky Survey (BASS; NOAO Prop. ID #2015A-0801;
633
+ PIs: Zhou Xu and Xiaohui Fan), and the Mayall z-band Legacy Sur-
634
+ vey (MzLS; Prop. ID #2016A-0453; PI: Arjun Dey). DECaLS, BASS
635
+ and MzLS together include data obtained, respectively, at the Blanco
636
+ telescope, Cerro Tololo Inter-American Observatory, NSF’s NOIR-
637
+ Lab; the Bok telescope, Steward Observatory, University of Arizona;
638
+ and the Mayall telescope, Kitt Peak National Observatory, NOIR-
639
+ Lab. Pipeline processing and analyses of the data were supported by
640
+ NOIRLab and the Lawrence Berkeley National Laboratory (LBNL).
641
+ The Legacy Surveys project is honored to be permitted to conduct
642
+ astronomical research on Iolkam Du’ag (Kitt Peak), a mountain with
643
+ particular significance to the Tohono O’odham Nation.
644
+ NOIRLab is operated by the Association of Universities for Re-
645
+ search in Astronomy (AURA) under a cooperative agreement with
646
+ the National Science Foundation. LBNL is managed by the Regents
647
+ of the University of California under contract to the U.S. Department
648
+ of Energy.
649
+ This project used data obtained with the Dark Energy Camera
650
+ (DECam), which was constructed by the Dark Energy Survey (DES)
651
+ collaboration. Funding for the DES Projects has been provided by the
652
+ U.S. Department of Energy, the U.S. National Science Foundation,
653
+ the Ministry of Science and Education of Spain, the Science and
654
+ Technology Facilities Council of the United Kingdom, the Higher
655
+ Education Funding Council for England, the National Center for
656
+ Supercomputing Applications at the University of Illinois at Urbana-
657
+ Champaign, the Kavli Institute of Cosmological Physics at the Uni-
658
+ versity of Chicago, Center for Cosmology and Astro-Particle Physics
659
+ at the Ohio State University, the Mitchell Institute for Fundamental
660
+ Physics and Astronomy at Texas A&M University, Financiadora de
661
+ Estudos e Projetos, Fundacao Carlos Chagas Filho de Amparo, Fi-
662
+ nanciadora de Estudos e Projetos, Fundacao Carlos Chagas Filho
663
+ de Amparo a Pesquisa do Estado do Rio de Janeiro, Conselho Na-
664
+ cional de Desenvolvimento Cientifico e Tecnologico and the Minis-
665
+ terio da Ciencia, Tecnologia e Inovacao, the Deutsche Forschungs-
666
+ gemeinschaft and the Collaborating Institutions in the Dark Energy
667
+ Survey. The Collaborating Institutions are Argonne National Labo-
668
+ ratory, the University of California at Santa Cruz, the University of
669
+ Cambridge, Centro de Investigaciones Energeticas, Medioambien-
670
+ tales y Tecnologicas-Madrid, the University of Chicago, University
671
+ College London, the DES-Brazil Consortium, the University of Ed-
672
+ inburgh, the Eidgenossische Technische Hochschule (ETH) Zurich,
673
+ Fermi National Accelerator Laboratory, the University of Illinois at
674
+ Urbana-Champaign, the Institut de Ciencies de l’Espai (IEEC/CSIC),
675
+ the Institut de Fisica d’Altes Energies, Lawrence Berkeley National
676
+ Laboratory, the Ludwig Maximilians Universitat Munchen and the
677
+ associated Excellence Cluster Universe, the University of Michigan,
678
+ NSF’s NOIRLab, the University of Nottingham, the Ohio State Uni-
679
+ versity, the University of Pennsylvania, the University of Portsmouth,
680
+ SLAC National Accelerator Laboratory, Stanford University, the Uni-
681
+ versity of Sussex, and Texas A&M University.
682
+ BASS is a key project of the Telescope Access Program (TAP),
683
+ which has been funded by the National Astronomical Observatories
684
+ of China, the Chinese Academy of Sciences (the Strategic Prior-
685
+ ity Research Program “The Emergence of Cosmological Structures”
686
+ Grant # XDB09000000), and the Special Fund for Astronomy from
687
+ the Ministry of Finance. The BASS is also supported by the Exter-
688
+ nal Cooperation Program of Chinese Academy of Sciences (Grant
689
+ # 114A11KYSB20160057), and Chinese National Natural Science
690
+ Foundation (Grant # 12120101003, # 11433005).
691
+ The Legacy Survey team makes use of data products from the
692
+ Near-Earth Object Wide-field Infrared Survey Explorer (NEOWISE),
693
+ which is a project of the Jet Propulsion Laboratory/California Insti-
694
+ tute of Technology. NEOWISE is funded by the National Aeronautics
695
+ and Space Administration.
696
+ The Legacy Surveys imaging of the DESI footprint is supported
697
+ by the Director, Office of Science, Office of High Energy Physics
698
+ MNRAS 000, 1–9 (2015)
699
+
700
+ Repeated partial tidal disruption flares from a quiescent galaxy
701
+ 7
702
+ of the U.S. Department of Energy under Contract No. DE-AC02-
703
+ 05CH1123, by the National Energy Research Scientific Comput-
704
+ ing Center, a DOE Office of Science User Facility under the same
705
+ contract; and by the U.S. National Science Foundation, Division of
706
+ Astronomical Sciences under Contract No. AST-0950945 to NOAO.
707
+ M.K. acknowledges support from DFG grant KR 3338/4-1. D.H.
708
+ is supported by DLR grant FKZ 50OR2003.
709
+ DATA AVAILABILITY
710
+ The eRASS1-4 data taken within the German half of the eROSITA
711
+ sky is currently planned to be made public by Q2 2024, whilst
712
+ the eRASS5 data is scheduled to become public by Q2 2026. The
713
+ Swift data is available to download through the UK Swift Data Sci-
714
+ ence website9, whilst the NICER data is accessible through NASA’s
715
+ HEASARC interface10. Publicly available ATLAS data can be ac-
716
+ cessed through the ATLAS forced photometry service11, and NEO-
717
+ WISE lightcurves can be accessed through the IRSA web portal12.
718
+ ATCA data are stored in the Australia Telescope Online Archive13,
719
+ and will become publicly accessible 18 months from the date of ob-
720
+ servation. The XMM data will become public after the propietory
721
+ period expires (2023-08-30). Follow-up optical spectra will likely
722
+ remain private at least until the release of the forthcoming eROSITA-
723
+ selected TDE population paper, but could be made available upon
724
+ reasonable request.
725
+ REFERENCES
726
+ Alexander K. D., van Velzen S., Horesh A., Zauderer B. A., 2020, Space
727
+ Science Reviews, 216, 81
728
+ Antonini F., Lombardi J. C., Merritt D., 2011, The Astrophysical Journal,
729
+ 731, 128
730
+ Arcodia R., et al., 2021, Nature, 592, 704
731
+ Arcodia R., et al., 2022, Astronomy & Astrophysics, 662, A49
732
+ Arnaud K. A., 1996, in Jacoby G. H., Barnes J., eds, Astronomical Society
733
+ of the Pacific Conference Series Vol. 101, Astronomical Data Analysis
734
+ Software and Systems V. p. 17
735
+ Assef R. J., Stern D., Noirot G., Jun H. D., Cutri R. M., Eisenhardt P. R. M.,
736
+ 2018, The Astrophysical Journal Supplement Series, 234, 23
737
+ Blanchard P. K., et al., 2017, The Astrophysical Journal, 843, 106
738
+ Bonnerot C., Stone N. C., 2021, Space Science Reviews, 217, 16
739
+ Bright J. S., et al., 2018, Monthly Notices of the Royal Astronomical Society,
740
+ 475, 4011
741
+ Brown T. M., et al., 2013, Publications of the Astronomical Society of the
742
+ Pacific, 125, 1031
743
+ Brunner H., et al., 2022, Astronomy & Astrophysics, 661, A1
744
+ Buchner J., 2021, UltraNest – a robust, general purpose Bayesian inference
745
+ engine, http://arxiv.org/abs/2101.09604
746
+ Buchner J., et al., 2014, Astronomy & Astrophysics, 564, A125
747
+ Burrows D. N., et al., 2005, Space Science Reviews, 120, 165
748
+ CASA-TEAM et al., 2022, CASA, the Common Astronomy Software Ap-
749
+ plications for Radio Astronomy, doi:10.1088/1538-3873/ac9642, http:
750
+ //arxiv.org/abs/2210.02276
751
+ Campana S., Mainetti D., Colpi M., Lodato G., D’Avanzo P., Evans P. A.,
752
+ Moretti A., 2015, Astronomy & Astrophysics, 581, A17
753
+ 9 https://www.swift.ac.uk/archive/index.php
754
+ 10 https://heasarc.gsfc.nasa.gov/docs/nicer/nicer_archive.
755
+ html
756
+ 11 https://fallingstar-data.com/forcedphot/
757
+ 12 https://irsa.ipac.caltech.edu/applications/wise/
758
+ 13 https://atoa.atnf.csiro.au/
759
+ Cannizzaro G., et al., 2021, Monthly Notices of the Royal Astronomical
760
+ Society, 504, 792
761
+ Cardelli J. A., Clayton G. C., Mathis J. S., 1989, \apj, 345, 245
762
+ Chen J.-H., Shen R.-F., 2021, The Astrophysical Journal, 914, 69
763
+ Chen J.-H., Dou L.-M., Shen R.-F., 2022, The Astrophysical Journal, 928, 63
764
+ Childress M. J., Vogt F. P. A., Nielsen J., Sharp R. G., 2014, Astrophysics
765
+ and Space Science, 349, 617
766
+ Coughlin E. R., Nixon C. J., 2019, The Astrophysical Journal, 883, L17
767
+ Coughlin E. R., Armitage P. J., Nixon C., Begelman M. C., 2017, Monthly
768
+ Notices of the Royal Astronomical Society, 465, 3840
769
+ Dale J. E., Davies M. B., Church R. P., Freitag M., 2009, Monthly Notices of
770
+ the Royal Astronomical Society, 393, 1016
771
+ Dopita M., et al., 2010, Astrophysics and Space Science, 327, 245
772
+ Drake A. J., et al., 2011, The Astrophysical Journal, 735, 106
773
+ Evans P. A., et al., 2007, Astronomy & Astrophysics, 469, 379
774
+ Evans P. A., et al., 2009, Monthly Notices of the Royal Astronomical Society,
775
+ 397, 1177
776
+ Frederick S., et al., 2019, The Astrophysical Journal, 883, 31
777
+ Frederick S., et al., 2021, The Astrophysical Journal, 920, 56
778
+ Gaia Collaboration et al., 2021, Astronomy & Astrophysics, 649, A6
779
+ Gendreau
780
+ K.
781
+ C.,
782
+ et
783
+ al.,
784
+ 2016.
785
+ Edinburgh,
786
+ United
787
+ Kingdom,
788
+ p.
789
+ 99051H,
790
+ doi:10.1117/12.2231304,
791
+ http://proceedings.
792
+ spiedigitallibrary.org/proceeding.aspx?doi=10.1117/
793
+ 12.2231304
794
+ Genzel R., Eisenhauer F., Gillessen S., 2010, Reviews of Modern Physics,
795
+ 82, 3121
796
+ Giustini M., Miniutti G., Saxton R. D., 2020, Astronomy & Astrophysics,
797
+ 636, L2
798
+ Goodwin A. J., et al., 2022, Monthly Notices of the Royal Astronomical
799
+ Society, 511, 5328
800
+ Grupe D., Beuermann K., Mannheim K., Bade N., 1995, Astronomy & As-
801
+ trophysics, 299, L5
802
+ Grupe D., Thomas H.-C., Beuermann K., 2001, Astronomy & Astrophysics,
803
+ 367, 470
804
+ Grupe D., Komossa S., Saxton R., 2015, The Astrophysical Journal, 803, L28
805
+ HI4PI Collaboration: et al., 2016, Astronomy & Astrophysics, 594, A116
806
+ Hampel J., Komossa S., Greiner J., Reiprich T. H., Freyberg M., Erben T.,
807
+ 2022, Research in Astronomy and Astrophysics, 22, 055004
808
+ Hayasaki K., Stone N., Loeb A., 2013, Monthly Notices of the Royal Astro-
809
+ nomical Society, 434, 909
810
+ Hinkle J. T., et al., 2020, Monthly Notices of the Royal Astronomical Society,
811
+ 500, 1673
812
+ Kaastra J. S., Bleeker J. A. M., 2016, Astronomy & Astrophysics, 587, A151
813
+ Kettlety T., et al., 2018, Monthly Notices of the Royal Astronomical Society,
814
+ 473, 776
815
+ Krolik J. H., Linial I., 2022, Quasi-Periodic Erupters: A Stellar Mass-Transfer
816
+ Model for the Radiation, http://arxiv.org/abs/2209.02786
817
+ König O., et al., 2021, HILIGT, Upper Limit Servers II – Implementing the
818
+ data servers, http://arxiv.org/abs/2111.13563
819
+ Liu F. K., Li S., Komossa S., 2014, The Astrophysical Journal, 786, 103
820
+ Liu Z., Li D., Liu H.-Y., Lu Y., Yuan W., Dou L., Shen R.-F., 2020, The
821
+ Astrophysical Journal, 894, 93
822
+ Liu Z., et al., 2022, arXiv:2208.12452 [astro-ph]
823
+ Lu W., Quataert E., 2022, Quasi-periodic eruptions from mildly eccentric un-
824
+ stable mass transfer in galactic nuclei, http://arxiv.org/abs/2210.
825
+ 08023
826
+ Mainzer A., et al., 2014, The Astrophysical Journal, 792, 30
827
+ Malyali A., et al., 2021, Astronomy & Astrophysics, 647, A9
828
+ McMullin J. P., Waters B., Schiebel D., Young W., Golap K., 2007, in Shaw
829
+ R. A., Hill F., Bell D. J., eds, Astronomical Society of the Pacific Confer-
830
+ ence Series Vol. 376, Astronomical Data Analysis Software and Systems
831
+ XVI. p. 127
832
+ Merloni A., et al., 2015, Monthly Notices of the Royal Astronomical Society,
833
+ 452, 69
834
+ Miles P. R., Coughlin E. R., Nixon C. J., 2020, The Astrophysical Journal,
835
+ 899, 36
836
+ Miniutti G., et al., 2019, Nature, 573, 381
837
+ Moretti A., et al., 2017, Astronomy & Astrophysics, 599, A81
838
+ MNRAS 000, 1–9 (2015)
839
+
840
+ 8
841
+ Adam Malyali et al.
842
+ Mossoux E., Finociety B., Beckers J.-M., Vincent F. H., 2020, Astronomy &
843
+ Astrophysics, 636, A25
844
+ Neilsen J., et al., 2013, The Astrophysical Journal, 774, 42
845
+ Payne A. V., et al., 2021, The Astrophysical Journal, 910, 125
846
+ Phinney E. S., 1989, in Morris M., ed., The Center of the Galaxy. Springer
847
+ Netherlands, Dordrecht, pp 543–553
848
+ Ponti G., et al., 2015, Monthly Notices of the Royal Astronomical Society,
849
+ 454, 1525
850
+ Ponti G., et al., 2017, Monthly Notices of the Royal Astronomical Society,
851
+ 468, 2447
852
+ Predehl P., et al., 2021, Astronomy & Astrophysics, 647, A1
853
+ Rees M. J., 1988, Nature, 333, 523
854
+ Reines A. E., Volonteri M., 2015, The Astrophysical Journal, 813, 82
855
+ Reiprich T. H., Greiner J., 2001, in Kaper L., Heuvel E. P. J. V. D.,
856
+ Woudt P. A., eds, Black Holes in Binaries and Galactic Nuclei. p. 168,
857
+ doi:10.1007/10720995_31
858
+ Remillard R. A., et al., 2022, The Astronomical Journal, 163, 130
859
+ Ricarte A., Natarajan P., Dai L., Coppi P., 2016, Monthly Notices of the Royal
860
+ Astronomical Society, 458, 1712
861
+ Ricci C., et al., 2020, The Astrophysical Journal, 898, L1
862
+ Ricci C., et al., 2021, The Astrophysical Journal Supplement Series, 255, 7
863
+ Roming P. W. A., et al., 2005, Space Science Reviews, 120, 95
864
+ Ryu T., Krolik J., Piran T., Noble S. C., 2020, The Astrophysical Journal, 904,
865
+ 100
866
+ Saxton R., Komossa S., Auchettl K., Jonker P. G., 2020, Space Science
867
+ Reviews, 216, 85
868
+ Saxton R., et al., 2021, arXiv:2111.14238 [astro-ph]
869
+ Schlafly E. F., Finkbeiner D. P., 2011, The Astrophysical Journal, 737, 103
870
+ Shakura N. I., Sunyaev R. A., 1973, Astronomy & Astrophysics, 24, 337
871
+ Simmonds C., Buchner J., Salvato M., Hsu L.-T., Bauer F. E., 2018, Astron-
872
+ omy & Astrophysics, 618, A66
873
+ Steinberg E., Stone N. C., 2022, arXiv:2206.10641 [astro-ph]
874
+ Stern D., et al., 2012, The Astrophysical Journal, 753, 30
875
+ Stone N. C., Metzger B. D., 2016, Monthly Notices of the Royal Astronomical
876
+ Society, 455, 859
877
+ Stone N. C., Vasiliev E., Kesden M., Rossi E. M., Perets H. B., Amaro-Seoane
878
+ P., 2020, Space Science Reviews, 216, 35
879
+ Sunyaev R., et al., 2021, Astronomy & Astrophysics, 656, A132
880
+ Tonry J. L., et al., 2018, Publications of the Astronomical Society of the
881
+ Pacific, 130, 064505
882
+ Trakhtenbrot B., et al., 2019a, Nature Astronomy, 3, 242
883
+ Trakhtenbrot B., et al., 2019b, The Astrophysical Journal, 883, 94
884
+ Wevers T., et al., 2022, arXiv:2209.07538 [astro-ph]
885
+ Wright E. L., et al., 2010, The Astronomical Journal, 140, 1868
886
+ Yuan Q., Wang Q. D., 2016, Monthly Notices of the Royal Astronomical
887
+ Society, 456, 1438
888
+ Yuan
889
+ W.,
890
+ et
891
+ al.,
892
+ 2018,
893
+ in
894
+ den
895
+ Herder
896
+ J.-W.
897
+ A.,
898
+ Nakazawa
899
+ K.,
900
+ Nikzad S., eds, Space Telescopes and Instrumentation 2018: Ul-
901
+ traviolet
902
+ to
903
+ Gamma
904
+ Ray.
905
+ SPIE,
906
+ Austin,
907
+ United
908
+ States,
909
+ p.
910
+ 76,
911
+ doi:10.1117/12.2313358,
912
+ https://www.spiedigitallibrary.
913
+ org/conference-proceedings-of-spie/10699/2313358/
914
+ Einstein-Probe--a-lobster-eye-telescope-for-monitoring-the/
915
+ 10.1117/12.2313358.full
916
+ Zabludoff A., et al., 2021, Space Science Reviews, 217, 54
917
+ Zhong S., Li S., Berczik P., Spurzem R., 2022, The Astrophysical Journal,
918
+ 933, 96
919
+ van Velzen S., Holoien T. W.-S., Onori F., Hung T., Arcavi I., 2020, Space
920
+ Science Reviews, 216, 124
921
+ van Velzen S., Pasham D. R., Komossa S., Yan L., Kara E. A., 2021a, Space
922
+ Science Reviews, 217, 63
923
+ van Velzen S., et al., 2021b, The Astrophysical Journal, 908, 4
924
+ APPENDIX A: HOST GALAXY PROPERTIES
925
+ Using the correlation reported in Kettlety et al. (2018) between
926
+ galaxy total stellar mass, 𝑀★, and luminosity in the WISE 𝑊1-band,
927
+ 13
928
+ h32
929
+ m00
930
+ s
931
+ 31
932
+ m58
933
+ s
934
+ 57
935
+ s
936
+ 56
937
+ s
938
+ -32°43'00"
939
+ 15"
940
+ 30"
941
+ 45"
942
+ J2000
943
+ J2000
944
+ Figure A1. Legacy Survey DR10 (early) 𝑔-band cutout image of the sky
945
+ region surrounding eRASSt J133158-324321. The dark orange circle is the
946
+ error circle for RXJ133157.6324319.7 inferred from ROSAT pointed obser-
947
+ vations in Hampel et al. (2022), whilst the red and blue circles denote the 3𝜎
948
+ error circles on the source position inferred from eROSITA and XMM MOS2
949
+ observations (although the detection of J1331 in the first XMM observation is
950
+ uncertain and we quote upper limits on the count rates for this in section 2.3,
951
+ we include it in this finder chart for completeness). The cyan star marks the
952
+ Gaia EDR3 (Gaia Collaboration et al. 2021) position of the host galaxy.
953
+ 𝐿W1, then we infer log(𝑀★/𝑀⊙) = 10.15 ± 0.09 for the host galaxy.
954
+ Combining this with 𝑀BH − 𝑀★ relation in Reines & Volonteri
955
+ (2015), suggests a black hole mass of log(𝑀BH/𝑀⊙) = 6.5 ± 0.2.
956
+ The finder chart for J1331 is presented in Fig A1.
957
+ APPENDIX B: OPTICAL SPECTROSCOPY
958
+ LCO spectrum (2022-02-12): J1331 was observed with the low
959
+ dispersion FLOYDS spectrograph on the LCOGT 2m telescope at
960
+ Siding Spring Observatory operated by the Las Cumbres Observa-
961
+ tory (LCO; Brown et al. 2013) on 2022 February 12 (proposal ID
962
+ CON2022A-001, PI: M. Salvato). We obtained an exposure of 1800
963
+ seconds using the “red/blu” grism and the 2” slit oriented along the
964
+ parallactic angle. The spectrum has a wavelength range of 3200-
965
+ 10000A with dispersions of 3.51A/pixel and 1.74 A/pixel in the blue
966
+ (3200-5700A) and red (5400-10000A) bands, respectively. The data
967
+ were reduced and calibrated using the automatic FLOYDS pipeline.
968
+ The HgAr and Zn lamps were used for wavelength calibration and
969
+ a Tungsten-Halogen + Xenon lamp for flat fielding. A sensitivity
970
+ function from the FLOYDS archive was used for flux calibration.
971
+ WiFeS spectrum (2022-05-09): We observed J1331 with the Wide
972
+ Field Spectrograph (WiFeS; Dopita et al. 2010) on the ANU 2.3m
973
+ telescope at Siding Spring Observatory on 2022 May 08 (proposal
974
+ ID 2220157, PI Miller-Jones). We obtained 2x2400 s exposures us-
975
+ ing the R3000 and B3000 gratings and a NeAr arc lamp exposure
976
+ immediately following the target exposures. The data were reduced
977
+ using standard procedures including the PyWiFeS reduction pipeline
978
+ (Childress et al. 2014). LTT4364 was used as the flux standard and
979
+ a quartz-iodine lamp was used for flat-fielding. We then chose the
980
+ slitlets with the most significant flux from the calibrated spectra
981
+ MNRAS 000, 1–9 (2015)
982
+
983
+ Repeated partial tidal disruption flares from a quiescent galaxy
984
+ 9
985
+ 5500
986
+ 6000
987
+ 6500
988
+ 7000
989
+ 7500
990
+ 8000
991
+ Rest Wavelength [Å]
992
+ 0.0
993
+ 0.5
994
+ 1.0
995
+ 1.5
996
+ 2.0
997
+ F [10
998
+ 16 erg cm
999
+ 2 s
1000
+ 1 Å
1001
+ 1]
1002
+ 2022-02-12: LCO
1003
+ 2022-05-09: WiFeS
1004
+ Figure B1. Optical spectra of J1331, with the first follow-up spectrum being
1005
+ obtained on 2022-02-12, ∼23 days after the last eRASS5 detection.
1006
+ obtained from the pipeline and performed background subtraction,
1007
+ resulting in a spectrum with spectral range 3500 to 9000 Å.
1008
+ Each follow-up optical spectrum appears to be consistent with a
1009
+ quiescent host galaxy (Fig. B1), with no TDE-like optical emission
1010
+ features detected, nor any transient features relative to the NOT spec-
1011
+ trum taken on 1999-01-26 and presented in Hampel et al. (2022).
1012
+ APPENDIX C: INFERRING THE OUTBURST
1013
+ PROPERTIES
1014
+ To obtain a coarse reconstruction of the 2022 outburst, we perform a
1015
+ joint fit of the rising lightcurve from 1993, observed by ROSAT, and
1016
+ the decay lightcurve from 2022, observed by eROSITA and XMM,
1017
+ using:
1018
+ 𝐹X(𝑡) = 𝐹X,max ×
1019
+
1020
+ exp
1021
+
1022
+ −(𝑡 − 𝑡peak,1)2/2𝜎2�
1023
+ if 𝑡 < 𝑡peak,1
1024
+ exp
1025
+
1026
+ −(𝑡 − 𝑡peak,2)/𝜏
1027
+
1028
+ if 𝑡 > 𝑡peak,2
1029
+ (C1)
1030
+ where the free parameters of this model are 𝜎 (the rise timescale),
1031
+ 𝑡peak,1 and 𝑡peak,2 (the peak time of the ROSAT and eROSITA out-
1032
+ bursts, respectively), 𝜏 (the decay timescale), and 𝐹X,max (the peak
1033
+ flux of both outbursts), with the priors on these parameters listed in
1034
+ Table C1. We assume that the upper bound on the peak luminosity
1035
+ must be less than the Eddington luminosity for the SMBH, and that
1036
+ both outbursts have the same peak luminosity. We then assume that
1037
+ the rise for 2022 outburst was similar to the 1993 outburst (see below),
1038
+ and use its modelled rise to approximate that of the unobserved rise of
1039
+ the 2022 outburst. From this fittedlightcurve model (Fig. C1), we then
1040
+ computed the integrated 0.2–2 keV luminosity, and corrected this to
1041
+ a bolometric luminosity using the best fitting X-ray spectral model.
1042
+ The inferred energy emitted in each outburst is (5+6
1043
+ −3) × 1049 erg,
1044
+ corresponding to an accreted mass of (5+7
1045
+ −2) × 10−4(𝜖/0.05)−1 M⊙,
1046
+ where 𝜖 is the radiative efficiency of accretion, whilst the inferred
1047
+ peak MJD for each outburst are 49024+6
1048
+ −6 and 59593+3
1049
+ −2. The inferred
1050
+ 𝜎 and 𝜏 are 6+1
1051
+ −1 days and 3.9+0.1
1052
+ −0.1 days, respectively, and we roughly
1053
+ estimate the MJD of disruption to be 59593 − 2 ∗ 𝜎 ∼ 59581.
1054
+ It is of course extremely important to consider that these estimates
1055
+ are subject to a number of caveats, mainly related to our observations
1056
+ not covering the rise of the 2022 outburst, such that the estimated
1057
+ values here should be treated with caution. For example, it is assumed
1058
+ that the outburst can be well modelled by equation C1, and that
1059
+ both the 1993 and 2022 outbursts are similar, whereas the actual
1060
+ Table C1. Priors adopted in the fitting of the 1993 and 2022 outbursts. The
1061
+ rise and decay timescales are in units of days. 𝑡peak,1 and 𝑡peak,2 are in MJD,
1062
+ whilst 𝐹max is the maximum 0.2–2 keV flux of each outburst (with upper
1063
+ bound set by the Eddington luminosity of the system).
1064
+ Parameter
1065
+ Prior
1066
+ log[𝜎]
1067
+ ∼ U(0, log[50])
1068
+ 𝑡peak,1
1069
+ ∼ U(49006, 49178)
1070
+ 𝑡peak,2
1071
+ ∼ U(58450, 58650)
1072
+ log[𝜏]
1073
+ ∼ U(0, log[50])
1074
+ log[𝐹X,max]
1075
+ ∼ U(log[5 × 10−13], log[4 × 10−11])
1076
+ 10
1077
+ 40
1078
+ 10
1079
+ 42
1080
+ 10
1081
+ 44
1082
+ LX [erg s
1083
+ 1]
1084
+ 59560
1085
+ 59580
1086
+ 59600
1087
+ 59620
1088
+ 59640
1089
+ MJD
1090
+ 10
1091
+ 16
1092
+ 10
1093
+ 14
1094
+ 10
1095
+ 12
1096
+ FX [erg s
1097
+ 1 cm
1098
+ 2]
1099
+ Figure C1. Inferred full outburst (red) for the flaring observed by eROSITA
1100
+ in 2022, assuming the model described in equation C1. The markers follow
1101
+ the same legend as for Fig. 1. The darker and lighter shaded red bands enclose
1102
+ the inner 68% and 98% of the posterior.
1103
+ lightcurve may have had an extended plateau phase prior to the
1104
+ eROSITA detection (so our estimated fluence and accreted mass
1105
+ would be underestimated).
1106
+ However, if the 2022 outburst does evolve relatively closely to the
1107
+ functional form in equation C1, then it may be reasonable to consider
1108
+ that the rise timescale for the flare in 1993 is similar to that observed
1109
+ in 2022 (under a tidal disruption scenario), due to the approximately
1110
+ constant eccentricity of the stellar remnant after repeated partial
1111
+ disruptions (Antonini et al. 2011), and the weak dependence of the
1112
+ period of the most bound debris on the stellar mass (Hayasaki et al.
1113
+ 2013).
1114
+ APPENDIX D: ADDITIONAL X-RAY INFORMATION
1115
+ The BXA fitted model to the eRASS5 spectrum is shown in Fig. D1,
1116
+ and the eRASS5 lightcurve is shown in Fig. D2. The NICER count
1117
+ rate lightcurve is plotted in Fig. D3, whilst the full X-ray lightcurve of
1118
+ J1331 is presented in Table D1. A comparison of the X-ray lightcurve
1119
+ of J1331 with other nuclear transients is presented in Fig D4.
1120
+ APPENDIX E: ADDITIONAL PHOTOMETRIC
1121
+ INFORMATION
1122
+ Table E1 contains the Swift UVOT aperture photometry of the host
1123
+ galaxy of J1331, whilst Fig. E1 shows the long term ATLAS and
1124
+ NEOWISE lightcurves of J1331.
1125
+ This paper has been typeset from a TEX/LATEX file prepared by the author.
1126
+ MNRAS 000, 1–9 (2015)
1127
+
1128
+ 10
1129
+ Adam Malyali et al.
1130
+ Table D1. X-ray lightcurve table for J1331. The fluxes from the ROSAT
1131
+ pointed observations were derived from Hampel et al. (2022). The first four
1132
+ eROSITA observations listed, between MJD 58868 and 59419, are upper
1133
+ limits estimated from eRASS1, 2, 3 and 4, respectively; eROSITA fluxes
1134
+ outside of this window have been computed from the individual visits within
1135
+ eRASS5.
1136
+ MJD
1137
+ Observation
1138
+ 𝐹0.2−2keV,obs
1139
+ 𝐹0.2−2keV,unabs
1140
+ [10−13 erg cm−2 s−1]
1141
+ [10−13 erg cm−2 s−1]
1142
+ 48260.000
1143
+ ROSAT/ RASS
1144
+ < 2.9
1145
+ < 4.5
1146
+ 48844.598
1147
+ ROSAT/ Pointed
1148
+ < 0.2
1149
+ < 0.4
1150
+ 49006.094
1151
+ ROSAT/ Pointed
1152
+ < 1.2
1153
+ < 1.9
1154
+ 49012.146
1155
+ ROSAT/ Pointed
1156
+ 6.1 ± 0.7
1157
+ 9.4 ± 1.0
1158
+ 49012.180
1159
+ ROSAT/ Pointed
1160
+ 8.9 ± 1.9
1161
+ 13.8 ± 2.9
1162
+ 49013.591
1163
+ ROSAT/ Pointed
1164
+ 10.0 ± 1.1
1165
+ 15.5 ± 1.7
1166
+ 49178.555
1167
+ ROSAT/ Pointed
1168
+ < 0.7
1169
+ < 1.0
1170
+ 49178.766
1171
+ ROSAT/ Pointed
1172
+ < 0.3
1173
+ < 0.5
1174
+ 53745.291
1175
+ XMM/ Slew
1176
+ < 3.8
1177
+ < 5.9
1178
+ 57056.039
1179
+ XMM/ Slew
1180
+ < 5.4
1181
+ < 8.3
1182
+ 57241.869
1183
+ XMM/ Slew
1184
+ < 8.3
1185
+ < 12.8
1186
+ 58226.719
1187
+ Swift/ XRT
1188
+ < 0.9
1189
+ < 1.4
1190
+ 58230.707
1191
+ Swift/ XRT
1192
+ < 0.5
1193
+ < 0.8
1194
+ 58234.028
1195
+ Swift/ XRT
1196
+ < 0.8
1197
+ < 1.2
1198
+ 58868.114
1199
+ SRG/ eROSITA
1200
+ < 0.3
1201
+ < 0.4
1202
+ 59051.625
1203
+ SRG/ eROSITA
1204
+ < 0.5
1205
+ < 0.7
1206
+ 59229.875
1207
+ SRG/ eROSITA
1208
+ < 1.3
1209
+ < 1.7
1210
+ 59418.532
1211
+ SRG/ eROSITA
1212
+ < 0.5
1213
+ < 0.7
1214
+ 59599.448
1215
+ SRG/ eROSITA
1216
+ 10.8 ± 8.0
1217
+ 14.4 ± 10.6
1218
+ 59599.614
1219
+ SRG/ eROSITA
1220
+ 3.4 ± 1.7
1221
+ 4.6 ± 2.2
1222
+ 59599.781
1223
+ SRG/ eROSITA
1224
+ 5.7 ± 1.5
1225
+ 7.7 ± 2.0
1226
+ 59599.948
1227
+ SRG/ eROSITA
1228
+ 4.9 ± 1.2
1229
+ 6.5 ± 1.6
1230
+ 59600.114
1231
+ SRG/ eROSITA
1232
+ 5.1 ± 1.3
1233
+ 6.9 ± 1.7
1234
+ 59600.281
1235
+ SRG/ eROSITA
1236
+ 2.6 ± 1.1
1237
+ 3.5 ± 1.5
1238
+ 59600.448
1239
+ SRG/ eROSITA
1240
+ 9.0 ± 2.4
1241
+ 12.0 ± 3.2
1242
+ 59600.614
1243
+ SRG/ eROSITA
1244
+ 6.4 ± 3.5
1245
+ 8.5 ± 4.6
1246
+ 59604.892
1247
+ NICER/ XTI
1248
+ <8.6
1249
+ <13.8
1250
+ 59605.566
1251
+ NICER/ XTI
1252
+ <10.3
1253
+ <16.6
1254
+ 59606.082
1255
+ NICER/ XTI
1256
+ <9.5
1257
+ <15.3
1258
+ 59607.533
1259
+ NICER/ XTI
1260
+ <7.7
1261
+ <12.3
1262
+ 59608.280
1263
+ NICER/ XTI
1264
+ <6.6
1265
+ <10.6
1266
+ 59609.473
1267
+ NICER/ XTI
1268
+ <6.3
1269
+ <10.1
1270
+ 59610.119
1271
+ NICER/ XTI
1272
+ <7.3
1273
+ <11.7
1274
+ 59611.432
1275
+ NICER/ XTI
1276
+ <6.5
1277
+ <10.4
1278
+ 59612.210
1279
+ NICER/ XTI
1280
+ <8.1
1281
+ <13.0
1282
+ 59613.305
1283
+ NICER/ XTI
1284
+ <7.6
1285
+ <12.3
1286
+ 59614.210
1287
+ NICER/ XTI
1288
+ <8.1
1289
+ <13.1
1290
+ 59615.500
1291
+ NICER/ XTI
1292
+ <6.9
1293
+ <11.1
1294
+ 59616.889
1295
+ NICER/ XTI
1296
+ <6.2
1297
+ <10.0
1298
+ 59617.287
1299
+ XMM/ Pointed
1300
+ < 0.1
1301
+ < 0.2
1302
+ 59617.598
1303
+ NICER/ XTI
1304
+ <5.5
1305
+ <8.8
1306
+ 59618.630
1307
+ NICER/ XTI
1308
+ <5.5
1309
+ <8.8
1310
+ 59619.666
1311
+ NICER/ XTI
1312
+ <5.6
1313
+ <9.0
1314
+ 59620.463
1315
+ NICER/ XTI
1316
+ <5.8
1317
+ <9.4
1318
+ 59621.229
1319
+ NICER/ XTI
1320
+ <9.5
1321
+ <15.3
1322
+ 59622.488
1323
+ NICER/ XTI
1324
+ <9.8
1325
+ <15.8
1326
+ 59623.102
1327
+ NICER/ XTI
1328
+ <12.2
1329
+ <19.6
1330
+ 59624.362
1331
+ NICER/ XTI
1332
+ <6.5
1333
+ <10.5
1334
+ 59638.031
1335
+ Swift/ XRT
1336
+ < 0.8
1337
+ < 1.4
1338
+ 59766.375
1339
+ Swift/ XRT
1340
+ < 0.7
1341
+ < 1.2
1342
+ 59773.061
1343
+ Swift/ XRT
1344
+ < 24.6
1345
+ < 43.7
1346
+ 59774.292
1347
+ Swift/ XRT
1348
+ < 2.2
1349
+ < 3.9
1350
+ 59778.974
1351
+ Swift/ XRT
1352
+ < 0.8
1353
+ < 1.4
1354
+ 59780.760
1355
+ Swift/ XRT
1356
+ < 0.8
1357
+ < 1.5
1358
+ 59787.468
1359
+ Swift/ XRT
1360
+ < 0.8
1361
+ < 1.4
1362
+ 59794.352
1363
+ Swift/ XRT
1364
+ < 0.8
1365
+ < 1.4
1366
+ 59797.916
1367
+ XMM/ Pointed
1368
+ < 0.06
1369
+ < 0.10
1370
+ 59801.282
1371
+ Swift/ XRT
1372
+ < 0.5
1373
+ < 1.0
1374
+ 59808.180
1375
+ Swift/ XRT
1376
+ < 0.9
1377
+ < 1.6
1378
+ 59815.534
1379
+ Swift/ XRT
1380
+ < 0.8
1381
+ < 1.4
1382
+ 10
1383
+ 3
1384
+ 10
1385
+ 2
1386
+ 10
1387
+ 1
1388
+ 10
1389
+ 0
1390
+ 10
1391
+ 1
1392
+ TDE rate, [30 yr
1393
+ 1 gal
1394
+ 1]
1395
+ 10
1396
+ 6
1397
+ 10
1398
+ 4
1399
+ 10
1400
+ 2
1401
+ p(N
1402
+ 2)| )
1403
+ = 0.01
1404
+ = 0.05
1405
+ = 0.15
1406
+ = 0.003
1407
+ Figure C2. Poisson probability of 𝑁 ≥ 2 TDEs occurring within a 30 year
1408
+ period for a given galaxy. The red dotted lines mark the estimated probability
1409
+ for current theoretical estimates for TDE rates (10−4 yr−1 gal−1; Stone et al.
1410
+ 2020). The grey dashed lines mark out the TDE rates of 0.15, 0.05 and 0.01
1411
+ per
1412
+ 30 yr−1 gal−1, required to produce probabilities of 0.01, 0.001, and
1413
+ 0.0001, respectively.
1414
+ 0.3
1415
+ 1.0
1416
+ 2.0
1417
+ 5.0
1418
+ Energy [keV]
1419
+ 10
1420
+ 4
1421
+ 10
1422
+ 2
1423
+ 100
1424
+ Counts s
1425
+ 1 keV
1426
+ 1
1427
+ Figure D1. BXA fit of a tbabs*zbbody model to the eRASS5 spectrum.
1428
+ The solid red line represents the median model fit, whilst the shaded red
1429
+ region encloses the inner 98% of the credible region. The X-ray spectrum is
1430
+ ultra-soft with 𝑘𝑇 = 0.115+0.007
1431
+ −0.007 keV.
1432
+ Table E1. Swift UVM2 photometry of the host galaxy of J1331.
1433
+ MJD
1434
+ Magnitude
1435
+ 58226.727
1436
+ 23.1 ±1.0
1437
+ 58230.747
1438
+ 22.9 ±0.6
1439
+ 58234.068
1440
+ 22.3 ±0.4
1441
+ 59638.032
1442
+ 22.2 ±0.3
1443
+ 59766.376
1444
+ 23.0 ±0.7
1445
+ 59774.294
1446
+ 22.8 ±1.0
1447
+ 59778.975
1448
+ 22.5 ±0.6
1449
+ 59780.762
1450
+ 22.9 ±0.8
1451
+ 59794.353
1452
+ 22.7 ±0.6
1453
+ 59801.283
1454
+ 22.5 ±0.4
1455
+ 59808.181
1456
+ 22.8 ±0.6
1457
+ 59815.535
1458
+ 22.5 ±0.5
1459
+ MNRAS 000, 1–9 (2015)
1460
+
1461
+ Repeated partial tidal disruption flares from a quiescent galaxy
1462
+ 11
1463
+ 0
1464
+ 5
1465
+ 10
1466
+ 15
1467
+ 20
1468
+ 25
1469
+ 30
1470
+ t
1471
+ teRASS5, 0 [hr]
1472
+ 10
1473
+ 3
1474
+ 10
1475
+ 2
1476
+ 10
1477
+ 1
1478
+ 10
1479
+ 0
1480
+ Rate [cts/s]
1481
+ Figure D2. 0.2–2 keV band eRASS5 lightcurve of J1331. The blue and grey
1482
+ markers denote the inferred source and background count rates in the source
1483
+ aperture, respectively. Times are measured relative to the start of the earliest
1484
+ observation of J1331 in eRASS5, 𝑡eRASS5,0. J1331 is clearly detected above
1485
+ background in each visit.
1486
+ 59605
1487
+ 59610
1488
+ 59615
1489
+ 59620
1490
+ 59625
1491
+ MJD - 0
1492
+ 0.0
1493
+ 0.2
1494
+ 0.4
1495
+ 0.6
1496
+ 0.8
1497
+ 1.0
1498
+ Rate 0.4-2.0 keV [cts s
1499
+ 1]
1500
+ 3C50 background
1501
+ Total
1502
+ Figure D3. NICER count rate lightcurve in the 0.4-2 keV band, with blue
1503
+ markers denoting the total observed count rate (source and background), and
1504
+ grey markers representing the estimated background rate inferred using the
1505
+ 3C50 background model (Remillard et al. 2022). The system is not detected
1506
+ at 2𝜎 above background in each NICER OBSID.
1507
+ 10
1508
+ 2
1509
+ 10
1510
+ 1
1511
+ 10
1512
+ 0
1513
+ 10
1514
+ 1
1515
+ 10
1516
+ 2
1517
+ 10
1518
+ 3
1519
+ t
1520
+ tpeak [days]
1521
+ 10
1522
+ 40
1523
+ 10
1524
+ 41
1525
+ 10
1526
+ 42
1527
+ 10
1528
+ 43
1529
+ 10
1530
+ 44
1531
+ LX [erg s
1532
+ 1]
1533
+ Figure D4. Comparison of the 0.2–2 keV X-ray lightcurve evolution of J1331
1534
+ (red markers) with other soft nuclear transients from quiescent galaxies (or
1535
+ those recently hosting low luminosity AGN). J1331 decays in 𝐿X over longer
1536
+ timescales than QPEs (orange for eROQPE1; Arcodia et al. 2021), but still
1537
+ over much shorter timescales than previously reported TDEs in the literature,
1538
+ such as ASAS-SN 14li (grey, Bright et al. 2018), AT 2019azh decay phase
1539
+ (blue, Hinkle et al. 2020), AT 2019dsg (pink, Cannizzaro et al. 2021). The
1540
+ 𝑡peak for J1331 was set to MJD=59592.9, following the assumptions described
1541
+ in Section C.
1542
+ MNRAS 000, 1–9 (2015)
1543
+
1544
+ 12
1545
+ Adam Malyali et al.
1546
+ 57500
1547
+ 58000
1548
+ 58500
1549
+ 59000
1550
+ 59500
1551
+ MJD
1552
+ 50
1553
+ 0
1554
+ 50
1555
+ 100
1556
+ 150
1557
+ 200
1558
+ F [Jy]
1559
+ ATLAS o
1560
+ ATLAS c
1561
+ 57000
1562
+ 57500
1563
+ 58000
1564
+ 58500
1565
+ 59000
1566
+ 59500
1567
+ MJD
1568
+ 13.8
1569
+ 14.0
1570
+ 14.2
1571
+ 14.4
1572
+ 14.6
1573
+ Vega Magnitude
1574
+ W1
1575
+ W2
1576
+ Figure E1. No major variability is seen within the ATLAS forced photometry
1577
+ generated on the difference imaging (top), nor within the NEOWISE lightcurve
1578
+ (bottom).
1579
+ MNRAS 000, 1–9 (2015)
1580
+
5NE5T4oBgHgl3EQfPA41/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
6dE1T4oBgHgl3EQf7AUK/content/tmp_files/2301.03528v1.pdf.txt ADDED
@@ -0,0 +1,717 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Multi-point Padè for the study of phase transitions: from
2
+ the Ising model to lattice QCD
3
+ Francesco Di Renzo∗ and Simran Singh
4
+ Dipartimento di Scienze Matematiche, Fisiche e Informatiche, Università di Parma
5
+ and INFN, Gruppo Collegato di Parma, I-43100, Parma, Italy
6
7
+ The Bielefeld Parma collaboration has recently put forward a method to investigate the QCD phase
8
+ diagram based on the computation of Taylor series coefficients at both zero and imaginary values
9
+ of the baryonic chemical potential. The method is based on the computation of multi-point Padé
10
+ approximants. We review the methodological aspects of the computation and, in order to gain
11
+ confidence in the approach, we report on the application of the method to the two-dimensional
12
+ Ising model (probably the most popular arena for testing tools in the study of phase transitions).
13
+ Besides showing the effectiveness of the multi-point Padé approach, we discuss what these results
14
+ can suggest in view of further progress in the study of the QCD phase diagram. We finally report
15
+ on very preliminary results in which we look for Padé approximants at different temperatures and
16
+ fixed values of the (imaginary) baryonic chemical potential.
17
+ The 39th International Symposium on Lattice Field Theory (Lattice2022),
18
+ 8-13 August, 2022
19
+ Bonn, Germany
20
+ ∗Speaker
21
+ © Copyright owned by the author(s) under the terms of the Creative Commons
22
+ Attribution-NonCommercial-NoDerivatives 4.0 International License (CC BY-NC-ND 4.0).
23
+ https://pos.sissa.it/
24
+ arXiv:2301.03528v1 [hep-lat] 9 Jan 2023
25
+
26
+ Multi-point Padè for the study of phase transitions
27
+ Francesco Di Renzo
28
+ 1.
29
+ How it all began: from Taylor expansions on thimbles to imaginary 𝜇𝐵 LQCD
30
+ The QCD phase diagram is still to a large extent elusive: in particular, due to the so-called sign
31
+ problem, the lattice (the non-perturbative tool which would be supposed to provide valuable insight)
32
+ cannot probe the relevant regions in the 𝑇 − 𝜇𝐵 (Temperature-baryonic chemical potential) plane.
33
+ In the last couple of years, the Bielefeld-Parma collaboration put forward a method to compute
34
+ finite-density QCD thermodynamic observables in the region to which access would be precluded
35
+ by the sign problem; this approach is also able to probe the singualrity structure of the theory in the
36
+ complex 𝜇𝐵 plane [1–4]. The method is based on the computation of Taylor series coefficients at
37
+ both zero and imaginary values of the baryonic chemical potential, which enables the computation
38
+ of multi-point Padé approximants. This work aims to assess the effectiveness of the method by
39
+ making use of it in the context of a very standard playground for the physics of phase transitions (e.g.
40
+ the 2d Ising model). At the same time, we present (very) preliminary results on new applications
41
+ in the context of finite-density QCD.
42
+ Before entering the main subject, it is useful to recall when the idea of applying multi-point
43
+ Padé rational approximants first came to our mind; that was in the context of thimble regularisation.
44
+ The latter [5, 6] was introduced to solve (or at least tame) the sign problem by re-expressing the
45
+ path integral as a sum of integrals computed on manifolds different from the original one. After
46
+ complexifying the degrees of freedom, one considers the so-called Lefschetz thimbles, i.e. the
47
+ manifolds that are the union of the steepest ascent paths stemming from the various stationary
48
+ points of the action. On such manifolds the imaginary part of the action stays constant, so that
49
+ the sign problem reduces to the so-called residual phase which is there due to the Jacobian of
50
+ the change of variables. There is a thimble attached to each stationary point and in principle all
51
+ can give a contribution to the path integral. This is referred to as the thimble decomposition. To
52
+ make a long story short, we recall that (a) not all the thimbles give a non-null contribution, (b)
53
+ this picture changes in different regions of the parameters space of the theory (i.e. a given thimble
54
+ can contribute to the path integral in a region and not in another one) and (c) there are cases in
55
+ which a single thimble (usually the so called dominant one, attached to the stationary point with
56
+ the lowest action) is enough to compute the answer one is interested in. The latter observation
57
+ gave raise to the single thimble dominance hypothesis, which was shown to hold in a few cases,
58
+ but failed in others. The first example of a failure was provided by the 1-D Thirring model [7, 8],
59
+ where it was clearly shown that a single thimble is not enough to account for the known analytic
60
+ result. It is nevertheless important to remark that there are regions in which one single thimble is
61
+ enough, and this was the logical starting point for the success of a computation based on multi-point
62
+ Padé rational approximants. The success of such approach [9] can be recognised in Fig. 1. On
63
+ the left, we display the known analytic result for the chiral condensate ¯𝜒𝜒 of the 1-D Thirring
64
+ model (𝐿 = 8, 𝑚 = 1, 𝛽 = 1) at various values of the chemical potential by mass ratio 𝜇
65
+ 𝑚. This
66
+ is plotted together with the numerical results which we got: triangles are results computed on one
67
+ single thimble at points where we are able to show that this is enough; dots are results taken from
68
+ the multi-point Padé method that we will better describe in the next section. Here it is enough to
69
+ say that a few Taylor expansion coefficients were computed at the points marked by triangles and
70
+ from those the multi-point Padé approximant was computed. The right panel of the figure shows
71
+ 2
72
+
73
+ Multi-point Padè for the study of phase transitions
74
+ Francesco Di Renzo
75
+ how the singularity pattern of the solution was reconstructed: the rational approximant displayed a
76
+ singularity which falls on top of the analytic one. Convergence radii of the Taylor expansions we
77
+ computed can be spotted, showing that there is an intersection of convergence disks, validating the
78
+ procedure of bridging the two regions where we were able to compute single thimble results: all in
79
+ all, while the thimble decomposition is discontinuous, the physical observable is not. The figure
80
+ refers to a given choice of lattice size, mass and 𝛽-value; we were able to show [10] that the method
81
+ can successfully account for the extraction of the continuum limit.
82
+ μ. We can obtain a dimensionless quantity by taking the
83
+ ratio μ
84
+ m ¼ ˆμ
85
+ ˆm. Since the analytic result is known, the single
86
+ thimble approximation was shown not to account for the
87
+ correct result on the entire μ
88
+ m axis. In our new approach the
89
+ problem is solved and in Fig. 2 we display the essential
90
+ features of our results: as an example, we show results for
91
+ the chiral condensate h¯χχi (parameters are L ¼ 8, β ¼ 1,
92
+ m ¼ 2). We can argue that all the requirements of the
93
+ program that we sketched above can be met. There is a
94
+ preliminary point we have to make. For real β a Stokes
95
+ phenomenon is potentially present up to a given value of μ
96
+ m:
97
+ this involves the dominant thimble pσ0 and another critical
98
+ point. We denote the latter pσ¯0, following the notation of
99
+ [19]. The problem can be easily solved by adding a small
100
+ imaginary part to β: in this way a Stokes phenomenon does
101
+ not take place, a thimble decomposition is in place and
102
+ while pσ¯0 could in principle give a contribution to the
103
+ result, this is de facto negligible due to the huge difference
104
+ SRðpσ¯0Þ ≫ SRðpσ0Þ. This solves the problem and any
105
+ further reference to this point will be omitted in the
106
+ following.
107
+ (1) A first value of
108
+ μ
109
+ m for which only the dominant
110
+ thimble pσ0 accounts for the correct result can be
111
+ found in a very fundamental, yet simple way. The
112
+ range of values SI can take on the real axis depends
113
+ on the values of ˆμ and ˆm and, below a given value of
114
+ μ
115
+ m, this range is limited. By explicit computation of
116
+ the SðσÞ
117
+ I ðμ
118
+ mÞ we can show that no unstable thimble
119
+ associated to a critical point pσ other that the
120
+ dominant one can intersect the original domain of
121
+ integration below a given value μ0
122
+ m.7 Thus for μ
123
+ m < μ0
124
+ m
125
+ we can easily select a first point at which the
126
+ dominant thimble provides the only contribution
127
+ to the result. We picked μ
128
+ m ¼ 0.4 and computed the
129
+ Taylor expansion up to the second derivative.
130
+ We now need to find a second value of μ
131
+ m at which
132
+ the dominant thimble accounts for the complete
133
+ result and compute the Taylor expansion on it. In
134
+ principle we could study the crossing mechanism
135
+ between the different curves SðσÞ
136
+ I ðμ
137
+ mÞ (see subsec-
138
+ tion II B). In practice there is a much simpler way to
139
+ proceed. First of all, we point out that the asymptotic
140
+ value of h¯χχi is known: for large enough values of μ
141
+ the chiral condensate is zero. We notice that for μ
142
+ m ¼
143
+ 1.4 the value of h¯χχi computed on the dominant
144
+ thimble is very close to zero. By inspecting the
145
+ values of SRðpσÞ for thimbles other than the funda-
146
+ mental one, we find that, for μ
147
+ m ¼ 1.4, SRðpσÞ ≫
148
+ SRðpσ0Þ for all the critical points but three, that we
149
+ denote σ1, σ¯1, σ¯2.8 Two of them (σ¯1 and σ¯2) have
150
+ values of the real action which are lower than Smin,
151
+ which is the minimum value SR takes on the original
152
+ domain of integration: because of this, the unstable
153
+ thimbles associated to them can’t intersect the
154
+ original domain of integration. As for σ1, in this
155
+ simple model it does not take that much to show that
156
+ the unstable thimble attached to it does not intersect
157
+ the original domain of integration (see the left panel
158
+ of Fig. 2). We conclude that the dominant thimble σ0
159
+ can account for the complete result at this value of μ
160
+ m.
161
+ We have thus selected the second point we were
162
+ looking for; at this point the series has been
163
+ computed up to the fifth derivative. One might
164
+ object that we made use of the explicit query for
165
+ intersections between the original domain of inte-
166
+ gration and a given unstable thimble, which thing is
167
+ FIG. 2.
168
+ (Left panel) The flow lines highlighting the thimbles structure of the 1-dim Thirring model at μ
169
+ m ¼ 1.4: stable thimbles are
170
+ depicted in blue, unstable thimbles in magenta. The dominant thimble is associated to the critical point sitting at ℜðzÞ ¼ 0. The critical
171
+ point σ1 is the closest to the latter to the right (there is a mirror image to the left as well): notice that the unstable thimble associated to it
172
+ does not intersect the original domain of integration (which is on the real axis). (Center panel) The chiral condensate as obtained from
173
+ the analytic solution (continuous black line) and from our Pad´e approximant (we plot points instead of a continuum line so that the size
174
+ of errors are easier to spot.). The points providing input to the evaluation of Pad´e are marked as triangles. (Right panel) Singularity of the
175
+ solution in the complex plane: red point computed from the analytic solution, green point is the only pole of our Pad´e approximant. We
176
+ plot the radii of convergence which are relevant for the expansions at hand: our analytic continuation indeed stands on firm ground.
177
+ 7The value of ˆm is held fixed.
178
+ 8We once again adhere to the notation of [19].
179
+ F. DI RENZO, S. SINGH, and K. ZAMBELLO
180
+ PHYS. REV. D 103, 034513 (2021)
181
+ 034513-6
182
+ Figure 1: Left panel: (continuum line) analytic solution for the condensate ¯𝜒𝜒 of the 1-D Thirring model
183
+ (𝐿 = 8, 𝑚 = 1, 𝛽 = 1) at various values of the chemical potential by mass ratio 𝜇
184
+ 𝑚; (triangles) numerical
185
+ results obtained on one single thimble; (dots) numerical results taken from the rational approximant. Right
186
+ panel: we plot in the complex 𝜇
187
+ 𝑚 plane the singularity we got from the rational approximant; it is depicted
188
+ on top of the known analytic one.
189
+ 2.
190
+ Multi-point Padè method for finite density Lattice QCD
191
+ 2.1 Basics of the multi-point Padè method
192
+ Suppose we know a few Taylor expansion coefficients of a given function 𝑓 (𝑧) at different
193
+ points {𝑧𝑘 | 𝑘 = 1 . . . 𝑁}. The basic idea of our multi-point Padé approach is to approximate 𝑓 (𝑧)
194
+ by a rational function 𝑅𝑚
195
+ 𝑛 (𝑧), which we call a [𝑚/𝑛] Padé approximant
196
+ 𝑅𝑚
197
+ 𝑛 (𝑧) = 𝑃𝑚(𝑧)
198
+ ˜𝑄𝑛(𝑧)
199
+ =
200
+ 𝑃𝑚(𝑧)
201
+ 1 + 𝑄𝑛(𝑧) =
202
+ 𝑚�
203
+ 𝑖=0
204
+ 𝑎𝑖 𝑧𝑖
205
+ 1 +
206
+ 𝑛�
207
+ 𝑗=1
208
+ 𝑏 𝑗 𝑧 𝑗
209
+ .
210
+ (1)
211
+ 𝑅𝑚
212
+ 𝑛 (𝑧) (i.e. the 𝑎𝑖, 𝑏 𝑗 coefficients defining it) can be fixed by requiring that it reproduces the values
213
+ of 𝑓 and a few of its derivatives at the given points {𝑧𝑘}. Provided that 𝑛 + 𝑚 + 1 = 𝑁𝑠 ( 𝑓 (𝑠−1)
214
+ being the highest order derivative we computed at each point), this is possible by requiring that
215
+ . . .
216
+ 𝑃𝑚(𝑧𝑘) − 𝑓 (𝑧𝑘)𝑄𝑛(𝑧𝑘) = 𝑓 (𝑧𝑘)
217
+ 𝑃′
218
+ 𝑚(𝑧𝑘) − 𝑓 ′(𝑧𝑘)𝑄𝑛(𝑧𝑘) − 𝑓 (𝑧𝑘)𝑄′
219
+ 𝑛(𝑧𝑘) = 𝑓 ′(𝑧𝑘)
220
+ . . .
221
+ (2)
222
+ 3
223
+
224
+ 0.6
225
+ 1.0
226
+ 3.0/
227
+ 0.5
228
+ 2.0
229
+ 0.4
230
+ 0.5
231
+ 0.3
232
+ 21.0
233
+ m
234
+ 0.2
235
+ 0.0
236
+ 0.0
237
+ 0.1
238
+ 0.0
239
+ -0.5
240
+ -1.0
241
+ -0.1
242
+ 2.0
243
+ -0.2
244
+ -1.0
245
+ 3.0
246
+ -2.0
247
+ -1.0
248
+ 0.0
249
+ 1.0
250
+ 2.0
251
+ 3.0
252
+ 0.0
253
+ 0.5
254
+ 1.0
255
+ 1.5
256
+ 2.0
257
+ 1.0
258
+ -0.5
259
+ 0.0
260
+ 0.5
261
+ 1.0
262
+ 1.5
263
+ 2.0
264
+ Re z
265
+ μ/m
266
+ Re (μ / m)Multi-point Padè for the study of phase transitions
267
+ Francesco Di Renzo
268
+ In Eq. (2) we only wrote 2 out of 𝑠 equations for 1 out of 𝑁 points. It should be clear what the
269
+ overall problem amounts to: we have to solve a linear system, the unknowns being the {𝑎𝑖, 𝑏 𝑗 | 𝑖 =
270
+ 1 . . . 𝑚, 𝑗 = 1 . . . 𝑛}. This is not the only possible way to solve for 𝑅𝑚
271
+ 𝑛 (𝑧), but for the purpose of
272
+ understanding our approach it suffices (the interested reader can refer to [4] for other alternatives1).
273
+ It should be clear that
274
+ • Not only 𝑅𝑚
275
+ 𝑛 (𝑧) can reproduce our input pieces of information; by a natural analytic continu-
276
+ ation it can predict values of 𝑓 in an extended region (to the extent we do not exit the region
277
+ in which the approximation holds, which thing of course deserves care of its own): left panel
278
+ of Fig. 1 is an example.
279
+ • When a zero in the denominator of 𝑅𝑚
280
+ 𝑛 (𝑧) is not canceled by a corresponding zero of the
281
+ numerator, we face a singularity of the rational approximation, which is supposed to teach us
282
+ something on the singularity structure of 𝑓 ; quite obviously, singularities live in the complex
283
+ 𝑧 plane: right panel of Fig. 1 is an example.
284
+ 2.2 First application of the multi-point Padè method to finite density LQCD
285
+ In [4] the Bielefeld Parma collaboration applied the multi-point Padè method to finite density
286
+ LQCD. In the example of section 1 we did not have a way to safely compute the 1D Thirring
287
+ condensate in regions where more than one thimble give a contribution; on the other hand, we
288
+ could safely compute (on a single thimble) at given values of 𝜇
289
+ 𝑚. This is the same as in LQCD:
290
+ the sign problem does not allow us to compute observables at real values of the baryonic chemical
291
+ potential 𝜇𝐵, but computations are safe at 𝜇𝐵 = 0 and at imaginary values of 𝜇𝐵 (in particular, we
292
+ can compute a few orders of the Taylor expansion of an observable). For (2+1)-flavor of highly
293
+ improved staggered quarks (HISQ) [11] with imaginary chemical potential, we computed cumulants
294
+ of the net baryon number density, given as
295
+ 𝜒𝑛𝐵(𝑇,𝑉, 𝜇𝐵) =
296
+ � 𝜕
297
+ 𝜕 ˆ𝜇𝐵
298
+ �𝑛 ln 𝑍(𝑇,𝑉, 𝜇𝑙, 𝜇𝑠)
299
+ 𝑉𝑇3
300
+ ,
301
+ (3)
302
+ with ˆ𝜇𝐵 = 𝜇𝐵/𝑇 and 𝑙, 𝑠 referring to light and strange flavors. Dependence on masses is not made
303
+ explicit: the light to strange ratio is the physical one. By computing at different imaginary values of
304
+ ˆ𝜇𝐵 (including ˆ𝜇𝐵 = 0) we could implement the program of subsection 2.1. Fig. 2 is the counterpart
305
+ of Fig. 1. We point out that
306
+ • In the left panel we can see how well the rational approximants for the number density 𝜒1𝐵
307
+ describe data at different temperatures. Actually we show two different rational approximants
308
+ (enforcing parity or not): they are both fine. The big spike is expected to be there: it is related
309
+ to the Roberge Weiss transition, and it occurs at the temperature which is supposed to be the
310
+ relevant one (𝑇𝑅𝑊 ). Minor spikes can be also spotted: they are harmless, and they can be
311
+ understood in terms of what we will explain in the next section (partial cancellation of zeros
312
+ between numerator and denominator).
313
+ 1Notice that this is the simplest setting also with respect to another point: there is no reason for strictly asking
314
+ knowledge of the same number of derivatives at each point.
315
+ 4
316
+
317
+ Multi-point Padè for the study of phase transitions
318
+ Francesco Di Renzo
319
+ 0
320
+ 1
321
+ 2
322
+ 3
323
+ 4
324
+ 5
325
+ Re[µB/T]
326
+ 0.0
327
+ 0.5
328
+ 1.0
329
+ 1.5
330
+ 2.0
331
+ 2.5
332
+ 3.0
333
+ 3.5
334
+ Im[µB/T]
335
+ ˆµLY
336
+ RW scaling
337
+ chiral scaling
338
+ CEP scaling
339
+ Figure 2: (Left panel) The number density 𝜒1𝐵 at various values of ˆ𝜇𝐵 and different temperatures 𝑇. Data
340
+ are shown together with two different rational approximants (enforcing parity or not): both describe data very
341
+ well. The big spike is expected: it is the hint for the Roberge Weiss transition. (Right panel) The singularity
342
+ pattern in the complex ˆ𝜇𝐵, highlighting their expected overall compliance with Roberge Weiss, chiral and
343
+ Critical End Point scaling.
344
+ • In the right panel we display the singularities we found at different temperatures, relating them
345
+ to the expected singularity scaling pattern. These are the expected Lee-Yang singularities:
346
+ one expects a given scaling for the singularities connected to the Roberge Weiss transition,
347
+ to the chiral transition and to the QCD Critical End Point. While the last two are still under
348
+ investigation2, one can clearly see a consistent picture for the Roberge Weiss scaling: indeed
349
+ in [4] we were able to show that it is the expected one.
350
+ All in all, results are intriguing. That’s why we now want to show that the machinery is under
351
+ control for the the most popular arena for testing tools in the study of phase transitions, i.e. the
352
+ two-dimensional Ising model.
353
+ 3.
354
+ Testing the method on the 2d Ising model
355
+ Lee-Yang theory is one of the possible approach to the study of phase transitions. For an
356
+ example of its application, we refer the interested reader to [12], where the authors study the 2d
357
+ Ising model. We will basically follow their program, but will not rely on the study of many different
358
+ cumulants (as they do). We will instead make use of our multi-point Padè method and study only
359
+ two different cumulants at different values of temperature and magnetic field. The hamiltonian is
360
+ the well-known one, based on interactions between nearest neighbours and with external magnetic
361
+ field ℎ
362
+ 𝐻 = −𝐽
363
+ ∑︁
364
+ <𝑖, 𝑗>
365
+ 𝜎𝑖𝜎𝑗 − ℎ
366
+ ∑︁
367
+ 𝑖
368
+ 𝜎𝑖
369
+ (4)
370
+ 2Indeed we now have an estimate for the CEP Temperature.
371
+ 5
372
+
373
+ RataprxST=167MeV
374
+ 0.8
375
+ RataprxNST=167MeV
376
+ RataprxST=186MeV
377
+ 0.6
378
+ RataprxNST=186MeV
379
+ RataprxSTRW
380
+ 0.4
381
+ RataprxNSTRW
382
+ Nt4T=167MeVdata
383
+ Nt4T=186MeVdata
384
+ 0.2
385
+ Nt4TRWdata
386
+ 0
387
+ -0.2
388
+ -0.4
389
+ -0.6
390
+ -0.8
391
+ 1
392
+ 0
393
+ 1
394
+ 2
395
+ 3
396
+ 4
397
+ 5
398
+ 6
399
+ Im[μg/T]Multi-point Padè for the study of phase transitions
400
+ Francesco Di Renzo
401
+ with the only possible values 𝜎𝑖 = ±1. In the following 𝐽 will be set to 𝐽 = 1. The partition function
402
+ can be written in terms of its zeros {𝛽𝑘}
403
+ 𝑍(𝛽, ℎ) = 𝑍(0, ℎ) 𝑒 𝛽𝑐 �
404
+ 𝑘
405
+ (1 − 𝛽
406
+ 𝛽𝑘
407
+ )
408
+ (5)
409
+ 𝑐 being a constant. If we define thermal cumulants by
410
+ ⟨⟨𝑈𝑛⟩⟩ =
411
+ 𝜕𝑛
412
+ 𝜕(−𝛽)𝑛 ln 𝑍(𝛽, ℎ)
413
+ it is easy to show that they can be expressed as
414
+ ⟨⟨𝑈𝑛⟩⟩ = (−1)(𝑛−1) ∑︁
415
+ 𝑘
416
+ (𝑛 − 1)!
417
+ (𝛽𝑘 − 𝛽)𝑛
418
+ (𝑛 > 1)
419
+ (6)
420
+ Furthermore, scaling relations describe the approach of leading zeros to critical inverse temperature
421
+ |𝛽0 − 𝛽𝑐| ∼ 𝐿−1/𝜈
422
+ Im(𝛽0) ∼ 𝐿−1/𝜈.
423
+ (7)
424
+ In Eq. (7) 𝛽0 is the Fisher zero, that is the closest zero of the partition function to the real axis,
425
+ resulting in the closest singularity of cumulants to the real axis3, 𝛽𝑐 is the critical inverse temperature
426
+ and 𝜈 is the relevant critical exponent.
427
+ Our program now entails four steps: (1) we compute the 𝑛 = 2 thermal cumulant (i.e. the specific
428
+ heat) at various inverse temperatures 𝛽 and lattice sizes 𝐿; (2) for each 𝐿 we compute the rational
429
+ approximant 𝑅𝑚
430
+ 𝑛 (𝛽) by our multi-point Padè method; (3) at each 𝐿 we find the Fisher zero 𝛽0, which
431
+ is obtained as the the closest singularity of the cumulant to the real axis; (4) we study the finite size
432
+ scaling of the values of 𝛽0. The result of the procedure can be inspected in Fig. 3.
433
+ Figure 3: (Left panel) The scaling in 1/𝐿 of Im(𝛽0), i.e. the imaginary part of the Fisher zero, detected as
434
+ that the closest singularity of the cumulant to the real axis. The correct critical exponent 𝜈 = 1 is got with
435
+ fairly good accuracy. (Right panel) Once 𝜈 has been recognised to be the right one, one can fit the value of
436
+ the critical inverse temperature 𝛽𝑐, which is reconstructed to per mille accuracy.
437
+ 3𝛽0 shows up together with its complex conjugate 𝛽∗
438
+ 0.
439
+ 6
440
+
441
+ V = 1.03(3)
442
+ 0.08
443
+ 0.07
444
+ 0.06
445
+ 0.05
446
+ Im(βo)
447
+ 0.04
448
+ 0.03
449
+ 0.02
450
+ 0.01
451
+ 0
452
+ 0
453
+ 0.02
454
+ 0.04
455
+ 0.06
456
+ 0.08
457
+ 0.1
458
+ 0.12
459
+ 1/Lβ。= 0.4405(5)
460
+ 0.45
461
+ 0.4
462
+ 0.35
463
+ 0.3
464
+ 0.25
465
+ 0.2
466
+ 0.15
467
+ 0.1
468
+ 0.05
469
+ 0
470
+ -0.05
471
+ 0
472
+ 0.02
473
+ 0.04
474
+ 0.06
475
+ 0.08
476
+ 0.1
477
+ 0.12
478
+ 1/ LMulti-point Padè for the study of phase transitions
479
+ Francesco Di Renzo
480
+ • In the left panel we display the scaling in 1/𝐿 of Im(𝛽0). Errors are computed by varying
481
+ results with respect to statistical errors for the cumulant and functional form for the rational
482
+ approximant. As one can see, the value of the relevant critical exponent 𝜈 = 1 is got with
483
+ fairly good accuracy (1.03(3)).
484
+ • Once 𝜈 = 1 has been recognised, we can fit the scaling of the real part Re(𝛽0) (right panel),
485
+ thus finding the value of the critical inverse temperature. We get the very accurate result
486
+ 𝛽𝑐 = 0.4405(5).
487
+ Once the critical inverse temperature is known, one can sit on top of it and study the scaling in 𝐿
488
+ of Im(ℎ0), ℎ0 being the Lee Yang zero, that is the closest singularity of a magnetic cumulant to
489
+ the real axis. Explicitly, our program again entails four steps: (1) we compute the 𝑛 = 1 magnetic
490
+ cumulant (i.e. the magnetisation) at 𝛽 = 𝛽𝑐 and various values of external magnetic field ℎ and
491
+ lattice size 𝐿; (2) for each 𝐿 we compute the rational approximant 𝑅𝑚
492
+ 𝑛 (ℎ) for the magnetisation by
493
+ our multi-point Padè method; (3) at each 𝐿 we find the Lee Yang zero ℎ0, which is the singularity
494
+ of the rational approximant for the magnetisation which is the closest to the real axis; (4) we study
495
+ the finite size scaling of the values of Im(ℎ0) (as we will see, ℎ0 always sits at Re(ℎ0) = 0).
496
+ Before we inspect this scaling behaviour, it is useful to have a closer look at the singularity pattern
497
+ in the complex ℎ plane at given values of 𝐿. In Fig 4 we depict the zeros of the numerator (blue
498
+ crosses) and of the denominator (red circles) of our 𝑅𝑚
499
+ 𝑛 (ℎ) at different values of the lattice size 𝐿,
500
+ i.e. 𝐿 = 15 (left panel) and 𝐿 = 30 (right panel). We can easily make a couple of key observations.
501
+ • A few zeros of the denominator are canceled by corresponding zeros of the numerator. These
502
+ are not genuine pieces of information: actually their location vary when varying e.g. the order
503
+ of the Padé approximant [𝑚, 𝑛]. On the other hand, genuine pieces of information (i.e. actual
504
+ zeros and poles) stay constant to a very good precision. Notice that this is the explanation for
505
+ the small spikes in Fig. 2: they are simply the shadow of cancellations which are indeed very
506
+ good, but not good enough to be invisible when plotting the rational approximant.
507
+ -0.1
508
+ 0
509
+ 0.1
510
+ 0.2
511
+ 0.3
512
+ 0.4
513
+ 0.5
514
+ 0.6
515
+ -0.2
516
+ -0.15
517
+ -0.1
518
+ -0.05
519
+ 0
520
+ 0.05
521
+ 0.1
522
+ 0.15
523
+ 0.2
524
+ -0.1
525
+ 0
526
+ 0.1
527
+ 0.2
528
+ 0.3
529
+ 0.4
530
+ 0.5
531
+ -0.2
532
+ -0.15
533
+ -0.1
534
+ -0.05
535
+ 0
536
+ 0.05
537
+ 0.1
538
+ 0.15
539
+ 0.2
540
+ Figure 4: (Left panel) Zeros of the numerator (blue crosses) and of the denominator (red circles) of the
541
+ rational approximant 𝑅𝑚
542
+ 𝑛 (ℎ) for the magnetisation on 𝐿 = 15 (left panel) and 𝐿 = 30 (right panel). We
543
+ highlight the closest singularity to the real axis, which is getting closer to the real axis itself as 𝐿 gets larger,
544
+ with real parts being Re(ℎ0) = 0. Plots are in the complex ℎ plane.
545
+ 7
546
+
547
+ Multi-point Padè for the study of phase transitions
548
+ Francesco Di Renzo
549
+ • We can clearly see that, as the lattice size 𝐿 gets larger, the closest singularity (Lee Yang
550
+ zero, highlighted in the plot) gets closer to the real axis, with real parts being Re(ℎ0) = 0.
551
+ Finally, in Fig. 5 we plot the finite size scaling of Im(ℎ0). As one can see, the critical exponent in
552
+ is got with very good accuracy (this time, less than percent: −1.880(16) vs −1.875). The steps we
553
+ could take in the (much simpler) case of the Ising model would be the preferred conceptual path to
554
+ follow also for LQCD. Needless to say, it will take time before we can be in a position to do that.
555
+ 4.
556
+ Back to LQCD: a T-Padé application
557
+ We finally go back to LQCD for a (very) preliminary account of a new application. Till now
558
+ we have seen multi-point Padè approximants from data taken at a given temperature 𝑇 and different
559
+ values of ˆ𝜇𝐵: with this we mean that we obtained different 𝑅𝑚
560
+ 𝑛 ( ˆ𝜇𝐵) at different 𝑇 values. With
561
+ the very same data, we can think of going the other way around, that is we can obtain 𝑅𝑚
562
+ 𝑛 (𝑇) at
563
+ different ˆ𝜇𝐵 values. Fig. 6 is an example of what we can get following this path. Of course, this
564
+ time singularities emerge in the complex 𝑇 plane.
565
+ 5.
566
+ Conclusions
567
+ The multi-point Padè method for the study of phase transitions has already proved to be quite
568
+ effective in the case of LQCD. Here we showed how the approach can provide very accurate results
569
+ when collecting a rich statistics is not such a hard numerical task (as it was the case for the 2d Ising
570
+ 0
571
+ 2
572
+ 4
573
+ 6
574
+ 8
575
+ 10
576
+ 12
577
+ 14
578
+ 16
579
+ 18
580
+ L1/8-2
581
+ 10-3
582
+ 0
583
+ 0.01
584
+ 0.02
585
+ 0.03
586
+ 0.04
587
+ 0.05
588
+ 0.06
589
+ Im(h0)
590
+ 1.880(16)
591
+ Figure 5: Finite size scaling of Im(ℎ0). To guide the eye, we plot data versus 𝐿1/8−2, where the correct
592
+ critical exponent is taken. As the figure title we report the absolute value of the one we got, which turns out
593
+ to be a very accurate estimate, to less than percent.
594
+ 8
595
+
596
+ Multi-point Padè for the study of phase transitions
597
+ Francesco Di Renzo
598
+ Figure 6: (Top-left panel) An example of 𝑅𝑚
599
+ 𝑛 (𝑇) for 𝜒1𝐵 at a given value of ˆ𝜇𝐵 on top of data taken at
600
+ different temperatures 𝑇 at the same given value of ˆ𝜇𝐵. (Top-right) Actual measurements of 𝜒1𝐵( ˆ𝜇𝐵) at a
601
+ given temperature 𝑇 plotted together with interpolating data obtained from 𝑅𝑚
602
+ 𝑛 (𝑇). Everything looks pretty
603
+ smooth; we plot in a different colour the only data point possibly not falling smoothly on top of actual data.
604
+ (Bottom-left) Zeros of denominator (red) and zeros of numerator (blue) of 𝑅𝑚
605
+ 𝑛 (𝑇) in the complex 𝑇 plane at
606
+ a low value of ˆ𝜇𝐵. (Bottom-right) The same plot at a value of ˆ𝜇𝐵 close to ˆ𝜇𝐵 = 𝑖𝜋 (𝑇 is expressed in GeV)
607
+ model). This is at same time a proof of concept of the reliability of the method and a stimulus to
608
+ do better in the case of finite density LQCD.
609
+ Acknowledgements
610
+ This work has received funding from the European Union’s Horizon 2020 research and inno-
611
+ vation programme under the Marie Skłodowska-Curie grant agreement No. 813942 (EuroPLEx).
612
+ We also acknowledge support from I.N.F.N. under the research project i.s. QCDLAT. This work
613
+ benefits from the HPC facility of the University of Parma, Italy.
614
+ References
615
+ [1] C. Schmidt, J. Goswami, G. Nicotra, F. Ziesché, P. Dimopoulos, F. Di Renzo et al.,
616
+ Net-baryon Number Fluctuations, Acta Physica Polonica B Proceedings Supplement 14
617
+ (2021) 241.
618
+ 9
619
+
620
+ 0.4
621
+ 0.35
622
+ 0.3
623
+ 0.25
624
+ B
625
+ Im(X1
626
+ 0.2
627
+ 0.15
628
+ 0.1
629
+ 0.05
630
+ 0.12
631
+ 0.13
632
+ 0.14
633
+ 0.15
634
+ 0.16
635
+ 0.17
636
+ 0.18
637
+ 0.19
638
+ T0.2
639
+ 0.15
640
+ 0.1
641
+ Im(X1B)
642
+ 0.05
643
+ 0$
644
+ -0.05
645
+ 0
646
+ 0.5
647
+ 1
648
+ 1.5
649
+ 2
650
+ 2.5
651
+ 3
652
+ 3.5
653
+ μ/T0.06
654
+ 0.04
655
+ 0.02
656
+ (L)w)
657
+ -0.02
658
+ -0.04
659
+ -0.06
660
+ 0.115
661
+ 0.12
662
+ 0.125
663
+ 0.13
664
+ 0.135
665
+ 0.14
666
+ 0.145
667
+ 0.15
668
+ 0.155
669
+ Re(T)0.06
670
+ 0.04
671
+ 0.02
672
+ (D)w)
673
+ -0.02
674
+ -0.04
675
+ -0.06
676
+ 0.11
677
+ 0.12
678
+ 0.13
679
+ 0.14
680
+ 0.15
681
+ 0.16
682
+ 0.17
683
+ 0.18
684
+ 0.19
685
+ 0.2
686
+ 0.21
687
+ Re(T)Multi-point Padè for the study of phase transitions
688
+ Francesco Di Renzo
689
+ [2] S. Singh, P. Dimopoulos, L. Dini, F. Di Renzo, J. Goswami, G. Nicotra et al., Lee-Yang edge
690
+ singularities in lattice QCD : A systematic study of singularities in the complex 𝜇𝐵 plane
691
+ using rational approximations, Proceedings of The 38th International Symposium on Lattice
692
+ Field Theory — PoS(LATTICE2021) (2022) 544.
693
+ [3] G. Nicotra, P. Dimopoulos, L. Dini, F. Di Renzo, J. Goswami, C. Schmidt et al., Lee-Yang
694
+ edge singularities in 2 + 1 flavor QCD with imaginary chemical potential, Proceedings of The
695
+ 38th International Symposium on Lattice Field Theory — PoS(LATTICE2021) (2022) 260.
696
+ [4] P. Dimopoulos, L. Dini, F. Di Renzo, J. Goswami, G. Nicotra, C. Schmidt et al., Contribution
697
+ to understanding the phase structure of strong interaction matter: Lee-Yang edge
698
+ singularities from lattice QCD, Phys. Rev. D 105 (2022) 034513 [2110.15933].
699
+ [5] AuroraScience collaboration, New approach to the sign problem in quantum field theories:
700
+ High density QCD on a Lefschetz thimble, Phys. Rev. D 86 (2012) 074506 [1205.3996].
701
+ [6] H. Fujii, D. Honda, M. Kato, Y. Kikukawa, S. Komatsu and T. Sano, Hybrid Monte Carlo on
702
+ Lefschetz thimbles - A study of the residual sign problem, JHEP 10 (2013) 147 [1309.4371].
703
+ [7] H. Fujii, S. Kamata and Y. Kikukawa, Monte Carlo study of Lefschetz thimble structure in
704
+ one-dimensional Thirring model at finite density, JHEP 12 (2015) 125 [1509.09141].
705
+ [8] A. Alexandru, G. Basar, P.F. Bedaque, G.W. Ridgway and N.C. Warrington, Sign problem
706
+ and Monte Carlo calculations beyond Lefschetz thimbles, JHEP 05 (2016) 053
707
+ [1512.08764].
708
+ [9] F. Di Renzo, S. Singh and K. Zambello, Taylor expansions on Lefschetz thimbles, Phys. Rev.
709
+ D 103 (2021) 034513 [2008.01622].
710
+ [10] F. Di Renzo and K. Zambello, Solution of the Thirring model in thimble regularization, Phys.
711
+ Rev. D 105 (2022) 054501 [2109.02511].
712
+ [11] HPQCD, UKQCD collaboration, Highly improved staggered quarks on the lattice, with
713
+ applications to charm physics, Phys. Rev. D 75 (2007) 054502 [hep-lat/0610092].
714
+ [12] A. Deger and C. Flindt, Determination of universal critical exponents using Lee-Yang theory,
715
+ Phys. Rev. Research. 1 (2019) 023004 [1905.02379].
716
+ 10
717
+
6dE1T4oBgHgl3EQf7AUK/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
8tE2T4oBgHgl3EQflgdv/content/2301.03989v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:e1eb2bc820c24a2b52a8a12cb9da07ad468f742ae980ebfffca5e38a8ccfc10b
3
+ size 9508107
8tE2T4oBgHgl3EQflgdv/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:ee54a6e93162b0dc91a369177be2914fe6328af01d425cf102bfa243d5e9bfaf
3
+ size 4849709
99E1T4oBgHgl3EQfCgIZ/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:b62628a00e53b227adb06cba3c53410559509b13635fc0fe1c48e9d86c5ad3d7
3
+ size 5767213
ANAzT4oBgHgl3EQfTPxG/content/tmp_files/2301.01245v1.pdf.txt ADDED
@@ -0,0 +1,934 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ RegTraffic: A Regression Based Traffic Simulator
2
+ for Spatiotemporal Traffic Modeling, Simulation
3
+ and Visualization
4
+ Sifatul Mostafi, Taghreed Alghamdi, Khalid Elgazzar
5
+ IoT Research Lab, ECSE, Ontario Tech University, Oshawa, ON, Canada
6
+ {sifatul.mostafi, Taghreed Alghamdi, khalid.elgazzar}@ontariotechu.ca
7
+ Abstract—Traffic simulation is a great tool to demonstrate
8
+ complex traffic structures which can be extremely useful for
9
+ the planning, development, and management of road traffic
10
+ networks. Current traffic simulators offer limited features when
11
+ it comes to interactive and adaptive traffic modeling. This paper
12
+ presents RegTraffic, a novel interactive traffic simulator that
13
+ integrates dynamic regression-based spatiotemporal traffic anal-
14
+ ysis to predict congestion of intercorrelated road segments. The
15
+ simulator models traffic congestion of road segments depending
16
+ on neighboring road links and temporal features of the dynamic
17
+ traffic flow. The simulator provides a user-friendly web interface
18
+ to select road segments of interest, receive user-defined traffic
19
+ parameters, and visualize the traffic for the flow of correlated
20
+ road links based on the user inputs and the underlying correlation
21
+ of these road links. Performance evaluation shows that RegTraffic
22
+ can effectively predict traffic congestion with a Mean Squared
23
+ Error of 1.3 Km/h and a Root Mean Squared Error of 1.71
24
+ Km/h. RegTraffic can effectively simulate the results and provide
25
+ visualization on interactive geographical maps.
26
+ Index Terms—Road traffic, simulator, regression, visualization,
27
+ software
28
+ I. INTRODUCTION
29
+ With the advancement of computer technologies and soft-
30
+ ware engineering, computer-based traffic simulation has be-
31
+ come a popular approach for traffic analysis in support of the
32
+ evaluation and design of Intelligent Transport Systems (ITS)
33
+ [2]. Traffic simulation software supported by the ability to
34
+ emulate the variability of spatial and temporal components in
35
+ traffic flows is a practical tool for capturing and explaining
36
+ complex traffic systems [6].
37
+ The purpose of developing Traffic simulation tools is to
38
+ experiment with varieties of strategies in traffic modeling [3].
39
+ Traffic simulation software tools and models built on real-
40
+ life traffic data are widely applied to support real-time traffic
41
+ decisions and management solutions.
42
+ Regression analysis in the traffic domain is a well-
43
+ established approach that facilitates traffic modeling and pre-
44
+ diction [1]. Regression-based traffic modeling helps in ana-
45
+ lyzing complex traffic structures which is a useful method for
46
+ the development and planning of traffic systems and networks.
47
+ Hence, traffic congestion estimation and computerized simula-
48
+ tion are suitable options for policymakers to analyze different
49
+ complex traffic scenarios and take actions accordingly [5].
50
+ A lot of microscopic and macroscopic traffic simulators
51
+ have been developed including SUMO [10], Aimsun [13],
52
+ Traffsim [14], SUMMIT [15], SifTraffic [16] and VISSIM [7].
53
+ These simulators have practical use cases in traffic analysis
54
+ including traffic flow measurement, multi-agent simulation,
55
+ particle-based simulation, and so on. Although these state-of-
56
+ the-art simulators have many practical traffic use cases, they
57
+ face challenges in the application of simulating road traffic
58
+ congestion in heterogeneous road transportation networks with
59
+ a small amount of real-time data [3]. Also, these simulators
60
+ lack the feature to adopt regression-based traffic modeling and
61
+ simulate traffic congestion of a road link depending on traffic
62
+ congestion of neighboring road links. Some of the simulators
63
+ do not provide visualization for the simulation results in
64
+ interactive geographical maps.
65
+ We aim to develop a regression-based traffic simulator for
66
+ spatiotemporal traffic modeling to predict traffic congestion
67
+ of a road link depending on neighboring road segments and
68
+ provide features to simulate and visualize the results using
69
+ interactive geographical maps.
70
+ The remainder of this paper is organized as follows. Section
71
+ II briefly reviews the state-of-the-art traffic simulators and
72
+ their scope in traffic modeling and simulation. The traffic
73
+ modeling approach of RegTraffic is described in Section III.
74
+ Section IV outlines the processing pipeline of the different
75
+ components of RegTraffic. Section V provides a step-by-step
76
+ simulation scenario of a traffic use case. Section VI shows
77
+ the performance analysis of RegTraffic. Lastly, Section VII
78
+ concludes this work and provides future research directions.
79
+ II. BACKGROUND AND RELATED WORK
80
+ Traffic simulator software is commonly divided into two
81
+ categories: microscopic traffic simulators [7], [10] and macro-
82
+ scopic traffic simulators [8].
83
+ FreeSim [9] is a traffic simulator designed to conduct real-
84
+ time freeway traffic simulation. SUMO (Simulation of Urban
85
+ Mobility) [10] is a microscopic traffic simulator that is devel-
86
+ oped to process complex and large road networks. SUMO is
87
+ widely used in many applications including traffic flow model-
88
+ ing [11] and color mapping Google Maps routes [12]. Aimsun
89
+ [13] is a traffic simulator for modeling smart mobility. Traffsim
90
+ [14] simulator is widely used for modeling isolated traffic
91
+ control strategies. SUMMIT [15] provides functionalities to
92
+ simulate urban driving in large traffic scenarios with massive
93
+ and mixed traffic. SifTraffic [16] is a practical software tool to
94
+ arXiv:2301.01245v1 [cs.NI] 23 Nov 2022
95
+
96
+ TABLE I
97
+ COMPARISON OF TRAFFIC SIMULATORS
98
+ Comparison Category Simulator
99
+ RegTraffic
100
+ FreeSim [9]
101
+ SUMO [10]
102
+ Aimsun [13]
103
+ TraffSim [14]
104
+ SUMMIT [15]
105
+ SimTraffic [16]
106
+ VISSIM [7]
107
+ Spatiotemporal Traffic Modeling
108
+ Yes
109
+ Yes
110
+ Yes
111
+ Yes
112
+ Yes
113
+ Yes
114
+ Yes
115
+ Yes
116
+ Regression Modeling
117
+ Yes
118
+ No
119
+ No
120
+ No
121
+ No
122
+ No
123
+ No
124
+ No
125
+ Interactive Geographical Maps
126
+ Yes
127
+ No
128
+ Yes
129
+ Yes
130
+ No
131
+ Yes
132
+ Yes
133
+ Yes
134
+ Web Interface
135
+ Yes
136
+ No
137
+ No
138
+ No
139
+ No
140
+ No
141
+ No
142
+ No
143
+ conduct simulations of practical traffic applications. VISSIM
144
+ [7] is a microscopic traffic simulator for behavior-based multi-
145
+ purpose traffic flow simulation.
146
+ Wang et al. [17] explored different methods of correct-
147
+ ing the traffic simulation models based on linear regression.
148
+ Golovnin et al. [20] took a web-oriented approach to simulate
149
+ road traffic, especially in urban settings. Mizuta et al. [21]
150
+ evaluated the traffic flow near intersections of a metropolitan
151
+ city to understand how agent-based traffic simulators work to
152
+ approximate vehicle behaviors.
153
+ A comparison among the existing traffic simulators along
154
+ with RegTraffic is listed in Table I in terms of some key
155
+ characteristics and features.
156
+ III. MATHEMATICAL MODELING
157
+ A. Spatial Feature
158
+ Figure 1 shows a traffic road intersection. In this intersec-
159
+ tion, we consider a road link as the spatial road feature that is
160
+ dependent on one or several connected spatial road features.
161
+ For example, for the intersection shown in Figure 1, the road
162
+ link ˆy is a spatial feature and is modeled as a dependent
163
+ variable in our regression modeling. The road links xs
164
+ 1, xs
165
+ 2 up
166
+ to the road link xs
167
+ n are the independent spatial features. It’s
168
+ worth noting that the dependent road link ˆy is an outbound
169
+ while all the independent road links xs
170
+ 1, xs
171
+ 2, ..., xs
172
+ n inbound
173
+ to the intersection. Our proposed traffic modeling approach
174
+ described in [18] indicates that the dependent spatial feature
175
+ must be an outbound road link and the independent spatial
176
+ features must be inbound road links. The model incorporates
177
+ a set of temporal features that can be extracted from both in-
178
+ dependent and dependent spatial features through exploratory
179
+ data analysis. The specific number of temporal features and
180
+ independent spatial features are arbitrary and dependent on the
181
+ specific road intersection and their orientation.
182
+ Here, XS is defined as a set of independent spatial features
183
+
184
+ xs
185
+ 1, xs
186
+ 2, .., xs
187
+ ns
188
+
189
+ as shown in Eq. (1).
190
+ XS =
191
+
192
+ xs
193
+ 1, xs
194
+ 2, .., xs
195
+ ns
196
+
197
+ (1)
198
+ The cardinality of set XS is defined as ns as shown in Eq.
199
+ (2).
200
+ ns = |XS|
201
+ (2)
202
+ Fig. 1. Traffic Road intersection
203
+ B. Temporal Feature Extraction
204
+ In our modeling, we convert temporal features into categori-
205
+ cal features using one hot encoding. To simplify our modeling,
206
+ temporal features are encoded using only two values. Here,
207
+ XT is a set of temporal features
208
+
209
+ xt
210
+ 1, xt
211
+ 2, .., xt
212
+ nt
213
+
214
+ as shown in
215
+ Eq. (3).
216
+ XT =
217
+
218
+ xt
219
+ 1, xt
220
+ 2, .., xt
221
+ nt
222
+
223
+ (3)
224
+ The cardinality of set XT is defined as nt as shown in Eq.
225
+ (4).
226
+ nt = |XT |
227
+ (4)
228
+ The set of temporal features is extracted from spatial fea-
229
+ tures using exploratory data analysis. Here, XT is the output
230
+ of function f which takes in the set of spatial features XS as
231
+ input. The function f is a many to many function that takes in
232
+ a set of spatial features and conducts exploratory data analysis
233
+ to extract a set of temporal features as shown in Eq. (5)
234
+ XT = fns→nt(XS)
235
+ (5)
236
+ We define the set X as a union of the temporal features XT
237
+ and spatial features XS as shown in Eq. (6).
238
+
239
+ X = XT ∪ XS
240
+ (6)
241
+ C. Regression Modeling
242
+ 1) Regression Formation: RegTraffic forms a regression
243
+ model through a linear combination of both temporal and
244
+ spatial explanatory features to explain the dependent spatial
245
+ feature ˆy as shown in Eq. (7). In this equation, all the
246
+ independent features are associated with their corresponding
247
+ regression coefficient. α indicates the bias and ϵ refers to the
248
+ error term.
249
+ ˆy =
250
+ nt
251
+
252
+ i=1
253
+ βt
254
+ ixt
255
+ i +
256
+ ns
257
+
258
+ i=1
259
+ βs
260
+ i xs
261
+ i + α + ϵ
262
+ (7)
263
+ In the regression Eq. (7), every explanatory temporal feature
264
+ from setting XT is associated with a regression coefficient
265
+ from set βT as shown in Eq. (8).
266
+ βT =
267
+
268
+ βt
269
+ 1, βt
270
+ 2, .., βt
271
+ nt
272
+
273
+ (8)
274
+ Similarly, in the regression Eq. (7), every explanatory spatial
275
+ feature from set XS is associated with a regression coefficient
276
+ from set βS as shown in Eq. (9).
277
+ βS =
278
+
279
+ βs
280
+ 1, βs
281
+ 2, .., βs
282
+ ns
283
+
284
+ (9)
285
+ Here, β is defined as the union of set βT and βS
286
+ β = βT ∪ βS
287
+ (10)
288
+ 2) Posterior Probability Distribution:
289
+ We use a novel
290
+ Bayesian linear regression approach for spatiotemporal traffic
291
+ modeling of a road link proposed in [18]. Bayesian linear
292
+ regression formulates a posterior probability distribution of
293
+ the model parameters rather than just finding a single point
294
+ estimate. The response variable is drawn from a probability
295
+ distribution instead of a single value estimation. A Bayesian
296
+ linear regression model samples the response variable from a
297
+ normal distribution as shown in Eq. (11).
298
+ y ∼ N(βT X, σ2I)
299
+ (11)
300
+ In Eq. (11), the response variable y is generated from a
301
+ Gaussian normal distribution, which is characterized by a
302
+ mean and variance. Eq. (12) refers to the Bayes Theorem
303
+ which is the fundamental building block of Bayesian linear
304
+ regression. Here, P(β | ˆy, X) is the posterior probability
305
+ distribution of the model parameters, P(ˆy | β, X) is the
306
+ likelihood of the data, P(β | X) is the prior probability of the
307
+ parameters and P(ˆy | X) is the normalization constant. The
308
+ posterior distribution of the model parameters is proportional
309
+ to the multiplication of the likelihood of the data and the prior
310
+ probability of the parameters. A detailed description of the
311
+ model is described in [18].
312
+ P(β | ˆy, X) = P(ˆy | β, X) ∗ P(β | X)
313
+ P(ˆy | X)
314
+ (12)
315
+ Once the regression model is built, the user can provide
316
+ new observations for independent spatial features XS and
317
+ independent temporal features XT into the model. Based on
318
+ the new observation, the model incorporates the regression
319
+ coefficients associated with the explanatory variables and
320
+ predicts the output for the dependent variable ˆy. An event
321
+ can be associated with a specific value as an input for any
322
+ independent spatial feature.
323
+ D. Event Integration
324
+ Here, XE is defined as a set of events
325
+
326
+ XE
327
+ 1 , XE
328
+ 2 , .., XE
329
+ nE
330
+
331
+ as shown in Eq. (13).
332
+ XE =
333
+
334
+ XE
335
+ 1 , XE
336
+ 2 , .., XE
337
+ nE
338
+
339
+ (13)
340
+ The cardinality of set XE is defined as nE as shown in Eq.
341
+ (14).
342
+ nE = |XE|
343
+ (14)
344
+ After event integration, the independent spatial features
345
+ associated with an event are integrated into Eq. (7). If any
346
+ independent spatial feature is associated with an event, we
347
+ need to replace the value for the independent spatial feature
348
+ xS with the events xE. Spatial features which are not affected
349
+ by any specific event are represented by xS′ along with their
350
+ model parameter βS′ as shown in Eq. (16). The amount of
351
+ spatial features unaffected by any specific event is denoted as
352
+ shown in Eq. (15).
353
+ nS′ = nS − nE
354
+ (15)
355
+ ˆy =
356
+ nt
357
+
358
+ i=1
359
+ βt
360
+ ixs
361
+ i +
362
+ nS′
363
+
364
+ i=1
365
+ βS′
366
+ i xS′
367
+ i +
368
+ nE
369
+
370
+ i=1
371
+ βE
372
+ i xE
373
+ i + α + ϵ
374
+ (16)
375
+ However, we add a time constraint in association with the
376
+ temporal components for adding a specific event into the
377
+ regression equation. For any specific event XE occurred at
378
+ time TE, the value of spatial feature XS will be replaced by
379
+ the value of XE if TE ⊂ XT .
380
+ IV. PROCESSING PIPELINE
381
+ The processing pipeline of RegTraffic is shown in Figure
382
+ - 2. The spatial feature consists of a unique name of the
383
+ feature, the corresponding time series dataset of that spatial
384
+ feature, and a set of latitude and longitude as the waypoints
385
+ of the route of that spatial feature. The traffic data extraction
386
+ is described in [19]. In this process, a user selects the starting
387
+ and ending points of the route of interest and specifies the
388
+ time range. The traffic data extraction tool gathers time-series
389
+ information of the “congestion index” of that road link every
390
+ 15 minutes throughout the time range from Google Maps.
391
+ The congestion index is defined by the average speed of that
392
+ road link in terms of kilometers per hour. At the end of the
393
+ process, the tool generates a time series dataset that has a
394
+
395
+ Fig. 2. Processing Pipeline.
396
+ unique name as provided by the user when adding a spatial
397
+ feature in RegTraffic.
398
+ RegTraffic also constructs a temporal feature component
399
+ with three core input values. These are the unique name of
400
+ the temporal feature, the corresponding time series dataset,
401
+ and the time range of that temporal feature. RegTraffic takes
402
+ a set of input preferences from the user as part of the model
403
+ selection. It also allows users to choose the dependent feature
404
+ for the regression model. Once the regression model is built,
405
+ RegTraffic passes the regression coefficients to a visualization
406
+ interface where a user can input new observations for the
407
+ independent features that can be both spatial and temporal.
408
+ V. SIMULATION
409
+ A. Spatial Feature
410
+ We conduct our experiment on four connected road links in
411
+ Oshawa, Ontario, Canada as shown in Figure 3(a). The ending
412
+ point of road links 2, 3 and 4 are connected with the origin of
413
+ the road link 1. A connected road network is formed by these
414
+ road links. We represent the traffic congestion level of these 4
415
+ road links as Road1, Road2, Road3, and Road4, respectively.
416
+ Road1 is the dependent link where Road2, Road3 and Road4
417
+ are the independent links that collectively affect Road1 during
418
+ a specific time of the day.
419
+ We collect the average traffic speed of each road link every
420
+ 15 minutes for an entire week from 12:00 am March 01, 2020,
421
+ to 11:45 pm March 07, 2020. As a result, there are a total
422
+ of 672 observations over 7 days of time-series data for each
423
+ road link. Figure 3(b) shows the time series of the average
424
+ traffic speed of all four road links for the first two days. The
425
+ y axis represents the average traffic speed in km/h, which is
426
+ considered the traffic congestion index in our analysis. We can
427
+ see that the time series has a cycle as the average traffic speed
428
+ shows regular and predictable changes that recur every day
429
+ within a certain time interval. The higher the average speed,
430
+ the low the traffic congestion, and vice versa.
431
+ B. Temporal Feature Extraction
432
+ Figure 3(c) shows the hourly mean of the average speed for
433
+ each road link. The mean values show very little variance
434
+ (a) Intersection of Simcoe and Conlin
435
+ Road in Oshawa
436
+ (b) Time series data of 4 road links
437
+ (c) Hourly average speed throughout a
438
+ day
439
+ (d) Identifying threshold for Peakhour
440
+ Fig. 3. Average speed throughout a day
441
+ compared to each other as they seem to move together
442
+ throughout the day. The average of the different means of all
443
+ road links is plotted in Figure 3(d). The horizontal line at a
444
+ speed of 11.75 km/h divides the plot evenly and intersects with
445
+ the total average speed at two points, one at daytime 8:00 and
446
+ the other one at 23:00. From this exploratory data analysis,
447
+ a new categorical feature called Peakhour is extracted that
448
+ indicates a certain time interval during a day where the average
449
+ traffic speed remains below 11.75 km/h. From 9:00 am to
450
+ 12:00 pm, the value of Peakhour would be 1, otherwise 0.
451
+ Another temporal component is considered in the analysis as
452
+ a categorical variable which is AM. The value of AM would
453
+ be 1 when the meridiem is AM and 0 when it is PM.
454
+ C. Regression Modeling
455
+ The outcome of our Bayesian linear regression is the distri-
456
+ bution of the model parameters. The model does not provide
457
+ an exact estimate for a feature, but the mean value of the
458
+ distribution can be considered as an estimate for the feature.
459
+ The benefit of having a posterior probability distribution is
460
+ that the model also provides an entire range of values that
461
+ shows the uncertainty of the true values. The mean of a
462
+ posterior probability distribution is taken as the best estimate
463
+ of that model parameter. These mean estimates of these model
464
+ parameters are put together to derive a new Eq. (17).
465
+ Road1 = 7.4163 ∗ Intercept + 1.7561 ∗ AM
466
+ −2.7517 ∗ Peakhour − 0.0477 ∗ Road2
467
+ −0.0479 ∗ Road3 + 0.7139 ∗ Road4 + 1.7003 ∗ SD
468
+ (17)
469
+
470
+ Name
471
+ Name
472
+ Model Selection
473
+ Time Series
474
+ Spatial
475
+ Temporal
476
+ Time Series
477
+ Data
478
+ Feature
479
+ Feature
480
+ Data
481
+ Regression
482
+ Waypoints
483
+ Time Range
484
+ Modelling
485
+ User Input
486
+ User Input
487
+ Visualization
488
+ for
489
+ for
490
+ Scheme
491
+ Spatial Features
492
+ Temporal FeaturesN
493
+ W
494
+ Road 1
495
+ S
496
+ 2
497
+ Road 2
498
+ Con
499
+ CopperBrang
500
+ Vegan · ss
501
+ Road 4
502
+ Road 3
503
+ Subway
504
+ Sandwich shop
505
+ S
506
+ C
507
+ S
508
+ SmileRoadl
509
+ 20
510
+ Road2
511
+ Road3
512
+ 18
513
+ Road4
514
+ 16
515
+ Speed (Km/h)
516
+ 14
517
+ 12
518
+ 10
519
+ 8
520
+ 6
521
+ 01-Mar
522
+ 06:00
523
+ 12:00
524
+ 18:00
525
+ 02-Mar
526
+ 06:00
527
+ 12:00
528
+ 18:00
529
+ 00:00
530
+ 00:00
531
+ 2020
532
+ Datetime20
533
+ 18
534
+ 16
535
+ Speed (Km/h)
536
+ 14
537
+ 12
538
+ 10
539
+ Roadl
540
+ Road2
541
+ 8
542
+ Road3
543
+ Road4
544
+ 6
545
+ 5
546
+ 10
547
+ 15
548
+ 20
549
+ 0
550
+ Hours (0-23)18
551
+ Hourly Mean
552
+ - Threshold Speed
553
+ 16
554
+ 14
555
+ Speed (Km/h)
556
+ Peakhour
557
+ Peakhour
558
+ starts
559
+ ends
560
+ 12
561
+ S
562
+ 10
563
+ 8
564
+ 0
565
+ 5
566
+ 10
567
+ 15
568
+ 20
569
+ Hours (0-23)Fig. 4. Regression Analysis in RegTraffic Simulator
570
+ D. Visualization
571
+ Figure 4 describes a sample simulation procedure of a road
572
+ intersection where Road1 is considered as a dependent road
573
+ link and Road2, Road3 and Road4 are independent road
574
+ links. Based on the spatial features, two new temporal features
575
+ are extracted which are Peakhour and AM. RegTraffic shows
576
+ the location of the road links on an interactive geographical
577
+ map where the user can provide new observations for indepen-
578
+ dent road links and temporal features to predict the outcome of
579
+ the dependent road link. As shown in the figure, the user sets
580
+ the congestion index of Road2, Road3, and Road4 to 18.05,
581
+ 4.4, and 10.45 kilometers per hour, respectively. The user also
582
+ needs to provide the specific time as an input for the temporal
583
+ features Peakhour and AM. RegTraffic calculates the value
584
+ for the temporal features from the time input provided by the
585
+ user and incorporates these values along with the input values
586
+ for independent spatial features to predict the congestion index
587
+ of dependent road link Road1. Based on the input values
588
+ provided by the user, RegTraffic predicts the congestion index
589
+ of the road link Road1, which is 13.3 kilometers per hour in
590
+ this case.
591
+ VI. PERFORMANCE EVALUATION
592
+ A. Test Observations
593
+ To evaluate the performance, the model is tested on a
594
+ testing dataset of traffic observations. Figure 5 shows four
595
+ random test observations from the testing dataset along with
596
+ the probability density function of Road1. The true value of
597
+ Road1 is represented by the dotted line and the mean of the
598
+ probability distribution is represented by the straight line. The
599
+ mean of the probability distribution is considered as the best
600
+ estimate for the distributions. The estimated value provided by
601
+ the model is very close to the true value in Figures 5(a), 5(b),
602
+ 5(c) and 5(d).
603
+ B. New Observations
604
+ To see how the model performs for new and modified obser-
605
+ vations, we test the model with a set of new observations with
606
+ random values for both the spatial and temporal components
607
+ as shown in Figure 6. For every new observation, the model
608
+ TABLE II
609
+ MODEL COMPARISON BASED ON DIFFERENT FEATURES
610
+ Mean Absolute
611
+ Error
612
+ Root Mean Squared
613
+ Error
614
+ Multiple Linear Regression
615
+ 1.31269
616
+ 1.71981
617
+ Elastic Net Regression
618
+ 1.33501
619
+ 1.91345
620
+ Bayesian Linear Regression
621
+ 1.3123
622
+ 1.71962
623
+ Baseline
624
+ 3.75357
625
+ 5.09258
626
+ (a)
627
+ (b)
628
+ (c)
629
+ (d)
630
+ Fig. 5. Test observations
631
+ provides a new posterior distribution with the mean estimate.
632
+ The vertical straight line represents the mean estimate of
633
+ the posterior probability distribution for a new observation.
634
+ We can see the highest probability density near the mean
635
+ estimation of all posterior probability distributions as shown
636
+ in Figures 6(a), 6(b), and 6(c) and 6(d).
637
+ C. Comparison With Other Approaches
638
+ The performance of the Bayesian linear regression model
639
+ is compared in terms of Mean Absolute Error (MAE) and
640
+ Root Mean Squared Error (RMSE) with two state-of-the-art
641
+ frequentist models: Multiple Linear Regression and Elastic Net
642
+ Regression as shown in Table II. We also develop a comparison
643
+ baseline which is the mean of all possible observations of
644
+ the traffic congestion. Here, Bayesian linear regression out-
645
+ performs the state-of the-art-approaches in terms of accuracy
646
+ as it has the lowest MAE and RMSE values.
647
+
648
+ Estimated Dist.
649
+ 0.25
650
+ True Value
651
+ Mean Estimate
652
+ 0.20 -
653
+ 0.1
654
+ Density
655
+ 0.10
656
+ 0.05
657
+ 0.00
658
+ 4
659
+ 6
660
+ 8
661
+ 10
662
+ 12
663
+ 14
664
+ Speed (Km/h)Estimated Dist.
665
+ 0.25
666
+ True Value
667
+ Mean Estimate
668
+ 0.20 -
669
+ 0.15
670
+ Density
671
+ 0.10
672
+ 0.05
673
+ 0.00
674
+ 4
675
+ 6
676
+ 8
677
+ 10
678
+ 12
679
+ 14
680
+ 16
681
+ 18
682
+ Speed (Km/h)RegTraffic
683
+ @loT Research Lab,Ontario Tech University
684
+ Provide Time Input:
685
+ Admin Panel
686
+ 3
687
+ 14:54
688
+ Show Regressions
689
+ 【2]
690
+ 3
691
+ 16]
692
+ Submit
693
+ ShowCorrelations
694
+ Winchester Rd E
695
+ 33
696
+ Feature
697
+ Value
698
+ Winchester Rd W
699
+ Winchester Golf Club
700
+ Peakhour
701
+ 1
702
+ Windfiel
703
+ Farms
704
+ Shopping
705
+ entre
706
+ Kedron Dells
707
+ Golf Course
708
+ AM
709
+ KingMeadow
710
+ 0
711
+ adoGolf Club
712
+ Road1:Dependent
713
+ 13.3Km/h
714
+ 33
715
+ Associate Event
716
+ The Fields
717
+ ofConlin
718
+ Windfields
719
+ Road2:Independent
720
+ 18.05Km/h
721
+ 33
722
+ Road4:Independent
723
+ 10.45Km/h
724
+ [16]
725
+ CampSamac
726
+ Fresh Food
727
+ Road3:Independent
728
+ Conlin Rd
729
+ 4.4Km/h
730
+ Gar
731
+ Sobeys
732
+ P
733
+ F
734
+ 35
735
+ [26]
736
+ The Waltzing Weasel
737
+ WI
738
+ Mili Express
739
+ MetroEstimated Dist.
740
+ 0.25
741
+ True Value
742
+ Mean Estimate
743
+ 0.20 -
744
+ 0.1
745
+ Density
746
+ 0.10
747
+ 0.05
748
+ 0.00
749
+ 12
750
+ 14
751
+ 16
752
+ 18
753
+ 20
754
+ 22
755
+ 24
756
+ Speed (Km/h)Estimated Dist.
757
+ 0.25
758
+ True Value
759
+ Mean Estimate
760
+ 0.20 -
761
+ 0.15
762
+ Density
763
+ 0.10 -
764
+ 0.05
765
+ 0.00
766
+ 2
767
+ 4
768
+ 6
769
+ 8
770
+ 10
771
+ 12
772
+ 14
773
+ 16
774
+ Speed (Km/h)(a)
775
+ (b)
776
+ (c)
777
+ (d)
778
+ Fig. 6. New observations
779
+ VII. CONCLUSION
780
+ This paper presents RegTraffic, a new dynamic traffic sim-
781
+ ulator for spatiotemporal traffic modeling for intercorrelated
782
+ road links. RegTraffic builds a regression-based spatiotemporal
783
+ traffic model to predict traffic congestion of a road link
784
+ depending on neighboring road links and temporal compo-
785
+ nents extracted through exploratory data analysis. RegTraffic
786
+ provides a dynamic interface for a user to provide new obser-
787
+ vations for independent features of the regression model and
788
+ provides visualization on interactive geographical maps. The
789
+ Mean Absolute Error and Root Mean Squared Error metrics
790
+ are used to evaluate the performance of the regression-based
791
+ predictive model integrated into RegTraffic. Performance eval-
792
+ uation shows that RegTraffic can effectively predict traffic
793
+ congestion of intercorrelated road links. In the current version
794
+ of RegTraffic, we apply a Bayesian linear regression model for
795
+ better interpretation and uncertainty evaluation. In the future,
796
+ we plan to enhance RegTraffic by supporting other regression-
797
+ based spatiotemporal traffic modeling approaches.
798
+ REFERENCES
799
+ [1] X. Yan and X. Su, Linear regression analysis: theory and computing.
800
+ Singapore, Hackensack, NJ: World Scientific, 2009.
801
+ [2] J. Barcelo, Ed., Fundamentals of Traffic Simulation. New York: Springer,
802
+ 2010
803
+ [3] A. Pell, A. Meingast, and O. Schauer, “Trends in real time Traffic Sim-
804
+ ulation,” in Transportation Research Procedia, vol. 25, pp. 1477–1484,
805
+ 2017.
806
+ [4] G. Kotusevski and K. A. Hawick, ”A review of traffic simula-
807
+ tion software”. 2009, Accessed: Jul. 30, 2021. [Online]. Available:
808
+ https://mro.massey.ac.nz/handle/10179/4506
809
+ [5] M. M. Mubasher and J. Syed Waqar ul Qounain, ”Systematic literature
810
+ review of vehicular traffic flow simulators,” in International Conference
811
+ on Open Source Software Computing (OSSCOM), 2015, pp. 1-6.
812
+ [6] P. M. Ejercito, K. G. E. Nebrija, R. P. Feria and L. L. Lara-Figueroa,
813
+ ”Traffic simulation software review”. in 8th International Conference on
814
+ Information, Intelligence, Systems & Applications (IISA), 2017, pp. 1-4.
815
+ [7] M. Fellendorf, and P. Vortisch, “Microscopic traffic flow simulator
816
+ VISSIM,��� in Fundamentals of Traffic Simulation, J. Barcel´o, Ed. New
817
+ York, NY: Springer, 2010, pp. 63–93.
818
+ [8] H. Ramadhan and I. G. B. B. Nugraha, ”Web based macroscopic road
819
+ traffic simulator,” in 11th International Conference on Telecommunica-
820
+ tion Systems Services and Applications (TSSA), 2017, pp. 1-6.
821
+ [9] J. Miller and E. Horowitz, ”FreeSim - a free real time freeway traffic
822
+ simulator,” 2007 IEEE Intelligent Transportation Systems Conference,
823
+ 2007, pp. 18-23.
824
+ [10] P. A. Lopez et al., “Microscopic Traffic Simulation using SUMO,”
825
+ in 21st International Conference on Intelligent Transportation Systems
826
+ (ITSC), Maui, HI, Nov. 2018, pp. 2575–2582.
827
+ [11] S. Haddouch, H. Hachimi and N. Hmina, ”Modeling the flow of road
828
+ traffic with the SUMO simulator,” in 4th International Conference on
829
+ Optimization and Applications (ICOA), 2018, pp. 1-5.
830
+ [12] R. Mena, F. Zum´arraga, L. Urquiza and X. Calder´on, ”Google Maps
831
+ Route Color Mapping with SUMO Simulator,” in International Confer-
832
+ ence on Information Systems and Software Technologies (ICI2ST), 2019,
833
+ pp. 92-99.
834
+ [13] J. Casas, J. L. Ferrer, D. Garcia, J. Perarnau, and A. Torday, “Traffic
835
+ Simulation with Aimsun,” in Fundamentals of Traffic Simulation, J.
836
+ Barcel´o, Ed. New York, NY: Springer, 2010, pp. 173–232.
837
+ [14] M. Lindorfer, C. Backfrieder, C. F. Mecklenbr¨auker and G. Ostermayer,
838
+ ”Modeling Isolated Traffic Control Strategies in TraffSim,” in UKSim-
839
+ AMSS 19th International Conference on Computer modeling & Simula-
840
+ tion (UKSim), 2017, pp. 143-148.
841
+ [15] P. Cai, Y. Lee, Y. Luo and D. Hsu, ”SUMMIT: A Simulator for Urban
842
+ Driving in Massive Mixed Traffic,” in IEEE International Conference
843
+ on Robotics and Automation (ICRA), 2020, pp. 4023-4029.
844
+ [16] D. K. Sorenson and J. Collins, “Practical Applications Of Traffic Simula-
845
+ tion Using SifTraffic,” presented at the Compendium of Papers. Institute
846
+ of Transportation Engineers 2000, District 6 Annual MeetingInstitute of
847
+ Transportation Engineers (ITE), 2000. Accessed: Jul. 30, 2021. [Online].
848
+ Available: https://trid.trb.org/view/671329
849
+ [17] L. Wang, Z. Liu and Z. Liu, ”Research on correction method of
850
+ traffic simulation model based on linear regression,” in International
851
+ Conference on Anti-Counterfeiting, Security and Identification, 2010,
852
+ pp. 192-194.
853
+ [18] S. Mostafi, T. Alghamdi and K. Elgazzar, ”A Bayesian Linear Regression
854
+ Approach to Predict Traffic Congestion,” in 2020 IEEE 6th World Forum
855
+ on Internet of Things (WF-IoT), 2020, pp. 1-6.
856
+ [19] S. Mostafi and K. Elgazzar, ”An Open Source Tool to Extract Traffic
857
+ Data from Google Maps: Limitations and Challenges,” in International
858
+ Symposium on Networks, Computers and Communications (ISNCC),
859
+ 2021.
860
+ [20] O. K. Golovnin, K. V. Pupynin and A. S. Privalov, ”A Web-Oriented
861
+ Approach for Urban Road Traffic Simulation,” in International Multi-
862
+ Conference on Industrial Engineering and Modern Technologies (Far-
863
+ EastCon), 2019, pp. 1-4.
864
+ [21] H. Mizuta, ”Evaluation of metropolitan traffic flow with agent based
865
+ traffic simulator and approximated vehicle behavior model near intersec-
866
+ tions,” in Winter Simulation Conference (WSC), 2015, pp. 3925-3936.
867
+
868
+ 0.25
869
+ Estimated Dist.
870
+ Mean Estimate
871
+ 0.20 -
872
+ 0.15
873
+ Density
874
+ 0.10 :
875
+ 0.05
876
+ 0.00
877
+ 4
878
+ 6
879
+ 8
880
+ 10
881
+ 12
882
+ 14
883
+ 16
884
+ 18
885
+ Speed (Km/h)0.25
886
+ Estimated Dist.
887
+ Mean Estimate
888
+ 0.20 -
889
+ 0.15
890
+ Density
891
+ 0.10
892
+ 0.05
893
+ 0.00
894
+ 4
895
+ 6
896
+ 8
897
+ 10
898
+ 12
899
+ 14
900
+ 16
901
+ Speed (Km/h)0.25
902
+ Estimated Dist
903
+ Mean Estimate
904
+ 0.20 -
905
+ 0.15
906
+ Density
907
+ 0.10
908
+ 0.05
909
+ 0.00
910
+ 10
911
+ 12
912
+ 14
913
+ 16
914
+ 18
915
+ 20
916
+ 22
917
+ 24
918
+ Speed (Km/h)Estimated Dist.
919
+ 0.25 -
920
+ Mean Estimate
921
+ 0.20
922
+ 0.15
923
+ Density
924
+ 0.10
925
+ 0.05
926
+ 0.00
927
+ 8
928
+ 10
929
+ 12
930
+ 14
931
+ 16
932
+ 18
933
+ 20
934
+ Speed (Km/h)
ANAzT4oBgHgl3EQfTPxG/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
BNAzT4oBgHgl3EQfhv2_/content/2301.01490v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:1ee1f19af1edd495f07f26fc316fa13beb50a6ce9d133cd148d331e662c9b362
3
+ size 7690522
BtE4T4oBgHgl3EQfFQxm/content/tmp_files/2301.04884v1.pdf.txt ADDED
@@ -0,0 +1,1067 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Performance of an ultra-pure NaI(Tl) detector
2
+ produced by an indigenously-developed
3
+ purification method and crystal growth for the
4
+ COSINE-200 experiment
5
+ H. Lee 1,2,B.J. Park 1,2,J.J. Choi 2,3, O. Gileva 2, C. Ha 4, A. Iltis 5, E.J. Jeon 2,1,
6
+ D.Y. Kim 2, K.W. Kim 2, S.H. Kim 2, S.K. Kim 3, Y.D. Kim 2,1, Y.J. Ko 2, C.H. Lee 2,
7
+ H.S. Lee 2,1, I.S. Lee 2,∗, M.H. Lee 2,1, S.J. Ra 2, J.K. Son 2, K.A. Shin 2
8
+ 1IBS School, University of Science and Technology (UST), Daejeon 34113, Republic
9
+ of Korea
10
+ 2 Center for Underground Physics, Institute for Basic Science (IBS), Daejeon 34126,
11
+ Republic of Korea
12
+ 3 Department of Physics and Astronomy, Seoul National University, Seoul 08826,
13
+ Republic of Korea
14
+ 4 Department of Physics, Chung-Ang University, Seoul 06973, Republic of Korea
15
+ 5 Damavan Imaging, Troyes 10430, France
16
+ Correspondence*:
17
+ I.S. Lee
18
19
+ ABSTRACT
20
+ The COSINE-100 experiment has been
21
+ operating with 106 kg of low-background
22
+ NaI(Tl) detectors to test the results from the
23
+ DAMA/LIBRA experiment, which claims to
24
+ have observed dark matter. However, since the
25
+ background of the NaI(Tl) crystals used in the
26
+ COSINE-100 experiment is 2–3 times higher
27
+ than that in the DAMA detectors, no conclusion
28
+ regarding the claimed observation from the
29
+ DAMA/LIBRA experiment could be reached.
30
+ Therefore, we plan to upgrade the current
31
+ COSINE-100 experiment to the next phase,
32
+ COSINE-200, by using ultra-low background
33
+ NaI(Tl) detectors. The basic principle was
34
+ already proved with the commercially available
35
+ Astro-grade NaI powder from Sigma-Aldrich
36
+ company. However, we have developed a
37
+ mass production process of ultra-pure NaI
38
+ powder at the Center for Underground Physics
39
+ (CUP) of the Institute for Basic Science (IBS),
40
+ Korea, using the direct purification of the raw
41
+ NaI powder. We plan to produce more than
42
+ 1,000 kg of ultra-pure powder for the COSINE-
43
+ 200 experiment.
44
+ With our crystal grower
45
+ installed at CUP, we have successfully grown
46
+ a low-background crystal using our purification
47
+ technique for the NaI powder.
48
+ We have
49
+ assembled a low-background NaI(Tl) detector.
50
+ In this article, we report the performance of this
51
+ ultra-pure NaI(Tl) crystal detector produced at
52
+ IBS, Korea.
53
+ Keywords:
54
+ NaI(Tl) crystal;
55
+ Dark matter;
56
+ COSINE-200;
57
+ Low-
58
+ background detector; Purification
59
+ 1
60
+ INTRODUCTION
61
+ Numerous astronomical observations support the
62
+ theory that most of the matter in universe is the
63
+ invisible dark matter, although an understanding of
64
+ its nature and interactions remains elusive (1, 2, 3).
65
+ Even though tremendous efforts have been made
66
+ to search for dark matter, no definitive signals
67
+ have been observed (4, 5). The only exception is
68
+ the DAMA experiment, which has observed an
69
+ annual modulation of event rates using an array of
70
+ NaI(Tl) detectors (6, 7). This observation could be
71
+ interpreted as dark matter-nuclei interactions (8, 9).
72
+ However, this result has been the subject of a
73
+ continuing debate because no other experimental
74
+ searches have observed similar signals (5, 10).
75
+ 1
76
+ arXiv:2301.04884v1 [physics.ins-det] 12 Jan 2023
77
+
78
+ H. Lee et al.
79
+ Several experimental efforts using the same
80
+ NaI(Tl) target materials are currently underway (11,
81
+ 12, 13, 14, 15, 16, 17).
82
+ The COSINE-100
83
+ experiment is one such effort presently operating
84
+ at the Yangyang underground laboratory in Korea,
85
+ which has provided several exciting physics
86
+ results (9, 18, 19, 20, 21). However, due to
87
+ the approximately 2–3 times higher background
88
+ level, an unambiguous conclusion regarding the
89
+ observation in the DAMA experiment using the
90
+ same annual modulation signal has not been
91
+ observed yet (22, 23).
92
+ As an effort to upgrade the ongoing COSINE-
93
+ 100 experiment for the next-phase COSINE-
94
+ 200 experiment, we have conducted an R&D
95
+ program aimed at producing a low-background
96
+ NaI(Tl) detector to conclude on the observed
97
+ signals from DAMA/LIBRA unambiguously. It
98
+ includes the chemical purification of the raw NaI
99
+ powder (24, 25), its crystal growth (26), and
100
+ detector assembly (27). We have already proved
101
+ the principle of a low-background NaI(Tl) detector
102
+ using the commercially available low-background
103
+ Astro-grade NaI powder from Sigma-Aldrich (28).
104
+ As a next step, we have grown an NaI(Tl) crystal
105
+ using our own NaO power produced using the mass
106
+ purification process at IBS, Korea (29). This article
107
+ reports the characteristics and performance of this
108
+ indigenously-produced NaI(Tl) crystal.
109
+ 2
110
+ NAI PURIFICATION AND CRYSTAL
111
+ GROWTH
112
+ The COSINE-200 detector requires extremely
113
+ low levels of radioactive contamination in the
114
+ materials used in the detector production. The
115
+ major contributors to the background are the
116
+ decays of 40K and 210Pb in the bulk NaI(Tl)
117
+ crystal (30, 31). Because of the similarity in
118
+ its chemical properties to those of Na, which
119
+ is in the same periodic table group, K is the
120
+ primary impurity contaminant, and its selective
121
+ extraction from NaI powder is challenging. We
122
+ found that the fractional recrystallization method
123
+ effectively reduces the K and Pb impurities (24). In
124
+ addition, using this method, the Ba concentration
125
+ was significantly reduced, indicating a reduction
126
+ of Ra impurities (24). Thus,we constructed a
127
+ mass production facility at IBS, Daejeon, Korea,
128
+ for producing ultra-pure NaI powder using the
129
+ fractional recrystallization method on-site (25).
130
+ The facility has been operated with a maximum
131
+ production rate of 35 kg of ultra-pure powder
132
+ in a single processing cycle of two weeks (29).
133
+ Using our purification facility, we have performed
134
+ mass purification of the fractional recrystallization
135
+ process using raw NaI powder from Merck
136
+ (99.99(5)% purity). In this mass purification process
137
+ of the NaI power, we have achieved a concentration
138
+ of K of 6.4 ppb and that of Pb below 0.3 ppb (29),
139
+ which are consistent with contamination levels of
140
+ the Astro-grade powder.
141
+ The ultra-pure crystal was grown using a small-
142
+ volume Kyropouls grower (32), which is the same
143
+ grower used for growing the proof of principle low-
144
+ background NaI(Tl) crystals using the commercial
145
+ Astro-grade powder (28). In growing the crystal,
146
+ 1.7 kg of the purified NaI powder was loaded in
147
+ a 12 cm diameter, 10 cm high quartz crucible. An
148
+ NaI(Tl) crystal ingot, as shown in Figure 1(a), of
149
+ ∼70 mm diameter and ∼80 mm high and having
150
+ a 1.1 kg mass, was grown in ∼24 h . During the
151
+ crystal growth, N2 gas was continuously flushed
152
+ using a thallium trap with a flow rate of 10 L/m.
153
+ 3
154
+ EXPERIMENTAL SETUP
155
+ 3.1
156
+ NaI(Tl) crystal
157
+ The growth of the NaI(Tl) crystal (named NaI-
158
+ 037) was completed on January 18, 2021, using
159
+ NaI powder purified IBS (24, 32). The top and
160
+ bottom sections of the crystal ingot were cut using
161
+ a diamond bandsaw, as shown in Figure 1(b). After
162
+ cutting the top and bottom, the NaI-037 crystal is
163
+ 70 mm in diameter and 51 mm in height. The flat
164
+ top and bottom surfaces and a barrel-shaped side
165
+ surface were polished using aluminum oxide films
166
+ ranging from 400 to 8000 grit. After polishing, the
167
+ barrel was wrapped with a polytetrafluoroethylene
168
+ (PTFE) film in several layers as a diffusive reflector.
169
+ Frontiers
170
+ 2
171
+
172
+ H. Lee et al.
173
+ Figure 1a. NaI(Tl) Crystal ingot
174
+ Figure 1b. Cut and polished NaI(Tl)
175
+ crystal
176
+ Figure 1. Bare NaI(Tl) (NaI-037) crystal
177
+ A 3 mm thick copper casing with quartz windows at
178
+ each end was encapsulated the crystal hermetically.
179
+ Hamamatsu 3 inch photomultiplier tubes (PMTs),
180
+ selected for high quantum efficiency (R12669SEL),
181
+ were coupled via an optical interface to each end
182
+ of the crystal. The entire assembly was performed
183
+ in a glovebox, where the humidity was maintained
184
+ to be less than 10 ppm (H2O) using Ar gas and
185
+ a molecular sieve trap. Before the assembly, all
186
+ parts were cleaned using diluted Citranox liquid
187
+ with sonication and baked in a vacuum oven for
188
+ more than 12 h. After assembly, the detector was
189
+ delivered to the Yangyang underground laboratory
190
+ (Y2L), which has ∼700 m of rock overburden (33).
191
+ From the crystal growth to Y2L delivery, it took less
192
+ than three weeks and minimized the cosmogenic
193
+ activation in the crystal.
194
+ 3.2
195
+ Shielding structure
196
+ The background contamination levels of the
197
+ NaI-037 crystal were evaluated using, the same
198
+ experimental apparatus as that used for the NaI(Tl)
199
+ crystal R&D at the Y2L (28, 34). It includes an
200
+ array of 12 CsI(Tl) crystals surrounded by 10 cm
201
+ copper, 5 cm polyethylene, 15 cm lead, and 30 cm
202
+ liquid scintillator-loaded mineral oil (35, 36) as a
203
+ radiation shield. The detector was installed inside
204
+ the CsI(Tl) array, as shown in Figure 2.
205
+ Figure 2. A schematic view of the Y2L setup. The
206
+ NaI-037 crystal (red circle) was installed inside the
207
+ CsI(Tl) crystal array (blue squares).
208
+ 3.3
209
+ Electronics
210
+ The PMTs attached to the NaI-037 crystal had
211
+ two readouts each, a high-gain signal from the
212
+ anode and a low-gain signal from the fifth-stage
213
+ dynode. The anode signal was amplified by a
214
+ factor of 30, whereas the dynode signal was
215
+ amplified by a factor of 100 using a custom-
216
+ made preamplifier. The amplified signals were
217
+ digitized by 500 MHz, 12-bit flash analog-to-digital
218
+ converters (FADCs). Triggers from the individual
219
+ Frontiers
220
+ 3
221
+
222
+ YPARINEOY
223
+ NOUYPCCsl(T)Crystals
224
+ Nal(m)Crystal
225
+ Copper
226
+ Folvetnviene
227
+ Lead
228
+ MineralOilH. Lee et al.
229
+ channels were generated by the field-programmable
230
+ gate arrays (FPGAs) embedded in the FADC. The
231
+ final trigger was generated in the trigger and clock
232
+ board (TCB) when an anode signal corresponding
233
+ to one or more photoelectrons (PEs) occurred in
234
+ each PMT within a 200 ns time window. The anode
235
+ and dynode signals were recorded whenever the
236
+ anode signal produced a trigger.
237
+ Signals from the CsI(Tl) crystals were amplified
238
+ by a factor of 10 and digitized in a charge-sensitive
239
+ 62.5 MHz FADC (SADC). The SADC provided the
240
+ integrated charge and the time of the signal. An
241
+ integration time of 2048 ns was used to record the
242
+ CsI(Tl) signals considering their decay time. The
243
+ SADC channels did not generate triggers.
244
+ If the trigger condition was satisfied, the TCB sent
245
+ trigger signals to the FADC and SADC to store the
246
+ signals from the NaI(Tl) and the CsI(Tl) crystals.
247
+ The FADC stored an 8 µs long waveform starting
248
+ approximately 2.4 µs before the time of the trigger
249
+ position. The SADC stored the maximum integrated
250
+ charge within an 8 µs search window. This system
251
+ is similar to the one used in the COSINE-100 data
252
+ acquisition (37).
253
+ Energy [keV]
254
+ 0
255
+ 10
256
+ 20
257
+ 30
258
+ 40
259
+ 50
260
+ 60
261
+ 70
262
+ 80
263
+ Entries
264
+ 0
265
+ 50
266
+ 100
267
+ 150
268
+ 200
269
+ Am
270
+ 241
271
+ Figure 3. Anode energy distribution obtained
272
+ using a 241Am source.
273
+ 3.4
274
+ Energy calibration and light yields
275
+ The energy calibration of the anode signal was
276
+ done using a 59.54 keV X-ray emitted from 241Am.
277
+ Figure 3 shows the anode energy spectrum. A clear
278
+ peak at 59.54 keV resulting from the 241Am source
279
+ is shown together with the 127I X-ray escape peak
280
+ around 30 keV. The dynode signal was calibrated
281
+ using the photopeaks corresponding to 214Bi(609
282
+ keV) and 40K(1460 keV) contaminants in the
283
+ crystal.
284
+ The charge distribution of the single photoelectron
285
+ (SPE) was obtained by identifying the isolated
286
+ clusters at the decay tail of the 59.54 keV X-ray
287
+ signal from the 241Am source (3-5 µs after the
288
+ signal start). The light yield was determined from
289
+ the ratio of the total deposited charge and the mean
290
+ of the SPE charge for the 59.54 keV X-ray data. In
291
+ this crystal, a light yield of 17.8±0.6 number of
292
+ photoelectron (NPE)/keV was obtained. It is similar
293
+ to the result for the NaI-036 crystal, which has the
294
+ highest light yield among the previously developed
295
+ low-background NaI(Tl) crystals using the Astro-
296
+ grade powder (28). This light yield is also larger
297
+ than those of the detectors used in the COSINE-100
298
+ and DAMA/LIBRA experiments, as summarized in
299
+ table 1.
300
+ 4
301
+ UNDERSTANDING THE
302
+ BACKGROUND IN THE SPECTRUM
303
+ 4.1
304
+ 40K background
305
+ 40K is one of the most problematic background
306
+ sources in the search for weakly interacting massive
307
+ particles (WIMP) using NaI(Tl) crystals. The X-
308
+ rays/Auger electrons from 40K decays produce
309
+ 3.2 keV energy signals, similar to the energy signals
310
+ expected for a WIMP-nuclei interaction (30, 31, 38).
311
+ The 40K decays also emit 1460 keV γ rays, which
312
+ can escape from the NaI(Tl) crystal and hit the
313
+ surrounding CsI(Tl) crystals, leading to a double
314
+ coincidence with the 3.2 keV X-rays.
315
+ Figure 4 shows the tagged low-energy spectra
316
+ from the NaI(Tl) crystal by requiring the detection
317
+ of the 1460 keV γ ray in the CsI(Tl) crystals. The
318
+ Frontiers
319
+ 4
320
+
321
+ H. Lee et al.
322
+ 40K background level in the NaI(Tl) crystal was
323
+ determined by comparing the measured coincidence
324
+ rate from a GEANT4-based simulated data, as
325
+ described in Ref. (39). By accumulating more than
326
+ six months of data, the K level was measured to be
327
+ 8.3±4.6 ppb, which was compared with the other
328
+ NaI(Tl) crystals listed in Table 1. It is well below
329
+ our goal of 20 ppb, consistent with the results from
330
+ the DAMA/LIBRA crystals (34, 40) and previously
331
+ developed NaI-035 and NaI-036 crystals with the
332
+ Astro-grade powder.
333
+ 1
334
+ 2
335
+ 3
336
+ 4
337
+ 5
338
+ 6
339
+ Energy (keV)
340
+ 0
341
+ 1
342
+ 2
343
+ 3
344
+ 4
345
+ 5
346
+ 6
347
+ 7
348
+ 8
349
+ Number of Events
350
+ Data
351
+ Fit(Gaussian+Constant)
352
+ Gaussian Component
353
+ Figure 4. Energy deposition of the 3.2 keV
354
+ 40K coincidence events in the NaI-037 crystal.
355
+ The model of the energy spectrum assumes a
356
+ combination of a Gaussian 40K signal and a constant
357
+ background.
358
+ 4.2
359
+ α analysis
360
+ Alpha-induced events inside the NaI(Tl) crystals
361
+ can be identified using the fast decay times of
362
+ their corresponding signals. The charge-weighted
363
+ duration time, called the meantime, is defined as
364
+ ⟨t⟩ = ΣiAiti
365
+ ΣiAi
366
+ ,
367
+ (1)
368
+ where A and t are the charge and time of the i-th
369
+ digitized bin of a signal waveform, respectively.
370
+ The meantime is estimated within 1500 ns from the
371
+ pulse starting timing. Figure 5 shows a scatter plot
372
+ of the energy versus the meantime for the NaI-037
373
+ 0.2
374
+ 0.25
375
+ 0.3
376
+ 0.35
377
+ s)
378
+ µ
379
+ Meantime (
380
+ 1
381
+ 2
382
+ 3
383
+ 4
384
+ Energy (MeV)
385
+ Figure 5. Scatter plot of the meantime versus the
386
+ energy distribution events measured over 7.8 days
387
+ for the NaI-037 crystal. The α events (red dots) and
388
+ the γ/β events (black dots) are separated clearly.
389
+ crystal. In the figure, the populations of γ/β and
390
+ α events can be separated clearly due to the faster
391
+ decay times of the α-induced events.
392
+ 4.3
393
+ 210Pb background
394
+ In the NaI(Tl) crystal experiments, the dominant
395
+ background source in the low-energy signal region
396
+ is from 210Pb (31, 41, 42). The 210Pb activity can be
397
+ estimated from the alpha-decay studies, because the
398
+ α decays of 210Po originate from the β decays of
399
+ 210Pb. Due to the decay time of 200 days of 210Po,
400
+ the amount of 210Pb produced can be estimated
401
+ using a time-dependent fit of the alpha rate as
402
+ follows:
403
+ N = NPb210
404
+
405
+ 1 − e−(t−t0)/τP o210
406
+
407
+ + C,
408
+ (2)
409
+ where N is the total alpha rate, NPb210 is the
410
+ amount of 210Pb at the equilibrium state, t0 is the
411
+ time difference between 210Pb contamination and
412
+ the start time of data taking, τPo210 is the mean
413
+ lifetime of 210Po, approximately 200 days, and C
414
+ represents the long-lived components from 238U
415
+ and 232Th chains. Figure 6 shows the measured
416
+ total alpha rates in the NaI-037 crystal over the
417
+ detector running time. The 210Pb activity in the
418
+ crystal was estimated to be 0.38±0.10 mBq/kg,
419
+ Frontiers
420
+ 5
421
+
422
+ H. Lee et al.
423
+ which is lower than the COSINE-100 crystals and
424
+ is consistent with the activity in the NaI-036 crystal
425
+ produced using the Astro-grade powder. However,
426
+ this activity is slightly higher than the DAMA
427
+ crystals and another crystal NaI-036 grown with
428
+ the same Astro-grade powder. The 0.4 mBq/kg
429
+ level contamination of 210Pb is enough to reach
430
+ 1 count/kg/keV/day background level, similar to
431
+ the activity in the DAMA/LIBRA detectors, as
432
+ described in Ref. (28).
433
+ 100
434
+ 150
435
+ 200
436
+ Days from crystal growing
437
+ 0
438
+ 0.1
439
+ 0.2
440
+ 0.3
441
+ 0.4
442
+ 0.5
443
+ Activity (mBq/kg)
444
+ Data
445
+ Fit
446
+ Asymptotic Line
447
+ Figure 6. The total alpha rate in the NaI-037
448
+ crystal as a function of time, modeled with 210Po
449
+ assuming contamination of 222Rn (and/or 210Pb).
450
+ The asymptotic line corresponds to the rate of total
451
+ alpha events in the equilibrium state.
452
+ 4.4
453
+ 232Th background
454
+ Contaminants from the 228Th subchain in the
455
+ 232Th family can be estimated by deploying the
456
+ time-delayed α–α coincident events of 220Rn and
457
+ 216Po. The alpha decay of 216Po has a half-life of
458
+ 0.145 s following its production via alpha decay of
459
+ 220Rn. Owing to the short half-life of 216Po, it is
460
+ straightforward to select two successive α particles
461
+ with almost no random coincident events.
462
+ The presence of the coincident events is shown
463
+ in figure 7(a) as the distribution of the time gap
464
+ between those two α events. The exponential
465
+ component indicates the contamination from 232Th,
466
+ corresponding to below 0.39 ppt (90% confidence
467
+ level). The 232Th concentration in the NaI-037
468
+ crystal is the lowest among the other NaI(Tl)
469
+ crystals, as summarized in table 1.
470
+ 4.5
471
+ 238U background
472
+ 238U is one of the common radioisotopes because
473
+ of its long half-life . The 238U content in the
474
+ background can be studied using the time-delayed
475
+ β–α coincident events, similar to the calculation of
476
+ the 232Th background. This method exploits the α
477
+ decay of 214Po with a half-life of 164.3 µs, while
478
+ 214Bi, the parent particle of 214Po, undergoes β
479
+ decay. Due to the 50 µs dead time of the trigger
480
+ system, the coincident events with delay times
481
+ greater than 50 µs can be tagged. The results are
482
+ shown in figure 7. The 238U activity of NaI-037 was
483
+ 1.02±0.58 ppt, similar to that observed for the other
484
+ NaI(Tl) crystals, as given in Table 1.
485
+ 4.6
486
+ External Background
487
+ Because of the small size of the NaI-037 crystal
488
+ and no liquid scintillator active veto, a significantly
489
+ higher background contribution is expected from
490
+ the external background compared to those found
491
+ in the COSINE-100 crystals (30, 41). The PMTs
492
+ attached to the NaI(Tl) and the CsI(Tl) crystals are
493
+ the primary sources of external background. In this
494
+ study, the external background contributions were
495
+ simulated using the GEANT4-based simulation
496
+ toolkit used for the COSINE-100 background
497
+ modeling (30, 41).
498
+ 4.7
499
+ Cosmogenic radionuclides
500
+ The
501
+ cosmogenic
502
+ production
503
+ of
504
+ radioactive
505
+ isotopes in the NaI(Tl) crystal is mainly due to long-
506
+ lived nuclides such as 3H and 22Na (30, 44). The
507
+ NaI-037 crystal was grown in Daejeon, Korea (70
508
+ m in altitude) and delivered underground within a
509
+ month. Based on the previous study, one-month
510
+ exposure time near sea level can produce 0.004
511
+ mBq/kg of 3H and 0.05 mBq/kg of 22Na (44),
512
+ respectively.
513
+ Frontiers
514
+ 6
515
+
516
+ H. Lee et al.
517
+ 0
518
+ 0.2
519
+ 0.4
520
+ 0.6
521
+ 0.8
522
+ 1
523
+ Time (s)
524
+ 0
525
+ 1
526
+ 2
527
+ 3
528
+ 4
529
+ Number of Events
530
+ Data
531
+ Fit(Exponential+Constant)
532
+ Exponential Component
533
+ Constant
534
+ Figure 7a. Time differen ofbetween two α decays of
535
+ the 220Rn–216Po decay chain.
536
+ 200
537
+ 400
538
+ 600
539
+ 800
540
+ 1000
541
+ s)
542
+ µ
543
+ Time (
544
+ 0
545
+ 2
546
+ 4
547
+ 6
548
+ 8
549
+ 10
550
+ Number of Events
551
+ Data
552
+ Fit(Exponential+Constant)
553
+ Exponential Component
554
+ Constant
555
+ Figure 7b. Time difference between the 214Po α
556
+ decay and 214Bi β decay.
557
+ Figure 7. Time difference distributions of data (black dots) and the exponential fits to them (red-solid
558
+ line).
559
+ Table 1. Measured radioactive contaminants in the NaI-037 crystal, C6 of COSINE-100 (30), DAMA
560
+ crystals (40, 43), and the previously grown NaI-035 and NaI-036 crystals using the Astro-grade
561
+ powder (28).The upper limits are given at a 90% confidence level.
562
+ Crystal
563
+ Mass (kg)
564
+ LY (NPE/keV)
565
+ 40K (ppb)
566
+ 210Pb (mBq/kg)
567
+ 232Th (ppt)
568
+ 238U (ppt)
569
+ NaI-037
570
+ 0.71
571
+ 17.8±0.6
572
+ 8.3±4.6
573
+ 0.44±0.09
574
+ 0.2±0.3
575
+ 1.0±0.6
576
+ NaI-035
577
+ 0.61
578
+ 11.8±1.8
579
+ <42
580
+ 0.01±0.02
581
+ 1.7±0.5
582
+ 0.9±0.3
583
+ NaI-036
584
+ 0.78
585
+ 17.1±0.5
586
+ <53
587
+ 0.42±0.27
588
+ <4.9
589
+ 36.5±3.9
590
+ COSINE-100
591
+ 12.5
592
+ 14.6±1.5
593
+ 16.8±2.5
594
+ 1.87±0.09
595
+ 0.7±0.2
596
+ <0.02
597
+ DAMA
598
+ 9.7
599
+ 5–10
600
+ <20
601
+ 0.01–0.03
602
+ 0.5–7.5
603
+ 0.7–10
604
+ 5
605
+ BACKGROUND MODELING
606
+ For a quantitative understanding of the background
607
+ in the NaI-037 crystal, GEANT4-based simulation,
608
+ developed for the background modeling of the
609
+ COSINE-100 NaI(Tl) crystals (30, 41) and also
610
+ used in the previously grown crystals using the
611
+ Astro-grade powder (28), was performed. The input
612
+ values of the contamination levels are obtained
613
+ from Table 1. A simultaneous fit was done to
614
+ the single-hit low energy (3–60 keV), single-
615
+ hit high energy (60 keV–3 MeV), multiple-hit
616
+ low energy, and multiple-hit high energy events
617
+ using the log-likelihood method. A multiple-hit
618
+ event corresponds to one or more coincident
619
+ hits in any of the surrounding CsI(Tl) crystals.
620
+ The backgrounds from the PMTs attached to the
621
+ NaI(Tl) and CsI(Tl) crystals were measured using
622
+ a high-purity germanium detector (30, 31). These
623
+ values were constrained to be within 50% of
624
+ the measured result because the exact locations
625
+ of such radioisotopes are uncertain. The long-
626
+ lived cosmogenic radioisotopes were constrained
627
+ to be within 50% of their calculation production
628
+ values whereas the other short-lived cosmogenic
629
+ components were floated. Figure 9 and Table 2
630
+ show the fitted results for the NaI-037 crystal
631
+ on all simulated background components and the
632
+ Frontiers
633
+ 7
634
+
635
+ H. Lee et al.
636
+ Energy [keV]
637
+ 10
638
+ 20
639
+ 30
640
+ 40
641
+ 50
642
+ 60
643
+ Counts/da/kg/keV
644
+ 2
645
+
646
+ 10
647
+ 1
648
+
649
+ 10
650
+ 1
651
+ 10
652
+ 2
653
+ 10
654
+ Data
655
+ Internal
656
+ Cosmogenic
657
+ External
658
+ Figure 9a. Single-hit low-energy (2–60 keV)
659
+ Energy [keV]
660
+ 500
661
+ 1000
662
+ 1500
663
+ 2000
664
+ 2500
665
+ 3000
666
+ Counts/da/kg/keV
667
+ 3
668
+
669
+ 10
670
+ 2
671
+
672
+ 10
673
+ 1
674
+
675
+ 10
676
+ 1
677
+ 10
678
+ 2
679
+ 10
680
+ Data
681
+ Internal
682
+ Cosmogenic
683
+ External
684
+ Figure 9b. Single-hit high-energy (60–3000 keV)
685
+ Energy [keV]
686
+ 10
687
+ 20
688
+ 30
689
+ 40
690
+ 50
691
+ 60
692
+ Counts/da/kg/keV
693
+ 2
694
+
695
+ 10
696
+ 1
697
+
698
+ 10
699
+ 1
700
+ 10
701
+ 2
702
+ 10
703
+ Data
704
+ Internal
705
+ Cosmogenic
706
+ External
707
+ Figure 9c. Multiple-hit low-energy (2–60 keV)
708
+ Energy [keV]
709
+ 500
710
+ 1000
711
+ 1500
712
+ 2000
713
+ 2500
714
+ 3000
715
+ Counts/da/kg/keV
716
+ 3
717
+
718
+ 10
719
+ 2
720
+
721
+ 10
722
+ 1
723
+
724
+ 10
725
+ 1
726
+ 10
727
+ 2
728
+ 10
729
+ Data
730
+ Internal
731
+ Cosmogenic
732
+ External
733
+ Figure 9d. Multiple-hit high-energy (60–3000 keV)
734
+ Figure 9. Measured single-hit and multiple-hit background spectra of the NaI-037 (black point) crystal
735
+ fitted with the different simulated background components using a simultaneous fit of four channels using
736
+ the log-likelihood method. The external component (purple-hatched area) is the dominant contributor.
737
+ summary of the fitted radioactive contaminants,
738
+ respectively. The overall energy spectra match
739
+ the data for the single-hit and multiple-hit events
740
+ satisfactorily.
741
+ The level of the fitted internal
742
+ components is similar to the previously grown
743
+ NaI-036 crystal (28).
744
+ The expected background level in the COSINE-
745
+ 200 crystal can be studied from the simulated
746
+ background by assuming a 12.5 kg detector in the
747
+ COSINE-100 shielding, as described in Ref. (28).
748
+ If the measured backgrounds, given in Table 2 for
749
+ the simulated study, are considered, a background
750
+ level of approximately 0.5 counts/kg/keV/day in the
751
+ 1–6 keV energy region is obtained, which is similar
752
+ to the result for the NaI-036 crystal in the previous
753
+ study (28). This is a slightly higher background
754
+ level than observed from the NaI-035 crystal owing
755
+ to the higher 210Pb contamination. However, it
756
+ is still less than 1 count/kg/keV/day, the target
757
+ background level for the COSINE-200 experiment.
758
+ 6
759
+ CONCLUSION
760
+ In this article, we presented the performance of the
761
+ first ultra-low background NaI(Tl) crystal produced
762
+ Frontiers
763
+ 8
764
+
765
+ H. Lee et al.
766
+ Table
767
+ 2. Summary of the fitted radioactive
768
+ contaminants in the modeling of the NaI-037
769
+ crystal.
770
+ Background source
771
+ Isotope
772
+ Activity (mBq/kg)
773
+ Internal
774
+ 238U
775
+ 0.025 ± 0.35
776
+ 228Th
777
+ 0.0065 ± 0.00025
778
+ 40K
779
+ 0.17 ± 0.047
780
+ 210Pb
781
+ 0.36 ± 0.11
782
+ Cosmogenic
783
+ 125I
784
+ 0.40 ± 0.0015
785
+ 121Te
786
+ 0.80 ± 0.0029
787
+ 121mTe
788
+ 0.063 ± 0.0096
789
+ 123mTe
790
+ 0.045 ± 0.099
791
+ 125mTe
792
+ 0.14 ± 0.011
793
+ 127mTe
794
+ 0.16 ± 0.10
795
+ 109Cd
796
+ 0.0071 ± 0.0010
797
+ 113Sn
798
+ 0.020 ± 0.00094
799
+ 22Na
800
+ 0.050 ± 0.010
801
+ 3H
802
+ 0.0037 ± 0.0097
803
+ NaI PMTs
804
+ 238U
805
+ 48.83 ± 5.90
806
+ 228Th
807
+ 23.80 ± 5.70
808
+ 40K
809
+ 58.07 ± 17.82
810
+ CsI PMTs
811
+ 238U
812
+ 27.64 ± 6.15
813
+ 228Th
814
+ 24.18 ± 6.10
815
+ 40K
816
+ 378.28 ± 17.74
817
+ using the direct purification of the NaI powder in
818
+ our facility as a part of a program for the next-
819
+ generation COSINE-200 experiment. The results
820
+ of this study show a similar quantity of internal
821
+ background contamination in the crystals grown
822
+ using commercial Astro-grade powder. It indicates
823
+ that the direct powder purification and crystal
824
+ growth procedures employed at our facility can
825
+ provide suitable NaI(Tl) crystals for the COSINE-
826
+ 200 experiment. Based on the experience of
827
+ developing ultra-pure NaI(Tl) crystals, we are
828
+ moving to full-size crystal growth with our purified
829
+ powder.
830
+ ACKNOWLEDGMENTS
831
+ We thank Korea Hydro and Nuclear Power Co., Ltd.
832
+ (KHNP) for providing the underground laboratory
833
+ space at Yangyang. This work is supported by the
834
+ Institute for Basic Science (IBS) under the project
835
+ code IBS-R016-A1.
836
+ Frontiers
837
+ 9
838
+
839
+ H. Lee et al.
840
+ REFERENCES
841
+ 1 .Clowe D, et al.
842
+ A direct empirical proof of
843
+ the existence of dark matter. Astrophys. J. 648
844
+ (2006) L109. doi:10.1086/508162.
845
+ 2 .Aghanim N, et al.
846
+ Planck 2018 results. VI.
847
+ Cosmological parameters. Astron. Astrophys.
848
+ 641 (2020) A6.
849
+ doi:10.1051/0004-6361/
850
+ 201833910. [Erratum: Astron.Astrophys. 652,
851
+ C4 (2021)].
852
+ 3 .Bertone G, Hooper D. History of dark matter.
853
+ Rev. Mod. Phys. 90 (2018) 045002.
854
+ doi:10.
855
+ 1103/RevModPhys.90.045002.
856
+ 4 .Undagoitia TM, Rauch L. Dark matter direct-
857
+ detection experiments. J. Phys. G 43 (2016)
858
+ 013001. doi:10.1088/0954-3899/43/1/013001.
859
+ 5 .Schumann M.
860
+ Direct Detection of WIMP
861
+ Dark Matter: Concepts and Status.
862
+ J. Phys.
863
+ G 46 (2019) 103003. doi:10.1088/1361-6471/
864
+ ab2ea5.
865
+ 6 .Bernabei R, et al.
866
+ Final model independent
867
+ result of DAMA/LIBRA-phase1.
868
+ Eur. Phys.
869
+ J. C 73 (2013) 2648.
870
+ doi:10.1140/epjc/
871
+ s10052-013-2648-7.
872
+ 7 .Bernabei R, et al.
873
+ First model independent
874
+ results from DAMA/LIBRA-phase2.
875
+ Nucl.
876
+ Phys. Atom. Energy 19 (2018) 307.
877
+ doi:10.
878
+ 15407/jnpae2018.04.307.
879
+ 8 .Savage
880
+ C,
881
+ et
882
+ al.
883
+ Compatibility
884
+ of
885
+ DAMA/LIBRA
886
+ dark
887
+ matter
888
+ detection
889
+ with other searches. JCAP 0904 (2009) 010.
890
+ doi:10.1088/1475-7516/2009/04/010.
891
+ 9 .Ko
892
+ YJ,
893
+ et
894
+ al.
895
+ Comparison
896
+ between
897
+ DAMA/LIBRA and COSINE-100 in the light
898
+ of Quenching Factors. JCAP 1911 (2019) 008.
899
+ doi:10.1088/1475-7516/2019/11/008.
900
+ 10 .Workman RL, et al. Review of Particle Physics.
901
+ PTEP 2022 (2022) 083C01. doi:10.1093/ptep/
902
+ ptac097.
903
+ 11 .Kim KW, et al. Tests on NaI(Tl) crystals for
904
+ WIMP search at the Yangyang Underground
905
+ Laboratory. Astropart. Phys. 62 (2015) 249.
906
+ doi:10.1016/j.astropartphys.2014.10.004.
907
+ 12 .Xu J, et al. SABRE – A test of DAMA with
908
+ high-purity NaI(Tl) crystals. AIP Conf. Proc.
909
+ 1672 (2015) 040001. doi:10.1063/1.4927983.
910
+ 13 .Adhikari G, et al.
911
+ Initial Performance of
912
+ the COSINE-100 Experiment.
913
+ Eur. Phys.
914
+ J. C 78 (2018) 107.
915
+ doi:10.1140/epjc/
916
+ s10052-018-5590-x.
917
+ 14 .Fushimi KI. Low Background Measurement
918
+ by Means of NaI(Tl) Scintillator: Improvement
919
+ of
920
+ Sensitivity
921
+ for
922
+ Cosmic
923
+ Dark
924
+ Matter.
925
+ RADIOISOTOPES 67 (2018) 101. doi:10.3769/
926
+ radioisotopes.67.101.
927
+ 15 .Coarasa I, et al. ANAIS-112 sensitivity in the
928
+ search for dark matter annual modulation. Eur.
929
+ Phys. J. C 79 (2019) 233. doi:10.1140/epjc/
930
+ s10052-019-6733-4.
931
+ 16 .Amare J, et al. Performance of ANAIS-112
932
+ experiment after the first year of data taking.
933
+ Eur. Phys. J. C 79 (2019) 228. doi:10.1140/
934
+ epjc/s10052-019-6697-4.
935
+ 17 .Suerfu B, et al. Growth of Ultra-high Purity
936
+ NaI(Tl) Crystal for Dark Matter Searches. Phys.
937
+ Rev. Research 2 (2020) 013223. doi:10.1103/
938
+ PhysRevResearch.2.013223.
939
+ 18 .Adhikari G, et al. An experiment to search for
940
+ dark-matter interactions using sodium iodide
941
+ detectors. Nature 564 (2018) 83. doi:10.1038/
942
+ s41586-018-0739-1.
943
+ 19 .Adhikari G, et al.
944
+ Strong constraints from
945
+ COSINE-100 on the DAMA dark matter results
946
+ using the same sodium iodide target. Sci. Adv. 7
947
+ (2021) abk2699. doi:10.1126/sciadv.abk2699.
948
+ 20 .Adhikari G, et al. Searching for low-mass dark
949
+ matter via the Migdal effect in COSINE-100.
950
+ Phys. Rev. D 105 (2022) 042006. doi:10.1103/
951
+ PhysRevD.105.042006.
952
+ 21 .Adhikari G, et al.
953
+ An induced annual
954
+ modulation signature in COSINE-100 data by
955
+ DAMA/LIBRA’s analysis method (2022). doi:
956
+ 10.48550/arXiv.2208.05158.
957
+ 22 .Adhikari G, et al. Search for a Dark Matter-
958
+ Induced Annual Modulation Signal in NaI(Tl)
959
+ with the COSINE-100 Experiment.
960
+ Phys.
961
+ Rev. Lett. 123 (2019) 031302.
962
+ doi:10.1103/
963
+ PhysRevLett.123.031302.
964
+ 23 .Adhikari G, et al. Three-year annual modulation
965
+ search with COSINE-100. Phys. Rev. D 106
966
+ Frontiers
967
+ 10
968
+
969
+ H. Lee et al.
970
+ (2022) 052005.
971
+ doi:10.1103/PhysRevD.106.
972
+ 052005.
973
+ 24 .Shin K, et al. Reduction of the radioactivity in
974
+ sodium iodide (NaI) powder by recrystallization
975
+ method. J. Radioanal. Nucl. Chem. 317 (2018)
976
+ 1329. doi:10.1007/s10967-018-6006-y.
977
+ 25 .Shin K, et al. A facility for mass production
978
+ of ultra-pure NaI powder for the COSINE-200
979
+ experiment. JINST 15 (2020) C07031. doi:10.
980
+ 1088/1748-0221/15/07/C07031.
981
+ 26 .Ra S, et al. Scintillation crystal growth at the
982
+ CUP. PoS ICHEP2018 (2019) 668. doi:10.
983
+ 22323/1.340.0668.
984
+ 27 .Choi J, et al. Improving the light collection
985
+ using a new NaI(Tl)crystal encapsulation. Nucl.
986
+ Instrum. Meth. A 981 (2020) 164556. doi:10.
987
+ 1016/j.nima.2020.164556.
988
+ 28 .Park B, et al. Development of ultra-pure NaI(Tl)
989
+ detectors for the COSINE-200 experiment. Eur.
990
+ Phys. J. C 80 (2020) 814. doi:10.1140/epjc/
991
+ s10052-020-8386-8.
992
+ 29 .Shin K, et al. Mass production of ultra-pure
993
+ NaI powder for COSINE-200 (2023). Paper in
994
+ preparation.
995
+ 30 .Adhikari P, et al.
996
+ Background model for
997
+ the NaI(Tl) crystals in COSINE-100.
998
+ Eur.
999
+ Phys. J. C 78 (2018) 490. doi:10.1140/epjc/
1000
+ s10052-018-5970-2.
1001
+ 31 .Adhikari G, et al. Understanding NaI(Tl) crystal
1002
+ background for dark matter searches.
1003
+ Eur.
1004
+ Phys. J. C 77 (2017) 437. doi:10.1140/epjc/
1005
+ s10052-017-5011-6.
1006
+ 32 .Ra SJ, et al. Status of ultra-pure scintillating
1007
+ crystal growth for rare process experiments by
1008
+ CUP. JPCS 1468 (2020) 012144. doi:10.1088/
1009
+ 1742-6596/1468/1/012144.
1010
+ 33 .Prihtiadi H, et al.
1011
+ Muon detector for
1012
+ the COSINE-100 experiment.
1013
+ JINST 13
1014
+ (2018) T02007. doi:10.1088/1748-0221/13/02/
1015
+ T02007.
1016
+ 34 .Adhikari P, et al.
1017
+ Understanding internal
1018
+ backgrounds in NaI(Tl) crystals toward a 200
1019
+ kg array for the KIMS-NaI experiment. Eur.
1020
+ Phys. J. C 76 (2016) 185. doi:10.1140/epjc/
1021
+ s10052-016-4030-z.
1022
+ 35 .Lee HS, et al. First limit on WIMP cross section
1023
+ with low background CsI(Tl) crystal detector.
1024
+ Phys. Lett. B 633 (2006) 201. doi:10.1016/j.
1025
+ physletb.2005.12.035.
1026
+ 36 .Lee H, et al. Development of low-background
1027
+ CsI(Tl) crystals for WIMP search.
1028
+ Nucl.
1029
+ Instrum. Meth. A 571 (2007) 644–650. doi:10.
1030
+ 1016/j.nima.2006.10.325.
1031
+ 37 .Adhikari G, et al.
1032
+ The COSINE-100 Data
1033
+ Acquisition System. JINST 13 (2018) P09006.
1034
+ doi:10.1088/1748-0221/13/09/P09006.
1035
+ 38 .Amare J, et al. Analysis of backgrounds for
1036
+ the ANAIS-112 dark matter experiment. Eur.
1037
+ Phys. J. C 79 (2019) 412. doi:10.1140/epjc/
1038
+ s10052-019-6911-4.
1039
+ 39 .Kim KW, et al. Tests on NaI(Tl) crystals for
1040
+ WIMP search at the Yangyang Underground
1041
+ Laboratory. Astropart. Phys. 62 (2015) 249.
1042
+ doi:10.1016/j.astropartphys.2014.10.004.
1043
+ 40 .Bernabei R, et al.
1044
+ The DAMA/LIBRA
1045
+ apparatus. Nucl. Instrum. Meth. A 592 (2008)
1046
+ 297–315. doi:10.1016/j.nima.2008.04.082.
1047
+ 41 .Adhikari G, et al. Background modeling for
1048
+ dark matter search with 1.7 years of COSINE-
1049
+ 100 data. Eur. Phys. J. C 81 (2021) 837. doi:10.
1050
+ 1140/epjc/s10052-021-09564-0.
1051
+ 42 .Fushimi K, et al.
1052
+ Development of highly
1053
+ radiopure NaI(Tl) scintillator for PICOLON
1054
+ dark matter search project. PTEP 2021 (2021)
1055
+ 043F01. doi:10.1093/ptep/ptab020.
1056
+ 43 .Bernabei R, et al. Performances of the new high
1057
+ quantum efficiency pmts in dama/libra. JINST
1058
+ 7 (2012) P03009. doi:10.1088/1748-0221/7/03/
1059
+ P03009.
1060
+ 44 .de Souza EB, et al.
1061
+ Study of cosmogenic
1062
+ radionuclides in the COSINE-100 NaI(Tl)
1063
+ detectors. Astropart. Phys. 115 (2020) 102390.
1064
+ doi:10.1016/j.astropartphys.2019.102390.
1065
+ Frontiers
1066
+ 11
1067
+
BtE4T4oBgHgl3EQfFQxm/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
F9E1T4oBgHgl3EQf-wbm/content/tmp_files/2301.03574v1.pdf.txt ADDED
@@ -0,0 +1,1963 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ arXiv:2301.03574v1 [math.NA] 9 Jan 2023
2
+ SHARP PREASYMPTOTIC ERROR BOUNDS FOR THE
3
+ HELMHOLTZ h-FEM
4
+ J. GALKOWSKI∗ AND E. A. SPENCE†
5
+ Abstract.
6
+ In the analysis of the h-version of the finite-element method (FEM), with fixed
7
+ polynomial degree p, applied to the Helmholtz equation with wavenumber k ≫ 1, the asymptotic
8
+ regime is when (hk)pCsol is sufficiently small and the sequence of Galerkin solutions are quasioptimal;
9
+ here Csol is the norm of the Helmholtz solution operator, normalised so that Csol ∼ k for nontrapping
10
+ problems. The preasymptotic regime is when (hk)2pCsol is sufficiently small, and (for physical data)
11
+ one expects the relative error of the Galerkin solution to be controllably small.
12
+ In this paper, we prove the natural error bounds in the preasymptotic regime for the variable-
13
+ coefficient Helmholtz equation in the exterior of a Dirichlet, or Neumann, or penetrable obstacle (or
14
+ combinations of these) and with the radiation condition approximated either by a radial perfectly-
15
+ matched layer (PML) or an impedance boundary condition. Previously, such bounds for p > 1 were
16
+ only available for Dirichlet obstacles with the radiation condition approximated by an impedance
17
+ boundary condition.
18
+ Our result is obtained via a novel generalisation of the “elliptic-projection”
19
+ argument (the argument used to obtain the result for p = 1) which can be applied to a wide variety
20
+ of abstract Helmholtz-type problems.
21
+ AMS subject classifications. 35J05, 65N15, 65N30, 78A45
22
+ Key words. Helmholtz, FEM, high order, pollution effect, preasymptotic, perfectly-matched
23
+ layer, elliptic projection.
24
+ 1. Introduction.
25
+ 1.1. Informal statement of the main result. We consider the h-version of
26
+ the finite-element method (h-FEM), where accuracy is increased by decreasing the
27
+ meshwidth h while keeping the polynomial degree p constant, applied to the Helmholtz
28
+ equation.
29
+ Theorem 1.1 (Informal statement of the main result).
30
+ Let u be the solution to
31
+ the variable-coefficient Helmholtz equation, with wavenumber k > 0, in the exterior
32
+ of a Dirichlet, or Neumann, or penetrable obstacle (or combinations of these) and
33
+ with the radiation condition approximated either by a perfectly-matched layer (PML)
34
+ or an impedance boundary condition. Let Csol be the norm of the solution operator,
35
+ normalised so that Csol ∼ k for nontrapping problems.
36
+ Under the natural regularity assumptions on the domain and coefficients, if
37
+ (1.1)
38
+ (hk)2pCsol is sufficiently small
39
+ then the Galerkin solution uh exists, is unique, and satisfies
40
+ ∥u − uh∥H1
41
+ k(Ω) ≤ C
42
+
43
+ 1 + hk + (hk)pCsol
44
+
45
+ min
46
+ vh∈Hh ∥u − vh∥H1
47
+ k(Ω) ,
48
+ (1.2)
49
+ ∥u − uh∥L2(Ω) ≤ C
50
+
51
+ hk + (hk)pCsol
52
+
53
+ min
54
+ vh∈Hh ∥u − vh∥H1
55
+ k(Ω) .
56
+ (1.3)
57
+ Furthermore, if the data is k-oscillatory (in a sense made precise below), then
58
+ (1.4)
59
+ ∥u − uh∥H1
60
+ k(Ω)
61
+ ∥u∥H1
62
+ k(Ω)
63
+ ≤ C
64
+
65
+ 1 + hk + (hk)pCsol
66
+
67
+ (hk)p;
68
+ ∗Department of Mathematics, University College London, 25 Gordon Street, London, WC1H
69
+ 0AY, UK, [email protected]
70
+ †Department
71
+ of
72
+ Mathematical
73
+ Sciences,
74
+ University
75
+ of
76
+ Bath,
77
+ Bath,
78
+ BA2
79
+ 7AY,
80
+ UK,
81
82
+ 1
83
+
84
+ i.e., the relative H1
85
+ k error can be made controllably small by making (hk)2pCsol suffi-
86
+ ciently small.
87
+ The norm ∥ · ∥H1
88
+ k(Ω) in the bounds above is defined by
89
+ (1.5)
90
+ ∥v∥2
91
+ H1
92
+ k(Ω) := k−2 ∥∇v∥2
93
+ L2(Ω) + ∥v∥2
94
+ L2(Ω) .
95
+ The fact that, for oscillatory data, the relative H1
96
+ k error for the Helmholtz h-FEM
97
+ is controllably small if (hk)2pCsol is sufficiently small was famously identified for 1-d
98
+ nontrapping problems by the work of Ihlenburg and Babuˇska [25, 26]. The bounds
99
+ (1.2) and (1.3) have previously been obtained (i) for the Dirichlet obstacle problem
100
+ with impedance boundary conditions approximating the radiation condition [12, 40]
101
+ and (ii) for PML with constant-coefficients, no obstacle, and p = 1 [32].
102
+ The present paper proves the bounds (1.2), (1.3), and (1.4) assuming only that
103
+ the sesquilinear form is continuous, satisfies a G˚arding inequality, and satisfies certain
104
+ standard elliptic-regularity assumptions, therefore covering a variety of scatterers and
105
+ methods for truncating the exterior domain (to approximate the radiation condition).
106
+ Regarding the latter: in this paper we consider truncating with a PML or an imped-
107
+ ance boundary condition, but truncating with the exact Dirichlet-to-Neumann map
108
+ is also, in principle, covered by the abstract framework; see Remark 5.4 below.
109
+ 1.2. Statement of the main abstract result. Let H ⊂ H0 ⊂ H∗ be Hilbert
110
+ spaces with H0 identified with its dual and H ⊂ H0 compact. Let a : H × H → C be
111
+ a continuous sesquilinear form, i.e.,
112
+ (1.6) |a(u, v)| ≤ Ccont ∥u∥H ∥v∥H
113
+ and
114
+ a(λu, µv) = λ¯µa(u, v)
115
+ for all u, v ∈ H,
116
+ satisfying the G˚arding inequality
117
+ (1.7)
118
+ ℜa(v, v) ≥ CG1 ∥v∥2
119
+ H − CG2 ∥v∥2
120
+ H0
121
+ for all v ∈ H
122
+ for some CG1, CG2 > 0. We assume further that Ccont, c, C and all the other constants
123
+ in this section are independent of k.
124
+ Assumption 1.2 (“Elliptic regularity” assumptions on a).
125
+ Let Z0 = H0, Z1 =
126
+ H, and Zj ⊂ Zj−1 for j = 2, . . . , ℓ + 1 such that Zj is dense in Zj−1, and assume
127
+ that for all u ∈ H with
128
+ sup
129
+ v∈H, ∥v∥(Zj−2)∗=1
130
+ |a(u, v)| < ∞,
131
+ u ∈ Zj and
132
+ (1.8)
133
+ ∥u∥Zj ≤ C
134
+
135
+ ∥u∥H0 +
136
+ sup
137
+ v∈H, ∥v∥(Zj−2)∗=1
138
+ |a(u, v)|
139
+
140
+ ,
141
+ j = 2, . . . , ℓ + 1.
142
+ Assume further that for any w ∈ H such that
143
+ sup
144
+ w∈H, ∥v∥(Zj−2)∗=1
145
+ |(ℜa)(u, v)| < ∞,
146
+ w ∈ Zj with
147
+ (1.9)
148
+ ∥w∥Zj ≤ C
149
+
150
+ ∥u∥H0 +
151
+ sup
152
+ v∈H, ∥v∥(Zj−2)∗=1
153
+ |(ℜa)(u, v)|
154
+
155
+ ,
156
+ j = 2, . . . , ℓ + 1,
157
+ 2
158
+
159
+ where the sesquilinear form ℜa is defined by
160
+ (1.10)
161
+ (ℜa)(u, v) := 1
162
+ 2
163
+
164
+ a(u, v) + a(v, u)
165
+
166
+ .
167
+ Remark 1.3. Note that ℜa in (1.7) and (1.10) could be replaced by ℜ(eiωa), so
168
+ long as one uses the same value of ω in both conditions. Remark 4.4 below describes
169
+ a situation where this is useful.
170
+ Given g ∈ H∗, suppose that u ∈ H satisfies
171
+ (1.11)
172
+ a(u, v) = ⟨g, v⟩
173
+ for all v ∈ H.
174
+ Given a sequence of finite dimensional subspace {Hh}h>0 with Hh ⊂ H, the
175
+ sequence of Galerkin approximations of u, {uh}h>0, are defined by
176
+ (1.12)
177
+ a(uh, vh) = ⟨g, vh⟩ for all vh ∈ Hh.
178
+ Example 1.4. For the Helmholtz equation outside a Dirichlet obstacle with PML
179
+ truncation and Ω the truncated exterior domain, H0 = L2(Ω), H = H1
180
+ 0(Ω), and
181
+ Zj = Hj(Ω) ∩ H1
182
+ 0(Ω). Assumption 1.2 is then elliptic regularity for the Helmholtz
183
+ PML operator and its real part, which both hold if the coefficients of the Helmholtz
184
+ equation are in Cℓ−1,1, the PML scaling function is Cℓ,1, and ∂Ω is Cℓ,1 (see Lemma
185
+ 4.7 below).
186
+ Theorem 1.5 (Abstract generalisation of the elliptic-projection argument).
187
+ Let a : H × H → C satisfy (1.6), (1.7), and Assumption 1.2.
188
+ Suppose that
189
+ R∗ : H∗ → H defined by
190
+ (1.13)
191
+ a(w, R∗v) = ⟨w, v⟩
192
+ for all w ∈ H, v ∈ H∗,
193
+ is well defined and let
194
+ (1.14)
195
+ η(Hh) :=
196
+ sup
197
+ g∈H0,g̸=0
198
+ ∥(I − Π)R∗g∥H
199
+ ∥g∥H0
200
+ ,
201
+ where Π : H → Hh is the orthogonal projection. Then the solution, u, to (1.11) exists
202
+ and is unique and there exist C1, C2, C3 > 0 such that if h satisfies
203
+ (1.15)
204
+ η(Hh)∥I − Π∥Zℓ+1→H ≤ C1,
205
+ then the solution uh to (1.12) exists, is unique, and satisfies
206
+ ∥u − uh∥H ≤ C2
207
+
208
+ 1 + η(Hh)
209
+
210
+ min
211
+ wh∈Hh ∥u − vh∥H ,
212
+ (1.16)
213
+ ∥u − uh∥H0 ≤ C3 η(Hh) min
214
+ wh∈Hh ∥u − vh∥H .
215
+ (1.17)
216
+ If, in addition,
217
+ (1.18)
218
+ ∥g∥Zℓ−1 ≤ C ∥g∥H∗
219
+ for some C > 0, then there exists C4 > 0 such that if h satisfies (1.15) then
220
+ (1.19)
221
+ ∥u − uh∥H
222
+ ∥u∥H
223
+ ≤ C4
224
+
225
+ 1 + η(Hh)
226
+
227
+ ∥I − Π∥Zℓ+1→H ;
228
+ i.e.,
229
+ the
230
+ relative
231
+ error
232
+ in
233
+ H
234
+ can
235
+ be
236
+ made
237
+ controllably
238
+ small
239
+ by
240
+ making
241
+ η(Hh) ∥I − Π∥Zℓ+1→H sufficiently small.
242
+ 3
243
+
244
+ Theorem 1.5 includes the result that the sequence of Galerkin solutions are qua-
245
+ sioptimal with constant independent of k if η(Hh) is sufficiently small – with this the
246
+ so-called asymptotic regime (see the discussion in §1.3).
247
+ The bounds (1.16), (1.17), and (1.19) and the meshthreshold (1.15) in Theorem
248
+ 1.5 all involve the quantity η(Hh), which measures how well solutions of the adjoint
249
+ problem are approximated in the space Hh. Bounds on η(Hh) are given in [37, 38, 36,
250
+ 13, 6, 29, 19, 20, 3]; see the discussion in §1.3. The following bound on η(Hh) is proved
251
+ using the ideas in [6] (although the end result is phrased in a different way there); we
252
+ include it here both for completeness, and because it holds under the assumptions of
253
+ Theorem 1.5 (in fact, it only requires the regularity assumption (1.8) and not (1.9)).
254
+ Theorem 1.6 (Bound on η(Hh)). Under the assumptions of Theorem 1.5, there
255
+ exists C > 0 such that
256
+ (1.20)
257
+ η(Hh) ≤ C
258
+ � ⌊ℓ/2⌋−1
259
+
260
+ j=0
261
+ ∥(I − Π)∥Z2(j+1)→H + ∥(I − Π)∥Zℓ+1→H
262
+
263
+ 1 + ∥R∗∥H0→H
264
+ ��
265
+ .
266
+ Example 1.7. In §4 and §5 below we show how Helmholtz problems with the ra-
267
+ diation condition approximated by either a PML or an impedance boundary condition,
268
+ respectively, fit into the abstract framework of Theorems 1.5 and 1.6. In both these
269
+ cases, the norm of the adjoint solution operator, i.e., ∥R∗∥H0→H, is the same as the
270
+ norm of the solution operator of the original (non-adjoint) problem, which we denote
271
+ by Csol.
272
+ Furthermore, with {Hh}h>0 corresponding to the standard finite-element
273
+ spaces of piecewise degree-p polynomials on shape-regular simplicial triangulations,
274
+ indexed by the meshwidth h,
275
+ ∥(I − Π)∥Zm+1→H ≤ C(hk)m
276
+ for 0 ≤ m ≤ p.
277
+ The meshthreshold (1.15) then becomes that (hk)2ℓCsol is sufficiently small. Recall
278
+ that ℓ is a parameter in the elliptic-regularity assumptions (Assumption 1.2). If the
279
+ polynomial degree p is taken to be ℓ then (1.15) becomes (1.1). The bounds (1.16) and
280
+ (1.17) then become (1.2) and (1.3), respectively.
281
+ 1.3. Discussion of the context, novelty, and ideas behind Theorem 1.5.
282
+ The work of Ihlenburg and Babuˇska in 1-d. The celebrated work of [25, 26] studied
283
+ the h-FEM applied to the constant-coefficient Helmholtz equation in 1-d (a nontrap-
284
+ ping problem), and split the behaviour of the finite-element solutions as a function of
285
+ h into the so-called asymptotic and preasymptotic regimes.
286
+ The asymptotic regime is when h is small enough, as a function of k, for the
287
+ sequence of Galerkin solutions to be quasi-optimal uniformly in k, i.e.,
288
+ ∥u − uh∥H1
289
+ k(Ω) ≤ C min
290
+ vh∈Hh ∥u − vh∥H1
291
+ k(Ω)
292
+ with C > 0 independent of k. [26, Theorem 3.5] showed that a sufficient condition to
293
+ be in the asymptotic regime is “hk2/p sufficiently small”, with later work (discussed
294
+ below) then showing that a sufficient condition for nontrapping problems (when Csol ∼
295
+ k) is “(hk)pk sufficiently small”, with this condition then indicated to be necessary
296
+ by numerical experiments. Therefore, the pollution effect for the h-FEM, i.e., the
297
+ fact that one needs h ≪ k−1 to maintain accuracy, becomes less pronounced as p
298
+ increases.
299
+ 4
300
+
301
+ The preasymptotic regime is when the relative H1
302
+ k error is controllably small, uni-
303
+ formly as k → ∞, provided that the data is k-oscillatory, in the sense that it satisfies
304
+ the bound (1.18) 1. [26, Corollary 3.2] used the explicit form of the Helmholtz Green’s
305
+ function in 1-d to prove that if (hk)2pk sufficiently small then the finite-element solu-
306
+ tion is in the preasymptotic regime, with the numerical experiments in [26, Table 2]
307
+ (for p = 1, . . . , 6) indicating that this condition is also necessary. [26] also studied the
308
+ phase difference between the exact and finite-element solutions (following [23, 43]),
309
+ with [26, Theorem 3.2] showing that the difference between the true wavenumber and
310
+ the numerical wavenumber is bounded by C(hk)2pk. Thus the condition “(hk)2pk
311
+ sufficiently small” also controls this phase difference; see also [1, Equation 3.5].
312
+ Error bounds in the asymptotic regime using the Schatz argument.. We now out-
313
+ line the argument that gives the condition “(hk)pCsol sufficiently small” for quasiop-
314
+ timality, with this argument also used in the proof of Theorem 1.5. We work in the
315
+ setting of Examples 1.4 and 1.7; i.e., the PML approximation to the Helmholtz exte-
316
+ rior Dirichlet problem, so that H0 = L2(Ω) and H = H1
317
+ 0(Ω). The G˚arding inequality
318
+ (1.7) is then
319
+ ℜa(w, w) ≥ CG1 ∥w∥2
320
+ H1
321
+ k(Ω) − CG2 ∥w∥2
322
+ L2(Ω)
323
+ for all w ∈ H1
324
+ 0(Ω)
325
+ for CG1, CG2 > 0 (see Corollary 4.6 below). Combining the G˚arding inequality with
326
+ the Galerkin orthogonality
327
+ (1.21)
328
+ a(u − uh, vh) = 0
329
+ for all vh ∈ Hh,
330
+ we find that, for all vh ∈ Hh,
331
+ ∥u − uh∥2
332
+ H1
333
+ k(Ω) ≤ C−1
334
+ G1
335
+ ��a(u − uh, u − vh)
336
+ �� + C−1
337
+ G1CG2 ∥u − uh∥2
338
+ L2(Ω)
339
+ ≤ C−1
340
+ G1Ccont ∥u − uh∥H1
341
+ k(Ω) ∥u − vh∥H1
342
+ k(Ω) + C−1
343
+ G1CG2 ∥u − uh∥2
344
+ L2(Ω) ,
345
+ (1.22)
346
+ where Ccont is the continuity constant of the sesquilinear form a. Therefore, (1.22)
347
+ implies that a sufficient condition for quasioptimality is that the L2 error is sufficiently
348
+ small relative to the H1
349
+ k error.
350
+ By the definition of R∗ (1.13) (recalling that H = H1
351
+ 0(Ω) here) and Galerkin
352
+ orthogonality (1.21), for any vh ∈ Hh,
353
+ ∥u − uh∥2
354
+ L2(Ω) = a
355
+
356
+ u − uh, R∗(u − uh)
357
+
358
+ = a
359
+
360
+ u − uh, R∗(u − uh) − vh
361
+
362
+ ≤ Ccont ∥u − uh∥H1
363
+ k(Ω)
364
+ ��R∗(u − uh) − vh
365
+ ��
366
+ H1
367
+ k(Ω),
368
+ (1.23)
369
+ and thus, by the definition of η(Hh) (1.14) (recalling that H0 = L2(Ω)),
370
+ (1.24)
371
+ ∥u − uh∥L2(Ω) ≤ Ccontη(Hh) ∥u − uh∥H1
372
+ k(Ω) .
373
+ Combining this last inequality with (1.22), we see that a sufficient condition for qua-
374
+ sioptimality is that η(Hh) is sufficiently small. Schatz [42] was the first to use the
375
+ Aubin-Nitsche-type bound (1.24) with the G˚arding inequality, and thus the argument
376
+ above is often called the Schatz argument. The “adjoint approximability” concept,
377
+ and associated definition of η(Hh), was introduced by Sauter in [41].
378
+ 1The relative error can only be small for a certain subclass of data, since, given a finite-
379
+ dimensional subspace Hh, one can choose data such that the solution v ∈ H is orthogonal to Hh.
380
+ Then ∥u − uh∥2
381
+ H = ∥u∥2
382
+ H + ∥uh∥2
383
+ H ≥ ∥u∥2
384
+ H.
385
+ 5
386
+
387
+ The bound
388
+ (1.25)
389
+ η
390
+
391
+ Hh
392
+
393
+ ≤ C
394
+
395
+ hk + (hk)pCsol
396
+
397
+ under sufficient regularity of the coefficients and obstacle has now been proved for a
398
+ wide variety of Helmholtz problems, with this bound sharp by the recent results of [17].
399
+ The bound (1.25) therefore gives the sufficient condition “(hk)pCsol sufficiently small”
400
+ for quasioptimality, with this condition observed sharp for nontrapping problems in,
401
+ e.g., [6, Figures 3, 5, and 8] for p = 1, 2, 3, 4.
402
+ For p = 1, the bound (1.25) can be proved using only H2 regularity of the
403
+ Helmholtz solution, with the condition “hk2 sufficient small” for quasiopimality ob-
404
+ tained for 1-d problems in [2, Theorem 3.1], [11, Lemma 2.6], [27, Theorem 3], and
405
+ [33, Theorem 3.2], 2-d problems in [35, Proposition 8.2.7], and variable-coefficient
406
+ problems in 2- and 3-d in [22, 21].
407
+ For p > 1 the bound (1.25) is proved by a judicious splitting of the solution in
408
+ [37, 38, 13, 36] for constant-coefficient problems and [6, 29, 19, 20, 3] for variable-
409
+ coefficient problems. All these papers apart from [6] make the constant C in (1.25)
410
+ explicit in p under suitably analyticity/smoothness assumptions on the obstacle and
411
+ coefficients, and thus give results about the hp-FEM (showing that quasioptimality
412
+ holds if hk/p is sufficiently small and p/ log k is sufficiently large). In addition, all these
413
+ papers apart from [6] split the solution into “high-” and “low-” frequency components.
414
+ In constrast, [6] instead expands the solution in a series whose terms increase with
415
+ regularity, and with only the remainder satisfying a bound involving Csol; see Lemma
416
+ 2.2 below.
417
+ Bounds in the preasymptotic regime. Numerical experiments indicate that, at
418
+ least for nontrapping problems, the condition “(hk)2pCsol sufficiently small” for the
419
+ relative H1
420
+ k error to be controllably small is necessary and sufficient for 2- and 3-d
421
+ Helmholtz problems; see, e.g., [12, Figure 3]. Nevertheless, despite the fact that sharp
422
+ asymptotic error bounds have now been obtained for a variety of Helmholtz problems
423
+ in 2- and 3-d and for arbitrary p ∈ Z+, until now the sharp preasymptotic error bounds
424
+ were obtained only in the following cases.
425
+ 1. p = 1, the constant-coefficient Helmholtz equation with an impedance bound-
426
+ ary condition [44, Theorem 6.1] or PML (and no obstacle) [32, Theorem
427
+ 4.4], the variable-coefficient Helmholtz equation with truncation via the ex-
428
+ act Dirichlet-to-Neumann map [28, Theorem 4.1].
429
+ 2. p ∈ Z+, the constant-coefficient Helmholtz equation with no obstacle and
430
+ an impedance boundary condition approximating the radiation condition [12,
431
+ Theorem 5.1],
432
+ 3. p ∈ Z+, the variable-coefficient Helmholtz equation in the exterior of a Dirich-
433
+ let obstacle with an impedance boundary condition approximating the radi-
434
+ ation condition [40, Theorem 2.39].
435
+ The bounds in Point 1 for p = 1 come from the so-called elliptic projection argument,
436
+ which proves error bounds under the condition “(hk)p+1Csol is sufficiently small”; i.e.,
437
+ the sharp condition when p = 1, but not when p > 1. The initial ideas behind this
438
+ argument were introduced in the Helmholtz context in [15, 16] for interior-penalty
439
+ discontinuous Galerkin methods, and then further developed for the standard FEM
440
+ and continuous interior-penalty methods in [44, 45].
441
+ The bounds in Point 2 used an error-splitting argument (with this idea called
442
+ “stability-error iterative improvement”, and used earlier in [16, 44]) together with the
443
+ idea of using discrete Sobolev norms in the duality argument. The bounds in Point 3
444
+ 6
445
+
446
+ for variable-coefficients were obtained by repeating the constant-coefficient arguments
447
+ in Point 2, but now keeping track of how the constants depend on the coefficients.
448
+ The elliptic-projection argument. Theorem 1.5 is proved by generalising the
449
+ elliptic-projection argument, allowing it to prove error bounds under the sharp condi-
450
+ tion “(hk)2pCsol sufficiently small” for p > 1. We therefore recap the main ideas of the
451
+ elliptic-projection argument here, and then we explain below how we generalise this
452
+ argument. Here, and in the rest of the paper, C is used for a constant, independent
453
+ of h and k, but dependent on p, whose value may change line by line.
454
+ The bounds (1.2) and (1.3) come from the bounds
455
+ (1.26)
456
+ ∥u − uh∥H1
457
+ k(Ω) ≤ C
458
+
459
+ 1 + η(Hh)
460
+
461
+ min
462
+ vh∈Hh ∥u − vh∥H1
463
+ k(Ω)
464
+ and
465
+ (1.27)
466
+ ∥u − uh∥L2(Ω) ≤ Cη(Hh) min
467
+ vh∈Hh ∥u − vh∥H1
468
+ k(Ω)
469
+ and the bound (1.25) on η(Hh).
470
+ Observe that, by the consequence (1.22) of the
471
+ G˚arding inequality, the bound (1.26) follows from the bound (1.27).
472
+ To prove (1.27), the elliptic-projection argument writes (1.23) as
473
+ ∥u − uh∥2
474
+ L2(Ω) = a
475
+
476
+ u − uh, R∗(u − uh) − vh
477
+
478
+ = �a
479
+
480
+ u − uh, R∗(u − uh) − vh
481
+
482
+
483
+
484
+ (1 + c−2)(u − uh), R∗(u − uh) − vh
485
+
486
+ L2(Ω),
487
+ (1.28)
488
+ where
489
+ �a(u, v) :=
490
+
491
+
492
+ k−2A∇u · ∇v + u v.
493
+ Let �Π : H1
494
+ 0(Ω) → Hh be the solution of the variational problem
495
+ �a(wh, �Πv) = �a(wh, v)
496
+ for all wh ∈ Hh.
497
+ Since �a is coercive on H1
498
+ 0(Ω) and the continuity and coercivity constants of �a in
499
+ ∥ · ∥H1
500
+ k(Ω) are independent of k, �Π is well-defined by the Lax–Milgram theorem and
501
+ (1.29)
502
+ ��(I − �Π)v
503
+ ��
504
+ H1
505
+ k(Ω) ≤ C min
506
+ wh∈Hh ∥v − wh∥H1
507
+ k(Ω)
508
+ with C > 0 independent of k by C´ea’s lemma. The definition of �Π implies the Galerkin
509
+ orthogonality
510
+ (1.30)
511
+ �a
512
+
513
+ wh, (I − �Π)v
514
+
515
+ = 0
516
+ for all wh ∈ Hh.
517
+ We now choose vh = �ΠR∗(u − uh) in (1.28) so that, by (1.30), for all wh ∈ Hh,
518
+ ∥u − uh∥2
519
+ L2(Ω) = �a
520
+
521
+ v − wh, (I − �Π)R∗(u − uh)
522
+
523
+
524
+
525
+ (1 + c−2)(u − uh), (I − �Π)R∗(u − uh)
526
+
527
+ L2(Ω).
528
+ (1.31)
529
+ For the first term on the right-hand side of (1.31) we use the continuity of �a, (1.29),
530
+ and the definition of η(Hh) (1.14) to bound this term by
531
+ C ∥v − wh∥H1
532
+ k(Ω) η(Hh) ∥u − uh∥L2(Ω) .
533
+ 7
534
+
535
+ The second term on the right-hand side of (1.31) is bounded by
536
+ C ∥u − uh∥L2(Ω)
537
+ ��(I − �Π)R∗(u − uh)
538
+ ��
539
+ L2(Ω).
540
+ Using the Schatz argument for �a, one can show that
541
+ (1.32)
542
+ ��(I − �Π)R∗(u − uh)
543
+ ��
544
+ L2(Ω) ≤ Chk
545
+ ��(I − �Π)R∗(u − uh)
546
+ ��
547
+ H1
548
+ k(Ω)
549
+ and then (1.29) and the definition of η(Hh) (1.14) imply that the second term on the
550
+ right-hand side of (1.31) is bounded by
551
+ (1.33)
552
+ Chk η(Hh) ∥u − uh∥2
553
+ L2(Ω) ,
554
+ which can be absorbed into the left-hand side if hk η(Hh) is sufficiently small, giving
555
+ the result (1.27).
556
+ The ideas behind the proof of Theorem 1.5. We generalise the elliptic-projection
557
+ argument based on the observation that if �a(u, v) = a(u, v) + (Su, v)L2(Ω) with S a
558
+ self-adjoint smoothing operator, then the second term on the right-hand side of (1.31)
559
+ is replaced by
560
+ (1.34)
561
+
562
+ u − uh, S∗(I − �Π)R∗(u − uh)
563
+
564
+ L2(Ω)
565
+ (see (2.14) below). Using the Schatz argument for �a and the smoothing property of
566
+ S, the modulus of this term is bounded by
567
+ (1.35)
568
+ ��S∗(I − �Π)R∗(u − uh)
569
+ ��
570
+ L2(Ω) ≤ C(hk)p��(I − �Π)R∗(u − uh)
571
+ ��
572
+ H1
573
+ k(Ω)
574
+ (see (2.16) below). Provided that �Π still satisfies (1.29), the term (1.34) is therefore
575
+ bounded by
576
+ (1.36)
577
+ C(hk)pη(Hh) ∥u − uh∥2
578
+ L2(Ω) .
579
+ Comparing (1.32) and (1.35), and also (1.33) and (1.36), we see that this new argument
580
+ replaces the condition “hkη(Hh) sufficiently small” in the standard elliptic-projection
581
+ argument by the condition “(hk)pη(Hh) sufficiently small”, which is the condition
582
+ (hk)2pCsol sufficiently small” after using the bound (1.25) on η(Hh).
583
+ The challenge now is to ensure that the smoothing operator S is such that the
584
+ projection �Π is well-defined and satisfies (1.29). This is achieved in Lemma 2.1 below,
585
+ where a suitable S such that �a(u, v) = a(u, v) + (Su, v)L2(Ω) is coercive is construc-
586
+ ted. S is defined by an expansion in terms of the eigenfunctions of the (self-adjoint)
587
+ operator associated with the real part of the sesquilinear form a (defined by (1.10)).
588
+ 2. Proofs of the main results (Theorems 1.5 and 1.6).
589
+ 2.1. Construction of a regularizing operator that produces coercivity
590
+ when added to a.
591
+ Lemma 2.1. Suppose that a : H × H → C satisfies (1.6), (1.7), and Assumption
592
+ 1.2. Then there exists S : H0 → H0 self adjoint and c, C > 0 such that, with
593
+ (2.1)
594
+ �a(u, v) := a(u, v) + ⟨Su, v⟩H0,
595
+ (2.2)
596
+ ℜ�a(v, v) ≥ c ∥v∥2
597
+ H
598
+ for all v ∈ H,
599
+ 8
600
+
601
+ (2.3)
602
+ ∥S∥H0→Zj ≤ C,
603
+ j = 0, . . . , ℓ + 1
604
+ and �R : H∗ → H defined by
605
+ �a( �Rf, u) = ⟨f, u⟩
606
+ for all u ∈ H, f ∈ H∗,
607
+ (2.4)
608
+ is well defined with
609
+ (2.5)
610
+ ∥ �R∥Zj−2→Zj ≤ C,
611
+ 2 ≤ j ≤ ℓ + 1.
612
+ The proof of Lemma 2.1 uses the spectral theorem for bounded self-adjoint op-
613
+ erators, B : H → H∗, which we recap here. With H0 and H as in §1.2, let b be a
614
+ sesquilinear form on H satisfying b(u, v) = b(v, u), with associated operator B; i.e.,
615
+ b(u, v) = ⟨Bu, v⟩ for all u, v ∈ H. If b satisfies the G˚arding inequality (1.7) (with
616
+ a replaced by b) then there exist an orthonormal basis (in H0) of eigenfunctions of
617
+ B, {φj}∞
618
+ j=1, with associated eigenvalues satisfying λ1 ≤ λ2 ≤ . . . with λj → ∞ as
619
+ j → ∞. Furthermore, for all u ∈ H,
620
+ (2.6)
621
+ Bu =
622
+
623
+
624
+ j=1
625
+ λj⟨φj, u⟩φj
626
+ (where the sum converges in H∗); see, e.g., [34, Theorem 2.37]. Given a bounded
627
+ function f, we define f(B) : H0 → H0 by
628
+ (2.7)
629
+ f(B)u :=
630
+
631
+
632
+ j=1
633
+ f(λj)⟨φj, u⟩φj,
634
+ so that
635
+ ∥f(B)∥H0→H0 ≤
636
+ sup
637
+ λ∈[λ1,∞)
638
+ |f(λ)|.
639
+ Proof of Lemma 2.1. Let P : H → H∗ be the operator associated with the
640
+ sesquilinear form ℜa defined by (1.10), i.e., (ℜa)(u, v) = ⟨Pu, v⟩ for all u, v ∈ H;
641
+ observe that P is self-adjoint. Since (ℜa) also satisfies the G˚arding equality satis-
642
+ fied by a (1.7), the spectral theorem recapped above applies. Let {λj}∞
643
+ j=1 be the
644
+ eigenvalues of P, let ψ ∈ C∞
645
+ comp(R; [0, ∞)) be such that
646
+ (2.8)
647
+ x + ψ(x) ≥ 1
648
+ for x ≥ −λ1,
649
+ and let S := ψ(P), in the sense of (2.7).
650
+ We now use (1.9) to prove that S : H0 → Zj satisfying (2.3). Since ψ has compact
651
+ support, the function t �→ tmψ(t) is bounded for any m ≥ 0. Thus (2.7) implies that,
652
+ for any m ≥ 0,
653
+ (2.9)
654
+ ∥Pmψ(P)∥H0→H0 ≤ Cm.
655
+ By (1.9),
656
+ ∥ψ(P)∥H0→Zj ≤ Cℓ
657
+
658
+ ∥ψ(P)∥H0→H0 + ∥Pψ(P)∥H0→Zj−2
659
+
660
+ ,
661
+ j = 2, . . . , ℓ + 1,
662
+ so that, by induction and (2.9),
663
+ ∥S∥H0→Zℓ+1 = ∥ψ(P)∥H0→Zℓ+1 ≤ Cℓ
664
+ ⌈(ℓ+1)/2⌉
665
+
666
+ j=0
667
+ ��Pjψ(P)
668
+ ��
669
+ H0→H0 ≤ Cℓ.
670
+ 9
671
+
672
+ We now show that �a satisfies (2.2). By the definitions of P and S, (2.6), (2.7),
673
+ and the inequality (2.8), for all v ∈ H,
674
+ ℜ�a(v, v) = ℜa(v, v) + ⟨ψ(P)v, v⟩ = ⟨(P + ψ(P))v, v⟩ ≥ ∥v∥2
675
+ H0 .
676
+ Since ψ ≥ 0, S is positive, and thus ℜ�a(v, v) ≥ ℜa(v, v) for all v ∈ H, for any ǫ > 0
677
+ and for all v ∈ H,
678
+ ℜ�a(v, v) ≥ ǫℜa(v, v) + (1 − ǫ)ℜ�a(v, v) ≥ ǫCG1 ∥v∥2
679
+ H − CG2ǫ ∥v∥2
680
+ H0 + (1 − ǫ)∥v∥2
681
+ H0,
682
+ so that, choosing ǫ = min(
683
+ 1
684
+ 2CG2 , 1
685
+ 2), we have
686
+ ℜ�a(v, v) ≥ CG1
687
+ 2
688
+ min
689
+ � 1
690
+ CG2
691
+ , 1
692
+
693
+ ∥v∥2
694
+ H + 1
695
+ 2 ∥v∥2
696
+ H0 ;
697
+ i.e., �a is coercive. The existence of �R : H∗ → H satisfying (2.4) and ∥ �R∥H∗→H ≤ C
698
+ then follows from the Lax–Milgram theorem. Finally, to see that
699
+ ∥ �R∥Zj−2→Zj ≤ C,
700
+ 2 ≤ j ≤ ℓ + 1,
701
+ observe that, since S is self-adjoint and satisfies (2.3), for v ∈ (Zj−2)∗,
702
+ |a( �Rg, v)| = |�a( �Rg, v) − ⟨S �Rg, v⟩| ≤ |�a( �Rg, v)| + |⟨S �Rg, v⟩|
703
+ ≤ |⟨v, g⟩| + ∥v∥(Zj−2)∗∥S∥H→Zj−2∥( �R)∗∥H∗→H∥g∥H∗
704
+ ≤ ∥v∥(Zj−2)∗(∥g∥Zj−2 + C∥g∥H∗),
705
+ and the claim follows from (1.8).
706
+ 2.2. Proof Theorem 1.5 using Lemma 2.1. We claim it is sufficient to prove
707
+ the bounds (1.16) and (1.17) under the assumption of existence. Indeed, by uniqueness
708
+ of the variational problem (1.11), either of the bounds (1.16) or (1.17) under the
709
+ assumption of existence implies uniqueness of uh, and uniqueness implies existence
710
+ for the finite-dimensional Galerkin linear system.
711
+ We next show that the bound (1.16) follows from (1.17). Now, by the G˚arding
712
+ inequality (1.7), Galerkin orthogonality (1.21), and (1.17), for any vh ∈ Hh,
713
+ ∥u − uh∥2
714
+ H ≤ C
715
+ ���a(u − uh, u − vh)
716
+ �� + ∥u − uh∥2
717
+ H0
718
+
719
+ ≤ C
720
+
721
+ ∥u − uh∥H ∥u − vh∥H +
722
+
723
+ η(Hh) min
724
+ wh∈Hh ∥u − wh∥H
725
+ �2�
726
+ .
727
+ (2.10)
728
+ The bound (1.16) on the error in H then follows by using the inequality 2ab ≤ ǫa2 +
729
+ b2/ǫ for all a, b, ǫ > 0 in the first term on the right-hand side of (2.10), and then using
730
+ the inequality a2 + b2 ≤ (a + b)2 for a, b > 0.
731
+ We now prove (1.17) (using the ideas outlined in §1.3). By the definition of R∗,
732
+ Galerkin orthogonality (1.21), and the definition of �a (2.1)
733
+ ∥u − uh∥2
734
+ H0 = a
735
+
736
+ u − uh, R∗(u − uh)
737
+
738
+ = a
739
+
740
+ u − uh, R∗(u − uh) − vh
741
+
742
+ = �a
743
+
744
+ u − uh, R∗(u − uh) − vh
745
+
746
+
747
+
748
+ S(u − uh), R∗(u − uh) − vh
749
+
750
+ H0.
751
+ (2.11)
752
+ Let �Π : H → Hh be the solution of the variational problem
753
+ �a(wh, �Πv) = �a(wh, v)
754
+ for all wh ∈ Hh.
755
+ 10
756
+
757
+ Since �a is continuous and coercive, with constants independent of k (see (2.2), (1.6),
758
+ and (2.3)), by the Lax–Milgram lemma and C´ea’s lemma given k0 > 0 there exists
759
+ C > 0 such that for all k ≥ k0 and v ∈ H, �Π is well-defined with
760
+ (2.12)
761
+ ��(I − �Π)v
762
+ ��
763
+ H ≤ C min
764
+ wh∈Hh ∥v − wh∥H .
765
+ The definition of �Π implies the Galerkin orthogonality
766
+ (2.13)
767
+ �a
768
+
769
+ wh, (I − �Π)u
770
+
771
+ = 0
772
+ for all wh ∈ Hh.
773
+ We now choose vh = �ΠR∗(u − uh) in (2.11) so that, by (2.13), for all wh ∈ Hh,
774
+ (2.14)
775
+ ∥u − uh∥2
776
+ H0
777
+ = �a
778
+
779
+ u − wh, (I − �Π)R∗(u − uh)
780
+
781
+
782
+
783
+ u − uh, S∗(I − �Π)R∗(u − uh)
784
+
785
+ H0
786
+ ≤ C ∥u − wh∥H
787
+ ��(I − �Π)R∗(u − uh)
788
+ ��
789
+ H + ∥u − uh∥H0
790
+ ��S∗(I − �Π)R∗(u − uh)
791
+ ��
792
+ H0.
793
+ By (2.12) and the definition of η(Hh) (1.14),
794
+ (2.15)
795
+ ��(I − �Π)R∗(u − uh)
796
+ ��
797
+ H ≤ C min
798
+ wh∈Hh ∥R∗(u − uh) − wh∥H ≤ Cη(Hh) ∥u − uh∥H0 .
799
+ We now claim that the bound (1.17) follows if we can prove that, for all v ∈ H,
800
+ (2.16)
801
+ ��S∗(I − �Π)v
802
+ ��
803
+ H0 ≤ C∥I − Π∥Zℓ+1→H
804
+ ��(I − �Π)v
805
+ ��
806
+ H.
807
+ Indeed, we use (2.15) in the first term on the right-hand side of (2.14), and then (2.16)
808
+ with v = R∗(u − uh) in the second term on the right-hand side of (2.14) to obtain
809
+ ∥u − uh∥2
810
+ H0 ≤ Cη(Hh) ∥u − wh∥H ∥u − uh∥H0
811
+ + C∥I − Π∥Zℓ+1→H
812
+ ��(I − �Π)R∗(u − uh)
813
+ ��
814
+ H ∥u − uh∥H0 .
815
+ By (2.15), the last term on the right-hand side is ≤ C∥I−Π∥Zℓ+1→H η(Hh)∥u−uh∥2
816
+ H0
817
+ and (1.17) follows.
818
+ We now prove (2.16) by using the duality argument described in §1.3 (as part of
819
+ the Schatz argument). By the definition of �R (2.4) and Galerkin orthogonality (2.13),
820
+ for all wh ∈ Hh,
821
+ ��S∗(I − �Π)v
822
+ ��2
823
+ H0 =
824
+
825
+ SS∗(I − �Π)v, (I − �Π)v
826
+
827
+ H0 = �a
828
+ � �RSS∗(I − �Π)v − wh, (I − �Π)v
829
+
830
+ .
831
+ Then, by the bounds (2.5) and (2.3),
832
+ ��S∗(I − �Π)v
833
+ ��2
834
+ H0 ≤ C min
835
+ wh∈Hh
836
+ �� �RSS∗(I − �Π)v − wh
837
+ ��
838
+ H
839
+ ��(I − �Π)v
840
+ ��
841
+ H
842
+ ≤ ∥I − Π∥Zℓ+1→H
843
+ �� �RSS∗(I − �Π)v
844
+ ��
845
+ Zℓ+1
846
+ ��(I − �Π)v
847
+ ��
848
+ H,
849
+ ≤ C∥I − Π∥Zℓ+1→H
850
+ ��SS∗(I − �Π)v
851
+ ��
852
+ Zℓ−1
853
+ ��(I − �Π)v
854
+ ��
855
+ H,
856
+ ≤ C∥I − Π∥Zℓ+1→H
857
+ ��S∗(I − �Π)v
858
+ ��
859
+ H0
860
+ ��(I − �Π)v
861
+ ��
862
+ H
863
+ which implies the bound (2.16), and hence (1.17).
864
+ 11
865
+
866
+ Finally, we prove (1.19). By (1.11), (1.18), and the abstract elliptic-regularity
867
+ assumption (1.8), u ∈ Zℓ+1 with
868
+ ∥u∥Zℓ+1 ≤ C
869
+
870
+ ∥u∥H0 + ∥g∥Zℓ−1
871
+ ��
872
+ ≤ C
873
+
874
+ ∥u∥H0 + ∥g∥H∗
875
+
876
+ .
877
+ The variational problem (1.11) implies that
878
+ ∥g∥H∗ =
879
+ sup
880
+ v∈H∗,v̸=0
881
+ |a(u, v)|
882
+ ∥v∥H∗
883
+ ≤ C ∥u∥H ,
884
+ and thus ∥u∥Zℓ+1 ≤ C ∥u∥H. The bound (1.16) then implies that
885
+ ∥u − uh∥H ≤ C2
886
+
887
+ 1 + η(Hh)
888
+
889
+ ∥I − Π∥Zℓ+1→H ∥u∥Zℓ+1
890
+ and (1.19) follows.
891
+ 2.3. Proof of Theorem 1.6. The following lemma is essentially [6, Theorem
892
+ 2.6], rewritten in the abstract notation in §1.2.
893
+ Lemma 2.2. Under the assumptions of Theorem 1.5, let u = R∗g with R∗ defined
894
+ by (1.13) and g ∈ H0. Let um ∈ H, m = 0, . . . , ⌊ℓ/2⌋, be defined by
895
+ (2.17)
896
+ �a(v, u0) = ⟨v, g⟩
897
+ for all v ∈ H,
898
+ and
899
+ (2.18)
900
+ �a(v, um) = ⟨Sv, um−1⟩
901
+ for all v ∈ H, m = 1, . . . , ⌊ℓ/2⌋.
902
+ Then
903
+ (2.19)
904
+ um ∈ Z2(m+1) with
905
+ ∥um∥Z2(m+1) ≤ C ∥g∥H0
906
+ for m = 0, . . . , ⌊ℓ/2⌋ − 1,
907
+ and
908
+ (2.20)
909
+ u⌊ℓ/2⌋ ∈ Zℓ+1 with
910
+ ��u⌊ℓ/2⌋
911
+ ��
912
+ Zℓ+1 ≤ C ∥g∥H0 .
913
+ Furthermore, with
914
+ (2.21)
915
+ rm := u −
916
+ m−1
917
+
918
+ j=0
919
+ uj,
920
+ (2.22)
921
+ rm ∈ Z2(m+1) with
922
+ ∥rm∥Z2(m+1) ≤
923
+
924
+ 1+∥R∗∥H0→H
925
+
926
+ ∥g∥H0
927
+ for m = 0, . . . , ⌊ℓ/2⌋−1,
928
+ and
929
+ (2.23)
930
+ r⌊ℓ/2⌋ ∈ Zℓ+1 with
931
+ ��r⌊ℓ/2⌋
932
+ ��
933
+ Zℓ+1 ≤
934
+
935
+ 1 + ∥R∗∥H0→H
936
+
937
+ ∥g∥H0 .
938
+ Proof. We first prove (2.19) by induction. By the definition of u0 (2.17), conti-
939
+ nuity and coercivity of �a, and boundedness of S (2.3), ∥u0∥H ≤ C ∥g∥H0. Then, by
940
+ (1.8) with j = 2,
941
+ ∥u0∥Z2 ≤ C
942
+
943
+ ∥u0∥H0 + ∥g∥H0
944
+
945
+ ≤ C ∥g∥H0 ,
946
+ 12
947
+
948
+ which is (2.19) with m = 0.
949
+ Assume that (2.19) holds with m = q. By the definition of uq+1 (2.18), continuity
950
+ and coercivity of �a, and boundedness of S (2.3),
951
+ (2.24)
952
+ ∥uq+1∥H ≤ C ∥uq∥H∗ .
953
+ By (1.8) with j = 2(q + 1) and the definition of uq+1 (2.18)
954
+ ∥uq+1∥Z2(q+1) ≤ C
955
+
956
+ ∥uq+1∥H0 +
957
+ sup
958
+ v∈H, ∥v∥(Z2q )∗ =1
959
+ |⟨Sv, uq⟩|
960
+
961
+ .
962
+ (2.25)
963
+ By duality
964
+ ∥S∥(Zj)∗→H0 ≤ C
965
+ j = 0, . . . , ℓ + 1,
966
+ and thus
967
+ (2.26)
968
+ sup
969
+ v∈H, ∥v∥(Z2q )∗ =1
970
+ |⟨Sv, uq⟩| ≤ ∥S∥(Z2q)∗→H0 ∥uq∥H0 ≤ C ∥uq∥H0 .
971
+ Combining (2.25), (2.26), and (2.24), we find that
972
+ ∥uq+1∥Z2(q+2) ≤ C
973
+
974
+ ∥uq+1∥H0 + ∥uq∥H0
975
+
976
+ ≤ C ∥uq∥H .
977
+ Using (2.19) with m = q, we obtain (2.19) with m = q + 1, and the induction is
978
+ complete.
979
+ If ℓ is odd, i.e., ℓ + 1 is even, then this establishes both (2.19) and (2.20) since
980
+ 2(⌊ℓ/2⌋ + 1) = ℓ + 1 (i.e., the highest-order case is even, and can be reached by
981
+ increasing the regularity at each step by two). If ℓ is even, i.e., ℓ + 1 is odd, then
982
+ the argument above establishes (2.19). The bound for u⌊ℓ/2⌋ (i.e., (2.20)) then follows
983
+ from elliptic regularity, using that u⌊ℓ/2⌋−1 = uℓ/2−1 ∈ Zℓ ⊂ Zℓ−1 (i.e., at the last
984
+ step, we only increase the regularity by one).
985
+ For the proof that rm ∈ Z2(m+1) and satisfies (2.22), observe that the definition
986
+ of rm (2.21) and the definition of um (2.18) implies that r0 = u and
987
+ �a(v, rm) = ⟨Sv, rm−1⟩
988
+ for all v ∈ H, m = 1, . . . , ⌊ℓ/2⌋.
989
+ The proof of (2.22) is then very similar to the proof of (2.19), with the first step being
990
+ that, by (1.8), the fact that u = R∗g, and the definition of R∗ (1.13),
991
+ ∥r0∥Z2 = ∥u∥Z2 ≤ C
992
+
993
+ ∥u∥H0 + ∥g∥H0
994
+
995
+ ≤ C
996
+
997
+ 1 + ∥R∗∥H0→H
998
+
999
+ ∥g∥H0 .
1000
+ Proof of Theorem 1.6 using Lemma 2.2. As in Lemma 2.2, given g ∈ H0, let u =
1001
+ R∗g. By (2.21),
1002
+ ∥(I − Π)R∗g∥H ≤
1003
+ ⌊ℓ/2⌋−1
1004
+
1005
+ j=0
1006
+ ∥(I − Π)∥Z2(j+1)→H ∥uj∥Z2(j+1) + ∥(I − Π)∥Zℓ+1
1007
+ ��r⌊ℓ/2⌋
1008
+ ��
1009
+ Zℓ+1
1010
+ so that, by the bounds (2.19), (2.20), and (2.23),
1011
+ ∥(I − Π)R∗g∥H ≤ C
1012
+ � ⌊ℓ/2⌋−1
1013
+
1014
+ j=0
1015
+ ∥(I − Π)∥Z2(j+1)→H
1016
+ + ∥(I − Π)∥Zℓ+1→H
1017
+
1018
+ 1 + ∥R∗∥H0→H
1019
+ ��
1020
+ ∥g∥H0 ;
1021
+ the result (1.20) then follows from the definition of η(Hh) (1.14).
1022
+ 13
1023
+
1024
+ 3. Elliptic-regularity results. This section collects the elliptic-regularity re-
1025
+ sults that are used to verify that Assumption 1.2 holds for Helmholtz problems with
1026
+ truncation of the exterior domain either by a PML (in §4) or an impedance boundary
1027
+ condition (in §5). Let
1028
+ Lu = −k−2∇ · (A∇u) − c−2u,
1029
+ with associated sesquilinear form
1030
+ a(u, v) =
1031
+
1032
+
1033
+
1034
+ k−2(A∇u) · ∇v − c−2u v
1035
+
1036
+ ,
1037
+ where Ω be a bounded Lipschitz domain with outward-pointing unit normal vector
1038
+ n. The conormal derivative ∂n,Au is defined for u ∈ H2(Ω) by ∂n,Au := n · (A∇u);
1039
+ recall that ∂n,Au can be defined for u ∈ H1(Ω) with Lu ∈ L2(Ω) by Green’s identity;
1040
+ see, e.g., [34, Lemma 4.3].
1041
+ Assumption 3.1. For all x ∈ Ω, Ajℓ(x) = Aℓj(x) and
1042
+
1043
+ d
1044
+
1045
+ j=1
1046
+ d
1047
+
1048
+ ℓ=1
1049
+ Ajℓ(x)ξkξj ≥ c|ξ|2
1050
+ for all ξ ∈ Cd.
1051
+ Theorem 3.2 (Local elliptic regularity near a Dirichlet or Neumann boundary).
1052
+ Let Ω be a Lipschitz domain and let G1, G2 be open subsets of Rd with G1 ⋐ G2 and
1053
+ G1 ∩ ∂Ω ̸= ∅. Let
1054
+ (3.1)
1055
+ Ωj := Gj ∩ Ω, j = 1, 2,
1056
+ and
1057
+ Γ2 := G2 ∩ ∂Ω.
1058
+ Suppose that A satisfies Assumption 3.1, A, c ∈ Cm,1(Ω2), Γ2 ∈ Cm+1,1, u ∈ H1(Ω2),
1059
+ and Lu ∈ Hm(Ω2) for some m ∈ N, and either u = 0 or ∂n,Au = 0 on Γ2. Then
1060
+ (3.2)
1061
+ ∥u∥Hm+2
1062
+ k
1063
+ (Ω1) ≤ C
1064
+
1065
+ ∥u∥H1
1066
+ k(Ω2) + ∥Lu∥Hm
1067
+ k (Ω2)
1068
+
1069
+ .
1070
+ Proof. In unweighted norms, this follows from, e.g., [34, Theorems 4.7 and 4.16];
1071
+ the proof in the weighted norms (4.11) is very similar.
1072
+ Theorem 3.3 (Local elliptic regularity for the transmission problem).
1073
+ Let Ωin
1074
+ be a Lipschitz domain, and let Ωout := Rd \ Ωin. Let G1, G2 be open subsets of Rd
1075
+ with G1 ⋐ G2 and G1 ∩ ∂Ωin ̸= ∅. Let
1076
+ Ωin/out,j := Gj ∩ Ωin/out,
1077
+ j = 1, 2,
1078
+ and Γ2 := G2 ∩ ∂Ωin.
1079
+ Suppose that A satisfies Assumption 3.1, A|Ωin/out,2, c|Ωin/out,2 ∈ Cm,1(Ωin/out,2), Γ2 ∈
1080
+ Cm+1,1, uin/out ∈ H1(Ωin/out), and Lu ∈ Hm(Ωin/out,2) for some m ∈ N. Suppose
1081
+ further that
1082
+ uin = uout
1083
+ and
1084
+ ∂n,Auin = β∂n,Auout
1085
+ on Γ2
1086
+ for some β > 0. Then
1087
+ ∥uin∥Hm+2
1088
+ k
1089
+ (Ωin,1) + ∥uout∥Hm+2
1090
+ k
1091
+ (Ωout,1)
1092
+ ≤ C
1093
+
1094
+ ∥uin∥H1
1095
+ k(Ωin,2) + ∥uout∥H1
1096
+ k(Ωout,2) + ∥Luin∥Hm
1097
+ k (Ωin,2) + ∥Luout∥Hm
1098
+ k (Ωout,2)
1099
+
1100
+ .
1101
+ (3.3)
1102
+ 14
1103
+
1104
+ Proof. In unweighted norms, this is, e.g., [10, Theorem 5.2.1(i)] (and [34, The-
1105
+ orems 4.7 and 4.16] when β = 1); the proof in the weighted norms (4.11) is very
1106
+ similar.
1107
+ Theorem 3.4 (Local elliptic regularity for the impedance problem). Let Ω be a
1108
+ Lipschitz domain and let G1, G2 be open subsets of Rd with G1 ⋐ G2 and G1∩∂Ω ̸= ∅.
1109
+ Let Ωj and Γ2 be defined by (3.1). Suppose that, for some m ∈ N, Γ2 ∈ Cm+1,1,
1110
+ u ∈ H1(Ω2), and ∆u ∈ Hm(Ω2), and (k−1∂n − i)u = 0 on Γ2. Then
1111
+ (3.4)
1112
+ ∥u∥Hm+2
1113
+ k
1114
+ (Ω1) ≤ C
1115
+
1116
+ ∥u∥H1
1117
+ k(Ω2) +
1118
+ ��k−2∆u
1119
+ ��
1120
+ Hm
1121
+ k (Ω2)
1122
+
1123
+ .
1124
+ Proof. When m = 0, the result can be obtained from [7, Lemma 4.1] by multiply-
1125
+ ing by k−2 to switch to weighted norms, and using that the trace operator has norm
1126
+ bounded by Ck1/2 from H1
1127
+ k to L2 (which can be obtained from, e.g., [39, Theorem
1128
+ 5.6.4] since the weighted norms there are, up to a constant, the weighted norms (1.5)).
1129
+ The proof that (3.4) follow for m > 0 is then standard and can be found e.g.
1130
+ in [14, §6.3.2, Theorem 5]. We repeat it here in the context of impedance boundary
1131
+ conditions for completeness.
1132
+ We now prove that if the bound holds for m = q, then it holds for m = q + 1
1133
+ (assuming the appropriate regularity of the coefficients and the domain). Without
1134
+ loss of generality, we can change coordinates and work with U := B(0, s) ∩ {xd > 0}
1135
+ and V := B(0, t) ∩ {xd > 0} for some 0 < t < s. In these coordinates
1136
+ Lu := (−k−2aij∂xi∂xj −k−2(bi∂xi−c))u = f,
1137
+ (−k−1∂xd−i)u = 0 on {xd = 0}∩U.
1138
+ Suppose that for some q ≥ 0, for any 0 < t < s,
1139
+ (3.5)
1140
+ ∥u∥Hq+2
1141
+ k
1142
+ (V ) ≤ Ct
1143
+
1144
+ ∥u∥L2(U) + ∥f∥Hq
1145
+ k(U)
1146
+
1147
+ .
1148
+ Now suppose that f ∈ Hq+1
1149
+ k
1150
+ (U) and a, b, c ∈ Cq+1,1(U), and let W := B(0, r)∩{xd >
1151
+ 0} with t < r < s. By (3.5),
1152
+ (3.6)
1153
+ ∥u∥Hq+2
1154
+ k
1155
+ (W) ≤ C
1156
+
1157
+ ∥u∥L2(U) + ∥f∥Hq
1158
+ k(U)
1159
+
1160
+ ,
1161
+ and, by interior elliptic regularity, u ∈ Hq+3
1162
+ loc (U).
1163
+ The next step is to bound tangential derivatives of u: let |α| = q + 1 with αd = 0
1164
+ (so that ∂α
1165
+ x is a tangential derivative). Let
1166
+ �f := L
1167
+
1168
+ k−|α|∂α
1169
+ x u
1170
+
1171
+ so that
1172
+ �f = [L, k−|α|∂α
1173
+ x ]u + k−|α|∂α
1174
+ x f
1175
+ (where [A, B] := AB − BA) and, by (3.6) and the fact that the coefficients of L are
1176
+ Cq+1,1(U),
1177
+ (3.7)
1178
+ ∥ �f∥L2(W) ≤ C
1179
+
1180
+ ∥u∥Hq+2(W) + ∥f∥Hq+1
1181
+ k
1182
+ (W)
1183
+
1184
+ ≤ C
1185
+
1186
+ ∥u∥L2(U) + ∥f∥Hq+1
1187
+ k
1188
+ (U)
1189
+
1190
+ .
1191
+ Furthermore
1192
+ (−k−1∂xd − i)k−|α|∂α
1193
+ x u|xd=0 = k−|α|∂α
1194
+ x
1195
+
1196
+ (−k−1∂xd − iu)|xd=0
1197
+
1198
+ = 0,
1199
+ so that, by the analogue of (3.5) with q = 0 and U replaced by W, (3.6), and (3.7),
1200
+ ��k−|α|∂α
1201
+ x u
1202
+ ��
1203
+ H2
1204
+ k(V ) ≤ C
1205
+ ���k−|α|∂α
1206
+ x u
1207
+ ��
1208
+ L2(W) +
1209
+ �� �f
1210
+ ��
1211
+ L2(W)
1212
+
1213
+ ≤ C
1214
+
1215
+ ∥u∥L2(U) + ∥f∥Hq+1
1216
+ k
1217
+ (U)
1218
+
1219
+ .
1220
+ 15
1221
+
1222
+ Therefore, by the definition of α,
1223
+ ��k−|β|∂β
1224
+ xu
1225
+ ��
1226
+ L2(V ) ≤ C
1227
+
1228
+ ∥u∥L2(U) + ∥f∥Hq+1
1229
+ k
1230
+ (U)
1231
+
1232
+ for all |β| = q + 3 with βd ∈ {0, 1, 2}.
1233
+ (3.8)
1234
+ To prove that the bound (3.5) holds with q replaced by q + 1, i.e.,
1235
+ ∥u∥Hq+3
1236
+ k
1237
+ (V ) ≤ C
1238
+
1239
+ ∥u∥L2(U) + ∥f∥Hq+1
1240
+ k
1241
+ (U)
1242
+
1243
+ ,
1244
+ it is sufficient to prove that
1245
+ ��k−|β|∂β
1246
+ xu
1247
+ ��
1248
+ L2(V ) ≤ C
1249
+
1250
+ ∥u∥L2(U) + ∥f∥Hq+1
1251
+ k
1252
+ (U)
1253
+
1254
+ for all |β| = q + 3 with βd ∈ {0, . . . , q + 3}.
1255
+ We therefore now prove by induction that if
1256
+ (3.9)
1257
+ ��k−|β|∂β
1258
+ xu
1259
+ ��
1260
+ L2(V ) ≤ C
1261
+
1262
+ ∥u∥L2(U) + ∥f∥Hq+1
1263
+ k
1264
+ (U)
1265
+
1266
+ for any |β| = q + 3 with βd ∈ {0, . . . , j} for some j ∈ {2, . . . , q + 2}, then (3.9) holds
1267
+ for |β| = q + 3 with βd = j + 1. Combined with (3.8), this completes the proof.
1268
+ We therefore assume that |β| = q + 3 with βd = j + 1. Then, putting β = γ + δ
1269
+ with δ = (0, . . . , 0, 2) and |γ| = q + 1, and using that u ∈ Hq+3
1270
+ loc (U), we have
1271
+ (3.10)
1272
+ k−|γ|∂γLu = addk−|β|∂βu + Bu
1273
+ in V,
1274
+ where
1275
+ Bu =
1276
+
1277
+ |α|≤q+3, αd≤j
1278
+ aαk−|α|∂α
1279
+ x u.
1280
+ By the induction hypothesis (3.9),
1281
+ ∥Bu∥L2(V ) ≤ C
1282
+
1283
+ ∥u∥L2(U) + ∥f∥Hq+1
1284
+ k
1285
+ (U)
1286
+
1287
+ .
1288
+ Dividing (3.10) by add, taking the L2(V ) norm, and using that 1/add is bounded, we
1289
+ have
1290
+ ∥k−|β|∂βu∥L2(V ) ≤ C
1291
+
1292
+ ∥u∥L2(U) + ∥f∥Hq+1
1293
+ k
1294
+ (U)
1295
+
1296
+ ;
1297
+ i.e., we have proved that (3.9) holds for |β| = q + 3 with βd = j + 1, and the proof is
1298
+ complete.
1299
+ 4. Theorem 1.5 applied to the PML problem.
1300
+ 4.1. Definition of the PML problem.
1301
+ Obstacles and coefficients for Dirichlet/Neumann/penetrable obstacle problem.
1302
+ Let Ωp, Ω− ⊂ BR0 := {x : |x| < R0} ⊂ Rd, d = 2, 3, be bounded open sets with
1303
+ Lipschitz boundaries, Γp and Γ−, respectively, such that Γp ∩ Γ− = ∅, and Rd\Ω− is
1304
+ connected. Let Ωout := Rd\Ω− ∪ Ωp and Ωin := (Rd\Ω−) ∩ Ωp.
1305
+ Let Aout ∈ C0,1(Ωout, Rd×d) and Ain ∈ C0,1(Ωin, Rd×d) be symmetric positive
1306
+ definite, let cout ∈ L∞(Ωout; R), cin ∈ L∞(Ωin; R) be strictly positive, and let Aout
1307
+ and cout be such that there exists Rscat > R0 > 0 such that
1308
+ Ω− ∪ supp(I − Aout) ∪ supp(1 − cout) ⋐ BRscat.
1309
+ 16
1310
+
1311
+ The obstacle Ω− is the impenetrable obstacle, on which we impose either a zero
1312
+ Dirichlet or a zero Neumann condition, and the obstacle Ωin is the penetrable obstacle,
1313
+ across whose boundary we impose transmission conditions.
1314
+ For simplicity, we do not cover the case when Ω− is disconnected, with Dirichlet
1315
+ boundary conditions on some connected components and Neumann boundary con-
1316
+ ditions on others, but the main results hold for this problem too (at the cost of
1317
+ introducing more notation).
1318
+ Definition of the radial PML. Let Rtr > RPML,− > Rscat and let Ωtr ⊂ Rd be a
1319
+ bounded Lipschitz open set with BRtr ⊂ Ωtr ⊂ BCRtr for some C > 0 (i.e., Ωtr has
1320
+ characteristic length scale Rtr). Let Ω := Ωtr ∩ Ω+ and Γtr := ∂Ωtr. For 0 ≤ θ < π/2,
1321
+ let the PML scaling function fθ ∈ C3([0, ∞); R) be defined by fθ(r) := f(r) tan θ for
1322
+ some f satisfying
1323
+ (4.1)
1324
+
1325
+ f(r) = 0
1326
+
1327
+ =
1328
+
1329
+ f ′(r) = 0
1330
+
1331
+ =
1332
+
1333
+ r ≤ RPML,−
1334
+
1335
+ ,
1336
+ f ′(r) ≥ 0,
1337
+ f(r) ≡ r on r ≥ RPML,+;
1338
+ i.e., the scaling “turns on” at r = RPML,−, and is linear when r ≥ RPML,+. We
1339
+ emphasize that Rtr can be < RPML,+, i.e., we allow truncation before linear scaling
1340
+ is reached. Indeed, RPML,+ > RPML,− can be arbitrarily large and therefore, given
1341
+ any bounded interval [0, R] and any function �f ∈ C3([0, R]) satisfying
1342
+ � �f(r) = 0
1343
+
1344
+ =
1345
+ � �f ′(r) = 0
1346
+
1347
+ =
1348
+
1349
+ r ≤ RPML,−
1350
+
1351
+ ,
1352
+ �f ′(r) ≥ 0,
1353
+ our results hold for an f with f|[0,R] = �f. Given fθ(r), let
1354
+ (4.2)
1355
+ α(r) := 1 + if ′
1356
+ θ(r)
1357
+ and
1358
+ β(r) := 1 + ifθ(r)/r.
1359
+ and let
1360
+ (4.3)
1361
+ A :=
1362
+
1363
+
1364
+
1365
+
1366
+
1367
+ Ain
1368
+ in Ωin,
1369
+ Aout
1370
+ in Ωout ∩ BRPML,−,
1371
+ HDHT
1372
+ in (BRPML,−)c
1373
+ and 1
1374
+ c2 :=
1375
+
1376
+
1377
+
1378
+
1379
+
1380
+ c−2
1381
+ in
1382
+ in Ωin,
1383
+ c−2
1384
+ out
1385
+ in Ωout ∩ BRPML,−,
1386
+ α(r)β(r)d−1
1387
+ in (BRPML,−)c,
1388
+ where, in polar coordinates,
1389
+ (4.4)
1390
+ D =
1391
+
1392
+ β(r)α(r)−1
1393
+ 0
1394
+ 0
1395
+ α(r)β(r)−1
1396
+
1397
+ and
1398
+ H =
1399
+
1400
+ cos θ
1401
+ − sin θ
1402
+ sin θ
1403
+ cos θ
1404
+
1405
+ for d = 2,
1406
+ and
1407
+ (4.5)
1408
+ D =
1409
+
1410
+
1411
+ β(r)2α(r)−1
1412
+ 0
1413
+ 0
1414
+ 0
1415
+ α(r)
1416
+ 0
1417
+ 0
1418
+ 0
1419
+ α(r)
1420
+
1421
+  and H =
1422
+
1423
+
1424
+ sin θ cos φ
1425
+ cos θ cos φ
1426
+ − sin φ
1427
+ sin θ sin φ
1428
+ cos θ sin φ
1429
+ cos φ
1430
+ cos θ
1431
+ − sin θ
1432
+ 0
1433
+
1434
+
1435
+ for d = 3 (observe that then Aout = I and c−2
1436
+ out = 1 when r = RPML,− and thus A and
1437
+ c−2 are continuous at r = RPML,−).
1438
+ We highlight that, in other papers on PMLs, the scaled variable, which in our
1439
+ case is r+ifθ(r), is often written as r(1+i�σ(r)) with �σ(r) = σ0 for r sufficiently large;
1440
+ see, e.g., [24, §4], [4, §2]. Therefore, to convert from our notation, set �σ(r) = fθ(r)/r
1441
+ and σ0 = tan θ.
1442
+ Let
1443
+ (4.6)
1444
+ H := H1
1445
+ 0(Ω)
1446
+ or
1447
+ {v ∈ H1(Ω) : v = 0 on Γtr},
1448
+ 17
1449
+
1450
+ with the former corresponding to zero Dirichlet boundary conditions on Ω− and the
1451
+ latter corresponding to zero Neumann boundary conditions on Ω−.
1452
+ Definition 4.1 (A variational formulation of the PML problem). Given G ∈
1453
+ (H)∗ and β > 0,
1454
+ (4.7)
1455
+ find u ∈ H such that a(u, v) = G(v) for all v ∈ H,
1456
+ where
1457
+ (4.8)
1458
+ a(u, v) :=
1459
+ ��
1460
+ Ω∩Ωout
1461
+ + 1
1462
+ β
1463
+
1464
+ Ω∩Ωin
1465
+ � �
1466
+ k−2(A∇u) · ∇v − c−2uv
1467
+
1468
+ .
1469
+ When
1470
+ (4.9)
1471
+ G(v) :=
1472
+ ��
1473
+ BRPML,− ∩Ωout
1474
+ + 1
1475
+ β
1476
+
1477
+ Ω∩Ωin
1478
+
1479
+ c−2gv
1480
+ for g ∈ L2(Ω+) with supp g ⊂ BRPML,−, the variational problem (4.7) is a weak form
1481
+ of the problem
1482
+ (4.10)
1483
+ k−2c2
1484
+ out∇ · (Aout∇uout) + uout = −g
1485
+ in Ωout,
1486
+ k−2c2
1487
+ in∇ · (Ain∇uin) + uin = −g
1488
+ in Ωin,
1489
+ uin = uout
1490
+ and
1491
+ ∂n,Ainuin = β∂n,Aoutuout
1492
+ on ∂Ωin,
1493
+ either
1494
+ uin = 0
1495
+ or
1496
+ ∂n,Ainuin = 0
1497
+ on ∂Ω−,
1498
+ and with the Sommerfeld radiation condition approximated by a radial PML ((4.7) is
1499
+ obtained by multiplying the PDEs above by c−2
1500
+ in/outαβd−1 and integrating by parts).
1501
+ Using the fact that the solution of the true scattering problem exists and is unique
1502
+ with Aout, Ain, cout, cin, Ω−, and Ωin described above, the solution of (4.7) exists and
1503
+ is unique (i) for fixed k and sufficiently large Rtr − R1 by [30, Theorem 2.1], [31,
1504
+ Theorem A], [24, Theorem 5.8] and (ii) for fixed Rtr > R1 and sufficiently large k by
1505
+ [18, Theorem 1.5].
1506
+ For the particular data G (4.9), it is well-known that, for fixed k, the error
1507
+ ∥u−v∥H1
1508
+ k(BRPML,− \Ω) decays exponentially in Rtr−RPML,− and tan θ; see [30, Theorem
1509
+ 2.1], [31, Theorem A], [24, Theorem 5.8]. It was recently proved in [18, Theorems 1.2
1510
+ and 1.5] that the error ∥u − v∥H1
1511
+ k(BRPML,− \Ω) also decreases exponentially in k.
1512
+ 4.2. Showing that the PML problem fits in the abstract framework
1513
+ used in Theorem 1.5. Recall that H is defined by (4.6) and let H0 = L2(Ω). We
1514
+ work with the norm ∥ · ∥H1
1515
+ k(Ω) (1.5) on H, and use below the higher-order norms
1516
+ (4.11)
1517
+ ∥v∥2
1518
+ Hm
1519
+ k (Ω) :=
1520
+
1521
+ 0≤|α|≤m
1522
+ k−2|α| ∥∂αv∥2
1523
+ L2(Ω) .
1524
+ The rationale for using these norms is that if a function v oscillates with frequency k,
1525
+ then |(k−1∂)αv| ∼ |v| for all α; this is true, e.g., if v(x) = exp(ikx · a). We highlight
1526
+ that many papers on the FEM applied to the Helmholtz equation use the weighted H1
1527
+ norm |||v|||2 := ∥∇v∥2
1528
+ L2(Ω)+k2 ∥v∥2
1529
+ L2(Ω); we work with (1.5) instead, because weighting
1530
+ the jth derivative with k−j is easier to keep track of than weighting the jth derivative
1531
+ with k−j+1.
1532
+ We first check that the sesquilinear form a (4.8) is continuous and satisfies a
1533
+ G˚arding inequality, with constants uniform for ǫ ≤ θ ≤ π/2 − ǫ.
1534
+ 18
1535
+
1536
+ Lemma 4.2 (Bounds on the coefficients A and c).
1537
+ Given A and c as in (4.3), a
1538
+ scaling function f(r) satisfying (4.1), and ǫ > 0 there exist A+ and c− such that, for
1539
+ all ǫ ≤ θ ≤ π/2 − ǫ, x ∈ Ω, and ξ, ζ ∈ Cd,
1540
+ |(A(x)ξ, ζ)2| ≤ A+∥ξ∥2∥ζ∥2
1541
+ and
1542
+ 1
1543
+ |c(x)|2 ≥ 1
1544
+ c2
1545
+
1546
+ .
1547
+ Proof. This follows from the definitions of A and c in (4.3), the definitions of α
1548
+ and β in (4.2), and the fact that fθ(r) := f(r) tan θ.
1549
+ Continuity of a (1.6) with Ccont := max{A+, c−2
1550
+ − } then follows from the Cauchy-
1551
+ Schwarz inequality and the definition of ∥ · ∥H1
1552
+ k(Ω) (1.5).
1553
+ Assumption 4.3. When d = 3, fθ(r)/r is nondecreasing.
1554
+ Assumption 4.3 is standard in the literature; e.g., in the alternative notation
1555
+ described above it is that �σ is non-decreasing – see [4, §2].
1556
+ Remark 4.4. As noted above, the variational problem (4.7) is obtained by multi-
1557
+ plying the PDEs in (4.10) by c−2
1558
+ in/outαβd−1 and integrating by parts (as in [9, §3]). If
1559
+ one integrates by parts the PDEs directly (as in, e.g., [24, Lemma 4.2 and Equation
1560
+ 4.8]), the resulting sesquilinear form satisfies Assumption 1.2 after multiplication by
1561
+ eiω, for some suitable ω (see Remark 1.3), without the need for Assumption 4.3.
1562
+ Lemma 4.5. Suppose that fθ satisfies Assumption 4.3. With A defined by (4.3),
1563
+ given ǫ > 0 there exists A− > 0 such that, for all ǫ ≤ θ ≤ π/2 − ǫ,
1564
+
1565
+
1566
+ A(x)ξ, ξ
1567
+
1568
+ 2 ≥ A−∥ξ∥2
1569
+ 2
1570
+ for all ξ ∈ Cd and x ∈ Ω+.
1571
+ Reference for the proof. See, e.g., [20, Lemma 2.3].
1572
+ Corollary 4.6. If fθ satisfies Assumption 4.3 then
1573
+ ℜa(w, w) ≥ A−∥w∥2
1574
+ H1
1575
+ k(Ω) −
1576
+
1577
+ A− + c−2
1578
+ min
1579
+
1580
+ ∥w∥2
1581
+ L2(Ω)
1582
+ for all w ∈ H.
1583
+ Let R : L2(Ω) → H be defined by a(Rg, v) = (g, v)L2(Ω) for all v ∈ H; i.e., R
1584
+ is the solution operator of the PML problem. The definition of a and the facts that
1585
+ (with the matrices H and D defined by (4.4), (4.5)) H is real and the matrix D is
1586
+ diagonal (and hence symmetric) imply that a(u, v) = a(v, u) for all u, v ∈ H, and thus
1587
+ Rg = R∗g. We therefore let
1588
+ (4.12)
1589
+ Csol := ∥R∥L2(Ω)→H = ∥R∗∥L2(Ω)→H .
1590
+ We highlight that (i) Csol is bounded by the norm of the solution operator of the true
1591
+ scattering problem (i.e., with the Sommerfeld radiation condition) by [18, Theorem
1592
+ 1.6], (ii) Csol ∼ k when the problem is nontrapping (with this the slowest-possible
1593
+ growth in k), and (iii) an advantage of working with the weighted norms (4.11) is that
1594
+ Csol in fact describes the k-dependence of the Helmholtz solution operator between
1595
+ Hm
1596
+ k and Hm+2
1597
+ k
1598
+ for any m.
1599
+ Lemma 4.7 (The PML problem satisfies Assumption 1.2).
1600
+ Suppose that, for
1601
+ some ℓ ∈ Z+, Aout, Ain, cout, cin ∈ Cℓ−1,1 and fθ ∈ Cℓ,1 on the closures of the domains
1602
+ on which they are defined, ∂Ω is Cℓ,1, and fθ satisfies Assumption 4.3. Let
1603
+ (4.13)
1604
+ Zj =
1605
+
1606
+ v : vout ∈ Hj(Ω ∩ Ωout), vin ∈ Hj(Ωin)
1607
+
1608
+ ∩ H
1609
+ 19
1610
+
1611
+ with norm
1612
+ (4.14)
1613
+ ∥v∥2
1614
+ Zj := ∥vout∥2
1615
+ Hj
1616
+ k(Ωout∩Ω) + ∥vin∥2
1617
+ Hj
1618
+ k(Ωin) .
1619
+ where the “out” and “in” subscripts denote restriction to Ωout∩Ω and Ωin, respectively.
1620
+ Then a defined by (4.8) satisfies Assumption 1.2 and given ǫ > 0 and k0 > 0 there
1621
+ exists C > 0 such the bounds (1.8) and (1.9) hold for all k ≥ k0 and ǫ ≤ θ ≤ π/2 − ǫ.
1622
+ Proof. First observe that Assumption 3.1 is satisfied by the definition (4.3) of A.
1623
+ Since
1624
+ sup
1625
+ v∈H, ∥v∥(Zj−2 )∗=1
1626
+ |a(u, v)| = ∥Lu∥Zj−2 ,
1627
+ the bound (1.9) holds by combining Theorem 3.2 (used near Γ− and Γtr) and Theorem
1628
+ 3.3 (used near Γp) and using the fact that, by Green’s identity, for u ∈ H1
1629
+ 0(Ω) with
1630
+ Lu ∈ L2(Ω) and ∂n,Ainuin = β∂n,Aoutuout on ∂Ωin,
1631
+ ∥uin∥H1
1632
+ k(Ωin) + ∥uout∥H1
1633
+ k(Ωout)
1634
+ ≤ C
1635
+
1636
+ ∥uin∥L2(Ωin) + ∥uout∥L2(Ωout) + ∥Luin∥L2(Ωin) + ∥Luout∥L2(Ωout)
1637
+
1638
+ (so that the H1
1639
+ k norms on the right-hand sides of (3.2) and (3.3) can be replaced by
1640
+ L2 norms). Since the operator associated with the sesquilinear form ℜa is
1641
+ �L + L∗
1642
+ 2
1643
+
1644
+ u = −k−2∇ ·
1645
+ �A + A
1646
+ 2
1647
+ ∇u
1648
+
1649
+
1650
+ �c−2 + c−2
1651
+ 2
1652
+
1653
+ u
1654
+ and the matrix A is symmetric, this operator also satisfies Assumption 3.1.
1655
+ The
1656
+ bound (1.8) then holds by a very similar argument.
1657
+ 4.3. Theorem 1.5 applied to the PML problem.
1658
+ Assumption 4.8. Given p ∈ Z+, (Hh)h>0 are such that the following holds.
1659
+ There exists C > 0 such that, for all h > 0, 0 ≤ j ≤ m+1 ≤ p+1, and v ∈ H∩Hℓ+1(Ω)
1660
+ there exists Ih,pv ∈ Hh such that
1661
+ ��vout − (Ih,pv)out
1662
+ ��
1663
+ Hj(Ωout∩Ω) +
1664
+ ��vin − (Ih,pv)in
1665
+ ��
1666
+ Hj(Ωin)
1667
+ ≤ Chm+1−j�
1668
+ ∥vout∥Hm+1(Ωout∩Ω) + ∥vin∥Hm+1(Ωin)
1669
+
1670
+ .
1671
+ (4.15)
1672
+ where the “out” and “in” subscripts denote restriction to Ωout∩Ω and Ωin, respectively.
1673
+ Assumption 4.8 holds when (Hh)h>0 consists of piecewise degree-p polynomials
1674
+ on shape-regular simplicial triangulations, indexed by the meshwidth; see, e.g., [8,
1675
+ Theorem 17.1], [5, Proposition 3.3.17].
1676
+ Theorem 4.9 (Existence, uniqueness, and error bound in the preasymptotic
1677
+ regime for the PML problem).
1678
+ Suppose that, for some ℓ ∈ Z+, Aout, Ain, cout, cin ∈
1679
+ Cℓ−1,1 and fθ ∈ Cℓ,1 on the closures of the domains where they are defined, ∂Ω is
1680
+ Cℓ,1, fθ satisfies Assumption 4.3, and β > 0. Let Csol be defined by (4.12), and as-
1681
+ sume that {Hh}h>0 satisfy Assumption 4.8. Given ǫ > 0 and p ∈ Z+ with p ≥ ℓ,
1682
+ there exists k0 > 0 and Cj, j = 1, 2, 3, 4, such that the following is true for all k ≥ k0,
1683
+ ǫ ≤ θ ≤ π/2 − ǫ, and Rtr > R1 + ǫ.
1684
+ The solution u of the PML problem (4.7) exists and is unique, and if
1685
+ (4.16)
1686
+ (hk)2ℓCsol ≤ C1
1687
+ 20
1688
+
1689
+ then the Galerkin solution uh, exists, is unique, and satisfies
1690
+ ∥u − uh∥H1
1691
+ k(Ω) ≤ C2
1692
+
1693
+ 1 + hk + (hk)ℓCsol
1694
+
1695
+ min
1696
+ wh∈Hh ∥u − vh∥H1
1697
+ k(Ω) ,
1698
+ (4.17)
1699
+ ∥u − uh∥L2(Ω) ≤ C3
1700
+
1701
+ hk + (hk)ℓCsol
1702
+
1703
+ min
1704
+ wh∈Hh ∥u − vh∥H1
1705
+ k(Ω) .
1706
+ (4.18)
1707
+ If, in addition, g ∈ Hp−1(Ω) ∩ H (with H defined by (4.6)) with
1708
+ (4.19)
1709
+ ∥g∥Hp−1
1710
+ k
1711
+ (Ω) ≤ C ∥g∥H∗
1712
+ for some C > 0, then there exists C4 > 0 such that if h satisfies (4.16) then
1713
+ (4.20)
1714
+ ∥u − uh∥H1
1715
+ k(Ω)
1716
+ ∥u∥H1
1717
+ k(Ω)
1718
+ ≤ C4
1719
+
1720
+ hk + (hk)ℓCsol
1721
+
1722
+ (hk)ℓ.
1723
+ Theorem 4.9 is most interesting when p = ℓ, i.e., the polynomial degree is the
1724
+ smallest possible covered by the theorem. In this case, (4.16) becomes the condi-
1725
+ tion (1.1), and the bounds (4.17), (4.18), and (4.20) become (1.2), (1.3), and (1.4),
1726
+ respectively.
1727
+ Proof of Theorem 4.9. By the results in §4.2, a defined by (4.8) satisfies the as-
1728
+ sumptions of Theorem 1.5. By (4.15), the definition of ∥·∥Zj (4.14), and the definition
1729
+ (4.11) of the weighted norms, ∥I − Π∥Zm+1→H ≤ C(hk)m. This bound along with
1730
+ Theorem 1.6 and (4.12) imply that
1731
+ η(Hh) ≤ C
1732
+ � ⌊ℓ/2⌋−1
1733
+
1734
+ j=0
1735
+ (hk)2j+1 + (hk)ℓCsol
1736
+
1737
+ .
1738
+ If hk ≤ C, then η(Hh) ≤ C(hk + (hk)ℓCsol); the result then follows from Theorem
1739
+ 1.5 and the fact that if the condition (4.16) holds, then hk ≤ C (since Csol ≥ Ck).
1740
+ 5. Theorem 1.5 applied to the impedance problem.
1741
+ 5.1. Definition of the impedance problem. Let Aout, Ain, cout, cin, Ω−, Ωin,
1742
+ and Ωtr be as in §4.1. Let
1743
+ A :=
1744
+
1745
+ Ain
1746
+ in Ωin,
1747
+ Aout
1748
+ in Ωout ∩ Ω,
1749
+ and
1750
+ 1
1751
+ c2 :=
1752
+
1753
+ c−2
1754
+ in
1755
+ in Ωin,
1756
+ c−2
1757
+ out
1758
+ in Ωout ∩ Ω.
1759
+ Let
1760
+ (5.1)
1761
+ H := {v ∈ H1(Ω) : v = 0 on ∂Ω−}
1762
+ or
1763
+ H1(Ω),
1764
+ with the former corresponding to zero Dirichlet boundary conditions on Ω− and the
1765
+ latter corresponding to zero Neumann boundary conditions on Ω−.
1766
+ Definition 5.1 (Variational formulation of the impedance problem). Given G ∈
1767
+ (H)∗ and β > 0,
1768
+ (5.2)
1769
+ find u ∈ H such that a(u, v) = G(v) for all v ∈ H,
1770
+ where
1771
+ (5.3)
1772
+ a(u, v) :=
1773
+ ��
1774
+ Ω∩Ωout
1775
+ + 1
1776
+ β
1777
+
1778
+ Ω∩Ωin
1779
+ � �
1780
+ k−2(A∇u) · ∇v − c−2uv
1781
+
1782
+ − ik−1
1783
+
1784
+ Γtr
1785
+ uv.
1786
+ The solution of this variational problem exists and is unique by, e.g., [22, Theorem
1787
+ 2.4].
1788
+ 21
1789
+
1790
+ 5.2. Showing that the impedance problem fits in the abstract frame-
1791
+ work used in Theorem 1.5. The proofs that the sesquilinear form a is continuous
1792
+ and satisfies a G˚arding inequality are very similar to those for the PML problem in
1793
+ §4.2 (in fact, they are simpler because there is no PML scaling parameter in which
1794
+ the bounds need to be uniform).
1795
+ Lemma 5.2 (The impedance problem satisfies Assumption 1.2).
1796
+ Suppose that,
1797
+ for some ℓ ∈ Z+, Aout, Ain, cout, cin ∈ Cℓ−1,1 on the closures of the domains on which
1798
+ they are defined, and ∂�� is Cℓ,1. With Zj and its norm defined by (4.13) and (4.14),
1799
+ a defined by (5.3) satisfies Assumption 1.2 and given k0 > 0 there exists C > 0 such
1800
+ the bounds (1.8) and (1.9) hold for all k ≥ k0.
1801
+ Proof. This is very similar to the proof of Lemma 4.7. The regularity assumption
1802
+ (1.8) follows by combining Theorem 3.2 used near ∂Ω−, Theorem 3.3 used near ∂Ωin,
1803
+ and Theorem 3.4 used near Γtr. The regularity assumption (1.9) follows by combining
1804
+ Theorem 3.2 used near ∂Ω−, Theorem 3.3 used near ∂Ωin, and now Theorem 3.2
1805
+ (with Neumann boundary condition) used near Γtr. Indeed, near Γtr, the operator
1806
+ associated with (ℜa) is −k−2∆−1 with Neumann boundary conditions (coming from
1807
+ Aout = I and cout = 1 near Γtr and the fact that no boundary condition is imposed
1808
+ on Γtr in H (5.1)).
1809
+ 5.3. Theorem 1.5 applied to the impedance problem.
1810
+ Theorem 5.3 (Existence,
1811
+ uniqueness,
1812
+ and error bound in the preasymp-
1813
+ totic regime for the impedance problem).
1814
+ Suppose that, for some ℓ ∈ Z+,
1815
+ Aout, Ain, cout, cin ∈ Cℓ−1,1 on the closures of the domains where they are defined, ∂Ω
1816
+ is Cℓ,1, and β > 0. Let Csol be defined by (4.12), and assume that {Hh}h>0 satisfy
1817
+ Assumption 4.8. Given p ∈ Z+ with p ≥ ℓ, there exists k0 > 0 and Cj, j = 1, 2, 3, 4,
1818
+ such that the following is true for all k ≥ k0.
1819
+ The solution u of the impedance problem (5.2) exists and is unique, and if (4.16)
1820
+ holds then the Galerkin solution uh, exists, is unique, and satisfies the bounds (4.17)
1821
+ and (4.18). If, in addition, g ∈ Hp−1(Ω) ∩ H (with H defined by (5.1)) with (4.19)
1822
+ for some C > 0, then there exists C4 > 0 such that if h satisfies (4.16) then the bound
1823
+ (4.20) holds.
1824
+ Given Lemma 5.2, the proof of Theorem 5.3 is very similar to the proof of Theorem
1825
+ 4.9.
1826
+ Remark 5.4 (Imposing the exact Dirichlet-to-Neumann map on Γtr).
1827
+ With the
1828
+ exact Dirichlet-to-Neumann map imposed on Γtr, the Helmholtz sesquilinear form is
1829
+ continuous and satisfies a G˚arding inequality (see, e.g., [37, Lemma 3.3 and Corollary
1830
+ 3.4]). To apply Theorem 1.5 to this problem, one therefore only needs to check the
1831
+ elliptic-regularity assumptions of Assumption 1.2. Using Theorems 3.2 and 3.3, this
1832
+ boils down to knowing the analogue of Theorem 3.4 with the impedance boundary
1833
+ condition replaced by k−1∂nu = DtNu (for (1.8)) and also k−1∂nu = (DtN+DtN∗)u/2
1834
+ (for (1.9)). When m = 0 (i.e., the lowest-order regularity shift covered in Theorem
1835
+ 3.4), the first of these regularity results is given by [28, Theorem 6.1]. To prove this
1836
+ result for m > 1 one would need to make an argument similar to that in the proof
1837
+ of Theorem 3.4 except that, because DtN and DtN∗ do not commute with tangential
1838
+ derivatives, one would need to obtain two additional estimates: 1) estimates on u
1839
+ with nontrivial boundary data, e.g., when k−1∂nu − (DtN)u = g ∈ Hs
1840
+ k and 2) trace
1841
+ estimates for u that are needed to bound, e.g., [T, DtN]u where T is a vector field
1842
+ tangent to the boundary. The same strategy could also be used to handle higher-order
1843
+ 22
1844
+
1845
+ impedance boundary conditions.
1846
+ Acknowledgements. EAS was supported by EPSRC grant EP/R005591/1 and
1847
+ JG was supported by EPSRC grants EP/V001760/1 and EP/V051636/1.
1848
+ REFERENCES
1849
+ [1] M. Ainsworth, Discrete dispersion relation for hp-version finite element approximation at
1850
+ high wave number, SIAM Journal on Numerical Analysis, 42 (2004), pp. 553–575.
1851
+ [2] A. K. Aziz, R. B. Kellogg, and A. B. Stephens, A two point boundary value problem with
1852
+ a rapidly oscillating solution, Numer. Math., 53 (1988), pp. 107–121.
1853
+ [3] M. Bernkopf, T. Chaumont-Frelet, and J. M. Melenk, Stability and convergence of
1854
+ Galerkin discretizations of the Helmholtz equation in piecewise smooth media, arXiv pre-
1855
+ print arXiv:2209.03601, (2022).
1856
+ [4] J. H. Bramble and J. Pasciak, Analysis of a finite PML approximation for the three dimen-
1857
+ sional time-harmonic Maxwell and acoustic scattering problems, Mathematics of Compu-
1858
+ tation, 76 (2007), pp. 597–614.
1859
+ [5] S. C. Brenner and L. R. Scott, The Mathematical Theory of Finite Element Methods, vol. 15
1860
+ of Texts in Applied Mathematics, Springer, 3rd ed., 2008.
1861
+ [6] T. Chaumont-Frelet and S. Nicaise, Wavenumber explicit convergence analysis for finite
1862
+ element discretizations of general wave propagation problem, IMA J. Numer. Anal., 40
1863
+ (2020), pp. 1503–1543.
1864
+ [7] T. Chaumont-Frelet, S. Nicaise, and J. Tomezyk, Uniform a priori estimates for ellip-
1865
+ tic problems with impedance boundary conditions, Communications on Pure & Applied
1866
+ Analysis, 19 (2020), p. 2445.
1867
+ [8] P. G. Ciarlet, Basic error estimates for elliptic problems, in Handbook of numerical analysis,
1868
+ Vol. II, North-Holland, Amsterdam, 1991, pp. 17–351.
1869
+ [9] F. Collino and P. Monk, The perfectly matched layer in curvilinear coordinates, SIAM Jour-
1870
+ nal on Scientific Computing, 19 (1998), pp. 2061–2090.
1871
+ [10] M. Costabel, M. Dauge, and S. Nicaise, Corner Singularities and Analytic Regularity for
1872
+ Linear Elliptic Systems. Part I: Smooth domains., (2010). https://hal.archives-ouvertes.
1873
+ fr/file/index/docid/453934/filename/CoDaNi Analytic Part I.pdf.
1874
+ [11] J. Douglas Jr., J. E. Santos, D. Sheen, and L. S. Bennethum, Frequency domain treatment
1875
+ of one-dimensional scalar waves, Mathematical Models and Methods in Applied Sciences,
1876
+ 3 (1993), pp. 171–194.
1877
+ [12] Y. Du and H. Wu, Preasymptotic error analysis of higher order FEM and CIP-FEM for
1878
+ Helmholtz equation with high wave number, SIAM J. Numer. Anal., 53 (2015), pp. 782–
1879
+ 804.
1880
+ [13] S. Esterhazy and J. M. Melenk, On stability of discretizations of the Helmholtz equation,
1881
+ in Numerical Analysis of Multiscale Problems, I. G. Graham, T. Y. Hou, O. Lakkis, and
1882
+ R. Scheichl, eds., Springer, 2012, pp. 285–324.
1883
+ [14] L. C. Evans, Partial differential equations, American Mathematical Society Providence, RI,
1884
+ 1998.
1885
+ [15] X. Feng and H. Wu, Discontinuous Galerkin methods for the Helmholtz equation with large
1886
+ wave number, SIAM J. Numer. Anal., 47 (2009), pp. 2872–2896.
1887
+ [16] X. Feng and H. Wu, hp-Discontinuous Galerkin methods for the Helmholtz equation with
1888
+ large wave number, Math. Comp., 80 (2011), pp. 1997–2024.
1889
+ [17] J. Galkowski, Lower bounds for piecewise polynomial approximations of oscillatory functions,
1890
+ arXiv preprint arXiv:2211.04757, (2022).
1891
+ [18] J. Galkowski, D. Lafontaine, and E. A. Spence, Perfectly-matched-layer truncation is
1892
+ exponentially accurate at high frequency, arXiv preprint arXiv:2105.07737, (2021).
1893
+ [19] J. Galkowski, D. Lafontaine, E. A. Spence, and J. Wunsch, Decompositions of high-
1894
+ frequency Helmholtz solutions via functional calculus, and application to the finite element
1895
+ method, arXiv preprint arXiv:2102.13081, (2021).
1896
+ [20] J. Galkowski, D. Lafontaine, E. A. Spence, and J. Wunsch, The hp-FEM applied to the
1897
+ Helmholtz equation with PML truncation does not suffer from the pollution effect, arXiv
1898
+ preprint arXiv:2207.05542, (2022).
1899
+ [21] J. Galkowski, E. A. Spence, and J. Wunsch, Optimal constants in nontrapping resolvent
1900
+ estimates, Pure and Applied Analysis, 2 (2020), pp. 157–202.
1901
+ [22] I. G. Graham and S. A. Sauter, Stability and finite element error analysis for the Helmholtz
1902
+ equation with variable coefficients, Math. Comp., 89 (2020), pp. 105–138.
1903
+ 23
1904
+
1905
+ [23] I. Harari and T. J. R. Hughes, Finite element methods for the Helmholtz equation in an ex-
1906
+ terior domain: model problems, Computer methods in applied mechanics and engineering,
1907
+ 87 (1991), pp. 59–96.
1908
+ [24] T. Hohage, F. Schmidt, and L. Zschiedrich, Solving time-harmonic scattering problems
1909
+ based on the pole condition II: convergence of the PML method, SIAM Journal on Mathe-
1910
+ matical Analysis, 35 (2003), pp. 547–560.
1911
+ [25] F. Ihlenburg and I. Babuˇska, Finite element solution of the Helmholtz equation with high
1912
+ wave number Part I: The h-version of the FEM, Comput. Math. Appl., 30 (1995), pp. 9–37.
1913
+ [26] F. Ihlenburg and I. Babuska, Finite element solution of the Helmholtz equation with high
1914
+ wave number part II: the hp version of the FEM, SIAM J. Numer. Anal., 34 (1997),
1915
+ pp. 315–358.
1916
+ [27] F. Ihlenburg and I. Babuˇska, Dispersion analysis and error estimation of Galerkin finite
1917
+ element methods for the Helmholtz equation, Int. J. Numer. Meth. Eng., 38, Issue 22 (1995),
1918
+ pp. 3745–3774.
1919
+ [28] D. Lafontaine, E. A. Spence, and J. Wunsch, A sharp relative-error bound for the Helmholtz
1920
+ h-FEM at high frequency, Numerische Mathematik, 150 (2022), pp. 137–178.
1921
+ [29] D. Lafontaine, E. A. Spence, and J. Wunsch, Wavenumber-explicit convergence of the hp-
1922
+ FEM for the full-space heterogeneous Helmholtz equation with smooth coefficients, Comp.
1923
+ Math. Appl., 113 (2022), pp. 59–69.
1924
+ [30] M. Lassas and E. Somersalo, On the existence and convergence of the solution of PML
1925
+ equations, Computing, 60 (1998), pp. 229–241.
1926
+ [31] M. Lassas and E. Somersalo, Analysis of the PML equations in general convex geome-
1927
+ try, Proceedings of the Royal Society of Edinburgh Section A: Mathematics, 131 (2001),
1928
+ pp. 1183–1207.
1929
+ [32] Y. Li and H. Wu, FEM and CIP-FEM for Helmholtz Equation with High Wave Number and
1930
+ Perfectly Matched Layer Truncation, SIAM J. Numer. Anal., 57 (2019), pp. 96–126.
1931
+ [33] C. H. Makridakis, F. Ihlenburg, and I. Babuˇska, Analysis and finite element methods for
1932
+ a fluid-solid interaction problem in one dimension, Mathematical Models and Methods in
1933
+ Applied Sciences, 6 (1996), pp. 1119–1141.
1934
+ [34] W. McLean, Strongly elliptic systems and boundary integral equations, Cambridge University
1935
+ Press, 2000.
1936
+ [35] J. M. Melenk, On generalized finite element methods, PhD thesis, The University of Maryland,
1937
+ 1995.
1938
+ [36] J. M. Melenk, A. Parsania, and S. Sauter, General DG-methods for highly indefinite
1939
+ Helmholtz problems, Journal of Scientific Computing, 57 (2013), pp. 536–581.
1940
+ [37] J. M. Melenk and S. Sauter, Convergence analysis for finite element discretizations of
1941
+ the Helmholtz equation with Dirichlet-to-Neumann boundary conditions, Math. Comp, 79
1942
+ (2010), pp. 1871–1914.
1943
+ [38] J. M. Melenk and S. Sauter, Wavenumber explicit convergence analysis for Galerkin dis-
1944
+ cretizations of the Helmholtz equation, SIAM J. Numer. Anal., 49 (2011), pp. 1210–1243.
1945
+ [39] J. C. N´ed´elec, Acoustic and electromagnetic equations: integral representations for harmonic
1946
+ problems, Springer Verlag, 2001.
1947
+ [40] O. R. Pembery, The Helmholtz Equation in Heterogeneous and Random Media: Analysis and
1948
+ Numerics, PhD thesis, University of Bath, 2020.
1949
+ https://researchportal.bath.ac.uk/en/
1950
+ studentTheses/the-helmholtz-equation-in-heterogeneous-and-random-media-analysis.
1951
+ [41] S. A. Sauter, A refined finite element convergence theory for highly indefinite Helmholtz
1952
+ problems, Computing, 78 (2006), pp. 101–115.
1953
+ [42] A. H. Schatz, An observation concerning Ritz-Galerkin methods with indefinite bilinear forms,
1954
+ Math. Comp., 28 (1974), pp. 959–962.
1955
+ [43] L. L. Thompson and P. M. Pinsky, Complex wavenumber Fourier analysis of the p-version
1956
+ finite element method, Computational Mechanics, 13 (1994), pp. 255–275.
1957
+ [44] H. Wu, Pre-asymptotic error analysis of CIP-FEM and FEM for the Helmholtz equation with
1958
+ high wave number. Part I: linear version, IMA J. Numer. Anal., 34 (2014), pp. 1266–1288.
1959
+ [45] L. Zhu and H. Wu, Preasymptotic error analysis of CIP-FEM and FEM for Helmholtz equa-
1960
+ tion with high wave number. Part II: hp version, SIAM J. Numer. Anal., 51 (2013),
1961
+ pp. 1828–1852.
1962
+ 24
1963
+
F9E1T4oBgHgl3EQf-wbm/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
F9FKT4oBgHgl3EQfbS5P/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:a1b3f2319096cc76124bd2d951ba6834477a08b83073129b5a8f9b2ba07593db
3
+ size 5505069
G9E4T4oBgHgl3EQfgQ3v/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:cf513ad255f471ecbccaa43fe2be9378aa8734dde7b2a40e81cd96e4bac61b62
3
+ size 544639
HtE2T4oBgHgl3EQf_AnW/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:ad846cb51da3a116a29e02c84dab42968ed1328d0a6acb4a91e3199b075dd2bf
3
+ size 6881325
I9AyT4oBgHgl3EQffvhT/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:a588906877a180ebdfc01e80892b7d1ee7831f328500aea77b41d6a5bb1d2312
3
+ size 5505069
IdE2T4oBgHgl3EQfUQce/content/tmp_files/2301.03810v1.pdf.txt ADDED
The diff for this file is too large to render. See raw diff
 
IdE2T4oBgHgl3EQfUQce/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
ItE3T4oBgHgl3EQfXAqD/content/2301.04475v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:6ef7fdda9019dc50d3879502be9e6e69eaec24f0b2bfe55ff514ffe980e277ac
3
+ size 399686
ItE3T4oBgHgl3EQfXAqD/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:84517955f15c9c1512f7650976097cb4ef4a14f559530b8e5d04326b8d766110
3
+ size 215744
ItFJT4oBgHgl3EQfFyzw/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:b43806d39a08ab98b3059d4a6030f1b3921cbbb2c83f966647c5a61a759d27d7
3
+ size 5636141
JdAzT4oBgHgl3EQfH_vd/content/tmp_files/2301.01056v1.pdf.txt ADDED
The diff for this file is too large to render. See raw diff
 
JdAzT4oBgHgl3EQfH_vd/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
KdAyT4oBgHgl3EQff_ia/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:e7d514a30f29a4ac3c1c540280d97460c0cd1984d8e1f5debe2fd07c326d9c6b
3
+ size 8388653
KdAyT4oBgHgl3EQff_ia/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:144c2265d985f2aedb05a2e0af86bab3241c5428b075cefb06a132279c372d1a
3
+ size 240843
LNE1T4oBgHgl3EQfGwM1/content/tmp_files/2301.02917v1.pdf.txt ADDED
@@ -0,0 +1,539 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Dido’s Problem: When a myth of
2
+ ancient literature became a problem of
3
+ variational calculus
4
+ Dora Musielak
5
+ Abstract
6
+ When introducing the calculus of variations, we may invoke Dido’s
7
+ problem to illustrate the most fundamental variational problem: to find
8
+ the curve of given perimeter which bounds the greatest area. This type of
9
+ problem led mathematicians to invent solution methods of maxima and
10
+ minima, and the genesis of variational calculus as a distinct branch of anal-
11
+ ysis. Dido’s problem was inspired by the mythical tale of the foundation
12
+ of Carthage (ancient city in North Africa) by a Phoenician princess as told
13
+ independently by Roman poet Virgil, and by Latin historian Justinus in
14
+ the first two centuries B.C. Historians have debated the facts surrounding
15
+ Carthage’s birth; however, contemporary mathematicians have accepted
16
+ the vague events described by Virgil in his Aeneid, adding details to Dido’s
17
+ story to extrapolate a few verses and use as a basis for the isoperimet-
18
+ ric theorem. Was Leonhard Euler or Lord Kelvin who first interpreted
19
+ Virgil’s poem as Dido’s problem of variational calculus? In this article I
20
+ attempt to resolve a question of historical attribution to identify who first
21
+ defined Dido’s problem.
22
+ Keywords: Isoperimetrics, variational calculus, Euler, Lord Kelvin
23
+ 1
24
+ Introduction
25
+ In 1937, Karl Menger1 wrote: “The first human being to solve a problem of
26
+ calculus of variations seems to have been Queen Dido of Carthage.” Contempo-
27
+ rary mathematics books2 go much further than that by adding details to Dido’s
28
+ story taken from Virgil’s Aeneid, alleging that Dido established Carthage, an
29
+ ancient city in modern Tunisia, by application of the isoperimetric property of
30
+ the circle to secure the largest area of land she bought upon arrival to North
31
+ Africa. Here are two examples, where I use Italics to highlight details of Dido’s
32
+ story that are not in Virgil’s poem:
33
+ 1Menger (1937)
34
+ 2See for example, Brunt (2004); Freguglia and Giaquinta (2016); Coppersmith (2017);
35
+ Nahin (2004); Rojo and Bloch (2018).
36
+ 1
37
+ arXiv:2301.02917v1 [math.HO] 7 Jan 2023
38
+
39
+ “Dido was a Carthaginian queen (ca. 850 B.C.?) who came from a dysfunc-
40
+ tional family. Her brother, Pygmalion, murdered her husband (who was also
41
+ her uncle) and Dido, with the help of various gods, fled to the shores of North
42
+ Africa with Pygmalion in pursuit. Upon landing in North Africa, legend has it
43
+ that she struck a deal with a local chief to procure as much land as an oxhide
44
+ could contain. She then selected an ox and cut its hide into very narrow strips,
45
+ which she joined together to form a thread of oxhide more than two and a half
46
+ miles long. Dido then used the oxhide thread and the North African sea coast
47
+ to define the perimeter of her property ... it is clear that Dido sought to enclose
48
+ the maximum area within her ox and the sea. The city of Carthage was then
49
+ built within the perimeter defined by the thread and the sea coast. Dido called
50
+ the place Byrsa meaning hide of bull.”3
51
+ “Dido ... using the seashore (given as straight) as part of the boundary, she
52
+ laid out the hide-strip to enclose the maximum possible area, which she “knew”
53
+ would be in the shape of a semicircle.”4
54
+ If these accounts were based on fact, then Dido would be the first woman
55
+ in humanity’s history to understand a mathematical principle, much before
56
+ the first mathematicians in recorded history. Since Carthage was founded in
57
+ 814 B.C., Dido was born centuries before Thales of Miletus (c. 624-548 BC),
58
+ Pythagoras of Samos (c. 570-490 BC), and Euclid of Alexandria (325-265 BC),
59
+ and much earlier than the Greek mathematicians who dealt with isoperimetric
60
+ problems, e.g. Zenodorus (c. 200-140 BC) who wrote On Isoperimetric Fig-
61
+ ures; this work is lost but details are found in the commentaries by Theon of
62
+ Alexandria (335-405 AD), and by Pappus of Alexandria (290-350 AD). In his
63
+ Mathematical Collection, Pappus presented results from ancient isoperimetry
64
+ studies5 but he did not mention Dido.
65
+ Dido’s problem is now taught as the most fundamental isoperimetric prob-
66
+ lem: for a fixed perimeter, determine the shape of the closed, planar curve
67
+ that encloses the maximum area. The answer is the circle, as any grammar
68
+ school child knows, but in variational calculus the solution is determined by an
69
+ analytical method introduced by Leonhard Euler and refined by Joseph-Louis
70
+ Lagrange.
71
+ 2
72
+ Dido in Ancient Literature
73
+ The story of Dido and the foundation of Carthage was immortalized by Virgil
74
+ in his Aeneid, and by third century Roman historian Justinus in his Epitoma
75
+ historiarum Philippicarum Pompei Trogi.
76
+ However, in these stories there is
77
+ absolutely no mention of Dido enclosing a circular shape for the purchased land
78
+ 3Brunt (2004), pp. 14-15.
79
+ 4Nahin (2004), p. 45.
80
+ 5According to Pappus, the first proof of the isoperimetric property of the circle (using
81
+ geometric arguments) is due to Zenodorus.
82
+ 2
83
+
84
+ with the string of hide, or of her using the knowledge that the circle encloses
85
+ the largest area.
86
+ Virgil wrote in the Aeneid,6 Book 1, lines 365-368, referring to Dido and her
87
+ people arriving to Africa: “They came to this place, and bought land, where
88
+ you now see the vast walls, and resurgent stronghold, of new Carthage, as much
89
+ as they could enclose with the strips of hide from a single bull, and from that
90
+ they called it Byrsa.”7
91
+ Justinus, who refers to Dido by her Phoenician name Elissa, wrote in Book
92
+ XVIII: “By this means some respite was given to the fugitives; and Elissa,
93
+ arriving in a gulf of Africa, attached the inhabitants of the coast, who rejoiced
94
+ at the arrival of foreigners, and the opportunity of bartering commodities with
95
+ them, to her interest. Having then bargained for a piece of ground, as much
96
+ as could be covered with an ox-hide, where she might refresh her companions,
97
+ wearied with their long voyage, until she could conveniently resume her progress,
98
+ she directed the hide to be cut into the thinnest possible strips, and thus acquired
99
+ a greater portion of ground than she had apparently demanded; whence the
100
+ place had afterwards the name of Byrsa.”8
101
+ Thus, if neither Virgil nor Justin provided the details given by contemporary
102
+ mathematicians about Dido’s problem as we know it, who did? how Dido’s
103
+ mythical tale became Dido’s problem? Surely, only a scientist would have made
104
+ the connecting leap between “bought land, . . . , as much as they could enclose
105
+ with the strips of hide from a single bull . . . ” (Virgil, 1st century BC), and
106
+ interpreted these words as “she laid out the hide-strip to enclose the maximum
107
+ possible area, which she “knew” would be in the shape of a semicircle” (Nahin,
108
+ 2004).
109
+ 3
110
+ Isoperimetry and Calculus of Variations
111
+ Isoperimetrics provided the roots for the development of the variational method-
112
+ ology, starting with the observation made by ancient scholars that most motion
113
+ appears to be in either straight lines or circles. The definition of a straight line as
114
+ the shortest path between two points was an early expression of a minimization
115
+ principle known to ancient geometers. The isoperimetric problems considered
116
+ in antiquity (e.g. the circle in the plane and the sphere in three-dimensional
117
+ space were known as the least perimeter figures to enclose a given area and a
118
+ given volume, respectively) were solved by geometric means.
119
+ Pappus gave credit to Zenodorus (200-140 BC) for solving for the optimal
120
+ 6Written between 29 and 19 BC, this epic poem in 12 books tells the story of the foundation
121
+ of Rome from the ashes of Troy. Virgil describes the foundation of Carthage by Dido in Book
122
+ I: 297-371.
123
+ 7Line 365: Devenere locos, ubi nunc ingentia cernis moenia surgentemque novae Karthagi-
124
+ nis arcem, mercatique solum, facti de nomine Byrsam, taurino quantum possent circumdare
125
+ tergo.
126
+ 8Marcus Junianus Justinus, Epitoma historiarum Philippicarum Pompei Trogi (Epitome of
127
+ the Philippic History of Pompeius Trogus). Translated by Rev. John Selby Watson. London:
128
+ Henry G. Bohn, Convent Garden (1853).
129
+ 3
130
+
131
+ form of a maximum area surface for a given perimeter. He also expounded the
132
+ work of Hero (or Heron) of Alexandria (c. 10-75 AD) who studied the optics of
133
+ reflection, finding that reflected light travels in a way that minimizes its travel
134
+ time. The law of reflection of light—that the angle of incidence equals the angle
135
+ of reflection—was well established since ancient times. In his Catoptrics, Euclid
136
+ noted that light travels in straight lines and described the law of reflection (300
137
+ BC). Hero showed by a geometrical method that the actual path taken by a ray
138
+ of light reflected from a plane mirror is shorter than any other reflected path
139
+ that might be drawn between the source and point of observation.
140
+ Ancient Greeks first conceived the idea that Nature selects the shortest,
141
+ easiest and most direct path in moving objects between points. In the seven-
142
+ teenth and eighteenth centuries, ideas about the economy of Nature continued
143
+ preoccupying philosophers and scientists. Finding analytic solutions to more
144
+ complicated problems of maxima and minima attracted the greatest mathe-
145
+ maticians such as Fermat, Newton, Leibniz, the Bernoulli brothers (Jacob and
146
+ Johann I), Euler, Lagrange, and Maupertuis.
147
+ Perhaps inspired by Hero’s reflected light minimization problem, Pierre de
148
+ Fermat (1601-1665) showed that the time required for a light ray to traverse a
149
+ neighboring virtual path differs from the time actually taken by a quantity of
150
+ the second order. This is known as Fermat’s principle of least time.
151
+ Newton (1643-1727) examined the motion of bodies in a resisting medium,
152
+ finding the shape of the body that renders its resistance minimal.
153
+ In June of 1696, Johann Bernoulli (1667-1748) posed the following problem
154
+ as a challenge to mathematicians: Given two points A and B in a vertical plane,
155
+ find the path AMB down which a movable point particle M must, by virtue of its
156
+ weight, will traverse in the shortest possible time (assumes that M’s acceleration
157
+ is due only to gravity). This is the famous Brachistochrone (from the Greek
158
+ brachistos, shortest, and chronos, time) problem, later also called the problem
159
+ of least time descent.
160
+ The brachistochrone problem does not have a trivial
161
+ solution; the Bernoulli brothers (Jacob and Johann I), Newton, Leibniz and
162
+ l’Hˆopital solved the problem correctly, each using a different approach.9
163
+ The initial investigations in the maxima and minima principles carried out
164
+ by Leonhard Euler began from a study of the work of these mathematicians,
165
+ especially motivated by the work of Jacob Bernoulli and prompted by his teacher
166
+ Johann Bernoulli. The latter drew his attention to a problem of geodesic lines
167
+ in a letter he sent Euler in St. Petersburg in 1728, which led Euler to conceive
168
+ in early 1729 an analytical method by which, on any surface, whether convex or
169
+ concave, the shortest line can be drawn between two points.10 Euler solved other
170
+ isoperimetric problems, obtaining results to help him establish the analytical
171
+ foundations of the calculus of variations.
172
+ Euler invented variational calculus as a distinct branch of analysis precisely
173
+ to systemize the solution methods of maxima and minima, as brilliantly intro-
174
+ duced in his 1744 book Methodus inveniendi lineas curvas maximi minimive
175
+ 9Fregulia and Giaquinta (2016), pp. 3-4.
176
+ 10Euler (1732)
177
+ 4
178
+
179
+ proprietate gaudentes, sive solutio problematis isoperimetrici lattissimo sensu
180
+ accepti, the first treatise on calculus of variations.11 With Euler’s approach, the
181
+ calculus of variations yielded a method for finding an extremum of a quantity
182
+ that is expressible as an (variational) integral.
183
+ Euler’s Methodus inveniendi represented a substantial break with the then
184
+ established tradition set for by his predecessors, including his earlier work in
185
+ the subject.12
186
+ In this treatise, Euler formulated the variational principle of
187
+ mechanics, which is the principle of least action now attributed to Maupertuis:
188
+ For a given projected body, denote its mass by M, half the square of its velocity
189
+ by v, the arclength element by ds. Then, among all curves passing through
190
+ the same pair of endpoints, the desired curve is the one that minimizes the
191
+ integral
192
+
193
+ Mdsv1/2. Details on how Euler formulated the principle are provided
194
+ by Goldstine (1980), and by Freguglia and Giaquinta (2016).13
195
+ Euler remarked: “Since the structure of the universe was made most perfect
196
+ as designed by the wisest Creator, nothing in the world will occur in which no
197
+ maximum or minimum rule is shining forth; wherefore there is absolutely no
198
+ doubt that all the effects of the world can be equally successfully determined
199
+ from final causes by means of the maximum and least methods, and from the
200
+ efficient causes themselves.”14
201
+ Considered as the first variational treatment of mechanics, Euler’s principle
202
+ of least action contributed significantly to analytic mechanics and ultimately to
203
+ the fundamental underpinnings of twentieth-century physics, including general
204
+ relativity and quantum mechanics.
205
+ Euler was also known as being able to recite Virgil’s Aeneid by heart. Did
206
+ he interpret Dido’s tale as Dido’s isoperimetric problem?
207
+ 4
208
+ Defining Dido’s Problem in the Calculus of
209
+ Variations
210
+ A casual survey of the history of mathematics books written in the eighteenth
211
+ and nineteenth century yields no clues as to when or how Dido’s mythical story
212
+ became part of variational calculus. It required a person with mathematical
213
+ brilliance and fertile imagination to connect ancient myth with mathematics.
214
+ Two names emerge as potential candidates: Leonhard Euler (1707-1783), the
215
+ originator of the calculus of variations, and British mathematician, physicist
216
+ and engineer William Thomson, known in physics as Lord Kelvin (1824-1907).
217
+ 4.1
218
+ Leonhard Euler
219
+ In Methodus inveniendi, Euler gives the following example to demonstrate his
220
+ analytical method: to find among all admissible curves, enclosing a given area,
221
+ 11Euler (1744)
222
+ 12Fraser (1993)
223
+ 13Goldstine (1980), p. 101; Freguglia and Giaquinta (2016), pp. 181-189.
224
+ 14Euler (1744), Additamentum I.
225
+ 5
226
+
227
+ Figure 1: Euler’s sketch from Methodus inveniendi (1744)
228
+ the one of least length. Figure 1 is Euler’s sketch to demonstrate that the curved
229
+ arc of a circle, BM, is minimum. In his own words:15
230
+ “On the axis AP construct the line BM, so that, when the area ABMP of
231
+ a given size is cut off, the curved arc BM corresponding to that area is the
232
+ minimum of all.” After solving his variational integral, Euler shows the solution
233
+ curve to be an arc of a circle with center somewhere on the line AP, for example,
234
+ at C in Fig. 1.
235
+ But neither Euler’s Methodus inveniendi nor his other published memoirs in
236
+ the field ever mention Dido.
237
+ In October 1783, the Marquis de Condorcet16 gave the ´Eloge d’Euler to the
238
+ members of the Acad´emie des Sciences in Paris. In this solemn eulogy, Con-
239
+ dorcet expounded on Euler’s genius and suggested that a verse from the Aeneid
240
+ had given Euler the first idea for a memoir on a question of Mechanics.
241
+ In
242
+ Condorcet’s own words:
243
+ L’´etude de la Litt´erature ancienne et des Langues savantes avait fait partie
244
+ de son ´education ; il en conserva le goˆut toute sa vie, et n’oublia rien de ce qu’il
245
+ avait appris ; mais il n’eut jamais ni le tems ni le d´esir d’ajouter `a ses premi`eres
246
+ ´etudes : il n’avait pas lu les Po`etes modernes, et savait par cœur l’Eneide.
247
+ Cependant M. Euler ne perdait pas de vue les Math´ematiques, mˆeme lorsqu’il
248
+ r´ecitait les vers de Virgile ; tout ´etait propre `a lui rappeler cet objet presque
249
+ unique de ses pens´ees, et on trouve dans ses ouvrages un savant M´emoire sur
250
+ une question de M´ecanique, dont il racontait qu’un vers de l’Eneide lui avait
251
+ donn´e la premi`ere id´ee.17 [The study of ancient literature and scholarly lan-
252
+ guages had been part of his education; he retained a taste for it all his life, and
253
+ 15Euler (1744), Chapter IV, p.
254
+ 135, Exemplum II: 9.
255
+ Super axe AP construere lineam
256
+ BM, ita comparatant, ut, abscissa area ABMP datæ magnitudinis, arcus curvæ BM illi areæ
257
+ respondens sit omnium minimus.
258
+ 16Condorcet, Jean-Antoine-Nicolas de Caritat marquis de (1743-1794).
259
+ 17 ´Eloge d’Euler Prononc´e `a l’Acad´emie, par de Condorcet, Histoire de l’Acad´emie royale
260
+ des sciences ... 1783, p. 64.
261
+ 6
262
+
263
+ Bforgot nothing he had learned; but he never had either the time or the desire to
264
+ add to his first studies: he had not read the Modern Poets, and knew the Aeneid
265
+ by heart. However, M. Euler did not lose sight of Mathematics, even when he
266
+ recited the verses of Virgil; everything was likely to remind him of this almost
267
+ unique object of his thoughts, and we find in his works a scholarly Memoir on a
268
+ question of Mechanics, of which he said that a verse from the Aeneid had given
269
+ him the first idea.]
270
+ Euler did take verses from the Aeneid poem to use as mottos for his com-
271
+ peting memoirs submitted to the French Academy.18 These are summarized in
272
+ Table 1. Was this to what Condorcet referred to?
273
+ Table 1. Euler’s Memoirs and Mottos taken from Virgil’s Aeneid.
274
+ Year
275
+ Memoir Title
276
+ Motto
277
+ 1753
278
+ “On the movement of ships
279
+ Tali remigio navis se
280
+ (E. 413)
281
+ without the wind’s force.”
282
+ tarda movebat.
283
+ 7th winning memoir
284
+ Virg. Aeneid Liv. 5
285
+ 1759
286
+ “Concernin pitching
287
+ Insequitur clamorque virum
288
+ (E. 415)
289
+ and rolling.”
290
+ stridorque rudentum.
291
+ 9th winning memoir
292
+ Virg. Aeneid, Liv. 1
293
+ 1770
294
+ “Moon Theory”
295
+ Errantem que canit Lunam
296
+ (E. 485)
297
+ Prize for 1770
298
+ Virg. Aeneid Liv. 1
299
+ 10th winning memoir
300
+ 1772
301
+ “Improved Moon theory”
302
+ Hic labor extremus, longarum
303
+ (E. 486)
304
+ Prize for 1772
305
+ haec meta viarum hinc jam
306
+ 11th winning memoir
307
+ digressi, vestris appellimus oris
308
+ Virg. Aeneid, Liv. 3
309
+ However, the mottos were carefully selected by Euler to match the research
310
+ topic of the competition.19 In addition to using Virgil’s verses, he also quoted
311
+ from other ancient writers such as Marcus Tullius Cicero, Properci, and he
312
+ composed other adages, asking Christian Goldbach for suggestions. Ultimately,
313
+ Condorcet’s statement “et on trouve dans ses ouvrages un savant M´emoire sur
314
+ une question de M´ecanique, dont il racontait qu’un vers de l’Eneide lui avait
315
+ donn´e la premi`ere id´ee” does not mean that Euler was inspired by Virgil to
316
+ define Dido’s problem.
317
+ As a historian, I cannot rely on obituaries to extract factual data, even if
318
+ written by an eminent scholar. The much younger Condorcet never met Euler,
319
+ and the ´Eloge he wrote, as most eulogies are, was based on hearsay, relaying on
320
+ what the French academicians might have recalled about Euler’s life and work.
321
+ 18Submissions were anonymously and the memoir identified by a motto; the author’s name
322
+ enclosed in a sealed envelope was opened only for the winning memoir after the judging of
323
+ the contest.
324
+ 19For the significance of the mottos that Euler selected, see Musielak (2022).
325
+ 7
326
+
327
+ A contemporary biography (published in 2016) further implies that Euler
328
+ solved Dido’s problem. The author refers to a copy of an eight-page manuscript
329
+ (preserved in Moscow) that is said to contain Euler’s answer.
330
+ Is this the
331
+ manuscript that categorically would give Euler credit for connecting Dido’s story
332
+ to variational calculus? Unfortunately, the manuscript in question is said to be
333
+ “not in Euler’s own handwriting.” Thus, it diminishes its credibility. It is rather
334
+ improbable that Euler, a prolific writer, would be the author of a manuscript
335
+ inscribed by someone else. Besides, he would have included this solution in a
336
+ paper published in 1764, where Euler summarized the results of the Calculus of
337
+ Variations in terms of the variational operator.
338
+ Joseph-Louis Lagrange (1736-1813) expanded the variational calculus. In his
339
+ second letter to Euler dated August 1755, Lagrange outlined his delta-algorithm
340
+ (for solving constrained optimization problems), an approach Euler embraced,
341
+ prompting him to conceive the term calculus of variations. In the abstract of
342
+ a memoir published in 1764, Euler credits Lagrange for enriching the science20
343
+ Their combined work led eventually to the Euler–Lagrange equations, which are
344
+ the equilibrium equations for minima of variational integrals.21
345
+ Five years after Euler died, Lagrange published M´ecanique analytique, his
346
+ compendium on analytical mechanics, using variational ideas to present me-
347
+ chanics from a unified analytic viewpoint. When teaching at the ´Ecole Poly-
348
+ technique in 1799, Lagrange published Le¸cons sur le calcul des fonctions and
349
+ explained the method of variation. Lagrange provided a brief overview of the
350
+ development of problems of maxima and minima, referring only to Greek math-
351
+ ematician Apollonius (262-190 BC), which dealt exclusively with the largest
352
+ and smallest straight lines which can be drawn from given points to the arcs of
353
+ conic sections.22 Dido’s problem is not mentioned here nor in Lagrange’s other
354
+ published works.
355
+ 4.2
356
+ William Thomson, Lord Kelvin
357
+ The first instance in which Dido’s name appear in the context of interest is
358
+ found in a public lecture delivered by William Thomson in 1893. A great physi-
359
+ cist known today as Lord Kelvin, his contributions include a major role in the
360
+ development of the second law of thermodynamics; the absolute temperature
361
+ scale (measured in kelvins); the dynamical theory of heat; the mathematical
362
+ analysis of electricity and magnetism, including the basic ideas for the electro-
363
+ magnetic theory of light; and much more. He brought together disparate areas
364
+ of physics—heat, thermodynamics, mechanics, hydrodynamics, magnetism, and
365
+ 20Euler (1764). . .
366
+ ex quo Auctori occasio est oblata hanc scientiam novo Calculi genere
367
+ locupletandi, quem Calculum variationum appellat et cuis elementa hic tradere ac dilucide
368
+ explicare constituit.
369
+ 21See Freguglia and Giaquinta (2016) for an excellent presentation of the Euler-Lagrange
370
+ equations, including a historical perspective.
371
+ 22Lagrange (1806).
372
+ Les questions de maximis et minimis n’ont pas ´et´e incounues aux
373
+ anciens g´eom`etres ; car on a un livre entier d’Apollonius, qui traite presqu’uniquement des
374
+ plus grandes et des plus petites lignes droites qui peuvent ˆetre men´ees de points donn´es aux
375
+ arcs des sections coniques. p. 424.
376
+ 8
377
+
378
+ Figure 2: Dido’s problem as described by Lord Kelvin in 1893.
379
+ electricity. Lord Kelvin played a key role in the final synthesis of 19th-century
380
+ science, which viewed all physical change as energy-related phenomena.23
381
+ Lord Kelvin related Dido’s clever approach to bargaining for land as follows,
382
+ using the sketch in Fig. 2 to illustrate Dido’s problem:
383
+ “. . .
384
+ She cut the ox-hide into an exceedingly long strip, and succeeded in
385
+ enclosing between it and the sea a very valuable territory on which she built
386
+ Carthage. In Dido’s problem the greatest value of land was to be enclosed by a
387
+ line of given length. If the land is all of equal value the general solution of the
388
+ problem shows that her line of ox-hide should be laid down in a circle. It shows
389
+ also that if the sea is to be part of the boundary, starting, let us say, southward
390
+ from any given point, A, of the coast, the inland bounding line must at its far
391
+ end cut the coast line perpendicularly. Here, then, to complete our solution, we
392
+ have a very curious and interesting, but not at all easy, geometrical question to
393
+ answer: What must be the radius of a circular arc, ADC, of given length, and
394
+ in what direction must it leave the point A, in order that it may cut a given
395
+ curve, ABC, perpendicular at some unknown point, C?”24
396
+ Lord Kelvin added that having enough mathematics knowledge, Dido would
397
+ determine that the boundary had to be a circle. Of course, as illustrated in Fig.
398
+ 2, she would have given the boundary a different curvature in different parts to
399
+ gain as much as possible of the more valuable parts of the land offered to her,
400
+ “even though difference of curvature in different parts would cause the total
401
+ area enclosed to be less than it would be with a circular boundary of the same
402
+ length.”25
403
+ 23Gray (1910)
404
+ 24Thomson (1894), p. 572-574.
405
+ 25Ibid., p. 574.
406
+ 9
407
+
408
+ CARTHAGToday, taught as introduction to calculus of variation, the solution of Dido’s
409
+ problem requires an extremization solution under constraint, that is, we max-
410
+ imize the area, A =
411
+
412
+ ydx, subject to the condition that the arc, L =
413
+
414
+ ds is
415
+ of a given length L. In other words, we wish to maximize the integral A sub-
416
+ ject to the condition that another integral L has a given constant value. Note
417
+ this is an optimization problem with constraints where we use Lagrange’s strat-
418
+ egy for finding the local maxima and minima of a function subject to equality
419
+ constraints.
420
+ It is clear that, without an original reliable source, I cannot conclude that
421
+ Euler defined Dido’s Problem for the first time, inspired by Virgil’s Aeneid,
422
+ as Condorcet implied. The evidence points to Lord Kelvin who described the
423
+ problem in 1893. And as he stated, whether severe critics will call Dido’s story
424
+ mythical or allow it to be historic, it is nevertheless full of scientific interest.
425
+ As for me, Dido’s Problem is an excellent example to introduce students to
426
+ the calculus of variations, as it expresses a perfectly definite case of isoperimet-
427
+ rics, illustrating the fundamental principles introduced by Euler and Lagrange
428
+ in the eighteenth century.
429
+ 5
430
+ Dido and Ancient Mathematics
431
+ Nothing is known about Dido’s knowledge. Being a Phoenician princess, it is
432
+ highly probable that she was well educated. What we glimpse from Virgil’s
433
+ and Justinus’s tales is that Dido was a formidable woman, smart, ambitious, a
434
+ foreign leader that left the city of Tyre (on the coastline of modern Lebanon)
435
+ with her faithful followers, navigated the waters of the Mediterranean Sea and
436
+ landed in the coast of North Africa. There, she established and ruled Carthage
437
+ (modern day Tunis), an important port city that rose to the height of its power
438
+ in the second century BC, before Rome became supreme and took over that
439
+ region.
440
+ For the ancient cultures that flourished around the Mediterranean, geom-
441
+ etry was fundamental to their development. The Babylonians thriving in the
442
+ Mesopotamian River Valley engaged in commerce through the Mediterranean,
443
+ and this required considerable mathematical skills. Clay tables preserve records
444
+ of what they knew.
445
+ For instance, clay tables from Babylon, located in the
446
+ southern part of Mesopotamia, about fifty miles south of present-day Baghdad
447
+ (Iraq) suggest that the Babylonian had an advanced knowledge of geometry and
448
+ arithmetic.
449
+ In fact, some scholars believe that the Babylonians knew the Pythagorean
450
+ theorem a thousand years before Pythagoras of Samos. At Susa, an ancient
451
+ city over two hundred miles from Babylon, a set of tablets were discovered in
452
+ 1936, which contain the ratios of areas and perimeters of regular polygons to
453
+ their respective side lengths. The best known surviving tablet (estimated to be
454
+ from between 1900 and 1600 BC) contains a list of Pythagorean triples. This
455
+ suggests that the Babylonians had knowledge of the Pythagorean theorem, as
456
+ well as certain algebraic identities.
457
+ 10
458
+
459
+ Moreover, that women knew mathematics in ancient times has been exten-
460
+ sively documented.
461
+ For example, the Pythagorean society included women,
462
+ some of which became famous such as mathematician Theano, who was mar-
463
+ ried to Pythagoras. In the dedication of his Introduction to Harmonics, ancient
464
+ mathematician and music theorist Nicomachus of Gerasa (c. 60-120 AD) ad-
465
+ dresses the lessons to a lady, one of his students.26 In this book, also known as
466
+ Manual of Harmonics, Nicomachus dealt with the theory of music, a version of
467
+ Pythagorean harmonics, in which he assigned number and numerical ratios to
468
+ notes and intervals. And of course, we know about Hypatia of Alexandria (c.
469
+ 370-415 AD) considered the first woman scholar to attain eminence as mathe-
470
+ matician and astronomer.27
471
+ I believe that Dido was educated in mathematics, and so she used the the-
472
+ orem of isoperimetry to outsmart the king who sold her the piece of land in
473
+ the northern tip of Africa (today’s Tunisia). Therefore, Dido’s Problem should
474
+ be viewed not only to illustrate a fundamental problem of variational calculus
475
+ but also as a lesson in the history of mathematics and the role ancient women
476
+ played in its development.
477
+ References
478
+ Brunt, B. van (2004). The Calculus of Variations. Published by Springer
479
+ New York ISBN: 978-0-387-40247-5 DOI: 10.1007/b97436.
480
+ Coppersmith, J. (2017) The Lazy Universe: An Introduction to the Principle
481
+ of Least Action. Oxford University Press.
482
+ Euler, L. (1732). De linea brevissima in superficie quacunque duo quaelibet
483
+ puncta iungente (On the shortest line joining two points on a surface). Com-
484
+ mentarii academiae scientiarum Petropolitanae, Volume 3, 1732, pp. 110-124.
485
+ (E. 9)
486
+ Euler, L. (1738). Problematis isoperimetrici in latissimo sensu accepti so-
487
+ lutio generalis (On isoperimetric problems in the widest sense). Commenturii
488
+ Academiae Scientiarum Petropolitanae 6 (1732/3), 123-155. Opera Omnia, 125,
489
+ 13-40. (E. 27)
490
+ Euler, L. (1741). Curvarum maximi minimive proprietate gaudentium inven-
491
+ tio nova et facilis (New and easy method of finding curves enjoying a maximal
492
+ or minimal property). In Commentarii Academiae Scientiarum Petropolitanae
493
+ 8 (1736). 159-190. Reprinted in Euler, L. Opera Omnia, I 25, 54-80. (E. 56)
494
+ Euler, L. (1744). Methodus inveniendi curvas h’neas maximi minimive pro-
495
+ prietate gaudentes sive solution problematis isoperimetrici latissimo sensu ac-
496
+ cepti. Lausanne, Genf: M.-M. Bousquet. Reprinted in Euler, L. Opera Omnia,
497
+ I 24. (E. 65). According to Enestr¨om, Euler completed the manuscript of this
498
+ work by April 1743.
499
+ Euler, L. (1764).
500
+ Elementa calculi variationum (Elements of Calculus of
501
+ Variations). Novi commentarii academiae scientiarum Petropolitanea 10 (1764),
502
+ 26Biographical Note of Nicomachus, in Great Books of the Western World, Robert Maynard
503
+ Hutchins, Ed., Vol. 11, p. 807.
504
+ 27Musielak (2020), pp. 206-207.
505
+ 11
506
+
507
+ 1766, pp. 51-93. This research (E. 296) was presented at the Berlin Academy
508
+ in 1756.
509
+ Freguglia, P. and Giaquinta, M. (2016). The Early Period of the Calculus
510
+ of Variations. Published by Birkh¨auser.
511
+ Gelfand, I. M. and Fomin, S. V. (1963). Calculus of Variations. Revised
512
+ English Edition Translated and Edited by R. A. Silverman Prentice-Hall, Inc.
513
+ Englewood Cliffs, NJ.
514
+ Goldstine, H. (1980). A History of the Calculus of Variations from the 17th
515
+ through the 19th Century. Springer-Verlag.
516
+ Gray, A. (1910).
517
+ The Life of William Thomson, Baron Kelvin of Large.
518
+ Nature 83, 61–65 (1910).
519
+ Lagrange (1806). Le¸cons sur le calcul des fonctions. Nouvelle ´edition, revue,
520
+ corrig´ee et augment´ee par l’auteur [J.-L. Lagrange]. Initially published as lecture
521
+ notes in 1799 when Lagrange was teaching at the Ecole Polytechnique and
522
+ reprinted in 1804. In 1806, Lagrange published a new edition containing two
523
+ new lessons.
524
+ Menger, K. (1937). What is Calculus of Variations and What Are Its Ap-
525
+ plications? The Scientific Monthly 45 (3) (1937), 250-253.
526
+ Musielak, D. (2022). Leonhard Euler and the Foundations of Celestial Me-
527
+ chanics. Springer History of Physics Series. Springer Nature Switzerland. ISBN
528
+ 978-3-031-12321-4.
529
+ Musielak, D. (2020). Sophie Germain: Revolutionary Mathematician. Springer
530
+ Biographies. Springer Nature Switzerland. ISBN 978-3030383770.
531
+ Nahin, J.P. (2004). When Least is Best. Princeton University Press, 2004.
532
+ Rojo, A. and Bloch, A. (2018). The Principle of Least Action: History and
533
+ Physics. Cambridge University Press. doi:10.1017/9781139021029
534
+ Thomson, W. (1894). Popular Lectures and Addresses by Sir William Thom-
535
+ son (Baron Kelvin) in Three Volumes. Nature Series, MacMillan and Co. Lon-
536
+ don 1894.
537
+ Dora Musielak; University of Texas at Arlington, 6 January 2023
538
+ 12
539
+
LNE1T4oBgHgl3EQfGwM1/content/tmp_files/load_file.txt ADDED
@@ -0,0 +1,372 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ filepath=/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf,len=371
2
+ page_content='Dido’s Problem: When a myth of ancient literature became a problem of variational calculus Dora Musielak Abstract When introducing the calculus of variations, we may invoke Dido’s problem to illustrate the most fundamental variational problem: to find the curve of given perimeter which bounds the greatest area.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
3
+ page_content=' This type of problem led mathematicians to invent solution methods of maxima and minima, and the genesis of variational calculus as a distinct branch of anal- ysis.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
4
+ page_content=' Dido’s problem was inspired by the mythical tale of the foundation of Carthage (ancient city in North Africa) by a Phoenician princess as told independently by Roman poet Virgil, and by Latin historian Justinus in the first two centuries B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
5
+ page_content='C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
6
+ page_content=' Historians have debated the facts surrounding Carthage’s birth;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
7
+ page_content=' however, contemporary mathematicians have accepted the vague events described by Virgil in his Aeneid, adding details to Dido’s story to extrapolate a few verses and use as a basis for the isoperimet- ric theorem.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
8
+ page_content=' Was Leonhard Euler or Lord Kelvin who first interpreted Virgil’s poem as Dido’s problem of variational calculus?' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
9
+ page_content=' In this article I attempt to resolve a question of historical attribution to identify who first defined Dido’s problem.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
10
+ page_content=' Keywords: Isoperimetrics,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
11
+ page_content=' variational calculus,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
12
+ page_content=' Euler,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
13
+ page_content=' Lord Kelvin 1 Introduction In 1937,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
14
+ page_content=' Karl Menger1 wrote: “The first human being to solve a problem of calculus of variations seems to have been Queen Dido of Carthage.”' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
15
+ page_content=' Contempo- rary mathematics books2 go much further than that by adding details to Dido’s story taken from Virgil’s Aeneid,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
16
+ page_content=' alleging that Dido established Carthage,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
17
+ page_content=' an ancient city in modern Tunisia,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
18
+ page_content=' by application of the isoperimetric property of the circle to secure the largest area of land she bought upon arrival to North Africa.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
19
+ page_content=' Here are two examples, where I use Italics to highlight details of Dido’s story that are not in Virgil’s poem: 1Menger (1937) 2See for example, Brunt (2004);' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
20
+ page_content=' Freguglia and Giaquinta (2016);' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
21
+ page_content=' Coppersmith (2017);' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
22
+ page_content=' Nahin (2004);' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
23
+ page_content=' Rojo and Bloch (2018).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
24
+ page_content=' 1 arXiv:2301.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
25
+ page_content='02917v1 [math.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
26
+ page_content='HO] 7 Jan 2023 “Dido was a Carthaginian queen (ca.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
27
+ page_content=' 850 B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
28
+ page_content='C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
29
+ page_content='?' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
30
+ page_content=') who came from a dysfunc- tional family.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
31
+ page_content=' Her brother, Pygmalion, murdered her husband (who was also her uncle) and Dido, with the help of various gods, fled to the shores of North Africa with Pygmalion in pursuit.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
32
+ page_content=' Upon landing in North Africa, legend has it that she struck a deal with a local chief to procure as much land as an oxhide could contain.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
33
+ page_content=' She then selected an ox and cut its hide into very narrow strips, which she joined together to form a thread of oxhide more than two and a half miles long.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
34
+ page_content=' Dido then used the oxhide thread and the North African sea coast to define the perimeter of her property .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
35
+ page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
36
+ page_content=' it is clear that Dido sought to enclose the maximum area within her ox and the sea.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
37
+ page_content=' The city of Carthage was then built within the perimeter defined by the thread and the sea coast.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
38
+ page_content=' Dido called the place Byrsa meaning hide of bull.”3 “Dido .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
39
+ page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
40
+ page_content=' using the seashore (given as straight) as part of the boundary, she laid out the hide-strip to enclose the maximum possible area, which she “knew” would be in the shape of a semicircle.”4 If these accounts were based on fact, then Dido would be the first woman in humanity’s history to understand a mathematical principle, much before the first mathematicians in recorded history.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
41
+ page_content=' Since Carthage was founded in 814 B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
42
+ page_content='C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
43
+ page_content=', Dido was born centuries before Thales of Miletus (c.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
44
+ page_content=' 624-548 BC), Pythagoras of Samos (c.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
45
+ page_content=' 570-490 BC), and Euclid of Alexandria (325-265 BC), and much earlier than the Greek mathematicians who dealt with isoperimetric problems, e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
46
+ page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
47
+ page_content=' Zenodorus (c.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
48
+ page_content=' 200-140 BC) who wrote On Isoperimetric Fig- ures;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
49
+ page_content=' this work is lost but details are found in the commentaries by Theon of Alexandria (335-405 AD), and by Pappus of Alexandria (290-350 AD).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
50
+ page_content=' In his Mathematical Collection, Pappus presented results from ancient isoperimetry studies5 but he did not mention Dido.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
51
+ page_content=' Dido’s problem is now taught as the most fundamental isoperimetric prob- lem: for a fixed perimeter, determine the shape of the closed, planar curve that encloses the maximum area.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
52
+ page_content=' The answer is the circle, as any grammar school child knows, but in variational calculus the solution is determined by an analytical method introduced by Leonhard Euler and refined by Joseph-Louis Lagrange.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
53
+ page_content=' 2 Dido in Ancient Literature The story of Dido and the foundation of Carthage was immortalized by Virgil in his Aeneid, and by third century Roman historian Justinus in his Epitoma historiarum Philippicarum Pompei Trogi.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
54
+ page_content=' However, in these stories there is absolutely no mention of Dido enclosing a circular shape for the purchased land 3Brunt (2004), pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
55
+ page_content=' 14-15.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
56
+ page_content=' 4Nahin (2004), p.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
57
+ page_content=' 45.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
58
+ page_content=' 5According to Pappus, the first proof of the isoperimetric property of the circle (using geometric arguments) is due to Zenodorus.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
59
+ page_content=' 2 with the string of hide, or of her using the knowledge that the circle encloses the largest area.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
60
+ page_content=' Virgil wrote in the Aeneid,6 Book 1, lines 365-368, referring to Dido and her people arriving to Africa: “They came to this place, and bought land, where you now see the vast walls, and resurgent stronghold, of new Carthage, as much as they could enclose with the strips of hide from a single bull, and from that they called it Byrsa.”7 Justinus, who refers to Dido by her Phoenician name Elissa, wrote in Book XVIII: “By this means some respite was given to the fugitives;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
61
+ page_content=' and Elissa, arriving in a gulf of Africa, attached the inhabitants of the coast, who rejoiced at the arrival of foreigners, and the opportunity of bartering commodities with them, to her interest.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
62
+ page_content=' Having then bargained for a piece of ground, as much as could be covered with an ox-hide, where she might refresh her companions, wearied with their long voyage, until she could conveniently resume her progress, she directed the hide to be cut into the thinnest possible strips, and thus acquired a greater portion of ground than she had apparently demanded;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
63
+ page_content=' whence the place had afterwards the name of Byrsa.”8 Thus, if neither Virgil nor Justin provided the details given by contemporary mathematicians about Dido’s problem as we know it, who did?' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
64
+ page_content=' how Dido’s mythical tale became Dido’s problem?' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
65
+ page_content=' Surely, only a scientist would have made the connecting leap between “bought land, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
66
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
67
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
68
+ page_content=' , as much as they could enclose with the strips of hide from a single bull .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
69
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
70
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
71
+ page_content=' ” (Virgil, 1st century BC), and interpreted these words as “she laid out the hide-strip to enclose the maximum possible area, which she “knew” would be in the shape of a semicircle” (Nahin, 2004).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
72
+ page_content=' 3 Isoperimetry and Calculus of Variations Isoperimetrics provided the roots for the development of the variational method- ology, starting with the observation made by ancient scholars that most motion appears to be in either straight lines or circles.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
73
+ page_content=' The definition of a straight line as the shortest path between two points was an early expression of a minimization principle known to ancient geometers.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
74
+ page_content=' The isoperimetric problems considered in antiquity (e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
75
+ page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
76
+ page_content=' the circle in the plane and the sphere in three-dimensional space were known as the least perimeter figures to enclose a given area and a given volume, respectively) were solved by geometric means.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
77
+ page_content=' Pappus gave credit to Zenodorus (200-140 BC) for solving for the optimal 6Written between 29 and 19 BC, this epic poem in 12 books tells the story of the foundation of Rome from the ashes of Troy.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
78
+ page_content=' Virgil describes the foundation of Carthage by Dido in Book I: 297-371.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
79
+ page_content=' 7Line 365: Devenere locos, ubi nunc ingentia cernis moenia surgentemque novae Karthagi- nis arcem, mercatique solum, facti de nomine Byrsam, taurino quantum possent circumdare tergo.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
80
+ page_content=' 8Marcus Junianus Justinus, Epitoma historiarum Philippicarum Pompei Trogi (Epitome of the Philippic History of Pompeius Trogus).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
81
+ page_content=' Translated by Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
82
+ page_content=' John Selby Watson.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
83
+ page_content=' London: Henry G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
84
+ page_content=' Bohn, Convent Garden (1853).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
85
+ page_content=' 3 form of a maximum area surface for a given perimeter.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
86
+ page_content=' He also expounded the work of Hero (or Heron) of Alexandria (c.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
87
+ page_content=' 10-75 AD) who studied the optics of reflection, finding that reflected light travels in a way that minimizes its travel time.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
88
+ page_content=' The law of reflection of light—that the angle of incidence equals the angle of reflection—was well established since ancient times.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
89
+ page_content=' In his Catoptrics, Euclid noted that light travels in straight lines and described the law of reflection (300 BC).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
90
+ page_content=' Hero showed by a geometrical method that the actual path taken by a ray of light reflected from a plane mirror is shorter than any other reflected path that might be drawn between the source and point of observation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
91
+ page_content=' Ancient Greeks first conceived the idea that Nature selects the shortest, easiest and most direct path in moving objects between points.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
92
+ page_content=' In the seven- teenth and eighteenth centuries, ideas about the economy of Nature continued preoccupying philosophers and scientists.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
93
+ page_content=' Finding analytic solutions to more complicated problems of maxima and minima attracted the greatest mathe- maticians such as Fermat, Newton, Leibniz, the Bernoulli brothers (Jacob and Johann I), Euler, Lagrange, and Maupertuis.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
94
+ page_content=' Perhaps inspired by Hero’s reflected light minimization problem, Pierre de Fermat (1601-1665) showed that the time required for a light ray to traverse a neighboring virtual path differs from the time actually taken by a quantity of the second order.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
95
+ page_content=' This is known as Fermat’s principle of least time.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
96
+ page_content=' Newton (1643-1727) examined the motion of bodies in a resisting medium, finding the shape of the body that renders its resistance minimal.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
97
+ page_content=' In June of 1696, Johann Bernoulli (1667-1748) posed the following problem as a challenge to mathematicians: Given two points A and B in a vertical plane, find the path AMB down which a movable point particle M must, by virtue of its weight, will traverse in the shortest possible time (assumes that M’s acceleration is due only to gravity).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
98
+ page_content=' This is the famous Brachistochrone (from the Greek brachistos, shortest, and chronos, time) problem, later also called the problem of least time descent.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
99
+ page_content=' The brachistochrone problem does not have a trivial solution;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
100
+ page_content=' the Bernoulli brothers (Jacob and Johann I), Newton, Leibniz and l’Hˆopital solved the problem correctly, each using a different approach.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
101
+ page_content='9 The initial investigations in the maxima and minima principles carried out by Leonhard Euler began from a study of the work of these mathematicians, especially motivated by the work of Jacob Bernoulli and prompted by his teacher Johann Bernoulli.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
102
+ page_content=' The latter drew his attention to a problem of geodesic lines in a letter he sent Euler in St.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
103
+ page_content=' Petersburg in 1728, which led Euler to conceive in early 1729 an analytical method by which, on any surface, whether convex or concave, the shortest line can be drawn between two points.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
104
+ page_content='10 Euler solved other isoperimetric problems, obtaining results to help him establish the analytical foundations of the calculus of variations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
105
+ page_content=' Euler invented variational calculus as a distinct branch of analysis precisely to systemize the solution methods of maxima and minima, as brilliantly intro- duced in his 1744 book Methodus inveniendi lineas curvas maximi minimive 9Fregulia and Giaquinta (2016), pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
106
+ page_content=' 3-4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
107
+ page_content=' 10Euler (1732) 4 proprietate gaudentes, sive solutio problematis isoperimetrici lattissimo sensu accepti, the first treatise on calculus of variations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
108
+ page_content='11 With Euler’s approach, the calculus of variations yielded a method for finding an extremum of a quantity that is expressible as an (variational) integral.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
109
+ page_content=' Euler’s Methodus inveniendi represented a substantial break with the then established tradition set for by his predecessors, including his earlier work in the subject.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
110
+ page_content='12 In this treatise, Euler formulated the variational principle of mechanics, which is the principle of least action now attributed to Maupertuis: For a given projected body, denote its mass by M, half the square of its velocity by v, the arclength element by ds.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
111
+ page_content=' Then, among all curves passing through the same pair of endpoints, the desired curve is the one that minimizes the integral � Mdsv1/2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
112
+ page_content=' Details on how Euler formulated the principle are provided by Goldstine (1980), and by Freguglia and Giaquinta (2016).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
113
+ page_content='13 Euler remarked: “Since the structure of the universe was made most perfect as designed by the wisest Creator, nothing in the world will occur in which no maximum or minimum rule is shining forth;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
114
+ page_content=' wherefore there is absolutely no doubt that all the effects of the world can be equally successfully determined from final causes by means of the maximum and least methods, and from the efficient causes themselves.”14 Considered as the first variational treatment of mechanics, Euler’s principle of least action contributed significantly to analytic mechanics and ultimately to the fundamental underpinnings of twentieth-century physics, including general relativity and quantum mechanics.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
115
+ page_content=' Euler was also known as being able to recite Virgil’s Aeneid by heart.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
116
+ page_content=' Did he interpret Dido’s tale as Dido’s isoperimetric problem?' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
117
+ page_content=' 4 Defining Dido’s Problem in the Calculus of Variations A casual survey of the history of mathematics books written in the eighteenth and nineteenth century yields no clues as to when or how Dido’s mythical story became part of variational calculus.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
118
+ page_content=' It required a person with mathematical brilliance and fertile imagination to connect ancient myth with mathematics.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
119
+ page_content=' Two names emerge as potential candidates: Leonhard Euler (1707-1783), the originator of the calculus of variations, and British mathematician, physicist and engineer William Thomson, known in physics as Lord Kelvin (1824-1907).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
120
+ page_content=' 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
121
+ page_content='1 Leonhard Euler In Methodus inveniendi, Euler gives the following example to demonstrate his analytical method: to find among all admissible curves, enclosing a given area, 11Euler (1744) 12Fraser (1993) 13Goldstine (1980), p.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
122
+ page_content=' 101;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
123
+ page_content=' Freguglia and Giaquinta (2016), pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
124
+ page_content=' 181-189.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
125
+ page_content=' 14Euler (1744), Additamentum I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
126
+ page_content=' 5 Figure 1: Euler’s sketch from Methodus inveniendi (1744) the one of least length.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
127
+ page_content=' Figure 1 is Euler’s sketch to demonstrate that the curved arc of a circle, BM, is minimum.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
128
+ page_content=' In his own words:15 “On the axis AP construct the line BM, so that, when the area ABMP of a given size is cut off, the curved arc BM corresponding to that area is the minimum of all.” After solving his variational integral, Euler shows the solution curve to be an arc of a circle with center somewhere on the line AP, for example, at C in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
129
+ page_content=' 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
130
+ page_content=' But neither Euler’s Methodus inveniendi nor his other published memoirs in the field ever mention Dido.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
131
+ page_content=' In October 1783, the Marquis de Condorcet16 gave the ´Eloge d’Euler to the members of the Acad´emie des Sciences in Paris.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
132
+ page_content=' In this solemn eulogy, Con- dorcet expounded on Euler’s genius and suggested that a verse from the Aeneid had given Euler the first idea for a memoir on a question of Mechanics.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
133
+ page_content=' In Condorcet’s own words: L’´etude de la Litt´erature ancienne et des Langues savantes avait fait partie de son ´education ;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
134
+ page_content=' il en conserva le goˆut toute sa vie, et n’oublia rien de ce qu’il avait appris ;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
135
+ page_content=' mais il n’eut jamais ni le tems ni le d´esir d’ajouter `a ses premi`eres ´etudes : il n’avait pas lu les Po`etes modernes, et savait par cœur l’Eneide.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
136
+ page_content=' Cependant M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
137
+ page_content=' Euler ne perdait pas de vue les Math´ematiques, mˆeme lorsqu’il r´ecitait les vers de Virgile ;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
138
+ page_content=' tout ´etait propre `a lui rappeler cet objet presque unique de ses pens´ees, et on trouve dans ses ouvrages un savant M´emoire sur une question de M´ecanique, dont il racontait qu’un vers de l’Eneide lui avait donn´e la premi`ere id´ee.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
139
+ page_content='17 [The study of ancient literature and scholarly lan- guages had been part of his education;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
140
+ page_content=' he retained a taste for it all his life, and 15Euler (1744), Chapter IV, p.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
141
+ page_content=' 135, Exemplum II: 9.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
142
+ page_content=' Super axe AP construere lineam BM, ita comparatant, ut, abscissa area ABMP datæ magnitudinis, arcus curvæ BM illi areæ respondens sit omnium minimus.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
143
+ page_content=' 16Condorcet, Jean-Antoine-Nicolas de Caritat marquis de (1743-1794).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
144
+ page_content=' 17 ´Eloge d’Euler Prononc´e `a l’Acad´emie, par de Condorcet, Histoire de l’Acad´emie royale des sciences .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
145
+ page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
146
+ page_content=' 1783, p.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
147
+ page_content=' 64.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
148
+ page_content=' 6 Bforgot nothing he had learned;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
149
+ page_content=' but he never had either the time or the desire to add to his first studies: he had not read the Modern Poets, and knew the Aeneid by heart.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
150
+ page_content=' However, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
151
+ page_content=' Euler did not lose sight of Mathematics, even when he recited the verses of Virgil;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
152
+ page_content=' everything was likely to remind him of this almost unique object of his thoughts, and we find in his works a scholarly Memoir on a question of Mechanics, of which he said that a verse from the Aeneid had given him the first idea.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
153
+ page_content='] Euler did take verses from the Aeneid poem to use as mottos for his com- peting memoirs submitted to the French Academy.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
154
+ page_content='18 These are summarized in Table 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
155
+ page_content=' Was this to what Condorcet referred to?' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
156
+ page_content=' Table 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
157
+ page_content=' Euler’s Memoirs and Mottos taken from Virgil’s Aeneid.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
158
+ page_content=' Year Memoir Title Motto 1753 “On the movement of ships Tali remigio navis se (E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
159
+ page_content=' 413) without the wind’s force.” tarda movebat.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
160
+ page_content=' 7th winning memoir Virg.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
161
+ page_content=' Aeneid Liv.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
162
+ page_content=' 5 1759 “Concernin pitching Insequitur clamorque virum (E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
163
+ page_content=' 415) and rolling.” stridorque rudentum.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
164
+ page_content=' 9th winning memoir Virg.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
165
+ page_content=' Aeneid, Liv.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
166
+ page_content=' 1 1770 “Moon Theory” Errantem que canit Lunam (E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
167
+ page_content=' 485) Prize for 1770 Virg.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
168
+ page_content=' Aeneid Liv.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
169
+ page_content=' 1 10th winning memoir 1772 “Improved Moon theory” Hic labor extremus, longarum (E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
170
+ page_content=' 486) Prize for 1772 haec meta viarum hinc jam 11th winning memoir digressi, vestris appellimus oris Virg.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
171
+ page_content=' Aeneid, Liv.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
172
+ page_content=' 3 However, the mottos were carefully selected by Euler to match the research topic of the competition.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
173
+ page_content='19 In addition to using Virgil’s verses, he also quoted from other ancient writers such as Marcus Tullius Cicero, Properci, and he composed other adages, asking Christian Goldbach for suggestions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
174
+ page_content=' Ultimately, Condorcet’s statement “et on trouve dans ses ouvrages un savant M´emoire sur une question de M´ecanique, dont il racontait qu’un vers de l’Eneide lui avait donn´e la premi`ere id´ee” does not mean that Euler was inspired by Virgil to define Dido’s problem.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
175
+ page_content=' As a historian, I cannot rely on obituaries to extract factual data, even if written by an eminent scholar.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
176
+ page_content=' The much younger Condorcet never met Euler, and the ´Eloge he wrote, as most eulogies are, was based on hearsay, relaying on what the French academicians might have recalled about Euler’s life and work.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
177
+ page_content=' 18Submissions were anonymously and the memoir identified by a motto;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
178
+ page_content=' the author’s name enclosed in a sealed envelope was opened only for the winning memoir after the judging of the contest.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
179
+ page_content=' 19For the significance of the mottos that Euler selected, see Musielak (2022).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
180
+ page_content=' 7 A contemporary biography (published in 2016) further implies that Euler solved Dido’s problem.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
181
+ page_content=' The author refers to a copy of an eight-page manuscript (preserved in Moscow) that is said to contain Euler’s answer.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
182
+ page_content=' Is this the manuscript that categorically would give Euler credit for connecting Dido’s story to variational calculus?' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
183
+ page_content=' Unfortunately, the manuscript in question is said to be “not in Euler’s own handwriting.” Thus, it diminishes its credibility.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
184
+ page_content=' It is rather improbable that Euler, a prolific writer, would be the author of a manuscript inscribed by someone else.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
185
+ page_content=' Besides, he would have included this solution in a paper published in 1764, where Euler summarized the results of the Calculus of Variations in terms of the variational operator.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
186
+ page_content=' Joseph-Louis Lagrange (1736-1813) expanded the variational calculus.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
187
+ page_content=' In his second letter to Euler dated August 1755, Lagrange outlined his delta-algorithm (for solving constrained optimization problems), an approach Euler embraced, prompting him to conceive the term calculus of variations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
188
+ page_content=' In the abstract of a memoir published in 1764, Euler credits Lagrange for enriching the science20 Their combined work led eventually to the Euler–Lagrange equations, which are the equilibrium equations for minima of variational integrals.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
189
+ page_content='21 Five years after Euler died, Lagrange published M´ecanique analytique, his compendium on analytical mechanics, using variational ideas to present me- chanics from a unified analytic viewpoint.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
190
+ page_content=' When teaching at the ´Ecole Poly- technique in 1799, Lagrange published Le¸cons sur le calcul des fonctions and explained the method of variation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
191
+ page_content=' Lagrange provided a brief overview of the development of problems of maxima and minima, referring only to Greek math- ematician Apollonius (262-190 BC), which dealt exclusively with the largest and smallest straight lines which can be drawn from given points to the arcs of conic sections.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
192
+ page_content='22 Dido’s problem is not mentioned here nor in Lagrange’s other published works.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
193
+ page_content=' 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
194
+ page_content='2 William Thomson, Lord Kelvin The first instance in which Dido’s name appear in the context of interest is found in a public lecture delivered by William Thomson in 1893.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
195
+ page_content=' A great physi- cist known today as Lord Kelvin, his contributions include a major role in the development of the second law of thermodynamics;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
196
+ page_content=' the absolute temperature scale (measured in kelvins);' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
197
+ page_content=' the dynamical theory of heat;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
198
+ page_content=' the mathematical analysis of electricity and magnetism, including the basic ideas for the electro- magnetic theory of light;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
199
+ page_content=' and much more.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
200
+ page_content=' He brought together disparate areas of physics—heat, thermodynamics, mechanics, hydrodynamics, magnetism, and 20Euler (1764).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
201
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
202
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
203
+ page_content=' ex quo Auctori occasio est oblata hanc scientiam novo Calculi genere locupletandi, quem Calculum variationum appellat et cuis elementa hic tradere ac dilucide explicare constituit.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
204
+ page_content=' 21See Freguglia and Giaquinta (2016) for an excellent presentation of the Euler-Lagrange equations, including a historical perspective.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
205
+ page_content=' 22Lagrange (1806).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
206
+ page_content=' Les questions de maximis et minimis n’ont pas ´et´e incounues aux anciens g´eom`etres ;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
207
+ page_content=' car on a un livre entier d’Apollonius, qui traite presqu’uniquement des plus grandes et des plus petites lignes droites qui peuvent ˆetre men´ees de points donn´es aux arcs des sections coniques.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
208
+ page_content=' p.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
209
+ page_content=' 424.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
210
+ page_content=' 8 Figure 2: Dido’s problem as described by Lord Kelvin in 1893.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
211
+ page_content=' electricity.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
212
+ page_content=' Lord Kelvin played a key role in the final synthesis of 19th-century science, which viewed all physical change as energy-related phenomena.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
213
+ page_content='23 Lord Kelvin related Dido’s clever approach to bargaining for land as follows, using the sketch in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
214
+ page_content=' 2 to illustrate Dido’s problem: “.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
215
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
216
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
217
+ page_content=' She cut the ox-hide into an exceedingly long strip, and succeeded in enclosing between it and the sea a very valuable territory on which she built Carthage.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
218
+ page_content=' In Dido’s problem the greatest value of land was to be enclosed by a line of given length.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
219
+ page_content=' If the land is all of equal value the general solution of the problem shows that her line of ox-hide should be laid down in a circle.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
220
+ page_content=' It shows also that if the sea is to be part of the boundary, starting, let us say, southward from any given point, A, of the coast, the inland bounding line must at its far end cut the coast line perpendicularly.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
221
+ page_content=' Here, then, to complete our solution, we have a very curious and interesting, but not at all easy, geometrical question to answer: What must be the radius of a circular arc, ADC, of given length, and in what direction must it leave the point A, in order that it may cut a given curve, ABC, perpendicular at some unknown point, C?”' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
222
+ page_content='24 Lord Kelvin added that having enough mathematics knowledge, Dido would determine that the boundary had to be a circle.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
223
+ page_content=' Of course, as illustrated in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
224
+ page_content=' 2, she would have given the boundary a different curvature in different parts to gain as much as possible of the more valuable parts of the land offered to her, “even though difference of curvature in different parts would cause the total area enclosed to be less than it would be with a circular boundary of the same length.”25 23Gray (1910) 24Thomson (1894), p.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
225
+ page_content=' 572-574.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
226
+ page_content=' 25Ibid.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
227
+ page_content=', p.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
228
+ page_content=' 574.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
229
+ page_content=' 9 CARTHAGToday, taught as introduction to calculus of variation, the solution of Dido’s problem requires an extremization solution under constraint, that is, we max- imize the area, A = � ydx, subject to the condition that the arc, L = � ds is of a given length L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
230
+ page_content=' In other words, we wish to maximize the integral A sub- ject to the condition that another integral L has a given constant value.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
231
+ page_content=' Note this is an optimization problem with constraints where we use Lagrange’s strat- egy for finding the local maxima and minima of a function subject to equality constraints.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
232
+ page_content=' It is clear that, without an original reliable source, I cannot conclude that Euler defined Dido’s Problem for the first time, inspired by Virgil’s Aeneid, as Condorcet implied.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
233
+ page_content=' The evidence points to Lord Kelvin who described the problem in 1893.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
234
+ page_content=' And as he stated, whether severe critics will call Dido’s story mythical or allow it to be historic, it is nevertheless full of scientific interest.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
235
+ page_content=' As for me, Dido’s Problem is an excellent example to introduce students to the calculus of variations, as it expresses a perfectly definite case of isoperimet- rics, illustrating the fundamental principles introduced by Euler and Lagrange in the eighteenth century.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
236
+ page_content=' 5 Dido and Ancient Mathematics Nothing is known about Dido’s knowledge.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
237
+ page_content=' Being a Phoenician princess, it is highly probable that she was well educated.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
238
+ page_content=' What we glimpse from Virgil’s and Justinus’s tales is that Dido was a formidable woman, smart, ambitious, a foreign leader that left the city of Tyre (on the coastline of modern Lebanon) with her faithful followers, navigated the waters of the Mediterranean Sea and landed in the coast of North Africa.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
239
+ page_content=' There, she established and ruled Carthage (modern day Tunis), an important port city that rose to the height of its power in the second century BC, before Rome became supreme and took over that region.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
240
+ page_content=' For the ancient cultures that flourished around the Mediterranean, geom- etry was fundamental to their development.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
241
+ page_content=' The Babylonians thriving in the Mesopotamian River Valley engaged in commerce through the Mediterranean, and this required considerable mathematical skills.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
242
+ page_content=' Clay tables preserve records of what they knew.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
243
+ page_content=' For instance, clay tables from Babylon, located in the southern part of Mesopotamia, about fifty miles south of present-day Baghdad (Iraq) suggest that the Babylonian had an advanced knowledge of geometry and arithmetic.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
244
+ page_content=' In fact, some scholars believe that the Babylonians knew the Pythagorean theorem a thousand years before Pythagoras of Samos.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
245
+ page_content=' At Susa, an ancient city over two hundred miles from Babylon, a set of tablets were discovered in 1936, which contain the ratios of areas and perimeters of regular polygons to their respective side lengths.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
246
+ page_content=' The best known surviving tablet (estimated to be from between 1900 and 1600 BC) contains a list of Pythagorean triples.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
247
+ page_content=' This suggests that the Babylonians had knowledge of the Pythagorean theorem, as well as certain algebraic identities.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
248
+ page_content=' 10 Moreover, that women knew mathematics in ancient times has been exten- sively documented.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
249
+ page_content=' For example, the Pythagorean society included women, some of which became famous such as mathematician Theano, who was mar- ried to Pythagoras.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
250
+ page_content=' In the dedication of his Introduction to Harmonics, ancient mathematician and music theorist Nicomachus of Gerasa (c.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
251
+ page_content=' 60-120 AD) ad- dresses the lessons to a lady, one of his students.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
252
+ page_content='26 In this book, also known as Manual of Harmonics, Nicomachus dealt with the theory of music, a version of Pythagorean harmonics, in which he assigned number and numerical ratios to notes and intervals.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
253
+ page_content=' And of course, we know about Hypatia of Alexandria (c.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
254
+ page_content=' 370-415 AD) considered the first woman scholar to attain eminence as mathe- matician and astronomer.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
255
+ page_content='27 I believe that Dido was educated in mathematics, and so she used the the- orem of isoperimetry to outsmart the king who sold her the piece of land in the northern tip of Africa (today’s Tunisia).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
256
+ page_content=' Therefore, Dido’s Problem should be viewed not only to illustrate a fundamental problem of variational calculus but also as a lesson in the history of mathematics and the role ancient women played in its development.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
257
+ page_content=' References Brunt, B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
258
+ page_content=' van (2004).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
259
+ page_content=' The Calculus of Variations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
260
+ page_content=' Published by Springer New York ISBN: 978-0-387-40247-5 DOI: 10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
261
+ page_content='1007/b97436.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
262
+ page_content=' Coppersmith, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
263
+ page_content=' (2017) The Lazy Universe: An Introduction to the Principle of Least Action.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
264
+ page_content=' Oxford University Press.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
265
+ page_content=' Euler, L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
266
+ page_content=' (1732).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
267
+ page_content=' De linea brevissima in superficie quacunque duo quaelibet puncta iungente (On the shortest line joining two points on a surface).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
268
+ page_content=' Com- mentarii academiae scientiarum Petropolitanae, Volume 3, 1732, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
269
+ page_content=' 110-124.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
270
+ page_content=' (E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
271
+ page_content=' 9) Euler, L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
272
+ page_content=' (1738).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
273
+ page_content=' Problematis isoperimetrici in latissimo sensu accepti so- lutio generalis (On isoperimetric problems in the widest sense).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
274
+ page_content=' Commenturii Academiae Scientiarum Petropolitanae 6 (1732/3), 123-155.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
275
+ page_content=' Opera Omnia, 125, 13-40.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
276
+ page_content=' (E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
277
+ page_content=' 27) Euler, L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
278
+ page_content=' (1741).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
279
+ page_content=' Curvarum maximi minimive proprietate gaudentium inven- tio nova et facilis (New and easy method of finding curves enjoying a maximal or minimal property).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
280
+ page_content=' In Commentarii Academiae Scientiarum Petropolitanae 8 (1736).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
281
+ page_content=' 159-190.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
282
+ page_content=' Reprinted in Euler, L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
283
+ page_content=' Opera Omnia, I 25, 54-80.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
284
+ page_content=' (E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
285
+ page_content=' 56) Euler, L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
286
+ page_content=' (1744).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
287
+ page_content=' Methodus inveniendi curvas h’neas maximi minimive pro- prietate gaudentes sive solution problematis isoperimetrici latissimo sensu ac- cepti.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
288
+ page_content=' Lausanne, Genf: M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
289
+ page_content='-M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
290
+ page_content=' Bousquet.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
291
+ page_content=' Reprinted in Euler, L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
292
+ page_content=' Opera Omnia, I 24.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
293
+ page_content=' (E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
294
+ page_content=' 65).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
295
+ page_content=' According to Enestr¨om, Euler completed the manuscript of this work by April 1743.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
296
+ page_content=' Euler, L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
297
+ page_content=' (1764).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
298
+ page_content=' Elementa calculi variationum (Elements of Calculus of Variations).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
299
+ page_content=' Novi commentarii academiae scientiarum Petropolitanea 10 (1764), 26Biographical Note of Nicomachus, in Great Books of the Western World, Robert Maynard Hutchins, Ed.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
300
+ page_content=', Vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
301
+ page_content=' 11, p.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
302
+ page_content=' 807.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
303
+ page_content=' 27Musielak (2020), pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
304
+ page_content=' 206-207.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
305
+ page_content=' 11 1766, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
306
+ page_content=' 51-93.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
307
+ page_content=' This research (E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
308
+ page_content=' 296) was presented at the Berlin Academy in 1756.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
309
+ page_content=' Freguglia, P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
310
+ page_content=' and Giaquinta, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
311
+ page_content=' (2016).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
312
+ page_content=' The Early Period of the Calculus of Variations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
313
+ page_content=' Published by Birkh¨auser.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
314
+ page_content=' Gelfand, I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
315
+ page_content=' M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
316
+ page_content=' and Fomin, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
317
+ page_content=' V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
318
+ page_content=' (1963).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
319
+ page_content=' Calculus of Variations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
320
+ page_content=' Revised English Edition Translated and Edited by R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
321
+ page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
322
+ page_content=' Silverman Prentice-Hall, Inc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
323
+ page_content=' Englewood Cliffs, NJ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
324
+ page_content=' Goldstine, H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
325
+ page_content=' (1980).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
326
+ page_content=' A History of the Calculus of Variations from the 17th through the 19th Century.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
327
+ page_content=' Springer-Verlag.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
328
+ page_content=' Gray, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
329
+ page_content=' (1910).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
330
+ page_content=' The Life of William Thomson, Baron Kelvin of Large.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
331
+ page_content=' Nature 83, 61–65 (1910).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
332
+ page_content=' Lagrange (1806).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
333
+ page_content=' Le¸cons sur le calcul des fonctions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
334
+ page_content=' Nouvelle ´edition, revue, corrig´ee et augment´ee par l’auteur [J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
335
+ page_content='-L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
336
+ page_content=' Lagrange].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
337
+ page_content=' Initially published as lecture notes in 1799 when Lagrange was teaching at the Ecole Polytechnique and reprinted in 1804.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
338
+ page_content=' In 1806, Lagrange published a new edition containing two new lessons.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
339
+ page_content=' Menger, K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
340
+ page_content=' (1937).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
341
+ page_content=' What is Calculus of Variations and What Are Its Ap- plications?' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
342
+ page_content=' The Scientific Monthly 45 (3) (1937), 250-253.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
343
+ page_content=' Musielak, D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
344
+ page_content=' (2022).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
345
+ page_content=' Leonhard Euler and the Foundations of Celestial Me- chanics.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
346
+ page_content=' Springer History of Physics Series.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
347
+ page_content=' Springer Nature Switzerland.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
348
+ page_content=' ISBN 978-3-031-12321-4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
349
+ page_content=' Musielak, D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
350
+ page_content=' (2020).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
351
+ page_content=' Sophie Germain: Revolutionary Mathematician.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
352
+ page_content=' Springer Biographies.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
353
+ page_content=' Springer Nature Switzerland.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
354
+ page_content=' ISBN 978-3030383770.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
355
+ page_content=' Nahin, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
356
+ page_content='P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
357
+ page_content=' (2004).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
358
+ page_content=' When Least is Best.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
359
+ page_content=' Princeton University Press, 2004.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
360
+ page_content=' Rojo, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
361
+ page_content=' and Bloch, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
362
+ page_content=' (2018).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
363
+ page_content=' The Principle of Least Action: History and Physics.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
364
+ page_content=' Cambridge University Press.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
365
+ page_content=' doi:10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
366
+ page_content='1017/9781139021029 Thomson, W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
367
+ page_content=' (1894).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
368
+ page_content=' Popular Lectures and Addresses by Sir William Thom- son (Baron Kelvin) in Three Volumes.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
369
+ page_content=' Nature Series, MacMillan and Co.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
370
+ page_content=' Lon- don 1894.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
371
+ page_content=' Dora Musielak;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
372
+ page_content=' University of Texas at Arlington, 6 January 2023 12' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/LNE1T4oBgHgl3EQfGwM1/content/2301.02917v1.pdf'}
LNFAT4oBgHgl3EQfwR78/content/2301.08681v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:8a77b5f95172694e5085a5f80a1fca30c5e0be9e260fe63f319e13db64b00838
3
+ size 612596
LNFAT4oBgHgl3EQfwR78/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:f049bf62886ce9dbf02f8aee3c977064d5729f134285580e139d5e7f394e81c0
3
+ size 441504
LNFQT4oBgHgl3EQfUDZM/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:e6970f2b8ee7f00a5a57cea6641bc6f87adc9d10c8ae4dd97b66f5765c9f27aa
3
+ size 455696
MNE0T4oBgHgl3EQf0AKB/content/tmp_files/2301.02680v1.pdf.txt ADDED
The diff for this file is too large to render. See raw diff
 
MNE0T4oBgHgl3EQf0AKB/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
MtFOT4oBgHgl3EQf1jQj/content/tmp_files/2301.12939v1.pdf.txt ADDED
@@ -0,0 +1,666 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Data-driven soiling detection in PV modules
2
+ Alexandros Kalimeris1, Ioannis Psarros1, Giorgos Giannopoulos1, Manolis Terrovitis1,
3
+ George Papastefanatos1, and Gregory Kotsis2
4
+ 1Athena RC
5
+ 2INACCESS Networks
6
+ January 31, 2023
7
+ Abstract
8
+ Soiling is the accumulation of dirt in solar panels which leads to a decreasing trend in solar energy
9
+ yield and may be the cause of vast revenue losses. The effect of soiling can be reduced by washing the
10
+ panels, which is, however, a procedure of non-negligible cost. Moreover, soiling monitoring systems are
11
+ often unreliable or very costly. We study the problem of estimating the soiling ratio in photo-voltaic (PV)
12
+ modules, i.e., the ratio of the real power output to the power output that would be produced if solar panels
13
+ were clean. A key advantage of our algorithms is that they estimate soiling, without needing to train on
14
+ labelled data, i.e., periods of explicitly monitoring the soiling in each park, and without relying on generic
15
+ analytical formulas which do not take into account the peculiarities of each installation. We consider
16
+ as input a time series comprising a minimum set of measurements, that are available to most PV park
17
+ operators. Our experimental evaluation shows that we significantly outperform current state-of-the-art
18
+ methods for estimating soiling ratio.
19
+ Keywords: Solar energy, solar panels, soiling, performance loss, time series analysis
20
+ 1
21
+ Introduction
22
+ Soiling is the accumulation of dirt on the surfaces of photo-voltaic (PV) modules, which leads to a loss in
23
+ the power output. Soiling is typically caused by airborne particles, including for example dust, pollen and
24
+ soot. Depending on the location, soiling may also be caused by heavier material such as ice, bird droppings,
25
+ or falling leaves.
26
+ One standard way to quantify soiling is by the soiling ratio SR [iec21], which is defined as the ratio of the
27
+ real power output to the power output that would be produced if solar panels were clean. Soiling loss is then
28
+ defined as 1 − SR, and soiling rate is defined as the (daily) rate of change of the soiling loss. Other metrics
29
+ have been also proposed, e.g., the insolation-weighted soiling ratio [DMM18], aiming to better capture the
30
+ loss induced by soiling.
31
+ To reduce the effect of soiling, PV modules must be cleaned on strategically chosen dates to reduce
32
+ the cost induced by energy loss while taking into account cleaning costs. Detection of time periods during
33
+ which soiling severely affects power output is therefore significant for the efficient scheduling of cleanings.
34
+ What makes the problem challenging is the shortage of labelled data which is caused by the fact that
35
+ soiling monitoring systems are often considered unreliable or costly. For example, soiling stations which
36
+ are the most common commercially available soiling monitoring solution [BMAF21], still require regular
37
+ cleanings and maintenance, which can be expensive, especially in remote locations, and imperfect cleanings
38
+ can result in significant measurement uncertainty [MMMM17]. Therefore, soiling periods must be deduced
39
+ from measurements of a number of reliable variables, e.g., power output, irradiance, temperature.
40
+ Existing methods that detect soiling follow two alternative strategies: a) they train a model on labelled
41
+ data, i.e., data where the soiling of the panels has been logged using specialized sensors and cleaning events
42
+ 1
43
+ arXiv:2301.12939v1 [eess.SP] 30 Jan 2023
44
+
45
+ have been explicitly recorded (e.g., [MMD11, MMDK13]) and b) by using an analytical formula for optimal
46
+ energy output based on environmental readings (e.g., [KMNW06, DMM18, MTL+21]). The former strategy
47
+ is more accurate but requires significant resources to produce the labelled data, which must be produced for
48
+ each different installation. The latter strategy does not take into account the peculiarities of each installation
49
+ and leads to less accurate results (as we demonstrate in Section 4).
50
+ The main advantage of our method,
51
+ is that it is purely data-driven, in the sense that it does not require a generic analytical formula for the
52
+ relation between power output and the commonly used environmental readings, but it learns this relation
53
+ in a self-supervised manner (without the need for labelled data). This way we achieve better results than
54
+ methods that rely on analytical formulas without the cost of methods that need explicitly labelled data.
55
+ We consider as input the monitoring data from the park operation, i.e., a time series with measurements of
56
+ power output, irradiance, and module temperature for a certain array or string of PV modules, precipitation,
57
+ and dates on which the solar panels were manually cleaned for maintenance (if such information exists). The
58
+ soiling ratio over a sequence of timestamps t1, . . . , tn is defined as SR = Pt1
59
+ P ∗
60
+ t1 , . . . , Ptn
61
+ P ∗
62
+ tn , where each Pti is
63
+ the actual power output corresponding to timestamp ti, and P ∗
64
+ ti is the expected power output assuming
65
+ that the solar panels are clean, corresponding to the same timestamp. Our framework trains a regression
66
+ model M which accurately predicts P ∗
67
+ t1, . . . , P ∗
68
+ tn (which are not given as input). This yields an estimate
69
+ for the soiling ratio as SRM = Pt1
70
+ ˜
71
+ Pt1 , . . . , Ptn
72
+ ˜
73
+ Ptn , where each ˜Pti is the value predicted by M for timestamp
74
+ ti. We aim for M such that SRM ≈ SR. Raining periods (extracted from precipitation measurements),
75
+ and manual cleanings, are used in the “learning” phase of our proposed model. One of our methods can
76
+ run exclusively on rain information, in case manual cleanings are not performed or logged. Our approach is
77
+ robust to misinformation about manual cleanings because it checks each potential cleaning to determine its
78
+ effect on power output. Manual cleanings that are not logged, have a negligible effect; they can only affect
79
+ the quality of the training set positively.
80
+ The main advantages of our method are that they do not require measurements of soiling from specialized
81
+ equipment which can be costly or inaccurate, they do not rely on the accuracy of an analytical formula for
82
+ the optimal energy output of the park, and they agnostic to the type of PV modules employed.
83
+ As a
84
+ purely data-driven approach, it solely depends on the availability of data, and in particular a minimal set
85
+ of generally available variables. Our approach is robust to misinformation about manual cleanings because
86
+ it checks each potential cleaning to determine its effect on power output. Moreover, manual cleanings that
87
+ are not logged, have a negligible effect on our approach; their existence can only affect the quality of the
88
+ training set positively.
89
+ In Section 2, we discuss related work, in Section 3.1 we provide necessary background, in Section 3.2 we
90
+ present a detailed description of our methods, and in Section 4 we present our experimental findings.
91
+ 2
92
+ Related work
93
+ PVUSA introduced a method for rating PV systems based on a simple regression model [DG95] which
94
+ employs the simplified assumption that array current depends only on irradiance and that array voltage
95
+ depends only on module temperature. Massi Pavan et al. [MMD11] compare the standard test conditions
96
+ (STC) (irradiance: 1000W/m2, module temperature: 25◦C) performance of a PV park before and after its
97
+ cleaning. In order to determine the performance at STC conditions they use a regression model, suggested
98
+ in [MWPP08], that accepts as input the two main climate features, i.e. the in-plane global irradiance and
99
+ the photo voltaic module temperature. However, their work requires as input labelled data, i.e. time series
100
+ extracted from both clean and soiled PV modules. Massi Pavan et al. [MMDK13] developed four Bayesian
101
+ Neural Network (BNN) models with the aim to calculate the STC performance of two plants before and
102
+ after a complete clean-up of their modules. The idea is that differences between the STC power before and
103
+ after the clean-up represent the losses due to the soiling effect. However, their work also requires as input
104
+ labelled data, i.e. time series extracted from both clean and soiled PV modules.
105
+ Closer to our work are methods which estimate soiling losses based on PV system data. The Fixed Rate
106
+ Precipitation (FRP) method [KMNW06] calculates the daily soiling loss. The method requires as input:
107
+ 2
108
+
109
+ the slope of the performance metric/index during the longest dry period, a cleaning threshold for rains,
110
+ i.e., the minimum amount of daily precipitation required to have a cleaning effect on PV modules, and a
111
+ number of days after a raining period for which no soiling occurs. The method implicitly assumes that the
112
+ soiling rate remains the same throughout time. This requirement can be very restrictive, because of the
113
+ different types of soiling that may occur, depending also on the location or the season. For the same reason,
114
+ it is unrealistic to assume that there is a certain minimum value classifying rains as effective. More recently,
115
+ Deceglie, Micheli, and Muller [DMM18] developed a new method for quantifying soiling loss, which compares
116
+ favourably to FRP. The new method is termed the stochastic rate and recovery (SRR) method. It uses an
117
+ analytical formula, calculated over values for irradiance and module temperature, to compute the expected
118
+ power output, which is then used to compute a performance metric. The method first detects soiling intervals
119
+ in a dataset, and then, based on the observed characteristics of each interval, estimates the total loss. Notice
120
+ that SRR provides an aggregate estimate of soiling loss, calculated for the whole input period, while our
121
+ focus lies on determining soiling loss even on shorter periods of time. Skomedal and Deceglie [SD20] proposed
122
+ the combined degradation and soiling method for further analyzing a performance metric signal. Finally,
123
+ Micheli et al. [MTL+21] consider non-linear degradation in soiling intervals, and they apply various methods
124
+ for changepoints detection to obtain a refined soiling profile. All methods studied there are based on finding
125
+ changepoints on the performance metric curve, as calculated by SRR. On the contrary, our approach detects
126
+ changepoints as an intermediate step towards computing a performance metric. It is apparent from recent
127
+ work that improvements on estimating the expected power output directly translate to improvements on
128
+ various tasks in PV data analysis.
129
+ 3
130
+ Methodology
131
+ 3.1
132
+ Preliminaries
133
+ 3.1.1
134
+ Basic assumptions and definitions
135
+ Our input consists of a multi-variate time series containing measurements for: i) power output, ii) irradiance,
136
+ iii) module temperature, iv) precipitation. Our methods can be further enhanced if we are also given as
137
+ input the dates on which the PV modules were manually cleaned.
138
+ Let R be the set of all rains, defined as follows: [t, t′] ∈ R if and only if there is a rain starting at t
139
+ and ending at t′. Rains are extracted from input as maximal time intervals containing positive precipitation
140
+ values. Similarly, if manual cleanings are provided let C be the set of all such intervals, defined as follows:
141
+ [t, t′] ∈ C if and only if we know that the PV modules were being cleaned between timestamps t and t′. We
142
+ denote by Wp the set of all potential cleaning events, defined as Wp = C ∪ R. We assume that precipitation
143
+ measurements are sufficiently frequent, so that we can accurately detect rains.
144
+ 3.1.2
145
+ Regression models
146
+ A basic component of our methods is regression. We fit regression models to represent power output during
147
+ “dirty” or “clean” periods and we use prediction errors to detect performance changes. We consider as feature
148
+ variables the irradiance and the module temperature, and the target outcome corresponds to the power
149
+ output. We apply Ridge Regression with polynomial features, which is parameterized by the degree of the
150
+ regression polynomial, and a regularization strength parameter for the linear least squares function (the loss
151
+ function) where regularization is given by the ℓ2-norm. The parameters were selected during the initial stages
152
+ of the algorithm development process, where we experimented with cross-validation and hyper-parameter
153
+ tuning techniques. The exact values used in our experiments are discussed in Section 4. Our model selection
154
+ was a consequence of preliminary experiments with various (simple) regression models such as Ordinary Least
155
+ Squares, Support Vector Regression, etc., that we executed in a CPU with maximum processor frequency
156
+ at 3.7GHz, and available RAM at 256Gb. In the experiment that we conducted, we randomly choose 100
157
+ time intervals of maximum duration of one month from the time series provided in [MAD+14], which are
158
+ also discussed in Section 4, and we randomly split them into training and testing subsets containing 80%
159
+ 3
160
+
161
+ and 20% of the points respectively. Our choice satisfies a bifold objective: i) good accuracy and ii) fast
162
+ fitting time. The latter is vital in our method which fits one model for each potential cleaning. Table 3
163
+ contains MAPE values and fitting times for four different models. Polynomial features and the polynomial
164
+ kernel used in Support Vector Regression (SVR) are of degree 3. The highest accuracy is achieved by SVR
165
+ with linear kernel and polynomial features, being roughly 0, 4% better than Ridge Regression which is the
166
+ second best. However, the fitting time of SVR is at least one order of magnitude higher than that of Ridge
167
+ Regression.
168
+ Ridge Regression is a simple model that adds only one extra tunable parameter to our learning
169
+ pipeline, and the regularization it provides acts as a measure to prevent overfitting. We also emphasize the
170
+ fact that one can easily plug-in any regression model in our approach.
171
+ Table 1: Evaluation of regression models.
172
+ Model
173
+ MAPE
174
+ Fitting time (s)
175
+ Linear Regression
176
+ with polynomial features
177
+ 0.0812
178
+ 0.0015
179
+ Ridge Regression
180
+ with polynomial features
181
+ 0.0807
182
+ 0.0012
183
+ Support Vector Regression
184
+ with polynomial kernel
185
+ 1.0648
186
+ 0.0177
187
+ Support Vector Regression
188
+ with linear kernel and polynomial features
189
+ 0.0770
190
+ 0.0666
191
+ Several steps in our approach rely on computing measures for the prediction accuracy of our model. Let
192
+ Y = Yt1, . . . , Ytn, ˜Y = ˜Yt′
193
+ 1, . . . , ˜Yt′n be two univariate time series, and let T = {t1, . . . , tn}, T ′ = {t′
194
+ 1, . . . , t′
195
+ n}.
196
+ We use a variant of the mean absolute percentage error (MAPE) which is defined over time intervals as
197
+ follows: for any [t, t′] ⊆ T ∩ T ′,
198
+ mape0(Y, ˜Y, [t, t′]) = mean({|Yj − ˜Yj| | j ∈ [t, t′]}
199
+ mean({|Yj| | j ∈ [t, t′]})
200
+ .
201
+ Note that mape0 is robust to zero true values (as long as not all of them are zeroes) since it uses as
202
+ denominator the mean of the values, as opposed to standard MAPE where all actual values appear as
203
+ denominators leading to singularities even if there is only one zero true value. When Y and ˜Y are clear from
204
+ the context, we omit them from our notation and we simply write mape0([t, t′]). We also use the median
205
+ multiplicative error defined as mede(Y, ˜Y) = median
206
+ ��
207
+ Yi
208
+ ˜Yj | i ∈ T, j ∈ T ′��
209
+ .
210
+ 3.2
211
+ Soiling detection
212
+ In this section, we formally describe our methods, which are composed of two main steps. The first step is
213
+ that of detecting cleaning events. Then, using these cleaning events we define training periods for regression
214
+ models aiming to capture the optimal performance of the PV modules.
215
+ In all our methods, we fit regression
216
+ models which capture the dependence of power output on the values of irradiance and module temperature,
217
+ i.e., power output is the dependent variable, while irradiance and module temperature are the feature vari-
218
+ ables. Measurements are scaled to [0, 1] by subtracting the minimum value and dividing by the range of
219
+ values. Figure 1 summarizes the main steps of our methods.
220
+ 3.2.1
221
+ Baseline soiling estimator
222
+ We first present our baseline approach for estimating the soiling ratio. Our baseline algorithm is based on
223
+ the following assumption: manual cleanings alone define points in time where the PV modules are clean.
224
+ While these points are not sufficiently many to define a training set, we can extend them to short intervals of
225
+ a user-defined length wtrain. This is the amount of time during which we can safely assume that the panels
226
+ remain clean.
227
+ 4
228
+
229
+ PV data
230
+ precipitation data
231
+ (manual cleaning dates)
232
+ potential cleanings
233
+ cleaning event detection
234
+ fit regression
235
+ model before
236
+ potential
237
+ cleaning
238
+ compare prediction
239
+ errors before/after
240
+ potential cleaning
241
+ cleaning events
242
+ fit regression model
243
+ on periods following
244
+ the cleaning events
245
+ predict optimal per-
246
+ formance and esti-
247
+ mate soiling ratio
248
+ Forward Checking Soiling Estimator (FCSE)
249
+ PV data
250
+ precipitation data
251
+ manual cleaning dates
252
+ potential cleanings
253
+ cleaning event detection
254
+ fit one regression
255
+ model on periods
256
+ following manual
257
+ cleanings
258
+ compare prediction
259
+ errors before/after
260
+ potential cleaning
261
+ cleaning events fit regression model
262
+ on periods following
263
+ the cleaning events
264
+ predict optimal per-
265
+ formance and esti-
266
+ mate soiling ratio
267
+ Backward Checking Soiling Estimator (BCSE)
268
+ Baseline estimator
269
+ Figure 1: Basic steps of our methods. Manual cleanings are optional for FCSE. To detect cleaning events,
270
+ FCSE fits one regression model before each potential cleaning event, while BCSE fits one regression model
271
+ using manual cleaning dates and uses it in classifying all cleaning events.
272
+ We fit a regression model that aims to capture the power output when PV modules are clean. To this
273
+ purpose, we fit a regression model M on the set of input points with timestamps from �
274
+ [t,t′]∈C[t′, t′ +wtrain].
275
+ We define SRM = Pt1
276
+ ˜
277
+ Pt1 , . . . , Ptn
278
+ ˜
279
+ Ptn as the modelled soiling ratio where each Pti is an input power output value,
280
+ and ˜Pti is the value predicted M.
281
+ 3.2.2
282
+ Forward checking soiling estimator (FCSE)
283
+ Our first method examines each potential cleaning event independently and assigns scores which represent
284
+ the significance of the detected change of behavior. Five input parameters are required: the length of the
285
+ training period w1, the length of the validation period w2, the length of the test period w3, a parameter
286
+ q defining the quantile of the scores which classifies events as cleanings, and the length wtrain defining the
287
+ training set for the final regression model used to estimate soiling. For each interval [t, t′] ∈ Wp, we fit a
288
+ regression model in the time interval [t − w1 − w2, t − w2), we validate it in the time interval [t − w2, t) and
289
+ we test it in the time interval (t′, t′ + w3]. We compute the function mape0 on the validation interval and
290
+ if the returned value is greater than 5% then we consider this event invalid and we discard it from further
291
+ consideration. This threshold aims to discard events that we are unable to classify with certainty.
292
+ The
293
+ reasons behind choosing 5% as our threshold are the following. First, due to the nature of our task, the
294
+ regression model is required to make very accurate predictions and detect power deviations at a very small
295
+ scale. This requires high accuracy of our regression models; therefore a tight threshold. On the other hand,
296
+ this threshold must be pragmatic: having an extremely small value as a threshold will lead to unrealistic
297
+ outputs where no cleaning events are detected and, consequently, no soiling estimation can be derived.
298
+ We
299
+ experimentally validate our choice of 5% in Section 4.2.2.
300
+ The intuition is that if the PV modules under-perform due to soiling, for a time period preceding t, then
301
+ the regression model captures this under-performing behaviour and if [t, t′] is a cleaning event then the model
302
+ should underestimate the power output in (t′, t′ + w3]. To compute the score of the potential cleaning event
303
+ [t, t′], we first compute PIval as the sequence of actual power output values divided by the predicted power
304
+ output values for the time interval [t − w2, t), and PItest as the sequence of actual power output values
305
+ divided by the predicted power output values for the time interval (t′, t′ + w3]. Then, the score assigned
306
+ to [t, t′] is mede(PIval, PItest). We define as cleaning events all intervals [t, t′] ∈ Wp with score above the
307
+ qth-quantile of all scores. Let W1 be the set of detected cleaning events. We fit a regression model M on
308
+ the input points with timestamps from �
309
+ [t,t′]∈W1[t′, t′ + wtrain]. The intuition is that cleaning events define
310
+ points in time where the PV modules are clean. Obviously, these points are not sufficiently many to define
311
+ a proper training set. By extending these points to (short) intervals, of length wtrain, we increase the size of
312
+ 5
313
+
314
+ the training set without (significantly) affecting its quality. We define SRM =
315
+ Pt1
316
+ ˜
317
+ Pt1 , . . . , Ptn
318
+ ˜
319
+ Ptn as the estimated
320
+ soiling ratio where each Pti is an input power output value, and ˜Pti is the value predicted by the regression
321
+ model M.
322
+ Notice that FCSE does not require having the cleaning dates C as input, and we could simply have
323
+ Wp = R.
324
+ 3.2.3
325
+ Backward checking soiling estimator (BCSE)
326
+ Our second method builds upon the baseline approach. This method requires five input parameters w1,
327
+ w2, w3, q, wtrain. Parameters w1 and w2 denote the length of the testing period preceding the potential
328
+ cleaning event and the length of the validation period following the potential cleaning event respectively.
329
+ Parameter w3 denotes the length of the time period following each [t, t′] ∈ C such that the modules remain
330
+ clean. Parameter q defines the quantile of the scores which classifies events as cleanings. Parameter wtrain
331
+ is used to define the training set of the final regression model for estimating the soiling ratio. We train
332
+ one regression model on the set of points defined by timestamps in �
333
+ [t,t′]∈C[t′, t′ + w3]. This model aims
334
+ to capture modules’ “clean” performance. For each [t, t′] ∈ Wp, we use our model to make predictions on
335
+ [t − w1, t) and (t′, t′ + w2]. If mape0((t′, t′ + w2]) is greater than 5% then we consider this interval invalid
336
+ and we discard if from further consideration. As in FCSE, this filtering step is to avoid considering events
337
+ that our models fail to classify with a good amount of certainty.
338
+ The intuition is that if [t, t′] is a cleaning event, then the PV modules’ performance during [t′, t′ + w2]
339
+ must resemble the “clean” performance as predicted by our regression model.
340
+ Similarly, if the modules
341
+ under-perform during [t − w1, t), then the induced ratio of the actual power output over the predicted power
342
+ output must be significantly smaller than 1. To compute the score of the potential cleaning event [t, t′], we
343
+ first compute PIbefore as the sequence of actual power output values divided by the predicted power output
344
+ values for the time interval [t − w1, t), and PIafter as the sequence of actual power output values divided
345
+ by the predicted power output values for the time interval (t′, t′ + w2]. Then, the score assigned to [t, t′]
346
+ is mede(PIbefore, PIafter). We define as our threshold parameter thrsh the qth-quantile of all scores. We
347
+ define as cleaning events all intervals [t, t′] ∈ Wp with score above the qth-quantile of all scores. Let W2,
348
+ be the set of detected cleaning events. We fit a regression model M on the input points with timestamps
349
+ from �
350
+ [t,t′]∈W2[t′, t′ + wtrain]. As in FCSE, the intuition is that cleaning events define points in time where
351
+ the PV modules are clean. Obviously, these points are not sufficiently many to define a training set. By
352
+ extending these points to (short) intervals, of length wtrain, we increase the size of the training set without
353
+ (significantly) affecting its quality. We define SRM = Pt1
354
+ ˜
355
+ Pt1 , . . . , Ptn
356
+ ˜
357
+ Ptn as the estimated soiling ratio where each
358
+ Pti is an input power output value, and ˜Pti is the value predicted by M.
359
+ 4
360
+ Experiments
361
+ 4.1
362
+ Datasets
363
+ State-of-the-art dataset
364
+ To evaluate our methods, we use a dataset provided in [MAD+14], which
365
+ contains a set of current-voltage (I-V) curves and associated meteorological data for PV modules representing
366
+ all flat-plate PV technologies and for three different locations and climates for approximately one-year
367
+ periods.
368
+ For each location, we are given values for a normalized metric, called soiling derate which is
369
+ computed using measurements for short-circuit current and irradiance from two identical PV modules; one
370
+ that is cleaned during daily maintenance, and one that is not.
371
+ Soiling derate is the result of dividing
372
+ daily values of ampere-hours per kilowatt-hours per square meter Plane of Array (POA) irradiance for the
373
+ not-cleaned PV module, by the corresponding values of the cleaned PV module [MAD+14]. The soiling
374
+ derate aims to provide a performance index analogous to soiling ratio, estimated on real measurements. We
375
+ emphasize that soiling derate is only used for the evaluation of our methods and are not utilized as input (nor
376
+ in SRR). The time granularity is 5 minutes, and measurements are provided for all hours of daylight. The
377
+ 6
378
+
379
+ three locations are Cocoa, Florida, USA; Eugene, Oregon, USA; and Golden, Colorado, USA. PV modules
380
+ in Cocoa and Eugene were cleaned when this was necessary in order to ensure that levels of soiling loss were
381
+ maintained at a reasonable level. PV modules in Golden were not cleaned because frequent rains helped
382
+ maintaining a reasonable level of soiling loss. Cocoa has a minimum soiling derate of 0.985, Eugene has a
383
+ minimum soiling derate of 0.964, and Golden has a minimum soiling derate of 0.977.
384
+ In our methods, we use measurements for the maximum power of the PV module in watts, the amount of
385
+ solar irradiance in watts per square meter received on the PV module surface, the PV module back-surface
386
+ temperature and the accumulated daily total precipitation. The dataset also provides dates on which all PV
387
+ modules were cleaned. We apply our methods on PV modules that were used in estimating the soiling derate,
388
+ and in particular on those that were not cleaned every day. As discussed in Section 3.1.2 our methods utilize
389
+ Ridge Regression models. For those models, we use polynomial features of the 3rd degree and a regularization
390
+ strength parameter alpha = 10−4 during the fitting stages.
391
+ Real-world dataset
392
+ We also consider a real-world scenario, where no ground truth is available.
393
+ We
394
+ test our methods on a dataset from a very different location and of different climate conditions, comprising
395
+ measurements from a solar park located in Greece. We are given values for power output, irradiance, module
396
+ temperature and precipitation on a time granularity of 15 min for a period of approximately 7 years, and 15
397
+ dates of manual cleanings.
398
+ 4.2
399
+ Method evaluation and discussion
400
+ 4.2.1
401
+ Soiling estimation
402
+ We evaluate our methods, by comparing them to the analogous model used in SRR. To show robustness of our
403
+ methods in different parameter settings, we try various lengths for the periods used in changepoint detection.
404
+ Table 2 lists the respecting values (in days) for parameters w1, w2, w3 in FCSE and w1, w2 in BCSE. The
405
+ rest of the parameters are set as follows: we apply FCSE with parameters q = 0.9, and wtrain = 30 days and
406
+ BCSE with parameters q = 0.9, w3 = 30 days, and wtrain = 30 days. The baseline soiling estimator is applied
407
+ with wtrain = 30 days. Since our methods are unsupervised, classic automated methods fail to optimize the
408
+ above parameters. Essentially, domain expertise is the main lead for selecting parameters appropriately, also
409
+ depending on the properties of each location that affect the rate at which soiling progresses. However, as
410
+ Table 2 indicates, the methods are robust within a range of reasonable values for the parameters. The fixed
411
+ parameters wtrain (and w3 in BCSE) define time periods during which a clean solar panel is likely to remain
412
+ clean. While smaller values for wtrain (resp. w3) seem to provide safer conclusions, larger values provide a
413
+ bigger size and diversity of the induced training set. The parameter q defines a threshold on how important
414
+ a changepoint should be to be considered as a cleaning event. Setting q = 0.9 implies that the top-scored
415
+ 10% of potential cleanings will be considered as cleaning events. Factors that must be taken into account
416
+ when setting this parameter include the total number of potential changepoints, parameters w3, wtrain, and
417
+ the size of the dataset. While larger values of q tend to lead to safer conclusions about cleaning events, this
418
+ may lead to a decreased size of the training set, negatively affecting the final regression model.
419
+ We juxtapose our estimated soiling ratio with the ground-truth soiling derate and the performance metric
420
+ used in SRR. We have three different ways of estimating the soiling ratio: our baseline approach, FCSE and
421
+ BCSE, which are
422
+ described in Section 3.2. In our estimates, we map negative values and values greater
423
+ than one to zero and one, respectively. Then, we apply a rolling median with windows of one day.
424
+ For computing the performance metric as in SRR, we rely again on the publicly available RdTools
425
+ package [DNS+22]. We use as input aggregate daily values calculated on measurements taken between 12:00
426
+ and 14:00, with irradiance greater than 500W/m2. We first compute the performance metric as the ratio of
427
+ realized to modelled PV energy yield, where modelled PV energy yield is derived from a standard formula
428
+ which is implemented in pvlib package [HHM22]. Then, we perform a few processing steps as suggested in
429
+ RdTools’ tutorials1. We first normalize the time series with the expected power, we then apply default filters
430
+ to remove clipping effects and outliers, and finally, we resample to one-day values.
431
+ 1https://rdtools.readthedocs.io/en/stable/examples/degradation_and_soiling_example_pvdaq_4.html
432
+ 7
433
+
434
+ Figure 2: Soiling ratio predicted by our models, and the performance metric used in SRR, for the Eugene
435
+ dataset. FCSE with parameters w1 = 10, w2 = 5, w3 = 10 and BCSE with parameters w1 = 5, w2 = 10.
436
+ Let SD be the soiling derate time series. We denote by PM the performance metric used in SRR. In
437
+ Figure 2, we plot our estimated soiling ratio, for all three models discussed in Section 3.2, the soiling derate
438
+ and the performance metric used in SRR, for the site of Eugene. Compared to the other datasets, Eugene
439
+ has periods of declining performance which are more apparent. PV modules at the Eugene site were cleaned
440
+ on March 11, July 10, August 14, August 21, and August 26. No significant precipitation is observed during
441
+ July and August, which leads to a rapid drop in the performance.
442
+ We also calculate the root-mean-square error (RMSE) comparing the soiling derate with each modelled
443
+ ratio, for all three sites. Since no manual cleanings were performed in Golden, the baseline algorithm and
444
+ BCSE cannot be executed. We list these results in Table 2. It becomes evident, both from the RMSE values
445
+ and from the visual inspection of the figure, that a better estimation of the soiling ratio can be derived by
446
+ our models, compared to the model based on an analytical formula which is employed by SRR, in a setting
447
+ where a soiling tendency needs to be detected, nearly real-time, on newly incoming data. Further, BCSE
448
+ compares favourably to FCSE, and improves upon the baseline algorithm in the Eugene dataset. On the other
449
+ hand, both the baseline algorithm and BCSE cannot be executed in the Golden dataset, due to the lack of
450
+ manual cleanings. FCSE and BCSE present slightly diverse behaviors, rendering each potentially preferable
451
+ in diverse real-world settings, depending on the exact objective of a solar park operator. Specifically, BCSE
452
+ provides the most accurate method in approximating soiling ratio, thus preferable when small to medium
453
+ soiling events are tolerable by the operator, as long as “false alarms” are minimised. On the other hand,
454
+ FCSE, while slightly missing in accuracy, it is more sensitive in the detection of smaller (potential) soiling
455
+ events, making it ideal in cases when even small soiling events need to be handled. Finally, we can see that
456
+ the formula used in SRR essentially predicts the majority of the considered period as soiling; a behavior
457
+ with small practical use in a real-world deployment scenario.
458
+ 8
459
+
460
+ Baseline
461
+ 1DO
462
+ 0.98
463
+ 0.96
464
+ soiling derate
465
+ estimated soiling ratio
466
+ FCSE
467
+ 0.98
468
+ 0.96
469
+ soiling derate
470
+ estimated soiling ratio
471
+ EC5E
472
+ 1DO
473
+ 0.98
474
+ soiling derate
475
+ 0.96
476
+ estimated soiling ratio
477
+ LDO
478
+ FeormanceMetc[SRR
479
+ 0.98
480
+ 0.96
481
+ soiling derate
482
+ Perf. metric (SRR)
483
+ imestampTable 2: Evaluation.
484
+ Model
485
+ RMSE against SD
486
+ Eugene
487
+ Cocoa
488
+ Golden
489
+ Baseline
490
+ 0.006
491
+ 0.006
492
+ -
493
+ FCSE (w1 = 2, w2 = 1, w3 = 2)
494
+ 0.010
495
+ 0.006
496
+ 0.008
497
+ FCSE (w1 = 10, w2 = 5, w3 = 10)
498
+ 0.007
499
+ 0.008
500
+ 0.008
501
+ FCSE (w1 = 30, w2 = 10, w3 = 30)
502
+ 0.009
503
+ 0.007
504
+ 0.008
505
+ BCSE (w1 = 1, w2 = 2)
506
+ 0.008
507
+ 0.006
508
+ -
509
+ BCSE (w1 = 5, w2 = 10)
510
+ 0.005
511
+ 0.007
512
+ -
513
+ BCSE (w1 = 10, w2 = 30)
514
+ 0.007
515
+ 0.007
516
+ -
517
+ PM used in SRR
518
+ 0.019
519
+ 0.020
520
+ 0.028
521
+ Figure 3: Segmentation and estimated soiling ratio obtained by FCSE.
522
+ 4.2.2
523
+ Required accuracy of regression models
524
+ We experimentally justify our choice of 5% as a threshold for validation MAPE of our models in methods
525
+ FCSE (w1 = 10, w2 = 5, w3 = 10), BCSE (w1 = 5, w2 = 10), as discussed in Section 3.2. To be able to
526
+ execute both methods for various thresholds, we employ them on the two datasets that are accompanied by
527
+ manual cleaning information, i.e., Eugene and Cocoa. For both methods, we calculate the mean (over the
528
+ two sites) RMSE against SD. Experiments in Table 3 indicate that the best result is obtained for 5% (or
529
+ above), for BCSE.
530
+ Table 3: Choice of validation MAPE threshold.
531
+ MAPE threshold
532
+ mean RMSE against SD
533
+ FCSE
534
+ BCSE
535
+ 3%
536
+ 0.007
537
+ 0.009
538
+ 4%
539
+ 0.008
540
+ 0.007
541
+ 5%, 10%, 15%, 20%
542
+ 0.008
543
+ 0.006
544
+ 9
545
+
546
+ 1DO
547
+ 0.95
548
+ 0.90
549
+ 0.B5
550
+ estimated soiling ratio (smoothed)
551
+ 0.:0]
552
+ cleaning events
553
+ imestampFigure 4: Segmentation and estimated soiling ratio obtained by BCSE.
554
+ 4.2.3
555
+ Industrial use-case (absence of ground-truth)
556
+ In this section, we test our methods on the dataset described in Section 4.1. First, we apply FCSE for the
557
+ detection of cleaning events. We filter out rains with maximum precipitation of at most 0.1 to remove noise.
558
+ Figure 3 (resp. Figure 4) illustrates the cleaning events detected by FCSE(resp. BCSE) and our modelled
559
+ soiling ratio.
560
+ Within each interval defined by two consecutive changepoints, we compute a line using the
561
+ Theil–Sen method [The92, Sen68] on the estimated soiling ratio (on a 15min granularity). The Theil-Sen
562
+ method is a way of fitting a line to a set of points, which is robust to outliers. The line is chosen by selecting
563
+ the median slope over all lines defined by pairs of points. We plot the lines with negative slope as red dotted
564
+ line segments lying in the corresponding intervals, over the course of 5 years. We also plot a smoothed
565
+ version of our estimated soiling ratio, where we have applied a rolling median of 5 days.
566
+ In both figures, in almost all time periods defined by two consecutive changepoints, we observe that there
567
+ is a decreasing trend in the time series for the detected period, as dictated by the slope of the line fitted by
568
+ the Theil-Sen regression (red-dotted line segments). This decreasing trend ends with rain or manual cleaning,
569
+ illustrated by a blue vertical line, which is detected by our method as a cleaning event. This example is an
570
+ indication of the effectiveness and generalizability of the proposed method. Despite the lack of labels to be
571
+ able to explicitly verify the result, the trend identified is consistent with soiling and it is verifiable through
572
+ the effect of washing.
573
+ 5
574
+ Conclusion
575
+ We have described a method for estimating the soiling ratio, which uses a set of easily accessed measurements
576
+ from sensors that are commonly deployed in PV parks. Our method is data-driven, in the sense that it models
577
+ the optimal performance by efficiently learning it from the data, without relying on generic formulas that
578
+ fail to capture the peculiarities of the site.
579
+ Estimating the soiling ratio is useful for PV park administrators since it allows them to schedule cleaning
580
+ procedures more effectively by taking into account the rate of soil accumulation and the effectiveness of past
581
+ cleaning efforts without the need for frequent visual inspections or installing specialized equipment which
582
+ induces extra cost and maintenance efforts.
583
+ Our method effectively estimates the soiling ratio in historical data. Future possible directions include
584
+ extending our method to forecasting soiling losses in the future, which would assist in deciding cleaning
585
+ 10
586
+
587
+ LDO0
588
+ 5L60
589
+ S60
590
+ 0.925
591
+ 0.900
592
+ 0.B75
593
+ 0.B50
594
+ 0.B25
595
+ estimated soiling ratio (smoothed)
596
+ 0.B0.0
597
+ cleaning events
598
+ 101:2036actions at a short notice.
599
+ 6
600
+ Acknowledgements
601
+ The authors were partially supported by the EU’s Horizon 2020 Research and Innovation programme, under
602
+ the grant agreement No. 957345: “MORE”.
603
+ References
604
+ [BMAF21]
605
+ João Gabriel Bessa, Leonardo Micheli, Florencia Almonacid, and Eduardo F. Fernández. Mon-
606
+ itoring photovoltaic soiling: assessment, challenges, and perspectives of current and potential
607
+ strategies. iScience, 24(3):102165, 2021.
608
+ [DG95]
609
+ R N Dows and E J Gough. PVUSA procurement, acceptance, and rating practices for photo-
610
+ voltaic power plants. 9 1995.
611
+ [DMM18]
612
+ Michael G. Deceglie, Leonardo Micheli, and Matthew Muller. Quantifying soiling loss directly
613
+ from PV yield. IEEE J. of Photov., 8(2):547–551, 2018.
614
+ [DNS+22]
615
+ Michael G. Deceglie, Ambarish Nag, Adam Shinn, Gregory Kimball, Daniel Ruth, Dirk Jordan,
616
+ Jiyang Yan, Kevin Anderson, Kirsten Perry, Mark Mikofski, Matthew Muller, Will Vining, and
617
+ Chris Deline. Nrel/rdtools: Version 2.1.3. January 2022.
618
+ [HHM22]
619
+ William F. Holmgren, Clifford W. Hansen, and Mark A. Mikofski. pvlib python: a python
620
+ package for modeling solar energy systems. J. Open Source Soft., 3(29)), 2022.
621
+ [iec21]
622
+ IEC TS 61724-1 Photovoltaic System Performance Part 1: Monitoring. IEC, 2021.
623
+ [KMNW06] A. Kimber, L. Mitchell, S. Nogradi, and H. Wenger.
624
+ The effect of soiling on large grid-
625
+ connected photovoltaic systems in California and the southwest region of the United States. In
626
+ IEEE 4th World Conf. on Photov. Energy, volume 2, pages 2391–2395, 2006.
627
+ [MAD+14]
628
+ Bill Marion, Allan Anderberg, Chris Deline, Joe del Cueto, Matt Muller, Greg Perrin, Jose
629
+ Rodriguez, Steve Rummel, Timothy J. Silverman, Frank Vignola, Rich Kessler, Josh Peterson,
630
+ Stephen Barkaszi, Mark Jacobs, Nick Riedel, Larry Pratt, and Bruce King.
631
+ New data set
632
+ for validating PV module performance models. In IEEE 40th Phot. Specialist Conf., pages
633
+ 1362–1366, 2014.
634
+ [MMD11]
635
+ A. Massi Pavan, A. Mellit, and D. De Pieri. The effect of soiling on energy production for
636
+ large-scale photovoltaic plants. Solar Energy, 85(5), 2011.
637
+ [MMDK13] A. Massi Pavan, A. Mellit, D. De Pieri, and S.A. Kalogirou.
638
+ A comparison between BNN
639
+ and regression polynomial methods for the evaluation of the effect of soiling in large scale
640
+ photovoltaic plants. Appl. Energy, 108:392–401, 2013.
641
+ [MMMM17] Matthew Muller, Leonardo Micheli, and Alfredo A. Martinez-Morales. A method to extract
642
+ soiling loss data from soiling stations with imperfect cleaning schedules. In 2017 IEEE 44th
643
+ Photov. Specialist Conf. (PVSC), pages 2881–2886, 2017.
644
+ [MTL+21]
645
+ Leonardo Micheli, Marios Theristis, Andreas Livera, Joshua S. Stein, George E. Georghiou,
646
+ Matthew Muller, Florencia Almonacid, and Eduardo F. Fernández. Improved PV soiling extrac-
647
+ tion through the detection of cleanings and change points. IEEE J. of Photov., 11(2):519–526,
648
+ 2021.
649
+ 11
650
+
651
+ [MWPP08]
652
+ Didier Mayer, Lucien Wald, Yves Poissant, and Sophie Pelland. Performance Prediction of
653
+ Grid-Connected Photovoltaic Systems Using Remote Sensing. International Energy Agency,
654
+ March 2008. Photovoltaic Power Systems Programme (IEA - PVPS Task 2), report IEA-PVPS
655
+ T2-07:2008.
656
+ [SD20]
657
+ Åsmund Skomedal and Michael G. Deceglie. Combined estimation of degradation and soiling
658
+ losses in photovoltaic systems. IEEE J. of Photov., 10(6), 2020.
659
+ [Sen68]
660
+ Pranab Kumar Sen. Estimates of the regression coefficient based on Kendall’s tau. J. of the
661
+ American Statistical Association, 63(324):1379–1389, 1968.
662
+ [The92]
663
+ Henri Theil. A Rank-Invariant Method of Linear and Polynomial Regression Analysis, pages
664
+ 345–381. Springer Netherlands, Dordrecht, 1992.
665
+ 12
666
+
MtFOT4oBgHgl3EQf1jQj/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
N9AyT4oBgHgl3EQftPlh/content/tmp_files/2301.00591v1.pdf.txt ADDED
@@ -0,0 +1,704 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ ANALYSING DISCRETE SELF SUPERVISED SPEECH
2
+ REPRESENTATION FOR SPOKEN LANGUAGE MODELING
3
+ Amitay Sicherman and Yossi Adi
4
+ School of Engineering and Computer Science
5
+ The Hebrew University of Jerusalem, Israel
6
+ ABSTRACT
7
+ This work profoundly analyzes discrete self-supervised speech
8
+ representations through the eyes of Generative Spoken Lan-
9
+ guage Modeling (GSLM). Following the findings of such an
10
+ analysis, we propose practical improvements to the discrete
11
+ unit for the GSLM. First, we start comprehending these units
12
+ by analyzing them in three axes: interpretation, visualization,
13
+ and resynthesis. Our analysis finds a high correlation between
14
+ the speech units to phonemes and phoneme families, while
15
+ their correlation with speaker or gender is weaker. Addition-
16
+ ally, we found redundancies in the extracted units and claim
17
+ that one reason may be the units’ context. Following this
18
+ analysis, we propose a new, unsupervised metric to measure
19
+ unit redundancies.
20
+ Finally, we use this metric to develop
21
+ new methods that improve the robustness of units clustering
22
+ and show significant improvement considering zero-resource
23
+ speech metrics such as ABX. Code and analysis tools are
24
+ available under the following link.
25
+ Index Terms— self supervised learning, generative spo-
26
+ ken language modeling, textless NLP, speech LM
27
+ 1. INTRODUCTION
28
+ Recently Self-Supervised Learning (SSL) methods for speech
29
+ have shown great success on plenty of downs stream tasks [1].
30
+ From Automatic Speech Recognition [2, 3, 4] and speaker
31
+ diarization [5], to phone segmentation [6], these models have
32
+ shown remarkable results.
33
+ Specifically, these SSL models allow recent success in
34
+ Generative Spoken Language Modeling (GSLM) [7, 8, 9].
35
+ In GSLM, we aim to learn a discrete representation of the
36
+ speech signal. This is often being done by applying the k-
37
+ means algorithm over the continuous representation obtained
38
+ from a SSL models. Then, we train a unit Language Model
39
+ (uLM) over such representation, and lastly we decode it back
40
+ to a time domain signal using neural vocoder [10]. During
41
+ inference time, we can sample from the uLM conditionally or
42
+ unconditionally.
43
+ Although these models are capable of generating mean-
44
+ ingful and coherent speech utterances, little is known about
45
+ the properties captured but these discrete representations. The
46
+ authors in [11] examined the purity between phonetics ele-
47
+ ments and the discrete units. The authors’ proposed method
48
+ is to analysis the discrete SSL representation considering
49
+ fine-grained linguistic properties, e.g., different articulatory
50
+ classes or closure and release portions. The authors in [12]
51
+ proposed a probing method to analyze the presence of phone
52
+ classes, gender and language information while comparing
53
+ monolingual and bilingual models.
54
+ In this work, we analyze quantitatively and visually dis-
55
+ crete representations obtained by HuBERT and CPC models
56
+ with respect to phoneme classes, gender and speaker identity.
57
+ Next, equipped with such an analysis we provide a metric to
58
+ identify redundancies in the k-means clustering, and propose
59
+ a method to improve upon it.
60
+ We find a high correlation between the units and the
61
+ phonemes, but with many redundancies in the units.
62
+ We
63
+ show that one reason may be the units’ context. In Addition,
64
+ we propose an unsupervised metric to measure these redun-
65
+ dancies and we use it to significant improvement the unit
66
+ clustering.
67
+ 2. BACKGROUND
68
+ The general GSLM pipeline is comprised of three main mod-
69
+ ules: (i) Speech-to-unit, (ii) Unit language model, and (iii)
70
+ Unit-to-speech, where each of these modules is trained sepa-
71
+ rately. Speech resynthesis can be achieved while ignoring the
72
+ language model and directly feeding the quantized units into
73
+ the unit-to-speech module [10]
74
+ Speech To Unit (STU) module encodes the raw speech signal
75
+ into a discrete representation. The model first encodes the
76
+ speech into a continuous representation and then quantize the
77
+ representation to a sequence of discrete units [7, 13, 14].
78
+ Formally, denote the domain of audio samples by x ⊂ R.
79
+ The representation for a raw signal is therefore a sequence of
80
+ samples x = (x1, . . . , xT ), where xt ∈ x for all 1 ≤ t ≤ T.
81
+ Consider an encoder network, f, that gets as input the speech
82
+ utterance and outputs a sequence of spectral representations
83
+ sampled at a low frequency as follows f(x) = (v1, . . . , vT ′).
84
+ Note that we do not assume anything about the structure of
85
+ the encoder network f. Since the representations learned by
86
+ such models are usually continuous, a k-means algorithm is
87
+ arXiv:2301.00591v1 [cs.CL] 2 Jan 2023
88
+
89
+ Fig. 1. Units visualization process.
90
+ applied over the models’ outputs to generate discrete units,
91
+ denoted as z = (z1, . . . , zT ′). Each element zi in z is a pos-
92
+ itive integer, zi ∈ {1, .., K} for 1 ≤ i ≤ T ′, where K is the
93
+ number of discrete units.
94
+ As the quantized representation, z, usually contain units
95
+ repetitions which degrade the performance of the language
96
+ modeling, a common approach is collapse repetitions and
97
+ generate a de-duplicated sequence while additionally storing
98
+ the units’ duration separately.
99
+ For instance, the sequence
100
+ 12,12,25,31,31,31 will be converted into 12,25,31
101
+ and the corresponding durations 2,1,3.
102
+ Unit Language Model (ULM) is trained on the extracted
103
+ and deduplicated discrete units, z. The language model can
104
+ be used, for example, to generate speech conditionally or un-
105
+ conditionally.
106
+ Unit To Speech module converts the discrete speech repre-
107
+ sentation, z, to a raw waveform. The authors in [7] used a
108
+ Tacotron2.0 [15] based model followed by WaveGlow [16]
109
+ vocoder. Later, [10] proposed a unit-based vocoder based on
110
+ the HiFi-GAN architecture to directly convert units to speech.
111
+ In this work, we focus on the latter setting.
112
+ 3. METHOD
113
+ We analyze representations obtained by either HuEBRT [2]
114
+ or CPC [4] models considering various number of clusters.
115
+ All analysis code and the developed visualization tools will
116
+ be publicly available.
117
+ 3.1. Analysis
118
+ Units Interpretation. We start by measuring the mutual in-
119
+ formation between the discrete representation and different
120
+ speech properties (i.e., phonemes, speaker id, and gender),
121
+ using the V-Measure score [17].
122
+ For this purpose, we align each utterance with its corre-
123
+ sponding attribute. To get units-to-phonemes alignment we
124
+ use the TIMIT corpus [18]. The TIMIT dataset contains pairs
125
+ of audio - phonemes, which are time aligned. For speaker and
126
+ gender analysis we use the LibriSpeech corpus as it contains
127
+ large and diverse set of speaker.
128
+ Fig. 2. Circular Resynthesis evaluation metric.
129
+ Units Visualization. An additional point of view of the units
130
+ meaning is the spatial structure of units. For this purpose,
131
+ we create a 2D spatial view that contains information regard-
132
+ ing the relation between the continuous representation, the
133
+ discrete units, and their corresponding phonemes. Specifi-
134
+ cally, we apply the following two steps: (i) We project the
135
+ high-dimensional speech representation into 2d using the T-
136
+ SNE [19] algorithm. T-SNE is a nonlinear dimensionality re-
137
+ duction that intuitively preserves the non-linear distance re-
138
+ lations between neighbors in the high and low dimensions.
139
+ Then, we use the Voronoi diagram [20] that converts the scat-
140
+ ter plot into an area plot. Finally, we have left with a bounded
141
+ area in the 2D space for each unit; (ii) In the second part,
142
+ we create a single label to represents each cluster. We use
143
+ the units-phonemes alignment from the TIMIT (similarly to
144
+ the process in previous paragraph). Then, we assign for each
145
+ cluster the most represented phoneme in it. Finally, we re-
146
+ place the unit id with their corresponding phonemes and color
147
+ the area base on the phoneme and phoneme family. A visual
148
+ description of the proposed method can be seen in Figure 1.
149
+ Units Resynthesis. Next, we analyze the units’ information
150
+ from the opposite direction - that is, through the speech resyn-
151
+ thesis. We decode the units back to speech using a look-up-
152
+ table of the corresponding 20ms speech segments, then we
153
+ transcribe the generated audio and measure the transcription
154
+ error (e.g., the Character Error Rate). Intuitively, in case of
155
+ strong correlation between the units and the phonemes - we
156
+ can take a single “sound” to represent each unit - and apply
157
+ the UTS step using the concatenation of these sound pieces.
158
+ Notice, this approach is different than the one in [10] as there
159
+ is no neural vocoder.
160
+ Formally, let u, l be a sequences of deduplicated units and
161
+ their length obtained by applying STU on the input audio x.
162
+ and let xi be the part in x that is matched to deduped unit, ui.
163
+ Notice, xi can be of arbitrary length.
164
+ Lookup Vocoder defines as :
165
+ LV (u, l) = concat(F(u1, l1), . . . , F(un, ln)),
166
+ F(ui, li) =
167
+
168
+ T[Key(ui, li)],
169
+ if Key(ui, li) in T
170
+ xi,
171
+ else
172
+ ,
173
+ (1)
174
+
175
+ K-Means Centers
176
+ T-SNE
177
+ Voronoi Diagram
178
+ N × Multicdimensional Vectors
179
+ Acoustic-PhoneticCorpus
180
+ M
181
+ Units :
182
+ 11313...17
183
+ M
184
+ 3-M
185
+ 4
186
+ Phonemes : A
187
+ wI
188
+ I.. SH
189
+ 7 - SH
190
+ SHcR(i)
191
+ 32
192
+ UED
193
+ ->
194
+ ->
195
+ s<- hs
196
+ 32 -> 28
197
+ 1, 7, 54....
198
+ 28Table 1. Units Interpretation results. For phonemes, higher is
199
+ better. While for the speaker and gender, lower score indicates
200
+ that the model manages to hide information about the speaker
201
+ and gender.
202
+ Model
203
+ Size
204
+ Speaker
205
+ Gender
206
+ Phoneme
207
+ CPC
208
+ 50
209
+ 1.35
210
+ 0.66
211
+ 47.30
212
+ 100
213
+ 2.35
214
+ 0.54
215
+ 48.45
216
+ 200
217
+ 3.70
218
+ 1.62
219
+ 47.74
220
+ 2000
221
+ 10.39
222
+ 4.14
223
+ 44.06
224
+ HuBERT
225
+ 50
226
+ 0.73
227
+ 0.03
228
+ 42.49
229
+ 100
230
+ 1.41
231
+ 0.17
232
+ 45.48
233
+ 200
234
+ 1.95
235
+ 0.21
236
+ 46.64
237
+ 2000
238
+ 5.15
239
+ 0.65
240
+ 43.32
241
+ MFCC
242
+ 50
243
+ 9.11
244
+ 2.90
245
+ 8.57
246
+ 100
247
+ 11.54
248
+ 3.97
249
+ 8.73
250
+ 200
251
+ 13.81
252
+ 4.59
253
+ 8.96
254
+ where T is a Look-up-table that stores for each key the corre-
255
+ sponding xi of the first appearance of this key, and Key maps
256
+ unit and length into key.
257
+ We explore four different types of Key : (i) Local-Single-
258
+ Key(ui) = (ui); (ii) Local-Full- Key(ui) = (ui, li); (iii)
259
+ Context-Single- Key(ui) = (ui−1, ui, ui+1); (iv) Context-
260
+ Full- Key(ui) = (ui−1, ui, ui+1, li).
261
+ 3.2. Circular Resynthesis
262
+ We introduce the Circular Resynthesis (CR) method, an ut-
263
+ terly unsupervised evaluation metric that aims to measure the
264
+ redundancies in the discrete units. As described in Figure 2,
265
+ we first perform a full resynthesis procedure, in which we
266
+ encode and decode the speech signal. Then, we apply an ad-
267
+ ditional resynthesis stage and measure the Unit-Edit-Distance
268
+ (UED) between the first and the second units representing the
269
+ speech. This metric was recently proposed by [14] to evalu-
270
+ ate robustness of discrete speech representation against signal
271
+ variations. Intuitively, a high UED indicates redundancies in
272
+ the discrete units. To reach the final CR metric, for each pair
273
+ of units, we calculate the percentage of swaps between them
274
+ over all the dataset’s transcriptions.
275
+ 3.3. Robust Clustering
276
+ Equipped with the CR metric, we explore three simple meth-
277
+ ods to improve the k-means clustering quality. In all three
278
+ methods, we start from the standard k-means with k = 2000
279
+ and iterativly merge the clusters to reach the target number
280
+ of clusters. The first method, named Double K-means. In
281
+ which, we apply an additional k-means over the cluster cen-
282
+ torids from the first k-means step. The second method, de-
283
+ noted as K-means with Hierarchical Clustering, we apply
284
+ an an agglomerative clustering over the cluster centorids from
285
+ the first k-means step. The last method, named K-means with
286
+ Weighed Hierarchical Clustering, we use an agglomerative
287
+ Table 2.
288
+ Units Resynthesis results.
289
+ CER for UTS using
290
+ lookup and concatenate methods. The table contains results
291
+ for different lookup key types: Local-Single (L-S),Local-Full
292
+ (L-F) Context-Single (C-S) and Context-Full (C-F).
293
+ Model
294
+ Size
295
+ Hifi-GEN
296
+ Key Type
297
+ C-F
298
+ C-S
299
+ L-F
300
+ L-S
301
+ CPC
302
+ 50
303
+ 5.95
304
+ 9.12
305
+ 25.36
306
+ 39.57
307
+ 60.98
308
+ 100
309
+ 5.67
310
+ 6.52
311
+ 15.21
312
+ 22.51
313
+ 53.59
314
+ 200
315
+ 5.37
316
+ 5.12
317
+ 10.16
318
+ 15.18
319
+ 40.65
320
+ HuBERT
321
+ 50
322
+ 7.31
323
+ 10.31
324
+ 14.96
325
+ 47.24
326
+ 58.42
327
+ 100
328
+ 4.39
329
+ 5.24
330
+ 6.26
331
+ 26.55
332
+ 57.49
333
+ 200
334
+ 4.10
335
+ 4.25
336
+ 4.69
337
+ 15.56
338
+ 19.88
339
+ MFCC
340
+ 50
341
+ 50.47
342
+ 33.85
343
+ 57.60
344
+ 71.43
345
+ 69.22
346
+ 100
347
+ 44.68
348
+ 15.79
349
+ 46.55
350
+ 67.54
351
+ 66.13
352
+ 200
353
+ 41.67
354
+ 6.22
355
+ 30.47
356
+ 61.46
357
+ 61.31
358
+ clustering using a modified version of the euclidean distance,
359
+ weighted by the CR metric. Formally, the distance metric is
360
+ defined as follows:
361
+ D(i, j) = L2(ci, cj) · SWAP(ui, uj),
362
+ SWAP(ui, uj) = 1
363
+ 2 [CR(ui, uj) + CR(uj, ui)] ,
364
+ (2)
365
+ while ci, cj are the ith and jth cluster continuous centroids,
366
+ and ui, uj are the ith and jth discrete unit.
367
+ 4. RESULTS
368
+ 4.1. Datasets
369
+ We use the the Librispeech[21] corpus to learn the k-means
370
+ clustering (train-clean-100), and the test-clean to
371
+ evaluate both the clustering methods and the look-up vocoder.
372
+ Additionally, we use the Librispeech corpus for calculating
373
+ the V-Measure for speaker and gender. For computing the
374
+ V-Measure over phonemes we use the TIMIT benchmark.
375
+ 4.2. Units Interpretation
376
+ Table 1 presents the V-Measure results regarding three dif-
377
+ ferent attributes - speaker, gender, and phoneme.
378
+ The V-
379
+ Measure for the speaker and gender scores is lower than the
380
+ score of the phonemes- which indicates of high correlation
381
+ to the phonemes and a low correlation to the speaker or gen-
382
+ der. In addition, when we check the effect of the number
383
+ of the units- while for the speaker/gender, more units lead
384
+ to a higher score, in the phoneme score there is a max point
385
+ both for the HuBERT and CPC configurations. Therefore, we
386
+ claim that redundancies cause this trend in the units. Finally,
387
+ we can see that CPC has a higher score for the phonemes- but
388
+ also a higher score for speaker and gender.
389
+ 4.3. Units Visualization
390
+ Figure 3 shows the spatial structure of the units. One can
391
+ see that there is a very consistent structure- first, units that
392
+
393
+ Fig. 3. 2D view of the units’ centers. Each bounded area represents a single unit and is colored by the unit’s phoneme. We use
394
+ T-SNE and Voronoi diagram to get the units areas. The matching between the units and phonemes was made using the TIMIT
395
+ corpus, while each unit was labeled as a phoneme that represents her most commonly.
396
+ Table 3. Comparing the different clustering methods using ABX and speaker information.For all these metrics, lower is
397
+ better.The methods are : Regular k-means (K), Double K-means (K-K),K-means with Hierarchical Clustering (K-H) and K-
398
+ means with Weighed Hierarchical Clustering (K-WH)
399
+ Model
400
+ Size
401
+ ABX within
402
+ ABX across
403
+ Speaker probing
404
+ K
405
+ K-K
406
+ K-H
407
+ K-WH
408
+ K
409
+ K-K
410
+ K-H
411
+ K-WH
412
+ K
413
+ K-K
414
+ K-H
415
+ K-WH
416
+ CPC
417
+ 50
418
+ 5.66
419
+ 5.38
420
+ 9.62
421
+ 8.80
422
+ 7.83
423
+ 6.77
424
+ 11.46
425
+ 10.56
426
+ 42.22
427
+ 32.96
428
+ 19.26
429
+ 18.15
430
+ 100
431
+ 5.42
432
+ 5.44
433
+ 6.66
434
+ 6.04
435
+ 7.07
436
+ 7.13
437
+ 8.26
438
+ 7.49
439
+ 52.96
440
+ 45.19
441
+ 20.37
442
+ 15.56
443
+ 200
444
+ 5.53
445
+ 5.27
446
+ 5.61
447
+ 5.68
448
+ 7.35
449
+ 7.10
450
+ 7.28
451
+ 7.13
452
+ 63.70
453
+ 49.63
454
+ 26.30
455
+ 22.59
456
+ HuBERT
457
+ 50
458
+ 7.23
459
+ 5.67
460
+ 5.94
461
+ 6.12
462
+ 8.93
463
+ 6.83
464
+ 7.43
465
+ 7.67
466
+ 30.37
467
+ 36.30
468
+ 36.67
469
+ 31.85
470
+ 100
471
+ 5.82
472
+ 5.01
473
+ 5.30
474
+ 5.29
475
+ 7.47
476
+ 6.50
477
+ 6.54
478
+ 6.32
479
+ 48.15
480
+ 48.89
481
+ 48.15
482
+ 46.67
483
+ 200
484
+ 5.79
485
+ 5.24
486
+ 5.18
487
+ 5.05
488
+ 7.49
489
+ 6.42
490
+ 6.46
491
+ 6.07
492
+ 65.19
493
+ 61.11
494
+ 54.81
495
+ 62.96
496
+ represent the same phoneme are usually close to each other.
497
+ Moreover, phonemes from the same family (affricates, frica-
498
+ tives, Etc.’ ) tend also to be close to each other. In addition,
499
+ we can see that while for HuBERT and CPC, the space divide
500
+ between the different phonemes families is generally equal, in
501
+ the MFCC model, almost all the space uses for vowels. No-
502
+ tice, redundancies in the clusters can be also observed from
503
+ such figures.
504
+ 4.4. Units Resynthesis
505
+ In Table 2, we shows the results for the units resynthesis.
506
+ We can see that for some configurations, there is slightly dif-
507
+ ference between the HiFi-GAN and the look-up scores- this
508
+ strengthens our understanding that units express fixed sounds
509
+ and are mainly correlative to phonemes. We can see that the
510
+ context of the units critically affects the results, while the
511
+ unit’s length has a lower effect. Finally, this understanding
512
+ may help in understand units’ redundancies, i.e., the same
513
+ phoneme in a different context will represent different units.
514
+ 4.5. Robust Clustering
515
+ We evaluate the proposed approach along two different
516
+ axes: (i) phonetic measure in the form of ABX within and
517
+ across [22]; (ii) speaker information in the form of probing
518
+ similarly to [13]. Table 3 summarizes the results. We can see
519
+ that the proposed methods, although they are straightforward,
520
+ improve both the ABX and the speaker results for most of the
521
+ configurations. Furthermore, the best results for ABX-across
522
+ were obtained using CR- this strengthens our claim regarding
523
+ the unit’s redundancies.
524
+ 5. CONCLUSION
525
+ In this work, we analyzed the GSLM discrete unit from three
526
+ different and complementary points of view: interpretation,
527
+ visualization, and resynthesis. The analysis showed a strong
528
+ correlation between the units and the phonemes. In addition,
529
+ we found redundancies in the units, which the units’ context
530
+ can explain. Finally, we proposed methods that improve the
531
+ unit’s clustering based on these understandings.
532
+
533
+ fricatives
534
+ stops
535
+ affricates
536
+ nasals
537
+ semivowels
538
+ vowels
539
+ others
540
+ HuBERT
541
+ CPC
542
+ MFCC
543
+ laaan
544
+ awa
545
+ ao
546
+ aa
547
+ eh
548
+ aw
549
+ ae
550
+ s
551
+
552
+ h#
553
+ sh
554
+ Inr
555
+ Ley
556
+ ux
557
+ ow
558
+ layl
559
+ h#
560
+ h#
561
+ 可国
562
+ w
563
+ In
564
+ ae
565
+ lae
566
+ sh]
567
+ dcl
568
+ PP
569
+ s
570
+ Th#
571
+ HiyNiy
572
+ Imm
573
+ pcll
574
+ iyng
575
+ Itcl
576
+ ep
577
+ h#
578
+ y
579
+ a
580
+ h#
581
+ aol
582
+ h#
583
+ Aht
584
+ h#6. REFERENCES
585
+ [1] Shu-wen Yang et al.,
586
+ “Superb:
587
+ Speech processing
588
+ universal performance benchmark,”
589
+ arXiv preprint
590
+ arXiv:2105.01051, 2021.
591
+ [2] Wei-Ning Hsu, Benjamin Bolte, Yao-Hung Hubert Tsai,
592
+ Kushal Lakhotia, Ruslan Salakhutdinov, and Abdelrah-
593
+ man Mohamed, “Hubert: Self-supervised speech rep-
594
+ resentation learning by masked prediction of hidden
595
+ units,” IEEE/ACM Transactions on Audio, Speech, and
596
+ Language Processing, vol. 29, pp. 3451–3460, 2021.
597
+ [3] Alexei Baevski et al., “wav2vec 2.0: A framework for
598
+ self-supervised learning of speech representations,” Ad-
599
+ vances in Neural Information Processing Systems, vol.
600
+ 33, pp. 12449–12460, 2020.
601
+ [4] Morgane Riviere et al., “Unsupervised pretraining trans-
602
+ fers well across languages,” in ICASSP 2020-2020 IEEE
603
+ International Conference on Acoustics, Speech and Sig-
604
+ nal Processing (ICASSP). IEEE, 2020, pp. 7414–7418.
605
+ [5] Yehoshua Dissen, Felix Kreuk, and Joseph Keshet,
606
+ “Self-supervised speaker diarization,”
607
+ arXiv preprint
608
+ arXiv:2204.04166, 2022.
609
+ [6] Felix
610
+ Kreuk,
611
+ Joseph
612
+ Keshet,
613
+ and
614
+ Yossi
615
+ Adi,
616
+ “Self-supervised
617
+ contrastive
618
+ learning
619
+ for
620
+ unsu-
621
+ pervised phoneme segmentation,”
622
+ arXiv preprint
623
+ arXiv:2007.13465, 2020.
624
+ [7] Kushal Lakhotia, Eugene Kharitonov, Wei-Ning Hsu,
625
+ Yossi Adi, Adam Polyak, Benjamin Bolte, Tu-Anh
626
+ Nguyen, Jade Copet, Alexei Baevski, Abdelrahman Mo-
627
+ hamed, et al., “On generative spoken language model-
628
+ ing from raw audio,” Transactions of the Association
629
+ for Computational Linguistics, vol. 9, pp. 1336–1354,
630
+ 2021.
631
+ [8] Tu Anh Nguyen et al.,
632
+ “Generative spoken dialogue
633
+ language modeling,” arXiv preprint arXiv:2203.16502,
634
+ 2022.
635
+ [9] Zal´an Borsos, Rapha¨el Marinier, Damien Vincent, Eu-
636
+ gene Kharitonov, Olivier Pietquin, Matt Sharifi, Olivier
637
+ Teboul, David Grangier, Marco Tagliasacchi, and Neil
638
+ Zeghidour, “Audiolm: a language modeling approach
639
+ to audio generation,” arXiv preprint arXiv:2209.03143,
640
+ 2022.
641
+ [10] Adam Polyak et al., “Speech resynthesis from discrete
642
+ disentangled self-supervised representations,”
643
+ arXiv
644
+ preprint arXiv:2104.00355, 2021.
645
+ [11] Dan Wells, Hao Tang, and Korin Richmond,
646
+ “Pho-
647
+ netic analysis of self-supervised representations of en-
648
+ glish speech,” Proc. Interspeech 2022, 2022.
649
+ [12] Maureen de Seyssel, Marvin Lavechin, Yossi Adi, Em-
650
+ manuel Dupoux, and Guillaume Wisniewski,
651
+ “Prob-
652
+ ing phoneme, language and speaker information in un-
653
+ supervised speech representations,”
654
+ arXiv preprint
655
+ arXiv:2203.16193, 2022.
656
+ [13] Eugene Kharitonov et al.,
657
+ “textless-lib: a library for
658
+ textless spoken language processing,”
659
+ arXiv preprint
660
+ arXiv:2202.07359, 2022.
661
+ [14] Itai Gat, Felix Kreuk, Ann Lee, Jade Copet, Gabriel
662
+ Synnaeve, Emmanuel Dupoux, and Yossi Adi, “On the
663
+ robustness of self-supervised representations for spoken
664
+ language modeling,” arXiv preprint arXiv:2209.15483,
665
+ 2022.
666
+ [15] Jonathan Shen et al., “Natural tts synthesis by condition-
667
+ ing wavenet on mel spectrogram predictions,” in 2018
668
+ IEEE international conference on acoustics, speech and
669
+ signal processing (ICASSP). IEEE, 2018, pp. 4779–
670
+ 4783.
671
+ [16] Ryan Prenger et al.,
672
+ “Waveglow: A flow-based gen-
673
+ erative network for speech synthesis,”
674
+ in ICASSP
675
+ 2019-2019 IEEE International Conference on Acous-
676
+ tics, Speech and Signal Processing (ICASSP). IEEE,
677
+ 2019, pp. 3617–3621.
678
+ [17] Andrew Rosenberg and Julia Hirschberg, “V-measure:
679
+ A conditional entropy-based external cluster evaluation
680
+ measure,” in Proceedings of the 2007 joint conference
681
+ on empirical methods in natural language processing
682
+ and computational natural language learning (EMNLP-
683
+ CoNLL), 2007, pp. 410–420.
684
+ [18] John S Garofolo,
685
+ “Timit acoustic phonetic continu-
686
+ ous speech corpus,” Linguistic Data Consortium, 1993,
687
+ 1993.
688
+ [19] Laurens van der Maaten and Geoffrey Hinton, “Visu-
689
+ alizing data using t-sne,” Journal of Machine Learning
690
+ Research, vol. 9, no. 86, pp. 2579–2605, 2008.
691
+ [20] Franz Aurenhammer, “Voronoi diagrams—a survey of
692
+ a fundamental geometric data structure,” ACM Comput-
693
+ ing Surveys (CSUR), vol. 23, no. 3, pp. 345–405, 1991.
694
+ [21] Vassil Panayotov et al.,
695
+ “Librispeech: an asr corpus
696
+ based on public domain audio books,” in 2015 IEEE
697
+ international conference on acoustics, speech and sig-
698
+ nal processing (ICASSP). IEEE, 2015, pp. 5206–5210.
699
+ [22] Jacob Kahn et al., “Libri-light: A benchmark for asr
700
+ with limited or no supervision,” in ICASSP 2020-2020
701
+ IEEE International Conference on Acoustics, Speech
702
+ and Signal Processing (ICASSP). IEEE, 2020, pp.
703
+ 7669–7673.
704
+
N9AyT4oBgHgl3EQftPlh/content/tmp_files/load_file.txt ADDED
@@ -0,0 +1,405 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ filepath=/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf,len=404
2
+ page_content='ANALYSING DISCRETE SELF SUPERVISED SPEECH REPRESENTATION FOR SPOKEN LANGUAGE MODELING Amitay Sicherman and Yossi Adi School of Engineering and Computer Science The Hebrew University of Jerusalem, Israel ABSTRACT This work profoundly analyzes discrete self-supervised speech representations through the eyes of Generative Spoken Lan- guage Modeling (GSLM).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
3
+ page_content=' Following the findings of such an analysis, we propose practical improvements to the discrete unit for the GSLM.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
4
+ page_content=' First, we start comprehending these units by analyzing them in three axes: interpretation, visualization, and resynthesis.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
5
+ page_content=' Our analysis finds a high correlation between the speech units to phonemes and phoneme families, while their correlation with speaker or gender is weaker.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
6
+ page_content=' Addition- ally, we found redundancies in the extracted units and claim that one reason may be the units’ context.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
7
+ page_content=' Following this analysis, we propose a new, unsupervised metric to measure unit redundancies.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
8
+ page_content=' Finally, we use this metric to develop new methods that improve the robustness of units clustering and show significant improvement considering zero-resource speech metrics such as ABX.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
9
+ page_content=' Code and analysis tools are available under the following link.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
10
+ page_content=' Index Terms— self supervised learning, generative spo- ken language modeling, textless NLP, speech LM 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
11
+ page_content=' INTRODUCTION Recently Self-Supervised Learning (SSL) methods for speech have shown great success on plenty of downs stream tasks [1].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
12
+ page_content=' From Automatic Speech Recognition [2, 3, 4] and speaker diarization [5], to phone segmentation [6], these models have shown remarkable results.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
13
+ page_content=' Specifically, these SSL models allow recent success in Generative Spoken Language Modeling (GSLM) [7, 8, 9].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
14
+ page_content=' In GSLM, we aim to learn a discrete representation of the speech signal.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
15
+ page_content=' This is often being done by applying the k- means algorithm over the continuous representation obtained from a SSL models.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
16
+ page_content=' Then, we train a unit Language Model (uLM) over such representation, and lastly we decode it back to a time domain signal using neural vocoder [10].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
17
+ page_content=' During inference time, we can sample from the uLM conditionally or unconditionally.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
18
+ page_content=' Although these models are capable of generating mean- ingful and coherent speech utterances, little is known about the properties captured but these discrete representations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
19
+ page_content=' The authors in [11] examined the purity between phonetics ele- ments and the discrete units.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
20
+ page_content=' The authors’ proposed method is to analysis the discrete SSL representation considering fine-grained linguistic properties, e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
21
+ page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
22
+ page_content=', different articulatory classes or closure and release portions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
23
+ page_content=' The authors in [12] proposed a probing method to analyze the presence of phone classes, gender and language information while comparing monolingual and bilingual models.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
24
+ page_content=' In this work, we analyze quantitatively and visually dis- crete representations obtained by HuBERT and CPC models with respect to phoneme classes, gender and speaker identity.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
25
+ page_content=' Next, equipped with such an analysis we provide a metric to identify redundancies in the k-means clustering, and propose a method to improve upon it.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
26
+ page_content=' We find a high correlation between the units and the phonemes, but with many redundancies in the units.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
27
+ page_content=' We show that one reason may be the units’ context.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
28
+ page_content=' In Addition, we propose an unsupervised metric to measure these redun- dancies and we use it to significant improvement the unit clustering.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
29
+ page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
30
+ page_content=' BACKGROUND The general GSLM pipeline is comprised of three main mod- ules: (i) Speech-to-unit, (ii) Unit language model, and (iii) Unit-to-speech, where each of these modules is trained sepa- rately.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
31
+ page_content=' Speech resynthesis can be achieved while ignoring the language model and directly feeding the quantized units into the unit-to-speech module [10] Speech To Unit (STU) module encodes the raw speech signal into a discrete representation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
32
+ page_content=' The model first encodes the speech into a continuous representation and then quantize the representation to a sequence of discrete units [7, 13, 14].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
33
+ page_content=' Formally, denote the domain of audio samples by x ⊂ R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
34
+ page_content=' The representation for a raw signal is therefore a sequence of samples x = (x1, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
35
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
36
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
37
+ page_content=' , xT ), where xt ∈ x for all 1 ≤ t ≤ T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
38
+ page_content=' Consider an encoder network, f, that gets as input the speech utterance and outputs a sequence of spectral representations sampled at a low frequency as follows f(x) = (v1, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
39
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
40
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
41
+ page_content=' , vT ′).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
42
+ page_content=' Note that we do not assume anything about the structure of the encoder network f.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
43
+ page_content=' Since the representations learned by such models are usually continuous, a k-means algorithm is arXiv:2301.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
44
+ page_content='00591v1 [cs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
45
+ page_content='CL] 2 Jan 2023 Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
46
+ page_content=' 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
47
+ page_content=' Units visualization process.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
48
+ page_content=' applied over the models’ outputs to generate discrete units, denoted as z = (z1, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
49
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
50
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
51
+ page_content=' , zT ′).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
52
+ page_content=' Each element zi in z is a pos- itive integer, zi ∈ {1, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
53
+ page_content='., K} for 1 ≤ i ≤ T ′, where K is the number of discrete units.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
54
+ page_content=' As the quantized representation, z, usually contain units repetitions which degrade the performance of the language modeling, a common approach is collapse repetitions and generate a de-duplicated sequence while additionally storing the units’ duration separately.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
55
+ page_content=' For instance, the sequence 12,12,25,31,31,31 will be converted into 12,25,31 and the corresponding durations 2,1,3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
56
+ page_content=' Unit Language Model (ULM) is trained on the extracted and deduplicated discrete units, z.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
57
+ page_content=' The language model can be used, for example, to generate speech conditionally or un- conditionally.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
58
+ page_content=' Unit To Speech module converts the discrete speech repre- sentation, z, to a raw waveform.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
59
+ page_content=' The authors in [7] used a Tacotron2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
60
+ page_content='0 [15] based model followed by WaveGlow [16] vocoder.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
61
+ page_content=' Later, [10] proposed a unit-based vocoder based on the HiFi-GAN architecture to directly convert units to speech.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
62
+ page_content=' In this work, we focus on the latter setting.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
63
+ page_content=' 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
64
+ page_content=' METHOD We analyze representations obtained by either HuEBRT [2] or CPC [4] models considering various number of clusters.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
65
+ page_content=' All analysis code and the developed visualization tools will be publicly available.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
66
+ page_content=' 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
67
+ page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
68
+ page_content=' Analysis Units Interpretation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
69
+ page_content=' We start by measuring the mutual in- formation between the discrete representation and different speech properties (i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
70
+ page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
71
+ page_content=', phonemes, speaker id, and gender), using the V-Measure score [17].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
72
+ page_content=' For this purpose, we align each utterance with its corre- sponding attribute.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
73
+ page_content=' To get units-to-phonemes alignment we use the TIMIT corpus [18].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
74
+ page_content=' The TIMIT dataset contains pairs of audio - phonemes, which are time aligned.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
75
+ page_content=' For speaker and gender analysis we use the LibriSpeech corpus as it contains large and diverse set of speaker.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
76
+ page_content=' Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
77
+ page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
78
+ page_content=' Circular Resynthesis evaluation metric.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
79
+ page_content=' Units Visualization.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
80
+ page_content=' An additional point of view of the units meaning is the spatial structure of units.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
81
+ page_content=' For this purpose, we create a 2D spatial view that contains information regard- ing the relation between the continuous representation, the discrete units, and their corresponding phonemes.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
82
+ page_content=' Specifi- cally, we apply the following two steps: (i) We project the high-dimensional speech representation into 2d using the T- SNE [19] algorithm.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
83
+ page_content=' T-SNE is a nonlinear dimensionality re- duction that intuitively preserves the non-linear distance re- lations between neighbors in the high and low dimensions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
84
+ page_content=' Then, we use the Voronoi diagram [20] that converts the scat- ter plot into an area plot.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
85
+ page_content=' Finally, we have left with a bounded area in the 2D space for each unit;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
86
+ page_content=' (ii) In the second part, we create a single label to represents each cluster.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
87
+ page_content=' We use the units-phonemes alignment from the TIMIT (similarly to the process in previous paragraph).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
88
+ page_content=' Then, we assign for each cluster the most represented phoneme in it.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
89
+ page_content=' Finally, we re- place the unit id with their corresponding phonemes and color the area base on the phoneme and phoneme family.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
90
+ page_content=' A visual description of the proposed method can be seen in Figure 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
91
+ page_content=' Units Resynthesis.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
92
+ page_content=' Next, we analyze the units’ information from the opposite direction - that is, through the speech resyn- thesis.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
93
+ page_content=' We decode the units back to speech using a look-up- table of the corresponding 20ms speech segments, then we transcribe the generated audio and measure the transcription error (e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
94
+ page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
95
+ page_content=', the Character Error Rate).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
96
+ page_content=' Intuitively, in case of strong correlation between the units and the phonemes - we can take a single “sound” to represent each unit - and apply the UTS step using the concatenation of these sound pieces.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
97
+ page_content=' Notice, this approach is different than the one in [10] as there is no neural vocoder.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
98
+ page_content=' Formally, let u, l be a sequences of deduplicated units and their length obtained by applying STU on the input audio x.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
99
+ page_content=' and let xi be the part in x that is matched to deduped unit, ui.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
100
+ page_content=' Notice, xi can be of arbitrary length.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
101
+ page_content=' Lookup Vocoder defines as : LV (u, l) = concat(F(u1, l1), .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
102
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
103
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
104
+ page_content=' , F(un, ln)), F(ui, li) = � T[Key(ui, li)], if Key(ui, li) in T xi, else , (1) K-Means Centers T-SNE Voronoi Diagram N × Multicdimensional Vectors Acoustic-PhoneticCorpus M Units : 11313.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
105
+ page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
106
+ page_content='17 M 3-M 4 Phonemes : A wI I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
107
+ page_content='. SH 7 - SH SHcR(i) 32 UED > > s<- hs 32 -> 28 1, 7, 54.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
108
+ page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
109
+ page_content='. 28Table 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
110
+ page_content=' Units Interpretation results.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
111
+ page_content=' For phonemes, higher is better.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
112
+ page_content=' While for the speaker and gender, lower score indicates that the model manages to hide information about the speaker and gender.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
113
+ page_content=' Model Size Speaker Gender Phoneme CPC 50 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
114
+ page_content='35 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
115
+ page_content='66 47.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
116
+ page_content='30 100 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
117
+ page_content='35 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
118
+ page_content='54 48.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
119
+ page_content='45 200 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
120
+ page_content='70 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
121
+ page_content='62 47.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
122
+ page_content='74 2000 10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
123
+ page_content='39 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
124
+ page_content='14 44.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
125
+ page_content='06 HuBERT 50 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
126
+ page_content='73 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
127
+ page_content='03 42.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
128
+ page_content='49 100 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
129
+ page_content='41 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
130
+ page_content='17 45.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
131
+ page_content='48 200 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
132
+ page_content='95 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
133
+ page_content='21 46.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
134
+ page_content='64 2000 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
135
+ page_content='15 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
136
+ page_content='65 43.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
137
+ page_content='32 MFCC 50 9.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
138
+ page_content='11 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
139
+ page_content='90 8.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
140
+ page_content='57 100 11.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
141
+ page_content='54 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
142
+ page_content='97 8.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
143
+ page_content='73 200 13.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
144
+ page_content='81 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
145
+ page_content='59 8.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
146
+ page_content='96 where T is a Look-up-table that stores for each key the corre- sponding xi of the first appearance of this key, and Key maps unit and length into key.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
147
+ page_content=' We explore four different types of Key : (i) Local-Single- Key(ui) = (ui);' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
148
+ page_content=' (ii) Local-Full- Key(ui) = (ui, li);' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
149
+ page_content=' (iii) Context-Single- Key(ui) = (ui−1, ui, ui+1);' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
150
+ page_content=' (iv) Context- Full- Key(ui) = (ui−1, ui, ui+1, li).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
151
+ page_content=' 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
152
+ page_content='2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
153
+ page_content=' Circular Resynthesis We introduce the Circular Resynthesis (CR) method, an ut- terly unsupervised evaluation metric that aims to measure the redundancies in the discrete units.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
154
+ page_content=' As described in Figure 2, we first perform a full resynthesis procedure, in which we encode and decode the speech signal.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
155
+ page_content=' Then, we apply an ad- ditional resynthesis stage and measure the Unit-Edit-Distance (UED) between the first and the second units representing the speech.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
156
+ page_content=' This metric was recently proposed by [14] to evalu- ate robustness of discrete speech representation against signal variations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
157
+ page_content=' Intuitively, a high UED indicates redundancies in the discrete units.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
158
+ page_content=' To reach the final CR metric, for each pair of units, we calculate the percentage of swaps between them over all the dataset’s transcriptions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
159
+ page_content=' 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
160
+ page_content='3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
161
+ page_content=' Robust Clustering Equipped with the CR metric, we explore three simple meth- ods to improve the k-means clustering quality.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
162
+ page_content=' In all three methods, we start from the standard k-means with k = 2000 and iterativly merge the clusters to reach the target number of clusters.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
163
+ page_content=' The first method, named Double K-means.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
164
+ page_content=' In which, we apply an additional k-means over the cluster cen- torids from the first k-means step.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
165
+ page_content=' The second method, de- noted as K-means with Hierarchical Clustering, we apply an an agglomerative clustering over the cluster centorids from the first k-means step.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
166
+ page_content=' The last method, named K-means with Weighed Hierarchical Clustering, we use an agglomerative Table 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
167
+ page_content=' Units Resynthesis results.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
168
+ page_content=' CER for UTS using lookup and concatenate methods.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
169
+ page_content=' The table contains results for different lookup key types: Local-Single (L-S),Local-Full (L-F) Context-Single (C-S) and Context-Full (C-F).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
170
+ page_content=' Model Size Hifi-GEN Key Type C-F C-S L-F L-S CPC 50 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
171
+ page_content='95 9.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
172
+ page_content='12 25.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
173
+ page_content='36 39.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
174
+ page_content='57 60.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
175
+ page_content='98 100 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
176
+ page_content='67 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
177
+ page_content='52 15.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
178
+ page_content='21 22.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
179
+ page_content='51 53.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
180
+ page_content='59 200 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
181
+ page_content='37 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
182
+ page_content='12 10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
183
+ page_content='16 15.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
184
+ page_content='18 40.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
185
+ page_content='65 HuBERT 50 7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
186
+ page_content='31 10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
187
+ page_content='31 14.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
188
+ page_content='96 47.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
189
+ page_content='24 58.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
190
+ page_content='42 100 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
191
+ page_content='39 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
192
+ page_content='24 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
193
+ page_content='26 26.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
194
+ page_content='55 57.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
195
+ page_content='49 200 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
196
+ page_content='10 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
197
+ page_content='25 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
198
+ page_content='69 15.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
199
+ page_content='56 19.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
200
+ page_content='88 MFCC 50 50.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
201
+ page_content='47 33.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
202
+ page_content='85 57.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
203
+ page_content='60 71.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
204
+ page_content='43 69.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
205
+ page_content='22 100 44.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
206
+ page_content='68 15.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
207
+ page_content='79 46.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
208
+ page_content='55 67.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
209
+ page_content='54 66.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
210
+ page_content='13 200 41.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
211
+ page_content='67 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
212
+ page_content='22 30.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
213
+ page_content='47 61.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
214
+ page_content='46 61.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
215
+ page_content='31 clustering using a modi��ed version of the euclidean distance, weighted by the CR metric.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
216
+ page_content=' Formally, the distance metric is defined as follows: D(i, j) = L2(ci, cj) · SWAP(ui, uj), SWAP(ui, uj) = 1 2 [CR(ui, uj) + CR(uj, ui)] , (2) while ci, cj are the ith and jth cluster continuous centroids, and ui, uj are the ith and jth discrete unit.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
217
+ page_content=' 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
218
+ page_content=' RESULTS 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
219
+ page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
220
+ page_content=' Datasets We use the the Librispeech[21] corpus to learn the k-means clustering (train-clean-100), and the test-clean to evaluate both the clustering methods and the look-up vocoder.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
221
+ page_content=' Additionally, we use the Librispeech corpus for calculating the V-Measure for speaker and gender.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
222
+ page_content=' For computing the V-Measure over phonemes we use the TIMIT benchmark.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
223
+ page_content=' 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
224
+ page_content='2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
225
+ page_content=' Units Interpretation Table 1 presents the V-Measure results regarding three dif- ferent attributes - speaker, gender, and phoneme.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
226
+ page_content=' The V- Measure for the speaker and gender scores is lower than the score of the phonemes- which indicates of high correlation to the phonemes and a low correlation to the speaker or gen- der.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
227
+ page_content=' In addition, when we check the effect of the number of the units- while for the speaker/gender, more units lead to a higher score, in the phoneme score there is a max point both for the HuBERT and CPC configurations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
228
+ page_content=' Therefore, we claim that redundancies cause this trend in the units.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
229
+ page_content=' Finally, we can see that CPC has a higher score for the phonemes- but also a higher score for speaker and gender.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
230
+ page_content=' 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
231
+ page_content='3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
232
+ page_content=' Units Visualization Figure 3 shows the spatial structure of the units.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
233
+ page_content=' One can see that there is a very consistent structure- first, units that Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
234
+ page_content=' 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
235
+ page_content=' 2D view of the units’ centers.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
236
+ page_content=' Each bounded area represents a single unit and is colored by the unit’s phoneme.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
237
+ page_content=' We use T-SNE and Voronoi diagram to get the units areas.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
238
+ page_content=' The matching between the units and phonemes was made using the TIMIT corpus, while each unit was labeled as a phoneme that represents her most commonly.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
239
+ page_content=' Table 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
240
+ page_content=' Comparing the different clustering methods using ABX and speaker information.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
241
+ page_content='For all these metrics, lower is better.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
242
+ page_content='The methods are : Regular k-means (K), Double K-means (K-K),K-means with Hierarchical Clustering (K-H) and K- means with Weighed Hierarchical Clustering (K-WH) Model Size ABX within ABX across Speaker probing K K-K K-H K-WH K K-K K-H K-WH K K-K K-H K-WH CPC 50 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
243
+ page_content='66 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
244
+ page_content='38 9.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
245
+ page_content='62 8.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
246
+ page_content='80 7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
247
+ page_content='83 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
248
+ page_content='77 11.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
249
+ page_content='46 10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
250
+ page_content='56 42.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
251
+ page_content='22 32.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
252
+ page_content='96 19.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
253
+ page_content='26 18.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
254
+ page_content='15 100 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
255
+ page_content='42 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
256
+ page_content='44 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
257
+ page_content='66 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
258
+ page_content='04 7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
259
+ page_content='07 7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
260
+ page_content='13 8.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
261
+ page_content='26 7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
262
+ page_content='49 52.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
263
+ page_content='96 45.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
264
+ page_content='19 20.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
265
+ page_content='37 15.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
266
+ page_content='56 200 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
267
+ page_content='53 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
268
+ page_content='27 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
269
+ page_content='61 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
270
+ page_content='68 7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
271
+ page_content='35 7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
272
+ page_content='10 7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
273
+ page_content='28 7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
274
+ page_content='13 63.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
275
+ page_content='70 49.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
276
+ page_content='63 26.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
277
+ page_content='30 22.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
278
+ page_content='59 HuBERT 50 7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
279
+ page_content='23 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
280
+ page_content='67 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
281
+ page_content='94 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
282
+ page_content='12 8.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
283
+ page_content='93 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
284
+ page_content='83 7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
285
+ page_content='43 7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
286
+ page_content='67 30.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
287
+ page_content='37 36.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
288
+ page_content='30 36.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
289
+ page_content='67 31.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
290
+ page_content='85 100 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
291
+ page_content='82 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
292
+ page_content='01 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
293
+ page_content='30 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
294
+ page_content='29 7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
295
+ page_content='47 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
296
+ page_content='50 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
297
+ page_content='54 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
298
+ page_content='32 48.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
299
+ page_content='15 48.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
300
+ page_content='89 48.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
301
+ page_content='15 46.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
302
+ page_content='67 200 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
303
+ page_content='79 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
304
+ page_content='24 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
305
+ page_content='18 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
306
+ page_content='05 7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
307
+ page_content='49 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
308
+ page_content='42 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
309
+ page_content='46 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
310
+ page_content='07 65.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
311
+ page_content='19 61.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
312
+ page_content='11 54.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
313
+ page_content='81 62.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
314
+ page_content='96 represent the same phoneme are usually close to each other.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
315
+ page_content=' Moreover, phonemes from the same family (affricates, frica- tives, Etc.’ ) tend also to be close to each other.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
316
+ page_content=' In addition, we can see that while for HuBERT and CPC, the space divide between the different phonemes families is generally equal, in the MFCC model, almost all the space uses for vowels.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
317
+ page_content=' No- tice, redundancies in the clusters can be also observed from such figures.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
318
+ page_content=' 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
319
+ page_content='4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
320
+ page_content=' Units Resynthesis In Table 2, we shows the results for the units resynthesis.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
321
+ page_content=' We can see that for some configurations, there is slightly dif- ference between the HiFi-GAN and the look-up scores- this strengthens our understanding that units express fixed sounds and are mainly correlative to phonemes.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
322
+ page_content=' We can see that the context of the units critically affects the results, while the unit’s length has a lower effect.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
323
+ page_content=' Finally, this understanding may help in understand units’ redundancies, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
324
+ page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
325
+ page_content=', the same phoneme in a different context will represent different units.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
326
+ page_content=' 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
327
+ page_content='5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
328
+ page_content=' Robust Clustering We evaluate the proposed approach along two different axes: (i) phonetic measure in the form of ABX within and across [22];' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
329
+ page_content=' (ii) speaker information in the form of probing similarly to [13].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
330
+ page_content=' Table 3 summarizes the results.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
331
+ page_content=' We can see that the proposed methods, although they are straightforward, improve both the ABX and the speaker results for most of the configurations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
332
+ page_content=' Furthermore, the best results for ABX-across were obtained using CR- this strengthens our claim regarding the unit’s redundancies.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
333
+ page_content=' 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
334
+ page_content=' CONCLUSION In this work, we analyzed the GSLM discrete unit from three different and complementary points of view: interpretation, visualization, and resynthesis.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
335
+ page_content=' The analysis showed a strong correlation between the units and the phonemes.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
336
+ page_content=' In addition, we found redundancies in the units, which the units’ context can explain.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
337
+ page_content=' Finally, we proposed methods that improve the unit’s clustering based on these understandings.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
338
+ page_content=' fricatives stops affricates nasals semivowels vowels others HuBERT CPC MFCC laaan awa ao aa eh aw ae s 回 h# sh Inr Ley ux ow layl h# h# 可国 w In ae lae sh] dcl PP s Th# HiyNiy Imm pcll iyng Itcl ep h# y a h# aol h# Aht h#6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
339
+ page_content=' REFERENCES [1] Shu-wen Yang et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
340
+ page_content=', “Superb: Speech processing universal performance benchmark,” arXiv preprint arXiv:2105.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
341
+ page_content='01051, 2021.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
342
+ page_content=' [2] Wei-Ning Hsu, Benjamin Bolte, Yao-Hung Hubert Tsai, Kushal Lakhotia, Ruslan Salakhutdinov, and Abdelrah- man Mohamed, “Hubert: Self-supervised speech rep- resentation learning by masked prediction of hidden units,” IEEE/ACM Transactions on Audio, Speech, and Language Processing, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
343
+ page_content=' 29, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
344
+ page_content=' 3451–3460, 2021.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
345
+ page_content=' [3] Alexei Baevski et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
346
+ page_content=', “wav2vec 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
347
+ page_content='0: A framework for self-supervised learning of speech representations,” Ad- vances in Neural Information Processing Systems, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
348
+ page_content=' 33, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
349
+ page_content=' 12449–12460, 2020.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
350
+ page_content=' [4] Morgane Riviere et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
351
+ page_content=', “Unsupervised pretraining trans- fers well across languages,” in ICASSP 2020-2020 IEEE International Conference on Acoustics, Speech and Sig- nal Processing (ICASSP).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
352
+ page_content=' IEEE, 2020, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
353
+ page_content=' 7414–7418.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
354
+ page_content=' [5] Yehoshua Dissen, Felix Kreuk, and Joseph Keshet, “Self-supervised speaker diarization,” arXiv preprint arXiv:2204.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
355
+ page_content='04166, 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
356
+ page_content=' [6] Felix Kreuk, Joseph Keshet, and Yossi Adi, “Self-supervised contrastive learning for unsu- pervised phoneme segmentation,” arXiv preprint arXiv:2007.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
357
+ page_content='13465, 2020.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
358
+ page_content=' [7] Kushal Lakhotia, Eugene Kharitonov, Wei-Ning Hsu, Yossi Adi, Adam Polyak, Benjamin Bolte, Tu-Anh Nguyen, Jade Copet, Alexei Baevski, Abdelrahman Mo- hamed, et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
359
+ page_content=', “On generative spoken language model- ing from raw audio,” Transactions of the Association for Computational Linguistics, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
360
+ page_content=' 9, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
361
+ page_content=' 1336–1354, 2021.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
362
+ page_content=' [8] Tu Anh Nguyen et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
363
+ page_content=', “Generative spoken dialogue language modeling,” arXiv preprint arXiv:2203.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
364
+ page_content='16502, 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
365
+ page_content=' [9] Zal´an Borsos, Rapha¨el Marinier, Damien Vincent, Eu- gene Kharitonov, Olivier Pietquin, Matt Sharifi, Olivier Teboul, David Grangier, Marco Tagliasacchi, and Neil Zeghidour, “Audiolm: a language modeling approach to audio generation,” arXiv preprint arXiv:2209.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
366
+ page_content='03143, 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
367
+ page_content=' [10] Adam Polyak et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
368
+ page_content=', “Speech resynthesis from discrete disentangled self-supervised representations,” arXiv preprint arXiv:2104.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
369
+ page_content='00355, 2021.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
370
+ page_content=' [11] Dan Wells, Hao Tang, and Korin Richmond, “Pho- netic analysis of self-supervised representations of en- glish speech,” Proc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
371
+ page_content=' Interspeech 2022, 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
372
+ page_content=' [12] Maureen de Seyssel, Marvin Lavechin, Yossi Adi, Em- manuel Dupoux, and Guillaume Wisniewski, “Prob- ing phoneme, language and speaker information in un- supervised speech representations,” arXiv preprint arXiv:2203.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
373
+ page_content='16193, 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
374
+ page_content=' [13] Eugene Kharitonov et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
375
+ page_content=', “textless-lib: a library for textless spoken language processing,” arXiv preprint arXiv:2202.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
376
+ page_content='07359, 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
377
+ page_content=' [14] Itai Gat, Felix Kreuk, Ann Lee, Jade Copet, Gabriel Synnaeve, Emmanuel Dupoux, and Yossi Adi, “On the robustness of self-supervised representations for spoken language modeling,” arXiv preprint arXiv:2209.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
378
+ page_content='15483, 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
379
+ page_content=' [15] Jonathan Shen et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
380
+ page_content=', “Natural tts synthesis by condition- ing wavenet on mel spectrogram predictions,” in 2018 IEEE international conference on acoustics, speech and signal processing (ICASSP).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
381
+ page_content=' IEEE, 2018, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
382
+ page_content=' 4779– 4783.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
383
+ page_content=' [16] Ryan Prenger et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
384
+ page_content=', “Waveglow: A flow-based gen- erative network for speech synthesis,” in ICASSP 2019-2019 IEEE International Conference on Acous- tics, Speech and Signal Processing (ICASSP).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
385
+ page_content=' IEEE, 2019, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
386
+ page_content=' 3617–3621.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
387
+ page_content=' [17] Andrew Rosenberg and Julia Hirschberg, “V-measure: A conditional entropy-based external cluster evaluation measure,” in Proceedings of the 2007 joint conference on empirical methods in natural language processing and computational natural language learning (EMNLP- CoNLL), 2007, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
388
+ page_content=' 410–420.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
389
+ page_content=' [18] John S Garofolo, “Timit acoustic phonetic continu- ous speech corpus,” Linguistic Data Consortium, 1993, 1993.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
390
+ page_content=' [19] Laurens van der Maaten and Geoffrey Hinton, “Visu- alizing data using t-sne,” Journal of Machine Learning Research, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
391
+ page_content=' 9, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
392
+ page_content=' 86, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
393
+ page_content=' 2579–2605, 2008.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
394
+ page_content=' [20] Franz Aurenhammer, “Voronoi diagrams—a survey of a fundamental geometric data structure,” ACM Comput- ing Surveys (CSUR), vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
395
+ page_content=' 23, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
396
+ page_content=' 3, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
397
+ page_content=' 345–405, 1991.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
398
+ page_content=' [21] Vassil Panayotov et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
399
+ page_content=', “Librispeech: an asr corpus based on public domain audio books,” in 2015 IEEE international conference on acoustics, speech and sig- nal processing (ICASSP).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
400
+ page_content=' IEEE, 2015, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
401
+ page_content=' 5206–5210.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
402
+ page_content=' [22] Jacob Kahn et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
403
+ page_content=', “Libri-light: A benchmark for asr with limited or no supervision,” in ICASSP 2020-2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
404
+ page_content=' IEEE, 2020, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
405
+ page_content=' 7669–7673.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AyT4oBgHgl3EQftPlh/content/2301.00591v1.pdf'}
O9FJT4oBgHgl3EQf1S22/content/2301.11651v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:bf4088e417ceb1a520ec91b83ffb22e2e3da831e4ec3c5223456011126ae3c3d
3
+ size 328299
O9FJT4oBgHgl3EQf1S22/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:65b303a5ec7b14257c3f96fd9bea72b255ac49a9094d08afec274a0b7e736ebd
3
+ size 86245
Q9E4T4oBgHgl3EQf_A6p/content/tmp_files/2301.05368v1.pdf.txt ADDED
@@ -0,0 +1,883 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Router for Wireless Power Packet Transmission:
2
+ Design and Application to Intersystem Power Management∗
3
+ Takahiro Mamiya, Shiu Mochiyama, and Takashi Hikihara
4
+ Department of Electrical Engineering, Kyoto University
5
+ Abstract
6
+ Power supply for small-scale battery-powered systems such as electric vehicles (EVs and mobile robots) is
7
+ being actively researched.
8
+ We are particularly interested in energy management, which considers the inter-
9
+ connection of such systems close to each other. This allows for overall redundancy to be maintained without
10
+ assuming excessive redundancy with individual power sources. Its implementation necessitates a high level of
11
+ integration between power management and information and communication technology. As one of these meth-
12
+ ods, this study investigates energy management based on power packetization. When the individual systems
13
+ to be connected have moving parts or are mobile, wireless power transmission is a promising method for power
14
+ sharing. However, power packetization has so far only been considered for wired transmission. In this paper, we
15
+ address the integration of power and information in wireless channels using power packetization. We propose a
16
+ power packet router circuit that can wirelessly transmit power over multiple channels selectively. Furthermore,
17
+ we demonstrate that the developed system can handle both wired intrasystem power management and wireless
18
+ intersystem power sharing in a unified manner.
19
+ 1
20
+ Introduction
21
+ Recent days have witnessed widespread use of electric power systems that are equipped with batteries and can thus
22
+ be driven without relying on an external and large power grid. Common examples include electric vehicles (EVs)
23
+ and mobile robots. While much effort has been dedicated to independent power management in such a system,
24
+ another research trend is the management of a network of such systems. We refer to a minimum element of a system
25
+ that can independently operate a local system throughout the paper. Constituting a networked system addresses
26
+ shared redundancy of power source capacity as a whole system, rather than as each individual system. That is,
27
+ when the power demand of one system temporarily increases, power can be supplied not only from the inside power
28
+ sources but also from the power sources of the other connected systems [1–3].
29
+ Because local systems are spatially dispersed and can have a time-dependent supply/load profile, managing such
30
+ a network necessitates advanced sensing, computation, and communication technologies [4–6]. Several proposals for
31
+ power system management with ICTs support have been made [2,7,8]. Among them, a power packet dispatching
32
+ system is an encouraging proposal for the purpose. The system packetizes supplied power; that is, power is divided
33
+ into time segments, each of which is associated with an information tag via a voltage waveform [9, 10]. Power
34
+ packetization ensures that information exchange and power transmission occur concurrently in the physical layer,
35
+ allowing for power management in a network without causing an imbalance in information and physical quantity
36
+ processing. In the previous study, the authors’ group developed a circuit called a power packet router [9]. We
37
+ validated the concept of power packetization and routing with hardware configuration including the routers.
38
+ One advantage of power packetization is the ability to easily attach/detach local systems from a larger network.
39
+ The use of time-division multiplexing and physical tag attachment ensures that each packetized power transfer is
40
+ independent. In other words, power transfers between different pairs do not get mixed up even on the same power
41
+ line but can be differentiated physically. This leads to realizing what could be called a plug-and-play from the
42
+ perspective of power supply.
43
+ One difficulty here is that the power packet dispatching system has so far been developed using a wired connection
44
+ for power transfer. Wireless power transfer (WPT) is a revolutionary technology for supplying power to mobile
45
+ systems [11, 12]. It is beneficial for improved maneuverability of each local system to introduce the WPT to the
46
+ ∗This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this
47
+ version may no longer be accessible.
48
+ 1
49
+ arXiv:2301.05368v1 [eess.SY] 13 Jan 2023
50
+
51
+ Packet
52
+ network
53
+ Packet
54
+ network
55
+ WPT
56
+ router
57
+ Load
58
+ Storage
59
+ Router
60
+ Packet
61
+ network
62
+ Wired connection
63
+ Wireless connection
64
+ Router
65
+ Router
66
+ Router
67
+ Router
68
+ Router
69
+ WPT
70
+ router
71
+ WPT
72
+ router
73
+ Power
74
+ source
75
+ Storage
76
+ Storage
77
+ Load
78
+ Load
79
+ Load
80
+ Load
81
+ Local system
82
+ Local
83
+ system
84
+ Local system
85
+ Connected system
86
+ Power packet
87
+ Figure 1: Surplus power supply via wireless power transfer between power packet networks.
88
+ power packet dispatching system for connections at the boundaries of the local systems. However, as discussed in
89
+ Section 3, simply connecting a WPT circuit to a power packet system does not work in conjunction with packet-
90
+ based power management in local systems. This research seeks to achieve on-demand power supply concentration
91
+ and dispersion in the connected network of local systems while ensuring easy attachment/detachment between
92
+ systems via a wireless connection.
93
+ Here, we investigate the following two points as fundamental studies to realize the wireless connection of mul-
94
+ tiple local systems powered by power packets. First, we suggest a dedicated router design in both software and
95
+ hardware configurations to ensure physical packetization with a wireless channel and collaboration with wired power
96
+ management. Then, in a connected system comprised of three local systems with the developed router installed,
97
+ we assert the selective transmission of power packets to only the local system designated by the tag. Second, we
98
+ demonstrate a power-sharing strategy for increasing power capacity redundancy via a wireless connection. With
99
+ wired and wireless connections, the parallel operation of intra- and intersystem power management is demonstrated.
100
+ Among a network of two local systems, each of which supplies a certain demand of its own load via wired connection,
101
+ surplus power at one system is transferred to another.
102
+ Many proposals for the duplex of multiple channels in WPT have been made, including multiplexing in time,
103
+ frequency, and spatial domain [13–15].
104
+ Furthermore, several reports have addressed the simultaneous wireless
105
+ transmission of power and information [4, 16–18]. These proposals essentially assume that a power transmission
106
+ channel has already been established and that information is being transmitted concurrently, or vice versa. Our
107
+ proposal, on the other hand, attempts to go beyond the simple parallel transmission by integrating information that
108
+ manipulates the spatiotemporal distribution of power with power transmission itself at the physical layer. This, in
109
+ theory, eliminates the disparity between physical quantity and information, allowing us to achieve both wired and
110
+ wireless power transmission by cooperating for smart power management.
111
+ 2
112
+ Outline of power packet dispatching system
113
+ The basic configuration and operation of power packet dispatching systems are described in this section.
114
+ 2.1
115
+ Constitution of power packet
116
+ As depicted in Fig. 1, a power packet is a unit of power management in the system. A power packet comprises
117
+ pulse-shaped electric power called a payload and an information tag, a header, and a footer, which are attached
118
+ just before and after it. The information tag is a logic bitstream realized by a voltage waveform without current.
119
+ The tag can include any information, like the origin, destination, and length of the power packet.
120
+ The physical tag attachment enables power packet transmission to be time-division multiplexed. Power from
121
+ different sources and destinations is transmitted on the same channel while remaining distinct from one another.
122
+ 2
123
+
124
+ owel Packc
125
+ voltage
126
+ 01000011
127
+ .1100101
128
+ time
129
+ header
130
+ payload
131
+ : footerrouter input
132
+ router output
133
+ isolator
134
+ controller
135
+ gate driver
136
+ gate driver
137
+ storage1
138
+ storage2
139
+ demand signal
140
+ clock
141
+ input1
142
+ input2
143
+ output1
144
+ output2
145
+ power
146
+ signal
147
+ Figure 2: Circuit example of 2 input 2 output router [9].
148
+ This feature sets the power packet dispatching system apart from conventional systems that treat power as a
149
+ continuous flow.
150
+ 2.2
151
+ Network configuration of power packet dispatching system
152
+ Each local system of Fig. 1 denotes a local system configuration example. Routers connect power sources, storage,
153
+ and loads to the network in this system.
154
+ A power packet router is installed as a node that connects multiple
155
+ transmission lines. The router forwards power packets by selecting a transmission line according to the packet’s tag
156
+ information [10].
157
+ A power packet is routed from a source to a specific destination via several routers. The path to the load is not
158
+ required to be unique and can be changed dynamically depending on the situation. This feature facilitates flexible
159
+ power management in conjunction with a dynamic supply relationship. In the following section, we develop a router
160
+ that can perform this function even with a wireless connection.
161
+ 2.3
162
+ Routing method for power packets
163
+ Here we characterize the circuit configuration of a router and the principle of its routing operation [9, 19, 20].
164
+ Figure 2 depicts the circuit configuration of a previously proposed, wire-connected router [21]. The circuit consists
165
+ of two sections: an input section that receives power packets from the transmission network and an output section
166
+ that forwards power packets to the transmission network. The operation of the input part is initialized when a
167
+ power packet reaches the router. The input section includes a signal reading circuit for reading the logic signals
168
+ of information tags. When the router recognizes that the incoming power packet is addressed to it, it turns on
169
+ the corresponding semiconductor switches to receive the payload power. For circuit protection, the signal reading
170
+ circuit electrically separates its signal output from the power supply lines using a device such as a photocoupler.
171
+ The incoming power packet is temporarily stored before being forwarded to the next hop. The output part generates
172
+ power packets from the temporal storage in response to the demand. In some cases, the circuit can be reduced to
173
+ just the input or output section. When installed just next to the source, for example, the output section with the
174
+ storage replaced by a power source is sufficient to produce a generated packet. Similarly, a circuit just before a load
175
+ can only be the input part, with the storage replaced by a load.
176
+ To read the logic signals of power packets, clocks corresponding to the one-bit width of a power packet must
177
+ be synchronized among adjacent routers. This can be accomplished by installing an additional wire for a common
178
+ clock input, or by adding another signal to the header for autonomous clock synchronization [22]. In this paper, we
179
+ employ a simple autonomous clock synchronization scheme, in which the clock period is fixed in advance, the first
180
+ three bits of the header are set to 010, and the phase is shifted if the 010 is not detected within a certain period.
181
+ The information tag consists of bits 1–3, which implies 010 for clock synchronization, and bits 4–7, which imply
182
+ the address of the output destination. Bits 8 – 100 correspond to the payload. For simplicity, the packet length is
183
+ fixed at 100 bits and this setting is shared by all routers. In this way, we exclude the footer.
184
+ 3
185
+
186
+ 3
187
+ Router design for wireless transmission of power packets
188
+ In this section, we propose a router configuration for wireless transmission of power packets. We employ magnetic
189
+ resonant coupling for the wireless transmission.
190
+ This method is capable of transmitting large power over long
191
+ distances with high-efficiency [11]. This circuit is powered by AC, whereas the power packet dispatching system is
192
+ powered by DC. We must convert the current to incorporate WPT into power packet routing. Figure 3 depicts a
193
+ conceptual diagram of the voltage and magnetic flux density in the wireless power packet transmission. Using a
194
+ magnetic resonant coupling circuit that includes an inverter and a rectifier, DC is converted to AC and then back
195
+ to DC after wireless transmission. The following section describes the router design.
196
+ It should be noted that the inclusion of wireless transmission in the power packet dispatching system was first
197
+ proposed in the authors’ previous report [23].
198
+ In the report, the wireless transmission was not packetized but
199
+ introduced as a one-to-one transmission channel without any tag attachment. In this paper, we propose a novel
200
+ router configuration that bring the functions of physical tag attachment and its reading to the wireless power
201
+ transfer. These functions not only realize the physical packetization of wireless power transmission but also extends
202
+ its use to packet-based power management as introduced in Section 5.
203
+ 3.1
204
+ Wireless transmitter of the power packet
205
+ Figure 4 depicts a router circuit for wireless power packet output. The configuration includes an inverter circuit
206
+ connected to the router’s output section, as described in Section 2.3. For DC/AC conversion, a class-E inverter [24]
207
+ is used.
208
+ The output circuit wirelessly transmits both the header signal and the payload power.
209
+ In this paper, the
210
+ inverter’s input is presented as a form of packetized power. The current flowing through the coil and the magnetic
211
+ flux density induced in the coil is thus modulated in an amplitude-shift-keying (ASK) manner according to the shape
212
+ of the power packet, as depicted in the middle of Fig. 3. It should be noted here that the header signal transmission
213
+ must minimize power consumption while the payload transmission must maximize the amount of power transferred.
214
+ The two requirements cannot be met solely through the transmitter’s operation, but rather through the design of
215
+ the receiver side. This point will be covered in greater detail in the following section.
216
+ 3.2
217
+ Wireless receiver of the power packet
218
+ To receive a wirelessly transmitted power packet, demodulation of the ASK-modulated header signal and highly
219
+ efficient AC/DC conversion of the payload are necessitated.
220
+ The proposed circuit shown in Fig. 5 meets both
221
+ requirements by dividing the demodulator into two circuits. The signal demodulation circuit reads the header,
222
+ and a class-E rectifier receives the payload. The detailed procedure is provided below. Initially, the switch Sd
223
+ connected to the signal demodulation circuit is turned on, while the SR connected to the rectifier circuit is turned
224
+ off. For signal demodulation, the envelope of the voltage across the secondary circuit’s resonant capacitor is passed
225
+ through an RC low-pass filter. The router’s controller then samples it at a predetermined clock cycle to convert
226
+ it into a logical sequence. The controller activates the switches that connect the coil to the rectifier circuit when
227
+ it determines from the tag that the power packet is addressed to itself. This causes a class-E rectifier to convert
228
+ the wirelessly transmitted payload into DC output. When the power packet is directed at another router, the
229
+ router’s controller disconnects both circuits and opens the coil. The detachment is used to avoid the influence of the
230
+ unintended connection and the resulting impedance change, which may degrade power transmission at the addressed
231
+ connection. At the end of the previous power packet, the controller turns on the switch to the demodulation circuit
232
+ to prepare for the next power packet. The end of a power packet is detected by simply counting the length of the
233
+ payload in 100-bit intervals.
234
+ Of course, simply connecting the signal demodulation circuit and the Class-E rectifier in parallel allows you to
235
+ read the header and receive the payload. However, when receiving the header, the current passes through the Class-
236
+ Encode
237
+ Power packet (DC)
238
+ ASK modulated AC
239
+ Packet's header
240
+ Packet's payload (DC pulse)
241
+ Decode
242
+ on Wire
243
+ on Wire
244
+ Wireless
245
+ Figure 3: A waveform concept during wireless transmission of power packets.
246
+ 4
247
+
248
+ C2
249
+ r1
250
+ L1
251
+ Lm
252
+ Lf1
253
+ C1
254
+ S1
255
+ Controller
256
+ Gate driver
257
+ Source
258
+ Figure 4: Wireless transmitter of the power packet.
259
+ C3
260
+ r2
261
+ L2
262
+ Lm
263
+ D1
264
+ Lf2
265
+ C4
266
+ Cf
267
+ Rectifier
268
+ Rd
269
+ Dd
270
+ Cd2
271
+ Demodulator
272
+ Isolator
273
+ Controller
274
+ Gate driver
275
+ Cd1
276
+ Output
277
+ Sd
278
+ SR
279
+ Figure 5: Wireless receiver of the power packet.
280
+ E rectifier, and when receiving the payload, it passes through the demodulation circuit. Such a current contributes
281
+ nothing to the receiving operation but results in power loss. Because this type of loss is much greater than the loss
282
+ caused by the switching of the two demodulation circuits, the proposed scheme can greatly reduce the loss.
283
+ The frequency of the carrier wave used for magnetic resonant coupling is 1 MHz. The wireless router’s constants
284
+ are determined as shown in Table 1. The design is conducted in the following manner, regarding [24]. The coil has
285
+ a diameter of 100 mm, a wire diameter of 1 mm, several turns of 10, and a thickness of 12 mm. The transmission
286
+ circuit’s rise time was measured to be 25 µs. The rise time is defined as the time required for the output voltage to
287
+ attain 90 % of its steady-state value. The steady-state value was obtained under the test condition where the load
288
+ was 47 Ω resistor and the vertical distance between the coils was 50 mm. Based on this, we determined that the bit
289
+ width of the power packet should be 100 µs, which is sufficiently larger than the rise time. That is, the modulation
290
+ frequency is 10 kHz. The demodulation circuit is designed to demodulate signals with a cutoff frequency of about
291
+ 100 kHz.
292
+ Table 1: Design values of circuit constants.
293
+ Primary side
294
+ Secondary side
295
+ Rectifier
296
+ Demodulator
297
+ f
298
+ 1 MHz
299
+ L2
300
+ 19.2 µH
301
+ Cd1
302
+ 1.0 µF
303
+ Lf1
304
+ 100 µF
305
+ r2
306
+ 0.88 Ω
307
+ Cd2
308
+ 820 pF
309
+ C1
310
+ 3.3 nF
311
+ C3
312
+ 1.56 nF
313
+ Rd
314
+ 12 kΩ
315
+ C2
316
+ 1.44 nF
317
+ C4
318
+ 1.68 nF
319
+ L1
320
+ 19.3 µH
321
+ Lf2
322
+ 100 µH
323
+ r1
324
+ 0.88 Ω
325
+ Cf
326
+ 0.47 µF
327
+ Lm
328
+ 1.75 µH
329
+ 4
330
+ Verification of selective reception of wirelessly transmitted power
331
+ packets
332
+ In this study, we consider one-to-many or many-to-many wireless power sharing among several local systems placed
333
+ close to each other. The packetization and time-division multiplexing methods enable simultaneous supplies between
334
+ different pairs of a transmitter and a receiver while completely distinguishing them. Here, we experiment with three
335
+ 5
336
+
337
+ Local system 0
338
+ Wireless
339
+ packet
340
+ encoder
341
+ V
342
+ Local system 1
343
+ Local system 2
344
+ R1
345
+ Wireless
346
+ packet
347
+ decoder
348
+ Coil 0
349
+ Coil 1
350
+ Coil 2
351
+ 50mm
352
+ 70mm
353
+ 30mm
354
+ R2
355
+ Wireless
356
+ packet
357
+ decoder
358
+ Figure 6: Network configuration with 3 local systems for verification of selectivity of wirelessly transmitted power
359
+ packet.
360
+ Figure 7: Verification of router operation mode for wirelessly transmitted power packets.
361
+ local systems, one transmitting and two receiving nodes. It is demonstrated that the two receivers can selectively
362
+ accept or reject power packets based on the attached information tag. The number of local systems and their
363
+ connection relationship can of course be easily expanded and modified due to packetization.
364
+ 4.1
365
+ Experimental setup for selective reception
366
+ The entire network configuration is depicted in Fig. 6. Local system 0 alternately sends power packets to local
367
+ systems 1 and 2, and systems 1 and 2 receive only those that match their addresses. Power packet header addresses
368
+ are set to 0001 and 0010 for systems 1 and 2, respectively. Local system 0 consists of a circuit from Fig. 4 and a
369
+ DC power supply of 12 V. Local systems 1 and 2 comprise a circuit of Fig. 4 with a load resistor of 47 Ω connected
370
+ to the output port.
371
+ Although the transmitting and receiving roles of the local systems are fixed for simplicity, it is possible to
372
+ transmit power packets bidirectionally by modifying the circuit configuration [25]. Therefore, this assumption will
373
+ not lose generality in power sharing.
374
+ To ensure that the router’s operation is not affected by the distance between the coils, the coil positions are set
375
+ as shown in Fig. 6. The coils of local systems 1 and 2 are placed at the same vertical distance 50 mm as the coil of
376
+ local system 0, but the horizontal distance is 30 mm and 70 mm, respectively.
377
+ 4.2
378
+ Receiving mode confirmation
379
+ First, we examine the switching behavior between the header signal demodulator and the payload rectifier circuit,
380
+ as designed in Section 3. Figure 7 depicts an internal signal of the router of local system 1 that represents the
381
+ receiver’s operation mode. The router was in the header mode every 10 ms, which corresponded to the transmission
382
+ cycle of the powder packets. Immediately after the header mode, the router switched to the payload mode every two
383
+ power packet deliveries. During the payload mode, power was supplied to the designated load. This suggests that
384
+ the controller received the header while connected to the demodulation circuit and then switched to the rectifier
385
+ 6
386
+
387
+ payload mode
388
+ headermode
389
+ 5.0
390
+ 2.5
391
+ 0.0
392
+ -10
393
+ 0
394
+ 10
395
+ 20
396
+ 30
397
+ time/ msFigure 8: Voltages at two loads in local systems 1 and 2.
398
+ Router m2
399
+ Router l2
400
+ Router rx
401
+ Router l1
402
+ Router tx
403
+ Router m1
404
+ part
405
+ � : Local system 1
406
+ part � : Local system 2
407
+ part � : Wireless power sharing
408
+ V1
409
+ Rl1
410
+ V2
411
+ Rl2
412
+ VCtx
413
+ Vm1
414
+ VCl1
415
+ VCrx
416
+ Vrx
417
+ VCl2
418
+ Vm2
419
+ VRl1
420
+ VRl2
421
+ Wireless
422
+ packet
423
+ encoder
424
+ Wireless
425
+ packet
426
+ reader
427
+ Wireless
428
+ packet
429
+ decoder
430
+ CNTL rx1
431
+ Srx1
432
+ CNTL m1
433
+ Sm1
434
+ CNTL m2
435
+ Sm2
436
+ CNTL tx2
437
+ Stx2
438
+ CNTL rx2
439
+ Srx2
440
+ CNTL l1
441
+ Sl1
442
+ CNTL l2
443
+ Sl2
444
+ CNTL tx1
445
+ Stx1
446
+ Ctx
447
+ Crx
448
+ Cl1
449
+ Cl2
450
+ Figure 9: Configuration of the network with 2 local systems connected wirelessly.
451
+ circuit in payload mode after recognizing the address. This result confirms that the proposed router can correctly
452
+ route power packets on the wireless channel.
453
+ 4.3
454
+ Confirmation of selective reception function
455
+ Second, we confirm that, according to the tag information, the local systems received time-division multiplexed
456
+ power packets. The load voltages of the routers of local systems 1 and 2 are depicted in Fig. 8. It can be seen that
457
+ local systems 1 and 2 received power alternately, indicating that they selectively accepted or denied receiving power
458
+ packets based on the attached destination address signal. Here, local system 1’s supply voltage was higher than
459
+ that of local system 2. This is because the output is proportional to the distance between the coils. This means
460
+ that, regardless of whether the output value is larger or smaller, the router’s selective reception is unaffected by the
461
+ difference in distance between the coils.
462
+ 5
463
+ Confirmation of power-sharing in the wirelessly connected systems
464
+ Next, in wirelessly connected local systems, we validate power management based on power packetization. We
465
+ consider two local systems where the local power supply is primarily managed via a wired connection. Every local
466
+ system consists of an internal power source, a capacitor, a wireless transmission circuit, and a resistive load. We
467
+ set a wirelessly connected networking system comprising two such local systems, as shown in Fig. 9. While each
468
+ local system supplies its source to its load, wireless power packet transmission compensates for excess or deficient
469
+ power. Each system’s goal is to keep the voltage supplied to the load above a certain level.
470
+ The proposed scheme deals with a connected system whose elements are subject to dynamic changes, such as
471
+ variable distance between local systems and time-dependent connection/disconnection of local systems. Dealing
472
+ with such dynamic changes altogether in a centralized controller is not ideal. Distributed control of power packet
473
+ transmission, however, is an effective method of accommodating such unpredictability. In this paper, we use a
474
+ distributed control scheme of packet-based power management [26], in which power packet transmission is managed
475
+ 7
476
+
477
+ Load voltage/V
478
+ 10
479
+ local system 1
480
+ local system 2
481
+ 0
482
+ -20
483
+ -10
484
+ 0
485
+ 10
486
+ 20
487
+ time/msonly between adjacent routers. The following section describes the operation flow of the connected systems.
488
+ 5.1
489
+ Operation flow in connected systems
490
+ Capacitors are installed in the connected systems to generate and output power packets to the load. Power packets
491
+ are sent so that the voltages of these capacitors exceed a certain threshold.
492
+ The demand signal to the router for on-demand packet transmission can be given by information tags in power
493
+ packets or by using another channel such as radio signals [26]. In this paper, we use an external wire to transmit
494
+ demand signals for simplicity We designed an input high to the controller of the next router when the storage
495
+ voltage falls below the threshold.
496
+ We divide the configuration of Fig. 9 into the following three parts that are managed independently.
497
+ α Transmission from router m1 to router tx and router l1
498
+ β Transmission from router tx to router rx
499
+ γ Transmission from router rx and router m2 to router l2
500
+ The three parts’ basic operation principles are described below.
501
+ In part α, when the voltages across Ctx and Cl1 fall below the threshold, demand signals are transmitted to the
502
+ router m1 respectively. Router m1 generates and sends power packets to the destination from which the demand
503
+ signal is received. In the event of overlapping demand signals, priority is given to router l1 to keep the load voltage
504
+ stable.
505
+ In part β, router rx sends a demand signal to router tx when the voltage across Crx falls below the threshold.
506
+ Router tx generates and sends power packets to router rx based on the demand signal.
507
+ In part γ, when the voltage across Cl2 drops below the threshold, a demand signal is initially sent to router rx.
508
+ If a power packet is not delivered from router rx to router l2 within a certain amount of time, the demand signal
509
+ is sent to router m2, which generates and sends a power packet to router l2.
510
+ Besides the three principles, two constraints are imposed on the operation of routers tx and rx. First, they
511
+ do not output power packets if the voltages across its capacitor, Ctx or Crx, are lower than a certain value. To
512
+ transmit power packets, there must be an adequate potential difference between the source and the destination.
513
+ This constraint guarantees the possible difference between the source and destination capacitors and guarantees
514
+ the reliable transmission of power packets. Second, the routers are not enabled to input and output power packets
515
+ simultaneously. When both switches are switched on simultaneously, the circuits before and after the router are
516
+ linked parallel. In this case, the output impedance measured from the power supply (capacitor) located before the
517
+ router is lower than when only the input switch is turned on. This can result in an overcurrent at the source and
518
+ a rapid drop in capacitor voltage. The second constraint is levied to avoid this situation. This configuration may
519
+ prevent the router rx from emitting power on occasion. Even if this occurs, router m2 can supply power packets to
520
+ keep router l2’s voltage stable.
521
+ 5.2
522
+ Verification of connected systems operation
523
+ To test the operation of the connected systems, we set the supply voltages V1 =15 V and V2 =7 V. To create
524
+ a voltage gradient, the threshold voltages of capacitors Cl1, Ctx, Crx and Cl2 are set as 10 V, 9 V, 7 V and 5 V,
525
+ respectively. The parameters linked to wireless power transmission are set as depicted in Table 1
526
+ It is worth noting that the routers’ wired channel switch units have been replaced with unidirectional ones. As
527
+ previously discussed, the symmetry of the circuit allows us to restrict the flow of power packets to one direction
528
+ without sacrificing generality. The circuit generates high by activating switch Sout−s, and low by activating switch
529
+ Sout−p. The diode prevents reverse current from flowing through the body diode of Sout−s.
530
+ 5.2.1
531
+ Confirmation of autonomous maintenance of capacitor voltage
532
+ We demonstrate the transmission of power packets and the modifications in voltages of each capacitor installed in
533
+ part α–γ.
534
+ Figure 10 depicts the voltages Vl1 and Vtx of the capacitors Cl1 and Ctx in part α and the gate signal of
535
+ the switches Sl1 and Stx1 that controlled the route of the power packets. It is observed that Vl1 and Vtx were
536
+ sustained above the threshold voltages. The voltages Vl1 and Vtx elevated when switches Sl1 and Stx1 were driven.
537
+ This demonstrates that capacitors Cl1 and Ctx effectively received power packets and were charged. Furthermore,
538
+ 8
539
+
540
+ Figure 10: State of switches and voltage of capacitors in part α.
541
+ Figure 11: State of switches and voltage of capacitors in part β.
542
+ switching operation of Sl1 and Stx1 did not overlap at any time.
543
+ This result correlates to the setup that the
544
+ transmission of power packets to Cl1 is prioritized (see Section 5.1 for the details).
545
+ Figure 11 depicts the voltages Vtx and Vrx of the capacitors Ctx and Crx in part β and the gate signal of the
546
+ switch Srx that controlled the power packet reception of the router rx. Comparing the top and bottom graphs shows
547
+ that Vtx declined and Vrx elevated while Srx was on. This implies that power packets were wirelessly transmitted
548
+ successfully from router tx to router rx. It can also be validated that Srx turned off when Vtx attained the threshold
549
+ voltage. This implies that the system satisfied the constraints defined in Section 5.1, which hampers the output of
550
+ power packets under the threshold voltage.
551
+ Figure 12 depicts the voltages Vrx and Vl2 of the capacitors Crx and Cl2 in part γ and voltage waveforms of power
552
+ packets outputted from routers rx and m2. When Vl2 dropped below the threshold voltage, router rx transferred
553
+ power packets to router m2 so that Vl2 was kept above the threshold. Now let us concentrate on the operation
554
+ around t =25 ms when Vrx attains the threshold voltage. Router rx stopped outputting the power packets, and
555
+ simultaneously, router m2 started sending power packets. These findings suggest that the selective routing protocol
556
+ specified in Section 5.1 worked; the load sent the demand signal to the router rx at first, and if no packet was
557
+ transmitted, then sent to the router m2.
558
+ In Fig. 12, there exists a possible difference between the voltage of the power packet and Vl2. This was induced
559
+ by the forward voltage drop across the diode installed to prevent backflow current. This loss can be repressed by
560
+ using a switch instead of a diode. Thus, there is no impact on the verification of the principle.
561
+ Figure 13 depicts the gate signal of Stx1, output current from Ctx, input current to Crx, and the output voltage
562
+ waveforms of router rx.
563
+ When Ctx was outputting current, Crx was receiving current.
564
+ This implies that the
565
+ transmitted power packet was received without failure. Since router tx did not output power packets when Stx1 was
566
+ 9
567
+
568
+ 15
569
+ 10
570
+ 5
571
+ Vcrx
572
+ V2
573
+ 0
574
+ 100
575
+ 50
576
+ 0
577
+ 50
578
+ 100
579
+ 6
580
+ Gate signal / V
581
+ Sr1
582
+ Stx1
583
+ 2
584
+ 0
585
+ -100
586
+ 50
587
+ 0
588
+ 50
589
+ 100
590
+ Time / msOutput voltage/V
591
+ 15
592
+ 10
593
+ 5
594
+ Vctx
595
+ Vcrx
596
+ 100
597
+ 50
598
+ 0
599
+ 50
600
+ 100
601
+ 6
602
+ signal /V
603
+ Srx1
604
+ Gate
605
+ 2
606
+ 0
607
+ 100
608
+ 50
609
+ 0
610
+ 50
611
+ 100
612
+ Time/msFigure 12: Power packets and voltage of capacitors in part γ.
613
+ Figure 13: Input / output current and voltage of Ctx and Crx.
614
+ on, Stx1 and Stx2 were driven solely. Similarly, Srx1 and Srx2 were driven solely. From the above findings, it can
615
+ be deduced that the connected system achieves the load voltage maintenance with wireless power supply between
616
+ local systems 1 and 2 by following the control procedure defined in Section 5.1.
617
+ 5.2.2
618
+ Association between the percentage of power supply and the utilized power source
619
+ The percentage of power transferred on the wireless channel depends on the distance between the transceiver/receiver
620
+ coils. Hence, in the previous experiment’s setup, increasing the coil gap reduced the power supply capability from
621
+ the local system 1 to 2. The proposed control scheme of the routers can accommodate such a gap change by choosing
622
+ an appropriate supply channel. To test this operation, we compare the amount of wireless power transmission and
623
+ the power source selection in the local system 2 at various distances between the coils. We set three cases with
624
+ different distances: (i) 50 mm (the same as in the previous experiment), (ii) 100 mm, and (iii) > 250 mm. The setup
625
+ in case iii is supposed to be large enough to prevent wireless transmission.
626
+ Figures 14 and 15 depict the voltage Vrx and Vl2 and the power packets output by routers rx and m2 in cases ii
627
+ and iii. Please refer to Fig. 12 for the result in case i. The larger the distance between the coils, the less frequently
628
+ the router rx outputted power packets and the lower its average voltage got. On the other hand, Vl2 maintained
629
+ above the threshold in all cases.
630
+ Table 2 demonstrates the average of the input/output power of router rx and the output power of router m2
631
+ 10
632
+
633
+ Output voltage/V
634
+ 15
635
+ Vcrx
636
+ Vi2
637
+ 10
638
+ 5
639
+ 0
640
+ -100
641
+ 50
642
+ 0
643
+ 50
644
+ 100
645
+ Output voltage/V
646
+ 15
647
+ Vrx
648
+ Vm2
649
+ 10
650
+ 5
651
+ 0
652
+ -100
653
+ 50
654
+ 0
655
+ 50
656
+ 100
657
+ Time / ms5
658
+ 1.25
659
+ Gate signal of Stx1
660
+ Output current from Ctx
661
+ 1.00
662
+ signal
663
+ Current / A
664
+ 3
665
+ 0.75
666
+ 2
667
+ 0.50
668
+ Gate
669
+ 1
670
+ 0.25
671
+ 0
672
+ 0.00
673
+ 100
674
+ -50
675
+ 0
676
+ 50
677
+ 100
678
+ 12.5
679
+ 1.25
680
+ Vcrx
681
+ 10.0
682
+ 1.00
683
+ A
684
+ 7.5
685
+ 0.75
686
+ Current /
687
+ 5.0
688
+ 0.50
689
+ 2.5
690
+ 0.25
691
+ 0.0
692
+ 0.00
693
+ -100
694
+ -50
695
+ 0
696
+ 50
697
+ 100
698
+ Time / msFigure 14: Power packets and voltage of capacitors in part γ of case (ii) : gap 100 mm.
699
+ Figure 15: Power packets and voltage of capacitors in part γ of case (ii) : gap 250 mm.
700
+ during the measured time 250 ms for different distances. The input/output power of router rx fell and the output
701
+ power of router m2 rose as the distance became larger. Meanwhile, the total output power of router rx and router
702
+ m2 had a slight change. This finding implies that the output power of router m2 compensates for the fall in the
703
+ output power of router rx.
704
+ From the above, it is asserted that the load voltage can be sustained autonomously by the proposed distributed
705
+ control scheme. Even when the amount of wireless transmission falls, the local system compensated for it with a
706
+ wired supply.
707
+ 6
708
+ Conclusion
709
+ In this paper, we developed a platform for wireless power packet transmission for power management among
710
+ numerous local systems.
711
+ First, we proposed a novel power packet router configuration capable of wireless transmission. The ASK modu-
712
+ lating circuit is installed on the router’s output side for both information and power transmission, with the power
713
+ packet serving as a power source. The input side includes a demodulation circuit for both information and power
714
+ receipt. The circuit shifts between a signal demodulation circuit and a power rectifier circuit to read the header
715
+ and receive the payload power, respectively. Not only does the switching configuration separate the incoming signal
716
+ and power, but it also reduces unnecessary power consumption during the receiving operation.
717
+ Using this router, we then verified the wireless power packet routing following the information tag. Physical tag
718
+ attachment and wireless power packet time-division multiplexing allowed receiving routers to distinguish the power
719
+ packet based on its destination address. The result shows that the proposed configuration allows for the selective
720
+ 11
721
+
722
+ outputvoltage/V
723
+ 15
724
+ Vrx
725
+ Vi2
726
+ 10
727
+ 5
728
+ 0
729
+ 100
730
+ 50
731
+ 0
732
+ 50
733
+ 100
734
+ output voltage/V
735
+ 15
736
+ Power packet from Crx
737
+ Power packet from V2
738
+ 10
739
+ 0
740
+ -100
741
+ 50
742
+ 0
743
+ 50
744
+ 100
745
+ time / msoutputvoltage/V
746
+ .5
747
+ Vrx
748
+ Vi2
749
+ 10
750
+ 100
751
+ 50
752
+ 0
753
+ 50
754
+ 100
755
+ outputvoltage/V
756
+ 15
757
+ Power packet from Crx
758
+ Powerpacketfrom V2
759
+ 5
760
+ -100
761
+ 50
762
+ 0
763
+ 50
764
+ 100
765
+ time / msTable 2: Input/output power of the routers in local system 2 at each gap.
766
+ Case
767
+ Gap
768
+ Router rx
769
+ Router rx
770
+ Router m2
771
+ Total
772
+ input
773
+ output
774
+ output
775
+ output
776
+ i
777
+ 50 mm
778
+ 0.50 W
779
+ 0.46 W
780
+ 0.73 W
781
+ 1.19 W
782
+ ii
783
+ 100 mm
784
+ 0.20 W
785
+ 0.17 W
786
+ 0.94 W
787
+ 1.11 W
788
+ iii
789
+ > 250 mm
790
+ 0.00 W
791
+ 0.00 W
792
+ 1.13 W
793
+ 1.13 W
794
+ transmission of wireless power packets between multiple nearby local systems. This prevents interference with the
795
+ irrelevant power supply.
796
+ Next, we considered flexible coordination of inter- and intrasystem power management. The former was ac-
797
+ complished through the wireless transmission of power packets, while the latter was accomplished through a wired
798
+ supply. For this purpose, we created a distributed control scheme for the routers. A local system transmitted power
799
+ packets wirelessly to another when it had enough power while keeping the voltage of its load as a top priority. The
800
+ experiments revealed that the two types of operation were coordinated successfully. Furthermore, the proposed
801
+ distributed control scheme chose an appropriate supply channel based on the power interaction availability between
802
+ the local systems. We validated this operation by altering the gap between the coils of the two local systems,
803
+ demonstrating that the inter- or intrasystem power management was successfully chosen to satisfy the local loads’
804
+ demand.
805
+ From the above verifications, we deduce that wireless power packet transmission can improve power management
806
+ capability in a connected power packet dispatching system by selectively cooperating wired and wireless power packet
807
+ transmission.
808
+ Acknowledgments
809
+ This work was partially supported by JSPS KAKENHI 20H02151, JST-OPERA Program no. JPMJOP1841, and
810
+ SIP Cross Ministerial Strategic Innovation Promotion Program no.18088028.
811
+ References
812
+ [1] E. Dialynas and N. D. Hatziargyriou, “Impact of microgrids on service quality,” 2007 IEEE Power Engineering
813
+ Society General Meeting, PES, pp. 1–5, 2007.
814
+ [2] M. M. He, E. M. Reutzel, X. Jiang, R. H. Katz, S. R. Sanders, D. E. Culler, and K. Lutz, “An architecture
815
+ for local energy generation, distribution, and sharing,” in Proc. IEEE Energy 2030 Conf., Atlanta, GA, USA,
816
+ Nov. 2008, pp. 1–6.
817
+ [3] M. Farhadi and O. Mohammed, “Adaptive Energy Management in Redundant Hybrid DC Microgrid for Pulse
818
+ Load Mitigation,” IEEE Trans. Smart Grid, vol. 6, no. 1, pp. 54–62, Jan. 2015.
819
+ [4] H. Wu, H. Tian, G. Nie, and P. Zhao, “Wireless Powered Mobile Edge Computing for Industrial Internet of
820
+ Things Systems,” IEEE Access, vol. 8, pp. 101539–101549, 2020.
821
+ [5] T. L. Vandoorn, B. Zwaenepoel, J. D. M. De Kooning, B. Meersman, and L. Vandevelde, “Smart microgrids
822
+ and virtual power plants in a hierarchical control structure,” in 2011 2nd IEEE PES Int. Conf. Exhibition on
823
+ Innovative Smart Grid Technologies.
824
+ IEEE, Dec. 2011, pp. 1–7.
825
+ [6] S. F. Tie and C. W. Tan, “A review of energy sources and energy management system in electric vehicles,”
826
+ Renewable and Sustainable Energy Rev., vol. 20, pp. 82–102, 2013.
827
+ [7] H. Sugiyama, M. Chatani, R. Simizu, and K. Yasui, “Pulsed power network with inherent operating procedure
828
+ and multiple relaying of power routers,” in Proc. 2017 IEEE 6th Glob. Conf. Consumer Electronics, Japan,
829
+ Oct. 2017, pp. 1–2.
830
+ [8] E. Gelenbe and E. T. Ceran, “Energy Packet Networks With Energy Harvesting,” IEEE Access, vol. 4, pp.
831
+ 1321–1331, 2016.
832
+ 12
833
+
834
+ [9] R. Takahashi, K. Tashiro, and T. Hikihara, “Router for power packet distribution network: Design and
835
+ experimental verification,” IEEE Trans. Smart Grid, vol. 6, no. 2, pp. 618–626, Mar. 2015.
836
+ [10] R. Takahashi, S. Azuma, M. Hasegawa, H. Ando, and T. Hikihara, “Power Processing for Advanced Power
837
+ Distribution and Control,” IEICE Trans. Commun., vol. E100.B, no. 6, pp. 941–947, Jun. 2017.
838
+ [11] A. Kurs, A. Karalis, R. Moffatt, J. D. Joannopoulos, P. Fisher, and M. Soljaˇci´c, “Wireless Power Transfer via
839
+ Strongly Coupled Magnetic Resonances,” Science, vol. 317, no. 5834, pp. 83–86, Jul. 2007.
840
+ [12] A. Karalis, J. D. Joannopoulos, and M. Soljaˇci´c, “Efficient Wireless Non-radiative Mid-range Energy Transfer,”
841
+ Annu. Physics, vol. 323, no. 1, pp. 34–48, 2008.
842
+ [13] X. Hou, Z. Wang, Y. Su, Z. Liu, and Z. Deng, “A Dual-Frequency Dual-Load Multirelay Magnetic Coupling
843
+ Wireless Power Transfer System Using Shared Power Channel,” IEEE Trans. Power Electronics, vol. 37, no. 12,
844
+ pp. 15717–15727, 2022.
845
+ [14] H. Ota, J. Liu, Y. Miura, Y. Yanagisawa, A. Wada, S. Sakabe, H. Bevrani, and T. Ise, “Multiphase Direct
846
+ AC Wireless Power Transfer System: Comparative Proposals Using Frequency and Amplitude Modulations,”
847
+ IEEE Journal of Emerging and Selected Topics in Industrial Electronics, vol. 2, no. 2, pp. 101–112, 2021.
848
+ [15] N. Shinohara, “History and Innovation of Wireless Power Transfer via Microwaves,” IEEE Journal of Mi-
849
+ crowaves, vol. 1, no. 1, pp. 218–228, 2021.
850
+ [16] A. Kawamura, K. Ishioka, and J. Hirai, “Wireless Transmission of Power and Information through One High-
851
+ frequency Resonant AC Link Inverter for Robot Manipulator Applications,” IEEE Trans. Industry Applica-
852
+ tions, vol. 32, no. 3, pp. 503–508, 1996.
853
+ [17] M. Mase, N. Shinohara, T. Mitani, and S. Ishino, “Evaluation of efficiency and isolation in wireless power
854
+ transmission using orbital angular momentum modes,” 2021 IEEE Wireless Power Transfer Conf. (WPTC),
855
+ pp. 1–4, 2021.
856
+ [18] M. A. Hossain, R. M. Noor, K. L. A. Yau, I. Ahmedy, and S. S. Anjum, “A Survey on Simultaneous Wireless
857
+ Information and Power Transfer with Cooperative Relay and Future Challenges,” IEEE Access, vol. 7, pp.
858
+ 19166–19198, 2019.
859
+ [19] S. Inagaki, S. Mochiyama, and T. Hikihara, “Electric power processing using logic operation and error
860
+ correction,” Royal Society Open Science, vol. 8, no. 7, p. 202344, Jul. 2021.
861
+ [20] S. Mochiyama and T. Hikihara, “Packet-based Feedback Control of Electrical Drive and Its Application to
862
+ Trajectory Tracking of Manipulator,” International Journal of Circuit Theory and Applications, vol. 47, no. 4,
863
+ pp. 612–632, 2019.
864
+ [21] K. Tashiro, R. Takahashi, and T. Hikihara, “Feasibility of Power Packet Dispatching at In-home DC
865
+ DistributionNnetwork,” in Proc. 2012 IEEE 3rd Int. Conf. Smart Grid Commun. (SmartGridComm).
866
+ IEEE,
867
+ nov 2012, pp. 401–405.
868
+ [22] Y. Zhou, R. Takahashi, N. Fujii, and T. Hikihara, “Power Packet Dispatching with Second-order Clock
869
+ Synchronization,” Int. Journal of Circuit Theory and Applications, vol. 44, no. 3, pp. 729–743, Mar. 2016.
870
+ [23] T. Mamiya, S. Mochiyama and T. Hikihara, “An Experimental Study on Time Division Multiplexing of Wired
871
+ and Wireless Power Transfer by Power Packets,” in Proc. 2021 IEEE 10th Glob. Conf. Consumer Electronics,
872
+ Japan, Oct. 2021, pp. 882–884.
873
+ [24] M. K. Kazimierczuk and C. Dariusz, Resonant Power Converters, 2nd ed.
874
+ New Jersey: John Wiley & Sons,
875
+ 2011.
876
+ [25] T. Hosotani and I. Awai, “A novel analysis of ZVS wireless power transfer system using coupled resonators,”
877
+ 2012 IEEE MTT-S Int. Microwave Workshop Series on Innovative Wireless Power Transmission: Technolo-
878
+ gies, Systems, and Applications,2012, pp. 235–238.
879
+ [26] S. Katayama and T. Hikihara, “Energy-on-Demand Control for Power Packet Dispatching via Single Power
880
+ Line,” in Proc. 2018 IEEE Int. Telecommun. Energy Conf. (INTELEC).
881
+ IEEE, Oct. 2018, pp. 1–5.
882
+ 13
883
+